id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0609110
Pascal Weil
Pascal Weil (LaBRI)
Algebraic recognizability of languages
null
Mathematical Foundations of Computer Science 2004, Tch\`{e}que, R\'{e}publique (2004) 149-175
null
null
cs.LO
null
Recognizable languages of finite words are part of every computer science cursus, and they are routinely described as a cornerstone for applications and for theory. We would like to briefly explore why that is, and how this word-related notion extends to more complex models, such as those developed for modeling distributed or timed behaviors.
[ { "version": "v1", "created": "Tue, 19 Sep 2006 15:21:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Weil", "Pascal", "", "LaBRI" ] ]
cs/0609112
Lane A. Hemaspaandra
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg Rothe
A Richer Understanding of the Complexity of Election Systems
null
null
null
URCS TR-2006-903
cs.GT cs.CC cs.MA
null
We provide an overview of some recent progress on the complexity of election systems. The issues studied include the complexity of the winner, manipulation, bribery, and control problems.
[ { "version": "v1", "created": "Tue, 19 Sep 2006 22:57:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Faliszewski", "Piotr", "" ], [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/0609113
Pascal Weil
Zoltan Esik, Pascal Weil (LaBRI)
Algebraic recognizability of regular tree languages
null
Theoretical Computer Science 340 (2005) 291-321
null
null
cs.DM
null
We propose a new algebraic framework to discuss and classify recognizable tree languages, and to characterize interesting classes of such languages. Our algebraic tool, called preclones, encompasses the classical notion of syntactic Sigma-algebra or minimal tree automaton, but adds new expressivity to it. The main result in this paper is a variety theorem \`{a} la Eilenberg, but we also discuss important examples of logically defined classes of recognizable tree languages, whose characterization and decidability was established in recent papers (by Benedikt and S\'{e}goufin, and by Bojanczyk and Walukiewicz) and can be naturally formulated in terms of pseudovarieties of preclones. Finally, this paper constitutes the foundation for another paper by the same authors, where first-order definable tree languages receive an algebraic characterization.
[ { "version": "v1", "created": "Wed, 20 Sep 2006 06:47:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Esik", "Zoltan", "", "LaBRI" ], [ "Weil", "Pascal", "", "LaBRI" ] ]
cs/0609115
Clemence Magnien
Matthieu Latapy, Clemence Magnien (LIP6 - CNRS and UPMC, France)
Measuring Fundamental Properties of Real-World Complex Networks
null
null
null
null
cs.NI cond-mat.stat-mech cs.DS
null
Complex networks, modeled as large graphs, received much attention during these last years. However, data on such networks is only available through intricate measurement procedures. Until recently, most studies assumed that these procedures eventually lead to samples large enough to be representative of the whole, at least concerning some key properties. This has crucial impact on network modeling and simulation, which rely on these properties. Recent contributions proved that this approach may be misleading, but no solution has been proposed. We provide here the first practical way to distinguish between cases where it is indeed misleading, and cases where the observed properties may be trusted. It consists in studying how the properties of interest evolve when the sample grows, and in particular whether they reach a steady state or not. In order to illustrate this method and to demonstrate its relevance, we apply it to data-sets on complex network measurements that are representative of the ones commonly used. The obtained results show that the method fulfills its goals very well. We moreover identify some properties which seem easier to evaluate in practice, thus opening interesting perspectives.
[ { "version": "v1", "created": "Wed, 20 Sep 2006 13:38:41 GMT" }, { "version": "v2", "created": "Thu, 1 Mar 2007 11:36:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Latapy", "Matthieu", "", "LIP6 - CNRS and UPMC, France" ], [ "Magnien", "Clemence", "", "LIP6 - CNRS and UPMC, France" ] ]
cs/0609116
Clemence Magnien
Matthieu Latapy (LIAFA - CNRS, Universite Paris 7)
Theory and Practice of Triangle Problems in Very Large (Sparse (Power-Law)) Graphs
null
null
null
null
cs.DS cond-mat.stat-mech cs.NI
null
Finding, counting and/or listing triangles (three vertices with three edges) in large graphs are natural fundamental problems, which received recently much attention because of their importance in complex network analysis. We provide here a detailed state of the art on these problems, in a unified way. We note that, until now, authors paid surprisingly little attention to space complexity, despite its both fundamental and practical interest. We give the space complexities of known algorithms and discuss their implications. Then we propose improvements of a known algorithm, as well as a new algorithm, which are time optimal for triangle listing and beats previous algorithms concerning space complexity. They have the additional advantage of performing better on power-law graphs, which we also study. We finally show with an experimental study that these two algorithms perform very well in practice, allowing to handle cases that were previously out of reach.
[ { "version": "v1", "created": "Wed, 20 Sep 2006 14:17:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Latapy", "Matthieu", "", "LIAFA - CNRS, Universite Paris 7" ] ]
cs/0609118
Prahladavaradan Sampath
Prahladavaradan Sampath
Duality of Fix-Points for Distributive Lattices
7 pages
null
null
null
cs.DS cs.DM
null
We present a novel algorithm for calculating fix-points. The algorithm calculates fix-points of an endo-function f on a distributive lattice, by performing reachability computation a graph derived from the dual of f; this is in comparison to traditional algorithms that are based on iterated application of f until a fix-point is reached.
[ { "version": "v1", "created": "Thu, 21 Sep 2006 17:34:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Sampath", "Prahladavaradan", "" ] ]
cs/0609119
Adrian Paschke
Adrian Paschke
Verification, Validation and Integrity of Distributed and Interchanged Rule Based Policies and Contracts in the Semantic Web
A.Paschke: Verification, Validation, Integrity of Rule Based Policies and Contracts in the Semantic Web, 2nd International Semantic Web Policy Workshop (SWPW'06), Nov. 5-9, 2006, Athens, GA, USA
A.Paschke: Verification, Validation, Integrity of Rule Based Policies and Contracts in the Semantic Web, 2nd International Semantic Web Policy Workshop (SWPW'06), Nov. 5-9, 2006, Athens, GA, USA
null
null
cs.AI cs.SE
null
Rule-based policy and contract systems have rarely been studied in terms of their software engineering properties. This is a serious omission, because in rule-based policy or contract representation languages rules are being used as a declarative programming language to formalize real-world decision logic and create IS production systems upon. This paper adopts an SE methodology from extreme programming, namely test driven development, and discusses how it can be adapted to verification, validation and integrity testing (V&V&I) of policy and contract specifications. Since, the test-driven approach focuses on the behavioral aspects and the drawn conclusions instead of the structure of the rule base and the causes of faults, it is independent of the complexity of the rule language and the system under test and thus much easier to use and understand for the rule engineer and the user.
[ { "version": "v1", "created": "Thu, 21 Sep 2006 11:50:24 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2006 08:50:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ] ]
cs/0609120
Adrian Paschke
Adrian Paschke
Rule-based Knowledge Representation for Service Level Agreement
Doctoral Symposium of 4th Conf. on Multiagent System Technologies (MATES'06), Germany, 2006
null
null
null
cs.AI cs.DB cs.LO cs.MA cs.SE
null
Automated management and monitoring of service contracts like Service Level Agreements (SLAs) or higher-level policies is vital for efficient and reliable distributed service-oriented architectures (SOA) with high quality of ser-vice (QoS) levels. IT service provider need to manage, execute and maintain thousands of SLAs for different customers and different types of services, which needs new levels of flexibility and automation not available with the current technol-ogy. I propose a novel rule-based knowledge representation (KR) for SLA rules and a respective rule-based service level management (RBSLM) framework. My rule-based approach based on logic programming provides several advantages including automated rule chaining allowing for compact knowledge representation and high levels of automation as well as flexibility to adapt to rapidly changing business requirements. Therewith, I address an urgent need service-oriented busi-nesses do have nowadays which is to dynamically change their business and contractual logic in order to adapt to rapidly changing business environments and to overcome the restricting nature of slow change cycles.
[ { "version": "v1", "created": "Thu, 21 Sep 2006 12:04:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ] ]
cs/0609124
Micaela Mayero
Micaela Mayero (INRIA Futurs)
The Three Gap Theorem (Steinhauss Conjecture)
null
Types for Proofs and Programs: International Workshop, TYPES'99, L\"{o}keberg, Sweden, June 1999. Selected Papers (2000) 162
null
null
cs.LO
null
We deal with the distribution of N points placed consecutively around the circle by a fixed angle of a. From the proof of Tony van Ravenstein, we propose a detailed proof of the Steinhaus conjecture whose result is the following: the N points partition the circle into gaps of at most three different lengths. We study the mathematical notions required for the proof of this theorem revealed during a formal proof carried out in Coq.
[ { "version": "v1", "created": "Fri, 22 Sep 2006 11:30:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Mayero", "Micaela", "", "INRIA Futurs" ] ]
cs/0609125
Goren Gordon
Goren Gordon and Uri Einziger-Lowicz
Problem Evolution: A new approach to problem solving systems
10 pages, 2 figures
null
null
null
cs.NE
null
In this paper we present a novel tool to evaluate problem solving systems. Instead of using a system to solve a problem, we suggest using the problem to evaluate the system. By finding a numerical representation of a problem's complexity, one can implement genetic algorithm to search for the most complex problem the given system can solve. This allows a comparison between different systems that solve the same set of problems. In this paper we implement this approach on pattern recognition neural networks to try and find the most complex pattern a given configuration can solve. The complexity of the pattern is calculated using linguistic complexity. The results demonstrate the power of the problem evolution approach in ranking different neural network configurations according to their pattern recognition abilities. Future research and implementations of this technique are also discussed.
[ { "version": "v1", "created": "Fri, 22 Sep 2006 12:40:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Gordon", "Goren", "" ], [ "Einziger-Lowicz", "Uri", "" ] ]
cs/0609127
Ethan Kim
Anil Ada, Melanie Coggan, Paul Di Marco, Alain Doyon, Liam Flookes, Samuli Heilala, Ethan Kim, Jonathan Li On Wing, Louis-Francois Preville-Ratelle, Sue Whitesides, and Nuo Yu
On Bus Graph Realizability
Tech Report in School of Computer Science, McGill University Poster version of this paper was presented at the International Symposium on Graph Drawing 2006
null
null
SOCS-TR-2006.1
cs.CG cs.DM
null
In this paper, we consider the following graph embedding problem: Given a bipartite graph G = (V1; V2;E), where the maximum degree of vertices in V2 is 4, can G be embedded on a two dimensional grid such that each vertex in V1 is drawn as a line segment along a grid line, each vertex in V2 is drawn as a point at a grid point, and each edge e = (u; v) for some u 2 V1 and v 2 V2 is drawn as a line segment connecting u and v, perpendicular to the line segment for u? We show that this problem is NP-complete, and sketch how our proof techniques can be used to show the hardness of several other related problems.
[ { "version": "v1", "created": "Fri, 22 Sep 2006 18:01:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Ada", "Anil", "" ], [ "Coggan", "Melanie", "" ], [ "Di Marco", "Paul", "" ], [ "Doyon", "Alain", "" ], [ "Flookes", "Liam", "" ], [ "Heilala", "Samuli", "" ], [ "Kim", "Ethan", "" ], [ "Wing", "Jonathan Li On", "" ], [ "Preville-Ratelle", "Louis-Francois", "" ], [ "Whitesides", "Sue", "" ], [ "Yu", "Nuo", "" ] ]
cs/0609128
Marcin Kaminski
Josep Diaz and Marcin Kaminski
Max-Cut and Max-Bisection are NP-hard on unit disk graphs
null
null
null
null
cs.DS cs.CC
null
We prove that the Max-Cut and Max-Bisection problems are NP-hard on unit disk graphs. We also show that $\lambda$-precision graphs are planar for $\lambda$ > 1 / \sqrt{2}$.
[ { "version": "v1", "created": "Fri, 22 Sep 2006 18:17:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaz", "Josep", "" ], [ "Kaminski", "Marcin", "" ] ]
cs/0609130
Salvatore Caporaso
Salvatore Caporaso
A Predicative Harmonization of the Time and Provable Hierarchies
11 pages
null
null
null
cs.LO cs.CC
null
A decidable transfinite hierarchy is defined by assigning ordinals to the programs of an imperative language. It singles out: the classes TIMEF(n^c) and TIMEF(n_c); the finite Grzegorczyk classes at and above the elementary level, and the \Sigma_k-IND fragments of PA. Limited operators, diagonalization, and majorization functions are not used.
