id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0205078
Judith Beumer
Larry Wos
A Spectrum of Applications of Automated Reasoning
13 pages
null
null
ANL/MCS-P923-0102
cs.AI cs.LO
null
The likelihood of an automated reasoning program being of substantial assistance for a wide spectrum of applications rests with the nature of the options and parameters it offers on which to base needed strategies and methodologies. This article focuses on such a spectrum, featuring W. McCune's program OTTER, discussing widely varied successes in answering open questions, and touching on some of the strategies and methodologies that played a key role. The applications include finding a first proof, discovering single axioms, locating improved axiom systems, and simplifying existing proofs. The last application is directly pertinent to the recently found (by R. Thiele) Hilbert's twenty-fourth problem--which is extremely amenable to attack with the appropriate automated reasoning program--a problem concerned with proof simplification. The methodologies include those for seeking shorter proofs and for finding proofs that avoid unwanted lemmas or classes of term, a specific option for seeking proofs with smaller equational or formula complexity, and a different option to address the variable richness of a proof. The type of proof one obtains with the use of OTTER is Hilbert-style axiomatic, including details that permit one sometimes to gain new insights. We include questions still open and challenges that merit consideration.
[ { "version": "v1", "created": "Thu, 30 May 2002 21:20:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Wos", "Larry", "" ] ]
cs/0205079
Daniel Lehmann
Daniel Lehmann
Connectives in Quantum and other Cumulative Logics
21 pages
null
null
TR-2002-28, Leibniz Center for Research in Computer Science, Hebrew University, revised August 2002
cs.AI math.LO
null
Cumulative logics are studied in an abstract setting, i.e., without connectives, very much in the spirit of Makinson's early work. A powerful representation theorem characterizes those logics by choice functions that satisfy a weakening of Sen's property alpha, in the spirit of the author's "Nonmonotonic Logics and Semantics" (JLC). The representation results obtained are surprisingly smooth: in the completeness part the choice function may be defined on any set of worlds, not only definable sets and no definability-preservation property is required in the soundness part. For abstract cumulative logics, proper conjunction and negation may be defined. Contrary to the situation studied in "Nonmonotonic Logics and Semantics" no proper disjunction seems to be definable in general. The cumulative relations of KLM that satisfy some weakening of the consistency preservation property all define cumulative logics with a proper negation. Quantum Logics, as defined by Engesser and Gabbay are such cumulative logics but the negation defined by orthogonal complement does not provide a proper negation.
[ { "version": "v1", "created": "Fri, 31 May 2002 10:09:47 GMT" }, { "version": "v2", "created": "Fri, 2 Aug 2002 10:04:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
cs/0205080
Matus Marko
M. Marko, M.A. Porter, A. Probst, C. Gershenson, A. Das
Transforming the World Wide Web into a Complexity-Based Semantic Network
6 pages, a manuscript for the ICCS 2002
null
null
null
cs.NI cs.IR
null
The aim of this paper is to introduce the idea of the Semantic Web to the Complexity community and set a basic ground for a project resulting in creation of Internet-based semantic network of Complexity-related information providers. Implementation of the Semantic Web technology would be of mutual benefit to both the participants and users and will confirm self-referencing power of the community to apply the products of its own research to itself. We first explain the logic of the transition and discuss important notions associated with the Semantic Web technology. We then present a brief outline of the project milestones.
[ { "version": "v1", "created": "Fri, 31 May 2002 18:44:36 GMT" }, { "version": "v2", "created": "Sat, 1 Jun 2002 08:03:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Marko", "M.", "" ], [ "Porter", "M. A.", "" ], [ "Probst", "A.", "" ], [ "Gershenson", "C.", "" ], [ "Das", "A.", "" ] ]
cs/0206001
Carlos Gershenson
A. Das, M. Marko, A. Probst, M. A. Porter, C. Gershenson
Neural Net Model for Featured Word Extraction
null
null
null
null
cs.NE cs.NI
null
Search engines perform the task of retrieving information related to the user-supplied query words. This task has two parts; one is finding "featured words" which describe an article best and the other is finding a match among these words to user-defined search terms. There are two main independent approaches to achieve this task. The first one, using the concepts of semantics, has been implemented partially. For more details see another paper of Marko et al., 2002. The second approach is reported in this paper. It is a theoretical model based on using Neural Network (NN). Instead of using keywords or reading from the first few lines from papers/articles, the present model gives emphasis on extracting "featured words" from an article. Obviously we propose to exclude prepositions, articles and so on, that is, English words like "of, the, are, so, therefore, " etc. from such a list. A neural model is taken with its nodes pre-assigned energies. Whenever a match is found with featured words and userdefined search words, the node is fired and jumps to a higher energy. This firing continues until the model attains a steady energy level and total energy is now calculated. Clearly, higher match will generate higher energy; so on the basis of total energy, a ranking is done to the article indicating degree of relevance to the user's interest. Another important feature of the proposed model is incorporating a semantic module to refine the search words; like finding association among search words, etc. In this manner, information retrieval can be improved markedly.
[ { "version": "v1", "created": "Sat, 1 Jun 2002 15:10:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Das", "A.", "" ], [ "Marko", "M.", "" ], [ "Probst", "A.", "" ], [ "Porter", "M. A.", "" ], [ "Gershenson", "C.", "" ] ]
cs/0206002
Jeff Erickson
Jeff Erickson, Damrong Guoy, John M. Sullivan, and Alper \"Ung\"or
Building Space-Time Meshes over Arbitrary Spatial Domains
12 pages, 14 figures; see also http://www.cs.uiuc.edu/~jeffe/pubs/slowpitch.html
null
null
null
cs.CG
null
We present an algorithm to construct meshes suitable for space-time discontinuous Galerkin finite-element methods. Our method generalizes and improves the `Tent Pitcher' algorithm of \"Ung\"or and Sheffer. Given an arbitrary simplicially meshed domain M of any dimension and a time interval [0,T], our algorithm builds a simplicial mesh of the space-time domain Mx[0,T], in constant time per element. Our algorithm avoids the limitations of previous methods by carefully adapting the durations of space-time elements to the local quality and feature size of the underlying space mesh.
[ { "version": "v1", "created": "Sat, 1 Jun 2002 23:20:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Erickson", "Jeff", "" ], [ "Guoy", "Damrong", "" ], [ "Sullivan", "John M.", "" ], [ "Üngör", "Alper", "" ] ]
cs/0206003
Yan Zhang
Yan Zhang
Handling Defeasibilities in Action Domains
49 pages, 1 figure, to be appeared in journal Theory and Practice Logic Programming
null
null
null
cs.AI
null
Representing defeasibility is an important issue in common sense reasoning. In reasoning about action and change, this issue becomes more difficult because domain and action related defeasible information may conflict with general inertia rules. Furthermore, different types of defeasible information may also interfere with each other during the reasoning. In this paper, we develop a prioritized logic programming approach to handle defeasibilities in reasoning about action. In particular, we propose three action languages {\cal AT}^{0}, {\cal AT}^{1} and {\cal AT}^{2} which handle three types of defeasibilities in action domains named defeasible constraints, defeasible observations and actions with defeasible and abnormal effects respectively. Each language with a higher superscript can be viewed as an extension of the language with a lower superscript. These action languages inherit the simple syntax of {\cal A} language but their semantics is developed in terms of transition systems where transition functions are defined based on prioritized logic programs. By illustrating various examples, we show that our approach eventually provides a powerful mechanism to handle various defeasibilities in temporal prediction and postdiction. We also investigate semantic properties of these three action languages and characterize classes of action domains that present more desirable solutions in reasoning about action within the underlying action languages.
[ { "version": "v1", "created": "Mon, 3 Jun 2002 06:20:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Yan", "" ] ]
cs/0206004
Bart Goethals
Toon Calders, Bart Goethals
Mining All Non-Derivable Frequent Itemsets
3 figures
null
null
null
cs.DB cs.AI
null
Recent studies on frequent itemset mining algorithms resulted in significant performance improvements. However, if the minimal support threshold is set too low, or the data is highly correlated, the number of frequent itemsets itself can be prohibitively large. To overcome this problem, recently several proposals have been made to construct a concise representation of the frequent itemsets, instead of mining all frequent itemsets. The main goal of this paper is to identify redundancies in the set of all frequent itemsets and to exploit these redundancies in order to reduce the result of a mining operation. We present deduction rules to derive tight bounds on the support of candidate itemsets. We show how the deduction rules allow for constructing a minimal representation for all frequent itemsets. We also present connections between our proposal and recent proposals for concise representations and we give the results of experiments on real-life datasets that show the effectiveness of the deduction rules. In fact, the experiments even show that in many cases, first mining the concise representation, and then creating the frequent itemsets from this representation outperforms existing frequent set mining algorithms.
[ { "version": "v1", "created": "Mon, 3 Jun 2002 14:13:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Calders", "Toon", "" ], [ "Goethals", "Bart", "" ] ]
cs/0206005
Alex Hendriks
Dick de Jongh, Lex Hendriks
Characterization of Strongly Equivalent Logic Programs in Intermediate Logics
Under consideration for publication in Theory and Practice of Logic Programming
null
null
null
cs.LO
null
The non-classical, nonmonotonic inference relation associated with the answer set semantics for logic programs gives rise to a relationship of 'strong equivalence' between logical programs that can be verified in 3-valued Goedel logic, G3, the strongest non-classical intermediate propositional logic (Lifschitz, Pearce and Valverde, 2001). In this paper we will show that KC (the logic obtained by adding axiom ~A v ~~A to intuitionistic logic), is the weakest intermediate logic for which strongly equivalent logic programs, in a language allowing negations, are logically equivalent.
[ { "version": "v1", "created": "Mon, 3 Jun 2002 14:48:41 GMT" } ]
2007-05-23T00:00:00
[ [ "de Jongh", "Dick", "" ], [ "Hendriks", "Lex", "" ] ]
cs/0206007
Min-Yen Kan
Min-Yen Kan, Judith L. Klavans, Kathleen R. McKeown
Using the Annotated Bibliography as a Resource for Indicative Summarization
8 pages, 3 figures
Proceedings of LREC 2002, Las Palmas, Spain. pp. 1746-1752
null
null
cs.CL cs.DL
null
We report on a language resource consisting of 2000 annotated bibliography entries, which is being analyzed as part of our research on indicative document summarization. We show how annotated bibliographies cover certain aspects of summarization that have not been well-covered by other summary corpora, and motivate why they constitute an important form to study for information retrieval. We detail our methodology for collecting the corpus, and overview our document feature markup that we introduced to facilitate summary analysis. We present the characteristics of the corpus, methods of collection, and show its use in finding the distribution of types of information included in indicative summaries and their relative ordering within the summaries.
[ { "version": "v1", "created": "Tue, 4 Jun 2002 14:48:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Kan", "Min-Yen", "" ], [ "Klavans", "Judith L.", "" ], [ "McKeown", "Kathleen R.", "" ] ]
cs/0206008
Petro M. Gopych
Petro M. Gopych
Computer modeling of feelings and emotions: a quantitative neural network model of the feeling-of-knowing
A report presented at the IVth Kharkiv International Psychology Conference dedicated to 70th anniversary of psychology studies at Kharkiv University "Psychology in Contemporary World :Theory and Practice" held in Kharkiv, Ukraine, April 18-19, 2002, 5 pages, 2 Figures
Kharkiv University Bulletin, Series Psychology, 2002, no.550(part 1), p.54-58
null
null
cs.AI cs.NE q-bio.NC q-bio.QM
null
The first quantitative neural network model of feelings and emotions is proposed on the base of available data on their neuroscience and evolutionary biology nature, and on a neural network human memory model which admits distinct description of conscious and unconscious mental processes in a time dependent manner. As an example, proposed model is applied to quantitative description of the feeling of knowing.
[ { "version": "v1", "created": "Mon, 3 Jun 2002 22:31:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Gopych", "Petro M.", "" ] ]
cs/0206010
Leo Liberti
Leo Liberti
Performance Comparison of Function Evaluation Methods
Main conclusion of this paper is wrong due to a bug in the test code; see "Important warning" at the beginning of the paper
null
null
null
cs.SC cs.NA
null
We perform a comparison of the performance and efficiency of four different function evaluation methods: black-box functions, binary trees, $n$-ary trees and string parsing. The test consists in evaluating 8 different functions of two variables $x,y$ over 5000 floating point values of the pair $(x,y)$. The outcome of the test indicates that the $n$-ary tree representation of algebraic expressions is the fastest method, closely followed by black-box function method, then by binary trees and lastly by string parsing.
[ { "version": "v1", "created": "Thu, 6 Jun 2002 09:10:39 GMT" }, { "version": "v2", "created": "Sun, 14 Jul 2002 09:51:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Liberti", "Leo", "" ] ]
cs/0206012
James Aspnes
James Aspnes
Fast Deterministic Consensus in a Noisy Environment
Typographical errors fixed
null
null
null
cs.DS cs.DC
null
It is well known that the consensus problem cannot be solved deterministically in an asynchronous environment, but that randomized solutions are possible. We propose a new model, called noisy scheduling, in which an adversarial schedule is perturbed randomly, and show that in this model randomness in the environment can substitute for randomness in the algorithm. In particular, we show that a simplified, deterministic version of Chandra's wait-free shared-memory consensus algorithm (PODC, 1996, pp. 166-175) solves consensus in time at most logarithmic in the number of active processes. The proof of termination is based on showing that a race between independent delayed renewal processes produces a winner quickly. In addition, we show that the protocol finishes in constant time using quantum and priority-based scheduling on a uniprocessor, suggesting that it is robust against the choice of model over a wide range.
