id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0005004 | Joseph Y. Halpern | Joseph Y. Halpern | A response to the commentaries on CoRR | This is a response to the commentaries on "CoRR: A Computing Research
Repository" (http://xxx.lanl.gov/abs/cs.DL/0005003). The original article,
the Commentaries,and my response, will appear in the ACM Journal of Computer
Documentation | null | null | null | cs.DL cs.CY | null | This is a response to the commentaries on "CoRR: A Computing Research
Repository".
| [
{
"version": "v1",
"created": "Thu, 4 May 2000 00:06:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0005005 | Davis King | Davis King, Jarek Rossignac, and Andrzej Szymczak | Connectivity Compression for Irregular Quadrilateral Meshes | null | null | null | GVU Tech Report GIT-GVU-99-36 | cs.GR cs.CG cs.DS | null | Applications that require Internet access to remote 3D datasets are often
limited by the storage costs of 3D models. Several compression methods are
available to address these limits for objects represented by triangle meshes.
Many CAD and VRML models, however, are represented as quadrilateral meshes or
mixed triangle/quadrilateral meshes, and these models may also require
compression. We present an algorithm for encoding the connectivity of such
quadrilateral meshes, and we demonstrate that by preserving and exploiting the
original quad structure, our approach achieves encodings 30 - 80% smaller than
an approach based on randomly splitting quads into triangles. We present both a
code with a proven worst-case cost of 3 bits per vertex (or 2.75 bits per
vertex for meshes without valence-two vertices) and entropy-coding results for
typical meshes ranging from 0.3 to 0.9 bits per vertex, depending on the
regularity of the mesh. Our method may be implemented by a rule for a
particular splitting of quads into triangles and by using the compression and
decompression algorithms introduced in [Rossignac99] and
[Rossignac&Szymczak99]. We also present extensions to the algorithm to compress
meshes with holes and handles and meshes containing triangles and other
polygons as well as quads.
| [
{
"version": "v1",
"created": "Thu, 4 May 2000 18:15:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"King",
"Davis",
""
],
[
"Rossignac",
"Jarek",
""
],
[
"Szymczak",
"Andrzej",
""
]
] |
cs/0005006 | Ted Pedersen | Ted Pedersen (University of Minnesota Duluth) | A Simple Approach to Building Ensembles of Naive Bayesian Classifiers
for Word Sense Disambiguation | 7 pages, Latex, uses colnaacl.sty. Appears in Proceedings of NAACL,
pages 63-69, May 2000, Seattle, WA | null | null | null | cs.CL | null | This paper presents a corpus-based approach to word sense disambiguation that
builds an ensemble of Naive Bayesian classifiers, each of which is based on
lexical features that represent co--occurring words in varying sized windows of
context. Despite the simplicity of this approach, empirical results
disambiguating the widely studied nouns line and interest show that such an
ensemble achieves accuracy rivaling the best previously published results.
| [
{
"version": "v1",
"created": "Sun, 7 May 2000 00:15:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pedersen",
"Ted",
"",
"University of Minnesota Duluth"
]
] |
cs/0005007 | Geoffrey McKim | Rob Kling, Geoffrey McKim, Joanna Fortuna, Adam King | Scientific Collaboratories as Socio-Technical Interaction Networks: A
Theoretical Approach | null | null | null | null | cs.CY | null | Collaboratories refer to laboratories where scientists can work together
while they are in distant locations from each other and from key equipment.
They have captured the interest both of CSCW researchers and of science funders
who wish to optimize the use of rare scientific equipment and expertise. We
examine the kind of CSCW conceptions that help us best understand the character
of working relationships in these scientific collaboratories. Our model,
inspired by actor-network theory, considers technologies as Socio-technical
Interaction Networks (STINs). This model provides a rich understanding of the
scientific collaboratories, and also a more complete understanding of the
conditions and activities that support collaborative work in them. We
illustrate the significance of STIN models with several cases drawn from the
fields of high energy physics and materials science.
| [
{
"version": "v1",
"created": "Mon, 8 May 2000 01:49:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kling",
"Rob",
""
],
[
"McKim",
"Geoffrey",
""
],
[
"Fortuna",
"Joanna",
""
],
[
"King",
"Adam",
""
]
] |
cs/0005008 | Krzysztof R. Apt | Krzysztof R. Apt | A Denotational Semantics for First-Order Logic | 17 pages. Invited talk at the Computational Logic Conference (CL
2000). To appear in Springer-Verlag Lecture Notes in Computer Science | null | null | null | cs.PL cs.AI | null | In Apt and Bezem [AB99] (see cs.LO/9811017) we provided a computational
interpretation of first-order formulas over arbitrary interpretations. Here we
complement this work by introducing a denotational semantics for first-order
logic. Additionally, by allowing an assignment of a non-ground term to a
variable we introduce in this framework logical variables.
The semantics combines a number of well-known ideas from the areas of
semantics of imperative programming languages and logic programming. In the
resulting computational view conjunction corresponds to sequential composition,
disjunction to ``don't know'' nondeterminism, existential quantification to
declaration of a local variable, and negation to the ``negation as finite
failure'' rule. The soundness result shows correctness of the semantics with
respect to the notion of truth. The proof resembles in some aspects the proof
of the soundness of the SLDNF-resolution.
| [
{
"version": "v1",
"created": "Mon, 8 May 2000 12:23:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] |
cs/0005009 | Stephan Tobies | Stephan Tobies | PSPACE Reasoning for Graded Modal Logics | null | Journal of Logic and Computation, Vol. 11 No. 1, pp 85-106 2001 | null | null | cs.LO cs.AI cs.CC cs.DS | null | We present a PSPACE algorithm that decides satisfiability of the graded modal
logic Gr(K_R)---a natural extension of propositional modal logic K_R by
counting expressions---which plays an important role in the area of knowledge
representation. The algorithm employs a tableaux approach and is the first
known algorithm which meets the lower bound for the complexity of the problem.
Thus, we exactly fix the complexity of the problem and refute an
ExpTime-hardness conjecture. We extend the results to the logic Gr(K_(R \cap
I)), which augments Gr(K_R) with inverse relations and intersection of
accessibility relations. This establishes a kind of ``theoretical benchmark''
that all algorithmic approaches can be measured against.
| [
{
"version": "v1",
"created": "Mon, 8 May 2000 14:51:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tobies",
"Stephan",
""
]
] |
cs/0005010 | Patrik Simons | Patrik Simons | Extending and Implementing the Stable Model Semantics | 109 pages, 30 figures, dissertation for the degree of Doctor of
Technology | null | null | HUT-TCS-A58 | cs.LO cs.AI | null | An algorithm for computing the stable model semantics of logic programs is
developed. It is shown that one can extend the semantics and the algorithm to
handle new and more expressive types of rules. Emphasis is placed on the use of
efficient implementation techniques. In particular, an implementation of
lookahead that safely avoids testing every literal for failure and that makes
the use of lookahead feasible is presented. In addition, a good heuristic is
derived from the principle that the search space should be minimized.
Due to the lack of competitive algorithms and implementations for the
computation of stable models, the system is compared with three satisfiability
solvers. This shows that the heuristic can be improved by breaking ties, but
leaves open the question of how to break them. It also demonstrates that the
more expressive rules of the stable model semantics make the semantics clearly
preferable over propositional logic when a problem has a more compact logic
program representation. Conjunctive normal form representations are never more
compact than logic program ones.
| [
{
"version": "v1",
"created": "Mon, 8 May 2000 18:26:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Simons",
"Patrik",
""
]
] |
cs/0005011 | Ke Xu | Ke Xu and Wei Li | An Average Analysis of Backtracking on Random Constraint Satisfaction
Problems | 20 pages, submitted to Annals of Mathematics and Artificial
Intelligence | Annals of Mathematics and Artificial Intelligence, 33:21-37, 2001. | null | null | cs.CC cs.AI | null | In this paper we propose a random CSP model, called Model GB, which is a
natural generalization of standard Model B. It is proved that Model GB in which
each constraint is easy to satisfy exhibits non-trivial behaviour (not
trivially satisfiable or unsatisfiable) as the number of variables approaches
infinity. A detailed analysis to obtain an asymptotic estimate (good to 1+o(1))
of the average number of nodes in a search tree used by the backtracking
algorithm on Model GB is also presented. It is shown that the average number of
nodes required for finding all solutions or proving that no solution exists
grows exponentially with the number of variables. So this model might be an
interesting distribution for studying the nature of hard instances and
evaluating the performance of CSP algorithms. In addition, we further
investigate the behaviour of the average number of nodes as r (the ratio of
constraints to variables) varies. The results indicate that as r increases,
random CSP instances get easier and easier to solve, and the base for the
average number of nodes that is exponential in r tends to 1 as r approaches
infinity. Therefore, although the average number of nodes used by the
backtracking algorithm on random CSP is exponential, many CSP instances will be
very easy to solve when r is sufficiently large.
| [
{
"version": "v1",
"created": "Tue, 9 May 2000 02:12:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Xu",
"Ke",
""
],
[
"Li",
"Wei",
""
]
] |
cs/0005012 | Stephan Tobies | Ian Horrocks and Stephan Tobies | Reasoning with Axioms: Theory and Pratice | This paper appeard in the Proceedings of KR'2000 | null | null | null | cs.LO cs.AI | null | When reasoning in description, modal or temporal logics it is often useful to
consider axioms representing universal truths in the domain of discourse.
Reasoning with respect to an arbitrary set of axioms is hard, even for
relatively inexpressive logics, and it is essential to deal with such axioms in
an efficient manner if implemented systems are to be effective in real
applications. This is particularly relevant to Description Logics, where
subsumption reasoning with respect to a terminology is a fundamental problem.
Two optimisation techniques that have proved to be particularly effective in
dealing with terminologies are lazy unfolding and absorption. In this paper we
seek to improve our theoretical understanding of these important techniques. We
define a formal framework that allows the techniques to be precisely described,
establish conditions under which they can be safely applied, and prove that,
provided these conditions are respected, subsumption testing algorithms will
still function correctly. These results are used to show that the procedures
used in the FaCT system are correct and, moreover, to show how efficiency can
be significantly improved, while still retaining the guarantee of correctness,
by relaxing the safety conditions for absorption.
| [
{
"version": "v1",
"created": "Tue, 9 May 2000 07:17:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Horrocks",
"Ian",
""
],
[
"Tobies",
"Stephan",
""
]
] |
cs/0005013 | Stephan Tobies | Ian Horrocks, Ulrike Sattler and Stephan Tobies | Practical Reasoning for Very Expressive Description Logics | null | Logic Journal of the IGPL 8(3):239-264, May 2000 | null | null | cs.LO cs.AI | null | Description Logics (DLs) are a family of knowledge representation formalisms
mainly characterised by constructors to build complex concepts and roles from
atomic ones. Expressive role constructors are important in many applications,
but can be computationally problematical. We present an algorithm that decides
satisfiability of the DL ALC extended with transitive and inverse roles and
functional restrictions with respect to general concept inclusion axioms and
role hierarchies; early experiments indicate that this algorithm is well-suited
for implementation. Additionally, we show that ALC extended with just
transitive and inverse roles is still in PSPACE. We investigate the limits of
decidability for this family of DLs, showing that relaxing the constraints
placed on the kinds of roles used in number restrictions leads to the
undecidability of all inference problems. Finally, we describe a number of
optimisation techniques that are crucial in obtaining implementations of the
decision procedures, which, despite the worst-case complexity of the problem,
exhibit good performance with real-life problems.
| [
{
"version": "v1",
"created": "Tue, 9 May 2000 13:02:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Horrocks",
"Ian",
""
],
[
"Sattler",
"Ulrike",
""
],
[
"Tobies",
"Stephan",
""
]
] |
cs/0005014 | Stephan Tobies | Ian Horrocks, Ulrike Sattler and Stephan Tobies | Practical Reasoning for Expressive Description Logics | This paper appeared in the Proceedings of LPAR'99 | null | null | null | cs.LO cs.AI | null | Description Logics (DLs) are a family of knowledge representation formalisms
mainly characterised by constructors to build complex concepts and roles from
atomic ones. Expressive role constructors are important in many applications,
but can be computationally problematical. We present an algorithm that decides
satisfiability of the DL ALC extended with transitive and inverse roles, role
hierarchies, and qualifying number restrictions. Early experiments indicate
that this algorithm is well-suited for implementation. Additionally, we show
that ALC extended with just transitive and inverse roles is still in PSPACE.
