id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-21 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0702172
Roderick Melnik
Linxiang X. Wang and Roderick V.N. Melnik
Numerical Model For Vibration Damping Resulting From the First Order Phase Transformations
Keywords: martensite transformation, thermo-mechanical coupling, vibration damping, Ginzburg-Landau theory
null
null
null
cs.CE cs.NA
null
A numerical model is constructed for modelling macroscale damping effects induced by the first order martensite phase transformations in a shape memory alloy rod. The model is constructed on the basis of the modified Landau-Ginzburg theory that couples nonlinear mechanical and thermal fields. The free energy function for the model is constructed as a double well function at low temperature, such that the external energy can be absorbed during the phase transformation and converted into thermal form. The Chebyshev spectral methods are employed together with backward differentiation for the numerical analysis of the problem. Computational experiments performed for different vibration energies demonstrate the importance of taking into account damping effects induced by phase transformations.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 18:31:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Linxiang X.", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
cs/0703001
Michael Coury
Michael D. Coury
Embedding Graphs into the Extended Grid
4 pages, 2 figures
null
null
null
cs.DM cs.DS
null
Let $G=(V,E)$ be an arbitrary undirected source graph to be embedded in a target graph $EM$, the extended grid with vertices on integer grid points and edges to nearest and next-nearest neighbours. We present an algorithm showing how to embed $G$ into $EM$ in both time and space $O(|V|^2)$ using the new notions of islands and bridges. An island is a connected subgraph in the target graph which is mapped from exactly one vertex in the source graph while a bridge is an edge between two islands which is mapped from exactly one edge in the source graph. This work is motivated by real industrial applications in the field of quantum computing and a need to efficiently embed source graphs in the extended grid.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 22:37:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Coury", "Michael D.", "" ] ]
cs/0703003
M. H. van Emden
M.H. van Emden, B. Moa, and S.C. Somosan
Functions to Support Input and Output of Intervals
16 pages, 13 figures with listings
null
null
DCS-311-IR
cs.NA
null
Interval arithmetic is hardly feasible without directed rounding as provided, for example, by the IEEE floating-point standard. Equally essential for interval methods is directed rounding for conversion between the external decimal and internal binary numerals. This is not provided by the standard I/O libraries. Conversion algorithms exist that guarantee identity upon conversion followed by its inverse. Although it may be possible to adapt these algorithms for use in decimal interval I/O, we argue that outward rounding in radix conversion is computationally a simpler problem than guaranteeing identity. Hence it is preferable to develop decimal interval I/O ab initio, which is what we do in this paper.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 23:13:23 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ], [ "Moa", "B.", "" ], [ "Somosan", "S. C.", "" ] ]
cs/0703004
Francis Heylighen
Francis Heylighen
Accelerating Socio-Technological Evolution: from ephemeralization and stigmergy to the global brain
To appear in: "Globalization as an Evolutionary Process: Modeling Global Change", edited by George Modelski, Tessaleno Devezas, and William Thompson, London: Routledge
null
null
null
cs.CY cs.NI
null
Evolution is presented as a trial-and-error process that produces a progressive accumulation of knowledge. At the level of technology, this leads to ephemeralization, i.e. ever increasing productivity, or decreasing of the friction that normally dissipates resources. As a result, flows of matter, energy and information circulate ever more easily across the planet. This global connectivity increases the interactions between agents, and thus the possibilities for conflict. However, evolutionary progress also reduces social friction, via the creation of institutions. The emergence of such "mediators" is facilitated by stigmergy: the unintended collaboration between agents resulting from their actions on a shared environment. The Internet is a near ideal medium for stigmergic interaction. Quantitative stigmergy allows the web to learn from the activities of its users, thus becoming ever better at helping them to answer their queries. Qualitative stigmergy stimulates agents to collectively develop novel knowledge. Both mechanisms have direct analogues in the functioning of the human brain. This leads us to envision the future, super-intelligent web as a "global brain" for humanity. The feedback between social and technological advances leads to an extreme acceleration of innovation. An extrapolation of the corresponding hyperbolic growth model would forecast a singularity around 2040. This can be interpreted as the evolutionary transition to the Global Brain regime.
[ { "version": "v1", "created": "Thu, 1 Mar 2007 15:46:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Heylighen", "Francis", "" ] ]
cs/0703006
Jingchao Chen
Jing-Chao Chen
XORSAT: An Efficient Algorithm for the DIMACS 32-bit Parity Problem
null
null
null
null
cs.DS
null
The DIMACS 32-bit parity problem is a satisfiability (SAT) problem hard to solve. So far, EqSatz by Li is the only solver which can solve this problem. However, This solver is very slow. It is reported that it spent 11855 seconds to solve a par32-5 instance on a Maxintosh G3 300 MHz. The paper introduces a new solver, XORSAT, which splits the original problem into two parts: structured part and random part, and then solves separately them with WalkSAT and an XOR equation solver. Based our empirical observation, XORSAT is surprisingly fast, which is approximately 1000 times faster than EqSatz. For a par32-5 instance, XORSAT took 2.9 seconds, while EqSatz took 2844 seconds on Intel Pentium IV 2.66GHz CPU. We believe that this method significantly different from traditional methods is also useful beyond this domain.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 01:38:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Jing-Chao", "" ] ]
cs/0703011
Helmut Alt
Helmut Alt, Maike Buchin
Can we Compute the Similarity Between Surfaces?
null
null
null
null
cs.CG cs.CC
null
A suitable measure for the similarity of shapes represented by parameterized curves or surfaces is the Fr\'echet distance. Whereas efficient algorithms are known for computing the Fr\'echet distance of polygonal curves, the same problem for triangulated surfaces is NP-hard. Furthermore, it remained open whether it is computable at all. Here, using a discrete approximation we show that it is {\em upper semi-computable}, i.e., there is a non-halting Turing machine which produces a monotone decreasing sequence of rationals converging to the result. It follows that the decision problem, whether the Fr\'echet distance of two given surfaces lies below some specified value, is recursively enumerable. Furthermore, we show that a relaxed version of the problem, the computation of the {\em weak Fr\'echet distance} can be solved in polynomial time. For this, we give a computable characterization of the weak Fr\'echet distance in a geometric data structure called the {\em free space diagram}.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 17:00:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Alt", "Helmut", "" ], [ "Buchin", "Maike", "" ] ]
cs/0703012
Ramya Ravichandar
Ramya Ravichandar, James D. Arthur, Manuel P\'erez-Qui\~nones
Pre-Requirement Specification Traceability: Bridging the Complexity Gap through Capabilities
This paper appears in International Symposium on Grand Challenges in Traceability, TEFSE/GCT 2007. 10 pages, 7 Figures
null
null
null
cs.SE
null
Pre-Requirement Specification traceability is the activity of capturing relations between requirements and their sources, in particular user needs. Requirements are formal technical specifications in the solution space; needs are natural language expressions codifying user expectations in the problem space. Current traceability techniques are challenged by the complexity gap that results from the disparity between the spaces, and thereby, often neglect traceability to and from requirements. We identify the existence of an intermediary region -- the transition space -- which structures the progression from needs to requirements. More specifically, our approach to developing change-tolerant systems, termed Capabilities Engineering, identifies highly cohesive, minimally coupled, optimized functional abstractions called Capabilities in the transition space. These Capabilities link the problem and solution spaces through directives (entities derived from user needs). Directives connect the problem and transition spaces; Capabilities link the transition and solution spaces. Furthermore, the process of Capabilities Engineering addresses specific traceability challenges. It supports the evolution of traces, provides semantic and structural information about dependencies, incorporates human factors, generates traceability relations with negligible overhead, and thereby, fosters pre-Requirement Specification traceability.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 20:46:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravichandar", "Ramya", "" ], [ "Arthur", "James D.", "" ], [ "Pérez-Quiñones", "Manuel", "" ] ]
cs/0703015
Alexander Shkotin
Alex Shkotin
Graph representation of context-free grammars
4 pages, 3 figures
null
null
null
cs.LO
null
In modern mathematics, graphs figure as one of the better-investigated class of mathematical objects. Various properties of graphs, as well as graph-processing algorithms, can be useful if graphs of a certain kind are used as denotations for CF-grammars. Furthermore, graph are well adapted to various extensions (one kind of such extensions being attributes).
[ { "version": "v1", "created": "Sat, 3 Mar 2007 13:12:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Shkotin", "Alex", "" ] ]
cs/0703021
Wen-Li Wang
Wen-Li Wang and Mei-Huei Tang
Addressing Components' Evolvement and Execution Behavior to Measure Component-Based Software Reliability
null
null
null
null
cs.SE
null
Software reliability is an important quality attrib-ute, often evaluated as either a function of time or of system structures. The goal of this study is to have this metric cover both for component-based software, be-cause its reliability strongly depends on the quality of constituent components and their interactions. To achieve this, we apply a convolution modeling ap-proach, based on components' execution behavior, to integrate their individual reliability evolvement and simultaneously address failure fixes in the time do-main. Modeling at the component level can be more economical to accommodate software evolution, be-cause the reliability metric can be evaluated by reus-ing the quality measures of unaffected components and adapting only to the affected ones to save cost. The adaptation capability also supports the incremental software development processes that constantly add in new components over time. Experiments were con-ducted to discuss the usefulness of this approach.
[ { "version": "v1", "created": "Mon, 5 Mar 2007 20:58:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Wen-Li", "" ], [ "Tang", "Mei-Huei", "" ] ]
cs/0703023
Otfried Cheong
Otfried Cheong, Herman Haverkort, Mira Lee
Computing a Minimum-Dilation Spanning Tree is NP-hard
null
null
null
null
cs.CG
null
In a geometric network G = (S, E), the graph distance between two vertices u, v in S is the length of the shortest path in G connecting u to v. The dilation of G is the maximum factor by which the graph distance of a pair of vertices differs from their Euclidean distance. We show that given a set S of n points with integer coordinates in the plane and a rational dilation delta > 1, it is NP-hard to determine whether a spanning tree of S with dilation at most delta exists.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 01:53:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheong", "Otfried", "" ], [ "Haverkort", "Herman", "" ], [ "Lee", "Mira", "" ] ]
cs/0703025
Jean Charles Gilbert
Jean Charles Gilbert (INRIA Rocquencourt), Xavier Jonsson
LIBOPT - An environment for testing solvers on heterogeneous collections of problems - Version 1.0
null
null
null
null
cs.MS cs.NA math.OC
null
The Libopt environment is both a methodology and a set of tools that can be used for testing, comparing, and profiling solvers on problems belonging to various collections. These collections can be heterogeneous in the sense that their problems can have common features that differ from one collection to the other. Libopt brings a unified view on this composite world by offering, for example, the possibility to run any solver on any problem compatible with it, using the same Unix/Linux command. The environment also provides tools for comparing the results obtained by solvers on a specified set of problems. Most of the scripts going with the Libopt environment have been written in Perl.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 14:05:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gilbert", "Jean Charles", "", "INRIA Rocquencourt" ], [ "Jonsson", "Xavier", "" ] ]
cs/0703029
Shmuel Friedland
Shmuel Friedland
FPRAS for computing a lower bound for weighted matching polynomial of graphs
16 pages
null
null
null
cs.CC cs.DM
null
We give a fully polynomial randomized approximation scheme to compute a lower bound for the matching polynomial of any weighted graph at a positive argument. For the matching polynomial of complete bipartite graphs with bounded weights these lower bounds are asymptotically optimal.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 22:59:30 GMT" }, { "version": "v2", "created": "Thu, 12 Apr 2007 16:09:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedland", "Shmuel", "" ] ]
cs/0703030
Konstantin Rybnikov
Konstantin Rybnikov
An Efficient Local Approach to Convexity Testing of Piecewise-Linear Hypersurfaces
3 figures
null
null
null
cs.CG
null
We show that a closed piecewise-linear hypersurface immersed in $R^n$ ($n\ge 3$) is the boundary of a convex body if and only if every point in the interior of each $(n-3)$-face has a neighborhood that lies on the boundary of some convex body; no assumptions about the hypersurface's topology are needed. We derive this criterion from our generalization of Van Heijenoort's (1952) theorem on locally convex hypersurfaces in $R^n$ to spherical spaces. We also give an easy-to-implement convexity testing algorithm, which is based on our criterion. For $R^3$ the number of arithmetic operations used by the algorithm is at most linear in the number of vertices, while in general it is at most linear in the number of incidences between the $(n-2)$-faces and $(n-3)$-faces. When the dimension $n$ is not fixed and only ring arithmetic is allowed, the algorithm still remains polynomial. Our method works in more general situations than the convexity verification algorithms developed by Mehlhorn et al. (1996) and Devillers et al. (1998) -- for example, our method does not require the input surface to be orientable, nor it requires the input data to include normal vectors to the facets that are oriented "in a coherent way". For $R^3$ the complexity of our algorithm is the same as that of previous algorithms; for higher dimensions there seems to be no clear winner, but our approach is the only one that easily handles inputs in which the facet normals are not known to be coherently oriented or are not given at all. Furthermore, our method can be extended to piecewise-polynomial surfaces of small degree.
