id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0602078
Robert Burger PhD
John Robert Burger
Associative Memory For Reversible Programming and Charge Recovery
null
null
null
null
cs.AR cs.DC
null
Presented below is an interesting type of associative memory called toggle memory based on the concept of T flip flops, as opposed to D flip flops. Toggle memory supports both reversible programming and charge recovery. Circuits designed using the principles delineated below permit matchlines to charge and discharge with near zero energy dissipation. The resulting lethargy is compensated by the massive parallelism of associative memory. Simulation indicates over 33x reduction in energy dissipation using a sinusoidal power supply at 2 MHz, assuming realistic 50 nm MOSFET models.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 21:58:06 GMT" }, { "version": "v2", "created": "Thu, 23 Feb 2006 23:59:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
cs/0602082
Richard McClatchey
Zaheer Abbas Khan, Mohammed Odeh, Richard McClatchey
Digital Libraries: From Process Modelling to Grid-based Service Oriented Architecture
6 pages, 5 figures, 1 table. The 2nd international conference on Information and Communication Technologies from Theory to Application (ICTTA06
null
null
null
cs.DL cs.SE
null
Graphical Business Process Modelling Languages (BPML) like Role Activity Diagrams (RAD) provide ease and flexibility for modelling business behaviour. However, these languages show limited applicability in terms of enactment over distributed systems paradigms like Service Oriented Architecture (SOA) based grid computing. This paper investigates RAD modelling of a Scientific Publishing Process (SPP) for Digital Libraries (DL) and tries to determine the suitability of Pi-Calculus based formal approaches to enact SOA based grid computing. In order to achieve this purpose, the Pi-Calculus based formal transformation from a RAD model of SPP for DL draws attention towards a number of challenging issues including issues that require particular design considerations for appropriate enactment in a SOA based grid system.
[ { "version": "v1", "created": "Thu, 23 Feb 2006 23:12:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Khan", "Zaheer Abbas", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ] ]
cs/0602090
Shanghua Teng
Li-Sha Huang and Shang-Hua Teng
On the Approximation and Smoothed Complexity of Leontief Market Equilibria
null
null
null
null
cs.GT cs.CC
null
We show that the problem of finding an \epsilon-approximate Nash equilibrium of an n by n two-person games can be reduced to the computation of an (\epsilon/n)^2-approximate market equilibrium of a Leontief economy. Together with a recent result of Chen, Deng and Teng, this polynomial reduction implies that the Leontief market exchange problem does not have a fully polynomial-time approximation scheme, that is, there is no algorithm that can compute an \epsilon-approximate market equilibrium in time polynomial in m, n, and 1/\epsilon, unless PPAD is not in P, We also extend the analysis of our reduction to show, unless PPAD is not in RP, that the smoothed complexity of the Scarf's general fixed-point approximation algorithm (when applying to solve the approximate Leontief market exchange problem) or of any algorithm for computing an approximate market equilibrium of Leontief economies is not polynomial in n and 1/\sigma, under Gaussian or uniform perturbations with magnitude \sigma.
[ { "version": "v1", "created": "Sun, 26 Feb 2006 07:53:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Li-Sha", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0602093
Francois Denis
Fran\c{c}ois Denis (LIF), Yann Esposito (LIF)
Rational stochastic languages
35 pages
null
null
null
cs.LG cs.CL
null
The goal of the present paper is to provide a systematic and comprehensive study of rational stochastic languages over a semiring K \in {Q, Q +, R, R+}. A rational stochastic language is a probability distribution over a free monoid \Sigma^* which is rational over K, that is which can be generated by a multiplicity automata with parameters in K. We study the relations between the classes of rational stochastic languages S rat K (\Sigma). We define the notion of residual of a stochastic language and we use it to investigate properties of several subclasses of rational stochastic languages. Lastly, we study the representation of rational stochastic languages by means of multiplicity automata.
[ { "version": "v1", "created": "Mon, 27 Feb 2006 10:08:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Denis", "François", "", "LIF" ], [ "Esposito", "Yann", "", "LIF" ] ]
cs/0602094
Altyeb Taha mr
Altyeb Altaher
Effect of CSMA/CD on Self-Similarity of Network Traffic
4 pages, 2 figures
null
null
null
cs.NI
null
It is now well known that Internet traffic exhibits self-similarity, which cannot be described by traditional Markovian models such as the Poisson process. The causes of self-similarity of network traffic must be identified because understanding the nature of network traffic is critical in order to properly design and implement computer networks and network services like the World Wide Web. While some researchers have argued self similarity is generated by the typical applications or caused by Transport layer Protocols, it is also possible that the CSMA/CD protocol may cause or at least contribute to this phenomenon. In this paper, we use NS simulator to study the effect of CSMA/CD Exponential Backoff retransmission algorithm on Traffic Self similarity.
[ { "version": "v1", "created": "Mon, 27 Feb 2006 12:37:34 GMT" }, { "version": "v2", "created": "Sun, 26 Mar 2006 09:06:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Altaher", "Altyeb", "" ] ]
cs/0602095
Joseph O'Rourke
Mirela Damian, Robin Flatland, Joseph O'Rourke
Epsilon-Unfolding Orthogonal Polyhedra
23 pages, 20 figures, 7 references. Revised version improves language and figures, updates references, and sharpens the conclusion
null
null
null
cs.CG
null
An unfolding of a polyhedron is produced by cutting the surface and flattening to a single, connected, planar piece without overlap (except possibly at boundary points). It is a long unsolved problem to determine whether every polyhedron may be unfolded. Here we prove, via an algorithm, that every orthogonal polyhedron (one whose faces meet at right angles) of genus zero may be unfolded. Our cuts are not necessarily along edges of the polyhedron, but they are always parallel to polyhedron edges. For a polyhedron of n vertices, portions of the unfolding will be rectangular strips which, in the worst case, may need to be as thin as epsilon = 1/2^{Omega(n)}.
[ { "version": "v1", "created": "Mon, 27 Feb 2006 17:03:19 GMT" }, { "version": "v2", "created": "Wed, 22 Mar 2006 14:11:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Flatland", "Robin", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/0602096
Abhilash Ponnath
Abhilash Ponnath
Difficulties in the Implementation of Quantum Computers
6 pages
null
null
null
cs.AR
null
This paper reviews various engineering hurdles facing the field of quantum computing. Specifically, problems related to decoherence, state preparation, error correction, and implementability of gates are considered.
[ { "version": "v1", "created": "Mon, 27 Feb 2006 18:59:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Ponnath", "Abhilash", "" ] ]
cs/0602098
M. H. van Emden
M.H. van Emden
Compositional Semantics for the Procedural Interpretation of Logic
17 pages; no figures
null
null
DCS-307-IR
cs.PL
null
Semantics of logic programs has been given by proof theory, model theory and by fixpoint of the immediate-consequence operator. If clausal logic is a programming language, then it should also have a compositional semantics. Compositional semantics for programming languages follows the abstract syntax of programs, composing the meaning of a unit by a mathematical operation on the meanings of its constituent units. The procedural interpretation of logic has only yielded an incomplete abstract syntax for logic programs. We complete it and use the result as basis of a compositional semantics. We present for comparison Tarski's algebraization of first-order predicate logic, which is in substance the compositional semantics for his choice of syntax. We characterize our semantics by equivalence with the immediate-consequence operator.
[ { "version": "v1", "created": "Tue, 28 Feb 2006 19:28:31 GMT" }, { "version": "v2", "created": "Sun, 7 May 2006 17:41:17 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ] ]
cs/0602099
M. H. van Emden
H. Ibrahim and M.H. van Emden
Towards Applicative Relational Programming
10 pages; no figures
null
null
null
cs.PL
null
Functional programming comes in two flavours: one where ``functions are first-class citizens'' (we call this applicative) and one which is based on equations (we call this declarative). In relational programming clauses play the role of equations. Hence Prolog is declarative. The purpose of this paper is to provide in relational programming a mathematical basis for the relational analog of applicative functional programming. We use the cylindric semantics of first-order logic due to Tarski and provide a new notation for the required cylinders that we call tables. We define the Table/Relation Algebra with operators sufficient to translate Horn clauses into algebraic form. We establish basic mathematical properties of these operators. We show how relations can be first-class citizens, and devise mechanisms for modularity, for local scoping of predicates, and for exporting/importing relations between programs.
[ { "version": "v1", "created": "Tue, 28 Feb 2006 19:53:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Ibrahim", "H.", "" ], [ "van Emden", "M. H.", "" ] ]
cs/0603001
Alois Schl\"ogl
Alois Schl\"ogl
BioSig - An application of Octave
6 pages, submission for the Octave 2006 meeting
null
null
Octave2006/16
cs.MS
null
BioSig is an open source software library for biomedical signal processing. Most users in the field are using Matlab; however, significant effort was undertaken to provide compatibility to Octave, too. This effort has been widely successful, only some non-critical components relying on a graphical user interface are missing. Now, installing BioSig on Octave is as easy as on Matlab. Moreover, a benchmark test based on BioSig has been developed and the benchmark results of several platforms are presented.
[ { "version": "v1", "created": "Wed, 1 Mar 2006 15:45:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Schlögl", "Alois", "" ] ]
cs/0603002
Cheng Qi
Qi Cheng
On comparing sums of square roots of small integers
null
null
null
null
cs.CG
null
Let $k$ and $n$ be positive integers, $n>k$. Define $r(n,k)$ to be the minimum positive value of $$ |\sqrt{a_1} + ... + \sqrt{a_k} - \sqrt{b_1} - >... -\sqrt{b_k} | $$ where $ a_1, a_2, ..., a_k, b_1, b_2, ..., b_k $ are positive integers no larger than $n$. It is an important problem in computational geometry to determine a good upper bound of $-\log r(n,k)$. In this paper we prove an upper bound of $ 2^{O(n/\log n)} \log n$, which is better than the best known result $O(2^{2k} \log n)$ whenever $ n \leq ck\log k$ for some constant $c$. In particular, our result implies a {\em subexponential} algorithm to compare two sums of square roots of integers of size $o(k\log k)$.
[ { "version": "v1", "created": "Tue, 28 Feb 2006 22:35:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheng", "Qi", "" ] ]
cs/0603003
Michel Fliess
Michel Fliess (LIX, INRIA Futurs)
Analyse non standard du bruit
null
null
null
null
cs.CE math.LO math.OC math.PR quant-ph
null
Thanks to the nonstandard formalization of fast oscillating functions, due to P. Cartier and Y. Perrin, an appropriate mathematical framework is derived for new non-asymptotic estimation techniques, which do not necessitate any statistical analysis of the noises corrupting any sensor. Various applications are deduced for multiplicative noises, for the length of the parametric estimation windows, and for burst errors.
[ { "version": "v1", "created": "Wed, 1 Mar 2006 11:26:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Fliess", "Michel", "", "LIX, INRIA Futurs" ] ]
cs/0603004
Juan J. Merelo Pr.
P.A. Castillo, M.G. Arenas, J.G. Castellano, J.J. Merelo, A. Prieto, V. Rivas and G. Romero
Lamarckian Evolution and the Baldwin Effect in Evolutionary Neural Networks
Presented in a Spanish conference, MAEB
null
null
null
cs.NE
null
Hybrid neuro-evolutionary algorithms may be inspired on Darwinian or Lamarckian evolu- tion. In the case of Darwinian evolution, the Baldwin effect, that is, the progressive incorporation of learned characteristics to the genotypes, can be observed and leveraged to improve the search. The purpose of this paper is to carry out an exper- imental study into how learning can improve G-Prop genetic search. Two ways of combining learning and genetic search are explored: one exploits the Baldwin effect, while the other uses a Lamarckian strategy. Our experiments show that using a Lamarckian op- erator makes the algorithm find networks with a low error rate, and the smallest size, while using the Bald- win effect obtains MLPs with the smallest error rate, and a larger size, taking longer to reach a solution. Both approaches obtain a lower average error than other BP-based algorithms like RPROP, other evolu- tionary methods and fuzzy logic based methods
[ { "version": "v1", "created": "Wed, 1 Mar 2006 12:26:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Castillo", "P. A.", "" ], [ "Arenas", "M. G.", "" ], [ "Castellano", "J. G.", "" ], [ "Merelo", "J. J.", "" ], [ "Prieto", "A.", "" ], [ "Rivas", "V.", "" ], [ "Romero", "G.", "" ] ]
cs/0603006
Jonathan Ben-Naim
Jonathan Ben-Naim (LIF)
Pivotal and Pivotal-discriminative Consequence Relations
null
Journal of Logic and Computation Volume 15, number 5 (2005) 679-700
10.1093/logcom/exi030
null
cs.LO
null
In the present paper, we investigate consequence relations that are both paraconsistent and plausible (but still monotonic). More precisely, we put the focus on pivotal consequence relations, i.e. those relations that can be defined by a pivot (in the style of e.g. D. Makinson). A pivot is a fixed subset of valuations which are considered to be the important ones in the absolute sense. We worked with a general notion of valuation that covers e.g. the classical valuations as well as certain kinds of many-valued valuations. In the many-valued cases, pivotal consequence relations are paraconsistant (in addition to be plausible), i.e. they are capable of drawing reasonable conclusions which contain contradictions. We will provide in our general framework syntactic characterizations of several families of pivotal relations. In addition, we will provide, again in our general framework, characterizations of several families of pivotal discriminative consequence relations. The latter are defined exactly as the plain version, but contradictory conclusions are rejected. We will also answer negatively a representation problem that was left open by Makinson. Finally, we will put in evidence a connexion with X-logics from Forget, Risch, and Siegel. The motivations and the framework of the present paper are very close to those of a previous paper of the author which is about preferential consequence relations.