[ { "version": "v1", "created": "Fri, 7 Jun 2002 18:50:04 GMT" }, { "version": "v2", "created": "Wed, 17 Jul 2002 20:06:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Aspnes", "James", "" ] ]
cs/0206013
Wen Chen
W. Chen
High-order fundamental and general solutions of convection-diffusion equation and their applications with boundary particle method
To appear in Int. J. of Engng. Anal. Bound Elem very soon. The present version has a little difference from the journal version. Welcome to contact [email protected]
null
null
null
cs.CE cs.CG
null
In this study, we presented the high-order fundamental solutions and general solutions of convection-diffusion equation. To demonstrate their efficacy, we applied the high-order general solutions to the boundary particle method (BPM) for the solution of some inhomogeneous convection-diffusion problems, where the BPM is a new truly boundary-only meshfree collocation method based on multiple reciprocity principle. For the sake of completeness, the BPM is also briefly described here.
[ { "version": "v1", "created": "Sat, 8 Jun 2002 10:46:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0206014
Atsushi Fujii
Atsushi Fujii, Katunobu Itou and Tetsuya Ishikawa
A Method for Open-Vocabulary Speech-Driven Text Retrieval
Proceedings of the 2002 Conference on Empirical Methods in Natural Language Processing (To appear)
Proceedings of the 2002 Conference on Empirical Methods in Natural Language Processing (EMNLP-2002), pp.188-195, July. 2002
null
null
cs.CL
null
While recent retrieval techniques do not limit the number of index terms, out-of-vocabulary (OOV) words are crucial in speech recognition. Aiming at retrieving information with spoken queries, we fill the gap between speech recognition and text retrieval in terms of the vocabulary size. Given a spoken query, we generate a transcription and detect OOV words through speech recognition. We then correspond detected OOV words to terms indexed in a target collection to complete the transcription, and search the collection for documents relevant to the completed transcription. We show the effectiveness of our method by way of experiments.
[ { "version": "v1", "created": "Sun, 9 Jun 2002 10:07:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Itou", "Katunobu", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/0206015
Atsushi Fujii
Atsushi Fujii and Tetsuya Ishikawa
Japanese/English Cross-Language Information Retrieval: Exploration of Query Translation and Transliteration
null
Computers and the Humanities, Vol.35, No.4, pp.389-420, 2001
null
null
cs.CL
null
Cross-language information retrieval (CLIR), where queries and documents are in different languages, has of late become one of the major topics within the information retrieval community. This paper proposes a Japanese/English CLIR system, where we combine a query translation and retrieval modules. We currently target the retrieval of technical documents, and therefore the performance of our system is highly dependent on the quality of the translation of technical terms. However, the technical term translation is still problematic in that technical terms are often compound words, and thus new terms are progressively created by combining existing base words. In addition, Japanese often represents loanwords based on its special phonogram. Consequently, existing dictionaries find it difficult to achieve sufficient coverage. To counter the first problem, we produce a Japanese/English dictionary for base words, and translate compound words on a word-by-word basis. We also use a probabilistic method to resolve translation ambiguity. For the second problem, we use a transliteration method, which corresponds words unlisted in the base word dictionary to their phonetic equivalents in the target language. We evaluate our system using a test collection for CLIR, and show that both the compound word translation and transliteration methods improve the system performance.
[ { "version": "v1", "created": "Sun, 9 Jun 2002 10:53:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/0206016
Wen Chen
W. Chen
Distance function wavelets - Part III: "Exotic" transforms and series
Welcome comments to [email protected]
null
null
null
cs.CE cs.CG
null
Part III of the reports consists of various unconventional distance function wavelets (DFW). The dimension and the order of partial differential equation (PDE) are first used as a substitute of the scale parameter in the DFW transforms and series, especially with the space and time-space potential problems. It is noted that the recursive multiple reciprocity formulation is the DFW series. The Green second identity is used to avoid the singularity of the zero-order fundamental solution in creating the DFW series. The fundamental solutions of various composite PDEs are found very flexible and efficient to handle a borad range of problems. We also discuss the underlying connections between the crucial concepts of dimension, scale and the order of PDE through the analysis of dissipative acoustic wave propagation. The shape parameter of the potential problems is also employed as the "scale parameter" to create the non-orthogonal DFW. This paper also briefly discusses and conjectures the DFW correspondences of a variety of coordinate variable transforms and series. Practically important, the anisotropic and inhomogeneous DFW's are developed by using the geodesic distance variable. The DFW and the related basis functions are also used in making the kernel distance sigmoidal functions, which are potentially useful in the artificial neural network and machine learning. As or even worse than the preceding two reports, this study scarifies mathematical rigor and in turn unfetter imagination. Most results are intuitively obtained without rigorous analysis. Follow-up research is still under way. The paper is intended to inspire more research into this promising area.
[ { "version": "v1", "created": "Mon, 10 Jun 2002 09:01:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0206017
Ke Xu
Shilong Ma, Yuefei Sui, Ke Xu
The Prioritized Inductive Logic Programs
9 pages. Welcome any comments to [email protected]
null
null
null
cs.AI cs.LG
null
The limit behavior of inductive logic programs has not been explored, but when considering incremental or online inductive learning algorithms which usually run ongoingly, such behavior of the programs should be taken into account. An example is given to show that some inductive learning algorithm may not be correct in the long run if the limit behavior is not considered. An inductive logic program is convergent if given an increasing sequence of example sets, the program produces a corresponding sequence of the Horn logic programs which has the set-theoretic limit, and is limit-correct if the limit of the produced sequence of the Horn logic programs is correct with respect to the limit of the sequence of the example sets. It is shown that the GOLEM system is not limit-correct. Finally, a limit-correct inductive logic system, called the prioritized GOLEM system, is proposed as a solution.
[ { "version": "v1", "created": "Mon, 10 Jun 2002 16:02:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Shilong", "" ], [ "Sui", "Yuefei", "" ], [ "Xu", "Ke", "" ] ]
cs/0206018
Cesim Erten
C. A. Duncan, A. Efrat, C. Erten, S. Kobourov, J.S.B. Mitchell
On Simultaneous Graph Embedding
12 pages, 4 figures
null
null
null
cs.CG
null
We consider the problem of simultaneous embedding of planar graphs. There are two variants of this problem, one in which the mapping between the vertices of the two graphs is given and another where the mapping is not given. In particular, we show that without mapping, any number of outerplanar graphs can be embedded simultaneously on an $O(n)\times O(n)$ grid, and an outerplanar and general planar graph can be embedded simultaneously on an $O(n^2)\times O(n^3)$ grid. If the mapping is given, we show how to embed two paths on an $n \times n$ grid, a caterpillar and a path on an $n \times 2n$ grid, or two caterpillar graphs on an $O(n^2)\times O(n^3)$ grid. We also show that 5 paths, or 3 caterpillars, or two general planar graphs cannot be simultaneously embedded given the mapping.
[ { "version": "v1", "created": "Tue, 11 Jun 2002 23:53:35 GMT" }, { "version": "v2", "created": "Wed, 31 Jul 2002 00:31:31 GMT" }, { "version": "v3", "created": "Mon, 9 Sep 2002 22:23:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Duncan", "C. A.", "" ], [ "Efrat", "A.", "" ], [ "Erten", "C.", "" ], [ "Kobourov", "S.", "" ], [ "Mitchell", "J. S. B.", "" ] ]
cs/0206019
Cesim Erten
C. Erten and S. G. Kobourov
Simultaneous Embedding of a Planar Graph and Its Dual on the Grid
14 pages, 8 figures
null
null
null
cs.CG
null
Traditional representations of graphs and their duals suggest the requirement that the dual vertices be placed inside their corresponding primal faces, and the edges of the dual graph cross only their corresponding primal edges. We consider the problem of simultaneously embedding a planar graph and its dual into a small integer grid such that the edges are drawn as straight-line segments and the only crossings are between primal-dual pairs of edges. We provide a linear-time algorithm that simultaneously embeds a 3-connected planar graph and its dual on a (2n-2) by (2n-2) integer grid, where n is the total number of vertices in the graph and its dual. Furthermore our embedding algorithm satisfies the two natural requirements mentioned above.
[ { "version": "v1", "created": "Wed, 12 Jun 2002 02:02:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Erten", "C.", "" ], [ "Kobourov", "S. G.", "" ] ]
cs/0206020
Vladimir Gudkov
Vladimir Gudkov and Joseph E. Johnson
Multidimensional Network Monitoring for Intrusion Detection
Talk at the International Conference on Complex Systems, June 9-14, 2002, Nashua, NH
null
null
null
cs.CR
null
An approach for real-time network monitoring in terms of numerical time-dependant functions of protocol parameters is suggested. Applying complex systems theory for information f{l}ow analysis of networks, the information traffic is described as a trajectory in multi-dimensional parameter-time space with about 10-12 dimensions. The network traffic description is synthesized by applying methods of theoretical physics and complex systems theory, to provide a robust approach for network monitoring that detects known intrusions, and supports developing real systems for detection of unknown intrusions. The methods of data analysis and pattern recognition presented are the basis of a technology study for an automatic intrusion detection system that detects the attack in the reconnaissance stage.
[ { "version": "v1", "created": "Thu, 13 Jun 2002 18:20:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Gudkov", "Vladimir", "" ], [ "Johnson", "Joseph E.", "" ] ]
cs/0206021
Ram\'on Asensio Monge
R. Asensio Monge (U. of Oviedo), F. Sanchis Marco (U.P. of Madrid), F. Torre Cervigon (U. of Oviedo)
The analysis of the IFPUG method sensitivity
17 pages, 4 figures
null
null
null
cs.SE
null
J. Albrecht`s Function Point Analysis (FPA) is a method to determine the functional size of software products. An organization called International Function Point Users Group (IPFUG), considers the FPA as a standard in the software functional size measurement. The Albrechts method is followed by IPFUG method which includes some modifications in order to improve it. A limitation of the method refers to the fact that FPA is not sensitive enough to differentiate the functional size in small enhancements. That affects the productivity analysis, where the software product functional size is required. To provide more power to the functional size measurement, A. Abran, M. Maya and H. Nguyeckim have proposed some modifications to improve it. The IPFUG v 4.1 method which includes these modifications is named IFPUG v 4.1 extended. In this work we set the conditions to delimiting granular from non granular functions and we calculate the static calibration and sensitivity graphs for the measurements of a set of projects with a high percentage of granular functions, all of then measured with the IFPUG v 4.1 method and the IFPUG v 4.1 extended. Finally, we introduce a statistic analysis in order to determine whether significant differences exist between both methods or not.
[ { "version": "v1", "created": "Fri, 14 Jun 2002 09:24:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Monge", "R. Asensio", "", "U. of Oviedo" ], [ "Marco", "F. Sanchis", "", "U.P. of Madrid" ], [ "Cervigon", "F. Torre", "", "U. of Oviedo" ] ]
cs/0206022
Marcus Hutter
Marcus Hutter
The Fastest and Shortest Algorithm for All Well-Defined Problems
12 pages, 1 figure
International Journal of Foundations of Computer Science, Vol.13, No.3, June 2002, 431-443
null
IDSIA-16-00
cs.CC cs.LO
null
An algorithm $M$ is described that solves any well-defined problem $p$ as quickly as the fastest algorithm computing a solution to $p$, save for a factor of 5 and low-order additive terms. $M$ optimally distributes resources between the execution of provably correct $p$-solving programs and an enumeration of all proofs, including relevant proofs of program correctness and of time bounds on program runtimes. $M$ avoids Blum's speed-up theorem by ignoring programs without correctness proof. $M$ has broader applicability and can be faster than Levin's universal search, the fastest method for inverting functions save for a large multiplicative constant. An extension of Kolmogorov complexity and two novel natural measures of function complexity are used to show that the most efficient program computing some function $f$ is also among the shortest programs provably computing $f$.
[ { "version": "v1", "created": "Fri, 14 Jun 2002 11:04:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
cs/0206023
Bart Goethals
Bart Goethals and Jan Van den Bussche
Relational Association Rules: getting WARMeR
null
null
null
null
cs.DB cs.AI
null
In recent years, the problem of association rule mining in transactional data has been well studied. We propose to extend the discovery of classical association rules to the discovery of association rules of conjunctive queries in arbitrary relational data, inspired by the WARMR algorithm, developed by Dehaspe and Toivonen, that discovers association rules over a limited set of conjunctive queries. Conjunctive query evaluation in relational databases is well understood, but still poses some great challenges when approached from a discovery viewpoint in which patterns are generated and evaluated with respect to some well defined search space and pruning operators.
[ { "version": "v1", "created": "Sat, 15 Jun 2002 12:08:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Goethals", "Bart", "" ], [ "Bussche", "Jan Van den", "" ] ]
cs/0206024
Denis Popel
Denis V. Popel and Anita Dani
Sierpinski Gaskets for Logic Functions Representation
7 pages, 8 figures, 3 tables, experiments
ISMVL 2002 Proceedinds
null
null
cs.LO cs.DM
null
This paper introduces a new approach to represent logic functions in the form of Sierpinski Gaskets. The structure of the gasket allows to manipulate with the corresponding logic expression using recursive essence of fractals. Thus, the Sierpinski gasket's pattern has myriad useful properties which can enhance practical features of other graphic representations like decision diagrams. We have covered possible applications of Sierpinski gaskets in logic design and justified our assumptions in logic function minimization (both Boolean and multiple-valued cases). The experimental results on benchmarks with advances in the novel structure are considered as well.
