id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0604014 | Habibi Omar Jr. | O. Habibi, U.R. Patihnedj, M.O. Dhar | Towards Analog Reverse Time Computation | null | null | null | null | cs.CC | null | We report the consequences of a destabilization process on a simulated
General Purpose Analog Computer. This new technology overcomes problems linked
with serial ambiguity, and provides an analog bias to encode algorithms whose
complexity is over polynomial. We also implicitly demonstrate how
countermesures of the Stochastic Aperture Degeneracy could efficiently reach
higher computational classes, and would open a road towards Analog Reverse Time
Computation.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2006 23:40:56 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2006 09:39:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Habibi",
"O.",
""
],
[
"Patihnedj",
"U. R.",
""
],
[
"Dhar",
"M. O.",
""
]
]
|
cs/0604015 | Dmitri Krioukov | Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley, kc claffy | Revealing the Autonomous System Taxonomy: The Machine Learning Approach | null | PAM 2006, best paper award | null | null | cs.NI cs.LG | null | Although the Internet AS-level topology has been extensively studied over the
past few years, little is known about the details of the AS taxonomy. An AS
"node" can represent a wide variety of organizations, e.g., large ISP, or small
private business, university, with vastly different network characteristics,
external connectivity patterns, network growth tendencies, and other properties
that we can hardly neglect while working on veracious Internet representations
in simulation environments. In this paper, we introduce a radically new
approach based on machine learning techniques to map all the ASes in the
Internet into a natural AS taxonomy. We successfully classify 95.3% of ASes
with expected accuracy of 78.1%. We release to the community the AS-level
topology dataset augmented with: 1) the AS taxonomy information and 2) the set
of AS attributes we used to classify ASes. We believe that this dataset will
serve as an invaluable addition to further understanding of the structure and
evolution of the Internet.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 00:08:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Riley",
"George",
""
],
[
"claffy",
"kc",
""
]
]
|
cs/0604016 | Michael Baer | Michael B. Baer | On Conditional Branches in Optimal Search Trees | 8 pages, 5 figures (with 10 illustrations total), 1 table;
reformatted with some additional notes | null | null | null | cs.PF cs.DS cs.IR | null | Algorithms for efficiently finding optimal alphabetic decision trees -- such
as the Hu-Tucker algorithm -- are well established and commonly used. However,
such algorithms generally assume that the cost per decision is uniform and thus
independent of the outcome of the decision. The few algorithms without this
assumption instead use one cost if the decision outcome is ``less than'' and
another cost otherwise. In practice, neither assumption is accurate for
software optimized for today's microprocessors. Such software generally has one
cost for the more likely decision outcome and a greater cost -- often far
greater -- for the less likely decision outcome. This problem and
generalizations thereof are thus applicable to hard coding static decision tree
instances in software, e.g., for optimizing program bottlenecks or for
compiling switch statements. An O(n^3)-time O(n^2)-space dynamic programming
algorithm can solve this optimal binary decision tree problem, and this
approach has many generalizations that optimize for the behavior of processors
with predictive branch capabilities, both static and dynamic. Solutions to this
formulation are often faster in practice than ``optimal'' decision trees as
formulated in the literature. Different search paradigms can sometimes yield
even better performance.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 00:54:44 GMT"
},
{
"version": "v2",
"created": "Tue, 23 May 2006 05:07:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Baer",
"Michael B.",
""
]
]
|
cs/0604018 | Suneel Madhekar | Madhekar Suneel | Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map | Submitted to the Indian Academy of Sciences for possible publication
in Sadhana (Academy Proceedings in Engineering Sciences). Results of
statistical tests included. Introduction revised | null | null | null | cs.CR nlin.CD | null | A scheme for pseudo-random binary sequence generation based on the
two-dimensional discrete-time Henon map is proposed. Properties of the proposed
sequences pertaining to linear complexity, linear complexity profile,
correlation and auto-correlation are investigated. All these properties of the
sequences suggest a strong resemblance to random sequences. Results of
statistical testing of the sequences are found encouraging. An attempt is made
to estimate the keyspace size if the proposed scheme is used for cryptographic
applications. The keyspace size is found to be large and is dependent on the
precision of the computing platform used.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 09:13:55 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Aug 2006 16:56:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Suneel",
"Madhekar",
""
]
]
|
cs/0604019 | Thomas Giuli | K. Venkatesh Prasad, TJ Giuli, and David Watson | The Case for Modeling Security, Privacy, Usability and Reliability
(SPUR) in Automotive Software | 12 pages, 3 figures, presented at the 2006 Automotive Software
Workshop, San Diego, CA | null | null | null | cs.SE cs.CR cs.HC | null | Over the past five years, there has been considerable growth and established
value in the practice of modeling automotive software requirements. Much of
this growth has been centered on requirements of software associated with the
established functional areas of an automobile, such as those associated with
powertrain, chassis, body, safety and infotainment. This paper makes a case for
modeling four additional attributes that are increasingly important as vehicles
become information conduits: security, privacy, usability, and reliability.
These four attributes are important in creating specifications for embedded
in-vehicle automotive software.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 13:23:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Prasad",
"K. Venkatesh",
""
],
[
"Giuli",
"TJ",
""
],
[
"Watson",
"David",
""
]
]
|
cs/0604020 | Bodo Manthey | Bodo Manthey | Approximation Algorithms for Restricted Cycle Covers Based on Cycle
Decompositions | This paper has been joint with "On Approximating Restricted Cycle
Covers" (cs.CC/0504038). Please refer to that paper. The paper "Approximation
Algorithms for Restricted Cycle Covers Based on Cycle Decompositions" is now
obsolete | null | null | null | cs.DS cs.CC cs.DM | null | A cycle cover of a graph is a set of cycles such that every vertex is part of
exactly one cycle. An L-cycle cover is a cycle cover in which the length of
every cycle is in the set L. The weight of a cycle cover of an edge-weighted
graph is the sum of the weights of its edges.
We come close to settling the complexity and approximability of computing
L-cycle covers. On the one hand, we show that for almost all L, computing
L-cycle covers of maximum weight in directed and undirected graphs is APX-hard
and NP-hard. Most of our hardness results hold even if the edge weights are
restricted to zero and one.
On the other hand, we show that the problem of computing L-cycle covers of
maximum weight can be approximated within a factor of 2 for undirected graphs
and within a factor of 8/3 in the case of directed graphs. This holds for
arbitrary sets L.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 13:53:25 GMT"
},
{
"version": "v2",
"created": "Wed, 3 May 2006 13:01:24 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Jun 2006 07:32:39 GMT"
},
{
"version": "v4",
"created": "Fri, 15 Dec 2006 14:16:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Manthey",
"Bodo",
""
]
]
|
cs/0604024 | Joel Friedman | Joel Friedman | Cohomology in Grothendieck Topologies and Lower Bounds in Boolean
Complexity II: A Simple Example | 8 pages | null | null | null | cs.CC math.AG | null | In a previous paper we have suggested a number of ideas to attack circuit
size complexity with cohomology. As a simple example, we take circuits that can
only compute the AND of two inputs, which essentially reduces to SET COVER. We
show a very special case of the cohomological approach (one particular free
category, using injective and superskyscraper sheaves) gives the linear
programming bound coming from the relaxation of the standard integer
programming reformulation of SET COVER.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 20:07:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Friedman",
"Joel",
""
]
]
|
cs/0604026 | Damiano Bolzoni | Damiano Bolzoni, Sandro Etalle | APHRODITE: an Anomaly-based Architecture for False Positive Reduction | null | null | null | TR-CTIT-06-13 | cs.CR | null | We present APHRODITE, an architecture designed to reduce false positives in
network intrusion detection systems. APHRODITE works by detecting anomalies in
the output traffic, and by correlating them with the alerts raised by the NIDS
working on the input traffic. Benchmarks show a substantial reduction of false
positives and that APHRODITE is effective also after a "quick setup", i.e. in
the realistic case in which it has not been "trained" and set up optimally
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2006 12:13:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bolzoni",
"Damiano",
""
],
[
"Etalle",
"Sandro",
""
]
]
|
cs/0604032 | Martin Ziegler | Martin Ziegler and Klaus Meer | Real Computational Universality: The Word Problem for a class of groups
with infinite presentation | corrected Section 4.5 | null | null | null | cs.LO cs.SC | null | The word problem for discrete groups is well-known to be undecidable by a
Turing Machine; more precisely, it is reducible both to and from and thus
equivalent to the discrete Halting Problem.
The present work introduces and studies a real extension of the word problem
for a certain class of groups which are presented as quotient groups of a free
group and a normal subgroup. Most important, the free group will be generated
by an uncountable set of generators with index running over certain sets of
real numbers. This allows to include many mathematically important groups which
are not captured in the framework of the classical word problem.
Our contribution extends computational group theory from the discrete to the
Blum-Shub-Smale (BSS) model of real number computation. We believe this to be
an interesting step towards applying BSS theory, in addition to semi-algebraic
geometry, also to further areas of mathematics.
The main result establishes the word problem for such groups to be not only
semi-decidable (and thus reducible FROM) but also reducible TO the Halting
Problem for such machines. It thus provides the first non-trivial example of a
problem COMPLETE, that is, computationally universal for this model.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2006 23:57:46 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Apr 2006 11:38:19 GMT"
},
{
"version": "v3",
"created": "Wed, 7 Jun 2006 07:48:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ziegler",
"Martin",
""
],
[
"Meer",
"Klaus",
""
]
]
|
cs/0604035 | R N Mohan Professor | R.N.Mohan, Sanpei Kageyama, Moon Ho Lee, Gao Yang | Certain new M-matrices and their properties and applications | 21 pages,3 figures | null | null | null | cs.DM | null | The Mn-matrix was defined by Mohan [20] in which he has shown a method of
constructing (1,-1)-matrices and studied some of their properties. The
(1,-1)-matrices were constructed and studied by Cohn [5],Wang [33], Ehrlich [8]
and Ehrlich and Zeller[9]. But in this paper, while giving some resemblances of
this matrix with Hadamard matrix, and by naming it as M-matrix, we show how to
construct partially balanced incomplete block (PBIB) designs and some regular
bipartite graphs by it. We have considered two types of these M- matrices. Also
we will make a mention of certain applications of these M-matrices in signal
and communication processing, and network systems and end with some open
problems.
| [
{
"version": "v1",
"created": "Sun, 9 Apr 2006 06:02:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mohan",
"R. N.",
""
],
[
"Kageyama",
"Sanpei",
""
],
[
"Lee",
"Moon Ho",
""
],
[
"Yang",
"Gao",
""
]
]
|
cs/0604036 | Jakob Vo{\ss} | Jakob Voss | Collaborative thesaurus tagging the Wikipedia way | 7 pages, 7 figures, 7 tables; v2 with added appendix and fixed
references | null | null | null | cs.IR cs.DL | null | This paper explores the system of categories that is used to classify
articles in Wikipedia. It is compared to collaborative tagging systems like
del.icio.us and to hierarchical classification like the Dewey Decimal
Classification (DDC). Specifics and commonalitiess of these systems of subject
indexing are exposed. Analysis of structural and statistical properties
(descriptors per record, records per descriptor, descriptor levels) shows that
the category system of Wikimedia is a thesaurus that combines collaborative
tagging and hierarchical subject indexing in a special way.
| [
{
"version": "v1",
"created": "Mon, 10 Apr 2006 12:04:29 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2006 00:41:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Voss",
"Jakob",
""
]
]
|
cs/0604038 | Evgueni Petrov | E. Petrov, Yu. Kostov, E. Botoeva | UniCalc.LIN: a linear constraint solver for the UniCalc system | rejected by the programm committee of the conforence on Perspective
of System Informatics held in Novosibirsk, Russian Federation July 2006 | null | null | null | cs.MS cs.AI | null | In this short paper we present a linear constraint solver for the UniCalc
system, an environment for reliable solution of mathematical modeling problems.
| [
{
"version": "v1",
"created": "Mon, 10 Apr 2006 06:30:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Petrov",
"E.",
""
],
[
"Kostov",
"Yu.",
""
],
[
"Botoeva",
"E.",
""
]
]
|
cs/0604039 | Laurent Mazet PhD | David Bateman, Laurent Mazet, Veronique Buzenac-Settineri and Markus
Muck | A Fixed-Point Type for Octave | 5 pages, 1 figure | null | null | octave2006/12 | cs.MS | null | This paper announces the availability of a fixed point toolbox for the Matlab
compatible software package Octave. This toolbox is released under the GNU
Public License, and can be used to model the losses in algorithms implemented
in hardware. Furthermore, this paper presents as an example of the use of this
toolbox, the effects of a fixed point implementation on the precision of an
OFDM modulator.
| [
{
"version": "v1",
"created": "Mon, 10 Apr 2006 08:22:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bateman",
"David",
""
],
[
"Mazet",
"Laurent",
""
],
[
"Buzenac-Settineri",
"Veronique",
""
],
[
"Muck",
"Markus",
""
]
]
|
cs/0604042 | Florentin Smarandache | M. C. Florea, J. Dezert, P. Valin, F. Smarandache, Anne-Laure
Jousselme | Adaptative combination rule and proportional conflict redistribution
rule for information fusion | Presented at Cogis '06 Conference, Paris, March 2006 | null | null | null | cs.AI | null | This paper presents two new promising rules of combination for the fusion of
uncertain and potentially highly conflicting sources of evidences in the
framework of the theory of belief functions in order to palliate the well-know
limitations of Dempster's rule and to work beyond the limits of applicability
of the Dempster-Shafer theory. We present both a new class of adaptive
combination rules (ACR) and a new efficient Proportional Conflict
Redistribution (PCR) rule allowing to deal with highly conflicting sources for
static and dynamic fusion applications.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 14:35:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Florea",
"M. C.",
""
],
[
"Dezert",
"J.",
""
],
[
"Valin",
"P.",
""
],
[
"Smarandache",
"F.",
""
],
[
"Jousselme",
"Anne-Laure",
""
]
]
|
cs/0604043 | Thomas Way | Thomas P. Way and Lori L. Pollock | Demand-driven Inlining in a Region-based Optimizer for ILP Architectures | 23 pages | null | null | null | cs.DC cs.PL | null | Region-based compilation repartitions a program into more desirable
compilation units using profiling information and procedure inlining to enable
region formation analysis. Heuristics play a key role in determining when it is
most beneficial to inline procedures during region formation. An ILP optimizing
compiler using a region-based approach restructures a program to better reflect
dynamic behavior and increase interprocedural optimization and scheduling
opportunities. This paper presents an interprocedural compilation technique
which performs procedure inlining on-demand, rather than as a separate phase,
to improve the ability of a region-based optimizer to control code growth,
compilation time and memory usage while improving performance. The
interprocedural region formation algorithm utilizes a demand-driven,
heuristics-guided approach to inlining, restructuring an input program into
interprocedural regions. Experimental results are presented to demonstrate the
impact of the algorithm and several inlining heuristics upon a number of
traditional and novel compilation characteristics within a region-based ILP
compiler and simulator.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 04:15:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Way",
"Thomas P.",
""
],
[
"Pollock",
"Lori L.",
""
]
]
|
cs/0604045 | Sandor P. Fekete | Sandor P. Fekete and Joerg Schepers and Jan C. van der Veen | An exact algorithm for higher-dimensional orthogonal packing | 31 pages, 6 figures, 9 tables, to appear in Operations Research; full
and updated journal version of sketches that appeared as parts of an extended
abstract in ESA'97 | null | null | null | cs.DS | null | Higher-dimensional orthogonal packing problems have a wide range of practical
applications, including packing, cutting, and scheduling. Combining the use of
our data structure for characterizing feasible packings with our new classes of
lower bounds, and other heuristics, we develop a two-level tree search
algorithm for solving higher-dimensional packing problems to optimality.
