id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-21 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0605126 | David Bunde | David P. Bunde | Power-aware scheduling for makespan and flow | 13 pages, 3 figures. To appear in 18th ACM Symposium on Parallelism
in Algorithms and Architectures (SPAA), 2006 | null | null | null | cs.DS | null | We consider offline scheduling algorithms that incorporate speed scaling to
address the bicriteria problem of minimizing energy consumption and a
scheduling metric. For makespan, we give linear-time algorithms to compute all
non-dominated solutions for the general uniprocessor problem and for the
multiprocessor problem when every job requires the same amount of work. We also
show that the multiprocessor problem becomes NP-hard when jobs can require
different amounts of work.
For total flow, we show that the optimal flow corresponding to a particular
energy budget cannot be exactly computed on a machine supporting arithmetic and
the extraction of roots. This hardness result holds even when scheduling
equal-work jobs on a uniprocessor. We do, however, extend previous work by
Pruhs et al. to give an arbitrarily-good approximation for scheduling
equal-work jobs on a multiprocessor.
| [
{
"version": "v1",
"created": "Fri, 26 May 2006 21:57:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bunde",
"David P.",
""
]
] |
cs/0605127 | Daniel Lemire | Steven Keith, Owen Kaser, Daniel Lemire | Analyzing Large Collections of Electronic Text Using OLAP | null | null | null | TR-05-001 | cs.DB cs.DL | null | Computer-assisted reading and analysis of text has various applications in
the humanities and social sciences. The increasing size of many electronic text
archives has the advantage of a more complete analysis but the disadvantage of
taking longer to obtain results. On-Line Analytical Processing is a method used
to store and quickly analyze multidimensional data. By storing text analysis
information in an OLAP system, a user can obtain solutions to inquiries in a
matter of seconds as opposed to minutes, hours, or even days. This analysis is
user-driven allowing various users the freedom to pursue their own direction of
research.
| [
{
"version": "v1",
"created": "Sat, 27 May 2006 00:51:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Keith",
"Steven",
""
],
[
"Kaser",
"Owen",
""
],
[
"Lemire",
"Daniel",
""
]
] |
cs/0605128 | Riccardo Pucella | Alexander Kurz | Logic Column 15: Coalgebras and Their Logics | 21 pages | SIGACT News 37 (2), pp. 57-77, 2006 | null | null | cs.LO | null | This article describes recent work on the topic of specifying properties of
transition systems. By giving a suitably abstract description of transition
systems as coalgebras, it is possible to derive logics for capturing properties
of these transition systems in an elegant way.
| [
{
"version": "v1",
"created": "Sun, 28 May 2006 19:30:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kurz",
"Alexander",
""
]
] |
cs/0605131 | Simon Morgan | Simon P Morgan | Notes on Geometric Measure Theory Applications to Image Processing;
De-noising, Segmentation, Pattern, Texture, Lines, Gestalt and Occlusion | 9 pages, no figures. This informal discussion paper will be updated
periodically | null | null | null | cs.CV | null | Regularization functionals that lower level set boundary length when used
with L^1 fidelity functionals on signal de-noising on images create artifacts.
These are (i) rounding of corners, (ii) shrinking of radii, (iii) shrinking of
cusps, and (iv) non-smoothing of staircasing. Regularity functionals based upon
total curvature of level set boundaries do not create artifacts (i) and (ii).
An adjusted fidelity term based on the flat norm on the current (a
distributional graph) representing the density of curvature of level sets
boundaries can minimize (iii) by weighting the position of a cusp. A regularity
term to eliminate staircasing can be based upon the mass of the current
representing the graph of an image function or its second derivatives.
Densities on the Grassmann bundle of the Grassmann bundle of the ambient space
of the graph can be used to identify patterns, textures, occlusion and lines.
| [
{
"version": "v1",
"created": "Mon, 29 May 2006 13:27:38 GMT"
},
{
"version": "v2",
"created": "Tue, 30 May 2006 05:50:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Morgan",
"Simon P",
""
]
] |
cs/0605132 | Krzysztof R. Apt | Krzysztof R. Apt and Tadeusz Radzik | Stable partitions in coalitional games | 18 pages | null | null | null | cs.GT cs.MA | null | We propose a notion of a stable partition in a coalitional game that is
parametrized by the concept of a defection function. This function assigns to
each partition of the grand coalition a set of different coalition arrangements
for a group of defecting players. The alternatives are compared using their
social welfare. We characterize the stability of a partition for a number of
most natural defection functions and investigate whether and how so defined
stable partitions can be reached from any initial partition by means of simple
transformations. The approach is illustrated by analyzing an example in which a
set of stores seeks an optimal transportation arrangement.
| [
{
"version": "v1",
"created": "Mon, 29 May 2006 16:03:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Radzik",
"Tadeusz",
""
]
] |
cs/0605133 | Benoit Donnet | Benoit Donnet Philippe Raoult Timur Friedman | Efficient Route Tracing from a Single Source | null | null | null | null | cs.NI | null | Traceroute is a networking tool that allows one to discover the path that
packets take from a source machine, through the network, to a destination
machine. It is widely used as an engineering tool, and also as a scientific
tool, such as for discovery of the network topology at the IP level. In prior
work, authors on this technical report have shown how to improve the efficiency
of route tracing from multiple cooperating monitors. However, it is not unusual
for a route tracing monitor to operate in isolation. Somewhat different
strategies are required for this case, and this report is the first systematic
study of those requirements. Standard traceroute is inefficient when used
repeatedly towards multiple destinations, as it repeatedly probes the same
interfaces close to the source. Others have recognized this inefficiency and
have proposed tracing backwards from the destinations and stopping probing upon
encounter with a previously-seen interface. One of this technical report's
contributions is to quantify for the first time the efficiency of this
approach. Another contribution is to describe the effect of non-responding
destinations on this efficiency. Since a large portion of destination machines
do not reply to probe packets, backwards probing from the destination is often
infeasible. We propose an algorithm to tackle non-responding destinations, and
we find that our algorithm can strongly decrease probing redundancy at the cost
of a small reduction in node and link discovery.
| [
{
"version": "v1",
"created": "Mon, 29 May 2006 16:08:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedman",
"Benoit Donnet Philippe Raoult Timur",
""
]
] |
cs/0605134 | Boon-Chong Seet | Boon-Chong Seet, Bu-Sung Lee, and Chiew-Tong Lau | DSR with Non-Optimal Route Suppression for MANETs | 10 pages, 17 figures | null | null | null | cs.NI | null | This paper revisits the issue of route discovery in dynamic source routing
(DSR) for mobile ad hoc networks (MANETs), and puts forward a proposal of a
lightweight non-optimal route suppression technique based on the observation of
a rarely noted but commonly occurring phenomenon in route discovery. The
technique exploits the observed phenomenon to extract query state information
that permits intermediate nodes to identify and suppress the initiation of
route replies with non-optimal routes, even if the route query is received for
the first time. A detailed evaluation of DSR with non-optimal route suppression
is found to yield significant improvements in both protocol efficiency and
performance.
| [
{
"version": "v1",
"created": "Mon, 29 May 2006 17:33:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Seet",
"Boon-Chong",
""
],
[
"Lee",
"Bu-Sung",
""
],
[
"Lau",
"Chiew-Tong",
""
]
] |
cs/0605136 | Bourgeois Gerald | Gerald Bourgeois | Attaque algebrique de NTRU a l'aide des vecteurs de Witt | 6 pages; correction of the miscalculations | null | null | null | cs.CR | null | One improves an algebraic attack of NTRU due to Silverman, Smart and
Vercauteren; the latter considered the first 2 bits of a Witt vector attached
to the research of the secret key; here the first 4 bits are considered, which
provides additional equations of degrees 4 and 8.
| [
{
"version": "v1",
"created": "Mon, 29 May 2006 22:42:24 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jun 2006 22:44:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bourgeois",
"Gerald",
""
]
] |
cs/0605138 | Victor Kryssanov | V.V. Kryssanov, V.A. Abramov, Y. Fukuda, K. Konishi | The meaning of manufacturing know-how | 12 pages. Preprint completed in March 1998. Presented in part at
PROLAMAT'98 | In: G. Jacucci, G.J. Olling, K. Preiss, and M. Wozny (eds), The
Globalization of Manufacturing in the Digital Communications Era of the 21st
Century: Innovation, Agility and the Virtual Enterprise, pp. 375-387. 1998,
Kluwer Academic Publishers | null | null | cs.AI cs.CE | null | This paper investigates the phenomenon of manufacturing know-how. First, the
abstract notion of knowledge is discussed, and a terminological basis is
introduced to treat know-how as a kind of knowledge. Next, a brief survey of
the recently reported works dealt with manufacturing know-how is presented, and
an explicit definition of know-how is formulated. Finally, the problem of
utilizing know-how with knowledge-based systems is analyzed, and some ideas
useful for its solving are given.
| [
{
"version": "v1",
"created": "Tue, 30 May 2006 05:12:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Abramov",
"V. A.",
""
],
[
"Fukuda",
"Y.",
""
],
[
"Konishi",
"K.",
""
]
] |
cs/0605139 | Na Li | Na Li and Wen-Feng Qi | Construction and Count of Boolean Functions of an Odd Number of
Variables with Maximum Algebraic Immunity | This paper has been submitted on March 9, 2006 | null | null | null | cs.CR | null | Algebraic immunity has been proposed as an important property of Boolean
functions. To resist algebraic attack, a Boolean function should possess high
algebraic immunity. It is well known now that the algebraic immunity of an
$n$-variable Boolean function is upper bounded by $\left\lceil {\frac{n}{2}}
\right\rceil $. In this paper, for an odd integer $n$, we present a
construction method which can efficiently generate a Boolean function of $n$
variables with maximum algebraic immunity, and we also show that any such
function can be generated by this method. Moreover, the number of such Boolean
functions is greater than $2^{2^{n-1}}$.
| [
{
"version": "v1",
"created": "Tue, 30 May 2006 16:54:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Na",
""
],
[
"Qi",
"Wen-Feng",
""
]
] |
cs/0606001 | David Steurer | David Steurer | Tight Bounds for the Min-Max Boundary Decomposition Cost of Weighted
Graphs | 41 pages, full version of a paper that will appear in SPAA`06 | null | null | null | cs.DS cs.DM | null | Many load balancing problems that arise in scientific computing applications
ask to partition a graph with weights on the vertices and costs on the edges
into a given number of almost equally-weighted parts such that the maximum
boundary cost over all parts is small.
Here, this partitioning problem is considered for bounded-degree graphs
G=(V,E) with edge costs c: E->R+ that have a p-separator theorem for some p>1,
i.e., any (arbitrarily weighted) subgraph of G can be separated into two parts
of roughly the same weight by removing a vertex set S such that the edges
incident to S in the subgraph have total cost at most proportional to (SUM_e
c^p_e)^(1/p), where the sum is over all edges e in the subgraph.
We show for all positive integers k and weights w that the vertices of G can
be partitioned into k parts such that the weight of each part differs from the
average weight by less than MAX{w_v; v in V}, and the boundary edges of each
part have cost at most proportional to (SUM_e c_e^p/k)^(1/p) + MAX_e c_e. The
partition can be computed in time nearly proportional to the time for computing
a separator S of G.
Our upper bound on the boundary costs is shown to be tight up to a constant
factor for infinitely many instances with a broad range of parameters. Previous
results achieved this bound only if one has c=1, w=1, and one allows parts with
weight exceeding the average by a constant fraction.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2006 01:47:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steurer",
"David",
""
]
] |
cs/0606003 | David Lorenz | Sergei Kojarski and David H. Lorenz | Modeling Aspect Mechanisms: A Top-Down Approach | null | In Proceedings of the 28th International Conference on Software
Engineering (ICSE'06), pages 212--221, Shanghai, China, May 20-28, 2006 | null | CS-2006-04 | cs.SE cs.PL | null | A plethora of diverse aspect mechanisms exist today, all of which integrate
concerns into artifacts that exhibit crosscutting structure. What we lack and
need is a characterization of the design space that these aspect mechanisms
inhabit and a model description of their weaving processes. A good design space
representation provides a common framework for understanding and evaluating
existing mechanisms. A well-understood model of the weaving process can guide
the implementor of new aspect mechanisms. It can guide the designer when
mechanisms implementing new kinds of weaving are needed. It can also help teach
aspect-oriented programming (AOP). In this paper we present and evaluate such a
model of the design space for aspect mechanisms and their weaving processes. We
model weaving, at an abstract level, as a concern integration process. We
derive a weaving process model (WPM) top-down, differentiating a reactive from
a nonreactive process. The model provides an in-depth explanation of the key
subpro existing aspect mechanisms.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2006 02:14:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kojarski",
"Sergei",
""
],
[
"Lorenz",
"David H.",
""
]
] |
cs/0606004 | Victor Kryssanov | V.V. Kryssanov, V.A. Abramov, H. Hibino, Y. Fukuda | A Framework for the Development of Manufacturing Simulators: Towards New
Generation of Simulation Systems | 9 pages, 6 figures. Preprint completed in 1998 | In: H. Fujimoto and R.E. DeVor (eds), Proceedings of the 1998
Japan-U.S.A. Symposium on Flexible Automation. 1998, Vol. III, pp. 1307-1314 | null | null | cs.CE cs.HC | null | In this paper, an attempt is made to systematically discuss the development
of simulation systems for manufacturing system design. General requirements on
manufacturing simulators are formulated and a framework to address the
requirements is suggested. Problems of information representation as an
activity underlying simulation are considered. This is to form the necessary
mathematical foundation for manufacturing simulations. The theoretical findings
are explored through a pilot study. A conclusion about the suitability of the
suggested approach to the development of simulation systems for manufacturing
system design is made, and implications for future research are described.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2006 02:36:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Abramov",
"V. A.",
""
],
[
"Hibino",
"H.",
""
],
[
"Fukuda",
"Y.",
""
]
] |
cs/0606007 | Andrew Pavlo | Andrew Pavlo (1), Christopher Homan (2), Jonathan Schull (2) ((1)
University of Wisconsin-Madison, (2) Rochester Institute of Technology) | A parent-centered radial layout algorithm for interactive graph
visualization and animation | null | null | null | null | cs.HC cs.CG cs.GR | null | We have developed (1) a graph visualization system that allows users to
explore graphs by viewing them as a succession of spanning trees selected
interactively, (2) a radial graph layout algorithm, and (3) an animation
algorithm that generates meaningful visualizations and smooth transitions
between graphs while minimizing edge crossings during transitions and in static
layouts.
