id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0610172 | DaoShun Wang | DaoShun Wang, Feng Yi, Xiaobo Li, Ping Luo and Yiqi Dai | On the Analysis and Generalization of Extended Visual Cryptography
Schemes | null | null | null | null | cs.CR | null | An Extended Visual Cryptography Scheme (EVCS) was proposed by Ateniese et al.
[3] to protect a binary secret image with meaningful (innocent-looking) shares.
This is implemented by concatenating an extended matrix to each basis matrix.
The minimum size of the extended matrix was obtained from a hypergraph coloring
model and the scheme was designed for binary images only [3]. In this paper, we
give a more concise derivation for this matrix extension for color images.
Furthermore, we present a (k, n) scheme to protect multiple color images with
meaningful shares. This scheme is an extension of the (n, n) VCS for multiple
binary images proposed in Droste scheme [2].
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2006 03:43:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"DaoShun",
""
],
[
"Yi",
"Feng",
""
],
[
"Li",
"Xiaobo",
""
],
[
"Luo",
"Ping",
""
],
[
"Dai",
"Yiqi",
""
]
]
|
cs/0610173 | Shi Xiao | Shi Xiao and Gaoxi Xiao | On Degree-Based Decentralized Search in Complex Networks | 6 pages, 3 figs, shortly published by ECCS'06 | null | null | null | cs.PF | null | Decentralized search aims to find the target node in a large network by using
only local information. The applications of it include peer-to-peer file
sharing, web search and anything else that requires locating a specific target
in a complex system. In this paper, we examine the degree-based decentralized
search method. Specifically, we evaluate the efficiency of the method in
different cases with different amounts of available local information. In
addition, we propose a simple refinement algorithm for significantly shortening
the length of the route that has been found. Some insights useful for the
future developments of efficient decentralized search schemes have been
achieved.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2006 10:09:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Xiao",
"Shi",
""
],
[
"Xiao",
"Gaoxi",
""
]
]
|
cs/0610174 | Marko Samer | Marko Samer, Stefan Szeider | A Fixed-Parameter Algorithm for #SAT with Parameter Incidence Treewidth | 9 pages, 1 figure | null | null | null | cs.DS cs.CC cs.LO | null | We present an efficient fixed-parameter algorithm for #SAT parameterized by
the incidence treewidth, i.e., the treewidth of the bipartite graph whose
vertices are the variables and clauses of the given CNF formula; a variable and
a clause are joined by an edge if and only if the variable occurs in the
clause. Our algorithm runs in time O(4^k k l N), where k denotes the incidence
treewidth, l denotes the size of a largest clause, and N denotes the number of
nodes of the tree-decomposition.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2006 12:58:36 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Feb 2007 20:56:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Samer",
"Marko",
""
],
[
"Szeider",
"Stefan",
""
]
]
|
cs/0610175 | Florentin Smarandache | Jean Dezert, Florentin Smarandache | DSmT: A new paradigm shift for information fusion | 11 pages. Presented to Cogis06 International Conference, Paris,
France, 2006 | null | null | null | cs.AI | null | The management and combination of uncertain, imprecise, fuzzy and even
paradoxical or high conflicting sources of information has always been and
still remains of primal importance for the development of reliable information
fusion systems. In this short survey paper, we present the theory of plausible
and paradoxical reasoning, known as DSmT (Dezert-Smarandache Theory) in
literature, developed for dealing with imprecise, uncertain and potentially
highly conflicting sources of information. DSmT is a new paradigm shift for
information fusion and recent publications have shown the interest and the
potential ability of DSmT to solve fusion problems where Dempster's rule used
in Dempster-Shafer Theory (DST) provides counter-intuitive results or fails to
provide useful result at all. This paper is focused on the foundations of DSmT
and on its main rules of combination (classic, hybrid and Proportional Conflict
Redistribution rules). Shafer's model on which is based DST appears as a
particular and specific case of DSm hybrid model which can be easily handled by
DSmT as well. Several simple but illustrative examples are given throughout
this paper to show the interest and the generality of this new theory.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2006 14:50:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dezert",
"Jean",
""
],
[
"Smarandache",
"Florentin",
""
]
]
|
cs/0611005 | Alberto Pepe Mr | Alberto Pepe and Joanne Yeomans | Protocols for Scholarly Communication | 8 pages, to appear in Library and Information Systems in Astronomy V | null | null | CERN-OPEN-2006-053 | cs.DL | null | CERN, the European Organization for Nuclear Research, has operated an
institutional preprint repository for more than 10 years. The repository
contains over 850,000 records of which more than 450,000 are full-text OA
preprints, mostly in the field of particle physics, and it is integrated with
the library's holdings of books, conference proceedings, journals and other
grey literature. In order to encourage effective propagation and open access to
scholarly material, CERN is implementing a range of innovative library services
into its document repository: automatic keywording, reference extraction,
collaborative management tools and bibliometric tools. Some of these services,
such as user reviewing and automatic metadata extraction, could make up an
interesting testbed for future publishing solutions and certainly provide an
exciting environment for e-science possibilities. The future protocol for
scientific communication should naturally guide authors towards OA publication
and CERN wants to help reach a full open access publishing environment for the
particle physics community and the related sciences in the next few years.
| [
{
"version": "v1",
"created": "Wed, 1 Nov 2006 18:59:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pepe",
"Alberto",
""
],
[
"Yeomans",
"Joanne",
""
]
]
|
cs/0611006 | Julian Togelius | Julian Togelius and Simon M. Lucas | Evolving controllers for simulated car racing | Won the CEC 2005 Best Student Paper Award | Proceedings of the 2005 Congress on Evolutionary Computation,
pages 1906-1913 | null | null | cs.NE cs.LG cs.RO | null | This paper describes the evolution of controllers for racing a simulated
radio-controlled car around a track, modelled on a real physical track. Five
different controller architectures were compared, based on neural networks,
force fields and action sequences. The controllers use either egocentric (first
person), Newtonian (third person) or no information about the state of the car
(open-loop controller). The only controller that was able to evolve good racing
behaviour was based on a neural network acting on egocentric inputs.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2006 00:47:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Togelius",
"Julian",
""
],
[
"Lucas",
"Simon M.",
""
]
]
|
cs/0611008 | Radoslaw Hofman | Radoslaw Hofman | Why Linear Programming cannot solve large instances of NP-complete
problems in polynomial time | null | null | null | null | cs.CC cs.DM cs.DS cs.NA | null | This article discusses ability of Linear Programming models to be used as
solvers of NP-complete problems. Integer Linear Programming is known as
NP-complete problem, but non-integer Linear Programming problems can be solved
in polynomial time, what places them in P class. During past three years there
appeared some articles using LP to solve NP-complete problems. This methods use
large number of variables (O(n^9)) solving correctly almost all instances that
can be solved in reasonable time. Can they solve infinitively large instances?
This article gives answer to this question.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2006 08:40:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hofman",
"Radoslaw",
""
]
]
|
cs/0611013 | Osvaldo Oliveira Jr. | Osvaldo N. Oliveira Jr., Valtencir Zucolotto, Sandra M. Aluisio | Developing strategies to produce better scientific papers: a Recipe for
non-native users of English | 10 pages, 1 figure | null | null | null | cs.OH | null | In this paper we introduce the AMADEUS strategy, which has been used to
produce scientific writing tools for non-native users of English for 15 years,
and emphasize a learn-by-doing approach through which students and novice
writers can improve their scientific writing. More specifically, we provide a
9-step recipe for the students to compile writing material according to a
procedure that has proven efficient in scientific writing courses.
| [
{
"version": "v1",
"created": "Fri, 3 Nov 2006 14:07:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Oliveira",
"Osvaldo N.",
"Jr."
],
[
"Zucolotto",
"Valtencir",
""
],
[
"Aluisio",
"Sandra M.",
""
]
]
|
cs/0611014 | Rainer Luetticke | Erik Braun, Rainer Luetticke, Ingo Gloeckner, Hermann Helbig | Interactive Problem Solving in Prolog | 4 pages, 1 figure, accepted for publication: Interactive computer
aided learning (ICL) 2006, International Conference in Villach (Austria).
Paper was not published because the authors were not able to participate on
the conference | null | null | null | cs.HC cs.CY cs.PL | null | This paper presents an environment for solving Prolog problems which has been
implemented as a module for the virtual laboratory VILAB. During the problem
solving processes the learners get fast adaptive feedback. As a result
analysing the learner's actions the system suggests the use of suitable
auxiliary predicates which will also be checked for proper implementation. The
focus of the environment has been set on robustness and the integration in
VILAB.
| [
{
"version": "v1",
"created": "Fri, 3 Nov 2006 14:34:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Braun",
"Erik",
""
],
[
"Luetticke",
"Rainer",
""
],
[
"Gloeckner",
"Ingo",
""
],
[
"Helbig",
"Hermann",
""
]
]
|
cs/0611018 | Riccardo Pucella | Hubie Chen | Logic Column 17: A Rendezvous of Logic, Complexity, and Algebra | 30 pages | null | null | null | cs.LO | null | This article surveys recent advances in applying algebraic techniques to
constraint satisfaction problems.
| [
{
"version": "v1",
"created": "Fri, 3 Nov 2006 21:51:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"Hubie",
""
]
]
|
cs/0611020 | Joy Bose | J. Bose, S.B. Furber, J.L. Shapiro | An associative memory for the on-line recognition and prediction of
temporal sequences | Published in IJCNN 2005, Montreal, Canada | null | 10.1109/IJCNN.2005.1556028 | null | cs.NE cs.AI | null | This paper presents the design of an associative memory with feedback that is
capable of on-line temporal sequence learning. A framework for on-line sequence
learning has been proposed, and different sequence learning models have been
analysed according to this framework. The network model is an associative
memory with a separate store for the sequence context of a symbol. A sparse
distributed memory is used to gain scalability. The context store combines the
functionality of a neural layer with a shift register. The sensitivity of the
machine to the sequence context is controllable, resulting in different
characteristic behaviours. The model can store and predict on-line sequences of
various types and length. Numerical simulations on the model have been carried
out to determine its properties.
| [
{
"version": "v1",
"created": "Sun, 5 Nov 2006 01:15:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bose",
"J.",
""
],
[
"Furber",
"S. B.",
""
],
[
"Shapiro",
"J. L.",
""
]
]
|
cs/0611021 | Serban Vlad E. | Serban E. Vlad | Relatively inertial delays | the Eleventh Symposium of Mathematics and its Applications, November
2-5, 2006, Timisoara, Romania | null | null | null | cs.OH | null | The paper studies the relatively inertial delays that represent one of the
most important concepts in the modeling of the asynchronous circuits.
| [
{
"version": "v1",
"created": "Sun, 5 Nov 2006 08:31:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
]
|
cs/0611022 | Anurag Ganguli | Anurag Ganguli, Jorge Cortes, Francesco Bullo | Multirobot rendezvous with visibility sensors in nonconvex environments | 21 pages | null | null | null | cs.RO | null | This paper presents a coordination algorithm for mobile autonomous robots.
Relying upon distributed sensing the robots achieve rendezvous, that is, they
move to a common location. Each robot is a point mass moving in a nonconvex
environment according to an omnidirectional kinematic model. Each robot is
equipped with line-of-sight limited-range sensors, i.e., a robot can measure
the relative position of any object (robots or environment boundary) if and
only if the object is within a given distance and there are no obstacles
in-between. The algorithm is designed using the notions of robust visibility,
connectivity-preserving constraint sets, and proximity graphs. Simulations
illustrate the theoretical results on the correctness of the proposed
algorithm, and its performance in asynchronous setups and with sensor
measurement and control errors.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 02:50:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ganguli",
"Anurag",
""
],
[
"Cortes",
"Jorge",
""
],
[
"Bullo",
"Francesco",
""
]
]
|
cs/0611023 | Surender Baswana | Surender Baswana | Faster Streaming algorithms for graph spanners | 16 pages | null | null | null | cs.DS | null | Given an undirected graph $G=(V,E)$ on $n$ vertices, $m$ edges, and an
integer $t\ge 1$, a subgraph $(V,E_S)$, $E_S\subseteq E$ is called a
$t$-spanner if for any pair of vertices $u,v \in V$, the distance between them
in the subgraph is at most $t$ times the actual distance. We present streaming
algorithms for computing a $t$-spanner of essentially optimal size-stretch
trade offs for any undirected graph.
Our first algorithm is for the classical streaming model and works for
unweighted graphs only. The algorithm performs a single pass on the stream of
edges and requires $O(m)$ time to process the entire stream of edges. This
drastically improves the previous best single pass streaming algorithm for
computing a $t$-spanner which requires $\theta(mn^{\frac{2}{t}})$ time to
process the stream and computes spanner with size slightly larger than the
optimal.
Our second algorithm is for {\em StreamSort} model introduced by Aggarwal et
al. [FOCS 2004], which is the streaming model augmented with a sorting
primitive. The {\em StreamSort} model has been shown to be a more powerful and
still very realistic model than the streaming model for massive data sets
applications. Our algorithm, which works of weighted graphs as well, performs
$O(t)$ passes using $O(\log n)$ bits of working memory only.
Our both the algorithms require elementary data structures.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 03:09:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Baswana",
"Surender",
""
]
]
|
cs/0611024 | Tony Lee T. | Tony T. Lee and Tong Ye | A Relational Approach to Functional Decomposition of Logic Circuits | 29 pages, 12 figures, submitted to Discrete Applied Mathematics | null | null | null | cs.DM cs.LG | null | Functional decomposition of logic circuits has profound influence on all
quality aspects of the cost-effective implementation of modern digital systems.
