id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-21 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/9809035
Jeff Erickson
Jeff Erickson, Leonidas J. Guibas, Jorge Stolfi, Li Zhang
Separation-Sensitive Collision Detection for Convex Objects
10 pages, 8 figures; to appear in Proc. 10th Annual ACM-SIAM Symposium on Discrete Algorithms, 1999; see also http://www.uiuc.edu/ph/www/jeffe/pubs/kollide.html ; v2 replaces submission with camera-ready version
null
null
null
cs.CG cs.GR
null
We develop a class of new kinetic data structures for collision detection between moving convex polytopes; the performance of these structures is sensitive to the separation of the polytopes during their motion. For two convex polygons in the plane, let $D$ be the maximum diameter of the polygons, and let $s$ be the minimum distance between them during their motion. Our separation certificate changes $O(\log(D/s))$ times when the relative motion of the two polygons is a translation along a straight line or convex curve, $O(\sqrt{D/s})$ for translation along an algebraic trajectory, and $O(D/s)$ for algebraic rigid motion (translation and rotation). Each certificate update is performed in $O(\log(D/s))$ time. Variants of these data structures are also shown that exhibit \emph{hysteresis}---after a separation certificate fails, the new certificate cannot fail again until the objects have moved by some constant fraction of their current separation. We can then bound the number of events by the combinatorial size of a certain cover of the motion path by balls.
[ { "version": "v1", "created": "Fri, 18 Sep 1998 23:16:06 GMT" }, { "version": "v2", "created": "Sat, 24 Oct 1998 21:51:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Erickson", "Jeff", "" ], [ "Guibas", "Leonidas J.", "" ], [ "Stolfi", "Jorge", "" ], [ "Zhang", "Li", "" ] ]
cs/9809036
Peter Stanski
P. Stanski, S. Giles and A. Zaslavsky
Document Archiving, Replication and Migration Container for Mobile Web Users
5 pages
Proceedings of the 1998 ACM Symposium on Applied Computing (SAC98), Feb. 27- March 1, pp. 400-404, ACM, ISBN 0-89791-969-6
null
null
cs.MA cs.MM
null
With the increasing use of mobile workstations for a wide variety of tasks and associated information needs, and with many variations of available networks, access to data becomes a prime consideration. This paper discusses issues of workstation mobility and proposes a solution wherein the data structures are accessed in an encapsulated form - through the Portable File System (PFS) wrapper. The paper discusses an implementation of the Portable File System, highlighting the architecture and commenting upon performance of an experimental system. Although investigations have been focused upon mobile access of WWW documents, this technique could be applied to any mobile data access situation.
[ { "version": "v1", "created": "Sun, 20 Sep 1998 12:48:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Stanski", "P.", "" ], [ "Giles", "S.", "" ], [ "Zaslavsky", "A.", "" ] ]
cs/9809040
Chunlei Liu
Bobby Vandalore, Sonia Fahmy, Raj Jain, Rohit Goyal, Mukul Goyal
Overload Based Explicit Rate Switch Schemes with MCR Guarantees
Submitted to the INFOCOM '99
null
null
null
cs.NI
null
An explicit rate switch scheme monitors the load at each link and gives feedback to the sources. We define the overload factor as the ratio of the input rate to the available capacity. In this paper, we present four overload based ABR switch schemes which provide MCR guarantees. The switch schemes proposed use the overload factor and other quantities to calculate feedback rates. A dynamic queue control mechanism is used to achieve efficient usage of the link, control queues and, achieve constant queuing delay at steady state. The proposed algorithms are studied and compared using several configurations. The configurations were chosen to test the performance of the algorithms in presence of link bottlenecks, source bottlenecks and transient sources. A comparison of the proposed algorithms based on the simulation results is presented.
[ { "version": "v1", "created": "Tue, 22 Sep 1998 21:34:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Vandalore", "Bobby", "" ], [ "Fahmy", "Sonia", "" ], [ "Jain", "Raj", "" ], [ "Goyal", "Rohit", "" ], [ "Goyal", "Mukul", "" ] ]
cs/9809041
Chunlei Liu
Bobby Vandalore, Raj Jain, Rohit Goyal, Sonia Fahmy
Design and Analysis of Queue Control Functions for Explicit Rate Switch Schemes
Proceedings of IC3N'98, October 1998
null
null
null
cs.NI
null
The main goals of a switch scheme are high utilization, low queuing delay and fairness. To achieve high utilization the switch scheme can maintain non-zero (small) queues in steady state which can be used if the sources do not have data to send. Queue length (delay) can be controlled if part of the link capacity is used for draining queues in the event of queue build up. In most schemes a simple threshold function is used for queue control. Better control of the queue and hence delay can be achieved by using sophisticated queue control functions. It is very important to design and analyze such queue control functions. We study step, linear, hyperbolic and inverse hyperbolic queue control functions. Analytical explanation and simulation results consistent with analysis are presented. From the study, we conclude that inverse hyperbolic is the best control function and to reduce complexity the linear control function can be used since it performs satisfactorily in most cases.
[ { "version": "v1", "created": "Tue, 22 Sep 1998 21:43:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Vandalore", "Bobby", "" ], [ "Jain", "Raj", "" ], [ "Goyal", "Rohit", "" ], [ "Fahmy", "Sonia", "" ] ]
cs/9809042
Chunlei Liu
Bobby Vandalore, Sonia Fahmy, Raj Jain, Rohit Goyal, Mukul Goyal
A Definition of General Weighted Fairness and its Support in Explicit Rate Switch Algorithms
Proceedings of ICNP'98, October1998
null
null
null
cs.NI
null
In this paper we give a general definition of weighted fairness and show how this can achieve various fairness definitions, such as those mentioned in the ATM Forum TM 4.0 Specifications. We discuss how a pricing policy can be mapped to general weighted (GW) fairness. The GW fairness can be achieved by calculating the $ExcessFairshare$ (weighted fairshare of the left over bandwidth) for each VC. We show how a switch algorithm can be modified to support the GW fairness by using the $ExcessFairshare$. We use ERICA+ as an example switch algorithm and show how it can be modified to achieve the general fairness. Simulations results are presented to demonstrate that the modified switch algorithm achieves GW fairness. An analytical proof for convergence of the modified ERICA+ algorithm is given in the appendix.
[ { "version": "v1", "created": "Tue, 22 Sep 1998 22:01:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Vandalore", "Bobby", "" ], [ "Fahmy", "Sonia", "" ], [ "Jain", "Raj", "" ], [ "Goyal", "Rohit", "" ], [ "Goyal", "Mukul", "" ] ]
cs/9809043
Chunlei Liu
Bobby Vandalore, Shivkumar Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy
Worst Case Buffer Requirements For Tcp Over ABR
SICON'98, June 98
null
null
null
cs.NI
null
ATM (asynchronous transfer mode) is the technology chosen for the Broadband Integrated Services Digital Network (B-ISDN). The ATM ABR (available bit rate) service can be used to transport ``best-effort'' traffic. In this paper, we extend our earlier work on the buffer requirements problem for TCP over ABR. Here, a worst case scenario is generated such that TCP sources send a burst of data at the time when the sources have large congestion windows and the ACRs (allowed cell rates) for ABR are high. We find that ABR using the ERICA+ switch algorithm can control the maximum queue lengths (hence the buffer requirements) even for the worst case. We present analytical arguments for the expected queue length and simulation results for different number of sources values and parameter values.
[ { "version": "v1", "created": "Tue, 22 Sep 1998 22:05:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Vandalore", "Bobby", "" ], [ "Kalyanaraman", "Shivkumar", "" ], [ "Jain", "Raj", "" ], [ "Goyal", "Rohit", "" ], [ "Fahmy", "Sonia", "" ] ]
cs/9809045
Chunlei Liu
Shivkumar Kalyanaraman, Bobby Vandalore, Raj Jain, Rohit Goyal, Sonia Fahmy, Seong-Cheol Kim, Sastri Kota
Performance of TCP over ABR with Long-Range Dependent VBR Background Traffic over Terrestrial and Satellite ATM networks
Proceedings of LCN `98
null
null
null
cs.NI
null
Compressed video is well known to be self-similar in nature. We model VBR carrying Long-Range Dependent (LRD), multiplexed MPEG-2 video sources. The actual traffic for the model is generated using fast-fourier transform of generate the fractional gaussian noise (FGN) sequence. Our model of compressed video sources bears similarity to an MPEG-2 Transport Stream carrying video, i.e., it is long-range dependent and generates traffic in a piecewise-CBR fashion. We study the effect of such VBR traffic on ABR carrying TCP traffic. The effect of such VBR traffic is that the ABR capacity is highly variant. We find that a switch algorithm like ERICA+ can tolerate this variance in ABR capacity while maintaining high throughput and low delay. We present simulation results for terrestrial and satellite configurations.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 01:40:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalyanaraman", "Shivkumar", "" ], [ "Vandalore", "Bobby", "" ], [ "Jain", "Raj", "" ], [ "Goyal", "Rohit", "" ], [ "Fahmy", "Sonia", "" ], [ "Kim", "Seong-Cheol", "" ], [ "Kota", "Sastri", "" ] ]
cs/9809047
Chunlei Liu
Rohit Goyal, Raj Jain, Sonia Fahmy, Shobana Narayanaswamy
Modeling Traffic Management in ATM Networks with OPNET
Proc. of OPNETWORK'98, Washington DC., May 1998
null
null
null
cs.NI
null
Asynchronous transfer mode (ATM) is the new generation of computer and communication networks that are being deployed throughout the telecommunication industry as well as in campus backbones. ATM technology distinguishes itself from the previous networking protocols in that it has the latest traffic management technology and thus allows guaranteeing delay, throughput, and other performance measures. This in turn, allows users to integrate voice, video, and data on the same network. Available bit rate (ABR) service in ATM has been designed to fairly distribute all unused capacity to data traffic and is specified in the ATM Forum's Traffic Management (TM4.0) standard. This paper will describe the OPNET models that have been developed for ATM and ABR design and analysis.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 02:17:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Goyal", "Rohit", "" ], [ "Jain", "Raj", "" ], [ "Fahmy", "Sonia", "" ], [ "Narayanaswamy", "Shobana", "" ] ]
cs/9809048
Chunlei Liu
Rohit Goyal, Steve Lai, Raj Jain, Arian Durresi
laboratories for Data Communications and Computer Networks
Proc. of Frontiers in Education (FIE98), Tempe, November 1998
null
null
null
cs.NI
null
In this paper we describe a hands-on laboratory oriented instructional package that we have developed for data communications and networking. The package consists of a software tool, together with instructional material for a laboratory based networking curriculum. The software is based on a simulation environment that enables the student to experiment with various networking protocols, on an easy to use graphical user interface (GUI). Data message flows, packet losses, control/routing message flows, virtual circuit setups, link failures, bit errors etc., are some of the features that can be visualized in this environment. The student can also modify the networking components provided, as well as add new components using the C programming language. The instructional material consists of a set of laboratory exercises for flow and error control (HDLC), IEEE 802.3 CSMA/CD protocol, the token ring protocol, interconnecting LANs via bridges, TCP congestion avoidance and control, IP fragmentation and reassembly, ATM PNNI routing and ATM policing. The laboratory exercises have facilitated the development of a networking curriculum based on both the traditional computer networking principles, as well as the new technologies in telecommunication networking. The laboratory environment has been used in the networking curriculum at The Ohio State University, and is being piloted at other universities. The entire package is freely available over the Internet.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 02:21:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Goyal", "Rohit", "" ], [ "Lai", "Steve", "" ], [ "Jain", "Raj", "" ], [ "Durresi", "Arian", "" ] ]
cs/9809049
Dr Peter J. Bentley
Peter J Bentley
Aspects of Evolutionary Design by Computers
In Proceedings of the 3rd On-line World Conference on Soft Computing in Engineering Design and Manufacturing (WSC3)
null
null
null
cs.NE
null
This paper examines the four main types of Evolutionary Design by computers: Evolutionary Design Optimisation, Evolutionary Art, Evolutionary Artificial Life Forms and Creative Evolutionary Design. Definitions for all four areas are provided. A review of current work in each of these areas is given, with examples of the types of applications that have been tackled. The different properties and requirements of each are examined. Descriptions of typical representations and evolutionary algorithms are provided and examples of designs evolved using these techniques are shown. The paper then discusses how the boundaries of these areas are beginning to merge, resulting in four new 'overlapping' types of Evolutionary Design: Integral Evolutionary Design, Artificial Life Based Evolutionary Design, Aesthetic Evolutionary AL and Aesthetic Evolutionary Design. Finally, the last part of the paper discusses some common problems faced by creators of Evolutionary Design systems, including: interdependent elements in designs, epistasis, and constraint handling.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 11:01:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Bentley", "Peter J", "" ] ]
cs/9809050
Wolfgang Lezius
Wolfgang Lezius (University of Paderborn), Reinhard Rapp (University of Mainz), Manfred Wettler (University of Paderborn)
A Freely Available Morphological Analyzer, Disambiguator and Context Sensitive Lemmatizer for German
5 pages, Postscript only
Proceedings of the COLING-ACL 1998, pp. 743-748
null
null
cs.CL
null
In this paper we present Morphy, an integrated tool for German morphology, part-of-speech tagging and context-sensitive lemmatization. Its large lexicon of more than 320,000 word forms plus its ability to process German compound nouns guarantee a wide morphological coverage. Syntactic ambiguities can be resolved with a standard statistical part-of-speech tagger. By using the output of the tagger, the lemmatizer can determine the correct root even for ambiguous word forms. The complete package is freely available and can be downloaded from the World Wide Web.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 12:59:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Lezius", "Wolfgang", "", "University of Paderborn" ], [ "Rapp", "Reinhard", "", "University\n of Mainz" ], [ "Wettler", "Manfred", "", "University of Paderborn" ] ]
cs/9809051
Saturnino Luz