[ { "version": "v1", "created": "Wed, 7 Mar 2007 07:33:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Rybnikov", "Konstantin", "" ] ]
cs/0703031
P\'aid\'i Creed
Paidi Creed
Sampling Eulerian orientations of triangular lattice graphs
23 pages
null
null
null
cs.DM cs.DS
null
We consider the problem of sampling from the uniform distribution on the set of Eulerian orientations of subgraphs of the triangular lattice. Although it is known that this can be achieved in polynomial time for any graph, the algorithm studied here is more natural in the context of planar Eulerian graphs. We analyse the mixing time of a Markov chain on the Eulerian orientations of a planar graph which moves between orientations by reversing the edges of directed faces. Using path coupling and the comparison method we obtain a polynomial upper bound on the mixing time of this chain for any solid subgraph of the triangular lattice. By considering the conductance of the chain we show that there exist subgraphs with holes for which the chain will always take an exponential amount of time to converge. Finally, as an additional justification for studying a Markov chain on the set of Eulerian orientations of planar graphs, we show that the problem of counting Eulerian orientations remains #P-complete when restricted to planar graphs. A preliminary version of this work appeared as an extended abstract in the 2nd Algorithms and Complexity in Durham workshop.
[ { "version": "v1", "created": "Wed, 7 Mar 2007 12:34:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Creed", "Paidi", "" ] ]
cs/0703040
Yefim Bakman
Yefim Bakman (Tel-Aviv University)
Why the Standard Data Processing should be changed
null
null
null
null
cs.MS
null
The basic statistical methods of data representation did not change since their emergence. Their simplicity was dictated by the intricacies of computations in the before computers epoch. It turns out that such approach is not uniquely possible in the presence of quick computers. The suggested here method improves significantly the reliability of data processing and their graphical representation. In this paper we show problems of the standard data processing which can bring to incorrect results. A method solving these problems is proposed. It is based on modification of data representation. The method was implemented in a computer program Consensus5. The program performances are illustrated through varied examples.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 19:49:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Bakman", "Yefim", "", "Tel-Aviv University" ] ]
cs/0703041
Marko Horvat B.Sc.CS-Dipl.Ing.
Kresimir Fertalj, Marko Horvat
Comparing Architectures of Mobile Applications
8 pages, 7 figures, 6 tables. Proceedings of the 5th WSEAS International Conference on Automation & Information in Venice, Italy
WSEAS Trans. on COMMUNICATIONS, Issue 4, Volume 3, October 2004, pp. 946-952
null
null
cs.OH
null
This article describes various advantages and disadvantages of SMS, WAP, J2ME and Windows CE technologies in designing mobile applications. In defining the architecture of any software application it is important to get the best trade-off between platform's possibilities and design requirements. Achieving optimum software design is even more important with mobile applications where all computer resources are limited. Therefore, it is important to have a comparative analysis of all relevant contemporary approaches in designing mobile applications. As always, the choice between these technologies is determined by application requirements and system capabilities.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 19:16:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Fertalj", "Kresimir", "" ], [ "Horvat", "Marko", "" ] ]
cs/0703042
Vaclav Petricek
Lukas Brozovsky, Vaclav Petricek
Recommender System for Online Dating Service
Accepted for Znalosti 2007
null
null
null
cs.IR cs.SE
null
Users of online dating sites are facing information overload that requires them to manually construct queries and browse huge amount of matching user profiles. This becomes even more problematic for multimedia profiles. Although matchmaking is frequently cited as a typical application for recommender systems, there is a surprising lack of work published in this area. In this paper we describe a recommender system we implemented and perform a quantitative comparison of two collaborative filtering (CF) and two global algorithms. Results show that collaborative filtering recommenders significantly outperform global algorithms that are currently used by dating sites. A blind experiment with real users also confirmed that users prefer CF based recommendations to global popularity recommendations. Recommender systems show a great potential for online dating where they could improve the value of the service to users and improve monetization of the service.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 15:38:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Brozovsky", "Lukas", "" ], [ "Petricek", "Vaclav", "" ] ]
cs/0703043
Vaclav Petricek
Vaclav Petricek, Ingemar J. Cox, Hui Han, Isaac G. Councill, C. Lee Giles
A Comparison of On-Line Computer Science Citation Databases
ECDL 2005
null
null
null
cs.DL
null
This paper examines the difference and similarities between the two on-line computer science citation databases DBLP and CiteSeer. The database entries in DBLP are inserted manually while the CiteSeer entries are obtained autonomously via a crawl of the Web and automatic processing of user submissions. CiteSeer's autonomous citation database can be considered a form of self-selected on-line survey. It is important to understand the limitations of such databases, particularly when citation information is used to assess the performance of authors, institutions and funding bodies. We show that the CiteSeer database contains considerably fewer single author papers. This bias can be modeled by an exponential process with intuitive explanation. The model permits us to predict that the DBLP database covers approximately 24% of the entire literature of Computer Science. CiteSeer is also biased against low-cited papers. Despite their difference, both databases exhibit similar and significantly different citation distributions compared with previous analysis of the Physics community. In both databases, we also observe that the number of authors per paper has been increasing over time.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 16:00:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Petricek", "Vaclav", "" ], [ "Cox", "Ingemar J.", "" ], [ "Han", "Hui", "" ], [ "Councill", "Isaac G.", "" ], [ "Giles", "C. Lee", "" ] ]
cs/0703044
Samuel Thibault
Samuel Thibault (INRIA Futurs), Sebastien Hinderer (INRIA Lorraine - LORIA)
BrlAPI: Simple, Portable, Concurrent, Application-level Control of Braille Terminals
null
Dans International Conference on Information and Communication Technology Accessibility (ICTA) (2007)
null
null
cs.HC
null
Screen readers can drive braille devices for allowing visually impaired users to access computer environments, by providing them the same information as sighted users. But in some cases, this view is not easy to use on a braille device. In such cases, it would be much more useful to let applications provide their own braille feedback, specially adapted to visually impaired users. Such applications would then need the ability to output braille ; however, allowing both screen readers and applications access a wide panel of braille devices is not a trivial task. We present an abstraction layer that applications may use to communicate with braille devices. They do not need to deal with the specificities of each device, but can do so if necessary. We show how several applications can communicate with one braille device concurrently, with BrlAPI making sensible choices about which application eventually gets access to the device. The description of a widely used implementation of BrlAPI is included.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 16:55:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Thibault", "Samuel", "", "INRIA Futurs" ], [ "Hinderer", "Sebastien", "", "INRIA Lorraine -\n LORIA" ] ]
cs/0703049
Olga Savenkova
Oleg N. Karpov, Olga A. Savenkova
Algorithm of Segment-Syllabic Synthesis in Speech Recognition Problem
11 pages, 4 figures
null
null
null
cs.SD cs.CL
null
Speech recognition based on the syllable segment is discussed in this paper. The principal search methods in space of states for the speech recognition problem by segment-syllabic parameters trajectory synthesis are investigated. Recognition as comparison the parameters trajectories in chosen speech units on the sections of the segmented speech is realized. Some experimental results are given and discussed.
[ { "version": "v1", "created": "Sat, 10 Mar 2007 23:59:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Karpov", "Oleg N.", "" ], [ "Savenkova", "Olga A.", "" ] ]
cs/0703051
Yu Ding
Yu Ding
An ExpTime Procedure for Description Logic $\mathcal{ALCQI}$ (Draft)
This paper is submitted in 2007
null
null
null
cs.LO
null
A worst-case ExpTime tableau-based decision procedure is outlined for the satisfiability problem in $\mathcal{ALCQI}$ w.r.t. general axioms.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 01:55:23 GMT" }, { "version": "v2", "created": "Tue, 13 Mar 2007 00:23:59 GMT" }, { "version": "v3", "created": "Sun, 18 Mar 2007 19:38:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "Yu", "" ] ]
cs/0703054
Julien Hendrickx
Vincent D. Blondel, Julien M. Hendrickx and Raphael M. Jungers
Linear time algorithms for Clobber
null
null
null
null
cs.GT
null
We prove that the single-player game clobber is solvable in linear time when played on a line or on a cycle. For this purpose, we show that this game is equivalent to an optimization problem on a set of words defined by seven classes of forbidden patterns. We also prove that, playing on the cycle, it is always possible to remove at least 2n/3 pawns, and we give a conformation for which it is not possible to do better, answering questions recently asked by Faria et al.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 17:04:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Blondel", "Vincent D.", "" ], [ "Hendrickx", "Julien M.", "" ], [ "Jungers", "Raphael M.", "" ] ]
cs/0703059
J. M. Landsberg
J.M. Landsberg
Geometry and the complexity of matrix multiplication
34 pages, 4 figures
null
null
null
cs.CC math.AG math.RT
null
We survey results in algebraic complexity theory, focusing on matrix multiplication. Our goals are (i.) to show how open questions in algebraic complexity theory are naturally posed as questions in geometry and representation theory, (ii.) to motivate researchers to work on these questions, and (iii.) to point out relations with more general problems in geometry. The key geometric objects for our study are the secant varieties of Segre varieties. We explain how these varieties are also useful for algebraic statistics, the study of phylogenetic invariants, and quantum computing.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 22:11:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Landsberg", "J. M.", "" ] ]
cs/0703060
Florentin Smarandache
Jose L. Salmeron, Florentin Smarandache
Redesigning Decision Matrix Method with an indeterminacy-based inference process
12 pages, 4 figures, one table
A short version published in Advances in Fuzzy Sets and Systems, Vol. 1(2), 263-271, 2006
null
null
cs.AI
null
For academics and practitioners concerned with computers, business and mathematics, one central issue is supporting decision makers. In this paper, we propose a generalization of Decision Matrix Method (DMM), using Neutrosophic logic. It emerges as an alternative to the existing logics and it represents a mathematical model of uncertainty and indeterminacy. This paper proposes the Neutrosophic Decision Matrix Method as a more realistic tool for decision making. In addition, a de-neutrosophication process is included.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 02:18:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Salmeron", "Jose L.", "" ], [ "Smarandache", "Florentin", "" ] ]
cs/0703063
Konstantin Avrachenkov
Konstantin Avrachenkov (INRIA Sophia Antipolis), Urtzi Ayesta (LAAS), Alexei Piunovskiy
Convergence and Optimal Buffer Sizing for Window Based AIMD Congestion Control
null
null
null
null
cs.NI
null
We study the interaction between the AIMD (Additive Increase Multiplicative Decrease) congestion control and a bottleneck router with Drop Tail buffer. We consider the problem in the framework of deterministic hybrid models. First, we show that the hybrid model of the interaction between the AIMD congestion control and bottleneck router always converges to a cyclic behavior. We characterize the cycles. Necessary and sufficient conditions for the absence of multiple jumps of congestion window in the same cycle are obtained. Then, we propose an analytical framework for the optimal choice of the router buffer size. We formulate the problem of the optimal router buffer size as a multi-criteria optimization problem, in which the Lagrange function corresponds to a linear combination of the average goodput and the average delay in the queue. The solution to the optimization problem provides further evidence that the buffer size should be reduced in the presence of traffic aggregation. Our analytical results are confirmed by simulations performed with Simulink and the NS simulator.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 09:00:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Avrachenkov", "Konstantin", "", "INRIA Sophia Antipolis" ], [ "Ayesta", "Urtzi", "", "LAAS" ], [ "Piunovskiy", "Alexei", "" ] ]
cs/0703065
Gabriel Istrate
Gabriel Istrate
Satisfying assignments of Random Boolean CSP: Clusters and Overlaps
null
null
null
null
cs.DM cond-mat.dis-nn cs.CC
null
The distribution of overlaps of solutions of a random CSP is an indicator of the overall geometry of its solution space. For random $k$-SAT, nonrigorous methods from Statistical Physics support the validity of the ``one step replica symmetry breaking'' approach. Some of these predictions were rigorously confirmed in \cite{cond-mat/0504070/prl} \cite{cond-mat/0506053}. There it is proved that the overlap distribution of random $k$-SAT, $k\geq 9$, has discontinuous support. Furthermore, Achlioptas and Ricci-Tersenghi proved that, for random $k$-SAT, $k\geq 8$. and constraint densities close enough to the phase transition there exists an exponential number of clusters of satisfying assignments; moreover, the distance between satisfying assignments in different clusters is linear. We aim to understand the structural properties of random CSP that lead to solution clustering. To this end, we prove two results on the cluster structure of solutions for binary CSP under the random model from Molloy (STOC 2002) 1. For all constraint sets $S$ (described explicitly in Creignou and Daude (2004), Istrate (2005)) s.t. $SAT(S)$ has a sharp threshold and all $q\in (0,1]$, $q$-overlap-$SAT(S)$ has a sharp threshold (i.e. the first step of the approach in Mora et al. works in all nontrivial cases). 2. For any constraint density value $c<1$, the set of solutions of a random instance of 2-SAT form, w.h.p., a single cluster. Also, for and any $q\in (0,1]$ such an instance has w.h.p. two satisfying assignment of overlap $\sim q$. Thus, as expected from Statistical Physics predictions, the second step of the approach in Mora et al. fails for 2-SAT.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 15:45:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
cs/0703066
Gerard Cohen
Charon Cohen, Hudry Lobstein
Discriminating and Identifying Codes in the Binary Hamming Space
null
null
null
null
cs.DM
null
Let $F^n$ be the binary $n$-cube, or binary Hamming space of dimension $n$, endowed with the Hamming distance, and ${\cal E}^n$ (respectively, ${\cal O}^n$) the set of vectors with even (respectively, odd) weight. For $r\geq 1$ and $x\in F^n$, we denote by $B_r(x)$ the ball of radius $r$ and centre $x$. A code $C\subseteq F^n$ is said to be $r$-identifying if the sets $B_r(x) \cap C$, $x\in F^n$, are all nonempty and distinct. A code $C\subseteq {\cal E}^n$ is said to be $r$-discriminating if the sets $B_r(x) \cap C$, $x\in {\cal O}^n$, are all nonempty and distinct. We show that the two definitions, which were given for general graphs, are equivalent in the case of the Hamming space, in the following sense: for any odd $r$, there is a bijection between the set of $r$-identifying codes in $F^n$ and the set of $r$-discriminating codes in $F^{n+1}$. We then extend previous studies on constructive upper bounds for the minimum cardinalities of identifying codes in the Hamming space.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 15:00:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Cohen", "Charon", "" ], [ "Lobstein", "Hudry", "" ] ]