Finally, we investigate the limits of decidability for this family of DLs.
| [
{
"version": "v1",
"created": "Wed, 10 May 2000 08:19:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Horrocks",
"Ian",
""
],
[
"Sattler",
"Ulrike",
""
],
[
"Tobies",
"Stephan",
""
]
] |
cs/0005016 | Norbert Broeker | Norbert Broeker | Improving Testsuites via Instrumentation | 6 pages, LaTeX2e | Proc. ANLP--NAACL, Seattle/WA, Apr29--May4 2000, pp.325-330 | null | null | cs.CL | null | This paper explores the usefulness of a technique from software engineering,
namely code instrumentation, for the development of large-scale natural
language grammars. Information about the usage of grammar rules in test
sentences is used to detect untested rules, redundant test sentences, and
likely causes of overgeneration. Results show that less than half of a
large-coverage grammar for German is actually tested by two large testsuites,
and that 10-30% of testing time is redundant. The methodology applied can be
seen as a re-use of grammar writing knowledge for testsuite compilation.
| [
{
"version": "v1",
"created": "Wed, 10 May 2000 14:51:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Broeker",
"Norbert",
""
]
] |
cs/0005017 | Stephan Tobies | Ian Horrock and Ulrike Sattler and Stephan Tobies | Reasoning with Individuals for the Description Logic SHIQ | To appear at CADE-17 | null | null | null | cs.LO cs.AI | null | While there has been a great deal of work on the development of reasoning
algorithms for expressive description logics, in most cases only Tbox reasoning
is considered. In this paper we present an algorithm for combined Tbox and Abox
reasoning in the SHIQ description logic. This algorithm is of particular
interest as it can be used to decide the problem of (database) conjunctive
query containment w.r.t. a schema. Moreover, the realisation of an efficient
implementation should be relatively straightforward as it can be based on an
existing highly optimised implementation of the Tbox algorithm in the FaCT
system.
| [
{
"version": "v1",
"created": "Thu, 11 May 2000 08:16:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Horrock",
"Ian",
""
],
[
"Sattler",
"Ulrike",
""
],
[
"Tobies",
"Stephan",
""
]
] |
cs/0005018 | Sabina Rossi | Annalisa Bossi, Nicoletta Cocco, Sandro Etalle and Sabina Rossi | On Modular Termination Proofs of General Logic Programs | 29 pages. To appear in Theory and Practice of Logic Programming | null | null | University of Venice Technical Report CS2000-8 | cs.LO cs.PL | null | We propose a modular method for proving termination of general logic programs
(i.e., logic programs with negation). It is based on the notion of acceptable
programs, but it allows us to prove termination in a truly modular way. We
consider programs consisting of a hierarchy of modules and supply a general
result for proving termination by dealing with each module separately. For
programs which are in a certain sense well-behaved, namely well-moded or
well-typed programs, we derive both a simple verification technique and an
iterative proof method. Some examples show how our system allows for greatly
simplified proofs.
| [
{
"version": "v1",
"created": "Thu, 11 May 2000 15:27:49 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jul 2001 09:31:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bossi",
"Annalisa",
""
],
[
"Cocco",
"Nicoletta",
""
],
[
"Etalle",
"Sandro",
""
],
[
"Rossi",
"Sabina",
""
]
] |
cs/0005019 | Schwitter | Diego Moll'a Aliod and Michael Hess | On the Scalability of the Answer Extraction System "ExtrAns" | 5 pages | Applications of Natural Language to Information Systems (NLDB'99).
Klagenfurt, Austria, 1999, 219-224 | null | null | cs.CL | null | This paper reports on the scalability of the answer extraction system
ExtrAns. An answer extraction system locates the exact phrases in the documents
that contain the explicit answers to the user queries. Answer extraction
systems are therefore more convenient than document retrieval systems in
situations where the user wants to find specific information in limited time.
ExtrAns performs answer extraction over UNIX manpages. It has been
constructed by combining available linguistic resources and implementing only a
few modules from scratch. A resolution procedure between the minimal logical
form of the user query and the minimal logical forms of the manpage sentences
finds the answers to the queries. These answers are displayed to the user,
together with pointers to the respective manpages, and the exact phrases that
contribute to the answer are highlighted.
This paper shows that the increase in response times is not a big issue when
scaling the system up from 30 to 500 documents, and that the response times for
500 documents are still acceptable for a real-time answer extraction system.
| [
{
"version": "v1",
"created": "Fri, 12 May 2000 14:12:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aliod",
"Diego Moll'a",
""
],
[
"Hess",
"Michael",
""
]
] |
cs/0005020 | Dragomir | Dragomir R. Radev (University of Michigan), Hongyan Jing (Columbia
University), Malgorzata Budzikowska (IBM TJ Watson Research Center) | Centroid-based summarization of multiple documents: sentence extraction,
utility-based evaluation, and user studies | 10 pages Corpus availability at http://perun.si.umich.edu/~radev/mds | NAACL/ANLP Workshop on Automatic Summarization, Seattle, WA, April
30, 2000 | null | null | cs.CL cs.AI cs.DL cs.HC cs.IR | null | We present a multi-document summarizer, called MEAD, which generates
summaries using cluster centroids produced by a topic detection and tracking
system. We also describe two new techniques, based on sentence utility and
subsumption, which we have applied to the evaluation of both single and
multiple document summaries. Finally, we describe two user studies that test
our models of multi-document summarization.
| [
{
"version": "v1",
"created": "Fri, 12 May 2000 17:24:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Radev",
"Dragomir R.",
"",
"University of Michigan"
],
[
"Jing",
"Hongyan",
"",
"Columbia\n University"
],
[
"Budzikowska",
"Malgorzata",
"",
"IBM TJ Watson Research Center"
]
] |
cs/0005021 | Aziz Guergachi | A. Guergachi | Modeling the Uncertainty in Complex Engineering Systems | 24 pages using ACM style file | null | null | null | cs.AI cs.LG | null | Existing procedures for model validation have been deemed inadequate for many
engineering systems. The reason of this inadequacy is due to the high degree of
complexity of the mechanisms that govern these systems. It is proposed in this
paper to shift the attention from modeling the engineering system itself to
modeling the uncertainty that underlies its behavior. A mathematical framework
for modeling the uncertainty in complex engineering systems is developed. This
framework uses the results of computational learning theory. It is based on the
premise that a system model is a learning machine.
| [
{
"version": "v1",
"created": "Sun, 14 May 2000 14:35:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guergachi",
"A.",
""
]
] |
cs/0005023 | Emanuele Panizzi | Alessandro Lonardo, Emanuele Panizzi and Benedetto Proietti | C++ programming language for an abstract massively parallel SIMD
architecture | 10 pages | null | null | null | cs.PL | null | The aim of this work is to define and implement an extended C++ language to
support the SIMD programming paradigm. The C++ programming language has been
extended to express all the potentiality of an abstract SIMD machine consisting
of a central Control Processor and a N-dimensional toroidal array of Numeric
Processors. Very few extensions have been added to the standard C++ with the
goal of minimising the effort for the programmer in learning a new language and
to keep very high the performance of the compiled code. The proposed language
has been implemented as a porting of the GNU C++ Compiler on a SIMD
supercomputer.
| [
{
"version": "v1",
"created": "Fri, 19 May 2000 10:19:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lonardo",
"Alessandro",
""
],
[
"Panizzi",
"Emanuele",
""
],
[
"Proietti",
"Benedetto",
""
]
] |
cs/0005024 | Ke Xu | Ke Xu and Wei Li | The SAT Phase Transition | 13 pages, 3 figures | The SAT Phase Transition. Science in China, Series E,
42(5):494-501, 1999 | null | null | cs.AI cs.CC | null | Phase transition is an important feature of SAT problem. For random k-SAT
model, it is proved that as r (ratio of clauses to variables) increases, the
structure of solutions will undergo a sudden change like satisfiability phase
transition when r reaches a threshold point. This phenomenon shows that the
satisfying truth assignments suddenly shift from being relatively different
from each other to being very similar to each other.
| [
{
"version": "v1",
"created": "Mon, 22 May 2000 04:45:53 GMT"
},
{
"version": "v2",
"created": "Tue, 23 May 2000 03:26:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Xu",
"Ke",
""
],
[
"Li",
"Wei",
""
]
] |
cs/0005025 | Markus Walther | Markus Walther (University of Marburg) | Finite-State Reduplication in One-Level Prosodic Morphology | 7 pages | Proc. NAACL-2000, Seattle/WA, pp.296-302 | null | null | cs.CL | null | Reduplication, a central instance of prosodic morphology, is particularly
challenging for state-of-the-art computational morphology, since it involves
copying of some part of a phonological string. In this paper I advocate a
finite-state method that combines enriched lexical representations via
intersection to implement the copying. The proposal includes a
resource-conscious variant of automata and can benefit from the existence of
lazy algorithms. Finally, the implementation of a complex case from Koasati is
presented.
| [
{
"version": "v1",
"created": "Mon, 22 May 2000 14:07:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Walther",
"Markus",
"",
"University of Marburg"
]
] |
cs/0005026 | Igor Sobrado Delgado | Igor Sobrado (University of Oviedo) | A One-Time Pad based Cipher for Data Protection in Distributed
Environments | 19 pages, 8 PostScript figures (attached), uses ACM/LaTeX macros
esub2acm.{bst|cls} and pifont package | null | null | FFUOV-00/03 | cs.CR cs.DC cs.IR cs.NI | null | A one-time pad (OTP) based cipher to insure both data protection and
integrity when mobile code arrives to a remote host is presented. Data
protection is required when a mobile agent could retrieve confidential
information that would be encrypted in untrusted nodes of the network; in this
case, information management could not rely on carrying an encryption key. Data
integrity is a prerequisite because mobile code must be protected against
malicious hosts that, by counterfeiting or removing collected data, could cover
information to the server that has sent the agent. The algorithm described in
this article seems to be simple enough, so as to be easily implemented. This
scheme is based on a non-interactive protocol and allows a remote host to
change its own data on-the-fly and, at the same time, protecting information
against handling by other hosts.
| [
{
"version": "v1",
"created": "Wed, 24 May 2000 22:24:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sobrado",
"Igor",
"",
"University of Oviedo"
]
] |
cs/0005028 | Dimitrios Skraparlis | Dimitrios Skraparlis | A method for command identification, using modified collision free
hashing with addition & rotation iterative hash functions (part 1) | 28 pages, includes code | null | null | null | cs.HC cs.IR | null | This paper proposes a method for identification of a user`s fixed string set
(which can be a command/instruction set for a terminal or microprocessor). This
method is fast and has very small memory requirements, compared to a
traditional full string storage and compare method. The user feeds characters
into a microcontroller via a keyboard or another microprocessor sends commands
and the microcontroller hashes the input in order to identify valid commands,
ensuring no collisions between hashed valid strings, while applying further
criteria to narrow collision between random and valid strings. The method
proposed narrows the possibility of the latter kind of collision, achieving
small code and memory-size utilization and very fast execution. Hashing is
achieved using additive & rotating hash functions in an iterative form, which
can be very easily implemented in simple microcontrollers and microprocessors.
Such hash functions are presented and compared according to their efficiency
for a given string/command set, using the program found in the appendix.
| [
{
"version": "v1",
"created": "Sat, 27 May 2000 01:08:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Skraparlis",
"Dimitrios",
""
]
] |
cs/0005029 | Dragomir | Dragomir R. Radev (University of Michigan), John Prager (IBM TJ Watson
Research Center), Valerie Samn (Teachers College, Columbia University) | Ranking suspected answers to natural language questions using predictive
annotation | 8 pages | ANLP'00, Seattle, WA, May 2000 | null | null | cs.CL | null | In this paper, we describe a system to rank suspected answers to natural
language questions. We process both corpus and query using a new technique,
predictive annotation, which augments phrases in texts with labels anticipating
their being targets of certain kinds of questions. Given a natural language
question, an IR system returns a set of matching passages, which are then
analyzed and ranked according to various criteria described in this paper. We
provide an evaluation of the techniques based on results from the TREC Q&A
evaluation in which our system participated.
| [
{
"version": "v1",
"created": "Tue, 30 May 2000 17:10:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Radev",
"Dragomir R.",
"",
"University of Michigan"
],
[
"Prager",
"John",
"",
"IBM TJ Watson\n Research Center"
],
[
"Samn",
"Valerie",
"",
"Teachers College, Columbia University"
]
] |
cs/0005030 | Joseph Y. Halpern | Joseph Y. Halpern | Axiomatizing Causal Reasoning | An earlier version of this paper appeared in UAI '98 | Journal of AI Research, Vol. 12, 2000, pp. 317--337 | null | null | cs.AI cs.LO | null | Causal models defined in terms of a collection of equations, as defined by
Pearl, are axiomatized here. Axiomatizations are provided for three
successively more general classes of causal models: (1) the class of recursive
theories (those without feedback), (2) the class of theories where the
solutions to the equations are unique, (3) arbitrary theories (where the
equations may not have solutions and, if they do, they are not necessarily
unique). It is shown that to reason about causality in the most general third
class, we must extend the language used by Galles and Pearl. In addition, the
complexity of the decision procedures is characterized for all the languages
and classes of models considered.
| [
{
"version": "v1",
"created": "Tue, 30 May 2000 18:56:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0006001 | Ninan Sajeeth Philip | Ninan Sajeeth Philip, K. Babu Joseph | Boosting the Differences: A fast Bayesian classifier neural network | latex 18pages no figures | null | null | IDA2000 | cs.CV | null | A Bayesian classifier that up-weights the differences in the attribute values
is discussed. Using four popular datasets from the UCI repository, some
interesting features of the network are illustrated. The network is suitable
for classification problems.
| [
{
"version": "v1",
"created": "Wed, 31 May 2000 23:37:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Philip",
"Ninan Sajeeth",
""
],
[
"Joseph",
"K. Babu",
""
]
] |
cs/0006002 | Ninan Sajeeth Philip | Ninan Sajeeth Philip, K. Babu Joseph | Distorted English Alphabet Identification : An application of Difference
Boosting Algorithm | latex 14pages no figures | null | null | ADCOM2000 | cs.CV | null | The difference-boosting algorithm is used on letters dataset from the UCI
repository to classify distorted raster images of English alphabets. In
contrast to rather complex networks, the difference-boosting is found to
produce comparable or better classification efficiency on this complex problem.
| [
{
"version": "v1",
"created": "Wed, 31 May 2000 23:52:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Philip",
"Ninan Sajeeth",
""
],
[
"Joseph",
"K. Babu",
""
]
] |
cs/0006003 | John Henderson | John C. Henderson and Eric Brill | Exploiting Diversity in Natural Language Processing: Combining Parsers | 8 pages | Proceedings of the Fourth Conference on Empirical Methods in
Natural Language Processing (EMNLP-99), pages 187-194. College Park,
Maryland, USA. June, 1999 | null | null | cs.CL | null | Three state-of-the-art statistical parsers are combined to produce more
accurate parses, as well as new bounds on achievable Treebank parsing accuracy.
