id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]
authors_parsed
sequencelengths
1
2.83k
cs/0603092
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible Sequential Circuits using Fredkin Gates
7 Pages: Deals with design of reversible sequential circuits. Published: Proceedings of SPIE Volume: 6050, pp.196-202.Optomechatronic Micro/Nano Devices and Components, Sapporo, Japan, December 5-7, 2005; Editor(s): Yoshitada Katagiri
null
null
null
cs.AR
null
In recent years, reversible logic has emerged as a promising computing paradigm having its applications in low power computing, quantum computing, nanotechnology, optical computing and DNA computing. The classical set of gates such as AND, OR, and EXOR are not reversible. Recently, it has been shown how to encode information in DNA and use DNA amplification to implement Fredkin gates. Furthermore, in the past Fredkin gates have been constructed using DNA, whose outputs are used as inputs for other Fredkin gates. Thus, it can be concluded that arbitrary circuits of Fredkin gates can be constructed using DNA. This paper provides the initial threshold to building of more complex system having reversible sequential circuits and which can execute more complicated operations. The novelty of the paper is the reversible designs of sequential circuits using Fredkin gate. Since, Fredkin gate has already been realized using DNA, it is expected that this work will initiate the building of complex systems using DNA. The reversible circuits designed here are highly optimized in terms of number of gates and garbage outputs. The modularization approach that is synthesizing small circuits and thereafter using them to construct bigger circuits is used for designing the optimal reversible sequential circuits.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 08:33:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
cs/0603099
Alin Suciu PhD
Alin Suciu, Rodica Potolea, Tudor Muresan
Benchmark Problems for Constraint Solving
null
null
null
null
cs.PF cs.SC
null
Constraint Programming is roughly a new software technology introduced by Jaffar and Lassez in 1987 for description and effective solving of large, particularly combinatorial, problems especially in areas of planning and scheduling. In the following we define three problems for constraint solving from the domain of electrical networks; based on them we define 43 related problems. For the defined set of problems we benchmarked five systems: ILOG OPL, AMPL, GAMS, Mathematica and UniCalc. As expected some of the systems performed very well for some problems while others performed very well on others.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:19:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Potolea", "Rodica", "" ], [ "Muresan", "Tudor", "" ] ]
cs/0603100
Alin Suciu PhD
Alin Suciu, Kalman Pusztai
Efficient Compression of Prolog Programs
null
null
null
null
cs.PL
null
We propose a special-purpose class of compression algorithms for efficient compression of Prolog programs. It is a dictionary-based compression method, specially designed for the compression of Prolog code, and therefore we name it PCA (Prolog Compression Algorithm). According to the experimental results this method provides better compression than state-of-the-art general-purpose compression algorithms. Since the algorithm works with Prolog syntactic entities (e.g. atoms, terms, etc.) the implementation of a Prolog prototype is straightforward and very easy to use in any Prolog application that needs compression. Although the algorithm is designed for Prolog programs, the idea can be easily applied for the compression of programs written in other (logic) languages.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:27:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Pusztai", "Kalman", "" ] ]
cs/0603101
Alin Suciu PhD
Alin Suciu, Kalman Pusztai, Andrei Vancea
Prolog Server Pages
null
null
null
null
cs.NI cs.PL
null
Prolog Server Pages (PSP) is a scripting language, based on Prolog, than can be embedded in HTML documents. To run PSP applications one needs a web server, a web browser and a PSP interpreter. The code is executed, by the interpreter, on the server-side (web server) and the output (together with the html code in witch the PSP code is embedded) is sent to the client-side (browser). The current implementation supports Apache Web Server. We implemented an Apache web server module that handles PSP files, and sends the result (an html document) to the client. PSP supports both GET and POST http requests. It also provides methods for working with http cookies.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:35:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Pusztai", "Kalman", "" ], [ "Vancea", "Andrei", "" ] ]
cs/0603102
Alin Suciu PhD
Alin Suciu, Kalman Pusztai, Andrei Diaconu
Enhanced Prolog Remote Predicate Call Protocol
null
null
null
null
cs.NI cs.PL
null
Following the ideas of the Remote Procedure Call model, we have developed a logic programming counterpart, naturally called Prolog Remote Predicate Call (Prolog RPC). The Prolog RPC protocol facilitates the integration of Prolog code in multi-language applications as well as the development of distributed intelligent applications. One use of the protocol's most important uses could be the development of distributed applications that use Prolog at least partially to achieve their goals. Most notably the Distributed Artificial Intelligence (DAI) applications that are suitable for logic programming can profit from the use of the protocol. After proving its usefulness, we went further, developing a new version of the protocol, making it more reliable and extending its functionality. Because it has a new syntax and the new set of commands, we call this version Enhanced Prolog Remote Procedure Call. This paper describes the new features and modifications this second version introduced.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:44:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Pusztai", "Kalman", "" ], [ "Diaconu", "Andrei", "" ] ]
cs/0603104
Patrick Baillot
Vincent Atassi (LIPN), Patrick Baillot (LIPN), Kazushige Terui (NII)
Verification of Ptime reducibility for system F terms via Dual Light Affine Logic
21 pages
A para\^{i}tre dans Proceedings Computer Science Logic 2006 (CSL'06), LNCS, Springer. (2006)
null
null
cs.LO
null
In a previous work we introduced Dual Light Affine Logic (DLAL) ([BaillotTerui04]) as a variant of Light Linear Logic suitable for guaranteeing complexity properties on lambda-calculus terms: all typable terms can be evaluated in polynomial time and all Ptime functions can be represented. In the present work we address the problem of typing lambda-terms in second-order DLAL. For that we give a procedure which, starting with a term typed in system F, finds all possible ways to decorate it into a DLAL typed term. We show that our procedure can be run in time polynomial in the size of the original Church typed system F term.
[ { "version": "v1", "created": "Mon, 27 Mar 2006 09:14:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Atassi", "Vincent", "", "LIPN" ], [ "Baillot", "Patrick", "", "LIPN" ], [ "Terui", "Kazushige", "", "NII" ] ]
cs/0603107
Pedro Fortuny Ayuso
Pedro Fortuny Ayuso
Towards an information-theoretically safe cryptographic protocol
2 pages
null
null
null
cs.CR
null
We introduce what --if some kind of group action exists-- is a truly (information theoretically) safe cryptographic communication system: a protocol which provides \emph{zero} information to any passive adversary having full access to the channel.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 17:47:11 GMT" }, { "version": "v2", "created": "Tue, 28 Mar 2006 21:27:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Ayuso", "Pedro Fortuny", "" ] ]
cs/0603108
Michael Brinkmeier
Michael Brinkmeier
Minimizing Symmetric Set Functions Faster
9 pages
null
null
null
cs.DM math.CO
null
We describe a combinatorial algorithm which, given a monotone and consistent symmetric set function d on a finite set V in the sense of Rizzi, constructs a non trivial set S minimizing d(S,V-S). This includes the possibility for the minimization of symmetric submodular functions. The presented algorithm requires at most as much time as the one described by Rizzi, but depending on the function d, it may allow several improvements.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 10:25:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Brinkmeier", "Michael", "" ] ]
cs/0603110
Marcus Hutter
Daniil Ryabko and Marcus Hutter
Asymptotic Learnability of Reinforcement Problems with Arbitrary Dependence
15 pages
Proc. 17th International Conf. on Algorithmic Learning Theory (ALT 2006) pages 334-347
null
IDSIA-09-06
cs.LG cs.AI
null
We address the problem of reinforcement learning in which observations may exhibit an arbitrary form of stochastic dependence on past observations and actions. The task for an agent is to attain the best possible asymptotic reward where the true generating environment is unknown but belongs to a known countable family of environments. We find some sufficient conditions on the class of environments under which an agent exists which attains the best asymptotic reward for any environment in the class. We analyze how tight these conditions are and how they relate to different probabilistic assumptions known in reinforcement learning and related fields, such as Markov Decision Processes and mixing conditions.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 16:22:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Ryabko", "Daniil", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0603111
Tomasz Blachowicz
T. Blachowicz and M. Wieja
Remote-control and clustering of physical computations using the XML-RPC protocol and the open-Mosix system
18 pages, 2 figures
null
null
null
cs.DC cs.NI
null
The applications of the remote control of physical simulations performed in clustered computers running under an open-Mosix system are presented. Results from the simulation of a 2-dimensional ferromagnetic system of spins in the Ising scheme are provided. Basic parameters of a simulated hysteresis loop like coercivity and exchange bias due to pinning of ferromagnetic spins are given. The paper describes in physicists terminology a cost effective solution which utilizes an XML-RPC protocol (Extensible Markup Language - Remote Procedure Calling) and standard C++ and Python languages.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 20:45:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Blachowicz", "T.", "" ], [ "Wieja", "M.", "" ] ]
cs/0603114
William Yurcik
Gregory A. Pluta, Larry Brumbaugh, William Yurcik
Using SMART for Customized Monitoring of Windows Services
15 pages, 10 figures, 2 tables
null
null
null
cs.NI cs.CR
null
We focus on examining and working with an important category of computer software called Services, which are provided as a part of newer Microsoft Windows operating systems. A typical Windows user transparently utilizes many of these services but is frequently unaware of their existence. Since some services have the potential to create significant problems when they are executing, it is important for a system administrator to identify which services are running on the network, the types of processing done by each service, and any interrelationships among the various services. This information can then be used to improve the overall integrity of both the individual computer where a questionable service is running and in aggregate an entire network of computers. NCSA has developed an application called SMART (Services Monitoring And Reporting Tool) that can be used to identify and display all services currently running in the network. A commercial program called Hyena remotely monitors the services on all computers attached to the network and exports this information to SMART. SMART produces various outputs that the system administrator can analyze and then determine appropriate actions to take. In particular, SMART provides a color coordinated user interface to quickly identify and classify both potentially hazardous services and also unknown services.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 05:25:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Pluta", "Gregory A.", "" ], [ "Brumbaugh", "Larry", "" ], [ "Yurcik", "William", "" ] ]
cs/0603115
David Defour
Guillaume Da Gra\c{c}ca (LP2A), David Defour (LP2A)
Implementation of float-float operators on graphics hardware
null
null
null
null
cs.AR cs.GR
null
The Graphic Processing Unit (GPU) has evolved into a powerful and flexible processor. The latest graphic processors provide fully programmable vertex and pixel processing units that support vector operations up to single floating-point precision. This computational power is now being used for general-purpose computations. However, some applications require higher precision than single precision. This paper describes the emulation of a 44-bit floating-point number format and its corresponding operations. An implementation is presented along with performance and accuracy results.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 11:48:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Da Graçca", "Guillaume", "", "LP2A" ], [ "Defour", "David", "", "LP2A" ] ]
cs/0603117
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
Affine functions and series with co-inductive real numbers
null
Mathematical Structures in Computer Science 17, 1 (2006)
null
null
cs.LO
null
We extend the work of A. Ciaffaglione and P. Di Gianantonio on mechanical verification of algorithms for exact computation on real numbers, using infinite streams of digits implemented as co-inductive types. Four aspects are studied: the first aspect concerns the proof that digit streams can be related to the axiomatized real numbers that are already axiomatized in the proof system (axiomatized, but with no fixed representation). The second aspect re-visits the definition of an addition function, looking at techniques to let the proof search mechanism perform the effective construction of an algorithm that is correct by construction. The third aspect concerns the definition of a function to compute affine formulas with positive rational coefficients. This should be understood as a testbed to describe a technique to combine co-recursion and recursion to obtain a model for an algorithm that appears at first sight to be outside the expressive power allowed by the proof system. The fourth aspect concerns the definition of a function to compute series, with an application on the series that is used to compute Euler's number e. All these experiments should be reproducible in any proof system that supports co-inductive types, co-recursion and general forms of terminating recursion, but we performed with the Coq system [12, 3, 14].
