id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0603092 | Himanshu Thapliyal | Himanshu Thapliyal and M.B Srinivas | An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible
Sequential Circuits using Fredkin Gates | 7 Pages: Deals with design of reversible sequential circuits.
Published: Proceedings of SPIE Volume: 6050, pp.196-202.Optomechatronic
Micro/Nano Devices and Components, Sapporo, Japan, December 5-7, 2005;
Editor(s): Yoshitada Katagiri | null | null | null | cs.AR | null | In recent years, reversible logic has emerged as a promising computing
paradigm having its applications in low power computing, quantum computing,
nanotechnology, optical computing and DNA computing. The classical set of gates
such as AND, OR, and EXOR are not reversible. Recently, it has been shown how
to encode information in DNA and use DNA amplification to implement Fredkin
gates. Furthermore, in the past Fredkin gates have been constructed using DNA,
whose outputs are used as inputs for other Fredkin gates. Thus, it can be
concluded that arbitrary circuits of Fredkin gates can be constructed using
DNA. This paper provides the initial threshold to building of more complex
system having reversible sequential circuits and which can execute more
complicated operations. The novelty of the paper is the reversible designs of
sequential circuits using Fredkin gate. Since, Fredkin gate has already been
realized using DNA, it is expected that this work will initiate the building of
complex systems using DNA. The reversible circuits designed here are highly
optimized in terms of number of gates and garbage outputs. The modularization
approach that is synthesizing small circuits and thereafter using them to
construct bigger circuits is used for designing the optimal reversible
sequential circuits.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2006 08:33:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B",
""
]
] |
cs/0603099 | Alin Suciu PhD | Alin Suciu, Rodica Potolea, Tudor Muresan | Benchmark Problems for Constraint Solving | null | null | null | null | cs.PF cs.SC | null | Constraint Programming is roughly a new software technology introduced by
Jaffar and Lassez in 1987 for description and effective solving of large,
particularly combinatorial, problems especially in areas of planning and
scheduling. In the following we define three problems for constraint solving
from the domain of electrical networks; based on them we define 43 related
problems. For the defined set of problems we benchmarked five systems: ILOG
OPL, AMPL, GAMS, Mathematica and UniCalc. As expected some of the systems
performed very well for some problems while others performed very well on
others.
| [
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:19:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Suciu",
"Alin",
""
],
[
"Potolea",
"Rodica",
""
],
[
"Muresan",
"Tudor",
""
]
] |
cs/0603100 | Alin Suciu PhD | Alin Suciu, Kalman Pusztai | Efficient Compression of Prolog Programs | null | null | null | null | cs.PL | null | We propose a special-purpose class of compression algorithms for efficient
compression of Prolog programs. It is a dictionary-based compression method,
specially designed for the compression of Prolog code, and therefore we name it
PCA (Prolog Compression Algorithm). According to the experimental results this
method provides better compression than state-of-the-art general-purpose
compression algorithms. Since the algorithm works with Prolog syntactic
entities (e.g. atoms, terms, etc.) the implementation of a Prolog prototype is
straightforward and very easy to use in any Prolog application that needs
compression. Although the algorithm is designed for Prolog programs, the idea
can be easily applied for the compression of programs written in other (logic)
languages.
| [
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:27:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Suciu",
"Alin",
""
],
[
"Pusztai",
"Kalman",
""
]
] |
cs/0603101 | Alin Suciu PhD | Alin Suciu, Kalman Pusztai, Andrei Vancea | Prolog Server Pages | null | null | null | null | cs.NI cs.PL | null | Prolog Server Pages (PSP) is a scripting language, based on Prolog, than can
be embedded in HTML documents. To run PSP applications one needs a web server,
a web browser and a PSP interpreter. The code is executed, by the interpreter,
on the server-side (web server) and the output (together with the html code in
witch the PSP code is embedded) is sent to the client-side (browser). The
current implementation supports Apache Web Server. We implemented an Apache web
server module that handles PSP files, and sends the result (an html document)
to the client. PSP supports both GET and POST http requests. It also provides
methods for working with http cookies.
| [
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:35:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Suciu",
"Alin",
""
],
[
"Pusztai",
"Kalman",
""
],
[
"Vancea",
"Andrei",
""
]
] |
cs/0603102 | Alin Suciu PhD | Alin Suciu, Kalman Pusztai, Andrei Diaconu | Enhanced Prolog Remote Predicate Call Protocol | null | null | null | null | cs.NI cs.PL | null | Following the ideas of the Remote Procedure Call model, we have developed a
logic programming counterpart, naturally called Prolog Remote Predicate Call
(Prolog RPC). The Prolog RPC protocol facilitates the integration of Prolog
code in multi-language applications as well as the development of distributed
intelligent applications. One use of the protocol's most important uses could
be the development of distributed applications that use Prolog at least
partially to achieve their goals. Most notably the Distributed Artificial
Intelligence (DAI) applications that are suitable for logic programming can
profit from the use of the protocol. After proving its usefulness, we went
further, developing a new version of the protocol, making it more reliable and
extending its functionality. Because it has a new syntax and the new set of
commands, we call this version Enhanced Prolog Remote Procedure Call. This
paper describes the new features and modifications this second version
introduced.
| [
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:44:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Suciu",
"Alin",
""
],
[
"Pusztai",
"Kalman",
""
],
[
"Diaconu",
"Andrei",
""
]
] |
cs/0603104 | Patrick Baillot | Vincent Atassi (LIPN), Patrick Baillot (LIPN), Kazushige Terui (NII) | Verification of Ptime reducibility for system F terms via Dual Light
Affine Logic | 21 pages | A para\^{i}tre dans Proceedings Computer Science Logic 2006
(CSL'06), LNCS, Springer. (2006) | null | null | cs.LO | null | In a previous work we introduced Dual Light Affine Logic (DLAL)
([BaillotTerui04]) as a variant of Light Linear Logic suitable for guaranteeing
complexity properties on lambda-calculus terms: all typable terms can be
evaluated in polynomial time and all Ptime functions can be represented. In the
present work we address the problem of typing lambda-terms in second-order
DLAL. For that we give a procedure which, starting with a term typed in system
F, finds all possible ways to decorate it into a DLAL typed term. We show that
our procedure can be run in time polynomial in the size of the original Church
typed system F term.
| [
{
"version": "v1",
"created": "Mon, 27 Mar 2006 09:14:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Atassi",
"Vincent",
"",
"LIPN"
],
[
"Baillot",
"Patrick",
"",
"LIPN"
],
[
"Terui",
"Kazushige",
"",
"NII"
]
] |
cs/0603107 | Pedro Fortuny Ayuso | Pedro Fortuny Ayuso | Towards an information-theoretically safe cryptographic protocol | 2 pages | null | null | null | cs.CR | null | We introduce what --if some kind of group action exists-- is a truly
(information theoretically) safe cryptographic communication system: a protocol
which provides \emph{zero} information to any passive adversary having full
access to the channel.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2006 17:47:11 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Mar 2006 21:27:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ayuso",
"Pedro Fortuny",
""
]
] |
cs/0603108 | Michael Brinkmeier | Michael Brinkmeier | Minimizing Symmetric Set Functions Faster | 9 pages | null | null | null | cs.DM math.CO | null | We describe a combinatorial algorithm which, given a monotone and consistent
symmetric set function d on a finite set V in the sense of Rizzi, constructs a
non trivial set S minimizing d(S,V-S). This includes the possibility for the
minimization of symmetric submodular functions. The presented algorithm
requires at most as much time as the one described by Rizzi, but depending on
the function d, it may allow several improvements.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2006 10:25:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brinkmeier",
"Michael",
""
]
] |
cs/0603110 | Marcus Hutter | Daniil Ryabko and Marcus Hutter | Asymptotic Learnability of Reinforcement Problems with Arbitrary
Dependence | 15 pages | Proc. 17th International Conf. on Algorithmic Learning Theory (ALT
2006) pages 334-347 | null | IDSIA-09-06 | cs.LG cs.AI | null | We address the problem of reinforcement learning in which observations may
exhibit an arbitrary form of stochastic dependence on past observations and
actions. The task for an agent is to attain the best possible asymptotic reward
where the true generating environment is unknown but belongs to a known
countable family of environments. We find some sufficient conditions on the
class of environments under which an agent exists which attains the best
asymptotic reward for any environment in the class. We analyze how tight these
conditions are and how they relate to different probabilistic assumptions known
in reinforcement learning and related fields, such as Markov Decision Processes
and mixing conditions.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2006 16:22:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ryabko",
"Daniil",
""
],
[
"Hutter",
"Marcus",
""
]
] |
cs/0603111 | Tomasz Blachowicz | T. Blachowicz and M. Wieja | Remote-control and clustering of physical computations using the XML-RPC
protocol and the open-Mosix system | 18 pages, 2 figures | null | null | null | cs.DC cs.NI | null | The applications of the remote control of physical simulations performed in
clustered computers running under an open-Mosix system are presented. Results
from the simulation of a 2-dimensional ferromagnetic system of spins in the
Ising scheme are provided. Basic parameters of a simulated hysteresis loop like
coercivity and exchange bias due to pinning of ferromagnetic spins are given.
The paper describes in physicists terminology a cost effective solution which
utilizes an XML-RPC protocol (Extensible Markup Language - Remote Procedure
Calling) and standard C++ and Python languages.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2006 20:45:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Blachowicz",
"T.",
""
],
[
"Wieja",
"M.",
""
]
] |
cs/0603114 | William Yurcik | Gregory A. Pluta, Larry Brumbaugh, William Yurcik | Using SMART for Customized Monitoring of Windows Services | 15 pages, 10 figures, 2 tables | null | null | null | cs.NI cs.CR | null | We focus on examining and working with an important category of computer
software called Services, which are provided as a part of newer Microsoft
Windows operating systems. A typical Windows user transparently utilizes many
of these services but is frequently unaware of their existence. Since some
services have the potential to create significant problems when they are
executing, it is important for a system administrator to identify which
services are running on the network, the types of processing done by each
service, and any interrelationships among the various services. This
information can then be used to improve the overall integrity of both the
individual computer where a questionable service is running and in aggregate an
entire network of computers.
NCSA has developed an application called SMART (Services Monitoring And
Reporting Tool) that can be used to identify and display all services currently
running in the network. A commercial program called Hyena remotely monitors the
services on all computers attached to the network and exports this information
to SMART. SMART produces various outputs that the system administrator can
analyze and then determine appropriate actions to take. In particular, SMART
provides a color coordinated user interface to quickly identify and classify
both potentially hazardous services and also unknown services.
| [
{
"version": "v1",
"created": "Wed, 29 Mar 2006 05:25:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pluta",
"Gregory A.",
""
],
[
"Brumbaugh",
"Larry",
""
],
[
"Yurcik",
"William",
""
]
] |
cs/0603115 | David Defour | Guillaume Da Gra\c{c}ca (LP2A), David Defour (LP2A) | Implementation of float-float operators on graphics hardware | null | null | null | null | cs.AR cs.GR | null | The Graphic Processing Unit (GPU) has evolved into a powerful and flexible
processor. The latest graphic processors provide fully programmable vertex and
pixel processing units that support vector operations up to single
floating-point precision. This computational power is now being used for
general-purpose computations. However, some applications require higher
precision than single precision. This paper describes the emulation of a 44-bit
floating-point number format and its corresponding operations. An
implementation is presented along with performance and accuracy results.
| [
{
"version": "v1",
"created": "Wed, 29 Mar 2006 11:48:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Da Graçca",
"Guillaume",
"",
"LP2A"
],
[
"Defour",
"David",
"",
"LP2A"
]
] |
cs/0603117 | Yves Bertot | Yves Bertot (INRIA Sophia Antipolis) | Affine functions and series with co-inductive real numbers | null | Mathematical Structures in Computer Science 17, 1 (2006) | null | null | cs.LO | null | We extend the work of A. Ciaffaglione and P. Di Gianantonio on mechanical
verification of algorithms for exact computation on real numbers, using
infinite streams of digits implemented as co-inductive types. Four aspects are
studied: the first aspect concerns the proof that digit streams can be related
to the axiomatized real numbers that are already axiomatized in the proof
system (axiomatized, but with no fixed representation). The second aspect
re-visits the definition of an addition function, looking at techniques to let
the proof search mechanism perform the effective construction of an algorithm
that is correct by construction. The third aspect concerns the definition of a
function to compute affine formulas with positive rational coefficients. This
should be understood as a testbed to describe a technique to combine
co-recursion and recursion to obtain a model for an algorithm that appears at
first sight to be outside the expressive power allowed by the proof system. The
fourth aspect concerns the definition of a function to compute series, with an
application on the series that is used to compute Euler's number e. All these
experiments should be reproducible in any proof system that supports
co-inductive types, co-recursion and general forms of terminating recursion,
but we performed with the Coq system [12, 3, 14].
| [
{
"version": "v1",
"created": "Wed, 29 Mar 2006 19:36:03 GMT"
},
{
"version": "v2",
"created": "Mon, 1 May 2006 07:38:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
] |
cs/0603119 | Yves Bertot | Yves Bertot (INRIA Sophia Antipolis) | CoInduction in Coq | null | null | null | null | cs.LO | null | We describe the basic notions of co-induction as they are available in the
coq system. As an application, we describe arithmetic properties for simple
representations of real numbers.
