id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0203022 | Andy King | Jacob M. Howe and Andy King | Three Optimisations for Sharing | To appear in Theiry and Practice of Logic Programming | null | null | null | cs.PL | null | In order to improve precision and efficiency sharing analysis should track
both freeness and linearity. The abstract unification algorithms for these
combined domains are suboptimal, hence there is scope for improving precision.
This paper proposes three optimisations for tracing sharing in combination with
freeness and linearity. A novel connection between equations and sharing
abstractions is used to establish correctness of these optimisations even in
the presence of rational trees. A method for pruning intermediate sharing
abstractions to improve efficiency is also proposed. The optimisations are
lightweight and therefore some, if not all, of these optimisations will be of
interest to the implementor.
| [
{
"version": "v1",
"created": "Mon, 18 Mar 2002 13:22:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Howe",
"Jacob M.",
""
],
[
"King",
"Andy",
""
]
] |
cs/0203023 | Magnus Boman | David Lyback and Magnus Boman | Agent trade servers in financial exchange systems | 11 pages, 1 figure | null | null | null | cs.CE | null | New services based on the best-effort paradigm could complement the current
deterministic services of an electronic financial exchange. Four crucial
aspects of such systems would benefit from a hybrid stance: proper use of
processing resources, bandwidth management, fault tolerance, and exception
handling. We argue that a more refined view on Quality-of-Service control for
exchange systems, in which the principal ambition of upholding a fair and
orderly marketplace is left uncompromised, would benefit all interested
parties.
| [
{
"version": "v1",
"created": "Tue, 19 Mar 2002 10:05:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lyback",
"David",
""
],
[
"Boman",
"Magnus",
""
]
] |
cs/0203025 | David Bremner | David Bremner and Alexander Golynski | Sufficiently Fat Polyhedra are not 2-castable | 5 pages, 1 figure | null | null | null | cs.CG | null | In this note we consider the problem of manufacturing a convex polyhedral
object via casting. We consider a generalization of the sand casting process
where the object is manufactured by gluing together two identical faces of
parts cast with a single piece mold. In this model we show that the class of
convex polyhedra which can be enclosed between two concentric spheres of the
ratio of their radii less than 1.07 cannot be manufactured using only two cast
parts.
| [
{
"version": "v1",
"created": "Wed, 20 Mar 2002 15:14:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bremner",
"David",
""
],
[
"Golynski",
"Alexander",
""
]
] |
cs/0203026 | Chris Doran | Chris Doran, Anthony Lasenby and Joan Lasenby | Conformal Geometry, Euclidean Space and Geometric Algebra | Proceedings, "Uncertainty in Geometric Computations", Sheffield 2001 | null | null | null | cs.CG cs.GR math.MG | null | Projective geometry provides the preferred framework for most implementations
of Euclidean space in graphics applications. Translations and rotations are
both linear transformations in projective geometry, which helps when it comes
to programming complicated geometrical operations. But there is a fundamental
weakness in this approach - the Euclidean distance between points is not
handled in a straightforward manner. Here we discuss a solution to this
problem, based on conformal geometry. The language of geometric algebra is best
suited to exploiting this geometry, as it handles the interior and exterior
products in a single, unified framework. A number of applications are
discussed, including a compact formula for reflecting a line off a general
spherical surface.
| [
{
"version": "v1",
"created": "Fri, 22 Mar 2002 14:33:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Doran",
"Chris",
""
],
[
"Lasenby",
"Anthony",
""
],
[
"Lasenby",
"Joan",
""
]
] |
cs/0203027 | Qingguo Zheng | Qingguo Zheng, Ke Xu, Shilong Ma, Weifeng Lv | The Algorithms of Updating Sequential Patterns | 12 pages, 4 figures | The Second SIAM Data mining2002: workshop HPDM | null | null | cs.DB cs.AI | null | Because the data being mined in the temporal database will evolve with time,
many researchers have focused on the incremental mining of frequent sequences
in temporal database. In this paper, we propose an algorithm called IUS, using
the frequent and negative border sequences in the original database for
incremental sequence mining. To deal with the case where some data need to be
updated from the original database, we present an algorithm called DUS to
maintain sequential patterns in the updated database. We also define the
negative border sequence threshold: Min_nbd_supp to control the number of
sequences in the negative border.
| [
{
"version": "v1",
"created": "Wed, 27 Mar 2002 03:35:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zheng",
"Qingguo",
""
],
[
"Xu",
"Ke",
""
],
[
"Ma",
"Shilong",
""
],
[
"Lv",
"Weifeng",
""
]
] |
cs/0203028 | Qingguo Zheng | Qingguo Zheng, Ke Xu, Shilong Ma | When to Update the sequential patterns of stream data? | 12 pages, 5 figures | null | null | NLSDE_01_2002_3_27 | cs.DB cs.AI | null | In this paper, we first define a difference measure between the old and new
sequential patterns of stream data, which is proved to be a distance. Then we
propose an experimental method, called TPD (Tradeoff between Performance and
Difference), to decide when to update the sequential patterns of stream data by
making a tradeoff between the performance of increasingly updating algorithms
and the difference of sequential patterns. The experiments for the incremental
updating algorithm IUS on two data sets show that generally, as the size of
incremental windows grows, the values of the speedup and the values of the
difference will decrease and increase respectively. It is also shown
experimentally that the incremental ratio determined by the TPD method does not
monotonically increase or decrease but changes in a range between 20 and 30
percentage for the IUS algorithm.
| [
{
"version": "v1",
"created": "Wed, 27 Mar 2002 06:31:58 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Jun 2002 01:10:47 GMT"
},
{
"version": "v3",
"created": "Sun, 26 Jan 2003 07:30:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zheng",
"Qingguo",
""
],
[
"Xu",
"Ke",
""
],
[
"Ma",
"Shilong",
""
]
] |
cs/0203030 | Antonio Fernandez | Matthew Andrews, Antonio Fernandez, Ashish Goel, and Lisa Zhang | Source Routing and Scheduling in Packet Networks | A preliminary version of this paper appeared in the Proceedings of
the 42th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2001 | null | null | null | cs.NI cs.DC | null | We study {\em routing} and {\em scheduling} in packet-switched networks. We
assume an adversary that controls the injection time, source, and destination
for each packet injected. A set of paths for these packets is {\em admissible}
if no link in the network is overloaded. We present the first on-line routing
algorithm that finds a set of admissible paths whenever this is feasible. Our
algorithm calculates a path for each packet as soon as it is injected at its
source using a simple shortest path computation. The length of a link reflects
its current congestion. We also show how our algorithm can be implemented under
today's Internet routing paradigms.
When the paths are known (either given by the adversary or computed as above)
our goal is to schedule the packets along the given paths so that the packets
experience small end-to-end delays. The best previous delay bounds for
deterministic and distributed scheduling protocols were exponential in the path
length. In this paper we present the first deterministic and distributed
scheduling protocol that guarantees a polynomial end-to-end delay for every
packet.
Finally, we discuss the effects of combining routing with scheduling. We
first show that some unstable scheduling protocols remain unstable no matter
how the paths are chosen. However, the freedom to choose paths can make a
difference. For example, we show that a ring with parallel links is stable for
all greedy scheduling protocols if paths are chosen intelligently, whereas this
is not the case if the adversary specifies the paths.
| [
{
"version": "v1",
"created": "Thu, 28 Mar 2002 12:15:14 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Mar 2002 21:50:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andrews",
"Matthew",
""
],
[
"Fernandez",
"Antonio",
""
],
[
"Goel",
"Ashish",
""
],
[
"Zhang",
"Lisa",
""
]
] |
cs/0204002 | Erik Demaine | Erik D. Demaine, Martin L. Demaine, Helena A. Verrill | Coin-Moving Puzzles | 25 pages, 33 figures. To appear in the book More Games of No Chance
edited by Richard Nowakowski and published by MSRI | null | null | null | cs.DM cs.CG cs.GT | null | We introduce a new family of one-player games, involving the movement of
coins from one configuration to another. Moves are restricted so that a coin
can be placed only in a position that is adjacent to at least two other coins.
The goal of this paper is to specify exactly which of these games are solvable.
By introducing the notion of a constant number of extra coins, we give tight
theorems characterizing solvable puzzles on the square grid and
equilateral-triangle grid. These existence results are supplemented by
polynomial-time algorithms for finding a solution.
| [
{
"version": "v1",
"created": "Sun, 31 Mar 2002 01:02:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Verrill",
"Helena A.",
""
]
] |
cs/0204003 | David N. Levin | David N. Levin (U. of Chicago) | Blind Normalization of Speech From Different Channels and Speakers | 4 pages, 2 figures | null | null | null | cs.CL | null | This paper describes representations of time-dependent signals that are
invariant under any invertible time-independent transformation of the signal
time series. Such a representation is created by rescaling the signal in a
non-linear dynamic manner that is determined by recently encountered signal
levels. This technique may make it possible to normalize signals that are
related by channel-dependent and speaker-dependent transformations, without
having to characterize the form of the signal transformations, which remain
unknown. The technique is illustrated by applying it to the time-dependent
spectra of speech that has been filtered to simulate the effects of different
channels. The experimental results show that the rescaled speech
representations are largely normalized (i.e., channel-independent), despite the
channel-dependence of the raw (unrescaled) speech.
| [
{
"version": "v1",
"created": "Tue, 2 Apr 2002 21:14:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Levin",
"David N.",
"",
"U. of Chicago"
]
] |
cs/0204004 | Steven Bird | Xiaoyi Ma, Haejoong Lee, Steven Bird and Kazuaki Maeda | Models and Tools for Collaborative Annotation | 8 pages, 6 figures | Proceedings of the Third International Conference on Language
Resources and Evaluation, Paris: European Language Resources Association,
2002 | null | null | cs.CL cs.SD | null | The Annotation Graph Toolkit (AGTK) is a collection of software which
facilitates development of linguistic annotation tools. AGTK provides a
database interface which allows applications to use a database server for
persistent storage. This paper discusses various modes of collaborative
annotation and how they can be supported with tools built using AGTK and its
database interface. We describe the relational database schema and API, and
describe a version of the TableTrans tool which supports collaborative
annotation. The remainder of the paper discusses a high-level query language
for annotation graphs, along with optimizations, in support of expressive and
efficient access to the annotations held on a large central server. The paper
demonstrates that it is straightforward to support a variety of different
levels of collaborative annotation with existing AGTK-based tools, with a
minimum of additional programming effort.
| [
{
"version": "v1",
"created": "Wed, 3 Apr 2002 17:25:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ma",
"Xiaoyi",
""
],
[
"Lee",
"Haejoong",
""
],
[
"Bird",
"Steven",
""
],
[
"Maeda",
"Kazuaki",
""
]
] |
cs/0204005 | Steven Bird | Kazuaki Maeda, Steven Bird, Xiaoyi Ma, and Haejoong Lee | Creating Annotation Tools with the Annotation Graph Toolkit | 8 pages, 12 figures | Proceedings of the Third International Conference on Language
Resources and Evaluation, Paris: European Language Resources Association,
2002 | null | null | cs.CL cs.SD | null | The Annotation Graph Toolkit is a collection of software supporting the
development of annotation tools based on the annotation graph model. The
toolkit includes application programming interfaces for manipulating annotation
graph data and for importing data from other formats. There are interfaces for
the scripting languages Tcl and Python, a database interface, specialized
graphical user interfaces for a variety of annotation tasks, and several sample
applications. This paper describes all the toolkit components for the benefit
of would-be application developers.
| [
{
"version": "v1",
"created": "Wed, 3 Apr 2002 17:32:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maeda",
"Kazuaki",
""
],
[
"Bird",
"Steven",
""
],
[
"Ma",
"Xiaoyi",
""
],
[
"Lee",
"Haejoong",
""
]
] |
cs/0204006 | Steven Bird | Steven Bird, Kazuaki Maeda, Xiaoyi Ma, Haejoong Lee, Beth Randall, and
Salim Zayat | TableTrans, MultiTrans, InterTrans and TreeTrans: Diverse Tools Built on
the Annotation Graph Toolkit | 7 pages, 7 figures | Proceedings of the Third International Conference on Language
Resources and Evaluation, Paris: European Language Resources Association,
2002 | null | null | cs.CL cs.SD | null | Four diverse tools built on the Annotation Graph Toolkit are described. Each
tool associates linguistic codes and structures with time-series data. All are
based on the same software library and tool architecture. TableTrans is for
observational coding, using a spreadsheet whose rows are aligned to a signal.
MultiTrans is for transcribing multi-party communicative interactions recorded
using multi-channel signals. InterTrans is for creating interlinear text
aligned to audio. TreeTrans is for creating and manipulating syntactic trees.