[ { "version": "v1", "created": "Wed, 1 Mar 2006 15:15:46 GMT" }, { "version": "v2", "created": "Mon, 19 Jun 2006 08:16:43 GMT" }, { "version": "v3", "created": "Tue, 3 Apr 2007 14:53:14 GMT" }, { "version": "v4", "created": "Sun, 8 Apr 2007 15:04:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Ben-Naim", "Jonathan", "", "LIF" ] ]
cs/0603010
Ketan Savla
Ketan Savla, Emilio Frazzoli and Francesco Bullo
Asymptotic constant-factor approximation algorithm for the Traveling Salesperson Problem for Dubins' vehicle
null
null
null
null
cs.RO
null
This article proposes the first known algorithm that achieves a constant-factor approximation of the minimum length tour for a Dubins' vehicle through $n$ points on the plane. By Dubins' vehicle, we mean a vehicle constrained to move at constant speed along paths with bounded curvature without reversing direction. For this version of the classic Traveling Salesperson Problem, our algorithm closes the gap between previously established lower and upper bounds; the achievable performance is of order $n^{2/3}$.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 07:07:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Savla", "Ketan", "" ], [ "Frazzoli", "Emilio", "" ], [ "Bullo", "Francesco", "" ] ]
cs/0603012
Nils Hebbinghaus
Benjamin Doerr, Nils Hebbinghaus, S\"oren Werth
Improved Bounds and Schemes for the Declustering Problem
19 pages, 1 figure
null
null
null
cs.DM cs.DS
null
The declustering problem is to allocate given data on parallel working storage devices in such a manner that typical requests find their data evenly distributed on the devices. Using deep results from discrepancy theory, we improve previous work of several authors concerning range queries to higher-dimensional data. We give a declustering scheme with an additive error of $O_d(\log^{d-1} M)$ independent of the data size, where $d$ is the dimension, $M$ the number of storage devices and $d-1$ does not exceed the smallest prime power in the canonical decomposition of $M$ into prime powers. In particular, our schemes work for arbitrary $M$ in dimensions two and three. For general $d$, they work for all $M\geq d-1$ that are powers of two. Concerning lower bounds, we show that a recent proof of a $\Omega_d(\log^{\frac{d-1}{2}} M)$ bound contains an error. We close the gap in the proof and thus establish the bound.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 15:51:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Doerr", "Benjamin", "" ], [ "Hebbinghaus", "Nils", "" ], [ "Werth", "Sören", "" ] ]
cs/0603015
Pritam Rajagopal
Pritam Rajagopal
The Basic Kak Neural Network with Complex Inputs
17 pages, 9 figures, 7 tables
null
null
null
cs.NE
null
The Kak family of neural networks is able to learn patterns quickly, and this speed of learning can be a decisive advantage over other competing models in many applications. Amongst the implementations of these networks are those using reconfigurable networks, FPGAs and optical networks. In some applications, it is useful to use complex data, and it is with that in mind that this introduction to the basic Kak network with complex inputs is being presented. The training algorithm is prescriptive and the network weights are assigned simply upon examining the inputs. The input is mapped using quaternary encoding for purpose of efficienty. This network family is part of a larger hierarchy of learning schemes that include quantum models.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 23:59:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Rajagopal", "Pritam", "" ] ]
cs/0603016
M. H. van Emden
M.H. van Emden and S.C. Somosan
Object-Oriented Modeling of Programming Paradigms
Re-written introduction and abstract, new title, some references deleted; 10 pages; 4 figures
null
null
DCS-310-IR
cs.SE cs.PL
null
For the right application, the use of programming paradigms such as functional or logic programming can enormously increase productivity in software development. But these powerful paradigms are tied to exotic programming languages, while the management of software development dictates standardization on a single language. This dilemma can be resolved by using object-oriented programming in a new way. It is conventional to analyze an application by object-oriented modeling. In the new approach, the analysis identifies the paradigm that is ideal for the application; development starts with object-oriented modeling of the paradigm. In this paper we illustrate the new approach by giving examples of object-oriented modeling of dataflow and constraint programming. These examples suggest that it is no longer necessary to embody a programming paradigm in a language dedicated to it.
[ { "version": "v1", "created": "Fri, 3 Mar 2006 05:19:42 GMT" }, { "version": "v2", "created": "Thu, 9 Nov 2006 18:46:06 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ], [ "Somosan", "S. C.", "" ] ]
cs/0603019
Leandro R\^ego
Joseph Y. Halpern and Leandro Chaves Rego
Characterizing the NP-PSPACE Gap in the Satisfiability Problem for Modal Logic
6 pages
null
null
null
cs.LO cs.CC
null
There has been a great of work on characterizing the complexity of the satisfiability and validity problem for modal logics. In particular, Ladner showed that the validity problem for all logics between K, T, and S4 is {\sl PSPACE}-complete, while for S5 it is {\sl NP}-complete. We show that, in a precise sense, it is \emph{negative introspection}, the axiom $\neg K p \rimp K \neg K p$, that causes the gap. In a precise sense, if we require this axiom, then the satisfiability problem is {\sl NP}-complete; without it, it is {\sl PSPACE}-complete.
[ { "version": "v1", "created": "Sun, 5 Mar 2006 23:11:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Rego", "Leandro Chaves", "" ] ]
cs/0603020
Leandro R\^ego
Joseph Y. halpern and Leandro Chaves Rego
Reasoning About Knowledge of Unawareness
32 pages
null
null
null
cs.LO cs.MA
null
Awareness has been shown to be a useful addition to standard epistemic logic for many applications. However, standard propositional logics for knowledge and awareness cannot express the fact that an agent knows that there are facts of which he is unaware without there being an explicit fact that the agent knows he is unaware of. We propose a logic for reasoning about knowledge of unawareness, by extending Fagin and Halpern's \emph{Logic of General Awareness}. The logic allows quantification over variables, so that there is a formula in the language that can express the fact that ``an agent explicitly knows that there exists a fact of which he is unaware''. Moreover, that formula can be true without the agent explicitly knowing that he is unaware of any particular formula. We provide a sound and complete axiomatization of the logic, using standard axioms from the literature to capture the quantification operator. Finally, we show that the validity problem for the logic is recursively enumerable, but not decidable.
[ { "version": "v1", "created": "Sun, 5 Mar 2006 21:14:59 GMT" } ]
2007-05-23T00:00:00
[ [ "halpern", "Joseph Y.", "" ], [ "Rego", "Leandro Chaves", "" ] ]
cs/0603021
Joy Mukherjee
Joy Mukherjee, Srinidhi Varadarajan
Language Support for Optional Functionality
6 pages, 8 figures
null
null
null
cs.PL cs.OS cs.SE
null
We recommend a programming construct - availability check - for programs that need to automatically adjust to presence or absence of segments of code. The idea is to check the existence of a valid definition before a function call is invoked. The syntax is that of a simple 'if' statement. The vision is to enable customization of application functionality through addition or removal of optional components, but without requiring complete re-building. Focus is on C-like compiled procedural languages and UNIX-based systems. Essentially, our approach attempts to combine the flexibility of dynamic libraries with the usability of utility (dependency) libraries. We outline the benefits over prevalent strategies mainly in terms of development complexity, crudely measured as lesser lines of code. We also allude to performance and flexibility facets. A Preliminary implementation and figures from early experimental evaluation are presented.
[ { "version": "v1", "created": "Mon, 6 Mar 2006 00:46:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Mukherjee", "Joy", "" ], [ "Varadarajan", "Srinidhi", "" ] ]
cs/0603023
Marcus Hutter
Viktor Zhumatiy and Faustino Gomez and Marcus Hutter and Juergen Schmidhuber
Metric State Space Reinforcement Learning for a Vision-Capable Mobile Robot
14 pages, 8 figures
Proc. 9th International Conf. on Intelligent Autonomous Systems (IAS 2006) pages 272-281
null
IDSIA-05-06
cs.RO cs.LG
null
We address the problem of autonomously learning controllers for vision-capable mobile robots. We extend McCallum's (1995) Nearest-Sequence Memory algorithm to allow for general metrics over state-action trajectories. We demonstrate the feasibility of our approach by successfully running our algorithm on a real mobile robot. The algorithm is novel and unique in that it (a) explores the environment and learns directly on a mobile robot without using a hand-made computer model as an intermediate step, (b) does not require manual discretization of the sensor input space, (c) works in piecewise continuous perceptual spaces, and (d) copes with partial observability. Together this allows learning from much less experience compared to previous methods.
[ { "version": "v1", "created": "Tue, 7 Mar 2006 08:44:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhumatiy", "Viktor", "" ], [ "Gomez", "Faustino", "" ], [ "Hutter", "Marcus", "" ], [ "Schmidhuber", "Juergen", "" ] ]
cs/0603024
Carl Lagoze
Carl Lagoze, Dean Krafft, Tim Cornwell, Dean Eckstrom, Susan Jesuroga, Chris Wilper
Representing Contextualized Information in the NSDL
null
null
null
null
cs.DL
null
The NSDL (National Science Digital Library) is funded by the National Science Foundation to advance science and match education. The inital product was a metadata-based digital library providing search and access to distributed resources. Our recent work recognizes the importance of context - relations, metadata, annotations - for the pedagogical value of a digital library. This new architecture uses Fedora, a tool for representing complex content, data, metadata, web-based services, and semantic relationships, as the basis of an information network overlay (INO). The INO provides an extensible knowl-edge base for an expanding suite of digital library services.
[ { "version": "v1", "created": "Tue, 7 Mar 2006 15:50:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Krafft", "Dean", "" ], [ "Cornwell", "Tim", "" ], [ "Eckstrom", "Dean", "" ], [ "Jesuroga", "Susan", "" ], [ "Wilper", "Chris", "" ] ]
cs/0603025
Stijn Heymans
Stijn Heymans, Davy Van Nieuwenborgh and Dirk Vermeir
Open Answer Set Programming with Guarded Programs
51 pages, 1 figure, accepted for publication in ACM's TOCL
null
null
null
cs.AI
null
Open answer set programming (OASP) is an extension of answer set programming where one may ground a program with an arbitrary superset of the program's constants. We define a fixed point logic (FPL) extension of Clark's completion such that open answer sets correspond to models of FPL formulas and identify a syntactic subclass of programs, called (loosely) guarded programs. Whereas reasoning with general programs in OASP is undecidable, the FPL translation of (loosely) guarded programs falls in the decidable (loosely) guarded fixed point logic (mu(L)GF). Moreover, we reduce normal closed ASP to loosely guarded OASP, enabling for the first time, a characterization of an answer set semantics by muLGF formulas. We further extend the open answer set semantics for programs with generalized literals. Such generalized programs (gPs) have interesting properties, e.g., the ability to express infinity axioms. We restrict the syntax of gPs such that both rules and generalized literals are guarded. Via a translation to guarded fixed point logic, we deduce 2-exptime-completeness of satisfiability checking in such guarded gPs (GgPs). Bound GgPs are restricted GgPs with exptime-complete satisfiability checking, but still sufficiently expressive to optimally simulate computation tree logic (CTL). We translate Datalog lite programs to GgPs, establishing equivalence of GgPs under an open answer set semantics, alternation-free muGF, and Datalog lite.