| [
{
"version": "v1",
"created": "Wed, 29 Mar 2006 19:39:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
] |
cs/0603120 | Zengyou He | Zengyou He | Approximation Algorithms for K-Modes Clustering | 7 pages | null | null | Tr-06-0330 | cs.AI | null | In this paper, we study clustering with respect to the k-modes objective
function, a natural formulation of clustering for categorical data. One of the
main contributions of this paper is to establish the connection between k-modes
and k-median, i.e., the optimum of k-median is at most twice the optimum of
k-modes for the same categorical data clustering problem. Based on this
observation, we derive a deterministic algorithm that achieves an approximation
factor of 2. Furthermore, we prove that the distance measure in k-modes defines
a metric. Hence, we are able to extend existing approximation algorithms for
metric k-median to k-modes. Empirical results verify the superiority of our
method.
| [
{
"version": "v1",
"created": "Thu, 30 Mar 2006 02:02:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
]
] |
cs/0603121 | Scott Turner | Scott Turner, Manuel A. Perez-Quinones and Stephen H. Edwards | minimUML: A Minimalist Approach to UML Diagraming for Early Computer
Science Education | 38 pages, 15 figures | null | null | null | cs.HC cs.SE | null | The Unified Modeling Language (UML) is commonly used in introductory Computer
Science to teach basic object-oriented design. However, there appears to be a
lack of suitable software to support this task. Many of the available programs
that support UML focus on developing code and not on enhancing learning. Those
that were designed for educational use sometimes have poor interfaces or are
missing common and important features, such as multiple selection and
undo/redo. There is a need for software that is tailored to an instructional
environment and has all the useful and needed functionality for that specific
task. This is the purpose of minimUML. minimUML provides a minimum amount of
UML, just what is commonly used in beginning programming classes, while
providing a simple, usable interface. In particular, minimUML was designed to
support abstract design while supplying features for exploratory learning and
error avoidance. In addition, it allows for the annotation of diagrams, through
text or freeform drawings, so students can receive feedback on their work.
minimUML was developed with the goal of supporting ease of use, supporting
novice students, and a requirement of no prior-training for its use.
| [
{
"version": "v1",
"created": "Thu, 30 Mar 2006 06:12:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turner",
"Scott",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
],
[
"Edwards",
"Stephen H.",
""
]
] |
cs/0603125 | Russ Abbott | Russ Abbott | If a tree casts a shadow is it telling the time? | 12 pages. Submitted for conference presentation | null | null | null | cs.MA cs.GL | null | Physical processes are computations only when we use them to externalize
thought. Computation is the performance of one or more fixed processes within a
contingent environment. We reformulate the Church-Turing thesis so that it
applies to programs rather than to computability. When suitably formulated
agent-based computing in an open, multi-scalar environment represents the
current consensus view of how we interact with the world. But we don't know how
to formulate multi-scalar environments.
| [
{
"version": "v1",
"created": "Thu, 30 Mar 2006 22:31:26 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jun 2006 01:49:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abbott",
"Russ",
""
]
] |
cs/0603127 | Russ Abbott | Russ Abbott | Complex Systems + Systems Engineering = Complex Systems Engineeri | 10 pages. Position paper to be presented at Conference on Systems
Engineering Research | null | null | null | cs.MA | null | One may define a complex system as a system in which phenomena emerge as a
consequence of multiscale interaction among the system's components and their
environments. The field of Complex Systems is the study of such
systems--usually naturally occurring, either bio-logical or social. Systems
Engineering may be understood to include the conceptualising and building of
systems that consist of a large number of concurrently operating and
interacting components--usually including both human and non-human elements. It
has become increasingly apparent that the kinds of systems that systems
engineers build have many of the same multiscale characteristics as those of
naturally occurring complex systems. In other words, systems engineering is the
engineering of complex systems. This paper and the associated panel will
explore some of the connections between the fields of complex systems and
systems engineering.
| [
{
"version": "v1",
"created": "Thu, 30 Mar 2006 22:58:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abbott",
"Russ",
""
]
] |
cs/0603129 | Damiano Bolzoni | Xiamoneg Su, Damiano Bolzoni, Pascal van Eck | A Business Goal Driven Approach for Understanding and Specifying
Information Security Requirements | null | null | null | TR-CTIT-06-08 | cs.CR | null | In this paper we present an approach for specifying and prioritizing
information security requirements in organizations. It is important to
prioritize security requirements since hundred per cent security is not
achievable and the limited resources available should be directed to satisfy
the most important ones. We propose to link explicitly security requirements
with the organization's business vision, i.e. to provide business rationale for
security requirements. The rationale is then used as a basis for comparing the
importance of different security requirements. A conceptual framework is
presented, where the relationships between business vision, critical impact
factors and valuable assets (together with their security requirements) are
shown.
| [
{
"version": "v1",
"created": "Fri, 31 Mar 2006 13:15:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Su",
"Xiamoneg",
""
],
[
"Bolzoni",
"Damiano",
""
],
[
"van Eck",
"Pascal",
""
]
] |
cs/0603132 | Michael McGuigan | Michael McGuigan | Graphics Turing Test | 6 pages | null | null | null | cs.GR | null | We define a Graphics Turing Test to measure graphics performance in a similar
manner to the definition of the traditional Turing Test. To pass the test one
needs to reach a computational scale, the Graphics Turing Scale, for which
Computer Generated Imagery becomes comparatively indistinguishable from real
images while also being interactive. We derive an estimate for this
computational scale which, although large, is within reach of todays
supercomputers. We consider advantages and disadvantages of various computer
systems designed to pass the Graphics Turing Test. Finally we discuss
commercial applications from the creation of such a system, in particular
Interactive Cinema.
| [
{
"version": "v1",
"created": "Fri, 31 Mar 2006 19:58:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McGuigan",
"Michael",
""
]
] |
cs/0604001 | Fabrice Rossi | Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Brieuc
Conan-Guez (LITA) | Theoretical Properties of Projection Based Multilayer Perceptrons with
Functional Inputs | null | null | 10.1007/s11063-005-3100-2 | null | cs.NE | null | Many real world data are sampled functions. As shown by Functional Data
Analysis (FDA) methods, spectra, time series, images, gesture recognition data,
etc. can be processed more efficiently if their functional nature is taken into
account during the data analysis process. This is done by extending standard
data analysis methods so that they can apply to functional inputs. A general
way to achieve this goal is to compute projections of the functional data onto
a finite dimensional sub-space of the functional space. The coordinates of the
data on a basis of this sub-space provide standard vector representations of
the functions. The obtained vectors can be processed by any standard method. In
our previous work, this general approach has been used to define projection
based Multilayer Perceptrons (MLPs) with functional inputs. We study in this
paper important theoretical properties of the proposed model. We show in
particular that MLPs with functional inputs are universal approximators: they
can approximate to arbitrary accuracy any continuous mapping from a compact
sub-space of a functional space to R. Moreover, we provide a consistency result
that shows that any mapping from a functional space to R can be learned thanks
to examples by a projection based MLP: the generalization mean square error of
the MLP decreases to the smallest possible mean square error on the data when
the number of examples goes to infinity.
| [
{
"version": "v1",
"created": "Sat, 1 Apr 2006 20:16:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Conan-Guez",
"Brieuc",
"",
"LITA"
]
] |
cs/0604002 | Leopoldo Bertossi | Andrei Lopatenko and Leopoldo Bertossi | Complexity of Consistent Query Answering in Databases under
Cardinality-Based and Incremental Repair Semantics | 26 pages, 2 figures | null | null | null | cs.DB cs.CC | null | Consistent Query Answering (CQA) is the problem of computing from a database
the answers to a query that are consistent with respect to certain integrity
constraints that the database, as a whole, may fail to satisfy. Consistent
answers have been characterized as those that are invariant under certain
minimal forms of restoration of the database consistency. We investigate
algorithmic and complexity theoretic issues of CQA under database repairs that
minimally depart -wrt the cardinality of the symmetric difference- from the
original database. We obtain first tight complexity bounds.
We also address the problem of incremental complexity of CQA, that naturally
occurs when an originally consistent database becomes inconsistent after the
execution of a sequence of update operations. Tight bounds on incremental
complexity are provided for various semantics under denial constraints. Fixed
parameter tractability is also investigated in this dynamic context, where the
size of the update sequence becomes the relevant parameter.
| [
{
"version": "v1",
"created": "Sun, 2 Apr 2006 03:07:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lopatenko",
"Andrei",
""
],
[
"Bertossi",
"Leopoldo",
""
]
] |
cs/0604003 | Petrus H Potgieter | Petrus H. Potgieter | Hypercomputing the Mandelbrot Set? | 11 pages, 2 figures | null | null | null | cs.CC | null | The Mandelbrot set is an extremely well-known mathematical object that can be
described in a quite simple way but has very interesting and non-trivial
properties. This paper surveys some results that are known concerning the
(non-)computability of the set. It considers two models of decidability over
the reals (which have been treated much more thoroughly and technically by
Hertling (2005), Blum, Shub and Smale, Brattka (2003) and Weihrauch (1999 and
2003) among others), two over the computable reals (the Russian school and
hypercomputation) and a model over the rationals.
| [
{
"version": "v1",
"created": "Sun, 2 Apr 2006 15:31:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Potgieter",
"Petrus H.",
""
]
] |
cs/0604004 | Alexander Evako | Alexander V. Evako | The Poincare conjecture for digital spaces. Properties of digital
n-dimensional disks and spheres | null | null | null | null | cs.DM cs.CV math.AT | null | Motivated by the Poincare conjecture, we study properties of digital
n-dimensional spheres and disks, which are digital models of their continuous
counterparts. We introduce homeomorphic transformations of digital manifolds,
which retain the connectedness, the dimension, the Euler characteristics and
the homology groups of manifolds. We find conditions where an n-dimensional
digital manifold is the n-dimensional digital sphere and discuss the link
between continuous closed n-manifolds and their digital models.
| [
{
"version": "v1",
"created": "Sun, 2 Apr 2006 19:55:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Evako",
"Alexander V.",
""
]
] |
cs/0604006 | David Bateman | David Bateman and Andy Adler | Sparse Matrix Implementation in Octave | null | null | null | Octave2006/04 | cs.MS | null | There are many classes of mathematical problems which give rise to matrices,
where a large number of the elements are zero. In this case it makes sense to
have a special matrix type to handle this class of problems where only the
non-zero elements of the matrix are stored. Not only does this reduce the
amount of memory to store the matrix, but it also means that operations on this
type of matrix can take advantage of the a-priori knowledge of the positions of
the non-zero elements to accelerate their calculations. A matrix type that
stores only the non-zero elements is generally called sparse.
Until recently Octave has lacked a full implementation of sparse matrices.
This article address the implementation of sparse matrices within Octave,
including their storage, creation, fundamental algorithms used, their
implementations and the basic operations and functions implemented for sparse
matrices. Mathematical issues such as the return types of sparse operations,
matrix fill-in and reordering for sparse matrix factorization is discussed in
the context of a real example.
Benchmarking of Octave's implementation of sparse operations compared to
their equivalent in Matlab are given and their implications discussed. Results
are presented for multiplication and linear algebra operations for various
matrix orders and densities. Furthermore, the use of Octave's sparse matrix
implementation is demonstrated using a real example of a finite element model
(FEM) problem. Finally, the method of using sparse matrices with Octave's
oct-files is discussed. The means of creating, using and returning sparse
matrices within oct-files is discussed as well as the differences between
Octave's Sparse and Array classes.
| [
{
"version": "v1",
"created": "Mon, 3 Apr 2006 12:56:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bateman",
"David",
""
],
[
"Adler",
"Andy",
""
]
] |
cs/0604007 | Guillaume Theyssier | Laurent Boyer (LIP), Victor Poupet (LIP), Guillaume Theyssier
(LM-Savoie) | On the Complexity of Limit Sets of Cellular Automata Associated with
Probability Measures | null | Mathematical Foundations of Computer Science 2006Springer (Ed.)
(28/08/2006) 190-201 | null | null | cs.DM cs.CC math.DS | null | We study the notion of limit sets of cellular automata associated with
probability measures (mu-limit sets). This notion was introduced by P. Kurka
and A. Maass. It is a refinement of the classical notion of omega-limit sets
dealing with the typical long term behavior of cellular automata. It focuses on
the words whose probability of appearance does not tend to 0 as time tends to
infinity (the persistent words). In this paper, we give a characterisation of
the persistent language for non sensible cellular automata associated with
Bernouilli measures. We also study the computational complexity of these
languages. We show that the persistent language can be non-recursive. But our
main result is that the set of quasi-nilpotent cellular automata (those with a
single configuration in their mu-limit set) is neither recursively enumerable
nor co-recursively enumerable.
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2006 10:21:36 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Oct 2006 08:53:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boyer",
"Laurent",
"",
"LIP"
],
[
"Poupet",
"Victor",
"",
"LIP"
],
[
"Theyssier",
"Guillaume",
"",
"LM-Savoie"
]
] |
cs/0604008 | Sandor P. Fekete | Esther M. Arkin and Herve Broennimann and Jeff Erickson and Sandor P.