This work demonstrates that the development of diverse tools and re-use of
software components is greatly facilitated by a common high-level application
programming interface for representing the data and managing input/output,
together with a common architecture for managing the interaction of multiple
components.
| [
{
"version": "v1",
"created": "Wed, 3 Apr 2002 17:18:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
],
[
"Maeda",
"Kazuaki",
""
],
[
"Ma",
"Xiaoyi",
""
],
[
"Lee",
"Haejoong",
""
],
[
"Randall",
"Beth",
""
],
[
"Zayat",
"Salim",
""
]
] |
cs/0204007 | Steven Bird | Scott Cotton and Steven Bird | An Integrated Framework for Treebanks and Multilayer Annotations | 8 pages | Proceedings of the Third International Conference on Language
Resources and Evaluation, Paris: European Language Resources Association,
2002 | null | null | cs.CL | null | Treebank formats and associated software tools are proliferating rapidly,
with little consideration for interoperability. We survey a wide variety of
treebank structures and operations, and show how they can be mapped onto the
annotation graph model, and leading to an integrated framework encompassing
tree and non-tree annotations alike. This development opens up new
possibilities for managing and exploiting multilayer annotations.
| [
{
"version": "v1",
"created": "Wed, 3 Apr 2002 18:55:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cotton",
"Scott",
""
],
[
"Bird",
"Steven",
""
]
] |
cs/0204008 | Petro M. Gopych | Petro M. Gopych | The tip-of-the-tongue phenomenon: Irrelevant neural network localization
or disruption of its interneuron links ? | Proceedings of the VIII All-Russian conference "Neurocomputers and
their application - 2002" with international participation, held in Moscow on
21-22 March 2002, 5 pages and 1 Figure | null | null | null | cs.CL cs.AI q-bio.NC q-bio.QM | null | On the base of recently proposed three-stage quantitative neural network
model of the tip-of-the-tongue (TOT) phenomenon a possibility to occur of TOT
states coursed by neural network interneuron links' disruption has been
studied. Using a numerical example it was found that TOTs coursed by interneron
links' disruption are in (1.5 + - 0.3)x1000 times less probable then those
coursed by irrelevant (incomplete) neural network localization. It was shown
that delayed TOT states' etiology cannot be related to neural network
interneuron links' disruption.
| [
{
"version": "v1",
"created": "Thu, 4 Apr 2002 18:59:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gopych",
"Petro M.",
""
]
] |
cs/0204009 | Thomas Eiter | Thomas Eiter, Georg Gottlob, and Kazuhisa Makino | New Results on Monotone Dualization and Generating Hypergraph
Transversals | Removed some minor errors. A shorter version of this paper appears
in: Proceedings of the 34th ACM Symposium on Theory of Computing (STOC-02),
May 19-21, 2002, Montreal, Quebec, Canada | null | null | INFSYS RR-1843-02-05, Institut f. Informationssysteme, TU Wien,
April 2002 | cs.DS cs.CC | null | We consider the problem of dualizing a monotone CNF (equivalently, computing
all minimal transversals of a hypergraph), whose associated decision problem is
a prominent open problem in NP-completeness. We present a number of new
polynomial time resp. output-polynomial time results for significant cases,
which largely advance the tractability frontier and improve on previous
results. Furthermore, we show that duality of two monotone CNFs can be
disproved with limited nondeterminism. More precisely, this is feasible in
polynomial time with O(chi(n) * log n) suitably guessed bits, where chi(n) is
given by \chi(n)^chi(n) = n; note that chi(n) = o(log n). This result sheds new
light on the complexity of this important problem.
| [
{
"version": "v1",
"created": "Thu, 4 Apr 2002 19:23:49 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Apr 2002 00:25:11 GMT"
},
{
"version": "v3",
"created": "Fri, 26 Apr 2002 10:47:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eiter",
"Thomas",
""
],
[
"Gottlob",
"Georg",
""
],
[
"Makino",
"Kazuhisa",
""
]
] |
cs/0204010 | Jan Chomicki | Jan Chomicki, Jerzy Marcinkowski | On the Computational Complexity of Consistent Query Answers | 9 pages | null | null | null | cs.DB | null | We consider here the problem of obtaining reliable, consistent information
from inconsistent databases -- databases that do not have to satisfy given
integrity constraints. We use the notion of consistent query answer -- a query
answer which is true in every (minimal) repair of the database. We provide a
complete classification of the computational complexity of consistent answers
to first-order queries w.r.t. functional dependencies and denial constraints.
We show how the complexity depends on the {\em type} of the constraints
considered, their {\em number}, and the {\em size} of the query. We obtain
several new PTIME cases, using new algorithms.
| [
{
"version": "v1",
"created": "Fri, 5 Apr 2002 22:24:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chomicki",
"Jan",
""
],
[
"Marcinkowski",
"Jerzy",
""
]
] |
cs/0204011 | Debojyoti Dutta | Abhimanyu Das, Deboyjoti Dutta, Ahmed Helmy | Fair Stateless Aggregate Traffic Marking using Active Queue Management
Techniques | 7 pages | null | null | null | cs.NI | null | In heterogeneous networks such as today's Internet, the differentiated
services architecture promises to provide QoS guarantees through scalable
service differentiation. Traffic marking is an important component of this
framework. In this paper, we propose two new aggregate markers that are
stateless, scalable and fair. We leverage stateless Active Queue Management
(AQM) algorithms to enable fair and efficient token distribution among
individual flows of an aggregate. The first marker, Probabilistic Aggregate
Marker (PAM), uses the Token Bucket burst size to probabilistically mark
incoming packets to ensure TCP-friendly and proportionally fair marking. The
second marker, Stateless Aggregate Fair Marker (F-SAM) approximates fair
queueing techniques to isolate flows while marking packets of the aggregate. It
distributes tokens evenly among the flows without maintaining per-flow state.
Our simulation results show that our marking strategies show upto 30%
improvement over other commonly used markers while marking flow aggregates.
These improvements are in terms of better average throughput and fairness
indices, in scenarios containing heterogeneous traffic consisting of TCP (both
long lived elephants and short lived mice) and misbehaving UDP flows. As a
bonus, F-SAM helps the mice to win the war against elephants.
| [
{
"version": "v1",
"created": "Mon, 8 Apr 2002 08:12:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Das",
"Abhimanyu",
""
],
[
"Dutta",
"Deboyjoti",
""
],
[
"Helmy",
"Ahmed",
""
]
] |
cs/0204012 | Stuart E. Middleton | Stuart E. Middleton, Harith Alani, David C. De Roure | Exploiting Synergy Between Ontologies and Recommender Systems | Semantic web conference, WWW2002, 10 pages | null | null | null | cs.LG cs.MA | null | Recommender systems learn about user preferences over time, automatically
finding things of similar interest. This reduces the burden of creating
explicit queries. Recommender systems do, however, suffer from cold-start
problems where no initial information is available early on upon which to base
recommendations. Semantic knowledge structures, such as ontologies, can provide
valuable domain knowledge and user information. However, acquiring such
knowledge and keeping it up to date is not a trivial task and user interests
are particularly difficult to acquire and maintain. This paper investigates the
synergy between a web-based research paper recommender system and an ontology
containing information automatically extracted from departmental databases
available on the web. The ontology is used to address the recommender systems
cold-start problem. The recommender system addresses the ontology's
interest-acquisition problem. An empirical evaluation of this approach is
conducted and the performance of the integrated systems measured.
| [
{
"version": "v1",
"created": "Mon, 8 Apr 2002 10:56:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Middleton",
"Stuart E.",
""
],
[
"Alani",
"Harith",
""
],
[
"De Roure",
"David C.",
""
]
] |
cs/0204013 | Laemmel | Ralf Laemmel | The Sketch of a Polymorphic Symphony | null | null | null | null | cs.PL | null | In previous work, we have introduced functional strategies, that is,
first-class generic functions that can traverse into terms of any type while
mixing uniform and type-specific behaviour. In the present paper, we give a
detailed description of one particular Haskell-based model of functional
strategies. This model is characterised as follows. Firstly, we employ
first-class polymorphism as a form of second-order polymorphism as for the mere
types of functional strategies. Secondly, we use an encoding scheme of run-time
type case for mixing uniform and type-specific behaviour. Thirdly, we base all
traversal on a fundamental combinator for folding over constructor
applications.
Using this model, we capture common strategic traversal schemes in a highly
parameterised style. We study two original forms of parameterisation. Firstly,
we design parameters for the specific control-flow, data-flow and traversal
characteristics of more concrete traversal schemes. Secondly, we use
overloading to postpone commitment to a specific type scheme of traversal. The
resulting portfolio of traversal schemes can be regarded as a challenging
benchmark for setups for typed generic programming.
The way we develop the model and the suite of traversal schemes, it becomes
clear that parameterised + typed strategic programming is best viewed as a
potent combination of certain bits of parametric, intensional, polytypic, and
ad-hoc polymorphism.
| [
{
"version": "v1",
"created": "Mon, 8 Apr 2002 14:12:21 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Nov 2002 10:38:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Laemmel",
"Ralf",
""
]
] |
cs/0204014 | Ram\'on Asensio Monge | R. Asensio Monge (U. of Oviedo), F. Sanchis Marco (U.P. of Madrid), F.
Torre Cervigon (U. of Oviedo) | An Assessment of the Consistency for Software Measurement Methods | 7 pages, 0 figures | null | null | null | cs.SE | null | Consistency, defined as the requirement that a series of measurements of the
same project carried out by different raters using the same method should
produce similar results, is one of the most important aspects to be taken into
account in the measurement methods of the software. In spite of this, there is
a widespread view that many measurement methods introduce an undesirable amount
of subjectivity in the measurement process. This perception has made several
organizations develop revisions of the standard methods whose main aim is to
improve their consistency by introducing some suitable modifications of those
aspects which are believed to introduce a greater degree of subjectivity.Each
revision of a method must be empirically evaluated to determine to what extent
is the aim of improving its consistency achieved. In this article we will
define an homogeneous statistic intended to describe the consistency level of a
method, and we will develop the statistical analysis which should be carried
out in order to conclude whether or not a measurement method is more consistent
than other one.
| [
{
"version": "v1",
"created": "Tue, 9 Apr 2002 09:33:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Monge",
"R. Asensio",
"",
"U. of Oviedo"
],
[
"Marco",
"F. Sanchis",
"",
"U.P. of Madrid"
],
[
"Cervigon",
"F. Torre",
"",
"U. of Oviedo"
]
] |
cs/0204015 | Laemmel | Ralf Laemmel and Joost Visser | Design Patterns for Functional Strategic Programming | null | null | null | null | cs.PL | null | In previous work, we introduced the fundamentals and a supporting combinator
library for \emph{strategic programming}. This an idiom for generic programming
based on the notion of a \emph{functional strategy}: a first-class generic
function that cannot only be applied to terms of any type, but which also
allows generic traversal into subterms and can be customized with type-specific
behaviour.
This paper seeks to provide practicing functional programmers with pragmatic
guidance in crafting their own strategic programs. We present the fundamentals
and the support from a user's perspective, and we initiate a catalogue of
\emph{strategy design patterns}. These design patterns aim at consolidating
strategic programming expertise in accessible form.
| [
{
"version": "v1",
"created": "Tue, 9 Apr 2002 12:44:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Laemmel",
"Ralf",
""
],
[
"Visser",
"Joost",
""
]
] |
cs/0204016 | Francesca Scozzari | R. Giacobazzi, F. Ranzato and F. Scozzari | Making Abstract Domains Condensing | 20 pages | null | null | null | cs.PL cs.LO | null | In this paper we show that reversible analysis of logic languages by abstract
interpretation can be performed without loss of precision by systematically
refining abstract domains. The idea is to include semantic structures into
abstract domains in such a way that the refined abstract domain becomes rich
enough to allow approximate bottom-up and top-down semantics to agree. These
domains are known as condensing abstract domains. Substantially, an abstract
domain is condensing if goal-driven and goal-independent analyses agree, namely
no loss of precision is introduced by approximating queries in a
goal-independent analysis. We prove that condensation is an abstract domain
property and that the problem of making an abstract domain condensing boils
down to the problem of making the domain complete with respect to unification.
In a general abstract interpretation setting we show that when concrete domains
and operations give rise to quantales, i.e. models of propositional linear
logic, objects in a complete refined abstract domain can be explicitly
characterized by linear logic-based formulations. This is the case for abstract
domains for logic program analysis approximating computed answer substitutions
where unification plays the role of multiplicative conjunction in a quantale of
idempotent substitutions. Condensing abstract domains can therefore be
systematically derived by minimally extending any, generally non-condensing
domain, by a simple domain refinement operator.
| [
{
"version": "v1",
"created": "Tue, 9 Apr 2002 13:22:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giacobazzi",
"R.",
""
],
[
"Ranzato",
"F.",
""
],
[
"Scozzari",
"F.",
""
]
] |
cs/0204017 | Erik Demaine | Erik D. Demaine, Martin L. Demaine, Rudolf Fleischer | Solitaire Clobber | 14 pages. v2 fixes small typo | null | null | HKUST-TCSC-2002-05 | cs.DM cs.CG cs.GT | null | Clobber is a new two-player board game. In this paper, we introduce the
one-player variant Solitaire Clobber where the goal is to remove as many stones
as possible from the board by alternating white and black moves. We show that a
checkerboard configuration on a single row (or single column) can be reduced to
about n/4 stones. For boards with at least two rows and two columns, we show
that a checkerboard configuration can be reduced to a single stone if and only
if the number of stones is not a multiple of three, and otherwise it can be
reduced to two stones. We also show that in general it is NP-complete to decide
whether an arbitrary Clobber configuration can be reduced to a single stone.
| [
{
"version": "v1",
"created": "Tue, 9 Apr 2002 15:57:59 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jul 2002 21:03:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Fleischer",
"Rudolf",
""
]
] |
cs/0204019 | Karhan Akcoglu | Karhan Akcoglu, Petros Drineas, Ming-Yang Kao | Fast Universalization of Investment Strategies with Provably Good
Relative Returns | 23 Pages | null | null | null | cs.CE cs.DS | null | A universalization of a parameterized investment strategy is an online
algorithm whose average daily performance approaches that of the strategy
operating with the optimal parameters determined offline in hindsight. We
present a general framework for universalizing investment strategies and
discuss conditions under which investment strategies are universalizable. We
present examples of common investment strategies that fit into our framework.