Niels Ole Bernsen and Laila Dybkjaer, eds. (The Natural Interactive Systems Group, Odense University, Denmark)
Spoken Language Dialogue Systems and Components: Best practice in development and evaluation (DISC 24823) - Periodic Progress Report 1: Basic Details of the Action
27 pages
null
null
DISC-D5.1
cs.CL cs.SE
null
The DISC project aims to (a) build an in-depth understanding of the state-of-the-art in spoken language dialogue systems (SLDSs) and components development and evaluation with the purpose of (b) developing a first best practice methodology in the field. The methodology will be accompanied by (c) a series of development and evaluation support tools. To the limited extent possible within the duration of the project, the draft versions of the methodology and the tools will be (d) tested by SLDS developers from industry and research, and will be (e) packaged to best suit their needs. In the first year of DISC, (a) has been accomplished, and (b) and (c) have started. A proposal to complete the work proposed above by adding 12 months to the 18 months of the present project, has been submitted to Esprit Long-Term Research in March 1998.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 14:47:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Bernsen", "Niels Ole", "", "The Natural Interactive\n Systems Group, Odense University, Denmark" ], [ "Dybkjaer", "Laila", "", "The Natural Interactive\n Systems Group, Odense University, Denmark" ], [ "eds.", "", "", "The Natural Interactive\n Systems Group, Odense University, Denmark" ] ]
cs/9809052
Chunlei Liu
Rohit Goyal, Sastri Kota, Raj Jain, Sonia Fahmy, Bobby Vandalore, Jerry Kallaus
Analysis and Simulation of Delay and Buffer Requirements of satellite-ATM Networks for TCP/IP Traffic
Submitted to IEEE Journal of Selected Areas in Communications, March 1998
null
null
null
cs.NI
null
In this paper we present a model to study the end-to-end delay performance of a satellite-ATM netowrk. We describe a satellite-ATM network architecture. The architecture presents a trade-off between the on-board switching/processing features and the complexity of the satellite communication systems. The end-to-end delay of a connection passing through a satellite constellation consists of the transmission delay, the uplink and downlink ground terminal-satellite propagation delay, the inter-satellite link delays, the on-board switching, processing and buffering delays. In a broadband satellite network, the propagation and the buffering delays have the most impact on the overall delay. We present an analysis of the propagation and buffering delay components for GEO and LEO systems. We model LEO constellations as satellites evenly spaced in circular orbits around the earth. A simple routing algorithm for LEO systems calculates locally optimal paths for the end-to-end connection. This is used to calculate the end-to-end propagation delays for LEO networks. We present a simulation model to calculate the buffering delay for TCP/IP traffic over ATM ABR and UBR service categories. We apply this model to calculate total end-to-end delays for TCP/IP over satellite-ATM networks.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 14:03:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Goyal", "Rohit", "" ], [ "Kota", "Sastri", "" ], [ "Jain", "Raj", "" ], [ "Fahmy", "Sonia", "" ], [ "Vandalore", "Bobby", "" ], [ "Kallaus", "Jerry", "" ] ]
cs/9809053
Chunlei Liu
ohit Goyal, Raj Jain, Shiv Kalyanaraman, Sonia Fahmy, Bobby Vandalore
Improving the Performance of TCP over the ATM-UBR service
null
null
null
null
cs.NI
null
In this paper we study the design issues in improving TCP performance over the ATM UBR service. ATM-UBR switches respond to congestion by dropping cells when their buffers become full. TCP connections running over UBR can experience low throughput and high unfairness. Intelligent switch drop policies and end-system policies can improve the performance of TCP over UBR with limited buffers. We describe the various design options available to the network as well as to the end systems to improve TCP performance over UBR. We study the effects of Early Packet Discard, and two per-VC accounting based buffer management policies. We also study the effects of various TCP end system congestion control policies including slow start and congestion avoidance, fast retransmit and recovery and selective acknowledgments. We present simulation results for various small and large latency configurations with varying buffer sizes and number of sources.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 14:23:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Goyal", "ohit", "" ], [ "Jain", "Raj", "" ], [ "Kalyanaraman", "Shiv", "" ], [ "Fahmy", "Sonia", "" ], [ "Vandalore", "Bobby", "" ] ]
cs/9809054
Chunlei Liu
Rohit Goyal, Raj Jain, Sonia Fahmy, Bobby Vandalore, Shivkumar Kalyanaraman
Design Issues for providing Minimum Rate Guarantees to the ATM Unspecified Bit Rate Service
Proceedings of ATM98, Fairfax, May 1998
null
null
null
cs.NI
null
Recent enhancements have been proposed to the ATM Unspecified Bit Rate (UBR) service that guarantee a minimum rate at the frame level to the UBR VCs. These enhancements have been called Guaranteed Frame Rate (GFR). In this paper, we discuss the motivation, design and implementation issues for GFR. We present the design of buffer management and policing mechanisms to implement GFR. We study the effects of policing, per-VC buffer allocation, and per-VC queuing on providing GFR to TCP/IP traffic. We conclude that per-VC scheduling is necessary to provide minimum rate guarantees to TCP traffic. We examine the role of frame tagging in the presence of scheduling and buffer management for providing minumum rate guarantees. The use of GFR to support the Internet Controlled Load Service is also discussed.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 14:28:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Goyal", "Rohit", "" ], [ "Jain", "Raj", "" ], [ "Fahmy", "Sonia", "" ], [ "Vandalore", "Bobby", "" ], [ "Kalyanaraman", "Shivkumar", "" ] ]
cs/9809055
Chunlei Liu
Rohit Goyal, Raj Jain, Sonia Fahmy, Bobby Vandalore
Providing Rate Guarantees to TCP over the ATM GFR Service
Submitted to LCN'98
null
null
null
cs.NI
null
The ATM Guaranteed Frame Rate (GFR) service is intended for best effort traffic that can benefit from minimum throughput guarantees. Edge devices connecting LANs to an ATM network can use GFR to transport multiple TCP/IP connections over a single GFR VC.These devices would typically multiplex VCs into a single FIFO queue. It has been shown that in general, FIFO queuing is not sufficient to provide rate guarantees, and per-VC queuing with scheduling is needed. We show that under conditions of low buffer allocation, it is possible to control TCP rates with FIFO queuing and buffer management. We present analysis and simulation results on controlling TCP rates by buffer management. We present a buffer management policy that provides loose rate guarantees to SACK TCP sources when the total buffer allocation is low. We study the performance of this buffer management scheme by simulation.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 14:49:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Goyal", "Rohit", "" ], [ "Jain", "Raj", "" ], [ "Fahmy", "Sonia", "" ], [ "Vandalore", "Bobby", "" ] ]
cs/9809056
Chunlei Liu
G. Babic, B. Vandalore, and R. Jain
Analysis and Modeling of Traffic in Modern Data Communication Networks
Ohio State University Technical Report, Feburary 1998
null
null
OSU-CISRC-1/98-TR02
cs.NI
null
In performance analysis and design of communication netword modeling data traffic is important. With introduction of new applications, the characteristics of the data traffic changes. We present a brief review the different models of data traffic and how they have evolved. We present results of data traffic analysis and simulated traffic, which demonstrates that the packet train model fits the traffic at source destination level and long-memory (self-similar) model fits the traffic at the aggregate level.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 15:01:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Babic", "G.", "" ], [ "Vandalore", "B.", "" ], [ "Jain", "R.", "" ] ]
cs/9809058
Chunlei Liu
Raj Jain, Shiv Kalyanaraman and Ram Viswanathan
The OSU Scheme for Congestion Avoidance in ATM Networks: Lessons Learnt and Extensions
null
null
null
null
cs.NI
null
The OSU scheme is a rate-based congestion avoidance scheme for ATM networks using explicit rate indication. This work was one of the first attempts to define explicit rate switch mechanisms and the Resource Management (RM) cell format in Asynchronous Transfer Mode (ATM) networks. The key features of the scheme include explicit rate feedback, congestion avoidance, fair operation while maintaining high utilization, use of input rate as a congestion metric, O(1) complexity. This paper presents an overview of the scheme, presents those features of the scheme that have now become common features of other switch algorithms and discusses three extensions of the scheme.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 15:09:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "Raj", "" ], [ "Kalyanaraman", "Shiv", "" ], [ "Viswanathan", "Ram", "" ] ]
cs/9809059
Chunlei Liu
Shivkumar Kalyanaraman, Raj Jain, Sonia Fahmy, Rohit Goyal, and Bobby Vandalore
The ERICA Switch Algorithm for ABR Traffic Management in ATM Networks
null
null
null
null
cs.NI
null
We propose an explicit rate indication scheme for congestion avoidance in ATM networks. In this scheme, the network switches monitor their load on each link, determining a load factor, the available capacity, and the number of currently active virtual channels. This information is used to advise the sources about the rates at which they should transmit. The algorithm is designed to achieve efficiency, fairness, controlled queueing delays, and fast transient response. The algorithm is also robust to measurement errors caused due to variation in ABR demand and capacity. We present performance analysis of the scheme using both analytical arguments and simulation results. The scheme is being implemented by several ATM switch manufacturers.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 15:18:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalyanaraman", "Shivkumar", "" ], [ "Jain", "Raj", "" ], [ "Fahmy", "Sonia", "" ], [ "Goyal", "Rohit", "" ], [ "Vandalore", "Bobby", "" ] ]
cs/9809060
Tao Jiang
Harry Buhrman (CWI), Tao Jiang (McMaster U.), Ming Li (U of Waterloo), Paul Vitanyi (CWI and U of Amsterdam)
New Applications of the Incompressibility Method: Part II
13 pages. Submitted to TCS
null
null
null
cs.CC cs.DM
null
The incompressibility method is an elementary yet powerful proof technique. It has been used successfully in many areas. To further demonstrate its power and elegance we exhibit new simple proofs using the incompressibility method.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 15:41:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Buhrman", "Harry", "", "CWI" ], [ "Jiang", "Tao", "", "McMaster U." ], [ "Li", "Ming", "", "U of Waterloo" ], [ "Vitanyi", "Paul", "", "CWI and U of Amsterdam" ] ]
cs/9809061
Tao Jiang
Tao Jiang (McMaster U.), Ming Li (U of Waterloo), Paul Vitanyi (CWI and U of Amsterdam)
New Applications of the Incompressibility Method: Part I
15 pages. To appear in The Computer Journal
null
null
null
cs.CC cs.DM
null
The incompressibility method is an elementary yet powerful proof technique. It has been used successfully in many areas. To further demonstrate its power and elegance we exhibit new simple proofs using the incompressibility method.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 15:43:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Jiang", "Tao", "", "McMaster U." ], [ "Li", "Ming", "", "U of Waterloo" ], [ "Vitanyi", "Paul", "", "CWI\n and U of Amsterdam" ] ]
cs/9809062
Chunlei Liu
Sastri Kota, Rohit Goyal, Raj Jain
Satellite ATM Network Architectural Considerations and TCP/IP Performance
Proceedings of the 3rd Ka Band Utilization Converence, Italy, 1997, pp481-488
null
null
null
cs.NI
null
In this paper, we have provided a summary of the design options in Satellite-ATM technology. A satellite ATM network consists of a space segment of satellites connected by inter-satellite crosslinks, and a ground segment of the various ATM networks. A satellite-ATM interface module connects the satellite network to the ATM networks and performs various call and control functions. A network control center performs various network management and resource allocation functions. Several issues such as the ATM service model, media access protocols, and traffic management issues must be considered when designing a satellite ATM network to effectively transport Internet traffic. We have presented the buffer requirements for TCP/IP traffic over ATM-UBR for satellite latencies. Our results are based on TCP with selective acknowledgments and a per-VC buffer management policy at the switches. A buffer size of about 0.5 * RTT to 1 * RTT is sufficient to provide over 98% throughput to infinite TCP traffic for long latency networks and a large number of sources. This buffer requirement is independent of the number of sources. The fairness is high for a large numbers of sources because of the per-VC buffer management performed at the switches and the nature of TCP traffic.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 15:54:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Kota", "Sastri", "" ], [ "Goyal", "Rohit", "" ], [ "Jain", "Raj", "" ] ]
cs/9809064
Madhav Marathe
Madhav V. Marathe, Harry B. Hunt III, Richard E. Stearns, Venkatesh Radhakrishnan
Approximation Algorithms for PSPACE-Hard Hierarchically and Periodically Specified Problems
5 Figures, 24 pages
SIAM J. Computing, Vol. 27, No 5, Oct. 1998, pp. 1237--1261
null
null
cs.CC cs.DS
null
We study the efficient approximability of basic graph and logic problems in the literature when instances are specified hierarchically as in \cite{Le89} or are specified by 1-dimensional finite narrow periodic specifications as in \cite{Wa93}. We show that, for most of the problems $\Pi$ considered when specified using {\bf k-level-restricted} hierarchical specifications or $k$-narrow periodic specifications the following holds: \item Let $\rho$ be any performance guarantee of a polynomial time approximation algorithm for $\Pi$, when instances are specified using standard specifications. Then $\forall \epsilon > 0$, $ \Pi$ has a polynomial time approximation algorithm with performance guarantee $(1 + \epsilon) \rho$. \item $\Pi$ has a polynomial time approximation scheme when restricted to planar instances. \end{romannum} These are the first polynomial time approximation schemes for PSPACE-hard hierarchically or periodically specified problems. Since several of the problems considered are PSPACE-hard, our results provide the first examples of natural PSPACE-hard optimization problems that have polynomial time approximation schemes. This answers an open question in Condon et. al. \cite{CF+93}.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 15:58:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Marathe", "Madhav V.", "" ], [ "Hunt", "Harry B.", "III" ], [ "Stearns", "Richard E.", "" ], [ "Radhakrishnan", "Venkatesh", "" ] ]
