id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0612048 | Changjia Chen | chunxi li and changjia chen | Queue Model of Leaf Degree Keeping Process in Gnutella Network | 3 pages, 6 figures | null | null | null | cs.NI cs.PF | null | Leaf degree keeping process of Gnutella is discussed in this paper. Queue
system based on rules of Gnutella protocol are introduced to modeling this
process. The leaf degree distributions resulted from the queue system and from
our real measurement are compared. The well match of those distributions reveal
that the leaf degree distribution in Gnutella network should not be power law
or power law like as reported before. It is more likely a distribution driven
by certain queue process specified by the protocol.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 00:44:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"li",
"chunxi",
""
],
[
"chen",
"changjia",
""
]
]
|
cs/0612052 | Jon Feldman | Jon Feldman, S. Muthukrishnan, Martin Pal, Cliff Stein | Budget Optimization in Search-Based Advertising Auctions | null | null | null | null | cs.DS cs.CE cs.GT | null | Internet search companies sell advertisement slots based on users' search
queries via an auction. While there has been a lot of attention on the auction
process and its game-theoretic aspects, our focus is on the advertisers. In
particular, the advertisers have to solve a complex optimization problem of how
to place bids on the keywords of their interest so that they can maximize their
return (the number of user clicks on their ads) for a given budget. We model
the entire process and study this budget optimization problem. While most
variants are NP hard, we show, perhaps surprisingly, that simply randomizing
between two uniform strategies that bid equally on all the keywords works well.
More precisely, this strategy gets at least 1-1/e fraction of the maximum
clicks possible. Such uniform strategies are likely to be practical. We also
present inapproximability results, and optimal algorithms for variants of the
budget optimization problem.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 17:33:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Feldman",
"Jon",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Pal",
"Martin",
""
],
[
"Stein",
"Cliff",
""
]
]
|
cs/0612054 | Wojciech Mazurczyk | Wojciech Mazurczyk, Zbigniew Kotulski | Lightweight security mechanism for PSTN-VoIP cooperation | 6 pages, 5 figures | null | null | null | cs.CR cs.MM | null | In this paper we describe a new, lightweight security mechanism for PSTN-VoIP
cooperation that is based on two information hiding techniques: digital
watermarking and steganography. Proposed scheme is especially suitable for
PSTN-IP-PSTN (toll-by-passing) scenario which nowadays is very popular
application of IP Telephony systems. With the use of this mechanism we
authenticate end-to-end transmitted voice between PSTN users. Additionally we
improve IP part traffic security (both media stream and VoIP signalling
messages). Exemplary scenario is presented for SIP signalling protocol along
with SIP-T extension and H.248/Megaco protocol.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 22:05:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Kotulski",
"Zbigniew",
""
]
]
|
cs/0612055 | Milan Ruzic | Anna Pagh and Rasmus Pagh and Milan Ruzic | Linear Probing with Constant Independence | 13 pages | null | null | null | cs.DS cs.DB | null | Hashing with linear probing dates back to the 1950s, and is among the most
studied algorithms. In recent years it has become one of the most important
hash table organizations since it uses the cache of modern computers very well.
Unfortunately, previous analysis rely either on complicated and space consuming
hash functions, or on the unrealistic assumption of free access to a truly
random hash function. Already Carter and Wegman, in their seminal paper on
universal hashing, raised the question of extending their analysis to linear
probing. However, we show in this paper that linear probing using a pairwise
independent family may have expected {\em logarithmic} cost per operation. On
the positive side, we show that 5-wise independence is enough to ensure
constant expected time per operation. This resolves the question of finding a
space and time efficient hash function that provably ensures good performance
for linear probing.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 22:50:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pagh",
"Anna",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Ruzic",
"Milan",
""
]
]
|
cs/0612056 | Gayathree U | U. Gayathree | Conscious Intelligent Systems - Part 1 : I X I | null | null | null | null | cs.AI | null | Did natural consciousness and intelligent systems arise out of a path that
was co-evolutionary to evolution? Can we explain human self-consciousness as
having risen out of such an evolutionary path? If so how could it have been?
In this first part of a two-part paper (titled IXI), we take a learning
system perspective to the problem of consciousness and intelligent systems, an
approach that may look unseasonable in this age of fMRI's and high tech
neuroscience.
We posit conscious intelligent systems in natural environments and wonder how
natural factors influence their design paths. Such a perspective allows us to
explain seamlessly a variety of natural factors, factors ranging from the rise
and presence of the human mind, man's sense of I, his self-consciousness and
his looping thought processes to factors like reproduction, incubation,
extinction, sleep, the richness of natural behavior, etc. It even allows us to
speculate on a possible human evolution scenario and other natural phenomena.
| [
{
"version": "v1",
"created": "Sat, 9 Dec 2006 17:18:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gayathree",
"U.",
""
]
]
|
cs/0612057 | Gayathree U | U. Gayathree | Conscious Intelligent Systems - Part II - Mind, Thought, Language and
Understanding | null | null | null | null | cs.AI | null | This is the second part of a paper on Conscious Intelligent Systems. We use
the understanding gained in the first part (Conscious Intelligent Systems Part
1: IXI (arxiv id cs.AI/0612056)) to look at understanding. We see how the
presence of mind affects understanding and intelligent systems; we see that the
presence of mind necessitates language. The rise of language in turn has
important effects on understanding. We discuss the humanoid question and how
the question of self-consciousness (and by association mind/thought/language)
would affect humanoids too.
| [
{
"version": "v1",
"created": "Sat, 9 Dec 2006 17:28:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gayathree",
"U.",
""
]
]
|
cs/0612058 | Eric Vigoda | Daniel Stefankovic, Santosh Vempala, Eric Vigoda | Adaptive Simulated Annealing: A Near-optimal Connection between Sampling
and Counting | null | null | null | null | cs.DS cs.DM | null | We present a near-optimal reduction from approximately counting the
cardinality of a discrete set to approximately sampling elements of the set. An
important application of our work is to approximating the partition function
$Z$ of a discrete system, such as the Ising model, matchings or colorings of a
graph. The typical approach to estimating the partition function $Z(\beta^*)$
at some desired inverse temperature $\beta^*$ is to define a sequence, which we
call a {\em cooling schedule}, $\beta_0=0<\beta_1<...<\beta_\ell=\beta^*$ where
Z(0) is trivial to compute and the ratios $Z(\beta_{i+1})/Z(\beta_i)$ are easy
to estimate by sampling from the distribution corresponding to $Z(\beta_i)$.
Previous approaches required a cooling schedule of length $O^*(\ln{A})$ where
$A=Z(0)$, thereby ensuring that each ratio $Z(\beta_{i+1})/Z(\beta_i)$ is
bounded. We present a cooling schedule of length $\ell=O^*(\sqrt{\ln{A}})$.
For well-studied problems such as estimating the partition function of the
Ising model, or approximating the number of colorings or matchings of a graph,
our cooling schedule is of length $O^*(\sqrt{n})$, which implies an overall
savings of $O^*(n)$ in the running time of the approximate counting algorithm
(since roughly $\ell$ samples are needed to estimate each ratio).
| [
{
"version": "v1",
"created": "Sun, 10 Dec 2006 20:00:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Stefankovic",
"Daniel",
""
],
[
"Vempala",
"Santosh",
""
],
[
"Vigoda",
"Eric",
""
]
]
|
cs/0612060 | Sreyash Kenkre | Sreyash Kenkre, Sundar Vishwanathan | The Common Prefix Problem On Trees | 8 pages | null | null | null | cs.DS cs.CC | null | We present a theoretical study of a problem arising in database query
optimization, which we call as The Common Prefix Problem. We present a
$(1-o(1))$ factor approximation algorithm for this problem, when the underlying
graph is a binary tree. We then use a result of Feige and Kogan to show that
even on stars, the problem is hard to approximate.
| [
{
"version": "v1",
"created": "Mon, 11 Dec 2006 12:32:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kenkre",
"Sreyash",
""
],
[
"Vishwanathan",
"Sundar",
""
]
]
|
cs/0612062 | Federico Calzolari | Federico Calzolari, Michele Mammini, Monica Monachini | Unifying Lexicons in view of a Phonological and Morphological Lexical DB | 4 pages | null | null | null | cs.IR | null | The present work falls in the line of activities promoted by the European
Languguage Resource Association (ELRA) Production Committee (PCom) and raises
issues in methods, procedures and tools for the reusability, creation, and
management of Language Resources. A two-fold purpose lies behind this
experiment. The first aim is to investigate the feasibility, define methods and
procedures for combining two Italian lexical resources that have incompatible
formats and complementary information into a Unified Lexicon (UL). The adopted
strategy and the procedures appointed are described together with the driving
criterion of the merging task, where a balance between human and computational
efforts is pursued. The coverage of the UL has been maximized, by making use of
simple and fast matching procedures. The second aim is to exploit this newly
obtained resource for implementing the phonological and morphological layers of
the CLIPS lexical database. Implementing these new layers and linking them with
the already exisitng syntactic and semantic layers is not a trivial task. The
constraints imposed by the model, the impact at the architectural level and the
solution adopted in order to make the whole database `speak' efficiently are
presented. Advantages vs. disadvantages are discussed.
| [
{
"version": "v1",
"created": "Mon, 11 Dec 2006 14:45:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Calzolari",
"Federico",
""
],
[
"Mammini",
"Michele",
""
],
[
"Monachini",
"Monica",
""
]
]
|
cs/0612066 | Karim El Defrawy | Karim El Defrawy, Athina Markopoulou and Katerina Argyraki | Optimal Filtering for DDoS Attacks | 13 pages, 14 figures | null | null | null | cs.NI | null | Distributed Denial-of-Service (DDoS) attacks are a major problem in the
Internet today. In one form of a DDoS attack, a large number of compromised
hosts send unwanted traffic to the victim, thus exhausting the resources of the
victim and preventing it from serving its legitimate clients. One of the main
mechanisms that have been proposed to deal with DDoS is filtering, which allows
routers to selectively block unwanted traffic. Given the magnitude of DDoS
attacks and the high cost of filters in the routers today, the successful
mitigation of a DDoS attack using filtering crucially depends on the efficient
allocation of filtering resources. In this paper, we consider a single router,
typically the gateway of the victim, with a limited number of available
filters. We study how to optimally allocate filters to attack sources, or
entire domains of attack sources, so as to maximize the amount of good traffic
preserved, under a constraint on the number of filters. We formulate the
problem as an optimization problem and solve it optimally using dynamic
programming, study the properties of the optimal allocation, experiment with a
simple heuristic and evaluate our solutions for a range of realistic
attack-scenarios. First, we look at a single-tier where the collateral damage
is high due to the filtering at the granularity of domains. Second, we look at
the two-tier problem where we have an additional constraint on the number of
filters and the filtering is performed on the granularity of attackers and
domains.
| [
{
"version": "v1",
"created": "Tue, 12 Dec 2006 04:52:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Defrawy",
"Karim El",
""
],
[
"Markopoulou",
"Athina",
""
],
[
"Argyraki",
"Katerina",
""
]
]
|
cs/0612068 | Esben Rune Hansen | Esben Rune Hansen and Henrik Reif Andersen | Interactive Configuration by Regular String Constraints | Tech Report | null | null | null | cs.AI | null | A product configurator which is complete, backtrack free and able to compute
the valid domains at any state of the configuration can be constructed by
building a Binary Decision Diagram (BDD). Despite the fact that the size of the
BDD is exponential in the number of variables in the worst case, BDDs have
proved to work very well in practice. Current BDD-based techniques can only
handle interactive configuration with small finite domains. In this paper we
extend the approach to handle string variables constrained by regular
expressions. The user is allowed to change the strings by adding letters at the
end of the string. We show how to make a data structure that can perform fast
valid domain computations given some assignment on the set of string variables.
We first show how to do this by using one large DFA. Since this approach is
too space consuming to be of practical use, we construct a data structure that
simulates the large DFA and in most practical cases are much more space
efficient. As an example a configuration problem on $n$ string variables with
only one solution in which each string variable is assigned to a value of
length of $k$ the former structure will use $\Omega(k^n)$ space whereas the
latter only need $O(kn)$. We also show how this framework easily can be
combined with the recent BDD techniques to allow both boolean, integer and
string variables in the configuration problem.
| [
{
"version": "v1",
"created": "Tue, 12 Dec 2006 16:21:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hansen",
"Esben Rune",
""
],
[
"Andersen",
"Henrik Reif",
""
]
]
|
cs/0612070 | Ilya Safro Mr. | Sergey Benditkis, Illya Safro | Generalizations of the Hanoi Towers Problem | null | null | null | null | cs.DM | null | Our theme bases on the classical Hanoi Towers Problem. In this paper we will
define a new problem, permitting some positions, that were not legal in the
classical problem. Our goal is to find an optimal (shortest possible) sequence
of discs' moves. Besides that, we will research all versions of 3-pegs
classical problem with some special constraints, when some types of moves are
disallowed.
| [
{
"version": "v1",
"created": "Wed, 13 Dec 2006 22:30:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Benditkis",
"Sergey",
""
],
[
"Safro",
"Illya",
""
]
]
|
cs/0612071 | Francis Heylighen | Francis Heylighen | Why is Open Access Development so Successful? Stigmergic organization
and the economics of information | null | in: B. Lutterbeck, M. Baerwolff & R. A. Gehring (eds.), Open
Source Jahrbuch 2007, Lehmanns Media, 2007 | null | ECCO Working Paper 2006-06 | cs.CY cs.DL physics.soc-ph | null | The explosive development of "free" or "open source" information goods
contravenes the conventional wisdom that markets and commercial organizations
are necessary to efficiently supply products. This paper proposes a theoretical
explanation for this phenomenon, using concepts from economics and theories of
self-organization. Once available on the Internet, information is intrinsically
not a scarce good, as it can be replicated virtually without cost. Moreover,
freely distributing information is profitable to its creator, since it improves
the quality of the information, and enhances the creator's reputation. This
provides a sufficient incentive for people to contribute to open access
projects. Unlike traditional organizations, open access communities are open,
distributed and self-organizing. Coordination is achieved through stigmergy:
listings of "work-in-progress" direct potential contributors to the tasks where
their contribution is most likely to be fruitful. This obviates the need both
for centralized planning and for the "invisible hand" of the market.
| [
{
"version": "v1",
"created": "Thu, 14 Dec 2006 12:15:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Heylighen",
"Francis",
""
]
]
|
cs/0612074 | Zengjian Hu | Petra Berenbrink and Colin Cooper and Zengjian Hu | Energy Efficient Randomized Communication in Unknown AdHoc Networks | 15 pages. 1 figure | null | null | null | cs.DC cs.DS | null | This paper studies broadcasting and gossiping algorithms in random and
general AdHoc networks. Our goal is not only to minimise the broadcasting and
gossiping time, but also to minimise the energy consumption, which is measured
in terms of the total number of messages (or transmissions) sent. We assume
that the nodes of the network do not know the network, and that they can only
send with a fixed power, meaning they can not adjust the areas sizes that their
messages cover. We believe that under these circumstances the number of
transmissions is a very good measure for the overall energy consumption.
