id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0602078 | Robert Burger PhD | John Robert Burger | Associative Memory For Reversible Programming and Charge Recovery | null | null | null | null | cs.AR cs.DC | null | Presented below is an interesting type of associative memory called toggle
memory based on the concept of T flip flops, as opposed to D flip flops. Toggle
memory supports both reversible programming and charge recovery. Circuits
designed using the principles delineated below permit matchlines to charge and
discharge with near zero energy dissipation. The resulting lethargy is
compensated by the massive parallelism of associative memory. Simulation
indicates over 33x reduction in energy dissipation using a sinusoidal power
supply at 2 MHz, assuming realistic 50 nm MOSFET models.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2006 21:58:06 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Feb 2006 23:59:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burger",
"John Robert",
""
]
]
|
cs/0602082 | Richard McClatchey | Zaheer Abbas Khan, Mohammed Odeh, Richard McClatchey | Digital Libraries: From Process Modelling to Grid-based Service Oriented
Architecture | 6 pages, 5 figures, 1 table. The 2nd international conference on
Information and Communication Technologies from Theory to Application
(ICTTA06 | null | null | null | cs.DL cs.SE | null | Graphical Business Process Modelling Languages (BPML) like Role Activity
Diagrams (RAD) provide ease and flexibility for modelling business behaviour.
However, these languages show limited applicability in terms of enactment over
distributed systems paradigms like Service Oriented Architecture (SOA) based
grid computing. This paper investigates RAD modelling of a Scientific
Publishing Process (SPP) for Digital Libraries (DL) and tries to determine the
suitability of Pi-Calculus based formal approaches to enact SOA based grid
computing. In order to achieve this purpose, the Pi-Calculus based formal
transformation from a RAD model of SPP for DL draws attention towards a number
of challenging issues including issues that require particular design
considerations for appropriate enactment in a SOA based grid system.
| [
{
"version": "v1",
"created": "Thu, 23 Feb 2006 23:12:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Khan",
"Zaheer Abbas",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
]
]
|
cs/0602090 | Shanghua Teng | Li-Sha Huang and Shang-Hua Teng | On the Approximation and Smoothed Complexity of Leontief Market
Equilibria | null | null | null | null | cs.GT cs.CC | null | We show that the problem of finding an \epsilon-approximate Nash equilibrium
of an n by n two-person games can be reduced to the computation of an
(\epsilon/n)^2-approximate market equilibrium of a Leontief economy. Together
with a recent result of Chen, Deng and Teng, this polynomial reduction implies
that the Leontief market exchange problem does not have a fully polynomial-time
approximation scheme, that is, there is no algorithm that can compute an
\epsilon-approximate market equilibrium in time polynomial in m, n, and
1/\epsilon, unless PPAD is not in P, We also extend the analysis of our
reduction to show, unless PPAD is not in RP, that the smoothed complexity of
the Scarf's general fixed-point approximation algorithm (when applying to solve
the approximate Leontief market exchange problem) or of any algorithm for
computing an approximate market equilibrium of Leontief economies is not
polynomial in n and 1/\sigma, under Gaussian or uniform perturbations with
magnitude \sigma.
| [
{
"version": "v1",
"created": "Sun, 26 Feb 2006 07:53:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Huang",
"Li-Sha",
""
],
[
"Teng",
"Shang-Hua",
""
]
]
|
cs/0602093 | Francois Denis | Fran\c{c}ois Denis (LIF), Yann Esposito (LIF) | Rational stochastic languages | 35 pages | null | null | null | cs.LG cs.CL | null | The goal of the present paper is to provide a systematic and comprehensive
study of rational stochastic languages over a semiring K \in {Q, Q +, R, R+}. A
rational stochastic language is a probability distribution over a free monoid
\Sigma^* which is rational over K, that is which can be generated by a
multiplicity automata with parameters in K. We study the relations between the
classes of rational stochastic languages S rat K (\Sigma). We define the notion
of residual of a stochastic language and we use it to investigate properties of
several subclasses of rational stochastic languages. Lastly, we study the
representation of rational stochastic languages by means of multiplicity
automata.
| [
{
"version": "v1",
"created": "Mon, 27 Feb 2006 10:08:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Denis",
"François",
"",
"LIF"
],
[
"Esposito",
"Yann",
"",
"LIF"
]
]
|
cs/0602094 | Altyeb Taha mr | Altyeb Altaher | Effect of CSMA/CD on Self-Similarity of Network Traffic | 4 pages, 2 figures | null | null | null | cs.NI | null | It is now well known that Internet traffic exhibits self-similarity, which
cannot be described by traditional Markovian models such as the Poisson
process. The causes of self-similarity of network traffic must be identified
because understanding the nature of network traffic is critical in order to
properly design and implement computer networks and network services like the
World Wide Web. While some researchers have argued self similarity is generated
by the typical applications or caused by Transport layer Protocols, it is also
possible that the CSMA/CD protocol may cause or at least contribute to this
phenomenon. In this paper, we use NS simulator to study the effect of CSMA/CD
Exponential Backoff retransmission algorithm on Traffic Self similarity.
| [
{
"version": "v1",
"created": "Mon, 27 Feb 2006 12:37:34 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Mar 2006 09:06:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Altaher",
"Altyeb",
""
]
]
|
cs/0602095 | Joseph O'Rourke | Mirela Damian, Robin Flatland, Joseph O'Rourke | Epsilon-Unfolding Orthogonal Polyhedra | 23 pages, 20 figures, 7 references. Revised version improves language
and figures, updates references, and sharpens the conclusion | null | null | null | cs.CG | null | An unfolding of a polyhedron is produced by cutting the surface and
flattening to a single, connected, planar piece without overlap (except
possibly at boundary points). It is a long unsolved problem to determine
whether every polyhedron may be unfolded. Here we prove, via an algorithm, that
every orthogonal polyhedron (one whose faces meet at right angles) of genus
zero may be unfolded. Our cuts are not necessarily along edges of the
polyhedron, but they are always parallel to polyhedron edges. For a polyhedron
of n vertices, portions of the unfolding will be rectangular strips which, in
the worst case, may need to be as thin as epsilon = 1/2^{Omega(n)}.
| [
{
"version": "v1",
"created": "Mon, 27 Feb 2006 17:03:19 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Mar 2006 14:11:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"Flatland",
"Robin",
""
],
[
"O'Rourke",
"Joseph",
""
]
]
|
cs/0602096 | Abhilash Ponnath | Abhilash Ponnath | Difficulties in the Implementation of Quantum Computers | 6 pages | null | null | null | cs.AR | null | This paper reviews various engineering hurdles facing the field of quantum
computing. Specifically, problems related to decoherence, state preparation,
error correction, and implementability of gates are considered.
| [
{
"version": "v1",
"created": "Mon, 27 Feb 2006 18:59:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ponnath",
"Abhilash",
""
]
]
|
cs/0602098 | M. H. van Emden | M.H. van Emden | Compositional Semantics for the Procedural Interpretation of Logic | 17 pages; no figures | null | null | DCS-307-IR | cs.PL | null | Semantics of logic programs has been given by proof theory, model theory and
by fixpoint of the immediate-consequence operator. If clausal logic is a
programming language, then it should also have a compositional semantics.
Compositional semantics for programming languages follows the abstract syntax
of programs, composing the meaning of a unit by a mathematical operation on the
meanings of its constituent units. The procedural interpretation of logic has
only yielded an incomplete abstract syntax for logic programs. We complete it
and use the result as basis of a compositional semantics. We present for
comparison Tarski's algebraization of first-order predicate logic, which is in
substance the compositional semantics for his choice of syntax. We characterize
our semantics by equivalence with the immediate-consequence operator.
| [
{
"version": "v1",
"created": "Tue, 28 Feb 2006 19:28:31 GMT"
},
{
"version": "v2",
"created": "Sun, 7 May 2006 17:41:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
]
]
|
cs/0602099 | M. H. van Emden | H. Ibrahim and M.H. van Emden | Towards Applicative Relational Programming | 10 pages; no figures | null | null | null | cs.PL | null | Functional programming comes in two flavours: one where ``functions are
first-class citizens'' (we call this applicative) and one which is based on
equations (we call this declarative). In relational programming clauses play
the role of equations. Hence Prolog is declarative. The purpose of this paper
is to provide in relational programming a mathematical basis for the relational
analog of applicative functional programming. We use the cylindric semantics of
first-order logic due to Tarski and provide a new notation for the required
cylinders that we call tables. We define the Table/Relation Algebra with
operators sufficient to translate Horn clauses into algebraic form. We
establish basic mathematical properties of these operators. We show how
relations can be first-class citizens, and devise mechanisms for modularity,
for local scoping of predicates, and for exporting/importing relations between
programs.
| [
{
"version": "v1",
"created": "Tue, 28 Feb 2006 19:53:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ibrahim",
"H.",
""
],
[
"van Emden",
"M. H.",
""
]
]
|
cs/0603001 | Alois Schl\"ogl | Alois Schl\"ogl | BioSig - An application of Octave | 6 pages, submission for the Octave 2006 meeting | null | null | Octave2006/16 | cs.MS | null | BioSig is an open source software library for biomedical signal processing.
Most users in the field are using Matlab; however, significant effort was
undertaken to provide compatibility to Octave, too. This effort has been widely
successful, only some non-critical components relying on a graphical user
interface are missing. Now, installing BioSig on Octave is as easy as on
Matlab. Moreover, a benchmark test based on BioSig has been developed and the
benchmark results of several platforms are presented.
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2006 15:45:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schlögl",
"Alois",
""
]
]
|
cs/0603002 | Cheng Qi | Qi Cheng | On comparing sums of square roots of small integers | null | null | null | null | cs.CG | null | Let $k$ and $n$ be positive integers, $n>k$. Define $r(n,k)$ to be the
minimum positive value of $$ |\sqrt{a_1} + ... + \sqrt{a_k} - \sqrt{b_1} - >...
-\sqrt{b_k} | $$ where $ a_1, a_2, ..., a_k, b_1, b_2, ..., b_k $ are positive
integers no larger than $n$. It is an important problem in computational
geometry to determine a good upper bound of $-\log r(n,k)$. In this paper we
prove an upper bound of $ 2^{O(n/\log n)} \log n$, which is better than the
best known result $O(2^{2k} \log n)$ whenever $ n \leq ck\log k$ for some
constant $c$. In particular, our result implies a {\em subexponential}
algorithm to compare two sums of square roots of integers of size $o(k\log k)$.
| [
{
"version": "v1",
"created": "Tue, 28 Feb 2006 22:35:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cheng",
"Qi",
""
]
]
|
cs/0603003 | Michel Fliess | Michel Fliess (LIX, INRIA Futurs) | Analyse non standard du bruit | null | null | null | null | cs.CE math.LO math.OC math.PR quant-ph | null | Thanks to the nonstandard formalization of fast oscillating functions, due to
P. Cartier and Y. Perrin, an appropriate mathematical framework is derived for
new non-asymptotic estimation techniques, which do not necessitate any
statistical analysis of the noises corrupting any sensor. Various applications
are deduced for multiplicative noises, for the length of the parametric
estimation windows, and for burst errors.
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2006 11:26:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fliess",
"Michel",
"",
"LIX, INRIA Futurs"
]
]
|
cs/0603004 | Juan J. Merelo Pr. | P.A. Castillo, M.G. Arenas, J.G. Castellano, J.J. Merelo, A. Prieto,
V. Rivas and G. Romero | Lamarckian Evolution and the Baldwin Effect in Evolutionary Neural
Networks | Presented in a Spanish conference, MAEB | null | null | null | cs.NE | null | Hybrid neuro-evolutionary algorithms may be inspired on Darwinian or
Lamarckian evolu- tion. In the case of Darwinian evolution, the Baldwin effect,
that is, the progressive incorporation of learned characteristics to the
genotypes, can be observed and leveraged to improve the search. The purpose of
this paper is to carry out an exper- imental study into how learning can
improve G-Prop genetic search. Two ways of combining learning and genetic
search are explored: one exploits the Baldwin effect, while the other uses a
Lamarckian strategy. Our experiments show that using a Lamarckian op- erator
makes the algorithm find networks with a low error rate, and the smallest size,
while using the Bald- win effect obtains MLPs with the smallest error rate, and
a larger size, taking longer to reach a solution. Both approaches obtain a
lower average error than other BP-based algorithms like RPROP, other evolu-
tionary methods and fuzzy logic based methods
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2006 12:26:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Castillo",
"P. A.",
""
],
[
"Arenas",
"M. G.",
""
],
[
"Castellano",
"J. G.",
""
],
[
"Merelo",
"J. J.",
""
],
[
"Prieto",
"A.",
""
],
[
"Rivas",
"V.",
""
],
[
"Romero",
"G.",
""
]
]
|
cs/0603006 | Jonathan Ben-Naim | Jonathan Ben-Naim (LIF) | Pivotal and Pivotal-discriminative Consequence Relations | null | Journal of Logic and Computation Volume 15, number 5 (2005)
679-700 | 10.1093/logcom/exi030 | null | cs.LO | null | In the present paper, we investigate consequence relations that are both
paraconsistent and plausible (but still monotonic). More precisely, we put the
focus on pivotal consequence relations, i.e. those relations that can be
defined by a pivot (in the style of e.g. D. Makinson). A pivot is a fixed
subset of valuations which are considered to be the important ones in the
absolute sense. We worked with a general notion of valuation that covers e.g.
the classical valuations as well as certain kinds of many-valued valuations. In
the many-valued cases, pivotal consequence relations are paraconsistant (in
addition to be plausible), i.e. they are capable of drawing reasonable
conclusions which contain contradictions. We will provide in our general
framework syntactic characterizations of several families of pivotal relations.