In this paper, a relational approach to the decomposition of logic circuits is
proposed. This approach is parallel to the normalization of relational
databases, they are governed by the same concepts of functional dependency (FD)
and multi-valued dependency (MVD). It is manifest that the functional
decomposition of switching function actually exploits the same idea and serves
a similar purpose as database normalization. Partitions play an important role
in the decomposition. The interdependency of two partitions can be represented
by a bipartite graph. We demonstrate that both FD and MVD can be represented by
bipartite graphs with specific topological properties, which are delineated by
partitions of minterms. It follows that our algorithms are procedures of
constructing those specific bipartite graphs of interest to meet the
information-lossless criteria of functional decomposition.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 08:43:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lee",
"Tony T.",
""
],
[
"Ye",
"Tong",
""
]
]
|
cs/0611025 | Javier Larrosa | Javier Larrosa, Federico Heras, Simon de Givry | A Logical Approach to Efficient Max-SAT solving | null | null | null | null | cs.AI cs.LO | null | Weighted Max-SAT is the optimization version of SAT and many important
problems can be naturally encoded as such. Solving weighted Max-SAT is an
important problem from both a theoretical and a practical point of view. In
recent years, there has been considerable interest in finding efficient solving
techniques. Most of this work focus on the computation of good quality lower
bounds to be used within a branch and bound DPLL-like algorithm. Most often,
these lower bounds are described in a procedural way. Because of that, it is
difficult to realize the {\em logic} that is behind.
In this paper we introduce an original framework for Max-SAT that stresses
the parallelism with classical SAT. Then, we extend the two basic SAT solving
techniques: {\em search} and {\em inference}. We show that many algorithmic
{\em tricks} used in state-of-the-art Max-SAT solvers are easily expressable in
{\em logic} terms with our framework in a unified manner.
Besides, we introduce an original search algorithm that performs a restricted
amount of {\em weighted resolution} at each visited node. We empirically
compare our algorithm with a variety of solving alternatives on several
benchmarks. Our experiments, which constitute to the best of our knowledge the
most comprehensive Max-sat evaluation ever reported, show that our algorithm is
generally orders of magnitude faster than any competitor.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 12:39:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Larrosa",
"Javier",
""
],
[
"Heras",
"Federico",
""
],
[
"de Givry",
"Simon",
""
]
]
|
cs/0611026 | Susanne Salmon-Alt | Susanne Salmon-Alt (ATILF), Laurent Romary (INRIA Lorraine - LORIA),
Jean-Marie Pierrel (ATILF) | Un mod\`ele g\'en\'erique d'organisation de corpus en ligne: application
\`a la FReeBank | null | Traitement Automatique des Langues (TAL) 45 (2006) 145-169 | null | null | cs.CL | null | The few available French resources for evaluating linguistic models or
algorithms on other linguistic levels than morpho-syntax are either
insufficient from quantitative as well as qualitative point of view or not
freely accessible. Based on this fact, the FREEBANK project intends to create
French corpora constructed using manually revised output from a hybrid
Constraint Grammar parser and annotated on several linguistic levels
(structure, morpho-syntax, syntax, coreference), with the objective to make
them available on-line for research purposes. Therefore, we will focus on using
standard annotation schemes, integration of existing resources and maintenance
allowing for continuous enrichment of the annotations. Prior to the actual
presentation of the prototype that has been implemented, this paper describes a
generic model for the organization and deployment of a linguistic resource
archive, in compliance with the various works currently conducted within
international standardization initiatives (TEI and ISO/TC 37/SC 4).
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 14:37:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Salmon-Alt",
"Susanne",
"",
"ATILF"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
],
[
"Pierrel",
"Jean-Marie",
"",
"ATILF"
]
]
|
cs/0611031 | Scot Anderson | Scot Anderson, Peter Revesz | Efficient Threshold Aggregation of Moving Objects | Technical report on spatiotemporal aggregation prior to journal
submission | null | null | null | cs.DB | null | Calculating aggregation operators of moving point objects, using time as a
continuous variable, presents unique problems when querying for congestion in a
moving and changing (or dynamic) query space. We present a set of congestion
query operators, based on a threshold value, that estimate the following 5
aggregation operations in d-dimensions. 1) We call the count of point objects
that intersect the dynamic query space during the query time interval, the
CountRange. 2) We call the Maximum (or Minimum) congestion in the dynamic query
space at any time during the query time interval, the MaxCount (or MinCount).
3) We call the sum of time that the dynamic query space is congested, the
ThresholdSum. 4) We call the number of times that the dynamic query space is
congested, the ThresholdCount. And 5) we call the average length of time of all
the time intervals when the dynamic query space is congested, the
ThresholdAverage. These operators rely on a novel approach to transforming the
problem of selection based on position to a problem of selection based on a
threshold. These operators can be used to predict concentrations of migrating
birds that may carry disease such as Bird Flu and hence the information may be
used to predict high risk areas. On a smaller scale, those operators are also
applicable to maintaining safety in airplane operations. We present the theory
of our estimation operators and provide algorithms for exact operators. The
implementations of those operators, and experiments, which include data from
more than 7500 queries, indicate that our estimation operators produce fast,
efficient results with error under 5%.
| [
{
"version": "v1",
"created": "Tue, 7 Nov 2006 18:23:34 GMT"
},
{
"version": "v2",
"created": "Tue, 1 May 2007 19:19:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Anderson",
"Scot",
""
],
[
"Revesz",
"Peter",
""
]
]
|
cs/0611033 | Maria Naya Plasencia | Maria Naya Plasencia (INRIA Rocquencourt) | Cryptanalyse de Achterbahn-128/80 | null | null | null | null | cs.CR | null | This paper presents two attacks against Achterbahn-128/80, the last version
of one of the stream cipher proposals in the eSTREAM project. The attack
against the 80-bit variant, Achterbahn-80, has complexity 2^{56.32}. The attack
against Achterbahn-128 requires 2^{75.4} operations and 2^{61} keystream bits.
These attacks are based on an improvement of the attack due to Hell and
Johansson against Achterbahn version 2 and also on an algorithm that makes
profit of the short lengths of the constituent registers.
*****
Ce papier pr\'{e}sente deux attaques sur Achterbahn-128/80, la derni\`{e}re
version d'un des algorithmes propos\'{e}s dans le cadre de eSTREAM. L'attaque
sur la version de 80 bits, Achterbahn-80, est en 2^{56.32}. L'attaque sur
Achterbahn-128 a besoin de 2^{75.4} calculs et 2^{61} bits de suite chiffrante.
Ces attaques sont bas\'{e}es sur une am\'{e}lioration de l'attaque propos\'{e}e
par Hell et Johansson sur la version 2 d'Achterbahn et aussi sur un algorithme
qui tire profit des petites longueurs des registres.
| [
{
"version": "v1",
"created": "Wed, 8 Nov 2006 07:48:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Plasencia",
"Maria Naya",
"",
"INRIA Rocquencourt"
]
]
|
cs/0611035 | Claudio Bettini | Claudio Bettini, X. Sean Wang, Sushil Jajodia | The Role of Quasi-identifiers in k-Anonymity Revisited | 17 pages. Submitted for publication | null | null | RT-11-06 | cs.DB cs.CR | null | The concept of k-anonymity, used in the recent literature to formally
evaluate the privacy preservation of published tables, was introduced based on
the notion of quasi-identifiers (or QI for short). The process of obtaining
k-anonymity for a given private table is first to recognize the QIs in the
table, and then to anonymize the QI values, the latter being called
k-anonymization. While k-anonymization is usually rigorously validated by the
authors, the definition of QI remains mostly informal, and different authors
seem to have different interpretations of the concept of QI. The purpose of
this paper is to provide a formal underpinning of QI and examine the
correctness and incorrectness of various interpretations of QI in our formal
framework. We observe that in cases where the concept has been used correctly,
its application has been conservative; this note provides a formal
understanding of the conservative nature in such cases.
| [
{
"version": "v1",
"created": "Wed, 8 Nov 2006 15:03:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bettini",
"Claudio",
""
],
[
"Wang",
"X. Sean",
""
],
[
"Jajodia",
"Sushil",
""
]
]
|
cs/0611036 | Annie Bouyer | Anne Durand (CRAI), Pierre Drap (CRAI), Elise Meyer (CRAI), Pierre
Grussenmeyer (CRAI), Jean-Pierre Perrin (CRAI) | Intra-site Level Cultural Heritage Documentation: Combination of Survey,
Modeling and Imagery Data in a Web Information System | null | null | null | null | cs.DL | null | Cultural heritage documentation induces the use of computerized techniques to
manage and preserve the information produced. Geographical information systems
have proved their potentialities in this scope, but they are not always adapted
for the management of features at the scale of a particular archaeological
site. Moreover, computer applications in archaeology are often technology
driven and software constrained. Thus, we propose a tool that tries to avoid
these difficulties. We are developing an information system that works over the
Internet and that is joined with a web site. Aims are to assist the work of
archaeological sites managers and to be a documentation tool about these sites,
dedicated to everyone. We devote therefore our system both to the professionals
who are in charge of the site, and to the general public who visits it or who
wants to have information on it. The system permits to do exploratory analyses
of the data, especially at spatial and temporal levels. We propose to record
metadata about the archaeological features in XML and to access these features
through interactive 2D and 3D representations, and through queries systems
(keywords and images). The 2D images, photos, or vectors are generated in SVG,
while 3D models are generated in X3D. Archaeological features are also
automatically integrated in a MySQL database. The web site is an exchange
platform with the information system and is written in PHP. Our first
application case is the medieval castle of Vianden, Luxembourg.
| [
{
"version": "v1",
"created": "Wed, 8 Nov 2006 17:35:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Durand",
"Anne",
"",
"CRAI"
],
[
"Drap",
"Pierre",
"",
"CRAI"
],
[
"Meyer",
"Elise",
"",
"CRAI"
],
[
"Grussenmeyer",
"Pierre",
"",
"CRAI"
],
[
"Perrin",
"Jean-Pierre",
"",
"CRAI"
]
]
|
cs/0611039 | Maurice Margenstern | Maurice Margenstern, Guentcho Skordev | Substitutions for tilings $\{p,q\}$ | null | null | null | 2005-102 (Publications du LITA, local research reports) | cs.CG cs.DM | null | In this paper we consider tiling $\{p, q \}$ of the Euclidean space and of
the hyperbolic space, and its dual graph $\Gamma_{q, p}$ from a combinatorial
point of view. A substitution $\sigma_{q, p}$ on an appropriate finite alphabet
is constructed. The homogeneity of graph $\Gamma_{q, p}$ and its generation
function are the basic tools for the construction. The tree associated with
substitution $\sigma_{q, p}$ is a spanning tree of graph $\Gamma_{q, p}$. Let
$u_n$ be the number of tiles of tiling $\{p, q \}$ of generation $n$. The
characteristic polynomial of the transition matrix of substitution $\sigma_{q,
p}$ is a characteristic polynomial of a linear recurrence. The sequence
$(u_n)_{n \geq 0}$ is a solution of this recurrence. The growth of sequence
$(u_n)_{n \geq 0}$ is given by the dominant root of the characteristic
polynomial.
| [
{
"version": "v1",
"created": "Thu, 9 Nov 2006 07:53:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Margenstern",
"Maurice",
""
],
[
"Skordev",
"Guentcho",
""
]
]
|
cs/0611041 | Vladimir P. Gerdt | V. P. Gerdt | Groebner Bases Applied to Systems of Linear Difference Equations | 10 pages, Particles and Nuclei, Letters, to appear | null | null | null | cs.SC | null | In this paper we consider systems of partial (multidimensional) linear
difference equations. Specifically, such systems arise in scientific computing
under discretization of linear partial differential equations and in
computational high energy physics as recurrence relations for multiloop Feynman
integrals. The most universal algorithmic tool for investigation of linear
difference systems is based on their transformation into an equivalent Groebner
basis form. We present an algorithm for this transformation implemented in
Maple. The algorithm and its implementation can be applied to automatic
generation of difference schemes for linear partial differential equations and
to reduction of Feynman integrals. Some illustrative examples are given.
| [
{
"version": "v1",
"created": "Thu, 9 Nov 2006 10:41:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gerdt",
"V. P.",
""
]
]
|
cs/0611042 | Vita Hinze-Hoare | Vita Hinze-Hoare | CSCR:Computer Supported Collaborative Research | 3 Pages, 2 figures | null | null | null | cs.HC cs.LG | null | It is suggested that a new area of CSCR (Computer Supported Collaborative
Research) is distinguished from CSCW and CSCL and that the demarcation between
the three areas could do with greater clarification and prescription.
| [
{
"version": "v1",
"created": "Thu, 9 Nov 2006 21:10:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
]
|
cs/0611044 | Vladimir Migunov | Vladimir V. Migunov, Rustem R. Kafiyatullov | Protection of the information in a complex CAD system of renovation of
industrial firms | 6 pages, 2 figures, in Russian | null | null | null | cs.CE | null | The threats to security of the information originating owing to involuntary
operations of the users of a CAD, and methods of its protection implemented in
a complex CAD system of renovation of firms are considered: rollback, autosave,
automatic backup copying and electronic subscript. The specificity of a complex
CAD is reflected in necessity of rollback and autosave both of the draw and the
parametric representations of its parts, which are the information models of
the problem-oriented extensions of the CAD
| [
{
"version": "v1",
"created": "Fri, 10 Nov 2006 07:43:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
],
[
"Kafiyatullov",
"Rustem R.",
""
]
]
|
cs/0611045 | Vladimir Migunov | Vladimir V. Migunov | The evolution of the parametric models of drawings (modules) in the
enterprises reconstruction CAD system | 8 pages, no figures, in Russian | null | null | null | cs.CE | null | Progressing methods of drawings creating automation is discussed on the basis
of so-called modules containing parametric representation of a part of the
drawing and the geometrical elements. The stages of evolution of modular
technology of automation of engineering are describing alternatives of applying
of moduluss for simple association of elements of the drawing without
parametric representation with an opportunity of its commenting, for graphic
symbols creating in the schemas of automation and drawings of pipelines, for
storage of the specific properties of elements, for development of the
specialized parts of the project: the axonometric schemas, profiles of outboard
pipe networks etc.