Two general approaches are presented and two combination techniques are
described for each approach. Both parametric and non-parametric models are
explored. The resulting parsers surpass the best previously published
performance results for the Penn Treebank.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2000 18:42:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henderson",
"John C.",
""
],
[
"Brill",
"Eric",
""
]
] |
cs/0006005 | Stephen Marsand | Stephen Marsland, Ulrich Nehmzow and Jonathan Shapiro | Novelty Detection for Robot Neotaxis | 7 pages, 5 figures. In Proceedings of the Second International
Conference on Neural Computation, 2000 | null | null | null | cs.RO cs.NE nlin.AO | null | The ability of a robot to detect and respond to changes in its environment is
potentially very useful, as it draws attention to new and potentially important
features. We describe an algorithm for learning to filter out previously
experienced stimuli to allow further concentration on novel features. The
algorithm uses a model of habituation, a biological process which causes a
decrement in response with repeated presentation. Experiments with a mobile
robot are presented in which the robot detects the most novel stimulus and
turns towards it (`neotaxis').
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2000 11:32:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marsland",
"Stephen",
""
],
[
"Nehmzow",
"Ulrich",
""
],
[
"Shapiro",
"Jonathan",
""
]
] |
cs/0006006 | Stephen Marsand | Stephen Marsland, Ulrich Nehmzow and Jonathan Shapiro | A Real-Time Novelty Detector for a Mobile Robot | 8 pages, 6 figures. In Proceedings of EUREL European Advanced
Robotics Systems Masterclass and Conference, 2000 | null | null | null | cs.RO cs.NE | null | Recognising new or unusual features of an environment is an ability which is
potentially very useful to a robot. This paper demonstrates an algorithm which
achieves this task by learning an internal representation of `normality' from
sonar scans taken as a robot explores the environment. This model of the
environment is used to evaluate the novelty of each sonar scan presented to it
with relation to the model. Stimuli which have not been seen before, and
therefore have more novelty, are highlighted by the filter. The filter has the
ability to forget about features which have been learned, so that stimuli which
are seen only rarely recover their response over time. A number of robot
experiments are presented which demonstrate the operation of the filter.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2000 12:00:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marsland",
"Stephen",
""
],
[
"Nehmzow",
"Ulrich",
""
],
[
"Shapiro",
"Jonathan",
""
]
] |
cs/0006007 | Stephen Marsand | Stephen Marsland, Ulrich Nehmzow and Jonathan Shapiro | Novelty Detection on a Mobile Robot Using Habituation | 10 pages, 6 figures. In From Animals to Animats, The Sixth
International Conference on Simulation of Adaptive Behaviour, Paris, 2000 | null | null | null | cs.RO cs.NE nlin.AO | null | In this paper a novelty filter is introduced which allows a robot operating
in an un structured environment to produce a self-organised model of its
surroundings and to detect deviations from the learned model. The environment
is perceived using the rob ot's 16 sonar sensors. The algorithm produces a
novelty measure for each sensor scan relative to the model it has learned. This
means that it highlights stimuli which h ave not been previously experienced.
The novelty filter proposed uses a model of hab ituation. Habituation is a
decrement in behavioural response when a stimulus is pre sented repeatedly.
Robot experiments are presented which demonstrate the reliable o peration of
the filter in a number of environments.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2000 12:33:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marsland",
"Stephen",
""
],
[
"Nehmzow",
"Ulrich",
""
],
[
"Shapiro",
"Jonathan",
""
]
] |
cs/0006008 | Joseph Y. Halpern | Cynthia Dwork, Joseph Y. Halpern, and O. Waarts | Performing work efficiently in the presence of faults | null | SIAM Journal on Computing 27:5, 1998, pp. 1457--1491 | null | null | cs.DC | null | We consider a system of t synchronous processes that communicate only by
sending messages to one another, and that together must perform $n$ independent
units of work. Processes may fail by crashing; we want to guarantee that in
every execution of the protocol in which at least one process survives, all n
units of work will be performed. We consider three parameters: the number of
messages sent, the total number of units of work performed (including
multiplicities), and time. We present three protocols for solving the problem.
All three are work-optimal, doing O(n+t) work. The first has moderate costs in
the remaining two parameters, sending O(t\sqrt{t}) messages, and taking O(n+t)
time. This protocol can be easily modified to run in any completely
asynchronous system equipped with a failure detection mechanism. The second
sends only O(t log{t}) messages, but its running time is large (exponential in
n and t). The third is essentially time-optimal in the (usual) case in which
there are no failures, and its time complexity degrades gracefully as the
number of failures increases.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2000 18:35:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dwork",
"Cynthia",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Waarts",
"O.",
""
]
] |
cs/0006009 | Joseph Y. Halpern | Joseph Y. Halpern and Yoram Moses | Knowledge and common knowledge in a distributed environment | This paper is copyrighted by ACM and appears in the ACM Digital
Library | Journal of the ACM 37:3, 1990, pp. 549--587 | null | null | cs.DC cs.AI | null | Reasoning about knowledge seems to play a fundamental role in distributed
systems. Indeed, such reasoning is a central part of the informal intuitive
arguments used in the design of distributed protocols. Communication in a
distributed system can be viewed as the act of transforming the system's state
of knowledge. This paper presents a general framework for formalizing and
reasoning about knowledge in distributed systems. We argue that states of
knowledge of groups of processors are useful concepts for the design and
analysis of distributed protocols. In particular, distributed knowledge
corresponds to knowledge that is ``distributed'' among the members of the
group, while common knowledge corresponds to a fact being ``publicly known''.
The relationship between common knowledge and a variety of desirable actions in
a distributed system is illustrated. Furthermore, it is shown that, formally
speaking, in practical systems common knowledge cannot be attained. A number of
weaker variants of common knowledge that are attainable in many cases of
interest are introduced and investigated.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2000 18:43:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Moses",
"Yoram",
""
]
] |
cs/0006011 | John Henderson | John C. Henderson and Eric Brill | Bagging and Boosting a Treebank Parser | 8 pages | Proceedings of the 1st Meeting of the North American Chapter of
the Association for Computational Linguistics (NAACL-2000), pages 34-41 | null | null | cs.CL | null | Bagging and boosting, two effective machine learning techniques, are applied
to natural language parsing. Experiments using these techniques with a
trainable statistical parser are described. The best resulting system provides
roughly as large of a gain in F-measure as doubling the corpus size. Error
analysis of the result of the boosting technique reveals some inconsistent
annotations in the Penn Treebank, suggesting a semi-automatic method for
finding inconsistent treebank annotations.
| [
{
"version": "v1",
"created": "Mon, 5 Jun 2000 18:04:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henderson",
"John C.",
""
],
[
"Brill",
"Eric",
""
]
] |
cs/0006014 | Neil J. Gunther | Neil J. Gunther | Solaris System Resource Manager: All I Ever Wanted Was My Unfair
Advantage (And Why You Can't Have It!) | 17 pages, Updated since the 25th Computer Measurement Group
Conference, Reno NV, Dec.5-10, 1999 | Proc. CMG'99 Conf. p.194-205 | null | null | cs.PF cs.OS | null | Traditional UNIX time-share schedulers attempt to be fair to all users by
employing a round-robin style algorithm for allocating CPU time. Unfortunately,
a loophole exists whereby the scheduler can be biased in favor of a greedy user
running many short CPU-time processes. This loophole is not a defect but an
intrinsic property of the round-robin scheduler that ensures responsiveness to
the short CPU demands associated with multiple interactive users. A new
generation of UNIX system resource management software constrains the scheduler
to be equitable to all users regardless of the number of processes each may be
running. This "fair-share" scheduling draws on the concept of pro rating
resource "shares" across users and groups and then dynamically adjusting CPU
usage to meet those share proportions. The simple notion of statically
allocating these shares, however, belies the potential consequences for
performance as measured by user response time and service level targets. We
demonstrate this point by modeling several simple share allocation scenarios
and analyzing the corresponding performance effects. A brief comparison of
commercial system resource management implementations from HP, IBM, and SUN is
also given.
| [
{
"version": "v1",
"created": "Thu, 8 Jun 2000 16:50:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gunther",
"Neil J.",
""
]
] |
cs/0006015 | Neil J. Gunther | Neil J. Gunther | UNIX Resource Managers: Capacity Planning and Resource Issues | 12 pages. Fixed formatting problem. To be presented at the SAGE-AU
Conference, Bond University, Gold Coast, Australia, July 7, 2000 | null | null | null | cs.PF cs.OS | null | The latest implementations of commercial UNIX to offer mainframe style
capacity management on enterprise servers include: AIX Workload Manager (WLM),
HP-UX Process Resource Manager (PRM), Solaris Resource Manager (SRM), as well
as SGI and Compaq. The ability to manage server capacity is achieved by making
significant modifications to the standard UNIX operating system so that
processes are inherently tied to specific users. Those users, in turn, are
granted only a certain fraction of system resources. Resource usage is
monitored and compared with each users grant to ensure that the assigned
entitlement constraints are met. In this paper, we begin by clearing up some of
the confusion that has surrounded the motivation and the terminology behind the
new technology. The common theme across each of the commercial implementations
is the introduction of the fair-share scheduler. After reviewing some potential
performance pitfalls, we present capacity planning guidelines for migrating to
automated UNIX resource management.
| [
{
"version": "v1",
"created": "Thu, 8 Jun 2000 17:02:51 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jun 2000 22:07:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gunther",
"Neil J.",
""
]
] |
cs/0006016 | Neil J. Gunther | Neil J. Gunther | The X-Files: Investigating Alien Performance in a Thin-client World | 13 pages; Invited Lecture at the High Performance Computing
Conference, University of Tromso, Norway, June 27-30, 1999 | Proc. Hiper'99 Vol.1, p.156 | null | null | cs.PF cs.DC | null | Many scientific applications use the X11 window environment; an open source
windows GUI standard employing a client/server architecture. X11 promotes:
distributed computing, thin-client functionality, cheap desktop displays,
compatibility with heterogeneous servers, remote services and administration,
and greater maturity than newer web technologies. This paper details the
author's investigations into close encounters with alien performance in
X11-based seismic applications running on a 200-node cluster, backed by 2 TB of
mass storage. End-users cited two significant UFOs (Unidentified Faulty
Operations) i) long application launch times and ii) poor interactive response
times. The paper is divided into three major sections describing Close
Encounters of the 1st Kind: citings of UFO experiences, the 2nd Kind: recording
evidence of a UFO, and the 3rd Kind: contact and analysis. UFOs do exist and
this investigation presents a real case study for evaluating workload analysis
and other diagnostic tools.
| [
{
"version": "v1",
"created": "Thu, 8 Jun 2000 18:08:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gunther",
"Neil J.",
""
]
] |
cs/0006017 | Frankie James | Manny Rayner, Beth Ann Hockey, Frankie James | Turning Speech Into Scripts | Working notes from AAAI Spring Symposium | AAAI Spring Symposium on Natural Dialogues with Practical Robotic
Devices, March 20-22, 2000. Stanford, CA | null | null | cs.CL | null | We describe an architecture for implementing spoken natural language dialogue
interfaces to semi-autonomous systems, in which the central idea is to
transform the input speech signal through successive levels of representation
corresponding roughly to linguistic knowledge, dialogue knowledge, and domain
knowledge. The final representation is an executable program in a simple
scripting language equivalent to a subset of Cshell. At each stage of the
translation process, an input is transformed into an output, producing as a
byproduct a "meta-output" which describes the nature of the transformation
performed. We show how consistent use of the output/meta-output distinction
permits a simple and perspicuous treatment of apparently diverse topics
including resolution of pronouns, correction of user misconceptions, and
optimization of scripts. The methods described have been concretely realized in
a prototype speech interface to a simulation of the Personal Satellite
Assistant.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2000 17:28:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rayner",
"Manny",
""
],
[
"Hockey",
"Beth Ann",
""
],
[
"James",
"Frankie",
""
]
] |
cs/0006019 | Frankie James | Manny Rayner, Beth Ann Hockey, Frankie James | A Compact Architecture for Dialogue Management Based on Scripts and
Meta-Outputs | null | Language Technology Joint Conference ANLP-NAACL 2000. 29 April - 4
May 2000, Seattle, WA | null | null | cs.CL | null | We describe an architecture for spoken dialogue interfaces to semi-autonomous
systems that transforms speech signals through successive representations of
linguistic, dialogue, and domain knowledge. Each step produces an output, and a
meta-output describing the transformation, with an executable program in a
simple scripting language as the final result. The output/meta-output
distinction permits perspicuous treatment of diverse tasks such as resolving
pronouns, correcting user misconceptions, and optimizing scripts.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2000 21:41:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rayner",
"Manny",
""
],
[
"Hockey",
"Beth Ann",
""
],
[
"James",
"Frankie",
""
]
] |
cs/0006020 | Frankie James | Beth Ann Hockey, Manny Rayner, Frankie James | A Comparison of the XTAG and CLE Grammars for English | 5th International Workshop on Tree Adjoining Grammars and Related
Formalisms. 25-27 May 2000, Paris, France | null | null | null | cs.CL | null | When people develop something intended as a large broad-coverage grammar,
they usually have a more specific goal in mind. Sometimes this goal is covering
a corpus; sometimes the developers have theoretical ideas they wish to
investigate; most often, work is driven by a combination of these two main
types of goal. What tends to happen after a while is that the community of
people working with the grammar starts thinking of some phenomena as
``central'', and makes serious efforts to deal with them; other phenomena are
labelled ``marginal'', and ignored. Before long, the distinction between
``central'' and ``marginal'' becomes so ingrained that it is automatic, and
people virtually stop thinking about the ``marginal'' phenomena. In practice,
the only way to bring the marginal things back into focus is to look at what
other people are doing and compare it with one's own work. In this paper, we
will take two large grammars, XTAG and the CLE, and examine each of them from
the other's point of view. We will find in both cases not only that important
things are missing, but that the perspective offered by the other grammar
suggests simple and practical ways of filling in the holes. It turns out that
there is a pleasing symmetry to the picture. XTAG has a very good treatment of
complement structure, which the CLE to some extent lacks; conversely, the CLE
offers a powerful and general account of adjuncts, which the XTAG grammar does
not fully duplicate. If we examine the way in which each grammar does the thing
it is good at, we find that the relevant methods are quite easy to port to the
other framework, and in fact only involve generalization and systematization of
existing mechanisms.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2000 20:49:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hockey",
"Beth Ann",
""
],
[
"Rayner",
"Manny",
""
],
[
"James",
"Frankie",
""
]
] |
cs/0006021 | Frankie James | Manny Rayner, Beth Ann Hockey, Frankie James, Elizabeth O. Bratt,
Sharon Goldwater, Mark Gawron | Compiling Language Models from a Linguistically Motivated Unification
Grammar | To be published in COLING 2000 | null | null | null | cs.CL | null | Systems now exist which are able to compile unification grammars into
language models that can be included in a speech recognizer, but it is so far
unclear whether non-trivial linguistically principled grammars can be used for
this purpose. We describe a series of experiments which investigate the
question empirically, by incrementally constructing a grammar and discovering
what problems emerge when successively larger versions are compiled into finite
state graph representations and used as language models for a medium-vocabulary
recognition task.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2000 22:03:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rayner",
"Manny",
""
],
[
"Hockey",
"Beth Ann",
""
],
[
"James",
"Frankie",
""
],
[
"Bratt",
"Elizabeth O.",
""
],
[
"Goldwater",
"Sharon",
""
],
[
"Gawron",
"Mark",
""
]
] |
cs/0006022 | Ahmed Helmy | Ahmed Helmy (University of Southern California) | Multicast-based Architecture for IP Mobility: Simulation Analysis and
Comparison with Basic Mobile IP | 14 pages, 14 pages (.pdf file) | null | null | null | cs.NI cs.PF | null | With the introduction of a newer generation of wireless devices and
technologies, the need for an efficient architecture for IP mobility is
becoming more apparent. Several architectures have been proposed to support IP
mobility. Most studies, however, show that current architectures, in general,
fall short from satisfying the performance requirements for wireless
applications, mainly audio. Other studies have shown performance improvement by
using multicast to reduce latency and packet loss during handoff. In this
study, we propose a multicast-based architecture to support IP mobility. We
evaluate our approach through simulation, and we compare it to mainstream
approaches for IP mobility, mainly, the Mobile IP protocol. Comparison is
performed according to the required performance criteria, such as smooth
handoff and efficient routing.
