id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-11 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0608026 | Dinesh Kumar | Dinesh Kumar (INRIA Sophia Antipolis), Dhiman Barman, Eitan Altman
(INRIA Sophia Antipolis), Jean-Marc Kelif (FT R&D) | New Cross-Layer Channel Switching Policy for TCP Transmission on 3G UMTS
Downlink | null | null | null | null | cs.NI | null | In 3G UMTS, two main transport channels have been provided for downlink data
transmission: a common FACH channel and a dedicated DCH channel. The
performance of TCP in UMTS depends much on the channel switching policy used.
In this paper, we propose and analyze three new basic threshold-based channel
switching policies for UMTS that we name as QS (Queue Size), FS (Flow Size) and
QSFS (QS & FS combined) policy. These policies significantly improve over a
modified threshold policy in [1] by about 17% in response time metrics. We
further propose and evaluate a new improved switching policy that we call
FS-DCH (at-least flow-size threshold on DCH) policy. This policy is biased
towards short TCP flows of few packets and is thus a cross-layer policy that
improves the performance of TCP by giving priority to the initial few packets
of a flow on the fast DCH channel. Extensive simulation results confirm this
improvement for the case when number of TCP connections is low.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2006 11:53:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kumar",
"Dinesh",
"",
"INRIA Sophia Antipolis"
],
[
"Barman",
"Dhiman",
"",
"INRIA Sophia Antipolis"
],
[
"Altman",
"Eitan",
"",
"INRIA Sophia Antipolis"
],
[
"Kelif",
"Jean-Marc",
"",
"FT R&D"
]
] |
cs/0608027 | Edwin Henneken | E. Henneken, M.J. Kurtz, G. Eichhorn, A. Accomazzi, C.S. Grant, D.
Thompson, E. Bohlen, S.S. Murray | myADS-arXiv - a Tailor-Made, Open Access, Virtual Journal | 4 pages, 2 figures, poster paper to appear in the proceedings of the
LISA V conference | null | null | null | cs.DL astro-ph | null | The myADS-arXiv service provides the scientific community with a one stop
shop for staying up-to-date with a researcher's field of interest. The service
provides a powerful and unique filter on the enormous amount of bibliographic
information added to the ADS on a daily basis. It also provides a complete view
with the most relevant papers available in the subscriber's field of interest.
With this service, the subscriber will get to know the lastest developments,
popular trends and the most important papers. This makes the service not only
unique from a technical point of view, but also from a content point of view.
On this poster we will argue why myADS-arXiv is a tailor-made, open access,
virtual journal and we will illustrate its unique character.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2006 15:23:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henneken",
"E.",
""
],
[
"Kurtz",
"M. J.",
""
],
[
"Eichhorn",
"G.",
""
],
[
"Accomazzi",
"A.",
""
],
[
"Grant",
"C. S.",
""
],
[
"Thompson",
"D.",
""
],
[
"Bohlen",
"E.",
""
],
[
"Murray",
"S. S.",
""
]
] |
cs/0608028 | Joseph Y. Halpern | Joseph Y. Halpern | Using Sets of Probability Measures to Represent Uncertainty | null | null | null | null | cs.AI | null | I explore the use of sets of probability measures as a representation of
uncertainty.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2006 20:26:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0608030 | Ugo Dal Lago | Patrick Baillot, Ugo Dal Lago and Jean-Yves Moyen | On Quasi-Interpretations, Blind Abstractions and Implicit Complexity | 18 pages | null | null | null | cs.PL cs.CC cs.LO | null | Quasi-interpretations are a technique to guarantee complexity bounds on
first-order functional programs: with termination orderings they give in
particular a sufficient condition for a program to be executable in polynomial
time, called here the P-criterion. We study properties of the programs
satisfying the P-criterion, in order to better understand its intensional
expressive power. Given a program on binary lists, its blind abstraction is the
nondeterministic program obtained by replacing lists by their lengths (natural
numbers). A program is blindly polynomial if its blind abstraction terminates
in polynomial time. We show that all programs satisfying a variant of the
P-criterion are in fact blindly polynomial. Then we give two extensions of the
P-criterion: one by relaxing the termination ordering condition, and the other
one (the bounded value property) giving a necessary and sufficient condition
for a program to be polynomial time executable, with memoisation.
| [
{
"version": "v1",
"created": "Sun, 6 Aug 2006 07:20:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baillot",
"Patrick",
""
],
[
"Lago",
"Ugo Dal",
""
],
[
"Moyen",
"Jean-Yves",
""
]
] |
cs/0608031 | Mikio Fujii | Mikio Fujii | Secure Positioning of Mobile Terminals with Simplex Radio Communication | 8 pages, 4 figures | null | null | null | cs.CR | null | With the rapid spread of various mobile terminals in our society, the
importance of secure positioning is growing for wireless networks in
adversarial settings. Recently, several authors have proposed a secure
positioning mechanism of mobile terminals which is based on the geometric
property of wireless node placement, and on the postulate of modern physics
that a propagation speed of information never exceeds the velocity of light. In
particular, they utilize the measurements of the round-trip time of radio
signal propagation and bidirectional communication for variants of the
challenge-and-response. In this paper, we propose a novel means to construct
the above mechanism by use of unidirectional communication instead of
bidirectional communication. Our proposal is based on the assumption that a
mobile terminal incorporates a high-precision inner clock in a tamper-resistant
protected area. In positioning, the mobile terminal uses its inner clock and
the time and location information broadcasted by radio from trusted stations.
Our proposal has a major advantage in protecting the location privacy of mobile
terminal users, because the mobile terminal need not provide any information to
the trusted stations through positioning procedures. Besides, our proposal is
free from the positioning error due to claimant's processing-time fluctuations
in the challenge-and-response, and is well-suited for mobile terminals in the
open air, or on the move at high speed, in terms of practical usage. We analyze
the security, the functionality, and the feasibility of our proposal in
comparison to previous proposals.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2006 05:49:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Mikio",
""
]
] |
cs/0608032 | Harald Zankl | Harald Zankl, Aart Middeldorp | Satisfying KBO Constraints | 15 pages | null | null | null | cs.SC cs.LO | null | This paper presents two new approaches to prove termination of rewrite
systems with the Knuth-Bendix order efficiently. The constraints for the weight
function and for the precedence are encoded in (pseudo-)propositional logic and
the resulting formula is tested for satisfiability. Any satisfying assignment
represents a weight function and a precedence such that the induced
Knuth-Bendix order orients the rules of the encoded rewrite system from left to
right.
| [
{
"version": "v1",
"created": "Sun, 6 Aug 2006 12:42:31 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Apr 2007 08:45:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zankl",
"Harald",
""
],
[
"Middeldorp",
"Aart",
""
]
] |
cs/0608034 | William Yurcik | Aashish Sharma, William Yurcik | Security Assessment of E-Tax Filing Websites | 9 pages | null | null | null | cs.CR | null | Technical security is only part of E-Commerce security operations; human
usability and security perception play major and sometimes dominating factors.
For instance, slick websites with impressive security icons but no real
technical security are often perceived by users to be trustworthy (and thus
more profitable) than plain vanilla websites that use powerful encryption for
transmission and server protection. We study one important type of E-Commerce
transaction website, E-Tax Filing, that is exposed to large populations. We
assess a large number of international (5), Federal (USA), and state E-Tax
filing websites (38) for both technical security protection and human
perception of security. As a result of this assessment, we identify security
best practices across these E-Tax Filing websites and recommend additional
security techniques that have not been found in current use by E-Tax Filing
websites.
| [
{
"version": "v1",
"created": "Sun, 6 Aug 2006 22:56:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sharma",
"Aashish",
""
],
[
"Yurcik",
"William",
""
]
] |
cs/0608036 | Andre Hernich | Andre Hernich, Nicole Schweikardt | Reversal Complexity Revisited | 19 pages, 2 figures | null | null | null | cs.CC | null | We study a generalized version of reversal bounded Turing machines where,
apart from several tapes on which the number of head reversals is bounded by
r(n), there are several further tapes on which head reversals remain
unrestricted, but size is bounded by s(n). Recently, such machines were
introduced as a formalization of a computation model that restricts random
access to external memory and internal memory space. Here, each of the tapes
with a restriction on the head reversals corresponds to an external memory
device, and the tapes of restricted size model internal memory. We use
ST(r(n),s(n),O(1)) to denote the class of all problems that can be solved by
deterministic Turing machines that comply to the above resource bounds.
Similarly, NST and RST, respectively, are used for the corresponding
nondeterministic and randomized classes.
While previous papers focused on lower bounds for particular problems,
including sorting, the set equality problem, and several query evaluation
problems, the present paper addresses the relations between the (R,N)ST-classes
and classical complexity classes and investigates the structural complexity of
the (R,N)ST-classes. Our main results are (1) a trade-off between internal
memory space and external memory head reversals, (2) correspondences between
the (R,N)ST-classes and ``classical'' time-bounded, space-bounded,
reversal-bounded, and circuit complexity classes, and (3) hierarchies of
(R)ST-classes in terms of increasing numbers of head reversals on external
memory tapes.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2006 11:37:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hernich",
"Andre",
""
],
[
"Schweikardt",
"Nicole",
""
]
] |
cs/0608038 | Joachim Wehler | Joachim Wehler | Morphisms of Coloured Petri Nets | null | null | null | null | cs.SE | null | We introduce the concept of a morphism between coloured nets. Our definition
generalizes Petris definition for ordinary nets. A morphism of coloured nets
maps the topological space of the underlying undirected net as well as the
kernel and cokernel of the incidence map. The kernel are flows along the
transition-bordered fibres of the morphism, the cokernel are classes of
markings of the place-bordered fibres. The attachment of bindings, colours,
flows and marking classes to a subnet is formalized by using concepts from
sheaf theory. A coloured net is a sheaf-cosheaf pair over a Petri space and a
morphism between coloured nets is a morphism between such pairs. Coloured nets
and their morphisms form a category. We prove the existence of a product in the
subcategory of sort-respecting morphisms. After introducing markings our
concepts generalize to coloured Petri nets.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2006 19:03:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wehler",
"Joachim",
""
]
] |
cs/0608039 | Norman Danner | Norman Danner and Chris Pollett | The weak pigeonhole principle for function classes in S^1_2 | 11 pages | Mathematical Logic Quarterly 52(6):575-584, 2006 | 10.1002/malq.200610015 | null | cs.LO | null | It is well known that S^1_2 cannot prove the injective weak pigeonhole
principle for polynomial time functions unless RSA is insecure. In this note we
investigate the provability of the surjective (dual) weak pigeonhole principle
in S^1_2 for provably weaker function classes.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2006 19:44:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Danner",
"Norman",
""
],
[
"Pollett",
"Chris",
""
]
] |
cs/0608040 | Patrick Baillot | Patrick Baillot (LIPN), Marco Pedicini | An Embedding of the BSS Model of Computation in Light Affine
Lambda-Calculus | 11 pages. A preliminary version appeared as Research Report IAC CNR
Roma, N.57 (11/2004), november 2004 | 8th International Workshop on Logic and Computational Complexity
Seattle, August 10 - 11, 2006 (Satellite Workshop of FLOC-LICS 2006),
\'{E}tats-Unis d'Am\'{e}rique (2006) | null | null | cs.LO | null | This paper brings together two lines of research: implicit characterization
of complexity classes by Linear Logic (LL) on the one hand, and computation
over an arbitrary ring in the Blum-Shub-Smale (BSS) model on the other. Given a
fixed ring structure K we define an extension of Terui's light affine
lambda-calculus typed in LAL (Light Affine Logic) with a basic type for K. We
show that this calculus captures the polynomial time function class FP(K):
every typed term can be evaluated in polynomial time and conversely every
polynomial time BSS machine over K can be simulated in this calculus.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2006 07:13:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baillot",
"Patrick",
"",
"LIPN"
],
[
"Pedicini",
"Marco",
""
]
] |
cs/0608041 | Igor Sobrado | Igor Sobrado and Dave Uhring | The Dynamics of A Self-Forming Network | 5 pages; 8 figures; 2 tables | null | null | null | cs.NI | null | This article describes our strategy for deploying self-forming ad hoc
networks based on the Internet Protocol version 6 and evaluates the dynamics of
this proposal. Among others, we suggest a technique called adaptive routing
that provides secure intelligent routing capabilities to computer communication
networks. This technique uses the flow label, supports hybrid metrics, network
load sharing, and is not restricted to evaluation of performance on first hop
routers when making routing decisions. Selective anycasting is an extension to
the anycast addressing model that supports exclusion of members of groups that
perform poorly or inappropriately on a per-host basis. Distributed name lookup
is suggested for integrating self-forming and global networks where they
coexist. At last, we pose an address hierarchy to support unmanaged discovery
of services in unknown networks.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2006 16:33:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sobrado",
"Igor",
""
],
[
"Uhring",
"Dave",
""
]
] |
cs/0608043 | Babajide Afolabi | Babajide Afolabi (LORIA), Odile Thiery (LORIA) | Using Users' Expectations to Adapt Business Intelligence Systems | null | Advances in Knowledge Organization 10 (2006) 247-254 | null | null | cs.IR | null | This paper takes a look at the general characteristics of business or
economic intelligence system. The role of the user within this type of system
is emphasized. We propose two models which we consider important in order to
adapt this system to the user. The first model is based on the definition of
decisional problem and the second on the four cognitive phases of human
learning. We also describe the application domain we are using to test these
models in this type of system.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2006 13:19:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Afolabi",
"Babajide",
"",
"LORIA"
],
[
"Thiery",
"Odile",
"",
"LORIA"
]
] |
cs/0608045 | Fotis Georgatos Drs | Giannis Kouretis, Fotis Georgatos | LiveWN, cpu scavenging in the Grid Era | 4 pages | null | null | null | cs.DC cs.NI | null | The goal of this research is to introduce an easy and versatile way to
provide and use Grid resources without the need of any OS installation or
middleware configuration. At the same time we provide an excellent training
tool for newer Grid users and people that want to experiment, without enforcing
any installation. We have been testing it thoroughly under different
circumstances with firm success.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2006 15:28:53 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Aug 2006 22:13:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kouretis",
"Giannis",
""
],
[
"Georgatos",
"Fotis",
""
]
] |
cs/0608051 | Marco Maggesi | Andr\'e Hirschowitz, Marco Maggesi | Modules over Monads and Linearity | 15 pages, too many changes to be summarized | null | null | null | cs.LO cs.PL | null | Inspired by the classical theory of modules over a monoid, we give a first
account of the natural notion of module over a monad. The associated notion of
morphism of left modules ("Linear" natural transformations) captures an
important property of compatibility with substitution, in the heterogeneous
case where "terms" and variables therein could be of different types as well as
in the homogeneous case. In this paper, we present basic constructions of
modules and we show examples concerning in particular abstract syntax and
lambda-calculus.
