id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-21 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/9904001
Bruce Edmonds
Bruce Edmonds
A Proposal for the Establishment of Review Boards - a flexible approach to the selection of academic knowledge
Other formats at http://www.cpm.mmu.ac.uk/cpmrep50.html
null
null
CPM-99-50
cs.CY cs.DL cs.IR
null
Paper journals use a small number of trusted academics to select information on behalf of all their readers. This inflexibility in the selection was justified due to the expense of publishing. The advent of cheap distribution via the internet allows a new trade-off between time and expense and the flexibility of the selection process. This paper explores one such possible process one where the role of mark-up and archiving is separated from that of review. The idea is that authors publish their papers on their own web pages or in a public paper archive, a board of reviewers judge that paper on a number of different criteria. The detailed results of the reviews are stored in such a way as to enable readers to use these judgements to find the papers they want using search engines on the web. Thus instead of journals using generic selection criteria readers can set their own to suit their needs. The resulting system might be even cheaper than web-journals to implement.
[ { "version": "v1", "created": "Thu, 1 Apr 1999 07:54:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Edmonds", "Bruce", "" ] ]
cs/9904004
Mark Lee
Mark Lee and John Barnden
Mixing Metaphors
null
Proceedings of the AISB'99 Symposium on Metaphor, Artificial Intelligence, and Cognition, pages 11-16, Edinburgh
null
null
cs.CL cs.AI
null
Mixed metaphors have been neglected in recent metaphor research. This paper suggests that such neglect is short-sighted. Though mixing is a more complex phenomenon than straight metaphors, the same kinds of reasoning and knowledge structures are required. This paper provides an analysis of both parallel and serial mixed metaphors within the framework of an AI system which is already capable of reasoning about straight metaphorical manifestations and argues that the processes underlying mixing are central to metaphorical meaning. Therefore, any theory of metaphors must be able to account for mixing.
[ { "version": "v1", "created": "Mon, 12 Apr 1999 11:37:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Mark", "" ], [ "Barnden", "John", "" ] ]
cs/9904005
Walter Eaves
Walter Eaves
Transport Level Security: a proof using the Gong-Needham-Yahalom Logic
22 pages, 2 figures, 1 appendix
null
null
null
cs.CR
null
This paper provides a proof of the proposed Internet standard Transport Level Security protocol using the Gong-Needham-Yahalom logic. It is intended as a teaching aid and hopes to show to students: the potency of a formal method for protocol design; some of the subtleties of authenticating parties on a network where all messages can be intercepted; the design of what should be a widely accepted standard.
[ { "version": "v1", "created": "Wed, 14 Apr 1999 20:05:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Eaves", "Walter", "" ] ]
cs/9904008
Gertjan van Noord
Dale Gerdemann and Gertjan van Noord
Transducers from Rewrite Rules with Backreferences
8 pages, EACL 1999 Bergen
null
null
null
cs.CL
null
Context sensitive rewrite rules have been widely used in several areas of natural language processing, including syntax, morphology, phonology and speech processing. Kaplan and Kay, Karttunen, and Mohri & Sproat have given various algorithms to compile such rewrite rules into finite-state transducers. The present paper extends this work by allowing a limited form of backreferencing in such rules. The explicit use of backreferencing leads to more elegant and general solutions.
[ { "version": "v1", "created": "Thu, 15 Apr 1999 14:00:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Gerdemann", "Dale", "" ], [ "van Noord", "Gertjan", "" ] ]
cs/9904009
Mark Lee
Mark Lee and Yorick Wilks
An ascription-based approach to speech acts
6 pages
Proceedings of COLING`96, Copenhagen. (1996)
null
null
cs.CL
null
The two principal areas of natural language processing research in pragmatics are belief modelling and speech act processing. Belief modelling is the development of techniques to represent the mental attitudes of a dialogue participant. The latter approach, speech act processing, based on speech act theory, involves viewing dialogue in planning terms. Utterances in a dialogue are modelled as steps in a plan where understanding an utterance involves deriving the complete plan a speaker is attempting to achieve. However, previous speech act based approaches have been limited by a reliance upon relatively simplistic belief modelling techniques and their relationship to planning and plan recognition. In particular, such techniques assume precomputed nested belief structures. In this paper, we will present an approach to speech act processing based on novel belief modelling techniques where nested beliefs are propagated on demand.
[ { "version": "v1", "created": "Thu, 15 Apr 1999 16:03:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Mark", "" ], [ "Wilks", "Yorick", "" ] ]
cs/9904010
Lorrie Cranor
Lorrie Faith Cranor, Joseph Reagle, and Mark S. Ackerman
Beyond Concern: Understanding Net Users' Attitudes About Online Privacy
5 figures and appendix
null
null
AT&T Labs-Research Technical Report TR 99.4.3
cs.CY cs.HC
null
People are concerned about privacy, particularly on the Internet. While many studies have provided evidence of this concern, few have explored the nature of the concern in detail, especially for the online environment. With this study, we have tried to better understand the nature of online privacy concerns; we look beyond the fact that people are concerned and attempt to understand how they are concerned. We hope our results will help inform both policy decisions as well as the development of technology tools that can assist Internet users in protecting their privacy. We present results here from the analysis of 381 questionnaires completed between November 6 and November 13, 1998 by American Internet users. The sample was drawn from the FamilyPC magazine/Digital Research, Inc. Family Panel. While this is not a statistically representative sample of US Internet users, our respondents are heavy Internet users, and quite possibly lead innovators. As such, we believe that this sample is important for understanding the future Internet user population.
[ { "version": "v1", "created": "Sun, 18 Apr 1999 19:04:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Cranor", "Lorrie Faith", "" ], [ "Reagle", "Joseph", "" ], [ "Ackerman", "Mark S.", "" ] ]
cs/9904011
Yin Zhang
Yin Zhang
WebScript -- A Scripting Language for the Web
19 pages, 11 figures
null
null
null
cs.NI cs.PL
null
WebScript is a scripting language for processing Web documents. Designed as an extension to Jacl, the Java implementation of Tcl, WebScript allows programmers to manipulate HTML in the same way as Tcl manipulates text strings and GUI elements. This leads to a completely new way of writing the next generation of Web applications. This paper presents the motivation behind the design and implementation of WebScript, an overview of its major features, as well as some demonstrations of its power.
[ { "version": "v1", "created": "Wed, 21 Apr 1999 19:21:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Yin", "" ] ]
cs/9904013
Stephen F. Bush
Stephen F. Bush and Victor S. Frost and Joseph B. Evans
Network Management of Predictive Mobile Networks
null
Journal of Network and Systems Management, volume 7, number 2, June, 1999
null
null
cs.NI
null
There is a trend toward the use of predictive systems in communications networks. At the systems and network management level predictive capabilities are focused on anticipating network faults and performance degradation. Simultaneously, mobile communication networks are being developed with predictive location and tracking mechanisms. The interactions and synergies between these systems present a new set of problems. A new predictive network management framework is developed and examined. The interaction between a predictive mobile network and the proposed network management system is discussed. The Rapidly Deployable Radio Network is used as a specific example to illustrate these interactions.
[ { "version": "v1", "created": "Wed, 21 Apr 1999 21:58:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ], [ "Frost", "Victor S.", "" ], [ "Evans", "Joseph B.", "" ] ]
cs/9904014
Stephen F. Bush
Stephen F. Bush and Sunil Jagannath and Joseph B. Evans and Victor Frost and Gary Minden and K. Sam Shanmugan
A Control and Management Network for Wireless ATM Systems
author's web page at http://www.crd.ge.com/people/bush
ACM-Baltzer Wireless Networks (WINET), volume 3, pages 267-283,1997
null
null
cs.NI
null
This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reuse. This paper also proposes a novel Virtual Network Configuration (VNC) algorithm for predictive network configuration. A mobile ATM Private Network-Network Interface (PNNI) based on VNC is also discussed. Finally, as a prelude to the system implementation, results of a Maisie simulation of the orderwire system are discussed.
[ { "version": "v1", "created": "Thu, 22 Apr 1999 12:58:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ], [ "Jagannath", "Sunil", "" ], [ "Evans", "Joseph B.", "" ], [ "Frost", "Victor", "" ], [ "Minden", "Gary", "" ], [ "Shanmugan", "K. Sam", "" ] ]
cs/9904017
David R. Hanson
David R. Hanson
A Machine-Independent Debugger--Revisited
12 pages; 6 figures; 3 tables
Software--Practice & Experience, vol. 29, no. 10, 849-862, Aug. 1999
null
Microsoft Research MSR-TR-99-04
cs.PL cs.SE
null
Most debuggers are notoriously machine-dependent, but some recent research prototypes achieve varying degrees of machine-independence with novel designs. Cdb, a simple source-level debugger for C, is completely independent of its target architecture. This independence is achieved by embedding symbol tables and debugging code in the target program, which costs both time and space. This paper describes a revised design and implementation of cdb that reduces the space cost by nearly one-half and the time cost by 13% by storing symbol tables in external files. A symbol table is defined by a 31-line grammar in the Abstract Syntax Description Language (ASDL). ASDL is a domain-specific language for specifying tree data structures. The ASDL tools accept an ASDL grammar and generate code to construct, read, and write these data structures. Using ASDL automates implementing parts of the debugger, and the grammar documents the symbol table concisely. Using ASDL also suggested simplifications to the interface between the debugger and the target program. Perhaps most important, ASDL emphasizes that symbol tables are data structures, not file formats. Many of the pitfalls of working with low-level file formats can be avoided by focusing instead on high-level data structures and automating the implementation details.
[ { "version": "v1", "created": "Fri, 23 Apr 1999 18:34:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Hanson", "David R.", "" ] ]
cs/9904019
Ronald de Wolf
H. Buhrman (CWI), R. Cleve (U.Calgary), R. de Wolf (CWI and U.Amsterdam), and Ch. Zalka (LANL)
Bounds for Small-Error and Zero-Error Quantum Algorithms
11 pages, LaTeX. New title and some sections are rewritten. This version to appear in IEEE FOCS'99
null
null
null
cs.CC quant-ph
null
We present a number of results related to quantum algorithms with small error probability and quantum algorithms that are zero-error. First, we give a tight analysis of the trade-offs between the number of queries of quantum search algorithms, their error probability, the size of the search space, and the number of solutions in this space. Using this, we deduce new lower and upper bounds for quantum versions of amplification problems. Next, we establish nearly optimal quantum-classical separations for the query complexity of monotone functions in the zero-error model (where our quantum zero-error model is defined so as to be robust when the quantum gates are noisy). Also, we present a communication complexity problem related to a total function for which there is a quantum-classical communication complexity gap in the zero-error model. Finally, we prove separations for monotone graph properties in the zero-error and other error models which imply that the evasiveness conjecture for such properties does not hold for quantum computers.
[ { "version": "v1", "created": "Mon, 26 Apr 1999 08:54:21 GMT" }, { "version": "v2", "created": "Tue, 17 Aug 1999 12:05:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Buhrman", "H.", "", "CWI" ], [ "Cleve", "R.", "", "U.Calgary" ], [ "de Wolf", "R.", "", "CWI and\n U.Amsterdam" ], [ "Zalka", "Ch.", "", "LANL" ] ]
cs/9904020
Walter Eaves
Walter Eaves
ODP channel objects that provide services transparently for distributing processing systems
35 pages, 10 figures
null
null
null
cs.DC cs.OS
null
This paper describes an architecture for a distributing processing system that would allow remote procedure calls to invoke other services as messages are passed between clients and servers. It proposes that an additional class of data processing objects be located in the software communications channel. The objects in this channel would then be used to enforce protocols on client-server applications without any additional effort by the application programmers. For example, services such as key-management, time-stamping, sequencing and encryption can be implemented at different levels of the software communications stack to provide a complete authentication service. A distributing processing environment could be used to control broadband network data delivery. Architectures and invocation semantics are discussed, Example classes and interfaces for channel objects are given in the Java programming language.
[ { "version": "v1", "created": "Mon, 26 Apr 1999 21:13:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Eaves", "Walter", "" ] ]
cs/9905001
Rebecca Hwa
Rebecca Hwa
Supervised Grammar Induction Using Training Data with Limited Constituent Information
7 pages, 2 figures, to appear in the proc. of ACL '99
null
null
null
cs.CL
null
Corpus-based grammar induction generally relies on hand-parsed training data to learn the structure of the language. Unfortunately, the cost of building large annotated corpora is prohibitively expensive. This work aims to improve the induction strategy when there are few labels in the training data. We show that the most informative linguistic constituents are the higher nodes in the parse trees, typically denoting complex noun phrases and sentential clauses. They account for only 20% of all constituents. For inducing grammars from sparsely labeled training data (e.g., only higher-level constituent labels), we propose an adaptation strategy, which produces grammars that parse almost as well as grammars induced from fully labeled corpora. Our results suggest that for a partial parser to replace human annotators, it must be able to automatically extract higher-level constituents rather than base noun phrases.
