id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0601011
Avner Magen
Hamed Hatami and Avner Magen and Vangelis Markakis
Integrality gaps of semidefinite programs for Vertex Cover and relations to $\ell_1$ embeddability of Negative Type metrics
A more complete version. Changed order of results. A complete proof of (current) Theorem 5
null
null
null
cs.DS cs.DM math.MG
null
We study various SDP formulations for {\sc Vertex Cover} by adding different constraints to the standard formulation. We show that {\sc Vertex Cover} cannot be approximated better than $2-o(1)$ even when we add the so called pentagonal inequality constraints to the standard SDP formulation, en route answering an open question of Karakostas~\cite{Karakostas}. We further show the surprising fact that by strengthening the SDP with the (intractable) requirement that the metric interpretation of the solution is an $\ell_1$ metric, we get an exact relaxation (integrality gap is 1), and on the other hand if the solution is arbitrarily close to being $\ell_1$ embeddable, the integrality gap may be as big as $2-o(1)$. Finally, inspired by the above findings, we use ideas from the integrality gap construction of Charikar \cite{Char02} to provide a family of simple examples for negative type metrics that cannot be embedded into $\ell_1$ with distortion better than $8/7-\eps$. To this end we prove a new isoperimetric inequality for the hypercube.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 23:10:58 GMT" }, { "version": "v2", "created": "Wed, 12 Apr 2006 14:01:50 GMT" }, { "version": "v3", "created": "Thu, 13 Apr 2006 20:17:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Hatami", "Hamed", "" ], [ "Magen", "Avner", "" ], [ "Markakis", "Vangelis", "" ] ]
cs/0601013
Germ\'an Vidal
Josep Silva and Germ\'an Vidal
Forward slicing of functional logic programs by partial evaluation
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.LO
null
Program slicing has been mainly studied in the context of imperative languages, where it has been applied to a wide variety of software engineering tasks, like program understanding, maintenance, debugging, testing, code reuse, etc. This work introduces the first forward slicing technique for declarative multi-paradigm programs which integrate features from functional and logic programming. Basically, given a program and a slicing criterion (a function call in our setting), the computed forward slice contains those parts of the original program which are reachable from the slicing criterion. Our approach to program slicing is based on an extension of (online) partial evaluation. Therefore, it provides a simple way to develop program slicing tools from existing partial evaluators and helps to clarify the relation between both methodologies. A slicing tool for the multi-paradigm language Curry, which demonstrates the usefulness of our approach, has been implemented in Curry itself.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 00:41:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Silva", "Josep", "" ], [ "Vidal", "Germán", "" ] ]
cs/0601018
Miguel Palomino
Miguel Palomino
A comparison between two logical formalisms for rewriting
31 pages, 2 figures To appear in Theory and Practice of Logic Programming
null
null
null
cs.LO
null
Meseguer's rewriting logic and the rewriting logic CRWL are two well-known approaches to rewriting as logical deduction that, despite some clear similarities, were designed with different objectives. Here we study the relationships between them, both at a syntactic and at a semantic level. Even though it is not possible to establish an entailment system map between them, both can be naturally simulated in each other. Semantically, there is no embedding between the corresponding institutions. Along the way, the notions of entailment and satisfaction in Meseguer's rewriting logic are generalized. We also use the syntactic results to prove reflective properties of CRWL.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 12:01:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Palomino", "Miguel", "" ] ]
cs/0601019
Antoine Reilles
Antoine Reilles (INRIA Lorraine - LORIA)
Canonical Abstract Syntax Trees
null
Dans Workshop on Rewriting Techniques and Applications (2006)
null
null
cs.PL
null
This paper presents Gom, a language for describing abstract syntax trees and generating a Java implementation for those trees. Gom includes features allowing the user to specify and modify the interface of the data structure. These features provide in particular the capability to maintain the internal representation of data in canonical form with respect to a rewrite system. This explicitly guarantees that the client program only manipulates normal forms for this rewrite system, a feature which is only implicitly used in many implementations.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 19:50:29 GMT" }, { "version": "v2", "created": "Tue, 21 Nov 2006 13:02:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Reilles", "Antoine", "", "INRIA Lorraine - LORIA" ] ]
cs/0601020
William Yurcik
Ruperto P. Majuca, William Yurcik, Jay P. Kesan
The Evolution of Cyberinsurance
16 pages, 6 tables, 2 figures
null
null
null
cs.CR cs.CY
null
Cyberinsurance is a powerful tool to align market incentives toward improving Internet security. We trace the evolution of cyberinsurance from traditional insurance policies to early cyber-risk insurance policies to current comprehensive cyberinsurance products. We find that increasing Internet security risk in combination with the need for compliance with recent corporate legislation has contributed significantly to the demand for cyberinsurance. Cyberinsurance policies have become more comprehensive as insurers better understand the risk landscape and specific business needs. More specifically, cyberinsurers are addressing what used to be considered insurmountable problems (e.g., adverse selection/asymmetric information, moral hazard, etc.) that could lead to a failure of this market solution. Although some implementation issues remain, we suggest the future development of cyberinsurance will resolve these issues as evidenced by insurance solutions in other risk domains.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 20:29:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Majuca", "Ruperto P.", "" ], [ "Yurcik", "William", "" ], [ "Kesan", "Jay P.", "" ] ]
cs/0601021
Alexander Haubold
Alexander Haubold
Lighting Control using Pressure-Sensitive Touchpads
null
null
null
null
cs.HC
null
We introduce a novel approach to control physical lighting parameters by means of a pressure-sensitive touchpad. The two-dimensional area of the touchpad is subdivided into 5 virtual sliders, each controlling the intensity of a color (red, green, blue, yellow, and white). The physical interaction methodology is modeled directly after ubiquitous mechanical sliders and dimmers which tend to be used for intensity/volume control. Our abstraction to a pressure-sensitive touchpad provides advantages and introduces additional benefits over such existing devices.
[ { "version": "v1", "created": "Sat, 7 Jan 2006 11:06:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ] ]
cs/0601024
Xu Hong
Hong Xu and Wen-Feng Qi
Further Results on the Distinctness of Decimations of l-sequences
submitted to IEEE-IT
null
null
null
cs.CR
null
Let $\underline{a}$ be an \textit{l}-sequence generated by a feedback-with-carry shift register with connection integer $q=p^{e}$, where $ p$ is an odd prime and $e\geq 1$. Goresky and Klapper conjectured that when $ p^{e}\notin \{5,9,11,13\}$, all decimations of $\underline{a}$ are cyclically distinct. When $e=1$ and $p>13$, they showed that the set of distinct decimations is large and, in some cases, all deciamtions are distinct. In this article, we further show that when $e\geq 2$ and$ p^{e}\neq 9$, all decimations of $\underline{a}$ are also cyclically distinct.
[ { "version": "v1", "created": "Mon, 9 Jan 2006 11:26:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Xu", "Hong", "" ], [ "Qi", "Wen-Feng", "" ] ]
cs/0601026
Nicholas Harvey
Nicholas J. A. Harvey
Algebraic Structures and Algorithms for Matching and Matroid Problems (Preliminary Version)
null
null
null
null
cs.DS cs.DM
null
Basic path-matchings, introduced by Cunningham and Geelen (FOCS 1996), are a common generalization of matroid intersection and non-bipartite matching. The main results of this paper are a new algebraic characterization of basic path-matching problems and an algorithm for constructing basic path-matchings in O(n^w) time, where n is the number of vertices and w is the exponent for matrix multiplication. Our algorithms are randomized, and our approach assumes that the given matroids are linear and can be represented over the same field. Our main results have interesting consequences for several special cases of path-matching problems. For matroid intersection, we obtain an algorithm with running time O(nr^(w-1))=O(nr^1.38), where the matroids have n elements and rank r. This improves the long-standing bound of O(nr^1.62) due to Gabow and Xu (FOCS 1989). Also, we obtain a simple, purely algebraic algorithm for non-bipartite matching with running time O(n^w). This resolves the central open problem of Mucha and Sankowski (FOCS 2004).
[ { "version": "v1", "created": "Mon, 9 Jan 2006 13:54:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Harvey", "Nicholas J. A.", "" ] ]
cs/0601033
Martin Kutz
Rolf Klein and Martin Kutz
The density of iterated crossing points and a gap result for triangulations of finite point sets
10 pages + appendix
null
null
null
cs.CG
null
Consider a plane graph G, drawn with straight lines. For every pair a,b of vertices of G, we compare the shortest-path distance between a and b in G (with Euclidean edge lengths) to their actual distance in the plane. The worst-case ratio of these two values, for all pairs of points, is called the dilation of G. All finite plane graphs of dilation 1 have been classified. They are closely related to the following iterative procedure. For a given point set P in R^2, we connect every pair of points in P by a line segment and then add to P all those points where two such line segments cross. Repeating this process infinitely often, yields a limit point set P*. The main result of this paper is the following gap theorem: For any finite point set P in the plane for which the above P* is infinite, there exists a threshold t > 1 such that P is not contained in the vertex set of any finite plane graph of dilation at most t. We construct a concrete point set Q such that any planar graph that contains this set amongst its vertices must have a dilation larger than 1.0000047.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 01:13:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Klein", "Rolf", "" ], [ "Kutz", "Martin", "" ] ]
cs/0601034
Vicky Weissman
Joseph Y. Halpern and Vicky Weissman
Using First-Order Logic to Reason about Policies
39 pages, earlier version in Proceedings of the Sixteenth IEEE Computer Security Foundations Workshop, 2003, pp. 187-201
null
null
null
cs.LO cs.CR
null
A policy describes the conditions under which an action is permitted or forbidden. We show that a fragment of (multi-sorted) first-order logic can be used to represent and reason about policies. Because we use first-order logic, policies have a clear syntax and semantics. We show that further restricting the fragment results in a language that is still quite expressive yet is also tractable. More precisely, questions about entailment, such as `May Alice access the file?', can be answered in time that is a low-order polynomial (indeed, almost linear in some cases), as can questions about the consistency of policy sets.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 04:30:49 GMT" }, { "version": "v2", "created": "Thu, 12 Jan 2006 12:58:59 GMT" }, { "version": "v3", "created": "Mon, 15 May 2006 15:10:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Weissman", "Vicky", "" ] ]
cs/0601035
Francois Colonna
Francois Colonna (LCT)
Deductive Object Programming
20 pages
null
null
null
cs.SE
null
We propose some slight additions to O-O languages to implement the necessary features for using Deductive Object Programming (DOP). This way of programming based upon the manipulation of the Production Tree of the Objects of Interest, result in making Persistent these Objects and in sensibly lowering the code complexity.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 09:50:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Colonna", "Francois", "", "LCT" ] ]
cs/0601037
Giorgio Delzanno
Giorgio Delzanno
Constraint-based verification of abstract models of multitreaded programs
To appear in Theory and Practice of Logic Programming
null
null
null
cs.CL cs.PL
null
We present a technique for the automated verification of abstract models of multithreaded programs providing fresh name generation, name mobility, and unbounded control. As high level specification language we adopt here an extension of communication finite-state machines with local variables ranging over an infinite name domain, called TDL programs. Communication machines have been proved very effective for representing communication protocols as well as for representing abstractions of multithreaded software. The verification method that we propose is based on the encoding of TDL programs into a low level language based on multiset rewriting and constraints that can be viewed as an extension of Petri Nets. By means of this encoding, the symbolic verification procedure developed for the low level language in our previous work can now be applied to TDL programs. Furthermore, the encoding allows us to isolate a decidable class of verification problems for TDL programs that still provide fresh name generation, name mobility, and unbounded control. Our syntactic restrictions are in fact defined on the internal structure of threads: In order to obtain a complete and terminating method, threads are only allowed to have at most one local variable (ranging over an infinite domain of names).
[ { "version": "v1", "created": "Tue, 10 Jan 2006 12:57:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Delzanno", "Giorgio", "" ] ]
cs/0601038
Giorgio Delzanno
Giorgio Delzanno
Constraint-based automatic verification of abstract models of multithreaded programs
To appear in Theory and Practice of Logic Programming
null
null
null
cs.LO cs.PL
null
We present a technique for the automated verification of abstract models of multithreaded programs providing fresh name generation, name mobility, and unbounded control. As high level specification language we adopt here an extension of communication finite-state machines with local variables ranging over an infinite name domain, called TDL programs. Communication machines have been proved very effective for representing communication protocols as well as for representing abstractions of multithreaded software. The verification method that we propose is based on the encoding of TDL programs into a low level language based on multiset rewriting and constraints that can be viewed as an extension of Petri Nets. By means of this encoding, the symbolic verification procedure developed for the low level language in our previous work can now be applied to TDL programs. Furthermore, the encoding allows us to isolate a decidable class of verification problems for TDL programs that still provide fresh name generation, name mobility, and unbounded control. Our syntactic restrictions are in fact defined on the internal structure of threads: In order to obtain a complete and terminating method, threads are only allowed to have at most one local variable (ranging over an infinite domain of names).