For random networks, we present a broadcasting algorithm where every node
transmits at most once. We show that our algorithm broadcasts in $O(\log n)$
steps, w.h.p, where $n$ is the number of nodes. We then present a $O(d \log n)$
($d$ is the expected degree) gossiping algorithm using $O(\log n)$ messages per
node.
For general networks with known diameter $D$, we present a randomised
broadcasting algorithm with optimal broadcasting time $O(D \log (n/D) + \log^2
n)$ that uses an expected number of $O(\log^2 n / \log (n/D))$ transmissions
per node. We also show a tradeoff result between the broadcasting time and the
number of transmissions: we construct a network such that any oblivious
algorithmusing a time-invariant distribution requires $\Omega(\log^2 n / \log
(n/D))$ messages per node in order to finish broadcasting in optimal time. This
demonstrates the tightness of our upper bound. We also show that no oblivious
algorithm can complete broadcasting w.h.p. using $o(\log n)$ messages per node.
| [
{
"version": "v1",
"created": "Fri, 15 Dec 2006 03:43:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Berenbrink",
"Petra",
""
],
[
"Cooper",
"Colin",
""
],
[
"Hu",
"Zengjian",
""
]
]
|
cs/0612081 | Manas Tungare | Manas Tungare, Pardha S. Pyla, Manuel P\'erez-Qui\~nones, and Steve
Harrison | Personal Information Ecosystems and Implications for Design | null | null | null | null | cs.HC | null | Today, people use multiple devices to fulfill their information needs.
However, designers design each device individually, without accounting for the
other devices that users may also use. In many cases, the applications on all
these devices are designed to be functional replicates of each other. We argue
that this results in an over-reliance on data synchronization across devices,
version control nightmares, and increased burden of file management. In this
paper, we present the idea of a \textit{personal information ecosystem}, an
analogy to biological ecosystems, which allows us to discuss the
inter-relationships among these devices to fulfill the information needs of the
user. There is a need for designers to design devices as part of a complete
ecosystem, not as independent devices that simply share data replicated across
them. To help us understand this domain and to facilitate the dialogue and
study of such systems, we present the terminology, classifications of the
interdependencies among different devices, and resulting implications for
design.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 07:53:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tungare",
"Manas",
""
],
[
"Pyla",
"Pardha S.",
""
],
[
"Pérez-Quiñones",
"Manuel",
""
],
[
"Harrison",
"Steve",
""
]
]
|
cs/0612082 | Thierry Despeyroux | Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis) | Developing efficient parsers in Prolog: the CLF manual (v1.0) | null | null | null | null | cs.SE | null | This document describes a couple of tools that help to quickly design and
develop computer (formalized) languages. The first one use Flex to perform
lexical analysis and the second is an extention of Prolog DCGs to perfom
syntactical analysis. Initially designed as a new component for the Centaur
system, these tools are now available independently and can be used to
construct efficient Prolog parsers that can be integrated in Prolog or
heterogeneous systems. This is the initial version of the CLF documentation.
Updated version will be available online when necessary.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 08:40:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Despeyroux",
"Thierry",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
]
]
|
cs/0612085 | Roberto Bagnara | Roberto Bagnara, Patricia M. Hill, Enea Zaffanella | The Parma Polyhedra Library: Toward a Complete Set of Numerical
Abstractions for the Analysis and Verification of Hardware and Software
Systems | 38 pages, 2 figures, 3 listings, 3 tables | null | null | Quaderno 457 | cs.MS cs.PL | null | Since its inception as a student project in 2001, initially just for the
handling (as the name implies) of convex polyhedra, the Parma Polyhedra Library
has been continuously improved and extended by joining scrupulous research on
the theoretical foundations of (possibly non-convex) numerical abstractions to
a total adherence to the best available practices in software development. Even
though it is still not fully mature and functionally complete, the Parma
Polyhedra Library already offers a combination of functionality, reliability,
usability and performance that is not matched by similar, freely available
libraries. In this paper, we present the main features of the current version
of the library, emphasizing those that distinguish it from other similar
libraries and those that are important for applications in the field of
analysis and verification of hardware and software systems.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 10:15:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Zaffanella",
"Enea",
""
]
]
|
cs/0612088 | Julien Robert | Julien Robert and Nicolas Schabanel | Non-Clairvoyant Batch Sets Scheduling: Fairness is Fair enough | 12 pages, 1 figure | null | null | null | cs.DC cs.DS | null | Scheduling questions arise naturally in many different areas among which
operating system design, compiling,... In real life systems, the
characteristics of the jobs (such as release time and processing time) are
usually unknown and unpredictable beforehand. The system is typically unaware
of the remaining work in each job or of the ability of the job to take
advantage of more resources. Following these observations, we adopt the job
model by Edmonds et al (2000, 2003) in which the jobs go through a sequence of
different phases. Each phase consists of a certain quantity of work and a
speed-up function that models how it takes advantage of the number of
processors it receives. We consider the non-clairvoyant online setting where a
collection of jobs arrives at time 0. We consider the metrics setflowtime
introduced by Robert et al (2007). The goal is to minimize the sum of the
completion time of the sets, where a set is completed when all of its jobs are
done. If the input consists of a single set of jobs, this is simply the
makespan of the jobs; and if the input consists of a collection of singleton
sets, it is simply the flowtime of the jobs. We show that the non-clairvoyant
strategy EQUIoEQUI that evenly splits the available processors among the still
unserved sets and then evenly splits these processors among the still
uncompleted jobs of each unserved set, achieves a competitive ratio
(2+\sqrt3+o(1))\frac{ln n}{lnln n} for the setflowtime minimization and that
this is asymptotically optimal (up to a constant factor), where n is the size
of the largest set. For makespan minimization, we show that the non-clairvoyant
strategy EQUI achieves a competitive ratio of (1+o(1))\frac{ln n}{lnln n},
which is again asymptotically optimal.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 15:19:59 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Dec 2006 21:55:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Robert",
"Julien",
""
],
[
"Schabanel",
"Nicolas",
""
]
]
|
cs/0612090 | Vita Hinze-Hoare | Vita Hinze-Hoare | A Review of Papers that have a bearing on an Analysis of User
Interactions in A Collaborative On-line Laboratory | null | null | null | null | cs.HC | null | A number of papers have been reviewed in the areas of HCI, CSCW, CSCL. These
have been analyzed with a view to extract the ideas relevant to a consideration
of user interactions in a collaborative on line laboratory which is being under
development for use in the ITO BSc course at Southampton University. The
construction of new theoretical models is to be based upon principles of
collaborative HCI design and constructivist and situational educational theory.
An investigation of the review papers it is hoped will lead towards a
methodology/framework that can be used as guidance for collaborative learning
systems and these will need to be developed alongside the requirements as they
change during the development cycles. The primary outcome will be the analysis
and re-design of the online e-learning laboratory together with a measure of
its efficacy in the learning process.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 22:24:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
]
|
cs/0612092 | Ahmed Sidky Ahmed Sidky | Ahmed Sidky, James Arthur | Agile Adoption Process Framework | This is a reference document containing an overview of the adoption
framework along with all the indicators used for the assessment of the agile
practices | null | null | null | cs.SE | null | Today many organizations aspire to adopt agile processes in hope of
overcoming some of the difficulties they are facing with their current software
development process. There is no structured framework for the agile adoption
process. This paper presents a 3-Stage process framework that assists
organization and guides organizations through their agile adoption efforts. The
Process Framework has been received significantly positive feedback from
experts and leaders in agile adoption industry.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 16:35:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sidky",
"Ahmed",
""
],
[
"Arthur",
"James",
""
]
]
|
cs/0612093 | Jo\~ao Barros | Miguel S. Silva, Francisco Martins, Luis Lopes, Joao Barros | A Calculus for Sensor Networks | 24 pages, 1 figure, submitted for publication | null | null | null | cs.DC cs.PL | null | We consider the problem of providing a rigorous model for programming
wireless sensor networks. Assuming that collisions, packet losses, and errors
are dealt with at the lower layers of the protocol stack, we propose a Calculus
for Sensor Networks (CSN) that captures the main abstractions for programming
applications for this class of devices. Besides providing the syntax and
semantics for the calculus, we show its expressiveness by providing
implementations for several examples of typical operations on sensor networks.
Also included is a detailed discussion of possible extensions to CSN that
enable the modeling of other important features of these networks such as
sensor state, sampling strategies, and network security.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 14:45:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Silva",
"Miguel S.",
""
],
[
"Martins",
"Francisco",
""
],
[
"Lopes",
"Luis",
""
],
[
"Barros",
"Joao",
""
]
]
|
cs/0612098 | Manik Lal Das | Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak | Algorithms and Approaches of Proxy Signature: A Survey | 29 pages | null | null | null | cs.CR | null | Numerous research studies have been investigated on proxy signatures over the
last decade. This survey reviews the research progress on proxy signatures,
analyzes a few notable proposals, and provides an overall remark of these
proposals.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 06:09:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Das",
"Manik Lal",
""
],
[
"Saxena",
"Ashutosh",
""
],
[
"Phatak",
"Deepak B.",
""
]
]
|
cs/0612100 | Rob van Stee | Leah Epstein and Rob van Stee | Improved results for a memory allocation problem | null | null | null | null | cs.DS | null | We consider a memory allocation problem that can be modeled as a version of
bin packing where items may be split, but each bin may contain at most two
(parts of) items. A 3/2-approximation algorithm and an NP-hardness proof for
this problem was given by Chung et al. We give a simpler 3/2-approximation
algorithm for it which is in fact an online algorithm. This algorithm also has
good performance for the more general case where each bin may contain at most k
parts of items. We show that this general case is also strongly NP-hard.
Additionally, we give an efficient 7/5-approximation algorithm.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 13:39:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Epstein",
"Leah",
""
],
[
"van Stee",
"Rob",
""
]
]
|
cs/0612102 | Nilesh Dalvi | Nilesh Dalvi and Dan Suciu | The Dichotomy of Conjunctive Queries on Probabilistic Structures | null | null | null | null | cs.DB | null | We show that for every conjunctive query, the complexity of evaluating it on
a probabilistic database is either \PTIME or #\P-complete, and we give an
algorithm for deciding whether a given conjunctive query is \PTIME or
#\P-complete. The dichotomy property is a fundamental result on query
evaluation on probabilistic databases and it gives a complete classification of
the complexity of conjunctive queries.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 21:11:05 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jan 2007 06:51:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dalvi",
"Nilesh",
""
],
[
"Suciu",
"Dan",
""
]
]
|
cs/0612103 | Vibhor Rastogi | Vibhor Rastogi, Dan Suciu, Sungho Hong | The Boundary Between Privacy and Utility in Data Anonymization | null | null | null | null | cs.DB | null | We consider the privacy problem in data publishing: given a relation I
containing sensitive information 'anonymize' it to obtain a view V such that,
on one hand attackers cannot learn any sensitive information from V, and on the
other hand legitimate users can use V to compute useful statistics on I. These
are conflicting goals. We use a definition of privacy that is derived from
existing ones in the literature, which relates the a priori probability of a
given tuple t, Pr(t), with the a posteriori probability, Pr(t | V), and propose
a novel and quite practical definition for utility. Our main result is the
following. Denoting n the size of I and m the size of the domain from which I
was drawn (i.e. n < m) then: when the a priori probability is Pr(t) =
Omega(n/sqrt(m)) for some t, there exists no useful anonymization algorithm,
while when Pr(t) = O(n/m) for all tuples t, then we give a concrete
anonymization algorithm that is both private and useful. Our algorithm is quite
different from the k-anonymization algorithm studied intensively in the
literature, and is based on random deletions and insertions to I.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 00:21:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rastogi",
"Vibhor",
""
],
[
"Suciu",
"Dan",
""
],
[
"Hong",
"Sungho",
""
]
]
|
cs/0612104 | Keki Burjorjee | Keki Burjorjee | Sufficient Conditions for Coarse-Graining Evolutionary Dynamics | 19 pages, 1 figure. Accepted to the Foundations of Genetic Algorithms
Conference 2007 (FOGA IX) | null | null | null | cs.NE cs.AI | null | It is commonly assumed that the ability to track the frequencies of a set of
schemata in the evolving population of an infinite population genetic algorithm
(IPGA) under different fitness functions will advance efforts to obtain a
theory of adaptation for the simple GA. Unfortunately, for IPGAs with long
genomes and non-trivial fitness functions there do not currently exist
theoretical results that allow such a study. We develop a simple framework for
analyzing the dynamics of an infinite population evolutionary algorithm (IPEA).
