id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0609110 | Pascal Weil | Pascal Weil (LaBRI) | Algebraic recognizability of languages | null | Mathematical Foundations of Computer Science 2004, Tch\`{e}que,
R\'{e}publique (2004) 149-175 | null | null | cs.LO | null | Recognizable languages of finite words are part of every computer science
cursus, and they are routinely described as a cornerstone for applications and
for theory. We would like to briefly explore why that is, and how this
word-related notion extends to more complex models, such as those developed for
modeling distributed or timed behaviors.
| [
{
"version": "v1",
"created": "Tue, 19 Sep 2006 15:21:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Weil",
"Pascal",
"",
"LaBRI"
]
]
|
cs/0609112 | Lane A. Hemaspaandra | Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg
Rothe | A Richer Understanding of the Complexity of Election Systems | null | null | null | URCS TR-2006-903 | cs.GT cs.CC cs.MA | null | We provide an overview of some recent progress on the complexity of election
systems. The issues studied include the complexity of the winner, manipulation,
bribery, and control problems.
| [
{
"version": "v1",
"created": "Tue, 19 Sep 2006 22:57:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
]
|
cs/0609113 | Pascal Weil | Zoltan Esik, Pascal Weil (LaBRI) | Algebraic recognizability of regular tree languages | null | Theoretical Computer Science 340 (2005) 291-321 | null | null | cs.DM | null | We propose a new algebraic framework to discuss and classify recognizable
tree languages, and to characterize interesting classes of such languages. Our
algebraic tool, called preclones, encompasses the classical notion of syntactic
Sigma-algebra or minimal tree automaton, but adds new expressivity to it. The
main result in this paper is a variety theorem \`{a} la Eilenberg, but we also
discuss important examples of logically defined classes of recognizable tree
languages, whose characterization and decidability was established in recent
papers (by Benedikt and S\'{e}goufin, and by Bojanczyk and Walukiewicz) and can
be naturally formulated in terms of pseudovarieties of preclones. Finally, this
paper constitutes the foundation for another paper by the same authors, where
first-order definable tree languages receive an algebraic characterization.
| [
{
"version": "v1",
"created": "Wed, 20 Sep 2006 06:47:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Esik",
"Zoltan",
"",
"LaBRI"
],
[
"Weil",
"Pascal",
"",
"LaBRI"
]
]
|
cs/0609115 | Clemence Magnien | Matthieu Latapy, Clemence Magnien (LIP6 - CNRS and UPMC, France) | Measuring Fundamental Properties of Real-World Complex Networks | null | null | null | null | cs.NI cond-mat.stat-mech cs.DS | null | Complex networks, modeled as large graphs, received much attention during
these last years. However, data on such networks is only available through
intricate measurement procedures. Until recently, most studies assumed that
these procedures eventually lead to samples large enough to be representative
of the whole, at least concerning some key properties. This has crucial impact
on network modeling and simulation, which rely on these properties.
Recent contributions proved that this approach may be misleading, but no
solution has been proposed. We provide here the first practical way to
distinguish between cases where it is indeed misleading, and cases where the
observed properties may be trusted. It consists in studying how the properties
of interest evolve when the sample grows, and in particular whether they reach
a steady state or not.
In order to illustrate this method and to demonstrate its relevance, we apply
it to data-sets on complex network measurements that are representative of the
ones commonly used. The obtained results show that the method fulfills its
goals very well. We moreover identify some properties which seem easier to
evaluate in practice, thus opening interesting perspectives.
| [
{
"version": "v1",
"created": "Wed, 20 Sep 2006 13:38:41 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Mar 2007 11:36:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Latapy",
"Matthieu",
"",
"LIP6 - CNRS and UPMC, France"
],
[
"Magnien",
"Clemence",
"",
"LIP6 - CNRS and UPMC, France"
]
]
|
cs/0609116 | Clemence Magnien | Matthieu Latapy (LIAFA - CNRS, Universite Paris 7) | Theory and Practice of Triangle Problems in Very Large (Sparse
(Power-Law)) Graphs | null | null | null | null | cs.DS cond-mat.stat-mech cs.NI | null | Finding, counting and/or listing triangles (three vertices with three edges)
in large graphs are natural fundamental problems, which received recently much
attention because of their importance in complex network analysis. We provide
here a detailed state of the art on these problems, in a unified way. We note
that, until now, authors paid surprisingly little attention to space
complexity, despite its both fundamental and practical interest. We give the
space complexities of known algorithms and discuss their implications. Then we
propose improvements of a known algorithm, as well as a new algorithm, which
are time optimal for triangle listing and beats previous algorithms concerning
space complexity. They have the additional advantage of performing better on
power-law graphs, which we also study. We finally show with an experimental
study that these two algorithms perform very well in practice, allowing to
handle cases that were previously out of reach.
| [
{
"version": "v1",
"created": "Wed, 20 Sep 2006 14:17:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Latapy",
"Matthieu",
"",
"LIAFA - CNRS, Universite Paris 7"
]
]
|
cs/0609118 | Prahladavaradan Sampath | Prahladavaradan Sampath | Duality of Fix-Points for Distributive Lattices | 7 pages | null | null | null | cs.DS cs.DM | null | We present a novel algorithm for calculating fix-points. The algorithm
calculates fix-points of an endo-function f on a distributive lattice, by
performing reachability computation a graph derived from the dual of f; this is
in comparison to traditional algorithms that are based on iterated application
of f until a fix-point is reached.
| [
{
"version": "v1",
"created": "Thu, 21 Sep 2006 17:34:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sampath",
"Prahladavaradan",
""
]
]
|
cs/0609119 | Adrian Paschke | Adrian Paschke | Verification, Validation and Integrity of Distributed and Interchanged
Rule Based Policies and Contracts in the Semantic Web | A.Paschke: Verification, Validation, Integrity of Rule Based Policies
and Contracts in the Semantic Web, 2nd International Semantic Web Policy
Workshop (SWPW'06), Nov. 5-9, 2006, Athens, GA, USA | A.Paschke: Verification, Validation, Integrity of Rule Based
Policies and Contracts in the Semantic Web, 2nd International Semantic Web
Policy Workshop (SWPW'06), Nov. 5-9, 2006, Athens, GA, USA | null | null | cs.AI cs.SE | null | Rule-based policy and contract systems have rarely been studied in terms of
their software engineering properties. This is a serious omission, because in
rule-based policy or contract representation languages rules are being used as
a declarative programming language to formalize real-world decision logic and
create IS production systems upon. This paper adopts an SE methodology from
extreme programming, namely test driven development, and discusses how it can
be adapted to verification, validation and integrity testing (V&V&I) of policy
and contract specifications. Since, the test-driven approach focuses on the
behavioral aspects and the drawn conclusions instead of the structure of the
rule base and the causes of faults, it is independent of the complexity of the
rule language and the system under test and thus much easier to use and
understand for the rule engineer and the user.
| [
{
"version": "v1",
"created": "Thu, 21 Sep 2006 11:50:24 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2006 08:50:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
]
|
cs/0609120 | Adrian Paschke | Adrian Paschke | Rule-based Knowledge Representation for Service Level Agreement | Doctoral Symposium of 4th Conf. on Multiagent System Technologies
(MATES'06), Germany, 2006 | null | null | null | cs.AI cs.DB cs.LO cs.MA cs.SE | null | Automated management and monitoring of service contracts like Service Level
Agreements (SLAs) or higher-level policies is vital for efficient and reliable
distributed service-oriented architectures (SOA) with high quality of ser-vice
(QoS) levels. IT service provider need to manage, execute and maintain
thousands of SLAs for different customers and different types of services,
which needs new levels of flexibility and automation not available with the
current technol-ogy. I propose a novel rule-based knowledge representation (KR)
for SLA rules and a respective rule-based service level management (RBSLM)
framework. My rule-based approach based on logic programming provides several
advantages including automated rule chaining allowing for compact knowledge
representation and high levels of automation as well as flexibility to adapt to
rapidly changing business requirements. Therewith, I address an urgent need
service-oriented busi-nesses do have nowadays which is to dynamically change
their business and contractual logic in order to adapt to rapidly changing
business environments and to overcome the restricting nature of slow change
cycles.
| [
{
"version": "v1",
"created": "Thu, 21 Sep 2006 12:04:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
]
|
cs/0609124 | Micaela Mayero | Micaela Mayero (INRIA Futurs) | The Three Gap Theorem (Steinhauss Conjecture) | null | Types for Proofs and Programs: International Workshop, TYPES'99,
L\"{o}keberg, Sweden, June 1999. Selected Papers (2000) 162 | null | null | cs.LO | null | We deal with the distribution of N points placed consecutively around the
circle by a fixed angle of a. From the proof of Tony van Ravenstein, we propose
a detailed proof of the Steinhaus conjecture whose result is the following: the
N points partition the circle into gaps of at most three different lengths. We
study the mathematical notions required for the proof of this theorem revealed
during a formal proof carried out in Coq.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 11:30:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mayero",
"Micaela",
"",
"INRIA Futurs"
]
]
|
cs/0609125 | Goren Gordon | Goren Gordon and Uri Einziger-Lowicz | Problem Evolution: A new approach to problem solving systems | 10 pages, 2 figures | null | null | null | cs.NE | null | In this paper we present a novel tool to evaluate problem solving systems.
Instead of using a system to solve a problem, we suggest using the problem to
evaluate the system. By finding a numerical representation of a problem's
complexity, one can implement genetic algorithm to search for the most complex
problem the given system can solve. This allows a comparison between different
systems that solve the same set of problems. In this paper we implement this
approach on pattern recognition neural networks to try and find the most
complex pattern a given configuration can solve. The complexity of the pattern
is calculated using linguistic complexity. The results demonstrate the power of
the problem evolution approach in ranking different neural network
configurations according to their pattern recognition abilities. Future
research and implementations of this technique are also discussed.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 12:40:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gordon",
"Goren",
""
],
[
"Einziger-Lowicz",
"Uri",
""
]
]
|
cs/0609127 | Ethan Kim | Anil Ada, Melanie Coggan, Paul Di Marco, Alain Doyon, Liam Flookes,
Samuli Heilala, Ethan Kim, Jonathan Li On Wing, Louis-Francois
Preville-Ratelle, Sue Whitesides, and Nuo Yu | On Bus Graph Realizability | Tech Report in School of Computer Science, McGill University Poster
version of this paper was presented at the International Symposium on Graph
Drawing 2006 | null | null | SOCS-TR-2006.1 | cs.CG cs.DM | null | In this paper, we consider the following graph embedding problem: Given a
bipartite graph G = (V1; V2;E), where the maximum degree of vertices in V2 is
4, can G be embedded on a two dimensional grid such that each vertex in V1 is
drawn as a line segment along a grid line, each vertex in V2 is drawn as a
point at a grid point, and each edge e = (u; v) for some u 2 V1 and v 2 V2 is
drawn as a line segment connecting u and v, perpendicular to the line segment
for u? We show that this problem is NP-complete, and sketch how our proof
techniques can be used to show the hardness of several other related problems.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 18:01:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ada",
"Anil",
""
],
[
"Coggan",
"Melanie",
""
],
[
"Di Marco",
"Paul",
""
],
[
"Doyon",
"Alain",
""
],
[
"Flookes",
"Liam",
""
],
[
"Heilala",
"Samuli",
""
],
[
"Kim",
"Ethan",
""
],
[
"Wing",
"Jonathan Li On",
""
],
[
"Preville-Ratelle",
"Louis-Francois",
""
],
[
"Whitesides",
"Sue",
""
],
[
"Yu",
"Nuo",
""
]
]
|
cs/0609128 | Marcin Kaminski | Josep Diaz and Marcin Kaminski | Max-Cut and Max-Bisection are NP-hard on unit disk graphs | null | null | null | null | cs.DS cs.CC | null | We prove that the Max-Cut and Max-Bisection problems are NP-hard on unit disk
graphs. We also show that $\lambda$-precision graphs are planar for $\lambda$ >
1 / \sqrt{2}$.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 18:17:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Diaz",
"Josep",
""
],
[
"Kaminski",
"Marcin",
""
]
]
|
cs/0609130 | Salvatore Caporaso | Salvatore Caporaso | A Predicative Harmonization of the Time and Provable Hierarchies | 11 pages | null | null | null | cs.LO cs.CC | null | A decidable transfinite hierarchy is defined by assigning ordinals to the
programs of an imperative language. It singles out: the classes TIMEF(n^c) and
TIMEF(n_c); the finite Grzegorczyk classes at and above the elementary level,
and the \Sigma_k-IND fragments of PA. Limited operators, diagonalization, and
majorization functions are not used.