[ { "version": "v1", "created": "Wed, 29 Mar 2006 19:36:03 GMT" }, { "version": "v2", "created": "Mon, 1 May 2006 07:38:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
cs/0603119
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
CoInduction in Coq
null
null
null
null
cs.LO
null
We describe the basic notions of co-induction as they are available in the coq system. As an application, we describe arithmetic properties for simple representations of real numbers.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 19:39:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
cs/0603120
Zengyou He
Zengyou He
Approximation Algorithms for K-Modes Clustering
7 pages
null
null
Tr-06-0330
cs.AI
null
In this paper, we study clustering with respect to the k-modes objective function, a natural formulation of clustering for categorical data. One of the main contributions of this paper is to establish the connection between k-modes and k-median, i.e., the optimum of k-median is at most twice the optimum of k-modes for the same categorical data clustering problem. Based on this observation, we derive a deterministic algorithm that achieves an approximation factor of 2. Furthermore, we prove that the distance measure in k-modes defines a metric. Hence, we are able to extend existing approximation algorithms for metric k-median to k-modes. Empirical results verify the superiority of our method.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 02:02:37 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ] ]
cs/0603121
Scott Turner
Scott Turner, Manuel A. Perez-Quinones and Stephen H. Edwards
minimUML: A Minimalist Approach to UML Diagraming for Early Computer Science Education
38 pages, 15 figures
null
null
null
cs.HC cs.SE
null
The Unified Modeling Language (UML) is commonly used in introductory Computer Science to teach basic object-oriented design. However, there appears to be a lack of suitable software to support this task. Many of the available programs that support UML focus on developing code and not on enhancing learning. Those that were designed for educational use sometimes have poor interfaces or are missing common and important features, such as multiple selection and undo/redo. There is a need for software that is tailored to an instructional environment and has all the useful and needed functionality for that specific task. This is the purpose of minimUML. minimUML provides a minimum amount of UML, just what is commonly used in beginning programming classes, while providing a simple, usable interface. In particular, minimUML was designed to support abstract design while supplying features for exploratory learning and error avoidance. In addition, it allows for the annotation of diagrams, through text or freeform drawings, so students can receive feedback on their work. minimUML was developed with the goal of supporting ease of use, supporting novice students, and a requirement of no prior-training for its use.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 06:12:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Turner", "Scott", "" ], [ "Perez-Quinones", "Manuel A.", "" ], [ "Edwards", "Stephen H.", "" ] ]
cs/0603125
Russ Abbott
Russ Abbott
If a tree casts a shadow is it telling the time?
12 pages. Submitted for conference presentation
null
null
null
cs.MA cs.GL
null
Physical processes are computations only when we use them to externalize thought. Computation is the performance of one or more fixed processes within a contingent environment. We reformulate the Church-Turing thesis so that it applies to programs rather than to computability. When suitably formulated agent-based computing in an open, multi-scalar environment represents the current consensus view of how we interact with the world. But we don't know how to formulate multi-scalar environments.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 22:31:26 GMT" }, { "version": "v2", "created": "Wed, 7 Jun 2006 01:49:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbott", "Russ", "" ] ]
cs/0603127
Russ Abbott
Russ Abbott
Complex Systems + Systems Engineering = Complex Systems Engineeri
10 pages. Position paper to be presented at Conference on Systems Engineering Research
null
null
null
cs.MA
null
One may define a complex system as a system in which phenomena emerge as a consequence of multiscale interaction among the system's components and their environments. The field of Complex Systems is the study of such systems--usually naturally occurring, either bio-logical or social. Systems Engineering may be understood to include the conceptualising and building of systems that consist of a large number of concurrently operating and interacting components--usually including both human and non-human elements. It has become increasingly apparent that the kinds of systems that systems engineers build have many of the same multiscale characteristics as those of naturally occurring complex systems. In other words, systems engineering is the engineering of complex systems. This paper and the associated panel will explore some of the connections between the fields of complex systems and systems engineering.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 22:58:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbott", "Russ", "" ] ]
cs/0603129
Damiano Bolzoni
Xiamoneg Su, Damiano Bolzoni, Pascal van Eck
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
null
null
null
TR-CTIT-06-08
cs.CR
null
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to link explicitly security requirements with the organization's business vision, i.e. to provide business rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements. A conceptual framework is presented, where the relationships between business vision, critical impact factors and valuable assets (together with their security requirements) are shown.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 13:15:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Su", "Xiamoneg", "" ], [ "Bolzoni", "Damiano", "" ], [ "van Eck", "Pascal", "" ] ]
cs/0603132
Michael McGuigan
Michael McGuigan
Graphics Turing Test
6 pages
null
null
null
cs.GR
null
We define a Graphics Turing Test to measure graphics performance in a similar manner to the definition of the traditional Turing Test. To pass the test one needs to reach a computational scale, the Graphics Turing Scale, for which Computer Generated Imagery becomes comparatively indistinguishable from real images while also being interactive. We derive an estimate for this computational scale which, although large, is within reach of todays supercomputers. We consider advantages and disadvantages of various computer systems designed to pass the Graphics Turing Test. Finally we discuss commercial applications from the creation of such a system, in particular Interactive Cinema.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 19:58:30 GMT" } ]
2007-05-23T00:00:00
[ [ "McGuigan", "Michael", "" ] ]
cs/0604001
Fabrice Rossi
Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Brieuc Conan-Guez (LITA)
Theoretical Properties of Projection Based Multilayer Perceptrons with Functional Inputs
null
null
10.1007/s11063-005-3100-2
null
cs.NE
null
Many real world data are sampled functions. As shown by Functional Data Analysis (FDA) methods, spectra, time series, images, gesture recognition data, etc. can be processed more efficiently if their functional nature is taken into account during the data analysis process. This is done by extending standard data analysis methods so that they can apply to functional inputs. A general way to achieve this goal is to compute projections of the functional data onto a finite dimensional sub-space of the functional space. The coordinates of the data on a basis of this sub-space provide standard vector representations of the functions. The obtained vectors can be processed by any standard method. In our previous work, this general approach has been used to define projection based Multilayer Perceptrons (MLPs) with functional inputs. We study in this paper important theoretical properties of the proposed model. We show in particular that MLPs with functional inputs are universal approximators: they can approximate to arbitrary accuracy any continuous mapping from a compact sub-space of a functional space to R. Moreover, we provide a consistency result that shows that any mapping from a functional space to R can be learned thanks to examples by a projection based MLP: the generalization mean square error of the MLP decreases to the smallest possible mean square error on the data when the number of examples goes to infinity.
[ { "version": "v1", "created": "Sat, 1 Apr 2006 20:16:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Conan-Guez", "Brieuc", "", "LITA" ] ]
cs/0604002
Leopoldo Bertossi
Andrei Lopatenko and Leopoldo Bertossi
Complexity of Consistent Query Answering in Databases under Cardinality-Based and Incremental Repair Semantics
26 pages, 2 figures
null
null
null
cs.DB cs.CC
null
Consistent Query Answering (CQA) is the problem of computing from a database the answers to a query that are consistent with respect to certain integrity constraints that the database, as a whole, may fail to satisfy. Consistent answers have been characterized as those that are invariant under certain minimal forms of restoration of the database consistency. We investigate algorithmic and complexity theoretic issues of CQA under database repairs that minimally depart -wrt the cardinality of the symmetric difference- from the original database. We obtain first tight complexity bounds. We also address the problem of incremental complexity of CQA, that naturally occurs when an originally consistent database becomes inconsistent after the execution of a sequence of update operations. Tight bounds on incremental complexity are provided for various semantics under denial constraints. Fixed parameter tractability is also investigated in this dynamic context, where the size of the update sequence becomes the relevant parameter.
[ { "version": "v1", "created": "Sun, 2 Apr 2006 03:07:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Lopatenko", "Andrei", "" ], [ "Bertossi", "Leopoldo", "" ] ]
cs/0604003
Petrus H Potgieter
Petrus H. Potgieter
Hypercomputing the Mandelbrot Set?
11 pages, 2 figures
null
null
null
cs.CC
null
The Mandelbrot set is an extremely well-known mathematical object that can be described in a quite simple way but has very interesting and non-trivial properties. This paper surveys some results that are known concerning the (non-)computability of the set. It considers two models of decidability over the reals (which have been treated much more thoroughly and technically by Hertling (2005), Blum, Shub and Smale, Brattka (2003) and Weihrauch (1999 and 2003) among others), two over the computable reals (the Russian school and hypercomputation) and a model over the rationals.
[ { "version": "v1", "created": "Sun, 2 Apr 2006 15:31:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Potgieter", "Petrus H.", "" ] ]
cs/0604004
Alexander Evako
Alexander V. Evako
The Poincare conjecture for digital spaces. Properties of digital n-dimensional disks and spheres
null
null
null
null
cs.DM cs.CV math.AT
null
Motivated by the Poincare conjecture, we study properties of digital n-dimensional spheres and disks, which are digital models of their continuous counterparts. We introduce homeomorphic transformations of digital manifolds, which retain the connectedness, the dimension, the Euler characteristics and the homology groups of manifolds. We find conditions where an n-dimensional digital manifold is the n-dimensional digital sphere and discuss the link between continuous closed n-manifolds and their digital models.
[ { "version": "v1", "created": "Sun, 2 Apr 2006 19:55:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Evako", "Alexander V.", "" ] ]
cs/0604006
David Bateman
David Bateman and Andy Adler
Sparse Matrix Implementation in Octave
null
null
null
Octave2006/04
cs.MS
null
There are many classes of mathematical problems which give rise to matrices, where a large number of the elements are zero. In this case it makes sense to have a special matrix type to handle this class of problems where only the non-zero elements of the matrix are stored. Not only does this reduce the amount of memory to store the matrix, but it also means that operations on this type of matrix can take advantage of the a-priori knowledge of the positions of the non-zero elements to accelerate their calculations. A matrix type that stores only the non-zero elements is generally called sparse. Until recently Octave has lacked a full implementation of sparse matrices. This article address the implementation of sparse matrices within Octave, including their storage, creation, fundamental algorithms used, their implementations and the basic operations and functions implemented for sparse matrices. Mathematical issues such as the return types of sparse operations, matrix fill-in and reordering for sparse matrix factorization is discussed in the context of a real example. Benchmarking of Octave's implementation of sparse operations compared to their equivalent in Matlab are given and their implications discussed. Results are presented for multiplication and linear algebra operations for various matrix orders and densities. Furthermore, the use of Octave's sparse matrix implementation is demonstrated using a real example of a finite element model (FEM) problem. Finally, the method of using sparse matrices with Octave's oct-files is discussed. The means of creating, using and returning sparse matrices within oct-files is discussed as well as the differences between Octave's Sparse and Array classes.
[ { "version": "v1", "created": "Mon, 3 Apr 2006 12:56:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Bateman", "David", "" ], [ "Adler", "Andy", "" ] ]
cs/0604007
Guillaume Theyssier
Laurent Boyer (LIP), Victor Poupet (LIP), Guillaume Theyssier (LM-Savoie)
On the Complexity of Limit Sets of Cellular Automata Associated with Probability Measures
null
Mathematical Foundations of Computer Science 2006Springer (Ed.) (28/08/2006) 190-201
null
null
cs.DM cs.CC math.DS
null
We study the notion of limit sets of cellular automata associated with probability measures (mu-limit sets). This notion was introduced by P. Kurka and A. Maass. It is a refinement of the classical notion of omega-limit sets dealing with the typical long term behavior of cellular automata. It focuses on the words whose probability of appearance does not tend to 0 as time tends to infinity (the persistent words). In this paper, we give a characterisation of the persistent language for non sensible cellular automata associated with Bernouilli measures. We also study the computational complexity of these languages. We show that the persistent language can be non-recursive. But our main result is that the set of quasi-nilpotent cellular automata (those with a single configuration in their mu-limit set) is neither recursively enumerable nor co-recursively enumerable.
[ { "version": "v1", "created": "Tue, 4 Apr 2006 10:21:36 GMT" }, { "version": "v2", "created": "Mon, 2 Oct 2006 08:53:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Boyer", "Laurent", "", "LIP" ], [ "Poupet", "Victor", "", "LIP" ], [ "Theyssier", "Guillaume", "", "LM-Savoie" ] ]
cs/0604008
Sandor P. Fekete
Esther M. Arkin and Herve Broennimann and Jeff Erickson and Sandor P. Fekete and Christian Knauer and Jonathan Lenchner and Joseph S. B. Mitchell and Kim Whittlesey
Minimum-Cost Coverage of Point Sets by Disks
10 pages, 4 figures, Latex, to appear in ACM Symposium on Computational Geometry 2006
null
null
null
cs.DS cs.CG
null
We consider a class of geometric facility location problems in which the goal is to determine a set X of disks given by their centers (t_j) and radii (r_j) that cover a given set of demand points Y in the plane at the smallest possible cost. We consider cost functions of the form sum_j f(r_j), where f(r)=r^alpha is the cost of transmission to radius r. Special cases arise for alpha=1 (sum of radii) and alpha=2 (total area); power consumption models in wireless network design often use an exponent alpha>2. Different scenarios arise according to possible restrictions on the transmission centers t_j, which may be constrained to belong to a given discrete set or to lie on a line, etc. We obtain several new results, including (a) exact and approximation algorithms for selecting transmission points t_j on a given line in order to cover demand points Y in the plane; (b) approximation algorithms (and an algebraic intractability result) for selecting an optimal line on which to place transmission points to cover Y; (c) a proof of NP-hardness for a discrete set of transmission points in the plane and any fixed alpha>1; and (d) a polynomial-time approximation scheme for the problem of computing a minimum cost covering tour (MCCT), in which the total cost is a linear combination of the transmission cost for the set of disks and the length of a tour/path that connects the centers of the disks.