The examples include both trading strategies that decide positions in
individual stocks, and portfolio strategies that allocate wealth among multiple
stocks. This work extends Cover's universal portfolio work. We also discuss the
runtime efficiency of universalization algorithms. While a straightforward
implementation of our algorithms runs in time exponential in the number of
parameters, we show that the efficient universal portfolio computation
technique of Kalai and Vempala involving the sampling of log-concave functions
can be generalized to other classes of investment strategies.
| [
{
"version": "v1",
"created": "Wed, 10 Apr 2002 03:13:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Akcoglu",
"Karhan",
""
],
[
"Drineas",
"Petros",
""
],
[
"Kao",
"Ming-Yang",
""
]
] |
cs/0204020 | Steven Bird | Steven Bird and Gary Simons | Seven Dimensions of Portability for Language Documentation and
Description | 8 pages | Proceedings of the Workshop on Portability Issues in Human
Language Technologies, Third International Conference on Language Resources
and Evaluation, Paris: European Language Resources Association, 2002 | null | null | cs.CL cs.DL | null | The process of documenting and describing the world's languages is undergoing
radical transformation with the rapid uptake of new digital technologies for
capture, storage, annotation and dissemination. However, uncritical adoption of
new tools and technologies is leading to resources that are difficult to reuse
and which are less portable than the conventional printed resources they
replace. We begin by reviewing current uses of software tools and digital
technologies for language documentation and description. This sheds light on
how digital language documentation and description are created and managed,
leading to an analysis of seven portability problems under the following
headings: content, format, discovery, access, citation, preservation and
rights. After characterizing each problem we provide a series of value
statements, and this provides the framework for a broad range of best practice
recommendations.
| [
{
"version": "v1",
"created": "Wed, 10 Apr 2002 13:52:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
],
[
"Simons",
"Gary",
""
]
] |
cs/0204021 | Maximillian Dornseif | Maximillian Dornseif and Kay Schumann and Christian Klein | Factual and Legal Risks regarding wireless Computer Networks | null | DuD - Datenschutz und Datensicherheit, 4/2002, S. 226ff, Vieweg,
ISSN 0724-4371 | null | null | cs.CY cs.CR | null | The IEEE 802.11b wireless ethernet standart has several serious security
flaws. This paper describes this flaws, surveys wireless networks in the
Cologne/Bonn area to get an assessment of the security configurations of
fielded networks and analizes the legal protections provided to wireless
ethernet operators by german law. We conclude that wireless ethernets without
additional security measures are not usable for any transmissions which are not
meant for a public audience.
| [
{
"version": "v1",
"created": "Wed, 10 Apr 2002 11:33:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dornseif",
"Maximillian",
""
],
[
"Schumann",
"Kay",
""
],
[
"Klein",
"Christian",
""
]
] |
cs/0204022 | Steven Bird | Christopher Cieri and Steven Bird | Annotation Graphs and Servers and Multi-Modal Resources: Infrastructure
for Interdisciplinary Education, Research and Development | 8 pages, 6 figures | Proceedings of ACL Workshop on Sharing Tools and Resources for
Research and Education, Toulouse, July 2001, pp 23-30 | null | null | cs.CL | null | Annotation graphs and annotation servers offer infrastructure to support the
analysis of human language resources in the form of time-series data such as
text, audio and video. This paper outlines areas of common need among empirical
linguists and computational linguists. After reviewing examples of data and
tools used or under development for each of several areas, it proposes a common
framework for future tool development, data annotation and resource sharing
based upon annotation graphs and servers.
| [
{
"version": "v1",
"created": "Wed, 10 Apr 2002 15:37:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cieri",
"Christopher",
""
],
[
"Bird",
"Steven",
""
]
] |
cs/0204024 | Sandor P. Fekete | Alexander Barvinok, Sandor P. Fekete, David S. Johnson, Arie Tamir,
Gerhard J. Woeginger, Russ Woodroofe | The Geometric Maximum Traveling Salesman Problem | 24 pages, 6 figures; revised to appear in Journal of the ACM.
(clarified some minor points, fixed typos) | Journal of the ACM, 50 (5) 2003, 641-664. | null | null | cs.DS cs.CC | null | We consider the traveling salesman problem when the cities are points in R^d
for some fixed d and distances are computed according to geometric distances,
determined by some norm. We show that for any polyhedral norm, the problem of
finding a tour of maximum length can be solved in polynomial time. If
arithmetic operations are assumed to take unit time, our algorithms run in time
O(n^{f-2} log n), where f is the number of facets of the polyhedron determining
the polyhedral norm. Thus for example we have O(n^2 log n) algorithms for the
cases of points in the plane under the Rectilinear and Sup norms. This is in
contrast to the fact that finding a minimum length tour in each case is
NP-hard. Our approach can be extended to the more general case of quasi-norms
with not necessarily symmetric unit ball, where we get a complexity of
O(n^{2f-2} log n).
For the special case of two-dimensional metrics with f=4 (which includes the
Rectilinear and Sup norms), we present a simple algorithm with O(n) running
time. The algorithm does not use any indirect addressing, so its running time
remains valid even in comparison based models in which sorting requires Omega(n
\log n) time. The basic mechanism of the algorithm provides some intuition on
why polyhedral norms allow fast algorithms.
Complementing the results on simplicity for polyhedral norms, we prove that
for the case of Euclidean distances in R^d for d>2, the Maximum TSP is NP-hard.
This sheds new light on the well-studied difficulties of Euclidean distances.
| [
{
"version": "v1",
"created": "Wed, 10 Apr 2002 18:56:09 GMT"
},
{
"version": "v2",
"created": "Thu, 29 May 2003 12:05:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barvinok",
"Alexander",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Johnson",
"David S.",
""
],
[
"Tamir",
"Arie",
""
],
[
"Woeginger",
"Gerhard J.",
""
],
[
"Woodroofe",
"Russ",
""
]
] |
cs/0204025 | Steven Bird | Steven Bird | Phonology | 27 pages | In Ruslan Mitkov (ed) (2002). Oxford Handbook of Computational
Linguistics | null | null | cs.CL | null | Phonology is the systematic study of the sounds used in language, their
internal structure, and their composition into syllables, words and phrases.
Computational phonology is the application of formal and computational
techniques to the representation and processing of phonological information.
This chapter will present the fundamentals of descriptive phonology along with
a brief overview of computational phonology.
| [
{
"version": "v1",
"created": "Thu, 11 Apr 2002 11:22:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
]
] |
cs/0204026 | Steven Bird | Steve Cassidy and Steven Bird | Querying Databases of Annotated Speech | 9 pages, 4 figures | Database Technologies: Proceedings of the Eleventh Australasian
Database Conference, pp. 12-20, IEEE Computer Society, 2000 | null | null | cs.CL cs.DB | null | Annotated speech corpora are databases consisting of signal data along with
time-aligned symbolic `transcriptions'. Such databases are typically
multidimensional, heterogeneous and dynamic. These properties present a number
of tough challenges for representation and query. The temporal nature of the
data adds an additional layer of complexity. This paper presents and harmonises
two independent efforts to model annotated speech databases, one at Macquarie
University and one at the University of Pennsylvania. Various query languages
are described, along with illustrative applications to a variety of analytical
problems. The research reported here forms a part of several ongoing projects
to develop platform-independent open-source tools for creating, browsing,
searching, querying and transforming linguistic databases, and to disseminate
large linguistic databases over the internet.
| [
{
"version": "v1",
"created": "Thu, 11 Apr 2002 16:43:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cassidy",
"Steve",
""
],
[
"Bird",
"Steven",
""
]
] |
cs/0204027 | David Martinez | Eneko Agirre and David Martinez | Integrating selectional preferences in WordNet | 9 pages | Proceedings of First International WordNet Conference. Mysore
(India). 2002 | null | null | cs.CL | null | Selectional preference learning methods have usually focused on word-to-class
relations, e.g., a verb selects as its subject a given nominal class. This
paper extends previous statistical models to class-to-class preferences, and
presents a model that learns selectional preferences for classes of verbs,
together with an algorithm to integrate the learned preferences in WordNet. The
theoretical motivation is twofold: different senses of a verb may have
different preferences, and classes of verbs may share preferences. On the
practical side, class-to-class selectional preferences can be learned from
untagged corpora (the same as word-to-class), they provide selectional
preferences for less frequent word senses via inheritance, and more important,
they allow for easy integration in WordNet. The model is trained on
subject-verb and object-verb relationships extracted from a small corpus
disambiguated with WordNet senses. Examples are provided illustrating that the
theoretical motivations are well founded, and showing that the approach is
feasible. Experimental results on a word sense disambiguation task are also
provided.
| [
{
"version": "v1",
"created": "Thu, 11 Apr 2002 16:41:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Agirre",
"Eneko",
""
],
[
"Martinez",
"David",
""
]
] |
cs/0204028 | David Martinez | Eneko Agirre and David Martinez | Decision Lists for English and Basque | 4 pages | Proceedings of the SENSEVAL-2 Workshop. In conjunction with
ACL'2001/EACL'2001. Toulouse | null | null | cs.CL | null | In this paper we describe the systems we developed for the English (lexical
and all-words) and Basque tasks. They were all supervised systems based on
Yarowsky's Decision Lists. We used Semcor for training in the English all-words
task. We defined different feature sets for each language. For Basque, in order
to extract all the information from the text, we defined features that have not
been used before in the literature, using a morphological analyzer. We also
implemented systems that selected automatically good features and were able to
obtain a prefixed precision (85%) at the cost of coverage. The systems that
used all the features were identified as BCU-ehu-dlist-all and the systems that
selected some features as BCU-ehu-dlist-best.
| [
{
"version": "v1",
"created": "Fri, 12 Apr 2002 07:41:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Agirre",
"Eneko",
""
],
[
"Martinez",
"David",
""
]
] |
cs/0204029 | David Martinez | Eneko Agirre, Elena Garcia, Mikel Lersundi, David Martinez and Eli
Pociello | The Basque task: did systems perform in the upperbound? | 4 pages | Proceedings of the SENSEVAL-2 Workshop. In conjunction with
ACL'2001/EACL'2001. Toulouse | null | null | cs.CL | null | In this paper we describe the Senseval 2 Basque lexical-sample task. The task
comprised 40 words (15 nouns, 15 verbs and 10 adjectives) selected from Euskal
Hiztegia, the main Basque dictionary. Most examples were taken from the
Egunkaria newspaper. The method used to hand-tag the examples produced low
inter-tagger agreement (75%) before arbitration. The four competing systems
attained results well above the most frequent baseline and the best system
scored 75% precision at 100% coverage. The paper includes an analysis of the
tagging procedure used, as well as the performance of the competing systems. In
particular, we argue that inter-tagger agreement is not a real upperbound for
the Basque WSD task.
| [
{
"version": "v1",
"created": "Fri, 12 Apr 2002 07:49:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Agirre",
"Eneko",
""
],
[
"Garcia",
"Elena",
""
],
[
"Lersundi",
"Mikel",
""
],
[
"Martinez",
"David",
""
],
[
"Pociello",
"Eli",
""
]
] |
cs/0204031 | Yi-Dong Shen | Yi-Dong Shen, Jia-Huai You, Li-Yan Yuan, Samuel S. P. Shen and Qiang
Yang | A Dynamic Approach to Characterizing Termination of General Logic
Programs | To appear in ACM TOCL | ACM Transactions on Computational Logic 4(4):417-430, 2003 | null | null | cs.LO cs.PL | null | We present a new characterization of termination of general logic programs.
Most existing termination analysis approaches rely on some static information
about the structure of the source code of a logic program, such as modes/types,
norms/level mappings, models/interargument relations, and the like. We propose
a dynamic approach which employs some key dynamic features of an infinite
(generalized) SLDNF-derivation, such as repetition of selected subgoals and
recursive increase in term size. We also introduce a new formulation of
SLDNF-trees, called generalized SLDNF-trees. Generalized SLDNF-trees deal with
negative subgoals in the same way as Prolog and exist for any general logic
programs.
| [
{
"version": "v1",
"created": "Fri, 12 Apr 2002 18:01:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shen",
"Yi-Dong",
""
],
[
"You",
"Jia-Huai",
""
],
[
"Yuan",
"Li-Yan",
""
],
[
"Shen",
"Samuel S. P.",
""
],
[
"Yang",
"Qiang",
""
]
] |
cs/0204032 | Daniel Lehmann | Michael Freund and Daniel Lehmann | Belief Revision and Rational Inference | 25 pages | null | null | Leibniz Center for Research in Computer Science, Hebrew University:
TR-94-16, July 1994 | cs.AI | null | The (extended) AGM postulates for belief revision seem to deal with the
revision of a given theory K by an arbitrary formula, but not to constrain the
revisions of two different theories by the same formula. A new postulate is
proposed and compared with other similar postulates that have been proposed in
the literature. The AGM revisions that satisfy this new postulate stand in
one-to-one correspondence with the rational, consistency-preserving relations.
This correspondence is described explicitly. Two viewpoints on iterative
revisions are distinguished and discussed.
| [
{
"version": "v1",
"created": "Sun, 14 Apr 2002 09:22:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Freund",
"Michael",
""
],
[
"Lehmann",
"Daniel",
""
]
] |
cs/0204033 | Krzysztof C. Kiwiel | Krzysztof C. Kiwiel | Randomized selection revisited | 25 pages, LaTeX 2e | null | null | PMMO-02-01 | cs.DS | null | We show that several versions of Floyd and Rivest's algorithm Select for
finding the $k$th smallest of $n$ elements require at most
$n+\min\{k,n-k\}+o(n)$ comparisons on average and with high probability. This
rectifies the analysis of Floyd and Rivest, and extends it to the case of
nondistinct elements. Our computational results confirm that Select may be the
best algorithm in practice.
| [
{
"version": "v1",
"created": "Mon, 15 Apr 2002 04:48:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiwiel",
"Krzysztof C.",
""
]
] |
cs/0204034 | Joseph R. Kiniry | Joseph R. Kiniry | Monitoring and Debugging Concurrent and Distributed Object-Oriented
Systems | 12 pages, 3 figures, submitted to OOPSLA '02 | null | null | null | cs.SE | null | A major part of debugging, testing, and analyzing a complex software system
is understanding what is happening within the system at run-time. Some
developers advocate running within a debugger to better understand the system
at this level. Others embed logging statements, even in the form of hard-coded
calls to print functions, throughout the code. These techniques are all
general, rough forms of what we call system monitoring, and, while they have
limited usefulness in simple, sequential systems, they are nearly useless in
complex, concurrent ones. We propose a set of new mechanisms, collectively
known as a monitoring system, for understanding such complex systems, and we
describe an example implementation of such a system, called IDebug, for the
Java programming language.
| [
{
"version": "v1",
"created": "Mon, 15 Apr 2002 23:33:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiniry",
"Joseph R.",
""
]
] |
cs/0204035 | Joseph R. Kiniry | Joseph R. Kiniry | Semantic Properties for Lightweight Specification in Knowledgeable
Development Environments | 10 pages, submitted to FSE-10 | null | null | null | cs.SE | null | Semantic properties are domain-specific specification constructs used to
augment an existing language with richer semantics. These properties are taken
advantage of in system analysis, design, implementation, testing, and
maintenance through the use of documentation and source-code transformation
tools. Semantic properties are themselves specified at two levels: loosely with
precise natural language, and formally within the problem domain. The
refinement relationships between these specification levels, as well as between
a semantic property's use and its realization in program code via tools, is
specified with a new formal method for reuse called kind theory.
| [
{
"version": "v1",
"created": "Mon, 15 Apr 2002 23:40:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiniry",
"Joseph R.",
""
]
] |
cs/0204036 | Joseph R. Kiniry | Joseph R. Kiniry | Semantic Component Composition | 9 pages, submitted to GCSE/SAIG '02 | null | null | null | cs.SE | null | Building complex software systems necessitates the use of component-based
architectures. In theory, of the set of components needed for a design, only
some small portion of them are "custom"; the rest are reused or refactored
existing pieces of software. Unfortunately, this is an idealized situation.
