id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0701137 | Stevan Harnad | Chawki Hajjem, Stevan Harnad | The Open Access Citation Advantage: Quality Advantage Or Quality Bias? | null | null | null | null | cs.IR cs.DL | null | Many studies have now reported the positive correlation between Open Access
(OA) self-archiving and citation counts ("OA Advantage," OAA). But does this
OAA occur because (QB) authors are more likely to self-selectively self-archive
articles that are more likely to be cited (self-selection "Quality Bias": QB)?
or because (QA) articles that are self-archived are more likely to be cited
("Quality Advantage": QA)? The probable answer is both. Three studies [by (i)
Kurtz and co-workers in astrophysics, (ii) Moed in condensed matter physics,
and (iii) Davis & Fromerth in mathematics] had reported the OAA to be due to QB
[plus Early Advantage, EA, from self-archiving the preprint before publication,
in (i) and (ii)] rather than QA. These three fields, however, (1) have less of
a postprint access problem than most other fields and (i) and (ii) also happen
to be among the minority of fields that (2) make heavy use of prepublication
preprints. Chawki Hajjem has now analyzed preliminary evidence based on over
100,000 articles from multiple fields, comparing self-selected self-archiving
with mandated self-archiving to estimate the contributions of QB and QA to the
OAA. Both factors contribute, and the contribution of QA is greater.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 02:19:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hajjem",
"Chawki",
""
],
[
"Harnad",
"Stevan",
""
]
]
|
cs/0701139 | Yishay Mor | Yishay Mor and Jeffrey S. Rosenschein | Time and the Prisoner's Dilemma | Proceedings of the First International Conference on Multiagent
Systems (ICMAS95), : 276-282, 1995 | null | null | null | cs.GT cs.AI | null | This paper examines the integration of computational complexity into game
theoretic models. The example focused on is the Prisoner's Dilemma, repeated
for a finite length of time. We show that a minimal bound on the players'
computational ability is sufficient to enable cooperative behavior.
In addition, a variant of the repeated Prisoner's Dilemma game is suggested,
in which players have the choice of opting out. This modification enriches the
game and suggests dominance of cooperative strategies.
Competitive analysis is suggested as a tool for investigating sub-optimal
(but computationally tractable) strategies and game theoretic models in
general. Using competitive analysis, it is shown that for bounded players, a
sub-optimal strategy might be the optimal choice, given resource limitations.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 15:23:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mor",
"Yishay",
""
],
[
"Rosenschein",
"Jeffrey S.",
""
]
]
|
cs/0701142 | Wolfgang Bein | Wolfgang Bein, Lawrence L. Larmore, R\"udiger Reischuk | Knowledge State Algorithms: Randomization with Limited Information | 17 pages, 2 figures | null | null | null | cs.DS | null | We introduce the concept of knowledge states; many well-known algorithms can
be viewed as knowledge state algorithms. The knowledge state approach can be
used to to construct competitive randomized online algorithms and study the
tradeoff between competitiveness and memory. A knowledge state simply states
conditional obligations of an adversary, by fixing a work function, and gives a
distribution for the algorithm. When a knowledge state algorithm receives a
request, it then calculates one or more "subsequent" knowledge states, together
with a probability of transition to each. The algorithm then uses randomization
to select one of those subsequents to be the new knowledge state. We apply the
method to the paging problem. We present optimally competitive algorithm for
paging for the cases where the cache sizes are k=2 and k=3. These algorithms
use only a very limited number of bookmarks.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 00:54:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bein",
"Wolfgang",
""
],
[
"Larmore",
"Lawrence L.",
""
],
[
"Reischuk",
"Rüdiger",
""
]
]
|
cs/0701144 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Trusted Ticket Systems and Applications | Accepted full research paper at IFIP sec2007, Sandton, South Africa,
14-16 May 2007 | null | null | null | cs.CR | null | Trusted Computing is a security base technology that will perhaps be
ubiquitous in a few years in personal computers and mobile devices alike.
Despite its neutrality with respect to applications, it has raised some privacy
concerns. We show that trusted computing can be applied for service access
control in a manner protecting users' privacy. We construct a ticket system --
a concept which is at the heart of Identity Management -- relying solely on the
capabilities of the trusted platform module and the standards specified by the
Trusted Computing Group. Two examples show how it can be used for pseudonymous
and protected service access.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 14:26:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
]
|
cs/0701145 | Andreas U. Schmidt | Nicolai Kuntze, Andreas U. Schmidt, and Christian Hett | Non-Repudiation in Internet Telephony | Accepted full research paper at IFIP sec2007, Sandton, South Africa,
14-16 May 2007 | null | null | null | cs.CR | null | We present a concept to achieve non-repudiation for natural language
conversations over the Internet. The method rests on chained electronic
signatures applied to pieces of packet-based, digital, voice communication. It
establishes the integrity and authenticity of the bidirectional data stream and
its temporal sequence and thus the security context of a conversation. The
concept is close to the protocols for Voice over the Internet (VoIP), provides
a high level of inherent security, and extends naturally to multilateral
non-repudiation, e.g., for conferences. Signatures over conversations can
become true declarations of will in analogy to electronically signed, digital
documents. This enables binding verbal contracts, in principle between
unacquainted speakers, and in particular without witnesses. A reference
implementation of a secure VoIP archive is exhibited.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 15:23:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
],
[
"Hett",
"Christian",
""
]
]
|
cs/0701147 | Wim Vanhoof | Michael Hanus | A Generic Analysis Environment for Curry Programs | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments | null | null | null | cs.PL | null | We present CurryBrowser, a generic analysis environment for the declarative
multi-paradigm language Curry. CurryBrowser supports browsing through the
program code of an application written in Curry, i.e., the main module and all
directly or indirectly imported modules. Each module can be shown in different
formats (e.g., source code, interface, intermediate code) and, inside each
module, various properties of functions defined in this module can be analyzed.
In order to support the integration of various program analyses, CurryBrowser
has a generic interface to connect local and global analyses implemented in
Curry. CurryBrowser is completely implemented in Curry using libraries for GUI
programming and meta-programming.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 06:55:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hanus",
"Michael",
""
]
]
|
cs/0701148 | Wim Vanhoof | Wim Vanhoof and Susana Munoz-Hernandez | Proceedings of the 16th Workshop in Logic-based Methods in Programming
Environments (WLPE2006) | null | null | null | null | cs.PL | null | This volume contains the papers presented at WLPE'06: the 16th Workshop on
Logic-based Methods in Programming Environments held on August 16, 2006 in the
Seattle Sheraton Hotel and Towers, Seattle, Washington (USA). It was organised
as a satellite workshop of ICLP'06, the 22th International Conference on Logic
Programming.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 07:03:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vanhoof",
"Wim",
""
],
[
"Munoz-Hernandez",
"Susana",
""
]
]
|
cs/0701150 | Luc Brun | Luc Brun (GREYC), Walter G. Kropatsch (PRIP) | Contains and Inside relationships within combinatorial Pyramids | 35 pages | Pattern Recognition 39 (01/04/2006) 515-526 | null | null | cs.CV | null | Irregular pyramids are made of a stack of successively reduced graphs
embedded in the plane. Such pyramids are used within the segmentation framework
to encode a hierarchy of partitions. The different graph models used within the
irregular pyramid framework encode different types of relationships between
regions. This paper compares different graph models used within the irregular
pyramid framework according to a set of relationships between regions. We also
define a new algorithm based on a pyramid of combinatorial maps which allows to
determine if one region contains the other using only local calculus.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 15:13:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brun",
"Luc",
"",
"GREYC"
],
[
"Kropatsch",
"Walter G.",
"",
"PRIP"
]
]
|
cs/0701153 | Richard Kr\'alovi\v{c} | Michal Fori\v{s}ek, Branislav Katreniak, Jana Katreniakov\'a,
Rastislav Kr\'alovi\v{c}, Richard Kr\'alovi\v{c}, Vladim\'ir Koutn\'y, Dana
Pardubsk\'a, Tom\'a\v{s} Plachetka, Branislav Rovan | Online Bandwidth Allocation | null | null | null | null | cs.DS cs.NI | null | The paper investigates a version of the resource allocation problem arising
in the wireless networking, namely in the OVSF code reallocation process. In
this setting a complete binary tree of a given height $n$ is considered,
together with a sequence of requests which have to be served in an online
manner. The requests are of two types: an insertion request requires to
allocate a complete subtree of a given height, and a deletion request frees a
given allocated subtree. In order to serve an insertion request it might be
necessary to move some already allocated subtrees to other locations in order
to free a large enough subtree. We are interested in the worst case average
number of such reallocations needed to serve a request.
It was proved in previous work that the competitive ratio of the optimal
online algorithm solving this problem is between 1.5 and O(n). We partially
answer the question about its exact value by giving an O(1)-competitive online
algorithm.
Same model has been used in the context of memory management systems, and
analyzed for the number of reallocations needed to serve a request in the worst
case. In this setting, our result is a corresponding amortized analysis.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 11:52:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Forišek",
"Michal",
""
],
[
"Katreniak",
"Branislav",
""
],
[
"Katreniaková",
"Jana",
""
],
[
"Královič",
"Rastislav",
""
],
[
"Královič",
"Richard",
""
],
[
"Koutný",
"Vladimír",
""
],
[
"Pardubská",
"Dana",
""
],
[
"Plachetka",
"Tomáš",
""
],
[
"Rovan",
"Branislav",
""
]
]
|
cs/0701155 | Jim Gray | Jim Gray, Surajit Chaudhuri, Adam Bosworth, Andrew Layman, Don
Reichart, Murali Venkatrao, Frank Pellow, Hamid Pirahesh | Data Cube: A Relational Aggregation Operator Generalizing Group-By,
Cross-Tab, and Sub-Totals | null | Data Mining and Knowledge Discovery 1(1): 29-53 (1997) | null | null | cs.DB | null | Data analysis applications typically aggregate data across many dimensions
looking for anomalies or unusual patterns. The SQL aggregate functions and the
GROUP BY operator produce zero-dimensional or one-dimensional aggregates.
Applications need the N-dimensional generalization of these operators. This
paper defines that operator, called the data cube or simply cube. The cube
operator generalizes the histogram, cross-tabulation, roll-up, drill-down, and
sub-total constructs found in most report writers. The novelty is that cubes
are relations. Consequently, the cube operator can be imbedded in more complex
non-procedural data analysis programs. The cube operator treats each of the N
aggregation attributes as a dimension of N-space. The aggregate of a particular
set of attribute values is a point in this space. The set of points forms an
N-dimensional cube. Super-aggregates are computed by aggregating the N-cube to
lower dimensional spaces. This paper (1) explains the cube and roll-up
operators, (2) shows how they fit in SQL, (3) explains how users can define new
aggregate functions for cubes, and (4) discusses efficient techniques to
compute the cube. Many of these features are being added to the SQL Standard.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:39:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Chaudhuri",
"Surajit",
""
],
[
"Bosworth",
"Adam",
""
],
[
"Layman",
"Andrew",
""
],
[
"Reichart",
"Don",
""
],
[
"Venkatrao",
"Murali",
""
],
[
"Pellow",
"Frank",
""
],
[
"Pirahesh",
"Hamid",
""
]
]
|
cs/0701156 | Jim Gray | Jim Gray | Data Management: Past, Present, and Future | null | IEEE Computer 29(10): 38-46 (1996) | null | MSR-TR-96-18 | cs.DB | null | Soon most information will be available at your fingertips, anytime,
anywhere. Rapid advances in storage, communications, and processing allow us
move all information into Cyberspace. Software to define, search, and visualize
online information is also a key to creating and accessing online information.