[ { "version": "v1", "created": "Tue, 4 Apr 2006 17:24:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Arkin", "Esther M.", "" ], [ "Broennimann", "Herve", "" ], [ "Erickson", "Jeff", "" ], [ "Fekete", "Sandor P.", "" ], [ "Knauer", "Christian", "" ], [ "Lenchner", "Jonathan", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Whittlesey", "Kim", "" ] ]
cs/0604009
Alexey Melkikh
Alexey V. Melkikh
Can an Organism Adapt Itself to Unforeseen Circumstances?
null
null
null
null
cs.AI
null
A model of an organism as an autonomous intelligent system has been proposed. This model was used to analyze learning of an organism in various environmental conditions. Processes of learning were divided into two types: strong and weak processes taking place in the absence and the presence of aprioristic information about an object respectively. Weak learning is synonymous to adaptation when aprioristic programs already available in a system (an organism) are started. It was shown that strong learning is impossible for both an organism and any autonomous intelligent system. It was shown also that the knowledge base of an organism cannot be updated. Therefore, all behavior programs of an organism are congenital. A model of a conditioned reflex as a series of consecutive measurements of environmental parameters has been advanced. Repeated measurements are necessary in this case to reduce the error during decision making.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 10:29:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Melkikh", "Alexey V.", "" ] ]
cs/0604011
Noam Shental
Gad Getz, Noam Shental, Eytan Domany
Semi-Supervised Learning -- A Statistical Physics Approach
9 pages. Appeared in in the Proceedings of "Learning with Partially Classified Training Data", ICML 2005 workshop
null
null
null
cs.LG cond-mat.stat-mech cs.CV
null
We present a novel approach to semi-supervised learning which is based on statistical physics. Most of the former work in the field of semi-supervised learning classifies the points by minimizing a certain energy function, which corresponds to a minimal k-way cut solution. In contrast to these methods, we estimate the distribution of classifications, instead of the sole minimal k-way cut, which yields more accurate and robust results. Our approach may be applied to all energy functions used for semi-supervised learning. The method is based on sampling using a Multicanonical Markov chain Monte-Carlo algorithm, and has a straightforward probabilistic interpretation, which allows for soft assignments of points to classes, and also to cope with yet unseen class types. The suggested approach is demonstrated on a toy data set and on two real-life data sets of gene expression.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 18:07:31 GMT" }, { "version": "v2", "created": "Thu, 6 Apr 2006 12:23:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Getz", "Gad", "" ], [ "Shental", "Noam", "" ], [ "Domany", "Eytan", "" ] ]
cs/0604012
Sreeram Vuppala
Sreeram Vuppala
The Aryabhata Algorithm Using Least Absolute Remainders
9 pages
null
null
null
cs.CR
null
This paper presents an introduction to the Aryabhata algorithm for finding multiplicative inverses and solving linear congruences, both of which have applications in cryptography. We do so by the use of the least absolute remainders. The exposition of the Aryabhata algorithm provided here can have performance that could exceed what was described recently by Rao and Yang.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 19:18:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Vuppala", "Sreeram", "" ] ]
cs/0604013
Shripad Thite
Shripad Thite
On Covering a Graph Optimally with Induced Subgraphs
9 pages
null
null
null
cs.DM
null
We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number of vertices in each subgraph is minimized. We prove NP-completeness of the problem, prove lower bounds, and give approximation algorithms for certain graph classes.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 17:06:51 GMT" }, { "version": "v2", "created": "Fri, 7 Apr 2006 07:44:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Thite", "Shripad", "" ] ]
cs/0604014
Habibi Omar Jr.
O. Habibi, U.R. Patihnedj, M.O. Dhar
Towards Analog Reverse Time Computation
null
null
null
null
cs.CC
null
We report the consequences of a destabilization process on a simulated General Purpose Analog Computer. This new technology overcomes problems linked with serial ambiguity, and provides an analog bias to encode algorithms whose complexity is over polynomial. We also implicitly demonstrate how countermesures of the Stochastic Aperture Degeneracy could efficiently reach higher computational classes, and would open a road towards Analog Reverse Time Computation.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 23:40:56 GMT" }, { "version": "v2", "created": "Fri, 7 Apr 2006 09:39:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Habibi", "O.", "" ], [ "Patihnedj", "U. R.", "" ], [ "Dhar", "M. O.", "" ] ]
cs/0604015
Dmitri Krioukov
Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley, kc claffy
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
null
PAM 2006, best paper award
null
null
cs.NI cs.LG
null
Although the Internet AS-level topology has been extensively studied over the past few years, little is known about the details of the AS taxonomy. An AS "node" can represent a wide variety of organizations, e.g., large ISP, or small private business, university, with vastly different network characteristics, external connectivity patterns, network growth tendencies, and other properties that we can hardly neglect while working on veracious Internet representations in simulation environments. In this paper, we introduce a radically new approach based on machine learning techniques to map all the ASes in the Internet into a natural AS taxonomy. We successfully classify 95.3% of ASes with expected accuracy of 78.1%. We release to the community the AS-level topology dataset augmented with: 1) the AS taxonomy information and 2) the set of AS attributes we used to classify ASes. We believe that this dataset will serve as an invaluable addition to further understanding of the structure and evolution of the Internet.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 00:08:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Krioukov", "Dmitri", "" ], [ "Riley", "George", "" ], [ "claffy", "kc", "" ] ]
cs/0604016
Michael Baer
Michael B. Baer
On Conditional Branches in Optimal Search Trees
8 pages, 5 figures (with 10 illustrations total), 1 table; reformatted with some additional notes
null
null
null
cs.PF cs.DS cs.IR
null
Algorithms for efficiently finding optimal alphabetic decision trees -- such as the Hu-Tucker algorithm -- are well established and commonly used. However, such algorithms generally assume that the cost per decision is uniform and thus independent of the outcome of the decision. The few algorithms without this assumption instead use one cost if the decision outcome is ``less than'' and another cost otherwise. In practice, neither assumption is accurate for software optimized for today's microprocessors. Such software generally has one cost for the more likely decision outcome and a greater cost -- often far greater -- for the less likely decision outcome. This problem and generalizations thereof are thus applicable to hard coding static decision tree instances in software, e.g., for optimizing program bottlenecks or for compiling switch statements. An O(n^3)-time O(n^2)-space dynamic programming algorithm can solve this optimal binary decision tree problem, and this approach has many generalizations that optimize for the behavior of processors with predictive branch capabilities, both static and dynamic. Solutions to this formulation are often faster in practice than ``optimal'' decision trees as formulated in the literature. Different search paradigms can sometimes yield even better performance.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 00:54:44 GMT" }, { "version": "v2", "created": "Tue, 23 May 2006 05:07:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
cs/0604018
Suneel Madhekar
Madhekar Suneel
Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map
Submitted to the Indian Academy of Sciences for possible publication in Sadhana (Academy Proceedings in Engineering Sciences). Results of statistical tests included. Introduction revised
null
null
null
cs.CR nlin.CD
null
A scheme for pseudo-random binary sequence generation based on the two-dimensional discrete-time Henon map is proposed. Properties of the proposed sequences pertaining to linear complexity, linear complexity profile, correlation and auto-correlation are investigated. All these properties of the sequences suggest a strong resemblance to random sequences. Results of statistical testing of the sequences are found encouraging. An attempt is made to estimate the keyspace size if the proposed scheme is used for cryptographic applications. The keyspace size is found to be large and is dependent on the precision of the computing platform used.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 09:13:55 GMT" }, { "version": "v2", "created": "Wed, 16 Aug 2006 16:56:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Suneel", "Madhekar", "" ] ]
cs/0604019
Thomas Giuli
K. Venkatesh Prasad, TJ Giuli, and David Watson
The Case for Modeling Security, Privacy, Usability and Reliability (SPUR) in Automotive Software
12 pages, 3 figures, presented at the 2006 Automotive Software Workshop, San Diego, CA
null
null
null
cs.SE cs.CR cs.HC
null
Over the past five years, there has been considerable growth and established value in the practice of modeling automotive software requirements. Much of this growth has been centered on requirements of software associated with the established functional areas of an automobile, such as those associated with powertrain, chassis, body, safety and infotainment. This paper makes a case for modeling four additional attributes that are increasingly important as vehicles become information conduits: security, privacy, usability, and reliability. These four attributes are important in creating specifications for embedded in-vehicle automotive software.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 13:23:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Prasad", "K. Venkatesh", "" ], [ "Giuli", "TJ", "" ], [ "Watson", "David", "" ] ]
cs/0604020
Bodo Manthey
Bodo Manthey
Approximation Algorithms for Restricted Cycle Covers Based on Cycle Decompositions
This paper has been joint with "On Approximating Restricted Cycle Covers" (cs.CC/0504038). Please refer to that paper. The paper "Approximation Algorithms for Restricted Cycle Covers Based on Cycle Decompositions" is now obsolete
null
null
null
cs.DS cs.CC cs.DM
null
A cycle cover of a graph is a set of cycles such that every vertex is part of exactly one cycle. An L-cycle cover is a cycle cover in which the length of every cycle is in the set L. The weight of a cycle cover of an edge-weighted graph is the sum of the weights of its edges. We come close to settling the complexity and approximability of computing L-cycle covers. On the one hand, we show that for almost all L, computing L-cycle covers of maximum weight in directed and undirected graphs is APX-hard and NP-hard. Most of our hardness results hold even if the edge weights are restricted to zero and one. On the other hand, we show that the problem of computing L-cycle covers of maximum weight can be approximated within a factor of 2 for undirected graphs and within a factor of 8/3 in the case of directed graphs. This holds for arbitrary sets L.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 13:53:25 GMT" }, { "version": "v2", "created": "Wed, 3 May 2006 13:01:24 GMT" }, { "version": "v3", "created": "Thu, 29 Jun 2006 07:32:39 GMT" }, { "version": "v4", "created": "Fri, 15 Dec 2006 14:16:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Manthey", "Bodo", "" ] ]
cs/0604024
Joel Friedman
Joel Friedman
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity II: A Simple Example
8 pages
null
null
null
cs.CC math.AG
null
In a previous paper we have suggested a number of ideas to attack circuit size complexity with cohomology. As a simple example, we take circuits that can only compute the AND of two inputs, which essentially reduces to SET COVER. We show a very special case of the cohomological approach (one particular free category, using injective and superskyscraper sheaves) gives the linear programming bound coming from the relaxation of the standard integer programming reformulation of SET COVER.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 20:07:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Joel", "" ] ]
cs/0604026
Damiano Bolzoni
Damiano Bolzoni, Sandro Etalle
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
null
null
null
TR-CTIT-06-13
cs.CR
null
We present APHRODITE, an architecture designed to reduce false positives in network intrusion detection systems. APHRODITE works by detecting anomalies in the output traffic, and by correlating them with the alerts raised by the NIDS working on the input traffic. Benchmarks show a substantial reduction of false positives and that APHRODITE is effective also after a "quick setup", i.e. in the realistic case in which it has not been "trained" and set up optimally
[ { "version": "v1", "created": "Fri, 7 Apr 2006 12:13:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Bolzoni", "Damiano", "" ], [ "Etalle", "Sandro", "" ] ]
cs/0604032
Martin Ziegler
Martin Ziegler and Klaus Meer
Real Computational Universality: The Word Problem for a class of groups with infinite presentation
corrected Section 4.5
null
null
null
cs.LO cs.SC
null
The word problem for discrete groups is well-known to be undecidable by a Turing Machine; more precisely, it is reducible both to and from and thus equivalent to the discrete Halting Problem. The present work introduces and studies a real extension of the word problem for a certain class of groups which are presented as quotient groups of a free group and a normal subgroup. Most important, the free group will be generated by an uncountable set of generators with index running over certain sets of real numbers. This allows to include many mathematically important groups which are not captured in the framework of the classical word problem. Our contribution extends computational group theory from the discrete to the Blum-Shub-Smale (BSS) model of real number computation. We believe this to be an interesting step towards applying BSS theory, in addition to semi-algebraic geometry, also to further areas of mathematics. The main result establishes the word problem for such groups to be not only semi-decidable (and thus reducible FROM) but also reducible TO the Halting Problem for such machines. It thus provides the first non-trivial example of a problem COMPLETE, that is, computationally universal for this model.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 23:57:46 GMT" }, { "version": "v2", "created": "Tue, 11 Apr 2006 11:38:19 GMT" }, { "version": "v3", "created": "Wed, 7 Jun 2006 07:48:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Ziegler", "Martin", "" ], [ "Meer", "Klaus", "" ] ]
cs/0604035
R N Mohan Professor
R.N.Mohan, Sanpei Kageyama, Moon Ho Lee, Gao Yang
Certain new M-matrices and their properties and applications
21 pages,3 figures
null
null
null
cs.DM
null
The Mn-matrix was defined by Mohan [20] in which he has shown a method of constructing (1,-1)-matrices and studied some of their properties. The (1,-1)-matrices were constructed and studied by Cohn [5],Wang [33], Ehrlich [8] and Ehrlich and Zeller[9]. But in this paper, while giving some resemblances of this matrix with Hadamard matrix, and by naming it as M-matrix, we show how to construct partially balanced incomplete block (PBIB) designs and some regular bipartite graphs by it. We have considered two types of these M- matrices. Also we will make a mention of certain applications of these M-matrices in signal and communication processing, and network systems and end with some open problems.