| [
{
"version": "v1",
"created": "Sat, 23 Sep 2006 14:28:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Caporaso",
"Salvatore",
""
]
]
|
cs/0609131 | Ran Ren | Ran Ren, Madan mohan Manokar, Yaogang Shi, Baoyu Zheng | A Fast Block Matching Algorithm for Video Motion Estimation Based on
Particle Swarm Optimization and Motion Prejudgment | 10 pages, 12 figures, submitted to ACM Symposium of Applied
Computing(SAC) | null | null | null | cs.MM | null | In this paper, we propose a fast 2-D block-based motion estimation algorithm
called Particle Swarm Optimization - Zero-motion Prejudgment(PSO-ZMP) which
consists of three sequential routines: 1)Zero-motion prejudgment. The routine
aims at finding static macroblocks(MB) which do not need to perform remaining
search thus reduces the computational cost; 2)Predictive image coding and 3)PSO
matching routine. Simulation results obtained show that the proposed PSO-ZMP
algorithm achieves over 10 times of computation less than Diamond Search(DS)
and 5 times less than the recent proposed Adaptive Rood Pattern
Searching(ARPS). Meanwhile the PSNR performances using PSO-ZMP are very close
to that using DS and ARPS in some less-motioned sequences. While in some
sequences containing dense and complex motion contents, the PSNR performances
of PSO-ZMP are several dB lower than that using DS and ARPS but in an
acceptable degree.
| [
{
"version": "v1",
"created": "Sun, 24 Sep 2006 09:55:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ren",
"Ran",
""
],
[
"Manokar",
"Madan mohan",
""
],
[
"Shi",
"Yaogang",
""
],
[
"Zheng",
"Baoyu",
""
]
]
|
cs/0609132 | Jochen Gruber | Jochen Gruber | Semantic Description of Parameters in Web Service Annotations | 7 pages, 3 figures | null | null | null | cs.AI | null | A modification of OWL-S regarding parameter description is proposed. It is
strictly based on Description Logic. In addition to class description of
parameters it also allows the modelling of relations between parameters and the
precise description of the size of data to be supplied to a service. In
particular, it solves two major issues identified within current proposals for
a Semantic Web Service annotation standard.
| [
{
"version": "v1",
"created": "Sun, 24 Sep 2006 17:29:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gruber",
"Jochen",
""
]
]
|
cs/0609141 | Iosif Pinelis | Iosif Pinelis | Polygon Convexity: A Minimal O(n) Test | 14 pages | null | null | null | cs.CG cs.CC math.CO math.MG | null | An O(n) test for polygon convexity is stated and proved. It is also proved
that the test is minimal in a certain exact sense.
| [
{
"version": "v1",
"created": "Mon, 25 Sep 2006 19:23:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pinelis",
"Iosif",
""
]
]
|
cs/0609142 | Bruno Scherrer | Bruno Scherrer (INRIA Lorraine - LORIA) | Modular self-organization | null | null | null | null | cs.AI | null | The aim of this paper is to provide a sound framework for addressing a
difficult problem: the automatic construction of an autonomous agent's modular
architecture. We combine results from two apparently uncorrelated domains:
Autonomous planning through Markov Decision Processes and a General Data
Clustering Approach using a kernel-like method. Our fundamental idea is that
the former is a good framework for addressing autonomy whereas the latter
allows to tackle self-organizing problems.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 07:52:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Scherrer",
"Bruno",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0609143 | Adrian Paschke | Adrian Paschke | ECA-LP / ECA-RuleML: A Homogeneous Event-Condition-Action Logic
Programming Language | Paschke, A.: ECA-LP / ECA-RuleML: A Homogeneous
Event-Condition-Action Logic Programming Language, Int. Conf. on Rules and
Rule Markup Languages for the Semantic Web (RuleML06), Athens, Georgia, USA,
Nov. 2006 | Paschke, A.: ECA-LP / ECA-RuleML: A Homogeneous
Event-Condition-Action Logic Programming Language, Int. Conf. on Rules and
Rule Markup Languages for the Semantic Web (RuleML06), Athens, Georgia, USA,
Nov. 2006 | null | null | cs.AI cs.LO cs.SE | null | Event-driven reactive functionalities are an urgent need in nowadays
distributed service-oriented applications and (Semantic) Web-based
environments. An important problem to be addressed is how to correctly and
efficiently capture and process the event-based behavioral, reactive logic
represented as ECA rules in combination with other conditional decision logic
which is represented as derivation rules. In this paper we elaborate on a
homogeneous integration approach which combines derivation rules, reaction
rules (ECA rules) and other rule types such as integrity constraint into the
general framework of logic programming. The developed ECA-LP language provides
expressive features such as ID-based updates with support for external and
self-updates of the intensional and extensional knowledge, transac-tions
including integrity testing and an event algebra to define and process complex
events and actions based on a novel interval-based Event Calculus variant.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 14:36:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
]
|
cs/0609144 | Richard McClatchey | E. Jimenez-Ruiz, R. Berlanga, I. Sanz, R. McClatchey, R. Danger, D.
Manset, J. Paraire, A. Rios | The Management and Integration of Biomedical Knowledge: Application in
the Health-e-Child Project (Position Paper) | 6 pages; 2 figures. Proceedings of the 1st International Workshop on
Ontology content and evaluation in Enterprise | null | null | null | cs.DB | null | The Health-e-Child project aims to develop an integrated healthcare platform
for European paediatrics. In order to achieve a comprehensive view of childrens
health, a complex integration of biomedical data, information, and knowledge is
necessary. Ontologies will be used to formally define this domain knowledge and
will form the basis for the medical knowledge management system. This paper
introduces an innovative methodology for the vertical integration of biomedical
knowledge. This approach will be largely clinician-centered and will enable the
definition of ontology fragments, connections between them (semantic bridges)
and enriched ontology fragments (views). The strategy for the specification and
capture of fragments, bridges and views is outlined with preliminary examples
demonstrated in the collection of biomedical information from hospital
databases, biomedical ontologies, and biomedical public databases.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 15:21:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jimenez-Ruiz",
"E.",
""
],
[
"Berlanga",
"R.",
""
],
[
"Sanz",
"I.",
""
],
[
"McClatchey",
"R.",
""
],
[
"Danger",
"R.",
""
],
[
"Manset",
"D.",
""
],
[
"Paraire",
"J.",
""
],
[
"Rios",
"A.",
""
]
]
|
cs/0609145 | Alexandre d'Aspremont | Alexandre d'Aspremont, Laurent El Ghaoui | A Semidefinite Relaxation for Air Traffic Flow Scheduling | Submitted to RIVF 2007 | null | null | null | cs.CE | null | We first formulate the problem of optimally scheduling air traffic low with
sector capacity constraints as a mixed integer linear program. We then use
semidefinite relaxation techniques to form a convex relaxation of that problem.
Finally, we present a randomization algorithm to further improve the quality of
the solution. Because of the specific structure of the air traffic flow
problem, the relaxation has a single semidefinite constraint of size dn where d
is the maximum delay and n the number of flights.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 15:34:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
],
[
"Ghaoui",
"Laurent El",
""
]
]
|
cs/0609149 | Qing Zhao | Qing Zhao and Brian M. Sadler | Dynamic Spectrum Access: Signal Processing, Networking, and Regulatory
Policy | 20 pages, 7 figures, submitted to IEEE Signal Processing Magazine | null | null | null | cs.NI | null | In this article, we first provide a taxonomy of dynamic spectrum access. We
then focus on opportunistic spectrum access, the overlay approach under the
hierarchical access model of dynamic spectrum access. we aim to provide an
overview of challenges and recent developments in both technological and
regulatory aspects of opportunistic spectrum access.
| [
{
"version": "v1",
"created": "Wed, 27 Sep 2006 08:05:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhao",
"Qing",
""
],
[
"Sadler",
"Brian M.",
""
]
]
|
cs/0609150 | Eric Rondeau | Belynda Brahimi (CRAN), Christophe Aubrun (CRAN), Eric Rondeau (CRAN) | Modelling and Simulation of Scheduling Policies Implemented in Ethernet
Switch by Using Coloured Petri Nets | 8 pages | 11th IEEE International Conference on Emerging Technologies and
Factory Automation, Tch\`{e}que, R\'{e}publique (2006) 667 - 674 | null | null | cs.NI | null | The objective of this paper is to propose models enabling to study the
behaviour of Ethernet switch for Networked Control Systems. Two scheduler
policies are analyzed: the static priority and the WRR (Weighted Round Robin).
The modelling work is based on Coloured Petri Nets. A temporal validation step
based on the simulation of these modelling, shows that the obtained results are
near to the expected behaviour of these scheduler policies.
| [
{
"version": "v1",
"created": "Wed, 27 Sep 2006 07:59:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brahimi",
"Belynda",
"",
"CRAN"
],
[
"Aubrun",
"Christophe",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
]
]
|
cs/0609153 | Pavel Dmitriev | Pavel Dmitriev, Carl Lagoze | Mining Generalized Graph Patterns based on User Examples | 11 pages, 11 figures. A short version of this paper appears in
proceedings of ICDM-2006 conference | null | null | null | cs.DS cs.LG | null | There has been a lot of recent interest in mining patterns from graphs.
Often, the exact structure of the patterns of interest is not known. This
happens, for example, when molecular structures are mined to discover fragments
useful as features in chemical compound classification task, or when web sites
are mined to discover sets of web pages representing logical documents. Such
patterns are often generated from a few small subgraphs (cores), according to
certain generalization rules (GRs). We call such patterns "generalized
patterns"(GPs). While being structurally different, GPs often perform the same
function in the network. Previously proposed approaches to mining GPs either
assumed that the cores and the GRs are given, or that all interesting GPs are
frequent. These are strong assumptions, which often do not hold in practical
applications. In this paper, we propose an approach to mining GPs that is free
from the above assumptions. Given a small number of GPs selected by the user,
our algorithm discovers all GPs similar to the user examples. First, a machine
learning-style approach is used to find the cores. Second, generalizations of
the cores in the graph are computed to identify GPs. Evaluation on synthetic
data, generated using real cores and GRs from biological and web domains,
demonstrates effectiveness of our approach.
| [
{
"version": "v1",
"created": "Wed, 27 Sep 2006 18:42:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dmitriev",
"Pavel",
""
],
[
"Lagoze",
"Carl",
""
]
]
|
cs/0609158 | Kwok-Wo Wong | Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law | A Fast Image Encryption Scheme based on Chaotic Standard Map | 16 pages, 7 figures | null | null | null | cs.CR cs.MM | null | In recent years, a variety of effective chaos-based image encryption schemes
have been proposed. The typical structure of these schemes has the permutation
and the diffusion stages performed alternatively. The confusion and diffusion
effect is solely contributed by the permutation and the diffusion stage,
respectively. As a result, more overall rounds than necessary are required to
achieve a certain level of security. In this paper, we suggest to introduce
certain diffusion effect in the confusion stage by simple sequential
add-and-shift operations. The purpose is to reduce the workload of the
time-consuming diffusion part so that fewer overall rounds and hence a shorter
encryption time is needed. Simulation results show that at a similar
performance level, the proposed cryptosystem needs less than one-third the
encryption time of an existing cryptosystem. The effective acceleration of the
encryption speed is thus achieved.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 07:36:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wong",
"Kwok-Wo",
""
],
[
"Kwok",
"Bernie Sin-Hung",
""
],
[
"Law",
"Wing-Shing",
""
]
]
|
cs/0609163 | Shay Kutten | Amos Korman and Shay Kutten | Labeling Schemes with Queries | null | null | null | null | cs.DC | null | We study the question of ``how robust are the known lower bounds of labeling
schemes when one increases the number of consulted labels''. Let $f$ be a
function on pairs of vertices. An $f$-labeling scheme for a family of graphs
$\cF$ labels the vertices of all graphs in $\cF$ such that for every graph
$G\in\cF$ and every two vertices $u,v\in G$, the value $f(u,v)$ can be inferred
by merely inspecting the labels of $u$ and $v$.
This paper introduces a natural generalization: the notion of $f$-labeling
schemes with queries, in which the value $f(u,v)$ can be inferred by inspecting
not only the labels of $u$ and $v$ but possibly the labels of some additional
vertices. We show that inspecting the label of a single additional vertex (one
{\em query}) enables us to reduce the label size of many labeling schemes
significantly.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 12:31:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Korman",
"Amos",
""
],
[
"Kutten",
"Shay",
""
]
]
|
cs/0609164 | Ikuo Moritani | S. Aogaki, I. Moritani, T. Sugai, F. Takeutchi, and F.M. Toyama | Conditional Expressions for Blind Deconvolution: Multi-point form | 4 pages, 3 figures, conference | null | null | null | cs.CV | null | We present conditional expression (CE) for finding blurs convolved in given
images. The CE is given in terms of the zero-values of the blurs evaluated at
multi-point. The CE can detect multiple blur all at once. We illustrate the
multiple blur-detection by using a test image.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 13:48:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aogaki",
"S.",
""
],
[
"Moritani",
"I.",
""
],
[
"Sugai",
"T.",
""
],
[
"Takeutchi",
"F.",
""
],
[
"Toyama",
"F. M.",
""
]
]
|
cs/0609165 | Ikuo Moritani | S. Aogaki, I. Moritani, T. Sugai, F. Takeutchi, and F.M. Toyama | Simple method to eliminate blur based on Lane and Bates algorithm | 3 pages, 2 figures, conference | null | null | null | cs.CV | null | A simple search method for finding a blur convolved in a given image is
presented. The method can be easily extended to a large blur. The method has
been experimentally tested with a model blurred image.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 13:50:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aogaki",
"S.",
""
],
[
"Moritani",
"I.",
""
],
[
"Sugai",
"T.",
""
],
[
"Takeutchi",
"F.",
""
],
[
"Toyama",
"F. M.",
""
]
]
|
cs/0609166 | Xuan Zheng | Martin J. Strauss, Xuan Zheng | Private Approximate Heavy Hitters | 17 pages, submitted | null | null | null | cs.CR | null | We consider the problem of private computation of approximate Heavy Hitters.