[ { "version": "v1", "created": "Sat, 15 Jun 2002 15:44:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Popel", "Denis V.", "" ], [ "Dani", "Anita", "" ] ]
cs/0206026
William Schuler
William Schuler
Interleaved semantic interpretation in environment-based parsing
null
Proceedings of the 19th International Conference on Computational Linguistics (COLING 2002)
null
null
cs.CL cs.HC
null
This paper extends a polynomial-time parsing algorithm that resolves structural ambiguity in input to a speech-based user interface by calculating and comparing the denotations of rival constituents, given some model of the interfaced application environment (Schuler 2001). The algorithm is extended to incorporate a full set of logical operators, including quantifiers and conjunctions, into this calculation without increasing the complexity of the overall algorithm beyond polynomial time, both in terms of the length of the input and the number of entities in the environment model.
[ { "version": "v1", "created": "Tue, 18 Jun 2002 15:11:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Schuler", "William", "" ] ]
cs/0206027
Carlos Gershenson
Carlos Gershenson
Behaviour-based Knowledge Systems: An Epigenetic Path from Behaviour to Knowledge
7 pages, 3 figures. To be published in Proceedings of 2nd Workshop on Epigenetic Robotics. Edinburgh, Aug. 10-11 2002
null
null
null
cs.AI cs.AR cs.NE
null
In this paper we expose the theoretical background underlying our current research. This consists in the development of behaviour-based knowledge systems, for closing the gaps between behaviour-based and knowledge-based systems, and also between the understandings of the phenomena they model. We expose the requirements and stages for developing behaviour-based knowledge systems and discuss their limits. We believe that these are necessary conditions for the development of higher order cognitive capacities, in artificial and natural cognitive systems.
[ { "version": "v1", "created": "Tue, 18 Jun 2002 13:05:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
cs/0206029
Alice J. Lin
Alice J. Lin
Computer-Generated Photorealistic Hair
7 pages, 7 figures
null
null
null
cs.GR
null
This paper presents an efficient method for generating and rendering photorealistic hair in two dimensional pictures. The method consists of three major steps. Simulating an artist drawing is used to design the rough hair shape. A convolution based filter is then used to generate photorealistic hair patches. A refine procedure is finally used to blend the boundaries of the patches with surrounding areas. This method can be used to create all types of photorealistic human hair (head hair, facial hair and body hair). It is also suitable for fur and grass generation. Applications of this method include: hairstyle designing/editing, damaged hair image restoration, human hair animation, virtual makeover of a human, and landscape creation.
[ { "version": "v1", "created": "Thu, 20 Jun 2002 06:21:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Lin", "Alice J.", "" ] ]
cs/0206030
Atsushi Fujii
Kazuhiro Seki, Atsushi Fujii, and Tetsuya Ishikawa
A Probabilistic Method for Analyzing Japanese Anaphora Integrating Zero Pronoun Detection and Resolution
Proceedings of the 19th International Conference on Computational Linguistics (To appear)
Proceedings of the 19th International Conference on Computational Linguistics (COLING 2002), pp.911-917, Aug. 2002
null
null
cs.CL
null
This paper proposes a method to analyze Japanese anaphora, in which zero pronouns (omitted obligatory cases) are used to refer to preceding entities (antecedents). Unlike the case of general coreference resolution, zero pronouns have to be detected prior to resolution because they are not expressed in discourse. Our method integrates two probability parameters to perform zero pronoun detection and resolution in a single framework. The first parameter quantifies the degree to which a given case is a zero pronoun. The second parameter quantifies the degree to which a given entity is the antecedent for a detected zero pronoun. To compute these parameters efficiently, we use corpora with/without annotations of anaphoric relations. We show the effectiveness of our method by way of experiments.
[ { "version": "v1", "created": "Thu, 20 Jun 2002 07:13:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Seki", "Kazuhiro", "" ], [ "Fujii", "Atsushi", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/0206031
S. Tarasov
S. Tarasov
A sufficient condition for global invertibility of Lipschitz mapping
LATeX2e, 3 pages, MSC-class: 26B10
null
null
null
cs.NA
null
We show that S.Vavasis' sufficient condition for global invertibility of a polynomial mapping can be easily generalized to the case of a general Lipschitz mapping. Keywords: Invertibility conditions, generalized Jacobian, nonsmooth analysis.
[ { "version": "v1", "created": "Thu, 20 Jun 2002 18:44:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Tarasov", "S.", "" ] ]
cs/0206032
Parisse Bernard
Bernard Parisse
A correct proof of the heuristic GCD algorithm
null
null
null
null
cs.SC
null
In this note, we fill a gap in the proof of the heuristic GCD in the multivariate case made by Char, Geddes and Gonnet (JSC 1989) and give some additionnal information on this method.
[ { "version": "v1", "created": "Fri, 21 Jun 2002 06:49:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Parisse", "Bernard", "" ] ]
cs/0206033
David Eppstein
David Eppstein, Jean-Claude Falmagne
Algorithms for Media
12 pages
null
null
null
cs.DS
null
Falmagne recently introduced the concept of a medium, a combinatorial object encompassing hyperplane arrangements, topological orderings, acyclic orientations, and many other familiar structures. We find efficient solutions for several algorithmic problems on media: finding short reset sequences, shortest paths, testing whether a medium has a closed orientation, and listing the states of a medium given a black-box description.
[ { "version": "v1", "created": "Mon, 24 Jun 2002 06:50:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "Falmagne", "Jean-Claude", "" ] ]
cs/0206034
Atsushi Fujii
Masatoshi Fukui, Shigeto Higuchi, Youichi Nakatani, Masao Tanaka, Atsushi Fujii and Tetsuya Ishikawa
Applying a Hybrid Query Translation Method to Japanese/English Cross-Language Patent Retrieval
null
ACM SIGIR 2000 Workshop on Patent Retrieval, July, 2000
null
null
cs.CL
null
This paper applies an existing query translation method to cross-language patent retrieval. In our method, multiple dictionaries are used to derive all possible translations for an input query, and collocational statistics are used to resolve translation ambiguity. We used Japanese/English parallel patent abstracts to perform comparative experiments, where our method outperformed a simple dictionary-based query translation method, and achieved 76% of monolingual retrieval in terms of average precision.
[ { "version": "v1", "created": "Mon, 24 Jun 2002 07:46:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Fukui", "Masatoshi", "" ], [ "Higuchi", "Shigeto", "" ], [ "Nakatani", "Youichi", "" ], [ "Tanaka", "Masao", "" ], [ "Fujii", "Atsushi", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/0206035
Atsushi Fujii
Shigeto Higuchi, Masatoshi Fukui, Atsushi Fujii and Tetsuya Ishikawa
PRIME: A System for Multi-lingual Patent Retrieval
null
Proceedings of MT Summit VIII, pp.163-167, Sep. 2001
null
null
cs.CL
null
Given the growing number of patents filed in multiple countries, users are interested in retrieving patents across languages. We propose a multi-lingual patent retrieval system, which translates a user query into the target language, searches a multilingual database for patents relevant to the query, and improves the browsing efficiency by way of machine translation and clustering. Our system also extracts new translations from patent families consisting of comparable patents, to enhance the translation dictionary.
[ { "version": "v1", "created": "Mon, 24 Jun 2002 08:00:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Higuchi", "Shigeto", "" ], [ "Fukui", "Masatoshi", "" ], [ "Fujii", "Atsushi", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/0206037
Atsushi Fujii
Atsushi Fujii, Katunobu Itou and Tetsuya Ishikawa
Speech-Driven Text Retrieval: Using Target IR Collections for Statistical Language Model Adaptation in Speech Recognition
null
Anni R. Coden and Eric W. Brown and Savitha Srinivasan (Eds.), Information Retrieval Techniques for Speech Applications (LNCS 2273), pp.94-104, Springer, 2002
null
null
cs.CL
null
Speech recognition has of late become a practical technology for real world applications. Aiming at speech-driven text retrieval, which facilitates retrieving information with spoken queries, we propose a method to integrate speech recognition and retrieval methods. Since users speak contents related to a target collection, we adapt statistical language models used for speech recognition based on the target collection, so as to improve both the recognition and retrieval accuracy. Experiments using existing test collections combined with dictated queries showed the effectiveness of our method.
[ { "version": "v1", "created": "Mon, 24 Jun 2002 10:28:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Itou", "Katunobu", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/0206038
Judith Beumer
N. T. Karonis, B. de Supinski, I. Foster, W. Gropp, E. Lusk
A Multilevel Approach to Topology-Aware Collective Operations in Computational Grids
16 pages, 8 figures
null
null
Preprint ANL/MCS-P948-0402
cs.DC
null
The efficient implementation of collective communiction operations has received much attention. Initial efforts produced "optimal" trees based on network communication models that assumed equal point-to-point latencies between any two processes. This assumption is violated in most practical settings, however, particularly in heterogeneous systems such as clusters of SMPs and wide-area "computational Grids," with the result that collective operations perform suboptimally. In response, more recent work has focused on creating topology-aware trees for collective operations that minimize communication across slower channels (e.g., a wide-area network). While these efforts have significant communication benefits, they all limit their view of the network to only two layers. We present a strategy based upon a multilayer view of the network. By creating multilevel topology-aware trees we take advantage of communication cost differences at every level in the network. We used this strategy to implement topology-aware versions of several MPI collective operations in MPICH-G2, the Globus Toolkit[tm]-enabled version of the popular MPICH implementation of the MPI standard. Using information about topology provided by MPICH-G2, we construct these multilevel topology-aware trees automatically during execution. We present results demonstrating the advantages of our multilevel approach by comparing it to the default (topology-unaware) implementation provided by MPICH and a topology-aware two-layer implementation.
[ { "version": "v1", "created": "Mon, 24 Jun 2002 18:28:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Karonis", "N. T.", "" ], [ "de Supinski", "B.", "" ], [ "Foster", "I.", "" ], [ "Gropp", "W.", "" ], [ "Lusk", "E.", "" ] ]
cs/0206040
Judith Beumer
N. T. Karonis, B. Toonen, and I. Foster
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
20 pages, 8 figures
null
null
Preprint ANL/MCS-P942-0402
cs.DC
null
Application development for distributed computing "Grids" can benefit from tools that variously hide or enable application-level management of critical aspects of the heterogeneous environment. As part of an investigation of these issues, we have developed MPICH-G2, a Grid-enabled implementation of the Message Passing Interface (MPI) that allows a user to run MPI programs across multiple computers, at the same or different sites, using the same commands that would be used on a parallel computer. This library extends the Argonne MPICH implementation of MPI to use services provided by the Globus Toolkit for authentication, authorization, resource allocation, executable staging, and I/O, as well as for process creation, monitoring, and control. Various performance-critical operations, including startup and collective operations, are configured to exploit network topology information. The library also exploits MPI constructs for performance management; for example, the MPI communicator construct is used for application-level discovery of, and adaptation to, both network topology and network quality-of-service mechanisms. We describe the MPICH-G2 design and implementation, present performance results, and review application experiences, including record-setting distributed simulations.
[ { "version": "v1", "created": "Tue, 25 Jun 2002 19:55:45 GMT" }, { "version": "v2", "created": "Tue, 25 Jun 2002 20:34:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Karonis", "N. T.", "" ], [ "Toonen", "B.", "" ], [ "Foster", "I.", "" ] ]
cs/0206041
Magnus Boman
Jarmo Laaksolahti, Magnus Boman
Anticipatory Guidance of Plot
19 pages, 5 figures
null
null
null
cs.AI
null
An anticipatory system for guiding plot development in interactive narratives is described. The executable model is a finite automaton that provides the implemented system with a look-ahead. The identification of undesirable future states in the model is used to guide the player, in a transparent manner. In this way, too radical twists of the plot can be avoided. Since the player participates in the development of the plot, such guidance can have many forms, depending on the environment of the player, on the behavior of the other players, and on the means of player interaction. We present a design method for interactive narratives which produces designs suitable for the implementation of anticipatory mechanisms. Use of the method is illustrated by application to our interactive computer game Kaktus.
[ { "version": "v1", "created": "Wed, 26 Jun 2002 09:17:13 GMT" }, { "version": "v2", "created": "Wed, 19 Feb 2003 10:58:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Laaksolahti", "Jarmo", "" ], [ "Boman", "Magnus", "" ] ]
cs/0207001
Ronald M. Fussell
Ronald M. Fussell
National Infrastructure Contingencies: Survey of Wireless Technology Support
19 pages
null
null
null
cs.DC cs.CE
null
In modern society, the flow of information has become the lifeblood of commerce and social interaction. This movement of data supports most aspects of the United States economy in particular, as well as, serving as the vehicle upon which governmental agencies react to social conditions. In addition, it is understood that the continuance of efficient and reliable data communications during times of national or regional disaster remains a priority in the United States. The coordination of emergency response and area revitalization / rehabilitation efforts between local, state, and federal emergency response is increasingly necessary as agencies strive to work more seamlessly between the affected organizations. Additionally, international support is often made available to react to such adverse conditions as wildfire suppression scenarios and therefore require the efficient management of workforce and associated logistics support. It is through the examination of the issues related to un-tethered data transmission during infrastructure contingencies that responders may best tailor a unified approach to the rapid recovery after disasters occur.