This framework derives its simplicity from its abstract nature. In particular
we make no commitment to the data-structure of the genomes, the kind of
variation performed, or the number of parents involved in a variation
operation. We use this framework to derive abstract conditions under which the
dynamics of an IPEA can be coarse-grained. We then use this result to derive
concrete conditions under which it becomes computationally feasible to closely
approximate the frequencies of a family of schemata of relatively low order
over multiple generations, even when the bitstsrings in the evolving population
of the IPGA are long.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 02:18:17 GMT"
},
{
"version": "v2",
"created": "Sat, 5 May 2007 02:25:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burjorjee",
"Keki",
""
]
]
|
cs/0612105 | Elankovan Sundararajan Mr. | Elankovan Sundararajan and Aaron Harwood | Towards Parallel Computing on the Internet: Applications, Architectures,
Models and Programming Tools | 39 pages, 9 figures | null | null | null | cs.DC cs.PF | null | The development of Internet wide resources for general purpose parallel
computing poses the challenging task of matching computation and communication
complexity. A number of parallel computing models exist that address this for
traditional parallel architectures, and there are a number of emerging models
that attempt to do this for large scale Internet-based systems like
computational grids. In this survey we cover the three fundamental aspects --
application, architecture and model, and we show how they have been developed
over the last decade. We also cover programming tools that are currently being
used for parallel programming in computational grids. The trend in conventional
computational models are to put emphasis on efficient communication between
participating nodes by adapting different types of communication to network
conditions. Effects of dynamism and uncertainties that arise in large scale
systems are evidently important to understand and yet there is currently little
work that addresses this from a parallel computing perspective.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 06:38:21 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Dec 2006 00:51:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sundararajan",
"Elankovan",
""
],
[
"Harwood",
"Aaron",
""
]
]
|
cs/0612107 | Friedhelm. R. Drepper | Friedhelm R. Drepper | Voiced speech as secondary response of a self-consistent fundamental
drive | 13 pages with 3 figures | null | null | null | cs.SD nlin.AO | null | Voiced segments of speech are assumed to be composed of non-stationary
acoustic objects which can be described as stationary response of a
non-stationary fundamental drive (FD) process and which are furthermore suited
to reconstruct the hidden FD by using a voice adapted (self-consistent)
part-tone decomposition of the speech signal. The universality and robustness
of human pitch perception encourages the reconstruction of a band-limited FD in
the frequency range of the pitch. The self-consistent decomposition of voiced
continuants generates several part-tones which can be confirmed to be
topologically equivalent to corresponding acoustic modes of the excitation on
the transmitter side. As topologically equivalent image of a glottal master
oscillator, the self-consistent FD is suited to serve as low frequency part of
the basic time-scale separation of auditive perception and to describe the
broadband voiced excitation as entrained (synchronized) and/or modulated
primary response. Being guided by the acoustic correlates of pitch and loudness
perception, the time-scale separation avoids the conventional assumption of
stationary excitation and represents the basic decoding step of an advanced
precision transmission protocol of self-consistent (voiced) acoustic objects.
The present study is focussed on the adaptation of the trajectories (contours)
of the centre filter frequency of the part-tones to the chirp of the glottal
master oscillator.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 12:39:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Drepper",
"Friedhelm R.",
""
]
]
|
cs/0612108 | Fabien Mathieu | Dmitry Lebedev (INRIA Rocquencourt), Fabien Mathieu (INRIA
Rocquencourt), Laurent Viennot (INRIA Rocquencourt), Anh-Tuan Gai (INRIA
Rocquencourt), Julien Reynier (INRIA Rocquencourt, INRIA Rocquencourt),
Fabien De Montgolfier (INRIA Rocquencourt) | On Using Matching Theory to Understand P2P Network Design | null | null | null | null | cs.NI cs.GT | null | This paper aims to provide insight into stability of collaboration choices in
P2P networks. We study networks where exchanges between nodes are driven by the
desire to receive the best service available. This is the case for most
existing P2P networks. We explore an evolution model derived from stable
roommates theory that accounts for heterogeneity between nodes. We show that
most P2P applications can be modeled using stable matching theory. This is the
case whenever preference lists can be deduced from the exchange policy. In many
cases, the preferences lists are characterized by an interesting acyclic
property. We show that P2P networks with acyclic preferences possess a unique
stable state with good convergence properties.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 15:19:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lebedev",
"Dmitry",
"",
"INRIA Rocquencourt"
],
[
"Mathieu",
"Fabien",
"",
"INRIA\n Rocquencourt"
],
[
"Viennot",
"Laurent",
"",
"INRIA Rocquencourt"
],
[
"Gai",
"Anh-Tuan",
"",
"INRIA\n Rocquencourt"
],
[
"Reynier",
"Julien",
"",
"INRIA Rocquencourt, INRIA Rocquencourt"
],
[
"De Montgolfier",
"Fabien",
"",
"INRIA Rocquencourt"
]
]
|
cs/0612110 | James Hamilton | James Hamilton | Architecture for Modular Data Centers | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Several factors are driving high-scale deployments of large data centers
built upon commodity components. These commodity clusters are far cheaper than
mainframe systems of the past but they bring serious heat and power density
issues. Also the high failure rate of the individual components drives
significant administrative costs. This proposal outlines an architecture for
data center design based upon 20'x8'x8' modules that substantially changes how
these systems are acquired, administered, and then later recycled.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 19:36:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hamilton",
"James",
""
]
]
|
cs/0612112 | Boris Baryshnikov | Boris Baryshnikov, Cipri Clinciu, Conor Cunningham, Leo Giakoumakis,
Slava Oks, Stefano Stefani | Managing Query Compilation Memory Consumption to Improve DBMS Throughput | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | While there are known performance trade-offs between database page buffer
pool and query execution memory allocation policies, little has been written on
the impact of query compilation memory use on overall throughput of the
database management system (DBMS). We present a new aspect of the query
optimization problem and offer a solution implemented in Microsoft SQL Server
2005. The solution provides stable throughput for a range of workloads even
when memory requests outstrip the ability of the hardware to service those
requests.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 21:51:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Baryshnikov",
"Boris",
""
],
[
"Clinciu",
"Cipri",
""
],
[
"Cunningham",
"Conor",
""
],
[
"Giakoumakis",
"Leo",
""
],
[
"Oks",
"Slava",
""
],
[
"Stefani",
"Stefano",
""
]
]
|
cs/0612113 | Paul Greenfield | Paul Greenfield, Alan Fekete, Julian Jang, Dean Kuo, Surya Nepal | Isolation Support for Service-based Applications: A Position Paper | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | In this paper, we propose an approach to providing the benefits of isolation
in service-oriented applications where it is not feasible to hold traditional
locks for ACID transactions. Our technique, called "Promises", provides an
uniform view for clients which covers a wide range of implementation techniques
on the service side, all allowing the client to check a condition and then
later rely on that condition still holding.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 22:08:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Greenfield",
"Paul",
""
],
[
"Fekete",
"Alan",
""
],
[
"Jang",
"Julian",
""
],
[
"Kuo",
"Dean",
""
],
[
"Nepal",
"Surya",
""
]
]
|
cs/0612114 | Alexander Bohm | Alexander B\"ohm, Carl-Christian Kanne, Guido Moerkotte | Demaq: A Foundation for Declarative XML Message Processing | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | This paper gives an overview of Demaq, an XML message processing system
operating on the foundation of transactional XML message queues. We focus on
the syntax and semantics of its fully declarative, rule-based application
language and demonstrate our message-based programming paradigm in the context
of a case study. Further, we discuss optimization opportunities for executing
Demaq programs.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 22:29:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Böhm",
"Alexander",
""
],
[
"Kanne",
"Carl-Christian",
""
],
[
"Moerkotte",
"Guido",
""
]
]
|
cs/0612115 | Roger Barga | Roger S. Barga, Jonathan Goldstein, Mohamed Ali, Mingsheng Hong | Consistent Streaming Through Time: A Vision for Event Stream Processing | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Event processing will play an increasingly important role in constructing
enterprise applications that can immediately react to business critical events.
Various technologies have been proposed in recent years, such as event
processing, data streams and asynchronous messaging (e.g. pub/sub). We believe
these technologies share a common processing model and differ only in target
workload, including query language features and consistency requirements. We
argue that integrating these technologies is the next step in a natural
progression. In this paper, we present an overview and discuss the foundations
of CEDR, an event streaming system that embraces a temporal stream model to
unify and further enrich query language features, handle imperfections in event
delivery and define correctness guarantees. We describe specific contributions
made so far and outline next steps in developing the CEDR system.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 22:40:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Barga",
"Roger S.",
""
],
[
"Goldstein",
"Jonathan",
""
],
[
"Ali",
"Mohamed",
""
],
[
"Hong",
"Mingsheng",
""
]
]
|
cs/0612119 | Philippe Saux Picart | Cyril Brunie (LACO), Philippe Saux Picart (LM) | Symmetric Subresultants and Applications | null | null | null | null | cs.SC | null | Schur's transforms of a polynomial are used to count its roots in the unit
disk. These are generalized them by introducing the sequence of symmetric
sub-resultants of two polynomials. Although they do have a determinantal
definition, we show that they satisfy a structure theorem which allows us to
compute them with a type of Euclidean division. As a consequence, a fast
algorithm based on a dichotomic process and FFT is designed. We prove also that
these symmetric sub-resultants have a deep link with Toeplitz matrices.
Finally, we propose a new algorithm of inversion for such matrices. It has the
same cost as those already known, however it is fraction-free and consequently
well adapted to computer algebra.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 08:20:11 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Mar 2007 17:49:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brunie",
"Cyril",
"",
"LACO"
],
[
"Picart",
"Philippe Saux",
"",
"LM"
]
]
|
cs/0612120 | Francesco Ranzato | Francesco Ranzato and Francesco Tapparo | Generalizing the Paige-Tarjan Algorithm by Abstract Interpretation | Keywords: Abstract interpretation, abstract model checking, strong
preservation, Paige-Tarjan algorithm, refinement algorithm | null | null | null | cs.LO | null | The Paige and Tarjan algorithm (PT) for computing the coarsest refinement of
a state partition which is a bisimulation on some Kripke structure is well
known. It is also well known in model checking that bisimulation is equivalent
to strong preservation of CTL, or, equivalently, of Hennessy-Milner logic.
Drawing on these observations, we analyze the basic steps of the PT algorithm
from an abstract interpretation perspective, which allows us to reason on
strong preservation in the context of generic inductively defined (temporal)
languages and of possibly non-partitioning abstract models specified by
abstract interpretation. This leads us to design a generalized Paige-Tarjan
algorithm, called GPT, for computing the minimal refinement of an abstract
interpretation-based model that strongly preserves some given language. It
turns out that PT is a straight instance of GPT on the domain of state
partitions for the case of strong preservation of Hennessy-Milner logic. We
provide a number of examples showing that GPT is of general use. We first show
how a well-known efficient algorithm for computing stuttering equivalence can
be viewed as a simple instance of GPT. We then instantiate GPT in order to
design a new efficient algorithm for computing simulation equivalence that is
competitive with the best available algorithms. Finally, we show how GPT allows
to compute new strongly preserving abstract models by providing an efficient
algorithm that computes the coarsest refinement of a given partition that
strongly preserves the language generated by the reachability operator.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 19:45:34 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Dec 2006 11:16:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ranzato",
"Francesco",
""
],
[
"Tapparo",
"Francesco",
""
]
]
|
cs/0612121 | Stefan Funke | Stefan Funke, Soeren Laue, Zvi Lotker, Rouven Naujoks | Power Assignment Problems in Wireless Communication | 13 pages | null | null | null | cs.CG cs.AR cs.NI | null | A fundamental class of problems in wireless communication is concerned with
the assignment of suitable transmission powers to wireless devices/stations
such that the resulting communication graph satisfies certain desired
properties and the overall energy consumed is minimized. Many concrete
communication tasks in a wireless network like broadcast, multicast,
point-to-point routing, creation of a communication backbone, etc. can be
regarded as such a power assignment problem.
This paper considers several problems of that kind; for example one problem
studied before in \cite{Carrots, Bilo} aims to select and assign powers to $k$
of the stations such that all other stations are within reach of at least one
of the selected stations. We improve the running time for obtaining a
$(1+\epsilon)$-approximate solution for this problem from
$n^{((\alpha/\epsilon)^{O(d)})}$ as reported by Bilo et al. (\cite{Bilo}) to
$O(n+ {(\frac{k^{2d+1}}{\epsilon^d})}^{\min{\{2k, (\alpha/\epsilon)^{O(d)}
\}}})$ that is, we obtain a running time that is \emph{linear} in the network
size. Further results include a constant approximation algorithm for the TSP
problem under squared (non-metric!) edge costs, which can be employed to
implement a novel data aggregation protocol, as well as efficient schemes to
perform $k$-hop multicasts.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 12:53:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Funke",
"Stefan",
""
],
[
"Laue",
"Soeren",
""
],
[
"Lotker",
"Zvi",
""
],
[
"Naujoks",
"Rouven",
""
]
]
|
cs/0612126 | Petr Ivankov | Petr R. Ivankov, Nikolay P. Ivankov | The virtual reality framework for engineering objects | null | null | null | null | cs.CE cs.MS | null | A framework for virtual reality of engineering objects has been developed.
