id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-21 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0702172 | Roderick Melnik | Linxiang X. Wang and Roderick V.N. Melnik | Numerical Model For Vibration Damping Resulting From the First Order
Phase Transformations | Keywords: martensite transformation, thermo-mechanical coupling,
vibration damping, Ginzburg-Landau theory | null | null | null | cs.CE cs.NA | null | A numerical model is constructed for modelling macroscale damping effects
induced by the first order martensite phase transformations in a shape memory
alloy rod. The model is constructed on the basis of the modified
Landau-Ginzburg theory that couples nonlinear mechanical and thermal fields.
The free energy function for the model is constructed as a double well function
at low temperature, such that the external energy can be absorbed during the
phase transformation and converted into thermal form. The Chebyshev spectral
methods are employed together with backward differentiation for the numerical
analysis of the problem. Computational experiments performed for different
vibration energies demonstrate the importance of taking into account damping
effects induced by phase transformations.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 18:31:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Linxiang X.",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] |
cs/0703001 | Michael Coury | Michael D. Coury | Embedding Graphs into the Extended Grid | 4 pages, 2 figures | null | null | null | cs.DM cs.DS | null | Let $G=(V,E)$ be an arbitrary undirected source graph to be embedded in a
target graph $EM$, the extended grid with vertices on integer grid points and
edges to nearest and next-nearest neighbours. We present an algorithm showing
how to embed $G$ into $EM$ in both time and space $O(|V|^2)$ using the new
notions of islands and bridges. An island is a connected subgraph in the target
graph which is mapped from exactly one vertex in the source graph while a
bridge is an edge between two islands which is mapped from exactly one edge in
the source graph. This work is motivated by real industrial applications in the
field of quantum computing and a need to efficiently embed source graphs in the
extended grid.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 22:37:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Coury",
"Michael D.",
""
]
] |
cs/0703003 | M. H. van Emden | M.H. van Emden, B. Moa, and S.C. Somosan | Functions to Support Input and Output of Intervals | 16 pages, 13 figures with listings | null | null | DCS-311-IR | cs.NA | null | Interval arithmetic is hardly feasible without directed rounding as provided,
for example, by the IEEE floating-point standard. Equally essential for
interval methods is directed rounding for conversion between the external
decimal and internal binary numerals. This is not provided by the standard I/O
libraries. Conversion algorithms exist that guarantee identity upon conversion
followed by its inverse. Although it may be possible to adapt these algorithms
for use in decimal interval I/O, we argue that outward rounding in radix
conversion is computationally a simpler problem than guaranteeing identity.
Hence it is preferable to develop decimal interval I/O ab initio, which is what
we do in this paper.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 23:13:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
],
[
"Moa",
"B.",
""
],
[
"Somosan",
"S. C.",
""
]
] |
cs/0703004 | Francis Heylighen | Francis Heylighen | Accelerating Socio-Technological Evolution: from ephemeralization and
stigmergy to the global brain | To appear in: "Globalization as an Evolutionary Process: Modeling
Global Change", edited by George Modelski, Tessaleno Devezas, and William
Thompson, London: Routledge | null | null | null | cs.CY cs.NI | null | Evolution is presented as a trial-and-error process that produces a
progressive accumulation of knowledge. At the level of technology, this leads
to ephemeralization, i.e. ever increasing productivity, or decreasing of the
friction that normally dissipates resources. As a result, flows of matter,
energy and information circulate ever more easily across the planet. This
global connectivity increases the interactions between agents, and thus the
possibilities for conflict. However, evolutionary progress also reduces social
friction, via the creation of institutions. The emergence of such "mediators"
is facilitated by stigmergy: the unintended collaboration between agents
resulting from their actions on a shared environment. The Internet is a near
ideal medium for stigmergic interaction. Quantitative stigmergy allows the web
to learn from the activities of its users, thus becoming ever better at helping
them to answer their queries. Qualitative stigmergy stimulates agents to
collectively develop novel knowledge. Both mechanisms have direct analogues in
the functioning of the human brain. This leads us to envision the future,
super-intelligent web as a "global brain" for humanity. The feedback between
social and technological advances leads to an extreme acceleration of
innovation. An extrapolation of the corresponding hyperbolic growth model would
forecast a singularity around 2040. This can be interpreted as the evolutionary
transition to the Global Brain regime.
| [
{
"version": "v1",
"created": "Thu, 1 Mar 2007 15:46:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heylighen",
"Francis",
""
]
] |
cs/0703006 | Jingchao Chen | Jing-Chao Chen | XORSAT: An Efficient Algorithm for the DIMACS 32-bit Parity Problem | null | null | null | null | cs.DS | null | The DIMACS 32-bit parity problem is a satisfiability (SAT) problem hard to
solve. So far, EqSatz by Li is the only solver which can solve this problem.
However, This solver is very slow. It is reported that it spent 11855 seconds
to solve a par32-5 instance on a Maxintosh G3 300 MHz. The paper introduces a
new solver, XORSAT, which splits the original problem into two parts:
structured part and random part, and then solves separately them with WalkSAT
and an XOR equation solver. Based our empirical observation, XORSAT is
surprisingly fast, which is approximately 1000 times faster than EqSatz. For a
par32-5 instance, XORSAT took 2.9 seconds, while EqSatz took 2844 seconds on
Intel Pentium IV 2.66GHz CPU. We believe that this method significantly
different from traditional methods is also useful beyond this domain.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 01:38:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Jing-Chao",
""
]
] |
cs/0703011 | Helmut Alt | Helmut Alt, Maike Buchin | Can we Compute the Similarity Between Surfaces? | null | null | null | null | cs.CG cs.CC | null | A suitable measure for the similarity of shapes represented by parameterized
curves or surfaces is the Fr\'echet distance. Whereas efficient algorithms are
known for computing the Fr\'echet distance of polygonal curves, the same
problem for triangulated surfaces is NP-hard. Furthermore, it remained open
whether it is computable at all. Here, using a discrete approximation we show
that it is {\em upper semi-computable}, i.e., there is a non-halting Turing
machine which produces a monotone decreasing sequence of rationals converging
to the result. It follows that the decision problem, whether the Fr\'echet
distance of two given surfaces lies below some specified value, is recursively
enumerable.
Furthermore, we show that a relaxed version of the problem, the computation
of the {\em weak Fr\'echet distance} can be solved in polynomial time. For
this, we give a computable characterization of the weak Fr\'echet distance in a
geometric data structure called the {\em free space diagram}.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 17:00:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alt",
"Helmut",
""
],
[
"Buchin",
"Maike",
""
]
] |
cs/0703012 | Ramya Ravichandar | Ramya Ravichandar, James D. Arthur, Manuel P\'erez-Qui\~nones | Pre-Requirement Specification Traceability: Bridging the Complexity Gap
through Capabilities | This paper appears in International Symposium on Grand Challenges in
Traceability, TEFSE/GCT 2007. 10 pages, 7 Figures | null | null | null | cs.SE | null | Pre-Requirement Specification traceability is the activity of capturing
relations between requirements and their sources, in particular user needs.
Requirements are formal technical specifications in the solution space; needs
are natural language expressions codifying user expectations in the problem
space. Current traceability techniques are challenged by the complexity gap
that results from the disparity between the spaces, and thereby, often neglect
traceability to and from requirements. We identify the existence of an
intermediary region -- the transition space -- which structures the progression
from needs to requirements. More specifically, our approach to developing
change-tolerant systems, termed Capabilities Engineering, identifies highly
cohesive, minimally coupled, optimized functional abstractions called
Capabilities in the transition space. These Capabilities link the problem and
solution spaces through directives (entities derived from user needs).
Directives connect the problem and transition spaces; Capabilities link the
transition and solution spaces. Furthermore, the process of Capabilities
Engineering addresses specific traceability challenges. It supports the
evolution of traces, provides semantic and structural information about
dependencies, incorporates human factors, generates traceability relations with
negligible overhead, and thereby, fosters pre-Requirement Specification
traceability.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 20:46:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravichandar",
"Ramya",
""
],
[
"Arthur",
"James D.",
""
],
[
"Pérez-Quiñones",
"Manuel",
""
]
] |
cs/0703015 | Alexander Shkotin | Alex Shkotin | Graph representation of context-free grammars | 4 pages, 3 figures | null | null | null | cs.LO | null | In modern mathematics, graphs figure as one of the better-investigated class
of mathematical objects. Various properties of graphs, as well as
graph-processing algorithms, can be useful if graphs of a certain kind are used
as denotations for CF-grammars. Furthermore, graph are well adapted to various
extensions (one kind of such extensions being attributes).
| [
{
"version": "v1",
"created": "Sat, 3 Mar 2007 13:12:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shkotin",
"Alex",
""
]
] |
cs/0703021 | Wen-Li Wang | Wen-Li Wang and Mei-Huei Tang | Addressing Components' Evolvement and Execution Behavior to Measure
Component-Based Software Reliability | null | null | null | null | cs.SE | null | Software reliability is an important quality attrib-ute, often evaluated as
either a function of time or of system structures. The goal of this study is to
have this metric cover both for component-based software, be-cause its
reliability strongly depends on the quality of constituent components and their
interactions. To achieve this, we apply a convolution modeling ap-proach, based
on components' execution behavior, to integrate their individual reliability
evolvement and simultaneously address failure fixes in the time do-main.
Modeling at the component level can be more economical to accommodate software
evolution, be-cause the reliability metric can be evaluated by reus-ing the
quality measures of unaffected components and adapting only to the affected
ones to save cost. The adaptation capability also supports the incremental
software development processes that constantly add in new components over time.
Experiments were con-ducted to discuss the usefulness of this approach.
| [
{
"version": "v1",
"created": "Mon, 5 Mar 2007 20:58:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Wen-Li",
""
],
[
"Tang",
"Mei-Huei",
""
]
] |
cs/0703023 | Otfried Cheong | Otfried Cheong, Herman Haverkort, Mira Lee | Computing a Minimum-Dilation Spanning Tree is NP-hard | null | null | null | null | cs.CG | null | In a geometric network G = (S, E), the graph distance between two vertices u,
v in S is the length of the shortest path in G connecting u to v. The dilation
of G is the maximum factor by which the graph distance of a pair of vertices
differs from their Euclidean distance. We show that given a set S of n points
with integer coordinates in the plane and a rational dilation delta > 1, it is
NP-hard to determine whether a spanning tree of S with dilation at most delta
exists.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 01:53:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cheong",
"Otfried",
""
],
[
"Haverkort",
"Herman",
""
],
[
"Lee",
"Mira",
""
]
] |
cs/0703025 | Jean Charles Gilbert | Jean Charles Gilbert (INRIA Rocquencourt), Xavier Jonsson | LIBOPT - An environment for testing solvers on heterogeneous collections
of problems - Version 1.0 | null | null | null | null | cs.MS cs.NA math.OC | null | The Libopt environment is both a methodology and a set of tools that can be
used for testing, comparing, and profiling solvers on problems belonging to
various collections. These collections can be heterogeneous in the sense that
their problems can have common features that differ from one collection to the
other. Libopt brings a unified view on this composite world by offering, for
example, the possibility to run any solver on any problem compatible with it,
using the same Unix/Linux command. The environment also provides tools for
comparing the results obtained by solvers on a specified set of problems. Most
of the scripts going with the Libopt environment have been written in Perl.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 14:05:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gilbert",
"Jean Charles",
"",
"INRIA Rocquencourt"
],
[
"Jonsson",
"Xavier",
""
]
] |
cs/0703029 | Shmuel Friedland | Shmuel Friedland | FPRAS for computing a lower bound for weighted matching polynomial of
graphs | 16 pages | null | null | null | cs.CC cs.DM | null | We give a fully polynomial randomized approximation scheme to compute a lower
bound for the matching polynomial of any weighted graph at a positive argument.
For the matching polynomial of complete bipartite graphs with bounded weights
these lower bounds are asymptotically optimal.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 22:59:30 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Apr 2007 16:09:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedland",
"Shmuel",
""
]
] |
cs/0703030 | Konstantin Rybnikov | Konstantin Rybnikov | An Efficient Local Approach to Convexity Testing of Piecewise-Linear
Hypersurfaces | 3 figures | null | null | null | cs.CG | null | We show that a closed piecewise-linear hypersurface immersed in $R^n$ ($n\ge
3$) is the boundary of a convex body if and only if every point in the interior
of each $(n-3)$-face has a neighborhood that lies on the boundary of some
convex body; no assumptions about the hypersurface's topology are needed. We
derive this criterion from our generalization of Van Heijenoort's (1952)
theorem on locally convex hypersurfaces in $R^n$ to spherical spaces. We also
give an easy-to-implement convexity testing algorithm, which is based on our
criterion. For $R^3$ the number of arithmetic operations used by the algorithm
is at most linear in the number of vertices, while in general it is at most
linear in the number of incidences between the $(n-2)$-faces and $(n-3)$-faces.
When the dimension $n$ is not fixed and only ring arithmetic is allowed, the
algorithm still remains polynomial. Our method works in more general situations
than the convexity verification algorithms developed by Mehlhorn et al. (1996)
and Devillers et al. (1998) -- for example, our method does not require the
input surface to be orientable, nor it requires the input data to include
normal vectors to the facets that are oriented "in a coherent way". For $R^3$
the complexity of our algorithm is the same as that of previous algorithms; for
higher dimensions there seems to be no clear winner, but our approach is the
only one that easily handles inputs in which the facet normals are not known to
be coherently oriented or are not given at all. Furthermore, our method can be
extended to piecewise-polynomial surfaces of small degree.
| [
{
"version": "v1",
"created": "Wed, 7 Mar 2007 07:33:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rybnikov",
"Konstantin",
""
]
] |
cs/0703031 | P\'aid\'i Creed | Paidi Creed | Sampling Eulerian orientations of triangular lattice graphs | 23 pages | null | null | null | cs.DM cs.DS | null | We consider the problem of sampling from the uniform distribution on the set
of Eulerian orientations of subgraphs of the triangular lattice. Although it is
known that this can be achieved in polynomial time for any graph, the algorithm
studied here is more natural in the context of planar Eulerian graphs. We
analyse the mixing time of a Markov chain on the Eulerian orientations of a
planar graph which moves between orientations by reversing the edges of
directed faces. Using path coupling and the comparison method we obtain a
polynomial upper bound on the mixing time of this chain for any solid subgraph
of the triangular lattice. By considering the conductance of the chain we show
that there exist subgraphs with holes for which the chain will always take an
exponential amount of time to converge. Finally, as an additional justification
for studying a Markov chain on the set of Eulerian orientations of planar
graphs, we show that the problem of counting Eulerian orientations remains
#P-complete when restricted to planar graphs.
