id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0111063 | Wen Chen | W. Chen | New RBF collocation methods and kernel RBF with applications | Welcom any comments to [email protected] | null | null | null | cs.NA cs.CE | null | A few novel radial basis function (RBF) discretization schemes for partial
differential equations are developed in this study. For boundary-type methods,
we derive the indirect and direct symmetric boundary knot methods. Based on the
multiple reciprocity principle, the boundary particle method is introduced for
general inhomogeneous problems without using inner nodes. For domain-type
schemes, by using the Green integral we develop a novel Hermite RBF scheme
called the modified Kansa method, which significantly reduces calculation
errors at close-to-boundary nodes. To avoid Gibbs phenomenon, we present the
least square RBF collocation scheme. Finally, five types of the kernel RBF are
also briefly presented.
| [
{
"version": "v1",
"created": "Fri, 30 Nov 2001 16:03:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0111064 | Anand Venkataraman | Anand Venkataraman | A procedure for unsupervised lexicon learning | Expanded version of this paper appears in Computational Linguistics
27(3) | Proceedings of the eighteenth international conference on machine
learning, ICML-01, pp.569--576, 2001 | null | null | cs.CL | null | We describe an incremental unsupervised procedure to learn words from
transcribed continuous speech. The algorithm is based on a conservative and
traditional statistical model, and results of empirical tests show that it is
competitive with other algorithms that have been proposed recently for this
task.
| [
{
"version": "v1",
"created": "Fri, 30 Nov 2001 20:30:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venkataraman",
"Anand",
""
]
] |
cs/0111065 | Anand Venkataraman | Anand Venkataraman | A Statistical Model for Word Discovery in Transcribed Speech | Expanded version of ICML-01 paper (pp.569--576) | Computational Linguistics, 27(3), pp.352--372, 2001 | null | null | cs.CL | null | A statistical model for segmentation and word discovery in continuous speech
is presented. An incremental unsupervised learning algorithm to infer word
boundaries based on this model is described. Results of empirical tests showing
that the algorithm is competitive with other models that have been used for
similar tasks are also presented.
| [
{
"version": "v1",
"created": "Fri, 30 Nov 2001 20:40:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venkataraman",
"Anand",
""
]
] |
cs/0112002 | Iain Stewart | Iain A. Stewart | Program schemes with binary write-once arrays and the complexity classes
they capture | null | null | null | null | cs.LO cs.CC | null | We study a class of program schemes, NPSB, in which, aside from basic
assignments, non-deterministic guessing and while loops, we have access to
arrays; but where these arrays are binary write-once in that they are
initialized to `zero' and can only ever be set to `one'. We show, amongst other
results, that: NPSB can be realized as a vectorized Lindstrom logic; there are
problems accepted by program schemes of NPSB that are not definable in the
bounded-variable infinitary logic ${\cal L}^\omega_{\infty\omega}$; all
problems accepted by the program schemes of NPSB have a zero-one law; and on
ordered structures, NPSB captures the complexity class $[ L]^[{\scriptsize
NP\normalsize}]$. The class of program schemes NPSB is actually the union of an
infinite hierarchy of classes of program schemes. When we amend the semantics
of our program schemes slightly, we find that the classes of the resulting
hierarchy capture the complexity classes $\Sigma^p_i$ (where $i\geq 1$) of the
Polynomial Hierarchy PH. Finally, we give logical equivalences of the
complexity-theoretic question `Does NP equal PSPACE?' where the logics (and
classes of program schemes) involved define only problems with zero-one laws
(and so do not define some computationally trivial problems).
| [
{
"version": "v1",
"created": "Mon, 3 Dec 2001 15:15:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stewart",
"Iain A.",
""
]
] |
cs/0112003 | Masaki Murata | Masaki Murata, Kiyotaka Uchimoto, Qing Ma, and Hitoshi Isahara | Using a Support-Vector Machine for Japanese-to-English Translation of
Tense, Aspect, and Modality | 8 pages. Computation and Language | ACL Workshop, the Data-Driven Machine Translation, 2001 | null | null | cs.CL | null | This paper describes experiments carried out using a variety of
machine-learning methods, including the k-nearest neighborhood method that was
used in a previous study, for the translation of tense, aspect, and modality.
It was found that the support-vector machine method was the most precise of all
the methods tested.
| [
{
"version": "v1",
"created": "Wed, 5 Dec 2001 05:35:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murata",
"Masaki",
""
],
[
"Uchimoto",
"Kiyotaka",
""
],
[
"Ma",
"Qing",
""
],
[
"Isahara",
"Hitoshi",
""
]
] |
cs/0112004 | Masaki Murata | Masaki Murata, Qing Ma, and Hitoshi Isahara | Part of Speech Tagging in Thai Language Using Support Vector Machine | 8 pages. Computation and Language | NLPRS'2001 Workshop, the Second Workshop on Natural Language
Processing and Neural Networks (NLPNN2001) | null | null | cs.CL | null | The elastic-input neuro tagger and hybrid tagger, combined with a neural
network and Brill's error-driven learning, have already been proposed for the
purpose of constructing a practical tagger using as little training data as
possible. When a small Thai corpus is used for training, these taggers have
tagging accuracies of 94.4% and 95.5% (accounting only for the ambiguous words
in terms of the part of speech), respectively. In this study, in order to
construct more accurate taggers we developed new tagging methods using three
machine learning methods: the decision-list, maximum entropy, and support
vector machine methods. We then performed tagging experiments by using these
methods. Our results showed that the support vector machine method has the best
precision (96.1%), and that it is capable of improving the accuracy of tagging
in the Thai language. Finally, we theoretically examined all these methods and
discussed how the improvements were achived.
| [
{
"version": "v1",
"created": "Wed, 5 Dec 2001 05:48:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murata",
"Masaki",
""
],
[
"Ma",
"Qing",
""
],
[
"Isahara",
"Hitoshi",
""
]
] |
cs/0112005 | Masaki Murata | Masaki Murata and Hitoshi Isahara | Universal Model for Paraphrasing -- Using Transformation Based on a
Defined Criteria -- | 8 pages. Computation and Language | NLPRS'2001, Workshop on Automatic Paraphrasing: Theories and
Applications | null | null | cs.CL | null | This paper describes a universal model for paraphrasing that transforms
according to defined criteria. We showed that by using different criteria we
could construct different kinds of paraphrasing systems including one for
answering questions, one for compressing sentences, one for polishing up, and
one for transforming written language to spoken language.
| [
{
"version": "v1",
"created": "Wed, 5 Dec 2001 05:56:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murata",
"Masaki",
""
],
[
"Isahara",
"Hitoshi",
""
]
] |
cs/0112007 | Bart Goethals | Floris Geerts, Bart Goethals and Jan Van den Bussche | A Tight Upper Bound on the Number of Candidate Patterns | null | null | null | null | cs.DB cs.AI | null | In the context of mining for frequent patterns using the standard levelwise
algorithm, the following question arises: given the current level and the
current set of frequent patterns, what is the maximal number of candidate
patterns that can be generated on the next level? We answer this question by
providing a tight upper bound, derived from a combinatorial result from the
sixties by Kruskal and Katona. Our result is useful to reduce the number of
database scans.
| [
{
"version": "v1",
"created": "Fri, 7 Dec 2001 15:40:11 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Nov 2002 01:15:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Geerts",
"Floris",
""
],
[
"Goethals",
"Bart",
""
],
[
"Bussche",
"Jan Van den",
""
]
] |
cs/0112008 | Mark Burgin | Mark Burgin | Representation of Uncertainty for Limit Processes | null | null | null | null | cs.AI cs.NA | null | Many mathematical models utilize limit processes. Continuous functions and
the calculus, differential equations and topology, all are based on limits and
continuity. However, when we perform measurements and computations, we can
achieve only approximate results. In some cases, this discrepancy between
theoretical schemes and practical actions changes drastically outcomes of a
research and decision-making resulting in uncertainty of knowledge. In the
paper, a mathematical approach to such kind of uncertainty, which emerges in
computation and measurement, is suggested on the base of the concept of a fuzzy
limit. A mathematical technique is developed for differential models with
uncertainty. To take into account the intrinsic uncertainty of a model, it is
suggested to use fuzzy derivatives instead of conventional derivatives of
functions in this model.
| [
{
"version": "v1",
"created": "Fri, 7 Dec 2001 23:56:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burgin",
"Mark",
""
]
] |
cs/0112009 | Vijay Ramachandran | Ming-Yang Kao and Vijay Ramachandran | DNA Self-Assembly For Constructing 3D Boxes | 15 pages, 3 figures. Extended abstract included in ISAAC 2001
proceedings | Algorithms and Computation, 12th International Symposium, ISAAC
2001 Proceedings. Springer LNCS 2223 (2001): 429-440 | null | null | cs.CC cs.CE | null | We propose a mathematical model of DNA self-assembly using 2D tiles to form
3D nanostructures. This is the first work to combine studies in self-assembly
and nanotechnology in 3D, just as Rothemund and Winfree did in the 2D case. Our
model is a more precise superset of their Tile Assembly Model that facilitates
building scalable 3D molecules. Under our model, we present algorithms to build
a hollow cube, which is intuitively one of the simplest 3D structures to
construct. We also introduce five basic measures of complexity to analyze these
algorithms. Our model and algorithmic techniques are applicable to more complex
2D and 3D nanostructures.
| [
{
"version": "v1",
"created": "Sat, 8 Dec 2001 21:36:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kao",
"Ming-Yang",
""
],
[
"Ramachandran",
"Vijay",
""
]
] |
cs/0112010 | Kyriakos Sgarbas | Kyriakos N. Sgarbas, Nikos D. Fakotakis, George K. Kokkinakis | A Straightforward Approach to Morphological Analysis and Synthesis | 4(+2) pages, 3 figures, 1 table, 10 references. Keywords: Morphology,
Directed Acyclic Word Graphs, Lexicon Structures. For related work, see also
http://slt.wcl.ee.upatras.gr | Proc. COMLEX 2000, Workshop on Computational Lexicography and
Multimedia Dictionaries, pp.31-34, Kato Achaia, Greece, 22-23 September 2000. | null | null | cs.CL cs.DS | null | In this paper we present a lexicon-based approach to the problem of
morphological processing. Full-form words, lemmas and grammatical tags are
interconnected in a DAWG. Thus, the process of analysis/synthesis is reduced to
a search in the graph, which is very fast and can be performed even if several
pieces of information are missing from the input. The contents of the DAWG are
updated using an on-line incremental process. The proposed approach is language
independent and it does not utilize any morphophonetic rules or any other
special linguistic information.
| [
{
"version": "v1",
"created": "Mon, 10 Dec 2001 13:01:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sgarbas",
"Kyriakos N.",
""
],
[
"Fakotakis",
"Nikos D.",
""
],
[
"Kokkinakis",
"George K.",
""
]
] |
cs/0112011 | Bart Goethals | Bart Goethals, Jan Van den Bussche | Interactive Constrained Association Rule Mining | A preliminary report on this work was presented at the Second
International Conference on Knowledge Discovery and Data Mining (DaWaK 2000) | null | null | null | cs.DB cs.AI | null | We investigate ways to support interactive mining sessions, in the setting of
association rule mining. In such sessions, users specify conditions (queries)
on the associations to be generated. Our approach is a combination of the
integration of querying conditions inside the mining phase, and the incremental
querying of already generated associations. We present several concrete
algorithms and compare their performance.
| [
{
"version": "v1",
"created": "Mon, 10 Dec 2001 15:50:47 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Feb 2003 10:05:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goethals",
"Bart",
""
],
[
"Bussche",
"Jan Van den",
""
]
] |
cs/0112012 | Jean Mairesse | Daniel Krob, Jean Mairesse, Ioannis Michos | Computing the average parallelism in trace monoids | This is an extended version with proofs of D. Krob, J. Mairesse, and
I. Michos. On the average parallelism in trace monoids. In H. Alt and A.
Ferreira, editors, {\em Proceedings of STACS'02}, LNCS. Springer-Verlag, 2002 | null | null | null | cs.DM cs.DC | null | The {\em height} of a trace is the height of the corresponding heap of pieces
in Viennot's representation, or equivalently the number of factors in its
Cartier-Foata decomposition. Let $h(t)$ and $|t|$ stand respectively for the
height and the length of a trace $t$. Roughly speaking, $|t|$ is the
`sequential' execution time and $h(t)$ is the `parallel' execution time. We
prove that the bivariate commutative series $\sum_t x^{h(t)}y^{|t|}$ is
rational, and we give a finite representation of it. We use the rationality to
obtain precise information on the asymptotics of the number of traces of a
given height or length. Then, we study the average height of a trace for
various probability distributions on traces. For the uniform probability
distribution on traces of the same length (resp. of the same height), the
asymptotic average height (resp. length) exists and is an algebraic number. To
illustrate our results and methods, we consider a couple of examples: the free
commutative monoid and the trace monoid whose independence graph is the ladder
graph.
| [
{
"version": "v1",
"created": "Tue, 11 Dec 2001 16:32:12 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Dec 2001 08:54:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krob",
"Daniel",
""
],
[
"Mairesse",
"Jean",
""
],
[
"Michos",
"Ioannis",
""
]
] |
cs/0112013 | Bart Goethals | Tom Brijs, Bart Goethals, Gilbert Swinnen, Koen Vanhoof, Geert Wets | A Data Mining Framework for Optimal Product Selection in Retail
Supermarket Data: The Generalized PROFSET Model | null | null | null | null | cs.DB cs.AI | null | In recent years, data mining researchers have developed efficient association
rule algorithms for retail market basket analysis. Still, retailers often
complain about how to adopt association rules to optimize concrete retail
marketing-mix decisions. It is in this context that, in a previous paper, the
authors have introduced a product selection model called PROFSET. This model
selects the most interesting products from a product assortment based on their
cross-selling potential given some retailer defined constraints. However this
model suffered from an important deficiency: it could not deal effectively with
supermarket data, and no provisions were taken to include retail category
management principles. Therefore, in this paper, the authors present an
important generalization of the existing model in order to make it suitable for
supermarket data as well, and to enable retailers to add category restrictions
to the model. Experiments on real world data obtained from a Belgian
supermarket chain produce very promising results and demonstrate the
effectiveness of the generalized PROFSET model.