In addition, we will provide, again in our general framework, characterizations
of several families of pivotal discriminative consequence relations. The latter
are defined exactly as the plain version, but contradictory conclusions are
rejected. We will also answer negatively a representation problem that was left
open by Makinson. Finally, we will put in evidence a connexion with X-logics
from Forget, Risch, and Siegel. The motivations and the framework of the
present paper are very close to those of a previous paper of the author which
is about preferential consequence relations.
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2006 15:15:46 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Jun 2006 08:16:43 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Apr 2007 14:53:14 GMT"
},
{
"version": "v4",
"created": "Sun, 8 Apr 2007 15:04:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ben-Naim",
"Jonathan",
"",
"LIF"
]
]
|
cs/0603010 | Ketan Savla | Ketan Savla, Emilio Frazzoli and Francesco Bullo | Asymptotic constant-factor approximation algorithm for the Traveling
Salesperson Problem for Dubins' vehicle | null | null | null | null | cs.RO | null | This article proposes the first known algorithm that achieves a
constant-factor approximation of the minimum length tour for a Dubins' vehicle
through $n$ points on the plane. By Dubins' vehicle, we mean a vehicle
constrained to move at constant speed along paths with bounded curvature
without reversing direction. For this version of the classic Traveling
Salesperson Problem, our algorithm closes the gap between previously
established lower and upper bounds; the achievable performance is of order
$n^{2/3}$.
| [
{
"version": "v1",
"created": "Thu, 2 Mar 2006 07:07:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Savla",
"Ketan",
""
],
[
"Frazzoli",
"Emilio",
""
],
[
"Bullo",
"Francesco",
""
]
]
|
cs/0603012 | Nils Hebbinghaus | Benjamin Doerr, Nils Hebbinghaus, S\"oren Werth | Improved Bounds and Schemes for the Declustering Problem | 19 pages, 1 figure | null | null | null | cs.DM cs.DS | null | The declustering problem is to allocate given data on parallel working
storage devices in such a manner that typical requests find their data evenly
distributed on the devices. Using deep results from discrepancy theory, we
improve previous work of several authors concerning range queries to
higher-dimensional data. We give a declustering scheme with an additive error
of $O_d(\log^{d-1} M)$ independent of the data size, where $d$ is the
dimension, $M$ the number of storage devices and $d-1$ does not exceed the
smallest prime power in the canonical decomposition of $M$ into prime powers.
In particular, our schemes work for arbitrary $M$ in dimensions two and three.
For general $d$, they work for all $M\geq d-1$ that are powers of two.
Concerning lower bounds, we show that a recent proof of a
$\Omega_d(\log^{\frac{d-1}{2}} M)$ bound contains an error. We close the gap in
the proof and thus establish the bound.
| [
{
"version": "v1",
"created": "Thu, 2 Mar 2006 15:51:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Doerr",
"Benjamin",
""
],
[
"Hebbinghaus",
"Nils",
""
],
[
"Werth",
"Sören",
""
]
]
|
cs/0603015 | Pritam Rajagopal | Pritam Rajagopal | The Basic Kak Neural Network with Complex Inputs | 17 pages, 9 figures, 7 tables | null | null | null | cs.NE | null | The Kak family of neural networks is able to learn patterns quickly, and this
speed of learning can be a decisive advantage over other competing models in
many applications. Amongst the implementations of these networks are those
using reconfigurable networks, FPGAs and optical networks. In some
applications, it is useful to use complex data, and it is with that in mind
that this introduction to the basic Kak network with complex inputs is being
presented. The training algorithm is prescriptive and the network weights are
assigned simply upon examining the inputs. The input is mapped using quaternary
encoding for purpose of efficienty. This network family is part of a larger
hierarchy of learning schemes that include quantum models.
| [
{
"version": "v1",
"created": "Thu, 2 Mar 2006 23:59:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rajagopal",
"Pritam",
""
]
]
|
cs/0603016 | M. H. van Emden | M.H. van Emden and S.C. Somosan | Object-Oriented Modeling of Programming Paradigms | Re-written introduction and abstract, new title, some references
deleted; 10 pages; 4 figures | null | null | DCS-310-IR | cs.SE cs.PL | null | For the right application, the use of programming paradigms such as
functional or logic programming can enormously increase productivity in
software development. But these powerful paradigms are tied to exotic
programming languages, while the management of software development dictates
standardization on a single language.
This dilemma can be resolved by using object-oriented programming in a new
way. It is conventional to analyze an application by object-oriented modeling.
In the new approach, the analysis identifies the paradigm that is ideal for the
application; development starts with object-oriented modeling of the paradigm.
In this paper we illustrate the new approach by giving examples of
object-oriented modeling of dataflow and constraint programming. These examples
suggest that it is no longer necessary to embody a programming paradigm in a
language dedicated to it.
| [
{
"version": "v1",
"created": "Fri, 3 Mar 2006 05:19:42 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Nov 2006 18:46:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
],
[
"Somosan",
"S. C.",
""
]
]
|
cs/0603019 | Leandro R\^ego | Joseph Y. Halpern and Leandro Chaves Rego | Characterizing the NP-PSPACE Gap in the Satisfiability Problem for Modal
Logic | 6 pages | null | null | null | cs.LO cs.CC | null | There has been a great of work on characterizing the complexity of the
satisfiability and validity problem for modal logics. In particular, Ladner
showed that the validity problem for all logics between K, T, and S4 is {\sl
PSPACE}-complete, while for S5 it is {\sl NP}-complete. We show that, in a
precise sense, it is \emph{negative introspection}, the axiom $\neg K p \rimp K
\neg K p$, that causes the gap. In a precise sense, if we require this axiom,
then the satisfiability problem is {\sl NP}-complete; without it, it is {\sl
PSPACE}-complete.
| [
{
"version": "v1",
"created": "Sun, 5 Mar 2006 23:11:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Rego",
"Leandro Chaves",
""
]
]
|
cs/0603020 | Leandro R\^ego | Joseph Y. halpern and Leandro Chaves Rego | Reasoning About Knowledge of Unawareness | 32 pages | null | null | null | cs.LO cs.MA | null | Awareness has been shown to be a useful addition to standard epistemic logic
for many applications. However, standard propositional logics for knowledge and
awareness cannot express the fact that an agent knows that there are facts of
which he is unaware without there being an explicit fact that the agent knows
he is unaware of. We propose a logic for reasoning about knowledge of
unawareness, by extending Fagin and Halpern's \emph{Logic of General
Awareness}. The logic allows quantification over variables, so that there is a
formula in the language that can express the fact that ``an agent explicitly
knows that there exists a fact of which he is unaware''. Moreover, that formula
can be true without the agent explicitly knowing that he is unaware of any
particular formula. We provide a sound and complete axiomatization of the
logic, using standard axioms from the literature to capture the quantification
operator. Finally, we show that the validity problem for the logic is
recursively enumerable, but not decidable.
| [
{
"version": "v1",
"created": "Sun, 5 Mar 2006 21:14:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"halpern",
"Joseph Y.",
""
],
[
"Rego",
"Leandro Chaves",
""
]
]
|
cs/0603021 | Joy Mukherjee | Joy Mukherjee, Srinidhi Varadarajan | Language Support for Optional Functionality | 6 pages, 8 figures | null | null | null | cs.PL cs.OS cs.SE | null | We recommend a programming construct - availability check - for programs that
need to automatically adjust to presence or absence of segments of code. The
idea is to check the existence of a valid definition before a function call is
invoked. The syntax is that of a simple 'if' statement. The vision is to enable
customization of application functionality through addition or removal of
optional components, but without requiring complete re-building. Focus is on
C-like compiled procedural languages and UNIX-based systems. Essentially, our
approach attempts to combine the flexibility of dynamic libraries with the
usability of utility (dependency) libraries. We outline the benefits over
prevalent strategies mainly in terms of development complexity, crudely
measured as lesser lines of code. We also allude to performance and flexibility
facets. A Preliminary implementation and figures from early experimental
evaluation are presented.
| [
{
"version": "v1",
"created": "Mon, 6 Mar 2006 00:46:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mukherjee",
"Joy",
""
],
[
"Varadarajan",
"Srinidhi",
""
]
]
|
cs/0603023 | Marcus Hutter | Viktor Zhumatiy and Faustino Gomez and Marcus Hutter and Juergen
Schmidhuber | Metric State Space Reinforcement Learning for a Vision-Capable Mobile
Robot | 14 pages, 8 figures | Proc. 9th International Conf. on Intelligent Autonomous Systems
(IAS 2006) pages 272-281 | null | IDSIA-05-06 | cs.RO cs.LG | null | We address the problem of autonomously learning controllers for
vision-capable mobile robots. We extend McCallum's (1995) Nearest-Sequence
Memory algorithm to allow for general metrics over state-action trajectories.
We demonstrate the feasibility of our approach by successfully running our
algorithm on a real mobile robot. The algorithm is novel and unique in that it
(a) explores the environment and learns directly on a mobile robot without
using a hand-made computer model as an intermediate step, (b) does not require
manual discretization of the sensor input space, (c) works in piecewise
continuous perceptual spaces, and (d) copes with partial observability.
Together this allows learning from much less experience compared to previous
methods.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2006 08:44:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhumatiy",
"Viktor",
""
],
[
"Gomez",
"Faustino",
""
],
[
"Hutter",
"Marcus",
""
],
[
"Schmidhuber",
"Juergen",
""
]
]
|
cs/0603024 | Carl Lagoze | Carl Lagoze, Dean Krafft, Tim Cornwell, Dean Eckstrom, Susan Jesuroga,
Chris Wilper | Representing Contextualized Information in the NSDL | null | null | null | null | cs.DL | null | The NSDL (National Science Digital Library) is funded by the National Science
Foundation to advance science and match education. The inital product was a
metadata-based digital library providing search and access to distributed
resources. Our recent work recognizes the importance of context - relations,
metadata, annotations - for the pedagogical value of a digital library. This
new architecture uses Fedora, a tool for representing complex content, data,
metadata, web-based services, and semantic relationships, as the basis of an
information network overlay (INO). The INO provides an extensible knowl-edge
base for an expanding suite of digital library services.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2006 15:50:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Krafft",
"Dean",
""
],
[
"Cornwell",
"Tim",
""
],
[
"Eckstrom",
"Dean",
""
],
[
"Jesuroga",
"Susan",
""
],
[
"Wilper",
"Chris",
""
]
]
|
cs/0603025 | Stijn Heymans | Stijn Heymans, Davy Van Nieuwenborgh and Dirk Vermeir | Open Answer Set Programming with Guarded Programs | 51 pages, 1 figure, accepted for publication in ACM's TOCL | null | null | null | cs.AI | null | Open answer set programming (OASP) is an extension of answer set programming
where one may ground a program with an arbitrary superset of the program's
constants. We define a fixed point logic (FPL) extension of Clark's completion
such that open answer sets correspond to models of FPL formulas and identify a
syntactic subclass of programs, called (loosely) guarded programs. Whereas
reasoning with general programs in OASP is undecidable, the FPL translation of
(loosely) guarded programs falls in the decidable (loosely) guarded fixed point
logic (mu(L)GF). Moreover, we reduce normal closed ASP to loosely guarded OASP,
enabling for the first time, a characterization of an answer set semantics by
muLGF formulas. We further extend the open answer set semantics for programs
with generalized literals. Such generalized programs (gPs) have interesting
properties, e.g., the ability to express infinity axioms. We restrict the
syntax of gPs such that both rules and generalized literals are guarded. Via a
translation to guarded fixed point logic, we deduce 2-exptime-completeness of
satisfiability checking in such guarded gPs (GgPs). Bound GgPs are restricted
GgPs with exptime-complete satisfiability checking, but still sufficiently
expressive to optimally simulate computation tree logic (CTL). We translate
Datalog lite programs to GgPs, establishing equivalence of GgPs under an open
answer set semantics, alternation-free muGF, and Datalog lite.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2006 17:54:59 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Feb 2007 12:32:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Heymans",
"Stijn",
""
],
[
"Van Nieuwenborgh",
"Davy",
""
],
[
"Vermeir",
"Dirk",
""
]
]
|
cs/0603026 | Valentin Polishchuk | Esther M. Arkin (1), Michael A. Bender (2), Joseph S. B. Mitchell (1),
Valentin Polishchuk (1) ((1) Department of Applied Mathematics and
Statistics, Stony Brook University, (2) Department of Computer Science, Stony
Brook University) | The Snowblower Problem | 19 pages, 10 figures, 1 table. Submitted to WAFR 2006 | null | null | null | cs.DS cs.CC cs.RO | null | We introduce the snowblower problem (SBP), a new optimization problem that is
closely related to milling problems and to some material-handling problems. The
objective in the SBP is to compute a short tour for the snowblower to follow to
remove all the snow from a domain (driveway, sidewalk, etc.). When a snowblower
passes over each region along the tour, it displaces snow into a nearby region.
The constraint is that if the snow is piled too high, then the snowblower
cannot clear the pile.
We give an algorithmic study of the SBP. We show that in general, the problem
is NP-complete, and we present polynomial-time approximation algorithms for
removing snow under various assumptions about the operation of the snowblower.