Just because two components should work together does not mean that they will
work together.
The "glue" that holds components together is not just technology. The
contracts that bind complex systems together implicitly define more than their
explicit type. These "conceptual contracts" describe essential aspects of
extra-system semantics: e.g., object models, type systems, data representation,
interface action semantics, legal and contractual obligations, and more.
Designers and developers spend inordinate amounts of time technologically
duct-taping systems to fulfill these conceptual contracts because system-wide
semantics have not been rigorously characterized or codified. This paper
describes a formal characterization of the problem and discusses an initial
implementation of the resulting theoretical system.
| [
{
"version": "v1",
"created": "Mon, 15 Apr 2002 23:50:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiniry",
"Joseph R.",
""
]
] |
cs/0204037 | Paul Vitanyi | Nikolai Vereshchagin (Moscow State University) and Paul Vitanyi (CWI
and University of Amsterdam) | Kolmogorov's Structure Functions and Model Selection | 25 pages LaTeX, 5 figures. In part in Proc 47th IEEE FOCS; this final
version (more explanations, cosmetic modifications) to appear in IEEE Trans
Inform Th | null | null | null | cs.CC math.PR physics.data-an | null | In 1974 Kolmogorov proposed a non-probabilistic approach to statistics and
model selection. Let data be finite binary strings and models be finite sets of
binary strings. Consider model classes consisting of models of given maximal
(Kolmogorov) complexity. The ``structure function'' of the given data expresses
the relation between the complexity level constraint on a model class and the
least log-cardinality of a model in the class containing the data. We show that
the structure function determines all stochastic properties of the data: for
every constrained model class it determines the individual best-fitting model
in the class irrespective of whether the ``true'' model is in the model class
considered or not. In this setting, this happens {\em with certainty}, rather
than with high probability as is in the classical case. We precisely quantify
the goodness-of-fit of an individual model with respect to individual data. We
show that--within the obvious constraints--every graph is realized by the
structure function of some data. We determine the (un)computability properties
of the various functions contemplated and of the ``algorithmic minimal
sufficient statistic.''
| [
{
"version": "v1",
"created": "Tue, 16 Apr 2002 15:58:58 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Apr 2002 14:53:43 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Apr 2002 14:57:26 GMT"
},
{
"version": "v4",
"created": "Fri, 26 Apr 2002 15:53:10 GMT"
},
{
"version": "v5",
"created": "Thu, 5 Aug 2004 14:00:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vereshchagin",
"Nikolai",
"",
"Moscow State University"
],
[
"Vitanyi",
"Paul",
"",
"CWI\n and University of Amsterdam"
]
] |
cs/0204038 | Jerzy Lewak | Jerzy Lewak | Technology For Information Engineering (TIE): A New Way of Storing,
Retrieving and Analyzing Information | 32 pages. Introduces the theoretical foundation for associative
information | null | null | null | cs.DB cs.IR | null | The theoretical foundations of a new model and paradigm (called TIE) for data
storage and access are introduced. Associations between data elements are
stored in a single Matrix table, which is usually kept entirely in RAM for
quick access. The model ties together a very intuitive "guided" GUI to the
Matrix structure, allowing extremely easy complex searches through the data.
Although it is an "Associative Model" in that it stores the data associations
separately from the data itself, in contrast to other implementations of that
model TIE guides the user to only the available information ensuring that every
search is always fruitful. Very many diverse applications of the technology are
reviewed.
| [
{
"version": "v1",
"created": "Tue, 16 Apr 2002 16:03:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lewak",
"Jerzy",
""
]
] |
cs/0204039 | Rob van Glabbeek | B. Bloom (Cornell -> IBM), W.J. Fokkink (CWI) & R.J. van Glabbeek
(Stanford) | Precongruence Formats for Decorated Trace Semantics | 48 pages. More info at
http://theory.stanford.edu/~rvg/abstracts.html#48 | null | null | null | cs.LO | null | This paper explores the connection between semantic equivalences and
preorders for concrete sequential processes, represented by means of labelled
transition systems, and formats of transition system specifications using
Plotkin's structural approach. For several preorders in the linear time -
branching time spectrum a format is given, as general as possible, such that
this preorder is a precongruence for all operators specifiable in that format.
The formats are derived using the modal characterizations of the corresponding
preorders.
| [
{
"version": "v1",
"created": "Wed, 17 Apr 2002 00:35:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bloom",
"B.",
"",
"Cornell -> IBM"
],
[
"Fokkink",
"W. J.",
"",
"CWI"
],
[
"van Glabbeek",
"R. J.",
"",
"Stanford"
]
] |
cs/0204040 | Marcus Hutter | Marcus Hutter | Self-Optimizing and Pareto-Optimal Policies in General Environments
based on Bayes-Mixtures | 15 pages | Proceedings of the 15th Annual Conference on Computational
Learning Theory (COLT-2002) 364-379 | null | IDSIA-04-02 | cs.AI cs.LG math.OC math.PR | null | The problem of making sequential decisions in unknown probabilistic
environments is studied. In cycle $t$ action $y_t$ results in perception $x_t$
and reward $r_t$, where all quantities in general may depend on the complete
history. The perception $x_t$ and reward $r_t$ are sampled from the (reactive)
environmental probability distribution $\mu$. This very general setting
includes, but is not limited to, (partial observable, k-th order) Markov
decision processes. Sequential decision theory tells us how to act in order to
maximize the total expected reward, called value, if $\mu$ is known.
Reinforcement learning is usually used if $\mu$ is unknown. In the Bayesian
approach one defines a mixture distribution $\xi$ as a weighted sum of
distributions $\nu\in\M$, where $\M$ is any class of distributions including
the true environment $\mu$. We show that the Bayes-optimal policy $p^\xi$ based
on the mixture $\xi$ is self-optimizing in the sense that the average value
converges asymptotically for all $\mu\in\M$ to the optimal value achieved by
the (infeasible) Bayes-optimal policy $p^\mu$ which knows $\mu$ in advance. We
show that the necessary condition that $\M$ admits self-optimizing policies at
all, is also sufficient. No other structural assumptions are made on $\M$. As
an example application, we discuss ergodic Markov decision processes, which
allow for self-optimizing policies. Furthermore, we show that $p^\xi$ is
Pareto-optimal in the sense that there is no other policy yielding higher or
equal value in {\em all} environments $\nu\in\M$ and a strictly higher value in
at least one.
| [
{
"version": "v1",
"created": "Wed, 17 Apr 2002 10:46:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] |
cs/0204041 | Walter Eaves | Walter Eaves | Trust Brokerage Systems for the Internet | Doctoral Thesis. 279 pages, 7 appendices, 18 tables, 44 figures | null | null | null | cs.CR cs.GT cs.NE | null | This thesis addresses the problem of providing trusted individuals with
confidential information about other individuals, in particular, granting
access to databases of personal records using the World-Wide Web. It proposes
an access rights management system for distributed databases which aims to
create and implement organisation structures based on the wishes of the owners
and of demands of the users of the databases. The dissertation describes how
current software components could be used to implement this system; it
re-examines the theory of collective choice to develop mechanisms for
generating hierarchies of authorities; it analyses organisational processes for
stability and develops a means of measuring the similarity of their
hierarchies.
| [
{
"version": "v1",
"created": "Thu, 18 Apr 2002 23:10:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eaves",
"Walter",
""
]
] |
cs/0204042 | Jeff Erickson | Michael Soss, Jeff Erickson, and Mark Overmars | Preprocessing Chains for Fast Dihedral Rotations Is Hard or Even
Impossible | 11 pages, 9 figures, see also
http://www.cs.uiuc.edu/~jeffe/pubs/dihedral.html | null | null | null | cs.CG | null | We examine a computational geometric problem concerning the structure of
polymers. We model a polymer as a polygonal chain in three dimensions. Each
edge splits the polymer into two subchains, and a dihedral rotation rotates one
of these chains rigidly about this edge. The problem is to determine, given a
chain, an edge, and an angle of rotation, if the motion can be performed
without causing the chain to self-intersect. An Omega(n log n) lower bound on
the time complexity of this problem is known.
We prove that preprocessing a chain of n edges and answering n dihedral
rotation queries is 3SUM-hard, giving strong evidence that solving n queries
requires Omega(n^2) time in the worst case. For dynamic queries, which also
modify the chain if the requested dihedral rotation is feasible, we show that
answering n queries is by itself 3SUM-hard, suggesting that sublinear query
time is impossible after any amount of preprocessing.
| [
{
"version": "v1",
"created": "Fri, 19 Apr 2002 21:03:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Soss",
"Michael",
""
],
[
"Erickson",
"Jeff",
""
],
[
"Overmars",
"Mark",
""
]
] |
cs/0204043 | Leonid Peshkin | Leonid Peshkin and Christian R. Shelton | Learning from Scarce Experience | 8 pages 4 figures | null | null | null | cs.AI cs.LG cs.NE cs.RO | null | Searching the space of policies directly for the optimal policy has been one
popular method for solving partially observable reinforcement learning
problems. Typically, with each change of the target policy, its value is
estimated from the results of following that very policy. This requires a large
number of interactions with the environment as different polices are
considered. We present a family of algorithms based on likelihood ratio
estimation that use data gathered when executing one policy (or collection of
policies) to estimate the value of a different policy. The algorithms combine
estimation and optimization stages. The former utilizes experience to build a
non-parametric representation of an optimized function. The latter performs
optimization on this estimate. We show positive empirical results and provide
the sample complexity bound.
| [
{
"version": "v1",
"created": "Sat, 20 Apr 2002 05:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Peshkin",
"Leonid",
""
],
[
"Shelton",
"Christian R.",
""
]
] |
cs/0204044 | Javier Nicolas Sanchez | Javier Nicolas Sanchez, Adam Milstein, Evan Williamson | Robust Global Localization Using Clustered Particle Filtering | 6 pages. Proceedings of AAAI-2002 (in press) | null | null | null | cs.RO cs.AI | null | Global mobile robot localization is the problem of determining a robot's pose
in an environment, using sensor data, when the starting position is unknown. A
family of probabilistic algorithms known as Monte Carlo Localization (MCL) is
currently among the most popular methods for solving this problem. MCL
algorithms represent a robot's belief by a set of weighted samples, which
approximate the posterior probability of where the robot is located by using a
Bayesian formulation of the localization problem. This article presents an
extension to the MCL algorithm, which addresses its problems when localizing in
highly symmetrical environments; a situation where MCL is often unable to
correctly track equally probable poses for the robot. The problem arises from
the fact that sample sets in MCL often become impoverished, when samples are
generated according to their posterior likelihood. Our approach incorporates
the idea of clusters of samples and modifies the proposal distribution
considering the probability mass of those clusters. Experimental results are
presented that show that this new extension to the MCL algorithm successfully
localizes in symmetric environments where ordinary MCL often fails.
| [
{
"version": "v1",
"created": "Sun, 21 Apr 2002 01:21:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sanchez",
"Javier Nicolas",
""
],
[
"Milstein",
"Adam",
""
],
[
"Williamson",
"Evan",
""
]
] |
cs/0204045 | Aleksandar Ignjatovic | Aleksandar Ignjatovic and Arun Sharma | Some applications of logic to feasibility in higher types | null | null | null | null | cs.LO | null | In this paper we demonstrate that the class of basic feasible functionals has
recursion theoretic properties which naturally generalize the corresponding
properties of the class of feasible functions. We also improve the Kapron -
Cook result on mashine representation of basic feasible functionals. Our proofs
are based on essential applications of logic. We introduce a weak fragment of
second order arithmetic with second order variables ranging over functions from
N into N which suitably characterizes basic feasible functionals, and show that
it is a useful tool for investigating the properties of basic feasible
functionals. In particular, we provide an example how one can extract feasible
"programs" from mathematical proofs which use non-feasible functionals (like
second order polynomials).
| [
{
"version": "v1",
"created": "Mon, 22 Apr 2002 06:58:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ignjatovic",
"Aleksandar",
""
],
[
"Sharma",
"Arun",
""
]
] |
cs/0204046 | Moni Naor | Ron Fagin, Amnon Lotem and Moni Naor | Optimal Aggregation Algorithms for Middleware | 41 pages. Preliminary version appeared in ACM PODS 2001, pp. 102-113 | null | null | null | cs.DB cs.DS | null | Let D be a database of N objects where each object has m fields. The objects
are given in m sorted lists (where the ith list is sorted according to the ith
field). Our goal is to find the top k objects according to a monotone
aggregation function t, while minimizing access to the lists. The problem
arises in several contexts. In particular Fagin (JCSS 1999) considered it for
the purpose of aggregating information in a multimedia database system.