| [
{
"version": "v1",
"created": "Tue, 11 Dec 2001 19:23:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brijs",
"Tom",
""
],
[
"Goethals",
"Bart",
""
],
[
"Swinnen",
"Gilbert",
""
],
[
"Vanhoof",
"Koen",
""
],
[
"Wets",
"Geert",
""
]
] |
cs/0112015 | Moshe Tennenholtz | Moshe Tennenholtz | Rational Competitive Analysis | null | Proceedings of IJCAI-2001 | null | null | cs.AI | null | Much work in computer science has adopted competitive analysis as a tool for
decision making under uncertainty. In this work we extend competitive analysis
to the context of multi-agent systems. Unlike classical competitive analysis
where the behavior of an agent's environment is taken to be arbitrary, we
consider the case where an agent's environment consists of other agents. These
agents will usually obey some (minimal) rationality constraints. This leads to
the definition of rational competitive analysis. We introduce the concept of
rational competitive analysis, and initiate the study of competitive analysis
for multi-agent systems. We also discuss the application of rational
competitive analysis to the context of bidding games, as well as to the
classical one-way trading problem.
| [
{
"version": "v1",
"created": "Thu, 13 Dec 2001 00:46:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tennenholtz",
"Moshe",
""
]
] |
cs/0112016 | Boaz Tsaban | Boaz Tsaban | Pseudorandom permutations with the fast forward property | Paper withdrawal | null | null | null | cs.CR cs.CC | null | This paper has been withdrawn by the author(s), due to the existence of a
much better paper in http://arxiv.org/abs/cs.CR/0207027
| [
{
"version": "v1",
"created": "Thu, 13 Dec 2001 18:31:35 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2003 19:55:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tsaban",
"Boaz",
""
]
] |
cs/0112017 | Naomi Dushay | Naomi Dushay | Using Structural Metadata to Localize Experience of Digital Content | 23 pages including 2 appendices, 8 figures | null | null | null | cs.DL | null | With the increasing technical sophistication of both information consumers
and providers, there is increasing demand for more meaningful experiences of
digital information. We present a framework that separates digital object
experience, or rendering, from digital object storage and manipulation, so the
rendering can be tailored to particular communities of users. Our framework
also accommodates extensible digital object behaviors and interoperability. The
two key components of our approach are 1) exposing structural metadata
associated with digital objects -- metadata about the labeled access points
within a digital object and 2) information intermediaries called context
brokers that match structural characteristics of digital objects with
mechanisms that produce behaviors. These context brokers allow for localized
rendering of digital information stored externally.
| [
{
"version": "v1",
"created": "Fri, 14 Dec 2001 18:55:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dushay",
"Naomi",
""
]
] |
cs/0112018 | Lillian Lee | Lillian Lee | Fast Context-Free Grammar Parsing Requires Fast Boolean Matrix
Multiplication | To appear in Journal of the ACM | Journal of the ACM 49(1), pp. 1--15, January 2002 | null | null | cs.CL cs.DS | null | In 1975, Valiant showed that Boolean matrix multiplication can be used for
parsing context-free grammars (CFGs), yielding the asympotically fastest
(although not practical) CFG parsing algorithm known. We prove a dual result:
any CFG parser with time complexity $O(g n^{3 - \epsilson})$, where $g$ is the
size of the grammar and $n$ is the length of the input string, can be
efficiently converted into an algorithm to multiply $m \times m$ Boolean
matrices in time $O(m^{3 - \epsilon/3})$.
Given that practical, substantially sub-cubic Boolean matrix multiplication
algorithms have been quite difficult to find, we thus explain why there has
been little progress in developing practical, substantially sub-cubic general
CFG parsers. In proving this result, we also develop a formalization of the
notion of parsing.
| [
{
"version": "v1",
"created": "Sat, 15 Dec 2001 19:43:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Lillian",
""
]
] |
cs/0112020 | Marc-Thierry Jaekel | Philippe Matherat and Marc-Thierry Jaekel | Concurrent computing machines and physical space-time | Latex Revtex style, 15 pages, 14 figures | M.S.C.S., Cambridge University Press, 13 (2003) 771 | null | LPTENS 01/05 | cs.DC cs.LO gr-qc | null | Concrete computing machines, either sequential or concurrent, rely on an
intimate relation between computation and time. We recall the general
characteristic properties of physical time and of present realizations of
computing systems. We emphasize the role of computing interferences, i.e. the
necessity to avoid them in order to give a causal implementation to logical
operations. We compare synchronous and asynchronous systems, and make a brief
survey of some methods used to deal with computing interferences. Using a
graphic representation, we show that synchronous and asynchronous circuits
reflect the same opposition as the Newtonian and relativistic causal structures
for physical space-time.
| [
{
"version": "v1",
"created": "Mon, 17 Dec 2001 14:10:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Matherat",
"Philippe",
""
],
[
"Jaekel",
"Marc-Thierry",
""
]
] |
cs/0112022 | Qi Xiao Yang | Qi Xiao Yang, Sung Sam Yuan, Lu Chun, Li Zhao and Sun Peng | Faster Algorithm of String Comparison | null | null | null | null | cs.DS | null | In many applications, it is necessary to determine the string similarity.
Edit distance[WF74] approach is a classic method to determine Field Similarity.
A well known dynamic programming algorithm [GUS97] is used to calculate edit
distance with the time complexity O(nm). (for worst case, average case and even
best case) Instead of continuing with improving the edit distance approach,
[LL+99] adopted a brand new approach-token-based approach. Its new concept of
token-base-retain the original semantic information, good time complex-O(nm)
(for worst, average and best case) and good experimental performance make it a
milestone paper in this area. Further study indicates that there is still room
for improvement of its Field Similarity algorithm. Our paper is to introduce a
package of substring-based new algorithms to determine Field Similarity.
Combined together, our new algorithms not only achieve higher accuracy but also
gain the time complexity O(knm) (k<0.75) for worst case, O(*n) where <6 for
average case and O(1) for best case. Throughout the paper, we use the approach
of comparative examples to show higher accuracy of our algorithms compared to
the one proposed in [LL+99]. Theoretical analysis, concrete examples and
experimental result show that our algorithms can significantly improve the
accuracy and time complexity of the calculation of Field Similarity. [US97] D.
Guseld. Algorithms on Strings, Trees and Sequences, in Computer Science and
Computational Biology. [LL+99] Mong Li Lee, Cleansing data for mining and
warehousing, In Proceedings of the 10th International Conference on Database
and Expert Systems Applications (DEXA99), pages 751-760,August 1999. [WF74] R.
Wagner and M. Fisher, The String to String Correction Problem, JACM 21 pages
168-173, 1974.
| [
{
"version": "v1",
"created": "Fri, 21 Dec 2001 05:58:12 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Dec 2001 21:29:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yang",
"Qi Xiao",
""
],
[
"Yuan",
"Sung Sam",
""
],
[
"Chun",
"Lu",
""
],
[
"Zhao",
"Li",
""
],
[
"Peng",
"Sun",
""
]
] |
cs/0112023 | Pawel | Pawel Wocjan, Dominik Janzing, and Thomas Beth (Universitaet
Karlsruhe) | Lower Bound on the Chromatic Number by Spectra of Weighted Adjacency
Matrices | 6 pages | null | null | null | cs.DM quant-ph | null | A lower bound on the chromatic number of a graph is derived by majorization
of spectra of weighted adjacency matrices. These matrices are given by Hadamard
products of the adjacency matrix and arbitrary Hermitian matrices.
| [
{
"version": "v1",
"created": "Fri, 21 Dec 2001 15:11:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wocjan",
"Pawel",
"",
"Universitaet\n Karlsruhe"
],
[
"Janzing",
"Dominik",
"",
"Universitaet\n Karlsruhe"
],
[
"Beth",
"Thomas",
"",
"Universitaet\n Karlsruhe"
]
] |
cs/0112024 | Thomas Schmidt | B. Feustel, T.C. Schmidt | Media Objects in Time - A Multimedia Streaming System | 9 pdf pages | Computer Networks 37,6 (2001), pp. 729 - 737 | null | null | cs.NI cs.MM | null | The widespread availability of networked multimedia potentials embedded in an
infrastructure of qualitative superior kind gives rise to new approaches in the
areas of teleteaching and internet presentation: The distribution of
professionally styled multimedia streams has fallen in the realm of
possibility. This paper presents a prototype - both model and runtime
environment - of a time directed media system treating any kind of
presentational contribution as reusable media object components. The plug-in
free runtime system is based on a database and allows for a flexible support of
static media types as well as for easy extensions by streaming media servers.
The prototypic implementation includes a preliminary Web Authoring platform.
| [
{
"version": "v1",
"created": "Fri, 28 Dec 2001 20:19:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Feustel",
"B.",
""
],
[
"Schmidt",
"T. C.",
""
]
] |
cs/0201001 | Amir Shpilka | Amir Shpilka | Lower Bounds for Matrix Product | Published in the proceedings of the 42nd Annual Symposium on
Foundations of Computer Science (FOCS) 2001 | Published in the proceedings of the 42nd Annual Symposium on
Foundations of Computer Science (FOCS) 2001 | null | null | cs.CC | null | We prove lower bounds on the number of product gates in bilinear and
quadratic circuits that compute the product of two $n \cross n$ matrices over
finite fields. In particular we obtain the following results:
1. We show that the number of product gates in any bilinear (or quadratic)
circuit that computes the product of two $n \cross n$ matrices over $F_2$ is at
least $3 n^2 - o(n^2)$.
2. We show that the number of product gates in any bilinear circuit that
computes the product of two $n \cross n$ matrices over $F_p$ is at least $(2.5
+ \frac{1.5}{p^3 -1})n^2 -o(n^2)$.
These results improve the former results of Bshouty '89 and Blaser '99 who
proved lower bounds of $2.5 n^2 - o(n^2)$.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2002 09:50:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shpilka",
"Amir",
""
]
] |
cs/0201002 | Kyriakos Sgarbas | Kyriakos N. Sgarbas, Nikos D. Fakotakis, George K. Kokkinakis | Incremental Construction of Compact Acyclic NFAs | 8(+2) pages, 4 figures, 1 table, 22 references. For related work, see
also http://slt.wcl.ee.upatras.gr | Proc. ACL-2001, 39th Annual Meeting of the Association for
Computational Linguistics, pp.474-481, Toulouse, France, 6-11 July 2001 | null | null | cs.DS cs.CL | null | This paper presents and analyzes an incremental algorithm for the
construction of Acyclic Non-deterministic Finite-state Automata (NFA). Automata
of this type are quite useful in computational linguistics, especially for
storing lexicons. The proposed algorithm produces compact NFAs, i.e. NFAs that
do not contain equivalent states. Unlike Deterministic Finite-state Automata
(DFA), this property is not sufficient to ensure minimality, but still the
resulting NFAs are considerably smaller than the minimal DFAs for the same
languages.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2002 17:01:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sgarbas",
"Kyriakos N.",
""
],
[
"Fakotakis",
"Nikos D.",
""
],
[
"Kokkinakis",
"George K.",
""
]
] |
cs/0201003 | Charles H. Bennett | Charles H. Bennett, John A. Smolin | Trust enhancement by multiple random beacons | null | null | null | null | cs.CR | null | Random beacons-information sources that broadcast a stream of random digits
unknown by anyone beforehand-are useful for various cryptographic purposes. But
such beacons can be easily and undetectably sabotaged, so that their output is
known beforehand by a dishonest party, who can use this information to defeat
the cryptographic protocols supposedly protected by the beacon. We explore a
strategy to reduce this hazard by combining the outputs from several
noninteracting (eg spacelike-separated) beacons by XORing them together to
produce a single digit stream which is more trustworthy than any individual
beacon, being random and unpredictable if at least one of the contributing
beacons is honest. If the contributing beacons are not spacelike separated, so
that a dishonest beacon can overhear and adapt to earlier outputs of other
beacons, the beacons' trustworthiness can still be enhanced to a lesser extent
by a time sharing strategy. We point out some disadvantages of alternative
trust amplification methods based on one-way hash functions.
| [
{
"version": "v1",
"created": "Sun, 6 Jan 2002 22:38:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bennett",
"Charles H.",
""
],
[
"Smolin",
"John A.",
""
]
] |
cs/0201004 | Tatsuya Mori | Tatsuya Mori, Ryoichi Kawahara, Shozo Naito | Analysis of Non-Gaussian Nature of Network Traffic | 4 pages, 4 figures, IEICE General Conference 2002, Tokyo, Japan,
March 2002 | null | null | null | cs.NI | null | To study mechanisms that cause the non-Gaussian nature of network traffic, we
analyzed IP flow statistics. For greedy flows in particular, we investigated
the hop counts between source and destination nodes, and classified
applications by the port number. We found that the main flows contributing to
the non-Gaussian nature of network traffic were HTTP flows with relatively
small hop counts compared with the average hop counts of all flows.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2002 08:34:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mori",
"Tatsuya",
""
],
[
"Kawahara",
"Ryoichi",
""
],
[
"Naito",
"Shozo",
""
]
] |
cs/0201006 | Paul Vitanyi | Harry Buhrman (CWI), Alessandro Panconesi (Univ. La Sapienza, Rome),
Riccardo Silvestri (Univ. La Sapienza, Rome), and Paul Vitanyi (CWI and Univ.