Fekete and Christian Knauer and Jonathan Lenchner and Joseph S. B. Mitchell
and Kim Whittlesey | Minimum-Cost Coverage of Point Sets by Disks | 10 pages, 4 figures, Latex, to appear in ACM Symposium on
Computational Geometry 2006 | null | null | null | cs.DS cs.CG | null | We consider a class of geometric facility location problems in which the goal
is to determine a set X of disks given by their centers (t_j) and radii (r_j)
that cover a given set of demand points Y in the plane at the smallest possible
cost. We consider cost functions of the form sum_j f(r_j), where f(r)=r^alpha
is the cost of transmission to radius r. Special cases arise for alpha=1 (sum
of radii) and alpha=2 (total area); power consumption models in wireless
network design often use an exponent alpha>2. Different scenarios arise
according to possible restrictions on the transmission centers t_j, which may
be constrained to belong to a given discrete set or to lie on a line, etc. We
obtain several new results, including (a) exact and approximation algorithms
for selecting transmission points t_j on a given line in order to cover demand
points Y in the plane; (b) approximation algorithms (and an algebraic
intractability result) for selecting an optimal line on which to place
transmission points to cover Y; (c) a proof of NP-hardness for a discrete set
of transmission points in the plane and any fixed alpha>1; and (d) a
polynomial-time approximation scheme for the problem of computing a minimum
cost covering tour (MCCT), in which the total cost is a linear combination of
the transmission cost for the set of disks and the length of a tour/path that
connects the centers of the disks.
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2006 17:24:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arkin",
"Esther M.",
""
],
[
"Broennimann",
"Herve",
""
],
[
"Erickson",
"Jeff",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Knauer",
"Christian",
""
],
[
"Lenchner",
"Jonathan",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Whittlesey",
"Kim",
""
]
] |
cs/0604009 | Alexey Melkikh | Alexey V. Melkikh | Can an Organism Adapt Itself to Unforeseen Circumstances? | null | null | null | null | cs.AI | null | A model of an organism as an autonomous intelligent system has been proposed.
This model was used to analyze learning of an organism in various environmental
conditions. Processes of learning were divided into two types: strong and weak
processes taking place in the absence and the presence of aprioristic
information about an object respectively. Weak learning is synonymous to
adaptation when aprioristic programs already available in a system (an
organism) are started. It was shown that strong learning is impossible for both
an organism and any autonomous intelligent system. It was shown also that the
knowledge base of an organism cannot be updated. Therefore, all behavior
programs of an organism are congenital. A model of a conditioned reflex as a
series of consecutive measurements of environmental parameters has been
advanced. Repeated measurements are necessary in this case to reduce the error
during decision making.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2006 10:29:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Melkikh",
"Alexey V.",
""
]
] |
cs/0604011 | Noam Shental | Gad Getz, Noam Shental, Eytan Domany | Semi-Supervised Learning -- A Statistical Physics Approach | 9 pages. Appeared in in the Proceedings of "Learning with Partially
Classified Training Data", ICML 2005 workshop | null | null | null | cs.LG cond-mat.stat-mech cs.CV | null | We present a novel approach to semi-supervised learning which is based on
statistical physics. Most of the former work in the field of semi-supervised
learning classifies the points by minimizing a certain energy function, which
corresponds to a minimal k-way cut solution. In contrast to these methods, we
estimate the distribution of classifications, instead of the sole minimal k-way
cut, which yields more accurate and robust results. Our approach may be applied
to all energy functions used for semi-supervised learning. The method is based
on sampling using a Multicanonical Markov chain Monte-Carlo algorithm, and has
a straightforward probabilistic interpretation, which allows for soft
assignments of points to classes, and also to cope with yet unseen class types.
The suggested approach is demonstrated on a toy data set and on two real-life
data sets of gene expression.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2006 18:07:31 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2006 12:23:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Getz",
"Gad",
""
],
[
"Shental",
"Noam",
""
],
[
"Domany",
"Eytan",
""
]
] |
cs/0604012 | Sreeram Vuppala | Sreeram Vuppala | The Aryabhata Algorithm Using Least Absolute Remainders | 9 pages | null | null | null | cs.CR | null | This paper presents an introduction to the Aryabhata algorithm for finding
multiplicative inverses and solving linear congruences, both of which have
applications in cryptography. We do so by the use of the least absolute
remainders. The exposition of the Aryabhata algorithm provided here can have
performance that could exceed what was described recently by Rao and Yang.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2006 19:18:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vuppala",
"Sreeram",
""
]
] |
cs/0604013 | Shripad Thite | Shripad Thite | On Covering a Graph Optimally with Induced Subgraphs | 9 pages | null | null | null | cs.DM | null | We consider the problem of covering a graph with a given number of induced
subgraphs so that the maximum number of vertices in each subgraph is minimized.
We prove NP-completeness of the problem, prove lower bounds, and give
approximation algorithms for certain graph classes.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 17:06:51 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2006 07:44:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thite",
"Shripad",
""
]
] |
cs/0604014 | Habibi Omar Jr. | O. Habibi, U.R. Patihnedj, M.O. Dhar | Towards Analog Reverse Time Computation | null | null | null | null | cs.CC | null | We report the consequences of a destabilization process on a simulated
General Purpose Analog Computer. This new technology overcomes problems linked
with serial ambiguity, and provides an analog bias to encode algorithms whose
complexity is over polynomial. We also implicitly demonstrate how
countermesures of the Stochastic Aperture Degeneracy could efficiently reach
higher computational classes, and would open a road towards Analog Reverse Time
Computation.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2006 23:40:56 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2006 09:39:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Habibi",
"O.",
""
],
[
"Patihnedj",
"U. R.",
""
],
[
"Dhar",
"M. O.",
""
]
] |
cs/0604015 | Dmitri Krioukov | Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley, kc claffy | Revealing the Autonomous System Taxonomy: The Machine Learning Approach | null | PAM 2006, best paper award | null | null | cs.NI cs.LG | null | Although the Internet AS-level topology has been extensively studied over the
past few years, little is known about the details of the AS taxonomy. An AS
"node" can represent a wide variety of organizations, e.g., large ISP, or small
private business, university, with vastly different network characteristics,
external connectivity patterns, network growth tendencies, and other properties
that we can hardly neglect while working on veracious Internet representations
in simulation environments. In this paper, we introduce a radically new
approach based on machine learning techniques to map all the ASes in the
Internet into a natural AS taxonomy. We successfully classify 95.3% of ASes
with expected accuracy of 78.1%. We release to the community the AS-level
topology dataset augmented with: 1) the AS taxonomy information and 2) the set
of AS attributes we used to classify ASes. We believe that this dataset will
serve as an invaluable addition to further understanding of the structure and
evolution of the Internet.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 00:08:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Riley",
"George",
""
],
[
"claffy",
"kc",
""
]
] |
cs/0604016 | Michael Baer | Michael B. Baer | On Conditional Branches in Optimal Search Trees | 8 pages, 5 figures (with 10 illustrations total), 1 table;
reformatted with some additional notes | null | null | null | cs.PF cs.DS cs.IR | null | Algorithms for efficiently finding optimal alphabetic decision trees -- such
as the Hu-Tucker algorithm -- are well established and commonly used. However,
such algorithms generally assume that the cost per decision is uniform and thus
independent of the outcome of the decision. The few algorithms without this
assumption instead use one cost if the decision outcome is ``less than'' and
another cost otherwise. In practice, neither assumption is accurate for
software optimized for today's microprocessors. Such software generally has one
cost for the more likely decision outcome and a greater cost -- often far
greater -- for the less likely decision outcome. This problem and
generalizations thereof are thus applicable to hard coding static decision tree
instances in software, e.g., for optimizing program bottlenecks or for
compiling switch statements. An O(n^3)-time O(n^2)-space dynamic programming
algorithm can solve this optimal binary decision tree problem, and this
approach has many generalizations that optimize for the behavior of processors
with predictive branch capabilities, both static and dynamic. Solutions to this
formulation are often faster in practice than ``optimal'' decision trees as
formulated in the literature. Different search paradigms can sometimes yield
even better performance.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 00:54:44 GMT"
},
{
"version": "v2",
"created": "Tue, 23 May 2006 05:07:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baer",
"Michael B.",
""
]
] |
cs/0604018 | Suneel Madhekar | Madhekar Suneel | Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map | Submitted to the Indian Academy of Sciences for possible publication
in Sadhana (Academy Proceedings in Engineering Sciences). Results of
statistical tests included. Introduction revised | null | null | null | cs.CR nlin.CD | null | A scheme for pseudo-random binary sequence generation based on the
two-dimensional discrete-time Henon map is proposed. Properties of the proposed
sequences pertaining to linear complexity, linear complexity profile,
correlation and auto-correlation are investigated. All these properties of the
sequences suggest a strong resemblance to random sequences. Results of
statistical testing of the sequences are found encouraging. An attempt is made
to estimate the keyspace size if the proposed scheme is used for cryptographic
applications. The keyspace size is found to be large and is dependent on the
precision of the computing platform used.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 09:13:55 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Aug 2006 16:56:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Suneel",
"Madhekar",
""
]
] |
cs/0604019 | Thomas Giuli | K. Venkatesh Prasad, TJ Giuli, and David Watson | The Case for Modeling Security, Privacy, Usability and Reliability
(SPUR) in Automotive Software | 12 pages, 3 figures, presented at the 2006 Automotive Software
Workshop, San Diego, CA | null | null | null | cs.SE cs.CR cs.HC | null | Over the past five years, there has been considerable growth and established
value in the practice of modeling automotive software requirements. Much of
this growth has been centered on requirements of software associated with the
established functional areas of an automobile, such as those associated with
powertrain, chassis, body, safety and infotainment. This paper makes a case for
modeling four additional attributes that are increasingly important as vehicles
become information conduits: security, privacy, usability, and reliability.
These four attributes are important in creating specifications for embedded
in-vehicle automotive software.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 13:23:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prasad",
"K. Venkatesh",
""
],
[
"Giuli",
"TJ",
""
],
[
"Watson",
"David",
""
]
] |
cs/0604020 | Bodo Manthey | Bodo Manthey | Approximation Algorithms for Restricted Cycle Covers Based on Cycle
Decompositions | This paper has been joint with "On Approximating Restricted Cycle
Covers" (cs.CC/0504038). Please refer to that paper. The paper "Approximation
Algorithms for Restricted Cycle Covers Based on Cycle Decompositions" is now
obsolete | null | null | null | cs.DS cs.CC cs.DM | null | A cycle cover of a graph is a set of cycles such that every vertex is part of
exactly one cycle. An L-cycle cover is a cycle cover in which the length of
every cycle is in the set L. The weight of a cycle cover of an edge-weighted
graph is the sum of the weights of its edges.
We come close to settling the complexity and approximability of computing
L-cycle covers. On the one hand, we show that for almost all L, computing
L-cycle covers of maximum weight in directed and undirected graphs is APX-hard
and NP-hard. Most of our hardness results hold even if the edge weights are
restricted to zero and one.
On the other hand, we show that the problem of computing L-cycle covers of
maximum weight can be approximated within a factor of 2 for undirected graphs
and within a factor of 8/3 in the case of directed graphs. This holds for
arbitrary sets L.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 13:53:25 GMT"
},
{
"version": "v2",
"created": "Wed, 3 May 2006 13:01:24 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Jun 2006 07:32:39 GMT"
},
{
"version": "v4",
"created": "Fri, 15 Dec 2006 14:16:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Manthey",
"Bodo",
""
]
] |
cs/0604024 | Joel Friedman | Joel Friedman | Cohomology in Grothendieck Topologies and Lower Bounds in Boolean
Complexity II: A Simple Example | 8 pages | null | null | null | cs.CC math.AG | null | In a previous paper we have suggested a number of ideas to attack circuit
size complexity with cohomology. As a simple example, we take circuits that can
only compute the AND of two inputs, which essentially reduces to SET COVER. We
show a very special case of the cohomological approach (one particular free
category, using injective and superskyscraper sheaves) gives the linear
programming bound coming from the relaxation of the standard integer
programming reformulation of SET COVER.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2006 20:07:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedman",
"Joel",
""
]
] |
cs/0604026 | Damiano Bolzoni | Damiano Bolzoni, Sandro Etalle | APHRODITE: an Anomaly-based Architecture for False Positive Reduction | null | null | null | TR-CTIT-06-13 | cs.CR | null | We present APHRODITE, an architecture designed to reduce false positives in
network intrusion detection systems. APHRODITE works by detecting anomalies in
the output traffic, and by correlating them with the alerts raised by the NIDS
working on the input traffic. Benchmarks show a substantial reduction of false
positives and that APHRODITE is effective also after a "quick setup", i.e. in
the realistic case in which it has not been "trained" and set up optimally
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2006 12:13:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bolzoni",
"Damiano",
""
],
[
"Etalle",
"Sandro",
""
]
] |
cs/0604032 | Martin Ziegler | Martin Ziegler and Klaus Meer | Real Computational Universality: The Word Problem for a class of groups
with infinite presentation | corrected Section 4.5 | null | null | null | cs.LO cs.SC | null | The word problem for discrete groups is well-known to be undecidable by a
Turing Machine; more precisely, it is reducible both to and from and thus
equivalent to the discrete Halting Problem.
