id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-21 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/9908017 | Andreas Siebert | Andreas Siebert | A Differential Invariant for Zooming | 5 pages, 7 figures | Proceedings 1999 International Conference on Image Processing,
Kobe, 25-28 October 1999 | null | null | cs.CV | null | This paper presents an invariant under scaling and linear brightness change.
The invariant is based on differentials and therefore is a local feature.
Rotationally invariant 2-d differential Gaussian operators up to third order
are proposed for the implementation of the invariant. The performance is
analyzed by simulating a camera zoom-out.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 1999 17:18:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siebert",
"Andreas",
""
]
] |
cs/9908018 | Rigo Michel | Michel Rigo | Construction of regular languages and recognizability of polynomials | 11 pages | null | null | null | cs.CC | null | A generalization of numeration system in which the set N of the natural
numbers is recognizable by finite automata can be obtained by describing a
lexicographically ordered infinite regular language. Here we show that if P
belonging to Q[x] is a polynomial such that P(N) is a subset of N then we can
construct a numeration system in which the set of representations of P(N) is
regular. The main issue in this construction is to setup a regular language
with a density function equals to P(n+1)-P(n) for n large enough.
| [
{
"version": "v1",
"created": "Fri, 27 Aug 1999 07:33:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rigo",
"Michel",
""
]
] |
cs/9909001 | David Eppstein | Marshall Bern, David Eppstein, Pankaj K. Agarwal, Nina Amenta, Paul
Chew, Tamal Dey, David P. Dobkin, Herbert Edelsbrunner, Cindy Grimm, Leonidas
J. Guibas, John Harer, Joel Hass, Andrew Hicks, Carroll K. Johnson, Gilad
Lerman, David Letscher, Paul Plassmann, Eric Sedgwick, Jack Snoeyink, Jeff
Weeks, Chee Yap, and Denis Zorin | Emerging Challenges in Computational Topology | 20 pages | null | null | null | cs.CG math.GT | null | Here we present the results of the NSF-funded Workshop on Computational
Topology, which met on June 11 and 12 in Miami Beach, Florida. This report
identifies important problems involving both computation and topology.
| [
{
"version": "v1",
"created": "Wed, 1 Sep 1999 20:33:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bern",
"Marshall",
""
],
[
"Eppstein",
"David",
""
],
[
"Agarwal",
"Pankaj K.",
""
],
[
"Amenta",
"Nina",
""
],
[
"Chew",
"Paul",
""
],
[
"Dey",
"Tamal",
""
],
[
"Dobkin",
"David P.",
""
],
[
"Edelsbrunner",
"Herbert",
""
],
[
"Grimm",
"Cindy",
""
],
[
"Guibas",
"Leonidas J.",
""
],
[
"Harer",
"John",
""
],
[
"Hass",
"Joel",
""
],
[
"Hicks",
"Andrew",
""
],
[
"Johnson",
"Carroll K.",
""
],
[
"Lerman",
"Gilad",
""
],
[
"Letscher",
"David",
""
],
[
"Plassmann",
"Paul",
""
],
[
"Sedgwick",
"Eric",
""
],
[
"Snoeyink",
"Jack",
""
],
[
"Weeks",
"Jeff",
""
],
[
"Yap",
"Chee",
""
],
[
"Zorin",
"Denis",
""
]
] |
cs/9909002 | Vincenzo Pallotta | Afzal Ballim and Vincenzo Pallotta | Semantic robust parsing for noun extraction from natural language
queries | null | Proceedings of WPDI'99 (Workshop on Procedures in Discourse
Interpretation),1999, Iasi - Romania | null | null | cs.CL | null | This paper describes how robust parsing techniques can be fruitful applied
for building a query generation module which is part of a pipelined NLP
architecture aimed at process natural language queries in a restricted domain.
We want to show that semantic robustness represents a key issue in those NLP
systems where it is more likely to have partial and ill-formed utterances due
to various factors (e.g. noisy environments, low quality of speech recognition
modules, etc...) and where it is necessary to succeed, even if partially, in
extracting some meaningful information.
| [
{
"version": "v1",
"created": "Thu, 2 Sep 1999 15:53:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ballim",
"Afzal",
""
],
[
"Pallotta",
"Vincenzo",
""
]
] |
cs/9909003 | Rabindra Narayan Behera | S. Mohanty (1) and R.N. Behera (2) ((1) Department of Computer Science
and Application Utkal University, Bhubaneswar, India, (2) National
Informatics Centre, Puri, India) | Iterative Deepening Branch and Bound | 39 html pages + 4 gif files (fig1,fig1(a),fig2,fig3) | null | null | null | cs.AI | null | In tree search problem the best-first search algorithm needs too much of
space . To remove such drawbacks of these algorithms the IDA* was developed
which is both space and time cost efficient. But again IDA* can give an optimal
solution for real valued problems like Flow shop scheduling, Travelling
Salesman and 0/1 Knapsack due to their real valued cost estimates. Thus further
modifications are done on it and the Iterative Deepening Branch and Bound
Search Algorithms is developed which meets the requirements. We have tried
using this algorithm for the Flow Shop Scheduling Problem and have found that
it is quite effective.
| [
{
"version": "v1",
"created": "Fri, 3 Sep 1999 10:31:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mohanty",
"S.",
""
],
[
"Behera",
"R. N.",
""
]
] |
cs/9909004 | Devillers | Jean-Daniel Boissonnat, Jurek Czyzowicz, Olivier Devillers, Jean-Marc
Robert, Mariette Yvinec | Convex Tours of Bounded Curvature | 11 pages, 5 figures, abstract presented at European Symposium on
Algorithms 1993 | null | null | INRIA Research report 2375 | cs.CG | null | We consider the motion planning problem for a point constrained to move along
a smooth closed convex path of bounded curvature. The workspace of the moving
point is bounded by a convex polygon with m vertices, containing an obstacle in
a form of a simple polygon with $n$ vertices. We present an O(m+n) time
algorithm finding the path, going around the obstacle, whose curvature is the
smallest possible.
| [
{
"version": "v1",
"created": "Fri, 3 Sep 1999 15:09:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boissonnat",
"Jean-Daniel",
""
],
[
"Czyzowicz",
"Jurek",
""
],
[
"Devillers",
"Olivier",
""
],
[
"Robert",
"Jean-Marc",
""
],
[
"Yvinec",
"Mariette",
""
]
] |
cs/9909005 | Devillers | Jean-Daniel Boissonnat, Jurek Czyzowicz, Olivier Devillers, Jorge
Urrutia, Mariette Yvinec | Computing largest circles separating two sets of segments | 14 pages, 3 figures, abstract presented at 8th Canadian Conference on
Computational Geometry, 1996 | null | null | INRIA Research report 2705 | cs.CG | null | A circle $C$ separates two planar sets if it encloses one of the sets and its
open interior disk does not meet the other set. A separating circle is a
largest one if it cannot be locally increased while still separating the two
given sets. An Theta(n log n) optimal algorithm is proposed to find all largest
circles separating two given sets of line segments when line segments are
allowed to meet only at their endpoints. In the general case, when line
segments may intersect $\Omega(n^2)$ times, our algorithm can be adapted to
work in O(n alpha(n) log n) time and O(n \alpha(n)) space, where alpha(n)
represents the extremely slowly growing inverse of the Ackermann function.
| [
{
"version": "v1",
"created": "Fri, 3 Sep 1999 15:29:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boissonnat",
"Jean-Daniel",
""
],
[
"Czyzowicz",
"Jurek",
""
],
[
"Devillers",
"Olivier",
""
],
[
"Urrutia",
"Jorge",
""
],
[
"Yvinec",
"Mariette",
""
]
] |
cs/9909008 | Geoffrey McKim | Rob Kling, Geoffrey McKim | Not Just a Matter of Time: Field Differences and the Shaping of
Electronic Media in Supporting Scientific Communication | Accepted for publication in the Journal of the American Society for
Information Science. Version was reformatted with several minor text changes | null | null | null | cs.CY | null | The shift towards the use of electronic media in scholarly communication
appears to be an inescapable imperative. However, these shifts are uneven, both
with respect to field and with respect to the form of communication. Different
scientific fields have developed and use distinctly different communicative
forums, both in the paper and electronic arenas, and these forums play
different communicative roles within the field. One common claim is that we are
in the early stages of an electronic revolution, that it is only a matter of
time before other fields catch up with the early adopters, and that all fields
converge on a stable set of electronic forums. A social shaping of technology
(SST) perspective helps us to identify important social forces centered around
disciplinary constructions of trust and of legitimate communication that pull
against convergence. This analysis concludes that communicative plurality and
communicative heterogeneity are durable features of the scholarly landscape,
and that we are likely to see field differences in the use of and meaning
ascribed to communications forums persist, even as overall use of electronic
communications technologies both in science and in society as a whole
increases.
| [
{
"version": "v1",
"created": "Tue, 7 Sep 1999 11:35:28 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Apr 2000 17:43:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kling",
"Rob",
""
],
[
"McKim",
"Geoffrey",
""
]
] |
cs/9909009 | Krzysztof R. Apt | Krzysztof R. Apt | The Rough Guide to Constraint Propagation | 23 pages. To appear in the Proc. 5th International Conference on
Principles and Practice of Constraint Programming as an invited talk | null | null | null | cs.AI cs.PL | null | We provide here a simple, yet very general framework that allows us to
explain several constraint propagation algorithms in a systematic way. In
particular, using the notions commutativity and semi-commutativity, we show how
the well-known AC-3, PC-2, DAC and DPC algorithms are instances of a single
generic algorithm. The work reported here extends and simplifies that of Apt,
cs.AI/9811024.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 1999 13:50:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] |
cs/9909010 | Krzysztof R. Apt | Krzysztof R. Apt and Eric Monfroy | Automatic Generation of Constraint Propagation Algorithms for Small
Finite Domains | 15 pages. To appear in the Proc. 5th International Conference on
Principles and Practice of Constraint Programming | null | null | null | cs.AI cs.PL | null | We study here constraint satisfaction problems that are based on predefined,
explicitly given finite constraints. To solve them we propose a notion of rule
consistency that can be expressed in terms of rules derived from the explicit
representation of the initial constraints.
This notion of local consistency is weaker than arc consistency for
constraints of arbitrary arity but coincides with it when all domains are unary
or binary. For Boolean constraints rule consistency coincides with the closure
under the well-known propagation rules for Boolean constraints.
By generalizing the format of the rules we obtain a characterization of arc
consistency in terms of so-called inclusion rules. The advantage of rule
consistency and this rule based characterization of the arc consistency is that
the algorithms that enforce both notions can be automatically generated, as CHR
rules. So these algorithms could be integrated into constraint logic
programming systems such as Eclipse.
We illustrate the usefulness of this approach to constraint propagation by
discussing the implementations of both algorithms and their use on various
examples, including Boolean constraints, three valued logic of Kleene,
constraints dealing with Waltz's language for describing polyhedreal scenes,
and Allen's qualitative approach to temporal logic.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 1999 14:18:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Monfroy",
"Eric",
""
]
] |
cs/9909011 | Osnat Mokryn | Israel Cidon and Osnat Mokryn | Distributed Algorithms in Multihop Broadcast Networks | Apeared at the 12th International Symposium on DIStributed Computing,
(DISC98) | null | null | Technical Report CC #241, Center for Communication and Information
Technologies, Technion - Israel Institute of Technology | cs.DC cs.NI | null | Broadcast networks are often used in modern communication systems. A common
broadcast network is a single hop shared media system, where a transmitted
message is heard by all neighbors, such as some LAN networks. In this work we
consider a more complex environment, in which a transmitted message is heard
only by a group of neighbors, such as Ad-Hoc networks, satellite and radio
networks, as well as wireless multistation backbone system for mobile
communication. It is important to design efficient algorithms for such
environments. Our main result is a new Leader Election algorithm, with O(n)
time complexity and O(n*lg(n)) message transmission complexity. Our distributed
solution uses a propagation of information with feedback (PIF) building block
tuned to the broadcast media, and a special counting and joining approach for
the election procedure phase. The latter is required for achieving the linear
time. It is demonstrated that the broadcast model requires solutions which are
different from the known point-to-point model.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 1999 14:49:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cidon",
"Israel",
""
],
[
"Mokryn",
"Osnat",
""
]
] |
cs/9909012 | Jan Willemson | Jan Willemson | Certificate Revocation Paradigms | Tech report on 14 pages, 2 figures | null | null | null | cs.CR | null | Research in the field of electronic signature confirmation has been active
for some 20 years now. Unfortunately present certificate-based solutions also
come from that age when no-one knew about online data transmission. The
official standardized X.509 framework also depends heavily on offline
operations, one of the most complicated ones being certificate revocation
handling. This is done via huge Certificate Revocation Lists which are both
inconvenient and expencive. Several improvements to these lists are proposed
and in this report we try to analyze them briefly. We conclude that although it
is possible to do better than in the original X.509 setting, none of the
solutions presented this far is good enough.