[ { "version": "v1", "created": "Sat, 23 Sep 2006 14:28:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Caporaso", "Salvatore", "" ] ]
cs/0609131
Ran Ren
Ran Ren, Madan mohan Manokar, Yaogang Shi, Baoyu Zheng
A Fast Block Matching Algorithm for Video Motion Estimation Based on Particle Swarm Optimization and Motion Prejudgment
10 pages, 12 figures, submitted to ACM Symposium of Applied Computing(SAC)
null
null
null
cs.MM
null
In this paper, we propose a fast 2-D block-based motion estimation algorithm called Particle Swarm Optimization - Zero-motion Prejudgment(PSO-ZMP) which consists of three sequential routines: 1)Zero-motion prejudgment. The routine aims at finding static macroblocks(MB) which do not need to perform remaining search thus reduces the computational cost; 2)Predictive image coding and 3)PSO matching routine. Simulation results obtained show that the proposed PSO-ZMP algorithm achieves over 10 times of computation less than Diamond Search(DS) and 5 times less than the recent proposed Adaptive Rood Pattern Searching(ARPS). Meanwhile the PSNR performances using PSO-ZMP are very close to that using DS and ARPS in some less-motioned sequences. While in some sequences containing dense and complex motion contents, the PSNR performances of PSO-ZMP are several dB lower than that using DS and ARPS but in an acceptable degree.
[ { "version": "v1", "created": "Sun, 24 Sep 2006 09:55:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Ren", "Ran", "" ], [ "Manokar", "Madan mohan", "" ], [ "Shi", "Yaogang", "" ], [ "Zheng", "Baoyu", "" ] ]
cs/0609132
Jochen Gruber
Jochen Gruber
Semantic Description of Parameters in Web Service Annotations
7 pages, 3 figures
null
null
null
cs.AI
null
A modification of OWL-S regarding parameter description is proposed. It is strictly based on Description Logic. In addition to class description of parameters it also allows the modelling of relations between parameters and the precise description of the size of data to be supplied to a service. In particular, it solves two major issues identified within current proposals for a Semantic Web Service annotation standard.
[ { "version": "v1", "created": "Sun, 24 Sep 2006 17:29:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Gruber", "Jochen", "" ] ]
cs/0609141
Iosif Pinelis
Iosif Pinelis
Polygon Convexity: A Minimal O(n) Test
14 pages
null
null
null
cs.CG cs.CC math.CO math.MG
null
An O(n) test for polygon convexity is stated and proved. It is also proved that the test is minimal in a certain exact sense.
[ { "version": "v1", "created": "Mon, 25 Sep 2006 19:23:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Pinelis", "Iosif", "" ] ]
cs/0609142
Bruno Scherrer
Bruno Scherrer (INRIA Lorraine - LORIA)
Modular self-organization
null
null
null
null
cs.AI
null
The aim of this paper is to provide a sound framework for addressing a difficult problem: the automatic construction of an autonomous agent's modular architecture. We combine results from two apparently uncorrelated domains: Autonomous planning through Markov Decision Processes and a General Data Clustering Approach using a kernel-like method. Our fundamental idea is that the former is a good framework for addressing autonomy whereas the latter allows to tackle self-organizing problems.
[ { "version": "v1", "created": "Tue, 26 Sep 2006 07:52:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Scherrer", "Bruno", "", "INRIA Lorraine - LORIA" ] ]
cs/0609143
Adrian Paschke
Adrian Paschke
ECA-LP / ECA-RuleML: A Homogeneous Event-Condition-Action Logic Programming Language
Paschke, A.: ECA-LP / ECA-RuleML: A Homogeneous Event-Condition-Action Logic Programming Language, Int. Conf. on Rules and Rule Markup Languages for the Semantic Web (RuleML06), Athens, Georgia, USA, Nov. 2006
Paschke, A.: ECA-LP / ECA-RuleML: A Homogeneous Event-Condition-Action Logic Programming Language, Int. Conf. on Rules and Rule Markup Languages for the Semantic Web (RuleML06), Athens, Georgia, USA, Nov. 2006
null
null
cs.AI cs.LO cs.SE
null
Event-driven reactive functionalities are an urgent need in nowadays distributed service-oriented applications and (Semantic) Web-based environments. An important problem to be addressed is how to correctly and efficiently capture and process the event-based behavioral, reactive logic represented as ECA rules in combination with other conditional decision logic which is represented as derivation rules. In this paper we elaborate on a homogeneous integration approach which combines derivation rules, reaction rules (ECA rules) and other rule types such as integrity constraint into the general framework of logic programming. The developed ECA-LP language provides expressive features such as ID-based updates with support for external and self-updates of the intensional and extensional knowledge, transac-tions including integrity testing and an event algebra to define and process complex events and actions based on a novel interval-based Event Calculus variant.
[ { "version": "v1", "created": "Tue, 26 Sep 2006 14:36:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ] ]
cs/0609144
Richard McClatchey
E. Jimenez-Ruiz, R. Berlanga, I. Sanz, R. McClatchey, R. Danger, D. Manset, J. Paraire, A. Rios
The Management and Integration of Biomedical Knowledge: Application in the Health-e-Child Project (Position Paper)
6 pages; 2 figures. Proceedings of the 1st International Workshop on Ontology content and evaluation in Enterprise
null
null
null
cs.DB
null
The Health-e-Child project aims to develop an integrated healthcare platform for European paediatrics. In order to achieve a comprehensive view of childrens health, a complex integration of biomedical data, information, and knowledge is necessary. Ontologies will be used to formally define this domain knowledge and will form the basis for the medical knowledge management system. This paper introduces an innovative methodology for the vertical integration of biomedical knowledge. This approach will be largely clinician-centered and will enable the definition of ontology fragments, connections between them (semantic bridges) and enriched ontology fragments (views). The strategy for the specification and capture of fragments, bridges and views is outlined with preliminary examples demonstrated in the collection of biomedical information from hospital databases, biomedical ontologies, and biomedical public databases.
[ { "version": "v1", "created": "Tue, 26 Sep 2006 15:21:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Jimenez-Ruiz", "E.", "" ], [ "Berlanga", "R.", "" ], [ "Sanz", "I.", "" ], [ "McClatchey", "R.", "" ], [ "Danger", "R.", "" ], [ "Manset", "D.", "" ], [ "Paraire", "J.", "" ], [ "Rios", "A.", "" ] ]
cs/0609145
Alexandre d'Aspremont
Alexandre d'Aspremont, Laurent El Ghaoui
A Semidefinite Relaxation for Air Traffic Flow Scheduling
Submitted to RIVF 2007
null
null
null
cs.CE
null
We first formulate the problem of optimally scheduling air traffic low with sector capacity constraints as a mixed integer linear program. We then use semidefinite relaxation techniques to form a convex relaxation of that problem. Finally, we present a randomization algorithm to further improve the quality of the solution. Because of the specific structure of the air traffic flow problem, the relaxation has a single semidefinite constraint of size dn where d is the maximum delay and n the number of flights.
[ { "version": "v1", "created": "Tue, 26 Sep 2006 15:34:40 GMT" } ]
2007-05-23T00:00:00
[ [ "d'Aspremont", "Alexandre", "" ], [ "Ghaoui", "Laurent El", "" ] ]
cs/0609149
Qing Zhao
Qing Zhao and Brian M. Sadler
Dynamic Spectrum Access: Signal Processing, Networking, and Regulatory Policy
20 pages, 7 figures, submitted to IEEE Signal Processing Magazine
null
null
null
cs.NI
null
In this article, we first provide a taxonomy of dynamic spectrum access. We then focus on opportunistic spectrum access, the overlay approach under the hierarchical access model of dynamic spectrum access. we aim to provide an overview of challenges and recent developments in both technological and regulatory aspects of opportunistic spectrum access.
[ { "version": "v1", "created": "Wed, 27 Sep 2006 08:05:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhao", "Qing", "" ], [ "Sadler", "Brian M.", "" ] ]
cs/0609150
Eric Rondeau
Belynda Brahimi (CRAN), Christophe Aubrun (CRAN), Eric Rondeau (CRAN)
Modelling and Simulation of Scheduling Policies Implemented in Ethernet Switch by Using Coloured Petri Nets
8 pages
11th IEEE International Conference on Emerging Technologies and Factory Automation, Tch\`{e}que, R\'{e}publique (2006) 667 - 674
null
null
cs.NI
null
The objective of this paper is to propose models enabling to study the behaviour of Ethernet switch for Networked Control Systems. Two scheduler policies are analyzed: the static priority and the WRR (Weighted Round Robin). The modelling work is based on Coloured Petri Nets. A temporal validation step based on the simulation of these modelling, shows that the obtained results are near to the expected behaviour of these scheduler policies.
[ { "version": "v1", "created": "Wed, 27 Sep 2006 07:59:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Brahimi", "Belynda", "", "CRAN" ], [ "Aubrun", "Christophe", "", "CRAN" ], [ "Rondeau", "Eric", "", "CRAN" ] ]
cs/0609153
Pavel Dmitriev
Pavel Dmitriev, Carl Lagoze
Mining Generalized Graph Patterns based on User Examples
11 pages, 11 figures. A short version of this paper appears in proceedings of ICDM-2006 conference
null
null
null
cs.DS cs.LG
null
There has been a lot of recent interest in mining patterns from graphs. Often, the exact structure of the patterns of interest is not known. This happens, for example, when molecular structures are mined to discover fragments useful as features in chemical compound classification task, or when web sites are mined to discover sets of web pages representing logical documents. Such patterns are often generated from a few small subgraphs (cores), according to certain generalization rules (GRs). We call such patterns "generalized patterns"(GPs). While being structurally different, GPs often perform the same function in the network. Previously proposed approaches to mining GPs either assumed that the cores and the GRs are given, or that all interesting GPs are frequent. These are strong assumptions, which often do not hold in practical applications. In this paper, we propose an approach to mining GPs that is free from the above assumptions. Given a small number of GPs selected by the user, our algorithm discovers all GPs similar to the user examples. First, a machine learning-style approach is used to find the cores. Second, generalizations of the cores in the graph are computed to identify GPs. Evaluation on synthetic data, generated using real cores and GRs from biological and web domains, demonstrates effectiveness of our approach.
[ { "version": "v1", "created": "Wed, 27 Sep 2006 18:42:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Dmitriev", "Pavel", "" ], [ "Lagoze", "Carl", "" ] ]
cs/0609158
Kwok-Wo Wong
Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law
A Fast Image Encryption Scheme based on Chaotic Standard Map
16 pages, 7 figures
null
null
null
cs.CR cs.MM
null
In recent years, a variety of effective chaos-based image encryption schemes have been proposed. The typical structure of these schemes has the permutation and the diffusion stages performed alternatively. The confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, respectively. As a result, more overall rounds than necessary are required to achieve a certain level of security. In this paper, we suggest to introduce certain diffusion effect in the confusion stage by simple sequential add-and-shift operations. The purpose is to reduce the workload of the time-consuming diffusion part so that fewer overall rounds and hence a shorter encryption time is needed. Simulation results show that at a similar performance level, the proposed cryptosystem needs less than one-third the encryption time of an existing cryptosystem. The effective acceleration of the encryption speed is thus achieved.
[ { "version": "v1", "created": "Fri, 29 Sep 2006 07:36:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Wong", "Kwok-Wo", "" ], [ "Kwok", "Bernie Sin-Hung", "" ], [ "Law", "Wing-Shing", "" ] ]
cs/0609163
Shay Kutten
Amos Korman and Shay Kutten
Labeling Schemes with Queries
null
null
null
null
cs.DC
null
We study the question of ``how robust are the known lower bounds of labeling schemes when one increases the number of consulted labels''. Let $f$ be a function on pairs of vertices. An $f$-labeling scheme for a family of graphs $\cF$ labels the vertices of all graphs in $\cF$ such that for every graph $G\in\cF$ and every two vertices $u,v\in G$, the value $f(u,v)$ can be inferred by merely inspecting the labels of $u$ and $v$. This paper introduces a natural generalization: the notion of $f$-labeling schemes with queries, in which the value $f(u,v)$ can be inferred by inspecting not only the labels of $u$ and $v$ but possibly the labels of some additional vertices. We show that inspecting the label of a single additional vertex (one {\em query}) enables us to reduce the label size of many labeling schemes significantly.
[ { "version": "v1", "created": "Fri, 29 Sep 2006 12:31:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Korman", "Amos", "" ], [ "Kutten", "Shay", "" ] ]
cs/0609164
Ikuo Moritani
S. Aogaki, I. Moritani, T. Sugai, F. Takeutchi, and F.M. Toyama
Conditional Expressions for Blind Deconvolution: Multi-point form
4 pages, 3 figures, conference
null
null
null
cs.CV
null
We present conditional expression (CE) for finding blurs convolved in given images. The CE is given in terms of the zero-values of the blurs evaluated at multi-point. The CE can detect multiple blur all at once. We illustrate the multiple blur-detection by using a test image.
[ { "version": "v1", "created": "Fri, 29 Sep 2006 13:48:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Aogaki", "S.", "" ], [ "Moritani", "I.", "" ], [ "Sugai", "T.", "" ], [ "Takeutchi", "F.", "" ], [ "Toyama", "F. M.", "" ] ]
cs/0609165
Ikuo Moritani
S. Aogaki, I. Moritani, T. Sugai, F. Takeutchi, and F.M. Toyama
Simple method to eliminate blur based on Lane and Bates algorithm
3 pages, 2 figures, conference
null
null
null
cs.CV
null
A simple search method for finding a blur convolved in a given image is presented. The method can be easily extended to a large blur. The method has been experimentally tested with a model blurred image.