cs/9809066
Chunlei Liu
Rohit Goyal, Raj Jain, Shivkumar Kalyanaraman, Sonia Fahmy, Bobby Vandalore, Sastri Kota
TCP Selective Acknowledgments and UBR Drop Policies to Improve ATM-UBR Performance over Terrestrial and Satellite Networks
Proc. ICCCN97, Las Vegas, September 1997 pp17-27
null
null
null
cs.NI
null
We study the performance of Selective Acknowledgments with TCP over the ATM-UBR service category. We examine various UBR drop policies, TCP mechanisms and network configurations to recommend optimal parameters for TCP over UBR. We discuss various TCP congestion control mechanisms compare their performance for LAN and WAN networks. We describe the effect of satellite delays on TCP performance over UBR and present simulation results for LAN, WAN and satellite networks. SACK TCP improves the performance of TCP over UBR, especially for large delay networks. Intelligent drop policies at the switches are an important factor for good performance in local area networks.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 02:53:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Goyal", "Rohit", "" ], [ "Jain", "Raj", "" ], [ "Kalyanaraman", "Shivkumar", "" ], [ "Fahmy", "Sonia", "" ], [ "Vandalore", "Bobby", "" ], [ "Kota", "Sastri", "" ] ]
cs/9809067
Chunlei Liu
Sonia Fahmy, Raj Jain, Shivkumar Kalyanaraman, Rohit Goyal, Bobby Vandalore and Xiangrong Cai
A Survey of Protocols and Open Issues in ATM Multipoint Communication
OSU Technical Report, August 21, 1997
null
null
null
cs.NI
null
Asynchronous transfer mode (ATM) networks must define multicast capabilities in order to efficiently support numerous applications, such as video conferencing and distributed applications, in addition to LAN emulation (LANE) and Internet protocol (IP) multicasting. Several problems and issues arise in ATM multicasting, such as signaling, routing, connection admission control, and traffic management problems. IP integrated services over ATM poses further challenges to ATM multicasting. Scalability and simplicity are the two main concerns for ATM multicasting. This paper provides a survey of the current work on multicasting problems in general, and ATM multicasting in particular. A number of proposed schemes is examined, such as the schemes MARS, MCS, SEAM, SMART, RSVP, and various multipoint traffic management and transport-layer schemes. The paper also indicates a number of key open issues that remain unresolved.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 02:56:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Fahmy", "Sonia", "" ], [ "Jain", "Raj", "" ], [ "Kalyanaraman", "Shivkumar", "" ], [ "Goyal", "Rohit", "" ], [ "Vandalore", "Bobby", "" ], [ "Cai", "Xiangrong", "" ] ]
cs/9809068
Chunlei Liu
Raj Jain and Gojko Babic
Performance Testing Effort at the ATM Forum: An Overview
IEEE Communication Magazine, Special issue on ATM performance, Version: April 10, 1997, pp110-116
null
null
null
cs.NI
null
The testing group at ATM Forum is working on developing a specification for performance testing of ATM switches and networks. The emphasis is on the user perceived frame-level performance. This paper explains what is different about this new effort and gives its status.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:00:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "Raj", "" ], [ "Babic", "Gojko", "" ] ]
cs/9809069
Chunlei Liu
Shiv Kalyanaraman, Raj Jain, Jianping Jiang, Rohit Goyal, Sonia Fahmy and Pradeep Samudra
Design Considerations for the Virtual Source/Virtual Destination (VS/VD) Feature in the ABR Service of ATM Networks
25 pages
null
null
null
cs.NI
null
The Available Bit Rate (ABR) service in ATM networks has been specified to allow fair and efficient support of data applications over ATM utilizing capacity left over after servicing higher priority classes. One of the architectural features in the ABR specification [tm4] is the Virtual Source/Virtual Destination (VS/VD) option. This option allows a switch to divide an end-to-end ABR connection into separately controlled ABR segments by acting like a destination on one segment, and like a source on the other. The coupling in the VS/VD switch between the two ABR control segments is implementation specific. In this paper, we model a VS/VD ATM switch and study the issues in designing coupling between ABR segments. We identify a number of implementation options for the coupling. A good choice significantly improves the stability and transient performance of the system and reduces the buffer requirements at the switches.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:06:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalyanaraman", "Shiv", "" ], [ "Jain", "Raj", "" ], [ "Jiang", "Jianping", "" ], [ "Goyal", "Rohit", "" ], [ "Fahmy", "Sonia", "" ], [ "Samudra", "Pradeep", "" ] ]
cs/9809070
Chunlei Liu
Shivkumar Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy, and Seong-Cheol Kim
Use-it or Lose-it Policies for the Available Bit Rate (ABR) Service in ATM Networks
25 pages
null
null
null
cs.NI
null
The Available Bit Rate (ABR) service has been developed to support 21st century data applications over Asynchronous Transfer Mode (ATM). The ABR service uses a closed-loop rate-based traffic management framework where the network divides left-over bandwidth among contending sources. The ATM Forum traffic management group also incorporated open-loop control capabilities to make the ABR service robust to temporary network failures and source inactivity. An important problem addressed was whether rate allocations of sources should be taken away if sources do not use them. The proposed solutions, popularly known as the Use-It-or-Lose-It (UILI) policies, have had significant impact on the ABR service capabilities. In this paper we discuss the design, development, and the final shape of these policies and their impact on the ABR service. We compare the various alternatives through a performance evaluation.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:09:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalyanaraman", "Shivkumar", "" ], [ "Jain", "Raj", "" ], [ "Goyal", "Rohit", "" ], [ "Fahmy", "Sonia", "" ], [ "Kim", "Seong-Cheol", "" ] ]
cs/9809071
Chunlei Liu
Rohit Goyal, Raj Jain, Shiv Kalyanaraman, Sonia Fahmy and Seong-Cheol Kim
UBR+: Improving Performance of TCP over ATM-UBR service
ICC'97, Montreal, June 1997, pp1042-1048
null
null
null
cs.NI
null
ATM-UBR switches respond to congestion by dropping cells when their buffers become full. TCP connections running over UBR experience low throughput and high unfairness. For 100% TCP throughput each switch needs buffers equal to the sum of the window sizes of all the TCP connections. Intelligent drop policies can improve the performance of TCP over UBR with limited buffers. The UBR+ service proposes enhancements to UBR for intelligent drop. Early Packet Discard improves throughput but does not attempt to improve fairness. Selective packet drop based on per-connection buffer occupancy improves fairness. The Fair Buffer Allocation scheme further improves both throughput and fairness.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:12:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Goyal", "Rohit", "" ], [ "Jain", "Raj", "" ], [ "Kalyanaraman", "Shiv", "" ], [ "Fahmy", "Sonia", "" ], [ "Kim", "Seong-Cheol", "" ] ]
cs/9809072
Chunlei Liu
Shiv Kalyanaraman, Raj Jain, Sonia Fahmy, Rohit Goyal, Jianping Jiang and Seong-Cheol Kim
Performance of TCP over ABR on ATM backbone and with various VBR traffic patterns
ICC'97, Montreal, June 1997
null
null
null
cs.NI
null
We extend our earlier studies of buffer requirements of TCP over ABR in two directions. First, we study the performance of TCP over ABR in an ATM backbone. On the backbone, the TCP queues are at the edge router and not inside the ATM network. The router requires buffer equal to the sum of the receiver window sizes of the participating TCP connections. Second, we introduce various patterns of VBR background traffic. The VBR background introduces variance in the ABR capacity and the TCP traffic introduces variance in the ABR demand. Some simple switch schemes are unable to keep up with the combined effect of highly varying demands and highly varying ABR capacity. We present our experiences with refining the ERICA+ switch scheme to handle these conditions.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:15:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalyanaraman", "Shiv", "" ], [ "Jain", "Raj", "" ], [ "Fahmy", "Sonia", "" ], [ "Goyal", "Rohit", "" ], [ "Jiang", "Jianping", "" ], [ "Kim", "Seong-Cheol", "" ] ]
cs/9809074
Chunlei Liu
Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy and Seong-Cheol Kim
Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks
IEEE Communication Society Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks, Mclean, VA, October 20, 1996
null
null
null
cs.NI
null
We study the buffering requirements for zero cell loss for TCP/IP over satellite links using the available bit rate (ABR) and unspecified bit rate (UBR) services of asynchronous transfer mode (ATM) networks. For the ABR service, we explore the effect of feedback delay (a factor which depends upon the position of the bottleneck), the switch scheme used, and background variable bit rate (VBR) traffic. It is shown that the buffer requirement for TCP over ABR is independent of the number of TCP sources, but depends on the aforementioned factors. For the UBR service, we show that the buffer requirement is the sum of the TCP receiver window sizes. We substantiate our arguments with simulation results.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:20:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalyanaraman", "Shiv", "" ], [ "Jain", "Raj", "" ], [ "Goyal", "Rohit", "" ], [ "Fahmy", "Sonia", "" ], [ "Kim", "Seong-Cheol", "" ] ]
cs/9809075
Chunlei Liu
Sonia Fahmy, Raj Jain, Shivkumar Kalyanaraman, Rohit Goyal, and Fang Lu
On Source Rules for ABR Service on ATM Networks with Satellite Links
Proceedings of the First International Workshop on Satellite-based Information Services, Rye, New York, November 1996, pp108-115
null
null
null
cs.NI
null
During the design of ABR traffic management at the ATM Forum, we performed several analyses to ensure that the ABR service will operate efficiently over satellite links. In the cases where the performance was unacceptable, we suggested modifications to the traffic management specifications. This paper describes one such issue related to the count of missing resource management cells (Crm) parameter of the ABR source behavior. The analysis presented here led to the changes which are now part of the ATM traffic management (TM 4.0) specification. In particular, the size of the transient buffer exposure (TBE) parameter was set to 24 bits, and no size was enforced for the Crm parameter. This simple change improved the throughput over OC-3 satellite links from 45 Mbps to 140 Mbps.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:22:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Fahmy", "Sonia", "" ], [ "Jain", "Raj", "" ], [ "Kalyanaraman", "Shivkumar", "" ], [ "Goyal", "Rohit", "" ], [ "Lu", "Fang", "" ] ]
cs/9809076
Chunlei Liu
Sonia Fahmy, Raj Jain, Fang Lu, and Shivkumar Kalyanaraman
A Survey of Congestion Control Techniques and Data Link Protocols in Satellite Networks
null
null
null
null
cs.NI
null
Satellite communication systems are the means of realizing a global broadband integrated services digital network. Due to the statistical nature of the integrated services traffic, the resulting rate fluctuations and burstiness render congestion control a complicated, yet indispensable function. The long propagation delay of the earth-satellite link further imposes severe demands and constraints on the congestion control schemes, as well as the media access control techniques and retransmission protocols that can be employed in a satellite network. The problems in designing satellite network protocols, as well as some of the solutions proposed to tackle these problems, will be the primary focus of this survey.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:25:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Fahmy", "Sonia", "" ], [ "Jain", "Raj", "" ], [ "Lu", "Fang", "" ], [ "Kalyanaraman", "Shivkumar", "" ] ]
cs/9809078
Chunlei Liu
Shiv Kalyanaraman, Raj Jain, Sonia Fahmy, and Rohit Goyal
Buffer Requirements For TCP/IP Over ABR
Proc. IEEE ATM'96 Workshop, San Fransisco, August 23-24, 1996
null
null
null
cs.NI
null
We study the buffering requirements for zero cell loss for TCP over ABR. We show that the maximum buffers required at the switch is proportional to the maximum round trip time (RTT) of all VCs through the link. The number of round-trips depends upon the the switch algorithm used. With our ERICA [erica-final] switch algorithm, we find that the buffering required is independent of the number of TCP sources. We substantiate our arguments with simulation results.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:30:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalyanaraman", "Shiv", "" ], [ "Jain", "Raj", "" ], [ "Fahmy", "Sonia", "" ], [ "Goyal", "Rohit", "" ] ]
cs/9809079
Chunlei Liu
G. Dommety and Raj Jain
Potential Networking Applications of Global Positioning Systems (GPS)
OSU Technical report, April 1996
null
null
TR-24, April 1996
cs.NI
null
The main goal of this study was to survey current applications of GPS to distributed systems and networks. Detailed lists of GPS products, current applications, addresses of manufacturers, and sources for further information are included in this report.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:37:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Dommety", "G.", "" ], [ "Jain", "Raj", "" ] ]
cs/9809080
Chunlei Liu
Raj Jain, Shiv Kalyanaraman, Ram Viswanathan
The OSU Scheme for Congestion Avoidance in ATM networks Using Explicit Rate Indication
Proceedings WATM'95 First Workshop on ATM Traffic Management, Paris, December 1995 (proceedings also to appear in book form)
null
null
null
cs.NI
null
An explicit rate indication scheme for congestion avoidance in computer and telecommunication networks is proposed. The sources monitor their load and provide the information periodically to the switches. The switches, in turn, compute the load level and ask the sources to adjust their rates up or down. The scheme achieves high link utilization, fair allocation of rates among contending sources and provides quick convergence. A backward congestion notification option is also provided. The conditions under which this option is useful are indicated.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 03:44:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "Raj", "" ], [ "Kalyanaraman", "Shiv", "" ], [ "Viswanathan", "Ram", "" ] ]
cs/9809082
Chunlei Liu
A. Charny, D. Clark, R. Jain
Congestion Control with Explicit Rate Indication
Proc. ICC'95, June 1995, pp1954-1963
null
null
null
cs.NI
null