Amsterdam) | On the Importance of Having an Identity or, is Consensus really
Universal? | LaTeX, 15 pages, In: Distributed Computing Conference (DISC'00),
Lecture Notes in Computer Science, Vol. 1914, Springer-Verlag, Berlin, 2000,
134--148 | null | null | null | cs.DC cs.CC | null | We show that Naming-- the existence of distinct IDs known to all-- is a
hidden but necessary assumption of Herlihy's universality result for Consensus.
We then show in a very precise sense that Naming is harder than Consensus and
bring to the surface some important differences existing between popular shared
memory models.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2002 18:49:27 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Feb 2002 15:35:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"Harry",
"",
"CWI"
],
[
"Panconesi",
"Alessandro",
"",
"Univ. La Sapienza, Rome"
],
[
"Silvestri",
"Riccardo",
"",
"Univ. La Sapienza, Rome"
],
[
"Vitanyi",
"Paul",
"",
"CWI and Univ.\n Amsterdam"
]
] |
cs/0201008 | Nikita Schmidt | Nikita Schmidt, Ahmed Patel | Using Tree Automata and Regular Expressions to Manipulate Hierarchically
Structured Data | Submission to JACM for review. 27 single spaced pages | null | null | null | cs.CL cs.DS | null | Information, stored or transmitted in digital form, is often structured.
Individual data records are usually represented as hierarchies of their
elements. Together, records form larger structures. Information processing
applications have to take account of this structuring, which assigns different
semantics to different data elements or records. Big variety of structural
schemata in use today often requires much flexibility from applications--for
example, to process information coming from different sources. To ensure
application interoperability, translators are needed that can convert one
structure into another. This paper puts forward a formal data model aimed at
supporting hierarchical data processing in a simple and flexible way. The model
is based on and extends results of two classical theories, studying finite
string and tree automata. The concept of finite automata and regular languages
is applied to the case of arbitrarily structured tree-like hierarchical data
records, represented as "structured strings." These automata are compared with
classical string and tree automata; the model is shown to be a superset of the
classical models. Regular grammars and expressions over structured strings are
introduced. Regular expression matching and substitution has been widely used
for efficient unstructured text processing; the model described here brings the
power of this proven technique to applications that deal with information
trees. A simple generic alternative is offered to replace today's specialised
ad-hoc approaches. The model unifies structural and content transformations,
providing applications with a single data type. An example scenario of how to
build applications based on this theory is discussed. Further research
directions are outlined.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2002 17:59:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidt",
"Nikita",
""
],
[
"Patel",
"Ahmed",
""
]
] |
cs/0201009 | Igor Rivin | Igor Rivin | The performance of the batch learner algorithm | Supercedes a part of cs.LG/0107033 | null | null | null | cs.LG cs.DM | null | We analyze completely the convergence speed of the \emph{batch learning
algorithm}, and compare its speed to that of the memoryless learning algorithm
and of learning with memory. We show that the batch learning algorithm is never
worse than the memoryless learning algorithm (at least asymptotically). Its
performance \emph{vis-a-vis} learning with full memory is less clearcut, and
depends on certain probabilistic assumptions.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2002 18:38:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rivin",
"Igor",
""
]
] |
cs/0201010 | Moshe Tennenholtz | Ron Holzman, Noa Kfir-Dahav, Dov Monderer, Moshe Tennenholtz | Bundling Equilibrium in Combinatorial auctions | null | null | null | null | cs.GT | null | This paper analyzes individually-rational ex post equilibrium in the VC
(Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of
goods, the organizer may restrict the participants by requiring them to submit
their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions
(multi-good auctions) obtained in this way are known to be
individually-rational truth-telling mechanisms. In contrast, this paper deals
with non-restricted VC auctions, in which the buyers restrict themselves to
bids on bundles in $\Sigma$, because it is rational for them to do so. That is,
it may be that when the buyers report their valuation of the bundles in
$\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that
induce individually rational equilibrium in every VC auction, and we refer to
the associated equilibrium as a bundling equilibrium. The number of bundles in
$\Sigma$ represents the communication complexity of the equilibrium. A special
case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$
is a field, that is, it is generated by a partition. We analyze the tradeoff
between communication complexity and economic efficiency of bundling
equilibrium, focusing in particular on partition-based equilibrium.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2002 22:36:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Holzman",
"Ron",
""
],
[
"Kfir-Dahav",
"Noa",
""
],
[
"Monderer",
"Dov",
""
],
[
"Tennenholtz",
"Moshe",
""
]
] |
cs/0201011 | Andy King | Andy King and Lunjin Lu | A Backward Analysis for Constraint Logic Programs | 32 pages | null | null | null | cs.PL cs.SE | null | One recurring problem in program development is that of understanding how to
re-use code developed by a third party. In the context of (constraint) logic
programming, part of this problem reduces to figuring out how to query a
program. If the logic program does not come with any documentation, then the
programmer is forced to either experiment with queries in an ad hoc fashion or
trace the control-flow of the program (backward) to infer the modes in which a
predicate must be called so as to avoid an instantiation error. This paper
presents an abstract interpretation scheme that automates the latter technique.
The analysis presented in this paper can infer moding properties which if
satisfied by the initial query, come with the guarantee that the program and
query can never generate any moding or instantiation errors. Other applications
of the analysis are discussed. The paper explains how abstract domains with
certain computational properties (they condense) can be used to trace
control-flow backward (right-to-left) to infer useful properties of initial
queries. A correctness argument is presented and an implementation is reported.
| [
{
"version": "v1",
"created": "Wed, 16 Jan 2002 11:48:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"King",
"Andy",
""
],
[
"Lu",
"Lunjin",
""
]
] |
cs/0201012 | Andy King | Jacob M. Howe and Andy King | Efficient Groundness Analysis in Prolog | 31 pages To appear in Theory and Practice of Logic Programming | null | null | null | cs.PL | null | Boolean functions can be used to express the groundness of, and trace
grounding dependencies between, program variables in (constraint) logic
programs. In this paper, a variety of issues pertaining to the efficient Prolog
implementation of groundness analysis are investigated, focusing on the domain
of definite Boolean functions, Def. The systematic design of the representation
of an abstract domain is discussed in relation to its impact on the algorithmic
complexity of the domain operations; the most frequently called operations
should be the most lightweight. This methodology is applied to Def, resulting
in a new representation, together with new algorithms for its domain operations
utilising previously unexploited properties of Def -- for instance,
quadratic-time entailment checking. The iteration strategy driving the analysis
is also discussed and a simple, but very effective, optimisation of induced
magic is described. The analysis can be implemented straightforwardly in Prolog
and the use of a non-ground representation results in an efficient, scalable
tool which does not require widening to be invoked, even on the largest
benchmarks. An extensive experimental evaluation is given
| [
{
"version": "v1",
"created": "Wed, 16 Jan 2002 12:02:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Howe",
"Jacob M.",
""
],
[
"King",
"Andy",
""
]
] |
cs/0201014 | Bruno Caprile | Bruno Caprile, Cesare Furlanello & Stefano Merler | The Dynamics of AdaBoost Weights Tells You What's Hard to Classify | 7 pages, LaTeX, 4 figures | null | null | IRST TechRep #010612 | cs.LG cs.DS | null | The dynamical evolution of weights in the Adaboost algorithm contains useful
information about the role that the associated data points play in the built of
the Adaboost model. In particular, the dynamics induces a bipartition of the
data set into two (easy/hard) classes. Easy points are ininfluential in the
making of the model, while the varying relevance of hard points can be gauged
in terms of an entropy value associated to their evolution. Smooth
approximations of entropy highlight regions where classification is most
uncertain. Promising results are obtained when methods proposed are applied in
the Optimal Sampling framework.
| [
{
"version": "v1",
"created": "Thu, 17 Jan 2002 13:42:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Caprile",
"Bruno",
""
],
[
"Furlanello",
"Cesare",
""
],
[
"Merler",
"Stefano",
""
]
] |
cs/0201015 | M. H. van Emden | M.H. van Emden | On the Significance of Digits in Interval Notation | 11 pages, LaTeX | null | null | DCS-270-IR | cs.NA | null | To analyse the significance of the digits used for interval bounds, we
clarify the philosophical presuppositions of various interval notations. We use
information theory to determine the information content of the last digit of
the numeral used to denote the interval's bounds. This leads to the notion of
efficiency of a decimal digit: the actual value as percentage of the maximal
value of its information content. By taking this efficiency into account, many
presentations of intervals can be made more readable at the expense of
negligible loss of information.
| [
{
"version": "v1",
"created": "Thu, 17 Jan 2002 22:31:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
]
] |
cs/0201016 | Joseph Y. Halpern | Joseph Y. Halpern | A computer scientist looks at game theory | To appear, Games and Economic Behavior. JEL classification numbers:
D80, D83 | null | null | null | cs.GT cs.DC cs.MA | null | I consider issues in distributed computation that should be of relevance to
game theory. In particular, I focus on (a) representing knowledge and
uncertainty, (b) dealing with failures, and (c) specification of mechanisms.
| [
{
"version": "v1",
"created": "Fri, 18 Jan 2002 11:05:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0201018 | Erik Demaine | Oswin Aichholzer, David Bremner, Erik D. Demaine, Henk Meijer, Vera
Sacrist\'an, Michael Soss | Long Proteins with Unique Optimal Foldings in the H-P Model | 22 pages, 18 figures | null | null | null | cs.CG q-bio.BM | null | It is widely accepted that (1) the natural or folded state of proteins is a
global energy minimum, and (2) in most cases proteins fold to a unique state
determined by their amino acid sequence. The H-P (hydrophobic-hydrophilic)
model is a simple combinatorial model designed to answer qualitative questions
about the protein folding process. In this paper we consider a problem
suggested by Brian Hayes in 1998: what proteins in the two-dimensional H-P
model have unique optimal (minimum energy) foldings? In particular, we prove
that there are closed chains of monomers (amino acids) with this property for
all (even) lengths; and that there are open monomer chains with this property
for all lengths divisible by four.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2002 13:39:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aichholzer",
"Oswin",
""
],
[
"Bremner",
"David",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Meijer",
"Henk",
""
],
[
"Sacristán",
"Vera",
""
],
[
"Soss",
"Michael",
""
]
] |
cs/0201019 | Mireille Boutin | Pierre-Louis Bazin (Brown University) Mireille Boutin (Brown
University) | Structure from Motion: Theoretical Foundations of a Novel Approach Using
Custom Built Invariants | 15 pages | null | null | null | cs.CV math.DG | null | We rephrase the problem of 3D reconstruction from images in terms of
intersections of projections of orbits of custom built Lie groups actions. We
then use an algorithmic method based on moving frames "a la Fels-Olver" to
obtain a fundamental set of invariants of these groups actions. The invariants
are used to define a set of equations to be solved by the points of the 3D
object, providing a new technique for recovering 3D structure from motion.
| [
{
"version": "v1",
"created": "Tue, 22 Jan 2002 21:00:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bazin",
"Pierre-Louis",
"",
"Brown University"
],
[
"Boutin",
"Mireille",
"",
"Brown\n University"
]
] |
cs/0201020 | Churn-Jung Liau | Churn-Jung Liau | A Modal Logic Framework for Multi-agent Belief Fusion | LaTex, 29 pages | null | null | null | cs.AI cs.LO | null | This paper is aimed at providing a uniform framework for reasoning about
beliefs of multiple agents and their fusion. In the first part of the paper, we
develop logics for reasoning about cautiously merged beliefs of agents with
different degrees of reliability. The logics are obtained by combining the
multi-agent epistemic logic and multi-sources reasoning systems. Every ordering
for the reliability of the agents is represented by a modal operator, so we can
reason with the merged results under different situations. The fusion is
cautious in the sense that if an agent's belief is in conflict with those of
higher priorities, then his belief is completely discarded from the merged
result. We consider two strategies for the cautious merging of beliefs. In the
first one, if inconsistency occurs at some level, then all beliefs at the lower
levels are discarded simultaneously, so it is called level cutting strategy.
