id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0207072
Thomas Eiter
Marco Cadoli, Thomas Eiter, and Georg Gottlob
Complexity of Nested Circumscription and Nested Abnormality Theories
A preliminary abstract of this paper appeared in Proc. Seventeenth International Joint Conference on Artificial Intelligence (IJCAI-01), pages 169--174. Morgan Kaufmann, 2001
null
null
INFSYS RR-1843-02-10, Institut f. Informationssysteme, TU Vienna, 2002
cs.AI cs.CC cs.LO
null
The need for a circumscriptive formalism that allows for simple yet elegant modular problem representation has led Lifschitz (AIJ, 1995) to introduce nested abnormality theories (NATs) as a tool for modular knowledge representation, tailored for applying circumscription to minimize exceptional circumstances. Abstracting from this particular objective, we propose L_{CIRC}, which is an extension of generic propositional circumscription by allowing propositional combinations and nesting of circumscriptive theories. As shown, NATs are naturally embedded into this language, and are in fact of equal expressive capability. We then analyze the complexity of L_{CIRC} and NATs, and in particular the effect of nesting. The latter is found to be a source of complexity, which climbs the Polynomial Hierarchy as the nesting depth increases and reaches PSPACE-completeness in the general case. We also identify meaningful syntactic fragments of NATs which have lower complexity. In particular, we show that the generalization of Horn circumscription in the NAT framework remains CONP-complete, and that Horn NATs without fixed letters can be efficiently transformed into an equivalent Horn CNF, which implies polynomial solvability of principal reasoning tasks. Finally, we also study extensions of NATs and briefly address the complexity in the first-order case. Our results give insight into the ``cost'' of using L_{CIRC} (resp. NATs) as a host language for expressing other formalisms such as action theories, narratives, or spatial theories.
[ { "version": "v1", "created": "Sat, 20 Jul 2002 19:59:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Cadoli", "Marco", "" ], [ "Eiter", "Thomas", "" ], [ "Gottlob", "Georg", "" ] ]
cs/0207073
Naren Ramakrishnan
Srinidhi Varadarajan and Naren Ramakrishnan
Reinforcing Reachable Routes
null
null
null
null
cs.NI cs.AI
null
This paper studies the evaluation of routing algorithms from the perspective of reachability routing, where the goal is to determine all paths between a sender and a receiver. Reachability routing is becoming relevant with the changing dynamics of the Internet and the emergence of low-bandwidth wireless/ad-hoc networks. We make the case for reinforcement learning as the framework of choice to realize reachability routing, within the confines of the current Internet infrastructure. The setting of the reinforcement learning problem offers several advantages, including loop resolution, multi-path forwarding capability, cost-sensitive routing, and minimizing state overhead, while maintaining the incremental spirit of current backbone routing algorithms. We identify research issues in reinforcement learning applied to the reachability routing problem to achieve a fluid and robust backbone routing framework. The paper is targeted toward practitioners seeking to implement a reachability routing algorithm.
[ { "version": "v1", "created": "Sun, 21 Jul 2002 02:02:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Varadarajan", "Srinidhi", "" ], [ "Ramakrishnan", "Naren", "" ] ]
cs/0207074
Dina Q. Goldin
Dina Goldin (U. of Connecticut), Peter Wegner (Brown U.)
Paraconsistency of Interactive Computation
10 pages, no figures. Originally published in proc. PCL 2002, a FLoC workshop; eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai (http://floc02.diku.dk/PCL/)
null
null
null
cs.LO
null
The goal of computational logic is to allow us to model computation as well as to reason about it. We argue that a computational logic must be able to model interactive computation. We show that first-order logic cannot model interactive computation due to the incompleteness of interaction. We show that interactive computation is necessarily paraconsistent, able to model both a fact and its negation, due to the role of the world (environment) in determining the course of the computation. We conclude that paraconsistency is a necessary property for a logic that can model interactive computation.
[ { "version": "v1", "created": "Sun, 21 Jul 2002 06:19:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldin", "Dina", "", "U. of Connecticut" ], [ "Wegner", "Peter", "", "Brown U." ] ]
cs/0207075
Thomas Lukasiewicz
Thomas Lukasiewicz
Nonmonotonic Probabilistic Logics between Model-Theoretic Probabilistic Logic and Probabilistic Logic under Coherence
10 pages; in Proceedings of the 9th International Workshop on Non-Monotonic Reasoning (NMR-2002), Special Session on Uncertainty Frameworks in Nonmonotonic Reasoning, pages 265-274, Toulouse, France, April 2002
null
null
null
cs.AI
null
Recently, it has been shown that probabilistic entailment under coherence is weaker than model-theoretic probabilistic entailment. Moreover, probabilistic entailment under coherence is a generalization of default entailment in System P. In this paper, we continue this line of research by presenting probabilistic generalizations of more sophisticated notions of classical default entailment that lie between model-theoretic probabilistic entailment and probabilistic entailment under coherence. That is, the new formalisms properly generalize their counterparts in classical default reasoning, they are weaker than model-theoretic probabilistic entailment, and they are stronger than probabilistic entailment under coherence. The new formalisms are useful especially for handling probabilistic inconsistencies related to conditioning on zero events. They can also be applied for probabilistic belief revision. More generally, in the same spirit as a similar previous paper, this paper sheds light on exciting new formalisms for probabilistic reasoning beyond the well-known standard ones.