As the speed and the dynamic range of computer networks evolve, the issue of efficient traffic management becomes increasingly important. This work describes an approach to traffic management using explicit rate information provided to the source by the network. We present an asynchronous distributed algorithm for optimal rate calculation across the network, where optimality is understood in the maxmin sense. The algorithm quickly converges to the optimal rates and is shown to be well-behaved in transience.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 04:33:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Charny", "A.", "" ], [ "Clark", "D.", "" ], [ "Jain", "R.", "" ] ]
cs/9809083
Chunlei Liu
K. Siu and R. Jain
A Brief Overview of ATM: Protocol Layers, LAN Emulation, and Traffic Management
23 pages
Computer Communications Review (ACM SIGCOMM), vol 25, no 2, April 1995, pp6-28
null
null
cs.NI
null
Asynchronous Transfer Mode (ATM) has emerged as the most promising technology in supporting future broadband multimedia communication services. To accelerate the deployment of ATM technology, the ATM Forum, which is a consortium of service providers and equipment vendors in the communication industries has been created to develop implementation and specification agreements. In this article, we present a brief overview on ATM protocol layers and current progress on LAN Emulation and Traffic Management in the ATM Forum.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 04:36:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Siu", "K.", "" ], [ "Jain", "R.", "" ] ]
cs/9809084
Chunlei Liu
R. Jain
ATM Networks: Issues and Challenges Ahead
InterOp+Networld Engineering Conference, March 1995, Las Vegas, NV
null
null
null
cs.NI
null
The paper begins with a discussion of current trends in networking and a historical reviews of past networking technologies some of which failed. This leads us to the discussion about what it takes for a new technology to succeed and what challenges we face in making the current dream of a seamless world-wide high-speed ATM network a reality. Issues in using ATM cells for very high speed applications are presented. Ensuring that the users benefit from ATM networks involves several other related disciplines. These are reviewed.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 04:39:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ] ]
cs/9809085
Chunlei Liu
R. Jain
Congestion Control and Traffic Management in ATM Networks: Recent Advances and A Survey
Invited submission to Computer Networks and ISDN Systems
Computer Networks and ISDN Systems, vol 28, no 13, February 1995, pp1723-1738
null
null
cs.NI
null
Congestion control mechanisms for ATM networks as selected by the ATM Forum traffic management group are described. Reasons behind these selections are explained. In particular, selection criteria for selection between rate-based and credit-based approach and the key points of the debate between the two approaches are presented. The approach that was finally selected and several other schemes that were considered are described.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 04:41:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ] ]
cs/9809086
Chunlei Liu
R. Jain
FDDI: Current Issues and Future Trends
null
IEEE Communications Magazine, September 1993, pp. 98-105
null
null
cs.NI
null
Key issues in upcoming FDDI standards including low-cost fiber, twisted-pair, SONET mapping, and FDDI follow-on LAN are discussed after a brief introduction to FDDI and FDDI-II
[ { "version": "v1", "created": "Thu, 24 Sep 1998 04:44:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ] ]
cs/9809088
Chunlei Liu
R. Jain
Myths about Congestion Management in High Speed Networks
null
Internetworking: Research and Experience, Volume 3, 1992, pp. 101-113
null
null
cs.NI
null
Weaknesses in several recently proposed ideas about congestion control and avoidance in high-speed netwroks are identified. Both sides of the debate concerning prior reservation of resources versus walk-in service, open-loop control versus feedback control, rate control versus window control, and router-based control versus source-based control are presented. The circumstances under which backpressure is useful or not are discussed, and it is argued that a single congestion scheme is not sufficient, but that a combination of several schemes is required for complete congestion management in a network.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 04:48:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ] ]
cs/9809092
Chunlei Liu
R. Jain
Characteristics of Destination Address Locality in Computer Networks: A Comparison of Caching Schemes
null
Journal of Computer Networks and ISDN, Vol. 18, 1989/90, pp. 243-254
null
null
cs.NI
null
The size of computer networks, along with their bandwidths, is growing exponentially. To support these large, high-speed networks, it is neccessary to be able to forward packets in a few microseconds. One part of the forwarding operation consists of searching through a large address databse. This problem is encountered in the design of bridges, routers, gateways and name servers. Caching can reduce the lookup time if there is a locality in the address reference pattern. Using a destination reference trace measured on an extended local are a network, we attempt to see if the destination refernces do have a significant locality. We compared the performance of MIN, LRU, FIFO, and random cache replacement algorithms. We found that the interactive (terminal) traffic in our sample had quite different locality behavior than that of the noninteractive traffic. The interactive traffic did not follow the LRU stack model while the noninteractivetraffic did. Examples are shown of the environments in which caching can help as well as those in which caching can hurt, unless the cache size is large.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 04:58:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ] ]
cs/9809093
Chunlei Liu
R. Jain
A Delay Based Approach for Congestion Avoidance in Interconnected Heterogeneous Computer Networks
null
Computer Communications Review, ACM SIGCOMM, October 1989, pp. 56-71
null
null
cs.NI
null
In heterogeneous networks, achieving congestion avoidance is difficult because the congestion feedback from one subnetwork may have no meaning to source on other other subnetworks. We propose using changes in round-trip delay as an implicit feedback. Using a black-box model of the network, we derive an expression for the optimal window as a function of the gradient of the delay-window curve. The problems of selfish optimum and social optimum are also addressed. It is shown that without a careful design, it is possible to get into a race condition during heavy congestion, where each user wants more resources than others, thereby leading to a diverging congestion It is shown that congestion avoidance using round trip delay is a promising approach. The aproach has the advantage that there is absolutely no overhead for the network itself. It is exemplified by a simple scheme. The performance of the scheme is analyzed using a simulation model. The scheme is shown to be efficient, fair, convergent and adaptive to changes in network configuration. The scheme as described works only for networks that can ne modelled with queueing servers with constant service times. Further research is required to extend it for implementation in practical networks. Several directions for future research have beensuggested.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 05:00:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ] ]
cs/9809094
Chunlei Liu
R. Jain, K. Ramakrishnan, D. Chiu
Congestion Avoidance in Computer Networks with a Connectionless Network Layer
DEC-TR-506, reprinted in C. Partridge, Ed., "Innovations in Internetworking," published by Artech House, October 1988
null
null
null
cs.NI
null
Widespread use of computer networks and the use of varied technology for the interconnection of computers has made congestion a significant problem. In this report, we summarize our research on congestion avoidance. We compare the concept of congestion avoidance with that of congestion control. Briefly, congestion control is a recovery mechanism, while congestion avoidance is a prevention mechanism. A congestion control scheme helps the network to recover from the congestion state while a congestion avoidance scheme allows a network to operate in the region of low delay and high throughput with minimal queuing, thereby preventing it from entering the congested state in which packets are lost due to buffer shortage. A number of possible alternatives for congestion avoidance were identified. From these alternatives we selected one called the binary feedback scheme in which the network uses a single bit in the network layer header to feed back the congestion information to its users, which then increase or decrease their load to make optimal use of the resources. The concept of global optimality in a distributed system is defined in terms of efficiency and fairness such that they can be independently quantified and apply to any number of resources and users. The proposed scheme has been simulated and shown to be globally efficient, fair, responsive, convergent, robust, distributed, and configuration-independent.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 05:05:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ], [ "Ramakrishnan", "K.", "" ], [ "Chiu", "D.", "" ] ]
cs/9809095
Chunlei Liu
R. Jain, K. Ramakrishnan
Congestion Avoidance in Computer Networks with a Connectionless Network Layer, Part I: Concepts, Goals and Methodology
roc. Computer Networking Symposium, Washington, D.C., April 11-13, 1988, pp. 134-143
null
null
null
cs.NI
null
Congestion is said to occur in the network when the resource demands exceed the capacity and packets are lost due to too much queuing in the network. During congestion, the network throughput may drop to zero and the path delay may become very high. A congestion control scheme helps the network to recover from the congestion state. A congestion avoidance scheme allows a network to operate in the region of low delay and high throughput. Such schemes prevent a network from entering the congested state. Congestion avoidance is a prevention mechanism while congestion control is a recovery mechanism. We compare the concept of congestion avoidance with that of flow control and congestion control. A number of possible alternative for congestion avoidance have been identified. From these a few were selected for study. The criteria for selection and goals for these schemes have been described. In particular, we wanted the scheme to be globally efficient, fair, dynamic, convergent, robust, distributed, configuration independent, etc. These goals and the test cases used to verify whether a particular scheme has met the goals have been described. We model the network and the user policies for congestion avoidance as a feedback control system. The key components of a generic congestion avoidance scheme are: congestion detection, congestion feedback, feedback selector, signal filter, decision function, and increase/decrease algorithms. These components have been explained.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 05:10:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ], [ "Ramakrishnan", "K.", "" ] ]
cs/9809097
Chunlei Liu
R. Jain
Divergence of Timeout Algorithms for Packet Retransmissions
Proceedings IEEE Phoenix Conference on Computers and Communication, March 1986, pp. 174-179
null
null
null
cs.NI
null
The problem of adaptively setting the timeout interval for retransmitting a packet has been discussed. A layered view of the algorithms has been presented. It is shown that a timeout algorithm consists of essentially five layers or procedures which can be independently chosen and modified. A number of timeout algorithms proposed in the literature have been decomposed into these five layers. One of the key layers not discussed in the literature is that of determining the sample round trip delay for packets that have been transmitted more than once. It is shown that this layer has a significant impact on the network performance. Under repeated packet loss, most timeout algorithms either diverge or converge to a wrong value. A number of alternative schemes have been presented. It is argued that divergence is preferable to false convergence. It is a feature that is helpful in reducing network traffic congestion.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 05:19:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ] ]
cs/9809098
Chunlei Liu
R. Jain
On Caching out-of-order packets in window flow controlled networks
DEC Technical Report DEC-TR-342, January 1985
null
null
DEC-TR-342
cs.NI
null
In window flow controlled networks, if a packet is lost the destination has to decide whether to save (cache) subsequent out-of-order packets. Also, the source has to decide whether to send just one packet or to send all packets following it. This leads to four different types of caching schemes. Simulations show, against our immediate intuition, that regardless of whether the destination is caching or not, the source should retransmit only one packet. This paper describes the alternatives to, and provides justification for, schemes used in Digital Network Architecture and ARPAnet TCP.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 05:23:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ] ]
cs/9809099
Chunlei Liu
R. Jain, D. Chiu, and W. Hawe
A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems
DEC Research Report TR-301, September 1984
null
null
TR-301
cs.NI
null
Fairness is an important performance criterion in all resource allocation schemes, including those in distributed computer systems. However, it is often specified only qualitatively. The quantitative measures proposed in the literature are either too specific to a particular application, or suffer from some undesirable characteristics. In this paper, we have introduced a quantitative measure called Indiex of FRairness. The index is applicable to any resource sharing or allocation problem. It is independent of the amount of the resource. The fairness index always lies between 0 and 1. This boundedness aids intuitive understanding of the fairness index. For example, a distribution algorithm with a fairness of 0.10 means that it is unfair to 90% of the users. Also, the discrimination index can be defined as 1 - fairness index.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 05:27:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ], [ "Chiu", "D.", "" ], [ "Hawe", "W.", "" ] ]
cs/9809100
Chunlei Liu
R. Jain
Data Flies Standby with ABR Service
null
Network World, June 12, 1995, page 43
null
null
cs.NI
null
Explanation of ABR service in plain language.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 05:31:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ] ]
cs/9809101
Jaihyung Cho
Jaihyung Cho, James Breen
Flood Routing Technique for Data Networks
null
ICICS`97;First International Conference on Information, Communications and Signal Processing, IEEE Singapore, vo. 3, Sep 1997. pp. 1418-1422
null
null
cs.NI
null
