id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0005004
Joseph Y. Halpern
Joseph Y. Halpern
A response to the commentaries on CoRR
This is a response to the commentaries on "CoRR: A Computing Research Repository" (http://xxx.lanl.gov/abs/cs.DL/0005003). The original article, the Commentaries,and my response, will appear in the ACM Journal of Computer Documentation
null
null
null
cs.DL cs.CY
null
This is a response to the commentaries on "CoRR: A Computing Research Repository".
[ { "version": "v1", "created": "Thu, 4 May 2000 00:06:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
cs/0005005
Davis King
Davis King, Jarek Rossignac, and Andrzej Szymczak
Connectivity Compression for Irregular Quadrilateral Meshes
null
null
null
GVU Tech Report GIT-GVU-99-36
cs.GR cs.CG cs.DS
null
Applications that require Internet access to remote 3D datasets are often limited by the storage costs of 3D models. Several compression methods are available to address these limits for objects represented by triangle meshes. Many CAD and VRML models, however, are represented as quadrilateral meshes or mixed triangle/quadrilateral meshes, and these models may also require compression. We present an algorithm for encoding the connectivity of such quadrilateral meshes, and we demonstrate that by preserving and exploiting the original quad structure, our approach achieves encodings 30 - 80% smaller than an approach based on randomly splitting quads into triangles. We present both a code with a proven worst-case cost of 3 bits per vertex (or 2.75 bits per vertex for meshes without valence-two vertices) and entropy-coding results for typical meshes ranging from 0.3 to 0.9 bits per vertex, depending on the regularity of the mesh. Our method may be implemented by a rule for a particular splitting of quads into triangles and by using the compression and decompression algorithms introduced in [Rossignac99] and [Rossignac&Szymczak99]. We also present extensions to the algorithm to compress meshes with holes and handles and meshes containing triangles and other polygons as well as quads.
[ { "version": "v1", "created": "Thu, 4 May 2000 18:15:08 GMT" } ]
2007-05-23T00:00:00
[ [ "King", "Davis", "" ], [ "Rossignac", "Jarek", "" ], [ "Szymczak", "Andrzej", "" ] ]
cs/0005006
Ted Pedersen
Ted Pedersen (University of Minnesota Duluth)
A Simple Approach to Building Ensembles of Naive Bayesian Classifiers for Word Sense Disambiguation
7 pages, Latex, uses colnaacl.sty. Appears in Proceedings of NAACL, pages 63-69, May 2000, Seattle, WA
null
null
null
cs.CL
null
This paper presents a corpus-based approach to word sense disambiguation that builds an ensemble of Naive Bayesian classifiers, each of which is based on lexical features that represent co--occurring words in varying sized windows of context. Despite the simplicity of this approach, empirical results disambiguating the widely studied nouns line and interest show that such an ensemble achieves accuracy rivaling the best previously published results.
[ { "version": "v1", "created": "Sun, 7 May 2000 00:15:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Pedersen", "Ted", "", "University of Minnesota Duluth" ] ]
cs/0005007
Geoffrey McKim
Rob Kling, Geoffrey McKim, Joanna Fortuna, Adam King
Scientific Collaboratories as Socio-Technical Interaction Networks: A Theoretical Approach
null
null
null
null
cs.CY
null
Collaboratories refer to laboratories where scientists can work together while they are in distant locations from each other and from key equipment. They have captured the interest both of CSCW researchers and of science funders who wish to optimize the use of rare scientific equipment and expertise. We examine the kind of CSCW conceptions that help us best understand the character of working relationships in these scientific collaboratories. Our model, inspired by actor-network theory, considers technologies as Socio-technical Interaction Networks (STINs). This model provides a rich understanding of the scientific collaboratories, and also a more complete understanding of the conditions and activities that support collaborative work in them. We illustrate the significance of STIN models with several cases drawn from the fields of high energy physics and materials science.
[ { "version": "v1", "created": "Mon, 8 May 2000 01:49:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Kling", "Rob", "" ], [ "McKim", "Geoffrey", "" ], [ "Fortuna", "Joanna", "" ], [ "King", "Adam", "" ] ]
cs/0005008
Krzysztof R. Apt
Krzysztof R. Apt
A Denotational Semantics for First-Order Logic
17 pages. Invited talk at the Computational Logic Conference (CL 2000). To appear in Springer-Verlag Lecture Notes in Computer Science
null
null
null
cs.PL cs.AI
null
In Apt and Bezem [AB99] (see cs.LO/9811017) we provided a computational interpretation of first-order formulas over arbitrary interpretations. Here we complement this work by introducing a denotational semantics for first-order logic. Additionally, by allowing an assignment of a non-ground term to a variable we introduce in this framework logical variables. The semantics combines a number of well-known ideas from the areas of semantics of imperative programming languages and logic programming. In the resulting computational view conjunction corresponds to sequential composition, disjunction to ``don't know'' nondeterminism, existential quantification to declaration of a local variable, and negation to the ``negation as finite failure'' rule. The soundness result shows correctness of the semantics with respect to the notion of truth. The proof resembles in some aspects the proof of the soundness of the SLDNF-resolution.
[ { "version": "v1", "created": "Mon, 8 May 2000 12:23:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/0005009
Stephan Tobies
Stephan Tobies
PSPACE Reasoning for Graded Modal Logics
null
Journal of Logic and Computation, Vol. 11 No. 1, pp 85-106 2001
null
null
cs.LO cs.AI cs.CC cs.DS
null
We present a PSPACE algorithm that decides satisfiability of the graded modal logic Gr(K_R)---a natural extension of propositional modal logic K_R by counting expressions---which plays an important role in the area of knowledge representation. The algorithm employs a tableaux approach and is the first known algorithm which meets the lower bound for the complexity of the problem. Thus, we exactly fix the complexity of the problem and refute an ExpTime-hardness conjecture. We extend the results to the logic Gr(K_(R \cap I)), which augments Gr(K_R) with inverse relations and intersection of accessibility relations. This establishes a kind of ``theoretical benchmark'' that all algorithmic approaches can be measured against.
[ { "version": "v1", "created": "Mon, 8 May 2000 14:51:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Tobies", "Stephan", "" ] ]
cs/0005010
Patrik Simons
Patrik Simons
Extending and Implementing the Stable Model Semantics
109 pages, 30 figures, dissertation for the degree of Doctor of Technology
null
null
HUT-TCS-A58
cs.LO cs.AI
null
An algorithm for computing the stable model semantics of logic programs is developed. It is shown that one can extend the semantics and the algorithm to handle new and more expressive types of rules. Emphasis is placed on the use of efficient implementation techniques. In particular, an implementation of lookahead that safely avoids testing every literal for failure and that makes the use of lookahead feasible is presented. In addition, a good heuristic is derived from the principle that the search space should be minimized. Due to the lack of competitive algorithms and implementations for the computation of stable models, the system is compared with three satisfiability solvers. This shows that the heuristic can be improved by breaking ties, but leaves open the question of how to break them. It also demonstrates that the more expressive rules of the stable model semantics make the semantics clearly preferable over propositional logic when a problem has a more compact logic program representation. Conjunctive normal form representations are never more compact than logic program ones.
[ { "version": "v1", "created": "Mon, 8 May 2000 18:26:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Simons", "Patrik", "" ] ]
cs/0005011
Ke Xu
Ke Xu and Wei Li
An Average Analysis of Backtracking on Random Constraint Satisfaction Problems
20 pages, submitted to Annals of Mathematics and Artificial Intelligence
Annals of Mathematics and Artificial Intelligence, 33:21-37, 2001.
null
null
cs.CC cs.AI
null
In this paper we propose a random CSP model, called Model GB, which is a natural generalization of standard Model B. It is proved that Model GB in which each constraint is easy to satisfy exhibits non-trivial behaviour (not trivially satisfiable or unsatisfiable) as the number of variables approaches infinity. A detailed analysis to obtain an asymptotic estimate (good to 1+o(1)) of the average number of nodes in a search tree used by the backtracking algorithm on Model GB is also presented. It is shown that the average number of nodes required for finding all solutions or proving that no solution exists grows exponentially with the number of variables. So this model might be an interesting distribution for studying the nature of hard instances and evaluating the performance of CSP algorithms. In addition, we further investigate the behaviour of the average number of nodes as r (the ratio of constraints to variables) varies. The results indicate that as r increases, random CSP instances get easier and easier to solve, and the base for the average number of nodes that is exponential in r tends to 1 as r approaches infinity. Therefore, although the average number of nodes used by the backtracking algorithm on random CSP is exponential, many CSP instances will be very easy to solve when r is sufficiently large.
[ { "version": "v1", "created": "Tue, 9 May 2000 02:12:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Xu", "Ke", "" ], [ "Li", "Wei", "" ] ]
cs/0005012
Stephan Tobies
Ian Horrocks and Stephan Tobies
Reasoning with Axioms: Theory and Pratice
This paper appeard in the Proceedings of KR'2000
null
null
null
cs.LO cs.AI
null
When reasoning in description, modal or temporal logics it is often useful to consider axioms representing universal truths in the domain of discourse. Reasoning with respect to an arbitrary set of axioms is hard, even for relatively inexpressive logics, and it is essential to deal with such axioms in an efficient manner if implemented systems are to be effective in real applications. This is particularly relevant to Description Logics, where subsumption reasoning with respect to a terminology is a fundamental problem. Two optimisation techniques that have proved to be particularly effective in dealing with terminologies are lazy unfolding and absorption. In this paper we seek to improve our theoretical understanding of these important techniques. We define a formal framework that allows the techniques to be precisely described, establish conditions under which they can be safely applied, and prove that, provided these conditions are respected, subsumption testing algorithms will still function correctly. These results are used to show that the procedures used in the FaCT system are correct and, moreover, to show how efficiency can be significantly improved, while still retaining the guarantee of correctness, by relaxing the safety conditions for absorption.
[ { "version": "v1", "created": "Tue, 9 May 2000 07:17:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Horrocks", "Ian", "" ], [ "Tobies", "Stephan", "" ] ]
cs/0005013
Stephan Tobies
Ian Horrocks, Ulrike Sattler and Stephan Tobies
Practical Reasoning for Very Expressive Description Logics
null
Logic Journal of the IGPL 8(3):239-264, May 2000
null
null
cs.LO cs.AI
null
Description Logics (DLs) are a family of knowledge representation formalisms mainly characterised by constructors to build complex concepts and roles from atomic ones. Expressive role constructors are important in many applications, but can be computationally problematical. We present an algorithm that decides satisfiability of the DL ALC extended with transitive and inverse roles and functional restrictions with respect to general concept inclusion axioms and role hierarchies; early experiments indicate that this algorithm is well-suited for implementation. Additionally, we show that ALC extended with just transitive and inverse roles is still in PSPACE. We investigate the limits of decidability for this family of DLs, showing that relaxing the constraints placed on the kinds of roles used in number restrictions leads to the undecidability of all inference problems. Finally, we describe a number of optimisation techniques that are crucial in obtaining implementations of the decision procedures, which, despite the worst-case complexity of the problem, exhibit good performance with real-life problems.
[ { "version": "v1", "created": "Tue, 9 May 2000 13:02:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Horrocks", "Ian", "" ], [ "Sattler", "Ulrike", "" ], [ "Tobies", "Stephan", "" ] ]
cs/0005014
Stephan Tobies
Ian Horrocks, Ulrike Sattler and Stephan Tobies
Practical Reasoning for Expressive Description Logics
This paper appeared in the Proceedings of LPAR'99
null
null
null
cs.LO cs.AI
null
Description Logics (DLs) are a family of knowledge representation formalisms mainly characterised by constructors to build complex concepts and roles from atomic ones. Expressive role constructors are important in many applications, but can be computationally problematical. We present an algorithm that decides satisfiability of the DL ALC extended with transitive and inverse roles, role hierarchies, and qualifying number restrictions. Early experiments indicate that this algorithm is well-suited for implementation. Additionally, we show that ALC extended with just transitive and inverse roles is still in PSPACE. Finally, we investigate the limits of decidability for this family of DLs.
[ { "version": "v1", "created": "Wed, 10 May 2000 08:19:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Horrocks", "Ian", "" ], [ "Sattler", "Ulrike", "" ], [ "Tobies", "Stephan", "" ] ]
cs/0005016
Norbert Broeker
Norbert Broeker
Improving Testsuites via Instrumentation
6 pages, LaTeX2e
Proc. ANLP--NAACL, Seattle/WA, Apr29--May4 2000, pp.325-330
null
null
cs.CL
null
This paper explores the usefulness of a technique from software engineering, namely code instrumentation, for the development of large-scale natural language grammars. Information about the usage of grammar rules in test sentences is used to detect untested rules, redundant test sentences, and likely causes of overgeneration. Results show that less than half of a large-coverage grammar for German is actually tested by two large testsuites, and that 10-30% of testing time is redundant. The methodology applied can be seen as a re-use of grammar writing knowledge for testsuite compilation.
[ { "version": "v1", "created": "Wed, 10 May 2000 14:51:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Broeker", "Norbert", "" ] ]
cs/0005017
Stephan Tobies
Ian Horrock and Ulrike Sattler and Stephan Tobies
Reasoning with Individuals for the Description Logic SHIQ
To appear at CADE-17
null
null
null
cs.LO cs.AI
null
While there has been a great deal of work on the development of reasoning algorithms for expressive description logics, in most cases only Tbox reasoning is considered. In this paper we present an algorithm for combined Tbox and Abox reasoning in the SHIQ description logic. This algorithm is of particular interest as it can be used to decide the problem of (database) conjunctive query containment w.r.t. a schema. Moreover, the realisation of an efficient implementation should be relatively straightforward as it can be based on an existing highly optimised implementation of the Tbox algorithm in the FaCT system.