[ { "version": "v1", "created": "Mon, 22 Jul 2002 01:44:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Lukasiewicz", "Thomas", "" ] ]
cs/0207076
Paolo Perlasca
Elisa Bertino, Barbara Catania, and Paolo Perlasca
Introducing Dynamic Behavior in Amalgamated Knowledge Bases
Other Keywords: Deductive databases; Heterogeneous databases; Active rules; Updates
null
null
null
cs.PL cs.DB cs.LO
null
The problem of integrating knowledge from multiple and heterogeneous sources is a fundamental issue in current information systems. In order to cope with this problem, the concept of mediator has been introduced as a software component providing intermediate services, linking data resources and application programs, and making transparent the heterogeneity of the underlying systems. In designing a mediator architecture, we believe that an important aspect is the definition of a formal framework by which one is able to model integration according to a declarative style. To this purpose, the use of a logical approach seems very promising. Another important aspect is the ability to model both static integration aspects, concerning query execution, and dynamic ones, concerning data updates and their propagation among the various data sources. Unfortunately, as far as we know, no formal proposals for logically modeling mediator architectures both from a static and dynamic point of view have already been developed. In this paper, we extend the framework for amalgamated knowledge bases, presented by Subrahmanian, to deal with dynamic aspects. The language we propose is based on the Active U-Datalog language, and extends it with annotated logic and amalgamation concepts. We model the sources of information and the mediator (also called supervisor) as Active U-Datalog deductive databases, thus modeling queries, transactions, and active rules, interpreted according to the PARK semantics. By using active rules, the system can efficiently perform update propagation among different databases. The result is a logical environment, integrating active and deductive rules, to perform queries and update propagation in an heterogeneous mediated framework.
[ { "version": "v1", "created": "Mon, 22 Jul 2002 07:50:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertino", "Elisa", "" ], [ "Catania", "Barbara", "" ], [ "Perlasca", "Paolo", "" ] ]
cs/0207077
Rajkumar Buyya
Jahanzeb Sherwani, Nosheen Ali, Nausheen Lotia, Zahra Hayat, and Rajkumar Buyya
Libra: An Economy driven Job Scheduling System for Clusters
13 pages
null
null
Technical Report, July 2002, Dept. of Computer Science and Software Engineering, The University of Melbourne
cs.DC cs.DS
null
Clusters of computers have emerged as mainstream parallel and distributed platforms for high-performance, high-throughput and high-availability computing. To enable effective resource management on clusters, numerous cluster managements systems and schedulers have been designed. However, their focus has essentially been on maximizing CPU performance, but not on improving the value of utility delivered to the user and quality of services. This paper presents a new computational economy driven scheduling system called Libra, which has been designed to support allocation of resources based on the users? quality of service (QoS) requirements. It is intended to work as an add-on to the existing queuing and resource management system. The first version has been implemented as a plugin scheduler to the PBS (Portable Batch System) system. The scheduler offers market-based economy driven service for managing batch jobs on clusters by scheduling CPU time according to user utility as determined by their budget and deadline rather than system performance considerations. The Libra scheduler ensures that both these constraints are met within an O(n) run-time. The Libra scheduler has been simulated using the GridSim toolkit to carry out a detailed performance analysis. Results show that the deadline and budget based proportional resource allocation strategy improves the utility of the system and user satisfaction as compared to system-centric scheduling strategies.
[ { "version": "v1", "created": "Mon, 22 Jul 2002 11:35:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Sherwani", "Jahanzeb", "" ], [ "Ali", "Nosheen", "" ], [ "Lotia", "Nausheen", "" ], [ "Hayat", "Zahra", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0207078
David Karger
Andras Benczur and David R. Karger
Randomized Approximation Schemes for Cuts and Flows in Capacitated Graphs
Draft journal version combining conference publications in STOC '96 and SODA '98
null
null
null
cs.DS cs.DM
null
We improve on random sampling techniques for approximately solving problems that involve cuts and flows in graphs. We give a near-linear-time construction that transforms any graph on n vertices into an O(n\log n)-edge graph on the same vertices whose cuts have approximately the same value as the original graph's. In this new graph, for example, we can run the O(m^{3/2})-time maximum flow algorithm of Goldberg and Rao to find an s--t minimum cut in O(n^{3/2}) time. This corresponds to a (1+epsilon)-times minimum s--t cut in the original graph. In a similar way, we can approximate a sparsest cut to within O(log n) in O(n^2) time using a previous O(mn)-time algorithm. A related approach leads to a randomized divide and conquer algorithm producing an approximately maximum flow in O(m sqrt{n}) time.
[ { "version": "v1", "created": "Tue, 23 Jul 2002 04:27:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Benczur", "Andras", "" ], [ "Karger", "David R.", "" ] ]
cs/0207079
Ilia Ponomarenko
D. Grigoriev and I. Ponomarenko
On non-abelian homomorphic public-key cryptosystems
15 pages, LaTeX
null
null
null
cs.CR
null
An important problem of modern cryptography concerns secret public-key computations in algebraic structures. We construct homomorphic cryptosystems being (secret) epimorphisms f:G --> H, where G, H are (publically known) groups and H is finite. A letter of a message to be encrypted is an element h element of H, while its encryption g element of G is such that f(g)=h. A homomorphic cryptosystem allows one to perform computations (operating in a group G) with encrypted information (without knowing the original message over H). In this paper certain homomorphic cryptosystems are constructed for the first time for non-abelian groups H (earlier, homomorphic cryptosystems were known only in the Abelian case). In fact, we present such a system for any solvable (fixed) group H.
[ { "version": "v1", "created": "Tue, 23 Jul 2002 07:28:59 GMT" }, { "version": "v2", "created": "Mon, 2 Sep 2002 11:51:17 GMT" }, { "version": "v3", "created": "Wed, 4 Sep 2002 10:12:29 GMT" }, { "version": "v4", "created": "Thu, 14 Nov 2002 10:04:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Grigoriev", "D.", "" ], [ "Ponomarenko", "I.", "" ] ]
cs/0207080
Dima Grigorev
D. Grigoriev
Public-key cryptography and invariant theory
10 pages, LaTeX
null
null
null
cs.CR
null
Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of the known cryptosystems which involve groups.
