id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-21 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/9908017
Andreas Siebert
Andreas Siebert
A Differential Invariant for Zooming
5 pages, 7 figures
Proceedings 1999 International Conference on Image Processing, Kobe, 25-28 October 1999
null
null
cs.CV
null
This paper presents an invariant under scaling and linear brightness change. The invariant is based on differentials and therefore is a local feature. Rotationally invariant 2-d differential Gaussian operators up to third order are proposed for the implementation of the invariant. The performance is analyzed by simulating a camera zoom-out.
[ { "version": "v1", "created": "Thu, 26 Aug 1999 17:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Siebert", "Andreas", "" ] ]
cs/9908018
Rigo Michel
Michel Rigo
Construction of regular languages and recognizability of polynomials
11 pages
null
null
null
cs.CC
null
A generalization of numeration system in which the set N of the natural numbers is recognizable by finite automata can be obtained by describing a lexicographically ordered infinite regular language. Here we show that if P belonging to Q[x] is a polynomial such that P(N) is a subset of N then we can construct a numeration system in which the set of representations of P(N) is regular. The main issue in this construction is to setup a regular language with a density function equals to P(n+1)-P(n) for n large enough.
[ { "version": "v1", "created": "Fri, 27 Aug 1999 07:33:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Rigo", "Michel", "" ] ]
cs/9909001
David Eppstein
Marshall Bern, David Eppstein, Pankaj K. Agarwal, Nina Amenta, Paul Chew, Tamal Dey, David P. Dobkin, Herbert Edelsbrunner, Cindy Grimm, Leonidas J. Guibas, John Harer, Joel Hass, Andrew Hicks, Carroll K. Johnson, Gilad Lerman, David Letscher, Paul Plassmann, Eric Sedgwick, Jack Snoeyink, Jeff Weeks, Chee Yap, and Denis Zorin
Emerging Challenges in Computational Topology
20 pages
null
null
null
cs.CG math.GT
null
Here we present the results of the NSF-funded Workshop on Computational Topology, which met on June 11 and 12 in Miami Beach, Florida. This report identifies important problems involving both computation and topology.
[ { "version": "v1", "created": "Wed, 1 Sep 1999 20:33:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Bern", "Marshall", "" ], [ "Eppstein", "David", "" ], [ "Agarwal", "Pankaj K.", "" ], [ "Amenta", "Nina", "" ], [ "Chew", "Paul", "" ], [ "Dey", "Tamal", "" ], [ "Dobkin", "David P.", "" ], [ "Edelsbrunner", "Herbert", "" ], [ "Grimm", "Cindy", "" ], [ "Guibas", "Leonidas J.", "" ], [ "Harer", "John", "" ], [ "Hass", "Joel", "" ], [ "Hicks", "Andrew", "" ], [ "Johnson", "Carroll K.", "" ], [ "Lerman", "Gilad", "" ], [ "Letscher", "David", "" ], [ "Plassmann", "Paul", "" ], [ "Sedgwick", "Eric", "" ], [ "Snoeyink", "Jack", "" ], [ "Weeks", "Jeff", "" ], [ "Yap", "Chee", "" ], [ "Zorin", "Denis", "" ] ]
cs/9909002
Vincenzo Pallotta
Afzal Ballim and Vincenzo Pallotta
Semantic robust parsing for noun extraction from natural language queries
null
Proceedings of WPDI'99 (Workshop on Procedures in Discourse Interpretation),1999, Iasi - Romania
null
null
cs.CL
null
This paper describes how robust parsing techniques can be fruitful applied for building a query generation module which is part of a pipelined NLP architecture aimed at process natural language queries in a restricted domain. We want to show that semantic robustness represents a key issue in those NLP systems where it is more likely to have partial and ill-formed utterances due to various factors (e.g. noisy environments, low quality of speech recognition modules, etc...) and where it is necessary to succeed, even if partially, in extracting some meaningful information.
[ { "version": "v1", "created": "Thu, 2 Sep 1999 15:53:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Ballim", "Afzal", "" ], [ "Pallotta", "Vincenzo", "" ] ]
cs/9909003
Rabindra Narayan Behera
S. Mohanty (1) and R.N. Behera (2) ((1) Department of Computer Science and Application Utkal University, Bhubaneswar, India, (2) National Informatics Centre, Puri, India)
Iterative Deepening Branch and Bound
39 html pages + 4 gif files (fig1,fig1(a),fig2,fig3)
null
null
null
cs.AI
null
In tree search problem the best-first search algorithm needs too much of space . To remove such drawbacks of these algorithms the IDA* was developed which is both space and time cost efficient. But again IDA* can give an optimal solution for real valued problems like Flow shop scheduling, Travelling Salesman and 0/1 Knapsack due to their real valued cost estimates. Thus further modifications are done on it and the Iterative Deepening Branch and Bound Search Algorithms is developed which meets the requirements. We have tried using this algorithm for the Flow Shop Scheduling Problem and have found that it is quite effective.
[ { "version": "v1", "created": "Fri, 3 Sep 1999 10:31:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohanty", "S.", "" ], [ "Behera", "R. N.", "" ] ]
cs/9909004
Devillers
Jean-Daniel Boissonnat, Jurek Czyzowicz, Olivier Devillers, Jean-Marc Robert, Mariette Yvinec
Convex Tours of Bounded Curvature
11 pages, 5 figures, abstract presented at European Symposium on Algorithms 1993
null
null
INRIA Research report 2375
cs.CG
null
We consider the motion planning problem for a point constrained to move along a smooth closed convex path of bounded curvature. The workspace of the moving point is bounded by a convex polygon with m vertices, containing an obstacle in a form of a simple polygon with $n$ vertices. We present an O(m+n) time algorithm finding the path, going around the obstacle, whose curvature is the smallest possible.
[ { "version": "v1", "created": "Fri, 3 Sep 1999 15:09:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Boissonnat", "Jean-Daniel", "" ], [ "Czyzowicz", "Jurek", "" ], [ "Devillers", "Olivier", "" ], [ "Robert", "Jean-Marc", "" ], [ "Yvinec", "Mariette", "" ] ]
cs/9909005
Devillers
Jean-Daniel Boissonnat, Jurek Czyzowicz, Olivier Devillers, Jorge Urrutia, Mariette Yvinec
Computing largest circles separating two sets of segments
14 pages, 3 figures, abstract presented at 8th Canadian Conference on Computational Geometry, 1996
null
null
INRIA Research report 2705
cs.CG
null
A circle $C$ separates two planar sets if it encloses one of the sets and its open interior disk does not meet the other set. A separating circle is a largest one if it cannot be locally increased while still separating the two given sets. An Theta(n log n) optimal algorithm is proposed to find all largest circles separating two given sets of line segments when line segments are allowed to meet only at their endpoints. In the general case, when line segments may intersect $\Omega(n^2)$ times, our algorithm can be adapted to work in O(n alpha(n) log n) time and O(n \alpha(n)) space, where alpha(n) represents the extremely slowly growing inverse of the Ackermann function.
[ { "version": "v1", "created": "Fri, 3 Sep 1999 15:29:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Boissonnat", "Jean-Daniel", "" ], [ "Czyzowicz", "Jurek", "" ], [ "Devillers", "Olivier", "" ], [ "Urrutia", "Jorge", "" ], [ "Yvinec", "Mariette", "" ] ]
cs/9909008
Geoffrey McKim
Rob Kling, Geoffrey McKim
Not Just a Matter of Time: Field Differences and the Shaping of Electronic Media in Supporting Scientific Communication
Accepted for publication in the Journal of the American Society for Information Science. Version was reformatted with several minor text changes
null
null
null
cs.CY
null
The shift towards the use of electronic media in scholarly communication appears to be an inescapable imperative. However, these shifts are uneven, both with respect to field and with respect to the form of communication. Different scientific fields have developed and use distinctly different communicative forums, both in the paper and electronic arenas, and these forums play different communicative roles within the field. One common claim is that we are in the early stages of an electronic revolution, that it is only a matter of time before other fields catch up with the early adopters, and that all fields converge on a stable set of electronic forums. A social shaping of technology (SST) perspective helps us to identify important social forces centered around disciplinary constructions of trust and of legitimate communication that pull against convergence. This analysis concludes that communicative plurality and communicative heterogeneity are durable features of the scholarly landscape, and that we are likely to see field differences in the use of and meaning ascribed to communications forums persist, even as overall use of electronic communications technologies both in science and in society as a whole increases.
[ { "version": "v1", "created": "Tue, 7 Sep 1999 11:35:28 GMT" }, { "version": "v2", "created": "Sat, 29 Apr 2000 17:43:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Kling", "Rob", "" ], [ "McKim", "Geoffrey", "" ] ]
cs/9909009
Krzysztof R. Apt
Krzysztof R. Apt
The Rough Guide to Constraint Propagation
23 pages. To appear in the Proc. 5th International Conference on Principles and Practice of Constraint Programming as an invited talk
null
null
null
cs.AI cs.PL
null
We provide here a simple, yet very general framework that allows us to explain several constraint propagation algorithms in a systematic way. In particular, using the notions commutativity and semi-commutativity, we show how the well-known AC-3, PC-2, DAC and DPC algorithms are instances of a single generic algorithm. The work reported here extends and simplifies that of Apt, cs.AI/9811024.
[ { "version": "v1", "created": "Wed, 8 Sep 1999 13:50:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/9909010
Krzysztof R. Apt
Krzysztof R. Apt and Eric Monfroy
Automatic Generation of Constraint Propagation Algorithms for Small Finite Domains
15 pages. To appear in the Proc. 5th International Conference on Principles and Practice of Constraint Programming
null
null
null
cs.AI cs.PL
null
We study here constraint satisfaction problems that are based on predefined, explicitly given finite constraints. To solve them we propose a notion of rule consistency that can be expressed in terms of rules derived from the explicit representation of the initial constraints. This notion of local consistency is weaker than arc consistency for constraints of arbitrary arity but coincides with it when all domains are unary or binary. For Boolean constraints rule consistency coincides with the closure under the well-known propagation rules for Boolean constraints. By generalizing the format of the rules we obtain a characterization of arc consistency in terms of so-called inclusion rules. The advantage of rule consistency and this rule based characterization of the arc consistency is that the algorithms that enforce both notions can be automatically generated, as CHR rules. So these algorithms could be integrated into constraint logic programming systems such as Eclipse. We illustrate the usefulness of this approach to constraint propagation by discussing the implementations of both algorithms and their use on various examples, including Boolean constraints, three valued logic of Kleene, constraints dealing with Waltz's language for describing polyhedreal scenes, and Allen's qualitative approach to temporal logic.
[ { "version": "v1", "created": "Wed, 8 Sep 1999 14:18:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Monfroy", "Eric", "" ] ]
cs/9909011
Osnat Mokryn
Israel Cidon and Osnat Mokryn
Distributed Algorithms in Multihop Broadcast Networks
Apeared at the 12th International Symposium on DIStributed Computing, (DISC98)
null
null
Technical Report CC #241, Center for Communication and Information Technologies, Technion - Israel Institute of Technology
cs.DC cs.NI
null
Broadcast networks are often used in modern communication systems. A common broadcast network is a single hop shared media system, where a transmitted message is heard by all neighbors, such as some LAN networks. In this work we consider a more complex environment, in which a transmitted message is heard only by a group of neighbors, such as Ad-Hoc networks, satellite and radio networks, as well as wireless multistation backbone system for mobile communication. It is important to design efficient algorithms for such environments. Our main result is a new Leader Election algorithm, with O(n) time complexity and O(n*lg(n)) message transmission complexity. Our distributed solution uses a propagation of information with feedback (PIF) building block tuned to the broadcast media, and a special counting and joining approach for the election procedure phase. The latter is required for achieving the linear time. It is demonstrated that the broadcast model requires solutions which are different from the known point-to-point model.
[ { "version": "v1", "created": "Wed, 8 Sep 1999 14:49:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Cidon", "Israel", "" ], [ "Mokryn", "Osnat", "" ] ]
cs/9909012
Jan Willemson
Jan Willemson
Certificate Revocation Paradigms
Tech report on 14 pages, 2 figures
null
null
null
cs.CR
null
Research in the field of electronic signature confirmation has been active for some 20 years now. Unfortunately present certificate-based solutions also come from that age when no-one knew about online data transmission. The official standardized X.509 framework also depends heavily on offline operations, one of the most complicated ones being certificate revocation handling. This is done via huge Certificate Revocation Lists which are both inconvenient and expencive. Several improvements to these lists are proposed and in this report we try to analyze them briefly. We conclude that although it is possible to do better than in the original X.509 setting, none of the solutions presented this far is good enough.