In this paper, a new routing algorithm based on a flooding method is introduced. Flooding techniques have been used previously, e.g. for broadcasting the routing table in the ARPAnet [1] and other special purpose networks [3][4][5]. However, sending data using flooding can often saturate the network [2] and it is usually regarded as an inefficient broadcast mechanism. Our approach is to flood a very short packet to explore an optimal route without relying on a pre-established routing table, and an efficient flood control algorithm to reduce the signalling traffic overhead. This is an inherently robust mechanism in the face of a network configuration change, achieves automatic load sharing across alternative routes and has potential to solve many contemporary routing problems. An earlier version of this mechanism was originally developed for virtual circuit establishment in the experimental Caroline ATM LAN [6][7] at Monash University.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 07:53:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Cho", "Jaihyung", "" ], [ "Breen", "James", "" ] ]
cs/9809105
Thomas Lippert
Thomas Lippert, Nikolay Petkov, Paolo Palazzari, and Klaus Schilling
Hyper-Systolic Matrix Multiplication
29 pages, 13 figures
null
null
HLRZ1998-59
cs.MS
null
A novel parallel algorithm for matrix multiplication is presented. The hyper-systolic algorithm makes use of a one-dimensional processor abstraction. The procedure can be implemented on all types of parallel systems. It can handle matrix-vector multiplications as well as transposed matrix products.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 20:56:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Lippert", "Thomas", "" ], [ "Petkov", "Nikolay", "" ], [ "Palazzari", "Paolo", "" ], [ "Schilling", "Klaus", "" ] ]
cs/9809106
Markus Walther
Petra Barg and Markus Walther (University of Duesseldorf)
Processing Unknown Words in HPSG
5 pp., 1 PostScript figure
Proceedings COLING-ACL'98, vol.I, 91-95
null
null
cs.CL
null
The lexical acquisition system presented in this paper incrementally updates linguistic properties of unknown words inferred from their surrounding context by parsing sentences with an HPSG grammar for German. We employ a gradual, information-based concept of ``unknownness'' providing a uniform treatment for the range of completely known to maximally unknown lexical entries. ``Unknown'' information is viewed as revisable information, which is either generalizable or specializable. Updating takes place after parsing, which only requires a modified lexical lookup. Revisable pieces of information are identified by grammar-specified declarations which provide access paths into the parse feature structure. The updating mechanism revises the corresponding places in the lexical feature structures iff the context actually provides new information. For revising generalizable information, type union is required. A worked-out example demonstrates the inferential capacity of our implemented system.
[ { "version": "v1", "created": "Fri, 25 Sep 1998 11:02:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Barg", "Petra", "", "University of Duesseldorf" ], [ "Walther", "Markus", "", "University of Duesseldorf" ] ]
cs/9809107
Markus Walther
Markus Walther (University of Marburg)
Computing Declarative Prosodic Morphology
10 pages
Proceedings of SIGPHON'98, pp. 11-20 (COLING-ACL'98 Post-Conference Workshop on The Computation of Phonological Constraints)
null
null
cs.CL
null
This paper describes a computational, declarative approach to prosodic morphology that uses inviolable constraints to denote small finite candidate sets which are filtered by a restrictive incremental optimization mechanism. The new approach is illustrated with an implemented fragment of Modern Hebrew verbs couched in MicroCUF, an expressive constraint logic formalism. For generation and parsing of word forms, I propose a novel off-line technique to eliminate run-time optimization. It produces a finite-state oracle that efficiently restricts the constraint interpreter's search space. As a byproduct, unknown words can be analyzed without special mechanisms. Unlike pure finite-state transducer approaches, this hybrid setup allows for more expressivity in constraints to specify e.g. token identity for reduplication or arithmetic constraints for phonetics.
[ { "version": "v1", "created": "Fri, 25 Sep 1998 14:32:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Walther", "Markus", "", "University of Marburg" ] ]
cs/9809108
Jose M. Vidal
Jose M. Vidal and Edmund H. Durfee
Learning Nested Agent Models in an Information Economy
null
Journal of Experimental and Theoretical Artificial Intelligence. 10(1998)291-308
null
null
cs.MA cs.AI
null
We present our approach to the problem of how an agent, within an economic Multi-Agent System, can determine when it should behave strategically (i.e. learn and use models of other agents), and when it should act as a simple price-taker. We provide a framework for the incremental implementation of modeling capabilities in agents, and a description of the forms of knowledge required. The agents were implemented and different populations simulated in order to learn more about their behavior and the merits of using and learning agent models. Our results show, among other lessons, how savvy buyers can avoid being ``cheated'' by sellers, how price volatility can be used to quantitatively predict the benefits of deeper models, and how specific types of agent populations influence system behavior.
[ { "version": "v1", "created": "Sat, 26 Sep 1998 17:43:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Vidal", "Jose M.", "" ], [ "Durfee", "Edmund H.", "" ] ]
cs/9809110
Fernando C. N. Pereira
Ido Dagan, Lillian Lee and Fernando C. N. Pereira
Similarity-Based Models of Word Cooccurrence Probabilities
26 pages, 5 figures
Machine Learning, 34, 43-69 (1999)
null
null
cs.CL cs.AI cs.LG
null
In many applications of natural language processing (NLP) it is necessary to determine the likelihood of a given word combination. For example, a speech recognizer may need to determine which of the two word combinations ``eat a peach'' and ``eat a beach'' is more likely. Statistical NLP methods determine the likelihood of a word combination from its frequency in a training corpus. However, the nature of language is such that many word combinations are infrequent and do not occur in any given corpus. In this work we propose a method for estimating the probability of such previously unseen word combinations using available information on ``most similar'' words. We describe probabilistic word association models based on distributional word similarity, and apply them to two tasks, language modeling and pseudo-word disambiguation. In the language modeling task, a similarity-based model is used to improve probability estimates for unseen bigrams in a back-off language model. The similarity-based method yields a 20% perplexity improvement in the prediction of unseen bigrams and statistically significant reductions in speech-recognition error. We also compare four similarity-based estimation methods against back-off and maximum-likelihood estimation methods on a pseudo-word sense disambiguation task in which we controlled for both unigram and bigram frequency to avoid giving too much weight to easy-to-disambiguate high-frequency configurations. The similarity-based methods perform up to 40% better on this particular task.
[ { "version": "v1", "created": "Sun, 27 Sep 1998 18:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Dagan", "Ido", "" ], [ "Lee", "Lillian", "" ], [ "Pereira", "Fernando C. N.", "" ] ]
cs/9809111
Lex Weaver
Lex Weaver and Terry Bossomaier
Evolution of Neural Networks to Play the Game of Dots-and-Boxes
8 pages, 5 figures, LaTeX 2.09 (works with LaTeX2e)
Alife V: Poster Presentations, May 16-18 1996, pages 43-50
null
null
cs.NE cs.LG
null
Dots-and-Boxes is a child's game which remains analytically unsolved. We implement and evolve artificial neural networks to play this game, evaluating them against simple heuristic players. Our networks do not evaluate or predict the final outcome of the game, but rather recommend moves at each stage. Superior generalisation of play by co-evolved populations is found, and a comparison made with networks trained by back-propagation using simple heuristics as an oracle.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 03:48:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Weaver", "Lex", "" ], [ "Bossomaier", "Terry", "" ] ]
cs/9809112
Lluis Padro
L. Padro & L. Marquez (Universitat Politecnica de Catalunya)
On the Evaluation and Comparison of Taggers: The Effect of Noise in Testing Corpora
Appears in proceedings of joint COLING-ACL 1998, Montreal, Canada
null
null
null
cs.CL
null
This paper addresses the issue of {\sc pos} tagger evaluation. Such evaluation is usually performed by comparing the tagger output with a reference test corpus, which is assumed to be error-free. Currently used corpora contain noise which causes the obtained performance to be a distortion of the real value. We analyze to what extent this distortion may invalidate the comparison between taggers or the measure of the improvement given by a new system. The main conclusion is that a more rigorous testing experimentation setting/designing is needed to reliably evaluate and compare tagger accuracies.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 07:49:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Padro", "L.", "", "Universitat Politecnica de Catalunya" ], [ "Marquez", "L.", "", "Universitat Politecnica de Catalunya" ] ]
cs/9809113
Lluis Padro
L. Marquez, L. Padro & H. Rodriguez (Universitat Politecnica de Catalunya)
Improving Tagging Performance by Using Voting Taggers
Appears in proceedings of NLP+IA/TAL+AI'98. Moncton, New Brunswick, Canada, 1998
null
null
null
cs.CL
null
We present a bootstrapping method to develop an annotated corpus, which is specially useful for languages with few available resources. The method is being applied to develop a corpus of Spanish of over 5Mw. The method consists on taking advantage of the collaboration of two different POS taggers. The cases in which both taggers agree present a higher accuracy and are used to retrain the taggers.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 07:50:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Marquez", "L.", "", "Universitat Politecnica de\n Catalunya" ], [ "Padro", "L.", "", "Universitat Politecnica de\n Catalunya" ], [ "Rodriguez", "H.", "", "Universitat Politecnica de\n Catalunya" ] ]
cs/9809114
Heribert Vollmer
Clemens Lautemann and Pierre McKenzie and Thomas Schwentick and Heribert Vollmer
The descriptive complexity approach to LOGCFL
10 pages, 1 figure
null
null
null
cs.CC
null
Building upon the known generalized-quantifier-based first-order characterization of LOGCFL, we lay the groundwork for a deeper investigation. Specifically, we examine subclasses of LOGCFL arising from varying the arity and nesting of groupoidal quantifiers. Our work extends the elaborate theory relating monoidal quantifiers to NC1 and its subclasses. In the absence of the BIT predicate, we resolve the main issues: we show in particular that no single outermost unary groupoidal quantifier with FO can capture all the context-free languages, and we obtain the surprising result that a variant of Greibach's ``hardest context-free language'' is LOGCFL-complete under quantifier-free BIT-free projections. We then prove that FO with unary groupoidal quantifiers is strictly more expressive with the BIT predicate than without. Considering a particular groupoidal quantifier, we prove that first-order logic with majority of pairs is strictly more expressive than first-order with majority of individuals. As a technical tool of independent interest, we define the notion of an aperiodic nondeterministic finite automaton and prove that FO translations are precisely the mappings computed by single-valued aperiodic nondeterministic finite transducers.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 07:57:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Lautemann", "Clemens", "" ], [ "McKenzie", "Pierre", "" ], [ "Schwentick", "Thomas", "" ], [ "Vollmer", "Heribert", "" ] ]
cs/9809115
Heribert Vollmer
Heribert Vollmer
A Generalized Quantifier Concept in Computational Complexity Theory
null
null
null
null
cs.CC
null
A notion of generalized quantifier in computational complexity theory is explored and used to give a unified treatment of leaf language definability, oracle separations, type 2 operators, and circuits with monoidal gates. Relations to Lindstroem quantifiers are pointed out.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 08:20:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Vollmer", "Heribert", "" ] ]
cs/9809116
Heribert Vollmer
Steffen Reith and Heribert Vollmer
The Complexity of Computing Optimal Assignments of Generalized Propositional Formulae
17 pages, 1 figure
null
null
null
cs.CC
null
We consider the problems of finding the lexicographically minimal (or maximal) satisfying assignment of propositional formulae for different restricted formula classes. It turns out that for each class from our framework, the above problem is either polynomial time solvable or complete for OptP. We also consider the problem of deciding if in the optimal assignment the largest variable gets value 1. We show that this problem is either in P or P^NP complete.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 08:38:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Reith", "Steffen", "" ], [ "Vollmer", "Heribert", "" ] ]
cs/9809117
Osamu Watanabe
Satoshi Horie and Osamu Watanabe
Hard instance generation for SAT
null
In the Proc. of ISAAC'97, Lecture Notes in CS, Vol.1350, 22-31, 1997
null
TR98-0007
cs.CC
null
We propose an algorithm of generating hard instances for the Satisfying Assignment Search Problem (in short, SAT). The algorithm transforms instances of the integer factorization problem into SAT instances efficiently by using the Chinese Remainder Theorem. For example, it is possible to construct SAT instances with about 5,600 variables that is as hard as factorizing 100 bit integers.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 10:50:03 GMT" }, { "version": "v2", "created": "Tue, 29 Sep 1998 00:58:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Horie", "Satoshi", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/9809119
Denis V. Juriev
Denis V. Juriev
Droems: experimental mathematics, informatics and infinite dimensional geometry
bilingual version [English translation+Russian original]: 43 pages, AMSTEX
null
null
RCMPI/96-05+
cs.HC cs.GR math.RT
null
The article is devoted to a problem of elaboration of the real-time interactive videosystems for accelerated nonverbal cognitive computer and telecommunications. The proposed approach is based on the using of droems (dynamically reconstructed objects of experimental mathematics) and interpretational figures as pointers to them. Four paragraphs of the article are devoted to (1) an exposition of basic notions of the interpretational geometry, (2) the operator methods in the theory of interactive dynamical videosystems, (3) the general concept of organization of the integrated interactive real-time videocognitive systems, (4) the droems and processes of their dynamical reconstruction, where the general notions are illustrated by a concrete example related to the infinite dimensional geometry. The exposition is presumably heuristic and conceptual (the first and the third paragraphs) though some particular aspects such as content of the second and the fourth paragraphs, which allow deeper formalization and detailing in present, are exposed on the mathematical level of rigor.
