id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-21 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0605126
David Bunde
David P. Bunde
Power-aware scheduling for makespan and flow
13 pages, 3 figures. To appear in 18th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2006
null
null
null
cs.DS
null
We consider offline scheduling algorithms that incorporate speed scaling to address the bicriteria problem of minimizing energy consumption and a scheduling metric. For makespan, we give linear-time algorithms to compute all non-dominated solutions for the general uniprocessor problem and for the multiprocessor problem when every job requires the same amount of work. We also show that the multiprocessor problem becomes NP-hard when jobs can require different amounts of work. For total flow, we show that the optimal flow corresponding to a particular energy budget cannot be exactly computed on a machine supporting arithmetic and the extraction of roots. This hardness result holds even when scheduling equal-work jobs on a uniprocessor. We do, however, extend previous work by Pruhs et al. to give an arbitrarily-good approximation for scheduling equal-work jobs on a multiprocessor.
[ { "version": "v1", "created": "Fri, 26 May 2006 21:57:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Bunde", "David P.", "" ] ]
cs/0605127
Daniel Lemire
Steven Keith, Owen Kaser, Daniel Lemire
Analyzing Large Collections of Electronic Text Using OLAP
null
null
null
TR-05-001
cs.DB cs.DL
null
Computer-assisted reading and analysis of text has various applications in the humanities and social sciences. The increasing size of many electronic text archives has the advantage of a more complete analysis but the disadvantage of taking longer to obtain results. On-Line Analytical Processing is a method used to store and quickly analyze multidimensional data. By storing text analysis information in an OLAP system, a user can obtain solutions to inquiries in a matter of seconds as opposed to minutes, hours, or even days. This analysis is user-driven allowing various users the freedom to pursue their own direction of research.
[ { "version": "v1", "created": "Sat, 27 May 2006 00:51:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Keith", "Steven", "" ], [ "Kaser", "Owen", "" ], [ "Lemire", "Daniel", "" ] ]
cs/0605128
Riccardo Pucella
Alexander Kurz
Logic Column 15: Coalgebras and Their Logics
21 pages
SIGACT News 37 (2), pp. 57-77, 2006
null
null
cs.LO
null
This article describes recent work on the topic of specifying properties of transition systems. By giving a suitably abstract description of transition systems as coalgebras, it is possible to derive logics for capturing properties of these transition systems in an elegant way.
[ { "version": "v1", "created": "Sun, 28 May 2006 19:30:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurz", "Alexander", "" ] ]
cs/0605131
Simon Morgan
Simon P Morgan
Notes on Geometric Measure Theory Applications to Image Processing; De-noising, Segmentation, Pattern, Texture, Lines, Gestalt and Occlusion
9 pages, no figures. This informal discussion paper will be updated periodically
null
null
null
cs.CV
null
Regularization functionals that lower level set boundary length when used with L^1 fidelity functionals on signal de-noising on images create artifacts. These are (i) rounding of corners, (ii) shrinking of radii, (iii) shrinking of cusps, and (iv) non-smoothing of staircasing. Regularity functionals based upon total curvature of level set boundaries do not create artifacts (i) and (ii). An adjusted fidelity term based on the flat norm on the current (a distributional graph) representing the density of curvature of level sets boundaries can minimize (iii) by weighting the position of a cusp. A regularity term to eliminate staircasing can be based upon the mass of the current representing the graph of an image function or its second derivatives. Densities on the Grassmann bundle of the Grassmann bundle of the ambient space of the graph can be used to identify patterns, textures, occlusion and lines.
[ { "version": "v1", "created": "Mon, 29 May 2006 13:27:38 GMT" }, { "version": "v2", "created": "Tue, 30 May 2006 05:50:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Morgan", "Simon P", "" ] ]
cs/0605132
Krzysztof R. Apt
Krzysztof R. Apt and Tadeusz Radzik
Stable partitions in coalitional games
18 pages
null
null
null
cs.GT cs.MA
null
We propose a notion of a stable partition in a coalitional game that is parametrized by the concept of a defection function. This function assigns to each partition of the grand coalition a set of different coalition arrangements for a group of defecting players. The alternatives are compared using their social welfare. We characterize the stability of a partition for a number of most natural defection functions and investigate whether and how so defined stable partitions can be reached from any initial partition by means of simple transformations. The approach is illustrated by analyzing an example in which a set of stores seeks an optimal transportation arrangement.
[ { "version": "v1", "created": "Mon, 29 May 2006 16:03:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Radzik", "Tadeusz", "" ] ]
cs/0605133
Benoit Donnet
Benoit Donnet Philippe Raoult Timur Friedman
Efficient Route Tracing from a Single Source
null
null
null
null
cs.NI
null
Traceroute is a networking tool that allows one to discover the path that packets take from a source machine, through the network, to a destination machine. It is widely used as an engineering tool, and also as a scientific tool, such as for discovery of the network topology at the IP level. In prior work, authors on this technical report have shown how to improve the efficiency of route tracing from multiple cooperating monitors. However, it is not unusual for a route tracing monitor to operate in isolation. Somewhat different strategies are required for this case, and this report is the first systematic study of those requirements. Standard traceroute is inefficient when used repeatedly towards multiple destinations, as it repeatedly probes the same interfaces close to the source. Others have recognized this inefficiency and have proposed tracing backwards from the destinations and stopping probing upon encounter with a previously-seen interface. One of this technical report's contributions is to quantify for the first time the efficiency of this approach. Another contribution is to describe the effect of non-responding destinations on this efficiency. Since a large portion of destination machines do not reply to probe packets, backwards probing from the destination is often infeasible. We propose an algorithm to tackle non-responding destinations, and we find that our algorithm can strongly decrease probing redundancy at the cost of a small reduction in node and link discovery.
[ { "version": "v1", "created": "Mon, 29 May 2006 16:08:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Benoit Donnet Philippe Raoult Timur", "" ] ]
cs/0605134
Boon-Chong Seet
Boon-Chong Seet, Bu-Sung Lee, and Chiew-Tong Lau
DSR with Non-Optimal Route Suppression for MANETs
10 pages, 17 figures
null
null
null
cs.NI
null
This paper revisits the issue of route discovery in dynamic source routing (DSR) for mobile ad hoc networks (MANETs), and puts forward a proposal of a lightweight non-optimal route suppression technique based on the observation of a rarely noted but commonly occurring phenomenon in route discovery. The technique exploits the observed phenomenon to extract query state information that permits intermediate nodes to identify and suppress the initiation of route replies with non-optimal routes, even if the route query is received for the first time. A detailed evaluation of DSR with non-optimal route suppression is found to yield significant improvements in both protocol efficiency and performance.
[ { "version": "v1", "created": "Mon, 29 May 2006 17:33:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Seet", "Boon-Chong", "" ], [ "Lee", "Bu-Sung", "" ], [ "Lau", "Chiew-Tong", "" ] ]
cs/0605136
Bourgeois Gerald
Gerald Bourgeois
Attaque algebrique de NTRU a l'aide des vecteurs de Witt
6 pages; correction of the miscalculations
null
null
null
cs.CR
null
One improves an algebraic attack of NTRU due to Silverman, Smart and Vercauteren; the latter considered the first 2 bits of a Witt vector attached to the research of the secret key; here the first 4 bits are considered, which provides additional equations of degrees 4 and 8.
[ { "version": "v1", "created": "Mon, 29 May 2006 22:42:24 GMT" }, { "version": "v2", "created": "Mon, 5 Jun 2006 22:44:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Bourgeois", "Gerald", "" ] ]
cs/0605138
Victor Kryssanov
V.V. Kryssanov, V.A. Abramov, Y. Fukuda, K. Konishi
The meaning of manufacturing know-how
12 pages. Preprint completed in March 1998. Presented in part at PROLAMAT'98
In: G. Jacucci, G.J. Olling, K. Preiss, and M. Wozny (eds), The Globalization of Manufacturing in the Digital Communications Era of the 21st Century: Innovation, Agility and the Virtual Enterprise, pp. 375-387. 1998, Kluwer Academic Publishers
null
null
cs.AI cs.CE
null
This paper investigates the phenomenon of manufacturing know-how. First, the abstract notion of knowledge is discussed, and a terminological basis is introduced to treat know-how as a kind of knowledge. Next, a brief survey of the recently reported works dealt with manufacturing know-how is presented, and an explicit definition of know-how is formulated. Finally, the problem of utilizing know-how with knowledge-based systems is analyzed, and some ideas useful for its solving are given.
[ { "version": "v1", "created": "Tue, 30 May 2006 05:12:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Abramov", "V. A.", "" ], [ "Fukuda", "Y.", "" ], [ "Konishi", "K.", "" ] ]
cs/0605139
Na Li
Na Li and Wen-Feng Qi
Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity
This paper has been submitted on March 9, 2006
null
null
null
cs.CR
null
Algebraic immunity has been proposed as an important property of Boolean functions. To resist algebraic attack, a Boolean function should possess high algebraic immunity. It is well known now that the algebraic immunity of an $n$-variable Boolean function is upper bounded by $\left\lceil {\frac{n}{2}} \right\rceil $. In this paper, for an odd integer $n$, we present a construction method which can efficiently generate a Boolean function of $n$ variables with maximum algebraic immunity, and we also show that any such function can be generated by this method. Moreover, the number of such Boolean functions is greater than $2^{2^{n-1}}$.
[ { "version": "v1", "created": "Tue, 30 May 2006 16:54:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Na", "" ], [ "Qi", "Wen-Feng", "" ] ]
cs/0606001
David Steurer
David Steurer
Tight Bounds for the Min-Max Boundary Decomposition Cost of Weighted Graphs
41 pages, full version of a paper that will appear in SPAA`06
null
null
null
cs.DS cs.DM
null
Many load balancing problems that arise in scientific computing applications ask to partition a graph with weights on the vertices and costs on the edges into a given number of almost equally-weighted parts such that the maximum boundary cost over all parts is small. Here, this partitioning problem is considered for bounded-degree graphs G=(V,E) with edge costs c: E->R+ that have a p-separator theorem for some p>1, i.e., any (arbitrarily weighted) subgraph of G can be separated into two parts of roughly the same weight by removing a vertex set S such that the edges incident to S in the subgraph have total cost at most proportional to (SUM_e c^p_e)^(1/p), where the sum is over all edges e in the subgraph. We show for all positive integers k and weights w that the vertices of G can be partitioned into k parts such that the weight of each part differs from the average weight by less than MAX{w_v; v in V}, and the boundary edges of each part have cost at most proportional to (SUM_e c_e^p/k)^(1/p) + MAX_e c_e. The partition can be computed in time nearly proportional to the time for computing a separator S of G. Our upper bound on the boundary costs is shown to be tight up to a constant factor for infinitely many instances with a broad range of parameters. Previous results achieved this bound only if one has c=1, w=1, and one allows parts with weight exceeding the average by a constant fraction.
[ { "version": "v1", "created": "Thu, 1 Jun 2006 01:47:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Steurer", "David", "" ] ]
cs/0606003
David Lorenz
Sergei Kojarski and David H. Lorenz
Modeling Aspect Mechanisms: A Top-Down Approach
null
In Proceedings of the 28th International Conference on Software Engineering (ICSE'06), pages 212--221, Shanghai, China, May 20-28, 2006
null
CS-2006-04
cs.SE cs.PL
null
A plethora of diverse aspect mechanisms exist today, all of which integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a characterization of the design space that these aspect mechanisms inhabit and a model description of their weaving processes. A good design space representation provides a common framework for understanding and evaluating existing mechanisms. A well-understood model of the weaving process can guide the implementor of new aspect mechanisms. It can guide the designer when mechanisms implementing new kinds of weaving are needed. It can also help teach aspect-oriented programming (AOP). In this paper we present and evaluate such a model of the design space for aspect mechanisms and their weaving processes. We model weaving, at an abstract level, as a concern integration process. We derive a weaving process model (WPM) top-down, differentiating a reactive from a nonreactive process. The model provides an in-depth explanation of the key subpro existing aspect mechanisms.
[ { "version": "v1", "created": "Thu, 1 Jun 2006 02:14:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Kojarski", "Sergei", "" ], [ "Lorenz", "David H.", "" ] ]
cs/0606004
Victor Kryssanov
V.V. Kryssanov, V.A. Abramov, H. Hibino, Y. Fukuda
A Framework for the Development of Manufacturing Simulators: Towards New Generation of Simulation Systems
9 pages, 6 figures. Preprint completed in 1998
In: H. Fujimoto and R.E. DeVor (eds), Proceedings of the 1998 Japan-U.S.A. Symposium on Flexible Automation. 1998, Vol. III, pp. 1307-1314
null
null
cs.CE cs.HC
null
In this paper, an attempt is made to systematically discuss the development of simulation systems for manufacturing system design. General requirements on manufacturing simulators are formulated and a framework to address the requirements is suggested. Problems of information representation as an activity underlying simulation are considered. This is to form the necessary mathematical foundation for manufacturing simulations. The theoretical findings are explored through a pilot study. A conclusion about the suitability of the suggested approach to the development of simulation systems for manufacturing system design is made, and implications for future research are described.