[ { "version": "v1", "created": "Tue, 10 Jan 2006 12:57:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Delzanno", "Giorgio", "" ] ]
cs/0601039
Santiago Escobar
Maria Alpuente, Santiago Escobar, Salvador Lucas
Removing Redundant Arguments Automatically
Accepted for publication in Theory and Practice of Logic Programming
null
null
null
cs.PL
null
The application of automatic transformation processes during the formal development and optimization of programs can introduce encumbrances in the generated code that programmers usually (or presumably) do not write. An example is the introduction of redundant arguments in the functions defined in the program. Redundancy of a parameter means that replacing it by any expression does not change the result. In this work, we provide methods for the analysis and elimination of redundant arguments in term rewriting systems as a model for the programs that can be written in more sophisticated languages. On the basis of the uselessness of redundant arguments, we also propose an erasure procedure which may avoid wasteful computations while still preserving the semantics (under ascertained conditions). A prototype implementation of these methods has been undertaken, which demonstrates the practicality of our approach.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 13:13:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Alpuente", "Maria", "" ], [ "Escobar", "Santiago", "" ], [ "Lucas", "Salvador", "" ] ]
cs/0601042
Christoph Benzm?ller Dr
Christoph Benzmueller, John Harrison, and Carsten Schuermann (Eds.)
LPAR-05 Workshop: Empirically Successfull Automated Reasoning in Higher-Order Logic (ESHOL)
Workshop Proceedings
null
null
null
cs.AI cs.LO
null
This workshop brings together practioners and researchers who are involved in the everyday aspects of logical systems based on higher-order logic. We hope to create a friendly and highly interactive setting for discussions around the following four topics. Implementation and development of proof assistants based on any notion of impredicativity, automated theorem proving tools for higher-order logic reasoning systems, logical framework technology for the representation of proofs in higher-order logic, formal digital libraries for storing, maintaining and querying databases of proofs. We envision attendees that are interested in fostering the development and visibility of reasoning systems for higher-order logics. We are particularly interested in a discusssion on the development of a higher-order version of the TPTP and in comparisons of the practical strengths of automated higher-order reasoning systems. Additionally, the workshop includes system demonstrations. ESHOL is the successor of the ESCAR and ESFOR workshops held at CADE 2005 and IJCAR 2004.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 18:43:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Benzmueller", "Christoph", "", "Eds." ], [ "Harrison", "John", "", "Eds." ], [ "Schuermann", "Carsten", "", "Eds." ] ]
cs/0601045
Lillian Lee
Oren Kurland and Lillian Lee
PageRank without hyperlinks: Structural re-ranking using links induced by language models
null
Proceedings of SIGIR 2005, pp. 306--313
null
null
cs.IR cs.CL
null
Inspired by the PageRank and HITS (hubs and authorities) algorithms for Web search, we propose a structural re-ranking approach to ad hoc information retrieval: we reorder the documents in an initially retrieved set by exploiting asymmetric relationships between them. Specifically, we consider generation links, which indicate that the language model induced from one document assigns high probability to the text of another; in doing so, we take care to prevent bias against long documents. We study a number of re-ranking criteria based on measures of centrality in the graphs formed by generation links, and show that integrating centrality into standard language-model-based retrieval is quite effective at improving precision at top ranks.
[ { "version": "v1", "created": "Wed, 11 Jan 2006 21:27:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurland", "Oren", "" ], [ "Lee", "Lillian", "" ] ]
cs/0601046
Lillian Lee
Oren Kurland, Lillian Lee, Carmel Domshlak
Better than the real thing? Iterative pseudo-query processing using cluster-based language models
null
Proceedings of SIGIR 2005, pp. 19--26
null
null
cs.IR cs.CL
null
We present a novel approach to pseudo-feedback-based ad hoc retrieval that uses language models induced from both documents and clusters. First, we treat the pseudo-feedback documents produced in response to the original query as a set of pseudo-queries that themselves can serve as input to the retrieval process. Observing that the documents returned in response to the pseudo-queries can then act as pseudo-queries for subsequent rounds, we arrive at a formulation of pseudo-query-based retrieval as an iterative process. Experiments show that several concrete instantiations of this idea, when applied in conjunction with techniques designed to heighten precision, yield performance results rivaling those of a number of previously-proposed algorithms, including the standard language-modeling approach. The use of cluster-based language models is a key contributing factor to our algorithms' success.
[ { "version": "v1", "created": "Wed, 11 Jan 2006 21:47:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurland", "Oren", "" ], [ "Lee", "Lillian", "" ], [ "Domshlak", "Carmel", "" ] ]
cs/0601047
Juan J. Merelo Pr.
Lourdes Araujo and Juan J. Merelo
Automatic Detection of Trends in Dynamical Text: An Evolutionary Approach
22 pages, submitted to Journal of Information Retrieval
null
null
null
cs.IR cs.NE
null
This paper presents an evolutionary algorithm for modeling the arrival dates of document streams, which is any time-stamped collection of documents, such as newscasts, e-mails, IRC conversations, scientific journals archives and weblog postings. This algorithm assigns frequencies (number of document arrivals per time unit) to time intervals so that it produces an optimal fit to the data. The optimization is a trade off between accurately fitting the data and avoiding too many frequency changes; this way the analysis is able to find fits which ignore the noise. Classical dynamic programming algorithms are limited by memory and efficiency requirements, which can be a problem when dealing with long streams. This suggests to explore alternative search methods which allow for some degree of uncertainty to achieve tractability. Experiments have shown that the designed evolutionary algorithm is able to reach the same solution quality as those classical dynamic programming algorithms in a shorter time. We have also explored different probabilistic models to optimize the fitting of the date streams, and applied these algorithms to infer whether a new arrival increases or decreases {\em interest} in the topic the document stream is about.
[ { "version": "v1", "created": "Thu, 12 Jan 2006 20:23:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Araujo", "Lourdes", "" ], [ "Merelo", "Juan J.", "" ] ]
cs/0601049
Tony Thomas
Tony Thomas, Arbind Kumar Lal
Undeniable Signature Schemes Using Braid Groups
null
null
null
null
cs.CR
null
Artin's braid groups have been recently suggested as a new source for public-key cryptography. In this paper we propose the first undeniable signature schemes using the conjugacy problem and the decomposition problem in the braid groups which are believed to be hard problems.
[ { "version": "v1", "created": "Fri, 13 Jan 2006 07:33:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Thomas", "Tony", "" ], [ "Lal", "Arbind Kumar", "" ] ]
cs/0601050
Alex Vinokur Dr.
Alex Vinokur
Computing Fibonacci numbers on a Turing Machine
5 pages, 1 table
null
null
null
cs.DM
null
A Turing machine that computes Fibonacci numbers is described.
[ { "version": "v1", "created": "Fri, 13 Jan 2006 14:27:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Vinokur", "Alex", "" ] ]
cs/0601051
Enrico Pontelli
Tran Cao Son and Enrico Pontelli
A Constructive Semantic Characterization of Aggregates in ASP
21 pages
null
null
null
cs.AI cs.LO cs.PL cs.SC
null
This technical note describes a monotone and continuous fixpoint operator to compute the answer sets of programs with aggregates. The fixpoint operator relies on the notion of aggregate solution. Under certain conditions, this operator behaves identically to the three-valued immediate consequence operator $\Phi^{aggr}_P$ for aggregate programs, independently proposed Pelov et al. This operator allows us to closely tie the computational complexity of the answer set checking and answer sets existence problems to the cost of checking a solution of the aggregates in the program. Finally, we relate the semantics described by the operator to other proposals for logic programming with aggregates. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Fri, 13 Jan 2006 16:09:36 GMT" }, { "version": "v2", "created": "Wed, 8 Feb 2006 18:31:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Son", "Tran Cao", "" ], [ "Pontelli", "Enrico", "" ] ]
cs/0601052
Subhash Kak
Subhash Kak
Artificial and Biological Intelligence
16 pages
ACM Ubiquity, vol. 6, number 42, 2005, pp. 1-20
null
null
cs.AI
null
This article considers evidence from physical and biological sciences to show machines are deficient compared to biological systems at incorporating intelligence. Machines fall short on two counts: firstly, unlike brains, machines do not self-organize in a recursive manner; secondly, machines are based on classical logic, whereas Nature's intelligence may depend on quantum mechanics.
[ { "version": "v1", "created": "Fri, 13 Jan 2006 19:01:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Kak", "Subhash", "" ] ]
cs/0601053
Vedran Kordic
Adel Al-Jumaily & Cindy Leung
Wavefront Propagation and Fuzzy Based Autonomous Navigation
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
Path planning and obstacle avoidance are the two major issues in any navigation system. Wavefront propagation algorithm, as a good path planner, can be used to determine an optimal path. Obstacle avoidance can be achieved using possibility theory. Combining these two functions enable a robot to autonomously navigate to its destination. This paper presents the approach and results in implementing an autonomous navigation system for an indoor mobile robot. The system developed is based on a laser sensor used to retrieve data to update a two dimensional world model of therobot environment. Waypoints in the path are incorporated into the obstacle avoidance. Features such as ageing of objects and smooth motion planning are implemented to enhance efficiency and also to cater for dynamic environments.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:09:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Al-Jumaily", "Adel", "" ], [ "Leung", "Cindy", "" ] ]
cs/0601054
Vedran Kordic
Victor Etxebarria, Arantza Sanz & Ibone Lizarraga
Control of a Lightweight Flexible Robotic Arm Using Sliding Modes
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
This paper presents a robust control scheme for flexible link robotic manipulators, which is based on considering the flexible mechanical structure as a system with slow (rigid) and fast (flexible) modes that can be controlled separately. The rigid dynamics is controlled by means of a robust sliding-mode approach with wellestablished stability properties while an LQR optimal design is adopted for the flexible dynamics. Experimental results show that this composite approach achieves good closed loop tracking properties both for the rigid and the flexible dynamics.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:10:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Etxebarria", "Victor", "" ], [ "Sanz", "Arantza", "" ], [ "Lizarraga", "Ibone", "" ] ]
cs/0601055
Vedran Kordic
Alborz Geramifard, Peyman Nayeri, Reza Zamani-Nasab & Jafar Habibi
A Hybrid Three Layer Architecture for Fire Agent Management in Rescue Simulation Environment
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
This paper presents a new architecture called FAIS for imple- menting intelligent agents cooperating in a special Multi Agent environ- ment, namely the RoboCup Rescue Simulation System. This is a layered architecture which is customized for solving fire extinguishing problem. Structural decision making algorithms are combined with heuristic ones in this model, so it's a hybrid architecture.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:12:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Geramifard", "Alborz", "" ], [ "Nayeri", "Peyman", "" ], [ "Zamani-Nasab", "Reza", "" ], [ "Habibi", "Jafar", "" ] ]
cs/0601056
Vedran Kordic
Panfeng Huang, Yangsheng Xu & Bin Liang
Dynamic Balance Control of Multi-arm Free-Floating Space Robots
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
This paper investigates the problem of the dynamic balance control of multi-arm free-floating space robot during capturing an active object in close proximity. The position and orientation of space base will be affected during the operation of space manipulator because of the dynamics coupling between the manipulator and space base. This dynamics coupling is unique characteristics of space robot system. Such a disturbance will produce a serious impact between the manipulator hand and the object. To ensure reliable and precise operation, we propose to develop a space robot system consisting of two arms, with one arm (mission arm) for accomplishing the capture mission, and the other one (balance arm) compensating for the disturbance of the base. We present the coordinated control concept for balance of the attitude of the base using the balance arm. The mission arm can move along the given trajectory to approach and capture the target with no considering the disturbance from the coupling of the base. We establish a relationship between the motion of two arm that can realize the zeros reaction to the base. The simulation studies verified the validity and efficiency of the proposed control method.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:13:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Panfeng", "" ], [ "Xu", "Yangsheng", "" ], [ "Liang", "Bin", "" ] ]
cs/0601057
Vedran Kordic
Musa Mailah, Endra Pitowarno & Hishamuddin Jamaluddin
Robust Motion Control for Mobile Manipulator Using Resolved Acceleration and Proportional-Integral Active Force Control
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
A resolved acceleration control (RAC) and proportional-integral active force control (PIAFC) is proposed as an approach for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile platform with a two-link planar arm mounted on top of the platform. The study emphasizes on the integrated kinematic and dynamic control strategy in which the RAC is used to manipulate the kinematic component while the PIAFC is implemented to compensate the dynamic effects including the bounded known/unknown disturbances and uncertainties. The effectivenss and robustness of the proposed scheme are investigated through a rigorous simulation study and later complemented with experimental results obtained through a number of experiments performed on a fully developed working prototype in a laboratory environment. A number of disturbances in the form of vibratory and impact forces are deliberately introduced into the system to evaluate the system performances. The investigation clearly demonstrates the extreme robustness feature of the proposed control scheme compared to other systems considered in the study.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:14:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Mailah", "Musa", "" ], [ "Pitowarno", "Endra", "" ], [ "Jamaluddin", "Hishamuddin", "" ] ]