[ { "version": "v1", "created": "Fri, 29 Sep 2006 13:50:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Aogaki", "S.", "" ], [ "Moritani", "I.", "" ], [ "Sugai", "T.", "" ], [ "Takeutchi", "F.", "" ], [ "Toyama", "F. M.", "" ] ]
cs/0609166
Xuan Zheng
Martin J. Strauss, Xuan Zheng
Private Approximate Heavy Hitters
17 pages, submitted
null
null
null
cs.CR
null
We consider the problem of private computation of approximate Heavy Hitters. Alice and Bob each hold a vector and, in the vector sum, they want to find the B largest values along with their indices. While the exact problem requires linear communication, protocols in the literature solve this problem approximately using polynomial computation time, polylogarithmic communication, and constantly many rounds. We show how to solve the problem privately with comparable cost, in the sense that nothing is learned by Alice and Bob beyond what is implied by their input, the ideal top-B output, and goodness of approximation (equivalently, the Euclidean norm of the vector sum). We give lower bounds showing that the Euclidean norm must leak by any efficient algorithm.
[ { "version": "v1", "created": "Fri, 29 Sep 2006 16:05:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Strauss", "Martin J.", "" ], [ "Zheng", "Xuan", "" ] ]
cs/0609167
V\'ictor Cuevas
Mauricio Osorio and V\'ictor Cuevas
Updates in Answer Set Programming: An Approach Based on Basic Structural Properties
30 pages, to be published in Theory and Practice of Logic Programming
null
null
null
cs.LO
null
We have studied the update operator defined for update sequences by Eiter et al. without tautologies and we have observed that it satisfies an interesting property This property, which we call Weak Independence of Syntax (WIS), is similar to one of the postulates proposed by Alchourron, Gardenfors, and Makinson (AGM); only that in this case it applies to nonmonotonic logic. In addition, we consider other five additional basic properties about update programs and we show that the operator of Eiter et al. satisfies them. This work continues the analysis of the AGM postulates under a refined view that considers nelson logic as a monotonic logic which allows us to expand our understanding of answer sets. Moreover, nelson logic helped us to derive an alternative definition of the operator defined by Eiter et al. avoiding the use of unnecessary extra atoms.
[ { "version": "v1", "created": "Fri, 29 Sep 2006 17:00:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Osorio", "Mauricio", "" ], [ "Cuevas", "Víctor", "" ] ]
cs/0610001
Kunihiko Sadakane
Daisuke Okanohara, Kunihiko Sadakane
Practical Entropy-Compressed Rank/Select Dictionary
null
null
null
null
cs.DS
null
Rank/Select dictionaries are data structures for an ordered set $S \subset \{0,1,...,n-1\}$ to compute $\rank(x,S)$ (the number of elements in $S$ which are no greater than $x$), and $\select(i,S)$ (the $i$-th smallest element in $S$), which are the fundamental components of \emph{succinct data structures} of strings, trees, graphs, etc. In those data structures, however, only asymptotic behavior has been considered and their performance for real data is not satisfactory. In this paper, we propose novel four Rank/Select dictionaries, esp, recrank, vcode and sdarray, each of which is small if the number of elements in $S$ is small, and indeed close to $nH_0(S)$ ($H_0(S) \leq 1$ is the zero-th order \textit{empirical entropy} of $S$) in practice, and its query time is superior to the previous ones. Experimental results reveal the characteristics of our data structures and also show that these data structures are superior to existing implementations in both size and query time.
[ { "version": "v1", "created": "Fri, 29 Sep 2006 23:52:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Okanohara", "Daisuke", "" ], [ "Sadakane", "Kunihiko", "" ] ]
cs/0610002
Ikuo Moritani
S. Aogaki, I. Moritani, T. Sugai, F. Takeutchi, and F.M. Toyama
Conditional Expressions for Blind Deconvolution: Derivative form
5 page, 3 figures, conference
null
null
null
cs.CV
null
We developed novel conditional expressions (CEs) for Lane and Bates' blind deconvolution. The CEs are given in term of the derivatives of the zero-values of the z-transform of given images. The CEs make it possible to automatically detect multiple blur convolved in the given images all at once without performing any analysis of the zero-sheets of the given images. We illustrate the multiple blur-detection by the CEs for a model image
[ { "version": "v1", "created": "Sat, 30 Sep 2006 08:05:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Aogaki", "S.", "" ], [ "Moritani", "I.", "" ], [ "Sugai", "T.", "" ], [ "Takeutchi", "F.", "" ], [ "Toyama", "F. M.", "" ] ]
cs/0610005
Ran Ren
Ran Ren
Domain Wall Displacement Detection Technology Research Report
4 pages, 0 figures
null
null
null
cs.OH
null
This article introduce a new data storage method called DWDD(Domain Wall Displacement Detection) and tell you why it succeed.
[ { "version": "v1", "created": "Mon, 2 Oct 2006 04:38:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Ren", "Ran", "" ] ]
cs/0610006
Adrian Paschke
Adrian Paschke
A Typed Hybrid Description Logic Programming Language with Polymorphic Order-Sorted DL-Typed Unification for Semantic Web Type Systems
Full technical report 12/05. Published inn: Proc. of 2nd Int. Workshop on OWL: Experiences and Directions 2006 (OWLED'06) at ISWC'06, Athens, Georgia, USA, 2006
In: Proc. of 2nd Int. Workshop on OWL: Experiences and Directions 2006 (OWLED'06) at ISWC'06, Athens, Georgia, USA, 2006
null
null
cs.AI
null
In this paper we elaborate on a specific application in the context of hybrid description logic programs (hybrid DLPs), namely description logic Semantic Web type systems (DL-types) which are used for term typing of LP rules based on a polymorphic, order-sorted, hybrid DL-typed unification as procedural semantics of hybrid DLPs. Using Semantic Web ontologies as type systems facilitates interchange of domain-independent rules over domain boundaries via dynamically typing and mapping of explicitly defined type ontologies.
[ { "version": "v1", "created": "Mon, 2 Oct 2006 08:57:54 GMT" }, { "version": "v2", "created": "Tue, 3 Apr 2007 21:36:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ] ]
cs/0610007
Guenther Eichhorn
G\"unther Eichhorn, Alberto Accomazzi, Carolyn S. Grant, Edwin A. Henneken, Donna M. Thompson, Michael J. Kurtz, Stephen S. Murray
Full Text Searching in the Astrophysics Data System
To appear in Library and Information Systems in Astronomy V
null
null
null
cs.DL astro-ph cs.DB
null
The Smithsonian/NASA Astrophysics Data System (ADS) provides a search system for the astronomy and physics scholarly literature. All major and many smaller astronomy journals that were published on paper have been scanned back to volume 1 and are available through the ADS free of charge. All scanned pages have been converted to text and can be searched through the ADS Full Text Search System. In addition, searches can be fanned out to several external search systems to include the literature published in electronic form. Results from the different search systems are combined into one results list. The ADS Full Text Search System is available at: http://adsabs.harvard.edu/fulltext_service.html
[ { "version": "v1", "created": "Mon, 2 Oct 2006 14:51:45 GMT" }, { "version": "v2", "created": "Thu, 5 Oct 2006 13:11:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Eichhorn", "Günther", "" ], [ "Accomazzi", "Alberto", "" ], [ "Grant", "Carolyn S.", "" ], [ "Henneken", "Edwin A.", "" ], [ "Thompson", "Donna M.", "" ], [ "Kurtz", "Michael J.", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0610008
Guenther Eichhorn
G\"unther Eichhorn, Alberto Accomazzi, Carolyn S. Grant, Edwin A. Henneken, Donna M. Thompson, Michael J. Kurtz, Stephen S. Murray
Connectivity in the Astronomy Digital Library
To appear in Library and Information Systems in Astronomy V
null
null
null
cs.DL astro-ph cs.DB
null
The Astrophysics Data System (ADS) provides an extensive system of links between the literature and other on-line information. Recently, the journals of the American Astronomical Society (AAS) and a group of NASA data centers have collaborated to provide more links between on-line data obtained by space missions and the on-line journals. Authors can now specify which data sets they have used in their article. This information is used by the participants to provide the links between the literature and the data. The ADS is available at: http://ads.harvard.edu
[ { "version": "v1", "created": "Mon, 2 Oct 2006 15:06:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Eichhorn", "Günther", "" ], [ "Accomazzi", "Alberto", "" ], [ "Grant", "Carolyn S.", "" ], [ "Henneken", "Edwin A.", "" ], [ "Thompson", "Donna M.", "" ], [ "Kurtz", "Michael J.", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0610011
Alberto Accomazzi
Alberto Accomazzi, Gunther Eichhorn, Michael J. Kurtz, Carolyn S. Grant, Edwin Henneken, Markus Demleitner, Donna Thompson, Elizabeth Bohlen, Stephen S. Murray
Creation and use of Citations in the ADS
9 pages; to be published in the proceedings of the conference "Library and Information Services V," June 2006, Cambridge, MA, USA
null
null
null
cs.DL astro-ph cs.DB cs.IR
null
With over 20 million records, the ADS citation database is regularly used by researchers and librarians to measure the scientific impact of individuals, groups, and institutions. In addition to the traditional sources of citations, the ADS has recently added references extracted from the arXiv e-prints on a nightly basis. We review the procedures used to harvest and identify the reference data used in the creation of citations, the policies and procedures that we follow to avoid double-counting and to eliminate contributions which may not be scholarly in nature. Finally, we describe how users and institutions can easily obtain quantitative citation data from the ADS, both interactively and via web-based programming tools. The ADS is available at http://ads.harvard.edu.
[ { "version": "v1", "created": "Tue, 3 Oct 2006 21:29:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Accomazzi", "Alberto", "" ], [ "Eichhorn", "Gunther", "" ], [ "Kurtz", "Michael J.", "" ], [ "Grant", "Carolyn S.", "" ], [ "Henneken", "Edwin", "" ], [ "Demleitner", "Markus", "" ], [ "Thompson", "Donna", "" ], [ "Bohlen", "Elizabeth", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0610013
Francois Charoy
Khaled Gaaloul (INRIA Lorraine - LORIA), Fran\c{c}ois Charoy (INRIA Lorraine - LORIA), Claude Godart (INRIA Lorraine - LORIA)
Cooperative Processes for Scientific Workflows
null
Dans 6th International Conference on Computational Science 3, 3993 (2006) 976-979
null
null
cs.NI
null
The work described in this paper is a contribution to the problems of managing in data-intensive scientific applications. First, we discuss scientific workflows and motivate there use in scientific applications. Then, we introduce the concept of cooperative processes and describe their interactions and uses in a flexible cooperative workflow system called \textit{Bonita}. Finally, we propose an approach to integrate and synthesize the data exchanged by the mapping of data-intensive science into Bonita, using a binary approach, and illustrate the endeavors done to enhance the performance computations within a dynamic environment.
[ { "version": "v1", "created": "Wed, 4 Oct 2006 08:21:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Gaaloul", "Khaled", "", "INRIA Lorraine - LORIA" ], [ "Charoy", "François", "", "INRIA\n Lorraine - LORIA" ], [ "Godart", "Claude", "", "INRIA Lorraine - LORIA" ] ]
cs/0610015
Farid Nouioua
Farid Nouioua (LIPN)
Why did the accident happen? A norm-based reasoning approach
null
Logical Aspects of Computational Linguistics, student sessionUniversit\'{e} de bordeaux (Ed.) (2005) 31-34
null
null
cs.AI
null
In this paper we describe an architecture of a system that answer the question : Why did the accident happen? from the textual description of an accident. We present briefly the different parts of the architecture and then we describe with more detail the semantic part of the system i.e. the part in which the norm-based reasoning is performed on the explicit knowlege extracted from the text.
[ { "version": "v1", "created": "Wed, 4 Oct 2006 11:32:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Nouioua", "Farid", "", "LIPN" ] ]
cs/0610016
Farid Nouioua
Farid Nouioua (LIPN)
Norm Based Causal Reasoning in Textual Corpus
null
Proceedings of the Sixth International Workshop on Computational Semantics IWCS-6, France (2005) 396-400
null
null
cs.AI cs.CL
null
Truth based entailments are not sufficient for a good comprehension of NL. In fact, it can not deduce implicit information necessary to understand a text. On the other hand, norm based entailments are able to reach this goal. This idea was behind the development of Frames (Minsky 75) and Scripts (Schank 77, Schank 79) in the 70's. But these theories are not formalized enough and their adaptation to new situations is far from being obvious. In this paper, we present a reasoning system which uses norms in a causal reasoning process in order to find the cause of an accident from a text describing it.
[ { "version": "v1", "created": "Wed, 4 Oct 2006 11:33:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Nouioua", "Farid", "", "LIPN" ] ]
cs/0610017
Maruti Satti
Maruti Satti
A Quasigroup Based Cryptographic System
22 pages, 11 figures
null
null
null
cs.CR
null
This paper presents a quasigroup encryptor that has very good scrambling properties. We show that the output of the encryptor maximizes the output entropy and the encrypted output for constant and random inputs is very similar. The system architecture of the quasigroup encryptor and the autocorrelation properties of the output sequences are provided.