This article traces the evolution of data management systems and outlines
current trends. Data management systems began by automating traditional tasks:
recording transactions in business, science, and commerce. This data consisted
primarily of numbers and character strings. Today these systems provide the
infrastructure for much of our society, allowing fast, reliable, secure, and
automatic access to data distributed throughout the world. Increasingly these
systems automatically design and manage access to the data. The next steps are
to automate access to richer forms of data: images, sound, video, maps, and
other media. A second major challenge is automatically summarizing and
abstracting data in anticipation of user requests. These multi-media databases
and tools to access them will be a cornerstone of our move to Cyberspace.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:42:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
]
|
cs/0701157 | Jim Gray | Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O'Neil,
Patrick O'Neil | A Critique of ANSI SQL Isolation Levels | null | Proc. ACM SIGMOD 95, pp. 1-10, San Jose CA, June 1995 | null | MSR-TR-95-51 | cs.DB | null | ANSI SQL-92 defines Isolation Levels in terms of phenomena: Dirty Reads,
Non-Repeatable Reads, and Phantoms. This paper shows that these phenomena and
the ANSI SQL definitions fail to characterize several popular isolation levels,
including the standard locking implementations of the levels. Investigating the
ambiguities of the phenomena leads to clearer definitions; in addition new
phenomena that better characterize isolation types are introduced. An important
multiversion isolation type, Snapshot Isolation, is defined.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:53:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Berenson",
"Hal",
""
],
[
"Bernstein",
"Phil",
""
],
[
"Gray",
"Jim",
""
],
[
"Melton",
"Jim",
""
],
[
"O'Neil",
"Elizabeth",
""
],
[
"O'Neil",
"Patrick",
""
]
]
|
cs/0701158 | Jim Gray | Jim Gray | Queues Are Databases | null | null | null | MSR-TR-95-56 | cs.DB | null | Message-oriented-middleware (MOM) has become an small industry. MOM offers
queued transaction processing as an advance over pure client-server transaction
processing. This note makes four points: Queued transaction processing is less
general than direct transaction processing. Queued systems are built on top of
direct systems. You cannot build a direct system atop a queued system. It is
difficult to build direct, conversational, or distributed transactions atop a
queued system. Queues are interesting databases with interesting concurrency
control. It is best to build these mechanisms into a standard database system
so other applications can use these interesting features. Queue systems need
DBMS functionality. Queues need security, configuration, performance
monitoring, recovery, and reorganization utilities. Database systems already
have these features. A full-function MOM system duplicates these database
features. Queue managers are simple TP-monitors managing server pools driven by
queues. Database systems are encompassing many server pool features as they
evolve to TP-lite systems.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:56:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
]
|
cs/0701159 | Jim Gray | Gerd Heber, Jim Gray | Supporting Finite Element Analysis with a Relational Database Backend,
Part I: There is Life beyond Files | null | null | null | MSR-TR-2005-49 | cs.DB cs.CE | null | In this paper, we show how to use a Relational Database Management System in
support of Finite Element Analysis. We believe it is a new way of thinking
about data management in well-understood applications to prepare them for two
major challenges, - size and integration (globalization). Neither extreme size
nor integration (with other applications over the Web) was a design concern 30
years ago when the paradigm for FEA implementation first was formed. On the
other hand, database technology has come a long way since its inception and it
is past time to highlight its usefulness to the field of scientific computing
and computer based engineering. This series aims to widen the list of
applications for database designers and for FEA users and application
developers to reap some of the benefits of database development.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:02:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Heber",
"Gerd",
""
],
[
"Gray",
"Jim",
""
]
]
|
cs/0701160 | Jim Gray | Gerd Heber, Jim Gray | Supporting Finite Element Analysis with a Relational Database Backend,
Part II: Database Design and Access | null | null | null | MSR-TR-2006-21 | cs.DB cs.CE | null | This is Part II of a three article series on using databases for Finite
Element Analysis (FEA). It discusses (1) db design, (2) data loading, (3)
typical use cases during grid building, (4) typical use cases during simulation
(get and put), (5) typical use cases during analysis (also done in Part III)
and some performance measures of these cases. It argues that using a database
is simpler to implement than custom data schemas, has better performance
because it can use data parallelism, and better supports FEA modularity and
tool evolution because database schema evolution, data independence, and
self-defining data.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:05:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Heber",
"Gerd",
""
],
[
"Gray",
"Jim",
""
]
]
|
cs/0701161 | Jim Gray | Jim Gray, Charles Levine | Thousands of DebitCredit Transactions-Per-Second: Easy and Inexpensive | null | null | null | MSR-TR-2005-39 | cs.DB cs.PF | null | A $2k computer can execute about 8k transactions per second. This is 80x more
than one of the largest US bank's 1970's traffic - it approximates the total US
1970's financial transaction volume. Very modest modern computers can easily
solve yesterday's problems.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:51:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Levine",
"Charles",
""
]
]
|
cs/0701162 | Jim Gray | Jim Gray | A Measure of Transaction Processing 20 Years Later | This article appeared in the IEEE Data Engineering, Fall 2005 | null | null | MSR-TR-2005-57 | cs.DB cs.PF | null | This provides a retrospective of the paper "A Measure of Transaction
Processing" published in 1985. It shows that transaction processing peak
performance and price-peformance have improved about 100,000x respectively and
that sort/sequential performance has approximately doubled each year (so a
million fold improvement) even though processor performance plateaued in 1995.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:57:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
]
|
cs/0701163 | Jim Gray | Jim Gray, Alex Szalay, Gyorgy Fekete | Using Table Valued Functions in SQL Server 2005 To Implement a Spatial
Data Library | null | null | null | MSR-TR-2005-122 | cs.DB cs.CE | null | This article explains how to add spatial search functions (point-near-point
and point in polygon) to Microsoft SQL Server 2005 using C# and table-valued
functions. It is possible to use this library to add spatial search to your
application without writing any special code. The library implements the
public-domain C# Hierarchical Triangular Mesh (HTM) algorithms from Johns
Hopkins University. That C# library is connected to SQL Server 2005 via a set
of scalar-valued and table-valued functions. These functions act as a spatial
index.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:00:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
],
[
"Fekete",
"Gyorgy",
""
]
]
|
cs/0701164 | Jim Gray | Alexander S. Szalay, Jim Gray, George Fekete, Peter Z. Kunszt, Peter
Kukol, Ani Thakar | Indexing the Sphere with the Hierarchical Triangular Mesh | null | null | null | MSR-TR-2005-123 | cs.DB cs.DS | null | We describe a method to subdivide the surface of a sphere into spherical
triangles of similar, but not identical, shapes and sizes. The Hierarchical
Triangular Mesh (HTM) is a quad-tree that is particularly good at supporting
searches at different resolutions, from arc seconds to hemispheres. The
subdivision scheme is universal, providing the basis for addressing and for
fast lookups. The HTM provides the basis for an efficient geospatial indexing
scheme in relational databases where the data have an inherent location on
either the celestial sphere or the Earth. The HTM index is superior to
cartographical methods using coordinates with singularities at the poles. We
also describe a way to specify surface regions that efficiently represent
spherical query areas. This article presents the algorithms used to identify
the HTM triangles covering such regions.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:04:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Szalay",
"Alexander S.",
""
],
[
"Gray",
"Jim",
""
],
[
"Fekete",
"George",
""
],
[
"Kunszt",
"Peter Z.",
""
],
[
"Kukol",
"Peter",
""
],
[
"Thakar",
"Ani",
""
]
]
|
cs/0701165 | Jim Gray | Gordon Bell, Jim Gray, Alex Szalay | Petascale Computational Systems | null | null | null | null | cs.DB cs.AR | null | Computational science is changing to be data intensive. Super-Computers must
be balanced systems; not just CPU farms but also petascale IO and networking
arrays. Anyone building CyberInfrastructure should allocate resources to
support a balanced Tier-1 through Tier-3 design.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:23:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bell",
"Gordon",
""
],
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
]
]
|
cs/0701166 | Jim Gray | Jim Gray, Catharine van Ingen | Empirical Measurements of Disk Failure Rates and Error Rates | null | null | null | MSR-TR-2005-166 | cs.DB cs.AR | null | The SATA advertised bit error rate of one error in 10 terabytes is
frightening. We moved 2 PB through low-cost hardware and saw five disk read
error events, several controller failures, and many system reboots caused by
security patches. We conclude that SATA uncorrectable read errors are not yet a
dominant system-fault source - they happen, but are rare compared to other
problems. We also conclude that UER (uncorrectable error rate) is not the
relevant metric for our needs. When an uncorrectable read error happens, there
are typically several damaged storage blocks (and many uncorrectable read
errors.) Also, some uncorrectable read errors may be masked by the operating
system. The more meaningful metric for data architects is Mean Time To Data
Loss (MTTDL.)
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:29:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"van Ingen",
"Catharine",
""
]
]
|
cs/0701167 | Jim Gray | Maria A. Nieto-Santisteban, Aniruddha R. Thakar, Alexander S. Szalay,
Jim Gray | Large-Scale Query and XMatch, Entering the Parallel Zone | Astronomical Data Analysis Software and Systems XV in San Lorenzo de
El Escorial, Madrid, Spain, October 2005, to appear in the ASP Conference
Series | null | null | MSR-TR-2005- 169 | cs.DB cs.CE | null | Current and future astronomical surveys are producing catalogs with millions
and billions of objects. On-line access to such big datasets for data mining
and cross-correlation is usually as highly desired as unfeasible. Providing
these capabilities is becoming critical for the Virtual Observatory framework.
In this paper we present various performance tests that show how using
Relational Database Management Systems (RDBMS) and a Zoning algorithm to
partition and parallelize the computation, we can facilitate large-scale query
and cross-match.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:33:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nieto-Santisteban",
"Maria A.",
""
],
[
"Thakar",
"Aniruddha R.",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Gray",
"Jim",
""
]
]
|
cs/0701170 | Jim Gray | Katalin Szlavecz, Andreas Terzis, Stuart Ozer, Razvan Musaloiu-E,
Joshua Cogan, Sam Small, Randal Burns, Jim Gray, Alex Szalay | Life Under Your Feet: An End-to-End Soil Ecology Sensor Network,
Database, Web Server, and Analysis Service | null | null | null | MSR TR 2006 90 | cs.DB cs.CE | null | Wireless sensor networks can revolutionize soil ecology by providing
measurements at temporal and spatial granularities previously impossible. This
paper presents a soil monitoring system we developed and deployed at an urban
forest in Baltimore as a first step towards realizing this vision. Motes in
this network measure and save soil moisture and temperature in situ every
minute. Raw measurements are periodically retrieved by a sensor gateway and
stored in a central database where calibrated versions are derived and stored.
The measurement database is published through Web Services interfaces. In
addition, analysis tools let scientists analyze current and historical data and
help manage the sensor network. The article describes the system design, what
we learned from the deployment, and initial results obtained from the sensors.
The system measures soil factors with unprecedented temporal precision.
However, the deployment required device-level programming, sensor calibration
across space and time, and cross-referencing measurements with external
sources. The database, web server, and data analysis design required
considerable innovation and expertise. So, the ratio of computer-scientists to
ecologists was 3:1. Before sensor networks can fulfill their potential as
instruments that can be easily deployed by scientists, these technical problems
must be addressed so that the ratio is one nerd per ten ecologists.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:08:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Szlavecz",
"Katalin",
""
],
[
"Terzis",
"Andreas",
""
],
[
"Ozer",
"Stuart",
""
],
[
"Musaloiu-E",
"Razvan",
""
],
[
"Cogan",
"Joshua",
""
],
[
"Small",
"Sam",
""
],
[
"Burns",
"Randal",
""
],
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
]
]
|
cs/0701171 | Jim Gray | Jim Gray, Maria A. Nieto-Santisteban, Alexander S. Szalay | The Zones Algorithm for Finding Points-Near-a-Point or Cross-Matching
Spatial Datasets | null | null | null | MSR TR 2006 52 | cs.DB cs.DS | null | Zones index an N-dimensional Euclidian or metric space to efficiently support
points-near-a-point queries either within a dataset or between two datasets.
The approach uses relational algebra and the B-Tree mechanism found in almost
all relational database systems. Hence, the Zones Algorithm gives a
portable-relational implementation of points-near-point, spatial cross-match,
and self-match queries. This article corrects some mistakes in an earlier
article we wrote on the Zones Algorithm and describes some algorithmic
improvements. The Appendix includes an implementation of point-near-point,
self-match, and cross-match using the USGS city and stream gauge database.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:11:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Nieto-Santisteban",
"Maria A.",
""
],
[
"Szalay",
"Alexander S.",
""
]
]
|
cs/0701172 | Jim Gray | Jim Gray, Alex Szalay, Tamas Budavari, Robert Lupton, Maria
Nieto-Santisteban, Ani Thakar | Cross-Matching Multiple Spatial Observations and Dealing with Missing
Data | null | null | null | MSR TR 2006-175 | cs.DB cs.CE | null | Cross-match spatially clusters and organizes several astronomical
point-source measurements from one or more surveys. Ideally, each object would
be found in each survey. Unfortunately, the observation conditions and the
objects themselves change continually. Even some stationary objects are missing
in some observations; sometimes objects have a variable light flux and
sometimes the seeing is worse. In most cases we are faced with a substantial
number of differences in object detections between surveys and between
observations taken at different times within the same survey or instrument.
Dealing with such missing observations is a difficult problem. The first step
is to classify misses as ephemeral - when the object moved or simply
disappeared, masked - when noise hid or corrupted the object observation, or
edge - when the object was near the edge of the observational field. This
classification and a spatial library to represent and manipulate observational
footprints help construct a Match table recording both hits and misses.