[ { "version": "v1", "created": "Sun, 2 May 1999 20:48:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Hwa", "Rebecca", "" ] ]
cs/9905003
Walter Eaves
Walter Eaves
Collective Choice Theory in Collaborative Computing
40 pages, 10 figures
null
null
null
cs.MA cs.DC
null
This paper presents some fundamental collective choice theory for information system designers, particularly those working in the field of computer-supported cooperative work. This paper is focused on a presentation of Arrow's Possibility and Impossibility theorems which form the fundamental boundary on the efficacy of collective choice: voting and selection procedures. It restates the conditions that Arrow placed on collective choice functions in more rigorous second-order logic, which could be used as a set of test conditions for implementations, and a useful probabilistic result for analyzing votes on issue pairs. It also describes some simple collective choice functions. There is also some discussion of how enterprises should approach putting their resources under collective control: giving an outline of a superstructure of performative agents to carry out this function and what distributing processing technology would be needed.
[ { "version": "v1", "created": "Mon, 10 May 1999 17:07:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Eaves", "Walter", "" ] ]
cs/9905004
Kagan Tumer
David H. Wolpert, Kagan Tumer, Jeremy Frank
Using Collective Intelligence to Route Internet Traffic
7 pages
Advances in Information Processing Systems - 11, eds M. Kearns, S. Solla, D. Cohn, MIT Press, 1999
null
null
cs.LG adap-org cond-mat.stat-mech cs.DC cs.NI nlin.AO
null
A COllective INtelligence (COIN) is a set of interacting reinforcement learning (RL) algorithms designed in an automated fashion so that their collective behavior optimizes a global utility function. We summarize the theory of COINs, then present experiments using that theory to design COINs to control internet traffic routing. These experiments indicate that COINs outperform all previously investigated RL-based, shortest path routing algorithms.
[ { "version": "v1", "created": "Mon, 10 May 1999 20:52:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolpert", "David H.", "" ], [ "Tumer", "Kagan", "" ], [ "Frank", "Jeremy", "" ] ]
cs/9905005
Kagan Tumer
David H. Wolpert, Kevin R. Wheeler, Kagan Tumer
General Principles of Learning-Based Multi-Agent Systems
7 pages, 6 figures
Proceedings of the Third International Conference on Autonomous Agents, Seatle, WA 1999
null
null
cs.MA adap-org cond-mat.stat-mech cs.DC cs.LG nlin.AO
null
We consider the problem of how to design large decentralized multi-agent systems (MAS's) in an automated fashion, with little or no hand-tuning. Our approach has each agent run a reinforcement learning algorithm. This converts the problem into one of how to automatically set/update the reward functions for each of the agents so that the global goal is achieved. In particular we do not want the agents to ``work at cross-purposes'' as far as the global goal is concerned. We use the term artificial COllective INtelligence (COIN) to refer to systems that embody solutions to this problem. In this paper we present a summary of a mathematical framework for COINs. We then investigate the real-world applicability of the core concepts of that framework via two computer experiments: we show that our COINs perform near optimally in a difficult variant of Arthur's bar problem (and in particular avoid the tragedy of the commons for that problem), and we also illustrate optimal performance for our COINs in the leader-follower problem.
[ { "version": "v1", "created": "Mon, 10 May 1999 22:20:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolpert", "David H.", "" ], [ "Wheeler", "Kevin R.", "" ], [ "Tumer", "Kagan", "" ] ]
cs/9905007
Michael R. Brent
Michael R. Brent
An Efficient, Probabilistically Sound Algorithm for Segmentation and Word Discovery
65 double-spaced ms. pages including 3 figures
Brent, M. R. (1999). An efficient, probabilistically sound algorithm for segmentation and word discovery. Machine Learning 34, 71-105
null
null
cs.CL cs.LG
null
This paper presents a model-based, unsupervised algorithm for recovering word boundaries in a natural-language text from which they have been deleted. The algorithm is derived from a probability model of the source that generated the text. The fundamental structure of the model is specified abstractly so that the detailed component models of phonology, word-order, and word frequency can be replaced in a modular fashion. The model yields a language-independent, prior probability distribution on all possible sequences of all possible words over a given alphabet, based on the assumption that the input was generated by concatenating words from a fixed but unknown lexicon. The model is unusual in that it treats the generation of a complete corpus, regardless of length, as a single event in the probability space. Accordingly, the algorithm does not estimate a probability distribution on words; instead, it attempts to calculate the prior probabilities of various word sequences that could underlie the observed text. Experiments on phonemic transcripts of spontaneous speech by parents to young children suggest that this algorithm is more effective than other proposed algorithms, at least when utterance boundaries are given and the text includes a substantial number of short utterances. Keywords: Bayesian grammar induction, probability models, minimum description length (MDL), unsupervised learning, cognitive modeling, language acquisition, segmentation
[ { "version": "v1", "created": "Wed, 12 May 1999 14:25:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Brent", "Michael R.", "" ] ]
cs/9905008
Stefan Riezler
Mats Rooth, Stefan Riezler, Detlef Prescher, Glenn Carroll, and Franz Beil (IMS, University of Stuttgart)
Inducing a Semantically Annotated Lexicon via EM-Based Clustering
8 pages, uses colacl.sty. Proceedings of the 37th Annual Meeting of the ACL, 1999
null
null
null
cs.CL cs.AI cs.LG
null
We present a technique for automatic induction of slot annotations for subcategorization frames, based on induction of hidden classes in the EM framework of statistical estimation. The models are empirically evalutated by a general decision test. Induction of slot labeling for subcategorization frames is accomplished by a further application of EM, and applied experimentally on frame observations derived from parsing large corpora. We outline an interpretation of the learned representations as theoretical-linguistic decompositional lexical entries.
[ { "version": "v1", "created": "Wed, 19 May 1999 14:52:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Rooth", "Mats", "", "IMS, University of Stuttgart" ], [ "Riezler", "Stefan", "", "IMS, University of Stuttgart" ], [ "Prescher", "Detlef", "", "IMS, University of Stuttgart" ], [ "Carroll", "Glenn", "", "IMS, University of Stuttgart" ], [ "Beil", "Franz", "", "IMS, University of Stuttgart" ] ]
cs/9905009
Stefan Riezler
Franz Beil, Glenn Carroll, Detlef Prescher, Stefan Riezler, and Mats Rooth (IMS, University of Stuttgart)
Inside-Outside Estimation of a Lexicalized PCFG for German
8 pages, uses colacl.sty. Proceedings of the 37th Annual Meeting of the ACL, 1999
null
null
null
cs.CL cs.LG
null
The paper describes an extensive experiment in inside-outside estimation of a lexicalized probabilistic context free grammar for German verb-final clauses. Grammar and formalism features which make the experiment feasible are described. Successive models are evaluated on precision and recall of phrase markup.
[ { "version": "v1", "created": "Wed, 19 May 1999 14:47:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Beil", "Franz", "", "IMS, University of Stuttgart" ], [ "Carroll", "Glenn", "", "IMS, University of Stuttgart" ], [ "Prescher", "Detlef", "", "IMS, University of Stuttgart" ], [ "Riezler", "Stefan", "", "IMS, University of Stuttgart" ], [ "Rooth", "Mats", "", "IMS, University of Stuttgart" ] ]
cs/9905010
Stefan Riezler
Stefan Riezler (IMS, University of Stuttgart)
Statistical Inference and Probabilistic Modelling for Constraint-Based NLP
12 pages, uses knvns98.sty. Proceedings of the 4th Conference on Natural Language Processing (KONVENS-98)
null
null
null
cs.CL cs.LG
null
We present a probabilistic model for constraint-based grammars and a method for estimating the parameters of such models from incomplete, i.e., unparsed data. Whereas methods exist to estimate the parameters of probabilistic context-free grammars from incomplete data (Baum 1970), so far for probabilistic grammars involving context-dependencies only parameter estimation techniques from complete, i.e., fully parsed data have been presented (Abney 1997). However, complete-data estimation requires labor-intensive, error-prone, and grammar-specific hand-annotating of large language corpora. We present a log-linear probability model for constraint logic programming, and a general algorithm to estimate the parameters of such models from incomplete data by extending the estimation algorithm of Della-Pietra, Della-Pietra, and Lafferty (1997) to incomplete data settings.
[ { "version": "v1", "created": "Wed, 19 May 1999 16:03:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Riezler", "Stefan", "", "IMS, University of Stuttgart" ] ]
cs/9905011
Kagan Tumer
Kagan Tumer, Nirmala Ramanujam, Joydeep Ghosh, and Rebecca Richards-Kortum
Ensembles of Radial Basis Function Networks for Spectroscopic Detection of Cervical Pre-Cancer
23 pages
IEEE Transactions on Biomedical Engineering, vol 45, no. 8, pp 953-962, 1998
null
null
cs.NE cs.LG q-bio
null
The mortality related to cervical cancer can be substantially reduced through early detection and treatment. However, current detection techniques, such as Pap smear and colposcopy, fail to achieve a concurrently high sensitivity and specificity. In vivo fluorescence spectroscopy is a technique which quickly, non-invasively and quantitatively probes the biochemical and morphological changes that occur in pre-cancerous tissue. A multivariate statistical algorithm was used to extract clinically useful information from tissue spectra acquired from 361 cervical sites from 95 patients at 337, 380 and 460 nm excitation wavelengths. The multivariate statistical analysis was also employed to reduce the number of fluorescence excitation-emission wavelength pairs required to discriminate healthy tissue samples from pre-cancerous tissue samples. The use of connectionist methods such as multi layered perceptrons, radial basis function networks, and ensembles of such networks was investigated. RBF ensemble algorithms based on fluorescence spectra potentially provide automated, and near real-time implementation of pre-cancer detection in the hands of non-experts. The results are more reliable, direct and accurate than those achieved by either human experts or multivariate statistical algorithms.
[ { "version": "v1", "created": "Thu, 20 May 1999 18:28:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Tumer", "Kagan", "" ], [ "Ramanujam", "Nirmala", "" ], [ "Ghosh", "Joydeep", "" ], [ "Richards-Kortum", "Rebecca", "" ] ]
cs/9905012
Kagan Tumer
Kagan Tumer and Joydeep Ghosh
Linear and Order Statistics Combiners for Pattern Classification
31 pages
Combining Artificial Neural Networks,Ed. Amanda Sharkey, pp 127-162, Springer Verlag, 1999
null
null
cs.NE cs.LG
null
Several researchers have experimentally shown that substantial improvements can be obtained in difficult pattern recognition problems by combining or integrating the outputs of multiple classifiers. This chapter provides an analytical framework to quantify the improvements in classification results due to combining. The results apply to both linear combiners and order statistics combiners. We first show that to a first order approximation, the error rate obtained over and above the Bayes error rate, is directly proportional to the variance of the actual decision boundaries around the Bayes optimum boundary. Combining classifiers in output space reduces this variance, and hence reduces the "added" error. If N unbiased classifiers are combined by simple averaging, the added error rate can be reduced by a factor of N if the individual errors in approximating the decision boundaries are uncorrelated. Expressions are then derived for linear combiners which are biased or correlated, and the effect of output correlations on ensemble performance is quantified. For order statistics based non-linear combiners, we derive expressions that indicate how much the median, the maximum and in general the ith order statistic can improve classifier performance. The analysis presented here facilitates the understanding of the relationships among error rates, classifier boundary distributions, and combining in output space. Experimental results on several public domain data sets are provided to illustrate the benefits of combining and to support the analytical results.
[ { "version": "v1", "created": "Thu, 20 May 1999 20:15:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Tumer", "Kagan", "" ], [ "Ghosh", "Joydeep", "" ] ]
cs/9905013
Kagan Tumer
Kagan Tumer and Joydeep Ghosh
Robust Combining of Disparate Classifiers through Order Statistics
22 pages
null
null
UT-CVIS-TR-99-001 (The University of Texas)
cs.LG cs.CV cs.NE
null
Integrating the outputs of multiple classifiers via combiners or meta-learners has led to substantial improvements in several difficult pattern recognition problems. In the typical setting investigated till now, each classifier is trained on data taken or resampled from a common data set, or (almost) randomly selected subsets thereof, and thus experiences similar quality of training data. However, in certain situations where data is acquired and analyzed on-line at several geographically distributed locations, the quality of data may vary substantially, leading to large discrepancies in performance of individual classifiers. In this article we introduce and investigate a family of classifiers based on order statistics, for robust handling of such cases. Based on a mathematical modeling of how the decision boundaries are affected by order statistic combiners, we derive expressions for the reductions in error expected when such combiners are used. We show analytically that the selection of the median, the maximum and in general, the $i^{th}$ order statistic improves classification performance. Furthermore, we introduce the trim and spread combiners, both based on linear combinations of the ordered classifier outputs, and show that they are quite beneficial in presence of outliers or uneven classifier performance. Experimental results on several public domain data sets corroborate these findings.
[ { "version": "v1", "created": "Thu, 20 May 1999 20:37:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Tumer", "Kagan", "" ], [ "Ghosh", "Joydeep", "" ] ]
cs/9905014
Dietterich
Thomas G. Dietterich
Hierarchical Reinforcement Learning with the MAXQ Value Function Decomposition
63 pages, 15 figures
null
null
null
cs.LG
null
This paper presents the MAXQ approach to hierarchical reinforcement learning based on decomposing the target Markov decision process (MDP) into a hierarchy of smaller MDPs and decomposing the value function of the target MDP into an additive combination of the value functions of the smaller MDPs. The paper defines the MAXQ hierarchy, proves formal results on its representational power, and establishes five conditions for the safe use of state abstractions. The paper presents an online model-free learning algorithm, MAXQ-Q, and proves that it converges wih probability 1 to a kind of locally-optimal policy known as a recursively optimal policy, even in the presence of the five kinds of state abstraction. The paper evaluates the MAXQ representation and MAXQ-Q through a series of experiments in three domains and shows experimentally that MAXQ-Q (with state abstractions) converges to a recursively optimal policy much faster than flat Q learning. The fact that MAXQ learns a representation of the value function has an important benefit: it makes it possible to compute and execute an improved, non-hierarchical policy via a procedure similar to the policy improvement step of policy iteration. The paper demonstrates the effectiveness of this non-hierarchical execution experimentally. Finally, the paper concludes with a comparison to related work and a discussion of the design tradeoffs in hierarchical reinforcement learning.