[ { "version": "v1", "created": "Thu, 1 Jun 2006 02:36:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Abramov", "V. A.", "" ], [ "Hibino", "H.", "" ], [ "Fukuda", "Y.", "" ] ]
cs/0606007
Andrew Pavlo
Andrew Pavlo (1), Christopher Homan (2), Jonathan Schull (2) ((1) University of Wisconsin-Madison, (2) Rochester Institute of Technology)
A parent-centered radial layout algorithm for interactive graph visualization and animation
null
null
null
null
cs.HC cs.CG cs.GR
null
We have developed (1) a graph visualization system that allows users to explore graphs by viewing them as a succession of spanning trees selected interactively, (2) a radial graph layout algorithm, and (3) an animation algorithm that generates meaningful visualizations and smooth transitions between graphs while minimizing edge crossings during transitions and in static layouts. Our system is similar to the radial layout system of Yee et al. (2001), but differs primarily in that each node is positioned on a coordinate system centered on its own parent rather than on a single coordinate system for all nodes. Our system is thus easy to define recursively and lends itself to parallelization. It also guarantees that layouts have many nice properties, such as: it guarantees certain edges never cross during an animation. We compared the layouts and transitions produced by our algorithms to those produced by Yee et al. Results from several experiments indicate that our system produces fewer edge crossings during transitions between graph drawings, and that the transitions more often involve changes in local scaling rather than structure. These findings suggest the system has promise as an interactive graph exploration tool in a variety of settings.
[ { "version": "v1", "created": "Thu, 1 Jun 2006 16:56:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Pavlo", "Andrew", "" ], [ "Homan", "Christopher", "" ], [ "Schull", "Jonathan", "" ] ]
cs/0606009
Lane A. Hemaspaandra
Piotr Faliszewski and Lane A. Hemaspaandra
The Consequences of Eliminating NP Solutions
null
null
null
URCS TR-2006-898
cs.CC
null
Given a function based on the computation of an NP machine, can one in general eliminate some solutions? That is, can one in general decrease the ambiguity? This simple question remains, even after extensive study by many researchers over many years, mostly unanswered. However, complexity-theoretic consequences and enabling conditions are known. In this tutorial-style article we look at some of those, focusing on the most natural framings: reducing the number of solutions of NP functions, refining the solutions of NP functions, and subtracting from or otherwise shrinking #P functions. We will see how small advice strings are important here, but we also will see how increasing advice size to achieve robustness is central to the proof of a key ambiguity-reduction result for NP functions.
[ { "version": "v1", "created": "Fri, 2 Jun 2006 01:34:26 GMT" }, { "version": "v2", "created": "Tue, 13 Jun 2006 18:01:43 GMT" }, { "version": "v3", "created": "Mon, 19 Jun 2006 18:21:11 GMT" }, { "version": "v4", "created": "Wed, 16 Aug 2006 17:15:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Faliszewski", "Piotr", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
cs/0606010
Victor Kryssanov
V.V. Kryssanov, V.A. Abramov, Y. Fukuda, K. Konishi
A Decision-Making Support System Based on Know-How
6 pages, 5 figures. Preprint completed in 1997
CIRP Journal of Manufacturing Systems. 1998, Vol. 27, No.4, 427-432
null
null
cs.CE cs.AI
null
The research results described are concerned with: - developing a domain modeling method and tools to provide the design and implementation of decision-making support systems for computer integrated manufacturing; - building a decision-making support system based on know-how and its software environment. The research is funded by NEDO, Japan.
[ { "version": "v1", "created": "Fri, 2 Jun 2006 03:06:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Abramov", "V. A.", "" ], [ "Fukuda", "Y.", "" ], [ "Konishi", "K.", "" ] ]
cs/0606013
Manuel Abellanas
M. Abellanas, A. Bajuelos, G. Hern\'andez, F. Hurtado, I. Matos, B. Palop
Good Illumination of Minimum Range
null
null
null
null
cs.CG
null
A point p is 1-well illuminated by a set F of n point lights if p lies in the interior of the convex hull of F. This concept corresponds to triangle-guarding or well-covering. In this paper we consider the illumination range of the light sources as a parameter to be optimized. First, we solve the problem of minimizing the light sources' illumination range to 1-well illuminate a given point p. We also compute a minimal set of light sources that 1-well illuminates p with minimum illumination range. Second, we solve the problem of minimizing the light sources' illumination range to 1-well illuminate all the points of a line segment with an O(n^2) algorithm. Finally, we give an O(n^2 log n) algorithm for preprocessing the data so that one can obtain the illumination range needed to 1-well illuminate a point of a line segment in O(log n) time. These results can be applied to solve problems of 1-well illuminating a trajectory by approaching it to a polygonal path.
[ { "version": "v1", "created": "Fri, 2 Jun 2006 11:24:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Abellanas", "M.", "" ], [ "Bajuelos", "A.", "" ], [ "Hernández", "G.", "" ], [ "Hurtado", "F.", "" ], [ "Matos", "I.", "" ], [ "Palop", "B.", "" ] ]
cs/0606018
Matthias Bauer
Matthias Bauer and Benjamin Fabian and Matthias Fischmann and Seda G\"urses
Emerging Markets for RFID Traces
submitted to WPES2006. Two figures are missing because of latex vs. pdflatex incompatibilities
null
null
null
cs.CY cs.CR
null
RFID tags are held to become ubiquitous in logistics in the near future, and item-level tagging will pave the way for Ubiquitous Computing, for example in application fields like smart homes. Our paper addresses the value and the production cost of information that can be gathered by observing these tags over time and different locations. We argue that RFID technology will induce a thriving market for such information, resulting in easy data access for analysts to infer business intelligence and individual profiles of unusually high detail. Understanding these information markets is important for many reasons: They represent new business opportunities, and market players need to be aware of their roles in these markets. Policy makers need to confirm that the market structure will not negatively affect overall welfare. Finally, though we are not addressing the complex issue of privacy, we are convinced that market forces will have a significant impact on the effectiveness of deployed security enhancements to RFID technology. In this paper we take a few first steps into a relatively new field of economic research and conclude with a list of research problems that promise deeper insights into the matter.
[ { "version": "v1", "created": "Mon, 5 Jun 2006 15:29:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Bauer", "Matthias", "" ], [ "Fabian", "Benjamin", "" ], [ "Fischmann", "Matthias", "" ], [ "Gürses", "Seda", "" ] ]
cs/0606020
Vadim Astakhov
Vadim Astakhov, Tamara Astakhova, Brian Sanders
Imagination as Holographic Processor for Text Animation
10 pages, 10 figures, prototype presented at 4th International Conference on Computer Science and its Applications (ICCSA-2006), paper submited to SIGCHI 2007
null
null
null
cs.AI
null
Imagination is the critical point in developing of realistic artificial intelligence (AI) systems. One way to approach imagination would be simulation of its properties and operations. We developed two models: AI-Brain Network Hierarchy of Languages and Semantical Holographic Calculus as well as simulation system ScriptWriter that emulate the process of imagination through an automatic animation of English texts. The purpose of this paper is to demonstrate the model and to present ScriptWriter system http://nvo.sdsc.edu/NVO/JCSG/get_SRB_mime_file2.cgi//home/tamara.sdsc/test/demo.zip?F=/home/tamara.sdsc/test/demo.zip&M=application/x-gtar for simulation of the imagination.
[ { "version": "v1", "created": "Mon, 5 Jun 2006 23:55:37 GMT" }, { "version": "v2", "created": "Wed, 10 Jan 2007 23:47:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Astakhov", "Vadim", "" ], [ "Astakhova", "Tamara", "" ], [ "Sanders", "Brian", "" ] ]
cs/0606021
Victor Kryssanov
H. Tamaki, V.V. Kryssanov, S. Kitamura
A simulation engine to support production scheduling using genetics-based machine learning
8 pages, 2 figures, 1 table. Preprint completed in 1998
In: K. Mertins, O. Krause, and B. Schallock (eds), Global Production Management, pp. 482-489. 1999, Kluwer Academic Publishers
null
null
cs.CE cs.AI
null
The ever higher complexity of manufacturing systems, continually shortening life cycles of products and their increasing variety, as well as the unstable market situation of the recent years require introducing grater flexibility and responsiveness to manufacturing processes. From this perspective, one of the critical manufacturing tasks, which traditionally attract significant attention in both academia and the industry, but which have no satisfactory universal solution, is production scheduling. This paper proposes an approach based on genetics-based machine learning (GBML) to treat the problem of flow shop scheduling. By the approach, a set of scheduling rules is represented as an individual of genetic algorithms, and the fitness of the individual is estimated based on the makespan of the schedule generated by using the rule-set. A concept of the interactive software environment consisting of a simulator and a GBML simulation engine is introduced to support human decision-making during scheduling. A pilot study is underway to evaluate the performance of the GBML technique in comparison with other methods (such as Johnson's algorithm and simulated annealing) while completing test examples.
[ { "version": "v1", "created": "Tue, 6 Jun 2006 09:30:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Tamaki", "H.", "" ], [ "Kryssanov", "V. V.", "" ], [ "Kitamura", "S.", "" ] ]
cs/0606024
Edgar Graaf de
Edgar de Graaf, Jeannette de Graaf, and Walter A. Kosters
Consecutive Support: Better Be Close!
10 pages
null
null
null
cs.AI cs.DB
null
We propose a new measure of support (the number of occur- rences of a pattern), in which instances are more important if they occur with a certain frequency and close after each other in the stream of trans- actions. We will explain this new consecutive support and discuss how patterns can be found faster by pruning the search space, for instance using so-called parent support recalculation. Both consecutiveness and the notion of hypercliques are incorporated into the Eclat algorithm. Synthetic examples show how interesting phenomena can now be discov- ered in the datasets. The new measure can be applied in many areas, ranging from bio-informatics to trade, supermarkets, and even law en- forcement. E.g., in bio-informatics it is important to find patterns con- tained in many individuals, where patterns close together in one chro- mosome are more significant.
