id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0205078 | Judith Beumer | Larry Wos | A Spectrum of Applications of Automated Reasoning | 13 pages | null | null | ANL/MCS-P923-0102 | cs.AI cs.LO | null | The likelihood of an automated reasoning program being of substantial
assistance for a wide spectrum of applications rests with the nature of the
options and parameters it offers on which to base needed strategies and
methodologies. This article focuses on such a spectrum, featuring W. McCune's
program OTTER, discussing widely varied successes in answering open questions,
and touching on some of the strategies and methodologies that played a key
role. The applications include finding a first proof, discovering single
axioms, locating improved axiom systems, and simplifying existing proofs. The
last application is directly pertinent to the recently found (by R. Thiele)
Hilbert's twenty-fourth problem--which is extremely amenable to attack with the
appropriate automated reasoning program--a problem concerned with proof
simplification. The methodologies include those for seeking shorter proofs and
for finding proofs that avoid unwanted lemmas or classes of term, a specific
option for seeking proofs with smaller equational or formula complexity, and a
different option to address the variable richness of a proof. The type of proof
one obtains with the use of OTTER is Hilbert-style axiomatic, including details
that permit one sometimes to gain new insights. We include questions still open
and challenges that merit consideration.
| [
{
"version": "v1",
"created": "Thu, 30 May 2002 21:20:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wos",
"Larry",
""
]
] |
cs/0205079 | Daniel Lehmann | Daniel Lehmann | Connectives in Quantum and other Cumulative Logics | 21 pages | null | null | TR-2002-28, Leibniz Center for Research in Computer Science, Hebrew
University, revised August 2002 | cs.AI math.LO | null | Cumulative logics are studied in an abstract setting, i.e., without
connectives, very much in the spirit of Makinson's early work. A powerful
representation theorem characterizes those logics by choice functions that
satisfy a weakening of Sen's property alpha, in the spirit of the author's
"Nonmonotonic Logics and Semantics" (JLC). The representation results obtained
are surprisingly smooth: in the completeness part the choice function may be
defined on any set of worlds, not only definable sets and no
definability-preservation property is required in the soundness part. For
abstract cumulative logics, proper conjunction and negation may be defined.
Contrary to the situation studied in "Nonmonotonic Logics and Semantics" no
proper disjunction seems to be definable in general. The cumulative relations
of KLM that satisfy some weakening of the consistency preservation property all
define cumulative logics with a proper negation. Quantum Logics, as defined by
Engesser and Gabbay are such cumulative logics but the negation defined by
orthogonal complement does not provide a proper negation.
| [
{
"version": "v1",
"created": "Fri, 31 May 2002 10:09:47 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Aug 2002 10:04:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] |
cs/0205080 | Matus Marko | M. Marko, M.A. Porter, A. Probst, C. Gershenson, A. Das | Transforming the World Wide Web into a Complexity-Based Semantic Network | 6 pages, a manuscript for the ICCS 2002 | null | null | null | cs.NI cs.IR | null | The aim of this paper is to introduce the idea of the Semantic Web to the
Complexity community and set a basic ground for a project resulting in creation
of Internet-based semantic network of Complexity-related information providers.
Implementation of the Semantic Web technology would be of mutual benefit to
both the participants and users and will confirm self-referencing power of the
community to apply the products of its own research to itself. We first explain
the logic of the transition and discuss important notions associated with the
Semantic Web technology. We then present a brief outline of the project
milestones.
| [
{
"version": "v1",
"created": "Fri, 31 May 2002 18:44:36 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Jun 2002 08:03:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marko",
"M.",
""
],
[
"Porter",
"M. A.",
""
],
[
"Probst",
"A.",
""
],
[
"Gershenson",
"C.",
""
],
[
"Das",
"A.",
""
]
] |
cs/0206001 | Carlos Gershenson | A. Das, M. Marko, A. Probst, M. A. Porter, C. Gershenson | Neural Net Model for Featured Word Extraction | null | null | null | null | cs.NE cs.NI | null | Search engines perform the task of retrieving information related to the
user-supplied query words. This task has two parts; one is finding "featured
words" which describe an article best and the other is finding a match among
these words to user-defined search terms. There are two main independent
approaches to achieve this task. The first one, using the concepts of
semantics, has been implemented partially. For more details see another paper
of Marko et al., 2002. The second approach is reported in this paper. It is a
theoretical model based on using Neural Network (NN). Instead of using keywords
or reading from the first few lines from papers/articles, the present model
gives emphasis on extracting "featured words" from an article. Obviously we
propose to exclude prepositions, articles and so on, that is, English words
like "of, the, are, so, therefore, " etc. from such a list. A neural model is
taken with its nodes pre-assigned energies. Whenever a match is found with
featured words and userdefined search words, the node is fired and jumps to a
higher energy. This firing continues until the model attains a steady energy
level and total energy is now calculated. Clearly, higher match will generate
higher energy; so on the basis of total energy, a ranking is done to the
article indicating degree of relevance to the user's interest. Another
important feature of the proposed model is incorporating a semantic module to
refine the search words; like finding association among search words, etc. In
this manner, information retrieval can be improved markedly.
| [
{
"version": "v1",
"created": "Sat, 1 Jun 2002 15:10:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Das",
"A.",
""
],
[
"Marko",
"M.",
""
],
[
"Probst",
"A.",
""
],
[
"Porter",
"M. A.",
""
],
[
"Gershenson",
"C.",
""
]
] |
cs/0206002 | Jeff Erickson | Jeff Erickson, Damrong Guoy, John M. Sullivan, and Alper \"Ung\"or | Building Space-Time Meshes over Arbitrary Spatial Domains | 12 pages, 14 figures; see also
http://www.cs.uiuc.edu/~jeffe/pubs/slowpitch.html | null | null | null | cs.CG | null | We present an algorithm to construct meshes suitable for space-time
discontinuous Galerkin finite-element methods. Our method generalizes and
improves the `Tent Pitcher' algorithm of \"Ung\"or and Sheffer. Given an
arbitrary simplicially meshed domain M of any dimension and a time interval
[0,T], our algorithm builds a simplicial mesh of the space-time domain Mx[0,T],
in constant time per element. Our algorithm avoids the limitations of previous
methods by carefully adapting the durations of space-time elements to the local
quality and feature size of the underlying space mesh.
| [
{
"version": "v1",
"created": "Sat, 1 Jun 2002 23:20:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erickson",
"Jeff",
""
],
[
"Guoy",
"Damrong",
""
],
[
"Sullivan",
"John M.",
""
],
[
"Üngör",
"Alper",
""
]
] |
cs/0206003 | Yan Zhang | Yan Zhang | Handling Defeasibilities in Action Domains | 49 pages, 1 figure, to be appeared in journal Theory and Practice
Logic Programming | null | null | null | cs.AI | null | Representing defeasibility is an important issue in common sense reasoning.
In reasoning about action and change, this issue becomes more difficult because
domain and action related defeasible information may conflict with general
inertia rules. Furthermore, different types of defeasible information may also
interfere with each other during the reasoning. In this paper, we develop a
prioritized logic programming approach to handle defeasibilities in reasoning
about action. In particular, we propose three action languages {\cal AT}^{0},
{\cal AT}^{1} and {\cal AT}^{2} which handle three types of defeasibilities in
action domains named defeasible constraints, defeasible observations and
actions with defeasible and abnormal effects respectively. Each language with a
higher superscript can be viewed as an extension of the language with a lower
superscript. These action languages inherit the simple syntax of {\cal A}
language but their semantics is developed in terms of transition systems where
transition functions are defined based on prioritized logic programs. By
illustrating various examples, we show that our approach eventually provides a
powerful mechanism to handle various defeasibilities in temporal prediction and
postdiction. We also investigate semantic properties of these three action
languages and characterize classes of action domains that present more
desirable solutions in reasoning about action within the underlying action
languages.
| [
{
"version": "v1",
"created": "Mon, 3 Jun 2002 06:20:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Yan",
""
]
] |
cs/0206004 | Bart Goethals | Toon Calders, Bart Goethals | Mining All Non-Derivable Frequent Itemsets | 3 figures | null | null | null | cs.DB cs.AI | null | Recent studies on frequent itemset mining algorithms resulted in significant
performance improvements. However, if the minimal support threshold is set too
low, or the data is highly correlated, the number of frequent itemsets itself
can be prohibitively large. To overcome this problem, recently several
proposals have been made to construct a concise representation of the frequent
itemsets, instead of mining all frequent itemsets. The main goal of this paper
is to identify redundancies in the set of all frequent itemsets and to exploit
these redundancies in order to reduce the result of a mining operation. We
present deduction rules to derive tight bounds on the support of candidate
itemsets. We show how the deduction rules allow for constructing a minimal
representation for all frequent itemsets. We also present connections between
our proposal and recent proposals for concise representations and we give the
results of experiments on real-life datasets that show the effectiveness of the
deduction rules. In fact, the experiments even show that in many cases, first
mining the concise representation, and then creating the frequent itemsets from
this representation outperforms existing frequent set mining algorithms.
| [
{
"version": "v1",
"created": "Mon, 3 Jun 2002 14:13:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Calders",
"Toon",
""
],
[
"Goethals",
"Bart",
""
]
] |
cs/0206005 | Alex Hendriks | Dick de Jongh, Lex Hendriks | Characterization of Strongly Equivalent Logic Programs in Intermediate
Logics | Under consideration for publication in Theory and Practice of Logic
Programming | null | null | null | cs.LO | null | The non-classical, nonmonotonic inference relation associated with the answer
set semantics for logic programs gives rise to a relationship of 'strong
equivalence' between logical programs that can be verified in 3-valued Goedel
logic, G3, the strongest non-classical intermediate propositional logic
(Lifschitz, Pearce and Valverde, 2001). In this paper we will show that KC (the
logic obtained by adding axiom ~A v ~~A to intuitionistic logic), is the
weakest intermediate logic for which strongly equivalent logic programs, in a
language allowing negations, are logically equivalent.
| [
{
"version": "v1",
"created": "Mon, 3 Jun 2002 14:48:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Jongh",
"Dick",
""
],
[
"Hendriks",
"Lex",
""
]
] |
cs/0206007 | Min-Yen Kan | Min-Yen Kan, Judith L. Klavans, Kathleen R. McKeown | Using the Annotated Bibliography as a Resource for Indicative
Summarization | 8 pages, 3 figures | Proceedings of LREC 2002, Las Palmas, Spain. pp. 1746-1752 | null | null | cs.CL cs.DL | null | We report on a language resource consisting of 2000 annotated bibliography
entries, which is being analyzed as part of our research on indicative document
summarization. We show how annotated bibliographies cover certain aspects of
summarization that have not been well-covered by other summary corpora, and
motivate why they constitute an important form to study for information
retrieval. We detail our methodology for collecting the corpus, and overview
our document feature markup that we introduced to facilitate summary analysis.
We present the characteristics of the corpus, methods of collection, and show
its use in finding the distribution of types of information included in
indicative summaries and their relative ordering within the summaries.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2002 14:48:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kan",
"Min-Yen",
""
],
[
"Klavans",
"Judith L.",
""
],
[
"McKeown",
"Kathleen R.",
""
]
] |
cs/0206008 | Petro M. Gopych | Petro M. Gopych | Computer modeling of feelings and emotions: a quantitative neural
network model of the feeling-of-knowing | A report presented at the IVth Kharkiv International Psychology
Conference dedicated to 70th anniversary of psychology studies at Kharkiv
University "Psychology in Contemporary World :Theory and Practice" held in
Kharkiv, Ukraine, April 18-19, 2002, 5 pages, 2 Figures | Kharkiv University Bulletin, Series Psychology, 2002, no.550(part
1), p.54-58 | null | null | cs.AI cs.NE q-bio.NC q-bio.QM | null | The first quantitative neural network model of feelings and emotions is
proposed on the base of available data on their neuroscience and evolutionary
biology nature, and on a neural network human memory model which admits
distinct description of conscious and unconscious mental processes in a time
dependent manner. As an example, proposed model is applied to quantitative
description of the feeling of knowing.
| [
{
"version": "v1",
"created": "Mon, 3 Jun 2002 22:31:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gopych",
"Petro M.",
""
]
] |
cs/0206010 | Leo Liberti | Leo Liberti | Performance Comparison of Function Evaluation Methods | Main conclusion of this paper is wrong due to a bug in the test code;
see "Important warning" at the beginning of the paper | null | null | null | cs.SC cs.NA | null | We perform a comparison of the performance and efficiency of four different
function evaluation methods: black-box functions, binary trees, $n$-ary trees
and string parsing. The test consists in evaluating 8 different functions of
two variables $x,y$ over 5000 floating point values of the pair $(x,y)$. The
outcome of the test indicates that the $n$-ary tree representation of algebraic
expressions is the fastest method, closely followed by black-box function
method, then by binary trees and lastly by string parsing.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2002 09:10:39 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Jul 2002 09:51:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liberti",
"Leo",
""
]
] |
cs/0206012 | James Aspnes | James Aspnes | Fast Deterministic Consensus in a Noisy Environment | Typographical errors fixed | null | null | null | cs.DS cs.DC | null | It is well known that the consensus problem cannot be solved
deterministically in an asynchronous environment, but that randomized solutions
are possible. We propose a new model, called noisy scheduling, in which an
adversarial schedule is perturbed randomly, and show that in this model
randomness in the environment can substitute for randomness in the algorithm.