Our simulation results show significant improvement for the proposed
architecture. On average, basic Mobile IP consumes almost twice as much network
bandwidth, and experiences more than twice as much end-to-end and handoff
delays, as does our proposed architecture. Furthermore, we propose an extension
to Mobile IP to support our architecture with minimal modification.
| [
{
"version": "v1",
"created": "Sat, 10 Jun 2000 23:53:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Helmy",
"Ahmed",
"",
"University of Southern California"
]
] |
cs/0006024 | Andreas Stolcke | E. Shriberg, R. Bates, A. Stolcke, P. Taylor, D. Jurafsky, K. Ries, N.
Coccaro, R. Martin, M. Meteer, C. Van Ess-Dykema | Can Prosody Aid the Automatic Classification of Dialog Acts in
Conversational Speech? | 55 pages, 10 figures | Language and Speech 41(3-4), 439-487, 1998 | null | null | cs.CL | null | Identifying whether an utterance is a statement, question, greeting, and so
forth is integral to effective automatic understanding of natural dialog.
Little is known, however, about how such dialog acts (DAs) can be automatically
classified in truly natural conversation. This study asks whether current
approaches, which use mainly word information, could be improved by adding
prosodic information. The study is based on more than 1000 conversations from
the Switchboard corpus. DAs were hand-annotated, and prosodic features
(duration, pause, F0, energy, and speaking rate) were automatically extracted
for each DA. In training, decision trees based on these features were inferred;
trees were then applied to unseen test data to evaluate performance.
Performance was evaluated for prosody models alone, and after combining the
prosody models with word information -- either from true words or from the
output of an automatic speech recognizer. For an overall classification task,
as well as three subtasks, prosody made significant contributions to
classification. Feature-specific analyses further revealed that although
canonical features (such as F0 for questions) were important, less obvious
features could compensate if canonical features were removed. Finally, in each
task, integrating the prosodic model with a DA-specific statistical language
model improved performance over that of the language model alone, especially
for the case of recognized words. Results suggest that DAs are redundantly
marked in natural conversation, and that a variety of automatically extractable
prosodic features could aid dialog processing in speech applications.
| [
{
"version": "v1",
"created": "Sun, 11 Jun 2000 06:00:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shriberg",
"E.",
""
],
[
"Bates",
"R.",
""
],
[
"Stolcke",
"A.",
""
],
[
"Taylor",
"P.",
""
],
[
"Jurafsky",
"D.",
""
],
[
"Ries",
"K.",
""
],
[
"Coccaro",
"N.",
""
],
[
"Martin",
"R.",
""
],
[
"Meteer",
"M.",
""
],
[
"Van Ess-Dykema",
"C.",
""
]
] |
cs/0006025 | Andreas Stolcke | A. Stolcke | Entropy-based Pruning of Backoff Language Models | 5 pages. Typos in published version fixed | Proceedings DARPA Broadcast News Transcription and Understanding
Workshop, pp. 270-274, Lansdowne, VA, 1998 | null | null | cs.CL | null | A criterion for pruning parameters from N-gram backoff language models is
developed, based on the relative entropy between the original and the pruned
model. It is shown that the relative entropy resulting from pruning a single
N-gram can be computed exactly and efficiently for backoff models. The relative
entropy measure can be expressed as a relative change in training set
perplexity. This leads to a simple pruning criterion whereby all N-grams that
change perplexity by less than a threshold are removed from the model.
Experiments show that a production-quality Hub4 LM can be reduced to 26% its
original size without increasing recognition error. We also compare the
approach to a heuristic pruning criterion by Seymore and Rosenfeld (1996), and
show that their approach can be interpreted as an approximation to the relative
entropy criterion. Experimentally, both approaches select similar sets of
N-grams (about 85% overlap), with the exact relative entropy criterion giving
marginally better performance.
| [
{
"version": "v1",
"created": "Sun, 11 Jun 2000 18:20:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stolcke",
"A.",
""
]
] |
cs/0006027 | Pierre Nugues | Pierre Nugues | Verbal Interactions in Virtual Worlds | Position paper for CHI 2000 Workshop on Natural-Language Interaction,
The Hague, 22 figures | null | null | null | cs.CL cs.HC | null | We first discuss respective advantages of language interaction in virtual
worlds and of using 3D images in dialogue systems. Then, we describe an example
of a verbal interaction system in virtual reality: Ulysse. Ulysse is a
conversational agent that helps a user navigate in virtual worlds. It has been
designed to be embedded in the representation of a participant of a virtual
conference and it responds positively to motion orders. Ulysse navigates the
user's viewpoint on his/her behalf in the virtual world. On tests we carried
out, we discovered that users, novices as well as experienced ones have
difficulties moving in a 3D environment. Agents such as Ulysse enable a user to
carry out navigation motions that would have been impossible with classical
interaction devices. From the whole Ulysse system, we have stripped off a
skeleton architecture that we have ported to VRML, Java, and Prolog. We hope
this skeleton helps the design of language applications in virtual worlds.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2000 09:50:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nugues",
"Pierre",
""
]
] |
cs/0006028 | Adwait Ratnaparkhi | Adwait Ratnaparkhi | Trainable Methods for Surface Natural Language Generation | LaTeX, 8 pages | Proceedings of the 1st Meeting of the North American Chapter of
the Association for Computational Linguistics (NAACL 2000). Pages 194--201 | null | null | cs.CL | null | We present three systems for surface natural language generation that are
trainable from annotated corpora. The first two systems, called NLG1 and NLG2,
require a corpus marked only with domain-specific semantic attributes, while
the last system, called NLG3, requires a corpus marked with both semantic
attributes and syntactic dependency information. All systems attempt to produce
a grammatical natural language phrase from a domain-specific semantic
representation. NLG1 serves a baseline system and uses phrase frequencies to
generate a whole phrase in one step, while NLG2 and NLG3 use maximum entropy
probability models to individually generate each word in the phrase. The
systems NLG2 and NLG3 learn to determine both the word choice and the word
order of the phrase. We present experiments in which we generate phrases to
describe flights in the air travel domain.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2000 21:06:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ratnaparkhi",
"Adwait",
""
]
] |
cs/0006029 | Ahmed Helmy | Ahmed Helmy, Sandeep Gupta, Deborah Estrin, Alberto Cerpa, Yan Yu
(University of Southern California) | Systematic Performance Evaluation of Multipoint Protocols | 23 pages, 12 figures | null | null | null | cs.NI cs.DS | null | The advent of multipoint (multicast-based) applications and the growth and
complexity of the Internet has complicated network protocol design and
evaluation.
In this paper, we present a method for automatic synthesis of worst and best
case scenarios for multipoint protocol performance evaluation.
Our method uses a fault-oriented test generation (FOTG) algorithm for
searching the protocol and system state space to synthesize these scenarios.
The algorithm is based on a global finite state machine (FSM) model. We extend
the algorithm with timing semantics to handle end-to-end delays and address
performance criteria. We introduce the notion of a virtual LAN to represent
delays of the underlying multicast distribution tree.
As a case study, we use our method to evaluate variants of the timer
suppression mechanism, used in various multipoint protocols, with respect to
two performance criteria: overhead of response messages and response time.
Simulation results for reliable multicast protocols show that our method
provides a scalable way for synthesizing worst-case scenarios automatically. We
expect our method to serve as a model for applying systematic scenario
generation to other multipoint protocols.
| [
{
"version": "v1",
"created": "Sat, 17 Jun 2000 18:16:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Helmy",
"Ahmed",
"",
"University of Southern California"
],
[
"Gupta",
"Sandeep",
"",
"University of Southern California"
],
[
"Estrin",
"Deborah",
"",
"University of Southern California"
],
[
"Cerpa",
"Alberto",
"",
"University of Southern California"
],
[
"Yu",
"Yan",
"",
"University of Southern California"
]
] |
cs/0006030 | Tad Hogg | Hristo Bojinov, Arancha Casal and Tad Hogg | Multiagent Control of Self-reconfigurable Robots | 15 pages, 10 color figures, including low-resolution photos of
prototype hardware | Artificial Intelligence 142:99-120 (2002) | null | null | cs.RO cs.DC cs.MA | null | We demonstrate how multiagent systems provide useful control techniques for
modular self-reconfigurable (metamorphic) robots. Such robots consist of many
modules that can move relative to each other, thereby changing the overall
shape of the robot to suit different tasks. Multiagent control is particularly
well-suited for tasks involving uncertain and changing environments. We
illustrate this approach through simulation experiments of Proteo, a
metamorphic robot system currently under development.
| [
{
"version": "v1",
"created": "Tue, 20 Jun 2000 20:17:44 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jun 2000 23:34:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bojinov",
"Hristo",
""
],
[
"Casal",
"Arancha",
""
],
[
"Hogg",
"Tad",
""
]
] |
cs/0006031 | Yi-Dong Shen | Yi-Dong Shen, Li-Yan Yuan, Jia-Huai You | Verifying Termination of General Logic Programs with Concrete Queries | 28 pages, 8 figures | null | null | null | cs.AI cs.LO | null | We introduce a method of verifying termination of logic programs with respect
to concrete queries (instead of abstract query patterns). A necessary and
sufficient condition is established and an algorithm for automatic verification
is developed. In contrast to existing query pattern-based approaches, our
method has the following features: (1) It applies to all general logic programs
with non-floundering queries. (2) It is very easy to automate because it does
not need to search for a level mapping or a model, nor does it need to compute
an interargument relation based on additional mode or type information. (3) It
bridges termination analysis with loop checking, the two problems that have
been studied separately in the past despite their close technical relation with
each other.
| [
{
"version": "v1",
"created": "Wed, 21 Jun 2000 17:30:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shen",
"Yi-Dong",
""
],
[
"Yuan",
"Li-Yan",
""
],
[
"You",
"Jia-Huai",
""
]
] |
cs/0006034 | Peter J. Stuckey | Kevin Glynn, Martin Sulzmann, and Peter J. Stuckey | Type Classes and Constraint Handling Rules | 14 pages, Workshop on Rule-Based Constraint Reasoning and Programming
(http://www.informatik.uni-muenchen.de/~fruehwir/cl2000r.html) | null | null | TR2000/7 | cs.PL | null | Type classes are an elegant extension to traditional, Hindley-Milner based
typing systems. They are used in modern, typed languages such as Haskell to
support controlled overloading of symbols. Haskell 98 supports only
single-parameter and constructor type classes. Other extensions such as
multi-parameter type classes are highly desired but are still not officially
supported by Haskell. Subtle issues arise with extensions, which may lead to a
loss of feasible type inference or ambiguous programs. A proper logical basis
for type class systems seems to be missing. Such a basis would allow extensions
to be characterised and studied rigorously. We propose to employ Constraint
Handling Rules as a tool to study and develop type class systems in a uniform
way.