[ { "version": "v1", "created": "Fri, 17 Sep 1999 08:00:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Willemson", "Jan", "" ] ]
cs/9909013
Jaap-Henk Hoepman
Jaap-Henk Hoepman
Self-stabilizing mutual exclusion on a ring, even if K=N
2 pages
null
null
null
cs.DC
null
We show that, contrary to common belief, Dijkstra's self-stabilizing mutual exclusion algorithm on a ring [Dij74,Dij82] also stabilizes when the number of states per node is one less than the number of nodes on the ring.
[ { "version": "v1", "created": "Tue, 21 Sep 1999 13:39:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoepman", "Jaap-Henk", "" ] ]
cs/9909014
Joseph Y. Halpern
Joseph Y. Halpern and Richard A. Shore
Reasoning About Common Knowledge with Infinitely Many Agents
Preliminary version appears in 14th IEEE Symposium on Logic in Computer Science, 1999. This is the full version
null
null
null
cs.LO cs.AI
null
Complete axiomatizations and exponential-time decision procedures are provided for reasoning about knowledge and common knowledge when there are infinitely many agents. The results show that reasoning about knowledge and common knowledge with infinitely many agents is no harder than when there are finitely many agents, provided that we can check the cardinality of certain set differences G - G', where G and G' are sets of agents. Since our complexity results are independent of the cardinality of the sets G involved, they represent improvements over the previous results even with the sets of agents involved are finite. Moreover, our results make clear the extent to which issues of complexity and completeness depend on how the sets of agents involved are represented.
[ { "version": "v1", "created": "Tue, 21 Sep 1999 20:43:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Shore", "Richard A.", "" ] ]
cs/9909015
Joseph Y. Halpern
Francis C. Chu and Joseph Y. Halpern
A decision-theoretic approach to reliable message delivery
This is the full version of a paper that appears in the Proceedings of the 12th International Symposium on Distributed Computing, 1998, pp. 89-10
null
null
null
cs.DC
null
We argue that the tools of decision theory need to be taken more seriously in the specification and analysis of systems. We illustrate this by considering a simple problem involving reliable communication, showing how considerations of utility and probability can be used to decide when it is worth sending heartbeat messages and, if they are sent, how often they should be sent.
[ { "version": "v1", "created": "Tue, 21 Sep 1999 20:51:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Chu", "Francis C.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/9909016
Joseph Y. Halpern
Francis C. Chu, Joseph Y. Halpern, and Praveen Seshadri
Least expected cost query optimization: an exercise in utility
This paper appears in Proceedings of the Eighteenth Annual ACM Symposium on Principles of Database Systems, 1999, pp. 138--147
null
null
null
cs.DB
null
We identify two unreasonable, though standard, assumptions made by database query optimizers that can adversely affect the quality of the chosen evaluation plans. One assumption is that it is enough to optimize for the expected case---that is, the case where various parameters (like available memory) take on their expected value. The other assumption is that the parameters are constant throughout the execution of the query. We present an algorithm based on the ``System R''-style query optimization algorithm that does not rely on these assumptions. The algorithm we present chooses the plan of the least expected cost instead of the plan of least cost given some fixed value of the parameters. In execution environments that exhibit a high degree of variability, our techniques should result in better performance.
[ { "version": "v1", "created": "Tue, 21 Sep 1999 21:20:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Chu", "Francis C.", "" ], [ "Halpern", "Joseph Y.", "" ], [ "Seshadri", "Praveen", "" ] ]
cs/9909017
Devillers
Olivier Devillers, Asish Mukhopadhyay
Finding an ordinary conic and an ordinary hyperplane
7 pages, 2 figures
null
null
INRIA Research report 3517
cs.CG
null
Given a finite set of non-collinear points in the plane, there exists a line that passes through exactly two points. Such a line is called an ordinary line. An efficient algorithm for computing such a line was proposed by Mukhopadhyay et al. In this note we extend this result in two directions. We first show how to use this algorithm to compute an ordinary conic, that is, a conic passing through exactly five points, assuming that all the points do not lie on the same conic. Both our proofs of existence and the consequent algorithms are simpler than previous ones. We next show how to compute an ordinary hyperplane in three and higher dimensions.
[ { "version": "v1", "created": "Mon, 27 Sep 1999 11:55:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ], [ "Mukhopadhyay", "Asish", "" ] ]
cs/9909018
Devillers
Olivier Devillers, Pierre-Maris Gandoin
Geometric compression for progressive transmission
16 pages, 10 figures
null
null
INRIA Research report 3766, in french
cs.CG cs.GR
null
The compression of geometric structures is a relatively new field of data compression. Since about 1995, several articles have dealt with the coding of meshes, using for most of them the following approach: the vertices of the mesh are coded in an order such that it contains partially the topology of the mesh. In the same time, some simple rules attempt to predict the position of the current vertex from the positions of its neighbours that have been previously coded. In this article, we describe a compression algorithm whose principle is completely different: the order of the vertices is used to compress their coordinates, and then the topology of the mesh is reconstructed from the vertices. This algorithm, particularly suited for terrain models, achieves compression factors that are slightly greater than those of the currently available algorithms, and moreover, it allows progressive and interactive transmission of the meshes.
[ { "version": "v1", "created": "Tue, 28 Sep 1999 06:56:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ], [ "Gandoin", "Pierre-Maris", "" ] ]
cs/9909019
Alessio R. Lomuscio
A. R. Lomuscio, R. van der Meyden, M. D. Ryan
Knowledge in Multi-Agent Systems: Initial Configurations and Broadcast
32 Pages, 2 Figures. Submitted to Transactions of Computational Logic
null
null
null
cs.LO cs.AI
null
The semantic framework for the modal logic of knowledge due to Halpern and Moses provides a way to ascribe knowledge to agents in distributed and multi-agent systems. In this paper we study two special cases of this framework: full systems and hypercubes. Both model static situations in which no agent has any information about another agent's state. Full systems and hypercubes are an appropriate model for the initial configurations of many systems of interest. We establish a correspondence between full systems and hypercube systems and certain classes of Kripke frames. We show that these classes of systems correspond to the same logic. Moreover, this logic is also the same as that generated by the larger class of weakly directed frames. We provide a sound and complete axiomatization, S5WDn, of this logic. Finally, we show that under certain natural assumptions, in a model where knowledge evolves over time, S5WDn characterizes the properties of knowledge not just at the initial configuration, but also at all later configurations. In particular, this holds for homogeneous broadcast systems, which capture settings in which agents are initially ignorant of each others local states, operate synchronously, have perfect recall and can communicate only by broadcasting.
[ { "version": "v1", "created": "Thu, 30 Sep 1999 17:03:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Lomuscio", "A. R.", "" ], [ "van der Meyden", "R.", "" ], [ "Ryan", "M. D.", "" ] ]
cs/9909020
Harald Hempel
Lane A. Hemaspaandra, Harald Hempel, and Gerd Wechsung
Query Order
18 pages, 1 figure (earlier version appears as UR-CS-TR-95-596)
SIAM Journal on Computing, 28, 637-651, 1999
null
null
cs.CC
null
We study the effect of query order on computational power, and show that $\pjk$-the languages computable via a polynomial-time machine given one query to the jth level of the boolean hierarchy followed by one query to the kth level of the boolean hierarchy-equals $\redttnp{j+2k-1}$ if j is even and k is odd, and equals $\redttnp{j+2k}$ otherwise. Thus, unless the polynomial hierarchy collapses, it holds that for each $1\leq j \leq k$: $\pjk = \pkj \iff (j=k) \lor (j{is even} \land k=j+1)$. We extend our analysis to apply to more general query classes.
[ { "version": "v1", "created": "Thu, 30 Sep 1999 17:06:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ], [ "Wechsung", "Gerd", "" ] ]
cs/9910001
Martin Grohe
Joerg Flum and Martin Grohe
Fixed-parameter tractability, definability, and model checking
To appear in SIAM Journal on Computing
null
null
null
cs.CC cs.LO
null
In this article, we study parameterized complexity theory from the perspective of logic, or more specifically, descriptive complexity theory. We propose to consider parameterized model-checking problems for various fragments of first-order logic as generic parameterized problems and show how this approach can be useful in studying both fixed-parameter tractability and intractability. For example, we establish the equivalence between the model-checking for existential first-order logic, the homomorphism problem for relational structures, and the substructure isomorphism problem. Our main tractability result shows that model-checking for first-order formulas is fixed-parameter tractable when restricted to a class of input structures with an excluded minor. On the intractability side, for every t >= 0 we prove an equivalence between model-checking for first-order formulas with t quantifier alternations and the parameterized halting problem for alternating Turing machines with t alternations. We discuss the close connection between this alternation hierarchy and Downey and Fellows' W-hierarchy. On a more abstract level, we consider two forms of definability, called Fagin definability and slicewise definability, that are appropriate for describing parameterized problems. We give a characterization of the class FPT of all fixed-parameter tractable problems in terms of slicewise definability in finite variable least fixed-point logic, which is reminiscent of the Immerman-Vardi Theorem characterizing the class PTIME in terms of definability in least fixed-point logic.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 15:10:00 GMT" }, { "version": "v2", "created": "Mon, 19 Feb 2001 21:01:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Flum", "Joerg", "" ], [ "Grohe", "Martin", "" ] ]
cs/9910002
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
What's Up with Downward Collapse: Using the Easy-Hard Technique to Link Boolean and Polynomial Hierarchy Collapses
37 pages. an extended abstract appeared in SIGACT News, 29, 10-22, 1998
null
null
UR-CS-TR-98-682
cs.CC
null
During the past decade, nine papers have obtained increasingly strong consequences from the assumption that boolean or bounded-query hierarchies collapse. The final four papers of this nine-paper progression actually achieve downward collapse---that is, they show that high-level collapses induce collapses at (what beforehand were thought to be) lower complexity levels. For example, for each $k\geq 2$ it is now known that if $\psigkone=\psigktwo$ then $\ph=\sigmak$. This article surveys the history, the results, and the technique---the so-called easy-hard method---of these nine papers.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 15:45:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910003
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
R_{1-tt}^{SN}(NP) Distinguishes Robust Many-One and Turing Completeness
22 pages
Theory of Computing Systems, 31, 307-325, 1998
null
earlier version appears as UR-CS-TR-96-635
cs.CC
null
Do complexity classes have many-one complete sets if and only if they have Turing-complete sets? We prove that there is a relativized world in which a relatively natural complexity class-namely a downward closure of NP, \rsnnp - has Turing-complete sets but has no many-one complete sets. In fact, we show that in the same relativized world this class has 2-truth-table complete sets but lacks 1-truth-table complete sets. As part of the groundwork for our result, we prove that \rsnnp has many equivalent forms having to do with ordered and parallel access to $\np$ and $\npinterconp$.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 18:55:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910004
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
An Introduction to Query Order
15 pages
Bulletin of the EATCS, 63, 93-107, 1997
null
earlier version appears as UR-CS-TR-97-665
cs.CC
null
Hemaspaandra, Hempel, and Wechsung [cs.CC/9909020] raised the following questions: If one is allowed one question to each of two different information sources, does the order in which one asks the questions affect the class of problems that one can solve with the given access? If so, which order yields the greater computational power? The answers to these questions have been learned-inasfar as they can be learned without resolving whether or not the polynomial hierarchy collapses-for both the polynomial hierarchy and the boolean hierarchy. In the polynomial hierarchy, query order never matters. In the boolean hierarchy, query order sometimes does not matter and, unless the polynomial hierarchy collapses, sometimes does matter. Furthermore, the study of query order has yielded dividends in seemingly unrelated areas, such as bottleneck computations and downward translation of equality. In this article, we present some of the central results on query order. The article is written in such a way as to encourage the reader to try his or her own hand at proving some of these results. We also give literature pointers to the quickly growing set of related results and applications.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 19:08:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910005
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
Query Order and the Polynomial Hierarchy
14 pages
Journal of Universal Computer Science, 4, 574-588, 1998
null
earlier version appears as UR-CS-TR-96-634
