id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0612048
Changjia Chen
chunxi li and changjia chen
Queue Model of Leaf Degree Keeping Process in Gnutella Network
3 pages, 6 figures
null
null
null
cs.NI cs.PF
null
Leaf degree keeping process of Gnutella is discussed in this paper. Queue system based on rules of Gnutella protocol are introduced to modeling this process. The leaf degree distributions resulted from the queue system and from our real measurement are compared. The well match of those distributions reveal that the leaf degree distribution in Gnutella network should not be power law or power law like as reported before. It is more likely a distribution driven by certain queue process specified by the protocol.
[ { "version": "v1", "created": "Fri, 8 Dec 2006 00:44:26 GMT" } ]
2007-05-23T00:00:00
[ [ "li", "chunxi", "" ], [ "chen", "changjia", "" ] ]
cs/0612052
Jon Feldman
Jon Feldman, S. Muthukrishnan, Martin Pal, Cliff Stein
Budget Optimization in Search-Based Advertising Auctions
null
null
null
null
cs.DS cs.CE cs.GT
null
Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem.
[ { "version": "v1", "created": "Fri, 8 Dec 2006 17:33:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Feldman", "Jon", "" ], [ "Muthukrishnan", "S.", "" ], [ "Pal", "Martin", "" ], [ "Stein", "Cliff", "" ] ]
cs/0612054
Wojciech Mazurczyk
Wojciech Mazurczyk, Zbigniew Kotulski
Lightweight security mechanism for PSTN-VoIP cooperation
6 pages, 5 figures
null
null
null
cs.CR cs.MM
null
In this paper we describe a new, lightweight security mechanism for PSTN-VoIP cooperation that is based on two information hiding techniques: digital watermarking and steganography. Proposed scheme is especially suitable for PSTN-IP-PSTN (toll-by-passing) scenario which nowadays is very popular application of IP Telephony systems. With the use of this mechanism we authenticate end-to-end transmitted voice between PSTN users. Additionally we improve IP part traffic security (both media stream and VoIP signalling messages). Exemplary scenario is presented for SIP signalling protocol along with SIP-T extension and H.248/Megaco protocol.
[ { "version": "v1", "created": "Fri, 8 Dec 2006 22:05:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0612055
Milan Ruzic
Anna Pagh and Rasmus Pagh and Milan Ruzic
Linear Probing with Constant Independence
13 pages
null
null
null
cs.DS cs.DB
null
Hashing with linear probing dates back to the 1950s, and is among the most studied algorithms. In recent years it has become one of the most important hash table organizations since it uses the cache of modern computers very well. Unfortunately, previous analysis rely either on complicated and space consuming hash functions, or on the unrealistic assumption of free access to a truly random hash function. Already Carter and Wegman, in their seminal paper on universal hashing, raised the question of extending their analysis to linear probing. However, we show in this paper that linear probing using a pairwise independent family may have expected {\em logarithmic} cost per operation. On the positive side, we show that 5-wise independence is enough to ensure constant expected time per operation. This resolves the question of finding a space and time efficient hash function that provably ensures good performance for linear probing.
[ { "version": "v1", "created": "Fri, 8 Dec 2006 22:50:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Pagh", "Anna", "" ], [ "Pagh", "Rasmus", "" ], [ "Ruzic", "Milan", "" ] ]
cs/0612056
Gayathree U
U. Gayathree
Conscious Intelligent Systems - Part 1 : I X I
null
null
null
null
cs.AI
null
Did natural consciousness and intelligent systems arise out of a path that was co-evolutionary to evolution? Can we explain human self-consciousness as having risen out of such an evolutionary path? If so how could it have been? In this first part of a two-part paper (titled IXI), we take a learning system perspective to the problem of consciousness and intelligent systems, an approach that may look unseasonable in this age of fMRI's and high tech neuroscience. We posit conscious intelligent systems in natural environments and wonder how natural factors influence their design paths. Such a perspective allows us to explain seamlessly a variety of natural factors, factors ranging from the rise and presence of the human mind, man's sense of I, his self-consciousness and his looping thought processes to factors like reproduction, incubation, extinction, sleep, the richness of natural behavior, etc. It even allows us to speculate on a possible human evolution scenario and other natural phenomena.
[ { "version": "v1", "created": "Sat, 9 Dec 2006 17:18:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Gayathree", "U.", "" ] ]
cs/0612057
Gayathree U
U. Gayathree
Conscious Intelligent Systems - Part II - Mind, Thought, Language and Understanding
null
null
null
null
cs.AI
null
This is the second part of a paper on Conscious Intelligent Systems. We use the understanding gained in the first part (Conscious Intelligent Systems Part 1: IXI (arxiv id cs.AI/0612056)) to look at understanding. We see how the presence of mind affects understanding and intelligent systems; we see that the presence of mind necessitates language. The rise of language in turn has important effects on understanding. We discuss the humanoid question and how the question of self-consciousness (and by association mind/thought/language) would affect humanoids too.
[ { "version": "v1", "created": "Sat, 9 Dec 2006 17:28:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Gayathree", "U.", "" ] ]
cs/0612058
Eric Vigoda
Daniel Stefankovic, Santosh Vempala, Eric Vigoda
Adaptive Simulated Annealing: A Near-optimal Connection between Sampling and Counting
null
null
null
null
cs.DS cs.DM
null
We present a near-optimal reduction from approximately counting the cardinality of a discrete set to approximately sampling elements of the set. An important application of our work is to approximating the partition function $Z$ of a discrete system, such as the Ising model, matchings or colorings of a graph. The typical approach to estimating the partition function $Z(\beta^*)$ at some desired inverse temperature $\beta^*$ is to define a sequence, which we call a {\em cooling schedule}, $\beta_0=0<\beta_1<...<\beta_\ell=\beta^*$ where Z(0) is trivial to compute and the ratios $Z(\beta_{i+1})/Z(\beta_i)$ are easy to estimate by sampling from the distribution corresponding to $Z(\beta_i)$. Previous approaches required a cooling schedule of length $O^*(\ln{A})$ where $A=Z(0)$, thereby ensuring that each ratio $Z(\beta_{i+1})/Z(\beta_i)$ is bounded. We present a cooling schedule of length $\ell=O^*(\sqrt{\ln{A}})$. For well-studied problems such as estimating the partition function of the Ising model, or approximating the number of colorings or matchings of a graph, our cooling schedule is of length $O^*(\sqrt{n})$, which implies an overall savings of $O^*(n)$ in the running time of the approximate counting algorithm (since roughly $\ell$ samples are needed to estimate each ratio).
[ { "version": "v1", "created": "Sun, 10 Dec 2006 20:00:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Stefankovic", "Daniel", "" ], [ "Vempala", "Santosh", "" ], [ "Vigoda", "Eric", "" ] ]
cs/0612060
Sreyash Kenkre
Sreyash Kenkre, Sundar Vishwanathan
The Common Prefix Problem On Trees
8 pages
null
null
null
cs.DS cs.CC
null
We present a theoretical study of a problem arising in database query optimization, which we call as The Common Prefix Problem. We present a $(1-o(1))$ factor approximation algorithm for this problem, when the underlying graph is a binary tree. We then use a result of Feige and Kogan to show that even on stars, the problem is hard to approximate.
[ { "version": "v1", "created": "Mon, 11 Dec 2006 12:32:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Kenkre", "Sreyash", "" ], [ "Vishwanathan", "Sundar", "" ] ]
cs/0612062
Federico Calzolari
Federico Calzolari, Michele Mammini, Monica Monachini
Unifying Lexicons in view of a Phonological and Morphological Lexical DB
4 pages
null
null
null
cs.IR
null
The present work falls in the line of activities promoted by the European Languguage Resource Association (ELRA) Production Committee (PCom) and raises issues in methods, procedures and tools for the reusability, creation, and management of Language Resources. A two-fold purpose lies behind this experiment. The first aim is to investigate the feasibility, define methods and procedures for combining two Italian lexical resources that have incompatible formats and complementary information into a Unified Lexicon (UL). The adopted strategy and the procedures appointed are described together with the driving criterion of the merging task, where a balance between human and computational efforts is pursued. The coverage of the UL has been maximized, by making use of simple and fast matching procedures. The second aim is to exploit this newly obtained resource for implementing the phonological and morphological layers of the CLIPS lexical database. Implementing these new layers and linking them with the already exisitng syntactic and semantic layers is not a trivial task. The constraints imposed by the model, the impact at the architectural level and the solution adopted in order to make the whole database `speak' efficiently are presented. Advantages vs. disadvantages are discussed.
[ { "version": "v1", "created": "Mon, 11 Dec 2006 14:45:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Calzolari", "Federico", "" ], [ "Mammini", "Michele", "" ], [ "Monachini", "Monica", "" ] ]
cs/0612066
Karim El Defrawy
Karim El Defrawy, Athina Markopoulou and Katerina Argyraki
Optimal Filtering for DDoS Attacks
13 pages, 14 figures
null
null
null
cs.NI
null
Distributed Denial-of-Service (DDoS) attacks are a major problem in the Internet today. In one form of a DDoS attack, a large number of compromised hosts send unwanted traffic to the victim, thus exhausting the resources of the victim and preventing it from serving its legitimate clients. One of the main mechanisms that have been proposed to deal with DDoS is filtering, which allows routers to selectively block unwanted traffic. Given the magnitude of DDoS attacks and the high cost of filters in the routers today, the successful mitigation of a DDoS attack using filtering crucially depends on the efficient allocation of filtering resources. In this paper, we consider a single router, typically the gateway of the victim, with a limited number of available filters. We study how to optimally allocate filters to attack sources, or entire domains of attack sources, so as to maximize the amount of good traffic preserved, under a constraint on the number of filters. We formulate the problem as an optimization problem and solve it optimally using dynamic programming, study the properties of the optimal allocation, experiment with a simple heuristic and evaluate our solutions for a range of realistic attack-scenarios. First, we look at a single-tier where the collateral damage is high due to the filtering at the granularity of domains. Second, we look at the two-tier problem where we have an additional constraint on the number of filters and the filtering is performed on the granularity of attackers and domains.
[ { "version": "v1", "created": "Tue, 12 Dec 2006 04:52:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Defrawy", "Karim El", "" ], [ "Markopoulou", "Athina", "" ], [ "Argyraki", "Katerina", "" ] ]
cs/0612068
Esben Rune Hansen
Esben Rune Hansen and Henrik Reif Andersen
Interactive Configuration by Regular String Constraints
Tech Report
null
null
null
cs.AI
null
A product configurator which is complete, backtrack free and able to compute the valid domains at any state of the configuration can be constructed by building a Binary Decision Diagram (BDD). Despite the fact that the size of the BDD is exponential in the number of variables in the worst case, BDDs have proved to work very well in practice. Current BDD-based techniques can only handle interactive configuration with small finite domains. In this paper we extend the approach to handle string variables constrained by regular expressions. The user is allowed to change the strings by adding letters at the end of the string. We show how to make a data structure that can perform fast valid domain computations given some assignment on the set of string variables. We first show how to do this by using one large DFA. Since this approach is too space consuming to be of practical use, we construct a data structure that simulates the large DFA and in most practical cases are much more space efficient. As an example a configuration problem on $n$ string variables with only one solution in which each string variable is assigned to a value of length of $k$ the former structure will use $\Omega(k^n)$ space whereas the latter only need $O(kn)$. We also show how this framework easily can be combined with the recent BDD techniques to allow both boolean, integer and string variables in the configuration problem.
[ { "version": "v1", "created": "Tue, 12 Dec 2006 16:21:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Hansen", "Esben Rune", "" ], [ "Andersen", "Henrik Reif", "" ] ]
cs/0612070
Ilya Safro Mr.
Sergey Benditkis, Illya Safro
Generalizations of the Hanoi Towers Problem
null
null
null
null
cs.DM
null
Our theme bases on the classical Hanoi Towers Problem. In this paper we will define a new problem, permitting some positions, that were not legal in the classical problem. Our goal is to find an optimal (shortest possible) sequence of discs' moves. Besides that, we will research all versions of 3-pegs classical problem with some special constraints, when some types of moves are disallowed.
[ { "version": "v1", "created": "Wed, 13 Dec 2006 22:30:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Benditkis", "Sergey", "" ], [ "Safro", "Illya", "" ] ]
cs/0612071
Francis Heylighen
Francis Heylighen
Why is Open Access Development so Successful? Stigmergic organization and the economics of information
null
in: B. Lutterbeck, M. Baerwolff & R. A. Gehring (eds.), Open Source Jahrbuch 2007, Lehmanns Media, 2007
null
ECCO Working Paper 2006-06
cs.CY cs.DL physics.soc-ph
null
The explosive development of "free" or "open source" information goods contravenes the conventional wisdom that markets and commercial organizations are necessary to efficiently supply products. This paper proposes a theoretical explanation for this phenomenon, using concepts from economics and theories of self-organization. Once available on the Internet, information is intrinsically not a scarce good, as it can be replicated virtually without cost. Moreover, freely distributing information is profitable to its creator, since it improves the quality of the information, and enhances the creator's reputation. This provides a sufficient incentive for people to contribute to open access projects. Unlike traditional organizations, open access communities are open, distributed and self-organizing. Coordination is achieved through stigmergy: listings of "work-in-progress" direct potential contributors to the tasks where their contribution is most likely to be fruitful. This obviates the need both for centralized planning and for the "invisible hand" of the market.
