id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-21 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0607046 | Xin Han | Xin Han, Kazuo Iwama, Deshi Ye, Guochuan Zhang | Strip Packing vs. Bin Packing | 12 pages, 3 figures | null | null | null | cs.DS | null | In this paper we establish a general algorithmic framework between bin
packing and strip packing, with which we achieve the same asymptotic bounds by
applying bin packing algorithms to strip packing. More precisely we obtain the
following results: (1) Any offline bin packing algorithm can be applied to
strip packing maintaining the same asymptotic worst-case ratio. Thus using FFD
(MFFD) as a subroutine, we get a practical (simple and fast) algorithm for
strip packing with an upper bound 11/9 (71/60). A simple AFPTAS for strip
packing immediately follows. (2) A class of Harmonic-based algorithms for bin
packing can be applied to online strip packing maintaining the same asymptotic
competitive ratio. It implies online strip packing admits an upper bound of
1.58889 on the asymptotic competitive ratio, which is very close to the lower
bound 1.5401 and significantly improves the previously best bound of 1.6910 and
affirmatively answers an open question posed by Csirik et. al.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 09:58:34 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Aug 2006 00:33:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Han",
"Xin",
""
],
[
"Iwama",
"Kazuo",
""
],
[
"Ye",
"Deshi",
""
],
[
"Zhang",
"Guochuan",
""
]
] |
cs/0607047 | Paul Goldberg | Nick Palmer and Paul W. Goldberg | PAC Classification based on PAC Estimates of Label Class Distributions | 14 pages | null | null | null | cs.LG | null | A standard approach in pattern classification is to estimate the
distributions of the label classes, and then to apply the Bayes classifier to
the estimates of the distributions in order to classify unlabeled examples. As
one might expect, the better our estimates of the label class distributions,
the better the resulting classifier will be. In this paper we make this
observation precise by identifying risk bounds of a classifier in terms of the
quality of the estimates of the label class distributions. We show how PAC
learnability relates to estimates of the distributions that have a PAC
guarantee on their $L_1$ distance from the true distribution, and we bound the
increase in negative log likelihood risk in terms of PAC bounds on the
KL-divergence. We give an inefficient but general-purpose smoothing method for
converting an estimated distribution that is good under the $L_1$ metric into a
distribution that is good under the KL-divergence.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 13:52:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Palmer",
"Nick",
""
],
[
"Goldberg",
"Paul W.",
""
]
] |
cs/0607051 | Catherine Recanati | Catherine Recanati (LIPN) | Raisonner avec des diagrammes : perspectives cognitives et
computationnelles | paru initialement comme Rapport LIPN en 2004 | Intellectica 40 (2005) 9-42 | null | null | cs.CL | null | Diagrammatic, analogical or iconic representations are often contrasted with
linguistic or logical representations, in which the shape of the symbols is
arbitrary. The aim of this paper is to make a case for the usefulness of
diagrams in inferential knowledge representation systems. Although commonly
used, diagrams have for a long time suffered from the reputation of being only
a heuristic tool or a mere support for intuition. The first part of this paper
is an historical background paying tribute to the logicians, psychologists and
computer scientists who put an end to this formal prejudice against diagrams.
The second part is a discussion of their characteristics as opposed to those of
linguistic forms. The last part is aimed at reviving the interest for
heterogeneous representation systems including both linguistic and diagrammatic
representations.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:13:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Recanati",
"Catherine",
"",
"LIPN"
]
] |
cs/0607053 | Thierry Poibeau | Thierry Poibeau (LIPN) | Linguistically Grounded Models of Language Change | null | The 28th Annual Conference of the Cognitive Science Society
(CogSci 2006), Canada (2006) | null | null | cs.AI cs.CL | null | Questions related to the evolution of language have recently known an
impressive increase of interest (Briscoe, 2002). This short paper aims at
questioning the scientific status of these models and their relations to
attested data. We show that one cannot directly model non-linguistic factors
(exogenous factors) even if they play a crucial role in language evolution. We
then examine the relation between linguistic models and attested language data,
as well as their contribution to cognitive linguistics.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:17:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
] |
cs/0607054 | Elliott H. Lieb | Elliott H. Lieb, Daniel Osherson and Scott Weinstein | Elementary Proof of a Theorem of Jean Ville | 12 pages latex | null | null | null | cs.CC | null | Considerable thought has been devoted to an adequate definition of the class
of infinite, random binary sequences (the sort of sequence that almost
certainly arises from flipping a fair coin indefinitely). The first
mathematical exploration of this problem was due to R. Von Mises, and based on
his concept of a "selection function." A decisive objection to Von Mises' idea
was formulated in a theorem offered by Jean Ville in 1939. It shows that some
sequences admitted by Von Mises as "random" in fact manifest a certain kind of
systematicity. Ville's proof is challenging, and an alternative approach has
appeared only in condensed form. We attempt to provide an expanded version of
the latter, alternative argument.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:52:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lieb",
"Elliott H.",
""
],
[
"Osherson",
"Daniel",
""
],
[
"Weinstein",
"Scott",
""
]
] |
cs/0607055 | Akimichi Takemura | Hisayuki Hara and Akimichi Takemura | Boundary cliques, clique trees and perfect sequences of maximal cliques
of a chordal graph | null | null | null | null | cs.DM | null | We characterize clique trees of a chordal graph in their relation to
simplicial vertices and perfect sequences of maximal cliques. We investigate
boundary cliques defined by Shibata and clarify their relation to endpoints of
clique trees. Next we define a symmetric binary relation between the set of
clique trees and the set of perfect sequences of maximal cliques. We describe
the relation as a bipartite graph and prove that the bipartite graph is always
connected. Lastly we consider to characterize chordal graphs from the aspect of
non-uniqueness of clique trees.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 23:14:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hara",
"Hisayuki",
""
],
[
"Takemura",
"Akimichi",
""
]
] |
cs/0607056 | Sylviane Schwer | Sylviane Schwer (LIPN) | Reasoning with Intervals on Granules | null | Journal of Universal Computer Science 8 (8) (2002) 793-808 | null | null | cs.AI cs.DM | null | The formalizations of periods of time inside a linear model of Time are
usually based on the notion of intervals, that may contain or may not their
endpoints. This is not enought when the periods are written in terms of coarse
granularities with respect to the event taken into account. For instance, how
to express the inter-war period in terms of a {\em years} interval? This paper
presents a new type of intervals, neither open, nor closed or open-closed and
the extension of operations on intervals of this new type, in order to reduce
the gap between the discourse related to temporal relationship and its
translation into a discretized model of Time.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 09:16:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schwer",
"Sylviane",
"",
"LIPN"
]
] |
cs/0607057 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN), the Projet PAI Amadeus Collaboration | The Average Size of Giant Components Between the Double-Jump | A para\^{i}tre dans Algorithmica | Algorithmica Issue sp\'{e}ciale "Analysis of Algorithms" (2006) A
para\^{i}tre | null | null | cs.DM math.CO math.PR | null | We study the sizes of connected components according to their excesses during
a random graph process built with $n$ vertices. The considered model is the
continuous one defined in Janson 2000. An ${\ell}$-component is a connected
component with ${\ell}$ edges more than vertices. $\ell$ is also called the
\textit{excess} of such component. As our main result, we show that when $\ell$
and ${n \over \ell}$ are both large, the expected number of vertices that ever
belong to an $\ell$-component is about ${12}^{1/3} {\ell}^{1/3} n^{2/3}$. We
also obtain limit theorems for the number of creations of $\ell$-components.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 09:23:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Collaboration",
"the Projet PAI Amadeus",
""
]
] |
cs/0607058 | Tom Ridge | Tom Ridge | Craig's Interpolation Theorem formalised and mechanised in Isabelle/HOL | null | null | null | null | cs.LO | null | We formalise and mechanise a construtive, proof theoretic proof of Craig's
Interpolation Theorem in Isabelle/HOL. We give all the definitions and lemma
statements both formally and informally. We also transcribe informally the
formal proofs. We detail the main features of our mechanisation, such as the
formalisation of binding for first order formulae. We also give some
applications of Craig's Interpolation Theorem.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 17:26:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ridge",
"Tom",
""
]
] |
cs/0607059 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN), Alphonse Laza Rijamame (D.M.I) | Creation and Growth of Components in a Random Hypergraph Process | R\'{e}sum\'{e} \'{e}tendu | Proceedings of The Twelfth Annual International Computing and
Combinatorics Conference (COCOON'06) -- Lecture Notes in Computer Science
(2006) \`{a} para\^{i}tre | null | null | cs.DM math.CO math.PR | null | Denote by an $\ell$-component a connected $b$-uniform hypergraph with $k$
edges and $k(b-1) - \ell$ vertices. We prove that the expected number of
creations of $\ell$-component during a random hypergraph process tends to 1 as
$\ell$ and $b$ tend to $\infty$ with the total number of vertices $n$ such that
$\ell = o(\sqrt[3]{\frac{n}{b}})$. Under the same conditions, we also show that
the expected number of vertices that ever belong to an $\ell$-component is
approximately $12^{1/3} (b-1)^{1/3} \ell^{1/3} n^{2/3}$. As an immediate
consequence, it follows that with high probability the largest $\ell$-component
during the process is of size $O((b-1)^{1/3} \ell^{1/3} n^{2/3})$. Our results
give insight about the size of giant components inside the phase transition of
random hypergraphs.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 09:45:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Rijamame",
"Alphonse Laza",
"",
"D.M.I"
]
] |
cs/0607060 | Gary Hardy | Yoann Dieudonne (LaRIA), Ouiddad Labbani-Igbida (CREA), Franck Petit
(LaRIA) | Circle Formation of Weak Mobile Robots | null | null | null | null | cs.RO | null | In this paper we prove the conjecture of D\'{e}fago & Konagaya. Furthermore,
we describe a deterministic protocol for forming a regular n-gon in finite
time.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 12:57:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dieudonne",
"Yoann",
"",
"LaRIA"
],
[
"Labbani-Igbida",
"Ouiddad",
"",
"CREA"
],
[
"Petit",
"Franck",
"",
"LaRIA"
]
] |
cs/0607061 | Igor Mackarov Dr. | Igor Mackarov (Maharishi University of Management) | On Some Peculiarities of Dynamic Switch between Component
Implementations in an Autonomic Computing System | 16 pages, 3 figures | null | null | null | cs.DS cs.DC cs.NA | null | Behavior of the delta algorithm of autonomic switch between two component
implementations is considered on several examples of a client-server systems
involving, in particular, periodic change of intensities of requests for the
component. It is shown that in the cases of some specific combinations of
elementary requests costs, the number of clients in the system, the number of
requests per unit of time, and the cost of switch between the implementations,
the algorithm may reveal behavior that is rather far from the desired. A
sufficient criterion of a success of the algorithm is proposed based on the
analysis of the accumulated implementations costs difference as a function of
time. Suggestions are pointed out of practical evaluation of the algorithm
functioning regarding the observations made in this paper.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 11:09:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mackarov",
"Igor",
"",
"Maharishi University of Management"
]
] |
cs/0607063 | Leon Moonen | Cathal Boogerd and Leon Moonen | Prioritizing Software Inspection Results using Static Profiling | 14 pages | null | null | TUD-SERG-2006-001 | cs.SE | null | Static software checking tools are useful as an additional automated software
inspection step that can easily be integrated in the development cycle and
assist in creating secure, reliable and high quality code. However, an often
quoted disadvantage of these tools is that they generate an overly large number
of warnings, including many false positives due to the approximate analysis
techniques. This information overload effectively limits their usefulness.
In this paper we present ELAN, a technique that helps the user prioritize the
information generated by a software inspection tool, based on a demand-driven
computation of the likelihood that execution reaches the locations for which
warnings are reported. This analysis is orthogonal to other prioritization
techniques known from literature, such as severity levels and statistical
analysis to reduce false positives. We evaluate feasibility of our technique
using a number of case studies and assess the quality of our predictions by
comparing them to actual values obtained by dynamic profiling.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 20:35:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boogerd",
"Cathal",
""
],
[
"Moonen",
"Leon",
""
]
] |
cs/0607065 | Khalil Djelloul | Khalil Djelloul | Decomposable Theories | null | null | null | null | cs.LO cs.AI | null | We present in this paper a general algorithm for solving first-order formulas
in particular theories called "decomposable theories". First of all, using
special quantifiers, we give a formal characterization of decomposable theories
and show some of their properties. Then, we present a general algorithm for
solving first-order formulas in any decomposable theory "T". The algorithm is
given in the form of five rewriting rules. It transforms a first-order formula
"P", which can possibly contain free variables, into a conjunction "Q" of
solved formulas easily transformable into a Boolean combination of
existentially quantified conjunctions of atomic formulas. In particular, if "P"
has no free variables then "Q" is either the formula "true" or "false". The
correctness of our algorithm proves the completeness of the decomposable
theories.