Our system is similar to the radial layout system of Yee et al. (2001), but
differs primarily in that each node is positioned on a coordinate system
centered on its own parent rather than on a single coordinate system for all
nodes. Our system is thus easy to define recursively and lends itself to
parallelization. It also guarantees that layouts have many nice properties,
such as: it guarantees certain edges never cross during an animation.
We compared the layouts and transitions produced by our algorithms to those
produced by Yee et al. Results from several experiments indicate that our
system produces fewer edge crossings during transitions between graph drawings,
and that the transitions more often involve changes in local scaling rather
than structure.
These findings suggest the system has promise as an interactive graph
exploration tool in a variety of settings.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2006 16:56:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pavlo",
"Andrew",
""
],
[
"Homan",
"Christopher",
""
],
[
"Schull",
"Jonathan",
""
]
] |
cs/0606009 | Lane A. Hemaspaandra | Piotr Faliszewski and Lane A. Hemaspaandra | The Consequences of Eliminating NP Solutions | null | null | null | URCS TR-2006-898 | cs.CC | null | Given a function based on the computation of an NP machine, can one in
general eliminate some solutions? That is, can one in general decrease the
ambiguity? This simple question remains, even after extensive study by many
researchers over many years, mostly unanswered. However, complexity-theoretic
consequences and enabling conditions are known. In this tutorial-style article
we look at some of those, focusing on the most natural framings: reducing the
number of solutions of NP functions, refining the solutions of NP functions,
and subtracting from or otherwise shrinking #P functions. We will see how small
advice strings are important here, but we also will see how increasing advice
size to achieve robustness is central to the proof of a key ambiguity-reduction
result for NP functions.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2006 01:34:26 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jun 2006 18:01:43 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Jun 2006 18:21:11 GMT"
},
{
"version": "v4",
"created": "Wed, 16 Aug 2006 17:15:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
cs/0606010 | Victor Kryssanov | V.V. Kryssanov, V.A. Abramov, Y. Fukuda, K. Konishi | A Decision-Making Support System Based on Know-How | 6 pages, 5 figures. Preprint completed in 1997 | CIRP Journal of Manufacturing Systems. 1998, Vol. 27, No.4,
427-432 | null | null | cs.CE cs.AI | null | The research results described are concerned with: - developing a domain
modeling method and tools to provide the design and implementation of
decision-making support systems for computer integrated manufacturing; -
building a decision-making support system based on know-how and its software
environment. The research is funded by NEDO, Japan.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2006 03:06:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Abramov",
"V. A.",
""
],
[
"Fukuda",
"Y.",
""
],
[
"Konishi",
"K.",
""
]
] |
cs/0606013 | Manuel Abellanas | M. Abellanas, A. Bajuelos, G. Hern\'andez, F. Hurtado, I. Matos, B.
Palop | Good Illumination of Minimum Range | null | null | null | null | cs.CG | null | A point p is 1-well illuminated by a set F of n point lights if p lies in the
interior of the convex hull of F. This concept corresponds to triangle-guarding
or well-covering. In this paper we consider the illumination range of the light
sources as a parameter to be optimized. First, we solve the problem of
minimizing the light sources' illumination range to 1-well illuminate a given
point p. We also compute a minimal set of light sources that 1-well illuminates
p with minimum illumination range. Second, we solve the problem of minimizing
the light sources' illumination range to 1-well illuminate all the points of a
line segment with an O(n^2) algorithm. Finally, we give an O(n^2 log n)
algorithm for preprocessing the data so that one can obtain the illumination
range needed to 1-well illuminate a point of a line segment in O(log n) time.
These results can be applied to solve problems of 1-well illuminating a
trajectory by approaching it to a polygonal path.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2006 11:24:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abellanas",
"M.",
""
],
[
"Bajuelos",
"A.",
""
],
[
"Hernández",
"G.",
""
],
[
"Hurtado",
"F.",
""
],
[
"Matos",
"I.",
""
],
[
"Palop",
"B.",
""
]
] |
cs/0606018 | Matthias Bauer | Matthias Bauer and Benjamin Fabian and Matthias Fischmann and Seda
G\"urses | Emerging Markets for RFID Traces | submitted to WPES2006. Two figures are missing because of latex vs.
pdflatex incompatibilities | null | null | null | cs.CY cs.CR | null | RFID tags are held to become ubiquitous in logistics in the near future, and
item-level tagging will pave the way for Ubiquitous Computing, for example in
application fields like smart homes. Our paper addresses the value and the
production cost of information that can be gathered by observing these tags
over time and different locations. We argue that RFID technology will induce a
thriving market for such information, resulting in easy data access for
analysts to infer business intelligence and individual profiles of unusually
high detail. Understanding these information markets is important for many
reasons: They represent new business opportunities, and market players need to
be aware of their roles in these markets. Policy makers need to confirm that
the market structure will not negatively affect overall welfare. Finally,
though we are not addressing the complex issue of privacy, we are convinced
that market forces will have a significant impact on the effectiveness of
deployed security enhancements to RFID technology. In this paper we take a few
first steps into a relatively new field of economic research and conclude with
a list of research problems that promise deeper insights into the matter.
| [
{
"version": "v1",
"created": "Mon, 5 Jun 2006 15:29:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bauer",
"Matthias",
""
],
[
"Fabian",
"Benjamin",
""
],
[
"Fischmann",
"Matthias",
""
],
[
"Gürses",
"Seda",
""
]
] |
cs/0606020 | Vadim Astakhov | Vadim Astakhov, Tamara Astakhova, Brian Sanders | Imagination as Holographic Processor for Text Animation | 10 pages, 10 figures, prototype presented at 4th International
Conference on Computer Science and its Applications (ICCSA-2006), paper
submited to SIGCHI 2007 | null | null | null | cs.AI | null | Imagination is the critical point in developing of realistic artificial
intelligence (AI) systems. One way to approach imagination would be simulation
of its properties and operations. We developed two models: AI-Brain Network
Hierarchy of Languages and Semantical Holographic Calculus as well as
simulation system ScriptWriter that emulate the process of imagination through
an automatic animation of English texts. The purpose of this paper is to
demonstrate the model and to present ScriptWriter system
http://nvo.sdsc.edu/NVO/JCSG/get_SRB_mime_file2.cgi//home/tamara.sdsc/test/demo.zip?F=/home/tamara.sdsc/test/demo.zip&M=application/x-gtar
for simulation of the imagination.
| [
{
"version": "v1",
"created": "Mon, 5 Jun 2006 23:55:37 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jan 2007 23:47:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Astakhov",
"Vadim",
""
],
[
"Astakhova",
"Tamara",
""
],
[
"Sanders",
"Brian",
""
]
] |
cs/0606021 | Victor Kryssanov | H. Tamaki, V.V. Kryssanov, S. Kitamura | A simulation engine to support production scheduling using
genetics-based machine learning | 8 pages, 2 figures, 1 table. Preprint completed in 1998 | In: K. Mertins, O. Krause, and B. Schallock (eds), Global
Production Management, pp. 482-489. 1999, Kluwer Academic Publishers | null | null | cs.CE cs.AI | null | The ever higher complexity of manufacturing systems, continually shortening
life cycles of products and their increasing variety, as well as the unstable
market situation of the recent years require introducing grater flexibility and
responsiveness to manufacturing processes. From this perspective, one of the
critical manufacturing tasks, which traditionally attract significant attention
in both academia and the industry, but which have no satisfactory universal
solution, is production scheduling. This paper proposes an approach based on
genetics-based machine learning (GBML) to treat the problem of flow shop
scheduling. By the approach, a set of scheduling rules is represented as an
individual of genetic algorithms, and the fitness of the individual is
estimated based on the makespan of the schedule generated by using the
rule-set. A concept of the interactive software environment consisting of a
simulator and a GBML simulation engine is introduced to support human
decision-making during scheduling. A pilot study is underway to evaluate the
performance of the GBML technique in comparison with other methods (such as
Johnson's algorithm and simulated annealing) while completing test examples.
| [
{
"version": "v1",
"created": "Tue, 6 Jun 2006 09:30:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tamaki",
"H.",
""
],
[
"Kryssanov",
"V. V.",
""
],
[
"Kitamura",
"S.",
""
]
] |
cs/0606024 | Edgar Graaf de | Edgar de Graaf, Jeannette de Graaf, and Walter A. Kosters | Consecutive Support: Better Be Close! | 10 pages | null | null | null | cs.AI cs.DB | null | We propose a new measure of support (the number of occur- rences of a
pattern), in which instances are more important if they occur with a certain
frequency and close after each other in the stream of trans- actions. We will
explain this new consecutive support and discuss how patterns can be found
faster by pruning the search space, for instance using so-called parent support
recalculation. Both consecutiveness and the notion of hypercliques are
incorporated into the Eclat algorithm. Synthetic examples show how interesting
phenomena can now be discov- ered in the datasets. The new measure can be
applied in many areas, ranging from bio-informatics to trade, supermarkets, and
even law en- forcement. E.g., in bio-informatics it is important to find
patterns con- tained in many individuals, where patterns close together in one
chro- mosome are more significant.
| [
{
"version": "v1",
"created": "Tue, 6 Jun 2006 14:28:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Graaf",
"Edgar",
""
],
[
"de Graaf",
"Jeannette",
""
],
[
"Kosters",
"Walter A.",
""
]
] |
cs/0606027 | Victor Kryssanov | V.V. Kryssanov, A.S. Kleshchev, Y. Fukuda, and K. Konishi | Building a logical model in the machining domain for CAPP expert systems | 25 pages, 4 figures. Preprint completed in 1997 | International Journal of Production Research, 1998, vol. 36, No.
4, 1075-1089 | null | null | cs.AI cs.CE cs.SE | null | Recently, extensive efforts have been made on the application of expert
system technique to solving the process planning task in the machining domain.
This paper introduces a new formal method to design CAPP expert systems. The
formal method is applied to provide a contour of the CAPP expert system
building technology. Theoretical aspects of the formalism are described and
illustrated by an example of know-how analysis. Flexible facilities to utilize
multiple knowledge types and multiple planning strategies within one system are
provided by the technology.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 03:46:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Kleshchev",
"A. S.",
""
],
[
"Fukuda",
"Y.",
""
],
[
"Konishi",
"K.",
""
]
] |
cs/0606028 | Evgenia Adutskevich | E.V. Adutskevich, S.V. Bakhanovich, N.A. Likhoded | Affine Transformations of Loop Nests for Parallel Execution and
Distribution of Data over Processors | 9 pages | Preprint / The National Academy of Sciences of Belarus. Institute
of Mathematics: N 3 (574). Minsk, 2005 | null | null | cs.DC | null | The paper is devoted to the problem of mapping affine loop nests onto
distributed memory parallel computers. A method to find affine transformations
of loop nests for parallel execution and distribution of data over processors
is presented. The method tends to minimize the number of communications between
processors and to improve locality of data within one processor. A problem of
determination of data exchange sequence is investigated. Conditions to
determine the ability to arrange broadcast is presented.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 12:59:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Adutskevich",
"E. V.",
""
],
[
"Bakhanovich",
"S. V.",
""
],
[
"Likhoded",
"N. A.",
""
]
] |
cs/0606029 | Audun Josang | Audun Josang | Belief Calculus | 22 pages, 10 figures | null | null | null | cs.AI | null | In Dempster-Shafer belief theory, general beliefs are expressed as belief
mass distribution functions over frames of discernment. In Subjective Logic
beliefs are expressed as belief mass distribution functions over binary frames
of discernment. Belief representations in Subjective Logic, which are called
opinions, also contain a base rate parameter which express the a priori belief
in the absence of evidence. Philosophically, beliefs are quantitative
representations of evidence as perceived by humans or by other intelligent
agents. The basic operators of classical probability calculus, such as addition
and multiplication, can be applied to opinions, thereby making belief calculus
practical. Through the equivalence between opinions and Beta probability
density functions, this also provides a calculus for Beta probability density
functions. This article explains the basic elements of belief calculus.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 14:32:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Josang",
"Audun",
""
]
] |
cs/0606031 | Guillaume Moroz | Guillaume Moroz (LIP6, INRIA Rocquencourt) | Complexity of Resolution of Parametric Systems of Polynomial Equations
and Inequations | null | null | null | null | cs.SC | null | Consider a system of n polynomial equations and r polynomial inequations in n
indeterminates of degree bounded by d with coefficients in a polynomial ring of
s parameters with rational coefficients of bit-size at most $\sigma$. From the
real viewpoint, solving such a system often means describing some
semi-algebraic sets in the parameter space over which the number of real
solutions of the considered parametric system is constant. Following the works
of Lazard and Rouillier, this can be done by the computation of a discriminant
variety. In this report we focus on the case where for a generic specialization
of the parameters the system of equations generates a radical zero-dimensional
ideal, which is usual in the applications. In this case, we provide a
deterministic method computing the minimal discriminant variety reducing the
problem to a problem of elimination. Moreover, we prove that the degree of the
computed minimal discriminant variety is bounded by $D:=(n+r)d^{(n+1)}$ and
that the complexity of our method is $\sigma^{\mathcal{O}(1)}
D^{\mathcal{O}(n+s)}$ bit-operations on a deterministic Turing machine.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 14:44:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Moroz",
"Guillaume",
"",
"LIP6, INRIA Rocquencourt"
]
] |
cs/0606032 | Andreas U. Schmidt | Christian Hett, Nicolai Kuntze, and Andreas U. Schmidt | A secure archive for Voice-over-IP conversations | 9 pages, 2 figures. (C) ACM, (2006). This is the author's version of
the work. It is posted here by permission of ACM for your personal use. Not
for redistribution. The definitive version was published in Proceedings of
VSW06, June, 2006, Berlin, Germany | null | null | null | cs.CR | null | An efficient archive securing the integrity of VoIP-based two-party
conversations is presented. The solution is based on chains of hashes and
continuously chained electronic signatures. Security is concentrated in a
single, efficient component, allowing for a detailed analysis.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 17:04:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hett",
"Christian",
""
],
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0606033 | Michael Stay | Cristian S. Calude and Michael A. Stay | Natural Halting Probabilities, Partial Randomness, and Zeta Functions | Accepted for publication in Information and Computing | null | null | CDMTCS 273 | cs.CC | null | We introduce the zeta number, natural halting probability and natural
complexity of a Turing machine and we relate them to Chaitin's Omega number,
halting probability, and program-size complexity. A classification of Turing
machines according to their zeta numbers is proposed: divergent, convergent and
tuatara. We prove the existence of universal convergent and tuatara machines.
