id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0601011 | Avner Magen | Hamed Hatami and Avner Magen and Vangelis Markakis | Integrality gaps of semidefinite programs for Vertex Cover and relations
to $\ell_1$ embeddability of Negative Type metrics | A more complete version. Changed order of results. A complete proof
of (current) Theorem 5 | null | null | null | cs.DS cs.DM math.MG | null | We study various SDP formulations for {\sc Vertex Cover} by adding different
constraints to the standard formulation. We show that {\sc Vertex Cover} cannot
be approximated better than $2-o(1)$ even when we add the so called pentagonal
inequality constraints to the standard SDP formulation, en route answering an
open question of Karakostas~\cite{Karakostas}. We further show the surprising
fact that by strengthening the SDP with the (intractable) requirement that the
metric interpretation of the solution is an $\ell_1$ metric, we get an exact
relaxation (integrality gap is 1), and on the other hand if the solution is
arbitrarily close to being $\ell_1$ embeddable, the integrality gap may be as
big as $2-o(1)$. Finally, inspired by the above findings, we use ideas from the
integrality gap construction of Charikar \cite{Char02} to provide a family of
simple examples for negative type metrics that cannot be embedded into $\ell_1$
with distortion better than $8/7-\eps$. To this end we prove a new
isoperimetric inequality for the hypercube.
| [
{
"version": "v1",
"created": "Thu, 5 Jan 2006 23:10:58 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Apr 2006 14:01:50 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Apr 2006 20:17:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hatami",
"Hamed",
""
],
[
"Magen",
"Avner",
""
],
[
"Markakis",
"Vangelis",
""
]
]
|
cs/0601013 | Germ\'an Vidal | Josep Silva and Germ\'an Vidal | Forward slicing of functional logic programs by partial evaluation | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.PL cs.LO | null | Program slicing has been mainly studied in the context of imperative
languages, where it has been applied to a wide variety of software engineering
tasks, like program understanding, maintenance, debugging, testing, code reuse,
etc. This work introduces the first forward slicing technique for declarative
multi-paradigm programs which integrate features from functional and logic
programming. Basically, given a program and a slicing criterion (a function
call in our setting), the computed forward slice contains those parts of the
original program which are reachable from the slicing criterion. Our approach
to program slicing is based on an extension of (online) partial evaluation.
Therefore, it provides a simple way to develop program slicing tools from
existing partial evaluators and helps to clarify the relation between both
methodologies. A slicing tool for the multi-paradigm language Curry, which
demonstrates the usefulness of our approach, has been implemented in Curry
itself.
| [
{
"version": "v1",
"created": "Fri, 6 Jan 2006 00:41:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Silva",
"Josep",
""
],
[
"Vidal",
"Germán",
""
]
]
|
cs/0601018 | Miguel Palomino | Miguel Palomino | A comparison between two logical formalisms for rewriting | 31 pages, 2 figures To appear in Theory and Practice of Logic
Programming | null | null | null | cs.LO | null | Meseguer's rewriting logic and the rewriting logic CRWL are two well-known
approaches to rewriting as logical deduction that, despite some clear
similarities, were designed with different objectives. Here we study the
relationships between them, both at a syntactic and at a semantic level. Even
though it is not possible to establish an entailment system map between them,
both can be naturally simulated in each other. Semantically, there is no
embedding between the corresponding institutions. Along the way, the notions of
entailment and satisfaction in Meseguer's rewriting logic are generalized. We
also use the syntactic results to prove reflective properties of CRWL.
| [
{
"version": "v1",
"created": "Fri, 6 Jan 2006 12:01:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Palomino",
"Miguel",
""
]
]
|
cs/0601019 | Antoine Reilles | Antoine Reilles (INRIA Lorraine - LORIA) | Canonical Abstract Syntax Trees | null | Dans Workshop on Rewriting Techniques and Applications (2006) | null | null | cs.PL | null | This paper presents Gom, a language for describing abstract syntax trees and
generating a Java implementation for those trees. Gom includes features
allowing the user to specify and modify the interface of the data structure.
These features provide in particular the capability to maintain the internal
representation of data in canonical form with respect to a rewrite system. This
explicitly guarantees that the client program only manipulates normal forms for
this rewrite system, a feature which is only implicitly used in many
implementations.
| [
{
"version": "v1",
"created": "Fri, 6 Jan 2006 19:50:29 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Nov 2006 13:02:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Reilles",
"Antoine",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0601020 | William Yurcik | Ruperto P. Majuca, William Yurcik, Jay P. Kesan | The Evolution of Cyberinsurance | 16 pages, 6 tables, 2 figures | null | null | null | cs.CR cs.CY | null | Cyberinsurance is a powerful tool to align market incentives toward improving
Internet security. We trace the evolution of cyberinsurance from traditional
insurance policies to early cyber-risk insurance policies to current
comprehensive cyberinsurance products. We find that increasing Internet
security risk in combination with the need for compliance with recent corporate
legislation has contributed significantly to the demand for cyberinsurance.
Cyberinsurance policies have become more comprehensive as insurers better
understand the risk landscape and specific business needs. More specifically,
cyberinsurers are addressing what used to be considered insurmountable problems
(e.g., adverse selection/asymmetric information, moral hazard, etc.) that could
lead to a failure of this market solution. Although some implementation issues
remain, we suggest the future development of cyberinsurance will resolve these
issues as evidenced by insurance solutions in other risk domains.
| [
{
"version": "v1",
"created": "Fri, 6 Jan 2006 20:29:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Majuca",
"Ruperto P.",
""
],
[
"Yurcik",
"William",
""
],
[
"Kesan",
"Jay P.",
""
]
]
|
cs/0601021 | Alexander Haubold | Alexander Haubold | Lighting Control using Pressure-Sensitive Touchpads | null | null | null | null | cs.HC | null | We introduce a novel approach to control physical lighting parameters by
means of a pressure-sensitive touchpad. The two-dimensional area of the
touchpad is subdivided into 5 virtual sliders, each controlling the intensity
of a color (red, green, blue, yellow, and white). The physical interaction
methodology is modeled directly after ubiquitous mechanical sliders and dimmers
which tend to be used for intensity/volume control. Our abstraction to a
pressure-sensitive touchpad provides advantages and introduces additional
benefits over such existing devices.
| [
{
"version": "v1",
"created": "Sat, 7 Jan 2006 11:06:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
]
]
|
cs/0601024 | Xu Hong | Hong Xu and Wen-Feng Qi | Further Results on the Distinctness of Decimations of l-sequences | submitted to IEEE-IT | null | null | null | cs.CR | null | Let $\underline{a}$ be an \textit{l}-sequence generated by a
feedback-with-carry shift register with connection integer $q=p^{e}$, where $
p$ is an odd prime and $e\geq 1$. Goresky and Klapper conjectured that when $
p^{e}\notin \{5,9,11,13\}$, all decimations of $\underline{a}$ are cyclically
distinct. When $e=1$ and $p>13$, they showed that the set of distinct
decimations is large and, in some cases, all deciamtions are distinct. In this
article, we further show that when $e\geq 2$ and$ p^{e}\neq 9$, all decimations
of $\underline{a}$ are also cyclically distinct.
| [
{
"version": "v1",
"created": "Mon, 9 Jan 2006 11:26:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Xu",
"Hong",
""
],
[
"Qi",
"Wen-Feng",
""
]
]
|
cs/0601026 | Nicholas Harvey | Nicholas J. A. Harvey | Algebraic Structures and Algorithms for Matching and Matroid Problems
(Preliminary Version) | null | null | null | null | cs.DS cs.DM | null | Basic path-matchings, introduced by Cunningham and Geelen (FOCS 1996), are a
common generalization of matroid intersection and non-bipartite matching. The
main results of this paper are a new algebraic characterization of basic
path-matching problems and an algorithm for constructing basic path-matchings
in O(n^w) time, where n is the number of vertices and w is the exponent for
matrix multiplication. Our algorithms are randomized, and our approach assumes
that the given matroids are linear and can be represented over the same field.
Our main results have interesting consequences for several special cases of
path-matching problems. For matroid intersection, we obtain an algorithm with
running time O(nr^(w-1))=O(nr^1.38), where the matroids have n elements and
rank r. This improves the long-standing bound of O(nr^1.62) due to Gabow and Xu
(FOCS 1989). Also, we obtain a simple, purely algebraic algorithm for
non-bipartite matching with running time O(n^w). This resolves the central open
problem of Mucha and Sankowski (FOCS 2004).
| [
{
"version": "v1",
"created": "Mon, 9 Jan 2006 13:54:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Harvey",
"Nicholas J. A.",
""
]
]
|
cs/0601033 | Martin Kutz | Rolf Klein and Martin Kutz | The density of iterated crossing points and a gap result for
triangulations of finite point sets | 10 pages + appendix | null | null | null | cs.CG | null | Consider a plane graph G, drawn with straight lines. For every pair a,b of
vertices of G, we compare the shortest-path distance between a and b in G (with
Euclidean edge lengths) to their actual distance in the plane. The worst-case
ratio of these two values, for all pairs of points, is called the dilation of
G. All finite plane graphs of dilation 1 have been classified. They are closely
related to the following iterative procedure. For a given point set P in R^2,
we connect every pair of points in P by a line segment and then add to P all
those points where two such line segments cross. Repeating this process
infinitely often, yields a limit point set P*.
The main result of this paper is the following gap theorem: For any finite
point set P in the plane for which the above P* is infinite, there exists a
threshold t > 1 such that P is not contained in the vertex set of any finite
plane graph of dilation at most t. We construct a concrete point set Q such
that any planar graph that contains this set amongst its vertices must have a
dilation larger than 1.0000047.
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 01:13:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Klein",
"Rolf",
""
],
[
"Kutz",
"Martin",
""
]
]
|
cs/0601034 | Vicky Weissman | Joseph Y. Halpern and Vicky Weissman | Using First-Order Logic to Reason about Policies | 39 pages, earlier version in Proceedings of the Sixteenth IEEE
Computer Security Foundations Workshop, 2003, pp. 187-201 | null | null | null | cs.LO cs.CR | null | A policy describes the conditions under which an action is permitted or
forbidden. We show that a fragment of (multi-sorted) first-order logic can be
used to represent and reason about policies. Because we use first-order logic,
policies have a clear syntax and semantics. We show that further restricting
the fragment results in a language that is still quite expressive yet is also
tractable. More precisely, questions about entailment, such as `May Alice
access the file?', can be answered in time that is a low-order polynomial
(indeed, almost linear in some cases), as can questions about the consistency
of policy sets.
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 04:30:49 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Jan 2006 12:58:59 GMT"
},
{
"version": "v3",
"created": "Mon, 15 May 2006 15:10:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Weissman",
"Vicky",
""
]
]
|
cs/0601035 | Francois Colonna | Francois Colonna (LCT) | Deductive Object Programming | 20 pages | null | null | null | cs.SE | null | We propose some slight additions to O-O languages to implement the necessary
features for using Deductive Object Programming (DOP). This way of programming
based upon the manipulation of the Production Tree of the Objects of Interest,
result in making Persistent these Objects and in sensibly lowering the code
complexity.
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 09:50:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Colonna",
"Francois",
"",
"LCT"
]
]
|
cs/0601037 | Giorgio Delzanno | Giorgio Delzanno | Constraint-based verification of abstract models of multitreaded
programs | To appear in Theory and Practice of Logic Programming | null | null | null | cs.CL cs.PL | null | We present a technique for the automated verification of abstract models of
multithreaded programs providing fresh name generation, name mobility, and
unbounded control.
As high level specification language we adopt here an extension of
communication finite-state machines with local variables ranging over an
infinite name domain, called TDL programs. Communication machines have been
proved very effective for representing communication protocols as well as for
representing abstractions of multithreaded software.
The verification method that we propose is based on the encoding of TDL
programs into a low level language based on multiset rewriting and constraints
that can be viewed as an extension of Petri Nets. By means of this encoding,
the symbolic verification procedure developed for the low level language in our
previous work can now be applied to TDL programs. Furthermore, the encoding
allows us to isolate a decidable class of verification problems for TDL
programs that still provide fresh name generation, name mobility, and unbounded
control. Our syntactic restrictions are in fact defined on the internal
structure of threads: In order to obtain a complete and terminating method,
threads are only allowed to have at most one local variable (ranging over an
infinite domain of names).
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 12:57:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Delzanno",
"Giorgio",
""
]
]
|
cs/0601038 | Giorgio Delzanno | Giorgio Delzanno | Constraint-based automatic verification of abstract models of
multithreaded programs | To appear in Theory and Practice of Logic Programming | null | null | null | cs.LO cs.PL | null | We present a technique for the automated verification of abstract models of
multithreaded programs providing fresh name generation, name mobility, and
unbounded control.
As high level specification language we adopt here an extension of
communication finite-state machines with local variables ranging over an
infinite name domain, called TDL programs. Communication machines have been
proved very effective for representing communication protocols as well as for
representing abstractions of multithreaded software.
The verification method that we propose is based on the encoding of TDL
programs into a low level language based on multiset rewriting and constraints
that can be viewed as an extension of Petri Nets. By means of this encoding,
the symbolic verification procedure developed for the low level language in our
previous work can now be applied to TDL programs. Furthermore, the encoding
allows us to isolate a decidable class of verification problems for TDL
programs that still provide fresh name generation, name mobility, and unbounded
control. Our syntactic restrictions are in fact defined on the internal
structure of threads: In order to obtain a complete and terminating method,
threads are only allowed to have at most one local variable (ranging over an
infinite domain of names).
