id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0604014
Habibi Omar Jr.
O. Habibi, U.R. Patihnedj, M.O. Dhar
Towards Analog Reverse Time Computation
null
null
null
null
cs.CC
null
We report the consequences of a destabilization process on a simulated General Purpose Analog Computer. This new technology overcomes problems linked with serial ambiguity, and provides an analog bias to encode algorithms whose complexity is over polynomial. We also implicitly demonstrate how countermesures of the Stochastic Aperture Degeneracy could efficiently reach higher computational classes, and would open a road towards Analog Reverse Time Computation.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 23:40:56 GMT" }, { "version": "v2", "created": "Fri, 7 Apr 2006 09:39:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Habibi", "O.", "" ], [ "Patihnedj", "U. R.", "" ], [ "Dhar", "M. O.", "" ] ]
cs/0604015
Dmitri Krioukov
Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley, kc claffy
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
null
PAM 2006, best paper award
null
null
cs.NI cs.LG
null
Although the Internet AS-level topology has been extensively studied over the past few years, little is known about the details of the AS taxonomy. An AS "node" can represent a wide variety of organizations, e.g., large ISP, or small private business, university, with vastly different network characteristics, external connectivity patterns, network growth tendencies, and other properties that we can hardly neglect while working on veracious Internet representations in simulation environments. In this paper, we introduce a radically new approach based on machine learning techniques to map all the ASes in the Internet into a natural AS taxonomy. We successfully classify 95.3% of ASes with expected accuracy of 78.1%. We release to the community the AS-level topology dataset augmented with: 1) the AS taxonomy information and 2) the set of AS attributes we used to classify ASes. We believe that this dataset will serve as an invaluable addition to further understanding of the structure and evolution of the Internet.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 00:08:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Krioukov", "Dmitri", "" ], [ "Riley", "George", "" ], [ "claffy", "kc", "" ] ]
cs/0604016
Michael Baer
Michael B. Baer
On Conditional Branches in Optimal Search Trees
8 pages, 5 figures (with 10 illustrations total), 1 table; reformatted with some additional notes
null
null
null
cs.PF cs.DS cs.IR
null
Algorithms for efficiently finding optimal alphabetic decision trees -- such as the Hu-Tucker algorithm -- are well established and commonly used. However, such algorithms generally assume that the cost per decision is uniform and thus independent of the outcome of the decision. The few algorithms without this assumption instead use one cost if the decision outcome is ``less than'' and another cost otherwise. In practice, neither assumption is accurate for software optimized for today's microprocessors. Such software generally has one cost for the more likely decision outcome and a greater cost -- often far greater -- for the less likely decision outcome. This problem and generalizations thereof are thus applicable to hard coding static decision tree instances in software, e.g., for optimizing program bottlenecks or for compiling switch statements. An O(n^3)-time O(n^2)-space dynamic programming algorithm can solve this optimal binary decision tree problem, and this approach has many generalizations that optimize for the behavior of processors with predictive branch capabilities, both static and dynamic. Solutions to this formulation are often faster in practice than ``optimal'' decision trees as formulated in the literature. Different search paradigms can sometimes yield even better performance.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 00:54:44 GMT" }, { "version": "v2", "created": "Tue, 23 May 2006 05:07:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
cs/0604018
Suneel Madhekar
Madhekar Suneel
Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map
Submitted to the Indian Academy of Sciences for possible publication in Sadhana (Academy Proceedings in Engineering Sciences). Results of statistical tests included. Introduction revised
null
null
null
cs.CR nlin.CD
null
A scheme for pseudo-random binary sequence generation based on the two-dimensional discrete-time Henon map is proposed. Properties of the proposed sequences pertaining to linear complexity, linear complexity profile, correlation and auto-correlation are investigated. All these properties of the sequences suggest a strong resemblance to random sequences. Results of statistical testing of the sequences are found encouraging. An attempt is made to estimate the keyspace size if the proposed scheme is used for cryptographic applications. The keyspace size is found to be large and is dependent on the precision of the computing platform used.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 09:13:55 GMT" }, { "version": "v2", "created": "Wed, 16 Aug 2006 16:56:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Suneel", "Madhekar", "" ] ]
cs/0604019
Thomas Giuli
K. Venkatesh Prasad, TJ Giuli, and David Watson
The Case for Modeling Security, Privacy, Usability and Reliability (SPUR) in Automotive Software
12 pages, 3 figures, presented at the 2006 Automotive Software Workshop, San Diego, CA
null
null
null
cs.SE cs.CR cs.HC
null
Over the past five years, there has been considerable growth and established value in the practice of modeling automotive software requirements. Much of this growth has been centered on requirements of software associated with the established functional areas of an automobile, such as those associated with powertrain, chassis, body, safety and infotainment. This paper makes a case for modeling four additional attributes that are increasingly important as vehicles become information conduits: security, privacy, usability, and reliability. These four attributes are important in creating specifications for embedded in-vehicle automotive software.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 13:23:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Prasad", "K. Venkatesh", "" ], [ "Giuli", "TJ", "" ], [ "Watson", "David", "" ] ]
cs/0604020
Bodo Manthey
Bodo Manthey
Approximation Algorithms for Restricted Cycle Covers Based on Cycle Decompositions
This paper has been joint with "On Approximating Restricted Cycle Covers" (cs.CC/0504038). Please refer to that paper. The paper "Approximation Algorithms for Restricted Cycle Covers Based on Cycle Decompositions" is now obsolete
null
null
null
cs.DS cs.CC cs.DM
null
A cycle cover of a graph is a set of cycles such that every vertex is part of exactly one cycle. An L-cycle cover is a cycle cover in which the length of every cycle is in the set L. The weight of a cycle cover of an edge-weighted graph is the sum of the weights of its edges. We come close to settling the complexity and approximability of computing L-cycle covers. On the one hand, we show that for almost all L, computing L-cycle covers of maximum weight in directed and undirected graphs is APX-hard and NP-hard. Most of our hardness results hold even if the edge weights are restricted to zero and one. On the other hand, we show that the problem of computing L-cycle covers of maximum weight can be approximated within a factor of 2 for undirected graphs and within a factor of 8/3 in the case of directed graphs. This holds for arbitrary sets L.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 13:53:25 GMT" }, { "version": "v2", "created": "Wed, 3 May 2006 13:01:24 GMT" }, { "version": "v3", "created": "Thu, 29 Jun 2006 07:32:39 GMT" }, { "version": "v4", "created": "Fri, 15 Dec 2006 14:16:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Manthey", "Bodo", "" ] ]
cs/0604024
Joel Friedman
Joel Friedman
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity II: A Simple Example
8 pages
null
null
null
cs.CC math.AG
null
In a previous paper we have suggested a number of ideas to attack circuit size complexity with cohomology. As a simple example, we take circuits that can only compute the AND of two inputs, which essentially reduces to SET COVER. We show a very special case of the cohomological approach (one particular free category, using injective and superskyscraper sheaves) gives the linear programming bound coming from the relaxation of the standard integer programming reformulation of SET COVER.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 20:07:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Joel", "" ] ]
cs/0604026
Damiano Bolzoni
Damiano Bolzoni, Sandro Etalle
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
null
null
null
TR-CTIT-06-13
cs.CR
null
We present APHRODITE, an architecture designed to reduce false positives in network intrusion detection systems. APHRODITE works by detecting anomalies in the output traffic, and by correlating them with the alerts raised by the NIDS working on the input traffic. Benchmarks show a substantial reduction of false positives and that APHRODITE is effective also after a "quick setup", i.e. in the realistic case in which it has not been "trained" and set up optimally
[ { "version": "v1", "created": "Fri, 7 Apr 2006 12:13:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Bolzoni", "Damiano", "" ], [ "Etalle", "Sandro", "" ] ]
cs/0604032
Martin Ziegler
Martin Ziegler and Klaus Meer
Real Computational Universality: The Word Problem for a class of groups with infinite presentation
corrected Section 4.5
null
null
null
cs.LO cs.SC
null
The word problem for discrete groups is well-known to be undecidable by a Turing Machine; more precisely, it is reducible both to and from and thus equivalent to the discrete Halting Problem. The present work introduces and studies a real extension of the word problem for a certain class of groups which are presented as quotient groups of a free group and a normal subgroup. Most important, the free group will be generated by an uncountable set of generators with index running over certain sets of real numbers. This allows to include many mathematically important groups which are not captured in the framework of the classical word problem. Our contribution extends computational group theory from the discrete to the Blum-Shub-Smale (BSS) model of real number computation. We believe this to be an interesting step towards applying BSS theory, in addition to semi-algebraic geometry, also to further areas of mathematics. The main result establishes the word problem for such groups to be not only semi-decidable (and thus reducible FROM) but also reducible TO the Halting Problem for such machines. It thus provides the first non-trivial example of a problem COMPLETE, that is, computationally universal for this model.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 23:57:46 GMT" }, { "version": "v2", "created": "Tue, 11 Apr 2006 11:38:19 GMT" }, { "version": "v3", "created": "Wed, 7 Jun 2006 07:48:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Ziegler", "Martin", "" ], [ "Meer", "Klaus", "" ] ]
cs/0604035
R N Mohan Professor
R.N.Mohan, Sanpei Kageyama, Moon Ho Lee, Gao Yang
Certain new M-matrices and their properties and applications
21 pages,3 figures
null
null
null
cs.DM
null
The Mn-matrix was defined by Mohan [20] in which he has shown a method of constructing (1,-1)-matrices and studied some of their properties. The (1,-1)-matrices were constructed and studied by Cohn [5],Wang [33], Ehrlich [8] and Ehrlich and Zeller[9]. But in this paper, while giving some resemblances of this matrix with Hadamard matrix, and by naming it as M-matrix, we show how to construct partially balanced incomplete block (PBIB) designs and some regular bipartite graphs by it. We have considered two types of these M- matrices. Also we will make a mention of certain applications of these M-matrices in signal and communication processing, and network systems and end with some open problems.