| [
{
"version": "v1",
"created": "Mon, 26 Jun 2000 00:39:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Glynn",
"Kevin",
""
],
[
"Sulzmann",
"Martin",
""
],
[
"Stuckey",
"Peter J.",
""
]
] |
cs/0006037 | Joseph Y. Halpern | Zygmunt Haas, Joseph Y. Halpern, Li Li, Stephen B. Wicker | A Decision-Theoretic Approach to Resource Allocation in Wireless
Multimedia Networks | To appear, Dial M for Mobility, 2000 | null | null | null | cs.NI | null | The allocation of scarce spectral resources to support as many user
applications as possible while maintaining reasonable quality of service is a
fundamental problem in wireless communication. We argue that the problem is
best formulated in terms of decision theory. We propose a scheme that takes
decision-theoretic concerns (like preferences) into account and discuss the
difficulties and subtleties involved in applying standard techniques from the
theory of Markov Decision Processes (MDPs) in constructing an algorithm that is
decision-theoretically optimal. As an example of the proposed framework, we
construct such an algorithm under some simplifying assumptions. Additionally,
we present analysis and simulation results that show that our algorithm meets
its design goals. Finally, we investigate how far from optimal one well-known
heuristic is. The main contribution of our results is in providing insight and
guidance for the design of near-optimal admission-control policies.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2000 20:31:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haas",
"Zygmunt",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Li",
"Li",
""
],
[
"Wicker",
"Stephen B.",
""
]
] |
cs/0006038 | Dale Gerdemann | Dale Gerdemann and Gertjan van Noord | Approximation and Exactness in Finite State Optimality Theory | 10 pages, 1 figure, Finite-State Phonology : SIGPHON 2000, Fifth
Meeting of the ACL Special Interest Group in Computational Phonology, COLING
2000 | null | null | null | cs.CL | null | Previous work (Frank and Satta 1998; Karttunen, 1998) has shown that
Optimality Theory with gradient constraints generally is not finite state. A
new finite-state treatment of gradient constraints is presented which improves
upon the approximation of Karttunen (1998). The method turns out to be exact,
and very compact, for the syllabification analysis of Prince and Smolensky
(1993).
| [
{
"version": "v1",
"created": "Wed, 28 Jun 2000 10:06:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gerdemann",
"Dale",
""
],
[
"van Noord",
"Gertjan",
""
]
] |
cs/0006040 | Luciano da Fontoura Costa | Luciano da Fontoura Costa | Correlation over Decomposed Signals: A Non-Linear Approach to Fast and
Effective Sequences Comparison | 7 pages, 1 figure | null | null | null | cs.CV cs.DS q-bio | null | A novel non-linear approach to fast and effective comparison of sequences is
presented, compared to the traditional cross-correlation operator, and
illustrated with respect to DNA sequences.
| [
{
"version": "v1",
"created": "Wed, 28 Jun 2000 18:34:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Costa",
"Luciano da Fontoura",
""
]
] |
cs/0006041 | Jordi Atserias Batalla | Jordi Atserias, Irene Castellon, Montse Civit, German Rigau | Using a Diathesis Model for Semantic Parsing | 8 pages | Proceedins of VEXTAL.1999 pg 385-392 | null | null | cs.CL cs.AI | null | This paper presents a semantic parsing approach for unrestricted texts.
Semantic parsing is one of the major bottlenecks of Natural Language
Understanding (NLU) systems and usually requires building expensive resources
not easily portable to other domains. Our approach obtains a case-role
analysis, in which the semantic roles of the verb are identified. In order to
cover all the possible syntactic realisations of a verb, our system combines
their argument structure with a set of general semantic labelled diatheses
models. Combining them, the system builds a set of syntactic-semantic patterns
with their own role-case representation. Once the patterns are build, we use an
approximate tree pattern-matching algorithm to identify the most reliable
pattern for a sentence. The pattern matching is performed between the
syntactic-semantic patterns and the feature-structure tree representing the
morphological, syntactical and semantic information of the analysed sentence.
For sentences assigned to the correct model, the semantic parsing system we are
presenting identifies correctly more than 73% of possible semantic case-roles.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2000 07:44:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Atserias",
"Jordi",
""
],
[
"Castellon",
"Irene",
""
],
[
"Civit",
"Montse",
""
],
[
"Rigau",
"German",
""
]
] |
cs/0006042 | Jordi Atserias Batalla | Jordi Atserias, Irene Castellon, Montse Civit, German Rigau | Semantic Parsing based on Verbal Subcategorization | 12 pages, extended version of the paper. Spanish version of the paper
also available from authors home page | Conference on Intelligence text Processing and Computational
Linguistics, CICLing 2000. pg 330-340 | null | null | cs.CL cs.AI | null | The aim of this work is to explore new methodologies on Semantic Parsing for
unrestricted texts. Our approach follows the current trends in Information
Extraction (IE) and is based on the application of a verbal subcategorization
lexicon (LEXPIR) by means of complex pattern recognition techniques. LEXPIR is
framed on the theoretical model of the verbal subcategorization developed in
the Pirapides project.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2000 09:17:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Atserias",
"Jordi",
""
],
[
"Castellon",
"Irene",
""
],
[
"Civit",
"Montse",
""
],
[
"Rigau",
"German",
""
]
] |
cs/0006043 | Sylvain Piechowiak | S. Piechowiak, J. Rodriguez | Constraint compiling into rules formalism constraint compiling into
rules formalism for dynamic CSPs computing | 14 pages | null | null | null | cs.AI | null | In this paper we present a rule based formalism for filtering variables
domains of constraints. This formalism is well adapted for solving dynamic CSP.
We take diagnosis as an instance problem to illustrate the use of these rules.
A diagnosis problem is seen like finding all the minimal sets of constraints to
be relaxed in the constraint network that models the device to be diagnosed
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2000 10:25:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Piechowiak",
"S.",
""
],
[
"Rodriguez",
"J.",
""
]
] |
cs/0006045 | Carlos N. Ribeiro | Carlos Ribeiro, Andre Zuquete, Paulo Ferreira and Paulo Guedes | Security Policy Consistency | To appear in the first CL2000 workshop on Rule-Based Constraint
Reasoning and Programming | null | null | null | cs.LO cs.CR | null | With the advent of wide security platforms able to express simultaneously all
the policies comprising an organization's global security policy, the problem
of inconsistencies within security policies become harder and more relevant.
We have defined a tool based on the CHR language which is able to detect
several types of inconsistencies within and between security policies and other
specifications, namely workflow specifications.
Although the problem of security conflicts has been addressed by several
authors, to our knowledge none has addressed the general problem of security
inconsistencies, on its several definitions and target specifications.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2000 20:07:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ribeiro",
"Carlos",
""
],
[
"Zuquete",
"Andre",
""
],
[
"Ferreira",
"Paulo",
""
],
[
"Guedes",
"Paulo",
""
]
] |
cs/0007001 | Oswaldo Teran | Oswaldo Teran (1 and 2), Bruce Edmonds (1) and Steve Wallis (1) ((1)
Manchester Metropolitan University. Manchester. UK, (2) Universidad de Los
Andes. Merida. Venezuela) | Constraint Exploration and Envelope of Simulation Trajectories | 15 pages, To be presented at the First Workshop on Rule-Based
Constraint Reasoning and Programming at the First International Conference on
Computational Logic, London, UK, 24th to 28th July, 2000 | null | null | null | cs.PL cs.AI cs.LO | null | The implicit theory that a simulation represents is precisely not in the
individual choices but rather in the 'envelope' of possible trajectories - what
is important is the shape of the whole envelope. Typically a huge amount of
computation is required when experimenting with factors bearing on the dynamics
of a simulation to tease out what affects the shape of this envelope. In this
paper we present a methodology aimed at systematically exploring this envelope.
We propose a method for searching for tendencies and proving their necessity
relative to a range of parameterisations of the model and agents' choices, and
to the logic of the simulation language. The exploration consists of a forward
chaining generation of the trajectories associated to and constrained by such a
range of parameterisations and choices. Additionally, we propose a
computational procedure that helps implement this exploration by translating a
Multi Agent System simulation into a constraint-based search over possible
trajectories by 'compiling' the simulation rules into a more specific form,
namely by partitioning the simulation rules using appropriate modularity in the
simulation. An example of this procedure is exhibited.
Keywords: Constraint Search, Constraint Logic Programming, Proof, Emergence,
Tendencies
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2000 10:10:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Teran",
"Oswaldo",
"",
"1 and 2"
],
[
"Edmonds",
"Bruce",
""
],
[
"Wallis",
"Steve",
""
]
] |
cs/0007003 | Stuart Yeates | Stuart Yeates and David Bainbridge and Ian H. Witten | Using compression to identify acronyms in text | 10 pages. A short form published in DCC2000 | null | null | Working Paper 00/01 | cs.DL cs.IR | null | Text mining is about looking for patterns in natural language text, and may
be defined as the process of analyzing text to extract information from it for
particular purposes. In previous work, we claimed that compression is a key
technology for text mining, and backed this up with a study that showed how
particular kinds of lexical tokens---names, dates, locations, etc.---can be
identified and located in running text, using compression models to provide the
leverage necessary to distinguish different token types (Witten et al., 1999)
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2000 02:02:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yeates",
"Stuart",
""
],
[
"Bainbridge",
"David",
""
],
[
"Witten",
"Ian H.",
""
]
] |
cs/0007004 | Alejandro Zunino | Alejandro Zunino and Analia Amandi | Brainstorm/J: a Java Framework for Intelligent Agents | 15 pages. To be published in Proceedings of the Second Argentinian
Symposium on Artificial Intelligence (ASAI'2000 - 29th JAIIO). September
2000. Tandil, Buenos Aires, Argentina. See
http://www.exa.unicen.edu.ar/~azunino | null | null | null | cs.AI | null | Despite the effort of many researchers in the area of multi-agent systems
(MAS) for designing and programming agents, a few years ago the research
community began to take into account that common features among different MAS
exists. Based on these common features, several tools have tackled the problem
of agent development on specific application domains or specific types of
agents. As a consequence, their scope is restricted to a subset of the huge
application domain of MAS. In this paper we propose a generic infrastructure
for programming agents whose name is Brainstorm/J. The infrastructure has been
implemented as an object oriented framework. As a consequence, our approach
supports a broader scope of MAS applications than previous efforts, being
flexible and reusable.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2000 16:31:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zunino",
"Alejandro",
""
],
[
"Amandi",
"Analia",
""
]
] |
cs/0007005 | Ahmed Helmy | Ahmed Helmy, Deborah Estrin, Sandeep Gupta | Systematic Testing of Multicast Routing Protocols: Analysis of Forward
and Backward Search Techniques | 26 pages, 20 figures | null | null | null | cs.NI cs.DS | null | In this paper, we present a new methodology for developing systematic and
automatic test generation algorithms for multipoint protocols. These algorithms
attempt to synthesize network topologies and sequences of events that stress
the protocol's correctness or performance. This problem can be viewed as a
domain-specific search problem that suffers from the state space explosion
problem. One goal of this work is to circumvent the state space explosion
problem utilizing knowledge of network and fault modeling, and multipoint
protocols. The two approaches investigated in this study are based on forward
and backward search techniques. We use an extended finite state machine (FSM)
model of the protocol. The first algorithm uses forward search to perform
reduced reachability analysis. Using domain-specific information for multicast
routing over LANs, the algorithm complexity is reduced from exponential to
polynomial in the number of routers. This approach, however, does not fully
automate topology synthesis. The second algorithm, the fault-oriented test
generation, uses backward search for topology synthesis and uses backtracking
to generate event sequences instead of searching forward from initial states.
Using these algorithms, we have conducted studies for correctness of the
multicast routing protocol PIM. We propose to extend these algorithms to study
end-to-end multipoint protocols using a virtual LAN that represents delays of
the underlying multicast distribution tree.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2000 21:55:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Helmy",
"Ahmed",
""
],
[
"Estrin",
"Deborah",
""
],
[
"Gupta",
"Sandeep",
""
]
] |
cs/0007006 | Hans G. Kaper | Hans G. Kaper (1), Sever Tipei (2) and Jeff M. Wright (2) ((1) Argonne
National Laboratory, (2) University of Illinois at Urbana-Champaign) | DISCO: An object-oriented system for music composition and sound design | 4 pages, no figures; to be published in Proc. Int'l Computer Music
Conference 2000 (Berlin, August 2000) | null | null | null | cs.SD cs.DS cs.SE | null | This paper describes an object-oriented approach to music composition and
sound design. The approach unifies the processes of music making and instrument
building by using similar logic, objects, and procedures. The composition
modules use an abstract representation of musical data, which can be easily
mapped onto different synthesis languages or a traditionally notated score. An
abstract base class is used to derive classes on different time scales. Objects
can be related to act across time scales, as well as across an entire piece,
and relationships between similar objects can replicate traditional music
operations or introduce new ones. The DISCO (Digital Instrument for
Sonification and Composition) system is an open-ended work in progress.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2000 18:20:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kaper",
"Hans G.",
""
],
[
"Tipei",
"Sever",
""
],
[
"Wright",
"Jeff M.",
""
]
] |
cs/0007007 | Hans G. Kaper | Hans G. Kaper,(1) Sever Tipei,(2) and Elizabeth Wiebel (1) ((1)
Argonne National Laboratory, (2) University of Illinois at Urbana-Champaign) | Data sonification and sound visualization | 25 pages, 5 figures, 3 tables; preprint of the published paper
(differing in details) | Computing in Science and Engineering, Vol. 1 No. 4, July-August
1999, pp. 48-58 | null | ANL/MCS-P738-0199 | cs.SD cs.HC cs.MM | null | This article describes a collaborative project between researchers in the
Mathematics and Computer Science Division at Argonne National Laboratory and
the Computer Music Project of the University of Illinois at Urbana-Champaign.