The present work introduces and studies a real extension of the word problem
for a certain class of groups which are presented as quotient groups of a free
group and a normal subgroup. Most important, the free group will be generated
by an uncountable set of generators with index running over certain sets of
real numbers. This allows to include many mathematically important groups which
are not captured in the framework of the classical word problem.
Our contribution extends computational group theory from the discrete to the
Blum-Shub-Smale (BSS) model of real number computation. We believe this to be
an interesting step towards applying BSS theory, in addition to semi-algebraic
geometry, also to further areas of mathematics.
The main result establishes the word problem for such groups to be not only
semi-decidable (and thus reducible FROM) but also reducible TO the Halting
Problem for such machines. It thus provides the first non-trivial example of a
problem COMPLETE, that is, computationally universal for this model.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2006 23:57:46 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Apr 2006 11:38:19 GMT"
},
{
"version": "v3",
"created": "Wed, 7 Jun 2006 07:48:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ziegler",
"Martin",
""
],
[
"Meer",
"Klaus",
""
]
] |
cs/0604035 | R N Mohan Professor | R.N.Mohan, Sanpei Kageyama, Moon Ho Lee, Gao Yang | Certain new M-matrices and their properties and applications | 21 pages,3 figures | null | null | null | cs.DM | null | The Mn-matrix was defined by Mohan [20] in which he has shown a method of
constructing (1,-1)-matrices and studied some of their properties. The
(1,-1)-matrices were constructed and studied by Cohn [5],Wang [33], Ehrlich [8]
and Ehrlich and Zeller[9]. But in this paper, while giving some resemblances of
this matrix with Hadamard matrix, and by naming it as M-matrix, we show how to
construct partially balanced incomplete block (PBIB) designs and some regular
bipartite graphs by it. We have considered two types of these M- matrices. Also
we will make a mention of certain applications of these M-matrices in signal
and communication processing, and network systems and end with some open
problems.
| [
{
"version": "v1",
"created": "Sun, 9 Apr 2006 06:02:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mohan",
"R. N.",
""
],
[
"Kageyama",
"Sanpei",
""
],
[
"Lee",
"Moon Ho",
""
],
[
"Yang",
"Gao",
""
]
] |
cs/0604036 | Jakob Vo{\ss} | Jakob Voss | Collaborative thesaurus tagging the Wikipedia way | 7 pages, 7 figures, 7 tables; v2 with added appendix and fixed
references | null | null | null | cs.IR cs.DL | null | This paper explores the system of categories that is used to classify
articles in Wikipedia. It is compared to collaborative tagging systems like
del.icio.us and to hierarchical classification like the Dewey Decimal
Classification (DDC). Specifics and commonalitiess of these systems of subject
indexing are exposed. Analysis of structural and statistical properties
(descriptors per record, records per descriptor, descriptor levels) shows that
the category system of Wikimedia is a thesaurus that combines collaborative
tagging and hierarchical subject indexing in a special way.
| [
{
"version": "v1",
"created": "Mon, 10 Apr 2006 12:04:29 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2006 00:41:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Voss",
"Jakob",
""
]
] |
cs/0604038 | Evgueni Petrov | E. Petrov, Yu. Kostov, E. Botoeva | UniCalc.LIN: a linear constraint solver for the UniCalc system | rejected by the programm committee of the conforence on Perspective
of System Informatics held in Novosibirsk, Russian Federation July 2006 | null | null | null | cs.MS cs.AI | null | In this short paper we present a linear constraint solver for the UniCalc
system, an environment for reliable solution of mathematical modeling problems.
| [
{
"version": "v1",
"created": "Mon, 10 Apr 2006 06:30:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petrov",
"E.",
""
],
[
"Kostov",
"Yu.",
""
],
[
"Botoeva",
"E.",
""
]
] |
cs/0604039 | Laurent Mazet PhD | David Bateman, Laurent Mazet, Veronique Buzenac-Settineri and Markus
Muck | A Fixed-Point Type for Octave | 5 pages, 1 figure | null | null | octave2006/12 | cs.MS | null | This paper announces the availability of a fixed point toolbox for the Matlab
compatible software package Octave. This toolbox is released under the GNU
Public License, and can be used to model the losses in algorithms implemented
in hardware. Furthermore, this paper presents as an example of the use of this
toolbox, the effects of a fixed point implementation on the precision of an
OFDM modulator.
| [
{
"version": "v1",
"created": "Mon, 10 Apr 2006 08:22:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bateman",
"David",
""
],
[
"Mazet",
"Laurent",
""
],
[
"Buzenac-Settineri",
"Veronique",
""
],
[
"Muck",
"Markus",
""
]
] |
cs/0604042 | Florentin Smarandache | M. C. Florea, J. Dezert, P. Valin, F. Smarandache, Anne-Laure
Jousselme | Adaptative combination rule and proportional conflict redistribution
rule for information fusion | Presented at Cogis '06 Conference, Paris, March 2006 | null | null | null | cs.AI | null | This paper presents two new promising rules of combination for the fusion of
uncertain and potentially highly conflicting sources of evidences in the
framework of the theory of belief functions in order to palliate the well-know
limitations of Dempster's rule and to work beyond the limits of applicability
of the Dempster-Shafer theory. We present both a new class of adaptive
combination rules (ACR) and a new efficient Proportional Conflict
Redistribution (PCR) rule allowing to deal with highly conflicting sources for
static and dynamic fusion applications.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 14:35:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Florea",
"M. C.",
""
],
[
"Dezert",
"J.",
""
],
[
"Valin",
"P.",
""
],
[
"Smarandache",
"F.",
""
],
[
"Jousselme",
"Anne-Laure",
""
]
] |
cs/0604043 | Thomas Way | Thomas P. Way and Lori L. Pollock | Demand-driven Inlining in a Region-based Optimizer for ILP Architectures | 23 pages | null | null | null | cs.DC cs.PL | null | Region-based compilation repartitions a program into more desirable
compilation units using profiling information and procedure inlining to enable
region formation analysis. Heuristics play a key role in determining when it is
most beneficial to inline procedures during region formation. An ILP optimizing
compiler using a region-based approach restructures a program to better reflect
dynamic behavior and increase interprocedural optimization and scheduling
opportunities. This paper presents an interprocedural compilation technique
which performs procedure inlining on-demand, rather than as a separate phase,
to improve the ability of a region-based optimizer to control code growth,
compilation time and memory usage while improving performance. The
interprocedural region formation algorithm utilizes a demand-driven,
heuristics-guided approach to inlining, restructuring an input program into
interprocedural regions. Experimental results are presented to demonstrate the
impact of the algorithm and several inlining heuristics upon a number of
traditional and novel compilation characteristics within a region-based ILP
compiler and simulator.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 04:15:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Way",
"Thomas P.",
""
],
[
"Pollock",
"Lori L.",
""
]
] |
cs/0604045 | Sandor P. Fekete | Sandor P. Fekete and Joerg Schepers and Jan C. van der Veen | An exact algorithm for higher-dimensional orthogonal packing | 31 pages, 6 figures, 9 tables, to appear in Operations Research; full
and updated journal version of sketches that appeared as parts of an extended
abstract in ESA'97 | null | null | null | cs.DS | null | Higher-dimensional orthogonal packing problems have a wide range of practical
applications, including packing, cutting, and scheduling. Combining the use of
our data structure for characterizing feasible packings with our new classes of
lower bounds, and other heuristics, we develop a two-level tree search
algorithm for solving higher-dimensional packing problems to optimality.
Computational results are reported, including optimal solutions for all
two--dimensional test problems from recent literature.
This is the third in a series of articles describing new approaches to
higher-dimensional packing; see cs.DS/0310032 and cs.DS/0402044.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 13:55:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Schepers",
"Joerg",
""
],
[
"van der Veen",
"Jan C.",
""
]
] |
cs/0604046 | Michael Aupetit | Dominique Lepetz, Max Nemoz-Gaillard and Michael Aupetit | Concerning the differentiability of the energy function in vector
quantization algorithms | Under submission to a peer-reviewed international journal | null | null | null | cs.LG cs.NE | null | The adaptation rule for Vector Quantization algorithms, and consequently the
convergence of the generated sequence, depends on the existence and properties
of a function called the energy function, defined on a topological manifold.
Our aim is to investigate the conditions of existence of such a function for a
class of algorithms examplified by the initial ''K-means'' and Kohonen
algorithms. The results presented here supplement previous studies and show
that the energy function is not always a potential but at least the uniform
limit of a series of potential functions which we call a pseudo-potential. Our
work also shows that a large number of existing vector quantization algorithms
developped by the Artificial Neural Networks community fall into this category.
The framework we define opens the way to study the convergence of all the
corresponding adaptation rules at once, and a theorem gives promising insights
in that direction. We also demonstrate that the ''K-means'' energy function is
a pseudo-potential but not a potential in general. Consequently, the energy
function associated to the ''Neural-Gas'' is not a potential in general.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 14:00:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lepetz",
"Dominique",
""
],
[
"Nemoz-Gaillard",
"Max",
""
],
[
"Aupetit",
"Michael",
""
]
] |
cs/0604047 | rapha?l Jungers | Rapha\"el Jungers, Vladimir Protasov, Vincent D. Blondel | Efficient algorithms for deciding the type of growth of products of
integer matrices | 20 pages, 4 figures, submitted to LAA | null | null | null | cs.CC | null | For a given finite set $\Sigma$ of matrices with nonnegative integer entries
we study the growth of $$ \max_t(\Sigma) = \max\{\|A_{1}... A_{t}\|: A_i \in
\Sigma\}.$$ We show how to determine in polynomial time whether the growth with
$t$ is bounded, polynomial, or exponential, and we characterize precisely all
possible behaviors.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 14:10:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jungers",
"Raphaël",
""
],
[
"Protasov",
"Vladimir",
""
],
[
"Blondel",
"Vincent D.",
""
]
] |
cs/0604048 | Vita Hinze-Hoare | Vita Hinze-Hoare | Will the Butterfly Cipher keep your Network Data secure? Developments in
Computer Encryption | null | null | null | null | cs.CR | null | This paper explains the recent developments in security and encryption. The
Butterfly cipher and quantum cryptography are reviewed and compared. Examples
of their relative uses are discussed and suggestions for future developments
considered. In addition application to network security together with a
substantial review of classification of encryption systems and a summary of
security weaknesses are considered.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 20:21:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
] |
cs/0604051 | Michael Brinkmeier | Michael Brinkmeier | Structural Alignments of pseudo-knotted RNA-molecules in polynomial time | 16 pages | null | null | null | cs.DS cs.CC cs.DM | null | An RNA molecule is structured on several layers. The primary and most obvious
structure is its sequence of bases, i.e. a word over the alphabet {A,C,G,U}.
The higher structure is a set of one-to-one base-pairings resulting in a
two-dimensional folding of the one-dimensional sequence. One speaks of a
secondary structure if these pairings do not cross and of a tertiary structure
otherwise.
Since the folding of the molecule is important for its function, the search
for related RNA molecules should not only be restricted to the primary
structure. It seems sensible to incorporate the higher structures in the
search. Based on this assumption and certain edit-operations a distance between
two arbitrary structures can be defined. It is known that the general
calculation of this measure is NP-complete \cite{zhang02similarity}. But for
some special cases polynomial algorithms are known. Using a new formal
description of secondary and tertiary structures, we extend the class of
structures for which the distance can be calculated in polynomial time. In
addition the presented algorithm may be used to approximate the edit-distance
between two arbitrary structures with a constant ratio.
| [
{
"version": "v1",
"created": "Wed, 12 Apr 2006 06:46:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brinkmeier",
"Michael",
""
]
] |
cs/0604053 | Maciej Kurant | Maciej Kurant, Patrick Thiran | Survivable Routing in IP-over-WDM Networks in the Presence of Multiple
Failures | 8 pages, 6 figures | null | null | null | cs.NI | null | Failure restoration at the IP layer in IP-over-WDM networks requires to map
the IP topology on the WDM topology in such a way that a failure at the WDM
layer leaves the IP topology connected. Such a mapping is called $survivable$.
As finding a survivable mapping is known to be NP-complete, in practice it
requires a heuristic approach. We have introduced in [1] a novel algorithm
called ``SMART'', that is more effective and scalable than the heuristics known
to date. Moreover, the formal analysis of SMART [2] has led to new
applications: the formal verification of the existence of a survivable mapping,
and a tool tracing and repairing the vulnerable areas of the network. In this
paper we extend the theoretical analysis in [2] by considering $multiple
failures$.
| [
{
"version": "v1",
"created": "Wed, 12 Apr 2006 17:10:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kurant",
"Maciej",
""
],
[
"Thiran",
"Patrick",
""
]
] |
cs/0604058 | Yury Lifshits | Yury Lifshits | Solving Classical String Problems on Compressed Texts | 10 pages, 6 figures, submitted | null | null | null | cs.DS cs.CC | null | Here we study the complexity of string problems as a function of the size of
a program that generates input. We consider straight-line programs (SLP), since
all algorithms on SLP-generated strings could be applied to processing
LZ-compressed texts.
The main result is a new algorithm for pattern matching when both a text T
and a pattern P are presented by SLPs (so-called fully compressed pattern
matching problem). We show how to find a first occurrence, count all
occurrences, check whether any given position is an occurrence or not in time
O(n^2m). Here m,n are the sizes of straight-line programs generating
correspondingly P and T.
