id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0701137
Stevan Harnad
Chawki Hajjem, Stevan Harnad
The Open Access Citation Advantage: Quality Advantage Or Quality Bias?
null
null
null
null
cs.IR cs.DL
null
Many studies have now reported the positive correlation between Open Access (OA) self-archiving and citation counts ("OA Advantage," OAA). But does this OAA occur because (QB) authors are more likely to self-selectively self-archive articles that are more likely to be cited (self-selection "Quality Bias": QB)? or because (QA) articles that are self-archived are more likely to be cited ("Quality Advantage": QA)? The probable answer is both. Three studies [by (i) Kurtz and co-workers in astrophysics, (ii) Moed in condensed matter physics, and (iii) Davis & Fromerth in mathematics] had reported the OAA to be due to QB [plus Early Advantage, EA, from self-archiving the preprint before publication, in (i) and (ii)] rather than QA. These three fields, however, (1) have less of a postprint access problem than most other fields and (i) and (ii) also happen to be among the minority of fields that (2) make heavy use of prepublication preprints. Chawki Hajjem has now analyzed preliminary evidence based on over 100,000 articles from multiple fields, comparing self-selected self-archiving with mandated self-archiving to estimate the contributions of QB and QA to the OAA. Both factors contribute, and the contribution of QA is greater.
[ { "version": "v1", "created": "Mon, 22 Jan 2007 02:19:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Hajjem", "Chawki", "" ], [ "Harnad", "Stevan", "" ] ]
cs/0701139
Yishay Mor
Yishay Mor and Jeffrey S. Rosenschein
Time and the Prisoner's Dilemma
Proceedings of the First International Conference on Multiagent Systems (ICMAS95), : 276-282, 1995
null
null
null
cs.GT cs.AI
null
This paper examines the integration of computational complexity into game theoretic models. The example focused on is the Prisoner's Dilemma, repeated for a finite length of time. We show that a minimal bound on the players' computational ability is sufficient to enable cooperative behavior. In addition, a variant of the repeated Prisoner's Dilemma game is suggested, in which players have the choice of opting out. This modification enriches the game and suggests dominance of cooperative strategies. Competitive analysis is suggested as a tool for investigating sub-optimal (but computationally tractable) strategies and game theoretic models in general. Using competitive analysis, it is shown that for bounded players, a sub-optimal strategy might be the optimal choice, given resource limitations.
[ { "version": "v1", "created": "Mon, 22 Jan 2007 15:23:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Mor", "Yishay", "" ], [ "Rosenschein", "Jeffrey S.", "" ] ]
cs/0701142
Wolfgang Bein
Wolfgang Bein, Lawrence L. Larmore, R\"udiger Reischuk
Knowledge State Algorithms: Randomization with Limited Information
17 pages, 2 figures
null
null
null
cs.DS
null
We introduce the concept of knowledge states; many well-known algorithms can be viewed as knowledge state algorithms. The knowledge state approach can be used to to construct competitive randomized online algorithms and study the tradeoff between competitiveness and memory. A knowledge state simply states conditional obligations of an adversary, by fixing a work function, and gives a distribution for the algorithm. When a knowledge state algorithm receives a request, it then calculates one or more "subsequent" knowledge states, together with a probability of transition to each. The algorithm then uses randomization to select one of those subsequents to be the new knowledge state. We apply the method to the paging problem. We present optimally competitive algorithm for paging for the cases where the cache sizes are k=2 and k=3. These algorithms use only a very limited number of bookmarks.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 00:54:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Bein", "Wolfgang", "" ], [ "Larmore", "Lawrence L.", "" ], [ "Reischuk", "Rüdiger", "" ] ]
cs/0701144
Andreas U. Schmidt
Nicolai Kuntze and Andreas U. Schmidt
Trusted Ticket Systems and Applications
Accepted full research paper at IFIP sec2007, Sandton, South Africa, 14-16 May 2007
null
null
null
cs.CR
null
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in personal computers and mobile devices alike. Despite its neutrality with respect to applications, it has raised some privacy concerns. We show that trusted computing can be applied for service access control in a manner protecting users' privacy. We construct a ticket system -- a concept which is at the heart of Identity Management -- relying solely on the capabilities of the trusted platform module and the standards specified by the Trusted Computing Group. Two examples show how it can be used for pseudonymous and protected service access.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 14:26:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0701145
Andreas U. Schmidt
Nicolai Kuntze, Andreas U. Schmidt, and Christian Hett
Non-Repudiation in Internet Telephony
Accepted full research paper at IFIP sec2007, Sandton, South Africa, 14-16 May 2007
null
null
null
cs.CR
null
We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data stream and its temporal sequence and thus the security context of a conversation. The concept is close to the protocols for Voice over the Internet (VoIP), provides a high level of inherent security, and extends naturally to multilateral non-repudiation, e.g., for conferences. Signatures over conversations can become true declarations of will in analogy to electronically signed, digital documents. This enables binding verbal contracts, in principle between unacquainted speakers, and in particular without witnesses. A reference implementation of a secure VoIP archive is exhibited.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 15:23:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ], [ "Hett", "Christian", "" ] ]
cs/0701147
Wim Vanhoof
Michael Hanus
A Generic Analysis Environment for Curry Programs
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments
null
null
null
cs.PL
null
We present CurryBrowser, a generic analysis environment for the declarative multi-paradigm language Curry. CurryBrowser supports browsing through the program code of an application written in Curry, i.e., the main module and all directly or indirectly imported modules. Each module can be shown in different formats (e.g., source code, interface, intermediate code) and, inside each module, various properties of functions defined in this module can be analyzed. In order to support the integration of various program analyses, CurryBrowser has a generic interface to connect local and global analyses implemented in Curry. CurryBrowser is completely implemented in Curry using libraries for GUI programming and meta-programming.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 06:55:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Hanus", "Michael", "" ] ]
cs/0701148
Wim Vanhoof
Wim Vanhoof and Susana Munoz-Hernandez
Proceedings of the 16th Workshop in Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
null
cs.PL
null
This volume contains the papers presented at WLPE'06: the 16th Workshop on Logic-based Methods in Programming Environments held on August 16, 2006 in the Seattle Sheraton Hotel and Towers, Seattle, Washington (USA). It was organised as a satellite workshop of ICLP'06, the 22th International Conference on Logic Programming.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 07:03:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Vanhoof", "Wim", "" ], [ "Munoz-Hernandez", "Susana", "" ] ]
cs/0701150
Luc Brun
Luc Brun (GREYC), Walter G. Kropatsch (PRIP)
Contains and Inside relationships within combinatorial Pyramids
35 pages
Pattern Recognition 39 (01/04/2006) 515-526
null
null
cs.CV
null
Irregular pyramids are made of a stack of successively reduced graphs embedded in the plane. Such pyramids are used within the segmentation framework to encode a hierarchy of partitions. The different graph models used within the irregular pyramid framework encode different types of relationships between regions. This paper compares different graph models used within the irregular pyramid framework according to a set of relationships between regions. We also define a new algorithm based on a pyramid of combinatorial maps which allows to determine if one region contains the other using only local calculus.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 15:13:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Brun", "Luc", "", "GREYC" ], [ "Kropatsch", "Walter G.", "", "PRIP" ] ]
cs/0701153
Richard Kr\'alovi\v{c}
Michal Fori\v{s}ek, Branislav Katreniak, Jana Katreniakov\'a, Rastislav Kr\'alovi\v{c}, Richard Kr\'alovi\v{c}, Vladim\'ir Koutn\'y, Dana Pardubsk\'a, Tom\'a\v{s} Plachetka, Branislav Rovan
Online Bandwidth Allocation
null
null
null
null
cs.DS cs.NI
null
The paper investigates a version of the resource allocation problem arising in the wireless networking, namely in the OVSF code reallocation process. In this setting a complete binary tree of a given height $n$ is considered, together with a sequence of requests which have to be served in an online manner. The requests are of two types: an insertion request requires to allocate a complete subtree of a given height, and a deletion request frees a given allocated subtree. In order to serve an insertion request it might be necessary to move some already allocated subtrees to other locations in order to free a large enough subtree. We are interested in the worst case average number of such reallocations needed to serve a request. It was proved in previous work that the competitive ratio of the optimal online algorithm solving this problem is between 1.5 and O(n). We partially answer the question about its exact value by giving an O(1)-competitive online algorithm. Same model has been used in the context of memory management systems, and analyzed for the number of reallocations needed to serve a request in the worst case. In this setting, our result is a corresponding amortized analysis.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 11:52:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Forišek", "Michal", "" ], [ "Katreniak", "Branislav", "" ], [ "Katreniaková", "Jana", "" ], [ "Královič", "Rastislav", "" ], [ "Královič", "Richard", "" ], [ "Koutný", "Vladimír", "" ], [ "Pardubská", "Dana", "" ], [ "Plachetka", "Tomáš", "" ], [ "Rovan", "Branislav", "" ] ]
cs/0701155
Jim Gray
Jim Gray, Surajit Chaudhuri, Adam Bosworth, Andrew Layman, Don Reichart, Murali Venkatrao, Frank Pellow, Hamid Pirahesh
Data Cube: A Relational Aggregation Operator Generalizing Group-By, Cross-Tab, and Sub-Totals
null
Data Mining and Knowledge Discovery 1(1): 29-53 (1997)
null
null
cs.DB
null
Data analysis applications typically aggregate data across many dimensions looking for anomalies or unusual patterns. The SQL aggregate functions and the GROUP BY operator produce zero-dimensional or one-dimensional aggregates. Applications need the N-dimensional generalization of these operators. This paper defines that operator, called the data cube or simply cube. The cube operator generalizes the histogram, cross-tabulation, roll-up, drill-down, and sub-total constructs found in most report writers. The novelty is that cubes are relations. Consequently, the cube operator can be imbedded in more complex non-procedural data analysis programs. The cube operator treats each of the N aggregation attributes as a dimension of N-space. The aggregate of a particular set of attribute values is a point in this space. The set of points forms an N-dimensional cube. Super-aggregates are computed by aggregating the N-cube to lower dimensional spaces. This paper (1) explains the cube and roll-up operators, (2) shows how they fit in SQL, (3) explains how users can define new aggregate functions for cubes, and (4) discusses efficient techniques to compute the cube. Many of these features are being added to the SQL Standard.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:39:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Chaudhuri", "Surajit", "" ], [ "Bosworth", "Adam", "" ], [ "Layman", "Andrew", "" ], [ "Reichart", "Don", "" ], [ "Venkatrao", "Murali", "" ], [ "Pellow", "Frank", "" ], [ "Pirahesh", "Hamid", "" ] ]
cs/0701156
Jim Gray
Jim Gray
Data Management: Past, Present, and Future
null
IEEE Computer 29(10): 38-46 (1996)
null
MSR-TR-96-18
cs.DB
null
Soon most information will be available at your fingertips, anytime, anywhere. Rapid advances in storage, communications, and processing allow us move all information into Cyberspace. Software to define, search, and visualize online information is also a key to creating and accessing online information. This article traces the evolution of data management systems and outlines current trends. Data management systems began by automating traditional tasks: recording transactions in business, science, and commerce. This data consisted primarily of numbers and character strings. Today these systems provide the infrastructure for much of our society, allowing fast, reliable, secure, and automatic access to data distributed throughout the world. Increasingly these systems automatically design and manage access to the data. The next steps are to automate access to richer forms of data: images, sound, video, maps, and other media. A second major challenge is automatically summarizing and abstracting data in anticipation of user requests. These multi-media databases and tools to access them will be a cornerstone of our move to Cyberspace.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:42:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
cs/0701157
Jim Gray
Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O'Neil, Patrick O'Neil
A Critique of ANSI SQL Isolation Levels
null
Proc. ACM SIGMOD 95, pp. 1-10, San Jose CA, June 1995
null
MSR-TR-95-51
cs.DB
null