Transitive closure clusters friends-of-friends into object bundles. The bundle
summary statistics are recorded in a Bundle table. This design is an evolution
of the Sloan Digital Sky Survey cross-match design that compared overlapping
observations taken at different times. Cross-Matching Multiple Spatial
Observations and Dealing with Missing Data.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:18:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
],
[
"Budavari",
"Tamas",
""
],
[
"Lupton",
"Robert",
""
],
[
"Nieto-Santisteban",
"Maria",
""
],
[
"Thakar",
"Ani",
""
]
]
|
cs/0701173 | Jim Gray | Vik Singh, Jim Gray, Ani Thakar, Alexander S. Szalay, Jordan Raddick,
Bill Boroski, Svetlana Lebedeva, Brian Yanny | SkyServer Traffic Report - The First Five Years | null | null | null | MSR TR-2006-190 | cs.DB cs.CE | null | The SkyServer is an Internet portal to the Sloan Digital Sky Survey Catalog
Archive Server. From 2001 to 2006, there were a million visitors in 3 million
sessions generating 170 million Web hits, 16 million ad-hoc SQL queries, and 62
million page views. The site currently averages 35 thousand visitors and 400
thousand sessions per month. The Web and SQL logs are public. We analyzed
traffic and sessions by duration, usage pattern, data product, and client type
(mortal or bot) over time. The analysis shows (1) the site's popularity, (2)
the educational website that delivered nearly fifty thousand hours of
interactive instruction, (3) the relative use of interactive, programmatic, and
batch-local access, (4) the success of offering ad-hoc SQL, personal database,
and batch job access to scientists as part of the data publication, (5) the
continuing interest in "old" datasets, (6) the usage of SQL constructs, and (7)
a novel approach of using the corpus of correct SQL queries to suggest similar
but correct statements when a user presents an incorrect SQL statement.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:22:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Singh",
"Vik",
""
],
[
"Gray",
"Jim",
""
],
[
"Thakar",
"Ani",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Raddick",
"Jordan",
""
],
[
"Boroski",
"Bill",
""
],
[
"Lebedeva",
"Svetlana",
""
],
[
"Yanny",
"Brian",
""
]
]
|
cs/0701175 | Dimitris Kalles | Th. Hadzilacos, D. Kalles, M. Pouliopoulou | On the Software and Knowledge Engineering Aspects of the Educational
Process | Contains 21 sparse pages, 8 figures. Accepted for publication in
International Journal of Software Engineering and Knowledge Engineering
(IJSEKE). Keywords: Tools for interactive learning and teaching, Modelling,
Distance Learning | null | null | null | cs.SE cs.DL | null | The Hellenic Open University has embarked on a large-scale effort to enhance
its textbook-based material with content that demonstrably supports the basic
tenets of distance learning. The challenge is to set up a framework that allows
for the production-level creation, distribution and consumption of content, and
at the same time, evaluate the effort in terms of technological, educational
and organizational knowledge gained. This paper presents a model of the
educational process that is used as a development backbone and argues about its
conceptual and technical practicality at large.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 14:51:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hadzilacos",
"Th.",
""
],
[
"Kalles",
"D.",
""
],
[
"Pouliopoulou",
"M.",
""
]
]
|
cs/0701176 | Alain Frisch | Alain Frisch (INRIA Rocquencourt), Haruo Hosoya (CST) | Towards Practical Typechecking for Macro Tree Transducers | null | null | null | null | cs.PL | null | Macro tree transducers (mtt) are an important model that both covers many
useful XML transformations and allows decidable exact typechecking. This paper
reports our first step toward an implementation of mtt typechecker that has a
practical efficiency. Our approach is to represent an input type obtained from
a backward inference as an alternating tree automaton, in a style similar to
Tozawa's XSLT0 typechecking. In this approach, typechecking reduces to checking
emptiness of an alternating tree automaton. We propose several optimizations
(Cartesian factorization, state partitioning) on the backward inference process
in order to produce much smaller alternating tree automata than the naive
algorithm, and we present our efficient algorithm for checking emptiness of
alternating tree automata, where we exploit the explicit representation of
alternation for local optimizations. Our preliminary experiments confirm that
our algorithm has a practical performance that can typecheck simple
transformations with respect to the full XHTML in a reasonable time.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 15:16:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Frisch",
"Alain",
"",
"INRIA Rocquencourt"
],
[
"Hosoya",
"Haruo",
"",
"CST"
]
]
|
cs/0701180 | Fionn Murtagh | F. Murtagh, J. Mothe and K. Englmeier | Ontology from Local Hierarchical Structure in Text | 35 pp., 12 figures | null | null | null | cs.IR | null | We study the notion of hierarchy in the context of visualizing textual data
and navigating text collections. A formal framework for ``hierarchy'' is given
by an ultrametric topology. This provides us with a theoretical foundation for
concept hierarchy creation. A major objective is {\em scalable} annotation or
labeling of concept maps. Serendipitously we pursue other objectives such as
deriving common word pair (and triplet) phrases, i.e., word 2- and 3-grams. We
evaluate our approach using (i) a collection of texts, (ii) a single text
subdivided into successive parts (for which we provide an interactive
demonstrator), and (iii) a text subdivided at the sentence or line level. While
detailing a generic framework, a distinguishing feature of our work is that we
focus on {\em locality} of hierarchic structure in order to extract semantic
information.
| [
{
"version": "v1",
"created": "Sat, 27 Jan 2007 18:31:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Murtagh",
"F.",
""
],
[
"Mothe",
"J.",
""
],
[
"Englmeier",
"K.",
""
]
]
|
cs/0701181 | Fionn Murtagh | Fionn Murtagh | A Note on Local Ultrametricity in Text | 18 pp | null | null | null | cs.CL | null | High dimensional, sparsely populated data spaces have been characterized in
terms of ultrametric topology. This implies that there are natural, not
necessarily unique, tree or hierarchy structures defined by the ultrametric
topology. In this note we study the extent of local ultrametric topology in
texts, with the aim of finding unique ``fingerprints'' for a text or corpus,
discriminating between texts from different domains, and opening up the
possibility of exploiting hierarchical structures in the data. We use coherent
and meaningful collections of over 1000 texts, comprising over 1.3 million
words.
| [
{
"version": "v1",
"created": "Sat, 27 Jan 2007 19:09:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Murtagh",
"Fionn",
""
]
]
|
cs/0701183 | Gilles Villard | Gilles Villard (LIP) | Certification of the QR factor R, and of lattice basis reducedness | null | null | null | Vil06-1 | cs.SC cs.NA | null | Given a lattice basis of n vectors in Z^n, we propose an algorithm using
12n^3+O(n^2) floating point operations for checking whether the basis is
LLL-reduced. If the basis is reduced then the algorithm will hopefully answer
''yes''. If the basis is not reduced, or if the precision used is not
sufficient with respect to n, and to the numerical properties of the basis, the
algorithm will answer ''failed''. Hence a positive answer is a rigorous
certificate. For implementing the certificate itself, we propose a floating
point algorithm for computing (certified) error bounds for the entries of the R
factor of the QR matrix factorization. This algorithm takes into account all
possible approximation and rounding errors. The cost 12n^3+O(n^2) of the
certificate is only six times more than the cost of numerical algorithms for
computing the QR factorization itself, and the certificate may be implemented
using matrix library routines only. We report experiments that show that for a
reduced basis of adequate dimension and quality the certificate succeeds, and
establish the effectiveness of the certificate. This effectiveness is applied
for certifying the output of fastest existing floating point heuristics of LLL
reduction, without slowing down the whole process.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2007 09:15:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Villard",
"Gilles",
"",
"LIP"
]
]
|
cs/0701188 | Gilles Villard | Wayne Eberly (UCALGARY), Mark Giesbrecht (UWO), Pascal Giorgi (LP2A),
Arne Storjohann (UWO), Gilles Villard (LIP) | Faster Inversion and Other Black Box Matrix Computations Using Efficient
Block Projections | null | null | null | EGGSV07-1 | cs.SC cs.NA | null | Block projections have been used, in [Eberly et al. 2006], to obtain an
efficient algorithm to find solutions for sparse systems of linear equations. A
bound of softO(n^(2.5)) machine operations is obtained assuming that the input
matrix can be multiplied by a vector with constant-sized entries in softO(n)
machine operations. Unfortunately, the correctness of this algorithm depends on
the existence of efficient block projections, and this has been conjectured. In
this paper we establish the correctness of the algorithm from [Eberly et al.
2006] by proving the existence of efficient block projections over sufficiently
large fields. We demonstrate the usefulness of these projections by deriving
improved bounds for the cost of several matrix problems, considering, in
particular, ``sparse'' matrices that can be be multiplied by a vector using
softO(n) field operations. We show how to compute the inverse of a sparse
matrix over a field F using an expected number of softO(n^(2.27)) operations in
F. A basis for the null space of a sparse matrix, and a certification of its
rank, are obtained at the same cost. An application to Kaltofen and Villard's
Baby-Steps/Giant-Steps algorithms for the determinant and Smith Form of an
integer matrix yields algorithms requiring softO(n^(2.66)) machine operations.
The derived algorithms are all probabilistic of the Las Vegas type.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2007 18:20:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eberly",
"Wayne",
"",
"UCALGARY"
],
[
"Giesbrecht",
"Mark",
"",
"UWO"
],
[
"Giorgi",
"Pascal",
"",
"LP2A"
],
[
"Storjohann",
"Arne",
"",
"UWO"
],
[
"Villard",
"Gilles",
"",
"LIP"
]
]
|
cs/0701190 | Aaron Harwood | Thomas Jacobs and Aaron Harwood | A Peer-to-Peer Browsable File Index using a Popularity Based Global
Namespace | null | null | null | null | cs.DC cs.NI | null | The distribution of files using decentralized, peer-to-peer (P2P) systems,
has significant advantages over centralized approaches. It is however more
difficult to settle on the best approach for file sharing. Most file sharing
systems are based on query string searches, leading to a relatively simple but
inefficient broadcast or to an efficient but relatively complicated index in a
structured environment. In this paper we use a browsable peer-to-peer file
index consisting of files which serve as directory nodes, interconnecting to
form a directory network. We implemented the system based on BitTorrent and
Kademlia. The directory network inherits all of the advantages of
decentralization and provides browsable, efficient searching. To avoid conflict
between users in the P2P system while also imposing no additional restrictions,
we allow multiple versions of each directory node to simultaneously exist --
using popularity as the basis for default browsing behavior. Users can freely
add files and directory nodes to the network. We show, using a simulation of
user behavior and file quality, that the popularity based system consistently
leads users to a high quality directory network; above the average quality of
user updates. Q
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 04:00:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jacobs",
"Thomas",
""
],
[
"Harwood",
"Aaron",
""
]
]
|
cs/0701191 | David Monniaux | David Monniaux (LIENS) | The parallel implementation of the Astr\'{e}e static analyzer | null | APLAS: Programming languages and systems (2005) 86-96 | 10.1007/11575467_7 | null | cs.PL cs.PF | null | The Astr\'{e}e static analyzer is a specialized tool that can prove the
absence of runtime errors, including arithmetic overflows, in large critical
programs. Keeping analysis times reasonable for industrial use is one of the
design objectives. In this paper, we discuss the parallel implementation of the
analysis.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 15:20:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Monniaux",
"David",
"",
"LIENS"
]
]
|
cs/0701195 | David Monniaux | David Monniaux (LIENS) | An Abstract Monte-Carlo Method for the Analysis of Probabilistic
Programs | null | POPL: Annual Symposium on Principles of Programming Languages
(2001) 93 - 101 | 10.1145/360204.360211 | null | cs.PL cs.PF | null | We introduce a new method, combination of random testing and abstract
interpretation, for the analysis of programs featuring both probabilistic and
non-probabilistic nondeterminism. After introducing "ordinary" testing, we show
how to combine testing and abstract interpretation and give formulas linking
the precision of the results to the number of iterations. We then discuss
complexity and optimization issues and end with some experimental results.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 17:14:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Monniaux",
"David",
"",
"LIENS"
]
]
|
cs/0701198 | Raissa M. D'Souza | R. M. D'Souza, C. Borgs, J. T. Chayes, N. Berger and R. D. Kleinberg | Fitting the WHOIS Internet data | Supplemental information for "Emergence of Tempered Preferential
Attachment From Optimization", to appear (open access) PNAS USA, 2007 | null | null | null | cs.NI | null | We consider the RIPE WHOIS Internet data as characterized by the Cooperative
Association for Internet Data Analysis (CAIDA), and show that the Tempered
Preferential Attachment model [1] provides an excellent fit to this data.