A preliminary version of this work appeared as an extended abstract in the
2nd Algorithms and Complexity in Durham workshop.
| [
{
"version": "v1",
"created": "Wed, 7 Mar 2007 12:34:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Creed",
"Paidi",
""
]
] |
cs/0703040 | Yefim Bakman | Yefim Bakman (Tel-Aviv University) | Why the Standard Data Processing should be changed | null | null | null | null | cs.MS | null | The basic statistical methods of data representation did not change since
their emergence. Their simplicity was dictated by the intricacies of
computations in the before computers epoch. It turns out that such approach is
not uniquely possible in the presence of quick computers. The suggested here
method improves significantly the reliability of data processing and their
graphical representation. In this paper we show problems of the standard data
processing which can bring to incorrect results. A method solving these
problems is proposed. It is based on modification of data representation. The
method was implemented in a computer program Consensus5. The program
performances are illustrated through varied examples.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 19:49:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bakman",
"Yefim",
"",
"Tel-Aviv University"
]
] |
cs/0703041 | Marko Horvat B.Sc.CS-Dipl.Ing. | Kresimir Fertalj, Marko Horvat | Comparing Architectures of Mobile Applications | 8 pages, 7 figures, 6 tables. Proceedings of the 5th WSEAS
International Conference on Automation & Information in Venice, Italy | WSEAS Trans. on COMMUNICATIONS, Issue 4, Volume 3, October 2004,
pp. 946-952 | null | null | cs.OH | null | This article describes various advantages and disadvantages of SMS, WAP, J2ME
and Windows CE technologies in designing mobile applications. In defining the
architecture of any software application it is important to get the best
trade-off between platform's possibilities and design requirements. Achieving
optimum software design is even more important with mobile applications where
all computer resources are limited. Therefore, it is important to have a
comparative analysis of all relevant contemporary approaches in designing
mobile applications. As always, the choice between these technologies is
determined by application requirements and system capabilities.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 19:16:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fertalj",
"Kresimir",
""
],
[
"Horvat",
"Marko",
""
]
] |
cs/0703042 | Vaclav Petricek | Lukas Brozovsky, Vaclav Petricek | Recommender System for Online Dating Service | Accepted for Znalosti 2007 | null | null | null | cs.IR cs.SE | null | Users of online dating sites are facing information overload that requires
them to manually construct queries and browse huge amount of matching user
profiles. This becomes even more problematic for multimedia profiles. Although
matchmaking is frequently cited as a typical application for recommender
systems, there is a surprising lack of work published in this area. In this
paper we describe a recommender system we implemented and perform a
quantitative comparison of two collaborative filtering (CF) and two global
algorithms. Results show that collaborative filtering recommenders
significantly outperform global algorithms that are currently used by dating
sites. A blind experiment with real users also confirmed that users prefer CF
based recommendations to global popularity recommendations. Recommender systems
show a great potential for online dating where they could improve the value of
the service to users and improve monetization of the service.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 15:38:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brozovsky",
"Lukas",
""
],
[
"Petricek",
"Vaclav",
""
]
] |
cs/0703043 | Vaclav Petricek | Vaclav Petricek, Ingemar J. Cox, Hui Han, Isaac G. Councill, C. Lee
Giles | A Comparison of On-Line Computer Science Citation Databases | ECDL 2005 | null | null | null | cs.DL | null | This paper examines the difference and similarities between the two on-line
computer science citation databases DBLP and CiteSeer. The database entries in
DBLP are inserted manually while the CiteSeer entries are obtained autonomously
via a crawl of the Web and automatic processing of user submissions. CiteSeer's
autonomous citation database can be considered a form of self-selected on-line
survey. It is important to understand the limitations of such databases,
particularly when citation information is used to assess the performance of
authors, institutions and funding bodies.
We show that the CiteSeer database contains considerably fewer single author
papers. This bias can be modeled by an exponential process with intuitive
explanation. The model permits us to predict that the DBLP database covers
approximately 24% of the entire literature of Computer Science. CiteSeer is
also biased against low-cited papers.
Despite their difference, both databases exhibit similar and significantly
different citation distributions compared with previous analysis of the Physics
community. In both databases, we also observe that the number of authors per
paper has been increasing over time.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 16:00:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petricek",
"Vaclav",
""
],
[
"Cox",
"Ingemar J.",
""
],
[
"Han",
"Hui",
""
],
[
"Councill",
"Isaac G.",
""
],
[
"Giles",
"C. Lee",
""
]
] |
cs/0703044 | Samuel Thibault | Samuel Thibault (INRIA Futurs), Sebastien Hinderer (INRIA Lorraine -
LORIA) | BrlAPI: Simple, Portable, Concurrent, Application-level Control of
Braille Terminals | null | Dans International Conference on Information and Communication
Technology Accessibility (ICTA) (2007) | null | null | cs.HC | null | Screen readers can drive braille devices for allowing visually impaired users
to access computer environments, by providing them the same information as
sighted users. But in some cases, this view is not easy to use on a braille
device. In such cases, it would be much more useful to let applications provide
their own braille feedback, specially adapted to visually impaired users. Such
applications would then need the ability to output braille ; however, allowing
both screen readers and applications access a wide panel of braille devices is
not a trivial task. We present an abstraction layer that applications may use
to communicate with braille devices. They do not need to deal with the
specificities of each device, but can do so if necessary. We show how several
applications can communicate with one braille device concurrently, with BrlAPI
making sensible choices about which application eventually gets access to the
device. The description of a widely used implementation of BrlAPI is included.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 16:55:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thibault",
"Samuel",
"",
"INRIA Futurs"
],
[
"Hinderer",
"Sebastien",
"",
"INRIA Lorraine -\n LORIA"
]
] |
cs/0703049 | Olga Savenkova | Oleg N. Karpov, Olga A. Savenkova | Algorithm of Segment-Syllabic Synthesis in Speech Recognition Problem | 11 pages, 4 figures | null | null | null | cs.SD cs.CL | null | Speech recognition based on the syllable segment is discussed in this paper.
The principal search methods in space of states for the speech recognition
problem by segment-syllabic parameters trajectory synthesis are investigated.
Recognition as comparison the parameters trajectories in chosen speech units on
the sections of the segmented speech is realized. Some experimental results are
given and discussed.
| [
{
"version": "v1",
"created": "Sat, 10 Mar 2007 23:59:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karpov",
"Oleg N.",
""
],
[
"Savenkova",
"Olga A.",
""
]
] |
cs/0703051 | Yu Ding | Yu Ding | An ExpTime Procedure for Description Logic $\mathcal{ALCQI}$ (Draft) | This paper is submitted in 2007 | null | null | null | cs.LO | null | A worst-case ExpTime tableau-based decision procedure is outlined for the
satisfiability problem in $\mathcal{ALCQI}$ w.r.t. general axioms.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 01:55:23 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Mar 2007 00:23:59 GMT"
},
{
"version": "v3",
"created": "Sun, 18 Mar 2007 19:38:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ding",
"Yu",
""
]
] |
cs/0703054 | Julien Hendrickx | Vincent D. Blondel, Julien M. Hendrickx and Raphael M. Jungers | Linear time algorithms for Clobber | null | null | null | null | cs.GT | null | We prove that the single-player game clobber is solvable in linear time when
played on a line or on a cycle. For this purpose, we show that this game is
equivalent to an optimization problem on a set of words defined by seven
classes of forbidden patterns. We also prove that, playing on the cycle, it is
always possible to remove at least 2n/3 pawns, and we give a conformation for
which it is not possible to do better, answering questions recently asked by
Faria et al.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 17:04:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Blondel",
"Vincent D.",
""
],
[
"Hendrickx",
"Julien M.",
""
],
[
"Jungers",
"Raphael M.",
""
]
] |
cs/0703059 | J. M. Landsberg | J.M. Landsberg | Geometry and the complexity of matrix multiplication | 34 pages, 4 figures | null | null | null | cs.CC math.AG math.RT | null | We survey results in algebraic complexity theory, focusing on matrix
multiplication. Our goals are
(i.) to show how open questions in algebraic complexity theory are naturally
posed as questions in geometry and representation theory, (ii.) to motivate
researchers to work on these questions, and (iii.) to point out relations with
more general problems in geometry. The key geometric objects for our study are
the secant varieties of Segre varieties. We explain how these varieties are
also useful for algebraic statistics, the study of phylogenetic invariants, and
quantum computing.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 22:11:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Landsberg",
"J. M.",
""
]
] |
cs/0703060 | Florentin Smarandache | Jose L. Salmeron, Florentin Smarandache | Redesigning Decision Matrix Method with an indeterminacy-based inference
process | 12 pages, 4 figures, one table | A short version published in Advances in Fuzzy Sets and Systems,
Vol. 1(2), 263-271, 2006 | null | null | cs.AI | null | For academics and practitioners concerned with computers, business and
mathematics, one central issue is supporting decision makers. In this paper, we
propose a generalization of Decision Matrix Method (DMM), using Neutrosophic
logic. It emerges as an alternative to the existing logics and it represents a
mathematical model of uncertainty and indeterminacy. This paper proposes the
Neutrosophic Decision Matrix Method as a more realistic tool for decision
making. In addition, a de-neutrosophication process is included.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 02:18:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Salmeron",
"Jose L.",
""
],
[
"Smarandache",
"Florentin",
""
]
] |
cs/0703063 | Konstantin Avrachenkov | Konstantin Avrachenkov (INRIA Sophia Antipolis), Urtzi Ayesta (LAAS),
Alexei Piunovskiy | Convergence and Optimal Buffer Sizing for Window Based AIMD Congestion
Control | null | null | null | null | cs.NI | null | We study the interaction between the AIMD (Additive Increase Multiplicative
Decrease) congestion control and a bottleneck router with Drop Tail buffer. We
consider the problem in the framework of deterministic hybrid models. First, we
show that the hybrid model of the interaction between the AIMD congestion
control and bottleneck router always converges to a cyclic behavior. We
characterize the cycles. Necessary and sufficient conditions for the absence of
multiple jumps of congestion window in the same cycle are obtained. Then, we
propose an analytical framework for the optimal choice of the router buffer
size. We formulate the problem of the optimal router buffer size as a
multi-criteria optimization problem, in which the Lagrange function corresponds
to a linear combination of the average goodput and the average delay in the
queue. The solution to the optimization problem provides further evidence that
the buffer size should be reduced in the presence of traffic aggregation. Our
analytical results are confirmed by simulations performed with Simulink and the
NS simulator.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 09:00:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Avrachenkov",
"Konstantin",
"",
"INRIA Sophia Antipolis"
],
[
"Ayesta",
"Urtzi",
"",
"LAAS"
],
[
"Piunovskiy",
"Alexei",
""
]
] |
cs/0703065 | Gabriel Istrate | Gabriel Istrate | Satisfying assignments of Random Boolean CSP: Clusters and Overlaps | null | null | null | null | cs.DM cond-mat.dis-nn cs.CC | null | The distribution of overlaps of solutions of a random CSP is an indicator of
the overall geometry of its solution space. For random $k$-SAT, nonrigorous
methods from Statistical Physics support the validity of the ``one step replica
symmetry breaking'' approach. Some of these predictions were rigorously
confirmed in \cite{cond-mat/0504070/prl} \cite{cond-mat/0506053}. There it is
proved that the overlap distribution of random $k$-SAT, $k\geq 9$, has
discontinuous support. Furthermore, Achlioptas and Ricci-Tersenghi proved that,
for random $k$-SAT, $k\geq 8$. and constraint densities close enough to the
phase transition there exists an exponential number of clusters of satisfying
assignments; moreover, the distance between satisfying assignments in different
clusters is linear.