[ { "version": "v1", "created": "Sun, 9 Apr 2006 06:02:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohan", "R. N.", "" ], [ "Kageyama", "Sanpei", "" ], [ "Lee", "Moon Ho", "" ], [ "Yang", "Gao", "" ] ]
cs/0604036
Jakob Vo{\ss}
Jakob Voss
Collaborative thesaurus tagging the Wikipedia way
7 pages, 7 figures, 7 tables; v2 with added appendix and fixed references
null
null
null
cs.IR cs.DL
null
This paper explores the system of categories that is used to classify articles in Wikipedia. It is compared to collaborative tagging systems like del.icio.us and to hierarchical classification like the Dewey Decimal Classification (DDC). Specifics and commonalitiess of these systems of subject indexing are exposed. Analysis of structural and statistical properties (descriptors per record, records per descriptor, descriptor levels) shows that the category system of Wikimedia is a thesaurus that combines collaborative tagging and hierarchical subject indexing in a special way.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 12:04:29 GMT" }, { "version": "v2", "created": "Thu, 27 Apr 2006 00:41:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Voss", "Jakob", "" ] ]
cs/0604038
Evgueni Petrov
E. Petrov, Yu. Kostov, E. Botoeva
UniCalc.LIN: a linear constraint solver for the UniCalc system
rejected by the programm committee of the conforence on Perspective of System Informatics held in Novosibirsk, Russian Federation July 2006
null
null
null
cs.MS cs.AI
null
In this short paper we present a linear constraint solver for the UniCalc system, an environment for reliable solution of mathematical modeling problems.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 06:30:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrov", "E.", "" ], [ "Kostov", "Yu.", "" ], [ "Botoeva", "E.", "" ] ]
cs/0604039
Laurent Mazet PhD
David Bateman, Laurent Mazet, Veronique Buzenac-Settineri and Markus Muck
A Fixed-Point Type for Octave
5 pages, 1 figure
null
null
octave2006/12
cs.MS
null
This paper announces the availability of a fixed point toolbox for the Matlab compatible software package Octave. This toolbox is released under the GNU Public License, and can be used to model the losses in algorithms implemented in hardware. Furthermore, this paper presents as an example of the use of this toolbox, the effects of a fixed point implementation on the precision of an OFDM modulator.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 08:22:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Bateman", "David", "" ], [ "Mazet", "Laurent", "" ], [ "Buzenac-Settineri", "Veronique", "" ], [ "Muck", "Markus", "" ] ]
cs/0604042
Florentin Smarandache
M. C. Florea, J. Dezert, P. Valin, F. Smarandache, Anne-Laure Jousselme
Adaptative combination rule and proportional conflict redistribution rule for information fusion
Presented at Cogis '06 Conference, Paris, March 2006
null
null
null
cs.AI
null
This paper presents two new promising rules of combination for the fusion of uncertain and potentially highly conflicting sources of evidences in the framework of the theory of belief functions in order to palliate the well-know limitations of Dempster's rule and to work beyond the limits of applicability of the Dempster-Shafer theory. We present both a new class of adaptive combination rules (ACR) and a new efficient Proportional Conflict Redistribution (PCR) rule allowing to deal with highly conflicting sources for static and dynamic fusion applications.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 14:35:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Florea", "M. C.", "" ], [ "Dezert", "J.", "" ], [ "Valin", "P.", "" ], [ "Smarandache", "F.", "" ], [ "Jousselme", "Anne-Laure", "" ] ]
cs/0604043
Thomas Way
Thomas P. Way and Lori L. Pollock
Demand-driven Inlining in a Region-based Optimizer for ILP Architectures
23 pages
null
null
null
cs.DC cs.PL
null
Region-based compilation repartitions a program into more desirable compilation units using profiling information and procedure inlining to enable region formation analysis. Heuristics play a key role in determining when it is most beneficial to inline procedures during region formation. An ILP optimizing compiler using a region-based approach restructures a program to better reflect dynamic behavior and increase interprocedural optimization and scheduling opportunities. This paper presents an interprocedural compilation technique which performs procedure inlining on-demand, rather than as a separate phase, to improve the ability of a region-based optimizer to control code growth, compilation time and memory usage while improving performance. The interprocedural region formation algorithm utilizes a demand-driven, heuristics-guided approach to inlining, restructuring an input program into interprocedural regions. Experimental results are presented to demonstrate the impact of the algorithm and several inlining heuristics upon a number of traditional and novel compilation characteristics within a region-based ILP compiler and simulator.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 04:15:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Way", "Thomas P.", "" ], [ "Pollock", "Lori L.", "" ] ]
cs/0604045
Sandor P. Fekete
Sandor P. Fekete and Joerg Schepers and Jan C. van der Veen
An exact algorithm for higher-dimensional orthogonal packing
31 pages, 6 figures, 9 tables, to appear in Operations Research; full and updated journal version of sketches that appeared as parts of an extended abstract in ESA'97
null
null
null
cs.DS
null
Higher-dimensional orthogonal packing problems have a wide range of practical applications, including packing, cutting, and scheduling. Combining the use of our data structure for characterizing feasible packings with our new classes of lower bounds, and other heuristics, we develop a two-level tree search algorithm for solving higher-dimensional packing problems to optimality. Computational results are reported, including optimal solutions for all two--dimensional test problems from recent literature. This is the third in a series of articles describing new approaches to higher-dimensional packing; see cs.DS/0310032 and cs.DS/0402044.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 13:55:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Schepers", "Joerg", "" ], [ "van der Veen", "Jan C.", "" ] ]
cs/0604046
Michael Aupetit
Dominique Lepetz, Max Nemoz-Gaillard and Michael Aupetit
Concerning the differentiability of the energy function in vector quantization algorithms
Under submission to a peer-reviewed international journal
null
null
null
cs.LG cs.NE
null
The adaptation rule for Vector Quantization algorithms, and consequently the convergence of the generated sequence, depends on the existence and properties of a function called the energy function, defined on a topological manifold. Our aim is to investigate the conditions of existence of such a function for a class of algorithms examplified by the initial ''K-means'' and Kohonen algorithms. The results presented here supplement previous studies and show that the energy function is not always a potential but at least the uniform limit of a series of potential functions which we call a pseudo-potential. Our work also shows that a large number of existing vector quantization algorithms developped by the Artificial Neural Networks community fall into this category. The framework we define opens the way to study the convergence of all the corresponding adaptation rules at once, and a theorem gives promising insights in that direction. We also demonstrate that the ''K-means'' energy function is a pseudo-potential but not a potential in general. Consequently, the energy function associated to the ''Neural-Gas'' is not a potential in general.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 14:00:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Lepetz", "Dominique", "" ], [ "Nemoz-Gaillard", "Max", "" ], [ "Aupetit", "Michael", "" ] ]
cs/0604047
rapha?l Jungers
Rapha\"el Jungers, Vladimir Protasov, Vincent D. Blondel
Efficient algorithms for deciding the type of growth of products of integer matrices
20 pages, 4 figures, submitted to LAA
null
null
null
cs.CC
null
For a given finite set $\Sigma$ of matrices with nonnegative integer entries we study the growth of $$ \max_t(\Sigma) = \max\{\|A_{1}... A_{t}\|: A_i \in \Sigma\}.$$ We show how to determine in polynomial time whether the growth with $t$ is bounded, polynomial, or exponential, and we characterize precisely all possible behaviors.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 14:10:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Jungers", "Raphaël", "" ], [ "Protasov", "Vladimir", "" ], [ "Blondel", "Vincent D.", "" ] ]
cs/0604048
Vita Hinze-Hoare
Vita Hinze-Hoare
Will the Butterfly Cipher keep your Network Data secure? Developments in Computer Encryption
null
null
null
null
cs.CR
null
This paper explains the recent developments in security and encryption. The Butterfly cipher and quantum cryptography are reviewed and compared. Examples of their relative uses are discussed and suggestions for future developments considered. In addition application to network security together with a substantial review of classification of encryption systems and a summary of security weaknesses are considered.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 20:21:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
cs/0604051
Michael Brinkmeier
Michael Brinkmeier
Structural Alignments of pseudo-knotted RNA-molecules in polynomial time
16 pages
null
null
null
cs.DS cs.CC cs.DM
null
An RNA molecule is structured on several layers. The primary and most obvious structure is its sequence of bases, i.e. a word over the alphabet {A,C,G,U}. The higher structure is a set of one-to-one base-pairings resulting in a two-dimensional folding of the one-dimensional sequence. One speaks of a secondary structure if these pairings do not cross and of a tertiary structure otherwise. Since the folding of the molecule is important for its function, the search for related RNA molecules should not only be restricted to the primary structure. It seems sensible to incorporate the higher structures in the search. Based on this assumption and certain edit-operations a distance between two arbitrary structures can be defined. It is known that the general calculation of this measure is NP-complete \cite{zhang02similarity}. But for some special cases polynomial algorithms are known. Using a new formal description of secondary and tertiary structures, we extend the class of structures for which the distance can be calculated in polynomial time. In addition the presented algorithm may be used to approximate the edit-distance between two arbitrary structures with a constant ratio.
[ { "version": "v1", "created": "Wed, 12 Apr 2006 06:46:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Brinkmeier", "Michael", "" ] ]
cs/0604053
Maciej Kurant
Maciej Kurant, Patrick Thiran
Survivable Routing in IP-over-WDM Networks in the Presence of Multiple Failures
8 pages, 6 figures
null
null
null
cs.NI
null
Failure restoration at the IP layer in IP-over-WDM networks requires to map the IP topology on the WDM topology in such a way that a failure at the WDM layer leaves the IP topology connected. Such a mapping is called $survivable$. As finding a survivable mapping is known to be NP-complete, in practice it requires a heuristic approach. We have introduced in [1] a novel algorithm called ``SMART'', that is more effective and scalable than the heuristics known to date. Moreover, the formal analysis of SMART [2] has led to new applications: the formal verification of the existence of a survivable mapping, and a tool tracing and repairing the vulnerable areas of the network. In this paper we extend the theoretical analysis in [2] by considering $multiple failures$.
[ { "version": "v1", "created": "Wed, 12 Apr 2006 17:10:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurant", "Maciej", "" ], [ "Thiran", "Patrick", "" ] ]
cs/0604058
Yury Lifshits
Yury Lifshits
Solving Classical String Problems on Compressed Texts
10 pages, 6 figures, submitted
null
null
null
cs.DS cs.CC
null
Here we study the complexity of string problems as a function of the size of a program that generates input. We consider straight-line programs (SLP), since all algorithms on SLP-generated strings could be applied to processing LZ-compressed texts. The main result is a new algorithm for pattern matching when both a text T and a pattern P are presented by SLPs (so-called fully compressed pattern matching problem). We show how to find a first occurrence, count all occurrences, check whether any given position is an occurrence or not in time O(n^2m). Here m,n are the sizes of straight-line programs generating correspondingly P and T. Then we present polynomial algorithms for computing fingerprint table and compressed representation of all covers (for the first time) and for finding periods of a given compressed string (our algorithm is faster than previously known). On the other hand, we show that computing the Hamming distance between two SLP-generated strings is NP- and coNP-hard.
[ { "version": "v1", "created": "Thu, 13 Apr 2006 08:12:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Lifshits", "Yury", "" ] ]
cs/0604059
Olivier Devillers
Olivier Devillers (INRIA Sophia Antipolis), Philippe Guigue (INRIA Sophia Antipolis)
Inner and Outer Rounding of Boolean Operations on Lattice Polygonal Regions
null
null
null
null
cs.CG
null
Robustness problems due to the substitution of the exact computation on real numbers by the rounded floating point arithmetic are often an obstacle to obtain practical implementation of geometric algorithms. If the adoption of the --exact computation paradigm--[Yap et Dube] gives a satisfactory solution to this kind of problems for purely combinatorial algorithms, this solution does not allow to solve in practice the case of algorithms that cascade the construction of new geometric objects. In this report, we consider the problem of rounding the intersection of two polygonal regions onto the integer lattice with inclusion properties. Namely, given two polygonal regions A and B having their vertices on the integer lattice, the inner and outer rounding modes construct two polygonal regions with integer vertices which respectively is included and contains the true intersection. We also prove interesting results on the Hausdorff distance, the size and the convexity of these polygonal regions.