[1] D'Souza, Borgs, Chayes, Berger and Kleinberg, to appear PNAS USA, 2007.
| [
{
"version": "v1",
"created": "Wed, 31 Jan 2007 02:51:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"D'Souza",
"R. M.",
""
],
[
"Borgs",
"C.",
""
],
[
"Chayes",
"J. T.",
""
],
[
"Berger",
"N.",
""
],
[
"Kleinberg",
"R. D.",
""
]
]
|
cs/0701200 | Francoise Detienne | Fran\c{c}oise Detienne (INRIA) | Reasoning from a schema and from an analog in software code reuse | null | Dans Fourth Workshop on Empirical Studies of Programmers, ESP91
(1991) 5-22 | null | null | cs.SE | null | The activity of design involves the decomposition of problems into
subproblems and the development and evaluation of solutions. In many cases,
solution development is not done from scratch. Designers often evoke and adapt
solutions developed in the past. These solutions may come from an internal
source, i.e. the memory of the designers, and/or from an external source. The
goal of this paper is to analyse the characteristics of the cognitive
mechanisms, the knowledge and the representations involved in the code reuse
activity performed by experienced programmers. More generally, the focus is the
control structure of the reuse activity. Data collected in an experiment in
which programmers had to design programs are analyzed. Two code reuse
situations are distinguished depending on whether or not the processes involved
in reuse start before the elaboration of what acts as a source-solution. Our
analysis highlights the use of reasoning from a schema and from an analog in
the code reuse activity.
| [
{
"version": "v1",
"created": "Wed, 31 Jan 2007 16:41:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Detienne",
"Françoise",
"",
"INRIA"
]
]
|
cs/0702010 | Jacques Carette | Jacques Carette | A canonical form for some piecewise defined functions | submitted to ISSAC 2007 | null | null | null | cs.SC cs.MS | null | We define a canonical form for piecewise defined functions. We show that this
has a wider range of application as well as better complexity properties than
previous work.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 17:54:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Carette",
"Jacques",
""
]
]
|
cs/0702011 | Riccardo Pucella | Joseph Y. Halpern, Riccardo Pucella | Dealing With Logical Omniscience: Expressiveness and Pragmatics | 24 pages. Submitted for publication | null | null | null | cs.LO cs.AI | null | We examine four approaches for dealing with the logical omniscience problem
and their potential applicability: the syntactic approach, awareness,
algorithmic knowledge, and impossible possible worlds. Although in some
settings these approaches are equi-expressive and can capture all epistemic
states, in other settings of interest (especially with probability in the
picture), we show that they are not equi-expressive. We then consider the
pragmatics of dealing with logical omniscience-- how to choose an approach and
construct an appropriate model.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 20:06:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pucella",
"Riccardo",
""
]
]
|
cs/0702012 | Daria Sorokina | Daria Sorokina, Johannes Gehrke, Simeon Warner, Paul Ginsparg | Plagiarism Detection in arXiv | Sixth International Conference on Data Mining (ICDM'06), Dec 2006 | null | 10.1109/ICDM.2006.126 | null | cs.DB cs.DL cs.IR | null | We describe a large-scale application of methods for finding plagiarism in
research document collections. The methods are applied to a collection of
284,834 documents collected by arXiv.org over a 14 year period, covering a few
different research disciplines. The methodology efficiently detects a variety
of problematic author behaviors, and heuristics are developed to reduce the
number of false positives. The methods are also efficient enough to implement
as a real-time submission screen for a collection many times larger.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 20:52:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sorokina",
"Daria",
""
],
[
"Gehrke",
"Johannes",
""
],
[
"Warner",
"Simeon",
""
],
[
"Ginsparg",
"Paul",
""
]
]
|
cs/0702019 | Maxime Gariel | Maxime Gariel, John-Paul Clarke and Eric Feron | A Dynamic I/O Model for TRACON Traffic Management | 16 pages, 19 figures eps | null | null | null | cs.OH | null | This work investigates the TRACON flow management around a major airport.
Aircraft flows are analyzed through a study of TRACON trajectories records.
Rerouting and queuing processes are highlighted and airport characteristics are
shown as function of the number of planes in the TRACON. Then, a simple
input-output TRACON queuing and landing model is proposed. This model is
calibrated and validated using available TRACON data. It reproduces the same
phenomenon as the real system. This model is used to show the impact of
limiting the number of aircrafts in the TRACON. A limited number of aircraft
does not increase delays but reduces the controller's workload and increases
safety.
| [
{
"version": "v1",
"created": "Fri, 2 Feb 2007 22:55:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gariel",
"Maxime",
""
],
[
"Clarke",
"John-Paul",
""
],
[
"Feron",
"Eric",
""
]
]
|
cs/0702022 | Changjia Chen | Chunxi Li and Changjia Chen | Gnutella: Topology Dynamics On Phase Space | 11 pages, 14 figures | null | null | null | cs.NI | null | In this paper, the topology dynamic of Gnutella is studied through phase
space. The dynamic changes in peer degree are studied as a time series in two
dimensional phase space which is defined as the number of connected leaves and
the number of connected ultras. The reported degrees are concentrated in three
special Software related regions that we named as Ultra Stable Region, Leaf
Stable Region and Transition Belt. A method is proposed to classify degree
traces in phase space into different classes. Connection churn then is studied
along with the churn in degree. It shows that the topological structure of
Gnutella is rather stable in its connection degree but not the topology itself.
The connection drop rate is estimated and the live time of connections is
inferred afterwards. M/M/m/m loss queue system is introduced to model the
degree keeping process in Gnutella. This model revealed that the degree stable
is ensured by large new connection efforts. In other words the stable in
topological structure of Gnutella is a results of essential unstable in its
topology. That opens a challenge to the basic design philosophy of this
network.
| [
{
"version": "v1",
"created": "Sun, 4 Feb 2007 08:12:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Chunxi",
""
],
[
"Chen",
"Changjia",
""
]
]
|
cs/0702027 | Andrew Gacek | Andrew Gacek | The Suspension Calculus and its Relationship to Other Explicit
Treatments of Substitution in Lambda Calculi | 84 pages | null | null | null | cs.LO cs.PL | null | The intrinsic treatment of binding in the lambda calculus makes it an ideal
data structure for representing syntactic objects with binding such as
formulas, proofs, types, and programs. Supporting such a data structure in an
implementation is made difficult by the complexity of the substitution
operation relative to lambda terms. In this paper we present the suspension
calculus, an explicit treatment of meta level binding in the lambda calculus.
We prove properties of this calculus which make it a suitable replacement for
the lambda calculus in implementation. Finally, we compare the suspension
calculus with other explicit treatments of substitution.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 14:35:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gacek",
"Andrew",
""
]
]
|
cs/0702029 | Mikkel Thorup | Mario Szegedy and Mikkel Thorup | On the variance of subset sum estimation | 20 pages, 1 figure | null | null | null | cs.DS | null | For high volume data streams and large data warehouses, sampling is used for
efficient approximate answers to aggregate queries over selected subsets.
Mathematically, we are dealing with a set of weighted items and want to support
queries to arbitrary subset sums. With unit weights, we can compute subset
sizes which together with the previous sums provide the subset averages. The
question addressed here is which sampling scheme we should use to get the most
accurate subset sum estimates.
We present a simple theorem on the variance of subset sum estimation and use
it to prove variance optimality and near-optimality of subset sum estimation
with different known sampling schemes. This variance is measured as the average
over all subsets of any given size. By optimal we mean there is no set of input
weights for which any sampling scheme can have a better average variance. Such
powerful results can never be established experimentally. The results of this
paper are derived mathematically. For example, we show that appropriately
weighted systematic sampling is simultaneously optimal for all subset sizes.
More standard schemes such as uniform sampling and
probability-proportional-to-size sampling with replacement can be arbitrarily
bad.
Knowing the variance optimality of different sampling schemes can help
deciding which sampling scheme to apply in a given context.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 15:55:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Szegedy",
"Mario",
""
],
[
"Thorup",
"Mikkel",
""
]
]
|
cs/0702032 | Reid Andersen | Reid Andersen | Finding large and small dense subgraphs | 12 pages, no figures | null | null | null | cs.DS | null | We consider two optimization problems related to finding dense subgraphs. The
densest at-least-k-subgraph problem (DalkS) is to find an induced subgraph of
highest average degree among all subgraphs with at least k vertices, and the
densest at-most-k-subgraph problem (DamkS) is defined similarly. These problems
are related to the well-known densest k-subgraph problem (DkS), which is to
find the densest subgraph on exactly k vertices. We show that DalkS can be
approximated efficiently, while DamkS is nearly as hard to approximate as the
densest k-subgraph problem.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 19:29:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Andersen",
"Reid",
""
]
]
|
cs/0702034 | Rama Raghavan | L.Jeganathan and R.Rama | Graph Splicing System | 13 pages,5 figures | null | null | null | cs.DM | null | The string splicing was introduced by Tom Head which stands as an abstract
model for the DNA recombination under the influence of restriction enzymes. The
complex chemical process of three dimensional molecules in three dimensional
space can be modeled using graphs. The graph splicing systems which were
studied so far, can only be applied to a particular type of graphs which could
be interpreted as linear or circular graphs. In this paper, we take a different
and a novel approach to splice two graphs and introduce a splicing system for
graphs that can be applied to all types of graphs. Splicing two graphs can be
thought of as a new operation, among the graphs, that generates many new graphs
from the given two graphs. Taking a different line of thinking, some of the
graph theoretical results of the splicing are studied.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2007 05:46:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jeganathan",
"L.",
""
],
[
"Rama",
"R.",
""
]
]
|
cs/0702036 | Michael Fisher | Clare Dixon, Michael Fisher, Boris Konev, Alexei Lisitsa | Efficient First-Order Temporal Logic for Infinite-State Systems | 16 pages, 2 figures | null | null | null | cs.LO | null | In this paper we consider the specification and verification of
infinite-state systems using temporal logic. In particular, we describe
parameterised systems using a new variety of first-order temporal logic that is
both powerful enough for this form of specification and tractable enough for
practical deductive verification. Importantly, the power of the temporal
language allows us to describe (and verify) asynchronous systems, communication
delays and more complex properties such as liveness and fairness properties.
These aspects appear difficult for many other approaches to infinite-state
verification.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2007 15:10:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dixon",
"Clare",
""
],
[
"Fisher",
"Michael",
""
],
[
"Konev",
"Boris",
""
],
[
"Lisitsa",
"Alexei",
""
]
]
|
cs/0702038 | Minkyu Kim | Minkyu Kim, Varun Aggarwal, Una-May O'Reilly, Muriel Medard, Wonsik
Kim | Genetic Representations for Evolutionary Minimization of Network Coding
Resources | 10 pages, 3 figures, accepted to the 4th European Workshop on the
Application of Nature-Inspired Techniques to Telecommunication Networks and
Other Connected Systems (EvoCOMNET 2007) | null | null | null | cs.NE cs.NI | null | We demonstrate how a genetic algorithm solves the problem of minimizing the
resources used for network coding, subject to a throughput constraint, in a
multicast scenario. A genetic algorithm avoids the computational complexity
that makes the problem NP-hard and, for our experiments, greatly improves on
sub-optimal solutions of established methods. We compare two different genotype
encodings, which tradeoff search space size with fitness landscape, as well as
the associated genetic operators. Our finding favors a smaller encoding despite
its fewer intermediate solutions and demonstrates the impact of the modularity
enforced by genetic operators on the performance of the algorithm.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 05:54:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kim",
"Minkyu",
""
],
[
"Aggarwal",
"Varun",
""
],
[
"O'Reilly",
"Una-May",
""
],
[
"Medard",
"Muriel",
""
],
[
"Kim",
"Wonsik",
""
]
]
|
cs/0702039 | Xavier Goaoc | Otfried Cheong, Xavier Goaoc (INRIA Lorraine - LORIA), Andreas
Holmsen, Sylvain Petitjean (INRIA Lorraine - LORIA) | Hadwiger and Helly-type theorems for disjoint unit spheres | null | Discrete and Computational Geometry (2006) | null | null | cs.CG | null | We prove Helly-type theorems for line transversals to disjoint unit balls in
$\R^{d}$. In particular, we show that a family of $n \geq 2d$ disjoint unit
balls in $\R^d$ has a line transversal if, for some ordering $\prec$ of the
balls, any subfamily of 2d balls admits a line transversal consistent with
$\prec$. We also prove that a family of $n \geq 4d-1$ disjoint unit balls in
$\R^d$ admits a line transversal if any subfamily of size $4d-1$ admits a
transversal.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 08:29:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cheong",
"Otfried",
"",
"INRIA Lorraine - LORIA"
],
[
"Goaoc",
"Xavier",
"",
"INRIA Lorraine - LORIA"
],
[
"Holmsen",
"Andreas",
"",
"INRIA Lorraine - LORIA"
],
[
"Petitjean",
"Sylvain",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0702040 | Yves Guiraud | Yves Guiraud | Polygraphs for termination of left-linear term rewriting systems | 15 pages | null | null | null | cs.LO math.CT | null | We present a methodology for proving termination of left-linear term
rewriting systems (TRSs) by using Albert Burroni's polygraphs, a kind of
rewriting systems on algebraic circuits. We translate the considered TRS into a
polygraph of minimal size whose termination is proven with a polygraphic
interpretation, then we get back the property on the TRS. We recall Yves
Lafont's general translation of TRSs into polygraphs and known links between
their termination properties. We give several conditions on the original TRS,
including being a first-order functional program, that ensure that we can
reduce the size of the polygraphic translation. We also prove sufficient
conditions on the polygraphic interpretations of a minimal translation to imply
termination of the original TRS. Examples are given to compare this method with
usual polynomial interpretations.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 10:18:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Guiraud",
"Yves",
""
]
]
|
cs/0702042 | Jo\~ao Barros | Luis Lopes, Francisco Martins, Miguel S. Silva, Joao Barros | A Formal Model for Programming Wireless Sensor Networks | 14 pages, 0 figures, Submitted for Publication | null | null | null | cs.DC cs.PL | null | In this paper we present new developments in the expressiveness and in the
theory of a Calculus for Sensor Networks (CSN). We combine a network layer of
sensor devices with a local object model to describe sensor devices with state.