[ { "version": "v1", "created": "Tue, 23 Jul 2002 07:37:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Grigoriev", "D.", "" ] ]
cs/0207081
David Eppstein
Marshall Bern, David Eppstein
Moebius-Invariant Natural Neighbor Interpolation
2 pages, 1 figure
null
null
null
cs.CG
null
We propose an interpolation method that is invariant under Moebius transformations; that is, interpolation followed by transformation gives the same result as transformation followed by interpolation. The method uses natural (Delaunay) neighbors, but weights neighbors according to angles formed by Delaunay circles.
[ { "version": "v1", "created": "Wed, 24 Jul 2002 19:00:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Bern", "Marshall", "" ], [ "Eppstein", "David", "" ] ]
cs/0207082
David Eppstein
David Eppstein
Dynamic Generators of Topologically Embedded Graphs
13 pages, 2 figures
null
null
null
cs.DS
null
We provide a data structure for maintaining an embedding of a graph on a surface (represented combinatorially by a permutation of edges around each vertex) and computing generators of the fundamental group of the surface, in amortized time O(log n + log g(log log g)^3) per update on a surface of genus g; we can also test orientability of the surface in the same time, and maintain the minimum and maximum spanning tree of the graph in time O(log n + log^4 g) per update. Our data structure allows edge insertion and deletion as well as the dual operations; these operations may implicitly change the genus of the embedding surface. We apply similar ideas to improve the constant factor in a separator theorem for low-genus graphs, and to find in linear time a tree-decomposition of low-genus low-diameter graphs.
[ { "version": "v1", "created": "Wed, 24 Jul 2002 19:56:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
cs/0207083
Choh Man Teng
Henry E. Kyburg Jr. and Choh Man Teng
Evaluating Defaults
8 pages
null
null
null
cs.AI
null
We seek to find normative criteria of adequacy for nonmonotonic logic similar to the criterion of validity for deductive logic. Rather than stipulating that the conclusion of an inference be true in all models in which the premises are true, we require that the conclusion of a nonmonotonic inference be true in ``almost all'' models of a certain sort in which the premises are true. This ``certain sort'' specification picks out the models that are relevant to the inference, taking into account factors such as specificity and vagueness, and previous inferences. The frequencies characterizing the relevant models reflect known frequencies in our actual world. The criteria of adequacy for a default inference can be extended by thresholding to criteria of adequacy for an extension. We show that this avoids the implausibilities that might otherwise result from the chaining of default inferences. The model proportions, when construed in terms of frequencies, provide a verifiable grounding of default rules, and can become the basis for generating default rules from statistics.
[ { "version": "v1", "created": "Wed, 24 Jul 2002 23:05:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Kyburg", "Henry E.", "Jr." ], [ "Teng", "Choh Man", "" ] ]
cs/0207084
Dina Q. Goldin
Philippe Besnard (1), Torsten Schaub (1), Hans Tompits (2), Stefan Woltran (2) ((1) Institut f\"ur Informatik, Universit\"at Potsdam, (2) Institut f\"ur Informationssysteme, Technische Universit\"at Wien)
Paraconsistent Reasoning via Quantified Boolean Formulas,I: Axiomatising Signed Systems
15 pages. Originally published in proc. PCL 2002, a FLoC workshop; eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai (http://floc02.diku.dk/PCL/)
null
null
null
cs.LO cs.CC
null
Signed systems were introduced as a general, syntax-independent framework for paraconsistent reasoning, that is, non-trivialised reasoning from inconsistent information. In this paper, we show how the family of corresponding paraconsistent consequence relations can be axiomatised by means of quantified Boolean formulas. This approach has several benefits. First, it furnishes an axiomatic specification of paraconsistent reasoning within the framework of signed systems. Second, this axiomatisation allows us to identify upper bounds for the complexity of the different signed consequence relations. We strengthen these upper bounds by providing strict complexity results for the considered reasoning tasks. Finally, we obtain an implementation of different forms of paraconsistent reasoning by appeal to the existing system QUIP.
[ { "version": "v1", "created": "Thu, 25 Jul 2002 14:40:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Besnard", "Philippe", "" ], [ "Schaub", "Torsten", "" ], [ "Tompits", "Hans", "" ], [ "Woltran", "Stefan", "" ] ]
cs/0207085
Dina Q. Goldin
Ofer Arieli (1), Marc Denecker (2), Bert Van Nuffelen (2), Maurice Bruynooghe (2) ((1) The Academic College of Tel-Aviv, Israel (2) The Catholic University of Leuven, Belgium)
Repairing Inconsistent Databases: A Model-Theoretic Approach and Abductive Reasoning
15 pages. Originally published in proc. PCL 2002, a FLoC workshop; eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai (http://floc02.diku.dk/PCL/)
null
null
null
cs.LO cs.DB
null
In this paper we consider two points of views to the problem of coherent integration of distributed data. First we give a pure model-theoretic analysis of the possible ways to `repair' a database. We do so by characterizing the possibilities to `recover' consistent data from an inconsistent database in terms of those models of the database that exhibit as minimal inconsistent information as reasonably possible. Then we introduce an abductive application to restore the consistency of a given database. This application is based on an abductive solver (A-system) that implements an SLDNFA-resolution procedure, and computes a list of data-facts that should be inserted to the database or retracted from it in order to keep the database consistent. The two approaches for coherent data integration are related by soundness and completeness results.
