id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-21 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/9904001 | Bruce Edmonds | Bruce Edmonds | A Proposal for the Establishment of Review Boards - a flexible approach
to the selection of academic knowledge | Other formats at http://www.cpm.mmu.ac.uk/cpmrep50.html | null | null | CPM-99-50 | cs.CY cs.DL cs.IR | null | Paper journals use a small number of trusted academics to select information
on behalf of all their readers. This inflexibility in the selection was
justified due to the expense of publishing. The advent of cheap distribution
via the internet allows a new trade-off between time and expense and the
flexibility of the selection process. This paper explores one such possible
process one where the role of mark-up and archiving is separated from that of
review. The idea is that authors publish their papers on their own web pages or
in a public paper archive, a board of reviewers judge that paper on a number of
different criteria. The detailed results of the reviews are stored in such a
way as to enable readers to use these judgements to find the papers they want
using search engines on the web. Thus instead of journals using generic
selection criteria readers can set their own to suit their needs. The resulting
system might be even cheaper than web-journals to implement.
| [
{
"version": "v1",
"created": "Thu, 1 Apr 1999 07:54:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Edmonds",
"Bruce",
""
]
] |
cs/9904004 | Mark Lee | Mark Lee and John Barnden | Mixing Metaphors | null | Proceedings of the AISB'99 Symposium on Metaphor, Artificial
Intelligence, and Cognition, pages 11-16, Edinburgh | null | null | cs.CL cs.AI | null | Mixed metaphors have been neglected in recent metaphor research. This paper
suggests that such neglect is short-sighted. Though mixing is a more complex
phenomenon than straight metaphors, the same kinds of reasoning and knowledge
structures are required. This paper provides an analysis of both parallel and
serial mixed metaphors within the framework of an AI system which is already
capable of reasoning about straight metaphorical manifestations and argues that
the processes underlying mixing are central to metaphorical meaning. Therefore,
any theory of metaphors must be able to account for mixing.
| [
{
"version": "v1",
"created": "Mon, 12 Apr 1999 11:37:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Mark",
""
],
[
"Barnden",
"John",
""
]
] |
cs/9904005 | Walter Eaves | Walter Eaves | Transport Level Security: a proof using the Gong-Needham-Yahalom Logic | 22 pages, 2 figures, 1 appendix | null | null | null | cs.CR | null | This paper provides a proof of the proposed Internet standard Transport Level
Security protocol using the Gong-Needham-Yahalom logic. It is intended as a
teaching aid and hopes to show to students: the potency of a formal method for
protocol design; some of the subtleties of authenticating parties on a network
where all messages can be intercepted; the design of what should be a widely
accepted standard.
| [
{
"version": "v1",
"created": "Wed, 14 Apr 1999 20:05:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eaves",
"Walter",
""
]
] |
cs/9904008 | Gertjan van Noord | Dale Gerdemann and Gertjan van Noord | Transducers from Rewrite Rules with Backreferences | 8 pages, EACL 1999 Bergen | null | null | null | cs.CL | null | Context sensitive rewrite rules have been widely used in several areas of
natural language processing, including syntax, morphology, phonology and speech
processing. Kaplan and Kay, Karttunen, and Mohri & Sproat have given various
algorithms to compile such rewrite rules into finite-state transducers. The
present paper extends this work by allowing a limited form of backreferencing
in such rules. The explicit use of backreferencing leads to more elegant and
general solutions.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 1999 14:00:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gerdemann",
"Dale",
""
],
[
"van Noord",
"Gertjan",
""
]
] |
cs/9904009 | Mark Lee | Mark Lee and Yorick Wilks | An ascription-based approach to speech acts | 6 pages | Proceedings of COLING`96, Copenhagen. (1996) | null | null | cs.CL | null | The two principal areas of natural language processing research in pragmatics
are belief modelling and speech act processing. Belief modelling is the
development of techniques to represent the mental attitudes of a dialogue
participant. The latter approach, speech act processing, based on speech act
theory, involves viewing dialogue in planning terms. Utterances in a dialogue
are modelled as steps in a plan where understanding an utterance involves
deriving the complete plan a speaker is attempting to achieve. However,
previous speech act based approaches have been limited by a reliance upon
relatively simplistic belief modelling techniques and their relationship to
planning and plan recognition. In particular, such techniques assume
precomputed nested belief structures. In this paper, we will present an
approach to speech act processing based on novel belief modelling techniques
where nested beliefs are propagated on demand.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 1999 16:03:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Mark",
""
],
[
"Wilks",
"Yorick",
""
]
] |
cs/9904010 | Lorrie Cranor | Lorrie Faith Cranor, Joseph Reagle, and Mark S. Ackerman | Beyond Concern: Understanding Net Users' Attitudes About Online Privacy | 5 figures and appendix | null | null | AT&T Labs-Research Technical Report TR 99.4.3 | cs.CY cs.HC | null | People are concerned about privacy, particularly on the Internet. While many
studies have provided evidence of this concern, few have explored the nature of
the concern in detail, especially for the online environment. With this study,
we have tried to better understand the nature of online privacy concerns; we
look beyond the fact that people are concerned and attempt to understand how
they are concerned. We hope our results will help inform both policy decisions
as well as the development of technology tools that can assist Internet users
in protecting their privacy.
We present results here from the analysis of 381 questionnaires completed
between November 6 and November 13, 1998 by American Internet users. The sample
was drawn from the FamilyPC magazine/Digital Research, Inc. Family Panel. While
this is not a statistically representative sample of US Internet users, our
respondents are heavy Internet users, and quite possibly lead innovators. As
such, we believe that this sample is important for understanding the future
Internet user population.
| [
{
"version": "v1",
"created": "Sun, 18 Apr 1999 19:04:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cranor",
"Lorrie Faith",
""
],
[
"Reagle",
"Joseph",
""
],
[
"Ackerman",
"Mark S.",
""
]
] |
cs/9904011 | Yin Zhang | Yin Zhang | WebScript -- A Scripting Language for the Web | 19 pages, 11 figures | null | null | null | cs.NI cs.PL | null | WebScript is a scripting language for processing Web documents. Designed as
an extension to Jacl, the Java implementation of Tcl, WebScript allows
programmers to manipulate HTML in the same way as Tcl manipulates text strings
and GUI elements. This leads to a completely new way of writing the next
generation of Web applications. This paper presents the motivation behind the
design and implementation of WebScript, an overview of its major features, as
well as some demonstrations of its power.
| [
{
"version": "v1",
"created": "Wed, 21 Apr 1999 19:21:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Yin",
""
]
] |
cs/9904013 | Stephen F. Bush | Stephen F. Bush and Victor S. Frost and Joseph B. Evans | Network Management of Predictive Mobile Networks | null | Journal of Network and Systems Management, volume 7, number 2,
June, 1999 | null | null | cs.NI | null | There is a trend toward the use of predictive systems in communications
networks. At the systems and network management level predictive capabilities
are focused on anticipating network faults and performance degradation.
Simultaneously, mobile communication networks are being developed with
predictive location and tracking mechanisms. The interactions and synergies
between these systems present a new set of problems. A new predictive network
management framework is developed and examined. The interaction between a
predictive mobile network and the proposed network management system is
discussed. The Rapidly Deployable Radio Network is used as a specific example
to illustrate these interactions.
| [
{
"version": "v1",
"created": "Wed, 21 Apr 1999 21:58:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Frost",
"Victor S.",
""
],
[
"Evans",
"Joseph B.",
""
]
] |
cs/9904014 | Stephen F. Bush | Stephen F. Bush and Sunil Jagannath and Joseph B. Evans and Victor
Frost and Gary Minden and K. Sam Shanmugan | A Control and Management Network for Wireless ATM Systems | author's web page at http://www.crd.ge.com/people/bush | ACM-Baltzer Wireless Networks (WINET), volume 3, pages
267-283,1997 | null | null | cs.NI | null | This paper describes the design of a control and management network
(orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network.
This mobile wireless ATM network is part of the Rapidly Deployable Radio
Network (RDRN). The orderwire system consists of a packet radio network which
overlays the mobile wireless ATM network, each network element in this network
uses Global Positioning System (GPS) information to control a beamforming
antenna subsystem which provides for spatial reuse. This paper also proposes a
novel Virtual Network Configuration (VNC) algorithm for predictive network
configuration. A mobile ATM Private Network-Network Interface (PNNI) based on
VNC is also discussed. Finally, as a prelude to the system implementation,
results of a Maisie simulation of the orderwire system are discussed.
| [
{
"version": "v1",
"created": "Thu, 22 Apr 1999 12:58:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Jagannath",
"Sunil",
""
],
[
"Evans",
"Joseph B.",
""
],
[
"Frost",
"Victor",
""
],
[
"Minden",
"Gary",
""
],
[
"Shanmugan",
"K. Sam",
""
]
] |
cs/9904017 | David R. Hanson | David R. Hanson | A Machine-Independent Debugger--Revisited | 12 pages; 6 figures; 3 tables | Software--Practice & Experience, vol. 29, no. 10, 849-862, Aug.
1999 | null | Microsoft Research MSR-TR-99-04 | cs.PL cs.SE | null | Most debuggers are notoriously machine-dependent, but some recent research
prototypes achieve varying degrees of machine-independence with novel designs.
Cdb, a simple source-level debugger for C, is completely independent of its
target architecture. This independence is achieved by embedding symbol tables
and debugging code in the target program, which costs both time and space. This
paper describes a revised design and implementation of cdb that reduces the
space cost by nearly one-half and the time cost by 13% by storing symbol tables
in external files. A symbol table is defined by a 31-line grammar in the
Abstract Syntax Description Language (ASDL). ASDL is a domain-specific language
for specifying tree data structures. The ASDL tools accept an ASDL grammar and
generate code to construct, read, and write these data structures. Using ASDL
automates implementing parts of the debugger, and the grammar documents the
symbol table concisely. Using ASDL also suggested simplifications to the
interface between the debugger and the target program. Perhaps most important,
ASDL emphasizes that symbol tables are data structures, not file formats. Many
of the pitfalls of working with low-level file formats can be avoided by
focusing instead on high-level data structures and automating the
implementation details.
| [
{
"version": "v1",
"created": "Fri, 23 Apr 1999 18:34:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hanson",
"David R.",
""
]
] |
cs/9904019 | Ronald de Wolf | H. Buhrman (CWI), R. Cleve (U.Calgary), R. de Wolf (CWI and
U.Amsterdam), and Ch. Zalka (LANL) | Bounds for Small-Error and Zero-Error Quantum Algorithms | 11 pages, LaTeX. New title and some sections are rewritten. This
version to appear in IEEE FOCS'99 | null | null | null | cs.CC quant-ph | null | We present a number of results related to quantum algorithms with small error
probability and quantum algorithms that are zero-error. First, we give a tight
analysis of the trade-offs between the number of queries of quantum search
algorithms, their error probability, the size of the search space, and the
number of solutions in this space. Using this, we deduce new lower and upper
bounds for quantum versions of amplification problems. Next, we establish
nearly optimal quantum-classical separations for the query complexity of
monotone functions in the zero-error model (where our quantum zero-error model
is defined so as to be robust when the quantum gates are noisy). Also, we
present a communication complexity problem related to a total function for
which there is a quantum-classical communication complexity gap in the
zero-error model. Finally, we prove separations for monotone graph properties
in the zero-error and other error models which imply that the evasiveness
conjecture for such properties does not hold for quantum computers.
| [
{
"version": "v1",
"created": "Mon, 26 Apr 1999 08:54:21 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Aug 1999 12:05:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"H.",
"",
"CWI"
],
[
"Cleve",
"R.",
"",
"U.Calgary"
],
[
"de Wolf",
"R.",
"",
"CWI and\n U.Amsterdam"
],
[
"Zalka",
"Ch.",
"",
"LANL"
]
] |
cs/9904020 | Walter Eaves | Walter Eaves | ODP channel objects that provide services transparently for distributing
processing systems | 35 pages, 10 figures | null | null | null | cs.DC cs.OS | null | This paper describes an architecture for a distributing processing system
that would allow remote procedure calls to invoke other services as messages
are passed between clients and servers. It proposes that an additional class of
data processing objects be located in the software communications channel. The
objects in this channel would then be used to enforce protocols on
client-server applications without any additional effort by the application
programmers. For example, services such as key-management, time-stamping,
sequencing and encryption can be implemented at different levels of the
software communications stack to provide a complete authentication service. A
distributing processing environment could be used to control broadband network
data delivery. Architectures and invocation semantics are discussed, Example
classes and interfaces for channel objects are given in the Java programming
language.
| [
{
"version": "v1",
"created": "Mon, 26 Apr 1999 21:13:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eaves",
"Walter",
""
]
] |
cs/9905001 | Rebecca Hwa | Rebecca Hwa | Supervised Grammar Induction Using Training Data with Limited
Constituent Information | 7 pages, 2 figures, to appear in the proc. of ACL '99 | null | null | null | cs.CL | null | Corpus-based grammar induction generally relies on hand-parsed training data
to learn the structure of the language. Unfortunately, the cost of building
large annotated corpora is prohibitively expensive. This work aims to improve
the induction strategy when there are few labels in the training data. We show
that the most informative linguistic constituents are the higher nodes in the
parse trees, typically denoting complex noun phrases and sentential clauses.