[ { "version": "v1", "created": "Tue, 6 Jun 2006 14:28:42 GMT" } ]
2007-05-23T00:00:00
[ [ "de Graaf", "Edgar", "" ], [ "de Graaf", "Jeannette", "" ], [ "Kosters", "Walter A.", "" ] ]
cs/0606027
Victor Kryssanov
V.V. Kryssanov, A.S. Kleshchev, Y. Fukuda, and K. Konishi
Building a logical model in the machining domain for CAPP expert systems
25 pages, 4 figures. Preprint completed in 1997
International Journal of Production Research, 1998, vol. 36, No. 4, 1075-1089
null
null
cs.AI cs.CE cs.SE
null
Recently, extensive efforts have been made on the application of expert system technique to solving the process planning task in the machining domain. This paper introduces a new formal method to design CAPP expert systems. The formal method is applied to provide a contour of the CAPP expert system building technology. Theoretical aspects of the formalism are described and illustrated by an example of know-how analysis. Flexible facilities to utilize multiple knowledge types and multiple planning strategies within one system are provided by the technology.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 03:46:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Kleshchev", "A. S.", "" ], [ "Fukuda", "Y.", "" ], [ "Konishi", "K.", "" ] ]
cs/0606028
Evgenia Adutskevich
E.V. Adutskevich, S.V. Bakhanovich, N.A. Likhoded
Affine Transformations of Loop Nests for Parallel Execution and Distribution of Data over Processors
9 pages
Preprint / The National Academy of Sciences of Belarus. Institute of Mathematics: N 3 (574). Minsk, 2005
null
null
cs.DC
null
The paper is devoted to the problem of mapping affine loop nests onto distributed memory parallel computers. A method to find affine transformations of loop nests for parallel execution and distribution of data over processors is presented. The method tends to minimize the number of communications between processors and to improve locality of data within one processor. A problem of determination of data exchange sequence is investigated. Conditions to determine the ability to arrange broadcast is presented.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 12:59:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Adutskevich", "E. V.", "" ], [ "Bakhanovich", "S. V.", "" ], [ "Likhoded", "N. A.", "" ] ]
cs/0606029
Audun Josang
Audun Josang
Belief Calculus
22 pages, 10 figures
null
null
null
cs.AI
null
In Dempster-Shafer belief theory, general beliefs are expressed as belief mass distribution functions over frames of discernment. In Subjective Logic beliefs are expressed as belief mass distribution functions over binary frames of discernment. Belief representations in Subjective Logic, which are called opinions, also contain a base rate parameter which express the a priori belief in the absence of evidence. Philosophically, beliefs are quantitative representations of evidence as perceived by humans or by other intelligent agents. The basic operators of classical probability calculus, such as addition and multiplication, can be applied to opinions, thereby making belief calculus practical. Through the equivalence between opinions and Beta probability density functions, this also provides a calculus for Beta probability density functions. This article explains the basic elements of belief calculus.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 14:32:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Josang", "Audun", "" ] ]
cs/0606031
Guillaume Moroz
Guillaume Moroz (LIP6, INRIA Rocquencourt)
Complexity of Resolution of Parametric Systems of Polynomial Equations and Inequations
null
null
null
null
cs.SC
null
Consider a system of n polynomial equations and r polynomial inequations in n indeterminates of degree bounded by d with coefficients in a polynomial ring of s parameters with rational coefficients of bit-size at most $\sigma$. From the real viewpoint, solving such a system often means describing some semi-algebraic sets in the parameter space over which the number of real solutions of the considered parametric system is constant. Following the works of Lazard and Rouillier, this can be done by the computation of a discriminant variety. In this report we focus on the case where for a generic specialization of the parameters the system of equations generates a radical zero-dimensional ideal, which is usual in the applications. In this case, we provide a deterministic method computing the minimal discriminant variety reducing the problem to a problem of elimination. Moreover, we prove that the degree of the computed minimal discriminant variety is bounded by $D:=(n+r)d^{(n+1)}$ and that the complexity of our method is $\sigma^{\mathcal{O}(1)} D^{\mathcal{O}(n+s)}$ bit-operations on a deterministic Turing machine.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 14:44:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Moroz", "Guillaume", "", "LIP6, INRIA Rocquencourt" ] ]
cs/0606032
Andreas U. Schmidt
Christian Hett, Nicolai Kuntze, and Andreas U. Schmidt
A secure archive for Voice-over-IP conversations
9 pages, 2 figures. (C) ACM, (2006). This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of VSW06, June, 2006, Berlin, Germany
null
null
null
cs.CR
null
An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signatures. Security is concentrated in a single, efficient component, allowing for a detailed analysis.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 17:04:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hett", "Christian", "" ], [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0606033
Michael Stay
Cristian S. Calude and Michael A. Stay
Natural Halting Probabilities, Partial Randomness, and Zeta Functions
Accepted for publication in Information and Computing
null
null
CDMTCS 273
cs.CC
null
We introduce the zeta number, natural halting probability and natural complexity of a Turing machine and we relate them to Chaitin's Omega number, halting probability, and program-size complexity. A classification of Turing machines according to their zeta numbers is proposed: divergent, convergent and tuatara. We prove the existence of universal convergent and tuatara machines. Various results on (algorithmic) randomness and partial randomness are proved. For example, we show that the zeta number of a universal tuatara machine is c.e. and random. A new type of partial randomness, asymptotic randomness, is introduced. Finally we show that in contrast to classical (algorithmic) randomness--which cannot be naturally characterised in terms of plain complexity--asymptotic randomness admits such a characterisation.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 20:18:13 GMT" }, { "version": "v2", "created": "Tue, 11 Jul 2006 21:35:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Calude", "Cristian S.", "" ], [ "Stay", "Michael A.", "" ] ]
cs/0606034
Teddy Furon
Teddy Furon (IRISA)
A constructive and unifying framework for zero-bit watermarking
submitted to IEEE Trans. on Information Forensics and Security
null
null
null
cs.MM cs.CR
null
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the presence of this particular weak signal in content. The article looks at this problem from a classical detection theory point of view, but with side information enabled at the embedding side. This means that the watermark signal is a function of the host content. Our study is twofold. The first step is to design the best embedding function for a given detection function, and the best detection function for a given embedding function. This yields two conditions, which are mixed into one `fundamental' partial differential equation. It appears that many famous watermarking schemes are indeed solution to this `fundamental' equation. This study thus gives birth to a constructive framework unifying solutions, so far perceived as very different.
[ { "version": "v1", "created": "Thu, 8 Jun 2006 13:28:07 GMT" }, { "version": "v2", "created": "Fri, 12 Jan 2007 13:11:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Furon", "Teddy", "", "IRISA" ] ]
cs/0606038
Shripad Thite
Shripad Thite
Tight Bounds on the Complexity of Recognizing Odd-Ranked Elements
3 pages
null
null
null
cs.CC cs.DS
null
Let S = <s_1, s_2, s_3, ..., s_n> be a given vector of n real numbers. The rank of a real z with respect to S is defined as the number of elements s_i in S such that s_i is less than or equal to z. We consider the following decision problem: determine whether the odd-numbered elements s_1, s_3, s_5, ... are precisely the elements of S whose rank with respect to S is odd. We prove a bound of Theta(n log n) on the number of operations required to solve this problem in the algebraic computation tree model.
[ { "version": "v1", "created": "Thu, 8 Jun 2006 21:28:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Thite", "Shripad", "" ] ]
cs/0606039
Victor Kryssanov
V.V. Kryssanov, H. Tamaki, S. Kitamura
Evolutionary Design: Philosophy, Theory, and Application Tactics
6 pages, 3 figures. Preprint completed in 1999
CIRP Journal of Manufacturing Systems, 2005, Vol. 34/2
null
null
cs.CE cs.AI
null
Although it has contributed to remarkable improvements in some specific areas, attempts to develop a universal design theory are generally characterized by failure. This paper sketches arguments for a new approach to engineering design based on Semiotics - the science about signs. The approach is to combine different design theories over all the product life cycle stages into one coherent and traceable framework. Besides, it is to bring together the designer's and user's understandings of the notion of 'good product'. Building on the insight from natural sciences that complex systems always exhibit a self-organizing meaning-influential hierarchical dynamics, objective laws controlling product development are found through an examination of design as a semiosis process. These laws are then applied to support evolutionary design of products. An experiment validating some of the theoretical findings is outlined, and concluding remarks are given.
[ { "version": "v1", "created": "Fri, 9 Jun 2006 08:00:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Tamaki", "H.", "" ], [ "Kitamura", "S.", "" ] ]
cs/0606041
Ming-Zhe Chen
Ming-Zhe Chen
Characterization of Pentagons Determined by Two X-rays
4 pages, 2 figures
null
null
null
cs.CG
null
This paper contains some results of pentagons which can be determined by two X-rays. The results reveal this problem is more complicated.
[ { "version": "v1", "created": "Fri, 9 Jun 2006 14:13:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Ming-Zhe", "" ] ]
cs/0606042
Laurent Hascoet
Laurent Hascoet (INRIA Sophia Antipolis), Mauricio Araya-Polo (INRIA Sophia Antipolis)
Enabling user-driven Checkpointing strategies in Reverse-mode Automatic Differentiation
null
null
null
null
cs.DS
null
This paper presents a new functionality of the Automatic Differentiation (AD) tool Tapenade. Tapenade generates adjoint codes which are widely used for optimization or inverse problems. Unfortunately, for large applications the adjoint code demands a great deal of memory, because it needs to store a large set of intermediates values. To cope with that problem, Tapenade implements a sub-optimal version of a technique called checkpointing, which is a trade-off between storage and recomputation. Our long-term goal is to provide an optimal checkpointing strategy for every code, not yet achieved by any AD tool. Towards that goal, we first introduce modifications in Tapenade in order to give the user the choice to select the checkpointing strategy most suitable for their code. Second, we conduct experiments in real-size scientific codes in order to gather hints that help us to deduce an optimal checkpointing strategy. Some of the experimental results show memory savings up to 35% and execution time up to 90%.
[ { "version": "v1", "created": "Fri, 9 Jun 2006 16:01:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Hascoet", "Laurent", "", "INRIA Sophia Antipolis" ], [ "Araya-Polo", "Mauricio", "", "INRIA\n Sophia Antipolis" ] ]
cs/0606043
Pierre Lopez
Christian Artigues (LIA), Pierre Lopez (LAAS), Pierre-Dimitri Ayache (LIA)
Schedule generation schemes for the job-shop problem with sequence-dependent setup times: dominance properties and computational analysis
null
Annals of Operations Research 138 (2005) 21-52
null
null
cs.CC math.CO
null
We consider the job-shop problem with sequence-dependent setup times. We focus on the formal definition of schedule generation schemes (SGSs) based on the semi-active, active, and non-delay schedule categories. We study dominance properties of the sets of schedules obtainable with each SGS. We show how the proposed SGSs can be used within single-pass and multi-pass priority rule based heuristics. We study several priority rules for the problem and provide a comparative computational analysis of the different SGSs on sets of instances taken from the literature. The proposed SGSs significantly improve previously best-known results on a set of hard benchmark instances.
[ { "version": "v1", "created": "Fri, 9 Jun 2006 16:32:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Artigues", "Christian", "", "LIA" ], [ "Lopez", "Pierre", "", "LAAS" ], [ "Ayache", "Pierre-Dimitri", "", "LIA" ] ]
cs/0606045
Andreas U. Schmidt
Nicolai Kuntze and Andreas U. Schmidt
Trusted Computing in Mobile Action
In: Peer-reviewed Proceedings of the Information Security South Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006, Sandton, South Africa
null
null
null
cs.CR
null
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to support more efficient ways to authenticate users and devices, potentially enabling novel services based on the security provided by the infrastructure. In this paper we exhibit some usage scenarios from the mobile domain integrating trusted computing, which show that trusted computing offers new paradigms for implementing trust and by this enables new technical applications and business scenarios. The scenarios show how the traditional boundaries between technical and authentication domains become permeable while a high security level is maintained.
[ { "version": "v1", "created": "Sat, 10 Jun 2006 09:52:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0606046
Andreas U. Schmidt
Jan Piechalski and Andreas U. Schmidt
Authorised Translations of Electronic Documents
In: Peer-reviewed Proceedings of the Information Security South Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006, Sandton, South Africa
null
null
null
cs.OH
null
A concept is proposed to extend authorised translations of documents to electronically signed, digital documents. Central element of the solution is an electronic seal, embodied as an XML data structure, which attests to the correctness of the translation and the authorisation of the translator. The seal contains a digital signature binding together original and translated document, thus enabling forensic inspection and therefore legal security in the appropriation of the translation. Organisational aspects of possible implementation variants of electronic authorised translations are discussed and a realisation as a stand-alone web-service is presented.
[ { "version": "v1", "created": "Sat, 10 Jun 2006 10:37:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Piechalski", "Jan", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0606047
Giorgos Kollias
Giorgos Kollias, Efstratios Gallopoulos, Daniel B. Szyld
Asynchronous iterative computations with Web information retrieval structures: The PageRank case
8 pages to appear at ParCo2005 Conference Proceedings
null
null
TR HPCLAB-SCG 5/08-05
cs.DC
null
There are several ideas being used today for Web information retrieval, and specifically in Web search engines. The PageRank algorithm is one of those that introduce a content-neutral ranking function over Web pages. This ranking is applied to the set of pages returned by the Google search engine in response to posting a search query. PageRank is based in part on two simple common sense concepts: (i)A page is important if many important pages include links to it. (ii)A page containing many links has reduced impact on the importance of the pages it links to. In this paper we focus on asynchronous iterative schemes to compute PageRank over large sets of Web pages. The elimination of the synchronizing phases is expected to be advantageous on heterogeneous platforms. The motivation for a possible move to such large scale distributed platforms lies in the size of matrices representing Web structure. In orders of magnitude: $10^{10}$ pages with $10^{11}$ nonzero elements and $10^{12}$ bytes just to store a small percentage of the Web (the already crawled); distributed memory machines are necessary for such computations. The present research is part of our general objective, to explore the potential of asynchronous computational models as an underlying framework for very large scale computations over the Grid. The area of ``internet algorithmics'' appears to offer many occasions for computations of unprecedent dimensionality that would be good candidates for this framework.
[ { "version": "v1", "created": "Sun, 11 Jun 2006 09:36:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Kollias", "Giorgos", "" ], [ "Gallopoulos", "Efstratios", "" ], [ "Szyld", "Daniel B.", "" ] ]
cs/0606050
Prabhu Manyem
Prabhu Manyem
Syntactic Characterisations of Polynomial-Time Optimisation Classes (Syntactic Characterizations of Polynomial-Time Optimization Classes)
17 pages; presented at the July 2005 ACiD workshop at Durham, England; Included both American and British commonwealth spellings, so as to generate hits from readers in North America as well as from Commonwealth countries and Europe
null
null
null
cs.CC cs.LO
null
In Descriptive Complexity, there is a vast amount of literature on decision problems, and their classes such as \textbf{P, NP, L and NL}. ~ However, research on the descriptive complexity of optimisation problems has been limited. Optimisation problems corresponding to the \textbf{NP} class have been characterised in terms of logic expressions by Papadimitriou and Yannakakis, Panconesi and Ranjan, Kolaitis and Thakur, Khanna et al, and by Zimand. Gr\"{a}del characterised the polynomial class \textbf{P} of decision problems. In this paper, we attempt to characterise the optimisation versions of \textbf{P} via expressions in second order logic, many of them using universal Horn formulae with successor relations. The polynomially bound versions of maximisation (maximization) and minimisation (minimization) problems are treated first, and then the maximisation problems in the "not necessarily polynomially bound" class.
[ { "version": "v1", "created": "Mon, 12 Jun 2006 00:42:29 GMT" }, { "version": "v2", "created": "Fri, 6 Oct 2006 23:49:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Manyem", "Prabhu", "" ] ]
cs/0606054
Qiming Lu
Qiming Lu, Gyorgy Korniss, Boleslaw K. Szymanski
Threshold-Controlled Global Cascading in Wireless Sensor Networks
null
Proceeding of third International Conference on Networked Sensing Systems, 164-171 (TRF, 2006)
null
null
cs.NI
null
We investigate cascade dynamics in threshold-controlled (multiplex) propagation on random geometric networks. We find that such local dynamics can serve as an efficient, robust, and reliable prototypical activation protocol in sensor networks in responding to various alarm scenarios. We also consider the same dynamics on a modified network by adding a few long-range communication links, resulting in a small-world network. We find that such construction can further enhance and optimize the speed of the network's response, while keeping energy consumption at a manageable level.