[ { "version": "v1", "created": "Thu, 13 Apr 2006 14:33:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "", "INRIA Sophia Antipolis" ], [ "Guigue", "Philippe", "", "INRIA\n Sophia Antipolis" ] ]
cs/0604061
Edwin Henneken
Edwin A. Henneken, Michael J. Kurtz, Guenther Eichhorn, Alberto Accomazzi, Carolyn Grant, Donna Thompson, Stephen S. Murray
Effect of E-printing on Citation Rates in Astronomy and Physics
Submitted to the Journal of Electronic Publishing. 11 pages with 5 figures
null
null
null
cs.DL astro-ph
null
In this report we examine the change in citation behavior since the introduction of the arXiv e-print repository (Ginsparg, 2001). It has been observed that papers that initially appear as arXiv e-prints get cited more than papers that do not (Lawrence, 2001; Brody et al., 2004; Schwarz & Kennicutt, 2004; Kurtz et al., 2005a, Metcalfe, 2005). Using the citation statistics from the NASA-Smithsonian Astrophysics Data System (ADS; Kurtz et al., 1993, 2000), we confirm the findings from other studies, we examine the average citation rate to e-printed papers in the Astrophysical Journal, and we show that for a number of major astronomy and physics journals the most important papers are submitted to the arXiv e-print repository first.
[ { "version": "v1", "created": "Thu, 13 Apr 2006 22:02:05 GMT" }, { "version": "v2", "created": "Mon, 5 Jun 2006 11:47:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Henneken", "Edwin A.", "" ], [ "Kurtz", "Michael J.", "" ], [ "Eichhorn", "Guenther", "" ], [ "Accomazzi", "Alberto", "" ], [ "Grant", "Carolyn", "" ], [ "Thompson", "Donna", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0604062
Liang Wu
Liang Wu
Biologically Inspired Hierarchical Model for Feature Extraction and Localization
4 pages, 4 figures
null
null
null
cs.CV
null
Feature extraction and matching are among central problems of computer vision. It is inefficent to search features over all locations and scales. Neurophysiological evidence shows that to locate objects in a digital image the human visual system employs visual attention to a specific object while ignoring others. The brain also has a mechanism to search from coarse to fine. In this paper, we present a feature extractor and an associated hierarchical searching model to simulate such processes. With the hierarchical representation of the object, coarse scanning is done through the matching of the larger scale and precise localization is conducted through the matching of the smaller scale. Experimental results justify the proposed model in its effectiveness and efficiency to localize features.
[ { "version": "v1", "created": "Fri, 14 Apr 2006 04:40:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Wu", "Liang", "" ] ]
cs/0604064
Mirco Mannucci Ph.D.
Mirco A. Mannucci
Quantum Fuzzy Sets: Blending Fuzzy Set Theory and Quantum Computation
12 pages
null
null
null
cs.LO cs.AI
null
In this article we investigate a way in which quantum computing can be used to extend the class of fuzzy sets. The core idea is to see states of a quantum register as characteristic functions of quantum fuzzy subsets of a given set. As the real unit interval is embedded in the Bloch sphere, every fuzzy set is automatically a quantum fuzzy set. However, a generic quantum fuzzy set can be seen as a (possibly entangled) superposition of many fuzzy sets at once, offering new opportunities for modeling uncertainty. After introducing the main framework of quantum fuzzy set theory, we analyze the standard operations of fuzzification and defuzzification from our viewpoint. We conclude this preliminary paper with a list of possible applications of quantum fuzzy sets to pattern recognition, as well as future directions of pure research in quantum fuzzy set theory.
[ { "version": "v1", "created": "Sun, 16 Apr 2006 16:23:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Mannucci", "Mirco A.", "" ] ]
cs/0604066
Elias Tsigaridas
Elias P. Tsigaridas and Ioannis Z. Emiris
Univariate polynomial real root isolation: Continued Fractions revisited
12 pages
null
null
null
cs.SC cs.CC cs.MS
null
We present algorithmic, complexity and implementation results concerning real root isolation of integer univariate polynomials using the continued fraction expansion of real algebraic numbers. One motivation is to explain the method's good performance in practice. We improve the previously known bound by a factor of $d \tau$, where $d$ is the polynomial degree and $\tau$ bounds the coefficient bitsize, thus matching the current record complexity for real root isolation by exact methods. Namely, the complexity bound is $\sOB(d^4 \tau^2)$ using the standard bound on the expected bitsize of the integers in the continued fraction expansion. We show how to compute the multiplicities within the same complexity and extend the algorithm to non square-free polynomials. Finally, we present an efficient open-source \texttt{C++} implementation in the algebraic library \synaps, and illustrate its efficiency as compared to other available software. We use polynomials with coefficient bitsize up to 8000 and degree up to 1000.
[ { "version": "v1", "created": "Mon, 17 Apr 2006 10:52:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Tsigaridas", "Elias P.", "" ], [ "Emiris", "Ioannis Z.", "" ] ]
cs/0604067
R.N.Mohan Professor
R.N.Mohan, Moon Ho Lee, Subhash Pokrel
Certain t-partite graphs
null
null
null
null
cs.DM
null
By making use of the generalized concept of orthogonality in Latin squares, certain t-partite graphs have been constructed and a suggestion for a net work system and some applications have been made.
[ { "version": "v1", "created": "Tue, 18 Apr 2006 09:30:55 GMT" }, { "version": "v2", "created": "Thu, 11 May 2006 00:11:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohan", "R. N.", "" ], [ "Lee", "Moon Ho", "" ], [ "Pokrel", "Subhash", "" ] ]
cs/0604068
Christian Klein
Benjamin Doerr and Tobias Friedrich and Christian Klein and Ralf Osbild
Unbiased Matrix Rounding
10th Scandinavian Workshop on Algorithm Theory (SWAT), 2006, to appear
null
null
null
cs.DS cs.DM
null
We show several ways to round a real matrix to an integer one such that the rounding errors in all rows and columns as well as the whole matrix are less than one. This is a classical problem with applications in many fields, in particular, statistics. We improve earlier solutions of different authors in two ways. For rounding matrices of size $m \times n$, we reduce the runtime from $O((m n)^2 Second, our roundings also have a rounding error of less than one in all initial intervals of rows and columns. Consequently, arbitrary intervals have an error of at most two. This is particularly useful in the statistics application of controlled rounding. The same result can be obtained via (dependent) randomized rounding. This has the additional advantage that the rounding is unbiased, that is, for all entries $y_{ij}$ of our rounding, we have $E(y_{ij}) = x_{ij}$, where $x_{ij}$ is the corresponding entry of the input matrix.
[ { "version": "v1", "created": "Tue, 18 Apr 2006 15:08:37 GMT" }, { "version": "v2", "created": "Thu, 20 Apr 2006 18:25:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Doerr", "Benjamin", "" ], [ "Friedrich", "Tobias", "" ], [ "Klein", "Christian", "" ], [ "Osbild", "Ralf", "" ] ]
cs/0604071
Nuno Santos
Nuno Santos, Birger Koblitz
Distributed Metadata with the AMGA Metadata Catalog
6 pages, 3 figures, to appear in Workshop on Next-Generation Distributed Data Management - HPDC-15
null
null
null
cs.DC cs.DB
null
Catalog Services play a vital role on Data Grids by allowing users and applications to discover and locate the data needed. On large Data Grids, with hundreds of geographically distributed sites, centralized Catalog Services do not provide the required scalability, performance or fault-tolerance. In this article, we start by presenting and discussing the general requirements on Grid Catalogs of applications being developed by the EGEE user community. This provides the motivation for the second part of the article, where we present the replication and distribution mechanisms we have designed and implemented into the AMGA Metadata Catalog, which is part of the gLite software stack being developed for the EGEE project. Implementing these mechanisms in the catalog itself has the advantages of not requiring any special support from the relational database back-end, of being database independent, and of allowing tailoring the mechanisms to the specific requirements and characteristics of Metadata Catalogs.
[ { "version": "v1", "created": "Wed, 19 Apr 2006 10:01:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Santos", "Nuno", "" ], [ "Koblitz", "Birger", "" ] ]
cs/0604073
Muthiah Annamalai
Muthiah Annamalai, Hemant Kumar, Leela Velusamy
Octave-GTK: A GTK binding for GNU Octave
Comments: Presented at Octave2006 Conference, Washington D.C
null
null
Octave2006/02
cs.SE
null
This paper discusses the problems faced with interoperability between two programming languages, with respect to GNU Octave, and GTK API written in C, to provide the GTK API on Octave.Octave-GTK is the fusion of two different API's: one exported by GNU Octave [scientific computing tool] and the other GTK [GUI toolkit]; this enables one to use GTK primitives within GNU Octave, to build graphical front ends,at the same time using octave engine for number crunching power. This paper illustrates our implementation of binding logic, and shows results extended to various other libraries using the same base code generator. Also shown, are methods of code generation, binding automation, and the niche we plan to fill in the absence of GUI in Octave. Canonical discussion of advantages, feasibility and problems faced in the process are elucidated.
[ { "version": "v1", "created": "Wed, 19 Apr 2006 16:46:23 GMT" }, { "version": "v2", "created": "Fri, 28 Apr 2006 18:43:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Annamalai", "Muthiah", "" ], [ "Kumar", "Hemant", "" ], [ "Velusamy", "Leela", "" ] ]
cs/0604075
Gyorgy Korniss
Qiming Lu, G. Korniss, and Boleslaw K. Szymanski
Naming Games in Spatially-Embedded Random Networks
We have found a programming error in our code used to generate the results of the earlier version. We have corrected the error, reran all simulations, and regenerated all data plots. While the qualitative behavior of the model has not changed, the numerical values of some of the scaling exponents did. 7 figures
Proceedings of the 2006 American Association for Artificial Intelligence Fall Symposium Series, Interaction and Emergent Phenomena in Societies of Agents (AAAI Press, Menlo Park, CA 2006) pp. 148-155
null
null
cs.MA cond-mat.stat-mech cs.AI
null
We investigate a prototypical agent-based model, the Naming Game, on random geometric networks. The Naming Game is a minimal model, employing local communications that captures the emergence of shared communication schemes (languages) in a population of autonomous semiotic agents. Implementing the Naming Games on random geometric graphs, local communications being local broadcasts, serves as a model for agreement dynamics in large-scale, autonomously operating wireless sensor networks. Further, it captures essential features of the scaling properties of the agreement process for spatially-embedded autonomous agents. We also present results for the case when a small density of long-range communication links are added on top of the random geometric graph, resulting in a "small-world"-like network and yielding a significantly reduced time to reach global agreement.
[ { "version": "v1", "created": "Wed, 19 Apr 2006 17:48:11 GMT" }, { "version": "v2", "created": "Fri, 28 Jul 2006 21:35:33 GMT" }, { "version": "v3", "created": "Mon, 7 May 2007 21:10:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Lu", "Qiming", "" ], [ "Korniss", "G.", "" ], [ "Szymanski", "Boleslaw K.", "" ] ]
cs/0604076
Loreto Bravo
Loreto Bravo and Leopoldo Bertossi
Semantically Correct Query Answers in the Presence of Null Values
20 pages. To appear in Proc. of International Workshop on Inconsistency and Incompleteness in Databases (IIDB 2006)
null
null
null
cs.DB
null
For several reasons a database may not satisfy a given set of integrity constraints(ICs), but most likely most of the information in it is still consistent with those ICs; and could be retrieved when queries are answered. Consistent answers to queries wrt a set of ICs have been characterized as answers that can be obtained from every possible minimally repaired consistent version of the original database. In this paper we consider databases that contain null values and are also repaired, if necessary, using null values. For this purpose, we propose first a precise semantics for IC satisfaction in a database with null values that is compatible with the way null values are treated in commercial database management systems. Next, a precise notion of repair is introduced that privileges the introduction of null values when repairing foreign key constraints, in such a way that these new values do not create an infinite cycle of new inconsistencies. Finally, we analyze how to specify this kind of repairs of a database that contains null values using disjunctive logic programs with stable model semantics.