| [
{
"version": "v1",
"created": "Fri, 10 Nov 2006 07:56:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
]
|
cs/0611046 | Gian Luca Pozzato | Laura Giordano, Valentina Gliozzi, Nicola Olivetti, and Gian Luca
Pozzato | Analytic Tableaux Calculi for KLM Logics of Nonmonotonic Reasoning | 54 pages + appendix with proofs | null | null | null | cs.LO cs.AI | null | We present tableau calculi for some logics of nonmonotonic reasoning, as
defined by Kraus, Lehmann and Magidor. We give a tableau proof procedure for
all KLM logics, namely preferential, loop-cumulative, cumulative and rational
logics. Our calculi are obtained by introducing suitable modalities to
interpret conditional assertions. We provide a decision procedure for the
logics considered, and we study their complexity.
| [
{
"version": "v1",
"created": "Fri, 10 Nov 2006 16:49:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Giordano",
"Laura",
""
],
[
"Gliozzi",
"Valentina",
""
],
[
"Olivetti",
"Nicola",
""
],
[
"Pozzato",
"Gian Luca",
""
]
]
|
cs/0611047 | Adrian Paschke | Adrian Paschke | The Reaction RuleML Classification of the Event / Action / State
Processing and Reasoning Space | The Reaction RuleML Classification of the Event / Action / State
Processing and Reasoning Space extracted from Paschke, A.: ECA-RuleML: An
Approach combining ECA Rules with temporal interval-based KR Event/Action
Logics and Transactional Update Logics, Internet-based Information Systems,
Technical University Munich, Technical Report 11 / 2005 | null | null | Paschke, A.: The Reaction RuleML Classification of the Event /
Action / State Processing and Reasoning Space, White Paper, October, 2006 | cs.AI | null | Reaction RuleML is a general, practical, compact and user-friendly
XML-serialized language for the family of reaction rules. In this white paper
we give a review of the history of event / action /state processing and
reaction rule approaches and systems in different domains, define basic
concepts and give a classification of the event, action, state processing and
reasoning space as well as a discussion of relevant / related work
| [
{
"version": "v1",
"created": "Fri, 10 Nov 2006 22:03:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
]
|
cs/0611049 | Argyn Kuketayev | Argyn Kuketayev | On numerical stability of recursive present value computation method | 6 pages, 2 tables | null | null | null | cs.CE cs.NA | null | We analyze numerical stability of a recursive computation scheme of present
value (PV) amd show that the absolute error increases exponentially for
positive discount rates. We show that reversing the direction of calculations
in the recurrence equation yields a robust PV computation routine.
| [
{
"version": "v1",
"created": "Mon, 13 Nov 2006 20:37:42 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Feb 2007 02:06:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kuketayev",
"Argyn",
""
]
]
|
cs/0611050 | Hans-Rudolf Thomann | Hans-Rudolf Thomann | HowTo Authenticate and Encrypt | null | null | null | null | cs.CR | null | Recently, various side-channel attacks on widely used encryption methods have
been discovered. Extensive research is currently undertaken to develop new
types of combined encryption and authentication mechanisms. Developers of
security systems ask whether to implement methods recommended by international
standards or to choose one of the new proposals. We explain the nature of the
attacks and how they can be avoided, and recommend a sound, provably secure
solution: the CCM standard.
| [
{
"version": "v1",
"created": "Mon, 13 Nov 2006 13:40:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thomann",
"Hans-Rudolf",
""
]
]
|
cs/0611052 | Federico Ricci-Tersenghi | Dimitris Achlioptas and Federico Ricci-Tersenghi | On the Solution-Space Geometry of Random Constraint Satisfaction
Problems | 25 pages, work presented at STOC'06 | null | null | null | cs.CC cond-mat.dis-nn | null | For a large number of random constraint satisfaction problems, such as random
k-SAT and random graph and hypergraph coloring, there are very good estimates
of the largest constraint density for which solutions exist. Yet, all known
polynomial-time algorithms for these problems fail to find solutions even at
much lower densities. To understand the origin of this gap we study how the
structure of the space of solutions evolves in such problems as constraints are
added. In particular, we prove that much before solutions disappear, they
organize into an exponential number of clusters, each of which is relatively
small and far apart from all other clusters. Moreover, inside each cluster most
variables are frozen, i.e., take only one value. The existence of such frozen
variables gives a satisfying intuitive explanation for the failure of the
polynomial-time algorithms analyzed so far. At the same time, our results
establish rigorously one of the two main hypotheses underlying Survey
Propagation, a heuristic introduced by physicists in recent years that appears
to perform extraordinarily well on random constraint satisfaction problems.
| [
{
"version": "v1",
"created": "Mon, 13 Nov 2006 11:09:49 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Dec 2006 11:47:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Achlioptas",
"Dimitris",
""
],
[
"Ricci-Tersenghi",
"Federico",
""
]
]
|
cs/0611055 | Alexandre Courbot | Christophe Rippert (INRIA Futurs), Alexandre Courbot (INRIA Futurs),
Gilles Grimaud (INRIA Futurs, LIFL) | A Low-Footprint Class Loading Mechanism for Embedded Java Virtual
Machines | null | Dans 3rd ACM International Conference on the Principles and
Practice of Programming in Java (2004) | null | null | cs.OS | null | This paper shows that it is possible to dramatically reduce the memory
consumption of classes loaded in an embedded Java virtual machine without
reducing its functionalities. We describe how to pack the constant pool by
deleting entries which are only used during the class loading process. We
present some benchmarks which demonstrate the efficiency of this mechanism. We
finally suggest some additional optimizations which can be applied if some
restrictions to the functionalities of the virtual machine can be tolerated.
| [
{
"version": "v1",
"created": "Tue, 14 Nov 2006 10:11:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rippert",
"Christophe",
"",
"INRIA Futurs"
],
[
"Courbot",
"Alexandre",
"",
"INRIA Futurs"
],
[
"Grimaud",
"Gilles",
"",
"INRIA Futurs, LIFL"
]
]
|
cs/0611057 | Laurent Thery | Laurent Thery (INRIA Sophia Antipolis) | Formalising Sylow's theorems in Coq | null | null | null | null | cs.LO | null | This report presents a formalisation of Sylow's theorems done in {\sc Coq}.
The formalisation has been done in a couple of weeks on top of Georges
Gonthier's {\sc ssreflect} \cite{ssreflect}. There were two ideas behind
formalising Sylow's theorems. The first one was to get familiar with Georges
way of doing proofs. The second one was to contribute to the collective effort
to formalise a large subset of group theory in {\sc Coq} with some non-trivial
proofs.}
| [
{
"version": "v1",
"created": "Tue, 14 Nov 2006 12:58:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thery",
"Laurent",
"",
"INRIA Sophia Antipolis"
]
]
|
cs/0611060 | Henk Moed | Henk F. Moed | The effect of 'Open Access' upon citation impact: An analysis of ArXiv's
Condensed Matter Section | Version 13 November 2006. 16 pages, 6 figures, 2 tables | null | null | null | cs.DL cs.IR physics.soc-ph | null | This article statistically analyses how the citation impact of articles
deposited in the Condensed Matter section of the preprint server ArXiv (hosted
by Cornell University), and subsequently published in a scientific journal,
compares to that of articles in the same journal that were not deposited in
that archive. Its principal aim is to further illustrate and roughly estimate
the effect of two factors, 'early view' and 'quality bias', upon differences in
citation impact between these two sets of papers, using citation data from
Thomson Scientific's Web of Science. It presents estimates for a number of
journals in the field of condensed matter physics. In order to discriminate
between an 'open access' effect and an early view effect, longitudinal citation
data was analysed covering a time period as long as 7 years. Quality bias was
measured by calculating ArXiv citation impact differentials at the level of
individual authors publishing in a journal, taking into account co-authorship.
The analysis provided evidence of a strong quality bias and early view effect.
Correcting for these effects, there is in a sample of 6 condensed matter
physics journals studied in detail, no sign of a general 'open access
advantage' of papers deposited in ArXiv. The study does provide evidence that
ArXiv accelerates citation, due to the fact that that ArXiv makes papers
earlier available rather than that it makes papers freely available.
| [
{
"version": "v1",
"created": "Tue, 14 Nov 2006 14:48:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Moed",
"Henk F.",
""
]
]
|
cs/0611061 | Jan Dash | Jan W. Dash | Multivariate Integral Perturbation Techniques - I (Theory) | 25 pages, 2 figures | null | null | null | cs.CE cs.NA | null | We present a quasi-analytic perturbation expansion for multivariate
N-dimensional Gaussian integrals. The perturbation expansion is an infinite
series of lower-dimensional integrals (one-dimensional in the simplest
approximation). This perturbative idea can also be applied to multivariate
Student-t integrals. We evaluate the perturbation expansion explicitly through
2nd order, and discuss the convergence, including enhancement using Pade
approximants. Brief comments on potential applications in finance are given,
including options, models for credit risk and derivatives, and correlation
sensitivities.
| [
{
"version": "v1",
"created": "Tue, 14 Nov 2006 16:58:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dash",
"Jan W.",
""
]
]
|
cs/0611062 | Cas Cremers | Suzana Andova, Cas Cremers, Kristian Gjosteen, Sjouke Mauw, Stig F.
Mjolsnes, Sasa Radomirovic | A framework for compositional verification of security protocols | null | null | null | null | cs.CR | null | Automatic security protocol analysis is currently feasible only for small
protocols. Since larger protocols quite often are composed of many small
protocols, compositional analysis is an attractive, but non-trivial approach.
We have developed a framework for compositional analysis of a large class of
security protocols. The framework is intended to facilitate automatic as well
as manual verification of large structured security protocols. Our approach is
to verify properties of component protocols in a multi-protocol environment,
then deduce properties about the composed protocol. To reduce the complexity of
multi-protocol verification, we introduce a notion of protocol independence and
prove a number of theorems that enable analysis of independent component
protocols in isolation.
To illustrate the applicability of our framework to real-world protocols, we
study a key establishment sequence in WiMax consisting of three subprotocols.
Except for a small amount of trivial reasoning, the analysis is done using
automatic tools.
| [
{
"version": "v1",
"created": "Tue, 14 Nov 2006 18:49:08 GMT"
},
{
"version": "v2",
"created": "Tue, 1 May 2007 10:36:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Andova",
"Suzana",
""
],
[
"Cremers",
"Cas",
""
],
[
"Gjosteen",
"Kristian",
""
],
[
"Mauw",
"Sjouke",
""
],
[
"Mjolsnes",
"Stig F.",
""
],
[
"Radomirovic",
"Sasa",
""
]
]
|
cs/0611063 | Anuj Kumar | Garud Iyengar and Anuj Kumar | Characterizing Optimal Adword Auctions | 29 pages, work was presented at a) Second Workshop on Sponsored
Search Auctions, Ann Arbor, MI b) INFORMS Annual Meeting, Pittsburgh c)
Decision Sciences Seminar, Fuqua School of Business, Duke University | null | null | CORC Technical Report TR-2006-04 at Computational Optimization
Research Center at Columbia University | cs.GT | null | We present a number of models for the adword auctions used for pricing
advertising slots on search engines such as Google, Yahoo! etc. We begin with a
general problem formulation which allows the privately known valuation per
click to be a function of both the identity of the advertiser and the slot. We
present a compact characterization of the set of all deterministic incentive
compatible direct mechanisms for this model. This new characterization allows
us to conclude that there are incentive compatible mechanisms for this auction
with a multi-dimensional type-space that are {\em not} affine maximizers. Next,
we discuss two interesting special cases: slot independent valuation and slot
independent valuation up to a privately known slot and zero thereafter. For
both of these special cases, we characterize revenue maximizing and efficiency
maximizing mechanisms and show that these mechanisms can be computed with a
worst case computational complexity $O(n^2m^2)$ and $O(n^2m^3)$ respectively,
where $n$ is number of bidders and $m$ is number of slots. Next, we
characterize optimal rank based allocation rules and propose a new mechanism
that we call the customized rank based allocation. We report the results of a
numerical study that compare the revenue and efficiency of the proposed
mechanisms. The numerical results suggest that customized rank-based allocation
rule is significantly superior to the rank-based allocation rules.
| [
{
"version": "v1",
"created": "Wed, 15 Nov 2006 19:09:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Iyengar",
"Garud",
""
],
[
"Kumar",
"Anuj",
""
]
]
|
cs/0611064 | Sujay Sanghavi | Sujay Sanghavi, Loc Bui, R. Srikant | Distributed Link Scheduling with Constant Overhead | null | null | null | null | cs.NI cs.PF | null | This paper proposes a new class of simple, distributed algorithms for
scheduling in wireless networks. The algorithms generate new schedules in a
distributed manner via simple local changes to existing schedules. The class is
parameterized by integers $k\geq 1$. We show that algorithm $k$ of our class
achieves $k/(k+2)$ of the capacity region, for every $k\geq 1$. The algorithms
have small and constant worst-case overheads: in particular, algorithm $k$
generates a new schedule using {\em (a)} time less than $4k+2$ round-trip times
between neighboring nodes in the network, and {\em (b)} at most three control
transmissions by any given node, for any $k$. The control signals are
explicitly specified, and face the same interference effects as normal data
transmissions. Our class of distributed wireless scheduling algorithms are the
first ones guaranteed to achieve any fixed fraction of the capacity region
while using small and constant overheads that do not scale with network size.