[ { "version": "v1", "created": "Thu, 14 Dec 2006 12:15:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Heylighen", "Francis", "" ] ]
cs/0612074
Zengjian Hu
Petra Berenbrink and Colin Cooper and Zengjian Hu
Energy Efficient Randomized Communication in Unknown AdHoc Networks
15 pages. 1 figure
null
null
null
cs.DC cs.DS
null
This paper studies broadcasting and gossiping algorithms in random and general AdHoc networks. Our goal is not only to minimise the broadcasting and gossiping time, but also to minimise the energy consumption, which is measured in terms of the total number of messages (or transmissions) sent. We assume that the nodes of the network do not know the network, and that they can only send with a fixed power, meaning they can not adjust the areas sizes that their messages cover. We believe that under these circumstances the number of transmissions is a very good measure for the overall energy consumption. For random networks, we present a broadcasting algorithm where every node transmits at most once. We show that our algorithm broadcasts in $O(\log n)$ steps, w.h.p, where $n$ is the number of nodes. We then present a $O(d \log n)$ ($d$ is the expected degree) gossiping algorithm using $O(\log n)$ messages per node. For general networks with known diameter $D$, we present a randomised broadcasting algorithm with optimal broadcasting time $O(D \log (n/D) + \log^2 n)$ that uses an expected number of $O(\log^2 n / \log (n/D))$ transmissions per node. We also show a tradeoff result between the broadcasting time and the number of transmissions: we construct a network such that any oblivious algorithmusing a time-invariant distribution requires $\Omega(\log^2 n / \log (n/D))$ messages per node in order to finish broadcasting in optimal time. This demonstrates the tightness of our upper bound. We also show that no oblivious algorithm can complete broadcasting w.h.p. using $o(\log n)$ messages per node.
[ { "version": "v1", "created": "Fri, 15 Dec 2006 03:43:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Berenbrink", "Petra", "" ], [ "Cooper", "Colin", "" ], [ "Hu", "Zengjian", "" ] ]
cs/0612081
Manas Tungare
Manas Tungare, Pardha S. Pyla, Manuel P\'erez-Qui\~nones, and Steve Harrison
Personal Information Ecosystems and Implications for Design
null
null
null
null
cs.HC
null
Today, people use multiple devices to fulfill their information needs. However, designers design each device individually, without accounting for the other devices that users may also use. In many cases, the applications on all these devices are designed to be functional replicates of each other. We argue that this results in an over-reliance on data synchronization across devices, version control nightmares, and increased burden of file management. In this paper, we present the idea of a \textit{personal information ecosystem}, an analogy to biological ecosystems, which allows us to discuss the inter-relationships among these devices to fulfill the information needs of the user. There is a need for designers to design devices as part of a complete ecosystem, not as independent devices that simply share data replicated across them. To help us understand this domain and to facilitate the dialogue and study of such systems, we present the terminology, classifications of the interdependencies among different devices, and resulting implications for design.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 07:53:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Tungare", "Manas", "" ], [ "Pyla", "Pardha S.", "" ], [ "Pérez-Quiñones", "Manuel", "" ], [ "Harrison", "Steve", "" ] ]
cs/0612082
Thierry Despeyroux
Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis)
Developing efficient parsers in Prolog: the CLF manual (v1.0)
null
null
null
null
cs.SE
null
This document describes a couple of tools that help to quickly design and develop computer (formalized) languages. The first one use Flex to perform lexical analysis and the second is an extention of Prolog DCGs to perfom syntactical analysis. Initially designed as a new component for the Centaur system, these tools are now available independently and can be used to construct efficient Prolog parsers that can be integrated in Prolog or heterogeneous systems. This is the initial version of the CLF documentation. Updated version will be available online when necessary.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 08:40:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Despeyroux", "Thierry", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ] ]
cs/0612085
Roberto Bagnara
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
The Parma Polyhedra Library: Toward a Complete Set of Numerical Abstractions for the Analysis and Verification of Hardware and Software Systems
38 pages, 2 figures, 3 listings, 3 tables
null
null
Quaderno 457
cs.MS cs.PL
null
Since its inception as a student project in 2001, initially just for the handling (as the name implies) of convex polyhedra, the Parma Polyhedra Library has been continuously improved and extended by joining scrupulous research on the theoretical foundations of (possibly non-convex) numerical abstractions to a total adherence to the best available practices in software development. Even though it is still not fully mature and functionally complete, the Parma Polyhedra Library already offers a combination of functionality, reliability, usability and performance that is not matched by similar, freely available libraries. In this paper, we present the main features of the current version of the library, emphasizing those that distinguish it from other similar libraries and those that are important for applications in the field of analysis and verification of hardware and software systems.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 10:15:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagnara", "Roberto", "" ], [ "Hill", "Patricia M.", "" ], [ "Zaffanella", "Enea", "" ] ]
cs/0612088
Julien Robert
Julien Robert and Nicolas Schabanel
Non-Clairvoyant Batch Sets Scheduling: Fairness is Fair enough
12 pages, 1 figure
null
null
null
cs.DC cs.DS
null
Scheduling questions arise naturally in many different areas among which operating system design, compiling,... In real life systems, the characteristics of the jobs (such as release time and processing time) are usually unknown and unpredictable beforehand. The system is typically unaware of the remaining work in each job or of the ability of the job to take advantage of more resources. Following these observations, we adopt the job model by Edmonds et al (2000, 2003) in which the jobs go through a sequence of different phases. Each phase consists of a certain quantity of work and a speed-up function that models how it takes advantage of the number of processors it receives. We consider the non-clairvoyant online setting where a collection of jobs arrives at time 0. We consider the metrics setflowtime introduced by Robert et al (2007). The goal is to minimize the sum of the completion time of the sets, where a set is completed when all of its jobs are done. If the input consists of a single set of jobs, this is simply the makespan of the jobs; and if the input consists of a collection of singleton sets, it is simply the flowtime of the jobs. We show that the non-clairvoyant strategy EQUIoEQUI that evenly splits the available processors among the still unserved sets and then evenly splits these processors among the still uncompleted jobs of each unserved set, achieves a competitive ratio (2+\sqrt3+o(1))\frac{ln n}{lnln n} for the setflowtime minimization and that this is asymptotically optimal (up to a constant factor), where n is the size of the largest set. For makespan minimization, we show that the non-clairvoyant strategy EQUI achieves a competitive ratio of (1+o(1))\frac{ln n}{lnln n}, which is again asymptotically optimal.
[ { "version": "v1", "created": "Tue, 19 Dec 2006 15:19:59 GMT" }, { "version": "v2", "created": "Tue, 19 Dec 2006 21:55:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Julien", "" ], [ "Schabanel", "Nicolas", "" ] ]
cs/0612090
Vita Hinze-Hoare
Vita Hinze-Hoare
A Review of Papers that have a bearing on an Analysis of User Interactions in A Collaborative On-line Laboratory
null
null
null
null
cs.HC
null
A number of papers have been reviewed in the areas of HCI, CSCW, CSCL. These have been analyzed with a view to extract the ideas relevant to a consideration of user interactions in a collaborative on line laboratory which is being under development for use in the ITO BSc course at Southampton University. The construction of new theoretical models is to be based upon principles of collaborative HCI design and constructivist and situational educational theory. An investigation of the review papers it is hoped will lead towards a methodology/framework that can be used as guidance for collaborative learning systems and these will need to be developed alongside the requirements as they change during the development cycles. The primary outcome will be the analysis and re-design of the online e-learning laboratory together with a measure of its efficacy in the learning process.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 22:24:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
cs/0612092
Ahmed Sidky Ahmed Sidky
Ahmed Sidky, James Arthur
Agile Adoption Process Framework
This is a reference document containing an overview of the adoption framework along with all the indicators used for the assessment of the agile practices
null
null
null
cs.SE
null
Today many organizations aspire to adopt agile processes in hope of overcoming some of the difficulties they are facing with their current software development process. There is no structured framework for the agile adoption process. This paper presents a 3-Stage process framework that assists organization and guides organizations through their agile adoption efforts. The Process Framework has been received significantly positive feedback from experts and leaders in agile adoption industry.
[ { "version": "v1", "created": "Tue, 19 Dec 2006 16:35:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidky", "Ahmed", "" ], [ "Arthur", "James", "" ] ]
cs/0612093
Jo\~ao Barros
Miguel S. Silva, Francisco Martins, Luis Lopes, Joao Barros
A Calculus for Sensor Networks
24 pages, 1 figure, submitted for publication
null
null
null
cs.DC cs.PL
null
We consider the problem of providing a rigorous model for programming wireless sensor networks. Assuming that collisions, packet losses, and errors are dealt with at the lower layers of the protocol stack, we propose a Calculus for Sensor Networks (CSN) that captures the main abstractions for programming applications for this class of devices. Besides providing the syntax and semantics for the calculus, we show its expressiveness by providing implementations for several examples of typical operations on sensor networks. Also included is a detailed discussion of possible extensions to CSN that enable the modeling of other important features of these networks such as sensor state, sampling strategies, and network security.
[ { "version": "v1", "created": "Tue, 19 Dec 2006 14:45:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Silva", "Miguel S.", "" ], [ "Martins", "Francisco", "" ], [ "Lopes", "Luis", "" ], [ "Barros", "Joao", "" ] ]
cs/0612098
Manik Lal Das
Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
Algorithms and Approaches of Proxy Signature: A Survey
29 pages
null
null
null
cs.CR
null
Numerous research studies have been investigated on proxy signatures over the last decade. This survey reviews the research progress on proxy signatures, analyzes a few notable proposals, and provides an overall remark of these proposals.
[ { "version": "v1", "created": "Wed, 20 Dec 2006 06:09:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Das", "Manik Lal", "" ], [ "Saxena", "Ashutosh", "" ], [ "Phatak", "Deepak B.", "" ] ]
cs/0612100
Rob van Stee
Leah Epstein and Rob van Stee
Improved results for a memory allocation problem
null
null
null
null
cs.DS
null
We consider a memory allocation problem that can be modeled as a version of bin packing where items may be split, but each bin may contain at most two (parts of) items. A 3/2-approximation algorithm and an NP-hardness proof for this problem was given by Chung et al. We give a simpler 3/2-approximation algorithm for it which is in fact an online algorithm. This algorithm also has good performance for the more general case where each bin may contain at most k parts of items. We show that this general case is also strongly NP-hard. Additionally, we give an efficient 7/5-approximation algorithm.
[ { "version": "v1", "created": "Wed, 20 Dec 2006 13:39:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Epstein", "Leah", "" ], [ "van Stee", "Rob", "" ] ]
cs/0612102
Nilesh Dalvi
Nilesh Dalvi and Dan Suciu
The Dichotomy of Conjunctive Queries on Probabilistic Structures
null
null
null
null
cs.DB
null
We show that for every conjunctive query, the complexity of evaluating it on a probabilistic database is either \PTIME or #\P-complete, and we give an algorithm for deciding whether a given conjunctive query is \PTIME or #\P-complete. The dichotomy property is a fundamental result on query evaluation on probabilistic databases and it gives a complete classification of the complexity of conjunctive queries.
[ { "version": "v1", "created": "Wed, 20 Dec 2006 21:11:05 GMT" }, { "version": "v2", "created": "Sat, 13 Jan 2007 06:51:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Dalvi", "Nilesh", "" ], [ "Suciu", "Dan", "" ] ]
cs/0612103
Vibhor Rastogi
Vibhor Rastogi, Dan Suciu, Sungho Hong
The Boundary Between Privacy and Utility in Data Anonymization
null
null
null
null
cs.DB
null
We consider the privacy problem in data publishing: given a relation I containing sensitive information 'anonymize' it to obtain a view V such that, on one hand attackers cannot learn any sensitive information from V, and on the other hand legitimate users can use V to compute useful statistics on I. These are conflicting goals. We use a definition of privacy that is derived from existing ones in the literature, which relates the a priori probability of a given tuple t, Pr(t), with the a posteriori probability, Pr(t | V), and propose a novel and quite practical definition for utility. Our main result is the following. Denoting n the size of I and m the size of the domain from which I was drawn (i.e. n < m) then: when the a priori probability is Pr(t) = Omega(n/sqrt(m)) for some t, there exists no useful anonymization algorithm, while when Pr(t) = O(n/m) for all tuples t, then we give a concrete anonymization algorithm that is both private and useful. Our algorithm is quite different from the k-anonymization algorithm studied intensively in the literature, and is based on random deletions and insertions to I.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 00:21:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Rastogi", "Vibhor", "" ], [ "Suciu", "Dan", "" ], [ "Hong", "Sungho", "" ] ]
cs/0612104
Keki Burjorjee
Keki Burjorjee
Sufficient Conditions for Coarse-Graining Evolutionary Dynamics
19 pages, 1 figure. Accepted to the Foundations of Genetic Algorithms Conference 2007 (FOGA IX)
null
null
null
cs.NE cs.AI
null
It is commonly assumed that the ability to track the frequencies of a set of schemata in the evolving population of an infinite population genetic algorithm (IPGA) under different fitness functions will advance efforts to obtain a theory of adaptation for the simple GA. Unfortunately, for IPGAs with long genomes and non-trivial fitness functions there do not currently exist theoretical results that allow such a study. We develop a simple framework for analyzing the dynamics of an infinite population evolutionary algorithm (IPEA). This framework derives its simplicity from its abstract nature. In particular we make no commitment to the data-structure of the genomes, the kind of variation performed, or the number of parents involved in a variation operation. We use this framework to derive abstract conditions under which the dynamics of an IPEA can be coarse-grained. We then use this result to derive concrete conditions under which it becomes computationally feasible to closely approximate the frequencies of a family of schemata of relatively low order over multiple generations, even when the bitstsrings in the evolving population of the IPGA are long.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 02:18:17 GMT" }, { "version": "v2", "created": "Sat, 5 May 2007 02:25:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Burjorjee", "Keki", "" ] ]
cs/0612105
Elankovan Sundararajan Mr.