[ { "version": "v1", "created": "Tue, 29 Sep 1998 07:06:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Juriev", "Denis V.", "" ] ]
cs/9809120
Marino Miculan
Marino Miculan
A Natural Deduction style proof system for propositional $\mu$-calculus and its formalization in inductive type theories
17 pages; longer version of the paper which will appear in Proc. ICTCS'98 (World Scientific)
null
null
null
cs.LO
null
In this paper, we present a formalization of Kozen's propositional modal $\mu$-calculus, in the Calculus of Inductive Constructions. We address several problematic issues, such as the use of higher-order abstract syntax in inductive sets in presence of recursive constructors, the encoding of modal (``proof'') rules and of context sensitive grammars. The encoding can be used in the \Coq system, providing an experimental computer-aided proof environment for the interactive development of error-free proofs in the $\mu$-calculus. The techniques we adopted can be readily ported to other languages and proof systems featuring similar problematic issues.
[ { "version": "v1", "created": "Tue, 29 Sep 1998 11:57:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Miculan", "Marino", "" ] ]
cs/9809121
Neil C. Rowe
Neil C. Rowe
Using Local Optimality Criteria for Efficient Information Retrieval with Redundant Information Filters
null
ACM Transactions on Information Systems, 14, 2 (April 1996), 138-174
null
null
cs.IR cs.AI
null
We consider information retrieval when the data, for instance multimedia, is coputationally expensive to fetch. Our approach uses "information filters" to considerably narrow the universe of possiblities before retrieval. We are especially interested in redundant information filters that save time over more general but more costly filters. Efficient retrieval requires that decision must be made about the necessity, order, and concurrent processing of proposed filters (an "execution plan"). We develop simple polynomial-time local criteria for optimal execution plans, and show that most forms of concurrency are suboptimal with information filters. Although the general problem of finding an optimal execution plan is likely exponential in the number of filters, we show experimentally that our local optimality criteria, used in a polynomial-time algorithm, nearly always find the global optimum with 15 filters or less, a sufficient number of filters for most applications. Our methods do not require special hardware and avoid the high processor idleness that is characteristic of massive parallelism solutions to this problem. We apply our ideas to an important application, information retrieval of cpationed data using natural-language understanding, a problem for which the natural-language processing can be the bottleneck if not implemented well.
[ { "version": "v1", "created": "Tue, 29 Sep 1998 21:55:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Rowe", "Neil C.", "" ] ]
cs/9809122
Osamu Watanabe
Carlos Domingo, Ricard Gavalda, and Osamu Watanabe
Practical algorithms for on-line sampling
To appear in the Proc. of Discovery Science '98, Dec. 1998
null
null
C-123
cs.LG cs.DS
null
One of the core applications of machine learning to knowledge discovery consists on building a function (a hypothesis) from a given amount of data (for instance a decision tree or a neural network) such that we can use it afterwards to predict new instances of the data. In this paper, we focus on a particular situation where we assume that the hypothesis we want to use for prediction is very simple, and thus, the hypotheses class is of feasible size. We study the problem of how to determine which of the hypotheses in the class is almost the best one. We present two on-line sampling algorithms for selecting hypotheses, give theoretical bounds on the number of necessary examples, and analize them exprimentally. We compare them with the simple batch sampling approach commonly used and show that in most of the situations our algorithms use much fewer number of examples.
[ { "version": "v1", "created": "Wed, 30 Sep 1998 03:44:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Domingo", "Carlos", "" ], [ "Gavalda", "Ricard", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/9809123
Osamu Watanabe
Carlos Domingo, Osamu Watanabe, and Tadashi Yamazaki
A role of constraint in self-organization
To appear in the Proc. RANDOM'98, Oct. 1998
null
null
C-124
cs.NE cs.CG
null
In this paper we introduce a neural network model of self-organization. This model uses a variation of Hebb rule for updating its synaptic weights, and surely converges to the equilibrium status. The key point of the convergence is the update rule that constrains the total synaptic weight and this seems to make the model stable. We investigate the role of the constraint and show that it is the constraint that makes the model stable. For analyzing this setting, we propose a simple probabilistic game that models the neural network and the self-organization process. Then, we investigate the characteristics of this game, namely, the probability that the game becomes stable and the number of the steps it takes.
[ { "version": "v1", "created": "Wed, 30 Sep 1998 04:06:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Domingo", "Carlos", "" ], [ "Watanabe", "Osamu", "" ], [ "Yamazaki", "Tadashi", "" ] ]
cs/9809124
James A. Hoagland
James A. Hoagland, Raju Pandey, Karl N. Levitt
Security Policy Specification Using a Graphical Approach
28 pages, 22 figures, in color (but color is not essential for viewing); UC Davis CS department technical report (July 22, 1998)
null
null
CSE-98-3
cs.CR
null
A security policy states the acceptable actions of an information system, as the actions bear on security. There is a pressing need for organizations to declare their security policies, even informal statements would be better than the current practice. But, formal policy statements are preferable to support (1) reasoning about policies, e.g., for consistency and completeness, (2) automated enforcement of the policy, e.g., using wrappers around legacy systems or after the fact with an intrusion detection system, and (3) other formal manipulation of policies, e.g., the composition of policies. We present LaSCO, the Language for Security Constraints on Objects, in which a policy consists of two parts: the domain (assumptions about the system) and the requirement (what is allowed assuming the domain is satisfied). Thus policies defined in LaSCO have the appearance of conditional access control statements. LaSCO policies are specified as expressions in logic and as directed graphs, giving a visual view of policy. LaSCO has a simple semantics in first order logic (which we provide), thus permitting policies we write, even for complex policies, to be very perspicuous. LaSCO has syntax to express many of the situations we have found to be useful on policies or, more interesting, the composition of policies. LaSCO has an object-oriented structure, permitting it to be useful to describe policies on the objects and methods of an application written in an object-oriented language, in addition to the traditional policies on operating system objects. A LaSCO specification can be automatically translated into executable code that checks an invocation of a program with respect to a policy. The implementation of LaSCO is in Java, and generates wrappers to check Java programs with respect to a policy.
[ { "version": "v1", "created": "Wed, 30 Sep 1998 17:00:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoagland", "James A.", "" ], [ "Pandey", "Raju", "" ], [ "Levitt", "Karl N.", "" ] ]
cs/9809125
Michael Manthey
Michael Manthey
Distributed Computation, the Twisted Isomorphism, and Auto-Poiesis
26 pages, 4 figures. Originally submitted to the neuro-sys archive which was never publicly announced (was 9809001)
CASYS'97 First International Conference on Computing Anticipatory Systems, Liege (Belgium), August 11-15, 1997. D. Dubois, Ed (Dept.of Mathematics, University of Liege)
null
null
cs.DC
null
This paper presents a synchronization-based, multi-process computational model of anticipatory systems called the Phase Web. It describes a self-organizing paradigm that explicitly recognizes and exploits the existence of a boundary between inside and outside, accepts and exploits intentionality, and uses explicit self-reference to describe eg. auto-poiesis. The model explicitly connects computation to a discrete Clifford algebraic formalization that is in turn extended into homology and co-homology, wherein the recursive nature of objects and boundaries becomes apparent and itself subject to hierarchical recursion. Topsy, a computer program embodying the Phase Web, is available at www.cs.auc.dk/topsy.
[ { "version": "v1", "created": "Mon, 14 Sep 1998 14:42:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Manthey", "Michael", "" ] ]
cs/9810001
Lunjin Lu
Lunjin Lu and John G. Cleary
On Dart-Zobel Algorithm for Testing Regular Type Inclusion
16 pages
null
null
null
cs.LO cs.PL
null
This paper answers open questions about the correctness and the completeness of Dart-Zobel algorithm for testing the inclusion relation between two regular types. We show that the algorithm is incorrect for regular types. We also prove that the algorithm is complete for regular types as well as correct for tuple distributive regular types. Also presented is a simplified version of Dart-Zobel algorithm for tuple distributive regular types.
[ { "version": "v1", "created": "Thu, 1 Oct 1998 02:33:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Lu", "Lunjin", "" ], [ "Cleary", "John G.", "" ] ]
cs/9810002
Lex Weaver
Lex Weaver and Chris Johnson
Pre-fetching tree-structured data in distributed memory
8 pages; added PDF version
Proceedings of the Third Fujitsu Parallel Computing Workshop, pages P1-J-1 to P1-J-8, Kawasaki, Japan, November 1994. Fujitsu Laboratories Ltd
null
null
cs.DC cs.DB
null
A distributed heap storage manager has been implemented on the Fujitsu AP1000 multicomputer. The performance of various pre-fetching strategies is experimentally compared. Subjective programming benefits and objective performance benefits of up to 10% in pre-fetching are found for certain applications, but not for all. The performance benefits of pre-fetching depend on the specific data structure and access patterns. We suggest that control of pre-fetching strategy be dynamically under the control of the application.
[ { "version": "v1", "created": "Fri, 2 Oct 1998 04:41:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Weaver", "Lex", "" ], [ "Johnson", "Chris", "" ] ]
cs/9810003
Andreas Siebert
Andreas Siebert
A Linear Shift Invariant Multiscale Transform
4 pages, 5 figures
Proceedings 1998 International Conference on Image Processing, Chicago, 4-7 October 1998
null
null
cs.CV
null
This paper presents a multiscale decomposition algorithm. Unlike standard wavelet transforms, the proposed operator is both linear and shift invariant. The central idea is to obtain shift invariance by averaging the aligned wavelet transform projections over all circular shifts of the signal. It is shown how the same transform can be obtained by a linear filter bank.