In particular, we show that a simplified, deterministic version of Chandra's
wait-free shared-memory consensus algorithm (PODC, 1996, pp. 166-175) solves
consensus in time at most logarithmic in the number of active processes. The
proof of termination is based on showing that a race between independent
delayed renewal processes produces a winner quickly. In addition, we show that
the protocol finishes in constant time using quantum and priority-based
scheduling on a uniprocessor, suggesting that it is robust against the choice
of model over a wide range.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2002 18:50:04 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2002 20:06:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aspnes",
"James",
""
]
] |
cs/0206013 | Wen Chen | W. Chen | High-order fundamental and general solutions of convection-diffusion
equation and their applications with boundary particle method | To appear in Int. J. of Engng. Anal. Bound Elem very soon. The
present version has a little difference from the journal version. Welcome to
contact [email protected] | null | null | null | cs.CE cs.CG | null | In this study, we presented the high-order fundamental solutions and general
solutions of convection-diffusion equation. To demonstrate their efficacy, we
applied the high-order general solutions to the boundary particle method (BPM)
for the solution of some inhomogeneous convection-diffusion problems, where the
BPM is a new truly boundary-only meshfree collocation method based on multiple
reciprocity principle. For the sake of completeness, the BPM is also briefly
described here.
| [
{
"version": "v1",
"created": "Sat, 8 Jun 2002 10:46:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0206014 | Atsushi Fujii | Atsushi Fujii, Katunobu Itou and Tetsuya Ishikawa | A Method for Open-Vocabulary Speech-Driven Text Retrieval | Proceedings of the 2002 Conference on Empirical Methods in Natural
Language Processing (To appear) | Proceedings of the 2002 Conference on Empirical Methods in Natural
Language Processing (EMNLP-2002), pp.188-195, July. 2002 | null | null | cs.CL | null | While recent retrieval techniques do not limit the number of index terms,
out-of-vocabulary (OOV) words are crucial in speech recognition. Aiming at
retrieving information with spoken queries, we fill the gap between speech
recognition and text retrieval in terms of the vocabulary size. Given a spoken
query, we generate a transcription and detect OOV words through speech
recognition. We then correspond detected OOV words to terms indexed in a target
collection to complete the transcription, and search the collection for
documents relevant to the completed transcription. We show the effectiveness of
our method by way of experiments.
| [
{
"version": "v1",
"created": "Sun, 9 Jun 2002 10:07:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Itou",
"Katunobu",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/0206015 | Atsushi Fujii | Atsushi Fujii and Tetsuya Ishikawa | Japanese/English Cross-Language Information Retrieval: Exploration of
Query Translation and Transliteration | null | Computers and the Humanities, Vol.35, No.4, pp.389-420, 2001 | null | null | cs.CL | null | Cross-language information retrieval (CLIR), where queries and documents are
in different languages, has of late become one of the major topics within the
information retrieval community. This paper proposes a Japanese/English CLIR
system, where we combine a query translation and retrieval modules. We
currently target the retrieval of technical documents, and therefore the
performance of our system is highly dependent on the quality of the translation
of technical terms. However, the technical term translation is still
problematic in that technical terms are often compound words, and thus new
terms are progressively created by combining existing base words. In addition,
Japanese often represents loanwords based on its special phonogram.
Consequently, existing dictionaries find it difficult to achieve sufficient
coverage. To counter the first problem, we produce a Japanese/English
dictionary for base words, and translate compound words on a word-by-word
basis. We also use a probabilistic method to resolve translation ambiguity. For
the second problem, we use a transliteration method, which corresponds words
unlisted in the base word dictionary to their phonetic equivalents in the
target language. We evaluate our system using a test collection for CLIR, and
show that both the compound word translation and transliteration methods
improve the system performance.
| [
{
"version": "v1",
"created": "Sun, 9 Jun 2002 10:53:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/0206016 | Wen Chen | W. Chen | Distance function wavelets - Part III: "Exotic" transforms and series | Welcome comments to [email protected] | null | null | null | cs.CE cs.CG | null | Part III of the reports consists of various unconventional distance function
wavelets (DFW). The dimension and the order of partial differential equation
(PDE) are first used as a substitute of the scale parameter in the DFW
transforms and series, especially with the space and time-space potential
problems. It is noted that the recursive multiple reciprocity formulation is
the DFW series. The Green second identity is used to avoid the singularity of
the zero-order fundamental solution in creating the DFW series. The fundamental
solutions of various composite PDEs are found very flexible and efficient to
handle a borad range of problems. We also discuss the underlying connections
between the crucial concepts of dimension, scale and the order of PDE through
the analysis of dissipative acoustic wave propagation. The shape parameter of
the potential problems is also employed as the "scale parameter" to create the
non-orthogonal DFW. This paper also briefly discusses and conjectures the DFW
correspondences of a variety of coordinate variable transforms and series.
Practically important, the anisotropic and inhomogeneous DFW's are developed by
using the geodesic distance variable. The DFW and the related basis functions
are also used in making the kernel distance sigmoidal functions, which are
potentially useful in the artificial neural network and machine learning. As or
even worse than the preceding two reports, this study scarifies mathematical
rigor and in turn unfetter imagination. Most results are intuitively obtained
without rigorous analysis. Follow-up research is still under way. The paper is
intended to inspire more research into this promising area.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2002 09:01:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0206017 | Ke Xu | Shilong Ma, Yuefei Sui, Ke Xu | The Prioritized Inductive Logic Programs | 9 pages. Welcome any comments to [email protected] | null | null | null | cs.AI cs.LG | null | The limit behavior of inductive logic programs has not been explored, but
when considering incremental or online inductive learning algorithms which
usually run ongoingly, such behavior of the programs should be taken into
account. An example is given to show that some inductive learning algorithm may
not be correct in the long run if the limit behavior is not considered. An
inductive logic program is convergent if given an increasing sequence of
example sets, the program produces a corresponding sequence of the Horn logic
programs which has the set-theoretic limit, and is limit-correct if the limit
of the produced sequence of the Horn logic programs is correct with respect to
the limit of the sequence of the example sets. It is shown that the GOLEM
system is not limit-correct. Finally, a limit-correct inductive logic system,
called the prioritized GOLEM system, is proposed as a solution.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2002 16:02:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ma",
"Shilong",
""
],
[
"Sui",
"Yuefei",
""
],
[
"Xu",
"Ke",
""
]
] |
cs/0206018 | Cesim Erten | C. A. Duncan, A. Efrat, C. Erten, S. Kobourov, J.S.B. Mitchell | On Simultaneous Graph Embedding | 12 pages, 4 figures | null | null | null | cs.CG | null | We consider the problem of simultaneous embedding of planar graphs. There are
two variants of this problem, one in which the mapping between the vertices of
the two graphs is given and another where the mapping is not given. In
particular, we show that without mapping, any number of outerplanar graphs can
be embedded simultaneously on an $O(n)\times O(n)$ grid, and an outerplanar and
general planar graph can be embedded simultaneously on an $O(n^2)\times O(n^3)$
grid. If the mapping is given, we show how to embed two paths on an $n \times
n$ grid, a caterpillar and a path on an $n \times 2n$ grid, or two caterpillar
graphs on an $O(n^2)\times O(n^3)$ grid. We also show that 5 paths, or 3
caterpillars, or two general planar graphs cannot be simultaneously embedded
given the mapping.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2002 23:53:35 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Jul 2002 00:31:31 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Sep 2002 22:23:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Duncan",
"C. A.",
""
],
[
"Efrat",
"A.",
""
],
[
"Erten",
"C.",
""
],
[
"Kobourov",
"S.",
""
],
[
"Mitchell",
"J. S. B.",
""
]
] |
cs/0206019 | Cesim Erten | C. Erten and S. G. Kobourov | Simultaneous Embedding of a Planar Graph and Its Dual on the Grid | 14 pages, 8 figures | null | null | null | cs.CG | null | Traditional representations of graphs and their duals suggest the requirement
that the dual vertices be placed inside their corresponding primal faces, and
the edges of the dual graph cross only their corresponding primal edges. We
consider the problem of simultaneously embedding a planar graph and its dual
into a small integer grid such that the edges are drawn as straight-line
segments and the only crossings are between primal-dual pairs of edges. We
provide a linear-time algorithm that simultaneously embeds a 3-connected planar
graph and its dual on a (2n-2) by (2n-2) integer grid, where n is the total
number of vertices in the graph and its dual. Furthermore our embedding
algorithm satisfies the two natural requirements mentioned above.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2002 02:02:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erten",
"C.",
""
],
[
"Kobourov",
"S. G.",
""
]
] |
cs/0206020 | Vladimir Gudkov | Vladimir Gudkov and Joseph E. Johnson | Multidimensional Network Monitoring for Intrusion Detection | Talk at the International Conference on Complex Systems, June 9-14,
2002, Nashua, NH | null | null | null | cs.CR | null | An approach for real-time network monitoring in terms of numerical
time-dependant functions of protocol parameters is suggested. Applying complex
systems theory for information f{l}ow analysis of networks, the information
traffic is described as a trajectory in multi-dimensional parameter-time space
with about 10-12 dimensions. The network traffic description is synthesized by
applying methods of theoretical physics and complex systems theory, to provide
a robust approach for network monitoring that detects known intrusions, and
supports developing real systems for detection of unknown intrusions. The
methods of data analysis and pattern recognition presented are the basis of a
technology study for an automatic intrusion detection system that detects the
attack in the reconnaissance stage.
| [
{
"version": "v1",
"created": "Thu, 13 Jun 2002 18:20:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gudkov",
"Vladimir",
""
],
[
"Johnson",
"Joseph E.",
""
]
] |
cs/0206021 | Ram\'on Asensio Monge | R. Asensio Monge (U. of Oviedo), F. Sanchis Marco (U.P. of Madrid), F.
Torre Cervigon (U. of Oviedo) | The analysis of the IFPUG method sensitivity | 17 pages, 4 figures | null | null | null | cs.SE | null | J. Albrecht`s Function Point Analysis (FPA) is a method to determine the
functional size of software products. An organization called International
Function Point Users Group (IPFUG), considers the FPA as a standard in the
software functional size measurement. The Albrechts method is followed by IPFUG
method which includes some modifications in order to improve it. A limitation
of the method refers to the fact that FPA is not sensitive enough to
differentiate the functional size in small enhancements. That affects the
productivity analysis, where the software product functional size is required.
To provide more power to the functional size measurement, A. Abran, M. Maya and
H. Nguyeckim have proposed some modifications to improve it. The IPFUG v 4.1
method which includes these modifications is named IFPUG v 4.1 extended. In
this work we set the conditions to delimiting granular from non granular
functions and we calculate the static calibration and sensitivity graphs for
the measurements of a set of projects with a high percentage of granular
functions, all of then measured with the IFPUG v 4.1 method and the IFPUG v 4.1
extended. Finally, we introduce a statistic analysis in order to determine
whether significant differences exist between both methods or not.
| [
{
"version": "v1",
"created": "Fri, 14 Jun 2002 09:24:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Monge",
"R. Asensio",
"",
"U. of Oviedo"
],
[
"Marco",
"F. Sanchis",
"",
"U.P. of Madrid"
],
[
"Cervigon",
"F. Torre",
"",
"U. of Oviedo"
]
] |
cs/0206022 | Marcus Hutter | Marcus Hutter | The Fastest and Shortest Algorithm for All Well-Defined Problems | 12 pages, 1 figure | International Journal of Foundations of Computer Science, Vol.13,
No.3, June 2002, 431-443 | null | IDSIA-16-00 | cs.CC cs.LO | null | An algorithm $M$ is described that solves any well-defined problem $p$ as
quickly as the fastest algorithm computing a solution to $p$, save for a factor
of 5 and low-order additive terms. $M$ optimally distributes resources between
the execution of provably correct $p$-solving programs and an enumeration of
all proofs, including relevant proofs of program correctness and of time bounds
on program runtimes. $M$ avoids Blum's speed-up theorem by ignoring programs
without correctness proof. $M$ has broader applicability and can be faster than
Levin's universal search, the fastest method for inverting functions save for a
large multiplicative constant. An extension of Kolmogorov complexity and two
novel natural measures of function complexity are used to show that the most
efficient program computing some function $f$ is also among the shortest
programs provably computing $f$.
| [
{
"version": "v1",
"created": "Fri, 14 Jun 2002 11:04:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] |
cs/0206023 | Bart Goethals | Bart Goethals and Jan Van den Bussche | Relational Association Rules: getting WARMeR | null | null | null | null | cs.DB cs.AI | null | In recent years, the problem of association rule mining in transactional data
has been well studied. We propose to extend the discovery of classical
association rules to the discovery of association rules of conjunctive queries
in arbitrary relational data, inspired by the WARMR algorithm, developed by
Dehaspe and Toivonen, that discovers association rules over a limited set of
conjunctive queries. Conjunctive query evaluation in relational databases is
well understood, but still poses some great challenges when approached from a
discovery viewpoint in which patterns are generated and evaluated with respect
to some well defined search space and pruning operators.
| [
{
"version": "v1",
"created": "Sat, 15 Jun 2002 12:08:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goethals",
"Bart",
""
],
[
"Bussche",
"Jan Van den",
""
]
] |
cs/0206024 | Denis Popel | Denis V. Popel and Anita Dani | Sierpinski Gaskets for Logic Functions Representation | 7 pages, 8 figures, 3 tables, experiments | ISMVL 2002 Proceedinds | null | null | cs.LO cs.DM | null | This paper introduces a new approach to represent logic functions in the form
of Sierpinski Gaskets. The structure of the gasket allows to manipulate with
the corresponding logic expression using recursive essence of fractals. Thus,
the Sierpinski gasket's pattern has myriad useful properties which can enhance
practical features of other graphic representations like decision diagrams. We
have covered possible applications of Sierpinski gaskets in logic design and
justified our assumptions in logic function minimization (both Boolean and
multiple-valued cases). The experimental results on benchmarks with advances in
the novel structure are considered as well.