Elankovan Sundararajan and Aaron Harwood
Towards Parallel Computing on the Internet: Applications, Architectures, Models and Programming Tools
39 pages, 9 figures
null
null
null
cs.DC cs.PF
null
The development of Internet wide resources for general purpose parallel computing poses the challenging task of matching computation and communication complexity. A number of parallel computing models exist that address this for traditional parallel architectures, and there are a number of emerging models that attempt to do this for large scale Internet-based systems like computational grids. In this survey we cover the three fundamental aspects -- application, architecture and model, and we show how they have been developed over the last decade. We also cover programming tools that are currently being used for parallel programming in computational grids. The trend in conventional computational models are to put emphasis on efficient communication between participating nodes by adapting different types of communication to network conditions. Effects of dynamism and uncertainties that arise in large scale systems are evidently important to understand and yet there is currently little work that addresses this from a parallel computing perspective.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 06:38:21 GMT" }, { "version": "v2", "created": "Mon, 25 Dec 2006 00:51:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Sundararajan", "Elankovan", "" ], [ "Harwood", "Aaron", "" ] ]
cs/0612107
Friedhelm. R. Drepper
Friedhelm R. Drepper
Voiced speech as secondary response of a self-consistent fundamental drive
13 pages with 3 figures
null
null
null
cs.SD nlin.AO
null
Voiced segments of speech are assumed to be composed of non-stationary acoustic objects which can be described as stationary response of a non-stationary fundamental drive (FD) process and which are furthermore suited to reconstruct the hidden FD by using a voice adapted (self-consistent) part-tone decomposition of the speech signal. The universality and robustness of human pitch perception encourages the reconstruction of a band-limited FD in the frequency range of the pitch. The self-consistent decomposition of voiced continuants generates several part-tones which can be confirmed to be topologically equivalent to corresponding acoustic modes of the excitation on the transmitter side. As topologically equivalent image of a glottal master oscillator, the self-consistent FD is suited to serve as low frequency part of the basic time-scale separation of auditive perception and to describe the broadband voiced excitation as entrained (synchronized) and/or modulated primary response. Being guided by the acoustic correlates of pitch and loudness perception, the time-scale separation avoids the conventional assumption of stationary excitation and represents the basic decoding step of an advanced precision transmission protocol of self-consistent (voiced) acoustic objects. The present study is focussed on the adaptation of the trajectories (contours) of the centre filter frequency of the part-tones to the chirp of the glottal master oscillator.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 12:39:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Drepper", "Friedhelm R.", "" ] ]
cs/0612108
Fabien Mathieu
Dmitry Lebedev (INRIA Rocquencourt), Fabien Mathieu (INRIA Rocquencourt), Laurent Viennot (INRIA Rocquencourt), Anh-Tuan Gai (INRIA Rocquencourt), Julien Reynier (INRIA Rocquencourt, INRIA Rocquencourt), Fabien De Montgolfier (INRIA Rocquencourt)
On Using Matching Theory to Understand P2P Network Design
null
null
null
null
cs.NI cs.GT
null
This paper aims to provide insight into stability of collaboration choices in P2P networks. We study networks where exchanges between nodes are driven by the desire to receive the best service available. This is the case for most existing P2P networks. We explore an evolution model derived from stable roommates theory that accounts for heterogeneity between nodes. We show that most P2P applications can be modeled using stable matching theory. This is the case whenever preference lists can be deduced from the exchange policy. In many cases, the preferences lists are characterized by an interesting acyclic property. We show that P2P networks with acyclic preferences possess a unique stable state with good convergence properties.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 15:19:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Lebedev", "Dmitry", "", "INRIA Rocquencourt" ], [ "Mathieu", "Fabien", "", "INRIA\n Rocquencourt" ], [ "Viennot", "Laurent", "", "INRIA Rocquencourt" ], [ "Gai", "Anh-Tuan", "", "INRIA\n Rocquencourt" ], [ "Reynier", "Julien", "", "INRIA Rocquencourt, INRIA Rocquencourt" ], [ "De Montgolfier", "Fabien", "", "INRIA Rocquencourt" ] ]
cs/0612110
James Hamilton
James Hamilton
Architecture for Modular Data Centers
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
Several factors are driving high-scale deployments of large data centers built upon commodity components. These commodity clusters are far cheaper than mainframe systems of the past but they bring serious heat and power density issues. Also the high failure rate of the individual components drives significant administrative costs. This proposal outlines an architecture for data center design based upon 20'x8'x8' modules that substantially changes how these systems are acquired, administered, and then later recycled.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 19:36:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Hamilton", "James", "" ] ]
cs/0612112
Boris Baryshnikov
Boris Baryshnikov, Cipri Clinciu, Conor Cunningham, Leo Giakoumakis, Slava Oks, Stefano Stefani
Managing Query Compilation Memory Consumption to Improve DBMS Throughput
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
While there are known performance trade-offs between database page buffer pool and query execution memory allocation policies, little has been written on the impact of query compilation memory use on overall throughput of the database management system (DBMS). We present a new aspect of the query optimization problem and offer a solution implemented in Microsoft SQL Server 2005. The solution provides stable throughput for a range of workloads even when memory requests outstrip the ability of the hardware to service those requests.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 21:51:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Baryshnikov", "Boris", "" ], [ "Clinciu", "Cipri", "" ], [ "Cunningham", "Conor", "" ], [ "Giakoumakis", "Leo", "" ], [ "Oks", "Slava", "" ], [ "Stefani", "Stefano", "" ] ]
cs/0612113
Paul Greenfield
Paul Greenfield, Alan Fekete, Julian Jang, Dean Kuo, Surya Nepal
Isolation Support for Service-based Applications: A Position Paper
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
In this paper, we propose an approach to providing the benefits of isolation in service-oriented applications where it is not feasible to hold traditional locks for ACID transactions. Our technique, called "Promises", provides an uniform view for clients which covers a wide range of implementation techniques on the service side, all allowing the client to check a condition and then later rely on that condition still holding.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 22:08:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Greenfield", "Paul", "" ], [ "Fekete", "Alan", "" ], [ "Jang", "Julian", "" ], [ "Kuo", "Dean", "" ], [ "Nepal", "Surya", "" ] ]
cs/0612114
Alexander Bohm
Alexander B\"ohm, Carl-Christian Kanne, Guido Moerkotte
Demaq: A Foundation for Declarative XML Message Processing
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
This paper gives an overview of Demaq, an XML message processing system operating on the foundation of transactional XML message queues. We focus on the syntax and semantics of its fully declarative, rule-based application language and demonstrate our message-based programming paradigm in the context of a case study. Further, we discuss optimization opportunities for executing Demaq programs.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 22:29:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Böhm", "Alexander", "" ], [ "Kanne", "Carl-Christian", "" ], [ "Moerkotte", "Guido", "" ] ]
cs/0612115
Roger Barga
Roger S. Barga, Jonathan Goldstein, Mohamed Ali, Mingsheng Hong
Consistent Streaming Through Time: A Vision for Event Stream Processing
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
Event processing will play an increasingly important role in constructing enterprise applications that can immediately react to business critical events. Various technologies have been proposed in recent years, such as event processing, data streams and asynchronous messaging (e.g. pub/sub). We believe these technologies share a common processing model and differ only in target workload, including query language features and consistency requirements. We argue that integrating these technologies is the next step in a natural progression. In this paper, we present an overview and discuss the foundations of CEDR, an event streaming system that embraces a temporal stream model to unify and further enrich query language features, handle imperfections in event delivery and define correctness guarantees. We describe specific contributions made so far and outline next steps in developing the CEDR system.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 22:40:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Barga", "Roger S.", "" ], [ "Goldstein", "Jonathan", "" ], [ "Ali", "Mohamed", "" ], [ "Hong", "Mingsheng", "" ] ]
cs/0612119
Philippe Saux Picart
Cyril Brunie (LACO), Philippe Saux Picart (LM)
Symmetric Subresultants and Applications
null
null
null
null
cs.SC
null
Schur's transforms of a polynomial are used to count its roots in the unit disk. These are generalized them by introducing the sequence of symmetric sub-resultants of two polynomials. Although they do have a determinantal definition, we show that they satisfy a structure theorem which allows us to compute them with a type of Euclidean division. As a consequence, a fast algorithm based on a dichotomic process and FFT is designed. We prove also that these symmetric sub-resultants have a deep link with Toeplitz matrices. Finally, we propose a new algorithm of inversion for such matrices. It has the same cost as those already known, however it is fraction-free and consequently well adapted to computer algebra.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 08:20:11 GMT" }, { "version": "v2", "created": "Thu, 29 Mar 2007 17:49:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Brunie", "Cyril", "", "LACO" ], [ "Picart", "Philippe Saux", "", "LM" ] ]
cs/0612120
Francesco Ranzato
Francesco Ranzato and Francesco Tapparo
Generalizing the Paige-Tarjan Algorithm by Abstract Interpretation
Keywords: Abstract interpretation, abstract model checking, strong preservation, Paige-Tarjan algorithm, refinement algorithm
null
null
null
cs.LO
null
The Paige and Tarjan algorithm (PT) for computing the coarsest refinement of a state partition which is a bisimulation on some Kripke structure is well known. It is also well known in model checking that bisimulation is equivalent to strong preservation of CTL, or, equivalently, of Hennessy-Milner logic. Drawing on these observations, we analyze the basic steps of the PT algorithm from an abstract interpretation perspective, which allows us to reason on strong preservation in the context of generic inductively defined (temporal) languages and of possibly non-partitioning abstract models specified by abstract interpretation. This leads us to design a generalized Paige-Tarjan algorithm, called GPT, for computing the minimal refinement of an abstract interpretation-based model that strongly preserves some given language. It turns out that PT is a straight instance of GPT on the domain of state partitions for the case of strong preservation of Hennessy-Milner logic. We provide a number of examples showing that GPT is of general use. We first show how a well-known efficient algorithm for computing stuttering equivalence can be viewed as a simple instance of GPT. We then instantiate GPT in order to design a new efficient algorithm for computing simulation equivalence that is competitive with the best available algorithms. Finally, we show how GPT allows to compute new strongly preserving abstract models by providing an efficient algorithm that computes the coarsest refinement of a given partition that strongly preserves the language generated by the reachability operator.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 19:45:34 GMT" }, { "version": "v2", "created": "Wed, 27 Dec 2006 11:16:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ranzato", "Francesco", "" ], [ "Tapparo", "Francesco", "" ] ]
cs/0612121
Stefan Funke
Stefan Funke, Soeren Laue, Zvi Lotker, Rouven Naujoks
Power Assignment Problems in Wireless Communication
13 pages
null
null
null
cs.CG cs.AR cs.NI
null
A fundamental class of problems in wireless communication is concerned with the assignment of suitable transmission powers to wireless devices/stations such that the resulting communication graph satisfies certain desired properties and the overall energy consumed is minimized. Many concrete communication tasks in a wireless network like broadcast, multicast, point-to-point routing, creation of a communication backbone, etc. can be regarded as such a power assignment problem. This paper considers several problems of that kind; for example one problem studied before in \cite{Carrots, Bilo} aims to select and assign powers to $k$ of the stations such that all other stations are within reach of at least one of the selected stations. We improve the running time for obtaining a $(1+\epsilon)$-approximate solution for this problem from $n^{((\alpha/\epsilon)^{O(d)})}$ as reported by Bilo et al. (\cite{Bilo}) to $O(n+ {(\frac{k^{2d+1}}{\epsilon^d})}^{\min{\{2k, (\alpha/\epsilon)^{O(d)} \}}})$ that is, we obtain a running time that is \emph{linear} in the network size. Further results include a constant approximation algorithm for the TSP problem under squared (non-metric!) edge costs, which can be employed to implement a novel data aggregation protocol, as well as efficient schemes to perform $k$-hop multicasts.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 12:53:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Funke", "Stefan", "" ], [ "Laue", "Soeren", "" ], [ "Lotker", "Zvi", "" ], [ "Naujoks", "Rouven", "" ] ]
cs/0612126
Petr Ivankov
Petr R. Ivankov, Nikolay P. Ivankov
The virtual reality framework for engineering objects
null
null
null
null
cs.CE cs.MS
null
A framework for virtual reality of engineering objects has been developed. This framework may simulate different equipment related to virtual reality. Framework supports 6D dynamics, ordinary differential equations, finite formulas, vector and matrix operations. The framework also supports embedding of external software.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 19:19:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Ivankov", "Petr R.", "" ], [ "Ivankov", "Nikolay P.", "" ] ]
cs/0612127
Mohamed Y. Eltabakh
Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref
bdbms -- A Database Management System for Biological Data
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