ANSI SQL-92 defines Isolation Levels in terms of phenomena: Dirty Reads, Non-Repeatable Reads, and Phantoms. This paper shows that these phenomena and the ANSI SQL definitions fail to characterize several popular isolation levels, including the standard locking implementations of the levels. Investigating the ambiguities of the phenomena leads to clearer definitions; in addition new phenomena that better characterize isolation types are introduced. An important multiversion isolation type, Snapshot Isolation, is defined.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:53:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Berenson", "Hal", "" ], [ "Bernstein", "Phil", "" ], [ "Gray", "Jim", "" ], [ "Melton", "Jim", "" ], [ "O'Neil", "Elizabeth", "" ], [ "O'Neil", "Patrick", "" ] ]
cs/0701158
Jim Gray
Jim Gray
Queues Are Databases
null
null
null
MSR-TR-95-56
cs.DB
null
Message-oriented-middleware (MOM) has become an small industry. MOM offers queued transaction processing as an advance over pure client-server transaction processing. This note makes four points: Queued transaction processing is less general than direct transaction processing. Queued systems are built on top of direct systems. You cannot build a direct system atop a queued system. It is difficult to build direct, conversational, or distributed transactions atop a queued system. Queues are interesting databases with interesting concurrency control. It is best to build these mechanisms into a standard database system so other applications can use these interesting features. Queue systems need DBMS functionality. Queues need security, configuration, performance monitoring, recovery, and reorganization utilities. Database systems already have these features. A full-function MOM system duplicates these database features. Queue managers are simple TP-monitors managing server pools driven by queues. Database systems are encompassing many server pool features as they evolve to TP-lite systems.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:56:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
cs/0701159
Jim Gray
Gerd Heber, Jim Gray
Supporting Finite Element Analysis with a Relational Database Backend, Part I: There is Life beyond Files
null
null
null
MSR-TR-2005-49
cs.DB cs.CE
null
In this paper, we show how to use a Relational Database Management System in support of Finite Element Analysis. We believe it is a new way of thinking about data management in well-understood applications to prepare them for two major challenges, - size and integration (globalization). Neither extreme size nor integration (with other applications over the Web) was a design concern 30 years ago when the paradigm for FEA implementation first was formed. On the other hand, database technology has come a long way since its inception and it is past time to highlight its usefulness to the field of scientific computing and computer based engineering. This series aims to widen the list of applications for database designers and for FEA users and application developers to reap some of the benefits of database development.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:02:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Heber", "Gerd", "" ], [ "Gray", "Jim", "" ] ]
cs/0701160
Jim Gray
Gerd Heber, Jim Gray
Supporting Finite Element Analysis with a Relational Database Backend, Part II: Database Design and Access
null
null
null
MSR-TR-2006-21
cs.DB cs.CE
null
This is Part II of a three article series on using databases for Finite Element Analysis (FEA). It discusses (1) db design, (2) data loading, (3) typical use cases during grid building, (4) typical use cases during simulation (get and put), (5) typical use cases during analysis (also done in Part III) and some performance measures of these cases. It argues that using a database is simpler to implement than custom data schemas, has better performance because it can use data parallelism, and better supports FEA modularity and tool evolution because database schema evolution, data independence, and self-defining data.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:05:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Heber", "Gerd", "" ], [ "Gray", "Jim", "" ] ]
cs/0701161
Jim Gray
Jim Gray, Charles Levine
Thousands of DebitCredit Transactions-Per-Second: Easy and Inexpensive
null
null
null
MSR-TR-2005-39
cs.DB cs.PF
null
A $2k computer can execute about 8k transactions per second. This is 80x more than one of the largest US bank's 1970's traffic - it approximates the total US 1970's financial transaction volume. Very modest modern computers can easily solve yesterday's problems.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:51:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Levine", "Charles", "" ] ]
cs/0701162
Jim Gray
Jim Gray
A Measure of Transaction Processing 20 Years Later
This article appeared in the IEEE Data Engineering, Fall 2005
null
null
MSR-TR-2005-57
cs.DB cs.PF
null
This provides a retrospective of the paper "A Measure of Transaction Processing" published in 1985. It shows that transaction processing peak performance and price-peformance have improved about 100,000x respectively and that sort/sequential performance has approximately doubled each year (so a million fold improvement) even though processor performance plateaued in 1995.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:57:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
cs/0701163
Jim Gray
Jim Gray, Alex Szalay, Gyorgy Fekete
Using Table Valued Functions in SQL Server 2005 To Implement a Spatial Data Library
null
null
null
MSR-TR-2005-122
cs.DB cs.CE
null
This article explains how to add spatial search functions (point-near-point and point in polygon) to Microsoft SQL Server 2005 using C# and table-valued functions. It is possible to use this library to add spatial search to your application without writing any special code. The library implements the public-domain C# Hierarchical Triangular Mesh (HTM) algorithms from Johns Hopkins University. That C# library is connected to SQL Server 2005 via a set of scalar-valued and table-valued functions. These functions act as a spatial index.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:00:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ], [ "Fekete", "Gyorgy", "" ] ]
cs/0701164
Jim Gray
Alexander S. Szalay, Jim Gray, George Fekete, Peter Z. Kunszt, Peter Kukol, Ani Thakar
Indexing the Sphere with the Hierarchical Triangular Mesh
null
null
null
MSR-TR-2005-123
cs.DB cs.DS
null
We describe a method to subdivide the surface of a sphere into spherical triangles of similar, but not identical, shapes and sizes. The Hierarchical Triangular Mesh (HTM) is a quad-tree that is particularly good at supporting searches at different resolutions, from arc seconds to hemispheres. The subdivision scheme is universal, providing the basis for addressing and for fast lookups. The HTM provides the basis for an efficient geospatial indexing scheme in relational databases where the data have an inherent location on either the celestial sphere or the Earth. The HTM index is superior to cartographical methods using coordinates with singularities at the poles. We also describe a way to specify surface regions that efficiently represent spherical query areas. This article presents the algorithms used to identify the HTM triangles covering such regions.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:04:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Szalay", "Alexander S.", "" ], [ "Gray", "Jim", "" ], [ "Fekete", "George", "" ], [ "Kunszt", "Peter Z.", "" ], [ "Kukol", "Peter", "" ], [ "Thakar", "Ani", "" ] ]
cs/0701165
Jim Gray
Gordon Bell, Jim Gray, Alex Szalay
Petascale Computational Systems
null
null
null
null
cs.DB cs.AR
null
Computational science is changing to be data intensive. Super-Computers must be balanced systems; not just CPU farms but also petascale IO and networking arrays. Anyone building CyberInfrastructure should allocate resources to support a balanced Tier-1 through Tier-3 design.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:23:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Bell", "Gordon", "" ], [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ] ]
cs/0701166
Jim Gray
Jim Gray, Catharine van Ingen
Empirical Measurements of Disk Failure Rates and Error Rates
null
null
null
MSR-TR-2005-166
cs.DB cs.AR
null
The SATA advertised bit error rate of one error in 10 terabytes is frightening. We moved 2 PB through low-cost hardware and saw five disk read error events, several controller failures, and many system reboots caused by security patches. We conclude that SATA uncorrectable read errors are not yet a dominant system-fault source - they happen, but are rare compared to other problems. We also conclude that UER (uncorrectable error rate) is not the relevant metric for our needs. When an uncorrectable read error happens, there are typically several damaged storage blocks (and many uncorrectable read errors.) Also, some uncorrectable read errors may be masked by the operating system. The more meaningful metric for data architects is Mean Time To Data Loss (MTTDL.)
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:29:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "van Ingen", "Catharine", "" ] ]
cs/0701167
Jim Gray
Maria A. Nieto-Santisteban, Aniruddha R. Thakar, Alexander S. Szalay, Jim Gray
Large-Scale Query and XMatch, Entering the Parallel Zone
Astronomical Data Analysis Software and Systems XV in San Lorenzo de El Escorial, Madrid, Spain, October 2005, to appear in the ASP Conference Series
null
null
MSR-TR-2005- 169
cs.DB cs.CE
null
Current and future astronomical surveys are producing catalogs with millions and billions of objects. On-line access to such big datasets for data mining and cross-correlation is usually as highly desired as unfeasible. Providing these capabilities is becoming critical for the Virtual Observatory framework. In this paper we present various performance tests that show how using Relational Database Management Systems (RDBMS) and a Zoning algorithm to partition and parallelize the computation, we can facilitate large-scale query and cross-match.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:33:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Nieto-Santisteban", "Maria A.", "" ], [ "Thakar", "Aniruddha R.", "" ], [ "Szalay", "Alexander S.", "" ], [ "Gray", "Jim", "" ] ]
cs/0701170
Jim Gray
Katalin Szlavecz, Andreas Terzis, Stuart Ozer, Razvan Musaloiu-E, Joshua Cogan, Sam Small, Randal Burns, Jim Gray, Alex Szalay
Life Under Your Feet: An End-to-End Soil Ecology Sensor Network, Database, Web Server, and Analysis Service
null
null
null
MSR TR 2006 90
cs.DB cs.CE
null
Wireless sensor networks can revolutionize soil ecology by providing measurements at temporal and spatial granularities previously impossible. This paper presents a soil monitoring system we developed and deployed at an urban forest in Baltimore as a first step towards realizing this vision. Motes in this network measure and save soil moisture and temperature in situ every minute. Raw measurements are periodically retrieved by a sensor gateway and stored in a central database where calibrated versions are derived and stored. The measurement database is published through Web Services interfaces. In addition, analysis tools let scientists analyze current and historical data and help manage the sensor network. The article describes the system design, what we learned from the deployment, and initial results obtained from the sensors. The system measures soil factors with unprecedented temporal precision. However, the deployment required device-level programming, sensor calibration across space and time, and cross-referencing measurements with external sources. The database, web server, and data analysis design required considerable innovation and expertise. So, the ratio of computer-scientists to ecologists was 3:1. Before sensor networks can fulfill their potential as instruments that can be easily deployed by scientists, these technical problems must be addressed so that the ratio is one nerd per ten ecologists.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:08:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Szlavecz", "Katalin", "" ], [ "Terzis", "Andreas", "" ], [ "Ozer", "Stuart", "" ], [ "Musaloiu-E", "Razvan", "" ], [ "Cogan", "Joshua", "" ], [ "Small", "Sam", "" ], [ "Burns", "Randal", "" ], [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ] ]
cs/0701171
Jim Gray
Jim Gray, Maria A. Nieto-Santisteban, Alexander S. Szalay
The Zones Algorithm for Finding Points-Near-a-Point or Cross-Matching Spatial Datasets
null
null
null
MSR TR 2006 52
cs.DB cs.DS
null
Zones index an N-dimensional Euclidian or metric space to efficiently support points-near-a-point queries either within a dataset or between two datasets. The approach uses relational algebra and the B-Tree mechanism found in almost all relational database systems. Hence, the Zones Algorithm gives a portable-relational implementation of points-near-point, spatial cross-match, and self-match queries. This article corrects some mistakes in an earlier article we wrote on the Zones Algorithm and describes some algorithmic improvements. The Appendix includes an implementation of point-near-point, self-match, and cross-match using the USGS city and stream gauge database.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:11:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Nieto-Santisteban", "Maria A.", "" ], [ "Szalay", "Alexander S.", "" ] ]
cs/0701172
Jim Gray
Jim Gray, Alex Szalay, Tamas Budavari, Robert Lupton, Maria Nieto-Santisteban, Ani Thakar
Cross-Matching Multiple Spatial Observations and Dealing with Missing Data
null
null
null
MSR TR 2006-175
cs.DB cs.CE
null
