id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-11 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0606128
Andrew Krizhanovsky A
A. Krizhanovsky
Automatic forming lists of semantically related terms based on texts rating in the corpus with hyperlinks and categories (In Russian)
6 pages, 1 figure, in Russian, PDF, for other formats see http://whinger.narod.ru/paper/index.html
null
null
null
cs.IR cs.DM
null
HITS adapted algorithm for synonym search, the program architecture, and the program work evaluation with test examples are presented in the paper. Synarcher program for synonym (and related terms) search in the text corpus of special structure (Wikipedia) was developed. The results of search are presented in the form of a graph. It is possible to explore the graph and search graph elements interactively. The proposed algorithm could be applied to the search request extending and for synonym dictionary forming.
[ { "version": "v1", "created": "Fri, 30 Jun 2006 15:17:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Krizhanovsky", "A.", "" ] ]
cs/0607001
Chinmoy Bhattacharya
Chinmoy Bhattacharya and P.R.Mahapatra
A Novel Application of Lifting Scheme for Multiresolution Correlation of Complex Radar Signals
null
null
null
null
cs.DC cs.CC
null
The lifting scheme of discrete wavelet transform (DWT) is now quite well established as an efficient technique for image compression, and has been incorporated into the JPEG2000 standards. However, the potential of the lifting scheme has not been exploited in the context of correlationbased processing, such as encountered in radar applications. This paper presents a complete and consistent framework for the application of DWT for correlation of complex signals. In particular, lifting scheme factorization of biorthogonal filterbanks is carried out in dual analysis basis spaces for multiresolution correlation of complex radar signals in the DWT domain only. A causal formulation of lifting for orthogonal filterbank is also developed. The resulting parallel algorithms and consequent saving of computational effort are briefly dealt with.
[ { "version": "v1", "created": "Sat, 1 Jul 2006 16:58:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Bhattacharya", "Chinmoy", "" ], [ "Mahapatra", "P. R.", "" ] ]
cs/0607005
Florentin Smarandache
Florentin Smarandache, Jean Dezert
Belief Conditioning Rules (BCRs)
26 pages
null
null
null
cs.AI
null
In this paper we propose a new family of Belief Conditioning Rules (BCRs) for belief revision. These rules are not directly related with the fusion of several sources of evidence but with the revision of a belief assignment available at a given time according to the new truth (i.e. conditioning constraint) one has about the space of solutions of the problem.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 14:54:54 GMT" }, { "version": "v2", "created": "Wed, 29 Nov 2006 19:14:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
cs/0607006
Leon Moonen
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella, and Tom Tourwe
Applying and Combining Three Different Aspect Mining Techniques
28 pages
null
null
TUD-SERG-2006-002
cs.SE cs.PL
null
Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these concerns in the source code. Whereas some concerns are explicitly represented by program entities (like classes, methods and variables) and thus are easy to identify, crosscutting concerns are not captured by a single program entity but are scattered over many program entities and are tangled with the other concerns. Because of their crosscutting nature, such crosscutting concerns are difficult to identify, and reduce the understandability of the system as a whole. In this paper, we report on a combined experiment in which we try to identify crosscutting concerns in the JHotDraw framework automatically. We first apply three independently developed aspect mining techniques to JHotDraw and evaluate and compare their results. Based on this analysis, we present three interesting combinations of these three techniques, and show how these combinations provide a more complete coverage of the detected concerns as compared to the original techniques individually. Our results are a first step towards improving the understandability of a system that contains crosscutting concerns, and can be used as a basis for refactoring the identified crosscutting concerns into aspects.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 17:16:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Ceccato", "Mariano", "" ], [ "Marin", "Marius", "" ], [ "Mens", "Kim", "" ], [ "Moonen", "Leon", "" ], [ "Tonella", "Paolo", "" ], [ "Tourwe", "Tom", "" ] ]
cs/0607009
Yuri Pritykin
Yuri Pritykin
Almost Periodicity, Finite Automata Mappings and Related Effectiveness Issues
12 pages. Continuation of the results from the paper "Strongly Almost Periodic Sequences under Finite Automata Mappings" on cs.DM/0605026 Enhanced version of the talk on Workshop on Words and Automata, St Petersburg, Russia, June 7th, 2006 (satellite to CSR'06)
null
null
null
cs.DM
null
The paper studies different variants of almost periodicity notion. We introduce the class of eventually strongly almost periodic sequences where some suffix is strongly almost periodic (=uniformly recurrent). The class of almost periodic sequences includes the class of eventually strongly almost periodic sequences, and we prove this inclusion to be strict. We prove that the class of eventually strongly almost periodic sequences is closed under finite automata mappings and finite transducers. Moreover, an effective form of this result is presented. Finally we consider some algorithmic questions concerning almost periodicity.
[ { "version": "v1", "created": "Mon, 3 Jul 2006 08:27:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritykin", "Yuri", "" ] ]
cs/0607011
Ayan Mahalanobis
Ayan Mahalanobis
A simple generalization of El-Gamal cryptosystem to non-abelian groups
null
null
null
null
cs.CR math.GR
null
In this paper we study the MOR cryptosystem. We use the group of unitriangular matrices over a finite field as the non-abelian group in the MOR cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem over finite fields can be built using the proposed groups and a set of automorphisms of these groups. We also show that the security of this proposed MOR cryptosystem is equivalent to the El-Gamal cryptosystem over finite fields.
[ { "version": "v1", "created": "Tue, 4 Jul 2006 11:28:38 GMT" }, { "version": "v2", "created": "Thu, 6 Jul 2006 11:32:31 GMT" }, { "version": "v3", "created": "Tue, 11 Jul 2006 12:56:43 GMT" }, { "version": "v4", "created": "Thu, 20 Jul 2006 06:07:39 GMT" }, { "version": "v5", "created": "Mon, 7 May 2007 14:56:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Mahalanobis", "Ayan", "" ] ]
cs/0607012
Anne-Marie Vercoustre
Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis), Mounir Fegas (INRIA Rocquencourt / INRIA Sophia Antipolis), Saba Gul (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis)
A Flexible Structured-based Representation for XML Document Mining
This is the authors' version. To access the final version go to the editor's site through the DOI
Dans The Fourth International Workshop of the Initiative for the Evaluation of XML Retrieval (INEX 2005)
10.1007/11766278\_34
null
cs.IR
null
This paper reports on the INRIA group's approach to XML mining while participating in the INEX XML Mining track 2005. We use a flexible representation of XML documents that allows taking into account the structure only or both the structure and content. Our approach consists of representing XML documents by a set of their sub-paths, defined according to some criteria (length, root beginning, leaf ending). By considering those sub-paths as words, we can use standard methods for vocabulary reduction, and simple clustering methods such as K-means that scale well. We actually use an implementation of the clustering algorithm known as "dynamic clouds" that can work with distinct groups of independent variables put in separate variables. This is useful in our model since embedded sub-paths are not independent: we split potentially dependant paths into separate variables, resulting in each of them containing independant paths. Experiments with the INEX collections show good results for the structure-only collections, but our approach could not scale well for large structure-and-content collections.
[ { "version": "v1", "created": "Wed, 5 Jul 2006 12:07:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Vercoustre", "Anne-Marie", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Fegas", "Mounir", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Gul", "Saba", "", "INRIA\n Rocquencourt / INRIA Sophia Antipolis" ], [ "Lechevallier", "Yves", "", "INRIA Rocquencourt\n / INRIA Sophia Antipolis" ] ]
cs/0607013
Jan Chomicki
Jan Chomicki
Database Querying under Changing Preferences
Submitted to a journal
null
null
null
cs.DB cs.AI
null
We present here a formal foundation for an iterative and incremental approach to constructing and evaluating preference queries. Our main focus is on query modification: a query transformation approach which works by revising the preference relation in the query. We provide a detailed analysis of the cases where the order-theoretic properties of the preference relation are preserved by the revision. We consider a number of different revision operators: union, prioritized and Pareto composition. We also formulate algebraic laws that enable incremental evaluation of preference queries. Finally, we consider two variations of the basic framework: finite restrictions of preference relations and weak-order extensions of strict partial order preference relations.
[ { "version": "v1", "created": "Wed, 5 Jul 2006 18:37:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Chomicki", "Jan", "" ] ]
cs/0607015
Juan Valle-Lisboa C
Juan C. Valle-Lisboa (1), Eduardo Mizraji (1) ((1) Seccion Biofisica, Facultad de Ciencias, Universidad de la Republica)
The uncovering of hidden structures by Latent Semantic Analysis
51 pages, 7 figures, pdf
null
null
null
cs.IR
null
Latent Semantic Analysis (LSA) is a well known method for information retrieval. It has also been applied as a model of cognitive processing and word-meaning acquisition. This dual importance of LSA derives from its capacity to modulate the meaning of words by contexts, dealing successfully with polysemy and synonymy. The underlying reasons that make the method work are not clear enough. We propose that the method works because it detects an underlying block structure (the blocks corresponding to topics) in the term by document matrix. In real cases this block structure is hidden because of perturbations. We propose that the correct explanation for LSA must be searched in the structure of singular vectors rather than in the profile of singular values. Using Perron-Frobenius theory we show that the presence of disjoint blocks of documents is marked by sign-homogeneous entries in the vectors corresponding to the documents of one block and zeros elsewhere. In the case of nearly disjoint blocks, perturbation theory shows that if the perturbations are small the zeros in the leading vectors are replaced by small numbers (pseudo-zeros). Since the singular values of each block might be very different in magnitude, their order does not mirror the order of blocks. When the norms of the blocks are similar, LSA works fine, but we propose that when the topics have different sizes, the usual procedure of selecting the first k singular triplets (k being the number of blocks) should be replaced by a method that selects the perturbed Perron vectors for each block.
[ { "version": "v1", "created": "Wed, 5 Jul 2006 22:56:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Valle-Lisboa", "Juan C.", "" ], [ "Mizraji", "Eduardo", "" ] ]
cs/0607016
Krzysztof R. Apt
Krzysztof R. Apt and Peter Zoeteweij
An Analysis of Arithmetic Constraints on Integer Intervals
44 pages, to appear in 'Constraints' journal
null
null
null
cs.AI cs.PL
null
Arithmetic constraints on integer intervals are supported in many constraint programming systems. We study here a number of approaches to implement constraint propagation for these constraints. To describe them we introduce integer interval arithmetic. Each approach is explained using appropriate proof rules that reduce the variable domains. We compare these approaches using a set of benchmarks. For the most promising approach we provide results that characterize the effect of constraint propagation. This is a full version of our earlier paper, cs.PL/0403016.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 10:09:43 GMT" }, { "version": "v2", "created": "Wed, 21 Mar 2007 13:51:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Zoeteweij", "Peter", "" ] ]
cs/0607018
Edward Hanna
Edward Hanna
Feynman Checkerboard as a Model of Discrete Space-Time
10 pages, 14 figures - changed section 6 title
null
null
null
cs.CE
null
In 1965, Feynman wrote of using a lattice containing one dimension of space and one dimension of time to derive aspects of quantum mechanics. Instead of summing the behavior of all possible paths as he did, this paper will consider the motion of single particles within this discrete Space-Time lattice, sometimes called Feynman's Checkerboard. This empirical approach yielded several predicted emergent properties for a discrete Space-Time lattice, one of which is novel and testable.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 16:35:38 GMT" }, { "version": "v2", "created": "Sat, 12 Aug 2006 19:10:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hanna", "Edward", "" ] ]
cs/0607019
Stephen Luttrell
Stephen Luttrell
Modelling the Probability Density of Markov Sources
26 pages
null
null
null
cs.NE
null
This paper introduces an objective function that seeks to minimise the average total number of bits required to encode the joint state of all of the layers of a Markov source. This type of encoder may be applied to the problem of optimising the bottom-up (recognition model) and top-down (generative model) connections in a multilayer neural network, and it unifies several previous results on the optimisation of multilayer neural networks.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 18:49:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Luttrell", "Stephen", "" ] ]
cs/0607022
George Maney Mr.