| [
{
"version": "v1",
"created": "Sat, 15 Jun 2002 15:44:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Popel",
"Denis V.",
""
],
[
"Dani",
"Anita",
""
]
] |
cs/0206026 | William Schuler | William Schuler | Interleaved semantic interpretation in environment-based parsing | null | Proceedings of the 19th International Conference on Computational
Linguistics (COLING 2002) | null | null | cs.CL cs.HC | null | This paper extends a polynomial-time parsing algorithm that resolves
structural ambiguity in input to a speech-based user interface by calculating
and comparing the denotations of rival constituents, given some model of the
interfaced application environment (Schuler 2001). The algorithm is extended to
incorporate a full set of logical operators, including quantifiers and
conjunctions, into this calculation without increasing the complexity of the
overall algorithm beyond polynomial time, both in terms of the length of the
input and the number of entities in the environment model.
| [
{
"version": "v1",
"created": "Tue, 18 Jun 2002 15:11:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schuler",
"William",
""
]
] |
cs/0206027 | Carlos Gershenson | Carlos Gershenson | Behaviour-based Knowledge Systems: An Epigenetic Path from Behaviour to
Knowledge | 7 pages, 3 figures. To be published in Proceedings of 2nd Workshop on
Epigenetic Robotics. Edinburgh, Aug. 10-11 2002 | null | null | null | cs.AI cs.AR cs.NE | null | In this paper we expose the theoretical background underlying our current
research. This consists in the development of behaviour-based knowledge
systems, for closing the gaps between behaviour-based and knowledge-based
systems, and also between the understandings of the phenomena they model. We
expose the requirements and stages for developing behaviour-based knowledge
systems and discuss their limits. We believe that these are necessary
conditions for the development of higher order cognitive capacities, in
artificial and natural cognitive systems.
| [
{
"version": "v1",
"created": "Tue, 18 Jun 2002 13:05:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gershenson",
"Carlos",
""
]
] |
cs/0206029 | Alice J. Lin | Alice J. Lin | Computer-Generated Photorealistic Hair | 7 pages, 7 figures | null | null | null | cs.GR | null | This paper presents an efficient method for generating and rendering
photorealistic hair in two dimensional pictures. The method consists of three
major steps. Simulating an artist drawing is used to design the rough hair
shape. A convolution based filter is then used to generate photorealistic hair
patches. A refine procedure is finally used to blend the boundaries of the
patches with surrounding areas. This method can be used to create all types of
photorealistic human hair (head hair, facial hair and body hair). It is also
suitable for fur and grass generation. Applications of this method include:
hairstyle designing/editing, damaged hair image restoration, human hair
animation, virtual makeover of a human, and landscape creation.
| [
{
"version": "v1",
"created": "Thu, 20 Jun 2002 06:21:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lin",
"Alice J.",
""
]
] |
cs/0206030 | Atsushi Fujii | Kazuhiro Seki, Atsushi Fujii, and Tetsuya Ishikawa | A Probabilistic Method for Analyzing Japanese Anaphora Integrating Zero
Pronoun Detection and Resolution | Proceedings of the 19th International Conference on Computational
Linguistics (To appear) | Proceedings of the 19th International Conference on Computational
Linguistics (COLING 2002), pp.911-917, Aug. 2002 | null | null | cs.CL | null | This paper proposes a method to analyze Japanese anaphora, in which zero
pronouns (omitted obligatory cases) are used to refer to preceding entities
(antecedents). Unlike the case of general coreference resolution, zero pronouns
have to be detected prior to resolution because they are not expressed in
discourse. Our method integrates two probability parameters to perform zero
pronoun detection and resolution in a single framework. The first parameter
quantifies the degree to which a given case is a zero pronoun. The second
parameter quantifies the degree to which a given entity is the antecedent for a
detected zero pronoun. To compute these parameters efficiently, we use corpora
with/without annotations of anaphoric relations. We show the effectiveness of
our method by way of experiments.
| [
{
"version": "v1",
"created": "Thu, 20 Jun 2002 07:13:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Seki",
"Kazuhiro",
""
],
[
"Fujii",
"Atsushi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/0206031 | S. Tarasov | S. Tarasov | A sufficient condition for global invertibility of Lipschitz mapping | LATeX2e, 3 pages, MSC-class: 26B10 | null | null | null | cs.NA | null | We show that S.Vavasis' sufficient condition for global invertibility of a
polynomial mapping can be easily generalized to the case of a general Lipschitz
mapping. Keywords: Invertibility conditions, generalized Jacobian, nonsmooth
analysis.
| [
{
"version": "v1",
"created": "Thu, 20 Jun 2002 18:44:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tarasov",
"S.",
""
]
] |
cs/0206032 | Parisse Bernard | Bernard Parisse | A correct proof of the heuristic GCD algorithm | null | null | null | null | cs.SC | null | In this note, we fill a gap in the proof of the heuristic GCD in the
multivariate case made by Char, Geddes and Gonnet (JSC 1989) and give some
additionnal information on this method.
| [
{
"version": "v1",
"created": "Fri, 21 Jun 2002 06:49:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Parisse",
"Bernard",
""
]
] |
cs/0206033 | David Eppstein | David Eppstein, Jean-Claude Falmagne | Algorithms for Media | 12 pages | null | null | null | cs.DS | null | Falmagne recently introduced the concept of a medium, a combinatorial object
encompassing hyperplane arrangements, topological orderings, acyclic
orientations, and many other familiar structures. We find efficient solutions
for several algorithmic problems on media: finding short reset sequences,
shortest paths, testing whether a medium has a closed orientation, and listing
the states of a medium given a black-box description.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2002 06:50:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Falmagne",
"Jean-Claude",
""
]
] |
cs/0206034 | Atsushi Fujii | Masatoshi Fukui, Shigeto Higuchi, Youichi Nakatani, Masao Tanaka,
Atsushi Fujii and Tetsuya Ishikawa | Applying a Hybrid Query Translation Method to Japanese/English
Cross-Language Patent Retrieval | null | ACM SIGIR 2000 Workshop on Patent Retrieval, July, 2000 | null | null | cs.CL | null | This paper applies an existing query translation method to cross-language
patent retrieval. In our method, multiple dictionaries are used to derive all
possible translations for an input query, and collocational statistics are used
to resolve translation ambiguity. We used Japanese/English parallel patent
abstracts to perform comparative experiments, where our method outperformed a
simple dictionary-based query translation method, and achieved 76% of
monolingual retrieval in terms of average precision.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2002 07:46:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fukui",
"Masatoshi",
""
],
[
"Higuchi",
"Shigeto",
""
],
[
"Nakatani",
"Youichi",
""
],
[
"Tanaka",
"Masao",
""
],
[
"Fujii",
"Atsushi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/0206035 | Atsushi Fujii | Shigeto Higuchi, Masatoshi Fukui, Atsushi Fujii and Tetsuya Ishikawa | PRIME: A System for Multi-lingual Patent Retrieval | null | Proceedings of MT Summit VIII, pp.163-167, Sep. 2001 | null | null | cs.CL | null | Given the growing number of patents filed in multiple countries, users are
interested in retrieving patents across languages. We propose a multi-lingual
patent retrieval system, which translates a user query into the target
language, searches a multilingual database for patents relevant to the query,
and improves the browsing efficiency by way of machine translation and
clustering. Our system also extracts new translations from patent families
consisting of comparable patents, to enhance the translation dictionary.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2002 08:00:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Higuchi",
"Shigeto",
""
],
[
"Fukui",
"Masatoshi",
""
],
[
"Fujii",
"Atsushi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/0206037 | Atsushi Fujii | Atsushi Fujii, Katunobu Itou and Tetsuya Ishikawa | Speech-Driven Text Retrieval: Using Target IR Collections for
Statistical Language Model Adaptation in Speech Recognition | null | Anni R. Coden and Eric W. Brown and Savitha Srinivasan (Eds.),
Information Retrieval Techniques for Speech Applications (LNCS 2273),
pp.94-104, Springer, 2002 | null | null | cs.CL | null | Speech recognition has of late become a practical technology for real world
applications. Aiming at speech-driven text retrieval, which facilitates
retrieving information with spoken queries, we propose a method to integrate
speech recognition and retrieval methods. Since users speak contents related to
a target collection, we adapt statistical language models used for speech
recognition based on the target collection, so as to improve both the
recognition and retrieval accuracy. Experiments using existing test collections
combined with dictated queries showed the effectiveness of our method.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2002 10:28:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Itou",
"Katunobu",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/0206038 | Judith Beumer | N. T. Karonis, B. de Supinski, I. Foster, W. Gropp, E. Lusk | A Multilevel Approach to Topology-Aware Collective Operations in
Computational Grids | 16 pages, 8 figures | null | null | Preprint ANL/MCS-P948-0402 | cs.DC | null | The efficient implementation of collective communiction operations has
received much attention. Initial efforts produced "optimal" trees based on
network communication models that assumed equal point-to-point latencies
between any two processes. This assumption is violated in most practical
settings, however, particularly in heterogeneous systems such as clusters of
SMPs and wide-area "computational Grids," with the result that collective
operations perform suboptimally. In response, more recent work has focused on
creating topology-aware trees for collective operations that minimize
communication across slower channels (e.g., a wide-area network). While these
efforts have significant communication benefits, they all limit their view of
the network to only two layers. We present a strategy based upon a multilayer
view of the network. By creating multilevel topology-aware trees we take
advantage of communication cost differences at every level in the network. We
used this strategy to implement topology-aware versions of several MPI
collective operations in MPICH-G2, the Globus Toolkit[tm]-enabled version of
the popular MPICH implementation of the MPI standard. Using information about
topology provided by MPICH-G2, we construct these multilevel topology-aware
trees automatically during execution. We present results demonstrating the
advantages of our multilevel approach by comparing it to the default
(topology-unaware) implementation provided by MPICH and a topology-aware
two-layer implementation.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2002 18:28:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karonis",
"N. T.",
""
],
[
"de Supinski",
"B.",
""
],
[
"Foster",
"I.",
""
],
[
"Gropp",
"W.",
""
],
[
"Lusk",
"E.",
""
]
] |
cs/0206040 | Judith Beumer | N. T. Karonis, B. Toonen, and I. Foster | MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface | 20 pages, 8 figures | null | null | Preprint ANL/MCS-P942-0402 | cs.DC | null | Application development for distributed computing "Grids" can benefit from
tools that variously hide or enable application-level management of critical
aspects of the heterogeneous environment. As part of an investigation of these
issues, we have developed MPICH-G2, a Grid-enabled implementation of the
Message Passing Interface (MPI) that allows a user to run MPI programs across
multiple computers, at the same or different sites, using the same commands
that would be used on a parallel computer. This library extends the Argonne
MPICH implementation of MPI to use services provided by the Globus Toolkit for
authentication, authorization, resource allocation, executable staging, and
I/O, as well as for process creation, monitoring, and control. Various
performance-critical operations, including startup and collective operations,
are configured to exploit network topology information. The library also
exploits MPI constructs for performance management; for example, the MPI
communicator construct is used for application-level discovery of, and
adaptation to, both network topology and network quality-of-service mechanisms.
We describe the MPICH-G2 design and implementation, present performance
results, and review application experiences, including record-setting
distributed simulations.
| [
{
"version": "v1",
"created": "Tue, 25 Jun 2002 19:55:45 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jun 2002 20:34:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karonis",
"N. T.",
""
],
[
"Toonen",
"B.",
""
],
[
"Foster",
"I.",
""
]
] |
cs/0206041 | Magnus Boman | Jarmo Laaksolahti, Magnus Boman | Anticipatory Guidance of Plot | 19 pages, 5 figures | null | null | null | cs.AI | null | An anticipatory system for guiding plot development in interactive narratives
is described. The executable model is a finite automaton that provides the
implemented system with a look-ahead. The identification of undesirable future
states in the model is used to guide the player, in a transparent manner. In
this way, too radical twists of the plot can be avoided. Since the player
participates in the development of the plot, such guidance can have many forms,
depending on the environment of the player, on the behavior of the other
players, and on the means of player interaction. We present a design method for
interactive narratives which produces designs suitable for the implementation
of anticipatory mechanisms. Use of the method is illustrated by application to
our interactive computer game Kaktus.
| [
{
"version": "v1",
"created": "Wed, 26 Jun 2002 09:17:13 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Feb 2003 10:58:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Laaksolahti",
"Jarmo",
""
],
[
"Boman",
"Magnus",
""
]
] |
cs/0207001 | Ronald M. Fussell | Ronald M. Fussell | National Infrastructure Contingencies: Survey of Wireless Technology
Support | 19 pages | null | null | null | cs.DC cs.CE | null | In modern society, the flow of information has become the lifeblood of
commerce and social interaction. This movement of data supports most aspects of
the United States economy in particular, as well as, serving as the vehicle
upon which governmental agencies react to social conditions. In addition, it is
understood that the continuance of efficient and reliable data communications
during times of national or regional disaster remains a priority in the United
States. The coordination of emergency response and area revitalization /
rehabilitation efforts between local, state, and federal emergency response is
increasingly necessary as agencies strive to work more seamlessly between the
affected organizations. Additionally, international support is often made
available to react to such adverse conditions as wildfire suppression scenarios
and therefore require the efficient management of workforce and associated
logistics support.