[ { "version": "v1", "created": "Thu, 11 May 2000 08:16:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Horrock", "Ian", "" ], [ "Sattler", "Ulrike", "" ], [ "Tobies", "Stephan", "" ] ]
cs/0005018
Sabina Rossi
Annalisa Bossi, Nicoletta Cocco, Sandro Etalle and Sabina Rossi
On Modular Termination Proofs of General Logic Programs
29 pages. To appear in Theory and Practice of Logic Programming
null
null
University of Venice Technical Report CS2000-8
cs.LO cs.PL
null
We propose a modular method for proving termination of general logic programs (i.e., logic programs with negation). It is based on the notion of acceptable programs, but it allows us to prove termination in a truly modular way. We consider programs consisting of a hierarchy of modules and supply a general result for proving termination by dealing with each module separately. For programs which are in a certain sense well-behaved, namely well-moded or well-typed programs, we derive both a simple verification technique and an iterative proof method. Some examples show how our system allows for greatly simplified proofs.
[ { "version": "v1", "created": "Thu, 11 May 2000 15:27:49 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2001 09:31:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Bossi", "Annalisa", "" ], [ "Cocco", "Nicoletta", "" ], [ "Etalle", "Sandro", "" ], [ "Rossi", "Sabina", "" ] ]
cs/0005019
Schwitter
Diego Moll'a Aliod and Michael Hess
On the Scalability of the Answer Extraction System "ExtrAns"
5 pages
Applications of Natural Language to Information Systems (NLDB'99). Klagenfurt, Austria, 1999, 219-224
null
null
cs.CL
null
This paper reports on the scalability of the answer extraction system ExtrAns. An answer extraction system locates the exact phrases in the documents that contain the explicit answers to the user queries. Answer extraction systems are therefore more convenient than document retrieval systems in situations where the user wants to find specific information in limited time. ExtrAns performs answer extraction over UNIX manpages. It has been constructed by combining available linguistic resources and implementing only a few modules from scratch. A resolution procedure between the minimal logical form of the user query and the minimal logical forms of the manpage sentences finds the answers to the queries. These answers are displayed to the user, together with pointers to the respective manpages, and the exact phrases that contribute to the answer are highlighted. This paper shows that the increase in response times is not a big issue when scaling the system up from 30 to 500 documents, and that the response times for 500 documents are still acceptable for a real-time answer extraction system.
[ { "version": "v1", "created": "Fri, 12 May 2000 14:12:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Aliod", "Diego Moll'a", "" ], [ "Hess", "Michael", "" ] ]
cs/0005020
Dragomir
Dragomir R. Radev (University of Michigan), Hongyan Jing (Columbia University), Malgorzata Budzikowska (IBM TJ Watson Research Center)
Centroid-based summarization of multiple documents: sentence extraction, utility-based evaluation, and user studies
10 pages Corpus availability at http://perun.si.umich.edu/~radev/mds
NAACL/ANLP Workshop on Automatic Summarization, Seattle, WA, April 30, 2000
null
null
cs.CL cs.AI cs.DL cs.HC cs.IR
null
We present a multi-document summarizer, called MEAD, which generates summaries using cluster centroids produced by a topic detection and tracking system. We also describe two new techniques, based on sentence utility and subsumption, which we have applied to the evaluation of both single and multiple document summaries. Finally, we describe two user studies that test our models of multi-document summarization.
[ { "version": "v1", "created": "Fri, 12 May 2000 17:24:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Radev", "Dragomir R.", "", "University of Michigan" ], [ "Jing", "Hongyan", "", "Columbia\n University" ], [ "Budzikowska", "Malgorzata", "", "IBM TJ Watson Research Center" ] ]
cs/0005021
Aziz Guergachi
A. Guergachi
Modeling the Uncertainty in Complex Engineering Systems
24 pages using ACM style file
null
null
null
cs.AI cs.LG
null
Existing procedures for model validation have been deemed inadequate for many engineering systems. The reason of this inadequacy is due to the high degree of complexity of the mechanisms that govern these systems. It is proposed in this paper to shift the attention from modeling the engineering system itself to modeling the uncertainty that underlies its behavior. A mathematical framework for modeling the uncertainty in complex engineering systems is developed. This framework uses the results of computational learning theory. It is based on the premise that a system model is a learning machine.
[ { "version": "v1", "created": "Sun, 14 May 2000 14:35:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Guergachi", "A.", "" ] ]
cs/0005023
Emanuele Panizzi
Alessandro Lonardo, Emanuele Panizzi and Benedetto Proietti
C++ programming language for an abstract massively parallel SIMD architecture
10 pages
null
null
null
cs.PL
null
The aim of this work is to define and implement an extended C++ language to support the SIMD programming paradigm. The C++ programming language has been extended to express all the potentiality of an abstract SIMD machine consisting of a central Control Processor and a N-dimensional toroidal array of Numeric Processors. Very few extensions have been added to the standard C++ with the goal of minimising the effort for the programmer in learning a new language and to keep very high the performance of the compiled code. The proposed language has been implemented as a porting of the GNU C++ Compiler on a SIMD supercomputer.
[ { "version": "v1", "created": "Fri, 19 May 2000 10:19:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Lonardo", "Alessandro", "" ], [ "Panizzi", "Emanuele", "" ], [ "Proietti", "Benedetto", "" ] ]
cs/0005024
Ke Xu
Ke Xu and Wei Li
The SAT Phase Transition
13 pages, 3 figures
The SAT Phase Transition. Science in China, Series E, 42(5):494-501, 1999
null
null
cs.AI cs.CC
null
Phase transition is an important feature of SAT problem. For random k-SAT model, it is proved that as r (ratio of clauses to variables) increases, the structure of solutions will undergo a sudden change like satisfiability phase transition when r reaches a threshold point. This phenomenon shows that the satisfying truth assignments suddenly shift from being relatively different from each other to being very similar to each other.
[ { "version": "v1", "created": "Mon, 22 May 2000 04:45:53 GMT" }, { "version": "v2", "created": "Tue, 23 May 2000 03:26:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Xu", "Ke", "" ], [ "Li", "Wei", "" ] ]
cs/0005025
Markus Walther
Markus Walther (University of Marburg)
Finite-State Reduplication in One-Level Prosodic Morphology
7 pages
Proc. NAACL-2000, Seattle/WA, pp.296-302
null
null
cs.CL
null
Reduplication, a central instance of prosodic morphology, is particularly challenging for state-of-the-art computational morphology, since it involves copying of some part of a phonological string. In this paper I advocate a finite-state method that combines enriched lexical representations via intersection to implement the copying. The proposal includes a resource-conscious variant of automata and can benefit from the existence of lazy algorithms. Finally, the implementation of a complex case from Koasati is presented.
[ { "version": "v1", "created": "Mon, 22 May 2000 14:07:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Walther", "Markus", "", "University of Marburg" ] ]
cs/0005026
Igor Sobrado Delgado
Igor Sobrado (University of Oviedo)
A One-Time Pad based Cipher for Data Protection in Distributed Environments
19 pages, 8 PostScript figures (attached), uses ACM/LaTeX macros esub2acm.{bst|cls} and pifont package
null
null
FFUOV-00/03
cs.CR cs.DC cs.IR cs.NI
null
A one-time pad (OTP) based cipher to insure both data protection and integrity when mobile code arrives to a remote host is presented. Data protection is required when a mobile agent could retrieve confidential information that would be encrypted in untrusted nodes of the network; in this case, information management could not rely on carrying an encryption key. Data integrity is a prerequisite because mobile code must be protected against malicious hosts that, by counterfeiting or removing collected data, could cover information to the server that has sent the agent. The algorithm described in this article seems to be simple enough, so as to be easily implemented. This scheme is based on a non-interactive protocol and allows a remote host to change its own data on-the-fly and, at the same time, protecting information against handling by other hosts.
[ { "version": "v1", "created": "Wed, 24 May 2000 22:24:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Sobrado", "Igor", "", "University of Oviedo" ] ]
cs/0005028
Dimitrios Skraparlis
Dimitrios Skraparlis
A method for command identification, using modified collision free hashing with addition & rotation iterative hash functions (part 1)
28 pages, includes code
null
null
null
cs.HC cs.IR
null
This paper proposes a method for identification of a user`s fixed string set (which can be a command/instruction set for a terminal or microprocessor). This method is fast and has very small memory requirements, compared to a traditional full string storage and compare method. The user feeds characters into a microcontroller via a keyboard or another microprocessor sends commands and the microcontroller hashes the input in order to identify valid commands, ensuring no collisions between hashed valid strings, while applying further criteria to narrow collision between random and valid strings. The method proposed narrows the possibility of the latter kind of collision, achieving small code and memory-size utilization and very fast execution. Hashing is achieved using additive & rotating hash functions in an iterative form, which can be very easily implemented in simple microcontrollers and microprocessors. Such hash functions are presented and compared according to their efficiency for a given string/command set, using the program found in the appendix.
[ { "version": "v1", "created": "Sat, 27 May 2000 01:08:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Skraparlis", "Dimitrios", "" ] ]
cs/0005029
Dragomir
Dragomir R. Radev (University of Michigan), John Prager (IBM TJ Watson Research Center), Valerie Samn (Teachers College, Columbia University)
Ranking suspected answers to natural language questions using predictive annotation
8 pages
ANLP'00, Seattle, WA, May 2000
null
null
cs.CL
null
In this paper, we describe a system to rank suspected answers to natural language questions. We process both corpus and query using a new technique, predictive annotation, which augments phrases in texts with labels anticipating their being targets of certain kinds of questions. Given a natural language question, an IR system returns a set of matching passages, which are then analyzed and ranked according to various criteria described in this paper. We provide an evaluation of the techniques based on results from the TREC Q&A evaluation in which our system participated.
[ { "version": "v1", "created": "Tue, 30 May 2000 17:10:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Radev", "Dragomir R.", "", "University of Michigan" ], [ "Prager", "John", "", "IBM TJ Watson\n Research Center" ], [ "Samn", "Valerie", "", "Teachers College, Columbia University" ] ]
cs/0005030
Joseph Y. Halpern
Joseph Y. Halpern
Axiomatizing Causal Reasoning
An earlier version of this paper appeared in UAI '98
Journal of AI Research, Vol. 12, 2000, pp. 317--337
null
null
cs.AI cs.LO
null
Causal models defined in terms of a collection of equations, as defined by Pearl, are axiomatized here. Axiomatizations are provided for three successively more general classes of causal models: (1) the class of recursive theories (those without feedback), (2) the class of theories where the solutions to the equations are unique, (3) arbitrary theories (where the equations may not have solutions and, if they do, they are not necessarily unique). It is shown that to reason about causality in the most general third class, we must extend the language used by Galles and Pearl. In addition, the complexity of the decision procedures is characterized for all the languages and classes of models considered.
[ { "version": "v1", "created": "Tue, 30 May 2000 18:56:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
cs/0006001
Ninan Sajeeth Philip
Ninan Sajeeth Philip, K. Babu Joseph
Boosting the Differences: A fast Bayesian classifier neural network
latex 18pages no figures
null
null
IDA2000
cs.CV
null
A Bayesian classifier that up-weights the differences in the attribute values is discussed. Using four popular datasets from the UCI repository, some interesting features of the network are illustrated. The network is suitable for classification problems.
[ { "version": "v1", "created": "Wed, 31 May 2000 23:37:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Philip", "Ninan Sajeeth", "" ], [ "Joseph", "K. Babu", "" ] ]
cs/0006002
Ninan Sajeeth Philip
Ninan Sajeeth Philip, K. Babu Joseph
Distorted English Alphabet Identification : An application of Difference Boosting Algorithm
latex 14pages no figures
null
null
ADCOM2000
cs.CV
null
The difference-boosting algorithm is used on letters dataset from the UCI repository to classify distorted raster images of English alphabets. In contrast to rather complex networks, the difference-boosting is found to produce comparable or better classification efficiency on this complex problem.
[ { "version": "v1", "created": "Wed, 31 May 2000 23:52:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Philip", "Ninan Sajeeth", "" ], [ "Joseph", "K. Babu", "" ] ]
cs/0006003
John Henderson
John C. Henderson and Eric Brill
Exploiting Diversity in Natural Language Processing: Combining Parsers
8 pages
Proceedings of the Fourth Conference on Empirical Methods in Natural Language Processing (EMNLP-99), pages 187-194. College Park, Maryland, USA. June, 1999
null
null
cs.CL
null
Three state-of-the-art statistical parsers are combined to produce more accurate parses, as well as new bounds on achievable Treebank parsing accuracy. Two general approaches are presented and two combination techniques are described for each approach. Both parametric and non-parametric models are explored. The resulting parsers surpass the best previously published performance results for the Penn Treebank.
[ { "version": "v1", "created": "Thu, 1 Jun 2000 18:42:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Henderson", "John C.", "" ], [ "Brill", "Eric", "" ] ]
cs/0006005
Stephen Marsand
Stephen Marsland, Ulrich Nehmzow and Jonathan Shapiro
Novelty Detection for Robot Neotaxis
7 pages, 5 figures. In Proceedings of the Second International Conference on Neural Computation, 2000
null
null
null
cs.RO cs.NE nlin.AO
null
The ability of a robot to detect and respond to changes in its environment is potentially very useful, as it draws attention to new and potentially important features. We describe an algorithm for learning to filter out previously experienced stimuli to allow further concentration on novel features. The algorithm uses a model of habituation, a biological process which causes a decrement in response with repeated presentation. Experiments with a mobile robot are presented in which the robot detects the most novel stimulus and turns towards it (`neotaxis').
