id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0111063
Wen Chen
W. Chen
New RBF collocation methods and kernel RBF with applications
Welcom any comments to [email protected]
null
null
null
cs.NA cs.CE
null
A few novel radial basis function (RBF) discretization schemes for partial differential equations are developed in this study. For boundary-type methods, we derive the indirect and direct symmetric boundary knot methods. Based on the multiple reciprocity principle, the boundary particle method is introduced for general inhomogeneous problems without using inner nodes. For domain-type schemes, by using the Green integral we develop a novel Hermite RBF scheme called the modified Kansa method, which significantly reduces calculation errors at close-to-boundary nodes. To avoid Gibbs phenomenon, we present the least square RBF collocation scheme. Finally, five types of the kernel RBF are also briefly presented.
[ { "version": "v1", "created": "Fri, 30 Nov 2001 16:03:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0111064
Anand Venkataraman
Anand Venkataraman
A procedure for unsupervised lexicon learning
Expanded version of this paper appears in Computational Linguistics 27(3)
Proceedings of the eighteenth international conference on machine learning, ICML-01, pp.569--576, 2001
null
null
cs.CL
null
We describe an incremental unsupervised procedure to learn words from transcribed continuous speech. The algorithm is based on a conservative and traditional statistical model, and results of empirical tests show that it is competitive with other algorithms that have been proposed recently for this task.
[ { "version": "v1", "created": "Fri, 30 Nov 2001 20:30:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Venkataraman", "Anand", "" ] ]
cs/0111065
Anand Venkataraman
Anand Venkataraman
A Statistical Model for Word Discovery in Transcribed Speech
Expanded version of ICML-01 paper (pp.569--576)
Computational Linguistics, 27(3), pp.352--372, 2001
null
null
cs.CL
null
A statistical model for segmentation and word discovery in continuous speech is presented. An incremental unsupervised learning algorithm to infer word boundaries based on this model is described. Results of empirical tests showing that the algorithm is competitive with other models that have been used for similar tasks are also presented.
[ { "version": "v1", "created": "Fri, 30 Nov 2001 20:40:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Venkataraman", "Anand", "" ] ]
cs/0112002
Iain Stewart
Iain A. Stewart
Program schemes with binary write-once arrays and the complexity classes they capture
null
null
null
null
cs.LO cs.CC
null
We study a class of program schemes, NPSB, in which, aside from basic assignments, non-deterministic guessing and while loops, we have access to arrays; but where these arrays are binary write-once in that they are initialized to `zero' and can only ever be set to `one'. We show, amongst other results, that: NPSB can be realized as a vectorized Lindstrom logic; there are problems accepted by program schemes of NPSB that are not definable in the bounded-variable infinitary logic ${\cal L}^\omega_{\infty\omega}$; all problems accepted by the program schemes of NPSB have a zero-one law; and on ordered structures, NPSB captures the complexity class $[ L]^[{\scriptsize NP\normalsize}]$. The class of program schemes NPSB is actually the union of an infinite hierarchy of classes of program schemes. When we amend the semantics of our program schemes slightly, we find that the classes of the resulting hierarchy capture the complexity classes $\Sigma^p_i$ (where $i\geq 1$) of the Polynomial Hierarchy PH. Finally, we give logical equivalences of the complexity-theoretic question `Does NP equal PSPACE?' where the logics (and classes of program schemes) involved define only problems with zero-one laws (and so do not define some computationally trivial problems).
[ { "version": "v1", "created": "Mon, 3 Dec 2001 15:15:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Stewart", "Iain A.", "" ] ]
cs/0112003
Masaki Murata
Masaki Murata, Kiyotaka Uchimoto, Qing Ma, and Hitoshi Isahara
Using a Support-Vector Machine for Japanese-to-English Translation of Tense, Aspect, and Modality
8 pages. Computation and Language
ACL Workshop, the Data-Driven Machine Translation, 2001
null
null
cs.CL
null
This paper describes experiments carried out using a variety of machine-learning methods, including the k-nearest neighborhood method that was used in a previous study, for the translation of tense, aspect, and modality. It was found that the support-vector machine method was the most precise of all the methods tested.
[ { "version": "v1", "created": "Wed, 5 Dec 2001 05:35:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "Masaki", "" ], [ "Uchimoto", "Kiyotaka", "" ], [ "Ma", "Qing", "" ], [ "Isahara", "Hitoshi", "" ] ]
cs/0112004
Masaki Murata
Masaki Murata, Qing Ma, and Hitoshi Isahara
Part of Speech Tagging in Thai Language Using Support Vector Machine
8 pages. Computation and Language
NLPRS'2001 Workshop, the Second Workshop on Natural Language Processing and Neural Networks (NLPNN2001)
null
null
cs.CL
null
The elastic-input neuro tagger and hybrid tagger, combined with a neural network and Brill's error-driven learning, have already been proposed for the purpose of constructing a practical tagger using as little training data as possible. When a small Thai corpus is used for training, these taggers have tagging accuracies of 94.4% and 95.5% (accounting only for the ambiguous words in terms of the part of speech), respectively. In this study, in order to construct more accurate taggers we developed new tagging methods using three machine learning methods: the decision-list, maximum entropy, and support vector machine methods. We then performed tagging experiments by using these methods. Our results showed that the support vector machine method has the best precision (96.1%), and that it is capable of improving the accuracy of tagging in the Thai language. Finally, we theoretically examined all these methods and discussed how the improvements were achived.
[ { "version": "v1", "created": "Wed, 5 Dec 2001 05:48:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "Masaki", "" ], [ "Ma", "Qing", "" ], [ "Isahara", "Hitoshi", "" ] ]
cs/0112005
Masaki Murata
Masaki Murata and Hitoshi Isahara
Universal Model for Paraphrasing -- Using Transformation Based on a Defined Criteria --
8 pages. Computation and Language
NLPRS'2001, Workshop on Automatic Paraphrasing: Theories and Applications
null
null
cs.CL
null
This paper describes a universal model for paraphrasing that transforms according to defined criteria. We showed that by using different criteria we could construct different kinds of paraphrasing systems including one for answering questions, one for compressing sentences, one for polishing up, and one for transforming written language to spoken language.
[ { "version": "v1", "created": "Wed, 5 Dec 2001 05:56:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "Masaki", "" ], [ "Isahara", "Hitoshi", "" ] ]
cs/0112007
Bart Goethals
Floris Geerts, Bart Goethals and Jan Van den Bussche
A Tight Upper Bound on the Number of Candidate Patterns
null
null
null
null
cs.DB cs.AI
null
In the context of mining for frequent patterns using the standard levelwise algorithm, the following question arises: given the current level and the current set of frequent patterns, what is the maximal number of candidate patterns that can be generated on the next level? We answer this question by providing a tight upper bound, derived from a combinatorial result from the sixties by Kruskal and Katona. Our result is useful to reduce the number of database scans.
[ { "version": "v1", "created": "Fri, 7 Dec 2001 15:40:11 GMT" }, { "version": "v2", "created": "Sat, 30 Nov 2002 01:15:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Geerts", "Floris", "" ], [ "Goethals", "Bart", "" ], [ "Bussche", "Jan Van den", "" ] ]
cs/0112008
Mark Burgin
Mark Burgin
Representation of Uncertainty for Limit Processes
null
null
null
null
cs.AI cs.NA
null
Many mathematical models utilize limit processes. Continuous functions and the calculus, differential equations and topology, all are based on limits and continuity. However, when we perform measurements and computations, we can achieve only approximate results. In some cases, this discrepancy between theoretical schemes and practical actions changes drastically outcomes of a research and decision-making resulting in uncertainty of knowledge. In the paper, a mathematical approach to such kind of uncertainty, which emerges in computation and measurement, is suggested on the base of the concept of a fuzzy limit. A mathematical technique is developed for differential models with uncertainty. To take into account the intrinsic uncertainty of a model, it is suggested to use fuzzy derivatives instead of conventional derivatives of functions in this model.
[ { "version": "v1", "created": "Fri, 7 Dec 2001 23:56:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Burgin", "Mark", "" ] ]
cs/0112009
Vijay Ramachandran
Ming-Yang Kao and Vijay Ramachandran
DNA Self-Assembly For Constructing 3D Boxes
15 pages, 3 figures. Extended abstract included in ISAAC 2001 proceedings
Algorithms and Computation, 12th International Symposium, ISAAC 2001 Proceedings. Springer LNCS 2223 (2001): 429-440
null
null
cs.CC cs.CE
null
We propose a mathematical model of DNA self-assembly using 2D tiles to form 3D nanostructures. This is the first work to combine studies in self-assembly and nanotechnology in 3D, just as Rothemund and Winfree did in the 2D case. Our model is a more precise superset of their Tile Assembly Model that facilitates building scalable 3D molecules. Under our model, we present algorithms to build a hollow cube, which is intuitively one of the simplest 3D structures to construct. We also introduce five basic measures of complexity to analyze these algorithms. Our model and algorithmic techniques are applicable to more complex 2D and 3D nanostructures.
[ { "version": "v1", "created": "Sat, 8 Dec 2001 21:36:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Kao", "Ming-Yang", "" ], [ "Ramachandran", "Vijay", "" ] ]
cs/0112010
Kyriakos Sgarbas
Kyriakos N. Sgarbas, Nikos D. Fakotakis, George K. Kokkinakis
A Straightforward Approach to Morphological Analysis and Synthesis
4(+2) pages, 3 figures, 1 table, 10 references. Keywords: Morphology, Directed Acyclic Word Graphs, Lexicon Structures. For related work, see also http://slt.wcl.ee.upatras.gr
Proc. COMLEX 2000, Workshop on Computational Lexicography and Multimedia Dictionaries, pp.31-34, Kato Achaia, Greece, 22-23 September 2000.
null
null
cs.CL cs.DS
null
In this paper we present a lexicon-based approach to the problem of morphological processing. Full-form words, lemmas and grammatical tags are interconnected in a DAWG. Thus, the process of analysis/synthesis is reduced to a search in the graph, which is very fast and can be performed even if several pieces of information are missing from the input. The contents of the DAWG are updated using an on-line incremental process. The proposed approach is language independent and it does not utilize any morphophonetic rules or any other special linguistic information.
[ { "version": "v1", "created": "Mon, 10 Dec 2001 13:01:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Sgarbas", "Kyriakos N.", "" ], [ "Fakotakis", "Nikos D.", "" ], [ "Kokkinakis", "George K.", "" ] ]
cs/0112011
Bart Goethals
Bart Goethals, Jan Van den Bussche
Interactive Constrained Association Rule Mining
A preliminary report on this work was presented at the Second International Conference on Knowledge Discovery and Data Mining (DaWaK 2000)
null
null
null
cs.DB cs.AI
null
We investigate ways to support interactive mining sessions, in the setting of association rule mining. In such sessions, users specify conditions (queries) on the associations to be generated. Our approach is a combination of the integration of querying conditions inside the mining phase, and the incremental querying of already generated associations. We present several concrete algorithms and compare their performance.
[ { "version": "v1", "created": "Mon, 10 Dec 2001 15:50:47 GMT" }, { "version": "v2", "created": "Wed, 5 Feb 2003 10:05:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Goethals", "Bart", "" ], [ "Bussche", "Jan Van den", "" ] ]
cs/0112012
Jean Mairesse
Daniel Krob, Jean Mairesse, Ioannis Michos
Computing the average parallelism in trace monoids
This is an extended version with proofs of D. Krob, J. Mairesse, and I. Michos. On the average parallelism in trace monoids. In H. Alt and A. Ferreira, editors, {\em Proceedings of STACS'02}, LNCS. Springer-Verlag, 2002
null
null
null
cs.DM cs.DC
null
The {\em height} of a trace is the height of the corresponding heap of pieces in Viennot's representation, or equivalently the number of factors in its Cartier-Foata decomposition. Let $h(t)$ and $|t|$ stand respectively for the height and the length of a trace $t$. Roughly speaking, $|t|$ is the `sequential' execution time and $h(t)$ is the `parallel' execution time. We prove that the bivariate commutative series $\sum_t x^{h(t)}y^{|t|}$ is rational, and we give a finite representation of it. We use the rationality to obtain precise information on the asymptotics of the number of traces of a given height or length. Then, we study the average height of a trace for various probability distributions on traces. For the uniform probability distribution on traces of the same length (resp. of the same height), the asymptotic average height (resp. length) exists and is an algebraic number. To illustrate our results and methods, we consider a couple of examples: the free commutative monoid and the trace monoid whose independence graph is the ladder graph.
[ { "version": "v1", "created": "Tue, 11 Dec 2001 16:32:12 GMT" }, { "version": "v2", "created": "Wed, 12 Dec 2001 08:54:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Krob", "Daniel", "" ], [ "Mairesse", "Jean", "" ], [ "Michos", "Ioannis", "" ] ]
cs/0112013
Bart Goethals
Tom Brijs, Bart Goethals, Gilbert Swinnen, Koen Vanhoof, Geert Wets
A Data Mining Framework for Optimal Product Selection in Retail Supermarket Data: The Generalized PROFSET Model
null
null
null
null
cs.DB cs.AI
null
In recent years, data mining researchers have developed efficient association rule algorithms for retail market basket analysis. Still, retailers often complain about how to adopt association rules to optimize concrete retail marketing-mix decisions. It is in this context that, in a previous paper, the authors have introduced a product selection model called PROFSET. This model selects the most interesting products from a product assortment based on their cross-selling potential given some retailer defined constraints. However this model suffered from an important deficiency: it could not deal effectively with supermarket data, and no provisions were taken to include retail category management principles. Therefore, in this paper, the authors present an important generalization of the existing model in order to make it suitable for supermarket data as well, and to enable retailers to add category restrictions to the model. Experiments on real world data obtained from a Belgian supermarket chain produce very promising results and demonstrate the effectiveness of the generalized PROFSET model.