Computational results are reported, including optimal solutions for all
two--dimensional test problems from recent literature.
This is the third in a series of articles describing new approaches to
higher-dimensional packing; see cs.DS/0310032 and cs.DS/0402044.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 13:55:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Schepers",
"Joerg",
""
],
[
"van der Veen",
"Jan C.",
""
]
]
|
cs/0604046 | Michael Aupetit | Dominique Lepetz, Max Nemoz-Gaillard and Michael Aupetit | Concerning the differentiability of the energy function in vector
quantization algorithms | Under submission to a peer-reviewed international journal | null | null | null | cs.LG cs.NE | null | The adaptation rule for Vector Quantization algorithms, and consequently the
convergence of the generated sequence, depends on the existence and properties
of a function called the energy function, defined on a topological manifold.
Our aim is to investigate the conditions of existence of such a function for a
class of algorithms examplified by the initial ''K-means'' and Kohonen
algorithms. The results presented here supplement previous studies and show
that the energy function is not always a potential but at least the uniform
limit of a series of potential functions which we call a pseudo-potential. Our
work also shows that a large number of existing vector quantization algorithms
developped by the Artificial Neural Networks community fall into this category.
The framework we define opens the way to study the convergence of all the
corresponding adaptation rules at once, and a theorem gives promising insights
in that direction. We also demonstrate that the ''K-means'' energy function is
a pseudo-potential but not a potential in general. Consequently, the energy
function associated to the ''Neural-Gas'' is not a potential in general.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 14:00:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lepetz",
"Dominique",
""
],
[
"Nemoz-Gaillard",
"Max",
""
],
[
"Aupetit",
"Michael",
""
]
]
|
cs/0604047 | rapha?l Jungers | Rapha\"el Jungers, Vladimir Protasov, Vincent D. Blondel | Efficient algorithms for deciding the type of growth of products of
integer matrices | 20 pages, 4 figures, submitted to LAA | null | null | null | cs.CC | null | For a given finite set $\Sigma$ of matrices with nonnegative integer entries
we study the growth of $$ \max_t(\Sigma) = \max\{\|A_{1}... A_{t}\|: A_i \in
\Sigma\}.$$ We show how to determine in polynomial time whether the growth with
$t$ is bounded, polynomial, or exponential, and we characterize precisely all
possible behaviors.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 14:10:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jungers",
"Raphaël",
""
],
[
"Protasov",
"Vladimir",
""
],
[
"Blondel",
"Vincent D.",
""
]
]
|
cs/0604048 | Vita Hinze-Hoare | Vita Hinze-Hoare | Will the Butterfly Cipher keep your Network Data secure? Developments in
Computer Encryption | null | null | null | null | cs.CR | null | This paper explains the recent developments in security and encryption. The
Butterfly cipher and quantum cryptography are reviewed and compared. Examples
of their relative uses are discussed and suggestions for future developments
considered. In addition application to network security together with a
substantial review of classification of encryption systems and a summary of
security weaknesses are considered.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 20:21:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
]
|
cs/0604051 | Michael Brinkmeier | Michael Brinkmeier | Structural Alignments of pseudo-knotted RNA-molecules in polynomial time | 16 pages | null | null | null | cs.DS cs.CC cs.DM | null | An RNA molecule is structured on several layers. The primary and most obvious
structure is its sequence of bases, i.e. a word over the alphabet {A,C,G,U}.
The higher structure is a set of one-to-one base-pairings resulting in a
two-dimensional folding of the one-dimensional sequence. One speaks of a
secondary structure if these pairings do not cross and of a tertiary structure
otherwise.
Since the folding of the molecule is important for its function, the search
for related RNA molecules should not only be restricted to the primary
structure. It seems sensible to incorporate the higher structures in the
search. Based on this assumption and certain edit-operations a distance between
two arbitrary structures can be defined. It is known that the general
calculation of this measure is NP-complete \cite{zhang02similarity}. But for
some special cases polynomial algorithms are known. Using a new formal
description of secondary and tertiary structures, we extend the class of
structures for which the distance can be calculated in polynomial time. In
addition the presented algorithm may be used to approximate the edit-distance
between two arbitrary structures with a constant ratio.
| [
{
"version": "v1",
"created": "Wed, 12 Apr 2006 06:46:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brinkmeier",
"Michael",
""
]
]
|
cs/0604053 | Maciej Kurant | Maciej Kurant, Patrick Thiran | Survivable Routing in IP-over-WDM Networks in the Presence of Multiple
Failures | 8 pages, 6 figures | null | null | null | cs.NI | null | Failure restoration at the IP layer in IP-over-WDM networks requires to map
the IP topology on the WDM topology in such a way that a failure at the WDM
layer leaves the IP topology connected. Such a mapping is called $survivable$.
As finding a survivable mapping is known to be NP-complete, in practice it
requires a heuristic approach. We have introduced in [1] a novel algorithm
called ``SMART'', that is more effective and scalable than the heuristics known
to date. Moreover, the formal analysis of SMART [2] has led to new
applications: the formal verification of the existence of a survivable mapping,
and a tool tracing and repairing the vulnerable areas of the network. In this
paper we extend the theoretical analysis in [2] by considering $multiple
failures$.
| [
{
"version": "v1",
"created": "Wed, 12 Apr 2006 17:10:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kurant",
"Maciej",
""
],
[
"Thiran",
"Patrick",
""
]
]
|
cs/0604058 | Yury Lifshits | Yury Lifshits | Solving Classical String Problems on Compressed Texts | 10 pages, 6 figures, submitted | null | null | null | cs.DS cs.CC | null | Here we study the complexity of string problems as a function of the size of
a program that generates input. We consider straight-line programs (SLP), since
all algorithms on SLP-generated strings could be applied to processing
LZ-compressed texts.
The main result is a new algorithm for pattern matching when both a text T
and a pattern P are presented by SLPs (so-called fully compressed pattern
matching problem). We show how to find a first occurrence, count all
occurrences, check whether any given position is an occurrence or not in time
O(n^2m). Here m,n are the sizes of straight-line programs generating
correspondingly P and T.
Then we present polynomial algorithms for computing fingerprint table and
compressed representation of all covers (for the first time) and for finding
periods of a given compressed string (our algorithm is faster than previously
known). On the other hand, we show that computing the Hamming distance between
two SLP-generated strings is NP- and coNP-hard.
| [
{
"version": "v1",
"created": "Thu, 13 Apr 2006 08:12:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lifshits",
"Yury",
""
]
]
|
cs/0604059 | Olivier Devillers | Olivier Devillers (INRIA Sophia Antipolis), Philippe Guigue (INRIA
Sophia Antipolis) | Inner and Outer Rounding of Boolean Operations on Lattice Polygonal
Regions | null | null | null | null | cs.CG | null | Robustness problems due to the substitution of the exact computation on real
numbers by the rounded floating point arithmetic are often an obstacle to
obtain practical implementation of geometric algorithms. If the adoption of the
--exact computation paradigm--[Yap et Dube] gives a satisfactory solution to
this kind of problems for purely combinatorial algorithms, this solution does
not allow to solve in practice the case of algorithms that cascade the
construction of new geometric objects. In this report, we consider the problem
of rounding the intersection of two polygonal regions onto the integer lattice
with inclusion properties. Namely, given two polygonal regions A and B having
their vertices on the integer lattice, the inner and outer rounding modes
construct two polygonal regions with integer vertices which respectively is
included and contains the true intersection. We also prove interesting results
on the Hausdorff distance, the size and the convexity of these polygonal
regions.
| [
{
"version": "v1",
"created": "Thu, 13 Apr 2006 14:33:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
"",
"INRIA Sophia Antipolis"
],
[
"Guigue",
"Philippe",
"",
"INRIA\n Sophia Antipolis"
]
]
|
cs/0604061 | Edwin Henneken | Edwin A. Henneken, Michael J. Kurtz, Guenther Eichhorn, Alberto
Accomazzi, Carolyn Grant, Donna Thompson, Stephen S. Murray | Effect of E-printing on Citation Rates in Astronomy and Physics | Submitted to the Journal of Electronic Publishing. 11 pages with 5
figures | null | null | null | cs.DL astro-ph | null | In this report we examine the change in citation behavior since the
introduction of the arXiv e-print repository (Ginsparg, 2001). It has been
observed that papers that initially appear as arXiv e-prints get cited more
than papers that do not (Lawrence, 2001; Brody et al., 2004; Schwarz &
Kennicutt, 2004; Kurtz et al., 2005a, Metcalfe, 2005). Using the citation
statistics from the NASA-Smithsonian Astrophysics Data System (ADS; Kurtz et
al., 1993, 2000), we confirm the findings from other studies, we examine the
average citation rate to e-printed papers in the Astrophysical Journal, and we
show that for a number of major astronomy and physics journals the most
important papers are submitted to the arXiv e-print repository first.
| [
{
"version": "v1",
"created": "Thu, 13 Apr 2006 22:02:05 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jun 2006 11:47:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Henneken",
"Edwin A.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn",
""
],
[
"Thompson",
"Donna",
""
],
[
"Murray",
"Stephen S.",
""
]
]
|
cs/0604062 | Liang Wu | Liang Wu | Biologically Inspired Hierarchical Model for Feature Extraction and
Localization | 4 pages, 4 figures | null | null | null | cs.CV | null | Feature extraction and matching are among central problems of computer
vision. It is inefficent to search features over all locations and scales.
Neurophysiological evidence shows that to locate objects in a digital image the
human visual system employs visual attention to a specific object while
ignoring others. The brain also has a mechanism to search from coarse to fine.
In this paper, we present a feature extractor and an associated hierarchical
searching model to simulate such processes. With the hierarchical
representation of the object, coarse scanning is done through the matching of
the larger scale and precise localization is conducted through the matching of
the smaller scale. Experimental results justify the proposed model in its
effectiveness and efficiency to localize features.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2006 04:40:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wu",
"Liang",
""
]
]
|
cs/0604064 | Mirco Mannucci Ph.D. | Mirco A. Mannucci | Quantum Fuzzy Sets: Blending Fuzzy Set Theory and Quantum Computation | 12 pages | null | null | null | cs.LO cs.AI | null | In this article we investigate a way in which quantum computing can be used
to extend the class of fuzzy sets. The core idea is to see states of a quantum
register as characteristic functions of quantum fuzzy subsets of a given set.
As the real unit interval is embedded in the Bloch sphere, every fuzzy set is
automatically a quantum fuzzy set. However, a generic quantum fuzzy set can be
seen as a (possibly entangled) superposition of many fuzzy sets at once,
offering new opportunities for modeling uncertainty. After introducing the main
framework of quantum fuzzy set theory, we analyze the standard operations of
fuzzification and defuzzification from our viewpoint. We conclude this
preliminary paper with a list of possible applications of quantum fuzzy sets to
pattern recognition, as well as future directions of pure research in quantum
fuzzy set theory.
| [
{
"version": "v1",
"created": "Sun, 16 Apr 2006 16:23:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mannucci",
"Mirco A.",
""
]
]
|
cs/0604066 | Elias Tsigaridas | Elias P. Tsigaridas and Ioannis Z. Emiris | Univariate polynomial real root isolation: Continued Fractions revisited | 12 pages | null | null | null | cs.SC cs.CC cs.MS | null | We present algorithmic, complexity and implementation results concerning real
root isolation of integer univariate polynomials using the continued fraction
expansion of real algebraic numbers. One motivation is to explain the method's
good performance in practice. We improve the previously known bound by a factor
of $d \tau$, where $d$ is the polynomial degree and $\tau$ bounds the
coefficient bitsize, thus matching the current record complexity for real root
isolation by exact methods. Namely, the complexity bound is $\sOB(d^4 \tau^2)$
using the standard bound on the expected bitsize of the integers in the
continued fraction expansion. We show how to compute the multiplicities within
the same complexity and extend the algorithm to non square-free polynomials.