[ { "version": "v1", "created": "Wed, 4 Oct 2006 12:29:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Satti", "Maruti", "" ] ]
cs/0610018
Farid Nouioua
Farid Nouioua (LIPN)
Raisonnement stratifi\'{e} \`{a} base de normes pour inf\'{e}rer les causes dans un corpus textuel
null
The Seventh International Symposium On Programming and SystemsUSTHB d'Alger (Ed.) (2005) 81-92
null
null
cs.AI cs.CL
null
To understand texts written in natural language (LN), we use our knowledge about the norms of the domain. Norms allow to infer more implicit information from the text. This kind of information can, in general, be defeasible, but it remains useful and acceptable while the text do not contradict it explicitly. In this paper we describe a non-monotonic reasoning system based on the norms of the car crash domain. The system infers the cause of an accident from its textual description. The cause of an accident is seen as the most specific norm which has been violated. The predicates and the rules of the system are stratified: organized on layers in order to obtain an efficient reasoning.
[ { "version": "v1", "created": "Wed, 4 Oct 2006 13:09:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Nouioua", "Farid", "", "LIPN" ] ]
cs/0610019
Juan J. Merelo Pr.
Juan J. Samper, Pedro A. Castillo, Lourdes Araujo, J. J. Merelo
NectaRSS, an RSS feed ranking system that implicitly learns user preferences
Submitted to First Monday. 16 pages
null
null
null
cs.IR cs.HC
null
In this paper a new RSS feed ranking method called NectaRSS is introduced. The system recommends information to a user based on his/her past choices. User preferences are automatically acquired, avoiding explicit feedback, and ranking is based on those preferences distilled to a user profile. NectaRSS uses the well-known vector space model for user profiles and new documents, and compares them using information-retrieval techniques, but introduces a novel method for user profile creation and adaptation from users' past choices. The efficiency of the proposed method has been tested by embedding it into an intelligent aggregator (RSS feed reader), which has been used by different and heterogeneous users. Besides, this paper proves that the ranking of newsitems yielded by NectaRSS improves its quality with user's choices, and its superiority over other algorithms that use a different information representation method.
[ { "version": "v1", "created": "Wed, 4 Oct 2006 15:13:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Samper", "Juan J.", "" ], [ "Castillo", "Pedro A.", "" ], [ "Araujo", "Lourdes", "" ], [ "Merelo", "J. J.", "" ] ]
cs/0610020
William Gilreath
William F. Gilreath
XString: XML as a String
27-pages, 2-tables
null
null
null
cs.DB
null
Extensible markup language (XML) is a technology that has been much hyped, so that XML has become an industry buzzword. Behind the hype is a powerful technology for data representation in a platform independent manner. As a text document, however, XML suffers from being too bloated, and requires an XML parser to access and manipulate it. XString is an encoding method for XML, in essence, a markup language's markup language. XString gives the benefit of compressing XML, and allows for easy manipulation and processing of XML source as a very long string.
[ { "version": "v1", "created": "Wed, 4 Oct 2006 23:21:11 GMT" }, { "version": "v2", "created": "Fri, 6 Oct 2006 23:03:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Gilreath", "William F.", "" ] ]
cs/0610023
Farid Nouioua
Farid Nouioua (LIPN), Daniel Kayser (LIPN)
Une exp\'{e}rience de s\'{e}mantique inf\'{e}rentielle
null
Actes de TALN'06UCL Presses Universitaires de Louvain (Ed.) (2006) 246-255
null
null
cs.AI
null
We develop a system which must be able to perform the same inferences that a human reader of an accident report can do and more particularly to determine the apparent causes of the accident. We describe the general framework in which we are situated, linguistic and semantic levels of the analysis and the inference rules used by the system.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 05:18:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Nouioua", "Farid", "", "LIPN" ], [ "Kayser", "Daniel", "", "LIPN" ] ]
cs/0610024
Eric Rondeau
Belynda Brahimi (CRAN), Christophe Aubrun (CRAN), Eric Rondeau (CRAN)
Network calculus based FDI approach for switched Ethernet architecture
null
6th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, Chine (29/08/2006) 6 pages
null
null
cs.NI
null
The Networked Control Systems (NCS) are complex systems which integrate information provided by several domians such as automatic control, computer science, communication network. The work presented in this paper concerns fault detection, isolation and compensation of communication network. The proposed method is based on the classical approach of Fault Detection and Isolation and Fault Tolerant Control (FDI/FTC) currently used in diagnosis. The modelling of the network to be supervised is based on both couloured petri nets and network calculus theory often used to represent and analyse the network behaviour. The goal is to implement inside network devices algorithms enabling to detect, isolate and compensate communication faults in an autonomous way.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 07:53:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Brahimi", "Belynda", "", "CRAN" ], [ "Aubrun", "Christophe", "", "CRAN" ], [ "Rondeau", "Eric", "", "CRAN" ] ]
cs/0610026
Rob van Stee
Leah Epstein and Rob van Stee
Covering selfish machines
null
null
null
null
cs.GT
null
We consider the machine covering problem for selfish related machines. For a constant number of machines, m, we show a monotone polynomial time approximation scheme (PTAS) with running time that is linear in the number of jobs. It uses a new technique for reducing the number of jobs while remaining close to the optimal solution. We also present an FPTAS for the classical machine covering problem (the previous best result was a PTAS) and use this to give a monotone FPTAS. Additionally, we give a monotone approximation algorithm with approximation ratio \min(m,(2+\eps)s_1/s_m) where \eps>0 can be chosen arbitrarily small and s_i is the (real) speed of machine i. Finally we give improved results for two machines. Our paper presents the first results for this problem in the context of selfish machines.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 13:20:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Epstein", "Leah", "" ], [ "van Stee", "Rob", "" ] ]
cs/0610028
Olivier Zendra
Olivier Zendra (INRIA Lorraine - LORIA, LORIA)
Memory and compiler optimizations for low-power and -energy
ICOOOLPS'2006 was co-located with the 20th European Conference on Object-Oriented Programming (ECOOP'2006)
Dans 1st ECOOP Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS'2006). (2006)
null
null
cs.PL cs.PF
null
Embedded systems become more and more widespread, especially autonomous ones, and clearly tend to be ubiquitous. In such systems, low-power and low-energy usage get ever more crucial. Furthermore, these issues also become paramount in (massively) multi-processors systems, either in one machine or more widely in a grid. The various problems faced pertain to autonomy, power supply possibilities, thermal dissipation, or even sheer energy cost. Although it has since long been studied in harware, energy optimization is more recent in software. In this paper, we thus aim at raising awareness to low-power and low-energy issues in the language and compilation community. We thus broadly but briefly survey techniques and solutions to this energy issue, focusing on a few specific aspects in the context of compiler optimizations and memory management.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 17:58:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Zendra", "Olivier", "", "INRIA Lorraine - LORIA, LORIA" ] ]
cs/0610029
Alberto Accomazzi
Carolyn S. Grant, Alberto Accomazzi, Donna Thompson, Edwin Henneken, Guenther Eichhorn, Michael J. Kurtz, and Stephen S. Murray
Data in the ADS -- Understanding How to Use it Better
4 pages; submitted to the proceedings of the Library and Information Services in Astronomy V; to be published by ASP Conference Proceedings
null
null
null
cs.DL cs.DB
null
The Smithsonian/NASA ADS Abstract Service contains a wealth of data for astronomers and librarians alike, yet the vast majority of usage consists of rudimentary searches. Hints on how to obtain more focused search results by using more of the various capabilities of the ADS are presented, including searching by affiliation. We also discuss the classification of articles by content and by referee status. The ADS is funded by NASA Grant NNG06GG68G-16613687.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 18:51:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Grant", "Carolyn S.", "" ], [ "Accomazzi", "Alberto", "" ], [ "Thompson", "Donna", "" ], [ "Henneken", "Edwin", "" ], [ "Eichhorn", "Guenther", "" ], [ "Kurtz", "Michael J.", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0610030
Alberto Accomazzi
Donna M. Thompson, Alberto Accomazzi, Guenther Eichhorn, Carolyn Grant, Edwin Henneken, Michael J. Kurtz, Elizabeth Bohlen, Stephen S. Murray
Paper to Screen: Processing Historical Scans in the ADS
4 pages; submitted to the proceedings of Library and Information Services in Astronomy; to be published in the ASP Conference Series
null
null
null
cs.DL cs.HC
null
The NASA Astrophysics Data System in conjunction with the Wolbach Library at the Harvard-Smithsonian Center for Astrophysics is working on a project to microfilm historical observatory publications. The microfilm is then scanned for inclusion in the ADS. The ADS currently contains over 700,000 scanned pages of volumes of historical literature. Many of these volumes lack clear pagination or other bibliographic data that are necessary to take advantage of the searching capabilities of the ADS. This paper will address some of the interesting challenges that needed to be resolved during the processing of the Observatory Reports included in the ADS.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 18:58:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Thompson", "Donna M.", "" ], [ "Accomazzi", "Alberto", "" ], [ "Eichhorn", "Guenther", "" ], [ "Grant", "Carolyn", "" ], [ "Henneken", "Edwin", "" ], [ "Kurtz", "Michael J.", "" ], [ "Bohlen", "Elizabeth", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0610032
Mathys Walma
Mathys Walma
Pipelined Feed-Forward Cyclic Redundancy Check (CRC) Calculation
admin note: Paper removed for copyright reasons
null
null
null
cs.NI
null
This paper discusses a method for pipelining the calculation of CRC's, such as ITU/CCITT CRC32, into a mostly feed-forward architecture. This method allows several benefits such as independent scaling of circuit frequency and data throughput. Additionally it allows calculation over packet tails (packet length not a multiple of CRC input width). Finally it offers the ability to update a CRC where a subset of data in the packet has changed.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 21:44:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Walma", "Mathys", "" ] ]
cs/0610038
Hannes Hutzelmeyer
Hannes Hutzelmeyer
Church's thesis is questioned by new calculation paradigm
32 pages
null
null
null
cs.LO
null
Church's thesis claims that all effecticely calculable functions are recursive. A shortcoming of the various definitions of recursive functions lies in the fact that it is not a matter of a syntactical check to find out if an entity gives rise to a function. Eight new ideas for a precise setup of arithmetical logic and its metalanguage give the proper environment for the construction of a special computer, the ARBACUS computer. Computers do not come to a necessary halt; it is requested that calculators are constructed on the basis of computers in a way that they always come to a halt, then all calculations are effective. The ARBATOR is defined as a calculator with two-layer-computation. It allows for the calculation of all primitive recursive functions, but multi-level-arbation also allows for the calculation of other arbative functions that are not primitive recursive. The new paradigm of calculation does not have the above mentioned shortcoming. The defenders of Church's thesis are challenged to show that exotic arbative functions are recursive and to put forward a recursive function that is not arbative. A construction with three-tier-multi-level-arbation that includes a diagonalisation leads to the extravagant yet calculable Snark-function that is not arbative. As long as it is not shown that all exotic arbative functions and particularily the Snark-function are arithmetically representable Goedel's first incompleteness sentence is in limbo.
[ { "version": "v1", "created": "Sat, 7 Oct 2006 12:53:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutzelmeyer", "Hannes", "" ] ]
cs/0610039
Neil Rubens
Neil Rubens
The Application of Fuzzy Logic to the Construction of the Ranking Function of Information Retrieval Systems
null
N. Rubens. The application of fuzzy logic to the construction of the ranking function of information retrieval systems. Computer Modelling and New Technologies, 10(1):20-27, 2006
null
null
cs.IR cs.AI
null
The quality of the ranking function is an important factor that determines the quality of the Information Retrieval system. Each document is assigned a score by the ranking function; the score indicates the likelihood of relevance of the document given a query. In the vector space model, the ranking function is defined by a mathematic expression. We propose a fuzzy logic (FL) approach to defining the ranking function. FL provides a convenient way of converting knowledge expressed in a natural language into fuzzy logic rules. The resulting ranking function could be easily viewed, extended, and verified: * if (tf is high) and (idf is high) > (relevance is high); * if (overlap is high) > (relevance is high). By using above FL rules, we are able to achieve performance approximately equal to the state of the art search engine Apache Lucene (deltaP10 +0.92%; deltaMAP -0.1%). The fuzzy logic approach allows combining the logic-based model with the vector model. The resulting model possesses simplicity and formalism of the logic based model, and the flexibility and performance of the vector model.
[ { "version": "v1", "created": "Sun, 8 Oct 2006 05:34:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Rubens", "Neil", "" ] ]
cs/0610043
Zengyou He
Zengyou He
Farthest-Point Heuristic based Initialization Methods for K-Modes Clustering
7 pages
null
null
null
cs.AI
null
The k-modes algorithm has become a popular technique in solving categorical data clustering problems in different application domains. However, the algorithm requires random selection of initial points for the clusters. Different initial points often lead to considerable distinct clustering results. In this paper we present an experimental study on applying a farthest-point heuristic based initialization method to k-modes clustering to improve its performance. Experiments show that new initialization method leads to better clustering accuracy than random selection initialization method for k-modes clustering.