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 12:57:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Delzanno",
"Giorgio",
""
]
]
|
cs/0601039 | Santiago Escobar | Maria Alpuente, Santiago Escobar, Salvador Lucas | Removing Redundant Arguments Automatically | Accepted for publication in Theory and Practice of Logic Programming | null | null | null | cs.PL | null | The application of automatic transformation processes during the formal
development and optimization of programs can introduce encumbrances in the
generated code that programmers usually (or presumably) do not write. An
example is the introduction of redundant arguments in the functions defined in
the program. Redundancy of a parameter means that replacing it by any
expression does not change the result. In this work, we provide methods for the
analysis and elimination of redundant arguments in term rewriting systems as a
model for the programs that can be written in more sophisticated languages. On
the basis of the uselessness of redundant arguments, we also propose an erasure
procedure which may avoid wasteful computations while still preserving the
semantics (under ascertained conditions). A prototype implementation of these
methods has been undertaken, which demonstrates the practicality of our
approach.
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 13:13:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Alpuente",
"Maria",
""
],
[
"Escobar",
"Santiago",
""
],
[
"Lucas",
"Salvador",
""
]
]
|
cs/0601042 | Christoph Benzm?ller Dr | Christoph Benzmueller, John Harrison, and Carsten Schuermann (Eds.) | LPAR-05 Workshop: Empirically Successfull Automated Reasoning in
Higher-Order Logic (ESHOL) | Workshop Proceedings | null | null | null | cs.AI cs.LO | null | This workshop brings together practioners and researchers who are involved in
the everyday aspects of logical systems based on higher-order logic. We hope to
create a friendly and highly interactive setting for discussions around the
following four topics. Implementation and development of proof assistants based
on any notion of impredicativity, automated theorem proving tools for
higher-order logic reasoning systems, logical framework technology for the
representation of proofs in higher-order logic, formal digital libraries for
storing, maintaining and querying databases of proofs.
We envision attendees that are interested in fostering the development and
visibility of reasoning systems for higher-order logics. We are particularly
interested in a discusssion on the development of a higher-order version of the
TPTP and in comparisons of the practical strengths of automated higher-order
reasoning systems. Additionally, the workshop includes system demonstrations.
ESHOL is the successor of the ESCAR and ESFOR workshops held at CADE 2005 and
IJCAR 2004.
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 18:43:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Benzmueller",
"Christoph",
"",
"Eds."
],
[
"Harrison",
"John",
"",
"Eds."
],
[
"Schuermann",
"Carsten",
"",
"Eds."
]
]
|
cs/0601045 | Lillian Lee | Oren Kurland and Lillian Lee | PageRank without hyperlinks: Structural re-ranking using links induced
by language models | null | Proceedings of SIGIR 2005, pp. 306--313 | null | null | cs.IR cs.CL | null | Inspired by the PageRank and HITS (hubs and authorities) algorithms for Web
search, we propose a structural re-ranking approach to ad hoc information
retrieval: we reorder the documents in an initially retrieved set by exploiting
asymmetric relationships between them. Specifically, we consider generation
links, which indicate that the language model induced from one document assigns
high probability to the text of another; in doing so, we take care to prevent
bias against long documents. We study a number of re-ranking criteria based on
measures of centrality in the graphs formed by generation links, and show that
integrating centrality into standard language-model-based retrieval is quite
effective at improving precision at top ranks.
| [
{
"version": "v1",
"created": "Wed, 11 Jan 2006 21:27:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kurland",
"Oren",
""
],
[
"Lee",
"Lillian",
""
]
]
|
cs/0601046 | Lillian Lee | Oren Kurland, Lillian Lee, Carmel Domshlak | Better than the real thing? Iterative pseudo-query processing using
cluster-based language models | null | Proceedings of SIGIR 2005, pp. 19--26 | null | null | cs.IR cs.CL | null | We present a novel approach to pseudo-feedback-based ad hoc retrieval that
uses language models induced from both documents and clusters. First, we treat
the pseudo-feedback documents produced in response to the original query as a
set of pseudo-queries that themselves can serve as input to the retrieval
process. Observing that the documents returned in response to the
pseudo-queries can then act as pseudo-queries for subsequent rounds, we arrive
at a formulation of pseudo-query-based retrieval as an iterative process.
Experiments show that several concrete instantiations of this idea, when
applied in conjunction with techniques designed to heighten precision, yield
performance results rivaling those of a number of previously-proposed
algorithms, including the standard language-modeling approach. The use of
cluster-based language models is a key contributing factor to our algorithms'
success.
| [
{
"version": "v1",
"created": "Wed, 11 Jan 2006 21:47:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kurland",
"Oren",
""
],
[
"Lee",
"Lillian",
""
],
[
"Domshlak",
"Carmel",
""
]
]
|
cs/0601047 | Juan J. Merelo Pr. | Lourdes Araujo and Juan J. Merelo | Automatic Detection of Trends in Dynamical Text: An Evolutionary
Approach | 22 pages, submitted to Journal of Information Retrieval | null | null | null | cs.IR cs.NE | null | This paper presents an evolutionary algorithm for modeling the arrival dates
of document streams, which is any time-stamped collection of documents, such as
newscasts, e-mails, IRC conversations, scientific journals archives and weblog
postings. This algorithm assigns frequencies (number of document arrivals per
time unit) to time intervals so that it produces an optimal fit to the data.
The optimization is a trade off between accurately fitting the data and
avoiding too many frequency changes; this way the analysis is able to find fits
which ignore the noise. Classical dynamic programming algorithms are limited by
memory and efficiency requirements, which can be a problem when dealing with
long streams. This suggests to explore alternative search methods which allow
for some degree of uncertainty to achieve tractability. Experiments have shown
that the designed evolutionary algorithm is able to reach the same solution
quality as those classical dynamic programming algorithms in a shorter time. We
have also explored different probabilistic models to optimize the fitting of
the date streams, and applied these algorithms to infer whether a new arrival
increases or decreases {\em interest} in the topic the document stream is
about.
| [
{
"version": "v1",
"created": "Thu, 12 Jan 2006 20:23:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Araujo",
"Lourdes",
""
],
[
"Merelo",
"Juan J.",
""
]
]
|
cs/0601049 | Tony Thomas | Tony Thomas, Arbind Kumar Lal | Undeniable Signature Schemes Using Braid Groups | null | null | null | null | cs.CR | null | Artin's braid groups have been recently suggested as a new source for
public-key cryptography. In this paper we propose the first undeniable
signature schemes using the conjugacy problem and the decomposition problem in
the braid groups which are believed to be hard problems.
| [
{
"version": "v1",
"created": "Fri, 13 Jan 2006 07:33:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thomas",
"Tony",
""
],
[
"Lal",
"Arbind Kumar",
""
]
]
|
cs/0601050 | Alex Vinokur Dr. | Alex Vinokur | Computing Fibonacci numbers on a Turing Machine | 5 pages, 1 table | null | null | null | cs.DM | null | A Turing machine that computes Fibonacci numbers is described.
| [
{
"version": "v1",
"created": "Fri, 13 Jan 2006 14:27:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vinokur",
"Alex",
""
]
]
|
cs/0601051 | Enrico Pontelli | Tran Cao Son and Enrico Pontelli | A Constructive Semantic Characterization of Aggregates in ASP | 21 pages | null | null | null | cs.AI cs.LO cs.PL cs.SC | null | This technical note describes a monotone and continuous fixpoint operator to
compute the answer sets of programs with aggregates. The fixpoint operator
relies on the notion of aggregate solution. Under certain conditions, this
operator behaves identically to the three-valued immediate consequence operator
$\Phi^{aggr}_P$ for aggregate programs, independently proposed Pelov et al.
This operator allows us to closely tie the computational complexity of the
answer set checking and answer sets existence problems to the cost of checking
a solution of the aggregates in the program. Finally, we relate the semantics
described by the operator to other proposals for logic programming with
aggregates.
To appear in Theory and Practice of Logic Programming (TPLP).
| [
{
"version": "v1",
"created": "Fri, 13 Jan 2006 16:09:36 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Feb 2006 18:31:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Son",
"Tran Cao",
""
],
[
"Pontelli",
"Enrico",
""
]
]
|
cs/0601052 | Subhash Kak | Subhash Kak | Artificial and Biological Intelligence | 16 pages | ACM Ubiquity, vol. 6, number 42, 2005, pp. 1-20 | null | null | cs.AI | null | This article considers evidence from physical and biological sciences to show
machines are deficient compared to biological systems at incorporating
intelligence. Machines fall short on two counts: firstly, unlike brains,
machines do not self-organize in a recursive manner; secondly, machines are
based on classical logic, whereas Nature's intelligence may depend on quantum
mechanics.
| [
{
"version": "v1",
"created": "Fri, 13 Jan 2006 19:01:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kak",
"Subhash",
""
]
]
|
cs/0601053 | Vedran Kordic | Adel Al-Jumaily & Cindy Leung | Wavefront Propagation and Fuzzy Based Autonomous Navigation | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | Path planning and obstacle avoidance are the two major issues in any
navigation system. Wavefront propagation algorithm, as a good path planner, can
be used to determine an optimal path. Obstacle avoidance can be achieved using
possibility theory. Combining these two functions enable a robot to
autonomously navigate to its destination. This paper presents the approach and
results in implementing an autonomous navigation system for an indoor mobile
robot. The system developed is based on a laser sensor used to retrieve data to
update a two dimensional world model of therobot environment. Waypoints in the
path are incorporated into the obstacle avoidance. Features such as ageing of
objects and smooth motion planning are implemented to enhance efficiency and
also to cater for dynamic environments.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:09:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Al-Jumaily",
"Adel",
""
],
[
"Leung",
"Cindy",
""
]
]
|
cs/0601054 | Vedran Kordic | Victor Etxebarria, Arantza Sanz & Ibone Lizarraga | Control of a Lightweight Flexible Robotic Arm Using Sliding Modes | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | This paper presents a robust control scheme for flexible link robotic
manipulators, which is based on considering the flexible mechanical structure
as a system with slow (rigid) and fast (flexible) modes that can be controlled
separately. The rigid dynamics is controlled by means of a robust sliding-mode
approach with wellestablished stability properties while an LQR optimal design
is adopted for the flexible dynamics. Experimental results show that this
composite approach achieves good closed loop tracking properties both for the
rigid and the flexible dynamics.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:10:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Etxebarria",
"Victor",
""
],
[
"Sanz",
"Arantza",
""
],
[
"Lizarraga",
"Ibone",
""
]
]
|
cs/0601055 | Vedran Kordic | Alborz Geramifard, Peyman Nayeri, Reza Zamani-Nasab & Jafar Habibi | A Hybrid Three Layer Architecture for Fire Agent Management in Rescue
Simulation Environment | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | This paper presents a new architecture called FAIS for imple- menting
intelligent agents cooperating in a special Multi Agent environ- ment, namely
the RoboCup Rescue Simulation System. This is a layered architecture which is
customized for solving fire extinguishing problem. Structural decision making
algorithms are combined with heuristic ones in this model, so it's a hybrid
architecture.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:12:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Geramifard",
"Alborz",
""
],
[
"Nayeri",
"Peyman",
""
],
[
"Zamani-Nasab",
"Reza",
""
],
[
"Habibi",
"Jafar",
""
]
]
|
cs/0601056 | Vedran Kordic | Panfeng Huang, Yangsheng Xu & Bin Liang | Dynamic Balance Control of Multi-arm Free-Floating Space Robots | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | This paper investigates the problem of the dynamic balance control of
multi-arm free-floating space robot during capturing an active object in close
proximity. The position and orientation of space base will be affected during
the operation of space manipulator because of the dynamics coupling between the
manipulator and space base. This dynamics coupling is unique characteristics of
space robot system. Such a disturbance will produce a serious impact between
the manipulator hand and the object. To ensure reliable and precise operation,
we propose to develop a space robot system consisting of two arms, with one arm
(mission arm) for accomplishing the capture mission, and the other one (balance
arm) compensating for the disturbance of the base. We present the coordinated
control concept for balance of the attitude of the base using the balance arm.