cs/0601058
Vedran Kordic
Michael Sdahl & Bernd Kuhlenkoetter
CAGD - Computer Aided Gripper Design for a Flexible Gripping System
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
This paper is a summary of the recently accomplished research work on flexible gripping systems. The goal is to develop a gripper which can be used for a great amount of geometrically variant workpieces. The economic aspect is of particular importance during the whole development. The high flexibility of the gripper is obtained by three parallel used principles. These are human and computer based analysis of the gripping object as well as mechanical adaptation of the gripper to the object with the help of servo motors. The focus is on the gripping of free-form surfaces with suction cup.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:15:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Sdahl", "Michael", "" ], [ "Kuhlenkoetter", "Bernd", "" ] ]
cs/0601059
Vedran Kordic
Shu-qin Li, Lan Shuai, Xian-yi Cheng, Zhen-min Tang & Jing-yu Yang
A Descriptive Model of Robot Team and the Dynamic Evolution of Robot Team Cooperation
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
At present, the research on robot team cooperation is still in qualitative analysis phase and lacks the description model that can quantitatively describe the dynamical evolution of team cooperative relationships with constantly changeable task demand in Multi-robot field. First this paper whole and static describes organization model HWROM of robot team, then uses Markov course and Bayesian theorem for reference, dynamical describes the team cooperative relationships building. Finally from cooperative entity layer, ability layer and relative layer we research team formation and cooperative mechanism, and discuss how to optimize relative action sets during the evolution. The dynamic evolution model of robot team and cooperative relationships between robot teams proposed and described in this paper can not only generalize the robot team as a whole, but also depict the dynamic evolving process quantitatively. Users can also make the prediction of the cooperative relationship and the action of the robot team encountering new demands based on this model. Journal web page & a lot of robotic related papers www.ars-journal.com
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:18:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Shu-qin", "" ], [ "Shuai", "Lan", "" ], [ "Cheng", "Xian-yi", "" ], [ "Tang", "Zhen-min", "" ], [ "Yang", "Jing-yu", "" ] ]
cs/0601060
Vedran Kordic
Olga Bogatyreva & Alexandr Shillerov
Robot Swarms in an Uncertain World: Controllable Adaptability
Journal web page & a lot of robotic related papers www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
There is a belief that complexity and chaos are essential for adaptability. But life deals with complexity every moment, without the chaos that engineers fear so, by invoking goal-directed behaviour. Goals can be programmed. That is why living organisms give us hope to achieve adaptability in robots. In this paper a method for the description of a goal-directed, or programmed, behaviour, interacting with uncertainty of environment, is described. We suggest reducing the structural (goals, intentions) and stochastic components (probability to realise the goal) of individual behaviour to random variables with nominal values to apply probabilistic approach. This allowed us to use a Normalized Entropy Index to detect the system state by estimating the contribution of each agent to the group behaviour. The number of possible group states is 27. We argue that adaptation has a limited number of possible paths between these 27 states. Paths and states can be programmed so that after adjustment to any particular case of task and conditions, adaptability will never involve chaos. We suggest the application of the model to operation of robots or other devices in remote and/or dangerous places.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:20:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Bogatyreva", "Olga", "" ], [ "Shillerov", "Alexandr", "" ] ]
cs/0601061
Vedran Kordic
I. Topalova
Modular Adaptive System Based on a Multi-Stage Neural Structure for Recognition of 2D Objects of Discontinuous Production
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No1. (2005)
null
null
cs.RO
null
This is a presentation of a new system for invariant recognition of 2D objects with overlapping classes, that can not be effectively recognized with the traditional methods. The translation, scale and partial rotation invariant contour object description is transformed in a DCT spectrum space. The obtained frequency spectrums are decomposed into frequency bands in order to feed different BPG neural nets (NNs). The NNs are structured in three stages - filtering and full rotation invariance; partial recognition; general classification. The designed multi-stage BPG Neural Structure shows very good accuracy and flexibility when tested with 2D objects used in the discontinuous production. The reached speed and the opportunuty for an easy restructuring and reprogramming of the system makes it suitable for application in different applied systems for real time work.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:25:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Topalova", "I.", "" ] ]
cs/0601062
Vedran Kordic
Ceng Xian-yi, Li Shu-qin & Xia De-shen
Study of Self-Organization Model of Multiple Mobile Robot
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
A good organization model of multiple mobile robot should be able to improve the efficiency of the system, reduce the complication of robot interactions, and detract the difficulty of computation. From the sociology aspect of topology, structure and organization, this paper studies the multiple mobile robot organization formation and running mechanism in the dynamic, complicated and unknown environment. It presents and describes in detail a Hierarchical- Web Recursive Organization Model (HWROM) and forming algorithm. It defines the robot society leader; robotic team leader and individual robot as the same structure by the united framework and describes the organization model by the recursive structure. The model uses task-oriented and top-down method to dynamically build and maintain structures and organization. It uses market-based techniques to assign task, form teams and allocate resources in dynamic environment. The model holds several characteristics of self-organization, dynamic, conciseness, commonness and robustness.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:27:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Xian-yi", "Ceng", "" ], [ "Shu-qin", "Li", "" ], [ "De-shen", "Xia", "" ] ]
cs/0601063
Vedran Kordic
Atef A. Ata & Thi Rein Myo
Optimal Point-to-Point Trajectory Tracking of Redundant Manipulators using Generalized Pattern Search
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
Optimal point-to-point trajectory planning for planar redundant manipulator is considered in this study. The main objective is to minimize the sum of the position error of the end-effector at each intermediate point along the trajectory so that the end-effector can track the prescribed trajectory accurately. An algorithm combining Genetic Algorithm and Pattern Search as a Generalized Pattern Search GPS is introduced to design the optimal trajectory. To verify the proposed algorithm, simulations for a 3-D-O-F planar manipulator with different end-effector trajectories have been carried out. A comparison between the Genetic Algorithm and the Generalized Pattern Search shows that The GPS gives excellent tracking performance.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:29:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Ata", "Atef A.", "" ], [ "Myo", "Thi Rein", "" ] ]
cs/0601064
Vedran Kordic
Chua Kia & Mohd Rizal Arshad
Robotics Vision-based Heuristic Reasoning for Underwater Target Tracking and Navigation
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
This paper presents a robotics vision-based heuristic reasoning system for underwater target tracking and navigation. This system is introduced to improve the level of automation of underwater Remote Operated Vehicles (ROVs) operations. A prototype which combines computer vision with an underwater robotics system is successfully designed and developed to perform target tracking and intelligent navigation. ...
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:34:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Kia", "Chua", "" ], [ "Arshad", "Mohd Rizal", "" ] ]
cs/0601065
Vedran Kordic
Nazim Mir-Nasiri & Sulaiman Hussaini
New Intelligent Transmission Concept for Hybrid Mobile Robot Speed Control
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
This paper presents a new concept of a mobile robot speed control by using two degree of freedom gear transmission. The developed intelligent speed controller utilizes a gear box which comprises of epicyclic gear train with two inputs, one coupled with the engine shaft and another with the shaft of a variable speed dc motor. The net output speed is a combination of the two input speeds and is governed by the transmission ratio of the planetary gear train. This new approach eliminates the use of a torque converter which is otherwise an indispensable part of all available automatic transmissions, thereby reducing the power loss that occurs in the box during the fluid coupling. By gradually varying the speed of the dc motor a stepless transmission has been achieved. The other advantages of the developed controller are pulling over and reversing the vehicle, implemented by intelligent mixing of the dc motor and engine speeds. This approach eliminates traditional braking system in entire vehicle design. The use of two power sources, IC engine and battery driven DC motor, utilizes the modern idea of hybrid vehicles. The new mobile robot speed controller is capable of driving the vehicle even in extreme case of IC engine failure, for example, due to gas depletion.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:35:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Mir-Nasiri", "Nazim", "" ], [ "Hussaini", "Sulaiman", "" ] ]
cs/0601068
Sorav Bansal
Sorav Bansal
Checkbochs: Use Hardware to Check Software
4 pages, 4 figures
null
null
null
cs.OS cs.CR
null
In this paper, we present a system called Checkbochs, a machine simulator that checks rules about its guest operating system and applications at the hardware level. The properties to be checked can be implemented as `plugins' in the Checkbochs simulator. Some of the properties that were checked using Checkbochs include null-pointer checks, format-string vulnerabilities, user/kernel pointer checks, and race-conditions. On implementing these checks, we were able to uncover previously-unknown bugs in widely used Linux distributions. We also tested our tools on undergraduate coursework, and found numerous bugs.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 23:21:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Bansal", "Sorav", "" ] ]
cs/0601069
Boris Ryabko
Boris Ryabko
Fast Enumeration of Combinatorial Objects
null
published in Discrete Math.and Applications, v.10, n2, 1998
null
null
cs.CC cs.DM
null
The problem of ranking can be described as follows. We have a set of combinatorial objects $S$, such as, say, the k-subsets of n things, and we can imagine that they have been arranged in some list, say lexicographically, and we want to have a fast method for obtaining the rank of a given object in the list. This problem is widely known in Combinatorial Analysis, Computer Science and Information Theory. Ranking is closely connected with the hashing problem, especially with perfect hashing and with generating of random combinatorial objects. In Information Theory the ranking problem is closely connected with so-called enumerative encoding, which may be described as follows: there is a set of words $S$ and an enumerative code has to one-to-one encode every $s \in S$ by a binary word $code(s)$. The length of the $code(s)$ must be the same for all $s \in S$. Clearly, $|code (s)|\geq \log |S|$. (Here and below $\log x=\log_{2}x)$.) The suggested method allows the exponential growth of the speed of encoding and decoding for all combinatorial problems of enumeration which are considered, including the enumeration of permutations, compositions and others.
[ { "version": "v1", "created": "Sun, 15 Jan 2006 13:55:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Ryabko", "Boris", "" ] ]
cs/0601071
Antonio J. Fernandez
Antonio J. Fernandez, Teresa Hortala-Gonzalez, Fernando Saenz-Perez and Rafael del Vado-Virseda
Constraint Functional Logic Programming over Finite Domains
Accepted for publication in Theory and Practice of Logic programming (TPLP); 47 pages
null
null
null
cs.PL
null
In this paper, we present our proposal to Constraint Functional Logic Programming over Finite Domains (CFLP(FD)) with a lazy functional logic programming language which seamlessly embodies finite domain (FD) constraints. This proposal increases the expressiveness and power of constraint logic programming over finite domains (CLP(FD)) by combining functional and relational notation, curried expressions, higher-order functions, patterns, partial applications, non-determinism, lazy evaluation, logical variables, types, domain variables, constraint composition, and finite domain constraints. We describe the syntax of the language, its type discipline, and its declarative and operational semantics. We also describe TOY(FD), an implementation for CFLPFD(FD), and a comparison of our approach with respect to CLP(FD) from a programming point of view, showing the new features we introduce. And, finally, we show a performance analysis which demonstrates that our implementation is competitive with respect to existing CLP(FD) systems and that clearly outperforms the closer approach to CFLP(FD).
[ { "version": "v1", "created": "Mon, 16 Jan 2006 11:45:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Fernandez", "Antonio J.", "" ], [ "Hortala-Gonzalez", "Teresa", "" ], [ "Saenz-Perez", "Fernando", "" ], [ "del Vado-Virseda", "Rafael", "" ] ]
cs/0601076
Kuan-San Ooi
K. S. Ooi
Learning by Test-infecting Symmetric Ciphers
null
null
null
null
cs.CR
null
We describe a novel way in which students can learn the cipher systems without much supervision. In this work we focus on learning symmetric ciphers by altering them using the agile development approach. Two agile approaches the eXtreme Programming (XP) and the closely related Test-Driven Development (TDD) are mentioned or discussed. To facilitate this development we experiment with an approach that is based on refactoring, with JUnit serves as the automatic testing framework. In this work we exemplify our learning approach by test-infecting the Vernam cipher, an aged but still widely used stream cipher. One can replace the cipher with another symmetric cipher with the same behavior. Software testing is briefly described. Just-in-time introduction to Object-oriented programming (OOP), exemplified by using JavaTM, is advocated. Refactoring exercises, as argued, are kept strategically simple so that they do not become intensive class redesign exercises. The use of free or open-source tools and frameworks is mentioned.