| [
{
"version": "v1",
"created": "Fri, 11 Aug 2006 15:05:27 GMT"
},
{
"version": "v2",
"created": "Mon, 7 May 2007 10:52:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hirschowitz",
"André",
""
],
[
"Maggesi",
"Marco",
""
]
] |
cs/0608053 | Susan Coppersmith | S.N. Coppersmith | Renormalization group approach to the P versus NP question | Original version had a conjecture that is known to be false. Revised
version corrects this error | null | null | null | cs.CC cond-mat.stat-mech | null | This paper argues that the ideas underlying the renormalization group
technique used to characterize phase transitions in condensed matter systems
could be useful for distinguishing computational complexity classes. The paper
presents a renormalization group transformation that maps an arbitrary Boolean
function of $N$ Boolean variables to one of $N-1$ variables. When this
transformation is applied repeatedly, the behavior of the resulting sequence of
functions is different for a generic Boolean function than for Boolean
functions that can be written as a polynomial of degree $\xi$ with $\xi \ll N$
as well as for functions that depend on composite variables such as the
arithmetic sum of the inputs. Being able to demonstrate that functions are
non-generic is of interest because it suggests an avenue for constructing an
algorithm capable of demonstrating that a given Boolean function cannot be
computed using resources that are bounded by a polynomial of $N$.
| [
{
"version": "v1",
"created": "Fri, 11 Aug 2006 17:48:42 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Oct 2006 15:37:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Coppersmith",
"S. N.",
""
]
] |
cs/0608055 | Hao Chen | Hao Chen | MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves | null | null | null | null | cs.CR | null | For a secret sharing scheme, two parameters $d_{min}$ and $d_{cheat}$ are
defined in [12] and [13]. These two parameters measure the error-correcting
capability and the secret-recovering capability of the secret sharing scheme
against cheaters. Some general properties of the parameters have been studied
in [12,[9] and [13]. The MDS secret-sharing scheme was defined in [12] and it
is proved that MDS perfect secret sharing scheme can be constructed for any
monotone access structure. The famous Shamir $(k,n)$ threshold secret sharing
scheme is the MDS with $d_{min}=d_{cheat}=n-k+1$. In [3] we proposed the linear
secret sharing scheme from algebraic-geometric codes. In this paper the linear
secret sharing scheme from AG-codes on elliptic curves is studied and it is
shown that many of them are MDS linear secret sharing scheme.
| [
{
"version": "v1",
"created": "Mon, 14 Aug 2006 01:49:34 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Sep 2006 03:59:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Hao",
""
]
] |
cs/0608063 | Sylvain Pion | Sylvain Pion (INRIA Sophia Antipolis), Andreas Fabri | A Generic Lazy Evaluation Scheme for Exact Geometric Computations | null | null | null | null | cs.CG cs.PF | null | We present a generic C++ design to perform efficient and exact geometric
computations using lazy evaluations. Exact geometric computations are critical
for the robustness of geometric algorithms. Their efficiency is also critical
for most applications, hence the need for delaying the exact computations at
run time until they are actually needed. Our approach is generic and extensible
in the sense that it is possible to make it a library which users can extend to
their own geometric objects or primitives. It involves techniques such as
generic functor adaptors, dynamic polymorphism, reference counting for the
management of directed acyclic graphs and exception handling for detecting
cases where exact computations are needed. It also relies on multiple precision
arithmetic as well as interval arithmetic. We apply our approach to the whole
geometric kernel of CGAL.
| [
{
"version": "v1",
"created": "Tue, 15 Aug 2006 19:24:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pion",
"Sylvain",
"",
"INRIA Sophia Antipolis"
],
[
"Fabri",
"Andreas",
""
]
] |
cs/0608065 | Edita Pelantova | Lubom\'ira Balkov\'a, Edita Pelantov\'a, and Ond\v{r}ej Turek | Combinatorial and Arithmetical Properties of Infinite Words Associated
with Non-simple Quadratic Parry Numbers | 15 pages | null | null | null | cs.DM | null | We study arithmetical and combinatorial properties of $\beta$-integers for
$\beta$ being the root of the equation $x^2=mx-n, m,n \in \mathbb N, m \geq
n+2\geq 3$. We determine with the accuracy of $\pm 1$ the maximal number of
$\beta$-fractional positions, which may arise as a result of addition of two
$\beta$-integers. For the infinite word $u_\beta$ coding distances between
consecutive $\beta$-integers, we determine precisely also the balance. The word
$u_\beta$ is the fixed point of the morphism $A \to A^{m-1}B$ and $B\to
A^{m-n-1}B$. In the case $n=1$ the corresponding infinite word $u_\beta$ is
sturmian and therefore 1-balanced. On the simplest non-sturmian example with
$n\geq 2$, we illustrate how closely the balance and arithmetical properties of
$\beta$-integers are related.
| [
{
"version": "v1",
"created": "Wed, 16 Aug 2006 09:39:01 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Aug 2006 10:08:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Balková",
"Lubomíra",
""
],
[
"Pelantová",
"Edita",
""
],
[
"Turek",
"Ondřej",
""
]
] |
cs/0608066 | Mariano Zelke | Mariano Zelke | k-Connectivity in the Semi-Streaming Model | 13 pages, submitted to Theoretical Computer Science | null | null | null | cs.DM cs.DS | null | We present the first semi-streaming algorithms to determine k-connectivity of
an undirected graph with k being any constant. The semi-streaming model for
graph algorithms was introduced by Muthukrishnan in 2003 and turns out to be
useful when dealing with massive graphs streamed in from an external storage
device.
Our two semi-streaming algorithms each compute a sparse subgraph of an input
graph G and can use this subgraph in a postprocessing step to decide
k-connectivity of G. To this end the first algorithm reads the input stream
only once and uses time O(k^2*n) to process each input edge. The second
algorithm reads the input k+1 times and needs time O(k+alpha(n)) per input
edge. Using its constructed subgraph the second algorithm can also generate all
l-separators of the input graph for all l<k.
| [
{
"version": "v1",
"created": "Wed, 16 Aug 2006 10:37:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zelke",
"Mariano",
""
]
] |
cs/0608067 | Tetsushi Matsui | Tetsushi Matsui | On Polynomial Time Computable Numbers | 19 pages | null | null | null | cs.CC | null | It will be shown that the polynomial time computable numbers form a field,
and especially an algebraically closed field.
| [
{
"version": "v1",
"created": "Wed, 16 Aug 2006 15:26:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Matsui",
"Tetsushi",
""
]
] |
cs/0608073 | Leonid Litinskii | Leonid B. Litinskii | Parametrical Neural Networks and Some Other Similar Architectures | 15 pages, 2 figures, accepted for publication in "Optical Memory &
Neural Networks" (2006) | null | null | null | cs.CV cs.NE | null | A review of works on associative neural networks accomplished during last
four years in the Institute of Optical Neural Technologies RAS is given. The
presentation is based on description of parametrical neural networks (PNN). For
today PNN have record recognizing characteristics (storage capacity, noise
immunity and speed of operation). Presentation of basic ideas and principles is
accentuated.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2006 08:28:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Litinskii",
"Leonid B.",
""
]
] |
cs/0608075 | Jean-Philippe Diguet | Nader Ben Amor (LESTER, CES), Yannick Le Moullec (LESTER),
Jean-Philippe Diguet (LESTER), Jean Luc Philippe (LESTER), Mohamed Abid (CES) | Design of multimedia processor based on metric computation | null | Advances in Engineering Software (Elsevier) Vol.36 No.7 (2005)
448-458 | 10.1016/j.advengsoft.2005.01.010 | null | cs.AR | null | Media-processing applications, such as signal processing, 2D and 3D graphics
rendering, and image compression, are the dominant workloads in many embedded
systems today. The real-time constraints of those media applications have
taxing demands on today's processor performances with low cost, low power and
reduced design delay. To satisfy those challenges, a fast and efficient
strategy consists in upgrading a low cost general purpose processor core. This
approach is based on the personalization of a general RISC processor core
according the target multimedia application requirements. Thus, if the extra
cost is justified, the general purpose processor GPP core can be enforced with
instruction level coprocessors, coarse grain dedicated hardware, ad hoc
memories or new GPP cores. In this way the final design solution is tailored to
the application requirements. The proposed approach is based on three main
steps: the first one is the analysis of the targeted application using
efficient metrics. The second step is the selection of the appropriate
architecture template according to the first step results and recommendations.
The third step is the architecture generation. This approach is experimented
using various image and video algorithms showing its feasibility.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2006 13:12:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amor",
"Nader Ben",
"",
"LESTER, CES"
],
[
"Moullec",
"Yannick Le",
"",
"LESTER"
],
[
"Diguet",
"Jean-Philippe",
"",
"LESTER"
],
[
"Philippe",
"Jean Luc",
"",
"LESTER"
],
[
"Abid",
"Mohamed",
"",
"CES"
]
] |
cs/0608076 | J\"urg Wullschleger | J\"urg Wullschleger | Oblivious-Transfer Amplification | PhD thesis, March 2007, ETH Zurich, 125 pages. Full version of the
EUROCRYPT 2007 paper. Errors in the computational part corrected | null | null | null | cs.CR | null | Oblivious transfer is a primitive of paramount importance in cryptography or,
more precisely, two- and multi-party computation due to its universality.
Unfortunately, oblivious transfer cannot be achieved in an unconditionally
secure way for both parties from scratch. Therefore, it is a natural question
what information-theoretic primitives or computational assumptions oblivious
transfer can be based on.
The results in our thesis are threefold. First, we present a protocol that
implements oblivious transfer from a weakened oblivious transfer called
universal oblivious transfer, where one of the two players may get additional
information. Our reduction is about twice as efficient as previous results.
Weak oblivious transfer is an even weaker form of oblivious transfer, where
both players may obtain additional information about the other player's input,
and where the output can contain errors. We give a new, weaker definition of
weak oblivious transfer, as well as new reductions with a more detailed
analysis.
Finally, we carry over our results to the computational setting and show how
a weak oblivious transfer that is sometimes incorrect and only mildly secure
against computationally bounded adversaries can be strengthened.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2006 15:58:23 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Nov 2006 20:24:27 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Apr 2007 21:47:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wullschleger",
"Jürg",
""
]
] |
cs/0608077 | Vinay Kolar | Vinay Kolar and Nael Abu-Ghazaleh | The Effect of Scheduling on Link Capacity in Multi-hopWireless Networks | 11 pages | null | null | null | cs.NI cs.AR cs.PF | null | Existing models of Multi-Hop Wireless Networks (MHWNs) assume that
interference estimators of link quality such as observed busy time predict the
capacity of the links. We show that these estimators do not capture the
intricate interactions that occur at the scheduling level, which have a large
impact on effective link capacity under contention based MAC protocols. We
observe that scheduling problems arise only among those interfering sources
whose concurrent transmissions cannot be prevented by the MAC protocol's
collision management mechanisms; other interfering sources can arbitrate the
medium and coexist successfully. Based on this observation, we propose a
methodology for rating links and show that it achieves high correlation with
observed behavior in simulation. We then use this rating as part of a
branch-and-bound framework based on a linear programming formulation for
traffic engineering in static MHWNs and show that it achieves considerable
improvement in performance relative to interference based models.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2006 16:45:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kolar",
"Vinay",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
] |
cs/0608078 | Aidan Thompson | A. Slepoy, A. P. Thompson, M. D. Peters | Searching for Globally Optimal Functional Forms for Inter-Atomic
Potentials Using Parallel Tempering and Genetic Programming | null | null | null | null | cs.NE cs.AI | null | We develop a Genetic Programming-based methodology that enables discovery of
novel functional forms for classical inter-atomic force-fields, used in
molecular dynamics simulations. Unlike previous efforts in the field, that fit
only the parameters to the fixed functional forms, we instead use a novel
algorithm to search the space of many possible functional forms. While a
follow-on practical procedure will use experimental and {\it ab inito} data to
find an optimal functional form for a forcefield, we first validate the
approach using a manufactured solution. This validation has the advantage of a
well-defined metric of success. We manufactured a training set of atomic
coordinate data with an associated set of global energies using the well-known
Lennard-Jones inter-atomic potential. We performed an automatic functional form
fitting procedure starting with a population of random functions, using a
genetic programming functional formulation, and a parallel tempering
Metropolis-based optimization algorithm. Our massively-parallel method
independently discovered the Lennard-Jones function after searching for several
hours on 100 processors and covering a miniscule portion of the configuration
space. We find that the method is suitable for unsupervised discovery of
functional forms for inter-atomic potentials/force-fields. We also find that
our parallel tempering Metropolis-based approach significantly improves the
optimization convergence time, and takes good advantage of the parallel cluster
architecture.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2006 23:17:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slepoy",
"A.",
""
],
[
"Thompson",
"A. P.",
""
],
[
"Peters",
"M. D.",
""
]
] |
cs/0608079 | Anna Gilbert | A. C. Gilbert, M. J. Strauss, J. A. Tropp, and R. Vershynin | Algorithmic linear dimension reduction in the l_1 norm for sparse
vectors | null | null | null | null | cs.DS | null | This paper develops a new method for recovering m-sparse signals that is
simultaneously uniform and quick. We present a reconstruction algorithm whose
run time, O(m log^2(m) log^2(d)), is sublinear in the length d of the signal.
The reconstruction error is within a logarithmic factor (in m) of the optimal
m-term approximation error in l_1. In particular, the algorithm recovers
m-sparse signals perfectly and noisy signals are recovered with polylogarithmic
distortion. Our algorithm makes O(m log^2 (d)) measurements, which is within a
logarithmic factor of optimal. We also present a small-space implementation of
the algorithm. These sketching techniques and the corresponding reconstruction
algorithms provide an algorithmic dimension reduction in the l_1 norm. In
particular, vectors of support m in dimension d can be linearly embedded into
O(m log^2 d) dimensions with polylogarithmic distortion. We can reconstruct a
vector from its low-dimensional sketch in time O(m log^2(m) log^2(d)).