cs/0703067
Stephen Smith
Stephen L. Smith, Francesco Bullo
Target assignment for robotic networks: asymptotic performance under limited communication
2007 ACC paper including proofs; Corrected typos
null
null
null
cs.RO
null
We are given an equal number of mobile robotic agents, and distinct target locations. Each agent has simple integrator dynamics, a limited communication range, and knowledge of the position of every target. We address the problem of designing a distributed algorithm that allows the group of agents to divide the targets among themselves and, simultaneously, leads each agent to reach its unique target. We do not require connectivity of the communication graph at any time. We introduce a novel assignment-based algorithm with the following features: initial assignments and robot motions follow a greedy rule, and distributed refinements of the assignment exploit an implicit circular ordering of the targets. We prove correctness of the algorithm, and give worst-case asymptotic bounds on the time to complete the assignment as the environment grows with the number of agents. We show that among a certain class of distributed algorithms, our algorithm is asymptotically optimal. The analysis utilizes results on the Euclidean traveling salesperson problem.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 19:20:45 GMT" }, { "version": "v2", "created": "Tue, 20 Mar 2007 19:57:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Smith", "Stephen L.", "" ], [ "Bullo", "Francesco", "" ] ]
cs/0703068
Vladimir Surkov
Kenneth R. Jackson, Sebastian Jaimungal, Vladimir Surkov
Option Valuation using Fourier Space Time Stepping
null
null
null
null
cs.CE
null
It is well known that the Black-Scholes-Merton model suffers from several deficiencies. Jump-diffusion and Levy models have been widely used to partially alleviate some of the biases inherent in this classical model. Unfortunately, the resulting pricing problem requires solving a more difficult partial-integro differential equation (PIDE) and although several approaches for solving the PIDE have been suggested in the literature, none are entirely satisfactory. All treat the integral and diffusive terms asymmetrically and are difficult to extend to higher dimensions. We present a new, efficient algorithm, based on transform methods, which symmetrically treats the diffusive and integrals terms, is applicable to a wide class of path-dependent options (such as Bermudan, barrier, and shout options) and options on multiple assets, and naturally extends to regime-switching Levy models. We present a concise study of the precision and convergence properties of our algorithm for several classes of options and Levy models and demonstrate that the algorithm is second-order in space and first-order in time for path-dependent options.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 19:48:42 GMT" }, { "version": "v2", "created": "Wed, 14 Mar 2007 20:49:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Jackson", "Kenneth R.", "" ], [ "Jaimungal", "Sebastian", "" ], [ "Surkov", "Vladimir", "" ] ]
cs/0703069
Paul Fodor
Paul Fodor
Portlet Wrappers using JavaScript
null
null
null
null
cs.SE
null
In this paper we extend the classical portal (with static portlets) design with HTML DOM Web clipping on the client browser using dynamic JavaScript portlets: the portal server supplies the user/passwords for all services through https and the client browser retrieves web pages and cuts/selects/changes the desired parts using paths (XPath) in the Web page structure. This operation brings along a set of advantages: dynamic wrapping of existing legacy websites in the client browser, the reloading of only changed portlets instead of whole portal, low bandwidth on the server, the elimination of re-writing the URL links in the portal, and last but not least, a support for Java applets in portlets by putting the login cookies on the client browser. Our solution is compliant with JSR168 Portlet Specification allowing portability across all vendor platforms.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 23:32:43 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2007 15:46:21 GMT" }, { "version": "v3", "created": "Wed, 2 May 2007 19:02:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Fodor", "Paul", "" ] ]
cs/0703071
Paul Fodor
Paul Fodor
Automatic Annotation of XHTML Pages with Audio Components
null
null
null
null
cs.OH
null
In this paper we present Deiush, a multimodal system for browsing hypertext Web documents. The Deiush system is based on our novel approach to automatically annotate hypertext Web documents (i.e. XHTML pages) with browsable audio components. It combines two key technologies: (1) middleware automatic separation of Web documents through structural and semantic analysis which is annotated with audio components, transforming them into XHTML+VoiceXML format to represent multimodal dialog; and (2) Opera Browser, an already standardized browser which we adopt as an interface of the XHTML+VoiceXML output of annotating. This paper describes the annotation technology of Deiush and presents an initial system evaluation.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 23:43:30 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2007 15:45:56 GMT" }, { "version": "v3", "created": "Wed, 2 May 2007 19:03:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Fodor", "Paul", "" ] ]
cs/0703072
Paul Fodor
Paul Fodor
Domain Directed Dialogs for Decision Processes
null
null
null
null
cs.OH
null
The search for a standardized optimum way to communicate using natural language dialog has involved a lot of research. However, due to the diversity of communication domains, we think that this is extremely difficult to achieve and different dialogue management techniques should be applied for different situations. Our work presents the basis of a communication mechanism that supports decision processes, is based on decision trees, and minimizes the number of steps (turn-takes) in the dialogue. The initial dialog workflow is automatically generated and the user's interaction with the system can also change the decision tree and create new dialog paths with optimized cost. The decision tree represents the chronological ordering of the actions (via the parent-child relationship) and uses an object frame to represent the information state (capturing the notion of context). This paper presents our framework, the formalism for interaction and dialogue, and an evaluation of the system compared to relevant dialog planning frameworks (i.e. finite state diagrams, frame-based, information state and planning-based dialogue systems).
[ { "version": "v1", "created": "Thu, 15 Mar 2007 00:08:50 GMT" }, { "version": "v2", "created": "Thu, 22 Mar 2007 14:54:41 GMT" }, { "version": "v3", "created": "Tue, 27 Mar 2007 15:41:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Fodor", "Paul", "" ] ]
cs/0703080
Paul Ioan Fodor
Joy Dutta, Paul Fodor
A Systematic Approach to Web-Application Development
null
null
null
null
cs.SE
null
Designing a web-application from a specification involves a series of well-planned and well executed steps leading to the final product. This often involves critical changes in design while testing the application, which itself is slow and cumbersome. Traditional approaches either fully automate the web-application development process, or let developers write everything from scratch. Our approach is based on a middle-ground, with precise control on the workflow and usage of a set of custom-made software tools to automate a significant part of code generation.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 12:55:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Dutta", "Joy", "" ], [ "Fodor", "Paul", "" ] ]
cs/0703081
Andre Hernich
Martin Grohe, Andre Hernich, Nicole Schweikardt
Randomized Computations on Large Data Sets: Tight Lower Bounds
29 pages, 2 figures, full version of PODS'06 paper
null
null
null
cs.DB cs.CC
null
We study the randomized version of a computation model (introduced by Grohe, Koch, and Schweikardt (ICALP'05); Grohe and Schweikardt (PODS'05)) that restricts random access to external memory and internal memory space. Essentially, this model can be viewed as a powerful version of a data stream model that puts no cost on sequential scans of external memory (as other models for data streams) and, in addition, (like other external memory models, but unlike streaming models), admits several large external memory devices that can be read and written to in parallel. We obtain tight lower bounds for the decision problems set equality, multiset equality, and checksort. More precisely, we show that any randomized one-sided-error bounded Monte Carlo algorithm for these problems must perform Omega(log N) random accesses to external memory devices, provided that the internal memory size is at most O(N^(1/4)/log N), where N denotes the size of the input data. From the lower bound on the set equality problem we can infer lower bounds on the worst case data complexity of query evaluation for the languages XQuery, XPath, and relational algebra on streaming data. More precisely, we show that there exist queries in XQuery, XPath, and relational algebra, such that any (randomized) Las Vegas algorithm that evaluates these queries must perform Omega(log N) random accesses to external memory devices, provided that the internal memory size is at most O(N^(1/4)/log N).
[ { "version": "v1", "created": "Thu, 15 Mar 2007 12:58:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Grohe", "Martin", "" ], [ "Hernich", "Andre", "" ], [ "Schweikardt", "Nicole", "" ] ]
cs/0703082
Christian Rasch
Christian Rasch and Thomas Satzger
Remarks on the O(N) Implementation of the Fast Marching Method
7 pages, 2 figures
null
null
null
cs.NA
null
The fast marching algorithm computes an approximate solution to the eikonal equation in O(N log N) time, where the factor log N is due to the administration of a priority queue. Recently, Yatziv, Bartesaghi and Sapiro have suggested to use an untidy priority queue, reducing the overall complexity to O(N) at the price of a small error in the computed solution. In this paper, we give an explicit estimate of the error introduced, which is based on a discrete comparison principle. This estimates implies in particular that the choice of an accuracy level that is independent of the speed function F results in the complexity bound O(Fmax /Fmin N). A numerical experiment illustrates this robustness problem for large ratios Fmax /Fmin .
[ { "version": "v1", "created": "Thu, 15 Mar 2007 13:41:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Rasch", "Christian", "" ], [ "Satzger", "Thomas", "" ] ]
cs/0703083
Frank McCown
Frank McCown and Michael L. Nelson
Characterization of Search Engine Caches
5 pages, 9 figures, IS&T Archiving 2007, May, 2007
null
null
null
cs.DL cs.CY
null
Search engines provide cached copies of indexed content so users will have something to "click on" if the remote resource is temporarily or permanently unavailable. Depending on their proprietary caching strategies, search engines will purge their indexes and caches of resources that exceed a threshold of unavailability. Although search engine caches are provided only as an aid to the interactive user, we are interested in building reliable preservation services from the aggregate of these limited caching services. But first, we must understand the contents of search engine caches. In this paper, we have examined the cached contents of Ask, Google, MSN and Yahoo to profile such things as overlap between index and cache, size, MIME type and "staleness" of the cached resources. We also examined the overlap of the various caches with the holdings of the Internet Archive.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 15:16:08 GMT" }, { "version": "v2", "created": "Thu, 15 Mar 2007 20:24:16 GMT" } ]
2007-05-23T00:00:00
[ [ "McCown", "Frank", "" ], [ "Nelson", "Michael L.", "" ] ]
cs/0703085
Xiaoyang Gu
Xiaoyang Gu, Jack H. Lutz
Dimension and Relative Frequencies
null
null
null
null
cs.CC
null
We show how to calculate the finite-state dimension (equivalently, the finite-state compressibility) of a saturated sets $X$ consisting of {\em all} infinite sequences $S$ over a finite alphabet $\Sigma_m$ satisfying some given condition $P$ on the asymptotic frequencies with which various symbols from $\Sigma_m$ appear in $S$. When the condition $P$ completely specifies an empirical probability distribution $\pi$ over $\Sigma_m$, i.e., a limiting frequency of occurrence for {\em every} symbol in $\Sigma_m$, it has been known since 1949 that the Hausdorff dimension of $X$ is precisely $\CH(\pi)$, the Shannon entropy of $\pi$, and the finite-state dimension was proven to have this same value in 2001. The saturated sets were studied by Volkmann and Cajar decades ago. It got attention again only with the recent developments in multifractal analysis by Barreira, Saussol, Schmeling, and separately Olsen. However, the powerful methods they used -- ergodic theory and multifractal analysis -- do not yield a value for the finite-state (or even computable) dimension in an obvious manner. We give a pointwise characterization of finite-state dimensions of saturated sets. Simultaneously, we also show that their finite-state dimension and strong dimension coincide with their Hausdorff and packing dimension respectively, though the techniques we use are completely elementary. Our results automatically extend to less restrictive effective settings (e.g., constructive, computable, and polynomial-time dimensions).
[ { "version": "v1", "created": "Fri, 16 Mar 2007 02:42:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Gu", "Xiaoyang", "" ], [ "Lutz", "Jack H.", "" ] ]
cs/0703092
Partha Basuchowdhuri
Partha Basuchowdhuri
Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol
9 pages, 4 figures
null
null
null
cs.CR
null
This paper compares the popular quantum key distribution (QKD) protocol BB84 with the more recent Kak's three-stage protocol and the latter is shown to be more secure. A theoretical representation of an authentication-aided version of Kak's three-stage protocol is provided that makes it possible to deal with the man-in-the-middle attack.
[ { "version": "v1", "created": "Mon, 19 Mar 2007 08:13:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Basuchowdhuri", "Partha", "" ] ]
cs/0703094
Olivier Powell
Olivier Powell and Sotiris Nikolesteas
Geographic Routing Around Obstacles in Wireless Sensor Networks
37 pages, 23 figures
null
null
null
cs.DC
null
Geographic routing is becoming the protocol of choice for many sensor network applications. The current state of the art is unsatisfactory: some algorithms are very efficient, however they require a preliminary planarization of the communication graph. Planarization induces overhead and is not realistic in many scenarios. On the otherhand, georouting algorithms which do not rely on planarization have fairly low success rates and either fail to route messages around all but the simplest obstacles or have a high topology control overhead (e.g. contour detection algorithms). To overcome these limitations, we propose GRIC, the first lightweight and efficient on demand (i.e. all-to-all) geographic routing algorithm which does not require planarization and has almost 100% delivery rates (when no obstacles are added). Furthermore, the excellent behavior of our algorithm is maintained even in the presence of large convex obstacles. The case of hard concave obstacles is also studied; such obstacles are hard instances for which performance diminishes.
[ { "version": "v1", "created": "Tue, 20 Mar 2007 12:17:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Powell", "Olivier", "" ], [ "Nikolesteas", "Sotiris", "" ] ]
cs/0703095
Jian Ma
Jian Ma and Zengqi Sun
Copula Component Analysis
null
null
null
null
cs.IR cs.AI
null
A framework named Copula Component Analysis (CCA) for blind source separation is proposed as a generalization of Independent Component Analysis (ICA). It differs from ICA which assumes independence of sources that the underlying components may be dependent with certain structure which is represented by Copula. By incorporating dependency structure, much accurate estimation can be made in principle in the case that the assumption of independence is invalidated. A two phrase inference method is introduced for CCA which is based on the notion of multidimensional ICA.