The parameter $k$ explicitly captures the tradeoff between control overhead and
scheduler throughput performance and provides a tuning knob protocol designers
can use to harness this trade-off in practice.
| [
{
"version": "v1",
"created": "Tue, 14 Nov 2006 22:58:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sanghavi",
"Sujay",
""
],
[
"Bui",
"Loc",
""
],
[
"Srikant",
"R.",
""
]
]
|
cs/0611066 | Andrea Pasquinucci | Andrea Pasquinucci | A modular eballot system - V0.6 | 15 pages | null | null | null | cs.CR | null | We consider a reasonably simple voting system which can be implemented for
web-based ballots. Simplicity, modularity and the requirement of compatibility
with current web browsers leads to a system which satisfies a set of security
requirements for a ballot system which is not complete but sufficient in many
cases. Due to weak-eligibility and vote-selling, this system cannot be used for
political or similar ballots.
| [
{
"version": "v1",
"created": "Wed, 15 Nov 2006 09:33:58 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Dec 2006 16:29:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pasquinucci",
"Andrea",
""
]
]
|
cs/0611067 | Andrea Pasquinucci | Andrea Pasquinucci | Implementing the modular eballot system V0.6 | 9 pages | null | null | null | cs.CR | null | We describe a practical implementation of the modular eballot system proposed
in ref.[1]
| [
{
"version": "v1",
"created": "Wed, 15 Nov 2006 09:57:10 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Dec 2006 16:33:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pasquinucci",
"Andrea",
""
]
]
|
cs/0611068 | Sander Spek | Sander Spek, Eric Postma and H. Jaap van den Herik | Wikipedia: organisation from a bottom-up approach | Presented on the Research in Wikipedia workshop, of the WikiSym 2006 | null | null | null | cs.DL cs.CY | null | Wikipedia can be considered as an extreme form of a self-managing team, as a
means of labour division. One could expect that this bottom-up approach, with
the absense of top-down organisational control, would lead to a chaos, but our
analysis shows that this is not the case. In the Dutch Wikipedia, an integrated
and coherent data structure is created, while at the same time users succeed in
distributing roles by self-selection. Some users focus on an area of expertise,
while others edit over the whole encyclopedic range. This constitutes our
conclusion that Wikipedia, in general, is a successful example of a
self-managing team.
| [
{
"version": "v1",
"created": "Wed, 15 Nov 2006 10:27:09 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Dec 2006 10:38:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Spek",
"Sander",
""
],
[
"Postma",
"Eric",
""
],
[
"Herik",
"H. Jaap van den",
""
]
]
|
cs/0611069 | Guillaume Pitel | Guillaume Pitel (INRIA Lorraine - LORIA) | Scaling Construction Grammar up to Production Systems: the SCIM | null | Dans Scalable Natural Language Understanding 2006 (2006) | null | null | cs.CL | null | While a great effort has concerned the development of fully integrated
modular understanding systems, few researches have focused on the problem of
unifying existing linguistic formalisms with cognitive processing models. The
Situated Constructional Interpretation Model is one of these attempts. In this
model, the notion of "construction" has been adapted in order to be able to
mimic the behavior of Production Systems. The Construction Grammar approach
establishes a model of the relations between linguistic forms and meaning, by
the mean of constructions. The latter can be considered as pairings from a
topologically structured space to an unstructured space, in some way a special
kind of production rules.
| [
{
"version": "v1",
"created": "Wed, 15 Nov 2006 12:35:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pitel",
"Guillaume",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0611071 | Ramya Ravichandar | Ramya Ravichandar, James D. Arthur, Shawn A. Bohner | Capabilities Engineering: Constructing Change-Tolerant Systems | 10 pages, 4 Figures, To Appear in Hawaii International Conference on
System Sciences 2007 | null | null | null | cs.SE | null | We propose a Capabilities-based approach for building long-lived, complex
systems that have lengthy development cycles. User needs and technology evolve
during these extended development periods, and thereby, inhibit a fixed
requirements-oriented solution specification. In effect, for complex emergent
systems, the traditional approach of baselining requirements results in an
unsatisfactory system. Therefore, we present an alternative approach,
Capabilities Engineering, which mathematically exploits the structural
semantics of the Function Decomposition graph - a representation of user needs
- to formulate Capabilities. For any given software system, the set of derived
Capabilities embodies change-tolerant characteristics. More specifically, each
individual Capability is a functional abstraction constructed to be highly
cohesive and to be minimally coupled with its neighbors. Moreover, the
Capability set is chosen to accommodate an incremental development approach,
and to reflect the constraints of technology feasibility and implementation
schedules. We discuss our validation activities to empirically prove that the
Capabilities-based approach results in change-tolerant systems.
| [
{
"version": "v1",
"created": "Wed, 15 Nov 2006 17:12:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ravichandar",
"Ramya",
""
],
[
"Arthur",
"James D.",
""
],
[
"Bohner",
"Shawn A.",
""
]
]
|
cs/0611074 | Moustapha Diaby | Moustapha Diaby | On "P = NP: Linear Programming Formulation of the Traveling Salesman
Problem": A reply to Hofman's Claim of a "Counter-Example" | 7 pages; 5 figures | null | null | null | cs.CC cs.DM | null | We show that Hofman's claim of a "counter-example" to Diaby's LP formulation
of the TSP is invalid.
| [
{
"version": "v1",
"created": "Thu, 16 Nov 2006 03:16:04 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Nov 2006 22:33:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Diaby",
"Moustapha",
""
]
]
|
cs/0611077 | Mark Burgin | Mark Burgin and Eugene Eberbach | Evolutionary Optimization in an Algorithmic Setting | null | null | null | null | cs.NE cs.AI | null | Evolutionary processes proved very useful for solving optimization problems.
In this work, we build a formalization of the notion of cooperation and
competition of multiple systems working toward a common optimization goal of
the population using evolutionary computation techniques. It is justified that
evolutionary algorithms are more expressive than conventional recursive
algorithms. Three subclasses of evolutionary algorithms are proposed here:
bounded finite, unbounded finite and infinite types. Some results on
completeness, optimality and search decidability for the above classes are
presented. A natural extension of Evolutionary Turing Machine model developed
in this paper allows one to mathematically represent and study properties of
cooperation and competition in a population of optimized species.
| [
{
"version": "v1",
"created": "Thu, 16 Nov 2006 03:27:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burgin",
"Mark",
""
],
[
"Eberbach",
"Eugene",
""
]
]
|
cs/0611078 | Francoise Simonot-Lion | Fran\c{c}oise Simonot-Lion (INRIA Lorraine - LORIA), Fran\c{c}ois
Simonot (IECN), Ye-Qiong Song (INRIA Lorraine - LORIA) | Safety Evaluation of Critical Applications Distributed on TDMA-Based
Networks | null | Dans Third Taiwanese-French Conference on Information Technology,
TFIT'2006 (2006) | null | null | cs.OH | null | Critical embedded systems have to provide a high level of dependability. In
automotive domain, for example, TDMA protocols are largely recommended because
of their deterministic behavior. Nevertheless, under the transient
environmental perturbations, the loss of communication cycles may occur with a
certain probability and, consequently, the system may fail. This paper analyzes
the impact of the transient perturbations (especially due to Electromagnetic
Interferences) on the dependability of systems distributed on TDMA-based
networks. The dependability of such system is modeled as that of
"consecutive-k-out-of-n:F" systems and we provide a efficient way for its
evaluation.
| [
{
"version": "v1",
"created": "Thu, 16 Nov 2006 09:48:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Simonot-Lion",
"Françoise",
"",
"INRIA Lorraine - LORIA"
],
[
"Simonot",
"François",
"",
"IECN"
],
[
"Song",
"Ye-Qiong",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0611080 | Ying Jun Zhang Ph.D. | Ying Jun Zhang | A Multi-server Scheduling Framework for Resource Allocation in Wireless
Multi-carrier Networks | null | null | null | null | cs.NA cs.CE cs.NI cs.PF | null | Multiuser resource allocation has recently been recognized as an effective
methodology for enhancing the power and spectrum efficiency in OFDM (orthogonal
frequency division multiplexing) systems. It is, however, not directly
applicable to current packet-switched networks, because (i) most existing
packet-scheduling schemes are based on a single-server model and do not serve
multiple users at the same time; and (ii) the conventional separate design of
MAC (medium access control) packet scheduling and PHY (physical) resource
allocation yields inefficient resource utilization. In this paper, we propose a
cross-layer resource allocation algorithm based on a novel multi-server
scheduling framework to achieve overall high system power efficiency in
packet-switched OFDM networks. Our contribution is four fold: (i) we propose
and analyze a MPGPS (multi-server packetized general processor sharing) service
discipline that serves multiple users at the same time and facilitates
multiuser resource allocation; (ii) we present a MPGPS-based joint MAC-PHY
resource allocation scheme that incorporates packet scheduling, subcarrier
allocation, and power allocation in an integrated framework; (iii) by
investigating the fundamental tradeoff between multiuser-diversity and queueing
performance, we present an A-MPGPS (adaptive MPGPS) service discipline that
strikes balance between power efficiency and queueing performance; and (iv) we
extend MPGPS to an O-MPGPS (opportunistic MPGPS) service discipline to further
enhance the resource utilization efficiency.
| [
{
"version": "v1",
"created": "Thu, 16 Nov 2006 12:33:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhang",
"Ying Jun",
""
]
]
|
cs/0611083 | Vladimir Migunov | Vladimir V. Migunov | Environment of development of the programs of parametric creating of the
drawings in CAD-system of renovation of the enterprises | 5 pages, 3 figures, in Russian | null | null | null | cs.CE | null | The main ideas, data structures, structure and realization of operations with
them in environment of development of the programs of parametric creating of
the drawings are considered for the needs of the automated design engineering
system of renovation of the enterprises. The example of such program and
example of application of this environment for creating the drawing of the base
for equipment in CAD-system TechnoCAD GlassX are presented
| [
{
"version": "v1",
"created": "Fri, 17 Nov 2006 08:27:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
]
|
cs/0611085 | Timothy McJunkin | Timothy R. McJunkin and Jill R. Scott | Fuzzy Logic Classification of Imaging Laser Desorption Fourier Transform
Mass Spectrometry Data | null | null | null | null | cs.AI | null | A fuzzy logic based classification engine has been developed for classifying
mass spectra obtained with an imaging internal source Fourier transform mass
spectrometer (I^2LD-FTMS). Traditionally, an operator uses the relative
abundance of ions with specific mass-to-charge (m/z) ratios to categorize
spectra. An operator does this by comparing the spectrum of m/z versus
abundance of an unknown sample against a library of spectra from known samples.
Automated positioning and acquisition allow I^2LD-FTMS to acquire data from
very large grids, this would require classification of up to 3600 spectrum per
hour to keep pace with the acquisition. The tedious job of classifying numerous
spectra generated in an I^2LD-FTMS imaging application can be replaced by a
fuzzy rule base if the cues an operator uses can be encapsulated. We present
the translation of linguistic rules to a fuzzy classifier for mineral phases in
basalt. This paper also describes a method for gathering statistics on ions,
which are not currently used in the rule base, but which may be candidates for
making the rule base more accurate and complete or to form new rule bases based
on data obtained from known samples. A spatial method for classifying spectra
with low membership values, based on neighboring sample classifications, is
also presented.
| [
{
"version": "v1",
"created": "Fri, 17 Nov 2006 19:14:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"McJunkin",
"Timothy R.",
""
],
[
"Scott",
"Jill R.",
""
]
]
|
cs/0611087 | Vipul Mathur | Naresh Singhmar, Vipul Mathur, Varsha Apte, D. Manjunath | A Combined LIFO-Priority Scheme for Overload Control of E-commerce Web
Servers | 10 pages, 8 figures, presented at the International Infrastructure
Survivability Workshop (affiliated with the 25th IEEE International Real-Time
Systems Symposium), Lisbon, Portugal, December 2004 | null | null | null | cs.PF | null | E-commerce Web-servers often face overload conditions during which
revenue-generating requests may be dropped or abandoned due to an increase in
the browsing requests. In this paper we present a simple, yet effective,
mechanism for overload control of E-commerce Web-servers. We develop an
E-commerce workload model that separates the browsing requests from
revenue-generating transaction requests. During overload, we apply LIFO
discipline in the browsing queues and use a dynamic priority model to service
them. The transaction queues are given absolute priority over the browsing
queues. This is called the LIFO-Pri scheduling discipline. Experimental results
show that LIFO-Pri dramatically improves the overall Web-server throughput
while also increasing the completion rate of revenue-generating requests. The
Web-server was able to operate at nearly 60% of its maximum capacity even when
offered load was 1.5 times its capacity. Further, when compared to a single
queue FIFO system, there was a seven-fold increase in the number of completed
revenue-generating requests during overload.
| [
{
"version": "v1",
"created": "Fri, 17 Nov 2006 23:43:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Singhmar",
"Naresh",
""
],
[
"Mathur",
"Vipul",
""
],
[
"Apte",
"Varsha",
""
],
[
"Manjunath",
"D.",
""
]
]
|
cs/0611088 | James Oravec | Lawrence L. Larmore and James A. Oravec | T-Theory Applications to Online Algorithms for the Server Problem | 19 figures 38 pages | null | null | null | cs.DS cs.DM | null | Although largely unnoticed by the online algorithms community, T-theory, a
field of discrete mathematics, has contributed to the development of several
online algorithms for the k-server problem. A brief summary of the k-server
problem, and some important application concepts of T-theory, are given.
Additionally, a number of known k-server results are restated using the
established terminology of T-theory. Lastly, a previously unpublished
3-competitiveness proof, using T-theory, for the Harmonic algorithm for two
servers is presented.
| [
{
"version": "v1",
"created": "Sat, 18 Nov 2006 19:50:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Larmore",
"Lawrence L.",
""
],
[
"Oravec",
"James A.",
""
]
]
|
cs/0611091 | Elankovan Sundararajan Mr. | Elankovan Sundararajan, Aaron Harwood, Kotagiri Ramamohanarao | Lossy Bulk Synchronous Parallel Processing Model for Very Large Scale
Grids | 14 pages,15 figures | null | null | null | cs.DC cs.CC cs.PF | null | The performance of a parallel algorithm in a very large scale grid is
significantly influenced by the underlying Internet protocols and
inter-connectivity. Many grid programming platforms use TCP due to its
reliability, usually with some optimizations to reduce its costs. However, TCP
does not perform well in a high bandwidth and high delay network environment.