It is through the examination of the issues related to un-tethered data
transmission during infrastructure contingencies that responders may best
tailor a unified approach to the rapid recovery after disasters occur.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2002 18:09:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fussell",
"Ronald M.",
""
]
] |
cs/0207002 | John A. Goldsmith | Mikhail Belkin and John Goldsmith | Using eigenvectors of the bigram graph to infer morpheme identity | null | null | null | null | cs.CL | null | This paper describes the results of some experiments exploring statistical
methods to infer syntactic behavior of words and morphemes from a raw corpus in
an unsupervised fashion. It shares certain points in common with Brown et al
(1992) and work that has grown out of that: it employs statistical techniques
to analyze syntactic behavior based on what words occur adjacent to a given
word. However, we use an eigenvector decomposition of a nearest-neighbor graph
to produce a two-dimensional rendering of the words of a corpus in which words
of the same syntactic category tend to form neighborhoods. We exploit this
technique for extending the value of automatic learning of morphology. In
particular, we look at the suffixes derived from a corpus by unsupervised
learning of morphology, and we ask which of these suffixes have a consistent
syntactic function (e.g., in English, -tion is primarily a mark of nouns, but
-s marks both noun plurals and 3rd person present on verbs), and we determine
that this method works well for this task.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2002 01:15:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Belkin",
"Mikhail",
""
],
[
"Goldsmith",
"John",
""
]
] |
cs/0207003 | Yasuko Senda | Yasuko Senda, Yasusi Sinohara (Central Research Institute of Electric
Power Industry, Japan) | Analysis of Titles and Readers For Title Generation Centered on the
Readers | 7 pages with 3 figures, uses colacl.sty, acl.bst, colaclsub.sty,
narrowcaption.sty and narrowitem.sty | COLING'2002(The 19TH International Conference on Computational
Linguistics) | null | null | cs.CL | null | The title of a document has two roles, to give a compact summary and to lead
the reader to read the document. Conventional title generation focuses on
finding key expressions from the author's wording in the document to give a
compact summary and pays little attention to the reader's interest. To make the
title play its second role properly, it is indispensable to clarify the content
(``what to say'') and wording (``how to say'') of titles that are effective to
attract the target reader's interest. In this article, we first identify
typical content and wording of titles aimed at general readers in a comparative
study between titles of technical papers and headlines rewritten for
newspapers. Next, we describe the results of a questionnaire survey on the
effects of the content and wording of titles on the reader's interest. The
survey of general and knowledgeable readers shows both common and different
tendencies in interest.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2002 15:08:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Senda",
"Yasuko",
"",
"Central Research Institute of Electric\n Power Industry, Japan"
],
[
"Sinohara",
"Yasusi",
"",
"Central Research Institute of Electric\n Power Industry, Japan"
]
] |
cs/0207004 | Jeff Erickson | Jeff Erickson and Sariel Har-Peled | Optimally cutting a surface into a disk | 24 pages, 6 figures; full version of SOCG 2002 paper; see also
http://www.cs.uiuc.edu/~jeffe/pubs/schema.html | null | null | null | cs.CG cs.DS cs.GR | null | We consider the problem of cutting a set of edges on a polyhedral manifold
surface, possibly with boundary, to obtain a single topological disk,
minimizing either the total number of cut edges or their total length. We show
that this problem is NP-hard, even for manifolds without boundary and for
punctured spheres. We also describe an algorithm with running time n^{O(g+k)},
where n is the combinatorial complexity, g is the genus, and k is the number of
boundary components of the input surface. Finally, we describe a greedy
algorithm that outputs a O(log^2 g)-approximation of the minimum cut graph in
O(g^2 n log n) time.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2002 22:03:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erickson",
"Jeff",
""
],
[
"Har-Peled",
"Sariel",
""
]
] |
cs/0207005 | Melanie Siegel | Melanie Siegel and Emily M. Bender | Efficient Deep Processing of Japanese | Proceedings of the 19th International Conference on Computational
Linguistics | null | null | null | cs.CL | null | We present a broad coverage Japanese grammar written in the HPSG formalism
with MRS semantics. The grammar is created for use in real world applications,
such that robustness and performance issues play an important role. It is
connected to a POS tagging and word segmentation tool. This grammar is being
developed in a multilingual context, requiring MRS structures that are easily
comparable across languages.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2002 11:54:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siegel",
"Melanie",
""
],
[
"Bender",
"Emily M.",
""
]
] |
cs/0207006 | Wen Chen | W. Chen | Orthonormal RBF wavelet and ridgelet-like series and transforms for
high-dimensional problems | null | Int. J. Nonlinear Sci. & Numer. Simulation, 2(2), 155-160, 2001 | null | null | cs.SC | null | This paper developed a systematic strategy establishing RBF on the wavelet
analysis, which includes continuous and discrete RBF orthonormal wavelet
transforms respectively in terms of singular fundamental solutions and
nonsingular general solutions of differential operators. In particular, the
harmonic Bessel RBF transforms were presented for high-dimensional data
processing. It was also found that the kernel functions of convection-diffusion
operator are feasible to construct some stable ridgelet-like RBF transforms. We
presented time-space RBF transforms based on non-singular solution and
fundamental solution of time-dependent differential operators. The present
methodology was further extended to analysis of some known RBFs such as the MQ,
Gaussian and pre-wavelet kernel RBFs.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2002 15:34:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0207007 | Denis Popel | Denis V. Popel and Nawar Al-Hakeem | Evolutionary Circuit Design: Information Theory Perspective on Signal
Propagation | 5 pages, 3 figures, 2 tables, ISSPIT'2001 | ISSPIT'2001 | null | null | cs.OH | null | This paper presents case-study results on the application of information
theoretic approach to gate-level evolutionary circuit design. We introduce
information measures to provide better estimates of synthesis criteria of
digital circuits. For example, the analysis of signal propagation during
evolving gate-level synthesis can be improved by using information theoretic
measures that will make it possible to find the most effective geometry and
therefore predict the cost of the final design solution. The problem is
considered from the information engine point of view. That is, the process of
evolutionary gate-level circuit design is presented via such measures as
entropy, logical work and information vitality. Some examples of geometry
driven synthesis are provided to prove the above idea.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2002 16:59:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Popel",
"Denis V.",
""
],
[
"Al-Hakeem",
"Nawar",
""
]
] |
cs/0207008 | Wiebe van der Hoek | F.S. de Boer, K.V. Hindriks, W. van der Hoek and J.-J.Ch. Meyer | Agent Programming with Declarative Goals | null | null | null | null | cs.AI cs.PL | null | A long and lasting problem in agent research has been to close the gap
between agent logics and agent programming frameworks. The main reason for this
problem of establishing a link between agent logics and agent programming
frameworks is identified and explained by the fact that agent programming
frameworks have not incorporated the concept of a `declarative goal'. Instead,
such frameworks have focused mainly on plans or `goals-to-do' instead of the
end goals to be realised which are also called `goals-to-be'. In this paper, a
new programming language called GOAL is introduced which incorporates such
declarative goals. The notion of a `commitment strategy' - one of the main
theoretical insights due to agent logics, which explains the relation between
beliefs and goals - is used to construct a computational semantics for GOAL.
Finally, a proof theory for proving properties of GOAL agents is introduced.
Thus, we offer a complete theory of agent programming in the sense that our
theory provides both for a programming framework and a programming logic for
such agents. An example program is proven correct by using this programming
logic.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2002 15:42:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Boer",
"F. S.",
""
],
[
"Hindriks",
"K. V.",
""
],
[
"van der Hoek",
"W.",
""
],
[
"Meyer",
"J. -J. Ch.",
""
]
] |
cs/0207009 | Vince Grolmusz | Vince Grolmusz | Computing Elementary Symmetric Polynomials with a Sublinear Number of
Multiplications | 10 pages | null | null | null | cs.CC cs.DM cs.DS | null | Elementary symmetric polynomials $S_n^k$ are used as a benchmark for the
bounded-depth arithmetic circuit model of computation. In this work we prove
that $S_n^k$ modulo composite numbers $m=p_1p_2$ can be computed with much
fewer multiplications than over any field, if the coefficients of monomials
$x_{i_1}x_{i_2}... x_{i_k}$ are allowed to be 1 either mod $p_1$ or mod $p_2$
but not necessarily both. More exactly, we prove that for any constant $k$ such
a representation of $S_n^k$ can be computed modulo $p_1p_2$ using only
$\exp(O(\sqrt{\log n}\log\log n))$ multiplications on the most restricted
depth-3 arithmetic circuits, for $\min({p_1,p_2})>k!$. Moreover, the number of
multiplications remain sublinear while $k=O(\log\log n).$ In contrast, the
well-known Graham-Pollack bound yields an $n-1$ lower bound for the number of
multiplications even for the exact computation (not the representation) of
$S_n^2$. Our results generalize for other non-prime power composite moduli as
well. The proof uses the famous BBR-polynomial of Barrington, Beigel and
Rudich.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2002 14:32:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grolmusz",
"Vince",
""
]
] |
cs/0207010 | Wen Chen | W. Chen | Symmetric boundary knot method | null | Engng. Anal. Bound. Elem., 26(6), 489-494, 2002 | null | null | cs.CE cs.CG | null | The boundary knot method (BKM) is a recent boundary-type radial basis
function (RBF) collocation scheme for general PDEs. Like the method of
fundamental solution (MFS), the RBF is employed to approximate the
inhomogeneous terms via the dual reciprocity principle. Unlike the MFS, the
method uses a nonsingular general solution instead of a singular fundamental
solution to evaluate the homogeneous solution so as to circumvent the
controversial artificial boundary outside the physical domain. The BKM is
meshfree, superconvergent, integration free, very easy to learn and program.
The original BKM, however, loses symmetricity in the presense of mixed
boundary. In this study, by analogy with Hermite RBF interpolation, we
developed a symmetric BKM scheme. The accuracy and efficiency of the symmetric
BKM are also numerically validated in some 2D and 3D Helmholtz and diffusion
reaction problems under complicated geometries.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2002 20:17:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0207011 | Denis Popel | Denis V. Popel and Nawar Al-Hakeem | Improving Web Database Access Using Decision Diagrams | 7 pages, 7 figures, 3 tables, AICCSA'01 | null | null | null | cs.LO cs.DB | null | In some areas of management and commerce, especially in Electronic commerce
(E-commerce), that are accelerated by advances in Web technologies, it is
essential to support the decision making process using formal methods. Among
the problems of E-commerce applications: reducing the time of data access so
that huge databases can be searched quickly; decreasing the cost of database
design ... etc. We present the application of Decision Diagrams design using
Information Theory approach to improve database access speeds. We show that
such utilization provides systematic and visual ways of applying Decision
Making methods to simplify complex Web engineering problems.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2002 04:09:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Popel",
"Denis V.",
""
],
[
"Al-Hakeem",
"Nawar",
""
]
] |
cs/0207012 | Denis Popel | Denis V. Popel | Synthesis of Low-Power Digital Circuits Derived from Binary Decision
Diagrams | 4 pages, 3 figures, 1 table, ECCTD'01 | ECCTD 2001 | null | null | cs.AR | null | This paper introduces a novel method for synthesizing digital circuits
derived from Binary Decision Diagrams (BDDs) that can yield to reduction in
power dissipation. The power reduction is achieved by decreasing the switching
activity in a circuit while paying close attention to information measures as
an optimization criterion. We first present the technique of efficient
BDD-based computation of information measures which are used to guide the power
optimization procedures. Using this technique, we have developed an algorithm
of BDD reordering which leads to reducing the power consumption of the circuits
derived from BDDs. Results produced by the synthesis on the ISCAS benchmark
circuits are very encouraging.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2002 04:30:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Popel",
"Denis V.",
""
]
] |
cs/0207013 | Denis Popel | Denis V. Popel | A Compact Graph Model of Handwritten Images: Integration into
Authentification and Recognition | 9 pages, 6 figures, 1 tables, SSPR'02 | SSPR 2002 | null | null | cs.HC cs.DS | null | A novel algorithm for creating a mathematical model of curved shapes is
introduced. The core of the algorithm is based on building a graph
representation of the contoured image, which occupies less storage space than
produced by raster compression techniques. Different advanced applications of
the mathematical model are discussed: recognition of handwritten characters and
verification of handwritten text and signatures for authentification purposes.
Reducing the storage requirements due to the efficient mathematical model
results in faster retrieval and processing times. The experimental outcomes in
compression of contoured images and recognition of handwritten numerals are
given.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2002 16:02:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Popel",
"Denis V.",
""
]
] |
cs/0207014 | Denis Popel | Denis V. Popel and Nawar Al-Hakeem | On the Information Engine of Circuit Design | 4 pages, 1 figure, 2 tables, MWSCAS'02 | MWSCAS 2002 | null | null | cs.AR | null | This paper addresses a new approach to find a spectrum of information
measures for the process of digital circuit synthesis. We consider the problem
from the information engine point of view. The circuit synthesis as a whole and
different steps of the design process (an example of decision diagram is given)
are presented via such measurements as entropy, logical work and information
vitality. We also introduce new information measures to provide better
estimates of synthesis criteria. We show that the basic properties of
information engine, such as the conservation law of information flow and the
equilibrium law of information can be formulated.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2002 04:55:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Popel",
"Denis V.",
""
],
[
"Al-Hakeem",
"Nawar",
""
]
] |
cs/0207015 | Wen Chen | W. Chen, M. Tanaka | New advances in dual reciprocity and boundary-only RBF methods | null | null | null | Proc. of BEM technique confer., Vol. 10, 17-22, Tokyo, Japan, 2000 | cs.CE cs.CG | null | This paper made some significant advances in the dual reciprocity and
boundary-only RBF techniques. The proposed boundary knot method (BKM) is
different from the standard boundary element method in a number of important
aspects. Namely, it is truly meshless, exponential convergence,
integration-free (of course, no singular integration), boundary-only for
general problems, and leads to symmetric matrix under certain conditions (able
to be extended to general cases after further modified). The BKM also avoids
the artificial boundary in the method of fundamental solution. An amazing
finding is that the BKM can formulate linear modeling equations for nonlinear
partial differential systems with linear boundary conditions. This merit makes
it circumvent all perplexing issues in the iteration solution of nonlinear
equations. On the other hand, by analogy with Green's second identity, this
paper also presents a general solution RBF (GSR) methodology to construct
efficient RBFs in the dual reciprocity and domain-type RBF collocation methods.