cs.CC
null
Hemaspaandra, Hempel, and Wechsung [cs.CC/9909020] initiated the field of query order, which studies the ways in which computational power is affected by the order in which information sources are accessed. The present paper studies, for the first time, query order as it applies to the levels of the polynomial hierarchy. We prove that the levels of the polynomial hierarchy are order-oblivious. Yet, we also show that these ordered query classes form new levels in the polynomial hierarchy unless the polynomial hierarchy collapses. We prove that all leaf language classes - and thus essentially all standard complexity classes - inherit all order-obliviousness results that hold for P.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 19:20:07 GMT" }, { "version": "v2", "created": "Mon, 4 Oct 1999 12:46:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910006
Harald Hempel
Lane A. Hemaspaandra, Harald Hempel, and Gerd Wechsung
Self-Specifying Machines
15 pages, to appear in IJFCS
null
null
earlier version appears as UR-CS-TR-97-654
cs.CC
null
We study the computational power of machines that specify their own acceptance types, and show that they accept exactly the languages that $\manyonesharp$-reduce to NP sets. A natural variant accepts exactly the languages that $\manyonesharp$-reduce to P sets. We show that these two classes coincide if and only if $\psone = \psnnoplusbigohone$, where the latter class denotes the sets acceptable via at most one question to $\sharpp$ followed by at most a constant number of questions to $\np$.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 19:29:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ], [ "Wechsung", "Gerd", "" ] ]
cs/9910007
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
A Downward Collapse within the Polynomial Hierarchy
14 pages
SIAM Journal on Computing, 28, 383-393, 1999
null
earlier version appears as UR-CS-TR-96-630
cs.CC
null
Downward collapse (a.k.a. upward separation) refers to cases where the equality of two larger classes implies the equality of two smaller classes. We provide an unqualified downward collapse result completely within the polynomial hierarchy. In particular, we prove that, for k > 2, if $\psigkone = \psigktwo$ then $\sigmak = \pik = \ph$. We extend this to obtain a more general downward collapse result.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 19:48:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910008
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
Translating Equality Downwards
13 pages, an extended abstract was presented at the 16th Symposium on Theoretical Aspects of Computer Science
null
null
earlier version appears as UR-CS-TR-97-657
cs.CC
null
Downward translation of equality refers to cases where a collapse of some pair of complexity classes would induce a collapse of some other pair of complexity classes that (a priori) one expects are smaller. Recently, the first downward translation of equality was obtained that applied to the polynomial hierarchy-in particular, to bounded access to its levels [cs.CC/9910007]. In this paper, we provide a much broader downward translation that extends not only that downward translation but also that translation's elegant enhancement by Buhrman and Fortnow. Our work also sheds light on previous research on the structure of refined polynomial hierarchies, and strengthens the connection between the collapse of bounded query hierarchies and the collapse of the polynomial hierarchy.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 19:58:41 GMT" }, { "version": "v2", "created": "Mon, 4 Oct 1999 13:04:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910009
Joseph O'Rourke
T. Biedl, E. Demaine, M. Demaine, S. Lazard, A. Lubiw, J. O'Rourke, M. Overmars, S. Robbins, I. Streinu, G. Toussaint, S. Whitesides
Locked and Unlocked Polygonal Chains in 3D
29 pages; This is a revised and expanded version of an abstract that appeared in Proc. 10th ACM-SIAM Sympos. Discrete Algorithms (SODA '98), Jan. 1998, pp. 866-867
null
null
Smith Tech. Rep. 060
cs.CG cs.DM
null
In this paper, we study movements of simple polygonal chains in 3D. We say that an open, simple polygonal chain can be straightened if it can be continuously reconfigured to a straight sequence of segments in such a manner that both the length of each link and the simplicity of the chain are maintained throughout the movement. The analogous concept for closed chains is convexification: reconfiguration to a planar convex polygon. Chains that cannot be straightened or convexified are called locked. While there are open chains in 3D that are locked, we show that if an open chain has a simple orthogonal projection onto some plane, it can be straightened. For closed chains, we show that there are unknotted but locked closed chains, and we provide an algorithm for convexifying a planar simple polygon in 3D. All our algorithms require only O(n) basic ``moves'' and run in linear time.
[ { "version": "v1", "created": "Fri, 8 Oct 1999 12:04:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Biedl", "T.", "" ], [ "Demaine", "E.", "" ], [ "Demaine", "M.", "" ], [ "Lazard", "S.", "" ], [ "Lubiw", "A.", "" ], [ "O'Rourke", "J.", "" ], [ "Overmars", "M.", "" ], [ "Robbins", "S.", "" ], [ "Streinu", "I.", "" ], [ "Toussaint", "G.", "" ], [ "Whitesides", "S.", "" ] ]
cs/9910010
Ronald de Wolf
Harry Buhrman (CWI, Amsterdam) and Ronald de Wolf (CWI and U of Amsterdam)
Communication Complexity Lower Bounds by Polynomials
16 pages LaTeX, no figures. 2nd version: rewritten and some results added
null
null
null
cs.CC quant-ph
null
The quantum version of communication complexity allows the two communicating parties to exchange qubits and/or to make use of prior entanglement (shared EPR-pairs). Some lower bound techniques are available for qubit communication complexity, but except for the inner product function, no bounds are known for the model with unlimited prior entanglement. We show that the log-rank lower bound extends to the strongest model (qubit communication + unlimited prior entanglement). By relating the rank of the communication matrix to properties of polynomials, we are able to derive some strong bounds for exact protocols. In particular, we prove both the "log-rank conjecture" and the polynomial equivalence of quantum and classical communication complexity for various classes of functions. We also derive some weaker bounds for bounded-error quantum protocols.
[ { "version": "v1", "created": "Tue, 12 Oct 1999 13:30:28 GMT" }, { "version": "v2", "created": "Fri, 28 Apr 2000 15:25:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Buhrman", "Harry", "", "CWI, Amsterdam" ], [ "de Wolf", "Ronald", "", "CWI and U of\n Amsterdam" ] ]
cs/9910011
Anand V. Raman
Anand Venkataraman
A statistical model for word discovery in child directed speech
48 pgs, 10 figs
null
null
null
cs.CL cs.LG
null
A statistical model for segmentation and word discovery in child directed speech is presented. An incremental unsupervised learning algorithm to infer word boundaries based on this model is described and results of empirical tests showing that the algorithm is competitive with other models that have been used for similar tasks are also presented.
[ { "version": "v1", "created": "Wed, 13 Oct 1999 03:25:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Venkataraman", "Anand", "" ] ]
cs/9910012
Mark Reynolds
M. Reynolds
The Complexity of Temporal Logic over the Reals
null
null
null
null
cs.LO cs.CC
null
It is shown that the decision problem for the temporal logic with until and since connectives over real-numbers time is PSPACE-complete.
[ { "version": "v1", "created": "Wed, 13 Oct 1999 04:04:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Reynolds", "M.", "" ] ]
cs/9910013
Michelangelo Grigni
Zhi-Zhong Chen, Michelangelo Grigni, Christos Papadimitriou
Map Graphs
46 pages, LaTeX with 41 PS figures; see http://www.mathcs.emory.edu/~mic/mapgraphs/ for hi-res figures
null
null
null
cs.DM cs.DS
null
We consider a modified notion of planarity, in which two nations of a map are considered adjacent when they share any point of their boundaries (not necessarily an edge, as planarity requires). Such adjacencies define a map graph. We give an NP characterization for such graphs, and a cubic time recognition algorithm for a restricted version: given a graph, decide whether it is realized by adjacencies in a map without holes, in which at most four nations meet at any point.
[ { "version": "v1", "created": "Wed, 13 Oct 1999 21:41:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Zhi-Zhong", "" ], [ "Grigni", "Michelangelo", "" ], [ "Papadimitriou", "Christos", "" ] ]
cs/9910014
Randal E. Bryant
Randal E. Bryant, Steven German, Miroslav N. Velev
Processor Verification Using Efficient Reductions of the Logic of Uninterpreted Functions to Propositional Logic
46 pages
null
null
null
cs.LO cs.AR
null
The logic of equality with uninterpreted functions (EUF) provides a means of abstracting the manipulation of data by a processor when verifying the correctness of its control logic. By reducing formulas in this logic to propositional formulas, we can apply Boolean methods such as Ordered Binary Decision Diagrams (BDDs) and Boolean satisfiability checkers to perform the verification. We can exploit characteristics of the formulas describing the verification conditions to greatly simplify the propositional formulas generated. In particular, we exploit the property that many equations appear only in positive form. We can therefore reduce the set of interpretations of the function symbols that must be considered to prove that a formula is universally valid to those that are ``maximally diverse.'' We present experimental results demonstrating the efficiency of this approach when verifying pipelined processors using the method proposed by Burch and Dill.
[ { "version": "v1", "created": "Thu, 14 Oct 1999 22:41:39 GMT" }, { "version": "v2", "created": "Thu, 6 Jul 2000 21:32:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Bryant", "Randal E.", "" ], [ "German", "Steven", "" ], [ "Velev", "Miroslav N.", "" ] ]
cs/9910015
Naren Ramakrishnan
Naren Ramakrishnan
PIPE: Personalizing Recommendations via Partial Evaluation
null
null
null
null
cs.IR cs.AI
null
It is shown that personalization of web content can be advantageously viewed as a form of partial evaluation --- a technique well known in the programming languages community. The basic idea is to model a recommendation space as a program, then partially evaluate this program with respect to user preferences (and features) to obtain specialized content. This technique supports both content-based and collaborative approaches, and is applicable to a range of applications that require automatic information integration from multiple web sources. The effectiveness of this methodology is illustrated by two example applications --- (i) personalizing content for visitors to the Blacksburg Electronic Village (http://www.bev.net), and (ii) locating and selecting scientific software on the Internet. The scalability of this technique is demonstrated by its ability to interface with online web ontologies that index thousands of web pages.
[ { "version": "v1", "created": "Mon, 18 Oct 1999 15:47:29 GMT" }, { "version": "v2", "created": "Tue, 19 Oct 1999 19:52:12 GMT" }, { "version": "v3", "created": "Wed, 26 Apr 2000 03:05:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramakrishnan", "Naren", "" ] ]
cs/9910016
Juergen Dix
Juergen Dix, Mirco Nanni, VS Subrahmanian
Probabilistic Agent Programs
44 pages, 1 figure, Appendix
null
null
null
cs.AI
null
Agents are small programs that autonomously take actions based on changes in their environment or ``state.'' Over the last few years, there have been an increasing number of efforts to build agents that can interact and/or collaborate with other agents. In one of these efforts, Eiter, Subrahmanian amd Pick (AIJ, 108(1-2), pages 179-255) have shown how agents may be built on top of legacy code. However, their framework assumes that agent states are completely determined, and there is no uncertainty in an agent's state. Thus, their framework allows an agent developer to specify how his agents will react when the agent is 100% sure about what is true/false in the world state. In this paper, we propose the concept of a \emph{probabilistic agent program} and show how, given an arbitrary program written in any imperative language, we may build a declarative ``probabilistic'' agent program on top of it which supports decision making in the presence of uncertainty. We provide two alternative semantics for probabilistic agent programs. We show that the second semantics, though more epistemically appealing, is more complex to compute. We provide sound and complete algorithms to compute the semantics of \emph{positive} agent programs.
[ { "version": "v1", "created": "Thu, 21 Oct 1999 09:35:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Dix", "Juergen", "" ], [ "Nanni", "Mirco", "" ], [ "Subrahmanian", "VS", "" ] ]
cs/9910017
Jeff Erickson
Jeff Erickson
Finite-resolution hidden surface removal
10 pages, many figures; To appear in Proceedings of the 11th Annual ACM-SIAM Symposium on Discrete Algorithms, 2000; See also http://www.uiuc.edu/~jeffe/pubs/gridvis.html
null
null
null
cs.CG cs.GR
null
We propose a hybrid image-space/object-space solution to the classical hidden surface removal problem: Given n disjoint triangles in Real^3 and p sample points (``pixels'') in the xy-plane, determine the first triangle directly behind each pixel. Our algorithm constructs the sampled visibility map of the triangles with respect to the pixels, which is the subset of the trapezoids in a trapezoidal decomposition of the analytic visibility map that contain at least one pixel. The sampled visibility map adapts to local changes in image complexity, and its complexity is bounded both by the number of pixels and by the complexity of the analytic visibility map. Our algorithm runs in time O(n^{1+e} + n^{2/3+e}t^{2/3} + p), where t is the output size and e is any positive constant. This is nearly optimal in the worst case and compares favorably with the best output-sensitive algorithms for both ray casting and analytic hidden surface removal. In the special case where the pixels form a regular grid, a sweepline variant of our algorithm runs in time O(n^{1+e} + n^{2/3+e}t^{2/3} + t log p), which is usually sublinear in the number of pixels.