[ { "version": "v1", "created": "Sun, 9 Apr 2006 06:02:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohan", "R. N.", "" ], [ "Kageyama", "Sanpei", "" ], [ "Lee", "Moon Ho", "" ], [ "Yang", "Gao", "" ] ]
cs/0604036
Jakob Vo{\ss}
Jakob Voss
Collaborative thesaurus tagging the Wikipedia way
7 pages, 7 figures, 7 tables; v2 with added appendix and fixed references
null
null
null
cs.IR cs.DL
null
This paper explores the system of categories that is used to classify articles in Wikipedia. It is compared to collaborative tagging systems like del.icio.us and to hierarchical classification like the Dewey Decimal Classification (DDC). Specifics and commonalitiess of these systems of subject indexing are exposed. Analysis of structural and statistical properties (descriptors per record, records per descriptor, descriptor levels) shows that the category system of Wikimedia is a thesaurus that combines collaborative tagging and hierarchical subject indexing in a special way.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 12:04:29 GMT" }, { "version": "v2", "created": "Thu, 27 Apr 2006 00:41:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Voss", "Jakob", "" ] ]
cs/0604038
Evgueni Petrov
E. Petrov, Yu. Kostov, E. Botoeva
UniCalc.LIN: a linear constraint solver for the UniCalc system
rejected by the programm committee of the conforence on Perspective of System Informatics held in Novosibirsk, Russian Federation July 2006
null
null
null
cs.MS cs.AI
null
In this short paper we present a linear constraint solver for the UniCalc system, an environment for reliable solution of mathematical modeling problems.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 06:30:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrov", "E.", "" ], [ "Kostov", "Yu.", "" ], [ "Botoeva", "E.", "" ] ]
cs/0604039
Laurent Mazet PhD
David Bateman, Laurent Mazet, Veronique Buzenac-Settineri and Markus Muck
A Fixed-Point Type for Octave
5 pages, 1 figure
null
null
octave2006/12
cs.MS
null
This paper announces the availability of a fixed point toolbox for the Matlab compatible software package Octave. This toolbox is released under the GNU Public License, and can be used to model the losses in algorithms implemented in hardware. Furthermore, this paper presents as an example of the use of this toolbox, the effects of a fixed point implementation on the precision of an OFDM modulator.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 08:22:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Bateman", "David", "" ], [ "Mazet", "Laurent", "" ], [ "Buzenac-Settineri", "Veronique", "" ], [ "Muck", "Markus", "" ] ]
cs/0604042
Florentin Smarandache
M. C. Florea, J. Dezert, P. Valin, F. Smarandache, Anne-Laure Jousselme
Adaptative combination rule and proportional conflict redistribution rule for information fusion
Presented at Cogis '06 Conference, Paris, March 2006
null
null
null
cs.AI
null
This paper presents two new promising rules of combination for the fusion of uncertain and potentially highly conflicting sources of evidences in the framework of the theory of belief functions in order to palliate the well-know limitations of Dempster's rule and to work beyond the limits of applicability of the Dempster-Shafer theory. We present both a new class of adaptive combination rules (ACR) and a new efficient Proportional Conflict Redistribution (PCR) rule allowing to deal with highly conflicting sources for static and dynamic fusion applications.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 14:35:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Florea", "M. C.", "" ], [ "Dezert", "J.", "" ], [ "Valin", "P.", "" ], [ "Smarandache", "F.", "" ], [ "Jousselme", "Anne-Laure", "" ] ]
cs/0604043
Thomas Way
Thomas P. Way and Lori L. Pollock
Demand-driven Inlining in a Region-based Optimizer for ILP Architectures
23 pages
null
null
null
cs.DC cs.PL
null
Region-based compilation repartitions a program into more desirable compilation units using profiling information and procedure inlining to enable region formation analysis. Heuristics play a key role in determining when it is most beneficial to inline procedures during region formation. An ILP optimizing compiler using a region-based approach restructures a program to better reflect dynamic behavior and increase interprocedural optimization and scheduling opportunities. This paper presents an interprocedural compilation technique which performs procedure inlining on-demand, rather than as a separate phase, to improve the ability of a region-based optimizer to control code growth, compilation time and memory usage while improving performance. The interprocedural region formation algorithm utilizes a demand-driven, heuristics-guided approach to inlining, restructuring an input program into interprocedural regions. Experimental results are presented to demonstrate the impact of the algorithm and several inlining heuristics upon a number of traditional and novel compilation characteristics within a region-based ILP compiler and simulator.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 04:15:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Way", "Thomas P.", "" ], [ "Pollock", "Lori L.", "" ] ]
cs/0604045
Sandor P. Fekete
Sandor P. Fekete and Joerg Schepers and Jan C. van der Veen
An exact algorithm for higher-dimensional orthogonal packing
31 pages, 6 figures, 9 tables, to appear in Operations Research; full and updated journal version of sketches that appeared as parts of an extended abstract in ESA'97
null
null
null
cs.DS
null
Higher-dimensional orthogonal packing problems have a wide range of practical applications, including packing, cutting, and scheduling. Combining the use of our data structure for characterizing feasible packings with our new classes of lower bounds, and other heuristics, we develop a two-level tree search algorithm for solving higher-dimensional packing problems to optimality. Computational results are reported, including optimal solutions for all two--dimensional test problems from recent literature. This is the third in a series of articles describing new approaches to higher-dimensional packing; see cs.DS/0310032 and cs.DS/0402044.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 13:55:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Schepers", "Joerg", "" ], [ "van der Veen", "Jan C.", "" ] ]
cs/0604046
Michael Aupetit
Dominique Lepetz, Max Nemoz-Gaillard and Michael Aupetit
Concerning the differentiability of the energy function in vector quantization algorithms
Under submission to a peer-reviewed international journal
null
null
null
cs.LG cs.NE
null
The adaptation rule for Vector Quantization algorithms, and consequently the convergence of the generated sequence, depends on the existence and properties of a function called the energy function, defined on a topological manifold. Our aim is to investigate the conditions of existence of such a function for a class of algorithms examplified by the initial ''K-means'' and Kohonen algorithms. The results presented here supplement previous studies and show that the energy function is not always a potential but at least the uniform limit of a series of potential functions which we call a pseudo-potential. Our work also shows that a large number of existing vector quantization algorithms developped by the Artificial Neural Networks community fall into this category. The framework we define opens the way to study the convergence of all the corresponding adaptation rules at once, and a theorem gives promising insights in that direction. We also demonstrate that the ''K-means'' energy function is a pseudo-potential but not a potential in general. Consequently, the energy function associated to the ''Neural-Gas'' is not a potential in general.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 14:00:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Lepetz", "Dominique", "" ], [ "Nemoz-Gaillard", "Max", "" ], [ "Aupetit", "Michael", "" ] ]
cs/0604047
rapha?l Jungers
Rapha\"el Jungers, Vladimir Protasov, Vincent D. Blondel
Efficient algorithms for deciding the type of growth of products of integer matrices
20 pages, 4 figures, submitted to LAA
null
null
null
cs.CC
null
For a given finite set $\Sigma$ of matrices with nonnegative integer entries we study the growth of $$ \max_t(\Sigma) = \max\{\|A_{1}... A_{t}\|: A_i \in \Sigma\}.$$ We show how to determine in polynomial time whether the growth with $t$ is bounded, polynomial, or exponential, and we characterize precisely all possible behaviors.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 14:10:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Jungers", "Raphaël", "" ], [ "Protasov", "Vladimir", "" ], [ "Blondel", "Vincent D.", "" ] ]
cs/0604048
Vita Hinze-Hoare
Vita Hinze-Hoare
Will the Butterfly Cipher keep your Network Data secure? Developments in Computer Encryption
null
null
null
null
cs.CR
null
This paper explains the recent developments in security and encryption. The Butterfly cipher and quantum cryptography are reviewed and compared. Examples of their relative uses are discussed and suggestions for future developments considered. In addition application to network security together with a substantial review of classification of encryption systems and a summary of security weaknesses are considered.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 20:21:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
cs/0604051
Michael Brinkmeier
Michael Brinkmeier
Structural Alignments of pseudo-knotted RNA-molecules in polynomial time
16 pages
null
null
null
cs.DS cs.CC cs.DM
null
An RNA molecule is structured on several layers. The primary and most obvious structure is its sequence of bases, i.e. a word over the alphabet {A,C,G,U}. The higher structure is a set of one-to-one base-pairings resulting in a two-dimensional folding of the one-dimensional sequence. One speaks of a secondary structure if these pairings do not cross and of a tertiary structure otherwise. Since the folding of the molecule is important for its function, the search for related RNA molecules should not only be restricted to the primary structure. It seems sensible to incorporate the higher structures in the search. Based on this assumption and certain edit-operations a distance between two arbitrary structures can be defined. It is known that the general calculation of this measure is NP-complete \cite{zhang02similarity}. But for some special cases polynomial algorithms are known. Using a new formal description of secondary and tertiary structures, we extend the class of structures for which the distance can be calculated in polynomial time. In addition the presented algorithm may be used to approximate the edit-distance between two arbitrary structures with a constant ratio.
[ { "version": "v1", "created": "Wed, 12 Apr 2006 06:46:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Brinkmeier", "Michael", "" ] ]
cs/0604053
Maciej Kurant
Maciej Kurant, Patrick Thiran
Survivable Routing in IP-over-WDM Networks in the Presence of Multiple Failures
8 pages, 6 figures
null
null
null
cs.NI
null
Failure restoration at the IP layer in IP-over-WDM networks requires to map the IP topology on the WDM topology in such a way that a failure at the WDM layer leaves the IP topology connected. Such a mapping is called $survivable$. As finding a survivable mapping is known to be NP-complete, in practice it requires a heuristic approach. We have introduced in [1] a novel algorithm called ``SMART'', that is more effective and scalable than the heuristics known to date. Moreover, the formal analysis of SMART [2] has led to new applications: the formal verification of the existence of a survivable mapping, and a tool tracing and repairing the vulnerable areas of the network. In this paper we extend the theoretical analysis in [2] by considering $multiple failures$.
[ { "version": "v1", "created": "Wed, 12 Apr 2006 17:10:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurant", "Maciej", "" ], [ "Thiran", "Patrick", "" ] ]
cs/0604058
Yury Lifshits
Yury Lifshits
Solving Classical String Problems on Compressed Texts
10 pages, 6 figures, submitted
null
null
null
cs.DS cs.CC
null
Here we study the complexity of string problems as a function of the size of a program that generates input. We consider straight-line programs (SLP), since all algorithms on SLP-generated strings could be applied to processing LZ-compressed texts. The main result is a new algorithm for pattern matching when both a text T and a pattern P are presented by SLPs (so-called fully compressed pattern matching problem). We show how to find a first occurrence, count all occurrences, check whether any given position is an occurrence or not in time O(n^2m). Here m,n are the sizes of straight-line programs generating correspondingly P and T. Then we present polynomial algorithms for computing fingerprint table and compressed representation of all covers (for the first time) and for finding periods of a given compressed string (our algorithm is faster than previously known). On the other hand, we show that computing the Hamming distance between two SLP-generated strings is NP- and coNP-hard.
[ { "version": "v1", "created": "Thu, 13 Apr 2006 08:12:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Lifshits", "Yury", "" ] ]
cs/0604059
Olivier Devillers
Olivier Devillers (INRIA Sophia Antipolis), Philippe Guigue (INRIA Sophia Antipolis)
Inner and Outer Rounding of Boolean Operations on Lattice Polygonal Regions
null
null
null
null
cs.CG
null
Robustness problems due to the substitution of the exact computation on real numbers by the rounded floating point arithmetic are often an obstacle to obtain practical implementation of geometric algorithms. If the adoption of the --exact computation paradigm--[Yap et Dube] gives a satisfactory solution to this kind of problems for purely combinatorial algorithms, this solution does not allow to solve in practice the case of algorithms that cascade the construction of new geometric objects. In this report, we consider the problem of rounding the intersection of two polygonal regions onto the integer lattice with inclusion properties. Namely, given two polygonal regions A and B having their vertices on the integer lattice, the inner and outer rounding modes construct two polygonal regions with integer vertices which respectively is included and contains the true intersection. We also prove interesting results on the Hausdorff distance, the size and the convexity of these polygonal regions.
[ { "version": "v1", "created": "Thu, 13 Apr 2006 14:33:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "", "INRIA Sophia Antipolis" ], [ "Guigue", "Philippe", "", "INRIA\n Sophia Antipolis" ] ]
cs/0604061
Edwin Henneken
Edwin A. Henneken, Michael J. Kurtz, Guenther Eichhorn, Alberto Accomazzi, Carolyn Grant, Donna Thompson, Stephen S. Murray
Effect of E-printing on Citation Rates in Astronomy and Physics
Submitted to the Journal of Electronic Publishing. 11 pages with 5 figures
null
null
null
cs.DL astro-ph
null
In this report we examine the change in citation behavior since the introduction of the arXiv e-print repository (Ginsparg, 2001). It has been observed that papers that initially appear as arXiv e-prints get cited more than papers that do not (Lawrence, 2001; Brody et al., 2004; Schwarz & Kennicutt, 2004; Kurtz et al., 2005a, Metcalfe, 2005). Using the citation statistics from the NASA-Smithsonian Astrophysics Data System (ADS; Kurtz et al., 1993, 2000), we confirm the findings from other studies, we examine the average citation rate to e-printed papers in the Astrophysical Journal, and we show that for a number of major astronomy and physics journals the most important papers are submitted to the arXiv e-print repository first.
[ { "version": "v1", "created": "Thu, 13 Apr 2006 22:02:05 GMT" }, { "version": "v2", "created": "Mon, 5 Jun 2006 11:47:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Henneken", "Edwin A.", "" ], [ "Kurtz", "Michael J.", "" ], [ "Eichhorn", "Guenther", "" ], [ "Accomazzi", "Alberto", "" ], [ "Grant", "Carolyn", "" ], [ "Thompson", "Donna", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0604062
Liang Wu
Liang Wu
Biologically Inspired Hierarchical Model for Feature Extraction and Localization
4 pages, 4 figures
null
null
null
cs.CV
null
Feature extraction and matching are among central problems of computer vision. It is inefficent to search features over all locations and scales. Neurophysiological evidence shows that to locate objects in a digital image the human visual system employs visual attention to a specific object while ignoring others. The brain also has a mechanism to search from coarse to fine. In this paper, we present a feature extractor and an associated hierarchical searching model to simulate such processes. With the hierarchical representation of the object, coarse scanning is done through the matching of the larger scale and precise localization is conducted through the matching of the smaller scale. Experimental results justify the proposed model in its effectiveness and efficiency to localize features.
[ { "version": "v1", "created": "Fri, 14 Apr 2006 04:40:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Wu", "Liang", "" ] ]
cs/0604064
Mirco Mannucci Ph.D.
Mirco A. Mannucci
Quantum Fuzzy Sets: Blending Fuzzy Set Theory and Quantum Computation
12 pages
null
null
null
cs.LO cs.AI
null
In this article we investigate a way in which quantum computing can be used to extend the class of fuzzy sets. The core idea is to see states of a quantum register as characteristic functions of quantum fuzzy subsets of a given set. As the real unit interval is embedded in the Bloch sphere, every fuzzy set is automatically a quantum fuzzy set. However, a generic quantum fuzzy set can be seen as a (possibly entangled) superposition of many fuzzy sets at once, offering new opportunities for modeling uncertainty. After introducing the main framework of quantum fuzzy set theory, we analyze the standard operations of fuzzification and defuzzification from our viewpoint. We conclude this preliminary paper with a list of possible applications of quantum fuzzy sets to pattern recognition, as well as future directions of pure research in quantum fuzzy set theory.
[ { "version": "v1", "created": "Sun, 16 Apr 2006 16:23:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Mannucci", "Mirco A.", "" ] ]
cs/0604066
Elias Tsigaridas
Elias P. Tsigaridas and Ioannis Z. Emiris
Univariate polynomial real root isolation: Continued Fractions revisited
12 pages
null
null
null
cs.SC cs.CC cs.MS
null
We present algorithmic, complexity and implementation results concerning real root isolation of integer univariate polynomials using the continued fraction expansion of real algebraic numbers. One motivation is to explain the method's good performance in practice. We improve the previously known bound by a factor of $d \tau$, where $d$ is the polynomial degree and $\tau$ bounds the coefficient bitsize, thus matching the current record complexity for real root isolation by exact methods. Namely, the complexity bound is $\sOB(d^4 \tau^2)$ using the standard bound on the expected bitsize of the integers in the continued fraction expansion. We show how to compute the multiplicities within the same complexity and extend the algorithm to non square-free polynomials. Finally, we present an efficient open-source \texttt{C++} implementation in the algebraic library \synaps, and illustrate its efficiency as compared to other available software. We use polynomials with coefficient bitsize up to 8000 and degree up to 1000.