| [
{
"version": "v1",
"created": "Fri, 17 Sep 1999 08:00:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Willemson",
"Jan",
""
]
] |
cs/9909013 | Jaap-Henk Hoepman | Jaap-Henk Hoepman | Self-stabilizing mutual exclusion on a ring, even if K=N | 2 pages | null | null | null | cs.DC | null | We show that, contrary to common belief, Dijkstra's self-stabilizing mutual
exclusion algorithm on a ring [Dij74,Dij82] also stabilizes when the number of
states per node is one less than the number of nodes on the ring.
| [
{
"version": "v1",
"created": "Tue, 21 Sep 1999 13:39:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hoepman",
"Jaap-Henk",
""
]
] |
cs/9909014 | Joseph Y. Halpern | Joseph Y. Halpern and Richard A. Shore | Reasoning About Common Knowledge with Infinitely Many Agents | Preliminary version appears in 14th IEEE Symposium on Logic in
Computer Science, 1999. This is the full version | null | null | null | cs.LO cs.AI | null | Complete axiomatizations and exponential-time decision procedures are
provided for reasoning about knowledge and common knowledge when there are
infinitely many agents. The results show that reasoning about knowledge and
common knowledge with infinitely many agents is no harder than when there are
finitely many agents, provided that we can check the cardinality of certain set
differences G - G', where G and G' are sets of agents. Since our complexity
results are independent of the cardinality of the sets G involved, they
represent improvements over the previous results even with the sets of agents
involved are finite. Moreover, our results make clear the extent to which
issues of complexity and completeness depend on how the sets of agents involved
are represented.
| [
{
"version": "v1",
"created": "Tue, 21 Sep 1999 20:43:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Shore",
"Richard A.",
""
]
] |
cs/9909015 | Joseph Y. Halpern | Francis C. Chu and Joseph Y. Halpern | A decision-theoretic approach to reliable message delivery | This is the full version of a paper that appears in the Proceedings
of the 12th International Symposium on Distributed Computing, 1998, pp. 89-10 | null | null | null | cs.DC | null | We argue that the tools of decision theory need to be taken more seriously in
the specification and analysis of systems. We illustrate this by considering a
simple problem involving reliable communication, showing how considerations of
utility and probability can be used to decide when it is worth sending
heartbeat messages and, if they are sent, how often they should be sent.
| [
{
"version": "v1",
"created": "Tue, 21 Sep 1999 20:51:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chu",
"Francis C.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/9909016 | Joseph Y. Halpern | Francis C. Chu, Joseph Y. Halpern, and Praveen Seshadri | Least expected cost query optimization: an exercise in utility | This paper appears in Proceedings of the Eighteenth Annual ACM
Symposium on Principles of Database Systems, 1999, pp. 138--147 | null | null | null | cs.DB | null | We identify two unreasonable, though standard, assumptions made by database
query optimizers that can adversely affect the quality of the chosen evaluation
plans. One assumption is that it is enough to optimize for the expected
case---that is, the case where various parameters (like available memory) take
on their expected value. The other assumption is that the parameters are
constant throughout the execution of the query. We present an algorithm based
on the ``System R''-style query optimization algorithm that does not rely on
these assumptions. The algorithm we present chooses the plan of the least
expected cost instead of the plan of least cost given some fixed value of the
parameters. In execution environments that exhibit a high degree of
variability, our techniques should result in better performance.
| [
{
"version": "v1",
"created": "Tue, 21 Sep 1999 21:20:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chu",
"Francis C.",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Seshadri",
"Praveen",
""
]
] |
cs/9909017 | Devillers | Olivier Devillers, Asish Mukhopadhyay | Finding an ordinary conic and an ordinary hyperplane | 7 pages, 2 figures | null | null | INRIA Research report 3517 | cs.CG | null | Given a finite set of non-collinear points in the plane, there exists a line
that passes through exactly two points. Such a line is called an ordinary line.
An efficient algorithm for computing such a line was proposed by Mukhopadhyay
et al. In this note we extend this result in two directions. We first show how
to use this algorithm to compute an ordinary conic, that is, a conic passing
through exactly five points, assuming that all the points do not lie on the
same conic. Both our proofs of existence and the consequent algorithms are
simpler than previous ones. We next show how to compute an ordinary hyperplane
in three and higher dimensions.
| [
{
"version": "v1",
"created": "Mon, 27 Sep 1999 11:55:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
],
[
"Mukhopadhyay",
"Asish",
""
]
] |
cs/9909018 | Devillers | Olivier Devillers, Pierre-Maris Gandoin | Geometric compression for progressive transmission | 16 pages, 10 figures | null | null | INRIA Research report 3766, in french | cs.CG cs.GR | null | The compression of geometric structures is a relatively new field of data
compression. Since about 1995, several articles have dealt with the coding of
meshes, using for most of them the following approach: the vertices of the mesh
are coded in an order such that it contains partially the topology of the mesh.
In the same time, some simple rules attempt to predict the position of the
current vertex from the positions of its neighbours that have been previously
coded. In this article, we describe a compression algorithm whose principle is
completely different: the order of the vertices is used to compress their
coordinates, and then the topology of the mesh is reconstructed from the
vertices. This algorithm, particularly suited for terrain models, achieves
compression factors that are slightly greater than those of the currently
available algorithms, and moreover, it allows progressive and interactive
transmission of the meshes.
| [
{
"version": "v1",
"created": "Tue, 28 Sep 1999 06:56:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
],
[
"Gandoin",
"Pierre-Maris",
""
]
] |
cs/9909019 | Alessio R. Lomuscio | A. R. Lomuscio, R. van der Meyden, M. D. Ryan | Knowledge in Multi-Agent Systems: Initial Configurations and Broadcast | 32 Pages, 2 Figures. Submitted to Transactions of Computational Logic | null | null | null | cs.LO cs.AI | null | The semantic framework for the modal logic of knowledge due to Halpern and
Moses provides a way to ascribe knowledge to agents in distributed and
multi-agent systems. In this paper we study two special cases of this
framework: full systems and hypercubes. Both model static situations in which
no agent has any information about another agent's state. Full systems and
hypercubes are an appropriate model for the initial configurations of many
systems of interest. We establish a correspondence between full systems and
hypercube systems and certain classes of Kripke frames. We show that these
classes of systems correspond to the same logic. Moreover, this logic is also
the same as that generated by the larger class of weakly directed frames. We
provide a sound and complete axiomatization, S5WDn, of this logic. Finally, we
show that under certain natural assumptions, in a model where knowledge evolves
over time, S5WDn characterizes the properties of knowledge not just at the
initial configuration, but also at all later configurations. In particular,
this holds for homogeneous broadcast systems, which capture settings in which
agents are initially ignorant of each others local states, operate
synchronously, have perfect recall and can communicate only by broadcasting.
| [
{
"version": "v1",
"created": "Thu, 30 Sep 1999 17:03:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lomuscio",
"A. R.",
""
],
[
"van der Meyden",
"R.",
""
],
[
"Ryan",
"M. D.",
""
]
] |
cs/9909020 | Harald Hempel | Lane A. Hemaspaandra, Harald Hempel, and Gerd Wechsung | Query Order | 18 pages, 1 figure (earlier version appears as UR-CS-TR-95-596) | SIAM Journal on Computing, 28, 637-651, 1999 | null | null | cs.CC | null | We study the effect of query order on computational power, and show that
$\pjk$-the languages computable via a polynomial-time machine given one query
to the jth level of the boolean hierarchy followed by one query to the kth
level of the boolean hierarchy-equals $\redttnp{j+2k-1}$ if j is even and k is
odd, and equals $\redttnp{j+2k}$ otherwise. Thus, unless the polynomial
hierarchy collapses, it holds that for each $1\leq j \leq k$: $\pjk = \pkj \iff
(j=k) \lor (j{is even} \land k=j+1)$. We extend our analysis to apply to more
general query classes.
| [
{
"version": "v1",
"created": "Thu, 30 Sep 1999 17:06:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
],
[
"Wechsung",
"Gerd",
""
]
] |
cs/9910001 | Martin Grohe | Joerg Flum and Martin Grohe | Fixed-parameter tractability, definability, and model checking | To appear in SIAM Journal on Computing | null | null | null | cs.CC cs.LO | null | In this article, we study parameterized complexity theory from the
perspective of logic, or more specifically, descriptive complexity theory.
We propose to consider parameterized model-checking problems for various
fragments of first-order logic as generic parameterized problems and show how
this approach can be useful in studying both fixed-parameter tractability and
intractability. For example, we establish the equivalence between the
model-checking for existential first-order logic, the homomorphism problem for
relational structures, and the substructure isomorphism problem. Our main
tractability result shows that model-checking for first-order formulas is
fixed-parameter tractable when restricted to a class of input structures with
an excluded minor. On the intractability side, for every t >= 0 we prove an
equivalence between model-checking for first-order formulas with t quantifier
alternations and the parameterized halting problem for alternating Turing
machines with t alternations. We discuss the close connection between this
alternation hierarchy and Downey and Fellows' W-hierarchy.
On a more abstract level, we consider two forms of definability, called Fagin
definability and slicewise definability, that are appropriate for describing
parameterized problems. We give a characterization of the class FPT of all
fixed-parameter tractable problems in terms of slicewise definability in finite
variable least fixed-point logic, which is reminiscent of the Immerman-Vardi
Theorem characterizing the class PTIME in terms of definability in least
fixed-point logic.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 15:10:00 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Feb 2001 21:01:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Flum",
"Joerg",
""
],
[
"Grohe",
"Martin",
""
]
] |
cs/9910002 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | What's Up with Downward Collapse: Using the Easy-Hard Technique to Link
Boolean and Polynomial Hierarchy Collapses | 37 pages. an extended abstract appeared in SIGACT News, 29, 10-22,
1998 | null | null | UR-CS-TR-98-682 | cs.CC | null | During the past decade, nine papers have obtained increasingly strong
consequences from the assumption that boolean or bounded-query hierarchies
collapse. The final four papers of this nine-paper progression actually achieve
downward collapse---that is, they show that high-level collapses induce
collapses at (what beforehand were thought to be) lower complexity levels. For
example, for each $k\geq 2$ it is now known that if $\psigkone=\psigktwo$ then
$\ph=\sigmak$. This article surveys the history, the results, and the
technique---the so-called easy-hard method---of these nine papers.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 15:45:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910003 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | R_{1-tt}^{SN}(NP) Distinguishes Robust Many-One and Turing Completeness | 22 pages | Theory of Computing Systems, 31, 307-325, 1998 | null | earlier version appears as UR-CS-TR-96-635 | cs.CC | null | Do complexity classes have many-one complete sets if and only if they have
Turing-complete sets? We prove that there is a relativized world in which a
relatively natural complexity class-namely a downward closure of NP, \rsnnp -
has Turing-complete sets but has no many-one complete sets. In fact, we show
that in the same relativized world this class has 2-truth-table complete sets
but lacks 1-truth-table complete sets. As part of the groundwork for our
result, we prove that \rsnnp has many equivalent forms having to do with
ordered and parallel access to $\np$ and $\npinterconp$.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 18:55:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910004 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | An Introduction to Query Order | 15 pages | Bulletin of the EATCS, 63, 93-107, 1997 | null | earlier version appears as UR-CS-TR-97-665 | cs.CC | null | Hemaspaandra, Hempel, and Wechsung [cs.CC/9909020] raised the following
questions: If one is allowed one question to each of two different information
sources, does the order in which one asks the questions affect the class of
problems that one can solve with the given access? If so, which order yields
the greater computational power?
The answers to these questions have been learned-inasfar as they can be
learned without resolving whether or not the polynomial hierarchy collapses-for
both the polynomial hierarchy and the boolean hierarchy. In the polynomial
hierarchy, query order never matters. In the boolean hierarchy, query order
sometimes does not matter and, unless the polynomial hierarchy collapses,
sometimes does matter. Furthermore, the study of query order has yielded
dividends in seemingly unrelated areas, such as bottleneck computations and
downward translation of equality.