Cross-match spatially clusters and organizes several astronomical point-source measurements from one or more surveys. Ideally, each object would be found in each survey. Unfortunately, the observation conditions and the objects themselves change continually. Even some stationary objects are missing in some observations; sometimes objects have a variable light flux and sometimes the seeing is worse. In most cases we are faced with a substantial number of differences in object detections between surveys and between observations taken at different times within the same survey or instrument. Dealing with such missing observations is a difficult problem. The first step is to classify misses as ephemeral - when the object moved or simply disappeared, masked - when noise hid or corrupted the object observation, or edge - when the object was near the edge of the observational field. This classification and a spatial library to represent and manipulate observational footprints help construct a Match table recording both hits and misses. Transitive closure clusters friends-of-friends into object bundles. The bundle summary statistics are recorded in a Bundle table. This design is an evolution of the Sloan Digital Sky Survey cross-match design that compared overlapping observations taken at different times. Cross-Matching Multiple Spatial Observations and Dealing with Missing Data.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:18:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ], [ "Budavari", "Tamas", "" ], [ "Lupton", "Robert", "" ], [ "Nieto-Santisteban", "Maria", "" ], [ "Thakar", "Ani", "" ] ]
cs/0701173
Jim Gray
Vik Singh, Jim Gray, Ani Thakar, Alexander S. Szalay, Jordan Raddick, Bill Boroski, Svetlana Lebedeva, Brian Yanny
SkyServer Traffic Report - The First Five Years
null
null
null
MSR TR-2006-190
cs.DB cs.CE
null
The SkyServer is an Internet portal to the Sloan Digital Sky Survey Catalog Archive Server. From 2001 to 2006, there were a million visitors in 3 million sessions generating 170 million Web hits, 16 million ad-hoc SQL queries, and 62 million page views. The site currently averages 35 thousand visitors and 400 thousand sessions per month. The Web and SQL logs are public. We analyzed traffic and sessions by duration, usage pattern, data product, and client type (mortal or bot) over time. The analysis shows (1) the site's popularity, (2) the educational website that delivered nearly fifty thousand hours of interactive instruction, (3) the relative use of interactive, programmatic, and batch-local access, (4) the success of offering ad-hoc SQL, personal database, and batch job access to scientists as part of the data publication, (5) the continuing interest in "old" datasets, (6) the usage of SQL constructs, and (7) a novel approach of using the corpus of correct SQL queries to suggest similar but correct statements when a user presents an incorrect SQL statement.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:22:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Singh", "Vik", "" ], [ "Gray", "Jim", "" ], [ "Thakar", "Ani", "" ], [ "Szalay", "Alexander S.", "" ], [ "Raddick", "Jordan", "" ], [ "Boroski", "Bill", "" ], [ "Lebedeva", "Svetlana", "" ], [ "Yanny", "Brian", "" ] ]
cs/0701175
Dimitris Kalles
Th. Hadzilacos, D. Kalles, M. Pouliopoulou
On the Software and Knowledge Engineering Aspects of the Educational Process
Contains 21 sparse pages, 8 figures. Accepted for publication in International Journal of Software Engineering and Knowledge Engineering (IJSEKE). Keywords: Tools for interactive learning and teaching, Modelling, Distance Learning
null
null
null
cs.SE cs.DL
null
The Hellenic Open University has embarked on a large-scale effort to enhance its textbook-based material with content that demonstrably supports the basic tenets of distance learning. The challenge is to set up a framework that allows for the production-level creation, distribution and consumption of content, and at the same time, evaluate the effort in terms of technological, educational and organizational knowledge gained. This paper presents a model of the educational process that is used as a development backbone and argues about its conceptual and technical practicality at large.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 14:51:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Hadzilacos", "Th.", "" ], [ "Kalles", "D.", "" ], [ "Pouliopoulou", "M.", "" ] ]
cs/0701176
Alain Frisch
Alain Frisch (INRIA Rocquencourt), Haruo Hosoya (CST)
Towards Practical Typechecking for Macro Tree Transducers
null
null
null
null
cs.PL
null
Macro tree transducers (mtt) are an important model that both covers many useful XML transformations and allows decidable exact typechecking. This paper reports our first step toward an implementation of mtt typechecker that has a practical efficiency. Our approach is to represent an input type obtained from a backward inference as an alternating tree automaton, in a style similar to Tozawa's XSLT0 typechecking. In this approach, typechecking reduces to checking emptiness of an alternating tree automaton. We propose several optimizations (Cartesian factorization, state partitioning) on the backward inference process in order to produce much smaller alternating tree automata than the naive algorithm, and we present our efficient algorithm for checking emptiness of alternating tree automata, where we exploit the explicit representation of alternation for local optimizations. Our preliminary experiments confirm that our algorithm has a practical performance that can typecheck simple transformations with respect to the full XHTML in a reasonable time.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 15:16:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Frisch", "Alain", "", "INRIA Rocquencourt" ], [ "Hosoya", "Haruo", "", "CST" ] ]
cs/0701180
Fionn Murtagh
F. Murtagh, J. Mothe and K. Englmeier
Ontology from Local Hierarchical Structure in Text
35 pp., 12 figures
null
null
null
cs.IR
null
We study the notion of hierarchy in the context of visualizing textual data and navigating text collections. A formal framework for ``hierarchy'' is given by an ultrametric topology. This provides us with a theoretical foundation for concept hierarchy creation. A major objective is {\em scalable} annotation or labeling of concept maps. Serendipitously we pursue other objectives such as deriving common word pair (and triplet) phrases, i.e., word 2- and 3-grams. We evaluate our approach using (i) a collection of texts, (ii) a single text subdivided into successive parts (for which we provide an interactive demonstrator), and (iii) a text subdivided at the sentence or line level. While detailing a generic framework, a distinguishing feature of our work is that we focus on {\em locality} of hierarchic structure in order to extract semantic information.
[ { "version": "v1", "created": "Sat, 27 Jan 2007 18:31:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Murtagh", "F.", "" ], [ "Mothe", "J.", "" ], [ "Englmeier", "K.", "" ] ]
cs/0701181
Fionn Murtagh
Fionn Murtagh
A Note on Local Ultrametricity in Text
18 pp
null
null
null
cs.CL
null
High dimensional, sparsely populated data spaces have been characterized in terms of ultrametric topology. This implies that there are natural, not necessarily unique, tree or hierarchy structures defined by the ultrametric topology. In this note we study the extent of local ultrametric topology in texts, with the aim of finding unique ``fingerprints'' for a text or corpus, discriminating between texts from different domains, and opening up the possibility of exploiting hierarchical structures in the data. We use coherent and meaningful collections of over 1000 texts, comprising over 1.3 million words.
[ { "version": "v1", "created": "Sat, 27 Jan 2007 19:09:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Murtagh", "Fionn", "" ] ]
cs/0701183
Gilles Villard
Gilles Villard (LIP)
Certification of the QR factor R, and of lattice basis reducedness
null
null
null
Vil06-1
cs.SC cs.NA
null
Given a lattice basis of n vectors in Z^n, we propose an algorithm using 12n^3+O(n^2) floating point operations for checking whether the basis is LLL-reduced. If the basis is reduced then the algorithm will hopefully answer ''yes''. If the basis is not reduced, or if the precision used is not sufficient with respect to n, and to the numerical properties of the basis, the algorithm will answer ''failed''. Hence a positive answer is a rigorous certificate. For implementing the certificate itself, we propose a floating point algorithm for computing (certified) error bounds for the entries of the R factor of the QR matrix factorization. This algorithm takes into account all possible approximation and rounding errors. The cost 12n^3+O(n^2) of the certificate is only six times more than the cost of numerical algorithms for computing the QR factorization itself, and the certificate may be implemented using matrix library routines only. We report experiments that show that for a reduced basis of adequate dimension and quality the certificate succeeds, and establish the effectiveness of the certificate. This effectiveness is applied for certifying the output of fastest existing floating point heuristics of LLL reduction, without slowing down the whole process.
[ { "version": "v1", "created": "Mon, 29 Jan 2007 09:15:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Villard", "Gilles", "", "LIP" ] ]
cs/0701188
Gilles Villard
Wayne Eberly (UCALGARY), Mark Giesbrecht (UWO), Pascal Giorgi (LP2A), Arne Storjohann (UWO), Gilles Villard (LIP)
Faster Inversion and Other Black Box Matrix Computations Using Efficient Block Projections
null
null
null
EGGSV07-1
cs.SC cs.NA
null
Block projections have been used, in [Eberly et al. 2006], to obtain an efficient algorithm to find solutions for sparse systems of linear equations. A bound of softO(n^(2.5)) machine operations is obtained assuming that the input matrix can be multiplied by a vector with constant-sized entries in softO(n) machine operations. Unfortunately, the correctness of this algorithm depends on the existence of efficient block projections, and this has been conjectured. In this paper we establish the correctness of the algorithm from [Eberly et al. 2006] by proving the existence of efficient block projections over sufficiently large fields. We demonstrate the usefulness of these projections by deriving improved bounds for the cost of several matrix problems, considering, in particular, ``sparse'' matrices that can be be multiplied by a vector using softO(n) field operations. We show how to compute the inverse of a sparse matrix over a field F using an expected number of softO(n^(2.27)) operations in F. A basis for the null space of a sparse matrix, and a certification of its rank, are obtained at the same cost. An application to Kaltofen and Villard's Baby-Steps/Giant-Steps algorithms for the determinant and Smith Form of an integer matrix yields algorithms requiring softO(n^(2.66)) machine operations. The derived algorithms are all probabilistic of the Las Vegas type.
[ { "version": "v1", "created": "Mon, 29 Jan 2007 18:20:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Eberly", "Wayne", "", "UCALGARY" ], [ "Giesbrecht", "Mark", "", "UWO" ], [ "Giorgi", "Pascal", "", "LP2A" ], [ "Storjohann", "Arne", "", "UWO" ], [ "Villard", "Gilles", "", "LIP" ] ]
cs/0701190
Aaron Harwood
Thomas Jacobs and Aaron Harwood
A Peer-to-Peer Browsable File Index using a Popularity Based Global Namespace
null
null
null
null
cs.DC cs.NI
null
The distribution of files using decentralized, peer-to-peer (P2P) systems, has significant advantages over centralized approaches. It is however more difficult to settle on the best approach for file sharing. Most file sharing systems are based on query string searches, leading to a relatively simple but inefficient broadcast or to an efficient but relatively complicated index in a structured environment. In this paper we use a browsable peer-to-peer file index consisting of files which serve as directory nodes, interconnecting to form a directory network. We implemented the system based on BitTorrent and Kademlia. The directory network inherits all of the advantages of decentralization and provides browsable, efficient searching. To avoid conflict between users in the P2P system while also imposing no additional restrictions, we allow multiple versions of each directory node to simultaneously exist -- using popularity as the basis for default browsing behavior. Users can freely add files and directory nodes to the network. We show, using a simulation of user behavior and file quality, that the popularity based system consistently leads users to a high quality directory network; above the average quality of user updates. Q
[ { "version": "v1", "created": "Tue, 30 Jan 2007 04:00:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacobs", "Thomas", "" ], [ "Harwood", "Aaron", "" ] ]
cs/0701191
David Monniaux
David Monniaux (LIENS)
The parallel implementation of the Astr\'{e}e static analyzer
null
APLAS: Programming languages and systems (2005) 86-96
10.1007/11575467_7
null
cs.PL cs.PF
null
The Astr\'{e}e static analyzer is a specialized tool that can prove the absence of runtime errors, including arithmetic overflows, in large critical programs. Keeping analysis times reasonable for industrial use is one of the design objectives. In this paper, we discuss the parallel implementation of the analysis.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 15:20:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Monniaux", "David", "", "LIENS" ] ]
cs/0701195
David Monniaux
David Monniaux (LIENS)
An Abstract Monte-Carlo Method for the Analysis of Probabilistic Programs
null
POPL: Annual Symposium on Principles of Programming Languages (2001) 93 - 101
10.1145/360204.360211
null
cs.PL cs.PF
null
We introduce a new method, combination of random testing and abstract interpretation, for the analysis of programs featuring both probabilistic and non-probabilistic nondeterminism. After introducing "ordinary" testing, we show how to combine testing and abstract interpretation and give formulas linking the precision of the results to the number of iterations. We then discuss complexity and optimization issues and end with some experimental results.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 17:14:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Monniaux", "David", "", "LIENS" ] ]
cs/0701198
Raissa M. D'Souza
R. M. D'Souza, C. Borgs, J. T. Chayes, N. Berger and R. D. Kleinberg
Fitting the WHOIS Internet data
Supplemental information for "Emergence of Tempered Preferential Attachment From Optimization", to appear (open access) PNAS USA, 2007
null
null
null
cs.NI
null
We consider the RIPE WHOIS Internet data as characterized by the Cooperative Association for Internet Data Analysis (CAIDA), and show that the Tempered Preferential Attachment model [1] provides an excellent fit to this data. [1] D'Souza, Borgs, Chayes, Berger and Kleinberg, to appear PNAS USA, 2007.