[ { "version": "v1", "created": "Fri, 2 Jun 2000 11:32:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Marsland", "Stephen", "" ], [ "Nehmzow", "Ulrich", "" ], [ "Shapiro", "Jonathan", "" ] ]
cs/0006006
Stephen Marsand
Stephen Marsland, Ulrich Nehmzow and Jonathan Shapiro
A Real-Time Novelty Detector for a Mobile Robot
8 pages, 6 figures. In Proceedings of EUREL European Advanced Robotics Systems Masterclass and Conference, 2000
null
null
null
cs.RO cs.NE
null
Recognising new or unusual features of an environment is an ability which is potentially very useful to a robot. This paper demonstrates an algorithm which achieves this task by learning an internal representation of `normality' from sonar scans taken as a robot explores the environment. This model of the environment is used to evaluate the novelty of each sonar scan presented to it with relation to the model. Stimuli which have not been seen before, and therefore have more novelty, are highlighted by the filter. The filter has the ability to forget about features which have been learned, so that stimuli which are seen only rarely recover their response over time. A number of robot experiments are presented which demonstrate the operation of the filter.
[ { "version": "v1", "created": "Fri, 2 Jun 2000 12:00:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Marsland", "Stephen", "" ], [ "Nehmzow", "Ulrich", "" ], [ "Shapiro", "Jonathan", "" ] ]
cs/0006007
Stephen Marsand
Stephen Marsland, Ulrich Nehmzow and Jonathan Shapiro
Novelty Detection on a Mobile Robot Using Habituation
10 pages, 6 figures. In From Animals to Animats, The Sixth International Conference on Simulation of Adaptive Behaviour, Paris, 2000
null
null
null
cs.RO cs.NE nlin.AO
null
In this paper a novelty filter is introduced which allows a robot operating in an un structured environment to produce a self-organised model of its surroundings and to detect deviations from the learned model. The environment is perceived using the rob ot's 16 sonar sensors. The algorithm produces a novelty measure for each sensor scan relative to the model it has learned. This means that it highlights stimuli which h ave not been previously experienced. The novelty filter proposed uses a model of hab ituation. Habituation is a decrement in behavioural response when a stimulus is pre sented repeatedly. Robot experiments are presented which demonstrate the reliable o peration of the filter in a number of environments.
[ { "version": "v1", "created": "Fri, 2 Jun 2000 12:33:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Marsland", "Stephen", "" ], [ "Nehmzow", "Ulrich", "" ], [ "Shapiro", "Jonathan", "" ] ]
cs/0006008
Joseph Y. Halpern
Cynthia Dwork, Joseph Y. Halpern, and O. Waarts
Performing work efficiently in the presence of faults
null
SIAM Journal on Computing 27:5, 1998, pp. 1457--1491
null
null
cs.DC
null
We consider a system of t synchronous processes that communicate only by sending messages to one another, and that together must perform $n$ independent units of work. Processes may fail by crashing; we want to guarantee that in every execution of the protocol in which at least one process survives, all n units of work will be performed. We consider three parameters: the number of messages sent, the total number of units of work performed (including multiplicities), and time. We present three protocols for solving the problem. All three are work-optimal, doing O(n+t) work. The first has moderate costs in the remaining two parameters, sending O(t\sqrt{t}) messages, and taking O(n+t) time. This protocol can be easily modified to run in any completely asynchronous system equipped with a failure detection mechanism. The second sends only O(t log{t}) messages, but its running time is large (exponential in n and t). The third is essentially time-optimal in the (usual) case in which there are no failures, and its time complexity degrades gracefully as the number of failures increases.
[ { "version": "v1", "created": "Fri, 2 Jun 2000 18:35:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Dwork", "Cynthia", "" ], [ "Halpern", "Joseph Y.", "" ], [ "Waarts", "O.", "" ] ]
cs/0006009
Joseph Y. Halpern
Joseph Y. Halpern and Yoram Moses
Knowledge and common knowledge in a distributed environment
This paper is copyrighted by ACM and appears in the ACM Digital Library
Journal of the ACM 37:3, 1990, pp. 549--587
null
null
cs.DC cs.AI
null
Reasoning about knowledge seems to play a fundamental role in distributed systems. Indeed, such reasoning is a central part of the informal intuitive arguments used in the design of distributed protocols. Communication in a distributed system can be viewed as the act of transforming the system's state of knowledge. This paper presents a general framework for formalizing and reasoning about knowledge in distributed systems. We argue that states of knowledge of groups of processors are useful concepts for the design and analysis of distributed protocols. In particular, distributed knowledge corresponds to knowledge that is ``distributed'' among the members of the group, while common knowledge corresponds to a fact being ``publicly known''. The relationship between common knowledge and a variety of desirable actions in a distributed system is illustrated. Furthermore, it is shown that, formally speaking, in practical systems common knowledge cannot be attained. A number of weaker variants of common knowledge that are attainable in many cases of interest are introduced and investigated.
[ { "version": "v1", "created": "Fri, 2 Jun 2000 18:43:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Moses", "Yoram", "" ] ]
cs/0006011
John Henderson
John C. Henderson and Eric Brill
Bagging and Boosting a Treebank Parser
8 pages
Proceedings of the 1st Meeting of the North American Chapter of the Association for Computational Linguistics (NAACL-2000), pages 34-41
null
null
cs.CL
null
Bagging and boosting, two effective machine learning techniques, are applied to natural language parsing. Experiments using these techniques with a trainable statistical parser are described. The best resulting system provides roughly as large of a gain in F-measure as doubling the corpus size. Error analysis of the result of the boosting technique reveals some inconsistent annotations in the Penn Treebank, suggesting a semi-automatic method for finding inconsistent treebank annotations.
[ { "version": "v1", "created": "Mon, 5 Jun 2000 18:04:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Henderson", "John C.", "" ], [ "Brill", "Eric", "" ] ]
cs/0006014
Neil J. Gunther
Neil J. Gunther
Solaris System Resource Manager: All I Ever Wanted Was My Unfair Advantage (And Why You Can't Have It!)
17 pages, Updated since the 25th Computer Measurement Group Conference, Reno NV, Dec.5-10, 1999
Proc. CMG'99 Conf. p.194-205
null
null
cs.PF cs.OS
null
Traditional UNIX time-share schedulers attempt to be fair to all users by employing a round-robin style algorithm for allocating CPU time. Unfortunately, a loophole exists whereby the scheduler can be biased in favor of a greedy user running many short CPU-time processes. This loophole is not a defect but an intrinsic property of the round-robin scheduler that ensures responsiveness to the short CPU demands associated with multiple interactive users. A new generation of UNIX system resource management software constrains the scheduler to be equitable to all users regardless of the number of processes each may be running. This "fair-share" scheduling draws on the concept of pro rating resource "shares" across users and groups and then dynamically adjusting CPU usage to meet those share proportions. The simple notion of statically allocating these shares, however, belies the potential consequences for performance as measured by user response time and service level targets. We demonstrate this point by modeling several simple share allocation scenarios and analyzing the corresponding performance effects. A brief comparison of commercial system resource management implementations from HP, IBM, and SUN is also given.
[ { "version": "v1", "created": "Thu, 8 Jun 2000 16:50:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Gunther", "Neil J.", "" ] ]
cs/0006015
Neil J. Gunther
Neil J. Gunther
UNIX Resource Managers: Capacity Planning and Resource Issues
12 pages. Fixed formatting problem. To be presented at the SAGE-AU Conference, Bond University, Gold Coast, Australia, July 7, 2000
null
null
null
cs.PF cs.OS
null
The latest implementations of commercial UNIX to offer mainframe style capacity management on enterprise servers include: AIX Workload Manager (WLM), HP-UX Process Resource Manager (PRM), Solaris Resource Manager (SRM), as well as SGI and Compaq. The ability to manage server capacity is achieved by making significant modifications to the standard UNIX operating system so that processes are inherently tied to specific users. Those users, in turn, are granted only a certain fraction of system resources. Resource usage is monitored and compared with each users grant to ensure that the assigned entitlement constraints are met. In this paper, we begin by clearing up some of the confusion that has surrounded the motivation and the terminology behind the new technology. The common theme across each of the commercial implementations is the introduction of the fair-share scheduler. After reviewing some potential performance pitfalls, we present capacity planning guidelines for migrating to automated UNIX resource management.
[ { "version": "v1", "created": "Thu, 8 Jun 2000 17:02:51 GMT" }, { "version": "v2", "created": "Tue, 13 Jun 2000 22:07:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gunther", "Neil J.", "" ] ]
cs/0006016
Neil J. Gunther
Neil J. Gunther
The X-Files: Investigating Alien Performance in a Thin-client World
13 pages; Invited Lecture at the High Performance Computing Conference, University of Tromso, Norway, June 27-30, 1999
Proc. Hiper'99 Vol.1, p.156
null
null
cs.PF cs.DC
null
Many scientific applications use the X11 window environment; an open source windows GUI standard employing a client/server architecture. X11 promotes: distributed computing, thin-client functionality, cheap desktop displays, compatibility with heterogeneous servers, remote services and administration, and greater maturity than newer web technologies. This paper details the author's investigations into close encounters with alien performance in X11-based seismic applications running on a 200-node cluster, backed by 2 TB of mass storage. End-users cited two significant UFOs (Unidentified Faulty Operations) i) long application launch times and ii) poor interactive response times. The paper is divided into three major sections describing Close Encounters of the 1st Kind: citings of UFO experiences, the 2nd Kind: recording evidence of a UFO, and the 3rd Kind: contact and analysis. UFOs do exist and this investigation presents a real case study for evaluating workload analysis and other diagnostic tools.
[ { "version": "v1", "created": "Thu, 8 Jun 2000 18:08:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Gunther", "Neil J.", "" ] ]
cs/0006017
Frankie James
Manny Rayner, Beth Ann Hockey, Frankie James
Turning Speech Into Scripts
Working notes from AAAI Spring Symposium
AAAI Spring Symposium on Natural Dialogues with Practical Robotic Devices, March 20-22, 2000. Stanford, CA
null
null
cs.CL
null
We describe an architecture for implementing spoken natural language dialogue interfaces to semi-autonomous systems, in which the central idea is to transform the input speech signal through successive levels of representation corresponding roughly to linguistic knowledge, dialogue knowledge, and domain knowledge. The final representation is an executable program in a simple scripting language equivalent to a subset of Cshell. At each stage of the translation process, an input is transformed into an output, producing as a byproduct a "meta-output" which describes the nature of the transformation performed. We show how consistent use of the output/meta-output distinction permits a simple and perspicuous treatment of apparently diverse topics including resolution of pronouns, correction of user misconceptions, and optimization of scripts. The methods described have been concretely realized in a prototype speech interface to a simulation of the Personal Satellite Assistant.
[ { "version": "v1", "created": "Fri, 9 Jun 2000 17:28:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Rayner", "Manny", "" ], [ "Hockey", "Beth Ann", "" ], [ "James", "Frankie", "" ] ]
cs/0006019
Frankie James
Manny Rayner, Beth Ann Hockey, Frankie James
A Compact Architecture for Dialogue Management Based on Scripts and Meta-Outputs
null
Language Technology Joint Conference ANLP-NAACL 2000. 29 April - 4 May 2000, Seattle, WA
null
null
cs.CL
null
We describe an architecture for spoken dialogue interfaces to semi-autonomous systems that transforms speech signals through successive representations of linguistic, dialogue, and domain knowledge. Each step produces an output, and a meta-output describing the transformation, with an executable program in a simple scripting language as the final result. The output/meta-output distinction permits perspicuous treatment of diverse tasks such as resolving pronouns, correcting user misconceptions, and optimizing scripts.
[ { "version": "v1", "created": "Fri, 9 Jun 2000 21:41:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Rayner", "Manny", "" ], [ "Hockey", "Beth Ann", "" ], [ "James", "Frankie", "" ] ]
cs/0006020
Frankie James
Beth Ann Hockey, Manny Rayner, Frankie James
A Comparison of the XTAG and CLE Grammars for English
5th International Workshop on Tree Adjoining Grammars and Related Formalisms. 25-27 May 2000, Paris, France
null
null
null
cs.CL
null
When people develop something intended as a large broad-coverage grammar, they usually have a more specific goal in mind. Sometimes this goal is covering a corpus; sometimes the developers have theoretical ideas they wish to investigate; most often, work is driven by a combination of these two main types of goal. What tends to happen after a while is that the community of people working with the grammar starts thinking of some phenomena as ``central'', and makes serious efforts to deal with them; other phenomena are labelled ``marginal'', and ignored. Before long, the distinction between ``central'' and ``marginal'' becomes so ingrained that it is automatic, and people virtually stop thinking about the ``marginal'' phenomena. In practice, the only way to bring the marginal things back into focus is to look at what other people are doing and compare it with one's own work. In this paper, we will take two large grammars, XTAG and the CLE, and examine each of them from the other's point of view. We will find in both cases not only that important things are missing, but that the perspective offered by the other grammar suggests simple and practical ways of filling in the holes. It turns out that there is a pleasing symmetry to the picture. XTAG has a very good treatment of complement structure, which the CLE to some extent lacks; conversely, the CLE offers a powerful and general account of adjuncts, which the XTAG grammar does not fully duplicate. If we examine the way in which each grammar does the thing it is good at, we find that the relevant methods are quite easy to port to the other framework, and in fact only involve generalization and systematization of existing mechanisms.