Furthermore, this reconstruction is stable and robust under small
perturbations.
| [
{
"version": "v1",
"created": "Sat, 19 Aug 2006 01:55:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gilbert",
"A. C.",
""
],
[
"Strauss",
"M. J.",
""
],
[
"Tropp",
"J. A.",
""
],
[
"Vershynin",
"R.",
""
]
] |
cs/0608080 | Hao Chen | Hao Chen and Jianhua Li | Lower Bounds on the Algebraic Immunity of Boolean Functions | null | null | null | null | cs.CR | null | From the motivation of algebraic attacks to stream and block
ciphers([1,2,7,13,14,15]), the concept of {\em algebraic immunity} (AI) was
introduced in [21] and studied in [3,5,10,11,17,18,19,20,21]. High algebraic
immunity is a necessary condition for resisting algebraic attacks. In this
paper, we give some lower bounds on algebraic immunity of Boolean functions.
The results are applied to give lower bounds on AI of symmetric Boolean
functions and rotation symmetric Boolean functions. Some balanced rotation
symmetric Boolean functions with their AI near the maximum possible value
$\lceil \frac{n}{2}\rceil$ are constructed.
| [
{
"version": "v1",
"created": "Sat, 19 Aug 2006 02:46:28 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Aug 2006 02:59:30 GMT"
},
{
"version": "v3",
"created": "Sun, 3 Sep 2006 02:47:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Hao",
""
],
[
"Li",
"Jianhua",
""
]
] |
cs/0608082 | S. M. Nazrul Alam | S. M. Nazrul Alam and Peter Marbach | Competition and Request Routing Policies in Content Delivery Networks | null | null | null | null | cs.NI | null | The role of competition and monetary benefits in the design of Content
Delivery Networks (CDNs) is largely an unexplored area. In this paper, we
investigate the effect of competition among the competitive web based CDNs and
show that little difference in their performance may cause significant
financial gain/loss. It turns out that the economy of scale effect is very
significant for the success of a CDN in a competitive market. So CDN peering
might be a good idea. Since performance and conforming to the service level
agreement (SLA) with content providers is very important, we then focus on
designing CDN from this perspective. We provide an asymptotically optimal
static request routing policy for a CDN under a model where a CDN company
guarantees a certain level of user latency to the content providers in the SLA.
| [
{
"version": "v1",
"created": "Sun, 20 Aug 2006 04:00:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alam",
"S. M. Nazrul",
""
],
[
"Marbach",
"Peter",
""
]
] |
cs/0608083 | Paul M. Aoki | Paul M. Aoki, Margaret H. Szymanski, Luke Plurkowski, James D.
Thornton, Allison Woodruff, Weilie Yi | Where's the "Party" in "Multi-Party"? Analyzing the Structure of
Small-Group Sociable Talk | 10 pages | Proc. ACM Conf. on Computer Supported Cooperative Work, Banff,
Alberta, Canada, Nov. 2006, 393-402. ACM Press. | 10.1145/1180875.1180934 | null | cs.HC | null | Spontaneous multi-party interaction - conversation among groups of three or
more participants - is part of daily life. While automated modeling of such
interactions has received increased attention in ubiquitous computing research,
there is little applied research on the organization of this highly dynamic and
spontaneous sociable interaction within small groups. We report here on an
applied conversation analytic study of small-group sociable talk, emphasizing
structural and temporal aspects that can inform computational models. In
particular, we examine the mechanics of multiple simultaneous conversational
floors - how participants initiate a new floor amidst an on-going floor, and
how they subsequently show their affiliation with one floor over another. We
also discuss the implications of these findings for the design of "smart"
multi-party applications.
| [
{
"version": "v1",
"created": "Mon, 21 Aug 2006 01:42:52 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Sep 2006 03:57:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aoki",
"Paul M.",
""
],
[
"Szymanski",
"Margaret H.",
""
],
[
"Plurkowski",
"Luke",
""
],
[
"Thornton",
"James D.",
""
],
[
"Woodruff",
"Allison",
""
],
[
"Yi",
"Weilie",
""
]
] |
cs/0608084 | James Aspnes | Dana Angluin and James Aspnes and David Eisenstat and Eric Ruppert | The computational power of population protocols | Combined version of OPODIS 2005 and PODC 2006 papers; submitted to
Distributed Computing | null | null | null | cs.CC cs.DC | null | We consider the model of population protocols introduced by Angluin et al.,
in which anonymous finite-state agents stably compute a predicate of the
multiset of their inputs via two-way interactions in the all-pairs family of
communication networks. We prove that all predicates stably computable in this
model (and certain generalizations of it) are semilinear, answering a central
open question about the power of the model. Removing the assumption of two-way
interaction, we also consider several variants of the model in which agents
communicate by anonymous message-passing where the recipient of each message is
chosen by an adversary and the sender is not identified to the recipient. These
one-way models are distinguished by whether messages are delivered immediately
or after a delay, whether a sender can record that it has sent a message, and
whether a recipient can queue incoming messages, refusing to accept new
messages until it has had a chance to send out messages of its own. We
characterize the classes of predicates stably computable in each of these
one-way models using natural subclasses of the semilinear predicates.
| [
{
"version": "v1",
"created": "Mon, 21 Aug 2006 23:17:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Angluin",
"Dana",
""
],
[
"Aspnes",
"James",
""
],
[
"Eisenstat",
"David",
""
],
[
"Ruppert",
"Eric",
""
]
] |
cs/0608088 | Petter Holme | Petter Holme, Josh Karlin, Stephanie Forrest | Radial Structure of the Internet | null | Proc. R. Soc. A 463, (2007) 1231-1246 | 10.1098/rspa.2007.1820 | null | cs.NI physics.soc-ph | null | The structure of the Internet at the Autonomous System (AS) level has been
studied by both the Physics and Computer Science communities. We extend this
work to include features of the core and the periphery, taking a radial
perspective on AS network structure. New methods for plotting AS data are
described, and they are used to analyze data sets that have been extended to
contain edges missing from earlier collections. In particular, the average
distance from one vertex to the rest of the network is used as the baseline
metric for investigating radial structure. Common vertex-specific quantities
are plotted against this metric to reveal distinctive characteristics of
central and peripheral vertices. Two data sets are analyzed using these
measures as well as two common generative models (Barabasi-Albert and Inet). We
find a clear distinction between the highly connected core and a sparse
periphery. We also find that the periphery has a more complex structure than
that predicted by degree distribution or the two generative models.
| [
{
"version": "v1",
"created": "Tue, 22 Aug 2006 22:33:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Holme",
"Petter",
""
],
[
"Karlin",
"Josh",
""
],
[
"Forrest",
"Stephanie",
""
]
] |
cs/0608091 | Jan Van den Bussche | Floris Geerts, Peter Revesz, Jan Van den Bussche | On-line topological simplification of weighted graphs | This is the full techreport corresponding to the paper "On-line
maintenance of simplified weighted graphs for efficient distance queries" in
the proceedings of ACM-GIS 2006 | Proceedings ACM-GIS 2006, ACM Press | null | null | cs.DS cs.DB | null | We describe two efficient on-line algorithms to simplify weighted graphs by
eliminating degree-two vertices. Our algorithms are on-line in that they react
to updates on the data, keeping the simplification up-to-date. The supported
updates are insertions of vertices and edges; hence, our algorithms are
partially dynamic. We provide both analytical and empirical evaluations of the
efficiency of our approaches. Specifically, we prove an O(log n) upper bound on
the amortized time complexity of our maintenance algorithms, with n the number
of insertions.
| [
{
"version": "v1",
"created": "Wed, 23 Aug 2006 20:08:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Geerts",
"Floris",
""
],
[
"Revesz",
"Peter",
""
],
[
"Bussche",
"Jan Van den",
""
]
] |
cs/0608092 | Danny Dolev | Ariel Daliot and Danny Dolev | Self-Stabilizing Byzantine Pulse Synchronization | An updated version. The original version appeared as TR-2005-84, The
Hebrew university, Aug. 2005 | null | null | TR-2005-84 | cs.DC | null | The ``Pulse Synchronization'' problem can be loosely described as targeting
to invoke a recurring distributed event as simultaneously as possible at the
different nodes and with a frequency that is as regular as possible. This
target becomes surprisingly subtle and difficult to achieve when facing both
transient and permanent failures. In this paper we present an algorithm for
pulse synchronization that self-stabilizes while at the same time tolerating a
permanent presence of Byzantine faults. The Byzantine nodes might incessantly
try to de-synchronize the correct nodes. Transient failures might throw the
system into an arbitrary state in which correct nodes have no common notion
what-so-ever, such as time or round numbers, and can thus not infer anything
from their own local states upon the state of other correct nodes. The
presented algorithm grants nodes the ability to infer that eventually all
correct nodes will invoke their pulses within a very short time interval of
each other and will do so regularly.
Pulse synchronization has previously been shown to be a powerful tool for
designing general self-stabilizing Byzantine algorithms and is hitherto the
only method that provides for the general design of efficient practical
protocols in the confluence of these two fault models. The difficulty, in
general, to design any algorithm in this fault model may be indicated by the
remarkably few algorithms resilient to both fault models. The few published
self-stabilizing Byzantine algorithms are typically complicated and sometimes
converge from an arbitrary initial state only after exponential or super
exponential time.
| [
{
"version": "v1",
"created": "Thu, 24 Aug 2006 16:07:07 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Aug 2006 03:24:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daliot",
"Ariel",
""
],
[
"Dolev",
"Danny",
""
]
] |
cs/0608093 | Alexander Evako | Alexander Evako | Connection between continuous and digital n-manifolds and the Poincare
conjecture | 39 pages, 26 figures | null | null | null | cs.DM cs.CV math.AT | null | We introduce LCL covers of closed n-dimensional manifolds by n-dimensional
disks and study their properties. We show that any LCL cover of an
n-dimensional sphere can be converted to the minimal LCL cover, which consists
of 2n+2 disks. We prove that an LCL collection of n-disks is a cover of a
continuous n-sphere if and only if the intersection graph of this collection is
a digital n-sphere. Using a link between LCL covers of closed continuous
n-manifolds and digital n-manifolds, we find conditions where a continuous
closed three-dimensional manifold is the three-dimensional sphere. We discuss a
connection between the classification problems for closed continuous
three-dimensional manifolds and digital three-manifolds.
| [
{
"version": "v1",
"created": "Thu, 24 Aug 2006 17:45:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Evako",
"Alexander",
""
]
] |
cs/0608096 | Danny Dolev | Ariel Daliot, Danny Dolev and Hanna Parnas | Linear-time Self-stabilizing Byzantine Clock Synchronization | This is a corrected version. The original paper appeared in OPODIS'03 | Proc. of 7th International Conference on Principles of Distributed
Systems (OPODIS'03 La Martinique, France), December, 2003 | null | null | cs.DC | null | Clock synchronization is a very fundamental task in distributed system. It
thus makes sense to require an underlying clock synchronization mechanism to be
highly fault-tolerant. A self-stabilizing algorithm seeks to attain
synchronization once lost; a Byzantine algorithm assumes synchronization is
never lost and focuses on containing the influence of the permanent presence of
faulty nodes. There are efficient self-stabilizing solutions for clock
synchronization as well as efficient solutions that are resilient to Byzantine
faults. In contrast, to the best of our knowledge there is no practical
solution that is self-stabilizing while tolerating the permanent presence of
Byzantine nodes. We present the first linear-time self-stabilizing Byzantine
clock synchronization algorithm. Our deterministic clock synchronization
algorithm is based on the observation that all clock synchronization algorithms
require events for exchanging clock values and re-synchronizing the clocks to
within safe bounds. These events usually need to happen synchronously at the
different nodes. In classic Byzantine algorithms this is fulfilled or aided by
having the clocks initially close to each other and thus the actual clock
values can be used for synchronizing the events. This implies that clock values
cannot differ arbitrarily, which necessarily renders these solutions to be
non-stabilizing. Our scheme suggests using an underlying distributed pulse
synchronization module that is uncorrelated to the clock values.
| [
{
"version": "v1",
"created": "Fri, 25 Aug 2006 03:11:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daliot",
"Ariel",
""
],
[
"Dolev",
"Danny",
""
],
[
"Parnas",
"Hanna",
""
]
] |
cs/0608098 | Arvind Parthasarathy | Arvind Parthasarathy | Improved Content Based Image Watermarking | 24 pages | null | null | null | cs.CR | null | This paper presents a robust and transparent scheme of watermarking that
exploits the human visual systems' sensitivity to frequency, along with local
image characteristics obtained from the spatial domain. The underlying idea is
generating a visual mask based on the visual systems' perception of image
content. This mask is used to embed a decimal sequence while keeping its
amplitude below the distortion sensitivity of the image pixel. We consider
texture, luminance, corner and the edge information in the image to generate a
mask that makes the addition of the watermark imperceptible to the human eye.
| [
{
"version": "v1",
"created": "Fri, 25 Aug 2006 12:55:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Parthasarathy",
"Arvind",
""
]
] |
cs/0608099 | Tomi Janhunen | Tomi Janhunen and Emilia Oikarinen | Automated verification of weak equivalence within the SMODELS system | 48 pages, 7 figures, 2 tables | null | null | null | cs.AI cs.LO | null | In answer set programming (ASP), a problem at hand is solved by (i) writing a
logic program whose answer sets correspond to the solutions of the problem, and
by (ii) computing the answer sets of the program using an answer set solver as
a search engine. Typically, a programmer creates a series of gradually
improving logic programs for a particular problem when optimizing program
length and execution time on a particular solver. This leads the programmer to
a meta-level problem of ensuring that the programs are equivalent, i.e., they
give rise to the same answer sets. To ease answer set programming at
methodological level, we propose a translation-based method for verifying the
equivalence of logic programs. The basic idea is to translate logic programs P
and Q under consideration into a single logic program EQT(P,Q) whose answer
sets (if such exist) yield counter-examples to the equivalence of P and Q. The
method is developed here in a slightly more general setting by taking the
visibility of atoms properly into account when comparing answer sets. The
translation-based approach presented in the paper has been implemented as a
translator called lpeq that enables the verification of weak equivalence within
the smodels system using the same search engine as for the search of models.
Our experiments with lpeq and smodels suggest that establishing the equivalence
of logic programs in this way is in certain cases much faster than naive
cross-checking of answer sets.
| [
{
"version": "v1",
"created": "Fri, 25 Aug 2006 13:12:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Janhunen",
"Tomi",
""
],
[
"Oikarinen",
"Emilia",
""
]
] |
cs/0608101 | Gregory Gutin | G. Gutin, A. Rafiey, A. Yeo | Minimum Cost Homomorphisms to Semicomplete Bipartite Digraphs | null | null | null | null | cs.DM cs.CC | null | For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a homomorphism of
$D$ to $H$ if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ If, moreover, each
vertex $u \in V(D)$ is associated with costs $c_i(u), i \in V(H)$, then the
cost of the homomorphism $f$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. For each fixed
digraph $H$, we have the {\em minimum cost homomorphism problem for} $H$. The
problem is to decide, for an input graph $D$ with costs $c_i(u),$ $u \in V(D),
i\in V(H)$, whether there exists a homomorphism of $D$ to $H$ and, if one
exists, to find one of minimum cost. Minimum cost homomorphism problems
encompass (or are related to) many well studied optimization problems. We
describe a dichotomy of the minimum cost homomorphism problem for semicomplete
multipartite digraphs $H$. This solves an open problem from an earlier paper.