G. A. Maney
Ten Incredibly Dangerous Software Ideas
14 page software industry interest book synopsis
null
null
null
cs.GL
null
This is a rough draft synopsis of a book presently in preparation. This book provides a systematic critique of the software industry. This critique is accomplished using classical methods in practical design science.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 01:17:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Maney", "G. A.", "" ] ]
cs/0607023
Josep Diaz Prof
J. Diaz, D. Mitsche, X. Perez
Sharp threshold for hamiltonicity of random geometric graphs
10 pages, 2 figures
null
null
null
cs.DM
null
We show for an arbitrary $\ell_p$ norm that the property that a random geometric graph $\mathcal G(n,r)$ contains a Hamiltonian cycle exhibits a sharp threshold at $r=r(n)=\sqrt{\frac{\log n}{\alpha_p n}}$, where $\alpha_p$ is the area of the unit disk in the $\ell_p$ norm. The proof is constructive and yields a linear time algorithm for finding a Hamiltonian cycle of $\RG$ a.a.s., provided $r=r(n)\ge\sqrt{\frac{\log n}{(\alpha_p -\epsilon)n}}$ for some fixed $\epsilon > 0$.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 18:16:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaz", "J.", "" ], [ "Mitsche", "D.", "" ], [ "Perez", "X.", "" ] ]
cs/0607025
Oskar Sandberg
Oskar Sandberg and Ian Clarke
The evolution of navigable small-world networks
null
null
null
null
cs.DS cs.DC
null
Small-world networks, which combine randomized and structured elements, are seen as prevalent in nature. Several random graph models have been given for small-world networks, with one of the most fruitful, introduced by Jon Kleinberg, showing in which type of graphs it is possible to route, or navigate, between vertices with very little knowledge of the graph itself. Kleinberg's model is static, with random edges added to a fixed grid. In this paper we introduce, analyze and test a randomized algorithm which successively rewires a graph with every application. The resulting process gives a model for the evolution of small-world networks with properties similar to those studied by Kleinberg.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 13:21:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Sandberg", "Oskar", "" ], [ "Clarke", "Ian", "" ] ]
cs/0607026
James Aspnes
James Aspnes and Yang Richard Yang and Yitong Yin
Path-independent load balancing with unreliable machines
Full version of paper submitted to SODA 2007
null
null
null
cs.DS cs.NI
null
We consider algorithms for load balancing on unreliable machines. The objective is to optimize the two criteria of minimizing the makespan and minimizing job reassignments in response to machine failures. We assume that the set of jobs is known in advance but that the pattern of machine failures is unpredictable. Motivated by the requirements of BGP routing, we consider path-independent algorithms, with the property that the job assignment is completely determined by the subset of available machines and not the previous history of the assignments. We examine first the question of performance measurement of path-independent load-balancing algorithms, giving the measure of makespan and the normalized measure of reassignments cost. We then describe two classes of algorithms for optimizing these measures against an oblivious adversary for identical machines. The first, based on independent random assignments, gives expected reassignment costs within a factor of 2 of optimal and gives a makespan within a factor of O(log m/log log m) of optimal with high probability, for unknown job sizes. The second, in which jobs are first grouped into bins and at most one bin is assigned to each machine, gives constant-factor ratios on both reassignment cost and makespan, for known job sizes. Several open problems are discussed.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 14:01:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Aspnes", "James", "" ], [ "Yang", "Yang Richard", "" ], [ "Yin", "Yitong", "" ] ]
cs/0607028
Christian Lavault
Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady Ravelomanana (LIPN)
A Quasi-Optimal Leader Election Algorithm in Radio Networks with Log-Logarithmic Awake Time Slots
null
null
null
null
cs.DC cs.NI
null
Radio networks (RN) are distributed systems (\textit{ad hoc networks}) consisting in $n \ge 2$ radio stations. Assuming the number $n$ unknown, two distinct models of RN without collision detection (\textit{no-CD}) are addressed: the model with \textit{weak no-CD} RN and the one with \textit{strong no-CD} RN. We design and analyze two distributed leader election protocols, each one running in each of the above two (no-CD RN) models, respectively. Both randomized protocols are shown to elect a leader within $\BO(\log{(n)})$ expected time, with no station being awake for more than $\BO(\log{\log{(n)}})$ time slots (such algorithms are said to be \textit{energy-efficient}). Therefore, a new class of efficient algorithms is set up that matchthe $\Omega(\log{(n)})$ time lower-bound established by Kushilevitz and Mansour.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 17:42:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Marckert", "Jean-François", "", "LaBRI" ], [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
cs/0607031
Christian Lavault
Christian Lavault (LIPN), Mario Valencia-Pabon (LIPN)
A distributed approximation algorithm for the minimum degree minimum weight spanning trees
null
null
null
null
cs.DC cs.DM
null
Fischer has shown how to compute a minimum weight spanning tree of degree at most $b \Delta^* + \lceil \log\_b n\rceil$ in time $O(n^{4 + 1/\ln b})$ for any constant $b > 1$, where $\Delta^*$ is the value of an optimal solution and $n$ is the number of nodes in the network. In this paper, we propose a distributed version of Fischer's algorithm that requires messages and time complexity $O(n^{2 + 1/\ln b})$, and O(n) space per node.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 08:42:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Valencia-Pabon", "Mario", "", "LIPN" ] ]
cs/0607032
Christian Lavault
Christian Lavault (LIPN), Guy Louchard (ULB)
Asymptotic Analysis of a Leader Election Algorithm
null
null
null
null
cs.DC cs.NA
null
Itai and Rodeh showed that, on the average, the communication of a leader election algorithm takes no more than $LN$ bits, where $L \simeq 2.441716$ and $N$ denotes the size of the ring. We give a precise asymptotic analysis of the average number of rounds M(n) required by the algorithm, proving for example that $\dis M(\infty) := \lim\_{n\to \infty} M(n) = 2.441715879...$, where $n$ is the number of starting candidates in the election. Accurate asymptotic expressions of the second moment $M^{(2)}(n)$ of the discrete random variable at hand, its probability distribution, and the generalization to all moments are given. Corresponding asymptotic expansions $(n\to \infty)$ are provided for sufficiently large $j$, where $j$ counts the number of rounds. Our numerical results show that all computations perfectly fit the observed values. Finally, we investigate the generalization to probability $t/n$, where $t$ is a non negative real parameter. The real function $\dis M(\infty,t) := \lim\_{n\to \infty} M(n,t)$ is shown to admit \textit{one unique minimum} $M(\infty,t^{*})$ on the real segment $(0,2)$. Furthermore, the variations of $M(\infty,t)$ on thewhole real line are also studied in detail.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 08:46:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Louchard", "Guy", "", "ULB" ] ]
cs/0607033
Oleg Verbitsky
Oleg Verbitsky
Planar Graphs: Logical Complexity and Parallel Isomorphism Tests
36 pages
null
null
null
cs.CC cs.LO
null
We prove that every triconnected planar graph is definable by a first order sentence that uses at most 15 variables and has quantifier depth at most $11\log_2 n+43$. As a consequence, a canonic form of such graphs is computable in $AC^1$ by the 14-dimensional Weisfeiler-Lehman algorithm. This provides another way to show that the planar graph isomorphism is solvable in $AC^1$.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 10:37:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Verbitsky", "Oleg", "" ] ]
cs/0607034
Christian Lavault
Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady Ravelomanana (LIPN)
Quasi-Optimal Leader Election Algorithms in Radio Networks with Loglogarithmic Awake Time Slots
null
10th IEEE International Conference on Telecommunications (2003) 1113-1119
null
null
cs.DC cs.NI
null
A radio network (RN) is a distributed system consisting of $n$ radio stations. We design and analyze two distributed leader election protocols in RN where the number $n$ of radio stations is unknown. The first algorithm runs under the assumption of {\it limited collision detection}, while the second assumes that {\it no collision detection} is available. By ``limited collision detection'', we mean that if exactly one station sends (broadcasts) a message, then all stations (including the transmitter) that are listening at this moment receive the sent message. By contrast, the second no-collision-detection algorithm assumes that a station cannot simultaneously send and listen signals. Moreover, both protocols allow the stations to keep asleep as long as possible, thus minimizing their awake time slots (such algorithms are called {\it energy-efficient}). Both randomized protocols in RN areshown to elect a leader in $O(\log{(n)})$ expected time, with no station being awake for more than $O(\log{\log{(n)}})$ time slots. Therefore, a new class of efficient algorithms is set up that match the $\Omega(\log{(n)})$ time lower-bound established by Kushilevitz and Mansour.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 12:04:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Marckert", "Jean-François", "", "LaBRI" ], [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
cs/0607037
Daowen Qiu
Zhujun Fan
The Minimal Cost Algorithm for Off-Line Diagnosability of Discrete Event Systems
12 pages, 7 figures, critical comments and suggestions are welcomed and appreciated
null
null
null
cs.AI cs.CC
null
The failure diagnosis for {\it discrete event systems} (DESs) has been given considerable attention in recent years. Both on-line and off-line diagnostics in the framework of DESs was first considered by Lin Feng in 1994, and particularly an algorithm for diagnosability of DESs was presented. Motivated by some existing problems to be overcome in previous work, in this paper, we investigate the minimal cost algorithm for diagnosability of DESs. More specifically: (i) we give a generic method for judging a system's off-line diagnosability, and the complexity of this algorithm is polynomial-time; (ii) and in particular, we present an algorithm of how to search for the minimal set in all observable event sets, whereas the previous algorithm may find {\it non-minimal} one.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 04:55:03 GMT" }, { "version": "v2", "created": "Wed, 11 Apr 2007 16:27:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Fan", "Zhujun", "" ] ]
cs/0607038
Benoit Donnet
Benoit Donnet, Bruno Baynat, Timur Friedman
Retouched Bloom Filters: Allowing Networked Applications to Flexibly Trade Off False Positives Against False Negatives
This is a new version of the technical reports with improved algorithms and theorical analysis of algorithms
null
null
null
cs.NI
null
Where distributed agents must share voluminous set membership information, Bloom filters provide a compact, though lossy, way for them to do so. Numerous recent networking papers have examined the trade-offs between the bandwidth consumed by the transmission of Bloom filters, and the error rate, which takes the form of false positives, and which rises the more the filters are compressed. In this paper, we introduce the retouched Bloom filter (RBF), an extension that makes the Bloom filter more flexible by permitting the removal of selected false positives at the expense of generating random false negatives. We analytically show that RBFs created through a random process maintain an overall error rate, expressed as a combination of the false positive rate and the false negative rate, that is equal to the false positive rate of the corresponding Bloom filters. We further provide some simple heuristics and improved algorithms that decrease the false positive rate more than than the corresponding increase in the false negative rate, when creating RBFs. Finally, we demonstrate the advantages of an RBF over a Bloom filter in a distributed network topology measurement application, where information about large stop sets must be shared among route tracing monitors.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 10:40:26 GMT" }, { "version": "v2", "created": "Fri, 1 Dec 2006 13:52:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Donnet", "Benoit", "" ], [ "Baynat", "Bruno", "" ], [ "Friedman", "Timur", "" ] ]
cs/0607039
M. H. van Emden
M.H. van Emden
Set-Theoretic Preliminaries for Computer Scientists
36 pages, 5 figures
null
null
DCS-304-IR
cs.DM cs.DB
null
The basics of set theory are usually copied, directly or indirectly, by computer scientists from introductions to mathematical texts. Often mathematicians are content with special cases when the general case is of no mathematical interest. But sometimes what is of no mathematical interest is of great practical interest in computer science. For example, non-binary relations in mathematics tend to have numerical indexes and tend to be unsorted. In the theory and practice of relational databases both these simplifications are unwarranted. In response to this situation we present here an alternative to the ``set-theoretic preliminaries'' usually found in computer science texts. This paper separates binary relations from the kind of relations that are needed in relational databases. Its treatment of functions supports both computer science in general and the kind of relations needed in databases. As a sample application this paper shows how the mathematical theory of relations naturally leads to the relational data model and how the operations on relations are by themselves already a powerful vehicle for queries.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 14:27:43 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ] ]
cs/0607040
Gopal Gupta
Enrico Pontelli (1), Karen Villaverde (1), Hai-Feng Guo (2), Gopal Gupta (3) ((1) New Mexico State University, (2) University of Nebraska at Omaha, (3) University of Texas at Dallas)
PALS: Efficient Or-Parallelism on Beowulf Clusters