[ { "version": "v1", "created": "Fri, 21 May 1999 14:26:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Dietterich", "Thomas G.", "" ] ]
cs/9905015
Dietterich
Thomas G. Dietterich
State Abstraction in MAXQ Hierarchical Reinforcement Learning
7 pages, 2 figures
null
null
null
cs.LG
null
Many researchers have explored methods for hierarchical reinforcement learning (RL) with temporal abstractions, in which abstract actions are defined that can perform many primitive actions before terminating. However, little is known about learning with state abstractions, in which aspects of the state space are ignored. In previous work, we developed the MAXQ method for hierarchical RL. In this paper, we define five conditions under which state abstraction can be combined with the MAXQ value function decomposition. We prove that the MAXQ-Q learning algorithm converges under these conditions and show experimentally that state abstraction is important for the successful application of MAXQ-Q learning.
[ { "version": "v1", "created": "Fri, 21 May 1999 14:49:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Dietterich", "Thomas G.", "" ] ]
cs/9905016
Max Chaves
M. Chaves
Programs with Stringent Performance Objectives Will Often Exhibit Chaotic Behavior
7 pages, no figures
null
null
null
cs.CE cs.CC
null
Software for the resolution of certain kind of problems, those that rate high in the Stringent Performance Objectives adjustment factor (IFPUG scheme), can be described using a combination of game theory and autonomous systems. From this description it can be shown that some of those problems exhibit chaotic behavior, an important fact in understanding the functioning of the related software. As a relatively simple example, it is shown that chess exhibits chaotic behavior in its configuration space. This implies that static evaluators in chess programs have intrinsic limitations.
[ { "version": "v1", "created": "Thu, 27 May 1999 23:58:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Chaves", "M.", "" ] ]
cs/9906003
Melanie Siegel
Melanie Siegel
The syntactic processing of particles in Japanese spoken language
8 pages
Proceedings of the 13th Pacific Asia Conference on Language, Information and Computation. 1999
null
null
cs.CL
null
Particles fullfill several distinct central roles in the Japanese language. They can mark arguments as well as adjuncts, can be functional or have semantic funtions. There is, however, no straightforward matching from particles to functions, as, e.g., GA can mark the subject, the object or an adjunct of a sentence. Particles can cooccur. Verbal arguments that could be identified by particles can be eliminated in the Japanese sentence. And finally, in spoken language particles are often omitted. A proper treatment of particles is thus necessary to make an analysis of Japanese sentences possible. Our treatment is based on an empirical investigation of 800 dialogues. We set up a type hierarchy of particles motivated by their subcategorizational and modificational behaviour. This type hierarchy is part of the Japanese syntax in VERBMOBIL.
[ { "version": "v1", "created": "Wed, 2 Jun 1999 12:03:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Siegel", "Melanie", "" ] ]
cs/9906004
Jorn Veenstra
Sabine Buchholz, Jorn Veenstra, Walter Daelemans
Cascaded Grammatical Relation Assignment
8 pages, to appear in: proceedings of EMNLP/VLC-99, University of Maryland, USA, June 21-22, 1999
null
null
ILK-9908
cs.CL cs.LG
null
In this paper we discuss cascaded Memory-Based grammatical relations assignment. In the first stages of the cascade, we find chunks of several types (NP,VP,ADJP,ADVP,PP) and label them with their adverbial function (e.g. local, temporal). In the last stage, we assign grammatical relations to pairs of chunks. We studied the effect of adding several levels to this cascaded classifier and we found that even the less performing chunkers enhanced the performance of the relation finder.
[ { "version": "v1", "created": "Wed, 2 Jun 1999 13:41:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Buchholz", "Sabine", "" ], [ "Veenstra", "Jorn", "" ], [ "Daelemans", "Walter", "" ] ]
cs/9906005
Sabine Buchholz
Walter Daelemans, Sabine Buchholz, Jorn Veenstra
Memory-Based Shallow Parsing
8 pages, to appear in: Proceedings of the EACL'99 workshop on Computational Natural Language Learning (CoNLL-99), Bergen, Norway, June 1999
null
null
ILK-9907
cs.CL cs.LG
null
We present a memory-based learning (MBL) approach to shallow parsing in which POS tagging, chunking, and identification of syntactic relations are formulated as memory-based modules. The experiments reported in this paper show competitive results, the F-value for the Wall Street Journal (WSJ) treebank is: 93.8% for NP chunking, 94.7% for VP chunking, 77.1% for subject detection and 79.0% for object detection.
[ { "version": "v1", "created": "Wed, 2 Jun 1999 13:48:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Daelemans", "Walter", "" ], [ "Buchholz", "Sabine", "" ], [ "Veenstra", "Jorn", "" ] ]
cs/9906006
Khalil Sima'an
Khalil Sima'an
Learning Efficient Disambiguation
222 pages
null
null
Ph.d. thesis, ILLC Dissertation Series number 1999-02, University of Amsterdam
cs.CL cs.AI
null
This dissertation analyses the computational properties of current performance-models of natural language parsing, in particular Data Oriented Parsing (DOP), points out some of their major shortcomings and suggests suitable solutions. It provides proofs that various problems of probabilistic disambiguation are NP-Complete under instances of these performance-models, and it argues that none of these models accounts for attractive efficiency properties of human language processing in limited domains, e.g. that frequent inputs are usually processed faster than infrequent ones. The central hypothesis of this dissertation is that these shortcomings can be eliminated by specializing the performance-models to the limited domains. The dissertation addresses "grammar and model specialization" and presents a new framework, the Ambiguity-Reduction Specialization (ARS) framework, that formulates the necessary and sufficient conditions for successful specialization. The framework is instantiated into specialization algorithms and applied to specializing DOP. Novelties of these learning algorithms are 1) they limit the hypotheses-space to include only "safe" models, 2) are expressed as constrained optimization formulae that minimize the entropy of the training tree-bank given the specialized grammar, under the constraint that the size of the specialized model does not exceed a predefined maximum, and 3) they enable integrating the specialized model with the original one in a complementary manner. The dissertation provides experiments with initial implementations and compares the resulting Specialized DOP (SDOP) models to the original DOP models with encouraging results.
[ { "version": "v1", "created": "Wed, 2 Jun 1999 15:50:26 GMT" }, { "version": "v2", "created": "Thu, 3 Jun 1999 14:46:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Sima'an", "Khalil", "" ] ]
cs/9906009
Thorsten Brants
Thorsten Brants
Cascaded Markov Models
8 pages
Proceedings of EACL-99, Bergen, Norway
null
null
cs.CL
null
This paper presents a new approach to partial parsing of context-free structures. The approach is based on Markov Models. Each layer of the resulting structure is represented by its own Markov Model, and output of a lower layer is passed as input to the next higher layer. An empirical evaluation of the method yields very good results for NP/PP chunking of German newspaper texts.
[ { "version": "v1", "created": "Sun, 6 Jun 1999 17:36:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Brants", "Thorsten", "" ] ]
cs/9906010
Victor Makarov
Victor Makarov
Predicate Logic with Definitions
15 pages
null
null
null
cs.LO cs.AI
null
Predicate Logic with Definitions (PLD or D-logic) is a modification of first-order logic intended mostly for practical formalization of mathematics. The main syntactic constructs of D-logic are terms, formulas and definitions. A definition is a definition of variables, a definition of constants, or a composite definition (D-logic has also abbreviation definitions called abbreviations). Definitions can be used inside terms and formulas. This possibility alleviates introducing new quantifier-like names. Composite definitions allow constructing new definitions from existing ones.
[ { "version": "v1", "created": "Mon, 7 Jun 1999 20:16:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Makarov", "Victor", "" ] ]
cs/9906013
Karl Stroetmann
Sabine Glesner and Karl Stroetmann
Combining Inclusion Polymorphism and Parametric Polymorphism
14 pages
null
null
null
cs.LO cs.PL
null
We show that the question whether a term is typable is decidable for type systems combining inclusion polymorphism with parametric polymorphism provided the type constructors are at most unary. To prove this result we first reduce the typability problem to the problem of solving a system of type inequations. The result is then obtained by showing that the solvability of the resulting system of type inequations is decidable.
[ { "version": "v1", "created": "Mon, 14 Jun 1999 09:42:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Glesner", "Sabine", "" ], [ "Stroetmann", "Karl", "" ] ]
cs/9906014
Gertjan van Noord
Gert Veldhuijzen van Zanten and Gosse Bouma and Khalil Sima'an and Gertjan van Noord and Remko Bonnema
Evaluation of the NLP Components of the OVIS2 Spoken Dialogue System
Proceedings of CLIN 99
null
null
null
cs.CL
null
The NWO Priority Programme Language and Speech Technology is a 5-year research programme aiming at the development of spoken language information systems. In the Programme, two alternative natural language processing (NLP) modules are developed in parallel: a grammar-based (conventional, rule-based) module and a data-oriented (memory-based, stochastic, DOP) module. In order to compare the NLP modules, a formal evaluation has been carried out three years after the start of the Programme. This paper describes the evaluation procedure and the evaluation results. The grammar-based component performs much better than the data-oriented one in this comparison.
[ { "version": "v1", "created": "Mon, 14 Jun 1999 10:06:31 GMT" } ]
2007-05-23T00:00:00
[ [ "van Zanten", "Gert Veldhuijzen", "" ], [ "Bouma", "Gosse", "" ], [ "Sima'an", "Khalil", "" ], [ "van Noord", "Gertjan", "" ], [ "Bonnema", "Remko", "" ] ]
cs/9906015
Alexander Yeh
Lisa Ferro, Marc Vilain and Alexander Yeh
Learning Transformation Rules to Find Grammatical Relations
10 pages. Uses latex-acl.sty and named.sty
Computational Natural Language Learning (CoNLL-99), pages 43-52, June, 1999. Bergen, Norway
null
null
cs.CL
null
Grammatical relationships are an important level of natural language processing. We present a trainable approach to find these relationships through transformation sequences and error-driven learning. Our approach finds grammatical relationships between core syntax groups and bypasses much of the parsing phase. On our training and test set, our procedure achieves 63.6% recall and 77.3% precision (f-score = 69.8).
[ { "version": "v1", "created": "Mon, 14 Jun 1999 22:06:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Ferro", "Lisa", "" ], [ "Vilain", "Marc", "" ], [ "Yeh", "Alexander", "" ] ]
cs/9906016
Ken Samuel
Ken Samuel, Sandra Carberry, and K. Vijay-Shanker
Automatically Selecting Useful Phrases for Dialogue Act Tagging
14 pages, published in PACLING'99
Samuel, Ken and Carberry, Sandra and Vijay-Shanker, K. 1999. Automatically Selecting Useful Phrases for Dialogue Act Tagging. In Proceedings of the Fourth Conference of the Pacific Association for Computational Linguistics. Waterloo, Ontario, Canada
null
null
cs.AI cs.LG
null
We present an empirical investigation of various ways to automatically identify phrases in a tagged corpus that are useful for dialogue act tagging. We found that a new method (which measures a phrase's deviation from an optimally-predictive phrase), enhanced with a lexical filtering mechanism, produces significantly better cues than manually-selected cue phrases, the exhaustive set of phrases in a training corpus, and phrases chosen by traditional metrics, like mutual information and information gain.
[ { "version": "v1", "created": "Fri, 18 Jun 1999 03:25:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Samuel", "Ken", "" ], [ "Carberry", "Sandra", "" ], [ "Vijay-Shanker", "K.", "" ] ]
cs/9906017
Rigo Michel
Michel Rigo
Generalization of automatic sequences for numeration systems on a regular language
10 pages, 3 figures
Theoret. Comput. Sci. 244 (2000) 271--281
null
null
cs.CC
null
Let L be an infinite regular language on a totally ordered alphabet (A,<). Feeding a finite deterministic automaton (with output) with the words of L enumerated lexicographically with respect to < leads to an infinite sequence over the output alphabet of the automaton. This process generalizes the concept of k-automatic sequence for abstract numeration systems on a regular language (instead of systems in base k). Here, I study the first properties of these sequences and their relations with numeration systems.