[ { "version": "v1", "created": "Thu, 25 Jul 2002 15:13:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Arieli", "Ofer", "" ], [ "Denecker", "Marc", "" ], [ "Van Nuffelen", "Bert", "" ], [ "Bruynooghe", "Maurice", "" ] ]
cs/0207086
Dina Q. Goldin
Michael J. Maher (Loyola University, Chicago)
A Model-Theoretic Semantics for Defeasible Logic
14 pages. Originally published in proc. PCL 2002, a FLoC workshop; eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai (http://floc02.diku.dk/PCL/)
null
null
null
cs.LO
null
Defeasible logic is an efficient logic for defeasible reasoning. It is defined through a proof theory and, until now, has had no model theory. In this paper a model-theoretic semantics is given for defeasible logic. The logic is sound and complete with respect to the semantics. We also briefly outline how this approach extends to a wide range of defeasible logics.
[ { "version": "v1", "created": "Thu, 25 Jul 2002 15:39:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Maher", "Michael J.", "", "Loyola University, Chicago" ] ]
cs/0207087
Dina Q. Goldin
Guo-Qiang Zhang (Case Western Reserve University)
Axiomatic Aspects of Default Inference
16 pages. Originally published in proc. PCL 2002, a FLoC workshop; eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai (http://floc02.diku.dk/PCL/)
null
null
null
cs.LO
null
This paper studies axioms for nonmonotonic consequences from a semantics-based point of view, focusing on a class of mathematical structures for reasoning about partial information without a predefined syntax/logic. This structure is called a default structure. We study axioms for the nonmonotonic consequence relation derived from extensions as in Reiter's default logic, using skeptical reasoning, but extensions are now used for the construction of possible worlds in a default information structure. In previous work we showed that skeptical reasoning arising from default-extensions obeys a well-behaved set of axioms including the axiom of cautious cut. We show here that, remarkably, the converse is also true: any consequence relation obeying this set of axioms can be represented as one constructed from skeptical reasoning. We provide representation theorems to relate axioms for nonmonotonic consequence relation and properties about extensions, and provide one-to-one correspondence between nonmonotonic systems which satisfies the law of cautious monotony and default structures with unique extensions. Our results give a theoretical justification for a set of basic rules governing the update of nonmonotonic knowledge bases, demonstrating the derivation of them from the more concrete and primitive construction of extensions. It is also striking to note that proofs of the representation theorems show that only shallow extensions are necessary, in the sense that the number of iterations needed to achieve an extension is at most three. All of these developments are made possible by taking a more liberal view of consistency: consistency is a user defined predicate, satisfying some basic properties.
[ { "version": "v1", "created": "Thu, 25 Jul 2002 16:19:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Guo-Qiang", "", "Case Western Reserve University" ] ]
cs/0207088
Dina Q. Goldin
J{\o}rgen Villadsen
A Paraconsistent Higher Order Logic
Originally in the proceedings of PCL 2002, editors Hendrik Decker, Joergen Villadsen, Toshiharu Waragai (http://floc02.diku.dk/PCL/). Corrected
null
null
null
cs.LO cs.AI
null
Classical logic predicts that everything (thus nothing useful at all) follows from inconsistency. A paraconsistent logic is a logic where an inconsistency does not lead to such an explosion, and since in practice consistency is difficult to achieve there are many potential applications of paraconsistent logics in knowledge-based systems, logical semantics of natural language, etc. Higher order logics have the advantages of being expressive and with several automated theorem provers available. Also the type system can be helpful. We present a concise description of a paraconsistent higher order logic with countable infinite indeterminacy, where each basic formula can get its own indeterminate truth value (or as we prefer: truth code). The meaning of the logical operators is new and rather different from traditional many-valued logics as well as from logics based on bilattices. The adequacy of the logic is examined by a case study in the domain of medicine. Thus we try to build a bridge between the HOL and MVL communities. A sequent calculus is proposed based on recent work by Muskens.
[ { "version": "v1", "created": "Thu, 25 Jul 2002 16:35:47 GMT" }, { "version": "v2", "created": "Tue, 6 Aug 2002 09:45:07 GMT" }, { "version": "v3", "created": "Fri, 26 Dec 2003 10:45:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Villadsen", "Jørgen", "" ] ]
cs/0207089
Dina Q. Goldin
Jan Ma{\l}uszy\'nski and Aida Vit\'oria (Link\"oping University, Sweden)
Defining Rough Sets by Extended Logic Programs
10 pages. Originally published in proc. PCL 2002, a FLoC workshop; eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai (http://floc02.diku.dk/PCL/)
null
null
null
cs.LO cs.PL
null
We show how definite extended logic programs can be used for defining and reasoning with rough sets. Moreover, a rough-set-specific query language is presented and an answering algorithm is outlined. Thus, we not only show a possible application of a paraconsistent logic to the field of rough sets as we also establish a link between rough set theory and logic programming, making possible transfer of expertise between both fields.
[ { "version": "v1", "created": "Thu, 25 Jul 2002 16:52:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Małuszyński", "Jan", "", "Linköping University,\n Sweden" ], [ "Vitória", "Aida", "", "Linköping University,\n Sweden" ] ]
cs/0207090
Dina Q. Goldin
Diderik Batens (Universiteit Gent, Belgium)
On a Partial Decision Method for Dynamic Proofs
18 pages. Originally published in proc. PCL 2002, a FLoC workshop; eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai (http://floc02.diku.dk/PCL/)
null
null
null
cs.LO
null
This paper concerns a goal directed proof procedure for the propositional fragment of the adaptive logic ACLuN1. At the propositional level, it forms an algorithm for final derivability. If extended to the predicative level, it provides a criterion for final derivability. This is essential in view of the absence of a positive test. The procedure may be generalized to all flat adaptive logics.