The GSR approach first establishes an explicit relationship between the BEM and
RBF itself on the ground of the weighted residual principle. This paper also
discusses the RBF convergence and stability problems within the framework of
integral equation theory.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2002 12:10:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
],
[
"Tanaka",
"M.",
""
]
] |
cs/0207016 | Wen Chen | W. Chen, M. Tanaka | Relationship between boundary integral equation and radial basis
function | null | null | null | JASCOME 57th BEM Confer., 30 Sept. 2000 | cs.CE cs.CG | null | This paper aims to survey our recent work relating to the radial basis
function (RBF) from some new views of points. In the first part, we established
the RBF on numerical integration analysis based on an intrinsic relationship
between the Green's boundary integral representation and RBF. It is found that
the kernel function of integral equation is important to create efficient RBF.
The fundamental solution RBF (FS-RBF) was presented as a novel strategy
constructing operator-dependent RBF. We proposed a conjecture formula featuring
the dimension affect on error bound to show the independent-dimension merit of
the RBF techniques. We also discussed wavelet RBF, localized RBF schemes, and
the influence of node placement on the RBF solution accuracy. The
centrosymmetric matrix structure of the RBF interpolation matrix under
symmetric node placing is proved.
The second part of this paper is concerned with the boundary knot method
(BKM), a new boundary-only, meshless, spectral convergent, integration-free RBF
collocation technique. The BKM was tested to the Helmholtz, Laplace, linear and
nonlinear convection-diffusion problems. In particular, we introduced the
response knot-dependent nonsingular general solution to calculate
varying-parameter and nonlinear steady convection-diffusion problems very
efficiently. By comparing with the multiple dual reciprocity method, we
discussed the completeness issue of the BKM.
Finally, the nonsingular solutions for some known differential operators were
given in appendix. Also we expanded the RBF concepts by introducing time-space
RBF for transient problems.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2002 12:15:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
],
[
"Tanaka",
"M.",
""
]
] |
cs/0207017 | Wen Chen | W. Chen, M. Tanaka | New Insights in Boundary-only and Domain-type RBF Methods | null | J. Nonlinear Sci. & Numer. Simulation, 1(3), 145-151, 2000 | null | null | cs.CE cs.CG | null | This paper has made some significant advances in the boundary-only and
domain-type RBF techniques. The proposed boundary knot method (BKM) is
different from the standard boundary element method in a number of important
aspects. Namely, it is truly meshless, exponential convergence,
integration-free (of course, no singular integration), boundary-only for
general problems, and leads to symmetric matrix under certain conditions (able
to be extended to general cases after further modified). The BKM also avoids
the artificial boundary in the method of fundamental solution. An amazing
finding is that the BKM can formulate linear modeling equations for nonlinear
partial differential systems with linear boundary conditions. This merit makes
it circumvent all perplexing issues in the iteration solution of nonlinear
equations. On the other hand, by analogy with Green's second identity, we also
presents a general solution RBF (GSR) methodology to construct efficient RBFs
in the domain-type RBF collocation method and dual reciprocity method. The GSR
approach first establishes an explicit relationship between the BEM and RBF
itself on the ground of the potential theory. This paper also discusses some
essential issues relating to the RBF computing, which include time-space RBFs,
direct and indirect RBF schemes, finite RBF method, and the application of
multipole and wavelet to the RBF solution of the PDEs.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2002 12:18:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
],
[
"Tanaka",
"M.",
""
]
] |
cs/0207018 | Wen Chen | W. Chen | Definitions of distance function in radial basis function approach | null | null | null | null | cs.CE cs.CG | null | Very few studies involve how to construct the efficient RBFs by means of
problem features. Recently the present author presented general solution RBF
(GS-RBF) methodology to create operator-dependent RBFs successfully [1]. On the
other hand, the normal radial basis function (RBF) is defined via Euclidean
space distance function or the geodesic distance [2]. This purpose of this note
is to redefine distance function in conjunction with problem features, which
include problem-dependent and time-space distance function.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2002 12:20:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0207021 | Piero A. Bonatti | Piero A. Bonatti | Abduction, ASP and Open Logic Programs | 7 pages, NMR'02 Workshop | null | null | null | cs.AI | null | Open logic programs and open entailment have been recently proposed as an
abstract framework for the verification of incomplete specifications based upon
normal logic programs and the stable model semantics. There are obvious
analogies between open predicates and abducible predicates. However, despite
superficial similarities, there are features of open programs that have no
immediate counterpart in the framework of abduction and viceversa. Similarly,
open programs cannot be immediately simulated with answer set programming
(ASP). In this paper we start a thorough investigation of the relationships
between open inference, abduction and ASP. We shall prove that open programs
generalize the other two frameworks. The generalized framework suggests
interesting extensions of abduction under the generalized stable model
semantics. In some cases, we will be able to reduce open inference to abduction
and ASP, thereby estimating its computational complexity. At the same time, the
aforementioned reduction opens the way to new applications of abduction and
ASP.
| [
{
"version": "v1",
"created": "Sun, 7 Jul 2002 09:55:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bonatti",
"Piero A.",
""
]
] |
cs/0207022 | Mehdi Dastani | Mehdi Dastani and Leendert van der Torre | What is a Joint Goal? Games with Beliefs and Defeasible Desires | 8 pages | Proceedings of NMR02, Toulouse, 2002 | null | null | cs.MA cs.GT | null | In this paper we introduce a qualitative decision and game theory based on
belief (B) and desire (D) rules. We show that a group of agents acts as if it
is maximizing achieved joint goals.
| [
{
"version": "v1",
"created": "Sun, 7 Jul 2002 11:26:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dastani",
"Mehdi",
""
],
[
"van der Torre",
"Leendert",
""
]
] |
cs/0207023 | Tran Cao Son | Tran Cao Son, Chitta Baral, Nam Tran, and Sheila McIlraith | Domain-Dependent Knowledge in Answer Set Planning | 70 pages, accepted for publication, TOCL Version with all proofs | null | null | null | cs.AI | null | In this paper we consider three different kinds of domain-dependent control
knowledge (temporal, procedural and HTN-based) that are useful in planning. Our
approach is declarative and relies on the language of logic programming with
answer set semantics (AnsProlog*). AnsProlog* is designed to plan without
control knowledge. We show how temporal, procedural and HTN-based control
knowledge can be incorporated into AnsProlog* by the modular addition of a
small number of domain-dependent rules, without the need to modify the planner.
We formally prove the correctness of our planner, both in the absence and
presence of the control knowledge. Finally, we perform some initial
experimentation that demonstrates the potential reduction in planning time that
can be achieved when procedural domain knowledge is used to solve planning
problems with large plan length.
| [
{
"version": "v1",
"created": "Mon, 8 Jul 2002 00:31:54 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Aug 2005 20:46:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Son",
"Tran Cao",
""
],
[
"Baral",
"Chitta",
""
],
[
"Tran",
"Nam",
""
],
[
"McIlraith",
"Sheila",
""
]
] |
cs/0207024 | Paul E. Dunne | Paul E. Dunne | On Concise Encodings of Preferred Extensions | Proc. 9th Worskhop on Non-monotonic reasoning, Toulouse, 2002
(NMR'02) (7 pages) | null | null | Dept. of Comp. Sci., Univ. of Liverpool, Tech. Report ULCS-02-003 | cs.AI cs.CC cs.DS | null | Much work on argument systems has focussed on preferred extensions which
define the maximal collectively defensible subsets. Identification and
enumeration of these subsets is (under the usual assumptions) computationally
demanding. We consider approaches to deciding if a subset S is a preferred
extension which query a representations encoding all such extensions, so that
the computational effort is invested once only (for the initial enumeration)
rather than for each separate query.
| [
{
"version": "v1",
"created": "Mon, 8 Jul 2002 13:24:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dunne",
"Paul E.",
""
]
] |
cs/0207025 | Sylvie Doutre | C. Cayrol, S. Doutre, M.-C. Lagasquie-Schiex, J. Mengin | "Minimal defence": a refinement of the preferred semantics for
argumentation frameworks | 8 pages, 3 figures | Proceedings of the 9th International Workshop on Non-Monotonic
Reasoning, 2002, pp. 408-415 | null | null | cs.AI | null | Dung's abstract framework for argumentation enables a study of the
interactions between arguments based solely on an ``attack'' binary relation on
the set of arguments. Various ways to solve conflicts between contradictory
pieces of information have been proposed in the context of argumentation,
nonmonotonic reasoning or logic programming, and can be captured by appropriate
semantics within Dung's framework. A common feature of these semantics is that
one can always maximize in some sense the set of acceptable arguments. We
propose in this paper to extend Dung's framework in order to allow for the
representation of what we call ``restricted'' arguments: these arguments should
only be used if absolutely necessary, that is, in order to support other
arguments that would otherwise be defeated. We modify Dung's preferred
semantics accordingly: a set of arguments becomes acceptable only if it
contains a minimum of restricted arguments, for a maximum of unrestricted
arguments.
| [
{
"version": "v1",
"created": "Mon, 8 Jul 2002 13:30:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cayrol",
"C.",
""
],
[
"Doutre",
"S.",
""
],
[
"Lagasquie-Schiex",
"M. -C.",
""
],
[
"Mengin",
"J.",
""
]
] |
cs/0207026 | Hsueh-I. Lu | Michael H. Goldwasser, Ming-Yang Kao, Hsueh-I Lu | Linear-Time Algorithms for Computing Maximum-Density Sequence Segments
with Bioinformatics Applications | 23 pages, 13 figures. A significant portion of these results appeared
under the title, "Fast Algorithms for Finding Maximum-Density Segments of a
Sequence with Applications to Bioinformatics," in Proceedings of the Second
Workshop on Algorithms in Bioinformatics (WABI), volume 2452 of Lecture Notes
in Computer Science (Springer-Verlag, Berlin), R. Guigo and D. Gusfield
editors, 2002, pp. 157--171 | Journal of Computer and System Sciences, 70(2):128-144, 2005 | 10.1016/j.jcss.2004.08.001 | null | cs.DS cs.DM | null | We study an abstract optimization problem arising from biomolecular sequence
analysis. For a sequence A of pairs (a_i,w_i) for i = 1,..,n and w_i>0, a
segment A(i,j) is a consecutive subsequence of A starting with index i and
ending with index j. The width of A(i,j) is w(i,j) = sum_{i <= k <= j} w_k, and
the density is (sum_{i<= k <= j} a_k)/ w(i,j). The maximum-density segment
problem takes A and two values L and U as input and asks for a segment of A
with the largest possible density among those of width at least L and at most
U. When U is unbounded, we provide a relatively simple, O(n)-time algorithm,
improving upon the O(n \log L)-time algorithm by Lin, Jiang and Chao. When both
L and U are specified, there are no previous nontrivial results. We solve the
problem in O(n) time if w_i=1 for all i, and more generally in
O(n+n\log(U-L+1)) time when w_i>=1 for all i.
| [
{
"version": "v1",
"created": "Mon, 8 Jul 2002 14:45:49 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Nov 2002 18:04:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldwasser",
"Michael H.",
""
],
[
"Kao",
"Ming-Yang",
""
],
[
"Lu",
"Hsueh-I",
""
]
] |
cs/0207028 | Kamal Jain | Kamal Jain and Mohammad Mahdian and Evangelos Markakis and Amin Saberi
and Vijay V. Vazirani | Greedy Facility Location Algorithms Analyzed using Dual Fitting with
Factor-Revealing LP | 28 pages, 2 figures, 4 tables, abstract appeared in STOC 2002
Montreal | null | null | null | cs.DS cs.GT | null | In this paper, we will formalize the method of dual fitting and the idea of
factor-revealing LP. This combination is used to design and analyze two greedy
algorithms for the metric uncapacitated facility location problem. Their
approximation factors are 1.861 and 1.61, with running times of O(mlog m) and
O(n^3), respectively, where n is the total number of vertices and m is the
number of edges in the underlying complete bipartite graph between cities and
facilities. The algorithms are used to improve recent results for several
variants of the problem.
| [
{
"version": "v1",
"created": "Tue, 9 Jul 2002 00:29:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"Kamal",
""
],
[
"Mahdian",
"Mohammad",
""
],
[
"Markakis",
"Evangelos",
""
],
[
"Saberi",
"Amin",
""
],
[
"Vazirani",
"Vijay V.",
""
]
] |
cs/0207029 | Alexander Bochman | Alexander Bochman | Two Representations for Iterative Non-prioritized Change | 7 pages,Proceedings NMR'02, references added | null | null | null | cs.AI | null | We address a general representation problem for belief change, and describe
two interrelated representations for iterative non-prioritized change: a
logical representation in terms of persistent epistemic states, and a
constructive representation in terms of flocks of bases.