[ { "version": "v1", "created": "Mon, 12 Jun 2006 19:30:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Lu", "Qiming", "" ], [ "Korniss", "Gyorgy", "" ], [ "Szymanski", "Boleslaw K.", "" ] ]
cs/0606055
Jean Gallier
Jean Gallier
Simple Methods For Drawing Rational Surfaces as Four or Six Bezier Patches
33 pages
null
null
null
cs.CG cs.GR
null
In this paper, we give several simple methods for drawing a whole rational surface (without base points) as several Bezier patches. The first two methods apply to surfaces specified by triangular control nets and partition the real projective plane RP2 into four and six triangles respectively. The third method applies to surfaces specified by rectangular control nets and partitions the torus RP1 X RP1 into four rectangular regions. In all cases, the new control nets are obtained by sign flipping and permutation of indices from the original control net. The proofs that these formulae are correct involve very little computations and instead exploit the geometry of the parameter space (RP2 or RP1 X RP1). We illustrate our method on some classical examples. We also propose a new method for resolving base points using a simple ``blowing up'' technique involving the computation of ``resolved'' control nets.
[ { "version": "v1", "created": "Mon, 12 Jun 2006 22:02:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Gallier", "Jean", "" ] ]
cs/0606056
Jean Gallier
Jean Gallier and Weqing Gu
Fast and Simple Methods For Computing Control Points
15 pages
null
null
null
cs.CC cs.GR
null
The purpose of this paper is to present simple and fast methods for computing control points for polynomial curves and polynomial surfaces given explicitly in terms of polynomials (written as sums of monomials). We give recurrence formulae w.r.t. arbitrary affine frames. As a corollary, it is amusing that we can also give closed-form expressions in the case of the frame (r, s) for curves, and the frame ((1, 0, 0), (0, 1, 0), (0, 0, 1) for surfaces. Our methods have the same low polynomial (time and space) complexity as the other best known algorithms, and are very easy to implement.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 00:47:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Gallier", "Jean", "" ], [ "Gu", "Weqing", "" ] ]
cs/0606057
Fredrik Kuivinen
Fredrik Kuivinen
Approximability of Bounded Occurrence Max Ones
Accepted to MFCS 2006
null
null
null
cs.CC
null
We study the approximability of Max Ones when the number of variable occurrences is bounded by a constant. For conservative constraint languages (i.e., when the unary relations are included) we give a complete classification when the number of occurrences is three or more and a partial classification when the bound is two. For the non-conservative case we prove that it is either trivial or equivalent to the corresponding conservative problem under polynomial-time many-one reductions.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 06:44:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuivinen", "Fredrik", "" ] ]
cs/0606058
Philippe Chapdelaine
Philippe Chapdelaine, Etienne Grandjean
Lower bounds and complete problems in nondeterministic linear time and sublinear space complexity classes
19 pages, 4 figures
null
null
null
cs.CC cs.LO
null
Proving lower bounds remains the most difficult of tasks in computational complexity theory. In this paper, we show that whereas most natural NP-complete problems belong to NLIN (linear time on nondeterministic RAMs), some of them, typically the planar versions of many NP-complete problems are recognized by nondeterministic RAMs in linear time and sublinear space. The main results of this paper are the following: as the second author did for NLIN, we give exact logical characterizations of nondeterministic polynomial time-space complexity classes; we derive from them a class of problems, which are complete in these classes, and as a consequence of such a precise result and of some recent separation theorems using diagonalization, prove time-space lower bounds for these problems.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 08:10:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Chapdelaine", "Philippe", "" ], [ "Grandjean", "Etienne", "" ] ]
cs/0606060
Luciano da Fontoura Costa
Luciano da Fontoura Costa
Complex Networks: New Concepts and Tools for Real-Time Imaging and Vision
3 pages
null
null
null
cs.CV cs.DC physics.soc-ph
null
This article discusses how concepts and methods of complex networks can be applied to real-time imaging and computer vision. After a brief introduction of complex networks basic concepts, their use as means to represent and characterize images, as well as for modeling visual saliency, are briefly described. The possibility to apply complex networks in order to model and simulate the performance of parallel and distributed computing systems for performance of visual methods is also proposed.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 12:53:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Costa", "Luciano da Fontoura", "" ] ]
cs/0606061
Jean Gallier
Jean Gallier
On the Efficiency of Strategies for Subdividing Polynomial Triangular Surface Patches
20 pages
null
null
null
cs.CG cs.GR
null
In this paper, we investigate the efficiency of various strategies for subdividing polynomial triangular surface patches. We give a simple algorithm performing a regular subdivision in four calls to the standard de Casteljau algorithm (in its subdivision version). A naive version uses twelve calls. We also show that any method for obtaining a regular subdivision using the standard de Casteljau algorithm requires at least 4 calls. Thus, our method is optimal. We give another subdivision algorithm using only three calls to the de Casteljau algorithm. Instead of being regular, the subdivision pattern is diamond-like. Finally, we present a ``spider-like'' subdivision scheme producing six subtriangles in four calls to the de Casteljau algorithm.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 15:09:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Gallier", "Jean", "" ] ]
cs/0606063
Adam Slagell
Adam Slagell, Kiran Lakkaraju and Katherine Luo
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
16 pages, 4 figures, in submission to USENIX Lisa
null
null
null
cs.CR
null
FLAIM (Framework for Log Anonymization and Information Management) addresses two important needs not well addressed by current log anonymizers. First, it is extremely modular and not tied to the specific log being anonymized. Second, it supports multi-level anonymization, allowing system administrators to make fine-grained trade-offs between information loss and privacy/security concerns. In this paper, we examine anonymization solutions to date and note the above limitations in each. We further describe how FLAIM addresses these problems, and we describe FLAIM's architecture and features in detail.
[ { "version": "v1", "created": "Wed, 14 Jun 2006 03:17:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Slagell", "Adam", "" ], [ "Lakkaraju", "Kiran", "" ], [ "Luo", "Katherine", "" ] ]
cs/0606064
Hongtao Sun
Xin Li, Tian Liu, Han Peng, Hongtao Sun, Jiaqi Zhu
Improved Exponential Time Lower Bound of Knapsack Problem under BT model
9 pages, 3 figures
null
null
null
cs.CC
null
M.Alekhnovich et al. recently have proposed a model of algorithms, called BT model, which covers Greedy, Backtrack and Simple Dynamic Programming methods and can be further divided into fixed, adaptive and fully adaptive three kinds, and have proved exponential time lower bounds of exact and approximation algorithms under adaptive BT model for Knapsack problem which are $\Omega(2^{n/2}/\sqrt n)=\Omega(2^{0.5n}/\sqrt n)$ and $\Omega((1/\epsilon)^{1/3.17})\approx\Omega((1/\epsilon)^{0.315})$(for approximation ratio $1-\epsilon$) respectively (M. Alekhovich, A. Borodin, J. Buresh-Oppenheim, R. Impagliazzo, A. Magen, and T. Pitassi, Toward a Model for Backtracking and Dynamic Programming, \emph{Proceedings of Twentieth Annual IEEE Conference on Computational Complexity}, pp308-322, 2005). In this note, we slightly improved their lower bounds to $\Omega(2^{(2-\epsilon)n/3}/\sqrt{n})\approx \Omega(2^{0.66n}/\sqrt{n})$ and $\Omega((1/\epsilon)^{1/2.38})\approx\Omega((1/\epsilon)^{0.420})$, and proposed as an open question what is the best achievable lower bounds for knapsack under adaptive BT models.
[ { "version": "v1", "created": "Wed, 14 Jun 2006 07:54:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Xin", "" ], [ "Liu", "Tian", "" ], [ "Peng", "Han", "" ], [ "Sun", "Hongtao", "" ], [ "Zhu", "Jiaqi", "" ] ]
cs/0606066
Audun Josang
Audun Josang
The Cumulative Rule for Belief Fusion
null
null
null
null
cs.AI
null
The problem of combining beliefs in the Dempster-Shafer belief theory has attracted considerable attention over the last two decades. The classical Dempster's Rule has often been criticised, and many alternative rules for belief combination have been proposed in the literature. The consensus operator for combining beliefs has nice properties and produces more intuitive results than Dempster's rule, but has the limitation that it can only be applied to belief distribution functions on binary state spaces. In this paper we present a generalisation of the consensus operator that can be applied to Dirichlet belief functions on state spaces of arbitrary size. This rule, called the cumulative rule of belief combination, can be derived from classical statistical theory, and corresponds well with human intuition.
[ { "version": "v1", "created": "Wed, 14 Jun 2006 11:36:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Josang", "Audun", "" ] ]
cs/0606068
Andreas U. Schmidt
Christian Hett, Nicolai Kuntze, and Andreas U. Schmidt
Security and Non-Repudiation for Voice-Over-IP Conversations
Poster presentation at the ISSA 2006 From Insight to Foresight Conference, Sandton, South Africa, 5th-7th July 2006
null
null
null
cs.CR
null
We present a concept to achieve non-repudiation for natural language conversations by electronically signing packet-based, digital, voice communication. Signing a VoIP-based conversation means to protect the integrity and authenticity of the bidirectional data stream and its temporal sequence which together establish the security context of the communication. Our concept is conceptually close to the protocols that embody VoIP and provides a high level of inherent security. It enables signatures over voice as true declarations of will, in principle between unacquainted speakers. We point to trusted computing enabled devices as possible trusted signature terminals for voice communication.
[ { "version": "v1", "created": "Wed, 14 Jun 2006 12:24:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Hett", "Christian", "" ], [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0606070
Shane Legg Mr
Shane Legg
Is there an Elegant Universal Theory of Prediction?
null
null
null
IDSIA - 12 - 06
cs.AI cs.CC
null
Solomonoff's inductive learning model is a powerful, universal and highly elegant theory of sequence prediction. Its critical flaw is that it is incomputable and thus cannot be used in practice. It is sometimes suggested that it may still be useful to help guide the development of very general and powerful theories of prediction which are computable. In this paper it is shown that although powerful algorithms exist, they are necessarily highly complex. This alone makes their theoretical analysis problematic, however it is further shown that beyond a moderate level of complexity the analysis runs into the deeper problem of Goedel incompleteness. This limits the power of mathematics to analyse and study prediction algorithms, and indeed intelligent systems in general.
[ { "version": "v1", "created": "Wed, 14 Jun 2006 15:22:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Legg", "Shane", "" ] ]
cs/0606079
Stevan Harnad
C. Hajjem, S. Harnad, Y. Gingras
Ten-Year Cross-Disciplinary Comparison of the Growth of Open Access and How it Increases Research Citation Impact
10 pages, 5 figures, 3 tables
IEEE Data Engineering Bulletin 28(4): 39-47; 2005
null
null
cs.DL
null
Lawrence (2001)found computer science articles that were openly accessible (OA) on the Web were cited more. We replicated this in physics. We tested 1,307,038 articles published across 12 years (1992-2003) in 10 disciplines (Biology, Psychology, Sociology, Health, Political Science, Economics, Education, Law, Business, Management). A robot trawls the Web for full-texts using reference metadata ISI citation data (signal detectability d'=2.45; bias = 0.52). Percentage OA (relative to total OA + NOA) articles varies from 5%-16% (depending on discipline, year and country) and is slowly climbing annually (correlation r=.76, sample size N=12, probability p < 0.005). Comparing OA and NOA articles in the same journal/year, OA articles have consistently more citations, the advantage varying from 36%-172% by discipline and year. Comparing articles within six citation ranges (0, 1, 2-3, 4-7, 8-15, 16+ citations), the annual percentage of OA articles is growing significantly faster than NOA within every citation range (r > .90, N=12, p < .0005) and the effect is greater with the more highly cited articles (r = .98, N=6, p < .005). Causality cannot be determined from these data, but our prior finding of a similar pattern in physics, where percent OA is much higher (and even approaches 100% in some subfields), makes it unlikely that the OA citation advantage is merely or mostly a self-selection bias (for making only one's better articles OA). Further research will analyze the effect's timing, causal components and relation to other variables.
[ { "version": "v1", "created": "Sun, 18 Jun 2006 19:51:18 GMT" }, { "version": "v2", "created": "Tue, 15 Aug 2006 17:35:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Hajjem", "C.", "" ], [ "Harnad", "S.", "" ], [ "Gingras", "Y.", "" ] ]
cs/0606080
Philippe Chapdelaine
Philippe Chapdelaine
On the structure of linear-time reducibility
10 pages
null
null
null
cs.CC
null
In 1975, Ladner showed that under the hypothesis that P is not equal to NP, there exists a language which is neither in P, nor NP-complete. This result was latter generalized by Schoning and several authors to various polynomial-time complexity classes. We show here that such results also apply to linear-time reductions on RAMs (resp. Turing machines), and hence allow for separation results in linear-time classes similar to Ladner's ones for polynomial time.