The resulting calculus is quite small and yet very expressive. We also present
a type system and a type invariance result for the calculus. These results
provide the fundamental framework for the development of programming languages
and run-time environments.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 14:17:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lopes",
"Luis",
""
],
[
"Martins",
"Francisco",
""
],
[
"Silva",
"Miguel S.",
""
],
[
"Barros",
"Joao",
""
]
]
|
cs/0702047 | Holger Spakowski | Holger Spakowski and Rahul Tripathi | Hierarchical Unambiguity | null | null | null | null | cs.CC | null | We develop techniques to investigate relativized hierarchical unambiguous
computation. We apply our techniques to generalize known constructs involving
relativized unambiguity based complexity classes (UP and \mathcal{UP}) to new
constructs involving arbitrary higher levels of the relativized unambiguous
polynomial hierarchy (UPH). Our techniques are developed on constraints imposed
by hierarchical arrangement of unambiguous nondeterministic polynomial-time
Turing machines, and so they differ substantially, in applicability and in
nature, from standard methods (such as the switching lemma [Hastad,
Computational Limitations of Small-Depth Circuits, MIT Press, 1987]), which
play roles in carrying out similar generalizations.
Aside from achieving these generalizations, we resolve a question posed by
Cai, Hemachandra, and Vyskoc [J. Cai, L. Hemachandra, and J. Vyskoc, Promises
and fault-tolerant database access, In K. Ambos-Spies, S. Homer, and U.
Schoening, editors, Complexity Theory, pages 101-146. Cambridge University
Press, 1993] on an issue related to nonadaptive Turing access to UP and
adaptive smart Turing access to \mathcal{UP}.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 16:00:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Spakowski",
"Holger",
""
],
[
"Tripathi",
"Rahul",
""
]
]
|
cs/0702048 | Ken Wakita | Ken Wakita and Toshiyuki Tsurumi | Finding Community Structure in Mega-scale Social Networks | 9 pages, 15 figures | null | null | null | cs.CY physics.soc-ph | null | Community analysis algorithm proposed by Clauset, Newman, and Moore (CNM
algorithm) finds community structure in social networks. Unfortunately, CNM
algorithm does not scale well and its use is practically limited to networks
whose sizes are up to 500,000 nodes. The paper identifies that this
inefficiency is caused from merging communities in unbalanced manner. The paper
introduces three kinds of metrics (consolidation ratio) to control the process
of community analysis trying to balance the sizes of the communities being
merged. Three flavors of CNM algorithms are built incorporating those metrics.
The proposed techniques are tested using data sets obtained from existing
social networking service that hosts 5.5 million users. All the methods exhibit
dramatic improvement of execution efficiency in comparison with the original
CNM algorithm and shows high scalability. The fastest method processes a
network with 1 million nodes in 5 minutes and a network with 4 million nodes in
35 minutes, respectively. Another one processes a network with 500,000 nodes in
50 minutes (7 times faster than the original algorithm), finds community
structures that has improved modularity, and scales to a network with 5.5
million.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 16:40:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wakita",
"Ken",
""
],
[
"Tsurumi",
"Toshiyuki",
""
]
]
|
cs/0702049 | Gregory Gutin | Noga Alon, Fedor Fomin, Gregory Gutin, Michael Krivelevich and Saket
Saurabh | Parameterized Algorithms for Directed Maximum Leaf Problems | null | null | null | null | cs.DS cs.DM | null | We prove that finding a rooted subtree with at least $k$ leaves in a digraph
is a fixed parameter tractable problem. A similar result holds for finding
rooted spanning trees with many leaves in digraphs from a wide family $\cal L$
that includes all strong and acyclic digraphs. This settles completely an open
question of Fellows and solves another one for digraphs in $\cal L$. Our
algorithms are based on the following combinatorial result which can be viewed
as a generalization of many results for a `spanning tree with many leaves' in
the undirected case, and which is interesting on its own: If a digraph $D\in
\cal L$ of order $n$ with minimum in-degree at least 3 contains a rooted
spanning tree, then $D$ contains one with at least $(n/2)^{1/5}-1$ leaves.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 18:25:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Alon",
"Noga",
""
],
[
"Fomin",
"Fedor",
""
],
[
"Gutin",
"Gregory",
""
],
[
"Krivelevich",
"Michael",
""
],
[
"Saurabh",
"Saket",
""
]
]
|
cs/0702053 | Andrew Badr | Andrew Badr, Ian Shipman | The DFAs of Finitely Different Languages | null | null | null | null | cs.CC | null | Two languages are "finitely different" if their symmetric difference is
finite. We consider the DFAs of finitely different regular languages and find
major structural similarities. We proceed to consider the smallest DFAs that
recognize a language finitely different from some given DFA. Such "f-minimal"
DFAs are not unique, and this non-uniqueness is characterized. Finally, we
offer a solution to the minimization problem of finding such f-minimal DFAs.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 03:42:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Badr",
"Andrew",
""
],
[
"Shipman",
"Ian",
""
]
]
|
cs/0702054 | Christoph Durr | Christoph Durr and Nguyen Kim Thang | Nash equilibria in Voronoi games on graphs | null | null | null | null | cs.GT cs.DS | null | In this paper we study a game where every player is to choose a vertex
(facility) in a given undirected graph. All vertices (customers) are then
assigned to closest facilities and a player's payoff is the number of customers
assigned to it. We show that deciding the existence of a Nash equilibrium for a
given graph is NP-hard which to our knowledge is the first result of this kind
for a zero-sum game. We also introduce a new measure, the social cost
discrepancy, defined as the ratio of the costs between the worst and the best
Nash equilibria. We show that the social cost discrepancy in our game is
Omega(sqrt(n/k)) and O(sqrt(kn)), where n is the number of vertices and k the
number of players.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 12:12:17 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Apr 2007 14:11:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Thang",
"Nguyen Kim",
""
]
]
|
cs/0702055 | Alexander Paraskevov | A.V. Paraskevov | On the possibility of making the complete computer model of a human
brain | null | null | null | null | cs.NE | null | The development of the algorithm of a neural network building by the
corresponding parts of a DNA code is discussed.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 13:16:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paraskevov",
"A. V.",
""
]
]
|
cs/0702056 | Hanene Mohamed | Hanene Mohamed (INRIA Rocquencourt) | A probabilistic analysis of a leader election algorithm | null | Fourth Colloquium on Mathematics and Computer Science Algorithms,
Trees, Combinatorics and Probabilities (2006) 225-236 | null | null | cs.DS | null | A {\em leader election} algorithm is an elimination process that divides
recursively into tow subgroups an initial group of n items, eliminates one
subgroup and continues the procedure until a subgroup is of size 1. In this
paper the biased case is analyzed. We are interested in the {\em cost} of the
algorithm, i.e. the number of operations needed until the algorithm stops.
Using a probabilistic approach, the asymptotic behavior of the algorithm is
shown to be related to the behavior of a hitting time of two random sequences
on [0,1].
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 15:16:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mohamed",
"Hanene",
"",
"INRIA Rocquencourt"
]
]
|
cs/0702058 | Kia Kai Li | Kia Kai Li | Exploring k-Colorability | null | null | null | null | cs.CC | null | An introductory paper to the graph k-colorability problem.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 23:07:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Kia Kai",
""
]
]
|
cs/0702067 | Fionn Murtagh | Fionn Murtagh | The Haar Wavelet Transform of a Dendrogram: Additional Notes | 37 pp, 1 fig. Supplementary material to "The Haar Wavelet Transform
of a Dendrogram", http://arxiv.org/abs/cs.IR/0608107 | null | null | null | cs.IR | null | We consider the wavelet transform of a finite, rooted, node-ranked, $p$-way
tree, focusing on the case of binary ($p = 2$) trees. We study a Haar wavelet
transform on this tree. Wavelet transforms allow for multiresolution analysis
through translation and dilation of a wavelet function. We explore how this
works in our tree context.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2007 21:26:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Murtagh",
"Fionn",
""
]
]
|
cs/0702074 | Xavier P\'erez-Gim\'enez | Josep Diaz, Dieter Mitsche, Xavier Perez | Dynamic Random Geometric Graphs | null | null | null | null | cs.DM | null | In this work we introduce Dynamic Random Geometric Graphs as a basic rough
model for mobile wireless sensor networks, where communication distances are
set to the known threshold for connectivity of static random geometric graphs.
We provide precise asymptotic results for the expected length of the
connectivity and disconnectivity periods of the network. We believe the formal
tools developed in this work could be of use in future studies in more concrete
settings. In addition, for static random geometric graphs at the threshold for
connectivity, we provide asymptotic expressions on the probability of existence
of components according to their sizes.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 09:00:34 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Apr 2007 09:15:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Diaz",
"Josep",
""
],
[
"Mitsche",
"Dieter",
""
],
[
"Perez",
"Xavier",
""
]
]
|
cs/0702075 | Maurice H. T. Ling | Maurice HT Ling | Firebird Database Backup by Serialized Database Table Dump | 5 pages | Ling, Maurice HT. 2007. Firebird Database Backup by Serialized
Database Table Dump. The Python Papers 2 (1): 10-14 | null | null | cs.DB | null | This paper presents a simple data dump and load utility for Firebird
databases which mimics mysqldump in MySQL. This utility, fb_dump and fb_load,
for dumping and loading respectively, retrieves each database table using
kinterbasdb and serializes the data using marshal module. This utility has two
advantages over the standard Firebird database backup utility, gbak. Firstly,
it is able to backup and restore single database tables which might help to
recover corrupted databases. Secondly, the output is in text-coded format (from
marshal module) making it more resilient than a compressed text backup, as in
the case of using gbak.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 11:13:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ling",
"Maurice HT",
""
]
]
|
cs/0702078 | Reid Andersen | Reid Andersen | A Local Algorithm for Finding Dense Subgraphs | 14 pages, no figures | null | null | null | cs.DS cs.CC | null | We present a local algorithm for finding dense subgraphs of bipartite graphs,
according to the definition of density proposed by Kannan and Vinay. Our
algorithm takes as input a bipartite graph with a specified starting vertex,
and attempts to find a dense subgraph near that vertex. We prove that for any
subgraph S with k vertices and density theta, there are a significant number of
starting vertices within S for which our algorithm produces a subgraph S' with
density theta / O(log n) on at most O(D k^2) vertices, where D is the maximum
degree. The running time of the algorithm is O(D k^2), independent of the
number of vertices in the graph.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 23:41:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Andersen",
"Reid",
""
]
]
|
cs/0702081 | Rick Dale | Rick Dale | Random Sentences from a Generalized Phrase-Structure Grammar Interpreter | Brief paper with source code and examples | null | null | null | cs.CL | null | In numerous domains in cognitive science it is often useful to have a source
for randomly generated corpora. These corpora may serve as a foundation for
artificial stimuli in a learning experiment (e.g., Ellefson & Christiansen,
2000), or as input into computational models (e.g., Christiansen & Dale, 2001).