Finally, we show that the theory "Tr" of finite or infinite trees is a
decomposable theory and give some benchmarks realized by an implementation of
our algorithm, solving formulas on two-partner games in "Tr" with more than 160
nested alternated quantifiers.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2006 14:46:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Djelloul",
"Khalil",
""
]
] |
cs/0607066 | Dimitrios Katsaros | Antonis Sidiropoulos, Dimitrios Katsaros, Yannis Manolopoulos | Generalized h-index for Disclosing Latent Facts in Citation Networks | 19 pages, 17 tables, 27 figures | null | null | null | cs.DL | null | What is the value of a scientist and its impact upon the scientific thinking?
How can we measure the prestige of a journal or of a conference? The evaluation
of the scientific work of a scientist and the estimation of the quality of a
journal or conference has long attracted significant interest, due to the
benefits from obtaining an unbiased and fair criterion. Although it appears to
be simple, defining a quality metric is not an easy task. To overcome the
disadvantages of the present metrics used for ranking scientists and journals,
J.E. Hirsch proposed a pioneering metric, the now famous h-index. In this
article, we demonstrate several inefficiencies of this index and develop a pair
of generalizations and effective variants of it to deal with scientist ranking
and with publication forum ranking. The new citation indices are able to
disclose trendsetters in scientific research, as well as researchers that
constantly shape their field with their influential work, no matter how old
they are. We exhibit the effectiveness and the benefits of the new indices to
unfold the full potential of the h-index, with extensive experimental results
obtained from DBLP, a widely known on-line digital library.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2006 15:47:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sidiropoulos",
"Antonis",
""
],
[
"Katsaros",
"Dimitrios",
""
],
[
"Manolopoulos",
"Yannis",
""
]
] |
cs/0607067 | Vladimir Vovk | Vladimir Vovk | Competing with stationary prediction strategies | 20 pages | null | null | null | cs.LG | null | In this paper we introduce the class of stationary prediction strategies and
construct a prediction algorithm that asymptotically performs as well as the
best continuous stationary strategy. We make mild compactness assumptions but
no stochastic assumptions about the environment. In particular, no assumption
of stationarity is made about the environment, and the stationarity of the
considered strategies only means that they do not depend explicitly on time; we
argue that it is natural to consider only stationary strategies even for highly
non-stationary environments.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2006 15:52:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0607070 | Victor Kryssanov | V. V. Kryssanov, F. J. Rinaldo, H. Ogawa, E. Kuleshov | Citation as a Representation Process | 5 pages, 2 figures. Preprint completed in July 2006 | null | null | null | cs.DL cs.CY physics.data-an | null | The presented work proposes a novel approach to model the citation rate. The
paper begins with a brief introduction into informetrics studies and highlights
drawbacks of the contemporary approaches to modeling the citation process as a
product of social interactions. An alternative modeling framework based on
results obtained in cognitive psychology is then introduced and applied in an
experiment to investigate properties of the citation process, as they are
revealed by a large collection of citation statistics. Major research findings
are discussed, and a summary is given.
| [
{
"version": "v1",
"created": "Fri, 14 Jul 2006 10:38:11 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Jul 2006 01:36:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Rinaldo",
"F. J.",
""
],
[
"Ogawa",
"H.",
""
],
[
"Kuleshov",
"E.",
""
]
] |
cs/0607071 | Peter J. Stuckey | H. Fang, Y. Kilani, J.H.M. Lee, and P.J. Stuckey | Islands for SAT | 7 pages | null | null | null | cs.AI | null | In this note we introduce the notion of islands for restricting local search.
We show how we can construct islands for CNF SAT problems, and how much search
space can be eliminated by restricting search to the island.
| [
{
"version": "v1",
"created": "Fri, 14 Jul 2006 12:44:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fang",
"H.",
""
],
[
"Kilani",
"Y.",
""
],
[
"Lee",
"J. H. M.",
""
],
[
"Stuckey",
"P. J.",
""
]
] |
cs/0607072 | Scott Turner | Scott A. Turner, Manuel A. Perez-Quinones, Stephen H. Edwards | Effect of Interface Style in Peer Review Comments for UML Designs | 8 pages, 7 figures | null | null | null | cs.HC | null | This paper presents our evaluation of using a Tablet-PC to provide
peer-review comments in the first year Computer Science course. Our exploration
consisted of an evaluation of how students write comments on other students'
assignments using three different methods: pen and paper, a Tablet-PC, and a
desktop computer. Our ultimate goal is to explore the effect that interface
style (Tablet vs. Desktop) has on the quality and quantity of the comments
provided.
| [
{
"version": "v1",
"created": "Fri, 14 Jul 2006 16:00:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turner",
"Scott A.",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
],
[
"Edwards",
"Stephen H.",
""
]
] |
cs/0607073 | Andrea Montanari | Andrea Montanari, Devavrat Shah | Counting good truth assignments of random k-SAT formulae | 13 pages, 1 eps figure | null | null | null | cs.DM cond-mat.dis-nn | null | We present a deterministic approximation algorithm to compute logarithm of
the number of `good' truth assignments for a random k-satisfiability (k-SAT)
formula in polynomial time (by `good' we mean that violate a small fraction of
clauses). The relative error is bounded above by an arbitrarily small constant
epsilon with high probability as long as the clause density (ratio of clauses
to variables) alpha<alpha_{u}(k) = 2k^{-1}\log k(1+o(1)). The algorithm is
based on computation of marginal distribution via belief propagation and use of
an interpolation procedure. This scheme substitutes the traditional one based
on approximation of marginal probabilities via MCMC, in conjunction with
self-reduction, which is not easy to extend to the present problem.
We derive 2k^{-1}\log k (1+o(1)) as threshold for uniqueness of the Gibbs
distribution on satisfying assignment of random infinite tree k-SAT formulae to
establish our results, which is of interest in its own right.
| [
{
"version": "v1",
"created": "Fri, 14 Jul 2006 16:05:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Montanari",
"Andrea",
""
],
[
"Shah",
"Devavrat",
""
]
] |
cs/0607077 | Emin Gabrielyan | Emin Gabrielyan | Fault-Tolerant Real-Time Streaming with FEC thanks to Capillary
Multi-Path Routing | null | Emin Gabrielyan, Fault-Tolerant Real-Time Streaming with FEC
thanks to Capillary Multi-Path Routing, International Conference on
Communications, Circuits and Systems - ICCCAS'06 - Gui Lin, China, 25-28 June
2006, Vol. 3, pp. 1497-1501 | null | null | cs.NI cs.MM | null | Erasure resilient FEC codes in off-line packetized streaming rely on time
diversity. This requires unrestricted buffering time at the receiver. In
real-time streaming the playback buffering time must be very short. Path
diversity is an orthogonal strategy. However, the large number of long paths
increases the number of underlying links and consecutively the overall link
failure rate. This may increase the overall requirement in redundant FEC
packets for combating the link failures. We introduce the Redundancy Overall
Requirement (ROR) metric, a routing coefficient specifying the total number of
FEC packets required for compensation of all underlying link failures. We
present a capillary routing algorithm for constructing layer by layer steadily
diversifying multi-path routing patterns. By measuring the ROR coefficients of
a dozen of routing layers on hundreds of network samples, we show that the
number of required FEC packets decreases substantially when the path diversity
is increased by the capillary routing construction algorithm.
| [
{
"version": "v1",
"created": "Mon, 17 Jul 2006 08:10:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gabrielyan",
"Emin",
""
]
] |
cs/0607081 | Marie-France Ango-Obiang | Marie-France Ango-Obiang (LORIA) | Syst\`{e}me de repr\'{e}sentation d'aide au besoin dans le domaine
architectural | null | Dans CONFERE 2006, Conception et Innovation | null | null | cs.OH cs.IR | null | The image is a very important mean of communication in the field of
architectural who intervenes in the various phases of the design of a project.
It can be regarded as a tool of decision-making aid. The study of our research
aims at to see the contribution of the Economic Intelligence in the resolution
of a decisional problem of the various partners (Architect, Contractor,
Customer) in the architectural field, in order to make strategic decisions
within the framework of the realization or design of an architectural work. The
economic Intelligence allows the taking into account of the real needs for the
user-decision makers, so that their waiting are considered at the first stage
of a search for information and not in the final stage of the development of
the tool in the evaluation of this last.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 05:04:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ango-Obiang",
"Marie-France",
"",
"LORIA"
]
] |
cs/0607083 | Stanko Shtrakov | Stanko Vl. Shtrakov, Anton Stoilov | Mathematical Modelling of the Thermal Accumulation in Hot Water Solar
Systems | 11 pages, 5 figures | null | null | null | cs.CE | null | Mathematical modelling and defining useful recommendations for construction
and regimes of exploitation for hot water solar installation with thermal
stratification is the main purpose of this work. A special experimental solar
module for hot water was build and equipped with sufficient measure apparatus.
The main concept of investigation is to optimise the stratified regime of
thermal accumulation and constructive parameters of heat exchange equipment
(heat serpentine in tank). Accumulation and heat exchange processes were
investigated by theoretical end experimental means. Special mathematical model
was composed to simulate the energy transfer in stratified tank. Computer
program was developed to solve mathematical equations for thermal accumulation
and energy exchange. Extensive numerical and experimental tests were carried
out. A good correspondence between theoretical and experimental data was
arrived. Keywords: Mathematical modelling, accumulation
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 08:07:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Stanko Vl.",
""
],
[
"Stoilov",
"Anton",
""
]
] |
cs/0607084 | Farid Nouioua | Daniel Kayser (LIPN), Farid Nouioua (LIPN) | About Norms and Causes | null | The 17th FLAIRS'04 Conference (2004) 502-507 | null | null | cs.AI | null | Knowing the norms of a domain is crucial, but there exist no repository of
norms. We propose a method to extract them from texts: texts generally do not
describe a norm, but rather how a state-of-affairs differs from it. Answers
concerning the cause of the state-of-affairs described often reveal the
implicit norm. We apply this idea to the domain of driving, and validate it by
designing algorithms that identify, in a text, the "basic" norms to which it
refers implicitly.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 07:46:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kayser",
"Daniel",
"",
"LIPN"
],
[
"Nouioua",
"Farid",
"",
"LIPN"
]
] |
cs/0607086 | Farid Nouioua | Daniel Kayser (LIPN), Farid Nouioua (LIPN) | Representing Knowledge about Norms | null | The 16th European Conference on Artificial Intelligence (ECAI'04)
(2004) 363-367 | null | null | cs.AI | null | Norms are essential to extend inference: inferences based on norms are far
richer than those based on logical implications. In the recent decades, much
effort has been devoted to reason on a domain, once its norms are represented.
How to extract and express those norms has received far less attention.
Extraction is difficult: as the readers are supposed to know them, the norms of
a domain are seldom made explicit. For one thing, extracting norms requires a
language to represent them, and this is the topic of this paper. We apply this
language to represent norms in the domain of driving, and show that it is
adequate to reason on the causes of accidents, as described by car-crash
reports.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 08:15:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kayser",
"Daniel",
"",
"LIPN"
],
[
"Nouioua",
"Farid",
"",
"LIPN"
]
] |
cs/0607088 | Farid Nouioua | Farid Nouioua (LIPN), Pascal Nicolas (LERIA) | Using Answer Set Programming in an Inference-Based approach to Natural
Language Semantics | null | Inference in Computational Semantics ICoS-5, France (2006) 77-86 | null | null | cs.CL cs.AI | null | Using Answer Set Programming in an Inference-Based approach to Natural
Language Semantics
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 07:43:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nouioua",
"Farid",
"",
"LIPN"
],
[
"Nicolas",
"Pascal",
"",
"LERIA"
]
] |
cs/0607090 | Adityan Rishiyur | Adityan Rishiyur | Neural Networks with Complex and Quaternion Inputs | 14 pages, 2 figures | null | null | null | cs.NE | null | This article investigates Kak neural networks, which can be instantaneously
trained, for complex and quaternion inputs. The performance of the basic
algorithm has been analyzed and shown how it provides a plausible model of
human perception and understanding of images. The motivation for studying
quaternion inputs is their use in representing spatial rotations that find
applications in computer graphics, robotics, global navigation, computer vision
and the spatial orientation of instruments. The problem of efficient mapping of
data in quaternion neural networks is examined. Some problems that need to be
addressed before quaternion neural networks find applications are identified.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 21:01:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rishiyur",
"Adityan",
""
]
] |
cs/0607091 | Stanko Shtrakov | Stanko Shtrakov, Anton Stoilov | Finite element method for thermal analysis of concentrating solar
receivers | 8 pages; 5 figures | null | null | null | cs.CE | null | Application of finite element method and heat conductivity transfer model for
calculation of temperature distribution in receiver for dish-Stirling
concentrating solar system is described. The method yields discretized
equations that are entirely local to the elements and provides complete
geometric flexibility. A computer program solving the finite element method
problem is created and great number of numerical experiments is carried out.