[ { "version": "v1", "created": "Thu, 25 Jul 2002 17:14:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Batens", "Diderik", "", "Universiteit Gent, Belgium" ] ]
cs/0207091
Dina Q. Goldin
Fran\c{c}ois Bry (University of Munich, Germany)
An Almost Classical Logic for Logic Programming and Nonmonotonic Reasoning
16 pages. Originally published in proc. PCL 2002, a FLoC workshop; eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai (http://floc02.diku.dk/PCL/)
null
null
null
cs.LO
null
The model theory of a first-order logic called N^4 is introduced. N^4 does not eliminate double negations, as classical logic does, but instead reduces fourfold negations. N^4 is very close to classical logic: N^4 has two truth values; implications in N^4 are material, like in classical logic; and negation distributes over compound formulas in N^4 as it does in classical logic. Results suggest that the semantics of normal logic programs is conveniently formalized in N^4: Classical logic Herbrand interpretations generalize straightforwardly to N^4; the classical minimal Herbrand model of a positive logic program coincides with its unique minimal N^4 Herbrand model; the stable models of a normal logic program and its so-called complete minimal N^4 Herbrand models coincide.
[ { "version": "v1", "created": "Thu, 25 Jul 2002 17:40:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Bry", "François", "", "University of Munich, Germany" ] ]
cs/0207093
Jan Chomicki
Jan Chomicki
Preference Queries
34 pages
null
null
null
cs.DB
null
The handling of user preferences is becoming an increasingly important issue in present-day information systems. Among others, preferences are used for information filtering and extraction to reduce the volume of data presented to the user. They are also used to keep track of user profiles and formulate policies to improve and automate decision making. We propose here a simple, logical framework for formulating preferences as preference formulas. The framework does not impose any restrictions on the preference relations and allows arbitrary operation and predicate signatures in preference formulas. It also makes the composition of preference relations straightforward. We propose a simple, natural embedding of preference formulas into relational algebra (and SQL) through a single winnow operator parameterized by a preference formula. The embedding makes possible the formulation of complex preference queries, e.g., involving aggregation, by piggybacking on existing SQL constructs. It also leads in a natural way to the definition of further, preference-related concepts like ranking. Finally, we present general algebraic laws governing the winnow operator and its interaction with other relational algebra operators. The preconditions on the applicability of the laws are captured by logical formulas. The laws provide a formal foundation for the algebraic optimization of preference queries. We demonstrate the usefulness of our approach through numerous examples.
[ { "version": "v1", "created": "Sat, 27 Jul 2002 00:46:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Chomicki", "Jan", "" ] ]
cs/0207094
Jan Chomicki
Marcelo Arenas, Leopoldo Bertossi, Jan Chomicki
Answer Sets for Consistent Query Answering in Inconsistent Databases
34 pages
null
null
null
cs.DB
null
A relational database is inconsistent if it does not satisfy a given set of integrity constraints. Nevertheless, it is likely that most of the data in it is consistent with the constraints. In this paper we apply logic programming based on answer sets to the problem of retrieving consistent information from a possibly inconsistent database. Since consistent information persists from the original database to every of its minimal repairs, the approach is based on a specification of database repairs using disjunctive logic programs with exceptions, whose answer set semantics can be represented and computed by systems that implement stable model semantics. These programs allow us to declare persistence by defaults and repairing changes by exceptions. We concentrate mainly on logic programs for binary integrity constraints, among which we find most of the integrity constraints found in practice.
[ { "version": "v1", "created": "Fri, 26 Jul 2002 21:18:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Arenas", "Marcelo", "" ], [ "Bertossi", "Leopoldo", "" ], [ "Chomicki", "Jan", "" ] ]
cs/0207095
Wim H. Hesselink
Wim H. Hesselink
Eternity variables to prove simulation of specifications
28 pages, to appear in ACM-TOCL
ACM Trans. on Computational Logic 6 (2005) 175-201.
null
null
cs.DC cs.LO
null
Simulations of specifications are introduced as a unification and generalization of refinement mappings, history variables, forward simulations, prophecy variables, and backward simulations. A specification implements another specification if and only if there is a simulation from the first one to the second one that satisfies a certain condition. By adding stutterings, the formalism allows that the concrete behaviours take more (or possibly less) steps than the abstract ones. Eternity variables are introduced as a more powerful alternative for prophecy variables and backward simulations. This formalism is semantically complete: every simulation that preserves quiescence is a composition of a forward simulation, an extension with eternity variables, and a refinement mapping. This result does not need finite invisible nondeterminism and machine closure as in the Abadi-Lamport Theorem. Internal continuity is weakened to preservation of quiescence.
[ { "version": "v1", "created": "Mon, 29 Jul 2002 09:12:22 GMT" }, { "version": "v2", "created": "Fri, 16 Aug 2002 07:46:41 GMT" }, { "version": "v3", "created": "Mon, 11 Aug 2003 12:27:13 GMT" }, { "version": "v4", "created": "Wed, 27 Aug 2003 17:17:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Hesselink", "Wim H.", "" ] ]
cs/0207096
Judith Beumer
Avery Ching, Alok Choudhary, Wei-keng Liao, Rob Ross, William Gropp
Noncontiguous I/O through PVFS
10 pages, 17 figures
null
null
ANL/MCS-P970-0702
cs.DC
null
With the tremendous advances in processor and memory technology, I/O has risen to become the bottleneck in high-performance computing for many applications. The development of parallel file systems has helped to ease the performance gap, but I/O still remains an area needing significant performance improvement. Research has found that noncontiguous I/O access patterns in scientific applications combined with current file system methods to perform these accesses lead to unacceptable performance for large data sets. To enhance performance of noncontiguous I/O we have created list I/O, a native version of noncontiguous I/O. We have used the Parallel Virtual File System (PVFS) to implement our ideas. Our research and experimentation shows that list I/O outperforms current noncontiguous I/O access methods in most I/O situations and can substantially enhance the performance of real-world scientific applications.