[ { "version": "v1", "created": "Fri, 9 Jun 2000 20:49:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hockey", "Beth Ann", "" ], [ "Rayner", "Manny", "" ], [ "James", "Frankie", "" ] ]
cs/0006021
Frankie James
Manny Rayner, Beth Ann Hockey, Frankie James, Elizabeth O. Bratt, Sharon Goldwater, Mark Gawron
Compiling Language Models from a Linguistically Motivated Unification Grammar
To be published in COLING 2000
null
null
null
cs.CL
null
Systems now exist which are able to compile unification grammars into language models that can be included in a speech recognizer, but it is so far unclear whether non-trivial linguistically principled grammars can be used for this purpose. We describe a series of experiments which investigate the question empirically, by incrementally constructing a grammar and discovering what problems emerge when successively larger versions are compiled into finite state graph representations and used as language models for a medium-vocabulary recognition task.
[ { "version": "v1", "created": "Fri, 9 Jun 2000 22:03:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Rayner", "Manny", "" ], [ "Hockey", "Beth Ann", "" ], [ "James", "Frankie", "" ], [ "Bratt", "Elizabeth O.", "" ], [ "Goldwater", "Sharon", "" ], [ "Gawron", "Mark", "" ] ]
cs/0006022
Ahmed Helmy
Ahmed Helmy (University of Southern California)
Multicast-based Architecture for IP Mobility: Simulation Analysis and Comparison with Basic Mobile IP
14 pages, 14 pages (.pdf file)
null
null
null
cs.NI cs.PF
null
With the introduction of a newer generation of wireless devices and technologies, the need for an efficient architecture for IP mobility is becoming more apparent. Several architectures have been proposed to support IP mobility. Most studies, however, show that current architectures, in general, fall short from satisfying the performance requirements for wireless applications, mainly audio. Other studies have shown performance improvement by using multicast to reduce latency and packet loss during handoff. In this study, we propose a multicast-based architecture to support IP mobility. We evaluate our approach through simulation, and we compare it to mainstream approaches for IP mobility, mainly, the Mobile IP protocol. Comparison is performed according to the required performance criteria, such as smooth handoff and efficient routing. Our simulation results show significant improvement for the proposed architecture. On average, basic Mobile IP consumes almost twice as much network bandwidth, and experiences more than twice as much end-to-end and handoff delays, as does our proposed architecture. Furthermore, we propose an extension to Mobile IP to support our architecture with minimal modification.
[ { "version": "v1", "created": "Sat, 10 Jun 2000 23:53:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Helmy", "Ahmed", "", "University of Southern California" ] ]
cs/0006024
Andreas Stolcke
E. Shriberg, R. Bates, A. Stolcke, P. Taylor, D. Jurafsky, K. Ries, N. Coccaro, R. Martin, M. Meteer, C. Van Ess-Dykema
Can Prosody Aid the Automatic Classification of Dialog Acts in Conversational Speech?
55 pages, 10 figures
Language and Speech 41(3-4), 439-487, 1998
null
null
cs.CL
null
Identifying whether an utterance is a statement, question, greeting, and so forth is integral to effective automatic understanding of natural dialog. Little is known, however, about how such dialog acts (DAs) can be automatically classified in truly natural conversation. This study asks whether current approaches, which use mainly word information, could be improved by adding prosodic information. The study is based on more than 1000 conversations from the Switchboard corpus. DAs were hand-annotated, and prosodic features (duration, pause, F0, energy, and speaking rate) were automatically extracted for each DA. In training, decision trees based on these features were inferred; trees were then applied to unseen test data to evaluate performance. Performance was evaluated for prosody models alone, and after combining the prosody models with word information -- either from true words or from the output of an automatic speech recognizer. For an overall classification task, as well as three subtasks, prosody made significant contributions to classification. Feature-specific analyses further revealed that although canonical features (such as F0 for questions) were important, less obvious features could compensate if canonical features were removed. Finally, in each task, integrating the prosodic model with a DA-specific statistical language model improved performance over that of the language model alone, especially for the case of recognized words. Results suggest that DAs are redundantly marked in natural conversation, and that a variety of automatically extractable prosodic features could aid dialog processing in speech applications.
[ { "version": "v1", "created": "Sun, 11 Jun 2000 06:00:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Shriberg", "E.", "" ], [ "Bates", "R.", "" ], [ "Stolcke", "A.", "" ], [ "Taylor", "P.", "" ], [ "Jurafsky", "D.", "" ], [ "Ries", "K.", "" ], [ "Coccaro", "N.", "" ], [ "Martin", "R.", "" ], [ "Meteer", "M.", "" ], [ "Van Ess-Dykema", "C.", "" ] ]
cs/0006025
Andreas Stolcke
A. Stolcke
Entropy-based Pruning of Backoff Language Models
5 pages. Typos in published version fixed
Proceedings DARPA Broadcast News Transcription and Understanding Workshop, pp. 270-274, Lansdowne, VA, 1998
null
null
cs.CL
null
A criterion for pruning parameters from N-gram backoff language models is developed, based on the relative entropy between the original and the pruned model. It is shown that the relative entropy resulting from pruning a single N-gram can be computed exactly and efficiently for backoff models. The relative entropy measure can be expressed as a relative change in training set perplexity. This leads to a simple pruning criterion whereby all N-grams that change perplexity by less than a threshold are removed from the model. Experiments show that a production-quality Hub4 LM can be reduced to 26% its original size without increasing recognition error. We also compare the approach to a heuristic pruning criterion by Seymore and Rosenfeld (1996), and show that their approach can be interpreted as an approximation to the relative entropy criterion. Experimentally, both approaches select similar sets of N-grams (about 85% overlap), with the exact relative entropy criterion giving marginally better performance.
[ { "version": "v1", "created": "Sun, 11 Jun 2000 18:20:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Stolcke", "A.", "" ] ]
cs/0006027
Pierre Nugues
Pierre Nugues
Verbal Interactions in Virtual Worlds
Position paper for CHI 2000 Workshop on Natural-Language Interaction, The Hague, 22 figures
null
null
null
cs.CL cs.HC
null
We first discuss respective advantages of language interaction in virtual worlds and of using 3D images in dialogue systems. Then, we describe an example of a verbal interaction system in virtual reality: Ulysse. Ulysse is a conversational agent that helps a user navigate in virtual worlds. It has been designed to be embedded in the representation of a participant of a virtual conference and it responds positively to motion orders. Ulysse navigates the user's viewpoint on his/her behalf in the virtual world. On tests we carried out, we discovered that users, novices as well as experienced ones have difficulties moving in a 3D environment. Agents such as Ulysse enable a user to carry out navigation motions that would have been impossible with classical interaction devices. From the whole Ulysse system, we have stripped off a skeleton architecture that we have ported to VRML, Java, and Prolog. We hope this skeleton helps the design of language applications in virtual worlds.
[ { "version": "v1", "created": "Tue, 13 Jun 2000 09:50:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Nugues", "Pierre", "" ] ]
cs/0006028
Adwait Ratnaparkhi
Adwait Ratnaparkhi
Trainable Methods for Surface Natural Language Generation
LaTeX, 8 pages
Proceedings of the 1st Meeting of the North American Chapter of the Association for Computational Linguistics (NAACL 2000). Pages 194--201
null
null
cs.CL
null
We present three systems for surface natural language generation that are trainable from annotated corpora. The first two systems, called NLG1 and NLG2, require a corpus marked only with domain-specific semantic attributes, while the last system, called NLG3, requires a corpus marked with both semantic attributes and syntactic dependency information. All systems attempt to produce a grammatical natural language phrase from a domain-specific semantic representation. NLG1 serves a baseline system and uses phrase frequencies to generate a whole phrase in one step, while NLG2 and NLG3 use maximum entropy probability models to individually generate each word in the phrase. The systems NLG2 and NLG3 learn to determine both the word choice and the word order of the phrase. We present experiments in which we generate phrases to describe flights in the air travel domain.
[ { "version": "v1", "created": "Tue, 13 Jun 2000 21:06:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Ratnaparkhi", "Adwait", "" ] ]
cs/0006029
Ahmed Helmy
Ahmed Helmy, Sandeep Gupta, Deborah Estrin, Alberto Cerpa, Yan Yu (University of Southern California)
Systematic Performance Evaluation of Multipoint Protocols
23 pages, 12 figures
null
null
null
cs.NI cs.DS
null
The advent of multipoint (multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation. In this paper, we present a method for automatic synthesis of worst and best case scenarios for multipoint protocol performance evaluation. Our method uses a fault-oriented test generation (FOTG) algorithm for searching the protocol and system state space to synthesize these scenarios. The algorithm is based on a global finite state machine (FSM) model. We extend the algorithm with timing semantics to handle end-to-end delays and address performance criteria. We introduce the notion of a virtual LAN to represent delays of the underlying multicast distribution tree. As a case study, we use our method to evaluate variants of the timer suppression mechanism, used in various multipoint protocols, with respect to two performance criteria: overhead of response messages and response time. Simulation results for reliable multicast protocols show that our method provides a scalable way for synthesizing worst-case scenarios automatically. We expect our method to serve as a model for applying systematic scenario generation to other multipoint protocols.
[ { "version": "v1", "created": "Sat, 17 Jun 2000 18:16:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Helmy", "Ahmed", "", "University of Southern California" ], [ "Gupta", "Sandeep", "", "University of Southern California" ], [ "Estrin", "Deborah", "", "University of Southern California" ], [ "Cerpa", "Alberto", "", "University of Southern California" ], [ "Yu", "Yan", "", "University of Southern California" ] ]
cs/0006030
Tad Hogg
Hristo Bojinov, Arancha Casal and Tad Hogg
Multiagent Control of Self-reconfigurable Robots
15 pages, 10 color figures, including low-resolution photos of prototype hardware
Artificial Intelligence 142:99-120 (2002)
null
null
cs.RO cs.DC cs.MA
null
We demonstrate how multiagent systems provide useful control techniques for modular self-reconfigurable (metamorphic) robots. Such robots consist of many modules that can move relative to each other, thereby changing the overall shape of the robot to suit different tasks. Multiagent control is particularly well-suited for tasks involving uncertain and changing environments. We illustrate this approach through simulation experiments of Proteo, a metamorphic robot system currently under development.
[ { "version": "v1", "created": "Tue, 20 Jun 2000 20:17:44 GMT" }, { "version": "v2", "created": "Tue, 20 Jun 2000 23:34:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Bojinov", "Hristo", "" ], [ "Casal", "Arancha", "" ], [ "Hogg", "Tad", "" ] ]
cs/0006031
Yi-Dong Shen
Yi-Dong Shen, Li-Yan Yuan, Jia-Huai You
Verifying Termination of General Logic Programs with Concrete Queries
28 pages, 8 figures
null
null
null
cs.AI cs.LO
null
We introduce a method of verifying termination of logic programs with respect to concrete queries (instead of abstract query patterns). A necessary and sufficient condition is established and an algorithm for automatic verification is developed. In contrast to existing query pattern-based approaches, our method has the following features: (1) It applies to all general logic programs with non-floundering queries. (2) It is very easy to automate because it does not need to search for a level mapping or a model, nor does it need to compute an interargument relation based on additional mode or type information. (3) It bridges termination analysis with loop checking, the two problems that have been studied separately in the past despite their close technical relation with each other.
[ { "version": "v1", "created": "Wed, 21 Jun 2000 17:30:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Yi-Dong", "" ], [ "Yuan", "Li-Yan", "" ], [ "You", "Jia-Huai", "" ] ]
cs/0006034
Peter J. Stuckey
Kevin Glynn, Martin Sulzmann, and Peter J. Stuckey
Type Classes and Constraint Handling Rules
14 pages, Workshop on Rule-Based Constraint Reasoning and Programming (http://www.informatik.uni-muenchen.de/~fruehwir/cl2000r.html)
null
null
TR2000/7
cs.PL
null
Type classes are an elegant extension to traditional, Hindley-Milner based typing systems. They are used in modern, typed languages such as Haskell to support controlled overloading of symbols. Haskell 98 supports only single-parameter and constructor type classes. Other extensions such as multi-parameter type classes are highly desired but are still not officially supported by Haskell. Subtle issues arise with extensions, which may lead to a loss of feasible type inference or ambiguous programs. A proper logical basis for type class systems seems to be missing. Such a basis would allow extensions to be characterised and studied rigorously. We propose to employ Constraint Handling Rules as a tool to study and develop type class systems in a uniform way.
[ { "version": "v1", "created": "Mon, 26 Jun 2000 00:39:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Glynn", "Kevin", "" ], [ "Sulzmann", "Martin", "" ], [ "Stuckey", "Peter J.", "" ] ]
cs/0006037
Joseph Y. Halpern
Zygmunt Haas, Joseph Y. Halpern, Li Li, Stephen B. Wicker
A Decision-Theoretic Approach to Resource Allocation in Wireless Multimedia Networks
To appear, Dial M for Mobility, 2000
null
null
null
cs.NI
null
The allocation of scarce spectral resources to support as many user applications as possible while maintaining reasonable quality of service is a fundamental problem in wireless communication. We argue that the problem is best formulated in terms of decision theory. We propose a scheme that takes decision-theoretic concerns (like preferences) into account and discuss the difficulties and subtleties involved in applying standard techniques from the theory of Markov Decision Processes (MDPs) in constructing an algorithm that is decision-theoretically optimal. As an example of the proposed framework, we construct such an algorithm under some simplifying assumptions. Additionally, we present analysis and simulation results that show that our algorithm meets its design goals. Finally, we investigate how far from optimal one well-known heuristic is. The main contribution of our results is in providing insight and guidance for the design of near-optimal admission-control policies.