63 pages, 32 figures, 5 tabels. Theory and Practice of Logic Programming (to appear)
null
null
null
cs.DC cs.PL
null
This paper describes the development of the PALS system, an implementation of Prolog capable of efficiently exploiting or-parallelism on distributed-memory platforms--specifically Beowulf clusters. PALS makes use of a novel technique, called incremental stack-splitting. The technique proposed builds on the stack-splitting approach, previously described by the authors and experimentally validated on shared-memory systems, which in turn is an evolution of the stack-copying method used in a variety of parallel logic and constraint systems--e.g., MUSE, YAP, and Penny. The PALS system is the first distributed or-parallel implementation of Prolog based on the stack-splitting method ever realized. The results presented confirm the superiority of this method as a simple yet effective technique to transition from shared-memory to distributed-memory systems. PALS extends stack-splitting by combining it with incremental copying; the paper provides a description of the implementation of PALS, including details of how distributed scheduling is handled. We also investigate methodologies to effectively support order-sensitive predicates (e.g., side-effects) in the context of the stack-splitting scheme. Experimental results obtained from running PALS on both Shared Memory and Beowulf systems are presented and analyzed.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 19:56:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Pontelli", "Enrico", "" ], [ "Villaverde", "Karen", "" ], [ "Guo", "Hai-Feng", "" ], [ "Gupta", "Gopal", "" ] ]
cs/0607044
Valdis Vitolins
Audris Kalnins, Valdis Vitolins
Use of UML and Model Transformations for Workflow Process Definitions
12 pages, 7 figures, communications of the conference "Baltic DB&IS 2006", July 3-6, Vilnius, Lithuania
Audris Kalnins, Valdis Vitolins, Databases and Information Systems, BalticDB&IS'2006, edited by Olegas Vasilecas, Johann Eder, Albertas Caplinskas, Vilnius, Technika, 2006, pp. 3.-15
null
null
cs.SE
null
Currently many different modeling languages are used for workflow definitions in BPM systems. Authors of this paper analyze the two most popular graphical languages, with highest possibility of wide practical usage - UML Activity diagrams (AD) and Business Process Modeling Notation (BPMN). The necessary in practice workflow aspects are briefly discussed, and on this basis a natural AD profile is proposed, which covers all of them. A functionally equivalent BPMN subset is also selected. The semantics of both languages in the context of process execution (namely, mapping to BPEL) is also analyzed in the paper. By analyzing AD and BPMN metamodels, authors conclude that an exact transformation from AD to BPMN is not trivial even for the selected subset, though these languages are considered to be similar. Authors show how this transformation could be defined in the MOLA transformation language.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 09:23:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalnins", "Audris", "" ], [ "Vitolins", "Valdis", "" ] ]
cs/0607046
Xin Han
Xin Han, Kazuo Iwama, Deshi Ye, Guochuan Zhang
Strip Packing vs. Bin Packing
12 pages, 3 figures
null
null
null
cs.DS
null
In this paper we establish a general algorithmic framework between bin packing and strip packing, with which we achieve the same asymptotic bounds by applying bin packing algorithms to strip packing. More precisely we obtain the following results: (1) Any offline bin packing algorithm can be applied to strip packing maintaining the same asymptotic worst-case ratio. Thus using FFD (MFFD) as a subroutine, we get a practical (simple and fast) algorithm for strip packing with an upper bound 11/9 (71/60). A simple AFPTAS for strip packing immediately follows. (2) A class of Harmonic-based algorithms for bin packing can be applied to online strip packing maintaining the same asymptotic competitive ratio. It implies online strip packing admits an upper bound of 1.58889 on the asymptotic competitive ratio, which is very close to the lower bound 1.5401 and significantly improves the previously best bound of 1.6910 and affirmatively answers an open question posed by Csirik et. al.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 09:58:34 GMT" }, { "version": "v2", "created": "Wed, 23 Aug 2006 00:33:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Han", "Xin", "" ], [ "Iwama", "Kazuo", "" ], [ "Ye", "Deshi", "" ], [ "Zhang", "Guochuan", "" ] ]
cs/0607047
Paul Goldberg
Nick Palmer and Paul W. Goldberg
PAC Classification based on PAC Estimates of Label Class Distributions
14 pages
null
null
null
cs.LG
null
A standard approach in pattern classification is to estimate the distributions of the label classes, and then to apply the Bayes classifier to the estimates of the distributions in order to classify unlabeled examples. As one might expect, the better our estimates of the label class distributions, the better the resulting classifier will be. In this paper we make this observation precise by identifying risk bounds of a classifier in terms of the quality of the estimates of the label class distributions. We show how PAC learnability relates to estimates of the distributions that have a PAC guarantee on their $L_1$ distance from the true distribution, and we bound the increase in negative log likelihood risk in terms of PAC bounds on the KL-divergence. We give an inefficient but general-purpose smoothing method for converting an estimated distribution that is good under the $L_1$ metric into a distribution that is good under the KL-divergence.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 13:52:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Palmer", "Nick", "" ], [ "Goldberg", "Paul W.", "" ] ]
cs/0607051
Catherine Recanati
Catherine Recanati (LIPN)
Raisonner avec des diagrammes : perspectives cognitives et computationnelles
paru initialement comme Rapport LIPN en 2004
Intellectica 40 (2005) 9-42
null
null
cs.CL
null
Diagrammatic, analogical or iconic representations are often contrasted with linguistic or logical representations, in which the shape of the symbols is arbitrary. The aim of this paper is to make a case for the usefulness of diagrams in inferential knowledge representation systems. Although commonly used, diagrams have for a long time suffered from the reputation of being only a heuristic tool or a mere support for intuition. The first part of this paper is an historical background paying tribute to the logicians, psychologists and computer scientists who put an end to this formal prejudice against diagrams. The second part is a discussion of their characteristics as opposed to those of linguistic forms. The last part is aimed at reviving the interest for heterogeneous representation systems including both linguistic and diagrammatic representations.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 19:13:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Recanati", "Catherine", "", "LIPN" ] ]
cs/0607053
Thierry Poibeau
Thierry Poibeau (LIPN)
Linguistically Grounded Models of Language Change
null
The 28th Annual Conference of the Cognitive Science Society (CogSci 2006), Canada (2006)
null
null
cs.AI cs.CL
null
Questions related to the evolution of language have recently known an impressive increase of interest (Briscoe, 2002). This short paper aims at questioning the scientific status of these models and their relations to attested data. We show that one cannot directly model non-linguistic factors (exogenous factors) even if they play a crucial role in language evolution. We then examine the relation between linguistic models and attested language data, as well as their contribution to cognitive linguistics.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 19:17:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Poibeau", "Thierry", "", "LIPN" ] ]
cs/0607054
Elliott H. Lieb
Elliott H. Lieb, Daniel Osherson and Scott Weinstein
Elementary Proof of a Theorem of Jean Ville
12 pages latex
null
null
null
cs.CC
null
Considerable thought has been devoted to an adequate definition of the class of infinite, random binary sequences (the sort of sequence that almost certainly arises from flipping a fair coin indefinitely). The first mathematical exploration of this problem was due to R. Von Mises, and based on his concept of a "selection function." A decisive objection to Von Mises' idea was formulated in a theorem offered by Jean Ville in 1939. It shows that some sequences admitted by Von Mises as "random" in fact manifest a certain kind of systematicity. Ville's proof is challenging, and an alternative approach has appeared only in condensed form. We attempt to provide an expanded version of the latter, alternative argument.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 19:52:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Lieb", "Elliott H.", "" ], [ "Osherson", "Daniel", "" ], [ "Weinstein", "Scott", "" ] ]
cs/0607055
Akimichi Takemura
Hisayuki Hara and Akimichi Takemura
Boundary cliques, clique trees and perfect sequences of maximal cliques of a chordal graph
null
null
null
null
cs.DM
null
We characterize clique trees of a chordal graph in their relation to simplicial vertices and perfect sequences of maximal cliques. We investigate boundary cliques defined by Shibata and clarify their relation to endpoints of clique trees. Next we define a symmetric binary relation between the set of clique trees and the set of perfect sequences of maximal cliques. We describe the relation as a bipartite graph and prove that the bipartite graph is always connected. Lastly we consider to characterize chordal graphs from the aspect of non-uniqueness of clique trees.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 23:14:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Hara", "Hisayuki", "" ], [ "Takemura", "Akimichi", "" ] ]
cs/0607056
Sylviane Schwer
Sylviane Schwer (LIPN)
Reasoning with Intervals on Granules
null
Journal of Universal Computer Science 8 (8) (2002) 793-808
null
null
cs.AI cs.DM
null
The formalizations of periods of time inside a linear model of Time are usually based on the notion of intervals, that may contain or may not their endpoints. This is not enought when the periods are written in terms of coarse granularities with respect to the event taken into account. For instance, how to express the inter-war period in terms of a {\em years} interval? This paper presents a new type of intervals, neither open, nor closed or open-closed and the extension of operations on intervals of this new type, in order to reduce the gap between the discourse related to temporal relationship and its translation into a discretized model of Time.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 09:16:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Schwer", "Sylviane", "", "LIPN" ] ]
cs/0607057
Vlady Ravelomanana
Vlady Ravelomanana (LIPN), the Projet PAI Amadeus Collaboration
The Average Size of Giant Components Between the Double-Jump
A para\^{i}tre dans Algorithmica
Algorithmica Issue sp\'{e}ciale "Analysis of Algorithms" (2006) A para\^{i}tre
null
null
cs.DM math.CO math.PR
null
We study the sizes of connected components according to their excesses during a random graph process built with $n$ vertices. The considered model is the continuous one defined in Janson 2000. An ${\ell}$-component is a connected component with ${\ell}$ edges more than vertices. $\ell$ is also called the \textit{excess} of such component. As our main result, we show that when $\ell$ and ${n \over \ell}$ are both large, the expected number of vertices that ever belong to an $\ell$-component is about ${12}^{1/3} {\ell}^{1/3} n^{2/3}$. We also obtain limit theorems for the number of creations of $\ell$-components.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 09:23:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ], [ "Collaboration", "the Projet PAI Amadeus", "" ] ]
cs/0607058
Tom Ridge
Tom Ridge
Craig's Interpolation Theorem formalised and mechanised in Isabelle/HOL
null
null
null
null
cs.LO
null
We formalise and mechanise a construtive, proof theoretic proof of Craig's Interpolation Theorem in Isabelle/HOL. We give all the definitions and lemma statements both formally and informally. We also transcribe informally the formal proofs. We detail the main features of our mechanisation, such as the formalisation of binding for first order formulae. We also give some applications of Craig's Interpolation Theorem.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 17:26:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Ridge", "Tom", "" ] ]
cs/0607059
Vlady Ravelomanana
Vlady Ravelomanana (LIPN), Alphonse Laza Rijamame (D.M.I)
Creation and Growth of Components in a Random Hypergraph Process
R\'{e}sum\'{e} \'{e}tendu
Proceedings of The Twelfth Annual International Computing and Combinatorics Conference (COCOON'06) -- Lecture Notes in Computer Science (2006) \`{a} para\^{i}tre
null
null
cs.DM math.CO math.PR
null
Denote by an $\ell$-component a connected $b$-uniform hypergraph with $k$ edges and $k(b-1) - \ell$ vertices. We prove that the expected number of creations of $\ell$-component during a random hypergraph process tends to 1 as $\ell$ and $b$ tend to $\infty$ with the total number of vertices $n$ such that $\ell = o(\sqrt[3]{\frac{n}{b}})$. Under the same conditions, we also show that the expected number of vertices that ever belong to an $\ell$-component is approximately $12^{1/3} (b-1)^{1/3} \ell^{1/3} n^{2/3}$. As an immediate consequence, it follows that with high probability the largest $\ell$-component during the process is of size $O((b-1)^{1/3} \ell^{1/3} n^{2/3})$. Our results give insight about the size of giant components inside the phase transition of random hypergraphs.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 09:45:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ], [ "Rijamame", "Alphonse Laza", "", "D.M.I" ] ]
cs/0607060
Gary Hardy
Yoann Dieudonne (LaRIA), Ouiddad Labbani-Igbida (CREA), Franck Petit (LaRIA)
Circle Formation of Weak Mobile Robots
null
null
null
null
cs.RO
null
In this paper we prove the conjecture of D\'{e}fago & Konagaya. Furthermore, we describe a deterministic protocol for forming a regular n-gon in finite time.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 12:57:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Dieudonne", "Yoann", "", "LaRIA" ], [ "Labbani-Igbida", "Ouiddad", "", "CREA" ], [ "Petit", "Franck", "", "LaRIA" ] ]
cs/0607061
Igor Mackarov Dr.