[ { "version": "v1", "created": "Mon, 1 Jul 2002 18:09:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Fussell", "Ronald M.", "" ] ]
cs/0207002
John A. Goldsmith
Mikhail Belkin and John Goldsmith
Using eigenvectors of the bigram graph to infer morpheme identity
null
null
null
null
cs.CL
null
This paper describes the results of some experiments exploring statistical methods to infer syntactic behavior of words and morphemes from a raw corpus in an unsupervised fashion. It shares certain points in common with Brown et al (1992) and work that has grown out of that: it employs statistical techniques to analyze syntactic behavior based on what words occur adjacent to a given word. However, we use an eigenvector decomposition of a nearest-neighbor graph to produce a two-dimensional rendering of the words of a corpus in which words of the same syntactic category tend to form neighborhoods. We exploit this technique for extending the value of automatic learning of morphology. In particular, we look at the suffixes derived from a corpus by unsupervised learning of morphology, and we ask which of these suffixes have a consistent syntactic function (e.g., in English, -tion is primarily a mark of nouns, but -s marks both noun plurals and 3rd person present on verbs), and we determine that this method works well for this task.
[ { "version": "v1", "created": "Tue, 2 Jul 2002 01:15:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Belkin", "Mikhail", "" ], [ "Goldsmith", "John", "" ] ]
cs/0207003
Yasuko Senda
Yasuko Senda, Yasusi Sinohara (Central Research Institute of Electric Power Industry, Japan)
Analysis of Titles and Readers For Title Generation Centered on the Readers
7 pages with 3 figures, uses colacl.sty, acl.bst, colaclsub.sty, narrowcaption.sty and narrowitem.sty
COLING'2002(The 19TH International Conference on Computational Linguistics)
null
null
cs.CL
null
The title of a document has two roles, to give a compact summary and to lead the reader to read the document. Conventional title generation focuses on finding key expressions from the author's wording in the document to give a compact summary and pays little attention to the reader's interest. To make the title play its second role properly, it is indispensable to clarify the content (``what to say'') and wording (``how to say'') of titles that are effective to attract the target reader's interest. In this article, we first identify typical content and wording of titles aimed at general readers in a comparative study between titles of technical papers and headlines rewritten for newspapers. Next, we describe the results of a questionnaire survey on the effects of the content and wording of titles on the reader's interest. The survey of general and knowledgeable readers shows both common and different tendencies in interest.
[ { "version": "v1", "created": "Tue, 2 Jul 2002 15:08:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Senda", "Yasuko", "", "Central Research Institute of Electric\n Power Industry, Japan" ], [ "Sinohara", "Yasusi", "", "Central Research Institute of Electric\n Power Industry, Japan" ] ]
cs/0207004
Jeff Erickson
Jeff Erickson and Sariel Har-Peled
Optimally cutting a surface into a disk
24 pages, 6 figures; full version of SOCG 2002 paper; see also http://www.cs.uiuc.edu/~jeffe/pubs/schema.html
null
null
null
cs.CG cs.DS cs.GR
null
We consider the problem of cutting a set of edges on a polyhedral manifold surface, possibly with boundary, to obtain a single topological disk, minimizing either the total number of cut edges or their total length. We show that this problem is NP-hard, even for manifolds without boundary and for punctured spheres. We also describe an algorithm with running time n^{O(g+k)}, where n is the combinatorial complexity, g is the genus, and k is the number of boundary components of the input surface. Finally, we describe a greedy algorithm that outputs a O(log^2 g)-approximation of the minimum cut graph in O(g^2 n log n) time.
[ { "version": "v1", "created": "Tue, 2 Jul 2002 22:03:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Erickson", "Jeff", "" ], [ "Har-Peled", "Sariel", "" ] ]
cs/0207005
Melanie Siegel
Melanie Siegel and Emily M. Bender
Efficient Deep Processing of Japanese
Proceedings of the 19th International Conference on Computational Linguistics
null
null
null
cs.CL
null
We present a broad coverage Japanese grammar written in the HPSG formalism with MRS semantics. The grammar is created for use in real world applications, such that robustness and performance issues play an important role. It is connected to a POS tagging and word segmentation tool. This grammar is being developed in a multilingual context, requiring MRS structures that are easily comparable across languages.
[ { "version": "v1", "created": "Wed, 3 Jul 2002 11:54:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Siegel", "Melanie", "" ], [ "Bender", "Emily M.", "" ] ]
cs/0207006
Wen Chen
W. Chen
Orthonormal RBF wavelet and ridgelet-like series and transforms for high-dimensional problems
null
Int. J. Nonlinear Sci. & Numer. Simulation, 2(2), 155-160, 2001
null
null
cs.SC
null
This paper developed a systematic strategy establishing RBF on the wavelet analysis, which includes continuous and discrete RBF orthonormal wavelet transforms respectively in terms of singular fundamental solutions and nonsingular general solutions of differential operators. In particular, the harmonic Bessel RBF transforms were presented for high-dimensional data processing. It was also found that the kernel functions of convection-diffusion operator are feasible to construct some stable ridgelet-like RBF transforms. We presented time-space RBF transforms based on non-singular solution and fundamental solution of time-dependent differential operators. The present methodology was further extended to analysis of some known RBFs such as the MQ, Gaussian and pre-wavelet kernel RBFs.
[ { "version": "v1", "created": "Wed, 3 Jul 2002 15:34:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0207007
Denis Popel
Denis V. Popel and Nawar Al-Hakeem
Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation
5 pages, 3 figures, 2 tables, ISSPIT'2001
ISSPIT'2001
null
null
cs.OH
null
This paper presents case-study results on the application of information theoretic approach to gate-level evolutionary circuit design. We introduce information measures to provide better estimates of synthesis criteria of digital circuits. For example, the analysis of signal propagation during evolving gate-level synthesis can be improved by using information theoretic measures that will make it possible to find the most effective geometry and therefore predict the cost of the final design solution. The problem is considered from the information engine point of view. That is, the process of evolutionary gate-level circuit design is presented via such measures as entropy, logical work and information vitality. Some examples of geometry driven synthesis are provided to prove the above idea.
[ { "version": "v1", "created": "Wed, 3 Jul 2002 16:59:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Popel", "Denis V.", "" ], [ "Al-Hakeem", "Nawar", "" ] ]
cs/0207008
Wiebe van der Hoek
F.S. de Boer, K.V. Hindriks, W. van der Hoek and J.-J.Ch. Meyer
Agent Programming with Declarative Goals
null
null
null
null
cs.AI cs.PL
null
A long and lasting problem in agent research has been to close the gap between agent logics and agent programming frameworks. The main reason for this problem of establishing a link between agent logics and agent programming frameworks is identified and explained by the fact that agent programming frameworks have not incorporated the concept of a `declarative goal'. Instead, such frameworks have focused mainly on plans or `goals-to-do' instead of the end goals to be realised which are also called `goals-to-be'. In this paper, a new programming language called GOAL is introduced which incorporates such declarative goals. The notion of a `commitment strategy' - one of the main theoretical insights due to agent logics, which explains the relation between beliefs and goals - is used to construct a computational semantics for GOAL. Finally, a proof theory for proving properties of GOAL agents is introduced. Thus, we offer a complete theory of agent programming in the sense that our theory provides both for a programming framework and a programming logic for such agents. An example program is proven correct by using this programming logic.
[ { "version": "v1", "created": "Wed, 3 Jul 2002 15:42:55 GMT" } ]
2007-05-23T00:00:00
[ [ "de Boer", "F. S.", "" ], [ "Hindriks", "K. V.", "" ], [ "van der Hoek", "W.", "" ], [ "Meyer", "J. -J. Ch.", "" ] ]
cs/0207009
Vince Grolmusz
Vince Grolmusz
Computing Elementary Symmetric Polynomials with a Sublinear Number of Multiplications
10 pages
null
null
null
cs.CC cs.DM cs.DS
null
Elementary symmetric polynomials $S_n^k$ are used as a benchmark for the bounded-depth arithmetic circuit model of computation. In this work we prove that $S_n^k$ modulo composite numbers $m=p_1p_2$ can be computed with much fewer multiplications than over any field, if the coefficients of monomials $x_{i_1}x_{i_2}... x_{i_k}$ are allowed to be 1 either mod $p_1$ or mod $p_2$ but not necessarily both. More exactly, we prove that for any constant $k$ such a representation of $S_n^k$ can be computed modulo $p_1p_2$ using only $\exp(O(\sqrt{\log n}\log\log n))$ multiplications on the most restricted depth-3 arithmetic circuits, for $\min({p_1,p_2})>k!$. Moreover, the number of multiplications remain sublinear while $k=O(\log\log n).$ In contrast, the well-known Graham-Pollack bound yields an $n-1$ lower bound for the number of multiplications even for the exact computation (not the representation) of $S_n^2$. Our results generalize for other non-prime power composite moduli as well. The proof uses the famous BBR-polynomial of Barrington, Beigel and Rudich.
[ { "version": "v1", "created": "Wed, 3 Jul 2002 14:32:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Grolmusz", "Vince", "" ] ]
cs/0207010
Wen Chen
W. Chen
Symmetric boundary knot method
null
Engng. Anal. Bound. Elem., 26(6), 489-494, 2002
null
null
cs.CE cs.CG
null
The boundary knot method (BKM) is a recent boundary-type radial basis function (RBF) collocation scheme for general PDEs. Like the method of fundamental solution (MFS), the RBF is employed to approximate the inhomogeneous terms via the dual reciprocity principle. Unlike the MFS, the method uses a nonsingular general solution instead of a singular fundamental solution to evaluate the homogeneous solution so as to circumvent the controversial artificial boundary outside the physical domain. The BKM is meshfree, superconvergent, integration free, very easy to learn and program. The original BKM, however, loses symmetricity in the presense of mixed boundary. In this study, by analogy with Hermite RBF interpolation, we developed a symmetric BKM scheme. The accuracy and efficiency of the symmetric BKM are also numerically validated in some 2D and 3D Helmholtz and diffusion reaction problems under complicated geometries.
[ { "version": "v1", "created": "Wed, 3 Jul 2002 20:17:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0207011
Denis Popel
Denis V. Popel and Nawar Al-Hakeem
Improving Web Database Access Using Decision Diagrams
7 pages, 7 figures, 3 tables, AICCSA'01
null
null
null
cs.LO cs.DB
null
In some areas of management and commerce, especially in Electronic commerce (E-commerce), that are accelerated by advances in Web technologies, it is essential to support the decision making process using formal methods. Among the problems of E-commerce applications: reducing the time of data access so that huge databases can be searched quickly; decreasing the cost of database design ... etc. We present the application of Decision Diagrams design using Information Theory approach to improve database access speeds. We show that such utilization provides systematic and visual ways of applying Decision Making methods to simplify complex Web engineering problems.
[ { "version": "v1", "created": "Thu, 4 Jul 2002 04:09:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Popel", "Denis V.", "" ], [ "Al-Hakeem", "Nawar", "" ] ]
cs/0207012
Denis Popel
Denis V. Popel
Synthesis of Low-Power Digital Circuits Derived from Binary Decision Diagrams
4 pages, 3 figures, 1 table, ECCTD'01
ECCTD 2001
null
null
cs.AR
null
This paper introduces a novel method for synthesizing digital circuits derived from Binary Decision Diagrams (BDDs) that can yield to reduction in power dissipation. The power reduction is achieved by decreasing the switching activity in a circuit while paying close attention to information measures as an optimization criterion. We first present the technique of efficient BDD-based computation of information measures which are used to guide the power optimization procedures. Using this technique, we have developed an algorithm of BDD reordering which leads to reducing the power consumption of the circuits derived from BDDs. Results produced by the synthesis on the ISCAS benchmark circuits are very encouraging.
[ { "version": "v1", "created": "Thu, 4 Jul 2002 04:30:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Popel", "Denis V.", "" ] ]
cs/0207013
Denis Popel
Denis V. Popel
A Compact Graph Model of Handwritten Images: Integration into Authentification and Recognition
9 pages, 6 figures, 1 tables, SSPR'02
SSPR 2002
null
null
cs.HC cs.DS
null
A novel algorithm for creating a mathematical model of curved shapes is introduced. The core of the algorithm is based on building a graph representation of the contoured image, which occupies less storage space than produced by raster compression techniques. Different advanced applications of the mathematical model are discussed: recognition of handwritten characters and verification of handwritten text and signatures for authentification purposes. Reducing the storage requirements due to the efficient mathematical model results in faster retrieval and processing times. The experimental outcomes in compression of contoured images and recognition of handwritten numerals are given.
[ { "version": "v1", "created": "Thu, 4 Jul 2002 16:02:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Popel", "Denis V.", "" ] ]
cs/0207014
Denis Popel
Denis V. Popel and Nawar Al-Hakeem
On the Information Engine of Circuit Design
4 pages, 1 figure, 2 tables, MWSCAS'02
MWSCAS 2002
null
null
cs.AR
null
This paper addresses a new approach to find a spectrum of information measures for the process of digital circuit synthesis. We consider the problem from the information engine point of view. The circuit synthesis as a whole and different steps of the design process (an example of decision diagram is given) are presented via such measurements as entropy, logical work and information vitality. We also introduce new information measures to provide better estimates of synthesis criteria. We show that the basic properties of information engine, such as the conservation law of information flow and the equilibrium law of information can be formulated.