[ { "version": "v1", "created": "Tue, 22 Jun 1999 10:01:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Rigo", "Michel", "" ] ]
cs/9906018
Christoph Durr
Christoph Durr and Marek Chrobak
Reconstructing Polyatomic Structures from Discrete X-Rays: NP-Completeness Proof for Three Atoms
null
Proceedings of the 23rd International Symposium on Mathematical Foundations of Computer Science, LNCS vol 1450, 185-193, 1998
null
null
cs.DS cs.CC
null
We address a discrete tomography problem that arises in the study of the atomic structure of crystal lattices. A polyatomic structure T can be defined as an integer lattice in dimension D>=2, whose points may be occupied by $c$ distinct types of atoms. To ``analyze'' T, we conduct ell measurements that we call_discrete X-rays_. A discrete X-ray in direction xi determines the number of atoms of each type on each line parallel to xi. Given ell such non-parallel X-rays, we wish to reconstruct T. The complexity of the problem for c=1 (one atom type) has been completely determined by Gardner, Gritzmann and Prangenberg, who proved that the problem is NP-complete for any dimension D>=2 and ell>=3 non-parallel X-rays, and that it can be solved in polynomial time otherwise. The NP-completeness result above clearly extends to any c>=2, and therefore when studying the polyatomic case we can assume that ell=2. As shown in another article by the same authors, this problem is also NP-complete for c>=6 atoms, even for dimension D=2 and axis-parallel X-rays. They conjecture that the problem remains NP-complete for c=3,4,5, although, as they point out, the proof idea does not seem to extend to c<=5. We resolve the conjecture by proving that the problem is indeed NP-complete for c>=3 in 2D, even for axis-parallel X-rays. Our construction relies heavily on some structure results for the realizations of 0-1 matrices with given row and column sums.
[ { "version": "v1", "created": "Mon, 21 Jun 1999 15:33:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Durr", "Christoph", "" ], [ "Chrobak", "Marek", "" ] ]
cs/9906019
Ion Androutsopoulos
G. Petasis, G. Paliouras, V. Karkaletsis, C. D. Spyropoulos and I. Androutsopoulos (Software & Knowledge Engineering Lab, Institute of Informatics & Telecommunications, NCSR Demokritos, Greece)
Resolving Part-of-Speech Ambiguity in the Greek Language Using Learning Techniques
6 pages. To appear in the Proceedings of the ECCAI Advanced Course on Artificial Intelligence(ACAI'99), Chania, Greece, July 1999
In Fakotakis, N. et al. (Eds.), Machine Learning in Human Language Technology (Proceedings of the ACAI Workshop), pp. 29-34, Chania, Greece, 1999.
null
null
cs.CL cs.AI
null
This article investigates the use of Transformation-Based Error-Driven learning for resolving part-of-speech ambiguity in the Greek language. The aim is not only to study the performance, but also to examine its dependence on different thematic domains. Results are presented here for two different test cases: a corpus on "management succession events" and a general-theme corpus. The two experiments show that the performance of this method does not depend on the thematic domain of the corpus, and its accuracy for the Greek language is around 95%.
[ { "version": "v1", "created": "Tue, 22 Jun 1999 07:41:24 GMT" }, { "version": "v2", "created": "Wed, 30 Jun 1999 14:46:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Petasis", "G.", "", "Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece" ], [ "Paliouras", "G.", "", "Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece" ], [ "Karkaletsis", "V.", "", "Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece" ], [ "Spyropoulos", "C. D.", "", "Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece" ], [ "Androutsopoulos", "I.", "", "Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece" ] ]
cs/9906020
Ion Androutsopoulos
I. Androutsopoulos (Software & Knowledge Engineering Lab, Institute of Informatics & Telecommunications, NCSR Demokritos, Greece)
Temporal Meaning Representations in a Natural Language Front-End
15 pages. To appear in the Proceedings of the 12th International Symposium on Languages for Intensional Programming, Athens, Greece, 1999
In Gergatsoulis, M. and Rondogiannis, P. (Eds.), Intensional Programming II (Proceedings of the 12th International Symposium on Languages for Intensional Programming, Athens, Greece, 1999), pp. 197-213, World Scientific, 2000.
null
null
cs.CL
null
Previous work in the context of natural language querying of temporal databases has established a method to map automatically from a large subset of English time-related questions to suitable expressions of a temporal logic-like language, called TOP. An algorithm to translate from TOP to the TSQL2 temporal database language has also been defined. This paper shows how TOP expressions could be translated into a simpler logic-like language, called BOT. BOT is very close to traditional first-order predicate logic (FOPL), and hence existing methods to manipulate FOPL expressions can be exploited to interface to time-sensitive applications other than TSQL2 databases, maintaining the existing English-to-TOP mapping.
[ { "version": "v1", "created": "Tue, 22 Jun 1999 08:28:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Androutsopoulos", "I.", "", "Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece" ] ]
cs/9906021
Christoph D\"urr
Christoph Durr and Marek Chrobak
Reconstructing hv-Convex Polyominoes from Orthogonal Projections
null
Information Processing Letters, 69, 1999, 283-289
null
null
cs.DS
null
Tomography is the area of reconstructing objects from projections. Here we wish to reconstruct a set of cells in a two dimensional grid, given the number of cells in every row and column. The set is required to be an hv-convex polyomino, that is all its cells must be connected and the cells in every row and column must be consecutive. A simple, polynomial algorithm for reconstructing hv-convex polyominoes is provided, which is several orders of magnitudes faster than the best previously known algorithm from Barcucci et al. In addition, the problem of reconstructing a special class of centered hv-convex polyominoes is addressed. (An object is centered if it contains a row whose length equals the total width of the object). It is shown that in this case the reconstruction problem can be solved in linear time.
[ { "version": "v1", "created": "Tue, 22 Jun 1999 09:56:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Durr", "Christoph", "" ], [ "Chrobak", "Marek", "" ] ]
cs/9906022
Joseph O'Rourke
Joseph O'Rourke and Irena Pashchenko
Zero-Parity Stabbing Information
null
Proc. Japan Conf. Discrete Comput. Geom. '98, Dec. 1998, 93--97
null
null
cs.CG cs.DM
null
Everett et al. introduced several varieties of stabbing information for the lines determined by pairs of vertices of a simple polygon P, and established their relationships to vertex visibility and other combinatorial data. In the same spirit, we define the ``zero-parity (ZP) stabbing information'' to be a natural weakening of their ``weak stabbing information,'' retaining only the distinction among {zero, odd, even>0} in the number of polygon edges stabbed. Whereas the weak stabbing information's relation to visibility remains an open problem, we completely settle the analogous questions for zero-parity information, with three results: (1) ZP information is insufficient to distinguish internal from external visibility graph edges; (2) but it does suffice for all polygons that avoid a certain complex substructure; and (3) the natural generalization of ZP information to the continuous case of smooth curves does distinguish internal from external visibility.
[ { "version": "v1", "created": "Tue, 22 Jun 1999 20:32:57 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ], [ "Pashchenko", "Irena", "" ] ]
cs/9906023
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 35
null
SIGACT News, 30(2) Issue #111 (1999) 31-32
null
null
cs.CG
null
The subquadratic algorithm of Kapoor for finding shortest paths on a polyhedron is described.
[ { "version": "v1", "created": "Tue, 22 Jun 1999 20:40:51 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/9906024
Christoph D\"urr
Christoph Durr, Huong LeThanh and Miklos Santha
A decision procedure for well-formed linear quantum cellular automata
null
Random Structures and Algorithms 11, 381-394, 1997
null
null
cs.DS cs.CC quant-ph
null
In this paper we introduce a new quantum computation model, the linear quantum cellular automaton. Well-formedness is an essential property for any quantum computing device since it enables us to define the probability of a configuration in an observation as the squared magnitude of its amplitude. We give an efficient algorithm which decides if a linear quantum cellular automaton is well-formed. The complexity of the algorithm is $O(n^2)$ in the algebraic model of computation if the input automaton has continuous neighborhood.
[ { "version": "v1", "created": "Wed, 23 Jun 1999 10:48:10 GMT" }, { "version": "v2", "created": "Fri, 27 Oct 2000 16:00:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Durr", "Christoph", "" ], [ "LeThanh", "Huong", "" ], [ "Santha", "Miklos", "" ] ]
cs/9906025
Lluis Padro
J. Daude, L. Padro and G. Rigau (TALP Research Center. LSI Dept. Universitat Politecnica de Catalunya. Barcelona)
Mapping Multilingual Hierarchies Using Relaxation Labeling
8 pages. 1 eps figure
null
null
null
cs.CL
null
This paper explores the automatic construction of a multilingual Lexical Knowledge Base from pre-existing lexical resources. We present a new and robust approach for linking already existing lexical/semantic hierarchies. We used a constraint satisfaction algorithm (relaxation labeling) to select --among all the candidate translations proposed by a bilingual dictionary-- the right English WordNet synset for each sense in a taxonomy automatically derived from a Spanish monolingual dictionary. Although on average, there are 15 possible WordNet connections for each sense in the taxonomy, the method achieves an accuracy over 80%. Finally, we also propose several ways in which this technique could be applied to enrich and improve existing lexical databases.
[ { "version": "v1", "created": "Thu, 24 Jun 1999 16:56:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Daude", "J.", "", "TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona" ], [ "Padro", "L.", "", "TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona" ], [ "Rigau", "G.", "", "TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona" ] ]
cs/9906027
Gillian Callaghan
Yorick Wilks and Roberta Catizone
Human-Computer Conversation
14 pages, 1 figure
null
null
CS-99-04
cs.CL cs.HC
null
The article surveys a little of the history of the technology, sets out the main current theoretical approaches in brief, and discusses the on-going opposition between theoretical and empirical approaches. It illustrates the situation with some discussion of CONVERSE, a system that won the Loebner prize in 1997 and which displays features of both approaches.
[ { "version": "v1", "created": "Fri, 25 Jun 1999 11:44:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Wilks", "Yorick", "" ], [ "Catizone", "Roberta", "" ] ]
cs/9906028
Edith Hemaspaandra
Edith Hemaspaandra
On the Power of Positive Turing Reductions
7 pages
null
null
null
cs.CC
null
In the early 1980s, Selman's seminal work on positive Turing reductions showed that positive Turing reduction to NP yields no greater computational power than NP itself. Thus, positive Turing and Turing reducibility to NP differ sharply unless the polynomial hierarchy collapses. We show that the situation is quite different for DP, the next level of the boolean hierarchy. In particular, positive Turing reduction to DP already yields all (and only) sets Turing reducibility to NP. Thus, positive Turing and Turing reducibility to DP yield the same class. Additionally, we show that an even weaker class, P(NP[1]), can be substituted for DP in this context.
[ { "version": "v1", "created": "Sat, 26 Jun 1999 23:31:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ] ]
cs/9906029
Marsha Chechik
M.Chechik, D.Paun
Events in Property Patterns
14 pages, 3 figures
Lecture notes in Computer Science (Proceedings of 6 Spin'99 Workshop)
null
null
cs.SE cs.AI cs.CL cs.SC
null
A pattern-based approach to the presentation, codification and reuse of property specifications for finite-state verification was proposed by Dwyer and his collegues. The patterns enable non-experts to read and write formal specifications for realistic systems and facilitate easy conversion of specifications between formalisms, such as LTL, CTL, QRE. In this paper, we extend the pattern system with events - changes of values of variables in the context of LTL.
[ { "version": "v1", "created": "Mon, 28 Jun 1999 17:06:51 GMT" }, { "version": "v2", "created": "Tue, 29 Jun 1999 16:28:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Chechik", "M.", "" ], [ "Paun", "D.", "" ] ]
cs/9906030
Marsha Chechik
M. Chechik
SCR3: towards usability of formal methods
15 pages, 10 figures
Proceedings of CASCON'98, December 1998, pp. 177-191
null
null
cs.SE
null
This paper gives an overview of SCR3 -- a toolset designed to increase the usability of formal methods for software development. Formal requirements are specified in SCR3 in an easy to use and review format, and then used in checking requirements for correctness and in verifying consistency between annotated code and requirements. In this paper we discuss motivations behind this work, describe several tools which are part of SCR3, and illustrate their operation on an example of a Cruise Control system.
[ { "version": "v1", "created": "Mon, 28 Jun 1999 17:30:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Chechik", "M.", "" ] ]
cs/9906032
Marsha Chechik
A. Wong and M. Chechik
Formal Modeling in a Commercial Setting: A Case Study
18 pages, 5 figures, to appear in Proceedings of FM'99: World Congress on Formal Methods, September 1999
null
null
null
cs.SE
null
This paper describes a case study conducted in collaboration with Nortel to demonstrate the feasibility of applying formal modeling techniques to telecommunication systems. A formal description language, SDL, was chosen by our qualitative CASE tool evaluation to model a multimedia-messaging system described by an 80-page natural language specification. Our model was used to identify errors in the software requirements document and to derive test suites, shadowing the existing development process and keeping track of a variety of productivity data.
[ { "version": "v1", "created": "Tue, 29 Jun 1999 15:29:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Wong", "A.", "" ], [ "Chechik", "M.", "" ] ]
cs/9906033
Lane A. Hemaspaandra
Jin-Yi Cai, Lane A. Hemaspaandra, Gerd Wechsung
Robust Reductions
26 pages; 1 figure; will appear in Theory of Computing Systems; earlier versions appear as UR-CS-TR-666 and in COCOON 98
null
null
null
cs.CC
null
We continue the study of robust reductions initiated by Gavalda and Balcazar. In particular, a 1991 paper of Gavalda and Balcazar claimed an optimal separation between the power of robust and nondeterministic strong reductions. Unfortunately, their proof is invalid. We re-establish their theorem. Generalizing robust reductions, we note that robustly strong reductions are built from two restrictions, robust underproductivity and robust overproductivity, both of which have been separately studied before in other contexts. By systematically analyzing the power of these reductions, we explore the extent to which each restriction weakens the power of reductions. We show that one of these reductions yields a new, strong form of the Karp-Lipton Theorem.