Igor Mackarov (Maharishi University of Management)
On Some Peculiarities of Dynamic Switch between Component Implementations in an Autonomic Computing System
16 pages, 3 figures
null
null
null
cs.DS cs.DC cs.NA
null
Behavior of the delta algorithm of autonomic switch between two component implementations is considered on several examples of a client-server systems involving, in particular, periodic change of intensities of requests for the component. It is shown that in the cases of some specific combinations of elementary requests costs, the number of clients in the system, the number of requests per unit of time, and the cost of switch between the implementations, the algorithm may reveal behavior that is rather far from the desired. A sufficient criterion of a success of the algorithm is proposed based on the analysis of the accumulated implementations costs difference as a function of time. Suggestions are pointed out of practical evaluation of the algorithm functioning regarding the observations made in this paper.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 11:09:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Mackarov", "Igor", "", "Maharishi University of Management" ] ]
cs/0607063
Leon Moonen
Cathal Boogerd and Leon Moonen
Prioritizing Software Inspection Results using Static Profiling
14 pages
null
null
TUD-SERG-2006-001
cs.SE
null
Static software checking tools are useful as an additional automated software inspection step that can easily be integrated in the development cycle and assist in creating secure, reliable and high quality code. However, an often quoted disadvantage of these tools is that they generate an overly large number of warnings, including many false positives due to the approximate analysis techniques. This information overload effectively limits their usefulness. In this paper we present ELAN, a technique that helps the user prioritize the information generated by a software inspection tool, based on a demand-driven computation of the likelihood that execution reaches the locations for which warnings are reported. This analysis is orthogonal to other prioritization techniques known from literature, such as severity levels and statistical analysis to reduce false positives. We evaluate feasibility of our technique using a number of case studies and assess the quality of our predictions by comparing them to actual values obtained by dynamic profiling.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 20:35:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Boogerd", "Cathal", "" ], [ "Moonen", "Leon", "" ] ]
cs/0607065
Khalil Djelloul
Khalil Djelloul
Decomposable Theories
null
null
null
null
cs.LO cs.AI
null
We present in this paper a general algorithm for solving first-order formulas in particular theories called "decomposable theories". First of all, using special quantifiers, we give a formal characterization of decomposable theories and show some of their properties. Then, we present a general algorithm for solving first-order formulas in any decomposable theory "T". The algorithm is given in the form of five rewriting rules. It transforms a first-order formula "P", which can possibly contain free variables, into a conjunction "Q" of solved formulas easily transformable into a Boolean combination of existentially quantified conjunctions of atomic formulas. In particular, if "P" has no free variables then "Q" is either the formula "true" or "false". The correctness of our algorithm proves the completeness of the decomposable theories. Finally, we show that the theory "Tr" of finite or infinite trees is a decomposable theory and give some benchmarks realized by an implementation of our algorithm, solving formulas on two-partner games in "Tr" with more than 160 nested alternated quantifiers.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 14:46:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Djelloul", "Khalil", "" ] ]
cs/0607066
Dimitrios Katsaros
Antonis Sidiropoulos, Dimitrios Katsaros, Yannis Manolopoulos
Generalized h-index for Disclosing Latent Facts in Citation Networks
19 pages, 17 tables, 27 figures
null
null
null
cs.DL
null
What is the value of a scientist and its impact upon the scientific thinking? How can we measure the prestige of a journal or of a conference? The evaluation of the scientific work of a scientist and the estimation of the quality of a journal or conference has long attracted significant interest, due to the benefits from obtaining an unbiased and fair criterion. Although it appears to be simple, defining a quality metric is not an easy task. To overcome the disadvantages of the present metrics used for ranking scientists and journals, J.E. Hirsch proposed a pioneering metric, the now famous h-index. In this article, we demonstrate several inefficiencies of this index and develop a pair of generalizations and effective variants of it to deal with scientist ranking and with publication forum ranking. The new citation indices are able to disclose trendsetters in scientific research, as well as researchers that constantly shape their field with their influential work, no matter how old they are. We exhibit the effectiveness and the benefits of the new indices to unfold the full potential of the h-index, with extensive experimental results obtained from DBLP, a widely known on-line digital library.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 15:47:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidiropoulos", "Antonis", "" ], [ "Katsaros", "Dimitrios", "" ], [ "Manolopoulos", "Yannis", "" ] ]
cs/0607067
Vladimir Vovk
Vladimir Vovk
Competing with stationary prediction strategies
20 pages
null
null
null
cs.LG
null
In this paper we introduce the class of stationary prediction strategies and construct a prediction algorithm that asymptotically performs as well as the best continuous stationary strategy. We make mild compactness assumptions but no stochastic assumptions about the environment. In particular, no assumption of stationarity is made about the environment, and the stationarity of the considered strategies only means that they do not depend explicitly on time; we argue that it is natural to consider only stationary strategies even for highly non-stationary environments.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 15:52:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0607070
Victor Kryssanov
V. V. Kryssanov, F. J. Rinaldo, H. Ogawa, E. Kuleshov
Citation as a Representation Process
5 pages, 2 figures. Preprint completed in July 2006
null
null
null
cs.DL cs.CY physics.data-an
null
The presented work proposes a novel approach to model the citation rate. The paper begins with a brief introduction into informetrics studies and highlights drawbacks of the contemporary approaches to modeling the citation process as a product of social interactions. An alternative modeling framework based on results obtained in cognitive psychology is then introduced and applied in an experiment to investigate properties of the citation process, as they are revealed by a large collection of citation statistics. Major research findings are discussed, and a summary is given.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 10:38:11 GMT" }, { "version": "v2", "created": "Mon, 17 Jul 2006 01:36:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Rinaldo", "F. J.", "" ], [ "Ogawa", "H.", "" ], [ "Kuleshov", "E.", "" ] ]
cs/0607071
Peter J. Stuckey
H. Fang, Y. Kilani, J.H.M. Lee, and P.J. Stuckey
Islands for SAT
7 pages
null
null
null
cs.AI
null
In this note we introduce the notion of islands for restricting local search. We show how we can construct islands for CNF SAT problems, and how much search space can be eliminated by restricting search to the island.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 12:44:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Fang", "H.", "" ], [ "Kilani", "Y.", "" ], [ "Lee", "J. H. M.", "" ], [ "Stuckey", "P. J.", "" ] ]
cs/0607072
Scott Turner
Scott A. Turner, Manuel A. Perez-Quinones, Stephen H. Edwards
Effect of Interface Style in Peer Review Comments for UML Designs
8 pages, 7 figures
null
null
null
cs.HC
null
This paper presents our evaluation of using a Tablet-PC to provide peer-review comments in the first year Computer Science course. Our exploration consisted of an evaluation of how students write comments on other students' assignments using three different methods: pen and paper, a Tablet-PC, and a desktop computer. Our ultimate goal is to explore the effect that interface style (Tablet vs. Desktop) has on the quality and quantity of the comments provided.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 16:00:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Turner", "Scott A.", "" ], [ "Perez-Quinones", "Manuel A.", "" ], [ "Edwards", "Stephen H.", "" ] ]
cs/0607073
Andrea Montanari
Andrea Montanari, Devavrat Shah
Counting good truth assignments of random k-SAT formulae
13 pages, 1 eps figure
null
null
null
cs.DM cond-mat.dis-nn
null
We present a deterministic approximation algorithm to compute logarithm of the number of `good' truth assignments for a random k-satisfiability (k-SAT) formula in polynomial time (by `good' we mean that violate a small fraction of clauses). The relative error is bounded above by an arbitrarily small constant epsilon with high probability as long as the clause density (ratio of clauses to variables) alpha<alpha_{u}(k) = 2k^{-1}\log k(1+o(1)). The algorithm is based on computation of marginal distribution via belief propagation and use of an interpolation procedure. This scheme substitutes the traditional one based on approximation of marginal probabilities via MCMC, in conjunction with self-reduction, which is not easy to extend to the present problem. We derive 2k^{-1}\log k (1+o(1)) as threshold for uniqueness of the Gibbs distribution on satisfying assignment of random infinite tree k-SAT formulae to establish our results, which is of interest in its own right.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 16:05:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Montanari", "Andrea", "" ], [ "Shah", "Devavrat", "" ] ]
cs/0607077
Emin Gabrielyan
Emin Gabrielyan
Fault-Tolerant Real-Time Streaming with FEC thanks to Capillary Multi-Path Routing
null
Emin Gabrielyan, Fault-Tolerant Real-Time Streaming with FEC thanks to Capillary Multi-Path Routing, International Conference on Communications, Circuits and Systems - ICCCAS'06 - Gui Lin, China, 25-28 June 2006, Vol. 3, pp. 1497-1501
null
null
cs.NI cs.MM
null
Erasure resilient FEC codes in off-line packetized streaming rely on time diversity. This requires unrestricted buffering time at the receiver. In real-time streaming the playback buffering time must be very short. Path diversity is an orthogonal strategy. However, the large number of long paths increases the number of underlying links and consecutively the overall link failure rate. This may increase the overall requirement in redundant FEC packets for combating the link failures. We introduce the Redundancy Overall Requirement (ROR) metric, a routing coefficient specifying the total number of FEC packets required for compensation of all underlying link failures. We present a capillary routing algorithm for constructing layer by layer steadily diversifying multi-path routing patterns. By measuring the ROR coefficients of a dozen of routing layers on hundreds of network samples, we show that the number of required FEC packets decreases substantially when the path diversity is increased by the capillary routing construction algorithm.