[ { "version": "v1", "created": "Thu, 21 Oct 1999 21:51:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Erickson", "Jeff", "" ] ]
cs/9910018
Shie-Yuan Wang
S.Y. Wang
Decoupling Control from Data for TCP Congestion Control
Ph.D. Thesis, Harvard University, September 1999. This thesis's Chapter 3 about "TCP Trunking" will be published in IEEE ICNP'99 Proceedings. A condensed version of this thesis is currently submitted to a conference
null
null
null
cs.NI
null
Many applications want to use TCP congestion control to regulate the transmission rate of a data packet stream. A natural way to achieve this goal is to transport the data packet stream on a TCP connection. However, because TCP implements both congestion and error control, transporting a data packet stream directly using a TCP connection forces the data packet stream to be subject to TCP's other properties caused by TCP error control, which may be inappropriate for these applications. The TCP decoupling approach proposed in this thesis is a novel way of applying TCP congestion control to a data packet stream without actually transporting the data packet stream on a TCP connection. Instead, a TCP connection using the same network path as the data packet stream is set up separately and the transmission rate of the data packet stream is then associated with that of the TCP packets. Since the transmission rate of these TCP packets is under TCP congestion control, so is that of the data packet stream. Furthermore, since the data packet stream is not transported on a TCP connection, the regulated data packet stream is not subject to TCP error control. Because of this flexibility, the TCP decoupling approach opens up many new opportunities, solves old problems, and improves the performance of some existing applications. All of these advantages will be demonstrated in the thesis. This thesis presents the design, implementation, and analysis of the TCP decoupling approach, and its successful applications in TCP trunking, wireless communication, and multimedia streaming.
[ { "version": "v1", "created": "Thu, 21 Oct 1999 22:03:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "S. Y.", "" ] ]
cs/9910019
Roberto Baldoni
R.Baldoni, F. Quaglia, and M.Raynal
Consistent Checkpointing in Distributed Databases: Towards a Formal Approach
13 pages, 3 figures
null
null
Rapporto di Ricerca, Dipartimento di Informatica e Sistemistica, Universita' di Roma "La Sapienza"-(Italy) n. 27-97, July 1997
cs.DB cs.DC
null
Whether it is for audit or for recovery purposes, data checkpointing is an important problem of distributed database systems. Actually, transactions establish dependence relations on data checkpoints taken by data object managers. So, given an arbitrary set of data checkpoints (including at least a single data checkpoint from a data manager, and at most a data checkpoint from each data manager), an important question is the following one: ``Can these data checkpoints be members of a same consistent global checkpoint?''. This paper answers this question by providing a necessary and sufficient condition suited for database systems. Moreover, to show the usefulness of this condition, two {\em non-intrusive} data checkpointing protocols are derived from this condition. It is also interesting to note that this paper, by exhibiting ``correspondences'', establishes a bridge between the data object/transaction model and the process/message-passing model.
[ { "version": "v1", "created": "Fri, 22 Oct 1999 15:17:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Baldoni", "R.", "" ], [ "Quaglia", "F.", "" ], [ "Raynal", "M.", "" ] ]
cs/9910020
Atsushi Fujii
Atsushi Fujii, Kentaro Inui, Takenobu Tokunaga, and Hozumi Tanaka
Selective Sampling for Example-based Word Sense Disambiguation
25 pages, 14 Postscript figures
Computational Linguistics, Vol.24, No.4, pp.573-597, 1998
null
null
cs.CL
null
This paper proposes an efficient example sampling method for example-based word sense disambiguation systems. To construct a database of practical size, a considerable overhead for manual sense disambiguation (overhead for supervision) is required. In addition, the time complexity of searching a large-sized database poses a considerable problem (overhead for search). To counter these problems, our method selectively samples a smaller-sized effective subset from a given example set for use in word sense disambiguation. Our method is characterized by the reliance on the notion of training utility: the degree to which each example is informative for future example sampling when used for the training of the system. The system progressively collects examples by selecting those with greatest utility. The paper reports the effectiveness of our method through experiments on about one thousand sentences. Compared to experiments with other example sampling methods, our method reduced both the overhead for supervision and the overhead for search, without the degeneration of the performance of the system.
[ { "version": "v1", "created": "Sat, 23 Oct 1999 11:19:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Inui", "Kentaro", "" ], [ "Tokunaga", "Takenobu", "" ], [ "Tanaka", "Hozumi", "" ] ]
cs/9910021
Prasan Roy
Prasan Roy, S. Seshadri, S. Sudarshan, Siddhesh Bhobe
Efficient and Extensible Algorithms for Multi Query Optimization
null
null
null
null
cs.DB
null
Complex queries are becoming commonplace, with the growing use of decision support systems. These complex queries often have a lot of common sub-expressions, either within a single query, or across multiple such queries run as a batch. Multi-query optimization aims at exploiting common sub-expressions to reduce evaluation cost. Multi-query optimization has hither-to been viewed as impractical, since earlier algorithms were exhaustive, and explore a doubly exponential search space. In this paper we demonstrate that multi-query optimization using heuristics is practical, and provides significant benefits. We propose three cost-based heuristic algorithms: Volcano-SH and Volcano-RU, which are based on simple modifications to the Volcano search strategy, and a greedy heuristic. Our greedy heuristic incorporates novel optimizations that improve efficiency greatly. Our algorithms are designed to be easily added to existing optimizers. We present a performance study comparing the algorithms, using workloads consisting of queries from the TPC-D benchmark. The study shows that our algorithms provide significant benefits over traditional optimization, at a very acceptable overhead in optimization time.
[ { "version": "v1", "created": "Mon, 25 Oct 1999 16:30:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Roy", "Prasan", "" ], [ "Seshadri", "S.", "" ], [ "Sudarshan", "S.", "" ], [ "Bhobe", "Siddhesh", "" ] ]
cs/9910022
Mark-Jan Nederhof
Mark-Jan Nederhof
Practical experiments with regular approximation of context-free languages
28 pages. To appear in Computational Linguistics 26(1), March 2000
null
null
null
cs.CL
null
Several methods are discussed that construct a finite automaton given a context-free grammar, including both methods that lead to subsets and those that lead to supersets of the original context-free language. Some of these methods of regular approximation are new, and some others are presented here in a more refined form with respect to existing literature. Practical experiments with the different methods of regular approximation are performed for spoken-language input: hypotheses from a speech recognizer are filtered through a finite automaton.
[ { "version": "v1", "created": "Mon, 25 Oct 1999 15:00:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Nederhof", "Mark-Jan", "" ] ]
cs/9910023
Alessio Guglielmi
Alessio Guglielmi
A System of Interaction and Structure
This is the authoritative version of the article, with readable pictures, in colour, also available at <http://cs.bath.ac.uk/ag/p/SystIntStr.pdf>. (The published version contains errors introduced by the editorial processing.) Web site for Deep Inference and the Calculus of Structures at <http://alessio.guglielmi.name/res/cos>
ACM Transactions on Computational Logic, Vol. 8 (1:1), 2007, pp. 1-64
10.1145/1182613.1182614
null
cs.LO
null
This paper introduces a logical system, called BV, which extends multiplicative linear logic by a non-commutative self-dual logical operator. This extension is particularly challenging for the sequent calculus, and so far it is not achieved therein. It becomes very natural in a new formalism, called the calculus of structures, which is the main contribution of this work. Structures are formulae submitted to certain equational laws typical of sequents. The calculus of structures is obtained by generalising the sequent calculus in such a way that a new top-down symmetry of derivations is observed, and it employs inference rules that rewrite inside structures at any depth. These properties, in addition to allow the design of BV, yield a modular proof of cut elimination.
[ { "version": "v1", "created": "Thu, 28 Oct 1999 09:17:34 GMT" }, { "version": "v2", "created": "Fri, 27 Sep 2002 13:51:53 GMT" }, { "version": "v3", "created": "Thu, 2 Sep 2004 08:40:28 GMT" }, { "version": "v4", "created": "Sat, 27 Jan 2007 13:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Guglielmi", "Alessio", "" ] ]
cs/9910024
Steven M. Robbins
Therese Biedl, Erik Demaine, Martin Demaine, Sylvain Lazard, Anna Lubiw, Joseph O'Rourke, Steve Robbins, Ileana Streinu, Godfried Toussaint, Sue Whitesides
On Reconfiguring Tree Linkages: Trees can Lock
16 pages, 6 figures Introduction reworked and references added, as the main open problem was recently closed
null
null
SOCS-00.7
cs.CG cs.DM
null
It has recently been shown that any simple (i.e. nonintersecting) polygonal chain in the plane can be reconfigured to lie on a straight line, and any simple polygon can be reconfigured to be convex. This result cannot be extended to tree linkages: we show that there are trees with two simple configurations that are not connected by a motion that preserves simplicity throughout the motion. Indeed, we prove that an $N$-link tree can have $2^{\Omega(N)}$ equivalence classes of configurations.
[ { "version": "v1", "created": "Mon, 1 Nov 1999 17:50:19 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2000 02:26:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Biedl", "Therese", "" ], [ "Demaine", "Erik", "" ], [ "Demaine", "Martin", "" ], [ "Lazard", "Sylvain", "" ], [ "Lubiw", "Anna", "" ], [ "O'Rourke", "Joseph", "" ], [ "Robbins", "Steve", "" ], [ "Streinu", "Ileana", "" ], [ "Toussaint", "Godfried", "" ], [ "Whitesides", "Sue", "" ] ]
cs/9911001
Jan Heering
Jan Heering, Paul Klint
Semantics of Programming Languages: A Tool-Oriented Approach
12 pages, 2 figures. Submitted to ACM SIGPLAN Notices
ACM SIGPLAN Notices V. 35(3) March 2000 pp. 39-48
null
SEN-R9920 (CWI, Amsterdam)
cs.PL
null
By paying more attention to semantics-based tool generation, programming language semantics can significantly increase its impact. Ultimately, this may lead to ``Language Design Assistants'' incorporating substantial amounts of semantic knowledge.
[ { "version": "v1", "created": "Thu, 4 Nov 1999 11:14:45 GMT" }, { "version": "v2", "created": "Fri, 26 Nov 1999 12:54:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Heering", "Jan", "" ], [ "Klint", "Paul", "" ] ]
cs/9911002
Rigo Michel
Michel Rigo
Numeration systems on a regular language: Arithmetic operations, Recognizability and Formal power series
34 pages; corrected typos, two sections concerning exponential case and relation with positional systems added
Theoret. Comput. Sci. 269 (2001) 469--498
null
null
cs.CC
null
Generalizations of numeration systems in which N is recognizable by a finite automaton are obtained by describing a lexicographically ordered infinite regular language L over a finite alphabet A. For these systems, we obtain a characterization of recognizable sets of integers in terms of rational formal series. We also show that, if the complexity of L is Theta (n^q) (resp. if L is the complement of a polynomial language), then multiplication by an integer k preserves recognizability only if k=t^{q+1} (resp. if k is not a power of the cardinality of A) for some integer t. Finally, we obtain sufficient conditions for the notions of recognizability and U-recognizability to be equivalent, where U is some positional numeration system related to a sequence of integers.
[ { "version": "v1", "created": "Mon, 8 Nov 1999 13:03:50 GMT" }, { "version": "v2", "created": "Thu, 20 Jan 2000 13:40:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Rigo", "Michel", "" ] ]
cs/9911003
David Eppstein
David Eppstein
Subgraph Isomorphism in Planar Graphs and Related Problems
27 pages, 6 figures. A preliminary version of this paper appeared at the 6th ACM-SIAM Symp. Discrete Algorithms, 1995
J. Graph Algorithms & Applications 3(3):1-27, 1999
null
null
cs.DS
null
We solve the subgraph isomorphism problem in planar graphs in linear time, for any pattern of constant size. Our results are based on a technique of partitioning the planar graph into pieces of small tree-width, and applying dynamic programming within each piece. The same methods can be used to solve other planar graph problems including connectivity, diameter, girth, induced subgraph isomorphism, and shortest paths.