Alice and Bob each hold a vector and, in the vector sum, they want to find the
B largest values along with their indices. While the exact problem requires
linear communication, protocols in the literature solve this problem
approximately using polynomial computation time, polylogarithmic communication,
and constantly many rounds. We show how to solve the problem privately with
comparable cost, in the sense that nothing is learned by Alice and Bob beyond
what is implied by their input, the ideal top-B output, and goodness of
approximation (equivalently, the Euclidean norm of the vector sum). We give
lower bounds showing that the Euclidean norm must leak by any efficient
algorithm.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 16:05:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Strauss",
"Martin J.",
""
],
[
"Zheng",
"Xuan",
""
]
]
|
cs/0609167 | V\'ictor Cuevas | Mauricio Osorio and V\'ictor Cuevas | Updates in Answer Set Programming: An Approach Based on Basic Structural
Properties | 30 pages, to be published in Theory and Practice of Logic Programming | null | null | null | cs.LO | null | We have studied the update operator defined for update sequences by Eiter et
al. without tautologies and we have observed that it satisfies an interesting
property This property, which we call Weak Independence of Syntax (WIS), is
similar to one of the postulates proposed by Alchourron, Gardenfors, and
Makinson (AGM); only that in this case it applies to nonmonotonic logic. In
addition, we consider other five additional basic properties about update
programs and we show that the operator of Eiter et al. satisfies them. This
work continues the analysis of the AGM postulates under a refined view that
considers nelson logic as a monotonic logic which allows us to expand our
understanding of answer sets. Moreover, nelson logic helped us to derive an
alternative definition of the operator defined by Eiter et al. avoiding the use
of unnecessary extra atoms.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 17:00:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Osorio",
"Mauricio",
""
],
[
"Cuevas",
"Víctor",
""
]
]
|
cs/0610001 | Kunihiko Sadakane | Daisuke Okanohara, Kunihiko Sadakane | Practical Entropy-Compressed Rank/Select Dictionary | null | null | null | null | cs.DS | null | Rank/Select dictionaries are data structures for an ordered set $S \subset
\{0,1,...,n-1\}$ to compute $\rank(x,S)$ (the number of elements in $S$ which
are no greater than $x$), and $\select(i,S)$ (the $i$-th smallest element in
$S$), which are the fundamental components of \emph{succinct data structures}
of strings, trees, graphs, etc. In those data structures, however, only
asymptotic behavior has been considered and their performance for real data is
not satisfactory. In this paper, we propose novel four Rank/Select
dictionaries, esp, recrank, vcode and sdarray, each of which is small if the
number of elements in $S$ is small, and indeed close to $nH_0(S)$ ($H_0(S) \leq
1$ is the zero-th order \textit{empirical entropy} of $S$) in practice, and its
query time is superior to the previous ones. Experimental results reveal the
characteristics of our data structures and also show that these data structures
are superior to existing implementations in both size and query time.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 23:52:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Okanohara",
"Daisuke",
""
],
[
"Sadakane",
"Kunihiko",
""
]
]
|
cs/0610002 | Ikuo Moritani | S. Aogaki, I. Moritani, T. Sugai, F. Takeutchi, and F.M. Toyama | Conditional Expressions for Blind Deconvolution: Derivative form | 5 page, 3 figures, conference | null | null | null | cs.CV | null | We developed novel conditional expressions (CEs) for Lane and Bates' blind
deconvolution. The CEs are given in term of the derivatives of the zero-values
of the z-transform of given images. The CEs make it possible to automatically
detect multiple blur convolved in the given images all at once without
performing any analysis of the zero-sheets of the given images. We illustrate
the multiple blur-detection by the CEs for a model image
| [
{
"version": "v1",
"created": "Sat, 30 Sep 2006 08:05:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aogaki",
"S.",
""
],
[
"Moritani",
"I.",
""
],
[
"Sugai",
"T.",
""
],
[
"Takeutchi",
"F.",
""
],
[
"Toyama",
"F. M.",
""
]
]
|
cs/0610005 | Ran Ren | Ran Ren | Domain Wall Displacement Detection Technology Research Report | 4 pages, 0 figures | null | null | null | cs.OH | null | This article introduce a new data storage method called DWDD(Domain Wall
Displacement Detection) and tell you why it succeed.
| [
{
"version": "v1",
"created": "Mon, 2 Oct 2006 04:38:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ren",
"Ran",
""
]
]
|
cs/0610006 | Adrian Paschke | Adrian Paschke | A Typed Hybrid Description Logic Programming Language with Polymorphic
Order-Sorted DL-Typed Unification for Semantic Web Type Systems | Full technical report 12/05. Published inn: Proc. of 2nd Int.
Workshop on OWL: Experiences and Directions 2006 (OWLED'06) at ISWC'06,
Athens, Georgia, USA, 2006 | In: Proc. of 2nd Int. Workshop on OWL: Experiences and Directions
2006 (OWLED'06) at ISWC'06, Athens, Georgia, USA, 2006 | null | null | cs.AI | null | In this paper we elaborate on a specific application in the context of hybrid
description logic programs (hybrid DLPs), namely description logic Semantic Web
type systems (DL-types) which are used for term typing of LP rules based on a
polymorphic, order-sorted, hybrid DL-typed unification as procedural semantics
of hybrid DLPs. Using Semantic Web ontologies as type systems facilitates
interchange of domain-independent rules over domain boundaries via dynamically
typing and mapping of explicitly defined type ontologies.
| [
{
"version": "v1",
"created": "Mon, 2 Oct 2006 08:57:54 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Apr 2007 21:36:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
]
|
cs/0610007 | Guenther Eichhorn | G\"unther Eichhorn, Alberto Accomazzi, Carolyn S. Grant, Edwin A.
Henneken, Donna M. Thompson, Michael J. Kurtz, Stephen S. Murray | Full Text Searching in the Astrophysics Data System | To appear in Library and Information Systems in Astronomy V | null | null | null | cs.DL astro-ph cs.DB | null | The Smithsonian/NASA Astrophysics Data System (ADS) provides a search system
for the astronomy and physics scholarly literature. All major and many smaller
astronomy journals that were published on paper have been scanned back to
volume 1 and are available through the ADS free of charge. All scanned pages
have been converted to text and can be searched through the ADS Full Text
Search System. In addition, searches can be fanned out to several external
search systems to include the literature published in electronic form. Results
from the different search systems are combined into one results list.
The ADS Full Text Search System is available at:
http://adsabs.harvard.edu/fulltext_service.html
| [
{
"version": "v1",
"created": "Mon, 2 Oct 2006 14:51:45 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Oct 2006 13:11:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eichhorn",
"Günther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Henneken",
"Edwin A.",
""
],
[
"Thompson",
"Donna M.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Murray",
"Stephen S.",
""
]
]
|
cs/0610008 | Guenther Eichhorn | G\"unther Eichhorn, Alberto Accomazzi, Carolyn S. Grant, Edwin A.
Henneken, Donna M. Thompson, Michael J. Kurtz, Stephen S. Murray | Connectivity in the Astronomy Digital Library | To appear in Library and Information Systems in Astronomy V | null | null | null | cs.DL astro-ph cs.DB | null | The Astrophysics Data System (ADS) provides an extensive system of links
between the literature and other on-line information. Recently, the journals of
the American Astronomical Society (AAS) and a group of NASA data centers have
collaborated to provide more links between on-line data obtained by space
missions and the on-line journals. Authors can now specify which data sets they
have used in their article. This information is used by the participants to
provide the links between the literature and the data.
The ADS is available at: http://ads.harvard.edu
| [
{
"version": "v1",
"created": "Mon, 2 Oct 2006 15:06:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eichhorn",
"Günther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Henneken",
"Edwin A.",
""
],
[
"Thompson",
"Donna M.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Murray",
"Stephen S.",
""
]
]
|
cs/0610011 | Alberto Accomazzi | Alberto Accomazzi, Gunther Eichhorn, Michael J. Kurtz, Carolyn S.
Grant, Edwin Henneken, Markus Demleitner, Donna Thompson, Elizabeth Bohlen,
Stephen S. Murray | Creation and use of Citations in the ADS | 9 pages; to be published in the proceedings of the conference
"Library and Information Services V," June 2006, Cambridge, MA, USA | null | null | null | cs.DL astro-ph cs.DB cs.IR | null | With over 20 million records, the ADS citation database is regularly used by
researchers and librarians to measure the scientific impact of individuals,
groups, and institutions. In addition to the traditional sources of citations,
the ADS has recently added references extracted from the arXiv e-prints on a
nightly basis. We review the procedures used to harvest and identify the
reference data used in the creation of citations, the policies and procedures
that we follow to avoid double-counting and to eliminate contributions which
may not be scholarly in nature. Finally, we describe how users and institutions
can easily obtain quantitative citation data from the ADS, both interactively
and via web-based programming tools.
The ADS is available at http://ads.harvard.edu.
| [
{
"version": "v1",
"created": "Tue, 3 Oct 2006 21:29:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Accomazzi",
"Alberto",
""
],
[
"Eichhorn",
"Gunther",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Demleitner",
"Markus",
""
],
[
"Thompson",
"Donna",
""
],
[
"Bohlen",
"Elizabeth",
""
],
[
"Murray",
"Stephen S.",
""
]
]
|
cs/0610013 | Francois Charoy | Khaled Gaaloul (INRIA Lorraine - LORIA), Fran\c{c}ois Charoy (INRIA
Lorraine - LORIA), Claude Godart (INRIA Lorraine - LORIA) | Cooperative Processes for Scientific Workflows | null | Dans 6th International Conference on Computational Science 3, 3993
(2006) 976-979 | null | null | cs.NI | null | The work described in this paper is a contribution to the problems of
managing in data-intensive scientific applications. First, we discuss
scientific workflows and motivate there use in scientific applications. Then,
we introduce the concept of cooperative processes and describe their
interactions and uses in a flexible cooperative workflow system called
\textit{Bonita}. Finally, we propose an approach to integrate and synthesize
the data exchanged by the mapping of data-intensive science into Bonita, using
a binary approach, and illustrate the endeavors done to enhance the performance
computations within a dynamic environment.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 08:21:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gaaloul",
"Khaled",
"",
"INRIA Lorraine - LORIA"
],
[
"Charoy",
"François",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Godart",
"Claude",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0610015 | Farid Nouioua | Farid Nouioua (LIPN) | Why did the accident happen? A norm-based reasoning approach | null | Logical Aspects of Computational Linguistics, student
sessionUniversit\'{e} de bordeaux (Ed.) (2005) 31-34 | null | null | cs.AI | null | In this paper we describe an architecture of a system that answer the
question : Why did the accident happen? from the textual description of an
accident. We present briefly the different parts of the architecture and then
we describe with more detail the semantic part of the system i.e. the part in
which the norm-based reasoning is performed on the explicit knowlege extracted
from the text.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 11:32:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nouioua",
"Farid",
"",
"LIPN"
]
]
|
cs/0610016 | Farid Nouioua | Farid Nouioua (LIPN) | Norm Based Causal Reasoning in Textual Corpus | null | Proceedings of the Sixth International Workshop on Computational
Semantics IWCS-6, France (2005) 396-400 | null | null | cs.AI cs.CL | null | Truth based entailments are not sufficient for a good comprehension of NL. In
fact, it can not deduce implicit information necessary to understand a text. On
the other hand, norm based entailments are able to reach this goal. This idea
was behind the development of Frames (Minsky 75) and Scripts (Schank 77, Schank
79) in the 70's. But these theories are not formalized enough and their
adaptation to new situations is far from being obvious. In this paper, we
present a reasoning system which uses norms in a causal reasoning process in
order to find the cause of an accident from a text describing it.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 11:33:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nouioua",
"Farid",
"",
"LIPN"
]
]
|
cs/0610017 | Maruti Satti | Maruti Satti | A Quasigroup Based Cryptographic System | 22 pages, 11 figures | null | null | null | cs.CR | null | This paper presents a quasigroup encryptor that has very good scrambling
properties. We show that the output of the encryptor maximizes the output
entropy and the encrypted output for constant and random inputs is very
similar. The system architecture of the quasigroup encryptor and the
autocorrelation properties of the output sequences are provided.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 12:29:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Satti",
"Maruti",
""
]
]
|
cs/0610018 | Farid Nouioua | Farid Nouioua (LIPN) | Raisonnement stratifi\'{e} \`{a} base de normes pour inf\'{e}rer les
causes dans un corpus textuel | null | The Seventh International Symposium On Programming and
SystemsUSTHB d'Alger (Ed.) (2005) 81-92 | null | null | cs.AI cs.CL | null | To understand texts written in natural language (LN), we use our knowledge
about the norms of the domain. Norms allow to infer more implicit information
from the text. This kind of information can, in general, be defeasible, but it
remains useful and acceptable while the text do not contradict it explicitly.