[ { "version": "v1", "created": "Thu, 4 Jul 2002 04:55:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Popel", "Denis V.", "" ], [ "Al-Hakeem", "Nawar", "" ] ]
cs/0207015
Wen Chen
W. Chen, M. Tanaka
New advances in dual reciprocity and boundary-only RBF methods
null
null
null
Proc. of BEM technique confer., Vol. 10, 17-22, Tokyo, Japan, 2000
cs.CE cs.CG
null
This paper made some significant advances in the dual reciprocity and boundary-only RBF techniques. The proposed boundary knot method (BKM) is different from the standard boundary element method in a number of important aspects. Namely, it is truly meshless, exponential convergence, integration-free (of course, no singular integration), boundary-only for general problems, and leads to symmetric matrix under certain conditions (able to be extended to general cases after further modified). The BKM also avoids the artificial boundary in the method of fundamental solution. An amazing finding is that the BKM can formulate linear modeling equations for nonlinear partial differential systems with linear boundary conditions. This merit makes it circumvent all perplexing issues in the iteration solution of nonlinear equations. On the other hand, by analogy with Green's second identity, this paper also presents a general solution RBF (GSR) methodology to construct efficient RBFs in the dual reciprocity and domain-type RBF collocation methods. The GSR approach first establishes an explicit relationship between the BEM and RBF itself on the ground of the weighted residual principle. This paper also discusses the RBF convergence and stability problems within the framework of integral equation theory.
[ { "version": "v1", "created": "Thu, 4 Jul 2002 12:10:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ], [ "Tanaka", "M.", "" ] ]
cs/0207016
Wen Chen
W. Chen, M. Tanaka
Relationship between boundary integral equation and radial basis function
null
null
null
JASCOME 57th BEM Confer., 30 Sept. 2000
cs.CE cs.CG
null
This paper aims to survey our recent work relating to the radial basis function (RBF) from some new views of points. In the first part, we established the RBF on numerical integration analysis based on an intrinsic relationship between the Green's boundary integral representation and RBF. It is found that the kernel function of integral equation is important to create efficient RBF. The fundamental solution RBF (FS-RBF) was presented as a novel strategy constructing operator-dependent RBF. We proposed a conjecture formula featuring the dimension affect on error bound to show the independent-dimension merit of the RBF techniques. We also discussed wavelet RBF, localized RBF schemes, and the influence of node placement on the RBF solution accuracy. The centrosymmetric matrix structure of the RBF interpolation matrix under symmetric node placing is proved. The second part of this paper is concerned with the boundary knot method (BKM), a new boundary-only, meshless, spectral convergent, integration-free RBF collocation technique. The BKM was tested to the Helmholtz, Laplace, linear and nonlinear convection-diffusion problems. In particular, we introduced the response knot-dependent nonsingular general solution to calculate varying-parameter and nonlinear steady convection-diffusion problems very efficiently. By comparing with the multiple dual reciprocity method, we discussed the completeness issue of the BKM. Finally, the nonsingular solutions for some known differential operators were given in appendix. Also we expanded the RBF concepts by introducing time-space RBF for transient problems.
[ { "version": "v1", "created": "Thu, 4 Jul 2002 12:15:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ], [ "Tanaka", "M.", "" ] ]
cs/0207017
Wen Chen
W. Chen, M. Tanaka
New Insights in Boundary-only and Domain-type RBF Methods
null
J. Nonlinear Sci. & Numer. Simulation, 1(3), 145-151, 2000
null
null
cs.CE cs.CG
null
This paper has made some significant advances in the boundary-only and domain-type RBF techniques. The proposed boundary knot method (BKM) is different from the standard boundary element method in a number of important aspects. Namely, it is truly meshless, exponential convergence, integration-free (of course, no singular integration), boundary-only for general problems, and leads to symmetric matrix under certain conditions (able to be extended to general cases after further modified). The BKM also avoids the artificial boundary in the method of fundamental solution. An amazing finding is that the BKM can formulate linear modeling equations for nonlinear partial differential systems with linear boundary conditions. This merit makes it circumvent all perplexing issues in the iteration solution of nonlinear equations. On the other hand, by analogy with Green's second identity, we also presents a general solution RBF (GSR) methodology to construct efficient RBFs in the domain-type RBF collocation method and dual reciprocity method. The GSR approach first establishes an explicit relationship between the BEM and RBF itself on the ground of the potential theory. This paper also discusses some essential issues relating to the RBF computing, which include time-space RBFs, direct and indirect RBF schemes, finite RBF method, and the application of multipole and wavelet to the RBF solution of the PDEs.
[ { "version": "v1", "created": "Thu, 4 Jul 2002 12:18:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ], [ "Tanaka", "M.", "" ] ]
cs/0207018
Wen Chen
W. Chen
Definitions of distance function in radial basis function approach
null
null
null
null
cs.CE cs.CG
null
Very few studies involve how to construct the efficient RBFs by means of problem features. Recently the present author presented general solution RBF (GS-RBF) methodology to create operator-dependent RBFs successfully [1]. On the other hand, the normal radial basis function (RBF) is defined via Euclidean space distance function or the geodesic distance [2]. This purpose of this note is to redefine distance function in conjunction with problem features, which include problem-dependent and time-space distance function.
[ { "version": "v1", "created": "Thu, 4 Jul 2002 12:20:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0207021
Piero A. Bonatti
Piero A. Bonatti
Abduction, ASP and Open Logic Programs
7 pages, NMR'02 Workshop
null
null
null
cs.AI
null
Open logic programs and open entailment have been recently proposed as an abstract framework for the verification of incomplete specifications based upon normal logic programs and the stable model semantics. There are obvious analogies between open predicates and abducible predicates. However, despite superficial similarities, there are features of open programs that have no immediate counterpart in the framework of abduction and viceversa. Similarly, open programs cannot be immediately simulated with answer set programming (ASP). In this paper we start a thorough investigation of the relationships between open inference, abduction and ASP. We shall prove that open programs generalize the other two frameworks. The generalized framework suggests interesting extensions of abduction under the generalized stable model semantics. In some cases, we will be able to reduce open inference to abduction and ASP, thereby estimating its computational complexity. At the same time, the aforementioned reduction opens the way to new applications of abduction and ASP.
[ { "version": "v1", "created": "Sun, 7 Jul 2002 09:55:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Bonatti", "Piero A.", "" ] ]
cs/0207022
Mehdi Dastani
Mehdi Dastani and Leendert van der Torre
What is a Joint Goal? Games with Beliefs and Defeasible Desires
8 pages
Proceedings of NMR02, Toulouse, 2002
null
null
cs.MA cs.GT
null
In this paper we introduce a qualitative decision and game theory based on belief (B) and desire (D) rules. We show that a group of agents acts as if it is maximizing achieved joint goals.
[ { "version": "v1", "created": "Sun, 7 Jul 2002 11:26:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Dastani", "Mehdi", "" ], [ "van der Torre", "Leendert", "" ] ]
cs/0207023
Tran Cao Son
Tran Cao Son, Chitta Baral, Nam Tran, and Sheila McIlraith
Domain-Dependent Knowledge in Answer Set Planning
70 pages, accepted for publication, TOCL Version with all proofs
null
null
null
cs.AI
null
In this paper we consider three different kinds of domain-dependent control knowledge (temporal, procedural and HTN-based) that are useful in planning. Our approach is declarative and relies on the language of logic programming with answer set semantics (AnsProlog*). AnsProlog* is designed to plan without control knowledge. We show how temporal, procedural and HTN-based control knowledge can be incorporated into AnsProlog* by the modular addition of a small number of domain-dependent rules, without the need to modify the planner. We formally prove the correctness of our planner, both in the absence and presence of the control knowledge. Finally, we perform some initial experimentation that demonstrates the potential reduction in planning time that can be achieved when procedural domain knowledge is used to solve planning problems with large plan length.
[ { "version": "v1", "created": "Mon, 8 Jul 2002 00:31:54 GMT" }, { "version": "v2", "created": "Mon, 29 Aug 2005 20:46:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Son", "Tran Cao", "" ], [ "Baral", "Chitta", "" ], [ "Tran", "Nam", "" ], [ "McIlraith", "Sheila", "" ] ]
cs/0207024
Paul E. Dunne
Paul E. Dunne
On Concise Encodings of Preferred Extensions
Proc. 9th Worskhop on Non-monotonic reasoning, Toulouse, 2002 (NMR'02) (7 pages)
null
null
Dept. of Comp. Sci., Univ. of Liverpool, Tech. Report ULCS-02-003
cs.AI cs.CC cs.DS
null
Much work on argument systems has focussed on preferred extensions which define the maximal collectively defensible subsets. Identification and enumeration of these subsets is (under the usual assumptions) computationally demanding. We consider approaches to deciding if a subset S is a preferred extension which query a representations encoding all such extensions, so that the computational effort is invested once only (for the initial enumeration) rather than for each separate query.
[ { "version": "v1", "created": "Mon, 8 Jul 2002 13:24:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Dunne", "Paul E.", "" ] ]
cs/0207025
Sylvie Doutre
C. Cayrol, S. Doutre, M.-C. Lagasquie-Schiex, J. Mengin
"Minimal defence": a refinement of the preferred semantics for argumentation frameworks
8 pages, 3 figures
Proceedings of the 9th International Workshop on Non-Monotonic Reasoning, 2002, pp. 408-415
null
null
cs.AI
null
Dung's abstract framework for argumentation enables a study of the interactions between arguments based solely on an ``attack'' binary relation on the set of arguments. Various ways to solve conflicts between contradictory pieces of information have been proposed in the context of argumentation, nonmonotonic reasoning or logic programming, and can be captured by appropriate semantics within Dung's framework. A common feature of these semantics is that one can always maximize in some sense the set of acceptable arguments. We propose in this paper to extend Dung's framework in order to allow for the representation of what we call ``restricted'' arguments: these arguments should only be used if absolutely necessary, that is, in order to support other arguments that would otherwise be defeated. We modify Dung's preferred semantics accordingly: a set of arguments becomes acceptable only if it contains a minimum of restricted arguments, for a maximum of unrestricted arguments.
[ { "version": "v1", "created": "Mon, 8 Jul 2002 13:30:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Cayrol", "C.", "" ], [ "Doutre", "S.", "" ], [ "Lagasquie-Schiex", "M. -C.", "" ], [ "Mengin", "J.", "" ] ]
cs/0207026
Hsueh-I. Lu
Michael H. Goldwasser, Ming-Yang Kao, Hsueh-I Lu
Linear-Time Algorithms for Computing Maximum-Density Sequence Segments with Bioinformatics Applications
23 pages, 13 figures. A significant portion of these results appeared under the title, "Fast Algorithms for Finding Maximum-Density Segments of a Sequence with Applications to Bioinformatics," in Proceedings of the Second Workshop on Algorithms in Bioinformatics (WABI), volume 2452 of Lecture Notes in Computer Science (Springer-Verlag, Berlin), R. Guigo and D. Gusfield editors, 2002, pp. 157--171
Journal of Computer and System Sciences, 70(2):128-144, 2005
10.1016/j.jcss.2004.08.001
null
cs.DS cs.DM
null
We study an abstract optimization problem arising from biomolecular sequence analysis. For a sequence A of pairs (a_i,w_i) for i = 1,..,n and w_i>0, a segment A(i,j) is a consecutive subsequence of A starting with index i and ending with index j. The width of A(i,j) is w(i,j) = sum_{i <= k <= j} w_k, and the density is (sum_{i<= k <= j} a_k)/ w(i,j). The maximum-density segment problem takes A and two values L and U as input and asks for a segment of A with the largest possible density among those of width at least L and at most U. When U is unbounded, we provide a relatively simple, O(n)-time algorithm, improving upon the O(n \log L)-time algorithm by Lin, Jiang and Chao. When both L and U are specified, there are no previous nontrivial results. We solve the problem in O(n) time if w_i=1 for all i, and more generally in O(n+n\log(U-L+1)) time when w_i>=1 for all i.
[ { "version": "v1", "created": "Mon, 8 Jul 2002 14:45:49 GMT" }, { "version": "v2", "created": "Mon, 4 Nov 2002 18:04:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldwasser", "Michael H.", "" ], [ "Kao", "Ming-Yang", "" ], [ "Lu", "Hsueh-I", "" ] ]
cs/0207028
Kamal Jain
Kamal Jain and Mohammad Mahdian and Evangelos Markakis and Amin Saberi and Vijay V. Vazirani
Greedy Facility Location Algorithms Analyzed using Dual Fitting with Factor-Revealing LP
28 pages, 2 figures, 4 tables, abstract appeared in STOC 2002 Montreal
null
null
null
cs.DS cs.GT
null
In this paper, we will formalize the method of dual fitting and the idea of factor-revealing LP. This combination is used to design and analyze two greedy algorithms for the metric uncapacitated facility location problem. Their approximation factors are 1.861 and 1.61, with running times of O(mlog m) and O(n^3), respectively, where n is the total number of vertices and m is the number of edges in the underlying complete bipartite graph between cities and facilities. The algorithms are used to improve recent results for several variants of the problem.
[ { "version": "v1", "created": "Tue, 9 Jul 2002 00:29:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "Kamal", "" ], [ "Mahdian", "Mohammad", "" ], [ "Markakis", "Evangelos", "" ], [ "Saberi", "Amin", "" ], [ "Vazirani", "Vijay V.", "" ] ]
cs/0207029
Alexander Bochman
Alexander Bochman
Two Representations for Iterative Non-prioritized Change
7 pages,Proceedings NMR'02, references added
null
null
null
cs.AI
null
We address a general representation problem for belief change, and describe two interrelated representations for iterative non-prioritized change: a logical representation in terms of persistent epistemic states, and a constructive representation in terms of flocks of bases.