Finally, we present an efficient open-source \texttt{C++} implementation in the
algebraic library \synaps, and illustrate its efficiency as compared to other
available software. We use polynomials with coefficient bitsize up to 8000 and
degree up to 1000.
| [
{
"version": "v1",
"created": "Mon, 17 Apr 2006 10:52:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tsigaridas",
"Elias P.",
""
],
[
"Emiris",
"Ioannis Z.",
""
]
]
|
cs/0604067 | R.N.Mohan Professor | R.N.Mohan, Moon Ho Lee, Subhash Pokrel | Certain t-partite graphs | null | null | null | null | cs.DM | null | By making use of the generalized concept of orthogonality in Latin squares,
certain t-partite graphs have been constructed and a suggestion for a net work
system and some applications have been made.
| [
{
"version": "v1",
"created": "Tue, 18 Apr 2006 09:30:55 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2006 00:11:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mohan",
"R. N.",
""
],
[
"Lee",
"Moon Ho",
""
],
[
"Pokrel",
"Subhash",
""
]
]
|
cs/0604068 | Christian Klein | Benjamin Doerr and Tobias Friedrich and Christian Klein and Ralf
Osbild | Unbiased Matrix Rounding | 10th Scandinavian Workshop on Algorithm Theory (SWAT), 2006, to
appear | null | null | null | cs.DS cs.DM | null | We show several ways to round a real matrix to an integer one such that the
rounding errors in all rows and columns as well as the whole matrix are less
than one. This is a classical problem with applications in many fields, in
particular, statistics.
We improve earlier solutions of different authors in two ways. For rounding
matrices of size $m \times n$, we reduce the runtime from $O((m n)^2 Second,
our roundings also have a rounding error of less than one in all initial
intervals of rows and columns. Consequently, arbitrary intervals have an error
of at most two. This is particularly useful in the statistics application of
controlled rounding.
The same result can be obtained via (dependent) randomized rounding. This has
the additional advantage that the rounding is unbiased, that is, for all
entries $y_{ij}$ of our rounding, we have $E(y_{ij}) = x_{ij}$, where $x_{ij}$
is the corresponding entry of the input matrix.
| [
{
"version": "v1",
"created": "Tue, 18 Apr 2006 15:08:37 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Apr 2006 18:25:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Doerr",
"Benjamin",
""
],
[
"Friedrich",
"Tobias",
""
],
[
"Klein",
"Christian",
""
],
[
"Osbild",
"Ralf",
""
]
]
|
cs/0604071 | Nuno Santos | Nuno Santos, Birger Koblitz | Distributed Metadata with the AMGA Metadata Catalog | 6 pages, 3 figures, to appear in Workshop on Next-Generation
Distributed Data Management - HPDC-15 | null | null | null | cs.DC cs.DB | null | Catalog Services play a vital role on Data Grids by allowing users and
applications to discover and locate the data needed. On large Data Grids, with
hundreds of geographically distributed sites, centralized Catalog Services do
not provide the required scalability, performance or fault-tolerance. In this
article, we start by presenting and discussing the general requirements on Grid
Catalogs of applications being developed by the EGEE user community. This
provides the motivation for the second part of the article, where we present
the replication and distribution mechanisms we have designed and implemented
into the AMGA Metadata Catalog, which is part of the gLite software stack being
developed for the EGEE project. Implementing these mechanisms in the catalog
itself has the advantages of not requiring any special support from the
relational database back-end, of being database independent, and of allowing
tailoring the mechanisms to the specific requirements and characteristics of
Metadata Catalogs.
| [
{
"version": "v1",
"created": "Wed, 19 Apr 2006 10:01:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Santos",
"Nuno",
""
],
[
"Koblitz",
"Birger",
""
]
]
|
cs/0604073 | Muthiah Annamalai | Muthiah Annamalai, Hemant Kumar, Leela Velusamy | Octave-GTK: A GTK binding for GNU Octave | Comments: Presented at Octave2006 Conference, Washington D.C | null | null | Octave2006/02 | cs.SE | null | This paper discusses the problems faced with interoperability between two
programming languages, with respect to GNU Octave, and GTK API written in C, to
provide the GTK API on Octave.Octave-GTK is the fusion of two different API's:
one exported by GNU Octave [scientific computing tool] and the other GTK [GUI
toolkit]; this enables one to use GTK primitives within GNU Octave, to build
graphical front ends,at the same time using octave engine for number crunching
power. This paper illustrates our implementation of binding logic, and shows
results extended to various other libraries using the same base code generator.
Also shown, are methods of code generation, binding automation, and the niche
we plan to fill in the absence of GUI in Octave. Canonical discussion of
advantages, feasibility and problems faced in the process are elucidated.
| [
{
"version": "v1",
"created": "Wed, 19 Apr 2006 16:46:23 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2006 18:43:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Annamalai",
"Muthiah",
""
],
[
"Kumar",
"Hemant",
""
],
[
"Velusamy",
"Leela",
""
]
]
|
cs/0604075 | Gyorgy Korniss | Qiming Lu, G. Korniss, and Boleslaw K. Szymanski | Naming Games in Spatially-Embedded Random Networks | We have found a programming error in our code used to generate the
results of the earlier version. We have corrected the error, reran all
simulations, and regenerated all data plots. While the qualitative behavior
of the model has not changed, the numerical values of some of the scaling
exponents did. 7 figures | Proceedings of the 2006 American Association for Artificial
Intelligence Fall Symposium Series, Interaction and Emergent Phenomena in
Societies of Agents (AAAI Press, Menlo Park, CA 2006) pp. 148-155 | null | null | cs.MA cond-mat.stat-mech cs.AI | null | We investigate a prototypical agent-based model, the Naming Game, on random
geometric networks. The Naming Game is a minimal model, employing local
communications that captures the emergence of shared communication schemes
(languages) in a population of autonomous semiotic agents. Implementing the
Naming Games on random geometric graphs, local communications being local
broadcasts, serves as a model for agreement dynamics in large-scale,
autonomously operating wireless sensor networks. Further, it captures essential
features of the scaling properties of the agreement process for
spatially-embedded autonomous agents. We also present results for the case when
a small density of long-range communication links are added on top of the
random geometric graph, resulting in a "small-world"-like network and yielding
a significantly reduced time to reach global agreement.
| [
{
"version": "v1",
"created": "Wed, 19 Apr 2006 17:48:11 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 21:35:33 GMT"
},
{
"version": "v3",
"created": "Mon, 7 May 2007 21:10:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lu",
"Qiming",
""
],
[
"Korniss",
"G.",
""
],
[
"Szymanski",
"Boleslaw K.",
""
]
]
|
cs/0604076 | Loreto Bravo | Loreto Bravo and Leopoldo Bertossi | Semantically Correct Query Answers in the Presence of Null Values | 20 pages. To appear in Proc. of International Workshop on
Inconsistency and Incompleteness in Databases (IIDB 2006) | null | null | null | cs.DB | null | For several reasons a database may not satisfy a given set of integrity
constraints(ICs), but most likely most of the information in it is still
consistent with those ICs; and could be retrieved when queries are answered.
Consistent answers to queries wrt a set of ICs have been characterized as
answers that can be obtained from every possible minimally repaired consistent
version of the original database. In this paper we consider databases that
contain null values and are also repaired, if necessary, using null values. For
this purpose, we propose first a precise semantics for IC satisfaction in a
database with null values that is compatible with the way null values are
treated in commercial database management systems. Next, a precise notion of
repair is introduced that privileges the introduction of null values when
repairing foreign key constraints, in such a way that these new values do not
create an infinite cycle of new inconsistencies. Finally, we analyze how to
specify this kind of repairs of a database that contains null values using
disjunctive logic programs with stable model semantics.
| [
{
"version": "v1",
"created": "Wed, 19 Apr 2006 22:33:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bravo",
"Loreto",
""
],
[
"Bertossi",
"Leopoldo",
""
]
]
|
cs/0604078 | Maria Chli | Maria Chli, Philippe De Wilde | The emergence of knowledge exchange: an agent-based model of a software
market | fixed legend problem | null | null | null | cs.MA cs.CE | null | We investigate knowledge exchange among commercial organisations, the
rationale behind it and its effects on the market. Knowledge exchange is known
to be beneficial for industry, but in order to explain it, authors have used
high level concepts like network effects, reputation and trust. We attempt to
formalise a plausible and elegant explanation of how and why companies adopt
information exchange and why it benefits the market as a whole when this
happens. This explanation is based on a multi-agent model that simulates a
market of software providers. Even though the model does not include any
high-level concepts, information exchange naturally emerges during simulations
as a successful profitable behaviour. The conclusions reached by this
agent-based analysis are twofold: (1) A straightforward set of assumptions is
enough to give rise to exchange in a software market. (2) Knowledge exchange is
shown to increase the efficiency of the market.
| [
{
"version": "v1",
"created": "Thu, 20 Apr 2006 11:20:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chli",
"Maria",
""
],
[
"De Wilde",
"Philippe",
""
]
]
|
cs/0604084 | Michael Singer | Ziming Li, Michael F. Singer, Min Wu, Dabin Zheng | A Recursive Method for Determining the One-Dimensional Submodules of
Laurent-Ore Modules | To appear in the Proceedings of ISSAC 2006 | null | null | null | cs.SC math.CA | null | We present a method for determining the one-dimensional submodules of a
Laurent-Ore module. The method is based on a correspondence between
hyperexponential solutions of associated systems and one-dimensional
submodules. The hyperexponential solutions are computed recursively by solving
a sequence of first-order ordinary matrix equations. As the recursion proceeds,
the matrix equations will have constant coefficients with respect to the
operators that have been considered.
| [
{
"version": "v1",
"created": "Fri, 21 Apr 2006 16:04:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Ziming",
""
],
[
"Singer",
"Michael F.",
""
],
[
"Wu",
"Min",
""
],
[
"Zheng",
"Dabin",
""
]
]
|
cs/0604086 | Michael Fink | Thomas Eiter, Michael Fink, and Hans Tompits | A Knowledge-Based Approach for Selecting Information Sources | 53 pages, 2 Figures; to appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.AI | null | Through the Internet and the World-Wide Web, a vast number of information
sources has become available, which offer information on various subjects by
different providers, often in heterogeneous formats. This calls for tools and
methods for building an advanced information-processing infrastructure. One
issue in this area is the selection of suitable information sources in query
answering. In this paper, we present a knowledge-based approach to this
problem, in the setting where one among a set of information sources
(prototypically, data repositories) should be selected for evaluating a user
query. We use extended logic programs (ELPs) to represent rich descriptions of
the information sources, an underlying domain theory, and user queries in a
formal query language (here, XML-QL, but other languages can be handled as
well). Moreover, we use ELPs for declarative query analysis and generation of a
query description. Central to our approach are declarative source-selection
programs, for which we define syntax and semantics. Due to the structured
nature of the considered data items, the semantics of such programs must
carefully respect implicit context information in source-selection rules, and
furthermore combine it with possible user preferences. A prototype
implementation of our approach has been realized exploiting the DLV KR system
and its plp front-end for prioritized ELPs. We describe a representative
example involving specific movie databases, and report about experimental
results.
| [
{
"version": "v1",
"created": "Fri, 21 Apr 2006 16:53:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eiter",
"Thomas",
""
],
[
"Fink",
"Michael",
""
],
[
"Tompits",
"Hans",
""
]
]
|
cs/0604087 | Yongzhi Cao | Yongzhi Cao, Lirong Xia and Mingsheng Ying | Probabilistic Automata for Computing with Words | 35 pages; 3 figures | null | null | null | cs.AI cs.CL | null | Usually, probabilistic automata and probabilistic grammars have crisp symbols
as inputs, which can be viewed as the formal models of computing with values.
In this paper, we first introduce probabilistic automata and probabilistic
grammars for computing with (some special) words in a probabilistic framework,
where the words are interpreted as probabilistic distributions or possibility
distributions over a set of crisp symbols. By probabilistic conditioning, we
then establish a retraction principle from computing with words to computing
with values for handling crisp inputs and a generalized extension principle
from computing with words to computing with all words for handling arbitrary
inputs. These principles show that computing with values and computing with all
words can be respectively implemented by computing with some special words. To
compare the transition probabilities of two near inputs, we also examine some
analytical properties of the transition probability functions of generalized
extensions. Moreover, the retractions and the generalized extensions are shown
to be equivalence-preserving. Finally, we clarify some relationships among the
retractions, the generalized extensions, and the extensions studied recently by
Qiu and Wang.
| [
{
"version": "v1",
"created": "Sun, 23 Apr 2006 02:58:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cao",
"Yongzhi",
""
],
[
"Xia",
"Lirong",
""
],
[
"Ying",
"Mingsheng",
""
]
]
|
cs/0604089 | Michele Tucci | Michele Tucci | Evolutionary Socioeconomics: a Schumpeterian Computer Simulation | PDF, 15 pages, 5 graphs | null | null | null | cs.GT cs.CY | null | The following note contains a computer simulation concerning the struggle
between two companies: the first one is "the biggest zaibatsu of all", while
the second one is "small, fast, ruthless". The model is based on a
neo-Schumpeterian framework operating in a Darwinian evolutionary environment.
After running the program a large number of times, two characteristics stand
out: -- There is always a winner which takes it all, while the loser
disappears. -- The key to success is the ability to employ efficiently the
technological innovations. The topic of the present paper is strictly related
with the content of the following notes: Michele Tucci, Evolution and
Gravitation: a Computer Simulation of a Non-Walrasian Equilibrium Model;
Michele Tucci, Oligopolistic Competition in an Evolutionary Environment: a
Computer Simulation. The texts can be downloaded respectively at the following
addresses: http://arxiv.org/abs/cs.CY/0209017
http://arxiv.org/abs/cs.CY/0501037 These references include some preliminary
considerations regarding the comparison between the evolutionary and the
gravitational paradigms and the evaluation of approaches belonging to rival
schools of economic thought.
| [
{
"version": "v1",
"created": "Sun, 23 Apr 2006 13:29:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tucci",
"Michele",
""
]
]
|
cs/0604090 | Mirco Mannucci Ph.D. | Mirco A. Mannucci, Lisa Sparks, Daniele C. Struppa | Simplicial models of social aggregation I | 31 pages | null | null | null | cs.CE | null | This paper presents the foundational ideas for a new way of modeling social
aggregation. Traditional approaches have been using network theory, and the
theory of random networks. Under that paradigm, every social agent is
represented by a node, and every social interaction is represented by a segment
connecting two nodes. Early work in family interactions, as well as more recent
work in the study of terrorist organizations, shows that network modeling may
be insufficient to describe the complexity of human social structures.