The following compact and general C program interprets a phrase-structure
grammar specified in a text file. It follows parameters set at a Unix or
Unix-based command-line and generates a corpus of random sentences from that
grammar.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 06:05:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dale",
"Rick",
""
]
]
|
cs/0702083 | Serebrenik Alexander | Alexander Serebrenik, Tom Schrijvers, Bart Demoen | Improving Prolog programs: Refactoring for Prolog | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | 2006-1 | cs.SE | null | Refactoring is an established technique from the object-oriented (OO)
programming community to restructure code: it aims at improving software
readability, maintainability and extensibility. Although refactoring is not
tied to the OO-paradigm in particular, its ideas have not been applied to Logic
Programming until now.
This paper applies the ideas of refactoring to Prolog programs. A catalogue
is presented listing refactorings classified according to scope. Some of the
refactorings have been adapted from the OO-paradigm, while others have been
specifically designed for Prolog. The discrepancy between intended and
operational semantics in Prolog is also addressed by some of the refactorings.
In addition, ViPReSS, a semi-automatic refactoring browser, is discussed and
the experience with applying ViPReSS to a large Prolog legacy system is
reported. The main conclusion is that refactoring is both a viable technique in
Prolog and a rather desirable one.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 09:53:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Serebrenik",
"Alexander",
""
],
[
"Schrijvers",
"Tom",
""
],
[
"Demoen",
"Bart",
""
]
]
|
cs/0702085 | Vincenzo Nicosia | V. Carchiolo, M. Malgeri, G. Mangioni and V. Nicosia | Social Behaviours Applied to P2P Systems: An efficient Algorithm for
Resource Organisation | 5 Pages; 8 Figures; Presented at COPS 2006 -- WETICE -- Manchester
(UK) | 15th IEEE International Workshops on Enabling Technologies:
Infrastructure for Collaborative Enterprises, 2006. WETICE '06. June 2006
Page(s):65 - 72 | null | null | cs.DC cs.IR | null | P2P systems are a great solution to the problem of distributing resources.
The main issue of P2P networks is that searching and retrieving resources
shared by peers is usually expensive and does not take into account
similarities among peers. In this paper we present preliminary simulations of
PROSA, a novel algorithm for P2P network structuring, inspired by social
behaviours. Peers in PROSA self--organise in social groups of similar peers,
called ``semantic--groups'', depending on the resources they are sharing. Such
a network smoothly evolves to a small--world graph, where queries for resources
are efficiently and effectively routed.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 11:53:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Carchiolo",
"V.",
""
],
[
"Malgeri",
"M.",
""
],
[
"Mangioni",
"G.",
""
],
[
"Nicosia",
"V.",
""
]
]
|
cs/0702086 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Protection of DVB Systems by Trusted Computing | Accepted contribution to the IEEE International Symposium on
Broadband Multimedia Systems and Broadcasting 2007, 28-29 March 2007 at the
Orange County Convention Center, Orlando, FL, USA; 7 pages, 4 figures | null | null | null | cs.CR | null | We describe a concept to employ Trusted Computing technology to secure
Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted
platform module (TPM) into the set-top-box or residential home gateway. Various
deployment scenarios exhibit possibilities of charging co-operation with mobile
network operators (MNO), or other payment providers.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 11:58:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
]
|
cs/0702088 | Shanghua Teng | Xi Chen and Shang-Hua Teng | Paths Beyond Local Search: A Nearly Tight Bound for Randomized
Fixed-Point Computation | null | null | null | null | cs.GT | null | In 1983, Aldous proved that randomization can speedup local search. For
example, it reduces the query complexity of local search over [1:n]^d from
Theta (n^{d-1}) to O (d^{1/2}n^{d/2}). It remains open whether randomization
helps fixed-point computation. Inspired by this open problem and recent
advances on equilibrium computation, we have been fascinated by the following
question:
Is a fixed-point or an equilibrium fundamentally harder to find than a local
optimum? In this paper, we give a nearly-tight bound of Omega(n)^{d-1} on the
randomized query complexity for computing a fixed point of a discrete Brouwer
function over [1:n]^d. Since the randomized query complexity of global
optimization over [1:n]^d is Theta (n^{d}), the randomized query model over
[1:n]^d strictly separates these three important search problems: Global
optimization is harder than fixed-point computation, and fixed-point
computation is harder than local search. Our result indeed demonstrates that
randomization does not help much in fixed-point computation in the query model;
the deterministic complexity of this problem is Theta (n^{d-1}).
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 07:32:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"Xi",
""
],
[
"Teng",
"Shang-Hua",
""
]
]
|
cs/0702091 | raphael M. Jungers | Raphael M. Jungers and Vincent D. Blondel | Observable Graphs | 15 pages, 8 figures | null | null | null | cs.MA | null | An edge-colored directed graph is \emph{observable} if an agent that moves
along its edges is able to determine his position in the graph after a
sufficiently long observation of the edge colors. When the agent is able to
determine his position only from time to time, the graph is said to be
\emph{partly observable}. Observability in graphs is desirable in situations
where autonomous agents are moving on a network and one wants to localize them
(or the agent wants to localize himself) with limited information. In this
paper, we completely characterize observable and partly observable graphs and
show how these concepts relate to observable discrete event systems and to
local automata. Based on these characterizations, we provide polynomial time
algorithms to decide observability, to decide partial observability, and to
compute the minimal number of observations necessary for finding the position
of an agent. In particular we prove that in the worst case this minimal number
of observations increases quadratically with the number of nodes in the graph.
From this it follows that it may be necessary for an agent to pass through
the same node several times before he is finally able to determine his position
in the graph. We then consider the more difficult question of assigning colors
to a graph so as to make it observable and we prove that two different versions
of this problem are NP-complete.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 16:16:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jungers",
"Raphael M.",
""
],
[
"Blondel",
"Vincent D.",
""
]
]
|
cs/0702094 | Marko Horvat B.Sc.CS-Dipl.Ing. | Darko Fuduric, Marko Horvat and Mario Zagar | Authentication via wireless networks | 5 pages, 6 figures, 1 table, MIPRO Conference in Opatija, Croatia,
2006 | MIPRO, 2006 | null | null | cs.OH | null | Personal authentication is an important process we encounter almost every
day; when we are logging on a computer, entering a company where we work, or a
restricted area, when we are using our plastic credit cards to pay for a
service or to complete some other financial transaction, etc. In each of these
processes of personal authentication some kind of magnetic or optical token is
required. But by using novel technologies like mobile computing and wireless
networking, it is possible to avoid carrying multitude of ID cards or
remembering a number of PIN codes. Article shows how to efficiently
authenticate users via Personal Area Networks (PAN) like Bluetooth or IrDA
using commonplace AES (Rijndel) or MD5 encryption. This method can be
implemented on many types of mobile devices like Pocket PC PDA with Windows CE
(Windows Mobile 2003) real-time operating system, or any other customized OS,
so we will explain all components and key features of such basic system.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 16:46:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fuduric",
"Darko",
""
],
[
"Horvat",
"Marko",
""
],
[
"Zagar",
"Mario",
""
]
]
|
cs/0702095 | Ayan Mahalanobis | Ayan Mahalanobis | A note on using finite non-abelian $p$-groups in the MOR cryptosystem | null | null | null | null | cs.CR math.GR | null | The MOR cryptosystem is a natural generalization of the El-Gamal cryptosystem
to non-abelian groups. Using a $p$-group, a cryptosystem was built by this
author in 'A simple generalization of El-Gamal cryptosystem to non-abelian
groups'. It seems reasonable to assume the cryptosystem is as secure as the
El-Gamal cryptosystem over finite fields. A natural question arises can one
make a better cryptosystem using $p$-groups? In this paper we show that the
answer is no.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 19:04:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mahalanobis",
"Ayan",
""
]
]
|
cs/0702096 | David Iclanzan Mr | David Iclanzan, Dan Dumitrescu | Overcoming Hierarchical Difficulty by Hill-Climbing the Building Block
Structure | submited to GECCO 2007 (jan 31) | null | null | null | cs.NE cs.AI | null | The Building Block Hypothesis suggests that Genetic Algorithms (GAs) are
well-suited for hierarchical problems, where efficient solving requires proper
problem decomposition and assembly of solution from sub-solution with strong
non-linear interdependencies. The paper proposes a hill-climber operating over
the building block (BB) space that can efficiently address hierarchical
problems. The new Building Block Hill-Climber (BBHC) uses past hill-climb
experience to extract BB information and adapts its neighborhood structure
accordingly. The perpetual adaptation of the neighborhood structure allows the
method to climb the hierarchical structure solving successively the
hierarchical levels. It is expected that for fully non deceptive hierarchical
BB structures the BBHC can solve hierarchical problems in linearithmic time.
Empirical results confirm that the proposed method scales almost linearly with
the problem size thus clearly outperforms population based recombinative
methods.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 21:47:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Iclanzan",
"David",
""
],
[
"Dumitrescu",
"Dan",
""
]
]
|
cs/0702098 | Jari Salo | Jari Salo | A Sum-Product Model as a Physical Basis for Shadow Fading | 23 pages, 9 figs. To be revised and maybe submitted | null | null | null | cs.OH | null | Shadow fading (slow fading) effects play a central role in mobile
communication system design and analysis. Experimental evidence indicates that
shadow fading exhibits log-normal power distribution almost universally, and
yet it is still not well understood what causes this. In this paper, we propose
a versatile sum-product signal model as a physical basis for shadow fading.
Simulation results imply that the proposed model results in log-normally
distributed local mean power regardless of the distributions of the
interactions in the radio channel, and hence it is capable of explaining the
log-normality in a wide variety of propagation scenarios. The sum-product model
also includes as its special cases the conventional product model as well as
the recently proposed sum model, and improves upon these by: a) being
applicable in both global and local distance scales; b) being more plausible
from physical point of view; c) providing better goodness-of-fit to log-normal
distribution than either of these models.
| [
{
"version": "v1",
"created": "Sun, 18 Feb 2007 21:54:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Salo",
"Jari",
""
]
]
|
cs/0702106 | Charles Robert | Charles Robert (LORIA), Ranmi Adigun (YABATECH) | Wild, Wild Wikis: A way forward | null | Dans The Fifth International Conference on Creating, Connecting
and Collaborating through Computing, C5 2007 (2007) | null | null | cs.IR | null | Wikis can be considered as public domain knowledge sharing system. They
provide opportunity for those who may not have the privilege to publish their
thoughts through the traditional methods. They are one of the fastest growing
systems of online encyclopaedia. In this study, we consider the importance of
wikis as a way of creating, sharing and improving public knowledge. We identify
some of the problems associated with wikis to include, (a) identification of
the identities of information and its creator (b) accuracy of information (c)
justification of the credibility of authors (d) vandalism of quality of
information (e) weak control over the contents. A solution to some of these
problems is sought through the use of an annotation model. The model assumes
that contributions in wikis can be seen as annotation to the initial document.
It proposed a systematic control of contributors and contributions to the
initiative and the keeping of records of what existed and what was done to
initial documents. We believe that with this model, analysis can be done on the
progress of wiki initiatives. We assumed that using this model, wikis can be
better used for creation and sharing of knowledge for public use.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 15:12:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Robert",
"Charles",
"",
"LORIA"
],
[
"Adigun",
"Ranmi",
"",
"YABATECH"
]
]
|
cs/0702107 | Charles Robert | Charles A. Robert (LORIA) | AMIEDoT: An annotation model for document tracking and recommendation
service | null | Dans International Joint Conferences on Computer, Information, and
Systems Sciences, and Engineering, (CIS2E 06) (2007) | null | null | cs.IR | null | The primary objective of document annotation in whatever form, manual or
electronic is to allow those who may not have control to original document to
provide personal view on information source. Beyond providing personal
assessment to original information sources, we are looking at a situation where
annotation made can be used as additional source of information for document
tracking and recommendation service. Most of the annotation tools existing
today were conceived for their independent use with no reference to the creator
of the annotation. We propose AMIEDoT (Annotation Model for Information
Exchange and Document Tracking) an annotation model that can assist in document
tracking and recommendation service. The model is based on three parameters in
the acts of annotation. We believe that introducing document parameters, time
and the parameters of the creator of annotation into an annotation process can
be a dependable source to know, who used a document, when a document was used
and for what a document was used for. Beyond document tracking, our model can
be used in not only for selective dissemination of information but for
recommendation services. AMIEDoT can also be used for information sharing and
information reuse.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 15:18:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Robert",
"Charles A.",
"",
"LORIA"
]
]
|
cs/0702109 | Charles Robert | Charles A. Robert (LORIA), David Amos (LORIA) | AMIE: An annotation model for information research | null | Dans International Conference on Computers in Education, (2006) | null | null | cs.IR | null | The objective of most users for consulting any information database,
information warehouse or the internet is to resolve one problem or the other.