[ { "version": "v1", "created": "Tue, 17 Jan 2006 08:48:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Ooi", "K. S.", "" ] ]
cs/0601078
Benjamin Gaidioz
Benjamin Gaidioz, Birger Koblitz, Nuno Santos
Exploring high performance distributed file storage using LDPC codes
null
null
null
null
cs.DC
null
We explore the feasibility of implementing a reliable, high performance, distributed storage system on a commodity computing cluster. Files are distributed across storage nodes using erasure coding with small Low-Density Parity-Check (LDPC) codes which provide high reliability while keeping the storage and performance overhead small. We present performance measurements done on a prototype system comprising 50 nodes which are self organised using a peer-to-peer overlay.
[ { "version": "v1", "created": "Tue, 17 Jan 2006 13:30:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Gaidioz", "Benjamin", "" ], [ "Koblitz", "Birger", "" ], [ "Santos", "Nuno", "" ] ]
cs/0601079
William Yurcik
Katherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam Slagell
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
19 pages, 11 figures, 4 tables
null
null
null
cs.CR
null
In the UNIX/Linux environment the kernel can log every command process created by every user using process accounting. This data has many potential uses, including the investigation of security incidents. However, process accounting data is also sensitive since it contains private user information. Consequently, security system administrators have been hindered from sharing these logs. Given that many interesting security applications could use process accounting data, it would be useful to have a tool that could protect private user information in the logs. For this reason we introduce SCRUB-PA, a tool that uses multi-level multi-dimensional anonymization on process accounting log files in order to provide different levels of privacy protection. It is our goal that SCRUB-PA will promote the sharing of process accounting logs while preserving privacy.
[ { "version": "v1", "created": "Wed, 18 Jan 2006 01:08:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Luo", "Katherine", "" ], [ "Li", "Yifan", "" ], [ "Ermopoulos", "Charis", "" ], [ "Yurcik", "William", "" ], [ "Slagell", "Adam", "" ] ]
cs/0601081
Andrej (Andy) Brodnik
Andrej Brodnik, Johan Karlsson, J. Ian Munro, Andreas Nilsson
An O(1) Solution to the Prefix Sum Problem on a Specialized Memory Architecture
12 pages
null
null
null
cs.DS cs.CC cs.IR
null
In this paper we study the Prefix Sum problem introduced by Fredman. We show that it is possible to perform both update and retrieval in O(1) time simultaneously under a memory model in which individual bits may be shared by several words. We also show that two variants (generalizations) of the problem can be solved optimally in $\Theta(\lg N)$ time under the comparison based model of computation.
[ { "version": "v1", "created": "Wed, 18 Jan 2006 21:20:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Brodnik", "Andrej", "" ], [ "Karlsson", "Johan", "" ], [ "Munro", "J. Ian", "" ], [ "Nilsson", "Andreas", "" ] ]
cs/0601082
Shai Carmi
Shai Carmi, Reuven Cohen and Danny Dolev
Search in Complex Networks : a New Method of Naming
5 pages, 4 figures
Europhys. Lett., 74 (6), pp. 1102-1108 (2006)
10.1209/epl/i2006-10049-1
null
cs.NI cond-mat.dis-nn
null
We suggest a method for routing when the source does not posses full information about the shortest path to the destination. The method is particularly useful for scale-free networks, and exploits its unique characteristics. By assigning new (short) names to nodes (aka labelling) we are able to reduce significantly the memory requirement at the routers, yet we succeed in routing with high probability through paths very close in distance to the shortest ones.
[ { "version": "v1", "created": "Wed, 18 Jan 2006 21:21:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Carmi", "Shai", "" ], [ "Cohen", "Reuven", "" ], [ "Dolev", "Danny", "" ] ]
cs/0601084
Robert Schweller
Ming-Yang Kao, Manan Sanghi, Robert Schweller
Randomized Fast Design of Short DNA Words
null
Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP 2005), Lisboa, Portugal, July 11-15, 2005, pp. 1275-1286
null
null
cs.DS
null
We consider the problem of efficiently designing sets (codes) of equal-length DNA strings (words) that satisfy certain combinatorial constraints. This problem has numerous motivations including DNA computing and DNA self-assembly. Previous work has extended results from coding theory to obtain bounds on code size for new biologically motivated constraints and has applied heuristic local search and genetic algorithm techniques for code design. This paper proposes a natural optimization formulation of the DNA code design problem in which the goal is to design n strings that satisfy a given set of constraints while minimizing the length of the strings. For multiple sets of constraints, we provide high-probability algorithms that run in time polynomial in n and any given constraint parameters, and output strings of length within a constant factor of the optimal. To the best of our knowledge, this work is the first to consider this type of optimization problem in the context of DNA code design.
[ { "version": "v1", "created": "Thu, 19 Jan 2006 00:22:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Kao", "Ming-Yang", "" ], [ "Sanghi", "Manan", "" ], [ "Schweller", "Robert", "" ] ]
cs/0601085
Vicky Weissman
Riccardo Pucella and Vicky Weissman
A Formal Foundation for ODRL
30 pgs, preliminary version presented at WITS-04 (Workshop on Issues in the Theory of Security), 2004
null
null
null
cs.LO cs.CR
null
ODRL is a popular XML-based language for stating the conditions under which resources can be accessed legitimately. The language is described in English and, as a result, agreements written in ODRL are open to interpretation. To address this problem, we propose a formal semantics for a representative fragment of the language. We use this semantics to determine precisely when a permission is implied by a set of ODRL statements and show that answering such questions is a decidable NP-hard problem. Finally, we define a tractable fragment of ODRL that is also fairly expressive.
[ { "version": "v1", "created": "Thu, 19 Jan 2006 02:41:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ], [ "Weissman", "Vicky", "" ] ]
cs/0601086
Stephen Cook
Stephen Cook
Comments on Beckmann's Uniform Reducts
null
null
null
null
cs.CC
null
Arnold Beckmann defined the uniform reduct of a propositional proof system f to be the set of those bounded arithmetical formulas whose propositional translations have polynomial size f-proofs. We prove that the uniform reduct of f + Extended Frege consists of all true bounded arithmetical formulas iff f + Extended Frege simulates every proof system.
[ { "version": "v1", "created": "Thu, 19 Jan 2006 22:56:49 GMT" }, { "version": "v2", "created": "Mon, 23 Jan 2006 18:08:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Cook", "Stephen", "" ] ]
cs/0601087
Victor Kromer
Kromer Victor
Processing of Test Matrices with Guessing Correction
10 pages, in Russian
null
null
null
cs.LG
null
It is suggested to insert into test matrix 1s for correct responses, 0s for response refusals, and negative corrective elements for incorrect responses. With the classical test theory approach test scores of examinees and items are calculated traditionally as sums of matrix elements, organized in rows and columns. Correlation coefficients are estimated using correction coefficients. In item response theory approach examinee and item logits are estimated using maximum likelihood method and probabilities of all matrix elements.
[ { "version": "v1", "created": "Fri, 20 Jan 2006 05:40:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Victor", "Kromer", "" ] ]
cs/0601096
Nicolas Tabareau
Deepak D'Souza, Nicolas Tabareau (PPS)
On timed automata with input-determined guards
null
null
null
null
cs.LO
null
We consider a general notion of timed automata with input-determined guards and show that they admit a robust logical framework along the lines of [D 'Souza03], in terms of a monadic second order logic characterisation and an expressively complete timed temporal logic. We then generalize these automata using the notion of recursive operators introduced by Henzinger, Raskin, and Schobbens, and show that they admit a similar logical framework. These results hold in the ``pointwise'' semantics. We finally use this framework to show that the real-time logic MITL of Alur et al is expressively complete with respect to an MSO corresponding to an appropriate input-determined operator.
[ { "version": "v1", "created": "Mon, 23 Jan 2006 10:45:25 GMT" } ]
2007-05-23T00:00:00
[ [ "D'Souza", "Deepak", "", "PPS" ], [ "Tabareau", "Nicolas", "", "PPS" ] ]
cs/0601097
B.S.Shajee Mohan
B.S. Shajeemohan, Dr. V.K. Govindan
Compression Scheme for Faster and Secure Data Transmission Over Internet
null
null
null
null
cs.PF cs.DC
null
Compression algorithms reduce the redundancy in data representation to decrease the storage required for that data. Data compression offers an attractive approach to reducing communication costs by using available bandwidth effectively. Over the last decade there has been an unprecedented explosion in the amount of digital data transmitted via the Internet, representing text, images, video, sound, computer programs, etc. With this trend expected to continue, it makes sense to pursue research on developing algorithms that can most effectively use available network bandwidth by maximally compressing data. It is also important to consider the security aspects of the data being transmitted while compressing it, as most of the text data transmitted over the Internet is very much vulnerable to a multitude of attacks. This paper is focused on addressing this problem of lossless compression of text files with an added security.
[ { "version": "v1", "created": "Mon, 23 Jan 2006 11:47:06 GMT" }, { "version": "v2", "created": "Tue, 24 Jan 2006 03:33:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Shajeemohan", "B. S.", "" ], [ "Govindan", "Dr. V. K.", "" ] ]
cs/0601100
Luca Trevisan
Luca Trevisan
Pseudorandomness and Combinatorial Constructions
Submitted to the Proceedings of ICM'06, Madrid
null
null
null
cs.CC math.CO
null
In combinatorics, the probabilistic method is a very powerful tool to prove the existence of combinatorial objects with interesting and useful properties. Explicit constructions of objects with such properties are often very difficult, or unknown. In computer science, probabilistic algorithms are sometimes simpler and more efficient than the best known deterministic algorithms for the same problem. Despite this evidence for the power of random choices, the computational theory of pseudorandomness shows that, under certain complexity-theoretic assumptions, every probabilistic algorithm has an efficient deterministic simulation and a large class of applications of the the probabilistic method can be converted into explicit constructions. In this survey paper we describe connections between the conditional ``derandomization'' results of the computational theory of pseudorandomness and unconditional explicit constructions of certain combinatorial objects such as error-correcting codes and ``randomness extractors.''
[ { "version": "v1", "created": "Mon, 23 Jan 2006 19:24:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Trevisan", "Luca", "" ] ]
cs/0601103
Philipp Mayr
Philipp Mayr, Fabio Tosques
Google Web APIs - an Instrument for Webometric Analyses?
2 pages, 2 figures, 10th International Conference of the International Society for Scientometrics and Informetrics
null
null
null
cs.IR
null
This paper introduces Google Web APIs (Google APIs) as an instrument and playground for webometric studies. Several examples of Google APIs implementations are given. Our examples show that this Google Web Service can be used successfully for informetric Internet based studies albeit with some restrictions.
[ { "version": "v1", "created": "Tue, 24 Jan 2006 10:23:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Mayr", "Philipp", "" ], [ "Tosques", "Fabio", "" ] ]
cs/0601105
Vassilios Vassiliadis
Vassilios S. Vassiliadis
The Perceptron Algorithm: Image and Signal Decomposition, Compression, and Analysis by Iterative Gaussian Blurring
null
null
null
null
cs.CV
null
A novel algorithm for tunable compression to within the precision of reproduction targets, or storage, is proposed. The new algorithm is termed the `Perceptron Algorithm', which utilises simple existing concepts in a novel way, has multiple immediate commercial application aspects as well as it opens up a multitude of fronts in computational science and technology. The aims of this paper are to present the concepts underlying the algorithm, observations by its application to some example cases, and the identification of a multitude of potential areas of applications such as: image compression by orders of magnitude, signal compression including sound as well, image analysis in a multilayered detailed analysis, pattern recognition and matching and rapid database searching (e.g. face recognition), motion analysis, biomedical applications e.g. in MRI and CAT scan image analysis and compression, as well as hints on the link of these ideas to the way how biological memory might work leading to new points of view in neural computation. Commercial applications of immediate interest are the compression of images at the source (e.g. photographic equipment, scanners, satellite imaging systems), DVD film compression, pay-per-view downloads acceleration and many others identified in the present paper at its conclusion and future work section.