In this paper we describe a non-monotonic reasoning system based on the norms
of the car crash domain. The system infers the cause of an accident from its
textual description. The cause of an accident is seen as the most specific norm
which has been violated. The predicates and the rules of the system are
stratified: organized on layers in order to obtain an efficient reasoning.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 13:09:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nouioua",
"Farid",
"",
"LIPN"
]
]
|
cs/0610019 | Juan J. Merelo Pr. | Juan J. Samper, Pedro A. Castillo, Lourdes Araujo, J. J. Merelo | NectaRSS, an RSS feed ranking system that implicitly learns user
preferences | Submitted to First Monday. 16 pages | null | null | null | cs.IR cs.HC | null | In this paper a new RSS feed ranking method called NectaRSS is introduced.
The system recommends information to a user based on his/her past choices. User
preferences are automatically acquired, avoiding explicit feedback, and ranking
is based on those preferences distilled to a user profile. NectaRSS uses the
well-known vector space model for user profiles and new documents, and compares
them using information-retrieval techniques, but introduces a novel method for
user profile creation and adaptation from users' past choices. The efficiency
of the proposed method has been tested by embedding it into an intelligent
aggregator (RSS feed reader), which has been used by different and
heterogeneous users. Besides, this paper proves that the ranking of newsitems
yielded by NectaRSS improves its quality with user's choices, and its
superiority over other algorithms that use a different information
representation method.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 15:13:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Samper",
"Juan J.",
""
],
[
"Castillo",
"Pedro A.",
""
],
[
"Araujo",
"Lourdes",
""
],
[
"Merelo",
"J. J.",
""
]
]
|
cs/0610020 | William Gilreath | William F. Gilreath | XString: XML as a String | 27-pages, 2-tables | null | null | null | cs.DB | null | Extensible markup language (XML) is a technology that has been much hyped, so
that XML has become an industry buzzword. Behind the hype is a powerful
technology for data representation in a platform independent manner. As a text
document, however, XML suffers from being too bloated, and requires an XML
parser to access and manipulate it. XString is an encoding method for XML, in
essence, a markup language's markup language. XString gives the benefit of
compressing XML, and allows for easy manipulation and processing of XML source
as a very long string.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 23:21:11 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Oct 2006 23:03:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gilreath",
"William F.",
""
]
]
|
cs/0610023 | Farid Nouioua | Farid Nouioua (LIPN), Daniel Kayser (LIPN) | Une exp\'{e}rience de s\'{e}mantique inf\'{e}rentielle | null | Actes de TALN'06UCL Presses Universitaires de Louvain (Ed.) (2006)
246-255 | null | null | cs.AI | null | We develop a system which must be able to perform the same inferences that a
human reader of an accident report can do and more particularly to determine
the apparent causes of the accident. We describe the general framework in which
we are situated, linguistic and semantic levels of the analysis and the
inference rules used by the system.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 05:18:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nouioua",
"Farid",
"",
"LIPN"
],
[
"Kayser",
"Daniel",
"",
"LIPN"
]
]
|
cs/0610024 | Eric Rondeau | Belynda Brahimi (CRAN), Christophe Aubrun (CRAN), Eric Rondeau (CRAN) | Network calculus based FDI approach for switched Ethernet architecture | null | 6th IFAC Symposium on Fault Detection, Supervision and Safety of
Technical Processes, Chine (29/08/2006) 6 pages | null | null | cs.NI | null | The Networked Control Systems (NCS) are complex systems which integrate
information provided by several domians such as automatic control, computer
science, communication network. The work presented in this paper concerns fault
detection, isolation and compensation of communication network. The proposed
method is based on the classical approach of Fault Detection and Isolation and
Fault Tolerant Control (FDI/FTC) currently used in diagnosis. The modelling of
the network to be supervised is based on both couloured petri nets and network
calculus theory often used to represent and analyse the network behaviour. The
goal is to implement inside network devices algorithms enabling to detect,
isolate and compensate communication faults in an autonomous way.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 07:53:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brahimi",
"Belynda",
"",
"CRAN"
],
[
"Aubrun",
"Christophe",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
]
]
|
cs/0610026 | Rob van Stee | Leah Epstein and Rob van Stee | Covering selfish machines | null | null | null | null | cs.GT | null | We consider the machine covering problem for selfish related machines. For a
constant number of machines, m, we show a monotone polynomial time
approximation scheme (PTAS) with running time that is linear in the number of
jobs. It uses a new technique for reducing the number of jobs while remaining
close to the optimal solution. We also present an FPTAS for the classical
machine covering problem (the previous best result was a PTAS) and use this to
give a monotone FPTAS.
Additionally, we give a monotone approximation algorithm with approximation
ratio \min(m,(2+\eps)s_1/s_m) where \eps>0 can be chosen arbitrarily small and
s_i is the (real) speed of machine i. Finally we give improved results for two
machines.
Our paper presents the first results for this problem in the context of
selfish machines.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 13:20:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Epstein",
"Leah",
""
],
[
"van Stee",
"Rob",
""
]
]
|
cs/0610028 | Olivier Zendra | Olivier Zendra (INRIA Lorraine - LORIA, LORIA) | Memory and compiler optimizations for low-power and -energy | ICOOOLPS'2006 was co-located with the 20th European Conference on
Object-Oriented Programming (ECOOP'2006) | Dans 1st ECOOP Workshop on Implementation, Compilation,
Optimization of Object-Oriented Languages, Programs and Systems
(ICOOOLPS'2006). (2006) | null | null | cs.PL cs.PF | null | Embedded systems become more and more widespread, especially autonomous ones,
and clearly tend to be ubiquitous. In such systems, low-power and low-energy
usage get ever more crucial. Furthermore, these issues also become paramount in
(massively) multi-processors systems, either in one machine or more widely in a
grid. The various problems faced pertain to autonomy, power supply
possibilities, thermal dissipation, or even sheer energy cost. Although it has
since long been studied in harware, energy optimization is more recent in
software. In this paper, we thus aim at raising awareness to low-power and
low-energy issues in the language and compilation community. We thus broadly
but briefly survey techniques and solutions to this energy issue, focusing on a
few specific aspects in the context of compiler optimizations and memory
management.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 17:58:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zendra",
"Olivier",
"",
"INRIA Lorraine - LORIA, LORIA"
]
]
|
cs/0610029 | Alberto Accomazzi | Carolyn S. Grant, Alberto Accomazzi, Donna Thompson, Edwin Henneken,
Guenther Eichhorn, Michael J. Kurtz, and Stephen S. Murray | Data in the ADS -- Understanding How to Use it Better | 4 pages; submitted to the proceedings of the Library and Information
Services in Astronomy V; to be published by ASP Conference Proceedings | null | null | null | cs.DL cs.DB | null | The Smithsonian/NASA ADS Abstract Service contains a wealth of data for
astronomers and librarians alike, yet the vast majority of usage consists of
rudimentary searches. Hints on how to obtain more focused search results by
using more of the various capabilities of the ADS are presented, including
searching by affiliation. We also discuss the classification of articles by
content and by referee status.
The ADS is funded by NASA Grant NNG06GG68G-16613687.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 18:51:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grant",
"Carolyn S.",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Thompson",
"Donna",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Murray",
"Stephen S.",
""
]
]
|
cs/0610030 | Alberto Accomazzi | Donna M. Thompson, Alberto Accomazzi, Guenther Eichhorn, Carolyn
Grant, Edwin Henneken, Michael J. Kurtz, Elizabeth Bohlen, Stephen S. Murray | Paper to Screen: Processing Historical Scans in the ADS | 4 pages; submitted to the proceedings of Library and Information
Services in Astronomy; to be published in the ASP Conference Series | null | null | null | cs.DL cs.HC | null | The NASA Astrophysics Data System in conjunction with the Wolbach Library at
the Harvard-Smithsonian Center for Astrophysics is working on a project to
microfilm historical observatory publications. The microfilm is then scanned
for inclusion in the ADS. The ADS currently contains over 700,000 scanned pages
of volumes of historical literature. Many of these volumes lack clear
pagination or other bibliographic data that are necessary to take advantage of
the searching capabilities of the ADS. This paper will address some of the
interesting challenges that needed to be resolved during the processing of the
Observatory Reports included in the ADS.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 18:58:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thompson",
"Donna M.",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Grant",
"Carolyn",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Bohlen",
"Elizabeth",
""
],
[
"Murray",
"Stephen S.",
""
]
]
|
cs/0610032 | Mathys Walma | Mathys Walma | Pipelined Feed-Forward Cyclic Redundancy Check (CRC) Calculation | admin note: Paper removed for copyright reasons | null | null | null | cs.NI | null | This paper discusses a method for pipelining the calculation of CRC's, such
as ITU/CCITT CRC32, into a mostly feed-forward architecture. This method allows
several benefits such as independent scaling of circuit frequency and data
throughput. Additionally it allows calculation over packet tails (packet length
not a multiple of CRC input width). Finally it offers the ability to update a
CRC where a subset of data in the packet has changed.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 21:44:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Walma",
"Mathys",
""
]
]
|
cs/0610038 | Hannes Hutzelmeyer | Hannes Hutzelmeyer | Church's thesis is questioned by new calculation paradigm | 32 pages | null | null | null | cs.LO | null | Church's thesis claims that all effecticely calculable functions are
recursive. A shortcoming of the various definitions of recursive functions lies
in the fact that it is not a matter of a syntactical check to find out if an
entity gives rise to a function. Eight new ideas for a precise setup of
arithmetical logic and its metalanguage give the proper environment for the
construction of a special computer, the ARBACUS computer. Computers do not come
to a necessary halt; it is requested that calculators are constructed on the
basis of computers in a way that they always come to a halt, then all
calculations are effective. The ARBATOR is defined as a calculator with
two-layer-computation. It allows for the calculation of all primitive recursive
functions, but multi-level-arbation also allows for the calculation of other
arbative functions that are not primitive recursive. The new paradigm of
calculation does not have the above mentioned shortcoming. The defenders of
Church's thesis are challenged to show that exotic arbative functions are
recursive and to put forward a recursive function that is not arbative. A
construction with three-tier-multi-level-arbation that includes a
diagonalisation leads to the extravagant yet calculable Snark-function that is
not arbative. As long as it is not shown that all exotic arbative functions and
particularily the Snark-function are arithmetically representable Goedel's
first incompleteness sentence is in limbo.
| [
{
"version": "v1",
"created": "Sat, 7 Oct 2006 12:53:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hutzelmeyer",
"Hannes",
""
]
]
|
cs/0610039 | Neil Rubens | Neil Rubens | The Application of Fuzzy Logic to the Construction of the Ranking
Function of Information Retrieval Systems | null | N. Rubens. The application of fuzzy logic to the construction of
the ranking function of information retrieval systems. Computer Modelling and
New Technologies, 10(1):20-27, 2006 | null | null | cs.IR cs.AI | null | The quality of the ranking function is an important factor that determines
the quality of the Information Retrieval system. Each document is assigned a
score by the ranking function; the score indicates the likelihood of relevance
of the document given a query. In the vector space model, the ranking function
is defined by a mathematic expression. We propose a fuzzy logic (FL) approach
to defining the ranking function. FL provides a convenient way of converting
knowledge expressed in a natural language into fuzzy logic rules. The resulting
ranking function could be easily viewed, extended, and verified: * if (tf is
high) and (idf is high) > (relevance is high); * if (overlap is high) >
(relevance is high). By using above FL rules, we are able to achieve
performance approximately equal to the state of the art search engine Apache
Lucene (deltaP10 +0.92%; deltaMAP -0.1%). The fuzzy logic approach allows
combining the logic-based model with the vector model. The resulting model
possesses simplicity and formalism of the logic based model, and the
flexibility and performance of the vector model.
| [
{
"version": "v1",
"created": "Sun, 8 Oct 2006 05:34:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rubens",
"Neil",
""
]
]
|
cs/0610043 | Zengyou He | Zengyou He | Farthest-Point Heuristic based Initialization Methods for K-Modes
Clustering | 7 pages | null | null | null | cs.AI | null | The k-modes algorithm has become a popular technique in solving categorical
data clustering problems in different application domains. However, the
algorithm requires random selection of initial points for the clusters.
Different initial points often lead to considerable distinct clustering
results. In this paper we present an experimental study on applying a
farthest-point heuristic based initialization method to k-modes clustering to
improve its performance. Experiments show that new initialization method leads
to better clustering accuracy than random selection initialization method for
k-modes clustering.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2006 12:12:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
]
]
|
cs/0610048 | Stephen D. Miller | Nathan Keller, Stephen D. Miller, Ilya Mironov, and Ramarathnam
Venkatesan | MV3: A new word based stream cipher using rapid mixing and revolving
buffers | 27 pages, shortened version will appear in "Topics in Cryptology -
CT-RSA 2007" | null | null | null | cs.CR cs.DM math.CO | null | MV3 is a new word based stream cipher for encrypting long streams of data. A
direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word
version will obviously need vast amounts of memory. This scaling issue
necessitates a look for new components and principles, as well as mathematical
analysis to justify their use. Our approach, like RC4's, is based on rapidly
mixing random walks on directed graphs (that is, walks which reach a random
state quickly, from any starting point). We begin with some well understood
walks, and then introduce nonlinearity in their steps in order to improve
security and show long term statistical correlations are negligible. To
minimize the short term correlations, as well as to deter attacks using
equations involving successive outputs, we provide a method for sequencing the
outputs derived from the walk using three revolving buffers. The cipher is fast
-- it runs at a speed of less than 5 cycles per byte on a Pentium IV processor.