[ { "version": "v1", "created": "Tue, 27 Jun 2000 20:31:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Haas", "Zygmunt", "" ], [ "Halpern", "Joseph Y.", "" ], [ "Li", "Li", "" ], [ "Wicker", "Stephen B.", "" ] ]
cs/0006038
Dale Gerdemann
Dale Gerdemann and Gertjan van Noord
Approximation and Exactness in Finite State Optimality Theory
10 pages, 1 figure, Finite-State Phonology : SIGPHON 2000, Fifth Meeting of the ACL Special Interest Group in Computational Phonology, COLING 2000
null
null
null
cs.CL
null
Previous work (Frank and Satta 1998; Karttunen, 1998) has shown that Optimality Theory with gradient constraints generally is not finite state. A new finite-state treatment of gradient constraints is presented which improves upon the approximation of Karttunen (1998). The method turns out to be exact, and very compact, for the syllabification analysis of Prince and Smolensky (1993).
[ { "version": "v1", "created": "Wed, 28 Jun 2000 10:06:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Gerdemann", "Dale", "" ], [ "van Noord", "Gertjan", "" ] ]
cs/0006040
Luciano da Fontoura Costa
Luciano da Fontoura Costa
Correlation over Decomposed Signals: A Non-Linear Approach to Fast and Effective Sequences Comparison
7 pages, 1 figure
null
null
null
cs.CV cs.DS q-bio
null
A novel non-linear approach to fast and effective comparison of sequences is presented, compared to the traditional cross-correlation operator, and illustrated with respect to DNA sequences.
[ { "version": "v1", "created": "Wed, 28 Jun 2000 18:34:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Costa", "Luciano da Fontoura", "" ] ]
cs/0006041
Jordi Atserias Batalla
Jordi Atserias, Irene Castellon, Montse Civit, German Rigau
Using a Diathesis Model for Semantic Parsing
8 pages
Proceedins of VEXTAL.1999 pg 385-392
null
null
cs.CL cs.AI
null
This paper presents a semantic parsing approach for unrestricted texts. Semantic parsing is one of the major bottlenecks of Natural Language Understanding (NLU) systems and usually requires building expensive resources not easily portable to other domains. Our approach obtains a case-role analysis, in which the semantic roles of the verb are identified. In order to cover all the possible syntactic realisations of a verb, our system combines their argument structure with a set of general semantic labelled diatheses models. Combining them, the system builds a set of syntactic-semantic patterns with their own role-case representation. Once the patterns are build, we use an approximate tree pattern-matching algorithm to identify the most reliable pattern for a sentence. The pattern matching is performed between the syntactic-semantic patterns and the feature-structure tree representing the morphological, syntactical and semantic information of the analysed sentence. For sentences assigned to the correct model, the semantic parsing system we are presenting identifies correctly more than 73% of possible semantic case-roles.
[ { "version": "v1", "created": "Thu, 29 Jun 2000 07:44:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Atserias", "Jordi", "" ], [ "Castellon", "Irene", "" ], [ "Civit", "Montse", "" ], [ "Rigau", "German", "" ] ]
cs/0006042
Jordi Atserias Batalla
Jordi Atserias, Irene Castellon, Montse Civit, German Rigau
Semantic Parsing based on Verbal Subcategorization
12 pages, extended version of the paper. Spanish version of the paper also available from authors home page
Conference on Intelligence text Processing and Computational Linguistics, CICLing 2000. pg 330-340
null
null
cs.CL cs.AI
null
The aim of this work is to explore new methodologies on Semantic Parsing for unrestricted texts. Our approach follows the current trends in Information Extraction (IE) and is based on the application of a verbal subcategorization lexicon (LEXPIR) by means of complex pattern recognition techniques. LEXPIR is framed on the theoretical model of the verbal subcategorization developed in the Pirapides project.
[ { "version": "v1", "created": "Thu, 29 Jun 2000 09:17:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Atserias", "Jordi", "" ], [ "Castellon", "Irene", "" ], [ "Civit", "Montse", "" ], [ "Rigau", "German", "" ] ]
cs/0006043
Sylvain Piechowiak
S. Piechowiak, J. Rodriguez
Constraint compiling into rules formalism constraint compiling into rules formalism for dynamic CSPs computing
14 pages
null
null
null
cs.AI
null
In this paper we present a rule based formalism for filtering variables domains of constraints. This formalism is well adapted for solving dynamic CSP. We take diagnosis as an instance problem to illustrate the use of these rules. A diagnosis problem is seen like finding all the minimal sets of constraints to be relaxed in the constraint network that models the device to be diagnosed
[ { "version": "v1", "created": "Fri, 30 Jun 2000 10:25:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Piechowiak", "S.", "" ], [ "Rodriguez", "J.", "" ] ]
cs/0006045
Carlos N. Ribeiro
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira and Paulo Guedes
Security Policy Consistency
To appear in the first CL2000 workshop on Rule-Based Constraint Reasoning and Programming
null
null
null
cs.LO cs.CR
null
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and between security policies and other specifications, namely workflow specifications. Although the problem of security conflicts has been addressed by several authors, to our knowledge none has addressed the general problem of security inconsistencies, on its several definitions and target specifications.
[ { "version": "v1", "created": "Fri, 30 Jun 2000 20:07:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Ribeiro", "Carlos", "" ], [ "Zuquete", "Andre", "" ], [ "Ferreira", "Paulo", "" ], [ "Guedes", "Paulo", "" ] ]
cs/0007001
Oswaldo Teran
Oswaldo Teran (1 and 2), Bruce Edmonds (1) and Steve Wallis (1) ((1) Manchester Metropolitan University. Manchester. UK, (2) Universidad de Los Andes. Merida. Venezuela)
Constraint Exploration and Envelope of Simulation Trajectories
15 pages, To be presented at the First Workshop on Rule-Based Constraint Reasoning and Programming at the First International Conference on Computational Logic, London, UK, 24th to 28th July, 2000
null
null
null
cs.PL cs.AI cs.LO
null
The implicit theory that a simulation represents is precisely not in the individual choices but rather in the 'envelope' of possible trajectories - what is important is the shape of the whole envelope. Typically a huge amount of computation is required when experimenting with factors bearing on the dynamics of a simulation to tease out what affects the shape of this envelope. In this paper we present a methodology aimed at systematically exploring this envelope. We propose a method for searching for tendencies and proving their necessity relative to a range of parameterisations of the model and agents' choices, and to the logic of the simulation language. The exploration consists of a forward chaining generation of the trajectories associated to and constrained by such a range of parameterisations and choices. Additionally, we propose a computational procedure that helps implement this exploration by translating a Multi Agent System simulation into a constraint-based search over possible trajectories by 'compiling' the simulation rules into a more specific form, namely by partitioning the simulation rules using appropriate modularity in the simulation. An example of this procedure is exhibited. Keywords: Constraint Search, Constraint Logic Programming, Proof, Emergence, Tendencies
[ { "version": "v1", "created": "Mon, 3 Jul 2000 10:10:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Teran", "Oswaldo", "", "1 and 2" ], [ "Edmonds", "Bruce", "" ], [ "Wallis", "Steve", "" ] ]
cs/0007003
Stuart Yeates
Stuart Yeates and David Bainbridge and Ian H. Witten
Using compression to identify acronyms in text
10 pages. A short form published in DCC2000
null
null
Working Paper 00/01
cs.DL cs.IR
null
Text mining is about looking for patterns in natural language text, and may be defined as the process of analyzing text to extract information from it for particular purposes. In previous work, we claimed that compression is a key technology for text mining, and backed this up with a study that showed how particular kinds of lexical tokens---names, dates, locations, etc.---can be identified and located in running text, using compression models to provide the leverage necessary to distinguish different token types (Witten et al., 1999)
[ { "version": "v1", "created": "Tue, 4 Jul 2000 02:02:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Yeates", "Stuart", "" ], [ "Bainbridge", "David", "" ], [ "Witten", "Ian H.", "" ] ]
cs/0007004
Alejandro Zunino
Alejandro Zunino and Analia Amandi
Brainstorm/J: a Java Framework for Intelligent Agents
15 pages. To be published in Proceedings of the Second Argentinian Symposium on Artificial Intelligence (ASAI'2000 - 29th JAIIO). September 2000. Tandil, Buenos Aires, Argentina. See http://www.exa.unicen.edu.ar/~azunino
null
null
null
cs.AI
null
Despite the effort of many researchers in the area of multi-agent systems (MAS) for designing and programming agents, a few years ago the research community began to take into account that common features among different MAS exists. Based on these common features, several tools have tackled the problem of agent development on specific application domains or specific types of agents. As a consequence, their scope is restricted to a subset of the huge application domain of MAS. In this paper we propose a generic infrastructure for programming agents whose name is Brainstorm/J. The infrastructure has been implemented as an object oriented framework. As a consequence, our approach supports a broader scope of MAS applications than previous efforts, being flexible and reusable.
[ { "version": "v1", "created": "Tue, 4 Jul 2000 16:31:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Zunino", "Alejandro", "" ], [ "Amandi", "Analia", "" ] ]
cs/0007005
Ahmed Helmy
Ahmed Helmy, Deborah Estrin, Sandeep Gupta
Systematic Testing of Multicast Routing Protocols: Analysis of Forward and Backward Search Techniques
26 pages, 20 figures
null
null
null
cs.NI cs.DS
null
In this paper, we present a new methodology for developing systematic and automatic test generation algorithms for multipoint protocols. These algorithms attempt to synthesize network topologies and sequences of events that stress the protocol's correctness or performance. This problem can be viewed as a domain-specific search problem that suffers from the state space explosion problem. One goal of this work is to circumvent the state space explosion problem utilizing knowledge of network and fault modeling, and multipoint protocols. The two approaches investigated in this study are based on forward and backward search techniques. We use an extended finite state machine (FSM) model of the protocol. The first algorithm uses forward search to perform reduced reachability analysis. Using domain-specific information for multicast routing over LANs, the algorithm complexity is reduced from exponential to polynomial in the number of routers. This approach, however, does not fully automate topology synthesis. The second algorithm, the fault-oriented test generation, uses backward search for topology synthesis and uses backtracking to generate event sequences instead of searching forward from initial states. Using these algorithms, we have conducted studies for correctness of the multicast routing protocol PIM. We propose to extend these algorithms to study end-to-end multipoint protocols using a virtual LAN that represents delays of the underlying multicast distribution tree.
[ { "version": "v1", "created": "Tue, 4 Jul 2000 21:55:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Helmy", "Ahmed", "" ], [ "Estrin", "Deborah", "" ], [ "Gupta", "Sandeep", "" ] ]
cs/0007006
Hans G. Kaper
Hans G. Kaper (1), Sever Tipei (2) and Jeff M. Wright (2) ((1) Argonne National Laboratory, (2) University of Illinois at Urbana-Champaign)
DISCO: An object-oriented system for music composition and sound design
4 pages, no figures; to be published in Proc. Int'l Computer Music Conference 2000 (Berlin, August 2000)
null
null
null
cs.SD cs.DS cs.SE
null
This paper describes an object-oriented approach to music composition and sound design. The approach unifies the processes of music making and instrument building by using similar logic, objects, and procedures. The composition modules use an abstract representation of musical data, which can be easily mapped onto different synthesis languages or a traditionally notated score. An abstract base class is used to derive classes on different time scales. Objects can be related to act across time scales, as well as across an entire piece, and relationships between similar objects can replicate traditional music operations or introduce new ones. The DISCO (Digital Instrument for Sonification and Composition) system is an open-ended work in progress.
[ { "version": "v1", "created": "Wed, 5 Jul 2000 18:20:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaper", "Hans G.", "" ], [ "Tipei", "Sever", "" ], [ "Wright", "Jeff M.", "" ] ]
cs/0007007
Hans G. Kaper
Hans G. Kaper,(1) Sever Tipei,(2) and Elizabeth Wiebel (1) ((1) Argonne National Laboratory, (2) University of Illinois at Urbana-Champaign)
Data sonification and sound visualization
25 pages, 5 figures, 3 tables; preprint of the published paper (differing in details)
Computing in Science and Engineering, Vol. 1 No. 4, July-August 1999, pp. 48-58
null
ANL/MCS-P738-0199
cs.SD cs.HC cs.MM
null
This article describes a collaborative project between researchers in the Mathematics and Computer Science Division at Argonne National Laboratory and the Computer Music Project of the University of Illinois at Urbana-Champaign. The project focuses on the use of sound for the exploration and analysis of complex data sets in scientific computing. The article addresses digital sound synthesis in the context of DIASS (Digital Instrument for Additive Sound Synthesis) and sound visualization in a virtual-reality environment by means of M4CAVE. It describes the procedures and preliminary results of some experiments in scientific sonification and sound visualization.