| [
{
"version": "v1",
"created": "Tue, 9 Jul 2002 12:32:45 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Jul 2002 16:26:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bochman",
"Alexander",
""
]
] |
cs/0207030 | Alexander Bochman | Alexander Bochman | Collective Argumentation | 8 pages, Proceedings NMR'02, references added | null | null | null | cs.AI | null | An extension of an abstract argumentation framework, called collective
argumentation, is introduced in which the attack relation is defined directly
among sets of arguments. The extension turns out to be suitable, in particular,
for representing semantics of disjunctive logic programs. Two special kinds of
collective argumentation are considered in which the opponents can share their
arguments.
| [
{
"version": "v1",
"created": "Tue, 9 Jul 2002 12:42:24 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Jul 2002 16:21:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bochman",
"Alexander",
""
]
] |
cs/0207031 | Henry Prakken | Henry Prakken | Intuitions and the modelling of defeasible reasoning: some case studies | Proceedings of the 9th International Workshop on Non-Monotonic
Reasoning (NMR'2002), Toulouse, France, April 19-21, 2002 | null | null | null | cs.AI cs.LO | null | The purpose of this paper is to address some criticisms recently raised by
John Horty in two articles against the validity of two commonly accepted
defeasible reasoning patterns, viz. reinstatement and floating conclusions. I
shall argue that Horty's counterexamples, although they significantly raise our
understanding of these reasoning patterns, do not show their invalidity. Some
of them reflect patterns which, if made explicit in the formalisation, avoid
the unwanted inference without having to give up the criticised inference
principles. Other examples seem to involve hidden assumptions about the
specific problem which, if made explicit, are nothing but extra information
that defeat the defeasible inference. These considerations will be put in a
wider perspective by reflecting on the nature of defeasible reasoning
principles as principles of justified acceptance rather than `real' logical
inference.
| [
{
"version": "v1",
"created": "Tue, 9 Jul 2002 14:16:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prakken",
"Henry",
""
]
] |
cs/0207033 | Wen Chen | W Chen, Xinwei Wang, Yongxi Yu | Reducing the Computational Requirements of the Differential Quadrature
Method | null | Numerical Methods for Partial Differential Equations, 12, 565-577,
1996 | null | null | cs.CE cs.CG | null | This paper shows that the weighting coefficient matrices of the differential
quadrature method (DQM) are centrosymmetric or skew-centrosymmetric if the grid
spacings are symmetric irrespective of whether they are equal or unequal. A new
skew centrosymmetric matrix is also discussed. The application of the
properties of centrosymmetric and skew centrosymmetric matrix can reduce the
computational effort of the DQM for calculations of the inverse, determinant,
eigenvectors and eigenvalues by 75%. This computational advantage are also
demonstrated via several numerical examples.
| [
{
"version": "v1",
"created": "Tue, 9 Jul 2002 19:53:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W",
""
],
[
"Wang",
"Xinwei",
""
],
[
"Yu",
"Yongxi",
""
]
] |
cs/0207035 | Wen Chen | W. Chen, Tingxiu Zhong | A Lyapunov Formulation for Efficient Solution of the Poisson and
Convection-Diffusion Equations by the Differential Quadrature Method | null | J. of Computational Physics, 139, 1-7, 1998 | null | null | cs.CE cs.CG | null | Civan and Sliepcevich [1, 2] suggested that special matrix solver should be
developed to further reduce the computing effort in applying the differential
quadrature (DQ) method for the Poisson and convection-diffusion equations.
Therefore, the purpose of the present communication is to introduce and apply
the Lyapunov formulation which can be solved much more efficiently than the
Gaussian elimination method. Civan and Sliepcevich [2] first presented DQ
approximate formulas in polynomial form for partial derivatives in
tow-dimensional variable domain. For simplifying formulation effort, Chen et
al. [3] proposed the compact matrix form of these DQ approximate formulas. In
this study, by using these matrix approximate formulas, the DQ formulations for
the Poisson and convection-diffusion equations can be expressed as the Lyapunov
algebraic matrix equation. The formulation effort is simplified, and a simple
and explicit matrix formulation is obtained. A variety of fast algorithms in
the solution of the Lyapunov equation [4-6] can be successfully applied in the
DQ analysis of these two-dimensional problems, and, thus, the computing effort
can be greatly reduced. Finally, we also point out that the present reduction
technique can be easily extended to the three-dimensional cases.
| [
{
"version": "v1",
"created": "Tue, 9 Jul 2002 20:26:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
],
[
"Zhong",
"Tingxiu",
""
]
] |
cs/0207036 | Nicholas Allen | N. Allen and T. Terriberry | System Description for a Scalable, Fault-Tolerant, Distributed Garbage
Collector | 47 pages, LaTeX | null | null | null | cs.DC | null | We describe an efficient and fault-tolerant algorithm for distributed cyclic
garbage collection. The algorithm imposes few requirements on the local
machines and allows for flexibility in the choice of local collector and
distributed acyclic garbage collector to use with it. We have emphasized
reducing the number and size of network messages without sacrificing the
promptness of collection throughout the algorithm. Our proposed collector is a
variant of back tracing to avoid extensive synchronization between machines. We
have added an explicit forward tracing stage to the standard back tracing stage
and designed a tuned heuristic to reduce the total amount of work done by the
collector. Of particular note is the development of fault-tolerant cooperation
between traces and a heuristic that aggressively reduces the set of suspect
objects.
| [
{
"version": "v1",
"created": "Wed, 10 Jul 2002 00:53:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Allen",
"N.",
""
],
[
"Terriberry",
"T.",
""
]
] |
cs/0207037 | Samir Chopra | Samir Chopra, Johannes Heidema, Thomas Meyer | Some logics of belief and disbelief | null | null | null | null | cs.AI cs.LO | null | The introduction of explicit notions of rejection, or disbelief, into logics
for knowledge representation can be justified in a number of ways. Motivations
range from the need for versions of negation weaker than classical negation, to
the explicit recording of classic belief contraction operations in the area of
belief change, and the additional levels of expressivity obtained from an
extended version of belief change which includes disbelief contraction. In this
paper we present four logics of disbelief which address some or all of these
intuitions. Soundness and completeness results are supplied and the logics are
compared with respect to applicability and utility.
| [
{
"version": "v1",
"created": "Wed, 10 Jul 2002 02:16:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chopra",
"Samir",
""
],
[
"Heidema",
"Johannes",
""
],
[
"Meyer",
"Thomas",
""
]
] |
cs/0207038 | Samir Chopra | Samir Chopra, Aditya Ghose, Thomas Meyer | Iterated revision and the axiom of recovery: a unified treatment via
epistemic states | null | null | null | null | cs.AI cs.LO | null | The axiom of recovery, while capturing a central intuition regarding belief
change, has been the source of much controversy. We argue briefly against
putative counterexamples to the axiom--while agreeing that some of their
insight deserves to be preserved--and present additional recovery-like axioms
in a framework that uses epistemic states, which encode preferences, as the
object of revisions. This provides a framework in which iterated revision
becomes possible and makes explicit the connection between iterated belief
change and the axiom of recovery. We provide a representation theorem that
connects the semantic conditions that we impose on iterated revision and the
additional syntactical properties mentioned. We also show some interesting
similarities between our framework and that of Darwiche-Pearl. In particular,
we show that the intuitions underlying the controversial (C2) postulate are
captured by the recovery axiom and our recovery-like postulates (the latter can
be seen as weakenings of (C2).
| [
{
"version": "v1",
"created": "Wed, 10 Jul 2002 02:31:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chopra",
"Samir",
""
],
[
"Ghose",
"Aditya",
""
],
[
"Meyer",
"Thomas",
""
]
] |
cs/0207039 | Wen Chen | Masataka Tanaka, W Chen | Dual reciprocity BEM and dynamic programming filter for inverse
elastodynamic problems | null | Transactions of the Japan Society for Computational Engineering
and Science, 2, 20000003, 2000 | null | null | cs.CE cs.CG | null | This paper presents the first coupling application of the dual reciprocity
BEM (DRBEM) and dynamic programming filter to inverse elastodynamic problem.
The DRBEM is the only BEM method, which does not require domain discretization
for general linear and nonlinear dynamic problems. Since the size of numerical
discretization system has a great effect on the computing effort of recursive
or iterative calculations of inverse analysis, the intrinsic boundary-only
merit of the DRBEM causes a considerable computational saving. On the other
hand, the strengths of the dynamic programming filter lie in its mathematical
simplicity, easy to program and great flexibility in the type, number and
locations of measurements and unknown inputs. The combination of these two
techniques is therefore very attractive for the solution of practical inverse
problems. In this study, the spatial and temporal partial derivatives of the
governing equation are respectively discretized first by the DRBEM and the
precise integration method, and then, by using dynamic programming with
regularization, dynamic load is estimated based on noisy measurements of
velocity and displacement at very few locations. Numerical experiments involved
with the periodic and Heaviside impact load are conducted to demonstrate the
applicability, efficiency and simplicity of this strategy. The affect of noise
level, regularization parameter, and measurement types on the estimation is
also investigated.
| [
{
"version": "v1",
"created": "Wed, 10 Jul 2002 08:00:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tanaka",
"Masataka",
""
],
[
"Chen",
"W",
""
]
] |
cs/0207040 | Ralf Schweimeier | Ralf Schweimeier and Michael Schroeder | Well-Founded Argumentation Semantics for Extended Logic Programming | Workshop on Non-Monotonic Reasoning NMR'02, Special Session on
Argument, Dialogue, and Decision | null | null | null | cs.LO cs.AI | null | This paper defines an argumentation semantics for extended logic programming
and shows its equivalence to the well-founded semantics with explicit negation.
We set up a general framework in which we extensively compare this semantics to
other argumentation semantics, including those of Dung, and Prakken and Sartor.
We present a general dialectical proof theory for these argumentation
semantics.
| [
{
"version": "v1",
"created": "Wed, 10 Jul 2002 10:22:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schweimeier",
"Ralf",
""
],
[
"Schroeder",
"Michael",
""
]
] |
cs/0207041 | Wen Chen | W. Chen | RBF-based meshless boundary knot method and boundary particle method | null | null | null | Proc. of the China Congress on Computational Mechanics's 2001, pp.
319-326, Guangzhou, China, Dec. 2001 | cs.CE cs.CG | null | This paper is concerned with the two new boundary-type radial basis function
collocation schemes, boundary knot method (BKM) and boundary particle method
(BPM). The BKM is developed based on the dual reciprocity theorem, while the
BPM employs the multiple reciprocity technique. Unlike the method of
fundamental solution, the wto methods use the nonsingular general solutions
instead of singular fundamental solution to circumvent the controversial
artificial boundary outside physical domain. Compared with the boundary element
method, both the BKM and BPM are meshfree, superconvergent, meshfree,
integration free, symmetric, and mathematically simple collocation techniques
for general PDEs. In particular, the BPM does not require any inner nodes for
inhomogeneous problems. In this study, the accuracy and efficiency of the two
methods are numerically demonstrated to some 2D, 3D Helmholtz and
convection-diffusion problems under complicated geometries.
| [
{
"version": "v1",
"created": "Wed, 10 Jul 2002 20:31:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0207042 | Gerhard Brewka | Gerhard Brewka | Logic Programming with Ordered Disjunction | null | null | null | null | cs.AI | null | Logic programs with ordered disjunction (LPODs) combine ideas underlying
Qualitative Choice Logic (Brewka et al. KR 2002) and answer set programming.