[ { "version": "v1", "created": "Tue, 11 Dec 2001 19:23:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Brijs", "Tom", "" ], [ "Goethals", "Bart", "" ], [ "Swinnen", "Gilbert", "" ], [ "Vanhoof", "Koen", "" ], [ "Wets", "Geert", "" ] ]
cs/0112015
Moshe Tennenholtz
Moshe Tennenholtz
Rational Competitive Analysis
null
Proceedings of IJCAI-2001
null
null
cs.AI
null
Much work in computer science has adopted competitive analysis as a tool for decision making under uncertainty. In this work we extend competitive analysis to the context of multi-agent systems. Unlike classical competitive analysis where the behavior of an agent's environment is taken to be arbitrary, we consider the case where an agent's environment consists of other agents. These agents will usually obey some (minimal) rationality constraints. This leads to the definition of rational competitive analysis. We introduce the concept of rational competitive analysis, and initiate the study of competitive analysis for multi-agent systems. We also discuss the application of rational competitive analysis to the context of bidding games, as well as to the classical one-way trading problem.
[ { "version": "v1", "created": "Thu, 13 Dec 2001 00:46:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Tennenholtz", "Moshe", "" ] ]
cs/0112016
Boaz Tsaban
Boaz Tsaban
Pseudorandom permutations with the fast forward property
Paper withdrawal
null
null
null
cs.CR cs.CC
null
This paper has been withdrawn by the author(s), due to the existence of a much better paper in http://arxiv.org/abs/cs.CR/0207027
[ { "version": "v1", "created": "Thu, 13 Dec 2001 18:31:35 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2003 19:55:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Tsaban", "Boaz", "" ] ]
cs/0112017
Naomi Dushay
Naomi Dushay
Using Structural Metadata to Localize Experience of Digital Content
23 pages including 2 appendices, 8 figures
null
null
null
cs.DL
null
With the increasing technical sophistication of both information consumers and providers, there is increasing demand for more meaningful experiences of digital information. We present a framework that separates digital object experience, or rendering, from digital object storage and manipulation, so the rendering can be tailored to particular communities of users. Our framework also accommodates extensible digital object behaviors and interoperability. The two key components of our approach are 1) exposing structural metadata associated with digital objects -- metadata about the labeled access points within a digital object and 2) information intermediaries called context brokers that match structural characteristics of digital objects with mechanisms that produce behaviors. These context brokers allow for localized rendering of digital information stored externally.
[ { "version": "v1", "created": "Fri, 14 Dec 2001 18:55:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Dushay", "Naomi", "" ] ]
cs/0112018
Lillian Lee
Lillian Lee
Fast Context-Free Grammar Parsing Requires Fast Boolean Matrix Multiplication
To appear in Journal of the ACM
Journal of the ACM 49(1), pp. 1--15, January 2002
null
null
cs.CL cs.DS
null
In 1975, Valiant showed that Boolean matrix multiplication can be used for parsing context-free grammars (CFGs), yielding the asympotically fastest (although not practical) CFG parsing algorithm known. We prove a dual result: any CFG parser with time complexity $O(g n^{3 - \epsilson})$, where $g$ is the size of the grammar and $n$ is the length of the input string, can be efficiently converted into an algorithm to multiply $m \times m$ Boolean matrices in time $O(m^{3 - \epsilon/3})$. Given that practical, substantially sub-cubic Boolean matrix multiplication algorithms have been quite difficult to find, we thus explain why there has been little progress in developing practical, substantially sub-cubic general CFG parsers. In proving this result, we also develop a formalization of the notion of parsing.
[ { "version": "v1", "created": "Sat, 15 Dec 2001 19:43:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Lillian", "" ] ]
cs/0112020
Marc-Thierry Jaekel
Philippe Matherat and Marc-Thierry Jaekel
Concurrent computing machines and physical space-time
Latex Revtex style, 15 pages, 14 figures
M.S.C.S., Cambridge University Press, 13 (2003) 771
null
LPTENS 01/05
cs.DC cs.LO gr-qc
null
Concrete computing machines, either sequential or concurrent, rely on an intimate relation between computation and time. We recall the general characteristic properties of physical time and of present realizations of computing systems. We emphasize the role of computing interferences, i.e. the necessity to avoid them in order to give a causal implementation to logical operations. We compare synchronous and asynchronous systems, and make a brief survey of some methods used to deal with computing interferences. Using a graphic representation, we show that synchronous and asynchronous circuits reflect the same opposition as the Newtonian and relativistic causal structures for physical space-time.
[ { "version": "v1", "created": "Mon, 17 Dec 2001 14:10:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Matherat", "Philippe", "" ], [ "Jaekel", "Marc-Thierry", "" ] ]
cs/0112022
Qi Xiao Yang
Qi Xiao Yang, Sung Sam Yuan, Lu Chun, Li Zhao and Sun Peng
Faster Algorithm of String Comparison
null
null
null
null
cs.DS
null
In many applications, it is necessary to determine the string similarity. Edit distance[WF74] approach is a classic method to determine Field Similarity. A well known dynamic programming algorithm [GUS97] is used to calculate edit distance with the time complexity O(nm). (for worst case, average case and even best case) Instead of continuing with improving the edit distance approach, [LL+99] adopted a brand new approach-token-based approach. Its new concept of token-base-retain the original semantic information, good time complex-O(nm) (for worst, average and best case) and good experimental performance make it a milestone paper in this area. Further study indicates that there is still room for improvement of its Field Similarity algorithm. Our paper is to introduce a package of substring-based new algorithms to determine Field Similarity. Combined together, our new algorithms not only achieve higher accuracy but also gain the time complexity O(knm) (k<0.75) for worst case, O(*n) where <6 for average case and O(1) for best case. Throughout the paper, we use the approach of comparative examples to show higher accuracy of our algorithms compared to the one proposed in [LL+99]. Theoretical analysis, concrete examples and experimental result show that our algorithms can significantly improve the accuracy and time complexity of the calculation of Field Similarity. [US97] D. Guseld. Algorithms on Strings, Trees and Sequences, in Computer Science and Computational Biology. [LL+99] Mong Li Lee, Cleansing data for mining and warehousing, In Proceedings of the 10th International Conference on Database and Expert Systems Applications (DEXA99), pages 751-760,August 1999. [WF74] R. Wagner and M. Fisher, The String to String Correction Problem, JACM 21 pages 168-173, 1974.
[ { "version": "v1", "created": "Fri, 21 Dec 2001 05:58:12 GMT" }, { "version": "v2", "created": "Tue, 25 Dec 2001 21:29:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Yang", "Qi Xiao", "" ], [ "Yuan", "Sung Sam", "" ], [ "Chun", "Lu", "" ], [ "Zhao", "Li", "" ], [ "Peng", "Sun", "" ] ]
cs/0112023
Pawel
Pawel Wocjan, Dominik Janzing, and Thomas Beth (Universitaet Karlsruhe)
Lower Bound on the Chromatic Number by Spectra of Weighted Adjacency Matrices
6 pages
null
null
null
cs.DM quant-ph
null
A lower bound on the chromatic number of a graph is derived by majorization of spectra of weighted adjacency matrices. These matrices are given by Hadamard products of the adjacency matrix and arbitrary Hermitian matrices.
[ { "version": "v1", "created": "Fri, 21 Dec 2001 15:11:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Wocjan", "Pawel", "", "Universitaet\n Karlsruhe" ], [ "Janzing", "Dominik", "", "Universitaet\n Karlsruhe" ], [ "Beth", "Thomas", "", "Universitaet\n Karlsruhe" ] ]
cs/0112024
Thomas Schmidt
B. Feustel, T.C. Schmidt
Media Objects in Time - A Multimedia Streaming System
9 pdf pages
Computer Networks 37,6 (2001), pp. 729 - 737
null
null
cs.NI cs.MM
null
The widespread availability of networked multimedia potentials embedded in an infrastructure of qualitative superior kind gives rise to new approaches in the areas of teleteaching and internet presentation: The distribution of professionally styled multimedia streams has fallen in the realm of possibility. This paper presents a prototype - both model and runtime environment - of a time directed media system treating any kind of presentational contribution as reusable media object components. The plug-in free runtime system is based on a database and allows for a flexible support of static media types as well as for easy extensions by streaming media servers. The prototypic implementation includes a preliminary Web Authoring platform.
[ { "version": "v1", "created": "Fri, 28 Dec 2001 20:19:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Feustel", "B.", "" ], [ "Schmidt", "T. C.", "" ] ]
cs/0201001
Amir Shpilka
Amir Shpilka
Lower Bounds for Matrix Product
Published in the proceedings of the 42nd Annual Symposium on Foundations of Computer Science (FOCS) 2001
Published in the proceedings of the 42nd Annual Symposium on Foundations of Computer Science (FOCS) 2001
null
null
cs.CC
null
We prove lower bounds on the number of product gates in bilinear and quadratic circuits that compute the product of two $n \cross n$ matrices over finite fields. In particular we obtain the following results: 1. We show that the number of product gates in any bilinear (or quadratic) circuit that computes the product of two $n \cross n$ matrices over $F_2$ is at least $3 n^2 - o(n^2)$. 2. We show that the number of product gates in any bilinear circuit that computes the product of two $n \cross n$ matrices over $F_p$ is at least $(2.5 + \frac{1.5}{p^3 -1})n^2 -o(n^2)$. These results improve the former results of Bshouty '89 and Blaser '99 who proved lower bounds of $2.5 n^2 - o(n^2)$.
[ { "version": "v1", "created": "Wed, 2 Jan 2002 09:50:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Shpilka", "Amir", "" ] ]
cs/0201002
Kyriakos Sgarbas
Kyriakos N. Sgarbas, Nikos D. Fakotakis, George K. Kokkinakis
Incremental Construction of Compact Acyclic NFAs
8(+2) pages, 4 figures, 1 table, 22 references. For related work, see also http://slt.wcl.ee.upatras.gr
Proc. ACL-2001, 39th Annual Meeting of the Association for Computational Linguistics, pp.474-481, Toulouse, France, 6-11 July 2001
null
null
cs.DS cs.CL
null
This paper presents and analyzes an incremental algorithm for the construction of Acyclic Non-deterministic Finite-state Automata (NFA). Automata of this type are quite useful in computational linguistics, especially for storing lexicons. The proposed algorithm produces compact NFAs, i.e. NFAs that do not contain equivalent states. Unlike Deterministic Finite-state Automata (DFA), this property is not sufficient to ensure minimality, but still the resulting NFAs are considerably smaller than the minimal DFAs for the same languages.
[ { "version": "v1", "created": "Fri, 4 Jan 2002 17:01:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Sgarbas", "Kyriakos N.", "" ], [ "Fakotakis", "Nikos D.", "" ], [ "Kokkinakis", "George K.", "" ] ]
cs/0201003
Charles H. Bennett
Charles H. Bennett, John A. Smolin
Trust enhancement by multiple random beacons
null
null
null
null
cs.CR
null
Random beacons-information sources that broadcast a stream of random digits unknown by anyone beforehand-are useful for various cryptographic purposes. But such beacons can be easily and undetectably sabotaged, so that their output is known beforehand by a dishonest party, who can use this information to defeat the cryptographic protocols supposedly protected by the beacon. We explore a strategy to reduce this hazard by combining the outputs from several noninteracting (eg spacelike-separated) beacons by XORing them together to produce a single digit stream which is more trustworthy than any individual beacon, being random and unpredictable if at least one of the contributing beacons is honest. If the contributing beacons are not spacelike separated, so that a dishonest beacon can overhear and adapt to earlier outputs of other beacons, the beacons' trustworthiness can still be enhanced to a lesser extent by a time sharing strategy. We point out some disadvantages of alternative trust amplification methods based on one-way hash functions.
[ { "version": "v1", "created": "Sun, 6 Jan 2002 22:38:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Bennett", "Charles H.", "" ], [ "Smolin", "John A.", "" ] ]
cs/0201004
Tatsuya Mori
Tatsuya Mori, Ryoichi Kawahara, Shozo Naito
Analysis of Non-Gaussian Nature of Network Traffic
4 pages, 4 figures, IEICE General Conference 2002, Tokyo, Japan, March 2002
null
null
null
cs.NI
null
To study mechanisms that cause the non-Gaussian nature of network traffic, we analyzed IP flow statistics. For greedy flows in particular, we investigated the hop counts between source and destination nodes, and classified applications by the port number. We found that the main flows contributing to the non-Gaussian nature of network traffic were HTTP flows with relatively small hop counts compared with the average hop counts of all flows.
[ { "version": "v1", "created": "Tue, 8 Jan 2002 08:34:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Mori", "Tatsuya", "" ], [ "Kawahara", "Ryoichi", "" ], [ "Naito", "Shozo", "" ] ]
cs/0201006
Paul Vitanyi
Harry Buhrman (CWI), Alessandro Panconesi (Univ. La Sapienza, Rome), Riccardo Silvestri (Univ. La Sapienza, Rome), and Paul Vitanyi (CWI and Univ. Amsterdam)
On the Importance of Having an Identity or, is Consensus really Universal?
LaTeX, 15 pages, In: Distributed Computing Conference (DISC'00), Lecture Notes in Computer Science, Vol. 1914, Springer-Verlag, Berlin, 2000, 134--148
null
null
null
cs.DC cs.CC
null
We show that Naming-- the existence of distinct IDs known to all-- is a hidden but necessary assumption of Herlihy's universality result for Consensus. We then show in a very precise sense that Naming is harder than Consensus and bring to the surface some important differences existing between popular shared memory models.