Then we present polynomial algorithms for computing fingerprint table and
compressed representation of all covers (for the first time) and for finding
periods of a given compressed string (our algorithm is faster than previously
known). On the other hand, we show that computing the Hamming distance between
two SLP-generated strings is NP- and coNP-hard.
| [
{
"version": "v1",
"created": "Thu, 13 Apr 2006 08:12:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lifshits",
"Yury",
""
]
] |
cs/0604059 | Olivier Devillers | Olivier Devillers (INRIA Sophia Antipolis), Philippe Guigue (INRIA
Sophia Antipolis) | Inner and Outer Rounding of Boolean Operations on Lattice Polygonal
Regions | null | null | null | null | cs.CG | null | Robustness problems due to the substitution of the exact computation on real
numbers by the rounded floating point arithmetic are often an obstacle to
obtain practical implementation of geometric algorithms. If the adoption of the
--exact computation paradigm--[Yap et Dube] gives a satisfactory solution to
this kind of problems for purely combinatorial algorithms, this solution does
not allow to solve in practice the case of algorithms that cascade the
construction of new geometric objects. In this report, we consider the problem
of rounding the intersection of two polygonal regions onto the integer lattice
with inclusion properties. Namely, given two polygonal regions A and B having
their vertices on the integer lattice, the inner and outer rounding modes
construct two polygonal regions with integer vertices which respectively is
included and contains the true intersection. We also prove interesting results
on the Hausdorff distance, the size and the convexity of these polygonal
regions.
| [
{
"version": "v1",
"created": "Thu, 13 Apr 2006 14:33:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
"",
"INRIA Sophia Antipolis"
],
[
"Guigue",
"Philippe",
"",
"INRIA\n Sophia Antipolis"
]
] |
cs/0604061 | Edwin Henneken | Edwin A. Henneken, Michael J. Kurtz, Guenther Eichhorn, Alberto
Accomazzi, Carolyn Grant, Donna Thompson, Stephen S. Murray | Effect of E-printing on Citation Rates in Astronomy and Physics | Submitted to the Journal of Electronic Publishing. 11 pages with 5
figures | null | null | null | cs.DL astro-ph | null | In this report we examine the change in citation behavior since the
introduction of the arXiv e-print repository (Ginsparg, 2001). It has been
observed that papers that initially appear as arXiv e-prints get cited more
than papers that do not (Lawrence, 2001; Brody et al., 2004; Schwarz &
Kennicutt, 2004; Kurtz et al., 2005a, Metcalfe, 2005). Using the citation
statistics from the NASA-Smithsonian Astrophysics Data System (ADS; Kurtz et
al., 1993, 2000), we confirm the findings from other studies, we examine the
average citation rate to e-printed papers in the Astrophysical Journal, and we
show that for a number of major astronomy and physics journals the most
important papers are submitted to the arXiv e-print repository first.
| [
{
"version": "v1",
"created": "Thu, 13 Apr 2006 22:02:05 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jun 2006 11:47:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henneken",
"Edwin A.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn",
""
],
[
"Thompson",
"Donna",
""
],
[
"Murray",
"Stephen S.",
""
]
] |
cs/0604062 | Liang Wu | Liang Wu | Biologically Inspired Hierarchical Model for Feature Extraction and
Localization | 4 pages, 4 figures | null | null | null | cs.CV | null | Feature extraction and matching are among central problems of computer
vision. It is inefficent to search features over all locations and scales.
Neurophysiological evidence shows that to locate objects in a digital image the
human visual system employs visual attention to a specific object while
ignoring others. The brain also has a mechanism to search from coarse to fine.
In this paper, we present a feature extractor and an associated hierarchical
searching model to simulate such processes. With the hierarchical
representation of the object, coarse scanning is done through the matching of
the larger scale and precise localization is conducted through the matching of
the smaller scale. Experimental results justify the proposed model in its
effectiveness and efficiency to localize features.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2006 04:40:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wu",
"Liang",
""
]
] |
cs/0604064 | Mirco Mannucci Ph.D. | Mirco A. Mannucci | Quantum Fuzzy Sets: Blending Fuzzy Set Theory and Quantum Computation | 12 pages | null | null | null | cs.LO cs.AI | null | In this article we investigate a way in which quantum computing can be used
to extend the class of fuzzy sets. The core idea is to see states of a quantum
register as characteristic functions of quantum fuzzy subsets of a given set.
As the real unit interval is embedded in the Bloch sphere, every fuzzy set is
automatically a quantum fuzzy set. However, a generic quantum fuzzy set can be
seen as a (possibly entangled) superposition of many fuzzy sets at once,
offering new opportunities for modeling uncertainty. After introducing the main
framework of quantum fuzzy set theory, we analyze the standard operations of
fuzzification and defuzzification from our viewpoint. We conclude this
preliminary paper with a list of possible applications of quantum fuzzy sets to
pattern recognition, as well as future directions of pure research in quantum
fuzzy set theory.
| [
{
"version": "v1",
"created": "Sun, 16 Apr 2006 16:23:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mannucci",
"Mirco A.",
""
]
] |
cs/0604066 | Elias Tsigaridas | Elias P. Tsigaridas and Ioannis Z. Emiris | Univariate polynomial real root isolation: Continued Fractions revisited | 12 pages | null | null | null | cs.SC cs.CC cs.MS | null | We present algorithmic, complexity and implementation results concerning real
root isolation of integer univariate polynomials using the continued fraction
expansion of real algebraic numbers. One motivation is to explain the method's
good performance in practice. We improve the previously known bound by a factor
of $d \tau$, where $d$ is the polynomial degree and $\tau$ bounds the
coefficient bitsize, thus matching the current record complexity for real root
isolation by exact methods. Namely, the complexity bound is $\sOB(d^4 \tau^2)$
using the standard bound on the expected bitsize of the integers in the
continued fraction expansion. We show how to compute the multiplicities within
the same complexity and extend the algorithm to non square-free polynomials.
Finally, we present an efficient open-source \texttt{C++} implementation in the
algebraic library \synaps, and illustrate its efficiency as compared to other
available software. We use polynomials with coefficient bitsize up to 8000 and
degree up to 1000.
| [
{
"version": "v1",
"created": "Mon, 17 Apr 2006 10:52:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tsigaridas",
"Elias P.",
""
],
[
"Emiris",
"Ioannis Z.",
""
]
] |
cs/0604067 | R.N.Mohan Professor | R.N.Mohan, Moon Ho Lee, Subhash Pokrel | Certain t-partite graphs | null | null | null | null | cs.DM | null | By making use of the generalized concept of orthogonality in Latin squares,
certain t-partite graphs have been constructed and a suggestion for a net work
system and some applications have been made.
| [
{
"version": "v1",
"created": "Tue, 18 Apr 2006 09:30:55 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2006 00:11:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mohan",
"R. N.",
""
],
[
"Lee",
"Moon Ho",
""
],
[
"Pokrel",
"Subhash",
""
]
] |
cs/0604068 | Christian Klein | Benjamin Doerr and Tobias Friedrich and Christian Klein and Ralf
Osbild | Unbiased Matrix Rounding | 10th Scandinavian Workshop on Algorithm Theory (SWAT), 2006, to
appear | null | null | null | cs.DS cs.DM | null | We show several ways to round a real matrix to an integer one such that the
rounding errors in all rows and columns as well as the whole matrix are less
than one. This is a classical problem with applications in many fields, in
particular, statistics.
We improve earlier solutions of different authors in two ways. For rounding
matrices of size $m \times n$, we reduce the runtime from $O((m n)^2 Second,
our roundings also have a rounding error of less than one in all initial
intervals of rows and columns. Consequently, arbitrary intervals have an error
of at most two. This is particularly useful in the statistics application of
controlled rounding.
The same result can be obtained via (dependent) randomized rounding. This has
the additional advantage that the rounding is unbiased, that is, for all
entries $y_{ij}$ of our rounding, we have $E(y_{ij}) = x_{ij}$, where $x_{ij}$
is the corresponding entry of the input matrix.
| [
{
"version": "v1",
"created": "Tue, 18 Apr 2006 15:08:37 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Apr 2006 18:25:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Doerr",
"Benjamin",
""
],
[
"Friedrich",
"Tobias",
""
],
[
"Klein",
"Christian",
""
],
[
"Osbild",
"Ralf",
""
]
] |
cs/0604071 | Nuno Santos | Nuno Santos, Birger Koblitz | Distributed Metadata with the AMGA Metadata Catalog | 6 pages, 3 figures, to appear in Workshop on Next-Generation
Distributed Data Management - HPDC-15 | null | null | null | cs.DC cs.DB | null | Catalog Services play a vital role on Data Grids by allowing users and
applications to discover and locate the data needed. On large Data Grids, with
hundreds of geographically distributed sites, centralized Catalog Services do
not provide the required scalability, performance or fault-tolerance. In this
article, we start by presenting and discussing the general requirements on Grid
Catalogs of applications being developed by the EGEE user community. This
provides the motivation for the second part of the article, where we present
the replication and distribution mechanisms we have designed and implemented
into the AMGA Metadata Catalog, which is part of the gLite software stack being
developed for the EGEE project. Implementing these mechanisms in the catalog
itself has the advantages of not requiring any special support from the
relational database back-end, of being database independent, and of allowing
tailoring the mechanisms to the specific requirements and characteristics of
Metadata Catalogs.
| [
{
"version": "v1",
"created": "Wed, 19 Apr 2006 10:01:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Santos",
"Nuno",
""
],
[
"Koblitz",
"Birger",
""
]
] |
cs/0604073 | Muthiah Annamalai | Muthiah Annamalai, Hemant Kumar, Leela Velusamy | Octave-GTK: A GTK binding for GNU Octave | Comments: Presented at Octave2006 Conference, Washington D.C | null | null | Octave2006/02 | cs.SE | null | This paper discusses the problems faced with interoperability between two
programming languages, with respect to GNU Octave, and GTK API written in C, to
provide the GTK API on Octave.Octave-GTK is the fusion of two different API's:
one exported by GNU Octave [scientific computing tool] and the other GTK [GUI
toolkit]; this enables one to use GTK primitives within GNU Octave, to build
graphical front ends,at the same time using octave engine for number crunching
power. This paper illustrates our implementation of binding logic, and shows
results extended to various other libraries using the same base code generator.
Also shown, are methods of code generation, binding automation, and the niche
we plan to fill in the absence of GUI in Octave. Canonical discussion of
advantages, feasibility and problems faced in the process are elucidated.
| [
{
"version": "v1",
"created": "Wed, 19 Apr 2006 16:46:23 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2006 18:43:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Annamalai",
"Muthiah",
""
],
[
"Kumar",
"Hemant",
""
],
[
"Velusamy",
"Leela",
""
]
] |
cs/0604075 | Gyorgy Korniss | Qiming Lu, G. Korniss, and Boleslaw K. Szymanski | Naming Games in Spatially-Embedded Random Networks | We have found a programming error in our code used to generate the
results of the earlier version. We have corrected the error, reran all
simulations, and regenerated all data plots. While the qualitative behavior
of the model has not changed, the numerical values of some of the scaling
exponents did. 7 figures | Proceedings of the 2006 American Association for Artificial
Intelligence Fall Symposium Series, Interaction and Emergent Phenomena in
Societies of Agents (AAAI Press, Menlo Park, CA 2006) pp. 148-155 | null | null | cs.MA cond-mat.stat-mech cs.AI | null | We investigate a prototypical agent-based model, the Naming Game, on random
geometric networks. The Naming Game is a minimal model, employing local
communications that captures the emergence of shared communication schemes
(languages) in a population of autonomous semiotic agents. Implementing the
Naming Games on random geometric graphs, local communications being local
broadcasts, serves as a model for agreement dynamics in large-scale,
autonomously operating wireless sensor networks. Further, it captures essential
features of the scaling properties of the agreement process for
spatially-embedded autonomous agents. We also present results for the case when
a small density of long-range communication links are added on top of the
random geometric graph, resulting in a "small-world"-like network and yielding
a significantly reduced time to reach global agreement.
| [
{
"version": "v1",
"created": "Wed, 19 Apr 2006 17:48:11 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 21:35:33 GMT"
},
{
"version": "v3",
"created": "Mon, 7 May 2007 21:10:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lu",
"Qiming",
""
],
[
"Korniss",
"G.",
""
],
[
"Szymanski",
"Boleslaw K.",
""
]
] |
cs/0604076 | Loreto Bravo | Loreto Bravo and Leopoldo Bertossi | Semantically Correct Query Answers in the Presence of Null Values | 20 pages. To appear in Proc. of International Workshop on
Inconsistency and Incompleteness in Databases (IIDB 2006) | null | null | null | cs.DB | null | For several reasons a database may not satisfy a given set of integrity
constraints(ICs), but most likely most of the information in it is still
consistent with those ICs; and could be retrieved when queries are answered.