Biologists are increasingly using databases for storing and managing their data. Biological databases typically consist of a mixture of raw data, metadata, sequences, annotations, and related data obtained from various sources. Current database technology lacks several functionalities that are needed by biological databases. In this paper, we introduce bdbms, an extensible prototype database management system for supporting biological data. bdbms extends the functionalities of current DBMSs to include: (1) Annotation and provenance management including storage, indexing, manipulation, and querying of annotation and provenance as first class objects in bdbms, (2) Local dependency tracking to track the dependencies and derivations among data items, (3) Update authorization to support data curation via content-based authorization, in contrast to identity-based authorization, and (4) New access methods and their supporting operators that support pattern matching on various types of compressed biological data types. This paper presents the design of bdbms along with the techniques proposed to support these functionalities including an extension to SQL. We also outline some open issues in building bdbms.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 20:32:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Eltabakh", "Mohamed Y.", "" ], [ "Ouzzani", "Mourad", "" ], [ "Aref", "Walid G.", "" ] ]
cs/0612128
Daniel Gyllstrom
Daniel Gyllstrom, Eugene Wu, Hee-Jin Chae, Yanlei Diao, Patrick Stahlberg, Gordon Anderson
SASE: Complex Event Processing over Streams
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
RFID technology is gaining adoption on an increasing scale for tracking and monitoring purposes. Wide deployments of RFID devices will soon generate an unprecedented volume of data. Emerging applications require the RFID data to be filtered and correlated for complex pattern detection and transformed to events that provide meaningful, actionable information to end applications. In this work, we design and develop SASE, a com-plex event processing system that performs such data-information transformation over real-time streams. We design a complex event language for specifying application logic for such transformation, devise new query processing techniques to effi-ciently implement the language, and develop a comprehensive system that collects, cleans, and processes RFID data for deliv-ery of relevant, timely information as well as storing necessary data for future querying. We demonstrate an initial prototype of SASE through a real-world retail management scenario.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 20:38:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Gyllstrom", "Daniel", "" ], [ "Wu", "Eugene", "" ], [ "Chae", "Hee-Jin", "" ], [ "Diao", "Yanlei", "" ], [ "Stahlberg", "Patrick", "" ], [ "Anderson", "Gordon", "" ] ]
cs/0612129
Bishwaranjan Bhattacharjee
Bishwaranjan Bhattacharjee, Vuk Ercegovac, Joseph Glider, Richard Golding, Guy Lohman, Volke Markl, Hamid Pirahesh, Jun Rao, Robert Rees, Frederick Reiss, Eugene Shekita, Garret Swart
Impliance: A Next Generation Information Management Appliance
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
ably successful in building a large market and adapting to the changes of the last three decades, its impact on the broader market of information management is surprisingly limited. If we were to design an information management system from scratch, based upon today's requirements and hardware capabilities, would it look anything like today's database systems?" In this paper, we introduce Impliance, a next-generation information management system consisting of hardware and software components integrated to form an easy-to-administer appliance that can store, retrieve, and analyze all types of structured, semi-structured, and unstructured information. We first summarize the trends that will shape information management for the foreseeable future. Those trends imply three major requirements for Impliance: (1) to be able to store, manage, and uniformly query all data, not just structured records; (2) to be able to scale out as the volume of this data grows; and (3) to be simple and robust in operation. We then describe four key ideas that are uniquely combined in Impliance to address these requirements, namely the ideas of: (a) integrating software and off-the-shelf hardware into a generic information appliance; (b) automatically discovering, organizing, and managing all data - unstructured as well as structured - in a uniform way; (c) achieving scale-out by exploiting simple, massive parallel processing, and (d) virtualizing compute and storage resources to unify, simplify, and streamline the management of Impliance. Impliance is an ambitious, long-term effort to define simpler, more robust, and more scalable information systems for tomorrow's enterprises.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 20:49:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Bhattacharjee", "Bishwaranjan", "" ], [ "Ercegovac", "Vuk", "" ], [ "Glider", "Joseph", "" ], [ "Golding", "Richard", "" ], [ "Lohman", "Guy", "" ], [ "Markl", "Volke", "" ], [ "Pirahesh", "Hamid", "" ], [ "Rao", "Jun", "" ], [ "Rees", "Robert", "" ], [ "Reiss", "Frederick", "" ], [ "Shekita", "Eugene", "" ], [ "Swart", "Garret", "" ] ]
cs/0612130
Fabien Mathieu
Anh-Tuan Gai (INRIA Rocquencourt), Fabien Mathieu (INRIA Rocquencourt), Julien Reynier (INRIA Rocquencourt), Fabien De Montgolfier (INRIA Rocquencourt)
Stratification in P2P Networks - Application to BitTorrent
null
null
null
null
cs.NI
null
We introduce a model for decentralized networks with collaborating peers. The model is based on the stable matching theory which is applied to systems with a global ranking utility function. We consider the dynamics of peers searching for efficient collaborators and we prove that a unique stable solution exists. We prove that the system converges towards the stable solution and analyze its speed of convergence. We also study the stratification properties of the model, both when all collaborations are possible and for random possible collaborations. We present the corresponding fluid limit on the choice of collaborators in the random case. As a practical example, we study the BitTorrent Tit-for-Tat policy. For this system, our model provides an interesting insight on peer download rates and a possible way to optimize peer strategy.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 21:11:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Gai", "Anh-Tuan", "", "INRIA Rocquencourt" ], [ "Mathieu", "Fabien", "", "INRIA\n Rocquencourt" ], [ "Reynier", "Julien", "", "INRIA Rocquencourt" ], [ "De Montgolfier", "Fabien", "", "INRIA Rocquencourt" ] ]
cs/0612131
Amine Chigani
Amine Chigani James D. Arthur Shawn Bohner
Architecting Network-Centric Software Systems: A Style-Based Beginning
10 pages, 3 figures, 2 table, Submitted to Software Engineering Workshop 2007
null
null
null
cs.SE
null
With the advent of potent network technology, software development has evolved from traditional platform-centric construction to network-centric evolution. This change involves largely the way we reason about systems as evidenced in the introduction of Network- Centric Operations (NCO). Unfortunately, it has resulted in conflicting interpretations of how to map NCO concepts to the field of software architecture. In this paper, we capture the core concepts and goals of NCO, investigate the implications of these concepts and goals on software architecture, and identify the operational characteristics that distinguish network-centric software systems from other systems. More importantly, we use architectural design principles to propose an outline for a network-centric architectural style that helps in characterizing network-centric software systems and that provides a means by which their distinguishing operational characteristics can be realized.
[ { "version": "v1", "created": "Sat, 23 Dec 2006 01:00:32 GMT" }, { "version": "v2", "created": "Sat, 30 Dec 2006 03:07:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Bohner", "Amine Chigani James D. Arthur Shawn", "" ] ]
cs/0612132
Lokman Meho
Lokman I. Meho, Kiduk Yang
A New Era in Citation and Bibliometric Analyses: Web of Science, Scopus, and Google Scholar
49 pages, accepted for publication in the Journal of the American Society for Information Science and Technology
null
null
null
cs.DL cs.IR
null
Academic institutions, federal agencies, publishers, editors, authors, and librarians increasingly rely on citation analysis for making hiring, promotion, tenure, funding, and/or reviewer and journal evaluation and selection decisions. The Institute for Scientific Information's (ISI) citation databases have been used for decades as a starting point and often as the only tools for locating citations and/or conducting citation analyses. ISI databases (or Web of Science), however, may no longer be adequate as the only or even the main sources of citations because new databases and tools that allow citation searching are now available. Whether these new databases and tools complement or represent alternatives to Web of Science (WoS) is important to explore. Using a group of 15 library and information science faculty members as a case study, this paper examines the effects of using Scopus and Google Scholar (GS) on the citation counts and rankings of scholars as measured by WoS. The paper discusses the strengths and weaknesses of WoS, Scopus, and GS, their overlap and uniqueness, quality and language of the citations, and the implications of the findings for citation analysis. The project involved citation searching for approximately 1,100 scholarly works published by the study group and over 200 works by a test group (an additional 10 faculty members). Overall, more than 10,000 citing and purportedly citing documents were examined. WoS data took about 100 hours of collecting and processing time, Scopus consumed 200 hours, and GS a grueling 3,000 hours.
[ { "version": "v1", "created": "Sat, 23 Dec 2006 14:47:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Meho", "Lokman I.", "" ], [ "Yang", "Kiduk", "" ] ]
cs/0612134
Ketan Mulmuley D
Ketan D Mulmuley, Milind Sohoni
Geometric Complexity Theory II: Towards explicit obstructions for embeddings among class varieties
46 pages
null
null
null
cs.CC math.AG math.RT
null
In part I we reduced the arithmetic (characteristic zero) version of the P \not \subseteq NP conjecture to the problem of showing that a variety associated with the complexity class NP cannot be embedded in the variety associated the complexity class P. We call these class varieties. In this paper, this approach is developed further, reducing the nonexistence problems, such as the P vs. NP and related lower bound problems, to existence problems: specifically to proving existence of obstructions to such embeddings among class varieties. It gives two results towards explicit construction of such obstructions. The first result is a generalization of the Borel-Weil theorem to a class of orbit closures, which include class varieties. The recond result is a weaker form of a conjectured analogue of the second fundamental theorem of invariant theory for the class variety associated with the complexity class NC. These results indicate that the fundamental lower bound problems in complexity theory are intimately linked with explicit construction problems in algebraic geometry and representation theory.
[ { "version": "v1", "created": "Mon, 25 Dec 2006 18:51:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Mulmuley", "Ketan D", "" ], [ "Sohoni", "Milind", "" ] ]
cs/0612135
Eric Rondeau
Idriss Diouri (CRAN), Jean-Philippe Georges (CRAN), Eric Rondeau (CRAN)
Accommodation of the Service Offered by the Network for Networked Control Systems
8 pages
2nd workshop on Networked Control Systems : Tolerant to faults (23/11/2006) 8 pages
null
null
cs.NI
null
Networked Controlled Systems (NCSs) are more and more used in industrial applications. They are strongly connected to real-time constraints because important delays induced by the network can lead to an unstable process control. Usually, the network used in NCSs is shared with many others applications requiring different Quality of Service. The objective of this paper is to optimize the tuning of the network scheduling mechanisms in taking into account the level of Quality of Control. The goal is to maximize the bandwidth allocation for unconstrained frames in guarantying that the control constraints are respected. In this paper, we focus on switched Ethernet network implementing the Classification of Service (IEEE 802.1p) based on a Weighted Round Robin policy.
[ { "version": "v1", "created": "Tue, 26 Dec 2006 20:17:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Diouri", "Idriss", "", "CRAN" ], [ "Georges", "Jean-Philippe", "", "CRAN" ], [ "Rondeau", "Eric", "", "CRAN" ] ]
cs/0612137
Eric Robinson
Eric Robinson, David DeWitt
Turning Cluster Management into Data Management: A System Overview
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of modern database system technology. In contrast, CondorJ2 employs a data-centric, 3-tier web-application architecture for all system functions (e.g., job submission, monitoring and scheduling; node configuration, monitoring and management, etc.) except for job execution. Employing a data-oriented approach allows the core challenge (i.e., managing and coordinating a large set of distributed computing resources) to be transformed from a relatively low-level systems problem into a more abstract, higher-level data management problem. Preliminary results suggest that CondorJ2's use of standard 3-tier software represents a significant step forward to the design and implementation of large clusters (1,000 to 10,000 nodes).
[ { "version": "v1", "created": "Wed, 27 Dec 2006 22:21:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Robinson", "Eric", "" ], [ "DeWitt", "David", "" ] ]
cs/0612138
Alexander Haubold
Alexander Haubold, John R. Kender
Accommodating Sample Size Effect on Similarity Measures in Speaker Clustering
null
null
null
null
cs.SD cs.MM
null
We investigate the symmetric Kullback-Leibler (KL2) distance in speaker clustering and its unreported effects for differently-sized feature matrices. Speaker data is represented as Mel Frequency Cepstral Coefficient (MFCC) vectors, and features are compared using the KL2 metric to form clusters of speech segments for each speaker. We make two observations with respect to clustering based on KL2: 1.) The accuracy of clustering is strongly dependent on the absolute lengths of the speech segments and their extracted feature vectors. 2.) The accuracy of the similarity measure strongly degrades with the length of the shorter of the two speech segments. These effects of length can be attributed to the measure of covariance used in KL2. We demonstrate an empirical correction of this sample-size effect that increases clustering accuracy. We draw parallels to two Vector Quantization-based (VQ) similarity measures, one which exhibits an equivalent effect of sample size, and the second being less influenced by it.
[ { "version": "v1", "created": "Thu, 28 Dec 2006 06:39:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ], [ "Kender", "John R.", "" ] ]
cs/0612139
Alexander Haubold
Alexander Haubold, John R. Kender
Alignment of Speech to Highly Imperfect Text Transcriptions
null
null
null
null
cs.SD cs.MM
null
We introduce a novel and inexpensive approach for the temporal alignment of speech to highly imperfect transcripts from automatic speech recognition (ASR). Transcripts are generated for extended lecture and presentation videos, which in some cases feature more than 30 speakers with different accents, resulting in highly varying transcription qualities. In our approach we detect a subset of phonemes in the speech track, and align them to the sequence of phonemes extracted from the transcript. We report on the results for 4 speech-transcript sets ranging from 22 to 108 minutes. The alignment performance is promising, showing a correct matching of phonemes within 10, 20, 30 second error margins for more than 60%, 75%, 90% of text, respectively, on average.