This framework may simulate different equipment related to virtual reality.
Framework supports 6D dynamics, ordinary differential equations, finite
formulas, vector and matrix operations. The framework also supports embedding
of external software.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 19:19:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ivankov",
"Petr R.",
""
],
[
"Ivankov",
"Nikolay P.",
""
]
]
|
cs/0612127 | Mohamed Y. Eltabakh | Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref | bdbms -- A Database Management System for Biological Data | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Biologists are increasingly using databases for storing and managing their
data. Biological databases typically consist of a mixture of raw data,
metadata, sequences, annotations, and related data obtained from various
sources. Current database technology lacks several functionalities that are
needed by biological databases. In this paper, we introduce bdbms, an
extensible prototype database management system for supporting biological data.
bdbms extends the functionalities of current DBMSs to include: (1) Annotation
and provenance management including storage, indexing, manipulation, and
querying of annotation and provenance as first class objects in bdbms, (2)
Local dependency tracking to track the dependencies and derivations among data
items, (3) Update authorization to support data curation via content-based
authorization, in contrast to identity-based authorization, and (4) New access
methods and their supporting operators that support pattern matching on various
types of compressed biological data types. This paper presents the design of
bdbms along with the techniques proposed to support these functionalities
including an extension to SQL. We also outline some open issues in building
bdbms.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:32:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eltabakh",
"Mohamed Y.",
""
],
[
"Ouzzani",
"Mourad",
""
],
[
"Aref",
"Walid G.",
""
]
]
|
cs/0612128 | Daniel Gyllstrom | Daniel Gyllstrom, Eugene Wu, Hee-Jin Chae, Yanlei Diao, Patrick
Stahlberg, Gordon Anderson | SASE: Complex Event Processing over Streams | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | RFID technology is gaining adoption on an increasing scale for tracking and
monitoring purposes. Wide deployments of RFID devices will soon generate an
unprecedented volume of data. Emerging applications require the RFID data to be
filtered and correlated for complex pattern detection and transformed to events
that provide meaningful, actionable information to end applications. In this
work, we design and develop SASE, a com-plex event processing system that
performs such data-information transformation over real-time streams. We design
a complex event language for specifying application logic for such
transformation, devise new query processing techniques to effi-ciently
implement the language, and develop a comprehensive system that collects,
cleans, and processes RFID data for deliv-ery of relevant, timely information
as well as storing necessary data for future querying. We demonstrate an
initial prototype of SASE through a real-world retail management scenario.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:38:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gyllstrom",
"Daniel",
""
],
[
"Wu",
"Eugene",
""
],
[
"Chae",
"Hee-Jin",
""
],
[
"Diao",
"Yanlei",
""
],
[
"Stahlberg",
"Patrick",
""
],
[
"Anderson",
"Gordon",
""
]
]
|
cs/0612129 | Bishwaranjan Bhattacharjee | Bishwaranjan Bhattacharjee, Vuk Ercegovac, Joseph Glider, Richard
Golding, Guy Lohman, Volke Markl, Hamid Pirahesh, Jun Rao, Robert Rees,
Frederick Reiss, Eugene Shekita, Garret Swart | Impliance: A Next Generation Information Management Appliance | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | ably successful in building a large market and adapting to the changes of the
last three decades, its impact on the broader market of information management
is surprisingly limited. If we were to design an information management system
from scratch, based upon today's requirements and hardware capabilities, would
it look anything like today's database systems?" In this paper, we introduce
Impliance, a next-generation information management system consisting of
hardware and software components integrated to form an easy-to-administer
appliance that can store, retrieve, and analyze all types of structured,
semi-structured, and unstructured information. We first summarize the trends
that will shape information management for the foreseeable future. Those trends
imply three major requirements for Impliance: (1) to be able to store, manage,
and uniformly query all data, not just structured records; (2) to be able to
scale out as the volume of this data grows; and (3) to be simple and robust in
operation. We then describe four key ideas that are uniquely combined in
Impliance to address these requirements, namely the ideas of: (a) integrating
software and off-the-shelf hardware into a generic information appliance; (b)
automatically discovering, organizing, and managing all data - unstructured as
well as structured - in a uniform way; (c) achieving scale-out by exploiting
simple, massive parallel processing, and (d) virtualizing compute and storage
resources to unify, simplify, and streamline the management of Impliance.
Impliance is an ambitious, long-term effort to define simpler, more robust, and
more scalable information systems for tomorrow's enterprises.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:49:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bhattacharjee",
"Bishwaranjan",
""
],
[
"Ercegovac",
"Vuk",
""
],
[
"Glider",
"Joseph",
""
],
[
"Golding",
"Richard",
""
],
[
"Lohman",
"Guy",
""
],
[
"Markl",
"Volke",
""
],
[
"Pirahesh",
"Hamid",
""
],
[
"Rao",
"Jun",
""
],
[
"Rees",
"Robert",
""
],
[
"Reiss",
"Frederick",
""
],
[
"Shekita",
"Eugene",
""
],
[
"Swart",
"Garret",
""
]
]
|
cs/0612130 | Fabien Mathieu | Anh-Tuan Gai (INRIA Rocquencourt), Fabien Mathieu (INRIA
Rocquencourt), Julien Reynier (INRIA Rocquencourt), Fabien De Montgolfier
(INRIA Rocquencourt) | Stratification in P2P Networks - Application to BitTorrent | null | null | null | null | cs.NI | null | We introduce a model for decentralized networks with collaborating peers. The
model is based on the stable matching theory which is applied to systems with a
global ranking utility function. We consider the dynamics of peers searching
for efficient collaborators and we prove that a unique stable solution exists.
We prove that the system converges towards the stable solution and analyze its
speed of convergence. We also study the stratification properties of the model,
both when all collaborations are possible and for random possible
collaborations. We present the corresponding fluid limit on the choice of
collaborators in the random case. As a practical example, we study the
BitTorrent Tit-for-Tat policy. For this system, our model provides an
interesting insight on peer download rates and a possible way to optimize peer
strategy.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 21:11:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gai",
"Anh-Tuan",
"",
"INRIA Rocquencourt"
],
[
"Mathieu",
"Fabien",
"",
"INRIA\n Rocquencourt"
],
[
"Reynier",
"Julien",
"",
"INRIA Rocquencourt"
],
[
"De Montgolfier",
"Fabien",
"",
"INRIA Rocquencourt"
]
]
|
cs/0612131 | Amine Chigani | Amine Chigani James D. Arthur Shawn Bohner | Architecting Network-Centric Software Systems: A Style-Based Beginning | 10 pages, 3 figures, 2 table, Submitted to Software Engineering
Workshop 2007 | null | null | null | cs.SE | null | With the advent of potent network technology, software development has
evolved from traditional platform-centric construction to network-centric
evolution. This change involves largely the way we reason about systems as
evidenced in the introduction of Network- Centric Operations (NCO).
Unfortunately, it has resulted in conflicting interpretations of how to map NCO
concepts to the field of software architecture. In this paper, we capture the
core concepts and goals of NCO, investigate the implications of these concepts
and goals on software architecture, and identify the operational
characteristics that distinguish network-centric software systems from other
systems. More importantly, we use architectural design principles to propose an
outline for a network-centric architectural style that helps in characterizing
network-centric software systems and that provides a means by which their
distinguishing operational characteristics can be realized.
| [
{
"version": "v1",
"created": "Sat, 23 Dec 2006 01:00:32 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Dec 2006 03:07:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bohner",
"Amine Chigani James D. Arthur Shawn",
""
]
]
|
cs/0612132 | Lokman Meho | Lokman I. Meho, Kiduk Yang | A New Era in Citation and Bibliometric Analyses: Web of Science, Scopus,
and Google Scholar | 49 pages, accepted for publication in the Journal of the American
Society for Information Science and Technology | null | null | null | cs.DL cs.IR | null | Academic institutions, federal agencies, publishers, editors, authors, and
librarians increasingly rely on citation analysis for making hiring, promotion,
tenure, funding, and/or reviewer and journal evaluation and selection
decisions. The Institute for Scientific Information's (ISI) citation databases
have been used for decades as a starting point and often as the only tools for
locating citations and/or conducting citation analyses. ISI databases (or Web
of Science), however, may no longer be adequate as the only or even the main
sources of citations because new databases and tools that allow citation
searching are now available. Whether these new databases and tools complement
or represent alternatives to Web of Science (WoS) is important to explore.
Using a group of 15 library and information science faculty members as a case
study, this paper examines the effects of using Scopus and Google Scholar (GS)
on the citation counts and rankings of scholars as measured by WoS. The paper
discusses the strengths and weaknesses of WoS, Scopus, and GS, their overlap
and uniqueness, quality and language of the citations, and the implications of
the findings for citation analysis. The project involved citation searching for
approximately 1,100 scholarly works published by the study group and over 200
works by a test group (an additional 10 faculty members). Overall, more than
10,000 citing and purportedly citing documents were examined. WoS data took
about 100 hours of collecting and processing time, Scopus consumed 200 hours,
and GS a grueling 3,000 hours.
| [
{
"version": "v1",
"created": "Sat, 23 Dec 2006 14:47:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Meho",
"Lokman I.",
""
],
[
"Yang",
"Kiduk",
""
]
]
|
cs/0612134 | Ketan Mulmuley D | Ketan D Mulmuley, Milind Sohoni | Geometric Complexity Theory II: Towards explicit obstructions for
embeddings among class varieties | 46 pages | null | null | null | cs.CC math.AG math.RT | null | In part I we reduced the arithmetic (characteristic zero) version of the P
\not \subseteq NP conjecture to the problem of showing that a variety
associated with the complexity class NP cannot be embedded in the variety
associated the complexity class P. We call these class varieties.
In this paper, this approach is developed further, reducing the nonexistence
problems, such as the P vs. NP and related lower bound problems, to existence
problems: specifically to proving existence of obstructions to such embeddings
among class varieties. It gives two results towards explicit construction of
such obstructions.
The first result is a generalization of the Borel-Weil theorem to a class of
orbit closures, which include class varieties. The recond result is a weaker
form of a conjectured analogue of the second fundamental theorem of invariant
theory for the class variety associated with the complexity class NC. These
results indicate that the fundamental lower bound problems in complexity theory
are intimately linked with explicit construction problems in algebraic geometry
and representation theory.
| [
{
"version": "v1",
"created": "Mon, 25 Dec 2006 18:51:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mulmuley",
"Ketan D",
""
],
[
"Sohoni",
"Milind",
""
]
]
|
cs/0612135 | Eric Rondeau | Idriss Diouri (CRAN), Jean-Philippe Georges (CRAN), Eric Rondeau
(CRAN) | Accommodation of the Service Offered by the Network for Networked
Control Systems | 8 pages | 2nd workshop on Networked Control Systems : Tolerant to faults
(23/11/2006) 8 pages | null | null | cs.NI | null | Networked Controlled Systems (NCSs) are more and more used in industrial
applications. They are strongly connected to real-time constraints because
important delays induced by the network can lead to an unstable process
control. Usually, the network used in NCSs is shared with many others
applications requiring different Quality of Service. The objective of this
paper is to optimize the tuning of the network scheduling mechanisms in taking
into account the level of Quality of Control. The goal is to maximize the
bandwidth allocation for unconstrained frames in guarantying that the control
constraints are respected. In this paper, we focus on switched Ethernet network
implementing the Classification of Service (IEEE 802.1p) based on a Weighted
Round Robin policy.
| [
{
"version": "v1",
"created": "Tue, 26 Dec 2006 20:17:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Diouri",
"Idriss",
"",
"CRAN"
],
[
"Georges",
"Jean-Philippe",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
]
]
|
cs/0612137 | Eric Robinson | Eric Robinson, David DeWitt | Turning Cluster Management into Data Management: A System Overview | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | This paper introduces the CondorJ2 cluster management system. Traditionally,
cluster management systems such as Condor employ a process-oriented approach
with little or no use of modern database system technology. In contrast,
CondorJ2 employs a data-centric, 3-tier web-application architecture for all
system functions (e.g., job submission, monitoring and scheduling; node
configuration, monitoring and management, etc.) except for job execution.
Employing a data-oriented approach allows the core challenge (i.e., managing
and coordinating a large set of distributed computing resources) to be
transformed from a relatively low-level systems problem into a more abstract,
higher-level data management problem. Preliminary results suggest that
CondorJ2's use of standard 3-tier software represents a significant step
forward to the design and implementation of large clusters (1,000 to 10,000
nodes).
| [
{
"version": "v1",
"created": "Wed, 27 Dec 2006 22:21:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Robinson",
"Eric",
""
],
[
"DeWitt",
"David",
""
]
]
|
cs/0612138 | Alexander Haubold | Alexander Haubold, John R. Kender | Accommodating Sample Size Effect on Similarity Measures in Speaker
Clustering | null | null | null | null | cs.SD cs.MM | null | We investigate the symmetric Kullback-Leibler (KL2) distance in speaker
clustering and its unreported effects for differently-sized feature matrices.
Speaker data is represented as Mel Frequency Cepstral Coefficient (MFCC)
vectors, and features are compared using the KL2 metric to form clusters of
speech segments for each speaker. We make two observations with respect to
clustering based on KL2: 1.) The accuracy of clustering is strongly dependent
on the absolute lengths of the speech segments and their extracted feature
vectors. 2.) The accuracy of the similarity measure strongly degrades with the
length of the shorter of the two speech segments. These effects of length can
be attributed to the measure of covariance used in KL2. We demonstrate an
empirical correction of this sample-size effect that increases clustering
accuracy. We draw parallels to two Vector Quantization-based (VQ) similarity
measures, one which exhibits an equivalent effect of sample size, and the
second being less influenced by it.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 06:39:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
]
|
cs/0612139 | Alexander Haubold | Alexander Haubold, John R. Kender | Alignment of Speech to Highly Imperfect Text Transcriptions | null | null | null | null | cs.SD cs.MM | null | We introduce a novel and inexpensive approach for the temporal alignment of
speech to highly imperfect transcripts from automatic speech recognition (ASR).