Consistent answers to queries wrt a set of ICs have been characterized as
answers that can be obtained from every possible minimally repaired consistent
version of the original database. In this paper we consider databases that
contain null values and are also repaired, if necessary, using null values. For
this purpose, we propose first a precise semantics for IC satisfaction in a
database with null values that is compatible with the way null values are
treated in commercial database management systems. Next, a precise notion of
repair is introduced that privileges the introduction of null values when
repairing foreign key constraints, in such a way that these new values do not
create an infinite cycle of new inconsistencies. Finally, we analyze how to
specify this kind of repairs of a database that contains null values using
disjunctive logic programs with stable model semantics.
| [
{
"version": "v1",
"created": "Wed, 19 Apr 2006 22:33:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bravo",
"Loreto",
""
],
[
"Bertossi",
"Leopoldo",
""
]
] |
cs/0604078 | Maria Chli | Maria Chli, Philippe De Wilde | The emergence of knowledge exchange: an agent-based model of a software
market | fixed legend problem | null | null | null | cs.MA cs.CE | null | We investigate knowledge exchange among commercial organisations, the
rationale behind it and its effects on the market. Knowledge exchange is known
to be beneficial for industry, but in order to explain it, authors have used
high level concepts like network effects, reputation and trust. We attempt to
formalise a plausible and elegant explanation of how and why companies adopt
information exchange and why it benefits the market as a whole when this
happens. This explanation is based on a multi-agent model that simulates a
market of software providers. Even though the model does not include any
high-level concepts, information exchange naturally emerges during simulations
as a successful profitable behaviour. The conclusions reached by this
agent-based analysis are twofold: (1) A straightforward set of assumptions is
enough to give rise to exchange in a software market. (2) Knowledge exchange is
shown to increase the efficiency of the market.
| [
{
"version": "v1",
"created": "Thu, 20 Apr 2006 11:20:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chli",
"Maria",
""
],
[
"De Wilde",
"Philippe",
""
]
] |
cs/0604084 | Michael Singer | Ziming Li, Michael F. Singer, Min Wu, Dabin Zheng | A Recursive Method for Determining the One-Dimensional Submodules of
Laurent-Ore Modules | To appear in the Proceedings of ISSAC 2006 | null | null | null | cs.SC math.CA | null | We present a method for determining the one-dimensional submodules of a
Laurent-Ore module. The method is based on a correspondence between
hyperexponential solutions of associated systems and one-dimensional
submodules. The hyperexponential solutions are computed recursively by solving
a sequence of first-order ordinary matrix equations. As the recursion proceeds,
the matrix equations will have constant coefficients with respect to the
operators that have been considered.
| [
{
"version": "v1",
"created": "Fri, 21 Apr 2006 16:04:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Ziming",
""
],
[
"Singer",
"Michael F.",
""
],
[
"Wu",
"Min",
""
],
[
"Zheng",
"Dabin",
""
]
] |
cs/0604086 | Michael Fink | Thomas Eiter, Michael Fink, and Hans Tompits | A Knowledge-Based Approach for Selecting Information Sources | 53 pages, 2 Figures; to appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.AI | null | Through the Internet and the World-Wide Web, a vast number of information
sources has become available, which offer information on various subjects by
different providers, often in heterogeneous formats. This calls for tools and
methods for building an advanced information-processing infrastructure. One
issue in this area is the selection of suitable information sources in query
answering. In this paper, we present a knowledge-based approach to this
problem, in the setting where one among a set of information sources
(prototypically, data repositories) should be selected for evaluating a user
query. We use extended logic programs (ELPs) to represent rich descriptions of
the information sources, an underlying domain theory, and user queries in a
formal query language (here, XML-QL, but other languages can be handled as
well). Moreover, we use ELPs for declarative query analysis and generation of a
query description. Central to our approach are declarative source-selection
programs, for which we define syntax and semantics. Due to the structured
nature of the considered data items, the semantics of such programs must
carefully respect implicit context information in source-selection rules, and
furthermore combine it with possible user preferences. A prototype
implementation of our approach has been realized exploiting the DLV KR system
and its plp front-end for prioritized ELPs. We describe a representative
example involving specific movie databases, and report about experimental
results.
| [
{
"version": "v1",
"created": "Fri, 21 Apr 2006 16:53:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eiter",
"Thomas",
""
],
[
"Fink",
"Michael",
""
],
[
"Tompits",
"Hans",
""
]
] |
cs/0604087 | Yongzhi Cao | Yongzhi Cao, Lirong Xia and Mingsheng Ying | Probabilistic Automata for Computing with Words | 35 pages; 3 figures | null | null | null | cs.AI cs.CL | null | Usually, probabilistic automata and probabilistic grammars have crisp symbols
as inputs, which can be viewed as the formal models of computing with values.
In this paper, we first introduce probabilistic automata and probabilistic
grammars for computing with (some special) words in a probabilistic framework,
where the words are interpreted as probabilistic distributions or possibility
distributions over a set of crisp symbols. By probabilistic conditioning, we
then establish a retraction principle from computing with words to computing
with values for handling crisp inputs and a generalized extension principle
from computing with words to computing with all words for handling arbitrary
inputs. These principles show that computing with values and computing with all
words can be respectively implemented by computing with some special words. To
compare the transition probabilities of two near inputs, we also examine some
analytical properties of the transition probability functions of generalized
extensions. Moreover, the retractions and the generalized extensions are shown
to be equivalence-preserving. Finally, we clarify some relationships among the
retractions, the generalized extensions, and the extensions studied recently by
Qiu and Wang.
| [
{
"version": "v1",
"created": "Sun, 23 Apr 2006 02:58:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cao",
"Yongzhi",
""
],
[
"Xia",
"Lirong",
""
],
[
"Ying",
"Mingsheng",
""
]
] |
cs/0604089 | Michele Tucci | Michele Tucci | Evolutionary Socioeconomics: a Schumpeterian Computer Simulation | PDF, 15 pages, 5 graphs | null | null | null | cs.GT cs.CY | null | The following note contains a computer simulation concerning the struggle
between two companies: the first one is "the biggest zaibatsu of all", while
the second one is "small, fast, ruthless". The model is based on a
neo-Schumpeterian framework operating in a Darwinian evolutionary environment.
After running the program a large number of times, two characteristics stand
out: -- There is always a winner which takes it all, while the loser
disappears. -- The key to success is the ability to employ efficiently the
technological innovations. The topic of the present paper is strictly related
with the content of the following notes: Michele Tucci, Evolution and
Gravitation: a Computer Simulation of a Non-Walrasian Equilibrium Model;
Michele Tucci, Oligopolistic Competition in an Evolutionary Environment: a
Computer Simulation. The texts can be downloaded respectively at the following
addresses: http://arxiv.org/abs/cs.CY/0209017
http://arxiv.org/abs/cs.CY/0501037 These references include some preliminary
considerations regarding the comparison between the evolutionary and the
gravitational paradigms and the evaluation of approaches belonging to rival
schools of economic thought.
| [
{
"version": "v1",
"created": "Sun, 23 Apr 2006 13:29:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tucci",
"Michele",
""
]
] |
cs/0604090 | Mirco Mannucci Ph.D. | Mirco A. Mannucci, Lisa Sparks, Daniele C. Struppa | Simplicial models of social aggregation I | 31 pages | null | null | null | cs.CE | null | This paper presents the foundational ideas for a new way of modeling social
aggregation. Traditional approaches have been using network theory, and the
theory of random networks. Under that paradigm, every social agent is
represented by a node, and every social interaction is represented by a segment
connecting two nodes. Early work in family interactions, as well as more recent
work in the study of terrorist organizations, shows that network modeling may
be insufficient to describe the complexity of human social structures.
Specifically, network theory does not seem to have enough flexibility to
represent higher order aggregations, where several agents interact as a group,
rather than as a collection of pairs. The model we present here uses a well
established mathematical theory, the theory of simplicial complexes, to address
this complex issue prevalent in interpersonal and intergroup communication. The
theory enables us to provide a richer graphical representation of social
interactions, and to determine quantitative mechanisms to describe the
robustness of a social structure. We also propose a methodology to create
random simplicial complexes, with the purpose of providing a new method to
simulate computationally the creation and disgregation of social structures.
Finally, we propose several measures which could be taken and observed in order
to describe and study an actual social aggregation occurring in interpersonal
and intergroup contexts.
| [
{
"version": "v1",
"created": "Sun, 23 Apr 2006 19:28:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mannucci",
"Mirco A.",
""
],
[
"Sparks",
"Lisa",
""
],
[
"Struppa",
"Daniele C.",
""
]
] |
cs/0604095 | Gregory Gutin | Gregory Gutin, Stefan Szeider, Anders Yeo | Fixed-Parameter Complexity of Minimum Profile Problems | null | null | null | null | cs.DS cs.DM | null | Let $G=(V,E)$ be a graph. An ordering of $G$ is a bijection $\alpha: V\dom
\{1,2,..., |V|\}.$ For a vertex $v$ in $G$, its closed neighborhood is
$N[v]=\{u\in V: uv\in E\}\cup \{v\}.$ The profile of an ordering $\alpha$ of
$G$ is $\prf_{\alpha}(G)=\sum_{v\in V}(\alpha(v)-\min\{\alpha(u): u\in
N[v]\}).$ The profile $\prf(G)$ of $G$ is the minimum of $\prf_{\alpha}(G)$
over all orderings $\alpha$ of $G$. It is well-known that $\prf(G)$ is the
minimum number of edges in an interval graph $H$ that contains $G$ is a
subgraph. Since $|V|-1$ is a tight lower bound for the profile of connected
graphs $G=(V,E)$, the parametrization above the guaranteed value $|V|-1$ is of
particular interest. We show that deciding whether the profile of a connected
graph $G=(V,E)$ is at most $|V|-1+k$ is fixed-parameter tractable with respect
to the parameter $k$. We achieve this result by reduction to a problem kernel
of linear size.
| [
{
"version": "v1",
"created": "Mon, 24 Apr 2006 17:30:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gutin",
"Gregory",
""
],
[
"Szeider",
"Stefan",
""
],
[
"Yeo",
"Anders",
""
]
] |
cs/0604096 | Tracey Ho | Tracey Ho | Polynomial-time algorithms for coding across multiple unicasts | null | null | null | null | cs.NI | null | We consider the problem of network coding across multiple unicasts. We give,
for wired and wireless networks, efficient polynomial time algorithms for
finding optimal network codes within the class of network codes restricted to
XOR coding between pairs of flows.
| [
{
"version": "v1",
"created": "Tue, 25 Apr 2006 02:55:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ho",
"Tracey",
""
]
] |
cs/0604100 | Abhishek Parakh | Abhishek Parakh | Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric
Oblivious Key Exchange | 7 pages, with minor typographical corrections. | null | null | null | cs.CR | null | This paper presents protocols for Kak's cubic transformation and proposes a
modification to Diffie-Hellman key exchange protocol in order to achieve
asymmetric oblivious exchange of keys.
| [
{
"version": "v1",
"created": "Tue, 25 Apr 2006 17:39:37 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Apr 2007 17:49:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Parakh",
"Abhishek",
""
]
] |
cs/0604102 | Vita Hinze-Hoare | Vita Hinze-Hoare | HCI and Educational Metrics as Tools for VLE Evaluation | null | null | null | null | cs.HC cs.LG | null | The general set of HCI and Educational principles are considered and a
classification system constructed. A frequency analysis of principles is used
to obtain the most significant set. Metrics are devised to provide objective
measures of these principles and a consistent testing regime devised. These
principles are used to analyse Blackboard and Moodle.
| [
{
"version": "v1",
"created": "Tue, 25 Apr 2006 19:32:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
] |
cs/0604103 | Vita Hinze-Hoare | Vita Hinze-Hoare | Further Evaluationh of VLEs using HCI and Educational Metrics | null | null | null | null | cs.HC | null | Under consideration are the general set of Human computer Interaction (HCI)
and Educational principles from prominent authors in the field and the
construction of a system for evaluating Virtual Learning Environments (VLEs)
with respect to the application of these HCI and Educational Principles. A
frequency analysis of principles is used to obtain the most significant set.