For the second one, only the level at which the inconsistency occurs is
skipped, so it is called level skipping strategy. The formal semantics and
axiomatic systems for these two strategies are presented. In the second part,
we extend the logics both syntactically and semantically to cover some more
sophisticated belief fusion and revision operators. While most existing
approaches treat belief fusion operators as meta-level constructs, these
operators are directly incorporated into our object logic language. Thus it is
possible to reason not only with the merged results but also about the fusion
process in our logics. The relationship of our extended logics with the
conditional logics of belief revision is also discussed.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2002 02:43:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liau",
"Churn-Jung",
""
]
] |
cs/0201021 | Dov Samet | Philippe Jehiel, Dov Samet | Learning to Play Games in Extensive Form by Valuation | null | null | null | null | cs.LG cs.GT | null | A valuation for a player in a game in extensive form is an assignment of
numeric values to the players moves. The valuation reflects the desirability
moves. We assume a myopic player, who chooses a move with the highest
valuation. Valuations can also be revised, and hopefully improved, after each
play of the game. Here, a very simple valuation revision is considered, in
which the moves made in a play are assigned the payoff obtained in the play. We
show that by adopting such a learning process a player who has a winning
strategy in a win-lose game can almost surely guarantee a win in a repeated
game. When a player has more than two payoffs, a more elaborate learning
procedure is required. We consider one that associates with each move the
average payoff in the rounds in which this move was made. When all players
adopt this learning procedure, with some perturbations, then, with probability
1, strategies that are close to subgame perfect equilibrium are played after
some time. A single player who adopts this procedure can guarantee only her
individually rational payoff.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2002 11:58:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jehiel",
"Philippe",
""
],
[
"Samet",
"Dov",
""
]
] |
cs/0201022 | Pierre Albarede | Pierre Albarede | A theory of experiment | 19 pages LaTeX article (uses some pstricks) thorough revision 2 see
also http://pierre.albarede.free.fr | null | null | null | cs.AI | null | This article aims at clarifying the language and practice of scientific
experiment, mainly by hooking observability on calculability.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2002 19:53:08 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Feb 2003 20:13:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Albarede",
"Pierre",
""
]
] |
cs/0201023 | Andree Blotz | Andree Blotz (1), Franz Huber (2), Heiko Loetzbeyer (3), Alexander
Pretschner (3), Oscar Slotosch (2), Hans-Peter Zaengerl (2) ((1) EADS
Deutschland GmbH, (2) Validas AG, (3) TU Munich) | Model-Based Software Engineering and Ada: Synergy for the Development of
Safety-Critical Systems | 16 pages, figures included, paper accepted for ADA Deutschland Tagung
2002, March 6-8, Jena, GERMANY | null | null | null | cs.SE | null | In this paper we outline a software development process for safety-critical
systems that aims at combining some of the specific strengths of model-based
development with those of programming language based development using
safety-critical subsets of Ada. Model-based software development and
model-based test case generation techniques are combined with code generation
techniques and tools providing a transition from model to code both for a
system itself and for its test cases. This allows developers to combine
domain-oriented, model-based techniques with source code based validation
techniques, as required for conformity with standards for the development of
safety-critical software, such as the avionics standard RTCA/DO-178B. We
introduce the AutoFocus and Validator modeling and validation toolset and
sketch its usage for modeling, test case generation, and code generation in a
combined approach, which is further illustrated by a simplified leading edge
aerospace model with built-in fault tolerance.
| [
{
"version": "v1",
"created": "Sat, 26 Jan 2002 11:32:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Blotz",
"Andree",
""
],
[
"Huber",
"Franz",
""
],
[
"Loetzbeyer",
"Heiko",
""
],
[
"Pretschner",
"Alexander",
""
],
[
"Slotosch",
"Oscar",
""
],
[
"Zaengerl",
"Hans-Peter",
""
]
] |
cs/0201025 | Carl Lagoze | Carl Lagoze, William Arms, Stoney Gan, Diane Hillmann, Christopher
Ingram, Dean Krafft, Richard Marisa, Jon Phipps, John Saylor, Carol Terrizzi,
Walter Hoehn, David Millman, James Allan, Sergio Guzman-Lara, Tom Kalt | Core Services in the Architecture of the National Digital Library for
Science Education (NSDL) | null | null | null | null | cs.DL | null | We describe the core components of the architecture for the (NSDL) National
Science, Mathematics, Engineering, and Technology Education Digital Library.
Over time the NSDL will include heterogeneous users, content, and services. To
accommodate this, a design for a technical and organization infrastructure has
been formulated based on the notion of a spectrum of interoperability. This
paper describes the first phase of the interoperability infrastructure
including the metadata repository, search and discovery services, rights
management services, and user interface portal facilities.
| [
{
"version": "v1",
"created": "Tue, 29 Jan 2002 17:51:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Arms",
"William",
""
],
[
"Gan",
"Stoney",
""
],
[
"Hillmann",
"Diane",
""
],
[
"Ingram",
"Christopher",
""
],
[
"Krafft",
"Dean",
""
],
[
"Marisa",
"Richard",
""
],
[
"Phipps",
"Jon",
""
],
[
"Saylor",
"John",
""
],
[
"Terrizzi",
"Carol",
""
],
[
"Hoehn",
"Walter",
""
],
[
"Millman",
"David",
""
],
[
"Allan",
"James",
""
],
[
"Guzman-Lara",
"Sergio",
""
],
[
"Kalt",
"Tom",
""
]
] |
cs/0201027 | Carl Lagoze | David Fulker and Greg Janee | Components of an NSDL Architecture: Technical Scope and Functional Model | null | null | null | null | cs.DL | null | We describe work leading toward specification of a technical architecture for
the National Science, Mathematics, Engineering, and Technology Education
Digital Library (NSDL). This includes a technical scope and a functional model,
with some elaboration on the particularly rich set of library services that
NSDL is expected eventually to encompass.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2002 01:14:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fulker",
"David",
""
],
[
"Janee",
"Greg",
""
]
] |
cs/0201028 | Raimondas Lencevicius | Raimondas Lencevicius, Edu Metz, Alexander Ran | Software Validation using Power Profiles | 6 pages, 5 figures, to be published in the Proceedings of the
Symposium on Software Engineering at 20th IASTED International
Multi-Conference on Applied Informatics (AI 2002) | null | null | null | cs.SE | null | The validation of modern software systems incorporates both functional and
quality requirements. This paper proposes a validation approach for software
quality requirement - its power consumption. This approach validates whether
the software produces the desired results with a minimum expenditure of energy.
We present energy requirements and an approach for their validation using a
power consumption model, test-case specification, software traces, and power
measurements. Three different approaches for power data gathering are
described. The power consumption of mobile phone applications is obtained and
matched against the power consumption model.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2002 22:28:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lencevicius",
"Raimondas",
""
],
[
"Metz",
"Edu",
""
],
[
"Ran",
"Alexander",
""
]
] |
cs/0201029 | James H. Andrews | James H. Andrews | The Witness Properties and the Semantics of the Prolog Cut | 60 pages, 15 figures. Accepted for publication in Theory and Practice
of Logic Programming | null | null | null | cs.PL | null | The semantics of the Prolog ``cut'' construct is explored in the context of
some desirable properties of logic programming systems, referred to as the
witness properties. The witness properties concern the operational consistency
of responses to queries. A generalization of Prolog with negation as failure
and cut is described, and shown not to have the witness properties. A
restriction of the system is then described, which preserves the choice and
first-solution behaviour of cut but allows the system to have the witness
properties.
The notion of cut in the restricted system is more restricted than the Prolog
hard cut, but retains the useful first-solution behaviour of hard cut, not
retained by other proposed cuts such as the ``soft cut''. It is argued that the
restricted system achieves a good compromise between the power and utility of
the Prolog cut and the need for internal consistency in logic programming
systems. The restricted system is given an abstract semantics, which depends on
the witness properties; this semantics suggests that the restricted system has
a deeper connection to logic than simply permitting some computations which are
logical.
Parts of this paper appeared previously in a different form in the
Proceedings of the 1995 International Logic Programming Symposium.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2002 17:47:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andrews",
"James H.",
""
]
] |
cs/0202001 | Carlo Zaniolo | Faiz Arni, KayLiang Ong, Shalom Tsur and Haixun Wang, Carlo Zaniolo | The Deductive Database System LDL++ | null | null | null | null | cs.DB cs.AI | null | This paper describes the LDL++ system and the research advances that have
enabled its design and development. We begin by discussing the new nonmonotonic
and nondeterministic constructs that extend the functionality of the LDL++
language, while preserving its model-theoretic and fixpoint semantics. Then, we
describe the execution model and the open architecture designed to support
these new constructs and to facilitate the integration with existing DBMSs and
applications. Finally, we describe the lessons learned by using LDL++ on
various tested applications, such as middleware and datamining.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2002 05:00:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arni",
"Faiz",
""
],
[
"Ong",
"KayLiang",
""
],
[
"Tsur",
"Shalom",
""
],
[
"Wang",
"Haixun",
""
],
[
"Zaniolo",
"Carlo",
""
]
] |
cs/0202002 | Robert Colvin | Ian Hayes, Robert Colvin, David Hemer, Paul Strooper, Ray Nickson | A Refinement Calculus for Logic Programs | 36 pages, 3 figures. To be published in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.SE cs.LO | null | Existing refinement calculi provide frameworks for the stepwise development
of imperative programs from specifications. This paper presents a refinement
calculus for deriving logic programs. The calculus contains a wide-spectrum
logic programming language, including executable constructs such as sequential
conjunction, disjunction, and existential quantification, as well as
specification constructs such as general predicates, assumptions and universal
quantification. A declarative semantics is defined for this wide-spectrum
language based on executions. Executions are partial functions from states to
states, where a state is represented as a set of bindings. The semantics is
used to define the meaning of programs and specifications, including parameters
and recursion. To complete the calculus, a notion of correctness-preserving
refinement over programs in the wide-spectrum language is defined and
refinement laws for developing programs are introduced. The refinement calculus
is illustrated using example derivations and prototype tool support is
discussed.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2002 01:20:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hayes",
"Ian",
""
],
[
"Colvin",
"Robert",
""
],
[
"Hemer",
"David",
""
],
[
"Strooper",
"Paul",
""
],
[
"Nickson",
"Ray",
""
]
] |
cs/0202003 | Paul Vitanyi | Paul Vitanyi (CWI and University of Amsterdam) | Simple Optimal Wait-free Multireader Registers | 11 pages LaTeX, 1 table, 2 pseudo-programs; previous version
published in Proc 16th International Symposium on DIStributed Computing (DISC
2002), Lecture Notes in Computer Science, Vol 2508, Springer-Verlag, Berlin,
118-132. New version eliminates error in the protocol (merges a split scan
operation that proved problematic) and defers the formal proof to a planned
future I/O automaton version | null | null | null | cs.DC | null | Multireader shared registers are basic objects used as communication medium
in asynchronous concurrent computation. We propose a surprisingly simple and
natural scheme to obtain several wait-free constructions of bounded 1-writer
multireader registers from atomic 1-writer 1-reader registers, that is easier
to prove correct than any previous construction. Our main construction is the
first symmetric pure timestamp one that is optimal with respect to the
worst-case local use of control bits; the other one is optimal with respect to
global use of control bits; both are optimal in time.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2002 17:29:15 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Oct 2002 15:18:47 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Dec 2005 14:32:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vitanyi",
"Paul",
"",
"CWI and University of Amsterdam"
]
] |
cs/0202004 | Juergen Kropp | K. Eisenack, H. Welsch, J.P. Kropp | A Qualitative Dynamical Modelling Approach to Capital Accumulation in
Unregulated Fisheries | 24 pages, 6 figures | null | 10.1016/j.jedc.2005.08.004 | null | cs.AI cs.CE | null | Capital accumulation has been a major issue in fisheries economics over the
last two decades, whereby the interaction of the fish and capital stocks were
of particular interest. Because bio-economic systems are intrinsically complex,
previous efforts in this field have relied on a variety of simplifying
assumptions. The model presented here relaxes some of these simplifications.
Problems of tractability are surmounted by using the methodology of qualitative
differential equations (QDE). The theory of QDEs takes into account that
scientific knowledge about particular fisheries is usually limited, and
facilitates an analysis of the global dynamics of systems with more than two
ordinary differential equations. The model is able to trace the evolution of
capital and fish stock in good agreement with observed patterns, and shows that
over-capitalization is unavoidable in unregulated fisheries.
| [
{
"version": "v1",
"created": "Tue, 5 Feb 2002 17:50:56 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Aug 2002 10:45:15 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Oct 2005 10:41:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eisenack",
"K.",
""
],
[
"Welsch",
"H.",
""
],
[
"Kropp",
"J. P.",
""
]
] |
cs/0202005 | Petros Maniatis | Petros Maniatis and Mary Baker | Secure History Preservation Through Timeline Entanglement | 16 pages, 12 figures, 1 table | null | null | null | cs.DC cs.CR cs.DB cs.DS | null | A secure timeline is a tamper-evident historic record of the states through
which a system goes throughout its operational history. Secure timelines can
help us reason about the temporal ordering of system states in a provable
manner. We extend secure timelines to encompass multiple, mutually distrustful
services, using timeline entanglement. Timeline entanglement associates
disparate timelines maintained at independent systems, by linking undeniably
the past of one timeline to the future of another. Timeline entanglement is a
sound method to map a time step in the history of one service onto the timeline
of another, and helps clients of entangled services to get persistent temporal
proofs for services rendered that survive the demise or non-cooperation of the
originating service. In this paper we present the design and implementation of
Timeweave, our service development framework for timeline entanglement based on
two novel disk-based authenticated data structures. We evaluate Timeweave's
performance characteristics and show that it can be efficiently deployed in a
loosely-coupled distributed system of a few hundred services with overhead of
roughly 2-8% of the processing resources of a PC-grade system.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2002 21:52:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maniatis",
"Petros",
""
],
[
"Baker",
"Mary",
""
]
] |
cs/0202007 | Slawomir J. Nasuto | Slawomir J. Nasuto and Mark J. Bishop | Steady State Resource Allocation Analysis of the Stochastic Diffusion
Search | 25 pages, 7 figures | null | null | null | cs.AI cs.NE | null | This article presents the long-term behaviour analysis of Stochastic
Diffusion Search (SDS), a distributed agent-based system for best-fit pattern
matching. SDS operates by allocating simple agents into different regions of
the search space. Agents independently pose hypotheses about the presence of
the pattern in the search space and its potential distortion. Assuming a
compositional structure of hypotheses about pattern matching agents perform an
inference on the basis of partial evidence from the hypothesised solution.
Agents posing mutually consistent hypotheses about the pattern support each
other and inhibit agents with inconsistent hypotheses. This results in the
emergence of a stable agent population identifying the desired solution.
Positive feedback via diffusion of information between the agents significantly
contributes to the speed with which the solution population is formed. The
formulation of the SDS model in terms of interacting Markov Chains enables its
characterisation in terms of the allocation of agents, or computational
resources. The analysis characterises the stationary probability distribution
of the activity of agents, which leads to the characterisation of the solution
population in terms of its similarity to the target pattern.
| [
{
"version": "v1",
"created": "Thu, 7 Feb 2002 14:11:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nasuto",
"Slawomir J.",
""
],
[
"Bishop",
"Mark J.",
""
]
] |
cs/0202008 | Mema Roussopoulos | Mema Roussopoulos and Mary Baker | CUP: Controlled Update Propagation in Peer-to-Peer Networks | 15 pages, 6 figures | null | null | null | cs.NI | null | Recently the problem of indexing and locating content in peer-to-peer
networks has received much attention. Previous work suggests caching index
entries at intermediate nodes that lie on the paths taken by search queries,
but until now there has been little focus on how to maintain these intermediate
caches. This paper proposes CUP, a new comprehensive architecture for
Controlled Update Propagation in peer-to-peer networks. CUP asynchronously
builds caches of index entries while answering search queries. It then
propagates updates of index entries to maintain these caches. Under unfavorable
conditions, when compared with standard caching based on expiration times, CUP
reduces the average miss latency by as much as a factor of three. Under
favorable conditions, CUP can reduce the average miss latency by more than a
factor of ten.
