id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0203022
Andy King
Jacob M. Howe and Andy King
Three Optimisations for Sharing
To appear in Theiry and Practice of Logic Programming
null
null
null
cs.PL
null
In order to improve precision and efficiency sharing analysis should track both freeness and linearity. The abstract unification algorithms for these combined domains are suboptimal, hence there is scope for improving precision. This paper proposes three optimisations for tracing sharing in combination with freeness and linearity. A novel connection between equations and sharing abstractions is used to establish correctness of these optimisations even in the presence of rational trees. A method for pruning intermediate sharing abstractions to improve efficiency is also proposed. The optimisations are lightweight and therefore some, if not all, of these optimisations will be of interest to the implementor.
[ { "version": "v1", "created": "Mon, 18 Mar 2002 13:22:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Howe", "Jacob M.", "" ], [ "King", "Andy", "" ] ]
cs/0203023
Magnus Boman
David Lyback and Magnus Boman
Agent trade servers in financial exchange systems
11 pages, 1 figure
null
null
null
cs.CE
null
New services based on the best-effort paradigm could complement the current deterministic services of an electronic financial exchange. Four crucial aspects of such systems would benefit from a hybrid stance: proper use of processing resources, bandwidth management, fault tolerance, and exception handling. We argue that a more refined view on Quality-of-Service control for exchange systems, in which the principal ambition of upholding a fair and orderly marketplace is left uncompromised, would benefit all interested parties.
[ { "version": "v1", "created": "Tue, 19 Mar 2002 10:05:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Lyback", "David", "" ], [ "Boman", "Magnus", "" ] ]
cs/0203025
David Bremner
David Bremner and Alexander Golynski
Sufficiently Fat Polyhedra are not 2-castable
5 pages, 1 figure
null
null
null
cs.CG
null
In this note we consider the problem of manufacturing a convex polyhedral object via casting. We consider a generalization of the sand casting process where the object is manufactured by gluing together two identical faces of parts cast with a single piece mold. In this model we show that the class of convex polyhedra which can be enclosed between two concentric spheres of the ratio of their radii less than 1.07 cannot be manufactured using only two cast parts.
[ { "version": "v1", "created": "Wed, 20 Mar 2002 15:14:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Bremner", "David", "" ], [ "Golynski", "Alexander", "" ] ]
cs/0203026
Chris Doran
Chris Doran, Anthony Lasenby and Joan Lasenby
Conformal Geometry, Euclidean Space and Geometric Algebra
Proceedings, "Uncertainty in Geometric Computations", Sheffield 2001
null
null
null
cs.CG cs.GR math.MG
null
Projective geometry provides the preferred framework for most implementations of Euclidean space in graphics applications. Translations and rotations are both linear transformations in projective geometry, which helps when it comes to programming complicated geometrical operations. But there is a fundamental weakness in this approach - the Euclidean distance between points is not handled in a straightforward manner. Here we discuss a solution to this problem, based on conformal geometry. The language of geometric algebra is best suited to exploiting this geometry, as it handles the interior and exterior products in a single, unified framework. A number of applications are discussed, including a compact formula for reflecting a line off a general spherical surface.
[ { "version": "v1", "created": "Fri, 22 Mar 2002 14:33:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Doran", "Chris", "" ], [ "Lasenby", "Anthony", "" ], [ "Lasenby", "Joan", "" ] ]
cs/0203027
Qingguo Zheng
Qingguo Zheng, Ke Xu, Shilong Ma, Weifeng Lv
The Algorithms of Updating Sequential Patterns
12 pages, 4 figures
The Second SIAM Data mining2002: workshop HPDM
null
null
cs.DB cs.AI
null
Because the data being mined in the temporal database will evolve with time, many researchers have focused on the incremental mining of frequent sequences in temporal database. In this paper, we propose an algorithm called IUS, using the frequent and negative border sequences in the original database for incremental sequence mining. To deal with the case where some data need to be updated from the original database, we present an algorithm called DUS to maintain sequential patterns in the updated database. We also define the negative border sequence threshold: Min_nbd_supp to control the number of sequences in the negative border.
[ { "version": "v1", "created": "Wed, 27 Mar 2002 03:35:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Zheng", "Qingguo", "" ], [ "Xu", "Ke", "" ], [ "Ma", "Shilong", "" ], [ "Lv", "Weifeng", "" ] ]
cs/0203028
Qingguo Zheng
Qingguo Zheng, Ke Xu, Shilong Ma
When to Update the sequential patterns of stream data?
12 pages, 5 figures
null
null
NLSDE_01_2002_3_27
cs.DB cs.AI
null
In this paper, we first define a difference measure between the old and new sequential patterns of stream data, which is proved to be a distance. Then we propose an experimental method, called TPD (Tradeoff between Performance and Difference), to decide when to update the sequential patterns of stream data by making a tradeoff between the performance of increasingly updating algorithms and the difference of sequential patterns. The experiments for the incremental updating algorithm IUS on two data sets show that generally, as the size of incremental windows grows, the values of the speedup and the values of the difference will decrease and increase respectively. It is also shown experimentally that the incremental ratio determined by the TPD method does not monotonically increase or decrease but changes in a range between 20 and 30 percentage for the IUS algorithm.
[ { "version": "v1", "created": "Wed, 27 Mar 2002 06:31:58 GMT" }, { "version": "v2", "created": "Tue, 11 Jun 2002 01:10:47 GMT" }, { "version": "v3", "created": "Sun, 26 Jan 2003 07:30:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Zheng", "Qingguo", "" ], [ "Xu", "Ke", "" ], [ "Ma", "Shilong", "" ] ]
cs/0203030
Antonio Fernandez
Matthew Andrews, Antonio Fernandez, Ashish Goel, and Lisa Zhang
Source Routing and Scheduling in Packet Networks
A preliminary version of this paper appeared in the Proceedings of the 42th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2001
null
null
null
cs.NI cs.DC
null
We study {\em routing} and {\em scheduling} in packet-switched networks. We assume an adversary that controls the injection time, source, and destination for each packet injected. A set of paths for these packets is {\em admissible} if no link in the network is overloaded. We present the first on-line routing algorithm that finds a set of admissible paths whenever this is feasible. Our algorithm calculates a path for each packet as soon as it is injected at its source using a simple shortest path computation. The length of a link reflects its current congestion. We also show how our algorithm can be implemented under today's Internet routing paradigms. When the paths are known (either given by the adversary or computed as above) our goal is to schedule the packets along the given paths so that the packets experience small end-to-end delays. The best previous delay bounds for deterministic and distributed scheduling protocols were exponential in the path length. In this paper we present the first deterministic and distributed scheduling protocol that guarantees a polynomial end-to-end delay for every packet. Finally, we discuss the effects of combining routing with scheduling. We first show that some unstable scheduling protocols remain unstable no matter how the paths are chosen. However, the freedom to choose paths can make a difference. For example, we show that a ring with parallel links is stable for all greedy scheduling protocols if paths are chosen intelligently, whereas this is not the case if the adversary specifies the paths.
[ { "version": "v1", "created": "Thu, 28 Mar 2002 12:15:14 GMT" }, { "version": "v2", "created": "Thu, 28 Mar 2002 21:50:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Andrews", "Matthew", "" ], [ "Fernandez", "Antonio", "" ], [ "Goel", "Ashish", "" ], [ "Zhang", "Lisa", "" ] ]
cs/0204002
Erik Demaine
Erik D. Demaine, Martin L. Demaine, Helena A. Verrill
Coin-Moving Puzzles
25 pages, 33 figures. To appear in the book More Games of No Chance edited by Richard Nowakowski and published by MSRI
null
null
null
cs.DM cs.CG cs.GT
null
We introduce a new family of one-player games, involving the movement of coins from one configuration to another. Moves are restricted so that a coin can be placed only in a position that is adjacent to at least two other coins. The goal of this paper is to specify exactly which of these games are solvable. By introducing the notion of a constant number of extra coins, we give tight theorems characterizing solvable puzzles on the square grid and equilateral-triangle grid. These existence results are supplemented by polynomial-time algorithms for finding a solution.
[ { "version": "v1", "created": "Sun, 31 Mar 2002 01:02:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Verrill", "Helena A.", "" ] ]
cs/0204003
David N. Levin
David N. Levin (U. of Chicago)
Blind Normalization of Speech From Different Channels and Speakers
4 pages, 2 figures
null
null
null
cs.CL
null
This paper describes representations of time-dependent signals that are invariant under any invertible time-independent transformation of the signal time series. Such a representation is created by rescaling the signal in a non-linear dynamic manner that is determined by recently encountered signal levels. This technique may make it possible to normalize signals that are related by channel-dependent and speaker-dependent transformations, without having to characterize the form of the signal transformations, which remain unknown. The technique is illustrated by applying it to the time-dependent spectra of speech that has been filtered to simulate the effects of different channels. The experimental results show that the rescaled speech representations are largely normalized (i.e., channel-independent), despite the channel-dependence of the raw (unrescaled) speech.
[ { "version": "v1", "created": "Tue, 2 Apr 2002 21:14:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Levin", "David N.", "", "U. of Chicago" ] ]
cs/0204004
Steven Bird
Xiaoyi Ma, Haejoong Lee, Steven Bird and Kazuaki Maeda
Models and Tools for Collaborative Annotation
8 pages, 6 figures
Proceedings of the Third International Conference on Language Resources and Evaluation, Paris: European Language Resources Association, 2002
null
null
cs.CL cs.SD
null
The Annotation Graph Toolkit (AGTK) is a collection of software which facilitates development of linguistic annotation tools. AGTK provides a database interface which allows applications to use a database server for persistent storage. This paper discusses various modes of collaborative annotation and how they can be supported with tools built using AGTK and its database interface. We describe the relational database schema and API, and describe a version of the TableTrans tool which supports collaborative annotation. The remainder of the paper discusses a high-level query language for annotation graphs, along with optimizations, in support of expressive and efficient access to the annotations held on a large central server. The paper demonstrates that it is straightforward to support a variety of different levels of collaborative annotation with existing AGTK-based tools, with a minimum of additional programming effort.
[ { "version": "v1", "created": "Wed, 3 Apr 2002 17:25:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Xiaoyi", "" ], [ "Lee", "Haejoong", "" ], [ "Bird", "Steven", "" ], [ "Maeda", "Kazuaki", "" ] ]
cs/0204005
Steven Bird
Kazuaki Maeda, Steven Bird, Xiaoyi Ma, and Haejoong Lee
Creating Annotation Tools with the Annotation Graph Toolkit
8 pages, 12 figures
Proceedings of the Third International Conference on Language Resources and Evaluation, Paris: European Language Resources Association, 2002
null
null
cs.CL cs.SD
null
The Annotation Graph Toolkit is a collection of software supporting the development of annotation tools based on the annotation graph model. The toolkit includes application programming interfaces for manipulating annotation graph data and for importing data from other formats. There are interfaces for the scripting languages Tcl and Python, a database interface, specialized graphical user interfaces for a variety of annotation tasks, and several sample applications. This paper describes all the toolkit components for the benefit of would-be application developers.
[ { "version": "v1", "created": "Wed, 3 Apr 2002 17:32:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Maeda", "Kazuaki", "" ], [ "Bird", "Steven", "" ], [ "Ma", "Xiaoyi", "" ], [ "Lee", "Haejoong", "" ] ]
cs/0204006
Steven Bird
Steven Bird, Kazuaki Maeda, Xiaoyi Ma, Haejoong Lee, Beth Randall, and Salim Zayat
TableTrans, MultiTrans, InterTrans and TreeTrans: Diverse Tools Built on the Annotation Graph Toolkit
7 pages, 7 figures
Proceedings of the Third International Conference on Language Resources and Evaluation, Paris: European Language Resources Association, 2002
null
null
cs.CL cs.SD
null
Four diverse tools built on the Annotation Graph Toolkit are described. Each tool associates linguistic codes and structures with time-series data. All are based on the same software library and tool architecture. TableTrans is for observational coding, using a spreadsheet whose rows are aligned to a signal. MultiTrans is for transcribing multi-party communicative interactions recorded using multi-channel signals. InterTrans is for creating interlinear text aligned to audio. TreeTrans is for creating and manipulating syntactic trees. This work demonstrates that the development of diverse tools and re-use of software components is greatly facilitated by a common high-level application programming interface for representing the data and managing input/output, together with a common architecture for managing the interaction of multiple components.
[ { "version": "v1", "created": "Wed, 3 Apr 2002 17:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Bird", "Steven", "" ], [ "Maeda", "Kazuaki", "" ], [ "Ma", "Xiaoyi", "" ], [ "Lee", "Haejoong", "" ], [ "Randall", "Beth", "" ], [ "Zayat", "Salim", "" ] ]
cs/0204007
Steven Bird
Scott Cotton and Steven Bird
An Integrated Framework for Treebanks and Multilayer Annotations
8 pages
Proceedings of the Third International Conference on Language Resources and Evaluation, Paris: European Language Resources Association, 2002
null
null
cs.CL
null
Treebank formats and associated software tools are proliferating rapidly, with little consideration for interoperability. We survey a wide variety of treebank structures and operations, and show how they can be mapped onto the annotation graph model, and leading to an integrated framework encompassing tree and non-tree annotations alike. This development opens up new possibilities for managing and exploiting multilayer annotations.
[ { "version": "v1", "created": "Wed, 3 Apr 2002 18:55:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Cotton", "Scott", "" ], [ "Bird", "Steven", "" ] ]
cs/0204008
Petro M. Gopych
Petro M. Gopych
The tip-of-the-tongue phenomenon: Irrelevant neural network localization or disruption of its interneuron links ?