Metrics are devised to provide objective measures of these principles and a
consistent testing regime is introduced. These principles are used to analyse
the University VLE Blackboard. An open source VLE is also constructed with
similar content to Blackboard courses so that a systematic comparison can be
made. HCI and Educational metrics are determined for each VLE.
| [
{
"version": "v1",
"created": "Tue, 25 Apr 2006 19:53:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
] |
cs/0604105 | Farid Benbadis | Farid Benbadis, Jean-Jacques Puig, Marcelo Dias de Amorim, Claude
Chaudet, Timur Friedman, David Simplot-Ryl | Jumps: Enhancing hop-count positioning in sensor networks using multiple
coordinates | null | null | null | null | cs.NI | null | Positioning systems in self-organizing networks generally rely on
measurements such as delay and received signal strength, which may be difficult
to obtain and often require dedicated equipment. An alternative to such
approaches is to use simple connectivity information, that is, the presence or
absence of a link between any pair of nodes, and to extend it to hop-counts, in
order to obtain an approximate coordinate system. Such an approximation is
sufficient for a large number of applications, such as routing. In this paper,
we propose Jumps, a positioning system for those self-organizing networks in
which other types of (exact) positioning systems cannot be used or are deemed
to be too costly. Jumps builds a multiple coordinate system based solely on
nodes neighborhood knowledge. Jumps is interesting in the context of wireless
sensor networks, as it neither requires additional embedded equipment nor
relies on any nodes capabilities. While other approaches use only three
hop-count measurements to infer the position of a node, Jumps uses an arbitrary
number. We observe that an increase in the number of measurements leads to an
improvement in the localization process, without requiring a high dense
environment. We show through simulations that Jumps, when compared with
existing approaches, reduces the number of nodes sharing the same coordinates,
which paves the way for functions such as position-based routing.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2006 11:39:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Benbadis",
"Farid",
""
],
[
"Puig",
"Jean-Jacques",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Chaudet",
"Claude",
""
],
[
"Friedman",
"Timur",
""
],
[
"Simplot-Ryl",
"David",
""
]
] |
cs/0604108 | Francesc Rossell\'o | Francesc Rossello, Gabriel Valiente | An Algebraic View of the Relation between Largest Common Subtrees and
Smallest Common Supertrees | 32 pages | null | null | null | cs.DS cs.DM math.CT | null | The relationship between two important problems in tree pattern matching, the
largest common subtree and the smallest common supertree problems, is
established by means of simple constructions, which allow one to obtain a
largest common subtree of two trees from a smallest common supertree of them,
and vice versa. These constructions are the same for isomorphic, homeomorphic,
topological, and minor embeddings, they take only time linear in the size of
the trees, and they turn out to have a clear algebraic meaning.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2006 10:32:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rossello",
"Francesc",
""
],
[
"Valiente",
"Gabriel",
""
]
] |
cs/0604111 | Kristina Lerman | Kristina Lerman, Chris Jones, Aram Galstyan and Maja J Mataric | Analysis of Dynamic Task Allocation in Multi-Robot Systems | Preprint version of the paper published in International Journal of
Robotics, March 2006, Volume 25, pp. 225-242 | null | null | null | cs.RO cs.MA | null | Dynamic task allocation is an essential requirement for multi-robot systems
operating in unknown dynamic environments. It allows robots to change their
behavior in response to environmental changes or actions of other robots in
order to improve overall system performance. Emergent coordination algorithms
for task allocation that use only local sensing and no direct communication
between robots are attractive because they are robust and scalable. However, a
lack of formal analysis tools makes emergent coordination algorithms difficult
to design. In this paper we present a mathematical model of a general dynamic
task allocation mechanism. Robots using this mechanism have to choose between
two types of task, and the goal is to achieve a desired task division in the
absence of explicit communication and global knowledge. Robots estimate the
state of the environment from repeated local observations and decide which task
to choose based on these observations. We model the robots and observations as
stochastic processes and study the dynamics of the collective behavior.
Specifically, we analyze the effect that the number of observations and the
choice of the decision function have on the performance of the system. The
mathematical models are validated in a multi-robot multi-foraging scenario. The
model's predictions agree very closely with experimental results from
sensor-based simulations.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2006 23:56:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lerman",
"Kristina",
""
],
[
"Jones",
"Chris",
""
],
[
"Galstyan",
"Aram",
""
],
[
"Mataric",
"Maja J",
""
]
] |
cs/0604113 | Andrea Sportiello | Sergio Caracciolo, Davide Fichera, Andrea Sportiello | One-in-Two-Matching Problem is NP-complete | 30 pages | null | null | null | cs.CC | null | 2-dimensional Matching Problem, which requires to find a matching of left- to
right-vertices in a balanced $2n$-vertex bipartite graph, is a well-known
polynomial problem, while various variants, like the 3-dimensional analogoue
(3DM, with triangles on a tripartite graph), or the Hamiltonian Circuit Problem
(HC, a restriction to ``unicyclic'' matchings) are among the main examples of
NP-hard problems, since the first Karp reduction series of 1972. The same holds
for the weighted variants of these problems, the Linear Assignment Problem
being polynomial, and the Numerical 3-Dimensional Matching and Travelling
Salesman Problem being NP-complete.
In this paper we show that a small modification of the 2-dimensional Matching
and Assignment Problems in which for each $i \leq n/2$ it is required that
either $\pi(2i-1)=2i-1$ or $\pi(2i)=2i$, is a NP-complete problem. The proof is
by linear reduction from SAT (or NAE-SAT), with the size $n$ of the Matching
Problem being four times the number of edges in the factor graph representation
of the boolean problem. As a corollary, in combination with the simple linear
reduction of One-in-Two Matching to 3-Dimensional Matching, we show that SAT
can be linearly reduced to 3DM, while the original Karp reduction was only
cubic.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2006 16:40:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Caracciolo",
"Sergio",
""
],
[
"Fichera",
"Davide",
""
],
[
"Sportiello",
"Andrea",
""
]
] |
cs/0605003 | Amitabh Saxena | Amitabh Saxena and Ben Soh | A New Cryptosystem Based On Hidden Order Groups | removed examples for multiparty key agreement and join protocols,
since they are redundant | null | null | null | cs.CR cs.CC | null | Let $G_1$ be a cyclic multiplicative group of order $n$. It is known that the
Diffie-Hellman problem is random self-reducible in $G_1$ with respect to a
fixed generator $g$ if $\phi(n)$ is known. That is, given $g, g^x\in G_1$ and
having oracle access to a `Diffie-Hellman Problem' solver with fixed generator
$g$, it is possible to compute $g^{1/x} \in G_1$ in polynomial time (see
theorem 3.2). On the other hand, it is not known if such a reduction exists
when $\phi(n)$ is unknown (see conjuncture 3.1). We exploit this ``gap'' to
construct a cryptosystem based on hidden order groups and present a practical
implementation of a novel cryptographic primitive called an \emph{Oracle Strong
Associative One-Way Function} (O-SAOWF). O-SAOWFs have applications in
multiparty protocols. We demonstrate this by presenting a key agreement
protocol for dynamic ad-hoc groups.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2006 18:13:10 GMT"
},
{
"version": "v2",
"created": "Tue, 2 May 2006 16:59:08 GMT"
},
{
"version": "v3",
"created": "Wed, 3 May 2006 17:55:02 GMT"
},
{
"version": "v4",
"created": "Wed, 3 May 2006 21:23:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Saxena",
"Amitabh",
""
],
[
"Soh",
"Ben",
""
]
] |
cs/0605004 | Himanshu Thapliyal | Himanshu Thapliyal and M.B Srinivas | Novel Reversible Multiplier Architecture Using Reversible TSG Gate | 4 Pages; Published in Proceedings of the 4th ACS/IEEE International
Conference on Computer Systems and Applications (AICCSA-06), Dubai, March
2006. pp. 100-103. Contains the missing reference | null | null | null | cs.AR | null | In the recent years, reversible logic has emerged as a promising technology
having its applications in low power CMOS, quantum computing, nanotechnology,
and optical computing. The classical set of gates such as AND, OR, and EXOR are
not reversible. Recently a 4 * 4 reversible gate called TSG is proposed. The
most significant aspect of the proposed gate is that it can work singly as a
reversible full adder, that is reversible full adder can now be implemented
with a single gate only. This paper proposes a NXN reversible multiplier using
TSG gate. It is based on two concepts. The partial products can be generated in
parallel with a delay of d using Fredkin gates and thereafter the addition can
be reduced to log2N steps by using reversible parallel adder designed from TSG
gates. Similar multiplier architecture in conventional arithmetic (using
conventional logic) has been reported in existing literature, but the proposed
one in this paper is totally based on reversible logic and reversible cells as
its building block. A 4x4 architecture of the proposed reversible multiplier is
also designed. It is demonstrated that the proposed multiplier architecture
using the TSG gate is much better and optimized, compared to its existing
counterparts in literature; in terms of number of reversible gates and garbage
outputs. Thus, this paper provides the initial threshold to building of more
complex system which can execute more complicated operations using reversible
logic.
| [
{
"version": "v1",
"created": "Mon, 1 May 2006 09:34:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B",
""
]
] |
cs/0605008 | Arnaud Durand | Arnaud Durand (ELM), Etienne Grandjean (GREYC) | The complexity of acyclic conjunctive queries revisited | 30 pages | null | null | null | cs.LO | null | In this paper, we consider first-order logic over unary functions and study
the complexity of the evaluation problem for conjunctive queries described by
such kind of formulas. A natural notion of query acyclicity for this language
is introduced and we study the complexity of a large number of variants or
generalizations of acyclic query problems in that context (Boolean or not
Boolean, with or without inequalities, comparisons, etc...). Our main results
show that all those problems are \textit{fixed-parameter linear} i.e. they can
be evaluated in time $f(|Q|).|\textbf{db}|.|Q(\textbf{db})|$ where $|Q|$ is the
size of the query $Q$, $|\textbf{db}|$ the database size, $|Q(\textbf{db})|$ is
the size of the output and $f$ is some function whose value depends on the
specific variant of the query problem (in some cases, $f$ is the identity
function). Our results have two kinds of consequences. First, they can be
easily translated in the relational (i.e., classical) setting. Previously known
bounds for some query problems are improved and new tractable cases are then
exhibited. Among others, as an immediate corollary, we improve a result of
\~\cite{PapadimitriouY-99} by showing that any (relational) acyclic conjunctive
query with inequalities can be evaluated in time
$f(|Q|).|\textbf{db}|.|Q(\textbf{db})|$. A second consequence of our method is
that it provides a very natural descriptive approach to the complexity of
well-known algorithmic problems. A number of examples (such as acyclic subgraph
problems, multidimensional matching, etc...) are considered for which new
insights of their complexity are given.
| [
{
"version": "v1",
"created": "Tue, 2 May 2006 09:31:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durand",
"Arnaud",
"",
"ELM"
],
[
"Grandjean",
"Etienne",
"",
"GREYC"
]
] |
cs/0605015 | Ciro Cattuto | Ciro Cattuto, Vittorio Loreto, Luciano Pietronero | Collaborative Tagging and Semiotic Dynamics | 8 pages, 7 figures | PNAS 104, 1461 (2007) | 10.1073/pnas.0610487104 | null | cs.CY cs.DL physics.data-an physics.soc-ph | null | Collaborative tagging has been quickly gaining ground because of its ability
to recruit the activity of web users into effectively organizing and sharing
vast amounts of information. Here we collect data from a popular system and
investigate the statistical properties of tag co-occurrence. We introduce a
stochastic model of user behavior embodying two main aspects of collaborative
tagging: (i) a frequency-bias mechanism related to the idea that users are
exposed to each other's tagging activity; (ii) a notion of memory - or aging of
resources - in the form of a heavy-tailed access to the past state of the
system. Remarkably, our simple modeling is able to account quantitatively for
the observed experimental features, with a surprisingly high accuracy. This
points in the direction of a universal behavior of users, who - despite the
complexity of their own cognitive processes and the uncoordinated and selfish
nature of their tagging activity - appear to follow simple activity patterns.
| [
{
"version": "v1",
"created": "Thu, 4 May 2006 18:53:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cattuto",
"Ciro",
""
],
[
"Loreto",
"Vittorio",
""
],
[
"Pietronero",
"Luciano",
""
]
] |
cs/0605017 | Tran Cao Son | Phan Huy Tu, Tran Cao Son, and Chitta Baral | Reasoning and Planning with Sensing Actions, Incomplete Information, and
Static Causal Laws using Answer Set Programming | 72 pages, 3 figures, a preliminary version of this paper appeared in
the proceedings of the 7th International Conference on Logic Programming and
Non-Monotonic Reasoning, 2004. To appear in Theory and Practice of Logic
Programming | null | null | null | cs.AI | null | We extend the 0-approximation of sensing actions and incomplete information
in [Son and Baral 2000] to action theories with static causal laws and prove
its soundness with respect to the possible world semantics. We also show that
the conditional planning problem with respect to this approximation is
NP-complete. We then present an answer set programming based conditional
planner, called ASCP, that is capable of generating both conformant plans and
conditional plans in the presence of sensing actions, incomplete information
about the initial state, and static causal laws. We prove the correctness of
our implementation and argue that our planner is sound and complete with
respect to the proposed approximation. Finally, we present experimental results
comparing ASCP to other planners.
| [
{
"version": "v1",
"created": "Thu, 4 May 2006 22:35:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tu",
"Phan Huy",
""
],
[
"Son",
"Tran Cao",
""
],
[
"Baral",
"Chitta",
""
]
] |
cs/0605018 | Florentin Smarandache | Florentin Smarandache, Sukanto Bhattacharya, Mohammad Khoshnevisan,
Housila P. Singh, Rajesh Singh, F. Kaymram, S. Malakar, Jose L. Salmeron | Computational Modeling in Applied Problems: collected papers on
econometrics, operations research, game theory and simulation | 108 pages, many figures | Hexis, 2006. | null | null | cs.OH | null | Computational models pervade all branches of the exact sciences and have in
recent times also started to prove to be of immense utility in some of the
traditionally 'soft' sciences like ecology, sociology and politics. This volume
is a collection of a few cutting-edge research papers on the application of
variety of computational models and tools in the analysis, interpretation and
solution of vexing real-world problems and issues in economics, management,
ecology and global politics by some prolific researchers in the field.