[ { "version": "v1", "created": "Tue, 29 Jun 1999 18:26:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Cai", "Jin-Yi", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Wechsung", "Gerd", "" ] ]
cs/9906034
Davide Turcato
Davide Turcato, Paul McFetridge, Fred Popowich, Janine Toole
A Unified Example-Based and Lexicalist Approach to Machine Translation
11 pages, to be presented at the 8th International Conference on Theoretical and Methodological Issues in Machine Translation (TMI-99)
null
null
null
cs.CL
null
We present an approach to Machine Translation that combines the ideas and methodologies of the Example-Based and Lexicalist theoretical frameworks. The approach has been implemented in a multilingual Machine Translation system.
[ { "version": "v1", "created": "Wed, 30 Jun 1999 23:06:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Turcato", "Davide", "" ], [ "McFetridge", "Paul", "" ], [ "Popowich", "Fred", "" ], [ "Toole", "Janine", "" ] ]
cs/9907003
Steven Bird
Steven Bird and Mark Liberman
Annotation graphs as a framework for multidimensional linguistic data analysis
10 pages, 10 figures, Towards Standards and Tools for Discourse Tagging, Proceedings of the Workshop. pp. 1-10. Association for Computational Linguistics
null
null
null
cs.CL
null
In recent work we have presented a formal framework for linguistic annotation based on labeled acyclic digraphs. These `annotation graphs' offer a simple yet powerful method for representing complex annotation structures incorporating hierarchy and overlap. Here, we motivate and illustrate our approach using discourse-level annotations of text and speech data drawn from the CALLHOME, COCONUT, MUC-7, DAMSL and TRAINS annotation schemes. With the help of domain specialists, we have constructed a hybrid multi-level annotation for a fragment of the Boston University Radio Speech Corpus which includes the following levels: segment, word, breath, ToBI, Tilt, Treebank, coreference and named entity. We show how annotation graphs can represent hybrid multi-level structures which derive from a diverse set of file formats. We also show how the approach facilitates substantive comparison of multiple annotations of a single signal based on different theoretical models. The discussion shows how annotation graphs open the door to wide-ranging integration of tools, formats and corpora.
[ { "version": "v1", "created": "Mon, 5 Jul 1999 14:51:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Bird", "Steven", "" ], [ "Liberman", "Mark", "" ] ]
cs/9907004
Anand Venkataraman
Anand Venkataraman
MAP Lexicon is useful for segmentation and word discovery in child-directed speech
Because of rather fundamental changes to the underlying model proposed in the paper, it has been withdrawn from the archive.
null
null
null
cs.CL cs.LG
null
Because of rather fundamental changes to the underlying model proposed in the paper, it has been withdrawn from the archive.
[ { "version": "v1", "created": "Tue, 6 Jul 1999 01:44:00 GMT" }, { "version": "v2", "created": "Thu, 14 Oct 1999 00:31:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Venkataraman", "Anand", "" ] ]
cs/9907005
Eirik Fossgaard
Eirik Fossgaard
Alternative Local Discriminant Bases Using Empirical Expectation and Variance Estimation
11 pages
null
null
null
cs.NA
null
We propose alternative discriminant measures for selecting the best basis among a large collection of orthonormal bases for classification purposes. A generalization of the Local Discriminant Basis Algorithm of Saito and Coifman is constructed. The success of these new methods is evaluated and compared to earlier methods in experiments.
[ { "version": "v1", "created": "Tue, 6 Jul 1999 11:48:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Fossgaard", "Eirik", "" ] ]
cs/9907006
Erik Tjong Kim Sang
Erik F. Tjong Kim Sang and Jorn Veenstra
Representing Text Chunks
7 pages
EACL'99, Bergen
null
null
cs.CL
null
Dividing sentences in chunks of words is a useful preprocessing step for parsing, information extraction and information retrieval. (Ramshaw and Marcus, 1995) have introduced a "convenient" data representation for chunking by converting it to a tagging task. In this paper we will examine seven different data representations for the problem of recognizing noun phrase chunks. We will show that the the data representation choice has a minor influence on chunking performance. However, equipped with the most suitable data representation, our memory-based learning chunker was able to improve the best published chunking results for a standard data set.
[ { "version": "v1", "created": "Tue, 6 Jul 1999 12:44:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Sang", "Erik F. Tjong Kim", "" ], [ "Veenstra", "Jorn", "" ] ]
cs/9907007
Atsushi Fujii
Atsushi Fujii and Tetsuya Ishikawa
Cross-Language Information Retrieval for Technical Documents
9 pages, 5 Postscript figures, uses colacl.sty and psfig.tex
Proceedings of the Joint ACL SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora, pp.29-37, 1999
null
null
cs.CL
null
This paper proposes a Japanese/English cross-language information retrieval (CLIR) system targeting technical documents. Our system first translates a given query containing technical terms into the target language, and then retrieves documents relevant to the translated query. The translation of technical terms is still problematic in that technical terms are often compound words, and thus new terms can be progressively created simply by combining existing base words. In addition, Japanese often represents loanwords based on its phonogram. Consequently, existing dictionaries find it difficult to achieve sufficient coverage. To counter the first problem, we use a compound word translation method, which uses a bilingual dictionary for base words and collocational statistics to resolve translation ambiguity. For the second problem, we propose a transliteration method, which identifies phonetic equivalents in the target language. We also show the effectiveness of our system using a test collection for CLIR.
[ { "version": "v1", "created": "Tue, 6 Jul 1999 16:25:46 GMT" }, { "version": "v2", "created": "Wed, 7 Jul 1999 09:12:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/9907008
Janine Toole
Janine Toole, Fred Popowich, Devlan Nicholson, Davide Turcato, Paul McFetridge
Explanation-based Learning for Machine Translation
12 pages, 3 figures, To appear in Proceedings of the 8th International Conference on Theoretical and Methodological Issues in Machine Translation
null
null
null
cs.CL
null
In this paper we present an application of explanation-based learning (EBL) in the parsing module of a real-time English-Spanish machine translation system designed to translate closed captions. We discuss the efficiency/coverage trade-offs available in EBL and introduce the techniques we use to increase coverage while maintaining a high level of space and time efficiency. Our performance results indicate that this approach is effective.
[ { "version": "v1", "created": "Tue, 6 Jul 1999 18:35:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Toole", "Janine", "" ], [ "Popowich", "Fred", "" ], [ "Nicholson", "Devlan", "" ], [ "Turcato", "Davide", "" ], [ "McFetridge", "Paul", "" ] ]
cs/9907010
David Elworthy
David Elworthy
Language Identification With Confidence Limits
8 pages; needs colacl.sty. Appeared in Proceedings of the Sixth Workshop on Very Large Corpora (COLING-ACL 98)
null
null
null
cs.CL
null
A statistical classification algorithm and its application to language identification from noisy input are described. The main innovation is to compute confidence limits on the classification, so that the algorithm terminates when enough evidence to make a clear decision has been made, and so avoiding problems with categories that have similar characteristics. A second application, to genre identification, is briefly examined. The results show that some of the problems of other language identification techniques can be avoided, and illustrate a more important point: that a statistical language process can be used to provide feedback about its own success rate.
[ { "version": "v1", "created": "Wed, 7 Jul 1999 09:28:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Elworthy", "David", "" ] ]
cs/9907011
Ming-Yang Kao
Zhi-Zhong Chen and Ming-Yang Kao
Reducing Randomness via Irrational Numbers
null
SIAM Journal on Computing, 29(4):1247--1256, 2000
null
null
cs.DS cs.DM
null
We propose a general methodology for testing whether a given polynomial with integer coefficients is identically zero. The methodology evaluates the polynomial at efficiently computable approximations of suitable irrational points. In contrast to the classical technique of DeMillo, Lipton, Schwartz, and Zippel, this methodology can decrease the error probability by increasing the precision of the approximations instead of using more random bits. Consequently, randomized algorithms that use the classical technique can generally be improved using the new methodology. To demonstrate the methodology, we discuss two nontrivial applications. The first is to decide whether a graph has a perfect matching in parallel. Our new NC algorithm uses fewer random bits while doing less work than the previously best NC algorithm by Chari, Rohatgi, and Srinivasan. The second application is to test the equality of two multisets of integers. Our new algorithm improves upon the previously best algorithms by Blum and Kannan and can speed up their checking algorithm for sorting programs on a large range of inputs.
[ { "version": "v1", "created": "Wed, 7 Jul 1999 23:39:27 GMT" }, { "version": "v2", "created": "Wed, 15 Nov 2000 14:39:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Zhi-Zhong", "" ], [ "Kao", "Ming-Yang", "" ] ]
cs/9907012
Guido Minnen
Guido Minnen (University of Sussex)
Selective Magic HPSG Parsing
9 pages, LaTeX with 4 postscript figures (uses avm.sty, eaclap.sty and psfig-scale.sty)
Proceedings of EACL99, Bergen, Norway, June 8-11
null
null
cs.CL
null
We propose a parser for constraint-logic grammars implementing HPSG that combines the advantages of dynamic bottom-up and advanced top-down control. The parser allows the user to apply magic compilation to specific constraints in a grammar which as a result can be processed dynamically in a bottom-up and goal-directed fashion. State of the art top-down processing techniques are used to deal with the remaining constraints. We discuss various aspects concerning the implementation of the parser as part of a grammar development system.
[ { "version": "v1", "created": "Thu, 8 Jul 1999 09:46:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Minnen", "Guido", "", "University of Sussex" ] ]
cs/9907013
Guido Minnen
John Carroll, Guido Minnen (University of Sussex), Ted Briscoe (Cambridge University)
Corpus Annotation for Parser Evaluation
7 pages, LaTeX (uses eaclap.sty)
Proceedings of the EACL99 workshop on Linguistically Interpreted Corpora (LINC), Bergen, Norway, June 12
null
null
cs.CL
null
We describe a recently developed corpus annotation scheme for evaluating parsers that avoids shortcomings of current methods. The scheme encodes grammatical relations between heads and dependents, and has been used to mark up a new public-domain corpus of naturally occurring English text. We show how the corpus can be used to evaluate the accuracy of a robust parser, and relate the corpus to extant resources.
[ { "version": "v1", "created": "Thu, 8 Jul 1999 10:08:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Carroll", "John", "", "University of Sussex" ], [ "Minnen", "Guido", "", "University of Sussex" ], [ "Briscoe", "Ted", "", "Cambridge University" ] ]
cs/9907016
Jim Gray
Tom Barclay Jim Gray Don Slutz
Microsoft TerraServer: A Spatial Data Warehouse
Original MSword format at http://research.microsoft.com/~gray/papers/MS_TR_99_30_TerraServer.doc
null
null
Microsoft Research Technical Report MSR-TR-99-29
cs.DB cs.DL
null
The TerraServer stores aerial, satellite, and topographic images of the earth in a SQL database available via the Internet. It is the world's largest online atlas, combining five terabytes of image data from the United States Geological Survey (USGS) and SPIN-2. This report describes the system-redesign based on our experience over the last year. It also reports usage and operations results over the last year -- over 2 billion web hits and over 20 Terabytes of imagry served over the Internet. Internet browsers provide intuitive spatial and text interfaces to the data. Users need no special hardware, software, or knowledge to locate and browse imagery. This paper describes how terabytes of "Internet unfriendly" geo-spatial images were scrubbed and edited into hundreds of millions of "Internet friendly" image tiles and loaded into a SQL data warehouse. Microsoft TerraServer demonstrates that general-purpose relational database technology can manage large scale image repositories, and shows that web browsers can be a good geospatial image presentation system.
[ { "version": "v1", "created": "Fri, 9 Jul 1999 21:30:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Slutz", "Tom Barclay Jim Gray Don", "" ] ]
cs/9907017
Davide Turcato
Davide Turcato, Paul McFetridge, Fred Popowich and Janine Toole
A Bootstrap Approach to Automatically Generating Lexical Transfer Rules
8 pages, 1 figure, to be presented at Machine Translation Summit VII, September 13-17, 1999, Singapore
null
null
null
cs.CL
null
We describe a method for automatically generating Lexical Transfer Rules (LTRs) from word equivalences using transfer rule templates. Templates are skeletal LTRs, unspecified for words. New LTRs are created by instantiating a template with words, provided that the words belong to the appropriate lexical categories required by the template. We define two methods for creating an inventory of templates and using them to generate new LTRs. A simpler method consists of extracting a finite set of templates from a sample of hand coded LTRs and directly using them in the generation process. A further method consists of abstracting over the initial finite set of templates to define higher level templates, where bilingual equivalences are defined in terms of correspondences involving phrasal categories. Phrasal templates are then mapped onto sets of lexical templates with the aid of grammars. In this way an infinite set of lexical templates is recursively defined. New LTRs are created by parsing input words, matching a template at the phrasal level and using the corresponding lexical categories to instantiate the lexical template. The definition of an infinite set of templates enables the automatic creation of LTRs for multi-word, non-compositional word equivalences of any cardinality.