In this article, we present some of the central results on query order. The
article is written in such a way as to encourage the reader to try his or her
own hand at proving some of these results. We also give literature pointers to
the quickly growing set of related results and applications.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 19:08:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910005 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | Query Order and the Polynomial Hierarchy | 14 pages | Journal of Universal Computer Science, 4, 574-588, 1998 | null | earlier version appears as UR-CS-TR-96-634 | cs.CC | null | Hemaspaandra, Hempel, and Wechsung [cs.CC/9909020] initiated the field of
query order, which studies the ways in which computational power is affected by
the order in which information sources are accessed. The present paper studies,
for the first time, query order as it applies to the levels of the polynomial
hierarchy. We prove that the levels of the polynomial hierarchy are
order-oblivious. Yet, we also show that these ordered query classes form new
levels in the polynomial hierarchy unless the polynomial hierarchy collapses.
We prove that all leaf language classes - and thus essentially all standard
complexity classes - inherit all order-obliviousness results that hold for P.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 19:20:07 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Oct 1999 12:46:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910006 | Harald Hempel | Lane A. Hemaspaandra, Harald Hempel, and Gerd Wechsung | Self-Specifying Machines | 15 pages, to appear in IJFCS | null | null | earlier version appears as UR-CS-TR-97-654 | cs.CC | null | We study the computational power of machines that specify their own
acceptance types, and show that they accept exactly the languages that
$\manyonesharp$-reduce to NP sets. A natural variant accepts exactly the
languages that $\manyonesharp$-reduce to P sets. We show that these two classes
coincide if and only if $\psone = \psnnoplusbigohone$, where the latter class
denotes the sets acceptable via at most one question to $\sharpp$ followed by
at most a constant number of questions to $\np$.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 19:29:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
],
[
"Wechsung",
"Gerd",
""
]
] |
cs/9910007 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | A Downward Collapse within the Polynomial Hierarchy | 14 pages | SIAM Journal on Computing, 28, 383-393, 1999 | null | earlier version appears as UR-CS-TR-96-630 | cs.CC | null | Downward collapse (a.k.a. upward separation) refers to cases where the
equality of two larger classes implies the equality of two smaller classes. We
provide an unqualified downward collapse result completely within the
polynomial hierarchy. In particular, we prove that, for k > 2, if $\psigkone =
\psigktwo$ then $\sigmak = \pik = \ph$. We extend this to obtain a more general
downward collapse result.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 19:48:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910008 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | Translating Equality Downwards | 13 pages, an extended abstract was presented at the 16th Symposium on
Theoretical Aspects of Computer Science | null | null | earlier version appears as UR-CS-TR-97-657 | cs.CC | null | Downward translation of equality refers to cases where a collapse of some
pair of complexity classes would induce a collapse of some other pair of
complexity classes that (a priori) one expects are smaller. Recently, the first
downward translation of equality was obtained that applied to the polynomial
hierarchy-in particular, to bounded access to its levels [cs.CC/9910007]. In
this paper, we provide a much broader downward translation that extends not
only that downward translation but also that translation's elegant enhancement
by Buhrman and Fortnow. Our work also sheds light on previous research on the
structure of refined polynomial hierarchies, and strengthens the connection
between the collapse of bounded query hierarchies and the collapse of the
polynomial hierarchy.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 19:58:41 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Oct 1999 13:04:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910009 | Joseph O'Rourke | T. Biedl, E. Demaine, M. Demaine, S. Lazard, A. Lubiw, J. O'Rourke, M.
Overmars, S. Robbins, I. Streinu, G. Toussaint, S. Whitesides | Locked and Unlocked Polygonal Chains in 3D | 29 pages; This is a revised and expanded version of an abstract that
appeared in Proc. 10th ACM-SIAM Sympos. Discrete Algorithms (SODA '98), Jan.
1998, pp. 866-867 | null | null | Smith Tech. Rep. 060 | cs.CG cs.DM | null | In this paper, we study movements of simple polygonal chains in 3D. We say
that an open, simple polygonal chain can be straightened if it can be
continuously reconfigured to a straight sequence of segments in such a manner
that both the length of each link and the simplicity of the chain are
maintained throughout the movement. The analogous concept for closed chains is
convexification: reconfiguration to a planar convex polygon. Chains that cannot
be straightened or convexified are called locked. While there are open chains
in 3D that are locked, we show that if an open chain has a simple orthogonal
projection onto some plane, it can be straightened. For closed chains, we show
that there are unknotted but locked closed chains, and we provide an algorithm
for convexifying a planar simple polygon in 3D. All our algorithms require only
O(n) basic ``moves'' and run in linear time.
| [
{
"version": "v1",
"created": "Fri, 8 Oct 1999 12:04:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Biedl",
"T.",
""
],
[
"Demaine",
"E.",
""
],
[
"Demaine",
"M.",
""
],
[
"Lazard",
"S.",
""
],
[
"Lubiw",
"A.",
""
],
[
"O'Rourke",
"J.",
""
],
[
"Overmars",
"M.",
""
],
[
"Robbins",
"S.",
""
],
[
"Streinu",
"I.",
""
],
[
"Toussaint",
"G.",
""
],
[
"Whitesides",
"S.",
""
]
] |
cs/9910010 | Ronald de Wolf | Harry Buhrman (CWI, Amsterdam) and Ronald de Wolf (CWI and U of
Amsterdam) | Communication Complexity Lower Bounds by Polynomials | 16 pages LaTeX, no figures. 2nd version: rewritten and some results
added | null | null | null | cs.CC quant-ph | null | The quantum version of communication complexity allows the two communicating
parties to exchange qubits and/or to make use of prior entanglement (shared
EPR-pairs). Some lower bound techniques are available for qubit communication
complexity, but except for the inner product function, no bounds are known for
the model with unlimited prior entanglement. We show that the log-rank lower
bound extends to the strongest model (qubit communication + unlimited prior
entanglement). By relating the rank of the communication matrix to properties
of polynomials, we are able to derive some strong bounds for exact protocols.
In particular, we prove both the "log-rank conjecture" and the polynomial
equivalence of quantum and classical communication complexity for various
classes of functions. We also derive some weaker bounds for bounded-error
quantum protocols.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 1999 13:30:28 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2000 15:25:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"Harry",
"",
"CWI, Amsterdam"
],
[
"de Wolf",
"Ronald",
"",
"CWI and U of\n Amsterdam"
]
] |
cs/9910011 | Anand V. Raman | Anand Venkataraman | A statistical model for word discovery in child directed speech | 48 pgs, 10 figs | null | null | null | cs.CL cs.LG | null | A statistical model for segmentation and word discovery in child directed
speech is presented. An incremental unsupervised learning algorithm to infer
word boundaries based on this model is described and results of empirical tests
showing that the algorithm is competitive with other models that have been used
for similar tasks are also presented.
| [
{
"version": "v1",
"created": "Wed, 13 Oct 1999 03:25:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venkataraman",
"Anand",
""
]
] |
cs/9910012 | Mark Reynolds | M. Reynolds | The Complexity of Temporal Logic over the Reals | null | null | null | null | cs.LO cs.CC | null | It is shown that the decision problem for the temporal logic with until and
since connectives over real-numbers time is PSPACE-complete.
| [
{
"version": "v1",
"created": "Wed, 13 Oct 1999 04:04:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Reynolds",
"M.",
""
]
] |
cs/9910013 | Michelangelo Grigni | Zhi-Zhong Chen, Michelangelo Grigni, Christos Papadimitriou | Map Graphs | 46 pages, LaTeX with 41 PS figures; see
http://www.mathcs.emory.edu/~mic/mapgraphs/ for hi-res figures | null | null | null | cs.DM cs.DS | null | We consider a modified notion of planarity, in which two nations of a map are
considered adjacent when they share any point of their boundaries (not
necessarily an edge, as planarity requires). Such adjacencies define a map
graph. We give an NP characterization for such graphs, and a cubic time
recognition algorithm for a restricted version: given a graph, decide whether
it is realized by adjacencies in a map without holes, in which at most four
nations meet at any point.
| [
{
"version": "v1",
"created": "Wed, 13 Oct 1999 21:41:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Zhi-Zhong",
""
],
[
"Grigni",
"Michelangelo",
""
],
[
"Papadimitriou",
"Christos",
""
]
] |
cs/9910014 | Randal E. Bryant | Randal E. Bryant, Steven German, Miroslav N. Velev | Processor Verification Using Efficient Reductions of the Logic of
Uninterpreted Functions to Propositional Logic | 46 pages | null | null | null | cs.LO cs.AR | null | The logic of equality with uninterpreted functions (EUF) provides a means of
abstracting the manipulation of data by a processor when verifying the
correctness of its control logic. By reducing formulas in this logic to
propositional formulas, we can apply Boolean methods such as Ordered Binary
Decision Diagrams (BDDs) and Boolean satisfiability checkers to perform the
verification.
We can exploit characteristics of the formulas describing the verification
conditions to greatly simplify the propositional formulas generated. In
particular, we exploit the property that many equations appear only in positive
form. We can therefore reduce the set of interpretations of the function
symbols that must be considered to prove that a formula is universally valid to
those that are ``maximally diverse.''
We present experimental results demonstrating the efficiency of this approach
when verifying pipelined processors using the method proposed by Burch and
Dill.
| [
{
"version": "v1",
"created": "Thu, 14 Oct 1999 22:41:39 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2000 21:32:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bryant",
"Randal E.",
""
],
[
"German",
"Steven",
""
],
[
"Velev",
"Miroslav N.",
""
]
] |
cs/9910015 | Naren Ramakrishnan | Naren Ramakrishnan | PIPE: Personalizing Recommendations via Partial Evaluation | null | null | null | null | cs.IR cs.AI | null | It is shown that personalization of web content can be advantageously viewed
as a form of partial evaluation --- a technique well known in the programming
languages community. The basic idea is to model a recommendation space as a
program, then partially evaluate this program with respect to user preferences
(and features) to obtain specialized content. This technique supports both
content-based and collaborative approaches, and is applicable to a range of
applications that require automatic information integration from multiple web
sources. The effectiveness of this methodology is illustrated by two example
applications --- (i) personalizing content for visitors to the Blacksburg
Electronic Village (http://www.bev.net), and (ii) locating and selecting
scientific software on the Internet. The scalability of this technique is
demonstrated by its ability to interface with online web ontologies that index
thousands of web pages.
| [
{
"version": "v1",
"created": "Mon, 18 Oct 1999 15:47:29 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Oct 1999 19:52:12 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Apr 2000 03:05:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramakrishnan",
"Naren",
""
]
] |
cs/9910016 | Juergen Dix | Juergen Dix, Mirco Nanni, VS Subrahmanian | Probabilistic Agent Programs | 44 pages, 1 figure, Appendix | null | null | null | cs.AI | null | Agents are small programs that autonomously take actions based on changes in
their environment or ``state.'' Over the last few years, there have been an
increasing number of efforts to build agents that can interact and/or
collaborate with other agents. In one of these efforts, Eiter, Subrahmanian amd
Pick (AIJ, 108(1-2), pages 179-255) have shown how agents may be built on top
of legacy code. However, their framework assumes that agent states are
completely determined, and there is no uncertainty in an agent's state. Thus,
their framework allows an agent developer to specify how his agents will react
when the agent is 100% sure about what is true/false in the world state. In
this paper, we propose the concept of a \emph{probabilistic agent program} and
show how, given an arbitrary program written in any imperative language, we may
build a declarative ``probabilistic'' agent program on top of it which supports
decision making in the presence of uncertainty. We provide two alternative
semantics for probabilistic agent programs. We show that the second semantics,
though more epistemically appealing, is more complex to compute. We provide
sound and complete algorithms to compute the semantics of \emph{positive} agent
programs.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 1999 09:35:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dix",
"Juergen",
""
],
[
"Nanni",
"Mirco",
""
],
[
"Subrahmanian",
"VS",
""
]
] |
cs/9910017 | Jeff Erickson | Jeff Erickson | Finite-resolution hidden surface removal | 10 pages, many figures; To appear in Proceedings of the 11th Annual
ACM-SIAM Symposium on Discrete Algorithms, 2000; See also
http://www.uiuc.edu/~jeffe/pubs/gridvis.html | null | null | null | cs.CG cs.GR | null | We propose a hybrid image-space/object-space solution to the classical hidden
surface removal problem: Given n disjoint triangles in Real^3 and p sample
points (``pixels'') in the xy-plane, determine the first triangle directly
behind each pixel. Our algorithm constructs the sampled visibility map of the
triangles with respect to the pixels, which is the subset of the trapezoids in
a trapezoidal decomposition of the analytic visibility map that contain at
least one pixel. The sampled visibility map adapts to local changes in image
complexity, and its complexity is bounded both by the number of pixels and by
the complexity of the analytic visibility map. Our algorithm runs in time
O(n^{1+e} + n^{2/3+e}t^{2/3} + p), where t is the output size and e is any
positive constant. This is nearly optimal in the worst case and compares
favorably with the best output-sensitive algorithms for both ray casting and
analytic hidden surface removal. In the special case where the pixels form a
regular grid, a sweepline variant of our algorithm runs in time O(n^{1+e} +
n^{2/3+e}t^{2/3} + t log p), which is usually sublinear in the number of
pixels.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 1999 21:51:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erickson",
"Jeff",
""
]
] |
cs/9910018 | Shie-Yuan Wang | S.Y. Wang | Decoupling Control from Data for TCP Congestion Control | Ph.D. Thesis, Harvard University, September 1999. This thesis's
Chapter 3 about "TCP Trunking" will be published in IEEE ICNP'99 Proceedings.