Available online or offline annotation tools were not conceived with the
objective of assisting users in their bid to resolve a decisional problem.
Apart from the objective and usage of annotation tools, how these tools are
conceived and classified has implication on their usage. Several criteria have
been used to categorize annotation concepts. Typically annotation are conceived
based on how it affect the organization of document been considered for
annotation or the organization of the resulting annotation. Our approach is
annotation that will assist in information research for decision making.
Annotation model for information exchange (AMIE) was conceived with the
objective of information sharing and reuse.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 15:26:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Robert",
"Charles A.",
"",
"LORIA"
],
[
"Amos",
"David",
"",
"LORIA"
]
]
|
cs/0702110 | Saltuk Aksahin | Saltuk Aksahin | Security Implications of Converged Networks and Protecting Them, without
Compromising Efficiency | 64 pages | null | null | null | cs.NI | null | This dissertation has extensively looked into all aspects of VoIP
commu-nications technology, and information presented in preceding chapters,
which build up a solid framework to discuss the conceptual design model, and
investigate features that could be incorporated for actual Pro-jects, with
parameters that are tested on field values. The dissertation follows a
five-course model, for answering different questions, both tech-nical and
businesslike, around central issues, that have been crucial to explanation of
the topic; starting with a general overview of VoIP tech-nology, analyzing
current VoIP encryption methods, identifying security threats, designing a
robust VoIP system based on particulars discussed in preceding chapters, and
finally, a VoIP simulation.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 20:51:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aksahin",
"Saltuk",
""
]
]
|
cs/0702114 | David Pritchard | David Pritchard | Nearest Neighbor Network Traversal | null | null | null | null | cs.DC | null | A mobile agent in a network wants to visit every node of an n-node network,
using a small number of steps. We investigate the performance of the following
``nearest neighbor'' heuristic: always go to the nearest unvisited node. If the
network graph never changes, then from (Rosenkrantz, Stearns and Lewis, 1977)
and (Hurkens and Woeginger, 2004) it follows that Theta(n log n) steps are
necessary and sufficient in the worst case. We give a simpler proof of the
upper bound and an example that improves the best known lower bound.
We investigate how the performance of this heuristic changes when it is
distributively implemented in a network. Even if network edges are allow to
fail over time, we show that the nearest neighbor strategy never runs for more
than O(n^2) iterations. We also show that any strategy can be forced to take at
least n(n-1)/2 steps before all nodes are visited, if the edges of the network
are deleted in an adversarial way.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2007 03:54:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pritchard",
"David",
""
]
]
|
cs/0702117 | Mathieu Couture | Prosenjit Bose and Paz Carmi and Mathieu Couture and Michiel Smid and
Daming Xu | On a family of strong geometric spanners that admit local routing
strategies | null | null | null | null | cs.CG | null | We introduce a family of directed geometric graphs, denoted $\paz$, that
depend on two parameters $\lambda$ and $\theta$. For $0\leq
\theta<\frac{\pi}{2}$ and ${1/2} < \lambda < 1$, the $\paz$ graph is a strong
$t$-spanner, with $t=\frac{1}{(1-\lambda)\cos\theta}$. The out-degree of a node
in the $\paz$ graph is at most $\lfloor2\pi/\min(\theta,
\arccos\frac{1}{2\lambda})\rfloor$. Moreover, we show that routing can be
achieved locally on $\paz$. Next, we show that all strong $t$-spanners are also
$t$-spanners of the unit disk graph. Simulations for various values of the
parameters $\lambda$ and $\theta$ indicate that for random point sets, the
spanning ratio of $\paz$ is better than the proven theoretical bounds.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2007 20:54:16 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Feb 2007 14:57:44 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Feb 2007 21:17:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Carmi",
"Paz",
""
],
[
"Couture",
"Mathieu",
""
],
[
"Smid",
"Michiel",
""
],
[
"Xu",
"Daming",
""
]
]
|
cs/0702123 | Slavcho Shtrakov | Slavcho Shtrakov and Vladimir Shtrakov | Tree automata and separable sets of input variables | 8 pages, 2 figures | J. FILOMAT, v. 15, 2001, University of Nis, 61-71 p., ISSN
0354-5180 (http://www.pmf.ni.ac.yu/sajt/publikacije/filomat_15.html) | null | null | cs.CC cs.DM | null | We consider the computational complexity of tree transducers, depending on
their separable sets of input variables.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 15:16:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
],
[
"Shtrakov",
"Vladimir",
""
]
]
|
cs/0702125 | Philipp Pluch | Philipp Pluch, Samo Wakounig | Bayesian Network Tomography and Inference | null | null | null | null | cs.NI | null | The aim of this technical report is to give a short overview of known
techniques for network tomography (introduced in the paper of Vardi (1996)),
extended by a Bayesian approach originating Tebaldi and West (1998). Since the
studies of A.K. Erlang (1878-1929) on telephone networks in the last
millennium, lots of needs are seen in todays applications of networks and
network tomography, so for instance networks are a critical component of the
information structure supporting finance, commerce and even civil and national
defence. An attack on a network can be performed as an intrusion in the network
or as sending a lot of fault information and disturbing the network flow. Such
attacks can be detected by modelling the traffic flows in a network, by
counting the source destination packets and even by measuring counts over time
and by drawing a comparison with this 'time series' for instance.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 09:43:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pluch",
"Philipp",
""
],
[
"Wakounig",
"Samo",
""
]
]
|
cs/0702126 | Vincenzo Nicosia | V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri | Efficient Searching and Retrieval of Documents in PROSA | 12 pages, 3 figures | null | null | null | cs.DC cs.IR | null | Retrieving resources in a distributed environment is more difficult than
finding data in centralised databases. In the last decade P2P system arise as
new and effective distributed architectures for resource sharing, but searching
in such environments could be difficult and time-consuming. In this paper we
discuss efficiency of resource discovery in PROSA, a self-organising P2P system
heavily inspired by social networks. All routing choices in PROSA are made
locally, looking only at the relevance of the next peer to each query. We show
that PROSA is able to effectively answer queries for rare documents, forwarding
them through the most convenient path to nodes that much probably share
matching resources. This result is heavily related to the small-world structure
that naturally emerges in PROSA.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 10:22:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nicosia",
"V.",
""
],
[
"Mangioni",
"G.",
""
],
[
"Carchiolo",
"V.",
""
],
[
"Malgeri",
"M.",
""
]
]
|
cs/0702127 | Vincenzo Nicosia | V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri | Exploiting social networks dynamics for P2P resource organisation | 9 pages, 4 figures | Lecture Notes on Computer Science (LNCS) 4263 (2006) | null | null | cs.DC cs.IR | null | In this paper we present a formal description of PROSA, a P2P resource
management system heavily inspired by social networks. Social networks have
been deeply studied in the last two decades in order to understand how
communities of people arise and grow. It is a widely known result that networks
of social relationships usually evolves to small-worlds, i.e. networks where
nodes are strongly connected to neighbours and separated from all other nodes
by a small amount of hops. This work shows that algorithms implemented into
PROSA allow to obtain an efficient small-world P2P network.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 10:35:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nicosia",
"V.",
""
],
[
"Mangioni",
"G.",
""
],
[
"Carchiolo",
"V.",
""
],
[
"Malgeri",
"M.",
""
]
]
|
cs/0702128 | Huang Xiangao | Xiangao Huang and Wei Huang and Xiaozhou Liu and Chao Wang and Zhu
jing Wang and Tao Wang | Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher
Based on Complexity | 6 pages, 1 figure | null | null | null | cs.CR | null | In this letter we assert that we have reconstructed the nonlinear filter
function of LILI-128 stream cipher on IBM notebook PC using MATLAB. Our
reconstruction need approximately 2^12~2^13 and the attack consumes 5825.016
sec (using tic and toc sentences of MATLAB) or 5825.016/3600=1.6181hours. We
got the expression of the nonlinear filter function fd of Lili-128 which has 46
items from liner items to nonlinear items based on complexity, the phase space
reconstruction, Clustering and nonlinear prediction. We have verified our
reconstruction result correctness by simulating the overview of Lili-128
keystream generators using our getting fd and implement designers reference
module of the Lili-128 stream cipher, and two methods produce the same
synchronous keystream sequence on same initial state, so that our research work
proves that the nonlinear filter function of LILI-128 stream cipher is
successfully reconstructed.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 14:03:51 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Apr 2007 01:53:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Huang",
"Xiangao",
""
],
[
"Huang",
"Wei",
""
],
[
"Liu",
"Xiaozhou",
""
],
[
"Wang",
"Chao",
""
],
[
"Wang",
"Zhu jing",
""
],
[
"Wang",
"Tao",
""
]
]
|
cs/0702129 | Slavcho Shtrakov | Slavcho Shtrakov | Tree Automata and Essential Input Variables | 10 pages, 2 figures, 60th Workshop on General Algebra, June 22-25,
2000, TU Dresden | J. Contributions to General Algebra, v.13, Verlag Johannes Heyn,
Klagenfurt, 2001, 309-319 p | null | null | cs.CC cs.DM | null | We introduce and study the essential inputs (variables) for terms (trees) and
tree automata.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 15:12:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
]
]
|
cs/0702131 | Jason Reese | Graham B. Macpherson and Jason M. Reese | AICA: a New Pair Force Evaluation Method for Parallel Molecular Dynamics
in Arbitrary Geometries | null | null | null | null | cs.CE cs.DC | null | A new algorithm for calculating intermolecular pair forces in Molecular
Dynamics (MD) simulations on a distributed parallel computer is presented. The
Arbitrary Interacting Cells Algorithm (AICA) is designed to operate on
geometrical domains defined by an unstructured, arbitrary polyhedral mesh,
which has been spatially decomposed into irregular portions for
parallelisation. It is intended for nano scale fluid mechanics simulation by MD
in complex geometries, and to provide the MD component of a hybrid MD/continuum
simulation. AICA has been implemented in the open-source computational toolbox
OpenFOAM, and verified against a published MD code.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 17:27:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Macpherson",
"Graham B.",
""
],
[
"Reese",
"Jason M.",
""
]
]
|
cs/0702133 | Vadim Yatsenko | Vadim Yatsenko | Fast Exact Method for Solving the Travelling Salesman Problem | 4 pages, 4 figures | null | null | null | cs.CC | null | This paper describes TSP exact solution of polynomial complexity. It is
considered properties of proposed method. Effectiveness of proposed solution is
illustrated by outcomes of computer modeling.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 02:39:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Yatsenko",
"Vadim",
""
]
]
|
cs/0702136 | Slavcho Shtrakov | Ivo Damyanov and Slavcho Shtrakov | Essential Inputs and Minimal Tree Automata | 7 pages, 1 figure, Sixth International Conference on Discrete
Mathematics and Applications, 31.08-02.09.2001, Bansko | Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 77-85 p | null | null | cs.CC cs.DM | null | We continue studying essential inputs of trees and automata. Strongly
essential inputs of trees are introduced and studied. Various examples for
application in Computer Science are shown.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 12:48:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Damyanov",
"Ivo",
""
],
[
"Shtrakov",
"Slavcho",
""
]
]
|
cs/0702137 | Slavcho Shtrakov | Slavcho Shtrakov | Tree Automata and Essential Subtrees | 9 pages, 2 figures, Sixth International Conference on Discrete
Mathematics and Applications, Bansko, 2001 | Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 51-60 p | null | null | cs.CC cs.DM | null | We introduce essential subtrees for terms (trees) and tree automata . There
are some results concerning independent sets of subtrees and separable sets for
a tree and an automaton.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 13:20:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
]
]
|
cs/0702139 | Alexander Kholosha | Tor Helleseth and Alexander Kholosha and Geir Jarle Ness | Characterization of $m$-Sequences of Lengths $2^{2k}-1$ and $2^k-1$ with
Three-Valued Crosscorrelation | 23 pages | null | null | null | cs.CR cs.DM | null | Considered is the distribution of the crosscorrelation between $m$-sequences
of length $2^m-1$, where $m=2k$, and $m$-sequences of shorter length $2^k-1$.