The mission arm can move along the given trajectory to approach and capture the
target with no considering the disturbance from the coupling of the base. We
establish a relationship between the motion of two arm that can realize the
zeros reaction to the base. The simulation studies verified the validity and
efficiency of the proposed control method.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:13:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Huang",
"Panfeng",
""
],
[
"Xu",
"Yangsheng",
""
],
[
"Liang",
"Bin",
""
]
]
|
cs/0601057 | Vedran Kordic | Musa Mailah, Endra Pitowarno & Hishamuddin Jamaluddin | Robust Motion Control for Mobile Manipulator Using Resolved Acceleration
and Proportional-Integral Active Force Control | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | A resolved acceleration control (RAC) and proportional-integral active force
control (PIAFC) is proposed as an approach for the robust motion control of a
mobile manipulator (MM) comprising a differentially driven wheeled mobile
platform with a two-link planar arm mounted on top of the platform. The study
emphasizes on the integrated kinematic and dynamic control strategy in which
the RAC is used to manipulate the kinematic component while the PIAFC is
implemented to compensate the dynamic effects including the bounded
known/unknown disturbances and uncertainties. The effectivenss and robustness
of the proposed scheme are investigated through a rigorous simulation study and
later complemented with experimental results obtained through a number of
experiments performed on a fully developed working prototype in a laboratory
environment. A number of disturbances in the form of vibratory and impact
forces are deliberately introduced into the system to evaluate the system
performances. The investigation clearly demonstrates the extreme robustness
feature of the proposed control scheme compared to other systems considered in
the study.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:14:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mailah",
"Musa",
""
],
[
"Pitowarno",
"Endra",
""
],
[
"Jamaluddin",
"Hishamuddin",
""
]
]
|
cs/0601058 | Vedran Kordic | Michael Sdahl & Bernd Kuhlenkoetter | CAGD - Computer Aided Gripper Design for a Flexible Gripping System | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | This paper is a summary of the recently accomplished research work on
flexible gripping systems. The goal is to develop a gripper which can be used
for a great amount of geometrically variant workpieces. The economic aspect is
of particular importance during the whole development. The high flexibility of
the gripper is obtained by three parallel used principles. These are human and
computer based analysis of the gripping object as well as mechanical adaptation
of the gripper to the object with the help of servo motors. The focus is on the
gripping of free-form surfaces with suction cup.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:15:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sdahl",
"Michael",
""
],
[
"Kuhlenkoetter",
"Bernd",
""
]
]
|
cs/0601059 | Vedran Kordic | Shu-qin Li, Lan Shuai, Xian-yi Cheng, Zhen-min Tang & Jing-yu Yang | A Descriptive Model of Robot Team and the Dynamic Evolution of Robot
Team Cooperation | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | At present, the research on robot team cooperation is still in qualitative
analysis phase and lacks the description model that can quantitatively describe
the dynamical evolution of team cooperative relationships with constantly
changeable task demand in Multi-robot field. First this paper whole and static
describes organization model HWROM of robot team, then uses Markov course and
Bayesian theorem for reference, dynamical describes the team cooperative
relationships building. Finally from cooperative entity layer, ability layer
and relative layer we research team formation and cooperative mechanism, and
discuss how to optimize relative action sets during the evolution. The dynamic
evolution model of robot team and cooperative relationships between robot teams
proposed and described in this paper can not only generalize the robot team as
a whole, but also depict the dynamic evolving process quantitatively. Users can
also make the prediction of the cooperative relationship and the action of the
robot team encountering new demands based on this model. Journal web page & a
lot of robotic related papers www.ars-journal.com
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:18:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Shu-qin",
""
],
[
"Shuai",
"Lan",
""
],
[
"Cheng",
"Xian-yi",
""
],
[
"Tang",
"Zhen-min",
""
],
[
"Yang",
"Jing-yu",
""
]
]
|
cs/0601060 | Vedran Kordic | Olga Bogatyreva & Alexandr Shillerov | Robot Swarms in an Uncertain World: Controllable Adaptability | Journal web page & a lot of robotic related papers
www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No3.
(2005) | null | null | cs.RO | null | There is a belief that complexity and chaos are essential for adaptability.
But life deals with complexity every moment, without the chaos that engineers
fear so, by invoking goal-directed behaviour. Goals can be programmed. That is
why living organisms give us hope to achieve adaptability in robots. In this
paper a method for the description of a goal-directed, or programmed,
behaviour, interacting with uncertainty of environment, is described. We
suggest reducing the structural (goals, intentions) and stochastic components
(probability to realise the goal) of individual behaviour to random variables
with nominal values to apply probabilistic approach. This allowed us to use a
Normalized Entropy Index to detect the system state by estimating the
contribution of each agent to the group behaviour. The number of possible group
states is 27. We argue that adaptation has a limited number of possible paths
between these 27 states. Paths and states can be programmed so that after
adjustment to any particular case of task and conditions, adaptability will
never involve chaos. We suggest the application of the model to operation of
robots or other devices in remote and/or dangerous places.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:20:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bogatyreva",
"Olga",
""
],
[
"Shillerov",
"Alexandr",
""
]
]
|
cs/0601061 | Vedran Kordic | I. Topalova | Modular Adaptive System Based on a Multi-Stage Neural Structure for
Recognition of 2D Objects of Discontinuous Production | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No1.
(2005) | null | null | cs.RO | null | This is a presentation of a new system for invariant recognition of 2D
objects with overlapping classes, that can not be effectively recognized with
the traditional methods. The translation, scale and partial rotation invariant
contour object description is transformed in a DCT spectrum space. The obtained
frequency spectrums are decomposed into frequency bands in order to feed
different BPG neural nets (NNs). The NNs are structured in three stages -
filtering and full rotation invariance; partial recognition; general
classification. The designed multi-stage BPG Neural Structure shows very good
accuracy and flexibility when tested with 2D objects used in the discontinuous
production. The reached speed and the opportunuty for an easy restructuring and
reprogramming of the system makes it suitable for application in different
applied systems for real time work.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:25:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Topalova",
"I.",
""
]
]
|
cs/0601062 | Vedran Kordic | Ceng Xian-yi, Li Shu-qin & Xia De-shen | Study of Self-Organization Model of Multiple Mobile Robot | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No3.
(2005) | null | null | cs.RO | null | A good organization model of multiple mobile robot should be able to improve
the efficiency of the system, reduce the complication of robot interactions,
and detract the difficulty of computation. From the sociology aspect of
topology, structure and organization, this paper studies the multiple mobile
robot organization formation and running mechanism in the dynamic, complicated
and unknown environment. It presents and describes in detail a Hierarchical-
Web Recursive Organization Model (HWROM) and forming algorithm. It defines the
robot society leader; robotic team leader and individual robot as the same
structure by the united framework and describes the organization model by the
recursive structure. The model uses task-oriented and top-down method to
dynamically build and maintain structures and organization. It uses
market-based techniques to assign task, form teams and allocate resources in
dynamic environment. The model holds several characteristics of
self-organization, dynamic, conciseness, commonness and robustness.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:27:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Xian-yi",
"Ceng",
""
],
[
"Shu-qin",
"Li",
""
],
[
"De-shen",
"Xia",
""
]
]
|
cs/0601063 | Vedran Kordic | Atef A. Ata & Thi Rein Myo | Optimal Point-to-Point Trajectory Tracking of Redundant Manipulators
using Generalized Pattern Search | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No3.
(2005) | null | null | cs.RO | null | Optimal point-to-point trajectory planning for planar redundant manipulator
is considered in this study. The main objective is to minimize the sum of the
position error of the end-effector at each intermediate point along the
trajectory so that the end-effector can track the prescribed trajectory
accurately. An algorithm combining Genetic Algorithm and Pattern Search as a
Generalized Pattern Search GPS is introduced to design the optimal trajectory.
To verify the proposed algorithm, simulations for a 3-D-O-F planar manipulator
with different end-effector trajectories have been carried out. A comparison
between the Genetic Algorithm and the Generalized Pattern Search shows that The
GPS gives excellent tracking performance.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:29:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ata",
"Atef A.",
""
],
[
"Myo",
"Thi Rein",
""
]
]
|
cs/0601064 | Vedran Kordic | Chua Kia & Mohd Rizal Arshad | Robotics Vision-based Heuristic Reasoning for Underwater Target Tracking
and Navigation | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No3.
(2005) | null | null | cs.RO | null | This paper presents a robotics vision-based heuristic reasoning system for
underwater target tracking and navigation. This system is introduced to improve
the level of automation of underwater Remote Operated Vehicles (ROVs)
operations. A prototype which combines computer vision with an underwater
robotics system is successfully designed and developed to perform target
tracking and intelligent navigation. ...
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:34:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kia",
"Chua",
""
],
[
"Arshad",
"Mohd Rizal",
""
]
]
|
cs/0601065 | Vedran Kordic | Nazim Mir-Nasiri & Sulaiman Hussaini | New Intelligent Transmission Concept for Hybrid Mobile Robot Speed
Control | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No3.
(2005) | null | null | cs.RO | null | This paper presents a new concept of a mobile robot speed control by using
two degree of freedom gear transmission. The developed intelligent speed
controller utilizes a gear box which comprises of epicyclic gear train with two
inputs, one coupled with the engine shaft and another with the shaft of a
variable speed dc motor. The net output speed is a combination of the two input
speeds and is governed by the transmission ratio of the planetary gear train.
This new approach eliminates the use of a torque converter which is otherwise
an indispensable part of all available automatic transmissions, thereby
reducing the power loss that occurs in the box during the fluid coupling. By
gradually varying the speed of the dc motor a stepless transmission has been
achieved. The other advantages of the developed controller are pulling over and
reversing the vehicle, implemented by intelligent mixing of the dc motor and
engine speeds. This approach eliminates traditional braking system in entire
vehicle design. The use of two power sources, IC engine and battery driven DC
motor, utilizes the modern idea of hybrid vehicles. The new mobile robot speed
controller is capable of driving the vehicle even in extreme case of IC engine
failure, for example, due to gas depletion.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:35:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mir-Nasiri",
"Nazim",
""
],
[
"Hussaini",
"Sulaiman",
""
]
]
|
cs/0601068 | Sorav Bansal | Sorav Bansal | Checkbochs: Use Hardware to Check Software | 4 pages, 4 figures | null | null | null | cs.OS cs.CR | null | In this paper, we present a system called Checkbochs, a machine simulator
that checks rules about its guest operating system and applications at the
hardware level. The properties to be checked can be implemented as `plugins' in
the Checkbochs simulator. Some of the properties that were checked using
Checkbochs include null-pointer checks, format-string vulnerabilities,
user/kernel pointer checks, and race-conditions. On implementing these checks,
we were able to uncover previously-unknown bugs in widely used Linux
distributions. We also tested our tools on undergraduate coursework, and found
numerous bugs.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 23:21:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bansal",
"Sorav",
""
]
]
|
cs/0601069 | Boris Ryabko | Boris Ryabko | Fast Enumeration of Combinatorial Objects | null | published in Discrete Math.and Applications, v.10, n2, 1998 | null | null | cs.CC cs.DM | null | The problem of ranking can be described as follows. We have a set of
combinatorial objects $S$, such as, say, the k-subsets of n things, and we can
imagine that they have been arranged in some list, say lexicographically, and
we want to have a fast method for obtaining the rank of a given object in the
list. This problem is widely known in Combinatorial Analysis, Computer Science
and Information Theory. Ranking is closely connected with the hashing problem,
especially with perfect hashing and with generating of random combinatorial
objects. In Information Theory the ranking problem is closely connected with
so-called enumerative encoding, which may be described as follows: there is a
set of words $S$ and an enumerative code has to one-to-one encode every $s \in
S$ by a binary word $code(s)$. The length of the $code(s)$ must be the same for
all $s \in S$. Clearly, $|code (s)|\geq \log |S|$. (Here and below $\log
x=\log_{2}x)$.) The suggested method allows the exponential growth of the speed
of encoding and decoding for all combinatorial problems of enumeration which
are considered, including the enumeration of permutations, compositions and
others.
| [
{
"version": "v1",
"created": "Sun, 15 Jan 2006 13:55:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ryabko",
"Boris",
""
]
]
|
cs/0601071 | Antonio J. Fernandez | Antonio J. Fernandez, Teresa Hortala-Gonzalez, Fernando Saenz-Perez
and Rafael del Vado-Virseda | Constraint Functional Logic Programming over Finite Domains | Accepted for publication in Theory and Practice of Logic programming
(TPLP); 47 pages | null | null | null | cs.PL | null | In this paper, we present our proposal to Constraint Functional Logic
Programming over Finite Domains (CFLP(FD)) with a lazy functional logic
programming language which seamlessly embodies finite domain (FD) constraints.
This proposal increases the expressiveness and power of constraint logic
programming over finite domains (CLP(FD)) by combining functional and
relational notation, curried expressions, higher-order functions, patterns,
partial applications, non-determinism, lazy evaluation, logical variables,
types, domain variables, constraint composition, and finite domain constraints.
We describe the syntax of the language, its type discipline, and its
declarative and operational semantics. We also describe TOY(FD), an
implementation for CFLPFD(FD), and a comparison of our approach with respect to
CLP(FD) from a programming point of view, showing the new features we
introduce. And, finally, we show a performance analysis which demonstrates that
our implementation is competitive with respect to existing CLP(FD) systems and
that clearly outperforms the closer approach to CFLP(FD).
| [
{
"version": "v1",
"created": "Mon, 16 Jan 2006 11:45:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fernandez",
"Antonio J.",
""
],
[
"Hortala-Gonzalez",
"Teresa",
""
],
[
"Saenz-Perez",
"Fernando",
""
],
[
"del Vado-Virseda",
"Rafael",
""
]
]
|
cs/0601076 | Kuan-San Ooi | K. S. Ooi | Learning by Test-infecting Symmetric Ciphers | null | null | null | null | cs.CR | null | We describe a novel way in which students can learn the cipher systems
without much supervision. In this work we focus on learning symmetric ciphers
by altering them using the agile development approach. Two agile approaches the
eXtreme Programming (XP) and the closely related Test-Driven Development (TDD)
are mentioned or discussed. To facilitate this development we experiment with
an approach that is based on refactoring, with JUnit serves as the automatic
testing framework. In this work we exemplify our learning approach by
test-infecting the Vernam cipher, an aged but still widely used stream cipher.