[ { "version": "v1", "created": "Wed, 5 Jul 2000 21:26:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaper", "Hans G.", "" ], [ "Tipei", "Sever", "" ], [ "Wiebel", "Elizabeth", "" ] ]
cs/0007008
Jan Heering
M. G. J. van den Brand, J. Heering, P. Klint, P. A. Olivier
Compiling Language Definitions: The ASF+SDF Compiler
36 pages, 5 figures
ACM Transactions on Programming Languages and Systems 24 4 (July 2002) 334-368
null
SEN-R0014
cs.PL cs.SE
null
The ASF+SDF Meta-Environment is an interactive language development environment whose main application areas are definition of domain-specific languages, generation of program analysis and transformation tools, production of software renovation tools, and general specification and prototyping. It uses conditional rewrite rules to define the dynamic semantics and other tool-oriented aspects of languages, so the effectiveness of the generated tools is critically dependent on the quality of the rewrite rule implementation. The ASF+SDF rewrite rule compiler generates C code, thus taking advantage of C's portability and the sophisticated optimization capabilities of current C compilers as well as avoiding potential abstract machine interface bottlenecks. It can handle large (10 000+ rule) language definitions and uses an efficient run-time storage scheme capable of handling large (1 000 000+ node) terms. Term storage uses maximal subterm sharing (hash-consing), which turns out to be more effective in the case of ASF+SDF than in Lisp or SML. Extensive benchmarking has shown the time and space performance of the generated code to be as good as or better than that of the best current rewrite rule and functional language compilers.
[ { "version": "v1", "created": "Thu, 6 Jul 2000 11:38:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Brand", "M. G. J. van den", "" ], [ "Heering", "J.", "" ], [ "Klint", "P.", "" ], [ "Olivier", "P. A.", "" ] ]
cs/0007009
Jan Daciuk
Jan Daciuk, Stoyan Mihov, Bruce Watson, Richard Watson
Incremental construction of minimal acyclic finite-state automata
14 pages, 7 figures
Computational Linguistics, Vol. 26, Number 1, March 2000
null
null
cs.CL
null
In this paper, we describe a new method for constructing minimal, deterministic, acyclic finite-state automata from a set of strings. Traditional methods consist of two phases: the first to construct a trie, the second one to minimize it. Our approach is to construct a minimal automaton in a single phase by adding new strings one by one and minimizing the resulting automaton on-the-fly. We present a general algorithm as well as a specialization that relies upon the lexicographical ordering of the input strings.
[ { "version": "v1", "created": "Thu, 6 Jul 2000 14:15:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Daciuk", "Jan", "" ], [ "Mihov", "Stoyan", "" ], [ "Watson", "Bruce", "" ], [ "Watson", "Richard", "" ] ]
cs/0007010
Gerard Escudero Bakx
Gerard Escudero, Lluis Marquez, German Rigau
Boosting Applied to Word Sense Disambiguation
12 pages
Proceedings of the 11th European Conference on Machine Learning, ECML'2000 pp. 129-141
null
null
cs.CL cs.AI
null
In this paper Schapire and Singer's AdaBoost.MH boosting algorithm is applied to the Word Sense Disambiguation (WSD) problem. Initial experiments on a set of 15 selected polysemous words show that the boosting approach surpasses Naive Bayes and Exemplar-based approaches, which represent state-of-the-art accuracy on supervised WSD. In order to make boosting practical for a real learning domain of thousands of words, several ways of accelerating the algorithm by reducing the feature space are studied. The best variant, which we call LazyBoosting, is tested on the largest sense-tagged corpus available containing 192,800 examples of the 191 most frequent and ambiguous English words. Again, boosting compares favourably to the other benchmark algorithms.
[ { "version": "v1", "created": "Fri, 7 Jul 2000 14:10:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Escudero", "Gerard", "" ], [ "Marquez", "Lluis", "" ], [ "Rigau", "German", "" ] ]
cs/0007011
Gerard Escudero Bakx
Gerard Escudero, Lluis Marquez, German Rigau
Naive Bayes and Exemplar-Based approaches to Word Sense Disambiguation Revisited
5 pages
Proceedings of the 14th European Conference on Artificial Intelligence, ECAI'2000 pp. 421-425
null
null
cs.CL cs.AI
null
This paper describes an experimental comparison between two standard supervised learning methods, namely Naive Bayes and Exemplar-based classification, on the Word Sense Disambiguation (WSD) problem. The aim of the work is twofold. Firstly, it attempts to contribute to clarify some confusing information about the comparison between both methods appearing in the related literature. In doing so, several directions have been explored, including: testing several modifications of the basic learning algorithms and varying the feature space. Secondly, an improvement of both algorithms is proposed, in order to deal with large attribute sets. This modification, which basically consists in using only the positive information appearing in the examples, allows to improve greatly the efficiency of the methods, with no loss in accuracy. The experiments have been performed on the largest sense-tagged corpus available containing the most frequent and ambiguous English words. Results show that the Exemplar-based approach to WSD is generally superior to the Bayesian approach, especially when a specific metric for dealing with symbolic attributes is used.
[ { "version": "v1", "created": "Fri, 7 Jul 2000 15:00:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Escudero", "Gerard", "" ], [ "Marquez", "Lluis", "" ], [ "Rigau", "German", "" ] ]
cs/0007012
Francis Wolinski
Francis Wolinski, Frantz Vichot, Mathieu Stricker
Using Learning-based Filters to Detect Rule-based Filtering Obsolescence
13 pages, 12 figures, Content-based Multimedia Information Access, RIAO 2000
null
null
null
cs.CL cs.AI
null
For years, Caisse des Depots et Consignations has produced information filtering applications. To be operational, these applications require high filtering performances which are achieved by using rule-based filters. With this technique, an administrator has to tune a set of rules for each topic. However, filters become obsolescent over time. The decrease of their performances is due to diachronic polysemy of terms that involves a loss of precision and to diachronic polymorphism of concepts that involves a loss of recall. To help the administrator to maintain his filters, we have developed a method which automatically detects filtering obsolescence. It consists in making a learning-based control filter using a set of documents which have already been categorised as relevant or not relevant by the rule-based filter. The idea is to supervise this filter by processing a differential comparison of its outcomes with those of the control one. This method has many advantages. It is simple to implement since the training set used by the learning is supplied by the rule-based filter. Thus, both the making and the use of the control filter are fully automatic. With automatic detection of obsolescence, learning-based filtering finds a rich application which offers interesting prospects.
[ { "version": "v1", "created": "Fri, 7 Jul 2000 15:13:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolinski", "Francis", "" ], [ "Vichot", "Frantz", "" ], [ "Stricker", "Mathieu", "" ] ]
cs/0007013
Gerald Penn
Gerald Penn
Applying Constraint Handling Rules to HPSG
To appear, Proceedings of First Workshop on Rule-Based Constraint Reasoning and Programming, CL2000; 14 pages
null
null
null
cs.CL cs.PL
null
Constraint Handling Rules (CHR) have provided a realistic solution to an over-arching problem in many fields that deal with constraint logic programming: how to combine recursive functions or relations with constraints while avoiding non-termination problems. This paper focuses on some other benefits that CHR, specifically their implementation in SICStus Prolog, have provided to computational linguists working on grammar design tools. CHR rules are applied by means of a subsumption check and this check is made only when their variables are instantiated or bound. The former functionality is at best difficult to simulate using more primitive coroutining statements such as SICStus when/2, and the latter simply did not exist in any form before CHR. For the sake of providing a case study in how these can be applied to grammar development, we consider the Attribute Logic Engine (ALE), a Prolog preprocessor for logic programming with typed feature structures, and its extension to a complete grammar development system for Head-driven Phrase Structure Grammar (HPSG), a popular constraint-based linguistic theory that uses typed feature structures. In this context, CHR can be used not only to extend the constraint language of feature structure descriptions to include relations in a declarative way, but also to provide support for constraints with complex antecedents and constraints on the co-occurrence of feature values that are necessary to interpret the type system of HPSG properly.
[ { "version": "v1", "created": "Fri, 7 Jul 2000 19:09:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Penn", "Gerald", "" ] ]
cs/0007015
Ted Herman
Ted Herman
Phase Clocks for Transient Fault Repair
22 pages, LaTeX
null
null
TR99-08
cs.DC
null
Phase clocks are synchronization tools that implement a form of logical time in distributed systems. For systems tolerating transient faults by self-repair of damaged data, phase clocks can enable reasoning about the progress of distributed repair procedures. This paper presents a phase clock algorithm suited to the model of transient memory faults in asynchronous systems with read/write registers. The algorithm is self-stabilizing and guarantees accuracy of phase clocks within O(k) time following an initial state that is k-faulty. Composition theorems show how the algorithm can be used for the timing of distributed procedures that repair system outputs.
[ { "version": "v1", "created": "Mon, 10 Jul 2000 15:59:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Herman", "Ted", "" ] ]
cs/0007016
Francis Wolinski
Mathieu Stricker, Frantz Vichot, Gerard Dreyfus, Francis Wolinski
Two Steps Feature Selection and Neural Network Classification for the TREC-8 Routing
5 pages, 1 figure, Eighth International Text REtrieval Conference (TREC-8)
null
null
null
cs.CL cs.AI
null
For the TREC-8 routing, one specific filter is built for each topic. Each filter is a classifier trained to recognize the documents that are relevant to the topic. When presented with a document, each classifier estimates the probability for the document to be relevant to the topic for which it has been trained. Since the procedure for building a filter is topic-independent, the system is fully automatic. By making use of a sample of documents that have previously been evaluated as relevant or not relevant to a particular topic, a term selection is performed, and a neural network is trained. Each document is represented by a vector of frequencies of a list of selected terms. This list depends on the topic to be filtered; it is constructed in two steps. The first step defines the characteristic words used in the relevant documents of the corpus; the second one chooses, among the previous list, the most discriminant ones. The length of the vector is optimized automatically for each topic. At the end of the term selection, a vector of typically 25 words is defined for the topic, so that each document which has to be processed is represented by a vector of term frequencies. This vector is subsequently input to a classifier that is trained from the same sample. After training, the classifier estimates for each document of a test set its probability of being relevant; for submission to TREC, the top 1000 documents are ranked in order of decreasing relevance.
[ { "version": "v1", "created": "Tue, 11 Jul 2000 13:21:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Stricker", "Mathieu", "" ], [ "Vichot", "Frantz", "" ], [ "Dreyfus", "Gerard", "" ], [ "Wolinski", "Francis", "" ] ]
cs/0007017
Ralf Schweiger
R. Schweiger (University Giessen), S. Hoelzer (Giessen), J. Dudeck (Giessen)
Fuzzy data: XML may handle it
15 pages, 6 figures
null
null
null
cs.IR
null
Data modeling is one of the most difficult tasks in application engineering. The engineer must be aware of the use cases and the required application services and at a certain point of time he has to fix the data model which forms the base for the application services. However, once the data model has been fixed it is difficult to consider changing needs. This might be a problem in specific domains, which are as dynamic as the healthcare domain. With fuzzy data we address all those data that are difficult to organize in a single database. In this paper we discuss a gradual and pragmatic approach that uses the XML technology to conquer more model flexibility. XML may provide the clue between unstructured text data and structured database solutions and shift the paradigm from "organizing the data along a given model" towards "organizing the data along user requirements".
[ { "version": "v1", "created": "Thu, 13 Jul 2000 07:58:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Schweiger", "R.", "", "University Giessen" ], [ "Hoelzer", "S.", "", "Giessen" ], [ "Dudeck", "J.", "", "Giessen" ] ]
cs/0007018
Jakub Zavrel
Jakub Zavrel and Walter Daelemans
Bootstrapping a Tagged Corpus through Combination of Existing Heterogeneous Taggers
4 pages
Proceedings of the 2nd International Conference on Language Resources and Evaluation (LREC 2000), pp. 17--20
null
null
cs.CL
null
This paper describes a new method, Combi-bootstrap, to exploit existing taggers and lexical resources for the annotation of corpora with new tagsets. Combi-bootstrap uses existing resources as features for a second level machine learning module, that is trained to make the mapping to the new tagset on a very small sample of annotated corpus material. Experiments show that Combi-bootstrap: i) can integrate a wide variety of existing resources, and ii) achieves much higher accuracy (up to 44.7 % error reduction) than both the best single tagger and an ensemble tagger constructed out of the same small training sample.
[ { "version": "v1", "created": "Thu, 13 Jul 2000 12:46:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Zavrel", "Jakub", "" ], [ "Daelemans", "Walter", "" ] ]
cs/0007019
Joseph O'Rourke
Erik D. Demaine, Martin L. Demaine, Anna Lubiw, Joseph O'Rourke
Examples, Counterexamples, and Enumeration Results for Foldings and Unfoldings between Polygons and Polytopes
54 pages, 33 figures
null
null
Smith Technical Report 069
cs.CG cs.DM
null
We investigate how to make the surface of a convex polyhedron (a polytope) by folding up a polygon and gluing its perimeter shut, and the reverse process of cutting open a polytope and unfolding it to a polygon. We explore basic enumeration questions in both directions: Given a polygon, how many foldings are there? Given a polytope, how many unfoldings are there to simple polygons? Throughout we give special attention to convex polygons, and to regular polygons. We show that every convex polygon folds to an infinite number of distinct polytopes, but that their number of combinatorially distinct gluings is polynomial. There are, however, simple polygons with an exponential number of distinct gluings. In the reverse direction, we show that there are polytopes with an exponential number of distinct cuttings that lead to simple unfoldings. We establish necessary conditions for a polytope to have convex unfoldings, implying, for example, that among the Platonic solids, only the tetrahedron has a convex unfolding. We provide an inventory of the polytopes that may unfold to regular polygons, showing that, for n>6, there is essentially only one class of such polytopes.