A condensed version of this thesis is currently submitted to a conference | null | null | null | cs.NI | null | Many applications want to use TCP congestion control to regulate the
transmission rate of a data packet stream. A natural way to achieve this goal
is to transport the data packet stream on a TCP connection. However, because
TCP implements both congestion and error control, transporting a data packet
stream directly using a TCP connection forces the data packet stream to be
subject to TCP's other properties caused by TCP error control, which may be
inappropriate for these applications.
The TCP decoupling approach proposed in this thesis is a novel way of
applying TCP congestion control to a data packet stream without actually
transporting the data packet stream on a TCP connection. Instead, a TCP
connection using the same network path as the data packet stream is set up
separately and the transmission rate of the data packet stream is then
associated with that of the TCP packets. Since the transmission rate of these
TCP packets is under TCP congestion control, so is that of the data packet
stream. Furthermore, since the data packet stream is not transported on a TCP
connection, the regulated data packet stream is not subject to TCP error
control.
Because of this flexibility, the TCP decoupling approach opens up many new
opportunities, solves old problems, and improves the performance of some
existing applications. All of these advantages will be demonstrated in the
thesis.
This thesis presents the design, implementation, and analysis of the TCP
decoupling approach, and its successful applications in TCP trunking, wireless
communication, and multimedia streaming.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 1999 22:03:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"S. Y.",
""
]
] |
cs/9910019 | Roberto Baldoni | R.Baldoni, F. Quaglia, and M.Raynal | Consistent Checkpointing in Distributed Databases: Towards a Formal
Approach | 13 pages, 3 figures | null | null | Rapporto di Ricerca, Dipartimento di Informatica e Sistemistica,
Universita' di Roma "La Sapienza"-(Italy) n. 27-97, July 1997 | cs.DB cs.DC | null | Whether it is for audit or for recovery purposes, data checkpointing is an
important problem of distributed database systems. Actually, transactions
establish dependence relations on data checkpoints taken by data object
managers. So, given an arbitrary set of data checkpoints (including at least a
single data checkpoint from a data manager, and at most a data checkpoint from
each data manager), an important question is the following one: ``Can these
data checkpoints be members of a same consistent global checkpoint?''. This
paper answers this question by providing a necessary and sufficient condition
suited for database systems. Moreover, to show the usefulness of this
condition, two {\em non-intrusive} data checkpointing protocols are derived
from this condition. It is also interesting to note that this paper, by
exhibiting ``correspondences'', establishes a bridge between the data
object/transaction model and the process/message-passing model.
| [
{
"version": "v1",
"created": "Fri, 22 Oct 1999 15:17:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baldoni",
"R.",
""
],
[
"Quaglia",
"F.",
""
],
[
"Raynal",
"M.",
""
]
] |
cs/9910020 | Atsushi Fujii | Atsushi Fujii, Kentaro Inui, Takenobu Tokunaga, and Hozumi Tanaka | Selective Sampling for Example-based Word Sense Disambiguation | 25 pages, 14 Postscript figures | Computational Linguistics, Vol.24, No.4, pp.573-597, 1998 | null | null | cs.CL | null | This paper proposes an efficient example sampling method for example-based
word sense disambiguation systems. To construct a database of practical size, a
considerable overhead for manual sense disambiguation (overhead for
supervision) is required. In addition, the time complexity of searching a
large-sized database poses a considerable problem (overhead for search). To
counter these problems, our method selectively samples a smaller-sized
effective subset from a given example set for use in word sense disambiguation.
Our method is characterized by the reliance on the notion of training utility:
the degree to which each example is informative for future example sampling
when used for the training of the system. The system progressively collects
examples by selecting those with greatest utility. The paper reports the
effectiveness of our method through experiments on about one thousand
sentences. Compared to experiments with other example sampling methods, our
method reduced both the overhead for supervision and the overhead for search,
without the degeneration of the performance of the system.
| [
{
"version": "v1",
"created": "Sat, 23 Oct 1999 11:19:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Inui",
"Kentaro",
""
],
[
"Tokunaga",
"Takenobu",
""
],
[
"Tanaka",
"Hozumi",
""
]
] |
cs/9910021 | Prasan Roy | Prasan Roy, S. Seshadri, S. Sudarshan, Siddhesh Bhobe | Efficient and Extensible Algorithms for Multi Query Optimization | null | null | null | null | cs.DB | null | Complex queries are becoming commonplace, with the growing use of decision
support systems. These complex queries often have a lot of common
sub-expressions, either within a single query, or across multiple such queries
run as a batch. Multi-query optimization aims at exploiting common
sub-expressions to reduce evaluation cost. Multi-query optimization has
hither-to been viewed as impractical, since earlier algorithms were exhaustive,
and explore a doubly exponential search space.
In this paper we demonstrate that multi-query optimization using heuristics
is practical, and provides significant benefits. We propose three cost-based
heuristic algorithms: Volcano-SH and Volcano-RU, which are based on simple
modifications to the Volcano search strategy, and a greedy heuristic. Our
greedy heuristic incorporates novel optimizations that improve efficiency
greatly. Our algorithms are designed to be easily added to existing optimizers.
We present a performance study comparing the algorithms, using workloads
consisting of queries from the TPC-D benchmark. The study shows that our
algorithms provide significant benefits over traditional optimization, at a
very acceptable overhead in optimization time.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 1999 16:30:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roy",
"Prasan",
""
],
[
"Seshadri",
"S.",
""
],
[
"Sudarshan",
"S.",
""
],
[
"Bhobe",
"Siddhesh",
""
]
] |
cs/9910022 | Mark-Jan Nederhof | Mark-Jan Nederhof | Practical experiments with regular approximation of context-free
languages | 28 pages. To appear in Computational Linguistics 26(1), March 2000 | null | null | null | cs.CL | null | Several methods are discussed that construct a finite automaton given a
context-free grammar, including both methods that lead to subsets and those
that lead to supersets of the original context-free language. Some of these
methods of regular approximation are new, and some others are presented here in
a more refined form with respect to existing literature. Practical experiments
with the different methods of regular approximation are performed for
spoken-language input: hypotheses from a speech recognizer are filtered through
a finite automaton.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 1999 15:00:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nederhof",
"Mark-Jan",
""
]
] |
cs/9910023 | Alessio Guglielmi | Alessio Guglielmi | A System of Interaction and Structure | This is the authoritative version of the article, with readable
pictures, in colour, also available at
<http://cs.bath.ac.uk/ag/p/SystIntStr.pdf>. (The published version contains
errors introduced by the editorial processing.) Web site for Deep Inference
and the Calculus of Structures at <http://alessio.guglielmi.name/res/cos> | ACM Transactions on Computational Logic, Vol. 8 (1:1), 2007, pp.
1-64 | 10.1145/1182613.1182614 | null | cs.LO | null | This paper introduces a logical system, called BV, which extends
multiplicative linear logic by a non-commutative self-dual logical operator.
This extension is particularly challenging for the sequent calculus, and so far
it is not achieved therein. It becomes very natural in a new formalism, called
the calculus of structures, which is the main contribution of this work.
Structures are formulae submitted to certain equational laws typical of
sequents. The calculus of structures is obtained by generalising the sequent
calculus in such a way that a new top-down symmetry of derivations is observed,
and it employs inference rules that rewrite inside structures at any depth.
These properties, in addition to allow the design of BV, yield a modular proof
of cut elimination.
| [
{
"version": "v1",
"created": "Thu, 28 Oct 1999 09:17:34 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Sep 2002 13:51:53 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Sep 2004 08:40:28 GMT"
},
{
"version": "v4",
"created": "Sat, 27 Jan 2007 13:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guglielmi",
"Alessio",
""
]
] |
cs/9910024 | Steven M. Robbins | Therese Biedl, Erik Demaine, Martin Demaine, Sylvain Lazard, Anna
Lubiw, Joseph O'Rourke, Steve Robbins, Ileana Streinu, Godfried Toussaint,
Sue Whitesides | On Reconfiguring Tree Linkages: Trees can Lock | 16 pages, 6 figures Introduction reworked and references added, as
the main open problem was recently closed | null | null | SOCS-00.7 | cs.CG cs.DM | null | It has recently been shown that any simple (i.e. nonintersecting) polygonal
chain in the plane can be reconfigured to lie on a straight line, and any
simple polygon can be reconfigured to be convex. This result cannot be extended
to tree linkages: we show that there are trees with two simple configurations
that are not connected by a motion that preserves simplicity throughout the
motion. Indeed, we prove that an $N$-link tree can have $2^{\Omega(N)}$
equivalence classes of configurations.
| [
{
"version": "v1",
"created": "Mon, 1 Nov 1999 17:50:19 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2000 02:26:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Biedl",
"Therese",
""
],
[
"Demaine",
"Erik",
""
],
[
"Demaine",
"Martin",
""
],
[
"Lazard",
"Sylvain",
""
],
[
"Lubiw",
"Anna",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Robbins",
"Steve",
""
],
[
"Streinu",
"Ileana",
""
],
[
"Toussaint",
"Godfried",
""
],
[
"Whitesides",
"Sue",
""
]
] |
cs/9911001 | Jan Heering | Jan Heering, Paul Klint | Semantics of Programming Languages: A Tool-Oriented Approach | 12 pages, 2 figures. Submitted to ACM SIGPLAN Notices | ACM SIGPLAN Notices V. 35(3) March 2000 pp. 39-48 | null | SEN-R9920 (CWI, Amsterdam) | cs.PL | null | By paying more attention to semantics-based tool generation, programming
language semantics can significantly increase its impact. Ultimately, this may
lead to ``Language Design Assistants'' incorporating substantial amounts of
semantic knowledge.
| [
{
"version": "v1",
"created": "Thu, 4 Nov 1999 11:14:45 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Nov 1999 12:54:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heering",
"Jan",
""
],
[
"Klint",
"Paul",
""
]
] |
cs/9911002 | Rigo Michel | Michel Rigo | Numeration systems on a regular language: Arithmetic operations,
Recognizability and Formal power series | 34 pages; corrected typos, two sections concerning exponential case
and relation with positional systems added | Theoret. Comput. Sci. 269 (2001) 469--498 | null | null | cs.CC | null | Generalizations of numeration systems in which N is recognizable by a finite
automaton are obtained by describing a lexicographically ordered infinite
regular language L over a finite alphabet A. For these systems, we obtain a
characterization of recognizable sets of integers in terms of rational formal
series. We also show that, if the complexity of L is Theta (n^q) (resp. if L is
the complement of a polynomial language), then multiplication by an integer k
preserves recognizability only if k=t^{q+1} (resp. if k is not a power of the
cardinality of A) for some integer t. Finally, we obtain sufficient conditions
for the notions of recognizability and U-recognizability to be equivalent,
where U is some positional numeration system related to a sequence of integers.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 1999 13:03:50 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Jan 2000 13:40:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rigo",
"Michel",
""
]
] |
cs/9911003 | David Eppstein | David Eppstein | Subgraph Isomorphism in Planar Graphs and Related Problems | 27 pages, 6 figures. A preliminary version of this paper appeared at
the 6th ACM-SIAM Symp. Discrete Algorithms, 1995 | J. Graph Algorithms & Applications 3(3):1-27, 1999 | null | null | cs.DS | null | We solve the subgraph isomorphism problem in planar graphs in linear time,
for any pattern of constant size. Our results are based on a technique of
partitioning the planar graph into pieces of small tree-width, and applying
dynamic programming within each piece. The same methods can be used to solve
other planar graph problems including connectivity, diameter, girth, induced
subgraph isomorphism, and shortest paths.
| [
{
"version": "v1",
"created": "Tue, 9 Nov 1999 18:58:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
] |
cs/9911004 | Wolfgang Slany | Wolfgang Slany | Graph Ramsey games | 47 pages; To actually play small but nontrivial game instances, go to
http://www.dbai.tuwien.ac.at/proj/ramsey/ | null | null | DBAI-TR-99-34 | cs.CC cs.DM math.CO | null | We consider combinatorial avoidance and achievement games based on graph
Ramsey theory: The players take turns in coloring still uncolored edges of a
graph G, each player being assigned a distinct color, choosing one edge per
move. In avoidance games, completing a monochromatic subgraph isomorphic to
another graph A leads to immediate defeat or is forbidden and the first player
that cannot move loses. In the avoidance+ variants, both players are free to
choose more than one edge per move. In achievement games, the first player that
completes a monochromatic subgraph isomorphic to A wins. Erdos & Selfridge
(1973) were the first to identify some tractable subcases of these games,
followed by a large number of further studies. We complete these investigations
by settling the complexity of all unrestricted cases: We prove that general
graph Ramsey avoidance, avoidance+, and achievement games and several variants
thereof are PSPACE-complete. We ultra-strongly solve some nontrivial instances
of graph Ramsey avoidance games that are based on symmetric binary Ramsey
numbers and provide strong evidence that all other cases based on symmetric
binary Ramsey numbers are effectively intractable.