CUP refreshes intermediate caches, reduces query latency, and reduces network
load by coalescing bursts of queries for the same item. CUP controls and
confines propagation to updates whose cost is likely to be recovered by
subsequent queries. CUP gives peer-to-peer nodes the flexibility to use their
own incentive-based policies to determine when to receive and when to propagate
updates. Finally, the small propagation overhead incurred by CUP is more than
compensated for by its savings in cache misses.
| [
{
"version": "v1",
"created": "Fri, 8 Feb 2002 02:27:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roussopoulos",
"Mema",
""
],
[
"Baker",
"Mary",
""
]
] |
cs/0202009 | Patrik O. Hoyer | Patrik O. Hoyer | Non-negative sparse coding | null | null | null | null | cs.NE cs.CV | null | Non-negative sparse coding is a method for decomposing multivariate data into
non-negative sparse components. In this paper we briefly describe the
motivation behind this type of data representation and its relation to standard
sparse coding and non-negative matrix factorization. We then give a simple yet
efficient multiplicative algorithm for finding the optimal values of the hidden
components. In addition, we show how the basis vectors can be learned from the
observed data. Simulations demonstrate the effectiveness of the proposed
method.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2002 11:04:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hoyer",
"Patrik O.",
""
]
] |
cs/0202010 | Pawel Pietrzak | W. Drabent, J. Maluszynski and P. Pietrzak | Using parametric set constraints for locating errors in CLP programs | 64 pages, To appear in Theory and Practice of Logic Programming | Theory and Practice of Logic Programming, Vol 2(4&5), 2002, pp
549-611. | null | null | cs.PL | null | This paper introduces a framework of parametric descriptive directional types
for constraint logic programming (CLP). It proposes a method for locating type
errors in CLP programs and presents a prototype debugging tool. The main
technique used is checking correctness of programs w.r.t. type specifications.
The approach is based on a generalization of known methods for proving
correctness of logic programs to the case of parametric specifications.
Set-constraint techniques are used for formulating and checking verification
conditions for (parametric) polymorphic type specifications. The specifications
are expressed in a parametric extension of the formalism of term grammars. The
soundness of the method is proved and the prototype debugging tool supporting
the proposed approach is illustrated on examples.
The paper is a substantial extension of the previous work by the same authors
concerning monomorphic directional types.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2002 11:50:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Drabent",
"W.",
""
],
[
"Maluszynski",
"J.",
""
],
[
"Pietrzak",
"P.",
""
]
] |
cs/0202011 | David Bremner | David Bremner, Ferran Hurtado, Suneeta Ramaswami, and Vera Sacristan | Small Strictly Convex Quadrilateral Meshes of Point Sets | 25 pages, 23 figures. A preliminary version appeared in ISAAC 2001,
Christchurch NZ | null | null | null | cs.CG | null | In this paper, we give upper and lower bounds on the number of Steiner points
required to construct a strictly convex quadrilateral mesh for a planar point
set. In particular, we show that $3{\lfloor\frac{n}{2}\rfloor}$ internal
Steiner points are always sufficient for a convex quadrilateral mesh of $n$
points in the plane. Furthermore, for any given $n\geq 4$, there are point sets
for which $\lceil\frac{n-3}{2}\rceil-1$ Steiner points are necessary for a
convex quadrilateral mesh.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2002 14:11:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bremner",
"David",
""
],
[
"Hurtado",
"Ferran",
""
],
[
"Ramaswami",
"Suneeta",
""
],
[
"Sacristan",
"Vera",
""
]
] |
cs/0202012 | Michael Leuschel | Michael Leuschel and Maurice Bruynooghe | Logic program specialisation through partial deduction: Control issues | To appear in Theory and Practice of Logic Programming | null | null | null | cs.PL cs.AI | null | Program specialisation aims at improving the overall performance of programs
by performing source to source transformations. A common approach within
functional and logic programming, known respectively as partial evaluation and
partial deduction, is to exploit partial knowledge about the input. It is
achieved through a well-automated application of parts of the
Burstall-Darlington unfold/fold transformation framework. The main challenge in
developing systems is to design automatic control that ensures correctness,
efficiency, and termination. This survey and tutorial presents the main
developments in controlling partial deduction over the past 10 years and
analyses their respective merits and shortcomings. It ends with an assessment
of current achievements and sketches some remaining research challenges.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2002 14:16:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leuschel",
"Michael",
""
],
[
"Bruynooghe",
"Maurice",
""
]
] |
cs/0202013 | Jim Gray | Alexander S. Szalay, Jim Gray, Ani R. Thakar, Peter Z. Kunszt, Tanu
Malik, Jordan Raddick, Christopher Stoughton, Jan vandenBerg | The SDSS SkyServer: Public Access to the Sloan Digital Sky Server Data | 12 pages, original word document at
http://research.microsoft.com/~gray/Papers/MSR_TR_01_104_SkyServer.doc | ACM SIGMOD 2002 proceedings | null | MSR TR 01 104 | cs.DL cs.DB | null | The SkyServer provides Internet access to the public Sloan Digi-tal Sky
Survey (SDSS) data for both astronomers and for science education. This paper
describes the SkyServer goals and archi-tecture. It also describes our
experience operating the SkyServer on the Internet. The SDSS data is public and
well-documented so it makes a good test platform for research on database
algorithms and performance.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2002 23:16:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szalay",
"Alexander S.",
""
],
[
"Gray",
"Jim",
""
],
[
"Thakar",
"Ani R.",
""
],
[
"Kunszt",
"Peter Z.",
""
],
[
"Malik",
"Tanu",
""
],
[
"Raddick",
"Jordan",
""
],
[
"Stoughton",
"Christopher",
""
],
[
"vandenBerg",
"Jan",
""
]
] |
cs/0202014 | Jim Gray | Jim Gray, Alex S. Szalay, Ani R. Thakar, Peter Z. Kunszt, Christopher
Stoughton, Don Slutz, Jan vandenBerg | Data Mining the SDSS SkyServer Database | 40 pages, Original source is at
http://research.microsoft.com/~gray/Papers/MSR_TR_O2_01_20_queries.doc | null | null | Microsoft Tech Report MSR TR 02 01 | cs.DB cs.DL | null | An earlier paper (Szalay et. al. "Designing and Mining MultiTerabyte
Astronomy Archives: The Sloan Digital Sky Survey," ACM SIGMOD 2000) described
the Sloan Digital Sky Survey's (SDSS) data management needs by defining twenty
database queries and twelve data visualization tasks that a good data
management system should support. We built a database and interfaces to support
both the query load and also a website for ad-hoc access. This paper reports on
the database design, describes the data loading pipeline, and reports on the
query implementation and performance. The queries typically translated to a
single SQL statement. Most queries run in less than 20 seconds, allowing
scientists to interactively explore the database. This paper is an in-depth
tour of those queries. Readers should first have studied the companion overview
paper Szalay et. al. "The SDSS SkyServer, Public Access to the Sloan Digital
Sky Server Data" ACM SIGMOND 2002.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2002 23:47:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex S.",
""
],
[
"Thakar",
"Ani R.",
""
],
[
"Kunszt",
"Peter Z.",
""
],
[
"Stoughton",
"Christopher",
""
],
[
"Slutz",
"Don",
""
],
[
"vandenBerg",
"Jan",
""
]
] |
cs/0202015 | Daniel Lehmann | Benny Lehmann, Daniel Lehmann and Noam Nisan | Combinatorial Auctions with Decreasing Marginal Utilities | To appear in GEB. Preliminary version appeared in EC'01 | Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296 | 10.1016/j.geb2005.02.006 | Leibniz Center for Research in Computer Science TR-2002-15, April
2002 | cs.GT | null | In most of microeconomic theory, consumers are assumed to exhibit decreasing
marginal utilities. This paper considers combinatorial auctions among such
submodular buyers. The valuations of such buyers are placed within a hierarchy
of valuations that exhibit no complementarities, a hierarchy that includes also
OR and XOR combinations of singleton valuations, and valuations satisfying the
gross substitutes property. Those last valuations are shown to form a
zero-measure subset of the submodular valuations that have positive measure.
While we show that the allocation problem among submodular valuations is
NP-hard, we present an efficient greedy 2-approximation algorithm for this case
and generalize it to the case of limited complementarities. No such
approximation algorithm exists in a setting allowing for arbitrary
complementarities. Some results about strategic aspects of combinatorial
auctions among players with decreasing marginal utilities are also presented.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2002 10:18:30 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2002 12:50:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Benny",
""
],
[
"Lehmann",
"Daniel",
""
],
[
"Nisan",
"Noam",
""
]
] |
cs/0202016 | Daniel Lehmann | Rica Gonen and Daniel Lehmann | Linear Programming helps solving large multi-unit combinatorial auctions | null | null | null | Leibniz Center for Research in Computer Science TR-2001-8 | cs.GT cs.AI | null | Previous works suggested the use of Branch and Bound techniques for finding
the optimal allocation in (multi-unit) combinatorial auctions. They remarked
that Linear Programming could provide a good upper-bound to the optimal
allocation, but they went on using lighter and less tight upper-bound
heuristics, on the ground that LP was too time-consuming to be used
repetitively to solve large combinatorial auctions. We present the results of
extensive experiments solving large (multi-unit) combinatorial auctions
generated according to distributions proposed by different researchers. Our
surprising conclusion is that Linear Programming is worth using. Investing
almost all of one's computing time in using LP to bound from above the value of
the optimal solution in order to prune aggressively pays off. We present a way
to save on the number of calls to the LP routine and experimental results
comparing different heuristics for choosing the bid to be considered next.
Those results show that the ordering based on the square root of the size of
the bids that was shown to be theoretically optimal in a previous paper by the
authors performs surprisingly better than others in practice. Choosing to deal
first with the bid with largest coefficient (typically 1) in the optimal
solution of the relaxed LP problem, is also a good choice. The gap between the
lower bound provided by greedy heuristics and the upper bound provided by LP is
typically small and pruning is therefore extensive. For most distributions,
auctions of a few hundred goods among a few thousand bids can be solved in
practice. All experiments were run on a PC under Matlab.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2002 12:09:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gonen",
"Rica",
""
],
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202017 | Daniel Lehmann | Daniel Lehmann, Liadan Ita O'Callaghan and Yoav Shoham | Truth Revelation in Approximately Efficient Combinatorial Auctions | Submitted to a Journal. A preliminary version appeared in EC'99 | Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602 | null | Stanford University CS-TN-99-88 | cs.GT | null | Some important classical mechanisms considered in Microeconomics and Game
Theory require the solution of a difficult optimization problem. This is true
of mechanisms for combinatorial auctions, which have in recent years assumed
practical importance, and in particular of the gold standard for combinatorial
auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these
mechanisms - in particular, their truth revelation properties - assumes that
the optimization problems are solved precisely. In reality, these optimization
problems can usually be solved only in an approximate fashion. We investigate
the impact on such mechanisms of replacing exact solutions by approximate ones.
Specifically, we look at a particular greedy optimization method. We show that
the GVA payment scheme does not provide for a truth revealing mechanism. We
introduce another scheme that does guarantee truthfulness for a restricted
class of players. We demonstrate the latter property by identifying natural
properties for combinatorial auctions and showing that, for our restricted
class of players, they imply that truthful strategies are dominant. Those
properties have applicability beyond the specific auction studied.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2002 12:24:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
],
[
"O'Callaghan",
"Liadan Ita",
""
],
[
"Shoham",
"Yoav",
""
]
] |
cs/0202018 | Daniel Lehmann | Daniel Lehmann | Nonmonotonic Logics and Semantics | 28 pages. Misprint corrected 15/04/02 | Journal of Logic and Computation, Vol. 11 No.2, pp.229-256 2001 | null | Leibniz Center for Research in Computer Science TR-98-6 | cs.AI cs.LO math.LO | null | Tarski gave a general semantics for deductive reasoning: a formula a may be
deduced from a set A of formulas iff a holds in all models in which each of the
elements of A holds. A more liberal semantics has been considered: a formula a
may be deduced from a set A of formulas iff a holds in all of the "preferred"
models in which all the elements of A hold. Shoham proposed that the notion of
"preferred" models be defined by a partial ordering on the models of the
underlying language. A more general semantics is described in this paper, based
on a set of natural properties of choice functions. This semantics is here
shown to be equivalent to a semantics based on comparing the relative
"importance" of sets of models, by what amounts to a qualitative probability
measure. The consequence operations defined by the equivalent semantics are
then characterized by a weakening of Tarski's properties in which the
monotonicity requirement is replaced by three weaker conditions. Classical
propositional connectives are characterized by natural introduction-elimination
rules in a nonmonotonic setting. Even in the nonmonotonic setting, one obtains
classical propositional logic, thus showing that monotonicity is not required
to justify classical propositional connectives.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2002 12:49:11 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Apr 2002 19:49:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202021 | Daniel Lehmann | Sarit Kraus, Daniel Lehmann and Menachem Magidor | Nonmonotonic Reasoning, Preferential Models and Cumulative Logics | Presented at JELIA, June 1988. Some misprints in the Journal paper
have been corrected | Journal of Artificial Intelligence, Vol. 44 Nos. 1-2 (July 1990)
pp. 167-207 | null | Leibniz Center for Research in Computer Science TR-88-15 | cs.AI | null | Many systems that exhibit nonmonotonic behavior have been described and
studied already in the literature. The general notion of nonmonotonic
reasoning, though, has almost always been described only negatively, by the
property it does not enjoy, i.e. monotonicity. We study here general patterns
of nonmonotonic reasoning and try to isolate properties that could help us map
the field of nonmonotonic reasoning by reference to positive properties. We
concentrate on a number of families of nonmonotonic consequence relations,
defined in the style of Gentzen. Both proof-theoretic and semantic points of
view are developed in parallel. The former point of view was pioneered by D.