[ { "version": "v1", "created": "Wed, 9 Jan 2002 18:49:27 GMT" }, { "version": "v2", "created": "Mon, 4 Feb 2002 15:35:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Buhrman", "Harry", "", "CWI" ], [ "Panconesi", "Alessandro", "", "Univ. La Sapienza, Rome" ], [ "Silvestri", "Riccardo", "", "Univ. La Sapienza, Rome" ], [ "Vitanyi", "Paul", "", "CWI and Univ.\n Amsterdam" ] ]
cs/0201008
Nikita Schmidt
Nikita Schmidt, Ahmed Patel
Using Tree Automata and Regular Expressions to Manipulate Hierarchically Structured Data
Submission to JACM for review. 27 single spaced pages
null
null
null
cs.CL cs.DS
null
Information, stored or transmitted in digital form, is often structured. Individual data records are usually represented as hierarchies of their elements. Together, records form larger structures. Information processing applications have to take account of this structuring, which assigns different semantics to different data elements or records. Big variety of structural schemata in use today often requires much flexibility from applications--for example, to process information coming from different sources. To ensure application interoperability, translators are needed that can convert one structure into another. This paper puts forward a formal data model aimed at supporting hierarchical data processing in a simple and flexible way. The model is based on and extends results of two classical theories, studying finite string and tree automata. The concept of finite automata and regular languages is applied to the case of arbitrarily structured tree-like hierarchical data records, represented as "structured strings." These automata are compared with classical string and tree automata; the model is shown to be a superset of the classical models. Regular grammars and expressions over structured strings are introduced. Regular expression matching and substitution has been widely used for efficient unstructured text processing; the model described here brings the power of this proven technique to applications that deal with information trees. A simple generic alternative is offered to replace today's specialised ad-hoc approaches. The model unifies structural and content transformations, providing applications with a single data type. An example scenario of how to build applications based on this theory is discussed. Further research directions are outlined.
[ { "version": "v1", "created": "Fri, 11 Jan 2002 17:59:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidt", "Nikita", "" ], [ "Patel", "Ahmed", "" ] ]
cs/0201009
Igor Rivin
Igor Rivin
The performance of the batch learner algorithm
Supercedes a part of cs.LG/0107033
null
null
null
cs.LG cs.DM
null
We analyze completely the convergence speed of the \emph{batch learning algorithm}, and compare its speed to that of the memoryless learning algorithm and of learning with memory. We show that the batch learning algorithm is never worse than the memoryless learning algorithm (at least asymptotically). Its performance \emph{vis-a-vis} learning with full memory is less clearcut, and depends on certain probabilistic assumptions.
[ { "version": "v1", "created": "Mon, 14 Jan 2002 18:38:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Rivin", "Igor", "" ] ]
cs/0201010
Moshe Tennenholtz
Ron Holzman, Noa Kfir-Dahav, Dov Monderer, Moshe Tennenholtz
Bundling Equilibrium in Combinatorial auctions
null
null
null
null
cs.GT
null
This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium.
[ { "version": "v1", "created": "Mon, 14 Jan 2002 22:36:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Holzman", "Ron", "" ], [ "Kfir-Dahav", "Noa", "" ], [ "Monderer", "Dov", "" ], [ "Tennenholtz", "Moshe", "" ] ]
cs/0201011
Andy King
Andy King and Lunjin Lu
A Backward Analysis for Constraint Logic Programs
32 pages
null
null
null
cs.PL cs.SE
null
One recurring problem in program development is that of understanding how to re-use code developed by a third party. In the context of (constraint) logic programming, part of this problem reduces to figuring out how to query a program. If the logic program does not come with any documentation, then the programmer is forced to either experiment with queries in an ad hoc fashion or trace the control-flow of the program (backward) to infer the modes in which a predicate must be called so as to avoid an instantiation error. This paper presents an abstract interpretation scheme that automates the latter technique. The analysis presented in this paper can infer moding properties which if satisfied by the initial query, come with the guarantee that the program and query can never generate any moding or instantiation errors. Other applications of the analysis are discussed. The paper explains how abstract domains with certain computational properties (they condense) can be used to trace control-flow backward (right-to-left) to infer useful properties of initial queries. A correctness argument is presented and an implementation is reported.
[ { "version": "v1", "created": "Wed, 16 Jan 2002 11:48:13 GMT" } ]
2007-05-23T00:00:00
[ [ "King", "Andy", "" ], [ "Lu", "Lunjin", "" ] ]
cs/0201012
Andy King
Jacob M. Howe and Andy King
Efficient Groundness Analysis in Prolog
31 pages To appear in Theory and Practice of Logic Programming
null
null
null
cs.PL
null
Boolean functions can be used to express the groundness of, and trace grounding dependencies between, program variables in (constraint) logic programs. In this paper, a variety of issues pertaining to the efficient Prolog implementation of groundness analysis are investigated, focusing on the domain of definite Boolean functions, Def. The systematic design of the representation of an abstract domain is discussed in relation to its impact on the algorithmic complexity of the domain operations; the most frequently called operations should be the most lightweight. This methodology is applied to Def, resulting in a new representation, together with new algorithms for its domain operations utilising previously unexploited properties of Def -- for instance, quadratic-time entailment checking. The iteration strategy driving the analysis is also discussed and a simple, but very effective, optimisation of induced magic is described. The analysis can be implemented straightforwardly in Prolog and the use of a non-ground representation results in an efficient, scalable tool which does not require widening to be invoked, even on the largest benchmarks. An extensive experimental evaluation is given
[ { "version": "v1", "created": "Wed, 16 Jan 2002 12:02:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Howe", "Jacob M.", "" ], [ "King", "Andy", "" ] ]
cs/0201014
Bruno Caprile
Bruno Caprile, Cesare Furlanello & Stefano Merler
The Dynamics of AdaBoost Weights Tells You What's Hard to Classify
7 pages, LaTeX, 4 figures
null
null
IRST TechRep #010612
cs.LG cs.DS
null
The dynamical evolution of weights in the Adaboost algorithm contains useful information about the role that the associated data points play in the built of the Adaboost model. In particular, the dynamics induces a bipartition of the data set into two (easy/hard) classes. Easy points are ininfluential in the making of the model, while the varying relevance of hard points can be gauged in terms of an entropy value associated to their evolution. Smooth approximations of entropy highlight regions where classification is most uncertain. Promising results are obtained when methods proposed are applied in the Optimal Sampling framework.
[ { "version": "v1", "created": "Thu, 17 Jan 2002 13:42:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Caprile", "Bruno", "" ], [ "Furlanello", "Cesare", "" ], [ "Merler", "Stefano", "" ] ]
cs/0201015
M. H. van Emden
M.H. van Emden
On the Significance of Digits in Interval Notation
11 pages, LaTeX
null
null
DCS-270-IR
cs.NA
null
To analyse the significance of the digits used for interval bounds, we clarify the philosophical presuppositions of various interval notations. We use information theory to determine the information content of the last digit of the numeral used to denote the interval's bounds. This leads to the notion of efficiency of a decimal digit: the actual value as percentage of the maximal value of its information content. By taking this efficiency into account, many presentations of intervals can be made more readable at the expense of negligible loss of information.
[ { "version": "v1", "created": "Thu, 17 Jan 2002 22:31:21 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ] ]
cs/0201016
Joseph Y. Halpern
Joseph Y. Halpern
A computer scientist looks at game theory
To appear, Games and Economic Behavior. JEL classification numbers: D80, D83
null
null
null
cs.GT cs.DC cs.MA
null
I consider issues in distributed computation that should be of relevance to game theory. In particular, I focus on (a) representing knowledge and uncertainty, (b) dealing with failures, and (c) specification of mechanisms.
[ { "version": "v1", "created": "Fri, 18 Jan 2002 11:05:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
cs/0201018
Erik Demaine
Oswin Aichholzer, David Bremner, Erik D. Demaine, Henk Meijer, Vera Sacrist\'an, Michael Soss
Long Proteins with Unique Optimal Foldings in the H-P Model
22 pages, 18 figures
null
null
null
cs.CG q-bio.BM
null
It is widely accepted that (1) the natural or folded state of proteins is a global energy minimum, and (2) in most cases proteins fold to a unique state determined by their amino acid sequence. The H-P (hydrophobic-hydrophilic) model is a simple combinatorial model designed to answer qualitative questions about the protein folding process. In this paper we consider a problem suggested by Brian Hayes in 1998: what proteins in the two-dimensional H-P model have unique optimal (minimum energy) foldings? In particular, we prove that there are closed chains of monomers (amino acids) with this property for all (even) lengths; and that there are open monomer chains with this property for all lengths divisible by four.
[ { "version": "v1", "created": "Mon, 21 Jan 2002 13:39:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Aichholzer", "Oswin", "" ], [ "Bremner", "David", "" ], [ "Demaine", "Erik D.", "" ], [ "Meijer", "Henk", "" ], [ "Sacristán", "Vera", "" ], [ "Soss", "Michael", "" ] ]
cs/0201019
Mireille Boutin
Pierre-Louis Bazin (Brown University) Mireille Boutin (Brown University)
Structure from Motion: Theoretical Foundations of a Novel Approach Using Custom Built Invariants
15 pages
null
null
null
cs.CV math.DG
null
We rephrase the problem of 3D reconstruction from images in terms of intersections of projections of orbits of custom built Lie groups actions. We then use an algorithmic method based on moving frames "a la Fels-Olver" to obtain a fundamental set of invariants of these groups actions. The invariants are used to define a set of equations to be solved by the points of the 3D object, providing a new technique for recovering 3D structure from motion.
[ { "version": "v1", "created": "Tue, 22 Jan 2002 21:00:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Bazin", "Pierre-Louis", "", "Brown University" ], [ "Boutin", "Mireille", "", "Brown\n University" ] ]
cs/0201020
Churn-Jung Liau
Churn-Jung Liau
A Modal Logic Framework for Multi-agent Belief Fusion
LaTex, 29 pages
null
null
null
cs.AI cs.LO
null
This paper is aimed at providing a uniform framework for reasoning about beliefs of multiple agents and their fusion. In the first part of the paper, we develop logics for reasoning about cautiously merged beliefs of agents with different degrees of reliability. The logics are obtained by combining the multi-agent epistemic logic and multi-sources reasoning systems. Every ordering for the reliability of the agents is represented by a modal operator, so we can reason with the merged results under different situations. The fusion is cautious in the sense that if an agent's belief is in conflict with those of higher priorities, then his belief is completely discarded from the merged result. We consider two strategies for the cautious merging of beliefs. In the first one, if inconsistency occurs at some level, then all beliefs at the lower levels are discarded simultaneously, so it is called level cutting strategy. For the second one, only the level at which the inconsistency occurs is skipped, so it is called level skipping strategy. The formal semantics and axiomatic systems for these two strategies are presented. In the second part, we extend the logics both syntactically and semantically to cover some more sophisticated belief fusion and revision operators. While most existing approaches treat belief fusion operators as meta-level constructs, these operators are directly incorporated into our object logic language. Thus it is possible to reason not only with the merged results but also about the fusion process in our logics. The relationship of our extended logics with the conditional logics of belief revision is also discussed.
[ { "version": "v1", "created": "Wed, 23 Jan 2002 02:43:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Liau", "Churn-Jung", "" ] ]
cs/0201021
Dov Samet
Philippe Jehiel, Dov Samet
Learning to Play Games in Extensive Form by Valuation
null
null
null
null
cs.LG cs.GT
null
A valuation for a player in a game in extensive form is an assignment of numeric values to the players moves. The valuation reflects the desirability moves. We assume a myopic player, who chooses a move with the highest valuation. Valuations can also be revised, and hopefully improved, after each play of the game. Here, a very simple valuation revision is considered, in which the moves made in a play are assigned the payoff obtained in the play. We show that by adopting such a learning process a player who has a winning strategy in a win-lose game can almost surely guarantee a win in a repeated game. When a player has more than two payoffs, a more elaborate learning procedure is required. We consider one that associates with each move the average payoff in the rounds in which this move was made. When all players adopt this learning procedure, with some perturbations, then, with probability 1, strategies that are close to subgame perfect equilibrium are played after some time. A single player who adopts this procedure can guarantee only her individually rational payoff.
[ { "version": "v1", "created": "Wed, 23 Jan 2002 11:58:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Jehiel", "Philippe", "" ], [ "Samet", "Dov", "" ] ]
cs/0201022
Pierre Albarede
Pierre Albarede
A theory of experiment
19 pages LaTeX article (uses some pstricks) thorough revision 2 see also http://pierre.albarede.free.fr
null
null
null
cs.AI
null
This article aims at clarifying the language and practice of scientific experiment, mainly by hooking observability on calculability.