Keywords: combinatorial games, graph Ramsey theory, Ramsey game,
PSPACE-completeness, complexity, edge coloring, winning strategy, achievement
game, avoidance game, the game of Sim, Polya's enumeration formula,
probabilistic counting, machine learning, heuristics, Java applet
| [
{
"version": "v1",
"created": "Wed, 10 Nov 1999 11:28:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slany",
"Wolfgang",
""
]
] |
cs/9911005 | Jim Gray | Jim Gray | What Next? A Dozen Information-Technology Research Goals | MS word original:
http://research.microsoft.com/~gray/papers/MS_TR_99_50_TuringTalk.doc | null | null | MS TR 99-50 | cs.GL | null | Charles Babbage's vision of computing has largely been realized. We are on
the verge of realizing Vannevar Bush's Memex. But, we are some distance from
passing the Turing Test. These three visions and their associated problems have
provided long-range research goals for many of us. For example, the scalability
problem has motivated me for several decades. This talk defines a set of
fundamental research problems that broaden the Babbage, Bush, and Turing
visions. They extend Babbage's computational goal to include highly-secure,
highly-available, self-programming, self-managing, and self-replicating
systems. They extend Bush's Memex vision to include a system that automatically
organizes, indexes, digests, evaluates, and summarizes information (as well as
a human might). Another group of problems extends Turing's vision of
intelligent machines to include prosthetic vision, speech, hearing, and other
senses. Each problem is simply stated and each is orthogonal from the others,
though they share some common core technologies
| [
{
"version": "v1",
"created": "Thu, 11 Nov 1999 23:05:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] |
cs/9911006 | Masaki Murata | M. Murata, M. Utiyama, H. Isahara (CRL) | Question Answering System Using Syntactic Information | 6 pages, 0 figures. Computation and Language | null | null | null | cs.CL | null | Question answering task is now being done in TREC8 using English documents.
We examined question answering task in Japanese sentences. Our method selects
the answer by matching the question sentence with knowledge-based data written
in natural language. We use syntactic information to obtain highly accurate
answers.
| [
{
"version": "v1",
"created": "Mon, 15 Nov 1999 05:48:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murata",
"M.",
"",
"CRL"
],
[
"Utiyama",
"M.",
"",
"CRL"
],
[
"Isahara",
"H.",
"",
"CRL"
]
] |
cs/9911007 | Joerg Rothe | A. Beygelzimer, L. A. Hemaspaandra, C. M. Homan and J. Rothe | One-Way Functions in Worst-Case Cryptography: Algebraic and Security
Properties | 17 pages | null | null | University of Rochester Technical Report UR-CS TR 722 | cs.CC cs.CR | null | We survey recent developments in the study of (worst-case) one-way functions
having strong algebraic and security properties. According to [RS93], this line
of research was initiated in 1984 by Rivest and Sherman who designed two-party
secret-key agreement protocols that use strongly noninvertible, total,
associative one-way functions as their key building blocks. If commutativity is
added as an ingredient, these protocols can be used by more than two parties,
as noted by Rabi and Sherman [RS93] who also developed digital signature
protocols that are based on such enhanced one-way functions.
Until recently, it was an open question whether one-way functions having the
algebraic and security properties that these protocols require could be created
from any given one-way function. Recently, Hemaspaandra and Rothe [HR99]
resolved this open issue in the affirmative, by showing that one-way functions
exist if and only if strong, total, commutative, associative one-way functions
exist.
We discuss this result, and the work of Rabi, Rivest, and Sherman, and recent
work of Homan [Hom99] that makes progress on related issues.
| [
{
"version": "v1",
"created": "Mon, 15 Nov 1999 13:20:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Beygelzimer",
"A.",
""
],
[
"Hemaspaandra",
"L. A.",
""
],
[
"Homan",
"C. M.",
""
],
[
"Rothe",
"J.",
""
]
] |
cs/9911008 | John Watrous | John Watrous (University of Calgary) | On quantum and classical space-bounded processes with algebraic
transition amplitudes | 18 pages. Appears in FOCS '99 | null | null | null | cs.CC quant-ph | null | We define a class of stochastic processes based on evolutions and
measurements of quantum systems, and consider the complexity of predicting
their long-term behavior. It is shown that a very general class of decision
problems regarding these stochastic processes can be efficiently solved
classically in the space-bounded case. The following corollaries are implied by
our main result: (1) Any space O(s) uniform family of quantum circuits acting
on s qubits and consisting of unitary gates and measurement gates defined in a
typical way by matrices of algebraic numbers can be simulated by an unbounded
error space O(s) ordinary (i.e., fair-coin flipping) probabilistic Turing
machine, and hence by space O(s) uniform classical (deterministic) circuits of
depth O(s^2) and size 2^(O(s)). The quantum circuits are not required to
operate with bounded error and may have depth exponential in s. (2) Any
(unbounded error) quantum Turing machine running in space s, having arbitrary
algebraic transition amplitudes, allowing unrestricted measurements during its
computation, and having no restrictions on running time can be simulated by an
unbounded error space O(s) ordinary probabilistic Turing machine, and hence
deterministically in space O(s^2).
| [
{
"version": "v1",
"created": "Tue, 16 Nov 1999 21:55:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Watrous",
"John",
"",
"University of Calgary"
]
] |
cs/9911009 | John Watrous | Andris Ambainis (1), John Watrous (2) ((1) UC Berkeley, (2) University
of Calgary) | Two-way finite automata with quantum and classical states | 11 pages | null | null | null | cs.CC quant-ph | null | We introduce 2-way finite automata with quantum and classical states
(2qcfa's). This is a variant on the 2-way quantum finite automata (2qfa) model
which may be simpler to implement than unrestricted 2qfa's; the internal state
of a 2qcfa may include a quantum part that may be in a (mixed) quantum state,
but the tape head position is required to be classical.
We show two languages for which 2qcfa's are better than classical 2-way
automata. First, 2qcfa's can recognize palindromes, a language that cannot be
recognized by 2-way deterministic or probabilistic finite automata. Second, in
polynomial time 2qcfa's can recognize {a^n b^n | n>=0}, a language that can be
recognized classically by a 2-way probabilistic automaton but only in
exponential time.
| [
{
"version": "v1",
"created": "Tue, 16 Nov 1999 22:24:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ambainis",
"Andris",
""
],
[
"Watrous",
"John",
""
]
] |
cs/9911010 | Michael J. O'Donnell | Michael J. O'Donnell | The Sources of Certainty in Computation and Formal Systems | 33 pages, 8 figures, presented at the conference, Computer Science as
a Human Science, the 1999-2000 Sawyer Seminar at the University of Chicago | null | null | null | cs.OH | null | In his Discourse on the Method of Rightly Conducting the Reason, and Seeking
Truth in the Sciences, Rene Descartes sought ``clear and certain knowledge of
all that is useful in life.'' Almost three centuries later, in ``The
foundations of mathematics,'' David Hilbert tried to ``recast mathematical
definitions and inferences in such a way that they are unshakable.'' Hilbert's
program relied explicitly on formal systems (equivalently, computational
systems) to provide certainty in mathematics. The concepts of computation and
formal system were not defined in his time, but Descartes' method may be
understood as seeking certainty in essentially the same way.
In this article, I explain formal systems as concrete artifacts, and
investigate the way in which they provide a high level of certainty---arguably
the highest level achievable by rational discourse. The rich understanding of
formal systems achieved by mathematical logic and computer science in this
century illuminates the nature of programs, such as Descartes' and Hilbert's,
that seek certainty through rigorous analysis.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 1999 17:18:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Donnell",
"Michael J.",
""
]
] |
cs/9911011 | Markus Walther | Markus Walther (University of Marburg) | One-Level Prosodic Morphology | 64 pages, A4 size, LaTeX2e, 16 PostScript figures | null | null | null | cs.CL | null | Recent developments in theoretical linguistics have lead to a widespread
acceptance of constraint-based analyses of prosodic morphology phenomena such
as truncation, infixation, floating morphemes and reduplication. Of these,
reduplication is particularly challenging for state-of-the-art computational
morphology, since it involves copying of some part of a phonological string. In
this paper I argue for certain extensions to the one-level model of phonology
and morphology (Bird & Ellison 1994) to cover the computational aspects of
prosodic morphology using finite-state methods. In a nutshell, enriched lexical
representations provide additional automaton arcs to repeat or skip sounds and
also to allow insertion of additional material. A kind of resource
consciousness is introduced to control this additional freedom, distinguishing
between producer and consumer arcs. The non-finite-state copying aspect of
reduplication is mapped to automata intersection, itself a non-finite-state
operation. Bounded local optimization prunes certain automaton arcs that fail
to contribute to linguistic optimisation criteria. The paper then presents
implemented case studies of Ulwa construct state infixation, German
hypocoristic truncation and Tagalog over-applying reduplication that illustrate
the expressive power of this approach, before its merits and limitations are
discussed and possible extensions are sketched. I conclude that the one-level
approach to prosodic morphology presents an attractive way of extending
finite-state techniques to difficult phenomena that hitherto resisted elegant
computational analyses.
| [
{
"version": "v1",
"created": "Fri, 19 Nov 1999 16:10:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Walther",
"Markus",
"",
"University of Marburg"
]
] |
cs/9911012 | Joseph Y. Halpern | Joseph Y. Halpern | Cox's Theorem Revisited | Changed running head from original submission | Journal of AI Research, vol. 11, 1999, pp. 429-435 | null | null | cs.AI | null | The assumptions needed to prove Cox's Theorem are discussed and examined.
Various sets of assumptions under which a Cox-style theorem can be proved are
provided, although all are rather strong and, arguably, not natural.
| [
{
"version": "v1",
"created": "Sat, 27 Nov 1999 17:57:17 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Dec 1999 22:29:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/9911013 | Joseph O'Rourke | Joseph O'Rourke and The Smith Problem Solving Group | PushPush is NP-hard in 3D | 10 pages, 7 figures | null | null | Smith Tech. Rep. 064, Nov. 1999 | cs.CG cs.DM | null | We prove that a particular pushing-blocks puzzle is intractable in 3D. The
puzzle, inspired by the game PushPush, consists of unit square blocks on an
integer lattice. An agent may push blocks (but never pull them) in attempting
to move between given start and goal positions. In the PushPush version, the
agent can only push one block at a time, and moreover, each block, when pushed,
slides the maximal extent of its free range. We prove this version is NP-hard
in 3D by reduction from SAT. The corresponding problem in 2D remains open.
| [
{
"version": "v1",
"created": "Sun, 28 Nov 1999 15:43:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
],
[
"Group",
"The Smith Problem Solving",
""
]
] |
cs/9911014 | Edith Hemaspaandra | Edith Hemaspaandra | The Complexity of Poor Man's Logic | Corrected version of the journal version. The changes are in Section
6, where Theorem 6.3(2) was added to handle two missing cases | Journal of Logic and Computation, 11(4), 609--622, 2001. Extended
abstract in STACS 2000 | null | null | cs.LO cs.CC | null | Motivated by description logics, we investigate what happens to the
complexity of modal satisfiability problems if we only allow formulas built
from literals, $\wedge$, $\Diamond$, and $\Box$. Previously, the only known
result was that the complexity of the satisfiability problem for K dropped from
PSPACE-complete to coNP-complete (Schmidt-Schauss and Smolka, 1991 and Donini
et al., 1992). In this paper we show that not all modal logics behave like K.