[ { "version": "v1", "created": "Tue, 9 Nov 1999 18:58:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
cs/9911004
Wolfgang Slany
Wolfgang Slany
Graph Ramsey games
47 pages; To actually play small but nontrivial game instances, go to http://www.dbai.tuwien.ac.at/proj/ramsey/
null
null
DBAI-TR-99-34
cs.CC cs.DM math.CO
null
We consider combinatorial avoidance and achievement games based on graph Ramsey theory: The players take turns in coloring still uncolored edges of a graph G, each player being assigned a distinct color, choosing one edge per move. In avoidance games, completing a monochromatic subgraph isomorphic to another graph A leads to immediate defeat or is forbidden and the first player that cannot move loses. In the avoidance+ variants, both players are free to choose more than one edge per move. In achievement games, the first player that completes a monochromatic subgraph isomorphic to A wins. Erdos & Selfridge (1973) were the first to identify some tractable subcases of these games, followed by a large number of further studies. We complete these investigations by settling the complexity of all unrestricted cases: We prove that general graph Ramsey avoidance, avoidance+, and achievement games and several variants thereof are PSPACE-complete. We ultra-strongly solve some nontrivial instances of graph Ramsey avoidance games that are based on symmetric binary Ramsey numbers and provide strong evidence that all other cases based on symmetric binary Ramsey numbers are effectively intractable. Keywords: combinatorial games, graph Ramsey theory, Ramsey game, PSPACE-completeness, complexity, edge coloring, winning strategy, achievement game, avoidance game, the game of Sim, Polya's enumeration formula, probabilistic counting, machine learning, heuristics, Java applet
[ { "version": "v1", "created": "Wed, 10 Nov 1999 11:28:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Slany", "Wolfgang", "" ] ]
cs/9911005
Jim Gray
Jim Gray
What Next? A Dozen Information-Technology Research Goals
MS word original: http://research.microsoft.com/~gray/papers/MS_TR_99_50_TuringTalk.doc
null
null
MS TR 99-50
cs.GL
null
Charles Babbage's vision of computing has largely been realized. We are on the verge of realizing Vannevar Bush's Memex. But, we are some distance from passing the Turing Test. These three visions and their associated problems have provided long-range research goals for many of us. For example, the scalability problem has motivated me for several decades. This talk defines a set of fundamental research problems that broaden the Babbage, Bush, and Turing visions. They extend Babbage's computational goal to include highly-secure, highly-available, self-programming, self-managing, and self-replicating systems. They extend Bush's Memex vision to include a system that automatically organizes, indexes, digests, evaluates, and summarizes information (as well as a human might). Another group of problems extends Turing's vision of intelligent machines to include prosthetic vision, speech, hearing, and other senses. Each problem is simply stated and each is orthogonal from the others, though they share some common core technologies
[ { "version": "v1", "created": "Thu, 11 Nov 1999 23:05:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
cs/9911006
Masaki Murata
M. Murata, M. Utiyama, H. Isahara (CRL)
Question Answering System Using Syntactic Information
6 pages, 0 figures. Computation and Language
null
null
null
cs.CL
null
Question answering task is now being done in TREC8 using English documents. We examined question answering task in Japanese sentences. Our method selects the answer by matching the question sentence with knowledge-based data written in natural language. We use syntactic information to obtain highly accurate answers.
[ { "version": "v1", "created": "Mon, 15 Nov 1999 05:48:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "M.", "", "CRL" ], [ "Utiyama", "M.", "", "CRL" ], [ "Isahara", "H.", "", "CRL" ] ]
cs/9911007
Joerg Rothe
A. Beygelzimer, L. A. Hemaspaandra, C. M. Homan and J. Rothe
One-Way Functions in Worst-Case Cryptography: Algebraic and Security Properties
17 pages
null
null
University of Rochester Technical Report UR-CS TR 722
cs.CC cs.CR
null
We survey recent developments in the study of (worst-case) one-way functions having strong algebraic and security properties. According to [RS93], this line of research was initiated in 1984 by Rivest and Sherman who designed two-party secret-key agreement protocols that use strongly noninvertible, total, associative one-way functions as their key building blocks. If commutativity is added as an ingredient, these protocols can be used by more than two parties, as noted by Rabi and Sherman [RS93] who also developed digital signature protocols that are based on such enhanced one-way functions. Until recently, it was an open question whether one-way functions having the algebraic and security properties that these protocols require could be created from any given one-way function. Recently, Hemaspaandra and Rothe [HR99] resolved this open issue in the affirmative, by showing that one-way functions exist if and only if strong, total, commutative, associative one-way functions exist. We discuss this result, and the work of Rabi, Rivest, and Sherman, and recent work of Homan [Hom99] that makes progress on related issues.
[ { "version": "v1", "created": "Mon, 15 Nov 1999 13:20:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Beygelzimer", "A.", "" ], [ "Hemaspaandra", "L. A.", "" ], [ "Homan", "C. M.", "" ], [ "Rothe", "J.", "" ] ]
cs/9911008
John Watrous
John Watrous (University of Calgary)
On quantum and classical space-bounded processes with algebraic transition amplitudes
18 pages. Appears in FOCS '99
null
null
null
cs.CC quant-ph
null
We define a class of stochastic processes based on evolutions and measurements of quantum systems, and consider the complexity of predicting their long-term behavior. It is shown that a very general class of decision problems regarding these stochastic processes can be efficiently solved classically in the space-bounded case. The following corollaries are implied by our main result: (1) Any space O(s) uniform family of quantum circuits acting on s qubits and consisting of unitary gates and measurement gates defined in a typical way by matrices of algebraic numbers can be simulated by an unbounded error space O(s) ordinary (i.e., fair-coin flipping) probabilistic Turing machine, and hence by space O(s) uniform classical (deterministic) circuits of depth O(s^2) and size 2^(O(s)). The quantum circuits are not required to operate with bounded error and may have depth exponential in s. (2) Any (unbounded error) quantum Turing machine running in space s, having arbitrary algebraic transition amplitudes, allowing unrestricted measurements during its computation, and having no restrictions on running time can be simulated by an unbounded error space O(s) ordinary probabilistic Turing machine, and hence deterministically in space O(s^2).
[ { "version": "v1", "created": "Tue, 16 Nov 1999 21:55:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Watrous", "John", "", "University of Calgary" ] ]
cs/9911009
John Watrous
Andris Ambainis (1), John Watrous (2) ((1) UC Berkeley, (2) University of Calgary)
Two-way finite automata with quantum and classical states
11 pages
null
null
null
cs.CC quant-ph
null
We introduce 2-way finite automata with quantum and classical states (2qcfa's). This is a variant on the 2-way quantum finite automata (2qfa) model which may be simpler to implement than unrestricted 2qfa's; the internal state of a 2qcfa may include a quantum part that may be in a (mixed) quantum state, but the tape head position is required to be classical. We show two languages for which 2qcfa's are better than classical 2-way automata. First, 2qcfa's can recognize palindromes, a language that cannot be recognized by 2-way deterministic or probabilistic finite automata. Second, in polynomial time 2qcfa's can recognize {a^n b^n | n>=0}, a language that can be recognized classically by a 2-way probabilistic automaton but only in exponential time.
[ { "version": "v1", "created": "Tue, 16 Nov 1999 22:24:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Ambainis", "Andris", "" ], [ "Watrous", "John", "" ] ]
cs/9911010
Michael J. O'Donnell
Michael J. O'Donnell
The Sources of Certainty in Computation and Formal Systems
33 pages, 8 figures, presented at the conference, Computer Science as a Human Science, the 1999-2000 Sawyer Seminar at the University of Chicago
null
null
null
cs.OH
null
In his Discourse on the Method of Rightly Conducting the Reason, and Seeking Truth in the Sciences, Rene Descartes sought ``clear and certain knowledge of all that is useful in life.'' Almost three centuries later, in ``The foundations of mathematics,'' David Hilbert tried to ``recast mathematical definitions and inferences in such a way that they are unshakable.'' Hilbert's program relied explicitly on formal systems (equivalently, computational systems) to provide certainty in mathematics. The concepts of computation and formal system were not defined in his time, but Descartes' method may be understood as seeking certainty in essentially the same way. In this article, I explain formal systems as concrete artifacts, and investigate the way in which they provide a high level of certainty---arguably the highest level achievable by rational discourse. The rich understanding of formal systems achieved by mathematical logic and computer science in this century illuminates the nature of programs, such as Descartes' and Hilbert's, that seek certainty through rigorous analysis.
[ { "version": "v1", "created": "Wed, 17 Nov 1999 17:18:42 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Donnell", "Michael J.", "" ] ]
cs/9911011
Markus Walther
Markus Walther (University of Marburg)
One-Level Prosodic Morphology
64 pages, A4 size, LaTeX2e, 16 PostScript figures
null
null
null
cs.CL
null
Recent developments in theoretical linguistics have lead to a widespread acceptance of constraint-based analyses of prosodic morphology phenomena such as truncation, infixation, floating morphemes and reduplication. Of these, reduplication is particularly challenging for state-of-the-art computational morphology, since it involves copying of some part of a phonological string. In this paper I argue for certain extensions to the one-level model of phonology and morphology (Bird & Ellison 1994) to cover the computational aspects of prosodic morphology using finite-state methods. In a nutshell, enriched lexical representations provide additional automaton arcs to repeat or skip sounds and also to allow insertion of additional material. A kind of resource consciousness is introduced to control this additional freedom, distinguishing between producer and consumer arcs. The non-finite-state copying aspect of reduplication is mapped to automata intersection, itself a non-finite-state operation. Bounded local optimization prunes certain automaton arcs that fail to contribute to linguistic optimisation criteria. The paper then presents implemented case studies of Ulwa construct state infixation, German hypocoristic truncation and Tagalog over-applying reduplication that illustrate the expressive power of this approach, before its merits and limitations are discussed and possible extensions are sketched. I conclude that the one-level approach to prosodic morphology presents an attractive way of extending finite-state techniques to difficult phenomena that hitherto resisted elegant computational analyses.
[ { "version": "v1", "created": "Fri, 19 Nov 1999 16:10:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Walther", "Markus", "", "University of Marburg" ] ]
cs/9911012
Joseph Y. Halpern
Joseph Y. Halpern
Cox's Theorem Revisited
Changed running head from original submission
Journal of AI Research, vol. 11, 1999, pp. 429-435
null
null
cs.AI
null
The assumptions needed to prove Cox's Theorem are discussed and examined. Various sets of assumptions under which a Cox-style theorem can be proved are provided, although all are rather strong and, arguably, not natural.
[ { "version": "v1", "created": "Sat, 27 Nov 1999 17:57:17 GMT" }, { "version": "v2", "created": "Wed, 1 Dec 1999 22:29:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
cs/9911013
Joseph O'Rourke
Joseph O'Rourke and The Smith Problem Solving Group
PushPush is NP-hard in 3D
10 pages, 7 figures
null
null
Smith Tech. Rep. 064, Nov. 1999
cs.CG cs.DM
null
We prove that a particular pushing-blocks puzzle is intractable in 3D. The puzzle, inspired by the game PushPush, consists of unit square blocks on an integer lattice. An agent may push blocks (but never pull them) in attempting to move between given start and goal positions. In the PushPush version, the agent can only push one block at a time, and moreover, each block, when pushed, slides the maximal extent of its free range. We prove this version is NP-hard in 3D by reduction from SAT. The corresponding problem in 2D remains open.
[ { "version": "v1", "created": "Sun, 28 Nov 1999 15:43:50 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ], [ "Group", "The Smith Problem Solving", "" ] ]
cs/9911014
Edith Hemaspaandra
Edith Hemaspaandra
The Complexity of Poor Man's Logic
Corrected version of the journal version. The changes are in Section 6, where Theorem 6.3(2) was added to handle two missing cases
Journal of Logic and Computation, 11(4), 609--622, 2001. Extended abstract in STACS 2000
null
null
cs.LO cs.CC
null
Motivated by description logics, we investigate what happens to the complexity of modal satisfiability problems if we only allow formulas built from literals, $\wedge$, $\Diamond$, and $\Box$. Previously, the only known result was that the complexity of the satisfiability problem for K dropped from PSPACE-complete to coNP-complete (Schmidt-Schauss and Smolka, 1991 and Donini et al., 1992). In this paper we show that not all modal logics behave like K. In particular, we show that the complexity of the satisfiability problem with respect to frames in which each world has at least one successor drops from PSPACE-complete to P, but that in contrast the satisfiability problem with respect to the class of frames in which each world has at most two successors remains PSPACE-complete. As a corollary of the latter result, we also solve the open problem from Donini et al.'s complexity classification of description logics (Donini et al., 1997). In the last section, we classify the complexity of the satisfiability problem for K for all other restrictions on the set of operators.