[ { "version": "v1", "created": "Thu, 28 Dec 2006 06:45:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ], [ "Kender", "John R.", "" ] ]
cs/0612141
Christian Tanguy
Annie Druault-Vicard, Christian Tanguy
Exact Failure Frequency Calculations for Extended Systems
null
null
null
null
cs.PF
null
This paper shows how the steady-state availability and failure frequency can be calculated in a single pass for very large systems, when the availability is expressed as a product of matrices. We apply the general procedure to $k$-out-of-$n$:G and linear consecutive $k$-out-of-$n$:F systems, and to a simple ladder network in which each edge and node may fail. We also give the associated generating functions when the components have identical availabilities and failure rates. For large systems, the failure rate of the whole system is asymptotically proportional to its size. This paves the way to ready-to-use formulae for various architectures, as well as proof that the differential operator approach to failure frequency calculations is very useful and straightforward.
[ { "version": "v1", "created": "Thu, 28 Dec 2006 19:35:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Druault-Vicard", "Annie", "" ], [ "Tanguy", "Christian", "" ] ]
cs/0612143
Christian Tanguy
Christian Tanguy
Exact solutions for the two- and all-terminal reliabilities of a simple ladder network
null
null
null
null
cs.PF
null
The exact calculation of network reliability in a probabilistic context has been a long-standing issue of practical importance, but a difficult one, even for planar graphs, with perfect nodes and with edges of identical reliability p. Many approaches (determination of bounds, sums of disjoint products algorithms, Monte Carlo evaluations, studies of the reliability polynomials, etc.) can only provide approximations when the network's size increases. We consider here a ladder graph of arbitrary size corresponding to real-life network configurations, and give the exact, analytical solutions for the all- and two-terminal reliabilities. These solutions use transfer matrices, in which individual reliabilities of edges and nodes are taken into account. The special case of identical edge and node reliabilities -- p and rho, respectively -- is solved. We show that the zeros of the two-terminal reliability polynomial exhibit structures which differ substantially for seemingly similar networks, and we compare the sensitivity of various edges. We discuss how the present work may be further extended to lead to a catalog of exactly solvable networks in terms of reliability, which could be useful as elementary bricks for a new and improved set of bounds or benchmarks in the general case.
[ { "version": "v1", "created": "Thu, 28 Dec 2006 19:43:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Tanguy", "Christian", "" ] ]
cs/0701001
Ashutosh Gore
Ashutosh Deepak Gore, Srikanth Jagabathula, Abhay Karandikar
On High Spatial Reuse Link Scheduling in STDMA Wireless Ad Hoc Networks
10 pages (double column), 10 figures
null
null
null
cs.PF cs.NI
null
Graph-based algorithms for point-to-point link scheduling in Spatial reuse Time Division Multiple Access (STDMA) wireless ad hoc networks often result in a significant number of transmissions having low Signal to Interference and Noise density Ratio (SINR) at intended receivers, leading to low throughput. To overcome this problem, we propose a new algorithm for STDMA link scheduling based on a graph model of the network as well as SINR computations. The performance of our algorithm is evaluated in terms of spatial reuse and computational complexity. Simulation results demonstrate that our algorithm achieves better performance than existing algorithms.
[ { "version": "v1", "created": "Tue, 2 Jan 2007 14:14:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Gore", "Ashutosh Deepak", "" ], [ "Jagabathula", "Srikanth", "" ], [ "Karandikar", "Abhay", "" ] ]
cs/0701005
Christian Tanguy
Christian Tanguy
Exact solutions for the two- and all-terminal reliabilities of the Brecht-Colbourn ladder and the generalized fan
null
null
null
null
cs.PF
null
The two- and all-terminal reliabilities of the Brecht-Colbourn ladder and the generalized fan have been calculated exactly for arbitrary size as well as arbitrary individual edge and node reliabilities, using transfer matrices of dimension four at most. While the all-terminal reliabilities of these graphs are identical, the special case of identical edge ($p$) and node ($\rho$) reliabilities shows that their two-terminal reliabilities are quite distinct, as demonstrated by their generating functions and the locations of the zeros of the reliability polynomials, which undergo structural transitions at $\rho = \displaystyle {1/2}$.
[ { "version": "v1", "created": "Sat, 30 Dec 2006 17:26:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Tanguy", "Christian", "" ] ]
cs/0701007
Hamed Hatami
Hamed Hatami and Ruzbeh Tusserkani
On the Complexity of the Circular Chromatic Number
null
Journal of Graph Theory. 47(3) (2004) pp. 226-230
null
null
cs.CG
null
Circular chromatic number, $\chi_c$ is a natural generalization of chromatic number. It is known that it is \NP-hard to determine whether or not an arbitrary graph $G$ satisfies $\chi(G) = \chi_c(G)$. In this paper we prove that this problem is \NP-hard even if the chromatic number of the graph is known. This answers a question of Xuding Zhu. Also we prove that for all positive integers $k \ge 2$ and $n \ge 3$, for a given graph $G$ with $\chi(G)=n$, it is \NP-complete to verify if $\chi_c(G) \le n- \frac{1}{k}$.
[ { "version": "v1", "created": "Sun, 31 Dec 2006 04:48:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Hatami", "Hamed", "" ], [ "Tusserkani", "Ruzbeh", "" ] ]
cs/0701008
Hamed Hatami
Hamed Hatami and Hossein Maserrat
On the Computational Complexity of Defining Sets
null
Journal of Discrete Applied Mathematics .149(1-3) (2005) pp. 101-110
null
null
cs.CC
null
Suppose we have a family ${\cal F}$ of sets. For every $S \in {\cal F}$, a set $D \subseteq S$ is a {\sf defining set} for $({\cal F},S)$ if $S$ is the only element of $\cal{F}$ that contains $D$ as a subset. This concept has been studied in numerous cases, such as vertex colorings, perfect matchings, dominating sets, block designs, geodetics, orientations, and Latin squares. In this paper, first, we propose the concept of a defining set of a logical formula, and we prove that the computational complexity of such a problem is $\Sigma_2$-complete. We also show that the computational complexity of the following problem about the defining set of vertex colorings of graphs is $\Sigma_2$-complete: {\sc Instance:} A graph $G$ with a vertex coloring $c$ and an integer $k$. {\sc Question:} If ${\cal C}(G)$ be the set of all $\chi(G)$-colorings of $G$, then does $({\cal C}(G),c)$ have a defining set of size at most $k$? Moreover, we study the computational complexity of some other variants of this problem.
[ { "version": "v1", "created": "Sun, 31 Dec 2006 05:47:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Hatami", "Hamed", "" ], [ "Maserrat", "Hossein", "" ] ]
cs/0701010
Ahmed Sidky Ahmed Sidky
Ahmed Sidky, James Arthur
Determining the Applicability of Agile Practices to Mission and Life-critical Systems
null
null
null
null
cs.SE
null
Adopting agile practices brings about many benefits and improvements to the system being developed. However, in mission and life-critical systems, adopting an inappropriate agile practice has detrimental impacts on the system in various phases of its lifecycle as well as precludes desired qualities from being actualized. This paper presents a three-stage process that provides guidance to organizations on how to identify the agile practices they can benefit from without causing any impact to the mission and life critical system being developed.
[ { "version": "v1", "created": "Mon, 1 Jan 2007 05:08:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidky", "Ahmed", "" ], [ "Arthur", "James", "" ] ]
cs/0701013
Zengyou He
Zengyou He, Xaiofei Xu, Shengchun Deng
Attribute Value Weighting in K-Modes Clustering
15 pages
null
null
Tr-06-0615
cs.AI
null
In this paper, the traditional k-modes clustering algorithm is extended by weighting attribute value matches in dissimilarity computation. The use of attribute value weighting technique makes it possible to generate clusters with stronger intra-similarities, and therefore achieve better clustering performance. Experimental results on real life datasets show that these value weighting based k-modes algorithms are superior to the standard k-modes algorithm with respect to clustering accuracy.
[ { "version": "v1", "created": "Wed, 3 Jan 2007 09:06:03 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xaiofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0701014
Moustapha Diaby
Moustapha Diaby
A Reply to Hofman On: "Why LP cannot solve large instances of NP-complete problems in polynomial time"
2 page; 1 table; clarification of some unclear statements
null
null
null
cs.CC
null
Using an approach that seems to be patterned after that of Yannakakis, Hofman argues that an NP-complete problem cannot be formulated as a polynomial bounded-sized linear programming problem. He then goes on to propose a "construct" that he claims to be a counter-example to recently published linear programming formulations of the Traveling Salesman Problem (TSP) and the Quadratic Assignment Problems (QAP), respectively. In this paper, we show that Hofman's construct is flawed, and provide further proof that his "counter-example" is invalid.
[ { "version": "v1", "created": "Wed, 3 Jan 2007 11:26:26 GMT" }, { "version": "v2", "created": "Fri, 5 Jan 2007 00:39:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaby", "Moustapha", "" ] ]
cs/0701020
Sumit Ganguly
Sumit Ganguly
A nearly optimal and deterministic summary structure for update data streams
Withdrawn
null
null
null
cs.DS
null
The paper has been withdrawn due to an error in Lemma 1.
[ { "version": "v1", "created": "Thu, 4 Jan 2007 09:03:08 GMT" }, { "version": "v2", "created": "Fri, 5 Jan 2007 15:11:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Ganguly", "Sumit", "" ] ]
cs/0701022
Mateusz Zakrzewski
Mateusz Zakrzewski
Definable functions in the simply typed lambda-calculus
Submitted to TLCA 2007
null
null
null
cs.LO
null
It is a common knowledge that the integer functions definable in simply typed lambda-calculus are exactly the extended polynomials. This is indeed the case when one interprets integers over the type (p->p)->p->p where p is a base type and/or equality is taken as beta-conversion. It is commonly believed that the same holds for beta-eta equality and for integers represented over any fixed type of the form (t->t)->t->t. In this paper we show that this opinion is not quite true. We prove that the class of functions strictly definable in simply typed lambda-calculus is considerably larger than the extended polynomials. Namely, we define F as the class of strictly definable functions and G as a class that contains extended polynomials and two additional functions, or more precisely, two function schemas, and is closed under composition. We prove that G is a subset of F. We conjecture that G exactly characterizes strictly definable functions, i.e. G=F, and we gather some evidence for this conjecture proving, for example, that every skewly representable finite range function is strictly representable over (t->t)->t->t for some t.
[ { "version": "v1", "created": "Thu, 4 Jan 2007 17:50:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Zakrzewski", "Mateusz", "" ] ]
cs/0701029
Dariusz Ku\'smierek
Dariusz Kusmierek
The Inhabitation Problem for Rank Two Intersection Types
15 pages
null
null
null
cs.LO
null
We prove that the inhabitation problem for rank two intersection types is decidable, but (contrary to common belief) EXPTIME-hard. The exponential time hardness is shown by reduction from the in-place acceptance problem for alternating Turing machines.
[ { "version": "v1", "created": "Fri, 5 Jan 2007 08:38:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Kusmierek", "Dariusz", "" ] ]
cs/0701033
Blake Hegerle
Blake Hegerle
A Counterexample to a Proposed Proof of P=NP by S. Gubin
2 pages
null
null
null
cs.CC
null
In a recent paper by S. Gubin [cs/0701023v1], a polynomial-time solution to the 3SAT problem was presented as proof that P=NP. The proposed algorithm cannot be made to work, which I shall demonstrate.
[ { "version": "v1", "created": "Fri, 5 Jan 2007 19:16:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Hegerle", "Blake", "" ] ]
cs/0701035
Edwin Henneken
Edwin A. Henneken, Michael J. Kurtz, Guenther Eichhorn, Alberto Accomazzi, Carolyn S. Grant, Donna Thompson, Elizabeth Bohlen, Stephen S. Murray
Finding Astronomical Communities Through Co-readership Analysis
poster presented at the 209th AAS Meeting, 7 pages, 4 figures
null
null
null
cs.DL astro-ph
null
Whenever a large group of people are engaged in an activity, communities will form. The nature of these communities depends on the relationship considered. In the group of people who regularly use scholarly literature, a relationship like ``person i and person j have cited the same paper'' might reveal communities of people working in a particular field. On this poster, we will investigate the relationship ``person i and person j have read the same paper''. Using the data logs of the NASA/Smithsonian Astrophysics Data System (ADS), we first determine the population that will participate by requiring that a user queries the ADS at a certain rate. Next, we apply the relationship to this population. The result of this will be an abstract ``relationship space'', which we will describe in terms of various ``representations''. Examples of such ``representations'' are the projection of co-read vectors onto Principal Components and the spectral density of the co-read network. We will show that the co-read relationship results in structure, we will describe this structure and we will provide a first attempt in the classification of this structure in terms of astronomical communities. The ADS is funded by NASA Grant NNG06GG68G.
[ { "version": "v1", "created": "Sat, 6 Jan 2007 00:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Henneken", "Edwin A.", "" ], [ "Kurtz", "Michael J.", "" ], [ "Eichhorn", "Guenther", "" ], [ "Accomazzi", "Alberto", "" ], [ "Grant", "Carolyn S.", "" ], [ "Thompson", "Donna", "" ], [ "Bohlen", "Elizabeth", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0701040
Fumin Zhang
F. Zhang
Curve Tracking Control for Legged Locomotion in Horizontal Plane
10 pages, 11 figures, Submitted to IEEE Transactions on Automatic Control
null
null
null
cs.RO
null
We derive a hybrid feedback control law for the lateral leg spring (LLS) model so that the center of mass of a legged runner follows a curved path in horizontal plane. The control law enables the runner to change the placement and the elasticity of its legs to move in a desired direction. Stable motion along a curved path is achieved using curvature, bearing and relative distance between the runner and the curve as feedback. Constraints on leg parameters determine the class of curves that can be followed. We also derive an optimal control law that stabilizes the orientation of the runner's body relative to the velocity of the runner's center of mass.