[ { "version": "v1", "created": "Tue, 24 Jan 2006 17:23:17 GMT" }, { "version": "v2", "created": "Wed, 25 Jan 2006 10:40:53 GMT" }, { "version": "v3", "created": "Thu, 26 Jan 2006 08:42:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Vassiliadis", "Vassilios S.", "" ] ]
cs/0601106
Vassilios Vassiliadis
Vassilios S. Vassiliadis
The `Face on Mars': a photographic approach for the search of signs of past civilizations from a macroscopic point of view, factoring long-term erosion in image reconstruction
9 pages
null
null
null
cs.CV
null
This short article presents an alternative view of high resolution imaging from various sources with the aim of the discovery of potential sites of archaeological importance, or sites that exhibit `anomalies' such that they may merit closer inspection and analysis. It is conjectured, and to a certain extent demonstrated here, that it is possible for advanced civilizations to factor in erosion by natural processes into a large scale design so that main features be preserved even with the passage of millions of years. Alternatively viewed, even without such intent embedded in a design left for posterity, it is possible that a gigantic construction may naturally decay in such a way that even cataclysmic (massive) events may leave sufficient information intact with the passage of time, provided one changes the point of view from high resolution images to enhanced blurred renderings of the sites in question.
[ { "version": "v1", "created": "Tue, 24 Jan 2006 18:12:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Vassiliadis", "Vassilios S.", "" ] ]
cs/0601108
Alain Lifchitz
Alain Lifchitz, Frederic Maire and Dominique Revuz
Fast Lexically Constrained Viterbi Algorithm (FLCVA): Simultaneous Optimization of Speed and Memory
5 pages, 2 figures, 4 tables
null
null
null
cs.CV cs.AI cs.DS
null
Lexical constraints on the input of speech and on-line handwriting systems improve the performance of such systems. A significant gain in speed can be achieved by integrating in a digraph structure the different Hidden Markov Models (HMM) corresponding to the words of the relevant lexicon. This integration avoids redundant computations by sharing intermediate results between HMM's corresponding to different words of the lexicon. In this paper, we introduce a token passing method to perform simultaneously the computation of the a posteriori probabilities of all the words of the lexicon. The coding scheme that we introduce for the tokens is optimal in the information theory sense. The tokens use the minimum possible number of bits. Overall, we optimize simultaneously the execution speed and the memory requirement of the recognition systems.
[ { "version": "v1", "created": "Wed, 25 Jan 2006 17:50:13 GMT" }, { "version": "v2", "created": "Wed, 1 Feb 2006 13:05:36 GMT" }, { "version": "v3", "created": "Thu, 2 Feb 2006 23:00:28 GMT" }, { "version": "v4", "created": "Sun, 19 Mar 2006 16:40:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Lifchitz", "Alain", "" ], [ "Maire", "Frederic", "" ], [ "Revuz", "Dominique", "" ] ]
cs/0601111
Ted Herman
Chen Zhang, Ted Herman
Localization in Wireless Sensor Grids
17 pages, 6 figures
null
null
TR01-06
cs.DC
null
This work reports experiences on using radio ranging to position sensors in a grid topology. The implementation is simple, efficient, and could be practically distributed. The paper describes an implementation and experimental result based on RSSI distance estimation. Novel techniques such as fuzzy membership functions and table lookup are used to obtain more accurate result and simplify the computation. An 86% accuracy is achieved in the experiment in spite of inaccurate RSSI distance estimates with errors up to 60%.
[ { "version": "v1", "created": "Wed, 25 Jan 2006 23:48:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Chen", "" ], [ "Herman", "Ted", "" ] ]
cs/0601117
Prashant Singh
Dhananjay D. Kulkarni, Shekhar Verma, Prashant
Finding Cliques of a Graph using Prime Numbers
7 pages, 1 figure
null
null
null
cs.DS
null
This paper proposes a new algorithm for solving maximal cliques for simple undirected graphs using the theory of prime numbers. A novel approach using prime numbers is used to find cliques and ends with a discussion of the algorithm.
[ { "version": "v1", "created": "Fri, 27 Jan 2006 20:11:14 GMT" }, { "version": "v2", "created": "Thu, 18 Jan 2007 22:48:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Kulkarni", "Dhananjay D.", "" ], [ "Verma", "Shekhar", "" ], [ "Prashant", "", "" ] ]
cs/0601118
Richard McClatchey
David Manset, Herve Verjus, Richard McClatchey, Flavio Oquendo
A Formal Architecture-Centric Model-Driven Approach for the Automatic Generation of Grid Applications
11 pages, 9 figures. Proc of the 8th International Conference on Enterprise Information Systems (ICEIS06) Paphos, Cyprus. May 2006
null
null
null
cs.SE
null
This paper discusses the concept of model-driven software engineering applied to the Grid application domain. As an extension to this concept, the approach described here, attempts to combine both formal architecture-centric and model-driven paradigms. It is a commonly recognized statement that Grid systems have seldom been designed using formal techniques although from past experience such techniques have shown advantages. This paper advocates a formal engineering approach to Grid system developments in an effort to contribute to the rigorous development of Grids software architectures. This approach addresses quality of service and cross-platform developments by applying the model-driven paradigm to a formal architecture-centric engineering method. This combination benefits from a formal semantic description power in addition to model-based transformations. The result of such a novel combined concept promotes the re-use of design models and facilitates developments in Grid computing.
[ { "version": "v1", "created": "Sat, 28 Jan 2006 00:08:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Manset", "David", "" ], [ "Verjus", "Herve", "" ], [ "McClatchey", "Richard", "" ], [ "Oquendo", "Flavio", "" ] ]
cs/0601119
Richard McClatchey
Haya El-Ghalayini, Mohammed Odeh, & Richard McClatchey
Engineering Conceptual Data Models from Domain Ontologies: A Critical Evaluation
12 pages, 3 figures, presented at the 4th International Conference on Computer Science and Information Technology (CSIT'06). Amman Jordan April 2006
null
null
null
cs.SE
null
This paper studies the differences and similarities between domain ontologies and conceptual data models and the role that ontologies can play in establishing conceptual data models during the process of information systems development. A mapping algorithm has been proposed and embedded in a special purpose Transformation Engine to generate a conceptual data model from a given domain ontology. Both quantitative and qualitative methods have been adopted to critically evaluate this new approach. In addition, this paper focuses on evaluating the quality of the generated conceptual data model elements using Bunge-Wand-Weber and OntoClean ontologies. The results of this evaluation indicate that the generated conceptual data model provides a high degree of accuracy in identifying the substantial domain entities along with their attributes and relationships being derived from the consensual semantics of domain knowledge. The results are encouraging and support the potential role that this approach can take part in process of information system development.
[ { "version": "v1", "created": "Sat, 28 Jan 2006 17:40:44 GMT" } ]
2007-05-23T00:00:00
[ [ "El-Ghalayini", "Haya", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ] ]
cs/0601121
Marko Antonio Rodriguez
Marko A. Rodriguez
A Multi-Relational Network to Support the Scholarly Communication Process
keywords: digital libraries and scholarly communication
International Journal of Public Information Systems, volume 2007, issue 1, pp. 13-29
null
LA-UR-06-2416
cs.DL cs.AI cs.IR
null
The general pupose of the scholarly communication process is to support the creation and dissemination of ideas within the scientific community. At a finer granularity, there exists multiple stages which, when confronted by a member of the community, have different requirements and therefore different solutions. In order to take a researcher's idea from an initial inspiration to a community resource, the scholarly communication infrastructure may be required to 1) provide a scientist initial seed ideas; 2) form a team of well suited collaborators; 3) located the most appropriate venue to publish the formalized idea; 4) determine the most appropriate peers to review the manuscript; and 5) disseminate the end product to the most interested members of the community. Through the various delinieations of this process, the requirements of each stage are tied soley to the multi-functional resources of the community: its researchers, its journals, and its manuscritps. It is within the collection of these resources and their inherent relationships that the solutions to scholarly communication are to be found. This paper describes an associative network composed of multiple scholarly artifacts that can be used as a medium for supporting the scholarly communication process.
[ { "version": "v1", "created": "Sat, 28 Jan 2006 22:45:42 GMT" }, { "version": "v2", "created": "Mon, 21 May 2007 13:35:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodriguez", "Marko A.", "" ] ]
cs/0601125
Carl Lagoze
Carl Lagoze, Dean Krafft, Tim Cornwell, Naomi Dushay, Dean Eckstrom, and John Saylor
Metadata aggregation and "automated digital libraries": A retrospective on the NSDL experience
Submission to JCDL 2006
null
null
null
cs.DL
null
Over three years ago, the Core Integration team of the National Science Digital Library (NSDL) implemented a digital library based on metadata aggregation using Dublin Core and OAI-PMH. The initial expectation was that such low-barrier technologies would be relatively easy to automate and administer. While this architectural choice permitted rapid deployment of a production NSDL, our three years of experience have contradicted our original expectations of easy automation and low people cost. We have learned that alleged "low-barrier" standards are often harder to deploy than expected. In this paper we report on this experience and comment on the general cost, the functionality, and the ultimate effectiveness of this architecture.
[ { "version": "v1", "created": "Mon, 30 Jan 2006 12:26:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Krafft", "Dean", "" ], [ "Cornwell", "Tim", "" ], [ "Dushay", "Naomi", "" ], [ "Eckstrom", "Dean", "" ], [ "Saylor", "John", "" ] ]
cs/0601129
Abhilash Ponnath
Abhilash Ponnath
Instantaneously Trained Neural Networks
13 pages
null
null
null
cs.NE cs.AI
null
This paper presents a review of instantaneously trained neural networks (ITNNs). These networks trade learning time for size and, in the basic model, a new hidden node is created for each training sample. Various versions of the corner-classification family of ITNNs, which have found applications in artificial intelligence (AI), are described. Implementation issues are also considered.
[ { "version": "v1", "created": "Mon, 30 Jan 2006 22:02:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Ponnath", "Abhilash", "" ] ]
cs/0602001
Lane A. Hemaspaandra
Lane A. Hemaspaandra and Mayur Thakur
Query-Monotonic Turing Reductions
null
null
null
URCS-TR-818
cs.CC
null
We study reductions that limit the extreme adaptivity of Turing reductions. In particular, we study reductions that make a rapid, structured progression through the set to which they are reducing: Each query is strictly longer (shorter) than the previous one. We call these reductions query-increasing (query-decreasing) Turing reductions. We also study query-nonincreasing (query-nondecreasing) Turing reductions. These are Turing reductions in which the sequence of query lengths is nonincreasing (nondecreasing). We ask whether these restrictions in fact limit the power of reductions. We prove that query-increasing and query-decreasing Turing reductions are incomparable with (that is, are neither strictly stronger than nor strictly weaker than) truth-table reductions and are strictly weaker than Turing reductions. In addition, we prove that query-nonincreasing and query-nondecreasing Turing reductions are strictly stronger than truth-table reductions and strictly weaker than Turing reductions. Despite the fact that we prove query-increasing and query-decreasing Turing reductions to in the general case be strictly weaker than Turing reductions, we identify a broad class of sets A for which any set that Turing reduces to A will also reduce to A via both query-increasing and query-decreasing Turing reductions. In particular, this holds for all tight paddable sets, where a set is said to be tight paddable exactly if it is paddable via a function whose output length is bounded tightly both from above and from below in the length of the input. We prove that many natural NP-complete problems such as satisfiability, clique, and vertex cover are tight paddable.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 22:02:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Thakur", "Mayur", "" ] ]
cs/0602003
Subhash Kak
Navneet Mandhani and Subhash Kak
Watermarking Using Decimal Sequences
8 pages, 9 figures
Cryptologia, vol. 29, pp. 50-58, 2005
null
null
cs.CR
null
This paper introduces the use of decimal sequences in a code division multiple access (CDMA) based watermarking system to hide information for authentication in black and white images. Matlab version 6.5 was used to implement the algorithms discussed in this paper. The advantage of using d-sequences over PN sequences is that one can choose from a variety of prime numbers which provides a more flexible system.