[ { "version": "v1", "created": "Mon, 17 Apr 2006 10:52:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Tsigaridas", "Elias P.", "" ], [ "Emiris", "Ioannis Z.", "" ] ]
cs/0604067
R.N.Mohan Professor
R.N.Mohan, Moon Ho Lee, Subhash Pokrel
Certain t-partite graphs
null
null
null
null
cs.DM
null
By making use of the generalized concept of orthogonality in Latin squares, certain t-partite graphs have been constructed and a suggestion for a net work system and some applications have been made.
[ { "version": "v1", "created": "Tue, 18 Apr 2006 09:30:55 GMT" }, { "version": "v2", "created": "Thu, 11 May 2006 00:11:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohan", "R. N.", "" ], [ "Lee", "Moon Ho", "" ], [ "Pokrel", "Subhash", "" ] ]
cs/0604068
Christian Klein
Benjamin Doerr and Tobias Friedrich and Christian Klein and Ralf Osbild
Unbiased Matrix Rounding
10th Scandinavian Workshop on Algorithm Theory (SWAT), 2006, to appear
null
null
null
cs.DS cs.DM
null
We show several ways to round a real matrix to an integer one such that the rounding errors in all rows and columns as well as the whole matrix are less than one. This is a classical problem with applications in many fields, in particular, statistics. We improve earlier solutions of different authors in two ways. For rounding matrices of size $m \times n$, we reduce the runtime from $O((m n)^2 Second, our roundings also have a rounding error of less than one in all initial intervals of rows and columns. Consequently, arbitrary intervals have an error of at most two. This is particularly useful in the statistics application of controlled rounding. The same result can be obtained via (dependent) randomized rounding. This has the additional advantage that the rounding is unbiased, that is, for all entries $y_{ij}$ of our rounding, we have $E(y_{ij}) = x_{ij}$, where $x_{ij}$ is the corresponding entry of the input matrix.
[ { "version": "v1", "created": "Tue, 18 Apr 2006 15:08:37 GMT" }, { "version": "v2", "created": "Thu, 20 Apr 2006 18:25:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Doerr", "Benjamin", "" ], [ "Friedrich", "Tobias", "" ], [ "Klein", "Christian", "" ], [ "Osbild", "Ralf", "" ] ]
cs/0604071
Nuno Santos
Nuno Santos, Birger Koblitz
Distributed Metadata with the AMGA Metadata Catalog
6 pages, 3 figures, to appear in Workshop on Next-Generation Distributed Data Management - HPDC-15
null
null
null
cs.DC cs.DB
null
Catalog Services play a vital role on Data Grids by allowing users and applications to discover and locate the data needed. On large Data Grids, with hundreds of geographically distributed sites, centralized Catalog Services do not provide the required scalability, performance or fault-tolerance. In this article, we start by presenting and discussing the general requirements on Grid Catalogs of applications being developed by the EGEE user community. This provides the motivation for the second part of the article, where we present the replication and distribution mechanisms we have designed and implemented into the AMGA Metadata Catalog, which is part of the gLite software stack being developed for the EGEE project. Implementing these mechanisms in the catalog itself has the advantages of not requiring any special support from the relational database back-end, of being database independent, and of allowing tailoring the mechanisms to the specific requirements and characteristics of Metadata Catalogs.
[ { "version": "v1", "created": "Wed, 19 Apr 2006 10:01:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Santos", "Nuno", "" ], [ "Koblitz", "Birger", "" ] ]
cs/0604073
Muthiah Annamalai
Muthiah Annamalai, Hemant Kumar, Leela Velusamy
Octave-GTK: A GTK binding for GNU Octave
Comments: Presented at Octave2006 Conference, Washington D.C
null
null
Octave2006/02
cs.SE
null
This paper discusses the problems faced with interoperability between two programming languages, with respect to GNU Octave, and GTK API written in C, to provide the GTK API on Octave.Octave-GTK is the fusion of two different API's: one exported by GNU Octave [scientific computing tool] and the other GTK [GUI toolkit]; this enables one to use GTK primitives within GNU Octave, to build graphical front ends,at the same time using octave engine for number crunching power. This paper illustrates our implementation of binding logic, and shows results extended to various other libraries using the same base code generator. Also shown, are methods of code generation, binding automation, and the niche we plan to fill in the absence of GUI in Octave. Canonical discussion of advantages, feasibility and problems faced in the process are elucidated.
[ { "version": "v1", "created": "Wed, 19 Apr 2006 16:46:23 GMT" }, { "version": "v2", "created": "Fri, 28 Apr 2006 18:43:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Annamalai", "Muthiah", "" ], [ "Kumar", "Hemant", "" ], [ "Velusamy", "Leela", "" ] ]
cs/0604075
Gyorgy Korniss
Qiming Lu, G. Korniss, and Boleslaw K. Szymanski
Naming Games in Spatially-Embedded Random Networks
We have found a programming error in our code used to generate the results of the earlier version. We have corrected the error, reran all simulations, and regenerated all data plots. While the qualitative behavior of the model has not changed, the numerical values of some of the scaling exponents did. 7 figures
Proceedings of the 2006 American Association for Artificial Intelligence Fall Symposium Series, Interaction and Emergent Phenomena in Societies of Agents (AAAI Press, Menlo Park, CA 2006) pp. 148-155
null
null
cs.MA cond-mat.stat-mech cs.AI
null
We investigate a prototypical agent-based model, the Naming Game, on random geometric networks. The Naming Game is a minimal model, employing local communications that captures the emergence of shared communication schemes (languages) in a population of autonomous semiotic agents. Implementing the Naming Games on random geometric graphs, local communications being local broadcasts, serves as a model for agreement dynamics in large-scale, autonomously operating wireless sensor networks. Further, it captures essential features of the scaling properties of the agreement process for spatially-embedded autonomous agents. We also present results for the case when a small density of long-range communication links are added on top of the random geometric graph, resulting in a "small-world"-like network and yielding a significantly reduced time to reach global agreement.
[ { "version": "v1", "created": "Wed, 19 Apr 2006 17:48:11 GMT" }, { "version": "v2", "created": "Fri, 28 Jul 2006 21:35:33 GMT" }, { "version": "v3", "created": "Mon, 7 May 2007 21:10:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Lu", "Qiming", "" ], [ "Korniss", "G.", "" ], [ "Szymanski", "Boleslaw K.", "" ] ]
cs/0604076
Loreto Bravo
Loreto Bravo and Leopoldo Bertossi
Semantically Correct Query Answers in the Presence of Null Values
20 pages. To appear in Proc. of International Workshop on Inconsistency and Incompleteness in Databases (IIDB 2006)
null
null
null
cs.DB
null
For several reasons a database may not satisfy a given set of integrity constraints(ICs), but most likely most of the information in it is still consistent with those ICs; and could be retrieved when queries are answered. Consistent answers to queries wrt a set of ICs have been characterized as answers that can be obtained from every possible minimally repaired consistent version of the original database. In this paper we consider databases that contain null values and are also repaired, if necessary, using null values. For this purpose, we propose first a precise semantics for IC satisfaction in a database with null values that is compatible with the way null values are treated in commercial database management systems. Next, a precise notion of repair is introduced that privileges the introduction of null values when repairing foreign key constraints, in such a way that these new values do not create an infinite cycle of new inconsistencies. Finally, we analyze how to specify this kind of repairs of a database that contains null values using disjunctive logic programs with stable model semantics.
[ { "version": "v1", "created": "Wed, 19 Apr 2006 22:33:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Bravo", "Loreto", "" ], [ "Bertossi", "Leopoldo", "" ] ]
cs/0604078
Maria Chli
Maria Chli, Philippe De Wilde
The emergence of knowledge exchange: an agent-based model of a software market
fixed legend problem
null
null
null
cs.MA cs.CE
null
We investigate knowledge exchange among commercial organisations, the rationale behind it and its effects on the market. Knowledge exchange is known to be beneficial for industry, but in order to explain it, authors have used high level concepts like network effects, reputation and trust. We attempt to formalise a plausible and elegant explanation of how and why companies adopt information exchange and why it benefits the market as a whole when this happens. This explanation is based on a multi-agent model that simulates a market of software providers. Even though the model does not include any high-level concepts, information exchange naturally emerges during simulations as a successful profitable behaviour. The conclusions reached by this agent-based analysis are twofold: (1) A straightforward set of assumptions is enough to give rise to exchange in a software market. (2) Knowledge exchange is shown to increase the efficiency of the market.
[ { "version": "v1", "created": "Thu, 20 Apr 2006 11:20:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Chli", "Maria", "" ], [ "De Wilde", "Philippe", "" ] ]
cs/0604084
Michael Singer
Ziming Li, Michael F. Singer, Min Wu, Dabin Zheng
A Recursive Method for Determining the One-Dimensional Submodules of Laurent-Ore Modules
To appear in the Proceedings of ISSAC 2006
null
null
null
cs.SC math.CA
null
We present a method for determining the one-dimensional submodules of a Laurent-Ore module. The method is based on a correspondence between hyperexponential solutions of associated systems and one-dimensional submodules. The hyperexponential solutions are computed recursively by solving a sequence of first-order ordinary matrix equations. As the recursion proceeds, the matrix equations will have constant coefficients with respect to the operators that have been considered.
[ { "version": "v1", "created": "Fri, 21 Apr 2006 16:04:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Ziming", "" ], [ "Singer", "Michael F.", "" ], [ "Wu", "Min", "" ], [ "Zheng", "Dabin", "" ] ]
cs/0604086
Michael Fink
Thomas Eiter, Michael Fink, and Hans Tompits
A Knowledge-Based Approach for Selecting Information Sources
53 pages, 2 Figures; to appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.AI
null
Through the Internet and the World-Wide Web, a vast number of information sources has become available, which offer information on various subjects by different providers, often in heterogeneous formats. This calls for tools and methods for building an advanced information-processing infrastructure. One issue in this area is the selection of suitable information sources in query answering. In this paper, we present a knowledge-based approach to this problem, in the setting where one among a set of information sources (prototypically, data repositories) should be selected for evaluating a user query. We use extended logic programs (ELPs) to represent rich descriptions of the information sources, an underlying domain theory, and user queries in a formal query language (here, XML-QL, but other languages can be handled as well). Moreover, we use ELPs for declarative query analysis and generation of a query description. Central to our approach are declarative source-selection programs, for which we define syntax and semantics. Due to the structured nature of the considered data items, the semantics of such programs must carefully respect implicit context information in source-selection rules, and furthermore combine it with possible user preferences. A prototype implementation of our approach has been realized exploiting the DLV KR system and its plp front-end for prioritized ELPs. We describe a representative example involving specific movie databases, and report about experimental results.
[ { "version": "v1", "created": "Fri, 21 Apr 2006 16:53:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiter", "Thomas", "" ], [ "Fink", "Michael", "" ], [ "Tompits", "Hans", "" ] ]
cs/0604087
Yongzhi Cao
Yongzhi Cao, Lirong Xia and Mingsheng Ying
Probabilistic Automata for Computing with Words
35 pages; 3 figures
null
null
null
cs.AI cs.CL
null
Usually, probabilistic automata and probabilistic grammars have crisp symbols as inputs, which can be viewed as the formal models of computing with values. In this paper, we first introduce probabilistic automata and probabilistic grammars for computing with (some special) words in a probabilistic framework, where the words are interpreted as probabilistic distributions or possibility distributions over a set of crisp symbols. By probabilistic conditioning, we then establish a retraction principle from computing with words to computing with values for handling crisp inputs and a generalized extension principle from computing with words to computing with all words for handling arbitrary inputs. These principles show that computing with values and computing with all words can be respectively implemented by computing with some special words. To compare the transition probabilities of two near inputs, we also examine some analytical properties of the transition probability functions of generalized extensions. Moreover, the retractions and the generalized extensions are shown to be equivalence-preserving. Finally, we clarify some relationships among the retractions, the generalized extensions, and the extensions studied recently by Qiu and Wang.
[ { "version": "v1", "created": "Sun, 23 Apr 2006 02:58:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Cao", "Yongzhi", "" ], [ "Xia", "Lirong", "" ], [ "Ying", "Mingsheng", "" ] ]
cs/0604089
Michele Tucci
Michele Tucci
Evolutionary Socioeconomics: a Schumpeterian Computer Simulation
PDF, 15 pages, 5 graphs
null
null
null
cs.GT cs.CY
null
The following note contains a computer simulation concerning the struggle between two companies: the first one is "the biggest zaibatsu of all", while the second one is "small, fast, ruthless". The model is based on a neo-Schumpeterian framework operating in a Darwinian evolutionary environment. After running the program a large number of times, two characteristics stand out: -- There is always a winner which takes it all, while the loser disappears. -- The key to success is the ability to employ efficiently the technological innovations. The topic of the present paper is strictly related with the content of the following notes: Michele Tucci, Evolution and Gravitation: a Computer Simulation of a Non-Walrasian Equilibrium Model; Michele Tucci, Oligopolistic Competition in an Evolutionary Environment: a Computer Simulation. The texts can be downloaded respectively at the following addresses: http://arxiv.org/abs/cs.CY/0209017 http://arxiv.org/abs/cs.CY/0501037 These references include some preliminary considerations regarding the comparison between the evolutionary and the gravitational paradigms and the evaluation of approaches belonging to rival schools of economic thought.