To obtain the dichotomy of this paper, we introduce and study a new notion, a
$k$-Min-Max ordering of digraphs.
| [
{
"version": "v1",
"created": "Fri, 25 Aug 2006 17:47:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
] |
cs/0608102 | Jochen Mundinger | Jochen Mundinger, Jean-Yves Le Boudec | Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars | 17 pages, 6 figures | null | null | LCA-REPORT-2006-009 | cs.PF | null | The application of decentralized reputation systems is a promising approach
to ensure cooperation and fairness, as well as to address random failures and
malicious attacks in Mobile Ad-Hoc Networks. However, they are potentially
vulnerable to liars. With our work, we provide a first step to analyzing
robustness of a reputation system based on a deviation test. Using a mean-field
approach to our stochastic process model, we show that liars have no impact
unless their number exceeds a certain threshold (phase transition). We give
precise formulae for the critical values and thus provide guidelines for an
optimal choice of parameters.
| [
{
"version": "v1",
"created": "Fri, 25 Aug 2006 18:12:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mundinger",
"Jochen",
""
],
[
"Boudec",
"Jean-Yves Le",
""
]
] |
cs/0608103 | Miroslaw Truszczynski | V.W. Marek, I. Niemela and M. Truszczynski] | Logic programs with monotone abstract constraint atoms | 33 pages | null | null | null | cs.AI cs.LO | null | We introduce and study logic programs whose clauses are built out of monotone
constraint atoms. We show that the operational concept of the one-step
provability operator generalizes to programs with monotone constraint atoms,
but the generalization involves nondeterminism. Our main results demonstrate
that our formalism is a common generalization of (1) normal logic programming
with its semantics of models, supported models and stable models, (2) logic
programming with weight atoms (lparse programs) with the semantics of stable
models, as defined by Niemela, Simons and Soininen, and (3) of disjunctive
logic programming with the possible-model semantics of Sakama and Inoue.
| [
{
"version": "v1",
"created": "Fri, 25 Aug 2006 18:24:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marek",
"V. W.",
""
],
[
"Niemela",
"I.",
""
],
[
"Truszczynski]",
"M.",
""
]
] |
cs/0608105 | Hui Guo | Hui Guo, Ying Jiang | Application Layer Definition and Analyses of Controller Area Network Bus
for Wire Harness Assembly Machine | 6 pages, 2 figures, 4 tables | null | null | null | cs.RO cs.NI | null | With the feature of multi-master bus access, nondestructive contention-based
arbitration and flexible configuration, Controller Area Network (CAN) bus is
applied into the control system of Wire Harness Assembly Machine (WHAM). To
accomplish desired goal, the specific features of the CAN bus is analyzed by
compared with other field buses and the functional performances in the CAN bus
system of WHAM is discussed. Then the application layer planning of CAN bus for
dynamic priority is presented. The critical issue for the use of CAN bus system
in WHAM is the data transfer rate between different nodes. So processing
efficient model is introduced to assist analyzing data transfer procedure.
Through the model, it is convenient to verify the real time feature of the CAN
bus system in WHAM.
| [
{
"version": "v1",
"created": "Mon, 28 Aug 2006 12:42:38 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Aug 2006 13:40:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guo",
"Hui",
""
],
[
"Jiang",
"Ying",
""
]
] |
cs/0608106 | Philippe Moser | Philippe Moser | Lp Computable Functions and Fourier Series | corrected abstract | null | null | null | cs.CC | null | This paper studies how well computable functions can be approximated by their
Fourier series. To this end, we equip the space of Lp-computable functions
(computable Lebesgue integrable functions) with a size notion, by introducing
Lp-computable Baire categories.
We show that Lp-computable Baire categories satisfy the following three basic
properties. Singleton sets {f} (where f is Lp-computable) are meager, suitable
infinite unions of meager sets are meager, and the whole space of Lp-computable
functions is not meager. We give an alternative characterization of meager sets
via Banach Mazur games.
We study the convergence of Fourier series for Lp-computable functions and
show that whereas for every p>1, the Fourier series of every Lp-computable
function f converges to f in the Lp norm, the set of L1-computable functions
whose Fourier series does not diverge almost everywhere is meager.
| [
{
"version": "v1",
"created": "Mon, 28 Aug 2006 12:50:36 GMT"
},
{
"version": "v2",
"created": "Tue, 8 May 2007 09:03:15 GMT"
},
{
"version": "v3",
"created": "Fri, 11 May 2007 12:44:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Moser",
"Philippe",
""
]
] |
cs/0608108 | Nicolas Brodu | Nicolas Brodu | Spherical Indexing for Neighborhood Queries | 9 pages, 10 figures. The source code is available at
http://nicolas.brodu.free.fr/en/programmation/neighand/index.html | null | null | null | cs.DS cs.CG | null | This is an algorithm for finding neighbors when the objects can freely move
and have no predefined position. The query consists in finding neighbors for a
center location and a given radius. Space is discretized in cubic cells. This
algorithm introduces a direct spherical indexing that gives the list of all
cells making up the query sphere, for any radius and any center location. It
can additionally take in account both cyclic and non-cyclic regions of
interest. Finding only the K nearest neighbors naturally benefits from the
spherical indexing by minimally running through the sphere from center to edge,
and reducing the maximum distance when K neighbors have been found.
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 00:12:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brodu",
"Nicolas",
""
]
] |
cs/0608110 | Robert Colvin | Robert Colvin, Ian J. Hayes and Paul Strooper | Calculating modules in contextual logic program refinement | null | null | null | null | cs.LO | null | The refinement calculus for logic programs is a framework for deriving logic
programs from specifications. It is based on a wide-spectrum language that can
express both specifications and code, and a refinement relation that models the
notion of correct implementation. In this paper we extend and generalise
earlier work on contextual refinement. Contextual refinement simplifies the
refinement process by abstractly capturing the context of a subcomponent of a
program, which typically includes information about the values of the free
variables. This paper also extends and generalises module refinement. A module
is a collection of procedures that operate on a common data type; module
refinement between a specification module A and an implementation module C
allows calls to the procedures of A to be systematically replaced with calls to
the corresponding procedures of C. Based on the conditions for module
refinement, we present a method for calculating an implementation module from a
specification module. Both contextual and module refinement within the
refinement calculus have been generalised from earlier work and the results are
presented in a unified framework.
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 05:31:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Colvin",
"Robert",
""
],
[
"Hayes",
"Ian J.",
""
],
[
"Strooper",
"Paul",
""
]
] |
cs/0608112 | Benoit Hudzia | B. Hudzia, L. McDermott, T.N. Illahi and M-T. Kechadi | Entity Based Peer-to-Peer in a Data Grid Environment | null | B. Hudzia, L. McDermott, T.N. Illahi, and M-T. Kechadi, "Entity
Based Peer-to-Peer in a Data Grid Environment", The 17th IMACS World Congress
Scientific Computation, Applied Mathematics and Simulation, Paris, France,
July, 11-15, 2005 | null | null | cs.DC | null | During the last decade there has been a huge interest in Grid technologies,
and numerous Grid projects have been initiated with various visions of the
Grid. While all these visions have the same goal of resource sharing, they
differ in the functionality that a Grid supports, the grid characterisation,
programming environments, etc. In this paper we present a new Grid system
dedicated to deal with data issues, called DGET (Data Grid Environment and
Tools). DGET is characterized by its peer-to-peer communication system and
entity-based architecture, therefore, taking advantage of the main
functionality of both systems; P2P and Grid. DGET is currently under
development and a prototype implementing the main components is in its first
phase of testing. In this paper we limit our description to the system
architectural features and to the main differences with other systems.
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 11:58:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hudzia",
"B.",
""
],
[
"McDermott",
"L.",
""
],
[
"Illahi",
"T. N.",
""
],
[
"Kechadi",
"M-T.",
""
]
] |
cs/0608113 | Benoit Hudzia | B. Hudzia, T. N. Ellahi, L. McDermott, T. Kechadi | A Java Based Architecture of P2P-Grid Middleware | null | B. Hudzia, T. N. Ellahi, L. McDermott, T. Kechadi, 'A Java Based
Architecture of P2P-Grid Middleware', The 2006 International Conference on
Parallel and Distributed Processing Techniques and Applications, June 26-29,
2006, Las Vegas, USA | null | null | cs.DC | null | During the last decade there has been a huge interest in Grid technologies,
and numerous Grid projects have been initiated with various visions of the
Grid. While all these visions have the same goal of resource sharing, they
differ in the functionality that a Grid supports, characterization, programming
environments, etc. We present a new Grid system dedicated to dealing with data
issues, called DGET (Data Grid Environment and Tools). DGET is characterized by
its peerto- peer communication system and entity-based architecture, therefore,
taking advantage of the main functionality of both systems; P2P and Grid. DGET
is currently under development and a prototype implementing the main components
is in its first phase of testing. In this paper we limit our description to the
system architectural features and to the main differences with other systems.
Keywords: Grid Computing, Peer to Peer, Peer to Peer Grid
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 13:11:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hudzia",
"B.",
""
],
[
"Ellahi",
"T. N.",
""
],
[
"McDermott",
"L.",
""
],
[
"Kechadi",
"T.",
""
]
] |
cs/0608114 | Benoit Hudzia | Benoit Hudzia and Serge Petiton | Reliable multicast fault tolerant MPI in the Grid environment | null | Benoit Hudzia and Serge Petiton, "Reliable multicast fault
tolerant MPI in the Grid environment", International Conference GRIDnet,
october 2004 | null | null | cs.DC | null | Grid environments have recently been developed with low stretch and overheads
that increase with the logarithm of the number of nodes in the system. Getting
and sending data to/from a large numbers of nodes is gaining importance due to
an increasing number of independent data providers and the heterogeneity of the
network/Grid. One of the key challenges is to achieve a balance between low
bandwidth consumption and good reliability. In this paper we present an
implementation of a reliable multicast protocol over a fault tolerant MPI:
MPICHV2. It can provide one way to solve the problem of transferring large
chunks of data between applications running on a grid with limited network
links. We first show that we can achieve similar performance as the MPICH-P4
implementation by using multicast with data compression in a cluster. Next, we
provide a theoretical cluster organization and GRID network architecture to
harness the performance provided by using multicast. Finally, we present the
conclusion and future work.
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 13:14:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hudzia",
"Benoit",
""
],
[
"Petiton",
"Serge",
""
]
] |
cs/0608115 | Leonid Litinskii | Leonid B. Litinskii, Dmitry E. Romanov | Neural Network Clustering Based on Distances Between Objects | 7 pages,4 figures, presentation on ICANN (Athens, Greece, 2006) | null | null | null | cs.CV cs.NE | null | We present an algorithm of clustering of many-dimensional objects, where only
the distances between objects are used. Centers of classes are found with the
aid of neuron-like procedure with lateral inhibition. The result of clustering
does not depend on starting conditions. Our algorithm makes it possible to give
an idea about classes that really exist in the empirical data. The results of
computer simulations are presented.
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 13:24:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Litinskii",
"Leonid B.",
""
],
[
"Romanov",
"Dmitry E.",
""
]
] |
cs/0608116 | Benoit Hudzia | T. N. Ellahi, B. Hudzia, L. McDermott, T. Kechadi | Transparent Migration of Multi-Threaded Applications on a Java Based
Grid | null | T. N. Ellahi, B. Hudzia, L. McDermott, T. Kechadi, Transparent
Migration of Multi-Threaded Applications on a Java Based Grid, The IASTED
International Conference on Web Technologies, Applications, and Services
(WTAS 2006), July 17-19, 2006, Alberta, Canada | null | null | cs.DC | null | Grid computing has enabled pooling a very large number of heterogeneous
resource administered by different security domains. Applications are
dynamically deployed on the resources available at the time. Dynamic nature of
the resources and applications requirements makes needs the grid middleware to
support the ability of migrating a running application to a different resource.
Especially, Grid applications are typically long running and thus stoping them
and starting them from scratch is not a feasible option. This paper presents an
overview of migration support in a java based grid middleware called DGET.
Migration support in DGET includes multi-threaded migration and asynchronous
migration as well.
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 13:29:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ellahi",
"T. N.",
""
],
[
"Hudzia",
"B.",
""
],
[
"McDermott",
"L.",
""
],
[
"Kechadi",
"T.",
""
]
] |
cs/0608118 | Benoit Hudzia | B. Hudzia, M-T. Kechadi and A. Ottewill | TreeP: A Tree-Based P2P Network Architecture | null | B. Hudzia, M-T. Kechadi, and A. Ottewill, "TreeP: A Tree-Based P2P
Network Architecture", International Workshop on Algorithms, Models and tools
for parallel computing on heterogeneous networks (HeteroPar' 05), Boston,
Massachusetts, USA, September 27-30, 2005 | null | null | cs.DC | null | In this paper we proposed a hierarchical P2P network based on a dynamic
partitioning on a 1-D space. This hierarchy is created and maintained
dynamically and provides a gridmiddleware (like DGET) a P2P basic functionality
for resource discovery and load-balancing.This network architecture is called
TreeP (Tree based P2P network architecture) and is based on atessellation of a
1-D space. We show that this topology exploits in an efficient way
theheterogeneity feature of the network while limiting the overhead introduced
by the overlaymaintenance. Experimental results show that this topology is
highly resilient to a large number ofnetwork failures.