We are interested in instance optimality, i.e. that our algorithm will be as
good as any other (correct) algorithm on any instance. We provide and analyze
several instance optimal algorithms for the task, with various access costs and
models.
| [
{
"version": "v1",
"created": "Mon, 22 Apr 2002 18:32:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fagin",
"Ron",
""
],
[
"Lotem",
"Amnon",
""
],
[
"Naor",
"Moni",
""
]
] |
cs/0204047 | Naren Ramakrishnan | Naren Ramakrishnan and Chris Bailey-Kellogg | Sampling Strategies for Mining in Data-Scarce Domains | null | null | null | null | cs.CE cs.AI | null | Data mining has traditionally focused on the task of drawing inferences from
large datasets. However, many scientific and engineering domains, such as fluid
dynamics and aircraft design, are characterized by scarce data, due to the
expense and complexity of associated experiments and simulations. In such
data-scarce domains, it is advantageous to focus the data collection effort on
only those regions deemed most important to support a particular data mining
objective. This paper describes a mechanism that interleaves bottom-up data
mining, to uncover multi-level structures in spatial data, with top-down
sampling, to clarify difficult decisions in the mining process. The mechanism
exploits relevant physical properties, such as continuity, correspondence, and
locality, in a unified framework. This leads to effective mining and sampling
decisions that are explainable in terms of domain knowledge and data
characteristics. This approach is demonstrated in two diverse applications --
mining pockets in spatial data, and qualitative determination of Jordan forms
of matrices.
| [
{
"version": "v1",
"created": "Mon, 22 Apr 2002 19:41:24 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Apr 2002 21:56:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramakrishnan",
"Naren",
""
],
[
"Bailey-Kellogg",
"Chris",
""
]
] |
cs/0204048 | Rajkumar Buyya | Rajkumar Buyya | Economic-based Distributed Resource Management and Scheduling for Grid
Computing | null | Monash University, Melbourne, Australia, April 2002 | null | PhD Thesis, April 2002 | cs.DC | null | Computational Grids, emerging as an infrastructure for next generation
computing, enable the sharing, selection, and aggregation of geographically
distributed resources for solving large-scale problems in science, engineering,
and commerce. As the resources in the Grid are heterogeneous and geographically
distributed with varying availability and a variety of usage and cost policies
for diverse users at different times and, priorities as well as goals that vary
with time. The management of resources and application scheduling in such a
large and distributed environment is a complex task. This thesis proposes a
distributed computational economy as an effective metaphor for the management
of resources and application scheduling. It proposes an architectural framework
that supports resource trading and quality of services based scheduling. It
enables the regulation of supply and demand for resources and provides an
incentive for resource owners for participating in the Grid and motives the
users to trade-off between the deadline, budget, and the required level of
quality of service. The thesis demonstrates the capability of economic-based
systems for peer-to-peer distributed computing by developing users'
quality-of-service requirements driven scheduling strategies and algorithms. It
demonstrates their effectiveness by performing scheduling experiments on the
World-Wide Grid for solving parameter sweep applications.
| [
{
"version": "v1",
"created": "Mon, 22 Apr 2002 20:06:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0204049 | Erik Tjong Kim Sang | Erik F. Tjong Kim Sang | Memory-Based Shallow Parsing | null | Journal of Machine Learning Research, volume 2 (March), 2002, pp.
559-594 | null | jmlr-2002-tks | cs.CL | null | We present memory-based learning approaches to shallow parsing and apply
these to five tasks: base noun phrase identification, arbitrary base phrase
recognition, clause detection, noun phrase parsing and full parsing. We use
feature selection techniques and system combination methods for improving the
performance of the memory-based learner. Our approach is evaluated on standard
data sets and the results are compared with that of other systems. This reveals
that our approach works well for base phrase identification while its
application towards recognizing embedded structures leaves some room for
improvement.
| [
{
"version": "v1",
"created": "Wed, 24 Apr 2002 14:48:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sang",
"Erik F. Tjong Kim",
""
]
] |
cs/0204050 | Stephen G. Kobourov | Alon Efrat, Stephen G. Kobourov and Anna Lubiw | Computing Homotopic Shortest Paths Efficiently | 12 pages, 11 figures | null | null | null | cs.CG | null | This paper addresses the problem of finding shortest paths homotopic to a
given disjoint set of paths that wind amongst point obstacles in the plane. We
present a faster algorithm than previously known.
| [
{
"version": "v1",
"created": "Thu, 25 Apr 2002 20:41:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Efrat",
"Alon",
""
],
[
"Kobourov",
"Stephen G.",
""
],
[
"Lubiw",
"Anna",
""
]
] |
cs/0204051 | Magnus Boman | Magnus Boman, Stefan Johansson, David Lyback | Parrondo Strategies for Artificial Traders | 10 pages, 4 figures | Intelligent Agent Technology; Zhong, Liu, Ohsuga, Bradshaw (eds);
150-159; World Scientific, 2001 | null | null | cs.CE | null | On markets with receding prices, artificial noise traders may consider
alternatives to buy-and-hold. By simulating variations of the Parrondo
strategy, using real data from the Swedish stock market, we produce first
indications of a buy-low-sell-random Parrondo variation outperforming
buy-and-hold. Subject to our assumptions, buy-low-sell-random also outperforms
the traditional value and trend investor strategies. We measure the success of
the Parrondo variations not only through their performance compared to other
kinds of strategies, but also relative to varying levels of perfect
information, received through messages within a multi-agent system of
artificial traders.
| [
{
"version": "v1",
"created": "Fri, 26 Apr 2002 12:20:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boman",
"Magnus",
""
],
[
"Johansson",
"Stefan",
""
],
[
"Lyback",
"David",
""
]
] |
cs/0204052 | Pawel | Pawel Wocjan, Dominik Janzing, and Thomas Beth (Universitaet
Karlsruhe) | Required sample size for learning sparse Bayesian networks with many
variables | 9 pages | null | null | null | cs.LG math.PR | null | Learning joint probability distributions on n random variables requires
exponential sample size in the generic case. Here we consider the case that a
temporal (or causal) order of the variables is known and that the (unknown)
graph of causal dependencies has bounded in-degree Delta. Then the joint
measure is uniquely determined by the probabilities of all (2 Delta+1)-tuples.
Upper bounds on the sample size required for estimating their probabilities can
be given in terms of the VC-dimension of the set of corresponding cylinder
sets. The sample size grows less than linearly with n.
| [
{
"version": "v1",
"created": "Fri, 26 Apr 2002 14:33:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wocjan",
"Pawel",
"",
"Universitaet\n Karlsruhe"
],
[
"Janzing",
"Dominik",
"",
"Universitaet\n Karlsruhe"
],
[
"Beth",
"Thomas",
"",
"Universitaet\n Karlsruhe"
]
] |
cs/0204053 | Chris Bailey-Kellogg | Chris Bailey-Kellogg, Naren Ramakrishnan | Qualitative Analysis of Correspondence for Experimental Algorithmics | 11 pages | null | null | null | cs.AI cs.CE | null | Correspondence identifies relationships among objects via similarities among
their components; it is ubiquitous in the analysis of spatial datasets,
including images, weather maps, and computational simulations. This paper
develops a novel multi-level mechanism for qualitative analysis of
correspondence. Operators leverage domain knowledge to establish
correspondence, evaluate implications for model selection, and leverage
identified weaknesses to focus additional data collection. The utility of the
mechanism is demonstrated in two applications from experimental algorithmics --
matrix spectral portrait analysis and graphical assessment of Jordan forms of
matrices. Results show that the mechanism efficiently samples computational
experiments and successfully uncovers high-level problem properties. It
overcomes noise and data sparsity by leveraging domain knowledge to detect
mutually reinforcing interpretations of spatial data.
| [
{
"version": "v1",
"created": "Fri, 26 Apr 2002 17:25:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bailey-Kellogg",
"Chris",
""
],
[
"Ramakrishnan",
"Naren",
""
]
] |
cs/0204054 | Filippo Menczer | Filippo Menczer | Navigating the Small World Web by Textual Cues | null | null | null | null | cs.IR cs.NI | null | Can a Web crawler efficiently locate an unknown relevant page? While this
question is receiving much empirical attention due to its considerable
commercial value in the search engine community
[Cho98,Chakrabarti99,Menczer00,Menczer01], theoretical efforts to bound the
performance of focused navigation have only exploited the link structure of the
Web graph, neglecting other features [Kleinberg01,Adamic01,Kim02]. Here I
investigate the connection between linkage and a content-induced topology of
Web pages, suggesting that efficient paths can be discovered by decentralized
navigation algorithms based on textual cues.
| [
{
"version": "v1",
"created": "Fri, 26 Apr 2002 22:45:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Menczer",
"Filippo",
""
]
] |
cs/0204055 | Qingguo Zheng | Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma | Intelligent Search of Correlated Alarms for GSM Networks with
Model-based Constraints | 8 pages, 7 figures | the 9th IEEE International Conference on
Telecommunications,June,2002, Beijing,China | null | null | cs.NI cs.AI | null | In order to control the process of data mining and focus on the things of
interest to us, many kinds of constraints have been added into the algorithms
of data mining. However, discovering the correlated alarms in the alarm
database needs deep domain constraints. Because the correlated alarms greatly
depend on the logical and physical architecture of networks. Thus we use the
network model as the constraints of algorithms, including Scope constraint,
Inter-correlated constraint and Intra-correlated constraint, in our proposed
algorithm called SMC (Search with Model-based Constraints). The experiments
show that the SMC algorithm with Inter-correlated or Intra-correlated
constraint is about two times faster than the algorithm with no constraints.
| [
{
"version": "v1",
"created": "Mon, 29 Apr 2002 08:03:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zheng",
"Qingguo",
""
],
[
"Xu",
"Ke",
""
],
[
"Lv",
"Weifeng",
""
],
[
"Ma",
"Shilong",
""
]
] |
cs/0204056 | Magnus Boman | Magnus Boman, Markus Bylund, Fredrik Espinoza, Mats Danielson, David
Lyback | Trading Agents for Roaming Users | 5 pages, 1 figure | null | null | null | cs.CE | null | Some roaming users need services to manipulate autonomous processes. Trading
agents running on agent trade servers are used as a case in point. We present a
solution that provides the agent owners with means to upkeeping their desktop
environment, and maintaining their agent trade server processes, via a
briefcase service.
| [
{
"version": "v1",
"created": "Mon, 29 Apr 2002 12:20:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boman",
"Magnus",
""
],
[
"Bylund",
"Markus",
""
],
[
"Espinoza",
"Fredrik",
""
],
[
"Danielson",
"Mats",
""
],
[
"Lyback",
"David",
""
]
] |
cs/0205002 | Joachim Rosenthal | Joachim Rosenthal | A Polynomial Description of the Rijndael Advanced Encryption Standard | 12 pages, LaTeX | null | null | null | cs.CR math.AC math.RA | null | The paper gives a polynomial description of the Rijndael Advanced Encryption
Standard recently adopted by the National Institute of Standards and
Technology. Special attention is given to the structure of the S-Box.
| [
{
"version": "v1",
"created": "Thu, 2 May 2002 23:18:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rosenthal",
"Joachim",
""
]
] |
cs/0205003 | Sam Buss | Samuel R. Buss and Alexander S. Kechris and Anand Pillay and Richard
A. Shore | The prospects for mathematical logic in the twenty-first century | Association for Symbolic Logic | Bulletin of Symbolic Logic 7 (2001) 169-196 | null | null | cs.LO | null | The four authors present their speculations about the future developments of
mathematical logic in the twenty-first century. The areas of recursion theory,
proof theory and logic for computer science, model theory, and set theory are
discussed independently.
| [
{
"version": "v1",
"created": "Fri, 3 May 2002 22:36:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buss",
"Samuel R.",
""
],
[
"Kechris",
"Alexander S.",
""
],
[
"Pillay",
"Anand",
""
],
[
"Shore",
"Richard A.",
""
]
] |
cs/0205004 | Naren Ramakrishnan | Srinidhi Varadarajan, Joy Mukherjee, Naren Ramakrishnan | Weaves: A Novel Direct Code Execution Interface for Parallel High
Performance Scientific Codes | null | null | null | null | cs.DC cs.PF | null | Scientific codes are increasingly being used in compositional settings,
especially problem solving environments (PSEs). Typical compositional modeling
frameworks require significant buy-in, in the form of commitment to a
particular style of programming (e.g., distributed object components). While
this solution is feasible for newer generations of component-based scientific
codes, large legacy code bases present a veritable software engineering
nightmare. We introduce Weaves a novel framework that enables modeling,
composition, direct code execution, performance characterization, adaptation,
and control of unmodified high performance scientific codes. Weaves is an
efficient generalized framework for parallel compositional modeling that is a
proper superset of the threads and processes models of programming. In this
paper, our focus is on the transparent code execution interface enabled by
Weaves. We identify design constraints, their impact on implementation
alternatives, configuration scenarios, and present results from a prototype
implementation on Intel x86 architectures.
| [
{
"version": "v1",
"created": "Sat, 4 May 2002 02:17:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Varadarajan",
"Srinidhi",
""
],
[
"Mukherjee",
"Joy",
""
],
[
"Ramakrishnan",
"Naren",
""
]
] |
cs/0205005 | Erik Demaine | Robert A. Hearn and Erik D. Demaine | PSPACE-Completeness of Sliding-Block Puzzles and Other Problems through
the Nondeterministic Constraint Logic Model of Computation | 19 pages, 16 figures. Version 4 adds token formulation and minor
corrections. To appear in Theoretical Computer Science | null | null | null | cs.CC cs.GT | null | We present a nondeterministic model of computation based on reversing edge
directions in weighted directed graphs with minimum in-flow constraints on
vertices. Deciding whether this simple graph model can be manipulated in order
to reverse the direction of a particular edge is shown to be PSPACE-complete by
a reduction from Quantified Boolean Formulas. We prove this result in a variety
of special cases including planar graphs and highly restricted vertex
configurations, some of which correspond to a kind of passive constraint logic.
Our framework is inspired by (and indeed a generalization of) the ``Generalized
Rush Hour Logic'' developed by Flake and Baum.