[ { "version": "v1", "created": "Mon, 9 Oct 2006 12:12:45 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ] ]
cs/0610048
Stephen D. Miller
Nathan Keller, Stephen D. Miller, Ilya Mironov, and Ramarathnam Venkatesan
MV3: A new word based stream cipher using rapid mixing and revolving buffers
27 pages, shortened version will appear in "Topics in Cryptology - CT-RSA 2007"
null
null
null
cs.CR cs.DM math.CO
null
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new components and principles, as well as mathematical analysis to justify their use. Our approach, like RC4's, is based on rapidly mixing random walks on directed graphs (that is, walks which reach a random state quickly, from any starting point). We begin with some well understood walks, and then introduce nonlinearity in their steps in order to improve security and show long term statistical correlations are negligible. To minimize the short term correlations, as well as to deter attacks using equations involving successive outputs, we provide a method for sequencing the outputs derived from the walk using three revolving buffers. The cipher is fast -- it runs at a speed of less than 5 cycles per byte on a Pentium IV processor. A word based cipher needs to output more bits per step, which exposes more correlations for attacks. Moreover we seek simplicity of construction and transparent analysis. To meet these requirements, we use a larger state and claim security corresponding to only a fraction of it. Our design is for an adequately secure word-based cipher; our very preliminary estimate puts the security close to exhaustive search for keys of size < 256 bits.
[ { "version": "v1", "created": "Tue, 10 Oct 2006 01:23:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Keller", "Nathan", "" ], [ "Miller", "Stephen D.", "" ], [ "Mironov", "Ilya", "" ], [ "Venkatesan", "Ramarathnam", "" ] ]
cs/0610051
Philippe Trebuchet
Mohab Safey El Din (INRIA Rocquencourt), Philippe Trebuchet (INRIA Rocquencourt)
Strong bi-homogeneous B\'{e}zout theorem and its use in effective real algebraic geometry
null
null
null
null
cs.SC
null
Let f1, ..., fs be a polynomial family in Q[X1,..., Xn] (with s less than n) of degree bounded by D. Suppose that f1, ..., fs generates a radical ideal, and defines a smooth algebraic variety V. Consider a projection P. We prove that the degree of the critical locus of P restricted to V is bounded by D^s(D-1)^(n-s) times binomial of n and n-s. This result is obtained in two steps. First the critical points of P restricted to V are characterized as projections of the solutions of Lagrange's system for which a bi-homogeneous structure is exhibited. Secondly we prove a bi-homogeneous B\'ezout Theorem, which bounds the sum of the degrees of the equidimensional components of the radical of an ideal generated by a bi-homogeneous polynomial family. This result is improved when f1,..., fs is a regular sequence. Moreover, we use Lagrange's system to design an algorithm computing at least one point in each connected component of a smooth real algebraic set. This algorithm generalizes, to the non equidimensional case, the one of Safey El Din and Schost. The evaluation of the output size of this algorithm gives new upper bounds on the first Betti number of a smooth real algebraic set. Finally, we estimate its arithmetic complexity and prove that in the worst cases it is polynomial in n, s, D^s(D-1)^(n-s) and the binomial of n and n-s, and the complexity of evaluation of f1,..., fs.
[ { "version": "v1", "created": "Tue, 10 Oct 2006 15:02:07 GMT" }, { "version": "v2", "created": "Fri, 20 Oct 2006 15:16:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Din", "Mohab Safey El", "", "INRIA Rocquencourt" ], [ "Trebuchet", "Philippe", "", "INRIA\n Rocquencourt" ] ]
cs/0610055
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
Extending the Calculus of Constructions with Tarski's fix-point theorem
null
null
null
null
cs.LO
null
We propose to use Tarski's least fixpoint theorem as a basis to define recursive functions in the calculus of inductive constructions. This widens the class of functions that can be modeled in type-theory based theorem proving tool to potentially non-terminating functions. This is only possible if we extend the logical framework by adding the axioms that correspond to classical logic. We claim that the extended framework makes it possible to reason about terminating and non-terminating computations and we show that common facilities of the calculus of inductive construction, like program extraction can be extended to also handle the new functions.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 12:50:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
cs/0610058
Andrew Krizhanovsky A
A. V. Smirnov, T. V. Levashova, M. P. Pashkin, N. G. Shilov, A. A. Krizhanovsky, A. M. Kashevnik, and A. S. Komarova
Context-sensitive access to e-document corpus
9 pages, 1 figure, short version of this paper was presented at the International Conference Corpus Linguistics 2006. October 10-14, St. Petersburg, Russia
null
null
null
cs.IR
null
The methodology of context-sensitive access to e-documents considers context as a problem model based on the knowledge extracted from the application domain, and presented in the form of application ontology. Efficient access to an information in the text form is needed. Wiki resources as a modern text format provides huge number of text in a semi formalized structure. At the first stage of the methodology, documents are indexed against the ontology representing macro-situation. The indexing method uses a topic tree as a middle layer between documents and the application ontology. At the second stage documents relevant to the current situation (the abstract and operational contexts) are identified and sorted by degree of relevance. Abstract context is a problem-oriented ontology-based model. Operational context is an instantiation of the abstract context with data provided by the information sources. The following parts of the methodology are described: (i) metrics for measuring similarity of e-documents to ontology, (ii) a document index storing results of indexing of e-documents against the ontology; (iii) a method for identification of relevant e-documents based on semantic similarity measures. Wikipedia (wiki resource) is used as a corpus of e-documents for approach evaluation in a case study. Text categorization, the presence of metadata, and an existence of a lot of articles related to different topics characterize the corpus.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 08:02:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Smirnov", "A. V.", "" ], [ "Levashova", "T. V.", "" ], [ "Pashkin", "M. P.", "" ], [ "Shilov", "N. G.", "" ], [ "Krizhanovsky", "A. A.", "" ], [ "Kashevnik", "A. M.", "" ], [ "Komarova", "A. S.", "" ] ]
cs/0610060
Mark Levene
Mark Levene and Judit Bar-Ilan
Comparing Typical Opening Move Choices Made by Humans and Chess Engines
12 pages, 1 figure, 6 tables
null
null
null
cs.AI
null
The opening book is an important component of a chess engine, and thus computer chess programmers have been developing automated methods to improve the quality of their books. For chess, which has a very rich opening theory, large databases of high-quality games can be used as the basis of an opening book, from which statistics relating to move choices from given positions can be collected. In order to find out whether the opening books used by modern chess engines in machine versus machine competitions are ``comparable'' to those used by chess players in human versus human competitions, we carried out analysis on 26 test positions using statistics from two opening books one compiled from humans' games and the other from machines' games. Our analysis using several nonparametric measures, shows that, overall, there is a strong association between humans' and machines' choices of opening moves when using a book to guide their choices.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 10:26:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Levene", "Mark", "" ], [ "Bar-Ilan", "Judit", "" ] ]
cs/0610062
Frederic Blanqui
Frederic Blanqui (INRIA Lorraine - LORIA)
A type-based termination criterion for dependently-typed higher-order rewrite systems
Colloque avec actes et comit\'{e} de lecture. internationale
Dans 15th International Conference on Rewriting Techniques and Applications - RTA'04 (2004) 15 p
null
null
cs.LO cs.PL
null
Several authors devised type-based termination criteria for ML-like languages allowing non-structural recursive calls. We extend these works to general rewriting and dependent types, hence providing a powerful termination criterion for the combination of rewriting and beta-reduction in the Calculus of Constructions.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 12:47:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Blanqui", "Frederic", "", "INRIA Lorraine - LORIA" ] ]
cs/0610075
Marek Czachor
Diederik Aerts, Marek Czachor, Bart De Moor
On Geometric Algebra representation of Binary Spatter Codes
preliminary version
null
null
null
cs.AI quant-ph
null
Kanerva's Binary Spatter Codes are reformulated in terms of geometric algebra. The key ingredient of the construction is the representation of XOR binding in terms of geometric product.
[ { "version": "v1", "created": "Thu, 12 Oct 2006 18:48:22 GMT" }, { "version": "v2", "created": "Mon, 23 Oct 2006 13:56:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Aerts", "Diederik", "" ], [ "Czachor", "Marek", "" ], [ "De Moor", "Bart", "" ] ]
cs/0610076
Willy Valdivia-Granda
Willy Valdivia-Granda, William Perrizo, Edward Deckard, Francis Larson
Peano Count Trees (P-Trees) and Rule Association Mining for Gene Expression Profiling of Microarray Data
null
2002 International Conference in Bioinformatics. Bangkok, Thailand
null
null
cs.DS cs.IR q-bio.MN
null
The greatest challenge in maximizing the use of gene expression data is to develop new computational tools capable of interconnecting and interpreting the results from different organisms and experimental settings. We propose an integrative and comprehensive approach including a super-chip containing data from microarray experiments collected on different species subjected to hypoxic and anoxic stress. A data mining technology called Peano count tree (P-trees) is used to represent genomic data in multidimensions. Each microarray spot is presented as a pixel with its corresponding red/green intensity feature bands. Each bad is stored separately in a reorganized 8-separate (bSQ) file format. Each bSQ is converted to a quadrant base tree structure (P-tree) from which a superchip is represented as expression P-trees (EP-trees) and repression P-trees (RP-trees). The use of association rule mining is proposed to derived to meanigingfully organize signal transduction pathways taking in consideration evolutionary considerations. We argue that the genetic constitution of an organism (K) can be represented by the total number of genes belonging to two groups. The group X constitutes genes (X1,Xn) and they can be represented as 1 or 0 depending on whether the gene was expressed or not. The second group of Y genes (Y1,Yn) is expressed at different levels. These genes have a very high repression, high expression, very repressed or highly repressed. However, many genes of the group Y are specie specific and modulated by the products and combinations of genes of the group X. In this paper, we introduce the dSQ and P-tree technology; the biological implications of association rule mining using X and Y gene groups and some advances in the integration of this information using the BRAIN architecture.