[ { "version": "v1", "created": "Tue, 20 Mar 2007 14:52:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Jian", "" ], [ "Sun", "Zengqi", "" ] ]
cs/0703097
Lane A. Hemaspaandra
Gabor Erdelyi, Lane A. Hemaspaandra, Joerg Rothe, Holger Spakowski
On Approximating Optimal Weighted Lobbying, and Frequency of Correctness versus Average-Case Polynomial Time
null
null
null
URCS-TR-2007-914
cs.GT cs.CC cs.MA
null
We investigate issues related to two hard problems related to voting, the optimal weighted lobbying problem and the winner problem for Dodgson elections. Regarding the former, Christian et al. [CFRS06] showed that optimal lobbying is intractable in the sense of parameterized complexity. We provide an efficient greedy algorithm that achieves a logarithmic approximation ratio for this problem and even for a more general variant--optimal weighted lobbying. We prove that essentially no better approximation ratio than ours can be proven for this greedy algorithm. The problem of determining Dodgson winners is known to be complete for parallel access to NP [HHR97]. Homan and Hemaspaandra [HH06] proposed an efficient greedy heuristic for finding Dodgson winners with a guaranteed frequency of success, and their heuristic is a ``frequently self-knowingly correct algorithm.'' We prove that every distributional problem solvable in polynomial time on the average with respect to the uniform distribution has a frequently self-knowingly correct polynomial-time algorithm. Furthermore, we study some features of probability weight of correctness with respect to Procaccia and Rosenschein's junta distributions [PR07].
[ { "version": "v1", "created": "Tue, 20 Mar 2007 20:35:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Erdelyi", "Gabor", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ], [ "Spakowski", "Holger", "" ] ]
cs/0703098
Sergey Gubin
Sergey Gubin
Polynomial time algorithm for 3-SAT. Examples of use
19 pages
null
null
null
cs.CC cs.DM cs.DS cs.LO
null
The algorithm checks the propositional formulas for patterns of unsatisfiability.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 06:46:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
cs/0703100
Rajmohan Rajaraman
Guolong Lin and Rajmohan Rajaraman
Approximation Algorithms for Multiprocessor Scheduling under Uncertainty
12 pages, 2 encapsulated postscript figures
null
null
null
cs.DC cs.CC cs.DS
null
Motivated by applications in grid computing and project management, we study multiprocessor scheduling in scenarios where there is uncertainty in the successful execution of jobs when assigned to processors. We consider the problem of multiprocessor scheduling under uncertainty, in which we are given n unit-time jobs and m machines, a directed acyclic graph C giving the dependencies among the jobs, and for every job j and machine i, the probability p_{ij} of the successful completion of job j when scheduled on machine i in any given particular step. The goal of the problem is to find a schedule that minimizes the expected makespan, that is, the expected completion time of all the jobs. The problem of multiprocessor scheduling under uncertainty was introduced by Malewicz and was shown to be NP-hard even when all the jobs are independent. In this paper, we present polynomial-time approximation algorithms for the problem, for special cases of the dag C. We obtain an O(log(n))-approximation for the case of independent jobs, an O(log(m)log(n)log(n+m)/loglog(n+m))-approximation when C is a collection of disjoint chains, an O(log(m)log^2(n))-approximation when C is a collection of directed out- or in-trees, and an O(log(m)log^2(n)log(n+m)/loglog(n+m))-approximation when C is a directed forest.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 20:35:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Lin", "Guolong", "" ], [ "Rajaraman", "Rajmohan", "" ] ]
cs/0703101
Thomas M. Breuel
Thomas M. Breuel
A Note on Approximate Nearest Neighbor Methods
The report was originally written in 2005 and does not reference information after that date
null
null
null
cs.IR cs.CC cs.CV
null
A number of authors have described randomized algorithms for solving the epsilon-approximate nearest neighbor problem. In this note I point out that the epsilon-approximate nearest neighbor property often fails to be a useful approximation property, since epsilon-approximate solutions fail to satisfy the necessary preconditions for using nearest neighbors for classification and related tasks.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 20:47:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Breuel", "Thomas M.", "" ] ]
cs/0703106
Paul Wang
Shengbao Wang
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
A work in progress, any comment and suggestion will be highly appreciated by the author
null
null
null
cs.CR
null
In this paper, we present a new identity-based encryption (IBE) scheme using bilinear pairings. Our IBE scheme enjoys the same \textsf{Key Extraction} and \textsf{Decryption} algorithms with the famous IBE scheme of Boneh and Franklin (BF-IBE for short), while differs from the latter in that it has modified \textsf{Setup} and \textsf{Encryption} algorithms. Compared with BF-IBE, we show that ours are more practical in a multiple private key generator (PKG) environment, mainly due to that the session secret $g_{ID}$ could be pre-computed \emph{before} any interaction, and the sender could encrypt a message using $g_{ID}$ prior to negotiating with the intended recipient(s). As an application of our IBE scheme, we also derive an escrowed ElGamal scheme which possesses certain good properties in practice.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 08:05:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Shengbao", "" ] ]
cs/0703108
Sourav Dhar
Sourav Dhar, Rabindranath Bera, K.Mal
Wireless Lan to Support Multimedia Communication Using Spread Spectrum Technology
URSI 0ctober 22-29 2005, 4pages, 6 figures
null
null
null
cs.NI
null
Wireless LAN is currently enjoying rapid deployment in University departments, business offices, hospitals and homes. It becomes an inexpensive technology and allows multiple numbers of the households to simultaneously access the internet while roaming about the house. In the present work, the design and development of a wireless LAN is highlighted which utilizes direct sequence spread spectrum (DSSS) technology at 900MHz RF carrier frequency in its physical layer. This provides enormous security in the physical layer and hence it is very difficult to hack or jam the network. The installation cost is also less due to the use of 900 MHz RF carrier frequency..
[ { "version": "v1", "created": "Thu, 22 Mar 2007 11:07:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Dhar", "Sourav", "" ], [ "Bera", "Rabindranath", "" ], [ "Mal", "K.", "" ] ]
cs/0703112
Bharath Ramesh
Bharath Ramesh and Srinidhi Varadarajan
User-level DSM System for Modern High-Performance Interconnection Networks
6 pages, 5 figures
null
null
null
cs.DC
null
In this paper, we introduce a new user-level DSM system which has the ability to directly interact with underlying interconnection networks. The DSM system provides the application programmer a flexible API to program parallel applications either using shared memory semantics over physically distributed memory or to use an efficient remote memory demand paging technique. We also introduce a new time slice based memory consistency protocol which is used by the DSM system. We present preliminary results from our implementation on a small Opteron Linux cluster interconnected over Myrinet.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 19:15:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramesh", "Bharath", "" ], [ "Varadarajan", "Srinidhi", "" ] ]
cs/0703117
Juan J. Merelo Pr.
J.L.J. Laredo, E.A. Eiben, M. Schoenauer, P.A. Castillo, A.M. Mora, F. Fernandez, J.J. Merelo
Self-adaptive Gossip Policies for Distributed Population-based Algorithms
Submitted to Europar 2007
null
null
null
cs.DC
null
Gossipping has demonstrate to be an efficient mechanism for spreading information among P2P networks. Within the context of P2P computing, we propose the so-called Evolvable Agent Model for distributed population-based algorithms which uses gossipping as communication policy, and represents every individual as a self-scheduled single thread. The model avoids obsolete nodes in the population by defining a self-adaptive refresh rate which depends on the latency and bandwidth of the network. Such a mechanism balances the migration rate to the congestion of the links pursuing global population coherence. We perform an experimental evaluation of this model on a real parallel system and observe how solution quality and algorithm speed scale with the number of processors with this seamless approach.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 11:29:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Laredo", "J. L. J.", "" ], [ "Eiben", "E. A.", "" ], [ "Schoenauer", "M.", "" ], [ "Castillo", "P. A.", "" ], [ "Mora", "A. M.", "" ], [ "Fernandez", "F.", "" ], [ "Merelo", "J. J.", "" ] ]
cs/0703119
Daniel A. Spielman
Samuel I. Daitch and Daniel A. Spielman
Support-Graph Preconditioners for 2-Dimensional Trusses
null
null
null
null
cs.NA
null
We use support theory, in particular the fretsaw extensions of Shklarski and Toledo, to design preconditioners for the stiffness matrices of 2-dimensional truss structures that are stiffly connected. Provided that all the lengths of the trusses are within constant factors of each other, that the angles at the corners of the triangles are bounded away from 0 and $\pi$, and that the elastic moduli and cross-sectional areas of all the truss elements are within constant factors of each other, our preconditioners allow us to solve linear equations in the stiffness matrices to accuracy $\epsilon$ in time $O (n^{5/4} (\log^{2}n \log \log n)^{3/4} \log (1/\epsilon))$.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 15:03:34 GMT" }, { "version": "v2", "created": "Mon, 26 Mar 2007 18:09:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Daitch", "Samuel I.", "" ], [ "Spielman", "Daniel A.", "" ] ]
cs/0703122
Richard Kr\'alovi\v{c}
Rastislav Kr\'alovi\v{c}, Richard Kr\'alovi\v{c}
Rapid Almost-Complete Broadcasting in Faulty Networks
Conference: Sirocco 2007
null
null
null
cs.DC
null
This paper studies the problem of broadcasting in synchronous point-to-point networks, where one initiator owns a piece of information that has to be transmitted to all other vertices as fast as possible. The model of fractional dynamic faults with threshold is considered: in every step either a fixed number $T$, or a fraction $\alpha$, of sent messages can be lost depending on which quantity is larger. As the main result we show that in complete graphs and hypercubes it is possible to inform all but a constant number of vertices, exhibiting only a logarithmic slowdown, i.e. in time $O(D\log n)$ where $D$ is the diameter of the network and $n$ is the number of vertices. Moreover, for complete graphs under some additional conditions (sense of direction, or $\alpha<0.55$) the remaining constant number of vertices can be informed in the same time, i.e. $O(\log n)$.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 22:38:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Královič", "Rastislav", "" ], [ "Královič", "Richard", "" ] ]
cs/0703126
Michele Tucci
Michele Tucci
Evolutionary Socioeconomics: Notes on the Computer Simulation according to the de Finetti - Simon Principia
PDF, 29 pages, 3 graphs; minor changes
null
null
null
cs.CY
null
The present note includes explanatory comments about the synergic interaction within the sphere of the socioeconomic analysis between the two following theoretical frameworks. (I). The Darwinian evolutionary model. (II). The computer simulation in accordance with the principia established by Bruno de Finetti and Herbert Simon.
[ { "version": "v1", "created": "Sun, 25 Mar 2007 12:46:19 GMT" }, { "version": "v2", "created": "Mon, 9 Apr 2007 14:36:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Tucci", "Michele", "" ] ]
cs/0703130
Robert Jeansoulin
Omar Doukari (LSIS), Robert Jeansoulin (IGM-LabInfo)
Space-contained conflict revision, for geographic information
14 pages
Proc. of 10th AGILE International Conference on Geographic Information Science, AGILE 2007. (07/05/2007) 1-14
null
null
cs.AI
null
Using qualitative reasoning with geographic information, contrarily, for instance, with robotics, looks not only fastidious (i.e.: encoding knowledge Propositional Logics PL), but appears to be computational complex, and not tractable at all, most of the time. However, knowledge fusion or revision, is a common operation performed when users merge several different data sets in a unique decision making process, without much support. Introducing logics would be a great improvement, and we propose in this paper, means for deciding -a priori- if one application can benefit from a complete revision, under only the assumption of a conjecture that we name the "containment conjecture", which limits the size of the minimal conflicts to revise. We demonstrate that this conjecture brings us the interesting computational property of performing a not-provable but global, revision, made of many local revisions, at a tractable size. We illustrate this approach on an application.
[ { "version": "v1", "created": "Mon, 26 Mar 2007 12:18:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Doukari", "Omar", "", "LSIS" ], [ "Jeansoulin", "Robert", "", "IGM-LabInfo" ] ]
cs/0703131
Stevan Harnad
Stevan Harnad
Open Access Scientometrics and the UK Research Assessment Exercise
null
null
null
null
cs.IR cs.DL
null
Scientometric predictors of research performance need to be validated by showing that they have a high correlation with the external criterion they are trying to predict. The UK Research Assessment Exercise (RAE), together with the growing movement toward making the full-texts of research articles freely available on the web -- offer a unique opportunity to test and validate a wealth of old and new scientometric predictors, through multiple regression analysis: Publications, journal impact factors, citations, co-citations, citation chronometrics (age, growth, latency to peak, decay rate), hub/authority scores, h-index, prior funding, student counts, co-authorship scores, endogamy/exogamy, textual proximity, download/co-downloads and their chronometrics, etc. can all be tested and validated jointly, discipline by discipline, against their RAE panel rankings in the forthcoming parallel panel-based and metric RAE in 2008. The weights of each predictor can be calibrated to maximize the joint correlation with the rankings. Open Access Scientometrics will provide powerful new means of navigating, evaluating, predicting and analyzing the growing Open Access database, as well as powerful incentives for making it grow faster. ~
[ { "version": "v1", "created": "Mon, 26 Mar 2007 15:40:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Harnad", "Stevan", "" ] ]
cs/0703133
Edith Elkind
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldberg
Computing Good Nash Equilibria in Graphical Games
25 pages. Short version appears in ACM EC'07
null
null
null
cs.GT cs.DS cs.MA
null
This paper addresses the problem of fair equilibrium selection in graphical games. Our approach is based on the data structure called the {\em best response policy}, which was proposed by Kearns et al. \cite{kls} as a way to represent all Nash equilibria of a graphical game. In \cite{egg}, it was shown that the best response policy has polynomial size as long as the underlying graph is a path. In this paper, we show that if the underlying graph is a bounded-degree tree and the best response policy has polynomial size then there is an efficient algorithm which constructs a Nash equilibrium that guarantees certain payoffs to all participants. Another attractive solution concept is a Nash equilibrium that maximizes the social welfare. We show that, while exactly computing the latter is infeasible (we prove that solving this problem may involve algebraic numbers of an arbitrarily high degree), there exists an FPTAS for finding such an equilibrium as long as the best response policy has polynomial size. These two algorithms can be combined to produce Nash equilibria that satisfy various fairness criteria.