[ { "version": "v1", "created": "Mon, 29 Jul 2002 16:20:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ching", "Avery", "" ], [ "Choudhary", "Alok", "" ], [ "Liao", "Wei-keng", "" ], [ "Ross", "Rob", "" ], [ "Gropp", "William", "" ] ]
cs/0207097
Juergen Schmidhuber
Juergen Schmidhuber
Optimal Ordered Problem Solver
43 pages, 2 figures, short version at NIPS 2002 (added 1 figure and references; streamlined presentation)
Machine Learning, 54, 211-254, 2004.
null
IDSIA-12-02
cs.AI cs.CC cs.LG
null
We present a novel, general, optimally fast, incremental way of searching for a universal algorithm that solves each task in a sequence of tasks. The Optimal Ordered Problem Solver (OOPS) continually organizes and exploits previously found solutions to earlier tasks, efficiently searching not only the space of domain-specific algorithms, but also the space of search algorithms. Essentially we extend the principles of optimal nonincremental universal search to build an incremental universal learner that is able to improve itself through experience. In illustrative experiments, our self-improver becomes the first general system that learns to solve all n disk Towers of Hanoi tasks (solution size 2^n-1) for n up to 30, profiting from previously solved, simpler tasks involving samples of a simple context free language.
[ { "version": "v1", "created": "Wed, 31 Jul 2002 14:33:11 GMT" }, { "version": "v2", "created": "Mon, 23 Dec 2002 14:11:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidhuber", "Juergen", "" ] ]
cs/0208001
Carlos Gershenson
Carlos Gershenson
Classification of Random Boolean Networks
8 pages, 11 figures, 5 tables. To be published in Standish, Abbass and Bedau (eds.) Artificial Life VIII
null
null
null
cs.CC cs.DM math.DS nlin.CG
null
We provide the first classification of different types of Random Boolean Networks (RBNs). We study the differences of RBNs depending on the degree of synchronicity and determinism of their updating scheme. For doing so, we first define three new types of RBNs. We note some similarities and differences between different types of RBNs with the aid of a public software laboratory we developed. Particularly, we find that the point attractors are independent of the updating scheme, and that RBNs are more different depending on their determinism or non-determinism rather than depending on their synchronicity or asynchronicity. We also show a way of mapping non-synchronous deterministic RBNs into synchronous RBNs. Our results are important for justifying the use of specific types of RBNs for modelling natural phenomena.
[ { "version": "v1", "created": "Thu, 1 Aug 2002 13:26:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
cs/0208002
Lavrenov
A. Lavrenov
Theoretical limit of the compression for the information
5 pages, report at the IMK's conference "Science and pedagogics on a boundary 21 centuries", in Russian
null
null
null
cs.CR
null
The pit recording of file, the coefficient of compression are introduced. The theoretical limit of the information compression as minimal coefficient of compression for the given length of alphabet are found.
[ { "version": "v1", "created": "Fri, 2 Aug 2002 09:11:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavrenov", "A.", "" ] ]
cs/0208003
Lavrenov
A. Lavrenov
MV2-algorithm's clones
5 pages, report at the IMK's conference "Science and pedagogics on a boundary 21 centuries", in Russian
null
null
null
cs.CR
null
The clones of MV2 algorithm for any radix are discussed. The three various examples of ones are represented.
[ { "version": "v1", "created": "Fri, 2 Aug 2002 09:24:33 GMT" }, { "version": "v2", "created": "Mon, 5 Aug 2002 07:50:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavrenov", "A.", "" ] ]
cs/0208004
Hsueh-I. Lu
Philip N. Klein, Hsueh-I Lu, and Rob H.B. Netzer
Detecting Race Conditions in Parallel Programs that Use Semaphores
24 pages, 12 figures, preliminary versions appeared in WADS 93 and ESA 96
Algorithmica, 35(4):321-345, 2003
10.1007/s00453-002-1004-3
null
cs.DS cs.DC
null
We address the problem of detecting race conditions in programs that use semaphores for synchronization. Netzer and Miller showed that it is NP-complete to detect race conditions in programs that use many semaphores. We show in this paper that it remains NP-complete even if only two semaphores are used in the parallel programs. For the tractable case, i.e., using only one semaphore, we give two algorithms for detecting race conditions from the trace of executing a parallel program on p processors, where n semaphore operations are executed. The first algorithm determines in O(n) time whether a race condition exists between any two given operations. The second algorithm runs in O(np log n) time and outputs a compact representation from which one can determine in O(1) time whether a race condition exists between any two given operations. The second algorithm is near-optimal in that the running time is only O(log n) times the time required simply to write down the output.