On the other hand, UDP is the fastest protocol available because it omits
connection setup process, acknowledgments and retransmissions sacrificing
reliable transfer. Many new bulk data transfer schemes using UDP for data
transmission such as RBUDP, Tsunami, and SABUL have been introduced and shown
to have better performance compared to TCP. In this paper, we consider the use
of UDP and examine the relationship between packet loss and speedup with
respect to the number of grid nodes. Our measurement suggests that packet loss
rates between 5%-15% on average are not uncommon between PlanetLab nodes that
are widely distributed over the Internet. We show that transmitting multiple
copies of same packet produces higher speedup. We show the minimum number of
packet duplication required to maximize the possible speedup for a given number
of nodes using a BSP based model. Our work demonstrates that by using an
appropriate number of packet copies, we can increase performance of parallel
program.
| [
{
"version": "v1",
"created": "Mon, 20 Nov 2006 00:20:44 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Dec 2006 05:31:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sundararajan",
"Elankovan",
""
],
[
"Harwood",
"Aaron",
""
],
[
"Ramamohanarao",
"Kotagiri",
""
]
]
|
cs/0611092 | Yishay Mor | Yishay Mor and Niall Winters | Design approaches in technology enhanced learning | null | null | null | null | cs.SE cs.CY | null | Design is a critical to the successful development of any interactive
learning environment (ILE). Moreover, in technology enhanced learning (TEL),
the design process requires input from many diverse areas of expertise. As
such, anyone undertaking tool development is required to directly address the
design challenge from multiple perspectives. We provide a motivation and
rationale for design approaches for learning technologies that draws upon
Simon's seminal proposition of Design Science (Simon, 1969). We then review the
application of Design Experiments (Brown, 1992) and Design Patterns (Alexander
et al., 1977) and argue that a patterns approach has the potential to address
many of the critical challenges faced by learning technologists.
| [
{
"version": "v1",
"created": "Mon, 20 Nov 2006 01:19:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mor",
"Yishay",
""
],
[
"Winters",
"Niall",
""
]
]
|
cs/0611094 | Ravindra Guravannavar | Ravindra Guravannavar, S Sudarshan, Ajit A Diwan, Ch. Sobhan Babu | Reducing Order Enforcement Cost in Complex Query Plans | 24 pages, 16 figures | null | null | null | cs.DB | null | Algorithms that exploit sort orders are widely used to implement joins,
grouping, duplicate elimination and other set operations. Query optimizers
traditionally deal with sort orders by using the notion of interesting orders.
The number of interesting orders is unfortunately factorial in the number of
participating attributes. Optimizer implementations use heuristics to prune the
number of interesting orders, but the quality of the heuristics is unclear.
Increasingly complex decision support queries and increasing use of covering
indices, which provide multiple alternative sort orders for relations, motivate
us to better address the problem of optimization with interesting orders.
We show that even a simplified version of optimization with sort orders is
NP-hard and provide principled heuristics for choosing interesting orders. We
have implemented the proposed techniques in a Volcano-style cost-based
optimizer, and our performance study shows significant improvements in
estimated cost. We also executed our plans on a widely used commercial database
system, and on PostgreSQL, and found that actual execution times for our plans
were significantly better than for plans generated by those systems in several
cases.
| [
{
"version": "v1",
"created": "Mon, 20 Nov 2006 10:12:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Guravannavar",
"Ravindra",
""
],
[
"Sudarshan",
"S",
""
],
[
"Diwan",
"Ajit A",
""
],
[
"Babu",
"Ch. Sobhan",
""
]
]
|
cs/0611098 | Christian Lavault | Christian Lavault (IRISA / INRIA Rennes) | Analysis of an Efficient Distributed Algorithm for Mutual Exclusion
(Average-Case Analysis of Path Reversal) | null | LNCS 634 (1992) 133-144 | null | null | cs.DC cs.DS | null | The algorithm analysed by Na\"{i}mi, Trehe and Arnold was the very first
distributed algorithm to solve the mutual exclusion problem in complete
networks by using a dynamic logical tree structure as its basic distributed
data structure, viz. a path reversal transformation in rooted n-node trees;
besides, it was also the first one to achieve a logarithmic average-case
message complexity. The present paper proposes a direct and general approach to
compute the moments of the cost of path reversal. It basically uses one-one
correspondences between combinatorial structures and the associated probability
generating functions: the expected cost of path reversal is thus proved to be
exactly $H_{n-1}$. Moreover, time and message complexity of the algorithm as
well as randomized bounds on its worst-case message complexity in arbitrary
networks are also given. The average-case analysis of path reversal and the
analysis of this distributed algorithm for mutual exclusion are thus fully
completed in the paper. The general techniques used should also prove available
and fruitful when adapted to the most efficient recent tree-based distributed
algorithms for mutual exclusion which require powerful tools, particularly for
average-case analyses.
| [
{
"version": "v1",
"created": "Mon, 20 Nov 2006 22:02:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"IRISA / INRIA Rennes"
]
]
|
cs/0611100 | Mirco Mannucci Ph.D. | Mirco A. Mannucci, Rose M. Cherubin | Model Theory of Ultrafinitism I: Fuzzy Initial Segments of Arithmetics | 31 pages, Tennenbaum Memorial invited talk | null | null | null | cs.LO | null | This article is the first of an intended series of works on the model theory
of Ultrafinitism. It is roughly divided into two parts. The first one addresses
some of the issues related to ultrafinitistic programs, as well as some of the
core ideas proposed thus far. The second part of the paper presents a model of
ultrafinitistic arithmetics based on the notion of fuzzy initial segments of
the standard natural numbers series. We also introduce a proof theory and a
semantics for ultrafinitism through which feasibly consistent theories can be
treated on the same footing as their classically consistent counterparts. We
conclude with a brief sketch of a foundational program, that aims at
reproducing the transfinite within the finite realm.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 03:05:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mannucci",
"Mirco A.",
""
],
[
"Cherubin",
"Rose M.",
""
]
]
|
cs/0611102 | Hanno Langweg | Hanno Langweg and Tommy Kristiansen | Extending the Trusted Path in Client-Server Interaction | 8 pages, 3 figures | null | null | null | cs.CR | null | We present a method to secure the complete path between a server and the
local human user at a network node. This is useful for scenarios like internet
banking, electronic signatures, or online voting. Protection of input
authenticity and output integrity and authenticity is accomplished by a
combination of traditional and novel technologies, e.g., SSL, ActiveX, and
DirectX. Our approach does not require administrative privileges to deploy and
is hence suitable for consumer applications. Results are based on the
implementation of a proof-of-concept application for the Windows platform.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 12:13:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Langweg",
"Hanno",
""
],
[
"Kristiansen",
"Tommy",
""
]
]
|
cs/0611103 | Petteri Kaski | Petteri Kaski | Barriers and local minima in energy landscapes of stochastic local
search | null | null | null | null | cs.CC cond-mat.stat-mech | null | A local search algorithm operating on an instance of a Boolean constraint
satisfaction problem (in particular, k-SAT) can be viewed as a stochastic
process traversing successive adjacent states in an ``energy landscape''
defined by the problem instance on the n-dimensional Boolean hypercube. We
investigate analytically the worst-case topography of such landscapes in the
context of satisfiable k-SAT via a random ensemble of satisfiable ``k-regular''
linear equations modulo 2.
We show that for each fixed k=3,4,..., the typical k-SAT energy landscape
induced by an instance drawn from the ensemble has a set of 2^{\Omega(n)} local
energy minima, each separated by an unconditional \Omega(n) energy barrier from
each of the O(1) ground states, that is, solution states with zero energy. The
main technical aspect of the analysis is that a random k-regular 0/1 matrix
constitutes a strong boundary expander with almost full GF(2)-linear rank, a
property which also enables us to prove a 2^{\Omega(n)} lower bound for the
expected number of steps required by the focused random walk heuristic to solve
typical instances drawn from the ensemble. These results paint a grim picture
of the worst-case topography of k-SAT for local search, and constitute
apparently the first rigorous analysis of the growth of energy barriers in a
random ensemble of k-SAT landscapes as the number of variables n is increased.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 12:52:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kaski",
"Petteri",
""
]
]
|
cs/0611107 | Adam L. Buchsbaum | Adam L. Buchsbaum, Emden R. Gansner, Cecilia M. Procopiuc, Suresh
Venkatasubramanian | Rectangular Layouts and Contact Graphs | 28 pages, 13 figures, 55 references, 1 appendix | null | null | null | cs.DS cs.DM | null | Contact graphs of isothetic rectangles unify many concepts from applications
including VLSI and architectural design, computational geometry, and GIS.
Minimizing the area of their corresponding {\em rectangular layouts} is a key
problem. We study the area-optimization problem and show that it is NP-hard to
find a minimum-area rectangular layout of a given contact graph. We present
O(n)-time algorithms that construct $O(n^2)$-area rectangular layouts for
general contact graphs and $O(n\log n)$-area rectangular layouts for trees.
(For trees, this is an $O(\log n)$-approximation algorithm.) We also present an
infinite family of graphs (rsp., trees) that require $\Omega(n^2)$ (rsp.,
$\Omega(n\log n)$) area.
We derive these results by presenting a new characterization of graphs that
admit rectangular layouts using the related concept of {\em rectangular duals}.
A corollary to our results relates the class of graphs that admit rectangular
layouts to {\em rectangle of influence drawings}.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 15:03:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Buchsbaum",
"Adam L.",
""
],
[
"Gansner",
"Emden R.",
""
],
[
"Procopiuc",
"Cecilia M.",
""
],
[
"Venkatasubramanian",
"Suresh",
""
]
]
|
cs/0611108 | Jon Feldman | Jon Feldman, S. Muthukrishnan, Anastasios Sidiropoulos, Cliff Stein,
Zoya Svitkina | On the Complexity of Processing Massive, Unordered, Distributed Data | null | null | null | null | cs.CC cs.DC | null | An existing approach for dealing with massive data sets is to stream over the
input in few passes and perform computations with sublinear resources. This
method does not work for truly massive data where even making a single pass
over the data with a processor is prohibitive. Successful log processing
systems in practice such as Google's MapReduce and Apache's Hadoop use multiple
machines. They efficiently perform a certain class of highly distributable
computations defined by local computations that can be applied in any order to
the input.
Motivated by the success of these systems, we introduce a simple algorithmic
model for massive, unordered, distributed (mud) computation. We initiate the
study of understanding its computational complexity. Our main result is a
positive one: any unordered function that can be computed by a streaming
algorithm can also be computed with a mud algorithm, with comparable space and
communication complexity. We extend this result to some useful classes of
approximate and randomized streaming algorithms. We also give negative results,
using communication complexity arguments to prove that extensions to private
randomness, promise problems and indeterminate functions are impossible.
We believe that the line of research we introduce in this paper has the
potential for tremendous impact. The distributed systems that motivate our work
successfully process data at an unprecedented scale, distributed over hundreds
or even thousands of machines, and perform hundreds of such analyses each day.
The mud model (and its generalizations) inspire a set of complexity-theoretic
questions that lie at their heart.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 16:11:06 GMT"
},
{
"version": "v2",
"created": "Tue, 22 May 2007 14:35:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Feldman",
"Jon",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Sidiropoulos",
"Anastasios",
""
],
[
"Stein",
"Cliff",
""
],
[
"Svitkina",
"Zoya",
""
]
]
|
cs/0611110 | Amine Chigani | Amine Chigani, James D. Arthur | The Implications of Network-Centric Software Systems on Software
Architecture: A Critical Evaluation | 6 pages, 2 figures, ACMSE Conference 2007 | null | null | null | cs.SE | null | The purpose of this paper is to evaluate the impact of emerging
network-centric software systems on the field of software architecture. We
first develop an insight concerning the term "network-centric" by presenting
its origin and its implications within the context of software architecture. On
the basis of this insight, we present our definition of a network-centric
framework and its distinguishing characteristics. We then enumerate the
challenges that face the field of software architecture as software development
shifts from a platform-centric to a network-centric model. In order to face
these challenges, we propose a formal approach embodied in a new architectural
style that supports overcoming these challenges at the architectural level.
Finally, we conclude by presenting an illustrative example to demonstrate the
usefulness of the concepts of network centricity, summarizing our
contributions, and linking our approach to future work that needs to be done in
this area.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 19:23:32 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Dec 2006 03:38:50 GMT"
},
{
"version": "v3",
"created": "Sat, 10 Feb 2007 21:30:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chigani",
"Amine",
""
],
[
"Arthur",
"James D.",
""
]
]
|
cs/0611113 | Maurice H. T. Ling | Maurice HT Ling | An Anthological Review of Research Utilizing MontyLingua, a Python-Based
End-to-End Text Processor | 9 pages | Ling, Maurice HT. 2006. An Anthological Review of Research
Utilizing MontyLingua, a Python-Based End-to-End Text Processor. The Python
Papers 1 (1): 5-13 | null | null | cs.CL | null | MontyLingua, an integral part of ConceptNet which is currently the largest
commonsense knowledge base, is an English text processor developed using Python
programming language in MIT Media Lab. The main feature of MontyLingua is the
coverage for all aspects of English text processing from raw input text to
semantic meanings and summary generation, yet each component in MontyLingua is
loosely-coupled to each other at the architectural and code level, which
enabled individual components to be used independently or substituted. However,
there has been no review exploring the role of MontyLingua in recent research
work utilizing it. This paper aims to review the use of and roles played by
MontyLingua and its components in research work published in 19 articles
between October 2004 and August 2006. We had observed a diversified use of
MontyLingua in many different areas, both generic and domain-specific. Although
the use of text summarizing component had not been observe, we are optimistic
that it will have a crucial role in managing the current trend of information
overload in future research.
| [
{
"version": "v1",
"created": "Wed, 22 Nov 2006 03:24:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ling",
"Maurice HT",
""
]
]
|
cs/0611115 | Ian Jermyn | Peter Horvath (INRIA Sophia Antipolis), Ian Jermyn (INRIA Sophia
Antipolis), Zoltan Kato, Josiane Zerubia (INRIA Sophia Antipolis) | A higher-order active contour model of a `gas of circles' and its
application to tree crown extraction | null | null | null | null | cs.CV | null | Many image processing problems involve identifying the region in the image
domain occupied by a given entity in the scene. Automatic solution of these
problems requires models that incorporate significant prior knowledge about the
shape of the region. Many methods for including such knowledge run into
difficulties when the topology of the region is unknown a priori, for example
when the entity is composed of an unknown number of similar objects.