Most commercially-available snowblowers allow the user to control the direction
in which the snow is thrown. We differentiate between the cases in which the
snow can be thrown in any direction, in any direction except backwards, and
only to the right. For all cases, we give constant-factor approximation
algorithms; the constants increase as the throw direction becomes more
restricted.
Our results are also applicable to robotic vacuuming (or lawnmowing) with
bounded capacity dust bin and to some versions of material-handling problems,
in which the goal is to rearrange cartons on the floor of a warehouse.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2006 20:35:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Arkin",
"Esther M.",
""
],
[
"Bender",
"Michael A.",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Polishchuk",
"Valentin",
""
]
]
|
cs/0603028 | Jan Van den Bussche | Wim Janssen, Alexandr Korlyukov, Jan Van den Bussche | On the tree-transformation power of XSLT | null | Acta Informatica, Volume 43, Number 6 / January, 2007 | 10.1007/s00236-006-0026-8 | null | cs.PL cs.DB | null | XSLT is a standard rule-based programming language for expressing
transformations of XML data. The language is currently in transition from
version 1.0 to 2.0. In order to understand the computational consequences of
this transition, we restrict XSLT to its pure tree-transformation capabilities.
Under this focus, we observe that XSLT~1.0 was not yet a computationally
complete tree-transformation language: every 1.0 program can be implemented in
exponential time. A crucial new feature of version~2.0, however, which allows
nodesets over temporary trees, yields completeness. We provide a formal
operational semantics for XSLT programs, and establish confluence for this
semantics.
| [
{
"version": "v1",
"created": "Wed, 8 Mar 2006 13:48:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Janssen",
"Wim",
""
],
[
"Korlyukov",
"Alexandr",
""
],
[
"Bussche",
"Jan Van den",
""
]
]
|
cs/0603032 | Somdeb Lahiri | Somdeb Lahiri | Market Equilibrium for Bundle Auctions and the Matching Core of
Nonnegative TU Games | 17 pages | null | null | null | cs.GT | null | We discuss bundle auctions within the framework of an integer allocation
problem. We show that for multi-unit auctions, of which bundle auctions are a
special case, market equilibrium and constrained market equilibrium are
equivalent concepts. This equivalence, allows us to obtain a computable
necessary and sufficient condition for the existence of constrained market
equilibrium for bundle auctions. We use this result to obtain a necessary and
sufficient condition for the existence of market equilibrium for multi-unit
auctions. After obtaining the induced bundle auction of a nonnegative TU game,
we show that the existence of market equilibrium implies the existence of a
possibly different market equilibrium as well, which corresponds very naturally
to an outcome in the matching core of the TU game. Consequently we show that
the matching core of the nonnegative TU game is non-empty if and only if the
induced market game has a market equilibrium.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 12:45:19 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Mar 2006 05:29:06 GMT"
},
{
"version": "v3",
"created": "Sat, 8 Apr 2006 10:08:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lahiri",
"Somdeb",
""
]
]
|
cs/0603033 | Vaghinak Petrosyan | Vaghinak Petrosyan | Inter-component communication methods in object-oriented frameworks | null | null | null | null | cs.SE | null | Modern frameworks for development of graphical interfaces are using the
native controls of the operating system. Because of that they are using
operating system events model for inter-component communication. We consider a
method to increase inter-component communication speed by sending messages from
one component to the other passing over the operating system. Besides the
messages subscription helps to avoid receiving of unnecessary messages.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 08:44:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Petrosyan",
"Vaghinak",
""
]
]
|
cs/0603035 | Richard McClatchey | Chiara Del Frate, Jose Galvez, Tamas Hauer, David Manset, Richard
McClatchey, Mohammed Odeh, Dmitry Rogulin, Tony Solomonides, Ruth Warren | Final Results from and Exploitation Plans for MammoGrid | 11 pages, 3 figures, 2 tables. Accepted at the 4th International
HealthGrid conference, Valencia Spain June 2006 | null | null | null | cs.DC | null | The MammoGrid project has delivered the first deployed instance of a
healthgrid for clinical mammography that spans national boundaries. During the
last year, the final MammoGrid prototype has undergone a series of rigorous
tests undertaken by radiologists in the UK and Italy and this paper draws
conclusions from those tests for the benefit of the Healthgrid community. In
addition, lessons learned during the lifetime of the project are detailed and
recommendations drawn for future health applications using grids. Following the
completion of the project, plans have been put in place for the
commercialisation of the MammoGrid system and this is also reported in this
article. Particular emphasis is placed on the issues surrounding the transition
from collaborative research project to a marketable product. This paper
concludes by highlighting some of the potential areas of future development and
research.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 13:49:14 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Mar 2006 19:17:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Del Frate",
"Chiara",
""
],
[
"Galvez",
"Jose",
""
],
[
"Hauer",
"Tamas",
""
],
[
"Manset",
"David",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"Rogulin",
"Dmitry",
""
],
[
"Solomonides",
"Tony",
""
],
[
"Warren",
"Ruth",
""
]
]
|
cs/0603036 | Richard McClatchey | Joerg Freund, Dorin Comaniciu, Yannis Ioannis, Peiya Liu, Richard
McClatchey, Edwin Morley-Fletcher, Xavier Pennec, Giacomo Pongiglione, Xiang
(Sean)ZHOU | Health-e-Child : An Integrated Biomedical Platform for Grid-Based
Paediatric Applications | 12 pages, 2 figures. Accepted at the 4th International HealthGrid
conference, Valencia, Spain June 2006 | null | null | null | cs.DC | null | There is a compelling demand for the integration and exploitation of
heterogeneous biomedical information for improved clinical practice, medical
research, and personalised healthcare across the EU. The Health-e-Child project
aims at developing an integrated healthcare platform for European Paediatrics,
providing seamless integration of traditional and emerging sources of
biomedical information. The long-term goal of the project is to provide
uninhibited access to universal biomedical knowledge repositories for
personalised and preventive healthcare, large-scale information-based
biomedical research and training, and informed policy making. The project focus
will be on individualised disease prevention, screening, early diagnosis,
therapy and follow-up of paediatric heart diseases, inflammatory diseases, and
brain tumours. The project will build a Grid-enabled European network of
leading clinical centres that will share and annotate biomedical data, validate
systems clinically, and diffuse clinical excellence across Europe by setting up
new technologies, clinical workflows, and standards. This paper outlines the
design approach being adopted in Health-e-Child to enable the delivery of an
integrated biomedical information platform.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 13:54:15 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Mar 2006 19:18:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Freund",
"Joerg",
"",
"Sean"
],
[
"Comaniciu",
"Dorin",
"",
"Sean"
],
[
"Ioannis",
"Yannis",
"",
"Sean"
],
[
"Liu",
"Peiya",
"",
"Sean"
],
[
"McClatchey",
"Richard",
"",
"Sean"
],
[
"Morley-Fletcher",
"Edwin",
"",
"Sean"
],
[
"Pennec",
"Xavier",
"",
"Sean"
],
[
"Pongiglione",
"Giacomo",
"",
"Sean"
],
[
"Xiang",
"",
"",
"Sean"
],
[
"ZHOU",
"",
""
]
]
|
cs/0603037 | Richard McClatchey | Haya El-Ghalayini, Mohammed Odeh, Richard McClatchey | Deriving Conceptual Data Models from Domain Ontologies for
Bioinformatics | 6 pages, 1 figure. The 2nd international conference on Information
and Communication Technologies from Theory to Application (ICTTA06) | null | null | null | cs.SE | null | This paper studies the role that ontologies can play in establishing
conceptual data models during the process of information systems development. A
mapping algorithm has been proposed and embedded in a special purpose
Transformation-Engine to generate a conceptual data model from a given domain
ontology. In addition, this paper focuses on applying the proposed approach to
a bioinformatics context as the nature of biological data is considered a
barrier in representing biological conceptual data models. Both quantitative
and qualitative methods have been adopted to critically evaluate this new
approach. The results of this evaluation indicate that the quality of the
generated conceptual data models can reflect the problem domain entities and
the associations between them. The results are encouraging and support the
potential role that this approach can play in providing a suitable starting
point for conceptual data model development.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 13:59:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"El-Ghalayini",
"Haya",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
]
]
|
cs/0603038 | Patrik O. Hoyer | Patrik O. Hoyer, Shohei Shimizu, Antti J. Kerminen | Estimation of linear, non-gaussian causal models in the presence of
confounding latent variables | 8 pages, 4 figures, pdflatex | null | null | null | cs.AI | null | The estimation of linear causal models (also known as structural equation
models) from data is a well-known problem which has received much attention in
the past. Most previous work has, however, made an explicit or implicit
assumption of gaussianity, limiting the identifiability of the models. We have
recently shown (Shimizu et al, 2005; Hoyer et al, 2006) that for non-gaussian
distributions the full causal model can be estimated in the no hidden variables
case. In this contribution, we discuss the estimation of the model when
confounding latent variables are present. Although in this case uniqueness is
no longer guaranteed, there is at most a finite set of models which can fit the
data. We develop an algorithm for estimating this set, and describe numerical
simulations which confirm the theoretical arguments and demonstrate the
practical viability of the approach. Full Matlab code is provided for all
simulations.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 14:46:18 GMT"
},
{
"version": "v2",
"created": "Mon, 22 May 2006 17:02:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hoyer",
"Patrik O.",
""
],
[
"Shimizu",
"Shohei",
""
],
[
"Kerminen",
"Antti J.",
""
]
]
|
cs/0603041 | Prasanta K. Panigrahi | S. Hemachander, Amit Verma, Siddharth Arora, Prasanta K. Panigrahi | Locally Adaptive Block Thresholding Method with Continuity Constraint | 12 Pages, 4 figures, 1 Table | null | null | null | cs.CV | null | We present an algorithm that enables one to perform locally adaptive block
thresholding, while maintaining image continuity. Images are divided into
sub-images based some standard image attributes and thresholding technique is
employed over the sub-images. The present algorithm makes use of the thresholds
of neighboring sub-images to calculate a range of values. The image continuity
is taken care by choosing the threshold of the sub-image under consideration to
lie within the above range. After examining the average range values for
various sub-image sizes of a variety of images, it was found that the range of
acceptable threshold values is substantially high, justifying our assumption of
exploiting the freedom of range for bringing out local details.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 17:14:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemachander",
"S.",
""
],
[
"Verma",
"Amit",
""
],
[
"Arora",
"Siddharth",
""
],
[
"Panigrahi",
"Prasanta K.",
""
]
]
|
cs/0603042 | Will Scott II | Willie L. Scott II | The NoN Approach to Autonomic Face Recognition | 15 pages, 6 figures, 6 tables | null | null | null | cs.NE | null | A method of autonomic face recognition based on the biologically plausible
network of networks (NoN) model of information processing is presented. The NoN
model is based on locally parallel and globally coordinated transformations in
which the neurons or computational units form distributed networks, which
themselves link to form larger networks. This models the structures in the
cerebral cortex described by Mountcastle and the architecture based on that
proposed for information processing by Sutton. In the proposed implementation,
face images are processed by a nested family of locally operating networks
along with a hierarchically superior network that classifies the information
from each of the local networks. The results of the experiments yielded a
maximum of 98.5% recognition accuracy and an average of 97.4% recognition
accuracy on a benchmark database.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 17:35:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Scott",
"Willie L.",
"II"
]
]
|
cs/0603043 | Mihai Patrascu | Mihai Patrascu and Mikkel Thorup | Time-Space Trade-Offs for Predecessor Search | 29 pages. Full version (preliminary) of a paper appearing in STOC'06 | null | null | null | cs.CC cs.DS | null | We develop a new technique for proving cell-probe lower bounds for static
data structures. Previous lower bounds used a reduction to communication games,
which was known not to be tight by counting arguments. We give the first lower
bound for an explicit problem which breaks this communication complexity
barrier. In addition, our bounds give the first separation between polynomial
and near linear space. Such a separation is inherently impossible by
communication complexity.
Using our lower bound technique and new upper bound constructions, we obtain
tight bounds for searching predecessors among a static set of integers. Given a
set Y of n integers of l bits each, the goal is to efficiently find
predecessor(x) = max{y in Y | y <= x}, by representing Y on a RAM using space
S.
In external memory, it follows that the optimal strategy is to use either
standard B-trees, or a RAM algorithm ignoring the larger block size. In the
important case of l = c*lg n, for c>1 (i.e. polynomial universes), and near
linear space (such as S = n*poly(lg n)), the optimal search time is Theta(lg
l). Thus, our lower bound implies the surprising conclusion that van Emde Boas'
classic data structure from [FOCS'75] is optimal in this case. Note that for
space n^{1+eps}, a running time of O(lg l / lglg l) was given by Beame and Fich
[STOC'99].