One can replace the cipher with another symmetric cipher with the same
behavior. Software testing is briefly described. Just-in-time introduction to
Object-oriented programming (OOP), exemplified by using JavaTM, is advocated.
Refactoring exercises, as argued, are kept strategically simple so that they do
not become intensive class redesign exercises. The use of free or open-source
tools and frameworks is mentioned.
| [
{
"version": "v1",
"created": "Tue, 17 Jan 2006 08:48:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ooi",
"K. S.",
""
]
]
|
cs/0601078 | Benjamin Gaidioz | Benjamin Gaidioz, Birger Koblitz, Nuno Santos | Exploring high performance distributed file storage using LDPC codes | null | null | null | null | cs.DC | null | We explore the feasibility of implementing a reliable, high performance,
distributed storage system on a commodity computing cluster. Files are
distributed across storage nodes using erasure coding with small Low-Density
Parity-Check (LDPC) codes which provide high reliability while keeping the
storage and performance overhead small. We present performance measurements
done on a prototype system comprising 50 nodes which are self organised using a
peer-to-peer overlay.
| [
{
"version": "v1",
"created": "Tue, 17 Jan 2006 13:30:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gaidioz",
"Benjamin",
""
],
[
"Koblitz",
"Birger",
""
],
[
"Santos",
"Nuno",
""
]
]
|
cs/0601079 | William Yurcik | Katherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam
Slagell | SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process
Accounting | 19 pages, 11 figures, 4 tables | null | null | null | cs.CR | null | In the UNIX/Linux environment the kernel can log every command process
created by every user using process accounting. This data has many potential
uses, including the investigation of security incidents. However, process
accounting data is also sensitive since it contains private user information.
Consequently, security system administrators have been hindered from sharing
these logs. Given that many interesting security applications could use process
accounting data, it would be useful to have a tool that could protect private
user information in the logs. For this reason we introduce SCRUB-PA, a tool
that uses multi-level multi-dimensional anonymization on process accounting log
files in order to provide different levels of privacy protection. It is our
goal that SCRUB-PA will promote the sharing of process accounting logs while
preserving privacy.
| [
{
"version": "v1",
"created": "Wed, 18 Jan 2006 01:08:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Luo",
"Katherine",
""
],
[
"Li",
"Yifan",
""
],
[
"Ermopoulos",
"Charis",
""
],
[
"Yurcik",
"William",
""
],
[
"Slagell",
"Adam",
""
]
]
|
cs/0601081 | Andrej (Andy) Brodnik | Andrej Brodnik, Johan Karlsson, J. Ian Munro, Andreas Nilsson | An O(1) Solution to the Prefix Sum Problem on a Specialized Memory
Architecture | 12 pages | null | null | null | cs.DS cs.CC cs.IR | null | In this paper we study the Prefix Sum problem introduced by Fredman.
We show that it is possible to perform both update and retrieval in O(1) time
simultaneously under a memory model in which individual bits may be shared by
several words.
We also show that two variants (generalizations) of the problem can be solved
optimally in $\Theta(\lg N)$ time under the comparison based model of
computation.
| [
{
"version": "v1",
"created": "Wed, 18 Jan 2006 21:20:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brodnik",
"Andrej",
""
],
[
"Karlsson",
"Johan",
""
],
[
"Munro",
"J. Ian",
""
],
[
"Nilsson",
"Andreas",
""
]
]
|
cs/0601082 | Shai Carmi | Shai Carmi, Reuven Cohen and Danny Dolev | Search in Complex Networks : a New Method of Naming | 5 pages, 4 figures | Europhys. Lett., 74 (6), pp. 1102-1108 (2006) | 10.1209/epl/i2006-10049-1 | null | cs.NI cond-mat.dis-nn | null | We suggest a method for routing when the source does not posses full
information about the shortest path to the destination. The method is
particularly useful for scale-free networks, and exploits its unique
characteristics. By assigning new (short) names to nodes (aka labelling) we are
able to reduce significantly the memory requirement at the routers, yet we
succeed in routing with high probability through paths very close in distance
to the shortest ones.
| [
{
"version": "v1",
"created": "Wed, 18 Jan 2006 21:21:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Carmi",
"Shai",
""
],
[
"Cohen",
"Reuven",
""
],
[
"Dolev",
"Danny",
""
]
]
|
cs/0601084 | Robert Schweller | Ming-Yang Kao, Manan Sanghi, Robert Schweller | Randomized Fast Design of Short DNA Words | null | Proceedings of the 32nd International Colloquium on Automata,
Languages and Programming (ICALP 2005), Lisboa, Portugal, July 11-15, 2005,
pp. 1275-1286 | null | null | cs.DS | null | We consider the problem of efficiently designing sets (codes) of equal-length
DNA strings (words) that satisfy certain combinatorial constraints. This
problem has numerous motivations including DNA computing and DNA self-assembly.
Previous work has extended results from coding theory to obtain bounds on code
size for new biologically motivated constraints and has applied heuristic local
search and genetic algorithm techniques for code design. This paper proposes a
natural optimization formulation of the DNA code design problem in which the
goal is to design n strings that satisfy a given set of constraints while
minimizing the length of the strings. For multiple sets of constraints, we
provide high-probability algorithms that run in time polynomial in n and any
given constraint parameters, and output strings of length within a constant
factor of the optimal. To the best of our knowledge, this work is the first to
consider this type of optimization problem in the context of DNA code design.
| [
{
"version": "v1",
"created": "Thu, 19 Jan 2006 00:22:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kao",
"Ming-Yang",
""
],
[
"Sanghi",
"Manan",
""
],
[
"Schweller",
"Robert",
""
]
]
|
cs/0601085 | Vicky Weissman | Riccardo Pucella and Vicky Weissman | A Formal Foundation for ODRL | 30 pgs, preliminary version presented at WITS-04 (Workshop on Issues
in the Theory of Security), 2004 | null | null | null | cs.LO cs.CR | null | ODRL is a popular XML-based language for stating the conditions under which
resources can be accessed legitimately. The language is described in English
and, as a result, agreements written in ODRL are open to interpretation. To
address this problem, we propose a formal semantics for a representative
fragment of the language. We use this semantics to determine precisely when a
permission is implied by a set of ODRL statements and show that answering such
questions is a decidable NP-hard problem. Finally, we define a tractable
fragment of ODRL that is also fairly expressive.
| [
{
"version": "v1",
"created": "Thu, 19 Jan 2006 02:41:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
],
[
"Weissman",
"Vicky",
""
]
]
|
cs/0601086 | Stephen Cook | Stephen Cook | Comments on Beckmann's Uniform Reducts | null | null | null | null | cs.CC | null | Arnold Beckmann defined the uniform reduct of a propositional proof system f
to be the set of those bounded arithmetical formulas whose propositional
translations have polynomial size f-proofs. We prove that the uniform reduct of
f + Extended Frege consists of all true bounded arithmetical formulas iff f +
Extended Frege simulates every proof system.
| [
{
"version": "v1",
"created": "Thu, 19 Jan 2006 22:56:49 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jan 2006 18:08:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cook",
"Stephen",
""
]
]
|
cs/0601087 | Victor Kromer | Kromer Victor | Processing of Test Matrices with Guessing Correction | 10 pages, in Russian | null | null | null | cs.LG | null | It is suggested to insert into test matrix 1s for correct responses, 0s for
response refusals, and negative corrective elements for incorrect responses.
With the classical test theory approach test scores of examinees and items are
calculated traditionally as sums of matrix elements, organized in rows and
columns. Correlation coefficients are estimated using correction coefficients.
In item response theory approach examinee and item logits are estimated using
maximum likelihood method and probabilities of all matrix elements.
| [
{
"version": "v1",
"created": "Fri, 20 Jan 2006 05:40:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Victor",
"Kromer",
""
]
]
|
cs/0601096 | Nicolas Tabareau | Deepak D'Souza, Nicolas Tabareau (PPS) | On timed automata with input-determined guards | null | null | null | null | cs.LO | null | We consider a general notion of timed automata with input-determined guards
and show that they admit a robust logical framework along the lines of [D
'Souza03], in terms of a monadic second order logic characterisation and an
expressively complete timed temporal logic. We then generalize these automata
using the notion of recursive operators introduced by Henzinger, Raskin, and
Schobbens, and show that they admit a similar logical framework. These results
hold in the ``pointwise'' semantics. We finally use this framework to show that
the real-time logic MITL of Alur et al is expressively complete with respect to
an MSO corresponding to an appropriate input-determined operator.
| [
{
"version": "v1",
"created": "Mon, 23 Jan 2006 10:45:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"D'Souza",
"Deepak",
"",
"PPS"
],
[
"Tabareau",
"Nicolas",
"",
"PPS"
]
]
|
cs/0601097 | B.S.Shajee Mohan | B.S. Shajeemohan, Dr. V.K. Govindan | Compression Scheme for Faster and Secure Data Transmission Over Internet | null | null | null | null | cs.PF cs.DC | null | Compression algorithms reduce the redundancy in data representation to
decrease the storage required for that data. Data compression offers an
attractive approach to reducing communication costs by using available
bandwidth effectively. Over the last decade there has been an unprecedented
explosion in the amount of digital data transmitted via the Internet,
representing text, images, video, sound, computer programs, etc. With this
trend expected to continue, it makes sense to pursue research on developing
algorithms that can most effectively use available network bandwidth by
maximally compressing data. It is also important to consider the security
aspects of the data being transmitted while compressing it, as most of the text
data transmitted over the Internet is very much vulnerable to a multitude of
attacks. This paper is focused on addressing this problem of lossless
compression of text files with an added security.
| [
{
"version": "v1",
"created": "Mon, 23 Jan 2006 11:47:06 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Jan 2006 03:33:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shajeemohan",
"B. S.",
""
],
[
"Govindan",
"Dr. V. K.",
""
]
]
|
cs/0601100 | Luca Trevisan | Luca Trevisan | Pseudorandomness and Combinatorial Constructions | Submitted to the Proceedings of ICM'06, Madrid | null | null | null | cs.CC math.CO | null | In combinatorics, the probabilistic method is a very powerful tool to prove
the existence of combinatorial objects with interesting and useful properties.
Explicit constructions of objects with such properties are often very
difficult, or unknown. In computer science, probabilistic algorithms are
sometimes simpler and more efficient than the best known deterministic
algorithms for the same problem.
Despite this evidence for the power of random choices, the computational
theory of pseudorandomness shows that, under certain complexity-theoretic
assumptions, every probabilistic algorithm has an efficient deterministic
simulation and a large class of applications of the the probabilistic method
can be converted into explicit constructions.
In this survey paper we describe connections between the conditional
``derandomization'' results of the computational theory of pseudorandomness and
unconditional explicit constructions of certain combinatorial objects such as
error-correcting codes and ``randomness extractors.''
| [
{
"version": "v1",
"created": "Mon, 23 Jan 2006 19:24:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Trevisan",
"Luca",
""
]
]
|
cs/0601103 | Philipp Mayr | Philipp Mayr, Fabio Tosques | Google Web APIs - an Instrument for Webometric Analyses? | 2 pages, 2 figures, 10th International Conference of the
International Society for Scientometrics and Informetrics | null | null | null | cs.IR | null | This paper introduces Google Web APIs (Google APIs) as an instrument and
playground for webometric studies. Several examples of Google APIs
implementations are given. Our examples show that this Google Web Service can
be used successfully for informetric Internet based studies albeit with some
restrictions.
| [
{
"version": "v1",
"created": "Tue, 24 Jan 2006 10:23:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mayr",
"Philipp",
""
],
[
"Tosques",
"Fabio",
""
]
]
|
cs/0601105 | Vassilios Vassiliadis | Vassilios S. Vassiliadis | The Perceptron Algorithm: Image and Signal Decomposition, Compression,
and Analysis by Iterative Gaussian Blurring | null | null | null | null | cs.CV | null | A novel algorithm for tunable compression to within the precision of
reproduction targets, or storage, is proposed. The new algorithm is termed the
`Perceptron Algorithm', which utilises simple existing concepts in a novel way,
has multiple immediate commercial application aspects as well as it opens up a
multitude of fronts in computational science and technology. The aims of this
paper are to present the concepts underlying the algorithm, observations by its
application to some example cases, and the identification of a multitude of
potential areas of applications such as: image compression by orders of
magnitude, signal compression including sound as well, image analysis in a
multilayered detailed analysis, pattern recognition and matching and rapid
database searching (e.g. face recognition), motion analysis, biomedical
applications e.g. in MRI and CAT scan image analysis and compression, as well
as hints on the link of these ideas to the way how biological memory might work
leading to new points of view in neural computation. Commercial applications of
immediate interest are the compression of images at the source (e.g.
photographic equipment, scanners, satellite imaging systems), DVD film
compression, pay-per-view downloads acceleration and many others identified in
the present paper at its conclusion and future work section.