[ { "version": "v1", "created": "Tue, 7 Mar 2006 17:54:59 GMT" }, { "version": "v2", "created": "Sun, 25 Feb 2007 12:32:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Heymans", "Stijn", "" ], [ "Van Nieuwenborgh", "Davy", "" ], [ "Vermeir", "Dirk", "" ] ]
cs/0603026
Valentin Polishchuk
Esther M. Arkin (1), Michael A. Bender (2), Joseph S. B. Mitchell (1), Valentin Polishchuk (1) ((1) Department of Applied Mathematics and Statistics, Stony Brook University, (2) Department of Computer Science, Stony Brook University)
The Snowblower Problem
19 pages, 10 figures, 1 table. Submitted to WAFR 2006
null
null
null
cs.DS cs.CC cs.RO
null
We introduce the snowblower problem (SBP), a new optimization problem that is closely related to milling problems and to some material-handling problems. The objective in the SBP is to compute a short tour for the snowblower to follow to remove all the snow from a domain (driveway, sidewalk, etc.). When a snowblower passes over each region along the tour, it displaces snow into a nearby region. The constraint is that if the snow is piled too high, then the snowblower cannot clear the pile. We give an algorithmic study of the SBP. We show that in general, the problem is NP-complete, and we present polynomial-time approximation algorithms for removing snow under various assumptions about the operation of the snowblower. Most commercially-available snowblowers allow the user to control the direction in which the snow is thrown. We differentiate between the cases in which the snow can be thrown in any direction, in any direction except backwards, and only to the right. For all cases, we give constant-factor approximation algorithms; the constants increase as the throw direction becomes more restricted. Our results are also applicable to robotic vacuuming (or lawnmowing) with bounded capacity dust bin and to some versions of material-handling problems, in which the goal is to rearrange cartons on the floor of a warehouse.
[ { "version": "v1", "created": "Tue, 7 Mar 2006 20:35:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Arkin", "Esther M.", "" ], [ "Bender", "Michael A.", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Polishchuk", "Valentin", "" ] ]
cs/0603028
Jan Van den Bussche
Wim Janssen, Alexandr Korlyukov, Jan Van den Bussche
On the tree-transformation power of XSLT
null
Acta Informatica, Volume 43, Number 6 / January, 2007
10.1007/s00236-006-0026-8
null
cs.PL cs.DB
null
XSLT is a standard rule-based programming language for expressing transformations of XML data. The language is currently in transition from version 1.0 to 2.0. In order to understand the computational consequences of this transition, we restrict XSLT to its pure tree-transformation capabilities. Under this focus, we observe that XSLT~1.0 was not yet a computationally complete tree-transformation language: every 1.0 program can be implemented in exponential time. A crucial new feature of version~2.0, however, which allows nodesets over temporary trees, yields completeness. We provide a formal operational semantics for XSLT programs, and establish confluence for this semantics.
[ { "version": "v1", "created": "Wed, 8 Mar 2006 13:48:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Janssen", "Wim", "" ], [ "Korlyukov", "Alexandr", "" ], [ "Bussche", "Jan Van den", "" ] ]
cs/0603032
Somdeb Lahiri
Somdeb Lahiri
Market Equilibrium for Bundle Auctions and the Matching Core of Nonnegative TU Games
17 pages
null
null
null
cs.GT
null
We discuss bundle auctions within the framework of an integer allocation problem. We show that for multi-unit auctions, of which bundle auctions are a special case, market equilibrium and constrained market equilibrium are equivalent concepts. This equivalence, allows us to obtain a computable necessary and sufficient condition for the existence of constrained market equilibrium for bundle auctions. We use this result to obtain a necessary and sufficient condition for the existence of market equilibrium for multi-unit auctions. After obtaining the induced bundle auction of a nonnegative TU game, we show that the existence of market equilibrium implies the existence of a possibly different market equilibrium as well, which corresponds very naturally to an outcome in the matching core of the TU game. Consequently we show that the matching core of the nonnegative TU game is non-empty if and only if the induced market game has a market equilibrium.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 12:45:19 GMT" }, { "version": "v2", "created": "Fri, 10 Mar 2006 05:29:06 GMT" }, { "version": "v3", "created": "Sat, 8 Apr 2006 10:08:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Lahiri", "Somdeb", "" ] ]
cs/0603033
Vaghinak Petrosyan
Vaghinak Petrosyan
Inter-component communication methods in object-oriented frameworks
null
null
null
null
cs.SE
null
Modern frameworks for development of graphical interfaces are using the native controls of the operating system. Because of that they are using operating system events model for inter-component communication. We consider a method to increase inter-component communication speed by sending messages from one component to the other passing over the operating system. Besides the messages subscription helps to avoid receiving of unnecessary messages.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 08:44:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrosyan", "Vaghinak", "" ] ]
cs/0603035
Richard McClatchey
Chiara Del Frate, Jose Galvez, Tamas Hauer, David Manset, Richard McClatchey, Mohammed Odeh, Dmitry Rogulin, Tony Solomonides, Ruth Warren
Final Results from and Exploitation Plans for MammoGrid
11 pages, 3 figures, 2 tables. Accepted at the 4th International HealthGrid conference, Valencia Spain June 2006
null
null
null
cs.DC
null
The MammoGrid project has delivered the first deployed instance of a healthgrid for clinical mammography that spans national boundaries. During the last year, the final MammoGrid prototype has undergone a series of rigorous tests undertaken by radiologists in the UK and Italy and this paper draws conclusions from those tests for the benefit of the Healthgrid community. In addition, lessons learned during the lifetime of the project are detailed and recommendations drawn for future health applications using grids. Following the completion of the project, plans have been put in place for the commercialisation of the MammoGrid system and this is also reported in this article. Particular emphasis is placed on the issues surrounding the transition from collaborative research project to a marketable product. This paper concludes by highlighting some of the potential areas of future development and research.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 13:49:14 GMT" }, { "version": "v2", "created": "Sat, 11 Mar 2006 19:17:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Del Frate", "Chiara", "" ], [ "Galvez", "Jose", "" ], [ "Hauer", "Tamas", "" ], [ "Manset", "David", "" ], [ "McClatchey", "Richard", "" ], [ "Odeh", "Mohammed", "" ], [ "Rogulin", "Dmitry", "" ], [ "Solomonides", "Tony", "" ], [ "Warren", "Ruth", "" ] ]
cs/0603036
Richard McClatchey
Joerg Freund, Dorin Comaniciu, Yannis Ioannis, Peiya Liu, Richard McClatchey, Edwin Morley-Fletcher, Xavier Pennec, Giacomo Pongiglione, Xiang (Sean)ZHOU
Health-e-Child : An Integrated Biomedical Platform for Grid-Based Paediatric Applications
12 pages, 2 figures. Accepted at the 4th International HealthGrid conference, Valencia, Spain June 2006
null
null
null
cs.DC
null
There is a compelling demand for the integration and exploitation of heterogeneous biomedical information for improved clinical practice, medical research, and personalised healthcare across the EU. The Health-e-Child project aims at developing an integrated healthcare platform for European Paediatrics, providing seamless integration of traditional and emerging sources of biomedical information. The long-term goal of the project is to provide uninhibited access to universal biomedical knowledge repositories for personalised and preventive healthcare, large-scale information-based biomedical research and training, and informed policy making. The project focus will be on individualised disease prevention, screening, early diagnosis, therapy and follow-up of paediatric heart diseases, inflammatory diseases, and brain tumours. The project will build a Grid-enabled European network of leading clinical centres that will share and annotate biomedical data, validate systems clinically, and diffuse clinical excellence across Europe by setting up new technologies, clinical workflows, and standards. This paper outlines the design approach being adopted in Health-e-Child to enable the delivery of an integrated biomedical information platform.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 13:54:15 GMT" }, { "version": "v2", "created": "Sat, 11 Mar 2006 19:18:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Freund", "Joerg", "", "Sean" ], [ "Comaniciu", "Dorin", "", "Sean" ], [ "Ioannis", "Yannis", "", "Sean" ], [ "Liu", "Peiya", "", "Sean" ], [ "McClatchey", "Richard", "", "Sean" ], [ "Morley-Fletcher", "Edwin", "", "Sean" ], [ "Pennec", "Xavier", "", "Sean" ], [ "Pongiglione", "Giacomo", "", "Sean" ], [ "Xiang", "", "", "Sean" ], [ "ZHOU", "", "" ] ]
cs/0603037
Richard McClatchey
Haya El-Ghalayini, Mohammed Odeh, Richard McClatchey
Deriving Conceptual Data Models from Domain Ontologies for Bioinformatics
6 pages, 1 figure. The 2nd international conference on Information and Communication Technologies from Theory to Application (ICTTA06)
null
null
null
cs.SE
null
This paper studies the role that ontologies can play in establishing conceptual data models during the process of information systems development. A mapping algorithm has been proposed and embedded in a special purpose Transformation-Engine to generate a conceptual data model from a given domain ontology. In addition, this paper focuses on applying the proposed approach to a bioinformatics context as the nature of biological data is considered a barrier in representing biological conceptual data models. Both quantitative and qualitative methods have been adopted to critically evaluate this new approach. The results of this evaluation indicate that the quality of the generated conceptual data models can reflect the problem domain entities and the associations between them. The results are encouraging and support the potential role that this approach can play in providing a suitable starting point for conceptual data model development.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 13:59:18 GMT" } ]
2007-05-23T00:00:00
[ [ "El-Ghalayini", "Haya", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ] ]
cs/0603038
Patrik O. Hoyer
Patrik O. Hoyer, Shohei Shimizu, Antti J. Kerminen
Estimation of linear, non-gaussian causal models in the presence of confounding latent variables
8 pages, 4 figures, pdflatex
null
null
null
cs.AI
null
The estimation of linear causal models (also known as structural equation models) from data is a well-known problem which has received much attention in the past. Most previous work has, however, made an explicit or implicit assumption of gaussianity, limiting the identifiability of the models. We have recently shown (Shimizu et al, 2005; Hoyer et al, 2006) that for non-gaussian distributions the full causal model can be estimated in the no hidden variables case. In this contribution, we discuss the estimation of the model when confounding latent variables are present. Although in this case uniqueness is no longer guaranteed, there is at most a finite set of models which can fit the data. We develop an algorithm for estimating this set, and describe numerical simulations which confirm the theoretical arguments and demonstrate the practical viability of the approach. Full Matlab code is provided for all simulations.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 14:46:18 GMT" }, { "version": "v2", "created": "Mon, 22 May 2006 17:02:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoyer", "Patrik O.", "" ], [ "Shimizu", "Shohei", "" ], [ "Kerminen", "Antti J.", "" ] ]
cs/0603041
Prasanta K. Panigrahi
S. Hemachander, Amit Verma, Siddharth Arora, Prasanta K. Panigrahi
Locally Adaptive Block Thresholding Method with Continuity Constraint
12 Pages, 4 figures, 1 Table
null
null
null
cs.CV
null
We present an algorithm that enables one to perform locally adaptive block thresholding, while maintaining image continuity. Images are divided into sub-images based some standard image attributes and thresholding technique is employed over the sub-images. The present algorithm makes use of the thresholds of neighboring sub-images to calculate a range of values. The image continuity is taken care by choosing the threshold of the sub-image under consideration to lie within the above range. After examining the average range values for various sub-image sizes of a variety of images, it was found that the range of acceptable threshold values is substantially high, justifying our assumption of exploiting the freedom of range for bringing out local details.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 17:14:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemachander", "S.", "" ], [ "Verma", "Amit", "" ], [ "Arora", "Siddharth", "" ], [ "Panigrahi", "Prasanta K.", "" ] ]
cs/0603042
Will Scott II
Willie L. Scott II
The NoN Approach to Autonomic Face Recognition
15 pages, 6 figures, 6 tables
null
null
null
cs.NE
null
A method of autonomic face recognition based on the biologically plausible network of networks (NoN) model of information processing is presented. The NoN model is based on locally parallel and globally coordinated transformations in which the neurons or computational units form distributed networks, which themselves link to form larger networks. This models the structures in the cerebral cortex described by Mountcastle and the architecture based on that proposed for information processing by Sutton. In the proposed implementation, face images are processed by a nested family of locally operating networks along with a hierarchically superior network that classifies the information from each of the local networks. The results of the experiments yielded a maximum of 98.5% recognition accuracy and an average of 97.4% recognition accuracy on a benchmark database.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 17:35:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Scott", "Willie L.", "II" ] ]
cs/0603043
Mihai Patrascu
Mihai Patrascu and Mikkel Thorup
Time-Space Trade-Offs for Predecessor Search
29 pages. Full version (preliminary) of a paper appearing in STOC'06
null
null
null
cs.CC cs.DS
null
We develop a new technique for proving cell-probe lower bounds for static data structures. Previous lower bounds used a reduction to communication games, which was known not to be tight by counting arguments. We give the first lower bound for an explicit problem which breaks this communication complexity barrier. In addition, our bounds give the first separation between polynomial and near linear space. Such a separation is inherently impossible by communication complexity. Using our lower bound technique and new upper bound constructions, we obtain tight bounds for searching predecessors among a static set of integers. Given a set Y of n integers of l bits each, the goal is to efficiently find predecessor(x) = max{y in Y | y <= x}, by representing Y on a RAM using space S. In external memory, it follows that the optimal strategy is to use either standard B-trees, or a RAM algorithm ignoring the larger block size. In the important case of l = c*lg n, for c>1 (i.e. polynomial universes), and near linear space (such as S = n*poly(lg n)), the optimal search time is Theta(lg l). Thus, our lower bound implies the surprising conclusion that van Emde Boas' classic data structure from [FOCS'75] is optimal in this case. Note that for space n^{1+eps}, a running time of O(lg l / lglg l) was given by Beame and Fich [STOC'99].