[ { "version": "v1", "created": "Wed, 31 Jan 2007 02:51:45 GMT" } ]
2007-05-23T00:00:00
[ [ "D'Souza", "R. M.", "" ], [ "Borgs", "C.", "" ], [ "Chayes", "J. T.", "" ], [ "Berger", "N.", "" ], [ "Kleinberg", "R. D.", "" ] ]
cs/0701200
Francoise Detienne
Fran\c{c}oise Detienne (INRIA)
Reasoning from a schema and from an analog in software code reuse
null
Dans Fourth Workshop on Empirical Studies of Programmers, ESP91 (1991) 5-22
null
null
cs.SE
null
The activity of design involves the decomposition of problems into subproblems and the development and evaluation of solutions. In many cases, solution development is not done from scratch. Designers often evoke and adapt solutions developed in the past. These solutions may come from an internal source, i.e. the memory of the designers, and/or from an external source. The goal of this paper is to analyse the characteristics of the cognitive mechanisms, the knowledge and the representations involved in the code reuse activity performed by experienced programmers. More generally, the focus is the control structure of the reuse activity. Data collected in an experiment in which programmers had to design programs are analyzed. Two code reuse situations are distinguished depending on whether or not the processes involved in reuse start before the elaboration of what acts as a source-solution. Our analysis highlights the use of reasoning from a schema and from an analog in the code reuse activity.
[ { "version": "v1", "created": "Wed, 31 Jan 2007 16:41:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Detienne", "Françoise", "", "INRIA" ] ]
cs/0702010
Jacques Carette
Jacques Carette
A canonical form for some piecewise defined functions
submitted to ISSAC 2007
null
null
null
cs.SC cs.MS
null
We define a canonical form for piecewise defined functions. We show that this has a wider range of application as well as better complexity properties than previous work.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 17:54:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Carette", "Jacques", "" ] ]
cs/0702011
Riccardo Pucella
Joseph Y. Halpern, Riccardo Pucella
Dealing With Logical Omniscience: Expressiveness and Pragmatics
24 pages. Submitted for publication
null
null
null
cs.LO cs.AI
null
We examine four approaches for dealing with the logical omniscience problem and their potential applicability: the syntactic approach, awareness, algorithmic knowledge, and impossible possible worlds. Although in some settings these approaches are equi-expressive and can capture all epistemic states, in other settings of interest (especially with probability in the picture), we show that they are not equi-expressive. We then consider the pragmatics of dealing with logical omniscience-- how to choose an approach and construct an appropriate model.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 20:06:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0702012
Daria Sorokina
Daria Sorokina, Johannes Gehrke, Simeon Warner, Paul Ginsparg
Plagiarism Detection in arXiv
Sixth International Conference on Data Mining (ICDM'06), Dec 2006
null
10.1109/ICDM.2006.126
null
cs.DB cs.DL cs.IR
null
We describe a large-scale application of methods for finding plagiarism in research document collections. The methods are applied to a collection of 284,834 documents collected by arXiv.org over a 14 year period, covering a few different research disciplines. The methodology efficiently detects a variety of problematic author behaviors, and heuristics are developed to reduce the number of false positives. The methods are also efficient enough to implement as a real-time submission screen for a collection many times larger.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 20:52:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Sorokina", "Daria", "" ], [ "Gehrke", "Johannes", "" ], [ "Warner", "Simeon", "" ], [ "Ginsparg", "Paul", "" ] ]
cs/0702019
Maxime Gariel
Maxime Gariel, John-Paul Clarke and Eric Feron
A Dynamic I/O Model for TRACON Traffic Management
16 pages, 19 figures eps
null
null
null
cs.OH
null
This work investigates the TRACON flow management around a major airport. Aircraft flows are analyzed through a study of TRACON trajectories records. Rerouting and queuing processes are highlighted and airport characteristics are shown as function of the number of planes in the TRACON. Then, a simple input-output TRACON queuing and landing model is proposed. This model is calibrated and validated using available TRACON data. It reproduces the same phenomenon as the real system. This model is used to show the impact of limiting the number of aircrafts in the TRACON. A limited number of aircraft does not increase delays but reduces the controller's workload and increases safety.
[ { "version": "v1", "created": "Fri, 2 Feb 2007 22:55:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Gariel", "Maxime", "" ], [ "Clarke", "John-Paul", "" ], [ "Feron", "Eric", "" ] ]
cs/0702022
Changjia Chen
Chunxi Li and Changjia Chen
Gnutella: Topology Dynamics On Phase Space
11 pages, 14 figures
null
null
null
cs.NI
null
In this paper, the topology dynamic of Gnutella is studied through phase space. The dynamic changes in peer degree are studied as a time series in two dimensional phase space which is defined as the number of connected leaves and the number of connected ultras. The reported degrees are concentrated in three special Software related regions that we named as Ultra Stable Region, Leaf Stable Region and Transition Belt. A method is proposed to classify degree traces in phase space into different classes. Connection churn then is studied along with the churn in degree. It shows that the topological structure of Gnutella is rather stable in its connection degree but not the topology itself. The connection drop rate is estimated and the live time of connections is inferred afterwards. M/M/m/m loss queue system is introduced to model the degree keeping process in Gnutella. This model revealed that the degree stable is ensured by large new connection efforts. In other words the stable in topological structure of Gnutella is a results of essential unstable in its topology. That opens a challenge to the basic design philosophy of this network.
[ { "version": "v1", "created": "Sun, 4 Feb 2007 08:12:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Chunxi", "" ], [ "Chen", "Changjia", "" ] ]
cs/0702027
Andrew Gacek
Andrew Gacek
The Suspension Calculus and its Relationship to Other Explicit Treatments of Substitution in Lambda Calculi
84 pages
null
null
null
cs.LO cs.PL
null
The intrinsic treatment of binding in the lambda calculus makes it an ideal data structure for representing syntactic objects with binding such as formulas, proofs, types, and programs. Supporting such a data structure in an implementation is made difficult by the complexity of the substitution operation relative to lambda terms. In this paper we present the suspension calculus, an explicit treatment of meta level binding in the lambda calculus. We prove properties of this calculus which make it a suitable replacement for the lambda calculus in implementation. Finally, we compare the suspension calculus with other explicit treatments of substitution.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 14:35:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Gacek", "Andrew", "" ] ]
cs/0702029
Mikkel Thorup
Mario Szegedy and Mikkel Thorup
On the variance of subset sum estimation
20 pages, 1 figure
null
null
null
cs.DS
null
For high volume data streams and large data warehouses, sampling is used for efficient approximate answers to aggregate queries over selected subsets. Mathematically, we are dealing with a set of weighted items and want to support queries to arbitrary subset sums. With unit weights, we can compute subset sizes which together with the previous sums provide the subset averages. The question addressed here is which sampling scheme we should use to get the most accurate subset sum estimates. We present a simple theorem on the variance of subset sum estimation and use it to prove variance optimality and near-optimality of subset sum estimation with different known sampling schemes. This variance is measured as the average over all subsets of any given size. By optimal we mean there is no set of input weights for which any sampling scheme can have a better average variance. Such powerful results can never be established experimentally. The results of this paper are derived mathematically. For example, we show that appropriately weighted systematic sampling is simultaneously optimal for all subset sizes. More standard schemes such as uniform sampling and probability-proportional-to-size sampling with replacement can be arbitrarily bad. Knowing the variance optimality of different sampling schemes can help deciding which sampling scheme to apply in a given context.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 15:55:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Szegedy", "Mario", "" ], [ "Thorup", "Mikkel", "" ] ]
cs/0702032
Reid Andersen
Reid Andersen
Finding large and small dense subgraphs
12 pages, no figures
null
null
null
cs.DS
null
We consider two optimization problems related to finding dense subgraphs. The densest at-least-k-subgraph problem (DalkS) is to find an induced subgraph of highest average degree among all subgraphs with at least k vertices, and the densest at-most-k-subgraph problem (DamkS) is defined similarly. These problems are related to the well-known densest k-subgraph problem (DkS), which is to find the densest subgraph on exactly k vertices. We show that DalkS can be approximated efficiently, while DamkS is nearly as hard to approximate as the densest k-subgraph problem.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 19:29:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Andersen", "Reid", "" ] ]
cs/0702034
Rama Raghavan
L.Jeganathan and R.Rama
Graph Splicing System
13 pages,5 figures
null
null
null
cs.DM
null
The string splicing was introduced by Tom Head which stands as an abstract model for the DNA recombination under the influence of restriction enzymes. The complex chemical process of three dimensional molecules in three dimensional space can be modeled using graphs. The graph splicing systems which were studied so far, can only be applied to a particular type of graphs which could be interpreted as linear or circular graphs. In this paper, we take a different and a novel approach to splice two graphs and introduce a splicing system for graphs that can be applied to all types of graphs. Splicing two graphs can be thought of as a new operation, among the graphs, that generates many new graphs from the given two graphs. Taking a different line of thinking, some of the graph theoretical results of the splicing are studied.
[ { "version": "v1", "created": "Tue, 6 Feb 2007 05:46:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Jeganathan", "L.", "" ], [ "Rama", "R.", "" ] ]
cs/0702036
Michael Fisher
Clare Dixon, Michael Fisher, Boris Konev, Alexei Lisitsa
Efficient First-Order Temporal Logic for Infinite-State Systems
16 pages, 2 figures
null
null
null
cs.LO
null
In this paper we consider the specification and verification of infinite-state systems using temporal logic. In particular, we describe parameterised systems using a new variety of first-order temporal logic that is both powerful enough for this form of specification and tractable enough for practical deductive verification. Importantly, the power of the temporal language allows us to describe (and verify) asynchronous systems, communication delays and more complex properties such as liveness and fairness properties. These aspects appear difficult for many other approaches to infinite-state verification.