[ { "version": "v1", "created": "Tue, 27 Mar 2007 16:15:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Elkind", "Edith", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Goldberg", "Paul W.", "" ] ]
cs/0703137
Rajesh Sudarsan
Rajesh Sudarsan and Calvin J. Ribbens
ReSHAPE: A Framework for Dynamic Resizing and Scheduling of Homogeneous Applications in a Parallel Environment
15 pages, 10 figures, 5 tables Submitted to International Conference on Parallel Processing (ICPP'07)
null
null
null
cs.DC
null
Applications in science and engineering often require huge computational resources for solving problems within a reasonable time frame. Parallel supercomputers provide the computational infrastructure for solving such problems. A traditional application scheduler running on a parallel cluster only supports static scheduling where the number of processors allocated to an application remains fixed throughout the lifetime of execution of the job. Due to the unpredictability in job arrival times and varying resource requirements, static scheduling can result in idle system resources thereby decreasing the overall system throughput. In this paper we present a prototype framework called ReSHAPE, which supports dynamic resizing of parallel MPI applications executed on distributed memory platforms. The framework includes a scheduler that supports resizing of applications, an API to enable applications to interact with the scheduler, and a library that makes resizing viable. Applications executed using the ReSHAPE scheduler framework can expand to take advantage of additional free processors or can shrink to accommodate a high priority application, without getting suspended. In our research, we have mainly focused on structured applications that have two-dimensional data arrays distributed across a two-dimensional processor grid. The resize library includes algorithms for processor selection and processor mapping. Experimental results show that the ReSHAPE framework can improve individual job turn-around time and overall system throughput.
[ { "version": "v1", "created": "Tue, 27 Mar 2007 23:27:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Sudarsan", "Rajesh", "" ], [ "Ribbens", "Calvin J.", "" ] ]
cs/0703140
Daniele Beauquier
Dani\`ele Beauquier (LACL), Fr\'ed\'eric Gauche (LACL)
How to Guarantee Secrecy for Cryptographic Protocols
19 pages
Rapport interne (03/2007)
null
null
cs.CR
null
In this paper we propose a general definition of secrecy for cryptographic protocols in the Dolev-Yao model. We give a sufficient condition ensuring secrecy for protocols where rules have encryption depth at most two, that is satisfied by almost all practical protocols. The only allowed primitives in the class of protocols we consider are pairing and encryption with atomic keys. Moreover, we describe an algorithm of practical interest which transforms a cryptographic protocol into a secure one from the point of view of secrecy, without changing its original goal with respect to secrecy of nonces and keys, provided the protocol satisfies some conditions. These conditions are not very restrictive and are satisfied for most practical protocols.
[ { "version": "v1", "created": "Wed, 28 Mar 2007 08:03:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Beauquier", "Danièle", "", "LACL" ], [ "Gauche", "Frédéric", "", "LACL" ] ]
cs/0703145
Sandeep Murthy
Sandeep Murthy
The Simultaneous Triple Product Property and Group-theoretic Results for the Exponent of Matrix Multiplication
14 pages
null
null
null
cs.DS cs.CC math.GR
null
We describe certain special consequences of certain elementary methods from group theory for studying the algebraic complexity of matrix multiplication, as developed by H. Cohn, C. Umans et. al. in 2003 and 2005. The measure of complexity here is the exponent of matrix multiplication, a real parameter between 2 and 3, which has been conjectured to be 2. More specifically, a finite group may simultaneously "realize" several independent matrix multiplications via its regular algebra if it has a family of triples of "index" subsets which satisfy the so-called simultaneous triple product property (STPP), in which case the complexity of these several multiplications does not exceed the rank (complexity) of the algebra. This leads to bounds for the exponent in terms of the size of the group and the sizes of its STPP triples, as well as the dimensions of its distinct irreducible representations. Wreath products of Abelian with symmetric groups appear especially important, in this regard, and we give an example of such a group which shows that the exponent is less than 2.84, and could be possibly be as small as 2.02 depending on the number of simultaneous matrix multiplications it realizes.
[ { "version": "v1", "created": "Thu, 29 Mar 2007 02:55:17 GMT" }, { "version": "v2", "created": "Fri, 30 Mar 2007 02:17:28 GMT" }, { "version": "v3", "created": "Mon, 2 Apr 2007 13:39:15 GMT" }, { "version": "v4", "created": "Tue, 3 Apr 2007 16:52:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Murthy", "Sandeep", "" ] ]
cs/0703152
Ugo Dal Lago
Ugo Dal Lago, Andrea Masini, Margherita Zorzi
Quantum Lambda Calculi with Classical Control: Syntax and Expressive Power
25 pages
null
null
null
cs.LO
null
We study an untyped lambda calculus with quantum data and classical control. This work stems from previous proposals by Selinger and Valiron and by Van Tonder. We focus on syntax and expressiveness, rather than (denotational) semantics. We prove subject reduction, confluence and a standardization theorem. Moreover, we prove the computational equivalence of the proposed calculus with a suitable class of quantum circuit families.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 08:59:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Lago", "Ugo Dal", "" ], [ "Masini", "Andrea", "" ], [ "Zorzi", "Margherita", "" ] ]
cs/0703153
Maurice Margenstern
Maurice Margenstern
The periodic domino problem is undecidable in the hyperbolic plane
null
null
null
null
cs.CG cs.DM
null
In this paper, we consider the periodic tiling problem which was proved undecidable in the Euclidean plane by Yu. Gurevich and I. Koriakov in 1972. Here, we prove that the same problem for the hyperbolic plane is also undecidable.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 09:31:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
cs/0703155
Amey Karkare
Amey Karkare, Uday Khedker, Amitabha Sanyal
Liveness of Heap Data for Functional Programs
Accepted at Heap Analysis and Verification workshop (HAV 2007), a satellite workshop of ETAPS 2007 (No formal proceedings for workshop); 15 pages
null
null
null
cs.PL
null
Functional programming languages use garbage collection for heap memory management. Ideally, garbage collectors should reclaim all objects that are dead at the time of garbage collection. An object is dead at an execution instant if it is not used in future. Garbage collectors collect only those dead objects that are not reachable from any program variable. This is because they are not able to distinguish between reachable objects that are dead and reachable objects that are live. In this paper, we describe a static analysis to discover reachable dead objects in programs written in first-order, eager functional programming languages. The results of this technique can be used to make reachable dead objects unreachable, thereby allowing garbage collectors to reclaim more dead objects.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 16:06:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Karkare", "Amey", "" ], [ "Khedker", "Uday", "" ], [ "Sanyal", "Amitabha", "" ] ]
cs/0703156
Fadi Badra
Mathieu D'Aquin (KMI), Fadi Badra (INRIA Lorraine - LORIA), Sandrine Lafrogne (INRIA Lorraine - LORIA), Jean Lieber (INRIA Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA), Laszlo Szathmary (INRIA Lorraine - LORIA)
Case Base Mining for Adaptation Knowledge Acquisition
null
Dans Twentieth International Joint Conference on Artificial Intelligence - IJCAI'07 (2007) 750--755
null
null
cs.AI
null
In case-based reasoning, the adaptation of a source case in order to solve the target problem is at the same time crucial and difficult to implement. The reason for this difficulty is that, in general, adaptation strongly depends on domain-dependent knowledge. This fact motivates research on adaptation knowledge acquisition (AKA). This paper presents an approach to AKA based on the principles and techniques of knowledge discovery from databases and data-mining. It is implemented in CABAMAKA, a system that explores the variations within the case base to elicit adaptation knowledge. This system has been successfully tested in an application of case-based reasoning to decision support in the domain of breast cancer treatment.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 16:16:11 GMT" } ]
2007-05-23T00:00:00
[ [ "D'Aquin", "Mathieu", "", "KMI" ], [ "Badra", "Fadi", "", "INRIA Lorraine - LORIA" ], [ "Lafrogne", "Sandrine", "", "INRIA Lorraine - LORIA" ], [ "Lieber", "Jean", "", "INRIA Lorraine - LORIA" ], [ "Napoli", "Amedeo", "", "INRIA Lorraine - LORIA" ], [ "Szathmary", "Laszlo", "", "INRIA Lorraine -\n LORIA" ] ]
cs/9711105
null
Lawrence C. Paulson
Mechanizing Coinduction and Corecursion in Higher-order Logic
null
published in Journal of Logic and Computation 7 (March 1997), 175-204
null
null
cs.LO
null
A theory of recursive and corecursive definitions has been developed in higher-order logic (HOL) and mechanized using Isabelle. Least fixedpoints express inductive data types such as strict lists; greatest fixedpoints express coinductive data types, such as lazy lists. Well-founded recursion expresses recursive functions over inductive data types; corecursion expresses functions that yield elements of coinductive data types. The theory rests on a traditional formalization of infinite trees. The theory is intended for use in specification and verification. It supports reasoning about a wide range of computable functions, but it does not formalize their operational semantics and can express noncomputable functions also. The theory is illustrated using finite and infinite lists. Corecursion expresses functions over infinite lists; coinduction reasons about such functions.
[ { "version": "v1", "created": "Tue, 31 Oct 2000 00:00:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
cs/9801101
null
G. Gogic, C. H. Papadimitriou, M. Sideri
Incremental Recompilation of Knowledge
See http://www.jair.org/ for any accompanying files
Journal of Artificial Intelligence Research, Vol 8, (1998), 23-37
null
null
cs.AI
null
Approximating a general formula from above and below by Horn formulas (its Horn envelope and Horn core, respectively) was proposed by Selman and Kautz (1991, 1996) as a form of ``knowledge compilation,'' supporting rapid approximate reasoning; on the negative side, this scheme is static in that it supports no updates, and has certain complexity drawbacks pointed out by Kavvadias, Papadimitriou and Sideri (1993). On the other hand, the many frameworks and schemes proposed in the literature for theory update and revision are plagued by serious complexity-theoretic impediments, even in the Horn case, as was pointed out by Eiter and Gottlob (1992), and is further demonstrated in the present paper. More fundamentally, these schemes are not inductive, in that they may lose in a single update any positive properties of the represented sets of formulas (small size, Horn structure, etc.). In this paper we propose a new scheme, incremental recompilation, which combines Horn approximation and model-based updates; this scheme is inductive and very efficient, free of the problems facing its constituents. A set of formulas is represented by an upper and lower Horn approximation. To update, we replace the upper Horn formula by the Horn envelope of its minimum-change update, and similarly the lower one by the Horn core of its update; the key fact which enables this scheme is that Horn envelopes and cores are easy to compute when the underlying formula is the result of a minimum-change update of a Horn formula by a clause. We conjecture that efficient algorithms are possible for more complex updates.
[ { "version": "v1", "created": "Thu, 1 Jan 1998 00:00:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Gogic", "G.", "" ], [ "Papadimitriou", "C. H.", "" ], [ "Sideri", "M.", "" ] ]
cs/9801102
null
J. Engelfriet
Monotonicity and Persistence in Preferential Logics
See http://www.jair.org/ for any accompanying files
Journal of Artificial Intelligence Research, Vol 8, (1998), 1-21
null
null
cs.AI
null
An important characteristic of many logics for Artificial Intelligence is their nonmonotonicity. This means that adding a formula to the premises can invalidate some of the consequences. There may, however, exist formulae that can always be safely added to the premises without destroying any of the consequences: we say they respect monotonicity. Also, there may be formulae that, when they are a consequence, can not be invalidated when adding any formula to the premises: we call them conservative. We study these two classes of formulae for preferential logics, and show that they are closely linked to the formulae whose truth-value is preserved along the (preferential) ordering. We will consider some preferential logics for illustration, and prove syntactic characterization results for them. The results in this paper may improve the efficiency of theorem provers for preferential logics.
[ { "version": "v1", "created": "Thu, 1 Jan 1998 00:00:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Engelfriet", "J.", "" ] ]
cs/9801103
Maggie McLoughlin
Donald E. Knuth
Linear probing and graphs
null
Algorithmica 22 (1998), no. 4, 561--568
null
Knuth migration 11/2004
cs.DS
null
Mallows and Riordan showed in 1968 that labeled trees with a small number of inversions are related to labeled graphs that are connected and sparse. Wright enumerated sparse connected graphs in 1977, and Kreweras related the inversions of trees to the so-called ``parking problem'' in 1980. A~combination of these three results leads to a surprisingly simple analysis of the behavior of hashing by linear probing, including higher moments of the cost of successful search.