Illustrative numerical results are given for an array of triangular elements in
receiver for dish-Stirling system.
| [
{
"version": "v1",
"created": "Wed, 19 Jul 2006 06:58:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Stanko",
""
],
[
"Stoilov",
"Anton",
""
]
] |
cs/0607100 | Xin Han | Xin Han, Kazuo Iwama, Guochuan Zhang | New Upper Bounds on The Approximability of 3D Strip Packing | Submitted to SODA 2007 | null | null | null | cs.DS | null | In this paper, we study the 3D strip packing problem in which we are given a
list of 3-dimensional boxes and required to pack all of them into a
3-dimensional strip with length 1 and width 1 and unlimited height to minimize
the height used. Our results are below: i) we give an approximation algorithm
with asymptotic worst-case ratio 1.69103, which improves the previous best
bound of $2+\epsilon$ by Jansen and Solis-Oba of SODA 2006; ii) we also present
an asymptotic PTAS for the case in which all items have {\em square} bases.
| [
{
"version": "v1",
"created": "Sat, 22 Jul 2006 02:06:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Han",
"Xin",
""
],
[
"Iwama",
"Kazuo",
""
],
[
"Zhang",
"Guochuan",
""
]
] |
cs/0607101 | Patricia Hill | Patricia M. Hill, Fausto Spoto | Deriving Escape Analysis by Abstract Interpretation: Proofs of results | null | null | null | null | cs.PL | null | Escape analysis of object-oriented languages approximates the set of objects
which do not escape from a given context. If we take a method as context, the
non-escaping objects can be allocated on its activation stack; if we take a
thread, Java synchronisation locks on such objects are not needed. In this
paper, we formalise a basic escape domain e as an abstract interpretation of
concrete states, which we then refine into an abstract domain er which is more
concrete than e and, hence, leads to a more precise escape analysis than e. We
provide optimality results for both e and er, in the form of Galois insertions
from the concrete to the abstract domains and of optimal abstract operations.
The Galois insertion property is obtained by restricting the abstract domains
to those elements which do not contain garbage, by using an abstract garbage
collector. Our implementation of er is hence an implementation of a formally
correct escape analyser, able to detect the stack allocatable creation points
of Java (bytecode) applications.
This report contains the proofs of results of a paper with the same title and
authors and to be published in the Journal "Higher-Order Symbolic Computation".
| [
{
"version": "v1",
"created": "Mon, 24 Jul 2006 09:24:07 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 14:59:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hill",
"Patricia M.",
""
],
[
"Spoto",
"Fausto",
""
]
] |
cs/0607103 | Lester Ingber | Lester Ingber | Ideas by Statistical Mechanics (ISM) | null | null | null | null | cs.CE cs.MS cs.NE | null | Ideas by Statistical Mechanics (ISM) is a generic program to model evolution
and propagation of ideas/patterns throughout populations subjected to
endogenous and exogenous interactions. The program is based on the author's
work in Statistical Mechanics of Neocortical Interactions (SMNI), and uses the
author's Adaptive Simulated Annealing (ASA) code for optimizations of training
sets, as well as for importance-sampling to apply the author's copula financial
risk-management codes, Trading in Risk Dimensions (TRD), for assessments of
risk and uncertainty. This product can be used for decision support for
projects ranging from diplomatic, information, military, and economic (DIME)
factors of propagation/evolution of ideas, to commercial sales, trading
indicators across sectors of financial markets, advertising and political
campaigns, etc. A statistical mechanical model of neocortical interactions,
developed by the author and tested successfully in describing short-term memory
and EEG indicators, is the proposed model. Parameters with a given subset of
macrocolumns will be fit using ASA to patterns representing ideas. Parameters
of external and inter-regional interactions will be determined that promote or
inhibit the spread of these ideas. Tools of financial risk management,
developed by the author to process correlated multivariate systems with
differing non-Gaussian distributions using modern copula analysis,
importance-sampled using ASA, will enable bona fide correlations and
uncertainties of success and failure to be calculated. Marginal distributions
will be evolved to determine their expected duration and stability using
algorithms developed by the author, i.e., PATHTREE and PATHINT codes.
| [
{
"version": "v1",
"created": "Sun, 23 Jul 2006 16:12:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ingber",
"Lester",
""
]
] |
cs/0607106 | Hubie Chen | Hubie Chen | The Complexity of Quantified Constraint Satisfaction: Collapsibility,
Sink Algebras, and the Three-Element Case | null | null | null | null | cs.LO cs.CC | null | The constraint satisfaction probem (CSP) is a well-acknowledged framework in
which many combinatorial search problems can be naturally formulated. The CSP
may be viewed as the problem of deciding the truth of a logical sentence
consisting of a conjunction of constraints, in front of which all variables are
existentially quantified. The quantified constraint satisfaction problem (QCSP)
is the generalization of the CSP where universal quantification is permitted in
addition to existential quantification. The general intractability of these
problems has motivated research studying the complexity of these problems under
a restricted constraint language, which is a set of relations that can be used
to express constraints.
This paper introduces collapsibility, a technique for deriving positive
complexity results on the QCSP. In particular, this technique allows one to
show that, for a particular constraint language, the QCSP reduces to the CSP.
We show that collapsibility applies to three known tractable cases of the QCSP
that were originally studied using disparate proof techniques in different
decades: Quantified 2-SAT (Aspvall, Plass, and Tarjan 1979), Quantified
Horn-SAT (Karpinski, Kleine B\"{u}ning, and Schmitt 1987), and Quantified
Affine-SAT (Creignou, Khanna, and Sudan 2001). This reconciles and reveals
common structure among these cases, which are describable by constraint
languages over a two-element domain. In addition to unifying these known
tractable cases, we study constraint languages over domains of larger size.
| [
{
"version": "v1",
"created": "Mon, 24 Jul 2006 16:03:56 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jul 2006 13:06:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Hubie",
""
]
] |
cs/0607109 | Marko Samer | Marko Samer and Stefan Szeider | Complexity and Applications of Edge-Induced Vertex-Cuts | 17 pages, 5 figures, 2 tables | null | null | null | cs.DM cs.CC | null | Motivated by hypergraph decomposition algorithms, we introduce the notion of
edge-induced vertex-cuts and compare it with the well-known notions of
edge-cuts and vertex-cuts. We investigate the complexity of computing minimum
edge-induced vertex-cuts and demonstrate the usefulness of our notion by
applications in network reliability and constraint satisfaction.
| [
{
"version": "v1",
"created": "Tue, 25 Jul 2006 16:17:22 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Jul 2006 09:23:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Samer",
"Marko",
""
],
[
"Szeider",
"Stefan",
""
]
] |
cs/0607110 | Etienne Grossmann | Etienne Grossmann | A Theory of Probabilistic Boosting, Decision Trees and Matryoshki | null | null | null | null | cs.LG | null | We present a theory of boosting probabilistic classifiers. We place ourselves
in the situation of a user who only provides a stopping parameter and a
probabilistic weak learner/classifier and compare three types of boosting
algorithms: probabilistic Adaboost, decision tree, and tree of trees of ... of
trees, which we call matryoshka. "Nested tree," "embedded tree" and "recursive
tree" are also appropriate names for this algorithm, which is one of our
contributions. Our other contribution is the theoretical analysis of the
algorithms, in which we give training error bounds. This analysis suggests that
the matryoshka leverages probabilistic weak classifiers more efficiently than
simple decision trees.
| [
{
"version": "v1",
"created": "Tue, 25 Jul 2006 15:57:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grossmann",
"Etienne",
""
]
] |
cs/0607111 | William Yurcik | William Yurcik, Cristina Abad, Ragib Hasan, Moazzam Saleem, Shyama
Sridharan | UCLog+ : A Security Data Management System for Correlating Alerts,
Incidents, and Raw Data From Remote Logs | 10 pages, 9 Tables, 16 Figures | null | null | null | cs.CR | null | Source data for computer network security analysis takes different forms
(alerts, incidents, logs) and each source may be voluminous. Due to the
challenge this presents for data management, this has often lead to security
stovepipe operations which focus primarily on a small number of data sources
for analysis with little or no automated correlation between data sources
(although correlation may be done manually). We seek to address this systemic
problem.
In previous work we developed a unified correlated logging system (UCLog)
that automatically processes alerts from different devices. We take this work
one step further by presenting the architecture and applications of UCLog+
which adds the new capability to correlate between alerts and incidents and raw
data located on remote logs. UCLog+ can be used for forensic analysis including
queries and report generation but more importantly it can be used for
near-real-time situational awareness of attack patterns in progress. The
system, implemented with open source tools, can also be a repository for secure
information sharing by different organizations.
| [
{
"version": "v1",
"created": "Tue, 25 Jul 2006 19:44:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yurcik",
"William",
""
],
[
"Abad",
"Cristina",
""
],
[
"Hasan",
"Ragib",
""
],
[
"Saleem",
"Moazzam",
""
],
[
"Sridharan",
"Shyama",
""
]
] |
cs/0607113 | David Eppstein | Josiah Carlson and David Eppstein | Trees with Convex Faces and Optimal Angles | 12 pages, 10 figures. To appear at 14th Int. Symp. Graph Drawing,
2006 | null | null | null | cs.CG | null | We consider drawings of trees in which all edges incident to leaves can be
extended to infinite rays without crossing, partitioning the plane into
infinite convex polygons. Among all such drawings we seek the one maximizing
the angular resolution of the drawing. We find linear time algorithms for
solving this problem, both for plane trees and for trees without a fixed
embedding. In any such drawing, the edge lengths may be set independently of
the angles, without crossing; we describe multiple strategies for setting these
lengths.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2006 00:44:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carlson",
"Josiah",
""
],
[
"Eppstein",
"David",
""
]
] |
cs/0607115 | Marcin Kaminski | Marcin Kaminski and Vadim Lozin | Polynomial-time algorithm for vertex k-colorability of P_5-free graphs | null | null | null | null | cs.DM cs.DS | null | We give the first polynomial-time algorithm for coloring vertices of P_5-free
graphs with k colors. This settles an open problem and generalizes several
previously known results.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2006 09:20:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kaminski",
"Marcin",
""
],
[
"Lozin",
"Vadim",
""
]
] |
cs/0607116 | Rui Abreu Eng | Rui Abreu, Peter Zoeteweij and Arjan JC van Gemund | Program Spectra Analysis in Embedded Software: A Case Study | null | null | null | TUD-SERG-2006-007 | cs.SE | null | Because of constraints imposed by the market, embedded software in consumer
electronics is almost inevitably shipped with faults and the goal is just to
reduce the inherent unreliability to an acceptable level before a product has
to be released. Automatic fault diagnosis is a valuable tool to capture
software faults without extra effort spent on testing. Apart from a debugging
aid at design and integration time, fault diagnosis can help analyzing problems
during operation, which allows for more accurate system recovery. In this paper
we discuss perspectives and limitations for applying a particular fault
diagnosis technique, namely the analysis of program spectra, in the area of
embedded software in consumer electronics devices. We illustrate these by our
first experience with a test case from industry.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2006 09:26:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abreu",
"Rui",
""
],
[
"Zoeteweij",
"Peter",
""
],
[
"van Gemund",
"Arjan JC",
""
]
] |
cs/0607117 | Jon Feldman | Gagan Aggarwal, S. Muthukrishnan, Jon Feldman | Bidding to the Top: VCG and Equilibria of Position-Based Auctions | null | null | null | null | cs.GT | null | Many popular search engines run an auction to determine the placement of
advertisements next to search results. Current auctions at Google and Yahoo!
let advertisers specify a single amount as their bid in the auction. This bid
is interpreted as the maximum amount the advertiser is willing to pay per click
on its ad. When search queries arrive, the bids are used to rank the ads
linearly on the search result page. The advertisers pay for each user who
clicks on their ad, and the amount charged depends on the bids of all the
advertisers participating in the auction. In order to be effective, advertisers
seek to be as high on the list as their budget permits, subject to the market.