[ { "version": "v1", "created": "Sat, 6 Jan 2007 20:55:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "F.", "" ] ]
cs/0701044
Tej Singh
Sunder Lal and Tej Singh
New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings
9 pages
null
null
null
cs.CR
null
This paper presents an identity based multi-proxy multi-signcryption scheme from pairings. In this scheme a proxy signcrypter group could authorized as a proxy agent by the coopration of all members in the original signcryption group. Then the proxy signcryption can be generated by the cooperation of all the signcrypters in the authorized proxy signcrypter group on the behalf of the original signcrypter group. As compared to the scheme of Liu and Xiao, the proposed scheme provides public verifiability of the signature along with simplified key management.
[ { "version": "v1", "created": "Mon, 8 Jan 2007 18:02:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Lal", "Sunder", "" ], [ "Singh", "Tej", "" ] ]
cs/0701045
Iosif Pinelis
Iosif Pinelis
Polygon Convexity: Another O(n) Test
14 pages; changes: (i) a test for non-strict convexity is added; (ii) the proofs are gathered in a separate section; (iii) a more detailed abstract is given
null
null
null
cs.CG cs.DS
null
An n-gon is defined as a sequence \P=(V_0,...,V_{n-1}) of n points on the plane. An n-gon \P is said to be convex if the boundary of the convex hull of the set {V_0,...,V_{n-1}} of the vertices of \P coincides with the union of the edges [V_0,V_1],...,[V_{n-1},V_0]; if at that no three vertices of \P are collinear then \P is called strictly convex. We prove that an n-gon \P with n\ge3 is strictly convex if and only if a cyclic shift of the sequence (\al_0,...,\al_{n-1})\in[0,2\pi)^n of the angles between the x-axis and the vectors V_1-V_0,...,V_0-V_{n-1} is strictly monotone. A ``non-strict'' version of this result is also proved.
[ { "version": "v1", "created": "Mon, 8 Jan 2007 18:51:37 GMT" }, { "version": "v2", "created": "Tue, 16 Jan 2007 22:57:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Pinelis", "Iosif", "" ] ]
cs/0701046
Andrea Forte
Andrea G. Forte, Henning Schulzrinne
Cooperation Between Stations in Wireless Networks
16 pages, 49 references, 12 figures, 3 tables
null
null
cucs-044-06
cs.NI
null
In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, particularly for real-time applications such as VoIP. We propose a novel approach, namely Cooperative Roaming (CR), in which MNs can collaborate with each other and share useful information about the network in which they move. We show how we can achieve seamless L2 and L3 handoffs regardless of the authentication mechanism used and without any changes to either the infrastructure or the protocol. In particular, we provide a working implementation of CR and show how, with CR, MNs can achieve a total L2+L3 handoff time of less than 16 ms in an open network and of about 21 ms in an IEEE 802.11i network. We consider behaviors typical of IEEE 802.11 networks, although many of the concepts and problems addressed here apply to any kind of mobile network.
[ { "version": "v1", "created": "Mon, 8 Jan 2007 20:01:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Forte", "Andrea G.", "" ], [ "Schulzrinne", "Henning", "" ] ]
cs/0701049
Barnaby Martin
Barnaby Martin
On the Complexity of a Derivative Chess Problem
null
null
null
null
cs.CC
null
We introduce QUEENS, a derivative chess problem based on the classical n-queens problem. We prove that QUEENS is NP-complete, with respect to polynomial-time reductions.
[ { "version": "v1", "created": "Mon, 8 Jan 2007 16:45:55 GMT" }, { "version": "v2", "created": "Mon, 26 Mar 2007 15:40:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Martin", "Barnaby", "" ] ]
cs/0701054
Nathan Segerlind
Nathan Segerlind
Nearly-Exponential Size Lower Bounds for Symbolic Quantifier Elimination Algorithms and OBDD-Based Proofs of Unsatisfiability
40 pages, 3 figures. First public draft, comments welcome. Also submitted at ECCC
null
null
null
cs.CC cs.LO
null
We demonstrate a family of propositional formulas in conjunctive normal form so that a formula of size $N$ requires size $2^{\Omega(\sqrt[7]{N/logN})}$ to refute using the tree-like OBDD refutation system of Atserias, Kolaitis and Vardi with respect to all variable orderings. All known symbolic quantifier elimination algorithms for satisfiability generate tree-like proofs when run on unsatisfiable CNFs, so this lower bound applies to the run-times of these algorithms. Furthermore, the lower bound generalizes earlier results on OBDD-based proofs of unsatisfiability in that it applies for all variable orderings, it applies when the clauses are processed according to an arbitrary schedule, and it applies when variables are eliminated via quantification.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 01:16:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Segerlind", "Nathan", "" ] ]
cs/0701057
Xiaofei Huang
Xiaofei Huang
Cooperative Optimization for Energy Minimization: A Case Study of Stereo Matching
null
null
null
null
cs.CV cs.AI
null
Often times, individuals working together as a team can solve hard problems beyond the capability of any individual in the team. Cooperative optimization is a newly proposed general method for attacking hard optimization problems inspired by cooperation principles in team playing. It has an established theoretical foundation and has demonstrated outstanding performances in solving real-world optimization problems. With some general settings, a cooperative optimization algorithm has a unique equilibrium and converges to it with an exponential rate regardless initial conditions and insensitive to perturbations. It also possesses a number of global optimality conditions for identifying global optima so that it can terminate its search process efficiently. This paper offers a general description of cooperative optimization, addresses a number of design issues, and presents a case study to demonstrate its power.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 01:03:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Xiaofei", "" ] ]
cs/0701072
Jakob Vo{\ss}
Jakob Voss
Tagging, Folksonomy & Co - Renaissance of Manual Indexing?
Preprint. 12 pages, 1 figure, 54 references
null
null
null
cs.IR
null
This paper gives an overview of current trends in manual indexing on the Web. Along with a general rise of user generated content there are more and more tagging systems that allow users to annotate digital resources with tags (keywords) and share their annotations with other users. Tagging is frequently seen in contrast to traditional knowledge organization systems or as something completely new. This paper shows that tagging should better be seen as a popular form of manual indexing on the Web. Difference between controlled and free indexing blurs with sufficient feedback mechanisms. A revised typology of tagging systems is presented that includes different user roles and knowledge organization systems with hierarchical relationships and vocabulary control. A detailed bibliography of current research in collaborative tagging is included.
[ { "version": "v1", "created": "Wed, 10 Jan 2007 18:18:28 GMT" }, { "version": "v2", "created": "Fri, 26 Jan 2007 14:36:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Voss", "Jakob", "" ] ]
cs/0701073
Jeremy Avigad
Jeremy Avigad and Kevin Donnelly
A decision procedure for linear "big O" equations
null
null
null
null
cs.LO
null
Let $F$ be the set of functions from an infinite set, $S$, to an ordered ring, $R$. For $f$, $g$, and $h$ in $F$, the assertion $f = g + O(h)$ means that for some constant $C$, $|f(x) - g(x)| \leq C |h(x)|$ for every $x$ in $S$. Let $L$ be the first-order language with variables ranging over such functions, symbols for $0, +, -, \min, \max$, and absolute value, and a ternary relation $f = g + O(h)$. We show that the set of quantifier-free formulas in this language that are valid in the intended class of interpretations is decidable, and does not depend on the underlying set, $S$, or the ordered ring, $R$. If $R$ is a subfield of the real numbers, we can add a constant 1 function, as well as multiplication by constants from any computable subfield. We obtain further decidability results for certain situations in which one adds symbols denoting the elements of a fixed sequence of functions of strictly increasing rates of growth.
[ { "version": "v1", "created": "Wed, 10 Jan 2007 19:46:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Avigad", "Jeremy", "" ], [ "Donnelly", "Kevin", "" ] ]
cs/0701075
Toshiya Takami
Toshiya Takami, Jun Maki, Jun-ichi Ooba, Yuichi Inadomi, Hiroaki Honda, Taizo Kobayashi, Rie Nogita, and Mutsumi Aoyagi
Open-architecture Implementation of Fragment Molecular Orbital Method for Peta-scale Computing
6 pages, 9 figures, proceedings of the 2nd IEEE/ACM international workshop on high performance computing for nano-science and technology (HPCNano06)
null
null
null
cs.DC physics.comp-ph
null
We present our perspective and goals on highperformance computing for nanoscience in accordance with the global trend toward "peta-scale computing." After reviewing our results obtained through the grid-enabled version of the fragment molecular orbital method (FMO) on the grid testbed by the Japanese Grid Project, National Research Grid Initiative (NAREGI), we show that FMO is one of the best candidates for peta-scale applications by predicting its effective performance in peta-scale computers. Finally, we introduce our new project constructing a peta-scale application in an open-architecture implementation of FMO in order to realize both goals of highperformance in peta-scale computers and extendibility to multiphysics simulations.
[ { "version": "v1", "created": "Thu, 11 Jan 2007 04:49:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Takami", "Toshiya", "" ], [ "Maki", "Jun", "" ], [ "Ooba", "Jun-ichi", "" ], [ "Inadomi", "Yuichi", "" ], [ "Honda", "Hiroaki", "" ], [ "Kobayashi", "Taizo", "" ], [ "Nogita", "Rie", "" ], [ "Aoyagi", "Mutsumi", "" ] ]
cs/0701076
Norman Danner
Norman Danner and James S. Royer
Time-complexity semantics for feasible affine recursions (extended abstract)
Typographical fixes; some rearrangement of material. A shortened version is to appear in S.B. Cooper, B. Lowe, A. Sorbi (eds.),_Computation in the Real World_ (Proceedings Computation in Europe 2007, Sienna), Springer-Verlag, Berlin, 2007
null
null
null
cs.LO
null
The authors' ATR programming formalism is a version of call-by-value PCF under a complexity-theoretically motivated type system. ATR programs run in type-2 polynomial-time and all standard type-2 basic feasible functionals are ATR-definable (ATR types are confined to levels 0, 1, and 2). A limitation of the original version of ATR is that the only directly expressible recursions are tail-recursions. Here we extend ATR so that a broad range of affine recursions are directly expressible. In particular, the revised ATR can fairly naturally express the classic insertion- and selection-sort algorithms, thus overcoming a sticking point of most prior implicit-complexity-based formalisms. The paper's main work is in extending and simplifying the original time-complexity semantics for ATR to develop a set of tools for extracting and solving the higher-type recurrences arising from feasible affine recursions.
[ { "version": "v1", "created": "Thu, 11 Jan 2007 16:22:11 GMT" }, { "version": "v2", "created": "Tue, 20 Mar 2007 16:50:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Danner", "Norman", "" ], [ "Royer", "James S.", "" ] ]
cs/0701081
Wim Vanhoof
Alexander Serebrenik and Wim Vanhoof
Fingerprinting Logic Programs
Paper presented at the 16th Workshop on Logic-based methods in Programming Languages (WLPE2006)
null
null
null
cs.PL cs.SE
null
In this work we present work in progress on functionality duplication detection in logic programs. Eliminating duplicated functionality recently became prominent in context of refactoring. We describe a quantitative approach that allows to measure the ``similarity'' between two predicate definitions. Moreover, we show how to compute a so-called ``fingerprint'' for every predicate. Fingerprints capture those characteristics of the predicate that are significant when searching for duplicated functionality. Since reasoning on fingerprints is much easier than reasoning on predicate definitions, comparing the fingerprints is a promising direction in automated code duplication in logic programs.
[ { "version": "v1", "created": "Fri, 12 Jan 2007 15:39:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Serebrenik", "Alexander", "" ], [ "Vanhoof", "Wim", "" ] ]
cs/0701082
Serebrenik Alexander
Fred Mesnard, Alexander Serebrenik
Recurrence with affine level mappings is P-time decidable for CLP(R)
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.LO
null
In this paper we introduce a class of constraint logic programs such that their termination can be proved by using affine level mappings. We show that membership to this class is decidable in polynomial time.
[ { "version": "v1", "created": "Fri, 12 Jan 2007 18:43:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Mesnard", "Fred", "" ], [ "Serebrenik", "Alexander", "" ] ]
cs/0701087
Jean-Philippe Rennard
Jean-Philippe Rennard
Artificiality in Social Sciences
14 pages
Rennard, J.-P., Artificiality in Social Sciences, in Rennard, J.-P. (Ed.), Handbook of Research on Nature Inspired Computing for Economics and Management, p.1-15, IGR, 2006
null
null
cs.MA
null
This text provides with an introduction to the modern approach of artificiality and simulation in social sciences. It presents the relationship between complexity and artificiality, before introducing the field of artificial societies which greatly benefited from the computer power fast increase, gifting social sciences with formalization and experimentation tools previously owned by "hard" sciences alone. It shows that as "a new way of doing social sciences", artificial societies should undoubtedly contribute to a renewed approach in the study of sociality and should play a significant part in the elaboration of original theories of social phenomena.