[ { "version": "v1", "created": "Sat, 3 Aug 2002 17:20:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Klein", "Philip N.", "" ], [ "Lu", "Hsueh-I", "" ], [ "Netzer", "Rob H. B.", "" ] ]
cs/0208005
Ulrich Hillenbrand
Ulrich Hillenbrand and Gerd Hirzinger
Probabilistic Search for Object Segmentation and Recognition
18 pages, 5 figures
Proceedings ECCV 2002, Lecture Notes in Computer Science Vol. 2352, pp. 791-806
null
null
cs.CV
null
The problem of searching for a model-based scene interpretation is analyzed within a probabilistic framework. Object models are formulated as generative models for range data of the scene. A new statistical criterion, the truncated object probability, is introduced to infer an optimal sequence of object hypotheses to be evaluated for their match to the data. The truncated probability is partly determined by prior knowledge of the objects and partly learned from data. Some experiments on sequence quality and object segmentation and recognition from stereo data are presented. The article recovers classic concepts from object recognition (grouping, geometric hashing, alignment) from the probabilistic perspective and adds insight into the optimal ordering of object hypotheses for evaluation. Moreover, it introduces point-relation densities, a key component of the truncated probability, as statistical models of local surface shape.
[ { "version": "v1", "created": "Mon, 5 Aug 2002 10:57:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Hillenbrand", "Ulrich", "" ], [ "Hirzinger", "Gerd", "" ] ]
cs/0208006
Hartmut Klauck
Hartmut Klauck
Rectangle Size Bounds and Threshold Covers in Communication Complexity
34 pages
null
null
null
cs.CC
null
We investigate the power of the most important lower bound technique in randomized communication complexity, which is based on an evaluation of the maximal size of approximately monochromatic rectangles, minimized over all distributions on the inputs. While it is known that the 0-error version of this bound is polynomially tight for deterministic communication, nothing in this direction is known for constant error and randomized communication complexity. We first study a one-sided version of this bound and obtain that its value lies between the MA- and AM-complexities of the considered function. Hence the lower bound actually works for a (communication complexity) class between MA cap co-MA and AM cap co-AM. We also show that the MA-complexity of the disjointness problem is Omega(sqrt(n)). Following this we consider the conjecture that the lower bound method is polynomially tight for randomized communication complexity. First we disprove a distributional version of this conjecture. Then we give a combinatorial characterization of the value of the lower bound method, in which the optimization over all distributions is absent. This characterization is done by what we call a uniform threshold cover. We also study relaxations of this notion, namely approximate majority covers and majority covers, and compare these three notions in power, exhibiting exponential separations. Each of these covers captures a lower bound method previously used for randomized communication complexity.
[ { "version": "v1", "created": "Mon, 5 Aug 2002 14:36:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Klauck", "Hartmut", "" ] ]
cs/0208007
Kamil Kulesza
Kamil Kulesza, Zbigniew Kotulski
On the graph coloring check-digit scheme with applications to verifiable secret sharing
null
null
null
null
cs.CR cs.DM math.CO
null
In the paper we apply graph vertex coloring for verification of secret shares. We start from showing how to convert any graph into the number and vice versa. Next, theoretical result concerning properties of n-colorable graphs is stated and proven. From this result we derive graph coloring check-digit scheme. Feasibility of proposed scheme increases with the size of the number, which digits are checked and overall probability of errors. The check-digit scheme is used to build shares verification method that does not require cooperation of the third party. It allows implementing verification structure different from the access structure. It does not depend on particular secret sharing method. It can be used as long as the secret shares can be represented by numbers or graphs.
[ { "version": "v1", "created": "Tue, 6 Aug 2002 12:47:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Kulesza", "Kamil", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0208009
Michael Leuschel
Michael Leuschel, Jesper Joergensen, Wim Vanhoof, Maurice Bruynooghe
Offline Specialisation in Prolog Using a Hand-Written Compiler Generator
52 pages, to appear in the journal "Theory and Practice of Logic Programming"
null
null
null
cs.PL cs.AI
null
The so called ``cogen approach'' to program specialisation, writing a compiler generator instead of a specialiser, has been used with considerable success in partial evaluation of both functional and imperative languages. This paper demonstrates that the cogen approach is also applicable to the specialisation of logic programs (also called partial deduction) and leads to effective specialisers. Moreover, using good binding-time annotations, the speed-ups of the specialised programs are comparable to the speed-ups obtained with online specialisers. The paper first develops a generic approach to offline partial deduction and then a specific offline partial deduction method, leading to the offline system LIX for pure logic programs. While this is a usable specialiser by itself, it is used to develop the cogen system LOGEN. Given a program, a specification of what inputs will be static, and an annotation specifying which calls should be unfolded, LOGEN generates a specialised specialiser for the program at hand. Running this specialiser with particular values for the static inputs results in the specialised program. While this requires two steps instead of one, the efficiency of the specialisation process is improved in situations where the same program is specialised multiple times. The paper also presents and evaluates an automatic binding-time analysis that is able to derive the annotations. While the derived annotations are still suboptimal compared to hand-crafted ones, they enable non-expert users to use the LOGEN system in a fully automated way. Finally, LOGEN is extended so as to directly support a large part of Prolog's declarative and non-declarative features and so as to be able to perform so called mixline specialisations.
[ { "version": "v1", "created": "Wed, 7 Aug 2002 11:14:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Leuschel", "Michael", "" ], [ "Joergensen", "Jesper", "" ], [ "Vanhoof", "Wim", "" ], [ "Bruynooghe", "Maurice", "" ] ]
cs/0208010
Jim Gray
Tom Barclay, Jim Gray, Eric Strand, Steve Ekblad, Jeffrey Richter
TerraService.NET: An Introduction to Web Services
original at http://research.microsoft.com/scripts/pubs/view.asp?TR_ID=MSR-TR-2002-53
null
null
MSR-TR-2002-53
cs.DL cs.DB
null
This article explores the design and construction of a geo-spatial Internet web service application from the host web site perspective and from the perspective of an application using the web service. The TerraService.NET web service was added to the popular TerraServer database and web site with no major structural changes to the database. The article discusses web service design, implementation, and deployment concepts and design guidelines. Web services enable applications that aggregate and interact with information and resources from Internet-scale distributed servers. The article presents the design of two USDA applications that interoperate with database and web service resources in Fort Collins Colorado and the TerraService web service located in Tukwila Washington.