The project focuses on the use of sound for the exploration and analysis of
complex data sets in scientific computing. The article addresses digital sound
synthesis in the context of DIASS (Digital Instrument for Additive Sound
Synthesis) and sound visualization in a virtual-reality environment by means of
M4CAVE. It describes the procedures and preliminary results of some experiments
in scientific sonification and sound visualization.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2000 21:26:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kaper",
"Hans G.",
""
],
[
"Tipei",
"Sever",
""
],
[
"Wiebel",
"Elizabeth",
""
]
] |
cs/0007008 | Jan Heering | M. G. J. van den Brand, J. Heering, P. Klint, P. A. Olivier | Compiling Language Definitions: The ASF+SDF Compiler | 36 pages, 5 figures | ACM Transactions on Programming Languages and Systems 24 4 (July
2002) 334-368 | null | SEN-R0014 | cs.PL cs.SE | null | The ASF+SDF Meta-Environment is an interactive language development
environment whose main application areas are definition of domain-specific
languages, generation of program analysis and transformation tools, production
of software renovation tools, and general specification and prototyping. It
uses conditional rewrite rules to define the dynamic semantics and other
tool-oriented aspects of languages, so the effectiveness of the generated tools
is critically dependent on the quality of the rewrite rule implementation.
The ASF+SDF rewrite rule compiler generates C code, thus taking advantage of
C's portability and the sophisticated optimization capabilities of current C
compilers as well as avoiding potential abstract machine interface bottlenecks.
It can handle large (10 000+ rule) language definitions and uses an efficient
run-time storage scheme capable of handling large (1 000 000+ node) terms. Term
storage uses maximal subterm sharing (hash-consing), which turns out to be more
effective in the case of ASF+SDF than in Lisp or SML. Extensive benchmarking
has shown the time and space performance of the generated code to be as good as
or better than that of the best current rewrite rule and functional language
compilers.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2000 11:38:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brand",
"M. G. J. van den",
""
],
[
"Heering",
"J.",
""
],
[
"Klint",
"P.",
""
],
[
"Olivier",
"P. A.",
""
]
] |
cs/0007009 | Jan Daciuk | Jan Daciuk, Stoyan Mihov, Bruce Watson, Richard Watson | Incremental construction of minimal acyclic finite-state automata | 14 pages, 7 figures | Computational Linguistics, Vol. 26, Number 1, March 2000 | null | null | cs.CL | null | In this paper, we describe a new method for constructing minimal,
deterministic, acyclic finite-state automata from a set of strings. Traditional
methods consist of two phases: the first to construct a trie, the second one to
minimize it. Our approach is to construct a minimal automaton in a single phase
by adding new strings one by one and minimizing the resulting automaton
on-the-fly. We present a general algorithm as well as a specialization that
relies upon the lexicographical ordering of the input strings.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2000 14:15:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daciuk",
"Jan",
""
],
[
"Mihov",
"Stoyan",
""
],
[
"Watson",
"Bruce",
""
],
[
"Watson",
"Richard",
""
]
] |
cs/0007010 | Gerard Escudero Bakx | Gerard Escudero, Lluis Marquez, German Rigau | Boosting Applied to Word Sense Disambiguation | 12 pages | Proceedings of the 11th European Conference on Machine Learning,
ECML'2000 pp. 129-141 | null | null | cs.CL cs.AI | null | In this paper Schapire and Singer's AdaBoost.MH boosting algorithm is applied
to the Word Sense Disambiguation (WSD) problem. Initial experiments on a set of
15 selected polysemous words show that the boosting approach surpasses Naive
Bayes and Exemplar-based approaches, which represent state-of-the-art accuracy
on supervised WSD. In order to make boosting practical for a real learning
domain of thousands of words, several ways of accelerating the algorithm by
reducing the feature space are studied. The best variant, which we call
LazyBoosting, is tested on the largest sense-tagged corpus available containing
192,800 examples of the 191 most frequent and ambiguous English words. Again,
boosting compares favourably to the other benchmark algorithms.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2000 14:10:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Escudero",
"Gerard",
""
],
[
"Marquez",
"Lluis",
""
],
[
"Rigau",
"German",
""
]
] |
cs/0007011 | Gerard Escudero Bakx | Gerard Escudero, Lluis Marquez, German Rigau | Naive Bayes and Exemplar-Based approaches to Word Sense Disambiguation
Revisited | 5 pages | Proceedings of the 14th European Conference on Artificial
Intelligence, ECAI'2000 pp. 421-425 | null | null | cs.CL cs.AI | null | This paper describes an experimental comparison between two standard
supervised learning methods, namely Naive Bayes and Exemplar-based
classification, on the Word Sense Disambiguation (WSD) problem. The aim of the
work is twofold. Firstly, it attempts to contribute to clarify some confusing
information about the comparison between both methods appearing in the related
literature. In doing so, several directions have been explored, including:
testing several modifications of the basic learning algorithms and varying the
feature space. Secondly, an improvement of both algorithms is proposed, in
order to deal with large attribute sets. This modification, which basically
consists in using only the positive information appearing in the examples,
allows to improve greatly the efficiency of the methods, with no loss in
accuracy. The experiments have been performed on the largest sense-tagged
corpus available containing the most frequent and ambiguous English words.
Results show that the Exemplar-based approach to WSD is generally superior to
the Bayesian approach, especially when a specific metric for dealing with
symbolic attributes is used.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2000 15:00:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Escudero",
"Gerard",
""
],
[
"Marquez",
"Lluis",
""
],
[
"Rigau",
"German",
""
]
] |
cs/0007012 | Francis Wolinski | Francis Wolinski, Frantz Vichot, Mathieu Stricker | Using Learning-based Filters to Detect Rule-based Filtering Obsolescence | 13 pages, 12 figures, Content-based Multimedia Information Access,
RIAO 2000 | null | null | null | cs.CL cs.AI | null | For years, Caisse des Depots et Consignations has produced information
filtering applications. To be operational, these applications require high
filtering performances which are achieved by using rule-based filters. With
this technique, an administrator has to tune a set of rules for each topic.
However, filters become obsolescent over time. The decrease of their
performances is due to diachronic polysemy of terms that involves a loss of
precision and to diachronic polymorphism of concepts that involves a loss of
recall.
To help the administrator to maintain his filters, we have developed a method
which automatically detects filtering obsolescence. It consists in making a
learning-based control filter using a set of documents which have already been
categorised as relevant or not relevant by the rule-based filter. The idea is
to supervise this filter by processing a differential comparison of its
outcomes with those of the control one.
This method has many advantages. It is simple to implement since the training
set used by the learning is supplied by the rule-based filter. Thus, both the
making and the use of the control filter are fully automatic. With automatic
detection of obsolescence, learning-based filtering finds a rich application
which offers interesting prospects.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2000 15:13:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolinski",
"Francis",
""
],
[
"Vichot",
"Frantz",
""
],
[
"Stricker",
"Mathieu",
""
]
] |
cs/0007013 | Gerald Penn | Gerald Penn | Applying Constraint Handling Rules to HPSG | To appear, Proceedings of First Workshop on Rule-Based Constraint
Reasoning and Programming, CL2000; 14 pages | null | null | null | cs.CL cs.PL | null | Constraint Handling Rules (CHR) have provided a realistic solution to an
over-arching problem in many fields that deal with constraint logic
programming: how to combine recursive functions or relations with constraints
while avoiding non-termination problems. This paper focuses on some other
benefits that CHR, specifically their implementation in SICStus Prolog, have
provided to computational linguists working on grammar design tools. CHR rules
are applied by means of a subsumption check and this check is made only when
their variables are instantiated or bound. The former functionality is at best
difficult to simulate using more primitive coroutining statements such as
SICStus when/2, and the latter simply did not exist in any form before CHR.
For the sake of providing a case study in how these can be applied to grammar
development, we consider the Attribute Logic Engine (ALE), a Prolog
preprocessor for logic programming with typed feature structures, and its
extension to a complete grammar development system for Head-driven Phrase
Structure Grammar (HPSG), a popular constraint-based linguistic theory that
uses typed feature structures. In this context, CHR can be used not only to
extend the constraint language of feature structure descriptions to include
relations in a declarative way, but also to provide support for constraints
with complex antecedents and constraints on the co-occurrence of feature values
that are necessary to interpret the type system of HPSG properly.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2000 19:09:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Penn",
"Gerald",
""
]
] |
cs/0007015 | Ted Herman | Ted Herman | Phase Clocks for Transient Fault Repair | 22 pages, LaTeX | null | null | TR99-08 | cs.DC | null | Phase clocks are synchronization tools that implement a form of logical time
in distributed systems. For systems tolerating transient faults by self-repair
of damaged data, phase clocks can enable reasoning about the progress of
distributed repair procedures. This paper presents a phase clock algorithm
suited to the model of transient memory faults in asynchronous systems with
read/write registers. The algorithm is self-stabilizing and guarantees accuracy
of phase clocks within O(k) time following an initial state that is k-faulty.
Composition theorems show how the algorithm can be used for the timing of
distributed procedures that repair system outputs.
| [
{
"version": "v1",
"created": "Mon, 10 Jul 2000 15:59:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Herman",
"Ted",
""
]
] |
cs/0007016 | Francis Wolinski | Mathieu Stricker, Frantz Vichot, Gerard Dreyfus, Francis Wolinski | Two Steps Feature Selection and Neural Network Classification for the
TREC-8 Routing | 5 pages, 1 figure, Eighth International Text REtrieval Conference
(TREC-8) | null | null | null | cs.CL cs.AI | null | For the TREC-8 routing, one specific filter is built for each topic. Each
filter is a classifier trained to recognize the documents that are relevant to
the topic. When presented with a document, each classifier estimates the
probability for the document to be relevant to the topic for which it has been
trained. Since the procedure for building a filter is topic-independent, the
system is fully automatic.
By making use of a sample of documents that have previously been evaluated as
relevant or not relevant to a particular topic, a term selection is performed,
and a neural network is trained. Each document is represented by a vector of
frequencies of a list of selected terms. This list depends on the topic to be
filtered; it is constructed in two steps. The first step defines the
characteristic words used in the relevant documents of the corpus; the second
one chooses, among the previous list, the most discriminant ones. The length of
the vector is optimized automatically for each topic. At the end of the term
selection, a vector of typically 25 words is defined for the topic, so that
each document which has to be processed is represented by a vector of term
frequencies.
This vector is subsequently input to a classifier that is trained from the
same sample. After training, the classifier estimates for each document of a
test set its probability of being relevant; for submission to TREC, the top
1000 documents are ranked in order of decreasing relevance.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2000 13:21:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stricker",
"Mathieu",
""
],
[
"Vichot",
"Frantz",
""
],
[
"Dreyfus",
"Gerard",
""
],
[
"Wolinski",
"Francis",
""
]
] |
cs/0007017 | Ralf Schweiger | R. Schweiger (University Giessen), S. Hoelzer (Giessen), J. Dudeck
(Giessen) | Fuzzy data: XML may handle it | 15 pages, 6 figures | null | null | null | cs.IR | null | Data modeling is one of the most difficult tasks in application engineering.
The engineer must be aware of the use cases and the required application
services and at a certain point of time he has to fix the data model which
forms the base for the application services. However, once the data model has
been fixed it is difficult to consider changing needs. This might be a problem
in specific domains, which are as dynamic as the healthcare domain. With fuzzy
data we address all those data that are difficult to organize in a single
database. In this paper we discuss a gradual and pragmatic approach that uses
the XML technology to conquer more model flexibility. XML may provide the clue
between unstructured text data and structured database solutions and shift the
paradigm from "organizing the data along a given model" towards "organizing the
data along user requirements".
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2000 07:58:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schweiger",
"R.",
"",
"University Giessen"
],
[
"Hoelzer",
"S.",
"",
"Giessen"
],
[
"Dudeck",
"J.",
"",
"Giessen"
]
] |
cs/0007018 | Jakub Zavrel | Jakub Zavrel and Walter Daelemans | Bootstrapping a Tagged Corpus through Combination of Existing
Heterogeneous Taggers | 4 pages | Proceedings of the 2nd International Conference on Language
Resources and Evaluation (LREC 2000), pp. 17--20 | null | null | cs.CL | null | This paper describes a new method, Combi-bootstrap, to exploit existing
taggers and lexical resources for the annotation of corpora with new tagsets.
Combi-bootstrap uses existing resources as features for a second level machine
learning module, that is trained to make the mapping to the new tagset on a
very small sample of annotated corpus material. Experiments show that
Combi-bootstrap: i) can integrate a wide variety of existing resources, and ii)
achieves much higher accuracy (up to 44.7 % error reduction) than both the best
single tagger and an ensemble tagger constructed out of the same small training
sample.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2000 12:46:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zavrel",
"Jakub",
""
],
[
"Daelemans",
"Walter",
""
]
] |
cs/0007019 | Joseph O'Rourke | Erik D. Demaine, Martin L. Demaine, Anna Lubiw, Joseph O'Rourke | Examples, Counterexamples, and Enumeration Results for Foldings and
Unfoldings between Polygons and Polytopes | 54 pages, 33 figures | null | null | Smith Technical Report 069 | cs.CG cs.DM | null | We investigate how to make the surface of a convex polyhedron (a polytope) by
folding up a polygon and gluing its perimeter shut, and the reverse process of
cutting open a polytope and unfolding it to a polygon. We explore basic
enumeration questions in both directions: Given a polygon, how many foldings
are there? Given a polytope, how many unfoldings are there to simple polygons?
Throughout we give special attention to convex polygons, and to regular
polygons. We show that every convex polygon folds to an infinite number of
distinct polytopes, but that their number of combinatorially distinct gluings
is polynomial. There are, however, simple polygons with an exponential number
of distinct gluings.