We aim to understand the structural properties of random CSP that lead to
solution clustering. To this end, we prove two results on the cluster structure
of solutions for binary CSP under the random model from Molloy (STOC 2002)
1. For all constraint sets $S$ (described explicitly in Creignou and Daude
(2004), Istrate (2005)) s.t. $SAT(S)$ has a sharp threshold and all $q\in
(0,1]$, $q$-overlap-$SAT(S)$ has a sharp threshold (i.e. the first step of the
approach in Mora et al. works in all nontrivial cases). 2. For any constraint
density value $c<1$, the set of solutions of a random instance of 2-SAT form,
w.h.p., a single cluster. Also, for and any $q\in (0,1]$ such an instance has
w.h.p. two satisfying assignment of overlap $\sim q$. Thus, as expected from
Statistical Physics predictions, the second step of the approach in Mora et al.
fails for 2-SAT.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 15:45:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
] |
cs/0703066 | Gerard Cohen | Charon Cohen, Hudry Lobstein | Discriminating and Identifying Codes in the Binary Hamming Space | null | null | null | null | cs.DM | null | Let $F^n$ be the binary $n$-cube, or binary Hamming space of dimension $n$,
endowed with the Hamming distance, and ${\cal E}^n$ (respectively, ${\cal
O}^n$) the set of vectors with even (respectively, odd) weight. For $r\geq 1$
and $x\in F^n$, we denote by $B_r(x)$ the ball of radius $r$ and centre $x$. A
code $C\subseteq F^n$ is said to be $r$-identifying if the sets $B_r(x) \cap
C$, $x\in F^n$, are all nonempty and distinct. A code $C\subseteq {\cal E}^n$
is said to be $r$-discriminating if the sets $B_r(x) \cap C$, $x\in {\cal
O}^n$, are all nonempty and distinct. We show that the two definitions, which
were given for general graphs, are equivalent in the case of the Hamming space,
in the following sense: for any odd $r$, there is a bijection between the set
of $r$-identifying codes in $F^n$ and the set of $r$-discriminating codes in
$F^{n+1}$. We then extend previous studies on constructive upper bounds for the
minimum cardinalities of identifying codes in the Hamming space.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 15:00:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cohen",
"Charon",
""
],
[
"Lobstein",
"Hudry",
""
]
] |
cs/0703067 | Stephen Smith | Stephen L. Smith, Francesco Bullo | Target assignment for robotic networks: asymptotic performance under
limited communication | 2007 ACC paper including proofs; Corrected typos | null | null | null | cs.RO | null | We are given an equal number of mobile robotic agents, and distinct target
locations. Each agent has simple integrator dynamics, a limited communication
range, and knowledge of the position of every target. We address the problem of
designing a distributed algorithm that allows the group of agents to divide the
targets among themselves and, simultaneously, leads each agent to reach its
unique target. We do not require connectivity of the communication graph at any
time. We introduce a novel assignment-based algorithm with the following
features: initial assignments and robot motions follow a greedy rule, and
distributed refinements of the assignment exploit an implicit circular ordering
of the targets. We prove correctness of the algorithm, and give worst-case
asymptotic bounds on the time to complete the assignment as the environment
grows with the number of agents. We show that among a certain class of
distributed algorithms, our algorithm is asymptotically optimal. The analysis
utilizes results on the Euclidean traveling salesperson problem.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 19:20:45 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2007 19:57:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smith",
"Stephen L.",
""
],
[
"Bullo",
"Francesco",
""
]
] |
cs/0703068 | Vladimir Surkov | Kenneth R. Jackson, Sebastian Jaimungal, Vladimir Surkov | Option Valuation using Fourier Space Time Stepping | null | null | null | null | cs.CE | null | It is well known that the Black-Scholes-Merton model suffers from several
deficiencies. Jump-diffusion and Levy models have been widely used to partially
alleviate some of the biases inherent in this classical model. Unfortunately,
the resulting pricing problem requires solving a more difficult partial-integro
differential equation (PIDE) and although several approaches for solving the
PIDE have been suggested in the literature, none are entirely satisfactory. All
treat the integral and diffusive terms asymmetrically and are difficult to
extend to higher dimensions. We present a new, efficient algorithm, based on
transform methods, which symmetrically treats the diffusive and integrals
terms, is applicable to a wide class of path-dependent options (such as
Bermudan, barrier, and shout options) and options on multiple assets, and
naturally extends to regime-switching Levy models. We present a concise study
of the precision and convergence properties of our algorithm for several
classes of options and Levy models and demonstrate that the algorithm is
second-order in space and first-order in time for path-dependent options.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 19:48:42 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Mar 2007 20:49:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jackson",
"Kenneth R.",
""
],
[
"Jaimungal",
"Sebastian",
""
],
[
"Surkov",
"Vladimir",
""
]
] |
cs/0703069 | Paul Fodor | Paul Fodor | Portlet Wrappers using JavaScript | null | null | null | null | cs.SE | null | In this paper we extend the classical portal (with static portlets) design
with HTML DOM Web clipping on the client browser using dynamic JavaScript
portlets: the portal server supplies the user/passwords for all services
through https and the client browser retrieves web pages and
cuts/selects/changes the desired parts using paths (XPath) in the Web page
structure. This operation brings along a set of advantages: dynamic wrapping of
existing legacy websites in the client browser, the reloading of only changed
portlets instead of whole portal, low bandwidth on the server, the elimination
of re-writing the URL links in the portal, and last but not least, a support
for Java applets in portlets by putting the login cookies on the client
browser. Our solution is compliant with JSR168 Portlet Specification allowing
portability across all vendor platforms.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 23:32:43 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Mar 2007 15:46:21 GMT"
},
{
"version": "v3",
"created": "Wed, 2 May 2007 19:02:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fodor",
"Paul",
""
]
] |
cs/0703071 | Paul Fodor | Paul Fodor | Automatic Annotation of XHTML Pages with Audio Components | null | null | null | null | cs.OH | null | In this paper we present Deiush, a multimodal system for browsing hypertext
Web documents. The Deiush system is based on our novel approach to
automatically annotate hypertext Web documents (i.e. XHTML pages) with
browsable audio components. It combines two key technologies: (1) middleware
automatic separation of Web documents through structural and semantic analysis
which is annotated with audio components, transforming them into XHTML+VoiceXML
format to represent multimodal dialog; and (2) Opera Browser, an already
standardized browser which we adopt as an interface of the XHTML+VoiceXML
output of annotating. This paper describes the annotation technology of Deiush
and presents an initial system evaluation.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 23:43:30 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Mar 2007 15:45:56 GMT"
},
{
"version": "v3",
"created": "Wed, 2 May 2007 19:03:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fodor",
"Paul",
""
]
] |
cs/0703072 | Paul Fodor | Paul Fodor | Domain Directed Dialogs for Decision Processes | null | null | null | null | cs.OH | null | The search for a standardized optimum way to communicate using natural
language dialog has involved a lot of research. However, due to the diversity
of communication domains, we think that this is extremely difficult to achieve
and different dialogue management techniques should be applied for different
situations. Our work presents the basis of a communication mechanism that
supports decision processes, is based on decision trees, and minimizes the
number of steps (turn-takes) in the dialogue. The initial dialog workflow is
automatically generated and the user's interaction with the system can also
change the decision tree and create new dialog paths with optimized cost. The
decision tree represents the chronological ordering of the actions (via the
parent-child relationship) and uses an object frame to represent the
information state (capturing the notion of context). This paper presents our
framework, the formalism for interaction and dialogue, and an evaluation of the
system compared to relevant dialog planning frameworks (i.e. finite state
diagrams, frame-based, information state and planning-based dialogue systems).
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2007 00:08:50 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Mar 2007 14:54:41 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Mar 2007 15:41:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fodor",
"Paul",
""
]
] |
cs/0703080 | Paul Ioan Fodor | Joy Dutta, Paul Fodor | A Systematic Approach to Web-Application Development | null | null | null | null | cs.SE | null | Designing a web-application from a specification involves a series of
well-planned and well executed steps leading to the final product. This often
involves critical changes in design while testing the application, which itself
is slow and cumbersome. Traditional approaches either fully automate the
web-application development process, or let developers write everything from
scratch. Our approach is based on a middle-ground, with precise control on the
workflow and usage of a set of custom-made software tools to automate a
significant part of code generation.
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2007 12:55:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dutta",
"Joy",
""
],
[
"Fodor",
"Paul",
""
]
] |
cs/0703081 | Andre Hernich | Martin Grohe, Andre Hernich, Nicole Schweikardt | Randomized Computations on Large Data Sets: Tight Lower Bounds | 29 pages, 2 figures, full version of PODS'06 paper | null | null | null | cs.DB cs.CC | null | We study the randomized version of a computation model (introduced by Grohe,
Koch, and Schweikardt (ICALP'05); Grohe and Schweikardt (PODS'05)) that
restricts random access to external memory and internal memory space.
Essentially, this model can be viewed as a powerful version of a data stream
model that puts no cost on sequential scans of external memory (as other models
for data streams) and, in addition, (like other external memory models, but
unlike streaming models), admits several large external memory devices that can
be read and written to in parallel.
We obtain tight lower bounds for the decision problems set equality, multiset
equality, and checksort. More precisely, we show that any randomized
one-sided-error bounded Monte Carlo algorithm for these problems must perform
Omega(log N) random accesses to external memory devices, provided that the
internal memory size is at most O(N^(1/4)/log N), where N denotes the size of
the input data.
From the lower bound on the set equality problem we can infer lower bounds on
the worst case data complexity of query evaluation for the languages XQuery,
XPath, and relational algebra on streaming data. More precisely, we show that
there exist queries in XQuery, XPath, and relational algebra, such that any
(randomized) Las Vegas algorithm that evaluates these queries must perform
Omega(log N) random accesses to external memory devices, provided that the
internal memory size is at most O(N^(1/4)/log N).
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2007 12:58:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grohe",
"Martin",
""
],
[
"Hernich",
"Andre",
""
],
[
"Schweikardt",
"Nicole",
""
]
] |
cs/0703082 | Christian Rasch | Christian Rasch and Thomas Satzger | Remarks on the O(N) Implementation of the Fast Marching Method | 7 pages, 2 figures | null | null | null | cs.NA | null | The fast marching algorithm computes an approximate solution to the eikonal
equation in O(N log N) time, where the factor log N is due to the
administration of a priority queue. Recently, Yatziv, Bartesaghi and Sapiro
have suggested to use an untidy priority queue, reducing the overall complexity
to O(N) at the price of a small error in the computed solution. In this paper,
we give an explicit estimate of the error introduced, which is based on a
discrete comparison principle. This estimates implies in particular that the
choice of an accuracy level that is independent of the speed function F results
in the complexity bound O(Fmax /Fmin N). A numerical experiment illustrates
this robustness problem for large ratios Fmax /Fmin .
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2007 13:41:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rasch",
"Christian",
""
],
[
"Satzger",
"Thomas",
""
]
] |
cs/0703083 | Frank McCown | Frank McCown and Michael L. Nelson | Characterization of Search Engine Caches | 5 pages, 9 figures, IS&T Archiving 2007, May, 2007 | null | null | null | cs.DL cs.CY | null | Search engines provide cached copies of indexed content so users will have
something to "click on" if the remote resource is temporarily or permanently
unavailable. Depending on their proprietary caching strategies, search engines
will purge their indexes and caches of resources that exceed a threshold of
unavailability. Although search engine caches are provided only as an aid to
the interactive user, we are interested in building reliable preservation
services from the aggregate of these limited caching services. But first, we
must understand the contents of search engine caches. In this paper, we have
examined the cached contents of Ask, Google, MSN and Yahoo to profile such
things as overlap between index and cache, size, MIME type and "staleness" of
the cached resources. We also examined the overlap of the various caches with
the holdings of the Internet Archive.
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2007 15:16:08 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Mar 2007 20:24:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McCown",
"Frank",
""
],
[
"Nelson",
"Michael L.",
""
]
] |
cs/0703085 | Xiaoyang Gu | Xiaoyang Gu, Jack H. Lutz | Dimension and Relative Frequencies | null | null | null | null | cs.CC | null | We show how to calculate the finite-state dimension (equivalently, the
finite-state compressibility) of a saturated sets $X$ consisting of {\em all}
infinite sequences $S$ over a finite alphabet $\Sigma_m$ satisfying some given
condition $P$ on the asymptotic frequencies with which various symbols from
$\Sigma_m$ appear in $S$. When the condition $P$ completely specifies an
empirical probability distribution $\pi$ over $\Sigma_m$, i.e., a limiting
frequency of occurrence for {\em every} symbol in $\Sigma_m$, it has been known
since 1949 that the Hausdorff dimension of $X$ is precisely $\CH(\pi)$, the
Shannon entropy of $\pi$, and the finite-state dimension was proven to have
this same value in 2001.
The saturated sets were studied by Volkmann and Cajar decades ago. It got
attention again only with the recent developments in multifractal analysis by
Barreira, Saussol, Schmeling, and separately Olsen. However, the powerful
methods they used -- ergodic theory and multifractal analysis -- do not yield a
value for the finite-state (or even computable) dimension in an obvious manner.
We give a pointwise characterization of finite-state dimensions of saturated
sets. Simultaneously, we also show that their finite-state dimension and strong
dimension coincide with their Hausdorff and packing dimension respectively,
though the techniques we use are completely elementary. Our results
automatically extend to less restrictive effective settings (e.g.,
constructive, computable, and polynomial-time dimensions).
| [
{
"version": "v1",
"created": "Fri, 16 Mar 2007 02:42:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gu",
"Xiaoyang",
""
],
[
"Lutz",
"Jack H.",
""
]
] |
cs/0703092 | Partha Basuchowdhuri | Partha Basuchowdhuri | Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum
Protocol | 9 pages, 4 figures | null | null | null | cs.CR | null | This paper compares the popular quantum key distribution (QKD) protocol BB84
with the more recent Kak's three-stage protocol and the latter is shown to be
more secure. A theoretical representation of an authentication-aided version of
Kak's three-stage protocol is provided that makes it possible to deal with the
man-in-the-middle attack.
| [
{
"version": "v1",
"created": "Mon, 19 Mar 2007 08:13:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Basuchowdhuri",
"Partha",
""
]
] |
cs/0703094 | Olivier Powell | Olivier Powell and Sotiris Nikolesteas | Geographic Routing Around Obstacles in Wireless Sensor Networks | 37 pages, 23 figures | null | null | null | cs.DC | null | Geographic routing is becoming the protocol of choice for many sensor network
applications. The current state of the art is unsatisfactory: some algorithms
are very efficient, however they require a preliminary planarization of the
communication graph. Planarization induces overhead and is not realistic in
many scenarios. On the otherhand, georouting algorithms which do not rely on
planarization have fairly low success rates and either fail to route messages
around all but the simplest obstacles or have a high topology control overhead
(e.g. contour detection algorithms). To overcome these limitations, we propose
GRIC, the first lightweight and efficient on demand (i.e. all-to-all)
geographic routing algorithm which does not require planarization and has
almost 100% delivery rates (when no obstacles are added). Furthermore, the
excellent behavior of our algorithm is maintained even in the presence of large
convex obstacles. The case of hard concave obstacles is also studied; such
obstacles are hard instances for which performance diminishes.
| [
{
"version": "v1",
"created": "Tue, 20 Mar 2007 12:17:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Powell",
"Olivier",
""
],
[
"Nikolesteas",
"Sotiris",
""
]
] |
cs/0703095 | Jian Ma | Jian Ma and Zengqi Sun | Copula Component Analysis | null | null | null | null | cs.IR cs.AI | null | A framework named Copula Component Analysis (CCA) for blind source separation
is proposed as a generalization of Independent Component Analysis (ICA). It
differs from ICA which assumes independence of sources that the underlying
components may be dependent with certain structure which is represented by
Copula. By incorporating dependency structure, much accurate estimation can be
made in principle in the case that the assumption of independence is
invalidated. A two phrase inference method is introduced for CCA which is based
on the notion of multidimensional ICA.
| [
{
"version": "v1",
"created": "Tue, 20 Mar 2007 14:52:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ma",
"Jian",
""
],
[
"Sun",
"Zengqi",
""
]
] |
cs/0703097 | Lane A. Hemaspaandra | Gabor Erdelyi, Lane A. Hemaspaandra, Joerg Rothe, Holger Spakowski | On Approximating Optimal Weighted Lobbying, and Frequency of Correctness
versus Average-Case Polynomial Time | null | null | null | URCS-TR-2007-914 | cs.GT cs.CC cs.MA | null | We investigate issues related to two hard problems related to voting, the
optimal weighted lobbying problem and the winner problem for Dodgson elections.