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 15:08:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hudzia",
"B.",
""
],
[
"Kechadi",
"M-T.",
""
],
[
"Ottewill",
"A.",
""
]
] |
cs/0608119 | Shiguo Lian | Shiguo Lian, Jinsheng Sun, Zhiquan Wang | Security Analysis of A Chaos-based Image Encryption Algorithm | 16 pages,4 figures | null | null | null | cs.MM cs.CR | null | The security of Fridrich Image Encryption Algorithm against brute-force
attack, statistical attack, known-plaintext attack and select-plaintext attack
is analyzed by investigating the properties of the involved chaotic maps and
diffusion functions. Based on the given analyses, some means are proposed to
strengthen the overall performance of the focused cryptosystem.
| [
{
"version": "v1",
"created": "Wed, 30 Aug 2006 03:22:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lian",
"Shiguo",
""
],
[
"Sun",
"Jinsheng",
""
],
[
"Wang",
"Zhiquan",
""
]
] |
cs/0608120 | Thierry Cachat | Thierry Cachat (LIAFA) | Controller synthesis & Ordinal Automata | with appendix | Proceedings of the 4th International Symposium on Automated
Technology for Verification and Analysis (ATVA'06) Springer (Ed.) (2006)
215-228 | null | null | cs.GT | null | Ordinal automata are used to model physical systems with Zeno behavior. Using
automata and games techniques we solve a control problem formulated and left
open by Demri and Nowak in 2005. It involves partial observability and a new
synchronization between the controller and the environment.
| [
{
"version": "v1",
"created": "Wed, 30 Aug 2006 09:58:08 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Oct 2006 11:04:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cachat",
"Thierry",
"",
"LIAFA"
]
] |
cs/0609003 | Emanuel Diamant | Emanuel Diamant | In Quest of Image Semantics: Are We Looking for It Under the Right
Lamppost? | In 2006, this paper has been submitted to 13 computer vision
conferences, and was strongly rejected by 12 of them | null | null | null | cs.CV cs.IR | null | In the last years we witness a dramatic growth of research focused on
semantic image understanding. Indeed, without understanding image content
successful accomplishment of any image-processing task is simply incredible. Up
to the recent times, the ultimate need for such understanding has been met by
the knowledge that a domain expert or a vision system supervisor have
contributed to every image-processing application. The advent of the Internet
has drastically changed this situation. Internet sources of visual information
are diffused and dispersed over the whole Web, so the duty of information
content discovery and evaluation must be relegated now to an image
understanding agent (a machine or a computer program) capable to perform image
content assessment at a remote image location. Development of Content Based
Image Retrieval (CBIR) techniques was a right move in a right direction,
launched about ten years ago. Unfortunately, very little progress has been made
since then. The reason for this can be seen in a rank of long lasting
misconceptions that CBIR designers are continuing to adhere to. I hope, my
arguments will help them to change their minds.
| [
{
"version": "v1",
"created": "Sat, 2 Sep 2006 11:50:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diamant",
"Emanuel",
""
]
] |
cs/0609004 | Moustapha Diaby | Moustapha Diaby | Equality of complexity classes P and NP: Linear programming formulation
of the quadratic assignment problem | 6 pages; Published in the 2006 IMECS Conference Proceedings (ISBN:
988 98671-3-3); Hofman's claimed "counter-example" is invalid: violates set
of constraints 2.10 | null | null | null | cs.CC cs.DM | null | In this paper, we present a polynomial-sized linear programming formulation
of the Quadratic Assignment Problem (QAP). The proposed linear program is a
network flow-based model. Hence, it provides for the solution of the QAP in
polynomial time. Computational testing and results are discussed.
| [
{
"version": "v1",
"created": "Sat, 2 Sep 2006 09:12:27 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Sep 2006 18:45:01 GMT"
},
{
"version": "v3",
"created": "Thu, 21 Sep 2006 01:39:27 GMT"
},
{
"version": "v4",
"created": "Sun, 1 Oct 2006 19:25:04 GMT"
},
{
"version": "v5",
"created": "Wed, 4 Oct 2006 18:43:28 GMT"
},
{
"version": "v6",
"created": "Sun, 22 Oct 2006 13:20:38 GMT"
},
{
"version": "v7",
"created": "Fri, 10 Nov 2006 08:48:05 GMT"
},
{
"version": "v8",
"created": "Wed, 27 Dec 2006 23:44:18 GMT"
},
{
"version": "v9",
"created": "Sun, 13 May 2007 21:04:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diaby",
"Moustapha",
""
]
] |
cs/0609007 | Vladislav Malyshkin | Vladislav Malyshkin, Ray Bakhramov, Andrey Gorodetsky | A Massive Local Rules Search Approach to the Classification Problem | 24 pages | null | null | null | cs.LG | null | An approach to the classification problem of machine learning, based on
building local classification rules, is developed. The local rules are
considered as projections of the global classification rules to the event we
want to classify. A massive global optimization algorithm is used for
optimization of quality criterion. The algorithm, which has polynomial
complexity in typical case, is used to find all high--quality local rules. The
other distinctive feature of the algorithm is the integration of attributes
levels selection (for ordered attributes) with rules searching and original
conflicting rules resolution strategy. The algorithm is practical; it was
tested on a number of data sets from UCI repository, and a comparison with the
other predicting techniques is presented.
| [
{
"version": "v1",
"created": "Sun, 3 Sep 2006 21:30:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malyshkin",
"Vladislav",
""
],
[
"Bakhramov",
"Ray",
""
],
[
"Gorodetsky",
"Andrey",
""
]
] |
cs/0609008 | David Nowak | St\'ephane Demri, Ranko Lazic, David Nowak | On the freeze quantifier in Constraint LTL: decidability and complexity | 29 pages | Information and Computation, 205(1):2-24, January 2007 | 10.1016/j.ic.2006.08.003 | null | cs.LO cs.CC | null | Constraint LTL, a generalisation of LTL over Presburger constraints, is often
used as a formal language to specify the behavior of operational models with
constraints. The freeze quantifier can be part of the language, as in some
real-time logics, but this variable-binding mechanism is quite general and
ubiquitous in many logical languages (first-order temporal logics, hybrid
logics, logics for sequence diagrams, navigation logics, logics with
lambda-abstraction etc.). We show that Constraint LTL over the simple domain
(N,=) augmented with the freeze quantifier is undecidable which is a surprising
result in view of the poor language for constraints (only equality tests). Many
versions of freeze-free Constraint LTL are decidable over domains with
qualitative predicates and our undecidability result actually establishes
Sigma_1^1-completeness. On the positive side, we provide complexity results
when the domain is finite (EXPSPACE-completeness) or when the formulae are flat
in a sense introduced in the paper. Our undecidability results are sharp (i.e.
with restrictions on the number of variables) and all our complexity
characterisations ensure completeness with respect to some complexity class
(mainly PSPACE and EXPSPACE).
| [
{
"version": "v1",
"created": "Mon, 4 Sep 2006 06:20:03 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2006 09:36:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demri",
"Stéphane",
""
],
[
"Lazic",
"Ranko",
""
],
[
"Nowak",
"David",
""
]
] |
cs/0609009 | Virginia Vassilevska | Virginia Vassilevska, Ryan Williams and Raphael Yuster | Finding heaviest H-subgraphs in real weighted graphs, with applications | 23 pages | null | null | null | cs.DS cs.DM | null | For a graph G with real weights assigned to the vertices (edges), the MAX
H-SUBGRAPH problem is to find an H-subgraph of G with maximum total weight, if
one exists. The all-pairs MAX H-SUBGRAPH problem is to find for every pair of
vertices u,v, a maximum H-subgraph containing both u and v, if one exists. Our
main results are new strongly polynomial algorithms for the all-pairs MAX
H-SUBGRAPH problem for vertex weighted graphs. We also give improved algorithms
for the MAX-H SUBGRAPH problem for edge weighted graphs, and various related
problems, including computing the first k most significant bits of the distance
product of two matrices. Some of our algorithms are based, in part, on fast
matrix multiplication.
| [
{
"version": "v1",
"created": "Mon, 4 Sep 2006 08:08:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vassilevska",
"Virginia",
""
],
[
"Williams",
"Ryan",
""
],
[
"Yuster",
"Raphael",
""
]
] |
cs/0609010 | Artur Rataj | Artur Rataj | An effective edge--directed frequency filter for removal of aliasing in
upsampled images | 10 pages, 11 figures | null | null | null | cs.CV | null | Raster images can have a range of various distortions connected to their
raster structure. Upsampling them might in effect substantially yield the
raster structure of the original image, known as aliasing. The upsampling
itself may introduce aliasing into the upsampled image as well. The presented
method attempts to remove the aliasing using frequency filters based on the
discrete fast Fourier transform, and applied directionally in certain regions
placed along the edges in the image.
As opposed to some anisotropic smoothing methods, the presented algorithm
aims to selectively reduce only the aliasing, preserving the sharpness of image
details.
The method can be used as a post--processing filter along with various
upsampling algorithms. It was experimentally shown that the method can improve
the visual quality of the upsampled images.
| [
{
"version": "v1",
"created": "Mon, 4 Sep 2006 13:04:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rataj",
"Artur",
""
]
] |
cs/0609012 | Philippe Moser | Philippe Moser | Baire Categories on Small Complexity Classes and Meager-Comeager Laws | to be published in Inform. and comp | null | null | null | cs.CC | null | We introduce two resource-bounded Baire category notions on small complexity
classes such as P, SUBEXP, and PSPACE and on probabilistic classes such as BPP,
which differ on how the corresponding finite extension strategies are computed.
We give an alternative characterization of small sets via resource-bounded
Banach-Mazur games.
As an application of the first notion, we show that for almost every language
A (i.e. all except a meager class) computable in subexponential time,
P(A)=BPP(A). We also show that almost all languages in PSPACE do not have small
nonuniform complexity.
We then switch to the second Baire category notion (called
locally-computable), and show that the class SPARSE is meager in P. We show
that in contrast to the resource-bounded measure case, meager-comeager laws can
be obtained for many standard complexity classes, relative to
locally-computable Baire category on BPP and PSPACE.
Another topic where locally-computable Baire categories differ from
resource-bounded measure is regarding weak-completeness: we show that there is
no weak-completeness notion in P based on locally-computable Baire categories,
i.e. every P-weakly-complete set is complete for P. We also prove that the
class of complete sets for P under Turing-logspace reductions is meager in P,
if P is not equal to DSPACE(log n), and that the same holds unconditionally for
quasi-poly time.
Finally we observe that locally-computable Baire categories are incomparable
with all existing resource-bounded measure notions on small complexity classes,
which might explain why those two settings seem to differ so fundamentally.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 09:02:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Moser",
"Philippe",
""
]
] |
cs/0609014 | Julien Reynier | Julien Reynier (INRIA Rocquencourt) | A simple stability condition for RED using TCP mean-field modeling | null | null | null | null | cs.NI math.PR | null | Congestion on the Internet is an old problem but still a subject of intensive
research. The TCP protocol with its AIMD (Additive Increase and Multiplicative
Decrease) behavior hides very challenging problems; one of them is to
understand the interaction between a large number of users with delayed
feedback. This article will focus on two modeling issues of TCP which appeared
to be important to tackle concrete scenarios when implementing the model
proposed in [Baccelli McDonald Reynier 02] firstly the modeling of the maximum
TCP window size: this maximum can be reached quickly in many practical cases;
secondly the delay structure: the usual Little-like formula behaves really
poorly when queuing delays are variable, and may change dramatically the
evolution of the predicted queue size, which makes it useless to study
drop-tail or RED (Random Early Detection) mechanisms. Within proposed TCP
modeling improvements, we are enabled to look at a concrete example where RED
should be used in FIFO routers instead of letting the default drop-tail happen.
We study mathematically fixed points of the window size distribution and local
stability of RED. An interesting case is when RED operates at the limit when
the congestion starts, it avoids unwanted loss of bandwidth and delay
variations.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 14:27:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Reynier",
"Julien",
"",
"INRIA Rocquencourt"
]
] |
cs/0609015 | Marc Tommasi | J. Carme (INRIA Futurs), R. Gilleron (INRIA Futurs), A. Lemay (INRIA
Futurs), A. Terlutte (INRIA Futurs), M. Tommasi (INRIA Futurs) | Residual Finite Tree Automata | null | null | null | null | cs.CC cs.LO | null | Tree automata based algorithms are essential in many fields in computer
science such as verification, specification, program analysis. They become also
essential for databases with the development of standards such as XML. In this
paper, we define new classes of non deterministic tree automata, namely
residual finite tree automata (RFTA). In the bottom-up case, we obtain a new
characterization of regular tree languages. In the top-down case, we obtain a
subclass of regular tree languages which contains the class of languages
recognized by deterministic top-down tree automata. RFTA also come with the
property of existence of canonical non deterministic tree automata.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 16:23:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carme",
"J.",
"",
"INRIA Futurs"
],
[
"Gilleron",
"R.",
"",
"INRIA Futurs"
],
[
"Lemay",
"A.",
"",
"INRIA\n Futurs"
],
[
"Terlutte",
"A.",
"",
"INRIA Futurs"
],
[
"Tommasi",
"M.",
"",
"INRIA Futurs"
]
] |
cs/0609016 | Tomasz Ciszkowski Mr | Tomasz Ciszkowski, Zbigniew Kotulski | ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks | 12 pages, 10th Domestic Conference on Applied Cryptography ENIGMA,
Warsaw, Poland, May 2006, The second author's last name was corrected | null | null | null | cs.CR cs.NI | null | The pervasiveness of wireless communication recently gave mobile ad hoc
networks (MANET) a significant researchers' attention, due to its innate
capabilities of instant communication in many time and mission critical
applications. However, its natural advantages of networking in civilian and
military environments make them vulnerable to security threats. Support for an
anonymity in MANET is an orthogonal to security critical challenge we faced in
this paper. We propose a new anonymous authentication protocol for mobile ad
hoc networks enhanced with a distributed reputation system. The main its
objective is to provide mechanisms concealing a real identity of communicating
nodes with an ability of resist to known attacks. The distributed reputation
system is incorporated for a trust management and malicious behavior detection
in the network. The end-to-end anonymous authentication is conducted in
three-pass handshake based on an asymmetric and symmetric key cryptography.
After successfully finished authentication phase secure and multiple anonymous
data channels are established. The anonymity is guarantied by randomly chosen
pseudonyms owned by a user. Nodes of the network are publicly identified and
are independent of users' pseudonyms. In this paper we presented an example of
the protocol implementation.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 18:21:45 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Sep 2006 14:40:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ciszkowski",
"Tomasz",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
cs/0609017 | Wolfgang Slany | Wolfgang Slany and Wolfgang Kienreich | On some winning strategies for the Iterated Prisoner's Dilemma or Mr.