Gabbay, while the latter has been advocated by Y. Shoham in. Five such families
are defined and characterized by representation theorems, relating the two
points of view. One of the families of interest, that of preferential
relations, turns out to have been studied by E. Adams. The "preferential"
models proposed here are a much stronger tool than Adams' probabilistic
semantics. The basic language used in this paper is that of propositional
logic. The extension of our results to first order predicate calculi and the
study of the computational complexity of the decision problems described in
this paper will be treated in another paper.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2002 10:29:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kraus",
"Sarit",
""
],
[
"Lehmann",
"Daniel",
""
],
[
"Magidor",
"Menachem",
""
]
] |
cs/0202022 | Daniel Lehmann | Daniel Lehmann and Menachem Magidor | What does a conditional knowledge base entail? | Preliminary version presented at KR'89. Minor corrections of the
Journal Version | Journal of Artificial Intelligence, Vol. 55 no.1 (May 1992) pp.
1-60. Erratum in Vol. 68 (1994) p. 411 | null | Leibniz Center for Research in Computer Science TR-88-16 and
TR-90-10 | cs.AI | null | This paper presents a logical approach to nonmonotonic reasoning based on the
notion of a nonmonotonic consequence relation. A conditional knowledge base,
consisting of a set of conditional assertions of the type "if ... then ...",
represents the explicit defeasible knowledge an agent has about the way the
world generally behaves. We look for a plausible definition of the set of all
conditional assertions entailed by a conditional knowledge base. In a previous
paper, S. Kraus and the authors defined and studied "preferential" consequence
relations. They noticed that not all preferential relations could be considered
as reasonable inference procedures. This paper studies a more restricted class
of consequence relations, "rational" relations. It is argued that any
reasonable nonmonotonic inference procedure should define a rational relation.
It is shown that the rational relations are exactly those that may be
represented by a "ranked" preferential model, or by a (non-standard)
probabilistic model. The rational closure of a conditional knowledge base is
defined and shown to provide an attractive answer to the question of the title.
Global properties of this closure operation are proved: it is a cumulative
operation. It is also computationally tractable. This paper assumes the
underlying language is propositional.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2002 12:43:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
],
[
"Magidor",
"Menachem",
""
]
] |
cs/0202023 | Daniel Lehmann | Daniel Lehmann | Expected Qualitative Utility Maximization | Small correction in Section 4 | Games and Economic Behavior, Vol. 35, No. 1-2 (April 2001) pp.
54-79 | null | Leibniz Center for Research in Computer Science TR-97-15 | cs.GT | null | A model for decision making that generalizes Expected Utility Maximization is
presented. This model, Expected Qualitative Utility Maximization, encompasses
the Maximin criterion. It relaxes both the Independence and the Continuity
postulates. Its main ingredient is the definition of a qualitative order on
nonstandard models of the real numbers and the consideration of nonstandard
utilities. Expected Qualitative Utility Maximization is characterized by an
original weakening of von Neumann-Morgenstern's postulates. Subjective
probabilities may be defined from those weakened postulates, as Anscombe and
Aumann did from the original postulates. Subjective probabilities are numbers,
not matrices as in the Subjective Expected Lexicographic Utility approach. JEL
no.: D81 Keywords: Utility Theory, Non-Standard Utilities, Qualitative Decision
Theory
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2002 14:55:49 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Feb 2002 13:32:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202024 | Daniel Lehmann | Daniel Lehmann | A note on Darwiche and Pearl | A small unpublished remark on a paper by Darwiche and Pearl | null | null | null | cs.AI | null | It is shown that Darwiche and Pearl's postulates imply an interesting
property, not noticed by the authors.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2002 15:23:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202025 | Daniel Lehmann | Daniel Lehmann, Menachem Magidor and Karl Schlechta | Distance Semantics for Belief Revision | Preliminary version presented at TARK '96 | Journal of Symbolic Logic, Vol. 66 No.1 (March 2001) pp. 295-317 | null | Leibniz Center for Research in Computer Science TR-98-10 | cs.AI | null | A vast and interesting family of natural semantics for belief revision is
defined. Suppose one is given a distance d between any two models. One may then
define the revision of a theory K by a formula a as the theory defined by the
set of all those models of a that are closest, by d, to the set of models of K.
This family is characterized by a set of rationality postulates that extends
the AGM postulates. The new postulates describe properties of iterated
revisions.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2002 15:36:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
],
[
"Magidor",
"Menachem",
""
],
[
"Schlechta",
"Karl",
""
]
] |
cs/0202026 | Daniel Lehmann | Shai Berger, Daniel Lehmann and Karl Schlechta | Preferred History Semantics for Iterated Updates | null | Journal of Logic and Computation, Vol. 9 no. 6 (1999) pp. 817-833 | null | Leibniz Center for Research in Computer SCience TR-98-11 (July 1998) | cs.AI | null | We give a semantics to iterated update by a preference relation on possible
developments. An iterated update is a sequence of formulas, giving (incomplete)
information about successive states of the world. A development is a sequence
of models, describing a possible trajectory through time. We assume a principle
of inertia and prefer those developments, which are compatible with the
information, and avoid unnecessary changes. The logical properties of the
updates defined in this way are considered, and a representation result is
proved.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2002 15:53:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berger",
"Shai",
""
],
[
"Lehmann",
"Daniel",
""
],
[
"Schlechta",
"Karl",
""
]
] |
cs/0202027 | Naren Ramakrishnan | Alex Verstak, Naren Ramakrishnan, Layne T. Watson, Jian He, Clifford
A. Shaffer, Kyung Kyoon Bae, Jing Jiang, William H. Tranter, Theodore S.
Rappaport | BSML: A Binding Schema Markup Language for Data Interchange in Problem
Solving Environments (PSEs) | null | null | null | null | cs.CE cs.SE | null | We describe a binding schema markup language (BSML) for describing data
interchange between scientific codes. Such a facility is an important
constituent of scientific problem solving environments (PSEs). BSML is designed
to integrate with a PSE or application composition system that views model
specification and execution as a problem of managing semistructured data. The
data interchange problem is addressed by three techniques for processing
semistructured data: validation, binding, and conversion. We present BSML and
describe its application to a PSE for wireless communications system design.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2002 16:01:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Verstak",
"Alex",
""
],
[
"Ramakrishnan",
"Naren",
""
],
[
"Watson",
"Layne T.",
""
],
[
"He",
"Jian",
""
],
[
"Shaffer",
"Clifford A.",
""
],
[
"Bae",
"Kyung Kyoon",
""
],
[
"Jiang",
"Jing",
""
],
[
"Tranter",
"William H.",
""
],
[
"Rappaport",
"Theodore S.",
""
]
] |
cs/0202028 | Daniel Lehmann | Daniel Lehmann | Classes of service under perfect competition and technological change: a
model for the dynamics of the Internet? | Extended abstract in Proceedings of EC'01 | null | null | Leibniz Center for Research in Computer Science: TR-2000-42 | cs.GT | null | Certain services may be provided in a continuous, one-dimensional, ordered
range of different qualities and a customer requiring a service of quality q
can only be offered a quality superior or equal to q. Only a discrete set of
different qualities will be offered, and a service provider will provide the
same service (of fixed quality b) to all customers requesting qualities of
service inferior or equal to b. Assuming all services (of quality b) are priced
identically, a monopolist will choose the qualities of service and the prices
that maximize profit but, under perfect competition, a service provider will
choose the (inferior) quality of service that can be priced at the lowest
price. Assuming significant economies of scale, two fundamentally different
regimes are possible: either a number of different classes of service are
offered (DC regime), or a unique class of service offers an unbounded quality
of service (UC regime). The DC regime appears in one of two sub-regimes: one,
BDC, in which a finite number of classes is offered, the qualities of service
offered are bounded and requests for high-quality services are not met, or UDC
in which an infinite number of classes of service are offered and every request
is met. The types of the demand curve and of the economies of scale, not the
pace of technological change, determine the regime and the class boundaries.
The price structure in the DC regime obeys very general laws.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2002 11:53:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202029 | Daniel Lehmann | Daniel Lehmann | Nonstandard numbers for qualitative decision making | 14 pages. Presented at TARK'98 | Proceedings of the 7th Conference on Theoretical Aspects of
Reasoning and Knowledge, I. Gilboa ed., Evanston Ill., July 1998, pp. 161-174 | null | Leibniz Center for Research in Computer Science: TR-97-15 | cs.GT | null | The consideration of nonstandard models of the real numbers and the
definition of a qualitative ordering on those models provides a generalization
of the principle of maximization of expected utility. It enables the decider to
assign probabilities of different orders of magnitude to different events or to
assign utilities of different orders of magnitude to different outcomes. The
properties of this generalized notion of rationality are studied in the
frameworks proposed by von Neumann and Morgenstern and later by Anscombe and
Aumann. It is characterized by an original weakening of their postulates in two
different situations: nonstandard probabilities and standard utilities on one
hand and standard probabilities and nonstandard utilities on the other hand.
This weakening concerns both Independence and Continuity. It is orthogonal with
the weakening proposed by lexicographic orderings.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2002 12:59:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202030 | Daniel Lehmann | Daniel Lehmann | Generalized Qualitative Probability: Savage revisited | Presented at UAI'96 | Twelfth Conference on Uncertainty in Artificial Intelligence, E.
Horvitz and F. Jensen eds., Morgan Kaufmann, pp. 381-388, Portland, Oregon,
August 1996 | null | null | cs.GT cs.AI | null | Preferences among acts are analyzed in the style of L. Savage, but as
partially ordered. The rationality postulates considered are weaker than
Savage's on three counts. The Sure Thing Principle is derived in this setting.
The postulates are shown to lead to a characterization of generalized
qualitative probability that includes and blends both traditional qualitative
probability and the ranked structures used in logical approaches.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2002 13:48:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202031 | Daniel Lehmann | Michael Freund and Daniel Lehmann | Nonmonotonic inference operations | 54 pages. A short version appeared in Studia Logica, Vol. 53 no. 2
(1994) pp. 161-201 | Bulletin of the IGPL, Vol. 1 no. 1 (July 1993), pp. 23-68 | null | Leibniz Center for Research in Computer Science: TR-92-2 | cs.AI | null | A. Tarski proposed the study of infinitary consequence operations as the
central topic of mathematical logic. He considered monotonicity to be a
property of all such operations. In this paper, we weaken the monotonicity
requirement and consider more general operations, inference operations. These
operations describe the nonmonotonic logics both humans and machines seem to be
using when infering defeasible information from incomplete knowledge. We single
out a number of interesting families of inference operations. This study of
infinitary inference operations is inspired by the results of Kraus, Lehmann
and Magidor on finitary nonmonotonic operations, but this paper is
self-contained.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2002 14:19:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Freund",
"Michael",
""
],
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202032 | Daniel Lehmann | Rica Gonen and Daniel Lehmann | Optimal Solutions for Multi-Unit Combinatorial Auctions: Branch and
Bound Heuristics | Presented at EC'00 | Second ACM Conference on Electronic Commerce (EC'00) Minneapolis,
Minnesota, October 2000, pp. 13-20 | null | null | cs.GT cs.AI | null | Finding optimal solutions for multi-unit combinatorial auctions is a hard
problem and finding approximations to the optimal solution is also hard. We
investigate the use of Branch-and-Bound techniques: they require both a way to
bound from above the value of the best allocation and a good criterion to
decide which bids are to be tried first. Different methods for efficiently
bounding from above the value of the best allocation are considered.
Theoretical original results characterize the best approximation ratio and the
ordering criterion that provides it. We suggest to use this criterion.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2002 14:38:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gonen",
"Rica",
""
],
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202033 | Daniel Lehmann | Daniel Lehmann | The logical meaning of Expansion | 9 pages. Unpublished | null | null | null | cs.AI | null | The Expansion property considered by researchers in Social Choice is shown to
correspond to a logical property of nonmonotonic consequence relations that is
the {\em pure}, i.e., not involving connectives, version of a previously known
weak rationality condition. The assumption that the union of two definable sets
of models is definable is needed for the soundness part of the result.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2002 14:50:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202034 | Daniel Lehmann | Elie Bienenstock and Daniel Lehmann | Covariance Plasticity and Regulated Criticality | 35 pages, 8 figures | Advances in Complex Systems, 1(4) (1998) pp. 361-384 | null | Center for Neural Computation, Hebrew University, Jerusalem TR-95-1 | cs.NE cs.AI nlin.AO q-bio | null | We propose that a regulation mechanism based on Hebbian covariance plasticity
may cause the brain to operate near criticality. We analyze the effect of such
a regulation on the dynamics of a network with excitatory and inhibitory
neurons and uniform connectivity within and across the two populations. We show
that, under broad conditions, the system converges to a critical state lying at
the common boundary of three regions in parameter space; these correspond to
three modes of behavior: high activity, low activity, oscillation.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2002 17:12:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bienenstock",
"Elie",
""
],
[
"Lehmann",
"Daniel",
""
]
] |
cs/0202035 | Kamal Karlapalem | Satyanarayana R Valluri, Soujanya Vadapalli, Kamalakar Karlapalem | Sprinkling Selections over Join DAGs for Efficient Query Optimization | 12 Pages | null | null | null | cs.DB | null | In optimizing queries, solutions based on AND/OR DAG can generate all
possible join orderings and select placements before searching for optimal
query execution strategy. But as the number of joins and selection conditions
increase, the space and time complexity to generate optimal query plan
increases exponentially. In this paper, we use join graph for a relational
database schema to either pre-compute all possible join orderings that can be
executed and store it as a join DAG or, extract joins in the queries to
incrementally build a history join DAG as and when the queries are executed.