Specifically, network theory does not seem to have enough flexibility to
represent higher order aggregations, where several agents interact as a group,
rather than as a collection of pairs. The model we present here uses a well
established mathematical theory, the theory of simplicial complexes, to address
this complex issue prevalent in interpersonal and intergroup communication. The
theory enables us to provide a richer graphical representation of social
interactions, and to determine quantitative mechanisms to describe the
robustness of a social structure. We also propose a methodology to create
random simplicial complexes, with the purpose of providing a new method to
simulate computationally the creation and disgregation of social structures.
Finally, we propose several measures which could be taken and observed in order
to describe and study an actual social aggregation occurring in interpersonal
and intergroup contexts.
| [
{
"version": "v1",
"created": "Sun, 23 Apr 2006 19:28:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mannucci",
"Mirco A.",
""
],
[
"Sparks",
"Lisa",
""
],
[
"Struppa",
"Daniele C.",
""
]
]
|
cs/0604095 | Gregory Gutin | Gregory Gutin, Stefan Szeider, Anders Yeo | Fixed-Parameter Complexity of Minimum Profile Problems | null | null | null | null | cs.DS cs.DM | null | Let $G=(V,E)$ be a graph. An ordering of $G$ is a bijection $\alpha: V\dom
\{1,2,..., |V|\}.$ For a vertex $v$ in $G$, its closed neighborhood is
$N[v]=\{u\in V: uv\in E\}\cup \{v\}.$ The profile of an ordering $\alpha$ of
$G$ is $\prf_{\alpha}(G)=\sum_{v\in V}(\alpha(v)-\min\{\alpha(u): u\in
N[v]\}).$ The profile $\prf(G)$ of $G$ is the minimum of $\prf_{\alpha}(G)$
over all orderings $\alpha$ of $G$. It is well-known that $\prf(G)$ is the
minimum number of edges in an interval graph $H$ that contains $G$ is a
subgraph. Since $|V|-1$ is a tight lower bound for the profile of connected
graphs $G=(V,E)$, the parametrization above the guaranteed value $|V|-1$ is of
particular interest. We show that deciding whether the profile of a connected
graph $G=(V,E)$ is at most $|V|-1+k$ is fixed-parameter tractable with respect
to the parameter $k$. We achieve this result by reduction to a problem kernel
of linear size.
| [
{
"version": "v1",
"created": "Mon, 24 Apr 2006 17:30:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gutin",
"Gregory",
""
],
[
"Szeider",
"Stefan",
""
],
[
"Yeo",
"Anders",
""
]
]
|
cs/0604096 | Tracey Ho | Tracey Ho | Polynomial-time algorithms for coding across multiple unicasts | null | null | null | null | cs.NI | null | We consider the problem of network coding across multiple unicasts. We give,
for wired and wireless networks, efficient polynomial time algorithms for
finding optimal network codes within the class of network codes restricted to
XOR coding between pairs of flows.
| [
{
"version": "v1",
"created": "Tue, 25 Apr 2006 02:55:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ho",
"Tracey",
""
]
]
|
cs/0604100 | Abhishek Parakh | Abhishek Parakh | Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric
Oblivious Key Exchange | 7 pages, with minor typographical corrections. | null | null | null | cs.CR | null | This paper presents protocols for Kak's cubic transformation and proposes a
modification to Diffie-Hellman key exchange protocol in order to achieve
asymmetric oblivious exchange of keys.
| [
{
"version": "v1",
"created": "Tue, 25 Apr 2006 17:39:37 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Apr 2007 17:49:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Parakh",
"Abhishek",
""
]
]
|
cs/0604102 | Vita Hinze-Hoare | Vita Hinze-Hoare | HCI and Educational Metrics as Tools for VLE Evaluation | null | null | null | null | cs.HC cs.LG | null | The general set of HCI and Educational principles are considered and a
classification system constructed. A frequency analysis of principles is used
to obtain the most significant set. Metrics are devised to provide objective
measures of these principles and a consistent testing regime devised. These
principles are used to analyse Blackboard and Moodle.
| [
{
"version": "v1",
"created": "Tue, 25 Apr 2006 19:32:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
]
|
cs/0604103 | Vita Hinze-Hoare | Vita Hinze-Hoare | Further Evaluationh of VLEs using HCI and Educational Metrics | null | null | null | null | cs.HC | null | Under consideration are the general set of Human computer Interaction (HCI)
and Educational principles from prominent authors in the field and the
construction of a system for evaluating Virtual Learning Environments (VLEs)
with respect to the application of these HCI and Educational Principles. A
frequency analysis of principles is used to obtain the most significant set.
Metrics are devised to provide objective measures of these principles and a
consistent testing regime is introduced. These principles are used to analyse
the University VLE Blackboard. An open source VLE is also constructed with
similar content to Blackboard courses so that a systematic comparison can be
made. HCI and Educational metrics are determined for each VLE.
| [
{
"version": "v1",
"created": "Tue, 25 Apr 2006 19:53:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
]
|
cs/0604105 | Farid Benbadis | Farid Benbadis, Jean-Jacques Puig, Marcelo Dias de Amorim, Claude
Chaudet, Timur Friedman, David Simplot-Ryl | Jumps: Enhancing hop-count positioning in sensor networks using multiple
coordinates | null | null | null | null | cs.NI | null | Positioning systems in self-organizing networks generally rely on
measurements such as delay and received signal strength, which may be difficult
to obtain and often require dedicated equipment. An alternative to such
approaches is to use simple connectivity information, that is, the presence or
absence of a link between any pair of nodes, and to extend it to hop-counts, in
order to obtain an approximate coordinate system. Such an approximation is
sufficient for a large number of applications, such as routing. In this paper,
we propose Jumps, a positioning system for those self-organizing networks in
which other types of (exact) positioning systems cannot be used or are deemed
to be too costly. Jumps builds a multiple coordinate system based solely on
nodes neighborhood knowledge. Jumps is interesting in the context of wireless
sensor networks, as it neither requires additional embedded equipment nor
relies on any nodes capabilities. While other approaches use only three
hop-count measurements to infer the position of a node, Jumps uses an arbitrary
number. We observe that an increase in the number of measurements leads to an
improvement in the localization process, without requiring a high dense
environment. We show through simulations that Jumps, when compared with
existing approaches, reduces the number of nodes sharing the same coordinates,
which paves the way for functions such as position-based routing.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2006 11:39:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Benbadis",
"Farid",
""
],
[
"Puig",
"Jean-Jacques",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Chaudet",
"Claude",
""
],
[
"Friedman",
"Timur",
""
],
[
"Simplot-Ryl",
"David",
""
]
]
|
cs/0604108 | Francesc Rossell\'o | Francesc Rossello, Gabriel Valiente | An Algebraic View of the Relation between Largest Common Subtrees and
Smallest Common Supertrees | 32 pages | null | null | null | cs.DS cs.DM math.CT | null | The relationship between two important problems in tree pattern matching, the
largest common subtree and the smallest common supertree problems, is
established by means of simple constructions, which allow one to obtain a
largest common subtree of two trees from a smallest common supertree of them,
and vice versa. These constructions are the same for isomorphic, homeomorphic,
topological, and minor embeddings, they take only time linear in the size of
the trees, and they turn out to have a clear algebraic meaning.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2006 10:32:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rossello",
"Francesc",
""
],
[
"Valiente",
"Gabriel",
""
]
]
|
cs/0604111 | Kristina Lerman | Kristina Lerman, Chris Jones, Aram Galstyan and Maja J Mataric | Analysis of Dynamic Task Allocation in Multi-Robot Systems | Preprint version of the paper published in International Journal of
Robotics, March 2006, Volume 25, pp. 225-242 | null | null | null | cs.RO cs.MA | null | Dynamic task allocation is an essential requirement for multi-robot systems
operating in unknown dynamic environments. It allows robots to change their
behavior in response to environmental changes or actions of other robots in
order to improve overall system performance. Emergent coordination algorithms
for task allocation that use only local sensing and no direct communication
between robots are attractive because they are robust and scalable. However, a
lack of formal analysis tools makes emergent coordination algorithms difficult
to design. In this paper we present a mathematical model of a general dynamic
task allocation mechanism. Robots using this mechanism have to choose between
two types of task, and the goal is to achieve a desired task division in the
absence of explicit communication and global knowledge. Robots estimate the
state of the environment from repeated local observations and decide which task
to choose based on these observations. We model the robots and observations as
stochastic processes and study the dynamics of the collective behavior.
Specifically, we analyze the effect that the number of observations and the
choice of the decision function have on the performance of the system. The
mathematical models are validated in a multi-robot multi-foraging scenario. The
model's predictions agree very closely with experimental results from
sensor-based simulations.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2006 23:56:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lerman",
"Kristina",
""
],
[
"Jones",
"Chris",
""
],
[
"Galstyan",
"Aram",
""
],
[
"Mataric",
"Maja J",
""
]
]
|
cs/0604113 | Andrea Sportiello | Sergio Caracciolo, Davide Fichera, Andrea Sportiello | One-in-Two-Matching Problem is NP-complete | 30 pages | null | null | null | cs.CC | null | 2-dimensional Matching Problem, which requires to find a matching of left- to
right-vertices in a balanced $2n$-vertex bipartite graph, is a well-known
polynomial problem, while various variants, like the 3-dimensional analogoue
(3DM, with triangles on a tripartite graph), or the Hamiltonian Circuit Problem
(HC, a restriction to ``unicyclic'' matchings) are among the main examples of
NP-hard problems, since the first Karp reduction series of 1972. The same holds
for the weighted variants of these problems, the Linear Assignment Problem
being polynomial, and the Numerical 3-Dimensional Matching and Travelling
Salesman Problem being NP-complete.
In this paper we show that a small modification of the 2-dimensional Matching
and Assignment Problems in which for each $i \leq n/2$ it is required that
either $\pi(2i-1)=2i-1$ or $\pi(2i)=2i$, is a NP-complete problem. The proof is
by linear reduction from SAT (or NAE-SAT), with the size $n$ of the Matching
Problem being four times the number of edges in the factor graph representation
of the boolean problem. As a corollary, in combination with the simple linear
reduction of One-in-Two Matching to 3-Dimensional Matching, we show that SAT
can be linearly reduced to 3DM, while the original Karp reduction was only
cubic.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2006 16:40:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Caracciolo",
"Sergio",
""
],
[
"Fichera",
"Davide",
""
],
[
"Sportiello",
"Andrea",
""
]
]
|
cs/0605003 | Amitabh Saxena | Amitabh Saxena and Ben Soh | A New Cryptosystem Based On Hidden Order Groups | removed examples for multiparty key agreement and join protocols,
since they are redundant | null | null | null | cs.CR cs.CC | null | Let $G_1$ be a cyclic multiplicative group of order $n$. It is known that the
Diffie-Hellman problem is random self-reducible in $G_1$ with respect to a
fixed generator $g$ if $\phi(n)$ is known. That is, given $g, g^x\in G_1$ and
having oracle access to a `Diffie-Hellman Problem' solver with fixed generator
$g$, it is possible to compute $g^{1/x} \in G_1$ in polynomial time (see
theorem 3.2). On the other hand, it is not known if such a reduction exists
when $\phi(n)$ is unknown (see conjuncture 3.1). We exploit this ``gap'' to
construct a cryptosystem based on hidden order groups and present a practical
implementation of a novel cryptographic primitive called an \emph{Oracle Strong
Associative One-Way Function} (O-SAOWF). O-SAOWFs have applications in
multiparty protocols. We demonstrate this by presenting a key agreement
protocol for dynamic ad-hoc groups.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2006 18:13:10 GMT"
},
{
"version": "v2",
"created": "Tue, 2 May 2006 16:59:08 GMT"
},
{
"version": "v3",
"created": "Wed, 3 May 2006 17:55:02 GMT"
},
{
"version": "v4",
"created": "Wed, 3 May 2006 21:23:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Saxena",
"Amitabh",
""
],
[
"Soh",
"Ben",
""
]
]
|
cs/0605004 | Himanshu Thapliyal | Himanshu Thapliyal and M.B Srinivas | Novel Reversible Multiplier Architecture Using Reversible TSG Gate | 4 Pages; Published in Proceedings of the 4th ACS/IEEE International
Conference on Computer Systems and Applications (AICCSA-06), Dubai, March
2006. pp. 100-103. Contains the missing reference | null | null | null | cs.AR | null | In the recent years, reversible logic has emerged as a promising technology
having its applications in low power CMOS, quantum computing, nanotechnology,
and optical computing. The classical set of gates such as AND, OR, and EXOR are
not reversible. Recently a 4 * 4 reversible gate called TSG is proposed. The
most significant aspect of the proposed gate is that it can work singly as a
reversible full adder, that is reversible full adder can now be implemented
with a single gate only. This paper proposes a NXN reversible multiplier using
TSG gate. It is based on two concepts. The partial products can be generated in
parallel with a delay of d using Fredkin gates and thereafter the addition can
be reduced to log2N steps by using reversible parallel adder designed from TSG
gates. Similar multiplier architecture in conventional arithmetic (using
conventional logic) has been reported in existing literature, but the proposed
one in this paper is totally based on reversible logic and reversible cells as
its building block. A 4x4 architecture of the proposed reversible multiplier is
also designed. It is demonstrated that the proposed multiplier architecture
using the TSG gate is much better and optimized, compared to its existing
counterparts in literature; in terms of number of reversible gates and garbage
outputs. Thus, this paper provides the initial threshold to building of more
complex system which can execute more complicated operations using reversible
logic.