Higher-order active contours (HOACs) represent one method for the modelling of
non-trivial prior knowledge about shape without necessarily constraining region
topology, via the inclusion of non-local interactions between region boundary
points in the energy defining the model. The case of an unknown number of
circular objects arises in a number of domains, e.g. medical, biological,
nanotechnological, and remote sensing imagery. Regions composed of an a priori
unknown number of circles may be referred to as a `gas of circles'. In this
report, we present a HOAC model of a `gas of circles'. In order to guarantee
stable circles, we conduct a stability analysis via a functional Taylor
expansion of the HOAC energy around a circular shape. This analysis fixes one
of the model parameters in terms of the others and constrains the rest. In
conjunction with a suitable likelihood energy, we apply the model to the
extraction of tree crowns from aerial imagery, and show that the new model
outperforms other techniques.
| [
{
"version": "v1",
"created": "Wed, 22 Nov 2006 13:44:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Horvath",
"Peter",
"",
"INRIA Sophia Antipolis"
],
[
"Jermyn",
"Ian",
"",
"INRIA Sophia\n Antipolis"
],
[
"Kato",
"Zoltan",
"",
"INRIA Sophia Antipolis"
],
[
"Zerubia",
"Josiane",
"",
"INRIA Sophia Antipolis"
]
]
|
cs/0611117 | Mikhail Nesterenko | Mark Miyashita and Mikhail Nesterenko | 2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing | null | null | null | null | cs.DC cs.DS cs.OS | null | We propose bi-directional face traversal algorithm $2FACE$ to shorten the
path the message takes to reach the destination in geometric routing. Our
algorithm combines the practicality of the best single-direction traversal
algorithms with the worst case message complexity of $O(|E|)$, where $E$ is the
number of network edges. We apply $2FACE$ to a variety of geometric routing
algorithms. Our simulation results indicate that bi-directional face traversal
decreases the latency of message delivery two to three times compared to single
direction face traversal. The thus selected path approaches the shortest
possible route. This gain in speed comes with a similar message overhead
increase. We describe an algorithm which compensates for this message overhead
by recording the preferable face traversal direction. Thus, if a source has
several messages to send to the destination, the subsequent messages follow the
shortest route. Our simulation results show that with most geometric routing
algorithms the message overhead of finding the short route by bi-directional
face traversal is compensated within two to four repeat messages.
| [
{
"version": "v1",
"created": "Wed, 22 Nov 2006 19:28:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Miyashita",
"Mark",
""
],
[
"Nesterenko",
"Mikhail",
""
]
]
|
cs/0611122 | Adrian Paschke | Adrian Paschke, Martin Bichler | Knowledge Representation Concepts for Automated SLA Management | Paschke, A. and Bichler, M.: Knowledge Representation Concepts for
Automated SLA Management, Int. Journal of Decision Support Systems (DSS),
submitted 19th March 2006 | null | null | null | cs.SE cs.AI cs.LO cs.PL | null | Outsourcing of complex IT infrastructure to IT service providers has
increased substantially during the past years. IT service providers must be
able to fulfil their service-quality commitments based upon predefined Service
Level Agreements (SLAs) with the service customer. They need to manage, execute
and maintain thousands of SLAs for different customers and different types of
services, which needs new levels of flexibility and automation not available
with the current technology. The complexity of contractual logic in SLAs
requires new forms of knowledge representation to automatically draw inferences
and execute contractual agreements. A logic-based approach provides several
advantages including automated rule chaining allowing for compact knowledge
representation as well as flexibility to adapt to rapidly changing business
requirements. We suggest adequate logical formalisms for representation and
enforcement of SLA rules and describe a proof-of-concept implementation. The
article describes selected formalisms of the ContractLog KR and their adequacy
for automated SLA management and presents results of experiments to demonstrate
flexibility and scalability of the approach.
| [
{
"version": "v1",
"created": "Thu, 23 Nov 2006 13:25:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
],
[
"Bichler",
"Martin",
""
]
]
|
cs/0611124 | Francis Bach | Jacob Abernethy, Francis Bach, Theodoros Evgeniou, Jean-Philippe Vert | Low-rank matrix factorization with attributes | 12 pages, 2 figures | null | null | N-24/06/MM | cs.LG cs.AI cs.IR | null | We develop a new collaborative filtering (CF) method that combines both
previously known users' preferences, i.e. standard CF, as well as product/user
attributes, i.e. classical function approximation, to predict a given user's
interest in a particular product. Our method is a generalized low rank matrix
completion problem, where we learn a function whose inputs are pairs of vectors
-- the standard low rank matrix completion problem being a special case where
the inputs to the function are the row and column indices of the matrix. We
solve this generalized matrix completion problem using tensor product kernels
for which we also formally generalize standard kernel properties. Benchmark
experiments on movie ratings show the advantages of our generalized matrix
completion method over the standard matrix completion one with no information
about movies or people, as well as over standard multi-task or single task
learning methods.
| [
{
"version": "v1",
"created": "Fri, 24 Nov 2006 08:49:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abernethy",
"Jacob",
""
],
[
"Bach",
"Francis",
""
],
[
"Evgeniou",
"Theodoros",
""
],
[
"Vert",
"Jean-Philippe",
""
]
]
|
cs/0611126 | Mahmoud Fouz | Benjamin Doerr, Mahmoud Fouz | Hereditary Discrepancies in Different Numbers of Colors II | null | null | null | null | cs.DM | null | We bound the hereditary discrepancy of a hypergraph $\HH$ in two colors in
terms of its hereditary discrepancy in $c$ colors. We show that
$\herdisc(\HH,2) \le K c \herdisc(\HH,c)$, where $K$ is some absolute constant.
This bound is sharp.
| [
{
"version": "v1",
"created": "Fri, 24 Nov 2006 14:46:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Doerr",
"Benjamin",
""
],
[
"Fouz",
"Mahmoud",
""
]
]
|
cs/0611128 | Hasan Guclu | Hasan Guclu and Murat Yuksel | Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured
Peer-to-Peer Networks | 19 pages, 12 figures, submitted to ICDCS 2007 (International
Conference on Distributed Computing Systems 2007), one minor correction and
formatting changes | null | null | null | cs.NI cs.DC | null | In unstructured peer-to-peer (P2P) networks, the overlay topology (or
connectivity graph) among peers is a crucial component in addition to the
peer/data organization and search. Topological characteristics have profound
impact on the efficiency of search on such unstructured P2P networks as well as
other networks. It has been well-known that search on small-world topologies of
N nodes can be as efficient as O(ln N), while scale-free (power-law) topologies
offer even better search efficiencies like as good as O(lnln N) for a range of
degree distribution exponents. However, generation and maintenance of such
scale-free topologies are hard to realize in a distributed and potentially
uncooperative environments as in the P2P networks. A key limitation of
scale-free topologies is the high load (i.e. high degree) on very few number of
hub nodes. In a typical unstructured P2P network, peers are not willing to
maintain high degrees/loads as they may not want to store large number of
entries for construction of the overlay topology. So, to achieve fairness and
practicality among all peers, hard cutoffs on the number of entries are imposed
by the individual peers, which limits scale-freeness of the overall topology.
Thus, efficiency of the flooding search reduces as the size of the hard cutoff
does. We investigate construction of scale-free topologies with hard cutoffs
(i.e. there are not any major hubs) and effect of these hard cutoffs on the
search efficiency. Interestingly, we observe that the efficiency of normalized
flooding and random walk search algorithms increases as the hard cutoff
decreases.
| [
{
"version": "v1",
"created": "Sat, 25 Nov 2006 21:49:55 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Dec 2006 02:44:00 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Dec 2006 18:21:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Guclu",
"Hasan",
""
],
[
"Yuksel",
"Murat",
""
]
]
|
cs/0611132 | Vladimir Migunov | Vladimir V. Migunov | The specifications making in complex CAD-system of renovation of the
enterprises on the basis of modules in the drawing and electronic catalogues | 8 pages, 4 figures, in Russian | null | null | null | cs.CE | null | The experience of automation of the specifications making of the projects of
renovation of the industrial enterprises is described, being based on the
special modules in the drawing containing the visible image and additional
parameters, and electronic catalogues
| [
{
"version": "v1",
"created": "Mon, 27 Nov 2006 04:31:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
]
|
cs/0611133 | Vladimir Migunov | Vladimir V. Migunov | The modelling of the automation schemes of technological processes in
CAD-system of renovation of the enterprises | 4 pages, 3 figures, in Russian | null | null | null | cs.CE | null | According to the requirements of the Russian standards, the automation
schemes are necessary practically in each project of renovation of industrial
buildings and facilities, in which any technological processes are realized.
The model representations of the automation schemes in CAD-system TechnoCAD
GlassX are described. The models follow a principle "to exclude a repeated
input operations"
| [
{
"version": "v1",
"created": "Mon, 27 Nov 2006 04:39:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
]
|
cs/0611134 | Vladimir L. Safonov | Vladimir L. Safonov | Hard Disk Drive as a Magnetomechanical Logic Device | 3pages, 3 figures | null | null | null | cs.OH cs.AR | null | We consider the conditions how two binary numbers can be superimposed on the
same track with the use of different recording magnetic fields. As a result the
average magnetization of longitudinal medium along the track can have three
states: -M, 0 and +M. Possibility to perform logic operations with these states
is considered. We demonstrate OR, AND, XOR and NOT operations and discuss a
modification of a recording device.
| [
{
"version": "v1",
"created": "Mon, 27 Nov 2006 19:45:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Safonov",
"Vladimir L.",
""
]
]
|
cs/0611136 | Edward Rietman PhD | E.A. Rietman and R.W. Hillis | Neural Computation with Rings of Quasiperiodic Oscillators | 54 pages, 26 figures | null | null | PSI SR-1278 | cs.RO | null | We describe the use of quasiperiodic oscillators for computation and control
of robots. We also describe their relationship to central pattern generators in
simple organisms and develop a group theory for describing the dynamics of
these systems.
| [
{
"version": "v1",
"created": "Mon, 27 Nov 2006 15:28:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rietman",
"E. A.",
""
],
[
"Hillis",
"R. W.",
""
]
]
|
cs/0611140 | Marc Schoenauer | Yann Semet (INRIA Futurs), Marc Schoenauer (INRIA Futurs) | On the Benefits of Inoculation, an Example in Train Scheduling | null | Dans GECCO-2006 (2006) | null | null | cs.AI cs.NE | null | The local reconstruction of a railway schedule following a small perturbation
of the traffic, seeking minimization of the total accumulated delay, is a very
difficult and tightly constrained combinatorial problem. Notoriously enough,
the railway company's public image degrades proportionally to the amount of
daily delays, and the same goes for its profit! This paper describes an
inoculation procedure which greatly enhances an evolutionary algorithm for
train re-scheduling. The procedure consists in building the initial population
around a pre-computed solution based on problem-related information available
beforehand. The optimization is performed by adapting times of departure and
arrival, as well as allocation of tracks, for each train at each station. This
is achieved by a permutation-based evolutionary algorithm that relies on a
semi-greedy heuristic scheduler to gradually reconstruct the schedule by
inserting trains one after another. Experimental results are presented on
various instances of a large real-world case involving around 500 trains and
more than 1 million constraints. In terms of competition with commercial math
ematical programming tool ILOG CPLEX, it appears that within a large class of
instances, excluding trivial instances as well as too difficult ones, and with
very few exceptions, a clever initialization turns an encouraging failure into
a clear-cut success auguring of substantial financial savings.
| [
{
"version": "v1",
"created": "Tue, 28 Nov 2006 12:44:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Semet",
"Yann",
"",
"INRIA Futurs"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
]
]
|
cs/0611141 | Peter Tiedemann | Peter Tiedemann, Henrik Reif Andersen and Rasmus Pagh | A Generic Global Constraint based on MDDs | Tech report, 31 pages, 3 figures | null | null | null | cs.AI | null | The paper suggests the use of Multi-Valued Decision Diagrams (MDDs) as the
supporting data structure for a generic global constraint. We give an algorithm
for maintaining generalized arc consistency (GAC) on this constraint that
amortizes the cost of the GAC computation over a root-to-terminal path in the
search tree. The technique used is an extension of the GAC algorithm for the
regular language constraint on finite length input. Our approach adds support
for skipped variables, maintains the reduced property of the MDD dynamically
and provides domain entailment detection. Finally we also show how to adapt the
approach to constraint types that are closely related to MDDs, such as AOMDDs
and Case DAGs.
| [
{
"version": "v1",
"created": "Tue, 28 Nov 2006 14:23:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tiedemann",
"Peter",
""
],
[
"Andersen",
"Henrik Reif",
""
],
[
"Pagh",
"Rasmus",
""
]
]
|
cs/0611142 | Mounira Kourjieh | Yannick Chevalier (IRIT), Mounira Kourjieh (IRIT) | A Symbolic Intruder Model for Hash-Collision Attacks | null | CSTVA'06, France (25/09/2006) | null | null | cs.CR | null | In the recent years, several practical methods have been published to compute
collisions on some commonly used hash functions. In this paper we present a
method to take into account, at the symbolic level, that an intruder actively
attacking a protocol execution may use these collision algorithms in reasonable
time during the attack. Our decision procedure relies on the reduction of
constraint solving for an intruder exploiting the collision properties of hush
functions to constraint solving for an intruder operating on words.