Transcripts are generated for extended lecture and presentation videos, which
in some cases feature more than 30 speakers with different accents, resulting
in highly varying transcription qualities. In our approach we detect a subset
of phonemes in the speech track, and align them to the sequence of phonemes
extracted from the transcript. We report on the results for 4 speech-transcript
sets ranging from 22 to 108 minutes. The alignment performance is promising,
showing a correct matching of phonemes within 10, 20, 30 second error margins
for more than 60%, 75%, 90% of text, respectively, on average.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 06:45:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
]
|
cs/0612141 | Christian Tanguy | Annie Druault-Vicard, Christian Tanguy | Exact Failure Frequency Calculations for Extended Systems | null | null | null | null | cs.PF | null | This paper shows how the steady-state availability and failure frequency can
be calculated in a single pass for very large systems, when the availability is
expressed as a product of matrices. We apply the general procedure to
$k$-out-of-$n$:G and linear consecutive $k$-out-of-$n$:F systems, and to a
simple ladder network in which each edge and node may fail. We also give the
associated generating functions when the components have identical
availabilities and failure rates. For large systems, the failure rate of the
whole system is asymptotically proportional to its size. This paves the way to
ready-to-use formulae for various architectures, as well as proof that the
differential operator approach to failure frequency calculations is very useful
and straightforward.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 19:35:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Druault-Vicard",
"Annie",
""
],
[
"Tanguy",
"Christian",
""
]
]
|
cs/0612143 | Christian Tanguy | Christian Tanguy | Exact solutions for the two- and all-terminal reliabilities of a simple
ladder network | null | null | null | null | cs.PF | null | The exact calculation of network reliability in a probabilistic context has
been a long-standing issue of practical importance, but a difficult one, even
for planar graphs, with perfect nodes and with edges of identical reliability
p. Many approaches (determination of bounds, sums of disjoint products
algorithms, Monte Carlo evaluations, studies of the reliability polynomials,
etc.) can only provide approximations when the network's size increases. We
consider here a ladder graph of arbitrary size corresponding to real-life
network configurations, and give the exact, analytical solutions for the all-
and two-terminal reliabilities. These solutions use transfer matrices, in which
individual reliabilities of edges and nodes are taken into account. The special
case of identical edge and node reliabilities -- p and rho, respectively -- is
solved. We show that the zeros of the two-terminal reliability polynomial
exhibit structures which differ substantially for seemingly similar networks,
and we compare the sensitivity of various edges. We discuss how the present
work may be further extended to lead to a catalog of exactly solvable networks
in terms of reliability, which could be useful as elementary bricks for a new
and improved set of bounds or benchmarks in the general case.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 19:43:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tanguy",
"Christian",
""
]
]
|
cs/0701001 | Ashutosh Gore | Ashutosh Deepak Gore, Srikanth Jagabathula, Abhay Karandikar | On High Spatial Reuse Link Scheduling in STDMA Wireless Ad Hoc Networks | 10 pages (double column), 10 figures | null | null | null | cs.PF cs.NI | null | Graph-based algorithms for point-to-point link scheduling in Spatial reuse
Time Division Multiple Access (STDMA) wireless ad hoc networks often result in
a significant number of transmissions having low Signal to Interference and
Noise density Ratio (SINR) at intended receivers, leading to low throughput. To
overcome this problem, we propose a new algorithm for STDMA link scheduling
based on a graph model of the network as well as SINR computations. The
performance of our algorithm is evaluated in terms of spatial reuse and
computational complexity. Simulation results demonstrate that our algorithm
achieves better performance than existing algorithms.
| [
{
"version": "v1",
"created": "Tue, 2 Jan 2007 14:14:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gore",
"Ashutosh Deepak",
""
],
[
"Jagabathula",
"Srikanth",
""
],
[
"Karandikar",
"Abhay",
""
]
]
|
cs/0701005 | Christian Tanguy | Christian Tanguy | Exact solutions for the two- and all-terminal reliabilities of the
Brecht-Colbourn ladder and the generalized fan | null | null | null | null | cs.PF | null | The two- and all-terminal reliabilities of the Brecht-Colbourn ladder and the
generalized fan have been calculated exactly for arbitrary size as well as
arbitrary individual edge and node reliabilities, using transfer matrices of
dimension four at most. While the all-terminal reliabilities of these graphs
are identical, the special case of identical edge ($p$) and node ($\rho$)
reliabilities shows that their two-terminal reliabilities are quite distinct,
as demonstrated by their generating functions and the locations of the zeros of
the reliability polynomials, which undergo structural transitions at $\rho =
\displaystyle {1/2}$.
| [
{
"version": "v1",
"created": "Sat, 30 Dec 2006 17:26:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tanguy",
"Christian",
""
]
]
|
cs/0701007 | Hamed Hatami | Hamed Hatami and Ruzbeh Tusserkani | On the Complexity of the Circular Chromatic Number | null | Journal of Graph Theory. 47(3) (2004) pp. 226-230 | null | null | cs.CG | null | Circular chromatic number, $\chi_c$ is a natural generalization of chromatic
number. It is known that it is \NP-hard to determine whether or not an
arbitrary graph $G$ satisfies $\chi(G) = \chi_c(G)$. In this paper we prove
that this problem is \NP-hard even if the chromatic number of the graph is
known. This answers a question of Xuding Zhu. Also we prove that for all
positive integers $k \ge 2$ and $n \ge 3$, for a given graph $G$ with
$\chi(G)=n$, it is \NP-complete to verify if $\chi_c(G) \le n- \frac{1}{k}$.
| [
{
"version": "v1",
"created": "Sun, 31 Dec 2006 04:48:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hatami",
"Hamed",
""
],
[
"Tusserkani",
"Ruzbeh",
""
]
]
|
cs/0701008 | Hamed Hatami | Hamed Hatami and Hossein Maserrat | On the Computational Complexity of Defining Sets | null | Journal of Discrete Applied Mathematics .149(1-3) (2005) pp.
101-110 | null | null | cs.CC | null | Suppose we have a family ${\cal F}$ of sets. For every $S \in {\cal F}$, a
set $D \subseteq S$ is a {\sf defining set} for $({\cal F},S)$ if $S$ is the
only element of $\cal{F}$ that contains $D$ as a subset. This concept has been
studied in numerous cases, such as vertex colorings, perfect matchings,
dominating sets, block designs, geodetics, orientations, and Latin squares.
In this paper, first, we propose the concept of a defining set of a logical
formula, and we prove that the computational complexity of such a problem is
$\Sigma_2$-complete.
We also show that the computational complexity of the following problem about
the defining set of vertex colorings of graphs is $\Sigma_2$-complete:
{\sc Instance:} A graph $G$ with a vertex coloring $c$ and an integer $k$.
{\sc Question:} If ${\cal C}(G)$ be the set of all $\chi(G)$-colorings of
$G$, then does $({\cal C}(G),c)$ have a defining set of size at most $k$?
Moreover, we study the computational complexity of some other variants of
this problem.
| [
{
"version": "v1",
"created": "Sun, 31 Dec 2006 05:47:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hatami",
"Hamed",
""
],
[
"Maserrat",
"Hossein",
""
]
]
|
cs/0701010 | Ahmed Sidky Ahmed Sidky | Ahmed Sidky, James Arthur | Determining the Applicability of Agile Practices to Mission and
Life-critical Systems | null | null | null | null | cs.SE | null | Adopting agile practices brings about many benefits and improvements to the
system being developed. However, in mission and life-critical systems, adopting
an inappropriate agile practice has detrimental impacts on the system in
various phases of its lifecycle as well as precludes desired qualities from
being actualized. This paper presents a three-stage process that provides
guidance to organizations on how to identify the agile practices they can
benefit from without causing any impact to the mission and life critical system
being developed.
| [
{
"version": "v1",
"created": "Mon, 1 Jan 2007 05:08:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sidky",
"Ahmed",
""
],
[
"Arthur",
"James",
""
]
]
|
cs/0701013 | Zengyou He | Zengyou He, Xaiofei Xu, Shengchun Deng | Attribute Value Weighting in K-Modes Clustering | 15 pages | null | null | Tr-06-0615 | cs.AI | null | In this paper, the traditional k-modes clustering algorithm is extended by
weighting attribute value matches in dissimilarity computation. The use of
attribute value weighting technique makes it possible to generate clusters with
stronger intra-similarities, and therefore achieve better clustering
performance. Experimental results on real life datasets show that these value
weighting based k-modes algorithms are superior to the standard k-modes
algorithm with respect to clustering accuracy.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 09:06:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xaiofei",
""
],
[
"Deng",
"Shengchun",
""
]
]
|
cs/0701014 | Moustapha Diaby | Moustapha Diaby | A Reply to Hofman On: "Why LP cannot solve large instances of
NP-complete problems in polynomial time" | 2 page; 1 table; clarification of some unclear statements | null | null | null | cs.CC | null | Using an approach that seems to be patterned after that of Yannakakis, Hofman
argues that an NP-complete problem cannot be formulated as a polynomial
bounded-sized linear programming problem. He then goes on to propose a
"construct" that he claims to be a counter-example to recently published linear
programming formulations of the Traveling Salesman Problem (TSP) and the
Quadratic Assignment Problems (QAP), respectively. In this paper, we show that
Hofman's construct is flawed, and provide further proof that his
"counter-example" is invalid.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 11:26:26 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jan 2007 00:39:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Diaby",
"Moustapha",
""
]
]
|
cs/0701020 | Sumit Ganguly | Sumit Ganguly | A nearly optimal and deterministic summary structure for update data
streams | Withdrawn | null | null | null | cs.DS | null | The paper has been withdrawn due to an error in Lemma 1.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 09:03:08 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jan 2007 15:11:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ganguly",
"Sumit",
""
]
]
|
cs/0701022 | Mateusz Zakrzewski | Mateusz Zakrzewski | Definable functions in the simply typed lambda-calculus | Submitted to TLCA 2007 | null | null | null | cs.LO | null | It is a common knowledge that the integer functions definable in simply typed
lambda-calculus are exactly the extended polynomials. This is indeed the case
when one interprets integers over the type (p->p)->p->p where p is a base type
and/or equality is taken as beta-conversion. It is commonly believed that the
same holds for beta-eta equality and for integers represented over any fixed
type of the form (t->t)->t->t. In this paper we show that this opinion is not
quite true.
We prove that the class of functions strictly definable in simply typed
lambda-calculus is considerably larger than the extended polynomials. Namely,
we define F as the class of strictly definable functions and G as a class that
contains extended polynomials and two additional functions, or more precisely,
two function schemas, and is closed under composition. We prove that G is a
subset of F.
We conjecture that G exactly characterizes strictly definable functions, i.e.
G=F, and we gather some evidence for this conjecture proving, for example, that
every skewly representable finite range function is strictly representable over
(t->t)->t->t for some t.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 17:50:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zakrzewski",
"Mateusz",
""
]
]
|
cs/0701029 | Dariusz Ku\'smierek | Dariusz Kusmierek | The Inhabitation Problem for Rank Two Intersection Types | 15 pages | null | null | null | cs.LO | null | We prove that the inhabitation problem for rank two intersection types is
decidable, but (contrary to common belief) EXPTIME-hard. The exponential time
hardness is shown by reduction from the in-place acceptance problem for
alternating Turing machines.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 08:38:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kusmierek",
"Dariusz",
""
]
]
|
cs/0701033 | Blake Hegerle | Blake Hegerle | A Counterexample to a Proposed Proof of P=NP by S. Gubin | 2 pages | null | null | null | cs.CC | null | In a recent paper by S. Gubin [cs/0701023v1], a polynomial-time solution to
the 3SAT problem was presented as proof that P=NP. The proposed algorithm
cannot be made to work, which I shall demonstrate.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 19:16:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hegerle",
"Blake",
""
]
]
|
cs/0701035 | Edwin Henneken | Edwin A. Henneken, Michael J. Kurtz, Guenther Eichhorn, Alberto
Accomazzi, Carolyn S. Grant, Donna Thompson, Elizabeth Bohlen, Stephen S.
Murray | Finding Astronomical Communities Through Co-readership Analysis | poster presented at the 209th AAS Meeting, 7 pages, 4 figures | null | null | null | cs.DL astro-ph | null | Whenever a large group of people are engaged in an activity, communities will
form. The nature of these communities depends on the relationship considered.
In the group of people who regularly use scholarly literature, a relationship
like ``person i and person j have cited the same paper'' might reveal
communities of people working in a particular field. On this poster, we will
investigate the relationship ``person i and person j have read the same
paper''. Using the data logs of the NASA/Smithsonian Astrophysics Data System
(ADS), we first determine the population that will participate by requiring
that a user queries the ADS at a certain rate. Next, we apply the relationship
to this population. The result of this will be an abstract ``relationship
space'', which we will describe in terms of various ``representations''.
Examples of such ``representations'' are the projection of co-read vectors onto
Principal Components and the spectral density of the co-read network. We will
show that the co-read relationship results in structure, we will describe this
structure and we will provide a first attempt in the classification of this
structure in terms of astronomical communities.