They account for only 20% of all constituents. For inducing grammars from
sparsely labeled training data (e.g., only higher-level constituent labels), we
propose an adaptation strategy, which produces grammars that parse almost as
well as grammars induced from fully labeled corpora. Our results suggest that
for a partial parser to replace human annotators, it must be able to
automatically extract higher-level constituents rather than base noun phrases.
| [
{
"version": "v1",
"created": "Sun, 2 May 1999 20:48:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hwa",
"Rebecca",
""
]
] |
cs/9905003 | Walter Eaves | Walter Eaves | Collective Choice Theory in Collaborative Computing | 40 pages, 10 figures | null | null | null | cs.MA cs.DC | null | This paper presents some fundamental collective choice theory for information
system designers, particularly those working in the field of computer-supported
cooperative work. This paper is focused on a presentation of Arrow's
Possibility and Impossibility theorems which form the fundamental boundary on
the efficacy of collective choice: voting and selection procedures. It restates
the conditions that Arrow placed on collective choice functions in more
rigorous second-order logic, which could be used as a set of test conditions
for implementations, and a useful probabilistic result for analyzing votes on
issue pairs. It also describes some simple collective choice functions. There
is also some discussion of how enterprises should approach putting their
resources under collective control: giving an outline of a superstructure of
performative agents to carry out this function and what distributing processing
technology would be needed.
| [
{
"version": "v1",
"created": "Mon, 10 May 1999 17:07:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eaves",
"Walter",
""
]
] |
cs/9905004 | Kagan Tumer | David H. Wolpert, Kagan Tumer, Jeremy Frank | Using Collective Intelligence to Route Internet Traffic | 7 pages | Advances in Information Processing Systems - 11, eds M. Kearns, S.
Solla, D. Cohn, MIT Press, 1999 | null | null | cs.LG adap-org cond-mat.stat-mech cs.DC cs.NI nlin.AO | null | A COllective INtelligence (COIN) is a set of interacting reinforcement
learning (RL) algorithms designed in an automated fashion so that their
collective behavior optimizes a global utility function. We summarize the
theory of COINs, then present experiments using that theory to design COINs to
control internet traffic routing. These experiments indicate that COINs
outperform all previously investigated RL-based, shortest path routing
algorithms.
| [
{
"version": "v1",
"created": "Mon, 10 May 1999 20:52:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolpert",
"David H.",
""
],
[
"Tumer",
"Kagan",
""
],
[
"Frank",
"Jeremy",
""
]
] |
cs/9905005 | Kagan Tumer | David H. Wolpert, Kevin R. Wheeler, Kagan Tumer | General Principles of Learning-Based Multi-Agent Systems | 7 pages, 6 figures | Proceedings of the Third International Conference on Autonomous
Agents, Seatle, WA 1999 | null | null | cs.MA adap-org cond-mat.stat-mech cs.DC cs.LG nlin.AO | null | We consider the problem of how to design large decentralized multi-agent
systems (MAS's) in an automated fashion, with little or no hand-tuning. Our
approach has each agent run a reinforcement learning algorithm. This converts
the problem into one of how to automatically set/update the reward functions
for each of the agents so that the global goal is achieved. In particular we do
not want the agents to ``work at cross-purposes'' as far as the global goal is
concerned. We use the term artificial COllective INtelligence (COIN) to refer
to systems that embody solutions to this problem. In this paper we present a
summary of a mathematical framework for COINs. We then investigate the
real-world applicability of the core concepts of that framework via two
computer experiments: we show that our COINs perform near optimally in a
difficult variant of Arthur's bar problem (and in particular avoid the tragedy
of the commons for that problem), and we also illustrate optimal performance
for our COINs in the leader-follower problem.
| [
{
"version": "v1",
"created": "Mon, 10 May 1999 22:20:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolpert",
"David H.",
""
],
[
"Wheeler",
"Kevin R.",
""
],
[
"Tumer",
"Kagan",
""
]
] |
cs/9905007 | Michael R. Brent | Michael R. Brent | An Efficient, Probabilistically Sound Algorithm for Segmentation and
Word Discovery | 65 double-spaced ms. pages including 3 figures | Brent, M. R. (1999). An efficient, probabilistically sound
algorithm for segmentation and word discovery. Machine Learning 34, 71-105 | null | null | cs.CL cs.LG | null | This paper presents a model-based, unsupervised algorithm for recovering word
boundaries in a natural-language text from which they have been deleted. The
algorithm is derived from a probability model of the source that generated the
text. The fundamental structure of the model is specified abstractly so that
the detailed component models of phonology, word-order, and word frequency can
be replaced in a modular fashion. The model yields a language-independent,
prior probability distribution on all possible sequences of all possible words
over a given alphabet, based on the assumption that the input was generated by
concatenating words from a fixed but unknown lexicon. The model is unusual in
that it treats the generation of a complete corpus, regardless of length, as a
single event in the probability space. Accordingly, the algorithm does not
estimate a probability distribution on words; instead, it attempts to calculate
the prior probabilities of various word sequences that could underlie the
observed text. Experiments on phonemic transcripts of spontaneous speech by
parents to young children suggest that this algorithm is more effective than
other proposed algorithms, at least when utterance boundaries are given and the
text includes a substantial number of short utterances.
Keywords: Bayesian grammar induction, probability models, minimum description
length (MDL), unsupervised learning, cognitive modeling, language acquisition,
segmentation
| [
{
"version": "v1",
"created": "Wed, 12 May 1999 14:25:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brent",
"Michael R.",
""
]
] |
cs/9905008 | Stefan Riezler | Mats Rooth, Stefan Riezler, Detlef Prescher, Glenn Carroll, and Franz
Beil (IMS, University of Stuttgart) | Inducing a Semantically Annotated Lexicon via EM-Based Clustering | 8 pages, uses colacl.sty. Proceedings of the 37th Annual Meeting of
the ACL, 1999 | null | null | null | cs.CL cs.AI cs.LG | null | We present a technique for automatic induction of slot annotations for
subcategorization frames, based on induction of hidden classes in the EM
framework of statistical estimation. The models are empirically evalutated by a
general decision test. Induction of slot labeling for subcategorization frames
is accomplished by a further application of EM, and applied experimentally on
frame observations derived from parsing large corpora. We outline an
interpretation of the learned representations as theoretical-linguistic
decompositional lexical entries.
| [
{
"version": "v1",
"created": "Wed, 19 May 1999 14:52:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rooth",
"Mats",
"",
"IMS, University of Stuttgart"
],
[
"Riezler",
"Stefan",
"",
"IMS, University of Stuttgart"
],
[
"Prescher",
"Detlef",
"",
"IMS, University of Stuttgart"
],
[
"Carroll",
"Glenn",
"",
"IMS, University of Stuttgart"
],
[
"Beil",
"Franz",
"",
"IMS, University of Stuttgart"
]
] |
cs/9905009 | Stefan Riezler | Franz Beil, Glenn Carroll, Detlef Prescher, Stefan Riezler, and Mats
Rooth (IMS, University of Stuttgart) | Inside-Outside Estimation of a Lexicalized PCFG for German | 8 pages, uses colacl.sty. Proceedings of the 37th Annual Meeting of
the ACL, 1999 | null | null | null | cs.CL cs.LG | null | The paper describes an extensive experiment in inside-outside estimation of a
lexicalized probabilistic context free grammar for German verb-final clauses.
Grammar and formalism features which make the experiment feasible are
described. Successive models are evaluated on precision and recall of phrase
markup.
| [
{
"version": "v1",
"created": "Wed, 19 May 1999 14:47:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Beil",
"Franz",
"",
"IMS, University of Stuttgart"
],
[
"Carroll",
"Glenn",
"",
"IMS, University of Stuttgart"
],
[
"Prescher",
"Detlef",
"",
"IMS, University of Stuttgart"
],
[
"Riezler",
"Stefan",
"",
"IMS, University of Stuttgart"
],
[
"Rooth",
"Mats",
"",
"IMS, University of Stuttgart"
]
] |
cs/9905010 | Stefan Riezler | Stefan Riezler (IMS, University of Stuttgart) | Statistical Inference and Probabilistic Modelling for Constraint-Based
NLP | 12 pages, uses knvns98.sty. Proceedings of the 4th Conference on
Natural Language Processing (KONVENS-98) | null | null | null | cs.CL cs.LG | null | We present a probabilistic model for constraint-based grammars and a method
for estimating the parameters of such models from incomplete, i.e., unparsed
data. Whereas methods exist to estimate the parameters of probabilistic
context-free grammars from incomplete data (Baum 1970), so far for
probabilistic grammars involving context-dependencies only parameter estimation
techniques from complete, i.e., fully parsed data have been presented (Abney
1997). However, complete-data estimation requires labor-intensive, error-prone,
and grammar-specific hand-annotating of large language corpora. We present a
log-linear probability model for constraint logic programming, and a general
algorithm to estimate the parameters of such models from incomplete data by
extending the estimation algorithm of Della-Pietra, Della-Pietra, and Lafferty
(1997) to incomplete data settings.
| [
{
"version": "v1",
"created": "Wed, 19 May 1999 16:03:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Riezler",
"Stefan",
"",
"IMS, University of Stuttgart"
]
] |
cs/9905011 | Kagan Tumer | Kagan Tumer, Nirmala Ramanujam, Joydeep Ghosh, and Rebecca
Richards-Kortum | Ensembles of Radial Basis Function Networks for Spectroscopic Detection
of Cervical Pre-Cancer | 23 pages | IEEE Transactions on Biomedical Engineering, vol 45, no. 8, pp
953-962, 1998 | null | null | cs.NE cs.LG q-bio | null | The mortality related to cervical cancer can be substantially reduced through
early detection and treatment. However, current detection techniques, such as
Pap smear and colposcopy, fail to achieve a concurrently high sensitivity and
specificity.
In vivo fluorescence spectroscopy is a technique which quickly,
non-invasively and quantitatively probes the biochemical and morphological
changes that occur in pre-cancerous tissue.
A multivariate statistical algorithm was used to extract clinically useful
information from tissue spectra acquired from 361 cervical sites from 95
patients at 337, 380 and 460 nm excitation wavelengths. The multivariate
statistical analysis was also employed to reduce the number of fluorescence
excitation-emission wavelength pairs required to discriminate healthy tissue
samples from pre-cancerous tissue samples. The use of connectionist methods
such as multi layered perceptrons, radial basis function networks, and
ensembles of such networks was investigated. RBF ensemble algorithms based on
fluorescence spectra potentially provide automated, and near real-time
implementation of pre-cancer detection in the hands of non-experts. The results
are more reliable, direct and accurate than those achieved by either human
experts or multivariate statistical algorithms.
| [
{
"version": "v1",
"created": "Thu, 20 May 1999 18:28:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tumer",
"Kagan",
""
],
[
"Ramanujam",
"Nirmala",
""
],
[
"Ghosh",
"Joydeep",
""
],
[
"Richards-Kortum",
"Rebecca",
""
]
] |
cs/9905012 | Kagan Tumer | Kagan Tumer and Joydeep Ghosh | Linear and Order Statistics Combiners for Pattern Classification | 31 pages | Combining Artificial Neural Networks,Ed. Amanda Sharkey, pp
127-162, Springer Verlag, 1999 | null | null | cs.NE cs.LG | null | Several researchers have experimentally shown that substantial improvements
can be obtained in difficult pattern recognition problems by combining or
integrating the outputs of multiple classifiers. This chapter provides an
analytical framework to quantify the improvements in classification results due
to combining. The results apply to both linear combiners and order statistics
combiners. We first show that to a first order approximation, the error rate
obtained over and above the Bayes error rate, is directly proportional to the
variance of the actual decision boundaries around the Bayes optimum boundary.
Combining classifiers in output space reduces this variance, and hence reduces
the "added" error. If N unbiased classifiers are combined by simple averaging,
the added error rate can be reduced by a factor of N if the individual errors
in approximating the decision boundaries are uncorrelated. Expressions are then
derived for linear combiners which are biased or correlated, and the effect of
output correlations on ensemble performance is quantified. For order statistics
based non-linear combiners, we derive expressions that indicate how much the
median, the maximum and in general the ith order statistic can improve
classifier performance. The analysis presented here facilitates the
understanding of the relationships among error rates, classifier boundary
distributions, and combining in output space. Experimental results on several
public domain data sets are provided to illustrate the benefits of combining
and to support the analytical results.
| [
{
"version": "v1",
"created": "Thu, 20 May 1999 20:15:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tumer",
"Kagan",
""
],
[
"Ghosh",
"Joydeep",
""
]
] |
cs/9905013 | Kagan Tumer | Kagan Tumer and Joydeep Ghosh | Robust Combining of Disparate Classifiers through Order Statistics | 22 pages | null | null | UT-CVIS-TR-99-001 (The University of Texas) | cs.LG cs.CV cs.NE | null | Integrating the outputs of multiple classifiers via combiners or
meta-learners has led to substantial improvements in several difficult pattern
recognition problems. In the typical setting investigated till now, each
classifier is trained on data taken or resampled from a common data set, or
(almost) randomly selected subsets thereof, and thus experiences similar
quality of training data. However, in certain situations where data is acquired
and analyzed on-line at several geographically distributed locations, the
quality of data may vary substantially, leading to large discrepancies in
performance of individual classifiers. In this article we introduce and
investigate a family of classifiers based on order statistics, for robust
handling of such cases. Based on a mathematical modeling of how the decision
boundaries are affected by order statistic combiners, we derive expressions for
the reductions in error expected when such combiners are used. We show
analytically that the selection of the median, the maximum and in general, the
$i^{th}$ order statistic improves classification performance. Furthermore, we
introduce the trim and spread combiners, both based on linear combinations of
the ordered classifier outputs, and show that they are quite beneficial in
presence of outliers or uneven classifier performance. Experimental results on
several public domain data sets corroborate these findings.
| [
{
"version": "v1",
"created": "Thu, 20 May 1999 20:37:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tumer",
"Kagan",
""
],
[
"Ghosh",
"Joydeep",
""
]
] |
cs/9905014 | Dietterich | Thomas G. Dietterich | Hierarchical Reinforcement Learning with the MAXQ Value Function
Decomposition | 63 pages, 15 figures | null | null | null | cs.LG | null | This paper presents the MAXQ approach to hierarchical reinforcement learning
based on decomposing the target Markov decision process (MDP) into a hierarchy
of smaller MDPs and decomposing the value function of the target MDP into an
additive combination of the value functions of the smaller MDPs. The paper
defines the MAXQ hierarchy, proves formal results on its representational
power, and establishes five conditions for the safe use of state abstractions.