Proceedings of the VIII All-Russian conference "Neurocomputers and their application - 2002" with international participation, held in Moscow on 21-22 March 2002, 5 pages and 1 Figure
null
null
null
cs.CL cs.AI q-bio.NC q-bio.QM
null
On the base of recently proposed three-stage quantitative neural network model of the tip-of-the-tongue (TOT) phenomenon a possibility to occur of TOT states coursed by neural network interneuron links' disruption has been studied. Using a numerical example it was found that TOTs coursed by interneron links' disruption are in (1.5 + - 0.3)x1000 times less probable then those coursed by irrelevant (incomplete) neural network localization. It was shown that delayed TOT states' etiology cannot be related to neural network interneuron links' disruption.
[ { "version": "v1", "created": "Thu, 4 Apr 2002 18:59:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Gopych", "Petro M.", "" ] ]
cs/0204009
Thomas Eiter
Thomas Eiter, Georg Gottlob, and Kazuhisa Makino
New Results on Monotone Dualization and Generating Hypergraph Transversals
Removed some minor errors. A shorter version of this paper appears in: Proceedings of the 34th ACM Symposium on Theory of Computing (STOC-02), May 19-21, 2002, Montreal, Quebec, Canada
null
null
INFSYS RR-1843-02-05, Institut f. Informationssysteme, TU Wien, April 2002
cs.DS cs.CC
null
We consider the problem of dualizing a monotone CNF (equivalently, computing all minimal transversals of a hypergraph), whose associated decision problem is a prominent open problem in NP-completeness. We present a number of new polynomial time resp. output-polynomial time results for significant cases, which largely advance the tractability frontier and improve on previous results. Furthermore, we show that duality of two monotone CNFs can be disproved with limited nondeterminism. More precisely, this is feasible in polynomial time with O(chi(n) * log n) suitably guessed bits, where chi(n) is given by \chi(n)^chi(n) = n; note that chi(n) = o(log n). This result sheds new light on the complexity of this important problem.
[ { "version": "v1", "created": "Thu, 4 Apr 2002 19:23:49 GMT" }, { "version": "v2", "created": "Sun, 14 Apr 2002 00:25:11 GMT" }, { "version": "v3", "created": "Fri, 26 Apr 2002 10:47:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiter", "Thomas", "" ], [ "Gottlob", "Georg", "" ], [ "Makino", "Kazuhisa", "" ] ]
cs/0204010
Jan Chomicki
Jan Chomicki, Jerzy Marcinkowski
On the Computational Complexity of Consistent Query Answers
9 pages
null
null
null
cs.DB
null
We consider here the problem of obtaining reliable, consistent information from inconsistent databases -- databases that do not have to satisfy given integrity constraints. We use the notion of consistent query answer -- a query answer which is true in every (minimal) repair of the database. We provide a complete classification of the computational complexity of consistent answers to first-order queries w.r.t. functional dependencies and denial constraints. We show how the complexity depends on the {\em type} of the constraints considered, their {\em number}, and the {\em size} of the query. We obtain several new PTIME cases, using new algorithms.
[ { "version": "v1", "created": "Fri, 5 Apr 2002 22:24:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Chomicki", "Jan", "" ], [ "Marcinkowski", "Jerzy", "" ] ]
cs/0204011
Debojyoti Dutta
Abhimanyu Das, Deboyjoti Dutta, Ahmed Helmy
Fair Stateless Aggregate Traffic Marking using Active Queue Management Techniques
7 pages
null
null
null
cs.NI
null
In heterogeneous networks such as today's Internet, the differentiated services architecture promises to provide QoS guarantees through scalable service differentiation. Traffic marking is an important component of this framework. In this paper, we propose two new aggregate markers that are stateless, scalable and fair. We leverage stateless Active Queue Management (AQM) algorithms to enable fair and efficient token distribution among individual flows of an aggregate. The first marker, Probabilistic Aggregate Marker (PAM), uses the Token Bucket burst size to probabilistically mark incoming packets to ensure TCP-friendly and proportionally fair marking. The second marker, Stateless Aggregate Fair Marker (F-SAM) approximates fair queueing techniques to isolate flows while marking packets of the aggregate. It distributes tokens evenly among the flows without maintaining per-flow state. Our simulation results show that our marking strategies show upto 30% improvement over other commonly used markers while marking flow aggregates. These improvements are in terms of better average throughput and fairness indices, in scenarios containing heterogeneous traffic consisting of TCP (both long lived elephants and short lived mice) and misbehaving UDP flows. As a bonus, F-SAM helps the mice to win the war against elephants.
[ { "version": "v1", "created": "Mon, 8 Apr 2002 08:12:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Das", "Abhimanyu", "" ], [ "Dutta", "Deboyjoti", "" ], [ "Helmy", "Ahmed", "" ] ]
cs/0204012
Stuart E. Middleton
Stuart E. Middleton, Harith Alani, David C. De Roure
Exploiting Synergy Between Ontologies and Recommender Systems
Semantic web conference, WWW2002, 10 pages
null
null
null
cs.LG cs.MA
null
Recommender systems learn about user preferences over time, automatically finding things of similar interest. This reduces the burden of creating explicit queries. Recommender systems do, however, suffer from cold-start problems where no initial information is available early on upon which to base recommendations. Semantic knowledge structures, such as ontologies, can provide valuable domain knowledge and user information. However, acquiring such knowledge and keeping it up to date is not a trivial task and user interests are particularly difficult to acquire and maintain. This paper investigates the synergy between a web-based research paper recommender system and an ontology containing information automatically extracted from departmental databases available on the web. The ontology is used to address the recommender systems cold-start problem. The recommender system addresses the ontology's interest-acquisition problem. An empirical evaluation of this approach is conducted and the performance of the integrated systems measured.
[ { "version": "v1", "created": "Mon, 8 Apr 2002 10:56:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Middleton", "Stuart E.", "" ], [ "Alani", "Harith", "" ], [ "De Roure", "David C.", "" ] ]
cs/0204013
Laemmel
Ralf Laemmel
The Sketch of a Polymorphic Symphony
null
null
null
null
cs.PL
null
In previous work, we have introduced functional strategies, that is, first-class generic functions that can traverse into terms of any type while mixing uniform and type-specific behaviour. In the present paper, we give a detailed description of one particular Haskell-based model of functional strategies. This model is characterised as follows. Firstly, we employ first-class polymorphism as a form of second-order polymorphism as for the mere types of functional strategies. Secondly, we use an encoding scheme of run-time type case for mixing uniform and type-specific behaviour. Thirdly, we base all traversal on a fundamental combinator for folding over constructor applications. Using this model, we capture common strategic traversal schemes in a highly parameterised style. We study two original forms of parameterisation. Firstly, we design parameters for the specific control-flow, data-flow and traversal characteristics of more concrete traversal schemes. Secondly, we use overloading to postpone commitment to a specific type scheme of traversal. The resulting portfolio of traversal schemes can be regarded as a challenging benchmark for setups for typed generic programming. The way we develop the model and the suite of traversal schemes, it becomes clear that parameterised + typed strategic programming is best viewed as a potent combination of certain bits of parametric, intensional, polytypic, and ad-hoc polymorphism.
[ { "version": "v1", "created": "Mon, 8 Apr 2002 14:12:21 GMT" }, { "version": "v2", "created": "Fri, 1 Nov 2002 10:38:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Laemmel", "Ralf", "" ] ]
cs/0204014
Ram\'on Asensio Monge
R. Asensio Monge (U. of Oviedo), F. Sanchis Marco (U.P. of Madrid), F. Torre Cervigon (U. of Oviedo)
An Assessment of the Consistency for Software Measurement Methods
7 pages, 0 figures
null
null
null
cs.SE
null
Consistency, defined as the requirement that a series of measurements of the same project carried out by different raters using the same method should produce similar results, is one of the most important aspects to be taken into account in the measurement methods of the software. In spite of this, there is a widespread view that many measurement methods introduce an undesirable amount of subjectivity in the measurement process. This perception has made several organizations develop revisions of the standard methods whose main aim is to improve their consistency by introducing some suitable modifications of those aspects which are believed to introduce a greater degree of subjectivity.Each revision of a method must be empirically evaluated to determine to what extent is the aim of improving its consistency achieved. In this article we will define an homogeneous statistic intended to describe the consistency level of a method, and we will develop the statistical analysis which should be carried out in order to conclude whether or not a measurement method is more consistent than other one.
[ { "version": "v1", "created": "Tue, 9 Apr 2002 09:33:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Monge", "R. Asensio", "", "U. of Oviedo" ], [ "Marco", "F. Sanchis", "", "U.P. of Madrid" ], [ "Cervigon", "F. Torre", "", "U. of Oviedo" ] ]
cs/0204015
Laemmel
Ralf Laemmel and Joost Visser
Design Patterns for Functional Strategic Programming
null
null
null
null
cs.PL
null
In previous work, we introduced the fundamentals and a supporting combinator library for \emph{strategic programming}. This an idiom for generic programming based on the notion of a \emph{functional strategy}: a first-class generic function that cannot only be applied to terms of any type, but which also allows generic traversal into subterms and can be customized with type-specific behaviour. This paper seeks to provide practicing functional programmers with pragmatic guidance in crafting their own strategic programs. We present the fundamentals and the support from a user's perspective, and we initiate a catalogue of \emph{strategy design patterns}. These design patterns aim at consolidating strategic programming expertise in accessible form.
[ { "version": "v1", "created": "Tue, 9 Apr 2002 12:44:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Laemmel", "Ralf", "" ], [ "Visser", "Joost", "" ] ]
cs/0204016
Francesca Scozzari
R. Giacobazzi, F. Ranzato and F. Scozzari
Making Abstract Domains Condensing
20 pages
null
null
null
cs.PL cs.LO
null
In this paper we show that reversible analysis of logic languages by abstract interpretation can be performed without loss of precision by systematically refining abstract domains. The idea is to include semantic structures into abstract domains in such a way that the refined abstract domain becomes rich enough to allow approximate bottom-up and top-down semantics to agree. These domains are known as condensing abstract domains. Substantially, an abstract domain is condensing if goal-driven and goal-independent analyses agree, namely no loss of precision is introduced by approximating queries in a goal-independent analysis. We prove that condensation is an abstract domain property and that the problem of making an abstract domain condensing boils down to the problem of making the domain complete with respect to unification. In a general abstract interpretation setting we show that when concrete domains and operations give rise to quantales, i.e. models of propositional linear logic, objects in a complete refined abstract domain can be explicitly characterized by linear logic-based formulations. This is the case for abstract domains for logic program analysis approximating computed answer substitutions where unification plays the role of multiplicative conjunction in a quantale of idempotent substitutions. Condensing abstract domains can therefore be systematically derived by minimally extending any, generally non-condensing domain, by a simple domain refinement operator.
[ { "version": "v1", "created": "Tue, 9 Apr 2002 13:22:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Giacobazzi", "R.", "" ], [ "Ranzato", "F.", "" ], [ "Scozzari", "F.", "" ] ]
cs/0204017
Erik Demaine
Erik D. Demaine, Martin L. Demaine, Rudolf Fleischer
Solitaire Clobber
14 pages. v2 fixes small typo
null
null
HKUST-TCSC-2002-05
cs.DM cs.CG cs.GT
null
Clobber is a new two-player board game. In this paper, we introduce the one-player variant Solitaire Clobber where the goal is to remove as many stones as possible from the board by alternating white and black moves. We show that a checkerboard configuration on a single row (or single column) can be reduced to about n/4 stones. For boards with at least two rows and two columns, we show that a checkerboard configuration can be reduced to a single stone if and only if the number of stones is not a multiple of three, and otherwise it can be reduced to two stones. We also show that in general it is NP-complete to decide whether an arbitrary Clobber configuration can be reduced to a single stone.
[ { "version": "v1", "created": "Tue, 9 Apr 2002 15:57:59 GMT" }, { "version": "v2", "created": "Tue, 30 Jul 2002 21:03:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Fleischer", "Rudolf", "" ] ]
cs/0204019
Karhan Akcoglu
Karhan Akcoglu, Petros Drineas, Ming-Yang Kao
Fast Universalization of Investment Strategies with Provably Good Relative Returns
23 Pages
null
null
null
cs.CE cs.DS
null
A universalization of a parameterized investment strategy is an online algorithm whose average daily performance approaches that of the strategy operating with the optimal parameters determined offline in hindsight. We present a general framework for universalizing investment strategies and discuss conditions under which investment strategies are universalizable. We present examples of common investment strategies that fit into our framework. The examples include both trading strategies that decide positions in individual stocks, and portfolio strategies that allocate wealth among multiple stocks. This work extends Cover's universal portfolio work. We also discuss the runtime efficiency of universalization algorithms. While a straightforward implementation of our algorithms runs in time exponential in the number of parameters, we show that the efficient universal portfolio computation technique of Kalai and Vempala involving the sampling of log-concave functions can be generalized to other classes of investment strategies.
[ { "version": "v1", "created": "Wed, 10 Apr 2002 03:13:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Akcoglu", "Karhan", "" ], [ "Drineas", "Petros", "" ], [ "Kao", "Ming-Yang", "" ] ]
cs/0204020
Steven Bird
Steven Bird and Gary Simons
Seven Dimensions of Portability for Language Documentation and Description
8 pages
Proceedings of the Workshop on Portability Issues in Human Language Technologies, Third International Conference on Language Resources and Evaluation, Paris: European Language Resources Association, 2002
null
null
cs.CL cs.DL
null
The process of documenting and describing the world's languages is undergoing radical transformation with the rapid uptake of new digital technologies for capture, storage, annotation and dissemination. However, uncritical adoption of new tools and technologies is leading to resources that are difficult to reuse and which are less portable than the conventional printed resources they replace. We begin by reviewing current uses of software tools and digital technologies for language documentation and description. This sheds light on how digital language documentation and description are created and managed, leading to an analysis of seven portability problems under the following headings: content, format, discovery, access, citation, preservation and rights. After characterizing each problem we provide a series of value statements, and this provides the framework for a broad range of best practice recommendations.