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2006 14:50:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Patrascu",
"Mihai",
""
],
[
"Thorup",
"Mikkel",
""
]
]
|
cs/0603044 | Vadim Tropashko | Marshall Spight, Vadim Tropashko | First Steps in Relational Lattice | 11 pages, 3 figures | null | null | null | cs.DB | null | Relational lattice reduces the set of six classic relational algebra
operators to two binary lattice operations: natural join and inner union. We
give an introduction to this theory with emphasis on formal algebraic laws. New
results include Spight distributivity criteria and its applications to query
transformations.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2006 18:11:49 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Mar 2006 04:54:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Spight",
"Marshall",
""
],
[
"Tropashko",
"Vadim",
""
]
]
|
cs/0603046 | William Perkins | William Perkins | Trusted Certificates in Quantum Cryptography | 4 pages, 2 figures | null | null | null | cs.CR | null | This paper analyzes the performance of Kak's three stage quantum
cryptographic protocol based on public key cryptography against a
man-in-the-middle attack. A method for protecting against such an attack is
presented using certificates distributed by a trusted third party.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2006 23:05:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Perkins",
"William",
""
]
]
|
cs/0603047 | Simone Severini | Stefano Mancini and Simone Severini | The Quantum Separability Problem for Gaussian States | 8 pages | Electronic Notes in Theoretical Computer Science, Volume 169 ,
March 2007, pp. 121-131 | 10.1016/j.entcs.2006.07.034 | null | cs.CC quant-ph | null | Determining whether a quantum state is separable or entangled is a problem of
fundamental importance in quantum information science. This is a brief review
in which we consider the problem for states in infinite dimensional Hilbert
spaces. We show how the problem becomes tractable for a class of Gaussian
states.
| [
{
"version": "v1",
"created": "Sun, 12 Mar 2006 14:33:41 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Mar 2006 12:38:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mancini",
"Stefano",
""
],
[
"Severini",
"Simone",
""
]
]
|
cs/0603048 | Vincent Limouzy | Binh Minh Bui Xuan (LIRMM), Michel Habib (LIAFA), Vincent Limouzy
(LIAFA), Fabien De Montgolfier (LIAFA) | Homogeneity vs. Adjacency: generalising some graph decomposition
algorithms | soumis \`{a} WG 2006 | Graph-Theoretic Concepts in Computer Science Springer (Ed.)
(22/06/2006) 278-288 | 10.1007/11917496\_25 | null | cs.DS | null | In this paper, a new general decomposition theory inspired from modular graph
decomposition is presented. Our main result shows that, within this general
theory, most of the nice algorithmic tools developed for modular decomposition
are still efficient. This theory not only unifies the usual modular
decomposition generalisations such as modular decomposition of directed graphs
or decomposition of 2-structures, but also star cutsets and bimodular
decomposition. Our general framework provides a decomposition algorithm which
improves the best known algorithms for bimodular decomposition.
| [
{
"version": "v1",
"created": "Mon, 13 Mar 2006 09:48:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Xuan",
"Binh Minh Bui",
"",
"LIRMM"
],
[
"Habib",
"Michel",
"",
"LIAFA"
],
[
"Limouzy",
"Vincent",
"",
"LIAFA"
],
[
"De Montgolfier",
"Fabien",
"",
"LIAFA"
]
]
|
cs/0603051 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Transitive trust in mobile scenarios | Pre-refereed version. To appear in Proceedings of the International
Conference on Emerging Trends in Information and Communication Security
(ETRICS 2006), Freiburg im Breisgau, Germany 6th-9th June 2006. Lecture Notes
in Computer Science, Springer-Verlag | null | null | null | cs.CR | null | Horizontal integration of access technologies to networks and services should
be accompanied by some kind of convergence of authentication technologies. The
missing link for the federation of user identities across the technological
boundaries separating authentication methods can be provided by trusted
computing platforms. The concept of establishing transitive trust by trusted
computing enables the desired crossdomain authentication functionality. The
focus of target application scenarios lies in the realm of mobile networks and
devices.
| [
{
"version": "v1",
"created": "Mon, 13 Mar 2006 11:14:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
]
|
cs/0603052 | Evgueni Petrov | Evgueni Petrov | Evaluation of interval extension of the power function by graph
decomposition | submitted to the INTERVAL 2006 workshop to be held in St. Petersburg
June 2006, Russia; extended abstract | null | null | null | cs.MS | null | The subject of our talk is the correct evaluation of interval extension of
the function specified by the expression x^y without any constraints on the
values of x and y. The core of our approach is a decomposition of the graph of
x^y into a small number of parts which can be transformed into subsets of the
graph of x^y for non-negative bases x. Because of this fact, evaluation of
interval extension of x^y, without any constraints on x and y, is not much
harder than evaluation of interval extension of x^y for non-negative bases x.
| [
{
"version": "v1",
"created": "Mon, 13 Mar 2006 12:05:08 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Mar 2006 12:48:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Petrov",
"Evgueni",
""
]
]
|
cs/0603053 | Irene Guessarian | A. Ai T -Bouziad (LIAFA), Irene Guessarian (LIAFA), L. Vieille (NCM) | Automatic generation of simplified weakest preconditions for integrity
constraint verification | null | null | null | null | cs.DS cs.DB | null | Given a constraint $c$ assumed to hold on a database $B$ and an update $u$ to
be performed on $B$, we address the following question: will $c$ still hold
after $u$ is performed? When $B$ is a relational database, we define a
confluent terminating rewriting system which, starting from $c$ and $u$,
automatically derives a simplified weakest precondition $wp(c,u)$ such that,
whenever $B$ satisfies $wp(c,u)$, then the updated database $u(B)$ will satisfy
$c$, and moreover $wp(c,u)$ is simplified in the sense that its computation
depends only upon the instances of $c$ that may be modified by the update. We
then extend the definition of a simplified $wp(c,u)$ to the case of deductive
databases; we prove it using fixpoint induction.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2006 14:30:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"-Bouziad",
"A. Ai T",
"",
"LIAFA"
],
[
"Guessarian",
"Irene",
"",
"LIAFA"
],
[
"Vieille",
"L.",
"",
"NCM"
]
]
|
cs/0603054 | Oleg Verbitsky | Martin Grohe and Oleg Verbitsky | Testing Graph Isomorphism in Parallel by Playing a Game | 21 pages | null | null | null | cs.CC cs.LO | null | Our starting point is the observation that if graphs in a class C have low
descriptive complexity in first order logic, then the isomorphism problem for C
is solvable by a fast parallel algorithm (essentially, by a simple
combinatorial algorithm known as the multidimensional Weisfeiler-Lehman
algorithm). Using this approach, we prove that isomorphism of graphs of bounded
treewidth is testable in TC1, answering an open question posed by
Chandrasekharan. Furthermore, we obtain an AC1 algorithm for testing
isomorphism of rotation systems (combinatorial specifications of graph
embeddings). The AC1 upper bound was known before, but the fact that this bound
can be achieved by the simple Weisfeiler-Lehman algorithm is new. Combined with
other known results, it also yields a new AC1 isomorphism algorithm for planar
graphs.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2006 15:46:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grohe",
"Martin",
""
],
[
"Verbitsky",
"Oleg",
""
]
]
|
cs/0603055 | Ashfaq Shaik | Ashfaq N Shaik | Improved Watermarking Scheme Using Decimal Sequences | 7 pages, 10 figures | null | null | null | cs.CR | null | This paper presents watermarking algorithms using d-sequences so that the
peak signal to noise ratio (PSNR) is maximized and the distortion introduced in
the image due to the embedding is minimized. By exploiting the cross
correlation property of decimal sequences, the concept of embedding more than
one watermark in the same cover image is investigated.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2006 18:55:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shaik",
"Ashfaq N",
""
]
]
|
cs/0603056 | Philip Davis | Philip M. Davis and Michael J. Fromerth | Does the arXiv lead to higher citations and reduced publisher downloads
for mathematics articles? | Last updated May 02, 2006 | Scientometrics Vol. 71, No. 2. (May, 2007) | 10.1007/s11192-007-1661-8 | null | cs.DL cs.IR math.HO | null | An analysis of 2,765 articles published in four math journals from 1997 to
2005 indicate that articles deposited in the arXiv received 35% more citations
on average than non-deposited articles (an advantage of about 1.1 citations per
article), and that this difference was most pronounced for highly-cited
articles. Open Access, Early View, and Quality Differential were examined as
three non-exclusive postulates for explaining the citation advantage. There was
little support for a universal Open Access explanation, and no empirical
support for Early View. There was some inferential support for a Quality
Differential brought about by more highly-citable articles being deposited in
the arXiv. In spite of their citation advantage, arXiv-deposited articles
received 23% fewer downloads from the publisher's website (about 10 fewer
downloads per article) in all but the most recent two years after publication.
The data suggest that arXiv and the publisher's website may be fulfilling
distinct functional needs of the reader.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2006 19:36:24 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Mar 2006 21:08:20 GMT"
},
{
"version": "v3",
"created": "Mon, 20 Mar 2006 17:34:40 GMT"
},
{
"version": "v4",
"created": "Tue, 2 May 2006 19:28:01 GMT"
},
{
"version": "v5",
"created": "Tue, 6 Feb 2007 14:52:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Davis",
"Philip M.",
""
],
[
"Fromerth",
"Michael J.",
""
]
]
|
cs/0603057 | Nodari Sitchinava | David Eppstein, Michael T. Goodrich, Nodari Sitchinava | Guard Placement For Wireless Localization | null | null | null | null | cs.CG | null | Motivated by secure wireless networking, we consider the problem of placing
fixed localizers that enable mobile communication devices to prove they belong
to a secure region that is defined by the interior of a polygon. Each localizer
views an infinite wedge of the plane, and a device can prove membership in the
secure region if it is inside the wedges for a set of localizers whose common
intersection contains no points outside the polygon. This model leads to a
broad class of new art gallery type problems, for which we provide upper and
lower bounds.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2006 20:19:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Sitchinava",
"Nodari",
""
]
]
|
cs/0603060 | Tobias Riege | Tobias Riege, J\"org Rothe, Holger Spakowski and Masaki Yamamoto | An Improved Exact Algorithm for the Domatic Number Problem | 9 pages, a two-page abstract of this paper is to appear in the
Proceedings of the Second IEEE International Conference on Information &
Communication Technologies: From Theory to Applications, April 2006 | null | null | null | cs.CC | null | The 3-domatic number problem asks whether a given graph can be partitioned
intothree dominating sets. We prove that this problem can be solved by a
deterministic algorithm in time 2.695^n (up to polynomial factors). This result
improves the previous bound of 2.8805^n, which is due to Fomin, Grandoni,
Pyatkin, and Stepanov. To prove our result, we combine an algorithm by Fomin et
al. with Yamamoto's algorithm for the satisfiability problem. In addition, we
show that the 3-domatic number problem can be solved for graphs G with bounded
maximum degree Delta(G) by a randomized algorithm, whose running time is better
than the previous bound due to Riege and Rothe whenever Delta(G) >= 5. Our new
randomized algorithm employs Schoening's approach to constraint satisfaction
problems.
| [
{
"version": "v1",
"created": "Thu, 16 Mar 2006 16:05:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Riege",
"Tobias",
""
],
[
"Rothe",
"Jörg",
""
],
[
"Spakowski",
"Holger",
""
],
[
"Yamamoto",
"Masaki",
""
]
]
|
cs/0603062 | Benoit Donnet | Benoit Donnet, Bradley Huffaker, Timur Friedman, kc claffy | Implementation and Deployment of a Distributed Network Topology
Discovery Algorithm | null | null | null | null | cs.NI | null | In the past few years, the network measurement community has been interested
in the problem of internet topology discovery using a large number (hundreds or
thousands) of measurement monitors. The standard way to obtain information
about the internet topology is to use the traceroute tool from a small number
of monitors. Recent papers have made the case that increasing the number of
monitors will give a more accurate view of the topology. However, scaling up
the number of monitors is not a trivial process. Duplication of effort close to
the monitors wastes time by reexploring well-known parts of the network, and
close to destinations might appear to be a distributed denial-of-service (DDoS)
attack as the probes converge from a set of sources towards a given
destination. In prior work, authors of this report proposed Doubletree, an
algorithm for cooperative topology discovery, that reduces the load on the
network, i.e., router IP interfaces and end-hosts, while discovering almost as
many nodes and links as standard approaches based on traceroute. This report
presents our open-source and freely downloadable implementation of Doubletree
in a tool we call traceroute@home. We describe the deployment and validation of
traceroute@home on the PlanetLab testbed and we report on the lessons learned
from this experience. We discuss how traceroute@home can be developed further
and discuss ideas for future improvements.
| [
{
"version": "v1",
"created": "Thu, 16 Mar 2006 16:13:11 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Mar 2006 10:30:41 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Mar 2006 07:39:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Donnet",
"Benoit",
""
],
[
"Huffaker",
"Bradley",
""
],
[
"Friedman",
"Timur",
""
],
[
"claffy",
"kc",
""
]
]
|
cs/0603067 | Priya Sivakumar | Priya Sivakumar | Implementing the Three-Stage Quantum Cryptography Protocol | 4 pages, 1 figure | null | null | null | cs.CR | null | We present simple implementations of Kak's three-stage quantum cryptography
protocol. The case where the transformation is applied to more than one qubit
at the same time is also considered.
| [
{
"version": "v1",
"created": "Thu, 16 Mar 2006 22:20:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sivakumar",
"Priya",
""
]
]
|
cs/0603069 | Xueliang Li | Fengwei Li, Xueliang Li | The neighbor-scattering number can be computed in polynomial time for
interval graphs | 13 pages | null | null | null | cs.DM math.CO | null | Neighbor-scattering number is a useful measure for graph vulnerability. For
some special kinds of graphs, explicit formulas are given for this number.