[ { "version": "v1", "created": "Mon, 17 Jul 2006 08:10:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gabrielyan", "Emin", "" ] ]
cs/0607081
Marie-France Ango-Obiang
Marie-France Ango-Obiang (LORIA)
Syst\`{e}me de repr\'{e}sentation d'aide au besoin dans le domaine architectural
null
Dans CONFERE 2006, Conception et Innovation
null
null
cs.OH cs.IR
null
The image is a very important mean of communication in the field of architectural who intervenes in the various phases of the design of a project. It can be regarded as a tool of decision-making aid. The study of our research aims at to see the contribution of the Economic Intelligence in the resolution of a decisional problem of the various partners (Architect, Contractor, Customer) in the architectural field, in order to make strategic decisions within the framework of the realization or design of an architectural work. The economic Intelligence allows the taking into account of the real needs for the user-decision makers, so that their waiting are considered at the first stage of a search for information and not in the final stage of the development of the tool in the evaluation of this last.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 05:04:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Ango-Obiang", "Marie-France", "", "LORIA" ] ]
cs/0607083
Stanko Shtrakov
Stanko Vl. Shtrakov, Anton Stoilov
Mathematical Modelling of the Thermal Accumulation in Hot Water Solar Systems
11 pages, 5 figures
null
null
null
cs.CE
null
Mathematical modelling and defining useful recommendations for construction and regimes of exploitation for hot water solar installation with thermal stratification is the main purpose of this work. A special experimental solar module for hot water was build and equipped with sufficient measure apparatus. The main concept of investigation is to optimise the stratified regime of thermal accumulation and constructive parameters of heat exchange equipment (heat serpentine in tank). Accumulation and heat exchange processes were investigated by theoretical end experimental means. Special mathematical model was composed to simulate the energy transfer in stratified tank. Computer program was developed to solve mathematical equations for thermal accumulation and energy exchange. Extensive numerical and experimental tests were carried out. A good correspondence between theoretical and experimental data was arrived. Keywords: Mathematical modelling, accumulation
[ { "version": "v1", "created": "Tue, 18 Jul 2006 08:07:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Stanko Vl.", "" ], [ "Stoilov", "Anton", "" ] ]
cs/0607084
Farid Nouioua
Daniel Kayser (LIPN), Farid Nouioua (LIPN)
About Norms and Causes
null
The 17th FLAIRS'04 Conference (2004) 502-507
null
null
cs.AI
null
Knowing the norms of a domain is crucial, but there exist no repository of norms. We propose a method to extract them from texts: texts generally do not describe a norm, but rather how a state-of-affairs differs from it. Answers concerning the cause of the state-of-affairs described often reveal the implicit norm. We apply this idea to the domain of driving, and validate it by designing algorithms that identify, in a text, the "basic" norms to which it refers implicitly.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 07:46:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Kayser", "Daniel", "", "LIPN" ], [ "Nouioua", "Farid", "", "LIPN" ] ]
cs/0607086
Farid Nouioua
Daniel Kayser (LIPN), Farid Nouioua (LIPN)
Representing Knowledge about Norms
null
The 16th European Conference on Artificial Intelligence (ECAI'04) (2004) 363-367
null
null
cs.AI
null
Norms are essential to extend inference: inferences based on norms are far richer than those based on logical implications. In the recent decades, much effort has been devoted to reason on a domain, once its norms are represented. How to extract and express those norms has received far less attention. Extraction is difficult: as the readers are supposed to know them, the norms of a domain are seldom made explicit. For one thing, extracting norms requires a language to represent them, and this is the topic of this paper. We apply this language to represent norms in the domain of driving, and show that it is adequate to reason on the causes of accidents, as described by car-crash reports.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 08:15:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Kayser", "Daniel", "", "LIPN" ], [ "Nouioua", "Farid", "", "LIPN" ] ]
cs/0607088
Farid Nouioua
Farid Nouioua (LIPN), Pascal Nicolas (LERIA)
Using Answer Set Programming in an Inference-Based approach to Natural Language Semantics
null
Inference in Computational Semantics ICoS-5, France (2006) 77-86
null
null
cs.CL cs.AI
null
Using Answer Set Programming in an Inference-Based approach to Natural Language Semantics
[ { "version": "v1", "created": "Tue, 18 Jul 2006 07:43:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Nouioua", "Farid", "", "LIPN" ], [ "Nicolas", "Pascal", "", "LERIA" ] ]
cs/0607090
Adityan Rishiyur
Adityan Rishiyur
Neural Networks with Complex and Quaternion Inputs
14 pages, 2 figures
null
null
null
cs.NE
null
This article investigates Kak neural networks, which can be instantaneously trained, for complex and quaternion inputs. The performance of the basic algorithm has been analyzed and shown how it provides a plausible model of human perception and understanding of images. The motivation for studying quaternion inputs is their use in representing spatial rotations that find applications in computer graphics, robotics, global navigation, computer vision and the spatial orientation of instruments. The problem of efficient mapping of data in quaternion neural networks is examined. Some problems that need to be addressed before quaternion neural networks find applications are identified.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 21:01:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Rishiyur", "Adityan", "" ] ]
cs/0607091
Stanko Shtrakov
Stanko Shtrakov, Anton Stoilov
Finite element method for thermal analysis of concentrating solar receivers
8 pages; 5 figures
null
null
null
cs.CE
null
Application of finite element method and heat conductivity transfer model for calculation of temperature distribution in receiver for dish-Stirling concentrating solar system is described. The method yields discretized equations that are entirely local to the elements and provides complete geometric flexibility. A computer program solving the finite element method problem is created and great number of numerical experiments is carried out. Illustrative numerical results are given for an array of triangular elements in receiver for dish-Stirling system.
[ { "version": "v1", "created": "Wed, 19 Jul 2006 06:58:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Stanko", "" ], [ "Stoilov", "Anton", "" ] ]
cs/0607100
Xin Han
Xin Han, Kazuo Iwama, Guochuan Zhang
New Upper Bounds on The Approximability of 3D Strip Packing
Submitted to SODA 2007
null
null
null
cs.DS
null
In this paper, we study the 3D strip packing problem in which we are given a list of 3-dimensional boxes and required to pack all of them into a 3-dimensional strip with length 1 and width 1 and unlimited height to minimize the height used. Our results are below: i) we give an approximation algorithm with asymptotic worst-case ratio 1.69103, which improves the previous best bound of $2+\epsilon$ by Jansen and Solis-Oba of SODA 2006; ii) we also present an asymptotic PTAS for the case in which all items have {\em square} bases.
[ { "version": "v1", "created": "Sat, 22 Jul 2006 02:06:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Han", "Xin", "" ], [ "Iwama", "Kazuo", "" ], [ "Zhang", "Guochuan", "" ] ]
cs/0607101
Patricia Hill
Patricia M. Hill, Fausto Spoto
Deriving Escape Analysis by Abstract Interpretation: Proofs of results
null
null
null
null
cs.PL
null
Escape analysis of object-oriented languages approximates the set of objects which do not escape from a given context. If we take a method as context, the non-escaping objects can be allocated on its activation stack; if we take a thread, Java synchronisation locks on such objects are not needed. In this paper, we formalise a basic escape domain e as an abstract interpretation of concrete states, which we then refine into an abstract domain er which is more concrete than e and, hence, leads to a more precise escape analysis than e. We provide optimality results for both e and er, in the form of Galois insertions from the concrete to the abstract domains and of optimal abstract operations. The Galois insertion property is obtained by restricting the abstract domains to those elements which do not contain garbage, by using an abstract garbage collector. Our implementation of er is hence an implementation of a formally correct escape analyser, able to detect the stack allocatable creation points of Java (bytecode) applications. This report contains the proofs of results of a paper with the same title and authors and to be published in the Journal "Higher-Order Symbolic Computation".
[ { "version": "v1", "created": "Mon, 24 Jul 2006 09:24:07 GMT" }, { "version": "v2", "created": "Fri, 28 Jul 2006 14:59:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Hill", "Patricia M.", "" ], [ "Spoto", "Fausto", "" ] ]
cs/0607103
Lester Ingber
Lester Ingber
Ideas by Statistical Mechanics (ISM)
null
null
null
null
cs.CE cs.MS cs.NE
null
Ideas by Statistical Mechanics (ISM) is a generic program to model evolution and propagation of ideas/patterns throughout populations subjected to endogenous and exogenous interactions. The program is based on the author's work in Statistical Mechanics of Neocortical Interactions (SMNI), and uses the author's Adaptive Simulated Annealing (ASA) code for optimizations of training sets, as well as for importance-sampling to apply the author's copula financial risk-management codes, Trading in Risk Dimensions (TRD), for assessments of risk and uncertainty. This product can be used for decision support for projects ranging from diplomatic, information, military, and economic (DIME) factors of propagation/evolution of ideas, to commercial sales, trading indicators across sectors of financial markets, advertising and political campaigns, etc. A statistical mechanical model of neocortical interactions, developed by the author and tested successfully in describing short-term memory and EEG indicators, is the proposed model. Parameters with a given subset of macrocolumns will be fit using ASA to patterns representing ideas. Parameters of external and inter-regional interactions will be determined that promote or inhibit the spread of these ideas. Tools of financial risk management, developed by the author to process correlated multivariate systems with differing non-Gaussian distributions using modern copula analysis, importance-sampled using ASA, will enable bona fide correlations and uncertainties of success and failure to be calculated. Marginal distributions will be evolved to determine their expected duration and stability using algorithms developed by the author, i.e., PATHTREE and PATHINT codes.
[ { "version": "v1", "created": "Sun, 23 Jul 2006 16:12:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Ingber", "Lester", "" ] ]
cs/0607106
Hubie Chen
Hubie Chen
The Complexity of Quantified Constraint Satisfaction: Collapsibility, Sink Algebras, and the Three-Element Case
null
null
null
null
cs.LO cs.CC
null
The constraint satisfaction probem (CSP) is a well-acknowledged framework in which many combinatorial search problems can be naturally formulated. The CSP may be viewed as the problem of deciding the truth of a logical sentence consisting of a conjunction of constraints, in front of which all variables are existentially quantified. The quantified constraint satisfaction problem (QCSP) is the generalization of the CSP where universal quantification is permitted in addition to existential quantification. The general intractability of these problems has motivated research studying the complexity of these problems under a restricted constraint language, which is a set of relations that can be used to express constraints. This paper introduces collapsibility, a technique for deriving positive complexity results on the QCSP. In particular, this technique allows one to show that, for a particular constraint language, the QCSP reduces to the CSP. We show that collapsibility applies to three known tractable cases of the QCSP that were originally studied using disparate proof techniques in different decades: Quantified 2-SAT (Aspvall, Plass, and Tarjan 1979), Quantified Horn-SAT (Karpinski, Kleine B\"{u}ning, and Schmitt 1987), and Quantified Affine-SAT (Creignou, Khanna, and Sudan 2001). This reconciles and reveals common structure among these cases, which are describable by constraint languages over a two-element domain. In addition to unifying these known tractable cases, we study constraint languages over domains of larger size.