[ { "version": "v1", "created": "Wed, 19 Apr 2006 22:33:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Bravo", "Loreto", "" ], [ "Bertossi", "Leopoldo", "" ] ]
cs/0604078
Maria Chli
Maria Chli, Philippe De Wilde
The emergence of knowledge exchange: an agent-based model of a software market
fixed legend problem
null
null
null
cs.MA cs.CE
null
We investigate knowledge exchange among commercial organisations, the rationale behind it and its effects on the market. Knowledge exchange is known to be beneficial for industry, but in order to explain it, authors have used high level concepts like network effects, reputation and trust. We attempt to formalise a plausible and elegant explanation of how and why companies adopt information exchange and why it benefits the market as a whole when this happens. This explanation is based on a multi-agent model that simulates a market of software providers. Even though the model does not include any high-level concepts, information exchange naturally emerges during simulations as a successful profitable behaviour. The conclusions reached by this agent-based analysis are twofold: (1) A straightforward set of assumptions is enough to give rise to exchange in a software market. (2) Knowledge exchange is shown to increase the efficiency of the market.
[ { "version": "v1", "created": "Thu, 20 Apr 2006 11:20:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Chli", "Maria", "" ], [ "De Wilde", "Philippe", "" ] ]
cs/0604084
Michael Singer
Ziming Li, Michael F. Singer, Min Wu, Dabin Zheng
A Recursive Method for Determining the One-Dimensional Submodules of Laurent-Ore Modules
To appear in the Proceedings of ISSAC 2006
null
null
null
cs.SC math.CA
null
We present a method for determining the one-dimensional submodules of a Laurent-Ore module. The method is based on a correspondence between hyperexponential solutions of associated systems and one-dimensional submodules. The hyperexponential solutions are computed recursively by solving a sequence of first-order ordinary matrix equations. As the recursion proceeds, the matrix equations will have constant coefficients with respect to the operators that have been considered.
[ { "version": "v1", "created": "Fri, 21 Apr 2006 16:04:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Ziming", "" ], [ "Singer", "Michael F.", "" ], [ "Wu", "Min", "" ], [ "Zheng", "Dabin", "" ] ]
cs/0604086
Michael Fink
Thomas Eiter, Michael Fink, and Hans Tompits
A Knowledge-Based Approach for Selecting Information Sources
53 pages, 2 Figures; to appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.AI
null
Through the Internet and the World-Wide Web, a vast number of information sources has become available, which offer information on various subjects by different providers, often in heterogeneous formats. This calls for tools and methods for building an advanced information-processing infrastructure. One issue in this area is the selection of suitable information sources in query answering. In this paper, we present a knowledge-based approach to this problem, in the setting where one among a set of information sources (prototypically, data repositories) should be selected for evaluating a user query. We use extended logic programs (ELPs) to represent rich descriptions of the information sources, an underlying domain theory, and user queries in a formal query language (here, XML-QL, but other languages can be handled as well). Moreover, we use ELPs for declarative query analysis and generation of a query description. Central to our approach are declarative source-selection programs, for which we define syntax and semantics. Due to the structured nature of the considered data items, the semantics of such programs must carefully respect implicit context information in source-selection rules, and furthermore combine it with possible user preferences. A prototype implementation of our approach has been realized exploiting the DLV KR system and its plp front-end for prioritized ELPs. We describe a representative example involving specific movie databases, and report about experimental results.
[ { "version": "v1", "created": "Fri, 21 Apr 2006 16:53:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiter", "Thomas", "" ], [ "Fink", "Michael", "" ], [ "Tompits", "Hans", "" ] ]
cs/0604087
Yongzhi Cao
Yongzhi Cao, Lirong Xia and Mingsheng Ying
Probabilistic Automata for Computing with Words
35 pages; 3 figures
null
null
null
cs.AI cs.CL
null
Usually, probabilistic automata and probabilistic grammars have crisp symbols as inputs, which can be viewed as the formal models of computing with values. In this paper, we first introduce probabilistic automata and probabilistic grammars for computing with (some special) words in a probabilistic framework, where the words are interpreted as probabilistic distributions or possibility distributions over a set of crisp symbols. By probabilistic conditioning, we then establish a retraction principle from computing with words to computing with values for handling crisp inputs and a generalized extension principle from computing with words to computing with all words for handling arbitrary inputs. These principles show that computing with values and computing with all words can be respectively implemented by computing with some special words. To compare the transition probabilities of two near inputs, we also examine some analytical properties of the transition probability functions of generalized extensions. Moreover, the retractions and the generalized extensions are shown to be equivalence-preserving. Finally, we clarify some relationships among the retractions, the generalized extensions, and the extensions studied recently by Qiu and Wang.
[ { "version": "v1", "created": "Sun, 23 Apr 2006 02:58:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Cao", "Yongzhi", "" ], [ "Xia", "Lirong", "" ], [ "Ying", "Mingsheng", "" ] ]
cs/0604089
Michele Tucci
Michele Tucci
Evolutionary Socioeconomics: a Schumpeterian Computer Simulation
PDF, 15 pages, 5 graphs
null
null
null
cs.GT cs.CY
null
The following note contains a computer simulation concerning the struggle between two companies: the first one is "the biggest zaibatsu of all", while the second one is "small, fast, ruthless". The model is based on a neo-Schumpeterian framework operating in a Darwinian evolutionary environment. After running the program a large number of times, two characteristics stand out: -- There is always a winner which takes it all, while the loser disappears. -- The key to success is the ability to employ efficiently the technological innovations. The topic of the present paper is strictly related with the content of the following notes: Michele Tucci, Evolution and Gravitation: a Computer Simulation of a Non-Walrasian Equilibrium Model; Michele Tucci, Oligopolistic Competition in an Evolutionary Environment: a Computer Simulation. The texts can be downloaded respectively at the following addresses: http://arxiv.org/abs/cs.CY/0209017 http://arxiv.org/abs/cs.CY/0501037 These references include some preliminary considerations regarding the comparison between the evolutionary and the gravitational paradigms and the evaluation of approaches belonging to rival schools of economic thought.
[ { "version": "v1", "created": "Sun, 23 Apr 2006 13:29:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Tucci", "Michele", "" ] ]
cs/0604090
Mirco Mannucci Ph.D.
Mirco A. Mannucci, Lisa Sparks, Daniele C. Struppa
Simplicial models of social aggregation I
31 pages
null
null
null
cs.CE
null
This paper presents the foundational ideas for a new way of modeling social aggregation. Traditional approaches have been using network theory, and the theory of random networks. Under that paradigm, every social agent is represented by a node, and every social interaction is represented by a segment connecting two nodes. Early work in family interactions, as well as more recent work in the study of terrorist organizations, shows that network modeling may be insufficient to describe the complexity of human social structures. Specifically, network theory does not seem to have enough flexibility to represent higher order aggregations, where several agents interact as a group, rather than as a collection of pairs. The model we present here uses a well established mathematical theory, the theory of simplicial complexes, to address this complex issue prevalent in interpersonal and intergroup communication. The theory enables us to provide a richer graphical representation of social interactions, and to determine quantitative mechanisms to describe the robustness of a social structure. We also propose a methodology to create random simplicial complexes, with the purpose of providing a new method to simulate computationally the creation and disgregation of social structures. Finally, we propose several measures which could be taken and observed in order to describe and study an actual social aggregation occurring in interpersonal and intergroup contexts.
[ { "version": "v1", "created": "Sun, 23 Apr 2006 19:28:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Mannucci", "Mirco A.", "" ], [ "Sparks", "Lisa", "" ], [ "Struppa", "Daniele C.", "" ] ]
cs/0604095
Gregory Gutin
Gregory Gutin, Stefan Szeider, Anders Yeo
Fixed-Parameter Complexity of Minimum Profile Problems
null
null
null
null
cs.DS cs.DM
null
Let $G=(V,E)$ be a graph. An ordering of $G$ is a bijection $\alpha: V\dom \{1,2,..., |V|\}.$ For a vertex $v$ in $G$, its closed neighborhood is $N[v]=\{u\in V: uv\in E\}\cup \{v\}.$ The profile of an ordering $\alpha$ of $G$ is $\prf_{\alpha}(G)=\sum_{v\in V}(\alpha(v)-\min\{\alpha(u): u\in N[v]\}).$ The profile $\prf(G)$ of $G$ is the minimum of $\prf_{\alpha}(G)$ over all orderings $\alpha$ of $G$. It is well-known that $\prf(G)$ is the minimum number of edges in an interval graph $H$ that contains $G$ is a subgraph. Since $|V|-1$ is a tight lower bound for the profile of connected graphs $G=(V,E)$, the parametrization above the guaranteed value $|V|-1$ is of particular interest. We show that deciding whether the profile of a connected graph $G=(V,E)$ is at most $|V|-1+k$ is fixed-parameter tractable with respect to the parameter $k$. We achieve this result by reduction to a problem kernel of linear size.
[ { "version": "v1", "created": "Mon, 24 Apr 2006 17:30:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "Gregory", "" ], [ "Szeider", "Stefan", "" ], [ "Yeo", "Anders", "" ] ]
cs/0604096
Tracey Ho
Tracey Ho
Polynomial-time algorithms for coding across multiple unicasts
null
null
null
null
cs.NI
null
We consider the problem of network coding across multiple unicasts. We give, for wired and wireless networks, efficient polynomial time algorithms for finding optimal network codes within the class of network codes restricted to XOR coding between pairs of flows.
[ { "version": "v1", "created": "Tue, 25 Apr 2006 02:55:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Ho", "Tracey", "" ] ]
cs/0604100
Abhishek Parakh
Abhishek Parakh
Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric Oblivious Key Exchange
7 pages, with minor typographical corrections.
null
null
null
cs.CR
null
This paper presents protocols for Kak's cubic transformation and proposes a modification to Diffie-Hellman key exchange protocol in order to achieve asymmetric oblivious exchange of keys.
[ { "version": "v1", "created": "Tue, 25 Apr 2006 17:39:37 GMT" }, { "version": "v2", "created": "Sun, 1 Apr 2007 17:49:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Parakh", "Abhishek", "" ] ]
cs/0604102
Vita Hinze-Hoare
Vita Hinze-Hoare
HCI and Educational Metrics as Tools for VLE Evaluation
null
null
null
null
cs.HC cs.LG
null
The general set of HCI and Educational principles are considered and a classification system constructed. A frequency analysis of principles is used to obtain the most significant set. Metrics are devised to provide objective measures of these principles and a consistent testing regime devised. These principles are used to analyse Blackboard and Moodle.
[ { "version": "v1", "created": "Tue, 25 Apr 2006 19:32:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
cs/0604103
Vita Hinze-Hoare
Vita Hinze-Hoare
Further Evaluationh of VLEs using HCI and Educational Metrics
null
null
null
null
cs.HC
null
Under consideration are the general set of Human computer Interaction (HCI) and Educational principles from prominent authors in the field and the construction of a system for evaluating Virtual Learning Environments (VLEs) with respect to the application of these HCI and Educational Principles. A frequency analysis of principles is used to obtain the most significant set. Metrics are devised to provide objective measures of these principles and a consistent testing regime is introduced. These principles are used to analyse the University VLE Blackboard. An open source VLE is also constructed with similar content to Blackboard courses so that a systematic comparison can be made. HCI and Educational metrics are determined for each VLE.
[ { "version": "v1", "created": "Tue, 25 Apr 2006 19:53:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
cs/0604105
Farid Benbadis
Farid Benbadis, Jean-Jacques Puig, Marcelo Dias de Amorim, Claude Chaudet, Timur Friedman, David Simplot-Ryl
Jumps: Enhancing hop-count positioning in sensor networks using multiple coordinates
null
null
null
null
cs.NI
null
Positioning systems in self-organizing networks generally rely on measurements such as delay and received signal strength, which may be difficult to obtain and often require dedicated equipment. An alternative to such approaches is to use simple connectivity information, that is, the presence or absence of a link between any pair of nodes, and to extend it to hop-counts, in order to obtain an approximate coordinate system. Such an approximation is sufficient for a large number of applications, such as routing. In this paper, we propose Jumps, a positioning system for those self-organizing networks in which other types of (exact) positioning systems cannot be used or are deemed to be too costly. Jumps builds a multiple coordinate system based solely on nodes neighborhood knowledge. Jumps is interesting in the context of wireless sensor networks, as it neither requires additional embedded equipment nor relies on any nodes capabilities. While other approaches use only three hop-count measurements to infer the position of a node, Jumps uses an arbitrary number. We observe that an increase in the number of measurements leads to an improvement in the localization process, without requiring a high dense environment. We show through simulations that Jumps, when compared with existing approaches, reduces the number of nodes sharing the same coordinates, which paves the way for functions such as position-based routing.