The paper presents an online model-free learning algorithm, MAXQ-Q, and proves
that it converges wih probability 1 to a kind of locally-optimal policy known
as a recursively optimal policy, even in the presence of the five kinds of
state abstraction. The paper evaluates the MAXQ representation and MAXQ-Q
through a series of experiments in three domains and shows experimentally that
MAXQ-Q (with state abstractions) converges to a recursively optimal policy much
faster than flat Q learning. The fact that MAXQ learns a representation of the
value function has an important benefit: it makes it possible to compute and
execute an improved, non-hierarchical policy via a procedure similar to the
policy improvement step of policy iteration. The paper demonstrates the
effectiveness of this non-hierarchical execution experimentally. Finally, the
paper concludes with a comparison to related work and a discussion of the
design tradeoffs in hierarchical reinforcement learning.
| [
{
"version": "v1",
"created": "Fri, 21 May 1999 14:26:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dietterich",
"Thomas G.",
""
]
] |
cs/9905015 | Dietterich | Thomas G. Dietterich | State Abstraction in MAXQ Hierarchical Reinforcement Learning | 7 pages, 2 figures | null | null | null | cs.LG | null | Many researchers have explored methods for hierarchical reinforcement
learning (RL) with temporal abstractions, in which abstract actions are defined
that can perform many primitive actions before terminating. However, little is
known about learning with state abstractions, in which aspects of the state
space are ignored. In previous work, we developed the MAXQ method for
hierarchical RL. In this paper, we define five conditions under which state
abstraction can be combined with the MAXQ value function decomposition. We
prove that the MAXQ-Q learning algorithm converges under these conditions and
show experimentally that state abstraction is important for the successful
application of MAXQ-Q learning.
| [
{
"version": "v1",
"created": "Fri, 21 May 1999 14:49:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dietterich",
"Thomas G.",
""
]
] |
cs/9905016 | Max Chaves | M. Chaves | Programs with Stringent Performance Objectives Will Often Exhibit
Chaotic Behavior | 7 pages, no figures | null | null | null | cs.CE cs.CC | null | Software for the resolution of certain kind of problems, those that rate high
in the Stringent Performance Objectives adjustment factor (IFPUG scheme), can
be described using a combination of game theory and autonomous systems. From
this description it can be shown that some of those problems exhibit chaotic
behavior, an important fact in understanding the functioning of the related
software. As a relatively simple example, it is shown that chess exhibits
chaotic behavior in its configuration space. This implies that static
evaluators in chess programs have intrinsic limitations.
| [
{
"version": "v1",
"created": "Thu, 27 May 1999 23:58:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chaves",
"M.",
""
]
] |
cs/9906003 | Melanie Siegel | Melanie Siegel | The syntactic processing of particles in Japanese spoken language | 8 pages | Proceedings of the 13th Pacific Asia Conference on Language,
Information and Computation. 1999 | null | null | cs.CL | null | Particles fullfill several distinct central roles in the Japanese language.
They can mark arguments as well as adjuncts, can be functional or have semantic
funtions. There is, however, no straightforward matching from particles to
functions, as, e.g., GA can mark the subject, the object or an adjunct of a
sentence. Particles can cooccur. Verbal arguments that could be identified by
particles can be eliminated in the Japanese sentence. And finally, in spoken
language particles are often omitted. A proper treatment of particles is thus
necessary to make an analysis of Japanese sentences possible. Our treatment is
based on an empirical investigation of 800 dialogues. We set up a type
hierarchy of particles motivated by their subcategorizational and
modificational behaviour. This type hierarchy is part of the Japanese syntax in
VERBMOBIL.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 12:03:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siegel",
"Melanie",
""
]
] |
cs/9906004 | Jorn Veenstra | Sabine Buchholz, Jorn Veenstra, Walter Daelemans | Cascaded Grammatical Relation Assignment | 8 pages, to appear in: proceedings of EMNLP/VLC-99, University of
Maryland, USA, June 21-22, 1999 | null | null | ILK-9908 | cs.CL cs.LG | null | In this paper we discuss cascaded Memory-Based grammatical relations
assignment. In the first stages of the cascade, we find chunks of several types
(NP,VP,ADJP,ADVP,PP) and label them with their adverbial function (e.g. local,
temporal). In the last stage, we assign grammatical relations to pairs of
chunks. We studied the effect of adding several levels to this cascaded
classifier and we found that even the less performing chunkers enhanced the
performance of the relation finder.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 13:41:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buchholz",
"Sabine",
""
],
[
"Veenstra",
"Jorn",
""
],
[
"Daelemans",
"Walter",
""
]
] |
cs/9906005 | Sabine Buchholz | Walter Daelemans, Sabine Buchholz, Jorn Veenstra | Memory-Based Shallow Parsing | 8 pages, to appear in: Proceedings of the EACL'99 workshop on
Computational Natural Language Learning (CoNLL-99), Bergen, Norway, June 1999 | null | null | ILK-9907 | cs.CL cs.LG | null | We present a memory-based learning (MBL) approach to shallow parsing in which
POS tagging, chunking, and identification of syntactic relations are formulated
as memory-based modules. The experiments reported in this paper show
competitive results, the F-value for the Wall Street Journal (WSJ) treebank is:
93.8% for NP chunking, 94.7% for VP chunking, 77.1% for subject detection and
79.0% for object detection.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 13:48:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daelemans",
"Walter",
""
],
[
"Buchholz",
"Sabine",
""
],
[
"Veenstra",
"Jorn",
""
]
] |
cs/9906006 | Khalil Sima'an | Khalil Sima'an | Learning Efficient Disambiguation | 222 pages | null | null | Ph.d. thesis, ILLC Dissertation Series number 1999-02, University of
Amsterdam | cs.CL cs.AI | null | This dissertation analyses the computational properties of current
performance-models of natural language parsing, in particular Data Oriented
Parsing (DOP), points out some of their major shortcomings and suggests
suitable solutions. It provides proofs that various problems of probabilistic
disambiguation are NP-Complete under instances of these performance-models, and
it argues that none of these models accounts for attractive efficiency
properties of human language processing in limited domains, e.g. that frequent
inputs are usually processed faster than infrequent ones. The central
hypothesis of this dissertation is that these shortcomings can be eliminated by
specializing the performance-models to the limited domains. The dissertation
addresses "grammar and model specialization" and presents a new framework, the
Ambiguity-Reduction Specialization (ARS) framework, that formulates the
necessary and sufficient conditions for successful specialization. The
framework is instantiated into specialization algorithms and applied to
specializing DOP. Novelties of these learning algorithms are 1) they limit the
hypotheses-space to include only "safe" models, 2) are expressed as constrained
optimization formulae that minimize the entropy of the training tree-bank given
the specialized grammar, under the constraint that the size of the specialized
model does not exceed a predefined maximum, and 3) they enable integrating the
specialized model with the original one in a complementary manner. The
dissertation provides experiments with initial implementations and compares the
resulting Specialized DOP (SDOP) models to the original DOP models with
encouraging results.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 15:50:26 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jun 1999 14:46:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sima'an",
"Khalil",
""
]
] |
cs/9906009 | Thorsten Brants | Thorsten Brants | Cascaded Markov Models | 8 pages | Proceedings of EACL-99, Bergen, Norway | null | null | cs.CL | null | This paper presents a new approach to partial parsing of context-free
structures. The approach is based on Markov Models. Each layer of the resulting
structure is represented by its own Markov Model, and output of a lower layer
is passed as input to the next higher layer. An empirical evaluation of the
method yields very good results for NP/PP chunking of German newspaper texts.
| [
{
"version": "v1",
"created": "Sun, 6 Jun 1999 17:36:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brants",
"Thorsten",
""
]
] |
cs/9906010 | Victor Makarov | Victor Makarov | Predicate Logic with Definitions | 15 pages | null | null | null | cs.LO cs.AI | null | Predicate Logic with Definitions (PLD or D-logic) is a modification of
first-order logic intended mostly for practical formalization of mathematics.
The main syntactic constructs of D-logic are terms, formulas and definitions. A
definition is a definition of variables, a definition of constants, or a
composite definition (D-logic has also abbreviation definitions called
abbreviations). Definitions can be used inside terms and formulas. This
possibility alleviates introducing new quantifier-like names. Composite
definitions allow constructing new definitions from existing ones.
| [
{
"version": "v1",
"created": "Mon, 7 Jun 1999 20:16:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Makarov",
"Victor",
""
]
] |
cs/9906013 | Karl Stroetmann | Sabine Glesner and Karl Stroetmann | Combining Inclusion Polymorphism and Parametric Polymorphism | 14 pages | null | null | null | cs.LO cs.PL | null | We show that the question whether a term is typable is decidable for type
systems combining inclusion polymorphism with parametric polymorphism provided
the type constructors are at most unary. To prove this result we first reduce
the typability problem to the problem of solving a system of type inequations.
The result is then obtained by showing that the solvability of the resulting
system of type inequations is decidable.
| [
{
"version": "v1",
"created": "Mon, 14 Jun 1999 09:42:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Glesner",
"Sabine",
""
],
[
"Stroetmann",
"Karl",
""
]
] |
cs/9906014 | Gertjan van Noord | Gert Veldhuijzen van Zanten and Gosse Bouma and Khalil Sima'an and
Gertjan van Noord and Remko Bonnema | Evaluation of the NLP Components of the OVIS2 Spoken Dialogue System | Proceedings of CLIN 99 | null | null | null | cs.CL | null | The NWO Priority Programme Language and Speech Technology is a 5-year
research programme aiming at the development of spoken language information
systems. In the Programme, two alternative natural language processing (NLP)
modules are developed in parallel: a grammar-based (conventional, rule-based)
module and a data-oriented (memory-based, stochastic, DOP) module. In order to
compare the NLP modules, a formal evaluation has been carried out three years
after the start of the Programme. This paper describes the evaluation procedure
and the evaluation results. The grammar-based component performs much better
than the data-oriented one in this comparison.
| [
{
"version": "v1",
"created": "Mon, 14 Jun 1999 10:06:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Zanten",
"Gert Veldhuijzen",
""
],
[
"Bouma",
"Gosse",
""
],
[
"Sima'an",
"Khalil",
""
],
[
"van Noord",
"Gertjan",
""
],
[
"Bonnema",
"Remko",
""
]
] |
cs/9906015 | Alexander Yeh | Lisa Ferro, Marc Vilain and Alexander Yeh | Learning Transformation Rules to Find Grammatical Relations | 10 pages. Uses latex-acl.sty and named.sty | Computational Natural Language Learning (CoNLL-99), pages 43-52,
June, 1999. Bergen, Norway | null | null | cs.CL | null | Grammatical relationships are an important level of natural language
processing. We present a trainable approach to find these relationships through
transformation sequences and error-driven learning. Our approach finds
grammatical relationships between core syntax groups and bypasses much of the
parsing phase. On our training and test set, our procedure achieves 63.6%
recall and 77.3% precision (f-score = 69.8).
| [
{
"version": "v1",
"created": "Mon, 14 Jun 1999 22:06:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ferro",
"Lisa",
""
],
[
"Vilain",
"Marc",
""
],
[
"Yeh",
"Alexander",
""
]
] |
cs/9906016 | Ken Samuel | Ken Samuel, Sandra Carberry, and K. Vijay-Shanker | Automatically Selecting Useful Phrases for Dialogue Act Tagging | 14 pages, published in PACLING'99 | Samuel, Ken and Carberry, Sandra and Vijay-Shanker, K. 1999.
Automatically Selecting Useful Phrases for Dialogue Act Tagging. In
Proceedings of the Fourth Conference of the Pacific Association for
Computational Linguistics. Waterloo, Ontario, Canada | null | null | cs.AI cs.LG | null | We present an empirical investigation of various ways to automatically
identify phrases in a tagged corpus that are useful for dialogue act tagging.
We found that a new method (which measures a phrase's deviation from an
optimally-predictive phrase), enhanced with a lexical filtering mechanism,
produces significantly better cues than manually-selected cue phrases, the
exhaustive set of phrases in a training corpus, and phrases chosen by
traditional metrics, like mutual information and information gain.
| [
{
"version": "v1",
"created": "Fri, 18 Jun 1999 03:25:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Samuel",
"Ken",
""
],
[
"Carberry",
"Sandra",
""
],
[
"Vijay-Shanker",
"K.",
""
]
] |
cs/9906017 | Rigo Michel | Michel Rigo | Generalization of automatic sequences for numeration systems on a
regular language | 10 pages, 3 figures | Theoret. Comput. Sci. 244 (2000) 271--281 | null | null | cs.CC | null | Let L be an infinite regular language on a totally ordered alphabet (A,<).