The select conditions in the queries are appropriately placed in the retrieved
join DAG (or, history join DAG) to generate optimal query execution strategy.
We experimentally evaluate our query optimization technique on TPC-D/H query
sets to show their effectiveness over AND/OR DAG query optimization strategy.
Finally, we illustrate how our technique can be used for efficient multiple
query optimization and selection of materialized views in data warehousing
environments.
| [
{
"version": "v1",
"created": "Thu, 21 Feb 2002 05:23:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Valluri",
"Satyanarayana R",
""
],
[
"Vadapalli",
"Soujanya",
""
],
[
"Karlapalem",
"Kamalakar",
""
]
] |
cs/0202036 | Elmar Boehler | E. Boehler, E. Hemaspaandra, Steffen Reith, Heribert Vollmer | Equivalence and Isomorphism for Boolean Constraint Satisfaction | null | null | null | null | cs.CC cs.LO | null | A Boolean constraint satisfaction instance is a conjunction of constraint
applications, where the allowed constraints are drawn from a fixed set B of
Boolean functions. We consider the problem of determining whether two given
constraint satisfaction instances are equivalent and prove a Dichotomy Theorem
by showing that for all sets C of allowed constraints, this problem is either
polynomial-time solvable or coNP-complete, and we give a simple criterion to
determine which case holds.
A more general problem addressed in this paper is the isomorphism problem,
the problem of determining whether there exists a renaming of the variables
that makes two given constraint satisfaction instances equivalent in the above
sense. We prove that this problem is coNP-hard if the corresponding equivalence
problem is coNP-hard, and polynomial-time many-one reducible to the graph
isomorphism problem in all other cases.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2002 15:38:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boehler",
"E.",
""
],
[
"Hemaspaandra",
"E.",
""
],
[
"Reith",
"Steffen",
""
],
[
"Vollmer",
"Heribert",
""
]
] |
cs/0202037 | Jan Van den Bussche | Jan Van den Bussche, Stijn Vansummeren, Gottfried Vossen | Towards practical meta-querying | Includes a new section "Experimental performance evaluation" | Information Systems, Volume 30, Issue 4 , June 2005, Pages 317-332 | 10.1016/j.is.2004.04.001 | null | cs.DB | null | We describe a meta-querying system for databases containing queries in
addition to ordinary data. In the context of such databases, a meta-query is a
query about queries. Representing stored queries in XML, and using the standard
XML manipulation language XSLT as a sublanguage, we show that just a few
features need to be added to SQL to turn it into a fully-fledged meta-query
language. The good news is that these features can be directly supported by
extensible database technology.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2002 19:35:12 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Oct 2003 12:29:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bussche",
"Jan Van den",
""
],
[
"Vansummeren",
"Stijn",
""
],
[
"Vossen",
"Gottfried",
""
]
] |
cs/0202038 | Leszczynski | Leszczynski Jacek, Pluta Sebastian | The efficient generation of unstructured control volumes in 2D and 3D | 8 pages, 2 figures, Parallel Processing and Applied Mathematics
(PPAM2001) Conference, under publishing in Lecture Notes in Computer Science,
Springer Verlag | Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2328,
2001, pp. 682-689 | null | null | cs.CG cs.CE cs.NA math.NA physics.comp-ph | null | Many problems in engineering, chemistry and physics require the
representation of solutions in complex geometries. In the paper we deal with a
problem of unstructured mesh generation for the control volume method. We
propose an algorithm which bases on the spheres generation in central points of
the control volumes.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2002 16:32:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jacek",
"Leszczynski",
""
],
[
"Sebastian",
"Pluta",
""
]
] |
cs/0203001 | Laemmel | Ralf Laemmel | Towards Generic Refactoring | null | null | null | null | cs.PL | null | We study program refactoring while considering the language or even the
programming paradigm as a parameter. We use typed functional programs, namely
Haskell programs, as the specification medium for a corresponding refactoring
framework. In order to detach ourselves from language syntax, our
specifications adhere to the following style. (I) As for primitive algorithms
for program analysis and transformation, we employ generic function combinators
supporting generic traversal and polymorphic functions refined by ad-hoc cases.
(II) As for the language abstractions involved in refactorings, we design a
dedicated multi-parameter class. This class can be instantiated for
abstractions as present in various languages, e.g., Java, Prolog or Haskell.
| [
{
"version": "v1",
"created": "Fri, 1 Mar 2002 11:58:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Laemmel",
"Ralf",
""
]
] |
cs/0203002 | Daniel Lehmann | Daniel Lehmann | Another perspective on Default Reasoning | Presented at Workshop on Logical Formalizations of Commense Sense,
Austin (Texas), January 1993 | Annals of Mathematics and Artificial Intelligence, 15(1) (1995)
pp. 61-82 | null | Leibniz Center for Research in Computer Science TR-92-12, July 1992 | cs.AI | null | The lexicographic closure of any given finite set D of normal defaults is
defined. A conditional assertion "if a then b" is in this lexicographic closure
if, given the defaults D and the fact a, one would conclude b. The
lexicographic closure is essentially a rational extension of D, and of its
rational closure, defined in a previous paper. It provides a logic of normal
defaults that is different from the one proposed by R. Reiter and that is rich
enough not to require the consideration of non-normal defaults. A large number
of examples are provided to show that the lexicographic closure corresponds to
the basic intuitions behind Reiter's logic of defaults.
| [
{
"version": "v1",
"created": "Fri, 1 Mar 2002 11:06:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] |
cs/0203003 | Daniel Lehmann | Yuri Kaluzhny and Daniel Lehmann | Deductive Nonmonotonic Inference Operations: Antitonic Representations | null | Journal of Logic and Computation, 5(1) (1995) pp. 111-122 | null | Leibniz Center for Research in Computer Science TR-94-3, March 1994 | cs.AI | null | We provide a characterization of those nonmonotonic inference operations C
for which C(X) may be described as the set of all logical consequences of X
together with some set of additional assumptions S(X) that depends
anti-monotonically on X (i.e., X is a subset of Y implies that S(Y) is a subset
of S(X)). The operations represented are exactly characterized in terms of
properties most of which have been studied in Freund-Lehmann(cs.AI/0202031).
Similar characterizations of right-absorbing and cumulative operations are also
provided. For cumulative operations, our results fit in closely with those of
Freund. We then discuss extending finitary operations to infinitary operations
in a canonical way and discuss co-compactness properties. Our results provide a
satisfactory notion of pseudo-compactness, generalizing to deductive
nonmonotonic operations the notion of compactness for monotonic operations.
They also provide an alternative, more elegant and more general, proof of the
existence of an infinitary deductive extension for any finitary deductive
operation (Theorem 7.9 of Freund-Lehmann).
| [
{
"version": "v1",
"created": "Fri, 1 Mar 2002 11:20:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kaluzhny",
"Yuri",
""
],
[
"Lehmann",
"Daniel",
""
]
] |
cs/0203004 | Daniel Lehmann | Daniel Lehmann | Stereotypical Reasoning: Logical Properties | Presented at Fourth Workshop on Logic, Language, Information and
Computation, Fortaleza (Brasil), August 1997 | Logic Journal of the Interest Group in Pure and Applied Logics
(IGPL), 6(1) (1998) pp. 49-58 | null | Leibniz Center for Research in Computer Science TR-97-10 | cs.AI | null | Stereotypical reasoning assumes that the situation at hand is one of a kind
and that it enjoys the properties generally associated with that kind of
situation. It is one of the most basic forms of nonmonotonic reasoning. A
formal model for stereotypical reasoning is proposed and the logical properties
of this form of reasoning are studied. Stereotypical reasoning is shown to be
cumulative under weak assumptions.
| [
{
"version": "v1",
"created": "Mon, 4 Mar 2002 08:57:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] |
cs/0203005 | Torsten Schaub | J. P. Delgrande, T. Schaub, and H. Tompits | A Framework for Compiling Preferences in Logic Programs | To appear in Theory and Practice of Logic Programming | null | null | null | cs.AI | null | We introduce a methodology and framework for expressing general preference
information in logic programming under the answer set semantics. An ordered
logic program is an extended logic program in which rules are named by unique
terms, and in which preferences among rules are given by a set of atoms of form
s < t where s and t are names. An ordered logic program is transformed into a
second, regular, extended logic program wherein the preferences are respected,
in that the answer sets obtained in the transformed program correspond with the
preferred answer sets of the original program. Our approach allows the
specification of dynamic orderings, in which preferences can appear arbitrarily
within a program. Static orderings (in which preferences are external to a
logic program) are a trivial restriction of the general dynamic case. First, we
develop a specific approach to reasoning with preferences, wherein the
preference ordering specifies the order in which rules are to be applied. We
then demonstrate the wide range of applicability of our framework by showing
how other approaches, among them that of Brewka and Eiter, can be captured
within our framework. Since the result of each of these transformations is an
extended logic program, we can make use of existing implementations, such as
dlv and smodels. To this end, we have developed a publicly available compiler
as a front-end for these programming systems.
| [
{
"version": "v1",
"created": "Mon, 4 Mar 2002 13:00:41 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Mar 2002 14:01:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Delgrande",
"J. P.",
""
],
[
"Schaub",
"T.",
""
],
[
"Tompits",
"H.",
""
]
] |
cs/0203006 | Ernesto Pimentel | Juan M. Molina and Ernesto Pimentel | Composing Programs in a Rewriting Logic for Declarative Programming | 47 pages. A shorter version (33 pages) will appear in the Journal of
Theory and Practice of Logic Programming | null | null | LCC852 | cs.LO cs.PL | null | Constructor-Based Conditional Rewriting Logic is a general framework for
integrating first-order functional and logic programming which gives an
algebraic semantics for non-deterministic functional-logic programs. In the
context of this formalism, we introduce a simple notion of program module as an
open program which can be extended together with several mechanisms to combine
them. These mechanisms are based on a reduced set of operations. However, the
high expressiveness of these operations enable us to model typical constructs
for program modularization like hiding, export/import,
genericity/instantiation, and inheritance in a simple way. We also deal with
the semantic aspects of the proposal by introducing an immediate consequence
operator, and studying several alternative semantics for a program module,
based on this operator, in the line of logic programming: the operator itself,
its least fixpoint (the least model of the module), the set of its
pre-fixpoints (term models of the module), and some other variations in order
to find a compositional and fully abstract semantics wrt the set of operations
and a natural notion of observability.
| [
{
"version": "v1",
"created": "Mon, 4 Mar 2002 19:02:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Molina",
"Juan M.",
""
],
[
"Pimentel",
"Ernesto",
""
]
] |
cs/0203007 | Yan Zhang | Yan Zhang | Two results for proiritized logic programming | 20 pages, to be appeared in journal Theory and Practice of Logic
Programming | null | null | null | cs.AI | null | Prioritized default reasoning has illustrated its rich expressiveness and
flexibility in knowledge representation and reasoning. However, many important
aspects of prioritized default reasoning have yet to be thoroughly explored. In
this paper, we investigate two properties of prioritized logic programs in the
context of answer set semantics. Specifically, we reveal a close relationship
between mutual defeasibility and uniqueness of the answer set for a prioritized
logic program. We then explore how the splitting technique for extended logic
programs can be extended to prioritized logic programs. We prove splitting
theorems that can be used to simplify the evaluation of a prioritized logic
program under certain conditions.
| [
{
"version": "v1",
"created": "Tue, 5 Mar 2002 00:28:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Yan",
""
]
] |
cs/0203008 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 43 | 3 pages, 1 figure | SIGACT News, 33(1) Issue 122, Mar. 2002, 58-60 | null | null | cs.CG cs.DM | null | The concept of pointed pseudo-triangulations is defined and a few of its
applications described.
| [
{
"version": "v1",
"created": "Wed, 6 Mar 2002 13:49:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0203009 | Judith Beumer | O. S. Matlin, E. Lusk, and W. McCune | SPINning Parallel Systems Software | 19 pages; 8 figures; 3 tables | null | null | ANL/MCS-P921-1201 | cs.LO cs.DC | null | We describe our experiences in using SPIN to verify parts of the Multi
Purpose Daemon (MPD) parallel process management system. MPD is a distributed
collection of processes connected by Unix network sockets. MPD is dynamic:
processes and connections among them are created and destroyed as MPD is
initialized, runs user processes, recovers from faults, and terminates. This
dynamic nature is easily expressible in the SPIN/PROMELA framework but poses
performance and scalability challenges. We present here the results of
expressing some of the parallel algorithms of MPD and executing both simulation
and verification runs with SPIN.
| [
{
"version": "v1",
"created": "Wed, 6 Mar 2002 18:15:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Matlin",
"O. S.",
""
],
[
"Lusk",
"E.",
""
],
[
"McCune",
"W.",
""
]
] |
cs/0203010 | Luis Nunes | L. Nunes, E. Oliveira | On Learning by Exchanging Advice | 12 pages, 6 figures, 1 table, accepted in Second Symposium on
Adaptive Agents and Multi-Agent Systems (AAMAS-II), 2002 | null | null | null | cs.LG cs.MA | null | One of the main questions concerning learning in Multi-Agent Systems is:
(How) can agents benefit from mutual interaction during the learning process?.