[ { "version": "v1", "created": "Tue, 6 Feb 2007 15:10:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Dixon", "Clare", "" ], [ "Fisher", "Michael", "" ], [ "Konev", "Boris", "" ], [ "Lisitsa", "Alexei", "" ] ]
cs/0702038
Minkyu Kim
Minkyu Kim, Varun Aggarwal, Una-May O'Reilly, Muriel Medard, Wonsik Kim
Genetic Representations for Evolutionary Minimization of Network Coding Resources
10 pages, 3 figures, accepted to the 4th European Workshop on the Application of Nature-Inspired Techniques to Telecommunication Networks and Other Connected Systems (EvoCOMNET 2007)
null
null
null
cs.NE cs.NI
null
We demonstrate how a genetic algorithm solves the problem of minimizing the resources used for network coding, subject to a throughput constraint, in a multicast scenario. A genetic algorithm avoids the computational complexity that makes the problem NP-hard and, for our experiments, greatly improves on sub-optimal solutions of established methods. We compare two different genotype encodings, which tradeoff search space size with fitness landscape, as well as the associated genetic operators. Our finding favors a smaller encoding despite its fewer intermediate solutions and demonstrates the impact of the modularity enforced by genetic operators on the performance of the algorithm.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 05:54:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Minkyu", "" ], [ "Aggarwal", "Varun", "" ], [ "O'Reilly", "Una-May", "" ], [ "Medard", "Muriel", "" ], [ "Kim", "Wonsik", "" ] ]
cs/0702039
Xavier Goaoc
Otfried Cheong, Xavier Goaoc (INRIA Lorraine - LORIA), Andreas Holmsen, Sylvain Petitjean (INRIA Lorraine - LORIA)
Hadwiger and Helly-type theorems for disjoint unit spheres
null
Discrete and Computational Geometry (2006)
null
null
cs.CG
null
We prove Helly-type theorems for line transversals to disjoint unit balls in $\R^{d}$. In particular, we show that a family of $n \geq 2d$ disjoint unit balls in $\R^d$ has a line transversal if, for some ordering $\prec$ of the balls, any subfamily of 2d balls admits a line transversal consistent with $\prec$. We also prove that a family of $n \geq 4d-1$ disjoint unit balls in $\R^d$ admits a line transversal if any subfamily of size $4d-1$ admits a transversal.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 08:29:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheong", "Otfried", "", "INRIA Lorraine - LORIA" ], [ "Goaoc", "Xavier", "", "INRIA Lorraine - LORIA" ], [ "Holmsen", "Andreas", "", "INRIA Lorraine - LORIA" ], [ "Petitjean", "Sylvain", "", "INRIA Lorraine - LORIA" ] ]
cs/0702040
Yves Guiraud
Yves Guiraud
Polygraphs for termination of left-linear term rewriting systems
15 pages
null
null
null
cs.LO math.CT
null
We present a methodology for proving termination of left-linear term rewriting systems (TRSs) by using Albert Burroni's polygraphs, a kind of rewriting systems on algebraic circuits. We translate the considered TRS into a polygraph of minimal size whose termination is proven with a polygraphic interpretation, then we get back the property on the TRS. We recall Yves Lafont's general translation of TRSs into polygraphs and known links between their termination properties. We give several conditions on the original TRS, including being a first-order functional program, that ensure that we can reduce the size of the polygraphic translation. We also prove sufficient conditions on the polygraphic interpretations of a minimal translation to imply termination of the original TRS. Examples are given to compare this method with usual polynomial interpretations.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 10:18:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Guiraud", "Yves", "" ] ]
cs/0702042
Jo\~ao Barros
Luis Lopes, Francisco Martins, Miguel S. Silva, Joao Barros
A Formal Model for Programming Wireless Sensor Networks
14 pages, 0 figures, Submitted for Publication
null
null
null
cs.DC cs.PL
null
In this paper we present new developments in the expressiveness and in the theory of a Calculus for Sensor Networks (CSN). We combine a network layer of sensor devices with a local object model to describe sensor devices with state. The resulting calculus is quite small and yet very expressive. We also present a type system and a type invariance result for the calculus. These results provide the fundamental framework for the development of programming languages and run-time environments.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 14:17:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lopes", "Luis", "" ], [ "Martins", "Francisco", "" ], [ "Silva", "Miguel S.", "" ], [ "Barros", "Joao", "" ] ]
cs/0702047
Holger Spakowski
Holger Spakowski and Rahul Tripathi
Hierarchical Unambiguity
null
null
null
null
cs.CC
null
We develop techniques to investigate relativized hierarchical unambiguous computation. We apply our techniques to generalize known constructs involving relativized unambiguity based complexity classes (UP and \mathcal{UP}) to new constructs involving arbitrary higher levels of the relativized unambiguous polynomial hierarchy (UPH). Our techniques are developed on constraints imposed by hierarchical arrangement of unambiguous nondeterministic polynomial-time Turing machines, and so they differ substantially, in applicability and in nature, from standard methods (such as the switching lemma [Hastad, Computational Limitations of Small-Depth Circuits, MIT Press, 1987]), which play roles in carrying out similar generalizations. Aside from achieving these generalizations, we resolve a question posed by Cai, Hemachandra, and Vyskoc [J. Cai, L. Hemachandra, and J. Vyskoc, Promises and fault-tolerant database access, In K. Ambos-Spies, S. Homer, and U. Schoening, editors, Complexity Theory, pages 101-146. Cambridge University Press, 1993] on an issue related to nonadaptive Turing access to UP and adaptive smart Turing access to \mathcal{UP}.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 16:00:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Spakowski", "Holger", "" ], [ "Tripathi", "Rahul", "" ] ]
cs/0702048
Ken Wakita
Ken Wakita and Toshiyuki Tsurumi
Finding Community Structure in Mega-scale Social Networks
9 pages, 15 figures
null
null
null
cs.CY physics.soc-ph
null
Community analysis algorithm proposed by Clauset, Newman, and Moore (CNM algorithm) finds community structure in social networks. Unfortunately, CNM algorithm does not scale well and its use is practically limited to networks whose sizes are up to 500,000 nodes. The paper identifies that this inefficiency is caused from merging communities in unbalanced manner. The paper introduces three kinds of metrics (consolidation ratio) to control the process of community analysis trying to balance the sizes of the communities being merged. Three flavors of CNM algorithms are built incorporating those metrics. The proposed techniques are tested using data sets obtained from existing social networking service that hosts 5.5 million users. All the methods exhibit dramatic improvement of execution efficiency in comparison with the original CNM algorithm and shows high scalability. The fastest method processes a network with 1 million nodes in 5 minutes and a network with 4 million nodes in 35 minutes, respectively. Another one processes a network with 500,000 nodes in 50 minutes (7 times faster than the original algorithm), finds community structures that has improved modularity, and scales to a network with 5.5 million.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 16:40:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Wakita", "Ken", "" ], [ "Tsurumi", "Toshiyuki", "" ] ]
cs/0702049
Gregory Gutin
Noga Alon, Fedor Fomin, Gregory Gutin, Michael Krivelevich and Saket Saurabh
Parameterized Algorithms for Directed Maximum Leaf Problems
null
null
null
null
cs.DS cs.DM
null
We prove that finding a rooted subtree with at least $k$ leaves in a digraph is a fixed parameter tractable problem. A similar result holds for finding rooted spanning trees with many leaves in digraphs from a wide family $\cal L$ that includes all strong and acyclic digraphs. This settles completely an open question of Fellows and solves another one for digraphs in $\cal L$. Our algorithms are based on the following combinatorial result which can be viewed as a generalization of many results for a `spanning tree with many leaves' in the undirected case, and which is interesting on its own: If a digraph $D\in \cal L$ of order $n$ with minimum in-degree at least 3 contains a rooted spanning tree, then $D$ contains one with at least $(n/2)^{1/5}-1$ leaves.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 18:25:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Alon", "Noga", "" ], [ "Fomin", "Fedor", "" ], [ "Gutin", "Gregory", "" ], [ "Krivelevich", "Michael", "" ], [ "Saurabh", "Saket", "" ] ]
cs/0702053
Andrew Badr
Andrew Badr, Ian Shipman
The DFAs of Finitely Different Languages
null
null
null
null
cs.CC
null
Two languages are "finitely different" if their symmetric difference is finite. We consider the DFAs of finitely different regular languages and find major structural similarities. We proceed to consider the smallest DFAs that recognize a language finitely different from some given DFA. Such "f-minimal" DFAs are not unique, and this non-uniqueness is characterized. Finally, we offer a solution to the minimization problem of finding such f-minimal DFAs.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 03:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Badr", "Andrew", "" ], [ "Shipman", "Ian", "" ] ]
cs/0702054
Christoph Durr
Christoph Durr and Nguyen Kim Thang
Nash equilibria in Voronoi games on graphs
null
null
null
null
cs.GT cs.DS
null
In this paper we study a game where every player is to choose a vertex (facility) in a given undirected graph. All vertices (customers) are then assigned to closest facilities and a player's payoff is the number of customers assigned to it. We show that deciding the existence of a Nash equilibrium for a given graph is NP-hard which to our knowledge is the first result of this kind for a zero-sum game. We also introduce a new measure, the social cost discrepancy, defined as the ratio of the costs between the worst and the best Nash equilibria. We show that the social cost discrepancy in our game is Omega(sqrt(n/k)) and O(sqrt(kn)), where n is the number of vertices and k the number of players.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 12:12:17 GMT" }, { "version": "v2", "created": "Fri, 13 Apr 2007 14:11:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Durr", "Christoph", "" ], [ "Thang", "Nguyen Kim", "" ] ]
cs/0702055
Alexander Paraskevov
A.V. Paraskevov
On the possibility of making the complete computer model of a human brain
null
null
null
null
cs.NE
null
The development of the algorithm of a neural network building by the corresponding parts of a DNA code is discussed.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 13:16:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Paraskevov", "A. V.", "" ] ]
cs/0702056
Hanene Mohamed
Hanene Mohamed (INRIA Rocquencourt)
A probabilistic analysis of a leader election algorithm
null
Fourth Colloquium on Mathematics and Computer Science Algorithms, Trees, Combinatorics and Probabilities (2006) 225-236
null
null
cs.DS
null
A {\em leader election} algorithm is an elimination process that divides recursively into tow subgroups an initial group of n items, eliminates one subgroup and continues the procedure until a subgroup is of size 1. In this paper the biased case is analyzed. We are interested in the {\em cost} of the algorithm, i.e. the number of operations needed until the algorithm stops. Using a probabilistic approach, the asymptotic behavior of the algorithm is shown to be related to the behavior of a hitting time of two random sequences on [0,1].
[ { "version": "v1", "created": "Fri, 9 Feb 2007 15:16:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohamed", "Hanene", "", "INRIA Rocquencourt" ] ]
cs/0702058
Kia Kai Li
Kia Kai Li
Exploring k-Colorability
null
null
null
null
cs.CC
null
An introductory paper to the graph k-colorability problem.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 23:07:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Kia Kai", "" ] ]
cs/0702067
Fionn Murtagh
Fionn Murtagh
The Haar Wavelet Transform of a Dendrogram: Additional Notes
37 pp, 1 fig. Supplementary material to "The Haar Wavelet Transform of a Dendrogram", http://arxiv.org/abs/cs.IR/0608107
null
null
null
cs.IR
null
We consider the wavelet transform of a finite, rooted, node-ranked, $p$-way tree, focusing on the case of binary ($p = 2$) trees. We study a Haar wavelet transform on this tree. Wavelet transforms allow for multiresolution analysis through translation and dilation of a wavelet function. We explore how this works in our tree context.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 21:26:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Murtagh", "Fionn", "" ] ]
cs/0702074
Xavier P\'erez-Gim\'enez
Josep Diaz, Dieter Mitsche, Xavier Perez
Dynamic Random Geometric Graphs
null
null
null
null
cs.DM
null
In this work we introduce Dynamic Random Geometric Graphs as a basic rough model for mobile wireless sensor networks, where communication distances are set to the known threshold for connectivity of static random geometric graphs. We provide precise asymptotic results for the expected length of the connectivity and disconnectivity periods of the network. We believe the formal tools developed in this work could be of use in future studies in more concrete settings. In addition, for static random geometric graphs at the threshold for connectivity, we provide asymptotic expressions on the probability of existence of components according to their sizes.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 09:00:34 GMT" }, { "version": "v2", "created": "Fri, 20 Apr 2007 09:15:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaz", "Josep", "" ], [ "Mitsche", "Dieter", "" ], [ "Perez", "Xavier", "" ] ]
cs/0702075
Maurice H. T. Ling
Maurice HT Ling
Firebird Database Backup by Serialized Database Table Dump
5 pages
Ling, Maurice HT. 2007. Firebird Database Backup by Serialized Database Table Dump. The Python Papers 2 (1): 10-14
null
null
cs.DB
null
This paper presents a simple data dump and load utility for Firebird databases which mimics mysqldump in MySQL. This utility, fb_dump and fb_load, for dumping and loading respectively, retrieves each database table using kinterbasdb and serializes the data using marshal module. This utility has two advantages over the standard Firebird database backup utility, gbak. Firstly, it is able to backup and restore single database tables which might help to recover corrupted databases. Secondly, the output is in text-coded format (from marshal module) making it more resilient than a compressed text backup, as in the case of using gbak.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 11:13:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Ling", "Maurice HT", "" ] ]
cs/0702078
Reid Andersen
Reid Andersen
A Local Algorithm for Finding Dense Subgraphs
14 pages, no figures
null
null
null
cs.DS cs.CC
null
We present a local algorithm for finding dense subgraphs of bipartite graphs, according to the definition of density proposed by Kannan and Vinay. Our algorithm takes as input a bipartite graph with a specified starting vertex, and attempts to find a dense subgraph near that vertex. We prove that for any subgraph S with k vertices and density theta, there are a significant number of starting vertices within S for which our algorithm produces a subgraph S' with density theta / O(log n) on at most O(D k^2) vertices, where D is the maximum degree. The running time of the algorithm is O(D k^2), independent of the number of vertices in the graph.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 23:41:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Andersen", "Reid", "" ] ]
cs/0702081
Rick Dale
Rick Dale
Random Sentences from a Generalized Phrase-Structure Grammar Interpreter
Brief paper with source code and examples
null
null
null
cs.CL
null
In numerous domains in cognitive science it is often useful to have a source for randomly generated corpora. These corpora may serve as a foundation for artificial stimuli in a learning experiment (e.g., Ellefson & Christiansen, 2000), or as input into computational models (e.g., Christiansen & Dale, 2001). The following compact and general C program interprets a phrase-structure grammar specified in a text file. It follows parameters set at a Unix or Unix-based command-line and generates a corpus of random sentences from that grammar.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 06:05:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Dale", "Rick", "" ] ]
cs/0702083
Serebrenik Alexander
Alexander Serebrenik, Tom Schrijvers, Bart Demoen
Improving Prolog programs: Refactoring for Prolog
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
2006-1
cs.SE
null