A word based cipher needs to output more bits per step, which exposes more
correlations for attacks. Moreover we seek simplicity of construction and
transparent analysis. To meet these requirements, we use a larger state and
claim security corresponding to only a fraction of it. Our design is for an
adequately secure word-based cipher; our very preliminary estimate puts the
security close to exhaustive search for keys of size < 256 bits.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2006 01:23:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Keller",
"Nathan",
""
],
[
"Miller",
"Stephen D.",
""
],
[
"Mironov",
"Ilya",
""
],
[
"Venkatesan",
"Ramarathnam",
""
]
]
|
cs/0610051 | Philippe Trebuchet | Mohab Safey El Din (INRIA Rocquencourt), Philippe Trebuchet (INRIA
Rocquencourt) | Strong bi-homogeneous B\'{e}zout theorem and its use in effective real
algebraic geometry | null | null | null | null | cs.SC | null | Let f1, ..., fs be a polynomial family in Q[X1,..., Xn] (with s less than n)
of degree bounded by D. Suppose that f1, ..., fs generates a radical ideal, and
defines a smooth algebraic variety V. Consider a projection P. We prove that
the degree of the critical locus of P restricted to V is bounded by
D^s(D-1)^(n-s) times binomial of n and n-s. This result is obtained in two
steps. First the critical points of P restricted to V are characterized as
projections of the solutions of Lagrange's system for which a bi-homogeneous
structure is exhibited. Secondly we prove a bi-homogeneous B\'ezout Theorem,
which bounds the sum of the degrees of the equidimensional components of the
radical of an ideal generated by a bi-homogeneous polynomial family. This
result is improved when f1,..., fs is a regular sequence. Moreover, we use
Lagrange's system to design an algorithm computing at least one point in each
connected component of a smooth real algebraic set. This algorithm generalizes,
to the non equidimensional case, the one of Safey El Din and Schost. The
evaluation of the output size of this algorithm gives new upper bounds on the
first Betti number of a smooth real algebraic set. Finally, we estimate its
arithmetic complexity and prove that in the worst cases it is polynomial in n,
s, D^s(D-1)^(n-s) and the binomial of n and n-s, and the complexity of
evaluation of f1,..., fs.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2006 15:02:07 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Oct 2006 15:16:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Din",
"Mohab Safey El",
"",
"INRIA Rocquencourt"
],
[
"Trebuchet",
"Philippe",
"",
"INRIA\n Rocquencourt"
]
]
|
cs/0610055 | Yves Bertot | Yves Bertot (INRIA Sophia Antipolis) | Extending the Calculus of Constructions with Tarski's fix-point theorem | null | null | null | null | cs.LO | null | We propose to use Tarski's least fixpoint theorem as a basis to define
recursive functions in the calculus of inductive constructions. This widens the
class of functions that can be modeled in type-theory based theorem proving
tool to potentially non-terminating functions. This is only possible if we
extend the logical framework by adding the axioms that correspond to classical
logic. We claim that the extended framework makes it possible to reason about
terminating and non-terminating computations and we show that common facilities
of the calculus of inductive construction, like program extraction can be
extended to also handle the new functions.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 12:50:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
]
|
cs/0610058 | Andrew Krizhanovsky A | A. V. Smirnov, T. V. Levashova, M. P. Pashkin, N. G. Shilov, A. A.
Krizhanovsky, A. M. Kashevnik, and A. S. Komarova | Context-sensitive access to e-document corpus | 9 pages, 1 figure, short version of this paper was presented at the
International Conference Corpus Linguistics 2006. October 10-14, St.
Petersburg, Russia | null | null | null | cs.IR | null | The methodology of context-sensitive access to e-documents considers context
as a problem model based on the knowledge extracted from the application
domain, and presented in the form of application ontology. Efficient access to
an information in the text form is needed. Wiki resources as a modern text
format provides huge number of text in a semi formalized structure. At the
first stage of the methodology, documents are indexed against the ontology
representing macro-situation. The indexing method uses a topic tree as a middle
layer between documents and the application ontology. At the second stage
documents relevant to the current situation (the abstract and operational
contexts) are identified and sorted by degree of relevance. Abstract context is
a problem-oriented ontology-based model. Operational context is an
instantiation of the abstract context with data provided by the information
sources. The following parts of the methodology are described: (i) metrics for
measuring similarity of e-documents to ontology, (ii) a document index storing
results of indexing of e-documents against the ontology; (iii) a method for
identification of relevant e-documents based on semantic similarity measures.
Wikipedia (wiki resource) is used as a corpus of e-documents for approach
evaluation in a case study. Text categorization, the presence of metadata, and
an existence of a lot of articles related to different topics characterize the
corpus.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 08:02:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Smirnov",
"A. V.",
""
],
[
"Levashova",
"T. V.",
""
],
[
"Pashkin",
"M. P.",
""
],
[
"Shilov",
"N. G.",
""
],
[
"Krizhanovsky",
"A. A.",
""
],
[
"Kashevnik",
"A. M.",
""
],
[
"Komarova",
"A. S.",
""
]
]
|
cs/0610060 | Mark Levene | Mark Levene and Judit Bar-Ilan | Comparing Typical Opening Move Choices Made by Humans and Chess Engines | 12 pages, 1 figure, 6 tables | null | null | null | cs.AI | null | The opening book is an important component of a chess engine, and thus
computer chess programmers have been developing automated methods to improve
the quality of their books. For chess, which has a very rich opening theory,
large databases of high-quality games can be used as the basis of an opening
book, from which statistics relating to move choices from given positions can
be collected. In order to find out whether the opening books used by modern
chess engines in machine versus machine competitions are ``comparable'' to
those used by chess players in human versus human competitions, we carried out
analysis on 26 test positions using statistics from two opening books one
compiled from humans' games and the other from machines' games. Our analysis
using several nonparametric measures, shows that, overall, there is a strong
association between humans' and machines' choices of opening moves when using a
book to guide their choices.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 10:26:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Levene",
"Mark",
""
],
[
"Bar-Ilan",
"Judit",
""
]
]
|
cs/0610062 | Frederic Blanqui | Frederic Blanqui (INRIA Lorraine - LORIA) | A type-based termination criterion for dependently-typed higher-order
rewrite systems | Colloque avec actes et comit\'{e} de lecture. internationale | Dans 15th International Conference on Rewriting Techniques and
Applications - RTA'04 (2004) 15 p | null | null | cs.LO cs.PL | null | Several authors devised type-based termination criteria for ML-like languages
allowing non-structural recursive calls. We extend these works to general
rewriting and dependent types, hence providing a powerful termination criterion
for the combination of rewriting and beta-reduction in the Calculus of
Constructions.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 12:47:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Blanqui",
"Frederic",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0610075 | Marek Czachor | Diederik Aerts, Marek Czachor, Bart De Moor | On Geometric Algebra representation of Binary Spatter Codes | preliminary version | null | null | null | cs.AI quant-ph | null | Kanerva's Binary Spatter Codes are reformulated in terms of geometric
algebra. The key ingredient of the construction is the representation of XOR
binding in terms of geometric product.
| [
{
"version": "v1",
"created": "Thu, 12 Oct 2006 18:48:22 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Oct 2006 13:56:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aerts",
"Diederik",
""
],
[
"Czachor",
"Marek",
""
],
[
"De Moor",
"Bart",
""
]
]
|
cs/0610076 | Willy Valdivia-Granda | Willy Valdivia-Granda, William Perrizo, Edward Deckard, Francis Larson | Peano Count Trees (P-Trees) and Rule Association Mining for Gene
Expression Profiling of Microarray Data | null | 2002 International Conference in Bioinformatics. Bangkok, Thailand | null | null | cs.DS cs.IR q-bio.MN | null | The greatest challenge in maximizing the use of gene expression data is to
develop new computational tools capable of interconnecting and interpreting the
results from different organisms and experimental settings. We propose an
integrative and comprehensive approach including a super-chip containing data
from microarray experiments collected on different species subjected to hypoxic
and anoxic stress. A data mining technology called Peano count tree (P-trees)
is used to represent genomic data in multidimensions. Each microarray spot is
presented as a pixel with its corresponding red/green intensity feature bands.
Each bad is stored separately in a reorganized 8-separate (bSQ) file format.
Each bSQ is converted to a quadrant base tree structure (P-tree) from which a
superchip is represented as expression P-trees (EP-trees) and repression
P-trees (RP-trees). The use of association rule mining is proposed to derived
to meanigingfully organize signal transduction pathways taking in consideration
evolutionary considerations. We argue that the genetic constitution of an
organism (K) can be represented by the total number of genes belonging to two
groups. The group X constitutes genes (X1,Xn) and they can be represented as 1
or 0 depending on whether the gene was expressed or not. The second group of Y
genes (Y1,Yn) is expressed at different levels. These genes have a very high
repression, high expression, very repressed or highly repressed. However, many
genes of the group Y are specie specific and modulated by the products and
combinations of genes of the group X. In this paper, we introduce the dSQ and
P-tree technology; the biological implications of association rule mining using
X and Y gene groups and some advances in the integration of this information
using the BRAIN architecture.
| [
{
"version": "v1",
"created": "Thu, 12 Oct 2006 19:55:32 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Oct 2006 18:27:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Valdivia-Granda",
"Willy",
""
],
[
"Perrizo",
"William",
""
],
[
"Deckard",
"Edward",
""
],
[
"Larson",
"Francis",
""
]
]
|
cs/0610078 | Fehmi Ben Abdesslem | Fehmi Ben Abdesslem, Luigi Iannone, Marcelo Dias de Amorim, Katia
Obraczka, Ignacio Solis, and Serge Fdida | Rapid Prototyping over IEEE 802.11 | Changed content. 12 pages | null | null | null | cs.NI | null | This paper introduces Prawn, a tool for prototyping communication protocols
over IEEE 802.11 networks. Prawn allows researchers to conduct both functional
assessment and performance evaluation as an inherent part of the protocol
design process. Since Prawn runs on real IEEE 802.11 nodes, prototypes can be
evaluated and adjusted under realistic conditions. Once the prototype has been
extensively tested and thoroughly validated, and its functional design tuned
accordingly, it is then ready for implementation. Prawn facilitates prototype
development by providing: (i) a set of building blocks that implement common
functions needed by a wide range of wireless protocols (e.g., neighbor
discovery, link quality assessment, message transmission and reception), and
(ii) an API that allows protocol designers to access Prawn primitives. We show
through a number of case studies how Prawn supports prototyping as part of
protocol design and, as a result of enabling deployment and testing under
real-world scenarios, how Prawn provides useful feedback on protocol operation
and performance.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 15:29:44 GMT"
},
{
"version": "v2",
"created": "Sat, 3 Feb 2007 21:41:58 GMT"
},
{
"version": "v3",
"created": "Tue, 22 May 2007 16:24:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abdesslem",
"Fehmi Ben",
""
],
[
"Iannone",
"Luigi",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Obraczka",
"Katia",
""
],
[
"Solis",
"Ignacio",
""
],
[
"Fdida",
"Serge",
""
]
]
|
cs/0610084 | Thomas Claveirole | Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, and Yannis
Viniotis | Share and Disperse: How to Resist Against Aggregator Compromises in
Sensor Networks | 9 pages, 3 figures, 2 tables | null | null | null | cs.NI cs.CR | null | A common approach to overcome the limited nature of sensor networks is to
aggregate data at intermediate nodes. A challenging issue in this context is to
guarantee end-to-end security mainly because sensor networks are extremely
vulnerable to node compromises. In order to secure data aggregation, in this
paper we propose three schemes that rely on multipath routing. The first one
guarantees data confidentiality through secret sharing, while the second and
third ones provide data availability through information dispersal. Based on
qualitative analysis and implementation, we show that, by applying these
schemes, a sensor network can achieve data confidentiality, authenticity, and
protection against denial of service attacks even in the presence of multiple
compromised nodes.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 13:01:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Claveirole",
"Thomas",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Abdalla",
"Michel",
""
],
[
"Viniotis",
"Yannis",
""
]
]
|
cs/0610085 | Farn Wang | Farn Wang | Symbolic Simulation-Checking of Dense-Time Systems | 16 pages, 1 figure | null | null | null | cs.LO cs.SE | null | Intuitively, an (implementation) automata is simulated by a (specification)
automata if every externally observable transition by the implementation
automata can also be made by the specification automata. In this work, we
present a symbolic algorithm for the simulation-checking of timed automatas. We
first present a simulation-checking procedure that operates on state spaces,
representable with convex polyhedra, of timed automatas. We then present
techniques to represent those intermediate result convex polyhedra with zones
and make the procedure an algorithm. We then discuss how to handle Zeno states
in the implementation automata. Finally, we have endeavored to realize the
algorithm and report the performance of our algorithm in the experiment.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 18:02:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Farn",
""
]
]
|
cs/0610086 | Stephen A. Fenner | S. A. Fenner, Y. Zhang | The central nature of the Hidden Subgroup problem | 12 pages, no figures. Corrected Proposition 3.3 and added discussion
relating it to results of Childs and van Dam (quant-ph/0507190). Adjusted
Definition 2.2 and the proof of Proposition 3.3 to fix a minor bug. Other
minor corrections/clarifications. Updated references | null | null | null | cs.CC quant-ph | null | We show that several problems that figure prominently in quantum computing,
including Hidden Coset, Hidden Shift, and Orbit Coset, are equivalent or
reducible to Hidden Subgroup for a large variety of groups. We also show that,
over permutation groups, the decision version and search version of Hidden
Subgroup are polynomial-time equivalent. For Hidden Subgroup over dihedral
groups, such an equivalence can be obtained if the order of the group is
smooth. Finally, we give nonadaptive program checkers for Hidden Subgroup and
its decision version.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 18:24:18 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Nov 2006 23:46:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fenner",
"S. A.",
""
],
[
"Zhang",
"Y.",
""
]
]
|
cs/0610087 | Henry Jerez | Joud Khoury, Henry N Jerez, Nicolas Nehme-Antoun, Chaouki Abdallah | An Application of the Mobile Transient Internet Architecture to IP
Mobility and Inter-Operability | null | null | null | null | cs.NI | null | We introduce an application of a mobile transient network architecture on top
of the current Internet. This paper is an application extension to a conceptual
mobile network architecture. It attempts to specifically reinforce some of the
powerful notions exposed by the architecture from an application perspective.