In the reverse direction, we show that there are polytopes with an
exponential number of distinct cuttings that lead to simple unfoldings. We
establish necessary conditions for a polytope to have convex unfoldings,
implying, for example, that among the Platonic solids, only the tetrahedron has
a convex unfolding. We provide an inventory of the polytopes that may unfold to
regular polygons, showing that, for n>6, there is essentially only one class of
such polytopes.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2000 14:56:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Lubiw",
"Anna",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0007020 | Robert Givan | Robert Givan and David McAllester | Polynomial-time Computation via Local Inference Relations | 22 pages. Appeared in Knowledge Representation and Reasoning,1993.
Submitted to ACM Transactions on Computational Logic Correction: original
conference appearance was 1992, not 1993 | null | null | null | cs.LO cs.AI cs.PL | null | We consider the concept of a local set of inference rules. A local rule set
can be automatically transformed into a rule set for which bottom-up evaluation
terminates in polynomial time. The local-rule-set transformation gives
polynomial-time evaluation strategies for a large variety of rule sets that
cannot be given terminating evaluation strategies by any other known automatic
technique. This paper discusses three new results. First, it is shown that
every polynomial-time predicate can be defined by an (unstratified) local rule
set. Second, a new machine-recognizable subclass of the local rule sets is
identified. Finally we show that locality, as a property of rule sets, is
undecidable in general.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2000 17:19:43 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Jul 2000 15:40:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Givan",
"Robert",
""
],
[
"McAllester",
"David",
""
]
] |
cs/0007021 | Joseph O'Rourke | Erik D. Demaine, Martin L. Demaine, Joseph O'Rourke | PushPush and Push-1 are NP-hard in 2D | 10 pages, 11 figures. Corrects an error in the conference version:
Proc. of the 12th Canadian Conference on Computational Geometry, August 2000,
pp. 211-219 | null | null | null | cs.CG cs.DM | null | We prove that two pushing-blocks puzzles are intractable in 2D. One of our
constructions improves an earlier result that established intractability in 3D
[OS99] for a puzzle inspired by the game PushPush. The second construction
answers a question we raised in [DDO00] for a variant we call Push-1. Both
puzzles consist of unit square blocks on an integer lattice; all blocks are
movable. An agent may push blocks (but never pull them) in attempting to move
between given start and goal positions. In the PushPush version, the agent can
only push one block at a time, and moreover when a block is pushed it slides
the maximal extent of its free range. In the Push-1 version, the agent can only
push one block one square at a time, the minimal extent---one square. Both
NP-hardness proofs are by reduction from SAT, and rely on a common
construction.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2000 17:34:58 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Sep 2000 14:57:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0007022 | Steven Bird | Steven Bird, David Day, John Garofolo, John Henderson, Christophe
Laprun, Mark Liberman | ATLAS: A flexible and extensible architecture for linguistic annotation | 8 pages, 9 figures | Proceedings of the Second International Conference on Language
Resources and Evaluation, pp. 1699-1706, Paris: European Language Resources
Association, 2000 | null | null | cs.CL | null | We describe a formal model for annotating linguistic artifacts, from which we
derive an application programming interface (API) to a suite of tools for
manipulating these annotations. The abstract logical model provides for a range
of storage formats and promotes the reuse of tools that interact through this
API. We focus first on ``Annotation Graphs,'' a graph model for annotations on
linear signals (such as text and speech) indexed by intervals, for which
efficient database storage and querying techniques are applicable. We note how
a wide range of existing annotated corpora can be mapped to this annotation
graph model. This model is then generalized to encompass a wider variety of
linguistic ``signals,'' including both naturally occuring phenomena (as
recorded in images, video, multi-modal interactions, etc.), as well as the
derived resources that are increasingly important to the engineering of natural
language processing systems (such as word lists, dictionaries, aligned
bilingual corpora, etc.). We conclude with a review of the current efforts
towards implementing key pieces of this architecture.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2000 18:26:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
],
[
"Day",
"David",
""
],
[
"Garofolo",
"John",
""
],
[
"Henderson",
"John",
""
],
[
"Laprun",
"Christophe",
""
],
[
"Liberman",
"Mark",
""
]
] |
cs/0007023 | Steven Bird | Steven Bird, Peter Buneman and Wang-Chiew Tan | Towards a query language for annotation graphs | 8 pages, 10 figures | Proceedings of the Second International Conference on Language
Resources and Evaluation, pp. 807-814, Paris: European Language Resources
Association, 2000 | null | null | cs.CL cs.DB | null | The multidimensional, heterogeneous, and temporal nature of speech databases
raises interesting challenges for representation and query. Recently,
annotation graphs have been proposed as a general-purpose representational
framework for speech databases. Typical queries on annotation graphs require
path expressions similar to those used in semistructured query languages.
However, the underlying model is rather different from the customary graph
models for semistructured data: the graph is acyclic and unrooted, and both
temporal and inclusion relationships are important. We develop a query language
and describe optimization techniques for an underlying relational
representation.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2000 18:40:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
],
[
"Buneman",
"Peter",
""
],
[
"Tan",
"Wang-Chiew",
""
]
] |
cs/0007024 | Steven Bird | David Graff and Steven Bird | Many uses, many annotations for large speech corpora: Switchboard and
TDT as case studies | 7 pages, 2 figures | Proceedings of the Second International Conference on Language
Resources and Evaluation, pp. 427-433, Paris: European Language Resources
Association, 2000 | null | null | cs.CL | null | This paper discusses the challenges that arise when large speech corpora
receive an ever-broadening range of diverse and distinct annotations. Two case
studies of this process are presented: the Switchboard Corpus of telephone
conversations and the TDT2 corpus of broadcast news. Switchboard has undergone
two independent transcriptions and various types of additional annotation, all
carried out as separate projects that were dispersed both geographically and
chronologically. The TDT2 corpus has also received a variety of annotations,
but all directly created or managed by a core group. In both cases, issues
arise involving the propagation of repairs, consistency of references, and the
ability to integrate annotations having different formats and levels of detail.
We describe a general framework whereby these issues can be addressed
successfully.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2000 18:51:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Graff",
"David",
""
],
[
"Bird",
"Steven",
""
]
] |
cs/0007025 | Lane A. Hemaspaandra | Christian Glasser and Lane A. Hemaspaandra | A Moment of Perfect Clarity I: The Parallel Census Technique | 8 pages | null | null | null | cs.CC | null | We discuss the history and uses of the parallel census technique---an elegant
tool in the study of certain computational objects having polynomially bounded
census functions. A sequel will discuss advances (including Cai, Naik, and
Sivakumar [CNS95] and Glasser [Gla00]), some related to the parallel census
technique and some due to other approaches, in the complexity-class collapses
that follow if NP has sparse hard sets under reductions weaker than (full)
truth-table reductions.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2000 22:14:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Glasser",
"Christian",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
cs/0007026 | Ron Kohavi | Suhail Ansari, Ron Kohavi, Llew Mason, and Zijian Zheng | Integrating E-Commerce and Data Mining: Architecture and Challenges | KDD workshop: WebKDD 2000 | WEBKDD'2000 workshop: Web Mining for E-Commerce -- Challenges and
Opportunities | null | null | cs.LG cs.AI cs.CV cs.DB | null | We show that the e-commerce domain can provide all the right ingredients for
successful data mining and claim that it is a killer domain for data mining. We
describe an integrated architecture, based on our expe-rience at Blue Martini
Software, for supporting this integration. The architecture can dramatically
reduce the pre-processing, cleaning, and data understanding effort often
documented to take 80% of the time in knowledge discovery projects. We
emphasize the need for data collection at the application server layer (not the
web server) in order to support logging of data and metadata that is essential
to the discovery process. We describe the data transformation bridges required
from the transaction processing systems and customer event streams (e.g.,
clickstreams) to the data warehouse. We detail the mining workbench, which
needs to provide multiple views of the data through reporting, data mining
algorithms, visualization, and OLAP. We con-clude with a set of challenges.
| [
{
"version": "v1",
"created": "Fri, 14 Jul 2000 00:33:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ansari",
"Suhail",
""
],
[
"Kohavi",
"Ron",
""
],
[
"Mason",
"Llew",
""
],
[
"Zheng",
"Zijian",
""
]
] |
cs/0007027 | Michael Frumkin | Michael A. Frumkin, Rob F. Van der Wijngaart | Efficient cache use for stencil operations on structured discretization
grids | tex .tar.gz file, including ps file, 16 pagest, 5 figures, 2
Appendicies | null | null | null | cs.PF cs.CC | null | We derive tight bounds on cache misses for evaluation of explicit stencil
operators on structured grids. Our lower bound is based on the isoperimetrical
property of the discrete octahedron. Our upper bound is based on good surface
to volume ratio of a parallelepiped spanned by a reduced basis of the inter-
ference lattice of a grid. Measurements show that our algorithm typically
reduces the number of cache misses by factor of three relative to a compiler
optimized code. We show that stencil calculations on grids whose interference
lattice have a short vector feature abnormally high numbers of cache misses. We
call such grids unfavorable and suggest to avoid these in computations by
appropriate padding. By direct measurements on MIPS R10000 we show a good
correlation of abnormally high cache misses and unfavorable three-dimensional
grids.
| [
{
"version": "v1",
"created": "Fri, 14 Jul 2000 17:44:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Frumkin",
"Michael A.",
""
],
[
"Van der Wijngaart",
"Rob F.",
""
]
] |
cs/0007028 | Po-Han Lin | Po-Han Lin | Base Encryption: Dynamic algorithms, Keys, and Symbol Set | html page | null | null | null | cs.CR cs.CC | null | All the current modern encryption algorithms utilize fixed symbols for
plaintext and cyphertext. What I mean by fixed is that there is a set and
limited number of symbols to represent the characters, numbers, and
punctuations. In addition, they are usually the same (the plaintext symbols
have the same and equivalent counterpart in the cyphertext symbols). Almost all
the encryption algorithms rely on a predefined keyspace and length for the
encryption/decription keys, and it is usually fixed (number of bits). In
addition, the algorithms used by the encryptions are static. There is a
predefined number of operatiors, and a predefined order (loops included) of
operations. The algorithm stays the same, and the plaintext and cyphertext
along with the key are churned through this cypherblock.
Base Encryption does the opposite: It utilizes the novel concepts of base
conversion, symbol remapping, and dynamic algorithms (dynamic operators and
dynamic operations). Base Encryption solves the weakness in todays encryption
schemes, namely... Fixed symbols (base) Fixed keylengths Fixed algorithms
(fixed number of operations and operators)
Unique features... Immune from plain-text-attacks. Immune from
brute-force-attacks. Can utilize throwaway algorithms (as opposed to throw away
keys). Plug-And-Play engine (other cyphers can be augmentated to it)
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2000 16:44:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lin",
"Po-Han",
""
]
] |
cs/0007029 | Gabriel Istrate | Gabriel Istrate | Dimension-Dependent behavior in the satisfability of random k-Horn
formulae | null | null | null | null | cs.DS | null | We determine the asymptotical satisfiability probability of a random
at-most-k-Horn formula, via a probabilistic analysis of a simple version,
called PUR, of positive unit resolution. We show that for k=k(n)->oo the
problem can be ``reduced'' to the case k(n)=n, that was solved in
cs.DS/9912001. On the other hand, in the case k= a constant the behavior of PUR
is modeled by a simple queuing chain, leading to a closed-form solution when
k=2. Our analysis predicts an ``easy-hard-easy'' pattern in this latter case.
Under a rescaled parameter, the graphs of satisfaction probability
corresponding to finite values of k converge to the one for the uniform case, a
``dimension-dependent behavior'' similar to the one found experimentally by
Kirkpatrick and Selman (Science'94) for k-SAT. The phenomenon is qualitatively
explained by a threshold property for the number of iterations of PUR makes on
random satisfiable Horn formulas.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2000 21:50:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
] |
cs/0007031 | Victor Kromer | Victor Kromer | Parameter-free Model of Rank Polysemantic Distribution | 3 pages, no figures | Proceedings of the 4th conference of the International
Quantitative Linguistics Association (QUALICO 2000). Prague, August 24-26,
2000. P. 21-22.The full version (in Russian) is available in Web Journal
FCCL. See URL http://fccl.ksu.ru/fcclpap.htm | null | null | cs.CL | null | A model of rank polysemantic distribution with a minimal number of fitting
parameters is offered. In an ideal case a parameter-free description of the
dependence on the basis of one or several immediate features of the
distribution is possible.
| [
{
"version": "v1",
"created": "Fri, 21 Jul 2000 06:07:31 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Jul 2000 04:17:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kromer",
"Victor",
""
]
] |
cs/0007032 | Konstantinos Georgatos | Konstantinos Georgatos | Knowledge on Treelike Spaces | 31 pages | Studia Logica, 1(59), 1997 | null | null | cs.LO cs.AI | null | This paper presents a bimodal logic for reasoning about knowledge during
knowledge acquisition. One of the modalities represents (effort during)
non-deterministic time and the other represents knowledge. The semantics of
this logic are tree-like spaces which are a generalization of semantics used
for modeling branching time and historical necessity. A finite system of axiom
schemes is shown to be canonically complete for the formentioned spaces. A
characterization of the satisfaction relation implies the small model property
and decidability for this system.
| [
{
"version": "v1",
"created": "Fri, 21 Jul 2000 09:52:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Georgatos",
"Konstantinos",
""
]
] |
cs/0007033 | Konstantinos Georgatos | Konstantinos Georgatos | To Preference via Entrenchment | 16 pages | Annals Of Pure And Applied Logic, (96)1-3, pages 141-155, 1999 | null | null | cs.LO cs.AI | null | We introduce a simple generalization of Gardenfors and Makinson's epistemic
entrenchment called partial entrenchment. We show that preferential inference
can be generated as the sceptical counterpart of an inference mechanism defined
directly on partial entrenchment.
| [
{
"version": "v1",
"created": "Fri, 21 Jul 2000 10:16:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Georgatos",
"Konstantinos",
""
]
] |
cs/0007034 | Png Ipl | Ivan Png | The Competitiveness of On-Line vis-a-vis Conventional Retailing: A
Preliminary Study | 11th NEC Research Symposium | null | null | null | cs.OH | null | Previous research has directly studied whether on-line retailing is more
competitive than conventional retail markets. The evidence from books and music
CDs is mixed. Here, I use an indirect approach to compare the competitiveness
of on-line with conventional markets. Focusing on the retail market for books,
I identify a peculiarity in the pricing of bestsellers relative to other
titles. Supposing that competitive barriers are lower in on-line retailing, I
analyze how the lower barriers would affect the relative pricing of
bestsellers. The empirical data indicates that on-line retailing is more
competitive than conventional retailing.
| [
{
"version": "v1",
"created": "Tue, 25 Jul 2000 05:54:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Png",
"Ivan",
""
]
] |
cs/0007035 | Llu\'is Padr\'o | J. Daude, L. Padro & G. Rigau | Mapping WordNets Using Structural Information | 8 pages, uses epsfig. To appear in ACL'2000 proceedings | 38th Anual Meeting of the Association for Computational
Linguistics (ACL'2000). Hong Kong, October 2000. | null | null | cs.CL | null | We present a robust approach for linking already existing lexical/semantic
hierarchies. We used a constraint satisfaction algorithm (relaxation labeling)
to select --among a set of candidates-- the node in a target taxonomy that
bests matches each node in a source taxonomy. In particular, we use it to map
the nominal part of WordNet 1.5 onto WordNet 1.6, with a very high precision
and a very low remaining ambiguity.
| [
{
"version": "v1",
"created": "Tue, 25 Jul 2000 17:20:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daude",
"J.",
""
],
[
"Padro",
"L.",
""
],
[
"Rigau",
"G.",
""
]
] |
cs/0007036 | Rui Vilela Mendes | J. F. Martins (EST-IPS, Setubal), J. A. Dente (IST, Lisboa), A. J.