[ { "version": "v1", "created": "Fri, 2 Oct 1998 03:34:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Siebert", "Andreas", "" ] ]
cs/9810004
James P. Cohoon
Bruce R. Childers, James P. Cohoon, Jack W. Davidson, Peter Valle
The Design of EzWindows: A Graphics API for an Introductory Programming Course
5 pages, 5 figures, conference submission
null
null
null
cs.CY cs.GR
null
Teaching object-oriented programming in an introductory programming course poses considerable challenges to the instructor. An often advocated approach to meeting this challenge is the use of a simple, object-oriented graphics library. We have developed a simple, portable graphics library for teaching object-oriented programming using C++. The library, EzWindows, allows beginning programmers to design and write programs that use the graphical display found on all modern desktop computers. In addition to providing simple graphical objects such as windows, geometric shapes, and bitmaps, EzWindows provides facilities for introducing event-based programming using the mouse and timers. EzWindows has proven to be extremely popular; it is currently in use at over 200 universities, colleges, and high schools. This paper describes the rationale for EzWindows and its high-level design.
[ { "version": "v1", "created": "Sat, 3 Oct 1998 12:04:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Childers", "Bruce R.", "" ], [ "Cohoon", "James P.", "" ], [ "Davidson", "Jack W.", "" ], [ "Valle", "Peter", "" ] ]
cs/9810005
Kate Larson
Tuomas Sandholm, Kate Larson, Martin Andersson, Onn Shehory, Fernando Tohme
Anytime Coalition Structure Generation with Worst Case Guarantees
null
Proceedings of the National Conference on Artificial Intelligence, pp 46-53, Madison, WI, July 1998
null
null
cs.MA cs.AI
null
Coalition formation is a key topic in multiagent systems. One would prefer a coalition structure that maximizes the sum of the values of the coalitions, but often the number of coalition structures is too large to allow exhaustive search for the optimal one. But then, can the coalition structure found via a partial search be guaranteed to be within a bound from optimum? We show that none of the previous coalition structure generation algorithms can establish any bound because they search fewer nodes than a threshold that we show necessary for establishing a bound. We present an algorithm that establishes a tight bound within this minimal amount of search, and show that any other algorithm would have to search strictly more. The fraction of nodes needed to be searched approaches zero as the number of agents grows. If additional time remains, our anytime algorithm searches further, and establishes a progressively lower tight bound. Surprisingly, just searching one more node drops the bound in half. As desired, our algorithm lowers the bound rapidly early on, and exhibits diminishing returns to computation. It also drastically outperforms its obvious contenders. Finally, we show how to distribute the desired search across self-interested manipulative agents.
[ { "version": "v1", "created": "Mon, 5 Oct 1998 16:08:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Sandholm", "Tuomas", "" ], [ "Larson", "Kate", "" ], [ "Andersson", "Martin", "" ], [ "Shehory", "Onn", "" ], [ "Tohme", "Fernando", "" ] ]
cs/9810006
Kersten Barney
Nick McKeown (Stanford University), Martin Izzard (Texas Instruments), Adisak Mekkittikul (Stanford University), Bill Ellersick (Stanford University) and Mark Horowitz (Stanford University)
The Tiny Tera: A Packet Switch Core
13 pages, 10 figures
Hot Interconnects V, Stanford University, August 1996; IEEE Micro Jan/Feb 1997, pp 26-33
null
null
cs.NI
null
The objective is to design and build a small, high-bandwidth switch.
[ { "version": "v1", "created": "Mon, 5 Oct 1998 17:50:02 GMT" } ]
2007-05-23T00:00:00
[ [ "McKeown", "Nick", "", "Stanford University" ], [ "Izzard", "Martin", "", "Texas Instruments" ], [ "Mekkittikul", "Adisak", "", "Stanford University" ], [ "Ellersick", "Bill", "", "Stanford\n University" ], [ "Horowitz", "Mark", "", "Stanford University" ] ]
cs/9810008
Rob van Glabbeek
R. J. van Glabbeek (Stanford)
Axiomatizing Flat Iteration
15 pages. LaTeX 2.09. Filename: flat.tex.gz. On A4 paper print with: dvips -t a4 -O -2.15cm,-2.22cm -x 1225 flat. For US letter with: dvips -t letter -O -0.73in,-1.27in -x 1225 flat. More info at http://theory.stanford.edu/~rvg/abstracts.html#38
Proc. CONCUR '97, Warsaw, Poland, July 1997 (A. Mazurkiewicz and J. Winkowski, eds.), LNCS 1243, Springer-Verlag, 1997, pp. 228-242
null
STAN-CS-TN-97-57
cs.LO
null
Flat iteration is a variation on the original binary version of the Kleene star operation P*Q, obtained by restricting the first argument to be a sum of atomic actions. It generalizes prefix iteration, in which the first argument is a single action. Complete finite equational axiomatizations are given for five notions of bisimulation congruence over basic CCS with flat iteration, viz. strong congruence, branching congruence, eta-congruence, delay congruence and weak congruence. Such axiomatizations were already known for prefix iteration and are known not to exist for general iteration. The use of flat iteration has two main advantages over prefix iteration: 1.The current axiomatizations generalize to full CCS, whereas the prefix iteration approach does not allow an elimination theorem for an asynchronous parallel composition operator. 2.The greater expressiveness of flat iteration allows for much shorter completeness proofs. In the setting of prefix iteration, the most convenient way to obtain the completeness theorems for eta-, delay, and weak congruence was by reduction to the completeness theorem for branching congruence. In the case of weak congruence this turned out to be much simpler than the only direct proof found. In the setting of flat iteration on the other hand, the completeness theorems for delay and weak (but not eta-) congruence can equally well be obtained by reduction to the one for strong congruence, without using branching congruence as an intermediate step. Moreover, the completeness results for prefix iteration can be retrieved from those for flat iteration, thus obtaining a second indirect approach for proving completeness for delay and weak congruence in the setting of prefix iteration.
[ { "version": "v1", "created": "Wed, 7 Oct 1998 22:39:16 GMT" } ]
2007-05-23T00:00:00
[ [ "van Glabbeek", "R. J.", "", "Stanford" ] ]
cs/9810009
Maurizio Pizzonia
Maurizio Pizzonia, Giuseppe Di Battista
Object-Oriented Design of Graph Oriented Data Structures
10 pages, 9 figures, code examples, ALENEX (accepted)
null
null
null
cs.SE cs.CG cs.DS
null
Applied research in graph algorithms and combinatorial structures needs comprehensive and versatile software libraries. However, the design and the implementation of flexible libraries are challenging activities. Among the other problems involved in such a difficult field, a very special role is played by graph classification issues. We propose new techniques devised to help the designer and the programmer in the development activities. Such techniques are especially suited for dealing with graph classification problems and rely on an extension of the usual object-oriented paradigm. In order to support the usage of our approach, we devised an extension of the C++ programming language and implemented the corresponding pre-compiler.
[ { "version": "v1", "created": "Thu, 8 Oct 1998 23:54:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Pizzonia", "Maurizio", "" ], [ "Di Battista", "Giuseppe", "" ] ]
cs/9810010
Todd Veldhuizen
Todd L. Veldhuizen
C++ Templates as Partial Evaluation
13 pages
null
null
IUCS 519
cs.PL cs.PF
null
This paper explores the relationship between C++ templates and partial evaluation. Templates were designed to support generic programming, but unintentionally provided the ability to perform compile-time computations and code generation. These features are completely accidental, and as a result their syntax is awkward. By recasting these features in terms of partial evaluation, a much simpler syntax can be achieved. C++ may be regarded as a two-level language in which types are first-class values. Template instantiation resembles an offline partial evaluator. This paper describes preliminary work toward a single mechanism based on Partial Evaluation which unifies generic programming, compile-time computation and code generation. The language Catat is introduced to illustrate these ideas.
[ { "version": "v1", "created": "Fri, 9 Oct 1998 20:29:43 GMT" }, { "version": "v2", "created": "Mon, 2 Nov 1998 21:39:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Veldhuizen", "Todd L.", "" ] ]
cs/9810014
Min-Yen Kan
Judith L. Klavans (Columbia University), Kathleen R. McKeown (Columbia University), Min-Yen Kan (Columbia University) and Susan Lee (University of California at Berkeley)
Resources for Evaluation of Summarization Techniques
LaTeX source, 5 pages, US Letter, uses lrec98.sty
in Proc. of First International Conference on Language Resources and Evaluation, Rubio, Gallardo, Castro, and Tejada (eds.), Granada, Spain, 1998
null
null
cs.CL
null
We report on two corpora to be used in the evaluation of component systems for the tasks of (1) linear segmentation of text and (2) summary-directed sentence extraction. We present characteristics of the corpora, methods used in the collection of user judgments, and an overview of the application of the corpora to evaluating the component system. Finally, we discuss the problems and issues with construction of the test set which apply broadly to the construction of evaluation resources for language technologies.
[ { "version": "v1", "created": "Tue, 13 Oct 1998 20:33:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Klavans", "Judith L.", "", "Columbia University" ], [ "McKeown", "Kathleen R.", "", "Columbia\n University" ], [ "Kan", "Min-Yen", "", "Columbia University" ], [ "Lee", "Susan", "", "University of\n California at Berkeley" ] ]
cs/9810015
William Schuler
Giorgio Satta (Universita di Padova) and William Schuler (University of Pennsylvania)
Restrictions on Tree Adjoining Languages
7 pages LaTeX + 5 eps figures
Proceedings of COLING-ACL'98
null
null
cs.CL
null
Several methods are known for parsing languages generated by Tree Adjoining Grammars (TAGs) in O(n^6) worst case running time. In this paper we investigate which restrictions on TAGs and TAG derivations are needed in order to lower this O(n^6) time complexity, without introducing large runtime constants, and without losing any of the generative power needed to capture the syntactic constructions in natural language that can be handled by unrestricted TAGs. In particular, we describe an algorithm for parsing a strict subclass of TAG in O(n^5), and attempt to show that this subclass retains enough generative power to make it useful in the general case.
[ { "version": "v1", "created": "Tue, 13 Oct 1998 21:17:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Satta", "Giorgio", "", "Universita di Padova" ], [ "Schuler", "William", "", "University\n of Pennsylvania" ] ]
cs/9810016
Ion Muslea
Ion Muslea
SYNERGY: A Linear Planner Based on Genetic Programming
13 pages, European Conference on Planning 1997
"Recent Advances in AI Planning" (Sam Steel & Rachid Alami eds.), p. 312-325, Springer 1997 (LNAI 1348)
null
null
cs.AI
null
In this paper we describe SYNERGY, which is a highly parallelizable, linear planning system that is based on the genetic programming paradigm. Rather than reasoning about the world it is planning for, SYNERGY uses artificial selection, recombination and fitness measure to generate linear plans that solve conjunctive goals. We ran SYNERGY on several domains (e.g., the briefcase problem and a few variants of the robot navigation problem), and the experimental results show that our planner is capable of handling problem instances that are one to two orders of magnitude larger than the ones solved by UCPOP. In order to facilitate the search reduction and to enhance the expressive power of SYNERGY, we also propose two major extensions to our planning system: a formalism for using hierarchical planning operators, and a framework for planning in dynamic environments.
[ { "version": "v1", "created": "Fri, 16 Oct 1998 22:11:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Muslea", "Ion", "" ] ]
cs/9810017
Valerie Nowak
Stephen L. Adler
General Theory of Image Normalization
33 pages, plain tex, no figures
null
null
IASSNS-HEP-95/89
cs.CV
null
We give a systematic, abstract formulation of the image normalization method as applied to a general group of image transformations, and then illustrate the abstract analysis by applying it to the hierarchy of viewing transformations of a planar object.
[ { "version": "v1", "created": "Mon, 19 Oct 1998 20:46:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Adler", "Stephen L.", "" ] ]
cs/9810018
Krzysztof R. Apt
Krzysztof R. Apt
A Proof Theoretic View of Constraint Programming
25 pages
Fundamenta Informaticae 34(1998), pp. 295-321
null
null
cs.AI cs.PL
null
We provide here a proof theoretic account of constraint programming that attempts to capture the essential ingredients of this programming style. We exemplify it by presenting proof rules for linear constraints over interval domains, and illustrate their use by analyzing the constraint propagation process for the {\tt SEND + MORE = MONEY} puzzle. We also show how this approach allows one to build new constraint solvers.
[ { "version": "v1", "created": "Tue, 20 Oct 1998 11:23:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/9810019
Guruduth Banavar
Robert Strom, Guruduth Banavar, Tushar Chandra, Marc Kaplan, Kevan Miller, Bodhi Mukherjee, Daniel Sturman, and Michael Ward
Gryphon: An Information Flow Based Approach to Message Brokering
Two page extended abstract
null
null
null
cs.DC
null
Gryphon is a distributed computing paradigm for message brokering, which is the transferring of information in the form of streams of events from information providers to information consumers. This extended abstract outlines the major problems in message brokering and Gryphon's approach to solving them.