Of these notions, we explore the network expansion layer, an overlay of
components and services, that enables a persistent identification network and
other required services. The overlay abstraction introduces several benefits of
which mobility and communication across heterogenous network structures are of
interest to this paper. We present implementations of several components and
protocols including gateways, Agents and the Open Device Access Protocol. Our
present identification network implementation exploits the current
implementation of the Handle System through the use of distributed, global and
persistent identifiers called handles. Handles are used to identify and locate
devices and services abstracting any physical location or network association
from the communicating ends. A communication framework is finally demonstrated
that would allow for mobile devices on the public Internet to have persistent
identifiers and thus be persistently accessible either directly or indirectly.
This application expands IP inter-operability beyond its current boundaries.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 22:12:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Khoury",
"Joud",
""
],
[
"Jerez",
"Henry N",
""
],
[
"Nehme-Antoun",
"Nicolas",
""
],
[
"Abdallah",
"Chaouki",
""
]
]
|
cs/0610088 | Amelia Sparavigna | A. Sparavigna and B. Montrucchio | Vector field visualization with streamlines | 9 pges, 7 figures | null | null | null | cs.GR | null | We have recently developed an algorithm for vector field visualization with
oriented streamlines, able to depict the flow directions everywhere in a dense
vector field and the sense of the local orientations. The algorithm has useful
applications in the visualization of the director field in nematic liquid
crystals. Here we propose an improvement of the algorithm able to enhance the
visualization of the local magnitude of the field. This new approach of the
algorithm is compared with the same procedure applied to the Line Integral
Convolution (LIC) visualization.
| [
{
"version": "v1",
"created": "Sat, 14 Oct 2006 09:25:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sparavigna",
"A.",
""
],
[
"Montrucchio",
"B.",
""
]
]
|
cs/0610089 | Himanshu Thapliyal | Himanshu Thapliyal and Mark Zwolinski | Reversible Logic to Cryptographic Hardware: A New Paradigm | Published in the proceedings of the The 49th IEEE International
Midwest Symposium on Circuits and Systems (MWSCAS 2006), Puerto Rico, August
2006. Nominated for the Student Paper Award | null | null | null | cs.CR | null | Differential Power Analysis (DPA) presents a major challenge to
mathematically-secure cryptographic protocols. Attackers can break the
encryption by measuring the energy consumed in the working digital circuit. To
prevent this type of attack, this paper proposes the use of reversible logic
for designing the ALU of a cryptosystem. Ideally, reversible circuits dissipate
zero energy. Thus, it would be of great significance to apply reversible logic
to designing secure cryptosystems. As far as is known, this is the first
attempt to apply reversible logic to developing secure cryptosystems. In a
prototype of a reversible ALU for a crypto-processor, reversible designs of
adders and Montgomery multipliers are presented. The reversible designs of a
carry propagate adder, four-to-two and five-to-two carry save adders are
presented using a reversible TSG gate. One of the important properties of the
TSG gate is that it can work singly as a reversible full adder. In order to
design the reversible Montgomery multiplier, novel reversible sequential
circuits are also proposed which are integrated with the proposed adders to
design a reversible modulo multiplier. It is intended that this paper will
provide a starting point for developing cryptosystems secure against DPA
attacks.
| [
{
"version": "v1",
"created": "Sat, 14 Oct 2006 10:19:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Zwolinski",
"Mark",
""
]
]
|
cs/0610091 | Pedro Miramontes | R. Mansilla, E. K\"oppen, G. Cocho and P. Miramontes | On the Behavior of Journal Impact Factor Rank-Order Distribution | Submitted to the Journal of Informetrics, redundat text cropped,
bibliography corrected, new section added, typos corrected | null | null | null | cs.IR physics.soc-ph | null | An empirical law for the rank-order behavior of journal impact factors is
found. Using an extensive data base on impact factors including journals on
Education, Agrosciences, Geosciences, Biosciences and Environ- mental,
Chemical, Computer, Engineering, Material, Mathematical, Medical and Physical
Sciences we have found extremely good fits out- performing other rank-order
models. Some extensions to other areas of knowledge are discussed.
| [
{
"version": "v1",
"created": "Sat, 14 Oct 2006 17:03:46 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Oct 2006 14:10:01 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Oct 2006 17:54:29 GMT"
},
{
"version": "v4",
"created": "Sun, 24 Dec 2006 06:03:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mansilla",
"R.",
""
],
[
"Köppen",
"E.",
""
],
[
"Cocho",
"G.",
""
],
[
"Miramontes",
"P.",
""
]
]
|
cs/0610094 | Ali Mesbah | Ali Mesbah and Arie van Deursen | Migrating Multi-page Web Applications to Single-page AJAX Interfaces | null | Proceedings of the 11th European Conference on Software
Maintenance and Reengineering (CSMR'07), IEEE Computer Society, 2007 | null | TUD-SERG-2006-018 | cs.SE | null | Recently, a new web development technique for creating interactive web
applications, dubbed AJAX, has emerged. In this new model, the single-page web
interface is composed of individual components which can be updated/replaced
independently. With the rise of AJAX web applications classical multi-page web
applications are becoming legacy systems. If until a year ago, the concern
revolved around migrating legacy systems to web-based settings, today we have a
new challenge of migrating web applications to single-page AJAX applications.
Gaining an understanding of the navigational model and user interface structure
of the source application is the first step in the migration process. In this
paper, we explore how reverse engineering techniques can help analyze classic
web applications for this purpose. Our approach, using a schema-based
clustering technique, extracts a navigational model of web applications, and
identifies candidate user interface components to be migrated to a single-page
AJAX interface. Additionally, results of a case study, conducted to evaluate
our tool, are presented.
| [
{
"version": "v1",
"created": "Sun, 15 Oct 2006 07:36:19 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jan 2007 14:17:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mesbah",
"Ali",
""
],
[
"van Deursen",
"Arie",
""
]
]
|
cs/0610095 | Omer Gim\'enez Mr. | Omer Gim\'enez | Solving planning domains with polytree causal graphs is NP-complete | null | null | null | null | cs.AI cs.CC | null | We show that solving planning domains on binary variables with polytree
causal graph is \NP-complete. This is in contrast to a polynomial-time
algorithm of Domshlak and Brafman that solves these planning domains for
polytree causal graphs of bounded indegree.
| [
{
"version": "v1",
"created": "Mon, 16 Oct 2006 06:18:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Giménez",
"Omer",
""
]
]
|
cs/0610096 | Sandrine Blazy | Sandrine Blazy (CEDRIC) | Partial Evaluation for Program Comprehension | null | Dans ACM Computing Surveys, Symposium on partial evaluation 30, 3
es (1998) | null | null | cs.SE | null | Program comprehension is the most tedious and time consuming task of software
maintenance, an important phase of the software life cycle. This is
particularly true while maintaining scientific application programs that have
been written in Fortran for decades and that are still vital in various domains
even though more modern languages are used to implement their user interfaces.
Very often, programs have evolved as their application domains increase
continually and have become very complex due to extensive modifications. This
generality in programs is implemented by input variables whose value does not
vary in the context of a given application. Thus, it is very interesting for
the maintainer to propagate such information, that is to obtain a simplified
program, which behaves like the initial one when used according to the
restriction. We have adapted partial evaluation for program comprehension. Our
partial evaluator performs mainly two tasks: constant propagation and
statements simplification. It includes an interprocedural alias analysis. As
our aim is program comprehension rather than optimization, there are two main
differences with classical partial evaluation. We do not change the original
| [
{
"version": "v1",
"created": "Mon, 16 Oct 2006 09:05:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Blazy",
"Sandrine",
"",
"CEDRIC"
]
]
|
cs/0610098 | Joseph Y. Halpern | Joseph Y. Halpern and Yoram Moses | Characterizing Solution Concepts in Games Using Knowledge-Based Programs | To appear, IJCAI 2007 | null | null | null | cs.GT cs.DC cs.MA | null | We show how solution concepts in games such as Nash equilibrium, correlated
equilibrium, rationalizability, and sequential equilibrium can be given a
uniform definition in terms of \emph{knowledge-based programs}. Intuitively,
all solution concepts are implementations of two knowledge-based programs, one
appropriate for games represented in normal form, the other for games
represented in extensive form. These knowledge-based programs can be viewed as
embodying rationality. The representation works even if (a) information sets do
not capture an agent's knowledge, (b) uncertainty is not represented by
probability, or (c) the underlying game is not common knowledge.
| [
{
"version": "v1",
"created": "Mon, 16 Oct 2006 13:00:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Moses",
"Yoram",
""
]
]
|
cs/0610101 | Dario Tamascelli | Diego de Falco and Dario Tamascelli | Entropy generation in a model of reversible computation | 13 pages, 6 figures | RAIRO-Inf.Theor.Appl. 40, (2006) 93-105 | 10.1051/ita:2006013 | null | cs.CC quant-ph | null | We present a model in which, due to the quantum nature of the signals
controlling the implementation time of successive unitary computational steps,
\emph{physical} irreversibility appears in the execution of a \emph{logically}
reversible computation.
| [
{
"version": "v1",
"created": "Tue, 17 Oct 2006 08:51:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"de Falco",
"Diego",
""
],
[
"Tamascelli",
"Dario",
""
]
]
|
cs/0610109 | Mohamed El Baker Nassar | Mohamed El Baker Nassar (INRIA Lorraine - LORIA), Radu State (INRIA
Lorraine - LORIA), Olivier Festor (INRIA Lorraine - LORIA) | Intrusion detection mechanisms for VoIP applications | null | Dans Third annual VoIP security workshop (VSW'06) (2006) | null | null | cs.NI | null | VoIP applications are emerging today as an important component in business
and communication industry. In this paper, we address the intrusion detection
and prevention in VoIP networks and describe how a conceptual solution based on
the Bayes inference approach can be used to reinforce the existent security
mechanisms. Our approach is based on network monitoring and analyzing of the
VoIP-specific traffic. We give a detailed example on attack detection using the
SIP signaling protocol.
| [
{
"version": "v1",
"created": "Wed, 18 Oct 2006 16:44:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nassar",
"Mohamed El Baker",
"",
"INRIA Lorraine - LORIA"
],
[
"State",
"Radu",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Festor",
"Olivier",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0610113 | Juan J. Merelo Pr. | A.M. Mora, J.J. Merelo, C. Millan, J. Torrecillas, J.L.J. Laredo | CHAC. A MOACO Algorithm for Computation of Bi-Criteria Military Unit
Path in the Battlefield | null | Published in Proceedings of the Workshop on Nature Inspired
Cooperative Strategies for Optimization. NICSO'2006, Pelta & Krasnogor, (eds)
pp 85-98, Jun. 2006 | null | null | cs.MA cs.CC | null | In this paper we propose a Multi-Objective Ant Colony Optimization (MOACO)
algorithm called CHAC, which has been designed to solve the problem of finding
the path on a map (corresponding to a simulated battlefield) that minimizes
resources while maximizing safety. CHAC has been tested with two different
state transition rules: an aggregative function that combines the heuristic and
pheromone information of both objectives and a second one that is based on the
dominance concept of multiobjective optimization problems. These rules have
been evaluated in several different situations (maps with different degree of
difficulty), and we have found that they yield better results than a greedy
algorithm (taken as baseline) in addition to a military behaviour that is also
better in the tactical sense. The aggregative function, in general, yields
better results than the one based on dominance.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 10:41:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mora",
"A. M.",
""
],
[
"Merelo",
"J. J.",
""
],
[
"Millan",
"C.",
""
],
[
"Torrecillas",
"J.",
""
],
[
"Laredo",
"J. L. J.",
""
]
]
|
cs/0610116 | Tuomo Kakkonen | Tuomo Kakkonen | DepAnn - An Annotation Tool for Dependency Treebanks | null | Proceedings of the 11th ESSLLI Student Session at the 18th
European Summer School in Logic, Language and Information (ESSLLI 2006), pp.