Nice Guy and the Cosa Nostra | null | null | null | null | cs.GT | null | We submitted two kinds of strategies to the iterated prisoner's dilemma (IPD)
competitions organized by Graham Kendall, Paul Darwen and Xin Yao in 2004 and
2005. Our strategies performed exceedingly well in both years. One type is an
intelligent and optimistic enhanced version of the well known TitForTat
strategy which we named OmegaTitForTat. It recognizes common behaviour patterns
and detects and recovers from repairable mutual defect deadlock situations,
otherwise behaving much like TitForTat. The second type consists of a set of
strategies working together as a team. These group strategies have one
distinguished individual Godfather strategy that plays OmegaTitForTat against
non-members while heavily profiting from the behaviour of the other members of
his group, the Hitman. The Hitman willingly let themselves being abused by
their Godfather while themselves lowering the scores of all other players as
much as possible, thus further maximizing the performance of their Godfather in
relation to other participants. The study of collusion in the simplified
framework of the iterated prisoner's dilemma allows us to draw parallels to
many common aspects of reality both in Nature as well as Human Society, and
therefore further extends the scope of the iterated prisoner's dilemma as a
metaphor for the study of cooperative behaviour in a new and natural direction.
We further provide evidence that it will be unavoidable that such group
strategies will dominate all future iterated prisoner's dilemma competitions as
they can be stealthy camouflaged as non-group strategies with arbitrary
subtlety. Moreover, we show that the general problem of recognizing stealth
colluding strategies is undecidable in the theoretical sense.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 18:42:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slany",
"Wolfgang",
""
],
[
"Kienreich",
"Wolfgang",
""
]
] |
cs/0609019 | Sophie Aubin | Sophie Aubin (LIPN), Thierry Hamon (LIPN) | Improving Term Extraction with Terminological Resources | null | Advances in Natural Language Processing 5th International
Conference on NLP, FinTAL 2006 (2006) 380 | null | null | cs.CL | null | Studies of different term extractors on a corpus of the biomedical domain
revealed decreasing performances when applied to highly technical texts. The
difficulty or impossibility of customising them to new domains is an additional
limitation. In this paper, we propose to use external terminologies to
influence generic linguistic data in order to augment the quality of the
extraction. The tool we implemented exploits testified terms at different steps
of the process: chunking, parsing and extraction of term candidates.
Experiments reported here show that, using this method, more term candidates
can be acquired with a higher level of reliability. We further describe the
extraction process involving endogenous disambiguation implemented in the term
extractor YaTeA.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 11:41:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aubin",
"Sophie",
"",
"LIPN"
],
[
"Hamon",
"Thierry",
"",
"LIPN"
]
] |
cs/0609021 | Pierre Boudes | Pierre Boudes (LIPN) | Non uniform (hyper/multi)coherence spaces | 32 pages | null | null | null | cs.LO | null | In (hyper)coherence semantics, proofs/terms are cliques in (hyper)graphs.
Intuitively, vertices represent results of computations and the edge relation
witnesses the ability of being assembled into a same piece of data or a same
(strongly) stable function, at arrow types. In (hyper)coherence semantics, the
argument of a (strongly) stable functional is always a (strongly) stable
function. As a consequence, comparatively to the relational semantics, where
there is no edge relation, some vertices are missing. Recovering these vertices
is essential for the purpose of reconstructing proofs/terms from their
interpretations. It shall also be useful for the comparison with other
semantics, like game semantics. In [BE01], Bucciarelli and Ehrhard introduced a
so called non uniform coherence space semantics where no vertex is missing. By
constructing the co-free exponential we set a new version of this last
semantics, together with non uniform versions of hypercoherences and
multicoherences, a new semantics where an edge is a finite multiset. Thanks to
the co-free construction, these non uniform semantics are deterministic in the
sense that the intersection of a clique and of an anti-clique contains at most
one vertex, a result of interaction, and extensionally collapse onto the
corresponding uniform semantics.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 12:14:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boudes",
"Pierre",
"",
"LIPN"
]
] |
cs/0609022 | Barnaby Martin | Barnaby Martin | Dichotomies and Duality in First-order Model Checking Problems | null | null | null | null | cs.LO cs.CC | null | We study the complexity of the model checking problem, for fixed model A,
over certain fragments L of first-order logic. These are sometimes known as the
expression complexities of L. We obtain various complexity classification
theorems for these logics L as each ranges over models A, in the spirit of the
dichotomy conjecture for the Constraint Satisfaction Problem -- which itself
may be seen as the model checking problem for existential conjunctive positive
first-order logic.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 13:04:36 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Nov 2006 16:14:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Martin",
"Barnaby",
""
]
] |
cs/0609024 | Prashant Singh | Prashant | Linux, Open Source and Unicode | 10 pages, 1 figure, 1 table | null | null | null | cs.SE | null | The paper is taken out.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 18:12:27 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2007 17:04:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prashant",
"",
""
]
] |
cs/0609025 | Prashant Singh | Prashant | A XML Schema Definition based Universal User Interface | 6 pages, 5 figures | null | null | null | cs.SE | null | The article is taken out for change of contents.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 18:21:23 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2007 17:03:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prashant",
"",
""
]
] |
cs/0609027 | Al-Mukaddim Khan Pathan | Rajkumar Buyya, Al-Mukaddim Khan Pathan, James Broberg and Zahir Tari | A Case for Peering of Content Delivery Networks | Short Article (Submitted in DS Online as Work in Progress) | null | null | null | cs.DC | null | The proliferation of Content Delivery Networks (CDN) reveals that existing
content networks are owned and operated by individual companies. As a
consequence, closed delivery networks are evolved which do not cooperate with
other CDNs and in practice, islands of CDNs are formed. Moreover, the logical
separation between contents and services in this context results in two content
networking domains. But present trends in content networks and content
networking capabilities give rise to the interest in interconnecting content
networks. Finding ways for distinct content networks to coordinate and
cooperate with other content networks is necessary for better overall service.
In addition to that, meeting the QoS requirements of users according to the
negotiated Service Level Agreements between the user and the content network is
a burning issue in this perspective. In this article, we present an open,
scalable and Service-Oriented Architecture based system to assist the creation
of open Content and Service Delivery Networks (CSDN) that scale and support
sharing of resources with other CSDNs.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 23:41:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buyya",
"Rajkumar",
""
],
[
"Pathan",
"Al-Mukaddim Khan",
""
],
[
"Broberg",
"James",
""
],
[
"Tari",
"Zahir",
""
]
] |
cs/0609028 | Himanshu Thapliyal | Himanshu Thapliyal and M.B Srinivas | VLSI Implementation of RSA Encryption System Using Ancient Indian Vedic
Mathematics | 5 Pages: Proceedings of SPIE -- Volume 5837 VLSI Circuits and Systems
II, Jose F. Lopez, Francisco V. Fernandez, Jose Maria Lopez-Villegas, Jose M.
de la Rosa, Editors, June 2005, pp. 888-892 | null | null | null | cs.AR | null | This paper proposes the hardware implementation of RSA encryption/decryption
algorithm using the algorithms of Ancient Indian Vedic Mathematics that have
been modified to improve performance. The recently proposed hierarchical
overlay multiplier architecture is used in the RSA circuitry for multiplication
operation. The most significant aspect of the paper is the development of a
division architecture based on Straight Division algorithm of Ancient Indian
Vedic Mathematics and embedding it in RSA encryption/decryption circuitry for
improved efficiency. The coding is done in Verilog HDL and the FPGA synthesis
is done using Xilinx Spartan library. The results show that RSA circuitry
implemented using Vedic division and multiplication is efficient in terms of
area/speed compared to its implementation using conventional multiplication and
division architectures
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 14:18:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B",
""
]
] |
cs/0609029 | Himanshu Thapliyal | Himanshu Thapliyal and Hamid R. Arabnia | Reversible Programmable Logic Array (RPLA) using Fredkin & Feynman Gates
for Industrial Electronics and Applications | Published in Proceedings of the International Conference on Embedded
Systems and Applications(ESA'06),Las Vegas, U.S.A, June 2006(CSREA Press) | null | null | null | cs.AR | null | In recent years, reversible logic has emerged as a promising computing
paradigm having application in low power CMOS, quantum computing,
nanotechnology, and optical computing. The classical set of gates such as AND,
OR, and EXOR are not reversible. In this paper, the authors have proposed
reversible programmable logic array (RPLA) architecture using reversible
Fredkin and Feynman gates. The proposed RPLA has n inputs and m outputs and can
realize m functions of n variables. In order to demonstrate the design of RPLA,
a 3 input RPLA is designed which can perform any 28 functions using the
combination of 8 min terms (23). Furthermore, the application of the designed 3
input RPLA is shown by implementing the full adder and full subtractor
functions through it.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 14:25:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Arabnia",
"Hamid R.",
""
]
] |
cs/0609031 | Sreyash Kenkre | Sreyash Kenkre and Sundar Vishwanathan | Approximation Algorithms for the Bipartite Multi-cut Problem | 11 pages | null | null | null | cs.CC cs.DS | null | We introduce the {\it Bipartite Multi-cut} problem. This is a generalization
of the {\it st-Min-cut} problem, is similar to the {\it Multi-cut} problem
(except for more stringent requirements) and also turns out to be an immediate
generalization of the {\it Min UnCut} problem. We prove that this problem is
{\bf NP}-hard and then present LP and SDP based approximation algorithms. While
the LP algorithm is based on the Garg-Vazirani-Yannakakis algorithm for {\it
Multi-cut}, the SDP algorithm uses the {\it Structure Theorem} of $\ell_2^2$
Metrics.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 18:10:39 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Sep 2006 06:46:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kenkre",
"Sreyash",
""
],
[
"Vishwanathan",
"Sundar",
""
]
] |
cs/0609032 | Sumit Ganguly | Sumit Ganguly and Anirban Majumder | CR-precis: A deterministic summary structure for update data streams | 11 pages | null | null | IIT Kanpur, July 1 2006 | cs.DS | null | We present the \crprecis structure, that is a general-purpose, deterministic
and sub-linear data structure for summarizing \emph{update} data streams. The
\crprecis structure yields the \emph{first deterministic sub-linear space/time
algorithms for update streams} for answering a variety of fundamental stream
queries, such as, (a) point queries, (b) range queries, (c) finding approximate
frequent items, (d) finding approximate quantiles, (e) finding approximate
hierarchical heavy hitters, (f) estimating inner-products, (g) near-optimal
$B$-bucket histograms, etc..
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 19:21:01 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Sep 2006 05:51:43 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Oct 2006 07:37:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ganguly",
"Sumit",
""
],
[
"Majumder",
"Anirban",
""
]
] |
cs/0609033 | David Eppstein | Michael B. Dillencourt and David Eppstein and Michael T. Goodrich | Choosing Colors for Geometric Graphs via Color Space Embeddings | 12 pages, 4 figures. To appear at 14th Int. Symp. Graph Drawing, 2006 | null | null | null | cs.CG | null | Graph drawing research traditionally focuses on producing geometric
embeddings of graphs satisfying various aesthetic constraints. After the
geometric embedding is specified, there is an additional step that is often
overlooked or ignored: assigning display colors to the graph's vertices. We
study the additional aesthetic criterion of assigning distinct colors to
vertices of a geometric graph so that the colors assigned to adjacent vertices
are as different from one another as possible. We formulate this as a problem
involving perceptual metrics in color space and we develop algorithms for
solving this problem by embedding the graph in color space. We also present an
application of this work to a distributed load-balancing visualization problem.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 20:39:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dillencourt",
"Michael B.",
""
],
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
]
] |
cs/0609035 | Joseph Y. Halpern | Joseph Y. Halpern and Vanessa Teague | Rational Secret Sharing and Multiparty Computation: Extended Abstract | Appears in STOC, 2004 | null | null | null | cs.GT cs.CR cs.DC | null | We consider the problems of secret sharing and multiparty computation,
assuming that agents prefer to get the secret (resp., function value) to not
getting it, and secondarily, prefer that as few as possible of the other agents
get it. We show that, under these assumptions, neither secret sharing nor
multiparty function computation is possible using a mechanism that has a fixed
running time. However, we show that both are possible using randomized
mechanisms with constant expected running time.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 21:48:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Teague",
"Vanessa",
""
]
] |
cs/0609036 | Himanshu Thapliyal | Himanshu Thapliyal, Hamid R. Arabnia and M.B Srinivas | Reduced Area Low Power High Throughput BCD Adders for IEEE 754r Format | 6 Pages;Published in Proceedings of the 11th International CSI
Computer Conference (CSICC'06), Tehran, Jan 24-26, 2006, pp.59-64 | null | null | null | cs.AR | null | IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and
a major enhancement to the standard is the addition of decimal format. Firstly,
this paper proposes novel two transistor AND and OR gates. The proposed AND
gate has no power supply, thus it can be referred as the Powerless AND gate.