[ { "version": "v1", "created": "Tue, 9 Jul 2002 12:32:45 GMT" }, { "version": "v2", "created": "Sun, 14 Jul 2002 16:26:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Bochman", "Alexander", "" ] ]
cs/0207030
Alexander Bochman
Alexander Bochman
Collective Argumentation
8 pages, Proceedings NMR'02, references added
null
null
null
cs.AI
null
An extension of an abstract argumentation framework, called collective argumentation, is introduced in which the attack relation is defined directly among sets of arguments. The extension turns out to be suitable, in particular, for representing semantics of disjunctive logic programs. Two special kinds of collective argumentation are considered in which the opponents can share their arguments.
[ { "version": "v1", "created": "Tue, 9 Jul 2002 12:42:24 GMT" }, { "version": "v2", "created": "Sun, 14 Jul 2002 16:21:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Bochman", "Alexander", "" ] ]
cs/0207031
Henry Prakken
Henry Prakken
Intuitions and the modelling of defeasible reasoning: some case studies
Proceedings of the 9th International Workshop on Non-Monotonic Reasoning (NMR'2002), Toulouse, France, April 19-21, 2002
null
null
null
cs.AI cs.LO
null
The purpose of this paper is to address some criticisms recently raised by John Horty in two articles against the validity of two commonly accepted defeasible reasoning patterns, viz. reinstatement and floating conclusions. I shall argue that Horty's counterexamples, although they significantly raise our understanding of these reasoning patterns, do not show their invalidity. Some of them reflect patterns which, if made explicit in the formalisation, avoid the unwanted inference without having to give up the criticised inference principles. Other examples seem to involve hidden assumptions about the specific problem which, if made explicit, are nothing but extra information that defeat the defeasible inference. These considerations will be put in a wider perspective by reflecting on the nature of defeasible reasoning principles as principles of justified acceptance rather than `real' logical inference.
[ { "version": "v1", "created": "Tue, 9 Jul 2002 14:16:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Prakken", "Henry", "" ] ]
cs/0207033
Wen Chen
W Chen, Xinwei Wang, Yongxi Yu
Reducing the Computational Requirements of the Differential Quadrature Method
null
Numerical Methods for Partial Differential Equations, 12, 565-577, 1996
null
null
cs.CE cs.CG
null
This paper shows that the weighting coefficient matrices of the differential quadrature method (DQM) are centrosymmetric or skew-centrosymmetric if the grid spacings are symmetric irrespective of whether they are equal or unequal. A new skew centrosymmetric matrix is also discussed. The application of the properties of centrosymmetric and skew centrosymmetric matrix can reduce the computational effort of the DQM for calculations of the inverse, determinant, eigenvectors and eigenvalues by 75%. This computational advantage are also demonstrated via several numerical examples.
[ { "version": "v1", "created": "Tue, 9 Jul 2002 19:53:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W", "" ], [ "Wang", "Xinwei", "" ], [ "Yu", "Yongxi", "" ] ]
cs/0207035
Wen Chen
W. Chen, Tingxiu Zhong
A Lyapunov Formulation for Efficient Solution of the Poisson and Convection-Diffusion Equations by the Differential Quadrature Method
null
J. of Computational Physics, 139, 1-7, 1998
null
null
cs.CE cs.CG
null
Civan and Sliepcevich [1, 2] suggested that special matrix solver should be developed to further reduce the computing effort in applying the differential quadrature (DQ) method for the Poisson and convection-diffusion equations. Therefore, the purpose of the present communication is to introduce and apply the Lyapunov formulation which can be solved much more efficiently than the Gaussian elimination method. Civan and Sliepcevich [2] first presented DQ approximate formulas in polynomial form for partial derivatives in tow-dimensional variable domain. For simplifying formulation effort, Chen et al. [3] proposed the compact matrix form of these DQ approximate formulas. In this study, by using these matrix approximate formulas, the DQ formulations for the Poisson and convection-diffusion equations can be expressed as the Lyapunov algebraic matrix equation. The formulation effort is simplified, and a simple and explicit matrix formulation is obtained. A variety of fast algorithms in the solution of the Lyapunov equation [4-6] can be successfully applied in the DQ analysis of these two-dimensional problems, and, thus, the computing effort can be greatly reduced. Finally, we also point out that the present reduction technique can be easily extended to the three-dimensional cases.
[ { "version": "v1", "created": "Tue, 9 Jul 2002 20:26:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ], [ "Zhong", "Tingxiu", "" ] ]
cs/0207036
Nicholas Allen
N. Allen and T. Terriberry
System Description for a Scalable, Fault-Tolerant, Distributed Garbage Collector
47 pages, LaTeX
null
null
null
cs.DC
null
We describe an efficient and fault-tolerant algorithm for distributed cyclic garbage collection. The algorithm imposes few requirements on the local machines and allows for flexibility in the choice of local collector and distributed acyclic garbage collector to use with it. We have emphasized reducing the number and size of network messages without sacrificing the promptness of collection throughout the algorithm. Our proposed collector is a variant of back tracing to avoid extensive synchronization between machines. We have added an explicit forward tracing stage to the standard back tracing stage and designed a tuned heuristic to reduce the total amount of work done by the collector. Of particular note is the development of fault-tolerant cooperation between traces and a heuristic that aggressively reduces the set of suspect objects.
[ { "version": "v1", "created": "Wed, 10 Jul 2002 00:53:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Allen", "N.", "" ], [ "Terriberry", "T.", "" ] ]
cs/0207037
Samir Chopra
Samir Chopra, Johannes Heidema, Thomas Meyer
Some logics of belief and disbelief
null
null
null
null
cs.AI cs.LO
null
The introduction of explicit notions of rejection, or disbelief, into logics for knowledge representation can be justified in a number of ways. Motivations range from the need for versions of negation weaker than classical negation, to the explicit recording of classic belief contraction operations in the area of belief change, and the additional levels of expressivity obtained from an extended version of belief change which includes disbelief contraction. In this paper we present four logics of disbelief which address some or all of these intuitions. Soundness and completeness results are supplied and the logics are compared with respect to applicability and utility.
[ { "version": "v1", "created": "Wed, 10 Jul 2002 02:16:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Chopra", "Samir", "" ], [ "Heidema", "Johannes", "" ], [ "Meyer", "Thomas", "" ] ]
cs/0207038
Samir Chopra
Samir Chopra, Aditya Ghose, Thomas Meyer
Iterated revision and the axiom of recovery: a unified treatment via epistemic states
null
null
null
null
cs.AI cs.LO
null
The axiom of recovery, while capturing a central intuition regarding belief change, has been the source of much controversy. We argue briefly against putative counterexamples to the axiom--while agreeing that some of their insight deserves to be preserved--and present additional recovery-like axioms in a framework that uses epistemic states, which encode preferences, as the object of revisions. This provides a framework in which iterated revision becomes possible and makes explicit the connection between iterated belief change and the axiom of recovery. We provide a representation theorem that connects the semantic conditions that we impose on iterated revision and the additional syntactical properties mentioned. We also show some interesting similarities between our framework and that of Darwiche-Pearl. In particular, we show that the intuitions underlying the controversial (C2) postulate are captured by the recovery axiom and our recovery-like postulates (the latter can be seen as weakenings of (C2).
[ { "version": "v1", "created": "Wed, 10 Jul 2002 02:31:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Chopra", "Samir", "" ], [ "Ghose", "Aditya", "" ], [ "Meyer", "Thomas", "" ] ]
cs/0207039
Wen Chen
Masataka Tanaka, W Chen
Dual reciprocity BEM and dynamic programming filter for inverse elastodynamic problems
null
Transactions of the Japan Society for Computational Engineering and Science, 2, 20000003, 2000
null
null
cs.CE cs.CG
null
This paper presents the first coupling application of the dual reciprocity BEM (DRBEM) and dynamic programming filter to inverse elastodynamic problem. The DRBEM is the only BEM method, which does not require domain discretization for general linear and nonlinear dynamic problems. Since the size of numerical discretization system has a great effect on the computing effort of recursive or iterative calculations of inverse analysis, the intrinsic boundary-only merit of the DRBEM causes a considerable computational saving. On the other hand, the strengths of the dynamic programming filter lie in its mathematical simplicity, easy to program and great flexibility in the type, number and locations of measurements and unknown inputs. The combination of these two techniques is therefore very attractive for the solution of practical inverse problems. In this study, the spatial and temporal partial derivatives of the governing equation are respectively discretized first by the DRBEM and the precise integration method, and then, by using dynamic programming with regularization, dynamic load is estimated based on noisy measurements of velocity and displacement at very few locations. Numerical experiments involved with the periodic and Heaviside impact load are conducted to demonstrate the applicability, efficiency and simplicity of this strategy. The affect of noise level, regularization parameter, and measurement types on the estimation is also investigated.
[ { "version": "v1", "created": "Wed, 10 Jul 2002 08:00:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Tanaka", "Masataka", "" ], [ "Chen", "W", "" ] ]
cs/0207040
Ralf Schweimeier
Ralf Schweimeier and Michael Schroeder
Well-Founded Argumentation Semantics for Extended Logic Programming
Workshop on Non-Monotonic Reasoning NMR'02, Special Session on Argument, Dialogue, and Decision
null
null
null
cs.LO cs.AI
null
This paper defines an argumentation semantics for extended logic programming and shows its equivalence to the well-founded semantics with explicit negation. We set up a general framework in which we extensively compare this semantics to other argumentation semantics, including those of Dung, and Prakken and Sartor. We present a general dialectical proof theory for these argumentation semantics.
[ { "version": "v1", "created": "Wed, 10 Jul 2002 10:22:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Schweimeier", "Ralf", "" ], [ "Schroeder", "Michael", "" ] ]
cs/0207041
Wen Chen
W. Chen
RBF-based meshless boundary knot method and boundary particle method
null
null
null
Proc. of the China Congress on Computational Mechanics's 2001, pp. 319-326, Guangzhou, China, Dec. 2001
cs.CE cs.CG
null
This paper is concerned with the two new boundary-type radial basis function collocation schemes, boundary knot method (BKM) and boundary particle method (BPM). The BKM is developed based on the dual reciprocity theorem, while the BPM employs the multiple reciprocity technique. Unlike the method of fundamental solution, the wto methods use the nonsingular general solutions instead of singular fundamental solution to circumvent the controversial artificial boundary outside physical domain. Compared with the boundary element method, both the BKM and BPM are meshfree, superconvergent, meshfree, integration free, symmetric, and mathematically simple collocation techniques for general PDEs. In particular, the BPM does not require any inner nodes for inhomogeneous problems. In this study, the accuracy and efficiency of the two methods are numerically demonstrated to some 2D, 3D Helmholtz and convection-diffusion problems under complicated geometries.
[ { "version": "v1", "created": "Wed, 10 Jul 2002 20:31:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0207042
Gerhard Brewka
Gerhard Brewka
Logic Programming with Ordered Disjunction
null
null
null
null
cs.AI
null
Logic programs with ordered disjunction (LPODs) combine ideas underlying Qualitative Choice Logic (Brewka et al. KR 2002) and answer set programming. Logic programming under answer set semantics is extended with a new connective called ordered disjunction. The new connective allows us to represent alternative, ranked options for problem solutions in the heads of rules: A \times B intuitively means: if possible A, but if A is not possible then at least B. The semantics of logic programs with ordered disjunction is based on a preference relation on answer sets. LPODs are useful for applications in design and configuration and can serve as a basis for qualitative decision making.
[ { "version": "v1", "created": "Thu, 11 Jul 2002 11:03:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Brewka", "Gerhard", "" ] ]
cs/0207043
Wen Chen
W. Chen, M. Tanaka
A meshless, integration-free, and boundary-only RBF technique
null
Computers and Mathematics with Applications, 43, 379-391, 2002
null
null
cs.CE cs.CG
null
Based on the radial basis function (RBF), non-singular general solution and dual reciprocity method (DRM), this paper presents an inherently meshless, integration-free, boundary-only RBF collocation techniques for numerical solution of various partial differential equation systems. The basic ideas behind this methodology are very mathematically simple. In this study, the RBFs are employed to approximate the inhomogeneous terms via the DRM, while non-singular general solution leads to a boundary-only RBF formulation for homogenous solution. The present scheme is named as the boundary knot method (BKM) to differentiate it from the other numerical techniques. In particular, due to the use of nonsingular general solutions rather than singular fundamental solutions, the BKM is different from the method of fundamental solution in that the former does no require the artificial boundary and results in the symmetric system equations under certain conditions. The efficiency and utility of this new technique are validated through a number of typical numerical examples. Completeness concern of the BKM due to the only use of non-singular part of complete fundamental solution is also discussed.
[ { "version": "v1", "created": "Thu, 11 Jul 2002 12:19:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ], [ "Tanaka", "M.", "" ] ]
cs/0207044
Alexandre Tessier
Ulrich Neumerkel, Stefan Kral
Declarative program development in Prolog with GUPU
10 pages; Alexandre Tessier, editor; WLPE 2002, http://xxx.lanl.gov/html/cs/0207052
null
null
null
cs.SE
null
We present GUPU, a side-effect free environment specialized for programming courses. It seamlessly guides and supports students during all phases of program development, covering specification, implementation, and program debugging. GUPU features several innovations in this area. The specification phase is supported by reference implementations augmented with diagnostic facilities. During implementation, immediate feedback from test cases and from visualization tools helps the programmer's program understanding. A set of slicing techniques narrows down programming errors. The whole process is guided by a marking system.