[ { "version": "v1", "created": "Fri, 9 Jul 1999 22:39:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Turcato", "Davide", "" ], [ "McFetridge", "Paul", "" ], [ "Popowich", "Fred", "" ], [ "Toole", "Janine", "" ] ]
cs/9907018
Erik Demaine
Erik D. Demaine, Martin L. Demaine, David Eppstein, Greg N. Frederickson, Erich Friedman
Hinged Dissection of Polyominoes and Polyforms
27 pages, 39 figures. Accepted to Computational Geometry: Theory and Applications. v3 incorporates several comments by referees. v2 added many new results and a new coauthor (Frederickson)
null
null
null
cs.CG cs.DM
null
A hinged dissection of a set of polygons S is a collection of polygonal pieces hinged together at vertices that can be folded into any member of S. We present a hinged dissection of all edge-to-edge gluings of n congruent copies of a polygon P that join corresponding edges of P. This construction uses kn pieces, where k is the number of vertices of P. When P is a regular polygon, we show how to reduce the number of pieces to ceiling(k/2)*(n-1). In particular, we consider polyominoes (made up of unit squares), polyiamonds (made up of equilateral triangles), and polyhexes (made up of regular hexagons). We also give a hinged dissection of all polyabolos (made up of right isosceles triangles), which do not fall under the general result mentioned above. Finally, we show that if P can be hinged into Q, then any edge-to-edge gluing of n congruent copies of P can be hinged into any edge-to-edge gluing of n congruent copies of Q.
[ { "version": "v1", "created": "Sat, 10 Jul 1999 21:29:56 GMT" }, { "version": "v2", "created": "Wed, 13 Oct 1999 01:54:07 GMT" }, { "version": "v3", "created": "Sun, 23 Mar 2003 13:29:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Eppstein", "David", "" ], [ "Frederickson", "Greg N.", "" ], [ "Friedman", "Erich", "" ] ]
cs/9907019
Craig Bordelon
Craig Bordelon
A Reasonable C++ Wrappered Java Native Interface
27 pages, 18 figures; Submitted to Software Practice & Experience; Withdrawn after 3 month negotiation failed to reach compromise on copyright (Wiley Publisher vs. Telcordia Technologies); jH software inquiries to http://www.telcordia.com
null
null
null
cs.SE
null
A reasonable C++ Java Native Interface (JNI) technique termed C++ Wrappered JNI (C++WJ) is presented. The technique simplifies current error-prone JNI development by wrappering JNI calls. Provided development is done with the aid of a C++ compiler, C++WJ offers type checking and behind the scenes caching. A tool (jH) patterned on javah automates the creation of C++WJ classes. The paper presents the rationale behind the choices that led to C++WJ. Handling of Java class and interface hierarchy including Java type downcasts is discussed. Efficiency considerations in the C++WJ lead to two flavors of C++ classes: jtypes and Jtypes. A jtype is a lightweight less than full wrapper of a JNI object reference. A Jtype is a heavyweight full wrapper of a JNI object reference.
[ { "version": "v1", "created": "Mon, 12 Jul 1999 13:34:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Bordelon", "Craig", "" ] ]
cs/9907022
Satoru Kuroda
Satoru Kuroda
Weak length induction and slow growing depth boolean circuits
null
null
null
null
cs.LO
null
We define a hierarchy of circuit complexity classes LD^i, whose depth are the inverse of a function in Ackermann hierarchy. Then we introduce extremely weak versions of length induction and construct a bounded arithmetic theory L^i_2 whose provably total functions exactly correspond to functions computable by LD^i circuits. Finally, we prove a non-conservation result between L^i_2 and a weaker theory AC^0CA which corresponds to the class AC^0. Our proof utilizes KPT witnessing theorem.
[ { "version": "v1", "created": "Fri, 16 Jul 1999 08:41:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuroda", "Satoru", "" ] ]
cs/9907023
Devillers
Olivier Devillers
On Deletion in Delaunay Triangulation
15 pages 5 figures. in Proc. 15th Annu. ACM Sympos. Comput. Geom., 181--188, 1999
null
null
INRIA Research report 3451
cs.CG
null
This paper presents how the space of spheres and shelling may be used to delete a point from a $d$-dimensional triangulation efficiently. In dimension two, if k is the degree of the deleted vertex, the complexity is O(k log k), but we notice that this number only applies to low cost operations, while time consuming computations are only done a linear number of times. This algorithm may be viewed as a variation of Heller's algorithm, which is popular in the geographic information system community. Unfortunately, Heller algorithm is false, as explained in this paper.
[ { "version": "v1", "created": "Fri, 16 Jul 1999 13:25:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ] ]
cs/9907024
Devillers
Olivier Devillers
Improved Incremental Randomized Delaunay Triangulation
19 pages, 7 figures Proc. 14th Annu. ACM Sympos. Comput. Geom., 106--115, 1998
null
null
INRIA Research Report 3298
cs.CG
null
We propose a new data structure to compute the Delaunay triangulation of a set of points in the plane. It combines good worst case complexity, fast behavior on real data, and small memory occupation. The location structure is organized into several levels. The lowest level just consists of the triangulation, then each level contains the triangulation of a small sample of the levels below. Point location is done by marching in a triangulation to determine the nearest neighbor of the query at that level, then the march restarts from that neighbor at the level below. Using a small sample (3%) allows a small memory occupation; the march and the use of the nearest neighbor to change levels quickly locate the query.
[ { "version": "v1", "created": "Fri, 16 Jul 1999 12:44:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ] ]
cs/9907025
Devillers
Herve Bronnimann, Olivier Devillers
The union of unit balls has quadratic complexity, even if they all contain the origin
5 pages, 5 figures
null
null
null
cs.CG
null
We provide a lower bound construction showing that the union of unit balls in three-dimensional space has quadratic complexity, even if they all contain the origin. This settles a conjecture of Sharir.
[ { "version": "v1", "created": "Fri, 16 Jul 1999 15:20:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Bronnimann", "Herve", "" ], [ "Devillers", "Olivier", "" ] ]
cs/9907026
Tovena
Emanuele Pianta, Lucia M. Tovena
Mixing representation levels: The hybrid approach to automatic text generation
6 pages
Proceedings of the AISB'99 Workshop on ``Reference Architectures and Data Standards for NLP'', Edinburgh Scotland, April 1999, 8-13
null
null
cs.CL cs.AI
null
Natural language generation systems (NLG) map non-linguistic representations into strings of words through a number of steps using intermediate representations of various levels of abstraction. Template based systems, by contrast, tend to use only one representation level, i.e. fixed strings, which are combined, possibly in a sophisticated way, to generate the final text. In some circumstances, it may be profitable to combine NLG and template based techniques. The issue of combining generation techniques can be seen in more abstract terms as the issue of mixing levels of representation of different degrees of linguistic abstraction. This paper aims at defining a reference architecture for systems using mixed representations. We argue that mixed representations can be used without abandoning a linguistically grounded approach to language generation.
[ { "version": "v1", "created": "Fri, 16 Jul 1999 15:43:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Pianta", "Emanuele", "" ], [ "Tovena", "Lucia M.", "" ] ]
cs/9907027
Andrea Schaerf
Krzysztof R. Apt and Andrea Schaerf
The Alma Project, or How First-Order Logic Can Help Us in Imperative Programming
25 pages
null
null
null
cs.LO cs.PL
null
The aim of the Alma project is the design of a strongly typed constraint programming language that combines the advantages of logic and imperative programming. The first stage of the project was the design and implementation of Alma-0, a small programming language that provides a support for declarative programming within the imperative programming framework. It is obtained by extending a subset of Modula-2 by a small number of features inspired by the logic programming paradigm. In this paper we discuss the rationale for the design of Alma-0, the benefits of the resulting hybrid programming framework, and the current work on adding constraint processing capabilities to the language. In particular, we discuss the role of the logical and customary variables, the interaction between the constraint store and the program, and the need for lists.
[ { "version": "v1", "created": "Mon, 19 Jul 1999 09:36:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Schaerf", "Andrea", "" ] ]
cs/9907028
Devillers
Olivier Devillers and Franco P. Preparata
Further Results on Arithmetic Filters for Geometric Predicates
7 pages 2 figures presented at the 15th European Workshop Comput. Geom., 113--116, 1999 improve previous results (in other paper)
Comput. Geom. Theory Appl. 1999 13:141-148
null
INRIA Research report 3528
cs.CG
null
An efficient technique to solve precision problems consists in using exact computations. For geometric predicates, using systematically expensive exact computations can be avoided by the use of filters. The predicate is first evaluated using rounding computations, and an error estimation gives a certificate of the validity of the result. In this note, we studies the statistical efficiency of filters for cosphericity predicate with an assumption of regular distribution of the points. We prove that the expected value of the polynomial corresponding to the in sphere test is greater than epsilon with probability O(epsilon log 1/epsilon) improving the results of a previous paper by the same authors.
[ { "version": "v1", "created": "Mon, 19 Jul 1999 15:09:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ], [ "Preparata", "Franco P.", "" ] ]
cs/9907029
Devillers
Olivier Devillers and Franco P. Preparata
A Probabilistic Analysis of the Power of Arithmetic Filters
22 pages 7 figures Results for in sphere test inproved in cs.CG/9907028
Discrete and Computational Geometry, 20:523--547, 1998
null
INRIA Research report 2971
cs.CG
null
The assumption of real-number arithmetic, which is at the basis of conventional geometric algorithms, has been seriously challenged in recent years, since digital computers do not exhibit such capability. A geometric predicate usually consists of evaluating the sign of some algebraic expression. In most cases, rounded computations yield a reliable result, but sometimes rounded arithmetic introduces errors which may invalidate the algorithms. The rounded arithmetic may produce an incorrect result only if the exact absolute value of the algebraic expression is smaller than some (small) varepsilon, which represents the largest error that may arise in the evaluation of the expression. The threshold varepsilon depends on the structure of the expression and on the adopted computer arithmetic, assuming that the input operands are error-free. A pair (arithmetic engine,threshold) is an "arithmetic filter". In this paper we develop a general technique for assessing the efficacy of an arithmetic filter. The analysis consists of evaluating both the threshold and the probability of failure of the filter. To exemplify the approach, under the assumption that the input points be chosen randomly in a unit ball or unit cube with uniform density, we analyze the two important predicates "which-side" and "insphere". We show that the probability that the absolute values of the corresponding determinants be no larger than some positive value V, with emphasis on small V, is Theta(V) for the which-side predicate, while for the insphere predicate it is Theta(V^(2/3)) in dimension 1, O(sqrt(V)) in dimension 2, and O(sqrt(V) ln(1/V)) in higher dimensions. Constants are small, and are given in the paper.
[ { "version": "v1", "created": "Mon, 19 Jul 1999 15:22:19 GMT" }, { "version": "v2", "created": "Wed, 21 Jul 1999 07:27:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ], [ "Preparata", "Franco P.", "" ] ]
cs/9907032
Clare Dixon
Michael Fisher (1), Clare Dixon (1), Martin Peim (2) ((1) Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, UK, (2) Department of Computer Science, Victoria University of Manchester, Manchester, UK)
Clausal Temporal Resolution
35 pages, 0 figures Expanded related work, corrected typos, expanded proofs
null
null
null
cs.LO cs.AI
null
In this article, we examine how clausal resolution can be applied to a specific, but widely used, non-classical logic, namely discrete linear temporal logic. Thus, we first define a normal form for temporal formulae and show how arbitrary temporal formulae can be translated into the normal form, while preserving satisfiability. We then introduce novel resolution rules that can be applied to formulae in this normal form, provide a range of examples and examine the correctness and complexity of this approach is examined and. This clausal resolution approach. Finally, we describe related work and future developments concerning this work.
[ { "version": "v1", "created": "Wed, 21 Jul 1999 15:48:06 GMT" }, { "version": "v2", "created": "Fri, 14 Apr 2000 10:13:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Fisher", "Michael", "" ], [ "Dixon", "Clare", "" ], [ "Peim", "Martin", "" ] ]
cs/9907033
Joerg Rothe
Lane A. Hemaspaandra and Joerg Rothe
Unambiguous Computation: Boolean Hierarchies and Sparse Turing-Complete Sets
27 pages
SIAM Journal on Computing vol. 26, no. 3, pp. 634--653, 1997
null
earlier version appeared as University of Rochester TR-94-483
cs.CC
null
It is known that for any class C closed under union and intersection, the Boolean closure of C, the Boolean hierarchy over C, and the symmetric difference hierarchy over C all are equal. We prove that these equalities hold for any complexity class closed under intersection; in particular, they thus hold for unambiguous polynomial time (UP). In contrast to the NP case, we prove that the Hausdorff hierarchy and the nested difference hierarchy over UP both fail to capture the Boolean closure of UP in some relativized worlds. Karp and Lipton proved that if nondeterministic polynomial time has sparse Turing-complete sets, then the polynomial hierarchy collapses. We establish the first consequences from the assumption that unambiguous polynomial time has sparse Turing-complete sets: (a) UP is in Low_2, where Low_2 is the second level of the low hierarchy, and (b) each level of the unambiguous polynomial hierarchy is contained one level lower in the promise unambiguous polynomial hierarchy than is otherwise known to be the case.