[ { "version": "v1", "created": "Thu, 2 Feb 2006 19:43:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Mandhani", "Navneet", "" ], [ "Kak", "Subhash", "" ] ]
cs/0602004
Christoph Koch
Georg Gottlob, Christoph Koch, Klaus U. Schulz
Conjunctive Queries over Trees
36 pages, 12 figures, 2 tables, long version of PODS 2004 papers. To appear in Journal of the ACM 53(2), March 2006
null
null
null
cs.DB cs.AI cs.CC cs.LO
null
We study the complexity and expressive power of conjunctive queries over unranked labeled trees represented using a variety of structure relations such as ``child'', ``descendant'', and ``following'' as well as unary relations for node labels. We establish a framework for characterizing structures representing trees for which conjunctive queries can be evaluated efficiently. Then we completely chart the tractability frontier of the problem and establish a dichotomy theorem for our axis relations, i.e., we find all subset-maximal sets of axes for which query evaluation is in polynomial time and show that for all other cases, query evaluation is NP-complete. All polynomial-time results are obtained immediately using the proof techniques from our framework. Finally, we study the expressiveness of conjunctive queries over trees and show that for each conjunctive query, there is an equivalent acyclic positive query (i.e., a set of acyclic conjunctive queries), but that in general this query is not of polynomial size.
[ { "version": "v1", "created": "Thu, 2 Feb 2006 23:28:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Gottlob", "Georg", "" ], [ "Koch", "Christoph", "" ], [ "Schulz", "Klaus U.", "" ] ]
cs/0602008
Julio Mari\~no
Julio Marino, Angel Herranz and Juan Jose Moreno-Navarro
Demand Analysis with Partial Predicates
This is the extended version of a paper accepted for publication in a forthcoming special issue of Theory and Practice of Logic Programming on Multiparadigm and Constraint Programming (Falaschi and Maher, eds.) Appendices are missing in the printed version
null
null
null
cs.PL cs.SC
null
In order to alleviate the inefficiencies caused by the interaction of the logic and functional sides, integrated languages may take advantage of \emph{demand} information -- i.e. knowing in advance which computations are needed and, to which extent, in a particular context. This work studies \emph{demand analysis} -- which is closely related to \emph{backwards strictness analysis} -- in a semantic framework of \emph{partial predicates}, which in turn are constructive realizations of ideals in a domain. This will allow us to give a concise, unified presentation of demand analysis, to relate it to other analyses based on abstract interpretation or strictness logics, some hints for the implementation, and, more important, to prove the soundness of our analysis based on \emph{demand equations}. There are also some innovative results. One of them is that a set constraint-based analysis has been derived in a stepwise manner using ideas taken from the area of program transformation. The other one is the possibility of using program transformation itself to perform the analysis, specially in those domains of properties where algorithms based on constraint solving are too weak.
[ { "version": "v1", "created": "Sat, 4 Feb 2006 20:22:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Marino", "Julio", "" ], [ "Herranz", "Angel", "" ], [ "Moreno-Navarro", "Juan Jose", "" ] ]
cs/0602010
Robert Schweller
Ming-Yang Kao, Robert Schweller
Reducing Tile Complexity for Self-Assembly Through Temperature Programming
A preliminary version of this paper appeared in Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2006), Miami, Florida, Jan. 2006
null
null
null
cs.CC
null
We consider the tile self-assembly model and how tile complexity can be eliminated by permitting the temperature of the self-assembly system to be adjusted throughout the assembly process. To do this, we propose novel techniques for designing tile sets that permit an arbitrary length $m$ binary number to be encoded into a sequence of $O(m)$ temperature changes such that the tile set uniquely assembles a supertile that precisely encodes the corresponding binary number. As an application, we show how this provides a general tile set of size O(1) that is capable of uniquely assembling essentially any $n\times n$ square, where the assembled square is determined by a temperature sequence of length $O(\log n)$ that encodes a binary description of $n$. This yields an important decrease in tile complexity from the required $\Omega(\frac{\log n}{\log\log n})$ for almost all $n$ when the temperature of the system is fixed. We further show that for almost all $n$, no tile system can simultaneously achieve both $o(\log n)$ temperature complexity and $o(\frac{\log n}{\log\log n})$ tile complexity, showing that both versions of an optimal square building scheme have been discovered. This work suggests that temperature change can constitute a natural, dynamic method for providing input to self-assembly systems that is potentially superior to the current technique of designing large tile sets with specific inputs hardwired into the tileset.
[ { "version": "v1", "created": "Sun, 5 Feb 2006 01:00:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Kao", "Ming-Yang", "" ], [ "Schweller", "Robert", "" ] ]
cs/0602013
David Pritchard
David Pritchard
An Optimal Distributed Edge-Biconnectivity Algorithm
Submitted to PODC 2006. Contains a pstricks figure
null
null
null
cs.DC
null
We describe a synchronous distributed algorithm which identifies the edge-biconnected components of a connected network. It requires a leader, and uses messages of size O(log |V|). The main idea is to preorder a BFS spanning tree, and then to efficiently compute least common ancestors so as to mark cycle edges. This algorithm takes O(Diam) time and uses O(|E|) messages. Furthermore, we show that no correct singly-initiated edge-biconnectivity algorithm can beat either bound on any graph by more than a constant factor. We also describe a near-optimal local algorithm for edge-biconnectivity.
[ { "version": "v1", "created": "Sun, 5 Feb 2006 20:47:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritchard", "David", "" ] ]
cs/0602018
Jiyou Jia Dr.
Jiyou Jia, Shufen Hou, Weichao Chen
Improving the CSIEC Project and Adapting It to the English Teaching and Learning in China
null
null
null
null
cs.CY cs.AI cs.CL cs.HC cs.MA
null
In this paper after short review of the CSIEC project initialized by us in 2003 we present the continuing development and improvement of the CSIEC project in details, including the design of five new Microsoft agent characters representing different virtual chatting partners and the limitation of simulated dialogs in specific practical scenarios like graduate job application interview, then briefly analyze the actual conditions and features of its application field: web-based English education in China. Finally we introduce our efforts to adapt this system to the requirements of English teaching and learning in China and point out the work next to do.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 15:17:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Jia", "Jiyou", "" ], [ "Hou", "Shufen", "" ], [ "Chen", "Weichao", "" ] ]
cs/0602019
Nie Nie
Nie Nie and Cristina Comaniciu
Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks
ACM MONET (Mobile Networks and Applications), special issue on "Reconfigurable Radio Technologies in Support of Ubiquitous Seamless Computing"
null
null
null
cs.GT
null
In this work, we propose a game theoretic framework to analyze the behavior of cognitive radios for distributed adaptive channel allocation. We define two different objective functions for the spectrum sharing games, which capture the utility of selfish users and cooperative users, respectively. Based on the utility definition for cooperative users, we show that the channel allocation problem can be formulated as a potential game, and thus converges to a deterministic channel allocation Nash equilibrium point. Alternatively, a no-regret learning implementation is proposed for both scenarios and it is shown to have similar performance with the potential game when cooperation is enforced, but with a higher variability across users. The no-regret learning formulation is particularly useful to accommodate selfish users. Non-cooperative learning games have the advantage of a very low overhead for information exchange in the network. We show that cooperation based spectrum sharing etiquette improves the overall network performance at the expense of an increased overhead required for information exchange.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 00:25:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Nie", "Nie", "" ], [ "Comaniciu", "Cristina", "" ] ]
cs/0602025
Gianluca Argentini
Gianluca Argentini
On local symbolic approximation and resolution of ODEs using Implicit Function Theorem
12 pages, 2 figures; keywords: ordinary differential equations, implicit function theorem, local solutions, symbolic solutions, cavitation
null
null
null
cs.NA math.CA physics.comp-ph
null
In this work the implicit function theorem is used for searching local symbolic resolution of differential equations. General results of existence for first order equations are proven and some examples, one relative to cavitation in a fluid, are developed. These examples seem to show that local approximation of non linear differential equations can give useful informations about symbolic form of possible solutions, and in the case a global solution is known, locally the accuracy of approximation can be good.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 11:44:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0602026
Richard McClatchey
Ashiq Anjum, Richard McClatchey, Arshad Ali & Ian Willers
Bulk Scheduling with DIANA Scheduler
4 pages, 5 figures. Accepted by the Computing for High Energy Physics Conference. Mumbai, Indai. February 2006
null
null
null
cs.DC
null
Results from and progress on the development of a Data Intensive and Network Aware (DIANA) Scheduling engine, primarily for data intensive sciences such as physics analysis, are described. Scientific analysis tasks can involve thousands of computing, data handling, and network resources and the size of the input and output files and the amount of overall storage space allocated to a user necessarily can have significant bearing on the scheduling of data intensive applications. If the input or output files must be retrieved from a remote location, then the time required transferring the files must also be taken into consideration when scheduling compute resources for the given application. The central problem in this study is the coordinated management of computation and data at multiple locations and not simply data movement. However, this can be a very costly operation and efficient scheduling can be a challenge if compute and data resources are mapped without network cost. We have implemented an adaptive algorithm within the DIANA Scheduler which takes into account data location and size, network performance and computation capability to make efficient global scheduling decisions. DIANA is a performance-aware as well as an economy-guided Meta Scheduler. It iteratively allocates each job to the site that is likely to produce the best performance as well as optimizing the global queue for any remaining pending jobs. Therefore it is equally suitable whether a single job is being submitted or bulk scheduling is being performed. Results suggest that considerable performance improvements are to be gained by adopting the DIANA scheduling approach.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 16:47:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Anjum", "Ashiq", "" ], [ "McClatchey", "Richard", "" ], [ "Ali", "Arshad", "" ], [ "Willers", "Ian", "" ] ]
cs/0602027
Krzysztof R. Apt
Krzysztof R. Apt
Explaining Constraint Programming
15 pages, appeared in "Processes, Terms and Cycles: Steps on the Road to Infinity", (A. Middeldorp, V. van Oostrom, F. van Raamsdonk, R. de Vrijer, eds.), LNCS 3838, pp. 55-69. (2005)
null
null
null
cs.PL cs.AI
null
We discuss here constraint programming (CP) by using a proof-theoretic perspective. To this end we identify three levels of abstraction. Each level sheds light on the essence of CP. In particular, the highest level allows us to bring CP closer to the computation as deduction paradigm. At the middle level we can explain various constraint propagation algorithms. Finally, at the lowest level we can address the issue of automatic generation and optimization of the constraint propagation algorithms.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 15:19:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/0602031
Wit Jakuczun
Wit Jakuczun
Classifying Signals with Local Classifiers
null
null
null
null
cs.AI
null
This paper deals with the problem of classifying signals. The new method for building so called local classifiers and local features is presented. The method is a combination of the lifting scheme and the support vector machines. Its main aim is to produce effective and yet comprehensible classifiers that would help in understanding processes hidden behind classified signals. To illustrate the method we present the results obtained on an artificial and a real dataset.