[ { "version": "v1", "created": "Wed, 23 Jan 2002 19:53:08 GMT" }, { "version": "v2", "created": "Sun, 23 Feb 2003 20:13:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Albarede", "Pierre", "" ] ]
cs/0201023
Andree Blotz
Andree Blotz (1), Franz Huber (2), Heiko Loetzbeyer (3), Alexander Pretschner (3), Oscar Slotosch (2), Hans-Peter Zaengerl (2) ((1) EADS Deutschland GmbH, (2) Validas AG, (3) TU Munich)
Model-Based Software Engineering and Ada: Synergy for the Development of Safety-Critical Systems
16 pages, figures included, paper accepted for ADA Deutschland Tagung 2002, March 6-8, Jena, GERMANY
null
null
null
cs.SE
null
In this paper we outline a software development process for safety-critical systems that aims at combining some of the specific strengths of model-based development with those of programming language based development using safety-critical subsets of Ada. Model-based software development and model-based test case generation techniques are combined with code generation techniques and tools providing a transition from model to code both for a system itself and for its test cases. This allows developers to combine domain-oriented, model-based techniques with source code based validation techniques, as required for conformity with standards for the development of safety-critical software, such as the avionics standard RTCA/DO-178B. We introduce the AutoFocus and Validator modeling and validation toolset and sketch its usage for modeling, test case generation, and code generation in a combined approach, which is further illustrated by a simplified leading edge aerospace model with built-in fault tolerance.
[ { "version": "v1", "created": "Sat, 26 Jan 2002 11:32:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Blotz", "Andree", "" ], [ "Huber", "Franz", "" ], [ "Loetzbeyer", "Heiko", "" ], [ "Pretschner", "Alexander", "" ], [ "Slotosch", "Oscar", "" ], [ "Zaengerl", "Hans-Peter", "" ] ]
cs/0201025
Carl Lagoze
Carl Lagoze, William Arms, Stoney Gan, Diane Hillmann, Christopher Ingram, Dean Krafft, Richard Marisa, Jon Phipps, John Saylor, Carol Terrizzi, Walter Hoehn, David Millman, James Allan, Sergio Guzman-Lara, Tom Kalt
Core Services in the Architecture of the National Digital Library for Science Education (NSDL)
null
null
null
null
cs.DL
null
We describe the core components of the architecture for the (NSDL) National Science, Mathematics, Engineering, and Technology Education Digital Library. Over time the NSDL will include heterogeneous users, content, and services. To accommodate this, a design for a technical and organization infrastructure has been formulated based on the notion of a spectrum of interoperability. This paper describes the first phase of the interoperability infrastructure including the metadata repository, search and discovery services, rights management services, and user interface portal facilities.
[ { "version": "v1", "created": "Tue, 29 Jan 2002 17:51:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Arms", "William", "" ], [ "Gan", "Stoney", "" ], [ "Hillmann", "Diane", "" ], [ "Ingram", "Christopher", "" ], [ "Krafft", "Dean", "" ], [ "Marisa", "Richard", "" ], [ "Phipps", "Jon", "" ], [ "Saylor", "John", "" ], [ "Terrizzi", "Carol", "" ], [ "Hoehn", "Walter", "" ], [ "Millman", "David", "" ], [ "Allan", "James", "" ], [ "Guzman-Lara", "Sergio", "" ], [ "Kalt", "Tom", "" ] ]
cs/0201027
Carl Lagoze
David Fulker and Greg Janee
Components of an NSDL Architecture: Technical Scope and Functional Model
null
null
null
null
cs.DL
null
We describe work leading toward specification of a technical architecture for the National Science, Mathematics, Engineering, and Technology Education Digital Library (NSDL). This includes a technical scope and a functional model, with some elaboration on the particularly rich set of library services that NSDL is expected eventually to encompass.
[ { "version": "v1", "created": "Wed, 30 Jan 2002 01:14:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Fulker", "David", "" ], [ "Janee", "Greg", "" ] ]
cs/0201028
Raimondas Lencevicius
Raimondas Lencevicius, Edu Metz, Alexander Ran
Software Validation using Power Profiles
6 pages, 5 figures, to be published in the Proceedings of the Symposium on Software Engineering at 20th IASTED International Multi-Conference on Applied Informatics (AI 2002)
null
null
null
cs.SE
null
The validation of modern software systems incorporates both functional and quality requirements. This paper proposes a validation approach for software quality requirement - its power consumption. This approach validates whether the software produces the desired results with a minimum expenditure of energy. We present energy requirements and an approach for their validation using a power consumption model, test-case specification, software traces, and power measurements. Three different approaches for power data gathering are described. The power consumption of mobile phone applications is obtained and matched against the power consumption model.
[ { "version": "v1", "created": "Wed, 30 Jan 2002 22:28:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Lencevicius", "Raimondas", "" ], [ "Metz", "Edu", "" ], [ "Ran", "Alexander", "" ] ]
cs/0201029
James H. Andrews
James H. Andrews
The Witness Properties and the Semantics of the Prolog Cut
60 pages, 15 figures. Accepted for publication in Theory and Practice of Logic Programming
null
null
null
cs.PL
null
The semantics of the Prolog ``cut'' construct is explored in the context of some desirable properties of logic programming systems, referred to as the witness properties. The witness properties concern the operational consistency of responses to queries. A generalization of Prolog with negation as failure and cut is described, and shown not to have the witness properties. A restriction of the system is then described, which preserves the choice and first-solution behaviour of cut but allows the system to have the witness properties. The notion of cut in the restricted system is more restricted than the Prolog hard cut, but retains the useful first-solution behaviour of hard cut, not retained by other proposed cuts such as the ``soft cut''. It is argued that the restricted system achieves a good compromise between the power and utility of the Prolog cut and the need for internal consistency in logic programming systems. The restricted system is given an abstract semantics, which depends on the witness properties; this semantics suggests that the restricted system has a deeper connection to logic than simply permitting some computations which are logical. Parts of this paper appeared previously in a different form in the Proceedings of the 1995 International Logic Programming Symposium.
[ { "version": "v1", "created": "Thu, 31 Jan 2002 17:47:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Andrews", "James H.", "" ] ]
cs/0202001
Carlo Zaniolo
Faiz Arni, KayLiang Ong, Shalom Tsur and Haixun Wang, Carlo Zaniolo
The Deductive Database System LDL++
null
null
null
null
cs.DB cs.AI
null
This paper describes the LDL++ system and the research advances that have enabled its design and development. We begin by discussing the new nonmonotonic and nondeterministic constructs that extend the functionality of the LDL++ language, while preserving its model-theoretic and fixpoint semantics. Then, we describe the execution model and the open architecture designed to support these new constructs and to facilitate the integration with existing DBMSs and applications. Finally, we describe the lessons learned by using LDL++ on various tested applications, such as middleware and datamining.
[ { "version": "v1", "created": "Fri, 1 Feb 2002 05:00:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Arni", "Faiz", "" ], [ "Ong", "KayLiang", "" ], [ "Tsur", "Shalom", "" ], [ "Wang", "Haixun", "" ], [ "Zaniolo", "Carlo", "" ] ]
cs/0202002
Robert Colvin
Ian Hayes, Robert Colvin, David Hemer, Paul Strooper, Ray Nickson
A Refinement Calculus for Logic Programs
36 pages, 3 figures. To be published in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.SE cs.LO
null
Existing refinement calculi provide frameworks for the stepwise development of imperative programs from specifications. This paper presents a refinement calculus for deriving logic programs. The calculus contains a wide-spectrum logic programming language, including executable constructs such as sequential conjunction, disjunction, and existential quantification, as well as specification constructs such as general predicates, assumptions and universal quantification. A declarative semantics is defined for this wide-spectrum language based on executions. Executions are partial functions from states to states, where a state is represented as a set of bindings. The semantics is used to define the meaning of programs and specifications, including parameters and recursion. To complete the calculus, a notion of correctness-preserving refinement over programs in the wide-spectrum language is defined and refinement laws for developing programs are introduced. The refinement calculus is illustrated using example derivations and prototype tool support is discussed.
[ { "version": "v1", "created": "Mon, 4 Feb 2002 01:20:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Hayes", "Ian", "" ], [ "Colvin", "Robert", "" ], [ "Hemer", "David", "" ], [ "Strooper", "Paul", "" ], [ "Nickson", "Ray", "" ] ]
cs/0202003
Paul Vitanyi
Paul Vitanyi (CWI and University of Amsterdam)
Simple Optimal Wait-free Multireader Registers
11 pages LaTeX, 1 table, 2 pseudo-programs; previous version published in Proc 16th International Symposium on DIStributed Computing (DISC 2002), Lecture Notes in Computer Science, Vol 2508, Springer-Verlag, Berlin, 118-132. New version eliminates error in the protocol (merges a split scan operation that proved problematic) and defers the formal proof to a planned future I/O automaton version
null
null
null
cs.DC
null
Multireader shared registers are basic objects used as communication medium in asynchronous concurrent computation. We propose a surprisingly simple and natural scheme to obtain several wait-free constructions of bounded 1-writer multireader registers from atomic 1-writer 1-reader registers, that is easier to prove correct than any previous construction. Our main construction is the first symmetric pure timestamp one that is optimal with respect to the worst-case local use of control bits; the other one is optimal with respect to global use of control bits; both are optimal in time.
[ { "version": "v1", "created": "Mon, 4 Feb 2002 17:29:15 GMT" }, { "version": "v2", "created": "Wed, 23 Oct 2002 15:18:47 GMT" }, { "version": "v3", "created": "Thu, 15 Dec 2005 14:32:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Vitanyi", "Paul", "", "CWI and University of Amsterdam" ] ]
cs/0202004
Juergen Kropp
K. Eisenack, H. Welsch, J.P. Kropp
A Qualitative Dynamical Modelling Approach to Capital Accumulation in Unregulated Fisheries
24 pages, 6 figures
null
10.1016/j.jedc.2005.08.004
null
cs.AI cs.CE
null
Capital accumulation has been a major issue in fisheries economics over the last two decades, whereby the interaction of the fish and capital stocks were of particular interest. Because bio-economic systems are intrinsically complex, previous efforts in this field have relied on a variety of simplifying assumptions. The model presented here relaxes some of these simplifications. Problems of tractability are surmounted by using the methodology of qualitative differential equations (QDE). The theory of QDEs takes into account that scientific knowledge about particular fisheries is usually limited, and facilitates an analysis of the global dynamics of systems with more than two ordinary differential equations. The model is able to trace the evolution of capital and fish stock in good agreement with observed patterns, and shows that over-capitalization is unavoidable in unregulated fisheries.
[ { "version": "v1", "created": "Tue, 5 Feb 2002 17:50:56 GMT" }, { "version": "v2", "created": "Fri, 2 Aug 2002 10:45:15 GMT" }, { "version": "v3", "created": "Thu, 6 Oct 2005 10:41:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Eisenack", "K.", "" ], [ "Welsch", "H.", "" ], [ "Kropp", "J. P.", "" ] ]
cs/0202005
Petros Maniatis
Petros Maniatis and Mary Baker
Secure History Preservation Through Timeline Entanglement
16 pages, 12 figures, 1 table
null
null
null
cs.DC cs.CR cs.DB cs.DS
null
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the temporal ordering of system states in a provable manner. We extend secure timelines to encompass multiple, mutually distrustful services, using timeline entanglement. Timeline entanglement associates disparate timelines maintained at independent systems, by linking undeniably the past of one timeline to the future of another. Timeline entanglement is a sound method to map a time step in the history of one service onto the timeline of another, and helps clients of entangled services to get persistent temporal proofs for services rendered that survive the demise or non-cooperation of the originating service. In this paper we present the design and implementation of Timeweave, our service development framework for timeline entanglement based on two novel disk-based authenticated data structures. We evaluate Timeweave's performance characteristics and show that it can be efficiently deployed in a loosely-coupled distributed system of a few hundred services with overhead of roughly 2-8% of the processing resources of a PC-grade system.
[ { "version": "v1", "created": "Wed, 6 Feb 2002 21:52:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Maniatis", "Petros", "" ], [ "Baker", "Mary", "" ] ]
cs/0202007
Slawomir J. Nasuto
Slawomir J. Nasuto and Mark J. Bishop
Steady State Resource Allocation Analysis of the Stochastic Diffusion Search
25 pages, 7 figures
null
null
null
cs.AI cs.NE
null
This article presents the long-term behaviour analysis of Stochastic Diffusion Search (SDS), a distributed agent-based system for best-fit pattern matching. SDS operates by allocating simple agents into different regions of the search space. Agents independently pose hypotheses about the presence of the pattern in the search space and its potential distortion. Assuming a compositional structure of hypotheses about pattern matching agents perform an inference on the basis of partial evidence from the hypothesised solution. Agents posing mutually consistent hypotheses about the pattern support each other and inhibit agents with inconsistent hypotheses. This results in the emergence of a stable agent population identifying the desired solution. Positive feedback via diffusion of information between the agents significantly contributes to the speed with which the solution population is formed. The formulation of the SDS model in terms of interacting Markov Chains enables its characterisation in terms of the allocation of agents, or computational resources. The analysis characterises the stationary probability distribution of the activity of agents, which leads to the characterisation of the solution population in terms of its similarity to the target pattern.
[ { "version": "v1", "created": "Thu, 7 Feb 2002 14:11:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Nasuto", "Slawomir J.", "" ], [ "Bishop", "Mark J.", "" ] ]
cs/0202008
Mema Roussopoulos
Mema Roussopoulos and Mary Baker
CUP: Controlled Update Propagation in Peer-to-Peer Networks
15 pages, 6 figures
null
null
null
cs.NI
null
Recently the problem of indexing and locating content in peer-to-peer networks has received much attention. Previous work suggests caching index entries at intermediate nodes that lie on the paths taken by search queries, but until now there has been little focus on how to maintain these intermediate caches. This paper proposes CUP, a new comprehensive architecture for Controlled Update Propagation in peer-to-peer networks. CUP asynchronously builds caches of index entries while answering search queries. It then propagates updates of index entries to maintain these caches. Under unfavorable conditions, when compared with standard caching based on expiration times, CUP reduces the average miss latency by as much as a factor of three. Under favorable conditions, CUP can reduce the average miss latency by more than a factor of ten. CUP refreshes intermediate caches, reduces query latency, and reduces network load by coalescing bursts of queries for the same item. CUP controls and confines propagation to updates whose cost is likely to be recovered by subsequent queries. CUP gives peer-to-peer nodes the flexibility to use their own incentive-based policies to determine when to receive and when to propagate updates. Finally, the small propagation overhead incurred by CUP is more than compensated for by its savings in cache misses.