[ { "version": "v1", "created": "Mon, 24 Jul 2006 16:03:56 GMT" }, { "version": "v2", "created": "Tue, 25 Jul 2006 13:06:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hubie", "" ] ]
cs/0607109
Marko Samer
Marko Samer and Stefan Szeider
Complexity and Applications of Edge-Induced Vertex-Cuts
17 pages, 5 figures, 2 tables
null
null
null
cs.DM cs.CC
null
Motivated by hypergraph decomposition algorithms, we introduce the notion of edge-induced vertex-cuts and compare it with the well-known notions of edge-cuts and vertex-cuts. We investigate the complexity of computing minimum edge-induced vertex-cuts and demonstrate the usefulness of our notion by applications in network reliability and constraint satisfaction.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 16:17:22 GMT" }, { "version": "v2", "created": "Mon, 31 Jul 2006 09:23:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Samer", "Marko", "" ], [ "Szeider", "Stefan", "" ] ]
cs/0607110
Etienne Grossmann
Etienne Grossmann
A Theory of Probabilistic Boosting, Decision Trees and Matryoshki
null
null
null
null
cs.LG
null
We present a theory of boosting probabilistic classifiers. We place ourselves in the situation of a user who only provides a stopping parameter and a probabilistic weak learner/classifier and compare three types of boosting algorithms: probabilistic Adaboost, decision tree, and tree of trees of ... of trees, which we call matryoshka. "Nested tree," "embedded tree" and "recursive tree" are also appropriate names for this algorithm, which is one of our contributions. Our other contribution is the theoretical analysis of the algorithms, in which we give training error bounds. This analysis suggests that the matryoshka leverages probabilistic weak classifiers more efficiently than simple decision trees.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 15:57:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Grossmann", "Etienne", "" ] ]
cs/0607111
William Yurcik
William Yurcik, Cristina Abad, Ragib Hasan, Moazzam Saleem, Shyama Sridharan
UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs
10 pages, 9 Tables, 16 Figures
null
null
null
cs.CR
null
Source data for computer network security analysis takes different forms (alerts, incidents, logs) and each source may be voluminous. Due to the challenge this presents for data management, this has often lead to security stovepipe operations which focus primarily on a small number of data sources for analysis with little or no automated correlation between data sources (although correlation may be done manually). We seek to address this systemic problem. In previous work we developed a unified correlated logging system (UCLog) that automatically processes alerts from different devices. We take this work one step further by presenting the architecture and applications of UCLog+ which adds the new capability to correlate between alerts and incidents and raw data located on remote logs. UCLog+ can be used for forensic analysis including queries and report generation but more importantly it can be used for near-real-time situational awareness of attack patterns in progress. The system, implemented with open source tools, can also be a repository for secure information sharing by different organizations.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 19:44:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Yurcik", "William", "" ], [ "Abad", "Cristina", "" ], [ "Hasan", "Ragib", "" ], [ "Saleem", "Moazzam", "" ], [ "Sridharan", "Shyama", "" ] ]
cs/0607113
David Eppstein
Josiah Carlson and David Eppstein
Trees with Convex Faces and Optimal Angles
12 pages, 10 figures. To appear at 14th Int. Symp. Graph Drawing, 2006
null
null
null
cs.CG
null
We consider drawings of trees in which all edges incident to leaves can be extended to infinite rays without crossing, partitioning the plane into infinite convex polygons. Among all such drawings we seek the one maximizing the angular resolution of the drawing. We find linear time algorithms for solving this problem, both for plane trees and for trees without a fixed embedding. In any such drawing, the edge lengths may be set independently of the angles, without crossing; we describe multiple strategies for setting these lengths.
[ { "version": "v1", "created": "Wed, 26 Jul 2006 00:44:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Carlson", "Josiah", "" ], [ "Eppstein", "David", "" ] ]
cs/0607115
Marcin Kaminski
Marcin Kaminski and Vadim Lozin
Polynomial-time algorithm for vertex k-colorability of P_5-free graphs
null
null
null
null
cs.DM cs.DS
null
We give the first polynomial-time algorithm for coloring vertices of P_5-free graphs with k colors. This settles an open problem and generalizes several previously known results.
[ { "version": "v1", "created": "Wed, 26 Jul 2006 09:20:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaminski", "Marcin", "" ], [ "Lozin", "Vadim", "" ] ]
cs/0607116
Rui Abreu Eng
Rui Abreu, Peter Zoeteweij and Arjan JC van Gemund
Program Spectra Analysis in Embedded Software: A Case Study
null
null
null
TUD-SERG-2006-007
cs.SE
null
Because of constraints imposed by the market, embedded software in consumer electronics is almost inevitably shipped with faults and the goal is just to reduce the inherent unreliability to an acceptable level before a product has to be released. Automatic fault diagnosis is a valuable tool to capture software faults without extra effort spent on testing. Apart from a debugging aid at design and integration time, fault diagnosis can help analyzing problems during operation, which allows for more accurate system recovery. In this paper we discuss perspectives and limitations for applying a particular fault diagnosis technique, namely the analysis of program spectra, in the area of embedded software in consumer electronics devices. We illustrate these by our first experience with a test case from industry.
[ { "version": "v1", "created": "Wed, 26 Jul 2006 09:26:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Abreu", "Rui", "" ], [ "Zoeteweij", "Peter", "" ], [ "van Gemund", "Arjan JC", "" ] ]
cs/0607117
Jon Feldman
Gagan Aggarwal, S. Muthukrishnan, Jon Feldman
Bidding to the Top: VCG and Equilibria of Position-Based Auctions
null
null
null
null
cs.GT
null
Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study "prefix position auctions" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an "envy-free" or "symmetric" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions.
[ { "version": "v1", "created": "Wed, 26 Jul 2006 15:42:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Aggarwal", "Gagan", "" ], [ "Muthukrishnan", "S.", "" ], [ "Feldman", "Jon", "" ] ]
cs/0607119
Sergey Zykov V.
Sergey V. Zykov
Web-Based Enterprise Information Systems Development: The Integrated Methodology
5 pages
Proceedings of the 5th International Conference on Computer Science and Information Technologies (CSIT 2005), Yerevan, Armenia, 19-23 September 2005. National Academy of Sciences of Armenia Publishers, 2005, pp.373-381
null
null
cs.SE cs.DC
null
The paper considers software development issues for large-scale enterprise information systems (IS) with databases (DB) in global heterogeneous distributed computational environment. Due to high IT development rates, the present-day society has accumulated and rapidly increases an extremely huge data burden. Manipulating with such huge data arrays becomes an essential problem, particularly due to their global distribution, heterogeneous and weak-structured character. The conceptual approach to integrated Internet-based IS design, development and implementation is presented, including formal models, software development methodology and original software development tools for visual problem-oriented development and content management. IS implementation results proved shortening terms and reducing costs of implementation compared to commercial software available.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 07:47:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607120
Peter Turney
Peter D. Turney (National Research Council of Canada)
Expressing Implicit Semantic Relations without Supervision
8 pages, related work available at http://purl.org/peter.turney/
Proceedings of the 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics (ACL-06), (2006), Sydney, Australia, 313-320
null
NRC-48761
cs.CL cs.AI cs.IR cs.LG
null
We present an unsupervised learning algorithm that mines large text corpora for patterns that express implicit semantic relations. For a given input word pair X:Y with some unspecified semantic relations, the corresponding output list of patterns <P1,...,Pm> is ranked according to how well each pattern Pi expresses the relations between X and Y. For example, given X=ostrich and Y=bird, the two highest ranking output patterns are "X is the largest Y" and "Y such as the X". The output patterns are intended to be useful for finding further pairs with the same relations, to support the construction of lexicons, ontologies, and semantic networks. The patterns are sorted by pertinence, where the pertinence of a pattern Pi for a word pair X:Y is the expected relational similarity between the given pair and typical pairs for Pi. The algorithm is empirically evaluated on two tasks, solving multiple-choice SAT word analogy questions and classifying semantic relations in noun-modifier pairs. On both tasks, the algorithm achieves state-of-the-art results, performing significantly better than several alternative pattern ranking algorithms, based on tf-idf.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 18:23:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
cs/0607121
Sergey Zykov V.
Sergey V.Zykov, Gleb G. Pogodayev
Object-Based Groupware: Theory, Design and Implementation Issues
8 pages, 2 figures
In: J.Eder and L.A. Kalinichenko, (Ed.) Advances in Databases and Information Systems, Vol.2. St.-Petersburg: Nevsky Dialect, 1997, p.p.10-17
null
null
cs.SE
null
Document management software systems are having a wide audience at present. However, groupware as a term has a wide variety of possible definitions. Groupware classification attempt is made in this paper. Possible approaches to groupware are considered including document management, document control and mailing systems. Lattice theory and concept modelling are presented as a theoretical background for the systems in question. Current technologies in state-of-the-art document managenent software are discussed. Design and implementation aspects for user-friendly integrate enterprise systems are described. Results for a real system to be implemented are given. Perspectives of the field in question are discussed.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 10:16:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ], [ "Pogodayev", "Gleb G.", "" ] ]
cs/0607122
Sergey Zykov V.
Sergey V. Zykov
Enterprise Content Management: Theory and Engineering for Entire Lifecycle Support
6 pages, 1 figure
Proceedings of the 8th International Workshop on Computer Science and Information Technologies (CSIT'2006), Vol.1, Karlsruhe, Germany, Sept.28-29, 2006.- Karlsruhe University Publishers, Karlsruhe, 2006.- Vol.1, p.p.92-97
null
null
cs.SE cs.DC
null
The paper considers enterprise content management (ECM) issues in global heterogeneous distributed computational environment. Present-day enterprises have accumulated a huge data burden. Manipulating with such a bulk becomes an essential problem, particularly due to its global distribution, heterogeneous and weak-structured character. The conceptual approach to integrated ECM lifecycle support is presented, including overview of formal models, software development methodology and innovative software development tools. Implementation results proved shortening terms and reducing costs of implementation compared to commercial software available.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 10:32:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607123
Sergey Zykov V.
Sergey V. Zykov
Enterprise Portal Development Tools: Problem-Oriented Approach
4 pages, 2 figures
Proceedings of the 7th International Workshop on Computer Science and Information Technologies (CSIT'2005), Vol.1, Ufa State Aviation Technical University, USATU Editorial-Publishing Office, Ufa, 2005, pp. 110-113
null
null
cs.SE cs.DC
null
The paper deals with problem-oriented visual information system (IS) engineering for enterprise Internet-based applications, which is a vital part of the whole development process. The suggested approach is based on semantic network theory and a novel ConceptModeller CASE tool.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 11:24:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607124
Sergey Zykov V.
Sergey V. Zykov
ConceptModeller: a Problem-Oriented Visual SDK for Globally Distributed Enterprise Systems
4 pages, 2 figures
Proceedings of the 7th International Workshop on Computer Science and Information Technologies (CSIT'2005), Vol.1, Ufa State Aviation Technical University, USATU Editorial-Publishing Office, Ufa, 2005, pp. 114-117
null
cs.szykov.27374
cs.SE cs.DC
null
The paper describes problem-oriented approach to software development. The approach is a part of the original integrated methodology of enterprise Internet-based software design and implementation. All aspects of software development, from theory to implementation, are covered.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 11:35:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607125
Sergey Zykov V.
Sergey V. Zykov
Enterprise Portal: from Model to Implementation
6 pages, 1 figure
Workshop on Computer Science and Information Technologies (CSIT'2004), Budapest, Hungary, 2004, Vol.2, p.p.188-193
null
null
cs.SE cs.DC
null
Portal technology can significantly improve the entire corporate information infrastructure. The approach proposed is based on rigorous and consistent (meta)data model and provides for efficient and accurate front-end integration of heterogeneous corporate applications including enterprise resource planning (ERP) systems, multimedia data warehouses and proprietary content databases. The methodology proposed embraces entire software lifecycle; it is illustrated by an enterprise-level Intranet portal implementation.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 12:12:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607126
Sergey Zykov V.
Sergey V. Zykov
Abstract Machine as a Model of Content Management Information System
4 pages
Workshop on Computer Science and Information Technologies (CSIT'2004), Budapest, Hungary, 2004, Vol.2, p.p.251-252
null
null
cs.SE cs.DC
null
Enterprise content management is an urgent issue of current scientific and practical activities in software design and implementation. However, papers known as yet give insufficient coverage of theoretical background of the software in question. The paper gives an attempt of building a state-based model of content management. In accordance with the theoretical principles outlined, a content management information system (CMIS) has been implemented in a large international oil-and-gas group of companies.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 12:40:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607127
Sergey Zykov V.