We illustrate the importance of our model of computation by giving simple
reductions to show that several motion-planning problems are PSPACE-hard. Our
main result along these lines is that classic unrestricted sliding-block
puzzles are PSPACE-hard, even if the pieces are restricted to be all dominoes
(1x2 blocks) and the goal is simply to move a particular piece. No prior
complexity results were known about these puzzles. This result can be seen as a
strengthening of the existing result that the restricted Rush Hour puzzles are
PSPACE-complete, of which we also give a simpler proof. Finally, we strengthen
the existing result that the pushing-blocks puzzle Sokoban is PSPACE-complete,
by showing that it is PSPACE-complete even if no barriers are allowed.
| [
{
"version": "v1",
"created": "Sat, 4 May 2002 19:04:59 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Jun 2002 19:45:18 GMT"
},
{
"version": "v3",
"created": "Sun, 31 Aug 2003 02:59:34 GMT"
},
{
"version": "v4",
"created": "Thu, 11 Nov 2004 20:02:04 GMT"
},
{
"version": "v5",
"created": "Thu, 11 Nov 2004 21:11:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hearn",
"Robert A.",
""
],
[
"Demaine",
"Erik D.",
""
]
] |
cs/0205006 | Marco Baroni | Marco Baroni, Johannes Matiasek and Harald Trost | Unsupervised discovery of morphologically related words based on
orthographic and semantic similarity | 10 pages, to appear in the Proceedings of the Morphology/Phonology
Learning Workshop of ACL-02 | null | null | null | cs.CL | null | We present an algorithm that takes an unannotated corpus as its input, and
returns a ranked list of probable morphologically related pairs as its output.
The algorithm tries to discover morphologically related pairs by looking for
pairs that are both orthographically and semantically similar, where
orthographic similarity is measured in terms of minimum edit distance, and
semantic similarity is measured in terms of mutual information. The procedure
does not rely on a morpheme concatenation model, nor on distributional
properties of word substrings (such as affix frequency). Experiments with
German and English input give encouraging results, both in terms of precision
(proportion of good pairs found at various cutoff points of the ranked list),
and in terms of a qualitative analysis of the types of morphological patterns
discovered by the algorithm.
| [
{
"version": "v1",
"created": "Wed, 8 May 2002 14:39:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baroni",
"Marco",
""
],
[
"Matiasek",
"Johannes",
""
],
[
"Trost",
"Harald",
""
]
] |
cs/0205009 | Lillian Lee | Rie Kubota Ando and Lillian Lee | Mostly-Unsupervised Statistical Segmentation of Japanese Kanji Sequences | 22 pages. To appear in Natural Language Engineering | Natural Language Engineering 9 (2), pp. 127--149, 2003 | 10.1017/S1351324902002954 | null | cs.CL | null | Given the lack of word delimiters in written Japanese, word segmentation is
generally considered a crucial first step in processing Japanese texts. Typical
Japanese segmentation algorithms rely either on a lexicon and syntactic
analysis or on pre-segmented data; but these are labor-intensive, and the
lexico-syntactic techniques are vulnerable to the unknown word problem. In
contrast, we introduce a novel, more robust statistical method utilizing
unsegmented training data. Despite its simplicity, the algorithm yields
performance on long kanji sequences comparable to and sometimes surpassing that
of state-of-the-art morphological analyzers over a variety of error metrics.
The algorithm also outperforms another mostly-unsupervised statistical
algorithm previously proposed for Chinese.
Additionally, we present a two-level annotation scheme for Japanese to
incorporate multiple segmentation granularities, and introduce two novel
evaluation metrics, both based on the notion of a compatible bracket, that can
account for multiple granularities simultaneously.
| [
{
"version": "v1",
"created": "Fri, 10 May 2002 18:55:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ando",
"Rie Kubota",
""
],
[
"Lee",
"Lillian",
""
]
] |
cs/0205013 | Miroslaw Truszczynski | Zbigniew Lonc and Miroslaw Truszczynski | Computing stable models: worst-case performance estimates | Paper published in the Proceedings of the International Conference on
Logic Programming, ICLP-2002 | null | null | null | cs.LO cs.AI | null | We study algorithms for computing stable models of propositional logic
programs and derive estimates on their worst-case performance that are
asymptotically better than the trivial bound of O(m 2^n), where m is the size
of an input program and n is the number of its atoms. For instance, for
programs, whose clauses consist of at most two literals (counting the head) we
design an algorithm to compute stable models that works in time O(m\times
1.44225^n). We present similar results for several broader classes of programs,
as well.
| [
{
"version": "v1",
"created": "Sat, 11 May 2002 20:27:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lonc",
"Zbigniew",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] |
cs/0205014 | Miroslaw Truszczynski | Marc Denecker, Victor W. Marek and Miroslaw Truszczynski | Ultimate approximations in nonmonotonic knowledge representation systems | This paper was published in Principles of Knowledge Representation
and Reasoning, Proceedings of the Eighth International Conference (KR2002) | null | null | null | cs.AI | null | We study fixpoints of operators on lattices. To this end we introduce the
notion of an approximation of an operator. We order approximations by means of
a precision ordering. We show that each lattice operator O has a unique most
precise or ultimate approximation. We demonstrate that fixpoints of this
ultimate approximation provide useful insights into fixpoints of the operator
O.
We apply our theory to logic programming and introduce the ultimate
Kripke-Kleene, well-founded and stable semantics. We show that the ultimate
Kripke-Kleene and well-founded semantics are more precise then their standard
counterparts We argue that ultimate semantics for logic programming have
attractive epistemological properties and that, while in general they are
computationally more complex than the standard semantics, for many classes of
theories, their complexity is no worse.
| [
{
"version": "v1",
"created": "Sat, 11 May 2002 20:44:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Denecker",
"Marc",
""
],
[
"Marek",
"Victor W.",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] |
cs/0205015 | Michael Farber | Michael Farber | Instabilities of Robot Motion | 26 pages, 5 figures | null | null | null | cs.RO cs.CG math.AT | null | Instabilities of robot motion are caused by topological reasons. In this
paper we find a relation between the topological properties of a configuration
space (the structure of its cohomology algebra) and the character of
instabilities, which are unavoidable in any motion planning algorithm. More
specifically, let $X$ denote the space of all admissible configurations of a
mechanical system. A {\it motion planner} is given by a splitting $X\times X =
F_1\cup F_2\cup ... \cup F_k$ (where $F_1, ..., F_k$ are pairwise disjoint
ENRs, see below) and by continuous maps $s_j: F_j \to PX,$ such that $E\circ
s_j =1_{F_j}$. Here $PX$ denotes the space of all continuous paths in $X$
(admissible motions of the system) and $E: PX\to X\times X$ denotes the map
which assigns to a path the pair of its initial -- end points. Any motion
planner determines an algorithm of motion planning for the system. In this
paper we apply methods of algebraic topology to study the minimal number of
sets $F_j$ in any motion planner in $X$. We also introduce a new notion of {\it
order of instability} of a motion planner; it describes the number of
essentially distinct motions which may occur as a result of small perturbations
of the input data. We find the minimal order of instability, which may have
motion planners on a given configuration space $X$. We study a number of
specific problems: motion of a rigid body in $\R^3$, a robot arm, motion in
$\R^3$ in the presence of obstacles, and others.
| [
{
"version": "v1",
"created": "Sun, 12 May 2002 11:23:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Farber",
"Michael",
""
]
] |
cs/0205016 | Han Jing | Jing Han, Jiming Liu and Qingsheng Cai | From Alife Agents to a Kingdom of N Queens | 13 pages, 9 figures, in 1999 international conference of Intelligent
Agent Technology. Nominated for the best paper award | in Jiming Liu and Ning Zhong (Eds.), Intelligent Agent Technology:
Systems, Methodologies, and Tools, page 110-120, The World Scientific
Publishing Co. Pte, Ltd., Nov. 1999 | null | null | cs.AI cs.DS cs.MA | null | This paper presents a new approach to solving N-queen problems, which
involves a model of distributed autonomous agents with artificial life (ALife)
and a method of representing N-queen constraints in an agent environment. The
distributed agents locally interact with their living environment, i.e., a
chessboard, and execute their reactive behaviors by applying their behavioral
rules for randomized motion, least-conflict position searching, and cooperating
with other agents etc. The agent-based N-queen problem solving system evolves
through selection and contest according to the rule of Survival of the Fittest,
in which some agents will die or be eaten if their moving strategies are less
efficient than others. The experimental results have shown that this system is
capable of solving large-scale N-queen problems. This paper also provides a
model of ALife agents for solving general CSPs.
| [
{
"version": "v1",
"created": "Mon, 13 May 2002 10:49:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Han",
"Jing",
""
],
[
"Liu",
"Jiming",
""
],
[
"Cai",
"Qingsheng",
""
]
] |
cs/0205017 | Georgios Petasis | Georgios Petasis, Vangelis Karkaletsis, Georgios Paliouras, Ion
Androutsopoulos, Constantine D. Spyropoulos | Ellogon: A New Text Engineering Platform | 7 pages, 9 figures. Will be presented to the Third International
Conference on Language Resources and Evaluation - LREC 2002 | null | null | null | cs.CL | null | This paper presents Ellogon, a multi-lingual, cross-platform, general-purpose
text engineering environment. Ellogon was designed in order to aid both
researchers in natural language processing, as well as companies that produce
language engineering systems for the end-user. Ellogon provides a powerful
TIPSTER-based infrastructure for managing, storing and exchanging textual data,
embedding and managing text processing components as well as visualising
textual data and their associated linguistic information. Among its key
features are full Unicode support, an extensive multi-lingual graphical user
interface, its modular architecture and the reduced hardware requirements.
| [
{
"version": "v1",
"created": "Mon, 13 May 2002 11:18:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petasis",
"Georgios",
""
],
[
"Karkaletsis",
"Vangelis",
""
],
[
"Paliouras",
"Georgios",
""
],
[
"Androutsopoulos",
"Ion",
""
],
[
"Spyropoulos",
"Constantine D.",
""
]
] |
cs/0205019 | Wen Chen | W. Chen | Distance function wavelets - Part I: Helmholtz and convection-diffusion
transforms and series | Welcome any comments to [email protected] | null | null | null | cs.CE cs.NA | null | This report aims to present my research updates on distance function wavelets
(DFW) based on the fundamental solutions and the general solutions of the
Helmholtz, modified Helmholtz, and convection-diffusion equations, which
include the isotropic Helmholtz-Fourier (HF) transform and series, the
Helmholtz-Laplace (HL) transform, and the anisotropic convection-diffusion
wavelets and ridgelets. The latter is set to handle discontinuous and track
data problems. The edge effect of the HF series is addressed. Alternative
existence conditions for the DFW transforms are proposed and discussed. To
simplify and streamline the expression of the HF and HL transforms, a new
dimension-dependent function notation is introduced. The HF series is also used
to evaluate the analytical solutions of linear diffusion problems of arbitrary
dimensionality and geometry. The weakness of this report is lacking of rigorous
mathematical analysis due to the author's limited mathematical knowledge.
| [
{
"version": "v1",
"created": "Tue, 14 May 2002 13:43:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0205020 | Wen Chen | W. Chen | A quasi-RBF technique for numerical discretization of PDE's | Comments to [email protected] | null | null | null | cs.CE cs.CG | null | Atkinson developed a strategy which splits solution of a PDE system into
homogeneous and particular solutions, where the former have to satisfy the
boundary and governing equation, while the latter only need to satisfy the
governing equation without concerning geometry. Since the particular solution
can be solved irrespective of boundary shape, we can use a readily available
fast Fourier or orthogonal polynomial technique O(NlogN) to evaluate it in a
regular box or sphere surrounding physical domain. The distinction of this
study is that we approximate homogeneous solution with nonsingular general
solution RBF as in the boundary knot method. The collocation method using
general solution RBF has very high accuracy and spectral convergent speed and
is a simple, truly meshfree approach for any complicated geometry. More
importantly, the use of nonsingular general solution avoids the controversial
artificial boundary in the method of fundamental solution due to the
singularity of fundamental solution.
| [
{
"version": "v1",
"created": "Tue, 14 May 2002 13:58:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0205021 | Oxana Smirnova | A.Waananen, M.Ellert, A.Konstantinov, B.Konya, O.Smirnova | An Overview of a Grid Architecture for Scientific Computing | null | null | null | null | cs.DC | null | This document gives an overview of a Grid testbed architecture proposal for
the NorduGrid project. The aim of the project is to establish an inter-Nordic
testbed facility for implementation of wide area computing and data handling.
The architecture is supposed to define a Grid system suitable for solving data
intensive problems at the Large Hadron Collider at CERN. We present the various
architecture components needed for such a system. After that we go on to give a
description of the dynamics by showing the task flow.
| [
{
"version": "v1",
"created": "Tue, 14 May 2002 19:22:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Waananen",
"A.",
""
],
[
"Ellert",
"M.",
""
],
[
"Konstantinov",
"A.",
""
],
[
"Konya",
"B.",
""
],
[
"Smirnova",
"O.",
""
]
] |
cs/0205022 | Naren Ramakrishnan | Naren Ramakrishnan | The Traits of the Personable | null | null | null | null | cs.AI cs.IR | null | Information personalization is fertile ground for application of AI
techniques. In this article I relate personalization to the ability to capture
partial information in an information-seeking interaction. The specific focus
is on personalizing interactions at web sites. Using ideas from partial
evaluation and explanation-based generalization, I present a modeling
methodology for reasoning about personalization. This approach helps identify
seven tiers of `personable traits' in web sites.
| [
{
"version": "v1",
"created": "Tue, 14 May 2002 19:25:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramakrishnan",
"Naren",
""
]
] |
cs/0205023 | Oxana Smirnova | M.Ellert, A.Konstantinov, B.Konya, O.Smirnova, A.Waananen | Performance evaluation of the GridFTP within the NorduGrid project | null | null | null | null | cs.DC | null | This report presents results of the tests measuring the performance of
multi-threaded file transfers, using the GridFTP implementation of the Globus
project over the NorduGrid network resources. Point to point WAN tests, carried
out between the sites of Copenhagen, Lund, Oslo and Uppsala, are described. It
was found that multiple threaded download via the high performance GridFTP
protocol can significantly improve file transfer performance, and can serve as
a reliable data
| [
{
"version": "v1",
"created": "Tue, 14 May 2002 19:55:37 GMT"
},
{
"version": "v2",
"created": "Tue, 14 May 2002 20:17:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ellert",
"M.",
""
],
[
"Konstantinov",
"A.",
""
],
[
"Konya",
"B.",
""
],
[
"Smirnova",
"O.",
""
],
[
"Waananen",
"A.",
""
]
] |
cs/0205025 | Menno van Zaanen | Menno M. van Zaanen | Bootstrapping Structure into Language: Alignment-Based Learning | 148 pages | null | null | null | cs.LG cs.CL | null | This thesis introduces a new unsupervised learning framework, called
Alignment-Based Learning, which is based on the alignment of sentences and
Harris's (1951) notion of substitutability. Instances of the framework can be
applied to an untagged, unstructured corpus of natural language sentences,
resulting in a labelled, bracketed version of that corpus.