[ { "version": "v1", "created": "Fri, 10 Mar 2006 14:50:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Patrascu", "Mihai", "" ], [ "Thorup", "Mikkel", "" ] ]
cs/0603044
Vadim Tropashko
Marshall Spight, Vadim Tropashko
First Steps in Relational Lattice
11 pages, 3 figures
null
null
null
cs.DB
null
Relational lattice reduces the set of six classic relational algebra operators to two binary lattice operations: natural join and inner union. We give an introduction to this theory with emphasis on formal algebraic laws. New results include Spight distributivity criteria and its applications to query transformations.
[ { "version": "v1", "created": "Fri, 10 Mar 2006 18:11:49 GMT" }, { "version": "v2", "created": "Wed, 15 Mar 2006 04:54:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Spight", "Marshall", "" ], [ "Tropashko", "Vadim", "" ] ]
cs/0603046
William Perkins
William Perkins
Trusted Certificates in Quantum Cryptography
4 pages, 2 figures
null
null
null
cs.CR
null
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
[ { "version": "v1", "created": "Fri, 10 Mar 2006 23:05:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Perkins", "William", "" ] ]
cs/0603047
Simone Severini
Stefano Mancini and Simone Severini
The Quantum Separability Problem for Gaussian States
8 pages
Electronic Notes in Theoretical Computer Science, Volume 169 , March 2007, pp. 121-131
10.1016/j.entcs.2006.07.034
null
cs.CC quant-ph
null
Determining whether a quantum state is separable or entangled is a problem of fundamental importance in quantum information science. This is a brief review in which we consider the problem for states in infinite dimensional Hilbert spaces. We show how the problem becomes tractable for a class of Gaussian states.
[ { "version": "v1", "created": "Sun, 12 Mar 2006 14:33:41 GMT" }, { "version": "v2", "created": "Fri, 31 Mar 2006 12:38:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Mancini", "Stefano", "" ], [ "Severini", "Simone", "" ] ]
cs/0603048
Vincent Limouzy
Binh Minh Bui Xuan (LIRMM), Michel Habib (LIAFA), Vincent Limouzy (LIAFA), Fabien De Montgolfier (LIAFA)
Homogeneity vs. Adjacency: generalising some graph decomposition algorithms
soumis \`{a} WG 2006
Graph-Theoretic Concepts in Computer Science Springer (Ed.) (22/06/2006) 278-288
10.1007/11917496\_25
null
cs.DS
null
In this paper, a new general decomposition theory inspired from modular graph decomposition is presented. Our main result shows that, within this general theory, most of the nice algorithmic tools developed for modular decomposition are still efficient. This theory not only unifies the usual modular decomposition generalisations such as modular decomposition of directed graphs or decomposition of 2-structures, but also star cutsets and bimodular decomposition. Our general framework provides a decomposition algorithm which improves the best known algorithms for bimodular decomposition.
[ { "version": "v1", "created": "Mon, 13 Mar 2006 09:48:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Xuan", "Binh Minh Bui", "", "LIRMM" ], [ "Habib", "Michel", "", "LIAFA" ], [ "Limouzy", "Vincent", "", "LIAFA" ], [ "De Montgolfier", "Fabien", "", "LIAFA" ] ]
cs/0603051
Andreas U. Schmidt
Nicolai Kuntze and Andreas U. Schmidt
Transitive trust in mobile scenarios
Pre-refereed version. To appear in Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), Freiburg im Breisgau, Germany 6th-9th June 2006. Lecture Notes in Computer Science, Springer-Verlag
null
null
null
cs.CR
null
Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enables the desired crossdomain authentication functionality. The focus of target application scenarios lies in the realm of mobile networks and devices.
[ { "version": "v1", "created": "Mon, 13 Mar 2006 11:14:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0603052
Evgueni Petrov
Evgueni Petrov
Evaluation of interval extension of the power function by graph decomposition
submitted to the INTERVAL 2006 workshop to be held in St. Petersburg June 2006, Russia; extended abstract
null
null
null
cs.MS
null
The subject of our talk is the correct evaluation of interval extension of the function specified by the expression x^y without any constraints on the values of x and y. The core of our approach is a decomposition of the graph of x^y into a small number of parts which can be transformed into subsets of the graph of x^y for non-negative bases x. Because of this fact, evaluation of interval extension of x^y, without any constraints on x and y, is not much harder than evaluation of interval extension of x^y for non-negative bases x.
[ { "version": "v1", "created": "Mon, 13 Mar 2006 12:05:08 GMT" }, { "version": "v2", "created": "Tue, 14 Mar 2006 12:48:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrov", "Evgueni", "" ] ]
cs/0603053
Irene Guessarian
A. Ai T -Bouziad (LIAFA), Irene Guessarian (LIAFA), L. Vieille (NCM)
Automatic generation of simplified weakest preconditions for integrity constraint verification
null
null
null
null
cs.DS cs.DB
null
Given a constraint $c$ assumed to hold on a database $B$ and an update $u$ to be performed on $B$, we address the following question: will $c$ still hold after $u$ is performed? When $B$ is a relational database, we define a confluent terminating rewriting system which, starting from $c$ and $u$, automatically derives a simplified weakest precondition $wp(c,u)$ such that, whenever $B$ satisfies $wp(c,u)$, then the updated database $u(B)$ will satisfy $c$, and moreover $wp(c,u)$ is simplified in the sense that its computation depends only upon the instances of $c$ that may be modified by the update. We then extend the definition of a simplified $wp(c,u)$ to the case of deductive databases; we prove it using fixpoint induction.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 14:30:10 GMT" } ]
2007-05-23T00:00:00
[ [ "-Bouziad", "A. Ai T", "", "LIAFA" ], [ "Guessarian", "Irene", "", "LIAFA" ], [ "Vieille", "L.", "", "NCM" ] ]
cs/0603054
Oleg Verbitsky
Martin Grohe and Oleg Verbitsky
Testing Graph Isomorphism in Parallel by Playing a Game
21 pages
null
null
null
cs.CC cs.LO
null
Our starting point is the observation that if graphs in a class C have low descriptive complexity in first order logic, then the isomorphism problem for C is solvable by a fast parallel algorithm (essentially, by a simple combinatorial algorithm known as the multidimensional Weisfeiler-Lehman algorithm). Using this approach, we prove that isomorphism of graphs of bounded treewidth is testable in TC1, answering an open question posed by Chandrasekharan. Furthermore, we obtain an AC1 algorithm for testing isomorphism of rotation systems (combinatorial specifications of graph embeddings). The AC1 upper bound was known before, but the fact that this bound can be achieved by the simple Weisfeiler-Lehman algorithm is new. Combined with other known results, it also yields a new AC1 isomorphism algorithm for planar graphs.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 15:46:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Grohe", "Martin", "" ], [ "Verbitsky", "Oleg", "" ] ]
cs/0603055
Ashfaq Shaik
Ashfaq N Shaik
Improved Watermarking Scheme Using Decimal Sequences
7 pages, 10 figures
null
null
null
cs.CR
null
This paper presents watermarking algorithms using d-sequences so that the peak signal to noise ratio (PSNR) is maximized and the distortion introduced in the image due to the embedding is minimized. By exploiting the cross correlation property of decimal sequences, the concept of embedding more than one watermark in the same cover image is investigated.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 18:55:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Shaik", "Ashfaq N", "" ] ]
cs/0603056
Philip Davis
Philip M. Davis and Michael J. Fromerth
Does the arXiv lead to higher citations and reduced publisher downloads for mathematics articles?
Last updated May 02, 2006
Scientometrics Vol. 71, No. 2. (May, 2007)
10.1007/s11192-007-1661-8
null
cs.DL cs.IR math.HO
null
An analysis of 2,765 articles published in four math journals from 1997 to 2005 indicate that articles deposited in the arXiv received 35% more citations on average than non-deposited articles (an advantage of about 1.1 citations per article), and that this difference was most pronounced for highly-cited articles. Open Access, Early View, and Quality Differential were examined as three non-exclusive postulates for explaining the citation advantage. There was little support for a universal Open Access explanation, and no empirical support for Early View. There was some inferential support for a Quality Differential brought about by more highly-citable articles being deposited in the arXiv. In spite of their citation advantage, arXiv-deposited articles received 23% fewer downloads from the publisher's website (about 10 fewer downloads per article) in all but the most recent two years after publication. The data suggest that arXiv and the publisher's website may be fulfilling distinct functional needs of the reader.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 19:36:24 GMT" }, { "version": "v2", "created": "Wed, 15 Mar 2006 21:08:20 GMT" }, { "version": "v3", "created": "Mon, 20 Mar 2006 17:34:40 GMT" }, { "version": "v4", "created": "Tue, 2 May 2006 19:28:01 GMT" }, { "version": "v5", "created": "Tue, 6 Feb 2007 14:52:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Davis", "Philip M.", "" ], [ "Fromerth", "Michael J.", "" ] ]
cs/0603057
Nodari Sitchinava
David Eppstein, Michael T. Goodrich, Nodari Sitchinava
Guard Placement For Wireless Localization
null
null
null
null
cs.CG
null
Motivated by secure wireless networking, we consider the problem of placing fixed localizers that enable mobile communication devices to prove they belong to a secure region that is defined by the interior of a polygon. Each localizer views an infinite wedge of the plane, and a device can prove membership in the secure region if it is inside the wedges for a set of localizers whose common intersection contains no points outside the polygon. This model leads to a broad class of new art gallery type problems, for which we provide upper and lower bounds.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 20:19:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Sitchinava", "Nodari", "" ] ]
cs/0603060
Tobias Riege
Tobias Riege, J\"org Rothe, Holger Spakowski and Masaki Yamamoto
An Improved Exact Algorithm for the Domatic Number Problem
9 pages, a two-page abstract of this paper is to appear in the Proceedings of the Second IEEE International Conference on Information & Communication Technologies: From Theory to Applications, April 2006
null
null
null
cs.CC
null
The 3-domatic number problem asks whether a given graph can be partitioned intothree dominating sets. We prove that this problem can be solved by a deterministic algorithm in time 2.695^n (up to polynomial factors). This result improves the previous bound of 2.8805^n, which is due to Fomin, Grandoni, Pyatkin, and Stepanov. To prove our result, we combine an algorithm by Fomin et al. with Yamamoto's algorithm for the satisfiability problem. In addition, we show that the 3-domatic number problem can be solved for graphs G with bounded maximum degree Delta(G) by a randomized algorithm, whose running time is better than the previous bound due to Riege and Rothe whenever Delta(G) >= 5. Our new randomized algorithm employs Schoening's approach to constraint satisfaction problems.
[ { "version": "v1", "created": "Thu, 16 Mar 2006 16:05:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Riege", "Tobias", "" ], [ "Rothe", "Jörg", "" ], [ "Spakowski", "Holger", "" ], [ "Yamamoto", "Masaki", "" ] ]
cs/0603062
Benoit Donnet
Benoit Donnet, Bradley Huffaker, Timur Friedman, kc claffy
Implementation and Deployment of a Distributed Network Topology Discovery Algorithm
null
null
null
null
cs.NI
null
In the past few years, the network measurement community has been interested in the problem of internet topology discovery using a large number (hundreds or thousands) of measurement monitors. The standard way to obtain information about the internet topology is to use the traceroute tool from a small number of monitors. Recent papers have made the case that increasing the number of monitors will give a more accurate view of the topology. However, scaling up the number of monitors is not a trivial process. Duplication of effort close to the monitors wastes time by reexploring well-known parts of the network, and close to destinations might appear to be a distributed denial-of-service (DDoS) attack as the probes converge from a set of sources towards a given destination. In prior work, authors of this report proposed Doubletree, an algorithm for cooperative topology discovery, that reduces the load on the network, i.e., router IP interfaces and end-hosts, while discovering almost as many nodes and links as standard approaches based on traceroute. This report presents our open-source and freely downloadable implementation of Doubletree in a tool we call traceroute@home. We describe the deployment and validation of traceroute@home on the PlanetLab testbed and we report on the lessons learned from this experience. We discuss how traceroute@home can be developed further and discuss ideas for future improvements.