[ { "version": "v1", "created": "Wed, 8 Feb 2006 11:38:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Jakuczun", "Wit", "" ] ]
cs/0602037
Elisa Gorla
J. J. Climent, E. Gorla, J. Rosenthal
Cryptanalysis of the CFVZ cryptosystem
12 pages
null
null
null
cs.CR
null
The paper analyzes a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an elliptic curve. Using an adapted Pollard rho algorithm it is shown that this problem is essentially as hard as solving one discrete logarithm problem in the group of an elliptic curve.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 08:40:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Climent", "J. J.", "" ], [ "Gorla", "E.", "" ], [ "Rosenthal", "J.", "" ] ]
cs/0602038
Gregory Gutin
G. Gutin, P. Hell, A. Rafiey, A. Yeo
Minimum Cost Homomorphisms to Proper Interval Graphs and Bigraphs
null
null
null
null
cs.DM cs.AI
null
For graphs $G$ and $H$, a mapping $f: V(G)\dom V(H)$ is a homomorphism of $G$ to $H$ if $uv\in E(G)$ implies $f(u)f(v)\in E(H).$ If, moreover, each vertex $u \in V(G)$ is associated with costs $c_i(u), i \in V(H)$, then the cost of the homomorphism $f$ is $\sum_{u\in V(G)}c_{f(u)}(u)$. For each fixed graph $H$, we have the {\em minimum cost homomorphism problem}, written as MinHOM($H)$. The problem is to decide, for an input graph $G$ with costs $c_i(u),$ $u \in V(G), i\in V(H)$, whether there exists a homomorphism of $G$ to $H$ and, if one exists, to find one of minimum cost. Minimum cost homomorphism problems encompass (or are related to) many well studied optimization problems. We describe a dichotomy of the minimum cost homomorphism problems for graphs $H$, with loops allowed. When each connected component of $H$ is either a reflexive proper interval graph or an irreflexive proper interval bigraph, the problem MinHOM($H)$ is polynomial time solvable. In all other cases the problem MinHOM($H)$ is NP-hard. This solves an open problem from an earlier paper. Along the way, we prove a new characterization of the class of proper interval bigraphs.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 09:39:36 GMT" }, { "version": "v2", "created": "Tue, 14 Feb 2006 15:36:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Hell", "P.", "" ], [ "Rafiey", "A.", "" ], [ "Yeo", "A.", "" ] ]
cs/0602039
Andrei Arion
Andrei Arion (INRIA Futurs), Angela Bonifati, Ioana Manolescu (INRIA Futurs), Andrea Pugliese
Path Summaries and Path Partitioning in Modern XML Databases
null
null
null
null
cs.DB
null
We study the applicability of XML path summaries in the context of current-day XML databases. We find that summaries provide an excellent basis for optimizing data access methods, which furthermore mixes very well with path-partitioned stores. We provide practical algorithms for building and exploiting summaries, and prove its benefits through extensive experiments.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 12:21:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Arion", "Andrei", "", "INRIA Futurs" ], [ "Bonifati", "Angela", "", "INRIA\n Futurs" ], [ "Manolescu", "Ioana", "", "INRIA\n Futurs" ], [ "Pugliese", "Andrea", "" ] ]
cs/0602042
Wojciech Mazurczyk
Wojciech Mazurczyk, Zbigniew Kotulski
New security and control protocol for VoIP based on steganography and digital watermarking
8 pages, 4 figures, 1 table
Annales UMCS, Informatica, AI 4 (2006), ISNN 1732-1360
null
null
cs.CR cs.MM
null
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic. Additionally this solution offers authentication and integrity, it is capable of exchanging and verifying QoS and security parameters. It is based on digital watermarking and steganography that is why it does not consume additional bandwidth and the data transmitted is inseparably bound to the voice content.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 22:49:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0602043
Shanghua Teng
Xi Chen, Xiaotie Deng and Shang-Hua Teng
Computing Nash Equilibria: Approximation and Smoothed Complexity
null
null
null
null
cs.CC cs.GT
null
We show that the BIMATRIX game does not have a fully polynomial-time approximation scheme, unless PPAD is in P. In other words, no algorithm with time polynomial in n and 1/\epsilon can compute an \epsilon-approximate Nash equilibrium of an n by nbimatrix game, unless PPAD is in P. Instrumental to our proof, we introduce a new discrete fixed-point problem on a high-dimensional cube with a constant side-length, such as on an n-dimensional cube with side-length 7, and show that they are PPAD-complete. Furthermore, we prove, unless PPAD is in RP, that the smoothed complexity of the Lemke-Howson algorithm or any algorithm for computing a Nash equilibrium of a bimatrix game is polynomial in n and 1/\sigma under perturbations with magnitude \sigma. Our result answers a major open question in the smoothed analysis of algorithms and the approximation of Nash equilibria.
[ { "version": "v1", "created": "Sat, 11 Feb 2006 22:46:55 GMT" }, { "version": "v2", "created": "Wed, 22 Feb 2006 00:18:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Xi", "" ], [ "Deng", "Xiaotie", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0602044
Prasanta K. Panigrahi
Siddharth Arora, Jayadev Acharya, Amit Verma, Prasanta K. Panigrahi
Multilevel Thresholding for Image Segmentation through a Fast Statistical Recursive Algorithm
9 pages, 3 figures
null
null
null
cs.CV
null
A novel algorithm is proposed for segmenting an image into multiple levels using its mean and variance. Starting from the extreme pixel values at both ends of the histogram plot, the algorithm is applied recursively on sub-ranges computed from the previous step, so as to find a threshold level and a new sub-range for the next step, until no significant improvement in image quality can be achieved. The method makes use of the fact that a number of distributions tend towards Dirac delta function, peaking at the mean, in the limiting condition of vanishing variance. The procedure naturally provides for variable size segmentation with bigger blocks near the extreme pixel values and finer divisions around the mean or other chosen value for better visualization. Experiments on a variety of images show that the new algorithm effectively segments the image in computationally very less time.
[ { "version": "v1", "created": "Sun, 12 Feb 2006 18:22:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Arora", "Siddharth", "" ], [ "Acharya", "Jayadev", "" ], [ "Verma", "Amit", "" ], [ "Panigrahi", "Prasanta K.", "" ] ]
cs/0602045
Russ Abbott
Russ Abbott
Emergence Explained
67 pages. Earlier versions presented at Lake ArrowHead conference on human complex systems (2005), GECCO 2005 workshop on Biological Applications of Genetic and Evolutionary Computation, and Symposium on Understanding Complex Systems (2005)
null
null
null
cs.MA cs.DC cs.GL
null
Emergence (macro-level effects from micro-level causes) is at the heart of the conflict between reductionism and functionalism. How can there be autonomous higher level laws of nature (the functionalist claim) if everything can be reduced to the fundamental forces of physics (the reductionist position)? We cut through this debate by applying a computer science lens to the way we view nature. We conclude (a) that what functionalism calls the special sciences (sciences other than physics) do indeed study autonomous laws and furthermore that those laws pertain to real higher level entities but (b) that interactions among such higher-level entities is epiphenomenal in that they can always be reduced to primitive physical forces. In other words, epiphenomena, which we will identify with emergent phenomena, do real higher-level work. The proposed perspective provides a framework for understanding many thorny issues including the nature of entities, stigmergy, the evolution of complexity, phase transitions, supervenience, and downward entailment. We also discuss some practical considerations pertaining to systems of systems and the limitations of modeling.
[ { "version": "v1", "created": "Sun, 12 Feb 2006 22:11:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbott", "Russ", "" ] ]
cs/0602051
Fernando Lobo
Fernando G. Lobo, Claudio F. Lima
On the utility of the multimodal problem generator for assessing the performance of Evolutionary Algorithms
Also UALG-ILAB Report No. 200601
null
null
null
cs.NE
null
This paper looks in detail at how an evolutionary algorithm attempts to solve instances from the multimodal problem generator. The paper shows that in order to consistently reach the global optimum, an evolutionary algorithm requires a population size that should grow at least linearly with the number of peaks. It is also shown a close relationship between the supply and decision making issues that have been identified previously in the context of population sizing models for additively decomposable problems. The most important result of the paper, however, is that solving an instance of the multimodal problem generator is like solving a peak-in-a-haystack, and it is argued that evolutionary algorithms are not the best algorithms for such a task. Finally, and as opposed to what several researchers have been doing, it is our strong belief that the multimodal problem generator is not adequate for assessing the performance of evolutionary algorithms.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 10:30:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Fernando G.", "" ], [ "Lima", "Claudio F.", "" ] ]
cs/0602052
Grigoriev Evgeniy
Evgeniy Grigoriev
The OverRelational Manifesto
34 pages
null
null
null
cs.DB cs.DS
null
The OverRelational Manifesto (below ORM) proposes a possible approach to creation of data storage systems of the next generation. ORM starts from the requirement that information in a relational database is represented by a set of relation values. Accordingly, it is assumed that the information about any entity of an enterprise must also be represented as a set of relation values (the ORM main requirement). A system of types is introduced, which allows one to fulfill the main requirement. The data are represented in the form of complex objects, and the state of any object is described as a set of relation values. Emphasize that the types describing the objects are encapsulated, inherited, and polymorphic. Then, it is shown that the data represented as a set of such objects may also be represented as a set of relational values defined on the set of scalar domains (dual data representation). In the general case, any class is associated with a set of relation variables (R-variables) each one containing some data about all objects of this class existing in the system. One of the key points is the fact that the usage of complex (from the user's viewpoint) refined names of R-variables and their attributes makes it possible to preserve the semantics of complex data structures represented in the form of a set of relation values. The most important part of the data storage system created on the approach proposed is an object-oriented translator operating over a relational DBMS. The expressiveness of such a system is comparable with that of OO programming languages.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 12:19:08 GMT" }, { "version": "v2", "created": "Wed, 15 Feb 2006 10:28:24 GMT" }, { "version": "v3", "created": "Fri, 17 Mar 2006 09:57:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Grigoriev", "Evgeniy", "" ] ]
cs/0602053
Thomas Hayes
Varsha Dani and Thomas P. Hayes
How to Beat the Adaptive Multi-Armed Bandit
null
null
null
null
cs.DS cs.LG
null
The multi-armed bandit is a concise model for the problem of iterated decision-making under uncertainty. In each round, a gambler must pull one of $K$ arms of a slot machine, without any foreknowledge of their payouts, except that they are uniformly bounded. A standard objective is to minimize the gambler's regret, defined as the gambler's total payout minus the largest payout which would have been achieved by any fixed arm, in hindsight. Note that the gambler is only told the payout for the arm actually chosen, not for the unchosen arms. Almost all previous work on this problem assumed the payouts to be non-adaptive, in the sense that the distribution of the payout of arm $j$ in round $i$ is completely independent of the choices made by the gambler on rounds $1, \dots, i-1$. In the more general model of adaptive payouts, the payouts in round $i$ may depend arbitrarily on the history of past choices made by the algorithm. We present a new algorithm for this problem, and prove nearly optimal guarantees for the regret against both non-adaptive and adaptive adversaries. After $T$ rounds, our algorithm has regret $O(\sqrt{T})$ with high probability (the tail probability decays exponentially). This dependence on $T$ is best possible, and matches that of the full-information version of the problem, in which the gambler is told the payouts for all $K$ arms after each round. Previously, even for non-adaptive payouts, the best high-probability bounds known were $O(T^{2/3})$, due to Auer, Cesa-Bianchi, Freund and Schapire. The expected regret of their algorithm is $O(T^{1/2}) for non-adaptive payouts, but as we show, $\Omega(T^{2/3})$ for adaptive payouts.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 23:57:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Dani", "Varsha", "" ], [ "Hayes", "Thomas P.", "" ] ]
cs/0602055
Fernando Lobo
Fernando G. Lobo, Claudio F. Lima
Revisiting Evolutionary Algorithms with On-the-Fly Population Size Adjustment
Also UALG-ILAB Report No. 200602
null
null
null
cs.NE
null
In an evolutionary algorithm, the population has a very important role as its size has direct implications regarding solution quality, speed, and reliability. Theoretical studies have been done in the past to investigate the role of population sizing in evolutionary algorithms. In addition to those studies, several self-adjusting population sizing mechanisms have been proposed in the literature. This paper revisits the latter topic and pays special attention to the genetic algorithm with adaptive population size (APGA), for which several researchers have claimed to be very effective at autonomously (re)sizing the population. As opposed to those previous claims, this paper suggests a complete opposite view. Specifically, it shows that APGA is not capable of adapting the population size at all. This claim is supported on theoretical grounds and confirmed by computer simulations.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 13:48:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Fernando G.", "" ], [ "Lima", "Claudio F.", "" ] ]
cs/0602056
Domenico Camarda Dr.
Dino Borri, Domenico Camarda
Building Scenarios for Environmental Management and Planning: An IT-Based Approach
null
null
null
null
cs.MA
null
Oftentimes, the need to build multidiscipline knowledge bases, oriented to policy scenarios, entails the involvement of stakeholders in manifold domains, with a juxtaposition of different languages whose semantics can hardly allow inter-domain transfers. A useful support for planning is the building up of durable IT based interactive platforms, where it is possible to modify initial positions toward a semantic convergence. The present paper shows an area-based application of these tools, for the integrated distance-management of different forms of knowledge expressed by selected stakeholders about environmental planning issues, in order to build alternative development scenarios. Keywords: Environmental planning, Scenario building, Multi-source knowledge, IT-based
[ { "version": "v1", "created": "Wed, 15 Feb 2006 14:46:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Borri", "Dino", "" ], [ "Camarda", "Domenico", "" ] ]
cs/0602057
Christopher Homan
Melanie J. Agnew and Christopher M. Homan
Plane Decompositions as Tools for Approximation
null
null
null
null
cs.DS
null
Tree decompositions were developed by Robertson and Seymour. Since then algorithms have been developed to solve intractable problems efficiently for graphs of bounded treewidth. In this paper we extend tree decompositions to allow cycles to exist in the decomposition graph; we call these new decompositions plane decompositions because we require that the decomposition graph be planar. First, we give some background material about tree decompositions and an overview of algorithms both for decompositions and for approximations of planar graphs. Then, we give our plane decomposition definition and an algorithm that uses this decomposition to approximate the size of the maximum independent set of the underlying graph in polynomial time.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 19:09:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Agnew", "Melanie J.", "" ], [ "Homan", "Christopher M.", "" ] ]
cs/0602059
Suchitra Manepalli
Suchitra Manepalli, Giridhar Manepalli, Michael L. Nelson
D2D: Digital Archive to MPEG-21 DIDL
28 pages, 8 figures
null
null
null
cs.DL
null
Digital Archive to MPEG-21 DIDL (D2D) analyzes the contents of the digital archive and produces an MPEG-21 Digital Item Declaration Language (DIDL) encapsulating the analysis results. DIDL is an extensible XML-based language that aggregates resources and the metadata. We provide a brief report on several analysis techniques applied on the digital archive by the D2D and provide an evaluation of its run-time performance.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 22:18:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Manepalli", "Suchitra", "" ], [ "Manepalli", "Giridhar", "" ], [ "Nelson", "Michael L.", "" ] ]
cs/0602060
Philip Davis
Philip M. Davis, Jason S. Price
eJournal interface can influence usage statistics: implications for libraries, publishers, and Project COUNTER
22 pages, 5 figures. JASIST (in press, 2006)
JASIST v57 n9 (2006):1243-1248
10.1002/asi.20405
null
cs.IR cs.DL
null
The design of a publisher's electronic interface can have a measurable effect on electronic journal usage statistics. A study of journal usage from six COUNTER-compliant publishers at thirty-two research institutions in the United States, the United Kingdom and Sweden indicates that the ratio of PDF to HTML views is not consistent across publisher interfaces, even after controlling for differences in publisher content. The number of fulltext downloads may be artificially inflated when publishers require users to view HTML versions before accessing PDF versions or when linking mechanisms, such as CrossRef, direct users to the full text, rather than the abstract, of each article. These results suggest that usage reports from COUNTER-compliant publishers are not directly comparable in their current form. One solution may be to modify publisher numbers with adjustment factors deemed to be representative of the benefit or disadvantage due to its interface. Standardization of some interface and linking protocols may obviate these differences and allow for more accurate cross-publisher comparisons.