[ { "version": "v1", "created": "Sun, 28 Nov 1999 21:34:01 GMT" }, { "version": "v2", "created": "Sat, 24 Dec 2005 23:32:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ] ]
cs/9912001
Gabriel Istrate
Gabriel Istrate
The phase transition in random Horn satisfiability and its algorithmic implications
26 pages. Journal version of papers in AIM'98, SODA'99. Submitted to Random Structures and Algorithms
null
null
null
cs.DS cs.CC
null
Let c>0 be a constant, and $\Phi$ be a random Horn formula with n variables and $m=c\cdot 2^{n}$ clauses, chosen uniformly at random (with repetition) from the set of all nonempty Horn clauses in the given variables. By analyzing \PUR, a natural implementation of positive unit resolution, we show that $\lim_{n\goesto \infty} \PR ({$\Phi$ is satisfiable})= 1-F(e^{-c})$, where $F(x)=(1-x)(1-x^2)(1-x^4)(1-x^8)... $. Our method also yields as a byproduct an average-case analysis of this algorithm.
[ { "version": "v1", "created": "Wed, 1 Dec 1999 22:04:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
cs/9912002
Myung Ho Kim
Myung Ho Kim
A Geometric Model for Information Retrieval Systems
13 pages
null
null
null
cs.IR cs.CC cs.DL
null
This decade has seen a great deal of progress in the development of information retrieval systems. Unfortunately, we still lack a systematic understanding of the behavior of the systems and their relationship with documents. In this paper we present a completely new approach towards the understanding of the information retrieval systems. Recently, it has been observed that retrieval systems in TREC 6 show some remarkable patterns in retrieving relevant documents. Based on the TREC 6 observations, we introduce a geometric linear model of information retrieval systems. We then apply the model to predict the number of relevant documents by the retrieval systems. The model is also scalable to a much larger data set. Although the model is developed based on the TREC 6 routing test data, I believe it can be readily applicable to other information retrieval systems. In Appendix, we explained a simple and efficient way of making a better system from the existing systems.
[ { "version": "v1", "created": "Mon, 6 Dec 1999 03:04:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Myung Ho", "" ] ]
cs/9912003
Masaki Murata
M. Murata, H. Isahara (CRL), M. Nagao (Kyoto University)
Resolution of Indirect Anaphora in Japanese Sentences Using Examples 'X no Y (Y of X)'
8 pages, 0 figures. Computation and Language
ACL'99 Workshop on 'Coreference and Its Applications', Maryland, USA, June 22, 1999
null
null
cs.CL
null
A noun phrase can indirectly refer to an entity that has already been mentioned. For example, ``I went into an old house last night. The roof was leaking badly and ...'' indicates that ``the roof'' is associated with `` an old house}'', which was mentioned in the previous sentence. This kind of reference (indirect anaphora) has not been studied well in natural language processing, but is important for coherence resolution, language understanding, and machine translation. In order to analyze indirect anaphora, we need a case frame dictionary for nouns that contains knowledge of the relationships between two nouns but no such dictionary presently exists. Therefore, we are forced to use examples of ``X no Y'' (Y of X) and a verb case frame dictionary instead. We tried estimating indirect anaphora using this information and obtained a recall rate of 63% and a precision rate of 68% on test sentences. This indicates that the information of ``X no Y'' is useful to a certain extent when we cannot make use of a noun case frame dictionary. We estimated the results that would be given by a noun case frame dictionary, and obtained recall and precision rates of 71% and 82% respectively. Finally, we proposed a way to construct a noun case frame dictionary by using examples of ``X no Y.''
[ { "version": "v1", "created": "Mon, 13 Dec 1999 04:42:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "M.", "", "CRL" ], [ "Isahara", "H.", "", "CRL" ], [ "Nagao", "M.", "", "Kyoto University" ] ]
cs/9912004
Masaki Murata
M. Murata, H. Isahara (CRL), M. Nagao (Kyoto University)
Pronoun Resolution in Japanese Sentences Using Surface Expressions and Examples
8 pages, 0 figures. Computation and Language
ACL'99 Workshop on 'Coreference and Its Applications', Maryland, USA, June 22, 1999
null
null
cs.CL
null
In this paper, we present a method of estimating referents of demonstrative pronouns, personal pronouns, and zero pronouns in Japanese sentences using examples, surface expressions, topics and foci. Unlike conventional work which was semantic markers for semantic constraints, we used examples for semantic constraints and showed in our experiments that examples are as useful as semantic markers. We also propose many new methods for estimating referents of pronouns. For example, we use the form ``X of Y'' for estimating referents of demonstrative adjectives. In addition to our new methods, we used many conventional methods. As a result, experiments using these methods obtained a precision rate of 87% in estimating referents of demonstrative pronouns, personal pronouns, and zero pronouns for training sentences, and obtained a precision rate of 78% for test sentences.
[ { "version": "v1", "created": "Mon, 13 Dec 1999 04:46:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "M.", "", "CRL" ], [ "Isahara", "H.", "", "CRL" ], [ "Nagao", "M.", "", "Kyoto University" ] ]
cs/9912005
Masaki Murata
M. Murata (CRL), M. Nagao (Kyoto University)
An Estimate of Referent of Noun Phrases in Japanese Sentences
5 pages, 0 figures. Computation and Language
Coling-ACL '98, Montrial, Canada, August 10, 1998 p912-916
null
null
cs.CL
null
In machine translation and man-machine dialogue, it is important to clarify referents of noun phrases. We present a method for determining the referents of noun phrases in Japanese sentences by using the referential properties, modifiers, and possessors of noun phrases. Since the Japanese language has no articles, it is difficult to decide whether a noun phrase has an antecedent or not. We had previously estimated the referential properties of noun phrases that correspond to articles by using clue words in the sentences. By using these referential properties, our system determined the referents of noun phrases in Japanese sentences. Furthermore we used the modifiers and possessors of noun phrases in determining the referents of noun phrases. As a result, on training sentences we obtained a precision rate of 82% and a recall rate of 85% in the determination of the referents of noun phrases that have antecedents. On test sentences, we obtained a precision rate of 79% and a recall rate of 77%.
[ { "version": "v1", "created": "Mon, 13 Dec 1999 05:20:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "M.", "", "CRL" ], [ "Nagao", "M.", "", "Kyoto University" ] ]
cs/9912007
Masaki Murata
M. Murata, Q. Ma, K. Uchimoto, H. Isahara (CRL)
An Example-Based Approach to Japanese-to-English Translation of Tense, Aspect, and Modality
11 pages, 0 figures. Computation and Language
TMI'99, Chester, UK, August 23, 1999
null
null
cs.CL
null
We have developed a new method for Japanese-to-English translation of tense, aspect, and modality that uses an example-based method. In this method the similarity between input and example sentences is defined as the degree of semantic matching between the expressions at the ends of the sentences. Our method also uses the k-nearest neighbor method in order to exclude the effects of noise; for example, wrongly tagged data in the bilingual corpora. Experiments show that our method can translate tenses, aspects, and modalities more accurately than the top-level MT software currently available on the market can. Moreover, it does not require hand-craft rules.
[ { "version": "v1", "created": "Mon, 13 Dec 1999 06:01:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "M.", "", "CRL" ], [ "Ma", "Q.", "", "CRL" ], [ "Uchimoto", "K.", "", "CRL" ], [ "Isahara", "H.", "", "CRL" ] ]
cs/9912008
Marcus Hutter
Marcus Hutter
New Error Bounds for Solomonoff Prediction
13 pages, Journal of Computer and System Science, minor changes to 1st version
J. Computer and System Science 62:4 (2001) 653-667
null
IDSIA-11-00
cs.AI cs.LG
null
Solomonoff sequence prediction is a scheme to predict digits of binary strings without knowing the underlying probability distribution. We call a prediction scheme informed when it knows the true probability distribution of the sequence. Several new relations between universal Solomonoff sequence prediction and informed prediction and general probabilistic prediction schemes will be proved. Among others, they show that the number of errors in Solomonoff prediction is finite for computable distributions, if finite in the informed case. Deterministic variants will also be studied. The most interesting result is that the deterministic variant of Solomonoff prediction is optimal compared to any other probabilistic or deterministic prediction scheme apart from additive square root corrections only. This makes it well suited even for difficult prediction problems, where it does not suffice when the number of errors is minimal to within some factor greater than one. Solomonoff's original bound and the ones presented here complement each other in a useful way.
[ { "version": "v1", "created": "Mon, 13 Dec 1999 08:33:43 GMT" }, { "version": "v2", "created": "Fri, 26 Jan 2001 18:45:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
cs/9912010
Jim Gray
Bill Devlin, Jim Gray, Bill Laing, George Spix
Scalability Terminology: Farms, Clones, Partitions, Packs, RACS and RAPS
MSword version of file at http://research.microsoft.com/~gray/papers/MS_TR_99_85_Scalability_Terminolog y.doc
null
null
MS TR 99 85
cs.AR cs.DC
null
Defines a vocabulary for scaleable systems: Geoplexes, Farms, Clones, RACS, RAPS, clones, partitions, and packs and dicusses the design tradeoffs of using clones, partitons, and packs.
[ { "version": "v1", "created": "Sat, 18 Dec 1999 02:19:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Devlin", "Bill", "" ], [ "Gray", "Jim", "" ], [ "Laing", "Bill", "" ], [ "Spix", "George", "" ] ]
cs/9912011
Kagan Tumer
David H. Wolpert, Sergey Kirshner, Chris J. Merz and Kagan Tumer
Adaptivity in Agent-Based Routing for Data Networks
null
null
null
NASA-ARC-IC-99-122
cs.MA adap-org cs.NI nlin.AO
null
Adaptivity, both of the individual agents and of the interaction structure among the agents, seems indispensable for scaling up multi-agent systems (MAS's) in noisy environments. One important consideration in designing adaptive agents is choosing their action spaces to be as amenable as possible to machine learning techniques, especially to reinforcement learning (RL) techniques. One important way to have the interaction structure connecting agents itself be adaptive is to have the intentions and/or actions of the agents be in the input spaces of the other agents, much as in Stackelberg games. We consider both kinds of adaptivity in the design of a MAS to control network packet routing. We demonstrate on the OPNET event-driven network simulator the perhaps surprising fact that simply changing the action space of the agents to be better suited to RL can result in very large improvements in their potential performance: at their best settings, our learning-amenable router agents achieve throughputs up to three and one half times better than that of the standard Bellman-Ford routing algorithm, even when the Bellman-Ford protocol traffic is maintained. We then demonstrate that much of that potential improvement can be realized by having the agents learn their settings when the agent interaction structure is itself adaptive.
[ { "version": "v1", "created": "Mon, 20 Dec 1999 19:25:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolpert", "David H.", "" ], [ "Kirshner", "Sergey", "" ], [ "Merz", "Chris J.", "" ], [ "Tumer", "Kagan", "" ] ]
cs/9912012
Kagan Tumer
Kagan Tumer and David H. Wolpert
Avoiding Braess' Paradox through Collective Intelligence
28 pages
null
null
NASA-ARC-IC-99-124
cs.DC adap-org cs.MA cs.NI nlin.AO
null
In an Ideal Shortest Path Algorithm (ISPA), at each moment each router in a network sends all of its traffic down the path that will incur the lowest cost to that traffic. In the limit of an infinitesimally small amount of traffic for a particular router, its routing that traffic via an ISPA is optimal, as far as cost incurred by that traffic is concerned. We demonstrate though that in many cases, due to the side-effects of one router's actions on another routers performance, having routers use ISPA's is suboptimal as far as global aggregate cost is concerned, even when only used to route infinitesimally small amounts of traffic. As a particular example of this we present an instance of Braess' paradox for ISPA's, in which adding new links to a network decreases overall throughput. We also demonstrate that load-balancing, in which the routing decisions are made to optimize the global cost incurred by all traffic currently being routed, is suboptimal as far as global cost averaged across time is concerned. This is also due to "side-effects", in this case of current routing decision on future traffic. The theory of COllective INtelligence (COIN) is concerned precisely with the issue of avoiding such deleterious side-effects. We present key concepts from that theory and use them to derive an idealized algorithm whose performance is better than that of the ISPA, even in the infinitesimal limit. We present experiments verifying this, and also showing that a machine-learning-based version of this COIN algorithm in which costs are only imprecisely estimated (a version potentially applicable in the real world) also outperforms the ISPA, despite having access to less information than does the ISPA. In particular, this COIN algorithm avoids Braess' paradox.