Various results on (algorithmic) randomness and partial randomness are proved.
For example, we show that the zeta number of a universal tuatara machine is
c.e. and random. A new type of partial randomness, asymptotic randomness, is
introduced. Finally we show that in contrast to classical (algorithmic)
randomness--which cannot be naturally characterised in terms of plain
complexity--asymptotic randomness admits such a characterisation.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 20:18:13 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Jul 2006 21:35:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Calude",
"Cristian S.",
""
],
[
"Stay",
"Michael A.",
""
]
] |
cs/0606034 | Teddy Furon | Teddy Furon (IRISA) | A constructive and unifying framework for zero-bit watermarking | submitted to IEEE Trans. on Information Forensics and Security | null | null | null | cs.MM cs.CR | null | In the watermark detection scenario, also known as zero-bit watermarking, a
watermark, carrying no hidden message, is inserted in content. The watermark
detector checks for the presence of this particular weak signal in content. The
article looks at this problem from a classical detection theory point of view,
but with side information enabled at the embedding side. This means that the
watermark signal is a function of the host content. Our study is twofold. The
first step is to design the best embedding function for a given detection
function, and the best detection function for a given embedding function. This
yields two conditions, which are mixed into one `fundamental' partial
differential equation. It appears that many famous watermarking schemes are
indeed solution to this `fundamental' equation. This study thus gives birth to
a constructive framework unifying solutions, so far perceived as very
different.
| [
{
"version": "v1",
"created": "Thu, 8 Jun 2006 13:28:07 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jan 2007 13:11:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Furon",
"Teddy",
"",
"IRISA"
]
] |
cs/0606038 | Shripad Thite | Shripad Thite | Tight Bounds on the Complexity of Recognizing Odd-Ranked Elements | 3 pages | null | null | null | cs.CC cs.DS | null | Let S = <s_1, s_2, s_3, ..., s_n> be a given vector of n real numbers. The
rank of a real z with respect to S is defined as the number of elements s_i in
S such that s_i is less than or equal to z. We consider the following decision
problem: determine whether the odd-numbered elements s_1, s_3, s_5, ... are
precisely the elements of S whose rank with respect to S is odd. We prove a
bound of Theta(n log n) on the number of operations required to solve this
problem in the algebraic computation tree model.
| [
{
"version": "v1",
"created": "Thu, 8 Jun 2006 21:28:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thite",
"Shripad",
""
]
] |
cs/0606039 | Victor Kryssanov | V.V. Kryssanov, H. Tamaki, S. Kitamura | Evolutionary Design: Philosophy, Theory, and Application Tactics | 6 pages, 3 figures. Preprint completed in 1999 | CIRP Journal of Manufacturing Systems, 2005, Vol. 34/2 | null | null | cs.CE cs.AI | null | Although it has contributed to remarkable improvements in some specific
areas, attempts to develop a universal design theory are generally
characterized by failure. This paper sketches arguments for a new approach to
engineering design based on Semiotics - the science about signs. The approach
is to combine different design theories over all the product life cycle stages
into one coherent and traceable framework. Besides, it is to bring together the
designer's and user's understandings of the notion of 'good product'. Building
on the insight from natural sciences that complex systems always exhibit a
self-organizing meaning-influential hierarchical dynamics, objective laws
controlling product development are found through an examination of design as a
semiosis process. These laws are then applied to support evolutionary design of
products. An experiment validating some of the theoretical findings is
outlined, and concluding remarks are given.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2006 08:00:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Tamaki",
"H.",
""
],
[
"Kitamura",
"S.",
""
]
] |
cs/0606041 | Ming-Zhe Chen | Ming-Zhe Chen | Characterization of Pentagons Determined by Two X-rays | 4 pages, 2 figures | null | null | null | cs.CG | null | This paper contains some results of pentagons which can be determined by two
X-rays. The results reveal this problem is more complicated.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2006 14:13:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Ming-Zhe",
""
]
] |
cs/0606042 | Laurent Hascoet | Laurent Hascoet (INRIA Sophia Antipolis), Mauricio Araya-Polo (INRIA
Sophia Antipolis) | Enabling user-driven Checkpointing strategies in Reverse-mode Automatic
Differentiation | null | null | null | null | cs.DS | null | This paper presents a new functionality of the Automatic Differentiation (AD)
tool Tapenade. Tapenade generates adjoint codes which are widely used for
optimization or inverse problems. Unfortunately, for large applications the
adjoint code demands a great deal of memory, because it needs to store a large
set of intermediates values. To cope with that problem, Tapenade implements a
sub-optimal version of a technique called checkpointing, which is a trade-off
between storage and recomputation. Our long-term goal is to provide an optimal
checkpointing strategy for every code, not yet achieved by any AD tool. Towards
that goal, we first introduce modifications in Tapenade in order to give the
user the choice to select the checkpointing strategy most suitable for their
code. Second, we conduct experiments in real-size scientific codes in order to
gather hints that help us to deduce an optimal checkpointing strategy. Some of
the experimental results show memory savings up to 35% and execution time up to
90%.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2006 16:01:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hascoet",
"Laurent",
"",
"INRIA Sophia Antipolis"
],
[
"Araya-Polo",
"Mauricio",
"",
"INRIA\n Sophia Antipolis"
]
] |
cs/0606043 | Pierre Lopez | Christian Artigues (LIA), Pierre Lopez (LAAS), Pierre-Dimitri Ayache
(LIA) | Schedule generation schemes for the job-shop problem with
sequence-dependent setup times: dominance properties and computational
analysis | null | Annals of Operations Research 138 (2005) 21-52 | null | null | cs.CC math.CO | null | We consider the job-shop problem with sequence-dependent setup times. We
focus on the formal definition of schedule generation schemes (SGSs) based on
the semi-active, active, and non-delay schedule categories. We study dominance
properties of the sets of schedules obtainable with each SGS. We show how the
proposed SGSs can be used within single-pass and multi-pass priority rule based
heuristics. We study several priority rules for the problem and provide a
comparative computational analysis of the different SGSs on sets of instances
taken from the literature. The proposed SGSs significantly improve previously
best-known results on a set of hard benchmark instances.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2006 16:32:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Artigues",
"Christian",
"",
"LIA"
],
[
"Lopez",
"Pierre",
"",
"LAAS"
],
[
"Ayache",
"Pierre-Dimitri",
"",
"LIA"
]
] |
cs/0606045 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Trusted Computing in Mobile Action | In: Peer-reviewed Proceedings of the Information Security South
Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006,
Sandton, South Africa | null | null | null | cs.CR | null | Due to the convergence of various mobile access technologies like UMTS, WLAN,
and WiMax the need for a new supporting infrastructure arises. This
infrastructure should be able to support more efficient ways to authenticate
users and devices, potentially enabling novel services based on the security
provided by the infrastructure. In this paper we exhibit some usage scenarios
from the mobile domain integrating trusted computing, which show that trusted
computing offers new paradigms for implementing trust and by this enables new
technical applications and business scenarios. The scenarios show how the
traditional boundaries between technical and authentication domains become
permeable while a high security level is maintained.
| [
{
"version": "v1",
"created": "Sat, 10 Jun 2006 09:52:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0606046 | Andreas U. Schmidt | Jan Piechalski and Andreas U. Schmidt | Authorised Translations of Electronic Documents | In: Peer-reviewed Proceedings of the Information Security South
Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006,
Sandton, South Africa | null | null | null | cs.OH | null | A concept is proposed to extend authorised translations of documents to
electronically signed, digital documents. Central element of the solution is an
electronic seal, embodied as an XML data structure, which attests to the
correctness of the translation and the authorisation of the translator. The
seal contains a digital signature binding together original and translated
document, thus enabling forensic inspection and therefore legal security in the
appropriation of the translation. Organisational aspects of possible
implementation variants of electronic authorised translations are discussed and
a realisation as a stand-alone web-service is presented.
| [
{
"version": "v1",
"created": "Sat, 10 Jun 2006 10:37:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Piechalski",
"Jan",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0606047 | Giorgos Kollias | Giorgos Kollias, Efstratios Gallopoulos, Daniel B. Szyld | Asynchronous iterative computations with Web information retrieval
structures: The PageRank case | 8 pages to appear at ParCo2005 Conference Proceedings | null | null | TR HPCLAB-SCG 5/08-05 | cs.DC | null | There are several ideas being used today for Web information retrieval, and
specifically in Web search engines. The PageRank algorithm is one of those that
introduce a content-neutral ranking function over Web pages. This ranking is
applied to the set of pages returned by the Google search engine in response to
posting a search query. PageRank is based in part on two simple common sense
concepts: (i)A page is important if many important pages include links to it.
(ii)A page containing many links has reduced impact on the importance of the
pages it links to. In this paper we focus on asynchronous iterative schemes to
compute PageRank over large sets of Web pages. The elimination of the
synchronizing phases is expected to be advantageous on heterogeneous platforms.
The motivation for a possible move to such large scale distributed platforms
lies in the size of matrices representing Web structure. In orders of
magnitude: $10^{10}$ pages with $10^{11}$ nonzero elements and $10^{12}$ bytes
just to store a small percentage of the Web (the already crawled); distributed
memory machines are necessary for such computations. The present research is
part of our general objective, to explore the potential of asynchronous
computational models as an underlying framework for very large scale
computations over the Grid. The area of ``internet algorithmics'' appears to
offer many occasions for computations of unprecedent dimensionality that would
be good candidates for this framework.
| [
{
"version": "v1",
"created": "Sun, 11 Jun 2006 09:36:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kollias",
"Giorgos",
""
],
[
"Gallopoulos",
"Efstratios",
""
],
[
"Szyld",
"Daniel B.",
""
]
] |
cs/0606050 | Prabhu Manyem | Prabhu Manyem | Syntactic Characterisations of Polynomial-Time Optimisation Classes
(Syntactic Characterizations of Polynomial-Time Optimization Classes) | 17 pages; presented at the July 2005 ACiD workshop at Durham,
England; Included both American and British commonwealth spellings, so as to
generate hits from readers in North America as well as from Commonwealth
countries and Europe | null | null | null | cs.CC cs.LO | null | In Descriptive Complexity, there is a vast amount of literature on decision
problems, and their classes such as \textbf{P, NP, L and NL}. ~ However,
research on the descriptive complexity of optimisation problems has been
limited. Optimisation problems corresponding to the \textbf{NP} class have been
characterised in terms of logic expressions by Papadimitriou and Yannakakis,
Panconesi and Ranjan, Kolaitis and Thakur, Khanna et al, and by Zimand.
Gr\"{a}del characterised the polynomial class \textbf{P} of decision problems.