Sergey V. Zykov
Integrating Enterprise Software Applications with Web Portal Technology
6 pages, 1 picture
Proceedings of 5th International Workshop on Computer Science and Information Technologies (CSIT'2003), Vol.1, Ufa State Aviation Technical University, Ufa:USATU Editorial-Publishing Office, 2003, p.p.60-65
null
null
cs.SE cs.DC
null
Web-portal based approach can significantly improve the entire corporate information infrastructure. The approach proposed provides for rapid and accurate front-end integration of heterogeneous corporate applications including enterprise resource planning (ERP) systems. Human resources ERP component and multimedia data warehouse implementations are discussed as essential instances.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 12:49:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607128
Sergey Zykov V.
Sergey V. Zykov
The Integrated Approach to ERP: Embracing the Web
6 pages, 3 pictures
Proceedings of 4th International Workshop on Computer Science and Information Technologies, (CSIT'2002) Sept., 2002, Patras, Greece, Vol.1, p.p.73-78
null
null
cs.SE cs.DC
null
Integrated approach to enterprise resource planning (ERP) software design and implementation can significantly improve the entire corporate information infrastructure and it helps to benefit from power of Internet services. The approach proposed provides for corporate Web portal integrity, consistency, urgency and front-end data processing. Human resources (HR) ERP component implementation is discussed as an essential instance.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 12:58:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607129
Sergey Zykov V.
Sergey V. Zykov
Enterprise Resource Planning Systems: the Integrated Approach
12 pages, 6 pictures
Proceedings of the 3d International Workshop on Computer Science and Information Technologies, (CSIT'2001), Ufa:USATU, 2001, Vol.1, p.p.284-295
null
null
cs.SE cs.DC
null
Enterprise resource planning (ERP) systems enjoy an increasingly wide coverage. However, no truly integrate solution has been proposed as yet. ERP classification is given. Recent trends in commercial systems are analyzed on the basis of human resources (HR) management software. An innovative "straight through" design and implementation process of an open, secure, and scalable integrated event-driven enterprise solution is suggested. Implementation results are presented.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 13:07:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607130
Sergey Zykov V.
Sergey V. Zykov
Towards Implementing an Enterprise Groupware-Integrated Human Resources Information System
9 pages, 3 pictures
Proceedings of the 2nd International Workshop on Computer Science and Information Technologies (CSIT'2000), Vol.1, Ufa State Aviation Technical University, USATU Editorial-Publishing Office, Ufa, 2000, p.p.188-196
null
null
cs.SE cs.CY
null
Human resources management software is having a wide audience at present. However, no truly integrate solution has been proposed yet to improve the systems concerned. Approaches to extra data collection for appraisal decision-making are considered on the concept modeling theoretical basis. Current technologies in state-of-the-art HR management software are compared. Design and implementation aspects for a Web-wired truly integrated secure and scalable event-driven enterprise system are described. Benchmark results are presented. Field perspectives are discussed.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 13:14:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607134
Vladimir Vovk
Vladimir Vovk
Leading strategies in competitive on-line prediction
20 pages; a conference version is to appear in the ALT'2006 proceedings
null
null
null
cs.LG
null
We start from a simple asymptotic result for the problem of on-line regression with the quadratic loss function: the class of continuous limited-memory prediction strategies admits a "leading prediction strategy", which not only asymptotically performs at least as well as any continuous limited-memory strategy but also satisfies the property that the excess loss of any continuous limited-memory strategy is determined by how closely it imitates the leading strategy. More specifically, for any class of prediction strategies constituting a reproducing kernel Hilbert space we construct a leading strategy, in the sense that the loss of any prediction strategy whose norm is not too large is determined by how closely it imitates the leading strategy. This result is extended to the loss functions given by Bregman divergences and by strictly proper scoring rules.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 22:11:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0607136
Vladimir Vovk
Vladimir Vovk
Competing with Markov prediction strategies
11 pages
null
null
null
cs.LG
null
Assuming that the loss function is convex in the prediction, we construct a prediction strategy universal for the class of Markov prediction strategies, not necessarily continuous. Allowing randomization, we remove the requirement of convexity.
[ { "version": "v1", "created": "Fri, 28 Jul 2006 21:45:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0607137
Henrik Petander
Henrik Petander, Eranga Perera, Aruna Seneviratne
Multicasting with selective delivery: A SafetyNet for vertical handoffs
20 pages
null
null
null
cs.NI
null
In future mobility support will require handling roaming in heterogeneous access networks. In order to enable seamless roaming it is necessary to minimize the impact of the vertical handoffs. Localized mobility management schemes such as FMIPv6 and HMIPv6 do not provide sufficient handoff performance, since they have been designed for horizontal handoffs. In this paper, we propose the SafetyNet protocol, which allows a Mobile Node to perform seamless vertical handoffs. Further, we propose a handoff timing algorithm which allows a Mobile Node to delay or even completely avoid upward vertical handoffs. We implement the SafetyNet protocol and compare its performance with the Fast Handovers for Mobile IPv6 protocol in our wireless test bed and analyze the results. The experimental results indicate that the proposed SafetyNet protocol can provide an improvement of up to 95% for TCP performance in vertical handoffs, when compared with FMIPv6 and an improvement of 64% over FMIPv6 with bicasting. We use numerical analysis of the protocol to show that its signaling and data transmission overhead is comparable to Fast Mobile IPv6 and significantly smaller than that of FMIPv6 with bicasting.
[ { "version": "v1", "created": "Sat, 29 Jul 2006 01:45:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Petander", "Henrik", "" ], [ "Perera", "Eranga", "" ], [ "Seneviratne", "Aruna", "" ] ]
cs/0607138
Mohamed Belal A.Y.
Mohamed A. Belal
A Foundation to Perception Computing, Logic and Automata
39 pages, pdf format, to be published
null
null
null
cs.AI cs.LG
null
In this report, a novel approach to intelligence and learning is introduced, this approach is based on what we call 'perception logic'. Based on this logic, a computing mechanism and automata are introduced. Multi-resolution analysis of perceptual information is given, in which learning is accomplished in at most O(log(N))epochs, where N is the number of samples, and the convergence is guarnteed. This approach combines the favors of computational modeles in the sense that they are structured and mathematically well-defined, and the adaptivity of soft computing approaches, in addition to the continuity and real-time response of dynamical systems.
[ { "version": "v1", "created": "Sun, 30 Jul 2006 10:44:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Belal", "Mohamed A.", "" ] ]
cs/0607141
Riccardo Pucella
Karl Crary and Robert Harper
Logic Column 16: Higher-Order Abstract Syntax: Setting the Record Straight
4 pages
null
null
null
cs.LO
null
This article responds to a critique of higher-order abstract syntax appearing in Logic Column 14, ``Nominal Logic and Abstract Syntax'', cs.LO/0511025.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 14:15:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Crary", "Karl", "" ], [ "Harper", "Robert", "" ] ]
cs/0607142
Andreas U. Schmidt
Nicolai Kuntze, Dominique Maehler, and Andreas U. Schmidt
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
Refereed contribution to the 4th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods, December 13 -15, 2006 on AXMEDIS 2006 in Leeds, England. 5 pages, 3 figures, final version
null
null
null
cs.CR
null
Reputation and recommendation systems are fundamental for the formation of community market places. Yet, they are easy targets for attacks which disturb a market's equilibrium and are often based on cheap pseudonyms used to submit ratings. We present a method to price ratings using trusted computing, based on pseudonymous tickets.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 15:17:39 GMT" }, { "version": "v2", "created": "Tue, 29 Aug 2006 09:51:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Maehler", "Dominique", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0607143
Florentin Smarandache
Jean Dezert, Albena Tchamova, Florentin Smarandache, Pavlina Konstantinova
Target Type Tracking with PCR5 and Dempster's rules: A Comparative Analysis
10 pages, 5 diagrams. Presented to Fusion 2006 International Conference, Florence, Italy, July 2006
Proceedings of Fusion 2006 International Conference, Florence, Italy, July 2006
null
null
cs.AI
null
In this paper we consider and analyze the behavior of two combinational rules for temporal (sequential) attribute data fusion for target type estimation. Our comparative analysis is based on Dempster's fusion rule proposed in Dempster-Shafer Theory (DST) and on the Proportional Conflict Redistribution rule no. 5 (PCR5) recently proposed in Dezert-Smarandache Theory (DSmT). We show through very simple scenario and Monte-Carlo simulation, how PCR5 allows a very efficient Target Type Tracking and reduces drastically the latency delay for correct Target Type decision with respect to Demspter's rule. For cases presenting some short Target Type switches, Demspter's rule is proved to be unable to detect the switches and thus to track correctly the Target Type changes. The approach proposed here is totally new, efficient and promising to be incorporated in real-time Generalized Data Association - Multi Target Tracking systems (GDA-MTT) and provides an important result on the behavior of PCR5 with respect to Dempster's rule. The MatLab source code is provided in
[ { "version": "v1", "created": "Mon, 31 Jul 2006 15:32:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Dezert", "Jean", "" ], [ "Tchamova", "Albena", "" ], [ "Smarandache", "Florentin", "" ], [ "Konstantinova", "Pavlina", "" ] ]
cs/0607144
Stanimir Andonov A
Stanimir Andonov
Levels of Product Differentiation in the Global Mobile Phones Market
null
null
null
null
cs.OH
null
The sixth product level called compliant product is a connecting element between the physical product characteristics and the strategy of the producer company. The article discusses the differentiation among the product offers of companies working in the global markets, as well as the strategies which they use and could use in that respect.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 15:43:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Andonov", "Stanimir", "" ] ]
cs/0607145
Ioannis Doxaras N. Mr
Yannis Bakopoulos, Theophanis Raptis, Doxaras Ioannis
Geometric definition of a new skeletonization concept
9 pages, 3 figures, to appear in "2nd Interdisciplinary Symposium and 2nd Summer School on Mathematical Modeling in Modern Technologies and Economics", 1-5 September, Athens, Greece
null
null
null
cs.CG
null
The Divider set, as an innovative alternative concept to maximal disks, Voronoi sets and cut loci, is presented with a formal definition based on topology and differential geometry. The relevant mathematical theory by previous authors and a comparison with other medial axis definitions is presented. Appropriate applications are proposed and examined.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 18:17:30 GMT" }, { "version": "v2", "created": "Thu, 3 Aug 2006 13:53:45 GMT" }, { "version": "v3", "created": "Tue, 26 Sep 2006 13:26:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Bakopoulos", "Yannis", "" ], [ "Raptis", "Theophanis", "" ], [ "Ioannis", "Doxaras", "" ] ]
cs/0607147
Florentin Smarandache
Florentin Smarandache, Jean Dezert
Fusion of qualitative beliefs using DSmT
13 pages. To appear in "Advances and Applications of DSmT for Information Fusion", collected works, second volume, 2006
Presented as an extended version (Tutorial MO2) to the Fusion 2006 International Conference, Florence, Italy, July 10-13, 2006
null
null
cs.AI
null
This paper introduces the notion of qualitative belief assignment to model beliefs of human experts expressed in natural language (with linguistic labels). We show how qualitative beliefs can be efficiently combined using an extension of Dezert-Smarandache Theory (DSmT) of plausible and paradoxical quantitative reasoning to qualitative reasoning. We propose a new arithmetic on linguistic labels which allows a direct extension of classical DSm fusion rule or DSm Hybrid rules. An approximate qualitative PCR5 rule is also proposed jointly with a Qualitative Average Operator. We also show how crisp or interval mappings can be used to deal indirectly with linguistic labels. A very simple example is provided to illustrate our qualitative fusion rules.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 17:16:57 GMT" }, { "version": "v2", "created": "Wed, 29 Nov 2006 19:16:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
cs/0608001
Bas Luttik
Luca Aceto, Wan Fokkink, Anna Ingolfsdottir, and Bas Luttik
A Finite Equational Base for CCS with Left Merge and Communication Merge
null
null
null
null
cs.LO
null
Using the left merge and communication merge from ACP, we present an equational base (i.e., a ground-complete and $\omega$-complete set of valid equations) for the fragment of CCS without recursion, restriction and relabelling. Our equational base is finite if the set of actions is finite.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 10:45:29 GMT" }, { "version": "v2", "created": "Wed, 2 Aug 2006 08:20:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Aceto", "Luca", "" ], [ "Fokkink", "Wan", "" ], [ "Ingolfsdottir", "Anna", "" ], [ "Luttik", "Bas", "" ] ]
cs/0608002
Florentin Smarandache
Florentin Smarandache, Jean Dezert
An Introduction to the DSm Theory for the Combination of Paradoxical, Uncertain, and Imprecise Sources of Information
21 pages, many tables, figures. To appear in Information&Security International Journal, 2006
Presented at 13th International Congress of Cybernetics and Systems, Maribor, Slovenia, July 6-10, 2005.