[ { "version": "v1", "created": "Thu, 16 Mar 2006 16:13:11 GMT" }, { "version": "v2", "created": "Fri, 17 Mar 2006 10:30:41 GMT" }, { "version": "v3", "created": "Tue, 21 Mar 2006 07:39:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Donnet", "Benoit", "" ], [ "Huffaker", "Bradley", "" ], [ "Friedman", "Timur", "" ], [ "claffy", "kc", "" ] ]
cs/0603067
Priya Sivakumar
Priya Sivakumar
Implementing the Three-Stage Quantum Cryptography Protocol
4 pages, 1 figure
null
null
null
cs.CR
null
We present simple implementations of Kak's three-stage quantum cryptography protocol. The case where the transformation is applied to more than one qubit at the same time is also considered.
[ { "version": "v1", "created": "Thu, 16 Mar 2006 22:20:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Sivakumar", "Priya", "" ] ]
cs/0603069
Xueliang Li
Fengwei Li, Xueliang Li
The neighbor-scattering number can be computed in polynomial time for interval graphs
13 pages
null
null
null
cs.DM math.CO
null
Neighbor-scattering number is a useful measure for graph vulnerability. For some special kinds of graphs, explicit formulas are given for this number. However, for general graphs it is shown that to compute this number is NP-complete. In this paper, we prove that for interval graphs this number can be computed in polynomial time.
[ { "version": "v1", "created": "Fri, 17 Mar 2006 07:00:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Fengwei", "" ], [ "Li", "Xueliang", "" ] ]
cs/0603070
Stefan Stefanov Z
S.Z.Stefanov
Predicting the Path of an Open System
18 pages
null
null
null
cs.RO
null
The expected path of an open system,which is a big Poincare system,has been found in this paper.This path has been obtained from the actual and from the expected droop of the open system.The actual droop has been reconstructed from the variations in the power and in the frequency of the open system.The expected droop has been found as a function of rotation from the expected potential energy of the open system under synchronization of that system.
[ { "version": "v1", "created": "Fri, 17 Mar 2006 09:27:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Stefanov", "S. Z.", "" ] ]
cs/0603071
Martin Ziegler
Klaus Meer, Martin Ziegler
An Explicit Solution to Post's Problem over the Reals
submitted to Journal of Complexity
null
null
null
cs.LO cs.SC
null
In the BCSS model of real number computations we prove a concrete and explicit semi-decidable language to be undecidable yet not reducible from (and thus strictly easier than) the real Halting Language. This solution to Post's Problem over the reals significantly differs from its classical, discrete variant where advanced diagonalization techniques are only known to yield the existence of such intermediate Turing degrees. Strengthening the above result, we construct (that is, obtain again explicitly) as well an uncountable number of incomparable semi-decidable Turing degrees below the real Halting problem in the BCSS model. Finally we show the same to hold for the linear BCSS model, that is over (R,+,-,<) rather than (R,+,-,*,/,<).
[ { "version": "v1", "created": "Fri, 17 Mar 2006 16:12:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Meer", "Klaus", "" ], [ "Ziegler", "Martin", "" ] ]
cs/0603073
Bryan Ford
Bryan Ford
VXA: A Virtual Architecture for Durable Compressed Archives
14 pages, 7 figures, 2 tables
4th USENIX Conference on File and Storage Technologies, December 2005 (FAST '05), San Francisco, CA
null
null
cs.DL cs.IR
null
Data compression algorithms change frequently, and obsolete decoders do not always run on new hardware and operating systems, threatening the long-term usability of content archived using those algorithms. Re-encoding content into new formats is cumbersome, and highly undesirable when lossy compression is involved. Processor architectures, in contrast, have remained comparatively stable over recent decades. VXA, an archival storage system designed around this observation, archives executable decoders along with the encoded content it stores. VXA decoders run in a specialized virtual machine that implements an OS-independent execution environment based on the standard x86 architecture. The VXA virtual machine strictly limits access to host system services, making decoders safe to run even if an archive contains malicious code. VXA's adoption of a "native" processor architecture instead of type-safe language technology allows reuse of existing "hand-optimized" decoders in C and assembly language, and permits decoders access to performance-enhancing architecture features such as vector processing instructions. The performance cost of VXA's virtualization is typically less than 15% compared with the same decoders running natively. The storage cost of archived decoders, typically 30-130KB each, can be amortized across many archived files sharing the same compression method.
[ { "version": "v1", "created": "Sat, 18 Mar 2006 16:31:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ] ]
cs/0603074
Bryan Ford
Bryan Ford, Pyda Srisuresh, Dan Kegel
Peer-to-Peer Communication Across Network Address Translators
8 figures, 1 table
USENIX Annual Technical Conference, April 2005 (USENIX '05), Anaheim, CA
null
null
cs.NI cs.CR
null
Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP address. Several NAT traversal techniques are known, but their documentation is slim, and data about their robustness or relative merits is slimmer. This paper documents and analyzes one of the simplest but most robust and practical NAT traversal techniques, commonly known as "hole punching." Hole punching is moderately well-understood for UDP communication, but we show how it can be reliably used to set up peer-to-peer TCP streams as well. After gathering data on the reliability of this technique on a wide variety of deployed NATs, we find that about 82% of the NATs tested support hole punching for UDP, and about 64% support hole punching for TCP streams. As NAT vendors become increasingly conscious of the needs of important P2P applications such as Voice over IP and online gaming protocols, support for hole punching is likely to increase in the future.
[ { "version": "v1", "created": "Sat, 18 Mar 2006 16:51:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ], [ "Srisuresh", "Pyda", "" ], [ "Kegel", "Dan", "" ] ]
cs/0603075
Bryan Ford
Bryan Ford
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
7 pages, 3 figures
Second Workshop on Hot Topics in Networks (HotNets-II), November 2003, Cambridge, MA
null
null
cs.NI cs.OS
null
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarchical, administratively assigned addresses. Existing ad-hoc routing protocols address the management problem but do not scale to Internet-wide networks. The promise of ubiquitous network computing cannot be fulfilled until we develop an Unmanaged Internet Protocol (UIP), a scalable routing protocol that manages itself automatically. UIP must route within and between constantly changing edge networks potentially containing millions or billions of nodes, and must still function within edge networks disconnected from the main Internet, all without imposing the administrative burden of hierarchical address assignment. Such a protocol appears challenging but feasible. We propose an architecture based on self-certifying, cryptographic node identities and a routing algorithm adapted from distributed hash tables.
[ { "version": "v1", "created": "Sat, 18 Mar 2006 17:11:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ] ]
cs/0603076
Bryan Ford
Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans Kaashoek, Robert Morris
User-Relative Names for Globally Connected Personal Devices
7 pages, 1 figure, 1 table
5th International Workshop on Peer-to-Peer Systems, February 2006 (IPTPS 2006), Santa Barbara, CA
null
null
cs.NI cs.DC cs.OS
null
Nontechnical users who own increasingly ubiquitous network-enabled personal devices such as laptops, digital cameras, and smart phones need a simple, intuitive, and secure way to share information and services between their devices. User Information Architecture, or UIA, is a novel naming and peer-to-peer connectivity architecture addressing this need. Users assign UIA names by "introducing" devices to each other on a common local-area network, but these names remain securely bound to their target as devices migrate. Multiple devices owned by the same user, once introduced, automatically merge their namespaces to form a distributed "personal cluster" that the owner can access or modify from any of his devices. Instead of requiring users to allocate globally unique names from a central authority, UIA enables users to assign their own "user-relative" names both to their own devices and to other users. With UIA, for example, Alice can always access her iPod from any of her own personal devices at any location via the name "ipod", and her friend Bob can access her iPod via a relative name like "ipod.Alice".
[ { "version": "v1", "created": "Sat, 18 Mar 2006 17:27:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ], [ "Strauss", "Jacob", "" ], [ "Lesniewski-Laas", "Chris", "" ], [ "Rhea", "Sean", "" ], [ "Kaashoek", "Frans", "" ], [ "Morris", "Robert", "" ] ]
cs/0603077
Bryan Ford
Bryan Ford
Packrat Parsing: Simple, Powerful, Lazy, Linear Time
12 pages, 5 figures
International Conference on Functional Programming (ICFP '02), October 2002, Pittsburgh, PA
null
null
cs.DS cs.CC cs.PL
null
Packrat parsing is a novel technique for implementing parsers in a lazy functional programming language. A packrat parser provides the power and flexibility of top-down parsing with backtracking and unlimited lookahead, but nevertheless guarantees linear parse time. Any language defined by an LL(k) or LR(k) grammar can be recognized by a packrat parser, in addition to many languages that conventional linear-time algorithms do not support. This additional power simplifies the handling of common syntactic idioms such as the widespread but troublesome longest-match rule, enables the use of sophisticated disambiguation strategies such as syntactic and semantic predicates, provides better grammar composition properties, and allows lexical analysis to be integrated seamlessly into parsing. Yet despite its power, packrat parsing shares the same simplicity and elegance as recursive descent parsing; in fact converting a backtracking recursive descent parser into a linear-time packrat parser often involves only a fairly straightforward structural change. This paper describes packrat parsing informally with emphasis on its use in practical applications, and explores its advantages and disadvantages with respect to the more conventional alternatives.
[ { "version": "v1", "created": "Sat, 18 Mar 2006 17:49:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ] ]
cs/0603079
Maria Chiara Meo
Maurizio Gabbrielli and Maria Chiara Meo
A compositional Semantics for CHR
null
null
null
null
cs.PL
null
Constraint Handling Rules (CHR) are a committed-choice declarative language which has been designed for writing constraint solvers. A CHR program consists of multi-headed guarded rules which allow one to rewrite constraints into simpler ones until a solved form is reached. CHR has received a considerable attention, both from the practical and from the theoretical side. Nevertheless, due the use of multi-headed clauses, there are several aspects of the CHR semantics which have not been clarified yet. In particular, no compositional semantics for CHR has been defined so far. In this paper we introduce a fix-point semantics which characterizes the input/output behavior of a CHR program and which is and-compositional, that is, which allows to retrieve the semantics of a conjunctive query from the semantics of its components. Such a semantics can be used as a basis to define incremental and modular analysis and verification tools.
[ { "version": "v1", "created": "Mon, 20 Mar 2006 14:17:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Gabbrielli", "Maurizio", "" ], [ "Meo", "Maria Chiara", "" ] ]
cs/0603080
Alin Suciu PhD
Alin Suciu
Yet Another Efficient Unification Algorithm
null
null
null
null
cs.LO cs.AI
null
The unification algorithm is at the core of the logic programming paradigm, the first unification algorithm being developed by Robinson [5]. More efficient algorithms were developed later [3] and I introduce here yet another efficient unification algorithm centered on a specific data structure, called the Unification Table.
[ { "version": "v1", "created": "Mon, 20 Mar 2006 20:15:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ] ]
cs/0603081
Nikita Sakhanenko
Nikita A. Sakhanenko (1 and 2), George F. Luger (1), Hanna E. Makaruk (2), David B. Holtkamp (2) ((1) CS Dept. University of New Mexico, (2) Physics Div. Los Alamos National Laboratory)
Application of Support Vector Regression to Interpolation of Sparse Shock Physics Data Sets
13 pages, 7 figures
null
null
LA-UR-06-1739
cs.AI
null
Shock physics experiments are often complicated and expensive. As a result, researchers are unable to conduct as many experiments as they would like - leading to sparse data sets. In this paper, Support Vector Machines for regression are applied to velocimetry data sets for shock damaged and melted tin metal. Some success at interpolating between data sets is achieved. Implications for future work are discussed.
[ { "version": "v1", "created": "Mon, 20 Mar 2006 23:43:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Sakhanenko", "Nikita A.", "", "1 and 2" ], [ "Luger", "George F.", "" ], [ "Makaruk", "Hanna E.", "" ], [ "Holtkamp", "David B.", "" ] ]
cs/0603082
Giorgi Pascal
Wayne Eberly, Mark Giesbrecht (SCG), Pascal Giorgi (LP2A, SCG), Arne Storjohann (SCG), Gilles Villard (LIP)
Solving Sparse Integer Linear Systems
null
null
null
null
cs.SC
null
We propose a new algorithm to solve sparse linear systems of equations over the integers. This algorithm is based on a $p$-adic lifting technique combined with the use of block matrices with structured blocks. It achieves a sub-cubic complexity in terms of machine operations subject to a conjecture on the effectiveness of certain sparse projections. A LinBox-based implementation of this algorithm is demonstrated, and emphasizes the practical benefits of this new method over the previous state of the art.