The ADS is funded by NASA Grant NNG06GG68G.
| [
{
"version": "v1",
"created": "Sat, 6 Jan 2007 00:02:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Henneken",
"Edwin A.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Thompson",
"Donna",
""
],
[
"Bohlen",
"Elizabeth",
""
],
[
"Murray",
"Stephen S.",
""
]
]
|
cs/0701040 | Fumin Zhang | F. Zhang | Curve Tracking Control for Legged Locomotion in Horizontal Plane | 10 pages, 11 figures, Submitted to IEEE Transactions on Automatic
Control | null | null | null | cs.RO | null | We derive a hybrid feedback control law for the lateral leg spring (LLS)
model so that the center of mass of a legged runner follows a curved path in
horizontal plane. The control law enables the runner to change the placement
and the elasticity of its legs to move in a desired direction. Stable motion
along a curved path is achieved using curvature, bearing and relative distance
between the runner and the curve as feedback. Constraints on leg parameters
determine the class of curves that can be followed. We also derive an optimal
control law that stabilizes the orientation of the runner's body relative to
the velocity of the runner's center of mass.
| [
{
"version": "v1",
"created": "Sat, 6 Jan 2007 20:55:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhang",
"F.",
""
]
]
|
cs/0701044 | Tej Singh | Sunder Lal and Tej Singh | New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings | 9 pages | null | null | null | cs.CR | null | This paper presents an identity based multi-proxy multi-signcryption scheme
from pairings. In this scheme a proxy signcrypter group could authorized as a
proxy agent by the coopration of all members in the original signcryption
group. Then the proxy signcryption can be generated by the cooperation of all
the signcrypters in the authorized proxy signcrypter group on the behalf of the
original signcrypter group. As compared to the scheme of Liu and Xiao, the
proposed scheme provides public verifiability of the signature along with
simplified key management.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 18:02:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Singh",
"Tej",
""
]
]
|
cs/0701045 | Iosif Pinelis | Iosif Pinelis | Polygon Convexity: Another O(n) Test | 14 pages; changes: (i) a test for non-strict convexity is added; (ii)
the proofs are gathered in a separate section; (iii) a more detailed abstract
is given | null | null | null | cs.CG cs.DS | null | An n-gon is defined as a sequence \P=(V_0,...,V_{n-1}) of n points on the
plane. An n-gon \P is said to be convex if the boundary of the convex hull of
the set {V_0,...,V_{n-1}} of the vertices of \P coincides with the union of the
edges [V_0,V_1],...,[V_{n-1},V_0]; if at that no three vertices of \P are
collinear then \P is called strictly convex. We prove that an n-gon \P with
n\ge3 is strictly convex if and only if a cyclic shift of the sequence
(\al_0,...,\al_{n-1})\in[0,2\pi)^n of the angles between the x-axis and the
vectors V_1-V_0,...,V_0-V_{n-1} is strictly monotone. A ``non-strict'' version
of this result is also proved.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 18:51:37 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jan 2007 22:57:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pinelis",
"Iosif",
""
]
]
|
cs/0701046 | Andrea Forte | Andrea G. Forte, Henning Schulzrinne | Cooperation Between Stations in Wireless Networks | 16 pages, 49 references, 12 figures, 3 tables | null | null | cucs-044-06 | cs.NI | null | In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as
layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are
critical, particularly for real-time applications such as VoIP. We propose a
novel approach, namely Cooperative Roaming (CR), in which MNs can collaborate
with each other and share useful information about the network in which they
move. We show how we can achieve seamless L2 and L3 handoffs regardless of the
authentication mechanism used and without any changes to either the
infrastructure or the protocol. In particular, we provide a working
implementation of CR and show how, with CR, MNs can achieve a total L2+L3
handoff time of less than 16 ms in an open network and of about 21 ms in an
IEEE 802.11i network. We consider behaviors typical of IEEE 802.11 networks,
although many of the concepts and problems addressed here apply to any kind of
mobile network.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 20:01:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Forte",
"Andrea G.",
""
],
[
"Schulzrinne",
"Henning",
""
]
]
|
cs/0701049 | Barnaby Martin | Barnaby Martin | On the Complexity of a Derivative Chess Problem | null | null | null | null | cs.CC | null | We introduce QUEENS, a derivative chess problem based on the classical
n-queens problem. We prove that QUEENS is NP-complete, with respect to
polynomial-time reductions.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 16:45:55 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Mar 2007 15:40:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Martin",
"Barnaby",
""
]
]
|
cs/0701054 | Nathan Segerlind | Nathan Segerlind | Nearly-Exponential Size Lower Bounds for Symbolic Quantifier Elimination
Algorithms and OBDD-Based Proofs of Unsatisfiability | 40 pages, 3 figures. First public draft, comments welcome. Also
submitted at ECCC | null | null | null | cs.CC cs.LO | null | We demonstrate a family of propositional formulas in conjunctive normal form
so that a formula of size $N$ requires size $2^{\Omega(\sqrt[7]{N/logN})}$ to
refute using the tree-like OBDD refutation system of Atserias, Kolaitis and
Vardi with respect to all variable orderings. All known symbolic quantifier
elimination algorithms for satisfiability generate tree-like proofs when run on
unsatisfiable CNFs, so this lower bound applies to the run-times of these
algorithms. Furthermore, the lower bound generalizes earlier results on
OBDD-based proofs of unsatisfiability in that it applies for all variable
orderings, it applies when the clauses are processed according to an arbitrary
schedule, and it applies when variables are eliminated via quantification.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 01:16:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Segerlind",
"Nathan",
""
]
]
|
cs/0701057 | Xiaofei Huang | Xiaofei Huang | Cooperative Optimization for Energy Minimization: A Case Study of Stereo
Matching | null | null | null | null | cs.CV cs.AI | null | Often times, individuals working together as a team can solve hard problems
beyond the capability of any individual in the team. Cooperative optimization
is a newly proposed general method for attacking hard optimization problems
inspired by cooperation principles in team playing. It has an established
theoretical foundation and has demonstrated outstanding performances in solving
real-world optimization problems. With some general settings, a cooperative
optimization algorithm has a unique equilibrium and converges to it with an
exponential rate regardless initial conditions and insensitive to
perturbations. It also possesses a number of global optimality conditions for
identifying global optima so that it can terminate its search process
efficiently. This paper offers a general description of cooperative
optimization, addresses a number of design issues, and presents a case study to
demonstrate its power.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 01:03:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Huang",
"Xiaofei",
""
]
]
|
cs/0701072 | Jakob Vo{\ss} | Jakob Voss | Tagging, Folksonomy & Co - Renaissance of Manual Indexing? | Preprint. 12 pages, 1 figure, 54 references | null | null | null | cs.IR | null | This paper gives an overview of current trends in manual indexing on the Web.
Along with a general rise of user generated content there are more and more
tagging systems that allow users to annotate digital resources with tags
(keywords) and share their annotations with other users. Tagging is frequently
seen in contrast to traditional knowledge organization systems or as something
completely new. This paper shows that tagging should better be seen as a
popular form of manual indexing on the Web. Difference between controlled and
free indexing blurs with sufficient feedback mechanisms. A revised typology of
tagging systems is presented that includes different user roles and knowledge
organization systems with hierarchical relationships and vocabulary control. A
detailed bibliography of current research in collaborative tagging is included.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2007 18:18:28 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jan 2007 14:36:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Voss",
"Jakob",
""
]
]
|
cs/0701073 | Jeremy Avigad | Jeremy Avigad and Kevin Donnelly | A decision procedure for linear "big O" equations | null | null | null | null | cs.LO | null | Let $F$ be the set of functions from an infinite set, $S$, to an ordered
ring, $R$. For $f$, $g$, and $h$ in $F$, the assertion $f = g + O(h)$ means
that for some constant $C$, $|f(x) - g(x)| \leq C |h(x)|$ for every $x$ in $S$.
Let $L$ be the first-order language with variables ranging over such functions,
symbols for $0, +, -, \min, \max$, and absolute value, and a ternary relation
$f = g + O(h)$. We show that the set of quantifier-free formulas in this
language that are valid in the intended class of interpretations is decidable,
and does not depend on the underlying set, $S$, or the ordered ring, $R$. If
$R$ is a subfield of the real numbers, we can add a constant 1 function, as
well as multiplication by constants from any computable subfield. We obtain
further decidability results for certain situations in which one adds symbols
denoting the elements of a fixed sequence of functions of strictly increasing
rates of growth.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2007 19:46:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Avigad",
"Jeremy",
""
],
[
"Donnelly",
"Kevin",
""
]
]
|
cs/0701075 | Toshiya Takami | Toshiya Takami, Jun Maki, Jun-ichi Ooba, Yuichi Inadomi, Hiroaki
Honda, Taizo Kobayashi, Rie Nogita, and Mutsumi Aoyagi | Open-architecture Implementation of Fragment Molecular Orbital Method
for Peta-scale Computing | 6 pages, 9 figures, proceedings of the 2nd IEEE/ACM international
workshop on high performance computing for nano-science and technology
(HPCNano06) | null | null | null | cs.DC physics.comp-ph | null | We present our perspective and goals on highperformance computing for
nanoscience in accordance with the global trend toward "peta-scale computing."
After reviewing our results obtained through the grid-enabled version of the
fragment molecular orbital method (FMO) on the grid testbed by the Japanese
Grid Project, National Research Grid Initiative (NAREGI), we show that FMO is
one of the best candidates for peta-scale applications by predicting its
effective performance in peta-scale computers. Finally, we introduce our new
project constructing a peta-scale application in an open-architecture
implementation of FMO in order to realize both goals of highperformance in
peta-scale computers and extendibility to multiphysics simulations.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2007 04:49:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Takami",
"Toshiya",
""
],
[
"Maki",
"Jun",
""
],
[
"Ooba",
"Jun-ichi",
""
],
[
"Inadomi",
"Yuichi",
""
],
[
"Honda",
"Hiroaki",
""
],
[
"Kobayashi",
"Taizo",
""
],
[
"Nogita",
"Rie",
""
],
[
"Aoyagi",
"Mutsumi",
""
]
]
|
cs/0701076 | Norman Danner | Norman Danner and James S. Royer | Time-complexity semantics for feasible affine recursions (extended
abstract) | Typographical fixes; some rearrangement of material. A shortened
version is to appear in S.B. Cooper, B. Lowe, A. Sorbi (eds.),_Computation in
the Real World_ (Proceedings Computation in Europe 2007, Sienna),
Springer-Verlag, Berlin, 2007 | null | null | null | cs.LO | null | The authors' ATR programming formalism is a version of call-by-value PCF
under a complexity-theoretically motivated type system. ATR programs run in
type-2 polynomial-time and all standard type-2 basic feasible functionals are
ATR-definable (ATR types are confined to levels 0, 1, and 2). A limitation of
the original version of ATR is that the only directly expressible recursions
are tail-recursions. Here we extend ATR so that a broad range of affine
recursions are directly expressible. In particular, the revised ATR can fairly
naturally express the classic insertion- and selection-sort algorithms, thus
overcoming a sticking point of most prior implicit-complexity-based formalisms.
The paper's main work is in extending and simplifying the original
time-complexity semantics for ATR to develop a set of tools for extracting and
solving the higher-type recurrences arising from feasible affine recursions.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2007 16:22:11 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2007 16:50:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Danner",
"Norman",
""
],
[
"Royer",
"James S.",
""
]
]
|
cs/0701081 | Wim Vanhoof | Alexander Serebrenik and Wim Vanhoof | Fingerprinting Logic Programs | Paper presented at the 16th Workshop on Logic-based methods in
Programming Languages (WLPE2006) | null | null | null | cs.PL cs.SE | null | In this work we present work in progress on functionality duplication
detection in logic programs. Eliminating duplicated functionality recently
became prominent in context of refactoring. We describe a quantitative approach
that allows to measure the ``similarity'' between two predicate definitions.
Moreover, we show how to compute a so-called ``fingerprint'' for every
predicate. Fingerprints capture those characteristics of the predicate that are
significant when searching for duplicated functionality. Since reasoning on
fingerprints is much easier than reasoning on predicate definitions, comparing
the fingerprints is a promising direction in automated code duplication in
logic programs.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2007 15:39:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Serebrenik",
"Alexander",
""
],
[
"Vanhoof",
"Wim",
""
]
]
|
cs/0701082 | Serebrenik Alexander | Fred Mesnard, Alexander Serebrenik | Recurrence with affine level mappings is P-time decidable for CLP(R) | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.PL cs.LO | null | In this paper we introduce a class of constraint logic programs such that
their termination can be proved by using affine level mappings. We show that
membership to this class is decidable in polynomial time.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2007 18:43:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mesnard",
"Fred",
""
],
[
"Serebrenik",
"Alexander",
""
]
]
|
cs/0701087 | Jean-Philippe Rennard | Jean-Philippe Rennard | Artificiality in Social Sciences | 14 pages | Rennard, J.-P., Artificiality in Social Sciences, in Rennard,
J.-P. (Ed.), Handbook of Research on Nature Inspired Computing for Economics
and Management, p.1-15, IGR, 2006 | null | null | cs.MA | null | This text provides with an introduction to the modern approach of
artificiality and simulation in social sciences. It presents the relationship
between complexity and artificiality, before introducing the field of
artificial societies which greatly benefited from the computer power fast
increase, gifting social sciences with formalization and experimentation tools
previously owned by "hard" sciences alone. It shows that as "a new way of doing
social sciences", artificial societies should undoubtedly contribute to a
renewed approach in the study of sociality and should play a significant part
in the elaboration of original theories of social phenomena.
| [
{
"version": "v1",
"created": "Sat, 13 Jan 2007 16:50:37 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Apr 2007 18:00:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rennard",
"Jean-Philippe",
""
]
]
|
cs/0701088 | Frederick Furtek | Frederick Furtek | A Theory and Calculus for Reasoning about Sequential Behavior | 102 double-spaced pages, 17 figures. Abstract and introduction
revised 29 March 2007 to improve readability | null | null | null | cs.LO cs.DM | null | Basic results in combinatorial mathematics provide the foundation for a
theory and calculus for reasoning about sequential behavior. A key concept of
the theory is a generalization of Boolean implicant which deals with statements
of the form:
A sequence of Boolean expressions alpha is an implicant of a set of sequences
of Boolean expressions A
This notion of a generalized implicant takes on special significance when
each of the sequences in the set A describes a disallowed pattern of behavior.