[ { "version": "v1", "created": "Fri, 8 Feb 2002 02:27:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Roussopoulos", "Mema", "" ], [ "Baker", "Mary", "" ] ]
cs/0202009
Patrik O. Hoyer
Patrik O. Hoyer
Non-negative sparse coding
null
null
null
null
cs.NE cs.CV
null
Non-negative sparse coding is a method for decomposing multivariate data into non-negative sparse components. In this paper we briefly describe the motivation behind this type of data representation and its relation to standard sparse coding and non-negative matrix factorization. We then give a simple yet efficient multiplicative algorithm for finding the optimal values of the hidden components. In addition, we show how the basis vectors can be learned from the observed data. Simulations demonstrate the effectiveness of the proposed method.
[ { "version": "v1", "created": "Mon, 11 Feb 2002 11:04:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoyer", "Patrik O.", "" ] ]
cs/0202010
Pawel Pietrzak
W. Drabent, J. Maluszynski and P. Pietrzak
Using parametric set constraints for locating errors in CLP programs
64 pages, To appear in Theory and Practice of Logic Programming
Theory and Practice of Logic Programming, Vol 2(4&5), 2002, pp 549-611.
null
null
cs.PL
null
This paper introduces a framework of parametric descriptive directional types for constraint logic programming (CLP). It proposes a method for locating type errors in CLP programs and presents a prototype debugging tool. The main technique used is checking correctness of programs w.r.t. type specifications. The approach is based on a generalization of known methods for proving correctness of logic programs to the case of parametric specifications. Set-constraint techniques are used for formulating and checking verification conditions for (parametric) polymorphic type specifications. The specifications are expressed in a parametric extension of the formalism of term grammars. The soundness of the method is proved and the prototype debugging tool supporting the proposed approach is illustrated on examples. The paper is a substantial extension of the previous work by the same authors concerning monomorphic directional types.
[ { "version": "v1", "created": "Mon, 11 Feb 2002 11:50:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Drabent", "W.", "" ], [ "Maluszynski", "J.", "" ], [ "Pietrzak", "P.", "" ] ]
cs/0202011
David Bremner
David Bremner, Ferran Hurtado, Suneeta Ramaswami, and Vera Sacristan
Small Strictly Convex Quadrilateral Meshes of Point Sets
25 pages, 23 figures. A preliminary version appeared in ISAAC 2001, Christchurch NZ
null
null
null
cs.CG
null
In this paper, we give upper and lower bounds on the number of Steiner points required to construct a strictly convex quadrilateral mesh for a planar point set. In particular, we show that $3{\lfloor\frac{n}{2}\rfloor}$ internal Steiner points are always sufficient for a convex quadrilateral mesh of $n$ points in the plane. Furthermore, for any given $n\geq 4$, there are point sets for which $\lceil\frac{n-3}{2}\rceil-1$ Steiner points are necessary for a convex quadrilateral mesh.
[ { "version": "v1", "created": "Tue, 12 Feb 2002 14:11:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Bremner", "David", "" ], [ "Hurtado", "Ferran", "" ], [ "Ramaswami", "Suneeta", "" ], [ "Sacristan", "Vera", "" ] ]
cs/0202012
Michael Leuschel
Michael Leuschel and Maurice Bruynooghe
Logic program specialisation through partial deduction: Control issues
To appear in Theory and Practice of Logic Programming
null
null
null
cs.PL cs.AI
null
Program specialisation aims at improving the overall performance of programs by performing source to source transformations. A common approach within functional and logic programming, known respectively as partial evaluation and partial deduction, is to exploit partial knowledge about the input. It is achieved through a well-automated application of parts of the Burstall-Darlington unfold/fold transformation framework. The main challenge in developing systems is to design automatic control that ensures correctness, efficiency, and termination. This survey and tutorial presents the main developments in controlling partial deduction over the past 10 years and analyses their respective merits and shortcomings. It ends with an assessment of current achievements and sketches some remaining research challenges.
[ { "version": "v1", "created": "Tue, 12 Feb 2002 14:16:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Leuschel", "Michael", "" ], [ "Bruynooghe", "Maurice", "" ] ]
cs/0202013
Jim Gray
Alexander S. Szalay, Jim Gray, Ani R. Thakar, Peter Z. Kunszt, Tanu Malik, Jordan Raddick, Christopher Stoughton, Jan vandenBerg
The SDSS SkyServer: Public Access to the Sloan Digital Sky Server Data
12 pages, original word document at http://research.microsoft.com/~gray/Papers/MSR_TR_01_104_SkyServer.doc
ACM SIGMOD 2002 proceedings
null
MSR TR 01 104
cs.DL cs.DB
null
The SkyServer provides Internet access to the public Sloan Digi-tal Sky Survey (SDSS) data for both astronomers and for science education. This paper describes the SkyServer goals and archi-tecture. It also describes our experience operating the SkyServer on the Internet. The SDSS data is public and well-documented so it makes a good test platform for research on database algorithms and performance.
[ { "version": "v1", "created": "Tue, 12 Feb 2002 23:16:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Szalay", "Alexander S.", "" ], [ "Gray", "Jim", "" ], [ "Thakar", "Ani R.", "" ], [ "Kunszt", "Peter Z.", "" ], [ "Malik", "Tanu", "" ], [ "Raddick", "Jordan", "" ], [ "Stoughton", "Christopher", "" ], [ "vandenBerg", "Jan", "" ] ]
cs/0202014
Jim Gray
Jim Gray, Alex S. Szalay, Ani R. Thakar, Peter Z. Kunszt, Christopher Stoughton, Don Slutz, Jan vandenBerg
Data Mining the SDSS SkyServer Database
40 pages, Original source is at http://research.microsoft.com/~gray/Papers/MSR_TR_O2_01_20_queries.doc
null
null
Microsoft Tech Report MSR TR 02 01
cs.DB cs.DL
null
An earlier paper (Szalay et. al. "Designing and Mining MultiTerabyte Astronomy Archives: The Sloan Digital Sky Survey," ACM SIGMOD 2000) described the Sloan Digital Sky Survey's (SDSS) data management needs by defining twenty database queries and twelve data visualization tasks that a good data management system should support. We built a database and interfaces to support both the query load and also a website for ad-hoc access. This paper reports on the database design, describes the data loading pipeline, and reports on the query implementation and performance. The queries typically translated to a single SQL statement. Most queries run in less than 20 seconds, allowing scientists to interactively explore the database. This paper is an in-depth tour of those queries. Readers should first have studied the companion overview paper Szalay et. al. "The SDSS SkyServer, Public Access to the Sloan Digital Sky Server Data" ACM SIGMOND 2002.
[ { "version": "v1", "created": "Tue, 12 Feb 2002 23:47:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Szalay", "Alex S.", "" ], [ "Thakar", "Ani R.", "" ], [ "Kunszt", "Peter Z.", "" ], [ "Stoughton", "Christopher", "" ], [ "Slutz", "Don", "" ], [ "vandenBerg", "Jan", "" ] ]
cs/0202015
Daniel Lehmann
Benny Lehmann, Daniel Lehmann and Noam Nisan
Combinatorial Auctions with Decreasing Marginal Utilities
To appear in GEB. Preliminary version appeared in EC'01
Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296
10.1016/j.geb2005.02.006
Leibniz Center for Research in Computer Science TR-2002-15, April 2002
cs.GT
null
In most of microeconomic theory, consumers are assumed to exhibit decreasing marginal utilities. This paper considers combinatorial auctions among such submodular buyers. The valuations of such buyers are placed within a hierarchy of valuations that exhibit no complementarities, a hierarchy that includes also OR and XOR combinations of singleton valuations, and valuations satisfying the gross substitutes property. Those last valuations are shown to form a zero-measure subset of the submodular valuations that have positive measure. While we show that the allocation problem among submodular valuations is NP-hard, we present an efficient greedy 2-approximation algorithm for this case and generalize it to the case of limited complementarities. No such approximation algorithm exists in a setting allowing for arbitrary complementarities. Some results about strategic aspects of combinatorial auctions among players with decreasing marginal utilities are also presented.
[ { "version": "v1", "created": "Fri, 15 Feb 2002 10:18:30 GMT" }, { "version": "v2", "created": "Thu, 12 Sep 2002 12:50:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Benny", "" ], [ "Lehmann", "Daniel", "" ], [ "Nisan", "Noam", "" ] ]
cs/0202016
Daniel Lehmann
Rica Gonen and Daniel Lehmann
Linear Programming helps solving large multi-unit combinatorial auctions
null
null
null
Leibniz Center for Research in Computer Science TR-2001-8
cs.GT cs.AI
null
Previous works suggested the use of Branch and Bound techniques for finding the optimal allocation in (multi-unit) combinatorial auctions. They remarked that Linear Programming could provide a good upper-bound to the optimal allocation, but they went on using lighter and less tight upper-bound heuristics, on the ground that LP was too time-consuming to be used repetitively to solve large combinatorial auctions. We present the results of extensive experiments solving large (multi-unit) combinatorial auctions generated according to distributions proposed by different researchers. Our surprising conclusion is that Linear Programming is worth using. Investing almost all of one's computing time in using LP to bound from above the value of the optimal solution in order to prune aggressively pays off. We present a way to save on the number of calls to the LP routine and experimental results comparing different heuristics for choosing the bid to be considered next. Those results show that the ordering based on the square root of the size of the bids that was shown to be theoretically optimal in a previous paper by the authors performs surprisingly better than others in practice. Choosing to deal first with the bid with largest coefficient (typically 1) in the optimal solution of the relaxed LP problem, is also a good choice. The gap between the lower bound provided by greedy heuristics and the upper bound provided by LP is typically small and pruning is therefore extensive. For most distributions, auctions of a few hundred goods among a few thousand bids can be solved in practice. All experiments were run on a PC under Matlab.
[ { "version": "v1", "created": "Fri, 15 Feb 2002 12:09:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Gonen", "Rica", "" ], [ "Lehmann", "Daniel", "" ] ]
cs/0202017
Daniel Lehmann
Daniel Lehmann, Liadan Ita O'Callaghan and Yoav Shoham
Truth Revelation in Approximately Efficient Combinatorial Auctions
Submitted to a Journal. A preliminary version appeared in EC'99
Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602
null
Stanford University CS-TN-99-88
cs.GT
null
Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms - in particular, their truth revelation properties - assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying natural properties for combinatorial auctions and showing that, for our restricted class of players, they imply that truthful strategies are dominant. Those properties have applicability beyond the specific auction studied.
[ { "version": "v1", "created": "Fri, 15 Feb 2002 12:24:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ], [ "O'Callaghan", "Liadan Ita", "" ], [ "Shoham", "Yoav", "" ] ]
cs/0202018
Daniel Lehmann
Daniel Lehmann
Nonmonotonic Logics and Semantics
28 pages. Misprint corrected 15/04/02
Journal of Logic and Computation, Vol. 11 No.2, pp.229-256 2001
null
Leibniz Center for Research in Computer Science TR-98-6
cs.AI cs.LO math.LO
null
Tarski gave a general semantics for deductive reasoning: a formula a may be deduced from a set A of formulas iff a holds in all models in which each of the elements of A holds. A more liberal semantics has been considered: a formula a may be deduced from a set A of formulas iff a holds in all of the "preferred" models in which all the elements of A hold. Shoham proposed that the notion of "preferred" models be defined by a partial ordering on the models of the underlying language. A more general semantics is described in this paper, based on a set of natural properties of choice functions. This semantics is here shown to be equivalent to a semantics based on comparing the relative "importance" of sets of models, by what amounts to a qualitative probability measure. The consequence operations defined by the equivalent semantics are then characterized by a weakening of Tarski's properties in which the monotonicity requirement is replaced by three weaker conditions. Classical propositional connectives are characterized by natural introduction-elimination rules in a nonmonotonic setting. Even in the nonmonotonic setting, one obtains classical propositional logic, thus showing that monotonicity is not required to justify classical propositional connectives.
[ { "version": "v1", "created": "Fri, 15 Feb 2002 12:49:11 GMT" }, { "version": "v2", "created": "Mon, 15 Apr 2002 19:49:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
cs/0202021
Daniel Lehmann
Sarit Kraus, Daniel Lehmann and Menachem Magidor
Nonmonotonic Reasoning, Preferential Models and Cumulative Logics
Presented at JELIA, June 1988. Some misprints in the Journal paper have been corrected
Journal of Artificial Intelligence, Vol. 44 Nos. 1-2 (July 1990) pp. 167-207
null
Leibniz Center for Research in Computer Science TR-88-15
cs.AI
null
Many systems that exhibit nonmonotonic behavior have been described and studied already in the literature. The general notion of nonmonotonic reasoning, though, has almost always been described only negatively, by the property it does not enjoy, i.e. monotonicity. We study here general patterns of nonmonotonic reasoning and try to isolate properties that could help us map the field of nonmonotonic reasoning by reference to positive properties. We concentrate on a number of families of nonmonotonic consequence relations, defined in the style of Gentzen. Both proof-theoretic and semantic points of view are developed in parallel. The former point of view was pioneered by D. Gabbay, while the latter has been advocated by Y. Shoham in. Five such families are defined and characterized by representation theorems, relating the two points of view. One of the families of interest, that of preferential relations, turns out to have been studied by E. Adams. The "preferential" models proposed here are a much stronger tool than Adams' probabilistic semantics. The basic language used in this paper is that of propositional logic. The extension of our results to first order predicate calculi and the study of the computational complexity of the decision problems described in this paper will be treated in another paper.