[ { "version": "v1", "created": "Thu, 13 Jul 2000 14:56:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Lubiw", "Anna", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/0007020
Robert Givan
Robert Givan and David McAllester
Polynomial-time Computation via Local Inference Relations
22 pages. Appeared in Knowledge Representation and Reasoning,1993. Submitted to ACM Transactions on Computational Logic Correction: original conference appearance was 1992, not 1993
null
null
null
cs.LO cs.AI cs.PL
null
We consider the concept of a local set of inference rules. A local rule set can be automatically transformed into a rule set for which bottom-up evaluation terminates in polynomial time. The local-rule-set transformation gives polynomial-time evaluation strategies for a large variety of rule sets that cannot be given terminating evaluation strategies by any other known automatic technique. This paper discusses three new results. First, it is shown that every polynomial-time predicate can be defined by an (unstratified) local rule set. Second, a new machine-recognizable subclass of the local rule sets is identified. Finally we show that locality, as a property of rule sets, is undecidable in general.
[ { "version": "v1", "created": "Thu, 13 Jul 2000 17:19:43 GMT" }, { "version": "v2", "created": "Fri, 14 Jul 2000 15:40:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Givan", "Robert", "" ], [ "McAllester", "David", "" ] ]
cs/0007021
Joseph O'Rourke
Erik D. Demaine, Martin L. Demaine, Joseph O'Rourke
PushPush and Push-1 are NP-hard in 2D
10 pages, 11 figures. Corrects an error in the conference version: Proc. of the 12th Canadian Conference on Computational Geometry, August 2000, pp. 211-219
null
null
null
cs.CG cs.DM
null
We prove that two pushing-blocks puzzles are intractable in 2D. One of our constructions improves an earlier result that established intractability in 3D [OS99] for a puzzle inspired by the game PushPush. The second construction answers a question we raised in [DDO00] for a variant we call Push-1. Both puzzles consist of unit square blocks on an integer lattice; all blocks are movable. An agent may push blocks (but never pull them) in attempting to move between given start and goal positions. In the PushPush version, the agent can only push one block at a time, and moreover when a block is pushed it slides the maximal extent of its free range. In the Push-1 version, the agent can only push one block one square at a time, the minimal extent---one square. Both NP-hardness proofs are by reduction from SAT, and rely on a common construction.
[ { "version": "v1", "created": "Thu, 13 Jul 2000 17:34:58 GMT" }, { "version": "v2", "created": "Sun, 3 Sep 2000 14:57:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/0007022
Steven Bird
Steven Bird, David Day, John Garofolo, John Henderson, Christophe Laprun, Mark Liberman
ATLAS: A flexible and extensible architecture for linguistic annotation
8 pages, 9 figures
Proceedings of the Second International Conference on Language Resources and Evaluation, pp. 1699-1706, Paris: European Language Resources Association, 2000
null
null
cs.CL
null
We describe a formal model for annotating linguistic artifacts, from which we derive an application programming interface (API) to a suite of tools for manipulating these annotations. The abstract logical model provides for a range of storage formats and promotes the reuse of tools that interact through this API. We focus first on ``Annotation Graphs,'' a graph model for annotations on linear signals (such as text and speech) indexed by intervals, for which efficient database storage and querying techniques are applicable. We note how a wide range of existing annotated corpora can be mapped to this annotation graph model. This model is then generalized to encompass a wider variety of linguistic ``signals,'' including both naturally occuring phenomena (as recorded in images, video, multi-modal interactions, etc.), as well as the derived resources that are increasingly important to the engineering of natural language processing systems (such as word lists, dictionaries, aligned bilingual corpora, etc.). We conclude with a review of the current efforts towards implementing key pieces of this architecture.
[ { "version": "v1", "created": "Thu, 13 Jul 2000 18:26:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Bird", "Steven", "" ], [ "Day", "David", "" ], [ "Garofolo", "John", "" ], [ "Henderson", "John", "" ], [ "Laprun", "Christophe", "" ], [ "Liberman", "Mark", "" ] ]
cs/0007023
Steven Bird
Steven Bird, Peter Buneman and Wang-Chiew Tan
Towards a query language for annotation graphs
8 pages, 10 figures
Proceedings of the Second International Conference on Language Resources and Evaluation, pp. 807-814, Paris: European Language Resources Association, 2000
null
null
cs.CL cs.DB
null
The multidimensional, heterogeneous, and temporal nature of speech databases raises interesting challenges for representation and query. Recently, annotation graphs have been proposed as a general-purpose representational framework for speech databases. Typical queries on annotation graphs require path expressions similar to those used in semistructured query languages. However, the underlying model is rather different from the customary graph models for semistructured data: the graph is acyclic and unrooted, and both temporal and inclusion relationships are important. We develop a query language and describe optimization techniques for an underlying relational representation.
[ { "version": "v1", "created": "Thu, 13 Jul 2000 18:40:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Bird", "Steven", "" ], [ "Buneman", "Peter", "" ], [ "Tan", "Wang-Chiew", "" ] ]
cs/0007024
Steven Bird
David Graff and Steven Bird
Many uses, many annotations for large speech corpora: Switchboard and TDT as case studies
7 pages, 2 figures
Proceedings of the Second International Conference on Language Resources and Evaluation, pp. 427-433, Paris: European Language Resources Association, 2000
null
null
cs.CL
null
This paper discusses the challenges that arise when large speech corpora receive an ever-broadening range of diverse and distinct annotations. Two case studies of this process are presented: the Switchboard Corpus of telephone conversations and the TDT2 corpus of broadcast news. Switchboard has undergone two independent transcriptions and various types of additional annotation, all carried out as separate projects that were dispersed both geographically and chronologically. The TDT2 corpus has also received a variety of annotations, but all directly created or managed by a core group. In both cases, issues arise involving the propagation of repairs, consistency of references, and the ability to integrate annotations having different formats and levels of detail. We describe a general framework whereby these issues can be addressed successfully.
[ { "version": "v1", "created": "Thu, 13 Jul 2000 18:51:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Graff", "David", "" ], [ "Bird", "Steven", "" ] ]
cs/0007025
Lane A. Hemaspaandra
Christian Glasser and Lane A. Hemaspaandra
A Moment of Perfect Clarity I: The Parallel Census Technique
8 pages
null
null
null
cs.CC
null
We discuss the history and uses of the parallel census technique---an elegant tool in the study of certain computational objects having polynomially bounded census functions. A sequel will discuss advances (including Cai, Naik, and Sivakumar [CNS95] and Glasser [Gla00]), some related to the parallel census technique and some due to other approaches, in the complexity-class collapses that follow if NP has sparse hard sets under reductions weaker than (full) truth-table reductions.
[ { "version": "v1", "created": "Thu, 13 Jul 2000 22:14:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Glasser", "Christian", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
cs/0007026
Ron Kohavi
Suhail Ansari, Ron Kohavi, Llew Mason, and Zijian Zheng
Integrating E-Commerce and Data Mining: Architecture and Challenges
KDD workshop: WebKDD 2000
WEBKDD'2000 workshop: Web Mining for E-Commerce -- Challenges and Opportunities
null
null
cs.LG cs.AI cs.CV cs.DB
null
We show that the e-commerce domain can provide all the right ingredients for successful data mining and claim that it is a killer domain for data mining. We describe an integrated architecture, based on our expe-rience at Blue Martini Software, for supporting this integration. The architecture can dramatically reduce the pre-processing, cleaning, and data understanding effort often documented to take 80% of the time in knowledge discovery projects. We emphasize the need for data collection at the application server layer (not the web server) in order to support logging of data and metadata that is essential to the discovery process. We describe the data transformation bridges required from the transaction processing systems and customer event streams (e.g., clickstreams) to the data warehouse. We detail the mining workbench, which needs to provide multiple views of the data through reporting, data mining algorithms, visualization, and OLAP. We con-clude with a set of challenges.
[ { "version": "v1", "created": "Fri, 14 Jul 2000 00:33:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Ansari", "Suhail", "" ], [ "Kohavi", "Ron", "" ], [ "Mason", "Llew", "" ], [ "Zheng", "Zijian", "" ] ]
cs/0007027
Michael Frumkin
Michael A. Frumkin, Rob F. Van der Wijngaart
Efficient cache use for stencil operations on structured discretization grids
tex .tar.gz file, including ps file, 16 pagest, 5 figures, 2 Appendicies
null
null
null
cs.PF cs.CC
null
We derive tight bounds on cache misses for evaluation of explicit stencil operators on structured grids. Our lower bound is based on the isoperimetrical property of the discrete octahedron. Our upper bound is based on good surface to volume ratio of a parallelepiped spanned by a reduced basis of the inter- ference lattice of a grid. Measurements show that our algorithm typically reduces the number of cache misses by factor of three relative to a compiler optimized code. We show that stencil calculations on grids whose interference lattice have a short vector feature abnormally high numbers of cache misses. We call such grids unfavorable and suggest to avoid these in computations by appropriate padding. By direct measurements on MIPS R10000 we show a good correlation of abnormally high cache misses and unfavorable three-dimensional grids.
[ { "version": "v1", "created": "Fri, 14 Jul 2000 17:44:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Frumkin", "Michael A.", "" ], [ "Van der Wijngaart", "Rob F.", "" ] ]
cs/0007028
Po-Han Lin
Po-Han Lin
Base Encryption: Dynamic algorithms, Keys, and Symbol Set
html page
null
null
null
cs.CR cs.CC
null
All the current modern encryption algorithms utilize fixed symbols for plaintext and cyphertext. What I mean by fixed is that there is a set and limited number of symbols to represent the characters, numbers, and punctuations. In addition, they are usually the same (the plaintext symbols have the same and equivalent counterpart in the cyphertext symbols). Almost all the encryption algorithms rely on a predefined keyspace and length for the encryption/decription keys, and it is usually fixed (number of bits). In addition, the algorithms used by the encryptions are static. There is a predefined number of operatiors, and a predefined order (loops included) of operations. The algorithm stays the same, and the plaintext and cyphertext along with the key are churned through this cypherblock. Base Encryption does the opposite: It utilizes the novel concepts of base conversion, symbol remapping, and dynamic algorithms (dynamic operators and dynamic operations). Base Encryption solves the weakness in todays encryption schemes, namely... Fixed symbols (base) Fixed keylengths Fixed algorithms (fixed number of operations and operators) Unique features... Immune from plain-text-attacks. Immune from brute-force-attacks. Can utilize throwaway algorithms (as opposed to throw away keys). Plug-And-Play engine (other cyphers can be augmentated to it)
[ { "version": "v1", "created": "Tue, 18 Jul 2000 16:44:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Lin", "Po-Han", "" ] ]
cs/0007029
Gabriel Istrate
Gabriel Istrate
Dimension-Dependent behavior in the satisfability of random k-Horn formulae
null
null
null
null
cs.DS
null
We determine the asymptotical satisfiability probability of a random at-most-k-Horn formula, via a probabilistic analysis of a simple version, called PUR, of positive unit resolution. We show that for k=k(n)->oo the problem can be ``reduced'' to the case k(n)=n, that was solved in cs.DS/9912001. On the other hand, in the case k= a constant the behavior of PUR is modeled by a simple queuing chain, leading to a closed-form solution when k=2. Our analysis predicts an ``easy-hard-easy'' pattern in this latter case. Under a rescaled parameter, the graphs of satisfaction probability corresponding to finite values of k converge to the one for the uniform case, a ``dimension-dependent behavior'' similar to the one found experimentally by Kirkpatrick and Selman (Science'94) for k-SAT. The phenomenon is qualitatively explained by a threshold property for the number of iterations of PUR makes on random satisfiable Horn formulas.
[ { "version": "v1", "created": "Tue, 18 Jul 2000 21:50:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
cs/0007031
Victor Kromer
Victor Kromer
Parameter-free Model of Rank Polysemantic Distribution
3 pages, no figures
Proceedings of the 4th conference of the International Quantitative Linguistics Association (QUALICO 2000). Prague, August 24-26, 2000. P. 21-22.The full version (in Russian) is available in Web Journal FCCL. See URL http://fccl.ksu.ru/fcclpap.htm
null
null
cs.CL
null
A model of rank polysemantic distribution with a minimal number of fitting parameters is offered. In an ideal case a parameter-free description of the dependence on the basis of one or several immediate features of the distribution is possible.
[ { "version": "v1", "created": "Fri, 21 Jul 2000 06:07:31 GMT" }, { "version": "v2", "created": "Mon, 24 Jul 2000 04:17:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Kromer", "Victor", "" ] ]
cs/0007032
Konstantinos Georgatos
Konstantinos Georgatos
Knowledge on Treelike Spaces
31 pages
Studia Logica, 1(59), 1997
null
null
cs.LO cs.AI
null
This paper presents a bimodal logic for reasoning about knowledge during knowledge acquisition. One of the modalities represents (effort during) non-deterministic time and the other represents knowledge. The semantics of this logic are tree-like spaces which are a generalization of semantics used for modeling branching time and historical necessity. A finite system of axiom schemes is shown to be canonically complete for the formentioned spaces. A characterization of the satisfaction relation implies the small model property and decidability for this system.
[ { "version": "v1", "created": "Fri, 21 Jul 2000 09:52:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Georgatos", "Konstantinos", "" ] ]
cs/0007033
Konstantinos Georgatos
Konstantinos Georgatos
To Preference via Entrenchment
16 pages
Annals Of Pure And Applied Logic, (96)1-3, pages 141-155, 1999
null
null
cs.LO cs.AI
null
We introduce a simple generalization of Gardenfors and Makinson's epistemic entrenchment called partial entrenchment. We show that preferential inference can be generated as the sceptical counterpart of an inference mechanism defined directly on partial entrenchment.