[ { "version": "v1", "created": "Mon, 20 Dec 1999 21:21:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Tumer", "Kagan", "" ], [ "Wolpert", "David H.", "" ] ]
cs/9912015
Angela Bonifati
Angela Bonifati, Stefano Ceri
Comparative Analysis of Five XML Query Languages
TeX v3.1415, 17 pages, 6 figures, to be published in ACM Sigmod Record, March 2000
null
null
Dipartimento di Elettronica e Informazione, Politecnico di Milano (Italy) Technical Report nr.99-76
cs.DB
null
XML is becoming the most relevant new standard for data representation and exchange on the WWW. Novel languages for extracting and restructuring the XML content have been proposed, some in the tradition of database query languages (i.e. SQL, OQL), others more closely inspired by XML. No standard for XML query language has yet been decided, but the discussion is ongoing within the World Wide Web Consortium and within many academic institutions and Internet-related major companies. We present a comparison of five, representative query languages for XML, highlighting their common features and differences.
[ { "version": "v1", "created": "Wed, 22 Dec 1999 15:25:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Bonifati", "Angela", "" ], [ "Ceri", "Stefano", "" ] ]
cs/9912016
Jin-Dong Kim
Jin-Dong Kim and Sang-Zoo Lee and Hae-Chang Rim
HMM Specialization with Selective Lexicalization
7 pages, 6 figures
Proceedings of the 1999 Joint SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora, pp.121-127, 1999
null
null
cs.CL cs.LG
null
We present a technique which complements Hidden Markov Models by incorporating some lexicalized states representing syntactically uncommon words. Our approach examines the distribution of transitions, selects the uncommon words, and makes lexicalized states for the words. We performed a part-of-speech tagging experiment on the Brown corpus to evaluate the resultant language model and discovered that this technique improved the tagging accuracy by 0.21% at the 95% level of confidence.
[ { "version": "v1", "created": "Thu, 23 Dec 1999 01:07:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Jin-Dong", "" ], [ "Lee", "Sang-Zoo", "" ], [ "Rim", "Hae-Chang", "" ] ]
cs/9912017
Schwitter
Michael Hess
Mixed-Level Knowledge Representation and Variable-Depth Inference in Natural Language Processing
29 pages
International Journal on Artificial Intelligence Tools (IJAIT), vol 6, no 4, 1997. 481-509
null
null
cs.CL
null
A system is described that uses a mixed-level knowledge representation based on standard Horn Clause Logic to represent (part of) the meaning of natural language documents. A variable-depth search strategy is outlined that distinguishes between the different levels of abstraction in the knowledge representation to locate specific passages in the documents. A detailed description of the linguistic aspects of the system is given. Mixed-level representations as well as variable-depth search strategies are applicable in fields outside that of NLP.
[ { "version": "v1", "created": "Thu, 23 Dec 1999 15:48:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Hess", "Michael", "" ] ]
cs/9912019
Dominic Mayers
Dominic Mayers
Quantum Bit Commitment Expansion
The paper was retracted
null
null
null
cs.CR
null
The paper was retracted.
[ { "version": "v1", "created": "Mon, 27 Dec 1999 20:57:45 GMT" }, { "version": "v2", "created": "Mon, 10 Jan 2000 01:16:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Mayers", "Dominic", "" ] ]
dg-ga/9710001
null
R. Bott and A. S. Cattaneo
Integral Invariants of 3-Manifolds
39 pages, AMS-LaTeX, to appear in J. Diff. Geom
J. Diff. Geom., 48 (1998) 91-133
null
null
dg-ga hep-th math.DG math.QA q-alg
null
This note describes an invariant of rational homology 3-spheres in terms of configuration space integrals which in some sense lies between the invariants of Axelrod and Singer and those of Kontsevich.
[ { "version": "v1", "created": "Thu, 2 Oct 1997 06:17:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Bott", "R.", "" ], [ "Cattaneo", "A. S.", "" ] ]
dg-ga/9710002
Bryan Clair
Bryan Clair
Residual Amenability and the Approximation of L^2-invariants
13 pages, Latex2e
null
null
null
dg-ga math.DG
null
We generalize Luck's Theorem to show that the L^2-Betti numbers of a residually amenable covering space are the limit of the L^2-Betti numbers of a sequence of amenable covering spaces. We show that any residually amenable covering space of a finite simplicial complex is of determinant class, and that the L^2 torsion is a homotopy invariant for such spaces. We give examples of residually amenable groups, including the Baumslag-Solitar groups.
[ { "version": "v1", "created": "Fri, 3 Oct 1997 21:09:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Clair", "Bryan", "" ] ]
dg-ga/9710003
Gennadi Sardanashvily
G.Sardanashvily
Non-Symplectic Geometry of First Order Time-Dependent Mechanics
24 pages, LaTeX
null
null
null
dg-ga math.DG
null
The usual formulation of time-dependent mechanics implies a given splitting $Y=R\times M$ of an event space $Y$. This splitting, however, is broken by any time-dependent transformation, including transformations between inertial frames. The goal is the frame-covariant formulation of time-dependent mechanics on a bundle $Y\to R$ whose fibration $Y\to M$ is not fixed. Its phase space is the vertical cotangent bundle $V^*Y$ provided with the canonical 3-form and the corresponding canonical Poisson structure. An event space of relativistic mechanics is a manifold $Y$ whose fibration $Y\to R$ is not fixed.
[ { "version": "v1", "created": "Sat, 4 Oct 1997 07:46:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Sardanashvily", "G.", "" ] ]
dg-ga/9710005
Guofang Wang
W. Ding, J. Jost, J. Li, G. Wang
The differential equation $\Delta u = 8\pi - 8\pi h\exp {u}$ on a compact Riemann surface
26 pages, Latex, to appear in Asian J. Math. 1(1997) No. 2
Asian J. Math. 1(1997) 230-248
null
MPI in Leipzig, Preprint Nr.: 24
dg-ga math.DG
null
Let $M$ be a compact Riemann surface, $h(x)$ a positive smooth function on $M$. In this paper, we consider the functional $$J(u)={1/2}\int \sb{M}|\bigtriangledown u|\sp 2 + 8\pi \int\sb{M}u -8\pi \log\int\sb{M}h\exp {u}$$. We give a sufficient condition under which $J$ achieves its minimum.
[ { "version": "v1", "created": "Tue, 7 Oct 1997 10:11:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "W.", "" ], [ "Jost", "J.", "" ], [ "Li", "J.", "" ], [ "Wang", "G.", "" ] ]
dg-ga/9710006
Guofang Wang
W. Ding, J. Jost, J. Li, G. Wang
An analysis of the two-vortex case in the Chern-Simons Higgs model
13 pages, Latex
null
null
null
dg-ga hep-th math.DG
null
Extending work of Caffarelli-Yang and Tarantello, we present a variational existence proof for two-vortex solutions of the periodic Chern-Simons Higgs model and analyze the asymptotic behavior of these solutions as the parameter coupling the gauge field with the scalar field tends to 0.
[ { "version": "v1", "created": "Tue, 7 Oct 1997 10:06:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "W.", "" ], [ "Jost", "J.", "" ], [ "Li", "J.", "" ], [ "Wang", "G.", "" ] ]
dg-ga/9710008
John Lott
John Lott
Deficiencies of Lattice Subgroups of Lie Groups
5 pages, AMS-Latex
null
null
null
dg-ga math.DG
null
Let L be a lattice in a connected Lie group. We show that besides a few exceptional cases, the deficiency of L is nonpositive.
[ { "version": "v1", "created": "Thu, 9 Oct 1997 23:18:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Lott", "John", "" ] ]
dg-ga/9710009
Ursula Hamenstaedt
Ursula Hamenstaedt
Cocycles, symplectic structures and intersection
33 pages, Tex
null
null
null
dg-ga math.DG
null
We investigate the cross ratio for closed negatively curved manifolds. As one of several applications, we obtain that for two such homotopy equivalent manifolds M and N, the following is true : If M and N have the same marked length spectrum and if the Anosov splitting for M is C^1 then M and N have the same volume.
[ { "version": "v1", "created": "Thu, 9 Oct 1997 23:20:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Hamenstaedt", "Ursula", "" ] ]
dg-ga/9710010
Gagik Ter-Gazarian
G.T.Ter-Kazarian
Mathematical Background of Formalism of Operator Manifold
LaTex, 25 pages, no figures, revised version (minor grammatical changes)
null
null
BAO/97/07
dg-ga math.DG
null
The analysis of mathematical structure of the method of operator manifold guides our discussion. The latter is a still wider generalization of the method of secondary quantization with appropriate expansion over the geometric objects. The nature of operator manifold provides its elements with both quantum field and geometry aspects, a detailed study of which is a subject of present paper. It yields a quantization of geometry differing in principle from all earlier suggested schemes.
[ { "version": "v1", "created": "Fri, 10 Oct 1997 14:18:33 GMT" }, { "version": "v2", "created": "Thu, 16 Oct 1997 06:14:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Ter-Kazarian", "G. T.", "" ] ]
dg-ga/9710011
Jean-Luc A. Brylinski
Jean-Luc Brylinski
The beta function of a knot
plain TeX; the new version discusses the relation with the M\"obius energy for knots
null
null
null
dg-ga math.DG
null
We introduce the beta function of a knot in euclidean three-space. This is a meromorphic function of a complex variable which we prove admits a Bernstein type functional equation. We determine the first residues.
[ { "version": "v1", "created": "Fri, 10 Oct 1997 21:37:04 GMT" }, { "version": "v2", "created": "Tue, 3 Feb 1998 18:56:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Brylinski", "Jean-Luc", "" ] ]
dg-ga/9710012
Paul Feehan
Paul M. N. Feehan, Thomas G. Leness
Uhlenbeck compactness and transversality for the moduli space of PU(2) monopoles
LaTeX 2e, 15 pages
null
null
null
dg-ga alg-geom hep-th math.AG math.DG
null
This research announcement gives a brief report of the main results in our paper "PU(2) monopoles, I: Regularity, Uhlenbeck compactness, and transversality" (Journal of Differential Geometry, to appear). We describe the existence of perturbations for the PU(2) monopole equations, yielding both useful transversality properties and an Uhlenbeck compactification for this perturbed moduli space.
[ { "version": "v1", "created": "Sun, 12 Oct 1997 21:33:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Feehan", "Paul M. N.", "" ], [ "Leness", "Thomas G.", "" ] ]
dg-ga/9710013
null
Janusz Grabowski and Pawel Urbanski
Tangent and cotangent lifts and graded Lie algebras associated with Lie algebroids
LamsTex 1991, 28 pages, to appear in Annals of global analysis and geometry
Ann. Global Anal. Geom. 15 (1997), 447-486.
null
null
dg-ga math.DG
null
Generalized Schouten, Froelicher-Nijenhuis and Froelicher-Richardson brackets are defined for an arbitrary Lie algebroid. Tangent and cotangent lifts of Lie algebroids are introduced and discussed and the behaviour of the related graded Lie brackets under these lifts is studied. In the case of the canonical Lie algebroid on the tangent bundle, a new common generalization of the Froelicher-Nijenhuis and the symmetric Schouten brackets, as well as embeddings of the Nijenhuis-Richardson and the Froelicher-Nijenhuis bracket into the Schouten bracket, are obtained.
[ { "version": "v1", "created": "Tue, 14 Oct 1997 12:39:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Grabowski", "Janusz", "" ], [ "Urbanski", "Pawel", "" ] ]
dg-ga/9710014
null
Katarzyna Konieczna and Pawel Urbanski
Double vector bundles and duality
29 pages, LamsTex 1991
null
null
null
dg-ga math.DG
null
The most important examples of a double vector bundle are provided by iterated tangent and cotangent functors: TTM, TT^*M, T^*TM, and T^*T^*M. We introduce the notions of the dual double vector bundle and the dual double vector bundle morphism. Theorems on canonical isomorphisms are formulated and proved. Several examples are given.
[ { "version": "v1", "created": "Thu, 16 Oct 1997 12:07:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Konieczna", "Katarzyna", "" ], [ "Urbanski", "Pawel", "" ] ]
dg-ga/9710016
Jonathan Marcus Woolf
Jonathan Woolf
Intersection Cohomology of Symplectic Quotients
Withdrawn - lemma 4.1 is false. Fairly major reworking required!
null
null
null
dg-ga math.DG
null
Paper withdrawn - lemma 4.1 was false. Quite a lot of changes need to be made!