In this paper, we attempt to characterise the optimisation versions of
\textbf{P} via expressions in second order logic, many of them using universal
Horn formulae with successor relations. The polynomially bound versions of
maximisation (maximization) and minimisation (minimization) problems are
treated first, and then the maximisation problems in the "not necessarily
polynomially bound" class.
| [
{
"version": "v1",
"created": "Mon, 12 Jun 2006 00:42:29 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Oct 2006 23:49:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Manyem",
"Prabhu",
""
]
] |
cs/0606054 | Qiming Lu | Qiming Lu, Gyorgy Korniss, Boleslaw K. Szymanski | Threshold-Controlled Global Cascading in Wireless Sensor Networks | null | Proceeding of third International Conference on Networked Sensing
Systems, 164-171 (TRF, 2006) | null | null | cs.NI | null | We investigate cascade dynamics in threshold-controlled (multiplex)
propagation on random geometric networks. We find that such local dynamics can
serve as an efficient, robust, and reliable prototypical activation protocol in
sensor networks in responding to various alarm scenarios. We also consider the
same dynamics on a modified network by adding a few long-range communication
links, resulting in a small-world network. We find that such construction can
further enhance and optimize the speed of the network's response, while keeping
energy consumption at a manageable level.
| [
{
"version": "v1",
"created": "Mon, 12 Jun 2006 19:30:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lu",
"Qiming",
""
],
[
"Korniss",
"Gyorgy",
""
],
[
"Szymanski",
"Boleslaw K.",
""
]
] |
cs/0606055 | Jean Gallier | Jean Gallier | Simple Methods For Drawing Rational Surfaces as Four or Six Bezier
Patches | 33 pages | null | null | null | cs.CG cs.GR | null | In this paper, we give several simple methods for drawing a whole rational
surface (without base points) as several Bezier patches. The first two methods
apply to surfaces specified by triangular control nets and partition the real
projective plane RP2 into four and six triangles respectively. The third method
applies to surfaces specified by rectangular control nets and partitions the
torus RP1 X RP1 into four rectangular regions. In all cases, the new control
nets are obtained by sign flipping and permutation of indices from the original
control net. The proofs that these formulae are correct involve very little
computations and instead exploit the geometry of the parameter space (RP2 or
RP1 X RP1). We illustrate our method on some classical examples. We also
propose a new method for resolving base points using a simple ``blowing up''
technique involving the computation of ``resolved'' control nets.
| [
{
"version": "v1",
"created": "Mon, 12 Jun 2006 22:02:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gallier",
"Jean",
""
]
] |
cs/0606056 | Jean Gallier | Jean Gallier and Weqing Gu | Fast and Simple Methods For Computing Control Points | 15 pages | null | null | null | cs.CC cs.GR | null | The purpose of this paper is to present simple and fast methods for computing
control points for polynomial curves and polynomial surfaces given explicitly
in terms of polynomials (written as sums of monomials). We give recurrence
formulae w.r.t. arbitrary affine frames. As a corollary, it is amusing that we
can also give closed-form expressions in the case of the frame (r, s) for
curves, and the frame ((1, 0, 0), (0, 1, 0), (0, 0, 1) for surfaces. Our
methods have the same low polynomial (time and space) complexity as the other
best known algorithms, and are very easy to implement.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 00:47:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gallier",
"Jean",
""
],
[
"Gu",
"Weqing",
""
]
] |
cs/0606057 | Fredrik Kuivinen | Fredrik Kuivinen | Approximability of Bounded Occurrence Max Ones | Accepted to MFCS 2006 | null | null | null | cs.CC | null | We study the approximability of Max Ones when the number of variable
occurrences is bounded by a constant. For conservative constraint languages
(i.e., when the unary relations are included) we give a complete classification
when the number of occurrences is three or more and a partial classification
when the bound is two.
For the non-conservative case we prove that it is either trivial or
equivalent to the corresponding conservative problem under polynomial-time
many-one reductions.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 06:44:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuivinen",
"Fredrik",
""
]
] |
cs/0606058 | Philippe Chapdelaine | Philippe Chapdelaine, Etienne Grandjean | Lower bounds and complete problems in nondeterministic linear time and
sublinear space complexity classes | 19 pages, 4 figures | null | null | null | cs.CC cs.LO | null | Proving lower bounds remains the most difficult of tasks in computational
complexity theory. In this paper, we show that whereas most natural NP-complete
problems belong to NLIN (linear time on nondeterministic RAMs), some of them,
typically the planar versions of many NP-complete problems are recognized by
nondeterministic RAMs in linear time and sublinear space. The main results of
this paper are the following: as the second author did for NLIN, we give exact
logical characterizations of nondeterministic polynomial time-space complexity
classes; we derive from them a class of problems, which are complete in these
classes, and as a consequence of such a precise result and of some recent
separation theorems using diagonalization, prove time-space lower bounds for
these problems.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 08:10:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chapdelaine",
"Philippe",
""
],
[
"Grandjean",
"Etienne",
""
]
] |
cs/0606060 | Luciano da Fontoura Costa | Luciano da Fontoura Costa | Complex Networks: New Concepts and Tools for Real-Time Imaging and
Vision | 3 pages | null | null | null | cs.CV cs.DC physics.soc-ph | null | This article discusses how concepts and methods of complex networks can be
applied to real-time imaging and computer vision. After a brief introduction of
complex networks basic concepts, their use as means to represent and
characterize images, as well as for modeling visual saliency, are briefly
described. The possibility to apply complex networks in order to model and
simulate the performance of parallel and distributed computing systems for
performance of visual methods is also proposed.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 12:53:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Costa",
"Luciano da Fontoura",
""
]
] |
cs/0606061 | Jean Gallier | Jean Gallier | On the Efficiency of Strategies for Subdividing Polynomial Triangular
Surface Patches | 20 pages | null | null | null | cs.CG cs.GR | null | In this paper, we investigate the efficiency of various strategies for
subdividing polynomial triangular surface patches. We give a simple algorithm
performing a regular subdivision in four calls to the standard de Casteljau
algorithm (in its subdivision version). A naive version uses twelve calls. We
also show that any method for obtaining a regular subdivision using the
standard de Casteljau algorithm requires at least 4 calls. Thus, our method is
optimal. We give another subdivision algorithm using only three calls to the de
Casteljau algorithm. Instead of being regular, the subdivision pattern is
diamond-like. Finally, we present a ``spider-like'' subdivision scheme
producing six subtriangles in four calls to the de Casteljau algorithm.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 15:09:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gallier",
"Jean",
""
]
] |
cs/0606063 | Adam Slagell | Adam Slagell, Kiran Lakkaraju and Katherine Luo | FLAIM: A Multi-level Anonymization Framework for Computer and Network
Logs | 16 pages, 4 figures, in submission to USENIX Lisa | null | null | null | cs.CR | null | FLAIM (Framework for Log Anonymization and Information Management) addresses
two important needs not well addressed by current log anonymizers. First, it is
extremely modular and not tied to the specific log being anonymized. Second, it
supports multi-level anonymization, allowing system administrators to make
fine-grained trade-offs between information loss and privacy/security concerns.
In this paper, we examine anonymization solutions to date and note the above
limitations in each. We further describe how FLAIM addresses these problems,
and we describe FLAIM's architecture and features in detail.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2006 03:17:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slagell",
"Adam",
""
],
[
"Lakkaraju",
"Kiran",
""
],
[
"Luo",
"Katherine",
""
]
] |
cs/0606064 | Hongtao Sun | Xin Li, Tian Liu, Han Peng, Hongtao Sun, Jiaqi Zhu | Improved Exponential Time Lower Bound of Knapsack Problem under BT model | 9 pages, 3 figures | null | null | null | cs.CC | null | M.Alekhnovich et al. recently have proposed a model of algorithms, called BT
model, which covers Greedy, Backtrack and Simple Dynamic Programming methods
and can be further divided into fixed, adaptive and fully adaptive three kinds,
and have proved exponential time lower bounds of exact and approximation
algorithms under adaptive BT model for Knapsack problem which are
$\Omega(2^{n/2}/\sqrt n)=\Omega(2^{0.5n}/\sqrt n)$ and
$\Omega((1/\epsilon)^{1/3.17})\approx\Omega((1/\epsilon)^{0.315})$(for
approximation ratio $1-\epsilon$) respectively (M. Alekhovich, A. Borodin, J.
Buresh-Oppenheim, R. Impagliazzo, A. Magen, and T. Pitassi, Toward a Model for
Backtracking and Dynamic Programming, \emph{Proceedings of Twentieth Annual
IEEE Conference on Computational Complexity}, pp308-322, 2005). In this note,
we slightly improved their lower bounds to
$\Omega(2^{(2-\epsilon)n/3}/\sqrt{n})\approx \Omega(2^{0.66n}/\sqrt{n})$ and
$\Omega((1/\epsilon)^{1/2.38})\approx\Omega((1/\epsilon)^{0.420})$, and
proposed as an open question what is the best achievable lower bounds for
knapsack under adaptive BT models.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2006 07:54:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Xin",
""
],
[
"Liu",
"Tian",
""
],
[
"Peng",
"Han",
""
],
[
"Sun",
"Hongtao",
""
],
[
"Zhu",
"Jiaqi",
""
]
] |
cs/0606066 | Audun Josang | Audun Josang | The Cumulative Rule for Belief Fusion | null | null | null | null | cs.AI | null | The problem of combining beliefs in the Dempster-Shafer belief theory has
attracted considerable attention over the last two decades. The classical
Dempster's Rule has often been criticised, and many alternative rules for
belief combination have been proposed in the literature. The consensus operator
for combining beliefs has nice properties and produces more intuitive results
than Dempster's rule, but has the limitation that it can only be applied to
belief distribution functions on binary state spaces. In this paper we present
a generalisation of the consensus operator that can be applied to Dirichlet
belief functions on state spaces of arbitrary size. This rule, called the
cumulative rule of belief combination, can be derived from classical
statistical theory, and corresponds well with human intuition.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2006 11:36:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Josang",
"Audun",
""
]
] |
cs/0606068 | Andreas U. Schmidt | Christian Hett, Nicolai Kuntze, and Andreas U. Schmidt | Security and Non-Repudiation for Voice-Over-IP Conversations | Poster presentation at the ISSA 2006 From Insight to Foresight
Conference, Sandton, South Africa, 5th-7th July 2006 | null | null | null | cs.CR | null | We present a concept to achieve non-repudiation for natural language
conversations by electronically signing packet-based, digital, voice
communication. Signing a VoIP-based conversation means to protect the integrity
and authenticity of the bidirectional data stream and its temporal sequence
which together establish the security context of the communication. Our concept
is conceptually close to the protocols that embody VoIP and provides a high
level of inherent security. It enables signatures over voice as true
declarations of will, in principle between unacquainted speakers. We point to
trusted computing enabled devices as possible trusted signature terminals for
voice communication.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2006 12:24:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hett",
"Christian",
""
],
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0606070 | Shane Legg Mr | Shane Legg | Is there an Elegant Universal Theory of Prediction? | null | null | null | IDSIA - 12 - 06 | cs.AI cs.CC | null | Solomonoff's inductive learning model is a powerful, universal and highly
elegant theory of sequence prediction. Its critical flaw is that it is
incomputable and thus cannot be used in practice. It is sometimes suggested
that it may still be useful to help guide the development of very general and
powerful theories of prediction which are computable. In this paper it is shown
that although powerful algorithms exist, they are necessarily highly complex.
This alone makes their theoretical analysis problematic, however it is further
shown that beyond a moderate level of complexity the analysis runs into the
deeper problem of Goedel incompleteness. This limits the power of mathematics
to analyse and study prediction algorithms, and indeed intelligent systems in
general.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2006 15:22:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Legg",
"Shane",
""
]
] |
cs/0606079 | Stevan Harnad | C. Hajjem, S. Harnad, Y. Gingras | Ten-Year Cross-Disciplinary Comparison of the Growth of Open Access and
How it Increases Research Citation Impact | 10 pages, 5 figures, 3 tables | IEEE Data Engineering Bulletin 28(4): 39-47; 2005 | null | null | cs.DL | null | Lawrence (2001)found computer science articles that were openly accessible
(OA) on the Web were cited more. We replicated this in physics. We tested
1,307,038 articles published across 12 years (1992-2003) in 10 disciplines
(Biology, Psychology, Sociology, Health, Political Science, Economics,
Education, Law, Business, Management). A robot trawls the Web for full-texts
using reference metadata ISI citation data (signal detectability d'=2.45; bias
= 0.52). Percentage OA (relative to total OA + NOA) articles varies from 5%-16%
(depending on discipline, year and country) and is slowly climbing annually
(correlation r=.76, sample size N=12, probability p < 0.005). Comparing OA and
NOA articles in the same journal/year, OA articles have consistently more
citations, the advantage varying from 36%-172% by discipline and year.
Comparing articles within six citation ranges (0, 1, 2-3, 4-7, 8-15, 16+
citations), the annual percentage of OA articles is growing significantly
faster than NOA within every citation range (r > .90, N=12, p < .0005) and the
effect is greater with the more highly cited articles (r = .98, N=6, p < .005).