| [
{
"version": "v1",
"created": "Mon, 1 May 2006 09:34:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B",
""
]
]
|
cs/0605008 | Arnaud Durand | Arnaud Durand (ELM), Etienne Grandjean (GREYC) | The complexity of acyclic conjunctive queries revisited | 30 pages | null | null | null | cs.LO | null | In this paper, we consider first-order logic over unary functions and study
the complexity of the evaluation problem for conjunctive queries described by
such kind of formulas. A natural notion of query acyclicity for this language
is introduced and we study the complexity of a large number of variants or
generalizations of acyclic query problems in that context (Boolean or not
Boolean, with or without inequalities, comparisons, etc...). Our main results
show that all those problems are \textit{fixed-parameter linear} i.e. they can
be evaluated in time $f(|Q|).|\textbf{db}|.|Q(\textbf{db})|$ where $|Q|$ is the
size of the query $Q$, $|\textbf{db}|$ the database size, $|Q(\textbf{db})|$ is
the size of the output and $f$ is some function whose value depends on the
specific variant of the query problem (in some cases, $f$ is the identity
function). Our results have two kinds of consequences. First, they can be
easily translated in the relational (i.e., classical) setting. Previously known
bounds for some query problems are improved and new tractable cases are then
exhibited. Among others, as an immediate corollary, we improve a result of
\~\cite{PapadimitriouY-99} by showing that any (relational) acyclic conjunctive
query with inequalities can be evaluated in time
$f(|Q|).|\textbf{db}|.|Q(\textbf{db})|$. A second consequence of our method is
that it provides a very natural descriptive approach to the complexity of
well-known algorithmic problems. A number of examples (such as acyclic subgraph
problems, multidimensional matching, etc...) are considered for which new
insights of their complexity are given.
| [
{
"version": "v1",
"created": "Tue, 2 May 2006 09:31:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Durand",
"Arnaud",
"",
"ELM"
],
[
"Grandjean",
"Etienne",
"",
"GREYC"
]
]
|
cs/0605015 | Ciro Cattuto | Ciro Cattuto, Vittorio Loreto, Luciano Pietronero | Collaborative Tagging and Semiotic Dynamics | 8 pages, 7 figures | PNAS 104, 1461 (2007) | 10.1073/pnas.0610487104 | null | cs.CY cs.DL physics.data-an physics.soc-ph | null | Collaborative tagging has been quickly gaining ground because of its ability
to recruit the activity of web users into effectively organizing and sharing
vast amounts of information. Here we collect data from a popular system and
investigate the statistical properties of tag co-occurrence. We introduce a
stochastic model of user behavior embodying two main aspects of collaborative
tagging: (i) a frequency-bias mechanism related to the idea that users are
exposed to each other's tagging activity; (ii) a notion of memory - or aging of
resources - in the form of a heavy-tailed access to the past state of the
system. Remarkably, our simple modeling is able to account quantitatively for
the observed experimental features, with a surprisingly high accuracy. This
points in the direction of a universal behavior of users, who - despite the
complexity of their own cognitive processes and the uncoordinated and selfish
nature of their tagging activity - appear to follow simple activity patterns.
| [
{
"version": "v1",
"created": "Thu, 4 May 2006 18:53:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cattuto",
"Ciro",
""
],
[
"Loreto",
"Vittorio",
""
],
[
"Pietronero",
"Luciano",
""
]
]
|
cs/0605017 | Tran Cao Son | Phan Huy Tu, Tran Cao Son, and Chitta Baral | Reasoning and Planning with Sensing Actions, Incomplete Information, and
Static Causal Laws using Answer Set Programming | 72 pages, 3 figures, a preliminary version of this paper appeared in
the proceedings of the 7th International Conference on Logic Programming and
Non-Monotonic Reasoning, 2004. To appear in Theory and Practice of Logic
Programming | null | null | null | cs.AI | null | We extend the 0-approximation of sensing actions and incomplete information
in [Son and Baral 2000] to action theories with static causal laws and prove
its soundness with respect to the possible world semantics. We also show that
the conditional planning problem with respect to this approximation is
NP-complete. We then present an answer set programming based conditional
planner, called ASCP, that is capable of generating both conformant plans and
conditional plans in the presence of sensing actions, incomplete information
about the initial state, and static causal laws. We prove the correctness of
our implementation and argue that our planner is sound and complete with
respect to the proposed approximation. Finally, we present experimental results
comparing ASCP to other planners.
| [
{
"version": "v1",
"created": "Thu, 4 May 2006 22:35:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tu",
"Phan Huy",
""
],
[
"Son",
"Tran Cao",
""
],
[
"Baral",
"Chitta",
""
]
]
|
cs/0605018 | Florentin Smarandache | Florentin Smarandache, Sukanto Bhattacharya, Mohammad Khoshnevisan,
Housila P. Singh, Rajesh Singh, F. Kaymram, S. Malakar, Jose L. Salmeron | Computational Modeling in Applied Problems: collected papers on
econometrics, operations research, game theory and simulation | 108 pages, many figures | Hexis, 2006. | null | null | cs.OH | null | Computational models pervade all branches of the exact sciences and have in
recent times also started to prove to be of immense utility in some of the
traditionally 'soft' sciences like ecology, sociology and politics. This volume
is a collection of a few cutting-edge research papers on the application of
variety of computational models and tools in the analysis, interpretation and
solution of vexing real-world problems and issues in economics, management,
ecology and global politics by some prolific researchers in the field.
| [
{
"version": "v1",
"created": "Fri, 5 May 2006 00:35:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Bhattacharya",
"Sukanto",
""
],
[
"Khoshnevisan",
"Mohammad",
""
],
[
"Singh",
"Housila P.",
""
],
[
"Singh",
"Rajesh",
""
],
[
"Kaymram",
"F.",
""
],
[
"Malakar",
"S.",
""
],
[
"Salmeron",
"Jose L.",
""
]
]
|
cs/0605020 | Sergey Alpaev | Sergey Alpaev | Applied MVC Patterns. A pattern language | null | null | null | null | cs.SE | null | How to get advantages of MVC model without making applications unnecessarily
complex? The full-featured MVC implementation is on the top end of ladder of
complexity. The other end is meant for simple cases that do not call for such
complex designs, however still in need of the advantages of MVC patterns, such
as ability to change the look-and-feel. This paper presents patterns of MVC
implementation that help to benefit from the paradigm and keep the right
balance between flexibility and implementation complexity.
| [
{
"version": "v1",
"created": "Fri, 5 May 2006 10:25:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Alpaev",
"Sergey",
""
]
]
|
cs/0605021 | Harald Zankl | Harald Zankl | SAT Techniques for Lexicographic Path Orders | 29 pages, Seminar Report | null | null | null | cs.SC | null | This seminar report is concerned with expressing LPO-termination of term
rewrite systems as a satisfiability problem in propositional logic. After
relevant algorithms are explained, experimental results are reported.
| [
{
"version": "v1",
"created": "Fri, 5 May 2006 19:11:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zankl",
"Harald",
""
]
]
|
cs/0605022 | Martin Kurth | Martin Kurth, Jim LeBlanc | Toward a Collection-based Metadata Maintenance Model | 10 pages, 4 figures; submitted to DC 2006 | null | null | null | cs.DL | null | In this paper, the authors identify key entities and relationships in the
operational management of metadata catalogs that describe digital collections,
and they draft a data model to support the administration of metadata
maintenance for collections. Further, they consider this proposed model in
light of other data schemes to which it relates and discuss the implications of
the model for library metadata maintenance operations.
| [
{
"version": "v1",
"created": "Fri, 5 May 2006 18:16:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kurth",
"Martin",
""
],
[
"LeBlanc",
"Jim",
""
]
]
|
cs/0605024 | Marcus Hutter | Shane Legg and Marcus Hutter | A Formal Measure of Machine Intelligence | 8 two-column pages | Proc. 15th Annual Machine Learning Conference of {B}elgium and The
Netherlands (Benelearn 2006) pages 73-80 | null | IDSIA-10-06 | cs.AI cs.LG | null | A fundamental problem in artificial intelligence is that nobody really knows
what intelligence is. The problem is especially acute when we need to consider
artificial systems which are significantly different to humans. In this paper
we approach this problem in the following way: We take a number of well known
informal definitions of human intelligence that have been given by experts, and
extract their essential features. These are then mathematically formalised to
produce a general measure of intelligence for arbitrary machines. We believe
that this measure formally captures the concept of machine intelligence in the
broadest reasonable sense.
| [
{
"version": "v1",
"created": "Sat, 6 May 2006 16:56:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Legg",
"Shane",
""
],
[
"Hutter",
"Marcus",
""
]
]
|
cs/0605025 | Vytautas Perlibakas | Vytautas Perlibakas | Face Recognition using Principal Component Analysis and Log-Gabor
Filters | Unpublished manuscript. March 2005. 23 pages, 7 figures, 5 tables | null | null | null | cs.CV | null | In this article we propose a novel face recognition method based on Principal
Component Analysis (PCA) and Log-Gabor filters. The main advantages of the
proposed method are its simple implementation, training, and very high
recognition accuracy. For recognition experiments we used 5151 face images of
1311 persons from different sets of the FERET and AR databases that allow to
analyze how recognition accuracy is affected by the change of facial
expressions, illumination, and aging. Recognition experiments with the FERET
database (containing photographs of 1196 persons) showed that our method can
achieve maximal 97-98% first one recognition rate and 0.3-0.4% Equal Error
Rate. The experiments also showed that the accuracy of our method is less
affected by eye location errors and used image normalization method than of
traditional PCA -based recognition method.
| [
{
"version": "v1",
"created": "Sun, 7 May 2006 13:30:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Perlibakas",
"Vytautas",
""
]
]
|
cs/0605026 | Yuri Pritykin | Yuri Pritykin | Strongly Almost Periodic Sequences under Finite Automata Mappings | 7 pages | null | null | null | cs.DM | null | The notion of almost periodicity nontrivially generalizes the notion of
periodicity. Strongly almost periodic sequences (=uniformly recurrent infinite
words) first appeared in the field of symbolic dynamics, but then turned out to
be interesting in connection with computer science. The paper studies the class
of eventually strongly almost periodic sequences (i. e., becoming strongly
almost periodic after deleting some prefix). We prove that the property of
eventual strong almost periodicity is preserved under the mappings done by
finite automata and finite transducers. The class of almost periodic sequences
includes the class of eventually strongly almost periodic sequences. We prove
this inclusion to be strict.
| [
{
"version": "v1",
"created": "Sun, 7 May 2006 14:46:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pritykin",
"Yuri",
""
]
]
|
cs/0605027 | Vytautas Perlibakas | Vytautas Perlibakas | Recognition of expression variant faces using masked log-Gabor features
and Principal Component Analysis | Unpublished manuscript. June 2005. 20 pages, 8 figures, 5 tables | null | null | null | cs.CV | null | In this article we propose a method for the recognition of faces with
different facial expressions. For recognition we extract feature vectors by
using log-Gabor filters of multiple orientations and scales. Using sliding
window algorithm and variances -based masking these features are extracted at
image regions that are less affected by the changes of facial expressions.
Extracted features are passed to the Principal Component Analysis (PCA) -based
recognition method. The results of face recognition experiments using
expression variant faces showed that the proposed method could achieve higher
recognition accuracy than many other methods. For development and testing we
used facial images from the AR and FERET databases. Using facial photographs of
more than one thousand persons from the FERET database the proposed method
achieved 96.6-98.9% first one recognition rate and 0.2-0.6% Equal Error Rate
(EER).