214-225. Malaga, Spain, 2006 | null | null | cs.CL | null | DepAnn is an interactive annotation tool for dependency treebanks, providing
both graphical and text-based annotation interfaces. The tool is aimed for
semi-automatic creation of treebanks. It aids the manual inspection and
correction of automatically created parses, making the annotation process
faster and less error-prone. A novel feature of the tool is that it enables the
user to view outputs from several parsers as the basis for creating the final
tree to be saved to the treebank. DepAnn uses TIGER-XML, an XML-based general
encoding format for both, representing the parser outputs and saving the
annotated treebank. The tool includes an automatic consistency checker for
sentence structures. In addition, the tool enables users to build structures
manually, add comments on the annotations, modify the tagsets, and mark
sentences for further revision.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 17:42:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kakkonen",
"Tuomo",
""
]
]
|
cs/0610117 | Jeremy Avigad | Jeremy Avigad and Yimu Yin | Quantifier elimination for the reals with a predicate for the powers of
two | null | null | null | null | cs.LO | null | In 1985, van den Dries showed that the theory of the reals with a predicate
for the integer powers of two admits quantifier elimination in an expanded
language, and is hence decidable. He gave a model-theoretic argument, which
provides no apparent bounds on the complexity of a decision procedure. We
provide a syntactic argument that yields a procedure that is primitive
recursive, although not elementary. In particular, we show that it is possible
to eliminate a single block of existential quantifiers in time $2^0_{O(n)}$,
where $n$ is the length of the input formula and $2_k^x$ denotes $k$-fold
iterated exponentiation.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 17:39:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Avigad",
"Jeremy",
""
],
[
"Yin",
"Yimu",
""
]
]
|
cs/0610118 | Tuomo Kakkonen | Tuomo Kakkonen, Niko Myller, Erkki Sutinen | Applying Part-of-Seech Enhanced LSA to Automatic Essay Grading | null | Proceedings of the 4th IEEE International Conference on
Information Technology: Research and Education (ITRE 2006). Tel Aviv, Israel,
2006 | null | null | cs.IR cs.CL | null | Latent Semantic Analysis (LSA) is a widely used Information Retrieval method
based on "bag-of-words" assumption. However, according to general conception,
syntax plays a role in representing meaning of sentences. Thus, enhancing LSA
with part-of-speech (POS) information to capture the context of word
occurrences appears to be theoretically feasible extension. The approach is
tested empirically on a automatic essay grading system using LSA for document
similarity comparisons. A comparison on several POS-enhanced LSA models is
reported. Our findings show that the addition of contextual information in the
form of POS tags can raise the accuracy of the LSA-based scoring models up to
10.77 per cent.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 17:50:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kakkonen",
"Tuomo",
""
],
[
"Myller",
"Niko",
""
],
[
"Sutinen",
"Erkki",
""
]
]
|
cs/0610119 | Elad Hazan | Elad Hazan | Approximate Convex Optimization by Online Game Playing | null | null | null | null | cs.DS | null | Lagrangian relaxation and approximate optimization algorithms have received
much attention in the last two decades. Typically, the running time of these
methods to obtain a $\epsilon$ approximate solution is proportional to
$\frac{1}{\epsilon^2}$. Recently, Bienstock and Iyengar, following Nesterov,
gave an algorithm for fractional packing linear programs which runs in
$\frac{1}{\epsilon}$ iterations. The latter algorithm requires to solve a
convex quadratic program every iteration - an optimization subroutine which
dominates the theoretical running time.
We give an algorithm for convex programs with strictly convex constraints
which runs in time proportional to $\frac{1}{\epsilon}$. The algorithm does NOT
require to solve any quadratic program, but uses gradient steps and elementary
operations only. Problems which have strictly convex constraints include
maximum entropy frequency estimation, portfolio optimization with loss risk
constraints, and various computational problems in signal processing.
As a side product, we also obtain a simpler version of Bienstock and
Iyengar's result for general linear programming, with similar running time.
We derive these algorithms using a new framework for deriving convex
optimization algorithms from online game playing algorithms, which may be of
independent interest.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 22:10:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hazan",
"Elad",
""
]
]
|
cs/0610122 | Philippe Langlois | Philippe Langlois (LP2A-DALI), Nicolas Louvet (LP2A-DALI) | Faithful Polynomial Evaluation with Compensated Horner Algorithm | null | null | null | null | cs.NA cs.MS | null | This paper presents two sufficient conditions to ensure a faithful evaluation
of polynomial in IEEE-754 floating point arithmetic. Faithfulness means that
the computed value is one of the two floating point neighbours of the exact
result; it can be satisfied using a more accurate algorithm than the classic
Horner scheme. One condition here provided is an apriori bound of the
polynomial condition number derived from the error analysis of the compensated
Horner algorithm. The second condition is both dynamic and validated to check
at the running time the faithfulness of a given evaluation. Numerical
experiments illustrate the behavior of these two conditions and that associated
running time over-cost is really interesting.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 11:22:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Langlois",
"Philippe",
"",
"LP2A-DALI"
],
[
"Louvet",
"Nicolas",
"",
"LP2A-DALI"
]
]
|
cs/0610123 | Lutz Strassburger | Lutz Strassburger (INRIA Futurs) | Proof Nets and the Identity of Proofs | null | null | null | null | cs.LO | null | These are the notes for a 5-lecture-course given at ESSLLI 2006 in Malaga,
Spain. The URL of the school is http://esslli2006.lcc.uma.es/ . This version
slightly differs from the one which has been distributed at the school because
typos have been removed and comments and suggestions by students have been
worked in. The course is intended to be introductory. That means no prior
knowledge of proof nets is required. However, the student should be familiar
with the basics of propositional logic, and should have seen formal proofs in
some formal deductive system (e.g., sequent calculus, natural deduction,
resolution, tableaux, calculus of structures, Frege-Hilbert-systems, ...). It
is probably helpful if the student knows already what cut elimination is, but
this is not strictly necessary. In these notes, I will introduce the concept of
``proof nets'' from the viewpoint of the problem of the identity of proofs. I
will proceed in a rather informal way. The focus will be more on presenting
ideas than on presenting technical details. The goal of the course is to give
the student an overview of the theory of proof nets and make the vast amount of
literature on the topic easier accessible to the beginner. For introducing the
basic concepts of the theory, I will in the first part of the course stick to
the unit-free multiplicative fragment of linear logic because of its rather
simple notion of proof nets. In the second part of the course we will see proof
nets for more sophisticated logics. This is a basic introduction into proof
nets from the perspective of the identity of proofs. We discuss how deductive
proofs can be translated into proof nets and what a correctness criterion is.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 11:35:05 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Nov 2006 14:41:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Strassburger",
"Lutz",
"",
"INRIA Futurs"
]
]
|
cs/0610124 | Tuomo Kakkonen | Tuomo Kakkonen | Dependency Treebanks: Methods, Annotation Schemes and Tools | null | Proceedings of the 15th Nordic Conference of Computational
Linguistics (NODALIDA 2005), pp. 94-104. Joensuu, Finland, 2005 | null | null | cs.CL | null | In this paper, current dependencybased treebanks are introduced and analyzed.
The methods used for building the resources, the annotation schemes applied,
and the tools used (such as POS taggers, parsers and annotation software) are
discussed.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 11:48:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kakkonen",
"Tuomo",
""
]
]
|
cs/0610125 | Radoslaw Hofman | Radoslaw Hofman | Report on article: P=NP Linear programming formulation of the Traveling
Salesman Problem | This version contain more figures, and clearer way to explain counter
example idea for k dimensions | null | null | null | cs.CC cs.DM cs.DS | null | This article presents counter examples for three articles claiming that P=NP.
Articles for which it applies are: Moustapha Diaby "P = NP: Linear programming
formulation of the traveling salesman problem" and "Equality of complexity
classes P and NP: Linear programming formulation of the quadratic assignment
problem", and also Sergey Gubin "A Polynomial Time Algorithm for The Traveling
Salesman Problem"
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 14:01:22 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Oct 2006 13:41:20 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Oct 2006 12:00:02 GMT"
},
{
"version": "v4",
"created": "Thu, 2 Nov 2006 11:19:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hofman",
"Radoslaw",
""
]
]
|
cs/0610126 | Marcus Hutter | Marcus Hutter and Shane Legg | Fitness Uniform Optimization | 25 double-column pages, 12 figures | IEEE Transactions on Evolutionary Computation, 10:5 (2006) 568-589 | 10.1109/TEVC.2005.863127 | IDSIA-16-06 | cs.NE cs.LG | null | In evolutionary algorithms, the fitness of a population increases with time
by mutating and recombining individuals and by a biased selection of more fit
individuals. The right selection pressure is critical in ensuring sufficient
optimization progress on the one hand and in preserving genetic diversity to be
able to escape from local optima on the other hand. Motivated by a universal
similarity relation on the individuals, we propose a new selection scheme,
which is uniform in the fitness values. It generates selection pressure toward
sparsely populated fitness regions, not necessarily toward higher fitness, as
is the case for all other selection schemes. We show analytically on a simple
example that the new selection scheme can be much more effective than standard
selection schemes. We also propose a new deletion scheme which achieves a
similar result via deletion and show how such a scheme preserves genetic
diversity more effectively than standard approaches. We compare the performance
of the new schemes to tournament selection and random deletion on an artificial
deceptive problem and a range of NP-hard problems: traveling salesman, set
covering and satisfiability.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 16:37:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
],
[
"Legg",
"Shane",
""
]
]
|
cs/0610127 | Serban Vlad E. | Serban E. Vlad | The intersection and the union of the asynchronous systems | The 14-th Conference on Applied and Industrial Mathematics CAIM 2006,
Satellite Conference of ICM2006, Chisinau, Moldova, August 17-19, 2006 | null | null | null | cs.GL | null | The asynchronous systems $f$ are the models of the asynchronous circuits from
digital electrical engineering. They are multi-valued functions that associate
to each input $u:\mathbf{R}\to \{0,1\}^{m}$ a set of states $x\in f(u),$ where
$x:\mathbf{R}\to \{0,1\}^{n}.$ The intersection of the systems allows adding
supplementary conditions in modeling and the union of the systems allows
considering the validity of one of two systems in modeling, for example when
testing the asynchronous circuits and the circuit is supposed to be 'good' or
'bad'. The purpose of the paper is that of analyzing the intersection and the
union against the initial/final states, initial/final time, initial/final state
functions, subsystems, dual systems, inverse systems, Cartesian product of
systems, parallel connection and serial connection of systems.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 21:33:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
]
|
cs/0610129 | Haluk Bingol | Ismail Gunes, Haluk Bingol | Community Detection in Complex Networks Using Agents | 5 pages | null | null | null | cs.MA cs.CY | null | Community structure identification has been one of the most popular research
areas in recent years due to its applicability to the wide scale of
disciplines. To detect communities in varied topics, there have been many
algorithms proposed so far. However, most of them still have some drawbacks to
be addressed. In this paper, we present an agent-based based community
detection algorithm. The algorithm that is a stochastic one makes use of agents
by forcing them to perform biased moves in a smart way. Using the information
collected by the traverses of these agents in the network, the network
structure is revealed. Also, the network modularity is used for determining the
number of communities. Our algorithm removes the need for prior knowledge about
the network such as number of the communities or any threshold values.
Furthermore, the definite community structure is provided as a result instead
of giving some structures requiring further processes. Besides, the
computational and time costs are optimized because of using thread like working
agents. The algorithm is tested on three network data of different types and
sizes named Zachary karate club, college football and political books. For all
three networks, the real network structures are identified in almost every run.
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2006 06:34:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gunes",
"Ismail",
""
],
[
"Bingol",
"Haluk",
""
]
]
|
cs/0610133 | Thomas Silverston | Thomas Silverston and Olivier Fourmaux | P2P IPTV Measurement: A Comparison Study | 10 pages | null | null | null | cs.NI cs.MM | null | With the success of P2P file sharing, new emerging P2P applications arise on
the Internet for streaming content like voice (VoIP) or live video (IPTV).
Nowadays, there are lots of works measuring P2P file sharing or P2P telephony
systems, but there is still no comprehensive study about P2P IPTV, whereas it
should be massively used in the future. During the last FIFA world cup, we
measured network traffic generated by P2P IPTV applications like PPlive,
PPstream, TVants and Sopcast. In this paper we analyze some of our results
during the same games for the applications. We focus on traffic statistics and
churn of peers within these P2P networks. Our objectives are threefold: we
point out the traffic generated to understand the impact they will have on the
network, we try to infer the mechanisms of such applications and highlight
differences, and we give some insights about the users' behavior.