Feeding a finite deterministic automaton (with output) with the words of L
enumerated lexicographically with respect to < leads to an infinite sequence
over the output alphabet of the automaton. This process generalizes the concept
of k-automatic sequence for abstract numeration systems on a regular language
(instead of systems in base k). Here, I study the first properties of these
sequences and their relations with numeration systems.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 10:01:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rigo",
"Michel",
""
]
] |
cs/9906018 | Christoph Durr | Christoph Durr and Marek Chrobak | Reconstructing Polyatomic Structures from Discrete X-Rays:
NP-Completeness Proof for Three Atoms | null | Proceedings of the 23rd International Symposium on Mathematical
Foundations of Computer Science, LNCS vol 1450, 185-193, 1998 | null | null | cs.DS cs.CC | null | We address a discrete tomography problem that arises in the study of the
atomic structure of crystal lattices. A polyatomic structure T can be defined
as an integer lattice in dimension D>=2, whose points may be occupied by $c$
distinct types of atoms. To ``analyze'' T, we conduct ell measurements that we
call_discrete X-rays_. A discrete X-ray in direction xi determines the number
of atoms of each type on each line parallel to xi. Given ell such non-parallel
X-rays, we wish to reconstruct T.
The complexity of the problem for c=1 (one atom type) has been completely
determined by Gardner, Gritzmann and Prangenberg, who proved that the problem
is NP-complete for any dimension D>=2 and ell>=3 non-parallel X-rays, and that
it can be solved in polynomial time otherwise.
The NP-completeness result above clearly extends to any c>=2, and therefore
when studying the polyatomic case we can assume that ell=2. As shown in another
article by the same authors, this problem is also NP-complete for c>=6 atoms,
even for dimension D=2 and axis-parallel X-rays. They conjecture that the
problem remains NP-complete for c=3,4,5, although, as they point out, the proof
idea does not seem to extend to c<=5.
We resolve the conjecture by proving that the problem is indeed NP-complete
for c>=3 in 2D, even for axis-parallel X-rays. Our construction relies heavily
on some structure results for the realizations of 0-1 matrices with given row
and column sums.
| [
{
"version": "v1",
"created": "Mon, 21 Jun 1999 15:33:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Chrobak",
"Marek",
""
]
] |
cs/9906019 | Ion Androutsopoulos | G. Petasis, G. Paliouras, V. Karkaletsis, C. D. Spyropoulos and I.
Androutsopoulos (Software & Knowledge Engineering Lab, Institute of
Informatics & Telecommunications, NCSR Demokritos, Greece) | Resolving Part-of-Speech Ambiguity in the Greek Language Using Learning
Techniques | 6 pages. To appear in the Proceedings of the ECCAI Advanced Course on
Artificial Intelligence(ACAI'99), Chania, Greece, July 1999 | In Fakotakis, N. et al. (Eds.), Machine Learning in Human Language
Technology (Proceedings of the ACAI Workshop), pp. 29-34, Chania, Greece,
1999. | null | null | cs.CL cs.AI | null | This article investigates the use of Transformation-Based Error-Driven
learning for resolving part-of-speech ambiguity in the Greek language. The aim
is not only to study the performance, but also to examine its dependence on
different thematic domains. Results are presented here for two different test
cases: a corpus on "management succession events" and a general-theme corpus.
The two experiments show that the performance of this method does not depend on
the thematic domain of the corpus, and its accuracy for the Greek language is
around 95%.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 07:41:24 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jun 1999 14:46:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petasis",
"G.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Paliouras",
"G.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Karkaletsis",
"V.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Spyropoulos",
"C. D.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Androutsopoulos",
"I.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
]
] |
cs/9906020 | Ion Androutsopoulos | I. Androutsopoulos (Software & Knowledge Engineering Lab, Institute of
Informatics & Telecommunications, NCSR Demokritos, Greece) | Temporal Meaning Representations in a Natural Language Front-End | 15 pages. To appear in the Proceedings of the 12th International
Symposium on Languages for Intensional Programming, Athens, Greece, 1999 | In Gergatsoulis, M. and Rondogiannis, P. (Eds.), Intensional
Programming II (Proceedings of the 12th International Symposium on Languages
for Intensional Programming, Athens, Greece, 1999), pp. 197-213, World
Scientific, 2000. | null | null | cs.CL | null | Previous work in the context of natural language querying of temporal
databases has established a method to map automatically from a large subset of
English time-related questions to suitable expressions of a temporal logic-like
language, called TOP. An algorithm to translate from TOP to the TSQL2 temporal
database language has also been defined. This paper shows how TOP expressions
could be translated into a simpler logic-like language, called BOT. BOT is very
close to traditional first-order predicate logic (FOPL), and hence existing
methods to manipulate FOPL expressions can be exploited to interface to
time-sensitive applications other than TSQL2 databases, maintaining the
existing English-to-TOP mapping.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 08:28:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Androutsopoulos",
"I.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
]
] |
cs/9906021 | Christoph D\"urr | Christoph Durr and Marek Chrobak | Reconstructing hv-Convex Polyominoes from Orthogonal Projections | null | Information Processing Letters, 69, 1999, 283-289 | null | null | cs.DS | null | Tomography is the area of reconstructing objects from projections. Here we
wish to reconstruct a set of cells in a two dimensional grid, given the number
of cells in every row and column. The set is required to be an hv-convex
polyomino, that is all its cells must be connected and the cells in every row
and column must be consecutive. A simple, polynomial algorithm for
reconstructing hv-convex polyominoes is provided, which is several orders of
magnitudes faster than the best previously known algorithm from Barcucci et al.
In addition, the problem of reconstructing a special class of centered
hv-convex polyominoes is addressed. (An object is centered if it contains a row
whose length equals the total width of the object). It is shown that in this
case the reconstruction problem can be solved in linear time.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 09:56:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Chrobak",
"Marek",
""
]
] |
cs/9906022 | Joseph O'Rourke | Joseph O'Rourke and Irena Pashchenko | Zero-Parity Stabbing Information | null | Proc. Japan Conf. Discrete Comput. Geom. '98, Dec. 1998, 93--97 | null | null | cs.CG cs.DM | null | Everett et al. introduced several varieties of stabbing information for the
lines determined by pairs of vertices of a simple polygon P, and established
their relationships to vertex visibility and other combinatorial data. In the
same spirit, we define the ``zero-parity (ZP) stabbing information'' to be a
natural weakening of their ``weak stabbing information,'' retaining only the
distinction among {zero, odd, even>0} in the number of polygon edges stabbed.
Whereas the weak stabbing information's relation to visibility remains an open
problem, we completely settle the analogous questions for zero-parity
information, with three results: (1) ZP information is insufficient to
distinguish internal from external visibility graph edges; (2) but it does
suffice for all polygons that avoid a certain complex substructure; and (3) the
natural generalization of ZP information to the continuous case of smooth
curves does distinguish internal from external visibility.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 20:32:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
],
[
"Pashchenko",
"Irena",
""
]
] |
cs/9906023 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 35 | null | SIGACT News, 30(2) Issue #111 (1999) 31-32 | null | null | cs.CG | null | The subquadratic algorithm of Kapoor for finding shortest paths on a
polyhedron is described.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 20:40:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] |
cs/9906024 | Christoph D\"urr | Christoph Durr, Huong LeThanh and Miklos Santha | A decision procedure for well-formed linear quantum cellular automata | null | Random Structures and Algorithms 11, 381-394, 1997 | null | null | cs.DS cs.CC quant-ph | null | In this paper we introduce a new quantum computation model, the linear
quantum cellular automaton. Well-formedness is an essential property for any
quantum computing device since it enables us to define the probability of a
configuration in an observation as the squared magnitude of its amplitude. We
give an efficient algorithm which decides if a linear quantum cellular
automaton is well-formed. The complexity of the algorithm is $O(n^2)$ in the
algebraic model of computation if the input automaton has continuous
neighborhood.
| [
{
"version": "v1",
"created": "Wed, 23 Jun 1999 10:48:10 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Oct 2000 16:00:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"LeThanh",
"Huong",
""
],
[
"Santha",
"Miklos",
""
]
] |
cs/9906025 | Lluis Padro | J. Daude, L. Padro and G. Rigau (TALP Research Center. LSI Dept.
Universitat Politecnica de Catalunya. Barcelona) | Mapping Multilingual Hierarchies Using Relaxation Labeling | 8 pages. 1 eps figure | null | null | null | cs.CL | null | This paper explores the automatic construction of a multilingual Lexical
Knowledge Base from pre-existing lexical resources. We present a new and robust
approach for linking already existing lexical/semantic hierarchies. We used a
constraint satisfaction algorithm (relaxation labeling) to select --among all
the candidate translations proposed by a bilingual dictionary-- the right
English WordNet synset for each sense in a taxonomy automatically derived from
a Spanish monolingual dictionary. Although on average, there are 15 possible
WordNet connections for each sense in the taxonomy, the method achieves an
accuracy over 80%. Finally, we also propose several ways in which this
technique could be applied to enrich and improve existing lexical databases.
| [
{
"version": "v1",
"created": "Thu, 24 Jun 1999 16:56:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daude",
"J.",
"",
"TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona"
],
[
"Padro",
"L.",
"",
"TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona"
],
[
"Rigau",
"G.",
"",
"TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona"
]
] |
cs/9906027 | Gillian Callaghan | Yorick Wilks and Roberta Catizone | Human-Computer Conversation | 14 pages, 1 figure | null | null | CS-99-04 | cs.CL cs.HC | null | The article surveys a little of the history of the technology, sets out the
main current theoretical approaches in brief, and discusses the on-going
opposition between theoretical and empirical approaches. It illustrates the
situation with some discussion of CONVERSE, a system that won the Loebner prize
in 1997 and which displays features of both approaches.
| [
{
"version": "v1",
"created": "Fri, 25 Jun 1999 11:44:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wilks",
"Yorick",
""
],
[
"Catizone",
"Roberta",
""
]
] |
cs/9906028 | Edith Hemaspaandra | Edith Hemaspaandra | On the Power of Positive Turing Reductions | 7 pages | null | null | null | cs.CC | null | In the early 1980s, Selman's seminal work on positive Turing reductions
showed that positive Turing reduction to NP yields no greater computational
power than NP itself. Thus, positive Turing and Turing reducibility to NP
differ sharply unless the polynomial hierarchy collapses.
We show that the situation is quite different for DP, the next level of the
boolean hierarchy. In particular, positive Turing reduction to DP already
yields all (and only) sets Turing reducibility to NP. Thus, positive Turing and
Turing reducibility to DP yield the same class. Additionally, we show that an
even weaker class, P(NP[1]), can be substituted for DP in this context.
| [
{
"version": "v1",
"created": "Sat, 26 Jun 1999 23:31:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
]
] |
cs/9906029 | Marsha Chechik | M.Chechik, D.Paun | Events in Property Patterns | 14 pages, 3 figures | Lecture notes in Computer Science (Proceedings of 6 Spin'99
Workshop) | null | null | cs.SE cs.AI cs.CL cs.SC | null | A pattern-based approach to the presentation, codification and reuse of
property specifications for finite-state verification was proposed by Dwyer and
his collegues. The patterns enable non-experts to read and write formal
specifications for realistic systems and facilitate easy conversion of
specifications between formalisms, such as LTL, CTL, QRE. In this paper, we
extend the pattern system with events - changes of values of variables in the
context of LTL.
| [
{
"version": "v1",
"created": "Mon, 28 Jun 1999 17:06:51 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Jun 1999 16:28:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chechik",
"M.",
""
],
[
"Paun",
"D.",
""
]
] |
cs/9906030 | Marsha Chechik | M. Chechik | SCR3: towards usability of formal methods | 15 pages, 10 figures | Proceedings of CASCON'98, December 1998, pp. 177-191 | null | null | cs.SE | null | This paper gives an overview of SCR3 -- a toolset designed to increase the
usability of formal methods for software development. Formal requirements are
specified in SCR3 in an easy to use and review format, and then used in
checking requirements for correctness and in verifying consistency between
annotated code and requirements.
In this paper we discuss motivations behind this work, describe several tools
which are part of SCR3, and illustrate their operation on an example of a
Cruise Control system.
| [
{
"version": "v1",
"created": "Mon, 28 Jun 1999 17:30:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chechik",
"M.",
""
]
] |
cs/9906032 | Marsha Chechik | A. Wong and M. Chechik | Formal Modeling in a Commercial Setting: A Case Study | 18 pages, 5 figures, to appear in Proceedings of FM'99: World
Congress on Formal Methods, September 1999 | null | null | null | cs.SE | null | This paper describes a case study conducted in collaboration with Nortel to
demonstrate the feasibility of applying formal modeling techniques to
telecommunication systems. A formal description language, SDL, was chosen by
our qualitative CASE tool evaluation to model a multimedia-messaging system
described by an 80-page natural language specification. Our model was used to
identify errors in the software requirements document and to derive test
suites, shadowing the existing development process and keeping track of a
variety of productivity data.
| [
{
"version": "v1",
"created": "Tue, 29 Jun 1999 15:29:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wong",
"A.",
""
],
[
"Chechik",
"M.",
""
]
] |
cs/9906033 | Lane A. Hemaspaandra | Jin-Yi Cai, Lane A. Hemaspaandra, Gerd Wechsung | Robust Reductions | 26 pages; 1 figure; will appear in Theory of Computing Systems;
earlier versions appear as UR-CS-TR-666 and in COCOON 98 | null | null | null | cs.CC | null | We continue the study of robust reductions initiated by Gavalda and Balcazar.
In particular, a 1991 paper of Gavalda and Balcazar claimed an optimal
separation between the power of robust and nondeterministic strong reductions.
Unfortunately, their proof is invalid. We re-establish their theorem.