[ { "version": "v1", "created": "Wed, 10 Apr 2002 13:52:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Bird", "Steven", "" ], [ "Simons", "Gary", "" ] ]
cs/0204021
Maximillian Dornseif
Maximillian Dornseif and Kay Schumann and Christian Klein
Factual and Legal Risks regarding wireless Computer Networks
null
DuD - Datenschutz und Datensicherheit, 4/2002, S. 226ff, Vieweg, ISSN 0724-4371
null
null
cs.CY cs.CR
null
The IEEE 802.11b wireless ethernet standart has several serious security flaws. This paper describes this flaws, surveys wireless networks in the Cologne/Bonn area to get an assessment of the security configurations of fielded networks and analizes the legal protections provided to wireless ethernet operators by german law. We conclude that wireless ethernets without additional security measures are not usable for any transmissions which are not meant for a public audience.
[ { "version": "v1", "created": "Wed, 10 Apr 2002 11:33:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Dornseif", "Maximillian", "" ], [ "Schumann", "Kay", "" ], [ "Klein", "Christian", "" ] ]
cs/0204022
Steven Bird
Christopher Cieri and Steven Bird
Annotation Graphs and Servers and Multi-Modal Resources: Infrastructure for Interdisciplinary Education, Research and Development
8 pages, 6 figures
Proceedings of ACL Workshop on Sharing Tools and Resources for Research and Education, Toulouse, July 2001, pp 23-30
null
null
cs.CL
null
Annotation graphs and annotation servers offer infrastructure to support the analysis of human language resources in the form of time-series data such as text, audio and video. This paper outlines areas of common need among empirical linguists and computational linguists. After reviewing examples of data and tools used or under development for each of several areas, it proposes a common framework for future tool development, data annotation and resource sharing based upon annotation graphs and servers.
[ { "version": "v1", "created": "Wed, 10 Apr 2002 15:37:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Cieri", "Christopher", "" ], [ "Bird", "Steven", "" ] ]
cs/0204024
Sandor P. Fekete
Alexander Barvinok, Sandor P. Fekete, David S. Johnson, Arie Tamir, Gerhard J. Woeginger, Russ Woodroofe
The Geometric Maximum Traveling Salesman Problem
24 pages, 6 figures; revised to appear in Journal of the ACM. (clarified some minor points, fixed typos)
Journal of the ACM, 50 (5) 2003, 641-664.
null
null
cs.DS cs.CC
null
We consider the traveling salesman problem when the cities are points in R^d for some fixed d and distances are computed according to geometric distances, determined by some norm. We show that for any polyhedral norm, the problem of finding a tour of maximum length can be solved in polynomial time. If arithmetic operations are assumed to take unit time, our algorithms run in time O(n^{f-2} log n), where f is the number of facets of the polyhedron determining the polyhedral norm. Thus for example we have O(n^2 log n) algorithms for the cases of points in the plane under the Rectilinear and Sup norms. This is in contrast to the fact that finding a minimum length tour in each case is NP-hard. Our approach can be extended to the more general case of quasi-norms with not necessarily symmetric unit ball, where we get a complexity of O(n^{2f-2} log n). For the special case of two-dimensional metrics with f=4 (which includes the Rectilinear and Sup norms), we present a simple algorithm with O(n) running time. The algorithm does not use any indirect addressing, so its running time remains valid even in comparison based models in which sorting requires Omega(n \log n) time. The basic mechanism of the algorithm provides some intuition on why polyhedral norms allow fast algorithms. Complementing the results on simplicity for polyhedral norms, we prove that for the case of Euclidean distances in R^d for d>2, the Maximum TSP is NP-hard. This sheds new light on the well-studied difficulties of Euclidean distances.
[ { "version": "v1", "created": "Wed, 10 Apr 2002 18:56:09 GMT" }, { "version": "v2", "created": "Thu, 29 May 2003 12:05:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Barvinok", "Alexander", "" ], [ "Fekete", "Sandor P.", "" ], [ "Johnson", "David S.", "" ], [ "Tamir", "Arie", "" ], [ "Woeginger", "Gerhard J.", "" ], [ "Woodroofe", "Russ", "" ] ]
cs/0204025
Steven Bird
Steven Bird
Phonology
27 pages
In Ruslan Mitkov (ed) (2002). Oxford Handbook of Computational Linguistics
null
null
cs.CL
null
Phonology is the systematic study of the sounds used in language, their internal structure, and their composition into syllables, words and phrases. Computational phonology is the application of formal and computational techniques to the representation and processing of phonological information. This chapter will present the fundamentals of descriptive phonology along with a brief overview of computational phonology.
[ { "version": "v1", "created": "Thu, 11 Apr 2002 11:22:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Bird", "Steven", "" ] ]
cs/0204026
Steven Bird
Steve Cassidy and Steven Bird
Querying Databases of Annotated Speech
9 pages, 4 figures
Database Technologies: Proceedings of the Eleventh Australasian Database Conference, pp. 12-20, IEEE Computer Society, 2000
null
null
cs.CL cs.DB
null
Annotated speech corpora are databases consisting of signal data along with time-aligned symbolic `transcriptions'. Such databases are typically multidimensional, heterogeneous and dynamic. These properties present a number of tough challenges for representation and query. The temporal nature of the data adds an additional layer of complexity. This paper presents and harmonises two independent efforts to model annotated speech databases, one at Macquarie University and one at the University of Pennsylvania. Various query languages are described, along with illustrative applications to a variety of analytical problems. The research reported here forms a part of several ongoing projects to develop platform-independent open-source tools for creating, browsing, searching, querying and transforming linguistic databases, and to disseminate large linguistic databases over the internet.
[ { "version": "v1", "created": "Thu, 11 Apr 2002 16:43:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Cassidy", "Steve", "" ], [ "Bird", "Steven", "" ] ]
cs/0204027
David Martinez
Eneko Agirre and David Martinez
Integrating selectional preferences in WordNet
9 pages
Proceedings of First International WordNet Conference. Mysore (India). 2002
null
null
cs.CL
null
Selectional preference learning methods have usually focused on word-to-class relations, e.g., a verb selects as its subject a given nominal class. This paper extends previous statistical models to class-to-class preferences, and presents a model that learns selectional preferences for classes of verbs, together with an algorithm to integrate the learned preferences in WordNet. The theoretical motivation is twofold: different senses of a verb may have different preferences, and classes of verbs may share preferences. On the practical side, class-to-class selectional preferences can be learned from untagged corpora (the same as word-to-class), they provide selectional preferences for less frequent word senses via inheritance, and more important, they allow for easy integration in WordNet. The model is trained on subject-verb and object-verb relationships extracted from a small corpus disambiguated with WordNet senses. Examples are provided illustrating that the theoretical motivations are well founded, and showing that the approach is feasible. Experimental results on a word sense disambiguation task are also provided.
[ { "version": "v1", "created": "Thu, 11 Apr 2002 16:41:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Agirre", "Eneko", "" ], [ "Martinez", "David", "" ] ]
cs/0204028
David Martinez
Eneko Agirre and David Martinez
Decision Lists for English and Basque
4 pages
Proceedings of the SENSEVAL-2 Workshop. In conjunction with ACL'2001/EACL'2001. Toulouse
null
null
cs.CL
null
In this paper we describe the systems we developed for the English (lexical and all-words) and Basque tasks. They were all supervised systems based on Yarowsky's Decision Lists. We used Semcor for training in the English all-words task. We defined different feature sets for each language. For Basque, in order to extract all the information from the text, we defined features that have not been used before in the literature, using a morphological analyzer. We also implemented systems that selected automatically good features and were able to obtain a prefixed precision (85%) at the cost of coverage. The systems that used all the features were identified as BCU-ehu-dlist-all and the systems that selected some features as BCU-ehu-dlist-best.
[ { "version": "v1", "created": "Fri, 12 Apr 2002 07:41:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Agirre", "Eneko", "" ], [ "Martinez", "David", "" ] ]
cs/0204029
David Martinez
Eneko Agirre, Elena Garcia, Mikel Lersundi, David Martinez and Eli Pociello
The Basque task: did systems perform in the upperbound?
4 pages
Proceedings of the SENSEVAL-2 Workshop. In conjunction with ACL'2001/EACL'2001. Toulouse
null
null
cs.CL
null
In this paper we describe the Senseval 2 Basque lexical-sample task. The task comprised 40 words (15 nouns, 15 verbs and 10 adjectives) selected from Euskal Hiztegia, the main Basque dictionary. Most examples were taken from the Egunkaria newspaper. The method used to hand-tag the examples produced low inter-tagger agreement (75%) before arbitration. The four competing systems attained results well above the most frequent baseline and the best system scored 75% precision at 100% coverage. The paper includes an analysis of the tagging procedure used, as well as the performance of the competing systems. In particular, we argue that inter-tagger agreement is not a real upperbound for the Basque WSD task.
[ { "version": "v1", "created": "Fri, 12 Apr 2002 07:49:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Agirre", "Eneko", "" ], [ "Garcia", "Elena", "" ], [ "Lersundi", "Mikel", "" ], [ "Martinez", "David", "" ], [ "Pociello", "Eli", "" ] ]
cs/0204031
Yi-Dong Shen
Yi-Dong Shen, Jia-Huai You, Li-Yan Yuan, Samuel S. P. Shen and Qiang Yang
A Dynamic Approach to Characterizing Termination of General Logic Programs
To appear in ACM TOCL
ACM Transactions on Computational Logic 4(4):417-430, 2003
null
null
cs.LO cs.PL
null
We present a new characterization of termination of general logic programs. Most existing termination analysis approaches rely on some static information about the structure of the source code of a logic program, such as modes/types, norms/level mappings, models/interargument relations, and the like. We propose a dynamic approach which employs some key dynamic features of an infinite (generalized) SLDNF-derivation, such as repetition of selected subgoals and recursive increase in term size. We also introduce a new formulation of SLDNF-trees, called generalized SLDNF-trees. Generalized SLDNF-trees deal with negative subgoals in the same way as Prolog and exist for any general logic programs.
[ { "version": "v1", "created": "Fri, 12 Apr 2002 18:01:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Yi-Dong", "" ], [ "You", "Jia-Huai", "" ], [ "Yuan", "Li-Yan", "" ], [ "Shen", "Samuel S. P.", "" ], [ "Yang", "Qiang", "" ] ]
cs/0204032
Daniel Lehmann
Michael Freund and Daniel Lehmann
Belief Revision and Rational Inference
25 pages
null
null
Leibniz Center for Research in Computer Science, Hebrew University: TR-94-16, July 1994
cs.AI
null
The (extended) AGM postulates for belief revision seem to deal with the revision of a given theory K by an arbitrary formula, but not to constrain the revisions of two different theories by the same formula. A new postulate is proposed and compared with other similar postulates that have been proposed in the literature. The AGM revisions that satisfy this new postulate stand in one-to-one correspondence with the rational, consistency-preserving relations. This correspondence is described explicitly. Two viewpoints on iterative revisions are distinguished and discussed.
[ { "version": "v1", "created": "Sun, 14 Apr 2002 09:22:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Freund", "Michael", "" ], [ "Lehmann", "Daniel", "" ] ]
cs/0204033
Krzysztof C. Kiwiel
Krzysztof C. Kiwiel
Randomized selection revisited
25 pages, LaTeX 2e
null
null
PMMO-02-01
cs.DS
null
We show that several versions of Floyd and Rivest's algorithm Select for finding the $k$th smallest of $n$ elements require at most $n+\min\{k,n-k\}+o(n)$ comparisons on average and with high probability. This rectifies the analysis of Floyd and Rivest, and extends it to the case of nondistinct elements. Our computational results confirm that Select may be the best algorithm in practice.
[ { "version": "v1", "created": "Mon, 15 Apr 2002 04:48:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiwiel", "Krzysztof C.", "" ] ]
cs/0204034
Joseph R. Kiniry
Joseph R. Kiniry
Monitoring and Debugging Concurrent and Distributed Object-Oriented Systems
12 pages, 3 figures, submitted to OOPSLA '02
null
null
null
cs.SE
null
A major part of debugging, testing, and analyzing a complex software system is understanding what is happening within the system at run-time. Some developers advocate running within a debugger to better understand the system at this level. Others embed logging statements, even in the form of hard-coded calls to print functions, throughout the code. These techniques are all general, rough forms of what we call system monitoring, and, while they have limited usefulness in simple, sequential systems, they are nearly useless in complex, concurrent ones. We propose a set of new mechanisms, collectively known as a monitoring system, for understanding such complex systems, and we describe an example implementation of such a system, called IDebug, for the Java programming language.
[ { "version": "v1", "created": "Mon, 15 Apr 2002 23:33:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiniry", "Joseph R.", "" ] ]
cs/0204035
Joseph R. Kiniry
Joseph R. Kiniry
Semantic Properties for Lightweight Specification in Knowledgeable Development Environments
10 pages, submitted to FSE-10
null
null
null
cs.SE
null
Semantic properties are domain-specific specification constructs used to augment an existing language with richer semantics. These properties are taken advantage of in system analysis, design, implementation, testing, and maintenance through the use of documentation and source-code transformation tools. Semantic properties are themselves specified at two levels: loosely with precise natural language, and formally within the problem domain. The refinement relationships between these specification levels, as well as between a semantic property's use and its realization in program code via tools, is specified with a new formal method for reuse called kind theory.