[ { "version": "v1", "created": "Thu, 15 Jan 1998 00:00:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Knuth", "Donald E.", "" ] ]
cs/9803103
null
S. Argamon-Engelson, M. Koppel
Tractability of Theory Patching
See http://www.jair.org/ for any accompanying files
Journal of Artificial Intelligence Research, Vol 8, (1998), 39-65
null
null
cs.AI
null
In this paper we consider the problem of `theory patching', in which we are given a domain theory, some of whose components are indicated to be possibly flawed, and a set of labeled training examples for the domain concept. The theory patching problem is to revise only the indicated components of the theory, such that the resulting theory correctly classifies all the training examples. Theory patching is thus a type of theory revision in which revisions are made to individual components of the theory. Our concern in this paper is to determine for which classes of logical domain theories the theory patching problem is tractable. We consider both propositional and first-order domain theories, and show that the theory patching problem is equivalent to that of determining what information contained in a theory is `stable' regardless of what revisions might be performed to the theory. We show that determining stability is tractable if the input theory satisfies two conditions: that revisions to each theory component have monotonic effects on the classification of examples, and that theory components act independently in the classification of examples in the theory. We also show how the concepts introduced can be used to determine the soundness and completeness of particular theory patching algorithms.
[ { "version": "v1", "created": "Sun, 1 Mar 1998 00:00:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Argamon-Engelson", "S.", "" ], [ "Koppel", "M.", "" ] ]
cs/9808001
Max Chaves
M. Chaves
Chess Pure Strategies are Probably Chaotic
7 pages, no figures
null
null
null
cs.CC cs.AI
null
It is odd that chess grandmasters often disagree in their analysis of positions, sometimes even of simple ones, and that a grandmaster can hold his own against an powerful analytic machine such as Deep Blue. The fact that there must exist pure winning strategies for chess is used to construct a control strategy function. It is then shown that chess strategy is equivalent to an autonomous system of differential equations, and conjectured that the system is chaotic. If true the conjecture would explain the forenamed peculiarities and would also imply that there cannot exist a static evaluator for chess.
[ { "version": "v1", "created": "Fri, 21 Aug 1998 19:13:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Chaves", "M.", "" ] ]
cs/9808002
Lane A. Hemaspaandra
Edith Hemaspaandra, Lane A. Hemaspaandra, Harald Hempel
Downward Collapse from a Weaker Hypothesis
null
null
null
see UR-CS-TR-98-681
cs.CC
null
Hemaspaandra et al. proved that, for $m > 0$ and $0 < i < k - 1$: if $\Sigma_i^p \BoldfaceDelta DIFF_m(\Sigma_k^p)$ is closed under complementation, then $DIFF_m(\Sigma_k^p) = coDIFF_m(\Sigma_k^p)$. This sharply asymmetric result fails to apply to the case in which the hypothesis is weakened by allowing the $\Sigma_i^p$ to be replaced by any class in its difference hierarchy. We so extend the result by proving that, for $s,m > 0$ and $0 < i < k - 1$: if $DIFF_s(\Sigma_i^p) \BoldfaceDelta DIFF_m(\Sigma_k^p)$ is closed under complementation, then $DIFF_m(\Sigma_k^p) = coDIFF_m(\Sigma_k^p)$.
[ { "version": "v1", "created": "Mon, 24 Aug 1998 21:37:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9808003
Lane A. Hemaspaandra
Lane A. Hemaspaandra and Joerg Rothe
Creating Strong Total Commutative Associative Complexity-Theoretic One-Way Functions from Any Complexity-Theoretic One-Way Function
null
null
null
see UR-CS-TR-98-688
cs.CC cs.CR
null
Rabi and Sherman [RS97] presented novel digital signature and unauthenticated secret-key agreement protocols, developed by themselves and by Rivest and Sherman. These protocols use ``strong,'' total, commutative (in the case of multi-party secret-key agreement), associative one-way functions as their key building blocks. Though Rabi and Sherman did prove that associative one-way functions exist if $\p \neq \np$, they left as an open question whether any natural complexity-theoretic assumption is sufficient to ensure the existence of ``strong,'' total, commutative, associative one-way functions. In this paper, we prove that if $\p \neq \np$ then ``strong,'' total, commutative, associative one-way functions exist.
[ { "version": "v1", "created": "Sun, 23 Aug 1998 18:22:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9808004
Jon Crowcroft
Jon Crowcroft and Philippe Oechslin
Differentiated End-to-End Internet Services using a Weighted Proportional Fair Sharing TCP
null
null
null
null
cs.NI cs.PF
null
In this document we study the application of weighted proportional fairness to data flows in the Internet. We let the users set the weights of their connections in order to maximise the utility they get from the network. When combined with a pricing scheme where connections are billed by weight and time, such a system is known to maximise the total utility of the network. Our study case is a national Web cache server connected to long distance links. We propose two ways of weighting TCP connections by manipulating some parameters of the protocol and present results from simulations and prototypes. We finally discuss how proportional fairness could be used to implement an Internet with differentiated services.
[ { "version": "v1", "created": "Tue, 25 Aug 1998 12:59:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Crowcroft", "Jon", "" ], [ "Oechslin", "Philippe", "" ] ]
cs/9808101
null
M. L. Littman, J. Goldsmith, M. Mundhenk
The Computational Complexity of Probabilistic Planning
See http://www.jair.org/ for any accompanying files
Journal of Artificial Intelligence Research, Vol 9, (1998), 1-36
null
null
cs.AI
null
We examine the computational complexity of testing and finding small plans in probabilistic planning domains with both flat and propositional representations. The complexity of plan evaluation and existence varies with the plan type sought; we examine totally ordered plans, acyclic plans, and looping plans, and partially ordered plans under three natural definitions of plan value. We show that problems of interest are complete for a variety of complexity classes: PL, P, NP, co-NP, PP, NP^PP, co-NP^PP, and PSPACE. In the process of proving that certain planning problems are complete for NP^PP, we introduce a new basic NP^PP-complete problem, E-MAJSAT, which generalizes the standard Boolean satisfiability problem to computations involving probabilistic quantities; our results suggest that the development of good heuristics for E-MAJSAT could be important for the creation of efficient algorithms for a wide variety of problems.
[ { "version": "v1", "created": "Sat, 1 Aug 1998 00:00:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Littman", "M. L.", "" ], [ "Goldsmith", "J.", "" ], [ "Mundhenk", "M.", "" ] ]
cs/9809001
Joerg Rothe
Joerg Rothe
Immunity and Simplicity for Exact Counting and Other Counting Classes
20 pages
null
null
University of Rochester Technical Report TR-98-679
cs.CC
null
Ko [RAIRO 24, 1990] and Bruschi [TCS 102, 1992] showed that in some relativized world, PSPACE (in fact, ParityP) contains a set that is immune to the polynomial hierarchy (PH). In this paper, we study and settle the question of (relativized) separations with immunity for PH and the counting classes PP, C_{=}P, and ParityP in all possible pairwise combinations. Our main result is that there is an oracle A relative to which C_{=}P contains a set that is immune to BPP^{ParityP}. In particular, this C_{=}P^A set is immune to PH^{A} and ParityP^{A}. Strengthening results of Tor\'{a}n [J.ACM 38, 1991] and Green [IPL 37, 1991], we also show that, in suitable relativizations, NP contains a C_{=}P-immune set, and ParityP contains a PP^{PH}-immune set. This implies the existence of a C_{=}P^{B}-simple set for some oracle B, which extends results of Balc\'{a}zar et al. [SIAM J.Comp. 14, 1985; RAIRO 22, 1988] and provides the first example of a simple set in a class not known to be contained in PH. Our proof technique requires a circuit lower bound for ``exact counting'' that is derived from Razborov's [Mat. Zametki 41, 1987] lower bound for majority.
[ { "version": "v1", "created": "Tue, 1 Sep 1998 11:16:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Rothe", "Joerg", "" ] ]
cs/9809002
Joerg Rothe
Judy Goldsmith, Mitsunori Ogihara, Joerg Rothe
Tally NP Sets and Easy Census Functions
24 pages
null
null
University of Rochester Technical Report TR-98-684
cs.CC
null
We study the question of whether every P set has an easy (i.e., polynomial-time computable) census function. We characterize this question in terms of unlikely collapses of language and function classes such as the containment of #P_1 in FP, where #P_1 is the class of functions that count the witnesses for tally NP sets. We prove that every #P_{1}^{PH} function can be computed in FP^{#P_{1}^{#P_{1}}}. Consequently, every P set has an easy census function if and only if every set in the polynomial hierarchy does. We show that the assumption of #P_1 being contained in FP implies P = BPP and that PH is contained in MOD_{k}P for each k \geq 2, which provides further evidence that not all sets in P have an easy census function. We also relate a set's property of having an easy census function to other well-studied properties of sets, such as rankability and scalability (the closure of the rankable sets under P-isomorphisms). Finally, we prove that it is no more likely that the census function of any set in P can be approximated (more precisely, can be n^{\alpha}-enumerated in time n^{\beta} for fixed \alpha and \beta) than that it can be precisely computed in polynomial time.
[ { "version": "v1", "created": "Tue, 1 Sep 1998 12:15:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldsmith", "Judy", "" ], [ "Ogihara", "Mitsunori", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9809003
Joseph Y. Halpern
R. Fagin, J. Y. Halpern, Y. Moses, and M. Vardi
Common knowledge revisited
A previous version appeared in TARK (Theoretical Aspects of Rationality and Knowledge), 1996. This version will appear in Annals of Pure and Applied Logic. The material in this paper is basically taken from Chapter 11 of our book Reasoning About Knowledge (MIT Press, 1995)
null
null
null
cs.LO cs.DC
null
We consider the common-knowledge paradox raised by Halpern and Moses: common knowledge is necessary for agreement and coordination, but common knowledge is unattainable in the real world because of temporal imprecision. We discuss two solutions to this paradox: (1) modeling the world with a coarser granularity, and (2) relaxing the requirements for coordination.
[ { "version": "v1", "created": "Tue, 1 Sep 1998 21:56:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Fagin", "R.", "" ], [ "Halpern", "J. Y.", "" ], [ "Moses", "Y.", "" ], [ "Vardi", "M.", "" ] ]
cs/9809004
Jim Gray
Jim Gray, Joshua Coates, Chris Nyberg
Performance / Price Sort
Original word file at: http://research.microsoft.com/~gray/PennySort.doc
null
null
null
cs.DB cs.PF
null
NTsort is an external sort on WindowsNT 5.0. It has minimal functionality but excellent price performance. In particular, running on mail-order hardware it can sort 1.5 GB for a penny. For commercially available sorts, Postman Sort from Robert Ramey Software Development has elapsed time performance comparable to NTsort, while using less processor time. It can sort 1.27 GB for a penny (12.7 million records.) These sorts set new price-performance records. This paper documents this and proposes that the PennySort benchmark be revised to Performance/Price sort: a simple GB/$ sort metric based on a two-pass external sort.
[ { "version": "v1", "created": "Wed, 2 Sep 1998 00:49:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Coates", "Joshua", "" ], [ "Nyberg", "Chris", "" ] ]
cs/9809005
Jim Gray
Jim Gray, Goetz Graefe
The Five-Minute Rule Ten Years Later, and Other Computer Storage Rules of Thumb
Original document at: http://research.microsoft.com/~gray/5_min_rule_SIGMOD.doc
ACM SIGMOD Record 26(4): 63-68 (1997)
null
MSR-TR-97-33
cs.DB
null
Simple economic and performance arguments suggest appropriate lifetimes for main memory pages and suggest optimal page sizes. The fundamental tradeoffs are the prices and bandwidths of RAMs and disks. The analysis indicates that with today's technology, five minutes is a good lifetime for randomly accessed pages, one minute is a good lifetime for two-pass sequentially accessed pages, and 16 KB is a good size for index pages. These rules-of-thumb change in predictable ways as technology ratios change. They also motivate the importance of the new Kaps, Maps, Scans, and $/Kaps, $/Maps, $/TBscan metrics.
[ { "version": "v1", "created": "Wed, 2 Sep 1998 01:49:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Graefe", "Goetz", "" ] ]
cs/9809006
Jim Gray
Werner Vogels, Dan Dumitriu, Ken Birman, Rod Gamache, Mike Massa, Rob Short, John Vert, Joe Barrera
The Design and Architecture of the Microsoft Cluster Service -- A Practical Approach to High-Availability and Scalability
Original document at: http://research.microsoft.com/~gray/MSCS_FTCS98.doc
Proceedings of FTCS'98, June 23-25, 1998 in Munich, Germany
null
Microsoft Research MSR-TR-98-16
cs.OS cs.DC
null
Microsoft Cluster Service (MSCS) extends the Win-dows NT operating system to support high-availability services. The goal is to offer an execution environment where off-the-shelf server applications can continue to operate, even in the presence of node failures. Later ver-sions of MSCS will provide scalability via a node and application management system that allows applications to scale to hundreds of nodes. This paper provides a de-tailed description of the MSCS architecture and the de-sign decisions that have driven the implementation of the service. The paper also describes how some major appli-cations use the MSCS features, and describes features added to make it easier to implement and manage fault-tolerant applications on MSCS.
[ { "version": "v1", "created": "Wed, 2 Sep 1998 17:11:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Vogels", "Werner", "" ], [ "Dumitriu", "Dan", "" ], [ "Birman", "Ken", "" ], [ "Gamache", "Rod", "" ], [ "Massa", "Mike", "" ], [ "Short", "Rob", "" ], [ "Vert", "John", "" ], [ "Barrera", "Joe", "" ] ]
cs/9809007
Jim Gray
Jim Gray
Locally Served Network Computers
Original document at: http://research.microsoft.com/~gray/NC_Servers.doc
Middleware Spectra, 11.2, 1997
null
MSR-TR-95-55
cs.AR cs.DC
null
NCs are the natural evolution of PCs, ubiquitous computers everywhere. The current vision of NCs requires two improbable developments: (1) inexpensive high-bandwidth WAN links to the Internet, and (2) inexpensive centralized servers. The large NC bandwidth requirements will force each home or office to have a local server LAN attached to the NCs. These servers will be much less expensive to purchase and manage than a centralized solution. Centralized staff are expensive and unresponsive.