Generalizing robust reductions, we note that robustly strong reductions are
built from two restrictions, robust underproductivity and robust
overproductivity, both of which have been separately studied before in other
contexts. By systematically analyzing the power of these reductions, we explore
the extent to which each restriction weakens the power of reductions. We show
that one of these reductions yields a new, strong form of the Karp-Lipton
Theorem.
| [
{
"version": "v1",
"created": "Tue, 29 Jun 1999 18:26:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cai",
"Jin-Yi",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Wechsung",
"Gerd",
""
]
] |
cs/9906034 | Davide Turcato | Davide Turcato, Paul McFetridge, Fred Popowich, Janine Toole | A Unified Example-Based and Lexicalist Approach to Machine Translation | 11 pages, to be presented at the 8th International Conference on
Theoretical and Methodological Issues in Machine Translation (TMI-99) | null | null | null | cs.CL | null | We present an approach to Machine Translation that combines the ideas and
methodologies of the Example-Based and Lexicalist theoretical frameworks. The
approach has been implemented in a multilingual Machine Translation system.
| [
{
"version": "v1",
"created": "Wed, 30 Jun 1999 23:06:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turcato",
"Davide",
""
],
[
"McFetridge",
"Paul",
""
],
[
"Popowich",
"Fred",
""
],
[
"Toole",
"Janine",
""
]
] |
cs/9907003 | Steven Bird | Steven Bird and Mark Liberman | Annotation graphs as a framework for multidimensional linguistic data
analysis | 10 pages, 10 figures, Towards Standards and Tools for Discourse
Tagging, Proceedings of the Workshop. pp. 1-10. Association for Computational
Linguistics | null | null | null | cs.CL | null | In recent work we have presented a formal framework for linguistic annotation
based on labeled acyclic digraphs. These `annotation graphs' offer a simple yet
powerful method for representing complex annotation structures incorporating
hierarchy and overlap. Here, we motivate and illustrate our approach using
discourse-level annotations of text and speech data drawn from the CALLHOME,
COCONUT, MUC-7, DAMSL and TRAINS annotation schemes. With the help of domain
specialists, we have constructed a hybrid multi-level annotation for a fragment
of the Boston University Radio Speech Corpus which includes the following
levels: segment, word, breath, ToBI, Tilt, Treebank, coreference and named
entity. We show how annotation graphs can represent hybrid multi-level
structures which derive from a diverse set of file formats. We also show how
the approach facilitates substantive comparison of multiple annotations of a
single signal based on different theoretical models. The discussion shows how
annotation graphs open the door to wide-ranging integration of tools, formats
and corpora.
| [
{
"version": "v1",
"created": "Mon, 5 Jul 1999 14:51:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
],
[
"Liberman",
"Mark",
""
]
] |
cs/9907004 | Anand Venkataraman | Anand Venkataraman | MAP Lexicon is useful for segmentation and word discovery in
child-directed speech | Because of rather fundamental changes to the underlying model
proposed in the paper, it has been withdrawn from the archive. | null | null | null | cs.CL cs.LG | null | Because of rather fundamental changes to the underlying model proposed in the
paper, it has been withdrawn from the archive.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 01:44:00 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Oct 1999 00:31:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venkataraman",
"Anand",
""
]
] |
cs/9907005 | Eirik Fossgaard | Eirik Fossgaard | Alternative Local Discriminant Bases Using Empirical Expectation and
Variance Estimation | 11 pages | null | null | null | cs.NA | null | We propose alternative discriminant measures for selecting the best basis
among a large collection of orthonormal bases for classification purposes. A
generalization of the Local Discriminant Basis Algorithm of Saito and Coifman
is constructed. The success of these new methods is evaluated and compared to
earlier methods in experiments.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 11:48:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fossgaard",
"Eirik",
""
]
] |
cs/9907006 | Erik Tjong Kim Sang | Erik F. Tjong Kim Sang and Jorn Veenstra | Representing Text Chunks | 7 pages | EACL'99, Bergen | null | null | cs.CL | null | Dividing sentences in chunks of words is a useful preprocessing step for
parsing, information extraction and information retrieval. (Ramshaw and Marcus,
1995) have introduced a "convenient" data representation for chunking by
converting it to a tagging task. In this paper we will examine seven different
data representations for the problem of recognizing noun phrase chunks. We will
show that the the data representation choice has a minor influence on chunking
performance. However, equipped with the most suitable data representation, our
memory-based learning chunker was able to improve the best published chunking
results for a standard data set.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 12:44:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sang",
"Erik F. Tjong Kim",
""
],
[
"Veenstra",
"Jorn",
""
]
] |
cs/9907007 | Atsushi Fujii | Atsushi Fujii and Tetsuya Ishikawa | Cross-Language Information Retrieval for Technical Documents | 9 pages, 5 Postscript figures, uses colacl.sty and psfig.tex | Proceedings of the Joint ACL SIGDAT Conference on Empirical
Methods in Natural Language Processing and Very Large Corpora, pp.29-37, 1999 | null | null | cs.CL | null | This paper proposes a Japanese/English cross-language information retrieval
(CLIR) system targeting technical documents. Our system first translates a
given query containing technical terms into the target language, and then
retrieves documents relevant to the translated query. The translation of
technical terms is still problematic in that technical terms are often compound
words, and thus new terms can be progressively created simply by combining
existing base words. In addition, Japanese often represents loanwords based on
its phonogram. Consequently, existing dictionaries find it difficult to achieve
sufficient coverage. To counter the first problem, we use a compound word
translation method, which uses a bilingual dictionary for base words and
collocational statistics to resolve translation ambiguity. For the second
problem, we propose a transliteration method, which identifies phonetic
equivalents in the target language. We also show the effectiveness of our
system using a test collection for CLIR.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 16:25:46 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jul 1999 09:12:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/9907008 | Janine Toole | Janine Toole, Fred Popowich, Devlan Nicholson, Davide Turcato, Paul
McFetridge | Explanation-based Learning for Machine Translation | 12 pages, 3 figures, To appear in Proceedings of the 8th
International Conference on Theoretical and Methodological Issues in Machine
Translation | null | null | null | cs.CL | null | In this paper we present an application of explanation-based learning (EBL)
in the parsing module of a real-time English-Spanish machine translation system
designed to translate closed captions. We discuss the efficiency/coverage
trade-offs available in EBL and introduce the techniques we use to increase
coverage while maintaining a high level of space and time efficiency. Our
performance results indicate that this approach is effective.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 18:35:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toole",
"Janine",
""
],
[
"Popowich",
"Fred",
""
],
[
"Nicholson",
"Devlan",
""
],
[
"Turcato",
"Davide",
""
],
[
"McFetridge",
"Paul",
""
]
] |
cs/9907010 | David Elworthy | David Elworthy | Language Identification With Confidence Limits | 8 pages; needs colacl.sty. Appeared in Proceedings of the Sixth
Workshop on Very Large Corpora (COLING-ACL 98) | null | null | null | cs.CL | null | A statistical classification algorithm and its application to language
identification from noisy input are described. The main innovation is to
compute confidence limits on the classification, so that the algorithm
terminates when enough evidence to make a clear decision has been made, and so
avoiding problems with categories that have similar characteristics. A second
application, to genre identification, is briefly examined. The results show
that some of the problems of other language identification techniques can be
avoided, and illustrate a more important point: that a statistical language
process can be used to provide feedback about its own success rate.
| [
{
"version": "v1",
"created": "Wed, 7 Jul 1999 09:28:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Elworthy",
"David",
""
]
] |
cs/9907011 | Ming-Yang Kao | Zhi-Zhong Chen and Ming-Yang Kao | Reducing Randomness via Irrational Numbers | null | SIAM Journal on Computing, 29(4):1247--1256, 2000 | null | null | cs.DS cs.DM | null | We propose a general methodology for testing whether a given polynomial with
integer coefficients is identically zero. The methodology evaluates the
polynomial at efficiently computable approximations of suitable irrational
points. In contrast to the classical technique of DeMillo, Lipton, Schwartz,
and Zippel, this methodology can decrease the error probability by increasing
the precision of the approximations instead of using more random bits.
Consequently, randomized algorithms that use the classical technique can
generally be improved using the new methodology. To demonstrate the
methodology, we discuss two nontrivial applications. The first is to decide
whether a graph has a perfect matching in parallel. Our new NC algorithm uses
fewer random bits while doing less work than the previously best NC algorithm
by Chari, Rohatgi, and Srinivasan. The second application is to test the
equality of two multisets of integers. Our new algorithm improves upon the
previously best algorithms by Blum and Kannan and can speed up their checking
algorithm for sorting programs on a large range of inputs.
| [
{
"version": "v1",
"created": "Wed, 7 Jul 1999 23:39:27 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Nov 2000 14:39:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Zhi-Zhong",
""
],
[
"Kao",
"Ming-Yang",
""
]
] |
cs/9907012 | Guido Minnen | Guido Minnen (University of Sussex) | Selective Magic HPSG Parsing | 9 pages, LaTeX with 4 postscript figures (uses avm.sty, eaclap.sty
and psfig-scale.sty) | Proceedings of EACL99, Bergen, Norway, June 8-11 | null | null | cs.CL | null | We propose a parser for constraint-logic grammars implementing HPSG that
combines the advantages of dynamic bottom-up and advanced top-down control. The
parser allows the user to apply magic compilation to specific constraints in a
grammar which as a result can be processed dynamically in a bottom-up and
goal-directed fashion. State of the art top-down processing techniques are used
to deal with the remaining constraints. We discuss various aspects concerning
the implementation of the parser as part of a grammar development system.
| [
{
"version": "v1",
"created": "Thu, 8 Jul 1999 09:46:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Minnen",
"Guido",
"",
"University of Sussex"
]
] |
cs/9907013 | Guido Minnen | John Carroll, Guido Minnen (University of Sussex), Ted Briscoe
(Cambridge University) | Corpus Annotation for Parser Evaluation | 7 pages, LaTeX (uses eaclap.sty) | Proceedings of the EACL99 workshop on Linguistically Interpreted
Corpora (LINC), Bergen, Norway, June 12 | null | null | cs.CL | null | We describe a recently developed corpus annotation scheme for evaluating
parsers that avoids shortcomings of current methods. The scheme encodes
grammatical relations between heads and dependents, and has been used to mark
up a new public-domain corpus of naturally occurring English text. We show how
the corpus can be used to evaluate the accuracy of a robust parser, and relate
the corpus to extant resources.
| [
{
"version": "v1",
"created": "Thu, 8 Jul 1999 10:08:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carroll",
"John",
"",
"University of Sussex"
],
[
"Minnen",
"Guido",
"",
"University of Sussex"
],
[
"Briscoe",
"Ted",
"",
"Cambridge University"
]
] |
cs/9907016 | Jim Gray | Tom Barclay Jim Gray Don Slutz | Microsoft TerraServer: A Spatial Data Warehouse | Original MSword format at
http://research.microsoft.com/~gray/papers/MS_TR_99_30_TerraServer.doc | null | null | Microsoft Research Technical Report MSR-TR-99-29 | cs.DB cs.DL | null | The TerraServer stores aerial, satellite, and topographic images of the earth
in a SQL database available via the Internet. It is the world's largest online
atlas, combining five terabytes of image data from the United States Geological
Survey (USGS) and SPIN-2. This report describes the system-redesign based on
our experience over the last year. It also reports usage and operations results
over the last year -- over 2 billion web hits and over 20 Terabytes of imagry
served over the Internet. Internet browsers provide intuitive spatial and text
interfaces to the data. Users need no special hardware, software, or knowledge
to locate and browse imagery. This paper describes how terabytes of "Internet
unfriendly" geo-spatial images were scrubbed and edited into hundreds of
millions of "Internet friendly" image tiles and loaded into a SQL data
warehouse. Microsoft TerraServer demonstrates that general-purpose relational
database technology can manage large scale image repositories, and shows that
web browsers can be a good geospatial image presentation system.
| [
{
"version": "v1",
"created": "Fri, 9 Jul 1999 21:30:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slutz",
"Tom Barclay Jim Gray Don",
""
]
] |
cs/9907017 | Davide Turcato | Davide Turcato, Paul McFetridge, Fred Popowich and Janine Toole | A Bootstrap Approach to Automatically Generating Lexical Transfer Rules | 8 pages, 1 figure, to be presented at Machine Translation Summit VII,
September 13-17, 1999, Singapore | null | null | null | cs.CL | null | We describe a method for automatically generating Lexical Transfer Rules
(LTRs) from word equivalences using transfer rule templates. Templates are
skeletal LTRs, unspecified for words. New LTRs are created by instantiating a
template with words, provided that the words belong to the appropriate lexical
categories required by the template. We define two methods for creating an
inventory of templates and using them to generate new LTRs. A simpler method
consists of extracting a finite set of templates from a sample of hand coded
LTRs and directly using them in the generation process. A further method
consists of abstracting over the initial finite set of templates to define
higher level templates, where bilingual equivalences are defined in terms of
correspondences involving phrasal categories. Phrasal templates are then mapped
onto sets of lexical templates with the aid of grammars. In this way an
infinite set of lexical templates is recursively defined. New LTRs are created
by parsing input words, matching a template at the phrasal level and using the
corresponding lexical categories to instantiate the lexical template. The
definition of an infinite set of templates enables the automatic creation of
LTRs for multi-word, non-compositional word equivalences of any cardinality.
| [
{
"version": "v1",
"created": "Fri, 9 Jul 1999 22:39:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turcato",
"Davide",
""
],
[
"McFetridge",
"Paul",
""
],
[
"Popowich",
"Fred",
""
],
[
"Toole",
"Janine",
""
]
] |
cs/9907018 | Erik Demaine | Erik D. Demaine, Martin L. Demaine, David Eppstein, Greg N.