Causality cannot be determined from these data, but our prior finding of a
similar pattern in physics, where percent OA is much higher (and even
approaches 100% in some subfields), makes it unlikely that the OA citation
advantage is merely or mostly a self-selection bias (for making only one's
better articles OA). Further research will analyze the effect's timing, causal
components and relation to other variables.
| [
{
"version": "v1",
"created": "Sun, 18 Jun 2006 19:51:18 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Aug 2006 17:35:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hajjem",
"C.",
""
],
[
"Harnad",
"S.",
""
],
[
"Gingras",
"Y.",
""
]
] |
cs/0606080 | Philippe Chapdelaine | Philippe Chapdelaine | On the structure of linear-time reducibility | 10 pages | null | null | null | cs.CC | null | In 1975, Ladner showed that under the hypothesis that P is not equal to NP,
there exists a language which is neither in P, nor NP-complete. This result was
latter generalized by Schoning and several authors to various polynomial-time
complexity classes. We show here that such results also apply to linear-time
reductions on RAMs (resp. Turing machines), and hence allow for separation
results in linear-time classes similar to Ladner's ones for polynomial time.
| [
{
"version": "v1",
"created": "Mon, 19 Jun 2006 08:48:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chapdelaine",
"Philippe",
""
]
] |
cs/0606081 | Juergen Schmidhuber | Juergen Schmidhuber | New Millennium AI and the Convergence of History | Speed Prior: clarification / 15 pages, to appear in "Challenges to
Computational Intelligence" | null | null | IDSIA-14-06 | cs.AI | null | Artificial Intelligence (AI) has recently become a real formal science: the
new millennium brought the first mathematically sound, asymptotically optimal,
universal problem solvers, providing a new, rigorous foundation for the
previously largely heuristic field of General AI and embedded agents. At the
same time there has been rapid progress in practical methods for learning true
sequence-processing programs, as opposed to traditional methods limited to
stationary pattern association. Here we will briefly review some of the new
results, and speculate about future developments, pointing out that the time
intervals between the most notable events in over 40,000 years or 2^9 lifetimes
of human history have sped up exponentially, apparently converging to zero
within the next few decades. Or is this impression just a by-product of the way
humans allocate memory space to past events?
| [
{
"version": "v1",
"created": "Mon, 19 Jun 2006 09:13:43 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2006 14:35:37 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Jun 2006 10:05:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidhuber",
"Juergen",
""
]
] |
cs/0606082 | Jonathan Ben-Naim | Jonathan Ben-Naim (LIF) | Lack of Finite Characterizations for the Distance-based Revision | null | Tenth International Conference on Principles of Knowledge
Representation and Reasoning (KR'06) (2006) 239-248 | null | null | cs.LO | null | Lehmann, Magidor, and Schlechta developed an approach to belief revision
based on distances between any two valuations. Suppose we are given such a
distance D. This defines an operator |D, called a distance operator, which
transforms any two sets of valuations V and W into the set V |D W of all
elements of W that are closest to V. This operator |D defines naturally the
revision of K by A as the set of all formulas satisfied in M(K) |D M(A) (i.e.
those models of A that are closest to the models of K). This constitutes a
distance-based revision operator. Lehmann et al. characterized families of them
using a loop condition of arbitrarily big size. An interesting question is
whether this loop condition can be replaced by a finite one. Extending the
results of Schlechta, we will provide elements of negative answer. In fact, we
will show that for families of distance operators, there is no "normal"
characterization. Approximatively, a normal characterization contains only
finite and universally quantified conditions. These results have an interest of
their own for they help to understand the limits of what is possible in this
area. Now, we are quite confident that this work can be continued to show
similar impossibility results for distance-based revision operators, which
suggests that the big loop condition cannot be simplified.
| [
{
"version": "v1",
"created": "Mon, 19 Jun 2006 09:34:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ben-Naim",
"Jonathan",
"",
"LIF"
]
] |
cs/0606085 | Daniil Ryabko | Boris Ryabko, Daniil Ryabko | Provably Secure Universal Steganographic Systems | 11 pages | null | null | Cryptology ePrint Archive, Report 2006/063 | cs.CR | null | We propose a simple universal (that is, distribution--free) steganographic
system in which covertexts with and without hidden texts are statistically
indistinguishable. The stegosystem can be applied to any source generating
i.i.d. covertexts with unknown distribution, and the hidden text is transmitted
exactly, with zero probability of error. Moreover, the proposed steganographic
system has two important properties. First, the rate of transmission of hidden
information approaches the Shannon entropy of the covertext source as the size
of blocks used for hidden text encoding tends to infinity. Second, if the size
of the alphabet of the covertext source and its minentropy tend to infinity
then the number of bits of hidden text per letter of covertext tends to
$\log(n!)/n$ where $n$ is the (fixed) size of blocks used for hidden text
encoding. The proposed stegosystem uses randomization.
| [
{
"version": "v1",
"created": "Tue, 20 Jun 2006 08:41:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ryabko",
"Boris",
""
],
[
"Ryabko",
"Daniil",
""
]
] |
cs/0606086 | Marie-Claude Gaudel | Alain Denise (LRI), Marie-Claude Gaudel (LRI), Sandrine-Dominique
Gouraud (LRI), Richard Lasseigne (ELM), Sylvain Peyronnet (ELM), the RaST
Collaboration | Uniform Random Sampling of Traces in Very Large Models | null | First International Workshop on Random Testing, \'{E}tats-Unis
d'Am\'{e}rique (2006) 10-19 | null | null | cs.LO | null | This paper presents some first results on how to perform uniform random walks
(where every trace has the same probability to occur) in very large models. The
models considered here are described in a succinct way as a set of
communicating reactive modules. The method relies upon techniques for counting
and drawing uniformly at random words in regular languages. Each module is
considered as an automaton defining such a language. It is shown how it is
possible to combine local uniform drawings of traces, and to obtain some global
uniform random sampling, without construction of the global model.
| [
{
"version": "v1",
"created": "Tue, 20 Jun 2006 09:53:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Denise",
"Alain",
"",
"LRI"
],
[
"Gaudel",
"Marie-Claude",
"",
"LRI"
],
[
"Gouraud",
"Sandrine-Dominique",
"",
"LRI"
],
[
"Lasseigne",
"Richard",
"",
"ELM"
],
[
"Peyronnet",
"Sylvain",
"",
"ELM"
],
[
"Collaboration",
"the RaST",
""
]
] |
cs/0606088 | Paulo Condado | Paulo A. Condado, Fernando G. Lobo | Breaking barriers for people with voice disabilities: Combining virtual
keyboards with speech synthesizers, and VoIP applications | null | null | null | Also UAlg-ILAB Report No. 200604 | cs.CY | null | Text-to-speech technology has been broadly used to help people with voice
disabilities to overcome their difficulties. With text-to-speech, a person
types at a keyboard, the text is synthesized, and the sound comes out through
the computer speakers.
In recent years, Voice over IP (VoIP) applications have become very popular
and have been used by people worldwide. These applications allow people to talk
for free over the Internet and also to make traditional calls through the
Public-Switched Telephone Network (PSTN) at a small fraction of the cost
offered by traditional phone companies.
We have created a system, called EasyVoice, which integrates speech
synthesizers with VoIP applications. The result allows a person with motor
impairments and voice disabilities to talk with another person located anywhere
in the world. The benefits in this case are much stronger than the ones
obtained by non-disabled people using VoIP applications. People with motor
impairments sometimes can hardly use a regular or mobile phone. Thus, the
advantage is not only the reduction in cost, but more important, the ability to
talk at all.
| [
{
"version": "v1",
"created": "Tue, 20 Jun 2006 12:22:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Condado",
"Paulo A.",
""
],
[
"Lobo",
"Fernando G.",
""
]
] |
cs/0606089 | William Yurcik | Charis Ermopoulos and William Yurcik | NVision-PA: A Tool for Visual Analysis of Command Behavior Based on
Process Accounting Logs (with a Case Study in HPC Cluster Security) | 25 pages, 13 Figures | null | null | null | cs.CR cs.DC | null | In the UNIX/Linux environment the kernel can log every command process
created by every user with process accounting. Thus process accounting logs
have many potential uses, particularly the monitoring and forensic
investigation of security events. Previous work successfully leveraged the use
of process accounting logs to identify a difficult to detect and damaging
intrusion against high performance computing (HPC) clusters, masquerade
attacks, where intruders masquerade as legitimate users with purloined
authentication credentials. While masqueraders on HPC clusters were found to be
identifiable with a high accuracy (greater than 90%), this accuracy is still
not high enough for HPC production environments where greater than 99% accuracy
is needed.
This paper incrementally advances the goal of more accurately identifying
masqueraders on HPC clusters by seeking to identify features within command
sets that distinguish masqueraders. To accomplish this goal, we created
NVision-PA, a software tool that produces text and graphic statistical
summaries describing input processing accounting logs. We report NVision-PA
results describing two different process accounting logs; one from Internet
usage and one from HPC cluster usage. These results identify the distinguishing
features of Internet users (as proxies for masqueraders) posing as clusters
users. This research is both a promising next step toward creating a real-time
masquerade detection sensor for production HPC clusters as well as providing
another tool for system administrators to use for statistically monitoring and
managing legitimate workloads (as indicated by command usage) in HPC
environments.
| [
{
"version": "v1",
"created": "Tue, 20 Jun 2006 16:53:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ermopoulos",
"Charis",
""
],
[
"Yurcik",
"William",
""
]
] |
cs/0606093 | Vladimir Vovk | Vladimir Vovk | Predictions as statements and decisions | 48 pages | null | null | null | cs.LG | null | Prediction is a complex notion, and different predictors (such as people,
computer programs, and probabilistic theories) can pursue very different goals.
In this paper I will review some popular kinds of prediction and argue that the
theory of competitive on-line learning can benefit from the kinds of prediction
that are now foreign to it.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 04:31:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0606094 | Frank Neven | Wim Martens, Frank Neven, and Marc Gyssens | On Typechecking Top-Down XML Tranformations: Fixed Input or Output
Schemas | null | null | null | null | cs.DB cs.PL | null | Typechecking consists of statically verifying whether the output of an XML
transformation always conforms to an output type for documents satisfying a
given input type. In this general setting, both the input and output schema as
well as the transformation are part of the input for the problem. However,
scenarios where the input or output schema can be considered to be fixed, are
quite common in practice. In the present work, we investigate the computational
complexity of the typechecking problem in the latter setting.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 09:46:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Martens",
"Wim",
""
],
[
"Neven",
"Frank",
""
],
[
"Gyssens",
"Marc",
""
]
] |
cs/0606095 | Jean Krivine | Jean Krivine (INRIA Rocquencourt) | A verification algorithm for Declarative Concurrent Programming | null | null | null | null | cs.DC | null | A verification method for distributed systems based on decoupling forward and
backward behaviour is proposed. This method uses an event structure based
algorithm that, given a CCS process, constructs its causal compression relative
to a choice of observable actions. Verifying the original process equipped with
distributed backtracking on non-observable actions, is equivalent to verifying
its relative compression which in general is much smaller. We call this method
Declarative Concurrent Programming (DCP). DCP technique compares well with
direct bisimulation based methods. Benchmarks for the classic dining
philosophers problem show that causal compression is rather efficient both
time- and space-wise. State of the art verification tools can successfully
handle more than 15 agents, whereas they can handle no more than 5 following
the traditional direct method; an altogether spectacular improvement, since in
this example the specification size is exponential in the number of agents.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 13:23:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krivine",
"Jean",
"",
"INRIA Rocquencourt"
]
] |
cs/0606096 | Hendrik Feddes | Lea Cyrus | Building a resource for studying translation shifts | 6 pages, 1 figure | Proc. LREC 2006, Genoa, May 24-26, 2006; pp. 1240-1245 | null | null | cs.CL | null | This paper describes an interdisciplinary approach which brings together the
fields of corpus linguistics and translation studies. It presents ongoing work
on the creation of a corpus resource in which translation shifts are explicitly
annotated. Translation shifts denote departures from formal correspondence
between source and target text, i.e. deviations that have occurred during the
translation process. A resource in which such shifts are annotated in a
systematic way will make it possible to study those phenomena that need to be
addressed if machine translation output is to resemble human translation. The
resource described in this paper contains English source texts (parliamentary
proceedings) and their German translations. The shift annotation is based on
predicate-argument structures and proceeds in two steps: first, predicates and
their arguments are annotated monolingually in a straightforward manner. Then,
the corresponding English and German predicates and arguments are aligned with
each other. Whenever a shift - mainly grammatical or semantic -has occurred,
the alignment is tagged accordingly.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 13:26:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cyrus",
"Lea",
""
]
] |
cs/0606097 | Andrew Krizhanovsky A | A. Krizhanovsky | Synonym search in Wikipedia: Synarcher | 4 pages, 2 figures, Synarcher program is available at
http://synarcher.sourceforge.net | null | null | null | cs.IR cs.DM | null | The program Synarcher for synonym (and related terms) search in the text
corpus of special structure (Wikipedia) was developed. The results of the
search are presented in the form of graph. It is possible to explore the graph
and search for graph elements interactively. Adapted HITS algorithm for synonym
search, program architecture, and program work evaluation with test examples
are presented in the paper. The proposed algorithm can be applied to a query
expansion by synonyms (in a search engine) and a synonym dictionary forming.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 14:17:26 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2006 05:10:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krizhanovsky",
"A.",
""
]
] |
cs/0606101 | Marc Daumas | Marc Daumas (LIRMM, Lp2a), David Lester (LP2A, University of
Manchester) | Stochastic Formal Methods: An application to accuracy of numeric
software | null | null | null | null | cs.MS | null | This paper provides a bound on the number of numeric operations (fixed or
floating point) that can safely be performed before accuracy is lost. This work
has important implications for control systems with safety-critical software,
as these systems are now running fast enough and long enough for their errors
to impact on their functionality. Furthermore, worst-case analysis would
blindly advise the replacement of existing systems that have been successfully
running for years. We present here a set of formal theorems validated by the
PVS proof assistant. These theorems will allow code analyzing tools to produce
formal certificates of accurate behavior. For example, FAA regulations for
aircraft require that the probability of an error be below $10^{-9}$ for a 10
hour flight.
| [
{
"version": "v1",
"created": "Fri, 23 Jun 2006 08:26:56 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Sep 2006 11:51:28 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Oct 2006 19:41:07 GMT"
},
{
"version": "v4",
"created": "Tue, 19 Dec 2006 17:10:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daumas",
"Marc",
"",
"LIRMM, Lp2a"
],
[
"Lester",
"David",
"",
"LP2A, University of\n Manchester"
]
] |
cs/0606107 | Uma Murthy | Ingrid Burbey, Gyuhyun Kwon, Uma Murthy, Nicholas Polys and Prince
Vincent | Human Information Processing with the Personal Memex | null | null | null | null | cs.HC | null | In this report, we describe the work done in a project that explored the
human information processing aspects of a personal memex (a memex to organize
personal information). In the project, we considered the use of the personal
memex, focusing on information recall, by three populations: people with Mild
Cognitive Impairment, those diagnosed with Macular Degeneration, and a
high-functioning population. The outcomes of the project included human
information processing-centered design guidelines for the memex interface, a
low-fidelity prototype, and an annotated bibliography for human information
processing, usability and design literature relating to the memex and the
populations we explored.
| [
{
"version": "v1",
"created": "Mon, 26 Jun 2006 15:58:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burbey",
"Ingrid",
""
],
[
"Kwon",
"Gyuhyun",
""
],
[
"Murthy",
"Uma",
""
],
[
"Polys",
"Nicholas",
""
],
[
"Vincent",
"Prince",
""
]
] |
cs/0606110 | Richard Weber | Jochen Mundinger, Richard R. Weber and Gideon Weiss | Optimal Scheduling of Peer-to-Peer File Dissemination | 27 pages, 3 figures. (v2) added a note about possible strengthening
of Theorem 5 at end of proof; updated some references | null | null | null | cs.NI cs.DS math.OC | null | Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are
increasingly used for disseminating potentially large files from a server to
many end users via the Internet. The key idea is to divide the file into many
equally-sized parts and then let users download each part (or, for network
coding based systems such as Avalanche, linear combinations of the parts)
either from the server or from another user who has already downloaded it.