[ { "version": "v1", "created": "Thu, 16 Feb 2006 20:29:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Davis", "Philip M.", "" ], [ "Price", "Jason S.", "" ] ]
cs/0602061
David Anderson
David P. Anderson, Gilles Fedak
The Computational and Storage Potential of Volunteer Computing
8 pages. To appear in CCGrid 2006
null
null
null
cs.DC cs.PF
null
"Volunteer computing" uses Internet-connected computers, volunteered by their owners, as a source of computing power and storage. This paper studies the potential capacity of volunteer computing. We analyzed measurements of over 330,000 hosts participating in a volunteer computing project. These measurements include processing power, memory, disk space, network throughput, host availability, user-specified limits on resource usage, and host churn. We show that volunteer computing can support applications that are significantly more data-intensive, or have larger memory and storage requirements, than those in current projects.
[ { "version": "v1", "created": "Thu, 16 Feb 2006 22:33:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Anderson", "David P.", "" ], [ "Fedak", "Gilles", "" ] ]
cs/0602062
Francois Denis
Fran\c{c}ois Denis (LIF), Yann Esposito (LIF), Amaury Habrard (LIF)
Learning rational stochastic languages
15 pages
null
null
null
cs.LG
null
Given a finite set of words w1,...,wn independently drawn according to a fixed unknown distribution law P called a stochastic language, an usual goal in Grammatical Inference is to infer an estimate of P in some class of probabilistic models, such as Probabilistic Automata (PA). Here, we study the class of rational stochastic languages, which consists in stochastic languages that can be generated by Multiplicity Automata (MA) and which strictly includes the class of stochastic languages generated by PA. Rational stochastic languages have minimal normal representation which may be very concise, and whose parameters can be efficiently estimated from stochastic samples. We design an efficient inference algorithm DEES which aims at building a minimal normal representation of the target. Despite the fact that no recursively enumerable class of MA computes exactly the set of rational stochastic languages over Q, we show that DEES strongly identifies tis set in the limit. We study the intermediary MA output by DEES and show that they compute rational series which converge absolutely to one and which can be used to provide stochastic languages which closely estimate the target.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 08:57:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Denis", "François", "", "LIF" ], [ "Esposito", "Yann", "", "LIF" ], [ "Habrard", "Amaury", "", "LIF" ] ]
cs/0602063
Tony Thomas
Tony Thomas, Arbind Kumar Lal
Group Signature Schemes Using Braid Groups
null
null
null
null
cs.CR
null
Artin's braid groups have been recently suggested as a new source for public-key cryptography. In this paper we propose the first group signature schemes based on the conjugacy problem, decomposition problem and root problem in the braid groups which are believed to be hard problems.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 10:32:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Thomas", "Tony", "" ], [ "Lal", "Arbind Kumar", "" ] ]
cs/0602064
Ana Romero
A. Romero, J. Rubio, F. Sergeraert
Computing spectral sequences
null
null
null
null
cs.SC
null
In this paper, a set of programs enhancing the Kenzo system is presented. Kenzo is a Common Lisp program designed for computing in Algebraic Topology, in particular it allows the user to calculate homology and homotopy groups of complicated spaces. The new programs presented here entirely compute Serre and Eilenberg-Moore spectral sequences, in particular the groups and differential maps for arbitrary r. They also determine when the spectral sequence has converged and describe the filtration of the target homology groups induced by the spectral sequence.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 12:29:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Romero", "A.", "" ], [ "Rubio", "J.", "" ], [ "Sergeraert", "F.", "" ] ]
cs/0602065
Paul Vitanyi
Rudi Cilibrasi (CWI) and Paul Vitanyi (CWI and University of Amsterdam)
Similarity of Objects and the Meaning of Words
LaTeX, 25 pages, 7 figures. Proc. 3rd Conf. Theory and Applications of Models of Computation (TAMC), 15-20 May, 2006, Beijing, China (Invited paper) This is an extended version of the 5-page abstract cs.IR/0504089
null
null
null
cs.CV cs.IR
null
We survey the emerging area of compression-based, parameter-free, similarity distance measures useful in data-mining, pattern recognition, learning and automatic semantics extraction. Given a family of distances on a set of objects, a distance is universal up to a certain precision for that family if it minorizes every distance in the family between every two objects in the set, up to the stated precision (we do not require the universal distance to be an element of the family). We consider similarity distances for two types of objects: literal objects that as such contain all of their meaning, like genomes or books, and names for objects. The latter may have literal embodyments like the first type, but may also be abstract like ``red'' or ``christianity.'' For the first type we consider a family of computable distance measures corresponding to parameters expressing similarity according to particular featuresdistances generated by web users corresponding to particular semantic relations between the (names for) the designated objects. For both families we give universal similarity distance measures, incorporating all particular distance measures in the family. In the first case the universal distance is based on compression and in the second case it is based on Google page counts related to search terms. In both cases experiments on a massive scale give evidence of the viability of the approaches. between pairs of literal objects. For the second type we consider similarity
[ { "version": "v1", "created": "Fri, 17 Feb 2006 16:15:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Cilibrasi", "Rudi", "", "CWI" ], [ "Vitanyi", "Paul", "", "CWI and University of\n Amsterdam" ] ]
cs/0602068
Kenneth Koehler
K. R. Koehler
Parallel Symbolic Computation of Curvature Invariants in General Relativity
9 pages, submitted to Journal of Computational Physics
null
null
null
cs.DC cs.SC gr-qc
null
We present a practical application of parallel symbolic computation in General Relativity: the calculation of curvature invariants for large dimension. We discuss the structure of the calculations, an implementation of the technique and scaling of the computation with spacetime dimension for various invariants.
[ { "version": "v1", "created": "Sun, 19 Feb 2006 19:28:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Koehler", "K. R.", "" ] ]
cs/0602069
Vicky Choi
Vicky Choi
Faster Algorithms for Constructing a Concept (Galois) Lattice
15 pages, 3 figures
null
null
null
cs.DM cs.DS
null
In this paper, we present a fast algorithm for constructing a concept (Galois) lattice of a binary relation, including computing all concepts and their lattice order. We also present two efficient variants of the algorithm, one for computing all concepts only, and one for constructing a frequent closed itemset lattice. The running time of our algorithms depends on the lattice structure and is faster than all other existing algorithms for these problems.
[ { "version": "v1", "created": "Sun, 19 Feb 2006 19:47:56 GMT" }, { "version": "v2", "created": "Thu, 1 Jun 2006 19:03:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Choi", "Vicky", "" ] ]
cs/0602070
Nathan Boeger
Nathan Boeger
Methods for scaling a large member base
12 pages
null
null
null
cs.GL
null
The technical challenges of scaling websites with large and growing member bases, like social networking sites, are numerous. One of these challenges is how to evenly distribute the growing member base across all available resources. This paper will explore various methods that address this issue. The techniques used in this paper can be generalized and applied to various other problems that need to distribute data evenly amongst a finite amount of resources.
[ { "version": "v1", "created": "Mon, 20 Feb 2006 18:08:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Boeger", "Nathan", "" ] ]
cs/0602073
Tobias Friedrich
Deepak Ajwani, Tobias Friedrich and Ulrich Meyer
An O(n^{2.75}) algorithm for online topological ordering
20 pages, long version of SWAT'06 paper
null
null
null
cs.DS
null
We present a simple algorithm which maintains the topological order of a directed acyclic graph with n nodes under an online edge insertion sequence in O(n^{2.75}) time, independent of the number of edges m inserted. For dense DAGs, this is an improvement over the previous best result of O(min(m^{3/2} log(n), m^{3/2} + n^2 log(n)) by Katriel and Bodlaender. We also provide an empirical comparison of our algorithm with other algorithms for online topological sorting. Our implementation outperforms them on certain hard instances while it is still competitive on random edge insertion sequences leading to complete DAGs.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 10:32:15 GMT" }, { "version": "v2", "created": "Thu, 20 Apr 2006 16:31:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Ajwani", "Deepak", "" ], [ "Friedrich", "Tobias", "" ], [ "Meyer", "Ulrich", "" ] ]
cs/0602075
Peter Jonsson
Vladimir Deineko, Peter Jonsson, Mikael Klasson, and Andrei Krokhin
The approximability of MAX CSP with fixed-value constraints
null
null
null
null
cs.CC
null
In the maximum constraint satisfaction problem (MAX CSP), one is given a finite collection of (possibly weighted) constraints on overlapping sets of variables, and the goal is to assign values from a given finite domain to the variables so as to maximize the number (or the total weight, for the weighted case) of satisfied constraints. This problem is NP-hard in general, and, therefore, it is natural to study how restricting the allowed types of constraints affects the approximability of the problem. In this paper, we show that any MAX CSP problem with a finite set of allowed constraint types, which includes all fixed-value constraints (i.e., constraints of the form x=a), is either solvable exactly in polynomial-time or else is APX-complete, even if the number of occurrences of variables in instances are bounded. Moreover, we present a simple description of all polynomial-time solvable cases of our problem. This description relies on the well-known algebraic combinatorial property of supermodularity.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 14:13:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Deineko", "Vladimir", "" ], [ "Jonsson", "Peter", "" ], [ "Klasson", "Mikael", "" ], [ "Krokhin", "Andrei", "" ] ]
cs/0602076
Ioannis Antonellis
Ioannis Antonellis and Efstratios Gallopoulos
Exploring term-document matrices from matrix models in text mining
SIAM Text Mining Workshop, SIAM Conference Data Mining, 2006
null
null
03/02-06
cs.IR cs.DB cs.DL
null
We explore a matrix-space model, that is a natural extension to the vector space model for Information Retrieval. Each document can be represented by a matrix that is based on document extracts (e.g. sentences, paragraphs, sections). We focus on the performance of this model for the specific case in which documents are originally represented as term-by-sentence matrices. We use the singular value decomposition to approximate the term-by-sentence matrices and assemble these results to form the pseudo-``term-document'' matrix that forms the basis of a text mining method alternative to traditional VSM and LSI. We investigate the singular values of this matrix and provide experimental evidence suggesting that the method can be particularly effective in terms of accuracy for text collections with multi-topic documents, such as web pages with news.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 16:14:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Antonellis", "Ioannis", "" ], [ "Gallopoulos", "Efstratios", "" ] ]
cs/0602077
Vincent Schmitt RR
Vincent Schmitt and Krzysztof Worytkiewicz
Bisimulations of enrichments
null
null
null
null
cs.LO
null
In this paper we show that classical notions from automata theory such as simulation and bisimulation can be lifted to the context of enriched categories. The usual properties of bisimulation are nearly all preserved in this new context. The class of enriched functors that correspond to functionnal bisimulations surjective on objects is investigated and appears "nearly" open in the sense of Joyal and Moerdijk. Seeing the change of base techniques as a convenient means to define process refinement/abstractions, we give sufficient conditions for the change of base categories to preserve bisimularity. We apply these concepts to Betti's generalized automata, categorical transition systems, and other exotic categories.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 17:27:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmitt", "Vincent", "" ], [ "Worytkiewicz", "Krzysztof", "" ] ]