[ { "version": "v1", "created": "Mon, 18 Feb 2002 10:29:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Kraus", "Sarit", "" ], [ "Lehmann", "Daniel", "" ], [ "Magidor", "Menachem", "" ] ]
cs/0202022
Daniel Lehmann
Daniel Lehmann and Menachem Magidor
What does a conditional knowledge base entail?
Preliminary version presented at KR'89. Minor corrections of the Journal Version
Journal of Artificial Intelligence, Vol. 55 no.1 (May 1992) pp. 1-60. Erratum in Vol. 68 (1994) p. 411
null
Leibniz Center for Research in Computer Science TR-88-16 and TR-90-10
cs.AI
null
This paper presents a logical approach to nonmonotonic reasoning based on the notion of a nonmonotonic consequence relation. A conditional knowledge base, consisting of a set of conditional assertions of the type "if ... then ...", represents the explicit defeasible knowledge an agent has about the way the world generally behaves. We look for a plausible definition of the set of all conditional assertions entailed by a conditional knowledge base. In a previous paper, S. Kraus and the authors defined and studied "preferential" consequence relations. They noticed that not all preferential relations could be considered as reasonable inference procedures. This paper studies a more restricted class of consequence relations, "rational" relations. It is argued that any reasonable nonmonotonic inference procedure should define a rational relation. It is shown that the rational relations are exactly those that may be represented by a "ranked" preferential model, or by a (non-standard) probabilistic model. The rational closure of a conditional knowledge base is defined and shown to provide an attractive answer to the question of the title. Global properties of this closure operation are proved: it is a cumulative operation. It is also computationally tractable. This paper assumes the underlying language is propositional.
[ { "version": "v1", "created": "Mon, 18 Feb 2002 12:43:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ], [ "Magidor", "Menachem", "" ] ]
cs/0202023
Daniel Lehmann
Daniel Lehmann
Expected Qualitative Utility Maximization
Small correction in Section 4
Games and Economic Behavior, Vol. 35, No. 1-2 (April 2001) pp. 54-79
null
Leibniz Center for Research in Computer Science TR-97-15
cs.GT
null
A model for decision making that generalizes Expected Utility Maximization is presented. This model, Expected Qualitative Utility Maximization, encompasses the Maximin criterion. It relaxes both the Independence and the Continuity postulates. Its main ingredient is the definition of a qualitative order on nonstandard models of the real numbers and the consideration of nonstandard utilities. Expected Qualitative Utility Maximization is characterized by an original weakening of von Neumann-Morgenstern's postulates. Subjective probabilities may be defined from those weakened postulates, as Anscombe and Aumann did from the original postulates. Subjective probabilities are numbers, not matrices as in the Subjective Expected Lexicographic Utility approach. JEL no.: D81 Keywords: Utility Theory, Non-Standard Utilities, Qualitative Decision Theory
[ { "version": "v1", "created": "Mon, 18 Feb 2002 14:55:49 GMT" }, { "version": "v2", "created": "Wed, 20 Feb 2002 13:32:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
cs/0202024
Daniel Lehmann
Daniel Lehmann
A note on Darwiche and Pearl
A small unpublished remark on a paper by Darwiche and Pearl
null
null
null
cs.AI
null
It is shown that Darwiche and Pearl's postulates imply an interesting property, not noticed by the authors.
[ { "version": "v1", "created": "Mon, 18 Feb 2002 15:23:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
cs/0202025
Daniel Lehmann
Daniel Lehmann, Menachem Magidor and Karl Schlechta
Distance Semantics for Belief Revision
Preliminary version presented at TARK '96
Journal of Symbolic Logic, Vol. 66 No.1 (March 2001) pp. 295-317
null
Leibniz Center for Research in Computer Science TR-98-10
cs.AI
null
A vast and interesting family of natural semantics for belief revision is defined. Suppose one is given a distance d between any two models. One may then define the revision of a theory K by a formula a as the theory defined by the set of all those models of a that are closest, by d, to the set of models of K. This family is characterized by a set of rationality postulates that extends the AGM postulates. The new postulates describe properties of iterated revisions.
[ { "version": "v1", "created": "Mon, 18 Feb 2002 15:36:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ], [ "Magidor", "Menachem", "" ], [ "Schlechta", "Karl", "" ] ]
cs/0202026
Daniel Lehmann
Shai Berger, Daniel Lehmann and Karl Schlechta
Preferred History Semantics for Iterated Updates
null
Journal of Logic and Computation, Vol. 9 no. 6 (1999) pp. 817-833
null
Leibniz Center for Research in Computer SCience TR-98-11 (July 1998)
cs.AI
null
We give a semantics to iterated update by a preference relation on possible developments. An iterated update is a sequence of formulas, giving (incomplete) information about successive states of the world. A development is a sequence of models, describing a possible trajectory through time. We assume a principle of inertia and prefer those developments, which are compatible with the information, and avoid unnecessary changes. The logical properties of the updates defined in this way are considered, and a representation result is proved.
[ { "version": "v1", "created": "Mon, 18 Feb 2002 15:53:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Berger", "Shai", "" ], [ "Lehmann", "Daniel", "" ], [ "Schlechta", "Karl", "" ] ]
cs/0202027
Naren Ramakrishnan
Alex Verstak, Naren Ramakrishnan, Layne T. Watson, Jian He, Clifford A. Shaffer, Kyung Kyoon Bae, Jing Jiang, William H. Tranter, Theodore S. Rappaport
BSML: A Binding Schema Markup Language for Data Interchange in Problem Solving Environments (PSEs)
null
null
null
null
cs.CE cs.SE
null
We describe a binding schema markup language (BSML) for describing data interchange between scientific codes. Such a facility is an important constituent of scientific problem solving environments (PSEs). BSML is designed to integrate with a PSE or application composition system that views model specification and execution as a problem of managing semistructured data. The data interchange problem is addressed by three techniques for processing semistructured data: validation, binding, and conversion. We present BSML and describe its application to a PSE for wireless communications system design.
[ { "version": "v1", "created": "Mon, 18 Feb 2002 16:01:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Verstak", "Alex", "" ], [ "Ramakrishnan", "Naren", "" ], [ "Watson", "Layne T.", "" ], [ "He", "Jian", "" ], [ "Shaffer", "Clifford A.", "" ], [ "Bae", "Kyung Kyoon", "" ], [ "Jiang", "Jing", "" ], [ "Tranter", "William H.", "" ], [ "Rappaport", "Theodore S.", "" ] ]
cs/0202028
Daniel Lehmann
Daniel Lehmann
Classes of service under perfect competition and technological change: a model for the dynamics of the Internet?
Extended abstract in Proceedings of EC'01
null
null
Leibniz Center for Research in Computer Science: TR-2000-42
cs.GT
null
Certain services may be provided in a continuous, one-dimensional, ordered range of different qualities and a customer requiring a service of quality q can only be offered a quality superior or equal to q. Only a discrete set of different qualities will be offered, and a service provider will provide the same service (of fixed quality b) to all customers requesting qualities of service inferior or equal to b. Assuming all services (of quality b) are priced identically, a monopolist will choose the qualities of service and the prices that maximize profit but, under perfect competition, a service provider will choose the (inferior) quality of service that can be priced at the lowest price. Assuming significant economies of scale, two fundamentally different regimes are possible: either a number of different classes of service are offered (DC regime), or a unique class of service offers an unbounded quality of service (UC regime). The DC regime appears in one of two sub-regimes: one, BDC, in which a finite number of classes is offered, the qualities of service offered are bounded and requests for high-quality services are not met, or UDC in which an infinite number of classes of service are offered and every request is met. The types of the demand curve and of the economies of scale, not the pace of technological change, determine the regime and the class boundaries. The price structure in the DC regime obeys very general laws.
[ { "version": "v1", "created": "Wed, 20 Feb 2002 11:53:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
cs/0202029
Daniel Lehmann
Daniel Lehmann
Nonstandard numbers for qualitative decision making
14 pages. Presented at TARK'98
Proceedings of the 7th Conference on Theoretical Aspects of Reasoning and Knowledge, I. Gilboa ed., Evanston Ill., July 1998, pp. 161-174
null
Leibniz Center for Research in Computer Science: TR-97-15
cs.GT
null
The consideration of nonstandard models of the real numbers and the definition of a qualitative ordering on those models provides a generalization of the principle of maximization of expected utility. It enables the decider to assign probabilities of different orders of magnitude to different events or to assign utilities of different orders of magnitude to different outcomes. The properties of this generalized notion of rationality are studied in the frameworks proposed by von Neumann and Morgenstern and later by Anscombe and Aumann. It is characterized by an original weakening of their postulates in two different situations: nonstandard probabilities and standard utilities on one hand and standard probabilities and nonstandard utilities on the other hand. This weakening concerns both Independence and Continuity. It is orthogonal with the weakening proposed by lexicographic orderings.
[ { "version": "v1", "created": "Wed, 20 Feb 2002 12:59:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
cs/0202030
Daniel Lehmann
Daniel Lehmann
Generalized Qualitative Probability: Savage revisited
Presented at UAI'96
Twelfth Conference on Uncertainty in Artificial Intelligence, E. Horvitz and F. Jensen eds., Morgan Kaufmann, pp. 381-388, Portland, Oregon, August 1996
null
null
cs.GT cs.AI
null
Preferences among acts are analyzed in the style of L. Savage, but as partially ordered. The rationality postulates considered are weaker than Savage's on three counts. The Sure Thing Principle is derived in this setting. The postulates are shown to lead to a characterization of generalized qualitative probability that includes and blends both traditional qualitative probability and the ranked structures used in logical approaches.
[ { "version": "v1", "created": "Wed, 20 Feb 2002 13:48:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
cs/0202031
Daniel Lehmann
Michael Freund and Daniel Lehmann
Nonmonotonic inference operations
54 pages. A short version appeared in Studia Logica, Vol. 53 no. 2 (1994) pp. 161-201
Bulletin of the IGPL, Vol. 1 no. 1 (July 1993), pp. 23-68
null
Leibniz Center for Research in Computer Science: TR-92-2
cs.AI
null
A. Tarski proposed the study of infinitary consequence operations as the central topic of mathematical logic. He considered monotonicity to be a property of all such operations. In this paper, we weaken the monotonicity requirement and consider more general operations, inference operations. These operations describe the nonmonotonic logics both humans and machines seem to be using when infering defeasible information from incomplete knowledge. We single out a number of interesting families of inference operations. This study of infinitary inference operations is inspired by the results of Kraus, Lehmann and Magidor on finitary nonmonotonic operations, but this paper is self-contained.
[ { "version": "v1", "created": "Wed, 20 Feb 2002 14:19:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Freund", "Michael", "" ], [ "Lehmann", "Daniel", "" ] ]
cs/0202032
Daniel Lehmann
Rica Gonen and Daniel Lehmann
Optimal Solutions for Multi-Unit Combinatorial Auctions: Branch and Bound Heuristics
Presented at EC'00
Second ACM Conference on Electronic Commerce (EC'00) Minneapolis, Minnesota, October 2000, pp. 13-20
null
null
cs.GT cs.AI
null
Finding optimal solutions for multi-unit combinatorial auctions is a hard problem and finding approximations to the optimal solution is also hard. We investigate the use of Branch-and-Bound techniques: they require both a way to bound from above the value of the best allocation and a good criterion to decide which bids are to be tried first. Different methods for efficiently bounding from above the value of the best allocation are considered. Theoretical original results characterize the best approximation ratio and the ordering criterion that provides it. We suggest to use this criterion.
[ { "version": "v1", "created": "Wed, 20 Feb 2002 14:38:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Gonen", "Rica", "" ], [ "Lehmann", "Daniel", "" ] ]
cs/0202033
Daniel Lehmann
Daniel Lehmann
The logical meaning of Expansion
9 pages. Unpublished
null
null
null
cs.AI
null
The Expansion property considered by researchers in Social Choice is shown to correspond to a logical property of nonmonotonic consequence relations that is the {\em pure}, i.e., not involving connectives, version of a previously known weak rationality condition. The assumption that the union of two definable sets of models is definable is needed for the soundness part of the result.
[ { "version": "v1", "created": "Wed, 20 Feb 2002 14:50:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
cs/0202034
Daniel Lehmann
Elie Bienenstock and Daniel Lehmann
Covariance Plasticity and Regulated Criticality
35 pages, 8 figures
Advances in Complex Systems, 1(4) (1998) pp. 361-384
null
Center for Neural Computation, Hebrew University, Jerusalem TR-95-1
cs.NE cs.AI nlin.AO q-bio
null
We propose that a regulation mechanism based on Hebbian covariance plasticity may cause the brain to operate near criticality. We analyze the effect of such a regulation on the dynamics of a network with excitatory and inhibitory neurons and uniform connectivity within and across the two populations. We show that, under broad conditions, the system converges to a critical state lying at the common boundary of three regions in parameter space; these correspond to three modes of behavior: high activity, low activity, oscillation.