Logic programming under answer set semantics is extended with a new connective
called ordered disjunction. The new connective allows us to represent
alternative, ranked options for problem solutions in the heads of rules: A
\times B intuitively means: if possible A, but if A is not possible then at
least B. The semantics of logic programs with ordered disjunction is based on a
preference relation on answer sets. LPODs are useful for applications in design
and configuration and can serve as a basis for qualitative decision making.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 11:03:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brewka",
"Gerhard",
""
]
] |
cs/0207043 | Wen Chen | W. Chen, M. Tanaka | A meshless, integration-free, and boundary-only RBF technique | null | Computers and Mathematics with Applications, 43, 379-391, 2002 | null | null | cs.CE cs.CG | null | Based on the radial basis function (RBF), non-singular general solution and
dual reciprocity method (DRM), this paper presents an inherently meshless,
integration-free, boundary-only RBF collocation techniques for numerical
solution of various partial differential equation systems. The basic ideas
behind this methodology are very mathematically simple. In this study, the RBFs
are employed to approximate the inhomogeneous terms via the DRM, while
non-singular general solution leads to a boundary-only RBF formulation for
homogenous solution. The present scheme is named as the boundary knot method
(BKM) to differentiate it from the other numerical techniques. In particular,
due to the use of nonsingular general solutions rather than singular
fundamental solutions, the BKM is different from the method of fundamental
solution in that the former does no require the artificial boundary and results
in the symmetric system equations under certain conditions. The efficiency and
utility of this new technique are validated through a number of typical
numerical examples. Completeness concern of the BKM due to the only use of
non-singular part of complete fundamental solution is also discussed.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 12:19:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
],
[
"Tanaka",
"M.",
""
]
] |
cs/0207044 | Alexandre Tessier | Ulrich Neumerkel, Stefan Kral | Declarative program development in Prolog with GUPU | 10 pages; Alexandre Tessier, editor; WLPE 2002,
http://xxx.lanl.gov/html/cs/0207052 | null | null | null | cs.SE | null | We present GUPU, a side-effect free environment specialized for programming
courses. It seamlessly guides and supports students during all phases of
program development, covering specification, implementation, and program
debugging. GUPU features several innovations in this area. The specification
phase is supported by reference implementations augmented with diagnostic
facilities. During implementation, immediate feedback from test cases and from
visualization tools helps the programmer's program understanding. A set of
slicing techniques narrows down programming errors. The whole process is guided
by a marking system.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 16:57:59 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jul 2002 00:53:41 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2002 14:59:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Neumerkel",
"Ulrich",
""
],
[
"Kral",
"Stefan",
""
]
] |
cs/0207045 | Pierre Marquis | Adnan Darwiche and Pierre Marquis | Compilation of Propositional Weighted Bases | Proceedings of the Ninth International Workshop on Non-Monotonic
Reasoning (NMR'02), Toulouse, 2002 (6-14) | null | null | null | cs.AI | null | In this paper, we investigate the extent to which knowledge compilation can
be used to improve inference from propositional weighted bases. We present a
general notion of compilation of a weighted base that is parametrized by any
equivalence--preserving compilation function. Both negative and positive
results are presented. On the one hand, complexity results are identified,
showing that the inference problem from a compiled weighted base is as
difficult as in the general case, when the prime implicates, Horn cover or
renamable Horn cover classes are targeted. On the other hand, we show that the
inference problem becomes tractable whenever DNNF-compilations are used and
clausal queries are considered. Moreover, we show that the set of all preferred
models of a DNNF-compilation of a weighted base can be computed in time
polynomial in the output size. Finally, we sketch how our results can be used
in model-based diagnosis in order to compute the most probable diagnoses of a
system.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 16:11:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Darwiche",
"Adnan",
""
],
[
"Marquis",
"Pierre",
""
]
] |
cs/0207046 | Alexandre Tessier | Samir Ouis, Narendra Jussien, Patrice Boizumault | COINS: a constraint-based interactive solving system | 15 pages; Alexandre Tessier, editor; WLPE 2002,
http://xxx.lanl.gov/abs/cs.SE/0207052 | null | null | null | cs.SE | null | This paper describes the COINS (COnstraint-based INteractive Solving) system:
a conflict-based constraint solver. It helps understanding inconsistencies,
simulates constraint additions and/or retractions (without any propagation),
determines if a given constraint belongs to a conflict and provides diagnosis
tools (e.g. why variable v cannot take value val). COINS also uses
user-friendly representation of conflicts and explanations.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 16:25:20 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jul 2002 00:35:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ouis",
"Samir",
""
],
[
"Jussien",
"Narendra",
""
],
[
"Boizumault",
"Patrice",
""
]
] |
cs/0207047 | Alexandre Tessier | Magnus Agren, Tamas Szeredi, Nicolas Beldiceanu, Mats Carlsson | Tracing and Explaining Execution of CLP(FD) Programs | 16 pages; Alexandre Tessier, editor; WLPE 2002,
http://xxx.lanl.gov/abs/cs.SE/0207052 | null | null | null | cs.SE | null | Previous work in the area of tracing CLP(FD) programs mainly focuses on
providing information about control of execution and domain modification. In
this paper, we present a trace structure that provides information about
additional important aspects. We incorporate explanations in the trace
structure, i.e. reasons for why certain solver actions occur. Furthermore, we
come up with a format for describing the execution of the filtering algorithms
of global constraints. Some new ideas about the design of the trace are also
presented. For example, we have modeled our trace as a nested block structure
in order to achieve a hierarchical view. Also, new ways about how to represent
and identify different entities such as constraints and domain variables are
presented.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 16:43:30 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jul 2002 00:43:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Agren",
"Magnus",
""
],
[
"Szeredi",
"Tamas",
""
],
[
"Beldiceanu",
"Nicolas",
""
],
[
"Carlsson",
"Mats",
""
]
] |
cs/0207048 | Alexandre Tessier | Francois Fages | CLPGUI: a generic graphical user interface for constraint logic
programming over finite domains | 16 pages; Alexandre Tessier, editor; WLPE 2002,
http://xxx.lanl.gov/abs/cs.SE/0207052 | null | null | null | cs.SE | null | CLPGUI is a graphical user interface for visualizing and interacting with
constraint logic programs over finite domains. In CLPGUI, the user can control
the execution of a CLP program through several views of constraints, of finite
domain variables and of the search tree. CLPGUI is intended to be used both for
teaching purposes, and for debugging and improving complex programs of
realworld scale. It is based on a client-server architecture for connecting the
CLP process to a Java-based GUI process. Communication by message passing
provides an open architecture which facilitates the reuse of graphical
components and the porting to different constraint programming systems.
Arbitrary constraints and goals can be posted incrementally from the GUI. We
propose several dynamic 2D and 3D visualizations of the search tree and of the
evolution of finite domain variables. We argue that the 3D representation of
search trees proposed in this paper provides the most appropriate visualization
of large search trees. We describe the current implementation of the
annotations and of the interactive execution model in GNU-Prolog, and report
some evaluation results.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 18:05:59 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jul 2002 00:40:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fages",
"Francois",
""
]
] |
cs/0207050 | Alexandre Tessier | Willy Lesaint | Value withdrawal explanations: a theoretical tool for programming
environments | 14 pages; Alexandre Tessier, editor; WLPE 2002,
http://xxx.lanl.gov/abs/cs.SE/0207052 | null | null | null | cs.SE | null | Constraint logic programming combines declarativity and efficiency thanks to
constraint solvers implemented for specific domains. Value withdrawal
explanations have been efficiently used in several constraints programming
environments but there does not exist any formalization of them. This paper is
an attempt to fill this lack. Furthermore, we hope that this theoretical tool
could help to validate some programming environments. A value withdrawal
explanation is a tree describing the withdrawal of a value during a domain
reduction by local consistency notions and labeling. Domain reduction is
formalized by a search tree using two kinds of operators: operators for local
consistency notions and operators for labeling. These operators are defined by
sets of rules. Proof trees are built with respect to these rules. For each
removed value, there exists such a proof tree which is the withdrawal
explanation of this value.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 16:52:49 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jul 2002 00:48:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lesaint",
"Willy",
""
]
] |
cs/0207051 | Alexandre Tessier | Nicos Angelopoulos | Exporting Prolog source code | 8 pages; Alexandre Tessier, editor; WLPE 2002,
http://xxx.lanl.gov/abs/cs.SE/0207052 | null | null | null | cs.SE | null | In this paper we present a simple source code configuration tool. ExLibris
operates on libraries and can be used to extract from local libraries all code
relevant to a particular project. Our approach is not designed to address
problems arising in code production lines, but rather, to support the needs of
individual or small teams of researchers who wish to communicate their Prolog
programs. In the process, we also wish to accommodate and encourage the writing
of reusable code. Moreover, we support and propose ways of dealing with issues
arising in the development of code that can be run on a variety of like-minded
Prolog systems. With consideration to these aims we have made the following
decisions: (i) support file-based source development, (ii) require minimal
program transformation, (iii) target simplicity of usage, and (iv) introduce
minimum number of new primitives.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 17:17:17 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jul 2002 00:50:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Angelopoulos",
"Nicos",
""
]
] |
cs/0207052 | Alexandre Tessier | Alexandre Tessier | Proceedings of the 12th International Workshop on Logic Programming
Environments | 10 refereed papers, 123 pages; Alexandre Tessier, editor; WLPE 2002 | null | null | null | cs.SE | null | The twelfth Workshop on Logic Programming Environments, WLPE 2002, is one in
a series of international workshops held in the topic area. The workshops
facilitate the exchange ideas and results among researchers and system
developers on all aspects of environments for logic programming. Relevant
topics for these workshops include user interfaces, human engineering,
execution visualization, development tools, providing for new paradigms, and
interfacing to language system tools and external systems. This twelfth
workshop held in Copenhaguen. It follows the successful eleventh Workshop on
Logic Programming Environments held in Cyprus in December, 2001.
WLPE 2002 features ten presentations. The presentations involve, in some way,
constraint logic programming, object-oriented programming and abstract
interpretation. Topics areas addressed include tools for software development,
execution visualization, software maintenance, instructional aids.
This workshop was a post-conference workshop at ICLP 2002.
Alexandre Tessier, Program Chair, WLPE 2002, June 2002.
| [
{
"version": "v1",
"created": "Fri, 12 Jul 2002 01:23:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tessier",
"Alexandre",
""
]
] |
cs/0207053 | Alexandre Tessier | Jan Wielemaker, Anjo Anjewierden | An Architecture for Making Object-Oriented Systems Available from Prolog | 14 pages; Alexandre Tessier, editor; WLPE 2002,
http://xxx.lanl.gov/abs/cs.SE/0207052 | null | null | null | cs.SE | null | It is next to impossible to develop real-life applications in just pure
Prolog. With XPCE we realised a mechanism for integrating Prolog with an
external object-oriented system that turns this OO system into a natural
extension to Prolog. We describe the design and how it can be applied to other
external OO systems.
| [
{
"version": "v1",
"created": "Fri, 12 Jul 2002 01:22:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wielemaker",
"Jan",
""
],
[
"Anjewierden",
"Anjo",
""
]
] |
cs/0207054 | Alexandre Tessier | Goran Falkman, Olof Torgersson | Enhancing Usefulness of Declarative Programming Frameworks through
Complete Integration | 11 pages; Alexandre Tessier, editor; WLPE 2002,
http://xxx.lanl.gov/abs/cs.SE/0207052 | null | null | null | cs.SE | null | The Gisela framework for declarative programming was developed with the
specific aim of providing a tool that would be useful for knowledge
representation and reasoning within real-world applications. To achieve this, a
complete integration into an object-oriented application development
environment was used. The framework and methodology developed provide two
alternative application programming interfaces (APIs): Programming using
objects or programming using a traditional equational declarative style. In
addition to providing complete integration, Gisela also allows extensions and
modifications due to the general computation model and well-defined APIs. We
give a brief overview of the declarative model underlying Gisela and we present
the methodology proposed for building applications together with some real
examples.
| [
{
"version": "v1",
"created": "Fri, 12 Jul 2002 01:17:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Falkman",
"Goran",
""
],
[
"Torgersson",
"Olof",
""
]
] |
cs/0207055 | Mark Burgin | Mark Burgin | The Rise and Fall of the Church-Turing Thesis | null | null | null | null | cs.CC cs.AI | null | The essay consists of three parts. In the first part, it is explained how
theory of algorithms and computations evaluates the contemporary situation with
computers and global networks. In the second part, it is demonstrated what new
perspectives this theory opens through its new direction that is called theory
of super-recursive algorithms. These algorithms have much higher computing
power than conventional algorithmic schemes. In the third part, we explicate
how realization of what this theory suggests might influence life of people in
future. It is demonstrated that now the theory is far ahead computing practice
and practice has to catch up with the theory. We conclude with a comparison of
different approaches to the development of information technology.
| [
{
"version": "v1",
"created": "Fri, 12 Jul 2002 02:51:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burgin",
"Mark",
""
]
] |
cs/0207056 | Loizos Michael | Antonis Kakas and Loizos Michael | Modeling Complex Domains of Actions and Change | 9 pages, 3 figures, to download the E-RES system and a full
representation of the Zoo Scenario World, visit
http://www.cs.ucy.ac.cy/~pslogic/ | null | null | null | cs.AI | null | This paper studies the problem of modeling complex domains of actions and
change within high-level action description languages. We investigate two main
issues of concern: (a) can we represent complex domains that capture together
different problems such as ramifications, non-determinism and concurrency of
actions, at a high-level, close to the given natural ontology of the problem
domain and (b) what features of such a representation can affect, and how, its
computational behaviour. The paper describes the main problems faced in this
representation task and presents the results of an empirical study, carried out
through a series of controlled experiments, to analyze the computational
performance of reasoning in these representations. The experiments compare
different representations obtained, for example, by changing the basic ontology
of the domain or by varying the degree of use of indirect effect laws through
domain constraints. This study has helped to expose the main sources of
computational difficulty in the reasoning and suggest some methodological
guidelines for representing complex domains. Although our work has been carried
out within one particular high-level description language, we believe that the
results, especially those that relate to the problems of representation, are
independent of the specific modeling language.
| [
{
"version": "v1",
"created": "Sat, 13 Jul 2002 12:00:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kakas",
"Antonis",
""
],
[
"Michael",
"Loizos",
""
]
] |
cs/0207058 | Jochen L. Leidner | Jochen L. Leidner | Question Answering over Unstructured Data without Domain Restrictions | 8 pages, 6 figures, 5 tables. To appear in Proc. TaCoS'02, Potsdam,
Germany | null | null | null | cs.CL cs.IR | null | Information needs are naturally represented as questions. Automatic
Natural-Language Question Answering (NLQA) has only recently become a practical
task on a larger scale and without domain constraints.
This paper gives a brief introduction to the field, its history and the
impact of systematic evaluation competitions.