[ { "version": "v1", "created": "Thu, 11 Jul 2002 16:57:59 GMT" }, { "version": "v2", "created": "Fri, 12 Jul 2002 00:53:41 GMT" }, { "version": "v3", "created": "Wed, 17 Jul 2002 14:59:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Neumerkel", "Ulrich", "" ], [ "Kral", "Stefan", "" ] ]
cs/0207045
Pierre Marquis
Adnan Darwiche and Pierre Marquis
Compilation of Propositional Weighted Bases
Proceedings of the Ninth International Workshop on Non-Monotonic Reasoning (NMR'02), Toulouse, 2002 (6-14)
null
null
null
cs.AI
null
In this paper, we investigate the extent to which knowledge compilation can be used to improve inference from propositional weighted bases. We present a general notion of compilation of a weighted base that is parametrized by any equivalence--preserving compilation function. Both negative and positive results are presented. On the one hand, complexity results are identified, showing that the inference problem from a compiled weighted base is as difficult as in the general case, when the prime implicates, Horn cover or renamable Horn cover classes are targeted. On the other hand, we show that the inference problem becomes tractable whenever DNNF-compilations are used and clausal queries are considered. Moreover, we show that the set of all preferred models of a DNNF-compilation of a weighted base can be computed in time polynomial in the output size. Finally, we sketch how our results can be used in model-based diagnosis in order to compute the most probable diagnoses of a system.
[ { "version": "v1", "created": "Thu, 11 Jul 2002 16:11:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Darwiche", "Adnan", "" ], [ "Marquis", "Pierre", "" ] ]
cs/0207046
Alexandre Tessier
Samir Ouis, Narendra Jussien, Patrice Boizumault
COINS: a constraint-based interactive solving system
15 pages; Alexandre Tessier, editor; WLPE 2002, http://xxx.lanl.gov/abs/cs.SE/0207052
null
null
null
cs.SE
null
This paper describes the COINS (COnstraint-based INteractive Solving) system: a conflict-based constraint solver. It helps understanding inconsistencies, simulates constraint additions and/or retractions (without any propagation), determines if a given constraint belongs to a conflict and provides diagnosis tools (e.g. why variable v cannot take value val). COINS also uses user-friendly representation of conflicts and explanations.
[ { "version": "v1", "created": "Thu, 11 Jul 2002 16:25:20 GMT" }, { "version": "v2", "created": "Fri, 12 Jul 2002 00:35:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Ouis", "Samir", "" ], [ "Jussien", "Narendra", "" ], [ "Boizumault", "Patrice", "" ] ]
cs/0207047
Alexandre Tessier
Magnus Agren, Tamas Szeredi, Nicolas Beldiceanu, Mats Carlsson
Tracing and Explaining Execution of CLP(FD) Programs
16 pages; Alexandre Tessier, editor; WLPE 2002, http://xxx.lanl.gov/abs/cs.SE/0207052
null
null
null
cs.SE
null
Previous work in the area of tracing CLP(FD) programs mainly focuses on providing information about control of execution and domain modification. In this paper, we present a trace structure that provides information about additional important aspects. We incorporate explanations in the trace structure, i.e. reasons for why certain solver actions occur. Furthermore, we come up with a format for describing the execution of the filtering algorithms of global constraints. Some new ideas about the design of the trace are also presented. For example, we have modeled our trace as a nested block structure in order to achieve a hierarchical view. Also, new ways about how to represent and identify different entities such as constraints and domain variables are presented.
[ { "version": "v1", "created": "Thu, 11 Jul 2002 16:43:30 GMT" }, { "version": "v2", "created": "Fri, 12 Jul 2002 00:43:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Agren", "Magnus", "" ], [ "Szeredi", "Tamas", "" ], [ "Beldiceanu", "Nicolas", "" ], [ "Carlsson", "Mats", "" ] ]
cs/0207048
Alexandre Tessier
Francois Fages
CLPGUI: a generic graphical user interface for constraint logic programming over finite domains
16 pages; Alexandre Tessier, editor; WLPE 2002, http://xxx.lanl.gov/abs/cs.SE/0207052
null
null
null
cs.SE
null
CLPGUI is a graphical user interface for visualizing and interacting with constraint logic programs over finite domains. In CLPGUI, the user can control the execution of a CLP program through several views of constraints, of finite domain variables and of the search tree. CLPGUI is intended to be used both for teaching purposes, and for debugging and improving complex programs of realworld scale. It is based on a client-server architecture for connecting the CLP process to a Java-based GUI process. Communication by message passing provides an open architecture which facilitates the reuse of graphical components and the porting to different constraint programming systems. Arbitrary constraints and goals can be posted incrementally from the GUI. We propose several dynamic 2D and 3D visualizations of the search tree and of the evolution of finite domain variables. We argue that the 3D representation of search trees proposed in this paper provides the most appropriate visualization of large search trees. We describe the current implementation of the annotations and of the interactive execution model in GNU-Prolog, and report some evaluation results.
[ { "version": "v1", "created": "Thu, 11 Jul 2002 18:05:59 GMT" }, { "version": "v2", "created": "Fri, 12 Jul 2002 00:40:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Fages", "Francois", "" ] ]
cs/0207050
Alexandre Tessier
Willy Lesaint
Value withdrawal explanations: a theoretical tool for programming environments
14 pages; Alexandre Tessier, editor; WLPE 2002, http://xxx.lanl.gov/abs/cs.SE/0207052
null
null
null
cs.SE
null
Constraint logic programming combines declarativity and efficiency thanks to constraint solvers implemented for specific domains. Value withdrawal explanations have been efficiently used in several constraints programming environments but there does not exist any formalization of them. This paper is an attempt to fill this lack. Furthermore, we hope that this theoretical tool could help to validate some programming environments. A value withdrawal explanation is a tree describing the withdrawal of a value during a domain reduction by local consistency notions and labeling. Domain reduction is formalized by a search tree using two kinds of operators: operators for local consistency notions and operators for labeling. These operators are defined by sets of rules. Proof trees are built with respect to these rules. For each removed value, there exists such a proof tree which is the withdrawal explanation of this value.
[ { "version": "v1", "created": "Thu, 11 Jul 2002 16:52:49 GMT" }, { "version": "v2", "created": "Fri, 12 Jul 2002 00:48:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Lesaint", "Willy", "" ] ]
cs/0207051
Alexandre Tessier
Nicos Angelopoulos
Exporting Prolog source code
8 pages; Alexandre Tessier, editor; WLPE 2002, http://xxx.lanl.gov/abs/cs.SE/0207052
null
null
null
cs.SE
null
In this paper we present a simple source code configuration tool. ExLibris operates on libraries and can be used to extract from local libraries all code relevant to a particular project. Our approach is not designed to address problems arising in code production lines, but rather, to support the needs of individual or small teams of researchers who wish to communicate their Prolog programs. In the process, we also wish to accommodate and encourage the writing of reusable code. Moreover, we support and propose ways of dealing with issues arising in the development of code that can be run on a variety of like-minded Prolog systems. With consideration to these aims we have made the following decisions: (i) support file-based source development, (ii) require minimal program transformation, (iii) target simplicity of usage, and (iv) introduce minimum number of new primitives.
[ { "version": "v1", "created": "Thu, 11 Jul 2002 17:17:17 GMT" }, { "version": "v2", "created": "Fri, 12 Jul 2002 00:50:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Angelopoulos", "Nicos", "" ] ]
cs/0207052
Alexandre Tessier
Alexandre Tessier
Proceedings of the 12th International Workshop on Logic Programming Environments
10 refereed papers, 123 pages; Alexandre Tessier, editor; WLPE 2002
null
null
null
cs.SE
null
The twelfth Workshop on Logic Programming Environments, WLPE 2002, is one in a series of international workshops held in the topic area. The workshops facilitate the exchange ideas and results among researchers and system developers on all aspects of environments for logic programming. Relevant topics for these workshops include user interfaces, human engineering, execution visualization, development tools, providing for new paradigms, and interfacing to language system tools and external systems. This twelfth workshop held in Copenhaguen. It follows the successful eleventh Workshop on Logic Programming Environments held in Cyprus in December, 2001. WLPE 2002 features ten presentations. The presentations involve, in some way, constraint logic programming, object-oriented programming and abstract interpretation. Topics areas addressed include tools for software development, execution visualization, software maintenance, instructional aids. This workshop was a post-conference workshop at ICLP 2002. Alexandre Tessier, Program Chair, WLPE 2002, June 2002.
[ { "version": "v1", "created": "Fri, 12 Jul 2002 01:23:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Tessier", "Alexandre", "" ] ]
cs/0207053
Alexandre Tessier
Jan Wielemaker, Anjo Anjewierden
An Architecture for Making Object-Oriented Systems Available from Prolog
14 pages; Alexandre Tessier, editor; WLPE 2002, http://xxx.lanl.gov/abs/cs.SE/0207052
null
null
null
cs.SE
null
It is next to impossible to develop real-life applications in just pure Prolog. With XPCE we realised a mechanism for integrating Prolog with an external object-oriented system that turns this OO system into a natural extension to Prolog. We describe the design and how it can be applied to other external OO systems.
[ { "version": "v1", "created": "Fri, 12 Jul 2002 01:22:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Wielemaker", "Jan", "" ], [ "Anjewierden", "Anjo", "" ] ]
cs/0207054
Alexandre Tessier
Goran Falkman, Olof Torgersson
Enhancing Usefulness of Declarative Programming Frameworks through Complete Integration
11 pages; Alexandre Tessier, editor; WLPE 2002, http://xxx.lanl.gov/abs/cs.SE/0207052
null
null
null
cs.SE
null
The Gisela framework for declarative programming was developed with the specific aim of providing a tool that would be useful for knowledge representation and reasoning within real-world applications. To achieve this, a complete integration into an object-oriented application development environment was used. The framework and methodology developed provide two alternative application programming interfaces (APIs): Programming using objects or programming using a traditional equational declarative style. In addition to providing complete integration, Gisela also allows extensions and modifications due to the general computation model and well-defined APIs. We give a brief overview of the declarative model underlying Gisela and we present the methodology proposed for building applications together with some real examples.
[ { "version": "v1", "created": "Fri, 12 Jul 2002 01:17:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Falkman", "Goran", "" ], [ "Torgersson", "Olof", "" ] ]
cs/0207055
Mark Burgin
Mark Burgin
The Rise and Fall of the Church-Turing Thesis
null
null
null
null
cs.CC cs.AI
null
The essay consists of three parts. In the first part, it is explained how theory of algorithms and computations evaluates the contemporary situation with computers and global networks. In the second part, it is demonstrated what new perspectives this theory opens through its new direction that is called theory of super-recursive algorithms. These algorithms have much higher computing power than conventional algorithmic schemes. In the third part, we explicate how realization of what this theory suggests might influence life of people in future. It is demonstrated that now the theory is far ahead computing practice and practice has to catch up with the theory. We conclude with a comparison of different approaches to the development of information technology.
[ { "version": "v1", "created": "Fri, 12 Jul 2002 02:51:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Burgin", "Mark", "" ] ]
cs/0207056
Loizos Michael
Antonis Kakas and Loizos Michael
Modeling Complex Domains of Actions and Change
9 pages, 3 figures, to download the E-RES system and a full representation of the Zoo Scenario World, visit http://www.cs.ucy.ac.cy/~pslogic/
null
null
null
cs.AI
null
This paper studies the problem of modeling complex domains of actions and change within high-level action description languages. We investigate two main issues of concern: (a) can we represent complex domains that capture together different problems such as ramifications, non-determinism and concurrency of actions, at a high-level, close to the given natural ontology of the problem domain and (b) what features of such a representation can affect, and how, its computational behaviour. The paper describes the main problems faced in this representation task and presents the results of an empirical study, carried out through a series of controlled experiments, to analyze the computational performance of reasoning in these representations. The experiments compare different representations obtained, for example, by changing the basic ontology of the domain or by varying the degree of use of indirect effect laws through domain constraints. This study has helped to expose the main sources of computational difficulty in the reasoning and suggest some methodological guidelines for representing complex domains. Although our work has been carried out within one particular high-level description language, we believe that the results, especially those that relate to the problems of representation, are independent of the specific modeling language.
[ { "version": "v1", "created": "Sat, 13 Jul 2002 12:00:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Kakas", "Antonis", "" ], [ "Michael", "Loizos", "" ] ]
cs/0207058
Jochen L. Leidner
Jochen L. Leidner
Question Answering over Unstructured Data without Domain Restrictions
8 pages, 6 figures, 5 tables. To appear in Proc. TaCoS'02, Potsdam, Germany
null
null
null
cs.CL cs.IR
null
Information needs are naturally represented as questions. Automatic Natural-Language Question Answering (NLQA) has only recently become a practical task on a larger scale and without domain constraints. This paper gives a brief introduction to the field, its history and the impact of systematic evaluation competitions. It is then demonstrated that an NLQA system for English can be built and evaluated in a very short time using off-the-shelf parsers and thesauri. The system is based on Robust Minimal Recursion Semantics (RMRS) and is portable with respect to the parser used as a frontend. It applies atomic term unification supported by question classification and WordNet lookup for semantic similarity matching of parsed question representation and free text.
[ { "version": "v1", "created": "Sun, 14 Jul 2002 21:04:43 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2002 19:54:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Leidner", "Jochen L.", "" ] ]
cs/0207059
T. Bench-Capon
T. Bench-Capon
Value Based Argumentation Frameworks
null
null
null
null
cs.AI
null
This paper introduces the notion of value-based argumentation frameworks, an extension of the standard argumentation frameworks proposed by Dung, which are able toshow how rational decision is possible in cases where arguments derive their force from the social values their acceptance would promote.