[ { "version": "v1", "created": "Sat, 13 Jan 2007 16:50:37 GMT" }, { "version": "v2", "created": "Fri, 27 Apr 2007 18:00:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Rennard", "Jean-Philippe", "" ] ]
cs/0701088
Frederick Furtek
Frederick Furtek
A Theory and Calculus for Reasoning about Sequential Behavior
102 double-spaced pages, 17 figures. Abstract and introduction revised 29 March 2007 to improve readability
null
null
null
cs.LO cs.DM
null
Basic results in combinatorial mathematics provide the foundation for a theory and calculus for reasoning about sequential behavior. A key concept of the theory is a generalization of Boolean implicant which deals with statements of the form: A sequence of Boolean expressions alpha is an implicant of a set of sequences of Boolean expressions A This notion of a generalized implicant takes on special significance when each of the sequences in the set A describes a disallowed pattern of behavior. That is because a disallowed sequence of Boolean expressions represents a logical/temporal dependency, and because the implicants of a set of disallowed Boolean sequences A are themselves disallowed and represent precisely those dependencies that follow as a logical consequence from the dependencies represented by A. The main result of the theory is a necessary and sufficient condition for a sequence of Boolean expressions to be an implicant of a regular set of sequences of Boolean expressions. This result is the foundation for two new proof methods. Sequential resolution is a generalization of Boolean resolution which allows new logical/temporal dependencies to be inferred from existing dependencies. Normalization starts with a model (system) and a set of logical/temporal dependencies and determines which of those dependencies are satisfied by the model.
[ { "version": "v1", "created": "Mon, 15 Jan 2007 18:57:14 GMT" }, { "version": "v2", "created": "Thu, 29 Mar 2007 15:46:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Furtek", "Frederick", "" ] ]
cs/0701094
Francois Ingelrest
Fran\c{c}ois Ingelrest (LIFL, INRIA Futurs), David Simplot-Ryl (LIFL, INRIA Futurs)
Maximizing the Probability of Delivery of Multipoint Relay Broadcast Protocol in Wireless Ad Hoc Networks with a Realistic Physical Layer
null
Proceedings of the 2nd International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2006) (2006) 143
null
null
cs.NI
null
It is now commonly accepted that the unit disk graph used to model the physical layer in wireless networks does not reflect real radio transmissions, and that the lognormal shadowing model better suits to experimental simulations. Previous work on realistic scenarios focused on unicast, while broadcast requirements are fundamentally different and cannot be derived from unicast case. Therefore, broadcast protocols must be adapted in order to still be efficient under realistic assumptions. In this paper, we study the well-known multipoint relay protocol (MPR). In the latter, each node has to choose a set of neighbors to act as relays in order to cover the whole 2-hop neighborhood. We give experimental results showing that the original method provided to select the set of relays does not give good results with the realistic model. We also provide three new heuristics in replacement and their performances which demonstrate that they better suit to the considered model. The first one maximizes the probability of correct reception between the node and the considered relays multiplied by their coverage in the 2-hop neighborhood. The second one replaces the coverage by the average of the probabilities of correct reception between the considered neighbor and the 2-hop neighbors it covers. Finally, the third heuristic keeps the same concept as the second one, but tries to maximize the coverage level of the 2-hop neighborhood: 2-hop neighbors are still being considered as uncovered while their coverage level is not higher than a given coverage threshold, many neighbors may thus be selected to cover the same 2-hop neighbors.
[ { "version": "v1", "created": "Tue, 16 Jan 2007 10:01:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Ingelrest", "François", "", "LIFL, INRIA Futurs" ], [ "Simplot-Ryl", "David", "", "LIFL,\n INRIA Futurs" ] ]
cs/0701095
Pedro Cabalar
Pedro Cabalar and Paolo Ferraris
Propositional theories are strongly equivalent to logic programs
15 pages
null
null
null
cs.AI cs.LO
null
This paper presents a property of propositional theories under the answer sets semantics (called Equilibrium Logic for this general syntax): any theory can always be reexpressed as a strongly equivalent disjunctive logic program, possibly with negation in the head. We provide two different proofs for this result: one involving a syntactic transformation, and one that constructs a program starting from the countermodels of the theory in the intermediate logic of here-and-there.
[ { "version": "v1", "created": "Tue, 16 Jan 2007 12:29:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Cabalar", "Pedro", "" ], [ "Ferraris", "Paolo", "" ] ]
cs/0701096
Maurice Margenstern
Margenstern Maurice
About the domino problem in the hyperbolic plane, a new solution
60 pages, 16 figures
null
null
null
cs.CG
null
In this paper we improve the approach of a previous paper about the domino problem in the hyperbolic plane, see arXiv.cs.CG/0603093. This time, we prove that the general problem of the hyperbolic plane with \`a la Wang tiles is undecidable.
[ { "version": "v1", "created": "Tue, 16 Jan 2007 18:19:22 GMT" }, { "version": "v2", "created": "Mon, 22 Jan 2007 19:11:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Maurice", "Margenstern", "" ] ]
cs/0701104
Philipp Mayr
Philipp Mayr, Walther Umstaetter
Why is a new Journal of Informetrics needed?
9 pages, 3 figures
null
null
null
cs.DL cs.DB
null
In our study we analysed 3.889 records which were indexed in the Library and Information Science Abstracts (LISA) database in the research field of informetrics. We can show the core journals of the field via a Bradford (power law) distribution and corroborate on the basis of the restricted LISA data set that it was the appropriate time to found a new specialized journal dedicated to informetrics. According to Bradford's Law of scattering (pure quantitative calculation), Egghe's Journal of Informetrics (JOI) first issue to appear in 2007, comes most probable at the right time.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 12:17:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Mayr", "Philipp", "" ], [ "Umstaetter", "Walther", "" ] ]
cs/0701105
Wim Vanhoof
Remko Troncon, Gerda Janssens
A Delta Debugger for ILP Query Execution
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
cs.PL cs.LG
null
Because query execution is the most crucial part of Inductive Logic Programming (ILP) algorithms, a lot of effort is invested in developing faster execution mechanisms. These execution mechanisms typically have a low-level implementation, making them hard to debug. Moreover, other factors such as the complexity of the problems handled by ILP algorithms and size of the code base of ILP data mining systems make debugging at this level a very difficult job. In this work, we present the trace-based debugging approach currently used in the development of new execution mechanisms in hipP, the engine underlying the ACE Data Mining system. This debugger uses the delta debugging algorithm to automatically reduce the total time needed to expose bugs in ILP execution, thus making manual debugging step much lighter.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 13:35:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Troncon", "Remko", "" ], [ "Janssens", "Gerda", "" ] ]
cs/0701106
Wim Vanhoof
Pierre Deransart
On using Tracer Driver for External Dynamic Process Observation
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments
null
null
null
cs.PL
null
One is interested here in the observation of dynamic processes starting from the traces which they leave or those that one makes them produce. It is considered here that it should be possible to make several observations simultaneously, using a large variety of independently developed analyzers. For this purpose, we introduce the original notion of ``full trace'' to capture the idea that a process can be instrumented in such a way that it may broadcast all information which could ever be requested by any kind of observer. Each analyzer can then find in the full trace the data elements which it needs. This approach uses what has been called a "tracer driver" which completes the tracer and drives it to answer the requests of the analyzers. A tracer driver allows to restrict the flow of information and makes this approach tractable. On the other side, the potential size of a full trace seems to make the idea of full trace unrealistic. In this work we explore the consequences of this notion in term of potential efficiency, by analyzing the respective workloads between the (full) tracer and many different analyzers, all being likely run in true parallel environments. To illustrate this study, we use the example of the observation of the resolution of constraints systems (proof-tree, search-tree and propagation) using sophisticated visualization tools, as developed in the project OADymPPaC (2001-2004). The processes considered here are computer programs, but we believe the approach can be extended to many other kinds of processes.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 13:43:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Deransart", "Pierre", "" ] ]
cs/0701107
Wim Vanhoof
Hani Girgis, Bharat Jayaraman
JavaTA: A Logic-based Debugger for Java
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
cs.PL
null
This paper presents a logic based approach to debugging Java programs. In contrast with traditional debugging we propose a debugging methodology for Java programs using logical queries on individual execution states and also over the history of execution. These queries were arrived at by a systematic study of errors in object-oriented programs in our earlier research. We represent the salient events during the execution of a Java program by a logic database, and implement the queries as logic programs. Such an approach allows us to answer a number of useful and interesting queries about a Java program, such as the calling sequence that results in a certain outcome, the state of an object at a particular execution point, etc. Our system also provides the ability to compose new queries during a debugging session. We believe that logic programming offers a significant contribution to the art of object-oriented programs debugging.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 13:48:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Girgis", "Hani", "" ], [ "Jayaraman", "Bharat", "" ] ]
cs/0701108
Wim Vanhoof
Edison Mera, Pedro Lopez-Garcia, German Puebla, Manuel Carro, Manuel Hermenegildo
Towards Execution Time Estimation for Logic Programs via Static Analysis and Profiling
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments
null
null
null
cs.PL
null
Effective static analyses have been proposed which infer bounds on the number of resolutions or reductions. These have the advantage of being independent from the platform on which the programs are executed and have been shown to be useful in a number of applications, such as granularity control in parallel execution. On the other hand, in distributed computation scenarios where platforms with different capabilities come into play, it is necessary to express costs in metrics that include the characteristics of the platform. In particular, it is specially interesting to be able to infer upper and lower bounds on actual execution times. With this objective in mind, we propose an approach which combines compile-time analysis for cost bounds with a one-time profiling of the platform in order to determine the values of certain parameters for a given platform. These parameters calibrate a cost model which, from then on, is able to compute statically time bound functions for procedures and to predict with a significant degree of accuracy the execution times of such procedures in the given platform. The approach has been implemented and integrated in the CiaoPP system.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 14:22:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Mera", "Edison", "" ], [ "Lopez-Garcia", "Pedro", "" ], [ "Puebla", "German", "" ], [ "Carro", "Manuel", "" ], [ "Hermenegildo", "Manuel", "" ] ]
cs/0701109
Wim Vanhoof
Siddharth Chitnis, Madhu Yennamani, Gopal Gupta
ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
cs.PL
null
We report on the development of a general tool called ExSched, implemented as a plug-in for Microsoft Excel, for solving a class of constraint satisfaction problems. The traditional spreadsheet paradigm is based on attaching arithmetic expressions to individual cells and then evaluating them. The ExSched interface generalizes the spreadsheet paradigm to allow finite domain constraints to be attached to the individual cells that are then solved to get a solution. This extension provides a user-friendly interface for solving constraint satisfaction problems that can be modeled as 2D tables, such as scheduling problems, timetabling problems, product configuration, etc. ExSched can be regarded as a spreadsheet interface to CLP(FD) that hides the syntactic and semantic complexity of CLP(FD) and enables novice users to solve many scheduling and timetabling problems interactively.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 14:26:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Chitnis", "Siddharth", "" ], [ "Yennamani", "Madhu", "" ], [ "Gupta", "Gopal", "" ] ]
cs/0701110
Wim Vanhoof
Kim Henriksen, John Gallagher
A Web-based Tool Combining Different Type Analyses
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
cs.PL
null
There are various kinds of type analysis of logic programs. These include for example inference of types that describe an over-approximation of the success set of a program, inference of well-typings, and abstractions based on given types. Analyses can be descriptive or prescriptive or a mixture of both, and they can be goal-dependent or goal-independent. We describe a prototype tool that can be accessed from a web browser, allowing various type analyses to be run. The first goal of the tool is to allow the analysis results to be examined conveniently by clicking on points in the original program clauses, and to highlight ill-typed program constructs, empty types or other type anomalies. Secondly the tool allows combination of the various styles of analysis. For example, a descriptive regular type can be automatically inferred for a given program, and then that type can be used to generate the minimal "domain model" of the program with respect to the corresponding pre-interpretation, which can give more precise information than the original descriptive type.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 14:35:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Henriksen", "Kim", "" ], [ "Gallagher", "John", "" ] ]
cs/0701111
Wim Vanhoof
Elvira Albert, Puri Arenas, German Puebla
Some Issues on Incremental Abstraction-Carrying Code
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
cs.PL
null
Abstraction-Carrying Code (ACC) has recently been proposed as a framework for proof-carrying code (PCC) in which the code supplier provides a program together with an abstraction (or abstract model of the program) whose validity entails compliance with a predefined safety policy. The abstraction thus plays the role of safety certificate and its generation (and validation) is carried out automatically by a fixed-point analyzer. Existing approaches for PCC are developed under the assumption that the consumer reads and validates the entire program w.r.t. the full certificate at once, in a non incremental way. In this abstract, we overview the main issues on incremental ACC. In particular, in the context of logic programming, we discuss both the generation of incremental certificates and the design of an incremental checking algorithm for untrusted updates of a (trusted) program, i.e., when a producer provides a modified version of a previously validated program. By update, we refer to any arbitrary change on a program, i.e., the extension of the program with new predicates, the deletion of existing predicates and the replacement of existing predicates by new versions for them. We also discuss how each kind of update affects the incremental extension in terms of accuracy and correctness.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 14:44:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Albert", "Elvira", "" ], [ "Arenas", "Puri", "" ], [ "Puebla", "German", "" ] ]
cs/0701113
Thomas Colcombet
Thomas Colcombet (GALION)
On factorisation forests
27 pages
null
null
null
cs.LO
null
The theorem of factorisation forests shows the existence of nested factorisations -- a la Ramsey -- for finite words. This theorem has important applications in semigroup theory, and beyond. The purpose of this paper is to illustrate the importance of this approach in the context of automata over infinite words and trees. We extend the theorem of factorisation forest in two directions: we show that it is still valid for any word indexed by a linear ordering; and we show that it admits a deterministic variant for words indexed by well-orderings. A byproduct of this work is also an improvement on the known bounds for the original result. We apply the first variant for giving a simplified proof of the closure under complementation of rational sets of words indexed by countable scattered linear orderings. We apply the second variant in the analysis of monadic second-order logic over trees, yielding new results on monadic interpretations over trees. Consequences of it are new caracterisations of prefix-recognizable structures and of the Caucal hierarchy.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 16:48:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Colcombet", "Thomas", "", "GALION" ] ]
cs/0701115
Juan J. Merelo Pr.