| [
{
"version": "v1",
"created": "Tue, 24 Jan 2006 17:23:17 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jan 2006 10:40:53 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Jan 2006 08:42:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vassiliadis",
"Vassilios S.",
""
]
]
|
cs/0601106 | Vassilios Vassiliadis | Vassilios S. Vassiliadis | The `Face on Mars': a photographic approach for the search of signs of
past civilizations from a macroscopic point of view, factoring long-term
erosion in image reconstruction | 9 pages | null | null | null | cs.CV | null | This short article presents an alternative view of high resolution imaging
from various sources with the aim of the discovery of potential sites of
archaeological importance, or sites that exhibit `anomalies' such that they may
merit closer inspection and analysis. It is conjectured, and to a certain
extent demonstrated here, that it is possible for advanced civilizations to
factor in erosion by natural processes into a large scale design so that main
features be preserved even with the passage of millions of years. Alternatively
viewed, even without such intent embedded in a design left for posterity, it is
possible that a gigantic construction may naturally decay in such a way that
even cataclysmic (massive) events may leave sufficient information intact with
the passage of time, provided one changes the point of view from high
resolution images to enhanced blurred renderings of the sites in question.
| [
{
"version": "v1",
"created": "Tue, 24 Jan 2006 18:12:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vassiliadis",
"Vassilios S.",
""
]
]
|
cs/0601108 | Alain Lifchitz | Alain Lifchitz, Frederic Maire and Dominique Revuz | Fast Lexically Constrained Viterbi Algorithm (FLCVA): Simultaneous
Optimization of Speed and Memory | 5 pages, 2 figures, 4 tables | null | null | null | cs.CV cs.AI cs.DS | null | Lexical constraints on the input of speech and on-line handwriting systems
improve the performance of such systems. A significant gain in speed can be
achieved by integrating in a digraph structure the different Hidden Markov
Models (HMM) corresponding to the words of the relevant lexicon. This
integration avoids redundant computations by sharing intermediate results
between HMM's corresponding to different words of the lexicon. In this paper,
we introduce a token passing method to perform simultaneously the computation
of the a posteriori probabilities of all the words of the lexicon. The coding
scheme that we introduce for the tokens is optimal in the information theory
sense. The tokens use the minimum possible number of bits. Overall, we optimize
simultaneously the execution speed and the memory requirement of the
recognition systems.
| [
{
"version": "v1",
"created": "Wed, 25 Jan 2006 17:50:13 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Feb 2006 13:05:36 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Feb 2006 23:00:28 GMT"
},
{
"version": "v4",
"created": "Sun, 19 Mar 2006 16:40:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lifchitz",
"Alain",
""
],
[
"Maire",
"Frederic",
""
],
[
"Revuz",
"Dominique",
""
]
]
|
cs/0601111 | Ted Herman | Chen Zhang, Ted Herman | Localization in Wireless Sensor Grids | 17 pages, 6 figures | null | null | TR01-06 | cs.DC | null | This work reports experiences on using radio ranging to position sensors in a
grid topology. The implementation is simple, efficient, and could be
practically distributed. The paper describes an implementation and experimental
result based on RSSI distance estimation. Novel techniques such as fuzzy
membership functions and table lookup are used to obtain more accurate result
and simplify the computation. An 86% accuracy is achieved in the experiment in
spite of inaccurate RSSI distance estimates with errors up to 60%.
| [
{
"version": "v1",
"created": "Wed, 25 Jan 2006 23:48:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhang",
"Chen",
""
],
[
"Herman",
"Ted",
""
]
]
|
cs/0601117 | Prashant Singh | Dhananjay D. Kulkarni, Shekhar Verma, Prashant | Finding Cliques of a Graph using Prime Numbers | 7 pages, 1 figure | null | null | null | cs.DS | null | This paper proposes a new algorithm for solving maximal cliques for simple
undirected graphs using the theory of prime numbers. A novel approach using
prime numbers is used to find cliques and ends with a discussion of the
algorithm.
| [
{
"version": "v1",
"created": "Fri, 27 Jan 2006 20:11:14 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jan 2007 22:48:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kulkarni",
"Dhananjay D.",
""
],
[
"Verma",
"Shekhar",
""
],
[
"Prashant",
"",
""
]
]
|
cs/0601118 | Richard McClatchey | David Manset, Herve Verjus, Richard McClatchey, Flavio Oquendo | A Formal Architecture-Centric Model-Driven Approach for the Automatic
Generation of Grid Applications | 11 pages, 9 figures. Proc of the 8th International Conference on
Enterprise Information Systems (ICEIS06) Paphos, Cyprus. May 2006 | null | null | null | cs.SE | null | This paper discusses the concept of model-driven software engineering applied
to the Grid application domain. As an extension to this concept, the approach
described here, attempts to combine both formal architecture-centric and
model-driven paradigms. It is a commonly recognized statement that Grid systems
have seldom been designed using formal techniques although from past experience
such techniques have shown advantages. This paper advocates a formal
engineering approach to Grid system developments in an effort to contribute to
the rigorous development of Grids software architectures. This approach
addresses quality of service and cross-platform developments by applying the
model-driven paradigm to a formal architecture-centric engineering method. This
combination benefits from a formal semantic description power in addition to
model-based transformations. The result of such a novel combined concept
promotes the re-use of design models and facilitates developments in Grid
computing.
| [
{
"version": "v1",
"created": "Sat, 28 Jan 2006 00:08:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Manset",
"David",
""
],
[
"Verjus",
"Herve",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Oquendo",
"Flavio",
""
]
]
|
cs/0601119 | Richard McClatchey | Haya El-Ghalayini, Mohammed Odeh, & Richard McClatchey | Engineering Conceptual Data Models from Domain Ontologies: A Critical
Evaluation | 12 pages, 3 figures, presented at the 4th International Conference on
Computer Science and Information Technology (CSIT'06). Amman Jordan April
2006 | null | null | null | cs.SE | null | This paper studies the differences and similarities between domain ontologies
and conceptual data models and the role that ontologies can play in
establishing conceptual data models during the process of information systems
development. A mapping algorithm has been proposed and embedded in a special
purpose Transformation Engine to generate a conceptual data model from a given
domain ontology. Both quantitative and qualitative methods have been adopted to
critically evaluate this new approach. In addition, this paper focuses on
evaluating the quality of the generated conceptual data model elements using
Bunge-Wand-Weber and OntoClean ontologies. The results of this evaluation
indicate that the generated conceptual data model provides a high degree of
accuracy in identifying the substantial domain entities along with their
attributes and relationships being derived from the consensual semantics of
domain knowledge. The results are encouraging and support the potential role
that this approach can take part in process of information system development.
| [
{
"version": "v1",
"created": "Sat, 28 Jan 2006 17:40:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"El-Ghalayini",
"Haya",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
]
]
|
cs/0601121 | Marko Antonio Rodriguez | Marko A. Rodriguez | A Multi-Relational Network to Support the Scholarly Communication
Process | keywords: digital libraries and scholarly communication | International Journal of Public Information Systems, volume 2007,
issue 1, pp. 13-29 | null | LA-UR-06-2416 | cs.DL cs.AI cs.IR | null | The general pupose of the scholarly communication process is to support the
creation and dissemination of ideas within the scientific community. At a finer
granularity, there exists multiple stages which, when confronted by a member of
the community, have different requirements and therefore different solutions.
In order to take a researcher's idea from an initial inspiration to a community
resource, the scholarly communication infrastructure may be required to 1)
provide a scientist initial seed ideas; 2) form a team of well suited
collaborators; 3) located the most appropriate venue to publish the formalized
idea; 4) determine the most appropriate peers to review the manuscript; and 5)
disseminate the end product to the most interested members of the community.
Through the various delinieations of this process, the requirements of each
stage are tied soley to the multi-functional resources of the community: its
researchers, its journals, and its manuscritps. It is within the collection of
these resources and their inherent relationships that the solutions to
scholarly communication are to be found. This paper describes an associative
network composed of multiple scholarly artifacts that can be used as a medium
for supporting the scholarly communication process.
| [
{
"version": "v1",
"created": "Sat, 28 Jan 2006 22:45:42 GMT"
},
{
"version": "v2",
"created": "Mon, 21 May 2007 13:35:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
]
|
cs/0601125 | Carl Lagoze | Carl Lagoze, Dean Krafft, Tim Cornwell, Naomi Dushay, Dean Eckstrom,
and John Saylor | Metadata aggregation and "automated digital libraries": A retrospective
on the NSDL experience | Submission to JCDL 2006 | null | null | null | cs.DL | null | Over three years ago, the Core Integration team of the National Science
Digital Library (NSDL) implemented a digital library based on metadata
aggregation using Dublin Core and OAI-PMH. The initial expectation was that
such low-barrier technologies would be relatively easy to automate and
administer. While this architectural choice permitted rapid deployment of a
production NSDL, our three years of experience have contradicted our original
expectations of easy automation and low people cost. We have learned that
alleged "low-barrier" standards are often harder to deploy than expected. In
this paper we report on this experience and comment on the general cost, the
functionality, and the ultimate effectiveness of this architecture.
| [
{
"version": "v1",
"created": "Mon, 30 Jan 2006 12:26:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Krafft",
"Dean",
""
],
[
"Cornwell",
"Tim",
""
],
[
"Dushay",
"Naomi",
""
],
[
"Eckstrom",
"Dean",
""
],
[
"Saylor",
"John",
""
]
]
|
cs/0601129 | Abhilash Ponnath | Abhilash Ponnath | Instantaneously Trained Neural Networks | 13 pages | null | null | null | cs.NE cs.AI | null | This paper presents a review of instantaneously trained neural networks
(ITNNs). These networks trade learning time for size and, in the basic model, a
new hidden node is created for each training sample. Various versions of the
corner-classification family of ITNNs, which have found applications in
artificial intelligence (AI), are described. Implementation issues are also
considered.
| [
{
"version": "v1",
"created": "Mon, 30 Jan 2006 22:02:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ponnath",
"Abhilash",
""
]
]
|
cs/0602001 | Lane A. Hemaspaandra | Lane A. Hemaspaandra and Mayur Thakur | Query-Monotonic Turing Reductions | null | null | null | URCS-TR-818 | cs.CC | null | We study reductions that limit the extreme adaptivity of Turing reductions.
In particular, we study reductions that make a rapid, structured progression
through the set to which they are reducing: Each query is strictly longer
(shorter) than the previous one. We call these reductions query-increasing
(query-decreasing) Turing reductions. We also study query-nonincreasing
(query-nondecreasing) Turing reductions. These are Turing reductions in which
the sequence of query lengths is nonincreasing (nondecreasing). We ask whether
these restrictions in fact limit the power of reductions. We prove that
query-increasing and query-decreasing Turing reductions are incomparable with
(that is, are neither strictly stronger than nor strictly weaker than)
truth-table reductions and are strictly weaker than Turing reductions. In
addition, we prove that query-nonincreasing and query-nondecreasing Turing
reductions are strictly stronger than truth-table reductions and strictly
weaker than Turing reductions. Despite the fact that we prove query-increasing
and query-decreasing Turing reductions to in the general case be strictly
weaker than Turing reductions, we identify a broad class of sets A for which
any set that Turing reduces to A will also reduce to A via both
query-increasing and query-decreasing Turing reductions. In particular, this
holds for all tight paddable sets, where a set is said to be tight paddable
exactly if it is paddable via a function whose output length is bounded tightly
both from above and from below in the length of the input. We prove that many
natural NP-complete problems such as satisfiability, clique, and vertex cover
are tight paddable.
| [
{
"version": "v1",
"created": "Tue, 31 Jan 2006 22:02:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Thakur",
"Mayur",
""
]
]
|
cs/0602003 | Subhash Kak | Navneet Mandhani and Subhash Kak | Watermarking Using Decimal Sequences | 8 pages, 9 figures | Cryptologia, vol. 29, pp. 50-58, 2005 | null | null | cs.CR | null | This paper introduces the use of decimal sequences in a code division
multiple access (CDMA) based watermarking system to hide information for
authentication in black and white images. Matlab version 6.5 was used to
implement the algorithms discussed in this paper. The advantage of using
d-sequences over PN sequences is that one can choose from a variety of prime
numbers which provides a more flexible system.
| [
{
"version": "v1",
"created": "Thu, 2 Feb 2006 19:43:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mandhani",
"Navneet",
""
],
[
"Kak",
"Subhash",
""
]
]
|
cs/0602004 | Christoph Koch | Georg Gottlob, Christoph Koch, Klaus U. Schulz | Conjunctive Queries over Trees | 36 pages, 12 figures, 2 tables, long version of PODS 2004 papers. To
appear in Journal of the ACM 53(2), March 2006 | null | null | null | cs.DB cs.AI cs.CC cs.LO | null | We study the complexity and expressive power of conjunctive queries over
unranked labeled trees represented using a variety of structure relations such
as ``child'', ``descendant'', and ``following'' as well as unary relations for
node labels. We establish a framework for characterizing structures
representing trees for which conjunctive queries can be evaluated efficiently.
Then we completely chart the tractability frontier of the problem and establish
a dichotomy theorem for our axis relations, i.e., we find all subset-maximal
sets of axes for which query evaluation is in polynomial time and show that for
all other cases, query evaluation is NP-complete. All polynomial-time results
are obtained immediately using the proof techniques from our framework.