[ { "version": "v1", "created": "Fri, 21 Jul 2000 10:16:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Georgatos", "Konstantinos", "" ] ]
cs/0007034
Png Ipl
Ivan Png
The Competitiveness of On-Line vis-a-vis Conventional Retailing: A Preliminary Study
11th NEC Research Symposium
null
null
null
cs.OH
null
Previous research has directly studied whether on-line retailing is more competitive than conventional retail markets. The evidence from books and music CDs is mixed. Here, I use an indirect approach to compare the competitiveness of on-line with conventional markets. Focusing on the retail market for books, I identify a peculiarity in the pricing of bestsellers relative to other titles. Supposing that competitive barriers are lower in on-line retailing, I analyze how the lower barriers would affect the relative pricing of bestsellers. The empirical data indicates that on-line retailing is more competitive than conventional retailing.
[ { "version": "v1", "created": "Tue, 25 Jul 2000 05:54:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Png", "Ivan", "" ] ]
cs/0007035
Llu\'is Padr\'o
J. Daude, L. Padro & G. Rigau
Mapping WordNets Using Structural Information
8 pages, uses epsfig. To appear in ACL'2000 proceedings
38th Anual Meeting of the Association for Computational Linguistics (ACL'2000). Hong Kong, October 2000.
null
null
cs.CL
null
We present a robust approach for linking already existing lexical/semantic hierarchies. We used a constraint satisfaction algorithm (relaxation labeling) to select --among a set of candidates-- the node in a target taxonomy that bests matches each node in a source taxonomy. In particular, we use it to map the nominal part of WordNet 1.5 onto WordNet 1.6, with a very high precision and a very low remaining ambiguity.
[ { "version": "v1", "created": "Tue, 25 Jul 2000 17:20:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Daude", "J.", "" ], [ "Padro", "L.", "" ], [ "Rigau", "G.", "" ] ]
cs/0007036
Rui Vilela Mendes
J. F. Martins (EST-IPS, Setubal), J. A. Dente (IST, Lisboa), A. J. Pires (EST-IPS, Setubal) and R. Vilela Mendes (GFM, UL, Lisboa)
Language identification of controlled systems: Modelling, control and anomaly detection
27 pages Latex, 18 figures
IEEE Trans. in Systems, Man and Cybernetics 31 (2001) 234
null
null
cs.CL
null
Formal language techniques have been used in the past to study autonomous dynamical systems. However, for controlled systems, new features are needed to distinguish between information generated by the system and input control. We show how the modelling framework for controlled dynamical systems leads naturally to a formulation in terms of context-dependent grammars. A learning algorithm is proposed for on-line generation of the grammar productions, this formulation being then used for modelling, control and anomaly detection. Practical applications are described for electromechanical drives. Grammatical interpolation techniques yield accurate results and the pattern detection capabilities of the language-based formulation makes it a promising technique for the early detection of anomalies or faulty behaviour.
[ { "version": "v1", "created": "Tue, 25 Jul 2000 17:40:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Martins", "J. F.", "", "EST-IPS, Setubal" ], [ "Dente", "J. A.", "", "IST, Lisboa" ], [ "Pires", "A. J.", "", "EST-IPS, Setubal" ], [ "Mendes", "R. Vilela", "", "GFM, UL, Lisboa" ] ]
cs/0007037
Konstantinos Georgatos
Konstantinos Georgatos
Knowledge Theoretic Properties of Topological Spaces
14 pages
In Knowledge Representation and Uncertainty. M. Masuch and L. Polos, Eds. Lecture Notes in Artificial Intelligence, vol. 808, pages 147-159, Springer-Verlag, 1994
null
null
cs.LO
null
We study the topological models of a logic of knowledge for topological reasoning, introduced by Larry Moss and Rohit Parikh. Among our results is a solution of a conjecture by the formentioned authors, finite satisfiability property and decidability for the theory of topological models.
[ { "version": "v1", "created": "Wed, 26 Jul 2000 18:36:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Georgatos", "Konstantinos", "" ] ]
cs/0007038
Konstantinos Georgatos
Konstantinos Georgatos
Modal Logics for Topological Spaces
25 pages, extened abstract of PHD Dissertation
null
null
null
cs.LO cs.AI
null
In this thesis we shall present two logical systems, MP and MP, for the purpose of reasoning about knowledge and effort. These logical systems will be interpreted in a spatial context and therefore, the abstract concepts of knowledge and effort will be defined by concrete mathematical concepts.
[ { "version": "v1", "created": "Wed, 26 Jul 2000 18:41:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Georgatos", "Konstantinos", "" ] ]
cs/0007039
Konstantinos Georgatos
Konstantinos Georgatos
Ordering-based Representations of Rational Inference
26 pages, appeared in conference proceedings, contains proofs
In the Proceedings of the European Workshop on Logics in AI (JELIA '96). J.J. Alferes, L.M. Pereira and E. Orlowska, Eds. Lecture Notes in Artificial Intelligence, vol. 1126, pages 176-191, Springer-Verlag, 1996
null
null
cs.LO cs.AI
null
Rational inference relations were introduced by Lehmann and Magidor as the ideal systems for drawing conclusions from a conditional base. However, there has been no simple characterization of these relations, other than its original representation by preferential models. In this paper, we shall characterize them with a class of total preorders of formulas by improving and extending Gardenfors and Makinson's results for expectation inference relations. A second representation is application-oriented and is obtained by considering a class of consequence operators that grade sets of defaults according to our reliance on them. The finitary fragment of this class of consequence operators has been employed by recent default logic formalisms based on maxiconsistency.
[ { "version": "v1", "created": "Wed, 26 Jul 2000 18:58:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Georgatos", "Konstantinos", "" ] ]
cs/0007040
Konstantinos Georgatos
Konstantinos Georgatos
Entrenchment Relations: A Uniform Approach to Nonmonotonicity
22 pages, a paper in preliminary form that appeared later in conference proceedings
In the Proceedings of the International Joint Conference on Qualitative and Quantitative Practical Reasoning (ESCQARU/FAPR 97), Lecture Notes in Artificial Intelligence, vol. 1244, pages 282-297, Springer-Verlag, 1997
null
null
cs.LO cs.AI
null
We show that Gabbay's nonmonotonic consequence relations can be reduced to a new family of relations, called entrenchment relations. Entrenchment relations provide a direct generalization of epistemic entrenchment and expectation ordering introduced by Gardenfors and Makinson for the study of belief revision and expectation inference, respectively.
[ { "version": "v1", "created": "Wed, 26 Jul 2000 19:20:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Georgatos", "Konstantinos", "" ] ]
cs/0007041
Konstantinos Georgatos
Gianni Amati, Konstantinos Georgatos
Relevance as Deduction: A Logical View of Information Retrieval
6 pages, Abstract
In F. Crestani and M. Lalmas, editors, Proceedings of the Second Workshop on Information Retrieval, Uncertainty and Logic WIRUL'96, pages 21--26. University of Glasgow, Glasgow, Scotland, 1996
null
TR-1996-29
cs.IR cs.LO
null
The problem of Information Retrieval is, given a set of documents D and a query q, providing an algorithm for retrieving all documents in D relevant to q. However, retrieval should depend and be updated whenever the user is able to provide as an input a preferred set of relevant documents; this process is known as em relevance feedback. Recent work in IR has been paying great attention to models which employ a logical approach; the advantage being that one can have a simple computable characterization of retrieval on the basis of a pure logical analysis of retrieval. Most of the logical models make use of probabilities or similar belief functions in order to introduce the inductive component whereby uncertainty is treated. Their general paradigm is the following: em find the nature of conditional $d\imp q$ and then define a probability on the top of it. We just reverse this point of view; first use the numerical information, frequencies or probabilities, then define your own logical consequence. More generally, we claim that retrieval is a form of deduction. We introduce a simple but powerful logical framework of relevance feedback, derived from the well founded area of nonmonotonic logic. This description can help us evaluate, describe and compare from a theoretical point of view previous approaches based on conditionals or probabilities.
[ { "version": "v1", "created": "Wed, 26 Jul 2000 19:34:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Amati", "Gianni", "" ], [ "Georgatos", "Konstantinos", "" ] ]
cs/0007042
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 39
4 pages, 2 figures. To appear in SIGACT News and in Int. J. Comp. Geom. Appl
SIGACT News 31(3): 47-49 (2000)
null
null
cs.CG cs.DM
null
The resolution of a decades-old open problem is described: polygonal chains cannot lock in the plane.
[ { "version": "v1", "created": "Sat, 29 Jul 2000 14:54:50 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/0007043
Suman Kumar Nath
Suman Kumar Nath, Rezaul Alam Chowdhury, M. Kaykobad
Min-Max Fine Heaps
6 pages, pdf file
null
null
null
cs.DS
null
In this paper we present a new data structure for double ended priority queue, called min-max fine heap, which combines the techniques used in fine heap and traditional min-max heap. The standard operations on this proposed structure are also presented, and their analysis indicates that the new structure outperforms the traditional one.
[ { "version": "v1", "created": "Mon, 31 Jul 2000 00:13:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Nath", "Suman Kumar", "" ], [ "Chowdhury", "Rezaul Alam", "" ], [ "Kaykobad", "M.", "" ] ]
cs/0007044
Avigdor Gal
Avigdor Gal and Jonathan Eckstein
Managing Periodically Updated Data in Relational Databases: A Stochastic Modeling Approach
null
null
null
RRR-37-2000
cs.DB
null
Recent trends in information management involve the periodic transcription of data onto secondary devices in a networked environment, and the proper scheduling of these transcriptions is critical for efficient data management. To assist in the scheduling process, we are interested in modeling the reduction of consistency over time between a relation and its replica, termed obsolescence of data. The modeling is based on techniques from the field of stochastic processes, and provides several stochastic models for content evolution in the base relations of a database, taking referential integrity constraints into account. These models are general enough to accommodate most of the common scenarios in databases, including batch insertions and life spans both with and without memory. As an initial "proof of concept" of the applicability of our approach, we validate the insertion portion of our model framework via experiments with real data feeds. We also discuss a set of transcription protocols which make use of the proposed stochastic model.
[ { "version": "v1", "created": "Mon, 31 Jul 2000 20:15:08 GMT" }, { "version": "v2", "created": "Mon, 11 Jun 2001 08:13:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Gal", "Avigdor", "" ], [ "Eckstein", "Jonathan", "" ] ]
cs/0008001
Randal E. Bryant
Randal E. Bryant, Miroslav N. Velev
Boolean Satisfiability with Transitivity Constraints
Submitted to ACM Transactions on Computational Logic
null
null
null
cs.LO
null
We consider a variant of the Boolean satisfiability problem where a subset E of the propositional variables appearing in formula Fsat encode a symmetric, transitive, binary relation over N elements. Each of these relational variables, e[i,j], for 1 <= i < j <= N, expresses whether or not the relation holds between elements i and j. The task is to either find a satisfying assignment to Fsat that also satisfies all transitivity constraints over the relational variables (e.g., e[1,2] & e[2,3] ==> e[1,3]), or to prove that no such assignment exists. Solving this satisfiability problem is the final and most difficult step in our decision procedure for a logic of equality with uninterpreted functions. This procedure forms the core of our tool for verifying pipelined microprocessors. To use a conventional Boolean satisfiability checker, we augment the set of clauses expressing Fsat with clauses expressing the transitivity constraints. We consider methods to reduce the number of such clauses based on the sparse structure of the relational variables. To use Ordered Binary Decision Diagrams (OBDDs), we show that for some sets E, the OBDD representation of the transitivity constraints has exponential size for all possible variable orderings. By considering only those relational variables that occur in the OBDD representation of Fsat, our experiments show that we can readily construct an OBDD representation of the relevant transitivity constraints and thus solve the constrained satisfiability problem.
[ { "version": "v1", "created": "Tue, 1 Aug 2000 13:51:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Bryant", "Randal E.", "" ], [ "Velev", "Miroslav N.", "" ] ]
cs/0008003
Stephan Busemann
Stephan Busemann
Interfacing Constraint-Based Grammars and Generation Algorithms
8 pages, uses colacl.sty
Proc. Workshop on Analysis for Generation, 1st International Natural Language Generation Conference, Mitzpe Ramon, Israel, June 12, 2000. pp. 14-21
null
null
cs.CL
null
Constraint-based grammars can, in principle, serve as the major linguistic knowledge source for both parsing and generation. Surface generation starts from input semantics representations that may vary across grammars. For many declarative grammars, the concept of derivation implicitly built in is that of parsing. They may thus not be interpretable by a generation algorithm. We show that linguistically plausible semantic analyses can cause severe problems for semantic-head-driven approaches for generation (SHDG). We use SeReal, a variant of SHDG and the DISCO grammar of German as our source of examples. We propose a new, general approach that explicitly accounts for the interface between the grammar and the generation algorithm by adding a control-oriented layer to the linguistic knowledge base that reorganizes the semantics in a way suitable for generation.
[ { "version": "v1", "created": "Mon, 7 Aug 2000 16:06:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Busemann", "Stephan", "" ] ]
cs/0008004
Alexander Yeh
Alexander Yeh
Comparing two trainable grammatical relations finders
5 pages, uses colacl.sty
18th International Conference on Computational Linguistics (COLING 2000), pages 1146-1150, Saarbruecken, Germany, July, 2000
null
null
cs.CL
null
Grammatical relationships (GRs) form an important level of natural language processing, but different sets of GRs are useful for different purposes. Therefore, one may often only have time to obtain a small training corpus with the desired GR annotations. On such a small training corpus, we compare two systems. They use different learning techniques, but we find that this difference by itself only has a minor effect. A larger factor is that in English, a different GR length measure appears better suited for finding simple argument GRs than for finding modifier GRs. We also find that partitioning the data may help memory-based learning.
[ { "version": "v1", "created": "Tue, 8 Aug 2000 22:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Yeh", "Alexander", "" ] ]