We study the problem of ranking ads and associated pricing mechanisms when
the advertisers not only specify a bid, but additionally express their
preference for positions in the list of ads. In particular, we study "prefix
position auctions" where advertiser $i$ can specify that she is interested only
in the top $b_i$ positions.
We present a simple allocation and pricing mechanism that generalizes the
desirable properties of current auctions that do not have position constraints.
In addition, we show that our auction has an "envy-free" or "symmetric" Nash
equilibrium with the same outcome in allocation and pricing as the well-known
truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this
equilibrium is the best such equilibrium for the advertisers in terms of the
profit made by each advertiser. We also discuss other position-based auctions.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2006 15:42:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aggarwal",
"Gagan",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Feldman",
"Jon",
""
]
] |
cs/0607119 | Sergey Zykov V. | Sergey V. Zykov | Web-Based Enterprise Information Systems Development: The Integrated
Methodology | 5 pages | Proceedings of the 5th International Conference on Computer
Science and Information Technologies (CSIT 2005), Yerevan, Armenia, 19-23
September 2005. National Academy of Sciences of Armenia Publishers, 2005,
pp.373-381 | null | null | cs.SE cs.DC | null | The paper considers software development issues for large-scale enterprise
information systems (IS) with databases (DB) in global heterogeneous
distributed computational environment. Due to high IT development rates, the
present-day society has accumulated and rapidly increases an extremely huge
data burden. Manipulating with such huge data arrays becomes an essential
problem, particularly due to their global distribution, heterogeneous and
weak-structured character. The conceptual approach to integrated Internet-based
IS design, development and implementation is presented, including formal
models, software development methodology and original software development
tools for visual problem-oriented development and content management. IS
implementation results proved shortening terms and reducing costs of
implementation compared to commercial software available.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 07:47:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607120 | Peter Turney | Peter D. Turney (National Research Council of Canada) | Expressing Implicit Semantic Relations without Supervision | 8 pages, related work available at http://purl.org/peter.turney/ | Proceedings of the 21st International Conference on Computational
Linguistics and 44th Annual Meeting of the Association for Computational
Linguistics (ACL-06), (2006), Sydney, Australia, 313-320 | null | NRC-48761 | cs.CL cs.AI cs.IR cs.LG | null | We present an unsupervised learning algorithm that mines large text corpora
for patterns that express implicit semantic relations. For a given input word
pair X:Y with some unspecified semantic relations, the corresponding output
list of patterns <P1,...,Pm> is ranked according to how well each pattern Pi
expresses the relations between X and Y. For example, given X=ostrich and
Y=bird, the two highest ranking output patterns are "X is the largest Y" and "Y
such as the X". The output patterns are intended to be useful for finding
further pairs with the same relations, to support the construction of lexicons,
ontologies, and semantic networks. The patterns are sorted by pertinence, where
the pertinence of a pattern Pi for a word pair X:Y is the expected relational
similarity between the given pair and typical pairs for Pi. The algorithm is
empirically evaluated on two tasks, solving multiple-choice SAT word analogy
questions and classifying semantic relations in noun-modifier pairs. On both
tasks, the algorithm achieves state-of-the-art results, performing
significantly better than several alternative pattern ranking algorithms, based
on tf-idf.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 18:23:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] |
cs/0607121 | Sergey Zykov V. | Sergey V.Zykov, Gleb G. Pogodayev | Object-Based Groupware: Theory, Design and Implementation Issues | 8 pages, 2 figures | In: J.Eder and L.A. Kalinichenko, (Ed.) Advances in Databases and
Information Systems, Vol.2. St.-Petersburg: Nevsky Dialect, 1997, p.p.10-17 | null | null | cs.SE | null | Document management software systems are having a wide audience at present.
However, groupware as a term has a wide variety of possible definitions.
Groupware classification attempt is made in this paper. Possible approaches to
groupware are considered including document management, document control and
mailing systems. Lattice theory and concept modelling are presented as a
theoretical background for the systems in question. Current technologies in
state-of-the-art document managenent software are discussed. Design and
implementation aspects for user-friendly integrate enterprise systems are
described. Results for a real system to be implemented are given. Perspectives
of the field in question are discussed.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 10:16:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
],
[
"Pogodayev",
"Gleb G.",
""
]
] |
cs/0607122 | Sergey Zykov V. | Sergey V. Zykov | Enterprise Content Management: Theory and Engineering for Entire
Lifecycle Support | 6 pages, 1 figure | Proceedings of the 8th International Workshop on Computer Science
and Information Technologies (CSIT'2006), Vol.1, Karlsruhe, Germany,
Sept.28-29, 2006.- Karlsruhe University Publishers, Karlsruhe, 2006.- Vol.1,
p.p.92-97 | null | null | cs.SE cs.DC | null | The paper considers enterprise content management (ECM) issues in global
heterogeneous distributed computational environment. Present-day enterprises
have accumulated a huge data burden. Manipulating with such a bulk becomes an
essential problem, particularly due to its global distribution, heterogeneous
and weak-structured character. The conceptual approach to integrated ECM
lifecycle support is presented, including overview of formal models, software
development methodology and innovative software development tools.
Implementation results proved shortening terms and reducing costs of
implementation compared to commercial software available.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 10:32:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607123 | Sergey Zykov V. | Sergey V. Zykov | Enterprise Portal Development Tools: Problem-Oriented Approach | 4 pages, 2 figures | Proceedings of the 7th International Workshop on Computer Science
and Information Technologies (CSIT'2005), Vol.1, Ufa State Aviation Technical
University, USATU Editorial-Publishing Office, Ufa, 2005, pp. 110-113 | null | null | cs.SE cs.DC | null | The paper deals with problem-oriented visual information system (IS)
engineering for enterprise Internet-based applications, which is a vital part
of the whole development process. The suggested approach is based on semantic
network theory and a novel ConceptModeller CASE tool.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 11:24:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607124 | Sergey Zykov V. | Sergey V. Zykov | ConceptModeller: a Problem-Oriented Visual SDK for Globally Distributed
Enterprise Systems | 4 pages, 2 figures | Proceedings of the 7th International Workshop on Computer Science
and Information Technologies (CSIT'2005), Vol.1, Ufa State Aviation Technical
University, USATU Editorial-Publishing Office, Ufa, 2005, pp. 114-117 | null | cs.szykov.27374 | cs.SE cs.DC | null | The paper describes problem-oriented approach to software development. The
approach is a part of the original integrated methodology of enterprise
Internet-based software design and implementation. All aspects of software
development, from theory to implementation, are covered.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 11:35:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607125 | Sergey Zykov V. | Sergey V. Zykov | Enterprise Portal: from Model to Implementation | 6 pages, 1 figure | Workshop on Computer Science and Information Technologies
(CSIT'2004), Budapest, Hungary, 2004, Vol.2, p.p.188-193 | null | null | cs.SE cs.DC | null | Portal technology can significantly improve the entire corporate information
infrastructure. The approach proposed is based on rigorous and consistent
(meta)data model and provides for efficient and accurate front-end integration
of heterogeneous corporate applications including enterprise resource planning
(ERP) systems, multimedia data warehouses and proprietary content databases.
The methodology proposed embraces entire software lifecycle; it is illustrated
by an enterprise-level Intranet portal implementation.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:12:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607126 | Sergey Zykov V. | Sergey V. Zykov | Abstract Machine as a Model of Content Management Information System | 4 pages | Workshop on Computer Science and Information Technologies
(CSIT'2004), Budapest, Hungary, 2004, Vol.2, p.p.251-252 | null | null | cs.SE cs.DC | null | Enterprise content management is an urgent issue of current scientific and
practical activities in software design and implementation. However, papers
known as yet give insufficient coverage of theoretical background of the
software in question. The paper gives an attempt of building a state-based
model of content management. In accordance with the theoretical principles
outlined, a content management information system (CMIS) has been implemented
in a large international oil-and-gas group of companies.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:40:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607127 | Sergey Zykov V. | Sergey V. Zykov | Integrating Enterprise Software Applications with Web Portal Technology | 6 pages, 1 picture | Proceedings of 5th International Workshop on Computer Science and
Information Technologies (CSIT'2003), Vol.1, Ufa State Aviation Technical
University, Ufa:USATU Editorial-Publishing Office, 2003, p.p.60-65 | null | null | cs.SE cs.DC | null | Web-portal based approach can significantly improve the entire corporate
information infrastructure. The approach proposed provides for rapid and
accurate front-end integration of heterogeneous corporate applications
including enterprise resource planning (ERP) systems. Human resources ERP
component and multimedia data warehouse implementations are discussed as
essential instances.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:49:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607128 | Sergey Zykov V. | Sergey V. Zykov | The Integrated Approach to ERP: Embracing the Web | 6 pages, 3 pictures | Proceedings of 4th International Workshop on Computer Science and
Information Technologies, (CSIT'2002) Sept., 2002, Patras, Greece, Vol.1,
p.p.73-78 | null | null | cs.SE cs.DC | null | Integrated approach to enterprise resource planning (ERP) software design and
implementation can significantly improve the entire corporate information
infrastructure and it helps to benefit from power of Internet services. The
approach proposed provides for corporate Web portal integrity, consistency,
urgency and front-end data processing. Human resources (HR) ERP component
implementation is discussed as an essential instance.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:58:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607129 | Sergey Zykov V. | Sergey V. Zykov | Enterprise Resource Planning Systems: the Integrated Approach | 12 pages, 6 pictures | Proceedings of the 3d International Workshop on Computer Science
and Information Technologies, (CSIT'2001), Ufa:USATU, 2001, Vol.1,
p.p.284-295 | null | null | cs.SE cs.DC | null | Enterprise resource planning (ERP) systems enjoy an increasingly wide
coverage. However, no truly integrate solution has been proposed as yet. ERP
classification is given. Recent trends in commercial systems are analyzed on
the basis of human resources (HR) management software. An innovative "straight
through" design and implementation process of an open, secure, and scalable
integrated event-driven enterprise solution is suggested. Implementation
results are presented.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 13:07:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607130 | Sergey Zykov V. | Sergey V. Zykov | Towards Implementing an Enterprise Groupware-Integrated Human Resources
Information System | 9 pages, 3 pictures | Proceedings of the 2nd International Workshop on Computer Science
and Information Technologies (CSIT'2000), Vol.1, Ufa State Aviation Technical
University, USATU Editorial-Publishing Office, Ufa, 2000, p.p.188-196 | null | null | cs.SE cs.CY | null | Human resources management software is having a wide audience at present.
However, no truly integrate solution has been proposed yet to improve the
systems concerned. Approaches to extra data collection for appraisal
decision-making are considered on the concept modeling theoretical basis.
Current technologies in state-of-the-art HR management software are compared.
Design and implementation aspects for a Web-wired truly integrated secure and
scalable event-driven enterprise system are described. Benchmark results are
presented. Field perspectives are discussed.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 13:14:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607134 | Vladimir Vovk | Vladimir Vovk | Leading strategies in competitive on-line prediction | 20 pages; a conference version is to appear in the ALT'2006
proceedings | null | null | null | cs.LG | null | We start from a simple asymptotic result for the problem of on-line
regression with the quadratic loss function: the class of continuous
limited-memory prediction strategies admits a "leading prediction strategy",
which not only asymptotically performs at least as well as any continuous
limited-memory strategy but also satisfies the property that the excess loss of
any continuous limited-memory strategy is determined by how closely it imitates
the leading strategy. More specifically, for any class of prediction strategies
constituting a reproducing kernel Hilbert space we construct a leading
strategy, in the sense that the loss of any prediction strategy whose norm is
not too large is determined by how closely it imitates the leading strategy.