[ { "version": "v1", "created": "Thu, 12 Oct 2006 19:55:32 GMT" }, { "version": "v2", "created": "Fri, 13 Oct 2006 18:27:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Valdivia-Granda", "Willy", "" ], [ "Perrizo", "William", "" ], [ "Deckard", "Edward", "" ], [ "Larson", "Francis", "" ] ]
cs/0610078
Fehmi Ben Abdesslem
Fehmi Ben Abdesslem, Luigi Iannone, Marcelo Dias de Amorim, Katia Obraczka, Ignacio Solis, and Serge Fdida
Rapid Prototyping over IEEE 802.11
Changed content. 12 pages
null
null
null
cs.NI
null
This paper introduces Prawn, a tool for prototyping communication protocols over IEEE 802.11 networks. Prawn allows researchers to conduct both functional assessment and performance evaluation as an inherent part of the protocol design process. Since Prawn runs on real IEEE 802.11 nodes, prototypes can be evaluated and adjusted under realistic conditions. Once the prototype has been extensively tested and thoroughly validated, and its functional design tuned accordingly, it is then ready for implementation. Prawn facilitates prototype development by providing: (i) a set of building blocks that implement common functions needed by a wide range of wireless protocols (e.g., neighbor discovery, link quality assessment, message transmission and reception), and (ii) an API that allows protocol designers to access Prawn primitives. We show through a number of case studies how Prawn supports prototyping as part of protocol design and, as a result of enabling deployment and testing under real-world scenarios, how Prawn provides useful feedback on protocol operation and performance.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 15:29:44 GMT" }, { "version": "v2", "created": "Sat, 3 Feb 2007 21:41:58 GMT" }, { "version": "v3", "created": "Tue, 22 May 2007 16:24:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Abdesslem", "Fehmi Ben", "" ], [ "Iannone", "Luigi", "" ], [ "de Amorim", "Marcelo Dias", "" ], [ "Obraczka", "Katia", "" ], [ "Solis", "Ignacio", "" ], [ "Fdida", "Serge", "" ] ]
cs/0610084
Thomas Claveirole
Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, and Yannis Viniotis
Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks
9 pages, 3 figures, 2 tables
null
null
null
cs.NI cs.CR
null
A common approach to overcome the limited nature of sensor networks is to aggregate data at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security mainly because sensor networks are extremely vulnerable to node compromises. In order to secure data aggregation, in this paper we propose three schemes that rely on multipath routing. The first one guarantees data confidentiality through secret sharing, while the second and third ones provide data availability through information dispersal. Based on qualitative analysis and implementation, we show that, by applying these schemes, a sensor network can achieve data confidentiality, authenticity, and protection against denial of service attacks even in the presence of multiple compromised nodes.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 13:01:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Claveirole", "Thomas", "" ], [ "de Amorim", "Marcelo Dias", "" ], [ "Abdalla", "Michel", "" ], [ "Viniotis", "Yannis", "" ] ]
cs/0610085
Farn Wang
Farn Wang
Symbolic Simulation-Checking of Dense-Time Systems
16 pages, 1 figure
null
null
null
cs.LO cs.SE
null
Intuitively, an (implementation) automata is simulated by a (specification) automata if every externally observable transition by the implementation automata can also be made by the specification automata. In this work, we present a symbolic algorithm for the simulation-checking of timed automatas. We first present a simulation-checking procedure that operates on state spaces, representable with convex polyhedra, of timed automatas. We then present techniques to represent those intermediate result convex polyhedra with zones and make the procedure an algorithm. We then discuss how to handle Zeno states in the implementation automata. Finally, we have endeavored to realize the algorithm and report the performance of our algorithm in the experiment.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 18:02:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Farn", "" ] ]
cs/0610086
Stephen A. Fenner
S. A. Fenner, Y. Zhang
The central nature of the Hidden Subgroup problem
12 pages, no figures. Corrected Proposition 3.3 and added discussion relating it to results of Childs and van Dam (quant-ph/0507190). Adjusted Definition 2.2 and the proof of Proposition 3.3 to fix a minor bug. Other minor corrections/clarifications. Updated references
null
null
null
cs.CC quant-ph
null
We show that several problems that figure prominently in quantum computing, including Hidden Coset, Hidden Shift, and Orbit Coset, are equivalent or reducible to Hidden Subgroup for a large variety of groups. We also show that, over permutation groups, the decision version and search version of Hidden Subgroup are polynomial-time equivalent. For Hidden Subgroup over dihedral groups, such an equivalence can be obtained if the order of the group is smooth. Finally, we give nonadaptive program checkers for Hidden Subgroup and its decision version.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 18:24:18 GMT" }, { "version": "v2", "created": "Fri, 17 Nov 2006 23:46:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Fenner", "S. A.", "" ], [ "Zhang", "Y.", "" ] ]
cs/0610087
Henry Jerez
Joud Khoury, Henry N Jerez, Nicolas Nehme-Antoun, Chaouki Abdallah
An Application of the Mobile Transient Internet Architecture to IP Mobility and Inter-Operability
null
null
null
null
cs.NI
null
We introduce an application of a mobile transient network architecture on top of the current Internet. This paper is an application extension to a conceptual mobile network architecture. It attempts to specifically reinforce some of the powerful notions exposed by the architecture from an application perspective. Of these notions, we explore the network expansion layer, an overlay of components and services, that enables a persistent identification network and other required services. The overlay abstraction introduces several benefits of which mobility and communication across heterogenous network structures are of interest to this paper. We present implementations of several components and protocols including gateways, Agents and the Open Device Access Protocol. Our present identification network implementation exploits the current implementation of the Handle System through the use of distributed, global and persistent identifiers called handles. Handles are used to identify and locate devices and services abstracting any physical location or network association from the communicating ends. A communication framework is finally demonstrated that would allow for mobile devices on the public Internet to have persistent identifiers and thus be persistently accessible either directly or indirectly. This application expands IP inter-operability beyond its current boundaries.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 22:12:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Khoury", "Joud", "" ], [ "Jerez", "Henry N", "" ], [ "Nehme-Antoun", "Nicolas", "" ], [ "Abdallah", "Chaouki", "" ] ]
cs/0610088
Amelia Sparavigna
A. Sparavigna and B. Montrucchio
Vector field visualization with streamlines
9 pges, 7 figures
null
null
null
cs.GR
null
We have recently developed an algorithm for vector field visualization with oriented streamlines, able to depict the flow directions everywhere in a dense vector field and the sense of the local orientations. The algorithm has useful applications in the visualization of the director field in nematic liquid crystals. Here we propose an improvement of the algorithm able to enhance the visualization of the local magnitude of the field. This new approach of the algorithm is compared with the same procedure applied to the Line Integral Convolution (LIC) visualization.
[ { "version": "v1", "created": "Sat, 14 Oct 2006 09:25:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Sparavigna", "A.", "" ], [ "Montrucchio", "B.", "" ] ]
cs/0610089
Himanshu Thapliyal
Himanshu Thapliyal and Mark Zwolinski
Reversible Logic to Cryptographic Hardware: A New Paradigm
Published in the proceedings of the The 49th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS 2006), Puerto Rico, August 2006. Nominated for the Student Paper Award
null
null
null
cs.CR
null
Differential Power Analysis (DPA) presents a major challenge to mathematically-secure cryptographic protocols. Attackers can break the encryption by measuring the energy consumed in the working digital circuit. To prevent this type of attack, this paper proposes the use of reversible logic for designing the ALU of a cryptosystem. Ideally, reversible circuits dissipate zero energy. Thus, it would be of great significance to apply reversible logic to designing secure cryptosystems. As far as is known, this is the first attempt to apply reversible logic to developing secure cryptosystems. In a prototype of a reversible ALU for a crypto-processor, reversible designs of adders and Montgomery multipliers are presented. The reversible designs of a carry propagate adder, four-to-two and five-to-two carry save adders are presented using a reversible TSG gate. One of the important properties of the TSG gate is that it can work singly as a reversible full adder. In order to design the reversible Montgomery multiplier, novel reversible sequential circuits are also proposed which are integrated with the proposed adders to design a reversible modulo multiplier. It is intended that this paper will provide a starting point for developing cryptosystems secure against DPA attacks.
[ { "version": "v1", "created": "Sat, 14 Oct 2006 10:19:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Zwolinski", "Mark", "" ] ]
cs/0610091
Pedro Miramontes
R. Mansilla, E. K\"oppen, G. Cocho and P. Miramontes
On the Behavior of Journal Impact Factor Rank-Order Distribution
Submitted to the Journal of Informetrics, redundat text cropped, bibliography corrected, new section added, typos corrected
null
null
null
cs.IR physics.soc-ph
null
An empirical law for the rank-order behavior of journal impact factors is found. Using an extensive data base on impact factors including journals on Education, Agrosciences, Geosciences, Biosciences and Environ- mental, Chemical, Computer, Engineering, Material, Mathematical, Medical and Physical Sciences we have found extremely good fits out- performing other rank-order models. Some extensions to other areas of knowledge are discussed.
[ { "version": "v1", "created": "Sat, 14 Oct 2006 17:03:46 GMT" }, { "version": "v2", "created": "Tue, 17 Oct 2006 14:10:01 GMT" }, { "version": "v3", "created": "Thu, 26 Oct 2006 17:54:29 GMT" }, { "version": "v4", "created": "Sun, 24 Dec 2006 06:03:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Mansilla", "R.", "" ], [ "Köppen", "E.", "" ], [ "Cocho", "G.", "" ], [ "Miramontes", "P.", "" ] ]
cs/0610094
Ali Mesbah
Ali Mesbah and Arie van Deursen
Migrating Multi-page Web Applications to Single-page AJAX Interfaces
null
Proceedings of the 11th European Conference on Software Maintenance and Reengineering (CSMR'07), IEEE Computer Society, 2007
null
TUD-SERG-2006-018
cs.SE
null
Recently, a new web development technique for creating interactive web applications, dubbed AJAX, has emerged. In this new model, the single-page web interface is composed of individual components which can be updated/replaced independently. With the rise of AJAX web applications classical multi-page web applications are becoming legacy systems. If until a year ago, the concern revolved around migrating legacy systems to web-based settings, today we have a new challenge of migrating web applications to single-page AJAX applications. Gaining an understanding of the navigational model and user interface structure of the source application is the first step in the migration process. In this paper, we explore how reverse engineering techniques can help analyze classic web applications for this purpose. Our approach, using a schema-based clustering technique, extracts a navigational model of web applications, and identifies candidate user interface components to be migrated to a single-page AJAX interface. Additionally, results of a case study, conducted to evaluate our tool, are presented.
[ { "version": "v1", "created": "Sun, 15 Oct 2006 07:36:19 GMT" }, { "version": "v2", "created": "Wed, 3 Jan 2007 14:17:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Mesbah", "Ali", "" ], [ "van Deursen", "Arie", "" ] ]
cs/0610095
Omer Gim\'enez Mr.
Omer Gim\'enez
Solving planning domains with polytree causal graphs is NP-complete
null
null
null
null
cs.AI cs.CC
null
We show that solving planning domains on binary variables with polytree causal graph is \NP-complete. This is in contrast to a polynomial-time algorithm of Domshlak and Brafman that solves these planning domains for polytree causal graphs of bounded indegree.
[ { "version": "v1", "created": "Mon, 16 Oct 2006 06:18:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Giménez", "Omer", "" ] ]
cs/0610096
Sandrine Blazy
Sandrine Blazy (CEDRIC)
Partial Evaluation for Program Comprehension
null
Dans ACM Computing Surveys, Symposium on partial evaluation 30, 3 es (1998)
null
null
cs.SE
null
Program comprehension is the most tedious and time consuming task of software maintenance, an important phase of the software life cycle. This is particularly true while maintaining scientific application programs that have been written in Fortran for decades and that are still vital in various domains even though more modern languages are used to implement their user interfaces. Very often, programs have evolved as their application domains increase continually and have become very complex due to extensive modifications. This generality in programs is implemented by input variables whose value does not vary in the context of a given application. Thus, it is very interesting for the maintainer to propagate such information, that is to obtain a simplified program, which behaves like the initial one when used according to the restriction. We have adapted partial evaluation for program comprehension. Our partial evaluator performs mainly two tasks: constant propagation and statements simplification. It includes an interprocedural alias analysis. As our aim is program comprehension rather than optimization, there are two main differences with classical partial evaluation. We do not change the original
[ { "version": "v1", "created": "Mon, 16 Oct 2006 09:05:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Blazy", "Sandrine", "", "CEDRIC" ] ]
cs/0610098
Joseph Y. Halpern
Joseph Y. Halpern and Yoram Moses
Characterizing Solution Concepts in Games Using Knowledge-Based Programs
To appear, IJCAI 2007
null
null
null
cs.GT cs.DC cs.MA
null
We show how solution concepts in games such as Nash equilibrium, correlated equilibrium, rationalizability, and sequential equilibrium can be given a uniform definition in terms of \emph{knowledge-based programs}. Intuitively, all solution concepts are implementations of two knowledge-based programs, one appropriate for games represented in normal form, the other for games represented in extensive form. These knowledge-based programs can be viewed as embodying rationality. The representation works even if (a) information sets do not capture an agent's knowledge, (b) uncertainty is not represented by probability, or (c) the underlying game is not common knowledge.
[ { "version": "v1", "created": "Mon, 16 Oct 2006 13:00:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Moses", "Yoram", "" ] ]
cs/0610101
Dario Tamascelli
Diego de Falco and Dario Tamascelli
Entropy generation in a model of reversible computation
13 pages, 6 figures
RAIRO-Inf.Theor.Appl. 40, (2006) 93-105
10.1051/ita:2006013
null
cs.CC quant-ph
null
We present a model in which, due to the quantum nature of the signals controlling the implementation time of successive unitary computational steps, \emph{physical} irreversibility appears in the execution of a \emph{logically} reversible computation.
[ { "version": "v1", "created": "Tue, 17 Oct 2006 08:51:43 GMT" } ]
2007-05-23T00:00:00
[ [ "de Falco", "Diego", "" ], [ "Tamascelli", "Dario", "" ] ]
cs/0610109
Mohamed El Baker Nassar
Mohamed El Baker Nassar (INRIA Lorraine - LORIA), Radu State (INRIA Lorraine - LORIA), Olivier Festor (INRIA Lorraine - LORIA)
Intrusion detection mechanisms for VoIP applications
null
Dans Third annual VoIP security workshop (VSW'06) (2006)
null
null
cs.NI
null
VoIP applications are emerging today as an important component in business and communication industry. In this paper, we address the intrusion detection and prevention in VoIP networks and describe how a conceptual solution based on the Bayes inference approach can be used to reinforce the existent security mechanisms. Our approach is based on network monitoring and analyzing of the VoIP-specific traffic. We give a detailed example on attack detection using the SIP signaling protocol.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 16:44:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Nassar", "Mohamed El Baker", "", "INRIA Lorraine - LORIA" ], [ "State", "Radu", "", "INRIA\n Lorraine - LORIA" ], [ "Festor", "Olivier", "", "INRIA Lorraine - LORIA" ] ]
cs/0610113
Juan J. Merelo Pr.