Refactoring is an established technique from the object-oriented (OO) programming community to restructure code: it aims at improving software readability, maintainability and extensibility. Although refactoring is not tied to the OO-paradigm in particular, its ideas have not been applied to Logic Programming until now. This paper applies the ideas of refactoring to Prolog programs. A catalogue is presented listing refactorings classified according to scope. Some of the refactorings have been adapted from the OO-paradigm, while others have been specifically designed for Prolog. The discrepancy between intended and operational semantics in Prolog is also addressed by some of the refactorings. In addition, ViPReSS, a semi-automatic refactoring browser, is discussed and the experience with applying ViPReSS to a large Prolog legacy system is reported. The main conclusion is that refactoring is both a viable technique in Prolog and a rather desirable one.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 09:53:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Serebrenik", "Alexander", "" ], [ "Schrijvers", "Tom", "" ], [ "Demoen", "Bart", "" ] ]
cs/0702085
Vincenzo Nicosia
V. Carchiolo, M. Malgeri, G. Mangioni and V. Nicosia
Social Behaviours Applied to P2P Systems: An efficient Algorithm for Resource Organisation
5 Pages; 8 Figures; Presented at COPS 2006 -- WETICE -- Manchester (UK)
15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2006. WETICE '06. June 2006 Page(s):65 - 72
null
null
cs.DC cs.IR
null
P2P systems are a great solution to the problem of distributing resources. The main issue of P2P networks is that searching and retrieving resources shared by peers is usually expensive and does not take into account similarities among peers. In this paper we present preliminary simulations of PROSA, a novel algorithm for P2P network structuring, inspired by social behaviours. Peers in PROSA self--organise in social groups of similar peers, called ``semantic--groups'', depending on the resources they are sharing. Such a network smoothly evolves to a small--world graph, where queries for resources are efficiently and effectively routed.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 11:53:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Carchiolo", "V.", "" ], [ "Malgeri", "M.", "" ], [ "Mangioni", "G.", "" ], [ "Nicosia", "V.", "" ] ]
cs/0702086
Andreas U. Schmidt
Nicolai Kuntze and Andreas U. Schmidt
Protection of DVB Systems by Trusted Computing
Accepted contribution to the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2007, 28-29 March 2007 at the Orange County Convention Center, Orlando, FL, USA; 7 pages, 4 figures
null
null
null
cs.CR
null
We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted platform module (TPM) into the set-top-box or residential home gateway. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO), or other payment providers.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 11:58:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0702088
Shanghua Teng
Xi Chen and Shang-Hua Teng
Paths Beyond Local Search: A Nearly Tight Bound for Randomized Fixed-Point Computation
null
null
null
null
cs.GT
null
In 1983, Aldous proved that randomization can speedup local search. For example, it reduces the query complexity of local search over [1:n]^d from Theta (n^{d-1}) to O (d^{1/2}n^{d/2}). It remains open whether randomization helps fixed-point computation. Inspired by this open problem and recent advances on equilibrium computation, we have been fascinated by the following question: Is a fixed-point or an equilibrium fundamentally harder to find than a local optimum? In this paper, we give a nearly-tight bound of Omega(n)^{d-1} on the randomized query complexity for computing a fixed point of a discrete Brouwer function over [1:n]^d. Since the randomized query complexity of global optimization over [1:n]^d is Theta (n^{d}), the randomized query model over [1:n]^d strictly separates these three important search problems: Global optimization is harder than fixed-point computation, and fixed-point computation is harder than local search. Our result indeed demonstrates that randomization does not help much in fixed-point computation in the query model; the deterministic complexity of this problem is Theta (n^{d-1}).
[ { "version": "v1", "created": "Fri, 16 Feb 2007 07:32:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Xi", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0702091
raphael M. Jungers
Raphael M. Jungers and Vincent D. Blondel
Observable Graphs
15 pages, 8 figures
null
null
null
cs.MA
null
An edge-colored directed graph is \emph{observable} if an agent that moves along its edges is able to determine his position in the graph after a sufficiently long observation of the edge colors. When the agent is able to determine his position only from time to time, the graph is said to be \emph{partly observable}. Observability in graphs is desirable in situations where autonomous agents are moving on a network and one wants to localize them (or the agent wants to localize himself) with limited information. In this paper, we completely characterize observable and partly observable graphs and show how these concepts relate to observable discrete event systems and to local automata. Based on these characterizations, we provide polynomial time algorithms to decide observability, to decide partial observability, and to compute the minimal number of observations necessary for finding the position of an agent. In particular we prove that in the worst case this minimal number of observations increases quadratically with the number of nodes in the graph. From this it follows that it may be necessary for an agent to pass through the same node several times before he is finally able to determine his position in the graph. We then consider the more difficult question of assigning colors to a graph so as to make it observable and we prove that two different versions of this problem are NP-complete.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 16:16:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Jungers", "Raphael M.", "" ], [ "Blondel", "Vincent D.", "" ] ]
cs/0702094
Marko Horvat B.Sc.CS-Dipl.Ing.
Darko Fuduric, Marko Horvat and Mario Zagar
Authentication via wireless networks
5 pages, 6 figures, 1 table, MIPRO Conference in Opatija, Croatia, 2006
MIPRO, 2006
null
null
cs.OH
null
Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of magnetic or optical token is required. But by using novel technologies like mobile computing and wireless networking, it is possible to avoid carrying multitude of ID cards or remembering a number of PIN codes. Article shows how to efficiently authenticate users via Personal Area Networks (PAN) like Bluetooth or IrDA using commonplace AES (Rijndel) or MD5 encryption. This method can be implemented on many types of mobile devices like Pocket PC PDA with Windows CE (Windows Mobile 2003) real-time operating system, or any other customized OS, so we will explain all components and key features of such basic system.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 16:46:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Fuduric", "Darko", "" ], [ "Horvat", "Marko", "" ], [ "Zagar", "Mario", "" ] ]
cs/0702095
Ayan Mahalanobis
Ayan Mahalanobis
A note on using finite non-abelian $p$-groups in the MOR cryptosystem
null
null
null
null
cs.CR math.GR
null
The MOR cryptosystem is a natural generalization of the El-Gamal cryptosystem to non-abelian groups. Using a $p$-group, a cryptosystem was built by this author in 'A simple generalization of El-Gamal cryptosystem to non-abelian groups'. It seems reasonable to assume the cryptosystem is as secure as the El-Gamal cryptosystem over finite fields. A natural question arises can one make a better cryptosystem using $p$-groups? In this paper we show that the answer is no.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 19:04:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Mahalanobis", "Ayan", "" ] ]
cs/0702096
David Iclanzan Mr
David Iclanzan, Dan Dumitrescu
Overcoming Hierarchical Difficulty by Hill-Climbing the Building Block Structure
submited to GECCO 2007 (jan 31)
null
null
null
cs.NE cs.AI
null
The Building Block Hypothesis suggests that Genetic Algorithms (GAs) are well-suited for hierarchical problems, where efficient solving requires proper problem decomposition and assembly of solution from sub-solution with strong non-linear interdependencies. The paper proposes a hill-climber operating over the building block (BB) space that can efficiently address hierarchical problems. The new Building Block Hill-Climber (BBHC) uses past hill-climb experience to extract BB information and adapts its neighborhood structure accordingly. The perpetual adaptation of the neighborhood structure allows the method to climb the hierarchical structure solving successively the hierarchical levels. It is expected that for fully non deceptive hierarchical BB structures the BBHC can solve hierarchical problems in linearithmic time. Empirical results confirm that the proposed method scales almost linearly with the problem size thus clearly outperforms population based recombinative methods.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 21:47:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Iclanzan", "David", "" ], [ "Dumitrescu", "Dan", "" ] ]
cs/0702098
Jari Salo
Jari Salo
A Sum-Product Model as a Physical Basis for Shadow Fading
23 pages, 9 figs. To be revised and maybe submitted
null
null
null
cs.OH
null
Shadow fading (slow fading) effects play a central role in mobile communication system design and analysis. Experimental evidence indicates that shadow fading exhibits log-normal power distribution almost universally, and yet it is still not well understood what causes this. In this paper, we propose a versatile sum-product signal model as a physical basis for shadow fading. Simulation results imply that the proposed model results in log-normally distributed local mean power regardless of the distributions of the interactions in the radio channel, and hence it is capable of explaining the log-normality in a wide variety of propagation scenarios. The sum-product model also includes as its special cases the conventional product model as well as the recently proposed sum model, and improves upon these by: a) being applicable in both global and local distance scales; b) being more plausible from physical point of view; c) providing better goodness-of-fit to log-normal distribution than either of these models.
[ { "version": "v1", "created": "Sun, 18 Feb 2007 21:54:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Salo", "Jari", "" ] ]
cs/0702106
Charles Robert
Charles Robert (LORIA), Ranmi Adigun (YABATECH)
Wild, Wild Wikis: A way forward
null
Dans The Fifth International Conference on Creating, Connecting and Collaborating through Computing, C5 2007 (2007)
null
null
cs.IR
null
Wikis can be considered as public domain knowledge sharing system. They provide opportunity for those who may not have the privilege to publish their thoughts through the traditional methods. They are one of the fastest growing systems of online encyclopaedia. In this study, we consider the importance of wikis as a way of creating, sharing and improving public knowledge. We identify some of the problems associated with wikis to include, (a) identification of the identities of information and its creator (b) accuracy of information (c) justification of the credibility of authors (d) vandalism of quality of information (e) weak control over the contents. A solution to some of these problems is sought through the use of an annotation model. The model assumes that contributions in wikis can be seen as annotation to the initial document. It proposed a systematic control of contributors and contributions to the initiative and the keeping of records of what existed and what was done to initial documents. We believe that with this model, analysis can be done on the progress of wiki initiatives. We assumed that using this model, wikis can be better used for creation and sharing of knowledge for public use.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 15:12:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Charles", "", "LORIA" ], [ "Adigun", "Ranmi", "", "YABATECH" ] ]
cs/0702107
Charles Robert
Charles A. Robert (LORIA)
AMIEDoT: An annotation model for document tracking and recommendation service
null
Dans International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, (CIS2E 06) (2007)
null
null
cs.IR
null
The primary objective of document annotation in whatever form, manual or electronic is to allow those who may not have control to original document to provide personal view on information source. Beyond providing personal assessment to original information sources, we are looking at a situation where annotation made can be used as additional source of information for document tracking and recommendation service. Most of the annotation tools existing today were conceived for their independent use with no reference to the creator of the annotation. We propose AMIEDoT (Annotation Model for Information Exchange and Document Tracking) an annotation model that can assist in document tracking and recommendation service. The model is based on three parameters in the acts of annotation. We believe that introducing document parameters, time and the parameters of the creator of annotation into an annotation process can be a dependable source to know, who used a document, when a document was used and for what a document was used for. Beyond document tracking, our model can be used in not only for selective dissemination of information but for recommendation services. AMIEDoT can also be used for information sharing and information reuse.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 15:18:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Charles A.", "", "LORIA" ] ]
cs/0702109
Charles Robert
Charles A. Robert (LORIA), David Amos (LORIA)
AMIE: An annotation model for information research
null
Dans International Conference on Computers in Education, (2006)
null
null
cs.IR
null
The objective of most users for consulting any information database, information warehouse or the internet is to resolve one problem or the other. Available online or offline annotation tools were not conceived with the objective of assisting users in their bid to resolve a decisional problem. Apart from the objective and usage of annotation tools, how these tools are conceived and classified has implication on their usage. Several criteria have been used to categorize annotation concepts. Typically annotation are conceived based on how it affect the organization of document been considered for annotation or the organization of the resulting annotation. Our approach is annotation that will assist in information research for decision making. Annotation model for information exchange (AMIE) was conceived with the objective of information sharing and reuse.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 15:26:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Charles A.", "", "LORIA" ], [ "Amos", "David", "", "LORIA" ] ]
cs/0702110
Saltuk Aksahin
Saltuk Aksahin
Security Implications of Converged Networks and Protecting Them, without Compromising Efficiency
64 pages
null
null
null
cs.NI
null
This dissertation has extensively looked into all aspects of VoIP commu-nications technology, and information presented in preceding chapters, which build up a solid framework to discuss the conceptual design model, and investigate features that could be incorporated for actual Pro-jects, with parameters that are tested on field values. The dissertation follows a five-course model, for answering different questions, both tech-nical and businesslike, around central issues, that have been crucial to explanation of the topic; starting with a general overview of VoIP tech-nology, analyzing current VoIP encryption methods, identifying security threats, designing a robust VoIP system based on particulars discussed in preceding chapters, and finally, a VoIP simulation.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 20:51:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Aksahin", "Saltuk", "" ] ]
cs/0702114
David Pritchard
David Pritchard
Nearest Neighbor Network Traversal
null
null
null
null
cs.DC
null
A mobile agent in a network wants to visit every node of an n-node network, using a small number of steps. We investigate the performance of the following ``nearest neighbor'' heuristic: always go to the nearest unvisited node. If the network graph never changes, then from (Rosenkrantz, Stearns and Lewis, 1977) and (Hurkens and Woeginger, 2004) it follows that Theta(n log n) steps are necessary and sufficient in the worst case. We give a simpler proof of the upper bound and an example that improves the best known lower bound. We investigate how the performance of this heuristic changes when it is distributively implemented in a network. Even if network edges are allow to fail over time, we show that the nearest neighbor strategy never runs for more than O(n^2) iterations. We also show that any strategy can be forced to take at least n(n-1)/2 steps before all nodes are visited, if the edges of the network are deleted in an adversarial way.