In particular, we show that the complexity of the satisfiability problem with
respect to frames in which each world has at least one successor drops from
PSPACE-complete to P, but that in contrast the satisfiability problem with
respect to the class of frames in which each world has at most two successors
remains PSPACE-complete. As a corollary of the latter result, we also solve the
open problem from Donini et al.'s complexity classification of description
logics (Donini et al., 1997). In the last section, we classify the complexity
of the satisfiability problem for K for all other restrictions on the set of
operators.
| [
{
"version": "v1",
"created": "Sun, 28 Nov 1999 21:34:01 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Dec 2005 23:32:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
]
] |
cs/9912001 | Gabriel Istrate | Gabriel Istrate | The phase transition in random Horn satisfiability and its algorithmic
implications | 26 pages. Journal version of papers in AIM'98, SODA'99. Submitted to
Random Structures and Algorithms | null | null | null | cs.DS cs.CC | null | Let c>0 be a constant, and $\Phi$ be a random Horn formula with n variables
and $m=c\cdot 2^{n}$ clauses, chosen uniformly at random (with repetition) from
the set of all nonempty Horn clauses in the given variables. By analyzing \PUR,
a natural implementation of positive unit resolution, we show that
$\lim_{n\goesto \infty} \PR ({$\Phi$ is satisfiable})= 1-F(e^{-c})$, where
$F(x)=(1-x)(1-x^2)(1-x^4)(1-x^8)... $. Our method also yields as a byproduct an
average-case analysis of this algorithm.
| [
{
"version": "v1",
"created": "Wed, 1 Dec 1999 22:04:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
] |
cs/9912002 | Myung Ho Kim | Myung Ho Kim | A Geometric Model for Information Retrieval Systems | 13 pages | null | null | null | cs.IR cs.CC cs.DL | null | This decade has seen a great deal of progress in the development of
information retrieval systems. Unfortunately, we still lack a systematic
understanding of the behavior of the systems and their relationship with
documents. In this paper we present a completely new approach towards the
understanding of the information retrieval systems. Recently, it has been
observed that retrieval systems in TREC 6 show some remarkable patterns in
retrieving relevant documents. Based on the TREC 6 observations, we introduce a
geometric linear model of information retrieval systems. We then apply the
model to predict the number of relevant documents by the retrieval systems. The
model is also scalable to a much larger data set. Although the model is
developed based on the TREC 6 routing test data, I believe it can be readily
applicable to other information retrieval systems. In Appendix, we explained a
simple and efficient way of making a better system from the existing systems.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 1999 03:04:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kim",
"Myung Ho",
""
]
] |
cs/9912003 | Masaki Murata | M. Murata, H. Isahara (CRL), M. Nagao (Kyoto University) | Resolution of Indirect Anaphora in Japanese Sentences Using Examples 'X
no Y (Y of X)' | 8 pages, 0 figures. Computation and Language | ACL'99 Workshop on 'Coreference and Its Applications', Maryland,
USA, June 22, 1999 | null | null | cs.CL | null | A noun phrase can indirectly refer to an entity that has already been
mentioned. For example, ``I went into an old house last night. The roof was
leaking badly and ...'' indicates that ``the roof'' is associated with `` an
old house}'', which was mentioned in the previous sentence. This kind of
reference (indirect anaphora) has not been studied well in natural language
processing, but is important for coherence resolution, language understanding,
and machine translation. In order to analyze indirect anaphora, we need a case
frame dictionary for nouns that contains knowledge of the relationships between
two nouns but no such dictionary presently exists. Therefore, we are forced to
use examples of ``X no Y'' (Y of X) and a verb case frame dictionary instead.
We tried estimating indirect anaphora using this information and obtained a
recall rate of 63% and a precision rate of 68% on test sentences. This
indicates that the information of ``X no Y'' is useful to a certain extent when
we cannot make use of a noun case frame dictionary. We estimated the results
that would be given by a noun case frame dictionary, and obtained recall and
precision rates of 71% and 82% respectively. Finally, we proposed a way to
construct a noun case frame dictionary by using examples of ``X no Y.''
| [
{
"version": "v1",
"created": "Mon, 13 Dec 1999 04:42:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murata",
"M.",
"",
"CRL"
],
[
"Isahara",
"H.",
"",
"CRL"
],
[
"Nagao",
"M.",
"",
"Kyoto University"
]
] |
cs/9912004 | Masaki Murata | M. Murata, H. Isahara (CRL), M. Nagao (Kyoto University) | Pronoun Resolution in Japanese Sentences Using Surface Expressions and
Examples | 8 pages, 0 figures. Computation and Language | ACL'99 Workshop on 'Coreference and Its Applications', Maryland,
USA, June 22, 1999 | null | null | cs.CL | null | In this paper, we present a method of estimating referents of demonstrative
pronouns, personal pronouns, and zero pronouns in Japanese sentences using
examples, surface expressions, topics and foci. Unlike conventional work which
was semantic markers for semantic constraints, we used examples for semantic
constraints and showed in our experiments that examples are as useful as
semantic markers. We also propose many new methods for estimating referents of
pronouns. For example, we use the form ``X of Y'' for estimating referents of
demonstrative adjectives. In addition to our new methods, we used many
conventional methods. As a result, experiments using these methods obtained a
precision rate of 87% in estimating referents of demonstrative pronouns,
personal pronouns, and zero pronouns for training sentences, and obtained a
precision rate of 78% for test sentences.
| [
{
"version": "v1",
"created": "Mon, 13 Dec 1999 04:46:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murata",
"M.",
"",
"CRL"
],
[
"Isahara",
"H.",
"",
"CRL"
],
[
"Nagao",
"M.",
"",
"Kyoto University"
]
] |
cs/9912005 | Masaki Murata | M. Murata (CRL), M. Nagao (Kyoto University) | An Estimate of Referent of Noun Phrases in Japanese Sentences | 5 pages, 0 figures. Computation and Language | Coling-ACL '98, Montrial, Canada, August 10, 1998 p912-916 | null | null | cs.CL | null | In machine translation and man-machine dialogue, it is important to clarify
referents of noun phrases. We present a method for determining the referents of
noun phrases in Japanese sentences by using the referential properties,
modifiers, and possessors of noun phrases. Since the Japanese language has no
articles, it is difficult to decide whether a noun phrase has an antecedent or
not. We had previously estimated the referential properties of noun phrases
that correspond to articles by using clue words in the sentences. By using
these referential properties, our system determined the referents of noun
phrases in Japanese sentences. Furthermore we used the modifiers and possessors
of noun phrases in determining the referents of noun phrases. As a result, on
training sentences we obtained a precision rate of 82% and a recall rate of 85%
in the determination of the referents of noun phrases that have antecedents. On
test sentences, we obtained a precision rate of 79% and a recall rate of 77%.
| [
{
"version": "v1",
"created": "Mon, 13 Dec 1999 05:20:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murata",
"M.",
"",
"CRL"
],
[
"Nagao",
"M.",
"",
"Kyoto University"
]
] |
cs/9912007 | Masaki Murata | M. Murata, Q. Ma, K. Uchimoto, H. Isahara (CRL) | An Example-Based Approach to Japanese-to-English Translation of Tense,
Aspect, and Modality | 11 pages, 0 figures. Computation and Language | TMI'99, Chester, UK, August 23, 1999 | null | null | cs.CL | null | We have developed a new method for Japanese-to-English translation of tense,
aspect, and modality that uses an example-based method. In this method the
similarity between input and example sentences is defined as the degree of
semantic matching between the expressions at the ends of the sentences. Our
method also uses the k-nearest neighbor method in order to exclude the effects
of noise; for example, wrongly tagged data in the bilingual corpora.
Experiments show that our method can translate tenses, aspects, and modalities
more accurately than the top-level MT software currently available on the
market can. Moreover, it does not require hand-craft rules.
| [
{
"version": "v1",
"created": "Mon, 13 Dec 1999 06:01:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murata",
"M.",
"",
"CRL"
],
[
"Ma",
"Q.",
"",
"CRL"
],
[
"Uchimoto",
"K.",
"",
"CRL"
],
[
"Isahara",
"H.",
"",
"CRL"
]
] |
cs/9912008 | Marcus Hutter | Marcus Hutter | New Error Bounds for Solomonoff Prediction | 13 pages, Journal of Computer and System Science, minor changes to
1st version | J. Computer and System Science 62:4 (2001) 653-667 | null | IDSIA-11-00 | cs.AI cs.LG | null | Solomonoff sequence prediction is a scheme to predict digits of binary
strings without knowing the underlying probability distribution. We call a
prediction scheme informed when it knows the true probability distribution of
the sequence. Several new relations between universal Solomonoff sequence
prediction and informed prediction and general probabilistic prediction schemes
will be proved. Among others, they show that the number of errors in Solomonoff
prediction is finite for computable distributions, if finite in the informed
case. Deterministic variants will also be studied. The most interesting result
is that the deterministic variant of Solomonoff prediction is optimal compared
to any other probabilistic or deterministic prediction scheme apart from
additive square root corrections only. This makes it well suited even for
difficult prediction problems, where it does not suffice when the number of
errors is minimal to within some factor greater than one. Solomonoff's original
bound and the ones presented here complement each other in a useful way.
| [
{
"version": "v1",
"created": "Mon, 13 Dec 1999 08:33:43 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jan 2001 18:45:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] |
cs/9912010 | Jim Gray | Bill Devlin, Jim Gray, Bill Laing, George Spix | Scalability Terminology: Farms, Clones, Partitions, Packs, RACS and RAPS | MSword version of file at
http://research.microsoft.com/~gray/papers/MS_TR_99_85_Scalability_Terminolog
y.doc | null | null | MS TR 99 85 | cs.AR cs.DC | null | Defines a vocabulary for scaleable systems: Geoplexes, Farms, Clones, RACS,
RAPS, clones, partitions, and packs and dicusses the design tradeoffs of using
clones, partitons, and packs.
| [
{
"version": "v1",
"created": "Sat, 18 Dec 1999 02:19:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devlin",
"Bill",
""
],
[
"Gray",
"Jim",
""
],
[
"Laing",
"Bill",
""
],
[
"Spix",
"George",
""
]
] |
cs/9912011 | Kagan Tumer | David H. Wolpert, Sergey Kirshner, Chris J. Merz and Kagan Tumer | Adaptivity in Agent-Based Routing for Data Networks | null | null | null | NASA-ARC-IC-99-122 | cs.MA adap-org cs.NI nlin.AO | null | Adaptivity, both of the individual agents and of the interaction structure
among the agents, seems indispensable for scaling up multi-agent systems
(MAS's) in noisy environments. One important consideration in designing
adaptive agents is choosing their action spaces to be as amenable as possible
to machine learning techniques, especially to reinforcement learning (RL)
techniques. One important way to have the interaction structure connecting
agents itself be adaptive is to have the intentions and/or actions of the
agents be in the input spaces of the other agents, much as in Stackelberg
games. We consider both kinds of adaptivity in the design of a MAS to control
network packet routing.
We demonstrate on the OPNET event-driven network simulator the perhaps
surprising fact that simply changing the action space of the agents to be
better suited to RL can result in very large improvements in their potential
performance: at their best settings, our learning-amenable router agents
achieve throughputs up to three and one half times better than that of the
standard Bellman-Ford routing algorithm, even when the Bellman-Ford protocol
traffic is maintained. We then demonstrate that much of that potential
improvement can be realized by having the agents learn their settings when the
agent interaction structure is itself adaptive.
| [
{
"version": "v1",
"created": "Mon, 20 Dec 1999 19:25:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolpert",
"David H.",
""
],
[
"Kirshner",
"Sergey",
""
],
[
"Merz",
"Chris J.",
""
],
[
"Tumer",
"Kagan",
""
]
] |
cs/9912012 | Kagan Tumer | Kagan Tumer and David H. Wolpert | Avoiding Braess' Paradox through Collective Intelligence | 28 pages | null | null | NASA-ARC-IC-99-124 | cs.DC adap-org cs.MA cs.NI nlin.AO | null | In an Ideal Shortest Path Algorithm (ISPA), at each moment each router in a
network sends all of its traffic down the path that will incur the lowest cost
to that traffic. In the limit of an infinitesimally small amount of traffic for
a particular router, its routing that traffic via an ISPA is optimal, as far as
cost incurred by that traffic is concerned. We demonstrate though that in many
cases, due to the side-effects of one router's actions on another routers
performance, having routers use ISPA's is suboptimal as far as global aggregate
cost is concerned, even when only used to route infinitesimally small amounts
of traffic. As a particular example of this we present an instance of Braess'
paradox for ISPA's, in which adding new links to a network decreases overall
throughput. We also demonstrate that load-balancing, in which the routing
decisions are made to optimize the global cost incurred by all traffic
currently being routed, is suboptimal as far as global cost averaged across
time is concerned. This is also due to "side-effects", in this case of current
routing decision on future traffic.