Finally, we study the expressiveness of conjunctive queries over trees and show
that for each conjunctive query, there is an equivalent acyclic positive query
(i.e., a set of acyclic conjunctive queries), but that in general this query is
not of polynomial size.
| [
{
"version": "v1",
"created": "Thu, 2 Feb 2006 23:28:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gottlob",
"Georg",
""
],
[
"Koch",
"Christoph",
""
],
[
"Schulz",
"Klaus U.",
""
]
]
|
cs/0602008 | Julio Mari\~no | Julio Marino, Angel Herranz and Juan Jose Moreno-Navarro | Demand Analysis with Partial Predicates | This is the extended version of a paper accepted for publication in a
forthcoming special issue of Theory and Practice of Logic Programming on
Multiparadigm and Constraint Programming (Falaschi and Maher, eds.)
Appendices are missing in the printed version | null | null | null | cs.PL cs.SC | null | In order to alleviate the inefficiencies caused by the interaction of the
logic and functional sides, integrated languages may take advantage of
\emph{demand} information -- i.e. knowing in advance which computations are
needed and, to which extent, in a particular context. This work studies
\emph{demand analysis} -- which is closely related to \emph{backwards
strictness analysis} -- in a semantic framework of \emph{partial predicates},
which in turn are constructive realizations of ideals in a domain. This will
allow us to give a concise, unified presentation of demand analysis, to relate
it to other analyses based on abstract interpretation or strictness logics,
some hints for the implementation, and, more important, to prove the soundness
of our analysis based on \emph{demand equations}. There are also some
innovative results. One of them is that a set constraint-based analysis has
been derived in a stepwise manner using ideas taken from the area of program
transformation. The other one is the possibility of using program
transformation itself to perform the analysis, specially in those domains of
properties where algorithms based on constraint solving are too weak.
| [
{
"version": "v1",
"created": "Sat, 4 Feb 2006 20:22:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Marino",
"Julio",
""
],
[
"Herranz",
"Angel",
""
],
[
"Moreno-Navarro",
"Juan Jose",
""
]
]
|
cs/0602010 | Robert Schweller | Ming-Yang Kao, Robert Schweller | Reducing Tile Complexity for Self-Assembly Through Temperature
Programming | A preliminary version of this paper appeared in Proceedings of the
17th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2006), Miami,
Florida, Jan. 2006 | null | null | null | cs.CC | null | We consider the tile self-assembly model and how tile complexity can be
eliminated by permitting the temperature of the self-assembly system to be
adjusted throughout the assembly process. To do this, we propose novel
techniques for designing tile sets that permit an arbitrary length $m$ binary
number to be encoded into a sequence of $O(m)$ temperature changes such that
the tile set uniquely assembles a supertile that precisely encodes the
corresponding binary number. As an application, we show how this provides a
general tile set of size O(1) that is capable of uniquely assembling
essentially any $n\times n$ square, where the assembled square is determined by
a temperature sequence of length $O(\log n)$ that encodes a binary description
of $n$. This yields an important decrease in tile complexity from the required
$\Omega(\frac{\log n}{\log\log n})$ for almost all $n$ when the temperature of
the system is fixed. We further show that for almost all $n$, no tile system
can simultaneously achieve both $o(\log n)$ temperature complexity and
$o(\frac{\log n}{\log\log n})$ tile complexity, showing that both versions of
an optimal square building scheme have been discovered. This work suggests that
temperature change can constitute a natural, dynamic method for providing input
to self-assembly systems that is potentially superior to the current technique
of designing large tile sets with specific inputs hardwired into the tileset.
| [
{
"version": "v1",
"created": "Sun, 5 Feb 2006 01:00:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kao",
"Ming-Yang",
""
],
[
"Schweller",
"Robert",
""
]
]
|
cs/0602013 | David Pritchard | David Pritchard | An Optimal Distributed Edge-Biconnectivity Algorithm | Submitted to PODC 2006. Contains a pstricks figure | null | null | null | cs.DC | null | We describe a synchronous distributed algorithm which identifies the
edge-biconnected components of a connected network. It requires a leader, and
uses messages of size O(log |V|). The main idea is to preorder a BFS spanning
tree, and then to efficiently compute least common ancestors so as to mark
cycle edges. This algorithm takes O(Diam) time and uses O(|E|) messages.
Furthermore, we show that no correct singly-initiated edge-biconnectivity
algorithm can beat either bound on any graph by more than a constant factor. We
also describe a near-optimal local algorithm for edge-biconnectivity.
| [
{
"version": "v1",
"created": "Sun, 5 Feb 2006 20:47:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pritchard",
"David",
""
]
]
|
cs/0602018 | Jiyou Jia Dr. | Jiyou Jia, Shufen Hou, Weichao Chen | Improving the CSIEC Project and Adapting It to the English Teaching and
Learning in China | null | null | null | null | cs.CY cs.AI cs.CL cs.HC cs.MA | null | In this paper after short review of the CSIEC project initialized by us in
2003 we present the continuing development and improvement of the CSIEC project
in details, including the design of five new Microsoft agent characters
representing different virtual chatting partners and the limitation of
simulated dialogs in specific practical scenarios like graduate job application
interview, then briefly analyze the actual conditions and features of its
application field: web-based English education in China. Finally we introduce
our efforts to adapt this system to the requirements of English teaching and
learning in China and point out the work next to do.
| [
{
"version": "v1",
"created": "Mon, 6 Feb 2006 15:17:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jia",
"Jiyou",
""
],
[
"Hou",
"Shufen",
""
],
[
"Chen",
"Weichao",
""
]
]
|
cs/0602019 | Nie Nie | Nie Nie and Cristina Comaniciu | Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio
Networks | ACM MONET (Mobile Networks and Applications), special issue on
"Reconfigurable Radio Technologies in Support of Ubiquitous Seamless
Computing" | null | null | null | cs.GT | null | In this work, we propose a game theoretic framework to analyze the behavior
of cognitive radios for distributed adaptive channel allocation. We define two
different objective functions for the spectrum sharing games, which capture the
utility of selfish users and cooperative users, respectively. Based on the
utility definition for cooperative users, we show that the channel allocation
problem can be formulated as a potential game, and thus converges to a
deterministic channel allocation Nash equilibrium point. Alternatively, a
no-regret learning implementation is proposed for both scenarios and it is
shown to have similar performance with the potential game when cooperation is
enforced, but with a higher variability across users. The no-regret learning
formulation is particularly useful to accommodate selfish users.
Non-cooperative learning games have the advantage of a very low overhead for
information exchange in the network.
We show that cooperation based spectrum sharing etiquette improves the
overall network performance at the expense of an increased overhead required
for information exchange.
| [
{
"version": "v1",
"created": "Tue, 7 Feb 2006 00:25:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nie",
"Nie",
""
],
[
"Comaniciu",
"Cristina",
""
]
]
|
cs/0602025 | Gianluca Argentini | Gianluca Argentini | On local symbolic approximation and resolution of ODEs using Implicit
Function Theorem | 12 pages, 2 figures; keywords: ordinary differential equations,
implicit function theorem, local solutions, symbolic solutions, cavitation | null | null | null | cs.NA math.CA physics.comp-ph | null | In this work the implicit function theorem is used for searching local
symbolic resolution of differential equations. General results of existence for
first order equations are proven and some examples, one relative to cavitation
in a fluid, are developed. These examples seem to show that local approximation
of non linear differential equations can give useful informations about
symbolic form of possible solutions, and in the case a global solution is
known, locally the accuracy of approximation can be good.
| [
{
"version": "v1",
"created": "Tue, 7 Feb 2006 11:44:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
]
|
cs/0602026 | Richard McClatchey | Ashiq Anjum, Richard McClatchey, Arshad Ali & Ian Willers | Bulk Scheduling with DIANA Scheduler | 4 pages, 5 figures. Accepted by the Computing for High Energy Physics
Conference. Mumbai, Indai. February 2006 | null | null | null | cs.DC | null | Results from and progress on the development of a Data Intensive and Network
Aware (DIANA) Scheduling engine, primarily for data intensive sciences such as
physics analysis, are described. Scientific analysis tasks can involve
thousands of computing, data handling, and network resources and the size of
the input and output files and the amount of overall storage space allocated to
a user necessarily can have significant bearing on the scheduling of data
intensive applications. If the input or output files must be retrieved from a
remote location, then the time required transferring the files must also be
taken into consideration when scheduling compute resources for the given
application. The central problem in this study is the coordinated management of
computation and data at multiple locations and not simply data movement.
However, this can be a very costly operation and efficient scheduling can be a
challenge if compute and data resources are mapped without network cost. We
have implemented an adaptive algorithm within the DIANA Scheduler which takes
into account data location and size, network performance and computation
capability to make efficient global scheduling decisions. DIANA is a
performance-aware as well as an economy-guided Meta Scheduler. It iteratively
allocates each job to the site that is likely to produce the best performance
as well as optimizing the global queue for any remaining pending jobs.
Therefore it is equally suitable whether a single job is being submitted or
bulk scheduling is being performed. Results suggest that considerable
performance improvements are to be gained by adopting the DIANA scheduling
approach.
| [
{
"version": "v1",
"created": "Tue, 7 Feb 2006 16:47:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Anjum",
"Ashiq",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Ali",
"Arshad",
""
],
[
"Willers",
"Ian",
""
]
]
|
cs/0602027 | Krzysztof R. Apt | Krzysztof R. Apt | Explaining Constraint Programming | 15 pages, appeared in "Processes, Terms and Cycles: Steps on the Road
to Infinity", (A. Middeldorp, V. van Oostrom, F. van Raamsdonk, R. de Vrijer,
eds.), LNCS 3838, pp. 55-69. (2005) | null | null | null | cs.PL cs.AI | null | We discuss here constraint programming (CP) by using a proof-theoretic
perspective. To this end we identify three levels of abstraction. Each level
sheds light on the essence of CP.
In particular, the highest level allows us to bring CP closer to the
computation as deduction paradigm. At the middle level we can explain various
constraint propagation algorithms. Finally, at the lowest level we can address
the issue of automatic generation and optimization of the constraint
propagation algorithms.
| [
{
"version": "v1",
"created": "Tue, 7 Feb 2006 15:19:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
]
|
cs/0602031 | Wit Jakuczun | Wit Jakuczun | Classifying Signals with Local Classifiers | null | null | null | null | cs.AI | null | This paper deals with the problem of classifying signals. The new method for
building so called local classifiers and local features is presented. The
method is a combination of the lifting scheme and the support vector machines.
Its main aim is to produce effective and yet comprehensible classifiers that
would help in understanding processes hidden behind classified signals. To
illustrate the method we present the results obtained on an artificial and a
real dataset.
| [
{
"version": "v1",
"created": "Wed, 8 Feb 2006 11:38:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jakuczun",
"Wit",
""
]
]
|
cs/0602037 | Elisa Gorla | J. J. Climent, E. Gorla, J. Rosenthal | Cryptanalysis of the CFVZ cryptosystem | 12 pages | null | null | null | cs.CR | null | The paper analyzes a new public key cryptosystem whose security is based on a
matrix version of the discrete logarithm problem over an elliptic curve. It is
shown that the complexity of solving the underlying problem for the proposed
system is dominated by the complexity of solving a fixed number of discrete
logarithm problems in the group of an elliptic curve. Using an adapted Pollard
rho algorithm it is shown that this problem is essentially as hard as solving
one discrete logarithm problem in the group of an elliptic curve.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2006 08:40:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Climent",
"J. J.",
""
],
[
"Gorla",
"E.",
""
],
[
"Rosenthal",
"J.",
""
]
]
|
cs/0602038 | Gregory Gutin | G. Gutin, P. Hell, A. Rafiey, A. Yeo | Minimum Cost Homomorphisms to Proper Interval Graphs and Bigraphs | null | null | null | null | cs.DM cs.AI | null | For graphs $G$ and $H$, a mapping $f: V(G)\dom V(H)$ is a homomorphism of $G$
to $H$ if $uv\in E(G)$ implies $f(u)f(v)\in E(H).$ If, moreover, each vertex $u
\in V(G)$ is associated with costs $c_i(u), i \in V(H)$, then the cost of the
homomorphism $f$ is $\sum_{u\in V(G)}c_{f(u)}(u)$. For each fixed graph $H$, we
have the {\em minimum cost homomorphism problem}, written as MinHOM($H)$. The
problem is to decide, for an input graph $G$ with costs $c_i(u),$ $u \in V(G),
i\in V(H)$, whether there exists a homomorphism of $G$ to $H$ and, if one
exists, to find one of minimum cost. Minimum cost homomorphism problems
encompass (or are related to) many well studied optimization problems. We
describe a dichotomy of the minimum cost homomorphism problems for graphs $H$,
with loops allowed. When each connected component of $H$ is either a reflexive
proper interval graph or an irreflexive proper interval bigraph, the problem
MinHOM($H)$ is polynomial time solvable. In all other cases the problem
MinHOM($H)$ is NP-hard. This solves an open problem from an earlier paper.