This result is extended to the loss functions given by Bregman divergences and
by strictly proper scoring rules.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 22:11:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0607136 | Vladimir Vovk | Vladimir Vovk | Competing with Markov prediction strategies | 11 pages | null | null | null | cs.LG | null | Assuming that the loss function is convex in the prediction, we construct a
prediction strategy universal for the class of Markov prediction strategies,
not necessarily continuous. Allowing randomization, we remove the requirement
of convexity.
| [
{
"version": "v1",
"created": "Fri, 28 Jul 2006 21:45:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0607137 | Henrik Petander | Henrik Petander, Eranga Perera, Aruna Seneviratne | Multicasting with selective delivery: A SafetyNet for vertical handoffs | 20 pages | null | null | null | cs.NI | null | In future mobility support will require handling roaming in heterogeneous
access networks. In order to enable seamless roaming it is necessary to
minimize the impact of the vertical handoffs. Localized mobility management
schemes such as FMIPv6 and HMIPv6 do not provide sufficient handoff
performance, since they have been designed for horizontal handoffs. In this
paper, we propose the SafetyNet protocol, which allows a Mobile Node to perform
seamless vertical handoffs. Further, we propose a handoff timing algorithm
which allows a Mobile Node to delay or even completely avoid upward vertical
handoffs. We implement the SafetyNet protocol and compare its performance with
the Fast Handovers for Mobile IPv6 protocol in our wireless test bed and
analyze the results. The experimental results indicate that the proposed
SafetyNet protocol can provide an improvement of up to 95% for TCP performance
in vertical handoffs, when compared with FMIPv6 and an improvement of 64% over
FMIPv6 with bicasting. We use numerical analysis of the protocol to show that
its signaling and data transmission overhead is comparable to Fast Mobile IPv6
and significantly smaller than that of FMIPv6 with bicasting.
| [
{
"version": "v1",
"created": "Sat, 29 Jul 2006 01:45:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petander",
"Henrik",
""
],
[
"Perera",
"Eranga",
""
],
[
"Seneviratne",
"Aruna",
""
]
] |
cs/0607138 | Mohamed Belal A.Y. | Mohamed A. Belal | A Foundation to Perception Computing, Logic and Automata | 39 pages, pdf format, to be published | null | null | null | cs.AI cs.LG | null | In this report, a novel approach to intelligence and learning is introduced,
this approach is based on what we call 'perception logic'. Based on this logic,
a computing mechanism and automata are introduced. Multi-resolution analysis of
perceptual information is given, in which learning is accomplished in at most
O(log(N))epochs, where N is the number of samples, and the convergence is
guarnteed. This approach combines the favors of computational modeles in the
sense that they are structured and mathematically well-defined, and the
adaptivity of soft computing approaches, in addition to the continuity and
real-time response of dynamical systems.
| [
{
"version": "v1",
"created": "Sun, 30 Jul 2006 10:44:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Belal",
"Mohamed A.",
""
]
] |
cs/0607141 | Riccardo Pucella | Karl Crary and Robert Harper | Logic Column 16: Higher-Order Abstract Syntax: Setting the Record
Straight | 4 pages | null | null | null | cs.LO | null | This article responds to a critique of higher-order abstract syntax appearing
in Logic Column 14, ``Nominal Logic and Abstract Syntax'', cs.LO/0511025.
| [
{
"version": "v1",
"created": "Mon, 31 Jul 2006 14:15:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Crary",
"Karl",
""
],
[
"Harper",
"Robert",
""
]
] |
cs/0607142 | Andreas U. Schmidt | Nicolai Kuntze, Dominique Maehler, and Andreas U. Schmidt | Employing Trusted Computing for the forward pricing of pseudonyms in
reputation systems | Refereed contribution to the 4th International Workshop for
Technical, Economic and Legal Aspects of Business Models for Virtual Goods,
December 13 -15, 2006 on AXMEDIS 2006 in Leeds, England. 5 pages, 3 figures,
final version | null | null | null | cs.CR | null | Reputation and recommendation systems are fundamental for the formation of
community market places. Yet, they are easy targets for attacks which disturb a
market's equilibrium and are often based on cheap pseudonyms used to submit
ratings. We present a method to price ratings using trusted computing, based on
pseudonymous tickets.
| [
{
"version": "v1",
"created": "Mon, 31 Jul 2006 15:17:39 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Aug 2006 09:51:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Maehler",
"Dominique",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0607143 | Florentin Smarandache | Jean Dezert, Albena Tchamova, Florentin Smarandache, Pavlina
Konstantinova | Target Type Tracking with PCR5 and Dempster's rules: A Comparative
Analysis | 10 pages, 5 diagrams. Presented to Fusion 2006 International
Conference, Florence, Italy, July 2006 | Proceedings of Fusion 2006 International Conference, Florence,
Italy, July 2006 | null | null | cs.AI | null | In this paper we consider and analyze the behavior of two combinational rules
for temporal (sequential) attribute data fusion for target type estimation. Our
comparative analysis is based on Dempster's fusion rule proposed in
Dempster-Shafer Theory (DST) and on the Proportional Conflict Redistribution
rule no. 5 (PCR5) recently proposed in Dezert-Smarandache Theory (DSmT). We
show through very simple scenario and Monte-Carlo simulation, how PCR5 allows a
very efficient Target Type Tracking and reduces drastically the latency delay
for correct Target Type decision with respect to Demspter's rule. For cases
presenting some short Target Type switches, Demspter's rule is proved to be
unable to detect the switches and thus to track correctly the Target Type
changes. The approach proposed here is totally new, efficient and promising to
be incorporated in real-time Generalized Data Association - Multi Target
Tracking systems (GDA-MTT) and provides an important result on the behavior of
PCR5 with respect to Dempster's rule. The MatLab source code is provided in
| [
{
"version": "v1",
"created": "Mon, 31 Jul 2006 15:32:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dezert",
"Jean",
""
],
[
"Tchamova",
"Albena",
""
],
[
"Smarandache",
"Florentin",
""
],
[
"Konstantinova",
"Pavlina",
""
]
] |
cs/0607144 | Stanimir Andonov A | Stanimir Andonov | Levels of Product Differentiation in the Global Mobile Phones Market | null | null | null | null | cs.OH | null | The sixth product level called compliant product is a connecting element
between the physical product characteristics and the strategy of the producer
company. The article discusses the differentiation among the product offers of
companies working in the global markets, as well as the strategies which they
use and could use in that respect.
| [
{
"version": "v1",
"created": "Mon, 31 Jul 2006 15:43:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andonov",
"Stanimir",
""
]
] |
cs/0607145 | Ioannis Doxaras N. Mr | Yannis Bakopoulos, Theophanis Raptis, Doxaras Ioannis | Geometric definition of a new skeletonization concept | 9 pages, 3 figures, to appear in "2nd Interdisciplinary Symposium and
2nd Summer School on Mathematical Modeling in Modern Technologies and
Economics", 1-5 September, Athens, Greece | null | null | null | cs.CG | null | The Divider set, as an innovative alternative concept to maximal disks,
Voronoi sets and cut loci, is presented with a formal definition based on
topology and differential geometry. The relevant mathematical theory by
previous authors and a comparison with other medial axis definitions is
presented. Appropriate applications are proposed and examined.
| [
{
"version": "v1",
"created": "Mon, 31 Jul 2006 18:17:30 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Aug 2006 13:53:45 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Sep 2006 13:26:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bakopoulos",
"Yannis",
""
],
[
"Raptis",
"Theophanis",
""
],
[
"Ioannis",
"Doxaras",
""
]
] |
cs/0607147 | Florentin Smarandache | Florentin Smarandache, Jean Dezert | Fusion of qualitative beliefs using DSmT | 13 pages. To appear in "Advances and Applications of DSmT for
Information Fusion", collected works, second volume, 2006 | Presented as an extended version (Tutorial MO2) to the Fusion 2006
International Conference, Florence, Italy, July 10-13, 2006 | null | null | cs.AI | null | This paper introduces the notion of qualitative belief assignment to model
beliefs of human experts expressed in natural language (with linguistic
labels). We show how qualitative beliefs can be efficiently combined using an
extension of Dezert-Smarandache Theory (DSmT) of plausible and paradoxical
quantitative reasoning to qualitative reasoning. We propose a new arithmetic on
linguistic labels which allows a direct extension of classical DSm fusion rule
or DSm Hybrid rules. An approximate qualitative PCR5 rule is also proposed
jointly with a Qualitative Average Operator. We also show how crisp or interval
mappings can be used to deal indirectly with linguistic labels. A very simple
example is provided to illustrate our qualitative fusion rules.
| [
{
"version": "v1",
"created": "Mon, 31 Jul 2006 17:16:57 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Nov 2006 19:16:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] |
cs/0608001 | Bas Luttik | Luca Aceto, Wan Fokkink, Anna Ingolfsdottir, and Bas Luttik | A Finite Equational Base for CCS with Left Merge and Communication Merge | null | null | null | null | cs.LO | null | Using the left merge and communication merge from ACP, we present an
equational base (i.e., a ground-complete and $\omega$-complete set of valid
equations) for the fragment of CCS without recursion, restriction and
relabelling. Our equational base is finite if the set of actions is finite.
| [
{
"version": "v1",
"created": "Tue, 1 Aug 2006 10:45:29 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Aug 2006 08:20:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aceto",
"Luca",
""
],
[
"Fokkink",
"Wan",
""
],
[
"Ingolfsdottir",
"Anna",
""
],
[
"Luttik",
"Bas",
""
]
] |
cs/0608002 | Florentin Smarandache | Florentin Smarandache, Jean Dezert | An Introduction to the DSm Theory for the Combination of Paradoxical,
Uncertain, and Imprecise Sources of Information | 21 pages, many tables, figures. To appear in Information&Security
International Journal, 2006 | Presented at 13th International Congress of Cybernetics and
Systems, Maribor, Slovenia, July 6-10, 2005. | null | null | cs.AI | null | The management and combination of uncertain, imprecise, fuzzy and even
paradoxical or high conflicting sources of information has always been, and
still remains today, of primal importance for the development of reliable
modern information systems involving artificial reasoning. In this
introduction, we present a survey of our recent theory of plausible and
paradoxical reasoning, known as Dezert-Smarandache Theory (DSmT) in the
literature, developed for dealing with imprecise, uncertain and paradoxical
sources of information. We focus our presentation here rather on the
foundations of DSmT, and on the two important new rules of combination, than on
browsing specific applications of DSmT available in literature. Several simple
examples are given throughout the presentation to show the efficiency and the
generality of this new approach.
| [
{
"version": "v1",
"created": "Tue, 1 Aug 2006 15:31:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] |
cs/0608004 | Jose M. Soler | Jose M. Soler | Separating the articles of authors with the same name | 4 pages, 0 figures | null | null | null | cs.DL cs.IR | null | I describe a method to separate the articles of different authors with the
same name. It is based on a distance between any two publications, defined in
terms of the probability that they would have as many coincidences if they were
drawn at random from all published documents. Articles with a given author name
are then clustered according to their distance, so that all articles in a
cluster belong very likely to the same author. The method has proven very
useful in generating groups of papers that are then selected manually. This
simplifies considerably citation analysis when the author publication lists are
not available.
| [
{
"version": "v1",
"created": "Tue, 1 Aug 2006 18:23:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Soler",
"Jose M.",
""
]
] |
cs/0608008 | Ilya Safro | Ilya Safro | The minimum linear arrangement problem on proper interval graphs | null | null | null | null | cs.DM cs.DS | null | We present a linear time algorithm for the minimum linear arrangement problem
on proper interval graphs. The obtained ordering is a 4-approximation for
general interval graphs
| [
{
"version": "v1",
"created": "Wed, 2 Aug 2006 07:46:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Safro",
"Ilya",
""
]
] |
cs/0608009 | Claudia Landi | Andrea Cerri, Patrizio Frosini and Claudia Landi | Stability in multidimensional Size Theory | 15 pages, 1 figure, uses psfrag | null | null | Universita' di Modena e Reggio Emilia, DISMI-85 june 2006 | cs.CG cs.CV | null | This paper proves that in Size Theory the comparison of multidimensional size
functions can be reduced to the 1-dimensional case by a suitable change of
variables. Indeed, we show that a foliation in half-planes can be given, such
that the restriction of a multidimensional size function to each of these
half-planes turns out to be a classical size function in two scalar variables.