New pairs of $m$-sequences with three-valued crosscorrelation are found and the
complete correlation distribution is determined. Finally, we conjecture that
there are no more cases with a three-valued crosscorrelation apart from the
ones proven here.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 16:01:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Helleseth",
"Tor",
""
],
[
"Kholosha",
"Alexander",
""
],
[
"Ness",
"Geir Jarle",
""
]
]
|
cs/0702140 | Bernardo Huberman | Dennis M. Wilkinson and Bernardo A. Huberman | Assessing the Value of Coooperation in Wikipedia | null | null | null | null | cs.DL cs.CY physics.soc-ph | null | Since its inception six years ago, the online encyclopedia Wikipedia has
accumulated 6.40 million articles and 250 million edits, contributed in a
predominantly undirected and haphazard fashion by 5.77 million unvetted
volunteers. Despite the apparent lack of order, the 50 million edits by 4.8
million contributors to the 1.5 million articles in the English-language
Wikipedia follow strong certain overall regularities. We show that the
accretion of edits to an article is described by a simple stochastic mechanism,
resulting in a heavy tail of highly visible articles with a large number of
edits. We also demonstrate a crucial correlation between article quality and
number of edits, which validates Wikipedia as a successful collaborative
effort.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 17:59:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wilkinson",
"Dennis M.",
""
],
[
"Huberman",
"Bernardo A.",
""
]
]
|
cs/0702141 | Tanya Crenshaw | Tanya L. Crenshaw and Erin Wolf Chambers and Heather Metcalf and Umesh
Thakkar | Recruitment, Preparation, Retention: A case study of computing culture
at the University of Illinois at Urbana-Champaign | 37 pages, 13 figures. For better quality figures, please download the
.pdf from
http://www.cs.uiuc.edu/research/techreports.php?report=UIUCDCS-R-2007-2811 | null | null | UIUCDCS-R-2007-2811 | cs.GL | null | Computer science is seeing a decline in enrollment at all levels of
education, including undergraduate and graduate study. This paper reports on
the results of a study conducted at the University of Illinois at
Urbana-Champaign which evaluated students attitudes regarding three areas which
can contribute to improved enrollment in the Department of Computer Science:
Recruitment, preparation and retention. The results of our study saw two
themes. First, the department's tight research focus appears to draw
significant attention from other activities -- such as teaching, service, and
other community-building activities -- that are necessary for a department's
excellence. Yet, as demonstrated by our second theme, one partial solution is
to better promote such activities already employed by the department to its
students and faculty. Based on our results, we make recommendations for
improvements and enhancements based on the current state of practice at peer
institutions.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 00:34:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Crenshaw",
"Tanya L.",
""
],
[
"Chambers",
"Erin Wolf",
""
],
[
"Metcalf",
"Heather",
""
],
[
"Thakkar",
"Umesh",
""
]
]
|
cs/0702142 | Daniel Lemire | Daniel Lemire, Martin Brooks, Yuhong Yan | An Optimal Linear Time Algorithm for Quasi-Monotonic Segmentation | Appeared in ICDM 2005 | null | null | null | cs.DS cs.DB | null | Monotonicity is a simple yet significant qualitative characteristic. We
consider the problem of segmenting an array in up to K segments. We want
segments to be as monotonic as possible and to alternate signs. We propose a
quality metric for this problem, present an optimal linear time algorithm based
on novel formalism, and compare experimentally its performance to a linear time
top-down regression algorithm. We show that our algorithm is faster and more
accurate. Applications include pattern recognition and qualitative modeling.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 02:29:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lemire",
"Daniel",
""
],
[
"Brooks",
"Martin",
""
],
[
"Yan",
"Yuhong",
""
]
]
|
cs/0702145 | Srikumar Venugopal | Srikumar Venugopal, Krishna Nadiminti, Hussein Gibbins and Rajkumar
Buyya | Designing a Resource Broker for Heterogeneous Grids | 26 pages, 15 figures | null | null | GRIDS-TR-2007-2 | cs.DC cs.SE | null | Grids provide uniform access to aggregations of heterogeneous resources and
services such as computers, networks and storage owned by multiple
organizations. However, such a dynamic environment poses many challenges for
application composition and deployment. In this paper, we present the design of
the Gridbus Grid resource broker that allows users to create applications and
specify different objectives through different interfaces without having to
deal with the complexity of Grid infrastructure. We present the unique
requirements that motivated our design and discuss how these provide
flexibility in extending the functionality of the broker to support different
low-level middlewares and user interfaces. We evaluate the broker with
different job profiles and Grid middleware and conclude with the lessons learnt
from our development experience.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 08:35:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Venugopal",
"Srikumar",
""
],
[
"Nadiminti",
"Krishna",
""
],
[
"Gibbins",
"Hussein",
""
],
[
"Buyya",
"Rajkumar",
""
]
]
|
cs/0702152 | Andrew Gacek | Andrew Gacek and Gopalan Nadathur | A Simplified Suspension Calculus and its Relationship to Other Explicit
Substitution Calculi | 38 pages | null | null | null | cs.LO | null | This paper concerns the explicit treatment of substitutions in the lambda
calculus. One of its contributions is the simplification and rationalization of
the suspension calculus that embodies such a treatment. The earlier version of
this calculus provides a cumbersome encoding of substitution composition, an
operation that is important to the efficient realization of reduction. This
encoding is simplified here, resulting in a treatment that is easy to use
directly in applications. The rationalization consists of the elimination of a
practically inconsequential flexibility in the unravelling of substitutions
that has the inadvertent side effect of losing contextual information in terms;
the modified calculus now has a structure that naturally supports logical
analyses, such as ones related to the assignment of types, over lambda terms.
The overall calculus is shown to have pleasing theoretical properties such as a
strongly terminating sub-calculus for substitution and confluence even in the
presence of term meta variables that are accorded a grafting interpretation.
Another contribution of the paper is the identification of a broad set of
properties that are desirable for explicit substitution calculi to support and
a classification of a variety of proposed systems based on these. The
suspension calculus is used as a tool in this study. In particular, mappings
are described between it and the other calculi towards understanding the
characteristics of the latter.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2007 02:16:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gacek",
"Andrew",
""
],
[
"Nadathur",
"Gopalan",
""
]
]
|
cs/0702153 | Kyle Burke | Kyle Burke and Shang-Hua Teng | Games on the Sperner Triangle | 18 pages, 19 figures. Uses paithan.sty | null | null | null | cs.GT cs.CC | null | We create a new two-player game on the Sperner Triangle based on Sperner's
lemma. Our game has simple rules and several desirable properties. First, the
game is always certain to have a winner. Second, like many other interesting
games such as Hex and Geography, we prove that deciding whether one can win our
game is a PSPACE-complete problem. Third, there is an elegant balance in the
game such that neither the first nor the second player always has a decisive
advantage. We provide a web-based version of the game, playable at:
http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other
games, also based on fixed-point theorems.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2007 05:00:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burke",
"Kyle",
""
],
[
"Teng",
"Shang-Hua",
""
]
]
|
cs/0702157 | Matei Ripeanu | Matei Ripeanu, Adriana Iamnitchi, Ian Foster, Anne Rogers | In Search of Simplicity: A Self-Organizing Multi-Source Multicast
Overlay | null | null | null | DSL-TR-2007-02 | cs.DC cs.NI cs.PF | null | Multicast communication primitives have broad utility as building blocks for
distributed applications. The challenge is to create and maintain the
distributed structures that support these primitives while accounting for
volatile end nodes and variable network characteristics. Most solutions
proposed to date rely on complex algorithms or global information, thus
limiting the scale of deployments and acceptance outside the academic realm.
This article introduces a low-complexity, self organizing solution for
maintaining multicast trees, that we refer to as UMM (Unstructured Multi-source
Multicast). UMM uses traditional distributed systems techniques: layering,
soft-state, and passive data collection to adapt to the dynamics of the
physical network and maintain data dissemination trees. The result is a simple,
adaptive system with lower overheads than more complex alternatives. We have
implemented UMM and evaluated it on a 100-node PlanetLab testbed and on up to
1024-node emulated ModelNet networks Extensive experimental evaluations
demonstrate UMM's low overhead, efficient network usage compared to alternative
solutions, and ability to quickly adapt to network changes and to recover from
failures.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 19:42:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ripeanu",
"Matei",
""
],
[
"Iamnitchi",
"Adriana",
""
],
[
"Foster",
"Ian",
""
],
[
"Rogers",
"Anne",
""
]
]
|
cs/0702159 | Fabiano C. Botelho | Fabiano C. Botelho, Rasmus Pagh, Nivio Ziviani | Perfect Hashing for Data Management Applications | 12 pages | null | null | RT.DCC.002/2007 | cs.DS cs.DB | null | Perfect hash functions can potentially be used to compress data in connection
with a variety of data management tasks. Though there has been considerable
work on how to construct good perfect hash functions, there is a gap between
theory and practice among all previous methods on minimal perfect hashing. On
one side, there are good theoretical results without experimentally proven
practicality for large key sets. On the other side, there are the theoretically
analyzed time and space usage algorithms that assume that truly random hash
functions are available for free, which is an unrealistic assumption. In this
paper we attempt to bridge this gap between theory and practice, using a number
of techniques from the literature to obtain a novel scheme that is
theoretically well-understood and at the same time achieves an
order-of-magnitude increase in performance compared to previous ``practical''
methods. This improvement comes from a combination of a novel, theoretically
optimal perfect hashing scheme that greatly simplifies previous methods, and
the fact that our algorithm is designed to make good use of the memory
hierarchy. We demonstrate the scalability of our algorithm by considering a set
of over one billion URLs from the World Wide Web of average length 64, for
which we construct a minimal perfect hash function on a commodity PC in a
little more than 1 hour. Our scheme produces minimal perfect hash functions
using slightly more than 3 bits per key. For perfect hash functions in the
range $\{0,...,2n-1\}$ the space usage drops to just over 2 bits per key (i.e.,
one bit more than optimal for representing the key). This is significantly
below of what has been achieved previously for very large values of $n$.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 20:56:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Botelho",
"Fabiano C.",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Ziviani",
"Nivio",
""
]
]
|
cs/0702160 | Fran\c{c}ois Pitt | Fran\c{c}ois Pitt | A Quantifier-Free String Theory for ALOGTIME Reasoning | 147 pages, PhD thesis (completed in 2000) | null | null | null | cs.CC | null | The main contribution of this work is the definition of a quantifier-free
string theory T_1 suitable for formalizing ALOGTIME reasoning. After describing
L_1 -- a new, simple, algebraic characterization of the complexity class
ALOGTIME based on strings instead of numbers -- the theory T_1 is defined
(based on L_1), and a detailed formal development of T_1 is given.
Then, theorems of T_1 are shown to translate into families of propositional
tautologies that have uniform polysize Frege proofs, T_1 is shown to prove the
soundness of a particular Frege system F, and F is shown to provably p-simulate
any proof system whose soundness can be proved in T_1. Finally, T_1 is compared
with other theories for ALOGTIME reasoning in the literature.
To our knowledge, this is the first formal theory for ALOGTIME reasoning
whose basic objects are strings instead of numbers, and the first
quantifier-free theory formalizing ALOGTIME reasoning in which a direct proof
of the soundness of some Frege system has been given (in the case of
first-order theories, such a proof was first given by Arai for his theory AID).
Also, the polysize Frege proofs we give for the propositional translations of
theorems of T_1 are considerably simpler than those for other theories, and so
is our proof of the soundness of a particular F-system in T_1. Together with
the simplicity of T_1's recursion schemes, axioms, and rules these facts
suggest that T_1 is one of the most natural theories available for ALOGTIME
reasoning.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 02:59:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pitt",
"François",
""
]
]
|
cs/0702163 | Roderick Melnik | Di Zhang and Roderick V.N. Melnik | First Passage Time for Multivariate Jump-diffusion Stochastic Models
With Applications in Finance | Keywords: Monte-Carlo simulations, first passage time, multivariate
jump-diffusion process; 10 pages, 3 figures | null | null | null | cs.CE cs.NA | null | The ``first passage-time'' (FPT) problem is an important problem with a wide
range of applications in mathematics, physics, biology and finance.
Mathematically, such a problem can be reduced to estimating the probability of
a (stochastic) process first to reach a critical level or threshold. While in
other areas of applications the FPT problem can often be solved analytically,
in finance we usually have to resort to the application of numerical
procedures, in particular when we deal with jump-diffusion stochastic processes
(JDP). In this paper, we develop a Monte-Carlo-based methodology for the
solution of the FPT problem in the context of a multivariate jump-diffusion
stochastic process. The developed methodology is tested by using different
parameters, the simulation results indicate that the developed methodology is
much more efficient than the conventional Monte Carlo method. It is an
efficient tool for further practical applications, such as the analysis of
default correlation and predicting barrier options in finance.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 10:39:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhang",
"Di",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.