Along the way, we prove a new characterization of the class of proper interval
bigraphs.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2006 09:39:36 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Feb 2006 15:36:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Hell",
"P.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
]
|
cs/0602039 | Andrei Arion | Andrei Arion (INRIA Futurs), Angela Bonifati, Ioana Manolescu (INRIA
Futurs), Andrea Pugliese | Path Summaries and Path Partitioning in Modern XML Databases | null | null | null | null | cs.DB | null | We study the applicability of XML path summaries in the context of
current-day XML databases. We find that summaries provide an excellent basis
for optimizing data access methods, which furthermore mixes very well with
path-partitioned stores. We provide practical algorithms for building and
exploiting summaries, and prove its benefits through extensive experiments.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2006 12:21:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Arion",
"Andrei",
"",
"INRIA Futurs"
],
[
"Bonifati",
"Angela",
"",
"INRIA\n Futurs"
],
[
"Manolescu",
"Ioana",
"",
"INRIA\n Futurs"
],
[
"Pugliese",
"Andrea",
""
]
]
|
cs/0602042 | Wojciech Mazurczyk | Wojciech Mazurczyk, Zbigniew Kotulski | New security and control protocol for VoIP based on steganography and
digital watermarking | 8 pages, 4 figures, 1 table | Annales UMCS, Informatica, AI 4 (2006), ISNN 1732-1360 | null | null | cs.CR cs.MM | null | In this paper new security and control protocol for Voice over Internet
Protocol (VoIP) service is presented. It is the alternative for the IETF's
(Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for
real-time application's traffic. Additionally this solution offers
authentication and integrity, it is capable of exchanging and verifying QoS and
security parameters. It is based on digital watermarking and steganography that
is why it does not consume additional bandwidth and the data transmitted is
inseparably bound to the voice content.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2006 22:49:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Kotulski",
"Zbigniew",
""
]
]
|
cs/0602043 | Shanghua Teng | Xi Chen, Xiaotie Deng and Shang-Hua Teng | Computing Nash Equilibria: Approximation and Smoothed Complexity | null | null | null | null | cs.CC cs.GT | null | We show that the BIMATRIX game does not have a fully polynomial-time
approximation scheme, unless PPAD is in P. In other words, no algorithm with
time polynomial in n and 1/\epsilon can compute an \epsilon-approximate Nash
equilibrium of an n by nbimatrix game, unless PPAD is in P. Instrumental to our
proof, we introduce a new discrete fixed-point problem on a high-dimensional
cube with a constant side-length, such as on an n-dimensional cube with
side-length 7, and show that they are PPAD-complete. Furthermore, we prove,
unless PPAD is in RP, that the smoothed complexity of the Lemke-Howson
algorithm or any algorithm for computing a Nash equilibrium of a bimatrix game
is polynomial in n and 1/\sigma under perturbations with magnitude \sigma. Our
result answers a major open question in the smoothed analysis of algorithms and
the approximation of Nash equilibria.
| [
{
"version": "v1",
"created": "Sat, 11 Feb 2006 22:46:55 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Feb 2006 00:18:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"Xi",
""
],
[
"Deng",
"Xiaotie",
""
],
[
"Teng",
"Shang-Hua",
""
]
]
|
cs/0602044 | Prasanta K. Panigrahi | Siddharth Arora, Jayadev Acharya, Amit Verma, Prasanta K. Panigrahi | Multilevel Thresholding for Image Segmentation through a Fast
Statistical Recursive Algorithm | 9 pages, 3 figures | null | null | null | cs.CV | null | A novel algorithm is proposed for segmenting an image into multiple levels
using its mean and variance. Starting from the extreme pixel values at both
ends of the histogram plot, the algorithm is applied recursively on sub-ranges
computed from the previous step, so as to find a threshold level and a new
sub-range for the next step, until no significant improvement in image quality
can be achieved. The method makes use of the fact that a number of
distributions tend towards Dirac delta function, peaking at the mean, in the
limiting condition of vanishing variance. The procedure naturally provides for
variable size segmentation with bigger blocks near the extreme pixel values and
finer divisions around the mean or other chosen value for better visualization.
Experiments on a variety of images show that the new algorithm effectively
segments the image in computationally very less time.
| [
{
"version": "v1",
"created": "Sun, 12 Feb 2006 18:22:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Arora",
"Siddharth",
""
],
[
"Acharya",
"Jayadev",
""
],
[
"Verma",
"Amit",
""
],
[
"Panigrahi",
"Prasanta K.",
""
]
]
|
cs/0602045 | Russ Abbott | Russ Abbott | Emergence Explained | 67 pages. Earlier versions presented at Lake ArrowHead conference on
human complex systems (2005), GECCO 2005 workshop on Biological Applications
of Genetic and Evolutionary Computation, and Symposium on Understanding
Complex Systems (2005) | null | null | null | cs.MA cs.DC cs.GL | null | Emergence (macro-level effects from micro-level causes) is at the heart of
the conflict between reductionism and functionalism. How can there be
autonomous higher level laws of nature (the functionalist claim) if everything
can be reduced to the fundamental forces of physics (the reductionist
position)? We cut through this debate by applying a computer science lens to
the way we view nature. We conclude (a) that what functionalism calls the
special sciences (sciences other than physics) do indeed study autonomous laws
and furthermore that those laws pertain to real higher level entities but (b)
that interactions among such higher-level entities is epiphenomenal in that
they can always be reduced to primitive physical forces. In other words,
epiphenomena, which we will identify with emergent phenomena, do real
higher-level work. The proposed perspective provides a framework for
understanding many thorny issues including the nature of entities, stigmergy,
the evolution of complexity, phase transitions, supervenience, and downward
entailment. We also discuss some practical considerations pertaining to systems
of systems and the limitations of modeling.
| [
{
"version": "v1",
"created": "Sun, 12 Feb 2006 22:11:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abbott",
"Russ",
""
]
]
|
cs/0602051 | Fernando Lobo | Fernando G. Lobo, Claudio F. Lima | On the utility of the multimodal problem generator for assessing the
performance of Evolutionary Algorithms | Also UALG-ILAB Report No. 200601 | null | null | null | cs.NE | null | This paper looks in detail at how an evolutionary algorithm attempts to solve
instances from the multimodal problem generator. The paper shows that in order
to consistently reach the global optimum, an evolutionary algorithm requires a
population size that should grow at least linearly with the number of peaks. It
is also shown a close relationship between the supply and decision making
issues that have been identified previously in the context of population sizing
models for additively decomposable problems.
The most important result of the paper, however, is that solving an instance
of the multimodal problem generator is like solving a peak-in-a-haystack, and
it is argued that evolutionary algorithms are not the best algorithms for such
a task. Finally, and as opposed to what several researchers have been doing, it
is our strong belief that the multimodal problem generator is not adequate for
assessing the performance of evolutionary algorithms.
| [
{
"version": "v1",
"created": "Tue, 14 Feb 2006 10:30:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lobo",
"Fernando G.",
""
],
[
"Lima",
"Claudio F.",
""
]
]
|
cs/0602052 | Grigoriev Evgeniy | Evgeniy Grigoriev | The OverRelational Manifesto | 34 pages | null | null | null | cs.DB cs.DS | null | The OverRelational Manifesto (below ORM) proposes a possible approach to
creation of data storage systems of the next generation. ORM starts from the
requirement that information in a relational database is represented by a set
of relation values. Accordingly, it is assumed that the information about any
entity of an enterprise must also be represented as a set of relation values
(the ORM main requirement). A system of types is introduced, which allows one
to fulfill the main requirement. The data are represented in the form of
complex objects, and the state of any object is described as a set of relation
values. Emphasize that the types describing the objects are encapsulated,
inherited, and polymorphic. Then, it is shown that the data represented as a
set of such objects may also be represented as a set of relational values
defined on the set of scalar domains (dual data representation). In the general
case, any class is associated with a set of relation variables (R-variables)
each one containing some data about all objects of this class existing in the
system. One of the key points is the fact that the usage of complex (from the
user's viewpoint) refined names of R-variables and their attributes makes it
possible to preserve the semantics of complex data structures represented in
the form of a set of relation values. The most important part of the data
storage system created on the approach proposed is an object-oriented
translator operating over a relational DBMS. The expressiveness of such a
system is comparable with that of OO programming languages.
| [
{
"version": "v1",
"created": "Tue, 14 Feb 2006 12:19:08 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Feb 2006 10:28:24 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Mar 2006 09:57:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grigoriev",
"Evgeniy",
""
]
]
|
cs/0602053 | Thomas Hayes | Varsha Dani and Thomas P. Hayes | How to Beat the Adaptive Multi-Armed Bandit | null | null | null | null | cs.DS cs.LG | null | The multi-armed bandit is a concise model for the problem of iterated
decision-making under uncertainty. In each round, a gambler must pull one of
$K$ arms of a slot machine, without any foreknowledge of their payouts, except
that they are uniformly bounded. A standard objective is to minimize the
gambler's regret, defined as the gambler's total payout minus the largest
payout which would have been achieved by any fixed arm, in hindsight. Note that
the gambler is only told the payout for the arm actually chosen, not for the
unchosen arms.
Almost all previous work on this problem assumed the payouts to be
non-adaptive, in the sense that the distribution of the payout of arm $j$ in
round $i$ is completely independent of the choices made by the gambler on
rounds $1, \dots, i-1$. In the more general model of adaptive payouts, the
payouts in round $i$ may depend arbitrarily on the history of past choices made
by the algorithm.
We present a new algorithm for this problem, and prove nearly optimal
guarantees for the regret against both non-adaptive and adaptive adversaries.
After $T$ rounds, our algorithm has regret $O(\sqrt{T})$ with high probability
(the tail probability decays exponentially). This dependence on $T$ is best
possible, and matches that of the full-information version of the problem, in
which the gambler is told the payouts for all $K$ arms after each round.
Previously, even for non-adaptive payouts, the best high-probability bounds
known were $O(T^{2/3})$, due to Auer, Cesa-Bianchi, Freund and Schapire. The
expected regret of their algorithm is $O(T^{1/2}) for non-adaptive payouts, but
as we show, $\Omega(T^{2/3})$ for adaptive payouts.
| [
{
"version": "v1",
"created": "Tue, 14 Feb 2006 23:57:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dani",
"Varsha",
""
],
[
"Hayes",
"Thomas P.",
""
]
]
|
cs/0602055 | Fernando Lobo | Fernando G. Lobo, Claudio F. Lima | Revisiting Evolutionary Algorithms with On-the-Fly Population Size
Adjustment | Also UALG-ILAB Report No. 200602 | null | null | null | cs.NE | null | In an evolutionary algorithm, the population has a very important role as its
size has direct implications regarding solution quality, speed, and
reliability. Theoretical studies have been done in the past to investigate the
role of population sizing in evolutionary algorithms. In addition to those
studies, several self-adjusting population sizing mechanisms have been proposed
in the literature. This paper revisits the latter topic and pays special
attention to the genetic algorithm with adaptive population size (APGA), for
which several researchers have claimed to be very effective at autonomously
(re)sizing the population.
As opposed to those previous claims, this paper suggests a complete opposite
view. Specifically, it shows that APGA is not capable of adapting the
population size at all. This claim is supported on theoretical grounds and
confirmed by computer simulations.
| [
{
"version": "v1",
"created": "Wed, 15 Feb 2006 13:48:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lobo",
"Fernando G.",
""
],
[
"Lima",
"Claudio F.",
""
]
]
|
cs/0602056 | Domenico Camarda Dr. | Dino Borri, Domenico Camarda | Building Scenarios for Environmental Management and Planning: An
IT-Based Approach | null | null | null | null | cs.MA | null | Oftentimes, the need to build multidiscipline knowledge bases, oriented to
policy scenarios, entails the involvement of stakeholders in manifold domains,
with a juxtaposition of different languages whose semantics can hardly allow
inter-domain transfers. A useful support for planning is the building up of
durable IT based interactive platforms, where it is possible to modify initial
positions toward a semantic convergence. The present paper shows an area-based
application of these tools, for the integrated distance-management of different
forms of knowledge expressed by selected stakeholders about environmental
planning issues, in order to build alternative development scenarios.