| [
{
"version": "v1",
"created": "Tue, 28 Nov 2006 14:09:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chevalier",
"Yannick",
"",
"IRIT"
],
[
"Kourjieh",
"Mounira",
"",
"IRIT"
]
]
|
cs/0611145 | Manuel Loth | Manuel Loth (INRIA Futurs), Philippe Preux (INRIA Futurs) | A Unified View of TD Algorithms; Introducing Full-Gradient TD and
Equi-Gradient Descent TD | null | Dans European Symposium on Artificial Neural Networks (2006) | null | null | cs.LG | null | This paper addresses the issue of policy evaluation in Markov Decision
Processes, using linear function approximation. It provides a unified view of
algorithms such as TD(lambda), LSTD(lambda), iLSTD, residual-gradient TD. It is
asserted that they all consist in minimizing a gradient function and differ by
the form of this function and their means of minimizing it. Two new schemes are
introduced in that framework: Full-gradient TD which uses a generalization of
the principle introduced in iLSTD, and EGD TD, which reduces the gradient by
successive equi-gradient descents. These three algorithms form a new
intermediate family with the interesting property of making much better use of
the samples than TD while keeping a gradient descent scheme, which is useful
for complexity issues and optimistic policy iteration.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 00:00:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Loth",
"Manuel",
"",
"INRIA Futurs"
],
[
"Preux",
"Philippe",
"",
"INRIA Futurs"
]
]
|
cs/0611148 | Federico Calzolari dr | Federico Calzolari, Eva Sassolini, Manuela Sassi, Sebastiana
Cucurullo, Eugenio Picchi, Francesca Bertagna, Alessandro Enea, Monica
Monachini, Claudia Soria, Nicoletta Calzolari | Next Generation Language Resources using GRID | 4 pages | Language Resources and Evaluation Conference LREC 2006 proceedings
pp.1858-1861, Genoa [Italy] | null | null | cs.DC cs.CL | null | This paper presents a case study concerning the challenges and requirements
posed by next generation language resources, realized as an overall model of
open, distributed and collaborative language infrastructure. If a sort of "new
paradigm" is required, we think that the emerging and still evolving technology
connected to Grid computing is a very interesting and suitable one for a
concrete realization of this vision. Given the current limitations of Grid
computing, it is very important to test the new environment on basic language
analysis tools, in order to get the feeling of what are the potentialities and
possible limitations connected to its use in NLP. For this reason, we have done
some experiments on a module of Linguistic Miner, i.e. the extraction of
linguistic patterns from restricted domain corpora.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 10:49:23 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Dec 2006 14:26:07 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Dec 2006 11:11:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Calzolari",
"Federico",
""
],
[
"Sassolini",
"Eva",
""
],
[
"Sassi",
"Manuela",
""
],
[
"Cucurullo",
"Sebastiana",
""
],
[
"Picchi",
"Eugenio",
""
],
[
"Bertagna",
"Francesca",
""
],
[
"Enea",
"Alessandro",
""
],
[
"Monachini",
"Monica",
""
],
[
"Soria",
"Claudia",
""
],
[
"Calzolari",
"Nicoletta",
""
]
]
|
cs/0611149 | Eric Rondeau | Belynda Brahimi (CRAN), Eric Rondeau (CRAN), Christophe Aubrun (CRAN) | Comparison between Networked Control System behaviour based on CAN and
Switched Ethernet networks | 7 pages | 2nd Workshop on Networked Control Systems : Tolerant to fault
(23/11/2006) 7 pages | null | null | cs.NI | null | The distributed control systems are more and more used in many industrial
applications. These systems are often referred as "Networked control systems".
The goal of this paper is to show the network influence on feedback control
systems. Two networks are considered: Switched Ethernet network and CAN
fieldbus. The first one represents the non deterministic network and second one
represents the deterministic one. Several scenarii are studied to analyse the
stability of system according to different network parameters (packets losses,
congestion and frame priority). The Truetime simulator is used in this work.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 11:05:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brahimi",
"Belynda",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
],
[
"Aubrun",
"Christophe",
"",
"CRAN"
]
]
|
cs/0611150 | Saket Sathe | Saket Sathe | A Novel Bayesian Classifier using Copula Functions | null | null | null | null | cs.LG cs.AI cs.IR | null | A useful method for representing Bayesian classifiers is through
\emph{discriminant functions}. Here, using copula functions, we propose a new
model for discriminants. This model provides a rich and generalized class of
decision boundaries. These decision boundaries significantly boost the
classification accuracy especially for high dimensional feature spaces. We
strengthen our analysis through simulation results.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 13:59:31 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Nov 2006 03:58:23 GMT"
},
{
"version": "v3",
"created": "Tue, 5 Dec 2006 15:04:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sathe",
"Saket",
""
]
]
|
cs/0611157 | Mira Gonen | Reuven Cohen, Mira Gonen, Avishai Wool | Bounding the Bias of Tree-Like Sampling in IP Topologies | 12 pages, 1 figure | null | null | null | cs.NI | null | It is widely believed that the Internet's AS-graph degree distribution obeys
a power-law form. Most of the evidence showing the power-law distribution is
based on BGP data. However, it was recently argued that since BGP collects data
in a tree-like fashion, it only produces a sample of the degree distribution,
and this sample may be biased. This argument was backed by simulation data and
mathematical analysis, which demonstrated that under certain conditions a tree
sampling procedure can produce an artificail power-law in the degree
distribution. Thus, although the observed degree distribution of the AS-graph
follows a power-law, this phenomenon may be an artifact of the sampling
process. In this work we provide some evidence to the contrary. We show, by
analysis and simulation, that when the underlying graph degree distribution
obeys a power-law with an exponent larger than 2, a tree-like sampling process
produces a negligible bias in the sampled degree distribution. Furthermore,
recent data collected from the DIMES project, which is not based on BGP
sampling, indicates that the underlying AS-graph indeed obeys a power-law
degree distribution with an exponent larger than 2. By combining this empirical
data with our analysis, we conclude that the bias in the degree distribution
calculated from BGP data is negligible.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 08:59:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cohen",
"Reuven",
""
],
[
"Gonen",
"Mira",
""
],
[
"Wool",
"Avishai",
""
]
]
|
cs/0611163 | Dimitris Kalles | Dimitris Kalles (Hellenic Open University) | On Measuring the Impact of Human Actions in the Machine Learning of a
Board Game's Playing Policies | Contains 19 pages, 10 figures, 8 tables. Submitted to a journal | null | null | null | cs.AI cs.GT cs.NE | null | We investigate systematically the impact of human intervention in the
training of computer players in a strategy board game. In that game, computer
players utilise reinforcement learning with neural networks for evolving their
playing strategies and demonstrate a slow learning speed. Human intervention
can significantly enhance learning performance, but carry-ing it out
systematically seems to be more of a problem of an integrated game development
environment as opposed to automatic evolutionary learning.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 15:30:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kalles",
"Dimitris",
"",
"Hellenic Open University"
]
]
|
cs/0611164 | Dimitris Kalles | Dimitris Kalles (Hellenic Open University) | Player co-modelling in a strategy board game: discovering how to play
fast | Contains 19 pages, 6 figures, 7 tables. Submitted to a journal | null | null | null | cs.AI cs.LG | null | In this paper we experiment with a 2-player strategy board game where playing
models are evolved using reinforcement learning and neural networks. The models
are evolved to speed up automatic game development based on human involvement
at varying levels of sophistication and density when compared to fully
autonomous playing. The experimental results suggest a clear and measurable
association between the ability to win games and the ability to do that fast,
while at the same time demonstrating that there is a minimum level of human
involvement beyond which no learning really occurs.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 15:36:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kalles",
"Dimitris",
"",
"Hellenic Open University"
]
]
|
cs/0612001 | Matthew Delacorte | Matthew Delacorte | Polynomial Time Symmetry and Isomorphism Testing for Connected Graphs | null | null | null | null | cs.DM | null | We use the concept of a Kirchhoff resistor network (alternatively random walk
on a network) to probe connected graphs and produce symmetry revealing
canonical labelings of the graph(s) nodes and edges.
| [
{
"version": "v1",
"created": "Fri, 1 Dec 2006 14:08:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Delacorte",
"Matthew",
""
]
]
|
cs/0612002 | Willemien Visser | Willemien Visser (INRIA Rocquencourt), Brigitte Trousse (INRIA Sophia
Antipolis) | Reuse of designs: Desperately seeking an interdisciplinary cognitive
approach | null | Dans IJCAI Thirteenth International Joint Conference on Artificial
Intelligence Workshop "Reuse of designs: An interdisciplinary cognitive
approach" (1993) | null | null | cs.HC cs.AI | null | This text analyses the papers accepted for the workshop "Reuse of designs: an
interdisciplinary cognitive approach". Several dimensions and questions
considered as important (by the authors and/or by us) are addressed: What about
the "interdisciplinary cognitive" character of the approaches adopted by the
authors? Is design indeed a domain where the use of CBR is particularly
suitable? Are there important distinctions between CBR and other approaches?
Which types of knowledge -other than cases- is being, or might be, used in CBR
systems? With respect to cases: are there different "types" of case and
different types of case use? which formats are adopted for their
representation? do cases have "components"? how are cases organised in the case
memory? Concerning their retrieval: which types of index are used? on which
types of relation is retrieval based? how does one retrieve only a selected
number of cases, i.e., how does one retrieve only the "best" cases? which
processes and strategies are used, by the system and by its user? Finally, some
important aspects of CBR system development are shortly discussed: should CBR
systems be assistance or autonomous systems? how can case knowledge be
"acquired"? what about the empirical evaluation of CBR systems? The conclusion
points out some lacking points: not much attention is paid to the user, and few
papers have indeed adopted an interdisciplinary cognitive approach.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 22:38:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
],
[
"Trousse",
"Brigitte",
"",
"INRIA Sophia\n Antipolis"
]
]
|
cs/0612006 | Willemien Visser | Willemien Visser (INRIA Rocquencourt) | Evocation and elaboration of solutions: Different types of
problem-solving actions. An empirical study on the design of an aerospace
artifact | null | Dans COGNITIVA 90. At the crossroads of Artificial Intelligence,
Cognitive science, and Neuroscience (1991) 689-696 | null | null | cs.HC | null | An observational study was conducted on a professional designer working on a
design project in aerospace industry. The protocol data were analyzed in order
to gain insight into the actions the designer used for the development of a
solution to the corresponding problem. Different processes are described: from
the "simple" evocation of a solution existing in memory, to the elaboration of
a "new" solution out of mnesic entities without any clear link to the current
problem. Control is addressed in so far as it concerns the priority among the
different types of development processes: the progression from evocation of a
"standard" solution to elaboration of a "new" solution is supposed to
correspond to the resulting order, that is, the one in which the designer's
activity proceeds. Short discussions of * the double status of "problem" and
"solution," * the problem/solution knowledge units in memory and their access,
and * the different abstraction levels on which problem and solution
representations are developed, are illustrated by the results.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 22:49:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
]
|
cs/0612013 | Al-Mukaddim Khan Pathan | Al-Mukaddim Khan Pathan, Rajkumar Buyya, James Broberg and Kris
Bubendorfer | Economy-based Content Replication for Peering Content Delivery Networks | Technical Report, GRIDS-TR-2006-20, Grid Computing and Distributed
Systems Laboratory, University of Melbourne, Australia | null | null | null | cs.DC | null | Existing Content Delivery Networks (CDNs) exhibit the nature of closed
delivery networks which do not cooperate with other CDNs and in practice,
islands of CDNs are formed. The logical separation between contents and
services in this context results in two content networking domains. In addition
to that, meeting the Quality of Service requirements of users according to
negotiated Service Level Agreement is crucial for a CDN. Present trends in
content networks and content networking capabilities give rise to the interest
in interconnecting content networks. Hence, in this paper, we present an open,
scalable, and Service-Oriented Architecture (SOA)-based system that assist the
creation of open Content and Service Delivery Networks (CSDNs), which scale and
supports sharing of resources through peering with other CSDNs. To encourage
resource sharing and peering arrangements between different CDN providers at
global level, we propose using market-based models by introducing an
economy-based strategy for content replication.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 06:29:16 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Dec 2006 23:24:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pathan",
"Al-Mukaddim Khan",
""
],
[
"Buyya",
"Rajkumar",
""
],
[
"Broberg",
"James",
""
],
[
"Bubendorfer",
"Kris",
""
]
]
|
cs/0612022 | Willemien Visser | Willemien Visser (INRIA Rocquencourt) | Both Generic Design and Different Forms of Designing | null | Dans Wonderground, the 2006 DRS (Design Research Society)
International Conference (2006) | null | null | cs.HC | null | This paper defends an augmented cognitively oriented "generic-design
hypothesis": There are both significant similarities between the design
activities implemented in different situations and crucial differences between
these and other cognitive activities; yet, characteristics of a design
situation (i.e., related to the designers, the artefact, and other task
variables influencing these two) introduce specificities in the corresponding
design activities and cognitive structures that are used. We thus combine the
generic-design hypothesis with that of different "forms" of designing. In this
paper, outlining a number of directions that need further elaboration, we
propose a series of candidate dimensions underlying such forms of design.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 16:28:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
]
|
cs/0612025 | Paul Vitanyi | Paul M.B. Vitanyi (CWI and University of Amsterdam) | Registers | 5 pages, LaTeX, Entry in: Encyclopedia of Algorithms, Ming-Yang Kao,
Ed., Springer, To appear | null | null | null | cs.DC | null | Entry in: Encyclopedia of Algorithms, Ming-Yang Kao, Ed., Springer, To
appear.
Synonyms: Wait-free registers, wait-free shared variables, asynchronous
communication hardware. Problem Definition: Consider a system of asynchronous
processes that communicate among themselves by only executing read and write
operations on a set of shared variables (also known as shared registers). The
system has no global clock or other synchronization primitives.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 16:51:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vitanyi",
"Paul M. B.",
"",
"CWI and University of Amsterdam"
]
]
|
cs/0612026 | Trung Nguyen | Trung Nguyen, Jean-Daniel Boissonnat, Frederic Falzon and Christian
Knauer | A disk-covering problem with application in optical interferometry | 10 pages, 8 figures | null | null | null | cs.CG | null | Given a disk O in the plane called the objective, we want to find n small
disks P_1,...,P_n called the pupils such that $\bigcup_{i,j=1}^n P_i \ominus
P_j \supseteq O$, where $\ominus$ denotes the Minkowski difference operator,
while minimizing the number of pupils, the sum of the radii or the total area
of the pupils. This problem is motivated by the construction of very large
telescopes from several smaller ones by so-called Optical Aperture Synthesis.