Regarding the former, Christian et al. [CFRS06] showed that optimal lobbying is
intractable in the sense of parameterized complexity. We provide an efficient
greedy algorithm that achieves a logarithmic approximation ratio for this
problem and even for a more general variant--optimal weighted lobbying. We
prove that essentially no better approximation ratio than ours can be proven
for this greedy algorithm.
The problem of determining Dodgson winners is known to be complete for
parallel access to NP [HHR97]. Homan and Hemaspaandra [HH06] proposed an
efficient greedy heuristic for finding Dodgson winners with a guaranteed
frequency of success, and their heuristic is a ``frequently self-knowingly
correct algorithm.'' We prove that every distributional problem solvable in
polynomial time on the average with respect to the uniform distribution has a
frequently self-knowingly correct polynomial-time algorithm. Furthermore, we
study some features of probability weight of correctness with respect to
Procaccia and Rosenschein's junta distributions [PR07].
| [
{
"version": "v1",
"created": "Tue, 20 Mar 2007 20:35:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erdelyi",
"Gabor",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Spakowski",
"Holger",
""
]
] |
cs/0703098 | Sergey Gubin | Sergey Gubin | Polynomial time algorithm for 3-SAT. Examples of use | 19 pages | null | null | null | cs.CC cs.DM cs.DS cs.LO | null | The algorithm checks the propositional formulas for patterns of
unsatisfiability.
| [
{
"version": "v1",
"created": "Wed, 21 Mar 2007 06:46:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gubin",
"Sergey",
""
]
] |
cs/0703100 | Rajmohan Rajaraman | Guolong Lin and Rajmohan Rajaraman | Approximation Algorithms for Multiprocessor Scheduling under Uncertainty | 12 pages, 2 encapsulated postscript figures | null | null | null | cs.DC cs.CC cs.DS | null | Motivated by applications in grid computing and project management, we study
multiprocessor scheduling in scenarios where there is uncertainty in the
successful execution of jobs when assigned to processors. We consider the
problem of multiprocessor scheduling under uncertainty, in which we are given n
unit-time jobs and m machines, a directed acyclic graph C giving the
dependencies among the jobs, and for every job j and machine i, the probability
p_{ij} of the successful completion of job j when scheduled on machine i in any
given particular step. The goal of the problem is to find a schedule that
minimizes the expected makespan, that is, the expected completion time of all
the jobs.
The problem of multiprocessor scheduling under uncertainty was introduced by
Malewicz and was shown to be NP-hard even when all the jobs are independent. In
this paper, we present polynomial-time approximation algorithms for the
problem, for special cases of the dag C. We obtain an O(log(n))-approximation
for the case of independent jobs, an
O(log(m)log(n)log(n+m)/loglog(n+m))-approximation when C is a collection of
disjoint chains, an O(log(m)log^2(n))-approximation when C is a collection of
directed out- or in-trees, and an
O(log(m)log^2(n)log(n+m)/loglog(n+m))-approximation when C is a directed
forest.
| [
{
"version": "v1",
"created": "Wed, 21 Mar 2007 20:35:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lin",
"Guolong",
""
],
[
"Rajaraman",
"Rajmohan",
""
]
] |
cs/0703101 | Thomas M. Breuel | Thomas M. Breuel | A Note on Approximate Nearest Neighbor Methods | The report was originally written in 2005 and does not reference
information after that date | null | null | null | cs.IR cs.CC cs.CV | null | A number of authors have described randomized algorithms for solving the
epsilon-approximate nearest neighbor problem. In this note I point out that the
epsilon-approximate nearest neighbor property often fails to be a useful
approximation property, since epsilon-approximate solutions fail to satisfy the
necessary preconditions for using nearest neighbors for classification and
related tasks.
| [
{
"version": "v1",
"created": "Wed, 21 Mar 2007 20:47:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Breuel",
"Thomas M.",
""
]
] |
cs/0703106 | Paul Wang | Shengbao Wang | Practical Identity-Based Encryption (IBE) in Multiple PKG Environments
and Its Applications | A work in progress, any comment and suggestion will be highly
appreciated by the author | null | null | null | cs.CR | null | In this paper, we present a new identity-based encryption (IBE) scheme using
bilinear pairings. Our IBE scheme enjoys the same \textsf{Key Extraction} and
\textsf{Decryption} algorithms with the famous IBE scheme of Boneh and Franklin
(BF-IBE for short), while differs from the latter in that it has modified
\textsf{Setup} and \textsf{Encryption} algorithms.
Compared with BF-IBE, we show that ours are more practical in a multiple
private key generator (PKG) environment, mainly due to that the session secret
$g_{ID}$ could be pre-computed \emph{before} any interaction, and the sender
could encrypt a message using $g_{ID}$ prior to negotiating with the intended
recipient(s). As an application of our IBE scheme, we also derive an escrowed
ElGamal scheme which possesses certain good properties in practice.
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2007 08:05:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Shengbao",
""
]
] |
cs/0703108 | Sourav Dhar | Sourav Dhar, Rabindranath Bera, K.Mal | Wireless Lan to Support Multimedia Communication Using Spread Spectrum
Technology | URSI 0ctober 22-29 2005, 4pages, 6 figures | null | null | null | cs.NI | null | Wireless LAN is currently enjoying rapid deployment in University
departments, business offices, hospitals and homes. It becomes an inexpensive
technology and allows multiple numbers of the households to simultaneously
access the internet while roaming about the house. In the present work, the
design and development of a wireless LAN is highlighted which utilizes direct
sequence spread spectrum (DSSS) technology at 900MHz RF carrier frequency in
its physical layer. This provides enormous security in the physical layer and
hence it is very difficult to hack or jam the network. The installation cost is
also less due to the use of 900 MHz RF carrier frequency..
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2007 11:07:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dhar",
"Sourav",
""
],
[
"Bera",
"Rabindranath",
""
],
[
"Mal",
"K.",
""
]
] |
cs/0703112 | Bharath Ramesh | Bharath Ramesh and Srinidhi Varadarajan | User-level DSM System for Modern High-Performance Interconnection
Networks | 6 pages, 5 figures | null | null | null | cs.DC | null | In this paper, we introduce a new user-level DSM system which has the ability
to directly interact with underlying interconnection networks. The DSM system
provides the application programmer a flexible API to program parallel
applications either using shared memory semantics over physically distributed
memory or to use an efficient remote memory demand paging technique. We also
introduce a new time slice based memory consistency protocol which is used by
the DSM system. We present preliminary results from our implementation on a
small Opteron Linux cluster interconnected over Myrinet.
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2007 19:15:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramesh",
"Bharath",
""
],
[
"Varadarajan",
"Srinidhi",
""
]
] |
cs/0703117 | Juan J. Merelo Pr. | J.L.J. Laredo, E.A. Eiben, M. Schoenauer, P.A. Castillo, A.M. Mora, F.
Fernandez, J.J. Merelo | Self-adaptive Gossip Policies for Distributed Population-based
Algorithms | Submitted to Europar 2007 | null | null | null | cs.DC | null | Gossipping has demonstrate to be an efficient mechanism for spreading
information among P2P networks. Within the context of P2P computing, we propose
the so-called Evolvable Agent Model for distributed population-based algorithms
which uses gossipping as communication policy, and represents every individual
as a self-scheduled single thread. The model avoids obsolete nodes in the
population by defining a self-adaptive refresh rate which depends on the
latency and bandwidth of the network. Such a mechanism balances the migration
rate to the congestion of the links pursuing global population coherence. We
perform an experimental evaluation of this model on a real parallel system and
observe how solution quality and algorithm speed scale with the number of
processors with this seamless approach.
| [
{
"version": "v1",
"created": "Fri, 23 Mar 2007 11:29:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Laredo",
"J. L. J.",
""
],
[
"Eiben",
"E. A.",
""
],
[
"Schoenauer",
"M.",
""
],
[
"Castillo",
"P. A.",
""
],
[
"Mora",
"A. M.",
""
],
[
"Fernandez",
"F.",
""
],
[
"Merelo",
"J. J.",
""
]
] |
cs/0703119 | Daniel A. Spielman | Samuel I. Daitch and Daniel A. Spielman | Support-Graph Preconditioners for 2-Dimensional Trusses | null | null | null | null | cs.NA | null | We use support theory, in particular the fretsaw extensions of Shklarski and
Toledo, to design preconditioners for the stiffness matrices of 2-dimensional
truss structures that are stiffly connected. Provided that all the lengths of
the trusses are within constant factors of each other, that the angles at the
corners of the triangles are bounded away from 0 and $\pi$, and that the
elastic moduli and cross-sectional areas of all the truss elements are within
constant factors of each other, our preconditioners allow us to solve linear
equations in the stiffness matrices to accuracy $\epsilon$ in time $O (n^{5/4}
(\log^{2}n \log \log n)^{3/4} \log (1/\epsilon))$.
| [
{
"version": "v1",
"created": "Fri, 23 Mar 2007 15:03:34 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Mar 2007 18:09:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daitch",
"Samuel I.",
""
],
[
"Spielman",
"Daniel A.",
""
]
] |
cs/0703122 | Richard Kr\'alovi\v{c} | Rastislav Kr\'alovi\v{c}, Richard Kr\'alovi\v{c} | Rapid Almost-Complete Broadcasting in Faulty Networks | Conference: Sirocco 2007 | null | null | null | cs.DC | null | This paper studies the problem of broadcasting in synchronous point-to-point
networks, where one initiator owns a piece of information that has to be
transmitted to all other vertices as fast as possible. The model of fractional
dynamic faults with threshold is considered: in every step either a fixed
number $T$, or a fraction $\alpha$, of sent messages can be lost depending on
which quantity is larger.
As the main result we show that in complete graphs and hypercubes it is
possible to inform all but a constant number of vertices, exhibiting only a
logarithmic slowdown, i.e. in time $O(D\log n)$ where $D$ is the diameter of
the network and $n$ is the number of vertices.
Moreover, for complete graphs under some additional conditions (sense of
direction, or $\alpha<0.55$) the remaining constant number of vertices can be
informed in the same time, i.e. $O(\log n)$.
| [
{
"version": "v1",
"created": "Fri, 23 Mar 2007 22:38:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Královič",
"Rastislav",
""
],
[
"Královič",
"Richard",
""
]
] |
cs/0703126 | Michele Tucci | Michele Tucci | Evolutionary Socioeconomics: Notes on the Computer Simulation according
to the de Finetti - Simon Principia | PDF, 29 pages, 3 graphs; minor changes | null | null | null | cs.CY | null | The present note includes explanatory comments about the synergic interaction
within the sphere of the socioeconomic analysis between the two following
theoretical frameworks. (I). The Darwinian evolutionary model. (II). The
computer simulation in accordance with the principia established by Bruno de
Finetti and Herbert Simon.
| [
{
"version": "v1",
"created": "Sun, 25 Mar 2007 12:46:19 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Apr 2007 14:36:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tucci",
"Michele",
""
]
] |
cs/0703130 | Robert Jeansoulin | Omar Doukari (LSIS), Robert Jeansoulin (IGM-LabInfo) | Space-contained conflict revision, for geographic information | 14 pages | Proc. of 10th AGILE International Conference on Geographic
Information Science, AGILE 2007. (07/05/2007) 1-14 | null | null | cs.AI | null | Using qualitative reasoning with geographic information, contrarily, for
instance, with robotics, looks not only fastidious (i.e.: encoding knowledge
Propositional Logics PL), but appears to be computational complex, and not
tractable at all, most of the time. However, knowledge fusion or revision, is a
common operation performed when users merge several different data sets in a
unique decision making process, without much support. Introducing logics would
be a great improvement, and we propose in this paper, means for deciding -a
priori- if one application can benefit from a complete revision, under only the
assumption of a conjecture that we name the "containment conjecture", which
limits the size of the minimal conflicts to revise. We demonstrate that this
conjecture brings us the interesting computational property of performing a
not-provable but global, revision, made of many local revisions, at a tractable
size. We illustrate this approach on an application.