Firstly, the framework aligns all sentences in the corpus in pairs, resulting
in a partition of the sentences consisting of parts of the sentences that are
equal in both sentences and parts that are unequal. Unequal parts of sentences
can be seen as being substitutable for each other, since substituting one
unequal part for the other results in another valid sentence. The unequal parts
of the sentences are thus considered to be possible (possibly overlapping)
constituents, called hypotheses.
Secondly, the selection learning phase considers all hypotheses found by the
alignment learning phase and selects the best of these. The hypotheses are
selected based on the order in which they were found, or based on a
probabilistic function.
The framework can be extended with a grammar extraction phase. This extended
framework is called parseABL. Instead of returning a structured version of the
unstructured input corpus, like the ABL system, this system also returns a
stochastic context-free or tree substitution grammar.
Different instances of the framework have been tested on the English ATIS
corpus, the Dutch OVIS corpus and the Wall Street Journal corpus. One of the
interesting results, apart from the encouraging numerical results, is that all
instances can (and do) learn recursive structures.
| [
{
"version": "v1",
"created": "Thu, 16 May 2002 12:35:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Zaanen",
"Menno M.",
""
]
] |
cs/0205026 | Chung-chieh Shan | Chung-chieh Shan (Harvard University) | Monads for natural language semantics | 14 pages | Proceedings of the 2001 European Summer School in Logic, Language
and Information student session, ed. Kristina Striegnitz, 285-298 | null | null | cs.CL cs.PL | null | Accounts of semantic phenomena often involve extending types of meanings and
revising composition rules at the same time. The concept of monads allows many
such accounts -- for intensionality, variable binding, quantification and focus
-- to be stated uniformly and compositionally.
| [
{
"version": "v1",
"created": "Fri, 17 May 2002 08:24:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shan",
"Chung-chieh",
"",
"Harvard University"
]
] |
cs/0205027 | Chung-chieh Shan | Chung-chieh Shan (Harvard University) | A variable-free dynamic semantics | 6 pages | Proceedings of the 13th Amsterdam Colloquium, ed. Robert van Rooy
and Martin Stokhof, 204-209 (2001) | null | null | cs.CL | null | I propose a variable-free treatment of dynamic semantics. By "dynamic
semantics" I mean analyses of donkey sentences ("Every farmer who owns a donkey
beats it") and other binding and anaphora phenomena in natural language where
meanings of constituents are updates to information states, for instance as
proposed by Groenendijk and Stokhof. By "variable-free" I mean denotational
semantics in which functional combinators replace variable indices and
assignment functions, for instance as advocated by Jacobson.
The new theory presented here achieves a compositional treatment of dynamic
anaphora that does not involve assignment functions, and separates the
combinatorics of variable-free semantics from the particular linguistic
phenomena it treats. Integrating variable-free semantics and dynamic semantics
gives rise to interactions that make new empirical predictions, for example
"donkey weak crossover" effects.
| [
{
"version": "v1",
"created": "Fri, 17 May 2002 09:33:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shan",
"Chung-chieh",
"",
"Harvard University"
]
] |
cs/0205028 | Steven Bird | Edward Loper and Steven Bird | NLTK: The Natural Language Toolkit | 8 pages, 1 figure, Proceedings of the ACL Workshop on Effective Tools
and Methodologies for Teaching Natural Language Processing and Computational
Linguistics, Philadelphia, July 2002, Association for Computational
Linguistics | null | null | null | cs.CL | null | NLTK, the Natural Language Toolkit, is a suite of open source program
modules, tutorials and problem sets, providing ready-to-use computational
linguistics courseware. NLTK covers symbolic and statistical natural language
processing, and is interfaced to annotated corpora. Students augment and
replace existing components, learn structured programming by example, and
manipulate sophisticated models from the outset.
| [
{
"version": "v1",
"created": "Fri, 17 May 2002 12:51:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Loper",
"Edward",
""
],
[
"Bird",
"Steven",
""
]
] |
cs/0205052 | Laemmel | Vasu Alagar and Ralf Laemmel | Three-Tiered Specification of Micro-Architectures | null | null | null | null | cs.SE cs.PL | null | A three-tiered specification approach is developed to formally specify
collections of collaborating objects, say micro-architectures. (i) The
structural properties to be maintained in the collaboration are specified in
the lowest tier. (ii) The behaviour of the object methods in the classes is
specified in the middle tier. (iii) The interaction of the objects in the
micro-architecture is specified in the third tier. The specification approach
is based on Larch and accompanying notations and tools. The approach enables
the unambiguous and complete specification of reusable collections of
collaborating objects. The layered, formal approach is compared to other
approaches including the mainstream UML approach.
| [
{
"version": "v1",
"created": "Sun, 19 May 2002 14:46:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alagar",
"Vasu",
""
],
[
"Laemmel",
"Ralf",
""
]
] |
cs/0205053 | Paul M. Aoki | Paul M. Aoki, Rebecca E. Grinter, Amy Hurst, Margaret H. Szymanski,
James D. Thornton, and Allison Woodruff | Sotto Voce: Exploring the Interplay of Conversation and Mobile Audio
Spaces | 8 pages | Proc. ACM SIGCHI Conference on Human Factors in Computing Systems,
Minneapolis, MN, April 2002, 431-438. ACM Press. | 10.1145/503376.503454 | null | cs.HC cs.SD | null | In addition to providing information to individual visitors, electronic
guidebooks have the potential to facilitate social interaction between visitors
and their companions. However, many systems impede visitor interaction. By
contrast, our electronic guidebook, Sotto Voce, has social interaction as a
primary design goal. The system enables visitors to share audio information -
specifically, they can hear each other's guidebook activity using a
technologically mediated audio eavesdropping mechanism. We conducted a study of
visitors using Sotto Voce while touring a historic house. The results indicate
that visitors are able to use the system effectively, both as a conversational
resource and as an information appliance. More surprisingly, our results
suggest that the technologically mediated audio often cohered the visitors'
conversation and activity to a far greater degree than audio delivered through
the open air.
| [
{
"version": "v1",
"created": "Tue, 21 May 2002 02:55:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aoki",
"Paul M.",
""
],
[
"Grinter",
"Rebecca E.",
""
],
[
"Hurst",
"Amy",
""
],
[
"Szymanski",
"Margaret H.",
""
],
[
"Thornton",
"James D.",
""
],
[
"Woodruff",
"Allison",
""
]
] |
cs/0205054 | Paul M. Aoki | Allison Woodruff, Paul M. Aoki, Rebecca E. Grinter, Amy Hurst,
Margaret H. Szymanski, and James D. Thornton | Eavesdropping on Electronic Guidebooks: Observing Learning Resources in
Shared Listening Environments | 8 pages | In David Bearman and Jennifer Trant (eds.), Museums and the Web
2002: Selected Papers. (Proc. 6th International Conference on Museums and the
Web, Boston, MA, April 2002.) Pittsburgh, PA: Archives & Museum Informatics,
2002, 21-30 | null | null | cs.HC | null | We describe an electronic guidebook, Sotto Voce, that enables visitors to
share audio information by eavesdropping on each other's guidebook activity. We
have conducted three studies of visitors using electronic guidebooks in a
historic house: one study with open air audio played through speakers and two
studies with eavesdropped audio. An analysis of visitor interaction in these
studies suggests that eavesdropped audio provides more social and interactive
learning resources than open air audio played through speakers.
| [
{
"version": "v1",
"created": "Tue, 21 May 2002 03:07:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Woodruff",
"Allison",
""
],
[
"Aoki",
"Paul M.",
""
],
[
"Grinter",
"Rebecca E.",
""
],
[
"Hurst",
"Amy",
""
],
[
"Szymanski",
"Margaret H.",
""
],
[
"Thornton",
"James D.",
""
]
] |
cs/0205055 | Paul M. Aoki | Allison Woodruff, Margaret H. Szymanski, Rebecca E. Grinter, and Paul
M. Aoki | Practical Strategies for Integrating a Conversation Analyst in an
Iterative Design Process | 11 pages | Proc. ACM Conf. on Designing Interactive Systems, London, UK, June
2002, 19-28. ACM Press. | 10.1145/778712.778748 | null | cs.HC | null | We present a case study of an iterative design process that includes a
conversation analyst. We discuss potential benefits of conversation analysis
for design, and we describe our strategies for integrating the conversation
analyst in the design process. Since the analyst on our team had no previous
exposure to design or engineering, and none of the other members of our team
had any experience with conversation analysis, we needed to build a foundation
for our interaction. One of our key strategies was to pair the conversation
analyst with a designer in a highly interactive collaboration. Our tactics have
been effective on our project, leading to valuable results that we believe we
could not have obtained using another method. We hope that this paper can serve
as a practical guide to those interested in establishing a productive and
efficient working relationship between a conversation analyst and the other
members of a design team.
| [
{
"version": "v1",
"created": "Tue, 21 May 2002 03:16:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Woodruff",
"Allison",
""
],
[
"Szymanski",
"Margaret H.",
""
],
[
"Grinter",
"Rebecca E.",
""
],
[
"Aoki",
"Paul M.",
""
]
] |
cs/0205056 | Jens Gramm | Michael R. Fellows, Jens Gramm and Rolf Niedermeier | Parameterized Intractability of Motif Search Problems | 21 pages, 5 figures; an extended abstract of this paper was presented
at the 19th International Symposium on Theoretical Aspects of Computer
Science (STACS 2002), Springer-Verlag, LNCS 2285, pages 262--273, held in
Juan-Les-Pins, France, March~14--16, 2002 | null | null | WSI-2002-2 | cs.CC | null | We show that Closest Substring, one of the most important problems in the
field of biological sequence analysis, is W[1]-hard when parameterized by the
number k of input strings (and remains so, even over a binary alphabet). This
problem is therefore unlikely to be solvable in time O(f(k)\cdot n^{c}) for any
function f of k and constant c independent of k. The problem can therefore be
expected to be intractable, in any practical sense, for k>=3. Our result
supports the intuition that Closest Substring is computationally much harder
than the special case of Closest String, although both problems are
NP-complete. We also prove W[1]-hardness for other parameterizations in the
case of unbounded alphabet size. Our W[1]-hardness result for Closest Substring
generalizes to Consensus Patterns, a problem of similar significance in
computational biology.
| [
{
"version": "v1",
"created": "Tue, 21 May 2002 10:23:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fellows",
"Michael R.",
""
],
[
"Gramm",
"Jens",
""
],
[
"Niedermeier",
"Rolf",
""
]
] |
cs/0205057 | Mathias Creutz | Mathias Creutz and Krista Lagus | Unsupervised Discovery of Morphemes | 10 pages, to appear in Proceedings of Morphological and Phonological
Learning Workshop of ACL'02 | null | null | null | cs.CL | null | We present two methods for unsupervised segmentation of words into
morpheme-like units. The model utilized is especially suited for languages with
a rich morphology, such as Finnish. The first method is based on the Minimum
Description Length (MDL) principle and works online. In the second method,
Maximum Likelihood (ML) optimization is used. The quality of the segmentations
is measured using an evaluation method that compares the segmentations produced
to an existing morphological analysis. Experiments on both Finnish and English
corpora show that the presented methods perform well compared to a current
state-of-the-art system.
| [
{
"version": "v1",
"created": "Tue, 21 May 2002 14:37:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Creutz",
"Mathias",
""
],
[
"Lagus",
"Krista",
""
]
] |
cs/0205058 | Alexei Novikov | Alexei Novikov | Content Distribution in Unicast Replica Meshes | 14 pages, 8 figures, submitted to ACM Transactions on Internet
Technology | null | null | null | cs.NI | null | We propose centralized algorithm of data distribution in the unicast p2p
network. Good example of such networks are meshes of WWW and FTP mirrors.
Simulation of data propogation for different network topologies is performed
and it is shown that proposed method performs up to 200% better then common
apporaches
| [
{
"version": "v1",
"created": "Tue, 21 May 2002 15:56:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Novikov",
"Alexei",
""
]
] |
cs/0205059 | Saverio Perugini | Saverio Perugini, Marcos Andre Goncalves and Edward A. Fox | A Connection-Centric Survey of Recommender Systems Research | Based on the comments from reviewers, we have made modifications to
our article, including the following: Shifted the focus of the survey
completely to recommender system research rather than recommendation and
personalization and subsequently changed the title to "A Connection-Centric
Survey of Recommender Systems Research." Now only cite the most seminal works
in this area and as a result have reduced the references significantly from
over 200 to 120 | null | null | null | cs.IR cs.HC | null | Recommender systems attempt to reduce information overload and retain
customers by selecting a subset of items from a universal set based on user
preferences. While research in recommender systems grew out of information
retrieval and filtering, the topic has steadily advanced into a legitimate and
challenging research area of its own. Recommender systems have traditionally
been studied from a content-based filtering vs. collaborative design
perspective. Recommendations, however, are not delivered within a vacuum, but
rather cast within an informal community of users and social context.
Therefore, ultimately all recommender systems make connections among people and
thus should be surveyed from such a perspective. This viewpoint is
under-emphasized in the recommender systems literature. We therefore take a
connection-oriented viewpoint toward recommender systems research. We posit
that recommendation has an inherently social element and is ultimately intended
to connect people either directly as a result of explicit user modeling or
indirectly through the discovery of relationships implicit in extant data.
Thus, recommender systems are characterized by how they model users to bring
people together: explicitly or implicitly. Finally, user modeling and the
connection-centric viewpoint raise broadening and social issues--such as
evaluation, targeting, and privacy and trust--which we also briefly address.
| [
{
"version": "v1",
"created": "Wed, 22 May 2002 08:36:32 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jul 2003 01:30:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perugini",
"Saverio",
""
],
[
"Goncalves",
"Marcos Andre",
""
],
[
"Fox",
"Edward A.",
""
]
] |
cs/0205060 | Christoph Koch | Christoph Koch | Optimizing Queries Using a Meta-level Database | 26 pages, 5 figures | null | null | null | cs.DB | null | Graph simulation (using graph schemata or data guides) has been successfully
proposed as a technique for adding structure to semistructured data. Design
patterns for description (such as meta-classes and homomorphisms between schema
layers), which are prominent in the object-oriented programming community,
constitute a generalization of this graph simulation approach.