[ { "version": "v1", "created": "Mon, 19 Jun 2006 08:48:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Chapdelaine", "Philippe", "" ] ]
cs/0606081
Juergen Schmidhuber
Juergen Schmidhuber
New Millennium AI and the Convergence of History
Speed Prior: clarification / 15 pages, to appear in "Challenges to Computational Intelligence"
null
null
IDSIA-14-06
cs.AI
null
Artificial Intelligence (AI) has recently become a real formal science: the new millennium brought the first mathematically sound, asymptotically optimal, universal problem solvers, providing a new, rigorous foundation for the previously largely heuristic field of General AI and embedded agents. At the same time there has been rapid progress in practical methods for learning true sequence-processing programs, as opposed to traditional methods limited to stationary pattern association. Here we will briefly review some of the new results, and speculate about future developments, pointing out that the time intervals between the most notable events in over 40,000 years or 2^9 lifetimes of human history have sped up exponentially, apparently converging to zero within the next few decades. Or is this impression just a by-product of the way humans allocate memory space to past events?
[ { "version": "v1", "created": "Mon, 19 Jun 2006 09:13:43 GMT" }, { "version": "v2", "created": "Fri, 23 Jun 2006 14:35:37 GMT" }, { "version": "v3", "created": "Thu, 29 Jun 2006 10:05:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidhuber", "Juergen", "" ] ]
cs/0606082
Jonathan Ben-Naim
Jonathan Ben-Naim (LIF)
Lack of Finite Characterizations for the Distance-based Revision
null
Tenth International Conference on Principles of Knowledge Representation and Reasoning (KR'06) (2006) 239-248
null
null
cs.LO
null
Lehmann, Magidor, and Schlechta developed an approach to belief revision based on distances between any two valuations. Suppose we are given such a distance D. This defines an operator |D, called a distance operator, which transforms any two sets of valuations V and W into the set V |D W of all elements of W that are closest to V. This operator |D defines naturally the revision of K by A as the set of all formulas satisfied in M(K) |D M(A) (i.e. those models of A that are closest to the models of K). This constitutes a distance-based revision operator. Lehmann et al. characterized families of them using a loop condition of arbitrarily big size. An interesting question is whether this loop condition can be replaced by a finite one. Extending the results of Schlechta, we will provide elements of negative answer. In fact, we will show that for families of distance operators, there is no "normal" characterization. Approximatively, a normal characterization contains only finite and universally quantified conditions. These results have an interest of their own for they help to understand the limits of what is possible in this area. Now, we are quite confident that this work can be continued to show similar impossibility results for distance-based revision operators, which suggests that the big loop condition cannot be simplified.
[ { "version": "v1", "created": "Mon, 19 Jun 2006 09:34:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Ben-Naim", "Jonathan", "", "LIF" ] ]
cs/0606085
Daniil Ryabko
Boris Ryabko, Daniil Ryabko
Provably Secure Universal Steganographic Systems
11 pages
null
null
Cryptology ePrint Archive, Report 2006/063
cs.CR
null
We propose a simple universal (that is, distribution--free) steganographic system in which covertexts with and without hidden texts are statistically indistinguishable. The stegosystem can be applied to any source generating i.i.d. covertexts with unknown distribution, and the hidden text is transmitted exactly, with zero probability of error. Moreover, the proposed steganographic system has two important properties. First, the rate of transmission of hidden information approaches the Shannon entropy of the covertext source as the size of blocks used for hidden text encoding tends to infinity. Second, if the size of the alphabet of the covertext source and its minentropy tend to infinity then the number of bits of hidden text per letter of covertext tends to $\log(n!)/n$ where $n$ is the (fixed) size of blocks used for hidden text encoding. The proposed stegosystem uses randomization.
[ { "version": "v1", "created": "Tue, 20 Jun 2006 08:41:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Ryabko", "Boris", "" ], [ "Ryabko", "Daniil", "" ] ]
cs/0606086
Marie-Claude Gaudel
Alain Denise (LRI), Marie-Claude Gaudel (LRI), Sandrine-Dominique Gouraud (LRI), Richard Lasseigne (ELM), Sylvain Peyronnet (ELM), the RaST Collaboration
Uniform Random Sampling of Traces in Very Large Models
null
First International Workshop on Random Testing, \'{E}tats-Unis d'Am\'{e}rique (2006) 10-19
null
null
cs.LO
null
This paper presents some first results on how to perform uniform random walks (where every trace has the same probability to occur) in very large models. The models considered here are described in a succinct way as a set of communicating reactive modules. The method relies upon techniques for counting and drawing uniformly at random words in regular languages. Each module is considered as an automaton defining such a language. It is shown how it is possible to combine local uniform drawings of traces, and to obtain some global uniform random sampling, without construction of the global model.
[ { "version": "v1", "created": "Tue, 20 Jun 2006 09:53:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Denise", "Alain", "", "LRI" ], [ "Gaudel", "Marie-Claude", "", "LRI" ], [ "Gouraud", "Sandrine-Dominique", "", "LRI" ], [ "Lasseigne", "Richard", "", "ELM" ], [ "Peyronnet", "Sylvain", "", "ELM" ], [ "Collaboration", "the RaST", "" ] ]
cs/0606088
Paulo Condado
Paulo A. Condado, Fernando G. Lobo
Breaking barriers for people with voice disabilities: Combining virtual keyboards with speech synthesizers, and VoIP applications
null
null
null
Also UAlg-ILAB Report No. 200604
cs.CY
null
Text-to-speech technology has been broadly used to help people with voice disabilities to overcome their difficulties. With text-to-speech, a person types at a keyboard, the text is synthesized, and the sound comes out through the computer speakers. In recent years, Voice over IP (VoIP) applications have become very popular and have been used by people worldwide. These applications allow people to talk for free over the Internet and also to make traditional calls through the Public-Switched Telephone Network (PSTN) at a small fraction of the cost offered by traditional phone companies. We have created a system, called EasyVoice, which integrates speech synthesizers with VoIP applications. The result allows a person with motor impairments and voice disabilities to talk with another person located anywhere in the world. The benefits in this case are much stronger than the ones obtained by non-disabled people using VoIP applications. People with motor impairments sometimes can hardly use a regular or mobile phone. Thus, the advantage is not only the reduction in cost, but more important, the ability to talk at all.
[ { "version": "v1", "created": "Tue, 20 Jun 2006 12:22:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Condado", "Paulo A.", "" ], [ "Lobo", "Fernando G.", "" ] ]
cs/0606089
William Yurcik
Charis Ermopoulos and William Yurcik
NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security)
25 pages, 13 Figures
null
null
null
cs.CR cs.DC
null
In the UNIX/Linux environment the kernel can log every command process created by every user with process accounting. Thus process accounting logs have many potential uses, particularly the monitoring and forensic investigation of security events. Previous work successfully leveraged the use of process accounting logs to identify a difficult to detect and damaging intrusion against high performance computing (HPC) clusters, masquerade attacks, where intruders masquerade as legitimate users with purloined authentication credentials. While masqueraders on HPC clusters were found to be identifiable with a high accuracy (greater than 90%), this accuracy is still not high enough for HPC production environments where greater than 99% accuracy is needed. This paper incrementally advances the goal of more accurately identifying masqueraders on HPC clusters by seeking to identify features within command sets that distinguish masqueraders. To accomplish this goal, we created NVision-PA, a software tool that produces text and graphic statistical summaries describing input processing accounting logs. We report NVision-PA results describing two different process accounting logs; one from Internet usage and one from HPC cluster usage. These results identify the distinguishing features of Internet users (as proxies for masqueraders) posing as clusters users. This research is both a promising next step toward creating a real-time masquerade detection sensor for production HPC clusters as well as providing another tool for system administrators to use for statistically monitoring and managing legitimate workloads (as indicated by command usage) in HPC environments.
[ { "version": "v1", "created": "Tue, 20 Jun 2006 16:53:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Ermopoulos", "Charis", "" ], [ "Yurcik", "William", "" ] ]
cs/0606093
Vladimir Vovk
Vladimir Vovk
Predictions as statements and decisions
48 pages
null
null
null
cs.LG
null
Prediction is a complex notion, and different predictors (such as people, computer programs, and probabilistic theories) can pursue very different goals. In this paper I will review some popular kinds of prediction and argue that the theory of competitive on-line learning can benefit from the kinds of prediction that are now foreign to it.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 04:31:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0606094
Frank Neven
Wim Martens, Frank Neven, and Marc Gyssens
On Typechecking Top-Down XML Tranformations: Fixed Input or Output Schemas
null
null
null
null
cs.DB cs.PL
null
Typechecking consists of statically verifying whether the output of an XML transformation always conforms to an output type for documents satisfying a given input type. In this general setting, both the input and output schema as well as the transformation are part of the input for the problem. However, scenarios where the input or output schema can be considered to be fixed, are quite common in practice. In the present work, we investigate the computational complexity of the typechecking problem in the latter setting.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 09:46:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Martens", "Wim", "" ], [ "Neven", "Frank", "" ], [ "Gyssens", "Marc", "" ] ]
cs/0606095
Jean Krivine
Jean Krivine (INRIA Rocquencourt)
A verification algorithm for Declarative Concurrent Programming
null
null
null
null
cs.DC
null
A verification method for distributed systems based on decoupling forward and backward behaviour is proposed. This method uses an event structure based algorithm that, given a CCS process, constructs its causal compression relative to a choice of observable actions. Verifying the original process equipped with distributed backtracking on non-observable actions, is equivalent to verifying its relative compression which in general is much smaller. We call this method Declarative Concurrent Programming (DCP). DCP technique compares well with direct bisimulation based methods. Benchmarks for the classic dining philosophers problem show that causal compression is rather efficient both time- and space-wise. State of the art verification tools can successfully handle more than 15 agents, whereas they can handle no more than 5 following the traditional direct method; an altogether spectacular improvement, since in this example the specification size is exponential in the number of agents.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 13:23:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Krivine", "Jean", "", "INRIA Rocquencourt" ] ]
cs/0606096
Hendrik Feddes
Lea Cyrus
Building a resource for studying translation shifts
6 pages, 1 figure
Proc. LREC 2006, Genoa, May 24-26, 2006; pp. 1240-1245
null
null
cs.CL
null
This paper describes an interdisciplinary approach which brings together the fields of corpus linguistics and translation studies. It presents ongoing work on the creation of a corpus resource in which translation shifts are explicitly annotated. Translation shifts denote departures from formal correspondence between source and target text, i.e. deviations that have occurred during the translation process. A resource in which such shifts are annotated in a systematic way will make it possible to study those phenomena that need to be addressed if machine translation output is to resemble human translation. The resource described in this paper contains English source texts (parliamentary proceedings) and their German translations. The shift annotation is based on predicate-argument structures and proceeds in two steps: first, predicates and their arguments are annotated monolingually in a straightforward manner. Then, the corresponding English and German predicates and arguments are aligned with each other. Whenever a shift - mainly grammatical or semantic -has occurred, the alignment is tagged accordingly.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 13:26:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Cyrus", "Lea", "" ] ]
cs/0606097
Andrew Krizhanovsky A
A. Krizhanovsky
Synonym search in Wikipedia: Synarcher
4 pages, 2 figures, Synarcher program is available at http://synarcher.sourceforge.net
null
null
null
cs.IR cs.DM
null
The program Synarcher for synonym (and related terms) search in the text corpus of special structure (Wikipedia) was developed. The results of the search are presented in the form of graph. It is possible to explore the graph and search for graph elements interactively. Adapted HITS algorithm for synonym search, program architecture, and program work evaluation with test examples are presented in the paper. The proposed algorithm can be applied to a query expansion by synonyms (in a search engine) and a synonym dictionary forming.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 14:17:26 GMT" }, { "version": "v2", "created": "Fri, 23 Jun 2006 05:10:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Krizhanovsky", "A.", "" ] ]
cs/0606101
Marc Daumas
Marc Daumas (LIRMM, Lp2a), David Lester (LP2A, University of Manchester)
Stochastic Formal Methods: An application to accuracy of numeric software
null
null
null
null
cs.MS
null
This paper provides a bound on the number of numeric operations (fixed or floating point) that can safely be performed before accuracy is lost. This work has important implications for control systems with safety-critical software, as these systems are now running fast enough and long enough for their errors to impact on their functionality. Furthermore, worst-case analysis would blindly advise the replacement of existing systems that have been successfully running for years. We present here a set of formal theorems validated by the PVS proof assistant. These theorems will allow code analyzing tools to produce formal certificates of accurate behavior. For example, FAA regulations for aircraft require that the probability of an error be below $10^{-9}$ for a 10 hour flight.