null
null
cs.AI
null
The management and combination of uncertain, imprecise, fuzzy and even paradoxical or high conflicting sources of information has always been, and still remains today, of primal importance for the development of reliable modern information systems involving artificial reasoning. In this introduction, we present a survey of our recent theory of plausible and paradoxical reasoning, known as Dezert-Smarandache Theory (DSmT) in the literature, developed for dealing with imprecise, uncertain and paradoxical sources of information. We focus our presentation here rather on the foundations of DSmT, and on the two important new rules of combination, than on browsing specific applications of DSmT available in literature. Several simple examples are given throughout the presentation to show the efficiency and the generality of this new approach.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 15:31:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
cs/0608004
Jose M. Soler
Jose M. Soler
Separating the articles of authors with the same name
4 pages, 0 figures
null
null
null
cs.DL cs.IR
null
I describe a method to separate the articles of different authors with the same name. It is based on a distance between any two publications, defined in terms of the probability that they would have as many coincidences if they were drawn at random from all published documents. Articles with a given author name are then clustered according to their distance, so that all articles in a cluster belong very likely to the same author. The method has proven very useful in generating groups of papers that are then selected manually. This simplifies considerably citation analysis when the author publication lists are not available.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 18:23:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Soler", "Jose M.", "" ] ]
cs/0608008
Ilya Safro
Ilya Safro
The minimum linear arrangement problem on proper interval graphs
null
null
null
null
cs.DM cs.DS
null
We present a linear time algorithm for the minimum linear arrangement problem on proper interval graphs. The obtained ordering is a 4-approximation for general interval graphs
[ { "version": "v1", "created": "Wed, 2 Aug 2006 07:46:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Safro", "Ilya", "" ] ]
cs/0608009
Claudia Landi
Andrea Cerri, Patrizio Frosini and Claudia Landi
Stability in multidimensional Size Theory
15 pages, 1 figure, uses psfrag
null
null
Universita' di Modena e Reggio Emilia, DISMI-85 june 2006
cs.CG cs.CV
null
This paper proves that in Size Theory the comparison of multidimensional size functions can be reduced to the 1-dimensional case by a suitable change of variables. Indeed, we show that a foliation in half-planes can be given, such that the restriction of a multidimensional size function to each of these half-planes turns out to be a classical size function in two scalar variables. This leads to the definition of a new distance between multidimensional size functions, and to the proof of their stability with respect to that distance.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 08:49:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Cerri", "Andrea", "" ], [ "Frosini", "Patrizio", "" ], [ "Landi", "Claudia", "" ] ]
cs/0608013
Julien Robert
Julien Robert, Nicolas Schabanel
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
null
null
null
null
cs.DS cs.CC
null
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently observed that the average service time of broadcast systems can be considerably improved by taking into consideration existing correlations between requests. We study a pull-based data broadcast system where users request possibly overlapping sets of items; a request is served when all its requested items are downloaded. We aim at minimizing the average user perceived latency, i.e. the average flow time of the requests. We first show that any algorithm that ignores the dependencies can yield arbitrary bad performances with respect to the optimum even if it is given arbitrary extra resources. We then design a $(4+\epsilon)$-speed $O(1+1/\epsilon^2)$-competitive algorithm for this setting that consists in 1) splitting evenly the bandwidth among each requested set and in 2) broadcasting arbitrarily the items still missing in each set into the bandwidth the set has received. Our algorithm presents several interesting features: it is simple to implement, non-clairvoyant, fair to users so that no user may starve for a long period of time, and guarantees good performances in presence of correlations between user requests (without any change in the broadcast protocol). We also present a $ (4+\epsilon)$-speed $O(1+1/\epsilon^3)$-competitive algorithm which broadcasts at most one item at any given time and preempts each item broadcast at most once on average. As a side result of our analysis, we design a competitive algorithm for a particular setting of non-clairvoyant job scheduling with dependencies, which might be of independent interest.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 15:00:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Julien", "" ], [ "Schabanel", "Nicolas", "" ] ]
cs/0608015
Sebastian Brand
Sebastian Brand, Roland H. C. Yap
Towards "Propagation = Logic + Control"
15 pages; 22nd International Conference on Logic Programming (ICLP'06)
null
null
null
cs.PL cs.AI
null
Constraint propagation algorithms implement logical inference. For efficiency, it is essential to control whether and in what order basic inference steps are taken. We provide a high-level framework that clearly differentiates between information needed for controlling propagation versus that needed for the logical semantics of complex constraints composed from primitive ones. We argue for the appropriateness of our controlled propagation framework by showing that it captures the underlying principles of manually designed propagation algorithms, such as literal watching for unit clause propagation and the lexicographic ordering constraint. We provide an implementation and benchmark results that demonstrate the practicality and efficiency of our framework.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 02:41:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Brand", "Sebastian", "" ], [ "Yap", "Roland H. C.", "" ] ]
cs/0608016
Sebastian Brand
Gregory J. Duck, Peter J. Stuckey, Sebastian Brand
ACD Term Rewriting
21 pages; 22nd International Conference on Logic Programming (ICLP'06)
null
null
null
cs.PL cs.SC
null
We introduce Associative Commutative Distributive Term Rewriting (ACDTR), a rewriting language for rewriting logical formulae. ACDTR extends AC term rewriting by adding distribution of conjunction over other operators. Conjunction is vital for expressive term rewriting systems since it allows us to require that multiple conditions hold for a term rewriting rule to be used. ACDTR uses the notion of a "conjunctive context", which is the conjunction of constraints that must hold in the context of a term, to enable the programmer to write very expressive and targeted rewriting rules. ACDTR can be seen as a general logic programming language that extends Constraint Handling Rules and AC term rewriting. In this paper we define the semantics of ACDTR and describe our prototype implementation.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 02:55:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Duck", "Gregory J.", "" ], [ "Stuckey", "Peter J.", "" ], [ "Brand", "Sebastian", "" ] ]
cs/0608017
Sebastian Brand
Krzysztof R. Apt, Sebastian Brand
Infinite Qualitative Simulations by Means of Constraint Programming
15 pages; 12th International Conference on Principles and Practice of Constraint Programming (CP'06)
null
null
null
cs.AI cs.LO
null
We introduce a constraint-based framework for studying infinite qualitative simulations concerned with contingencies such as time, space, shape, size, abstracted into a finite set of qualitative relations. To define the simulations, we combine constraints that formalize the background knowledge concerned with qualitative reasoning with appropriate inter-state constraints that are formulated using linear temporal logic. We implemented this approach in a constraint programming system by drawing on ideas from bounded model checking. The resulting system allows us to test and modify the problem specifications in a straightforward way and to combine various knowledge aspects.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 03:08:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Brand", "Sebastian", "" ] ]
cs/0608019
Sebastian Brand
Sebastian Brand
Relation Variables in Qualitative Spatial Reasoning
14 pages; 27th German Conference on Artificial Intelligence (KI'04)
null
null
null
cs.AI
null
We study an alternative to the prevailing approach to modelling qualitative spatial reasoning (QSR) problems as constraint satisfaction problems. In the standard approach, a relation between objects is a constraint whereas in the alternative approach it is a variable. The relation-variable approach greatly simplifies integration and implementation of QSR. To substantiate this point, we discuss several QSR algorithms from the literature which in the relation-variable approach reduce to the customary constraint propagation algorithm enforcing generalised arc-consistency.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 03:24:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Brand", "Sebastian", "" ] ]
cs/0608020
Romain Pechoux
Jean-Yves Marion and Romain Pechoux
Quasi-friendly sup-interpretations
null
null
null
null
cs.CC
null
In a previous paper, the sup-interpretation method was proposed as a new tool to control memory resources of first order functional programs with pattern matching by static analysis. Basically, a sup-interpretation provides an upper bound on the size of function outputs. In this former work, a criterion, which can be applied to terminating as well as non-terminating programs, was developed in order to bound polynomially the stack frame size. In this paper, we suggest a new criterion which captures more algorithms computing values polynomially bounded in the size of the inputs. Since this work is related to quasi-interpretations, we compare the two notions obtaining two main features. The first one is that, given a program, we have heuristics for finding a sup-interpretation when we consider polynomials of bounded degree. The other one consists in the characterizations of the set of function computable in polynomial time and in polynomial space.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 13:05:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Marion", "Jean-Yves", "" ], [ "Pechoux", "Romain", "" ] ]
cs/0608022
Joseph Y. Halpern
Joseph Y. Halpern and Sabina Petride
Expressing Security Properties Using Selective Interleaving Functions
null
null
null
null
cs.CR
null
McLean's notion of Selective Interleaving Functions (SIFs) is perhaps the best-known attempt to construct a framework for expressing various security properties. We examine the expressive power of SIFs carefully. We show that SIFs cannot capture nondeducibility on strategies (NOS). We also prove that the set of security properties expressed with SIFs is not closed under conjunction, from which it follows that separability is strictly stronger than double generalized noninterference. However, we show that if we generalize the notion of SIF in a natural way, then NOS is expressible, and the set of security properties expressible by generalized SIFs is closed under conjunction.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 20:15:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Petride", "Sabina", "" ] ]
cs/0608025
Dinesh Kumar
Dinesh Kumar (INRIA Sophia Antipolis), Eitan Altman (INRIA Sophia Antipolis), Jean-Marc Kelif (INRIA Sophia Antipolis)
User-Network Association in a WLAN-UMTS Hybrid Cell: Global & Individual Optimality
null
null
null
null
cs.NI
null
We study optimal user-network association in an integrated 802.11 WLAN and 3G-UMTS hybrid cell. Assuming saturated resource allocation on the downlink of WLAN and UMTS networks and a single QoS class of mobiles arriving at an average location in the hybrid cell, we formulate the problem with two different approaches: Global and Individual optimality. The Globally optimal association is formulated as an SMDP (Semi Markov Decision Process) connection routing decision problem where rewards comprise a financial gain component and an aggregate network throughput component. The corresponding Dynamic Programming equations are solved using Value Iteration method and a stationary optimal policy with neither convex nor concave type switching curve structure is obtained. Threshold type and symmetric switching curves are observed for the analogous homogenous network cases. The Individual optimality is studied under a non-cooperative dynamic game framework with expected service time of a mobile as the decision cost criteria. It is shown that individual optimality in a WLAN-UMTS hybrid cell, results in a threshold policy curve of descending staircase form with increasing Poisson arrival rate of mobiles.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 11:44:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Dinesh", "", "INRIA Sophia Antipolis" ], [ "Altman", "Eitan", "", "INRIA Sophia\n Antipolis" ], [ "Kelif", "Jean-Marc", "", "INRIA Sophia Antipolis" ] ]