[ { "version": "v1", "created": "Fri, 17 Oct 1997 10:28:17 GMT" }, { "version": "v2", "created": "Mon, 20 Oct 1997 12:01:10 GMT" }, { "version": "v3", "created": "Thu, 23 Oct 1997 09:58:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Woolf", "Jonathan", "" ] ]
dg-ga/9710017
Dusa McDuff
Fran\c{c}ois Lalonde, Dusa McDuff, and Leonid Polterovich
Topological rigidity of Hamiltonian loops and quantum homology
Latex, 14 pages
null
null
null
dg-ga math.DG
null
This paper studies the question of when a loop $\phi$ in the group Symp$(M,\omega)$ of symplectomorphisms of a symplectic manifold $(M,\omega)$ is isotopic to a loop that is generated by a time-dependent Hamiltonian function. (Loops with this property are said to be Hamiltonian.) Our main result is that Hamiltonian loops are rigid in the following sense: if $\phi$ is Hamiltonian with respect to $\omega$, and if $\phi'$ is a small perturbation of $\phi$ that preserves another symplectic form $\omega'$, then $\phi'$ is Hamiltonian with respect to $\omega'$. This allows us to get some new information on the structure of the flux group, i.e. the image of $\pi_1(Symp(M,\omega))$ under the flux homomorphism. We give a complete proof of our result for some manifolds, and sketch the proof in general. The argument uses methods developed by Seidel for studying properties of Hamiltonian loops via the quantum homology of $M$.
[ { "version": "v1", "created": "Fri, 17 Oct 1997 18:46:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Lalonde", "François", "" ], [ "McDuff", "Dusa", "" ], [ "Polterovich", "Leonid", "" ] ]
dg-ga/9710018
null
S. Bouarroudj and V. Ovsienko (CMI, Universit\'e de Provence, Marseille and C.N.R.S., Centre de Physique Th\'eorique, Marseille)
Three Cocycles on $\Diff(S^1)$ Generalizing the Schwarzian Derivative
18 pages, LaTex. to appear in IMRN
null
null
CPT-97/P3548
dg-ga math.DG
null
The first group of differentiable cohomology of $\Diff(S^1)$, vanishing on the M\"obius subgroup $PSL(2,R)\subset\Diff(S^1)$, with coefficients in modules of linear differential operators on $S^1$ is calculated. We introduce three non-trivial $PSL(2,R)$-invariant 1-cocycles on $\Diff(S^1)$ generalizing the Schwarzian derivative.
[ { "version": "v1", "created": "Sat, 18 Oct 1997 08:37:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Bouarroudj", "S.", "", "CMI, Université de Provence,\n Marseille and C.N.R.S., Centre de Physique Théorique, Marseille" ], [ "Ovsienko", "V.", "", "CMI, Université de Provence,\n Marseille and C.N.R.S., Centre de Physique Théorique, Marseille" ] ]
dg-ga/9710019
Li Weiping
Weiping Li (OSU)
Cap-prodcut structures on the Fintushel-Stern spectral sequence
14 pages, no figure, AmsLaTex
null
null
null
dg-ga math.DG
null
We show that there is a well-defined cap-product structure on the Fintushel-Stern spectral sequence. Hence we obtain the induced cap-product structure on the ${\BZ}_8$-graded instanton Floer homology. The cap-product structure provides an essentially new property of the instanton Floer homology, from a topological point of view, which multiplies a finite dimensional cohomology class by an infinite dimensional homology class (Floer cycles) to get another infinite dimensional homology class.
[ { "version": "v1", "created": "Mon, 20 Oct 1997 13:40:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Weiping", "", "OSU" ] ]
dg-ga/9710020
Iskander Taimanov
Iskander A. Taimanov
The Weierstrass representation of closed surfaces in $R^3$
15 pages, LaTeX; Preprint no. 291, SFB 288, TU-Berlin
Functional Anal. Appl. 32:4 (1998), 49--62.
null
null
dg-ga math.DG
null
In the present paper which a sequel to dg-ga/9511005 and dg-ga//9610013 a global Weierstrass representation of an arbitrary closed oriented surface of genus $\geq 1$ in the the three-space is constructed. The Weierstrass spectrum of a torus immersed into $R^3$ is introduced and finite-zone planes as well as finite-zone solutions to the modified Novikov-Veselov equations are constructed.
[ { "version": "v1", "created": "Mon, 20 Oct 1997 15:52:19 GMT" }, { "version": "v2", "created": "Wed, 22 Oct 1997 08:38:05 GMT" }, { "version": "v3", "created": "Sat, 6 Dec 1997 13:48:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Taimanov", "Iskander A.", "" ] ]
dg-ga/9710021
Wlodzimierz Piechocki
Kazimierz Bragiel and Wlodzimierz Piechocki
Topology of the set of smooth solutions to the Liouville equation
LaTeX2e, 21 pages, no figures, submitted for publication
null
null
null
dg-ga math.DG
null
We prove that the space of smooth initial data and the set of smooth solutions of the Liouville equation are homeomorphic.
[ { "version": "v1", "created": "Tue, 21 Oct 1997 12:55:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bragiel", "Kazimierz", "" ], [ "Piechocki", "Wlodzimierz", "" ] ]
dg-ga/9710022
Naichung Conan Leung
Naichung Conan Leung, Sangkug Yi
Analytic Torsion for Quaternionic manifolds and related topics
17 pages, LaTex
null
null
null
dg-ga math.DG
null
In this paper we show that the Ray-Singer complex analytic torsion is trivial for even dimensional Calabi-Yau manifolds. Then we define the quaternionic analytic torsion for quaternionic manifolds and prove that they are metric independent. In dimension four, the quaternionic analytic torsion equals to the self-dual analytic torsion. For higher dimensional manifolds, the self-dual analytic torsion is a conformal invariant.
[ { "version": "v1", "created": "Tue, 21 Oct 1997 20:58:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Leung", "Naichung Conan", "" ], [ "Yi", "Sangkug", "" ] ]
dg-ga/9710023
Guofang Wang
W. Ding, J. Jost, J. Li and G. Wang
Existence results for mean field equations
Filling a gap in the argument and adding 2 referrences
null
null
null
dg-ga math.DG
null
Let $\Omega$ be an annulus. We prove that the mean field equation $-\Delta\psi=\frac{e\sp{-\beta\psi}}{\int\sb{\Omega}e\sp{-\beta\psi}} $ admits a solution with zero boundary for $\beta\in (-16\pi,-8\pi)$. This is a supercritical case for the Moser-Trudinger inequality.
[ { "version": "v1", "created": "Wed, 22 Oct 1997 07:53:47 GMT" }, { "version": "v2", "created": "Mon, 27 Oct 1997 09:35:39 GMT" }, { "version": "v3", "created": "Sun, 30 Nov 1997 16:29:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "W.", "" ], [ "Jost", "J.", "" ], [ "Li", "J.", "" ], [ "Wang", "G.", "" ] ]
dg-ga/9710024
Mark J. Gotay
Mark J. Gotay and Hendrik B. Grundling
Nonexistence of Finite-dimensional Quantizations of a Noncompact Symplectic Manifold
Plain TeX, 5 pps
"Differential Geometry and Applications," I. Kolar et al., Eds., 593-596 (Masaryk University, Brno, 1999).
null
null
dg-ga math.DG quant-ph
null
We prove that there is no faithful finite-dimensional representation by skew-hermitian matrices of a ``basic algebra of observables'' B on a noncompact symplectic manifold M. Consequently there exists no finite-dimensional quantization of any Lie subalgebra of the Poisson algebra C^\infty(M) containing B.
[ { "version": "v1", "created": "Wed, 22 Oct 1997 08:44:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gotay", "Mark J.", "" ], [ "Grundling", "Hendrik B.", "" ] ]
dg-ga/9710025
Wlodzimierz Piechocki
Wlodzimierz Piechocki
Topology of solutions of the Liouville equation
LaTeX2e, 4 pages, no figures
null
null
null
dg-ga math.DG
null
Suggestions concerning the generalization of the geometric quantization to the case of nonlinear field theories are given. Results for the Liouville field theory are presented.
[ { "version": "v1", "created": "Wed, 22 Oct 1997 12:53:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Piechocki", "Wlodzimierz", "" ] ]
dg-ga/9710026
Alejandro Rivero
Alejandro Rivero (Universidad de Zaragoza, Spain)
Introduction to the Tangent Grupoid
8 pages, latex
null
null
null
dg-ga math.DG
null
We present some plausible definitions for the tangent grupoid of a manifold M, as well as some of the known applications of the structure. This is a kind of introductory note.
[ { "version": "v1", "created": "Thu, 23 Oct 1997 11:53:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Rivero", "Alejandro", "", "Universidad de Zaragoza, Spain" ] ]
dg-ga/9710027
Daniel Cartin
Daniel Cartin
Generalized Symplectic Manifolds
LaTeX, 26 pages
null
null
null
dg-ga math.DG
null
This paper uses a generalization of symplectic geometry, known as $n$-symplectic geometry and developed by Norris, to find observables on three-dimensional manifolds. It will be seen that for the cases considered, the $n$-symplectic observables are derivable from the symplectic observables of $C^2$. The quantization of these observables, as well as those on the frame bundle of $R^n$, is also examined.
[ { "version": "v1", "created": "Fri, 24 Oct 1997 15:50:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Cartin", "Daniel", "" ] ]
dg-ga/9710028
Eugene Ferapontov
E.V. Ferapontov
Surfaces in Lie sphere geometry and the stationary Davey-Stewartson hierarchy
Latex, 31 pages
null
null
null
dg-ga math.DG
null
We introduce two basic invariant forms which define generic surface in 3-space uniquely up to Lie sphere equivalence. Two particularly interesting classes of surfaces associated with these invariants are considered, namely, the Lie-minimal surfaces and the diagonally-cyclidic surfaces. For diagonally-cyclidic surfaces we derive the stationary modified Veselov-Novikov equation, whose role in the theory of these surfaces is similar to that of Calapso's equation in the theory of isothermic surfaces. Since Calapso's equation itself turns out to be related to the stationary Davey-Stewartson equation, these results shed some new light on differential geometry of the stationary Davey-Stewartson hierarchy. Diagonally-cyclidic surfaces are the natural Lie sphere analogs of the isothermally-asymptotic surfaces in projective differential geometry for which we also derive the stationary modified Veselov-Novikov equation with the different real reduction. Parallels between invariants of surfaces in Lie sphere geometry and reciprocal invariants of hydrodynamic type systems are drawn in the conclusion.
[ { "version": "v1", "created": "Mon, 27 Oct 1997 13:11:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Ferapontov", "E. V.", "" ] ]
dg-ga/9710029
Vicente Munoz Velazquez
Vicente Mu\~noz
Ring structure of the Floer Cohomology of $\Sigma \times S^1$
13 pages, Latex2e
null
null
null
dg-ga math.DG
null
We give a presentation for the Floer cohomology ring $HF^*(\Sigma \times S^1)$, where $\Sigma$ is a Riemann surface of genus bigger than one, which coincides with the conjectural presentation for the quantum cohomology ring of the moduli space of flat SO(3)-connections of odd degree over $\Sigma$. We study the spectrum of the action of the homology of $\Sigma$ on the Floer cohomology and prove a physical assumption made by Vafa et al.
[ { "version": "v1", "created": "Mon, 27 Oct 1997 14:06:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Muñoz", "Vicente", "" ] ]
dg-ga/9710030
Ping Xu
Kirill Mackenzie and Ping Xu
Classical lifting processes and multiplicative vector fields
Latex, 27 pages, Quarterly J. Math. (Oxford), to appear
null
null
null
dg-ga math.DG
null
We extend the calculus of multiplicative vector fields and differential forms and their intrinsic derivatives from Lie groups to Lie groupoids; this generalization turns out to include also the classical process of complete lifting from arbitrary manifolds to tangent and cotangent bundles. Using this calculus we give a new description of the Lie bialgebroid structure associated with a Poisson groupoid.
[ { "version": "v1", "created": "Tue, 28 Oct 1997 21:22:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Mackenzie", "Kirill", "" ], [ "Xu", "Ping", "" ] ]
dg-ga/9710031
Jan Segert
Jan Segert
Frobenius Manifolds from Yang-Mills Instantons
16 pages, AMSTeX 2.1 with amssppt
null
null
null
dg-ga math.DG
null
We present an elementary self-contained account of semisimple Frobenius manifolds in three dimensions, and exhibit a new family of explicit examples. These examples are constructed from Yang-Mills instantons with a certain symmetry.
[ { "version": "v1", "created": "Wed, 29 Oct 1997 19:51:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Segert", "Jan", "" ] ]