[ { "version": "v1", "created": "Wed, 26 Apr 2006 11:39:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Benbadis", "Farid", "" ], [ "Puig", "Jean-Jacques", "" ], [ "de Amorim", "Marcelo Dias", "" ], [ "Chaudet", "Claude", "" ], [ "Friedman", "Timur", "" ], [ "Simplot-Ryl", "David", "" ] ]
cs/0604108
Francesc Rossell\'o
Francesc Rossello, Gabriel Valiente
An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees
32 pages
null
null
null
cs.DS cs.DM math.CT
null
The relationship between two important problems in tree pattern matching, the largest common subtree and the smallest common supertree problems, is established by means of simple constructions, which allow one to obtain a largest common subtree of two trees from a smallest common supertree of them, and vice versa. These constructions are the same for isomorphic, homeomorphic, topological, and minor embeddings, they take only time linear in the size of the trees, and they turn out to have a clear algebraic meaning.
[ { "version": "v1", "created": "Thu, 27 Apr 2006 10:32:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Rossello", "Francesc", "" ], [ "Valiente", "Gabriel", "" ] ]
cs/0604111
Kristina Lerman
Kristina Lerman, Chris Jones, Aram Galstyan and Maja J Mataric
Analysis of Dynamic Task Allocation in Multi-Robot Systems
Preprint version of the paper published in International Journal of Robotics, March 2006, Volume 25, pp. 225-242
null
null
null
cs.RO cs.MA
null
Dynamic task allocation is an essential requirement for multi-robot systems operating in unknown dynamic environments. It allows robots to change their behavior in response to environmental changes or actions of other robots in order to improve overall system performance. Emergent coordination algorithms for task allocation that use only local sensing and no direct communication between robots are attractive because they are robust and scalable. However, a lack of formal analysis tools makes emergent coordination algorithms difficult to design. In this paper we present a mathematical model of a general dynamic task allocation mechanism. Robots using this mechanism have to choose between two types of task, and the goal is to achieve a desired task division in the absence of explicit communication and global knowledge. Robots estimate the state of the environment from repeated local observations and decide which task to choose based on these observations. We model the robots and observations as stochastic processes and study the dynamics of the collective behavior. Specifically, we analyze the effect that the number of observations and the choice of the decision function have on the performance of the system. The mathematical models are validated in a multi-robot multi-foraging scenario. The model's predictions agree very closely with experimental results from sensor-based simulations.
[ { "version": "v1", "created": "Thu, 27 Apr 2006 23:56:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Lerman", "Kristina", "" ], [ "Jones", "Chris", "" ], [ "Galstyan", "Aram", "" ], [ "Mataric", "Maja J", "" ] ]
cs/0604113
Andrea Sportiello
Sergio Caracciolo, Davide Fichera, Andrea Sportiello
One-in-Two-Matching Problem is NP-complete
30 pages
null
null
null
cs.CC
null
2-dimensional Matching Problem, which requires to find a matching of left- to right-vertices in a balanced $2n$-vertex bipartite graph, is a well-known polynomial problem, while various variants, like the 3-dimensional analogoue (3DM, with triangles on a tripartite graph), or the Hamiltonian Circuit Problem (HC, a restriction to ``unicyclic'' matchings) are among the main examples of NP-hard problems, since the first Karp reduction series of 1972. The same holds for the weighted variants of these problems, the Linear Assignment Problem being polynomial, and the Numerical 3-Dimensional Matching and Travelling Salesman Problem being NP-complete. In this paper we show that a small modification of the 2-dimensional Matching and Assignment Problems in which for each $i \leq n/2$ it is required that either $\pi(2i-1)=2i-1$ or $\pi(2i)=2i$, is a NP-complete problem. The proof is by linear reduction from SAT (or NAE-SAT), with the size $n$ of the Matching Problem being four times the number of edges in the factor graph representation of the boolean problem. As a corollary, in combination with the simple linear reduction of One-in-Two Matching to 3-Dimensional Matching, we show that SAT can be linearly reduced to 3DM, while the original Karp reduction was only cubic.
[ { "version": "v1", "created": "Fri, 28 Apr 2006 16:40:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Caracciolo", "Sergio", "" ], [ "Fichera", "Davide", "" ], [ "Sportiello", "Andrea", "" ] ]
cs/0605003
Amitabh Saxena
Amitabh Saxena and Ben Soh
A New Cryptosystem Based On Hidden Order Groups
removed examples for multiparty key agreement and join protocols, since they are redundant
null
null
null
cs.CR cs.CC
null
Let $G_1$ be a cyclic multiplicative group of order $n$. It is known that the Diffie-Hellman problem is random self-reducible in $G_1$ with respect to a fixed generator $g$ if $\phi(n)$ is known. That is, given $g, g^x\in G_1$ and having oracle access to a `Diffie-Hellman Problem' solver with fixed generator $g$, it is possible to compute $g^{1/x} \in G_1$ in polynomial time (see theorem 3.2). On the other hand, it is not known if such a reduction exists when $\phi(n)$ is unknown (see conjuncture 3.1). We exploit this ``gap'' to construct a cryptosystem based on hidden order groups and present a practical implementation of a novel cryptographic primitive called an \emph{Oracle Strong Associative One-Way Function} (O-SAOWF). O-SAOWFs have applications in multiparty protocols. We demonstrate this by presenting a key agreement protocol for dynamic ad-hoc groups.
[ { "version": "v1", "created": "Sun, 30 Apr 2006 18:13:10 GMT" }, { "version": "v2", "created": "Tue, 2 May 2006 16:59:08 GMT" }, { "version": "v3", "created": "Wed, 3 May 2006 17:55:02 GMT" }, { "version": "v4", "created": "Wed, 3 May 2006 21:23:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Saxena", "Amitabh", "" ], [ "Soh", "Ben", "" ] ]
cs/0605004
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
Novel Reversible Multiplier Architecture Using Reversible TSG Gate
4 Pages; Published in Proceedings of the 4th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-06), Dubai, March 2006. pp. 100-103. Contains the missing reference
null
null
null
cs.AR
null
In the recent years, reversible logic has emerged as a promising technology having its applications in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. Recently a 4 * 4 reversible gate called TSG is proposed. The most significant aspect of the proposed gate is that it can work singly as a reversible full adder, that is reversible full adder can now be implemented with a single gate only. This paper proposes a NXN reversible multiplier using TSG gate. It is based on two concepts. The partial products can be generated in parallel with a delay of d using Fredkin gates and thereafter the addition can be reduced to log2N steps by using reversible parallel adder designed from TSG gates. Similar multiplier architecture in conventional arithmetic (using conventional logic) has been reported in existing literature, but the proposed one in this paper is totally based on reversible logic and reversible cells as its building block. A 4x4 architecture of the proposed reversible multiplier is also designed. It is demonstrated that the proposed multiplier architecture using the TSG gate is much better and optimized, compared to its existing counterparts in literature; in terms of number of reversible gates and garbage outputs. Thus, this paper provides the initial threshold to building of more complex system which can execute more complicated operations using reversible logic.
[ { "version": "v1", "created": "Mon, 1 May 2006 09:34:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
cs/0605008
Arnaud Durand
Arnaud Durand (ELM), Etienne Grandjean (GREYC)
The complexity of acyclic conjunctive queries revisited
30 pages
null
null
null
cs.LO
null
In this paper, we consider first-order logic over unary functions and study the complexity of the evaluation problem for conjunctive queries described by such kind of formulas. A natural notion of query acyclicity for this language is introduced and we study the complexity of a large number of variants or generalizations of acyclic query problems in that context (Boolean or not Boolean, with or without inequalities, comparisons, etc...). Our main results show that all those problems are \textit{fixed-parameter linear} i.e. they can be evaluated in time $f(|Q|).|\textbf{db}|.|Q(\textbf{db})|$ where $|Q|$ is the size of the query $Q$, $|\textbf{db}|$ the database size, $|Q(\textbf{db})|$ is the size of the output and $f$ is some function whose value depends on the specific variant of the query problem (in some cases, $f$ is the identity function). Our results have two kinds of consequences. First, they can be easily translated in the relational (i.e., classical) setting. Previously known bounds for some query problems are improved and new tractable cases are then exhibited. Among others, as an immediate corollary, we improve a result of \~\cite{PapadimitriouY-99} by showing that any (relational) acyclic conjunctive query with inequalities can be evaluated in time $f(|Q|).|\textbf{db}|.|Q(\textbf{db})|$. A second consequence of our method is that it provides a very natural descriptive approach to the complexity of well-known algorithmic problems. A number of examples (such as acyclic subgraph problems, multidimensional matching, etc...) are considered for which new insights of their complexity are given.
[ { "version": "v1", "created": "Tue, 2 May 2006 09:31:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Durand", "Arnaud", "", "ELM" ], [ "Grandjean", "Etienne", "", "GREYC" ] ]
cs/0605015
Ciro Cattuto
Ciro Cattuto, Vittorio Loreto, Luciano Pietronero
Collaborative Tagging and Semiotic Dynamics
8 pages, 7 figures
PNAS 104, 1461 (2007)
10.1073/pnas.0610487104
null
cs.CY cs.DL physics.data-an physics.soc-ph
null
Collaborative tagging has been quickly gaining ground because of its ability to recruit the activity of web users into effectively organizing and sharing vast amounts of information. Here we collect data from a popular system and investigate the statistical properties of tag co-occurrence. We introduce a stochastic model of user behavior embodying two main aspects of collaborative tagging: (i) a frequency-bias mechanism related to the idea that users are exposed to each other's tagging activity; (ii) a notion of memory - or aging of resources - in the form of a heavy-tailed access to the past state of the system. Remarkably, our simple modeling is able to account quantitatively for the observed experimental features, with a surprisingly high accuracy. This points in the direction of a universal behavior of users, who - despite the complexity of their own cognitive processes and the uncoordinated and selfish nature of their tagging activity - appear to follow simple activity patterns.
[ { "version": "v1", "created": "Thu, 4 May 2006 18:53:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Cattuto", "Ciro", "" ], [ "Loreto", "Vittorio", "" ], [ "Pietronero", "Luciano", "" ] ]
cs/0605017
Tran Cao Son
Phan Huy Tu, Tran Cao Son, and Chitta Baral
Reasoning and Planning with Sensing Actions, Incomplete Information, and Static Causal Laws using Answer Set Programming
72 pages, 3 figures, a preliminary version of this paper appeared in the proceedings of the 7th International Conference on Logic Programming and Non-Monotonic Reasoning, 2004. To appear in Theory and Practice of Logic Programming
null
null
null
cs.AI
null
We extend the 0-approximation of sensing actions and incomplete information in [Son and Baral 2000] to action theories with static causal laws and prove its soundness with respect to the possible world semantics. We also show that the conditional planning problem with respect to this approximation is NP-complete. We then present an answer set programming based conditional planner, called ASCP, that is capable of generating both conformant plans and conditional plans in the presence of sensing actions, incomplete information about the initial state, and static causal laws. We prove the correctness of our implementation and argue that our planner is sound and complete with respect to the proposed approximation. Finally, we present experimental results comparing ASCP to other planners.
[ { "version": "v1", "created": "Thu, 4 May 2006 22:35:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Tu", "Phan Huy", "" ], [ "Son", "Tran Cao", "" ], [ "Baral", "Chitta", "" ] ]
cs/0605018
Florentin Smarandache
Florentin Smarandache, Sukanto Bhattacharya, Mohammad Khoshnevisan, Housila P. Singh, Rajesh Singh, F. Kaymram, S. Malakar, Jose L. Salmeron
Computational Modeling in Applied Problems: collected papers on econometrics, operations research, game theory and simulation
108 pages, many figures
Hexis, 2006.
null
null
cs.OH
null
Computational models pervade all branches of the exact sciences and have in recent times also started to prove to be of immense utility in some of the traditionally 'soft' sciences like ecology, sociology and politics. This volume is a collection of a few cutting-edge research papers on the application of variety of computational models and tools in the analysis, interpretation and solution of vexing real-world problems and issues in economics, management, ecology and global politics by some prolific researchers in the field.
[ { "version": "v1", "created": "Fri, 5 May 2006 00:35:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Bhattacharya", "Sukanto", "" ], [ "Khoshnevisan", "Mohammad", "" ], [ "Singh", "Housila P.", "" ], [ "Singh", "Rajesh", "" ], [ "Kaymram", "F.", "" ], [ "Malakar", "S.", "" ], [ "Salmeron", "Jose L.", "" ] ]
cs/0605020
Sergey Alpaev
Sergey Alpaev
Applied MVC Patterns. A pattern language
null
null
null
null
cs.SE
null
How to get advantages of MVC model without making applications unnecessarily complex? The full-featured MVC implementation is on the top end of ladder of complexity. The other end is meant for simple cases that do not call for such complex designs, however still in need of the advantages of MVC patterns, such as ability to change the look-and-feel. This paper presents patterns of MVC implementation that help to benefit from the paradigm and keep the right balance between flexibility and implementation complexity.