[ { "version": "v1", "created": "Sun, 23 Apr 2006 13:29:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Tucci", "Michele", "" ] ]
cs/0604090
Mirco Mannucci Ph.D.
Mirco A. Mannucci, Lisa Sparks, Daniele C. Struppa
Simplicial models of social aggregation I
31 pages
null
null
null
cs.CE
null
This paper presents the foundational ideas for a new way of modeling social aggregation. Traditional approaches have been using network theory, and the theory of random networks. Under that paradigm, every social agent is represented by a node, and every social interaction is represented by a segment connecting two nodes. Early work in family interactions, as well as more recent work in the study of terrorist organizations, shows that network modeling may be insufficient to describe the complexity of human social structures. Specifically, network theory does not seem to have enough flexibility to represent higher order aggregations, where several agents interact as a group, rather than as a collection of pairs. The model we present here uses a well established mathematical theory, the theory of simplicial complexes, to address this complex issue prevalent in interpersonal and intergroup communication. The theory enables us to provide a richer graphical representation of social interactions, and to determine quantitative mechanisms to describe the robustness of a social structure. We also propose a methodology to create random simplicial complexes, with the purpose of providing a new method to simulate computationally the creation and disgregation of social structures. Finally, we propose several measures which could be taken and observed in order to describe and study an actual social aggregation occurring in interpersonal and intergroup contexts.
[ { "version": "v1", "created": "Sun, 23 Apr 2006 19:28:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Mannucci", "Mirco A.", "" ], [ "Sparks", "Lisa", "" ], [ "Struppa", "Daniele C.", "" ] ]
cs/0604095
Gregory Gutin
Gregory Gutin, Stefan Szeider, Anders Yeo
Fixed-Parameter Complexity of Minimum Profile Problems
null
null
null
null
cs.DS cs.DM
null
Let $G=(V,E)$ be a graph. An ordering of $G$ is a bijection $\alpha: V\dom \{1,2,..., |V|\}.$ For a vertex $v$ in $G$, its closed neighborhood is $N[v]=\{u\in V: uv\in E\}\cup \{v\}.$ The profile of an ordering $\alpha$ of $G$ is $\prf_{\alpha}(G)=\sum_{v\in V}(\alpha(v)-\min\{\alpha(u): u\in N[v]\}).$ The profile $\prf(G)$ of $G$ is the minimum of $\prf_{\alpha}(G)$ over all orderings $\alpha$ of $G$. It is well-known that $\prf(G)$ is the minimum number of edges in an interval graph $H$ that contains $G$ is a subgraph. Since $|V|-1$ is a tight lower bound for the profile of connected graphs $G=(V,E)$, the parametrization above the guaranteed value $|V|-1$ is of particular interest. We show that deciding whether the profile of a connected graph $G=(V,E)$ is at most $|V|-1+k$ is fixed-parameter tractable with respect to the parameter $k$. We achieve this result by reduction to a problem kernel of linear size.
[ { "version": "v1", "created": "Mon, 24 Apr 2006 17:30:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "Gregory", "" ], [ "Szeider", "Stefan", "" ], [ "Yeo", "Anders", "" ] ]
cs/0604096
Tracey Ho
Tracey Ho
Polynomial-time algorithms for coding across multiple unicasts
null
null
null
null
cs.NI
null
We consider the problem of network coding across multiple unicasts. We give, for wired and wireless networks, efficient polynomial time algorithms for finding optimal network codes within the class of network codes restricted to XOR coding between pairs of flows.
[ { "version": "v1", "created": "Tue, 25 Apr 2006 02:55:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Ho", "Tracey", "" ] ]
cs/0604100
Abhishek Parakh
Abhishek Parakh
Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric Oblivious Key Exchange
7 pages, with minor typographical corrections.
null
null
null
cs.CR
null
This paper presents protocols for Kak's cubic transformation and proposes a modification to Diffie-Hellman key exchange protocol in order to achieve asymmetric oblivious exchange of keys.
[ { "version": "v1", "created": "Tue, 25 Apr 2006 17:39:37 GMT" }, { "version": "v2", "created": "Sun, 1 Apr 2007 17:49:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Parakh", "Abhishek", "" ] ]
cs/0604102
Vita Hinze-Hoare
Vita Hinze-Hoare
HCI and Educational Metrics as Tools for VLE Evaluation
null
null
null
null
cs.HC cs.LG
null
The general set of HCI and Educational principles are considered and a classification system constructed. A frequency analysis of principles is used to obtain the most significant set. Metrics are devised to provide objective measures of these principles and a consistent testing regime devised. These principles are used to analyse Blackboard and Moodle.
[ { "version": "v1", "created": "Tue, 25 Apr 2006 19:32:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
cs/0604103
Vita Hinze-Hoare
Vita Hinze-Hoare
Further Evaluationh of VLEs using HCI and Educational Metrics
null
null
null
null
cs.HC
null
Under consideration are the general set of Human computer Interaction (HCI) and Educational principles from prominent authors in the field and the construction of a system for evaluating Virtual Learning Environments (VLEs) with respect to the application of these HCI and Educational Principles. A frequency analysis of principles is used to obtain the most significant set. Metrics are devised to provide objective measures of these principles and a consistent testing regime is introduced. These principles are used to analyse the University VLE Blackboard. An open source VLE is also constructed with similar content to Blackboard courses so that a systematic comparison can be made. HCI and Educational metrics are determined for each VLE.
[ { "version": "v1", "created": "Tue, 25 Apr 2006 19:53:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
cs/0604105
Farid Benbadis
Farid Benbadis, Jean-Jacques Puig, Marcelo Dias de Amorim, Claude Chaudet, Timur Friedman, David Simplot-Ryl
Jumps: Enhancing hop-count positioning in sensor networks using multiple coordinates
null
null
null
null
cs.NI
null
Positioning systems in self-organizing networks generally rely on measurements such as delay and received signal strength, which may be difficult to obtain and often require dedicated equipment. An alternative to such approaches is to use simple connectivity information, that is, the presence or absence of a link between any pair of nodes, and to extend it to hop-counts, in order to obtain an approximate coordinate system. Such an approximation is sufficient for a large number of applications, such as routing. In this paper, we propose Jumps, a positioning system for those self-organizing networks in which other types of (exact) positioning systems cannot be used or are deemed to be too costly. Jumps builds a multiple coordinate system based solely on nodes neighborhood knowledge. Jumps is interesting in the context of wireless sensor networks, as it neither requires additional embedded equipment nor relies on any nodes capabilities. While other approaches use only three hop-count measurements to infer the position of a node, Jumps uses an arbitrary number. We observe that an increase in the number of measurements leads to an improvement in the localization process, without requiring a high dense environment. We show through simulations that Jumps, when compared with existing approaches, reduces the number of nodes sharing the same coordinates, which paves the way for functions such as position-based routing.
[ { "version": "v1", "created": "Wed, 26 Apr 2006 11:39:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Benbadis", "Farid", "" ], [ "Puig", "Jean-Jacques", "" ], [ "de Amorim", "Marcelo Dias", "" ], [ "Chaudet", "Claude", "" ], [ "Friedman", "Timur", "" ], [ "Simplot-Ryl", "David", "" ] ]
cs/0604108
Francesc Rossell\'o
Francesc Rossello, Gabriel Valiente
An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees
32 pages
null
null
null
cs.DS cs.DM math.CT
null
The relationship between two important problems in tree pattern matching, the largest common subtree and the smallest common supertree problems, is established by means of simple constructions, which allow one to obtain a largest common subtree of two trees from a smallest common supertree of them, and vice versa. These constructions are the same for isomorphic, homeomorphic, topological, and minor embeddings, they take only time linear in the size of the trees, and they turn out to have a clear algebraic meaning.
[ { "version": "v1", "created": "Thu, 27 Apr 2006 10:32:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Rossello", "Francesc", "" ], [ "Valiente", "Gabriel", "" ] ]
cs/0604111
Kristina Lerman
Kristina Lerman, Chris Jones, Aram Galstyan and Maja J Mataric
Analysis of Dynamic Task Allocation in Multi-Robot Systems
Preprint version of the paper published in International Journal of Robotics, March 2006, Volume 25, pp. 225-242
null
null
null
cs.RO cs.MA
null
Dynamic task allocation is an essential requirement for multi-robot systems operating in unknown dynamic environments. It allows robots to change their behavior in response to environmental changes or actions of other robots in order to improve overall system performance. Emergent coordination algorithms for task allocation that use only local sensing and no direct communication between robots are attractive because they are robust and scalable. However, a lack of formal analysis tools makes emergent coordination algorithms difficult to design. In this paper we present a mathematical model of a general dynamic task allocation mechanism. Robots using this mechanism have to choose between two types of task, and the goal is to achieve a desired task division in the absence of explicit communication and global knowledge. Robots estimate the state of the environment from repeated local observations and decide which task to choose based on these observations. We model the robots and observations as stochastic processes and study the dynamics of the collective behavior. Specifically, we analyze the effect that the number of observations and the choice of the decision function have on the performance of the system. The mathematical models are validated in a multi-robot multi-foraging scenario. The model's predictions agree very closely with experimental results from sensor-based simulations.
[ { "version": "v1", "created": "Thu, 27 Apr 2006 23:56:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Lerman", "Kristina", "" ], [ "Jones", "Chris", "" ], [ "Galstyan", "Aram", "" ], [ "Mataric", "Maja J", "" ] ]
cs/0604113
Andrea Sportiello
Sergio Caracciolo, Davide Fichera, Andrea Sportiello
One-in-Two-Matching Problem is NP-complete
30 pages
null
null
null
cs.CC
null
2-dimensional Matching Problem, which requires to find a matching of left- to right-vertices in a balanced $2n$-vertex bipartite graph, is a well-known polynomial problem, while various variants, like the 3-dimensional analogoue (3DM, with triangles on a tripartite graph), or the Hamiltonian Circuit Problem (HC, a restriction to ``unicyclic'' matchings) are among the main examples of NP-hard problems, since the first Karp reduction series of 1972. The same holds for the weighted variants of these problems, the Linear Assignment Problem being polynomial, and the Numerical 3-Dimensional Matching and Travelling Salesman Problem being NP-complete. In this paper we show that a small modification of the 2-dimensional Matching and Assignment Problems in which for each $i \leq n/2$ it is required that either $\pi(2i-1)=2i-1$ or $\pi(2i)=2i$, is a NP-complete problem. The proof is by linear reduction from SAT (or NAE-SAT), with the size $n$ of the Matching Problem being four times the number of edges in the factor graph representation of the boolean problem. As a corollary, in combination with the simple linear reduction of One-in-Two Matching to 3-Dimensional Matching, we show that SAT can be linearly reduced to 3DM, while the original Karp reduction was only cubic.
[ { "version": "v1", "created": "Fri, 28 Apr 2006 16:40:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Caracciolo", "Sergio", "" ], [ "Fichera", "Davide", "" ], [ "Sportiello", "Andrea", "" ] ]
cs/0605003
Amitabh Saxena
Amitabh Saxena and Ben Soh
A New Cryptosystem Based On Hidden Order Groups
removed examples for multiparty key agreement and join protocols, since they are redundant
null
null
null
cs.CR cs.CC
null
Let $G_1$ be a cyclic multiplicative group of order $n$. It is known that the Diffie-Hellman problem is random self-reducible in $G_1$ with respect to a fixed generator $g$ if $\phi(n)$ is known. That is, given $g, g^x\in G_1$ and having oracle access to a `Diffie-Hellman Problem' solver with fixed generator $g$, it is possible to compute $g^{1/x} \in G_1$ in polynomial time (see theorem 3.2). On the other hand, it is not known if such a reduction exists when $\phi(n)$ is unknown (see conjuncture 3.1). We exploit this ``gap'' to construct a cryptosystem based on hidden order groups and present a practical implementation of a novel cryptographic primitive called an \emph{Oracle Strong Associative One-Way Function} (O-SAOWF). O-SAOWFs have applications in multiparty protocols. We demonstrate this by presenting a key agreement protocol for dynamic ad-hoc groups.
[ { "version": "v1", "created": "Sun, 30 Apr 2006 18:13:10 GMT" }, { "version": "v2", "created": "Tue, 2 May 2006 16:59:08 GMT" }, { "version": "v3", "created": "Wed, 3 May 2006 17:55:02 GMT" }, { "version": "v4", "created": "Wed, 3 May 2006 21:23:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Saxena", "Amitabh", "" ], [ "Soh", "Ben", "" ] ]
cs/0605004
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
Novel Reversible Multiplier Architecture Using Reversible TSG Gate
4 Pages; Published in Proceedings of the 4th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-06), Dubai, March 2006. pp. 100-103. Contains the missing reference
null
null
null
cs.AR
null
In the recent years, reversible logic has emerged as a promising technology having its applications in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. Recently a 4 * 4 reversible gate called TSG is proposed. The most significant aspect of the proposed gate is that it can work singly as a reversible full adder, that is reversible full adder can now be implemented with a single gate only. This paper proposes a NXN reversible multiplier using TSG gate. It is based on two concepts. The partial products can be generated in parallel with a delay of d using Fredkin gates and thereafter the addition can be reduced to log2N steps by using reversible parallel adder designed from TSG gates. Similar multiplier architecture in conventional arithmetic (using conventional logic) has been reported in existing literature, but the proposed one in this paper is totally based on reversible logic and reversible cells as its building block. A 4x4 architecture of the proposed reversible multiplier is also designed. It is demonstrated that the proposed multiplier architecture using the TSG gate is much better and optimized, compared to its existing counterparts in literature; in terms of number of reversible gates and garbage outputs. Thus, this paper provides the initial threshold to building of more complex system which can execute more complicated operations using reversible logic.