| [
{
"version": "v1",
"created": "Mon, 26 Mar 2007 12:18:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Doukari",
"Omar",
"",
"LSIS"
],
[
"Jeansoulin",
"Robert",
"",
"IGM-LabInfo"
]
] |
cs/0703131 | Stevan Harnad | Stevan Harnad | Open Access Scientometrics and the UK Research Assessment Exercise | null | null | null | null | cs.IR cs.DL | null | Scientometric predictors of research performance need to be validated by
showing that they have a high correlation with the external criterion they are
trying to predict. The UK Research Assessment Exercise (RAE), together with the
growing movement toward making the full-texts of research articles freely
available on the web -- offer a unique opportunity to test and validate a
wealth of old and new scientometric predictors, through multiple regression
analysis: Publications, journal impact factors, citations, co-citations,
citation chronometrics (age, growth, latency to peak, decay rate),
hub/authority scores, h-index, prior funding, student counts, co-authorship
scores, endogamy/exogamy, textual proximity, download/co-downloads and their
chronometrics, etc. can all be tested and validated jointly, discipline by
discipline, against their RAE panel rankings in the forthcoming parallel
panel-based and metric RAE in 2008. The weights of each predictor can be
calibrated to maximize the joint correlation with the rankings. Open Access
Scientometrics will provide powerful new means of navigating, evaluating,
predicting and analyzing the growing Open Access database, as well as powerful
incentives for making it grow faster. ~
| [
{
"version": "v1",
"created": "Mon, 26 Mar 2007 15:40:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Harnad",
"Stevan",
""
]
] |
cs/0703133 | Edith Elkind | Edith Elkind, Leslie Ann Goldberg, Paul W. Goldberg | Computing Good Nash Equilibria in Graphical Games | 25 pages. Short version appears in ACM EC'07 | null | null | null | cs.GT cs.DS cs.MA | null | This paper addresses the problem of fair equilibrium selection in graphical
games. Our approach is based on the data structure called the {\em best
response policy}, which was proposed by Kearns et al. \cite{kls} as a way to
represent all Nash equilibria of a graphical game. In \cite{egg}, it was shown
that the best response policy has polynomial size as long as the underlying
graph is a path. In this paper, we show that if the underlying graph is a
bounded-degree tree and the best response policy has polynomial size then there
is an efficient algorithm which constructs a Nash equilibrium that guarantees
certain payoffs to all participants. Another attractive solution concept is a
Nash equilibrium that maximizes the social welfare. We show that, while exactly
computing the latter is infeasible (we prove that solving this problem may
involve algebraic numbers of an arbitrarily high degree), there exists an FPTAS
for finding such an equilibrium as long as the best response policy has
polynomial size. These two algorithms can be combined to produce Nash
equilibria that satisfy various fairness criteria.
| [
{
"version": "v1",
"created": "Tue, 27 Mar 2007 16:15:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Elkind",
"Edith",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Goldberg",
"Paul W.",
""
]
] |
cs/0703137 | Rajesh Sudarsan | Rajesh Sudarsan and Calvin J. Ribbens | ReSHAPE: A Framework for Dynamic Resizing and Scheduling of Homogeneous
Applications in a Parallel Environment | 15 pages, 10 figures, 5 tables Submitted to International Conference
on Parallel Processing (ICPP'07) | null | null | null | cs.DC | null | Applications in science and engineering often require huge computational
resources for solving problems within a reasonable time frame. Parallel
supercomputers provide the computational infrastructure for solving such
problems. A traditional application scheduler running on a parallel cluster
only supports static scheduling where the number of processors allocated to an
application remains fixed throughout the lifetime of execution of the job. Due
to the unpredictability in job arrival times and varying resource requirements,
static scheduling can result in idle system resources thereby decreasing the
overall system throughput. In this paper we present a prototype framework
called ReSHAPE, which supports dynamic resizing of parallel MPI applications
executed on distributed memory platforms. The framework includes a scheduler
that supports resizing of applications, an API to enable applications to
interact with the scheduler, and a library that makes resizing viable.
Applications executed using the ReSHAPE scheduler framework can expand to take
advantage of additional free processors or can shrink to accommodate a high
priority application, without getting suspended. In our research, we have
mainly focused on structured applications that have two-dimensional data arrays
distributed across a two-dimensional processor grid. The resize library
includes algorithms for processor selection and processor mapping. Experimental
results show that the ReSHAPE framework can improve individual job turn-around
time and overall system throughput.
| [
{
"version": "v1",
"created": "Tue, 27 Mar 2007 23:27:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sudarsan",
"Rajesh",
""
],
[
"Ribbens",
"Calvin J.",
""
]
] |
cs/0703140 | Daniele Beauquier | Dani\`ele Beauquier (LACL), Fr\'ed\'eric Gauche (LACL) | How to Guarantee Secrecy for Cryptographic Protocols | 19 pages | Rapport interne (03/2007) | null | null | cs.CR | null | In this paper we propose a general definition of secrecy for cryptographic
protocols in the Dolev-Yao model. We give a sufficient condition ensuring
secrecy for protocols where rules have encryption depth at most two, that is
satisfied by almost all practical protocols. The only allowed primitives in the
class of protocols we consider are pairing and encryption with atomic keys.
Moreover, we describe an algorithm of practical interest which transforms a
cryptographic protocol into a secure one from the point of view of secrecy,
without changing its original goal with respect to secrecy of nonces and keys,
provided the protocol satisfies some conditions. These conditions are not very
restrictive and are satisfied for most practical protocols.
| [
{
"version": "v1",
"created": "Wed, 28 Mar 2007 08:03:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Beauquier",
"Danièle",
"",
"LACL"
],
[
"Gauche",
"Frédéric",
"",
"LACL"
]
] |
cs/0703145 | Sandeep Murthy | Sandeep Murthy | The Simultaneous Triple Product Property and Group-theoretic Results for
the Exponent of Matrix Multiplication | 14 pages | null | null | null | cs.DS cs.CC math.GR | null | We describe certain special consequences of certain elementary methods from
group theory for studying the algebraic complexity of matrix multiplication, as
developed by H. Cohn, C. Umans et. al. in 2003 and 2005. The measure of
complexity here is the exponent of matrix multiplication, a real parameter
between 2 and 3, which has been conjectured to be 2. More specifically, a
finite group may simultaneously "realize" several independent matrix
multiplications via its regular algebra if it has a family of triples of
"index" subsets which satisfy the so-called simultaneous triple product
property (STPP), in which case the complexity of these several multiplications
does not exceed the rank (complexity) of the algebra. This leads to bounds for
the exponent in terms of the size of the group and the sizes of its STPP
triples, as well as the dimensions of its distinct irreducible representations.
Wreath products of Abelian with symmetric groups appear especially important,
in this regard, and we give an example of such a group which shows that the
exponent is less than 2.84, and could be possibly be as small as 2.02 depending
on the number of simultaneous matrix multiplications it realizes.
| [
{
"version": "v1",
"created": "Thu, 29 Mar 2007 02:55:17 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Mar 2007 02:17:28 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Apr 2007 13:39:15 GMT"
},
{
"version": "v4",
"created": "Tue, 3 Apr 2007 16:52:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murthy",
"Sandeep",
""
]
] |
cs/0703152 | Ugo Dal Lago | Ugo Dal Lago, Andrea Masini, Margherita Zorzi | Quantum Lambda Calculi with Classical Control: Syntax and Expressive
Power | 25 pages | null | null | null | cs.LO | null | We study an untyped lambda calculus with quantum data and classical control.
This work stems from previous proposals by Selinger and Valiron and by Van
Tonder. We focus on syntax and expressiveness, rather than (denotational)
semantics. We prove subject reduction, confluence and a standardization
theorem. Moreover, we prove the computational equivalence of the proposed
calculus with a suitable class of quantum circuit families.
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2007 08:59:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lago",
"Ugo Dal",
""
],
[
"Masini",
"Andrea",
""
],
[
"Zorzi",
"Margherita",
""
]
] |
cs/0703153 | Maurice Margenstern | Maurice Margenstern | The periodic domino problem is undecidable in the hyperbolic plane | null | null | null | null | cs.CG cs.DM | null | In this paper, we consider the periodic tiling problem which was proved
undecidable in the Euclidean plane by Yu. Gurevich and I. Koriakov in 1972.
Here, we prove that the same problem for the hyperbolic plane is also
undecidable.
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2007 09:31:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Margenstern",
"Maurice",
""
]
] |
cs/0703155 | Amey Karkare | Amey Karkare, Uday Khedker, Amitabha Sanyal | Liveness of Heap Data for Functional Programs | Accepted at Heap Analysis and Verification workshop (HAV 2007), a
satellite workshop of ETAPS 2007 (No formal proceedings for workshop); 15
pages | null | null | null | cs.PL | null | Functional programming languages use garbage collection for heap memory
management. Ideally, garbage collectors should reclaim all objects that are
dead at the time of garbage collection. An object is dead at an execution
instant if it is not used in future. Garbage collectors collect only those dead
objects that are not reachable from any program variable. This is because they
are not able to distinguish between reachable objects that are dead and
reachable objects that are live.
In this paper, we describe a static analysis to discover reachable dead
objects in programs written in first-order, eager functional programming
languages. The results of this technique can be used to make reachable dead
objects unreachable, thereby allowing garbage collectors to reclaim more dead
objects.
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2007 16:06:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karkare",
"Amey",
""
],
[
"Khedker",
"Uday",
""
],
[
"Sanyal",
"Amitabha",
""
]
] |
cs/0703156 | Fadi Badra | Mathieu D'Aquin (KMI), Fadi Badra (INRIA Lorraine - LORIA), Sandrine
Lafrogne (INRIA Lorraine - LORIA), Jean Lieber (INRIA Lorraine - LORIA),
Amedeo Napoli (INRIA Lorraine - LORIA), Laszlo Szathmary (INRIA Lorraine -
LORIA) | Case Base Mining for Adaptation Knowledge Acquisition | null | Dans Twentieth International Joint Conference on Artificial
Intelligence - IJCAI'07 (2007) 750--755 | null | null | cs.AI | null | In case-based reasoning, the adaptation of a source case in order to solve
the target problem is at the same time crucial and difficult to implement. The
reason for this difficulty is that, in general, adaptation strongly depends on
domain-dependent knowledge. This fact motivates research on adaptation
knowledge acquisition (AKA). This paper presents an approach to AKA based on
the principles and techniques of knowledge discovery from databases and
data-mining. It is implemented in CABAMAKA, a system that explores the
variations within the case base to elicit adaptation knowledge. This system has
been successfully tested in an application of case-based reasoning to decision
support in the domain of breast cancer treatment.
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2007 16:16:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"D'Aquin",
"Mathieu",
"",
"KMI"
],
[
"Badra",
"Fadi",
"",
"INRIA Lorraine - LORIA"
],
[
"Lafrogne",
"Sandrine",
"",
"INRIA Lorraine - LORIA"
],
[
"Lieber",
"Jean",
"",
"INRIA Lorraine - LORIA"
],
[
"Napoli",
"Amedeo",
"",
"INRIA Lorraine - LORIA"
],
[
"Szathmary",
"Laszlo",
"",
"INRIA Lorraine -\n LORIA"
]
] |
cs/9711105 | null | Lawrence C. Paulson | Mechanizing Coinduction and Corecursion in Higher-order Logic | null | published in Journal of Logic and Computation 7 (March 1997),
175-204 | null | null | cs.LO | null | A theory of recursive and corecursive definitions has been developed in
higher-order logic (HOL) and mechanized using Isabelle. Least fixedpoints
express inductive data types such as strict lists; greatest fixedpoints express
coinductive data types, such as lazy lists. Well-founded recursion expresses
recursive functions over inductive data types; corecursion expresses functions
that yield elements of coinductive data types. The theory rests on a
traditional formalization of infinite trees. The theory is intended for use in
specification and verification. It supports reasoning about a wide range of
computable functions, but it does not formalize their operational semantics and
can express noncomputable functions also. The theory is illustrated using
finite and infinite lists. Corecursion expresses functions over infinite lists;
coinduction reasons about such functions.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2000 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paulson",
"Lawrence C.",
""
]
] |
cs/9801101 | null | G. Gogic, C. H. Papadimitriou, M. Sideri | Incremental Recompilation of Knowledge | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 8, (1998), 23-37 | null | null | cs.AI | null | Approximating a general formula from above and below by Horn formulas (its
Horn envelope and Horn core, respectively) was proposed by Selman and Kautz
(1991, 1996) as a form of ``knowledge compilation,'' supporting rapid
approximate reasoning; on the negative side, this scheme is static in that it
supports no updates, and has certain complexity drawbacks pointed out by
Kavvadias, Papadimitriou and Sideri (1993). On the other hand, the many
frameworks and schemes proposed in the literature for theory update and
revision are plagued by serious complexity-theoretic impediments, even in the
Horn case, as was pointed out by Eiter and Gottlob (1992), and is further
demonstrated in the present paper. More fundamentally, these schemes are not
inductive, in that they may lose in a single update any positive properties of
the represented sets of formulas (small size, Horn structure, etc.). In this
paper we propose a new scheme, incremental recompilation, which combines Horn
approximation and model-based updates; this scheme is inductive and very
efficient, free of the problems facing its constituents. A set of formulas is
represented by an upper and lower Horn approximation. To update, we replace the
upper Horn formula by the Horn envelope of its minimum-change update, and
similarly the lower one by the Horn core of its update; the key fact which
enables this scheme is that Horn envelopes and cores are easy to compute when
the underlying formula is the result of a minimum-change update of a Horn
formula by a clause. We conjecture that efficient algorithms are possible for
more complex updates.
| [
{
"version": "v1",
"created": "Thu, 1 Jan 1998 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gogic",
"G.",
""
],
[
"Papadimitriou",
"C. H.",
""
],
[
"Sideri",
"M.",
""
]
] |
cs/9801102 | null | J. Engelfriet | Monotonicity and Persistence in Preferential Logics | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 8, (1998), 1-21 | null | null | cs.AI | null | An important characteristic of many logics for Artificial Intelligence is
their nonmonotonicity. This means that adding a formula to the premises can
invalidate some of the consequences. There may, however, exist formulae that
can always be safely added to the premises without destroying any of the
consequences: we say they respect monotonicity. Also, there may be formulae
that, when they are a consequence, can not be invalidated when adding any
formula to the premises: we call them conservative. We study these two classes
of formulae for preferential logics, and show that they are closely linked to
the formulae whose truth-value is preserved along the (preferential) ordering.