[ { "version": "v1", "created": "Mon, 15 Apr 2002 23:40:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiniry", "Joseph R.", "" ] ]
cs/0204036
Joseph R. Kiniry
Joseph R. Kiniry
Semantic Component Composition
9 pages, submitted to GCSE/SAIG '02
null
null
null
cs.SE
null
Building complex software systems necessitates the use of component-based architectures. In theory, of the set of components needed for a design, only some small portion of them are "custom"; the rest are reused or refactored existing pieces of software. Unfortunately, this is an idealized situation. Just because two components should work together does not mean that they will work together. The "glue" that holds components together is not just technology. The contracts that bind complex systems together implicitly define more than their explicit type. These "conceptual contracts" describe essential aspects of extra-system semantics: e.g., object models, type systems, data representation, interface action semantics, legal and contractual obligations, and more. Designers and developers spend inordinate amounts of time technologically duct-taping systems to fulfill these conceptual contracts because system-wide semantics have not been rigorously characterized or codified. This paper describes a formal characterization of the problem and discusses an initial implementation of the resulting theoretical system.
[ { "version": "v1", "created": "Mon, 15 Apr 2002 23:50:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiniry", "Joseph R.", "" ] ]
cs/0204037
Paul Vitanyi
Nikolai Vereshchagin (Moscow State University) and Paul Vitanyi (CWI and University of Amsterdam)
Kolmogorov's Structure Functions and Model Selection
25 pages LaTeX, 5 figures. In part in Proc 47th IEEE FOCS; this final version (more explanations, cosmetic modifications) to appear in IEEE Trans Inform Th
null
null
null
cs.CC math.PR physics.data-an
null
In 1974 Kolmogorov proposed a non-probabilistic approach to statistics and model selection. Let data be finite binary strings and models be finite sets of binary strings. Consider model classes consisting of models of given maximal (Kolmogorov) complexity. The ``structure function'' of the given data expresses the relation between the complexity level constraint on a model class and the least log-cardinality of a model in the class containing the data. We show that the structure function determines all stochastic properties of the data: for every constrained model class it determines the individual best-fitting model in the class irrespective of whether the ``true'' model is in the model class considered or not. In this setting, this happens {\em with certainty}, rather than with high probability as is in the classical case. We precisely quantify the goodness-of-fit of an individual model with respect to individual data. We show that--within the obvious constraints--every graph is realized by the structure function of some data. We determine the (un)computability properties of the various functions contemplated and of the ``algorithmic minimal sufficient statistic.''
[ { "version": "v1", "created": "Tue, 16 Apr 2002 15:58:58 GMT" }, { "version": "v2", "created": "Fri, 19 Apr 2002 14:53:43 GMT" }, { "version": "v3", "created": "Mon, 22 Apr 2002 14:57:26 GMT" }, { "version": "v4", "created": "Fri, 26 Apr 2002 15:53:10 GMT" }, { "version": "v5", "created": "Thu, 5 Aug 2004 14:00:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Vereshchagin", "Nikolai", "", "Moscow State University" ], [ "Vitanyi", "Paul", "", "CWI\n and University of Amsterdam" ] ]
cs/0204038
Jerzy Lewak
Jerzy Lewak
Technology For Information Engineering (TIE): A New Way of Storing, Retrieving and Analyzing Information
32 pages. Introduces the theoretical foundation for associative information
null
null
null
cs.DB cs.IR
null
The theoretical foundations of a new model and paradigm (called TIE) for data storage and access are introduced. Associations between data elements are stored in a single Matrix table, which is usually kept entirely in RAM for quick access. The model ties together a very intuitive "guided" GUI to the Matrix structure, allowing extremely easy complex searches through the data. Although it is an "Associative Model" in that it stores the data associations separately from the data itself, in contrast to other implementations of that model TIE guides the user to only the available information ensuring that every search is always fruitful. Very many diverse applications of the technology are reviewed.
[ { "version": "v1", "created": "Tue, 16 Apr 2002 16:03:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Lewak", "Jerzy", "" ] ]
cs/0204039
Rob van Glabbeek
B. Bloom (Cornell -> IBM), W.J. Fokkink (CWI) & R.J. van Glabbeek (Stanford)
Precongruence Formats for Decorated Trace Semantics
48 pages. More info at http://theory.stanford.edu/~rvg/abstracts.html#48
null
null
null
cs.LO
null
This paper explores the connection between semantic equivalences and preorders for concrete sequential processes, represented by means of labelled transition systems, and formats of transition system specifications using Plotkin's structural approach. For several preorders in the linear time - branching time spectrum a format is given, as general as possible, such that this preorder is a precongruence for all operators specifiable in that format. The formats are derived using the modal characterizations of the corresponding preorders.
[ { "version": "v1", "created": "Wed, 17 Apr 2002 00:35:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Bloom", "B.", "", "Cornell -> IBM" ], [ "Fokkink", "W. J.", "", "CWI" ], [ "van Glabbeek", "R. J.", "", "Stanford" ] ]
cs/0204040
Marcus Hutter
Marcus Hutter
Self-Optimizing and Pareto-Optimal Policies in General Environments based on Bayes-Mixtures
15 pages
Proceedings of the 15th Annual Conference on Computational Learning Theory (COLT-2002) 364-379
null
IDSIA-04-02
cs.AI cs.LG math.OC math.PR
null
The problem of making sequential decisions in unknown probabilistic environments is studied. In cycle $t$ action $y_t$ results in perception $x_t$ and reward $r_t$, where all quantities in general may depend on the complete history. The perception $x_t$ and reward $r_t$ are sampled from the (reactive) environmental probability distribution $\mu$. This very general setting includes, but is not limited to, (partial observable, k-th order) Markov decision processes. Sequential decision theory tells us how to act in order to maximize the total expected reward, called value, if $\mu$ is known. Reinforcement learning is usually used if $\mu$ is unknown. In the Bayesian approach one defines a mixture distribution $\xi$ as a weighted sum of distributions $\nu\in\M$, where $\M$ is any class of distributions including the true environment $\mu$. We show that the Bayes-optimal policy $p^\xi$ based on the mixture $\xi$ is self-optimizing in the sense that the average value converges asymptotically for all $\mu\in\M$ to the optimal value achieved by the (infeasible) Bayes-optimal policy $p^\mu$ which knows $\mu$ in advance. We show that the necessary condition that $\M$ admits self-optimizing policies at all, is also sufficient. No other structural assumptions are made on $\M$. As an example application, we discuss ergodic Markov decision processes, which allow for self-optimizing policies. Furthermore, we show that $p^\xi$ is Pareto-optimal in the sense that there is no other policy yielding higher or equal value in {\em all} environments $\nu\in\M$ and a strictly higher value in at least one.
[ { "version": "v1", "created": "Wed, 17 Apr 2002 10:46:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
cs/0204041
Walter Eaves
Walter Eaves
Trust Brokerage Systems for the Internet
Doctoral Thesis. 279 pages, 7 appendices, 18 tables, 44 figures
null
null
null
cs.CR cs.GT cs.NE
null
This thesis addresses the problem of providing trusted individuals with confidential information about other individuals, in particular, granting access to databases of personal records using the World-Wide Web. It proposes an access rights management system for distributed databases which aims to create and implement organisation structures based on the wishes of the owners and of demands of the users of the databases. The dissertation describes how current software components could be used to implement this system; it re-examines the theory of collective choice to develop mechanisms for generating hierarchies of authorities; it analyses organisational processes for stability and develops a means of measuring the similarity of their hierarchies.
[ { "version": "v1", "created": "Thu, 18 Apr 2002 23:10:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Eaves", "Walter", "" ] ]
cs/0204042
Jeff Erickson
Michael Soss, Jeff Erickson, and Mark Overmars
Preprocessing Chains for Fast Dihedral Rotations Is Hard or Even Impossible
11 pages, 9 figures, see also http://www.cs.uiuc.edu/~jeffe/pubs/dihedral.html
null
null
null
cs.CG
null
We examine a computational geometric problem concerning the structure of polymers. We model a polymer as a polygonal chain in three dimensions. Each edge splits the polymer into two subchains, and a dihedral rotation rotates one of these chains rigidly about this edge. The problem is to determine, given a chain, an edge, and an angle of rotation, if the motion can be performed without causing the chain to self-intersect. An Omega(n log n) lower bound on the time complexity of this problem is known. We prove that preprocessing a chain of n edges and answering n dihedral rotation queries is 3SUM-hard, giving strong evidence that solving n queries requires Omega(n^2) time in the worst case. For dynamic queries, which also modify the chain if the requested dihedral rotation is feasible, we show that answering n queries is by itself 3SUM-hard, suggesting that sublinear query time is impossible after any amount of preprocessing.
[ { "version": "v1", "created": "Fri, 19 Apr 2002 21:03:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Soss", "Michael", "" ], [ "Erickson", "Jeff", "" ], [ "Overmars", "Mark", "" ] ]
cs/0204043
Leonid Peshkin
Leonid Peshkin and Christian R. Shelton
Learning from Scarce Experience
8 pages 4 figures
null
null
null
cs.AI cs.LG cs.NE cs.RO
null
Searching the space of policies directly for the optimal policy has been one popular method for solving partially observable reinforcement learning problems. Typically, with each change of the target policy, its value is estimated from the results of following that very policy. This requires a large number of interactions with the environment as different polices are considered. We present a family of algorithms based on likelihood ratio estimation that use data gathered when executing one policy (or collection of policies) to estimate the value of a different policy. The algorithms combine estimation and optimization stages. The former utilizes experience to build a non-parametric representation of an optimized function. The latter performs optimization on this estimate. We show positive empirical results and provide the sample complexity bound.
[ { "version": "v1", "created": "Sat, 20 Apr 2002 05:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Peshkin", "Leonid", "" ], [ "Shelton", "Christian R.", "" ] ]
cs/0204044
Javier Nicolas Sanchez
Javier Nicolas Sanchez, Adam Milstein, Evan Williamson
Robust Global Localization Using Clustered Particle Filtering
6 pages. Proceedings of AAAI-2002 (in press)
null
null
null
cs.RO cs.AI
null
Global mobile robot localization is the problem of determining a robot's pose in an environment, using sensor data, when the starting position is unknown. A family of probabilistic algorithms known as Monte Carlo Localization (MCL) is currently among the most popular methods for solving this problem. MCL algorithms represent a robot's belief by a set of weighted samples, which approximate the posterior probability of where the robot is located by using a Bayesian formulation of the localization problem. This article presents an extension to the MCL algorithm, which addresses its problems when localizing in highly symmetrical environments; a situation where MCL is often unable to correctly track equally probable poses for the robot. The problem arises from the fact that sample sets in MCL often become impoverished, when samples are generated according to their posterior likelihood. Our approach incorporates the idea of clusters of samples and modifies the proposal distribution considering the probability mass of those clusters. Experimental results are presented that show that this new extension to the MCL algorithm successfully localizes in symmetric environments where ordinary MCL often fails.
[ { "version": "v1", "created": "Sun, 21 Apr 2002 01:21:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Sanchez", "Javier Nicolas", "" ], [ "Milstein", "Adam", "" ], [ "Williamson", "Evan", "" ] ]
cs/0204045
Aleksandar Ignjatovic
Aleksandar Ignjatovic and Arun Sharma
Some applications of logic to feasibility in higher types
null
null
null
null
cs.LO
null
In this paper we demonstrate that the class of basic feasible functionals has recursion theoretic properties which naturally generalize the corresponding properties of the class of feasible functions. We also improve the Kapron - Cook result on mashine representation of basic feasible functionals. Our proofs are based on essential applications of logic. We introduce a weak fragment of second order arithmetic with second order variables ranging over functions from N into N which suitably characterizes basic feasible functionals, and show that it is a useful tool for investigating the properties of basic feasible functionals. In particular, we provide an example how one can extract feasible "programs" from mathematical proofs which use non-feasible functionals (like second order polynomials).
[ { "version": "v1", "created": "Mon, 22 Apr 2002 06:58:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Ignjatovic", "Aleksandar", "" ], [ "Sharma", "Arun", "" ] ]
cs/0204046
Moni Naor
Ron Fagin, Amnon Lotem and Moni Naor
Optimal Aggregation Algorithms for Middleware
41 pages. Preliminary version appeared in ACM PODS 2001, pp. 102-113
null
null
null
cs.DB cs.DS
null
Let D be a database of N objects where each object has m fields. The objects are given in m sorted lists (where the ith list is sorted according to the ith field). Our goal is to find the top k objects according to a monotone aggregation function t, while minimizing access to the lists. The problem arises in several contexts. In particular Fagin (JCSS 1999) considered it for the purpose of aggregating information in a multimedia database system. We are interested in instance optimality, i.e. that our algorithm will be as good as any other (correct) algorithm on any instance. We provide and analyze several instance optimal algorithms for the task, with various access costs and models.