In this paper, we show description applicable to a wide range of data models
that have some notion of object (-identity), and propose to turn it into a data
model primitive much like, say, inheritance. We argue that such an extension
fills a practical need in contemporary data management. Then, we present
algebraic techniques for query optimization (using the notions of described and
description queries). Finally, in the semistructured setting, we discuss the
pruning of regular path queries (with nested conditions) using description
meta-data. In this context, our notion of meta-data extends graph schemata and
data guides by meta-level values, allowing to boost query performance and to
reduce the redundancy of data.
| [
{
"version": "v1",
"created": "Thu, 23 May 2002 14:15:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Koch",
"Christoph",
""
]
] |
cs/0205061 | Marek W. Gutowski | Marek W. Gutowski | Aging, double helix and small world property in genetic algorithms | Submitted to the workshop on evolutionary algorithms, Krakow
(Cracow), Poland, Sept. 30, 2002, 6 pages, no figures, LaTeX 2.09 requires
kaeog.sty (included) | null | null | null | cs.NE cs.DS physics.data-an | null | Over a quarter of century after the invention of genetic algorithms and
miriads of their modifications, as well as successful implementations, we are
still lacking many essential details of thorough analysis of it's inner
working. One of such fundamental questions is: how many generations do we need
to solve the optimization problem? This paper tries to answer this question,
albeit in a fuzzy way, making use of the double helix concept. As a byproduct
we gain better understanding of the ways, in which the genetic algorithm may be
fine tuned.
| [
{
"version": "v1",
"created": "Thu, 23 May 2002 15:34:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gutowski",
"Marek W.",
""
]
] |
cs/0205063 | Wen Chen | W. Chen | Distance function wavelets - Part II: Extended results and conjectures | Welcome any comments to [email protected] | null | null | null | cs.CE cs.CG | null | Report II is concerned with the extended results of distance function
wavelets (DFW). The fractional DFW transforms are first addressed relating to
the fractal geometry and fractional derivative, and then, the discrete
Helmholtz-Fourier transform is briefly presented. The Green second identity may
be an alternative devise in developing the theoretical framework of the DFW
transform and series. The kernel solutions of the Winkler plate equation and
the Burger's equation are used to create the DFW transforms and series. Most
interestingly, it is found that the translation invariant monomial solutions of
the high-order Laplace equations can be used to make very simple harmonic
polynomial DFW series. In most cases of this study, solid mathematical analysis
is missing and results are obtained intuitively in the conjecture status.
| [
{
"version": "v1",
"created": "Fri, 24 May 2002 12:07:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0205065 | Lillian Lee | Regina Barzilay and Lillian Lee | Bootstrapping Lexical Choice via Multiple-Sequence Alignment | 8 pages; to appear in the proceedings of EMNLP-2002 | null | null | null | cs.CL | null | An important component of any generation system is the mapping dictionary, a
lexicon of elementary semantic expressions and corresponding natural language
realizations. Typically, labor-intensive knowledge-based methods are used to
construct the dictionary. We instead propose to acquire it automatically via a
novel multiple-pass algorithm employing multiple-sequence alignment, a
technique commonly used in bioinformatics. Crucially, our method leverages
latent information contained in multi-parallel corpora -- datasets that supply
several verbalizations of the corresponding semantics rather than just one.
We used our techniques to generate natural language versions of
computer-generated mathematical proofs, with good results on both a
per-component and overall-output basis. For example, in evaluations involving a
dozen human judges, our system produced output whose readability and
faithfulness to the semantic input rivaled that of a traditional generation
system.
| [
{
"version": "v1",
"created": "Sat, 25 May 2002 21:32:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barzilay",
"Regina",
""
],
[
"Lee",
"Lillian",
""
]
] |
cs/0205066 | Benoit Hudson | Benoit Hudson, Tuomas Sandholm | Effectiveness of Preference Elicitation in Combinatorial Auctions | 20 pages, 7 figures | null | null | CMU-CS-02-124 | cs.GT cs.MA | null | Combinatorial auctions where agents can bid on bundles of items are desirable
because they allow the agents to express complementarity and substitutability
between the items. However, expressing one's preferences can require bidding on
all bundles. Selective incremental preference elicitation by the auctioneer was
recently proposed to address this problem (Conen & Sandholm 2001), but the idea
was not evaluated. In this paper we show, experimentally and theoretically,
that automated elicitation provides a drastic benefit. In all of the
elicitation schemes under study, as the number of items for sale increases, the
amount of information elicited is a vanishing fraction of the information
collected in traditional ``direct revelation mechanisms'' where bidders reveal
all their valuation information. Most of the elicitation schemes also maintain
the benefit as the number of agents increases. We develop more effective
elicitation policies for existing query types. We also present a new query type
that takes the incremental nature of elicitation to a new level by allowing
agents to give approximate answers that are refined only on an as-needed basis.
In the process, we present methods for evaluating different types of
elicitation policies.
| [
{
"version": "v1",
"created": "Mon, 27 May 2002 01:56:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hudson",
"Benoit",
""
],
[
"Sandholm",
"Tuomas",
""
]
] |
cs/0205067 | Ted Pedersen | Ted Pedersen | Evaluating the Effectiveness of Ensembles of Decision Trees in
Disambiguating Senseval Lexical Samples | Appears in the Proceedings of the ACL-02 Workshop on Word Sense
Disambiguation: Recent Successes and Future Directions, July 11, 2002,
Philadelphia, PA | null | null | null | cs.CL | null | This paper presents an evaluation of an ensemble--based system that
participated in the English and Spanish lexical sample tasks of Senseval-2. The
system combines decision trees of unigrams, bigrams, and co--occurrences into a
single classifier. The analysis is extended to include the Senseval-1 data.
| [
{
"version": "v1",
"created": "Mon, 27 May 2002 18:42:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pedersen",
"Ted",
""
]
] |
cs/0205068 | Ted Pedersen | Ted Pedersen | Assessing System Agreement and Instance Difficulty in the Lexical Sample
Tasks of Senseval-2 | Appears in the Proceedings of the ACL-02 Workshop on Word Sense
Disambiguation: Recent Successes and Future Directions, July 11, 2002,
Philadelphia, PA | null | null | null | cs.CL | null | This paper presents a comparative evaluation among the systems that
participated in the Spanish and English lexical sample tasks of Senseval-2. The
focus is on pairwise comparisons among systems to assess the degree to which
they agree, and on measuring the difficulty of the test instances included in
these tasks.
| [
{
"version": "v1",
"created": "Mon, 27 May 2002 18:49:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pedersen",
"Ted",
""
]
] |
cs/0205069 | Ted Pedersen | Ted Pedersen | Machine Learning with Lexical Features: The Duluth Approach to
Senseval-2 | Appears in the Proceedings of SENSEVAL-2: Second International
Workshop on Evaluating Word Sense Disambiguation Systems July 5-6, 2001,
Toulouse, France | null | null | null | cs.CL | null | This paper describes the sixteen Duluth entries in the Senseval-2 comparative
exercise among word sense disambiguation systems. There were eight pairs of
Duluth systems entered in the Spanish and English lexical sample tasks. These
are all based on standard machine learning algorithms that induce classifiers
from sense-tagged training text where the context in which ambiguous words
occur are represented by simple lexical features. These are highly portable,
robust methods that can serve as a foundation for more tailored approaches.
| [
{
"version": "v1",
"created": "Mon, 27 May 2002 18:57:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pedersen",
"Ted",
""
]
] |
cs/0205070 | Lillian Lee | Bo Pang, Lillian Lee and Shivakumar Vaithyanathan | Thumbs up? Sentiment Classification using Machine Learning Techniques | To appear in EMNLP-2002 | null | null | null | cs.CL cs.LG | null | We consider the problem of classifying documents not by topic, but by overall
sentiment, e.g., determining whether a review is positive or negative. Using
movie reviews as data, we find that standard machine learning techniques
definitively outperform human-produced baselines. However, the three machine
learning methods we employed (Naive Bayes, maximum entropy classification, and
support vector machines) do not perform as well on sentiment classification as
on traditional topic-based categorization. We conclude by examining factors
that make the sentiment classification problem more challenging.
| [
{
"version": "v1",
"created": "Tue, 28 May 2002 02:01:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pang",
"Bo",
""
],
[
"Lee",
"Lillian",
""
],
[
"Vaithyanathan",
"Shivakumar",
""
]
] |
cs/0205071 | Xiaoming Liu | Xiaoming Liu, Tim Brody, Stevan Harnad, Les Carr, Kurt Maly, Mohammad
Zubair, Michael L. Nelson | A Scalable Architecture for Harvest-Based Digital Libraries - The
ODU/Southampton Experiments | 20 pages, 6 figures | null | null | null | cs.DL cs.IR | null | This paper discusses the requirements of current and emerging applications
based on the Open Archives Initiative (OAI) and emphasizes the need for a
common infrastructure to support them. Inspired by HTTP proxy, cache, gateway
and web service concepts, a design for a scalable and reliable infrastructure
that aims at satisfying these requirements is presented. Moreover it is shown
how various applications can exploit the services included in the proposed
infrastructure. The paper concludes by discussing the current status of several
prototype implementations.
| [
{
"version": "v1",
"created": "Tue, 28 May 2002 15:32:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liu",
"Xiaoming",
""
],
[
"Brody",
"Tim",
""
],
[
"Harnad",
"Stevan",
""
],
[
"Carr",
"Les",
""
],
[
"Maly",
"Kurt",
""
],
[
"Zubair",
"Mohammad",
""
],
[
"Nelson",
"Michael L.",
""
]
] |
cs/0205073 | Vincent Conitzer | Vincent Conitzer, Tuomas Sandholm | Vote Elicitation: Complexity and Strategy-Proofness | null | Proceedings of the 18th National Conference on Artificial
Intelligence (AAAI-02), Edmonton, Canada, 2002 | null | null | cs.GT cs.CC cs.MA | null | Preference elicitation is a central problem in AI, and has received
significant attention in single-agent settings. It is also a key problem in
multiagent systems, but has received little attention here so far. In this
setting, the agents may have different preferences that often must be
aggregated using voting. This leads to interesting issues because what, if any,
information should be elicited from an agent depends on what other agents have
revealed about their preferences so far.
In this paper we study effective elicitation, and its impediments, for the
most common voting protocols. It turns out that in the Single Transferable Vote
protocol, even knowing when to terminate elicitation is mathcal NP-complete,
while this is easy for all the other protocols under study. Even for these
protocols, determining how to elicit effectively is NP-complete, even with
perfect suspicions about how the agents will vote. The exception is the
Plurality protocol where such effective elicitation is easy.
We also show that elicitation introduces additional opportunities for
strategic manipulation by the voters. We demonstrate how to curtail the space
of elicitation schemes so that no such additional strategic issues arise.
| [
{
"version": "v1",
"created": "Wed, 29 May 2002 00:10:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Conitzer",
"Vincent",
""
],
[
"Sandholm",
"Tuomas",
""
]
] |
cs/0205074 | Vincent Conitzer | Vincent Conitzer, Tuomas Sandholm | Complexity Results about Nash Equilibria | null | In Proceedings of the 18th International Joint Conference on
Artificial Intelligence (IJCAI-03), Acapulco, Mexico, 2003 | null | CMU-CS-02-135 | cs.GT cs.CC cs.MA | null | Noncooperative game theory provides a normative framework for analyzing
strategic interactions. However, for the toolbox to be operational, the
solutions it defines will have to be computed. In this paper, we provide a
single reduction that 1) demonstrates NP-hardness of determining whether Nash
equilibria with certain natural properties exist, and 2) demonstrates the
#P-hardness of counting Nash equilibria (or connected sets of Nash equilibria).
We also show that 3) determining whether a pure-strategy Bayes-Nash equilibrium
exists is NP-hard, and that 4) determining whether a pure-strategy Nash
equilibrium exists in a stochastic (Markov) game is PSPACE-hard even if the
game is invisible (this remains NP-hard if the game is finite). All of our
hardness results hold even if there are only two players and the game is
symmetric.
Keywords: Nash equilibrium; game theory; computational complexity;
noncooperative game theory; normal form game; stochastic game; Markov game;
Bayes-Nash equilibrium; multiagent systems.
| [
{
"version": "v1",
"created": "Tue, 28 May 2002 23:32:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Conitzer",
"Vincent",
""
],
[
"Sandholm",
"Tuomas",
""
]
] |
cs/0205075 | Vincent Conitzer | Vincent Conitzer, Tuomas Sandholm | Complexity of Mechanism Design | null | Proceedings of the 18th Annual Conference on Uncertainty in
Artificial Intelligence (UAI-02), Edmonton, Canada, 2002 | null | null | cs.GT cs.CC cs.MA | null | The aggregation of conflicting preferences is a central problem in multiagent
systems. The key difficulty is that the agents may report their preferences
insincerely. Mechanism design is the art of designing the rules of the game so
that the agents are motivated to report their preferences truthfully and a
(socially) desirable outcome is chosen. We propose an approach where a
mechanism is automatically created for the preference aggregation setting at
hand. This has several advantages, but the downside is that the mechanism
design optimization problem needs to be solved anew each time. Focusing on
settings where side payments are not possible, we show that the mechanism
design problem is NP-complete for deterministic mechanisms. This holds both for
dominant-strategy implementation and for Bayes-Nash implementation. We then
show that if we allow randomized mechanisms, the mechanism design problem
becomes tractable. In other words, the coordinator can tackle the computational
complexity introduced by its uncertainty about the agents' preferences by
making the agents face additional uncertainty. This comes at no loss, and in
some cases at a gain, in the (social) objective.
| [
{
"version": "v1",
"created": "Tue, 28 May 2002 23:43:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Conitzer",
"Vincent",
""
],
[
"Sandholm",
"Tuomas",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.