[ { "version": "v1", "created": "Fri, 23 Jun 2006 08:26:56 GMT" }, { "version": "v2", "created": "Thu, 14 Sep 2006 11:51:28 GMT" }, { "version": "v3", "created": "Wed, 18 Oct 2006 19:41:07 GMT" }, { "version": "v4", "created": "Tue, 19 Dec 2006 17:10:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Daumas", "Marc", "", "LIRMM, Lp2a" ], [ "Lester", "David", "", "LP2A, University of\n Manchester" ] ]
cs/0606107
Uma Murthy
Ingrid Burbey, Gyuhyun Kwon, Uma Murthy, Nicholas Polys and Prince Vincent
Human Information Processing with the Personal Memex
null
null
null
null
cs.HC
null
In this report, we describe the work done in a project that explored the human information processing aspects of a personal memex (a memex to organize personal information). In the project, we considered the use of the personal memex, focusing on information recall, by three populations: people with Mild Cognitive Impairment, those diagnosed with Macular Degeneration, and a high-functioning population. The outcomes of the project included human information processing-centered design guidelines for the memex interface, a low-fidelity prototype, and an annotated bibliography for human information processing, usability and design literature relating to the memex and the populations we explored.
[ { "version": "v1", "created": "Mon, 26 Jun 2006 15:58:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Burbey", "Ingrid", "" ], [ "Kwon", "Gyuhyun", "" ], [ "Murthy", "Uma", "" ], [ "Polys", "Nicholas", "" ], [ "Vincent", "Prince", "" ] ]
cs/0606110
Richard Weber
Jochen Mundinger, Richard R. Weber and Gideon Weiss
Optimal Scheduling of Peer-to-Peer File Dissemination
27 pages, 3 figures. (v2) added a note about possible strengthening of Theorem 5 at end of proof; updated some references
null
null
null
cs.NI cs.DS math.OC
null
Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are increasingly used for disseminating potentially large files from a server to many end users via the Internet. The key idea is to divide the file into many equally-sized parts and then let users download each part (or, for network coding based systems such as Avalanche, linear combinations of the parts) either from the server or from another user who has already downloaded it. However, their performance evaluation has typically been limited to comparing one system relative to another and typically been realized by means of simulation and measurements. In contrast, we provide an analytic performance analysis that is based on a new uplink-sharing version of the well-known broadcasting problem. Assuming equal upload capacities, we show that the minimal time to disseminate the file is the same as for the simultaneous send/receive version of the broadcasting problem. For general upload capacities, we provide a mixed integer linear program (MILP) solution and a complementary fluid limit solution. We thus provide a lower bound which can be used as a performance benchmark for any P2P file dissemination system. We also investigate the performance of a decentralized strategy, providing evidence that the performance of necessarily decentralized P2P file dissemination systems should be close to this bound and therefore that it is useful in practice.
[ { "version": "v1", "created": "Tue, 27 Jun 2006 08:11:57 GMT" }, { "version": "v2", "created": "Fri, 30 Jun 2006 07:17:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Mundinger", "Jochen", "" ], [ "Weber", "Richard R.", "" ], [ "Weiss", "Gideon", "" ] ]
cs/0606111
Hind El Haouzi
Hind El Haouzi (CRAN)
Models simulation and interoperability using MDA and HLA
8 pages
Doctoral Symposium, IFAC/IFIP International conference on Interoperability for Enterprise Applications and Software (I-ESA'2006), March 22-24, 2006,, France (2006)
null
null
cs.OH
null
In the manufacturing context, there have been numerous efforts to use modeling and simulation tools and techniques to improve manufacturing efficiency over the last four decades. While an increasing number of manufacturing system decisions are being made based on the use of models, their use is still sporadic in many manufacturing environments. Our paper advocates for an approach combining MDA (model driven architecture) and HLA (High Level Architecture), the IEEE standard for modeling and simulation, in order to overcome the deficiencies of current simulation methods at the level of interoperability and reuse.
[ { "version": "v1", "created": "Tue, 27 Jun 2006 14:55:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Haouzi", "Hind El", "", "CRAN" ] ]
cs/0606115
Jos\'e Borges
Jose Borges and Mark Levene
Evaluating Variable Length Markov Chain Models for Analysis of User Web Navigation Sessions
null
null
null
null
cs.AI cs.IR
null
Markov models have been widely used to represent and analyse user web navigation data. In previous work we have proposed a method to dynamically extend the order of a Markov chain model and a complimentary method for assessing the predictive power of such a variable length Markov chain. Herein, we review these two methods and propose a novel method for measuring the ability of a variable length Markov model to summarise user web navigation sessions up to a given length. While the summarisation ability of a model is important to enable the identification of user navigation patterns, the ability to make predictions is important in order to foresee the next link choice of a user after following a given trail so as, for example, to personalise a web site. We present an extensive experimental evaluation providing strong evidence that prediction accuracy increases linearly with summarisation ability.
[ { "version": "v1", "created": "Wed, 28 Jun 2006 08:26:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Borges", "Jose", "" ], [ "Levene", "Mark", "" ] ]
cs/0606116
Philip Bille
Philip Bille
New Algorithms for Regular Expression Matching
null
null
null
null
cs.DS
null
In this paper we revisit the classical regular expression matching problem, namely, given a regular expression $R$ and a string $Q$, decide if $Q$ matches one of the strings specified by $R$. Let $m$ and $n$ be the length of $R$ and $Q$, respectively. On a standard unit-cost RAM with word length $w \geq \log n$, we show that the problem can be solved in $O(m)$ space with the following running times: \begin{equation*} \begin{cases} O(n\frac{m \log w}{w} + m \log w) & \text{if $m > w$} \\ O(n\log m + m\log m) & \text{if $\sqrt{w} < m \leq w$} \\ O(\min(n+ m^2, n\log m + m\log m)) & \text{if $m \leq \sqrt{w}$.} \end{cases} \end{equation*} This improves the best known time bound among algorithms using $O(m)$ space. Whenever $w \geq \log^2 n$ it improves all known time bounds regardless of how much space is used.
[ { "version": "v1", "created": "Wed, 28 Jun 2006 10:51:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Bille", "Philip", "" ] ]
cs/0606119
Sophie Aubin
Sampo Pyysalo, Tapio Salakoski, Sophie Aubin (LIPN), Adeline Nazarenko (LIPN)
Lexical Adaptation of Link Grammar to the Biomedical Sublanguage: a Comparative Evaluation of Three Approaches
null
Proceedings of the Second International Symposium on Semantic Mining in Biomedicine (SMBM 2006) (2006) 60-67
null
null
cs.CL cs.IR
null
We study the adaptation of Link Grammar Parser to the biomedical sublanguage with a focus on domain terms not found in a general parser lexicon. Using two biomedical corpora, we implement and evaluate three approaches to addressing unknown words: automatic lexicon expansion, the use of morphological clues, and disambiguation using a part-of-speech tagger. We evaluate each approach separately for its effect on parsing performance and consider combinations of these approaches. In addition to a 45% increase in parsing efficiency, we find that the best approach, incorporating information from a domain part-of-speech tagger, offers a statistically signicant 10% relative decrease in error. The adapted parser is available under an open-source license at http://www.it.utu.fi/biolg.
[ { "version": "v1", "created": "Wed, 28 Jun 2006 14:44:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Pyysalo", "Sampo", "", "LIPN" ], [ "Salakoski", "Tapio", "", "LIPN" ], [ "Aubin", "Sophie", "", "LIPN" ], [ "Nazarenko", "Adeline", "", "LIPN" ] ]
cs/0606122
P. Oscar Boykin
Wolfgang Mueller, P. Oscar Boykin, Nima Sarshar, Vwani P. Roychowdhury
Comparison of Image Similarity Queries in P2P Systems
To appear in IEEE P2P2006
null
null
null
cs.DC cs.NI
null
Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured queries are still necessary (i.e., the underlying queries do not efficiently map onto any structured framework), and are there unstructured P2P systems that can deliver the high bandwidth and computing performance necessary to support such applications. Toward this end, we consider an image search application which supports queries based on image similarity metrics, such as color histogram intersection, and discuss why in this setting, standard DHT approaches are not directly applicable. We then study the feasibility of implementing such an image search system on two different unstructured P2P systems: power-law topology with percolation search, and an optimized super-node topology using structured broadcasts. We examine the average and maximum values for node bandwidth, storage and processing requirements in the percolation and super-node models, and show that current high-end computers and high-speed links have sufficient resources to enable deployments of large-scale complex image search systems.
[ { "version": "v1", "created": "Thu, 29 Jun 2006 14:28:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Mueller", "Wolfgang", "" ], [ "Boykin", "P. Oscar", "" ], [ "Sarshar", "Nima", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
cs/0606123
Atos Alves
Atos Ramos Alves
Use MPLS in Lan's
9 pages, 0 figures tests in laboratory
null
null
null
cs.NI cs.CR
null
To demonstrate the result of researches in laboratory with the focus in exhibiting the real impact of the use of the technology MPLS in LAN. Through these researches we will verify that the investment in this technology is shown, of the point of view cost/benefit, very interesting, being necessary, however, the adoption of another measured, in order to settle down a satisfactory level in the items Quality and safety in the sending of packages in VPN but assisting to the requirement latency of the net very well being shown in the tests that it consumes on average one Tuesday leaves of the time spend for the same function in routing IP.
[ { "version": "v1", "created": "Thu, 29 Jun 2006 14:44:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Alves", "Atos Ramos", "" ] ]
cs/0606125
Leon Moonen
Marius Marin
Formalizing typical crosscutting concerns
24 pages
null
null
TUD-SERG-2006-010
cs.SE cs.PL
null
We present a consistent system for referring crosscutting functionality, relating crosscutting concerns to specific implementation idioms, and formalizing their underlying relations through queries. The system is based on generic crosscutting concerns that we organize and describe in a catalog. We have designed and implemented a tool support for querying source code for instances of the proposed generic concerns and organizing them in composite concern models. The composite concern model adds a new dimension to the dominant decomposition of the system for describing and making explicit source code relations specific to crosscutting concerns implementations. We use the proposed approach to describe crosscutting concerns in design patterns and apply the tool to an opensource system (JHotDraw).
[ { "version": "v1", "created": "Thu, 29 Jun 2006 20:04:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Marin", "Marius", "" ] ]
cs/0606126
Eldan Goldenberg
Eldan Goldenberg, Jacob R. Garcowski, Randall D. Beer
May We Have Your Attention: Analysis of a Selective Attention Task
In S. Schaal, A. Ijspeert, A. Billard, S. Vijayakumar, J. Hallam & J-A. Meyer (Eds.), From Animals to Animats 8: Proceedings of the Eighth International Conference on the Simulation of Adaptive Behavior (pp 49-56). MIT Press
null
null
null
cs.NE cs.AI
null
In this paper we present a deeper analysis than has previously been carried out of a selective attention problem, and the evolution of continuous-time recurrent neural networks to solve it. We show that the task has a rich structure, and agents must solve a variety of subproblems to perform well. We consider the relationship between the complexity of an agent and the ease with which it can evolve behavior that generalizes well across subproblems, and demonstrate a shaping protocol that improves generalization.
[ { "version": "v1", "created": "Thu, 29 Jun 2006 22:33:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldenberg", "Eldan", "" ], [ "Garcowski", "Jacob R.", "" ], [ "Beer", "Randall D.", "" ] ]
cs/0606127
Mukund Sundararajan
Tim Roughgarden (Stanford University) and Mukund Sundararajan (Stanford University)
Approximately Efficient Cost-Sharing Mechanisms
latex source, 22 pages, 1 figure
null
null
null
cs.GT
null
We make three different types of contributions to cost-sharing: First, we identify several new classes of combinatorial cost functions that admit incentive-compatible mechanisms achieving both a constant-factor approximation of budget-balance and a polylogarithmic approximation of the social cost formulation of efficiency. Second, we prove a new, optimal lower bound on the approximate efficiency of every budget-balanced Moulin mechanism for Steiner tree or SSRoB cost functions. This lower bound exposes a latent approximation hierarchy among different cost-sharing problems. Third, we show that weakening the definition of incentive-compatibility to strategyproofness can permit exponentially more efficient approximately budget-balanced mechanisms, in particular for set cover cost-sharing problems.
[ { "version": "v1", "created": "Fri, 30 Jun 2006 02:24:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Roughgarden", "Tim", "", "Stanford University" ], [ "Sundararajan", "Mukund", "", "Stanford University" ] ]
cs/0606128
Andrew Krizhanovsky A
A. Krizhanovsky
Automatic forming lists of semantically related terms based on texts rating in the corpus with hyperlinks and categories (In Russian)
6 pages, 1 figure, in Russian, PDF, for other formats see http://whinger.narod.ru/paper/index.html
null
null
null
cs.IR cs.DM
null
HITS adapted algorithm for synonym search, the program architecture, and the program work evaluation with test examples are presented in the paper. Synarcher program for synonym (and related terms) search in the text corpus of special structure (Wikipedia) was developed. The results of search are presented in the form of a graph. It is possible to explore the graph and search graph elements interactively. The proposed algorithm could be applied to the search request extending and for synonym dictionary forming.