[ { "version": "v1", "created": "Mon, 1 May 2006 09:34:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
cs/0605008
Arnaud Durand
Arnaud Durand (ELM), Etienne Grandjean (GREYC)
The complexity of acyclic conjunctive queries revisited
30 pages
null
null
null
cs.LO
null
In this paper, we consider first-order logic over unary functions and study the complexity of the evaluation problem for conjunctive queries described by such kind of formulas. A natural notion of query acyclicity for this language is introduced and we study the complexity of a large number of variants or generalizations of acyclic query problems in that context (Boolean or not Boolean, with or without inequalities, comparisons, etc...). Our main results show that all those problems are \textit{fixed-parameter linear} i.e. they can be evaluated in time $f(|Q|).|\textbf{db}|.|Q(\textbf{db})|$ where $|Q|$ is the size of the query $Q$, $|\textbf{db}|$ the database size, $|Q(\textbf{db})|$ is the size of the output and $f$ is some function whose value depends on the specific variant of the query problem (in some cases, $f$ is the identity function). Our results have two kinds of consequences. First, they can be easily translated in the relational (i.e., classical) setting. Previously known bounds for some query problems are improved and new tractable cases are then exhibited. Among others, as an immediate corollary, we improve a result of \~\cite{PapadimitriouY-99} by showing that any (relational) acyclic conjunctive query with inequalities can be evaluated in time $f(|Q|).|\textbf{db}|.|Q(\textbf{db})|$. A second consequence of our method is that it provides a very natural descriptive approach to the complexity of well-known algorithmic problems. A number of examples (such as acyclic subgraph problems, multidimensional matching, etc...) are considered for which new insights of their complexity are given.
[ { "version": "v1", "created": "Tue, 2 May 2006 09:31:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Durand", "Arnaud", "", "ELM" ], [ "Grandjean", "Etienne", "", "GREYC" ] ]
cs/0605015
Ciro Cattuto
Ciro Cattuto, Vittorio Loreto, Luciano Pietronero
Collaborative Tagging and Semiotic Dynamics
8 pages, 7 figures
PNAS 104, 1461 (2007)
10.1073/pnas.0610487104
null
cs.CY cs.DL physics.data-an physics.soc-ph
null
Collaborative tagging has been quickly gaining ground because of its ability to recruit the activity of web users into effectively organizing and sharing vast amounts of information. Here we collect data from a popular system and investigate the statistical properties of tag co-occurrence. We introduce a stochastic model of user behavior embodying two main aspects of collaborative tagging: (i) a frequency-bias mechanism related to the idea that users are exposed to each other's tagging activity; (ii) a notion of memory - or aging of resources - in the form of a heavy-tailed access to the past state of the system. Remarkably, our simple modeling is able to account quantitatively for the observed experimental features, with a surprisingly high accuracy. This points in the direction of a universal behavior of users, who - despite the complexity of their own cognitive processes and the uncoordinated and selfish nature of their tagging activity - appear to follow simple activity patterns.
[ { "version": "v1", "created": "Thu, 4 May 2006 18:53:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Cattuto", "Ciro", "" ], [ "Loreto", "Vittorio", "" ], [ "Pietronero", "Luciano", "" ] ]
cs/0605017
Tran Cao Son
Phan Huy Tu, Tran Cao Son, and Chitta Baral
Reasoning and Planning with Sensing Actions, Incomplete Information, and Static Causal Laws using Answer Set Programming
72 pages, 3 figures, a preliminary version of this paper appeared in the proceedings of the 7th International Conference on Logic Programming and Non-Monotonic Reasoning, 2004. To appear in Theory and Practice of Logic Programming
null
null
null
cs.AI
null
We extend the 0-approximation of sensing actions and incomplete information in [Son and Baral 2000] to action theories with static causal laws and prove its soundness with respect to the possible world semantics. We also show that the conditional planning problem with respect to this approximation is NP-complete. We then present an answer set programming based conditional planner, called ASCP, that is capable of generating both conformant plans and conditional plans in the presence of sensing actions, incomplete information about the initial state, and static causal laws. We prove the correctness of our implementation and argue that our planner is sound and complete with respect to the proposed approximation. Finally, we present experimental results comparing ASCP to other planners.
[ { "version": "v1", "created": "Thu, 4 May 2006 22:35:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Tu", "Phan Huy", "" ], [ "Son", "Tran Cao", "" ], [ "Baral", "Chitta", "" ] ]
cs/0605018
Florentin Smarandache
Florentin Smarandache, Sukanto Bhattacharya, Mohammad Khoshnevisan, Housila P. Singh, Rajesh Singh, F. Kaymram, S. Malakar, Jose L. Salmeron
Computational Modeling in Applied Problems: collected papers on econometrics, operations research, game theory and simulation
108 pages, many figures
Hexis, 2006.
null
null
cs.OH
null
Computational models pervade all branches of the exact sciences and have in recent times also started to prove to be of immense utility in some of the traditionally 'soft' sciences like ecology, sociology and politics. This volume is a collection of a few cutting-edge research papers on the application of variety of computational models and tools in the analysis, interpretation and solution of vexing real-world problems and issues in economics, management, ecology and global politics by some prolific researchers in the field.
[ { "version": "v1", "created": "Fri, 5 May 2006 00:35:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Bhattacharya", "Sukanto", "" ], [ "Khoshnevisan", "Mohammad", "" ], [ "Singh", "Housila P.", "" ], [ "Singh", "Rajesh", "" ], [ "Kaymram", "F.", "" ], [ "Malakar", "S.", "" ], [ "Salmeron", "Jose L.", "" ] ]
cs/0605020
Sergey Alpaev
Sergey Alpaev
Applied MVC Patterns. A pattern language
null
null
null
null
cs.SE
null
How to get advantages of MVC model without making applications unnecessarily complex? The full-featured MVC implementation is on the top end of ladder of complexity. The other end is meant for simple cases that do not call for such complex designs, however still in need of the advantages of MVC patterns, such as ability to change the look-and-feel. This paper presents patterns of MVC implementation that help to benefit from the paradigm and keep the right balance between flexibility and implementation complexity.
[ { "version": "v1", "created": "Fri, 5 May 2006 10:25:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Alpaev", "Sergey", "" ] ]
cs/0605021
Harald Zankl
Harald Zankl
SAT Techniques for Lexicographic Path Orders
29 pages, Seminar Report
null
null
null
cs.SC
null
This seminar report is concerned with expressing LPO-termination of term rewrite systems as a satisfiability problem in propositional logic. After relevant algorithms are explained, experimental results are reported.
[ { "version": "v1", "created": "Fri, 5 May 2006 19:11:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Zankl", "Harald", "" ] ]
cs/0605022
Martin Kurth
Martin Kurth, Jim LeBlanc
Toward a Collection-based Metadata Maintenance Model
10 pages, 4 figures; submitted to DC 2006
null
null
null
cs.DL
null
In this paper, the authors identify key entities and relationships in the operational management of metadata catalogs that describe digital collections, and they draft a data model to support the administration of metadata maintenance for collections. Further, they consider this proposed model in light of other data schemes to which it relates and discuss the implications of the model for library metadata maintenance operations.
[ { "version": "v1", "created": "Fri, 5 May 2006 18:16:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurth", "Martin", "" ], [ "LeBlanc", "Jim", "" ] ]
cs/0605024
Marcus Hutter
Shane Legg and Marcus Hutter
A Formal Measure of Machine Intelligence
8 two-column pages
Proc. 15th Annual Machine Learning Conference of {B}elgium and The Netherlands (Benelearn 2006) pages 73-80
null
IDSIA-10-06
cs.AI cs.LG
null
A fundamental problem in artificial intelligence is that nobody really knows what intelligence is. The problem is especially acute when we need to consider artificial systems which are significantly different to humans. In this paper we approach this problem in the following way: We take a number of well known informal definitions of human intelligence that have been given by experts, and extract their essential features. These are then mathematically formalised to produce a general measure of intelligence for arbitrary machines. We believe that this measure formally captures the concept of machine intelligence in the broadest reasonable sense.
[ { "version": "v1", "created": "Sat, 6 May 2006 16:56:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0605025
Vytautas Perlibakas
Vytautas Perlibakas
Face Recognition using Principal Component Analysis and Log-Gabor Filters
Unpublished manuscript. March 2005. 23 pages, 7 figures, 5 tables
null
null
null
cs.CV
null
In this article we propose a novel face recognition method based on Principal Component Analysis (PCA) and Log-Gabor filters. The main advantages of the proposed method are its simple implementation, training, and very high recognition accuracy. For recognition experiments we used 5151 face images of 1311 persons from different sets of the FERET and AR databases that allow to analyze how recognition accuracy is affected by the change of facial expressions, illumination, and aging. Recognition experiments with the FERET database (containing photographs of 1196 persons) showed that our method can achieve maximal 97-98% first one recognition rate and 0.3-0.4% Equal Error Rate. The experiments also showed that the accuracy of our method is less affected by eye location errors and used image normalization method than of traditional PCA -based recognition method.
[ { "version": "v1", "created": "Sun, 7 May 2006 13:30:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Perlibakas", "Vytautas", "" ] ]
cs/0605026
Yuri Pritykin
Yuri Pritykin
Strongly Almost Periodic Sequences under Finite Automata Mappings
7 pages
null
null
null
cs.DM
null
The notion of almost periodicity nontrivially generalizes the notion of periodicity. Strongly almost periodic sequences (=uniformly recurrent infinite words) first appeared in the field of symbolic dynamics, but then turned out to be interesting in connection with computer science. The paper studies the class of eventually strongly almost periodic sequences (i. e., becoming strongly almost periodic after deleting some prefix). We prove that the property of eventual strong almost periodicity is preserved under the mappings done by finite automata and finite transducers. The class of almost periodic sequences includes the class of eventually strongly almost periodic sequences. We prove this inclusion to be strict.
[ { "version": "v1", "created": "Sun, 7 May 2006 14:46:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritykin", "Yuri", "" ] ]
cs/0605027
Vytautas Perlibakas
Vytautas Perlibakas
Recognition of expression variant faces using masked log-Gabor features and Principal Component Analysis
Unpublished manuscript. June 2005. 20 pages, 8 figures, 5 tables
null
null
null
cs.CV
null
In this article we propose a method for the recognition of faces with different facial expressions. For recognition we extract feature vectors by using log-Gabor filters of multiple orientations and scales. Using sliding window algorithm and variances -based masking these features are extracted at image regions that are less affected by the changes of facial expressions. Extracted features are passed to the Principal Component Analysis (PCA) -based recognition method. The results of face recognition experiments using expression variant faces showed that the proposed method could achieve higher recognition accuracy than many other methods. For development and testing we used facial images from the AR and FERET databases. Using facial photographs of more than one thousand persons from the FERET database the proposed method achieved 96.6-98.9% first one recognition rate and 0.2-0.6% Equal Error Rate (EER).
[ { "version": "v1", "created": "Sun, 7 May 2006 15:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Perlibakas", "Vytautas", "" ] ]
cs/0605030
Randy Cogill
Randy Cogill and Sanjay Lall
A Delay Analysis of Maximal Matching Switching with Speedup
11 pages, 2 figures. Submitted to the 2006 IEEE Conference on Decision and Control
null
null
null
cs.NI cs.PF
null
In this paper we analyze the average queue backlog in a combined input-output queued switch using a maximal size matching scheduling algorithm. We compare this average backlog to the average backlog achieved by an optimal switch. We model the cell arrival process as independent and identically distributed between time slots and uniformly distributed among input and output ports. For switches with many input and output ports, the backlog associated with maximal size matching with speedup 3 is no more than 10/3 times the backlog associated with an optimal switch. Moreover, this performance ratio rapidly approaches 2 as speedup increases.
[ { "version": "v1", "created": "Mon, 8 May 2006 08:04:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Cogill", "Randy", "" ], [ "Lall", "Sanjay", "" ] ]
cs/0605031
Mihaela Dinsoreanu PhD
Mihaela Dinsoreanu, Ioan Salomie, Kalman Pusztai
On the Design of Agent-Based Systems using UML and Extensions
null
null
null
null
cs.AI cs.MA cs.SE
null
The Unified Software Development Process (USDP) and UML have been now generally accepted as the standard methodology and modeling language for developing Object-Oriented Systems. Although Agent-based Systems introduces new issues, we consider that USDP and UML can be used in an extended manner for modeling Agent-based Systems. The paper presents a methodology for designing agent-based systems and the specific models expressed in an UML-based notation corresponding to each phase of the software development process. UML was extended using the provided mechanism: stereotypes. Therefore, this approach can be managed with any CASE tool supporting UML. A Case Study, the development of a specific agent-based Student Evaluation System (SAS), is presented.