We will consider some preferential logics for illustration, and prove syntactic
characterization results for them. The results in this paper may improve the
efficiency of theorem provers for preferential logics.
| [
{
"version": "v1",
"created": "Thu, 1 Jan 1998 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Engelfriet",
"J.",
""
]
] |
cs/9801103 | Maggie McLoughlin | Donald E. Knuth | Linear probing and graphs | null | Algorithmica 22 (1998), no. 4, 561--568 | null | Knuth migration 11/2004 | cs.DS | null | Mallows and Riordan showed in 1968 that labeled trees with a small number of
inversions are related to labeled graphs that are connected and sparse. Wright
enumerated sparse connected graphs in 1977, and Kreweras related the inversions
of trees to the so-called ``parking problem'' in 1980. A~combination of these
three results leads to a surprisingly simple analysis of the behavior of
hashing by linear probing, including higher moments of the cost of successful
search.
| [
{
"version": "v1",
"created": "Thu, 15 Jan 1998 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Knuth",
"Donald E.",
""
]
] |
cs/9803103 | null | S. Argamon-Engelson, M. Koppel | Tractability of Theory Patching | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 8, (1998), 39-65 | null | null | cs.AI | null | In this paper we consider the problem of `theory patching', in which we are
given a domain theory, some of whose components are indicated to be possibly
flawed, and a set of labeled training examples for the domain concept. The
theory patching problem is to revise only the indicated components of the
theory, such that the resulting theory correctly classifies all the training
examples. Theory patching is thus a type of theory revision in which revisions
are made to individual components of the theory. Our concern in this paper is
to determine for which classes of logical domain theories the theory patching
problem is tractable. We consider both propositional and first-order domain
theories, and show that the theory patching problem is equivalent to that of
determining what information contained in a theory is `stable' regardless of
what revisions might be performed to the theory. We show that determining
stability is tractable if the input theory satisfies two conditions: that
revisions to each theory component have monotonic effects on the classification
of examples, and that theory components act independently in the classification
of examples in the theory. We also show how the concepts introduced can be used
to determine the soundness and completeness of particular theory patching
algorithms.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 1998 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argamon-Engelson",
"S.",
""
],
[
"Koppel",
"M.",
""
]
] |
cs/9808001 | Max Chaves | M. Chaves | Chess Pure Strategies are Probably Chaotic | 7 pages, no figures | null | null | null | cs.CC cs.AI | null | It is odd that chess grandmasters often disagree in their analysis of
positions, sometimes even of simple ones, and that a grandmaster can hold his
own against an powerful analytic machine such as Deep Blue. The fact that there
must exist pure winning strategies for chess is used to construct a control
strategy function. It is then shown that chess strategy is equivalent to an
autonomous system of differential equations, and conjectured that the system is
chaotic. If true the conjecture would explain the forenamed peculiarities and
would also imply that there cannot exist a static evaluator for chess.
| [
{
"version": "v1",
"created": "Fri, 21 Aug 1998 19:13:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chaves",
"M.",
""
]
] |
cs/9808002 | Lane A. Hemaspaandra | Edith Hemaspaandra, Lane A. Hemaspaandra, Harald Hempel | Downward Collapse from a Weaker Hypothesis | null | null | null | see UR-CS-TR-98-681 | cs.CC | null | Hemaspaandra et al. proved that, for $m > 0$ and $0 < i < k - 1$: if
$\Sigma_i^p \BoldfaceDelta DIFF_m(\Sigma_k^p)$ is closed under complementation,
then $DIFF_m(\Sigma_k^p) = coDIFF_m(\Sigma_k^p)$. This sharply asymmetric
result fails to apply to the case in which the hypothesis is weakened by
allowing the $\Sigma_i^p$ to be replaced by any class in its difference
hierarchy. We so extend the result by proving that, for $s,m > 0$ and $0 < i <
k - 1$: if $DIFF_s(\Sigma_i^p) \BoldfaceDelta DIFF_m(\Sigma_k^p)$ is closed
under complementation, then $DIFF_m(\Sigma_k^p) = coDIFF_m(\Sigma_k^p)$.
| [
{
"version": "v1",
"created": "Mon, 24 Aug 1998 21:37:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9808003 | Lane A. Hemaspaandra | Lane A. Hemaspaandra and Joerg Rothe | Creating Strong Total Commutative Associative Complexity-Theoretic
One-Way Functions from Any Complexity-Theoretic One-Way Function | null | null | null | see UR-CS-TR-98-688 | cs.CC cs.CR | null | Rabi and Sherman [RS97] presented novel digital signature and unauthenticated
secret-key agreement protocols, developed by themselves and by Rivest and
Sherman. These protocols use ``strong,'' total, commutative (in the case of
multi-party secret-key agreement), associative one-way functions as their key
building blocks. Though Rabi and Sherman did prove that associative one-way
functions exist if $\p \neq \np$, they left as an open question whether any
natural complexity-theoretic assumption is sufficient to ensure the existence
of ``strong,'' total, commutative, associative one-way functions. In this
paper, we prove that if $\p \neq \np$ then ``strong,'' total, commutative,
associative one-way functions exist.
| [
{
"version": "v1",
"created": "Sun, 23 Aug 1998 18:22:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9808004 | Jon Crowcroft | Jon Crowcroft and Philippe Oechslin | Differentiated End-to-End Internet Services using a Weighted
Proportional Fair Sharing TCP | null | null | null | null | cs.NI cs.PF | null | In this document we study the application of weighted proportional fairness
to data flows in the Internet. We let the users set the weights of their
connections in order to maximise the utility they get from the network. When
combined with a pricing scheme where connections are billed by weight and time,
such a system is known to maximise the total utility of the network. Our study
case is a national Web cache server connected to long distance links. We
propose two ways of weighting TCP connections by manipulating some parameters
of the protocol and present results from simulations and prototypes. We finally
discuss how proportional fairness could be used to implement an Internet with
differentiated services.
| [
{
"version": "v1",
"created": "Tue, 25 Aug 1998 12:59:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Crowcroft",
"Jon",
""
],
[
"Oechslin",
"Philippe",
""
]
] |
cs/9808101 | null | M. L. Littman, J. Goldsmith, M. Mundhenk | The Computational Complexity of Probabilistic Planning | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 9, (1998), 1-36 | null | null | cs.AI | null | We examine the computational complexity of testing and finding small plans in
probabilistic planning domains with both flat and propositional
representations. The complexity of plan evaluation and existence varies with
the plan type sought; we examine totally ordered plans, acyclic plans, and
looping plans, and partially ordered plans under three natural definitions of
plan value. We show that problems of interest are complete for a variety of
complexity classes: PL, P, NP, co-NP, PP, NP^PP, co-NP^PP, and PSPACE. In the
process of proving that certain planning problems are complete for NP^PP, we
introduce a new basic NP^PP-complete problem, E-MAJSAT, which generalizes the
standard Boolean satisfiability problem to computations involving probabilistic
quantities; our results suggest that the development of good heuristics for
E-MAJSAT could be important for the creation of efficient algorithms for a wide
variety of problems.
| [
{
"version": "v1",
"created": "Sat, 1 Aug 1998 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Littman",
"M. L.",
""
],
[
"Goldsmith",
"J.",
""
],
[
"Mundhenk",
"M.",
""
]
] |
cs/9809001 | Joerg Rothe | Joerg Rothe | Immunity and Simplicity for Exact Counting and Other Counting Classes | 20 pages | null | null | University of Rochester Technical Report TR-98-679 | cs.CC | null | Ko [RAIRO 24, 1990] and Bruschi [TCS 102, 1992] showed that in some
relativized world, PSPACE (in fact, ParityP) contains a set that is immune to
the polynomial hierarchy (PH). In this paper, we study and settle the question
of (relativized) separations with immunity for PH and the counting classes PP,
C_{=}P, and ParityP in all possible pairwise combinations. Our main result is
that there is an oracle A relative to which C_{=}P contains a set that is
immune to BPP^{ParityP}. In particular, this C_{=}P^A set is immune to PH^{A}
and ParityP^{A}. Strengthening results of Tor\'{a}n [J.ACM 38, 1991] and Green
[IPL 37, 1991], we also show that, in suitable relativizations, NP contains a
C_{=}P-immune set, and ParityP contains a PP^{PH}-immune set. This implies the
existence of a C_{=}P^{B}-simple set for some oracle B, which extends results
of Balc\'{a}zar et al. [SIAM J.Comp. 14, 1985; RAIRO 22, 1988] and provides the
first example of a simple set in a class not known to be contained in PH. Our
proof technique requires a circuit lower bound for ``exact counting'' that is
derived from Razborov's [Mat. Zametki 41, 1987] lower bound for majority.
| [
{
"version": "v1",
"created": "Tue, 1 Sep 1998 11:16:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rothe",
"Joerg",
""
]
] |
cs/9809002 | Joerg Rothe | Judy Goldsmith, Mitsunori Ogihara, Joerg Rothe | Tally NP Sets and Easy Census Functions | 24 pages | null | null | University of Rochester Technical Report TR-98-684 | cs.CC | null | We study the question of whether every P set has an easy (i.e.,
polynomial-time computable) census function. We characterize this question in
terms of unlikely collapses of language and function classes such as the
containment of #P_1 in FP, where #P_1 is the class of functions that count the
witnesses for tally NP sets. We prove that every #P_{1}^{PH} function can be
computed in FP^{#P_{1}^{#P_{1}}}. Consequently, every P set has an easy census
function if and only if every set in the polynomial hierarchy does. We show
that the assumption of #P_1 being contained in FP implies P = BPP and that PH
is contained in MOD_{k}P for each k \geq 2, which provides further evidence
that not all sets in P have an easy census function. We also relate a set's
property of having an easy census function to other well-studied properties of
sets, such as rankability and scalability (the closure of the rankable sets
under P-isomorphisms). Finally, we prove that it is no more likely that the
census function of any set in P can be approximated (more precisely, can be
n^{\alpha}-enumerated in time n^{\beta} for fixed \alpha and \beta) than that
it can be precisely computed in polynomial time.
| [
{
"version": "v1",
"created": "Tue, 1 Sep 1998 12:15:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldsmith",
"Judy",
""
],
[
"Ogihara",
"Mitsunori",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9809003 | Joseph Y. Halpern | R. Fagin, J. Y. Halpern, Y. Moses, and M. Vardi | Common knowledge revisited | A previous version appeared in TARK (Theoretical Aspects of
Rationality and Knowledge), 1996. This version will appear in Annals of Pure
and Applied Logic. The material in this paper is basically taken from Chapter
11 of our book Reasoning About Knowledge (MIT Press, 1995) | null | null | null | cs.LO cs.DC | null | We consider the common-knowledge paradox raised by Halpern and Moses: common
knowledge is necessary for agreement and coordination, but common knowledge is
unattainable in the real world because of temporal imprecision. We discuss two
solutions to this paradox: (1) modeling the world with a coarser granularity,
and (2) relaxing the requirements for coordination.
| [
{
"version": "v1",
"created": "Tue, 1 Sep 1998 21:56:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fagin",
"R.",
""
],
[
"Halpern",
"J. Y.",
""
],
[
"Moses",
"Y.",
""
],
[
"Vardi",
"M.",
""
]
] |
cs/9809004 | Jim Gray | Jim Gray, Joshua Coates, Chris Nyberg | Performance / Price Sort | Original word file at:
http://research.microsoft.com/~gray/PennySort.doc | null | null | null | cs.DB cs.PF | null | NTsort is an external sort on WindowsNT 5.0. It has minimal functionality but
excellent price performance. In particular, running on mail-order hardware it
can sort 1.5 GB for a penny. For commercially available sorts, Postman Sort
from Robert Ramey Software Development has elapsed time performance comparable
to NTsort, while using less processor time. It can sort 1.27 GB for a penny
(12.7 million records.) These sorts set new price-performance records. This
paper documents this and proposes that the PennySort benchmark be revised to
Performance/Price sort: a simple GB/$ sort metric based on a two-pass external
sort.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 00:49:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Coates",
"Joshua",
""
],
[
"Nyberg",
"Chris",
""
]
] |
cs/9809005 | Jim Gray | Jim Gray, Goetz Graefe | The Five-Minute Rule Ten Years Later, and Other Computer Storage Rules
of Thumb | Original document at:
http://research.microsoft.com/~gray/5_min_rule_SIGMOD.doc | ACM SIGMOD Record 26(4): 63-68 (1997) | null | MSR-TR-97-33 | cs.DB | null | Simple economic and performance arguments suggest appropriate lifetimes for
main memory pages and suggest optimal page sizes. The fundamental tradeoffs are
the prices and bandwidths of RAMs and disks. The analysis indicates that with
today's technology, five minutes is a good lifetime for randomly accessed
pages, one minute is a good lifetime for two-pass sequentially accessed pages,
and 16 KB is a good size for index pages. These rules-of-thumb change in
predictable ways as technology ratios change. They also motivate the importance
of the new Kaps, Maps, Scans, and $/Kaps, $/Maps, $/TBscan metrics.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 01:49:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Graefe",
"Goetz",
""
]
] |
cs/9809006 | Jim Gray | Werner Vogels, Dan Dumitriu, Ken Birman, Rod Gamache, Mike Massa, Rob
Short, John Vert, Joe Barrera | The Design and Architecture of the Microsoft Cluster Service -- A
Practical Approach to High-Availability and Scalability | Original document at:
http://research.microsoft.com/~gray/MSCS_FTCS98.doc | Proceedings of FTCS'98, June 23-25, 1998 in Munich, Germany | null | Microsoft Research MSR-TR-98-16 | cs.OS cs.DC | null | Microsoft Cluster Service (MSCS) extends the Win-dows NT operating system to
support high-availability services. The goal is to offer an execution
environment where off-the-shelf server applications can continue to operate,
even in the presence of node failures. Later ver-sions of MSCS will provide
scalability via a node and application management system that allows
applications to scale to hundreds of nodes. This paper provides a de-tailed
description of the MSCS architecture and the de-sign decisions that have driven
the implementation of the service. The paper also describes how some major
appli-cations use the MSCS features, and describes features added to make it
easier to implement and manage fault-tolerant applications on MSCS.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 17:11:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vogels",
"Werner",
""
],
[
"Dumitriu",
"Dan",
""
],
[
"Birman",
"Ken",
""
],
[
"Gamache",
"Rod",
""
],
[
"Massa",
"Mike",
""
],
[
"Short",
"Rob",
""
],
[
"Vert",
"John",
""
],
[
"Barrera",
"Joe",
""
]
] |
cs/9809007 | Jim Gray | Jim Gray | Locally Served Network Computers | Original document at:
http://research.microsoft.com/~gray/NC_Servers.doc | Middleware Spectra, 11.2, 1997 | null | MSR-TR-95-55 | cs.AR cs.DC | null | NCs are the natural evolution of PCs, ubiquitous computers everywhere. The
current vision of NCs requires two improbable developments: (1) inexpensive
high-bandwidth WAN links to the Internet, and (2) inexpensive centralized
servers. The large NC bandwidth requirements will force each home or office to
have a local server LAN attached to the NCs. These servers will be much less
expensive to purchase and manage than a centralized solution. Centralized staff
are expensive and unresponsive.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 17:30:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] |
cs/9809009 | Ronald F. Boisvert | Ronald F. Boisvert, Jack J. Dongarra, Roldan Pozo, Karin Remington and
G. W. Stewart | Developing numerical libraries in Java | 11 pages. Revised version of paper presented to the 1998 ACM
Conference on Java for High Performance Network Computing. To appear in
Concurrency: Practice and Experience | null | null | null | cs.MS | null | The rapid and widespread adoption of Java has created a demand for reliable
and reusable mathematical software components to support the growing number of
compute-intensive applications now under development, particularly in science
and engineering. In this paper we address practical issues of the Java language
and environment which have an effect on numerical library design and
development. Benchmarks which illustrate the current levels of performance of
key numerical kernels on a variety of Java platforms are presented. Finally, a
strategy for the development of a fundamental numerical toolkit for Java is
proposed and its current status is described.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 19:27:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boisvert",
"Ronald F.",
""
],
[
"Dongarra",
"Jack J.",
""
],
[
"Pozo",
"Roldan",
""
],
[
"Remington",
"Karin",
""
],
[
"Stewart",
"G. W.",
""
]
] |
cs/9809010 | Jim Gray | C. Gordon Bell, Jim Gray | The Revolution Yet to Happen | Original document at:
http://research.microsoft.com/~gray/Revolution.doc | null | null | Microsoft Technical report: MSR-TR-98-45 | cs.GL | null | All information about physical objects including humans, buildings,
processes, and organizations will be online. This trend is both desirable and
inevitable. Cyberspace will provide the basis for wonderful new ways to inform,
entertain, and educate people. The information and the corresponding systems
will streamline commerce, but will also provide new levels of personal service,
health care, and automation. The most significant benefit will be a
breakthrough in our ability to remotely communicate with one another using all
our senses.