However, their performance evaluation has typically been limited to comparing
one system relative to another and typically been realized by means of
simulation and measurements. In contrast, we provide an analytic performance
analysis that is based on a new uplink-sharing version of the well-known
broadcasting problem. Assuming equal upload capacities, we show that the
minimal time to disseminate the file is the same as for the simultaneous
send/receive version of the broadcasting problem. For general upload
capacities, we provide a mixed integer linear program (MILP) solution and a
complementary fluid limit solution. We thus provide a lower bound which can be
used as a performance benchmark for any P2P file dissemination system. We also
investigate the performance of a decentralized strategy, providing evidence
that the performance of necessarily decentralized P2P file dissemination
systems should be close to this bound and therefore that it is useful in
practice.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2006 08:11:57 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jun 2006 07:17:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mundinger",
"Jochen",
""
],
[
"Weber",
"Richard R.",
""
],
[
"Weiss",
"Gideon",
""
]
] |
cs/0606111 | Hind El Haouzi | Hind El Haouzi (CRAN) | Models simulation and interoperability using MDA and HLA | 8 pages | Doctoral Symposium, IFAC/IFIP International conference on
Interoperability for Enterprise Applications and Software (I-ESA'2006), March
22-24, 2006,, France (2006) | null | null | cs.OH | null | In the manufacturing context, there have been numerous efforts to use
modeling and simulation tools and techniques to improve manufacturing
efficiency over the last four decades. While an increasing number of
manufacturing system decisions are being made based on the use of models, their
use is still sporadic in many manufacturing environments. Our paper advocates
for an approach combining MDA (model driven architecture) and HLA (High Level
Architecture), the IEEE standard for modeling and simulation, in order to
overcome the deficiencies of current simulation methods at the level of
interoperability and reuse.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2006 14:55:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haouzi",
"Hind El",
"",
"CRAN"
]
] |
cs/0606115 | Jos\'e Borges | Jose Borges and Mark Levene | Evaluating Variable Length Markov Chain Models for Analysis of User Web
Navigation Sessions | null | null | null | null | cs.AI cs.IR | null | Markov models have been widely used to represent and analyse user web
navigation data. In previous work we have proposed a method to dynamically
extend the order of a Markov chain model and a complimentary method for
assessing the predictive power of such a variable length Markov chain. Herein,
we review these two methods and propose a novel method for measuring the
ability of a variable length Markov model to summarise user web navigation
sessions up to a given length. While the summarisation ability of a model is
important to enable the identification of user navigation patterns, the ability
to make predictions is important in order to foresee the next link choice of a
user after following a given trail so as, for example, to personalise a web
site. We present an extensive experimental evaluation providing strong evidence
that prediction accuracy increases linearly with summarisation ability.
| [
{
"version": "v1",
"created": "Wed, 28 Jun 2006 08:26:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borges",
"Jose",
""
],
[
"Levene",
"Mark",
""
]
] |
cs/0606116 | Philip Bille | Philip Bille | New Algorithms for Regular Expression Matching | null | null | null | null | cs.DS | null | In this paper we revisit the classical regular expression matching problem,
namely, given a regular expression $R$ and a string $Q$, decide if $Q$ matches
one of the strings specified by $R$. Let $m$ and $n$ be the length of $R$ and
$Q$, respectively. On a standard unit-cost RAM with word length $w \geq \log
n$, we show that the problem can be solved in $O(m)$ space with the following
running times: \begin{equation*} \begin{cases}
O(n\frac{m \log w}{w} + m \log w) & \text{if $m > w$} \\
O(n\log m + m\log m) & \text{if $\sqrt{w} < m \leq w$} \\
O(\min(n+ m^2, n\log m + m\log m)) & \text{if $m \leq \sqrt{w}$.} \end{cases}
\end{equation*} This improves the best known time bound among algorithms using
$O(m)$ space. Whenever $w \geq \log^2 n$ it improves all known time bounds
regardless of how much space is used.
| [
{
"version": "v1",
"created": "Wed, 28 Jun 2006 10:51:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bille",
"Philip",
""
]
] |
cs/0606119 | Sophie Aubin | Sampo Pyysalo, Tapio Salakoski, Sophie Aubin (LIPN), Adeline Nazarenko
(LIPN) | Lexical Adaptation of Link Grammar to the Biomedical Sublanguage: a
Comparative Evaluation of Three Approaches | null | Proceedings of the Second International Symposium on Semantic
Mining in Biomedicine (SMBM 2006) (2006) 60-67 | null | null | cs.CL cs.IR | null | We study the adaptation of Link Grammar Parser to the biomedical sublanguage
with a focus on domain terms not found in a general parser lexicon. Using two
biomedical corpora, we implement and evaluate three approaches to addressing
unknown words: automatic lexicon expansion, the use of morphological clues, and
disambiguation using a part-of-speech tagger. We evaluate each approach
separately for its effect on parsing performance and consider combinations of
these approaches. In addition to a 45% increase in parsing efficiency, we find
that the best approach, incorporating information from a domain part-of-speech
tagger, offers a statistically signicant 10% relative decrease in error. The
adapted parser is available under an open-source license at
http://www.it.utu.fi/biolg.
| [
{
"version": "v1",
"created": "Wed, 28 Jun 2006 14:44:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pyysalo",
"Sampo",
"",
"LIPN"
],
[
"Salakoski",
"Tapio",
"",
"LIPN"
],
[
"Aubin",
"Sophie",
"",
"LIPN"
],
[
"Nazarenko",
"Adeline",
"",
"LIPN"
]
] |
cs/0606122 | P. Oscar Boykin | Wolfgang Mueller, P. Oscar Boykin, Nima Sarshar, Vwani P. Roychowdhury | Comparison of Image Similarity Queries in P2P Systems | To appear in IEEE P2P2006 | null | null | null | cs.DC cs.NI | null | Given some of the recent advances in Distributed Hash Table (DHT) based
Peer-To-Peer (P2P) systems we ask the following questions: Are there
applications where unstructured queries are still necessary (i.e., the
underlying queries do not efficiently map onto any structured framework), and
are there unstructured P2P systems that can deliver the high bandwidth and
computing performance necessary to support such applications. Toward this end,
we consider an image search application which supports queries based on image
similarity metrics, such as color histogram intersection, and discuss why in
this setting, standard DHT approaches are not directly applicable. We then
study the feasibility of implementing such an image search system on two
different unstructured P2P systems: power-law topology with percolation search,
and an optimized super-node topology using structured broadcasts. We examine
the average and maximum values for node bandwidth, storage and processing
requirements in the percolation and super-node models, and show that current
high-end computers and high-speed links have sufficient resources to enable
deployments of large-scale complex image search systems.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2006 14:28:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mueller",
"Wolfgang",
""
],
[
"Boykin",
"P. Oscar",
""
],
[
"Sarshar",
"Nima",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] |
cs/0606123 | Atos Alves | Atos Ramos Alves | Use MPLS in Lan's | 9 pages, 0 figures tests in laboratory | null | null | null | cs.NI cs.CR | null | To demonstrate the result of researches in laboratory with the focus in
exhibiting the real impact of the use of the technology MPLS in LAN. Through
these researches we will verify that the investment in this technology is
shown, of the point of view cost/benefit, very interesting, being necessary,
however, the adoption of another measured, in order to settle down a
satisfactory level in the items Quality and safety in the sending of packages
in VPN but assisting to the requirement latency of the net very well being
shown in the tests that it consumes on average one Tuesday leaves of the time
spend for the same function in routing IP.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2006 14:44:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alves",
"Atos Ramos",
""
]
] |
cs/0606125 | Leon Moonen | Marius Marin | Formalizing typical crosscutting concerns | 24 pages | null | null | TUD-SERG-2006-010 | cs.SE cs.PL | null | We present a consistent system for referring crosscutting functionality,
relating crosscutting concerns to specific implementation idioms, and
formalizing their underlying relations through queries. The system is based on
generic crosscutting concerns that we organize and describe in a catalog.
We have designed and implemented a tool support for querying source code for
instances of the proposed generic concerns and organizing them in composite
concern models. The composite concern model adds a new dimension to the
dominant decomposition of the system for describing and making explicit source
code relations specific to crosscutting concerns implementations.
We use the proposed approach to describe crosscutting concerns in design
patterns and apply the tool to an opensource system (JHotDraw).
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2006 20:04:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marin",
"Marius",
""
]
] |
cs/0606126 | Eldan Goldenberg | Eldan Goldenberg, Jacob R. Garcowski, Randall D. Beer | May We Have Your Attention: Analysis of a Selective Attention Task | In S. Schaal, A. Ijspeert, A. Billard, S. Vijayakumar, J. Hallam &
J-A. Meyer (Eds.), From Animals to Animats 8: Proceedings of the Eighth
International Conference on the Simulation of Adaptive Behavior (pp 49-56).
MIT Press | null | null | null | cs.NE cs.AI | null | In this paper we present a deeper analysis than has previously been carried
out of a selective attention problem, and the evolution of continuous-time
recurrent neural networks to solve it. We show that the task has a rich
structure, and agents must solve a variety of subproblems to perform well. We
consider the relationship between the complexity of an agent and the ease with
which it can evolve behavior that generalizes well across subproblems, and
demonstrate a shaping protocol that improves generalization.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2006 22:33:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldenberg",
"Eldan",
""
],
[
"Garcowski",
"Jacob R.",
""
],
[
"Beer",
"Randall D.",
""
]
] |
cs/0606127 | Mukund Sundararajan | Tim Roughgarden (Stanford University) and Mukund Sundararajan
(Stanford University) | Approximately Efficient Cost-Sharing Mechanisms | latex source, 22 pages, 1 figure | null | null | null | cs.GT | null | We make three different types of contributions to cost-sharing: First, we
identify several new classes of combinatorial cost functions that admit
incentive-compatible mechanisms achieving both a constant-factor approximation
of budget-balance and a polylogarithmic approximation of the social cost
formulation of efficiency. Second, we prove a new, optimal lower bound on the
approximate efficiency of every budget-balanced Moulin mechanism for Steiner
tree or SSRoB cost functions. This lower bound exposes a latent approximation
hierarchy among different cost-sharing problems. Third, we show that weakening
the definition of incentive-compatibility to strategyproofness can permit
exponentially more efficient approximately budget-balanced mechanisms, in
particular for set cover cost-sharing problems.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2006 02:24:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roughgarden",
"Tim",
"",
"Stanford University"
],
[
"Sundararajan",
"Mukund",
"",
"Stanford University"
]
] |
cs/0606128 | Andrew Krizhanovsky A | A. Krizhanovsky | Automatic forming lists of semantically related terms based on texts
rating in the corpus with hyperlinks and categories (In Russian) | 6 pages, 1 figure, in Russian, PDF, for other formats see
http://whinger.narod.ru/paper/index.html | null | null | null | cs.IR cs.DM | null | HITS adapted algorithm for synonym search, the program architecture, and the
program work evaluation with test examples are presented in the paper.