[ { "version": "v1", "created": "Wed, 2 Sep 1998 17:30:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
cs/9809009
Ronald F. Boisvert
Ronald F. Boisvert, Jack J. Dongarra, Roldan Pozo, Karin Remington and G. W. Stewart
Developing numerical libraries in Java
11 pages. Revised version of paper presented to the 1998 ACM Conference on Java for High Performance Network Computing. To appear in Concurrency: Practice and Experience
null
null
null
cs.MS
null
The rapid and widespread adoption of Java has created a demand for reliable and reusable mathematical software components to support the growing number of compute-intensive applications now under development, particularly in science and engineering. In this paper we address practical issues of the Java language and environment which have an effect on numerical library design and development. Benchmarks which illustrate the current levels of performance of key numerical kernels on a variety of Java platforms are presented. Finally, a strategy for the development of a fundamental numerical toolkit for Java is proposed and its current status is described.
[ { "version": "v1", "created": "Wed, 2 Sep 1998 19:27:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Boisvert", "Ronald F.", "" ], [ "Dongarra", "Jack J.", "" ], [ "Pozo", "Roldan", "" ], [ "Remington", "Karin", "" ], [ "Stewart", "G. W.", "" ] ]
cs/9809010
Jim Gray
C. Gordon Bell, Jim Gray
The Revolution Yet to Happen
Original document at: http://research.microsoft.com/~gray/Revolution.doc
null
null
Microsoft Technical report: MSR-TR-98-45
cs.GL
null
All information about physical objects including humans, buildings, processes, and organizations will be online. This trend is both desirable and inevitable. Cyberspace will provide the basis for wonderful new ways to inform, entertain, and educate people. The information and the corresponding systems will streamline commerce, but will also provide new levels of personal service, health care, and automation. The most significant benefit will be a breakthrough in our ability to remotely communicate with one another using all our senses. The ACM and the transistor were born in 1947. At that time the stored program computer was a revolutionary idea and the transistor was just a curiosity. Both ideas evolved rapidly. By the mid 1960s integrated circuits appeared -- allowing mass fabrication of transistors on silicon substrates. This allowed low-cost mass-produced computers. These technologies enabled extraordinary increases in processing speed and memory coupled with extraordinary price declines. The only form of processing and memory more easily, cheaply, and rapidly fabricated is the human brain. Peter Cohrane (1996) estimates the brain to have a processing power of around 1000 million-million operations per second, (one Petaops) and a memory of 10 Terabytes. If current trends continue, computers could have these capabilities by 2047. Such computers could be 'on body' personal assistants able to recall everything one reads, hears, and sees.
[ { "version": "v1", "created": "Wed, 2 Sep 1998 19:39:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Bell", "C. Gordon", "" ], [ "Gray", "Jim", "" ] ]
cs/9809011
Jim Gray
Tom Barclay, Robert Eberl, Jim Gray, John Nordlinger, Guru Raghavendran, Don Slutz, Greg Smith, Phil Smoot, John Hoffman, Natt Robb III, Hedy Rossmeissl, Beth Duff, George Lee, Theresa Mathesmier, Randall Sunne
Microsoft TerraServer
Original file at http://research.microsoft.com/~gray/TerraServer_TR.doc
null
null
Microsoft MSR-TR-98-17
cs.DB cs.DL
null
The Microsoft TerraServer stores aerial and satellite images of the earth in a SQL Server Database served to the public via the Internet. It is the world's largest atlas, combining five terabytes of image data from the United States Geodetic Survey, Sovinformsputnik, and Encarta Virtual Globe. Internet browsers provide intuitive spatial and gazetteer interfaces to the data. The TerraServer is also an E-Commerce application. Users can buy the right to use the imagery using Microsoft Site Servers managed by the USGS and Aerial Images. This paper describes the TerraServer's design and implementation.
[ { "version": "v1", "created": "Sat, 5 Sep 1998 00:29:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Barclay", "Tom", "" ], [ "Eberl", "Robert", "" ], [ "Gray", "Jim", "" ], [ "Nordlinger", "John", "" ], [ "Raghavendran", "Guru", "" ], [ "Slutz", "Don", "" ], [ "Smith", "Greg", "" ], [ "Smoot", "Phil", "" ], [ "Hoffman", "John", "" ], [ "Robb", "Natt", "III" ], [ "Rossmeissl", "Hedy", "" ], [ "Duff", "Beth", "" ], [ "Lee", "George", "" ], [ "Mathesmier", "Theresa", "" ], [ "Sunne", "Randall", "" ] ]
cs/9809012
David Karger
David R. Karger
A Fully Polynomial Randomized Approximation Scheme for the All Terminal Network Reliability Problem
To appear in SICOMP
null
null
null
cs.DS
null
The classic all-terminal network reliability problem posits a graph, each of whose edges fails independently with some given probability.
[ { "version": "v1", "created": "Wed, 9 Sep 1998 02:38:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Karger", "David R.", "" ] ]
cs/9809013
Joseph Y. Halpern
Fahiem Bacchus, Joseph Y. Halpern, Hector J. Levesque
Reasoning about Noisy Sensors and Effectors in the Situation Calculus
A preliminary version of the paper appeared in IJCAI '95
null
null
null
cs.AI cs.LO
null
Agents interacting with an incompletely known world need to be able to reason about the effects of their actions, and to gain further information about that world they need to use sensors of some sort. Unfortunately, both the effects of actions and the information returned from sensors are subject to error. To cope with such uncertainties, the agent can maintain probabilistic beliefs about the state of the world. With probabilistic beliefs the agent will be able to quantify the likelihood of the various outcomes of its actions and is better able to utilize the information gathered from its error-prone actions and sensors. In this paper, we present a model in which we can reason about an agent's probabilistic degrees of belief and the manner in which these beliefs change as various actions are executed. We build on a general logical theory of action developed by Reiter and others, formalized in the situation calculus. We propose a simple axiomatization that captures an agent's state of belief and the manner in which these beliefs change when actions are executed. Our model displays a number of intuitively reasonable properties.
[ { "version": "v1", "created": "Wed, 9 Sep 1998 22:28:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Bacchus", "Fahiem", "" ], [ "Halpern", "Joseph Y.", "" ], [ "Levesque", "Hector J.", "" ] ]
cs/9809016
Gopalan Nadathur
Gopalan Nadathur, Bharat Jayaraman and Keehang Kwon
Scoping Constructs in Logic Programming: Implementation Problems and their Solution
46 pages
Journal of Logic Programming, 25(2)-119:161, 1995
null
null
cs.PL
null
The inclusion of universal quantification and a form of implication in goals in logic programming is considered. These additions provide a logical basis for scoping but they also raise new implementation problems. When universal and existential quantifiers are permitted to appear in mixed order in goals, the devices of logic variables and unification that are employed in solving existential goals must be modified to ensure that constraints arising out of the order of quantification are respected. Suitable modifications that are based on attaching numerical tags to constants and variables and on using these tags in unification are described. The resulting devices are amenable to an efficient implementation and can, in fact, be assimilated easily into the usual machinery of the Warren Abstract Machine (WAM). The provision of implications in goals results in the possibility of program clauses being added to the program for the purpose of solving specific subgoals. A naive scheme based on asserting and retracting program clauses does not suffice for implementing such additions for two reasons. First, it is necessary to also support the resurrection of an earlier existing program in the face of backtracking. Second, the possibility for implication goals to be surrounded by quantifiers requires a consideration of the parameterization of program clauses by bindings for their free variables. Devices for supporting these additional requirements are described as also is the integration of these devices into the WAM. Further extensions to the machine are outlined for handling higher-order additions to the language. The ideas presented here are relevant to the implementation of the higher-order logic programming language lambda Prolog.
[ { "version": "v1", "created": "Thu, 10 Sep 1998 16:54:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Nadathur", "Gopalan", "" ], [ "Jayaraman", "Bharat", "" ], [ "Kwon", "Keehang", "" ] ]
cs/9809017
Madhav Marathe
Harry B. Hunt III, Madhav V. Marathe, Venkatesh Radhakrishnan, Richard E. Stearns
The Complexity of Planar Counting Problems
25 pages, 12 figures, appears in SIAM J. Computing
null
null
null
cs.CC cs.DM
null
We prove the #P-hardness of the counting problems associated with various satisfiability, graph and combinatorial problems, when restricted to planar instances. These problems include \begin{romannum} \item[{}] {\sc 3Sat, 1-3Sat, 1-Ex3Sat, Minimum Vertex Cover, Minimum Dominating Set, Minimum Feedback Vertex Set, X3C, Partition Into Triangles, and Clique Cover.} \end{romannum} We also prove the {\sf NP}-completeness of the {\sc Ambiguous Satisfiability} problems \cite{Sa80} and the {\sf D$^P$}-completeness (with respect to random polynomial reducibility) of the unique satisfiability problems \cite{VV85} associated with several of the above problems, when restricted to planar instances. Previously, very few {\sf #P}-hardness results, no {\sf NP}-hardness results, and no {\sf D$^P$}-completeness results were known for counting problems, ambiguous satisfiability problems and unique satisfiability problems, respectively, when restricted to planar instances. Assuming {\sf P $\neq $ NP}, one corollary of the above results is There are no $\epsilon$-approximation algorithms for the problems of maximizing or minimizing a linear objective function subject to a planar system of linear inequality constraints over the integers.
[ { "version": "v1", "created": "Fri, 11 Sep 1998 17:38:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Hunt", "Harry B.", "III" ], [ "Marathe", "Madhav V.", "" ], [ "Radhakrishnan", "Venkatesh", "" ], [ "Stearns", "Richard E.", "" ] ]
cs/9809018
Lorrie Cranor
Lorrie Faith Cranor and Rebecca N. Wright
Influencing Software Usage
Prepared for the 26th Telecommunications Policy Research Conference, October 3-5, 1998, Alexandria, VA
null
null
null
cs.CY
null
Technology designers often strive to design systems that are flexible enough to be used in a wide range of situations. Software engineers, in particular, are trained to seek general solutions to problems. General solutions can be used not only to address the problem at hand, but also to address a wide range of problems that the designers may not have even anticipated. Sometimes designers wish to provide general solutions, while encouraging certain uses of their technology and discouraging or precluding others. They may attempt to influence the use of technology by ``hard-wiring'' it so that it only can be used in certain ways, licensing it so that those who use it are legally obligated to use it in certain ways, issuing guidelines for how it should be used, or providing resources that make it easier to use the technology as the designers intended than to use it in any other way. This paper examines several cases where designers have attempted to influence the use of technology through one of these mechanisms. Such cases include key recovery encryption, Pegasus Mail, Platform for Internet Content Selection (PICS) Guidelines, Java, Platform for Privacy Preferences Project (P3P) Implementation Guide, Apple's style guidelines, and Microsoft Foundation Classes. In some of these cases, the designers sought to influence the use of technology for competitive reasons or in order to promote standardization or interoperability. However, in other cases designers were motivated by policy-related goals such as protecting privacy or free speech. As new technologies are introduced with the express purpose of advancing policy-related goals (for example, PICS and P3P), it is especially important to understand the roles designers might play in influencing the use of technology.
[ { "version": "v1", "created": "Fri, 11 Sep 1998 18:40:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Cranor", "Lorrie Faith", "" ], [ "Wright", "Rebecca N.", "" ] ]
cs/9809019
Michael Manthey
Michael Manthey
Distributed Computation as Hierarchy
16 pages, 3 figures
null
null
Aalborg University, Computer Science Dept. R-98-5005
cs.DC cs.NE
null
This paper presents a new distributed computational model of distributed systems called the phase web that extends V. Pratt's orthocurrence relation from 1986. The model uses mutual-exclusion to express sequence, and a new kind of hierarchy to replace event sequences, posets, and pomsets. The model explicitly connects computation to a discrete Clifford algebra that is in turn extended into homology and co-homology, wherein the recursive nature of objects and boundaries becomes apparent and itself subject to hierarchical recursion. Topsy, a programming environment embodying the phase web, is available from www.cs.auc.dk/topsy.
[ { "version": "v1", "created": "Mon, 14 Sep 1998 15:25:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Manthey", "Michael", "" ] ]
cs/9809020
Min-Yen Kan
Min-Yen Kan, Judith L. Klavans, Kathleen R. McKeown
Linear Segmentation and Segment Significance
9 pages, US Letter, 4 figures. Software License can be found at http://www.cs.columbia.edu/nlp/licenses/segmenterLicenseDownload.html
Proceedings of 6th International Workshop of Very Large Corpora (WVLC-6), Montreal, Quebec, Canada: Aug. 1998. pp. 197-205
null
null
cs.CL
null
We present a new method for discovering a segmental discourse structure of a document while categorizing segment function. We demonstrate how retrieval of noun phrases and pronominal forms, along with a zero-sum weighting scheme, determines topicalized segmentation. Futhermore, we use term distribution to aid in identifying the role that the segment performs in the document. Finally, we present results of evaluation in terms of precision and recall which surpass earlier approaches.