[ { "version": "v1", "created": "Mon, 8 May 2006 12:21:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Dinsoreanu", "Mihaela", "" ], [ "Salomie", "Ioan", "" ], [ "Pusztai", "Kalman", "" ] ]
cs/0605032
Mihaela Dinsoreanu PhD
Tudor Marian, Bogdan Dumitriu, Mihaela Dinsoreanu, Ioan Salomie
A framework of reusable structures for mobile agent development
null
null
null
null
cs.MA cs.AI cs.SE
null
Mobile agents research is clearly aiming towards imposing agent based development as the next generation of tools for writing software. This paper comes with its own contribution to this global goal by introducing a novel unifying framework meant to bring simplicity and interoperability to and among agent platforms as we know them today. In addition to this, we also introduce a set of agent behaviors which, although tailored for and from the area of virtual learning environments, are none the less generic enough to be used for rapid, simple, useful and reliable agent deployment. The paper also presents an illustrative case study brought forward to prove the feasibility of our design.
[ { "version": "v1", "created": "Mon, 8 May 2006 12:27:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Marian", "Tudor", "" ], [ "Dumitriu", "Bogdan", "" ], [ "Dinsoreanu", "Mihaela", "" ], [ "Salomie", "Ioan", "" ] ]
cs/0605033
Mihaela Dinsoreanu PhD
Mihaela Dinsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom Coffey
Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments
null
null
null
null
cs.MA cs.AI cs.SE
null
E-learning is nowadays one of the most interesting of the "e- " domains available through the Internet. The main problem to create a Web-based, virtual environment is to model the traditional domain and to implement the model using the most suitable technologies. We analyzed the distance learning domain and investigated the possibility to implement some e-learning services using mobile agent technologies. This paper presents a model of the Student Assessment Service (SAS) and an agent-based framework developed to be used for implementing specific applications. A specific Student Assessment application that relies on the framework was developed.
[ { "version": "v1", "created": "Mon, 8 May 2006 12:37:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Dinsoreanu", "Mihaela", "" ], [ "Godja", "Cristian", "" ], [ "Anghel", "Claudiu", "" ], [ "Salomie", "Ioan", "" ], [ "Coffey", "Tom", "" ] ]
cs/0605034
Srinivas Shakkottai
Srinivas Shakkottai, R. Srikant
Peer to Peer Networks for Defense Against Internet Worms
11 Pages
null
null
null
cs.CR cs.AR cs.NI
null
Internet worms, which spread in computer networks without human mediation, pose a severe threat to computer systems today. The rate of propagation of worms has been measured to be extremely high and they can infect a large fraction of their potential hosts in a short time. We study two different methods of patch dissemination to combat the spread of worms. We first show that using a fixed number of patch servers performs woefully inadequately against Internet worms. We then show that by exploiting the exponential data dissemination capability of P2P systems, the spread of worms can be halted very effectively. We compare the two methods by using fluid models to compute two quantities of interest: the time taken to effectively combat the progress of the worm and the maximum number of infected hosts. We validate our models using Internet measurements and simulations.
[ { "version": "v1", "created": "Mon, 8 May 2006 17:02:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Shakkottai", "Srinivas", "" ], [ "Srikant", "R.", "" ] ]
cs/0605035
Filip Radlinski
Filip Radlinski and Thorsten Joachims
Query Chains: Learning to Rank from Implicit Feedback
10 pages
Proceedings of the ACM Conference on Knowledge Discovery and Data Mining (KDD), ACM, 2005
null
null
cs.LG cs.IR
null
This paper presents a novel approach for using clickthrough data to learn ranked retrieval functions for web search results. We observe that users searching the web often perform a sequence, or chain, of queries with a similar information need. Using query chains, we generate new types of preference judgments from search engine logs, thus taking advantage of user intelligence in reformulating queries. To validate our method we perform a controlled user study comparing generated preference judgments to explicit relevance judgments. We also implemented a real-world search engine to test our approach, using a modified ranking SVM to learn an improved ranking function from preference data. Our results demonstrate significant improvements in the ranking given by the search engine. The learned rankings outperform both a static ranking function, as well as one trained without considering query chains.
[ { "version": "v1", "created": "Mon, 8 May 2006 22:05:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Radlinski", "Filip", "" ], [ "Joachims", "Thorsten", "" ] ]
cs/0605036
Filip Radlinski
Filip Radlinski and Thorsten Joachims
Evaluating the Robustness of Learning from Implicit Feedback
8 pages, Presented at ICML Workshop on Learning In Web Search, 2005
null
null
null
cs.LG cs.IR
null
This paper evaluates the robustness of learning from implicit feedback in web search. In particular, we create a model of user behavior by drawing upon user studies in laboratory and real-world settings. The model is used to understand the effect of user behavior on the performance of a learning algorithm for ranked retrieval. We explore a wide range of possible user behaviors and find that learning from implicit feedback can be surprisingly robust. This complements previous results that demonstrated our algorithm's effectiveness in a real-world search engine application.
[ { "version": "v1", "created": "Mon, 8 May 2006 23:38:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Radlinski", "Filip", "" ], [ "Joachims", "Thorsten", "" ] ]
cs/0605037
Filip Radlinski
Filip Radlinski and Thorsten Joachims
Minimally Invasive Randomization for Collecting Unbiased Preferences from Clickthrough Logs
7 pages. Proceedings of the 21st National Conference on Artificial Intelligence (AAAI), 2006
null
null
null
cs.IR cs.LG
null
Clickthrough data is a particularly inexpensive and plentiful resource to obtain implicit relevance feedback for improving and personalizing search engines. However, it is well known that the probability of a user clicking on a result is strongly biased toward documents presented higher in the result set irrespective of relevance. We introduce a simple method to modify the presentation of search results that provably gives relevance judgments that are unaffected by presentation bias under reasonable assumptions. We validate this property of the training data in interactive real world experiments. Finally, we show that using these unbiased relevance judgments learning methods can be guaranteed to converge to an ideal ranking given sufficient data.
[ { "version": "v1", "created": "Tue, 9 May 2006 01:53:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Radlinski", "Filip", "" ], [ "Joachims", "Thorsten", "" ] ]
cs/0605038
Enrico Pontelli
Tran Cao Son, Enrico Pontelli, Islam Elkabani
An Unfolding-Based Semantics for Logic Programming with Aggregates
null
null
null
null
cs.SE cs.AI
null
The paper presents two equivalent definitions of answer sets for logic programs with aggregates. These definitions build on the notion of unfolding of aggregates, and they are aimed at creating methodologies to translate logic programs with aggregates to normal logic programs or positive programs, whose answer set semantics can be used to defined the semantics of the original programs. The first definition provides an alternative view of the semantics for logic programming with aggregates described by Pelov et al. The second definition is similar to the traditional answer set definition for normal logic programs, in that, given a logic program with aggregates and an interpretation, the unfolding process produces a positive program. The paper shows how this definition can be extended to consider aggregates in the head of the rules. The proposed views of logic programming with aggregates are simple and coincide with the ultimate stable model semantics, and with other semantic characterizations for large classes of program (e.g., programs with monotone aggregates and programs that are aggregate-stratified). Moreover, it can be directly employed to support an implementation using available answer set solvers. The paper describes a system, called ASP^A, that is capable of computing answer sets of programs with arbitrary (e.g., recursively defined) aggregates.
[ { "version": "v1", "created": "Tue, 9 May 2006 04:08:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Son", "Tran Cao", "" ], [ "Pontelli", "Enrico", "" ], [ "Elkabani", "Islam", "" ] ]
cs/0605039
Amitabha Roy
Amitabha Roy, Stephan Zeisset, Charles J. Fleckenstein, John C. Huang
Fast and Generalized Polynomial Time Memory Consistency Verification
To appear in the proceedings of Computer Aided Verification (CAV) 2006
null
null
null
cs.AR cs.LO cs.PF
null
The problem of verifying multi-threaded execution against the memory consistency model of a processor is known to be an NP hard problem. However polynomial time algorithms exist that detect almost all failures in such execution. These are often used in practice for microprocessor verification. We present a low complexity and fully parallelized algorithm to check program execution against the processor consistency model. In addition our algorithm is general enough to support a number of consistency models without any degradation in performance. An implementation of this algorithm is currently used in practice to verify processors in the post silicon stage for multiple architectures.
[ { "version": "v1", "created": "Tue, 9 May 2006 05:45:52 GMT" }, { "version": "v2", "created": "Wed, 17 May 2006 12:07:57 GMT" }, { "version": "v3", "created": "Tue, 23 May 2006 10:03:21 GMT" }, { "version": "v4", "created": "Mon, 29 May 2006 06:33:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Roy", "Amitabha", "" ], [ "Zeisset", "Stephan", "" ], [ "Fleckenstein", "Charles J.", "" ], [ "Huang", "John C.", "" ] ]
cs/0605040
Marcus Hutter
Marcus Hutter
General Discounting versus Average Reward
17 pages, 1 table
Proc. 17th International Conf. on Algorithmic Learning Theory (ALT 2006) pages 244-258
null
IDSIA-11-06
cs.LG
null
Consider an agent interacting with an environment in cycles. In every interaction cycle the agent is rewarded for its performance. We compare the average reward U from cycle 1 to m (average value) with the future discounted reward V from cycle k to infinity (discounted value). We consider essentially arbitrary (non-geometric) discount sequences and arbitrary reward sequences (non-MDP environments). We show that asymptotically U for m->infinity and V for k->infinity are equal, provided both limits exist. Further, if the effective horizon grows linearly with k or faster, then existence of the limit of U implies that the limit of V exists. Conversely, if the effective horizon grows linearly with k or slower, then existence of the limit of V implies that the limit of U exists.
[ { "version": "v1", "created": "Tue, 9 May 2006 10:39:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
cs/0605043
Stefano Guerrini
Stefano Guerrini and Andrea Masini
Continuations, proofs and tests
32 pages, uses xy-pic
null
null
null
cs.LO cs.PL
null
Continuation Passing Style (CPS) is one of the most important issues in the field of functional programming languages, and the quest for a primitive notion of types for continuation is still open. Starting from the notion of ``test'' proposed by Girard, we develop a notion of test for intuitionistic logic. We give a complete deductive system for tests and we show that it is good to deal with ``continuations''. In particular, in the proposed system it is possible to work with Call by Value and Call by Name translations in a uniform way.
[ { "version": "v1", "created": "Tue, 9 May 2006 20:11:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Guerrini", "Stefano", "" ], [ "Masini", "Andrea", "" ] ]
cs/0605045
R.N.Mohan Professor
R.N.Mohan
On Orthogonalities in Matrices
null
null
null
null
cs.DM
null
In this paper we have discussed different possible orthogonalities in matrices, namely orthogonal, quasi-orthogonal, semi-orthogonal and non-orthogonal matrices including completely positive matrices, while giving some of their constructions besides studying some of their properties.
[ { "version": "v1", "created": "Wed, 10 May 2006 03:12:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohan", "R. N.", "" ] ]
cs/0605049
R.N.Mohan Professor
V.M.Siddlenikov, R.N.Mohan, Moon Ho Lee
On fractionally linear functions over a finite field
null
null
null
null
cs.DM
null
Abstrct: In this note, by considering fractionally linear functions over a finite field and consequently developing an abstract sequence, we study some of its properties.
[ { "version": "v1", "created": "Thu, 11 May 2006 06:58:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Siddlenikov", "V. M.", "" ], [ "Mohan", "R. N.", "" ], [ "Lee", "Moon Ho", "" ] ]
cs/0605050
V. Arvind
V. Arvind and Piyush P Kurur
A Polynomial Time Nilpotence Test for Galois Groups and Related Results
12 pages
null
null
null
cs.CC cs.DS
null
We give a deterministic polynomial-time algorithm to check whether the Galois group $\Gal{f}$ of an input polynomial $f(X) \in \Q[X]$ is nilpotent: the running time is polynomial in $\size{f}$. Also, we generalize the Landau-Miller solvability test to an algorithm that tests if $\Gal{f}$ is in $\Gamma_d$: this algorithm runs in time polynomial in $\size{f}$ and $n^d$ and, moreover, if $\Gal{f}\in\Gamma_d$ it computes all the prime factors of $# \Gal{f}$.
[ { "version": "v1", "created": "Thu, 11 May 2006 08:20:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Arvind", "V.", "" ], [ "Kurur", "Piyush P", "" ] ]
cs/0605053
Rajkumar Buyya
Hussein Gibbins and Rajkumar Buyya
Gridscape II: A Customisable and Pluggable Grid Monitoring Portal and its Integration with Google Maps
12 pages
null
null
Technical Report, GRIDS-TR-2006-8, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, May 12, 2006
cs.DC
null
Grid computing has emerged as an effective means of facilitating the sharing of distributed heterogeneous resources, enabling collaboration in large scale environments. However, the nature of Grid systems, coupled with the overabundance and fragmentation of information, makes it difficult to monitor resources, services, and computations in order to plan and make decisions. In this paper we present Gridscape II, a customisable portal component that can be used on its own or plugged in to compliment existing Grid portals. Gridscape II manages the gathering of information from arbitrary, heterogeneous and distributed sources and presents them together seamlessly within a single interface. It also leverages the Google Maps API in order to provide a highly interactive user interface. Gridscape II is simple and easy to use, providing a solution to those users who do not wish to invest heavily in developing their own monitoring portal from scratch, and also for those users who want something that is easy to customise and extend for their specific needs.
[ { "version": "v1", "created": "Fri, 12 May 2006 09:41:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gibbins", "Hussein", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0605056
Rajkumar Buyya
Chee Shin Yeo, Marcos Dias de Assuncao, Jia Yu, Anthony Sulistio, Srikumar Venugopal, Martin Placek, and Rajkumar Buyya
Utility Computing and Global Grids
23 pages
null
null
Technical Report, GRIDS-TR-2006-7, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, April 13, 2006
cs.DC
null
This chapter focuses on the use of Grid technologies to achieve utility computing. An overview of how Grids can support utility computing is first presented through the architecture of Utility Grids. Then, utility-based resource allocation is described in detail at each level of the architecture. Finally, some industrial solutions for utility computing are discussed.