[ { "version": "v1", "created": "Mon, 26 Jul 1999 10:09:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9907034
Joerg Rothe
Lane A. Hemaspaandra, Zhigen Jiang, Joerg Rothe and Osamu Watanabe
Polynomial-Time Multi-Selectivity
40 pages
Journal of Universal Computer Science vol. 3, no. 3, pp. 197--229, 1997
null
earlier version appeared as FSU Jena TR Math/Inf/96/11
cs.CC
null
We introduce a generalization of Selman's P-selectivity that yields a more flexible notion of selectivity, called (polynomial-time) multi-selectivity, in which the selector is allowed to operate on multiple input strings. Since our introduction of this class, it has been used to prove the first known (and optimal) lower bounds for generalized selectivity-like classes in terms of EL_2, the second level of the extended low hierarchy. We study the resulting selectivity hierarchy, denoted by SH, which we prove does not collapse. In particular, we study the internal structure and the properties of SH and completely establish, in terms of incomparability and strict inclusion, the relations between our generalized selectivity classes and Ogihara's P-mc (polynomial-time membership-comparable) classes. Although SH is a strictly increasing infinite hierarchy, we show that the core results that hold for the P-selective sets and that prove them structurally simple also hold for SH. In particular, all sets in SH have small circuits; the NP sets in SH are in Low_2, the second level of the low hierarchy within NP; and SAT cannot be in SH unless P = NP. Finally, it is known that P-Sel, the class of P-selective sets, is not closed under union or intersection. We provide an extended selectivity hierarchy that is based on SH and that is large enough to capture those closures of the P-selective sets, and yet, in contrast with the P-mc classes, is refined enough to distinguish them.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 20:55:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Jiang", "Zhigen", "" ], [ "Rothe", "Joerg", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/9907035
Joerg Rothe
Lane A. Hemaspaandra, Joerg Rothe and Gerd Wechsung
Easy Sets and Hard Certificate Schemes
26 pages
Acta Informatica vol. 34, no 11, pp. 859--879, 1997
null
earlier version appeared as FSU Jena TR Math/95/5
cs.CC
null
Can easy sets only have easy certificate schemes? In this paper, we study the class of sets that, for all NP certificate schemes (i.e., NP machines), always have easy acceptance certificates (i.e., accepting paths) that can be computed in polynomial time. We also study the class of sets that, for all NP certificate schemes, infinitely often have easy acceptance certificates. In particular, we provide equivalent characterizations of these classes in terms of relative generalized Kolmogorov complexity, showing that they are robust. We also provide structural conditions---regarding immunity and class collapses---that put upper and lower bounds on the sizes of these two classes. Finally, we provide negative results showing that some of our positive claims are optimal with regard to being relativizable. Our negative results are proven using a novel observation: we show that the classical ``wide spacing'' oracle construction technique yields instant non-bi-immunity results. Furthermore, we establish a result that improves upon Baker, Gill, and Solovay's classical result that NP \neq P = NP \cap coNP holds in some relativized world.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 21:05:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ], [ "Wechsung", "Gerd", "" ] ]
cs/9907036
Joerg Rothe
Edith Hemaspaandra, Lane A. Hemaspaandra and Joerg Rothe
Exact Analysis of Dodgson Elections: Lewis Carroll's 1876 Voting System is Complete for Parallel Access to NP
22 pages
Journal of the ACM vol. 44, no. 6, pp. 806--825, 1997
null
earlier version appeared as University of Rochester TR-96-640
cs.CC
null
In 1876, Lewis Carroll proposed a voting system in which the winner is the candidate who with the fewest changes in voters' preferences becomes a Condorcet winner---a candidate who beats all other candidates in pairwise majority-rule elections. Bartholdi, Tovey, and Trick provided a lower bound---NP-hardness---on the computational complexity of determining the election winner in Carroll's system. We provide a stronger lower bound and an upper bound that matches our lower bound. In particular, determining the winner in Carroll's system is complete for parallel access to NP, i.e., it is complete for $\thetatwo$, for which it becomes the most natural complete problem known. It follows that determining the winner in Carroll's elections is not NP-complete unless the polynomial hierarchy collapses.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 21:16:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9907037
Joerg Rothe
Lane A. Hemaspaandra, Zhigen Jiang, Joerg Rothe and Osamu Watanabe
Boolean Operations, Joins, and the Extended Low Hierarchy
12 pages
Theoretical Computer Science vol. 205, no. 1-2, pp. 317--327, 1998
null
earlier version appeared as University of Rochester TR-96-627
cs.CC
null
We prove that the join of two sets may actually fall into a lower level of the extended low hierarchy than either of the sets. In particular, there exist sets that are not in the second level of the extended low hierarchy, EL_2, yet their join is in EL_2. That is, in terms of extended lowness, the join operator can lower complexity. Since in a strong intuitive sense the join does not lower complexity, our result suggests that the extended low hierarchy is unnatural as a complexity measure. We also study the closure properties of EL_ and prove that EL_2 is not closed under certain Boolean operations. To this end, we establish the first known (and optimal) EL_2 lower bounds for certain notions generalizing Selman's P-selectivity, which may be regarded as an interesting result in its own right.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 21:30:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Jiang", "Zhigen", "" ], [ "Rothe", "Joerg", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/9907038
Joerg Rothe
Lane A. Hemaspaandra and Joerg Rothe
A Second Step Towards Complexity-Theoretic Analogs of Rice's Theorem
14 pages. To appear in Theoretical Computer Science
null
null
earlier version appeared as University of Rochester TR-97-662
cs.CC
null
Rice's Theorem states that every nontrivial language property of the recursively enumerable sets is undecidable. Borchert and Stephan initiated the search for complexity-theoretic analogs of Rice's Theorem. In particular, they proved that every nontrivial counting property of circuits is UP-hard, and that a number of closely related problems are SPP-hard. The present paper studies whether their UP-hardness result itself can be improved to SPP-hardness. We show that their UP-hardness result cannot be strengthened to SPP-hardness unless unlikely complexity class containments hold. Nonetheless, we prove that every P-constructibly bi-infinite counting property of circuits is SPP-hard. We also raise their general lower bound from unambiguous nondeterminism to constant-ambiguity nondeterminism.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 21:39:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9907039
Joerg Rothe
Edith Hemaspaandra, Lane A. Hemaspaandra and Joerg Rothe
Raising NP Lower Bounds to Parallel NP Lower Bounds
14 pages
SIGACT News vol. 28, no. 2, pp. 2--13, 1997
null
earlier version appeared as University of Rochester TR-97-658
cs.CC
null
A decade ago, a beautiful paper by Wagner developed a ``toolkit'' that in certain cases allows one to prove problems hard for parallel access to NP. However, the problems his toolkit applies to most directly are not overly natural. During the past year, problems that previously were known only to be NP-hard or coNP-hard have been shown to be hard even for the class of sets solvable via parallel access to NP. Many of these problems are longstanding and extremely natural, such as the Minimum Equivalent Expression problem (which was the original motivation for creating the polynomial hierarchy), the problem of determining the winner in the election system introduced by Lewis Carroll in 1876, and the problem of determining on which inputs heuristic algorithms perform well. In the present article, we survey this recent progress in raising lower bounds.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 21:47:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9907040
Joerg Rothe
Joerg Rothe and Lane A. Hemaspaandra
Characterizations of the Existence of Partial and Total One-Way Permutations
12 pages; An extended abstract of this paper was presented at the Third Italian Conference on Algorithms and Complexity
null
null
null
cs.CC cs.CR
null
In this note, we study the easy certificate classes introduced by Hemaspaandra, Rothe, and Wechsung, with regard to the question of whether or not surjective one-way functions exist. This is an important open question in cryptology. We show that the existence of partial one-way permutations can be characterized by separating P from the class of UP sets that, for all unambiguous polynomial-time Turing machines accepting them, always have easy (i.e., polynomial-time computable) certificates. This extends results of Grollmann and Selman. By Gr\"adel's recent results about one-way functions, this also links statements about easy certificates of NP sets with statements in finite model theory. Similarly, there exist surjective poly-one one-way functions if and only if there is a set L in P such that not all FewP machines accepting L always have easy certificates. We also establish a condition necessary and sufficient for the existence of (total) one-way permutations.
[ { "version": "v1", "created": "Mon, 26 Jul 1999 10:42:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Rothe", "Joerg", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
cs/9907041
Joerg Rothe
Bernd Borchert, Lane A. Hemaspaandra and Joerg Rothe
Restrictive Acceptance Suffices for Equivalence Problems
14 pages; to appear in Proc. FCT'99
null
null
Revises Friedrich-Schiller-Universit\"at Jena Technical Report Math/Inf/96/13
cs.CC
null
One way of suggesting that an NP problem may not be NP-complete is to show that it is in the class UP. We suggest an analogous new approach---weaker in strength of evidence but more broadly applicable---to suggesting that concrete~NP problems are not NP-complete. In particular we introduce the class EP, the subclass of NP consisting of those languages accepted by NP machines that when they accept always have a number of accepting paths that is a power of two. Since if any NP-complete set is in EP then all NP sets are in EP, it follows---with whatever degree of strength one believes that EP differs from NP---that membership in EP can be viewed as evidence that a problem is not NP-complete. We show that the negation equivalence problem for OBDDs (ordered binary decision diagrams) and the interchange equivalence problem for 2-dags are in EP. We also show that for boolean negation the equivalence problem is in EP^{NP}, thus tightening the existing NP^{NP} upper bound. We show that FewP, bounded ambiguity polynomial time, is contained in EP, a result that is not known to follow from the previous SPP upper bound. For the three problems and classes just mentioned with regard to EP, no proof of membership/containment in UP is known, and for the problem just mentioned with regard to EP^{NP}, no proof of membership in UP^{NP} is known. Thus, EP is indeed a tool that gives evidence against NP-completeness in natural cases where UP cannot currently be applied.
[ { "version": "v1", "created": "Mon, 26 Jul 1999 10:50:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Borchert", "Bernd", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9907042
Scott Nicholson
Scott Nicholson
Raising Reliability of Web Search Tool Research through Replication and Chaos Theory
null
null
null
null
cs.IR cs.DL
null
Because the World Wide Web is a dynamic collection of information, the Web search tools (or "search engines") that index the Web are dynamic. Traditional information retrieval evaluation techniques may not provide reliable results when applied to the Web search tools. This study is the result of ten replications of the classic 1996 Ding and Marchionini Web search tool research. It explores the effects that replication can have on transforming unreliable results from one iteration into replicable and therefore reliable results after multiple iterations.
[ { "version": "v1", "created": "Tue, 27 Jul 1999 16:42:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Nicholson", "Scott", "" ] ]
cs/9907043
Christoph Best
Christoph Best (ZIB, Berlin, and J. v. Neumann Institute, Juelich)
A simple C++ library for manipulating scientific data sets as structured data
22 pages, LaTeX. Also available at http://www.zib.de/PaperWeb/abstracts/TR-98-06/
null
null
TR 98-06 (ZIB Berlin)
cs.CE cs.DB
null
Representing scientific data sets efficiently on external storage usually involves converting them to a byte string representation using specialized reader/writer routines. The resulting storage files are frequently difficult to interpret without these specialized routines as they do not contain information about the logical structure of the data. Avoiding such problems usually involves heavy-weight data format libraries or data base systems. We present a simple C++ library that allows to create and access data files that store structured data. The structure of the data is described by a data type that can be built from elementary data types (integer and floating-point numbers, byte strings) and composite data types (arrays, structures, unions). An abstract data access class presents the data to the application. Different actual data file structures can be implemented under this layer. This method is particularly suited to applications that require complex data structures, e.g. molecular dynamics simulations. Extensions such as late type binding and object persistence are discussed.
[ { "version": "v1", "created": "Fri, 30 Jul 1999 08:35:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Best", "Christoph", "", "ZIB, Berlin, and J. v. Neumann Institute, Juelich" ] ]
cs/9908001
Zvi Marx
Zvika Marx (1 and 2), Ido Dagan (1), Eli Shamir (2) ((1) Bar-Ilan University, (2) The Hebrew University of Jerusalem)
Detecting Sub-Topic Correspondence through Bipartite Term Clustering
html with 3 gif figures; generated from 7 pages MS-Word file
Proceedings of ACL'99 Workshop on Unsupervised Learning in Natural Language Processing, 1999, pp 45-51
null
null
cs.CL
null
This paper addresses a novel task of detecting sub-topic correspondence in a pair of text fragments, enhancing common notions of text similarity. This task is addressed by coupling corresponding term subsets through bipartite clustering. The paper presents a cost-based clustering scheme and compares it with a bipartite version of the single-link method, providing illustrating results.
[ { "version": "v1", "created": "Sun, 1 Aug 1999 14:02:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Marx", "Zvika", "", "1 and 2" ], [ "Dagan", "Ido", "" ], [ "Shamir", "Eli", "" ] ]
cs/9908003
Erik Demaine
Marshall Bern, Erik D. Demaine, David Eppstein, Eric Kuo, Andrea Mantler, Jack Snoeyink
Ununfoldable Polyhedra with Convex Faces
14 pages, 9 figures, LaTeX 2e. To appear in Computational Geometry: Theory and Applications. Major revision with two new authors, solving the open problem about triangular faces
Computational Geometry: Theory and Applications 24(2):51-62, February 2003
null
null
cs.CG cs.DM
null
Unfolding a convex polyhedron into a simple planar polygon is a well-studied problem. In this paper, we study the limits of unfoldability by studying nonconvex polyhedra with the same combinatorial structure as convex polyhedra. In particular, we give two examples of polyhedra, one with 24 convex faces and one with 36 triangular faces, that cannot be unfolded by cutting along edges. We further show that such a polyhedron can indeed be unfolded if cuts are allowed to cross faces. Finally, we prove that ``open'' polyhedra with triangular faces may not be unfoldable no matter how they are cut.