[ { "version": "v1", "created": "Tue, 20 Feb 2007 03:54:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritchard", "David", "" ] ]
cs/0702117
Mathieu Couture
Prosenjit Bose and Paz Carmi and Mathieu Couture and Michiel Smid and Daming Xu
On a family of strong geometric spanners that admit local routing strategies
null
null
null
null
cs.CG
null
We introduce a family of directed geometric graphs, denoted $\paz$, that depend on two parameters $\lambda$ and $\theta$. For $0\leq \theta<\frac{\pi}{2}$ and ${1/2} < \lambda < 1$, the $\paz$ graph is a strong $t$-spanner, with $t=\frac{1}{(1-\lambda)\cos\theta}$. The out-degree of a node in the $\paz$ graph is at most $\lfloor2\pi/\min(\theta, \arccos\frac{1}{2\lambda})\rfloor$. Moreover, we show that routing can be achieved locally on $\paz$. Next, we show that all strong $t$-spanners are also $t$-spanners of the unit disk graph. Simulations for various values of the parameters $\lambda$ and $\theta$ indicate that for random point sets, the spanning ratio of $\paz$ is better than the proven theoretical bounds.
[ { "version": "v1", "created": "Tue, 20 Feb 2007 20:54:16 GMT" }, { "version": "v2", "created": "Wed, 21 Feb 2007 14:57:44 GMT" }, { "version": "v3", "created": "Thu, 22 Feb 2007 21:17:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "Carmi", "Paz", "" ], [ "Couture", "Mathieu", "" ], [ "Smid", "Michiel", "" ], [ "Xu", "Daming", "" ] ]
cs/0702123
Slavcho Shtrakov
Slavcho Shtrakov and Vladimir Shtrakov
Tree automata and separable sets of input variables
8 pages, 2 figures
J. FILOMAT, v. 15, 2001, University of Nis, 61-71 p., ISSN 0354-5180 (http://www.pmf.ni.ac.yu/sajt/publikacije/filomat_15.html)
null
null
cs.CC cs.DM
null
We consider the computational complexity of tree transducers, depending on their separable sets of input variables.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 15:16:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Slavcho", "" ], [ "Shtrakov", "Vladimir", "" ] ]
cs/0702125
Philipp Pluch
Philipp Pluch, Samo Wakounig
Bayesian Network Tomography and Inference
null
null
null
null
cs.NI
null
The aim of this technical report is to give a short overview of known techniques for network tomography (introduced in the paper of Vardi (1996)), extended by a Bayesian approach originating Tebaldi and West (1998). Since the studies of A.K. Erlang (1878-1929) on telephone networks in the last millennium, lots of needs are seen in todays applications of networks and network tomography, so for instance networks are a critical component of the information structure supporting finance, commerce and even civil and national defence. An attack on a network can be performed as an intrusion in the network or as sending a lot of fault information and disturbing the network flow. Such attacks can be detected by modelling the traffic flows in a network, by counting the source destination packets and even by measuring counts over time and by drawing a comparison with this 'time series' for instance.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 09:43:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Pluch", "Philipp", "" ], [ "Wakounig", "Samo", "" ] ]
cs/0702126
Vincenzo Nicosia
V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri
Efficient Searching and Retrieval of Documents in PROSA
12 pages, 3 figures
null
null
null
cs.DC cs.IR
null
Retrieving resources in a distributed environment is more difficult than finding data in centralised databases. In the last decade P2P system arise as new and effective distributed architectures for resource sharing, but searching in such environments could be difficult and time-consuming. In this paper we discuss efficiency of resource discovery in PROSA, a self-organising P2P system heavily inspired by social networks. All routing choices in PROSA are made locally, looking only at the relevance of the next peer to each query. We show that PROSA is able to effectively answer queries for rare documents, forwarding them through the most convenient path to nodes that much probably share matching resources. This result is heavily related to the small-world structure that naturally emerges in PROSA.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 10:22:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Nicosia", "V.", "" ], [ "Mangioni", "G.", "" ], [ "Carchiolo", "V.", "" ], [ "Malgeri", "M.", "" ] ]
cs/0702127
Vincenzo Nicosia
V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri
Exploiting social networks dynamics for P2P resource organisation
9 pages, 4 figures
Lecture Notes on Computer Science (LNCS) 4263 (2006)
null
null
cs.DC cs.IR
null
In this paper we present a formal description of PROSA, a P2P resource management system heavily inspired by social networks. Social networks have been deeply studied in the last two decades in order to understand how communities of people arise and grow. It is a widely known result that networks of social relationships usually evolves to small-worlds, i.e. networks where nodes are strongly connected to neighbours and separated from all other nodes by a small amount of hops. This work shows that algorithms implemented into PROSA allow to obtain an efficient small-world P2P network.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 10:35:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Nicosia", "V.", "" ], [ "Mangioni", "G.", "" ], [ "Carchiolo", "V.", "" ], [ "Malgeri", "M.", "" ] ]
cs/0702128
Huang Xiangao
Xiangao Huang and Wei Huang and Xiaozhou Liu and Chao Wang and Zhu jing Wang and Tao Wang
Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity
6 pages, 1 figure
null
null
null
cs.CR
null
In this letter we assert that we have reconstructed the nonlinear filter function of LILI-128 stream cipher on IBM notebook PC using MATLAB. Our reconstruction need approximately 2^12~2^13 and the attack consumes 5825.016 sec (using tic and toc sentences of MATLAB) or 5825.016/3600=1.6181hours. We got the expression of the nonlinear filter function fd of Lili-128 which has 46 items from liner items to nonlinear items based on complexity, the phase space reconstruction, Clustering and nonlinear prediction. We have verified our reconstruction result correctness by simulating the overview of Lili-128 keystream generators using our getting fd and implement designers reference module of the Lili-128 stream cipher, and two methods produce the same synchronous keystream sequence on same initial state, so that our research work proves that the nonlinear filter function of LILI-128 stream cipher is successfully reconstructed.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 14:03:51 GMT" }, { "version": "v2", "created": "Thu, 19 Apr 2007 01:53:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Xiangao", "" ], [ "Huang", "Wei", "" ], [ "Liu", "Xiaozhou", "" ], [ "Wang", "Chao", "" ], [ "Wang", "Zhu jing", "" ], [ "Wang", "Tao", "" ] ]
cs/0702129
Slavcho Shtrakov
Slavcho Shtrakov
Tree Automata and Essential Input Variables
10 pages, 2 figures, 60th Workshop on General Algebra, June 22-25, 2000, TU Dresden
J. Contributions to General Algebra, v.13, Verlag Johannes Heyn, Klagenfurt, 2001, 309-319 p
null
null
cs.CC cs.DM
null
We introduce and study the essential inputs (variables) for terms (trees) and tree automata.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 15:12:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Slavcho", "" ] ]
cs/0702131
Jason Reese
Graham B. Macpherson and Jason M. Reese
AICA: a New Pair Force Evaluation Method for Parallel Molecular Dynamics in Arbitrary Geometries
null
null
null
null
cs.CE cs.DC
null
A new algorithm for calculating intermolecular pair forces in Molecular Dynamics (MD) simulations on a distributed parallel computer is presented. The Arbitrary Interacting Cells Algorithm (AICA) is designed to operate on geometrical domains defined by an unstructured, arbitrary polyhedral mesh, which has been spatially decomposed into irregular portions for parallelisation. It is intended for nano scale fluid mechanics simulation by MD in complex geometries, and to provide the MD component of a hybrid MD/continuum simulation. AICA has been implemented in the open-source computational toolbox OpenFOAM, and verified against a published MD code.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 17:27:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Macpherson", "Graham B.", "" ], [ "Reese", "Jason M.", "" ] ]
cs/0702133
Vadim Yatsenko
Vadim Yatsenko
Fast Exact Method for Solving the Travelling Salesman Problem
4 pages, 4 figures
null
null
null
cs.CC
null
This paper describes TSP exact solution of polynomial complexity. It is considered properties of proposed method. Effectiveness of proposed solution is illustrated by outcomes of computer modeling.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 02:39:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Yatsenko", "Vadim", "" ] ]
cs/0702136
Slavcho Shtrakov
Ivo Damyanov and Slavcho Shtrakov
Essential Inputs and Minimal Tree Automata
7 pages, 1 figure, Sixth International Conference on Discrete Mathematics and Applications, 31.08-02.09.2001, Bansko
Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 77-85 p
null
null
cs.CC cs.DM
null
We continue studying essential inputs of trees and automata. Strongly essential inputs of trees are introduced and studied. Various examples for application in Computer Science are shown.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 12:48:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Damyanov", "Ivo", "" ], [ "Shtrakov", "Slavcho", "" ] ]
cs/0702137
Slavcho Shtrakov
Slavcho Shtrakov
Tree Automata and Essential Subtrees
9 pages, 2 figures, Sixth International Conference on Discrete Mathematics and Applications, Bansko, 2001
Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 51-60 p
null
null
cs.CC cs.DM
null
We introduce essential subtrees for terms (trees) and tree automata . There are some results concerning independent sets of subtrees and separable sets for a tree and an automaton.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 13:20:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Slavcho", "" ] ]
cs/0702139
Alexander Kholosha
Tor Helleseth and Alexander Kholosha and Geir Jarle Ness
Characterization of $m$-Sequences of Lengths $2^{2k}-1$ and $2^k-1$ with Three-Valued Crosscorrelation
23 pages
null
null
null
cs.CR cs.DM
null
Considered is the distribution of the crosscorrelation between $m$-sequences of length $2^m-1$, where $m=2k$, and $m$-sequences of shorter length $2^k-1$. New pairs of $m$-sequences with three-valued crosscorrelation are found and the complete correlation distribution is determined. Finally, we conjecture that there are no more cases with a three-valued crosscorrelation apart from the ones proven here.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 16:01:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Helleseth", "Tor", "" ], [ "Kholosha", "Alexander", "" ], [ "Ness", "Geir Jarle", "" ] ]
cs/0702140
Bernardo Huberman
Dennis M. Wilkinson and Bernardo A. Huberman
Assessing the Value of Coooperation in Wikipedia
null
null
null
null
cs.DL cs.CY physics.soc-ph
null
Since its inception six years ago, the online encyclopedia Wikipedia has accumulated 6.40 million articles and 250 million edits, contributed in a predominantly undirected and haphazard fashion by 5.77 million unvetted volunteers. Despite the apparent lack of order, the 50 million edits by 4.8 million contributors to the 1.5 million articles in the English-language Wikipedia follow strong certain overall regularities. We show that the accretion of edits to an article is described by a simple stochastic mechanism, resulting in a heavy tail of highly visible articles with a large number of edits. We also demonstrate a crucial correlation between article quality and number of edits, which validates Wikipedia as a successful collaborative effort.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 17:59:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Wilkinson", "Dennis M.", "" ], [ "Huberman", "Bernardo A.", "" ] ]
cs/0702141
Tanya Crenshaw
Tanya L. Crenshaw and Erin Wolf Chambers and Heather Metcalf and Umesh Thakkar
Recruitment, Preparation, Retention: A case study of computing culture at the University of Illinois at Urbana-Champaign
37 pages, 13 figures. For better quality figures, please download the .pdf from http://www.cs.uiuc.edu/research/techreports.php?report=UIUCDCS-R-2007-2811
null
null
UIUCDCS-R-2007-2811
cs.GL
null