It is then demonstrated that an NLQA system for English can be built and
evaluated in a very short time using off-the-shelf parsers and thesauri. The
system is based on Robust Minimal Recursion Semantics (RMRS) and is portable
with respect to the parser used as a frontend. It applies atomic term
unification supported by question classification and WordNet lookup for
semantic similarity matching of parsed question representation and free text.
| [
{
"version": "v1",
"created": "Sun, 14 Jul 2002 21:04:43 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2002 19:54:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leidner",
"Jochen L.",
""
]
] |
cs/0207059 | T. Bench-Capon | T. Bench-Capon | Value Based Argumentation Frameworks | null | null | null | null | cs.AI | null | This paper introduces the notion of value-based argumentation frameworks, an
extension of the standard argumentation frameworks proposed by Dung, which are
able toshow how rational decision is possible in cases where arguments derive
their force from the social values their acceptance would promote.
| [
{
"version": "v1",
"created": "Mon, 15 Jul 2002 11:30:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bench-Capon",
"T.",
""
]
] |
cs/0207060 | Kewen Wang | Torsten Schaub, Kewen Wang | Preferred well-founded semantics for logic programming by alternating
fixpoints: Preliminary report | Proceedings of the Workshop on Preferences in Artificial Intelligence
and Constraint In: Proceedings of the Workshop on Non-Monotonic Reasoning
(NMR'2002) | null | null | null | cs.AI | null | We analyze the problem of defining well-founded semantics for ordered logic
programs within a general framework based on alternating fixpoint theory. We
start by showing that generalizations of existing answer set approaches to
preference are too weak in the setting of well-founded semantics. We then
specify some informal yet intuitive criteria and propose a semantical framework
for preference handling that is more suitable for defining well-founded
semantics for ordered logic programs. The suitability of the new approach is
convinced by the fact that many attractive properties are satisfied by our
semantics. In particular, our semantics is still correct with respect to
various existing answer sets semantics while it successfully overcomes the
weakness of their generalization to well-founded semantics. Finally, we
indicate how an existing preferred well-founded semantics can be captured
within our semantical framework.
| [
{
"version": "v1",
"created": "Mon, 15 Jul 2002 13:30:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schaub",
"Torsten",
""
],
[
"Wang",
"Kewen",
""
]
] |
cs/0207061 | Adam L. Buchsbaum | Adam L. Buchsbaum, Loukas Georgiadis, Haim Kaplan, Anne Rogers, Robert
E. Tarjan, and Jeffery R. Westbrook | Linear-Time Pointer-Machine Algorithms for Path-Evaluation Problems on
Trees and Graphs | 41 pages; 10 figures; 1 table; 65 references. This work is partially
covered by the extended abstracts, ``Linear-Time Pointer-Machine Algorithms
for Least Common Ancestors, MST Verification, and Dominators,'' Proc. 30th
ACM Symp. on Theory of Computing, pp. 279-888, 1998, and ``Finding Dominators
Revisited,'' Proc. 15th ACM-SIAM Symp. on Discrete Algorithms, pp. 862-871,
2004 | null | null | null | cs.DS | null | We present algorithms that run in linear time on pointer machines for a
collection of problems, each of which either directly or indirectly requires
the evaluation of a function defined on paths in a tree. These problems
previously had linear-time algorithms but only for random-access machines
(RAMs); the best pointer-machine algorithms were super-linear by an
inverse-Ackermann-function factor. Our algorithms are also simpler, in some
cases substantially, than the previous linear-time RAM algorithms. Our
improvements come primarily from three new ideas: a refined analysis of path
compression that gives a linear bound if the compressions favor certain nodes,
a pointer-based radix sort as a replacement for table-based methods, and a more
careful partitioning of a tree into easily managed parts. Our algorithms
compute nearest common ancestors off-line, verify and construct minimum
spanning trees, do interval analysis on a flowgraph, find the dominators of a
flowgraph, and build the component tree of a weighted tree.
| [
{
"version": "v1",
"created": "Mon, 15 Jul 2002 18:47:57 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Nov 2006 19:15:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buchsbaum",
"Adam L.",
""
],
[
"Georgiadis",
"Loukas",
""
],
[
"Kaplan",
"Haim",
""
],
[
"Rogers",
"Anne",
""
],
[
"Tarjan",
"Robert E.",
""
],
[
"Westbrook",
"Jeffery R.",
""
]
] |
cs/0207062 | Wen Chen | W. Chen | Some addenda on distance function wavelets | null | null | null | null | cs.NA cs.CE | null | This report will add some supplements to the recently finished report series
on the distance function wavelets (DFW). First, we define the general distance
in terms of the Riesz potential, and then, the distance function Abel wavelets
are derived via the fractional integral and Laplacian. Second, the DFW Weyl
transform is found to be a shifted Laplace potential DFW. The DFW Radon
transform is also presented. Third, we present a conjecture on truncation error
formula of the multiple reciprocity Laplace DFW series and discuss its error
distributions in terms of node density distributions. Forth, we point out that
the Hermite distance function interpolation can be used to replace overlapping
in the domain decomposition in order to produce sparse matrix. Fifth, the shape
parameter is explained as a virtual extra axis contribution in terms of the
MQ-type Possion kernel. The report is concluded with some remarks on a range of
other issues.
| [
{
"version": "v1",
"created": "Mon, 15 Jul 2002 19:58:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0207063 | Alper Ungor | Dan A. Spielman, Shang-hua Teng, and Alper Ungor | Parallel Delaunay Refinement: Algorithms and Analyses | 12 pages (short version); 2 figures; see also
http://www.cs.duke.edu/~ungor/abstracts/parallelDelRef.html | null | null | null | cs.CG | null | In this paper, we analyze the complexity of natural parallelizations of
Delaunay refinement methods for mesh generation. The parallelizations employ a
simple strategy: at each iteration, they choose a set of ``independent'' points
to insert into the domain, and then update the Delaunay triangulation. We show
that such a set of independent points can be constructed efficiently in
parallel and that the number of iterations needed is $O(\log^2(L/s))$, where
$L$ is the diameter of the domain, and $s$ is the smallest edge in the output
mesh. In addition, we show that the insertion of each independent set of points
can be realized sequentially by Ruppert's method in two dimensions and
Shewchuk's in three dimensions. Therefore, our parallel Delaunay refinement
methods provide the same element quality and mesh size guarantees as the
sequential algorithms in both two and three dimensions. For quasi-uniform
meshes, such as those produced by Chew's method, we show that the number of
iterations can be reduced to $O(\log(L/s))$. To the best of our knowledge,
these are the first provably polylog$(L/s)$ parallel time Delaunay meshing
algorithms that generate well-shaped meshes of size optimal to within a
constant.
| [
{
"version": "v1",
"created": "Mon, 15 Jul 2002 20:20:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Spielman",
"Dan A.",
""
],
[
"Teng",
"Shang-hua",
""
],
[
"Ungor",
"Alper",
""
]
] |
cs/0207064 | Eyal Amir | Eyal Amir | Interpolation Theorems for Nonmonotonic Reasoning Systems | NMR'02 | null | null | null | cs.AI cs.LO | null | Craig's interpolation theorem (Craig 1957) is an important theorem known for
propositional logic and first-order logic. It says that if a logical formula
$\beta$ logically follows from a formula $\alpha$, then there is a formula
$\gamma$, including only symbols that appear in both $\alpha,\beta$, such that
$\beta$ logically follows from $\gamma$ and $\gamma$ logically follows from
$\alpha$. Such theorems are important and useful for understanding those logics
in which they hold as well as for speeding up reasoning with theories in those
logics. In this paper we present interpolation theorems in this spirit for
three nonmonotonic systems: circumscription, default logic and logic programs
with the stable models semantics (a.k.a. answer set semantics). These results
give us better understanding of those logics, especially in contrast to their
nonmonotonic characteristics. They suggest that some \emph{monotonicity}
principle holds despite the failure of classic monotonicity for these logics.
Also, they sometimes allow us to use methods for the decomposition of reasoning
for these systems, possibly increasing their applicability and tractability.
Finally, they allow us to build structured representations that use those
logics.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2002 06:27:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amir",
"Eyal",
""
]
] |
cs/0207065 | Dritan Berzati | Dritan Berzati, Bernhard Anrig and Juerg Kohlas | Embedding Default Logic in Propositional Argumentation Systems | 9 pages | null | null | null | cs.AI | null | In this paper we present a transformation of finite propositional default
theories into so-called propositional argumentation systems. This
transformation allows to characterize all notions of Reiter's default logic in
the framework of argumentation systems. As a consequence, computing extensions,
or determining wether a given formula belongs to one extension or all
extensions can be answered without leaving the field of classical propositional
logic. The transformation proposed is linear in the number of defaults.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2002 15:16:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berzati",
"Dritan",
""
],
[
"Anrig",
"Bernhard",
""
],
[
"Kohlas",
"Juerg",
""
]
] |
cs/0207066 | Jochen Alber | Jochen Alber (1), Michael R. Fellows (2), Rolf Niedermeier (1) ((1)
Universitaet Tuebingen Germany, (2) University of Newcastle Australia) | Polynomial Time Data Reduction for Dominating Set | 25 pages, 4 figures (using 8 files), extended abstract entitled
"Efficient Data Reduction for Dominating Set: A Linear Problem Kernel for the
Planar Case" appeared in the Proceedings of the 8th SWAT 2002, LNCS 2368,
pages 150-159, Springer-Verlag, 2002 | null | null | null | cs.DS | null | Dealing with the NP-complete Dominating Set problem on undirected graphs, we
demonstrate the power of data reduction by preprocessing from a theoretical as
well as a practical side. In particular, we prove that Dominating Set
restricted to planar graphs has a so-called problem kernel of linear size,
achieved by two simple and easy to implement reduction rules. Moreover, having
implemented our reduction rules, first experiments indicate the impressive
practical potential of these rules. Thus, this work seems to open up a new and
prospective way how to cope with one of the most important problems in graph
theory and combinatorial optimization.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2002 17:58:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alber",
"Jochen",
""
],
[
"Fellows",
"Michael R.",
""
],
[
"Niedermeier",
"Rolf",
""
]
] |
cs/0207067 | Bart Verheij | Bart Verheij | On the existence and multiplicity of extensions in dialectical
argumentation | 10 pages; 9th International Workshop on Non-Monotonic Reasoning
(NMR'2002) | Verheij, Bart (2002). On the existence and the multiplicity of
extensions in dialectical argumentation. Proceedings of the 9th International
Workshop on Non-Monotonic Reasoning (NMR'2002) (eds. S. Benferhat and E.
Giunchiglia), pp. 416-425. Toulouse | null | null | cs.AI | null | In the present paper, the existence and multiplicity problems of extensions
are addressed. The focus is on extension of the stable type. The main result of
the paper is an elegant characterization of the existence and multiplicity of
extensions in terms of the notion of dialectical justification, a close cousin
of the notion of admissibility. The characterization is given in the context of
the particular logic for dialectical argumentation DEFLOG. The results are of
direct relevance for several well-established models of defeasible reasoning
(like default logic, logic programming and argumentation frameworks), since
elsewhere dialectical argumentation has been shown to have close formal
connections with these models.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2002 12:09:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Verheij",
"Bart",
""
]
] |
cs/0207068 | Konstantin Korovin | Konstantin Korovin and Andrei Voronkov | Knuth-Bendix constraint solving is NP-complete | 27 pages | null | null | null | cs.LO | null | We show the NP-completeness of the existential theory of term algebras with
the Knuth-Bendix order by giving a nondeterministic polynomial-time algorithm
for solving Knuth-Bendix ordering constraints.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2002 18:34:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Korovin",
"Konstantin",
""
],
[
"Voronkov",
"Andrei",
""
]
] |
cs/0207070 | Chung-chieh Shan | Chung-chieh Shan (Harvard University) | A continuation semantics of interrogatives that accounts for Baker's
ambiguity | 20 pages; typo fixed | Proceedings of SALT XII: Semantics and Linguistic Theory, ed.
Brendan Jackson, 246-265 (2002) | null | null | cs.CL cs.PL | null | Wh-phrases in English can appear both raised and in-situ. However, only
in-situ wh-phrases can take semantic scope beyond the immediately enclosing
clause. I present a denotational semantics of interrogatives that naturally
accounts for these two properties. It neither invokes movement or economy, nor
posits lexical ambiguity between raised and in-situ occurrences of the same
wh-phrase. My analysis is based on the concept of continuations. It uses a
novel type system for higher-order continuations to handle wide-scope
wh-phrases while remaining strictly compositional. This treatment sheds light
on the combinatorics of interrogatives as well as other kinds of so-called
A'-movement.
| [
{
"version": "v1",
"created": "Thu, 18 Jul 2002 23:27:01 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Jul 2003 23:18:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shan",
"Chung-chieh",
"",
"Harvard University"
]
] |
cs/0207071 | Stefan Woltran | David Pearce, Vladimir Sarsakov, Torsten Schaub, Hans Tompits, Stefan
Woltran | A Polynomial Translation of Logic Programs with Nested Expressions into
Disjunctive Logic Programs: Preliminary Report | 10 pages; published in Proceedings of the 9th International Workshop
on Non-Monotonic Reasoning | null | null | null | cs.AI cs.LO | null | Nested logic programs have recently been introduced in order to allow for
arbitrarily nested formulas in the heads and the bodies of logic program rules
under the answer sets semantics. Nested expressions can be formed using
conjunction, disjunction, as well as the negation as failure operator in an
unrestricted fashion. This provides a very flexible and compact framework for
knowledge representation and reasoning. Previous results show that nested logic
programs can be transformed into standard (unnested) disjunctive logic programs
in an elementary way, applying the negation as failure operator to body
literals only. This is of great practical relevance since it allows us to
evaluate nested logic programs by means of off-the-shelf disjunctive logic
programming systems, like DLV. However, it turns out that this straightforward
transformation results in an exponential blow-up in the worst-case, despite the
fact that complexity results indicate that there is a polynomial translation
among both formalisms. In this paper, we take up this challenge and provide a
polynomial translation of logic programs with nested expressions into
disjunctive logic programs. Moreover, we show that this translation is modular
and (strongly) faithful. We have implemented both the straightforward as well
as our advanced transformation; the resulting compiler serves as a front-end to
DLV and is publicly available on the Web.
| [
{
"version": "v1",
"created": "Fri, 19 Jul 2002 12:17:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pearce",
"David",
""
],
[
"Sarsakov",
"Vladimir",
""
],
[
"Schaub",
"Torsten",
""
],
[
"Tompits",
"Hans",
""
],
[
"Woltran",
"Stefan",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.