That is because a disallowed sequence of Boolean expressions represents a
logical/temporal dependency, and because the implicants of a set of disallowed
Boolean sequences A are themselves disallowed and represent precisely those
dependencies that follow as a logical consequence from the dependencies
represented by A. The main result of the theory is a necessary and sufficient
condition for a sequence of Boolean expressions to be an implicant of a regular
set of sequences of Boolean expressions. This result is the foundation for two
new proof methods. Sequential resolution is a generalization of Boolean
resolution which allows new logical/temporal dependencies to be inferred from
existing dependencies. Normalization starts with a model (system) and a set of
logical/temporal dependencies and determines which of those dependencies are
satisfied by the model.
| [
{
"version": "v1",
"created": "Mon, 15 Jan 2007 18:57:14 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Mar 2007 15:46:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Furtek",
"Frederick",
""
]
]
|
cs/0701094 | Francois Ingelrest | Fran\c{c}ois Ingelrest (LIFL, INRIA Futurs), David Simplot-Ryl (LIFL,
INRIA Futurs) | Maximizing the Probability of Delivery of Multipoint Relay Broadcast
Protocol in Wireless Ad Hoc Networks with a Realistic Physical Layer | null | Proceedings of the 2nd International Conference on Mobile Ad-hoc
and Sensor Networks (MSN 2006) (2006) 143 | null | null | cs.NI | null | It is now commonly accepted that the unit disk graph used to model the
physical layer in wireless networks does not reflect real radio transmissions,
and that the lognormal shadowing model better suits to experimental
simulations. Previous work on realistic scenarios focused on unicast, while
broadcast requirements are fundamentally different and cannot be derived from
unicast case. Therefore, broadcast protocols must be adapted in order to still
be efficient under realistic assumptions. In this paper, we study the
well-known multipoint relay protocol (MPR). In the latter, each node has to
choose a set of neighbors to act as relays in order to cover the whole 2-hop
neighborhood. We give experimental results showing that the original method
provided to select the set of relays does not give good results with the
realistic model. We also provide three new heuristics in replacement and their
performances which demonstrate that they better suit to the considered model.
The first one maximizes the probability of correct reception between the node
and the considered relays multiplied by their coverage in the 2-hop
neighborhood. The second one replaces the coverage by the average of the
probabilities of correct reception between the considered neighbor and the
2-hop neighbors it covers. Finally, the third heuristic keeps the same concept
as the second one, but tries to maximize the coverage level of the 2-hop
neighborhood: 2-hop neighbors are still being considered as uncovered while
their coverage level is not higher than a given coverage threshold, many
neighbors may thus be selected to cover the same 2-hop neighbors.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 10:01:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ingelrest",
"François",
"",
"LIFL, INRIA Futurs"
],
[
"Simplot-Ryl",
"David",
"",
"LIFL,\n INRIA Futurs"
]
]
|
cs/0701095 | Pedro Cabalar | Pedro Cabalar and Paolo Ferraris | Propositional theories are strongly equivalent to logic programs | 15 pages | null | null | null | cs.AI cs.LO | null | This paper presents a property of propositional theories under the answer
sets semantics (called Equilibrium Logic for this general syntax): any theory
can always be reexpressed as a strongly equivalent disjunctive logic program,
possibly with negation in the head. We provide two different proofs for this
result: one involving a syntactic transformation, and one that constructs a
program starting from the countermodels of the theory in the intermediate logic
of here-and-there.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 12:29:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cabalar",
"Pedro",
""
],
[
"Ferraris",
"Paolo",
""
]
]
|
cs/0701096 | Maurice Margenstern | Margenstern Maurice | About the domino problem in the hyperbolic plane, a new solution | 60 pages, 16 figures | null | null | null | cs.CG | null | In this paper we improve the approach of a previous paper about the domino
problem in the hyperbolic plane, see arXiv.cs.CG/0603093. This time, we prove
that the general problem of the hyperbolic plane with \`a la Wang tiles is
undecidable.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 18:19:22 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jan 2007 19:11:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Maurice",
"Margenstern",
""
]
]
|
cs/0701104 | Philipp Mayr | Philipp Mayr, Walther Umstaetter | Why is a new Journal of Informetrics needed? | 9 pages, 3 figures | null | null | null | cs.DL cs.DB | null | In our study we analysed 3.889 records which were indexed in the Library and
Information Science Abstracts (LISA) database in the research field of
informetrics. We can show the core journals of the field via a Bradford (power
law) distribution and corroborate on the basis of the restricted LISA data set
that it was the appropriate time to found a new specialized journal dedicated
to informetrics. According to Bradford's Law of scattering (pure quantitative
calculation), Egghe's Journal of Informetrics (JOI) first issue to appear in
2007, comes most probable at the right time.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 12:17:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mayr",
"Philipp",
""
],
[
"Umstaetter",
"Walther",
""
]
]
|
cs/0701105 | Wim Vanhoof | Remko Troncon, Gerda Janssens | A Delta Debugger for ILP Query Execution | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL cs.LG | null | Because query execution is the most crucial part of Inductive Logic
Programming (ILP) algorithms, a lot of effort is invested in developing faster
execution mechanisms. These execution mechanisms typically have a low-level
implementation, making them hard to debug. Moreover, other factors such as the
complexity of the problems handled by ILP algorithms and size of the code base
of ILP data mining systems make debugging at this level a very difficult job.
In this work, we present the trace-based debugging approach currently used in
the development of new execution mechanisms in hipP, the engine underlying the
ACE Data Mining system. This debugger uses the delta debugging algorithm to
automatically reduce the total time needed to expose bugs in ILP execution,
thus making manual debugging step much lighter.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 13:35:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Troncon",
"Remko",
""
],
[
"Janssens",
"Gerda",
""
]
]
|
cs/0701106 | Wim Vanhoof | Pierre Deransart | On using Tracer Driver for External Dynamic Process Observation | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments | null | null | null | cs.PL | null | One is interested here in the observation of dynamic processes starting from
the traces which they leave or those that one makes them produce. It is
considered here that it should be possible to make several observations
simultaneously, using a large variety of independently developed analyzers. For
this purpose, we introduce the original notion of ``full trace'' to capture the
idea that a process can be instrumented in such a way that it may broadcast all
information which could ever be requested by any kind of observer. Each
analyzer can then find in the full trace the data elements which it needs. This
approach uses what has been called a "tracer driver" which completes the tracer
and drives it to answer the requests of the analyzers. A tracer driver allows
to restrict the flow of information and makes this approach tractable. On the
other side, the potential size of a full trace seems to make the idea of full
trace unrealistic. In this work we explore the consequences of this notion in
term of potential efficiency, by analyzing the respective workloads between the
(full) tracer and many different analyzers, all being likely run in true
parallel environments. To illustrate this study, we use the example of the
observation of the resolution of constraints systems (proof-tree, search-tree
and propagation) using sophisticated visualization tools, as developed in the
project OADymPPaC (2001-2004). The processes considered here are computer
programs, but we believe the approach can be extended to many other kinds of
processes.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 13:43:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Deransart",
"Pierre",
""
]
]
|
cs/0701107 | Wim Vanhoof | Hani Girgis, Bharat Jayaraman | JavaTA: A Logic-based Debugger for Java | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | This paper presents a logic based approach to debugging Java programs. In
contrast with traditional debugging we propose a debugging methodology for Java
programs using logical queries on individual execution states and also over the
history of execution. These queries were arrived at by a systematic study of
errors in object-oriented programs in our earlier research. We represent the
salient events during the execution of a Java program by a logic database, and
implement the queries as logic programs. Such an approach allows us to answer a
number of useful and interesting queries about a Java program, such as the
calling sequence that results in a certain outcome, the state of an object at a
particular execution point, etc. Our system also provides the ability to
compose new queries during a debugging session. We believe that logic
programming offers a significant contribution to the art of object-oriented
programs debugging.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 13:48:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Girgis",
"Hani",
""
],
[
"Jayaraman",
"Bharat",
""
]
]
|
cs/0701108 | Wim Vanhoof | Edison Mera, Pedro Lopez-Garcia, German Puebla, Manuel Carro, Manuel
Hermenegildo | Towards Execution Time Estimation for Logic Programs via Static Analysis
and Profiling | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments | null | null | null | cs.PL | null | Effective static analyses have been proposed which infer bounds on the number
of resolutions or reductions. These have the advantage of being independent
from the platform on which the programs are executed and have been shown to be
useful in a number of applications, such as granularity control in parallel
execution. On the other hand, in distributed computation scenarios where
platforms with different capabilities come into play, it is necessary to
express costs in metrics that include the characteristics of the platform. In
particular, it is specially interesting to be able to infer upper and lower
bounds on actual execution times. With this objective in mind, we propose an
approach which combines compile-time analysis for cost bounds with a one-time
profiling of the platform in order to determine the values of certain
parameters for a given platform. These parameters calibrate a cost model which,
from then on, is able to compute statically time bound functions for procedures
and to predict with a significant degree of accuracy the execution times of
such procedures in the given platform. The approach has been implemented and
integrated in the CiaoPP system.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:22:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mera",
"Edison",
""
],
[
"Lopez-Garcia",
"Pedro",
""
],
[
"Puebla",
"German",
""
],
[
"Carro",
"Manuel",
""
],
[
"Hermenegildo",
"Manuel",
""
]
]
|
cs/0701109 | Wim Vanhoof | Siddharth Chitnis, Madhu Yennamani, Gopal Gupta | ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet
Paradigm | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | We report on the development of a general tool called ExSched, implemented as
a plug-in for Microsoft Excel, for solving a class of constraint satisfaction
problems. The traditional spreadsheet paradigm is based on attaching arithmetic
expressions to individual cells and then evaluating them. The ExSched interface
generalizes the spreadsheet paradigm to allow finite domain constraints to be
attached to the individual cells that are then solved to get a solution. This
extension provides a user-friendly interface for solving constraint
satisfaction problems that can be modeled as 2D tables, such as scheduling
problems, timetabling problems, product configuration, etc. ExSched can be
regarded as a spreadsheet interface to CLP(FD) that hides the syntactic and
semantic complexity of CLP(FD) and enables novice users to solve many
scheduling and timetabling problems interactively.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:26:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chitnis",
"Siddharth",
""
],
[
"Yennamani",
"Madhu",
""
],
[
"Gupta",
"Gopal",
""
]
]
|
cs/0701110 | Wim Vanhoof | Kim Henriksen, John Gallagher | A Web-based Tool Combining Different Type Analyses | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | There are various kinds of type analysis of logic programs. These include for
example inference of types that describe an over-approximation of the success
set of a program, inference of well-typings, and abstractions based on given
types. Analyses can be descriptive or prescriptive or a mixture of both, and
they can be goal-dependent or goal-independent. We describe a prototype tool
that can be accessed from a web browser, allowing various type analyses to be
run. The first goal of the tool is to allow the analysis results to be examined
conveniently by clicking on points in the original program clauses, and to
highlight ill-typed program constructs, empty types or other type anomalies.