Synarcher program for synonym (and related terms) search in the text corpus of
special structure (Wikipedia) was developed. The results of search are
presented in the form of a graph. It is possible to explore the graph and
search graph elements interactively. The proposed algorithm could be applied to
the search request extending and for synonym dictionary forming.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2006 15:17:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krizhanovsky",
"A.",
""
]
] |
cs/0607001 | Chinmoy Bhattacharya | Chinmoy Bhattacharya and P.R.Mahapatra | A Novel Application of Lifting Scheme for Multiresolution Correlation of
Complex Radar Signals | null | null | null | null | cs.DC cs.CC | null | The lifting scheme of discrete wavelet transform (DWT) is now quite well
established as an efficient technique for image compression, and has been
incorporated into the JPEG2000 standards. However, the potential of the lifting
scheme has not been exploited in the context of correlationbased processing,
such as encountered in radar applications. This paper presents a complete and
consistent framework for the application of DWT for correlation of complex
signals. In particular, lifting scheme factorization of biorthogonal
filterbanks is carried out in dual analysis basis spaces for multiresolution
correlation of complex radar signals in the DWT domain only. A causal
formulation of lifting for orthogonal filterbank is also developed. The
resulting parallel algorithms and consequent saving of computational effort are
briefly dealt with.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2006 16:58:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bhattacharya",
"Chinmoy",
""
],
[
"Mahapatra",
"P. R.",
""
]
] |
cs/0607005 | Florentin Smarandache | Florentin Smarandache, Jean Dezert | Belief Conditioning Rules (BCRs) | 26 pages | null | null | null | cs.AI | null | In this paper we propose a new family of Belief Conditioning Rules (BCRs) for
belief revision. These rules are not directly related with the fusion of
several sources of evidence but with the revision of a belief assignment
available at a given time according to the new truth (i.e. conditioning
constraint) one has about the space of solutions of the problem.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2006 14:54:54 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Nov 2006 19:14:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] |
cs/0607006 | Leon Moonen | Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella,
and Tom Tourwe | Applying and Combining Three Different Aspect Mining Techniques | 28 pages | null | null | TUD-SERG-2006-002 | cs.SE cs.PL | null | Understanding a software system at source-code level requires understanding
the different concerns that it addresses, which in turn requires a way to
identify these concerns in the source code. Whereas some concerns are
explicitly represented by program entities (like classes, methods and
variables) and thus are easy to identify, crosscutting concerns are not
captured by a single program entity but are scattered over many program
entities and are tangled with the other concerns. Because of their crosscutting
nature, such crosscutting concerns are difficult to identify, and reduce the
understandability of the system as a whole.
In this paper, we report on a combined experiment in which we try to identify
crosscutting concerns in the JHotDraw framework automatically. We first apply
three independently developed aspect mining techniques to JHotDraw and evaluate
and compare their results. Based on this analysis, we present three interesting
combinations of these three techniques, and show how these combinations provide
a more complete coverage of the detected concerns as compared to the original
techniques individually. Our results are a first step towards improving the
understandability of a system that contains crosscutting concerns, and can be
used as a basis for refactoring the identified crosscutting concerns into
aspects.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2006 17:16:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ceccato",
"Mariano",
""
],
[
"Marin",
"Marius",
""
],
[
"Mens",
"Kim",
""
],
[
"Moonen",
"Leon",
""
],
[
"Tonella",
"Paolo",
""
],
[
"Tourwe",
"Tom",
""
]
] |
cs/0607009 | Yuri Pritykin | Yuri Pritykin | Almost Periodicity, Finite Automata Mappings and Related Effectiveness
Issues | 12 pages. Continuation of the results from the paper "Strongly Almost
Periodic Sequences under Finite Automata Mappings" on cs.DM/0605026 Enhanced
version of the talk on Workshop on Words and Automata, St Petersburg, Russia,
June 7th, 2006 (satellite to CSR'06) | null | null | null | cs.DM | null | The paper studies different variants of almost periodicity notion. We
introduce the class of eventually strongly almost periodic sequences where some
suffix is strongly almost periodic (=uniformly recurrent). The class of almost
periodic sequences includes the class of eventually strongly almost periodic
sequences, and we prove this inclusion to be strict. We prove that the class of
eventually strongly almost periodic sequences is closed under finite automata
mappings and finite transducers. Moreover, an effective form of this result is
presented. Finally we consider some algorithmic questions concerning almost
periodicity.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2006 08:27:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pritykin",
"Yuri",
""
]
] |
cs/0607011 | Ayan Mahalanobis | Ayan Mahalanobis | A simple generalization of El-Gamal cryptosystem to non-abelian groups | null | null | null | null | cs.CR math.GR | null | In this paper we study the MOR cryptosystem. We use the group of
unitriangular matrices over a finite field as the non-abelian group in the MOR
cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem
over finite fields can be built using the proposed groups and a set of
automorphisms of these groups. We also show that the security of this proposed
MOR cryptosystem is equivalent to the El-Gamal cryptosystem over finite fields.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2006 11:28:38 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2006 11:32:31 GMT"
},
{
"version": "v3",
"created": "Tue, 11 Jul 2006 12:56:43 GMT"
},
{
"version": "v4",
"created": "Thu, 20 Jul 2006 06:07:39 GMT"
},
{
"version": "v5",
"created": "Mon, 7 May 2007 14:56:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mahalanobis",
"Ayan",
""
]
] |
cs/0607012 | Anne-Marie Vercoustre | Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis),
Mounir Fegas (INRIA Rocquencourt / INRIA Sophia Antipolis), Saba Gul (INRIA
Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt
/ INRIA Sophia Antipolis) | A Flexible Structured-based Representation for XML Document Mining | This is the authors' version. To access the final version go to the
editor's site through the DOI | Dans The Fourth International Workshop of the Initiative for the
Evaluation of XML Retrieval (INEX 2005) | 10.1007/11766278\_34 | null | cs.IR | null | This paper reports on the INRIA group's approach to XML mining while
participating in the INEX XML Mining track 2005. We use a flexible
representation of XML documents that allows taking into account the structure
only or both the structure and content. Our approach consists of representing
XML documents by a set of their sub-paths, defined according to some criteria
(length, root beginning, leaf ending). By considering those sub-paths as words,
we can use standard methods for vocabulary reduction, and simple clustering
methods such as K-means that scale well. We actually use an implementation of
the clustering algorithm known as "dynamic clouds" that can work with distinct
groups of independent variables put in separate variables. This is useful in
our model since embedded sub-paths are not independent: we split potentially
dependant paths into separate variables, resulting in each of them containing
independant paths. Experiments with the INEX collections show good results for
the structure-only collections, but our approach could not scale well for large
structure-and-content collections.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2006 12:07:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vercoustre",
"Anne-Marie",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Fegas",
"Mounir",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Gul",
"Saba",
"",
"INRIA\n Rocquencourt / INRIA Sophia Antipolis"
],
[
"Lechevallier",
"Yves",
"",
"INRIA Rocquencourt\n / INRIA Sophia Antipolis"
]
] |
cs/0607013 | Jan Chomicki | Jan Chomicki | Database Querying under Changing Preferences | Submitted to a journal | null | null | null | cs.DB cs.AI | null | We present here a formal foundation for an iterative and incremental approach
to constructing and evaluating preference queries. Our main focus is on query
modification: a query transformation approach which works by revising the
preference relation in the query. We provide a detailed analysis of the cases
where the order-theoretic properties of the preference relation are preserved
by the revision. We consider a number of different revision operators: union,
prioritized and Pareto composition. We also formulate algebraic laws that
enable incremental evaluation of preference queries. Finally, we consider two
variations of the basic framework: finite restrictions of preference relations
and weak-order extensions of strict partial order preference relations.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2006 18:37:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chomicki",
"Jan",
""
]
] |
cs/0607015 | Juan Valle-Lisboa C | Juan C. Valle-Lisboa (1), Eduardo Mizraji (1) ((1) Seccion Biofisica,
Facultad de Ciencias, Universidad de la Republica) | The uncovering of hidden structures by Latent Semantic Analysis | 51 pages, 7 figures, pdf | null | null | null | cs.IR | null | Latent Semantic Analysis (LSA) is a well known method for information
retrieval. It has also been applied as a model of cognitive processing and
word-meaning acquisition. This dual importance of LSA derives from its capacity
to modulate the meaning of words by contexts, dealing successfully with
polysemy and synonymy. The underlying reasons that make the method work are not
clear enough. We propose that the method works because it detects an underlying
block structure (the blocks corresponding to topics) in the term by document
matrix. In real cases this block structure is hidden because of perturbations.
We propose that the correct explanation for LSA must be searched in the
structure of singular vectors rather than in the profile of singular values.
Using Perron-Frobenius theory we show that the presence of disjoint blocks of
documents is marked by sign-homogeneous entries in the vectors corresponding to
the documents of one block and zeros elsewhere. In the case of nearly disjoint
blocks, perturbation theory shows that if the perturbations are small the zeros
in the leading vectors are replaced by small numbers (pseudo-zeros). Since the
singular values of each block might be very different in magnitude, their order
does not mirror the order of blocks. When the norms of the blocks are similar,
LSA works fine, but we propose that when the topics have different sizes, the
usual procedure of selecting the first k singular triplets (k being the number
of blocks) should be replaced by a method that selects the perturbed Perron
vectors for each block.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2006 22:56:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Valle-Lisboa",
"Juan C.",
""
],
[
"Mizraji",
"Eduardo",
""
]
] |
cs/0607016 | Krzysztof R. Apt | Krzysztof R. Apt and Peter Zoeteweij | An Analysis of Arithmetic Constraints on Integer Intervals | 44 pages, to appear in 'Constraints' journal | null | null | null | cs.AI cs.PL | null | Arithmetic constraints on integer intervals are supported in many constraint
programming systems. We study here a number of approaches to implement
constraint propagation for these constraints. To describe them we introduce
integer interval arithmetic. Each approach is explained using appropriate proof
rules that reduce the variable domains. We compare these approaches using a set
of benchmarks. For the most promising approach we provide results that
characterize the effect of constraint propagation. This is a full version of
our earlier paper, cs.PL/0403016.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2006 10:09:43 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Mar 2007 13:51:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Zoeteweij",
"Peter",
""
]
] |
cs/0607018 | Edward Hanna | Edward Hanna | Feynman Checkerboard as a Model of Discrete Space-Time | 10 pages, 14 figures - changed section 6 title | null | null | null | cs.CE | null | In 1965, Feynman wrote of using a lattice containing one dimension of space
and one dimension of time to derive aspects of quantum mechanics. Instead of
summing the behavior of all possible paths as he did, this paper will consider
the motion of single particles within this discrete Space-Time lattice,
sometimes called Feynman's Checkerboard. This empirical approach yielded
several predicted emergent properties for a discrete Space-Time lattice, one of
which is novel and testable.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2006 16:35:38 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Aug 2006 19:10:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hanna",
"Edward",
""
]
] |
cs/0607019 | Stephen Luttrell | Stephen Luttrell | Modelling the Probability Density of Markov Sources | 26 pages | null | null | null | cs.NE | null | This paper introduces an objective function that seeks to minimise the
average total number of bits required to encode the joint state of all of the
layers of a Markov source. This type of encoder may be applied to the problem
of optimising the bottom-up (recognition model) and top-down (generative model)
connections in a multilayer neural network, and it unifies several previous
results on the optimisation of multilayer neural networks.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2006 18:49:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
] |
cs/0607022 | George Maney Mr. | G. A. Maney | Ten Incredibly Dangerous Software Ideas | 14 page software industry interest book synopsis | null | null | null | cs.GL | null | This is a rough draft synopsis of a book presently in preparation. This book
provides a systematic critique of the software industry. This critique is
accomplished using classical methods in practical design science.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2006 01:17:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maney",
"G. A.",
""
]
] |
cs/0607023 | Josep Diaz Prof | J. Diaz, D. Mitsche, X. Perez | Sharp threshold for hamiltonicity of random geometric graphs | 10 pages, 2 figures | null | null | null | cs.DM | null | We show for an arbitrary $\ell_p$ norm that the property that a random
geometric graph $\mathcal G(n,r)$ contains a Hamiltonian cycle exhibits a sharp
threshold at $r=r(n)=\sqrt{\frac{\log n}{\alpha_p n}}$, where $\alpha_p$ is the
area of the unit disk in the $\ell_p$ norm. The proof is constructive and
yields a linear time algorithm for finding a Hamiltonian cycle of $\RG$ a.a.s.,
provided $r=r(n)\ge\sqrt{\frac{\log n}{(\alpha_p -\epsilon)n}}$ for some fixed
$\epsilon > 0$.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2006 18:16:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diaz",
"J.",
""
],
[
"Mitsche",
"D.",
""
],
[
"Perez",
"X.",
""
]
] |
cs/0607025 | Oskar Sandberg | Oskar Sandberg and Ian Clarke | The evolution of navigable small-world networks | null | null | null | null | cs.DS cs.DC | null | Small-world networks, which combine randomized and structured elements, are
seen as prevalent in nature. Several random graph models have been given for
small-world networks, with one of the most fruitful, introduced by Jon
Kleinberg, showing in which type of graphs it is possible to route, or
navigate, between vertices with very little knowledge of the graph itself.