[ { "version": "v1", "created": "Mon, 22 Apr 2002 18:32:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Fagin", "Ron", "" ], [ "Lotem", "Amnon", "" ], [ "Naor", "Moni", "" ] ]
cs/0204047
Naren Ramakrishnan
Naren Ramakrishnan and Chris Bailey-Kellogg
Sampling Strategies for Mining in Data-Scarce Domains
null
null
null
null
cs.CE cs.AI
null
Data mining has traditionally focused on the task of drawing inferences from large datasets. However, many scientific and engineering domains, such as fluid dynamics and aircraft design, are characterized by scarce data, due to the expense and complexity of associated experiments and simulations. In such data-scarce domains, it is advantageous to focus the data collection effort on only those regions deemed most important to support a particular data mining objective. This paper describes a mechanism that interleaves bottom-up data mining, to uncover multi-level structures in spatial data, with top-down sampling, to clarify difficult decisions in the mining process. The mechanism exploits relevant physical properties, such as continuity, correspondence, and locality, in a unified framework. This leads to effective mining and sampling decisions that are explainable in terms of domain knowledge and data characteristics. This approach is demonstrated in two diverse applications -- mining pockets in spatial data, and qualitative determination of Jordan forms of matrices.
[ { "version": "v1", "created": "Mon, 22 Apr 2002 19:41:24 GMT" }, { "version": "v2", "created": "Mon, 22 Apr 2002 21:56:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramakrishnan", "Naren", "" ], [ "Bailey-Kellogg", "Chris", "" ] ]
cs/0204048
Rajkumar Buyya
Rajkumar Buyya
Economic-based Distributed Resource Management and Scheduling for Grid Computing
null
Monash University, Melbourne, Australia, April 2002
null
PhD Thesis, April 2002
cs.DC
null
Computational Grids, emerging as an infrastructure for next generation computing, enable the sharing, selection, and aggregation of geographically distributed resources for solving large-scale problems in science, engineering, and commerce. As the resources in the Grid are heterogeneous and geographically distributed with varying availability and a variety of usage and cost policies for diverse users at different times and, priorities as well as goals that vary with time. The management of resources and application scheduling in such a large and distributed environment is a complex task. This thesis proposes a distributed computational economy as an effective metaphor for the management of resources and application scheduling. It proposes an architectural framework that supports resource trading and quality of services based scheduling. It enables the regulation of supply and demand for resources and provides an incentive for resource owners for participating in the Grid and motives the users to trade-off between the deadline, budget, and the required level of quality of service. The thesis demonstrates the capability of economic-based systems for peer-to-peer distributed computing by developing users' quality-of-service requirements driven scheduling strategies and algorithms. It demonstrates their effectiveness by performing scheduling experiments on the World-Wide Grid for solving parameter sweep applications.
[ { "version": "v1", "created": "Mon, 22 Apr 2002 20:06:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Buyya", "Rajkumar", "" ] ]
cs/0204049
Erik Tjong Kim Sang
Erik F. Tjong Kim Sang
Memory-Based Shallow Parsing
null
Journal of Machine Learning Research, volume 2 (March), 2002, pp. 559-594
null
jmlr-2002-tks
cs.CL
null
We present memory-based learning approaches to shallow parsing and apply these to five tasks: base noun phrase identification, arbitrary base phrase recognition, clause detection, noun phrase parsing and full parsing. We use feature selection techniques and system combination methods for improving the performance of the memory-based learner. Our approach is evaluated on standard data sets and the results are compared with that of other systems. This reveals that our approach works well for base phrase identification while its application towards recognizing embedded structures leaves some room for improvement.
[ { "version": "v1", "created": "Wed, 24 Apr 2002 14:48:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Sang", "Erik F. Tjong Kim", "" ] ]
cs/0204050
Stephen G. Kobourov
Alon Efrat, Stephen G. Kobourov and Anna Lubiw
Computing Homotopic Shortest Paths Efficiently
12 pages, 11 figures
null
null
null
cs.CG
null
This paper addresses the problem of finding shortest paths homotopic to a given disjoint set of paths that wind amongst point obstacles in the plane. We present a faster algorithm than previously known.
[ { "version": "v1", "created": "Thu, 25 Apr 2002 20:41:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Efrat", "Alon", "" ], [ "Kobourov", "Stephen G.", "" ], [ "Lubiw", "Anna", "" ] ]
cs/0204051
Magnus Boman
Magnus Boman, Stefan Johansson, David Lyback
Parrondo Strategies for Artificial Traders
10 pages, 4 figures
Intelligent Agent Technology; Zhong, Liu, Ohsuga, Bradshaw (eds); 150-159; World Scientific, 2001
null
null
cs.CE
null
On markets with receding prices, artificial noise traders may consider alternatives to buy-and-hold. By simulating variations of the Parrondo strategy, using real data from the Swedish stock market, we produce first indications of a buy-low-sell-random Parrondo variation outperforming buy-and-hold. Subject to our assumptions, buy-low-sell-random also outperforms the traditional value and trend investor strategies. We measure the success of the Parrondo variations not only through their performance compared to other kinds of strategies, but also relative to varying levels of perfect information, received through messages within a multi-agent system of artificial traders.
[ { "version": "v1", "created": "Fri, 26 Apr 2002 12:20:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Boman", "Magnus", "" ], [ "Johansson", "Stefan", "" ], [ "Lyback", "David", "" ] ]
cs/0204052
Pawel
Pawel Wocjan, Dominik Janzing, and Thomas Beth (Universitaet Karlsruhe)
Required sample size for learning sparse Bayesian networks with many variables
9 pages
null
null
null
cs.LG math.PR
null
Learning joint probability distributions on n random variables requires exponential sample size in the generic case. Here we consider the case that a temporal (or causal) order of the variables is known and that the (unknown) graph of causal dependencies has bounded in-degree Delta. Then the joint measure is uniquely determined by the probabilities of all (2 Delta+1)-tuples. Upper bounds on the sample size required for estimating their probabilities can be given in terms of the VC-dimension of the set of corresponding cylinder sets. The sample size grows less than linearly with n.
[ { "version": "v1", "created": "Fri, 26 Apr 2002 14:33:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Wocjan", "Pawel", "", "Universitaet\n Karlsruhe" ], [ "Janzing", "Dominik", "", "Universitaet\n Karlsruhe" ], [ "Beth", "Thomas", "", "Universitaet\n Karlsruhe" ] ]
cs/0204053
Chris Bailey-Kellogg
Chris Bailey-Kellogg, Naren Ramakrishnan
Qualitative Analysis of Correspondence for Experimental Algorithmics
11 pages
null
null
null
cs.AI cs.CE
null
Correspondence identifies relationships among objects via similarities among their components; it is ubiquitous in the analysis of spatial datasets, including images, weather maps, and computational simulations. This paper develops a novel multi-level mechanism for qualitative analysis of correspondence. Operators leverage domain knowledge to establish correspondence, evaluate implications for model selection, and leverage identified weaknesses to focus additional data collection. The utility of the mechanism is demonstrated in two applications from experimental algorithmics -- matrix spectral portrait analysis and graphical assessment of Jordan forms of matrices. Results show that the mechanism efficiently samples computational experiments and successfully uncovers high-level problem properties. It overcomes noise and data sparsity by leveraging domain knowledge to detect mutually reinforcing interpretations of spatial data.
[ { "version": "v1", "created": "Fri, 26 Apr 2002 17:25:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Bailey-Kellogg", "Chris", "" ], [ "Ramakrishnan", "Naren", "" ] ]
cs/0204054
Filippo Menczer
Filippo Menczer
Navigating the Small World Web by Textual Cues
null
null
null
null
cs.IR cs.NI
null
Can a Web crawler efficiently locate an unknown relevant page? While this question is receiving much empirical attention due to its considerable commercial value in the search engine community [Cho98,Chakrabarti99,Menczer00,Menczer01], theoretical efforts to bound the performance of focused navigation have only exploited the link structure of the Web graph, neglecting other features [Kleinberg01,Adamic01,Kim02]. Here I investigate the connection between linkage and a content-induced topology of Web pages, suggesting that efficient paths can be discovered by decentralized navigation algorithms based on textual cues.
[ { "version": "v1", "created": "Fri, 26 Apr 2002 22:45:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Menczer", "Filippo", "" ] ]
cs/0204055
Qingguo Zheng
Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma
Intelligent Search of Correlated Alarms for GSM Networks with Model-based Constraints
8 pages, 7 figures
the 9th IEEE International Conference on Telecommunications,June,2002, Beijing,China
null
null
cs.NI cs.AI
null
In order to control the process of data mining and focus on the things of interest to us, many kinds of constraints have been added into the algorithms of data mining. However, discovering the correlated alarms in the alarm database needs deep domain constraints. Because the correlated alarms greatly depend on the logical and physical architecture of networks. Thus we use the network model as the constraints of algorithms, including Scope constraint, Inter-correlated constraint and Intra-correlated constraint, in our proposed algorithm called SMC (Search with Model-based Constraints). The experiments show that the SMC algorithm with Inter-correlated or Intra-correlated constraint is about two times faster than the algorithm with no constraints.
[ { "version": "v1", "created": "Mon, 29 Apr 2002 08:03:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Zheng", "Qingguo", "" ], [ "Xu", "Ke", "" ], [ "Lv", "Weifeng", "" ], [ "Ma", "Shilong", "" ] ]
cs/0204056
Magnus Boman
Magnus Boman, Markus Bylund, Fredrik Espinoza, Mats Danielson, David Lyback
Trading Agents for Roaming Users
5 pages, 1 figure
null
null
null
cs.CE
null
Some roaming users need services to manipulate autonomous processes. Trading agents running on agent trade servers are used as a case in point. We present a solution that provides the agent owners with means to upkeeping their desktop environment, and maintaining their agent trade server processes, via a briefcase service.
[ { "version": "v1", "created": "Mon, 29 Apr 2002 12:20:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Boman", "Magnus", "" ], [ "Bylund", "Markus", "" ], [ "Espinoza", "Fredrik", "" ], [ "Danielson", "Mats", "" ], [ "Lyback", "David", "" ] ]
cs/0205002
Joachim Rosenthal
Joachim Rosenthal
A Polynomial Description of the Rijndael Advanced Encryption Standard
12 pages, LaTeX
null
null
null
cs.CR math.AC math.RA
null
The paper gives a polynomial description of the Rijndael Advanced Encryption Standard recently adopted by the National Institute of Standards and Technology. Special attention is given to the structure of the S-Box.
[ { "version": "v1", "created": "Thu, 2 May 2002 23:18:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosenthal", "Joachim", "" ] ]
cs/0205003
Sam Buss
Samuel R. Buss and Alexander S. Kechris and Anand Pillay and Richard A. Shore
The prospects for mathematical logic in the twenty-first century
Association for Symbolic Logic
Bulletin of Symbolic Logic 7 (2001) 169-196
null
null
cs.LO
null
The four authors present their speculations about the future developments of mathematical logic in the twenty-first century. The areas of recursion theory, proof theory and logic for computer science, model theory, and set theory are discussed independently.
[ { "version": "v1", "created": "Fri, 3 May 2002 22:36:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Buss", "Samuel R.", "" ], [ "Kechris", "Alexander S.", "" ], [ "Pillay", "Anand", "" ], [ "Shore", "Richard A.", "" ] ]
cs/0205004
Naren Ramakrishnan
Srinidhi Varadarajan, Joy Mukherjee, Naren Ramakrishnan
Weaves: A Novel Direct Code Execution Interface for Parallel High Performance Scientific Codes
null
null
null
null
cs.DC cs.PF
null
Scientific codes are increasingly being used in compositional settings, especially problem solving environments (PSEs). Typical compositional modeling frameworks require significant buy-in, in the form of commitment to a particular style of programming (e.g., distributed object components). While this solution is feasible for newer generations of component-based scientific codes, large legacy code bases present a veritable software engineering nightmare. We introduce Weaves a novel framework that enables modeling, composition, direct code execution, performance characterization, adaptation, and control of unmodified high performance scientific codes. Weaves is an efficient generalized framework for parallel compositional modeling that is a proper superset of the threads and processes models of programming. In this paper, our focus is on the transparent code execution interface enabled by Weaves. We identify design constraints, their impact on implementation alternatives, configuration scenarios, and present results from a prototype implementation on Intel x86 architectures.
[ { "version": "v1", "created": "Sat, 4 May 2002 02:17:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Varadarajan", "Srinidhi", "" ], [ "Mukherjee", "Joy", "" ], [ "Ramakrishnan", "Naren", "" ] ]
cs/0205005
Erik Demaine
Robert A. Hearn and Erik D. Demaine
PSPACE-Completeness of Sliding-Block Puzzles and Other Problems through the Nondeterministic Constraint Logic Model of Computation
19 pages, 16 figures. Version 4 adds token formulation and minor corrections. To appear in Theoretical Computer Science
null
null
null
cs.CC cs.GT
null
We present a nondeterministic model of computation based on reversing edge directions in weighted directed graphs with minimum in-flow constraints on vertices. Deciding whether this simple graph model can be manipulated in order to reverse the direction of a particular edge is shown to be PSPACE-complete by a reduction from Quantified Boolean Formulas. We prove this result in a variety of special cases including planar graphs and highly restricted vertex configurations, some of which correspond to a kind of passive constraint logic. Our framework is inspired by (and indeed a generalization of) the ``Generalized Rush Hour Logic'' developed by Flake and Baum. We illustrate the importance of our model of computation by giving simple reductions to show that several motion-planning problems are PSPACE-hard. Our main result along these lines is that classic unrestricted sliding-block puzzles are PSPACE-hard, even if the pieces are restricted to be all dominoes (1x2 blocks) and the goal is simply to move a particular piece. No prior complexity results were known about these puzzles. This result can be seen as a strengthening of the existing result that the restricted Rush Hour puzzles are PSPACE-complete, of which we also give a simpler proof. Finally, we strengthen the existing result that the pushing-blocks puzzle Sokoban is PSPACE-complete, by showing that it is PSPACE-complete even if no barriers are allowed.