The theory of COllective INtelligence (COIN) is concerned precisely with the
issue of avoiding such deleterious side-effects. We present key concepts from
that theory and use them to derive an idealized algorithm whose performance is
better than that of the ISPA, even in the infinitesimal limit. We present
experiments verifying this, and also showing that a machine-learning-based
version of this COIN algorithm in which costs are only imprecisely estimated (a
version potentially applicable in the real world) also outperforms the ISPA,
despite having access to less information than does the ISPA. In particular,
this COIN algorithm avoids Braess' paradox.
| [
{
"version": "v1",
"created": "Mon, 20 Dec 1999 21:21:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tumer",
"Kagan",
""
],
[
"Wolpert",
"David H.",
""
]
] |
cs/9912015 | Angela Bonifati | Angela Bonifati, Stefano Ceri | Comparative Analysis of Five XML Query Languages | TeX v3.1415, 17 pages, 6 figures, to be published in ACM Sigmod
Record, March 2000 | null | null | Dipartimento di Elettronica e Informazione, Politecnico di Milano
(Italy) Technical Report nr.99-76 | cs.DB | null | XML is becoming the most relevant new standard for data representation and
exchange on the WWW. Novel languages for extracting and restructuring the XML
content have been proposed, some in the tradition of database query languages
(i.e. SQL, OQL), others more closely inspired by XML. No standard for XML query
language has yet been decided, but the discussion is ongoing within the World
Wide Web Consortium and within many academic institutions and Internet-related
major companies. We present a comparison of five, representative query
languages for XML, highlighting their common features and differences.
| [
{
"version": "v1",
"created": "Wed, 22 Dec 1999 15:25:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bonifati",
"Angela",
""
],
[
"Ceri",
"Stefano",
""
]
] |
cs/9912016 | Jin-Dong Kim | Jin-Dong Kim and Sang-Zoo Lee and Hae-Chang Rim | HMM Specialization with Selective Lexicalization | 7 pages, 6 figures | Proceedings of the 1999 Joint SIGDAT Conference on Empirical
Methods in Natural Language Processing and Very Large Corpora, pp.121-127,
1999 | null | null | cs.CL cs.LG | null | We present a technique which complements Hidden Markov Models by
incorporating some lexicalized states representing syntactically uncommon
words. Our approach examines the distribution of transitions, selects the
uncommon words, and makes lexicalized states for the words. We performed a
part-of-speech tagging experiment on the Brown corpus to evaluate the resultant
language model and discovered that this technique improved the tagging accuracy
by 0.21% at the 95% level of confidence.
| [
{
"version": "v1",
"created": "Thu, 23 Dec 1999 01:07:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kim",
"Jin-Dong",
""
],
[
"Lee",
"Sang-Zoo",
""
],
[
"Rim",
"Hae-Chang",
""
]
] |
cs/9912017 | Schwitter | Michael Hess | Mixed-Level Knowledge Representation and Variable-Depth Inference in
Natural Language Processing | 29 pages | International Journal on Artificial Intelligence Tools (IJAIT),
vol 6, no 4, 1997. 481-509 | null | null | cs.CL | null | A system is described that uses a mixed-level knowledge representation based
on standard Horn Clause Logic to represent (part of) the meaning of natural
language documents. A variable-depth search strategy is outlined that
distinguishes between the different levels of abstraction in the knowledge
representation to locate specific passages in the documents. A detailed
description of the linguistic aspects of the system is given. Mixed-level
representations as well as variable-depth search strategies are applicable in
fields outside that of NLP.
| [
{
"version": "v1",
"created": "Thu, 23 Dec 1999 15:48:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hess",
"Michael",
""
]
] |
cs/9912019 | Dominic Mayers | Dominic Mayers | Quantum Bit Commitment Expansion | The paper was retracted | null | null | null | cs.CR | null | The paper was retracted.
| [
{
"version": "v1",
"created": "Mon, 27 Dec 1999 20:57:45 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Jan 2000 01:16:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mayers",
"Dominic",
""
]
] |
dg-ga/9710001 | null | R. Bott and A. S. Cattaneo | Integral Invariants of 3-Manifolds | 39 pages, AMS-LaTeX, to appear in J. Diff. Geom | J. Diff. Geom., 48 (1998) 91-133 | null | null | dg-ga hep-th math.DG math.QA q-alg | null | This note describes an invariant of rational homology 3-spheres in terms of
configuration space integrals which in some sense lies between the invariants
of Axelrod and Singer and those of Kontsevich.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 1997 06:17:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bott",
"R.",
""
],
[
"Cattaneo",
"A. S.",
""
]
] |
dg-ga/9710002 | Bryan Clair | Bryan Clair | Residual Amenability and the Approximation of L^2-invariants | 13 pages, Latex2e | null | null | null | dg-ga math.DG | null | We generalize Luck's Theorem to show that the L^2-Betti numbers of a
residually amenable covering space are the limit of the L^2-Betti numbers of a
sequence of amenable covering spaces. We show that any residually amenable
covering space of a finite simplicial complex is of determinant class, and that
the L^2 torsion is a homotopy invariant for such spaces. We give examples of
residually amenable groups, including the Baumslag-Solitar groups.
| [
{
"version": "v1",
"created": "Fri, 3 Oct 1997 21:09:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Clair",
"Bryan",
""
]
] |
dg-ga/9710003 | Gennadi Sardanashvily | G.Sardanashvily | Non-Symplectic Geometry of First Order Time-Dependent Mechanics | 24 pages, LaTeX | null | null | null | dg-ga math.DG | null | The usual formulation of time-dependent mechanics implies a given splitting
$Y=R\times M$ of an event space $Y$. This splitting, however, is broken by any
time-dependent transformation, including transformations between inertial
frames. The goal is the frame-covariant formulation of time-dependent mechanics
on a bundle $Y\to R$ whose fibration $Y\to M$ is not fixed. Its phase space is
the vertical cotangent bundle $V^*Y$ provided with the canonical 3-form and the
corresponding canonical Poisson structure. An event space of relativistic
mechanics is a manifold $Y$ whose fibration $Y\to R$ is not fixed.
| [
{
"version": "v1",
"created": "Sat, 4 Oct 1997 07:46:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sardanashvily",
"G.",
""
]
] |
dg-ga/9710005 | Guofang Wang | W. Ding, J. Jost, J. Li, G. Wang | The differential equation $\Delta u = 8\pi - 8\pi h\exp {u}$ on a
compact Riemann surface | 26 pages, Latex, to appear in Asian J. Math. 1(1997) No. 2 | Asian J. Math. 1(1997) 230-248 | null | MPI in Leipzig, Preprint Nr.: 24 | dg-ga math.DG | null | Let $M$ be a compact Riemann surface, $h(x)$ a positive smooth function on
$M$. In this paper, we consider the functional $$J(u)={1/2}\int
\sb{M}|\bigtriangledown u|\sp 2 + 8\pi \int\sb{M}u -8\pi \log\int\sb{M}h\exp
{u}$$. We give a sufficient condition under which $J$ achieves its minimum.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 1997 10:11:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ding",
"W.",
""
],
[
"Jost",
"J.",
""
],
[
"Li",
"J.",
""
],
[
"Wang",
"G.",
""
]
] |
dg-ga/9710006 | Guofang Wang | W. Ding, J. Jost, J. Li, G. Wang | An analysis of the two-vortex case in the Chern-Simons Higgs model | 13 pages, Latex | null | null | null | dg-ga hep-th math.DG | null | Extending work of Caffarelli-Yang and Tarantello, we present a variational
existence proof for two-vortex solutions of the periodic Chern-Simons Higgs
model and analyze the asymptotic behavior of these solutions as the parameter
coupling the gauge field with the scalar field tends to 0.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 1997 10:06:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ding",
"W.",
""
],
[
"Jost",
"J.",
""
],
[
"Li",
"J.",
""
],
[
"Wang",
"G.",
""
]
] |
dg-ga/9710008 | John Lott | John Lott | Deficiencies of Lattice Subgroups of Lie Groups | 5 pages, AMS-Latex | null | null | null | dg-ga math.DG | null | Let L be a lattice in a connected Lie group. We show that besides a few
exceptional cases, the deficiency of L is nonpositive.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 1997 23:18:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lott",
"John",
""
]
] |
dg-ga/9710009 | Ursula Hamenstaedt | Ursula Hamenstaedt | Cocycles, symplectic structures and intersection | 33 pages, Tex | null | null | null | dg-ga math.DG | null | We investigate the cross ratio for closed negatively curved manifolds. As one
of several applications, we obtain that for two such homotopy equivalent
manifolds M and N, the following is true : If M and N have the same marked
length spectrum and if the Anosov splitting for M is C^1 then M and N have the
same volume.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 1997 23:20:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hamenstaedt",
"Ursula",
""
]
] |
dg-ga/9710010 | Gagik Ter-Gazarian | G.T.Ter-Kazarian | Mathematical Background of Formalism of Operator Manifold | LaTex, 25 pages, no figures, revised version (minor grammatical
changes) | null | null | BAO/97/07 | dg-ga math.DG | null | The analysis of mathematical structure of the method of operator manifold
guides our discussion. The latter is a still wider generalization of the method
of secondary quantization with appropriate expansion over the geometric
objects. The nature of operator manifold provides its elements with both
quantum field and geometry aspects, a detailed study of which is a subject of
present paper. It yields a quantization of geometry differing in principle from
all earlier suggested schemes.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 1997 14:18:33 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Oct 1997 06:14:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ter-Kazarian",
"G. T.",
""
]
] |
dg-ga/9710011 | Jean-Luc A. Brylinski | Jean-Luc Brylinski | The beta function of a knot | plain TeX; the new version discusses the relation with the M\"obius
energy for knots | null | null | null | dg-ga math.DG | null | We introduce the beta function of a knot in euclidean three-space. This is a
meromorphic function of a complex variable which we prove admits a Bernstein
type functional equation. We determine the first residues.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 1997 21:37:04 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Feb 1998 18:56:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brylinski",
"Jean-Luc",
""
]
] |
dg-ga/9710012 | Paul Feehan | Paul M. N. Feehan, Thomas G. Leness | Uhlenbeck compactness and transversality for the moduli space of PU(2)
monopoles | LaTeX 2e, 15 pages | null | null | null | dg-ga alg-geom hep-th math.AG math.DG | null | This research announcement gives a brief report of the main results in our
paper "PU(2) monopoles, I: Regularity, Uhlenbeck compactness, and
transversality" (Journal of Differential Geometry, to appear). We describe the
existence of perturbations for the PU(2) monopole equations, yielding both
useful transversality properties and an Uhlenbeck compactification for this
perturbed moduli space.
| [
{
"version": "v1",
"created": "Sun, 12 Oct 1997 21:33:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Feehan",
"Paul M. N.",
""
],
[
"Leness",
"Thomas G.",
""
]
] |
dg-ga/9710013 | null | Janusz Grabowski and Pawel Urbanski | Tangent and cotangent lifts and graded Lie algebras associated with Lie
algebroids | LamsTex 1991, 28 pages, to appear in Annals of global analysis and
geometry | Ann. Global Anal. Geom. 15 (1997), 447-486. | null | null | dg-ga math.DG | null | Generalized Schouten, Froelicher-Nijenhuis and Froelicher-Richardson brackets
are defined for an arbitrary Lie algebroid. Tangent and cotangent lifts of Lie
algebroids are introduced and discussed and the behaviour of the related graded
Lie brackets under these lifts is studied. In the case of the canonical Lie
algebroid on the tangent bundle, a new common generalization of the
Froelicher-Nijenhuis and the symmetric Schouten brackets, as well as embeddings
of the Nijenhuis-Richardson and the Froelicher-Nijenhuis bracket into the
Schouten bracket, are obtained.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 1997 12:39:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grabowski",
"Janusz",
""
],
[
"Urbanski",
"Pawel",
""
]
] |
dg-ga/9710014 | null | Katarzyna Konieczna and Pawel Urbanski | Double vector bundles and duality | 29 pages, LamsTex 1991 | null | null | null | dg-ga math.DG | null | The most important examples of a double vector bundle are provided by
iterated tangent and cotangent functors: TTM, TT^*M, T^*TM, and T^*T^*M. We
introduce the notions of the dual double vector bundle and the dual double
vector bundle morphism. Theorems on canonical isomorphisms are formulated and
proved. Several examples are given.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 1997 12:07:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Konieczna",
"Katarzyna",
""
],
[
"Urbanski",
"Pawel",
""
]
] |
dg-ga/9710016 | Jonathan Marcus Woolf | Jonathan Woolf | Intersection Cohomology of Symplectic Quotients | Withdrawn - lemma 4.1 is false. Fairly major reworking required! | null | null | null | dg-ga math.DG | null | Paper withdrawn - lemma 4.1 was false. Quite a lot of changes need to be
made!
| [
{
"version": "v1",
"created": "Fri, 17 Oct 1997 10:28:17 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Oct 1997 12:01:10 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Oct 1997 09:58:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Woolf",
"Jonathan",
""
]
] |
dg-ga/9710017 | Dusa McDuff | Fran\c{c}ois Lalonde, Dusa McDuff, and Leonid Polterovich | Topological rigidity of Hamiltonian loops and quantum homology | Latex, 14 pages | null | null | null | dg-ga math.DG | null | This paper studies the question of when a loop $\phi$ in the group
Symp$(M,\omega)$ of symplectomorphisms of a symplectic manifold $(M,\omega)$ is
isotopic to a loop that is generated by a time-dependent Hamiltonian function.