Similarly, the proposed two transistor OR gate has no ground and can be
referred as Groundless OR. Secondly for IEEE 754r format, two novel BCD adders
called carry skip and carry look-ahead BCD adders are also proposed in this
paper. In order to design the carry look-ahead BCD adder, a novel 4 bit carry
look-ahead adder called NCLA is proposed which forms the basic building block
of the proposed carry look-ahead BCD adder. Finally, the proposed two
transistors AND and OR gates are used to provide the optimized small area low
power high throughput circuitries of the proposed BCD adders.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 05:36:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Arabnia",
"Hamid R.",
""
],
[
"Srinivas",
"M. B",
""
]
] |
cs/0609037 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA) | (HO)RPO Revisited | null | null | null | null | cs.LO | null | The notion of computability closure has been introduced for proving the
termination of the combination of higher-order rewriting and beta-reduction. It
is also used for strengthening the higher-order recursive path ordering. In the
present paper, we study in more details the relations between the computability
closure and the (higher-order) recursive path ordering. We show that the
first-order recursive path ordering is equal to an ordering naturally defined
from the computability closure. In the higher-order case, we get an ordering
containing the higher-order recursive path ordering whose well-foundedness
relies on the correctness of the computability closure. This provides a simple
way to extend the higher-order recursive path ordering to richer type systems.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 07:35:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
]
] |
cs/0609041 | Julien Hendrickx | Julien M. Hendrickx, Baris Fidan, Changbin Yu, Brian D.O. Anderson and
Vincent D. Blondel | Primitive operations for the construction and reorganization of
minimally persistent formations | 26 pages, 31 .eps files for the figures | null | null | CESAME research report 2006.62 | cs.MA | null | In this paper, we study the construction and transformation of
two-dimensional persistent graphs. Persistence is a generalization to directed
graphs of the undirected notion of rigidity. In the context of moving
autonomous agent formations, persistence characterizes the efficacy of a
directed structure of unilateral distances constraints seeking to preserve a
formation shape. Analogously to the powerful results about Henneberg sequences
in minimal rigidity theory, we propose different types of directed graph
operations allowing one to sequentially build any minimally persistent graph
(i.e. persistent graph with a minimal number of edges for a given number of
vertices), each intermediate graph being also minimally persistent. We also
consider the more generic problem of obtaining one minimally persistent graph
from another, which corresponds to the on-line reorganization of an autonomous
agent formation. We prove that we can obtain any minimally persistent formation
from any other one by a sequence of elementary local operations such that
minimal persistence is preserved throughout the reorganization process.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 10:12:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hendrickx",
"Julien M.",
""
],
[
"Fidan",
"Baris",
""
],
[
"Yu",
"Changbin",
""
],
[
"Anderson",
"Brian D. O.",
""
],
[
"Blondel",
"Vincent D.",
""
]
] |
cs/0609043 | Francoise Gayral | Fran\c{c}oise Gayral (LIPN), Daniel Kayser (LIPN), Fran\c{c}ois L\'evy
(LIPN) | Challenging the principle of compositionality in interpreting natural
language texts | null | conference on Compositionality, Concepts and Cognition, Allemagne
(2004) | null | null | cs.CL | null | The paper aims at emphasizing that, even relaxed, the hypothesis of
compositionality has to face many problems when used for interpreting natural
language texts. Rather than fixing these problems within the compositional
framework, we believe that a more radical change is necessary, and propose
another approach.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 14:01:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gayral",
"Françoise",
"",
"LIPN"
],
[
"Kayser",
"Daniel",
"",
"LIPN"
],
[
"Lévy",
"François",
"",
"LIPN"
]
] |
cs/0609045 | Vladimir Vovk | Vladimir Vovk | Metric entropy in competitive on-line prediction | 41 pages | null | null | null | cs.LG | null | Competitive on-line prediction (also known as universal prediction of
individual sequences) is a strand of learning theory avoiding making any
stochastic assumptions about the way the observations are generated. The
predictor's goal is to compete with a benchmark class of prediction rules,
which is often a proper Banach function space. Metric entropy provides a
unifying framework for competitive on-line prediction: the numerous known upper
bounds on the metric entropy of various compact sets in function spaces readily
imply bounds on the performance of on-line prediction strategies. This paper
discusses strengths and limitations of the direct approach to competitive
on-line prediction via metric entropy, including comparisons to other
approaches.
| [
{
"version": "v1",
"created": "Sat, 9 Sep 2006 11:31:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0609047 | S. M. Nazrul Alam | S. M. Nazrul Alam and Zygmunt J. Haas | Topology Control and Network Lifetime in Three-Dimensional Wireless
Sensor Networks | Submitted for publication | null | null | null | cs.NI cs.CG | null | Coverage and connectivity issues of three-dimensional (3D) networks are
addressed in [2], but that work assumes that a node can be placed at any
arbitrary location. In this work, we drop that assumption and rather assume
that nodes are uniformly and densely deployed in a 3D space. We want to devise
a mechanism that keeps some nodes active and puts other nodes into sleep so
that the number of active nodes at a time is minimized (and thus network life
time is maximized), while maintaining full coverage and connectivity. One
simple way to do that is to partition the 3D space into cells, and only one
node in each cell remains active at a time. Our results show that the number of
active nodes can be minimized if the shape of each cell is a truncated
octahedron. It requires the sensing range to be at least 0.542326 times the
transmission radius. This value is 0.5, 0.53452 and 0.5 for cube, hexagonal
prism, and rhombic dodecahedron, respectively. However, at a time the number of
active nodes for cube, hexagonal prism and rhombic dodecahedron model is
respectively 2.372239, 1.82615 and 1.49468 times of that of truncated
octahedron model. So clearly truncated octahedron model has the highest network
lifetime. We also provide a distributed topology control algorithm that can be
used by each sensor node to determine its cell id using a constant number of
local arithmetic operations provided that the sensor node knows its location.
We also validate our results by simulation.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 02:01:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alam",
"S. M. Nazrul",
""
],
[
"Haas",
"Zygmunt J.",
""
]
] |
cs/0609048 | Pascal Weil | Pascal Weil (LaBRI) | On the logical definability of certain graph and poset languages | null | Journal of Automata, Languages and Computation 9 (2004) 147-165 | null | null | cs.LO | null | We show that it is equivalent, for certain sets of finite graphs, to be
definable in CMS (counting monadic second-order logic, a natural extension of
monadic second-order logic), and to be recognizable in an algebraic framework
induced by the notion of modular decomposition of a finite graph. More
precisely, we consider the set $F\_\infty$ of composition operations on graphs
which occur in the modular decomposition of finite graphs. If $F$ is a subset
of $F\_{\infty}$, we say that a graph is an $\calF$-graph if it can be
decomposed using only operations in $F$. A set of $F$-graphs is recognizable if
it is a union of classes in a finite-index equivalence relation which is
preserved by the operations in $F$. We show that if $F$ is finite and its
elements enjoy only a limited amount of commutativity -- a property which we
call weak rigidity, then recognizability is equivalent to CMS-definability.
This requirement is weak enough to be satisfied whenever all $F$-graphs are
posets, that is, transitive dags. In particular, our result generalizes Kuske's
recent result on series-parallel poset languages.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 08:25:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Weil",
"Pascal",
"",
"LaBRI"
]
] |
cs/0609051 | Ralf Steinberger | Bruno Pouliquen, Ralf Steinberger, Camelia Ignat, Irina Temnikova,
Anna Widiger, Wajdi Zaghouani, Jan Zizka | Multilingual person name recognition and transliteration | Explains the technology behind the JRC's NewsExplorer application,
which is freely accessible at http://press.jrc.it/NewsExplorer | Journal CORELA - Cognition, Representation, Langage. Numeros
speciaux, Le traitement lexicographique des noms propres. December 2005. ISSN
1638-5748 | null | null | cs.CL cs.IR | null | We present an exploratory tool that extracts person names from multilingual
news collections, matches name variants referring to the same person, and
infers relationships between people based on the co-occurrence of their names
in related news. A novel feature is the matching of name variants across
languages and writing systems, including names written with the Greek, Cyrillic
and Arabic writing system. Due to our highly multilingual setting, we use an
internal standard representation for name representation and matching, instead
of adopting the traditional bilingual approach to transliteration. This work is
part of the news analysis system NewsExplorer that clusters an average of
25,000 news articles per day to detect related news within the same and across
different languages.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 11:08:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
""
],
[
"Steinberger",
"Ralf",
""
],
[
"Ignat",
"Camelia",
""
],
[
"Temnikova",
"Irina",
""
],
[
"Widiger",
"Anna",
""
],
[
"Zaghouani",
"Wajdi",
""
],
[
"Zizka",
"Jan",
""
]
] |
cs/0609052 | Frank Wolter | Frank Wolter and Michael Zakharyaschev | Undecidability of the unification and admissibility problems for modal
and description logics | null | null | null | null | cs.LO cs.AI | null | We show that the unification problem `is there a substitution instance of a
given formula that is provable in a given logic?' is undecidable for basic
modal logics K and K4 extended with the universal modality. It follows that the
admissibility problem for inference rules is undecidable for these logics as
well. These are the first examples of standard decidable modal logics for which
the unification and admissibility problems are undecidable. We also prove
undecidability of the unification and admissibility problems for K and K4 with
at least two modal operators and nominals (instead of the universal modality),
thereby showing that these problems are undecidable for basic hybrid logics.
Recently, unification has been introduced as an important reasoning service for
description logics. The undecidability proof for K with nominals can be used to
show the undecidability of unification for boolean description logics with
nominals (such as ALCO and SHIQO). The undecidability proof for K with the
universal modality can be used to show that the unification problem relative to
role boxes is undecidable for Boolean description logic with transitive roles,
inverse roles, and role hierarchies (such as SHI and SHIQ).
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 11:41:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolter",
"Frank",
""
],
[
"Zakharyaschev",
"Michael",
""
]
] |
cs/0609053 | Ralf Steinberger | Ralf Steinberger, Bruno Pouliquen, Camelia Ignat (European Commission
- Joint Research Centre) | Navigating multilingual news collections using automatically extracted
information | This paper describes the main functionality of the JRC's
fully-automatic news analysis system NewsExplorer, which is freely accessible
in currently thirteen languages at http://press.jrc.it/NewsExplorer/ . 8
pages | Proceedings of the 27th International Conference 'Information
Technology Interfaces' (ITI'2005). Cavtat / Dubrovnik | null | null | cs.CL cs.IR | null | We are presenting a text analysis tool set that allows analysts in various
fields to sieve through large collections of multilingual news items quickly
and to find information that is of relevance to them. For a given document
collection, the tool set automatically clusters the texts into groups of
similar articles, extracts names of places, people and organisations, lists the
user-defined specialist terms found, links clusters and entities, and generates
hyperlinks. Through its daily news analysis operating on thousands of articles
per day, the tool also learns relationships between people and other entities.
The fully functional prototype system allows users to explore and navigate
multilingual document collections across languages and time.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 11:54:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steinberger",
"Ralf",
"",
"European Commission\n - Joint Research Centre"
],
[
"Pouliquen",
"Bruno",
"",
"European Commission\n - Joint Research Centre"
],
[
"Ignat",
"Camelia",
"",
"European Commission\n - Joint Research Centre"
]
] |
cs/0609056 | Leonid Vaserstein | L. N. Vaserstein | Matrix Games, Linear Programming, and Linear Approximation | 5 pages | null | null | null | cs.GT cs.AI | null | The following four classes of computational problems are equivalent: solving
matrix games, solving linear programs, best $l^{\infty}$ linear approximation,
best $l^1$ linear approximation.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 00:10:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vaserstein",
"L. N.",
""
]
] |
cs/0609057 | Yi Deng | Yi Deng, Giovanni Di Crescenzo and Dongdai Lin | Concurrently Non-Malleable Zero Knowledge in the Authenticated
Public-Key Model | null | null | null | null | cs.CR | null | We consider a type of zero-knowledge protocols that are of interest for their
practical applications within networks like the Internet: efficient
zero-knowledge arguments of knowledge that remain secure against concurrent
man-in-the-middle attacks. In an effort to reduce the setup assumptions
required for efficient zero-knowledge arguments of knowledge that remain secure
against concurrent man-in-the-middle attacks, we consider a model, which we
call the Authenticated Public-Key (APK) model. The APK model seems to
significantly reduce the setup assumptions made by the CRS model (as no trusted
party or honest execution of a centralized algorithm are required), and can be
seen as a slightly stronger variation of the Bare Public-Key (BPK) model from
\cite{CGGM,MR}, and a weaker variation of the registered public-key model used
in \cite{BCNP}. We then define and study man-in-the-middle attacks in the APK
model. Our main result is a constant-round concurrent non-malleable
zero-knowledge argument of knowledge for any polynomial-time relation
(associated to a language in $\mathcal{NP}$), under the (minimal) assumption of
the existence of a one-way function family. Furthermore,We show time-efficient
instantiations of our protocol based on known number-theoretic assumptions. We
also note a negative result with respect to further reducing the setup
assumptions of our protocol to those in the (unauthenticated) BPK model, by
showing that concurrently non-malleable zero-knowledge arguments of knowledge
in the BPK model are only possible for trivial languages.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 06:20:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Deng",
"Yi",
""
],
[
"Di Crescenzo",
"Giovanni",
""
],
[
"Lin",
"Dongdai",
""
]
] |
cs/0609058 | Ralf Steinberger | Ralf Steinberger, Bruno Pouliquen, Anna Widiger, Camelia Ignat, Tomaz
Erjavec, Dan Tufis, Daniel Varga | The JRC-Acquis: A multilingual aligned parallel corpus with 20+
languages | A multilingual textual resource with meta-data freely available for
download at http://langtech.jrc.it/JRC-Acquis.html | Proceedings of the 5th International Conference on Language
Resources and Evaluation (LREC'2006), pp. 2142-2147. Genoa, Italy, 24-26 May
2006 | null | null | cs.CL | null | We present a new, unique and freely available parallel corpus containing
European Union (EU) documents of mostly legal nature. It is available in all 20
official EUanguages, with additional documents being available in the languages
of the EU candidate countries. The corpus consists of almost 8,000 documents
per language, with an average size of nearly 9 million words per language.
Pair-wise paragraph alignment information produced by two different aligners
(Vanilla and HunAlign) is available for all 190+ language pair combinations.
Most texts have been manually classified according to the EUROVOC subject
domains so that the collection can also be used to train and test multi-label
classification algorithms and keyword-assignment software. The corpus is
encoded in XML, according to the Text Encoding Initiative Guidelines. Due to
the large number of parallel texts in many languages, the JRC-Acquis is
particularly suitable to carry out all types of cross-language research, as
well as to test and benchmark text analysis software across different languages
(for instance for alignment, sentence splitting and term extraction).