[ { "version": "v1", "created": "Fri, 12 May 2006 20:36:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Yeo", "Chee Shin", "" ], [ "de Assuncao", "Marcos Dias", "" ], [ "Yu", "Jia", "" ], [ "Sulistio", "Anthony", "" ], [ "Venugopal", "Srikumar", "" ], [ "Placek", "Martin", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0605057
Rajiv Ranjan Mr.
Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya
SLA-Based Coordinated Superscheduling Scheme and Performance for Computational Grids
null
In Proceedings of the 8th IEEE International Conference on Cluster Computing (Cluster 2006), IEEE Computer Society Press, September 27 - 30, 2006, Barcelona, Spain.
null
null
cs.DC
null
The Service Level Agreement~(SLA) based grid superscheduling approach promotes coordinated resource sharing. Superscheduling is facilitated between administratively and topologically distributed grid sites by grid schedulers such as Resource brokers. In this work, we present a market-based SLA coordination mechanism. We based our SLA model on a well known \emph{contract net protocol}. The key advantages of our approach are that it allows:~(i) resource owners to have finer degree of control over the resource allocation that was previously not possible through traditional mechanism; and (ii) superschedulers to bid for SLA contracts in the contract net with focus on completing the job within the user specified deadline. In this work, we use simulation to show the effectiveness of our proposed approach.
[ { "version": "v1", "created": "Mon, 15 May 2006 13:41:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Ranjan", "Rajiv", "" ], [ "Harwood", "Aaron", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0605059
Jean-Marc Rosengard
Jean-Marc Rosengard, Marian Ursu
Ontological Representations of Software Patterns
7 pages
Proceedings of KES'04, Lecture Notes in Computer Science, vol. 3215, pp. 31-37, Springer-Verlag, 2004
10.1007/b100916
null
cs.SE cs.AI
null
This paper is based on and advocates the trend in software engineering of extending the use of software patterns as means of structuring solutions to software development problems (be they motivated by best practice or by company interests and policies). The paper argues that, on the one hand, this development requires tools for automatic organisation, retrieval and explanation of software patterns. On the other hand, that the existence of such tools itself will facilitate the further development and employment of patterns in the software development process. The paper analyses existing pattern representations and concludes that they are inadequate for the kind of automation intended here. Adopting a standpoint similar to that taken in the semantic web, the paper proposes that feasible solutions can be built on the basis of ontological representations.
[ { "version": "v1", "created": "Sun, 14 May 2006 18:31:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosengard", "Jean-Marc", "" ], [ "Ursu", "Marian", "" ] ]
cs/0605061
Al-Mukaddim Khan Pathan
Al-Mukaddim Khan Pathan, Md. Abdul Mottalib and Minhaz Fahim Zibran
An Internet Framework to Bring Coherence between WAP and HTTP Ensuring Better Mobile Internet Security
8th International Conference on Advanced Communication Technology (ICACT 2006)
null
null
null
cs.NI
null
To bring coherence between Wireless Access Protocol (WAP) and Hyper Text Transfer Protocol (HTTP), in this paper, we have proposed an enhanced Internet framework, which incorporates a new markup language and a browser compatible with both of the access control protocols. This Markup Language and the browser enables co-existence of both Hyper Text Markup Language (HTML) and Wireless Markup Language (WML) contents in a single source file, whereas the browser incorporates the ability to hold contents compliant with both HTTP and WAP. The proposed framework also bridges the security gap that is present in the existing mobile Internet framework. Keywords: WAP, WML, HTTP, HTML, browser, parser, wireless devices.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:25:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Pathan", "Al-Mukaddim Khan", "" ], [ "Mottalib", "Md. Abdul", "" ], [ "Zibran", "Minhaz Fahim", "" ] ]
cs/0605062
Al-Mukaddim Khan Pathan
Al-Mukaddim Khan Pathan and Md. Golam Shagadul Amin Talukder
QoSIP: A QoS Aware IP Routing Ptotocol for Multimedia Data
8th International Conference of Advanced Communication Technology (ICACT 2006)
null
null
null
cs.NI
null
Conventional IP routing protocols are not suitable for multimedia applications which have very stringent Quality-of-Service (QoS) demands and they require a connection oriented service. For multimedia applications it is expected that the router should be able to forward the packet according to the demand of the packet and it is necessary to find a path that satisfies the specific demands of a particular application. In order to address these issues, in this paper, we have presented a QoS aware IP routing protocol where a router stores information about the QoS parameters and routes the packet accordingly. Keywords: IP Routing Protocol, Quality of Service (QoS) parameter, QoSIP, Selective Flooding.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:39:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Pathan", "Al-Mukaddim Khan", "" ], [ "Talukder", "Md. Golam Shagadul Amin", "" ] ]
cs/0605063
Al-Mukaddim Khan Pathan
Asif Ahmed Anik and Al-Mukaddim Khan Pathan
An Electronic Payment System to Ensure Cost Effectiveness with Easy Security Incorporation for the Developing Countries
International Conference on Intelligent Agents, Web Technology and Internet Commerce (IAWTIC 2004)
null
null
null
cs.OH
null
With the rapid growth of Information and Communication Technology, Electronic commerce is now acting as a new means of carrying out business transactions through electronic means such as Internet environment. To avoid the complexities associated with the digital cash and electronic cash, consumers and vendors are looking for credit card payments on the Internet as one possible time-tested alternative. This gave rise of the on-line payment processing using a third-party verification; which is not suitable for the developing countries in most of the cases because of the excessive costs associated with it for maintenance and establishment of an online third-party processor. As a remedy of this problem, in this paper, we have proposed a framework for easy security incorporation in credit card based electronic payment system without the use of an on-line third- party processor; which tends to be low cost and effective for the developing countries.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:57:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Anik", "Asif Ahmed", "" ], [ "Pathan", "Al-Mukaddim Khan", "" ] ]
cs/0605066
Xiaowen Zhang
Xiaowen Zhang, Ke Tang, Li Shu
A Chaotic Cipher Mmohocc and Its Randomness Evaluation
8 pages, 4 figures, and 3 tables, submitted to ICCS06
null
null
null
cs.CR
null
After a brief introduction to a new chaotic stream cipher Mmohocc which utilizes the fundamental chaos characteristics of mixing, unpredictability, and sensitivity to initial conditions, we conducted the randomness statistical tests against the keystreams generated by the cipher. Two batteries of most stringent randomness tests, namely the NIST Suite and the Diehard Suite, were performed. The results showed that the keystreams have successfully passed all the statistical tests. We conclude that Mmohocc can generate high-quality pseudorandom numbers from a statistical point of view.
[ { "version": "v1", "created": "Mon, 15 May 2006 18:25:35 GMT" }, { "version": "v2", "created": "Tue, 30 May 2006 11:58:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Xiaowen", "" ], [ "Tang", "Ke", "" ], [ "Shu", "Li", "" ] ]
cs/0605070
Stephen Smith
Stephen L. Smith, Mireille E. Broucke, and Bruce A. Francis
Curve Shortening and the Rendezvous Problem for Mobile Autonomous Robots
15 pages, 18 figures
null
null
null
cs.RO cs.MA
null
If a smooth, closed, and embedded curve is deformed along its normal vector field at a rate proportional to its curvature, it shrinks to a circular point. This curve evolution is called Euclidean curve shortening and the result is known as the Gage-Hamilton-Grayson Theorem. Motivated by the rendezvous problem for mobile autonomous robots, we address the problem of creating a polygon shortening flow. A linear scheme is proposed that exhibits several analogues to Euclidean curve shortening: The polygon shrinks to an elliptical point, convex polygons remain convex, and the perimeter of the polygon is monotonically decreasing.
[ { "version": "v1", "created": "Tue, 16 May 2006 22:30:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Smith", "Stephen L.", "" ], [ "Broucke", "Mireille E.", "" ], [ "Francis", "Bruce A.", "" ] ]
cs/0605074
Michael Codish
Michael Codish (1), Peter Schneider-Kamp (2), Vitaly Lagoon (3), Ren\'e Thiemann (2), J\"urgen Giesl (2) ((1) Department of Computer Science, Ben-Gurion University, Israel (2) LuFG Informatik 2, RWTH Aachen, Germany (3) Department of Computer Science and Software Engineering, University of Melbourne, Australia)
SAT Solving for Argument Filterings
null
null
null
null
cs.LO
null
This paper introduces a propositional encoding for lexicographic path orders in connection with dependency pairs. This facilitates the application of SAT solvers for termination analysis of term rewrite systems based on the dependency pair method. We address two main inter-related issues and encode them as satisfiability problems of propositional formulas that can be efficiently handled by SAT solving: (1) the combined search for a lexicographic path order together with an \emph{argument filtering} to orient a set of inequalities; and (2) how the choice of the argument filtering influences the set of inequalities that have to be oriented. We have implemented our contributions in the termination prover AProVE. Extensive experiments show that by our encoding and the application of SAT solvers one obtains speedups in orders of magnitude as well as increased termination proving power.
[ { "version": "v1", "created": "Wed, 17 May 2006 12:47:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Codish", "Michael", "" ], [ "Schneider-Kamp", "Peter", "" ], [ "Lagoon", "Vitaly", "" ], [ "Thiemann", "René", "" ], [ "Giesl", "Jürgen", "" ] ]
cs/0605076
J. F. J. Laros
J. F. J. Laros
Numeration-automatic sequences
25 pages, 22 figures
null
null
null
cs.CL cs.DM
null
We present a base class of automata that induce a numeration system and we give an algorithm to give the n-th word in the language of the automaton when the expansion of n in the induced numeration system is feeded to the automaton. Furthermore we give some algorithms for reverse reading of this expansion and a way to combine automata to other automata having the same properties.
[ { "version": "v1", "created": "Wed, 17 May 2006 17:12:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Laros", "J. F. J.", "" ] ]
cs/0605078
Christoph D\"urr
Philippe Baptiste, Peter Brucker, Marek Chrobak, Christoph Durr, Svetlana A. Kravchenko, Francis Sourd
The Complexity of Mean Flow Time Scheduling Problems with Release Times
Subsumes and replaces cs.DS/0412094 and "Complexity of mean flow time scheduling problems with release dates" by P.B, S.K
null
null
null
cs.DS
null
We study the problem of preemptive scheduling n jobs with given release times on m identical parallel machines. The objective is to minimize the average flow time. We show that when all jobs have equal processing times then the problem can be solved in polynomial time using linear programming. Our algorithm can also be applied to the open-shop problem with release times and unit processing times. For the general case (when processing times are arbitrary), we show that the problem is unary NP-hard.
[ { "version": "v1", "created": "Wed, 17 May 2006 22:07:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Baptiste", "Philippe", "" ], [ "Brucker", "Peter", "" ], [ "Chrobak", "Marek", "" ], [ "Durr", "Christoph", "" ], [ "Kravchenko", "Svetlana A.", "" ], [ "Sourd", "Francis", "" ] ]
cs/0605081
Marc Daumas
Marc Daumas (LP2A, LIRMM), Guillaume Da Gra\c{c}a (LP2A), David Defour (LP2A)
Caract\'{e}ristiques arithm\'{e}tiques des processeurs graphiques
null
null
null
null
cs.MS
null
Les unit\'{e}s graphiques (Graphic Processing Units- GPU) sont d\'{e}sormais des processeurs puissants et flexibles. Les derni\`{e}res g\'{e}n\'{e}rations de GPU contiennent des unit\'{e}s programmables de traitement des sommets (vertex shader) et des pixels (pixel shader) supportant des op\'{e}rations en virgule flottante sur 8, 16 ou 32 bits. La repr\'{e}sentation flottante sur 32 bits correspond \`{a} la simple pr\'{e}cision de la norme IEEE sur l'arithm\'{e}tique en virgule flottante (IEEE-754). Les GPU sont bien adapt\'{e}s aux applications avec un fort parall\'{e}lisme de donn\'{e}es. Cependant ils ne sont que peu utilis\'{e}s en dehors des calculs graphiques (General Purpose computation on GPU -- GPGPU). Une des raisons de cet \'{e}tat de faits est la pauvret\'{e} des documentations techniques fournies par les fabricants (ATI et Nvidia), particuli\`{e}rement en ce qui concerne l'implantation des diff\'{e}rents op\'{e}rateurs arithm\'{e}tiques embarqu\'{e}s dans les diff\'{e}rentes unit\'{e}s de traitement. Or ces informations sont essentielles pour estimer et contr\^{o}ler les erreurs d'arrondi ou pour mettre en oeuvre des techniques de r\'{e}duction ou de compensation afin de travailler en pr\'{e}cision double, quadruple ou arbitrairement \'{e}tendue. Nous proposons dans cet article un ensemble de programmes qui permettent de d\'{e}couvrir les caract\'{e}ristiques principales des GPU en ce qui concerne l'arithm\'{e}tique \`{a} virgule flottante. Nous donnons les r\'{e}sultats obtenus sur deux cartes graphiques r\'{e}centes: la Nvidia 7800GTX et l'ATI RX1800XL.