Frederickson, Erich Friedman | Hinged Dissection of Polyominoes and Polyforms | 27 pages, 39 figures. Accepted to Computational Geometry: Theory and
Applications. v3 incorporates several comments by referees. v2 added many new
results and a new coauthor (Frederickson) | null | null | null | cs.CG cs.DM | null | A hinged dissection of a set of polygons S is a collection of polygonal
pieces hinged together at vertices that can be folded into any member of S. We
present a hinged dissection of all edge-to-edge gluings of n congruent copies
of a polygon P that join corresponding edges of P. This construction uses kn
pieces, where k is the number of vertices of P. When P is a regular polygon, we
show how to reduce the number of pieces to ceiling(k/2)*(n-1). In particular,
we consider polyominoes (made up of unit squares), polyiamonds (made up of
equilateral triangles), and polyhexes (made up of regular hexagons). We also
give a hinged dissection of all polyabolos (made up of right isosceles
triangles), which do not fall under the general result mentioned above.
Finally, we show that if P can be hinged into Q, then any edge-to-edge gluing
of n congruent copies of P can be hinged into any edge-to-edge gluing of n
congruent copies of Q.
| [
{
"version": "v1",
"created": "Sat, 10 Jul 1999 21:29:56 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Oct 1999 01:54:07 GMT"
},
{
"version": "v3",
"created": "Sun, 23 Mar 2003 13:29:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Eppstein",
"David",
""
],
[
"Frederickson",
"Greg N.",
""
],
[
"Friedman",
"Erich",
""
]
] |
cs/9907019 | Craig Bordelon | Craig Bordelon | A Reasonable C++ Wrappered Java Native Interface | 27 pages, 18 figures; Submitted to Software Practice & Experience;
Withdrawn after 3 month negotiation failed to reach compromise on copyright
(Wiley Publisher vs. Telcordia Technologies); jH software inquiries to
http://www.telcordia.com | null | null | null | cs.SE | null | A reasonable C++ Java Native Interface (JNI) technique termed C++ Wrappered
JNI (C++WJ) is presented. The technique simplifies current error-prone JNI
development by wrappering JNI calls. Provided development is done with the aid
of a C++ compiler, C++WJ offers type checking and behind the scenes caching. A
tool (jH) patterned on javah automates the creation of C++WJ classes.
The paper presents the rationale behind the choices that led to C++WJ.
Handling of Java class and interface hierarchy including Java type downcasts is
discussed. Efficiency considerations in the C++WJ lead to two flavors of C++
classes: jtypes and Jtypes. A jtype is a lightweight less than full wrapper of
a JNI object reference. A Jtype is a heavyweight full wrapper of a JNI object
reference.
| [
{
"version": "v1",
"created": "Mon, 12 Jul 1999 13:34:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bordelon",
"Craig",
""
]
] |
cs/9907022 | Satoru Kuroda | Satoru Kuroda | Weak length induction and slow growing depth boolean circuits | null | null | null | null | cs.LO | null | We define a hierarchy of circuit complexity classes LD^i, whose depth are the
inverse of a function in Ackermann hierarchy. Then we introduce extremely weak
versions of length induction and construct a bounded arithmetic theory L^i_2
whose provably total functions exactly correspond to functions computable by
LD^i circuits. Finally, we prove a non-conservation result between L^i_2 and a
weaker theory AC^0CA which corresponds to the class AC^0. Our proof utilizes
KPT witnessing theorem.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 08:41:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuroda",
"Satoru",
""
]
] |
cs/9907023 | Devillers | Olivier Devillers | On Deletion in Delaunay Triangulation | 15 pages 5 figures. in Proc. 15th Annu. ACM Sympos. Comput. Geom.,
181--188, 1999 | null | null | INRIA Research report 3451 | cs.CG | null | This paper presents how the space of spheres and shelling may be used to
delete a point from a $d$-dimensional triangulation efficiently. In dimension
two, if k is the degree of the deleted vertex, the complexity is O(k log k),
but we notice that this number only applies to low cost operations, while time
consuming computations are only done a linear number of times.
This algorithm may be viewed as a variation of Heller's algorithm, which is
popular in the geographic information system community. Unfortunately, Heller
algorithm is false, as explained in this paper.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 13:25:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
]
] |
cs/9907024 | Devillers | Olivier Devillers | Improved Incremental Randomized Delaunay Triangulation | 19 pages, 7 figures Proc. 14th Annu. ACM Sympos. Comput. Geom.,
106--115, 1998 | null | null | INRIA Research Report 3298 | cs.CG | null | We propose a new data structure to compute the Delaunay triangulation of a
set of points in the plane. It combines good worst case complexity, fast
behavior on real data, and small memory occupation.
The location structure is organized into several levels. The lowest level
just consists of the triangulation, then each level contains the triangulation
of a small sample of the levels below. Point location is done by marching in a
triangulation to determine the nearest neighbor of the query at that level,
then the march restarts from that neighbor at the level below. Using a small
sample (3%) allows a small memory occupation; the march and the use of the
nearest neighbor to change levels quickly locate the query.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 12:44:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
]
] |
cs/9907025 | Devillers | Herve Bronnimann, Olivier Devillers | The union of unit balls has quadratic complexity, even if they all
contain the origin | 5 pages, 5 figures | null | null | null | cs.CG | null | We provide a lower bound construction showing that the union of unit balls in
three-dimensional space has quadratic complexity, even if they all contain the
origin. This settles a conjecture of Sharir.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 15:20:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bronnimann",
"Herve",
""
],
[
"Devillers",
"Olivier",
""
]
] |
cs/9907026 | Tovena | Emanuele Pianta, Lucia M. Tovena | Mixing representation levels: The hybrid approach to automatic text
generation | 6 pages | Proceedings of the AISB'99 Workshop on ``Reference Architectures
and Data Standards for NLP'', Edinburgh Scotland, April 1999, 8-13 | null | null | cs.CL cs.AI | null | Natural language generation systems (NLG) map non-linguistic representations
into strings of words through a number of steps using intermediate
representations of various levels of abstraction. Template based systems, by
contrast, tend to use only one representation level, i.e. fixed strings, which
are combined, possibly in a sophisticated way, to generate the final text.
In some circumstances, it may be profitable to combine NLG and template based
techniques. The issue of combining generation techniques can be seen in more
abstract terms as the issue of mixing levels of representation of different
degrees of linguistic abstraction. This paper aims at defining a reference
architecture for systems using mixed representations. We argue that mixed
representations can be used without abandoning a linguistically grounded
approach to language generation.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 15:43:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pianta",
"Emanuele",
""
],
[
"Tovena",
"Lucia M.",
""
]
] |
cs/9907027 | Andrea Schaerf | Krzysztof R. Apt and Andrea Schaerf | The Alma Project, or How First-Order Logic Can Help Us in Imperative
Programming | 25 pages | null | null | null | cs.LO cs.PL | null | The aim of the Alma project is the design of a strongly typed constraint
programming language that combines the advantages of logic and imperative
programming. The first stage of the project was the design and implementation
of Alma-0, a small programming language that provides a support for declarative
programming within the imperative programming framework. It is obtained by
extending a subset of Modula-2 by a small number of features inspired by the
logic programming paradigm. In this paper we discuss the rationale for the
design of Alma-0, the benefits of the resulting hybrid programming framework,
and the current work on adding constraint processing capabilities to the
language. In particular, we discuss the role of the logical and customary
variables, the interaction between the constraint store and the program, and
the need for lists.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 1999 09:36:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Schaerf",
"Andrea",
""
]
] |
cs/9907028 | Devillers | Olivier Devillers and Franco P. Preparata | Further Results on Arithmetic Filters for Geometric Predicates | 7 pages 2 figures presented at the 15th European Workshop Comput.
Geom., 113--116, 1999 improve previous results (in other paper) | Comput. Geom. Theory Appl. 1999 13:141-148 | null | INRIA Research report 3528 | cs.CG | null | An efficient technique to solve precision problems consists in using exact
computations. For geometric predicates, using systematically expensive exact
computations can be avoided by the use of filters. The predicate is first
evaluated using rounding computations, and an error estimation gives a
certificate of the validity of the result. In this note, we studies the
statistical efficiency of filters for cosphericity predicate with an assumption
of regular distribution of the points. We prove that the expected value of the
polynomial corresponding to the in sphere test is greater than epsilon with
probability O(epsilon log 1/epsilon) improving the results of a previous paper
by the same authors.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 1999 15:09:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
],
[
"Preparata",
"Franco P.",
""
]
] |
cs/9907029 | Devillers | Olivier Devillers and Franco P. Preparata | A Probabilistic Analysis of the Power of Arithmetic Filters | 22 pages 7 figures Results for in sphere test inproved in
cs.CG/9907028 | Discrete and Computational Geometry, 20:523--547, 1998 | null | INRIA Research report 2971 | cs.CG | null | The assumption of real-number arithmetic, which is at the basis of
conventional geometric algorithms, has been seriously challenged in recent
years, since digital computers do not exhibit such capability.
A geometric predicate usually consists of evaluating the sign of some
algebraic expression. In most cases, rounded computations yield a reliable
result, but sometimes rounded arithmetic introduces errors which may invalidate
the algorithms. The rounded arithmetic may produce an incorrect result only if
the exact absolute value of the algebraic expression is smaller than some
(small) varepsilon, which represents the largest error that may arise in the
evaluation of the expression. The threshold varepsilon depends on the structure
of the expression and on the adopted computer arithmetic, assuming that the
input operands are error-free.
A pair (arithmetic engine,threshold) is an "arithmetic filter". In this paper
we develop a general technique for assessing the efficacy of an arithmetic
filter. The analysis consists of evaluating both the threshold and the
probability of failure of the filter.
To exemplify the approach, under the assumption that the input points be
chosen randomly in a unit ball or unit cube with uniform density, we analyze
the two important predicates "which-side" and "insphere". We show that the
probability that the absolute values of the corresponding determinants be no
larger than some positive value V, with emphasis on small V, is Theta(V) for
the which-side predicate, while for the insphere predicate it is Theta(V^(2/3))
in dimension 1, O(sqrt(V)) in dimension 2, and O(sqrt(V) ln(1/V)) in higher
dimensions. Constants are small, and are given in the paper.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 1999 15:22:19 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jul 1999 07:27:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
],
[
"Preparata",
"Franco P.",
""
]
] |
cs/9907032 | Clare Dixon | Michael Fisher (1), Clare Dixon (1), Martin Peim (2) ((1) Department
of Computing and Mathematics, Manchester Metropolitan University, Manchester,
UK, (2) Department of Computer Science, Victoria University of Manchester,
Manchester, UK) | Clausal Temporal Resolution | 35 pages, 0 figures Expanded related work, corrected typos, expanded
proofs | null | null | null | cs.LO cs.AI | null | In this article, we examine how clausal resolution can be applied to a
specific, but widely used, non-classical logic, namely discrete linear temporal
logic. Thus, we first define a normal form for temporal formulae and show how
arbitrary temporal formulae can be translated into the normal form, while
preserving satisfiability. We then introduce novel resolution rules that can be
applied to formulae in this normal form, provide a range of examples and
examine the correctness and complexity of this approach is examined and. This
clausal resolution approach. Finally, we describe related work and future
developments concerning this work.
| [
{
"version": "v1",
"created": "Wed, 21 Jul 1999 15:48:06 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Apr 2000 10:13:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fisher",
"Michael",
""
],
[
"Dixon",
"Clare",
""
],
[
"Peim",
"Martin",
""
]
] |
cs/9907033 | Joerg Rothe | Lane A. Hemaspaandra and Joerg Rothe | Unambiguous Computation: Boolean Hierarchies and Sparse Turing-Complete
Sets | 27 pages | SIAM Journal on Computing vol. 26, no. 3, pp. 634--653, 1997 | null | earlier version appeared as University of Rochester TR-94-483 | cs.CC | null | It is known that for any class C closed under union and intersection, the
Boolean closure of C, the Boolean hierarchy over C, and the symmetric
difference hierarchy over C all are equal. We prove that these equalities hold
for any complexity class closed under intersection; in particular, they thus
hold for unambiguous polynomial time (UP). In contrast to the NP case, we prove
that the Hausdorff hierarchy and the nested difference hierarchy over UP both
fail to capture the Boolean closure of UP in some relativized worlds.