[ { "version": "v1", "created": "Fri, 30 Jun 2006 15:17:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Krizhanovsky", "A.", "" ] ]
cs/0607001
Chinmoy Bhattacharya
Chinmoy Bhattacharya and P.R.Mahapatra
A Novel Application of Lifting Scheme for Multiresolution Correlation of Complex Radar Signals
null
null
null
null
cs.DC cs.CC
null
The lifting scheme of discrete wavelet transform (DWT) is now quite well established as an efficient technique for image compression, and has been incorporated into the JPEG2000 standards. However, the potential of the lifting scheme has not been exploited in the context of correlationbased processing, such as encountered in radar applications. This paper presents a complete and consistent framework for the application of DWT for correlation of complex signals. In particular, lifting scheme factorization of biorthogonal filterbanks is carried out in dual analysis basis spaces for multiresolution correlation of complex radar signals in the DWT domain only. A causal formulation of lifting for orthogonal filterbank is also developed. The resulting parallel algorithms and consequent saving of computational effort are briefly dealt with.
[ { "version": "v1", "created": "Sat, 1 Jul 2006 16:58:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Bhattacharya", "Chinmoy", "" ], [ "Mahapatra", "P. R.", "" ] ]
cs/0607005
Florentin Smarandache
Florentin Smarandache, Jean Dezert
Belief Conditioning Rules (BCRs)
26 pages
null
null
null
cs.AI
null
In this paper we propose a new family of Belief Conditioning Rules (BCRs) for belief revision. These rules are not directly related with the fusion of several sources of evidence but with the revision of a belief assignment available at a given time according to the new truth (i.e. conditioning constraint) one has about the space of solutions of the problem.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 14:54:54 GMT" }, { "version": "v2", "created": "Wed, 29 Nov 2006 19:14:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
cs/0607006
Leon Moonen
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella, and Tom Tourwe
Applying and Combining Three Different Aspect Mining Techniques
28 pages
null
null
TUD-SERG-2006-002
cs.SE cs.PL
null
Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these concerns in the source code. Whereas some concerns are explicitly represented by program entities (like classes, methods and variables) and thus are easy to identify, crosscutting concerns are not captured by a single program entity but are scattered over many program entities and are tangled with the other concerns. Because of their crosscutting nature, such crosscutting concerns are difficult to identify, and reduce the understandability of the system as a whole. In this paper, we report on a combined experiment in which we try to identify crosscutting concerns in the JHotDraw framework automatically. We first apply three independently developed aspect mining techniques to JHotDraw and evaluate and compare their results. Based on this analysis, we present three interesting combinations of these three techniques, and show how these combinations provide a more complete coverage of the detected concerns as compared to the original techniques individually. Our results are a first step towards improving the understandability of a system that contains crosscutting concerns, and can be used as a basis for refactoring the identified crosscutting concerns into aspects.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 17:16:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Ceccato", "Mariano", "" ], [ "Marin", "Marius", "" ], [ "Mens", "Kim", "" ], [ "Moonen", "Leon", "" ], [ "Tonella", "Paolo", "" ], [ "Tourwe", "Tom", "" ] ]
cs/0607009
Yuri Pritykin
Yuri Pritykin
Almost Periodicity, Finite Automata Mappings and Related Effectiveness Issues
12 pages. Continuation of the results from the paper "Strongly Almost Periodic Sequences under Finite Automata Mappings" on cs.DM/0605026 Enhanced version of the talk on Workshop on Words and Automata, St Petersburg, Russia, June 7th, 2006 (satellite to CSR'06)
null
null
null
cs.DM
null
The paper studies different variants of almost periodicity notion. We introduce the class of eventually strongly almost periodic sequences where some suffix is strongly almost periodic (=uniformly recurrent). The class of almost periodic sequences includes the class of eventually strongly almost periodic sequences, and we prove this inclusion to be strict. We prove that the class of eventually strongly almost periodic sequences is closed under finite automata mappings and finite transducers. Moreover, an effective form of this result is presented. Finally we consider some algorithmic questions concerning almost periodicity.
[ { "version": "v1", "created": "Mon, 3 Jul 2006 08:27:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritykin", "Yuri", "" ] ]
cs/0607011
Ayan Mahalanobis
Ayan Mahalanobis
A simple generalization of El-Gamal cryptosystem to non-abelian groups
null
null
null
null
cs.CR math.GR
null
In this paper we study the MOR cryptosystem. We use the group of unitriangular matrices over a finite field as the non-abelian group in the MOR cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem over finite fields can be built using the proposed groups and a set of automorphisms of these groups. We also show that the security of this proposed MOR cryptosystem is equivalent to the El-Gamal cryptosystem over finite fields.
[ { "version": "v1", "created": "Tue, 4 Jul 2006 11:28:38 GMT" }, { "version": "v2", "created": "Thu, 6 Jul 2006 11:32:31 GMT" }, { "version": "v3", "created": "Tue, 11 Jul 2006 12:56:43 GMT" }, { "version": "v4", "created": "Thu, 20 Jul 2006 06:07:39 GMT" }, { "version": "v5", "created": "Mon, 7 May 2007 14:56:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Mahalanobis", "Ayan", "" ] ]
cs/0607012
Anne-Marie Vercoustre
Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis), Mounir Fegas (INRIA Rocquencourt / INRIA Sophia Antipolis), Saba Gul (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis)
A Flexible Structured-based Representation for XML Document Mining
This is the authors' version. To access the final version go to the editor's site through the DOI
Dans The Fourth International Workshop of the Initiative for the Evaluation of XML Retrieval (INEX 2005)
10.1007/11766278\_34
null
cs.IR
null
This paper reports on the INRIA group's approach to XML mining while participating in the INEX XML Mining track 2005. We use a flexible representation of XML documents that allows taking into account the structure only or both the structure and content. Our approach consists of representing XML documents by a set of their sub-paths, defined according to some criteria (length, root beginning, leaf ending). By considering those sub-paths as words, we can use standard methods for vocabulary reduction, and simple clustering methods such as K-means that scale well. We actually use an implementation of the clustering algorithm known as "dynamic clouds" that can work with distinct groups of independent variables put in separate variables. This is useful in our model since embedded sub-paths are not independent: we split potentially dependant paths into separate variables, resulting in each of them containing independant paths. Experiments with the INEX collections show good results for the structure-only collections, but our approach could not scale well for large structure-and-content collections.
[ { "version": "v1", "created": "Wed, 5 Jul 2006 12:07:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Vercoustre", "Anne-Marie", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Fegas", "Mounir", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Gul", "Saba", "", "INRIA\n Rocquencourt / INRIA Sophia Antipolis" ], [ "Lechevallier", "Yves", "", "INRIA Rocquencourt\n / INRIA Sophia Antipolis" ] ]
cs/0607013
Jan Chomicki
Jan Chomicki
Database Querying under Changing Preferences
Submitted to a journal
null
null
null
cs.DB cs.AI
null
We present here a formal foundation for an iterative and incremental approach to constructing and evaluating preference queries. Our main focus is on query modification: a query transformation approach which works by revising the preference relation in the query. We provide a detailed analysis of the cases where the order-theoretic properties of the preference relation are preserved by the revision. We consider a number of different revision operators: union, prioritized and Pareto composition. We also formulate algebraic laws that enable incremental evaluation of preference queries. Finally, we consider two variations of the basic framework: finite restrictions of preference relations and weak-order extensions of strict partial order preference relations.
[ { "version": "v1", "created": "Wed, 5 Jul 2006 18:37:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Chomicki", "Jan", "" ] ]
cs/0607015
Juan Valle-Lisboa C
Juan C. Valle-Lisboa (1), Eduardo Mizraji (1) ((1) Seccion Biofisica, Facultad de Ciencias, Universidad de la Republica)
The uncovering of hidden structures by Latent Semantic Analysis
51 pages, 7 figures, pdf
null
null
null
cs.IR
null
Latent Semantic Analysis (LSA) is a well known method for information retrieval. It has also been applied as a model of cognitive processing and word-meaning acquisition. This dual importance of LSA derives from its capacity to modulate the meaning of words by contexts, dealing successfully with polysemy and synonymy. The underlying reasons that make the method work are not clear enough. We propose that the method works because it detects an underlying block structure (the blocks corresponding to topics) in the term by document matrix. In real cases this block structure is hidden because of perturbations. We propose that the correct explanation for LSA must be searched in the structure of singular vectors rather than in the profile of singular values. Using Perron-Frobenius theory we show that the presence of disjoint blocks of documents is marked by sign-homogeneous entries in the vectors corresponding to the documents of one block and zeros elsewhere. In the case of nearly disjoint blocks, perturbation theory shows that if the perturbations are small the zeros in the leading vectors are replaced by small numbers (pseudo-zeros). Since the singular values of each block might be very different in magnitude, their order does not mirror the order of blocks. When the norms of the blocks are similar, LSA works fine, but we propose that when the topics have different sizes, the usual procedure of selecting the first k singular triplets (k being the number of blocks) should be replaced by a method that selects the perturbed Perron vectors for each block.
[ { "version": "v1", "created": "Wed, 5 Jul 2006 22:56:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Valle-Lisboa", "Juan C.", "" ], [ "Mizraji", "Eduardo", "" ] ]
cs/0607016
Krzysztof R. Apt
Krzysztof R. Apt and Peter Zoeteweij
An Analysis of Arithmetic Constraints on Integer Intervals
44 pages, to appear in 'Constraints' journal
null
null
null
cs.AI cs.PL
null
Arithmetic constraints on integer intervals are supported in many constraint programming systems. We study here a number of approaches to implement constraint propagation for these constraints. To describe them we introduce integer interval arithmetic. Each approach is explained using appropriate proof rules that reduce the variable domains. We compare these approaches using a set of benchmarks. For the most promising approach we provide results that characterize the effect of constraint propagation. This is a full version of our earlier paper, cs.PL/0403016.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 10:09:43 GMT" }, { "version": "v2", "created": "Wed, 21 Mar 2007 13:51:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Zoeteweij", "Peter", "" ] ]
cs/0607018
Edward Hanna
Edward Hanna
Feynman Checkerboard as a Model of Discrete Space-Time
10 pages, 14 figures - changed section 6 title
null
null
null
cs.CE
null
In 1965, Feynman wrote of using a lattice containing one dimension of space and one dimension of time to derive aspects of quantum mechanics. Instead of summing the behavior of all possible paths as he did, this paper will consider the motion of single particles within this discrete Space-Time lattice, sometimes called Feynman's Checkerboard. This empirical approach yielded several predicted emergent properties for a discrete Space-Time lattice, one of which is novel and testable.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 16:35:38 GMT" }, { "version": "v2", "created": "Sat, 12 Aug 2006 19:10:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hanna", "Edward", "" ] ]
cs/0607019
Stephen Luttrell
Stephen Luttrell
Modelling the Probability Density of Markov Sources
26 pages
null
null
null
cs.NE
null
This paper introduces an objective function that seeks to minimise the average total number of bits required to encode the joint state of all of the layers of a Markov source. This type of encoder may be applied to the problem of optimising the bottom-up (recognition model) and top-down (generative model) connections in a multilayer neural network, and it unifies several previous results on the optimisation of multilayer neural networks.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 18:49:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Luttrell", "Stephen", "" ] ]
cs/0607022
George Maney Mr.