| [
{
"version": "v1",
"created": "Sun, 7 May 2006 15:02:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Perlibakas",
"Vytautas",
""
]
]
|
cs/0605030 | Randy Cogill | Randy Cogill and Sanjay Lall | A Delay Analysis of Maximal Matching Switching with Speedup | 11 pages, 2 figures. Submitted to the 2006 IEEE Conference on
Decision and Control | null | null | null | cs.NI cs.PF | null | In this paper we analyze the average queue backlog in a combined input-output
queued switch using a maximal size matching scheduling algorithm. We compare
this average backlog to the average backlog achieved by an optimal switch. We
model the cell arrival process as independent and identically distributed
between time slots and uniformly distributed among input and output ports. For
switches with many input and output ports, the backlog associated with maximal
size matching with speedup 3 is no more than 10/3 times the backlog associated
with an optimal switch. Moreover, this performance ratio rapidly approaches 2
as speedup increases.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 08:04:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cogill",
"Randy",
""
],
[
"Lall",
"Sanjay",
""
]
]
|
cs/0605031 | Mihaela Dinsoreanu PhD | Mihaela Dinsoreanu, Ioan Salomie, Kalman Pusztai | On the Design of Agent-Based Systems using UML and Extensions | null | null | null | null | cs.AI cs.MA cs.SE | null | The Unified Software Development Process (USDP) and UML have been now
generally accepted as the standard methodology and modeling language for
developing Object-Oriented Systems. Although Agent-based Systems introduces new
issues, we consider that USDP and UML can be used in an extended manner for
modeling Agent-based Systems. The paper presents a methodology for designing
agent-based systems and the specific models expressed in an UML-based notation
corresponding to each phase of the software development process. UML was
extended using the provided mechanism: stereotypes. Therefore, this approach
can be managed with any CASE tool supporting UML. A Case Study, the development
of a specific agent-based Student Evaluation System (SAS), is presented.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 12:21:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Salomie",
"Ioan",
""
],
[
"Pusztai",
"Kalman",
""
]
]
|
cs/0605032 | Mihaela Dinsoreanu PhD | Tudor Marian, Bogdan Dumitriu, Mihaela Dinsoreanu, Ioan Salomie | A framework of reusable structures for mobile agent development | null | null | null | null | cs.MA cs.AI cs.SE | null | Mobile agents research is clearly aiming towards imposing agent based
development as the next generation of tools for writing software. This paper
comes with its own contribution to this global goal by introducing a novel
unifying framework meant to bring simplicity and interoperability to and among
agent platforms as we know them today. In addition to this, we also introduce a
set of agent behaviors which, although tailored for and from the area of
virtual learning environments, are none the less generic enough to be used for
rapid, simple, useful and reliable agent deployment. The paper also presents an
illustrative case study brought forward to prove the feasibility of our design.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 12:27:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Marian",
"Tudor",
""
],
[
"Dumitriu",
"Bogdan",
""
],
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Salomie",
"Ioan",
""
]
]
|
cs/0605033 | Mihaela Dinsoreanu PhD | Mihaela Dinsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom
Coffey | Mobile Agent Based Solutions for Knowledge Assessment in elearning
Environments | null | null | null | null | cs.MA cs.AI cs.SE | null | E-learning is nowadays one of the most interesting of the "e- " domains
available through the Internet. The main problem to create a Web-based, virtual
environment is to model the traditional domain and to implement the model using
the most suitable technologies. We analyzed the distance learning domain and
investigated the possibility to implement some e-learning services using mobile
agent technologies. This paper presents a model of the Student Assessment
Service (SAS) and an agent-based framework developed to be used for
implementing specific applications. A specific Student Assessment application
that relies on the framework was developed.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 12:37:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Godja",
"Cristian",
""
],
[
"Anghel",
"Claudiu",
""
],
[
"Salomie",
"Ioan",
""
],
[
"Coffey",
"Tom",
""
]
]
|
cs/0605034 | Srinivas Shakkottai | Srinivas Shakkottai, R. Srikant | Peer to Peer Networks for Defense Against Internet Worms | 11 Pages | null | null | null | cs.CR cs.AR cs.NI | null | Internet worms, which spread in computer networks without human mediation,
pose a severe threat to computer systems today. The rate of propagation of
worms has been measured to be extremely high and they can infect a large
fraction of their potential hosts in a short time. We study two different
methods of patch dissemination to combat the spread of worms. We first show
that using a fixed number of patch servers performs woefully inadequately
against Internet worms. We then show that by exploiting the exponential data
dissemination capability of P2P systems, the spread of worms can be halted very
effectively. We compare the two methods by using fluid models to compute two
quantities of interest: the time taken to effectively combat the progress of
the worm and the maximum number of infected hosts. We validate our models using
Internet measurements and simulations.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 17:02:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shakkottai",
"Srinivas",
""
],
[
"Srikant",
"R.",
""
]
]
|
cs/0605035 | Filip Radlinski | Filip Radlinski and Thorsten Joachims | Query Chains: Learning to Rank from Implicit Feedback | 10 pages | Proceedings of the ACM Conference on Knowledge Discovery and Data
Mining (KDD), ACM, 2005 | null | null | cs.LG cs.IR | null | This paper presents a novel approach for using clickthrough data to learn
ranked retrieval functions for web search results. We observe that users
searching the web often perform a sequence, or chain, of queries with a similar
information need. Using query chains, we generate new types of preference
judgments from search engine logs, thus taking advantage of user intelligence
in reformulating queries. To validate our method we perform a controlled user
study comparing generated preference judgments to explicit relevance judgments.
We also implemented a real-world search engine to test our approach, using a
modified ranking SVM to learn an improved ranking function from preference
data. Our results demonstrate significant improvements in the ranking given by
the search engine. The learned rankings outperform both a static ranking
function, as well as one trained without considering query chains.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 22:05:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
]
|
cs/0605036 | Filip Radlinski | Filip Radlinski and Thorsten Joachims | Evaluating the Robustness of Learning from Implicit Feedback | 8 pages, Presented at ICML Workshop on Learning In Web Search, 2005 | null | null | null | cs.LG cs.IR | null | This paper evaluates the robustness of learning from implicit feedback in web
search. In particular, we create a model of user behavior by drawing upon user
studies in laboratory and real-world settings. The model is used to understand
the effect of user behavior on the performance of a learning algorithm for
ranked retrieval. We explore a wide range of possible user behaviors and find
that learning from implicit feedback can be surprisingly robust. This
complements previous results that demonstrated our algorithm's effectiveness in
a real-world search engine application.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 23:38:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
]
|
cs/0605037 | Filip Radlinski | Filip Radlinski and Thorsten Joachims | Minimally Invasive Randomization for Collecting Unbiased Preferences
from Clickthrough Logs | 7 pages. Proceedings of the 21st National Conference on Artificial
Intelligence (AAAI), 2006 | null | null | null | cs.IR cs.LG | null | Clickthrough data is a particularly inexpensive and plentiful resource to
obtain implicit relevance feedback for improving and personalizing search
engines. However, it is well known that the probability of a user clicking on a
result is strongly biased toward documents presented higher in the result set
irrespective of relevance. We introduce a simple method to modify the
presentation of search results that provably gives relevance judgments that are
unaffected by presentation bias under reasonable assumptions. We validate this
property of the training data in interactive real world experiments. Finally,
we show that using these unbiased relevance judgments learning methods can be
guaranteed to converge to an ideal ranking given sufficient data.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 01:53:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
]
|
cs/0605038 | Enrico Pontelli | Tran Cao Son, Enrico Pontelli, Islam Elkabani | An Unfolding-Based Semantics for Logic Programming with Aggregates | null | null | null | null | cs.SE cs.AI | null | The paper presents two equivalent definitions of answer sets for logic
programs with aggregates. These definitions build on the notion of unfolding of
aggregates, and they are aimed at creating methodologies to translate logic
programs with aggregates to normal logic programs or positive programs, whose
answer set semantics can be used to defined the semantics of the original
programs. The first definition provides an alternative view of the semantics
for logic programming with aggregates described by Pelov et al.
The second definition is similar to the traditional answer set definition for
normal logic programs, in that, given a logic program with aggregates and an
interpretation, the unfolding process produces a positive program. The paper
shows how this definition can be extended to consider aggregates in the head of
the rules.
The proposed views of logic programming with aggregates are simple and
coincide with the ultimate stable model semantics, and with other semantic
characterizations for large classes of program (e.g., programs with monotone
aggregates and programs that are aggregate-stratified).
Moreover, it can be directly employed to support an implementation using
available answer set solvers. The paper describes a system, called ASP^A, that
is capable of computing answer sets of programs with arbitrary (e.g.,
recursively defined) aggregates.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 04:08:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Son",
"Tran Cao",
""
],
[
"Pontelli",
"Enrico",
""
],
[
"Elkabani",
"Islam",
""
]
]
|
cs/0605039 | Amitabha Roy | Amitabha Roy, Stephan Zeisset, Charles J. Fleckenstein, John C. Huang | Fast and Generalized Polynomial Time Memory Consistency Verification | To appear in the proceedings of Computer Aided Verification (CAV)
2006 | null | null | null | cs.AR cs.LO cs.PF | null | The problem of verifying multi-threaded execution against the memory
consistency model of a processor is known to be an NP hard problem. However
polynomial time algorithms exist that detect almost all failures in such
execution. These are often used in practice for microprocessor verification. We
present a low complexity and fully parallelized algorithm to check program
execution against the processor consistency model. In addition our algorithm is
general enough to support a number of consistency models without any
degradation in performance. An implementation of this algorithm is currently
used in practice to verify processors in the post silicon stage for multiple
architectures.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 05:45:52 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2006 12:07:57 GMT"
},
{
"version": "v3",
"created": "Tue, 23 May 2006 10:03:21 GMT"
},
{
"version": "v4",
"created": "Mon, 29 May 2006 06:33:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Roy",
"Amitabha",
""
],
[
"Zeisset",
"Stephan",
""
],
[
"Fleckenstein",
"Charles J.",
""
],
[
"Huang",
"John C.",
""
]
]
|
cs/0605040 | Marcus Hutter | Marcus Hutter | General Discounting versus Average Reward | 17 pages, 1 table | Proc. 17th International Conf. on Algorithmic Learning Theory (ALT
2006) pages 244-258 | null | IDSIA-11-06 | cs.LG | null | Consider an agent interacting with an environment in cycles. In every
interaction cycle the agent is rewarded for its performance. We compare the
average reward U from cycle 1 to m (average value) with the future discounted
reward V from cycle k to infinity (discounted value). We consider essentially
arbitrary (non-geometric) discount sequences and arbitrary reward sequences
(non-MDP environments). We show that asymptotically U for m->infinity and V for
k->infinity are equal, provided both limits exist. Further, if the effective
horizon grows linearly with k or faster, then existence of the limit of U
implies that the limit of V exists. Conversely, if the effective horizon grows
linearly with k or slower, then existence of the limit of V implies that the
limit of U exists.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 10:39:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
]
|
cs/0605043 | Stefano Guerrini | Stefano Guerrini and Andrea Masini | Continuations, proofs and tests | 32 pages, uses xy-pic | null | null | null | cs.LO cs.PL | null | Continuation Passing Style (CPS) is one of the most important issues in the
field of functional programming languages, and the quest for a primitive notion
of types for continuation is still open. Starting from the notion of ``test''
proposed by Girard, we develop a notion of test for intuitionistic logic. We
give a complete deductive system for tests and we show that it is good to deal
with ``continuations''. In particular, in the proposed system it is possible to
work with Call by Value and Call by Name translations in a uniform way.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 20:11:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Guerrini",
"Stefano",
""
],
[
"Masini",
"Andrea",
""
]
]
|
cs/0605045 | R.N.Mohan Professor | R.N.Mohan | On Orthogonalities in Matrices | null | null | null | null | cs.DM | null | In this paper we have discussed different possible orthogonalities in
matrices, namely orthogonal, quasi-orthogonal, semi-orthogonal and
non-orthogonal matrices including completely positive matrices, while giving
some of their constructions besides studying some of their properties.
| [
{
"version": "v1",
"created": "Wed, 10 May 2006 03:12:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mohan",
"R. N.",
""
]
]
|
cs/0605049 | R.N.Mohan Professor | V.M.Siddlenikov, R.N.Mohan, Moon Ho Lee | On fractionally linear functions over a finite field | null | null | null | null | cs.DM | null | Abstrct: In this note, by considering fractionally linear functions over a
finite field and consequently developing an abstract sequence, we study some of
its properties.
| [
{
"version": "v1",
"created": "Thu, 11 May 2006 06:58:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Siddlenikov",
"V. M.",
""
],
[
"Mohan",
"R. N.",
""
],
[
"Lee",
"Moon Ho",
""
]
]
|
cs/0605050 | V. Arvind | V. Arvind and Piyush P Kurur | A Polynomial Time Nilpotence Test for Galois Groups and Related Results | 12 pages | null | null | null | cs.CC cs.DS | null | We give a deterministic polynomial-time algorithm to check whether the Galois
group $\Gal{f}$ of an input polynomial $f(X) \in \Q[X]$ is nilpotent: the
running time is polynomial in $\size{f}$. Also, we generalize the Landau-Miller
solvability test to an algorithm that tests if $\Gal{f}$ is in $\Gamma_d$: this
algorithm runs in time polynomial in $\size{f}$ and $n^d$ and, moreover, if
$\Gal{f}\in\Gamma_d$ it computes all the prime factors of $# \Gal{f}$.
| [
{
"version": "v1",
"created": "Thu, 11 May 2006 08:20:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Arvind",
"V.",
""
],
[
"Kurur",
"Piyush P",
""
]
]
|
cs/0605053 | Rajkumar Buyya | Hussein Gibbins and Rajkumar Buyya | Gridscape II: A Customisable and Pluggable Grid Monitoring Portal and
its Integration with Google Maps | 12 pages | null | null | Technical Report, GRIDS-TR-2006-8, Grid Computing and Distributed
Systems Laboratory, The University of Melbourne, Australia, May 12, 2006 | cs.DC | null | Grid computing has emerged as an effective means of facilitating the sharing
of distributed heterogeneous resources, enabling collaboration in large scale
environments. However, the nature of Grid systems, coupled with the
overabundance and fragmentation of information, makes it difficult to monitor
resources, services, and computations in order to plan and make decisions. In
this paper we present Gridscape II, a customisable portal component that can be
used on its own or plugged in to compliment existing Grid portals. Gridscape II
manages the gathering of information from arbitrary, heterogeneous and
distributed sources and presents them together seamlessly within a single
interface. It also leverages the Google Maps API in order to provide a highly
interactive user interface. Gridscape II is simple and easy to use, providing a
solution to those users who do not wish to invest heavily in developing their
own monitoring portal from scratch, and also for those users who want something
that is easy to customise and extend for their specific needs.
| [
{
"version": "v1",
"created": "Fri, 12 May 2006 09:41:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gibbins",
"Hussein",
""
],
[
"Buyya",
"Rajkumar",
""
]
]
|
cs/0605056 | Rajkumar Buyya | Chee Shin Yeo, Marcos Dias de Assuncao, Jia Yu, Anthony Sulistio,
Srikumar Venugopal, Martin Placek, and Rajkumar Buyya | Utility Computing and Global Grids | 23 pages | null | null | Technical Report, GRIDS-TR-2006-7, Grid Computing and Distributed
Systems Laboratory, The University of Melbourne, Australia, April 13, 2006 | cs.DC | null | This chapter focuses on the use of Grid technologies to achieve utility
computing. An overview of how Grids can support utility computing is first
presented through the architecture of Utility Grids. Then, utility-based
resource allocation is described in detail at each level of the architecture.