A.M. Mora, J.J. Merelo, C. Millan, J. Torrecillas, J.L.J. Laredo
CHAC. A MOACO Algorithm for Computation of Bi-Criteria Military Unit Path in the Battlefield
null
Published in Proceedings of the Workshop on Nature Inspired Cooperative Strategies for Optimization. NICSO'2006, Pelta & Krasnogor, (eds) pp 85-98, Jun. 2006
null
null
cs.MA cs.CC
null
In this paper we propose a Multi-Objective Ant Colony Optimization (MOACO) algorithm called CHAC, which has been designed to solve the problem of finding the path on a map (corresponding to a simulated battlefield) that minimizes resources while maximizing safety. CHAC has been tested with two different state transition rules: an aggregative function that combines the heuristic and pheromone information of both objectives and a second one that is based on the dominance concept of multiobjective optimization problems. These rules have been evaluated in several different situations (maps with different degree of difficulty), and we have found that they yield better results than a greedy algorithm (taken as baseline) in addition to a military behaviour that is also better in the tactical sense. The aggregative function, in general, yields better results than the one based on dominance.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 10:41:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Mora", "A. M.", "" ], [ "Merelo", "J. J.", "" ], [ "Millan", "C.", "" ], [ "Torrecillas", "J.", "" ], [ "Laredo", "J. L. J.", "" ] ]
cs/0610116
Tuomo Kakkonen
Tuomo Kakkonen
DepAnn - An Annotation Tool for Dependency Treebanks
null
Proceedings of the 11th ESSLLI Student Session at the 18th European Summer School in Logic, Language and Information (ESSLLI 2006), pp. 214-225. Malaga, Spain, 2006
null
null
cs.CL
null
DepAnn is an interactive annotation tool for dependency treebanks, providing both graphical and text-based annotation interfaces. The tool is aimed for semi-automatic creation of treebanks. It aids the manual inspection and correction of automatically created parses, making the annotation process faster and less error-prone. A novel feature of the tool is that it enables the user to view outputs from several parsers as the basis for creating the final tree to be saved to the treebank. DepAnn uses TIGER-XML, an XML-based general encoding format for both, representing the parser outputs and saving the annotated treebank. The tool includes an automatic consistency checker for sentence structures. In addition, the tool enables users to build structures manually, add comments on the annotations, modify the tagsets, and mark sentences for further revision.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 17:42:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Kakkonen", "Tuomo", "" ] ]
cs/0610117
Jeremy Avigad
Jeremy Avigad and Yimu Yin
Quantifier elimination for the reals with a predicate for the powers of two
null
null
null
null
cs.LO
null
In 1985, van den Dries showed that the theory of the reals with a predicate for the integer powers of two admits quantifier elimination in an expanded language, and is hence decidable. He gave a model-theoretic argument, which provides no apparent bounds on the complexity of a decision procedure. We provide a syntactic argument that yields a procedure that is primitive recursive, although not elementary. In particular, we show that it is possible to eliminate a single block of existential quantifiers in time $2^0_{O(n)}$, where $n$ is the length of the input formula and $2_k^x$ denotes $k$-fold iterated exponentiation.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 17:39:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Avigad", "Jeremy", "" ], [ "Yin", "Yimu", "" ] ]
cs/0610118
Tuomo Kakkonen
Tuomo Kakkonen, Niko Myller, Erkki Sutinen
Applying Part-of-Seech Enhanced LSA to Automatic Essay Grading
null
Proceedings of the 4th IEEE International Conference on Information Technology: Research and Education (ITRE 2006). Tel Aviv, Israel, 2006
null
null
cs.IR cs.CL
null
Latent Semantic Analysis (LSA) is a widely used Information Retrieval method based on "bag-of-words" assumption. However, according to general conception, syntax plays a role in representing meaning of sentences. Thus, enhancing LSA with part-of-speech (POS) information to capture the context of word occurrences appears to be theoretically feasible extension. The approach is tested empirically on a automatic essay grading system using LSA for document similarity comparisons. A comparison on several POS-enhanced LSA models is reported. Our findings show that the addition of contextual information in the form of POS tags can raise the accuracy of the LSA-based scoring models up to 10.77 per cent.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 17:50:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Kakkonen", "Tuomo", "" ], [ "Myller", "Niko", "" ], [ "Sutinen", "Erkki", "" ] ]
cs/0610119
Elad Hazan
Elad Hazan
Approximate Convex Optimization by Online Game Playing
null
null
null
null
cs.DS
null
Lagrangian relaxation and approximate optimization algorithms have received much attention in the last two decades. Typically, the running time of these methods to obtain a $\epsilon$ approximate solution is proportional to $\frac{1}{\epsilon^2}$. Recently, Bienstock and Iyengar, following Nesterov, gave an algorithm for fractional packing linear programs which runs in $\frac{1}{\epsilon}$ iterations. The latter algorithm requires to solve a convex quadratic program every iteration - an optimization subroutine which dominates the theoretical running time. We give an algorithm for convex programs with strictly convex constraints which runs in time proportional to $\frac{1}{\epsilon}$. The algorithm does NOT require to solve any quadratic program, but uses gradient steps and elementary operations only. Problems which have strictly convex constraints include maximum entropy frequency estimation, portfolio optimization with loss risk constraints, and various computational problems in signal processing. As a side product, we also obtain a simpler version of Bienstock and Iyengar's result for general linear programming, with similar running time. We derive these algorithms using a new framework for deriving convex optimization algorithms from online game playing algorithms, which may be of independent interest.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 22:10:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Hazan", "Elad", "" ] ]
cs/0610122
Philippe Langlois
Philippe Langlois (LP2A-DALI), Nicolas Louvet (LP2A-DALI)
Faithful Polynomial Evaluation with Compensated Horner Algorithm
null
null
null
null
cs.NA cs.MS
null
This paper presents two sufficient conditions to ensure a faithful evaluation of polynomial in IEEE-754 floating point arithmetic. Faithfulness means that the computed value is one of the two floating point neighbours of the exact result; it can be satisfied using a more accurate algorithm than the classic Horner scheme. One condition here provided is an apriori bound of the polynomial condition number derived from the error analysis of the compensated Horner algorithm. The second condition is both dynamic and validated to check at the running time the faithfulness of a given evaluation. Numerical experiments illustrate the behavior of these two conditions and that associated running time over-cost is really interesting.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 11:22:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Langlois", "Philippe", "", "LP2A-DALI" ], [ "Louvet", "Nicolas", "", "LP2A-DALI" ] ]
cs/0610123
Lutz Strassburger
Lutz Strassburger (INRIA Futurs)
Proof Nets and the Identity of Proofs
null
null
null
null
cs.LO
null
These are the notes for a 5-lecture-course given at ESSLLI 2006 in Malaga, Spain. The URL of the school is http://esslli2006.lcc.uma.es/ . This version slightly differs from the one which has been distributed at the school because typos have been removed and comments and suggestions by students have been worked in. The course is intended to be introductory. That means no prior knowledge of proof nets is required. However, the student should be familiar with the basics of propositional logic, and should have seen formal proofs in some formal deductive system (e.g., sequent calculus, natural deduction, resolution, tableaux, calculus of structures, Frege-Hilbert-systems, ...). It is probably helpful if the student knows already what cut elimination is, but this is not strictly necessary. In these notes, I will introduce the concept of ``proof nets'' from the viewpoint of the problem of the identity of proofs. I will proceed in a rather informal way. The focus will be more on presenting ideas than on presenting technical details. The goal of the course is to give the student an overview of the theory of proof nets and make the vast amount of literature on the topic easier accessible to the beginner. For introducing the basic concepts of the theory, I will in the first part of the course stick to the unit-free multiplicative fragment of linear logic because of its rather simple notion of proof nets. In the second part of the course we will see proof nets for more sophisticated logics. This is a basic introduction into proof nets from the perspective of the identity of proofs. We discuss how deductive proofs can be translated into proof nets and what a correctness criterion is.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 11:35:05 GMT" }, { "version": "v2", "created": "Mon, 20 Nov 2006 14:41:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Strassburger", "Lutz", "", "INRIA Futurs" ] ]
cs/0610124
Tuomo Kakkonen
Tuomo Kakkonen
Dependency Treebanks: Methods, Annotation Schemes and Tools
null
Proceedings of the 15th Nordic Conference of Computational Linguistics (NODALIDA 2005), pp. 94-104. Joensuu, Finland, 2005
null
null
cs.CL
null
In this paper, current dependencybased treebanks are introduced and analyzed. The methods used for building the resources, the annotation schemes applied, and the tools used (such as POS taggers, parsers and annotation software) are discussed.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 11:48:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Kakkonen", "Tuomo", "" ] ]
cs/0610125
Radoslaw Hofman
Radoslaw Hofman
Report on article: P=NP Linear programming formulation of the Traveling Salesman Problem
This version contain more figures, and clearer way to explain counter example idea for k dimensions
null
null
null
cs.CC cs.DM cs.DS
null
This article presents counter examples for three articles claiming that P=NP. Articles for which it applies are: Moustapha Diaby "P = NP: Linear programming formulation of the traveling salesman problem" and "Equality of complexity classes P and NP: Linear programming formulation of the quadratic assignment problem", and also Sergey Gubin "A Polynomial Time Algorithm for The Traveling Salesman Problem"
[ { "version": "v1", "created": "Fri, 20 Oct 2006 14:01:22 GMT" }, { "version": "v2", "created": "Wed, 25 Oct 2006 13:41:20 GMT" }, { "version": "v3", "created": "Thu, 26 Oct 2006 12:00:02 GMT" }, { "version": "v4", "created": "Thu, 2 Nov 2006 11:19:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hofman", "Radoslaw", "" ] ]
cs/0610126
Marcus Hutter
Marcus Hutter and Shane Legg
Fitness Uniform Optimization
25 double-column pages, 12 figures
IEEE Transactions on Evolutionary Computation, 10:5 (2006) 568-589
10.1109/TEVC.2005.863127
IDSIA-16-06
cs.NE cs.LG
null
In evolutionary algorithms, the fitness of a population increases with time by mutating and recombining individuals and by a biased selection of more fit individuals. The right selection pressure is critical in ensuring sufficient optimization progress on the one hand and in preserving genetic diversity to be able to escape from local optima on the other hand. Motivated by a universal similarity relation on the individuals, we propose a new selection scheme, which is uniform in the fitness values. It generates selection pressure toward sparsely populated fitness regions, not necessarily toward higher fitness, as is the case for all other selection schemes. We show analytically on a simple example that the new selection scheme can be much more effective than standard selection schemes. We also propose a new deletion scheme which achieves a similar result via deletion and show how such a scheme preserves genetic diversity more effectively than standard approaches. We compare the performance of the new schemes to tournament selection and random deletion on an artificial deceptive problem and a range of NP-hard problems: traveling salesman, set covering and satisfiability.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 16:37:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ], [ "Legg", "Shane", "" ] ]
cs/0610127
Serban Vlad E.