G. A. Maney
Ten Incredibly Dangerous Software Ideas
14 page software industry interest book synopsis
null
null
null
cs.GL
null
This is a rough draft synopsis of a book presently in preparation. This book provides a systematic critique of the software industry. This critique is accomplished using classical methods in practical design science.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 01:17:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Maney", "G. A.", "" ] ]
cs/0607023
Josep Diaz Prof
J. Diaz, D. Mitsche, X. Perez
Sharp threshold for hamiltonicity of random geometric graphs
10 pages, 2 figures
null
null
null
cs.DM
null
We show for an arbitrary $\ell_p$ norm that the property that a random geometric graph $\mathcal G(n,r)$ contains a Hamiltonian cycle exhibits a sharp threshold at $r=r(n)=\sqrt{\frac{\log n}{\alpha_p n}}$, where $\alpha_p$ is the area of the unit disk in the $\ell_p$ norm. The proof is constructive and yields a linear time algorithm for finding a Hamiltonian cycle of $\RG$ a.a.s., provided $r=r(n)\ge\sqrt{\frac{\log n}{(\alpha_p -\epsilon)n}}$ for some fixed $\epsilon > 0$.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 18:16:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaz", "J.", "" ], [ "Mitsche", "D.", "" ], [ "Perez", "X.", "" ] ]
cs/0607025
Oskar Sandberg
Oskar Sandberg and Ian Clarke
The evolution of navigable small-world networks
null
null
null
null
cs.DS cs.DC
null
Small-world networks, which combine randomized and structured elements, are seen as prevalent in nature. Several random graph models have been given for small-world networks, with one of the most fruitful, introduced by Jon Kleinberg, showing in which type of graphs it is possible to route, or navigate, between vertices with very little knowledge of the graph itself. Kleinberg's model is static, with random edges added to a fixed grid. In this paper we introduce, analyze and test a randomized algorithm which successively rewires a graph with every application. The resulting process gives a model for the evolution of small-world networks with properties similar to those studied by Kleinberg.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 13:21:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Sandberg", "Oskar", "" ], [ "Clarke", "Ian", "" ] ]
cs/0607026
James Aspnes
James Aspnes and Yang Richard Yang and Yitong Yin
Path-independent load balancing with unreliable machines
Full version of paper submitted to SODA 2007
null
null
null
cs.DS cs.NI
null
We consider algorithms for load balancing on unreliable machines. The objective is to optimize the two criteria of minimizing the makespan and minimizing job reassignments in response to machine failures. We assume that the set of jobs is known in advance but that the pattern of machine failures is unpredictable. Motivated by the requirements of BGP routing, we consider path-independent algorithms, with the property that the job assignment is completely determined by the subset of available machines and not the previous history of the assignments. We examine first the question of performance measurement of path-independent load-balancing algorithms, giving the measure of makespan and the normalized measure of reassignments cost. We then describe two classes of algorithms for optimizing these measures against an oblivious adversary for identical machines. The first, based on independent random assignments, gives expected reassignment costs within a factor of 2 of optimal and gives a makespan within a factor of O(log m/log log m) of optimal with high probability, for unknown job sizes. The second, in which jobs are first grouped into bins and at most one bin is assigned to each machine, gives constant-factor ratios on both reassignment cost and makespan, for known job sizes. Several open problems are discussed.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 14:01:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Aspnes", "James", "" ], [ "Yang", "Yang Richard", "" ], [ "Yin", "Yitong", "" ] ]
cs/0607028
Christian Lavault
Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady Ravelomanana (LIPN)
A Quasi-Optimal Leader Election Algorithm in Radio Networks with Log-Logarithmic Awake Time Slots
null
null
null
null
cs.DC cs.NI
null
Radio networks (RN) are distributed systems (\textit{ad hoc networks}) consisting in $n \ge 2$ radio stations. Assuming the number $n$ unknown, two distinct models of RN without collision detection (\textit{no-CD}) are addressed: the model with \textit{weak no-CD} RN and the one with \textit{strong no-CD} RN. We design and analyze two distributed leader election protocols, each one running in each of the above two (no-CD RN) models, respectively. Both randomized protocols are shown to elect a leader within $\BO(\log{(n)})$ expected time, with no station being awake for more than $\BO(\log{\log{(n)}})$ time slots (such algorithms are said to be \textit{energy-efficient}). Therefore, a new class of efficient algorithms is set up that matchthe $\Omega(\log{(n)})$ time lower-bound established by Kushilevitz and Mansour.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 17:42:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Marckert", "Jean-François", "", "LaBRI" ], [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
cs/0607031
Christian Lavault
Christian Lavault (LIPN), Mario Valencia-Pabon (LIPN)
A distributed approximation algorithm for the minimum degree minimum weight spanning trees
null
null
null
null
cs.DC cs.DM
null
Fischer has shown how to compute a minimum weight spanning tree of degree at most $b \Delta^* + \lceil \log\_b n\rceil$ in time $O(n^{4 + 1/\ln b})$ for any constant $b > 1$, where $\Delta^*$ is the value of an optimal solution and $n$ is the number of nodes in the network. In this paper, we propose a distributed version of Fischer's algorithm that requires messages and time complexity $O(n^{2 + 1/\ln b})$, and O(n) space per node.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 08:42:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Valencia-Pabon", "Mario", "", "LIPN" ] ]
cs/0607032
Christian Lavault
Christian Lavault (LIPN), Guy Louchard (ULB)
Asymptotic Analysis of a Leader Election Algorithm
null
null
null
null
cs.DC cs.NA
null
Itai and Rodeh showed that, on the average, the communication of a leader election algorithm takes no more than $LN$ bits, where $L \simeq 2.441716$ and $N$ denotes the size of the ring. We give a precise asymptotic analysis of the average number of rounds M(n) required by the algorithm, proving for example that $\dis M(\infty) := \lim\_{n\to \infty} M(n) = 2.441715879...$, where $n$ is the number of starting candidates in the election. Accurate asymptotic expressions of the second moment $M^{(2)}(n)$ of the discrete random variable at hand, its probability distribution, and the generalization to all moments are given. Corresponding asymptotic expansions $(n\to \infty)$ are provided for sufficiently large $j$, where $j$ counts the number of rounds. Our numerical results show that all computations perfectly fit the observed values. Finally, we investigate the generalization to probability $t/n$, where $t$ is a non negative real parameter. The real function $\dis M(\infty,t) := \lim\_{n\to \infty} M(n,t)$ is shown to admit \textit{one unique minimum} $M(\infty,t^{*})$ on the real segment $(0,2)$. Furthermore, the variations of $M(\infty,t)$ on thewhole real line are also studied in detail.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 08:46:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Louchard", "Guy", "", "ULB" ] ]
cs/0607033
Oleg Verbitsky
Oleg Verbitsky
Planar Graphs: Logical Complexity and Parallel Isomorphism Tests
36 pages
null
null
null
cs.CC cs.LO
null
We prove that every triconnected planar graph is definable by a first order sentence that uses at most 15 variables and has quantifier depth at most $11\log_2 n+43$. As a consequence, a canonic form of such graphs is computable in $AC^1$ by the 14-dimensional Weisfeiler-Lehman algorithm. This provides another way to show that the planar graph isomorphism is solvable in $AC^1$.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 10:37:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Verbitsky", "Oleg", "" ] ]
cs/0607034
Christian Lavault
Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady Ravelomanana (LIPN)
Quasi-Optimal Leader Election Algorithms in Radio Networks with Loglogarithmic Awake Time Slots
null
10th IEEE International Conference on Telecommunications (2003) 1113-1119
null
null
cs.DC cs.NI
null
A radio network (RN) is a distributed system consisting of $n$ radio stations. We design and analyze two distributed leader election protocols in RN where the number $n$ of radio stations is unknown. The first algorithm runs under the assumption of {\it limited collision detection}, while the second assumes that {\it no collision detection} is available. By ``limited collision detection'', we mean that if exactly one station sends (broadcasts) a message, then all stations (including the transmitter) that are listening at this moment receive the sent message. By contrast, the second no-collision-detection algorithm assumes that a station cannot simultaneously send and listen signals. Moreover, both protocols allow the stations to keep asleep as long as possible, thus minimizing their awake time slots (such algorithms are called {\it energy-efficient}). Both randomized protocols in RN areshown to elect a leader in $O(\log{(n)})$ expected time, with no station being awake for more than $O(\log{\log{(n)}})$ time slots. Therefore, a new class of efficient algorithms is set up that match the $\Omega(\log{(n)})$ time lower-bound established by Kushilevitz and Mansour.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 12:04:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Marckert", "Jean-François", "", "LaBRI" ], [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
cs/0607037
Daowen Qiu
Zhujun Fan
The Minimal Cost Algorithm for Off-Line Diagnosability of Discrete Event Systems
12 pages, 7 figures, critical comments and suggestions are welcomed and appreciated
null
null
null
cs.AI cs.CC
null
The failure diagnosis for {\it discrete event systems} (DESs) has been given considerable attention in recent years. Both on-line and off-line diagnostics in the framework of DESs was first considered by Lin Feng in 1994, and particularly an algorithm for diagnosability of DESs was presented. Motivated by some existing problems to be overcome in previous work, in this paper, we investigate the minimal cost algorithm for diagnosability of DESs. More specifically: (i) we give a generic method for judging a system's off-line diagnosability, and the complexity of this algorithm is polynomial-time; (ii) and in particular, we present an algorithm of how to search for the minimal set in all observable event sets, whereas the previous algorithm may find {\it non-minimal} one.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 04:55:03 GMT" }, { "version": "v2", "created": "Wed, 11 Apr 2007 16:27:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Fan", "Zhujun", "" ] ]
cs/0607038
Benoit Donnet
Benoit Donnet, Bruno Baynat, Timur Friedman
Retouched Bloom Filters: Allowing Networked Applications to Flexibly Trade Off False Positives Against False Negatives
This is a new version of the technical reports with improved algorithms and theorical analysis of algorithms
null
null
null
cs.NI
null
Where distributed agents must share voluminous set membership information, Bloom filters provide a compact, though lossy, way for them to do so. Numerous recent networking papers have examined the trade-offs between the bandwidth consumed by the transmission of Bloom filters, and the error rate, which takes the form of false positives, and which rises the more the filters are compressed. In this paper, we introduce the retouched Bloom filter (RBF), an extension that makes the Bloom filter more flexible by permitting the removal of selected false positives at the expense of generating random false negatives. We analytically show that RBFs created through a random process maintain an overall error rate, expressed as a combination of the false positive rate and the false negative rate, that is equal to the false positive rate of the corresponding Bloom filters. We further provide some simple heuristics and improved algorithms that decrease the false positive rate more than than the corresponding increase in the false negative rate, when creating RBFs. Finally, we demonstrate the advantages of an RBF over a Bloom filter in a distributed network topology measurement application, where information about large stop sets must be shared among route tracing monitors.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 10:40:26 GMT" }, { "version": "v2", "created": "Fri, 1 Dec 2006 13:52:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Donnet", "Benoit", "" ], [ "Baynat", "Bruno", "" ], [ "Friedman", "Timur", "" ] ]
cs/0607039
M. H. van Emden
M.H. van Emden
Set-Theoretic Preliminaries for Computer Scientists
36 pages, 5 figures
null
null
DCS-304-IR
cs.DM cs.DB
null
The basics of set theory are usually copied, directly or indirectly, by computer scientists from introductions to mathematical texts. Often mathematicians are content with special cases when the general case is of no mathematical interest. But sometimes what is of no mathematical interest is of great practical interest in computer science. For example, non-binary relations in mathematics tend to have numerical indexes and tend to be unsorted. In the theory and practice of relational databases both these simplifications are unwarranted. In response to this situation we present here an alternative to the ``set-theoretic preliminaries'' usually found in computer science texts. This paper separates binary relations from the kind of relations that are needed in relational databases. Its treatment of functions supports both computer science in general and the kind of relations needed in databases. As a sample application this paper shows how the mathematical theory of relations naturally leads to the relational data model and how the operations on relations are by themselves already a powerful vehicle for queries.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 14:27:43 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ] ]
cs/0607040
Gopal Gupta
Enrico Pontelli (1), Karen Villaverde (1), Hai-Feng Guo (2), Gopal Gupta (3) ((1) New Mexico State University, (2) University of Nebraska at Omaha, (3) University of Texas at Dallas)
PALS: Efficient Or-Parallelism on Beowulf Clusters
63 pages, 32 figures, 5 tabels. Theory and Practice of Logic Programming (to appear)
null
null
null
cs.DC cs.PL
null
This paper describes the development of the PALS system, an implementation of Prolog capable of efficiently exploiting or-parallelism on distributed-memory platforms--specifically Beowulf clusters. PALS makes use of a novel technique, called incremental stack-splitting. The technique proposed builds on the stack-splitting approach, previously described by the authors and experimentally validated on shared-memory systems, which in turn is an evolution of the stack-copying method used in a variety of parallel logic and constraint systems--e.g., MUSE, YAP, and Penny. The PALS system is the first distributed or-parallel implementation of Prolog based on the stack-splitting method ever realized. The results presented confirm the superiority of this method as a simple yet effective technique to transition from shared-memory to distributed-memory systems. PALS extends stack-splitting by combining it with incremental copying; the paper provides a description of the implementation of PALS, including details of how distributed scheduling is handled. We also investigate methodologies to effectively support order-sensitive predicates (e.g., side-effects) in the context of the stack-splitting scheme. Experimental results obtained from running PALS on both Shared Memory and Beowulf systems are presented and analyzed.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 19:56:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Pontelli", "Enrico", "" ], [ "Villaverde", "Karen", "" ], [ "Guo", "Hai-Feng", "" ], [ "Gupta", "Gopal", "" ] ]
cs/0607044
Valdis Vitolins
Audris Kalnins, Valdis Vitolins
Use of UML and Model Transformations for Workflow Process Definitions
12 pages, 7 figures, communications of the conference "Baltic DB&IS 2006", July 3-6, Vilnius, Lithuania
Audris Kalnins, Valdis Vitolins, Databases and Information Systems, BalticDB&IS'2006, edited by Olegas Vasilecas, Johann Eder, Albertas Caplinskas, Vilnius, Technika, 2006, pp. 3.-15
null
null
cs.SE
null
Currently many different modeling languages are used for workflow definitions in BPM systems. Authors of this paper analyze the two most popular graphical languages, with highest possibility of wide practical usage - UML Activity diagrams (AD) and Business Process Modeling Notation (BPMN). The necessary in practice workflow aspects are briefly discussed, and on this basis a natural AD profile is proposed, which covers all of them. A functionally equivalent BPMN subset is also selected. The semantics of both languages in the context of process execution (namely, mapping to BPEL) is also analyzed in the paper. By analyzing AD and BPMN metamodels, authors conclude that an exact transformation from AD to BPMN is not trivial even for the selected subset, though these languages are considered to be similar. Authors show how this transformation could be defined in the MOLA transformation language.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 09:23:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalnins", "Audris", "" ], [ "Vitolins", "Valdis", "" ] ]