However, for general graphs it is shown that to compute this number is
NP-complete. In this paper, we prove that for interval graphs this number can
be computed in polynomial time.
| [
{
"version": "v1",
"created": "Fri, 17 Mar 2006 07:00:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Fengwei",
""
],
[
"Li",
"Xueliang",
""
]
]
|
cs/0603070 | Stefan Stefanov Z | S.Z.Stefanov | Predicting the Path of an Open System | 18 pages | null | null | null | cs.RO | null | The expected path of an open system,which is a big Poincare system,has been
found in this paper.This path has been obtained from the actual and from the
expected droop of the open system.The actual droop has been reconstructed from
the variations in the power and in the frequency of the open system.The
expected droop has been found as a function of rotation from the expected
potential energy of the open system under synchronization of that system.
| [
{
"version": "v1",
"created": "Fri, 17 Mar 2006 09:27:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Stefanov",
"S. Z.",
""
]
]
|
cs/0603071 | Martin Ziegler | Klaus Meer, Martin Ziegler | An Explicit Solution to Post's Problem over the Reals | submitted to Journal of Complexity | null | null | null | cs.LO cs.SC | null | In the BCSS model of real number computations we prove a concrete and
explicit semi-decidable language to be undecidable yet not reducible from (and
thus strictly easier than) the real Halting Language. This solution to Post's
Problem over the reals significantly differs from its classical, discrete
variant where advanced diagonalization techniques are only known to yield the
existence of such intermediate Turing degrees. Strengthening the above result,
we construct (that is, obtain again explicitly) as well an uncountable number
of incomparable semi-decidable Turing degrees below the real Halting problem in
the BCSS model. Finally we show the same to hold for the linear BCSS model,
that is over (R,+,-,<) rather than (R,+,-,*,/,<).
| [
{
"version": "v1",
"created": "Fri, 17 Mar 2006 16:12:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Meer",
"Klaus",
""
],
[
"Ziegler",
"Martin",
""
]
]
|
cs/0603073 | Bryan Ford | Bryan Ford | VXA: A Virtual Architecture for Durable Compressed Archives | 14 pages, 7 figures, 2 tables | 4th USENIX Conference on File and Storage Technologies, December
2005 (FAST '05), San Francisco, CA | null | null | cs.DL cs.IR | null | Data compression algorithms change frequently, and obsolete decoders do not
always run on new hardware and operating systems, threatening the long-term
usability of content archived using those algorithms. Re-encoding content into
new formats is cumbersome, and highly undesirable when lossy compression is
involved. Processor architectures, in contrast, have remained comparatively
stable over recent decades. VXA, an archival storage system designed around
this observation, archives executable decoders along with the encoded content
it stores. VXA decoders run in a specialized virtual machine that implements an
OS-independent execution environment based on the standard x86 architecture.
The VXA virtual machine strictly limits access to host system services, making
decoders safe to run even if an archive contains malicious code. VXA's adoption
of a "native" processor architecture instead of type-safe language technology
allows reuse of existing "hand-optimized" decoders in C and assembly language,
and permits decoders access to performance-enhancing architecture features such
as vector processing instructions. The performance cost of VXA's virtualization
is typically less than 15% compared with the same decoders running natively.
The storage cost of archived decoders, typically 30-130KB each, can be
amortized across many archived files sharing the same compression method.
| [
{
"version": "v1",
"created": "Sat, 18 Mar 2006 16:31:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ford",
"Bryan",
""
]
]
|
cs/0603074 | Bryan Ford | Bryan Ford, Pyda Srisuresh, Dan Kegel | Peer-to-Peer Communication Across Network Address Translators | 8 figures, 1 table | USENIX Annual Technical Conference, April 2005 (USENIX '05),
Anaheim, CA | null | null | cs.NI cs.CR | null | Network Address Translation (NAT) causes well-known difficulties for
peer-to-peer (P2P) communication, since the peers involved may not be reachable
at any globally valid IP address. Several NAT traversal techniques are known,
but their documentation is slim, and data about their robustness or relative
merits is slimmer. This paper documents and analyzes one of the simplest but
most robust and practical NAT traversal techniques, commonly known as "hole
punching." Hole punching is moderately well-understood for UDP communication,
but we show how it can be reliably used to set up peer-to-peer TCP streams as
well. After gathering data on the reliability of this technique on a wide
variety of deployed NATs, we find that about 82% of the NATs tested support
hole punching for UDP, and about 64% support hole punching for TCP streams. As
NAT vendors become increasingly conscious of the needs of important P2P
applications such as Voice over IP and online gaming protocols, support for
hole punching is likely to increase in the future.
| [
{
"version": "v1",
"created": "Sat, 18 Mar 2006 16:51:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ford",
"Bryan",
""
],
[
"Srisuresh",
"Pyda",
""
],
[
"Kegel",
"Dan",
""
]
]
|
cs/0603075 | Bryan Ford | Bryan Ford | Unmanaged Internet Protocol: Taming the Edge Network Management Crisis | 7 pages, 3 figures | Second Workshop on Hot Topics in Networks (HotNets-II), November
2003, Cambridge, MA | null | null | cs.NI cs.OS | null | Though appropriate for core Internet infrastructure, the Internet Protocol is
unsuited to routing within and between emerging ad-hoc edge networks due to its
dependence on hierarchical, administratively assigned addresses. Existing
ad-hoc routing protocols address the management problem but do not scale to
Internet-wide networks. The promise of ubiquitous network computing cannot be
fulfilled until we develop an Unmanaged Internet Protocol (UIP), a scalable
routing protocol that manages itself automatically. UIP must route within and
between constantly changing edge networks potentially containing millions or
billions of nodes, and must still function within edge networks disconnected
from the main Internet, all without imposing the administrative burden of
hierarchical address assignment. Such a protocol appears challenging but
feasible. We propose an architecture based on self-certifying, cryptographic
node identities and a routing algorithm adapted from distributed hash tables.
| [
{
"version": "v1",
"created": "Sat, 18 Mar 2006 17:11:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ford",
"Bryan",
""
]
]
|
cs/0603076 | Bryan Ford | Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans
Kaashoek, Robert Morris | User-Relative Names for Globally Connected Personal Devices | 7 pages, 1 figure, 1 table | 5th International Workshop on Peer-to-Peer Systems, February 2006
(IPTPS 2006), Santa Barbara, CA | null | null | cs.NI cs.DC cs.OS | null | Nontechnical users who own increasingly ubiquitous network-enabled personal
devices such as laptops, digital cameras, and smart phones need a simple,
intuitive, and secure way to share information and services between their
devices. User Information Architecture, or UIA, is a novel naming and
peer-to-peer connectivity architecture addressing this need. Users assign UIA
names by "introducing" devices to each other on a common local-area network,
but these names remain securely bound to their target as devices migrate.
Multiple devices owned by the same user, once introduced, automatically merge
their namespaces to form a distributed "personal cluster" that the owner can
access or modify from any of his devices. Instead of requiring users to
allocate globally unique names from a central authority, UIA enables users to
assign their own "user-relative" names both to their own devices and to other
users. With UIA, for example, Alice can always access her iPod from any of her
own personal devices at any location via the name "ipod", and her friend Bob
can access her iPod via a relative name like "ipod.Alice".
| [
{
"version": "v1",
"created": "Sat, 18 Mar 2006 17:27:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ford",
"Bryan",
""
],
[
"Strauss",
"Jacob",
""
],
[
"Lesniewski-Laas",
"Chris",
""
],
[
"Rhea",
"Sean",
""
],
[
"Kaashoek",
"Frans",
""
],
[
"Morris",
"Robert",
""
]
]
|
cs/0603077 | Bryan Ford | Bryan Ford | Packrat Parsing: Simple, Powerful, Lazy, Linear Time | 12 pages, 5 figures | International Conference on Functional Programming (ICFP '02),
October 2002, Pittsburgh, PA | null | null | cs.DS cs.CC cs.PL | null | Packrat parsing is a novel technique for implementing parsers in a lazy
functional programming language. A packrat parser provides the power and
flexibility of top-down parsing with backtracking and unlimited lookahead, but
nevertheless guarantees linear parse time. Any language defined by an LL(k) or
LR(k) grammar can be recognized by a packrat parser, in addition to many
languages that conventional linear-time algorithms do not support. This
additional power simplifies the handling of common syntactic idioms such as the
widespread but troublesome longest-match rule, enables the use of sophisticated
disambiguation strategies such as syntactic and semantic predicates, provides
better grammar composition properties, and allows lexical analysis to be
integrated seamlessly into parsing. Yet despite its power, packrat parsing
shares the same simplicity and elegance as recursive descent parsing; in fact
converting a backtracking recursive descent parser into a linear-time packrat
parser often involves only a fairly straightforward structural change. This
paper describes packrat parsing informally with emphasis on its use in
practical applications, and explores its advantages and disadvantages with
respect to the more conventional alternatives.
| [
{
"version": "v1",
"created": "Sat, 18 Mar 2006 17:49:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ford",
"Bryan",
""
]
]
|
cs/0603079 | Maria Chiara Meo | Maurizio Gabbrielli and Maria Chiara Meo | A compositional Semantics for CHR | null | null | null | null | cs.PL | null | Constraint Handling Rules (CHR) are a committed-choice declarative language
which has been designed for writing constraint solvers. A CHR program consists
of multi-headed guarded rules which allow one to rewrite constraints into
simpler ones until a solved form is reached.
CHR has received a considerable attention, both from the practical and from
the theoretical side. Nevertheless, due the use of multi-headed clauses, there
are several aspects of the CHR semantics which have not been clarified yet. In
particular, no compositional semantics for CHR has been defined so far.
In this paper we introduce a fix-point semantics which characterizes the
input/output behavior of a CHR program and which is and-compositional, that is,
which allows to retrieve the semantics of a conjunctive query from the
semantics of its components. Such a semantics can be used as a basis to define
incremental and modular analysis and verification tools.
| [
{
"version": "v1",
"created": "Mon, 20 Mar 2006 14:17:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gabbrielli",
"Maurizio",
""
],
[
"Meo",
"Maria Chiara",
""
]
]
|
cs/0603080 | Alin Suciu PhD | Alin Suciu | Yet Another Efficient Unification Algorithm | null | null | null | null | cs.LO cs.AI | null | The unification algorithm is at the core of the logic programming paradigm,
the first unification algorithm being developed by Robinson [5]. More efficient
algorithms were developed later [3] and I introduce here yet another efficient
unification algorithm centered on a specific data structure, called the
Unification Table.
| [
{
"version": "v1",
"created": "Mon, 20 Mar 2006 20:15:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Suciu",
"Alin",
""
]
]
|
cs/0603081 | Nikita Sakhanenko | Nikita A. Sakhanenko (1 and 2), George F. Luger (1), Hanna E. Makaruk
(2), David B. Holtkamp (2) ((1) CS Dept. University of New Mexico, (2)
Physics Div. Los Alamos National Laboratory) | Application of Support Vector Regression to Interpolation of Sparse
Shock Physics Data Sets | 13 pages, 7 figures | null | null | LA-UR-06-1739 | cs.AI | null | Shock physics experiments are often complicated and expensive. As a result,
researchers are unable to conduct as many experiments as they would like -
leading to sparse data sets. In this paper, Support Vector Machines for
regression are applied to velocimetry data sets for shock damaged and melted
tin metal. Some success at interpolating between data sets is achieved.
Implications for future work are discussed.
| [
{
"version": "v1",
"created": "Mon, 20 Mar 2006 23:43:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sakhanenko",
"Nikita A.",
"",
"1 and 2"
],
[
"Luger",
"George F.",
""
],
[
"Makaruk",
"Hanna E.",
""
],
[
"Holtkamp",
"David B.",
""
]
]
|
cs/0603082 | Giorgi Pascal | Wayne Eberly, Mark Giesbrecht (SCG), Pascal Giorgi (LP2A, SCG), Arne
Storjohann (SCG), Gilles Villard (LIP) | Solving Sparse Integer Linear Systems | null | null | null | null | cs.SC | null | We propose a new algorithm to solve sparse linear systems of equations over
the integers. This algorithm is based on a $p$-adic lifting technique combined
with the use of block matrices with structured blocks. It achieves a sub-cubic
complexity in terms of machine operations subject to a conjecture on the
effectiveness of certain sparse projections. A LinBox-based implementation of
this algorithm is demonstrated, and emphasizes the practical benefits of this
new method over the previous state of the art.
| [
{
"version": "v1",
"created": "Tue, 21 Mar 2006 16:09:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eberly",
"Wayne",
"",
"SCG"
],
[
"Giesbrecht",
"Mark",
"",
"SCG"
],
[
"Giorgi",
"Pascal",
"",
"LP2A, SCG"
],
[
"Storjohann",
"Arne",
"",
"SCG"
],
[
"Villard",
"Gilles",
"",
"LIP"
]
]
|
cs/0603084 | Eran Ofek | Uriel Feige and Eran Ofek | Random 3CNF formulas elude the Lovasz theta function | 14 pages | null | null | null | cs.CC cs.DS cs.LO | null | Let $\phi$ be a 3CNF formula with n variables and m clauses. A simple
nonconstructive argument shows that when m is sufficiently large compared to n,
most 3CNF formulas are not satisfiable. It is an open question whether there is
an efficient refutation algorithm that for most such formulas proves that they
are not satisfiable. A possible approach to refute a formula $\phi$ is: first,
translate it into a graph $G_{\phi}$ using a generic reduction from 3-SAT to
max-IS, then bound the maximum independent set of $G_{\phi}$ using the Lovasz
$\vartheta$ function. If the $\vartheta$ function returns a value $< m$, this
is a certificate for the unsatisfiability of $\phi$. We show that for random
formulas with $m < n^{3/2 -o(1)}$ clauses, the above approach fails, i.e. the
$\vartheta$ function is likely to return a value of m.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2006 10:30:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Feige",
"Uriel",
""
],
[
"Ofek",
"Eran",
""
]
]
|
cs/0603085 | Jonathan Adams | Jonathan K. Adams, Basheer N. Bristow | Access Control for Hierarchical Joint-Tenancy | To appear in WSEAS Transactions on Computers, will probably be edited
further before final revision replaced due to typographical errors | WSEAS Transactions on Computers, June 2006, Issue 6, Volume 5, p.