Computer science is seeing a decline in enrollment at all levels of education, including undergraduate and graduate study. This paper reports on the results of a study conducted at the University of Illinois at Urbana-Champaign which evaluated students attitudes regarding three areas which can contribute to improved enrollment in the Department of Computer Science: Recruitment, preparation and retention. The results of our study saw two themes. First, the department's tight research focus appears to draw significant attention from other activities -- such as teaching, service, and other community-building activities -- that are necessary for a department's excellence. Yet, as demonstrated by our second theme, one partial solution is to better promote such activities already employed by the department to its students and faculty. Based on our results, we make recommendations for improvements and enhancements based on the current state of practice at peer institutions.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 00:34:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Crenshaw", "Tanya L.", "" ], [ "Chambers", "Erin Wolf", "" ], [ "Metcalf", "Heather", "" ], [ "Thakkar", "Umesh", "" ] ]
cs/0702142
Daniel Lemire
Daniel Lemire, Martin Brooks, Yuhong Yan
An Optimal Linear Time Algorithm for Quasi-Monotonic Segmentation
Appeared in ICDM 2005
null
null
null
cs.DS cs.DB
null
Monotonicity is a simple yet significant qualitative characteristic. We consider the problem of segmenting an array in up to K segments. We want segments to be as monotonic as possible and to alternate signs. We propose a quality metric for this problem, present an optimal linear time algorithm based on novel formalism, and compare experimentally its performance to a linear time top-down regression algorithm. We show that our algorithm is faster and more accurate. Applications include pattern recognition and qualitative modeling.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 02:29:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Lemire", "Daniel", "" ], [ "Brooks", "Martin", "" ], [ "Yan", "Yuhong", "" ] ]
cs/0702145
Srikumar Venugopal
Srikumar Venugopal, Krishna Nadiminti, Hussein Gibbins and Rajkumar Buyya
Designing a Resource Broker for Heterogeneous Grids
26 pages, 15 figures
null
null
GRIDS-TR-2007-2
cs.DC cs.SE
null
Grids provide uniform access to aggregations of heterogeneous resources and services such as computers, networks and storage owned by multiple organizations. However, such a dynamic environment poses many challenges for application composition and deployment. In this paper, we present the design of the Gridbus Grid resource broker that allows users to create applications and specify different objectives through different interfaces without having to deal with the complexity of Grid infrastructure. We present the unique requirements that motivated our design and discuss how these provide flexibility in extending the functionality of the broker to support different low-level middlewares and user interfaces. We evaluate the broker with different job profiles and Grid middleware and conclude with the lessons learnt from our development experience.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 08:35:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Venugopal", "Srikumar", "" ], [ "Nadiminti", "Krishna", "" ], [ "Gibbins", "Hussein", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0702152
Andrew Gacek
Andrew Gacek and Gopalan Nadathur
A Simplified Suspension Calculus and its Relationship to Other Explicit Substitution Calculi
38 pages
null
null
null
cs.LO
null
This paper concerns the explicit treatment of substitutions in the lambda calculus. One of its contributions is the simplification and rationalization of the suspension calculus that embodies such a treatment. The earlier version of this calculus provides a cumbersome encoding of substitution composition, an operation that is important to the efficient realization of reduction. This encoding is simplified here, resulting in a treatment that is easy to use directly in applications. The rationalization consists of the elimination of a practically inconsequential flexibility in the unravelling of substitutions that has the inadvertent side effect of losing contextual information in terms; the modified calculus now has a structure that naturally supports logical analyses, such as ones related to the assignment of types, over lambda terms. The overall calculus is shown to have pleasing theoretical properties such as a strongly terminating sub-calculus for substitution and confluence even in the presence of term meta variables that are accorded a grafting interpretation. Another contribution of the paper is the identification of a broad set of properties that are desirable for explicit substitution calculi to support and a classification of a variety of proposed systems based on these. The suspension calculus is used as a tool in this study. In particular, mappings are described between it and the other calculi towards understanding the characteristics of the latter.
[ { "version": "v1", "created": "Mon, 26 Feb 2007 02:16:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Gacek", "Andrew", "" ], [ "Nadathur", "Gopalan", "" ] ]
cs/0702153
Kyle Burke
Kyle Burke and Shang-Hua Teng
Games on the Sperner Triangle
18 pages, 19 figures. Uses paithan.sty
null
null
null
cs.GT cs.CC
null
We create a new two-player game on the Sperner Triangle based on Sperner's lemma. Our game has simple rules and several desirable properties. First, the game is always certain to have a winner. Second, like many other interesting games such as Hex and Geography, we prove that deciding whether one can win our game is a PSPACE-complete problem. Third, there is an elegant balance in the game such that neither the first nor the second player always has a decisive advantage. We provide a web-based version of the game, playable at: http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other games, also based on fixed-point theorems.
[ { "version": "v1", "created": "Mon, 26 Feb 2007 05:00:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Burke", "Kyle", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0702157
Matei Ripeanu
Matei Ripeanu, Adriana Iamnitchi, Ian Foster, Anne Rogers
In Search of Simplicity: A Self-Organizing Multi-Source Multicast Overlay
null
null
null
DSL-TR-2007-02
cs.DC cs.NI cs.PF
null
Multicast communication primitives have broad utility as building blocks for distributed applications. The challenge is to create and maintain the distributed structures that support these primitives while accounting for volatile end nodes and variable network characteristics. Most solutions proposed to date rely on complex algorithms or global information, thus limiting the scale of deployments and acceptance outside the academic realm. This article introduces a low-complexity, self organizing solution for maintaining multicast trees, that we refer to as UMM (Unstructured Multi-source Multicast). UMM uses traditional distributed systems techniques: layering, soft-state, and passive data collection to adapt to the dynamics of the physical network and maintain data dissemination trees. The result is a simple, adaptive system with lower overheads than more complex alternatives. We have implemented UMM and evaluated it on a 100-node PlanetLab testbed and on up to 1024-node emulated ModelNet networks Extensive experimental evaluations demonstrate UMM's low overhead, efficient network usage compared to alternative solutions, and ability to quickly adapt to network changes and to recover from failures.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 19:42:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Ripeanu", "Matei", "" ], [ "Iamnitchi", "Adriana", "" ], [ "Foster", "Ian", "" ], [ "Rogers", "Anne", "" ] ]
cs/0702159
Fabiano C. Botelho
Fabiano C. Botelho, Rasmus Pagh, Nivio Ziviani
Perfect Hashing for Data Management Applications
12 pages
null
null
RT.DCC.002/2007
cs.DS cs.DB
null
Perfect hash functions can potentially be used to compress data in connection with a variety of data management tasks. Though there has been considerable work on how to construct good perfect hash functions, there is a gap between theory and practice among all previous methods on minimal perfect hashing. On one side, there are good theoretical results without experimentally proven practicality for large key sets. On the other side, there are the theoretically analyzed time and space usage algorithms that assume that truly random hash functions are available for free, which is an unrealistic assumption. In this paper we attempt to bridge this gap between theory and practice, using a number of techniques from the literature to obtain a novel scheme that is theoretically well-understood and at the same time achieves an order-of-magnitude increase in performance compared to previous ``practical'' methods. This improvement comes from a combination of a novel, theoretically optimal perfect hashing scheme that greatly simplifies previous methods, and the fact that our algorithm is designed to make good use of the memory hierarchy. We demonstrate the scalability of our algorithm by considering a set of over one billion URLs from the World Wide Web of average length 64, for which we construct a minimal perfect hash function on a commodity PC in a little more than 1 hour. Our scheme produces minimal perfect hash functions using slightly more than 3 bits per key. For perfect hash functions in the range $\{0,...,2n-1\}$ the space usage drops to just over 2 bits per key (i.e., one bit more than optimal for representing the key). This is significantly below of what has been achieved previously for very large values of $n$.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 20:56:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Botelho", "Fabiano C.", "" ], [ "Pagh", "Rasmus", "" ], [ "Ziviani", "Nivio", "" ] ]
cs/0702160
Fran\c{c}ois Pitt
Fran\c{c}ois Pitt
A Quantifier-Free String Theory for ALOGTIME Reasoning
147 pages, PhD thesis (completed in 2000)
null
null
null
cs.CC
null
The main contribution of this work is the definition of a quantifier-free string theory T_1 suitable for formalizing ALOGTIME reasoning. After describing L_1 -- a new, simple, algebraic characterization of the complexity class ALOGTIME based on strings instead of numbers -- the theory T_1 is defined (based on L_1), and a detailed formal development of T_1 is given. Then, theorems of T_1 are shown to translate into families of propositional tautologies that have uniform polysize Frege proofs, T_1 is shown to prove the soundness of a particular Frege system F, and F is shown to provably p-simulate any proof system whose soundness can be proved in T_1. Finally, T_1 is compared with other theories for ALOGTIME reasoning in the literature. To our knowledge, this is the first formal theory for ALOGTIME reasoning whose basic objects are strings instead of numbers, and the first quantifier-free theory formalizing ALOGTIME reasoning in which a direct proof of the soundness of some Frege system has been given (in the case of first-order theories, such a proof was first given by Arai for his theory AID). Also, the polysize Frege proofs we give for the propositional translations of theorems of T_1 are considerably simpler than those for other theories, and so is our proof of the soundness of a particular F-system in T_1. Together with the simplicity of T_1's recursion schemes, axioms, and rules these facts suggest that T_1 is one of the most natural theories available for ALOGTIME reasoning.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 02:59:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Pitt", "François", "" ] ]
cs/0702163
Roderick Melnik
Di Zhang and Roderick V.N. Melnik
First Passage Time for Multivariate Jump-diffusion Stochastic Models With Applications in Finance
Keywords: Monte-Carlo simulations, first passage time, multivariate jump-diffusion process; 10 pages, 3 figures
null
null
null
cs.CE cs.NA
null
The ``first passage-time'' (FPT) problem is an important problem with a wide range of applications in mathematics, physics, biology and finance. Mathematically, such a problem can be reduced to estimating the probability of a (stochastic) process first to reach a critical level or threshold. While in other areas of applications the FPT problem can often be solved analytically, in finance we usually have to resort to the application of numerical procedures, in particular when we deal with jump-diffusion stochastic processes (JDP). In this paper, we develop a Monte-Carlo-based methodology for the solution of the FPT problem in the context of a multivariate jump-diffusion stochastic process. The developed methodology is tested by using different parameters, the simulation results indicate that the developed methodology is much more efficient than the conventional Monte Carlo method. It is an efficient tool for further practical applications, such as the analysis of default correlation and predicting barrier options in finance.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 10:39:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Di", "" ], [ "Melnik", "Roderick V. N.", "" ] ]