[ { "version": "v1", "created": "Mon, 15 Jul 2002 11:30:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Bench-Capon", "T.", "" ] ]
cs/0207060
Kewen Wang
Torsten Schaub, Kewen Wang
Preferred well-founded semantics for logic programming by alternating fixpoints: Preliminary report
Proceedings of the Workshop on Preferences in Artificial Intelligence and Constraint In: Proceedings of the Workshop on Non-Monotonic Reasoning (NMR'2002)
null
null
null
cs.AI
null
We analyze the problem of defining well-founded semantics for ordered logic programs within a general framework based on alternating fixpoint theory. We start by showing that generalizations of existing answer set approaches to preference are too weak in the setting of well-founded semantics. We then specify some informal yet intuitive criteria and propose a semantical framework for preference handling that is more suitable for defining well-founded semantics for ordered logic programs. The suitability of the new approach is convinced by the fact that many attractive properties are satisfied by our semantics. In particular, our semantics is still correct with respect to various existing answer sets semantics while it successfully overcomes the weakness of their generalization to well-founded semantics. Finally, we indicate how an existing preferred well-founded semantics can be captured within our semantical framework.
[ { "version": "v1", "created": "Mon, 15 Jul 2002 13:30:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Schaub", "Torsten", "" ], [ "Wang", "Kewen", "" ] ]
cs/0207061
Adam L. Buchsbaum
Adam L. Buchsbaum, Loukas Georgiadis, Haim Kaplan, Anne Rogers, Robert E. Tarjan, and Jeffery R. Westbrook
Linear-Time Pointer-Machine Algorithms for Path-Evaluation Problems on Trees and Graphs
41 pages; 10 figures; 1 table; 65 references. This work is partially covered by the extended abstracts, ``Linear-Time Pointer-Machine Algorithms for Least Common Ancestors, MST Verification, and Dominators,'' Proc. 30th ACM Symp. on Theory of Computing, pp. 279-888, 1998, and ``Finding Dominators Revisited,'' Proc. 15th ACM-SIAM Symp. on Discrete Algorithms, pp. 862-871, 2004
null
null
null
cs.DS
null
We present algorithms that run in linear time on pointer machines for a collection of problems, each of which either directly or indirectly requires the evaluation of a function defined on paths in a tree. These problems previously had linear-time algorithms but only for random-access machines (RAMs); the best pointer-machine algorithms were super-linear by an inverse-Ackermann-function factor. Our algorithms are also simpler, in some cases substantially, than the previous linear-time RAM algorithms. Our improvements come primarily from three new ideas: a refined analysis of path compression that gives a linear bound if the compressions favor certain nodes, a pointer-based radix sort as a replacement for table-based methods, and a more careful partitioning of a tree into easily managed parts. Our algorithms compute nearest common ancestors off-line, verify and construct minimum spanning trees, do interval analysis on a flowgraph, find the dominators of a flowgraph, and build the component tree of a weighted tree.
[ { "version": "v1", "created": "Mon, 15 Jul 2002 18:47:57 GMT" }, { "version": "v2", "created": "Tue, 14 Nov 2006 19:15:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Buchsbaum", "Adam L.", "" ], [ "Georgiadis", "Loukas", "" ], [ "Kaplan", "Haim", "" ], [ "Rogers", "Anne", "" ], [ "Tarjan", "Robert E.", "" ], [ "Westbrook", "Jeffery R.", "" ] ]
cs/0207062
Wen Chen
W. Chen
Some addenda on distance function wavelets
null
null
null
null
cs.NA cs.CE
null
This report will add some supplements to the recently finished report series on the distance function wavelets (DFW). First, we define the general distance in terms of the Riesz potential, and then, the distance function Abel wavelets are derived via the fractional integral and Laplacian. Second, the DFW Weyl transform is found to be a shifted Laplace potential DFW. The DFW Radon transform is also presented. Third, we present a conjecture on truncation error formula of the multiple reciprocity Laplace DFW series and discuss its error distributions in terms of node density distributions. Forth, we point out that the Hermite distance function interpolation can be used to replace overlapping in the domain decomposition in order to produce sparse matrix. Fifth, the shape parameter is explained as a virtual extra axis contribution in terms of the MQ-type Possion kernel. The report is concluded with some remarks on a range of other issues.
[ { "version": "v1", "created": "Mon, 15 Jul 2002 19:58:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0207063
Alper Ungor
Dan A. Spielman, Shang-hua Teng, and Alper Ungor
Parallel Delaunay Refinement: Algorithms and Analyses
12 pages (short version); 2 figures; see also http://www.cs.duke.edu/~ungor/abstracts/parallelDelRef.html
null
null
null
cs.CG
null
In this paper, we analyze the complexity of natural parallelizations of Delaunay refinement methods for mesh generation. The parallelizations employ a simple strategy: at each iteration, they choose a set of ``independent'' points to insert into the domain, and then update the Delaunay triangulation. We show that such a set of independent points can be constructed efficiently in parallel and that the number of iterations needed is $O(\log^2(L/s))$, where $L$ is the diameter of the domain, and $s$ is the smallest edge in the output mesh. In addition, we show that the insertion of each independent set of points can be realized sequentially by Ruppert's method in two dimensions and Shewchuk's in three dimensions. Therefore, our parallel Delaunay refinement methods provide the same element quality and mesh size guarantees as the sequential algorithms in both two and three dimensions. For quasi-uniform meshes, such as those produced by Chew's method, we show that the number of iterations can be reduced to $O(\log(L/s))$. To the best of our knowledge, these are the first provably polylog$(L/s)$ parallel time Delaunay meshing algorithms that generate well-shaped meshes of size optimal to within a constant.
[ { "version": "v1", "created": "Mon, 15 Jul 2002 20:20:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Spielman", "Dan A.", "" ], [ "Teng", "Shang-hua", "" ], [ "Ungor", "Alper", "" ] ]
cs/0207064
Eyal Amir
Eyal Amir
Interpolation Theorems for Nonmonotonic Reasoning Systems
NMR'02
null
null
null
cs.AI cs.LO
null
Craig's interpolation theorem (Craig 1957) is an important theorem known for propositional logic and first-order logic. It says that if a logical formula $\beta$ logically follows from a formula $\alpha$, then there is a formula $\gamma$, including only symbols that appear in both $\alpha,\beta$, such that $\beta$ logically follows from $\gamma$ and $\gamma$ logically follows from $\alpha$. Such theorems are important and useful for understanding those logics in which they hold as well as for speeding up reasoning with theories in those logics. In this paper we present interpolation theorems in this spirit for three nonmonotonic systems: circumscription, default logic and logic programs with the stable models semantics (a.k.a. answer set semantics). These results give us better understanding of those logics, especially in contrast to their nonmonotonic characteristics. They suggest that some \emph{monotonicity} principle holds despite the failure of classic monotonicity for these logics. Also, they sometimes allow us to use methods for the decomposition of reasoning for these systems, possibly increasing their applicability and tractability. Finally, they allow us to build structured representations that use those logics.
[ { "version": "v1", "created": "Tue, 16 Jul 2002 06:27:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Amir", "Eyal", "" ] ]
cs/0207065
Dritan Berzati
Dritan Berzati, Bernhard Anrig and Juerg Kohlas
Embedding Default Logic in Propositional Argumentation Systems
9 pages
null
null
null
cs.AI
null
In this paper we present a transformation of finite propositional default theories into so-called propositional argumentation systems. This transformation allows to characterize all notions of Reiter's default logic in the framework of argumentation systems. As a consequence, computing extensions, or determining wether a given formula belongs to one extension or all extensions can be answered without leaving the field of classical propositional logic. The transformation proposed is linear in the number of defaults.
[ { "version": "v1", "created": "Tue, 16 Jul 2002 15:16:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Berzati", "Dritan", "" ], [ "Anrig", "Bernhard", "" ], [ "Kohlas", "Juerg", "" ] ]
cs/0207066
Jochen Alber
Jochen Alber (1), Michael R. Fellows (2), Rolf Niedermeier (1) ((1) Universitaet Tuebingen Germany, (2) University of Newcastle Australia)
Polynomial Time Data Reduction for Dominating Set
25 pages, 4 figures (using 8 files), extended abstract entitled "Efficient Data Reduction for Dominating Set: A Linear Problem Kernel for the Planar Case" appeared in the Proceedings of the 8th SWAT 2002, LNCS 2368, pages 150-159, Springer-Verlag, 2002
null
null
null
cs.DS
null
Dealing with the NP-complete Dominating Set problem on undirected graphs, we demonstrate the power of data reduction by preprocessing from a theoretical as well as a practical side. In particular, we prove that Dominating Set restricted to planar graphs has a so-called problem kernel of linear size, achieved by two simple and easy to implement reduction rules. Moreover, having implemented our reduction rules, first experiments indicate the impressive practical potential of these rules. Thus, this work seems to open up a new and prospective way how to cope with one of the most important problems in graph theory and combinatorial optimization.
[ { "version": "v1", "created": "Tue, 16 Jul 2002 17:58:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Alber", "Jochen", "" ], [ "Fellows", "Michael R.", "" ], [ "Niedermeier", "Rolf", "" ] ]
cs/0207067
Bart Verheij
Bart Verheij
On the existence and multiplicity of extensions in dialectical argumentation
10 pages; 9th International Workshop on Non-Monotonic Reasoning (NMR'2002)
Verheij, Bart (2002). On the existence and the multiplicity of extensions in dialectical argumentation. Proceedings of the 9th International Workshop on Non-Monotonic Reasoning (NMR'2002) (eds. S. Benferhat and E. Giunchiglia), pp. 416-425. Toulouse
null
null
cs.AI
null
In the present paper, the existence and multiplicity problems of extensions are addressed. The focus is on extension of the stable type. The main result of the paper is an elegant characterization of the existence and multiplicity of extensions in terms of the notion of dialectical justification, a close cousin of the notion of admissibility. The characterization is given in the context of the particular logic for dialectical argumentation DEFLOG. The results are of direct relevance for several well-established models of defeasible reasoning (like default logic, logic programming and argumentation frameworks), since elsewhere dialectical argumentation has been shown to have close formal connections with these models.
[ { "version": "v1", "created": "Wed, 17 Jul 2002 12:09:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Verheij", "Bart", "" ] ]
cs/0207068
Konstantin Korovin
Konstantin Korovin and Andrei Voronkov
Knuth-Bendix constraint solving is NP-complete
27 pages
null
null
null
cs.LO
null
We show the NP-completeness of the existential theory of term algebras with the Knuth-Bendix order by giving a nondeterministic polynomial-time algorithm for solving Knuth-Bendix ordering constraints.
[ { "version": "v1", "created": "Wed, 17 Jul 2002 18:34:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Korovin", "Konstantin", "" ], [ "Voronkov", "Andrei", "" ] ]
cs/0207070
Chung-chieh Shan
Chung-chieh Shan (Harvard University)
A continuation semantics of interrogatives that accounts for Baker's ambiguity
20 pages; typo fixed
Proceedings of SALT XII: Semantics and Linguistic Theory, ed. Brendan Jackson, 246-265 (2002)
null
null
cs.CL cs.PL
null
Wh-phrases in English can appear both raised and in-situ. However, only in-situ wh-phrases can take semantic scope beyond the immediately enclosing clause. I present a denotational semantics of interrogatives that naturally accounts for these two properties. It neither invokes movement or economy, nor posits lexical ambiguity between raised and in-situ occurrences of the same wh-phrase. My analysis is based on the concept of continuations. It uses a novel type system for higher-order continuations to handle wide-scope wh-phrases while remaining strictly compositional. This treatment sheds light on the combinatorics of interrogatives as well as other kinds of so-called A'-movement.
[ { "version": "v1", "created": "Thu, 18 Jul 2002 23:27:01 GMT" }, { "version": "v2", "created": "Fri, 25 Jul 2003 23:18:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Shan", "Chung-chieh", "", "Harvard University" ] ]
cs/0207071
Stefan Woltran
David Pearce, Vladimir Sarsakov, Torsten Schaub, Hans Tompits, Stefan Woltran
A Polynomial Translation of Logic Programs with Nested Expressions into Disjunctive Logic Programs: Preliminary Report
10 pages; published in Proceedings of the 9th International Workshop on Non-Monotonic Reasoning
null
null
null
cs.AI cs.LO
null
Nested logic programs have recently been introduced in order to allow for arbitrarily nested formulas in the heads and the bodies of logic program rules under the answer sets semantics. Nested expressions can be formed using conjunction, disjunction, as well as the negation as failure operator in an unrestricted fashion. This provides a very flexible and compact framework for knowledge representation and reasoning. Previous results show that nested logic programs can be transformed into standard (unnested) disjunctive logic programs in an elementary way, applying the negation as failure operator to body literals only. This is of great practical relevance since it allows us to evaluate nested logic programs by means of off-the-shelf disjunctive logic programming systems, like DLV. However, it turns out that this straightforward transformation results in an exponential blow-up in the worst-case, despite the fact that complexity results indicate that there is a polynomial translation among both formalisms. In this paper, we take up this challenge and provide a polynomial translation of logic programs with nested expressions into disjunctive logic programs. Moreover, we show that this translation is modular and (strongly) faithful. We have implemented both the straightforward as well as our advanced transformation; the resulting compiler serves as a front-end to DLV and is publicly available on the Web.
[ { "version": "v1", "created": "Fri, 19 Jul 2002 12:17:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Pearce", "David", "" ], [ "Sarsakov", "Vladimir", "" ], [ "Schaub", "Torsten", "" ], [ "Tompits", "Hans", "" ], [ "Woltran", "Stefan", "" ] ]