Serban E. Vlad
The intersection and the union of the asynchronous systems
The 14-th Conference on Applied and Industrial Mathematics CAIM 2006, Satellite Conference of ICM2006, Chisinau, Moldova, August 17-19, 2006
null
null
null
cs.GL
null
The asynchronous systems $f$ are the models of the asynchronous circuits from digital electrical engineering. They are multi-valued functions that associate to each input $u:\mathbf{R}\to \{0,1\}^{m}$ a set of states $x\in f(u),$ where $x:\mathbf{R}\to \{0,1\}^{n}.$ The intersection of the systems allows adding supplementary conditions in modeling and the union of the systems allows considering the validity of one of two systems in modeling, for example when testing the asynchronous circuits and the circuit is supposed to be 'good' or 'bad'. The purpose of the paper is that of analyzing the intersection and the union against the initial/final states, initial/final time, initial/final state functions, subsystems, dual systems, inverse systems, Cartesian product of systems, parallel connection and serial connection of systems.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 21:33:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0610129
Haluk Bingol
Ismail Gunes, Haluk Bingol
Community Detection in Complex Networks Using Agents
5 pages
null
null
null
cs.MA cs.CY
null
Community structure identification has been one of the most popular research areas in recent years due to its applicability to the wide scale of disciplines. To detect communities in varied topics, there have been many algorithms proposed so far. However, most of them still have some drawbacks to be addressed. In this paper, we present an agent-based based community detection algorithm. The algorithm that is a stochastic one makes use of agents by forcing them to perform biased moves in a smart way. Using the information collected by the traverses of these agents in the network, the network structure is revealed. Also, the network modularity is used for determining the number of communities. Our algorithm removes the need for prior knowledge about the network such as number of the communities or any threshold values. Furthermore, the definite community structure is provided as a result instead of giving some structures requiring further processes. Besides, the computational and time costs are optimized because of using thread like working agents. The algorithm is tested on three network data of different types and sizes named Zachary karate club, college football and political books. For all three networks, the real network structures are identified in almost every run.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 06:34:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Gunes", "Ismail", "" ], [ "Bingol", "Haluk", "" ] ]
cs/0610133
Thomas Silverston
Thomas Silverston and Olivier Fourmaux
P2P IPTV Measurement: A Comparison Study
10 pages
null
null
null
cs.NI cs.MM
null
With the success of P2P file sharing, new emerging P2P applications arise on the Internet for streaming content like voice (VoIP) or live video (IPTV). Nowadays, there are lots of works measuring P2P file sharing or P2P telephony systems, but there is still no comprehensive study about P2P IPTV, whereas it should be massively used in the future. During the last FIFA world cup, we measured network traffic generated by P2P IPTV applications like PPlive, PPstream, TVants and Sopcast. In this paper we analyze some of our results during the same games for the applications. We focus on traffic statistics and churn of peers within these P2P networks. Our objectives are threefold: we point out the traffic generated to understand the impact they will have on the network, we try to infer the mechanisms of such applications and highlight differences, and we give some insights about the users' behavior.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 13:55:28 GMT" }, { "version": "v2", "created": "Thu, 2 Nov 2006 14:23:31 GMT" }, { "version": "v3", "created": "Mon, 15 Jan 2007 13:34:09 GMT" }, { "version": "v4", "created": "Thu, 19 Apr 2007 13:45:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Silverston", "Thomas", "" ], [ "Fourmaux", "Olivier", "" ] ]
cs/0610137
Silvano Dal Zilio
Lucia Acciai (LIF), Michele Boreale, Silvano Dal Zilio (LIF)
A Concurrent Calculus with Atomic Transactions
29 pages
null
null
null
cs.LO cs.DC
null
The Software Transactional Memory (STM) model is an original approach for controlling concurrent accesses to ressources without the need for explicit lock-based synchronization mechanisms. A key feature of STM is to provide a way to group sequences of read and write actions inside atomic blocks, similar to database transactions, whose whole effect should occur atomically. In this paper, we investigate STM from a process algebra perspective and define an extension of asynchronous CCS with atomic blocks of actions. Our goal is not only to set a formal ground for reasoning on STM implementations but also to understand how this model fits with other concurrency control mechanisms. We also view this calculus as a test bed for extending process calculi with atomic transactions. This is an interesting direction for investigation since, for the most part, actual works that mix transactions with process calculi consider compensating transactions, a model that lacks all the well-known ACID properties. We show that the addition of atomic transactions results in a very expressive calculus, enough to easily encode other concurrent primitives such as guarded choice and multiset-synchronization (\`{a} la join-calculus). The correctness of our encodings is proved using a suitable notion of bisimulation equivalence. The equivalence is then applied to prove interesting ``laws of transactions'' and to obtain a simple normal form for transactions.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 08:26:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Acciai", "Lucia", "", "LIF" ], [ "Boreale", "Michele", "", "LIF" ], [ "Zilio", "Silvano Dal", "", "LIF" ] ]
cs/0610140
Leonid Makarov
Leonid Makarov and Peter Komarov
Constant for associative patterns ensemble
6 pages
null
null
null
cs.AI
null
Creation procedure of associative patterns ensemble in terms of formal logic with using neural net-work (NN) model is formulated. It is shown that the associative patterns set is created by means of unique procedure of NN work which having individual parameters of entrance stimulus transformation. It is ascer-tained that the quantity of the selected associative patterns possesses is a constant.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 16:27:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Makarov", "Leonid", "" ], [ "Komarov", "Peter", "" ] ]
cs/0610149
Anna Frid
A. Frid
Canonical decomposition of catenation of factorial languages
Submitted
null
null
null
cs.LO
null
According to a previous result by S. V. Avgustinovich and the author, each factorial language admits a unique canonical decomposition to a catenation of factorial languages. In this paper, we analyze the appearance of the canonical decomposition of a catenation of two factorial languages whose canonical decompositions are given.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 06:38:30 GMT" }, { "version": "v2", "created": "Fri, 8 Dec 2006 06:11:17 GMT" }, { "version": "v3", "created": "Wed, 31 Jan 2007 07:56:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Frid", "A.", "" ] ]
cs/0610155
Ping Li
Ping Li, Trevor J. Hastie, Kenneth W. Church
Nonlinear Estimators and Tail Bounds for Dimension Reduction in $l_1$ Using Cauchy Random Projections
null
null
null
null
cs.DS cs.IR cs.LG
null
For dimension reduction in $l_1$, the method of {\em Cauchy random projections} multiplies the original data matrix $\mathbf{A} \in\mathbb{R}^{n\times D}$ with a random matrix $\mathbf{R} \in \mathbb{R}^{D\times k}$ ($k\ll\min(n,D)$) whose entries are i.i.d. samples of the standard Cauchy C(0,1). Because of the impossibility results, one can not hope to recover the pairwise $l_1$ distances in $\mathbf{A}$ from $\mathbf{B} = \mathbf{AR} \in \mathbb{R}^{n\times k}$, using linear estimators without incurring large errors. However, nonlinear estimators are still useful for certain applications in data stream computation, information retrieval, learning, and data mining. We propose three types of nonlinear estimators: the bias-corrected sample median estimator, the bias-corrected geometric mean estimator, and the bias-corrected maximum likelihood estimator. The sample median estimator and the geometric mean estimator are asymptotically (as $k\to \infty$) equivalent but the latter is more accurate at small $k$. We derive explicit tail bounds for the geometric mean estimator and establish an analog of the Johnson-Lindenstrauss (JL) lemma for dimension reduction in $l_1$, which is weaker than the classical JL lemma for dimension reduction in $l_2$. Asymptotically, both the sample median estimator and the geometric mean estimators are about 80% efficient compared to the maximum likelihood estimator (MLE). We analyze the moments of the MLE and propose approximating the distribution of the MLE by an inverse Gaussian.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 07:08:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Ping", "" ], [ "Hastie", "Trevor J.", "" ], [ "Church", "Kenneth W.", "" ] ]
cs/0610156
Fadi Badra
Mathieu D'Aquin (INRIA Lorraine - LORIA, KMI), Fadi Badra (INRIA Lorraine - LORIA), Sandrine Lafrogne (INRIA Lorraine - LORIA), Jean Lieber (INRIA Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA), Laszlo Szathmary (INRIA Lorraine - LORIA)
Adaptation Knowledge Discovery from a Case Base
null
Proceedings of the 17th European Conference on Artificial Intelligence (ECAI-06), Trento G. Brewka (Ed.) (2006) 795--796
null
null
cs.AI
null
In case-based reasoning, the adaptation step depends in general on domain-dependent knowledge, which motivates studies on adaptation knowledge acquisition (AKA). CABAMAKA is an AKA system based on principles of knowledge discovery from databases. This system explores the variations within the case base to elicit adaptation knowledge. It has been successfully tested in an application of case-based decision support to breast cancer treatment.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 10:08:32 GMT" } ]
2007-05-23T00:00:00
[ [ "D'Aquin", "Mathieu", "", "INRIA Lorraine - LORIA, KMI" ], [ "Badra", "Fadi", "", "INRIA\n Lorraine - LORIA" ], [ "Lafrogne", "Sandrine", "", "INRIA Lorraine - LORIA" ], [ "Lieber", "Jean", "", "INRIA Lorraine - LORIA" ], [ "Napoli", "Amedeo", "", "INRIA Lorraine - LORIA" ], [ "Szathmary", "Laszlo", "", "INRIA Lorraine - LORIA" ] ]
cs/0610158
Babajide Afolabi
Babajide Afolabi (LORIA), Odile Thiery (LORIA)
Considering users' behaviours in improving the responses of an information base
null
Dans I International Conference on Multidisciplinary Information Sciences and Technologies (2006)
null
null
cs.LG cs.IR
null
In this paper, our aim is to propose a model that helps in the efficient use of an information system by users, within the organization represented by the IS, in order to resolve their decisional problems. In other words we want to aid the user within an organization in obtaining the information that corresponds to his needs (informational needs that result from his decisional problems). This type of information system is what we refer to as economic intelligence system because of its support for economic intelligence processes of the organisation. Our assumption is that every EI process begins with the identification of the decisional problem which is translated into an informational need. This need is then translated into one or many information search problems (ISP). We also assumed that an ISP is expressed in terms of the user's expectations and that these expectations determine the activities or the behaviors of the user, when he/she uses an IS. The model we are proposing is used for the conception of the IS so that the process of retrieving of solution(s) or the responses given by the system to an ISP is based on these behaviours and correspond to the needs of the user.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 16:02:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Afolabi", "Babajide", "", "LORIA" ], [ "Thiery", "Odile", "", "LORIA" ] ]
cs/0610163
Rajiv Ranjan Mr.
Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya
A Taxonomy of Peer-to-Peer Based Complex Queries: a Grid perspective
null
null
null
null
cs.NI cs.DC cs.DS
null
Grid superscheduling requires support for efficient and scalable discovery of resources. Resource discovery activities involve searching for the appropriate resource types that match the user's job requirements. To accomplish this goal, a resource discovery system that supports the desired look-up operation is mandatory. Various kinds of solutions to this problem have been suggested, including the centralised and hierarchical information server approach. However, both of these approaches have serious limitations in regards to scalability, fault-tolerance and network congestion. To overcome these limitations, organising resource information using Peer-to-Peer (P2P) network model has been proposed. Existing approaches advocate an extension to structured P2P protocols, to support the Grid resource information system (GRIS). In this paper, we identify issues related to the design of such an efficient, scalable, fault-tolerant, consistent and practical GRIS system using a P2P network model. We compile these issues into various taxonomies in sections III and IV. Further, we look into existing works that apply P2P based network protocols to GRIS. We think that this taxonomy and its mapping to relevant systems would be useful for academic and industry based researchers who are engaged in the design of scalable Grid systems.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 08:30:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Ranjan", "Rajiv", "" ], [ "Harwood", "Aaron", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0610164
Bageshri Karkare
Bageshri Karkare (Sathe) and Uday Khedker
Complexity of Data Flow Analysis for Non-Separable Frameworks
Published in the International Conference on Programming Languages and Compilers (PLC) 2006, Las Vegas, U.S.A
null
null
null
cs.PL
null
The complexity of round robin method of intraprocedural data flow analysis is measured in number of iterations over the control flow graph. Existing complexity bounds realistically explain the complexity of only Bit-vector frameworks which are separable. In this paper we define the complexity bounds for non-separable frameworks by quantifying the interdependences among the data flow information of program entities using an Entity Dependence Graph.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 08:39:04 GMT" }, { "version": "v2", "created": "Tue, 31 Oct 2006 09:09:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Karkare", "Bageshri", "", "Sathe" ], [ "Khedker", "Uday", "" ] ]
cs/0610166
Thierry Cachat
Thierry Cachat (LIAFA)
Tree Automata Make Ordinal Theory Easy
null
Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, 2006, Proceedings. FSTTCS 2006 (2006) 286-297
null
null
cs.GT
null
We give a new simple proof of the decidability of the First Order Theory of (omega^omega^i,+) and the Monadic Second Order Theory of (omega^i,<), improving the complexity in both cases. Our algorithm is based on tree automata and a new representation of (sets of) ordinals by (infinite) trees.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 11:05:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Cachat", "Thierry", "", "LIAFA" ] ]
cs/0610167
Adrian Paschke
Adrian Paschke
ECA-RuleML: An Approach combining ECA Rules with temporal interval-based KR Event/Action Logics and Transactional Update Logics
Republished in Paschke, A.: ECA-RuleML/ECA-LP: A Homogeneous Event-Condition-Action Logic Programming Language, Int. Conf. of Rule Markup Languages (RuleML'06), Athens, Georgia, USA, 2006
null
null
IBIS, TUM, Technical Report 11/05
cs.AI cs.LO cs.MA cs.SE
null
An important problem to be addressed within Event-Driven Architecture (EDA) is how to correctly and efficiently capture and process the event/action-based logic. This paper endeavors to bridge the gap between the Knowledge Representation (KR) approaches based on durable events/actions and such formalisms as event calculus, on one hand, and event-condition-action (ECA) reaction rules extending the approach of active databases that view events as instantaneous occurrences and/or sequences of events, on the other. We propose formalism based on reaction rules (ECA rules) and a novel interval-based event logic and present concrete RuleML-based syntax, semantics and implementation. We further evaluate this approach theoretically, experimentally and on an example derived from common industry use cases and illustrate its benefits.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 11:56:08 GMT" }, { "version": "v2", "created": "Fri, 10 Nov 2006 06:44:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ] ]
cs/0610168
Dele Oluwade PhD
Dele Oluwade
Presentation Theorems for Coded Character Sets
14 pages, including a page of symbols and a page containing a table
null
null
null
cs.DM
null
The notion of 'presentation', as used in combinatorial group theory, is applied to coded character sets(CCSs) - sets which facilitate the interchange of messages in a digital computer network(DCN) . By grouping each element of the set into two portions and using the idea of group presentation(whereby a group is specified by its set of generators and its set of relators), the presentation of a CCS is described. This is illustrated using the Extended Binary Coded Decimal Interchange Code(EBCDIC) which is one of the most popular CCSs in DCNs. Key words: Group presentation, coded character set, digital computer network
[ { "version": "v1", "created": "Mon, 30 Oct 2006 16:03:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Oluwade", "Dele", "" ] ]
cs/0610170
Istvan Szita
Istvan Szita and Andras Lorincz
Low-complexity modular policies: learning to play Pac-Man and a new framework beyond MDPs
23 pages
null
null
null
cs.LG cs.AI
null
In this paper we propose a method that learns to play Pac-Man. We define a set of high-level observation and action modules. Actions are temporally extended, and multiple action modules may be in effect concurrently. A decision of the agent is represented as a rule-based policy. For learning, we apply the cross-entropy method, a recent global optimization algorithm. The learned policies reached better score than the hand-crafted policy, and neared the score of average human players. We argue that learning is successful mainly because (i) the policy space includes the combination of individual actions and thus it is sufficiently rich, (ii) the search is biased towards low-complexity policies and low complexity solutions can be found quickly if they exist. Based on these principles, we formulate a new theoretical framework, which can be found in the Appendix as supporting material.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 16:44:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Szita", "Istvan", "" ], [ "Lorincz", "Andras", "" ] ]