[ { "version": "v1", "created": "Tue, 3 Aug 1999 17:37:04 GMT" }, { "version": "v2", "created": "Mon, 27 Aug 2001 20:42:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Bern", "Marshall", "" ], [ "Demaine", "Erik D.", "" ], [ "Eppstein", "David", "" ], [ "Kuo", "Eric", "" ], [ "Mantler", "Andrea", "" ], [ "Snoeyink", "Jack", "" ] ]
cs/9908004
Patrik Simons
Patrik Simons
Extending the Stable Model Semantics with More Expressive Rules
18 pages, a shortened version will be published in the proceedings of the 5th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR'99)
null
null
null
cs.LO cs.AI
null
The rules associated with propositional logic programs and the stable model semantics are not expressive enough to let one write concise programs. This problem is alleviated by introducing some new types of propositional rules. Together with a decision procedure that has been used as a base for an efficient implementation, the new rules supplant the standard ones in practical applications of the stable model semantics.
[ { "version": "v1", "created": "Fri, 6 Aug 1999 06:01:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Simons", "Patrik", "" ] ]
cs/9908005
Joseph O'Rourke
Roxana Cocan and Joseph O'Rourke
Polygonal Chains Cannot Lock in 4D
Major revision of the Aug. 1999 version, including: Proof extended to show trees cannot lock in 4D; new example of the implementation straightening a chain of n=100 vertices; improved time complexity for chain to O(n^2); fixed several minor technical errors. (Thanks to three referees.) 29 pages; 15 figures. v3: Reference updated
null
null
Smith Technical Report 063
cs.CG cs.DM
null
We prove that, in all dimensions d>=4, every simple open polygonal chain and every tree may be straightened, and every simple closed polygonal chain may be convexified. These reconfigurations can be achieved by algorithms that use polynomial time in the number of vertices, and result in a polynomial number of ``moves.'' These results contrast to those known for d=2, where trees can ``lock,'' and for d=3, where open and closed chains can lock.
[ { "version": "v1", "created": "Wed, 11 Aug 1999 16:09:59 GMT" }, { "version": "v2", "created": "Fri, 2 Feb 2001 21:48:48 GMT" }, { "version": "v3", "created": "Tue, 20 Feb 2001 19:10:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Cocan", "Roxana", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/9908006
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 36
To appear in SIGACT News and in Int. J. Comp. Geom. Appl., 1999. Replacement corrects disk-packing reference: [BDDH98] -> [BDEH98]
null
null
null
cs.CG
null
Two results in "computational origami" are illustrated.
[ { "version": "v1", "created": "Wed, 11 Aug 1999 17:14:00 GMT" }, { "version": "v2", "created": "Fri, 13 Aug 1999 13:46:20 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/9908007
Joseph O'Rourke
Erik D. Demaine and Joseph O'Rourke
Computational Geometry Column 37
To appear in SIGACT News, and in Int. J. Comp. Geom. Appl., 1999
null
null
null
cs.CG
null
Open problems from the 15th Annual ACM Symposium on Computational Geometry.
[ { "version": "v1", "created": "Wed, 11 Aug 1999 17:19:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/9908008
Dahlia Malkhi
Dahlia Malkhi, Michael Merritt and Ohad Rodeh
Secure Multicast in a WAN
preprint of a paper to appear in the Distributed Computing Journal
null
null
null
cs.CR cs.DC
null
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the malicious efforts of fewer than a third of the total number of processes, including the sender. This has been sh own to be a useful tool in building secure distributed services, albeit with a cost that typically grows linearly with the size of the system. For very large networks, for which this is prohibitive, we present two approaches for reducing the cost: First, we show a protocol whose cost is on the order of the number of tolerated failures. Secondly, we show how relaxing the consistency requirement to a probabilistic guarantee can reduce the associated cost, effectively to a constant.
[ { "version": "v1", "created": "Thu, 12 Aug 1999 17:40:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Malkhi", "Dahlia", "" ], [ "Merritt", "Michael", "" ], [ "Rodeh", "Ohad", "" ] ]
cs/9908009
Dahlia Malkhi
Dahlia Malkhi and Michael Reiter
Secure Execution of Java Applets using a Remote Playground
preprint of a paper to appear in IEEE Transactions on Software Engineering
null
null
null
cs.CR cs.NI
null
Mobile code presents a number of threats to machines that execute it. We introduce an approach for protecting machines and the resources they hold from mobile code, and describe a system based on our approach for protecting host machines from Java 1.1 applets. In our approach, each Java applet downloaded to the protected domain is rerouted to a dedicated machine (or set of machines), the {\em playground}, at which it is executed. Prior to execution the applet is transformed to use the downloading user's web browser as a graphics terminal for its input and output, and so the user has the illusion that the applet is running on her own machine. In reality, however, mobile code runs only in the sanitized environment of the playground, where user files cannot be mounted and from which only limited network connections are accepted by machines in the protected domain. Our playground thus provides a second level of defense against mobile code that circumvents language-based defenses. The paper presents the design and implementation of a playground for Java 1.1 applets, and discusses extensions of it for other forms of mobile code including Java 1.2.
[ { "version": "v1", "created": "Thu, 12 Aug 1999 17:50:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Malkhi", "Dahlia", "" ], [ "Reiter", "Michael", "" ] ]
cs/9908010
Dahlia Malkhi
Dahlia Malkhi, Yishay Mansour and Michael Reiter
On Propagating Updates in a Byzantine Environment
null
null
null
null
cs.DC cs.CR
null
We study how to efficiently diffuse updates to a large distributed system of data replicas, some of which may exhibit arbitrary (Byzantine) failures. We assume that strictly fewer than $t$ replicas fail, and that each update is initially received by at least $t$ correct replicas. The goal is to diffuse each update to all correct replicas while ensuring that correct replicas accept no updates generated spuriously by faulty replicas. To achieve reliable diffusion, each correct replica accepts an update only after receiving it from at least $t$ others. We provide the first analysis of epidemic-style protocols for such environments. This analysis is fundamentally different from known analyses for the benign case due to our treatment of fully Byzantine failures---which, among other things, precludes the use of digital signatures for authenticating forwarded updates. We propose two epidemic-style diffusion algorithms and two measures that characterize the efficiency of diffusion algorithms in general. We characterize both of our algorithms according to these measures, and also prove lower bounds with regards to these measures that show that our algorithms are close to optimal.
[ { "version": "v1", "created": "Thu, 12 Aug 1999 18:00:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Malkhi", "Dahlia", "" ], [ "Mansour", "Yishay", "" ], [ "Reiter", "Michael", "" ] ]
cs/9908011
Dahlia Malkhi
Dahlia Malkhi, Michael Reiter and Avishai Wool
The Load and Availability of Byzantine Quorum Systems
preprint of a paper to appear in the SIAM Journal of Computing
null
null
null
cs.DC cs.CR
null
Replicated services accessed via {\em quorums} enable each access to be performed at only a subset (quorum) of the servers, and achieve consistency across accesses by requiring any two quorums to intersect. Recently, $b$-masking quorum systems, whose intersections contain at least $2b+1$ servers, have been proposed to construct replicated services tolerant of $b$ arbitrary (Byzantine) server failures. In this paper we consider a hybrid fault model allowing benign failures in addition to the Byzantine ones. We present four novel constructions for $b$-masking quorum systems in this model, each of which has optimal {\em load} (the probability of access of the busiest server) or optimal availability (probability of some quorum surviving failures). To show optimality we also prove lower bounds on the load and availability of any $b$-masking quorum system in this model.
[ { "version": "v1", "created": "Thu, 12 Aug 1999 18:06:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Malkhi", "Dahlia", "" ], [ "Reiter", "Michael", "" ], [ "Wool", "Avishai", "" ] ]
cs/9908012
H. M. Gladney
H.M. Gladney
Safe Deals Between Strangers
31 pages, 6 figures
null
null
null
cs.CR cs.DL
null
E-business, information serving, and ubiquitous computing will create heavy request traffic from strangers or even incognitos. Such requests must be managed automatically. Two ways of doing this are well known: giving every incognito consumer the same treatment, and rendering service in return for money. However, different behavior will be often wanted, e.g., for a university library with different access policies for undergraduates, graduate students, faculty, alumni, citizens of the same state, and everyone else. For a data or process server contacted by client machines on behalf of users not previously known, we show how to provide reliable automatic access administration conforming to service agreements. Implementations scale well from very small collections of consumers and producers to immense client/server networks. Servers can deliver information, effect state changes, and control external equipment. Consumer privacy is easily addressed by the same protocol. We support consumer privacy, but allow servers to deny their resources to incognitos. A protocol variant even protects against statistical attacks by consortia of service organizations. One e-commerce application would put the consumer's tokens on a smart card whose readers are in vending kiosks. In e-business we can simplify supply chain administration. Our method can also be used in sensitive networks without introducing new security loopholes.
[ { "version": "v1", "created": "Tue, 17 Aug 1999 01:09:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Gladney", "H. M.", "" ] ]
cs/9908014
Kagan Tumer
David H. Wolpert and Kagan Tumer
An Introduction to Collective Intelligence
88 pages, 10 figs, 297 refs
null
null
NASA-ARC-IC-99-63
cs.LG adap-org cond-mat cs.DC cs.MA nlin.AO
null
This paper surveys the emerging science of how to design a ``COllective INtelligence'' (COIN). A COIN is a large multi-agent system where: (i) There is little to no centralized communication or control; and (ii) There is a provided world utility function that rates the possible histories of the full system. In particular, we are interested in COINs in which each agent runs a reinforcement learning (RL) algorithm. Rather than use a conventional modeling approach (e.g., model the system dynamics, and hand-tune agents to cooperate), we aim to solve the COIN design problem implicitly, via the ``adaptive'' character of the RL algorithms of each of the agents. This approach introduces an entirely new, profound design problem: Assuming the RL algorithms are able to achieve high rewards, what reward functions for the individual agents will, when pursued by those agents, result in high world utility? In other words, what reward functions will best ensure that we do not have phenomena like the tragedy of the commons, Braess's paradox, or the liquidity trap? Although still very young, research specifically concentrating on the COIN design problem has already resulted in successes in artificial domains, in particular in packet-routing, the leader-follower problem, and in variants of Arthur's El Farol bar problem. It is expected that as it matures and draws upon other disciplines related to COINs, this research will greatly expand the range of tasks addressable by human engineers. Moreover, in addition to drawing on them, such a fully developed scie nce of COIN design may provide much insight into other already established scientific fields, such as economics, game theory, and population biology.
[ { "version": "v1", "created": "Tue, 17 Aug 1999 22:49:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolpert", "David H.", "" ], [ "Tumer", "Kagan", "" ] ]
cs/9908015
Simon Buckingham Shum
Simon Buckingham Shum, Enrico Motta and John Domingue
Representing Scholarly Claims in Internet Digital Libraries: A Knowledge Modelling Approach
18 pages. Preprint, to appear: Proceedings of ECDL'99: Third European Conference on Research and Advanced Technology for Digital Libraries, Paris, France, September 22-24, 1999. Springer-Verlag Lecture Notes in Computer Science (Eds.) Serge Abiteboul and Anne-Marie Vercoustre
null
null
KMI-TR-80
cs.DL cs.AI cs.HC cs.IR
null
This paper is concerned with tracking and interpreting scholarly documents in distributed research communities. We argue that current approaches to document description, and current technological infrastructures particularly over the World Wide Web, provide poor support for these tasks. We describe the design of a digital library server which will enable authors to submit a summary of the contributions they claim their documents makes, and its relations to the literature. We describe a knowledge-based Web environment to support the emergence of such a community-constructed semantic hypertext, and the services it could provide to assist the interpretation of an idea or document in the context of its literature. The discussion considers in detail how the approach addresses usability issues associated with knowledge structuring environments.
[ { "version": "v1", "created": "Thu, 19 Aug 1999 09:51:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Shum", "Simon Buckingham", "" ], [ "Motta", "Enrico", "" ], [ "Domingue", "John", "" ] ]
cs/9908016
David Eppstein
Marshall Bern and David Eppstein
Quadrilateral Meshing by Circle Packing
12 pages, 10 figures. To appear in Int. J. Comp. Geom. & Appl. A preliminary version of this work was presented at the 6th Int. Meshing Roundtable, Park City, Utah, 1997
Int. J. Comp. Geom. & Appl. 10(4):347-360, Aug. 2000
null
null
cs.CG
null
We use circle-packing methods to generate quadrilateral meshes for polygonal domains, with guaranteed bounds both on the quality and the number of elements. We show that these methods can generate meshes of several types: (1) the elements form the cells of a Voronoi diagram, (2) all elements have two opposite right angles, (3) all elements are kites, or (4) all angles are at most 120 degrees. In each case the total number of elements is O(n), where n is the number of input vertices.
[ { "version": "v1", "created": "Thu, 19 Aug 1999 20:40:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Bern", "Marshall", "" ], [ "Eppstein", "David", "" ] ]