[ { "version": "v1", "created": "Tue, 21 Mar 2006 16:09:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Eberly", "Wayne", "", "SCG" ], [ "Giesbrecht", "Mark", "", "SCG" ], [ "Giorgi", "Pascal", "", "LP2A, SCG" ], [ "Storjohann", "Arne", "", "SCG" ], [ "Villard", "Gilles", "", "LIP" ] ]
cs/0603084
Eran Ofek
Uriel Feige and Eran Ofek
Random 3CNF formulas elude the Lovasz theta function
14 pages
null
null
null
cs.CC cs.DS cs.LO
null
Let $\phi$ be a 3CNF formula with n variables and m clauses. A simple nonconstructive argument shows that when m is sufficiently large compared to n, most 3CNF formulas are not satisfiable. It is an open question whether there is an efficient refutation algorithm that for most such formulas proves that they are not satisfiable. A possible approach to refute a formula $\phi$ is: first, translate it into a graph $G_{\phi}$ using a generic reduction from 3-SAT to max-IS, then bound the maximum independent set of $G_{\phi}$ using the Lovasz $\vartheta$ function. If the $\vartheta$ function returns a value $< m$, this is a certificate for the unsatisfiability of $\phi$. We show that for random formulas with $m < n^{3/2 -o(1)}$ clauses, the above approach fails, i.e. the $\vartheta$ function is likely to return a value of m.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 10:30:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Feige", "Uriel", "" ], [ "Ofek", "Eran", "" ] ]
cs/0603085
Jonathan Adams
Jonathan K. Adams, Basheer N. Bristow
Access Control for Hierarchical Joint-Tenancy
To appear in WSEAS Transactions on Computers, will probably be edited further before final revision replaced due to typographical errors
WSEAS Transactions on Computers, June 2006, Issue 6, Volume 5, p. 1313-1318
null
null
cs.CR
null
Basic role based access control [RBAC] provides a mechanism for segregating access privileges based upon a user's hierarchical roles within an organization. This model doesn't scale well when there is tight integration of multiple hierarchies. In a case where there is joint-tenancy and a requirement for different levels of disclosure based upon a user's hierarchy, or in our case, organization or company, basic RBAC requires these hierarchies to be effectively merged. Specific roles that effectively represent both the user's organizations and roles must be translated to fit within the merged hierarchy to be used to control access. Essentially, users from multiple organizations are served from a single role base with roles designed to constrain their access as needed. Our work proposes, through parameterized roles and privileges, a means for accurately representing both users' roles within their respective hierarchies for providing access to controlled objects. Using this method will reduce the amount of complexity required in terms of the number of roles and privileges. The resulting set of roles, privileges, and objects will make modeling and visualizing the access role hierarchy significantly simplified. This paper will give some background on role based access control, parameterized roles and privileges, and then focus on how RBAC with parameterized roles and privileges can be leveraged as an access control solution for the problems presented by joint tenancy.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 10:59:06 GMT" }, { "version": "v2", "created": "Thu, 23 Mar 2006 01:18:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Adams", "Jonathan K.", "" ], [ "Bristow", "Basheer N.", "" ] ]
cs/0603086
Joel Le Roux
Joel Le Roux (1), Philippe Chaurand (1) and Mickael Urrutia (1) ((1) University of Nice (France))
Matching Edges in Images ; Application to Face Recognition
11 Pages, 6 figures
null
null
null
cs.CV
null
This communication describes a representation of images as a set of edges characterized by their position and orientation. This representation allows the comparison of two images and the computation of their similarity. The first step in this computation of similarity is the seach of a geometrical basis of the two dimensional space where the two images are represented simultaneously after transformation of one of them. Presently, this simultaneous representation takes into account a shift and a scaling ; it may be extended to rotations or other global geometrical transformations. An elementary probabilistic computation shows that a sufficient but not excessive number of trials (a few tens) ensures that the exhibition of this common basis is guaranteed in spite of possible errors in the detection of edges. When this first step is performed, the search of similarity between the two images reduces to counting the coincidence of edges in the two images. The approach may be applied to many problems of pattern matching ; it was checked on face recognition.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 14:51:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Roux", "Joel Le", "" ], [ "Chaurand", "Philippe", "" ], [ "Urrutia", "Mickael", "" ] ]
cs/0603087
P. Oscar Boykin
Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato Figueiredo
IP over P2P: Enabling Self-configuring Virtual IP Networks for Grid Computing
To appear in IPDPS 2006
null
null
null
cs.DC cs.NI
null
Peer-to-peer (P2P) networks have mostly focused on task oriented networking, where networks are constructed for single applications, i.e. file-sharing, DNS caching, etc. In this work, we introduce IPOP, a system for creating virtual IP networks on top of a P2P overlay. IPOP enables seamless access to Grid resources spanning multiple domains by aggregating them into a virtual IP network that is completely isolated from the physical network. The virtual IP network provided by IPOP supports deployment of existing IP-based protocols over a robust, self-configuring P2P overlay. We present implementation details as well as experimental measurement results taken from LAN, WAN, and Planet-Lab tests.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 16:50:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Ganguly", "Arijit", "" ], [ "Agrawal", "Abhishek", "" ], [ "Boykin", "P. Oscar", "" ], [ "Figueiredo", "Renato", "" ] ]
cs/0603088
Himanshu Thapliyal
Himanshu Thapliyal, Saurabh Kotiyal and M.B Srinivas
Novel BCD Adders and Their Reversible Logic Implementation for IEEE 754r Format
6 Pages: This paper is a corrected version of our recent publication published in 19th International Conference on VLSI Design and 5th International Conference on Embedded Systems (VLSI Design 2006), Hyderabad, India, Jan 4-7, 2006
null
null
null
cs.AR
null
IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and a major enhancement to the standard is the addition of decimal format. This paper proposes two novel BCD adders called carry skip and carry look-ahead BCD adders respectively. Furthermore, in the recent years, reversible logic has emerged as a promising technology having its applications in low power CMOS, quantum computing, nanotechnology, and optical computing. It is not possible to realize quantum computing without reversible logic. Thus, this paper also paper provides the reversible logic implementation of the conventional BCD adder as the well as the proposed Carry Skip BCD adder using a recently proposed TSG gate. Furthermore, a new reversible gate called TS-3 is also being proposed and it has been shown that the proposed reversible logic implementation of the BCD Adders is much better compared to recently proposed one, in terms of number of reversible gates used and garbage outputs produced. The reversible BCD circuits designed and proposed here form the basis of the decimal ALU of a primitive quantum CPU.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 18:11:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Kotiyal", "Saurabh", "" ], [ "Srinivas", "M. B", "" ] ]
cs/0603089
Lawrence Ioannou
Lawrence M. Ioannou and Benjamin C. Travaglione and Donny Cheung
Convex Separation from Optimization via Heuristics
null
null
null
null
cs.DS math.OC
null
Let $K$ be a full-dimensional convex subset of $\mathbb{R}^n$. We describe a new polynomial-time Turing reduction from the weak separation problem for $K$ to the weak optimization problem for $K$ that is based on a geometric heuristic. We compare our reduction, which relies on analytic centers, with the standard, more general reduction.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 19:46:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Ioannou", "Lawrence M.", "" ], [ "Travaglione", "Benjamin C.", "" ], [ "Cheung", "Donny", "" ] ]
cs/0603090
Alexander Gorban
A.N. Gorban, N.R. Sumner, A.Y. Zinovyev
Topological Grammars for Data Approximation
Corrected Journal version, Appl. Math. Lett., in press. 7 pgs., 2 figs
Applied Mathematics Letters 20 (2007) 382--386
10.1016/j.aml.2006.04.022
null
cs.NE cs.LG
null
A method of {\it topological grammars} is proposed for multidimensional data approximation. For data with complex topology we define a {\it principal cubic complex} of low dimension and given complexity that gives the best approximation for the dataset. This complex is a generalization of linear and non-linear principal manifolds and includes them as particular cases. The problem of optimal principal complex construction is transformed into a series of minimization problems for quadratic functionals. These quadratic functionals have a physically transparent interpretation in terms of elastic energy. For the energy computation, the whole complex is represented as a system of nodes and springs. Topologically, the principal complex is a product of one-dimensional continuums (represented by graphs), and the grammars describe how these continuums transform during the process of optimal complex construction. This factorization of the whole process onto one-dimensional transformations using minimization of quadratic energy functionals allow us to construct efficient algorithms.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 22:52:23 GMT" }, { "version": "v2", "created": "Fri, 28 Jul 2006 13:41:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Gorban", "A. N.", "" ], [ "Sumner", "N. R.", "" ], [ "Zinovyev", "A. Y.", "" ] ]
cs/0603091
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
A New Reversible TSG Gate and Its Application For Designing Efficient Adder Circuits
5 Pages: Published in 7th International Symposium on Representations and Methodology of Future Computing Technologies(RM 2005), Tokyo, Japan, September 5-6, 2005
null
null
null
cs.AR
null
In the recent years, reversible logic has emerged as a promising technology having its applications in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. This paper proposes a new 4 * 4 reversible gate called TSG gate. The proposed gate is used to design efficient adder units. The most significant aspect of the proposed gate is that it can work singly as a reversible full adder i.e reversible full adder can now be implemented with a single gate only. The proposed gate is then used to design reversible ripple carry and carry skip adders. It is demonstrated that the adder architectures designed using the proposed gate are much better and optimized, compared to their existing counterparts in literature; in terms of number of reversible gates and garbage outputs. Thus, this paper provides the initial threshold to building of more complex system which can execute more complicated operations using reversible logic.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 06:44:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
cs/0603092
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible Sequential Circuits using Fredkin Gates
7 Pages: Deals with design of reversible sequential circuits. Published: Proceedings of SPIE Volume: 6050, pp.196-202.Optomechatronic Micro/Nano Devices and Components, Sapporo, Japan, December 5-7, 2005; Editor(s): Yoshitada Katagiri
null
null
null
cs.AR
null
In recent years, reversible logic has emerged as a promising computing paradigm having its applications in low power computing, quantum computing, nanotechnology, optical computing and DNA computing. The classical set of gates such as AND, OR, and EXOR are not reversible. Recently, it has been shown how to encode information in DNA and use DNA amplification to implement Fredkin gates. Furthermore, in the past Fredkin gates have been constructed using DNA, whose outputs are used as inputs for other Fredkin gates. Thus, it can be concluded that arbitrary circuits of Fredkin gates can be constructed using DNA. This paper provides the initial threshold to building of more complex system having reversible sequential circuits and which can execute more complicated operations. The novelty of the paper is the reversible designs of sequential circuits using Fredkin gate. Since, Fredkin gate has already been realized using DNA, it is expected that this work will initiate the building of complex systems using DNA. The reversible circuits designed here are highly optimized in terms of number of gates and garbage outputs. The modularization approach that is synthesizing small circuits and thereafter using them to construct bigger circuits is used for designing the optimal reversible sequential circuits.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 08:33:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
cs/0603099
Alin Suciu PhD
Alin Suciu, Rodica Potolea, Tudor Muresan
Benchmark Problems for Constraint Solving
null
null
null
null
cs.PF cs.SC
null
Constraint Programming is roughly a new software technology introduced by Jaffar and Lassez in 1987 for description and effective solving of large, particularly combinatorial, problems especially in areas of planning and scheduling. In the following we define three problems for constraint solving from the domain of electrical networks; based on them we define 43 related problems. For the defined set of problems we benchmarked five systems: ILOG OPL, AMPL, GAMS, Mathematica and UniCalc. As expected some of the systems performed very well for some problems while others performed very well on others.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:19:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Potolea", "Rodica", "" ], [ "Muresan", "Tudor", "" ] ]
cs/0603100
Alin Suciu PhD
Alin Suciu, Kalman Pusztai
Efficient Compression of Prolog Programs
null
null
null
null
cs.PL
null
We propose a special-purpose class of compression algorithms for efficient compression of Prolog programs. It is a dictionary-based compression method, specially designed for the compression of Prolog code, and therefore we name it PCA (Prolog Compression Algorithm). According to the experimental results this method provides better compression than state-of-the-art general-purpose compression algorithms. Since the algorithm works with Prolog syntactic entities (e.g. atoms, terms, etc.) the implementation of a Prolog prototype is straightforward and very easy to use in any Prolog application that needs compression. Although the algorithm is designed for Prolog programs, the idea can be easily applied for the compression of programs written in other (logic) languages.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:27:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Pusztai", "Kalman", "" ] ]
cs/0603101
Alin Suciu PhD
Alin Suciu, Kalman Pusztai, Andrei Vancea
Prolog Server Pages
null
null
null
null
cs.NI cs.PL
null
Prolog Server Pages (PSP) is a scripting language, based on Prolog, than can be embedded in HTML documents. To run PSP applications one needs a web server, a web browser and a PSP interpreter. The code is executed, by the interpreter, on the server-side (web server) and the output (together with the html code in witch the PSP code is embedded) is sent to the client-side (browser). The current implementation supports Apache Web Server. We implemented an Apache web server module that handles PSP files, and sends the result (an html document) to the client. PSP supports both GET and POST http requests. It also provides methods for working with http cookies.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:35:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Pusztai", "Kalman", "" ], [ "Vancea", "Andrei", "" ] ]
cs/0603102
Alin Suciu PhD
Alin Suciu, Kalman Pusztai, Andrei Diaconu
Enhanced Prolog Remote Predicate Call Protocol
null
null
null
null
cs.NI cs.PL
null
Following the ideas of the Remote Procedure Call model, we have developed a logic programming counterpart, naturally called Prolog Remote Predicate Call (Prolog RPC). The Prolog RPC protocol facilitates the integration of Prolog code in multi-language applications as well as the development of distributed intelligent applications. One use of the protocol's most important uses could be the development of distributed applications that use Prolog at least partially to achieve their goals. Most notably the Distributed Artificial Intelligence (DAI) applications that are suitable for logic programming can profit from the use of the protocol. After proving its usefulness, we went further, developing a new version of the protocol, making it more reliable and extending its functionality. Because it has a new syntax and the new set of commands, we call this version Enhanced Prolog Remote Procedure Call. This paper describes the new features and modifications this second version introduced.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:44:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Pusztai", "Kalman", "" ], [ "Diaconu", "Andrei", "" ] ]
cs/0603104
Patrick Baillot
Vincent Atassi (LIPN), Patrick Baillot (LIPN), Kazushige Terui (NII)
Verification of Ptime reducibility for system F terms via Dual Light Affine Logic
21 pages
A para\^{i}tre dans Proceedings Computer Science Logic 2006 (CSL'06), LNCS, Springer. (2006)
null
null
cs.LO
null
In a previous work we introduced Dual Light Affine Logic (DLAL) ([BaillotTerui04]) as a variant of Light Linear Logic suitable for guaranteeing complexity properties on lambda-calculus terms: all typable terms can be evaluated in polynomial time and all Ptime functions can be represented. In the present work we address the problem of typing lambda-terms in second-order DLAL. For that we give a procedure which, starting with a term typed in system F, finds all possible ways to decorate it into a DLAL typed term. We show that our procedure can be run in time polynomial in the size of the original Church typed system F term.