The ACM and the transistor were born in 1947. At that time the stored program
computer was a revolutionary idea and the transistor was just a curiosity. Both
ideas evolved rapidly. By the mid 1960s integrated circuits appeared --
allowing mass fabrication of transistors on silicon substrates. This allowed
low-cost mass-produced computers. These technologies enabled extraordinary
increases in processing speed and memory coupled with extraordinary price
declines.
The only form of processing and memory more easily, cheaply, and rapidly
fabricated is the human brain. Peter Cohrane (1996) estimates the brain to have
a processing power of around 1000 million-million operations per second, (one
Petaops) and a memory of 10 Terabytes. If current trends continue, computers
could have these capabilities by 2047. Such computers could be 'on body'
personal assistants able to recall everything one reads, hears, and sees.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 19:39:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bell",
"C. Gordon",
""
],
[
"Gray",
"Jim",
""
]
] |
cs/9809011 | Jim Gray | Tom Barclay, Robert Eberl, Jim Gray, John Nordlinger, Guru
Raghavendran, Don Slutz, Greg Smith, Phil Smoot, John Hoffman, Natt Robb III,
Hedy Rossmeissl, Beth Duff, George Lee, Theresa Mathesmier, Randall Sunne | Microsoft TerraServer | Original file at
http://research.microsoft.com/~gray/TerraServer_TR.doc | null | null | Microsoft MSR-TR-98-17 | cs.DB cs.DL | null | The Microsoft TerraServer stores aerial and satellite images of the earth in
a SQL Server Database served to the public via the Internet. It is the world's
largest atlas, combining five terabytes of image data from the United States
Geodetic Survey, Sovinformsputnik, and Encarta Virtual Globe. Internet browsers
provide intuitive spatial and gazetteer interfaces to the data. The TerraServer
is also an E-Commerce application. Users can buy the right to use the imagery
using Microsoft Site Servers managed by the USGS and Aerial Images. This paper
describes the TerraServer's design and implementation.
| [
{
"version": "v1",
"created": "Sat, 5 Sep 1998 00:29:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barclay",
"Tom",
""
],
[
"Eberl",
"Robert",
""
],
[
"Gray",
"Jim",
""
],
[
"Nordlinger",
"John",
""
],
[
"Raghavendran",
"Guru",
""
],
[
"Slutz",
"Don",
""
],
[
"Smith",
"Greg",
""
],
[
"Smoot",
"Phil",
""
],
[
"Hoffman",
"John",
""
],
[
"Robb",
"Natt",
"III"
],
[
"Rossmeissl",
"Hedy",
""
],
[
"Duff",
"Beth",
""
],
[
"Lee",
"George",
""
],
[
"Mathesmier",
"Theresa",
""
],
[
"Sunne",
"Randall",
""
]
] |
cs/9809012 | David Karger | David R. Karger | A Fully Polynomial Randomized Approximation Scheme for the All Terminal
Network Reliability Problem | To appear in SICOMP | null | null | null | cs.DS | null | The classic all-terminal network reliability problem posits a graph, each of
whose edges fails independently with some given probability.
| [
{
"version": "v1",
"created": "Wed, 9 Sep 1998 02:38:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karger",
"David R.",
""
]
] |
cs/9809013 | Joseph Y. Halpern | Fahiem Bacchus, Joseph Y. Halpern, Hector J. Levesque | Reasoning about Noisy Sensors and Effectors in the Situation Calculus | A preliminary version of the paper appeared in IJCAI '95 | null | null | null | cs.AI cs.LO | null | Agents interacting with an incompletely known world need to be able to reason
about the effects of their actions, and to gain further information about that
world they need to use sensors of some sort. Unfortunately, both the effects of
actions and the information returned from sensors are subject to error. To cope
with such uncertainties, the agent can maintain probabilistic beliefs about the
state of the world. With probabilistic beliefs the agent will be able to
quantify the likelihood of the various outcomes of its actions and is better
able to utilize the information gathered from its error-prone actions and
sensors. In this paper, we present a model in which we can reason about an
agent's probabilistic degrees of belief and the manner in which these beliefs
change as various actions are executed. We build on a general logical theory of
action developed by Reiter and others, formalized in the situation calculus. We
propose a simple axiomatization that captures an agent's state of belief and
the manner in which these beliefs change when actions are executed. Our model
displays a number of intuitively reasonable properties.
| [
{
"version": "v1",
"created": "Wed, 9 Sep 1998 22:28:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bacchus",
"Fahiem",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Levesque",
"Hector J.",
""
]
] |
cs/9809016 | Gopalan Nadathur | Gopalan Nadathur, Bharat Jayaraman and Keehang Kwon | Scoping Constructs in Logic Programming: Implementation Problems and
their Solution | 46 pages | Journal of Logic Programming, 25(2)-119:161, 1995 | null | null | cs.PL | null | The inclusion of universal quantification and a form of implication in goals
in logic programming is considered. These additions provide a logical basis for
scoping but they also raise new implementation problems. When universal and
existential quantifiers are permitted to appear in mixed order in goals, the
devices of logic variables and unification that are employed in solving
existential goals must be modified to ensure that constraints arising out of
the order of quantification are respected. Suitable modifications that are
based on attaching numerical tags to constants and variables and on using these
tags in unification are described. The resulting devices are amenable to an
efficient implementation and can, in fact, be assimilated easily into the usual
machinery of the Warren Abstract Machine (WAM). The provision of implications
in goals results in the possibility of program clauses being added to the
program for the purpose of solving specific subgoals. A naive scheme based on
asserting and retracting program clauses does not suffice for implementing such
additions for two reasons. First, it is necessary to also support the
resurrection of an earlier existing program in the face of backtracking.
Second, the possibility for implication goals to be surrounded by quantifiers
requires a consideration of the parameterization of program clauses by bindings
for their free variables. Devices for supporting these additional requirements
are described as also is the integration of these devices into the WAM. Further
extensions to the machine are outlined for handling higher-order additions to
the language. The ideas presented here are relevant to the implementation of
the higher-order logic programming language lambda Prolog.
| [
{
"version": "v1",
"created": "Thu, 10 Sep 1998 16:54:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nadathur",
"Gopalan",
""
],
[
"Jayaraman",
"Bharat",
""
],
[
"Kwon",
"Keehang",
""
]
] |
cs/9809017 | Madhav Marathe | Harry B. Hunt III, Madhav V. Marathe, Venkatesh Radhakrishnan, Richard
E. Stearns | The Complexity of Planar Counting Problems | 25 pages, 12 figures, appears in SIAM J. Computing | null | null | null | cs.CC cs.DM | null | We prove the #P-hardness of the counting problems associated with various
satisfiability, graph and combinatorial problems, when restricted to planar
instances. These problems include \begin{romannum} \item[{}] {\sc 3Sat, 1-3Sat,
1-Ex3Sat, Minimum Vertex Cover, Minimum Dominating Set, Minimum Feedback Vertex
Set, X3C, Partition Into Triangles, and Clique Cover.} \end{romannum} We also
prove the {\sf NP}-completeness of the {\sc Ambiguous Satisfiability} problems
\cite{Sa80} and the {\sf D$^P$}-completeness (with respect to random polynomial
reducibility) of the unique satisfiability problems \cite{VV85} associated with
several of the above problems, when restricted to planar instances. Previously,
very few {\sf #P}-hardness results, no {\sf NP}-hardness results, and no {\sf
D$^P$}-completeness results were known for counting problems, ambiguous
satisfiability problems and unique satisfiability problems, respectively, when
restricted to planar instances.
Assuming {\sf P $\neq $ NP}, one corollary of the above results is
There are no $\epsilon$-approximation algorithms for the problems of
maximizing or minimizing a linear objective function subject to a planar system
of linear inequality constraints over the integers.
| [
{
"version": "v1",
"created": "Fri, 11 Sep 1998 17:38:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hunt",
"Harry B.",
"III"
],
[
"Marathe",
"Madhav V.",
""
],
[
"Radhakrishnan",
"Venkatesh",
""
],
[
"Stearns",
"Richard E.",
""
]
] |
cs/9809018 | Lorrie Cranor | Lorrie Faith Cranor and Rebecca N. Wright | Influencing Software Usage | Prepared for the 26th Telecommunications Policy Research Conference,
October 3-5, 1998, Alexandria, VA | null | null | null | cs.CY | null | Technology designers often strive to design systems that are flexible enough
to be used in a wide range of situations. Software engineers, in particular,
are trained to seek general solutions to problems. General solutions can be
used not only to address the problem at hand, but also to address a wide range
of problems that the designers may not have even anticipated. Sometimes
designers wish to provide general solutions, while encouraging certain uses of
their technology and discouraging or precluding others. They may attempt to
influence the use of technology by ``hard-wiring'' it so that it only can be
used in certain ways, licensing it so that those who use it are legally
obligated to use it in certain ways, issuing guidelines for how it should be
used, or providing resources that make it easier to use the technology as the
designers intended than to use it in any other way.
This paper examines several cases where designers have attempted to influence
the use of technology through one of these mechanisms. Such cases include key
recovery encryption, Pegasus Mail, Platform for Internet Content Selection
(PICS) Guidelines, Java, Platform for Privacy Preferences Project (P3P)
Implementation Guide, Apple's style guidelines, and Microsoft Foundation
Classes. In some of these cases, the designers sought to influence the use of
technology for competitive reasons or in order to promote standardization or
interoperability. However, in other cases designers were motivated by
policy-related goals such as protecting privacy or free speech. As new
technologies are introduced with the express purpose of advancing
policy-related goals (for example, PICS and P3P), it is especially important to
understand the roles designers might play in influencing the use of technology.
| [
{
"version": "v1",
"created": "Fri, 11 Sep 1998 18:40:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cranor",
"Lorrie Faith",
""
],
[
"Wright",
"Rebecca N.",
""
]
] |
cs/9809019 | Michael Manthey | Michael Manthey | Distributed Computation as Hierarchy | 16 pages, 3 figures | null | null | Aalborg University, Computer Science Dept. R-98-5005 | cs.DC cs.NE | null | This paper presents a new distributed computational model of distributed
systems called the phase web that extends V. Pratt's orthocurrence relation
from 1986. The model uses mutual-exclusion to express sequence, and a new kind
of hierarchy to replace event sequences, posets, and pomsets. The model
explicitly connects computation to a discrete Clifford algebra that is in turn
extended into homology and co-homology, wherein the recursive nature of objects
and boundaries becomes apparent and itself subject to hierarchical recursion.