1313-1318 | null | null | cs.CR | null | Basic role based access control [RBAC] provides a mechanism for segregating
access privileges based upon a user's hierarchical roles within an
organization. This model doesn't scale well when there is tight integration of
multiple hierarchies. In a case where there is joint-tenancy and a requirement
for different levels of disclosure based upon a user's hierarchy, or in our
case, organization or company, basic RBAC requires these hierarchies to be
effectively merged. Specific roles that effectively represent both the user's
organizations and roles must be translated to fit within the merged hierarchy
to be used to control access. Essentially, users from multiple organizations
are served from a single role base with roles designed to constrain their
access as needed.
Our work proposes, through parameterized roles and privileges, a means for
accurately representing both users' roles within their respective hierarchies
for providing access to controlled objects. Using this method will reduce the
amount of complexity required in terms of the number of roles and privileges.
The resulting set of roles, privileges, and objects will make modeling and
visualizing the access role hierarchy significantly simplified. This paper will
give some background on role based access control, parameterized roles and
privileges, and then focus on how RBAC with parameterized roles and privileges
can be leveraged as an access control solution for the problems presented by
joint tenancy.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2006 10:59:06 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2006 01:18:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Adams",
"Jonathan K.",
""
],
[
"Bristow",
"Basheer N.",
""
]
]
|
cs/0603086 | Joel Le Roux | Joel Le Roux (1), Philippe Chaurand (1) and Mickael Urrutia (1) ((1)
University of Nice (France)) | Matching Edges in Images ; Application to Face Recognition | 11 Pages, 6 figures | null | null | null | cs.CV | null | This communication describes a representation of images as a set of edges
characterized by their position and orientation. This representation allows the
comparison of two images and the computation of their similarity. The first
step in this computation of similarity is the seach of a geometrical basis of
the two dimensional space where the two images are represented simultaneously
after transformation of one of them. Presently, this simultaneous
representation takes into account a shift and a scaling ; it may be extended to
rotations or other global geometrical transformations. An elementary
probabilistic computation shows that a sufficient but not excessive number of
trials (a few tens) ensures that the exhibition of this common basis is
guaranteed in spite of possible errors in the detection of edges. When this
first step is performed, the search of similarity between the two images
reduces to counting the coincidence of edges in the two images. The approach
may be applied to many problems of pattern matching ; it was checked on face
recognition.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2006 14:51:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Roux",
"Joel Le",
""
],
[
"Chaurand",
"Philippe",
""
],
[
"Urrutia",
"Mickael",
""
]
]
|
cs/0603087 | P. Oscar Boykin | Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato Figueiredo | IP over P2P: Enabling Self-configuring Virtual IP Networks for Grid
Computing | To appear in IPDPS 2006 | null | null | null | cs.DC cs.NI | null | Peer-to-peer (P2P) networks have mostly focused on task oriented networking,
where networks are constructed for single applications, i.e. file-sharing, DNS
caching, etc. In this work, we introduce IPOP, a system for creating virtual IP
networks on top of a P2P overlay. IPOP enables seamless access to Grid
resources spanning multiple domains by aggregating them into a virtual IP
network that is completely isolated from the physical network. The virtual IP
network provided by IPOP supports deployment of existing IP-based protocols
over a robust, self-configuring P2P overlay. We present implementation details
as well as experimental measurement results taken from LAN, WAN, and Planet-Lab
tests.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2006 16:50:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ganguly",
"Arijit",
""
],
[
"Agrawal",
"Abhishek",
""
],
[
"Boykin",
"P. Oscar",
""
],
[
"Figueiredo",
"Renato",
""
]
]
|
cs/0603088 | Himanshu Thapliyal | Himanshu Thapliyal, Saurabh Kotiyal and M.B Srinivas | Novel BCD Adders and Their Reversible Logic Implementation for IEEE 754r
Format | 6 Pages: This paper is a corrected version of our recent publication
published in 19th International Conference on VLSI Design and 5th
International Conference on Embedded Systems (VLSI Design 2006), Hyderabad,
India, Jan 4-7, 2006 | null | null | null | cs.AR | null | IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and
a major enhancement to the standard is the addition of decimal format. This
paper proposes two novel BCD adders called carry skip and carry look-ahead BCD
adders respectively. Furthermore, in the recent years, reversible logic has
emerged as a promising technology having its applications in low power CMOS,
quantum computing, nanotechnology, and optical computing. It is not possible to
realize quantum computing without reversible logic. Thus, this paper also paper
provides the reversible logic implementation of the conventional BCD adder as
the well as the proposed Carry Skip BCD adder using a recently proposed TSG
gate. Furthermore, a new reversible gate called TS-3 is also being proposed and
it has been shown that the proposed reversible logic implementation of the BCD
Adders is much better compared to recently proposed one, in terms of number of
reversible gates used and garbage outputs produced. The reversible BCD circuits
designed and proposed here form the basis of the decimal ALU of a primitive
quantum CPU.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2006 18:11:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Kotiyal",
"Saurabh",
""
],
[
"Srinivas",
"M. B",
""
]
]
|
cs/0603089 | Lawrence Ioannou | Lawrence M. Ioannou and Benjamin C. Travaglione and Donny Cheung | Convex Separation from Optimization via Heuristics | null | null | null | null | cs.DS math.OC | null | Let $K$ be a full-dimensional convex subset of $\mathbb{R}^n$. We describe a
new polynomial-time Turing reduction from the weak separation problem for $K$
to the weak optimization problem for $K$ that is based on a geometric
heuristic. We compare our reduction, which relies on analytic centers, with the
standard, more general reduction.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2006 19:46:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ioannou",
"Lawrence M.",
""
],
[
"Travaglione",
"Benjamin C.",
""
],
[
"Cheung",
"Donny",
""
]
]
|
cs/0603090 | Alexander Gorban | A.N. Gorban, N.R. Sumner, A.Y. Zinovyev | Topological Grammars for Data Approximation | Corrected Journal version, Appl. Math. Lett., in press. 7 pgs., 2
figs | Applied Mathematics Letters 20 (2007) 382--386 | 10.1016/j.aml.2006.04.022 | null | cs.NE cs.LG | null | A method of {\it topological grammars} is proposed for multidimensional data
approximation. For data with complex topology we define a {\it principal cubic
complex} of low dimension and given complexity that gives the best
approximation for the dataset. This complex is a generalization of linear and
non-linear principal manifolds and includes them as particular cases. The
problem of optimal principal complex construction is transformed into a series
of minimization problems for quadratic functionals. These quadratic functionals
have a physically transparent interpretation in terms of elastic energy. For
the energy computation, the whole complex is represented as a system of nodes
and springs. Topologically, the principal complex is a product of
one-dimensional continuums (represented by graphs), and the grammars describe
how these continuums transform during the process of optimal complex
construction. This factorization of the whole process onto one-dimensional
transformations using minimization of quadratic energy functionals allow us to
construct efficient algorithms.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2006 22:52:23 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 13:41:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gorban",
"A. N.",
""
],
[
"Sumner",
"N. R.",
""
],
[
"Zinovyev",
"A. Y.",
""
]
]
|
cs/0603091 | Himanshu Thapliyal | Himanshu Thapliyal and M.B Srinivas | A New Reversible TSG Gate and Its Application For Designing Efficient
Adder Circuits | 5 Pages: Published in 7th International Symposium on Representations
and Methodology of Future Computing Technologies(RM 2005), Tokyo, Japan,
September 5-6, 2005 | null | null | null | cs.AR | null | In the recent years, reversible logic has emerged as a promising technology
having its applications in low power CMOS, quantum computing, nanotechnology,
and optical computing. The classical set of gates such as AND, OR, and EXOR are
not reversible. This paper proposes a new 4 * 4 reversible gate called TSG
gate. The proposed gate is used to design efficient adder units. The most
significant aspect of the proposed gate is that it can work singly as a
reversible full adder i.e reversible full adder can now be implemented with a
single gate only. The proposed gate is then used to design reversible ripple
carry and carry skip adders. It is demonstrated that the adder architectures
designed using the proposed gate are much better and optimized, compared to
their existing counterparts in literature; in terms of number of reversible
gates and garbage outputs. Thus, this paper provides the initial threshold to
building of more complex system which can execute more complicated operations
using reversible logic.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2006 06:44:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B",
""
]
]
|
cs/0603092 | Himanshu Thapliyal | Himanshu Thapliyal and M.B Srinivas | An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible
Sequential Circuits using Fredkin Gates | 7 Pages: Deals with design of reversible sequential circuits.
Published: Proceedings of SPIE Volume: 6050, pp.196-202.Optomechatronic
Micro/Nano Devices and Components, Sapporo, Japan, December 5-7, 2005;
Editor(s): Yoshitada Katagiri | null | null | null | cs.AR | null | In recent years, reversible logic has emerged as a promising computing
paradigm having its applications in low power computing, quantum computing,
nanotechnology, optical computing and DNA computing. The classical set of gates
such as AND, OR, and EXOR are not reversible. Recently, it has been shown how
to encode information in DNA and use DNA amplification to implement Fredkin
gates. Furthermore, in the past Fredkin gates have been constructed using DNA,
whose outputs are used as inputs for other Fredkin gates. Thus, it can be
concluded that arbitrary circuits of Fredkin gates can be constructed using
DNA. This paper provides the initial threshold to building of more complex
system having reversible sequential circuits and which can execute more
complicated operations. The novelty of the paper is the reversible designs of
sequential circuits using Fredkin gate. Since, Fredkin gate has already been
realized using DNA, it is expected that this work will initiate the building of
complex systems using DNA. The reversible circuits designed here are highly
optimized in terms of number of gates and garbage outputs. The modularization
approach that is synthesizing small circuits and thereafter using them to
construct bigger circuits is used for designing the optimal reversible
sequential circuits.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2006 08:33:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B",
""
]
]
|
cs/0603099 | Alin Suciu PhD | Alin Suciu, Rodica Potolea, Tudor Muresan | Benchmark Problems for Constraint Solving | null | null | null | null | cs.PF cs.SC | null | Constraint Programming is roughly a new software technology introduced by
Jaffar and Lassez in 1987 for description and effective solving of large,
particularly combinatorial, problems especially in areas of planning and
scheduling. In the following we define three problems for constraint solving
from the domain of electrical networks; based on them we define 43 related
problems. For the defined set of problems we benchmarked five systems: ILOG
OPL, AMPL, GAMS, Mathematica and UniCalc. As expected some of the systems
performed very well for some problems while others performed very well on
others.
| [
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:19:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Suciu",
"Alin",
""
],
[
"Potolea",
"Rodica",
""
],
[
"Muresan",
"Tudor",
""
]
]
|
cs/0603100 | Alin Suciu PhD | Alin Suciu, Kalman Pusztai | Efficient Compression of Prolog Programs | null | null | null | null | cs.PL | null | We propose a special-purpose class of compression algorithms for efficient
compression of Prolog programs. It is a dictionary-based compression method,
specially designed for the compression of Prolog code, and therefore we name it
PCA (Prolog Compression Algorithm). According to the experimental results this
method provides better compression than state-of-the-art general-purpose
compression algorithms. Since the algorithm works with Prolog syntactic
entities (e.g. atoms, terms, etc.) the implementation of a Prolog prototype is
straightforward and very easy to use in any Prolog application that needs
compression. Although the algorithm is designed for Prolog programs, the idea
can be easily applied for the compression of programs written in other (logic)
languages.
| [
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:27:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Suciu",
"Alin",
""
],
[
"Pusztai",
"Kalman",
""
]
]
|
cs/0603101 | Alin Suciu PhD | Alin Suciu, Kalman Pusztai, Andrei Vancea | Prolog Server Pages | null | null | null | null | cs.NI cs.PL | null | Prolog Server Pages (PSP) is a scripting language, based on Prolog, than can
be embedded in HTML documents. To run PSP applications one needs a web server,
a web browser and a PSP interpreter. The code is executed, by the interpreter,
on the server-side (web server) and the output (together with the html code in
witch the PSP code is embedded) is sent to the client-side (browser). The
current implementation supports Apache Web Server. We implemented an Apache web
server module that handles PSP files, and sends the result (an html document)
to the client. PSP supports both GET and POST http requests. It also provides
methods for working with http cookies.
| [
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:35:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Suciu",
"Alin",
""
],
[
"Pusztai",
"Kalman",
""
],
[
"Vancea",
"Andrei",
""
]
]
|
cs/0603102 | Alin Suciu PhD | Alin Suciu, Kalman Pusztai, Andrei Diaconu | Enhanced Prolog Remote Predicate Call Protocol | null | null | null | null | cs.NI cs.PL | null | Following the ideas of the Remote Procedure Call model, we have developed a
logic programming counterpart, naturally called Prolog Remote Predicate Call
(Prolog RPC). The Prolog RPC protocol facilitates the integration of Prolog
code in multi-language applications as well as the development of distributed
intelligent applications. One use of the protocol's most important uses could
be the development of distributed applications that use Prolog at least
partially to achieve their goals. Most notably the Distributed Artificial
Intelligence (DAI) applications that are suitable for logic programming can
profit from the use of the protocol. After proving its usefulness, we went
further, developing a new version of the protocol, making it more reliable and
extending its functionality. Because it has a new syntax and the new set of
commands, we call this version Enhanced Prolog Remote Procedure Call. This
paper describes the new features and modifications this second version
introduced.