[ { "version": "v1", "created": "Mon, 27 Mar 2006 09:14:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Atassi", "Vincent", "", "LIPN" ], [ "Baillot", "Patrick", "", "LIPN" ], [ "Terui", "Kazushige", "", "NII" ] ]
cs/0603107
Pedro Fortuny Ayuso
Pedro Fortuny Ayuso
Towards an information-theoretically safe cryptographic protocol
2 pages
null
null
null
cs.CR
null
We introduce what --if some kind of group action exists-- is a truly (information theoretically) safe cryptographic communication system: a protocol which provides \emph{zero} information to any passive adversary having full access to the channel.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 17:47:11 GMT" }, { "version": "v2", "created": "Tue, 28 Mar 2006 21:27:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Ayuso", "Pedro Fortuny", "" ] ]
cs/0603108
Michael Brinkmeier
Michael Brinkmeier
Minimizing Symmetric Set Functions Faster
9 pages
null
null
null
cs.DM math.CO
null
We describe a combinatorial algorithm which, given a monotone and consistent symmetric set function d on a finite set V in the sense of Rizzi, constructs a non trivial set S minimizing d(S,V-S). This includes the possibility for the minimization of symmetric submodular functions. The presented algorithm requires at most as much time as the one described by Rizzi, but depending on the function d, it may allow several improvements.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 10:25:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Brinkmeier", "Michael", "" ] ]
cs/0603110
Marcus Hutter
Daniil Ryabko and Marcus Hutter
Asymptotic Learnability of Reinforcement Problems with Arbitrary Dependence
15 pages
Proc. 17th International Conf. on Algorithmic Learning Theory (ALT 2006) pages 334-347
null
IDSIA-09-06
cs.LG cs.AI
null
We address the problem of reinforcement learning in which observations may exhibit an arbitrary form of stochastic dependence on past observations and actions. The task for an agent is to attain the best possible asymptotic reward where the true generating environment is unknown but belongs to a known countable family of environments. We find some sufficient conditions on the class of environments under which an agent exists which attains the best asymptotic reward for any environment in the class. We analyze how tight these conditions are and how they relate to different probabilistic assumptions known in reinforcement learning and related fields, such as Markov Decision Processes and mixing conditions.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 16:22:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Ryabko", "Daniil", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0603111
Tomasz Blachowicz
T. Blachowicz and M. Wieja
Remote-control and clustering of physical computations using the XML-RPC protocol and the open-Mosix system
18 pages, 2 figures
null
null
null
cs.DC cs.NI
null
The applications of the remote control of physical simulations performed in clustered computers running under an open-Mosix system are presented. Results from the simulation of a 2-dimensional ferromagnetic system of spins in the Ising scheme are provided. Basic parameters of a simulated hysteresis loop like coercivity and exchange bias due to pinning of ferromagnetic spins are given. The paper describes in physicists terminology a cost effective solution which utilizes an XML-RPC protocol (Extensible Markup Language - Remote Procedure Calling) and standard C++ and Python languages.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 20:45:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Blachowicz", "T.", "" ], [ "Wieja", "M.", "" ] ]
cs/0603114
William Yurcik
Gregory A. Pluta, Larry Brumbaugh, William Yurcik
Using SMART for Customized Monitoring of Windows Services
15 pages, 10 figures, 2 tables
null
null
null
cs.NI cs.CR
null
We focus on examining and working with an important category of computer software called Services, which are provided as a part of newer Microsoft Windows operating systems. A typical Windows user transparently utilizes many of these services but is frequently unaware of their existence. Since some services have the potential to create significant problems when they are executing, it is important for a system administrator to identify which services are running on the network, the types of processing done by each service, and any interrelationships among the various services. This information can then be used to improve the overall integrity of both the individual computer where a questionable service is running and in aggregate an entire network of computers. NCSA has developed an application called SMART (Services Monitoring And Reporting Tool) that can be used to identify and display all services currently running in the network. A commercial program called Hyena remotely monitors the services on all computers attached to the network and exports this information to SMART. SMART produces various outputs that the system administrator can analyze and then determine appropriate actions to take. In particular, SMART provides a color coordinated user interface to quickly identify and classify both potentially hazardous services and also unknown services.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 05:25:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Pluta", "Gregory A.", "" ], [ "Brumbaugh", "Larry", "" ], [ "Yurcik", "William", "" ] ]
cs/0603115
David Defour
Guillaume Da Gra\c{c}ca (LP2A), David Defour (LP2A)
Implementation of float-float operators on graphics hardware
null
null
null
null
cs.AR cs.GR
null
The Graphic Processing Unit (GPU) has evolved into a powerful and flexible processor. The latest graphic processors provide fully programmable vertex and pixel processing units that support vector operations up to single floating-point precision. This computational power is now being used for general-purpose computations. However, some applications require higher precision than single precision. This paper describes the emulation of a 44-bit floating-point number format and its corresponding operations. An implementation is presented along with performance and accuracy results.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 11:48:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Da Graçca", "Guillaume", "", "LP2A" ], [ "Defour", "David", "", "LP2A" ] ]
cs/0603117
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
Affine functions and series with co-inductive real numbers
null
Mathematical Structures in Computer Science 17, 1 (2006)
null
null
cs.LO
null
We extend the work of A. Ciaffaglione and P. Di Gianantonio on mechanical verification of algorithms for exact computation on real numbers, using infinite streams of digits implemented as co-inductive types. Four aspects are studied: the first aspect concerns the proof that digit streams can be related to the axiomatized real numbers that are already axiomatized in the proof system (axiomatized, but with no fixed representation). The second aspect re-visits the definition of an addition function, looking at techniques to let the proof search mechanism perform the effective construction of an algorithm that is correct by construction. The third aspect concerns the definition of a function to compute affine formulas with positive rational coefficients. This should be understood as a testbed to describe a technique to combine co-recursion and recursion to obtain a model for an algorithm that appears at first sight to be outside the expressive power allowed by the proof system. The fourth aspect concerns the definition of a function to compute series, with an application on the series that is used to compute Euler's number e. All these experiments should be reproducible in any proof system that supports co-inductive types, co-recursion and general forms of terminating recursion, but we performed with the Coq system [12, 3, 14].
[ { "version": "v1", "created": "Wed, 29 Mar 2006 19:36:03 GMT" }, { "version": "v2", "created": "Mon, 1 May 2006 07:38:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
cs/0603119
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
CoInduction in Coq
null
null
null
null
cs.LO
null
We describe the basic notions of co-induction as they are available in the coq system. As an application, we describe arithmetic properties for simple representations of real numbers.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 19:39:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
cs/0603120
Zengyou He
Zengyou He
Approximation Algorithms for K-Modes Clustering
7 pages
null
null
Tr-06-0330
cs.AI
null
In this paper, we study clustering with respect to the k-modes objective function, a natural formulation of clustering for categorical data. One of the main contributions of this paper is to establish the connection between k-modes and k-median, i.e., the optimum of k-median is at most twice the optimum of k-modes for the same categorical data clustering problem. Based on this observation, we derive a deterministic algorithm that achieves an approximation factor of 2. Furthermore, we prove that the distance measure in k-modes defines a metric. Hence, we are able to extend existing approximation algorithms for metric k-median to k-modes. Empirical results verify the superiority of our method.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 02:02:37 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ] ]
cs/0603121
Scott Turner
Scott Turner, Manuel A. Perez-Quinones and Stephen H. Edwards
minimUML: A Minimalist Approach to UML Diagraming for Early Computer Science Education
38 pages, 15 figures
null
null
null
cs.HC cs.SE
null
The Unified Modeling Language (UML) is commonly used in introductory Computer Science to teach basic object-oriented design. However, there appears to be a lack of suitable software to support this task. Many of the available programs that support UML focus on developing code and not on enhancing learning. Those that were designed for educational use sometimes have poor interfaces or are missing common and important features, such as multiple selection and undo/redo. There is a need for software that is tailored to an instructional environment and has all the useful and needed functionality for that specific task. This is the purpose of minimUML. minimUML provides a minimum amount of UML, just what is commonly used in beginning programming classes, while providing a simple, usable interface. In particular, minimUML was designed to support abstract design while supplying features for exploratory learning and error avoidance. In addition, it allows for the annotation of diagrams, through text or freeform drawings, so students can receive feedback on their work. minimUML was developed with the goal of supporting ease of use, supporting novice students, and a requirement of no prior-training for its use.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 06:12:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Turner", "Scott", "" ], [ "Perez-Quinones", "Manuel A.", "" ], [ "Edwards", "Stephen H.", "" ] ]
cs/0603125
Russ Abbott
Russ Abbott
If a tree casts a shadow is it telling the time?
12 pages. Submitted for conference presentation
null
null
null
cs.MA cs.GL
null
Physical processes are computations only when we use them to externalize thought. Computation is the performance of one or more fixed processes within a contingent environment. We reformulate the Church-Turing thesis so that it applies to programs rather than to computability. When suitably formulated agent-based computing in an open, multi-scalar environment represents the current consensus view of how we interact with the world. But we don't know how to formulate multi-scalar environments.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 22:31:26 GMT" }, { "version": "v2", "created": "Wed, 7 Jun 2006 01:49:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbott", "Russ", "" ] ]
cs/0603127
Russ Abbott
Russ Abbott
Complex Systems + Systems Engineering = Complex Systems Engineeri
10 pages. Position paper to be presented at Conference on Systems Engineering Research
null
null
null
cs.MA
null
One may define a complex system as a system in which phenomena emerge as a consequence of multiscale interaction among the system's components and their environments. The field of Complex Systems is the study of such systems--usually naturally occurring, either bio-logical or social. Systems Engineering may be understood to include the conceptualising and building of systems that consist of a large number of concurrently operating and interacting components--usually including both human and non-human elements. It has become increasingly apparent that the kinds of systems that systems engineers build have many of the same multiscale characteristics as those of naturally occurring complex systems. In other words, systems engineering is the engineering of complex systems. This paper and the associated panel will explore some of the connections between the fields of complex systems and systems engineering.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 22:58:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbott", "Russ", "" ] ]
cs/0603129
Damiano Bolzoni
Xiamoneg Su, Damiano Bolzoni, Pascal van Eck
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
null
null
null
TR-CTIT-06-08
cs.CR
null
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to link explicitly security requirements with the organization's business vision, i.e. to provide business rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements. A conceptual framework is presented, where the relationships between business vision, critical impact factors and valuable assets (together with their security requirements) are shown.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 13:15:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Su", "Xiamoneg", "" ], [ "Bolzoni", "Damiano", "" ], [ "van Eck", "Pascal", "" ] ]
cs/0603132
Michael McGuigan
Michael McGuigan
Graphics Turing Test
6 pages
null
null
null
cs.GR
null
We define a Graphics Turing Test to measure graphics performance in a similar manner to the definition of the traditional Turing Test. To pass the test one needs to reach a computational scale, the Graphics Turing Scale, for which Computer Generated Imagery becomes comparatively indistinguishable from real images while also being interactive. We derive an estimate for this computational scale which, although large, is within reach of todays supercomputers. We consider advantages and disadvantages of various computer systems designed to pass the Graphics Turing Test. Finally we discuss commercial applications from the creation of such a system, in particular Interactive Cinema.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 19:58:30 GMT" } ]
2007-05-23T00:00:00
[ [ "McGuigan", "Michael", "" ] ]
cs/0604001
Fabrice Rossi
Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Brieuc Conan-Guez (LITA)
Theoretical Properties of Projection Based Multilayer Perceptrons with Functional Inputs
null
null
10.1007/s11063-005-3100-2
null
cs.NE
null
Many real world data are sampled functions. As shown by Functional Data Analysis (FDA) methods, spectra, time series, images, gesture recognition data, etc. can be processed more efficiently if their functional nature is taken into account during the data analysis process. This is done by extending standard data analysis methods so that they can apply to functional inputs. A general way to achieve this goal is to compute projections of the functional data onto a finite dimensional sub-space of the functional space. The coordinates of the data on a basis of this sub-space provide standard vector representations of the functions. The obtained vectors can be processed by any standard method. In our previous work, this general approach has been used to define projection based Multilayer Perceptrons (MLPs) with functional inputs. We study in this paper important theoretical properties of the proposed model. We show in particular that MLPs with functional inputs are universal approximators: they can approximate to arbitrary accuracy any continuous mapping from a compact sub-space of a functional space to R. Moreover, we provide a consistency result that shows that any mapping from a functional space to R can be learned thanks to examples by a projection based MLP: the generalization mean square error of the MLP decreases to the smallest possible mean square error on the data when the number of examples goes to infinity.