Pires (EST-IPS, Setubal) and R. Vilela Mendes (GFM, UL, Lisboa) | Language identification of controlled systems: Modelling, control and
anomaly detection | 27 pages Latex, 18 figures | IEEE Trans. in Systems, Man and Cybernetics 31 (2001) 234 | null | null | cs.CL | null | Formal language techniques have been used in the past to study autonomous
dynamical systems. However, for controlled systems, new features are needed to
distinguish between information generated by the system and input control. We
show how the modelling framework for controlled dynamical systems leads
naturally to a formulation in terms of context-dependent grammars. A learning
algorithm is proposed for on-line generation of the grammar productions, this
formulation being then used for modelling, control and anomaly detection.
Practical applications are described for electromechanical drives. Grammatical
interpolation techniques yield accurate results and the pattern detection
capabilities of the language-based formulation makes it a promising technique
for the early detection of anomalies or faulty behaviour.
| [
{
"version": "v1",
"created": "Tue, 25 Jul 2000 17:40:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Martins",
"J. F.",
"",
"EST-IPS, Setubal"
],
[
"Dente",
"J. A.",
"",
"IST, Lisboa"
],
[
"Pires",
"A. J.",
"",
"EST-IPS, Setubal"
],
[
"Mendes",
"R. Vilela",
"",
"GFM, UL, Lisboa"
]
] |
cs/0007037 | Konstantinos Georgatos | Konstantinos Georgatos | Knowledge Theoretic Properties of Topological Spaces | 14 pages | In Knowledge Representation and Uncertainty. M. Masuch and L.
Polos, Eds. Lecture Notes in Artificial Intelligence, vol. 808, pages
147-159, Springer-Verlag, 1994 | null | null | cs.LO | null | We study the topological models of a logic of knowledge for topological
reasoning, introduced by Larry Moss and Rohit Parikh. Among our results is a
solution of a conjecture by the formentioned authors, finite satisfiability
property and decidability for the theory of topological models.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2000 18:36:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Georgatos",
"Konstantinos",
""
]
] |
cs/0007038 | Konstantinos Georgatos | Konstantinos Georgatos | Modal Logics for Topological Spaces | 25 pages, extened abstract of PHD Dissertation | null | null | null | cs.LO cs.AI | null | In this thesis we shall present two logical systems, MP and MP, for the
purpose of reasoning about knowledge and effort. These logical systems will be
interpreted in a spatial context and therefore, the abstract concepts of
knowledge and effort will be defined by concrete mathematical concepts.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2000 18:41:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Georgatos",
"Konstantinos",
""
]
] |
cs/0007039 | Konstantinos Georgatos | Konstantinos Georgatos | Ordering-based Representations of Rational Inference | 26 pages, appeared in conference proceedings, contains proofs | In the Proceedings of the European Workshop on Logics in AI (JELIA
'96). J.J. Alferes, L.M. Pereira and E. Orlowska, Eds. Lecture Notes in
Artificial Intelligence, vol. 1126, pages 176-191, Springer-Verlag, 1996 | null | null | cs.LO cs.AI | null | Rational inference relations were introduced by Lehmann and Magidor as the
ideal systems for drawing conclusions from a conditional base. However, there
has been no simple characterization of these relations, other than its original
representation by preferential models. In this paper, we shall characterize
them with a class of total preorders of formulas by improving and extending
Gardenfors and Makinson's results for expectation inference relations. A second
representation is application-oriented and is obtained by considering a class
of consequence operators that grade sets of defaults according to our reliance
on them. The finitary fragment of this class of consequence operators has been
employed by recent default logic formalisms based on maxiconsistency.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2000 18:58:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Georgatos",
"Konstantinos",
""
]
] |
cs/0007040 | Konstantinos Georgatos | Konstantinos Georgatos | Entrenchment Relations: A Uniform Approach to Nonmonotonicity | 22 pages, a paper in preliminary form that appeared later in
conference proceedings | In the Proceedings of the International Joint Conference on
Qualitative and Quantitative Practical Reasoning (ESCQARU/FAPR 97), Lecture
Notes in Artificial Intelligence, vol. 1244, pages 282-297, Springer-Verlag,
1997 | null | null | cs.LO cs.AI | null | We show that Gabbay's nonmonotonic consequence relations can be reduced to a
new family of relations, called entrenchment relations. Entrenchment relations
provide a direct generalization of epistemic entrenchment and expectation
ordering introduced by Gardenfors and Makinson for the study of belief revision
and expectation inference, respectively.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2000 19:20:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Georgatos",
"Konstantinos",
""
]
] |
cs/0007041 | Konstantinos Georgatos | Gianni Amati, Konstantinos Georgatos | Relevance as Deduction: A Logical View of Information Retrieval | 6 pages, Abstract | In F. Crestani and M. Lalmas, editors, Proceedings of the Second
Workshop on Information Retrieval, Uncertainty and Logic WIRUL'96, pages
21--26. University of Glasgow, Glasgow, Scotland, 1996 | null | TR-1996-29 | cs.IR cs.LO | null | The problem of Information Retrieval is, given a set of documents D and a
query q, providing an algorithm for retrieving all documents in D relevant to
q. However, retrieval should depend and be updated whenever the user is able to
provide as an input a preferred set of relevant documents; this process is
known as em relevance feedback. Recent work in IR has been paying great
attention to models which employ a logical approach; the advantage being that
one can have a simple computable characterization of retrieval on the basis of
a pure logical analysis of retrieval. Most of the logical models make use of
probabilities or similar belief functions in order to introduce the inductive
component whereby uncertainty is treated. Their general paradigm is the
following: em find the nature of conditional $d\imp q$ and then define a
probability on the top of it. We just reverse this point of view; first use the
numerical information, frequencies or probabilities, then define your own
logical consequence. More generally, we claim that retrieval is a form of
deduction. We introduce a simple but powerful logical framework of relevance
feedback, derived from the well founded area of nonmonotonic logic. This
description can help us evaluate, describe and compare from a theoretical point
of view previous approaches based on conditionals or probabilities.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2000 19:34:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amati",
"Gianni",
""
],
[
"Georgatos",
"Konstantinos",
""
]
] |
cs/0007042 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 39 | 4 pages, 2 figures. To appear in SIGACT News and in Int. J. Comp.
Geom. Appl | SIGACT News 31(3): 47-49 (2000) | null | null | cs.CG cs.DM | null | The resolution of a decades-old open problem is described: polygonal chains
cannot lock in the plane.
| [
{
"version": "v1",
"created": "Sat, 29 Jul 2000 14:54:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0007043 | Suman Kumar Nath | Suman Kumar Nath, Rezaul Alam Chowdhury, M. Kaykobad | Min-Max Fine Heaps | 6 pages, pdf file | null | null | null | cs.DS | null | In this paper we present a new data structure for double ended priority
queue, called min-max fine heap, which combines the techniques used in fine
heap and traditional min-max heap. The standard operations on this proposed
structure are also presented, and their analysis indicates that the new
structure outperforms the traditional one.
| [
{
"version": "v1",
"created": "Mon, 31 Jul 2000 00:13:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nath",
"Suman Kumar",
""
],
[
"Chowdhury",
"Rezaul Alam",
""
],
[
"Kaykobad",
"M.",
""
]
] |
cs/0007044 | Avigdor Gal | Avigdor Gal and Jonathan Eckstein | Managing Periodically Updated Data in Relational Databases: A Stochastic
Modeling Approach | null | null | null | RRR-37-2000 | cs.DB | null | Recent trends in information management involve the periodic transcription of
data onto secondary devices in a networked environment, and the proper
scheduling of these transcriptions is critical for efficient data management.
To assist in the scheduling process, we are interested in modeling the
reduction of consistency over time between a relation and its replica, termed
obsolescence of data. The modeling is based on techniques from the field of
stochastic processes, and provides several stochastic models for content
evolution in the base relations of a database, taking referential integrity
constraints into account. These models are general enough to accommodate most
of the common scenarios in databases, including batch insertions and life spans
both with and without memory. As an initial "proof of concept" of the
applicability of our approach, we validate the insertion portion of our model
framework via experiments with real data feeds. We also discuss a set of
transcription protocols which make use of the proposed stochastic model.
| [
{
"version": "v1",
"created": "Mon, 31 Jul 2000 20:15:08 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jun 2001 08:13:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gal",
"Avigdor",
""
],
[
"Eckstein",
"Jonathan",
""
]
] |
cs/0008001 | Randal E. Bryant | Randal E. Bryant, Miroslav N. Velev | Boolean Satisfiability with Transitivity Constraints | Submitted to ACM Transactions on Computational Logic | null | null | null | cs.LO | null | We consider a variant of the Boolean satisfiability problem where a subset E
of the propositional variables appearing in formula Fsat encode a symmetric,
transitive, binary relation over N elements. Each of these relational
variables, e[i,j], for 1 <= i < j <= N, expresses whether or not the relation
holds between elements i and j. The task is to either find a satisfying
assignment to Fsat that also satisfies all transitivity constraints over the
relational variables (e.g., e[1,2] & e[2,3] ==> e[1,3]), or to prove that no
such assignment exists. Solving this satisfiability problem is the final and
most difficult step in our decision procedure for a logic of equality with
uninterpreted functions. This procedure forms the core of our tool for
verifying pipelined microprocessors.
To use a conventional Boolean satisfiability checker, we augment the set of
clauses expressing Fsat with clauses expressing the transitivity constraints.
We consider methods to reduce the number of such clauses based on the sparse
structure of the relational variables.
To use Ordered Binary Decision Diagrams (OBDDs), we show that for some sets
E, the OBDD representation of the transitivity constraints has exponential size
for all possible variable orderings. By considering only those relational
variables that occur in the OBDD representation of Fsat, our experiments show
that we can readily construct an OBDD representation of the relevant
transitivity constraints and thus solve the constrained satisfiability problem.
| [
{
"version": "v1",
"created": "Tue, 1 Aug 2000 13:51:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bryant",
"Randal E.",
""
],
[
"Velev",
"Miroslav N.",
""
]
] |
cs/0008003 | Stephan Busemann | Stephan Busemann | Interfacing Constraint-Based Grammars and Generation Algorithms | 8 pages, uses colacl.sty | Proc. Workshop on Analysis for Generation, 1st International
Natural Language Generation Conference, Mitzpe Ramon, Israel, June 12, 2000.
pp. 14-21 | null | null | cs.CL | null | Constraint-based grammars can, in principle, serve as the major linguistic
knowledge source for both parsing and generation. Surface generation starts
from input semantics representations that may vary across grammars. For many
declarative grammars, the concept of derivation implicitly built in is that of
parsing. They may thus not be interpretable by a generation algorithm. We show
that linguistically plausible semantic analyses can cause severe problems for
semantic-head-driven approaches for generation (SHDG). We use SeReal, a variant
of SHDG and the DISCO grammar of German as our source of examples. We propose a
new, general approach that explicitly accounts for the interface between the
grammar and the generation algorithm by adding a control-oriented layer to the
linguistic knowledge base that reorganizes the semantics in a way suitable for
generation.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2000 16:06:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Busemann",
"Stephan",
""
]
] |
cs/0008004 | Alexander Yeh | Alexander Yeh | Comparing two trainable grammatical relations finders | 5 pages, uses colacl.sty | 18th International Conference on Computational Linguistics (COLING
2000), pages 1146-1150, Saarbruecken, Germany, July, 2000 | null | null | cs.CL | null | Grammatical relationships (GRs) form an important level of natural language
processing, but different sets of GRs are useful for different purposes.
Therefore, one may often only have time to obtain a small training corpus with
the desired GR annotations. On such a small training corpus, we compare two
systems. They use different learning techniques, but we find that this
difference by itself only has a minor effect. A larger factor is that in
English, a different GR length measure appears better suited for finding simple
argument GRs than for finding modifier GRs. We also find that partitioning the
data may help memory-based learning.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2000 22:42:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yeh",
"Alexander",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.