Karp and Lipton proved that if nondeterministic polynomial time has sparse
Turing-complete sets, then the polynomial hierarchy collapses. We establish the
first consequences from the assumption that unambiguous polynomial time has
sparse Turing-complete sets: (a) UP is in Low_2, where Low_2 is the second
level of the low hierarchy, and (b) each level of the unambiguous polynomial
hierarchy is contained one level lower in the promise unambiguous polynomial
hierarchy than is otherwise known to be the case.
| [
{
"version": "v1",
"created": "Mon, 26 Jul 1999 10:09:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9907034 | Joerg Rothe | Lane A. Hemaspaandra, Zhigen Jiang, Joerg Rothe and Osamu Watanabe | Polynomial-Time Multi-Selectivity | 40 pages | Journal of Universal Computer Science vol. 3, no. 3, pp. 197--229,
1997 | null | earlier version appeared as FSU Jena TR Math/Inf/96/11 | cs.CC | null | We introduce a generalization of Selman's P-selectivity that yields a more
flexible notion of selectivity, called (polynomial-time) multi-selectivity, in
which the selector is allowed to operate on multiple input strings. Since our
introduction of this class, it has been used to prove the first known (and
optimal) lower bounds for generalized selectivity-like classes in terms of
EL_2, the second level of the extended low hierarchy. We study the resulting
selectivity hierarchy, denoted by SH, which we prove does not collapse. In
particular, we study the internal structure and the properties of SH and
completely establish, in terms of incomparability and strict inclusion, the
relations between our generalized selectivity classes and Ogihara's P-mc
(polynomial-time membership-comparable) classes. Although SH is a strictly
increasing infinite hierarchy, we show that the core results that hold for the
P-selective sets and that prove them structurally simple also hold for SH. In
particular, all sets in SH have small circuits; the NP sets in SH are in Low_2,
the second level of the low hierarchy within NP; and SAT cannot be in SH unless
P = NP. Finally, it is known that P-Sel, the class of P-selective sets, is not
closed under union or intersection. We provide an extended selectivity
hierarchy that is based on SH and that is large enough to capture those
closures of the P-selective sets, and yet, in contrast with the P-mc classes,
is refined enough to distinguish them.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 20:55:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Jiang",
"Zhigen",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Watanabe",
"Osamu",
""
]
] |
cs/9907035 | Joerg Rothe | Lane A. Hemaspaandra, Joerg Rothe and Gerd Wechsung | Easy Sets and Hard Certificate Schemes | 26 pages | Acta Informatica vol. 34, no 11, pp. 859--879, 1997 | null | earlier version appeared as FSU Jena TR Math/95/5 | cs.CC | null | Can easy sets only have easy certificate schemes? In this paper, we study the
class of sets that, for all NP certificate schemes (i.e., NP machines), always
have easy acceptance certificates (i.e., accepting paths) that can be computed
in polynomial time. We also study the class of sets that, for all NP
certificate schemes, infinitely often have easy acceptance certificates.
In particular, we provide equivalent characterizations of these classes in
terms of relative generalized Kolmogorov complexity, showing that they are
robust. We also provide structural conditions---regarding immunity and class
collapses---that put upper and lower bounds on the sizes of these two classes.
Finally, we provide negative results showing that some of our positive claims
are optimal with regard to being relativizable. Our negative results are proven
using a novel observation: we show that the classical ``wide spacing'' oracle
construction technique yields instant non-bi-immunity results. Furthermore, we
establish a result that improves upon Baker, Gill, and Solovay's classical
result that NP \neq P = NP \cap coNP holds in some relativized world.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 21:05:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Wechsung",
"Gerd",
""
]
] |
cs/9907036 | Joerg Rothe | Edith Hemaspaandra, Lane A. Hemaspaandra and Joerg Rothe | Exact Analysis of Dodgson Elections: Lewis Carroll's 1876 Voting System
is Complete for Parallel Access to NP | 22 pages | Journal of the ACM vol. 44, no. 6, pp. 806--825, 1997 | null | earlier version appeared as University of Rochester TR-96-640 | cs.CC | null | In 1876, Lewis Carroll proposed a voting system in which the winner is the
candidate who with the fewest changes in voters' preferences becomes a
Condorcet winner---a candidate who beats all other candidates in pairwise
majority-rule elections. Bartholdi, Tovey, and Trick provided a lower
bound---NP-hardness---on the computational complexity of determining the
election winner in Carroll's system. We provide a stronger lower bound and an
upper bound that matches our lower bound. In particular, determining the winner
in Carroll's system is complete for parallel access to NP, i.e., it is complete
for $\thetatwo$, for which it becomes the most natural complete problem known.
It follows that determining the winner in Carroll's elections is not
NP-complete unless the polynomial hierarchy collapses.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 21:16:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9907037 | Joerg Rothe | Lane A. Hemaspaandra, Zhigen Jiang, Joerg Rothe and Osamu Watanabe | Boolean Operations, Joins, and the Extended Low Hierarchy | 12 pages | Theoretical Computer Science vol. 205, no. 1-2, pp. 317--327, 1998 | null | earlier version appeared as University of Rochester TR-96-627 | cs.CC | null | We prove that the join of two sets may actually fall into a lower level of
the extended low hierarchy than either of the sets. In particular, there exist
sets that are not in the second level of the extended low hierarchy, EL_2, yet
their join is in EL_2. That is, in terms of extended lowness, the join operator
can lower complexity. Since in a strong intuitive sense the join does not lower
complexity, our result suggests that the extended low hierarchy is unnatural as
a complexity measure. We also study the closure properties of EL_ and prove
that EL_2 is not closed under certain Boolean operations. To this end, we
establish the first known (and optimal) EL_2 lower bounds for certain notions
generalizing Selman's P-selectivity, which may be regarded as an interesting
result in its own right.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 21:30:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Jiang",
"Zhigen",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Watanabe",
"Osamu",
""
]
] |
cs/9907038 | Joerg Rothe | Lane A. Hemaspaandra and Joerg Rothe | A Second Step Towards Complexity-Theoretic Analogs of Rice's Theorem | 14 pages. To appear in Theoretical Computer Science | null | null | earlier version appeared as University of Rochester TR-97-662 | cs.CC | null | Rice's Theorem states that every nontrivial language property of the
recursively enumerable sets is undecidable. Borchert and Stephan initiated the
search for complexity-theoretic analogs of Rice's Theorem. In particular, they
proved that every nontrivial counting property of circuits is UP-hard, and that
a number of closely related problems are SPP-hard.
The present paper studies whether their UP-hardness result itself can be
improved to SPP-hardness. We show that their UP-hardness result cannot be
strengthened to SPP-hardness unless unlikely complexity class containments
hold. Nonetheless, we prove that every P-constructibly bi-infinite counting
property of circuits is SPP-hard. We also raise their general lower bound from
unambiguous nondeterminism to constant-ambiguity nondeterminism.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 21:39:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9907039 | Joerg Rothe | Edith Hemaspaandra, Lane A. Hemaspaandra and Joerg Rothe | Raising NP Lower Bounds to Parallel NP Lower Bounds | 14 pages | SIGACT News vol. 28, no. 2, pp. 2--13, 1997 | null | earlier version appeared as University of Rochester TR-97-658 | cs.CC | null | A decade ago, a beautiful paper by Wagner developed a ``toolkit'' that in
certain cases allows one to prove problems hard for parallel access to NP.
However, the problems his toolkit applies to most directly are not overly
natural. During the past year, problems that previously were known only to be
NP-hard or coNP-hard have been shown to be hard even for the class of sets
solvable via parallel access to NP. Many of these problems are longstanding and
extremely natural, such as the Minimum Equivalent Expression problem (which was
the original motivation for creating the polynomial hierarchy), the problem of
determining the winner in the election system introduced by Lewis Carroll in
1876, and the problem of determining on which inputs heuristic algorithms
perform well. In the present article, we survey this recent progress in raising
lower bounds.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 21:47:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9907040 | Joerg Rothe | Joerg Rothe and Lane A. Hemaspaandra | Characterizations of the Existence of Partial and Total One-Way
Permutations | 12 pages; An extended abstract of this paper was presented at the
Third Italian Conference on Algorithms and Complexity | null | null | null | cs.CC cs.CR | null | In this note, we study the easy certificate classes introduced by
Hemaspaandra, Rothe, and Wechsung, with regard to the question of whether or
not surjective one-way functions exist. This is an important open question in
cryptology. We show that the existence of partial one-way permutations can be
characterized by separating P from the class of UP sets that, for all
unambiguous polynomial-time Turing machines accepting them, always have easy
(i.e., polynomial-time computable) certificates. This extends results of
Grollmann and Selman. By Gr\"adel's recent results about one-way functions,
this also links statements about easy certificates of NP sets with statements
in finite model theory. Similarly, there exist surjective poly-one one-way
functions if and only if there is a set L in P such that not all FewP machines
accepting L always have easy certificates. We also establish a condition
necessary and sufficient for the existence of (total) one-way permutations.
| [
{
"version": "v1",
"created": "Mon, 26 Jul 1999 10:42:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rothe",
"Joerg",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
cs/9907041 | Joerg Rothe | Bernd Borchert, Lane A. Hemaspaandra and Joerg Rothe | Restrictive Acceptance Suffices for Equivalence Problems | 14 pages; to appear in Proc. FCT'99 | null | null | Revises Friedrich-Schiller-Universit\"at Jena Technical Report
Math/Inf/96/13 | cs.CC | null | One way of suggesting that an NP problem may not be NP-complete is to show
that it is in the class UP. We suggest an analogous new approach---weaker in
strength of evidence but more broadly applicable---to suggesting that
concrete~NP problems are not NP-complete. In particular we introduce the class
EP, the subclass of NP consisting of those languages accepted by NP machines
that when they accept always have a number of accepting paths that is a power
of two. Since if any NP-complete set is in EP then all NP sets are in EP, it
follows---with whatever degree of strength one believes that EP differs from
NP---that membership in EP can be viewed as evidence that a problem is not
NP-complete.
We show that the negation equivalence problem for OBDDs (ordered binary
decision diagrams) and the interchange equivalence problem for 2-dags are in
EP. We also show that for boolean negation the equivalence problem is in
EP^{NP}, thus tightening the existing NP^{NP} upper bound. We show that FewP,
bounded ambiguity polynomial time, is contained in EP, a result that is not
known to follow from the previous SPP upper bound. For the three problems and
classes just mentioned with regard to EP, no proof of membership/containment in
UP is known, and for the problem just mentioned with regard to EP^{NP}, no
proof of membership in UP^{NP} is known. Thus, EP is indeed a tool that gives
evidence against NP-completeness in natural cases where UP cannot currently be
applied.
| [
{
"version": "v1",
"created": "Mon, 26 Jul 1999 10:50:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borchert",
"Bernd",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9907042 | Scott Nicholson | Scott Nicholson | Raising Reliability of Web Search Tool Research through Replication and
Chaos Theory | null | null | null | null | cs.IR cs.DL | null | Because the World Wide Web is a dynamic collection of information, the Web
search tools (or "search engines") that index the Web are dynamic. Traditional
information retrieval evaluation techniques may not provide reliable results
when applied to the Web search tools. This study is the result of ten
replications of the classic 1996 Ding and Marchionini Web search tool research.
It explores the effects that replication can have on transforming unreliable
results from one iteration into replicable and therefore reliable results after
multiple iterations.
| [
{
"version": "v1",
"created": "Tue, 27 Jul 1999 16:42:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nicholson",
"Scott",
""
]
] |
cs/9907043 | Christoph Best | Christoph Best (ZIB, Berlin, and J. v. Neumann Institute, Juelich) | A simple C++ library for manipulating scientific data sets as structured
data | 22 pages, LaTeX. Also available at
http://www.zib.de/PaperWeb/abstracts/TR-98-06/ | null | null | TR 98-06 (ZIB Berlin) | cs.CE cs.DB | null | Representing scientific data sets efficiently on external storage usually
involves converting them to a byte string representation using specialized
reader/writer routines. The resulting storage files are frequently difficult to
interpret without these specialized routines as they do not contain information
about the logical structure of the data. Avoiding such problems usually
involves heavy-weight data format libraries or data base systems. We present a
simple C++ library that allows to create and access data files that store
structured data. The structure of the data is described by a data type that can
be built from elementary data types (integer and floating-point numbers, byte
strings) and composite data types (arrays, structures, unions). An abstract
data access class presents the data to the application. Different actual data
file structures can be implemented under this layer. This method is
particularly suited to applications that require complex data structures, e.g.
molecular dynamics simulations. Extensions such as late type binding and object
persistence are discussed.
| [
{
"version": "v1",
"created": "Fri, 30 Jul 1999 08:35:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Best",
"Christoph",
"",
"ZIB, Berlin, and J. v. Neumann Institute, Juelich"
]
] |
cs/9908001 | Zvi Marx | Zvika Marx (1 and 2), Ido Dagan (1), Eli Shamir (2) ((1) Bar-Ilan
University, (2) The Hebrew University of Jerusalem) | Detecting Sub-Topic Correspondence through Bipartite Term Clustering | html with 3 gif figures; generated from 7 pages MS-Word file | Proceedings of ACL'99 Workshop on Unsupervised Learning in Natural
Language Processing, 1999, pp 45-51 | null | null | cs.CL | null | This paper addresses a novel task of detecting sub-topic correspondence in a
pair of text fragments, enhancing common notions of text similarity. This task
is addressed by coupling corresponding term subsets through bipartite
clustering. The paper presents a cost-based clustering scheme and compares it
with a bipartite version of the single-link method, providing illustrating
results.
| [
{
"version": "v1",
"created": "Sun, 1 Aug 1999 14:02:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marx",
"Zvika",
"",
"1 and 2"
],
[
"Dagan",
"Ido",
""
],
[
"Shamir",
"Eli",
""
]
] |
cs/9908003 | Erik Demaine | Marshall Bern, Erik D. Demaine, David Eppstein, Eric Kuo, Andrea
Mantler, Jack Snoeyink | Ununfoldable Polyhedra with Convex Faces | 14 pages, 9 figures, LaTeX 2e. To appear in Computational Geometry:
Theory and Applications. Major revision with two new authors, solving the
open problem about triangular faces | Computational Geometry: Theory and Applications 24(2):51-62,
February 2003 | null | null | cs.CG cs.DM | null | Unfolding a convex polyhedron into a simple planar polygon is a well-studied
problem. In this paper, we study the limits of unfoldability by studying
nonconvex polyhedra with the same combinatorial structure as convex polyhedra.
In particular, we give two examples of polyhedra, one with 24 convex faces and
one with 36 triangular faces, that cannot be unfolded by cutting along edges.