[ { "version": "v1", "created": "Sat, 1 Apr 2006 20:16:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Conan-Guez", "Brieuc", "", "LITA" ] ]
cs/0604002
Leopoldo Bertossi
Andrei Lopatenko and Leopoldo Bertossi
Complexity of Consistent Query Answering in Databases under Cardinality-Based and Incremental Repair Semantics
26 pages, 2 figures
null
null
null
cs.DB cs.CC
null
Consistent Query Answering (CQA) is the problem of computing from a database the answers to a query that are consistent with respect to certain integrity constraints that the database, as a whole, may fail to satisfy. Consistent answers have been characterized as those that are invariant under certain minimal forms of restoration of the database consistency. We investigate algorithmic and complexity theoretic issues of CQA under database repairs that minimally depart -wrt the cardinality of the symmetric difference- from the original database. We obtain first tight complexity bounds. We also address the problem of incremental complexity of CQA, that naturally occurs when an originally consistent database becomes inconsistent after the execution of a sequence of update operations. Tight bounds on incremental complexity are provided for various semantics under denial constraints. Fixed parameter tractability is also investigated in this dynamic context, where the size of the update sequence becomes the relevant parameter.
[ { "version": "v1", "created": "Sun, 2 Apr 2006 03:07:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Lopatenko", "Andrei", "" ], [ "Bertossi", "Leopoldo", "" ] ]
cs/0604003
Petrus H Potgieter
Petrus H. Potgieter
Hypercomputing the Mandelbrot Set?
11 pages, 2 figures
null
null
null
cs.CC
null
The Mandelbrot set is an extremely well-known mathematical object that can be described in a quite simple way but has very interesting and non-trivial properties. This paper surveys some results that are known concerning the (non-)computability of the set. It considers two models of decidability over the reals (which have been treated much more thoroughly and technically by Hertling (2005), Blum, Shub and Smale, Brattka (2003) and Weihrauch (1999 and 2003) among others), two over the computable reals (the Russian school and hypercomputation) and a model over the rationals.
[ { "version": "v1", "created": "Sun, 2 Apr 2006 15:31:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Potgieter", "Petrus H.", "" ] ]
cs/0604004
Alexander Evako
Alexander V. Evako
The Poincare conjecture for digital spaces. Properties of digital n-dimensional disks and spheres
null
null
null
null
cs.DM cs.CV math.AT
null
Motivated by the Poincare conjecture, we study properties of digital n-dimensional spheres and disks, which are digital models of their continuous counterparts. We introduce homeomorphic transformations of digital manifolds, which retain the connectedness, the dimension, the Euler characteristics and the homology groups of manifolds. We find conditions where an n-dimensional digital manifold is the n-dimensional digital sphere and discuss the link between continuous closed n-manifolds and their digital models.
[ { "version": "v1", "created": "Sun, 2 Apr 2006 19:55:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Evako", "Alexander V.", "" ] ]
cs/0604006
David Bateman
David Bateman and Andy Adler
Sparse Matrix Implementation in Octave
null
null
null
Octave2006/04
cs.MS
null
There are many classes of mathematical problems which give rise to matrices, where a large number of the elements are zero. In this case it makes sense to have a special matrix type to handle this class of problems where only the non-zero elements of the matrix are stored. Not only does this reduce the amount of memory to store the matrix, but it also means that operations on this type of matrix can take advantage of the a-priori knowledge of the positions of the non-zero elements to accelerate their calculations. A matrix type that stores only the non-zero elements is generally called sparse. Until recently Octave has lacked a full implementation of sparse matrices. This article address the implementation of sparse matrices within Octave, including their storage, creation, fundamental algorithms used, their implementations and the basic operations and functions implemented for sparse matrices. Mathematical issues such as the return types of sparse operations, matrix fill-in and reordering for sparse matrix factorization is discussed in the context of a real example. Benchmarking of Octave's implementation of sparse operations compared to their equivalent in Matlab are given and their implications discussed. Results are presented for multiplication and linear algebra operations for various matrix orders and densities. Furthermore, the use of Octave's sparse matrix implementation is demonstrated using a real example of a finite element model (FEM) problem. Finally, the method of using sparse matrices with Octave's oct-files is discussed. The means of creating, using and returning sparse matrices within oct-files is discussed as well as the differences between Octave's Sparse and Array classes.
[ { "version": "v1", "created": "Mon, 3 Apr 2006 12:56:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Bateman", "David", "" ], [ "Adler", "Andy", "" ] ]
cs/0604007
Guillaume Theyssier
Laurent Boyer (LIP), Victor Poupet (LIP), Guillaume Theyssier (LM-Savoie)
On the Complexity of Limit Sets of Cellular Automata Associated with Probability Measures
null
Mathematical Foundations of Computer Science 2006Springer (Ed.) (28/08/2006) 190-201
null
null
cs.DM cs.CC math.DS
null
We study the notion of limit sets of cellular automata associated with probability measures (mu-limit sets). This notion was introduced by P. Kurka and A. Maass. It is a refinement of the classical notion of omega-limit sets dealing with the typical long term behavior of cellular automata. It focuses on the words whose probability of appearance does not tend to 0 as time tends to infinity (the persistent words). In this paper, we give a characterisation of the persistent language for non sensible cellular automata associated with Bernouilli measures. We also study the computational complexity of these languages. We show that the persistent language can be non-recursive. But our main result is that the set of quasi-nilpotent cellular automata (those with a single configuration in their mu-limit set) is neither recursively enumerable nor co-recursively enumerable.
[ { "version": "v1", "created": "Tue, 4 Apr 2006 10:21:36 GMT" }, { "version": "v2", "created": "Mon, 2 Oct 2006 08:53:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Boyer", "Laurent", "", "LIP" ], [ "Poupet", "Victor", "", "LIP" ], [ "Theyssier", "Guillaume", "", "LM-Savoie" ] ]
cs/0604008
Sandor P. Fekete
Esther M. Arkin and Herve Broennimann and Jeff Erickson and Sandor P. Fekete and Christian Knauer and Jonathan Lenchner and Joseph S. B. Mitchell and Kim Whittlesey
Minimum-Cost Coverage of Point Sets by Disks
10 pages, 4 figures, Latex, to appear in ACM Symposium on Computational Geometry 2006
null
null
null
cs.DS cs.CG
null
We consider a class of geometric facility location problems in which the goal is to determine a set X of disks given by their centers (t_j) and radii (r_j) that cover a given set of demand points Y in the plane at the smallest possible cost. We consider cost functions of the form sum_j f(r_j), where f(r)=r^alpha is the cost of transmission to radius r. Special cases arise for alpha=1 (sum of radii) and alpha=2 (total area); power consumption models in wireless network design often use an exponent alpha>2. Different scenarios arise according to possible restrictions on the transmission centers t_j, which may be constrained to belong to a given discrete set or to lie on a line, etc. We obtain several new results, including (a) exact and approximation algorithms for selecting transmission points t_j on a given line in order to cover demand points Y in the plane; (b) approximation algorithms (and an algebraic intractability result) for selecting an optimal line on which to place transmission points to cover Y; (c) a proof of NP-hardness for a discrete set of transmission points in the plane and any fixed alpha>1; and (d) a polynomial-time approximation scheme for the problem of computing a minimum cost covering tour (MCCT), in which the total cost is a linear combination of the transmission cost for the set of disks and the length of a tour/path that connects the centers of the disks.
[ { "version": "v1", "created": "Tue, 4 Apr 2006 17:24:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Arkin", "Esther M.", "" ], [ "Broennimann", "Herve", "" ], [ "Erickson", "Jeff", "" ], [ "Fekete", "Sandor P.", "" ], [ "Knauer", "Christian", "" ], [ "Lenchner", "Jonathan", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Whittlesey", "Kim", "" ] ]
cs/0604009
Alexey Melkikh
Alexey V. Melkikh
Can an Organism Adapt Itself to Unforeseen Circumstances?
null
null
null
null
cs.AI
null
A model of an organism as an autonomous intelligent system has been proposed. This model was used to analyze learning of an organism in various environmental conditions. Processes of learning were divided into two types: strong and weak processes taking place in the absence and the presence of aprioristic information about an object respectively. Weak learning is synonymous to adaptation when aprioristic programs already available in a system (an organism) are started. It was shown that strong learning is impossible for both an organism and any autonomous intelligent system. It was shown also that the knowledge base of an organism cannot be updated. Therefore, all behavior programs of an organism are congenital. A model of a conditioned reflex as a series of consecutive measurements of environmental parameters has been advanced. Repeated measurements are necessary in this case to reduce the error during decision making.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 10:29:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Melkikh", "Alexey V.", "" ] ]
cs/0604011
Noam Shental
Gad Getz, Noam Shental, Eytan Domany
Semi-Supervised Learning -- A Statistical Physics Approach
9 pages. Appeared in in the Proceedings of "Learning with Partially Classified Training Data", ICML 2005 workshop
null
null
null
cs.LG cond-mat.stat-mech cs.CV
null
We present a novel approach to semi-supervised learning which is based on statistical physics. Most of the former work in the field of semi-supervised learning classifies the points by minimizing a certain energy function, which corresponds to a minimal k-way cut solution. In contrast to these methods, we estimate the distribution of classifications, instead of the sole minimal k-way cut, which yields more accurate and robust results. Our approach may be applied to all energy functions used for semi-supervised learning. The method is based on sampling using a Multicanonical Markov chain Monte-Carlo algorithm, and has a straightforward probabilistic interpretation, which allows for soft assignments of points to classes, and also to cope with yet unseen class types. The suggested approach is demonstrated on a toy data set and on two real-life data sets of gene expression.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 18:07:31 GMT" }, { "version": "v2", "created": "Thu, 6 Apr 2006 12:23:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Getz", "Gad", "" ], [ "Shental", "Noam", "" ], [ "Domany", "Eytan", "" ] ]
cs/0604012
Sreeram Vuppala
Sreeram Vuppala
The Aryabhata Algorithm Using Least Absolute Remainders
9 pages
null
null
null
cs.CR
null
This paper presents an introduction to the Aryabhata algorithm for finding multiplicative inverses and solving linear congruences, both of which have applications in cryptography. We do so by the use of the least absolute remainders. The exposition of the Aryabhata algorithm provided here can have performance that could exceed what was described recently by Rao and Yang.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 19:18:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Vuppala", "Sreeram", "" ] ]
cs/0604013
Shripad Thite
Shripad Thite
On Covering a Graph Optimally with Induced Subgraphs
9 pages
null
null
null
cs.DM
null
We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number of vertices in each subgraph is minimized. We prove NP-completeness of the problem, prove lower bounds, and give approximation algorithms for certain graph classes.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 17:06:51 GMT" }, { "version": "v2", "created": "Fri, 7 Apr 2006 07:44:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Thite", "Shripad", "" ] ]