Kleinberg's model is static, with random edges added to a fixed grid. In this
paper we introduce, analyze and test a randomized algorithm which successively
rewires a graph with every application. The resulting process gives a model for
the evolution of small-world networks with properties similar to those studied
by Kleinberg.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2006 13:21:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sandberg",
"Oskar",
""
],
[
"Clarke",
"Ian",
""
]
] |
cs/0607026 | James Aspnes | James Aspnes and Yang Richard Yang and Yitong Yin | Path-independent load balancing with unreliable machines | Full version of paper submitted to SODA 2007 | null | null | null | cs.DS cs.NI | null | We consider algorithms for load balancing on unreliable machines. The
objective is to optimize the two criteria of minimizing the makespan and
minimizing job reassignments in response to machine failures. We assume that
the set of jobs is known in advance but that the pattern of machine failures is
unpredictable. Motivated by the requirements of BGP routing, we consider
path-independent algorithms, with the property that the job assignment is
completely determined by the subset of available machines and not the previous
history of the assignments. We examine first the question of performance
measurement of path-independent load-balancing algorithms, giving the measure
of makespan and the normalized measure of reassignments cost. We then describe
two classes of algorithms for optimizing these measures against an oblivious
adversary for identical machines. The first, based on independent random
assignments, gives expected reassignment costs within a factor of 2 of optimal
and gives a makespan within a factor of O(log m/log log m) of optimal with high
probability, for unknown job sizes. The second, in which jobs are first grouped
into bins and at most one bin is assigned to each machine, gives
constant-factor ratios on both reassignment cost and makespan, for known job
sizes. Several open problems are discussed.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2006 14:01:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aspnes",
"James",
""
],
[
"Yang",
"Yang Richard",
""
],
[
"Yin",
"Yitong",
""
]
] |
cs/0607028 | Christian Lavault | Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady
Ravelomanana (LIPN) | A Quasi-Optimal Leader Election Algorithm in Radio Networks with
Log-Logarithmic Awake Time Slots | null | null | null | null | cs.DC cs.NI | null | Radio networks (RN) are distributed systems (\textit{ad hoc networks})
consisting in $n \ge 2$ radio stations. Assuming the number $n$ unknown, two
distinct models of RN without collision detection (\textit{no-CD}) are
addressed: the model with \textit{weak no-CD} RN and the one with
\textit{strong no-CD} RN. We design and analyze two distributed leader election
protocols, each one running in each of the above two (no-CD RN) models,
respectively. Both randomized protocols are shown to elect a leader within
$\BO(\log{(n)})$ expected time, with no station being awake for more than
$\BO(\log{\log{(n)}})$ time slots (such algorithms are said to be
\textit{energy-efficient}). Therefore, a new class of efficient algorithms is
set up that matchthe $\Omega(\log{(n)})$ time lower-bound established by
Kushilevitz and Mansour.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2006 17:42:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Marckert",
"Jean-François",
"",
"LaBRI"
],
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
] |
cs/0607031 | Christian Lavault | Christian Lavault (LIPN), Mario Valencia-Pabon (LIPN) | A distributed approximation algorithm for the minimum degree minimum
weight spanning trees | null | null | null | null | cs.DC cs.DM | null | Fischer has shown how to compute a minimum weight spanning tree of degree at
most $b \Delta^* + \lceil \log\_b n\rceil$ in time $O(n^{4 + 1/\ln b})$ for any
constant $b > 1$, where $\Delta^*$ is the value of an optimal solution and $n$
is the number of nodes in the network. In this paper, we propose a distributed
version of Fischer's algorithm that requires messages and time complexity
$O(n^{2 + 1/\ln b})$, and O(n) space per node.
| [
{
"version": "v1",
"created": "Sat, 8 Jul 2006 08:42:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Valencia-Pabon",
"Mario",
"",
"LIPN"
]
] |
cs/0607032 | Christian Lavault | Christian Lavault (LIPN), Guy Louchard (ULB) | Asymptotic Analysis of a Leader Election Algorithm | null | null | null | null | cs.DC cs.NA | null | Itai and Rodeh showed that, on the average, the communication of a leader
election algorithm takes no more than $LN$ bits, where $L \simeq 2.441716$ and
$N$ denotes the size of the ring. We give a precise asymptotic analysis of the
average number of rounds M(n) required by the algorithm, proving for example
that $\dis M(\infty) := \lim\_{n\to \infty} M(n) = 2.441715879...$, where $n$
is the number of starting candidates in the election. Accurate asymptotic
expressions of the second moment $M^{(2)}(n)$ of the discrete random variable
at hand, its probability distribution, and the generalization to all moments
are given. Corresponding asymptotic expansions $(n\to \infty)$ are provided for
sufficiently large $j$, where $j$ counts the number of rounds. Our numerical
results show that all computations perfectly fit the observed values. Finally,
we investigate the generalization to probability $t/n$, where $t$ is a non
negative real parameter. The real function $\dis M(\infty,t) := \lim\_{n\to
\infty} M(n,t)$ is shown to admit \textit{one unique minimum} $M(\infty,t^{*})$
on the real segment $(0,2)$. Furthermore, the variations of $M(\infty,t)$ on
thewhole real line are also studied in detail.
| [
{
"version": "v1",
"created": "Sat, 8 Jul 2006 08:46:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Louchard",
"Guy",
"",
"ULB"
]
] |
cs/0607033 | Oleg Verbitsky | Oleg Verbitsky | Planar Graphs: Logical Complexity and Parallel Isomorphism Tests | 36 pages | null | null | null | cs.CC cs.LO | null | We prove that every triconnected planar graph is definable by a first order
sentence that uses at most 15 variables and has quantifier depth at most
$11\log_2 n+43$. As a consequence, a canonic form of such graphs is computable
in $AC^1$ by the 14-dimensional Weisfeiler-Lehman algorithm. This provides
another way to show that the planar graph isomorphism is solvable in $AC^1$.
| [
{
"version": "v1",
"created": "Sat, 8 Jul 2006 10:37:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Verbitsky",
"Oleg",
""
]
] |
cs/0607034 | Christian Lavault | Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady
Ravelomanana (LIPN) | Quasi-Optimal Leader Election Algorithms in Radio Networks with
Loglogarithmic Awake Time Slots | null | 10th IEEE International Conference on Telecommunications (2003)
1113-1119 | null | null | cs.DC cs.NI | null | A radio network (RN) is a distributed system consisting of $n$ radio
stations. We design and analyze two distributed leader election protocols in RN
where the number $n$ of radio stations is unknown. The first algorithm runs
under the assumption of {\it limited collision detection}, while the second
assumes that {\it no collision detection} is available. By ``limited collision
detection'', we mean that if exactly one station sends (broadcasts) a message,
then all stations (including the transmitter) that are listening at this moment
receive the sent message. By contrast, the second no-collision-detection
algorithm assumes that a station cannot simultaneously send and listen signals.
Moreover, both protocols allow the stations to keep asleep as long as possible,
thus minimizing their awake time slots (such algorithms are called {\it
energy-efficient}). Both randomized protocols in RN areshown to elect a leader
in $O(\log{(n)})$ expected time, with no station being awake for more than
$O(\log{\log{(n)}})$ time slots. Therefore, a new class of efficient algorithms
is set up that match the $\Omega(\log{(n)})$ time lower-bound established by
Kushilevitz and Mansour.
| [
{
"version": "v1",
"created": "Sat, 8 Jul 2006 12:04:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Marckert",
"Jean-François",
"",
"LaBRI"
],
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
] |
cs/0607037 | Daowen Qiu | Zhujun Fan | The Minimal Cost Algorithm for Off-Line Diagnosability of Discrete Event
Systems | 12 pages, 7 figures, critical comments and suggestions are welcomed
and appreciated | null | null | null | cs.AI cs.CC | null | The failure diagnosis for {\it discrete event systems} (DESs) has been given
considerable attention in recent years. Both on-line and off-line diagnostics
in the framework of DESs was first considered by Lin Feng in 1994, and
particularly an algorithm for diagnosability of DESs was presented. Motivated
by some existing problems to be overcome in previous work, in this paper, we
investigate the minimal cost algorithm for diagnosability of DESs.
More specifically: (i) we give a generic method for judging a system's
off-line diagnosability, and the complexity of this algorithm is
polynomial-time; (ii) and in particular, we present an algorithm of how to
search for the minimal set in all observable event sets, whereas the previous
algorithm may find {\it non-minimal} one.
| [
{
"version": "v1",
"created": "Sun, 9 Jul 2006 04:55:03 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Apr 2007 16:27:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fan",
"Zhujun",
""
]
] |
cs/0607038 | Benoit Donnet | Benoit Donnet, Bruno Baynat, Timur Friedman | Retouched Bloom Filters: Allowing Networked Applications to Flexibly
Trade Off False Positives Against False Negatives | This is a new version of the technical reports with improved
algorithms and theorical analysis of algorithms | null | null | null | cs.NI | null | Where distributed agents must share voluminous set membership information,
Bloom filters provide a compact, though lossy, way for them to do so. Numerous
recent networking papers have examined the trade-offs between the bandwidth
consumed by the transmission of Bloom filters, and the error rate, which takes
the form of false positives, and which rises the more the filters are
compressed. In this paper, we introduce the retouched Bloom filter (RBF), an
extension that makes the Bloom filter more flexible by permitting the removal
of selected false positives at the expense of generating random false
negatives. We analytically show that RBFs created through a random process
maintain an overall error rate, expressed as a combination of the false
positive rate and the false negative rate, that is equal to the false positive
rate of the corresponding Bloom filters. We further provide some simple
heuristics and improved algorithms that decrease the false positive rate more
than than the corresponding increase in the false negative rate, when creating
RBFs. Finally, we demonstrate the advantages of an RBF over a Bloom filter in a
distributed network topology measurement application, where information about
large stop sets must be shared among route tracing monitors.
| [
{
"version": "v1",
"created": "Sun, 9 Jul 2006 10:40:26 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Dec 2006 13:52:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Donnet",
"Benoit",
""
],
[
"Baynat",
"Bruno",
""
],
[
"Friedman",
"Timur",
""
]
] |
cs/0607039 | M. H. van Emden | M.H. van Emden | Set-Theoretic Preliminaries for Computer Scientists | 36 pages, 5 figures | null | null | DCS-304-IR | cs.DM cs.DB | null | The basics of set theory are usually copied, directly or indirectly, by
computer scientists from introductions to mathematical texts. Often
mathematicians are content with special cases when the general case is of no
mathematical interest. But sometimes what is of no mathematical interest is of
great practical interest in computer science. For example, non-binary relations
in mathematics tend to have numerical indexes and tend to be unsorted. In the
theory and practice of relational databases both these simplifications are
unwarranted. In response to this situation we present here an alternative to
the ``set-theoretic preliminaries'' usually found in computer science texts.
This paper separates binary relations from the kind of relations that are
needed in relational databases. Its treatment of functions supports both
computer science in general and the kind of relations needed in databases. As a
sample application this paper shows how the mathematical theory of relations
naturally leads to the relational data model and how the operations on
relations are by themselves already a powerful vehicle for queries.
| [
{
"version": "v1",
"created": "Sun, 9 Jul 2006 14:27:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
]
] |
cs/0607040 | Gopal Gupta | Enrico Pontelli (1), Karen Villaverde (1), Hai-Feng Guo (2), Gopal
Gupta (3) ((1) New Mexico State University, (2) University of Nebraska at
Omaha, (3) University of Texas at Dallas) | PALS: Efficient Or-Parallelism on Beowulf Clusters | 63 pages, 32 figures, 5 tabels. Theory and Practice of Logic
Programming (to appear) | null | null | null | cs.DC cs.PL | null | This paper describes the development of the PALS system, an implementation of
Prolog capable of efficiently exploiting or-parallelism on distributed-memory
platforms--specifically Beowulf clusters. PALS makes use of a novel technique,
called incremental stack-splitting. The technique proposed builds on the
stack-splitting approach, previously described by the authors and
experimentally validated on shared-memory systems, which in turn is an
evolution of the stack-copying method used in a variety of parallel logic and
constraint systems--e.g., MUSE, YAP, and Penny. The PALS system is the first
distributed or-parallel implementation of Prolog based on the stack-splitting
method ever realized. The results presented confirm the superiority of this
method as a simple yet effective technique to transition from shared-memory to
distributed-memory systems. PALS extends stack-splitting by combining it with
incremental copying; the paper provides a description of the implementation of
PALS, including details of how distributed scheduling is handled. We also
investigate methodologies to effectively support order-sensitive predicates
(e.g., side-effects) in the context of the stack-splitting scheme. Experimental
results obtained from running PALS on both Shared Memory and Beowulf systems
are presented and analyzed.
| [
{
"version": "v1",
"created": "Sun, 9 Jul 2006 19:56:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pontelli",
"Enrico",
""
],
[
"Villaverde",
"Karen",
""
],
[
"Guo",
"Hai-Feng",
""
],
[
"Gupta",
"Gopal",
""
]
] |
cs/0607044 | Valdis Vitolins | Audris Kalnins, Valdis Vitolins | Use of UML and Model Transformations for Workflow Process Definitions | 12 pages, 7 figures, communications of the conference "Baltic DB&IS
2006", July 3-6, Vilnius, Lithuania | Audris Kalnins, Valdis Vitolins, Databases and Information
Systems, BalticDB&IS'2006, edited by Olegas Vasilecas, Johann Eder, Albertas
Caplinskas, Vilnius, Technika, 2006, pp. 3.-15 | null | null | cs.SE | null | Currently many different modeling languages are used for workflow definitions
in BPM systems. Authors of this paper analyze the two most popular graphical
languages, with highest possibility of wide practical usage - UML Activity
diagrams (AD) and Business Process Modeling Notation (BPMN). The necessary in
practice workflow aspects are briefly discussed, and on this basis a natural AD
profile is proposed, which covers all of them. A functionally equivalent BPMN
subset is also selected. The semantics of both languages in the context of
process execution (namely, mapping to BPEL) is also analyzed in the paper. By
analyzing AD and BPMN metamodels, authors conclude that an exact transformation
from AD to BPMN is not trivial even for the selected subset, though these
languages are considered to be similar. Authors show how this transformation
could be defined in the MOLA transformation language.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 09:23:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalnins",
"Audris",
""
],
[
"Vitolins",
"Valdis",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.