We further show that such a polyhedron can indeed be unfolded if cuts are
allowed to cross faces. Finally, we prove that ``open'' polyhedra with
triangular faces may not be unfoldable no matter how they are cut.
| [
{
"version": "v1",
"created": "Tue, 3 Aug 1999 17:37:04 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Aug 2001 20:42:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bern",
"Marshall",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Eppstein",
"David",
""
],
[
"Kuo",
"Eric",
""
],
[
"Mantler",
"Andrea",
""
],
[
"Snoeyink",
"Jack",
""
]
] |
cs/9908004 | Patrik Simons | Patrik Simons | Extending the Stable Model Semantics with More Expressive Rules | 18 pages, a shortened version will be published in the proceedings of
the 5th International Conference on Logic Programming and Nonmonotonic
Reasoning (LPNMR'99) | null | null | null | cs.LO cs.AI | null | The rules associated with propositional logic programs and the stable model
semantics are not expressive enough to let one write concise programs. This
problem is alleviated by introducing some new types of propositional rules.
Together with a decision procedure that has been used as a base for an
efficient implementation, the new rules supplant the standard ones in practical
applications of the stable model semantics.
| [
{
"version": "v1",
"created": "Fri, 6 Aug 1999 06:01:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Simons",
"Patrik",
""
]
] |
cs/9908005 | Joseph O'Rourke | Roxana Cocan and Joseph O'Rourke | Polygonal Chains Cannot Lock in 4D | Major revision of the Aug. 1999 version, including: Proof extended to
show trees cannot lock in 4D; new example of the implementation straightening
a chain of n=100 vertices; improved time complexity for chain to O(n^2);
fixed several minor technical errors. (Thanks to three referees.) 29 pages;
15 figures. v3: Reference updated | null | null | Smith Technical Report 063 | cs.CG cs.DM | null | We prove that, in all dimensions d>=4, every simple open polygonal chain and
every tree may be straightened, and every simple closed polygonal chain may be
convexified. These reconfigurations can be achieved by algorithms that use
polynomial time in the number of vertices, and result in a polynomial number of
``moves.'' These results contrast to those known for d=2, where trees can
``lock,'' and for d=3, where open and closed chains can lock.
| [
{
"version": "v1",
"created": "Wed, 11 Aug 1999 16:09:59 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Feb 2001 21:48:48 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Feb 2001 19:10:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cocan",
"Roxana",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/9908006 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 36 | To appear in SIGACT News and in Int. J. Comp. Geom. Appl., 1999.
Replacement corrects disk-packing reference: [BDDH98] -> [BDEH98] | null | null | null | cs.CG | null | Two results in "computational origami" are illustrated.
| [
{
"version": "v1",
"created": "Wed, 11 Aug 1999 17:14:00 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Aug 1999 13:46:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] |
cs/9908007 | Joseph O'Rourke | Erik D. Demaine and Joseph O'Rourke | Computational Geometry Column 37 | To appear in SIGACT News, and in Int. J. Comp. Geom. Appl., 1999 | null | null | null | cs.CG | null | Open problems from the 15th Annual ACM Symposium on Computational Geometry.
| [
{
"version": "v1",
"created": "Wed, 11 Aug 1999 17:19:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/9908008 | Dahlia Malkhi | Dahlia Malkhi, Michael Merritt and Ohad Rodeh | Secure Multicast in a WAN | preprint of a paper to appear in the Distributed Computing Journal | null | null | null | cs.CR cs.DC | null | A secure reliable multicast protocol enables a process to send a message to a
group of recipients such that all correct destinations receive the same
message, despite the malicious efforts of fewer than a third of the total
number of processes, including the sender. This has been sh own to be a useful
tool in building secure distributed services, albeit with a cost that typically
grows linearly with the size of the system. For very large networks, for which
this is prohibitive, we present two approaches for reducing the cost: First, we
show a protocol whose cost is on the order of the number of tolerated failures.
Secondly, we show how relaxing the consistency requirement to a probabilistic
guarantee can reduce the associated cost, effectively to a constant.
| [
{
"version": "v1",
"created": "Thu, 12 Aug 1999 17:40:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malkhi",
"Dahlia",
""
],
[
"Merritt",
"Michael",
""
],
[
"Rodeh",
"Ohad",
""
]
] |
cs/9908009 | Dahlia Malkhi | Dahlia Malkhi and Michael Reiter | Secure Execution of Java Applets using a Remote Playground | preprint of a paper to appear in IEEE Transactions on Software
Engineering | null | null | null | cs.CR cs.NI | null | Mobile code presents a number of threats to machines that execute it. We
introduce an approach for protecting machines and the resources they hold from
mobile code, and describe a system based on our approach for protecting host
machines from Java 1.1 applets. In our approach, each Java applet downloaded to
the protected domain is rerouted to a dedicated machine (or set of machines),
the {\em playground}, at which it is executed. Prior to execution the applet is
transformed to use the downloading user's web browser as a graphics terminal
for its input and output, and so the user has the illusion that the applet is
running on her own machine. In reality, however, mobile code runs only in the
sanitized environment of the playground, where user files cannot be mounted and
from which only limited network connections are accepted by machines in the
protected domain. Our playground thus provides a second level of defense
against mobile code that circumvents language-based defenses. The paper
presents the design and implementation of a playground for Java 1.1 applets,
and discusses extensions of it for other forms of mobile code including Java
1.2.
| [
{
"version": "v1",
"created": "Thu, 12 Aug 1999 17:50:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malkhi",
"Dahlia",
""
],
[
"Reiter",
"Michael",
""
]
] |
cs/9908010 | Dahlia Malkhi | Dahlia Malkhi, Yishay Mansour and Michael Reiter | On Propagating Updates in a Byzantine Environment | null | null | null | null | cs.DC cs.CR | null | We study how to efficiently diffuse updates to a large distributed system of
data replicas, some of which may exhibit arbitrary (Byzantine) failures. We
assume that strictly fewer than $t$ replicas fail, and that each update is
initially received by at least $t$ correct replicas. The goal is to diffuse
each update to all correct replicas while ensuring that correct replicas accept
no updates generated spuriously by faulty replicas. To achieve reliable
diffusion, each correct replica accepts an update only after receiving it from
at least $t$ others. We provide the first analysis of epidemic-style protocols
for such environments. This analysis is fundamentally different from known
analyses for the benign case due to our treatment of fully Byzantine
failures---which, among other things, precludes the use of digital signatures
for authenticating forwarded updates. We propose two epidemic-style diffusion
algorithms and two measures that characterize the efficiency of diffusion
algorithms in general. We characterize both of our algorithms according to
these measures, and also prove lower bounds with regards to these measures that
show that our algorithms are close to optimal.
| [
{
"version": "v1",
"created": "Thu, 12 Aug 1999 18:00:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malkhi",
"Dahlia",
""
],
[
"Mansour",
"Yishay",
""
],
[
"Reiter",
"Michael",
""
]
] |
cs/9908011 | Dahlia Malkhi | Dahlia Malkhi, Michael Reiter and Avishai Wool | The Load and Availability of Byzantine Quorum Systems | preprint of a paper to appear in the SIAM Journal of Computing | null | null | null | cs.DC cs.CR | null | Replicated services accessed via {\em quorums} enable each access to be
performed at only a subset (quorum) of the servers, and achieve consistency
across accesses by requiring any two quorums to intersect. Recently,
$b$-masking quorum systems, whose intersections contain at least $2b+1$
servers, have been proposed to construct replicated services tolerant of $b$
arbitrary (Byzantine) server failures. In this paper we consider a hybrid fault
model allowing benign failures in addition to the Byzantine ones. We present
four novel constructions for $b$-masking quorum systems in this model, each of
which has optimal {\em load} (the probability of access of the busiest server)
or optimal availability (probability of some quorum surviving failures). To
show optimality we also prove lower bounds on the load and availability of any
$b$-masking quorum system in this model.
| [
{
"version": "v1",
"created": "Thu, 12 Aug 1999 18:06:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malkhi",
"Dahlia",
""
],
[
"Reiter",
"Michael",
""
],
[
"Wool",
"Avishai",
""
]
] |
cs/9908012 | H. M. Gladney | H.M. Gladney | Safe Deals Between Strangers | 31 pages, 6 figures | null | null | null | cs.CR cs.DL | null | E-business, information serving, and ubiquitous computing will create heavy
request traffic from strangers or even incognitos. Such requests must be
managed automatically. Two ways of doing this are well known: giving every
incognito consumer the same treatment, and rendering service in return for
money. However, different behavior will be often wanted, e.g., for a university
library with different access policies for undergraduates, graduate students,
faculty, alumni, citizens of the same state, and everyone else.
For a data or process server contacted by client machines on behalf of users
not previously known, we show how to provide reliable automatic access
administration conforming to service agreements. Implementations scale well
from very small collections of consumers and producers to immense client/server
networks. Servers can deliver information, effect state changes, and control
external equipment.
Consumer privacy is easily addressed by the same protocol. We support
consumer privacy, but allow servers to deny their resources to incognitos. A
protocol variant even protects against statistical attacks by consortia of
service organizations.
One e-commerce application would put the consumer's tokens on a smart card
whose readers are in vending kiosks. In e-business we can simplify supply chain
administration. Our method can also be used in sensitive networks without
introducing new security loopholes.
| [
{
"version": "v1",
"created": "Tue, 17 Aug 1999 01:09:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gladney",
"H. M.",
""
]
] |
cs/9908014 | Kagan Tumer | David H. Wolpert and Kagan Tumer | An Introduction to Collective Intelligence | 88 pages, 10 figs, 297 refs | null | null | NASA-ARC-IC-99-63 | cs.LG adap-org cond-mat cs.DC cs.MA nlin.AO | null | This paper surveys the emerging science of how to design a ``COllective
INtelligence'' (COIN). A COIN is a large multi-agent system where:
(i) There is little to no centralized communication or control; and
(ii) There is a provided world utility function that rates the possible
histories of the full system.
In particular, we are interested in COINs in which each agent runs a
reinforcement learning (RL) algorithm. Rather than use a conventional modeling
approach (e.g., model the system dynamics, and hand-tune agents to cooperate),
we aim to solve the COIN design problem implicitly, via the ``adaptive''
character of the RL algorithms of each of the agents. This approach introduces
an entirely new, profound design problem: Assuming the RL algorithms are able
to achieve high rewards, what reward functions for the individual agents will,
when pursued by those agents, result in high world utility? In other words,
what reward functions will best ensure that we do not have phenomena like the
tragedy of the commons, Braess's paradox, or the liquidity trap?
Although still very young, research specifically concentrating on the COIN
design problem has already resulted in successes in artificial domains, in
particular in packet-routing, the leader-follower problem, and in variants of
Arthur's El Farol bar problem. It is expected that as it matures and draws upon
other disciplines related to COINs, this research will greatly expand the range
of tasks addressable by human engineers. Moreover, in addition to drawing on
them, such a fully developed scie nce of COIN design may provide much insight
into other already established scientific fields, such as economics, game
theory, and population biology.
| [
{
"version": "v1",
"created": "Tue, 17 Aug 1999 22:49:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolpert",
"David H.",
""
],
[
"Tumer",
"Kagan",
""
]
] |
cs/9908015 | Simon Buckingham Shum | Simon Buckingham Shum, Enrico Motta and John Domingue | Representing Scholarly Claims in Internet Digital Libraries: A Knowledge
Modelling Approach | 18 pages. Preprint, to appear: Proceedings of ECDL'99: Third European
Conference on Research and Advanced Technology for Digital Libraries, Paris,
France, September 22-24, 1999. Springer-Verlag Lecture Notes in Computer
Science (Eds.) Serge Abiteboul and Anne-Marie Vercoustre | null | null | KMI-TR-80 | cs.DL cs.AI cs.HC cs.IR | null | This paper is concerned with tracking and interpreting scholarly documents in
distributed research communities. We argue that current approaches to document
description, and current technological infrastructures particularly over the
World Wide Web, provide poor support for these tasks. We describe the design of
a digital library server which will enable authors to submit a summary of the
contributions they claim their documents makes, and its relations to the
literature. We describe a knowledge-based Web environment to support the
emergence of such a community-constructed semantic hypertext, and the services
it could provide to assist the interpretation of an idea or document in the
context of its literature. The discussion considers in detail how the approach
addresses usability issues associated with knowledge structuring environments.
| [
{
"version": "v1",
"created": "Thu, 19 Aug 1999 09:51:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shum",
"Simon Buckingham",
""
],
[
"Motta",
"Enrico",
""
],
[
"Domingue",
"John",
""
]
] |
cs/9908016 | David Eppstein | Marshall Bern and David Eppstein | Quadrilateral Meshing by Circle Packing | 12 pages, 10 figures. To appear in Int. J. Comp. Geom. & Appl. A
preliminary version of this work was presented at the 6th Int. Meshing
Roundtable, Park City, Utah, 1997 | Int. J. Comp. Geom. & Appl. 10(4):347-360, Aug. 2000 | null | null | cs.CG | null | We use circle-packing methods to generate quadrilateral meshes for polygonal
domains, with guaranteed bounds both on the quality and the number of elements.
We show that these methods can generate meshes of several types: (1) the
elements form the cells of a Voronoi diagram, (2) all elements have two
opposite right angles, (3) all elements are kites, or (4) all angles are at
most 120 degrees. In each case the total number of elements is O(n), where n is
the number of input vertices.
| [
{
"version": "v1",
"created": "Thu, 19 Aug 1999 20:40:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bern",
"Marshall",
""
],
[
"Eppstein",
"David",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.