[ { "version": "v1", "created": "Wed, 20 Feb 2002 17:12:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Bienenstock", "Elie", "" ], [ "Lehmann", "Daniel", "" ] ]
cs/0202035
Kamal Karlapalem
Satyanarayana R Valluri, Soujanya Vadapalli, Kamalakar Karlapalem
Sprinkling Selections over Join DAGs for Efficient Query Optimization
12 Pages
null
null
null
cs.DB
null
In optimizing queries, solutions based on AND/OR DAG can generate all possible join orderings and select placements before searching for optimal query execution strategy. But as the number of joins and selection conditions increase, the space and time complexity to generate optimal query plan increases exponentially. In this paper, we use join graph for a relational database schema to either pre-compute all possible join orderings that can be executed and store it as a join DAG or, extract joins in the queries to incrementally build a history join DAG as and when the queries are executed. The select conditions in the queries are appropriately placed in the retrieved join DAG (or, history join DAG) to generate optimal query execution strategy. We experimentally evaluate our query optimization technique on TPC-D/H query sets to show their effectiveness over AND/OR DAG query optimization strategy. Finally, we illustrate how our technique can be used for efficient multiple query optimization and selection of materialized views in data warehousing environments.
[ { "version": "v1", "created": "Thu, 21 Feb 2002 05:23:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Valluri", "Satyanarayana R", "" ], [ "Vadapalli", "Soujanya", "" ], [ "Karlapalem", "Kamalakar", "" ] ]
cs/0202036
Elmar Boehler
E. Boehler, E. Hemaspaandra, Steffen Reith, Heribert Vollmer
Equivalence and Isomorphism for Boolean Constraint Satisfaction
null
null
null
null
cs.CC cs.LO
null
A Boolean constraint satisfaction instance is a conjunction of constraint applications, where the allowed constraints are drawn from a fixed set B of Boolean functions. We consider the problem of determining whether two given constraint satisfaction instances are equivalent and prove a Dichotomy Theorem by showing that for all sets C of allowed constraints, this problem is either polynomial-time solvable or coNP-complete, and we give a simple criterion to determine which case holds. A more general problem addressed in this paper is the isomorphism problem, the problem of determining whether there exists a renaming of the variables that makes two given constraint satisfaction instances equivalent in the above sense. We prove that this problem is coNP-hard if the corresponding equivalence problem is coNP-hard, and polynomial-time many-one reducible to the graph isomorphism problem in all other cases.
[ { "version": "v1", "created": "Mon, 25 Feb 2002 15:38:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Boehler", "E.", "" ], [ "Hemaspaandra", "E.", "" ], [ "Reith", "Steffen", "" ], [ "Vollmer", "Heribert", "" ] ]
cs/0202037
Jan Van den Bussche
Jan Van den Bussche, Stijn Vansummeren, Gottfried Vossen
Towards practical meta-querying
Includes a new section "Experimental performance evaluation"
Information Systems, Volume 30, Issue 4 , June 2005, Pages 317-332
10.1016/j.is.2004.04.001
null
cs.DB
null
We describe a meta-querying system for databases containing queries in addition to ordinary data. In the context of such databases, a meta-query is a query about queries. Representing stored queries in XML, and using the standard XML manipulation language XSLT as a sublanguage, we show that just a few features need to be added to SQL to turn it into a fully-fledged meta-query language. The good news is that these features can be directly supported by extensible database technology.
[ { "version": "v1", "created": "Mon, 25 Feb 2002 19:35:12 GMT" }, { "version": "v2", "created": "Mon, 13 Oct 2003 12:29:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Bussche", "Jan Van den", "" ], [ "Vansummeren", "Stijn", "" ], [ "Vossen", "Gottfried", "" ] ]
cs/0202038
Leszczynski
Leszczynski Jacek, Pluta Sebastian
The efficient generation of unstructured control volumes in 2D and 3D
8 pages, 2 figures, Parallel Processing and Applied Mathematics (PPAM2001) Conference, under publishing in Lecture Notes in Computer Science, Springer Verlag
Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2328, 2001, pp. 682-689
null
null
cs.CG cs.CE cs.NA math.NA physics.comp-ph
null
Many problems in engineering, chemistry and physics require the representation of solutions in complex geometries. In the paper we deal with a problem of unstructured mesh generation for the control volume method. We propose an algorithm which bases on the spheres generation in central points of the control volumes.
[ { "version": "v1", "created": "Tue, 26 Feb 2002 16:32:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacek", "Leszczynski", "" ], [ "Sebastian", "Pluta", "" ] ]
cs/0203001
Laemmel
Ralf Laemmel
Towards Generic Refactoring
null
null
null
null
cs.PL
null
We study program refactoring while considering the language or even the programming paradigm as a parameter. We use typed functional programs, namely Haskell programs, as the specification medium for a corresponding refactoring framework. In order to detach ourselves from language syntax, our specifications adhere to the following style. (I) As for primitive algorithms for program analysis and transformation, we employ generic function combinators supporting generic traversal and polymorphic functions refined by ad-hoc cases. (II) As for the language abstractions involved in refactorings, we design a dedicated multi-parameter class. This class can be instantiated for abstractions as present in various languages, e.g., Java, Prolog or Haskell.
[ { "version": "v1", "created": "Fri, 1 Mar 2002 11:58:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Laemmel", "Ralf", "" ] ]
cs/0203002
Daniel Lehmann
Daniel Lehmann
Another perspective on Default Reasoning
Presented at Workshop on Logical Formalizations of Commense Sense, Austin (Texas), January 1993
Annals of Mathematics and Artificial Intelligence, 15(1) (1995) pp. 61-82
null
Leibniz Center for Research in Computer Science TR-92-12, July 1992
cs.AI
null
The lexicographic closure of any given finite set D of normal defaults is defined. A conditional assertion "if a then b" is in this lexicographic closure if, given the defaults D and the fact a, one would conclude b. The lexicographic closure is essentially a rational extension of D, and of its rational closure, defined in a previous paper. It provides a logic of normal defaults that is different from the one proposed by R. Reiter and that is rich enough not to require the consideration of non-normal defaults. A large number of examples are provided to show that the lexicographic closure corresponds to the basic intuitions behind Reiter's logic of defaults.
[ { "version": "v1", "created": "Fri, 1 Mar 2002 11:06:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
cs/0203003
Daniel Lehmann
Yuri Kaluzhny and Daniel Lehmann
Deductive Nonmonotonic Inference Operations: Antitonic Representations
null
Journal of Logic and Computation, 5(1) (1995) pp. 111-122
null
Leibniz Center for Research in Computer Science TR-94-3, March 1994
cs.AI
null
We provide a characterization of those nonmonotonic inference operations C for which C(X) may be described as the set of all logical consequences of X together with some set of additional assumptions S(X) that depends anti-monotonically on X (i.e., X is a subset of Y implies that S(Y) is a subset of S(X)). The operations represented are exactly characterized in terms of properties most of which have been studied in Freund-Lehmann(cs.AI/0202031). Similar characterizations of right-absorbing and cumulative operations are also provided. For cumulative operations, our results fit in closely with those of Freund. We then discuss extending finitary operations to infinitary operations in a canonical way and discuss co-compactness properties. Our results provide a satisfactory notion of pseudo-compactness, generalizing to deductive nonmonotonic operations the notion of compactness for monotonic operations. They also provide an alternative, more elegant and more general, proof of the existence of an infinitary deductive extension for any finitary deductive operation (Theorem 7.9 of Freund-Lehmann).
[ { "version": "v1", "created": "Fri, 1 Mar 2002 11:20:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaluzhny", "Yuri", "" ], [ "Lehmann", "Daniel", "" ] ]
cs/0203004
Daniel Lehmann
Daniel Lehmann
Stereotypical Reasoning: Logical Properties
Presented at Fourth Workshop on Logic, Language, Information and Computation, Fortaleza (Brasil), August 1997
Logic Journal of the Interest Group in Pure and Applied Logics (IGPL), 6(1) (1998) pp. 49-58
null
Leibniz Center for Research in Computer Science TR-97-10
cs.AI
null
Stereotypical reasoning assumes that the situation at hand is one of a kind and that it enjoys the properties generally associated with that kind of situation. It is one of the most basic forms of nonmonotonic reasoning. A formal model for stereotypical reasoning is proposed and the logical properties of this form of reasoning are studied. Stereotypical reasoning is shown to be cumulative under weak assumptions.
[ { "version": "v1", "created": "Mon, 4 Mar 2002 08:57:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
cs/0203005
Torsten Schaub
J. P. Delgrande, T. Schaub, and H. Tompits
A Framework for Compiling Preferences in Logic Programs
To appear in Theory and Practice of Logic Programming
null
null
null
cs.AI
null
We introduce a methodology and framework for expressing general preference information in logic programming under the answer set semantics. An ordered logic program is an extended logic program in which rules are named by unique terms, and in which preferences among rules are given by a set of atoms of form s < t where s and t are names. An ordered logic program is transformed into a second, regular, extended logic program wherein the preferences are respected, in that the answer sets obtained in the transformed program correspond with the preferred answer sets of the original program. Our approach allows the specification of dynamic orderings, in which preferences can appear arbitrarily within a program. Static orderings (in which preferences are external to a logic program) are a trivial restriction of the general dynamic case. First, we develop a specific approach to reasoning with preferences, wherein the preference ordering specifies the order in which rules are to be applied. We then demonstrate the wide range of applicability of our framework by showing how other approaches, among them that of Brewka and Eiter, can be captured within our framework. Since the result of each of these transformations is an extended logic program, we can make use of existing implementations, such as dlv and smodels. To this end, we have developed a publicly available compiler as a front-end for these programming systems.
[ { "version": "v1", "created": "Mon, 4 Mar 2002 13:00:41 GMT" }, { "version": "v2", "created": "Tue, 5 Mar 2002 14:01:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Delgrande", "J. P.", "" ], [ "Schaub", "T.", "" ], [ "Tompits", "H.", "" ] ]
cs/0203006
Ernesto Pimentel
Juan M. Molina and Ernesto Pimentel
Composing Programs in a Rewriting Logic for Declarative Programming
47 pages. A shorter version (33 pages) will appear in the Journal of Theory and Practice of Logic Programming
null
null
LCC852
cs.LO cs.PL
null
Constructor-Based Conditional Rewriting Logic is a general framework for integrating first-order functional and logic programming which gives an algebraic semantics for non-deterministic functional-logic programs. In the context of this formalism, we introduce a simple notion of program module as an open program which can be extended together with several mechanisms to combine them. These mechanisms are based on a reduced set of operations. However, the high expressiveness of these operations enable us to model typical constructs for program modularization like hiding, export/import, genericity/instantiation, and inheritance in a simple way. We also deal with the semantic aspects of the proposal by introducing an immediate consequence operator, and studying several alternative semantics for a program module, based on this operator, in the line of logic programming: the operator itself, its least fixpoint (the least model of the module), the set of its pre-fixpoints (term models of the module), and some other variations in order to find a compositional and fully abstract semantics wrt the set of operations and a natural notion of observability.
[ { "version": "v1", "created": "Mon, 4 Mar 2002 19:02:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Molina", "Juan M.", "" ], [ "Pimentel", "Ernesto", "" ] ]
cs/0203007
Yan Zhang
Yan Zhang
Two results for proiritized logic programming
20 pages, to be appeared in journal Theory and Practice of Logic Programming
null
null
null
cs.AI
null
Prioritized default reasoning has illustrated its rich expressiveness and flexibility in knowledge representation and reasoning. However, many important aspects of prioritized default reasoning have yet to be thoroughly explored. In this paper, we investigate two properties of prioritized logic programs in the context of answer set semantics. Specifically, we reveal a close relationship between mutual defeasibility and uniqueness of the answer set for a prioritized logic program. We then explore how the splitting technique for extended logic programs can be extended to prioritized logic programs. We prove splitting theorems that can be used to simplify the evaluation of a prioritized logic program under certain conditions.
[ { "version": "v1", "created": "Tue, 5 Mar 2002 00:28:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Yan", "" ] ]
cs/0203008
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 43
3 pages, 1 figure
SIGACT News, 33(1) Issue 122, Mar. 2002, 58-60
null
null
cs.CG cs.DM
null
The concept of pointed pseudo-triangulations is defined and a few of its applications described.
[ { "version": "v1", "created": "Wed, 6 Mar 2002 13:49:36 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/0203009
Judith Beumer
O. S. Matlin, E. Lusk, and W. McCune
SPINning Parallel Systems Software
19 pages; 8 figures; 3 tables
null
null
ANL/MCS-P921-1201
cs.LO cs.DC
null
We describe our experiences in using SPIN to verify parts of the Multi Purpose Daemon (MPD) parallel process management system. MPD is a distributed collection of processes connected by Unix network sockets. MPD is dynamic: processes and connections among them are created and destroyed as MPD is initialized, runs user processes, recovers from faults, and terminates. This dynamic nature is easily expressible in the SPIN/PROMELA framework but poses performance and scalability challenges. We present here the results of expressing some of the parallel algorithms of MPD and executing both simulation and verification runs with SPIN.
[ { "version": "v1", "created": "Wed, 6 Mar 2002 18:15:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Matlin", "O. S.", "" ], [ "Lusk", "E.", "" ], [ "McCune", "W.", "" ] ]
cs/0203010
Luis Nunes
L. Nunes, E. Oliveira
On Learning by Exchanging Advice
12 pages, 6 figures, 1 table, accepted in Second Symposium on Adaptive Agents and Multi-Agent Systems (AAMAS-II), 2002
null
null
null
cs.LG cs.MA
null
One of the main questions concerning learning in Multi-Agent Systems is: (How) can agents benefit from mutual interaction during the learning process?. This paper describes the study of an interactive advice-exchange mechanism as a possible way to improve agents' learning performance. The advice-exchange technique, discussed here, uses supervised learning (backpropagation), where reinforcement is not directly coming from the environment but is based on advice given by peers with better performance score (higher confidence), to enhance the performance of a heterogeneous group of Learning Agents (LAs). The LAs are facing similar problems, in an environment where only reinforcement information is available. Each LA applies a different, well known, learning technique: Random Walk (hill-climbing), Simulated Annealing, Evolutionary Algorithms and Q-Learning. The problem used for evaluation is a simplified traffic-control simulation. Initial results indicate that advice-exchange can improve learning speed, although bad advice and/or blind reliance can disturb the learning performance.