(Loops with this property are said to be Hamiltonian.) Our main result is that
Hamiltonian loops are rigid in the following sense: if $\phi$ is Hamiltonian
with respect to $\omega$, and if $\phi'$ is a small perturbation of $\phi$ that
preserves another symplectic form $\omega'$, then $\phi'$ is Hamiltonian with
respect to $\omega'$. This allows us to get some new information on the
structure of the flux group, i.e. the image of $\pi_1(Symp(M,\omega))$ under
the flux homomorphism. We give a complete proof of our result for some
manifolds, and sketch the proof in general. The argument uses methods developed
by Seidel for studying properties of Hamiltonian loops via the quantum homology
of $M$.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 1997 18:46:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lalonde",
"François",
""
],
[
"McDuff",
"Dusa",
""
],
[
"Polterovich",
"Leonid",
""
]
] |
dg-ga/9710018 | null | S. Bouarroudj and V. Ovsienko (CMI, Universit\'e de Provence,
Marseille and C.N.R.S., Centre de Physique Th\'eorique, Marseille) | Three Cocycles on $\Diff(S^1)$ Generalizing the Schwarzian Derivative | 18 pages, LaTex. to appear in IMRN | null | null | CPT-97/P3548 | dg-ga math.DG | null | The first group of differentiable cohomology of $\Diff(S^1)$, vanishing on
the M\"obius subgroup $PSL(2,R)\subset\Diff(S^1)$, with coefficients in modules
of linear differential operators on $S^1$ is calculated. We introduce three
non-trivial $PSL(2,R)$-invariant 1-cocycles on $\Diff(S^1)$ generalizing the
Schwarzian derivative.
| [
{
"version": "v1",
"created": "Sat, 18 Oct 1997 08:37:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bouarroudj",
"S.",
"",
"CMI, Université de Provence,\n Marseille and C.N.R.S., Centre de Physique Théorique, Marseille"
],
[
"Ovsienko",
"V.",
"",
"CMI, Université de Provence,\n Marseille and C.N.R.S., Centre de Physique Théorique, Marseille"
]
] |
dg-ga/9710019 | Li Weiping | Weiping Li (OSU) | Cap-prodcut structures on the Fintushel-Stern spectral sequence | 14 pages, no figure, AmsLaTex | null | null | null | dg-ga math.DG | null | We show that there is a well-defined cap-product structure on the
Fintushel-Stern spectral sequence. Hence we obtain the induced cap-product
structure on the ${\BZ}_8$-graded instanton Floer homology. The cap-product
structure provides an essentially new property of the instanton Floer homology,
from a topological point of view, which multiplies a finite dimensional
cohomology class by an infinite dimensional homology class (Floer cycles) to
get another infinite dimensional homology class.
| [
{
"version": "v1",
"created": "Mon, 20 Oct 1997 13:40:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Weiping",
"",
"OSU"
]
] |
dg-ga/9710020 | Iskander Taimanov | Iskander A. Taimanov | The Weierstrass representation of closed surfaces in $R^3$ | 15 pages, LaTeX; Preprint no. 291, SFB 288, TU-Berlin | Functional Anal. Appl. 32:4 (1998), 49--62. | null | null | dg-ga math.DG | null | In the present paper which a sequel to dg-ga/9511005 and dg-ga//9610013 a
global Weierstrass representation of an arbitrary closed oriented surface of
genus $\geq 1$ in the the three-space is constructed. The Weierstrass spectrum
of a torus immersed into $R^3$ is introduced and finite-zone planes as well as
finite-zone solutions to the modified Novikov-Veselov equations are
constructed.
| [
{
"version": "v1",
"created": "Mon, 20 Oct 1997 15:52:19 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Oct 1997 08:38:05 GMT"
},
{
"version": "v3",
"created": "Sat, 6 Dec 1997 13:48:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Taimanov",
"Iskander A.",
""
]
] |
dg-ga/9710021 | Wlodzimierz Piechocki | Kazimierz Bragiel and Wlodzimierz Piechocki | Topology of the set of smooth solutions to the Liouville equation | LaTeX2e, 21 pages, no figures, submitted for publication | null | null | null | dg-ga math.DG | null | We prove that the space of smooth initial data and the set of smooth
solutions of the Liouville equation are homeomorphic.
| [
{
"version": "v1",
"created": "Tue, 21 Oct 1997 12:55:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bragiel",
"Kazimierz",
""
],
[
"Piechocki",
"Wlodzimierz",
""
]
] |
dg-ga/9710022 | Naichung Conan Leung | Naichung Conan Leung, Sangkug Yi | Analytic Torsion for Quaternionic manifolds and related topics | 17 pages, LaTex | null | null | null | dg-ga math.DG | null | In this paper we show that the Ray-Singer complex analytic torsion is trivial
for even dimensional Calabi-Yau manifolds.
Then we define the quaternionic analytic torsion for quaternionic manifolds
and prove that they are metric independent.
In dimension four, the quaternionic analytic torsion equals to the self-dual
analytic torsion. For higher dimensional manifolds, the self-dual analytic
torsion is a conformal invariant.
| [
{
"version": "v1",
"created": "Tue, 21 Oct 1997 20:58:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leung",
"Naichung Conan",
""
],
[
"Yi",
"Sangkug",
""
]
] |
dg-ga/9710023 | Guofang Wang | W. Ding, J. Jost, J. Li and G. Wang | Existence results for mean field equations | Filling a gap in the argument and adding 2 referrences | null | null | null | dg-ga math.DG | null | Let $\Omega$ be an annulus. We prove that the mean field equation
$-\Delta\psi=\frac{e\sp{-\beta\psi}}{\int\sb{\Omega}e\sp{-\beta\psi}} $ admits
a solution with zero boundary for $\beta\in (-16\pi,-8\pi)$. This is a
supercritical case for the Moser-Trudinger inequality.
| [
{
"version": "v1",
"created": "Wed, 22 Oct 1997 07:53:47 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Oct 1997 09:35:39 GMT"
},
{
"version": "v3",
"created": "Sun, 30 Nov 1997 16:29:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ding",
"W.",
""
],
[
"Jost",
"J.",
""
],
[
"Li",
"J.",
""
],
[
"Wang",
"G.",
""
]
] |
dg-ga/9710024 | Mark J. Gotay | Mark J. Gotay and Hendrik B. Grundling | Nonexistence of Finite-dimensional Quantizations of a Noncompact
Symplectic Manifold | Plain TeX, 5 pps | "Differential Geometry and Applications," I. Kolar et al., Eds.,
593-596 (Masaryk University, Brno, 1999). | null | null | dg-ga math.DG quant-ph | null | We prove that there is no faithful finite-dimensional representation by
skew-hermitian matrices of a ``basic algebra of observables'' B on a noncompact
symplectic manifold M. Consequently there exists no finite-dimensional
quantization of any Lie subalgebra of the Poisson algebra C^\infty(M)
containing B.
| [
{
"version": "v1",
"created": "Wed, 22 Oct 1997 08:44:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gotay",
"Mark J.",
""
],
[
"Grundling",
"Hendrik B.",
""
]
] |
dg-ga/9710025 | Wlodzimierz Piechocki | Wlodzimierz Piechocki | Topology of solutions of the Liouville equation | LaTeX2e, 4 pages, no figures | null | null | null | dg-ga math.DG | null | Suggestions concerning the generalization of the geometric quantization to
the case of nonlinear field theories are given. Results for the Liouville field
theory are presented.
| [
{
"version": "v1",
"created": "Wed, 22 Oct 1997 12:53:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Piechocki",
"Wlodzimierz",
""
]
] |
dg-ga/9710026 | Alejandro Rivero | Alejandro Rivero (Universidad de Zaragoza, Spain) | Introduction to the Tangent Grupoid | 8 pages, latex | null | null | null | dg-ga math.DG | null | We present some plausible definitions for the tangent grupoid of a manifold
M, as well as some of the known applications of the structure. This is a kind
of introductory note.
| [
{
"version": "v1",
"created": "Thu, 23 Oct 1997 11:53:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rivero",
"Alejandro",
"",
"Universidad de Zaragoza, Spain"
]
] |
dg-ga/9710027 | Daniel Cartin | Daniel Cartin | Generalized Symplectic Manifolds | LaTeX, 26 pages | null | null | null | dg-ga math.DG | null | This paper uses a generalization of symplectic geometry, known as
$n$-symplectic geometry and developed by Norris, to find observables on
three-dimensional manifolds. It will be seen that for the cases considered, the
$n$-symplectic observables are derivable from the symplectic observables of
$C^2$. The quantization of these observables, as well as those on the frame
bundle of $R^n$, is also examined.
| [
{
"version": "v1",
"created": "Fri, 24 Oct 1997 15:50:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cartin",
"Daniel",
""
]
] |
dg-ga/9710028 | Eugene Ferapontov | E.V. Ferapontov | Surfaces in Lie sphere geometry and the stationary Davey-Stewartson
hierarchy | Latex, 31 pages | null | null | null | dg-ga math.DG | null | We introduce two basic invariant forms which define generic surface in
3-space uniquely up to Lie sphere equivalence. Two particularly interesting
classes of surfaces associated with these invariants are considered, namely,
the Lie-minimal surfaces and the diagonally-cyclidic surfaces. For
diagonally-cyclidic surfaces we derive the stationary modified Veselov-Novikov
equation, whose role in the theory of these surfaces is similar to that of
Calapso's equation in the theory of isothermic surfaces. Since Calapso's
equation itself turns out to be related to the stationary Davey-Stewartson
equation, these results shed some new light on differential geometry of the
stationary Davey-Stewartson hierarchy. Diagonally-cyclidic surfaces are the
natural Lie sphere analogs of the isothermally-asymptotic surfaces in
projective differential geometry for which we also derive the stationary
modified Veselov-Novikov equation with the different real reduction. Parallels
between invariants of surfaces in Lie sphere geometry and reciprocal invariants
of hydrodynamic type systems are drawn in the conclusion.
| [
{
"version": "v1",
"created": "Mon, 27 Oct 1997 13:11:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ferapontov",
"E. V.",
""
]
] |
dg-ga/9710029 | Vicente Munoz Velazquez | Vicente Mu\~noz | Ring structure of the Floer Cohomology of $\Sigma \times S^1$ | 13 pages, Latex2e | null | null | null | dg-ga math.DG | null | We give a presentation for the Floer cohomology ring $HF^*(\Sigma \times
S^1)$, where $\Sigma$ is a Riemann surface of genus bigger than one, which
coincides with the conjectural presentation for the quantum cohomology ring of
the moduli space of flat SO(3)-connections of odd degree over $\Sigma$. We
study the spectrum of the action of the homology of $\Sigma$ on the Floer
cohomology and prove a physical assumption made by Vafa et al.
| [
{
"version": "v1",
"created": "Mon, 27 Oct 1997 14:06:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Muñoz",
"Vicente",
""
]
] |
dg-ga/9710030 | Ping Xu | Kirill Mackenzie and Ping Xu | Classical lifting processes and multiplicative vector fields | Latex, 27 pages, Quarterly J. Math. (Oxford), to appear | null | null | null | dg-ga math.DG | null | We extend the calculus of multiplicative vector fields and differential forms
and their intrinsic derivatives from Lie groups to Lie groupoids; this
generalization turns out to include also the classical process of complete
lifting from arbitrary manifolds to tangent and cotangent bundles. Using this
calculus we give a new description of the Lie bialgebroid structure associated
with a Poisson groupoid.
| [
{
"version": "v1",
"created": "Tue, 28 Oct 1997 21:22:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mackenzie",
"Kirill",
""
],
[
"Xu",
"Ping",
""
]
] |
dg-ga/9710031 | Jan Segert | Jan Segert | Frobenius Manifolds from Yang-Mills Instantons | 16 pages, AMSTeX 2.1 with amssppt | null | null | null | dg-ga math.DG | null | We present an elementary self-contained account of semisimple Frobenius
manifolds in three dimensions, and exhibit a new family of explicit examples.
These examples are constructed from Yang-Mills instantons with a certain
symmetry.
| [
{
"version": "v1",
"created": "Wed, 29 Oct 1997 19:51:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Segert",
"Jan",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.