This leads to the definition of a new distance between multidimensional size
functions, and to the proof of their stability with respect to that distance.
| [
{
"version": "v1",
"created": "Wed, 2 Aug 2006 08:49:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cerri",
"Andrea",
""
],
[
"Frosini",
"Patrizio",
""
],
[
"Landi",
"Claudia",
""
]
] |
cs/0608013 | Julien Robert | Julien Robert, Nicolas Schabanel | Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to
Items | null | null | null | null | cs.DS cs.CC | null | Broadcasting is known to be an efficient means of disseminating data in
wireless communication environments (such as Satellite, mobile phone
networks,...). It has been recently observed that the average service time of
broadcast systems can be considerably improved by taking into consideration
existing correlations between requests. We study a pull-based data broadcast
system where users request possibly overlapping sets of items; a request is
served when all its requested items are downloaded. We aim at minimizing the
average user perceived latency, i.e. the average flow time of the requests. We
first show that any algorithm that ignores the dependencies can yield arbitrary
bad performances with respect to the optimum even if it is given arbitrary
extra resources. We then design a $(4+\epsilon)$-speed
$O(1+1/\epsilon^2)$-competitive algorithm for this setting that consists in 1)
splitting evenly the bandwidth among each requested set and in 2) broadcasting
arbitrarily the items still missing in each set into the bandwidth the set has
received. Our algorithm presents several interesting features: it is simple to
implement, non-clairvoyant, fair to users so that no user may starve for a long
period of time, and guarantees good performances in presence of correlations
between user requests (without any change in the broadcast protocol). We also
present a $ (4+\epsilon)$-speed $O(1+1/\epsilon^3)$-competitive algorithm which
broadcasts at most one item at any given time and preempts each item broadcast
at most once on average. As a side result of our analysis, we design a
competitive algorithm for a particular setting of non-clairvoyant job
scheduling with dependencies, which might be of independent interest.
| [
{
"version": "v1",
"created": "Wed, 2 Aug 2006 15:00:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robert",
"Julien",
""
],
[
"Schabanel",
"Nicolas",
""
]
] |
cs/0608015 | Sebastian Brand | Sebastian Brand, Roland H. C. Yap | Towards "Propagation = Logic + Control" | 15 pages; 22nd International Conference on Logic Programming
(ICLP'06) | null | null | null | cs.PL cs.AI | null | Constraint propagation algorithms implement logical inference. For
efficiency, it is essential to control whether and in what order basic
inference steps are taken. We provide a high-level framework that clearly
differentiates between information needed for controlling propagation versus
that needed for the logical semantics of complex constraints composed from
primitive ones. We argue for the appropriateness of our controlled propagation
framework by showing that it captures the underlying principles of manually
designed propagation algorithms, such as literal watching for unit clause
propagation and the lexicographic ordering constraint. We provide an
implementation and benchmark results that demonstrate the practicality and
efficiency of our framework.
| [
{
"version": "v1",
"created": "Thu, 3 Aug 2006 02:41:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brand",
"Sebastian",
""
],
[
"Yap",
"Roland H. C.",
""
]
] |
cs/0608016 | Sebastian Brand | Gregory J. Duck, Peter J. Stuckey, Sebastian Brand | ACD Term Rewriting | 21 pages; 22nd International Conference on Logic Programming
(ICLP'06) | null | null | null | cs.PL cs.SC | null | We introduce Associative Commutative Distributive Term Rewriting (ACDTR), a
rewriting language for rewriting logical formulae. ACDTR extends AC term
rewriting by adding distribution of conjunction over other operators.
Conjunction is vital for expressive term rewriting systems since it allows us
to require that multiple conditions hold for a term rewriting rule to be used.
ACDTR uses the notion of a "conjunctive context", which is the conjunction of
constraints that must hold in the context of a term, to enable the programmer
to write very expressive and targeted rewriting rules. ACDTR can be seen as a
general logic programming language that extends Constraint Handling Rules and
AC term rewriting. In this paper we define the semantics of ACDTR and describe
our prototype implementation.
| [
{
"version": "v1",
"created": "Thu, 3 Aug 2006 02:55:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Duck",
"Gregory J.",
""
],
[
"Stuckey",
"Peter J.",
""
],
[
"Brand",
"Sebastian",
""
]
] |
cs/0608017 | Sebastian Brand | Krzysztof R. Apt, Sebastian Brand | Infinite Qualitative Simulations by Means of Constraint Programming | 15 pages; 12th International Conference on Principles and Practice of
Constraint Programming (CP'06) | null | null | null | cs.AI cs.LO | null | We introduce a constraint-based framework for studying infinite qualitative
simulations concerned with contingencies such as time, space, shape, size,
abstracted into a finite set of qualitative relations. To define the
simulations, we combine constraints that formalize the background knowledge
concerned with qualitative reasoning with appropriate inter-state constraints
that are formulated using linear temporal logic. We implemented this approach
in a constraint programming system by drawing on ideas from bounded model
checking. The resulting system allows us to test and modify the problem
specifications in a straightforward way and to combine various knowledge
aspects.
| [
{
"version": "v1",
"created": "Thu, 3 Aug 2006 03:08:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Brand",
"Sebastian",
""
]
] |
cs/0608019 | Sebastian Brand | Sebastian Brand | Relation Variables in Qualitative Spatial Reasoning | 14 pages; 27th German Conference on Artificial Intelligence (KI'04) | null | null | null | cs.AI | null | We study an alternative to the prevailing approach to modelling qualitative
spatial reasoning (QSR) problems as constraint satisfaction problems. In the
standard approach, a relation between objects is a constraint whereas in the
alternative approach it is a variable. The relation-variable approach greatly
simplifies integration and implementation of QSR. To substantiate this point,
we discuss several QSR algorithms from the literature which in the
relation-variable approach reduce to the customary constraint propagation
algorithm enforcing generalised arc-consistency.
| [
{
"version": "v1",
"created": "Thu, 3 Aug 2006 03:24:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brand",
"Sebastian",
""
]
] |
cs/0608020 | Romain Pechoux | Jean-Yves Marion and Romain Pechoux | Quasi-friendly sup-interpretations | null | null | null | null | cs.CC | null | In a previous paper, the sup-interpretation method was proposed as a new tool
to control memory resources of first order functional programs with pattern
matching by static analysis. Basically, a sup-interpretation provides an upper
bound on the size of function outputs. In this former work, a criterion, which
can be applied to terminating as well as non-terminating programs, was
developed in order to bound polynomially the stack frame size. In this paper,
we suggest a new criterion which captures more algorithms computing values
polynomially bounded in the size of the inputs. Since this work is related to
quasi-interpretations, we compare the two notions obtaining two main features.
The first one is that, given a program, we have heuristics for finding a
sup-interpretation when we consider polynomials of bounded degree. The other
one consists in the characterizations of the set of function computable in
polynomial time and in polynomial space.
| [
{
"version": "v1",
"created": "Thu, 3 Aug 2006 13:05:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marion",
"Jean-Yves",
""
],
[
"Pechoux",
"Romain",
""
]
] |
cs/0608022 | Joseph Y. Halpern | Joseph Y. Halpern and Sabina Petride | Expressing Security Properties Using Selective Interleaving Functions | null | null | null | null | cs.CR | null | McLean's notion of Selective Interleaving Functions (SIFs) is perhaps the
best-known attempt to construct a framework for expressing various security
properties. We examine the expressive power of SIFs carefully. We show that
SIFs cannot capture nondeducibility on strategies (NOS). We also prove that the
set of security properties expressed with SIFs is not closed under conjunction,
from which it follows that separability is strictly stronger than double
generalized noninterference. However, we show that if we generalize the notion
of SIF in a natural way, then NOS is expressible, and the set of security
properties expressible by generalized SIFs is closed under conjunction.
| [
{
"version": "v1",
"created": "Thu, 3 Aug 2006 20:15:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Petride",
"Sabina",
""
]
] |
cs/0608025 | Dinesh Kumar | Dinesh Kumar (INRIA Sophia Antipolis), Eitan Altman (INRIA Sophia
Antipolis), Jean-Marc Kelif (INRIA Sophia Antipolis) | User-Network Association in a WLAN-UMTS Hybrid Cell: Global & Individual
Optimality | null | null | null | null | cs.NI | null | We study optimal user-network association in an integrated 802.11 WLAN and
3G-UMTS hybrid cell. Assuming saturated resource allocation on the downlink of
WLAN and UMTS networks and a single QoS class of mobiles arriving at an average
location in the hybrid cell, we formulate the problem with two different
approaches: Global and Individual optimality. The Globally optimal association
is formulated as an SMDP (Semi Markov Decision Process) connection routing
decision problem where rewards comprise a financial gain component and an
aggregate network throughput component. The corresponding Dynamic Programming
equations are solved using Value Iteration method and a stationary optimal
policy with neither convex nor concave type switching curve structure is
obtained. Threshold type and symmetric switching curves are observed for the
analogous homogenous network cases. The Individual optimality is studied under
a non-cooperative dynamic game framework with expected service time of a mobile
as the decision cost criteria. It is shown that individual optimality in a
WLAN-UMTS hybrid cell, results in a threshold policy curve of descending
staircase form with increasing Poisson arrival rate of mobiles.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2006 11:44:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kumar",
"Dinesh",
"",
"INRIA Sophia Antipolis"
],
[
"Altman",
"Eitan",
"",
"INRIA Sophia\n Antipolis"
],
[
"Kelif",
"Jean-Marc",
"",
"INRIA Sophia Antipolis"
]
] |
cs/0608026 | Dinesh Kumar | Dinesh Kumar (INRIA Sophia Antipolis), Dhiman Barman, Eitan Altman
(INRIA Sophia Antipolis), Jean-Marc Kelif (FT R&D) | New Cross-Layer Channel Switching Policy for TCP Transmission on 3G UMTS
Downlink | null | null | null | null | cs.NI | null | In 3G UMTS, two main transport channels have been provided for downlink data
transmission: a common FACH channel and a dedicated DCH channel. The
performance of TCP in UMTS depends much on the channel switching policy used.
In this paper, we propose and analyze three new basic threshold-based channel
switching policies for UMTS that we name as QS (Queue Size), FS (Flow Size) and
QSFS (QS & FS combined) policy. These policies significantly improve over a
modified threshold policy in [1] by about 17% in response time metrics. We
further propose and evaluate a new improved switching policy that we call
FS-DCH (at-least flow-size threshold on DCH) policy. This policy is biased
towards short TCP flows of few packets and is thus a cross-layer policy that
improves the performance of TCP by giving priority to the initial few packets
of a flow on the fast DCH channel. Extensive simulation results confirm this
improvement for the case when number of TCP connections is low.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2006 11:53:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kumar",
"Dinesh",
"",
"INRIA Sophia Antipolis"
],
[
"Barman",
"Dhiman",
"",
"INRIA Sophia Antipolis"
],
[
"Altman",
"Eitan",
"",
"INRIA Sophia Antipolis"
],
[
"Kelif",
"Jean-Marc",
"",
"FT R&D"
]
] |
cs/0608027 | Edwin Henneken | E. Henneken, M.J. Kurtz, G. Eichhorn, A. Accomazzi, C.S. Grant, D.
Thompson, E. Bohlen, S.S. Murray | myADS-arXiv - a Tailor-Made, Open Access, Virtual Journal | 4 pages, 2 figures, poster paper to appear in the proceedings of the
LISA V conference | null | null | null | cs.DL astro-ph | null | The myADS-arXiv service provides the scientific community with a one stop
shop for staying up-to-date with a researcher's field of interest. The service
provides a powerful and unique filter on the enormous amount of bibliographic
information added to the ADS on a daily basis. It also provides a complete view
with the most relevant papers available in the subscriber's field of interest.
With this service, the subscriber will get to know the lastest developments,
popular trends and the most important papers. This makes the service not only
unique from a technical point of view, but also from a content point of view.