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 07:10:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steinberger",
"Ralf",
""
],
[
"Pouliquen",
"Bruno",
""
],
[
"Widiger",
"Anna",
""
],
[
"Ignat",
"Camelia",
""
],
[
"Erjavec",
"Tomaz",
""
],
[
"Tufis",
"Dan",
""
],
[
"Varga",
"Daniel",
""
]
] |
cs/0609059 | Ralf Steinberger | Bruno Pouliquen, Ralf Steinberger, Camelia Ignat | Automatic annotation of multilingual text collections with a conceptual
thesaurus | 10 pages | Proceedings of the Workshop 'Ontologies and Information
Extraction' at the Summer School 'The Semantic Web and Language Technology -
Its Potential and Practicalities' (EUROLAN'2003), pp 9-28. Bucharest,
Romania, 28 July - 8 August 2003 | null | null | cs.CL cs.IR | null | Automatic annotation of documents with controlled vocabulary terms
(descriptors) from a conceptual thesaurus is not only useful for document
indexing and retrieval. The mapping of texts onto the same thesaurus
furthermore allows to establish links between similar documents. This is also a
substantial requirement of the Semantic Web. This paper presents an almost
language-independent system that maps documents written in different languages
onto the same multilingual conceptual thesaurus, EUROVOC. Conceptual thesauri
differ from Natural Language Thesauri in that they consist of relatively small
controlled lists of words or phrases with a rather abstract meaning. To
automatically identify which thesaurus descriptors describe the contents of a
document best, we developed a statistical, associative system that is trained
on texts that have previously been indexed manually. In addition to describing
the large number of empirically optimised parameters of the fully functional
application, we present the performance of the software according to a human
evaluation by professional indexers.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 07:24:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
""
],
[
"Steinberger",
"Ralf",
""
],
[
"Ignat",
"Camelia",
""
]
] |
cs/0609060 | Ralf Steinberger | Bruno Pouliquen, Ralf Steinberger, Camelia Ignat | Automatic Identification of Document Translations in Large Multilingual
Document Collections | This technology is used daily to link related news items across
languages in the multilingual news analysis system NewsExplorer, which is
freely accessible at http://press.jrc.it/NewsExplorer . 8 pages | Proceedings of the International Conference 'Recent Advances in
Natural Language Processing' (RANLP'2003), pp. 401-408. Borovets, Bulgaria,
10 - 12 September 2003 | null | null | cs.CL cs.IR | null | Texts and their translations are a rich linguistic resource that can be used
to train and test statistics-based Machine Translation systems and many other
applications. In this paper, we present a working system that can identify
translations and other very similar documents among a large number of
candidates, by representing the document contents with a vector of thesaurus
terms from a multilingual thesaurus, and by then measuring the semantic
similarity between the vectors. Tests on different text types have shown that
the system can detect translations with over 96% precision in a large search
space of 820 documents or more. The system was tuned to ignore
language-specific similarities and to give similar documents in a second
language the same similarity score as equivalent documents in the same
language. The application can also be used to detect cross-lingual document
plagiarism.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 08:44:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
""
],
[
"Steinberger",
"Ralf",
""
],
[
"Ignat",
"Camelia",
""
]
] |
cs/0609061 | Ralf Steinberger | Ralf Steinberger (European Commission - Joint Research Centre) | Cross-lingual keyword assignment | Precursor paper to cs.CL/0609059. The automatic classification system
described here has now matured and is in daily use for document indexing in a
European parliament. See http://langtech.jrc.it/Eurovoc.html for more
details. 8 pages | Proceedings of the XVII Conference of the Spanish Society for
Natural Language Processing (SEPLN-2001). Procesamiento del Lenguaje Natural,
Revista No. 27, pp. 273-280. Jaen, Spain, 12-14 September 2001. ISSN
1135-5948 | null | null | cs.CL cs.IR | null | This paper presents a language-independent approach to controlled vocabulary
keyword assignment using the EUROVOC thesaurus. Due to the multilingual nature
of EUROVOC, the keywords for a document written in one language can be
displayed in all eleven official European Union languages. The mapping of
documents written in different languages to the same multilingual thesaurus
furthermore allows cross-language document comparison. The assignment of the
controlled vocabulary thesaurus descriptors is achieved by applying a
statistical method that uses a collection of manually indexed documents to
identify, for each thesaurus descriptor, a large number of lemmas that are
statistically associated to the descriptor. These associated words are then
used during the assignment procedure to identify a ranked list of those EUROVOC
terms that are most likely to be good keywords for a given document. The paper
also describes the challenges of this task and discusses the achieved results
of the fully functional prototype.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 09:29:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research Centre"
]
] |
cs/0609063 | Ralf Steinberger | Camelia Ignat, Bruno Pouliquen, Antonio Ribeiro, Ralf Steinberger
(European Commission - Joint Research Centre) | Extending an Information Extraction tool set to Central and Eastern
European languages | 7 pages | Proceedings of the International Workshop 'Information Extraction
for Slavonic and other Central and Eastern European Languages' (IESL-2003),
held at RANLP-2003, pp. 33-39. Borovets, Bulgaria, 8 - 9 September 2003 | null | null | cs.CL cs.IR | null | In a highly multilingual and multicultural environment such as in the
European Commission with soon over twenty official languages, there is an
urgent need for text analysis tools that use minimal linguistic knowledge so
that they can be adapted to many languages without much human effort. We are
presenting two such Information Extraction tools that have already been adapted
to various Western and Eastern European languages: one for the recognition of
date expressions in text, and one for the detection of geographical place names
and the visualisation of the results in geographical maps. An evaluation of the
performance has produced very satisfying results.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 12:29:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ignat",
"Camelia",
"",
"European Commission - Joint Research Centre"
],
[
"Pouliquen",
"Bruno",
"",
"European Commission - Joint Research Centre"
],
[
"Ribeiro",
"Antonio",
"",
"European Commission - Joint Research Centre"
],
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research Centre"
]
] |
cs/0609064 | Ralf Steinberger | Ralf Steinberger, Bruno Pouliquen, Camelia Ignat (European Commission
- Joint Research Centre) | Exploiting multilingual nomenclatures and language-independent text
features as an interlingua for cross-lingual text analysis applications | The approach described in this paper is used to link related
documents across languages in the multilingual news analysis system
NewsExplorer, which is freely accessible at http://press.jrc.it/NewsExplorer
. 11 pages | Information Society 2004 (IS-2004) - Proceedings B of the 7th
International Multiconference - Language Technologies, pages 2-12. Ljubljana,
Slovenia, 13-14 October 2004 | null | null | cs.CL cs.IR | null | We are proposing a simple, but efficient basic approach for a number of
multilingual and cross-lingual language technology applications that are not
limited to the usual two or three languages, but that can be applied with
relatively little effort to larger sets of languages. The approach consists of
using existing multilingual linguistic resources such as thesauri,
nomenclatures and gazetteers, as well as exploiting the existence of additional
more or less language-independent text items such as dates, currency
expressions, numbers, names and cognates. Mapping texts onto the multilingual
resources and identifying word token links between texts in different languages
are basic ingredients for applications such as cross-lingual document
similarity calculation, multilingual clustering and categorisation,
cross-lingual document retrieval, and tools to provide cross-lingual
information access.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 12:43:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steinberger",
"Ralf",
"",
"European Commission\n - Joint Research Centre"
],
[
"Pouliquen",
"Bruno",
"",
"European Commission\n - Joint Research Centre"
],
[
"Ignat",
"Camelia",
"",
"European Commission\n - Joint Research Centre"
]
] |
cs/0609065 | Ralf Steinberger | Bruno Pouliquen, Marco Kimler, Ralf Steinberger, Camelia Ignat, Tamara
Oellinger, Ken Blackler, Flavio Fuart, Wajdi Zaghouani, Anna Widiger,
Ann-Charlotte Forslund, Clive Best (European Commission - Joint Research
Centre) | Geocoding multilingual texts: Recognition, disambiguation and
visualisation | 6 pages | Proceedings of the 5th International Conference on Language
Resources and Evaluation (LREC-2006), pp. 53-58. Genoa, Italy, 24-26 May 2006 | null | null | cs.CL cs.IR | null | We are presenting a method to recognise geographical references in free text.
Our tool must work on various languages with a minimum of language-dependent
resources, except a gazetteer. The main difficulty is to disambiguate these
place names by distinguishing places from persons and by selecting the most
likely place out of a list of homographic place names world-wide. The system
uses a number of language-independent clues and heuristics to disambiguate
place name homographs. The final aim is to index texts with the countries and
cities they mention and to automatically visualise this information on
geographical maps using various tools.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 12:57:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
"",
"European Commission - Joint Research\n Centre"
],
[
"Kimler",
"Marco",
"",
"European Commission - Joint Research\n Centre"
],
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research\n Centre"
],
[
"Ignat",
"Camelia",
"",
"European Commission - Joint Research\n Centre"
],
[
"Oellinger",
"Tamara",
"",
"European Commission - Joint Research\n Centre"
],
[
"Blackler",
"Ken",
"",
"European Commission - Joint Research\n Centre"
],
[
"Fuart",
"Flavio",
"",
"European Commission - Joint Research\n Centre"
],
[
"Zaghouani",
"Wajdi",
"",
"European Commission - Joint Research\n Centre"
],
[
"Widiger",
"Anna",
"",
"European Commission - Joint Research\n Centre"
],
[
"Forslund",
"Ann-Charlotte",
"",
"European Commission - Joint Research\n Centre"
],
[
"Best",
"Clive",
"",
"European Commission - Joint Research\n Centre"
]
] |
cs/0609066 | Ralf Steinberger | Bruno Pouliquen, Ralf Steinberger, Camelia Ignat, Tamara Oellinger
(European Commission - Joint Research Centre) | Building and displaying name relations using automatic unsupervised
analysis of newspaper articles | Builds upon the recognition of person names described in paper
cs.CL/0609051. Resulting person relations can be explored in the multilingual
online application NewsExplorer at http://press.jrc.it/NewsExplorer . 12
pages | Proceedings of the 8th International Conference on the Statistical
Analysis of Textual Data (JADT-2006). Besancon, 19-21 April 2006 | null | null | cs.CL cs.IR | null | We present a tool that, from automatically recognised names, tries to infer
inter-person relations in order to present associated people on maps. Based on
an in-house Named Entity Recognition tool, applied on clusters of an average of
15,000 news articles per day, in 15 different languages, we build a knowledge
base that allows extracting statistical co-occurrences of persons and
visualising them on a per-person page or in various graphs.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 13:09:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
"",
"European Commission - Joint Research Centre"
],
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research Centre"
],
[
"Ignat",
"Camelia",
"",
"European Commission - Joint Research Centre"
],
[
"Oellinger",
"Tamara",
"",
"European Commission - Joint Research Centre"
]
] |
cs/0609067 | Ralf Steinberger | Camelia Ignat, Bruno Pouliquen, Ralf Steinberger, Tomaz Erjavec
(European Commission - Joint Research Centre) | A tool set for the quick and efficient exploration of large document
collections | 10 pages | Proceedings of the Symposium on Safeguards and Nuclear Material
Management. 27th Annual Meeting of the European SAfeguards Research and
Development Association (ESARDA-2005). London, UK, 10-12 May 2005 | null | null | cs.CL cs.IR | null | We are presenting a set of multilingual text analysis tools that can help
analysts in any field to explore large document collections quickly in order to
determine whether the documents contain information of interest, and to find
the relevant text passages. The automatic tool, which currently exists as a
fully functional prototype, is expected to be particularly useful when users
repeatedly have to sieve through large collections of documents such as those
downloaded automatically from the internet. The proposed system takes a whole
document collection as input. It first carries out some automatic analysis
tasks (named entity recognition, geo-coding, clustering, term extraction),
annotates the texts with the generated meta-information and stores the
meta-information in a database. The system then generates a zoomable and
hyperlinked geographic map enhanced with information on entities and terms
found. When the system is used on a regular basis, it builds up a historical
database that contains information on which names have been mentioned together
with which other names or places, and users can query this database to retrieve
information extracted in the past.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 13:30:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ignat",
"Camelia",
"",
"European Commission - Joint Research Centre"
],
[
"Pouliquen",
"Bruno",
"",
"European Commission - Joint Research Centre"
],
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research Centre"
],
[
"Erjavec",
"Tomaz",
"",
"European Commission - Joint Research Centre"
]
] |
cs/0609068 | Jeremie Leguay M. | Vania Conan, Jeremie Leguay, Timur Friedman | The heterogeneity of inter-contact time distributions: its importance
for routing in delay tolerant networks | 6 pages | null | null | null | cs.NI | null | Prior work on routing in delay tolerant networks (DTNs) has commonly made the
assumption that each pair of nodes shares the same inter-contact time
distribution as every other pair. The main argument in this paper is that
researchers should also be looking at heterogeneous inter-contact time
distributions. We demonstrate the presence of such heterogeneity in the
often-used Dartmouth Wi-Fi data set. We also show that DTN routing can benefit
from knowing these distributions. We first introduce a new stochastic model
focusing on the inter-contact time distributions between all pairs of nodes,
which we validate on real connectivity patterns. We then analytically derive
the mean delivery time for a bundle of information traversing the network for
simple single copy routing schemes. The purpose is to examine the theoretic
impact of heterogeneous inter-contact time distributions. Finally, we show that
we can exploit this user diversity to improve routing performance.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 15:25:29 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jan 2007 10:20:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Conan",
"Vania",
""
],
[
"Leguay",
"Jeremie",
""
],
[
"Friedman",
"Timur",
""
]
] |
cs/0609069 | S. M. Nazrul Alam | S. M. Nazrul Alam and Zygmunt J. Haas | Coverage and Connectivity in Three-Dimensional Networks | To appear in ACM Mobicom 2006 | null | null | null | cs.NI | null | Most wireless terrestrial networks are designed based on the assumption that
the nodes are deployed on a two-dimensional (2D) plane. However, this 2D
assumption is not valid in underwater, atmospheric, or space communications. In
fact, recent interest in underwater acoustic ad hoc and sensor networks hints
at the need to understand how to design networks in 3D. Unfortunately, the
design of 3D networks is surprisingly more difficult than the design of 2D
networks. For example, proofs of Kelvin's conjecture and Kepler's conjecture
required centuries of research to achieve breakthroughs, whereas their 2D
counterparts are trivial to solve. In this paper, we consider the coverage and
connectivity issues of 3D networks, where the goal is to find a node placement
strategy with 100% sensing coverage of a 3D space, while minimizing the number
of nodes required for surveillance. Our results indicate that the use of the
Voronoi tessellation of 3D space to create truncated octahedral cells results
in the best strategy. In this truncated octahedron placement strategy, the
transmission range must be at least 1.7889 times the sensing range in order to
maintain connectivity among nodes. If the transmission range is between 1.4142
and 1.7889 times the sensing range, then a hexagonal prism placement strategy
or a rhombic dodecahedron placement strategy should be used. Although the
required number of nodes in the hexagonal prism and the rhombic dodecahedron
placement strategies is the same, this number is 43.25% higher than the number
of nodes required by the truncated octahedron placement strategy. We verify by
simulation that our placement strategies indeed guarantee ubiquitous coverage.
We believe that our approach and our results presented in this paper could be
used for extending the processes of 2D network design to 3D networks.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 17:35:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alam",
"S. M. Nazrul",
""
],
[
"Haas",
"Zygmunt J.",
""
]
] |
cs/0609070 | Thomas Way | Joseph Distasio and Thomas P. Way | Exploring Computer Science Concepts with a Ready-made Computer Game
Framework | 5 pages, 3 figures | null | null | null | cs.OH | null | Leveraging the prevailing interest in computer games among college students,
both for entertainment and as a possible career path, is a major reason for the
increasing prevalence of computer game design courses in computer science
curricula. Because implementing a computer game requires strong programming
skills, game design courses are most often restricted to more advanced computer
science students. This paper reports on a ready-made game design and
experimentation framework, implemented in Java, that makes game programming
more widely accessible. This framework, called Labyrinth, enables students at
all programming skill levels to participate in computer game design. We
describe the architecture of the framework, and discuss programming projects
suitable for a wide variety of computer science courses, from capstone to
non-major.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 19:49:55 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Sep 2006 20:10:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Distasio",
"Joseph",
""
],
[
"Way",
"Thomas P.",
""
]
] |
Subsets and Splits