Topsy, a programming environment embodying the phase web, is available from
www.cs.auc.dk/topsy.
| [
{
"version": "v1",
"created": "Mon, 14 Sep 1998 15:25:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Manthey",
"Michael",
""
]
] |
cs/9809020 | Min-Yen Kan | Min-Yen Kan, Judith L. Klavans, Kathleen R. McKeown | Linear Segmentation and Segment Significance | 9 pages, US Letter, 4 figures. Software License can be found at
http://www.cs.columbia.edu/nlp/licenses/segmenterLicenseDownload.html | Proceedings of 6th International Workshop of Very Large Corpora
(WVLC-6), Montreal, Quebec, Canada: Aug. 1998. pp. 197-205 | null | null | cs.CL | null | We present a new method for discovering a segmental discourse structure of a
document while categorizing segment function. We demonstrate how retrieval of
noun phrases and pronominal forms, along with a zero-sum weighting scheme,
determines topicalized segmentation. Futhermore, we use term distribution to
aid in identifying the role that the segment performs in the document. Finally,
we present results of evaluation in terms of precision and recall which surpass
earlier approaches.
| [
{
"version": "v1",
"created": "Tue, 15 Sep 1998 23:49:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kan",
"Min-Yen",
""
],
[
"Klavans",
"Judith L.",
""
],
[
"McKeown",
"Kathleen R.",
""
]
] |
cs/9809021 | Frantz Vichot | Francis Wolinski, Frantz Vichot, Olivier Gremont (Informatique
CDC/DTA, Arcueil, France) | Producing NLP-based On-line Contentware | 7 pages, 5 figures | Natural Language Processing & Industrial Applications, Moncton,
NB, Canada, Aug. 1998 | null | null | cs.CL cs.AR | null | For its internal needs as well as for commercial purposes, CDC Group has
produced several NLP-based on-line contentware applications for years. The
development process of such applications is subject to numerous constraints
such as quality of service, integration of new advances in NLP, direct
reactions from users, continuous versioning, short delivery deadlines and cost
control. Following this industrial and commercial experience, malleability of
the applications, their openness towards foreign components, efficiency of
applications and their ease of exploitation have appeared to be key points. In
this paper, we describe TalLab, a powerful architecture for on-line contentware
which fulfils these requirements.
| [
{
"version": "v1",
"created": "Wed, 16 Sep 1998 14:22:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolinski",
"Francis",
"",
"Informatique\n CDC/DTA, Arcueil, France"
],
[
"Vichot",
"Frantz",
"",
"Informatique\n CDC/DTA, Arcueil, France"
],
[
"Gremont",
"Olivier",
"",
"Informatique\n CDC/DTA, Arcueil, France"
]
] |
cs/9809022 | Bernd Ludwig | Bernd Ludwig, Guenther Goerz, Heinrich Niemann | Modelling Users, Intentions, and Structure in Spoken Dialog | 17 pages | null | null | null | cs.CL | null | We outline how utterances in dialogs can be interpreted using a partial first
order logic. We exploit the capability of this logic to talk about the truth
status of formulae to define a notion of coherence between utterances and
explain how this coherence relation can serve for the construction of AND/OR
trees that represent the segmentation of the dialog. In a BDI model we
formalize basic assumptions about dialog and cooperative behaviour of
participants. These assumptions provide a basis for inferring speech acts from
coherence relations between utterances and attitudes of dialog participants.
Speech acts prove to be useful for determining dialog segments defined on the
notion of completing expectations of dialog participants. Finally, we sketch
how explicit segmentation signalled by cue phrases and performatives is covered
by our dialog model.
| [
{
"version": "v1",
"created": "Thu, 17 Sep 1998 11:10:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ludwig",
"Bernd",
""
],
[
"Goerz",
"Guenther",
""
],
[
"Niemann",
"Heinrich",
""
]
] |
cs/9809023 | Davood Rafiei | Davood Rafiei and Alberto Mendelzon | Similarity-Based Queries for Time Series Data | null | In Proceedings of the ACM SIGMOD Intl. Conf. on Management of
Data, pages 13-24, Tucson, Arizona, May 1997 | null | null | cs.DB | null | We study a set of linear transformations on the Fourier series representation
of a sequence that can be used as the basis for similarity queries on
time-series data. We show that our set of transformations is rich enough to
formulate operations such as moving average and time warping. We present a
query processing algorithm that uses the underlying R-tree index of a
multidimensional data set to answer similarity queries efficiently. Our
experiments show that the performance of this algorithm is competitive to that
of processing ordinary (exact match) queries using the index, and much faster
than sequential scanning. We relate our transformations to the general
framework for similarity queries of Jagadish et al.
| [
{
"version": "v1",
"created": "Thu, 17 Sep 1998 14:41:07 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Sep 1998 19:04:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rafiei",
"Davood",
""
],
[
"Mendelzon",
"Alberto",
""
]
] |
cs/9809025 | Bernardo A. Huberman | Bernardo A. Huberman and Lada A. Adamic | Novelty and Social Search in the World Wide Web | null | null | null | null | cs.MA cs.DL | null | The World Wide Web is fast becoming a source of information for a large part
of the world's population. Because of its sheer size and complexity users often
resort to recommendations from others to decide which sites to visit. We
present a dynamical theory of recommendations which predicts site visits by
users of the World Wide Web. We show that it leads to a universal power law for
the number of users that visit given sites over periods of time, with an
exponent related to the rate at which users discover new sites on their own. An
extensive empirical study of user behavior in the Web that we conducted
confirms the existence of this law of influence while yielding bounds on the
rate of novelty encountered by users.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 00:07:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huberman",
"Bernardo A.",
""
],
[
"Adamic",
"Lada A.",
""
]
] |
cs/9809026 | Anoop Sarkar | Mark-Jan Nederhof (DFKI), Anoop Sarkar (UPenn) and Giorgio Satta
(UPadova) | Prefix Probabilities from Stochastic Tree Adjoining Grammars | 7 pages, 2 Postscript figures, uses colacl.sty, graphicx.sty,
psfrag.sty | In Proceedings of COLING-ACL '98 (Montreal) | null | null | cs.CL | null | Language models for speech recognition typically use a probability model of
the form Pr(a_n | a_1, a_2, ..., a_{n-1}). Stochastic grammars, on the other
hand, are typically used to assign structure to utterances. A language model of
the above form is constructed from such grammars by computing the prefix
probability Sum_{w in Sigma*} Pr(a_1 ... a_n w), where w represents all
possible terminations of the prefix a_1 ... a_n. The main result in this paper
is an algorithm to compute such prefix probabilities given a stochastic Tree
Adjoining Grammar (TAG). The algorithm achieves the required computation in
O(n^6) time. The probability of subderivations that do not derive any words in
the prefix, but contribute structurally to its derivation, are precomputed to
achieve termination. This algorithm enables existing corpus-based estimation
techniques for stochastic TAGs to be used for language modelling.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 03:45:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nederhof",
"Mark-Jan",
"",
"DFKI"
],
[
"Sarkar",
"Anoop",
"",
"UPenn"
],
[
"Satta",
"Giorgio",
"",
"UPadova"
]
] |
cs/9809027 | Anoop Sarkar | Anoop Sarkar (University of Pennsylvania) | Conditions on Consistency of Probabilistic Tree Adjoining Grammars | 7 pages, 4 Postscript figures, uses colacl.sty, graphicx.sty,
psfrag.sty | In Proceedings of COLING-ACL '98 (Montreal) | null | null | cs.CL | null | Much of the power of probabilistic methods in modelling language comes from
their ability to compare several derivations for the same string in the
language. An important starting point for the study of such cross-derivational
properties is the notion of _consistency_. The probability model defined by a
probabilistic grammar is said to be _consistent_ if the probabilities assigned
to all the strings in the language sum to one. From the literature on
probabilistic context-free grammars (CFGs), we know precisely the conditions
which ensure that consistency is true for a given CFG. This paper derives the
conditions under which a given probabilistic Tree Adjoining Grammar (TAG) can
be shown to be consistent. It gives a simple algorithm for checking consistency
and gives the formal justification for its correctness. The conditions derived
here can be used to ensure that probability models that use TAGs can be checked
for _deficiency_ (i.e. whether any probability mass is assigned to strings that
cannot be generated).
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 03:58:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sarkar",
"Anoop",
"",
"University of Pennsylvania"
]
] |
cs/9809028 | Anoop Sarkar | Anoop Sarkar (University of Pennsylvania) | Separating Dependency from Constituency in a Tree Rewriting System | 7 pages, 6 Postscript figures, uses fullname.sty | In Proceedings of the Fifth Meeting on Mathematics of Language,
Saarbruecken, August 1997 | null | null | cs.CL | null | In this paper we present a new tree-rewriting formalism called Link-Sharing
Tree Adjoining Grammar (LSTAG) which is a variant of synchronous TAGs. Using
LSTAG we define an approach towards coordination where linguistic dependency is
distinguished from the notion of constituency. Such an approach towards
coordination that explicitly distinguishes dependencies from constituency gives
a better formal understanding of its representation when compared to previous
approaches that use tree-rewriting systems which conflate the two issues.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 04:44:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sarkar",
"Anoop",
"",
"University of Pennsylvania"
]
] |
cs/9809030 | Vern Paxson | Vern Paxson (Network Research Group, Lawrence Berkeley National
Laboratory) | Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating
Self-Similar Network Traffic | 14 pages | Computer Communication Review 27(5) (1997) 5-18 | null | LBL-36750/UC-405 | cs.NI | null | Recent network traffic studies argue that network arrival processes are much
more faithfully modeled using statistically self-similar processes instead of
traditional Poisson processes [LTWW94,PF95]. One difficulty in dealing with
self-similar models is how to efficiently synthesize traces (sample paths)
corresponding to self-similar traffic. We present a fast Fourier transform
method for synthesizing approximate self-similar sample paths for one type of
self-similar process, Fractional Gaussian Noise, and assess its performance and
validity. We find that the method is as fast or faster than existing methods
and appears to generate close approximations to true self-similar sample paths.
We also discuss issues in using such synthesized sample paths for simulating
network traffic, and how an approximation used by our method can dramatically
speed up evaluation of Whittle's estimator for H, the Hurst parameter giving
the strength of long-range dependence present in a self-similar time series.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 05:18:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paxson",
"Vern",
"",
"Network Research Group, Lawrence Berkeley National\n Laboratory"
]
] |
cs/9809031 | Mihir Bellare | William Aiello, Mihir Bellare, Giovanni Di Crescenzo and Ramarathnam
Venkatesan | Security amplification by composition: The case of doubly-iterated,
ideal ciphers | An extended abstract of this paper appeared in the proceedings of
Crypto 98 conference (Springer Verlag LNCS Vol 1462, 1998). This is the full
version | null | null | null | cs.CR | null | We investigate, in the Shannon model, the security of constructions
corresponding to double and (two-key) triple DES. That is, we consider
F_{k1}(F_{k2}(.)) and F_{k1}(F_{k2}^{-1}(F_{k1}(.))) with the component
functions being ideal ciphers. This models the resistance of these
constructions to ``generic'' attacks like meet in the middle attacks. We obtain
the first proof that composition actually increases the security of these
constructions in some meaningful sense. We compute a bound on the probability
of breaking the double cipher as a function of the number of computations of
the base cipher made, and the number of examples of the composed cipher seen,
and show that the success probability is the square of that for a single key
cipher. The same bound holds for the two-key triple cipher. The first bound is
tight and shows that meet in the middle is the best possible generic attack
against the double cipher.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 19:02:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aiello",
"William",
""
],
[
"Bellare",
"Mihir",
""
],
[
"Di Crescenzo",
"Giovanni",
""
],
[
"Venkatesan",
"Ramarathnam",
""
]
] |
cs/9809032 | Miroslaw Truszczynski | Victor W. Marek, Miroslaw Truszczynski | Stable models and an alternative logic programming paradigm | 21 pages | The Logic Programming Paradigm, K.R. Apt, V.W. Marek, M.
Truszczynski, D.S. Warren (eds.), pp. 375-398. Springer-Verlag, 1999 | null | null | cs.LO cs.AI | null | In this paper we reexamine the place and role of stable model semantics in
logic programming and contrast it with a least Herbrand model approach to Horn
programs. We demonstrate that inherent features of stable model semantics
naturally lead to a logic programming system that offers an interesting
alternative to more traditional logic programming styles of Horn logic
programming, stratified logic programming and logic programming with
well-founded semantics. The proposed approach is based on the interpretation of
program clauses as constraints. In this setting programs do not describe a
single intended model, but a family of stable models. These stable models
encode solutions to the constraint satisfaction problem described by the
program. Our approach imposes restrictions on the syntax of logic programs. In
particular, function symbols are eliminated from the language. We argue that
the resulting logic programming system is well-attuned to problems in the class
NP, has a well-defined domain of applications, and an emerging methodology of
programming. We point out that what makes the whole approach viable is recent
progress in implementations of algorithms to compute stable models of
propositional logic programs.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 20:34:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marek",
"Victor W.",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] |
cs/9809033 | Davood Rafiei | Davood Rafiei and Alberto Mendelzon | Efficient Retrieval of Similar Time Sequences Using DFT | null | Proceedings of 5th Intl. Conf. on Foundations of Data
Organizations and Algorithms (FODO '98), November 1998, Kobe, Japan | null | null | cs.DB | null | We propose an improvement of the known DFT-based indexing technique for fast
retrieval of similar time sequences. We use the last few Fourier coefficients
in the distance computation without storing them in the index since every
coefficient at the end is the complex conjugate of a coefficient at the
beginning and as strong as its counterpart. We show analytically that this
observation can accelerate the search time of the index by more than a factor
of two. This result was confirmed by our experiments, which were carried out on
real stock prices and synthetic data.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 21:24:23 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Sep 1998 16:12:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rafiei",
"Davood",
""
],
[
"Mendelzon",
"Alberto",
""
]
] |
cs/9809034 | Tim Finin | Yannis Labrou and Tim Finin | Semantics and Conversations for an Agent Communication Language | Also in in "Readings in Agents", Michael Huhns and Munindar Singh
(eds), Morgan Kaufmann Publishers, Inc | Proceedings of the Fifteenth International Joint Conference on
Artificial Intelligence (IJCAI-97) August, 1997 | null | null | cs.MA cs.AI | null | We address the issues of semantics and conversations for agent communication
languages and the Knowledge Query Manipulation Language (KQML) in particular.
Based on ideas from speech act theory, we present a semantic description for
KQML that associates ``cognitive'' states of the agent with the use of the
language's primitives (performatives). We have used this approach to describe
the semantics for the whole set of reserved KQML performatives. Building on the
semantics, we devise the conversation policies, i.e., a formal description of
how KQML performatives may be combined into KQML exchanges (conversations),
using a Definite Clause Grammar. Our research offers methods for a speech act
theory-based semantic description of a language of communication acts and for
the specification of the protocols associated with these acts. Languages of
communication acts address the issue of communication among software
applications at a level of abstraction that is useful to the emerging software
agents paradigm.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 21:41:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Labrou",
"Yannis",
""
],
[
"Finin",
"Tim",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.