[ { "version": "v1", "created": "Thu, 18 May 2006 15:49:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Daumas", "Marc", "", "LP2A, LIRMM" ], [ "Da Graça", "Guillaume", "", "LP2A" ], [ "Defour", "David", "", "LP2A" ] ]
cs/0605082
Saugata Basu
Saugata Basu
Efficient algorithm for computing the Euler-Poincar\'e characteristic of a semi-algebraic set defined by few quadratic inequalities
17 pages, accepted for publication in Computational Complexity
null
null
null
cs.SC cs.CG
null
We present an algorithm which takes as input a closed semi-algebraic set, $S \subset \R^k$, defined by \[ P_1 \leq 0, ..., P_\ell \leq 0, P_i \in \R[X_1,...,X_k], \deg(P_i) \leq 2, \] and computes the Euler-Poincar\'e characteristic of $S$. The complexity of the algorithm is $k^{O(\ell)}$.
[ { "version": "v1", "created": "Thu, 18 May 2006 18:03:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Basu", "Saugata", "" ] ]
cs/0605083
Partha Basuchowdhuri
Partha Basuchowdhuri
Classical Authentication Aided Three-Stage Quantum Protocol
7 pages, 3 figures
null
null
null
cs.CR
null
This paper modifies Kak's three-stage protocol so that it can guarantee secure transmission of information. Although avoiding man-in-the-middle attack is our primary objective in the introduction of classical authentication inside the three-stage protocol, we also benefit from the inherent advantages of the chosen classical authentication protocol. We have tried to implement ideas like key distribution center, session key, time-stamp, and nonce, within the quantum cryptography protocol.
[ { "version": "v1", "created": "Thu, 18 May 2006 21:41:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Basuchowdhuri", "Partha", "" ] ]
cs/0605088
Ke Liu
Ke Liu, Adnan Majeed and Nael B. Abu-Ghazaleh
TARMAC: Traffic-Analysis Reslient MAC Protocol for Multi-Hop Wireless Networks
null
null
null
null
cs.NI cs.CR
null
Traffic analysis in Multi-hop Wireless Networks can expose the structure of the network allowing attackers to focus their efforts on critical nodes. For example, jamming the only data sink in a sensor network can cripple the network. We propose a new communication protocol that is part of the MAC layer, but resides conceptually between the routing layer and MAC, that is resilient to traffic analysis. Each node broadcasts the data that it has to transmit according to a fixed transmission schedule that is independent of the traffic being generated, making the network immune to time correlation analysis. The transmission pattern is identical, with the exception of a possible time shift, at all nodes, removing spatial correlation of transmissions to network strucutre. Data for all neighbors resides in the same encrypted packet. Each neighbor then decides which subset of the data in a packet to forward onwards using a routing protocol whose details are orthogonal to the proposed scheme. We analyze the basic scheme, exploring the tradeoffs in terms of frequency of transmission and packet size. We also explore adaptive and time changing patterns and analyze their performance under a number of representative scenarios.
[ { "version": "v1", "created": "Fri, 19 May 2006 22:42:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Liu", "Ke", "" ], [ "Majeed", "Adnan", "" ], [ "Abu-Ghazaleh", "Nael B.", "" ] ]
cs/0605094
Simone Bova
S. Bova (1) and F. Montagna (1) ((1) University of Siena, Italy)
Proof Search in Hajek's Basic Logic
26 pages
null
null
null
cs.LO cs.CC
null
We introduce a proof system for Hajek's logic BL based on a relational hypersequents framework. We prove that the rules of our logical calculus, called RHBL, are sound and invertible with respect to any valuation of BL into a suitable algebra, called omega[0,1]. Refining the notion of reduction tree that arises naturally from RHBL, we obtain a decision algorithm for BL provability whose running time upper bound is 2^O(n), where n is the number of connectives of the input formula. Moreover, if a formula is unprovable, we exploit the constructiveness of a polynomial time algorithm for leaves validity for providing a procedure to build countermodels in omega[0,1]. Finally, since the size of the reduction tree branches is O(n^3), we can describe a polynomial time verification algorithm for BL unprovability.
[ { "version": "v1", "created": "Mon, 22 May 2006 08:18:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Bova", "S.", "", "University of Siena, Italy" ], [ "Montagna", "F.", "", "University of Siena, Italy" ] ]
cs/0605097
Emina Torlak
Marten van Dijk, Emina Torlak, Blaise Gassend, and Srinivas Devadas
A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols
16 pages
null
null
null
cs.CR
null
We introduce knowledge flow analysis, a simple and flexible formalism for checking cryptographic protocols. Knowledge flows provide a uniform language for expressing the actions of principals, assump- tions about intruders, and the properties of cryptographic primitives. Our approach enables a generalized two-phase analysis: we extend the two-phase theory by identifying the necessary and sufficient proper- ties of a broad class of cryptographic primitives for which the theory holds. We also contribute a library of standard primitives and show that they satisfy our criteria.
[ { "version": "v1", "created": "Mon, 22 May 2006 15:51:35 GMT" } ]
2007-05-23T00:00:00
[ [ "van Dijk", "Marten", "" ], [ "Torlak", "Emina", "" ], [ "Gassend", "Blaise", "" ], [ "Devadas", "Srinivas", "" ] ]
cs/0605101
Victor Kryssanov
Victor V. Kryssanov, Frank J. Rinaldo, Evgeny L. Kuleshov, Hitoshi Ogawa
Modeling the Dynamics of Social Networks
8 pages, 3 figures. Preprint (as of May 24, 2006)
null
null
null
cs.CY cs.CE cs.CL cs.HC cs.NI physics.data-an
null
Modeling human dynamics responsible for the formation and evolution of the so-called social networks - structures comprised of individuals or organizations and indicating connectivities existing in a community - is a topic recently attracting a significant research interest. It has been claimed that these dynamics are scale-free in many practically important cases, such as impersonal and personal communication, auctioning in a market, accessing sites on the WWW, etc., and that human response times thus conform to the power law. While a certain amount of progress has recently been achieved in predicting the general response rate of a human population, existing formal theories of human behavior can hardly be found satisfactory to accommodate and comprehensively explain the scaling observed in social networks. In the presented study, a novel system-theoretic modeling approach is proposed and successfully applied to determine important characteristics of a communication network and to analyze consumer behavior on the WWW.
[ { "version": "v1", "created": "Wed, 24 May 2006 02:13:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "Victor V.", "" ], [ "Rinaldo", "Frank J.", "" ], [ "Kuleshov", "Evgeny L.", "" ], [ "Ogawa", "Hitoshi", "" ] ]
cs/0605102
Shaili Jain
Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh Venkatasubramanian and Ke Yi
Restricted Strip Covering and the Sensor Cover Problem
14 pages, 6 figures
null
null
null
cs.DS cs.CG
null
Given a set of objects with durations (jobs) that cover a base region, can we schedule the jobs to maximize the duration the original region remains covered? We call this problem the sensor cover problem. This problem arises in the context of covering a region with sensors. For example, suppose you wish to monitor activity along a fence by sensors placed at various fixed locations. Each sensor has a range and limited battery life. The problem is to schedule when to turn on the sensors so that the fence is fully monitored for as long as possible. This one dimensional problem involves intervals on the real line. Associating a duration to each yields a set of rectangles in space and time, each specified by a pair of fixed horizontal endpoints and a height. The objective is to assign a position to each rectangle to maximize the height at which the spanning interval is fully covered. We call this one dimensional problem restricted strip covering. If we replace the covering constraint by a packing constraint, the problem is identical to dynamic storage allocation, a scheduling problem that is a restricted case of the strip packing problem. We show that the restricted strip covering problem is NP-hard and present an O(log log n)-approximation algorithm. We present better approximations or exact algorithms for some special cases. For the uniform-duration case of restricted strip covering we give a polynomial-time, exact algorithm but prove that the uniform-duration case for higher-dimensional regions is NP-hard. Finally, we consider regions that are arbitrary sets, and we present an O(log n)-approximation algorithm.
[ { "version": "v1", "created": "Wed, 24 May 2006 03:27:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Buchsbaum", "Adam L.", "" ], [ "Efrat", "Alon", "" ], [ "Jain", "Shaili", "" ], [ "Venkatasubramanian", "Suresh", "" ], [ "Yi", "Ke", "" ] ]
cs/0605103
Daniel Lemire
Daniel Lemire
A Better Alternative to Piecewise Linear Time Series Segmentation
to appear in SIAM Data Mining 2007
null
null
null
cs.DB cs.CV
null
Time series are difficult to monitor, summarize and predict. Segmentation organizes time series into few intervals having uniform characteristics (flatness, linearity, modality, monotonicity and so on). For scalability, we require fast linear time algorithms. The popular piecewise linear model can determine where the data goes up or down and at what rate. Unfortunately, when the data does not follow a linear model, the computation of the local slope creates overfitting. We propose an adaptive time series model where the polynomial degree of each interval vary (constant, linear and so on). Given a number of regressors, the cost of each interval is its polynomial degree: constant intervals cost 1 regressor, linear intervals cost 2 regressors, and so on. Our goal is to minimize the Euclidean (l_2) error for a given model complexity. Experimentally, we investigate the model where intervals can be either constant or linear. Over synthetic random walks, historical stock market prices, and electrocardiograms, the adaptive model provides a more accurate segmentation than the piecewise linear model without increasing the cross-validation error or the running time, while providing a richer vocabulary to applications. Implementation issues, such as numerical stability and real-world performance, are discussed.
[ { "version": "v1", "created": "Wed, 24 May 2006 04:42:53 GMT" }, { "version": "v2", "created": "Sat, 27 May 2006 00:32:03 GMT" }, { "version": "v3", "created": "Wed, 31 May 2006 01:28:40 GMT" }, { "version": "v4", "created": "Sun, 25 Jun 2006 14:21:45 GMT" }, { "version": "v5", "created": "Tue, 3 Oct 2006 17:04:41 GMT" }, { "version": "v6", "created": "Thu, 4 Jan 2007 18:36:01 GMT" }, { "version": "v7", "created": "Mon, 23 Apr 2007 01:24:44 GMT" }, { "version": "v8", "created": "Sat, 28 Apr 2007 23:13:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Lemire", "Daniel", "" ] ]
cs/0605104
Blake Hegerle
Blake Hegerle
Parsing Transformative LR(1) Languages
68 pages, 4 figures. Numerous stylistic and grammatical fixes; new material in Sections 2.2 and 4.2
null
null
null
cs.PL
null
We consider, as a means of making programming languages more flexible and powerful, a parsing algorithm in which the parser may freely modify the grammar while parsing. We are particularly interested in a modification of the canonical LR(1) parsing algorithm in which, after the reduction of certain productions, we examine the source sentence seen so far to determine the grammar to use to continue parsing. A naive modification of the canonical LR(1) parsing algorithm along these lines cannot be guaranteed to halt; as a result, we develop a test which examines the grammar as it changes, stopping the parse if the grammar changes in a way that would invalidate earlier assumptions made by the parser. With this test in hand, we can develop our parsing algorithm and prove that it is correct. That being done, we turn to earlier, related work; the idea of programming languages which can be extended to include new syntactic constructs has existed almost as long as the idea of high-level programming languages. Early efforts to construct such a programming language were hampered by an immature theory of formal languages. More recent efforts to construct transformative languages relied either on an inefficient chain of source-to-source translators; or they have a defect, present in our naive parsing algorithm, in that they cannot be known to halt. The present algorithm does not have these undesirable properties, and as such, it should prove a useful foundation for a new kind of programming language.
[ { "version": "v1", "created": "Wed, 24 May 2006 19:09:39 GMT" }, { "version": "v2", "created": "Wed, 26 Jul 2006 14:39:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Hegerle", "Blake", "" ] ]
cs/0605109
Emina Torlak
Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, and Srinivas Devadas
Knowledge Flow Analysis for Security Protocols
20 pages
null
null
MIT-CSAIL-TR-2005-066
cs.CR cs.SE
null
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely to informal descriptions of protocols, it allows a succinct and natural formalization; because it abstracts away message ordering, and handles communications between principals and applications of cryptographic primitives uniformly, it is readily represented in a standard logic. A generic framework in the Alloy modelling language is presented, and instantiated for two standard protocols, and a new key management scheme.
[ { "version": "v1", "created": "Wed, 24 May 2006 15:58:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Torlak", "Emina", "" ], [ "van Dijk", "Marten", "" ], [ "Gassend", "Blaise", "" ], [ "Jackson", "Daniel", "" ], [ "Devadas", "Srinivas", "" ] ]
cs/0605111
Jon Phipps
Diane I. Hillmann (1), Stuart A. Sutton (2), Jon Phipps (1), Ryan Laundry (2) ((1) Cornell University, (2) University of Washington)
A Metadata Registry from Vocabularies UP: The NSDL Registry Project
Submitted to Dublin Core 2006 Conference (DC2006)
null
null
null
cs.DL
null
The NSDL Metadata Registry is designed to provide humans and machines with the means to discover, create, access and manage metadata schemes, schemas, application profiles, crosswalks and concept mappings. This paper describes the general goals and architecture of the NSDL Metadata Registry as well as issues encountered during the first year of the project's implementation.
[ { "version": "v1", "created": "Wed, 24 May 2006 16:51:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Hillmann", "Diane I.", "", "Cornell University" ], [ "Sutton", "Stuart A.", "", "University of Washington" ], [ "Phipps", "Jon", "", "Cornell University" ], [ "Laundry", "Ryan", "", "University of Washington" ] ]