[ { "version": "v1", "created": "Sat, 4 May 2002 19:04:59 GMT" }, { "version": "v2", "created": "Sat, 1 Jun 2002 19:45:18 GMT" }, { "version": "v3", "created": "Sun, 31 Aug 2003 02:59:34 GMT" }, { "version": "v4", "created": "Thu, 11 Nov 2004 20:02:04 GMT" }, { "version": "v5", "created": "Thu, 11 Nov 2004 21:11:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Hearn", "Robert A.", "" ], [ "Demaine", "Erik D.", "" ] ]
cs/0205006
Marco Baroni
Marco Baroni, Johannes Matiasek and Harald Trost
Unsupervised discovery of morphologically related words based on orthographic and semantic similarity
10 pages, to appear in the Proceedings of the Morphology/Phonology Learning Workshop of ACL-02
null
null
null
cs.CL
null
We present an algorithm that takes an unannotated corpus as its input, and returns a ranked list of probable morphologically related pairs as its output. The algorithm tries to discover morphologically related pairs by looking for pairs that are both orthographically and semantically similar, where orthographic similarity is measured in terms of minimum edit distance, and semantic similarity is measured in terms of mutual information. The procedure does not rely on a morpheme concatenation model, nor on distributional properties of word substrings (such as affix frequency). Experiments with German and English input give encouraging results, both in terms of precision (proportion of good pairs found at various cutoff points of the ranked list), and in terms of a qualitative analysis of the types of morphological patterns discovered by the algorithm.
[ { "version": "v1", "created": "Wed, 8 May 2002 14:39:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Baroni", "Marco", "" ], [ "Matiasek", "Johannes", "" ], [ "Trost", "Harald", "" ] ]
cs/0205009
Lillian Lee
Rie Kubota Ando and Lillian Lee
Mostly-Unsupervised Statistical Segmentation of Japanese Kanji Sequences
22 pages. To appear in Natural Language Engineering
Natural Language Engineering 9 (2), pp. 127--149, 2003
10.1017/S1351324902002954
null
cs.CL
null
Given the lack of word delimiters in written Japanese, word segmentation is generally considered a crucial first step in processing Japanese texts. Typical Japanese segmentation algorithms rely either on a lexicon and syntactic analysis or on pre-segmented data; but these are labor-intensive, and the lexico-syntactic techniques are vulnerable to the unknown word problem. In contrast, we introduce a novel, more robust statistical method utilizing unsegmented training data. Despite its simplicity, the algorithm yields performance on long kanji sequences comparable to and sometimes surpassing that of state-of-the-art morphological analyzers over a variety of error metrics. The algorithm also outperforms another mostly-unsupervised statistical algorithm previously proposed for Chinese. Additionally, we present a two-level annotation scheme for Japanese to incorporate multiple segmentation granularities, and introduce two novel evaluation metrics, both based on the notion of a compatible bracket, that can account for multiple granularities simultaneously.
[ { "version": "v1", "created": "Fri, 10 May 2002 18:55:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ando", "Rie Kubota", "" ], [ "Lee", "Lillian", "" ] ]
cs/0205013
Miroslaw Truszczynski
Zbigniew Lonc and Miroslaw Truszczynski
Computing stable models: worst-case performance estimates
Paper published in the Proceedings of the International Conference on Logic Programming, ICLP-2002
null
null
null
cs.LO cs.AI
null
We study algorithms for computing stable models of propositional logic programs and derive estimates on their worst-case performance that are asymptotically better than the trivial bound of O(m 2^n), where m is the size of an input program and n is the number of its atoms. For instance, for programs, whose clauses consist of at most two literals (counting the head) we design an algorithm to compute stable models that works in time O(m\times 1.44225^n). We present similar results for several broader classes of programs, as well.
[ { "version": "v1", "created": "Sat, 11 May 2002 20:27:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Lonc", "Zbigniew", "" ], [ "Truszczynski", "Miroslaw", "" ] ]
cs/0205014
Miroslaw Truszczynski
Marc Denecker, Victor W. Marek and Miroslaw Truszczynski
Ultimate approximations in nonmonotonic knowledge representation systems
This paper was published in Principles of Knowledge Representation and Reasoning, Proceedings of the Eighth International Conference (KR2002)
null
null
null
cs.AI
null
We study fixpoints of operators on lattices. To this end we introduce the notion of an approximation of an operator. We order approximations by means of a precision ordering. We show that each lattice operator O has a unique most precise or ultimate approximation. We demonstrate that fixpoints of this ultimate approximation provide useful insights into fixpoints of the operator O. We apply our theory to logic programming and introduce the ultimate Kripke-Kleene, well-founded and stable semantics. We show that the ultimate Kripke-Kleene and well-founded semantics are more precise then their standard counterparts We argue that ultimate semantics for logic programming have attractive epistemological properties and that, while in general they are computationally more complex than the standard semantics, for many classes of theories, their complexity is no worse.
[ { "version": "v1", "created": "Sat, 11 May 2002 20:44:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Denecker", "Marc", "" ], [ "Marek", "Victor W.", "" ], [ "Truszczynski", "Miroslaw", "" ] ]
cs/0205015
Michael Farber
Michael Farber
Instabilities of Robot Motion
26 pages, 5 figures
null
null
null
cs.RO cs.CG math.AT
null
Instabilities of robot motion are caused by topological reasons. In this paper we find a relation between the topological properties of a configuration space (the structure of its cohomology algebra) and the character of instabilities, which are unavoidable in any motion planning algorithm. More specifically, let $X$ denote the space of all admissible configurations of a mechanical system. A {\it motion planner} is given by a splitting $X\times X = F_1\cup F_2\cup ... \cup F_k$ (where $F_1, ..., F_k$ are pairwise disjoint ENRs, see below) and by continuous maps $s_j: F_j \to PX,$ such that $E\circ s_j =1_{F_j}$. Here $PX$ denotes the space of all continuous paths in $X$ (admissible motions of the system) and $E: PX\to X\times X$ denotes the map which assigns to a path the pair of its initial -- end points. Any motion planner determines an algorithm of motion planning for the system. In this paper we apply methods of algebraic topology to study the minimal number of sets $F_j$ in any motion planner in $X$. We also introduce a new notion of {\it order of instability} of a motion planner; it describes the number of essentially distinct motions which may occur as a result of small perturbations of the input data. We find the minimal order of instability, which may have motion planners on a given configuration space $X$. We study a number of specific problems: motion of a rigid body in $\R^3$, a robot arm, motion in $\R^3$ in the presence of obstacles, and others.
[ { "version": "v1", "created": "Sun, 12 May 2002 11:23:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Farber", "Michael", "" ] ]
cs/0205016
Han Jing
Jing Han, Jiming Liu and Qingsheng Cai
From Alife Agents to a Kingdom of N Queens
13 pages, 9 figures, in 1999 international conference of Intelligent Agent Technology. Nominated for the best paper award
in Jiming Liu and Ning Zhong (Eds.), Intelligent Agent Technology: Systems, Methodologies, and Tools, page 110-120, The World Scientific Publishing Co. Pte, Ltd., Nov. 1999
null
null
cs.AI cs.DS cs.MA
null
This paper presents a new approach to solving N-queen problems, which involves a model of distributed autonomous agents with artificial life (ALife) and a method of representing N-queen constraints in an agent environment. The distributed agents locally interact with their living environment, i.e., a chessboard, and execute their reactive behaviors by applying their behavioral rules for randomized motion, least-conflict position searching, and cooperating with other agents etc. The agent-based N-queen problem solving system evolves through selection and contest according to the rule of Survival of the Fittest, in which some agents will die or be eaten if their moving strategies are less efficient than others. The experimental results have shown that this system is capable of solving large-scale N-queen problems. This paper also provides a model of ALife agents for solving general CSPs.
[ { "version": "v1", "created": "Mon, 13 May 2002 10:49:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Han", "Jing", "" ], [ "Liu", "Jiming", "" ], [ "Cai", "Qingsheng", "" ] ]
cs/0205017
Georgios Petasis
Georgios Petasis, Vangelis Karkaletsis, Georgios Paliouras, Ion Androutsopoulos, Constantine D. Spyropoulos
Ellogon: A New Text Engineering Platform
7 pages, 9 figures. Will be presented to the Third International Conference on Language Resources and Evaluation - LREC 2002
null
null
null
cs.CL
null
This paper presents Ellogon, a multi-lingual, cross-platform, general-purpose text engineering environment. Ellogon was designed in order to aid both researchers in natural language processing, as well as companies that produce language engineering systems for the end-user. Ellogon provides a powerful TIPSTER-based infrastructure for managing, storing and exchanging textual data, embedding and managing text processing components as well as visualising textual data and their associated linguistic information. Among its key features are full Unicode support, an extensive multi-lingual graphical user interface, its modular architecture and the reduced hardware requirements.
[ { "version": "v1", "created": "Mon, 13 May 2002 11:18:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Petasis", "Georgios", "" ], [ "Karkaletsis", "Vangelis", "" ], [ "Paliouras", "Georgios", "" ], [ "Androutsopoulos", "Ion", "" ], [ "Spyropoulos", "Constantine D.", "" ] ]
cs/0205019
Wen Chen
W. Chen
Distance function wavelets - Part I: Helmholtz and convection-diffusion transforms and series
Welcome any comments to [email protected]
null
null
null
cs.CE cs.NA
null
This report aims to present my research updates on distance function wavelets (DFW) based on the fundamental solutions and the general solutions of the Helmholtz, modified Helmholtz, and convection-diffusion equations, which include the isotropic Helmholtz-Fourier (HF) transform and series, the Helmholtz-Laplace (HL) transform, and the anisotropic convection-diffusion wavelets and ridgelets. The latter is set to handle discontinuous and track data problems. The edge effect of the HF series is addressed. Alternative existence conditions for the DFW transforms are proposed and discussed. To simplify and streamline the expression of the HF and HL transforms, a new dimension-dependent function notation is introduced. The HF series is also used to evaluate the analytical solutions of linear diffusion problems of arbitrary dimensionality and geometry. The weakness of this report is lacking of rigorous mathematical analysis due to the author's limited mathematical knowledge.
[ { "version": "v1", "created": "Tue, 14 May 2002 13:43:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0205020
Wen Chen
W. Chen
A quasi-RBF technique for numerical discretization of PDE's
Comments to [email protected]
null
null
null
cs.CE cs.CG
null
Atkinson developed a strategy which splits solution of a PDE system into homogeneous and particular solutions, where the former have to satisfy the boundary and governing equation, while the latter only need to satisfy the governing equation without concerning geometry. Since the particular solution can be solved irrespective of boundary shape, we can use a readily available fast Fourier or orthogonal polynomial technique O(NlogN) to evaluate it in a regular box or sphere surrounding physical domain. The distinction of this study is that we approximate homogeneous solution with nonsingular general solution RBF as in the boundary knot method. The collocation method using general solution RBF has very high accuracy and spectral convergent speed and is a simple, truly meshfree approach for any complicated geometry. More importantly, the use of nonsingular general solution avoids the controversial artificial boundary in the method of fundamental solution due to the singularity of fundamental solution.
[ { "version": "v1", "created": "Tue, 14 May 2002 13:58:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0205021
Oxana Smirnova
A.Waananen, M.Ellert, A.Konstantinov, B.Konya, O.Smirnova
An Overview of a Grid Architecture for Scientific Computing
null
null
null
null
cs.DC
null
This document gives an overview of a Grid testbed architecture proposal for the NorduGrid project. The aim of the project is to establish an inter-Nordic testbed facility for implementation of wide area computing and data handling. The architecture is supposed to define a Grid system suitable for solving data intensive problems at the Large Hadron Collider at CERN. We present the various architecture components needed for such a system. After that we go on to give a description of the dynamics by showing the task flow.
[ { "version": "v1", "created": "Tue, 14 May 2002 19:22:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Waananen", "A.", "" ], [ "Ellert", "M.", "" ], [ "Konstantinov", "A.", "" ], [ "Konya", "B.", "" ], [ "Smirnova", "O.", "" ] ]
cs/0205022
Naren Ramakrishnan
Naren Ramakrishnan
The Traits of the Personable
null
null
null
null
cs.AI cs.IR
null
Information personalization is fertile ground for application of AI techniques. In this article I relate personalization to the ability to capture partial information in an information-seeking interaction. The specific focus is on personalizing interactions at web sites. Using ideas from partial evaluation and explanation-based generalization, I present a modeling methodology for reasoning about personalization. This approach helps identify seven tiers of `personable traits' in web sites.