[ { "version": "v1", "created": "Fri, 5 May 2006 10:25:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Alpaev", "Sergey", "" ] ]
cs/0605021
Harald Zankl
Harald Zankl
SAT Techniques for Lexicographic Path Orders
29 pages, Seminar Report
null
null
null
cs.SC
null
This seminar report is concerned with expressing LPO-termination of term rewrite systems as a satisfiability problem in propositional logic. After relevant algorithms are explained, experimental results are reported.
[ { "version": "v1", "created": "Fri, 5 May 2006 19:11:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Zankl", "Harald", "" ] ]
cs/0605022
Martin Kurth
Martin Kurth, Jim LeBlanc
Toward a Collection-based Metadata Maintenance Model
10 pages, 4 figures; submitted to DC 2006
null
null
null
cs.DL
null
In this paper, the authors identify key entities and relationships in the operational management of metadata catalogs that describe digital collections, and they draft a data model to support the administration of metadata maintenance for collections. Further, they consider this proposed model in light of other data schemes to which it relates and discuss the implications of the model for library metadata maintenance operations.
[ { "version": "v1", "created": "Fri, 5 May 2006 18:16:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurth", "Martin", "" ], [ "LeBlanc", "Jim", "" ] ]
cs/0605024
Marcus Hutter
Shane Legg and Marcus Hutter
A Formal Measure of Machine Intelligence
8 two-column pages
Proc. 15th Annual Machine Learning Conference of {B}elgium and The Netherlands (Benelearn 2006) pages 73-80
null
IDSIA-10-06
cs.AI cs.LG
null
A fundamental problem in artificial intelligence is that nobody really knows what intelligence is. The problem is especially acute when we need to consider artificial systems which are significantly different to humans. In this paper we approach this problem in the following way: We take a number of well known informal definitions of human intelligence that have been given by experts, and extract their essential features. These are then mathematically formalised to produce a general measure of intelligence for arbitrary machines. We believe that this measure formally captures the concept of machine intelligence in the broadest reasonable sense.
[ { "version": "v1", "created": "Sat, 6 May 2006 16:56:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0605025
Vytautas Perlibakas
Vytautas Perlibakas
Face Recognition using Principal Component Analysis and Log-Gabor Filters
Unpublished manuscript. March 2005. 23 pages, 7 figures, 5 tables
null
null
null
cs.CV
null
In this article we propose a novel face recognition method based on Principal Component Analysis (PCA) and Log-Gabor filters. The main advantages of the proposed method are its simple implementation, training, and very high recognition accuracy. For recognition experiments we used 5151 face images of 1311 persons from different sets of the FERET and AR databases that allow to analyze how recognition accuracy is affected by the change of facial expressions, illumination, and aging. Recognition experiments with the FERET database (containing photographs of 1196 persons) showed that our method can achieve maximal 97-98% first one recognition rate and 0.3-0.4% Equal Error Rate. The experiments also showed that the accuracy of our method is less affected by eye location errors and used image normalization method than of traditional PCA -based recognition method.
[ { "version": "v1", "created": "Sun, 7 May 2006 13:30:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Perlibakas", "Vytautas", "" ] ]
cs/0605026
Yuri Pritykin
Yuri Pritykin
Strongly Almost Periodic Sequences under Finite Automata Mappings
7 pages
null
null
null
cs.DM
null
The notion of almost periodicity nontrivially generalizes the notion of periodicity. Strongly almost periodic sequences (=uniformly recurrent infinite words) first appeared in the field of symbolic dynamics, but then turned out to be interesting in connection with computer science. The paper studies the class of eventually strongly almost periodic sequences (i. e., becoming strongly almost periodic after deleting some prefix). We prove that the property of eventual strong almost periodicity is preserved under the mappings done by finite automata and finite transducers. The class of almost periodic sequences includes the class of eventually strongly almost periodic sequences. We prove this inclusion to be strict.
[ { "version": "v1", "created": "Sun, 7 May 2006 14:46:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritykin", "Yuri", "" ] ]
cs/0605027
Vytautas Perlibakas
Vytautas Perlibakas
Recognition of expression variant faces using masked log-Gabor features and Principal Component Analysis
Unpublished manuscript. June 2005. 20 pages, 8 figures, 5 tables
null
null
null
cs.CV
null
In this article we propose a method for the recognition of faces with different facial expressions. For recognition we extract feature vectors by using log-Gabor filters of multiple orientations and scales. Using sliding window algorithm and variances -based masking these features are extracted at image regions that are less affected by the changes of facial expressions. Extracted features are passed to the Principal Component Analysis (PCA) -based recognition method. The results of face recognition experiments using expression variant faces showed that the proposed method could achieve higher recognition accuracy than many other methods. For development and testing we used facial images from the AR and FERET databases. Using facial photographs of more than one thousand persons from the FERET database the proposed method achieved 96.6-98.9% first one recognition rate and 0.2-0.6% Equal Error Rate (EER).
[ { "version": "v1", "created": "Sun, 7 May 2006 15:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Perlibakas", "Vytautas", "" ] ]
cs/0605030
Randy Cogill
Randy Cogill and Sanjay Lall
A Delay Analysis of Maximal Matching Switching with Speedup
11 pages, 2 figures. Submitted to the 2006 IEEE Conference on Decision and Control
null
null
null
cs.NI cs.PF
null
In this paper we analyze the average queue backlog in a combined input-output queued switch using a maximal size matching scheduling algorithm. We compare this average backlog to the average backlog achieved by an optimal switch. We model the cell arrival process as independent and identically distributed between time slots and uniformly distributed among input and output ports. For switches with many input and output ports, the backlog associated with maximal size matching with speedup 3 is no more than 10/3 times the backlog associated with an optimal switch. Moreover, this performance ratio rapidly approaches 2 as speedup increases.
[ { "version": "v1", "created": "Mon, 8 May 2006 08:04:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Cogill", "Randy", "" ], [ "Lall", "Sanjay", "" ] ]
cs/0605031
Mihaela Dinsoreanu PhD
Mihaela Dinsoreanu, Ioan Salomie, Kalman Pusztai
On the Design of Agent-Based Systems using UML and Extensions
null
null
null
null
cs.AI cs.MA cs.SE
null
The Unified Software Development Process (USDP) and UML have been now generally accepted as the standard methodology and modeling language for developing Object-Oriented Systems. Although Agent-based Systems introduces new issues, we consider that USDP and UML can be used in an extended manner for modeling Agent-based Systems. The paper presents a methodology for designing agent-based systems and the specific models expressed in an UML-based notation corresponding to each phase of the software development process. UML was extended using the provided mechanism: stereotypes. Therefore, this approach can be managed with any CASE tool supporting UML. A Case Study, the development of a specific agent-based Student Evaluation System (SAS), is presented.
[ { "version": "v1", "created": "Mon, 8 May 2006 12:21:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Dinsoreanu", "Mihaela", "" ], [ "Salomie", "Ioan", "" ], [ "Pusztai", "Kalman", "" ] ]
cs/0605032
Mihaela Dinsoreanu PhD
Tudor Marian, Bogdan Dumitriu, Mihaela Dinsoreanu, Ioan Salomie
A framework of reusable structures for mobile agent development
null
null
null
null
cs.MA cs.AI cs.SE
null
Mobile agents research is clearly aiming towards imposing agent based development as the next generation of tools for writing software. This paper comes with its own contribution to this global goal by introducing a novel unifying framework meant to bring simplicity and interoperability to and among agent platforms as we know them today. In addition to this, we also introduce a set of agent behaviors which, although tailored for and from the area of virtual learning environments, are none the less generic enough to be used for rapid, simple, useful and reliable agent deployment. The paper also presents an illustrative case study brought forward to prove the feasibility of our design.
[ { "version": "v1", "created": "Mon, 8 May 2006 12:27:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Marian", "Tudor", "" ], [ "Dumitriu", "Bogdan", "" ], [ "Dinsoreanu", "Mihaela", "" ], [ "Salomie", "Ioan", "" ] ]
cs/0605033
Mihaela Dinsoreanu PhD
Mihaela Dinsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom Coffey
Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments
null
null
null
null
cs.MA cs.AI cs.SE
null
E-learning is nowadays one of the most interesting of the "e- " domains available through the Internet. The main problem to create a Web-based, virtual environment is to model the traditional domain and to implement the model using the most suitable technologies. We analyzed the distance learning domain and investigated the possibility to implement some e-learning services using mobile agent technologies. This paper presents a model of the Student Assessment Service (SAS) and an agent-based framework developed to be used for implementing specific applications. A specific Student Assessment application that relies on the framework was developed.
[ { "version": "v1", "created": "Mon, 8 May 2006 12:37:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Dinsoreanu", "Mihaela", "" ], [ "Godja", "Cristian", "" ], [ "Anghel", "Claudiu", "" ], [ "Salomie", "Ioan", "" ], [ "Coffey", "Tom", "" ] ]
cs/0605034
Srinivas Shakkottai
Srinivas Shakkottai, R. Srikant
Peer to Peer Networks for Defense Against Internet Worms
11 Pages
null
null
null
cs.CR cs.AR cs.NI
null
Internet worms, which spread in computer networks without human mediation, pose a severe threat to computer systems today. The rate of propagation of worms has been measured to be extremely high and they can infect a large fraction of their potential hosts in a short time. We study two different methods of patch dissemination to combat the spread of worms. We first show that using a fixed number of patch servers performs woefully inadequately against Internet worms. We then show that by exploiting the exponential data dissemination capability of P2P systems, the spread of worms can be halted very effectively. We compare the two methods by using fluid models to compute two quantities of interest: the time taken to effectively combat the progress of the worm and the maximum number of infected hosts. We validate our models using Internet measurements and simulations.
[ { "version": "v1", "created": "Mon, 8 May 2006 17:02:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Shakkottai", "Srinivas", "" ], [ "Srikant", "R.", "" ] ]
cs/0605035
Filip Radlinski
Filip Radlinski and Thorsten Joachims
Query Chains: Learning to Rank from Implicit Feedback
10 pages
Proceedings of the ACM Conference on Knowledge Discovery and Data Mining (KDD), ACM, 2005
null
null
cs.LG cs.IR
null
This paper presents a novel approach for using clickthrough data to learn ranked retrieval functions for web search results. We observe that users searching the web often perform a sequence, or chain, of queries with a similar information need. Using query chains, we generate new types of preference judgments from search engine logs, thus taking advantage of user intelligence in reformulating queries. To validate our method we perform a controlled user study comparing generated preference judgments to explicit relevance judgments. We also implemented a real-world search engine to test our approach, using a modified ranking SVM to learn an improved ranking function from preference data. Our results demonstrate significant improvements in the ranking given by the search engine. The learned rankings outperform both a static ranking function, as well as one trained without considering query chains.
[ { "version": "v1", "created": "Mon, 8 May 2006 22:05:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Radlinski", "Filip", "" ], [ "Joachims", "Thorsten", "" ] ]
cs/0605036
Filip Radlinski
Filip Radlinski and Thorsten Joachims
Evaluating the Robustness of Learning from Implicit Feedback
8 pages, Presented at ICML Workshop on Learning In Web Search, 2005
null
null
null
cs.LG cs.IR
null
This paper evaluates the robustness of learning from implicit feedback in web search. In particular, we create a model of user behavior by drawing upon user studies in laboratory and real-world settings. The model is used to understand the effect of user behavior on the performance of a learning algorithm for ranked retrieval. We explore a wide range of possible user behaviors and find that learning from implicit feedback can be surprisingly robust. This complements previous results that demonstrated our algorithm's effectiveness in a real-world search engine application.
[ { "version": "v1", "created": "Mon, 8 May 2006 23:38:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Radlinski", "Filip", "" ], [ "Joachims", "Thorsten", "" ] ]
cs/0605037
Filip Radlinski
Filip Radlinski and Thorsten Joachims
Minimally Invasive Randomization for Collecting Unbiased Preferences from Clickthrough Logs
7 pages. Proceedings of the 21st National Conference on Artificial Intelligence (AAAI), 2006
null
null
null
cs.IR cs.LG
null
Clickthrough data is a particularly inexpensive and plentiful resource to obtain implicit relevance feedback for improving and personalizing search engines. However, it is well known that the probability of a user clicking on a result is strongly biased toward documents presented higher in the result set irrespective of relevance. We introduce a simple method to modify the presentation of search results that provably gives relevance judgments that are unaffected by presentation bias under reasonable assumptions. We validate this property of the training data in interactive real world experiments. Finally, we show that using these unbiased relevance judgments learning methods can be guaranteed to converge to an ideal ranking given sufficient data.
[ { "version": "v1", "created": "Tue, 9 May 2006 01:53:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Radlinski", "Filip", "" ], [ "Joachims", "Thorsten", "" ] ]