Finally, some industrial solutions for utility computing are discussed.
| [
{
"version": "v1",
"created": "Fri, 12 May 2006 20:36:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Yeo",
"Chee Shin",
""
],
[
"de Assuncao",
"Marcos Dias",
""
],
[
"Yu",
"Jia",
""
],
[
"Sulistio",
"Anthony",
""
],
[
"Venugopal",
"Srikumar",
""
],
[
"Placek",
"Martin",
""
],
[
"Buyya",
"Rajkumar",
""
]
]
|
cs/0605057 | Rajiv Ranjan Mr. | Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya | SLA-Based Coordinated Superscheduling Scheme and Performance for
Computational Grids | null | In Proceedings of the 8th IEEE International Conference on Cluster
Computing (Cluster 2006), IEEE Computer Society Press, September 27 - 30,
2006, Barcelona, Spain. | null | null | cs.DC | null | The Service Level Agreement~(SLA) based grid superscheduling approach
promotes coordinated resource sharing. Superscheduling is facilitated between
administratively and topologically distributed grid sites by grid schedulers
such as Resource brokers. In this work, we present a market-based SLA
coordination mechanism. We based our SLA model on a well known \emph{contract
net protocol}.
The key advantages of our approach are that it allows:~(i) resource owners to
have finer degree of control over the resource allocation that was previously
not possible through traditional mechanism; and (ii) superschedulers to bid for
SLA contracts in the contract net with focus on completing the job within the
user specified deadline. In this work, we use simulation to show the
effectiveness of our proposed approach.
| [
{
"version": "v1",
"created": "Mon, 15 May 2006 13:41:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ranjan",
"Rajiv",
""
],
[
"Harwood",
"Aaron",
""
],
[
"Buyya",
"Rajkumar",
""
]
]
|
cs/0605059 | Jean-Marc Rosengard | Jean-Marc Rosengard, Marian Ursu | Ontological Representations of Software Patterns | 7 pages | Proceedings of KES'04, Lecture Notes in Computer Science, vol.
3215, pp. 31-37, Springer-Verlag, 2004 | 10.1007/b100916 | null | cs.SE cs.AI | null | This paper is based on and advocates the trend in software engineering of
extending the use of software patterns as means of structuring solutions to
software development problems (be they motivated by best practice or by company
interests and policies). The paper argues that, on the one hand, this
development requires tools for automatic organisation, retrieval and
explanation of software patterns. On the other hand, that the existence of such
tools itself will facilitate the further development and employment of patterns
in the software development process. The paper analyses existing pattern
representations and concludes that they are inadequate for the kind of
automation intended here. Adopting a standpoint similar to that taken in the
semantic web, the paper proposes that feasible solutions can be built on the
basis of ontological representations.
| [
{
"version": "v1",
"created": "Sun, 14 May 2006 18:31:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rosengard",
"Jean-Marc",
""
],
[
"Ursu",
"Marian",
""
]
]
|
cs/0605061 | Al-Mukaddim Khan Pathan | Al-Mukaddim Khan Pathan, Md. Abdul Mottalib and Minhaz Fahim Zibran | An Internet Framework to Bring Coherence between WAP and HTTP Ensuring
Better Mobile Internet Security | 8th International Conference on Advanced Communication Technology
(ICACT 2006) | null | null | null | cs.NI | null | To bring coherence between Wireless Access Protocol (WAP) and Hyper Text
Transfer Protocol (HTTP), in this paper, we have proposed an enhanced Internet
framework, which incorporates a new markup language and a browser compatible
with both of the access control protocols. This Markup Language and the browser
enables co-existence of both Hyper Text Markup Language (HTML) and Wireless
Markup Language (WML) contents in a single source file, whereas the browser
incorporates the ability to hold contents compliant with both HTTP and WAP. The
proposed framework also bridges the security gap that is present in the
existing mobile Internet framework.
Keywords: WAP, WML, HTTP, HTML, browser, parser, wireless devices.
| [
{
"version": "v1",
"created": "Mon, 15 May 2006 10:25:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pathan",
"Al-Mukaddim Khan",
""
],
[
"Mottalib",
"Md. Abdul",
""
],
[
"Zibran",
"Minhaz Fahim",
""
]
]
|
cs/0605062 | Al-Mukaddim Khan Pathan | Al-Mukaddim Khan Pathan and Md. Golam Shagadul Amin Talukder | QoSIP: A QoS Aware IP Routing Ptotocol for Multimedia Data | 8th International Conference of Advanced Communication Technology
(ICACT 2006) | null | null | null | cs.NI | null | Conventional IP routing protocols are not suitable for multimedia
applications which have very stringent Quality-of-Service (QoS) demands and
they require a connection oriented service. For multimedia applications it is
expected that the router should be able to forward the packet according to the
demand of the packet and it is necessary to find a path that satisfies the
specific demands of a particular application. In order to address these issues,
in this paper, we have presented a QoS aware IP routing protocol where a router
stores information about the QoS parameters and routes the packet accordingly.
Keywords: IP Routing Protocol, Quality of Service (QoS) parameter, QoSIP,
Selective Flooding.
| [
{
"version": "v1",
"created": "Mon, 15 May 2006 10:39:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pathan",
"Al-Mukaddim Khan",
""
],
[
"Talukder",
"Md. Golam Shagadul Amin",
""
]
]
|
cs/0605063 | Al-Mukaddim Khan Pathan | Asif Ahmed Anik and Al-Mukaddim Khan Pathan | An Electronic Payment System to Ensure Cost Effectiveness with Easy
Security Incorporation for the Developing Countries | International Conference on Intelligent Agents, Web Technology and
Internet Commerce (IAWTIC 2004) | null | null | null | cs.OH | null | With the rapid growth of Information and Communication Technology, Electronic
commerce is now acting as a new means of carrying out business transactions
through electronic means such as Internet environment. To avoid the
complexities associated with the digital cash and electronic cash, consumers
and vendors are looking for credit card payments on the Internet as one
possible time-tested alternative. This gave rise of the on-line payment
processing using a third-party verification; which is not suitable for the
developing countries in most of the cases because of the excessive costs
associated with it for maintenance and establishment of an online third-party
processor. As a remedy of this problem, in this paper, we have proposed a
framework for easy security incorporation in credit card based electronic
payment system without the use of an on-line third- party processor; which
tends to be low cost and effective for the developing countries.
| [
{
"version": "v1",
"created": "Mon, 15 May 2006 10:57:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Anik",
"Asif Ahmed",
""
],
[
"Pathan",
"Al-Mukaddim Khan",
""
]
]
|
cs/0605066 | Xiaowen Zhang | Xiaowen Zhang, Ke Tang, Li Shu | A Chaotic Cipher Mmohocc and Its Randomness Evaluation | 8 pages, 4 figures, and 3 tables, submitted to ICCS06 | null | null | null | cs.CR | null | After a brief introduction to a new chaotic stream cipher Mmohocc which
utilizes the fundamental chaos characteristics of mixing, unpredictability, and
sensitivity to initial conditions, we conducted the randomness statistical
tests against the keystreams generated by the cipher. Two batteries of most
stringent randomness tests, namely the NIST Suite and the Diehard Suite, were
performed. The results showed that the keystreams have successfully passed all
the statistical tests. We conclude that Mmohocc can generate high-quality
pseudorandom numbers from a statistical point of view.
| [
{
"version": "v1",
"created": "Mon, 15 May 2006 18:25:35 GMT"
},
{
"version": "v2",
"created": "Tue, 30 May 2006 11:58:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhang",
"Xiaowen",
""
],
[
"Tang",
"Ke",
""
],
[
"Shu",
"Li",
""
]
]
|
cs/0605070 | Stephen Smith | Stephen L. Smith, Mireille E. Broucke, and Bruce A. Francis | Curve Shortening and the Rendezvous Problem for Mobile Autonomous Robots | 15 pages, 18 figures | null | null | null | cs.RO cs.MA | null | If a smooth, closed, and embedded curve is deformed along its normal vector
field at a rate proportional to its curvature, it shrinks to a circular point.
This curve evolution is called Euclidean curve shortening and the result is
known as the Gage-Hamilton-Grayson Theorem. Motivated by the rendezvous problem
for mobile autonomous robots, we address the problem of creating a polygon
shortening flow. A linear scheme is proposed that exhibits several analogues to
Euclidean curve shortening: The polygon shrinks to an elliptical point, convex
polygons remain convex, and the perimeter of the polygon is monotonically
decreasing.
| [
{
"version": "v1",
"created": "Tue, 16 May 2006 22:30:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Smith",
"Stephen L.",
""
],
[
"Broucke",
"Mireille E.",
""
],
[
"Francis",
"Bruce A.",
""
]
]
|
cs/0605074 | Michael Codish | Michael Codish (1), Peter Schneider-Kamp (2), Vitaly Lagoon (3),
Ren\'e Thiemann (2), J\"urgen Giesl (2) ((1) Department of Computer Science,
Ben-Gurion University, Israel (2) LuFG Informatik 2, RWTH Aachen, Germany (3)
Department of Computer Science and Software Engineering, University of
Melbourne, Australia) | SAT Solving for Argument Filterings | null | null | null | null | cs.LO | null | This paper introduces a propositional encoding for lexicographic path orders
in connection with dependency pairs. This facilitates the application of SAT
solvers for termination analysis of term rewrite systems based on the
dependency pair method. We address two main inter-related issues and encode
them as satisfiability problems of propositional formulas that can be
efficiently handled by SAT solving: (1) the combined search for a lexicographic
path order together with an \emph{argument filtering} to orient a set of
inequalities; and (2) how the choice of the argument filtering influences the
set of inequalities that have to be oriented. We have implemented our
contributions in the termination prover AProVE. Extensive experiments show that
by our encoding and the application of SAT solvers one obtains speedups in
orders of magnitude as well as increased termination proving power.
| [
{
"version": "v1",
"created": "Wed, 17 May 2006 12:47:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Codish",
"Michael",
""
],
[
"Schneider-Kamp",
"Peter",
""
],
[
"Lagoon",
"Vitaly",
""
],
[
"Thiemann",
"René",
""
],
[
"Giesl",
"Jürgen",
""
]
]
|
cs/0605076 | J. F. J. Laros | J. F. J. Laros | Numeration-automatic sequences | 25 pages, 22 figures | null | null | null | cs.CL cs.DM | null | We present a base class of automata that induce a numeration system and we
give an algorithm to give the n-th word in the language of the automaton when
the expansion of n in the induced numeration system is feeded to the automaton.
Furthermore we give some algorithms for reverse reading of this expansion and a
way to combine automata to other automata having the same properties.
| [
{
"version": "v1",
"created": "Wed, 17 May 2006 17:12:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Laros",
"J. F. J.",
""
]
]
|
cs/0605078 | Christoph D\"urr | Philippe Baptiste, Peter Brucker, Marek Chrobak, Christoph Durr,
Svetlana A. Kravchenko, Francis Sourd | The Complexity of Mean Flow Time Scheduling Problems with Release Times | Subsumes and replaces cs.DS/0412094 and "Complexity of mean flow time
scheduling problems with release dates" by P.B, S.K | null | null | null | cs.DS | null | We study the problem of preemptive scheduling n jobs with given release times
on m identical parallel machines. The objective is to minimize the average flow
time. We show that when all jobs have equal processing times then the problem
can be solved in polynomial time using linear programming. Our algorithm can
also be applied to the open-shop problem with release times and unit processing
times. For the general case (when processing times are arbitrary), we show that
the problem is unary NP-hard.
| [
{
"version": "v1",
"created": "Wed, 17 May 2006 22:07:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Baptiste",
"Philippe",
""
],
[
"Brucker",
"Peter",
""
],
[
"Chrobak",
"Marek",
""
],
[
"Durr",
"Christoph",
""
],
[
"Kravchenko",
"Svetlana A.",
""
],
[
"Sourd",
"Francis",
""
]
]
|
cs/0605081 | Marc Daumas | Marc Daumas (LP2A, LIRMM), Guillaume Da Gra\c{c}a (LP2A), David Defour
(LP2A) | Caract\'{e}ristiques arithm\'{e}tiques des processeurs graphiques | null | null | null | null | cs.MS | null | Les unit\'{e}s graphiques (Graphic Processing Units- GPU) sont d\'{e}sormais
des processeurs puissants et flexibles. Les derni\`{e}res g\'{e}n\'{e}rations
de GPU contiennent des unit\'{e}s programmables de traitement des sommets
(vertex shader) et des pixels (pixel shader) supportant des op\'{e}rations en
virgule flottante sur 8, 16 ou 32 bits. La repr\'{e}sentation flottante sur 32
bits correspond \`{a} la simple pr\'{e}cision de la norme IEEE sur
l'arithm\'{e}tique en virgule flottante (IEEE-754). Les GPU sont bien
adapt\'{e}s aux applications avec un fort parall\'{e}lisme de donn\'{e}es.