[ { "version": "v1", "created": "Tue, 14 May 2002 19:25:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramakrishnan", "Naren", "" ] ]
cs/0205023
Oxana Smirnova
M.Ellert, A.Konstantinov, B.Konya, O.Smirnova, A.Waananen
Performance evaluation of the GridFTP within the NorduGrid project
null
null
null
null
cs.DC
null
This report presents results of the tests measuring the performance of multi-threaded file transfers, using the GridFTP implementation of the Globus project over the NorduGrid network resources. Point to point WAN tests, carried out between the sites of Copenhagen, Lund, Oslo and Uppsala, are described. It was found that multiple threaded download via the high performance GridFTP protocol can significantly improve file transfer performance, and can serve as a reliable data
[ { "version": "v1", "created": "Tue, 14 May 2002 19:55:37 GMT" }, { "version": "v2", "created": "Tue, 14 May 2002 20:17:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Ellert", "M.", "" ], [ "Konstantinov", "A.", "" ], [ "Konya", "B.", "" ], [ "Smirnova", "O.", "" ], [ "Waananen", "A.", "" ] ]
cs/0205025
Menno van Zaanen
Menno M. van Zaanen
Bootstrapping Structure into Language: Alignment-Based Learning
148 pages
null
null
null
cs.LG cs.CL
null
This thesis introduces a new unsupervised learning framework, called Alignment-Based Learning, which is based on the alignment of sentences and Harris's (1951) notion of substitutability. Instances of the framework can be applied to an untagged, unstructured corpus of natural language sentences, resulting in a labelled, bracketed version of that corpus. Firstly, the framework aligns all sentences in the corpus in pairs, resulting in a partition of the sentences consisting of parts of the sentences that are equal in both sentences and parts that are unequal. Unequal parts of sentences can be seen as being substitutable for each other, since substituting one unequal part for the other results in another valid sentence. The unequal parts of the sentences are thus considered to be possible (possibly overlapping) constituents, called hypotheses. Secondly, the selection learning phase considers all hypotheses found by the alignment learning phase and selects the best of these. The hypotheses are selected based on the order in which they were found, or based on a probabilistic function. The framework can be extended with a grammar extraction phase. This extended framework is called parseABL. Instead of returning a structured version of the unstructured input corpus, like the ABL system, this system also returns a stochastic context-free or tree substitution grammar. Different instances of the framework have been tested on the English ATIS corpus, the Dutch OVIS corpus and the Wall Street Journal corpus. One of the interesting results, apart from the encouraging numerical results, is that all instances can (and do) learn recursive structures.
[ { "version": "v1", "created": "Thu, 16 May 2002 12:35:00 GMT" } ]
2007-05-23T00:00:00
[ [ "van Zaanen", "Menno M.", "" ] ]
cs/0205026
Chung-chieh Shan
Chung-chieh Shan (Harvard University)
Monads for natural language semantics
14 pages
Proceedings of the 2001 European Summer School in Logic, Language and Information student session, ed. Kristina Striegnitz, 285-298
null
null
cs.CL cs.PL
null
Accounts of semantic phenomena often involve extending types of meanings and revising composition rules at the same time. The concept of monads allows many such accounts -- for intensionality, variable binding, quantification and focus -- to be stated uniformly and compositionally.
[ { "version": "v1", "created": "Fri, 17 May 2002 08:24:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Shan", "Chung-chieh", "", "Harvard University" ] ]
cs/0205027
Chung-chieh Shan
Chung-chieh Shan (Harvard University)
A variable-free dynamic semantics
6 pages
Proceedings of the 13th Amsterdam Colloquium, ed. Robert van Rooy and Martin Stokhof, 204-209 (2001)
null
null
cs.CL
null
I propose a variable-free treatment of dynamic semantics. By "dynamic semantics" I mean analyses of donkey sentences ("Every farmer who owns a donkey beats it") and other binding and anaphora phenomena in natural language where meanings of constituents are updates to information states, for instance as proposed by Groenendijk and Stokhof. By "variable-free" I mean denotational semantics in which functional combinators replace variable indices and assignment functions, for instance as advocated by Jacobson. The new theory presented here achieves a compositional treatment of dynamic anaphora that does not involve assignment functions, and separates the combinatorics of variable-free semantics from the particular linguistic phenomena it treats. Integrating variable-free semantics and dynamic semantics gives rise to interactions that make new empirical predictions, for example "donkey weak crossover" effects.
[ { "version": "v1", "created": "Fri, 17 May 2002 09:33:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Shan", "Chung-chieh", "", "Harvard University" ] ]
cs/0205028
Steven Bird
Edward Loper and Steven Bird
NLTK: The Natural Language Toolkit
8 pages, 1 figure, Proceedings of the ACL Workshop on Effective Tools and Methodologies for Teaching Natural Language Processing and Computational Linguistics, Philadelphia, July 2002, Association for Computational Linguistics
null
null
null
cs.CL
null
NLTK, the Natural Language Toolkit, is a suite of open source program modules, tutorials and problem sets, providing ready-to-use computational linguistics courseware. NLTK covers symbolic and statistical natural language processing, and is interfaced to annotated corpora. Students augment and replace existing components, learn structured programming by example, and manipulate sophisticated models from the outset.
[ { "version": "v1", "created": "Fri, 17 May 2002 12:51:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Loper", "Edward", "" ], [ "Bird", "Steven", "" ] ]
cs/0205052
Laemmel
Vasu Alagar and Ralf Laemmel
Three-Tiered Specification of Micro-Architectures
null
null
null
null
cs.SE cs.PL
null
A three-tiered specification approach is developed to formally specify collections of collaborating objects, say micro-architectures. (i) The structural properties to be maintained in the collaboration are specified in the lowest tier. (ii) The behaviour of the object methods in the classes is specified in the middle tier. (iii) The interaction of the objects in the micro-architecture is specified in the third tier. The specification approach is based on Larch and accompanying notations and tools. The approach enables the unambiguous and complete specification of reusable collections of collaborating objects. The layered, formal approach is compared to other approaches including the mainstream UML approach.
[ { "version": "v1", "created": "Sun, 19 May 2002 14:46:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Alagar", "Vasu", "" ], [ "Laemmel", "Ralf", "" ] ]
cs/0205053
Paul M. Aoki
Paul M. Aoki, Rebecca E. Grinter, Amy Hurst, Margaret H. Szymanski, James D. Thornton, and Allison Woodruff
Sotto Voce: Exploring the Interplay of Conversation and Mobile Audio Spaces
8 pages
Proc. ACM SIGCHI Conference on Human Factors in Computing Systems, Minneapolis, MN, April 2002, 431-438. ACM Press.
10.1145/503376.503454
null
cs.HC cs.SD
null
In addition to providing information to individual visitors, electronic guidebooks have the potential to facilitate social interaction between visitors and their companions. However, many systems impede visitor interaction. By contrast, our electronic guidebook, Sotto Voce, has social interaction as a primary design goal. The system enables visitors to share audio information - specifically, they can hear each other's guidebook activity using a technologically mediated audio eavesdropping mechanism. We conducted a study of visitors using Sotto Voce while touring a historic house. The results indicate that visitors are able to use the system effectively, both as a conversational resource and as an information appliance. More surprisingly, our results suggest that the technologically mediated audio often cohered the visitors' conversation and activity to a far greater degree than audio delivered through the open air.
[ { "version": "v1", "created": "Tue, 21 May 2002 02:55:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Aoki", "Paul M.", "" ], [ "Grinter", "Rebecca E.", "" ], [ "Hurst", "Amy", "" ], [ "Szymanski", "Margaret H.", "" ], [ "Thornton", "James D.", "" ], [ "Woodruff", "Allison", "" ] ]
cs/0205054
Paul M. Aoki
Allison Woodruff, Paul M. Aoki, Rebecca E. Grinter, Amy Hurst, Margaret H. Szymanski, and James D. Thornton
Eavesdropping on Electronic Guidebooks: Observing Learning Resources in Shared Listening Environments
8 pages
In David Bearman and Jennifer Trant (eds.), Museums and the Web 2002: Selected Papers. (Proc. 6th International Conference on Museums and the Web, Boston, MA, April 2002.) Pittsburgh, PA: Archives & Museum Informatics, 2002, 21-30
null
null
cs.HC
null
We describe an electronic guidebook, Sotto Voce, that enables visitors to share audio information by eavesdropping on each other's guidebook activity. We have conducted three studies of visitors using electronic guidebooks in a historic house: one study with open air audio played through speakers and two studies with eavesdropped audio. An analysis of visitor interaction in these studies suggests that eavesdropped audio provides more social and interactive learning resources than open air audio played through speakers.
[ { "version": "v1", "created": "Tue, 21 May 2002 03:07:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Woodruff", "Allison", "" ], [ "Aoki", "Paul M.", "" ], [ "Grinter", "Rebecca E.", "" ], [ "Hurst", "Amy", "" ], [ "Szymanski", "Margaret H.", "" ], [ "Thornton", "James D.", "" ] ]
cs/0205055
Paul M. Aoki
Allison Woodruff, Margaret H. Szymanski, Rebecca E. Grinter, and Paul M. Aoki
Practical Strategies for Integrating a Conversation Analyst in an Iterative Design Process
11 pages
Proc. ACM Conf. on Designing Interactive Systems, London, UK, June 2002, 19-28. ACM Press.
10.1145/778712.778748
null
cs.HC
null
We present a case study of an iterative design process that includes a conversation analyst. We discuss potential benefits of conversation analysis for design, and we describe our strategies for integrating the conversation analyst in the design process. Since the analyst on our team had no previous exposure to design or engineering, and none of the other members of our team had any experience with conversation analysis, we needed to build a foundation for our interaction. One of our key strategies was to pair the conversation analyst with a designer in a highly interactive collaboration. Our tactics have been effective on our project, leading to valuable results that we believe we could not have obtained using another method. We hope that this paper can serve as a practical guide to those interested in establishing a productive and efficient working relationship between a conversation analyst and the other members of a design team.
[ { "version": "v1", "created": "Tue, 21 May 2002 03:16:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Woodruff", "Allison", "" ], [ "Szymanski", "Margaret H.", "" ], [ "Grinter", "Rebecca E.", "" ], [ "Aoki", "Paul M.", "" ] ]
cs/0205056
Jens Gramm
Michael R. Fellows, Jens Gramm and Rolf Niedermeier
Parameterized Intractability of Motif Search Problems
21 pages, 5 figures; an extended abstract of this paper was presented at the 19th International Symposium on Theoretical Aspects of Computer Science (STACS 2002), Springer-Verlag, LNCS 2285, pages 262--273, held in Juan-Les-Pins, France, March~14--16, 2002
null
null
WSI-2002-2
cs.CC
null
We show that Closest Substring, one of the most important problems in the field of biological sequence analysis, is W[1]-hard when parameterized by the number k of input strings (and remains so, even over a binary alphabet). This problem is therefore unlikely to be solvable in time O(f(k)\cdot n^{c}) for any function f of k and constant c independent of k. The problem can therefore be expected to be intractable, in any practical sense, for k>=3. Our result supports the intuition that Closest Substring is computationally much harder than the special case of Closest String, although both problems are NP-complete. We also prove W[1]-hardness for other parameterizations in the case of unbounded alphabet size. Our W[1]-hardness result for Closest Substring generalizes to Consensus Patterns, a problem of similar significance in computational biology.
[ { "version": "v1", "created": "Tue, 21 May 2002 10:23:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Fellows", "Michael R.", "" ], [ "Gramm", "Jens", "" ], [ "Niedermeier", "Rolf", "" ] ]
cs/0205057
Mathias Creutz
Mathias Creutz and Krista Lagus
Unsupervised Discovery of Morphemes
10 pages, to appear in Proceedings of Morphological and Phonological Learning Workshop of ACL'02
null
null
null
cs.CL
null
We present two methods for unsupervised segmentation of words into morpheme-like units. The model utilized is especially suited for languages with a rich morphology, such as Finnish. The first method is based on the Minimum Description Length (MDL) principle and works online. In the second method, Maximum Likelihood (ML) optimization is used. The quality of the segmentations is measured using an evaluation method that compares the segmentations produced to an existing morphological analysis. Experiments on both Finnish and English corpora show that the presented methods perform well compared to a current state-of-the-art system.
[ { "version": "v1", "created": "Tue, 21 May 2002 14:37:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Creutz", "Mathias", "" ], [ "Lagus", "Krista", "" ] ]
cs/0205058
Alexei Novikov
Alexei Novikov
Content Distribution in Unicast Replica Meshes
14 pages, 8 figures, submitted to ACM Transactions on Internet Technology
null
null
null
cs.NI
null
We propose centralized algorithm of data distribution in the unicast p2p network. Good example of such networks are meshes of WWW and FTP mirrors. Simulation of data propogation for different network topologies is performed and it is shown that proposed method performs up to 200% better then common apporaches
[ { "version": "v1", "created": "Tue, 21 May 2002 15:56:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Novikov", "Alexei", "" ] ]
cs/0205059
Saverio Perugini
Saverio Perugini, Marcos Andre Goncalves and Edward A. Fox
A Connection-Centric Survey of Recommender Systems Research
Based on the comments from reviewers, we have made modifications to our article, including the following: Shifted the focus of the survey completely to recommender system research rather than recommendation and personalization and subsequently changed the title to "A Connection-Centric Survey of Recommender Systems Research." Now only cite the most seminal works in this area and as a result have reduced the references significantly from over 200 to 120
null
null
null
cs.IR cs.HC
null
Recommender systems attempt to reduce information overload and retain customers by selecting a subset of items from a universal set based on user preferences. While research in recommender systems grew out of information retrieval and filtering, the topic has steadily advanced into a legitimate and challenging research area of its own. Recommender systems have traditionally been studied from a content-based filtering vs. collaborative design perspective. Recommendations, however, are not delivered within a vacuum, but rather cast within an informal community of users and social context. Therefore, ultimately all recommender systems make connections among people and thus should be surveyed from such a perspective. This viewpoint is under-emphasized in the recommender systems literature. We therefore take a connection-oriented viewpoint toward recommender systems research. We posit that recommendation has an inherently social element and is ultimately intended to connect people either directly as a result of explicit user modeling or indirectly through the discovery of relationships implicit in extant data. Thus, recommender systems are characterized by how they model users to bring people together: explicitly or implicitly. Finally, user modeling and the connection-centric viewpoint raise broadening and social issues--such as evaluation, targeting, and privacy and trust--which we also briefly address.