Secondly the tool allows combination of the various styles of analysis. For
example, a descriptive regular type can be automatically inferred for a given
program, and then that type can be used to generate the minimal "domain model"
of the program with respect to the corresponding pre-interpretation, which can
give more precise information than the original descriptive type.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:35:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Henriksen",
"Kim",
""
],
[
"Gallagher",
"John",
""
]
]
|
cs/0701111 | Wim Vanhoof | Elvira Albert, Puri Arenas, German Puebla | Some Issues on Incremental Abstraction-Carrying Code | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | Abstraction-Carrying Code (ACC) has recently been proposed as a framework for
proof-carrying code (PCC) in which the code supplier provides a program
together with an abstraction (or abstract model of the program) whose validity
entails compliance with a predefined safety policy. The abstraction thus plays
the role of safety certificate and its generation (and validation) is carried
out automatically by a fixed-point analyzer. Existing approaches for PCC are
developed under the assumption that the consumer reads and validates the entire
program w.r.t. the full certificate at once, in a non incremental way. In this
abstract, we overview the main issues on incremental ACC. In particular, in the
context of logic programming, we discuss both the generation of incremental
certificates and the design of an incremental checking algorithm for untrusted
updates of a (trusted) program, i.e., when a producer provides a modified
version of a previously validated program. By update, we refer to any arbitrary
change on a program, i.e., the extension of the program with new predicates,
the deletion of existing predicates and the replacement of existing predicates
by new versions for them. We also discuss how each kind of update affects the
incremental extension in terms of accuracy and correctness.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:44:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Albert",
"Elvira",
""
],
[
"Arenas",
"Puri",
""
],
[
"Puebla",
"German",
""
]
]
|
cs/0701113 | Thomas Colcombet | Thomas Colcombet (GALION) | On factorisation forests | 27 pages | null | null | null | cs.LO | null | The theorem of factorisation forests shows the existence of nested
factorisations -- a la Ramsey -- for finite words. This theorem has important
applications in semigroup theory, and beyond. The purpose of this paper is to
illustrate the importance of this approach in the context of automata over
infinite words and trees. We extend the theorem of factorisation forest in two
directions: we show that it is still valid for any word indexed by a linear
ordering; and we show that it admits a deterministic variant for words indexed
by well-orderings. A byproduct of this work is also an improvement on the known
bounds for the original result. We apply the first variant for giving a
simplified proof of the closure under complementation of rational sets of words
indexed by countable scattered linear orderings. We apply the second variant in
the analysis of monadic second-order logic over trees, yielding new results on
monadic interpretations over trees. Consequences of it are new caracterisations
of prefix-recognizable structures and of the Caucal hierarchy.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 16:48:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Colcombet",
"Thomas",
"",
"GALION"
]
]
|
cs/0701115 | Juan J. Merelo Pr. | J.J. Merelo, Antonio Mora-Garcia, J.L.J. Laredo, Juan Lupion, Fernando
Tricas | Browser-based distributed evolutionary computation: performance and
scaling behavior | Submitted to GECCO 2007 | null | null | null | cs.DC cs.NE | null | The challenge of ad-hoc computing is to find the way of taking advantage of
spare cycles in an efficient way that takes into account all capabilities of
the devices and interconnections available to them. In this paper we explore
distributed evolutionary computation based on the Ruby on Rails framework,
which overlays a Model-View-Controller on evolutionary computation. It allows
anybody with a web browser (that is, mostly everybody connected to the
Internet) to participate in an evolutionary computation experiment. Using a
straightforward farming model, we consider different factors, such as the size
of the population used. We are mostly interested in how they impact on
performance, but also the scaling behavior when a non-trivial number of
computers is applied to the problem. Experiments show the impact of different
packet sizes on performance, as well as a quite limited scaling behavior, due
to the characteristics of the server. Several solutions for that problem are
proposed.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2007 09:23:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Merelo",
"J. J.",
""
],
[
"Mora-Garcia",
"Antonio",
""
],
[
"Laredo",
"J. L. J.",
""
],
[
"Lupion",
"Juan",
""
],
[
"Tricas",
"Fernando",
""
]
]
|
cs/0701119 | Petr Ivankov | Petr R. Ivankov, Nikolay P. Ivankov | The framework for simulation of dynamics of mechanical aggregates | 7 pages, 4 figures | null | null | null | cs.CE | null | A framework for simulation of dynamics of mechanical aggregates has been
developed. This framework enables us to build model of aggregate from models of
its parts. Framework is a part of universal framework for science and
engineering.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2007 12:18:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ivankov",
"Petr R.",
""
],
[
"Ivankov",
"Nikolay P.",
""
]
]
|
cs/0701121 | Bernard Mourrain | Changhe Tu (Shandong University), Wenping Wang (University of Hong
Kong), Bernard Mourrain (INRIA Sophia Antipolis), Jiaye Wang (Shandong
University) | Signature Sequence of Intersection Curve of Two Quadrics for Exact
Morphological Classification | null | null | null | null | cs.CG cs.SC | null | We present an efficient method for classifying the morphology of the
intersection curve of two quadrics (QSIC) in PR3, 3D real projective space;
here, the term morphology is used in a broad sense to mean the shape,
topological, and algebraic properties of a QSIC, including singularity,
reducibility, the number of connected components, and the degree of each
irreducible component, etc. There are in total 35 different QSIC morphologies
with non-degenerate quadric pencils. For each of these 35 QSIC morphologies,
through a detailed study of the eigenvalue curve and the index function jump we
establish a characterizing algebraic condition expressed in terms of the Segre
characteristics and the signature sequence of a quadric pencil. We show how to
compute a signature sequence with rational arithmetic so as to determine the
morphology of the intersection curve of any two given quadrics. Two immediate
applications of our results are the robust topological classification of QSIC
in computing B-rep surface representation in solid modeling and the derivation
of algebraic conditions for collision detection of quadric primitives.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2007 08:08:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tu",
"Changhe",
"",
"Shandong University"
],
[
"Wang",
"Wenping",
"",
"University of Hong\n Kong"
],
[
"Mourrain",
"Bernard",
"",
"INRIA Sophia Antipolis"
],
[
"Wang",
"Jiaye",
"",
"Shandong\n University"
]
]
|
cs/0701125 | Marcus Hutter | Marcus Hutter | Universal Algorithmic Intelligence: A mathematical top->down approach | 70 pages | In Artificial General Intelligence, Springer (2007) 227-290 | null | IDSIA-01-03 | cs.AI cs.LG | null | Sequential decision theory formally solves the problem of rational agents in
uncertain worlds if the true environmental prior probability distribution is
known. Solomonoff's theory of universal induction formally solves the problem
of sequence prediction for unknown prior distribution. We combine both ideas
and get a parameter-free theory of universal Artificial Intelligence. We give
strong arguments that the resulting AIXI model is the most intelligent unbiased
agent possible. We outline how the AIXI model can formally solve a number of
problem classes, including sequence prediction, strategic games, function
minimization, reinforcement and supervised learning. The major drawback of the
AIXI model is that it is uncomputable. To overcome this problem, we construct a
modified algorithm AIXItl that is still effectively more intelligent than any
other time t and length l bounded agent. The computation time of AIXItl is of
the order t x 2^l. The discussion includes formal definitions of intelligence
order relations, the horizon problem and relations of the AIXI theory to other
AI approaches.
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2007 00:18:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
]
|
cs/0701128 | M. V. Panduranga Rao | M. V. Panduranga Rao | Interference Automata | 19 pages. A preliminary version appears under the title "On a Model
of Computation based on Optical Interference" in Proc. of the 16-th
Australasian Workshop on Combinatorial Algorithms (AWOCA'05), pp. 249-261 | null | null | null | cs.CC | null | We propose a computing model, the Two-Way Optical Interference Automata
(2OIA), that makes use of the phenomenon of optical interference. We introduce
this model to investigate the increase in power, in terms of language
recognition, of a classical Deterministic Finite Automaton (DFA) when endowed
with the facility of optical interference. The question is in the spirit of
Two-Way Finite Automata With Quantum and Classical States (2QCFA) [A. Ambainis
and J. Watrous, Two-way Finite Automata With Quantum and Classical States,
Theoretical Computer Science, 287 (1), 299-311, (2002)] wherein the classical
DFA is augmented with a quantum component of constant size. We test the power
of 2OIA against the languages mentioned in the above paper. We give efficient
2OIA algorithms to recognize languages for which 2QCFA machines have been shown
to exist, as well as languages whose status vis-a-vis 2QCFA has been posed as
open questions. Finally we show the existence of a language that cannot be
recognized by a 2OIA but can be recognized by an $O(n^3)$ space Turing machine.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 09:14:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rao",
"M. V. Panduranga",
""
]
]
|
cs/0701130 | Thomas C. Schmidt | Thomas C. Schmidt and Matthias W\"ahlisch and Ying Zhang | On the Correlation of Geographic and Network Proximity at Internet Edges
and its Implications for Mobile Unicast and Multicast Routing | 6 pages including 6 figures | in Proceedings of the IEEE ICN'07, IEEE Computer Society Press,
Washington, DC, USA, April 2007 | null | null | cs.NI cs.AR cs.PF | null | Significant effort has been invested recently to accelerate handover
operations in a next generation mobile Internet. Corresponding works for
developing efficient mobile multicast management are emergent. Both problems
simultaneously expose routing complexity between subsequent points of
attachment as a characteristic parameter for handover performance in access
networks.
As continuous mobility handovers necessarily occur between access routers
located in geographic vicinity, this paper investigates on the hypothesis that
geographically adjacent edge networks attain a reduced network distances as
compared to arbitrary Internet nodes. We therefore evaluate and analyze edge
distance distributions in various regions for clustered IP ranges on their
geographic location such as a city. We use traceroute to collect packet
forwarding path and round-trip-time of each intermediate node to scan-wise
derive an upper bound of the node distances. Results of different scanning
origins are compared to obtain the best estimation of network distance of each
pair. Our results are compared with corresponding analysis of CAIDA Skitter
data, overall leading to fairly stable, reproducible edge distance
distributions. As a first conclusion on expected impact on handover performance
measures, our results indicate a general optimum for handover anticipation time
in 802.11 networks of 25 ms.
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2007 23:06:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schmidt",
"Thomas C.",
""
],
[
"Wählisch",
"Matthias",
""
],
[
"Zhang",
"Ying",
""
]
]
|
cs/0701132 | Mardavij Roozbehani | Eric Feron (School of Aerospace Engineering, Georgia Institute of
Technology) Mardavij Roozbehani (Department of Aeronautics and Astronautics,
Massachusetts Institue of Technology) | Certifying controls and systems software | 12 pages, 2 figures, 1 Matlab Code. To be submitted to AIAA journal
of guidance and control. In this revised version, support and funding
resources were added to the acknowledgement section. LIDS Publication #: 2745 | null | null | LIDS # 2745 | cs.SE | null | Software system certification presents itself with many challenges, including
the necessity to certify the system at the level of functional requirements,
code and binary levels, the need to chase down run-time errors, and the need
for proving timing properties of the eventual, compiled system. This paper
illustrates possible approaches for certifying code that arises from control
systems requirements as far as stability properties are concerned. The relative
simplicity of the certification process should encourage the development of
systematic procedures for certifying control system codes for more complex
environments.
| [
{
"version": "v1",
"created": "Sun, 21 Jan 2007 19:34:45 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jan 2007 16:12:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Feron",
"Eric",
"",
"School of Aerospace Engineering, Georgia Institute of\n Technology"
],
[
"Roozbehani",
"Mardavij",
"",
"Department of Aeronautics and Astronautics,\n Massachusetts Institue of Technology"
]
]
|
cs/0701133 | Athina Markopoulou | Athina Markopoulou and David Cheriton | The Case for Redundant Arrays of Internet Links (RAIL) | null | null | null | null | cs.NI | null | It is well-known that wide-area networks face today several performance and
reliability problems. In this work, we propose to solve these problems by
connecting two or more local-area networks together via a Redundant Array of
Internet Links (or RAIL) and by proactively replicating each packet over these
links. In that sense, RAIL is for networks what RAID (Redundant Array of
Inexpensive Disks) was for disks. In this paper, we describe the RAIL approach,
present our prototype (called the RAILedge), and evaluate its performance.
First, we demonstrate that using multiple Internet links significantly improves
the end-to-end performance in terms of network-level as well as
application-level metrics for Voice-over-IP and TCP. Second, we show that a
delay padding mechanism is needed to complement RAIL when there is significant
delay disparity between the paths. Third, we show that two paths provide most
of the benefit, if carefully managed. Finally, we discuss a RAIL-network
architecture, where RAILedges make use of path redundancy, route control and
application-specific mechanisms, to improve WAN performance.
| [
{
"version": "v1",
"created": "Sun, 21 Jan 2007 19:59:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Markopoulou",
"Athina",
""
],
[
"Cheriton",
"David",
""
]
]
|
cs/0701135 | Jinyun Ke | Jinyun KE | Complex networks and human language | null | null | null | null | cs.CL | null | This paper introduces how human languages can be studied in light of recent
development of network theories. There are two directions of exploration. One
is to study networks existing in the language system. Various lexical networks
can be built based on different relationships between words, being semantic or
syntactic. Recent studies have shown that these lexical networks exhibit
small-world and scale-free features. The other direction of exploration is to
study networks of language users (i.e. social networks of people in the
linguistic community), and their role in language evolution. Social networks
also show small-world and scale-free features, which cannot be captured by
random or regular network models. In the past, computational models of language
change and language emergence often assume a population to have a random or
regular structure, and there has been little discussion how network structures
may affect the dynamics. In the second part of the paper, a series of
simulation models of diffusion of linguistic innovation are used to illustrate
the importance of choosing realistic conditions of population structure for
modeling language change. Four types of social networks are compared, which
exhibit two categories of diffusion dynamics. While the questions about which
type of networks are more appropriate for modeling still remains, we give some
preliminary suggestions for choosing the type of social networks for modeling.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 00:45:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"KE",
"Jinyun",
""
]
]
|
cs/0701136 | Stevan Harnad | Chawki Hajjem, Stevan Harnad | Citation Advantage For OA Self-Archiving Is Independent of Journal
Impact Factor, Article Age, and Number of Co-Authors | null | null | null | null | cs.IR cs.DL | null | Eysenbach has suggested that the OA (Green) self-archiving advantage might
just be an artifact of potential uncontrolled confounding factors such as
article age (older articles may be both more cited and more likely to be
self-archived), number of authors (articles with more authors might be more
cited and more self-archived), subject matter (the subjects that are cited
more, self-archive more), country (same thing), number of authors, citation
counts of authors, etc. Chawki Hajjem (doctoral candidate, UQaM) had already
shown that the OA advantage was present in all cases when articles were
analysed separately by age, subject matter or country. He has now done a
multiple regression analysis jointly testing (1) article age, (2) journal
impact factor, (3) number of authors, and (4) OA self-archiving as separate
factors for 442,750 articles in 576 (biomedical) journals across 11 years, and
has shown that each of the four factors contributes an independent,
statistically significant increment to the citation counts. The
OA-self-archiving advantage remains a robust, independent factor. Having
successfully responded to his challenge, we now challenge Eysenbach to
demonstrate -- by testing a sufficiently broad and representative sample of
journals at all levels of the journal quality, visibility and prestige
hierarchy -- that his finding of a citation advantage for Gold OA (articles
published OA on the high-profile website of the only journal he tested (PNAS)
over Green OA articles in the same journal (self-archived on the author's
website) was not just an artifact of having tested only one very high-profile
journal.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 02:14:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hajjem",
"Chawki",
""
],
[
"Harnad",
"Stevan",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.