Cependant ils ne sont que peu utilis\'{e}s en dehors des calculs graphiques
(General Purpose computation on GPU -- GPGPU). Une des raisons de cet \'{e}tat
de faits est la pauvret\'{e} des documentations techniques fournies par les
fabricants (ATI et Nvidia), particuli\`{e}rement en ce qui concerne
l'implantation des diff\'{e}rents op\'{e}rateurs arithm\'{e}tiques
embarqu\'{e}s dans les diff\'{e}rentes unit\'{e}s de traitement. Or ces
informations sont essentielles pour estimer et contr\^{o}ler les erreurs
d'arrondi ou pour mettre en oeuvre des techniques de r\'{e}duction ou de
compensation afin de travailler en pr\'{e}cision double, quadruple ou
arbitrairement \'{e}tendue. Nous proposons dans cet article un ensemble de
programmes qui permettent de d\'{e}couvrir les caract\'{e}ristiques principales
des GPU en ce qui concerne l'arithm\'{e}tique \`{a} virgule flottante. Nous
donnons les r\'{e}sultats obtenus sur deux cartes graphiques r\'{e}centes: la
Nvidia 7800GTX et l'ATI RX1800XL.
| [
{
"version": "v1",
"created": "Thu, 18 May 2006 15:49:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Daumas",
"Marc",
"",
"LP2A, LIRMM"
],
[
"Da Graça",
"Guillaume",
"",
"LP2A"
],
[
"Defour",
"David",
"",
"LP2A"
]
]
|
cs/0605082 | Saugata Basu | Saugata Basu | Efficient algorithm for computing the Euler-Poincar\'e characteristic of
a semi-algebraic set defined by few quadratic inequalities | 17 pages, accepted for publication in Computational Complexity | null | null | null | cs.SC cs.CG | null | We present an algorithm which takes as input a closed semi-algebraic set, $S
\subset \R^k$, defined by \[ P_1 \leq 0, ..., P_\ell \leq 0, P_i \in
\R[X_1,...,X_k], \deg(P_i) \leq 2, \] and computes the Euler-Poincar\'e
characteristic of $S$. The complexity of the algorithm is $k^{O(\ell)}$.
| [
{
"version": "v1",
"created": "Thu, 18 May 2006 18:03:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Basu",
"Saugata",
""
]
]
|
cs/0605083 | Partha Basuchowdhuri | Partha Basuchowdhuri | Classical Authentication Aided Three-Stage Quantum Protocol | 7 pages, 3 figures | null | null | null | cs.CR | null | This paper modifies Kak's three-stage protocol so that it can guarantee
secure transmission of information. Although avoiding man-in-the-middle attack
is our primary objective in the introduction of classical authentication inside
the three-stage protocol, we also benefit from the inherent advantages of the
chosen classical authentication protocol. We have tried to implement ideas like
key distribution center, session key, time-stamp, and nonce, within the quantum
cryptography protocol.
| [
{
"version": "v1",
"created": "Thu, 18 May 2006 21:41:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Basuchowdhuri",
"Partha",
""
]
]
|
cs/0605088 | Ke Liu | Ke Liu, Adnan Majeed and Nael B. Abu-Ghazaleh | TARMAC: Traffic-Analysis Reslient MAC Protocol for Multi-Hop Wireless
Networks | null | null | null | null | cs.NI cs.CR | null | Traffic analysis in Multi-hop Wireless Networks can expose the structure of
the network allowing attackers to focus their efforts on critical nodes. For
example, jamming the only data sink in a sensor network can cripple the
network. We propose a new communication protocol that is part of the MAC layer,
but resides conceptually between the routing layer and MAC, that is resilient
to traffic analysis. Each node broadcasts the data that it has to transmit
according to a fixed transmission schedule that is independent of the traffic
being generated, making the network immune to time correlation analysis. The
transmission pattern is identical, with the exception of a possible time shift,
at all nodes, removing spatial correlation of transmissions to network
strucutre. Data for all neighbors resides in the same encrypted packet. Each
neighbor then decides which subset of the data in a packet to forward onwards
using a routing protocol whose details are orthogonal to the proposed scheme.
We analyze the basic scheme, exploring the tradeoffs in terms of frequency of
transmission and packet size. We also explore adaptive and time changing
patterns and analyze their performance under a number of representative
scenarios.
| [
{
"version": "v1",
"created": "Fri, 19 May 2006 22:42:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Liu",
"Ke",
""
],
[
"Majeed",
"Adnan",
""
],
[
"Abu-Ghazaleh",
"Nael B.",
""
]
]
|
cs/0605094 | Simone Bova | S. Bova (1) and F. Montagna (1) ((1) University of Siena, Italy) | Proof Search in Hajek's Basic Logic | 26 pages | null | null | null | cs.LO cs.CC | null | We introduce a proof system for Hajek's logic BL based on a relational
hypersequents framework. We prove that the rules of our logical calculus,
called RHBL, are sound and invertible with respect to any valuation of BL into
a suitable algebra, called omega[0,1]. Refining the notion of reduction tree
that arises naturally from RHBL, we obtain a decision algorithm for BL
provability whose running time upper bound is 2^O(n), where n is the number of
connectives of the input formula. Moreover, if a formula is unprovable, we
exploit the constructiveness of a polynomial time algorithm for leaves validity
for providing a procedure to build countermodels in omega[0,1]. Finally, since
the size of the reduction tree branches is O(n^3), we can describe a polynomial
time verification algorithm for BL unprovability.
| [
{
"version": "v1",
"created": "Mon, 22 May 2006 08:18:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bova",
"S.",
"",
"University of Siena, Italy"
],
[
"Montagna",
"F.",
"",
"University of Siena, Italy"
]
]
|
cs/0605097 | Emina Torlak | Marten van Dijk, Emina Torlak, Blaise Gassend, and Srinivas Devadas | A Generalized Two-Phase Analysis of Knowledge Flows in Security
Protocols | 16 pages | null | null | null | cs.CR | null | We introduce knowledge flow analysis, a simple and flexible formalism for
checking cryptographic protocols. Knowledge flows provide a uniform language
for expressing the actions of principals, assump- tions about intruders, and
the properties of cryptographic primitives. Our approach enables a generalized
two-phase analysis: we extend the two-phase theory by identifying the necessary
and sufficient proper- ties of a broad class of cryptographic primitives for
which the theory holds. We also contribute a library of standard primitives and
show that they satisfy our criteria.
| [
{
"version": "v1",
"created": "Mon, 22 May 2006 15:51:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"van Dijk",
"Marten",
""
],
[
"Torlak",
"Emina",
""
],
[
"Gassend",
"Blaise",
""
],
[
"Devadas",
"Srinivas",
""
]
]
|
cs/0605101 | Victor Kryssanov | Victor V. Kryssanov, Frank J. Rinaldo, Evgeny L. Kuleshov, Hitoshi
Ogawa | Modeling the Dynamics of Social Networks | 8 pages, 3 figures. Preprint (as of May 24, 2006) | null | null | null | cs.CY cs.CE cs.CL cs.HC cs.NI physics.data-an | null | Modeling human dynamics responsible for the formation and evolution of the
so-called social networks - structures comprised of individuals or
organizations and indicating connectivities existing in a community - is a
topic recently attracting a significant research interest. It has been claimed
that these dynamics are scale-free in many practically important cases, such as
impersonal and personal communication, auctioning in a market, accessing sites
on the WWW, etc., and that human response times thus conform to the power law.
While a certain amount of progress has recently been achieved in predicting the
general response rate of a human population, existing formal theories of human
behavior can hardly be found satisfactory to accommodate and comprehensively
explain the scaling observed in social networks. In the presented study, a
novel system-theoretic modeling approach is proposed and successfully applied
to determine important characteristics of a communication network and to
analyze consumer behavior on the WWW.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 02:13:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kryssanov",
"Victor V.",
""
],
[
"Rinaldo",
"Frank J.",
""
],
[
"Kuleshov",
"Evgeny L.",
""
],
[
"Ogawa",
"Hitoshi",
""
]
]
|
cs/0605102 | Shaili Jain | Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh Venkatasubramanian
and Ke Yi | Restricted Strip Covering and the Sensor Cover Problem | 14 pages, 6 figures | null | null | null | cs.DS cs.CG | null | Given a set of objects with durations (jobs) that cover a base region, can we
schedule the jobs to maximize the duration the original region remains covered?
We call this problem the sensor cover problem. This problem arises in the
context of covering a region with sensors. For example, suppose you wish to
monitor activity along a fence by sensors placed at various fixed locations.
Each sensor has a range and limited battery life. The problem is to schedule
when to turn on the sensors so that the fence is fully monitored for as long as
possible. This one dimensional problem involves intervals on the real line.
Associating a duration to each yields a set of rectangles in space and time,
each specified by a pair of fixed horizontal endpoints and a height. The
objective is to assign a position to each rectangle to maximize the height at
which the spanning interval is fully covered. We call this one dimensional
problem restricted strip covering. If we replace the covering constraint by a
packing constraint, the problem is identical to dynamic storage allocation, a
scheduling problem that is a restricted case of the strip packing problem. We
show that the restricted strip covering problem is NP-hard and present an O(log
log n)-approximation algorithm. We present better approximations or exact
algorithms for some special cases. For the uniform-duration case of restricted
strip covering we give a polynomial-time, exact algorithm but prove that the
uniform-duration case for higher-dimensional regions is NP-hard. Finally, we
consider regions that are arbitrary sets, and we present an O(log
n)-approximation algorithm.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 03:27:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Buchsbaum",
"Adam L.",
""
],
[
"Efrat",
"Alon",
""
],
[
"Jain",
"Shaili",
""
],
[
"Venkatasubramanian",
"Suresh",
""
],
[
"Yi",
"Ke",
""
]
]
|
cs/0605103 | Daniel Lemire | Daniel Lemire | A Better Alternative to Piecewise Linear Time Series Segmentation | to appear in SIAM Data Mining 2007 | null | null | null | cs.DB cs.CV | null | Time series are difficult to monitor, summarize and predict. Segmentation
organizes time series into few intervals having uniform characteristics
(flatness, linearity, modality, monotonicity and so on). For scalability, we
require fast linear time algorithms. The popular piecewise linear model can
determine where the data goes up or down and at what rate. Unfortunately, when
the data does not follow a linear model, the computation of the local slope
creates overfitting. We propose an adaptive time series model where the
polynomial degree of each interval vary (constant, linear and so on). Given a
number of regressors, the cost of each interval is its polynomial degree:
constant intervals cost 1 regressor, linear intervals cost 2 regressors, and so
on. Our goal is to minimize the Euclidean (l_2) error for a given model
complexity. Experimentally, we investigate the model where intervals can be
either constant or linear. Over synthetic random walks, historical stock market
prices, and electrocardiograms, the adaptive model provides a more accurate
segmentation than the piecewise linear model without increasing the
cross-validation error or the running time, while providing a richer vocabulary
to applications. Implementation issues, such as numerical stability and
real-world performance, are discussed.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 04:42:53 GMT"
},
{
"version": "v2",
"created": "Sat, 27 May 2006 00:32:03 GMT"
},
{
"version": "v3",
"created": "Wed, 31 May 2006 01:28:40 GMT"
},
{
"version": "v4",
"created": "Sun, 25 Jun 2006 14:21:45 GMT"
},
{
"version": "v5",
"created": "Tue, 3 Oct 2006 17:04:41 GMT"
},
{
"version": "v6",
"created": "Thu, 4 Jan 2007 18:36:01 GMT"
},
{
"version": "v7",
"created": "Mon, 23 Apr 2007 01:24:44 GMT"
},
{
"version": "v8",
"created": "Sat, 28 Apr 2007 23:13:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lemire",
"Daniel",
""
]
]
|
cs/0605104 | Blake Hegerle | Blake Hegerle | Parsing Transformative LR(1) Languages | 68 pages, 4 figures. Numerous stylistic and grammatical fixes; new
material in Sections 2.2 and 4.2 | null | null | null | cs.PL | null | We consider, as a means of making programming languages more flexible and
powerful, a parsing algorithm in which the parser may freely modify the grammar
while parsing. We are particularly interested in a modification of the
canonical LR(1) parsing algorithm in which, after the reduction of certain
productions, we examine the source sentence seen so far to determine the
grammar to use to continue parsing. A naive modification of the canonical LR(1)
parsing algorithm along these lines cannot be guaranteed to halt; as a result,
we develop a test which examines the grammar as it changes, stopping the parse
if the grammar changes in a way that would invalidate earlier assumptions made
by the parser. With this test in hand, we can develop our parsing algorithm and
prove that it is correct. That being done, we turn to earlier, related work;
the idea of programming languages which can be extended to include new
syntactic constructs has existed almost as long as the idea of high-level
programming languages. Early efforts to construct such a programming language
were hampered by an immature theory of formal languages. More recent efforts to
construct transformative languages relied either on an inefficient chain of
source-to-source translators; or they have a defect, present in our naive
parsing algorithm, in that they cannot be known to halt. The present algorithm
does not have these undesirable properties, and as such, it should prove a
useful foundation for a new kind of programming language.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 19:09:39 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Jul 2006 14:39:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hegerle",
"Blake",
""
]
]
|
cs/0605109 | Emina Torlak | Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, and
Srinivas Devadas | Knowledge Flow Analysis for Security Protocols | 20 pages | null | null | MIT-CSAIL-TR-2005-066 | cs.CR cs.SE | null | Knowledge flow analysis offers a simple and flexible way to find flaws in
security protocols. A protocol is described by a collection of rules
constraining the propagation of knowledge amongst principals. Because this
characterization corresponds closely to informal descriptions of protocols, it
allows a succinct and natural formalization; because it abstracts away message
ordering, and handles communications between principals and applications of
cryptographic primitives uniformly, it is readily represented in a standard
logic. A generic framework in the Alloy modelling language is presented, and
instantiated for two standard protocols, and a new key management scheme.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 15:58:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Torlak",
"Emina",
""
],
[
"van Dijk",
"Marten",
""
],
[
"Gassend",
"Blaise",
""
],
[
"Jackson",
"Daniel",
""
],
[
"Devadas",
"Srinivas",
""
]
]
|
cs/0605111 | Jon Phipps | Diane I. Hillmann (1), Stuart A. Sutton (2), Jon Phipps (1), Ryan
Laundry (2) ((1) Cornell University, (2) University of Washington) | A Metadata Registry from Vocabularies UP: The NSDL Registry Project | Submitted to Dublin Core 2006 Conference (DC2006) | null | null | null | cs.DL | null | The NSDL Metadata Registry is designed to provide humans and machines with
the means to discover, create, access and manage metadata schemes, schemas,
application profiles, crosswalks and concept mappings. This paper describes the
general goals and architecture of the NSDL Metadata Registry as well as issues
encountered during the first year of the project's implementation.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 16:51:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hillmann",
"Diane I.",
"",
"Cornell University"
],
[
"Sutton",
"Stuart A.",
"",
"University of Washington"
],
[
"Phipps",
"Jon",
"",
"Cornell University"
],
[
"Laundry",
"Ryan",
"",
"University of Washington"
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.