On this poster we will argue why myADS-arXiv is a tailor-made, open access,
virtual journal and we will illustrate its unique character.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2006 15:23:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henneken",
"E.",
""
],
[
"Kurtz",
"M. J.",
""
],
[
"Eichhorn",
"G.",
""
],
[
"Accomazzi",
"A.",
""
],
[
"Grant",
"C. S.",
""
],
[
"Thompson",
"D.",
""
],
[
"Bohlen",
"E.",
""
],
[
"Murray",
"S. S.",
""
]
] |
cs/0608028 | Joseph Y. Halpern | Joseph Y. Halpern | Using Sets of Probability Measures to Represent Uncertainty | null | null | null | null | cs.AI | null | I explore the use of sets of probability measures as a representation of
uncertainty.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2006 20:26:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0608030 | Ugo Dal Lago | Patrick Baillot, Ugo Dal Lago and Jean-Yves Moyen | On Quasi-Interpretations, Blind Abstractions and Implicit Complexity | 18 pages | null | null | null | cs.PL cs.CC cs.LO | null | Quasi-interpretations are a technique to guarantee complexity bounds on
first-order functional programs: with termination orderings they give in
particular a sufficient condition for a program to be executable in polynomial
time, called here the P-criterion. We study properties of the programs
satisfying the P-criterion, in order to better understand its intensional
expressive power. Given a program on binary lists, its blind abstraction is the
nondeterministic program obtained by replacing lists by their lengths (natural
numbers). A program is blindly polynomial if its blind abstraction terminates
in polynomial time. We show that all programs satisfying a variant of the
P-criterion are in fact blindly polynomial. Then we give two extensions of the
P-criterion: one by relaxing the termination ordering condition, and the other
one (the bounded value property) giving a necessary and sufficient condition
for a program to be polynomial time executable, with memoisation.
| [
{
"version": "v1",
"created": "Sun, 6 Aug 2006 07:20:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baillot",
"Patrick",
""
],
[
"Lago",
"Ugo Dal",
""
],
[
"Moyen",
"Jean-Yves",
""
]
] |
cs/0608031 | Mikio Fujii | Mikio Fujii | Secure Positioning of Mobile Terminals with Simplex Radio Communication | 8 pages, 4 figures | null | null | null | cs.CR | null | With the rapid spread of various mobile terminals in our society, the
importance of secure positioning is growing for wireless networks in
adversarial settings. Recently, several authors have proposed a secure
positioning mechanism of mobile terminals which is based on the geometric
property of wireless node placement, and on the postulate of modern physics
that a propagation speed of information never exceeds the velocity of light. In
particular, they utilize the measurements of the round-trip time of radio
signal propagation and bidirectional communication for variants of the
challenge-and-response. In this paper, we propose a novel means to construct
the above mechanism by use of unidirectional communication instead of
bidirectional communication. Our proposal is based on the assumption that a
mobile terminal incorporates a high-precision inner clock in a tamper-resistant
protected area. In positioning, the mobile terminal uses its inner clock and
the time and location information broadcasted by radio from trusted stations.
Our proposal has a major advantage in protecting the location privacy of mobile
terminal users, because the mobile terminal need not provide any information to
the trusted stations through positioning procedures. Besides, our proposal is
free from the positioning error due to claimant's processing-time fluctuations
in the challenge-and-response, and is well-suited for mobile terminals in the
open air, or on the move at high speed, in terms of practical usage. We analyze
the security, the functionality, and the feasibility of our proposal in
comparison to previous proposals.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2006 05:49:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Mikio",
""
]
] |
cs/0608032 | Harald Zankl | Harald Zankl, Aart Middeldorp | Satisfying KBO Constraints | 15 pages | null | null | null | cs.SC cs.LO | null | This paper presents two new approaches to prove termination of rewrite
systems with the Knuth-Bendix order efficiently. The constraints for the weight
function and for the precedence are encoded in (pseudo-)propositional logic and
the resulting formula is tested for satisfiability. Any satisfying assignment
represents a weight function and a precedence such that the induced
Knuth-Bendix order orients the rules of the encoded rewrite system from left to
right.
| [
{
"version": "v1",
"created": "Sun, 6 Aug 2006 12:42:31 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Apr 2007 08:45:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zankl",
"Harald",
""
],
[
"Middeldorp",
"Aart",
""
]
] |
cs/0608034 | William Yurcik | Aashish Sharma, William Yurcik | Security Assessment of E-Tax Filing Websites | 9 pages | null | null | null | cs.CR | null | Technical security is only part of E-Commerce security operations; human
usability and security perception play major and sometimes dominating factors.
For instance, slick websites with impressive security icons but no real
technical security are often perceived by users to be trustworthy (and thus
more profitable) than plain vanilla websites that use powerful encryption for
transmission and server protection. We study one important type of E-Commerce
transaction website, E-Tax Filing, that is exposed to large populations. We
assess a large number of international (5), Federal (USA), and state E-Tax
filing websites (38) for both technical security protection and human
perception of security. As a result of this assessment, we identify security
best practices across these E-Tax Filing websites and recommend additional
security techniques that have not been found in current use by E-Tax Filing
websites.
| [
{
"version": "v1",
"created": "Sun, 6 Aug 2006 22:56:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sharma",
"Aashish",
""
],
[
"Yurcik",
"William",
""
]
] |
cs/0608036 | Andre Hernich | Andre Hernich, Nicole Schweikardt | Reversal Complexity Revisited | 19 pages, 2 figures | null | null | null | cs.CC | null | We study a generalized version of reversal bounded Turing machines where,
apart from several tapes on which the number of head reversals is bounded by
r(n), there are several further tapes on which head reversals remain
unrestricted, but size is bounded by s(n). Recently, such machines were
introduced as a formalization of a computation model that restricts random
access to external memory and internal memory space. Here, each of the tapes
with a restriction on the head reversals corresponds to an external memory
device, and the tapes of restricted size model internal memory. We use
ST(r(n),s(n),O(1)) to denote the class of all problems that can be solved by
deterministic Turing machines that comply to the above resource bounds.
Similarly, NST and RST, respectively, are used for the corresponding
nondeterministic and randomized classes.
While previous papers focused on lower bounds for particular problems,
including sorting, the set equality problem, and several query evaluation
problems, the present paper addresses the relations between the (R,N)ST-classes
and classical complexity classes and investigates the structural complexity of
the (R,N)ST-classes. Our main results are (1) a trade-off between internal
memory space and external memory head reversals, (2) correspondences between
the (R,N)ST-classes and ``classical'' time-bounded, space-bounded,
reversal-bounded, and circuit complexity classes, and (3) hierarchies of
(R)ST-classes in terms of increasing numbers of head reversals on external
memory tapes.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2006 11:37:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hernich",
"Andre",
""
],
[
"Schweikardt",
"Nicole",
""
]
] |
cs/0608038 | Joachim Wehler | Joachim Wehler | Morphisms of Coloured Petri Nets | null | null | null | null | cs.SE | null | We introduce the concept of a morphism between coloured nets. Our definition
generalizes Petris definition for ordinary nets. A morphism of coloured nets
maps the topological space of the underlying undirected net as well as the
kernel and cokernel of the incidence map. The kernel are flows along the
transition-bordered fibres of the morphism, the cokernel are classes of
markings of the place-bordered fibres. The attachment of bindings, colours,
flows and marking classes to a subnet is formalized by using concepts from
sheaf theory. A coloured net is a sheaf-cosheaf pair over a Petri space and a
morphism between coloured nets is a morphism between such pairs. Coloured nets
and their morphisms form a category. We prove the existence of a product in the
subcategory of sort-respecting morphisms. After introducing markings our
concepts generalize to coloured Petri nets.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2006 19:03:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wehler",
"Joachim",
""
]
] |
cs/0608039 | Norman Danner | Norman Danner and Chris Pollett | The weak pigeonhole principle for function classes in S^1_2 | 11 pages | Mathematical Logic Quarterly 52(6):575-584, 2006 | 10.1002/malq.200610015 | null | cs.LO | null | It is well known that S^1_2 cannot prove the injective weak pigeonhole
principle for polynomial time functions unless RSA is insecure. In this note we
investigate the provability of the surjective (dual) weak pigeonhole principle
in S^1_2 for provably weaker function classes.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2006 19:44:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Danner",
"Norman",
""
],
[
"Pollett",
"Chris",
""
]
] |
cs/0608040 | Patrick Baillot | Patrick Baillot (LIPN), Marco Pedicini | An Embedding of the BSS Model of Computation in Light Affine
Lambda-Calculus | 11 pages. A preliminary version appeared as Research Report IAC CNR
Roma, N.57 (11/2004), november 2004 | 8th International Workshop on Logic and Computational Complexity
Seattle, August 10 - 11, 2006 (Satellite Workshop of FLOC-LICS 2006),
\'{E}tats-Unis d'Am\'{e}rique (2006) | null | null | cs.LO | null | This paper brings together two lines of research: implicit characterization
of complexity classes by Linear Logic (LL) on the one hand, and computation
over an arbitrary ring in the Blum-Shub-Smale (BSS) model on the other. Given a
fixed ring structure K we define an extension of Terui's light affine
lambda-calculus typed in LAL (Light Affine Logic) with a basic type for K. We
show that this calculus captures the polynomial time function class FP(K):
every typed term can be evaluated in polynomial time and conversely every
polynomial time BSS machine over K can be simulated in this calculus.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2006 07:13:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baillot",
"Patrick",
"",
"LIPN"
],
[
"Pedicini",
"Marco",
""
]
] |
cs/0608041 | Igor Sobrado | Igor Sobrado and Dave Uhring | The Dynamics of A Self-Forming Network | 5 pages; 8 figures; 2 tables | null | null | null | cs.NI | null | This article describes our strategy for deploying self-forming ad hoc
networks based on the Internet Protocol version 6 and evaluates the dynamics of
this proposal. Among others, we suggest a technique called adaptive routing
that provides secure intelligent routing capabilities to computer communication
networks. This technique uses the flow label, supports hybrid metrics, network
load sharing, and is not restricted to evaluation of performance on first hop
routers when making routing decisions. Selective anycasting is an extension to
the anycast addressing model that supports exclusion of members of groups that
perform poorly or inappropriately on a per-host basis. Distributed name lookup
is suggested for integrating self-forming and global networks where they
coexist. At last, we pose an address hierarchy to support unmanaged discovery
of services in unknown networks.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2006 16:33:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sobrado",
"Igor",
""
],
[
"Uhring",
"Dave",
""
]
] |
cs/0608043 | Babajide Afolabi | Babajide Afolabi (LORIA), Odile Thiery (LORIA) | Using Users' Expectations to Adapt Business Intelligence Systems | null | Advances in Knowledge Organization 10 (2006) 247-254 | null | null | cs.IR | null | This paper takes a look at the general characteristics of business or
economic intelligence system. The role of the user within this type of system
is emphasized. We propose two models which we consider important in order to
adapt this system to the user. The first model is based on the definition of
decisional problem and the second on the four cognitive phases of human
learning. We also describe the application domain we are using to test these
models in this type of system.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2006 13:19:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Afolabi",
"Babajide",
"",
"LORIA"
],
[
"Thiery",
"Odile",
"",
"LORIA"
]
] |
cs/0608045 | Fotis Georgatos Drs | Giannis Kouretis, Fotis Georgatos | LiveWN, cpu scavenging in the Grid Era | 4 pages | null | null | null | cs.DC cs.NI | null | The goal of this research is to introduce an easy and versatile way to
provide and use Grid resources without the need of any OS installation or
middleware configuration. At the same time we provide an excellent training
tool for newer Grid users and people that want to experiment, without enforcing
any installation. We have been testing it thoroughly under different
circumstances with firm success.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2006 15:28:53 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Aug 2006 22:13:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kouretis",
"Giannis",
""
],
[
"Georgatos",
"Fotis",
""
]
] |
cs/0608051 | Marco Maggesi | Andr\'e Hirschowitz, Marco Maggesi | Modules over Monads and Linearity | 15 pages, too many changes to be summarized | null | null | null | cs.LO cs.PL | null | Inspired by the classical theory of modules over a monoid, we give a first
account of the natural notion of module over a monad. The associated notion of
morphism of left modules ("Linear" natural transformations) captures an
important property of compatibility with substitution, in the heterogeneous
case where "terms" and variables therein could be of different types as well as
in the homogeneous case. In this paper, we present basic constructions of
modules and we show examples concerning in particular abstract syntax and
lambda-calculus.