[ { "version": "v1", "created": "Wed, 21 Oct 1998 18:43:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Strom", "Robert", "" ], [ "Banavar", "Guruduth", "" ], [ "Chandra", "Tushar", "" ], [ "Kaplan", "Marc", "" ], [ "Miller", "Kevan", "" ], [ "Mukherjee", "Bodhi", "" ], [ "Sturman", "Daniel", "" ], [ "Ward", "Michael", "" ] ]
cs/9810020
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 33
null
Internat. J. Comput. Geom. Appl., 8(3) 381-384, 1998. Also in SIGACT News, 29(2) (Issue 107) 14-16, 1998
null
null
cs.CG cs.AI cs.GR
null
Several recent SIGGRAPH papers on surface simplification are described.
[ { "version": "v1", "created": "Thu, 22 Oct 1998 20:44:35 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/9810021
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 32
null
Internat. J. Comput. Geom. Appl.,7(5) 509-513, 1997. Also in SIGACT News, 29(2) (Issue 107) 14-16, 1998
null
null
cs.CG cs.GR
null
The proof of Dey's new k-set bound is illustrated.
[ { "version": "v1", "created": "Thu, 22 Oct 1998 21:01:36 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/9810022
James K. Huggins
James K. Huggins
Broy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution
null
null
null
University of Michigan EECS Department Technical Report CSE-TR-320-96
cs.SE
null
We apply the Gurevich Abstract State Machine methodology to a benchmark specification problem of Broy and Lamport.
[ { "version": "v1", "created": "Mon, 26 Oct 1998 16:52:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Huggins", "James K.", "" ] ]
cs/9810023
James K. Huggins
Yuri Gurevich and James K. Huggins
Equivalence is in the Eye of the Beholder
See also the ASM web site at http://www.eecs.umich.edu/gasm/
Theoretical Computer Science (179) 1-2 (1997), 353-380
null
null
cs.SE
null
In a recent provocative paper, Lamport points out "the insubstantiality of processes" by proving the equivalence of two different decompositions of the same intuitive algorithm by means of temporal formulas. We point out that the correct equivalence of algorithms is itself in the eye of the beholder. We discuss a number of related issues and, in particular, whether algorithms can be proved equivalent directly.
[ { "version": "v1", "created": "Mon, 26 Oct 1998 18:46:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Gurevich", "Yuri", "" ], [ "Huggins", "James K.", "" ] ]
cs/9810024
James K. Huggins
Yuri Gurevich and James K. Huggins
Evolving Algebras and Partial Evaluation
See also the web site at http://www.eecs.umich.edu/gasm/
In IFIP 13th World Computer Congress 1994, Volume I: Technology and Foundations, eds. B. Pehrson and I. Simon, North-Holland, Amsterdam, 587-592
null
null
cs.SE
null
We describe an automated partial evaluator for evolving algebras implemented at the University of Michigan.
[ { "version": "v1", "created": "Mon, 26 Oct 1998 19:13:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Gurevich", "Yuri", "" ], [ "Huggins", "James K.", "" ] ]
cs/9810026
James K. Huggins
Yuri Gurevich and James K. Huggins
The Railroad Crossing Problem: An Experiment with Instantaneous Actions and Immediate Reactions
See also the web site at http://www.eecs.umich.edu/gasm/
Selected papers from CSL'95, ed. H.K. Buening, Springer Lecture Notes in Computer Science 1092, 1996, 266--290
null
null
cs.SE
null
We give an evolving algebra solution for the well-known railroad crossing problem and use the occasion to experiment with agents that perform instantaneous actions in continuous time and in particular with agents that fire at the moment they are enabled.
[ { "version": "v1", "created": "Mon, 26 Oct 1998 19:24:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Gurevich", "Yuri", "" ], [ "Huggins", "James K.", "" ] ]
cs/9810027
Graham Kirby
G. N. C. Kirby, R. Morrison, D. W. Stemple
Linguistic Reflection in Java
25 pages. Source code for examples at http://www-ppg.dcs.st-and.ac.uk/Java/ReflectionExample/ Dynamic compilation package at http://www-ppg.dcs.st-and.ac.uk/Java/DynamicCompilation/
Software - Practice & Experience 28, 10 (1998) pp 1045-1077
null
null
cs.PL
null
Reflective systems allow their own structures to be altered from within. Here we are concerned with a style of reflection, called linguistic reflection, which is the ability of a running program to generate new program fragments and to integrate these into its own execution. In particular we describe how this kind of reflection may be provided in the compiler-based, strongly typed object-oriented programming language Java. The advantages of the programming technique include attaining high levels of genericity and accommodating system evolution. These advantages are illustrated by an example taken from persistent programming which shows how linguistic reflection allows functionality (program code) to be generated on demand (Just-In-Time) from a generic specification and integrated into the evolving running program. The technique is evaluated against alternative implementation approaches with respect to efficiency, safety and ease of use.
[ { "version": "v1", "created": "Thu, 29 Oct 1998 14:30:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Kirby", "G. N. C.", "" ], [ "Morrison", "R.", "" ], [ "Stemple", "D. W.", "" ] ]
cs/9811001
Lunjin Lu
Lunjin Lu (University of Waikato)
A Polymorphic Groundness Analysis of Logic Programs
30 pages
null
null
null
cs.PL
null
A polymorphic analysis is an analysis whose input and output contain parameters which serve as placeholders for information that is unknown before analysis but provided after analysis. In this paper, we present a polymorphic groundness analysis that infers parameterised groundness descriptions of the variables of interest at a program point. The polymorphic groundness analysis is designed by replacing two primitive operators used in a monomorphic groundness analysis and is shown to be as precise as the monomorphic groundness analysis for any possible values for mode parameters. Experimental results of a prototype implementation of the polymorphic groundness analysis are given.
[ { "version": "v1", "created": "Sat, 31 Oct 1998 07:20:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Lu", "Lunjin", "", "University of Waikato" ] ]
cs/9811002
Serguei P. Tsarev
Serguei P. Tsarev
Factorization of linear partial differential operators and Darboux integrability of nonlinear PDEs
LaTeX 2.09, acmconf.sty (included in the tar file), 8 pages. Presented at the Poster session of ISSAC'98 (Rostock, Germany)
null
null
null
cs.SC nlin.SI solv-int
null
Using a new definition of generalized divisors we prove that the lattice of such divisors for a given linear partial differential operator is modular and obtain analogues of the well-known theorems of the Loewy-Ore theory of factorization of linear ordinary differential operators. Possible applications to factorized Groebner bases computations in the commutative and non-commutative cases are discussed, an application to finding criterions of Darboux integrability of nonlinear PDEs is given.
[ { "version": "v1", "created": "Sat, 31 Oct 1998 09:09:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Tsarev", "Serguei P.", "" ] ]
cs/9811003
Andy Golding
Andrew R. Golding and Dan Roth
A Winnow-Based Approach to Context-Sensitive Spelling Correction
To appear in Machine Learning, Special Issue on Natural Language Learning, 1999. 25 pages
null
null
null
cs.LG cs.CL
null
A large class of machine-learning problems in natural language require the characterization of linguistic context. Two characteristic properties of such problems are that their feature space is of very high dimensionality, and their target concepts refer to only a small subset of the features in the space. Under such conditions, multiplicative weight-update algorithms such as Winnow have been shown to have exceptionally good theoretical properties. We present an algorithm combining variants of Winnow and weighted-majority voting, and apply it to a problem in the aforementioned class: context-sensitive spelling correction. This is the task of fixing spelling errors that happen to result in valid words, such as substituting "to" for "too", "casual" for "causal", etc. We evaluate our algorithm, WinSpell, by comparing it against BaySpell, a statistics-based method representing the state of the art for this task. We find: (1) When run with a full (unpruned) set of features, WinSpell achieves accuracies significantly higher than BaySpell was able to achieve in either the pruned or unpruned condition; (2) When compared with other systems in the literature, WinSpell exhibits the highest performance; (3) The primary reason that WinSpell outperforms BaySpell is that WinSpell learns a better linear separator; (4) When run on a test set drawn from a different corpus than the training set was drawn from, WinSpell is better able than BaySpell to adapt, using a strategy we will present that combines supervised learning on the training set with unsupervised learning on the (noisy) test set.
[ { "version": "v1", "created": "Sat, 31 Oct 1998 19:33:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Golding", "Andrew R.", "" ], [ "Roth", "Dan", "" ] ]
cs/9811004
Mark D. Roberts
Mark D. Roberts
Does Meaning Evolve?
title changed, completely rewritten, new version 37 pages previous version 28 pages, to appear in Behaviour and Philosophy
null
null
null
cs.CL q-bio.PE
null
A common method of making a theory more understandable, is by comparing it to another theory which has been better developed. Radical interpretation is a theory which attempts to explain how communication has meaning. Radical interpretation is treated as another time-dependent theory and compared to the time dependent theory of biological evolution. The main reason for doing this is to find the nature of the time dependence; producing analogs between the two theories is a necessary prerequisite to this and brings up many problems. Once the nature of the time dependence is better known it might allow the underlying mechanism to be uncovered. Several similarities and differences are uncovered, there appear to be more differences than similarities.
[ { "version": "v1", "created": "Sun, 1 Nov 1998 11:18:22 GMT" }, { "version": "v2", "created": "Thu, 24 Dec 1998 13:22:43 GMT" }, { "version": "v3", "created": "Sun, 16 Jan 2000 17:29:43 GMT" }, { "version": "v4", "created": "Sat, 14 Aug 2004 15:35:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Roberts", "Mark D.", "" ] ]
cs/9811005
Lane A. Hemaspaandra
Lane A. Hemaspaandra and Alan L. Selman
Writing and Editing Complexity Theory: Tales and Tools
11 pages. Will appear in the SIGACT News Complexity Theory Column
null
null
null
cs.GL cs.CC
null
Each researcher should have a full shelf---physical or virtual---of books on writing and editing prose. Though we make no claim to any special degree of expertise, we recently edited a book of complexity theory surveys (Complexity Theory Retrospective II, Springer-Verlag, 1997), and in doing so we were brought into particularly close contact with the subject of this article, and with a number of the excellent resources available to writers and editors. In this article, we list some of these resources, and we also relate some of the adventures we had as our book moved from concept to reality.
[ { "version": "v1", "created": "Sun, 1 Nov 1998 17:44:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Selman", "Alan L.", "" ] ]
cs/9811006
Eric Bloedorn
Inderjeet Mani and Eric Bloedorn
Machine Learning of Generic and User-Focused Summarization
In Proceedings of the Fifteenth National Conference on AI (AAAI-98), p. 821-826
null
null
null
cs.CL cs.LG
null
A key problem in text summarization is finding a salience function which determines what information in the source should be included in the summary. This paper describes the use of machine learning on a training corpus of documents and their abstracts to discover salience functions which describe what combination of features is optimal for a given summarization task. The method addresses both "generic" and user-focused summaries.
[ { "version": "v1", "created": "Mon, 2 Nov 1998 18:57:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Mani", "Inderjeet", "" ], [ "Bloedorn", "Eric", "" ] ]
cs/9811007
Barbara White
L. Bass, G. Chastek, P. Clements, L. Northrop, D. Smith, J. Withey
Second Product Line Practice Workshop Report
null
null
null
CMU/SEI-98-TR-015
cs.SE
null
The second Software Engineering Institute Product Line Practice Workshop was a hands-on meeting held in November 1997 to share industry practices in software product lines and to explore the technical and non-technical issues involved. This report synthesizes the workshop presentations and discussions, which identified factors involved in product line practices and analyzed issues in the areas of software engineering, technical management, and enterprise management.
[ { "version": "v1", "created": "Mon, 2 Nov 1998 19:34:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Bass", "L.", "" ], [ "Chastek", "G.", "" ], [ "Clements", "P.", "" ], [ "Northrop", "L.", "" ], [ "Smith", "D.", "" ], [ "Withey", "J.", "" ] ]
cs/9811008
Philip Edmonds
Philip Edmonds (University of Toronto)
Translating near-synonyms: Possibilities and preferences in the interlingua
8 pages, LaTeX2e, 1 eps figure, uses colacl.sty, epsfig.sty, avm.sty, times.sty
Proceedings of the AMTA/SIG-IL Second Workshop on Interlinguas, October 1998
null
null
cs.CL
null
This paper argues that an interlingual representation must explicitly represent some parts of the meaning of a situation as possibilities (or preferences), not as necessary or definite components of meaning (or constraints). Possibilities enable the analysis and generation of nuance, something required for faithful translation. Furthermore, the representation of the meaning of words, especially of near-synonyms, is crucial, because it specifies which nuances words can convey in which contexts.
[ { "version": "v1", "created": "Mon, 2 Nov 1998 21:29:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Edmonds", "Philip", "", "University of Toronto" ] ]