[ { "version": "v1", "created": "Tue, 15 Sep 1998 23:49:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Kan", "Min-Yen", "" ], [ "Klavans", "Judith L.", "" ], [ "McKeown", "Kathleen R.", "" ] ]
cs/9809021
Frantz Vichot
Francis Wolinski, Frantz Vichot, Olivier Gremont (Informatique CDC/DTA, Arcueil, France)
Producing NLP-based On-line Contentware
7 pages, 5 figures
Natural Language Processing & Industrial Applications, Moncton, NB, Canada, Aug. 1998
null
null
cs.CL cs.AR
null
For its internal needs as well as for commercial purposes, CDC Group has produced several NLP-based on-line contentware applications for years. The development process of such applications is subject to numerous constraints such as quality of service, integration of new advances in NLP, direct reactions from users, continuous versioning, short delivery deadlines and cost control. Following this industrial and commercial experience, malleability of the applications, their openness towards foreign components, efficiency of applications and their ease of exploitation have appeared to be key points. In this paper, we describe TalLab, a powerful architecture for on-line contentware which fulfils these requirements.
[ { "version": "v1", "created": "Wed, 16 Sep 1998 14:22:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolinski", "Francis", "", "Informatique\n CDC/DTA, Arcueil, France" ], [ "Vichot", "Frantz", "", "Informatique\n CDC/DTA, Arcueil, France" ], [ "Gremont", "Olivier", "", "Informatique\n CDC/DTA, Arcueil, France" ] ]
cs/9809022
Bernd Ludwig
Bernd Ludwig, Guenther Goerz, Heinrich Niemann
Modelling Users, Intentions, and Structure in Spoken Dialog
17 pages
null
null
null
cs.CL
null
We outline how utterances in dialogs can be interpreted using a partial first order logic. We exploit the capability of this logic to talk about the truth status of formulae to define a notion of coherence between utterances and explain how this coherence relation can serve for the construction of AND/OR trees that represent the segmentation of the dialog. In a BDI model we formalize basic assumptions about dialog and cooperative behaviour of participants. These assumptions provide a basis for inferring speech acts from coherence relations between utterances and attitudes of dialog participants. Speech acts prove to be useful for determining dialog segments defined on the notion of completing expectations of dialog participants. Finally, we sketch how explicit segmentation signalled by cue phrases and performatives is covered by our dialog model.
[ { "version": "v1", "created": "Thu, 17 Sep 1998 11:10:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Ludwig", "Bernd", "" ], [ "Goerz", "Guenther", "" ], [ "Niemann", "Heinrich", "" ] ]
cs/9809023
Davood Rafiei
Davood Rafiei and Alberto Mendelzon
Similarity-Based Queries for Time Series Data
null
In Proceedings of the ACM SIGMOD Intl. Conf. on Management of Data, pages 13-24, Tucson, Arizona, May 1997
null
null
cs.DB
null
We study a set of linear transformations on the Fourier series representation of a sequence that can be used as the basis for similarity queries on time-series data. We show that our set of transformations is rich enough to formulate operations such as moving average and time warping. We present a query processing algorithm that uses the underlying R-tree index of a multidimensional data set to answer similarity queries efficiently. Our experiments show that the performance of this algorithm is competitive to that of processing ordinary (exact match) queries using the index, and much faster than sequential scanning. We relate our transformations to the general framework for similarity queries of Jagadish et al.
[ { "version": "v1", "created": "Thu, 17 Sep 1998 14:41:07 GMT" }, { "version": "v2", "created": "Fri, 18 Sep 1998 19:04:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Rafiei", "Davood", "" ], [ "Mendelzon", "Alberto", "" ] ]
cs/9809025
Bernardo A. Huberman
Bernardo A. Huberman and Lada A. Adamic
Novelty and Social Search in the World Wide Web
null
null
null
null
cs.MA cs.DL
null
The World Wide Web is fast becoming a source of information for a large part of the world's population. Because of its sheer size and complexity users often resort to recommendations from others to decide which sites to visit. We present a dynamical theory of recommendations which predicts site visits by users of the World Wide Web. We show that it leads to a universal power law for the number of users that visit given sites over periods of time, with an exponent related to the rate at which users discover new sites on their own. An extensive empirical study of user behavior in the Web that we conducted confirms the existence of this law of influence while yielding bounds on the rate of novelty encountered by users.
[ { "version": "v1", "created": "Fri, 18 Sep 1998 00:07:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Huberman", "Bernardo A.", "" ], [ "Adamic", "Lada A.", "" ] ]
cs/9809026
Anoop Sarkar
Mark-Jan Nederhof (DFKI), Anoop Sarkar (UPenn) and Giorgio Satta (UPadova)
Prefix Probabilities from Stochastic Tree Adjoining Grammars
7 pages, 2 Postscript figures, uses colacl.sty, graphicx.sty, psfrag.sty
In Proceedings of COLING-ACL '98 (Montreal)
null
null
cs.CL
null
Language models for speech recognition typically use a probability model of the form Pr(a_n | a_1, a_2, ..., a_{n-1}). Stochastic grammars, on the other hand, are typically used to assign structure to utterances. A language model of the above form is constructed from such grammars by computing the prefix probability Sum_{w in Sigma*} Pr(a_1 ... a_n w), where w represents all possible terminations of the prefix a_1 ... a_n. The main result in this paper is an algorithm to compute such prefix probabilities given a stochastic Tree Adjoining Grammar (TAG). The algorithm achieves the required computation in O(n^6) time. The probability of subderivations that do not derive any words in the prefix, but contribute structurally to its derivation, are precomputed to achieve termination. This algorithm enables existing corpus-based estimation techniques for stochastic TAGs to be used for language modelling.
[ { "version": "v1", "created": "Fri, 18 Sep 1998 03:45:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Nederhof", "Mark-Jan", "", "DFKI" ], [ "Sarkar", "Anoop", "", "UPenn" ], [ "Satta", "Giorgio", "", "UPadova" ] ]
cs/9809027
Anoop Sarkar
Anoop Sarkar (University of Pennsylvania)
Conditions on Consistency of Probabilistic Tree Adjoining Grammars
7 pages, 4 Postscript figures, uses colacl.sty, graphicx.sty, psfrag.sty
In Proceedings of COLING-ACL '98 (Montreal)
null
null
cs.CL
null
Much of the power of probabilistic methods in modelling language comes from their ability to compare several derivations for the same string in the language. An important starting point for the study of such cross-derivational properties is the notion of _consistency_. The probability model defined by a probabilistic grammar is said to be _consistent_ if the probabilities assigned to all the strings in the language sum to one. From the literature on probabilistic context-free grammars (CFGs), we know precisely the conditions which ensure that consistency is true for a given CFG. This paper derives the conditions under which a given probabilistic Tree Adjoining Grammar (TAG) can be shown to be consistent. It gives a simple algorithm for checking consistency and gives the formal justification for its correctness. The conditions derived here can be used to ensure that probability models that use TAGs can be checked for _deficiency_ (i.e. whether any probability mass is assigned to strings that cannot be generated).
[ { "version": "v1", "created": "Fri, 18 Sep 1998 03:58:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Sarkar", "Anoop", "", "University of Pennsylvania" ] ]
cs/9809028
Anoop Sarkar
Anoop Sarkar (University of Pennsylvania)
Separating Dependency from Constituency in a Tree Rewriting System
7 pages, 6 Postscript figures, uses fullname.sty
In Proceedings of the Fifth Meeting on Mathematics of Language, Saarbruecken, August 1997
null
null
cs.CL
null
In this paper we present a new tree-rewriting formalism called Link-Sharing Tree Adjoining Grammar (LSTAG) which is a variant of synchronous TAGs. Using LSTAG we define an approach towards coordination where linguistic dependency is distinguished from the notion of constituency. Such an approach towards coordination that explicitly distinguishes dependencies from constituency gives a better formal understanding of its representation when compared to previous approaches that use tree-rewriting systems which conflate the two issues.
[ { "version": "v1", "created": "Fri, 18 Sep 1998 04:44:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Sarkar", "Anoop", "", "University of Pennsylvania" ] ]
cs/9809030
Vern Paxson
Vern Paxson (Network Research Group, Lawrence Berkeley National Laboratory)
Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic
14 pages
Computer Communication Review 27(5) (1997) 5-18
null
LBL-36750/UC-405
cs.NI
null
Recent network traffic studies argue that network arrival processes are much more faithfully modeled using statistically self-similar processes instead of traditional Poisson processes [LTWW94,PF95]. One difficulty in dealing with self-similar models is how to efficiently synthesize traces (sample paths) corresponding to self-similar traffic. We present a fast Fourier transform method for synthesizing approximate self-similar sample paths for one type of self-similar process, Fractional Gaussian Noise, and assess its performance and validity. We find that the method is as fast or faster than existing methods and appears to generate close approximations to true self-similar sample paths. We also discuss issues in using such synthesized sample paths for simulating network traffic, and how an approximation used by our method can dramatically speed up evaluation of Whittle's estimator for H, the Hurst parameter giving the strength of long-range dependence present in a self-similar time series.
[ { "version": "v1", "created": "Fri, 18 Sep 1998 05:18:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Paxson", "Vern", "", "Network Research Group, Lawrence Berkeley National\n Laboratory" ] ]
cs/9809031
Mihir Bellare
William Aiello, Mihir Bellare, Giovanni Di Crescenzo and Ramarathnam Venkatesan
Security amplification by composition: The case of doubly-iterated, ideal ciphers
An extended abstract of this paper appeared in the proceedings of Crypto 98 conference (Springer Verlag LNCS Vol 1462, 1998). This is the full version
null
null
null
cs.CR
null
We investigate, in the Shannon model, the security of constructions corresponding to double and (two-key) triple DES. That is, we consider F_{k1}(F_{k2}(.)) and F_{k1}(F_{k2}^{-1}(F_{k1}(.))) with the component functions being ideal ciphers. This models the resistance of these constructions to ``generic'' attacks like meet in the middle attacks. We obtain the first proof that composition actually increases the security of these constructions in some meaningful sense. We compute a bound on the probability of breaking the double cipher as a function of the number of computations of the base cipher made, and the number of examples of the composed cipher seen, and show that the success probability is the square of that for a single key cipher. The same bound holds for the two-key triple cipher. The first bound is tight and shows that meet in the middle is the best possible generic attack against the double cipher.
[ { "version": "v1", "created": "Fri, 18 Sep 1998 19:02:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Aiello", "William", "" ], [ "Bellare", "Mihir", "" ], [ "Di Crescenzo", "Giovanni", "" ], [ "Venkatesan", "Ramarathnam", "" ] ]
cs/9809032
Miroslaw Truszczynski
Victor W. Marek, Miroslaw Truszczynski
Stable models and an alternative logic programming paradigm
21 pages
The Logic Programming Paradigm, K.R. Apt, V.W. Marek, M. Truszczynski, D.S. Warren (eds.), pp. 375-398. Springer-Verlag, 1999
null
null
cs.LO cs.AI
null
In this paper we reexamine the place and role of stable model semantics in logic programming and contrast it with a least Herbrand model approach to Horn programs. We demonstrate that inherent features of stable model semantics naturally lead to a logic programming system that offers an interesting alternative to more traditional logic programming styles of Horn logic programming, stratified logic programming and logic programming with well-founded semantics. The proposed approach is based on the interpretation of program clauses as constraints. In this setting programs do not describe a single intended model, but a family of stable models. These stable models encode solutions to the constraint satisfaction problem described by the program. Our approach imposes restrictions on the syntax of logic programs. In particular, function symbols are eliminated from the language. We argue that the resulting logic programming system is well-attuned to problems in the class NP, has a well-defined domain of applications, and an emerging methodology of programming. We point out that what makes the whole approach viable is recent progress in implementations of algorithms to compute stable models of propositional logic programs.
[ { "version": "v1", "created": "Fri, 18 Sep 1998 20:34:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Marek", "Victor W.", "" ], [ "Truszczynski", "Miroslaw", "" ] ]
cs/9809033
Davood Rafiei
Davood Rafiei and Alberto Mendelzon
Efficient Retrieval of Similar Time Sequences Using DFT
null
Proceedings of 5th Intl. Conf. on Foundations of Data Organizations and Algorithms (FODO '98), November 1998, Kobe, Japan
null
null
cs.DB
null
We propose an improvement of the known DFT-based indexing technique for fast retrieval of similar time sequences. We use the last few Fourier coefficients in the distance computation without storing them in the index since every coefficient at the end is the complex conjugate of a coefficient at the beginning and as strong as its counterpart. We show analytically that this observation can accelerate the search time of the index by more than a factor of two. This result was confirmed by our experiments, which were carried out on real stock prices and synthetic data.
[ { "version": "v1", "created": "Fri, 18 Sep 1998 21:24:23 GMT" }, { "version": "v2", "created": "Fri, 25 Sep 1998 16:12:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Rafiei", "Davood", "" ], [ "Mendelzon", "Alberto", "" ] ]
cs/9809034
Tim Finin
Yannis Labrou and Tim Finin
Semantics and Conversations for an Agent Communication Language
Also in in "Readings in Agents", Michael Huhns and Munindar Singh (eds), Morgan Kaufmann Publishers, Inc
Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence (IJCAI-97) August, 1997
null
null
cs.MA cs.AI
null
We address the issues of semantics and conversations for agent communication languages and the Knowledge Query Manipulation Language (KQML) in particular. Based on ideas from speech act theory, we present a semantic description for KQML that associates ``cognitive'' states of the agent with the use of the language's primitives (performatives). We have used this approach to describe the semantics for the whole set of reserved KQML performatives. Building on the semantics, we devise the conversation policies, i.e., a formal description of how KQML performatives may be combined into KQML exchanges (conversations), using a Definite Clause Grammar. Our research offers methods for a speech act theory-based semantic description of a language of communication acts and for the specification of the protocols associated with these acts. Languages of communication acts address the issue of communication among software applications at a level of abstraction that is useful to the emerging software agents paradigm.
[ { "version": "v1", "created": "Fri, 18 Sep 1998 21:41:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Labrou", "Yannis", "" ], [ "Finin", "Tim", "" ] ]