In this paper, we provide exact, approximate and heuristic solutions to several
variations of the problem.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 15:36:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nguyen",
"Trung",
""
],
[
"Boissonnat",
"Jean-Daniel",
""
],
[
"Falzon",
"Frederic",
""
],
[
"Knauer",
"Christian",
""
]
]
|
cs/0612029 | Ming-Zhe Chen | Ming-Zhe Chen | A Classification of 6R Manipulators | 4 pages | null | null | null | cs.RO | null | This paper presents a classification of generic 6-revolute jointed (6R)
manipulators using homotopy class of their critical point manifold. A part of
classification is listed in this paper because of the complexity of homotopy
class of 4-torus. The results of this classification will serve future research
of the classification and topological properties of maniplators joint space and
workspace.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 16:04:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"Ming-Zhe",
""
]
]
|
cs/0612031 | Andrew McGregor | Andrew McGregor and S. Muthukrishnan | Estimating Aggregate Properties on Probabilistic Streams | 11 pages | null | null | null | cs.DS cs.DB | null | The probabilistic-stream model was introduced by Jayram et al. \cite{JKV07}.
It is a generalization of the data stream model that is suited to handling
``probabilistic'' data where each item of the stream represents a probability
distribution over a set of possible events. Therefore, a probabilistic stream
determines a distribution over potentially a very large number of classical
"deterministic" streams where each item is deterministically one of the domain
values. The probabilistic model is applicable for not only analyzing streams
where the input has uncertainties (such as sensor data streams that measure
physical processes) but also where the streams are derived from the input data
by post-processing, such as tagging or reconciling inconsistent and poor
quality data.
We present streaming algorithms for computing commonly used aggregates on a
probabilistic stream. We present the first known, one pass streaming algorithm
for estimating the \AVG, improving results in \cite{JKV07}. We present the
first known streaming algorithms for estimating the number of \DISTINCT items
on probabilistic streams. Further, we present extensions to other aggregates
such as the repeat rate, quantiles, etc. In all cases, our algorithms work with
provable accuracy guarantees and within the space constraints of the data
stream model.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 23:34:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"McGregor",
"Andrew",
""
],
[
"Muthukrishnan",
"S.",
""
]
]
|
cs/0612034 | Jean-Marc Fran\c{c}ois | Jean-Marc Francois and Guy Leduc | Predictable Disruption Tolerant Networks and Delivery Guarantees | 9 pages | null | null | null | cs.NI | null | This article studies disruption tolerant networks (DTNs) where each node
knows the probabilistic distribution of contacts with other nodes. It proposes
a framework that allows one to formalize the behaviour of such a network. It
generalizes extreme cases that have been studied before where (a) either nodes
only know their contact frequency with each other or (b) they have a perfect
knowledge of who meets who and when. This paper then gives an example of how
this framework can be used; it shows how one can find a packet forwarding
algorithm optimized to meet the 'delay/bandwidth consumption' trade-off:
packets are duplicated so as to (statistically) guarantee a given delay or
delivery probability, but not too much so as to reduce the bandwidth, energy,
and memory consumption.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 13:57:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Francois",
"Jean-Marc",
""
],
[
"Leduc",
"Guy",
""
]
]
|
cs/0612035 | Vincent Gramoli | Antonio Fernandez (LADYR), Vincent Gramoli (IRISA), Ernesto Jimenez
(EUI), Anne-Marie Kermarrec (IRISA), Michel Raynal (IRISA) | Distributed Slicing in Dynamic Systems | null | null | null | null | cs.DC | null | Peer to peer (P2P) systems are moving from application specific architectures
to a generic service oriented design philosophy. This raises interesting
problems in connection with providing useful P2P middleware services that are
capable of dealing with resource assignment and management in a large-scale,
heterogeneous and unreliable environment. One such service, the slicing
service, has been proposed to allow for an automatic partitioning of P2P
networks into groups (slices) that represent a controllable amount of some
resource and that are also relatively homogeneous with respect to that
resource, in the face of churn and other failures. In this report we propose
two algorithms to solve the distributed slicing problem. The first algorithm
improves upon an existing algorithm that is based on gossip-based sorting of a
set of uniform random numbers. We speed up convergence via a heuristic for
gossip peer selection. The second algorithm is based on a different approach:
statistical approximation of the rank of nodes in the ordering. The
scalability, efficiency and resilience to dynamics of both algorithms relies on
their gossip-based models. We present theoretical and experimental results to
prove the viability of these algorithms.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 13:57:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fernandez",
"Antonio",
"",
"LADYR"
],
[
"Gramoli",
"Vincent",
"",
"IRISA"
],
[
"Jimenez",
"Ernesto",
"",
"EUI"
],
[
"Kermarrec",
"Anne-Marie",
"",
"IRISA"
],
[
"Raynal",
"Michel",
"",
"IRISA"
]
]
|
cs/0612036 | Fr\'ed\'eric Vivien | Jack Dongarra, Jean-Francois Pineau, Yves Robert, Zhiao Shi, and
Frederic Vivien | Revisiting Matrix Product on Master-Worker Platforms | null | null | null | null | cs.DC cs.MS | null | This paper is aimed at designing efficient parallel matrix-product algorithms
for heterogeneous master-worker platforms. While matrix-product is
well-understood for homogeneous 2D-arrays of processors (e.g., Cannon algorithm
and ScaLAPACK outer product algorithm), there are three key hypotheses that
render our work original and innovative:
- Centralized data. We assume that all matrix files originate from, and must
be returned to, the master.
- Heterogeneous star-shaped platforms. We target fully heterogeneous
platforms, where computational resources have different computing powers.
- Limited memory. Because we investigate the parallelization of large
problems, we cannot assume that full matrix panels can be stored in the worker
memories and re-used for subsequent updates (as in ScaLAPACK).
We have devised efficient algorithms for resource selection (deciding which
workers to enroll) and communication ordering (both for input and result
messages), and we report a set of numerical experiments on various platforms at
Ecole Normale Superieure de Lyon and the University of Tennessee. However, we
point out that in this first version of the report, experiments are limited to
homogeneous platforms.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 14:34:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dongarra",
"Jack",
""
],
[
"Pineau",
"Jean-Francois",
""
],
[
"Robert",
"Yves",
""
],
[
"Shi",
"Zhiao",
""
],
[
"Vivien",
"Frederic",
""
]
]
|
cs/0612038 | Vladimir Anashin | Vladimir Anashin | Non-Archimedean analysis, T-functions, and cryptography | 53 pages, 9 figures, LaTeX 2e. Lecture notes of a 20-hour course at
the International Summer School `Mathematical Methods and Technologies in
Computer Security' at Lomonosov Moscow State University, July 9--23, 2006 | null | null | null | cs.CR math.DS | null | These are lecture notes of a 20-hour course at the International Summer
School \emph{Mathematical Methods and Technologies in Computer Security} at
Lomonosov Moscow State University, July 9--23, 2006.
Loosely speaking, a $T$-function is a map of $n$-bit words into $n$-bit words
such that each $i$-th bit of image depends only on low-order bits $0,..., i$ of
the pre-image. For example, all arithmetic operations (addition,
multiplication) are $T$-functions, all bitwise logical operations ($\XOR$,
$\AND$, etc.) are $T$-functions. Any composition of $T$-functions is a
$T$-function as well. Thus $T$-functions are natural computer word-oriented
functions.
It turns out that $T$-functions are continuous (and often differentiable!)
functions with respect to the so-called 2-adic distance. This observation gives
a powerful tool to apply 2-adic analysis to construct wide classes of
$T$-functions with provable cryptographic properties (long period, balance,
uniform distribution, high linear complexity, etc.); these functions currently
are being used in new generation of fast stream ciphers. We consider these
ciphers as specific automata that could be associated to dynamical systems on
the space of 2-adic integers. From this view the lectures could be considered
as a course in cryptographic applications of the non-Archimedean dynamics; the
latter has recently attracted significant attention in connection with
applications to physics, biology and cognitive sciences.
During the course listeners study non-Archimedean machinery and its
applications to stream cipher design.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 15:11:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Anashin",
"Vladimir",
""
]
]
|
cs/0612039 | Raghav Aras | Raghav Aras (INRIA Lorraine - LORIA), Alain Dutech (INRIA Lorraine -
LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA) | Computing the Equilibria of Bimatrix Games using Dominance Heuristics | null | null | null | null | cs.GT | null | We propose a formulation of a general-sum bimatrix game as a bipartite
directed graph with the objective of establishing a correspondence between the
set of the relevant structures of the graph (in particular elementary cycles)
and the set of the Nash equilibria of the game. We show that finding the set of
elementary cycles of the graph permits the computation of the set of
equilibria. For games whose graphs have a sparse adjacency matrix, this serves
as a good heuristic for computing the set of equilibria. The heuristic also
allows the discarding of sections of the support space that do not yield any
equilibrium, thus serving as a useful pre-processing step for algorithms that
compute the equilibria through support enumeration.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 15:55:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aras",
"Raghav",
"",
"INRIA Lorraine - LORIA"
],
[
"Dutech",
"Alain",
"",
"INRIA Lorraine -\n LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0612043 | Paul Vitanyi | R. Cilibrasi (CWI), Z. Lotker (CWI), A. Navarra (LaBRI - Univ.
Bordeaux 1), S. Perennes (CNRS/INRIA/Univ. Nice), P. Vitanyi (CWI/Univ.
Amsterdam) | About the Lifespan of Peer to Peer Networks | 15 pages, LaTeX, 1 figure, Proc. 10th Int'nl Conf. Principles Of
Distributed Systems (OPODIS), Lecture Notes in Computer Science, Vol. 4305,
Springer Verlag, Berlin, 2006, 290--305 | null | null | null | cs.DC cs.IR | null | We analyze the ability of peer to peer networks to deliver a complete file
among the peers. Early on we motivate a broad generalization of network
behavior organizing it into one of two successive phases. According to this
view the network has two main states: first centralized - few sources (roots)
hold the complete file, and next distributed - peers hold some parts (chunks)
of the file such that the entire network has the whole file, but no individual
has it. In the distributed state we study two scenarios, first, when the peers
are ``patient'', i.e, do not leave the system until they obtain the complete
file; second, peers are ``impatient'' and almost always leave the network
before obtaining the complete file.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 16:20:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cilibrasi",
"R.",
"",
"CWI"
],
[
"Lotker",
"Z.",
"",
"CWI"
],
[
"Navarra",
"A.",
"",
"LaBRI - Univ.\n Bordeaux 1"
],
[
"Perennes",
"S.",
"",
"CNRS/INRIA/Univ. Nice"
],
[
"Vitanyi",
"P.",
"",
"CWI/Univ.\n Amsterdam"
]
]
|
cs/0612045 | Vincent Borrel | Vincent Borrel, Franck Legendre, Marcelo Dias de Amorim, Serge Fdida | SIMPS: Using Sociology for Personal Mobility | null | null | null | null | cs.NI | null | Assessing mobility in a thorough fashion is a crucial step toward more
efficient mobile network design. Recent research on mobility has focused on two
main points: analyzing models and studying their impact on data transport.
These works investigate the consequences of mobility. In this paper, instead,
we focus on the causes of mobility. Starting from established research in
sociology, we propose SIMPS, a mobility model of human crowd motion. This model
defines two complimentary behaviors, namely socialize and isolate, that
regulate an individual with regard to her/his own sociability level. SIMPS
leads to results that agree with scaling laws observed both in small-scale and
large-scale human motion. Although our model defines only two simple individual
behaviors, we observe many emerging collective behaviors (group
formation/splitting, path formation, and evolution). To our knowledge, SIMPS is
the first model in the networking community that tackles the roots governing
mobility.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 21:29:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Borrel",
"Vincent",
""
],
[
"Legendre",
"Franck",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Fdida",
"Serge",
""
]
]
|
cs/0612046 | Kristina Lerman | Kristina Lerman | Social Networks and Social Information Filtering on Digg | 8 pages, 5 figures Submitted to the International Conference on
Weblogs and Social Media | null | null | null | cs.HC cs.AI cs.IR | null | The new social media sites -- blogs, wikis, Flickr and Digg, among others --
underscore the transformation of the Web to a participatory medium in which
users are actively creating, evaluating and distributing information. Digg is a
social news aggregator which allows users to submit links to, vote on and
discuss news stories. Each day Digg selects a handful of stories to feature on
its front page. Rather than rely on the opinion of a few editors, Digg
aggregates opinions of thousands of its users to decide which stories to
promote to the front page.
Digg users can designate other users as ``friends'' and easily track friends'
activities: what new stories they submitted, commented on or read. The friends
interface acts as a \emph{social filtering} system, recommending to user
stories his or her friends liked or found interesting. By tracking the votes
received by newly submitted stories over time, we showed that social filtering
is an effective information filtering approach. Specifically, we showed that
(a) users tend to like stories submitted by friends and (b) users tend to like
stories their friends read and liked. As a byproduct of social filtering,
social networks also play a role in promoting stories to Digg's front page,
potentially leading to ``tyranny of the minority'' situation where a
disproportionate number of front page stories comes from the same small group
of interconnected users. Despite this, social filtering is a promising new
technology that can be used to personalize and tailor information to individual
users: for example, through personal front pages.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 23:38:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lerman",
"Kristina",
""
]
]
|
cs/0612047 | Kristina Lerman | Kristina Lerman and Laurie Jones | Social Browsing on Flickr | 8 pages; submitted to the International Conference on Weblogs and
Social Media | null | null | null | cs.HC cs.AI | null | The new social media sites - blogs, wikis, del.icio.us and Flickr, among
others - underscore the transformation of the Web to a participatory medium in
which users are actively creating, evaluating and distributing information. The
photo-sharing site Flickr, for example, allows users to upload photographs,
view photos created by others, comment on those photos, etc. As is common to
other social media sites, Flickr allows users to designate others as
``contacts'' and to track their activities in real time. The contacts (or
friends) lists form the social network backbone of social media sites. We claim
that these social networks facilitate new ways of interacting with information,
e.g., through what we call social browsing. The contacts interface on Flickr
enables users to see latest images submitted by their friends. Through an
extensive analysis of Flickr data, we show that social browsing through the
contacts' photo streams is one of the primary methods by which users find new
images on Flickr. This finding has implications for creating personalized
recommendation systems based on the user's declared contacts lists.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 23:41:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lerman",
"Kristina",
""
],
[
"Jones",
"Laurie",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.