| [
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:44:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Suciu",
"Alin",
""
],
[
"Pusztai",
"Kalman",
""
],
[
"Diaconu",
"Andrei",
""
]
]
|
cs/0603104 | Patrick Baillot | Vincent Atassi (LIPN), Patrick Baillot (LIPN), Kazushige Terui (NII) | Verification of Ptime reducibility for system F terms via Dual Light
Affine Logic | 21 pages | A para\^{i}tre dans Proceedings Computer Science Logic 2006
(CSL'06), LNCS, Springer. (2006) | null | null | cs.LO | null | In a previous work we introduced Dual Light Affine Logic (DLAL)
([BaillotTerui04]) as a variant of Light Linear Logic suitable for guaranteeing
complexity properties on lambda-calculus terms: all typable terms can be
evaluated in polynomial time and all Ptime functions can be represented. In the
present work we address the problem of typing lambda-terms in second-order
DLAL. For that we give a procedure which, starting with a term typed in system
F, finds all possible ways to decorate it into a DLAL typed term. We show that
our procedure can be run in time polynomial in the size of the original Church
typed system F term.
| [
{
"version": "v1",
"created": "Mon, 27 Mar 2006 09:14:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Atassi",
"Vincent",
"",
"LIPN"
],
[
"Baillot",
"Patrick",
"",
"LIPN"
],
[
"Terui",
"Kazushige",
"",
"NII"
]
]
|
cs/0603107 | Pedro Fortuny Ayuso | Pedro Fortuny Ayuso | Towards an information-theoretically safe cryptographic protocol | 2 pages | null | null | null | cs.CR | null | We introduce what --if some kind of group action exists-- is a truly
(information theoretically) safe cryptographic communication system: a protocol
which provides \emph{zero} information to any passive adversary having full
access to the channel.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2006 17:47:11 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Mar 2006 21:27:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ayuso",
"Pedro Fortuny",
""
]
]
|
cs/0603108 | Michael Brinkmeier | Michael Brinkmeier | Minimizing Symmetric Set Functions Faster | 9 pages | null | null | null | cs.DM math.CO | null | We describe a combinatorial algorithm which, given a monotone and consistent
symmetric set function d on a finite set V in the sense of Rizzi, constructs a
non trivial set S minimizing d(S,V-S). This includes the possibility for the
minimization of symmetric submodular functions. The presented algorithm
requires at most as much time as the one described by Rizzi, but depending on
the function d, it may allow several improvements.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2006 10:25:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brinkmeier",
"Michael",
""
]
]
|
cs/0603110 | Marcus Hutter | Daniil Ryabko and Marcus Hutter | Asymptotic Learnability of Reinforcement Problems with Arbitrary
Dependence | 15 pages | Proc. 17th International Conf. on Algorithmic Learning Theory (ALT
2006) pages 334-347 | null | IDSIA-09-06 | cs.LG cs.AI | null | We address the problem of reinforcement learning in which observations may
exhibit an arbitrary form of stochastic dependence on past observations and
actions. The task for an agent is to attain the best possible asymptotic reward
where the true generating environment is unknown but belongs to a known
countable family of environments. We find some sufficient conditions on the
class of environments under which an agent exists which attains the best
asymptotic reward for any environment in the class. We analyze how tight these
conditions are and how they relate to different probabilistic assumptions known
in reinforcement learning and related fields, such as Markov Decision Processes
and mixing conditions.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2006 16:22:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ryabko",
"Daniil",
""
],
[
"Hutter",
"Marcus",
""
]
]
|
cs/0603111 | Tomasz Blachowicz | T. Blachowicz and M. Wieja | Remote-control and clustering of physical computations using the XML-RPC
protocol and the open-Mosix system | 18 pages, 2 figures | null | null | null | cs.DC cs.NI | null | The applications of the remote control of physical simulations performed in
clustered computers running under an open-Mosix system are presented. Results
from the simulation of a 2-dimensional ferromagnetic system of spins in the
Ising scheme are provided. Basic parameters of a simulated hysteresis loop like
coercivity and exchange bias due to pinning of ferromagnetic spins are given.
The paper describes in physicists terminology a cost effective solution which
utilizes an XML-RPC protocol (Extensible Markup Language - Remote Procedure
Calling) and standard C++ and Python languages.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2006 20:45:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Blachowicz",
"T.",
""
],
[
"Wieja",
"M.",
""
]
]
|
cs/0603114 | William Yurcik | Gregory A. Pluta, Larry Brumbaugh, William Yurcik | Using SMART for Customized Monitoring of Windows Services | 15 pages, 10 figures, 2 tables | null | null | null | cs.NI cs.CR | null | We focus on examining and working with an important category of computer
software called Services, which are provided as a part of newer Microsoft
Windows operating systems. A typical Windows user transparently utilizes many
of these services but is frequently unaware of their existence. Since some
services have the potential to create significant problems when they are
executing, it is important for a system administrator to identify which
services are running on the network, the types of processing done by each
service, and any interrelationships among the various services. This
information can then be used to improve the overall integrity of both the
individual computer where a questionable service is running and in aggregate an
entire network of computers.
NCSA has developed an application called SMART (Services Monitoring And
Reporting Tool) that can be used to identify and display all services currently
running in the network. A commercial program called Hyena remotely monitors the
services on all computers attached to the network and exports this information
to SMART. SMART produces various outputs that the system administrator can
analyze and then determine appropriate actions to take. In particular, SMART
provides a color coordinated user interface to quickly identify and classify
both potentially hazardous services and also unknown services.
| [
{
"version": "v1",
"created": "Wed, 29 Mar 2006 05:25:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pluta",
"Gregory A.",
""
],
[
"Brumbaugh",
"Larry",
""
],
[
"Yurcik",
"William",
""
]
]
|
cs/0603115 | David Defour | Guillaume Da Gra\c{c}ca (LP2A), David Defour (LP2A) | Implementation of float-float operators on graphics hardware | null | null | null | null | cs.AR cs.GR | null | The Graphic Processing Unit (GPU) has evolved into a powerful and flexible
processor. The latest graphic processors provide fully programmable vertex and
pixel processing units that support vector operations up to single
floating-point precision. This computational power is now being used for
general-purpose computations. However, some applications require higher
precision than single precision. This paper describes the emulation of a 44-bit
floating-point number format and its corresponding operations. An
implementation is presented along with performance and accuracy results.
| [
{
"version": "v1",
"created": "Wed, 29 Mar 2006 11:48:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Da Graçca",
"Guillaume",
"",
"LP2A"
],
[
"Defour",
"David",
"",
"LP2A"
]
]
|
cs/0603117 | Yves Bertot | Yves Bertot (INRIA Sophia Antipolis) | Affine functions and series with co-inductive real numbers | null | Mathematical Structures in Computer Science 17, 1 (2006) | null | null | cs.LO | null | We extend the work of A. Ciaffaglione and P. Di Gianantonio on mechanical
verification of algorithms for exact computation on real numbers, using
infinite streams of digits implemented as co-inductive types. Four aspects are
studied: the first aspect concerns the proof that digit streams can be related
to the axiomatized real numbers that are already axiomatized in the proof
system (axiomatized, but with no fixed representation). The second aspect
re-visits the definition of an addition function, looking at techniques to let
the proof search mechanism perform the effective construction of an algorithm
that is correct by construction. The third aspect concerns the definition of a
function to compute affine formulas with positive rational coefficients. This
should be understood as a testbed to describe a technique to combine
co-recursion and recursion to obtain a model for an algorithm that appears at
first sight to be outside the expressive power allowed by the proof system. The
fourth aspect concerns the definition of a function to compute series, with an
application on the series that is used to compute Euler's number e. All these
experiments should be reproducible in any proof system that supports
co-inductive types, co-recursion and general forms of terminating recursion,
but we performed with the Coq system [12, 3, 14].
| [
{
"version": "v1",
"created": "Wed, 29 Mar 2006 19:36:03 GMT"
},
{
"version": "v2",
"created": "Mon, 1 May 2006 07:38:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
]
|
cs/0603119 | Yves Bertot | Yves Bertot (INRIA Sophia Antipolis) | CoInduction in Coq | null | null | null | null | cs.LO | null | We describe the basic notions of co-induction as they are available in the
coq system. As an application, we describe arithmetic properties for simple
representations of real numbers.
| [
{
"version": "v1",
"created": "Wed, 29 Mar 2006 19:39:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
]
|
cs/0603120 | Zengyou He | Zengyou He | Approximation Algorithms for K-Modes Clustering | 7 pages | null | null | Tr-06-0330 | cs.AI | null | In this paper, we study clustering with respect to the k-modes objective
function, a natural formulation of clustering for categorical data. One of the
main contributions of this paper is to establish the connection between k-modes
and k-median, i.e., the optimum of k-median is at most twice the optimum of
k-modes for the same categorical data clustering problem. Based on this
observation, we derive a deterministic algorithm that achieves an approximation
factor of 2. Furthermore, we prove that the distance measure in k-modes defines
a metric. Hence, we are able to extend existing approximation algorithms for
metric k-median to k-modes. Empirical results verify the superiority of our
method.
| [
{
"version": "v1",
"created": "Thu, 30 Mar 2006 02:02:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
]
]
|
cs/0603121 | Scott Turner | Scott Turner, Manuel A. Perez-Quinones and Stephen H. Edwards | minimUML: A Minimalist Approach to UML Diagraming for Early Computer
Science Education | 38 pages, 15 figures | null | null | null | cs.HC cs.SE | null | The Unified Modeling Language (UML) is commonly used in introductory Computer
Science to teach basic object-oriented design. However, there appears to be a
lack of suitable software to support this task. Many of the available programs
that support UML focus on developing code and not on enhancing learning. Those
that were designed for educational use sometimes have poor interfaces or are
missing common and important features, such as multiple selection and
undo/redo. There is a need for software that is tailored to an instructional
environment and has all the useful and needed functionality for that specific
task. This is the purpose of minimUML. minimUML provides a minimum amount of
UML, just what is commonly used in beginning programming classes, while
providing a simple, usable interface. In particular, minimUML was designed to
support abstract design while supplying features for exploratory learning and
error avoidance. In addition, it allows for the annotation of diagrams, through
text or freeform drawings, so students can receive feedback on their work.
minimUML was developed with the goal of supporting ease of use, supporting
novice students, and a requirement of no prior-training for its use.
| [
{
"version": "v1",
"created": "Thu, 30 Mar 2006 06:12:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Turner",
"Scott",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
],
[
"Edwards",
"Stephen H.",
""
]
]
|
cs/0603125 | Russ Abbott | Russ Abbott | If a tree casts a shadow is it telling the time? | 12 pages. Submitted for conference presentation | null | null | null | cs.MA cs.GL | null | Physical processes are computations only when we use them to externalize
thought. Computation is the performance of one or more fixed processes within a
contingent environment. We reformulate the Church-Turing thesis so that it
applies to programs rather than to computability. When suitably formulated
agent-based computing in an open, multi-scalar environment represents the
current consensus view of how we interact with the world. But we don't know how
to formulate multi-scalar environments.
| [
{
"version": "v1",
"created": "Thu, 30 Mar 2006 22:31:26 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jun 2006 01:49:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abbott",
"Russ",
""
]
]
|
cs/0603127 | Russ Abbott | Russ Abbott | Complex Systems + Systems Engineering = Complex Systems Engineeri | 10 pages. Position paper to be presented at Conference on Systems
Engineering Research | null | null | null | cs.MA | null | One may define a complex system as a system in which phenomena emerge as a
consequence of multiscale interaction among the system's components and their
environments. The field of Complex Systems is the study of such
systems--usually naturally occurring, either bio-logical or social. Systems
Engineering may be understood to include the conceptualising and building of
systems that consist of a large number of concurrently operating and
interacting components--usually including both human and non-human elements. It
has become increasingly apparent that the kinds of systems that systems
engineers build have many of the same multiscale characteristics as those of
naturally occurring complex systems. In other words, systems engineering is the
engineering of complex systems. This paper and the associated panel will
explore some of the connections between the fields of complex systems and
systems engineering.
| [
{
"version": "v1",
"created": "Thu, 30 Mar 2006 22:58:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abbott",
"Russ",
""
]
]
|
cs/0603129 | Damiano Bolzoni | Xiamoneg Su, Damiano Bolzoni, Pascal van Eck | A Business Goal Driven Approach for Understanding and Specifying
Information Security Requirements | null | null | null | TR-CTIT-06-08 | cs.CR | null | In this paper we present an approach for specifying and prioritizing
information security requirements in organizations. It is important to
prioritize security requirements since hundred per cent security is not
achievable and the limited resources available should be directed to satisfy
the most important ones. We propose to link explicitly security requirements
with the organization's business vision, i.e. to provide business rationale for
security requirements. The rationale is then used as a basis for comparing the
importance of different security requirements. A conceptual framework is
presented, where the relationships between business vision, critical impact
factors and valuable assets (together with their security requirements) are
shown.