| [
{
"version": "v1",
"created": "Fri, 5 May 2006 00:35:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Bhattacharya",
"Sukanto",
""
],
[
"Khoshnevisan",
"Mohammad",
""
],
[
"Singh",
"Housila P.",
""
],
[
"Singh",
"Rajesh",
""
],
[
"Kaymram",
"F.",
""
],
[
"Malakar",
"S.",
""
],
[
"Salmeron",
"Jose L.",
""
]
] |
cs/0605020 | Sergey Alpaev | Sergey Alpaev | Applied MVC Patterns. A pattern language | null | null | null | null | cs.SE | null | How to get advantages of MVC model without making applications unnecessarily
complex? The full-featured MVC implementation is on the top end of ladder of
complexity. The other end is meant for simple cases that do not call for such
complex designs, however still in need of the advantages of MVC patterns, such
as ability to change the look-and-feel. This paper presents patterns of MVC
implementation that help to benefit from the paradigm and keep the right
balance between flexibility and implementation complexity.
| [
{
"version": "v1",
"created": "Fri, 5 May 2006 10:25:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alpaev",
"Sergey",
""
]
] |
cs/0605021 | Harald Zankl | Harald Zankl | SAT Techniques for Lexicographic Path Orders | 29 pages, Seminar Report | null | null | null | cs.SC | null | This seminar report is concerned with expressing LPO-termination of term
rewrite systems as a satisfiability problem in propositional logic. After
relevant algorithms are explained, experimental results are reported.
| [
{
"version": "v1",
"created": "Fri, 5 May 2006 19:11:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zankl",
"Harald",
""
]
] |
cs/0605022 | Martin Kurth | Martin Kurth, Jim LeBlanc | Toward a Collection-based Metadata Maintenance Model | 10 pages, 4 figures; submitted to DC 2006 | null | null | null | cs.DL | null | In this paper, the authors identify key entities and relationships in the
operational management of metadata catalogs that describe digital collections,
and they draft a data model to support the administration of metadata
maintenance for collections. Further, they consider this proposed model in
light of other data schemes to which it relates and discuss the implications of
the model for library metadata maintenance operations.
| [
{
"version": "v1",
"created": "Fri, 5 May 2006 18:16:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kurth",
"Martin",
""
],
[
"LeBlanc",
"Jim",
""
]
] |
cs/0605024 | Marcus Hutter | Shane Legg and Marcus Hutter | A Formal Measure of Machine Intelligence | 8 two-column pages | Proc. 15th Annual Machine Learning Conference of {B}elgium and The
Netherlands (Benelearn 2006) pages 73-80 | null | IDSIA-10-06 | cs.AI cs.LG | null | A fundamental problem in artificial intelligence is that nobody really knows
what intelligence is. The problem is especially acute when we need to consider
artificial systems which are significantly different to humans. In this paper
we approach this problem in the following way: We take a number of well known
informal definitions of human intelligence that have been given by experts, and
extract their essential features. These are then mathematically formalised to
produce a general measure of intelligence for arbitrary machines. We believe
that this measure formally captures the concept of machine intelligence in the
broadest reasonable sense.
| [
{
"version": "v1",
"created": "Sat, 6 May 2006 16:56:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Legg",
"Shane",
""
],
[
"Hutter",
"Marcus",
""
]
] |
cs/0605025 | Vytautas Perlibakas | Vytautas Perlibakas | Face Recognition using Principal Component Analysis and Log-Gabor
Filters | Unpublished manuscript. March 2005. 23 pages, 7 figures, 5 tables | null | null | null | cs.CV | null | In this article we propose a novel face recognition method based on Principal
Component Analysis (PCA) and Log-Gabor filters. The main advantages of the
proposed method are its simple implementation, training, and very high
recognition accuracy. For recognition experiments we used 5151 face images of
1311 persons from different sets of the FERET and AR databases that allow to
analyze how recognition accuracy is affected by the change of facial
expressions, illumination, and aging. Recognition experiments with the FERET
database (containing photographs of 1196 persons) showed that our method can
achieve maximal 97-98% first one recognition rate and 0.3-0.4% Equal Error
Rate. The experiments also showed that the accuracy of our method is less
affected by eye location errors and used image normalization method than of
traditional PCA -based recognition method.
| [
{
"version": "v1",
"created": "Sun, 7 May 2006 13:30:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perlibakas",
"Vytautas",
""
]
] |
cs/0605026 | Yuri Pritykin | Yuri Pritykin | Strongly Almost Periodic Sequences under Finite Automata Mappings | 7 pages | null | null | null | cs.DM | null | The notion of almost periodicity nontrivially generalizes the notion of
periodicity. Strongly almost periodic sequences (=uniformly recurrent infinite
words) first appeared in the field of symbolic dynamics, but then turned out to
be interesting in connection with computer science. The paper studies the class
of eventually strongly almost periodic sequences (i. e., becoming strongly
almost periodic after deleting some prefix). We prove that the property of
eventual strong almost periodicity is preserved under the mappings done by
finite automata and finite transducers. The class of almost periodic sequences
includes the class of eventually strongly almost periodic sequences. We prove
this inclusion to be strict.
| [
{
"version": "v1",
"created": "Sun, 7 May 2006 14:46:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pritykin",
"Yuri",
""
]
] |
cs/0605027 | Vytautas Perlibakas | Vytautas Perlibakas | Recognition of expression variant faces using masked log-Gabor features
and Principal Component Analysis | Unpublished manuscript. June 2005. 20 pages, 8 figures, 5 tables | null | null | null | cs.CV | null | In this article we propose a method for the recognition of faces with
different facial expressions. For recognition we extract feature vectors by
using log-Gabor filters of multiple orientations and scales. Using sliding
window algorithm and variances -based masking these features are extracted at
image regions that are less affected by the changes of facial expressions.
Extracted features are passed to the Principal Component Analysis (PCA) -based
recognition method. The results of face recognition experiments using
expression variant faces showed that the proposed method could achieve higher
recognition accuracy than many other methods. For development and testing we
used facial images from the AR and FERET databases. Using facial photographs of
more than one thousand persons from the FERET database the proposed method
achieved 96.6-98.9% first one recognition rate and 0.2-0.6% Equal Error Rate
(EER).
| [
{
"version": "v1",
"created": "Sun, 7 May 2006 15:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perlibakas",
"Vytautas",
""
]
] |
cs/0605030 | Randy Cogill | Randy Cogill and Sanjay Lall | A Delay Analysis of Maximal Matching Switching with Speedup | 11 pages, 2 figures. Submitted to the 2006 IEEE Conference on
Decision and Control | null | null | null | cs.NI cs.PF | null | In this paper we analyze the average queue backlog in a combined input-output
queued switch using a maximal size matching scheduling algorithm. We compare
this average backlog to the average backlog achieved by an optimal switch. We
model the cell arrival process as independent and identically distributed
between time slots and uniformly distributed among input and output ports. For
switches with many input and output ports, the backlog associated with maximal
size matching with speedup 3 is no more than 10/3 times the backlog associated
with an optimal switch. Moreover, this performance ratio rapidly approaches 2
as speedup increases.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 08:04:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cogill",
"Randy",
""
],
[
"Lall",
"Sanjay",
""
]
] |
cs/0605031 | Mihaela Dinsoreanu PhD | Mihaela Dinsoreanu, Ioan Salomie, Kalman Pusztai | On the Design of Agent-Based Systems using UML and Extensions | null | null | null | null | cs.AI cs.MA cs.SE | null | The Unified Software Development Process (USDP) and UML have been now
generally accepted as the standard methodology and modeling language for
developing Object-Oriented Systems. Although Agent-based Systems introduces new
issues, we consider that USDP and UML can be used in an extended manner for
modeling Agent-based Systems. The paper presents a methodology for designing
agent-based systems and the specific models expressed in an UML-based notation
corresponding to each phase of the software development process. UML was
extended using the provided mechanism: stereotypes. Therefore, this approach
can be managed with any CASE tool supporting UML. A Case Study, the development
of a specific agent-based Student Evaluation System (SAS), is presented.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 12:21:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Salomie",
"Ioan",
""
],
[
"Pusztai",
"Kalman",
""
]
] |
cs/0605032 | Mihaela Dinsoreanu PhD | Tudor Marian, Bogdan Dumitriu, Mihaela Dinsoreanu, Ioan Salomie | A framework of reusable structures for mobile agent development | null | null | null | null | cs.MA cs.AI cs.SE | null | Mobile agents research is clearly aiming towards imposing agent based
development as the next generation of tools for writing software. This paper
comes with its own contribution to this global goal by introducing a novel
unifying framework meant to bring simplicity and interoperability to and among
agent platforms as we know them today. In addition to this, we also introduce a
set of agent behaviors which, although tailored for and from the area of
virtual learning environments, are none the less generic enough to be used for
rapid, simple, useful and reliable agent deployment. The paper also presents an
illustrative case study brought forward to prove the feasibility of our design.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 12:27:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marian",
"Tudor",
""
],
[
"Dumitriu",
"Bogdan",
""
],
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Salomie",
"Ioan",
""
]
] |
cs/0605033 | Mihaela Dinsoreanu PhD | Mihaela Dinsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom
Coffey | Mobile Agent Based Solutions for Knowledge Assessment in elearning
Environments | null | null | null | null | cs.MA cs.AI cs.SE | null | E-learning is nowadays one of the most interesting of the "e- " domains
available through the Internet. The main problem to create a Web-based, virtual
environment is to model the traditional domain and to implement the model using
the most suitable technologies. We analyzed the distance learning domain and
investigated the possibility to implement some e-learning services using mobile
agent technologies. This paper presents a model of the Student Assessment
Service (SAS) and an agent-based framework developed to be used for
implementing specific applications. A specific Student Assessment application
that relies on the framework was developed.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 12:37:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Godja",
"Cristian",
""
],
[
"Anghel",
"Claudiu",
""
],
[
"Salomie",
"Ioan",
""
],
[
"Coffey",
"Tom",
""
]
] |
cs/0605034 | Srinivas Shakkottai | Srinivas Shakkottai, R. Srikant | Peer to Peer Networks for Defense Against Internet Worms | 11 Pages | null | null | null | cs.CR cs.AR cs.NI | null | Internet worms, which spread in computer networks without human mediation,
pose a severe threat to computer systems today. The rate of propagation of
worms has been measured to be extremely high and they can infect a large
fraction of their potential hosts in a short time. We study two different
methods of patch dissemination to combat the spread of worms. We first show
that using a fixed number of patch servers performs woefully inadequately
against Internet worms. We then show that by exploiting the exponential data
dissemination capability of P2P systems, the spread of worms can be halted very
effectively. We compare the two methods by using fluid models to compute two
quantities of interest: the time taken to effectively combat the progress of
the worm and the maximum number of infected hosts. We validate our models using
Internet measurements and simulations.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 17:02:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shakkottai",
"Srinivas",
""
],
[
"Srikant",
"R.",
""
]
] |
cs/0605035 | Filip Radlinski | Filip Radlinski and Thorsten Joachims | Query Chains: Learning to Rank from Implicit Feedback | 10 pages | Proceedings of the ACM Conference on Knowledge Discovery and Data
Mining (KDD), ACM, 2005 | null | null | cs.LG cs.IR | null | This paper presents a novel approach for using clickthrough data to learn
ranked retrieval functions for web search results. We observe that users
searching the web often perform a sequence, or chain, of queries with a similar
information need. Using query chains, we generate new types of preference
judgments from search engine logs, thus taking advantage of user intelligence
in reformulating queries. To validate our method we perform a controlled user
study comparing generated preference judgments to explicit relevance judgments.
We also implemented a real-world search engine to test our approach, using a
modified ranking SVM to learn an improved ranking function from preference
data. Our results demonstrate significant improvements in the ranking given by
the search engine. The learned rankings outperform both a static ranking
function, as well as one trained without considering query chains.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 22:05:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
] |
cs/0605036 | Filip Radlinski | Filip Radlinski and Thorsten Joachims | Evaluating the Robustness of Learning from Implicit Feedback | 8 pages, Presented at ICML Workshop on Learning In Web Search, 2005 | null | null | null | cs.LG cs.IR | null | This paper evaluates the robustness of learning from implicit feedback in web
search. In particular, we create a model of user behavior by drawing upon user
studies in laboratory and real-world settings. The model is used to understand
the effect of user behavior on the performance of a learning algorithm for
ranked retrieval. We explore a wide range of possible user behaviors and find
that learning from implicit feedback can be surprisingly robust. This
complements previous results that demonstrated our algorithm's effectiveness in
a real-world search engine application.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 23:38:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
] |
cs/0605037 | Filip Radlinski | Filip Radlinski and Thorsten Joachims | Minimally Invasive Randomization for Collecting Unbiased Preferences
from Clickthrough Logs | 7 pages. Proceedings of the 21st National Conference on Artificial
Intelligence (AAAI), 2006 | null | null | null | cs.IR cs.LG | null | Clickthrough data is a particularly inexpensive and plentiful resource to
obtain implicit relevance feedback for improving and personalizing search
engines. However, it is well known that the probability of a user clicking on a
result is strongly biased toward documents presented higher in the result set
irrespective of relevance. We introduce a simple method to modify the
presentation of search results that provably gives relevance judgments that are
unaffected by presentation bias under reasonable assumptions. We validate this
property of the training data in interactive real world experiments. Finally,
we show that using these unbiased relevance judgments learning methods can be
guaranteed to converge to an ideal ranking given sufficient data.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 01:53:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
] |