This paper describes the study of an interactive advice-exchange mechanism as a
possible way to improve agents' learning performance. The advice-exchange
technique, discussed here, uses supervised learning (backpropagation), where
reinforcement is not directly coming from the environment but is based on
advice given by peers with better performance score (higher confidence), to
enhance the performance of a heterogeneous group of Learning Agents (LAs). The
LAs are facing similar problems, in an environment where only reinforcement
information is available. Each LA applies a different, well known, learning
technique: Random Walk (hill-climbing), Simulated Annealing, Evolutionary
Algorithms and Q-Learning. The problem used for evaluation is a simplified
traffic-control simulation. Initial results indicate that advice-exchange can
improve learning speed, although bad advice and/or blind reliance can disturb
the learning performance.
| [
{
"version": "v1",
"created": "Thu, 7 Mar 2002 10:16:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nunes",
"L.",
""
],
[
"Oliveira",
"E.",
""
]
] |
cs/0203011 | Stuart E. Middleton | S.E. Middleton, D.C. De Roure, N.R. Shadbolt | Capturing Knowledge of User Preferences: ontologies on recommender
systems | First international conference on Knowledge Capture 2001, 8 pages | null | null | null | cs.LG cs.MA | null | Tools for filtering the World Wide Web exist, but they are hampered by the
difficulty of capturing user preferences in such a dynamic environment. We
explore the acquisition of user profiles by unobtrusive monitoring of browsing
behaviour and application of supervised machine-learning techniques coupled
with an ontological representation to extract user preferences. A multi-class
approach to paper classification is used, allowing the paper topic taxonomy to
be utilised during profile construction. The Quickstep recommender system is
presented and two empirical studies evaluate it in a real work setting,
measuring the effectiveness of using a hierarchical topic ontology compared
with an extendable flat list.
| [
{
"version": "v1",
"created": "Fri, 8 Mar 2002 15:58:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Middleton",
"S. E.",
""
],
[
"De Roure",
"D. C.",
""
],
[
"Shadbolt",
"N. R.",
""
]
] |
cs/0203012 | Stuart E. Middleton | Stuart E. Middleton | Interface agents: A review of the field | Technical report, 28 pages, aug 2001 | null | null | ECSTR-IAM01-001 | cs.MA cs.LG | null | This paper reviews the origins of interface agents, discusses challenges that
exist within the interface agent field and presents a survey of current
attempts to find solutions to these challenges. A history of agent systems from
their birth in the 1960's to the current day is described, along with the
issues they try to address. A taxonomy of interface agent systems is presented,
and today's agent systems categorized accordingly. Lastly, an analysis of the
machine learning and user modelling techniques used by today's agents is
presented.
| [
{
"version": "v1",
"created": "Sat, 9 Mar 2002 01:28:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Middleton",
"Stuart E.",
""
]
] |
cs/0203013 | Pedrito Maynard-Reid Ii | Pedrito Maynard-Reid II (Miami University), Daniel Lehmann (Hebrew
University) | Representing and Aggregating Conflicting Beliefs | 19 pages, 5 figures, appears (without proofs) in Proceedings of the
Seventh International Conference on Principles of Knowledge Representation
and Reasoning (KR 2000) | Proceedings of the Seventh International Conference on Principles
of Knowledge Representation and Reasoning (KR 2000), April 2000, pp. 153-164 | null | null | cs.AI cs.LO | null | We consider the two-fold problem of representing collective beliefs and
aggregating these beliefs. We propose modular, transitive relations for
collective beliefs. They allow us to represent conflicting opinions and they
have a clear semantics. We compare them with the quasi-transitive relations
often used in Social Choice. Then, we describe a way to construct the belief
state of an agent informed by a set of sources of varying degrees of
reliability. This construction circumvents Arrow's Impossibility Theorem in a
satisfactory manner. Finally, we give a simple set-theory-based operator for
combining the information of multiple agents. We show that this operator
satisfies the desirable invariants of idempotence, commutativity, and
associativity, and, thus, is well-behaved when iterated, and we describe a
computationally effective way of computing the resulting belief state.
| [
{
"version": "v1",
"created": "Mon, 11 Mar 2002 23:02:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maynard-Reid",
"Pedrito",
"II",
"Miami University"
],
[
"Lehmann",
"Daniel",
"",
"Hebrew\n University"
]
] |
cs/0203015 | Dr Cameron L. Jones | Cameron L Jones | Towards Experimental Nanosound Using Almost Disjoint Set Theory | 20 pages, 4 figures, 1 table | null | null | null | cs.SD cs.LO | null | Music composition using digital audio sequence editors is increasingly
performed in a visual workspace where sound complexes are built from discrete
sound objects, called gestures that are arranged in time and space to generate
a continuous composition. The visual workspace, common to most industry
standard audio loop sequencing software, is premised on the arrangement of
gestures defined with geometric shape properties. Here, one aspect of fractal
set theory was validated using audio-frequency sets to evaluate self-affine
scaling behavior when new sound complexes are built through union and
intersection operations on discrete musical gestures. Results showed that
intersection of two sets revealed lower complexity compared with the union
operator, meaning that the intersection of two sound gestures is an almost
disjoint set, and in accord with formal logic. These results are also discussed
with reference to fuzzy sets, cellular automata, nanotechnology and
self-organization to further explore the link between sequenced notation and
complexity.
| [
{
"version": "v1",
"created": "Tue, 12 Mar 2002 09:21:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jones",
"Cameron L",
""
]
] |
cs/0203016 | Jack H. Lutz | Jack H. Lutz | Dimension in Complexity Classes | 24 pages | null | null | null | cs.CC | null | A theory of resource-bounded dimension is developed using gales, which are
natural generalizations of martingales. When the resource bound \Delta (a
parameter of the theory) is unrestricted, the resulting dimension is precisely
the classical Hausdorff dimension (sometimes called fractal dimension). Other
choices of the parameter \Delta yield internal dimension theories in E, E2,
ESPACE, and other complexity classes, and in the class of all decidable
problems. In general, if C is such a class, then every set X of languages has a
dimension in C, which is a real number dim(X|C) in [0,1]. Along with the
elements of this theory, two preliminary applications are presented:
1. For every real number \alpha in (0,1/2), the set FREQ(<=\alpha),
consisting of all languages that asymptotically contain at most \alpha of all
strings, has dimension H(\alpha) -- the binary entropy of \alpha -- in E and in
E2.
2. For every real number \alpha in (0,1), the set SIZE(\alpha* (2^n)/n),
consisting of all languages decidable by Boolean circuits of at most
\alpha*(2^n)/n gates, has dimension \alpha in ESPACE.
| [
{
"version": "v1",
"created": "Tue, 12 Mar 2002 20:16:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lutz",
"Jack H.",
""
]
] |
cs/0203017 | Jack H. Lutz | Jack H. Lutz | The Dimensions of Individual Strings and Sequences | 31 pages | null | null | null | cs.CC | null | A constructive version of Hausdorff dimension is developed using constructive
supergales, which are betting strategies that generalize the constructive
supermartingales used in the theory of individual random sequences. This
constructive dimension is used to assign every individual (infinite, binary)
sequence S a dimension, which is a real number dim(S) in the interval [0,1].
Sequences that are random (in the sense of Martin-Lof) have dimension 1, while
sequences that are decidable, \Sigma^0_1, or \Pi^0_1 have dimension 0. It is
shown that for every \Delta^0_2-computable real number \alpha in [0,1] there is
a \Delta^0_2 sequence S such that \dim(S) = \alpha.
A discrete version of constructive dimension is also developed using
termgales, which are supergale-like functions that bet on the terminations of
(finite, binary) strings as well as on their successive bits. This discrete
dimension is used to assign each individual string w a dimension, which is a
nonnegative real number dim(w). The dimension of a sequence is shown to be the
limit infimum of the dimensions of its prefixes.
The Kolmogorov complexity of a string is proven to be the product of its
length and its dimension. This gives a new characterization of algorithmic
information and a new proof of Mayordomo's recent theorem stating that the
dimension of a sequence is the limit infimum of the average Kolmogorov
complexity of its first n bits.
Every sequence that is random relative to any computable sequence of
coin-toss biases that converge to a real number \beta in (0,1) is shown to have
dimension \H(\beta), the binary entropy of \beta.
| [
{
"version": "v1",
"created": "Tue, 12 Mar 2002 20:28:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lutz",
"Jack H.",
""
]
] |
cs/0203018 | Adam L. Buchsbaum | Adam L. Buchsbaum, Glenn S. Fowler, Raffaele Giancarlo | Improving Table Compression with Combinatorial Optimization | 22 pages, 2 figures, 5 tables, 23 references. Extended abstract
appears in Proc. 13th ACM-SIAM SODA, pp. 213-222, 2002 | JACM 50(6):825-851, 2003 | null | null | cs.DS | null | We study the problem of compressing massive tables within the
partition-training paradigm introduced by Buchsbaum et al. [SODA'00], in which
a table is partitioned by an off-line training procedure into disjoint
intervals of columns, each of which is compressed separately by a standard,
on-line compressor like gzip. We provide a new theory that unifies previous
experimental observations on partitioning and heuristic observations on column
permutation, all of which are used to improve compression rates. Based on the
theory, we devise the first on-line training algorithms for table compression,
which can be applied to individual files, not just continuously operating
sources; and also a new, off-line training algorithm, based on a link to the
asymmetric traveling salesman problem, which improves on prior work by
rearranging columns prior to partitioning. We demonstrate these results
experimentally. On various test files, the on-line algorithms provide 35-55%
improvement over gzip with negligible slowdown; the off-line reordering
provides up to 20% further improvement over partitioning alone. We also show
that a variation of the table compression problem is MAX-SNP hard.
| [
{
"version": "v1",
"created": "Wed, 13 Mar 2002 19:09:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buchsbaum",
"Adam L.",
""
],
[
"Fowler",
"Glenn S.",
""
],
[
"Giancarlo",
"Raffaele",
""
]
] |
cs/0203019 | Rajkumar Buyya | Rajkumar Buyya and Manzur Murshed | GridSim: A Toolkit for the Modeling and Simulation of Distributed
Resource Management and Scheduling for Grid Computing | null | Concurrency and Computation: Practice and Experience, Wiley, May
2002 | null | null | cs.DC | null | Clusters, grids, and peer-to-peer (P2P) networks have emerged as popular
paradigms for next generation parallel and distributed computing. The
management of resources and scheduling of applications in such large-scale
distributed systems is a complex undertaking. In order to prove the
effectiveness of resource brokers and associated scheduling algorithms, their
performance needs to be evaluated under different scenarios such as varying
number of resources and users with different requirements. In a grid
environment, it is hard and even impossible to perform scheduler performance
evaluation in a repeatable and controllable manner as resources and users are
distributed across multiple organizations with their own policies. To overcome
this limitation, we have developed a Java-based discrete-event grid simulation
toolkit called GridSim. The toolkit supports modeling and simulation of
heterogeneous grid resources (both time- and space-shared), users and
application models. It provides primitives for creation of application tasks,
mapping of tasks to resources, and their management. To demonstrate suitability
of the GridSim toolkit, we have simulated a Nimrod-G like grid resource broker
and evaluated the performance of deadline and budget constrained cost- and
time-minimization scheduling algorithms.
| [
{
"version": "v1",
"created": "Thu, 14 Mar 2002 03:44:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buyya",
"Rajkumar",
""
],
[
"Murshed",
"Manzur",
""
]
] |
cs/0203020 | Rajkumar Buyya | Rajkumar Buyya and Manzur Murshed | A Deadline and Budget Constrained Cost-Time Optimisation Algorithm for
Scheduling Task Farming Applications on Global Grids | null | Technical Report, Monash University, March 2002 | null | null | cs.DC | null | Computational Grids and peer-to-peer (P2P) networks enable the sharing,
selection, and aggregation of geographically distributed resources for solving
large-scale problems in science, engineering, and commerce. The management and
composition of resources and services for scheduling applications, however,
becomes a complex undertaking. We have proposed a computational economy
framework for regulating the supply and demand for resources and allocating
them for applications based on the users quality of services requirements. The
framework requires economy driven deadline and budget constrained (DBC)
scheduling algorithms for allocating resources to application jobs in such a
way that the users requirements are met. In this paper, we propose a new
scheduling algorithm, called DBC cost-time optimisation, which extends the DBC
cost-optimisation algorithm to optimise for time, keeping the cost of
computation at the minimum. The superiority of this new scheduling algorithm,
in achieving lower job completion time, is demonstrated by simulating the
World-Wide Grid and scheduling task-farming applications for different deadline
and budget scenarios using both this new and the cost optimisation scheduling
algorithms.
| [
{
"version": "v1",
"created": "Thu, 14 Mar 2002 03:50:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buyya",
"Rajkumar",
""
],
[
"Murshed",
"Manzur",
""
]
] |
cs/0203021 | Daniel Lehmann | Claudia V. Goldman, Dan Gang, Jeffrey S. Rosenschein and Daniel
Lehmann | NetNeg: A Connectionist-Agent Integrated System for Representing Musical
Knowledge | 21 pages, 3 figures, Preliminary versions presented at International
Computer Music Conference, pp. 133-140, Hong Kong (China), August 1996 and
AAAI Spring Symposium, 1999 | Annals of Mathematics and Artificial Intelligence, 25 (1999) pp.
69-90 | null | null | cs.AI cs.MA | null | The system presented here shows the feasibility of modeling the knowledge
involved in a complex musical activity by integrating sub-symbolic and symbolic
processes. This research focuses on the question of whether there is any
advantage in integrating a neural network together with a distributed
artificial intelligence approach within the music domain. The primary purpose
of our work is to design a model that describes the different aspects a user
might be interested in considering when involved in a musical activity. The
approach we suggest in this work enables the musician to encode his knowledge,
intuitions, and aesthetic taste into different modules. The system captures
these aspects by computing and applying three distinct functions: rules, fuzzy
concepts, and learning.
As a case study, we began experimenting with first species two-part
counterpoint melodies. We have developed a hybrid system composed of a
connectionist module and an agent-based module to combine the sub-symbolic and
symbolic levels to achieve this task. The technique presented here to represent
musical knowledge constitutes a new approach for composing polyphonic music.
| [
{
"version": "v1",
"created": "Sun, 17 Mar 2002 09:38:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldman",
"Claudia V.",
""
],
[
"Gang",
"Dan",
""
],
[
"Rosenschein",
"Jeffrey S.",
""
],
[
"Lehmann",
"Daniel",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.