[ { "version": "v1", "created": "Thu, 7 Mar 2002 10:16:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Nunes", "L.", "" ], [ "Oliveira", "E.", "" ] ]
cs/0203011
Stuart E. Middleton
S.E. Middleton, D.C. De Roure, N.R. Shadbolt
Capturing Knowledge of User Preferences: ontologies on recommender systems
First international conference on Knowledge Capture 2001, 8 pages
null
null
null
cs.LG cs.MA
null
Tools for filtering the World Wide Web exist, but they are hampered by the difficulty of capturing user preferences in such a dynamic environment. We explore the acquisition of user profiles by unobtrusive monitoring of browsing behaviour and application of supervised machine-learning techniques coupled with an ontological representation to extract user preferences. A multi-class approach to paper classification is used, allowing the paper topic taxonomy to be utilised during profile construction. The Quickstep recommender system is presented and two empirical studies evaluate it in a real work setting, measuring the effectiveness of using a hierarchical topic ontology compared with an extendable flat list.
[ { "version": "v1", "created": "Fri, 8 Mar 2002 15:58:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Middleton", "S. E.", "" ], [ "De Roure", "D. C.", "" ], [ "Shadbolt", "N. R.", "" ] ]
cs/0203012
Stuart E. Middleton
Stuart E. Middleton
Interface agents: A review of the field
Technical report, 28 pages, aug 2001
null
null
ECSTR-IAM01-001
cs.MA cs.LG
null
This paper reviews the origins of interface agents, discusses challenges that exist within the interface agent field and presents a survey of current attempts to find solutions to these challenges. A history of agent systems from their birth in the 1960's to the current day is described, along with the issues they try to address. A taxonomy of interface agent systems is presented, and today's agent systems categorized accordingly. Lastly, an analysis of the machine learning and user modelling techniques used by today's agents is presented.
[ { "version": "v1", "created": "Sat, 9 Mar 2002 01:28:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Middleton", "Stuart E.", "" ] ]
cs/0203013
Pedrito Maynard-Reid Ii
Pedrito Maynard-Reid II (Miami University), Daniel Lehmann (Hebrew University)
Representing and Aggregating Conflicting Beliefs
19 pages, 5 figures, appears (without proofs) in Proceedings of the Seventh International Conference on Principles of Knowledge Representation and Reasoning (KR 2000)
Proceedings of the Seventh International Conference on Principles of Knowledge Representation and Reasoning (KR 2000), April 2000, pp. 153-164
null
null
cs.AI cs.LO
null
We consider the two-fold problem of representing collective beliefs and aggregating these beliefs. We propose modular, transitive relations for collective beliefs. They allow us to represent conflicting opinions and they have a clear semantics. We compare them with the quasi-transitive relations often used in Social Choice. Then, we describe a way to construct the belief state of an agent informed by a set of sources of varying degrees of reliability. This construction circumvents Arrow's Impossibility Theorem in a satisfactory manner. Finally, we give a simple set-theory-based operator for combining the information of multiple agents. We show that this operator satisfies the desirable invariants of idempotence, commutativity, and associativity, and, thus, is well-behaved when iterated, and we describe a computationally effective way of computing the resulting belief state.
[ { "version": "v1", "created": "Mon, 11 Mar 2002 23:02:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Maynard-Reid", "Pedrito", "II", "Miami University" ], [ "Lehmann", "Daniel", "", "Hebrew\n University" ] ]
cs/0203015
Dr Cameron L. Jones
Cameron L Jones
Towards Experimental Nanosound Using Almost Disjoint Set Theory
20 pages, 4 figures, 1 table
null
null
null
cs.SD cs.LO
null
Music composition using digital audio sequence editors is increasingly performed in a visual workspace where sound complexes are built from discrete sound objects, called gestures that are arranged in time and space to generate a continuous composition. The visual workspace, common to most industry standard audio loop sequencing software, is premised on the arrangement of gestures defined with geometric shape properties. Here, one aspect of fractal set theory was validated using audio-frequency sets to evaluate self-affine scaling behavior when new sound complexes are built through union and intersection operations on discrete musical gestures. Results showed that intersection of two sets revealed lower complexity compared with the union operator, meaning that the intersection of two sound gestures is an almost disjoint set, and in accord with formal logic. These results are also discussed with reference to fuzzy sets, cellular automata, nanotechnology and self-organization to further explore the link between sequenced notation and complexity.
[ { "version": "v1", "created": "Tue, 12 Mar 2002 09:21:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Jones", "Cameron L", "" ] ]
cs/0203016
Jack H. Lutz
Jack H. Lutz
Dimension in Complexity Classes
24 pages
null
null
null
cs.CC
null
A theory of resource-bounded dimension is developed using gales, which are natural generalizations of martingales. When the resource bound \Delta (a parameter of the theory) is unrestricted, the resulting dimension is precisely the classical Hausdorff dimension (sometimes called fractal dimension). Other choices of the parameter \Delta yield internal dimension theories in E, E2, ESPACE, and other complexity classes, and in the class of all decidable problems. In general, if C is such a class, then every set X of languages has a dimension in C, which is a real number dim(X|C) in [0,1]. Along with the elements of this theory, two preliminary applications are presented: 1. For every real number \alpha in (0,1/2), the set FREQ(<=\alpha), consisting of all languages that asymptotically contain at most \alpha of all strings, has dimension H(\alpha) -- the binary entropy of \alpha -- in E and in E2. 2. For every real number \alpha in (0,1), the set SIZE(\alpha* (2^n)/n), consisting of all languages decidable by Boolean circuits of at most \alpha*(2^n)/n gates, has dimension \alpha in ESPACE.
[ { "version": "v1", "created": "Tue, 12 Mar 2002 20:16:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Lutz", "Jack H.", "" ] ]
cs/0203017
Jack H. Lutz
Jack H. Lutz
The Dimensions of Individual Strings and Sequences
31 pages
null
null
null
cs.CC
null
A constructive version of Hausdorff dimension is developed using constructive supergales, which are betting strategies that generalize the constructive supermartingales used in the theory of individual random sequences. This constructive dimension is used to assign every individual (infinite, binary) sequence S a dimension, which is a real number dim(S) in the interval [0,1]. Sequences that are random (in the sense of Martin-Lof) have dimension 1, while sequences that are decidable, \Sigma^0_1, or \Pi^0_1 have dimension 0. It is shown that for every \Delta^0_2-computable real number \alpha in [0,1] there is a \Delta^0_2 sequence S such that \dim(S) = \alpha. A discrete version of constructive dimension is also developed using termgales, which are supergale-like functions that bet on the terminations of (finite, binary) strings as well as on their successive bits. This discrete dimension is used to assign each individual string w a dimension, which is a nonnegative real number dim(w). The dimension of a sequence is shown to be the limit infimum of the dimensions of its prefixes. The Kolmogorov complexity of a string is proven to be the product of its length and its dimension. This gives a new characterization of algorithmic information and a new proof of Mayordomo's recent theorem stating that the dimension of a sequence is the limit infimum of the average Kolmogorov complexity of its first n bits. Every sequence that is random relative to any computable sequence of coin-toss biases that converge to a real number \beta in (0,1) is shown to have dimension \H(\beta), the binary entropy of \beta.
[ { "version": "v1", "created": "Tue, 12 Mar 2002 20:28:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Lutz", "Jack H.", "" ] ]
cs/0203018
Adam L. Buchsbaum
Adam L. Buchsbaum, Glenn S. Fowler, Raffaele Giancarlo
Improving Table Compression with Combinatorial Optimization
22 pages, 2 figures, 5 tables, 23 references. Extended abstract appears in Proc. 13th ACM-SIAM SODA, pp. 213-222, 2002
JACM 50(6):825-851, 2003
null
null
cs.DS
null
We study the problem of compressing massive tables within the partition-training paradigm introduced by Buchsbaum et al. [SODA'00], in which a table is partitioned by an off-line training procedure into disjoint intervals of columns, each of which is compressed separately by a standard, on-line compressor like gzip. We provide a new theory that unifies previous experimental observations on partitioning and heuristic observations on column permutation, all of which are used to improve compression rates. Based on the theory, we devise the first on-line training algorithms for table compression, which can be applied to individual files, not just continuously operating sources; and also a new, off-line training algorithm, based on a link to the asymmetric traveling salesman problem, which improves on prior work by rearranging columns prior to partitioning. We demonstrate these results experimentally. On various test files, the on-line algorithms provide 35-55% improvement over gzip with negligible slowdown; the off-line reordering provides up to 20% further improvement over partitioning alone. We also show that a variation of the table compression problem is MAX-SNP hard.
[ { "version": "v1", "created": "Wed, 13 Mar 2002 19:09:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Buchsbaum", "Adam L.", "" ], [ "Fowler", "Glenn S.", "" ], [ "Giancarlo", "Raffaele", "" ] ]
cs/0203019
Rajkumar Buyya
Rajkumar Buyya and Manzur Murshed
GridSim: A Toolkit for the Modeling and Simulation of Distributed Resource Management and Scheduling for Grid Computing
null
Concurrency and Computation: Practice and Experience, Wiley, May 2002
null
null
cs.DC
null
Clusters, grids, and peer-to-peer (P2P) networks have emerged as popular paradigms for next generation parallel and distributed computing. The management of resources and scheduling of applications in such large-scale distributed systems is a complex undertaking. In order to prove the effectiveness of resource brokers and associated scheduling algorithms, their performance needs to be evaluated under different scenarios such as varying number of resources and users with different requirements. In a grid environment, it is hard and even impossible to perform scheduler performance evaluation in a repeatable and controllable manner as resources and users are distributed across multiple organizations with their own policies. To overcome this limitation, we have developed a Java-based discrete-event grid simulation toolkit called GridSim. The toolkit supports modeling and simulation of heterogeneous grid resources (both time- and space-shared), users and application models. It provides primitives for creation of application tasks, mapping of tasks to resources, and their management. To demonstrate suitability of the GridSim toolkit, we have simulated a Nimrod-G like grid resource broker and evaluated the performance of deadline and budget constrained cost- and time-minimization scheduling algorithms.
[ { "version": "v1", "created": "Thu, 14 Mar 2002 03:44:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Buyya", "Rajkumar", "" ], [ "Murshed", "Manzur", "" ] ]
cs/0203020
Rajkumar Buyya
Rajkumar Buyya and Manzur Murshed
A Deadline and Budget Constrained Cost-Time Optimisation Algorithm for Scheduling Task Farming Applications on Global Grids
null
Technical Report, Monash University, March 2002
null
null
cs.DC
null
Computational Grids and peer-to-peer (P2P) networks enable the sharing, selection, and aggregation of geographically distributed resources for solving large-scale problems in science, engineering, and commerce. The management and composition of resources and services for scheduling applications, however, becomes a complex undertaking. We have proposed a computational economy framework for regulating the supply and demand for resources and allocating them for applications based on the users quality of services requirements. The framework requires economy driven deadline and budget constrained (DBC) scheduling algorithms for allocating resources to application jobs in such a way that the users requirements are met. In this paper, we propose a new scheduling algorithm, called DBC cost-time optimisation, which extends the DBC cost-optimisation algorithm to optimise for time, keeping the cost of computation at the minimum. The superiority of this new scheduling algorithm, in achieving lower job completion time, is demonstrated by simulating the World-Wide Grid and scheduling task-farming applications for different deadline and budget scenarios using both this new and the cost optimisation scheduling algorithms.
[ { "version": "v1", "created": "Thu, 14 Mar 2002 03:50:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Buyya", "Rajkumar", "" ], [ "Murshed", "Manzur", "" ] ]
cs/0203021
Daniel Lehmann
Claudia V. Goldman, Dan Gang, Jeffrey S. Rosenschein and Daniel Lehmann
NetNeg: A Connectionist-Agent Integrated System for Representing Musical Knowledge
21 pages, 3 figures, Preliminary versions presented at International Computer Music Conference, pp. 133-140, Hong Kong (China), August 1996 and AAAI Spring Symposium, 1999
Annals of Mathematics and Artificial Intelligence, 25 (1999) pp. 69-90
null
null
cs.AI cs.MA
null
The system presented here shows the feasibility of modeling the knowledge involved in a complex musical activity by integrating sub-symbolic and symbolic processes. This research focuses on the question of whether there is any advantage in integrating a neural network together with a distributed artificial intelligence approach within the music domain. The primary purpose of our work is to design a model that describes the different aspects a user might be interested in considering when involved in a musical activity. The approach we suggest in this work enables the musician to encode his knowledge, intuitions, and aesthetic taste into different modules. The system captures these aspects by computing and applying three distinct functions: rules, fuzzy concepts, and learning. As a case study, we began experimenting with first species two-part counterpoint melodies. We have developed a hybrid system composed of a connectionist module and an agent-based module to combine the sub-symbolic and symbolic levels to achieve this task. The technique presented here to represent musical knowledge constitutes a new approach for composing polyphonic music.
[ { "version": "v1", "created": "Sun, 17 Mar 2002 09:38:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldman", "Claudia V.", "" ], [ "Gang", "Dan", "" ], [ "Rosenschein", "Jeffrey S.", "" ], [ "Lehmann", "Daniel", "" ] ]