J.J. Merelo, Antonio Mora-Garcia, J.L.J. Laredo, Juan Lupion, Fernando Tricas
Browser-based distributed evolutionary computation: performance and scaling behavior
Submitted to GECCO 2007
null
null
null
cs.DC cs.NE
null
The challenge of ad-hoc computing is to find the way of taking advantage of spare cycles in an efficient way that takes into account all capabilities of the devices and interconnections available to them. In this paper we explore distributed evolutionary computation based on the Ruby on Rails framework, which overlays a Model-View-Controller on evolutionary computation. It allows anybody with a web browser (that is, mostly everybody connected to the Internet) to participate in an evolutionary computation experiment. Using a straightforward farming model, we consider different factors, such as the size of the population used. We are mostly interested in how they impact on performance, but also the scaling behavior when a non-trivial number of computers is applied to the problem. Experiments show the impact of different packet sizes on performance, as well as a quite limited scaling behavior, due to the characteristics of the server. Several solutions for that problem are proposed.
[ { "version": "v1", "created": "Thu, 18 Jan 2007 09:23:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Merelo", "J. J.", "" ], [ "Mora-Garcia", "Antonio", "" ], [ "Laredo", "J. L. J.", "" ], [ "Lupion", "Juan", "" ], [ "Tricas", "Fernando", "" ] ]
cs/0701119
Petr Ivankov
Petr R. Ivankov, Nikolay P. Ivankov
The framework for simulation of dynamics of mechanical aggregates
7 pages, 4 figures
null
null
null
cs.CE
null
A framework for simulation of dynamics of mechanical aggregates has been developed. This framework enables us to build model of aggregate from models of its parts. Framework is a part of universal framework for science and engineering.
[ { "version": "v1", "created": "Fri, 19 Jan 2007 12:18:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Ivankov", "Petr R.", "" ], [ "Ivankov", "Nikolay P.", "" ] ]
cs/0701121
Bernard Mourrain
Changhe Tu (Shandong University), Wenping Wang (University of Hong Kong), Bernard Mourrain (INRIA Sophia Antipolis), Jiaye Wang (Shandong University)
Signature Sequence of Intersection Curve of Two Quadrics for Exact Morphological Classification
null
null
null
null
cs.CG cs.SC
null
We present an efficient method for classifying the morphology of the intersection curve of two quadrics (QSIC) in PR3, 3D real projective space; here, the term morphology is used in a broad sense to mean the shape, topological, and algebraic properties of a QSIC, including singularity, reducibility, the number of connected components, and the degree of each irreducible component, etc. There are in total 35 different QSIC morphologies with non-degenerate quadric pencils. For each of these 35 QSIC morphologies, through a detailed study of the eigenvalue curve and the index function jump we establish a characterizing algebraic condition expressed in terms of the Segre characteristics and the signature sequence of a quadric pencil. We show how to compute a signature sequence with rational arithmetic so as to determine the morphology of the intersection curve of any two given quadrics. Two immediate applications of our results are the robust topological classification of QSIC in computing B-rep surface representation in solid modeling and the derivation of algebraic conditions for collision detection of quadric primitives.
[ { "version": "v1", "created": "Fri, 19 Jan 2007 08:08:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Tu", "Changhe", "", "Shandong University" ], [ "Wang", "Wenping", "", "University of Hong\n Kong" ], [ "Mourrain", "Bernard", "", "INRIA Sophia Antipolis" ], [ "Wang", "Jiaye", "", "Shandong\n University" ] ]
cs/0701125
Marcus Hutter
Marcus Hutter
Universal Algorithmic Intelligence: A mathematical top->down approach
70 pages
In Artificial General Intelligence, Springer (2007) 227-290
null
IDSIA-01-03
cs.AI cs.LG
null
Sequential decision theory formally solves the problem of rational agents in uncertain worlds if the true environmental prior probability distribution is known. Solomonoff's theory of universal induction formally solves the problem of sequence prediction for unknown prior distribution. We combine both ideas and get a parameter-free theory of universal Artificial Intelligence. We give strong arguments that the resulting AIXI model is the most intelligent unbiased agent possible. We outline how the AIXI model can formally solve a number of problem classes, including sequence prediction, strategic games, function minimization, reinforcement and supervised learning. The major drawback of the AIXI model is that it is uncomputable. To overcome this problem, we construct a modified algorithm AIXItl that is still effectively more intelligent than any other time t and length l bounded agent. The computation time of AIXItl is of the order t x 2^l. The discussion includes formal definitions of intelligence order relations, the horizon problem and relations of the AIXI theory to other AI approaches.
[ { "version": "v1", "created": "Sat, 20 Jan 2007 00:18:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
cs/0701128
M. V. Panduranga Rao
M. V. Panduranga Rao
Interference Automata
19 pages. A preliminary version appears under the title "On a Model of Computation based on Optical Interference" in Proc. of the 16-th Australasian Workshop on Combinatorial Algorithms (AWOCA'05), pp. 249-261
null
null
null
cs.CC
null
We propose a computing model, the Two-Way Optical Interference Automata (2OIA), that makes use of the phenomenon of optical interference. We introduce this model to investigate the increase in power, in terms of language recognition, of a classical Deterministic Finite Automaton (DFA) when endowed with the facility of optical interference. The question is in the spirit of Two-Way Finite Automata With Quantum and Classical States (2QCFA) [A. Ambainis and J. Watrous, Two-way Finite Automata With Quantum and Classical States, Theoretical Computer Science, 287 (1), 299-311, (2002)] wherein the classical DFA is augmented with a quantum component of constant size. We test the power of 2OIA against the languages mentioned in the above paper. We give efficient 2OIA algorithms to recognize languages for which 2QCFA machines have been shown to exist, as well as languages whose status vis-a-vis 2QCFA has been posed as open questions. Finally we show the existence of a language that cannot be recognized by a 2OIA but can be recognized by an $O(n^3)$ space Turing machine.
[ { "version": "v1", "created": "Mon, 22 Jan 2007 09:14:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Rao", "M. V. Panduranga", "" ] ]
cs/0701130
Thomas C. Schmidt
Thomas C. Schmidt and Matthias W\"ahlisch and Ying Zhang
On the Correlation of Geographic and Network Proximity at Internet Edges and its Implications for Mobile Unicast and Multicast Routing
6 pages including 6 figures
in Proceedings of the IEEE ICN'07, IEEE Computer Society Press, Washington, DC, USA, April 2007
null
null
cs.NI cs.AR cs.PF
null
Significant effort has been invested recently to accelerate handover operations in a next generation mobile Internet. Corresponding works for developing efficient mobile multicast management are emergent. Both problems simultaneously expose routing complexity between subsequent points of attachment as a characteristic parameter for handover performance in access networks. As continuous mobility handovers necessarily occur between access routers located in geographic vicinity, this paper investigates on the hypothesis that geographically adjacent edge networks attain a reduced network distances as compared to arbitrary Internet nodes. We therefore evaluate and analyze edge distance distributions in various regions for clustered IP ranges on their geographic location such as a city. We use traceroute to collect packet forwarding path and round-trip-time of each intermediate node to scan-wise derive an upper bound of the node distances. Results of different scanning origins are compared to obtain the best estimation of network distance of each pair. Our results are compared with corresponding analysis of CAIDA Skitter data, overall leading to fairly stable, reproducible edge distance distributions. As a first conclusion on expected impact on handover performance measures, our results indicate a general optimum for handover anticipation time in 802.11 networks of 25 ms.
[ { "version": "v1", "created": "Sat, 20 Jan 2007 23:06:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidt", "Thomas C.", "" ], [ "Wählisch", "Matthias", "" ], [ "Zhang", "Ying", "" ] ]
cs/0701132
Mardavij Roozbehani
Eric Feron (School of Aerospace Engineering, Georgia Institute of Technology) Mardavij Roozbehani (Department of Aeronautics and Astronautics, Massachusetts Institue of Technology)
Certifying controls and systems software
12 pages, 2 figures, 1 Matlab Code. To be submitted to AIAA journal of guidance and control. In this revised version, support and funding resources were added to the acknowledgement section. LIDS Publication #: 2745
null
null
LIDS # 2745
cs.SE
null
Software system certification presents itself with many challenges, including the necessity to certify the system at the level of functional requirements, code and binary levels, the need to chase down run-time errors, and the need for proving timing properties of the eventual, compiled system. This paper illustrates possible approaches for certifying code that arises from control systems requirements as far as stability properties are concerned. The relative simplicity of the certification process should encourage the development of systematic procedures for certifying control system codes for more complex environments.
[ { "version": "v1", "created": "Sun, 21 Jan 2007 19:34:45 GMT" }, { "version": "v2", "created": "Tue, 23 Jan 2007 16:12:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Feron", "Eric", "", "School of Aerospace Engineering, Georgia Institute of\n Technology" ], [ "Roozbehani", "Mardavij", "", "Department of Aeronautics and Astronautics,\n Massachusetts Institue of Technology" ] ]
cs/0701133
Athina Markopoulou
Athina Markopoulou and David Cheriton
The Case for Redundant Arrays of Internet Links (RAIL)
null
null
null
null
cs.NI
null
It is well-known that wide-area networks face today several performance and reliability problems. In this work, we propose to solve these problems by connecting two or more local-area networks together via a Redundant Array of Internet Links (or RAIL) and by proactively replicating each packet over these links. In that sense, RAIL is for networks what RAID (Redundant Array of Inexpensive Disks) was for disks. In this paper, we describe the RAIL approach, present our prototype (called the RAILedge), and evaluate its performance. First, we demonstrate that using multiple Internet links significantly improves the end-to-end performance in terms of network-level as well as application-level metrics for Voice-over-IP and TCP. Second, we show that a delay padding mechanism is needed to complement RAIL when there is significant delay disparity between the paths. Third, we show that two paths provide most of the benefit, if carefully managed. Finally, we discuss a RAIL-network architecture, where RAILedges make use of path redundancy, route control and application-specific mechanisms, to improve WAN performance.
[ { "version": "v1", "created": "Sun, 21 Jan 2007 19:59:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Markopoulou", "Athina", "" ], [ "Cheriton", "David", "" ] ]
cs/0701135
Jinyun Ke
Jinyun KE
Complex networks and human language
null
null
null
null
cs.CL
null
This paper introduces how human languages can be studied in light of recent development of network theories. There are two directions of exploration. One is to study networks existing in the language system. Various lexical networks can be built based on different relationships between words, being semantic or syntactic. Recent studies have shown that these lexical networks exhibit small-world and scale-free features. The other direction of exploration is to study networks of language users (i.e. social networks of people in the linguistic community), and their role in language evolution. Social networks also show small-world and scale-free features, which cannot be captured by random or regular network models. In the past, computational models of language change and language emergence often assume a population to have a random or regular structure, and there has been little discussion how network structures may affect the dynamics. In the second part of the paper, a series of simulation models of diffusion of linguistic innovation are used to illustrate the importance of choosing realistic conditions of population structure for modeling language change. Four types of social networks are compared, which exhibit two categories of diffusion dynamics. While the questions about which type of networks are more appropriate for modeling still remains, we give some preliminary suggestions for choosing the type of social networks for modeling.
[ { "version": "v1", "created": "Mon, 22 Jan 2007 00:45:31 GMT" } ]
2007-05-23T00:00:00
[ [ "KE", "Jinyun", "" ] ]
cs/0701136
Stevan Harnad
Chawki Hajjem, Stevan Harnad
Citation Advantage For OA Self-Archiving Is Independent of Journal Impact Factor, Article Age, and Number of Co-Authors
null
null
null
null
cs.IR cs.DL
null
Eysenbach has suggested that the OA (Green) self-archiving advantage might just be an artifact of potential uncontrolled confounding factors such as article age (older articles may be both more cited and more likely to be self-archived), number of authors (articles with more authors might be more cited and more self-archived), subject matter (the subjects that are cited more, self-archive more), country (same thing), number of authors, citation counts of authors, etc. Chawki Hajjem (doctoral candidate, UQaM) had already shown that the OA advantage was present in all cases when articles were analysed separately by age, subject matter or country. He has now done a multiple regression analysis jointly testing (1) article age, (2) journal impact factor, (3) number of authors, and (4) OA self-archiving as separate factors for 442,750 articles in 576 (biomedical) journals across 11 years, and has shown that each of the four factors contributes an independent, statistically significant increment to the citation counts. The OA-self-archiving advantage remains a robust, independent factor. Having successfully responded to his challenge, we now challenge Eysenbach to demonstrate -- by testing a sufficiently broad and representative sample of journals at all levels of the journal quality, visibility and prestige hierarchy -- that his finding of a citation advantage for Gold OA (articles published OA on the high-profile website of the only journal he tested (PNAS) over Green OA articles in the same journal (self-archived on the author's website) was not just an artifact of having tested only one very high-profile journal.
[ { "version": "v1", "created": "Mon, 22 Jan 2007 02:14:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Hajjem", "Chawki", "" ], [ "Harnad", "Stevan", "" ] ]