Keywords: Environmental planning, Scenario building, Multi-source knowledge,
IT-based
| [
{
"version": "v1",
"created": "Wed, 15 Feb 2006 14:46:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Borri",
"Dino",
""
],
[
"Camarda",
"Domenico",
""
]
]
|
cs/0602057 | Christopher Homan | Melanie J. Agnew and Christopher M. Homan | Plane Decompositions as Tools for Approximation | null | null | null | null | cs.DS | null | Tree decompositions were developed by Robertson and Seymour. Since then
algorithms have been developed to solve intractable problems efficiently for
graphs of bounded treewidth. In this paper we extend tree decompositions to
allow cycles to exist in the decomposition graph; we call these new
decompositions plane decompositions because we require that the decomposition
graph be planar. First, we give some background material about tree
decompositions and an overview of algorithms both for decompositions and for
approximations of planar graphs. Then, we give our plane decomposition
definition and an algorithm that uses this decomposition to approximate the
size of the maximum independent set of the underlying graph in polynomial time.
| [
{
"version": "v1",
"created": "Wed, 15 Feb 2006 19:09:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Agnew",
"Melanie J.",
""
],
[
"Homan",
"Christopher M.",
""
]
]
|
cs/0602059 | Suchitra Manepalli | Suchitra Manepalli, Giridhar Manepalli, Michael L. Nelson | D2D: Digital Archive to MPEG-21 DIDL | 28 pages, 8 figures | null | null | null | cs.DL | null | Digital Archive to MPEG-21 DIDL (D2D) analyzes the contents of the digital
archive and produces an MPEG-21 Digital Item Declaration Language (DIDL)
encapsulating the analysis results. DIDL is an extensible XML-based language
that aggregates resources and the metadata. We provide a brief report on
several analysis techniques applied on the digital archive by the D2D and
provide an evaluation of its run-time performance.
| [
{
"version": "v1",
"created": "Wed, 15 Feb 2006 22:18:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Manepalli",
"Suchitra",
""
],
[
"Manepalli",
"Giridhar",
""
],
[
"Nelson",
"Michael L.",
""
]
]
|
cs/0602060 | Philip Davis | Philip M. Davis, Jason S. Price | eJournal interface can influence usage statistics: implications for
libraries, publishers, and Project COUNTER | 22 pages, 5 figures. JASIST (in press, 2006) | JASIST v57 n9 (2006):1243-1248 | 10.1002/asi.20405 | null | cs.IR cs.DL | null | The design of a publisher's electronic interface can have a measurable effect
on electronic journal usage statistics. A study of journal usage from six
COUNTER-compliant publishers at thirty-two research institutions in the United
States, the United Kingdom and Sweden indicates that the ratio of PDF to HTML
views is not consistent across publisher interfaces, even after controlling for
differences in publisher content. The number of fulltext downloads may be
artificially inflated when publishers require users to view HTML versions
before accessing PDF versions or when linking mechanisms, such as CrossRef,
direct users to the full text, rather than the abstract, of each article. These
results suggest that usage reports from COUNTER-compliant publishers are not
directly comparable in their current form. One solution may be to modify
publisher numbers with adjustment factors deemed to be representative of the
benefit or disadvantage due to its interface. Standardization of some interface
and linking protocols may obviate these differences and allow for more accurate
cross-publisher comparisons.
| [
{
"version": "v1",
"created": "Thu, 16 Feb 2006 20:29:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Davis",
"Philip M.",
""
],
[
"Price",
"Jason S.",
""
]
]
|
cs/0602061 | David Anderson | David P. Anderson, Gilles Fedak | The Computational and Storage Potential of Volunteer Computing | 8 pages. To appear in CCGrid 2006 | null | null | null | cs.DC cs.PF | null | "Volunteer computing" uses Internet-connected computers, volunteered by their
owners, as a source of computing power and storage. This paper studies the
potential capacity of volunteer computing. We analyzed measurements of over
330,000 hosts participating in a volunteer computing project. These
measurements include processing power, memory, disk space, network throughput,
host availability, user-specified limits on resource usage, and host churn. We
show that volunteer computing can support applications that are significantly
more data-intensive, or have larger memory and storage requirements, than those
in current projects.
| [
{
"version": "v1",
"created": "Thu, 16 Feb 2006 22:33:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Anderson",
"David P.",
""
],
[
"Fedak",
"Gilles",
""
]
]
|
cs/0602062 | Francois Denis | Fran\c{c}ois Denis (LIF), Yann Esposito (LIF), Amaury Habrard (LIF) | Learning rational stochastic languages | 15 pages | null | null | null | cs.LG | null | Given a finite set of words w1,...,wn independently drawn according to a
fixed unknown distribution law P called a stochastic language, an usual goal in
Grammatical Inference is to infer an estimate of P in some class of
probabilistic models, such as Probabilistic Automata (PA). Here, we study the
class of rational stochastic languages, which consists in stochastic languages
that can be generated by Multiplicity Automata (MA) and which strictly includes
the class of stochastic languages generated by PA. Rational stochastic
languages have minimal normal representation which may be very concise, and
whose parameters can be efficiently estimated from stochastic samples. We
design an efficient inference algorithm DEES which aims at building a minimal
normal representation of the target. Despite the fact that no recursively
enumerable class of MA computes exactly the set of rational stochastic
languages over Q, we show that DEES strongly identifies tis set in the limit.
We study the intermediary MA output by DEES and show that they compute rational
series which converge absolutely to one and which can be used to provide
stochastic languages which closely estimate the target.
| [
{
"version": "v1",
"created": "Fri, 17 Feb 2006 08:57:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Denis",
"François",
"",
"LIF"
],
[
"Esposito",
"Yann",
"",
"LIF"
],
[
"Habrard",
"Amaury",
"",
"LIF"
]
]
|
cs/0602063 | Tony Thomas | Tony Thomas, Arbind Kumar Lal | Group Signature Schemes Using Braid Groups | null | null | null | null | cs.CR | null | Artin's braid groups have been recently suggested as a new source for
public-key cryptography. In this paper we propose the first group signature
schemes based on the conjugacy problem, decomposition problem and root problem
in the braid groups which are believed to be hard problems.
| [
{
"version": "v1",
"created": "Fri, 17 Feb 2006 10:32:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thomas",
"Tony",
""
],
[
"Lal",
"Arbind Kumar",
""
]
]
|
cs/0602064 | Ana Romero | A. Romero, J. Rubio, F. Sergeraert | Computing spectral sequences | null | null | null | null | cs.SC | null | In this paper, a set of programs enhancing the Kenzo system is presented.
Kenzo is a Common Lisp program designed for computing in Algebraic Topology, in
particular it allows the user to calculate homology and homotopy groups of
complicated spaces. The new programs presented here entirely compute Serre and
Eilenberg-Moore spectral sequences, in particular the groups and differential
maps for arbitrary r. They also determine when the spectral sequence has
converged and describe the filtration of the target homology groups induced by
the spectral sequence.
| [
{
"version": "v1",
"created": "Fri, 17 Feb 2006 12:29:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Romero",
"A.",
""
],
[
"Rubio",
"J.",
""
],
[
"Sergeraert",
"F.",
""
]
]
|
cs/0602065 | Paul Vitanyi | Rudi Cilibrasi (CWI) and Paul Vitanyi (CWI and University of
Amsterdam) | Similarity of Objects and the Meaning of Words | LaTeX, 25 pages, 7 figures. Proc. 3rd Conf. Theory and Applications
of Models of Computation (TAMC), 15-20 May, 2006, Beijing, China (Invited
paper) This is an extended version of the 5-page abstract cs.IR/0504089 | null | null | null | cs.CV cs.IR | null | We survey the emerging area of compression-based, parameter-free, similarity
distance measures useful in data-mining, pattern recognition, learning and
automatic semantics extraction. Given a family of distances on a set of
objects, a distance is universal up to a certain precision for that family if
it minorizes every distance in the family between every two objects in the set,
up to the stated precision (we do not require the universal distance to be an
element of the family). We consider similarity distances for two types of
objects: literal objects that as such contain all of their meaning, like
genomes or books, and names for objects. The latter may have literal
embodyments like the first type, but may also be abstract like ``red'' or
``christianity.'' For the first type we consider a family of computable
distance measures corresponding to parameters expressing similarity according
to particular featuresdistances generated by web users corresponding to
particular semantic relations between the (names for) the designated objects.
For both families we give universal similarity distance measures, incorporating
all particular distance measures in the family. In the first case the universal
distance is based on compression and in the second case it is based on Google
page counts related to search terms. In both cases experiments on a massive
scale give evidence of the viability of the approaches. between pairs of
literal objects. For the second type we consider similarity
| [
{
"version": "v1",
"created": "Fri, 17 Feb 2006 16:15:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cilibrasi",
"Rudi",
"",
"CWI"
],
[
"Vitanyi",
"Paul",
"",
"CWI and University of\n Amsterdam"
]
]
|
cs/0602068 | Kenneth Koehler | K. R. Koehler | Parallel Symbolic Computation of Curvature Invariants in General
Relativity | 9 pages, submitted to Journal of Computational Physics | null | null | null | cs.DC cs.SC gr-qc | null | We present a practical application of parallel symbolic computation in
General Relativity: the calculation of curvature invariants for large
dimension. We discuss the structure of the calculations, an implementation of
the technique and scaling of the computation with spacetime dimension for
various invariants.
| [
{
"version": "v1",
"created": "Sun, 19 Feb 2006 19:28:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Koehler",
"K. R.",
""
]
]
|
cs/0602069 | Vicky Choi | Vicky Choi | Faster Algorithms for Constructing a Concept (Galois) Lattice | 15 pages, 3 figures | null | null | null | cs.DM cs.DS | null | In this paper, we present a fast algorithm for constructing a concept
(Galois) lattice of a binary relation, including computing all concepts and
their lattice order. We also present two efficient variants of the algorithm,
one for computing all concepts only, and one for constructing a frequent closed
itemset lattice. The running time of our algorithms depends on the lattice
structure and is faster than all other existing algorithms for these problems.
| [
{
"version": "v1",
"created": "Sun, 19 Feb 2006 19:47:56 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Jun 2006 19:03:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Choi",
"Vicky",
""
]
]
|
cs/0602070 | Nathan Boeger | Nathan Boeger | Methods for scaling a large member base | 12 pages | null | null | null | cs.GL | null | The technical challenges of scaling websites with large and growing member
bases, like social networking sites, are numerous. One of these challenges is
how to evenly distribute the growing member base across all available
resources. This paper will explore various methods that address this issue. The
techniques used in this paper can be generalized and applied to various other
problems that need to distribute data evenly amongst a finite amount of
resources.
| [
{
"version": "v1",
"created": "Mon, 20 Feb 2006 18:08:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Boeger",
"Nathan",
""
]
]
|
cs/0602073 | Tobias Friedrich | Deepak Ajwani, Tobias Friedrich and Ulrich Meyer | An O(n^{2.75}) algorithm for online topological ordering | 20 pages, long version of SWAT'06 paper | null | null | null | cs.DS | null | We present a simple algorithm which maintains the topological order of a
directed acyclic graph with n nodes under an online edge insertion sequence in
O(n^{2.75}) time, independent of the number of edges m inserted. For dense
DAGs, this is an improvement over the previous best result of O(min(m^{3/2}
log(n), m^{3/2} + n^2 log(n)) by Katriel and Bodlaender. We also provide an
empirical comparison of our algorithm with other algorithms for online
topological sorting. Our implementation outperforms them on certain hard
instances while it is still competitive on random edge insertion sequences
leading to complete DAGs.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2006 10:32:15 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Apr 2006 16:31:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ajwani",
"Deepak",
""
],
[
"Friedrich",
"Tobias",
""
],
[
"Meyer",
"Ulrich",
""
]
]
|
cs/0602075 | Peter Jonsson | Vladimir Deineko, Peter Jonsson, Mikael Klasson, and Andrei Krokhin | The approximability of MAX CSP with fixed-value constraints | null | null | null | null | cs.CC | null | In the maximum constraint satisfaction problem (MAX CSP), one is given a
finite collection of (possibly weighted) constraints on overlapping sets of
variables, and the goal is to assign values from a given finite domain to the
variables so as to maximize the number (or the total weight, for the weighted
case) of satisfied constraints. This problem is NP-hard in general, and,
therefore, it is natural to study how restricting the allowed types of
constraints affects the approximability of the problem. In this paper, we show
that any MAX CSP problem with a finite set of allowed constraint types, which
includes all fixed-value constraints (i.e., constraints of the form x=a), is
either solvable exactly in polynomial-time or else is APX-complete, even if the
number of occurrences of variables in instances are bounded. Moreover, we
present a simple description of all polynomial-time solvable cases of our
problem. This description relies on the well-known algebraic combinatorial
property of supermodularity.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2006 14:13:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Deineko",
"Vladimir",
""
],
[
"Jonsson",
"Peter",
""
],
[
"Klasson",
"Mikael",
""
],
[
"Krokhin",
"Andrei",
""
]
]
|
cs/0602076 | Ioannis Antonellis | Ioannis Antonellis and Efstratios Gallopoulos | Exploring term-document matrices from matrix models in text mining | SIAM Text Mining Workshop, SIAM Conference Data Mining, 2006 | null | null | 03/02-06 | cs.IR cs.DB cs.DL | null | We explore a matrix-space model, that is a natural extension to the vector
space model for Information Retrieval. Each document can be represented by a
matrix that is based on document extracts (e.g. sentences, paragraphs,
sections). We focus on the performance of this model for the specific case in
which documents are originally represented as term-by-sentence matrices. We use
the singular value decomposition to approximate the term-by-sentence matrices
and assemble these results to form the pseudo-``term-document'' matrix that
forms the basis of a text mining method alternative to traditional VSM and LSI.
We investigate the singular values of this matrix and provide experimental
evidence suggesting that the method can be particularly effective in terms of
accuracy for text collections with multi-topic documents, such as web pages
with news.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2006 16:14:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Antonellis",
"Ioannis",
""
],
[
"Gallopoulos",
"Efstratios",
""
]
]
|
cs/0602077 | Vincent Schmitt RR | Vincent Schmitt and Krzysztof Worytkiewicz | Bisimulations of enrichments | null | null | null | null | cs.LO | null | In this paper we show that classical notions from automata theory such as
simulation and bisimulation can be lifted to the context of enriched
categories. The usual properties of bisimulation are nearly all preserved in
this new context. The class of enriched functors that correspond to functionnal
bisimulations surjective on objects is investigated and appears "nearly" open
in the sense of Joyal and Moerdijk. Seeing the change of base techniques as a
convenient means to define process refinement/abstractions, we give sufficient
conditions for the change of base categories to preserve bisimularity. We apply
these concepts to Betti's generalized automata, categorical transition systems,
and other exotic categories.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2006 17:27:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schmitt",
"Vincent",
""
],
[
"Worytkiewicz",
"Krzysztof",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.