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2006 13:55:28 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Nov 2006 14:23:31 GMT"
},
{
"version": "v3",
"created": "Mon, 15 Jan 2007 13:34:09 GMT"
},
{
"version": "v4",
"created": "Thu, 19 Apr 2007 13:45:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Silverston",
"Thomas",
""
],
[
"Fourmaux",
"Olivier",
""
]
]
|
cs/0610137 | Silvano Dal Zilio | Lucia Acciai (LIF), Michele Boreale, Silvano Dal Zilio (LIF) | A Concurrent Calculus with Atomic Transactions | 29 pages | null | null | null | cs.LO cs.DC | null | The Software Transactional Memory (STM) model is an original approach for
controlling concurrent accesses to ressources without the need for explicit
lock-based synchronization mechanisms. A key feature of STM is to provide a way
to group sequences of read and write actions inside atomic blocks, similar to
database transactions, whose whole effect should occur atomically. In this
paper, we investigate STM from a process algebra perspective and define an
extension of asynchronous CCS with atomic blocks of actions. Our goal is not
only to set a formal ground for reasoning on STM implementations but also to
understand how this model fits with other concurrency control mechanisms. We
also view this calculus as a test bed for extending process calculi with atomic
transactions. This is an interesting direction for investigation since, for the
most part, actual works that mix transactions with process calculi consider
compensating transactions, a model that lacks all the well-known ACID
properties. We show that the addition of atomic transactions results in a very
expressive calculus, enough to easily encode other concurrent primitives such
as guarded choice and multiset-synchronization (\`{a} la join-calculus). The
correctness of our encodings is proved using a suitable notion of bisimulation
equivalence. The equivalence is then applied to prove interesting ``laws of
transactions'' and to obtain a simple normal form for transactions.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 08:26:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Acciai",
"Lucia",
"",
"LIF"
],
[
"Boreale",
"Michele",
"",
"LIF"
],
[
"Zilio",
"Silvano Dal",
"",
"LIF"
]
]
|
cs/0610140 | Leonid Makarov | Leonid Makarov and Peter Komarov | Constant for associative patterns ensemble | 6 pages | null | null | null | cs.AI | null | Creation procedure of associative patterns ensemble in terms of formal logic
with using neural net-work (NN) model is formulated. It is shown that the
associative patterns set is created by means of unique procedure of NN work
which having individual parameters of entrance stimulus transformation. It is
ascer-tained that the quantity of the selected associative patterns possesses
is a constant.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 16:27:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Makarov",
"Leonid",
""
],
[
"Komarov",
"Peter",
""
]
]
|
cs/0610149 | Anna Frid | A. Frid | Canonical decomposition of catenation of factorial languages | Submitted | null | null | null | cs.LO | null | According to a previous result by S. V. Avgustinovich and the author, each
factorial language admits a unique canonical decomposition to a catenation of
factorial languages. In this paper, we analyze the appearance of the canonical
decomposition of a catenation of two factorial languages whose canonical
decompositions are given.
| [
{
"version": "v1",
"created": "Thu, 26 Oct 2006 06:38:30 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Dec 2006 06:11:17 GMT"
},
{
"version": "v3",
"created": "Wed, 31 Jan 2007 07:56:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Frid",
"A.",
""
]
]
|
cs/0610155 | Ping Li | Ping Li, Trevor J. Hastie, Kenneth W. Church | Nonlinear Estimators and Tail Bounds for Dimension Reduction in $l_1$
Using Cauchy Random Projections | null | null | null | null | cs.DS cs.IR cs.LG | null | For dimension reduction in $l_1$, the method of {\em Cauchy random
projections} multiplies the original data matrix $\mathbf{A}
\in\mathbb{R}^{n\times D}$ with a random matrix $\mathbf{R} \in
\mathbb{R}^{D\times k}$ ($k\ll\min(n,D)$) whose entries are i.i.d. samples of
the standard Cauchy C(0,1). Because of the impossibility results, one can not
hope to recover the pairwise $l_1$ distances in $\mathbf{A}$ from $\mathbf{B} =
\mathbf{AR} \in \mathbb{R}^{n\times k}$, using linear estimators without
incurring large errors. However, nonlinear estimators are still useful for
certain applications in data stream computation, information retrieval,
learning, and data mining.
We propose three types of nonlinear estimators: the bias-corrected sample
median estimator, the bias-corrected geometric mean estimator, and the
bias-corrected maximum likelihood estimator. The sample median estimator and
the geometric mean estimator are asymptotically (as $k\to \infty$) equivalent
but the latter is more accurate at small $k$. We derive explicit tail bounds
for the geometric mean estimator and establish an analog of the
Johnson-Lindenstrauss (JL) lemma for dimension reduction in $l_1$, which is
weaker than the classical JL lemma for dimension reduction in $l_2$.
Asymptotically, both the sample median estimator and the geometric mean
estimators are about 80% efficient compared to the maximum likelihood estimator
(MLE). We analyze the moments of the MLE and propose approximating the
distribution of the MLE by an inverse Gaussian.
| [
{
"version": "v1",
"created": "Fri, 27 Oct 2006 07:08:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Ping",
""
],
[
"Hastie",
"Trevor J.",
""
],
[
"Church",
"Kenneth W.",
""
]
]
|
cs/0610156 | Fadi Badra | Mathieu D'Aquin (INRIA Lorraine - LORIA, KMI), Fadi Badra (INRIA
Lorraine - LORIA), Sandrine Lafrogne (INRIA Lorraine - LORIA), Jean Lieber
(INRIA Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA), Laszlo
Szathmary (INRIA Lorraine - LORIA) | Adaptation Knowledge Discovery from a Case Base | null | Proceedings of the 17th European Conference on Artificial
Intelligence (ECAI-06), Trento G. Brewka (Ed.) (2006) 795--796 | null | null | cs.AI | null | In case-based reasoning, the adaptation step depends in general on
domain-dependent knowledge, which motivates studies on adaptation knowledge
acquisition (AKA). CABAMAKA is an AKA system based on principles of knowledge
discovery from databases. This system explores the variations within the case
base to elicit adaptation knowledge. It has been successfully tested in an
application of case-based decision support to breast cancer treatment.
| [
{
"version": "v1",
"created": "Fri, 27 Oct 2006 10:08:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"D'Aquin",
"Mathieu",
"",
"INRIA Lorraine - LORIA, KMI"
],
[
"Badra",
"Fadi",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Lafrogne",
"Sandrine",
"",
"INRIA Lorraine - LORIA"
],
[
"Lieber",
"Jean",
"",
"INRIA Lorraine - LORIA"
],
[
"Napoli",
"Amedeo",
"",
"INRIA Lorraine - LORIA"
],
[
"Szathmary",
"Laszlo",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0610158 | Babajide Afolabi | Babajide Afolabi (LORIA), Odile Thiery (LORIA) | Considering users' behaviours in improving the responses of an
information base | null | Dans I International Conference on Multidisciplinary Information
Sciences and Technologies (2006) | null | null | cs.LG cs.IR | null | In this paper, our aim is to propose a model that helps in the efficient use
of an information system by users, within the organization represented by the
IS, in order to resolve their decisional problems. In other words we want to
aid the user within an organization in obtaining the information that
corresponds to his needs (informational needs that result from his decisional
problems). This type of information system is what we refer to as economic
intelligence system because of its support for economic intelligence processes
of the organisation. Our assumption is that every EI process begins with the
identification of the decisional problem which is translated into an
informational need. This need is then translated into one or many information
search problems (ISP). We also assumed that an ISP is expressed in terms of the
user's expectations and that these expectations determine the activities or the
behaviors of the user, when he/she uses an IS. The model we are proposing is
used for the conception of the IS so that the process of retrieving of
solution(s) or the responses given by the system to an ISP is based on these
behaviours and correspond to the needs of the user.
| [
{
"version": "v1",
"created": "Fri, 27 Oct 2006 16:02:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Afolabi",
"Babajide",
"",
"LORIA"
],
[
"Thiery",
"Odile",
"",
"LORIA"
]
]
|
cs/0610163 | Rajiv Ranjan Mr. | Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya | A Taxonomy of Peer-to-Peer Based Complex Queries: a Grid perspective | null | null | null | null | cs.NI cs.DC cs.DS | null | Grid superscheduling requires support for efficient and scalable discovery of
resources. Resource discovery activities involve searching for the appropriate
resource types that match the user's job requirements. To accomplish this goal,
a resource discovery system that supports the desired look-up operation is
mandatory. Various kinds of solutions to this problem have been suggested,
including the centralised and hierarchical information server approach.
However, both of these approaches have serious limitations in regards to
scalability, fault-tolerance and network congestion. To overcome these
limitations, organising resource information using Peer-to-Peer (P2P) network
model has been proposed. Existing approaches advocate an extension to
structured P2P protocols, to support the Grid resource information system
(GRIS). In this paper, we identify issues related to the design of such an
efficient, scalable, fault-tolerant, consistent and practical GRIS system using
a P2P network model. We compile these issues into various taxonomies in
sections III and IV. Further, we look into existing works that apply P2P based
network protocols to GRIS. We think that this taxonomy and its mapping to
relevant systems would be useful for academic and industry based researchers
who are engaged in the design of scalable Grid systems.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 08:30:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ranjan",
"Rajiv",
""
],
[
"Harwood",
"Aaron",
""
],
[
"Buyya",
"Rajkumar",
""
]
]
|
cs/0610164 | Bageshri Karkare | Bageshri Karkare (Sathe) and Uday Khedker | Complexity of Data Flow Analysis for Non-Separable Frameworks | Published in the International Conference on Programming Languages
and Compilers (PLC) 2006, Las Vegas, U.S.A | null | null | null | cs.PL | null | The complexity of round robin method of intraprocedural data flow analysis is
measured in number of iterations over the control flow graph. Existing
complexity bounds realistically explain the complexity of only Bit-vector
frameworks which are separable. In this paper we define the complexity bounds
for non-separable frameworks by quantifying the interdependences among the data
flow information of program entities using an Entity Dependence Graph.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 08:39:04 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Oct 2006 09:09:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Karkare",
"Bageshri",
"",
"Sathe"
],
[
"Khedker",
"Uday",
""
]
]
|
cs/0610166 | Thierry Cachat | Thierry Cachat (LIAFA) | Tree Automata Make Ordinal Theory Easy | null | Foundations of Software Technology and Theoretical Computer
Science, 26th International Conference, 2006, Proceedings. FSTTCS 2006 (2006)
286-297 | null | null | cs.GT | null | We give a new simple proof of the decidability of the First Order Theory of
(omega^omega^i,+) and the Monadic Second Order Theory of (omega^i,<), improving
the complexity in both cases. Our algorithm is based on tree automata and a new
representation of (sets of) ordinals by (infinite) trees.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 11:05:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cachat",
"Thierry",
"",
"LIAFA"
]
]
|
cs/0610167 | Adrian Paschke | Adrian Paschke | ECA-RuleML: An Approach combining ECA Rules with temporal interval-based
KR Event/Action Logics and Transactional Update Logics | Republished in Paschke, A.: ECA-RuleML/ECA-LP: A Homogeneous
Event-Condition-Action Logic Programming Language, Int. Conf. of Rule Markup
Languages (RuleML'06), Athens, Georgia, USA, 2006 | null | null | IBIS, TUM, Technical Report 11/05 | cs.AI cs.LO cs.MA cs.SE | null | An important problem to be addressed within Event-Driven Architecture (EDA)
is how to correctly and efficiently capture and process the event/action-based
logic. This paper endeavors to bridge the gap between the Knowledge
Representation (KR) approaches based on durable events/actions and such
formalisms as event calculus, on one hand, and event-condition-action (ECA)
reaction rules extending the approach of active databases that view events as
instantaneous occurrences and/or sequences of events, on the other. We propose
formalism based on reaction rules (ECA rules) and a novel interval-based event
logic and present concrete RuleML-based syntax, semantics and implementation.
We further evaluate this approach theoretically, experimentally and on an
example derived from common industry use cases and illustrate its benefits.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 11:56:08 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Nov 2006 06:44:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
]
|
cs/0610168 | Dele Oluwade PhD | Dele Oluwade | Presentation Theorems for Coded Character Sets | 14 pages, including a page of symbols and a page containing a table | null | null | null | cs.DM | null | The notion of 'presentation', as used in combinatorial group theory, is
applied to coded character sets(CCSs) - sets which facilitate the interchange
of messages in a digital computer network(DCN) . By grouping each element of
the set into two portions and using the idea of group presentation(whereby a
group is specified by its set of generators and its set of relators), the
presentation of a CCS is described. This is illustrated using the Extended
Binary Coded Decimal Interchange Code(EBCDIC) which is one of the most popular
CCSs in DCNs.
Key words: Group presentation, coded character set, digital computer network
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 16:03:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Oluwade",
"Dele",
""
]
]
|
cs/0610170 | Istvan Szita | Istvan Szita and Andras Lorincz | Low-complexity modular policies: learning to play Pac-Man and a new
framework beyond MDPs | 23 pages | null | null | null | cs.LG cs.AI | null | In this paper we propose a method that learns to play Pac-Man. We define a
set of high-level observation and action modules. Actions are temporally
extended, and multiple action modules may be in effect concurrently. A decision
of the agent is represented as a rule-based policy. For learning, we apply the
cross-entropy method, a recent global optimization algorithm. The learned
policies reached better score than the hand-crafted policy, and neared the
score of average human players. We argue that learning is successful mainly
because (i) the policy space includes the combination of individual actions and
thus it is sufficiently rich, (ii) the search is biased towards low-complexity
policies and low complexity solutions can be found quickly if they exist. Based
on these principles, we formulate a new theoretical framework, which can be
found in the Appendix as supporting material.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 16:44:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Szita",
"Istvan",
""
],
[
"Lorincz",
"Andras",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.