| [
{
"version": "v1",
"created": "Fri, 31 Mar 2006 13:15:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Su",
"Xiamoneg",
""
],
[
"Bolzoni",
"Damiano",
""
],
[
"van Eck",
"Pascal",
""
]
]
|
cs/0603132 | Michael McGuigan | Michael McGuigan | Graphics Turing Test | 6 pages | null | null | null | cs.GR | null | We define a Graphics Turing Test to measure graphics performance in a similar
manner to the definition of the traditional Turing Test. To pass the test one
needs to reach a computational scale, the Graphics Turing Scale, for which
Computer Generated Imagery becomes comparatively indistinguishable from real
images while also being interactive. We derive an estimate for this
computational scale which, although large, is within reach of todays
supercomputers. We consider advantages and disadvantages of various computer
systems designed to pass the Graphics Turing Test. Finally we discuss
commercial applications from the creation of such a system, in particular
Interactive Cinema.
| [
{
"version": "v1",
"created": "Fri, 31 Mar 2006 19:58:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"McGuigan",
"Michael",
""
]
]
|
cs/0604001 | Fabrice Rossi | Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Brieuc
Conan-Guez (LITA) | Theoretical Properties of Projection Based Multilayer Perceptrons with
Functional Inputs | null | null | 10.1007/s11063-005-3100-2 | null | cs.NE | null | Many real world data are sampled functions. As shown by Functional Data
Analysis (FDA) methods, spectra, time series, images, gesture recognition data,
etc. can be processed more efficiently if their functional nature is taken into
account during the data analysis process. This is done by extending standard
data analysis methods so that they can apply to functional inputs. A general
way to achieve this goal is to compute projections of the functional data onto
a finite dimensional sub-space of the functional space. The coordinates of the
data on a basis of this sub-space provide standard vector representations of
the functions. The obtained vectors can be processed by any standard method. In
our previous work, this general approach has been used to define projection
based Multilayer Perceptrons (MLPs) with functional inputs. We study in this
paper important theoretical properties of the proposed model. We show in
particular that MLPs with functional inputs are universal approximators: they
can approximate to arbitrary accuracy any continuous mapping from a compact
sub-space of a functional space to R. Moreover, we provide a consistency result
that shows that any mapping from a functional space to R can be learned thanks
to examples by a projection based MLP: the generalization mean square error of
the MLP decreases to the smallest possible mean square error on the data when
the number of examples goes to infinity.
| [
{
"version": "v1",
"created": "Sat, 1 Apr 2006 20:16:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Conan-Guez",
"Brieuc",
"",
"LITA"
]
]
|
cs/0604002 | Leopoldo Bertossi | Andrei Lopatenko and Leopoldo Bertossi | Complexity of Consistent Query Answering in Databases under
Cardinality-Based and Incremental Repair Semantics | 26 pages, 2 figures | null | null | null | cs.DB cs.CC | null | Consistent Query Answering (CQA) is the problem of computing from a database
the answers to a query that are consistent with respect to certain integrity
constraints that the database, as a whole, may fail to satisfy. Consistent
answers have been characterized as those that are invariant under certain
minimal forms of restoration of the database consistency. We investigate
algorithmic and complexity theoretic issues of CQA under database repairs that
minimally depart -wrt the cardinality of the symmetric difference- from the
original database. We obtain first tight complexity bounds.
We also address the problem of incremental complexity of CQA, that naturally
occurs when an originally consistent database becomes inconsistent after the
execution of a sequence of update operations. Tight bounds on incremental
complexity are provided for various semantics under denial constraints. Fixed
parameter tractability is also investigated in this dynamic context, where the
size of the update sequence becomes the relevant parameter.
| [
{
"version": "v1",
"created": "Sun, 2 Apr 2006 03:07:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lopatenko",
"Andrei",
""
],
[
"Bertossi",
"Leopoldo",
""
]
]
|
cs/0604003 | Petrus H Potgieter | Petrus H. Potgieter | Hypercomputing the Mandelbrot Set? | 11 pages, 2 figures | null | null | null | cs.CC | null | The Mandelbrot set is an extremely well-known mathematical object that can be
described in a quite simple way but has very interesting and non-trivial
properties. This paper surveys some results that are known concerning the
(non-)computability of the set. It considers two models of decidability over
the reals (which have been treated much more thoroughly and technically by
Hertling (2005), Blum, Shub and Smale, Brattka (2003) and Weihrauch (1999 and
2003) among others), two over the computable reals (the Russian school and
hypercomputation) and a model over the rationals.
| [
{
"version": "v1",
"created": "Sun, 2 Apr 2006 15:31:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Potgieter",
"Petrus H.",
""
]
]
|
cs/0604004 | Alexander Evako | Alexander V. Evako | The Poincare conjecture for digital spaces. Properties of digital
n-dimensional disks and spheres | null | null | null | null | cs.DM cs.CV math.AT | null | Motivated by the Poincare conjecture, we study properties of digital
n-dimensional spheres and disks, which are digital models of their continuous
counterparts. We introduce homeomorphic transformations of digital manifolds,
which retain the connectedness, the dimension, the Euler characteristics and
the homology groups of manifolds. We find conditions where an n-dimensional
digital manifold is the n-dimensional digital sphere and discuss the link
between continuous closed n-manifolds and their digital models.
| [
{
"version": "v1",
"created": "Sun, 2 Apr 2006 19:55:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Evako",
"Alexander V.",
""
]
]
|
cs/0604006 | David Bateman | David Bateman and Andy Adler | Sparse Matrix Implementation in Octave | null | null | null | Octave2006/04 | cs.MS | null | There are many classes of mathematical problems which give rise to matrices,
where a large number of the elements are zero. In this case it makes sense to
have a special matrix type to handle this class of problems where only the
non-zero elements of the matrix are stored. Not only does this reduce the
amount of memory to store the matrix, but it also means that operations on this
type of matrix can take advantage of the a-priori knowledge of the positions of
the non-zero elements to accelerate their calculations. A matrix type that
stores only the non-zero elements is generally called sparse.
Until recently Octave has lacked a full implementation of sparse matrices.
This article address the implementation of sparse matrices within Octave,
including their storage, creation, fundamental algorithms used, their
implementations and the basic operations and functions implemented for sparse
matrices. Mathematical issues such as the return types of sparse operations,
matrix fill-in and reordering for sparse matrix factorization is discussed in
the context of a real example.
Benchmarking of Octave's implementation of sparse operations compared to
their equivalent in Matlab are given and their implications discussed. Results
are presented for multiplication and linear algebra operations for various
matrix orders and densities. Furthermore, the use of Octave's sparse matrix
implementation is demonstrated using a real example of a finite element model
(FEM) problem. Finally, the method of using sparse matrices with Octave's
oct-files is discussed. The means of creating, using and returning sparse
matrices within oct-files is discussed as well as the differences between
Octave's Sparse and Array classes.
| [
{
"version": "v1",
"created": "Mon, 3 Apr 2006 12:56:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bateman",
"David",
""
],
[
"Adler",
"Andy",
""
]
]
|
cs/0604007 | Guillaume Theyssier | Laurent Boyer (LIP), Victor Poupet (LIP), Guillaume Theyssier
(LM-Savoie) | On the Complexity of Limit Sets of Cellular Automata Associated with
Probability Measures | null | Mathematical Foundations of Computer Science 2006Springer (Ed.)
(28/08/2006) 190-201 | null | null | cs.DM cs.CC math.DS | null | We study the notion of limit sets of cellular automata associated with
probability measures (mu-limit sets). This notion was introduced by P. Kurka
and A. Maass. It is a refinement of the classical notion of omega-limit sets
dealing with the typical long term behavior of cellular automata. It focuses on
the words whose probability of appearance does not tend to 0 as time tends to
infinity (the persistent words). In this paper, we give a characterisation of
the persistent language for non sensible cellular automata associated with
Bernouilli measures. We also study the computational complexity of these
languages. We show that the persistent language can be non-recursive. But our
main result is that the set of quasi-nilpotent cellular automata (those with a
single configuration in their mu-limit set) is neither recursively enumerable
nor co-recursively enumerable.
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2006 10:21:36 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Oct 2006 08:53:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Boyer",
"Laurent",
"",
"LIP"
],
[
"Poupet",
"Victor",
"",
"LIP"
],
[
"Theyssier",
"Guillaume",
"",
"LM-Savoie"
]
]
|
cs/0604008 | Sandor P. Fekete | Esther M. Arkin and Herve Broennimann and Jeff Erickson and Sandor P.
Fekete and Christian Knauer and Jonathan Lenchner and Joseph S. B. Mitchell
and Kim Whittlesey | Minimum-Cost Coverage of Point Sets by Disks | 10 pages, 4 figures, Latex, to appear in ACM Symposium on
Computational Geometry 2006 | null | null | null | cs.DS cs.CG | null | We consider a class of geometric facility location problems in which the goal
is to determine a set X of disks given by their centers (t_j) and radii (r_j)
that cover a given set of demand points Y in the plane at the smallest possible
cost. We consider cost functions of the form sum_j f(r_j), where f(r)=r^alpha
is the cost of transmission to radius r. Special cases arise for alpha=1 (sum
of radii) and alpha=2 (total area); power consumption models in wireless
network design often use an exponent alpha>2. Different scenarios arise
according to possible restrictions on the transmission centers t_j, which may
be constrained to belong to a given discrete set or to lie on a line, etc. We
obtain several new results, including (a) exact and approximation algorithms
for selecting transmission points t_j on a given line in order to cover demand
points Y in the plane; (b) approximation algorithms (and an algebraic
intractability result) for selecting an optimal line on which to place
transmission points to cover Y; (c) a proof of NP-hardness for a discrete set
of transmission points in the plane and any fixed alpha>1; and (d) a
polynomial-time approximation scheme for the problem of computing a minimum
cost covering tour (MCCT), in which the total cost is a linear combination of
the transmission cost for the set of disks and the length of a tour/path that
connects the centers of the disks.
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2006 17:24:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Arkin",
"Esther M.",
""
],
[
"Broennimann",
"Herve",
""
],
[
"Erickson",
"Jeff",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Knauer",
"Christian",
""
],
[
"Lenchner",
"Jonathan",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Whittlesey",
"Kim",
""
]
]
|
cs/0604009 | Alexey Melkikh | Alexey V. Melkikh | Can an Organism Adapt Itself to Unforeseen Circumstances? | null | null | null | null | cs.AI | null | A model of an organism as an autonomous intelligent system has been proposed.
This model was used to analyze learning of an organism in various environmental
conditions. Processes of learning were divided into two types: strong and weak
processes taking place in the absence and the presence of aprioristic
information about an object respectively. Weak learning is synonymous to
adaptation when aprioristic programs already available in a system (an
organism) are started. It was shown that strong learning is impossible for both
an organism and any autonomous intelligent system. It was shown also that the
knowledge base of an organism cannot be updated. Therefore, all behavior
programs of an organism are congenital. A model of a conditioned reflex as a
series of consecutive measurements of environmental parameters has been
advanced. Repeated measurements are necessary in this case to reduce the error
during decision making.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2006 10:29:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Melkikh",
"Alexey V.",
""
]
]
|
cs/0604011 | Noam Shental | Gad Getz, Noam Shental, Eytan Domany | Semi-Supervised Learning -- A Statistical Physics Approach | 9 pages. Appeared in in the Proceedings of "Learning with Partially
Classified Training Data", ICML 2005 workshop | null | null | null | cs.LG cond-mat.stat-mech cs.CV | null | We present a novel approach to semi-supervised learning which is based on
statistical physics. Most of the former work in the field of semi-supervised
learning classifies the points by minimizing a certain energy function, which
corresponds to a minimal k-way cut solution. In contrast to these methods, we
estimate the distribution of classifications, instead of the sole minimal k-way
cut, which yields more accurate and robust results. Our approach may be applied
to all energy functions used for semi-supervised learning. The method is based
on sampling using a Multicanonical Markov chain Monte-Carlo algorithm, and has
a straightforward probabilistic interpretation, which allows for soft
assignments of points to classes, and also to cope with yet unseen class types.
The suggested approach is demonstrated on a toy data set and on two real-life
data sets of gene expression.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2006 18:07:31 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2006 12:23:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Getz",
"Gad",
""
],
[
"Shental",
"Noam",
""
],
[
"Domany",
"Eytan",
""
]
]
|
cs/0604012 | Sreeram Vuppala | Sreeram Vuppala | The Aryabhata Algorithm Using Least Absolute Remainders | 9 pages | null | null | null | cs.CR | null | This paper presents an introduction to the Aryabhata algorithm for finding
multiplicative inverses and solving linear congruences, both of which have
applications in cryptography. We do so by the use of the least absolute
remainders. The exposition of the Aryabhata algorithm provided here can have
performance that could exceed what was described recently by Rao and Yang.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2006 19:18:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vuppala",
"Sreeram",
""
]
]
|
cs/0604013 | Shripad Thite | Shripad Thite | On Covering a Graph Optimally with Induced Subgraphs | 9 pages | null | null | null | cs.DM | null | We consider the problem of covering a graph with a given number of induced
subgraphs so that the maximum number of vertices in each subgraph is minimized.
We prove NP-completeness of the problem, prove lower bounds, and give
approximation algorithms for certain graph classes.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 17:06:51 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2006 07:44:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thite",
"Shripad",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.