[ { "version": "v1", "created": "Wed, 22 May 2002 08:36:32 GMT" }, { "version": "v2", "created": "Wed, 30 Jul 2003 01:30:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Perugini", "Saverio", "" ], [ "Goncalves", "Marcos Andre", "" ], [ "Fox", "Edward A.", "" ] ]
cs/0205060
Christoph Koch
Christoph Koch
Optimizing Queries Using a Meta-level Database
26 pages, 5 figures
null
null
null
cs.DB
null
Graph simulation (using graph schemata or data guides) has been successfully proposed as a technique for adding structure to semistructured data. Design patterns for description (such as meta-classes and homomorphisms between schema layers), which are prominent in the object-oriented programming community, constitute a generalization of this graph simulation approach. In this paper, we show description applicable to a wide range of data models that have some notion of object (-identity), and propose to turn it into a data model primitive much like, say, inheritance. We argue that such an extension fills a practical need in contemporary data management. Then, we present algebraic techniques for query optimization (using the notions of described and description queries). Finally, in the semistructured setting, we discuss the pruning of regular path queries (with nested conditions) using description meta-data. In this context, our notion of meta-data extends graph schemata and data guides by meta-level values, allowing to boost query performance and to reduce the redundancy of data.
[ { "version": "v1", "created": "Thu, 23 May 2002 14:15:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Koch", "Christoph", "" ] ]
cs/0205061
Marek W. Gutowski
Marek W. Gutowski
Aging, double helix and small world property in genetic algorithms
Submitted to the workshop on evolutionary algorithms, Krakow (Cracow), Poland, Sept. 30, 2002, 6 pages, no figures, LaTeX 2.09 requires kaeog.sty (included)
null
null
null
cs.NE cs.DS physics.data-an
null
Over a quarter of century after the invention of genetic algorithms and miriads of their modifications, as well as successful implementations, we are still lacking many essential details of thorough analysis of it's inner working. One of such fundamental questions is: how many generations do we need to solve the optimization problem? This paper tries to answer this question, albeit in a fuzzy way, making use of the double helix concept. As a byproduct we gain better understanding of the ways, in which the genetic algorithm may be fine tuned.
[ { "version": "v1", "created": "Thu, 23 May 2002 15:34:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutowski", "Marek W.", "" ] ]
cs/0205063
Wen Chen
W. Chen
Distance function wavelets - Part II: Extended results and conjectures
Welcome any comments to [email protected]
null
null
null
cs.CE cs.CG
null
Report II is concerned with the extended results of distance function wavelets (DFW). The fractional DFW transforms are first addressed relating to the fractal geometry and fractional derivative, and then, the discrete Helmholtz-Fourier transform is briefly presented. The Green second identity may be an alternative devise in developing the theoretical framework of the DFW transform and series. The kernel solutions of the Winkler plate equation and the Burger's equation are used to create the DFW transforms and series. Most interestingly, it is found that the translation invariant monomial solutions of the high-order Laplace equations can be used to make very simple harmonic polynomial DFW series. In most cases of this study, solid mathematical analysis is missing and results are obtained intuitively in the conjecture status.
[ { "version": "v1", "created": "Fri, 24 May 2002 12:07:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0205065
Lillian Lee
Regina Barzilay and Lillian Lee
Bootstrapping Lexical Choice via Multiple-Sequence Alignment
8 pages; to appear in the proceedings of EMNLP-2002
null
null
null
cs.CL
null
An important component of any generation system is the mapping dictionary, a lexicon of elementary semantic expressions and corresponding natural language realizations. Typically, labor-intensive knowledge-based methods are used to construct the dictionary. We instead propose to acquire it automatically via a novel multiple-pass algorithm employing multiple-sequence alignment, a technique commonly used in bioinformatics. Crucially, our method leverages latent information contained in multi-parallel corpora -- datasets that supply several verbalizations of the corresponding semantics rather than just one. We used our techniques to generate natural language versions of computer-generated mathematical proofs, with good results on both a per-component and overall-output basis. For example, in evaluations involving a dozen human judges, our system produced output whose readability and faithfulness to the semantic input rivaled that of a traditional generation system.
[ { "version": "v1", "created": "Sat, 25 May 2002 21:32:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Barzilay", "Regina", "" ], [ "Lee", "Lillian", "" ] ]
cs/0205066
Benoit Hudson
Benoit Hudson, Tuomas Sandholm
Effectiveness of Preference Elicitation in Combinatorial Auctions
20 pages, 7 figures
null
null
CMU-CS-02-124
cs.GT cs.MA
null
Combinatorial auctions where agents can bid on bundles of items are desirable because they allow the agents to express complementarity and substitutability between the items. However, expressing one's preferences can require bidding on all bundles. Selective incremental preference elicitation by the auctioneer was recently proposed to address this problem (Conen & Sandholm 2001), but the idea was not evaluated. In this paper we show, experimentally and theoretically, that automated elicitation provides a drastic benefit. In all of the elicitation schemes under study, as the number of items for sale increases, the amount of information elicited is a vanishing fraction of the information collected in traditional ``direct revelation mechanisms'' where bidders reveal all their valuation information. Most of the elicitation schemes also maintain the benefit as the number of agents increases. We develop more effective elicitation policies for existing query types. We also present a new query type that takes the incremental nature of elicitation to a new level by allowing agents to give approximate answers that are refined only on an as-needed basis. In the process, we present methods for evaluating different types of elicitation policies.
[ { "version": "v1", "created": "Mon, 27 May 2002 01:56:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Hudson", "Benoit", "" ], [ "Sandholm", "Tuomas", "" ] ]
cs/0205067
Ted Pedersen
Ted Pedersen
Evaluating the Effectiveness of Ensembles of Decision Trees in Disambiguating Senseval Lexical Samples
Appears in the Proceedings of the ACL-02 Workshop on Word Sense Disambiguation: Recent Successes and Future Directions, July 11, 2002, Philadelphia, PA
null
null
null
cs.CL
null
This paper presents an evaluation of an ensemble--based system that participated in the English and Spanish lexical sample tasks of Senseval-2. The system combines decision trees of unigrams, bigrams, and co--occurrences into a single classifier. The analysis is extended to include the Senseval-1 data.
[ { "version": "v1", "created": "Mon, 27 May 2002 18:42:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Pedersen", "Ted", "" ] ]
cs/0205068
Ted Pedersen
Ted Pedersen
Assessing System Agreement and Instance Difficulty in the Lexical Sample Tasks of Senseval-2
Appears in the Proceedings of the ACL-02 Workshop on Word Sense Disambiguation: Recent Successes and Future Directions, July 11, 2002, Philadelphia, PA
null
null
null
cs.CL
null
This paper presents a comparative evaluation among the systems that participated in the Spanish and English lexical sample tasks of Senseval-2. The focus is on pairwise comparisons among systems to assess the degree to which they agree, and on measuring the difficulty of the test instances included in these tasks.
[ { "version": "v1", "created": "Mon, 27 May 2002 18:49:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Pedersen", "Ted", "" ] ]
cs/0205069
Ted Pedersen
Ted Pedersen
Machine Learning with Lexical Features: The Duluth Approach to Senseval-2
Appears in the Proceedings of SENSEVAL-2: Second International Workshop on Evaluating Word Sense Disambiguation Systems July 5-6, 2001, Toulouse, France
null
null
null
cs.CL
null
This paper describes the sixteen Duluth entries in the Senseval-2 comparative exercise among word sense disambiguation systems. There were eight pairs of Duluth systems entered in the Spanish and English lexical sample tasks. These are all based on standard machine learning algorithms that induce classifiers from sense-tagged training text where the context in which ambiguous words occur are represented by simple lexical features. These are highly portable, robust methods that can serve as a foundation for more tailored approaches.
[ { "version": "v1", "created": "Mon, 27 May 2002 18:57:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Pedersen", "Ted", "" ] ]
cs/0205070
Lillian Lee
Bo Pang, Lillian Lee and Shivakumar Vaithyanathan
Thumbs up? Sentiment Classification using Machine Learning Techniques
To appear in EMNLP-2002
null
null
null
cs.CL cs.LG
null
We consider the problem of classifying documents not by topic, but by overall sentiment, e.g., determining whether a review is positive or negative. Using movie reviews as data, we find that standard machine learning techniques definitively outperform human-produced baselines. However, the three machine learning methods we employed (Naive Bayes, maximum entropy classification, and support vector machines) do not perform as well on sentiment classification as on traditional topic-based categorization. We conclude by examining factors that make the sentiment classification problem more challenging.
[ { "version": "v1", "created": "Tue, 28 May 2002 02:01:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Pang", "Bo", "" ], [ "Lee", "Lillian", "" ], [ "Vaithyanathan", "Shivakumar", "" ] ]
cs/0205071
Xiaoming Liu
Xiaoming Liu, Tim Brody, Stevan Harnad, Les Carr, Kurt Maly, Mohammad Zubair, Michael L. Nelson
A Scalable Architecture for Harvest-Based Digital Libraries - The ODU/Southampton Experiments
20 pages, 6 figures
null
null
null
cs.DL cs.IR
null
This paper discusses the requirements of current and emerging applications based on the Open Archives Initiative (OAI) and emphasizes the need for a common infrastructure to support them. Inspired by HTTP proxy, cache, gateway and web service concepts, a design for a scalable and reliable infrastructure that aims at satisfying these requirements is presented. Moreover it is shown how various applications can exploit the services included in the proposed infrastructure. The paper concludes by discussing the current status of several prototype implementations.
[ { "version": "v1", "created": "Tue, 28 May 2002 15:32:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Liu", "Xiaoming", "" ], [ "Brody", "Tim", "" ], [ "Harnad", "Stevan", "" ], [ "Carr", "Les", "" ], [ "Maly", "Kurt", "" ], [ "Zubair", "Mohammad", "" ], [ "Nelson", "Michael L.", "" ] ]
cs/0205073
Vincent Conitzer
Vincent Conitzer, Tuomas Sandholm
Vote Elicitation: Complexity and Strategy-Proofness
null
Proceedings of the 18th National Conference on Artificial Intelligence (AAAI-02), Edmonton, Canada, 2002
null
null
cs.GT cs.CC cs.MA
null
Preference elicitation is a central problem in AI, and has received significant attention in single-agent settings. It is also a key problem in multiagent systems, but has received little attention here so far. In this setting, the agents may have different preferences that often must be aggregated using voting. This leads to interesting issues because what, if any, information should be elicited from an agent depends on what other agents have revealed about their preferences so far. In this paper we study effective elicitation, and its impediments, for the most common voting protocols. It turns out that in the Single Transferable Vote protocol, even knowing when to terminate elicitation is mathcal NP-complete, while this is easy for all the other protocols under study. Even for these protocols, determining how to elicit effectively is NP-complete, even with perfect suspicions about how the agents will vote. The exception is the Plurality protocol where such effective elicitation is easy. We also show that elicitation introduces additional opportunities for strategic manipulation by the voters. We demonstrate how to curtail the space of elicitation schemes so that no such additional strategic issues arise.
[ { "version": "v1", "created": "Wed, 29 May 2002 00:10:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Conitzer", "Vincent", "" ], [ "Sandholm", "Tuomas", "" ] ]
cs/0205074
Vincent Conitzer
Vincent Conitzer, Tuomas Sandholm
Complexity Results about Nash Equilibria
null
In Proceedings of the 18th International Joint Conference on Artificial Intelligence (IJCAI-03), Acapulco, Mexico, 2003
null
CMU-CS-02-135
cs.GT cs.CC cs.MA
null
Noncooperative game theory provides a normative framework for analyzing strategic interactions. However, for the toolbox to be operational, the solutions it defines will have to be computed. In this paper, we provide a single reduction that 1) demonstrates NP-hardness of determining whether Nash equilibria with certain natural properties exist, and 2) demonstrates the #P-hardness of counting Nash equilibria (or connected sets of Nash equilibria). We also show that 3) determining whether a pure-strategy Bayes-Nash equilibrium exists is NP-hard, and that 4) determining whether a pure-strategy Nash equilibrium exists in a stochastic (Markov) game is PSPACE-hard even if the game is invisible (this remains NP-hard if the game is finite). All of our hardness results hold even if there are only two players and the game is symmetric. Keywords: Nash equilibrium; game theory; computational complexity; noncooperative game theory; normal form game; stochastic game; Markov game; Bayes-Nash equilibrium; multiagent systems.
[ { "version": "v1", "created": "Tue, 28 May 2002 23:32:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Conitzer", "Vincent", "" ], [ "Sandholm", "Tuomas", "" ] ]
cs/0205075
Vincent Conitzer
Vincent Conitzer, Tuomas Sandholm
Complexity of Mechanism Design
null
Proceedings of the 18th Annual Conference on Uncertainty in Artificial Intelligence (UAI-02), Edmonton, Canada, 2002
null
null
cs.GT cs.CC cs.MA
null
The aggregation of conflicting preferences is a central problem in multiagent systems. The key difficulty is that the agents may report their preferences insincerely. Mechanism design is the art of designing the rules of the game so that the agents are motivated to report their preferences truthfully and a (socially) desirable outcome is chosen. We propose an approach where a mechanism is automatically created for the preference aggregation setting at hand. This has several advantages, but the downside is that the mechanism design optimization problem needs to be solved anew each time. Focusing on settings where side payments are not possible, we show that the mechanism design problem is NP-complete for deterministic mechanisms. This holds both for dominant-strategy implementation and for Bayes-Nash implementation. We then show that if we allow randomized mechanisms, the mechanism design problem becomes tractable. In other words, the coordinator can tackle the computational complexity introduced by its uncertainty about the agents' preferences by making the agents face additional uncertainty. This comes at no loss, and in some cases at a gain, in the (social) objective.
[ { "version": "v1", "created": "Tue, 28 May 2002 23:43:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Conitzer", "Vincent", "" ], [ "Sandholm", "Tuomas", "" ] ]