| [
{
"version": "v1",
"created": "Fri, 11 Aug 2006 15:05:27 GMT"
},
{
"version": "v2",
"created": "Mon, 7 May 2007 10:52:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hirschowitz",
"André",
""
],
[
"Maggesi",
"Marco",
""
]
] |
cs/0608053 | Susan Coppersmith | S.N. Coppersmith | Renormalization group approach to the P versus NP question | Original version had a conjecture that is known to be false. Revised
version corrects this error | null | null | null | cs.CC cond-mat.stat-mech | null | This paper argues that the ideas underlying the renormalization group
technique used to characterize phase transitions in condensed matter systems
could be useful for distinguishing computational complexity classes. The paper
presents a renormalization group transformation that maps an arbitrary Boolean
function of $N$ Boolean variables to one of $N-1$ variables. When this
transformation is applied repeatedly, the behavior of the resulting sequence of
functions is different for a generic Boolean function than for Boolean
functions that can be written as a polynomial of degree $\xi$ with $\xi \ll N$
as well as for functions that depend on composite variables such as the
arithmetic sum of the inputs. Being able to demonstrate that functions are
non-generic is of interest because it suggests an avenue for constructing an
algorithm capable of demonstrating that a given Boolean function cannot be
computed using resources that are bounded by a polynomial of $N$.
| [
{
"version": "v1",
"created": "Fri, 11 Aug 2006 17:48:42 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Oct 2006 15:37:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Coppersmith",
"S. N.",
""
]
] |
cs/0608055 | Hao Chen | Hao Chen | MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves | null | null | null | null | cs.CR | null | For a secret sharing scheme, two parameters $d_{min}$ and $d_{cheat}$ are
defined in [12] and [13]. These two parameters measure the error-correcting
capability and the secret-recovering capability of the secret sharing scheme
against cheaters. Some general properties of the parameters have been studied
in [12,[9] and [13]. The MDS secret-sharing scheme was defined in [12] and it
is proved that MDS perfect secret sharing scheme can be constructed for any
monotone access structure. The famous Shamir $(k,n)$ threshold secret sharing
scheme is the MDS with $d_{min}=d_{cheat}=n-k+1$. In [3] we proposed the linear
secret sharing scheme from algebraic-geometric codes. In this paper the linear
secret sharing scheme from AG-codes on elliptic curves is studied and it is
shown that many of them are MDS linear secret sharing scheme.
| [
{
"version": "v1",
"created": "Mon, 14 Aug 2006 01:49:34 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Sep 2006 03:59:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Hao",
""
]
] |
cs/0608063 | Sylvain Pion | Sylvain Pion (INRIA Sophia Antipolis), Andreas Fabri | A Generic Lazy Evaluation Scheme for Exact Geometric Computations | null | null | null | null | cs.CG cs.PF | null | We present a generic C++ design to perform efficient and exact geometric
computations using lazy evaluations. Exact geometric computations are critical
for the robustness of geometric algorithms. Their efficiency is also critical
for most applications, hence the need for delaying the exact computations at
run time until they are actually needed. Our approach is generic and extensible
in the sense that it is possible to make it a library which users can extend to
their own geometric objects or primitives. It involves techniques such as
generic functor adaptors, dynamic polymorphism, reference counting for the
management of directed acyclic graphs and exception handling for detecting
cases where exact computations are needed. It also relies on multiple precision
arithmetic as well as interval arithmetic. We apply our approach to the whole
geometric kernel of CGAL.
| [
{
"version": "v1",
"created": "Tue, 15 Aug 2006 19:24:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pion",
"Sylvain",
"",
"INRIA Sophia Antipolis"
],
[
"Fabri",
"Andreas",
""
]
] |
cs/0608065 | Edita Pelantova | Lubom\'ira Balkov\'a, Edita Pelantov\'a, and Ond\v{r}ej Turek | Combinatorial and Arithmetical Properties of Infinite Words Associated
with Non-simple Quadratic Parry Numbers | 15 pages | null | null | null | cs.DM | null | We study arithmetical and combinatorial properties of $\beta$-integers for
$\beta$ being the root of the equation $x^2=mx-n, m,n \in \mathbb N, m \geq
n+2\geq 3$. We determine with the accuracy of $\pm 1$ the maximal number of
$\beta$-fractional positions, which may arise as a result of addition of two
$\beta$-integers. For the infinite word $u_\beta$ coding distances between
consecutive $\beta$-integers, we determine precisely also the balance. The word
$u_\beta$ is the fixed point of the morphism $A \to A^{m-1}B$ and $B\to
A^{m-n-1}B$. In the case $n=1$ the corresponding infinite word $u_\beta$ is
sturmian and therefore 1-balanced. On the simplest non-sturmian example with
$n\geq 2$, we illustrate how closely the balance and arithmetical properties of
$\beta$-integers are related.
| [
{
"version": "v1",
"created": "Wed, 16 Aug 2006 09:39:01 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Aug 2006 10:08:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Balková",
"Lubomíra",
""
],
[
"Pelantová",
"Edita",
""
],
[
"Turek",
"Ondřej",
""
]
] |
cs/0608066 | Mariano Zelke | Mariano Zelke | k-Connectivity in the Semi-Streaming Model | 13 pages, submitted to Theoretical Computer Science | null | null | null | cs.DM cs.DS | null | We present the first semi-streaming algorithms to determine k-connectivity of
an undirected graph with k being any constant. The semi-streaming model for
graph algorithms was introduced by Muthukrishnan in 2003 and turns out to be
useful when dealing with massive graphs streamed in from an external storage
device.
Our two semi-streaming algorithms each compute a sparse subgraph of an input
graph G and can use this subgraph in a postprocessing step to decide
k-connectivity of G. To this end the first algorithm reads the input stream
only once and uses time O(k^2*n) to process each input edge. The second
algorithm reads the input k+1 times and needs time O(k+alpha(n)) per input
edge. Using its constructed subgraph the second algorithm can also generate all
l-separators of the input graph for all l<k.
| [
{
"version": "v1",
"created": "Wed, 16 Aug 2006 10:37:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zelke",
"Mariano",
""
]
] |
cs/0608067 | Tetsushi Matsui | Tetsushi Matsui | On Polynomial Time Computable Numbers | 19 pages | null | null | null | cs.CC | null | It will be shown that the polynomial time computable numbers form a field,
and especially an algebraically closed field.
| [
{
"version": "v1",
"created": "Wed, 16 Aug 2006 15:26:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Matsui",
"Tetsushi",
""
]
] |
cs/0608073 | Leonid Litinskii | Leonid B. Litinskii | Parametrical Neural Networks and Some Other Similar Architectures | 15 pages, 2 figures, accepted for publication in "Optical Memory &
Neural Networks" (2006) | null | null | null | cs.CV cs.NE | null | A review of works on associative neural networks accomplished during last
four years in the Institute of Optical Neural Technologies RAS is given. The
presentation is based on description of parametrical neural networks (PNN). For
today PNN have record recognizing characteristics (storage capacity, noise
immunity and speed of operation). Presentation of basic ideas and principles is
accentuated.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2006 08:28:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Litinskii",
"Leonid B.",
""
]
] |
cs/0608075 | Jean-Philippe Diguet | Nader Ben Amor (LESTER, CES), Yannick Le Moullec (LESTER),
Jean-Philippe Diguet (LESTER), Jean Luc Philippe (LESTER), Mohamed Abid (CES) | Design of multimedia processor based on metric computation | null | Advances in Engineering Software (Elsevier) Vol.36 No.7 (2005)
448-458 | 10.1016/j.advengsoft.2005.01.010 | null | cs.AR | null | Media-processing applications, such as signal processing, 2D and 3D graphics
rendering, and image compression, are the dominant workloads in many embedded
systems today. The real-time constraints of those media applications have
taxing demands on today's processor performances with low cost, low power and
reduced design delay. To satisfy those challenges, a fast and efficient
strategy consists in upgrading a low cost general purpose processor core. This
approach is based on the personalization of a general RISC processor core
according the target multimedia application requirements. Thus, if the extra
cost is justified, the general purpose processor GPP core can be enforced with
instruction level coprocessors, coarse grain dedicated hardware, ad hoc
memories or new GPP cores. In this way the final design solution is tailored to
the application requirements. The proposed approach is based on three main
steps: the first one is the analysis of the targeted application using
efficient metrics. The second step is the selection of the appropriate
architecture template according to the first step results and recommendations.
The third step is the architecture generation. This approach is experimented
using various image and video algorithms showing its feasibility.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2006 13:12:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amor",
"Nader Ben",
"",
"LESTER, CES"
],
[
"Moullec",
"Yannick Le",
"",
"LESTER"
],
[
"Diguet",
"Jean-Philippe",
"",
"LESTER"
],
[
"Philippe",
"Jean Luc",
"",
"LESTER"
],
[
"Abid",
"Mohamed",
"",
"CES"
]
] |
cs/0608076 | J\"urg Wullschleger | J\"urg Wullschleger | Oblivious-Transfer Amplification | PhD thesis, March 2007, ETH Zurich, 125 pages. Full version of the
EUROCRYPT 2007 paper. Errors in the computational part corrected | null | null | null | cs.CR | null | Oblivious transfer is a primitive of paramount importance in cryptography or,
more precisely, two- and multi-party computation due to its universality.
Unfortunately, oblivious transfer cannot be achieved in an unconditionally
secure way for both parties from scratch. Therefore, it is a natural question
what information-theoretic primitives or computational assumptions oblivious
transfer can be based on.
The results in our thesis are threefold. First, we present a protocol that
implements oblivious transfer from a weakened oblivious transfer called
universal oblivious transfer, where one of the two players may get additional
information. Our reduction is about twice as efficient as previous results.
Weak oblivious transfer is an even weaker form of oblivious transfer, where
both players may obtain additional information about the other player's input,
and where the output can contain errors. We give a new, weaker definition of
weak oblivious transfer, as well as new reductions with a more detailed
analysis.
Finally, we carry over our results to the computational setting and show how
a weak oblivious transfer that is sometimes incorrect and only mildly secure
against computationally bounded adversaries can be strengthened.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2006 15:58:23 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Nov 2006 20:24:27 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Apr 2007 21:47:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wullschleger",
"Jürg",
""
]
] |
cs/0608077 | Vinay Kolar | Vinay Kolar and Nael Abu-Ghazaleh | The Effect of Scheduling on Link Capacity in Multi-hopWireless Networks | 11 pages | null | null | null | cs.NI cs.AR cs.PF | null | Existing models of Multi-Hop Wireless Networks (MHWNs) assume that
interference estimators of link quality such as observed busy time predict the
capacity of the links. We show that these estimators do not capture the
intricate interactions that occur at the scheduling level, which have a large
impact on effective link capacity under contention based MAC protocols. We
observe that scheduling problems arise only among those interfering sources
whose concurrent transmissions cannot be prevented by the MAC protocol's
collision management mechanisms; other interfering sources can arbitrate the
medium and coexist successfully. Based on this observation, we propose a
methodology for rating links and show that it achieves high correlation with
observed behavior in simulation. We then use this rating as part of a
branch-and-bound framework based on a linear programming formulation for
traffic engineering in static MHWNs and show that it achieves considerable
improvement in performance relative to interference based models.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2006 16:45:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kolar",
"Vinay",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
] |
cs/0608078 | Aidan Thompson | A. Slepoy, A. P. Thompson, M. D. Peters | Searching for Globally Optimal Functional Forms for Inter-Atomic
Potentials Using Parallel Tempering and Genetic Programming | null | null | null | null | cs.NE cs.AI | null | We develop a Genetic Programming-based methodology that enables discovery of
novel functional forms for classical inter-atomic force-fields, used in
molecular dynamics simulations. Unlike previous efforts in the field, that fit
only the parameters to the fixed functional forms, we instead use a novel
algorithm to search the space of many possible functional forms. While a
follow-on practical procedure will use experimental and {\it ab inito} data to
find an optimal functional form for a forcefield, we first validate the
approach using a manufactured solution. This validation has the advantage of a
well-defined metric of success. We manufactured a training set of atomic
coordinate data with an associated set of global energies using the well-known
Lennard-Jones inter-atomic potential. We performed an automatic functional form
fitting procedure starting with a population of random functions, using a
genetic programming functional formulation, and a parallel tempering
Metropolis-based optimization algorithm. Our massively-parallel method
independently discovered the Lennard-Jones function after searching for several
hours on 100 processors and covering a miniscule portion of the configuration
space. We find that the method is suitable for unsupervised discovery of
functional forms for inter-atomic potentials/force-fields. We also find that
our parallel tempering Metropolis-based approach significantly improves the
optimization convergence time, and takes good advantage of the parallel cluster
architecture.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2006 23:17:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slepoy",
"A.",
""
],
[
"Thompson",
"A. P.",
""
],
[
"Peters",
"M. D.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.