[ { "version": "v1", "created": "Wed, 7 Aug 2002 22:18:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Barclay", "Tom", "" ], [ "Gray", "Jim", "" ], [ "Strand", "Eric", "" ], [ "Ekblad", "Steve", "" ], [ "Richter", "Jeffrey", "" ] ]
cs/0208011
Jim Gray
Jim Gray, Wyman Chong, Tom Barclay, Alex Szalay, Jan vandenBerg
TeraScale SneakerNet: Using Inexpensive Disks for Backup, Archiving, and Data Exchange
original at http://research.microsoft.com/scripts/pubs/view.asp?TR_ID=MSR-TR-2002-54
null
null
MSR-TR-2002-54
cs.NI cs.DC
null
Large datasets are most economically trnsmitted via parcel post given the current economics of wide-area networking. This article describes how the Sloan Digital Sky Survey ships terabyte scale datasets both within the US and to Europe and Asia. We 3GT storage bricks (Ghz processor, GB ram, GbpsEthernet, TB disk) for about 2k$ each. These bricks act as database servers on the LAN. They are loaded at one site and read at the second site. The paper describes the bricks, their economics, and some software issues that they raise.
[ { "version": "v1", "created": "Wed, 7 Aug 2002 22:32:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Chong", "Wyman", "" ], [ "Barclay", "Tom", "" ], [ "Szalay", "Alex", "" ], [ "vandenBerg", "Jan", "" ] ]
cs/0208016
Wen Chen
W. Chen
A note on fractional derivative modeling of broadband frequency-dependent absorption: Model III
null
null
null
Simula Research Laboratory Report, April 2002
cs.CE cs.CC
null
By far, the fractional derivative model is mainly related to the modelling of complicated solid viscoelastic material. In this study, we try to build the fractional derivative PDE model for broadband ultrasound propagation through human tissues.
[ { "version": "v1", "created": "Thu, 8 Aug 2002 07:29:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0208017
Moinard
Yves Moinard
Linking Makinson and Kraus-Lehmann-Magidor preferential entailments
Proceedings of the 9th Int. Workshop on Non-Monotonic Reasoning (NMR'2002), Toulouse, France, April 19-21, 2002. Also, paper with the same Title at ECAI 2002 (15th European Conf. on A.I.)
null
null
null
cs.AI
null
About ten years ago, various notions of preferential entailment have been introduced. The main reference is a paper by Kraus, Lehmann and Magidor (KLM), one of the main competitor being a more general version defined by Makinson (MAK). These two versions have already been compared, but it is time to revisit these comparisons. Here are our three main results: (1) These two notions are equivalent, provided that we restrict our attention, as done in KLM, to the cases where the entailment respects logical equivalence (on the left and on the right). (2) A serious simplification of the description of the fundamental cases in which MAK is equivalent to KLM, including a natural passage in both ways. (3) The two previous results are given for preferential entailments more general than considered in some of the original texts, but they apply also to the original definitions and, for this particular case also, the models can be simplified.
[ { "version": "v1", "created": "Thu, 8 Aug 2002 17:08:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Moinard", "Yves", "" ] ]
cs/0208019
Mikalai Birukou
Mikalai Birukou
Knowledge Representation
null
null
null
null
cs.AI
null
This work analyses main features that should be present in knowledge representation. It suggests a model for representation and a way to implement this model in software. Representation takes care of both low-level sensor information and high-level concepts.
[ { "version": "v1", "created": "Mon, 12 Aug 2002 22:34:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Birukou", "Mikalai", "" ] ]
cs/0208020
Masaki Murata
Masaki Murata and Hitoshi Isahara
Using the DIFF Command for Natural Language Processing
10 pages. Computation and Language. This paper is the rough English translation of our Japanese papar
null
null
null
cs.CL
null
Diff is a software program that detects differences between two data sets and is useful in natural language processing. This paper shows several examples of the application of diff. They include the detection of differences between two different datasets, extraction of rewriting rules, merging of two different datasets, and the optimal matching of two different data sets. Since diff comes with any standard UNIX system, it is readily available and very easy to use. Our studies showed that diff is a practical tool for research into natural language processing.
[ { "version": "v1", "created": "Tue, 13 Aug 2002 03:39:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "Masaki", "" ], [ "Isahara", "Hitoshi", "" ] ]
cs/0208022
Boris Kovalerchuk
B. Kovalerchuk, E. Vityaev, H. Yusupov
Symbolic Methodology in Numeric Data Mining: Relational Techniques for Financial Applications
20 pages, 1 figure, 16 tables
null
null
null
cs.CE
null
Currently statistical and artificial neural network methods dominate in financial data mining. Alternative relational (symbolic) data mining methods have shown their effectiveness in robotics, drug design and other applications. Traditionally symbolic methods prevail in the areas with significant non-numeric (symbolic) knowledge, such as relative location in robot navigation. At first glance, stock market forecast looks as a pure numeric area irrelevant to symbolic methods. One of our major goals is to show that financial time series can benefit significantly from relational data mining based on symbolic methods. The paper overviews relational data mining methodology and develops this techniques for financial data mining.
[ { "version": "v1", "created": "Thu, 15 Aug 2002 03:45:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Kovalerchuk", "B.", "" ], [ "Vityaev", "E.", "" ], [ "Yusupov", "H.", "" ] ]
cs/0208024
Ahmed Helmy
Saurabh Garg, Priyatham Pamu, Nitin Nahata, Ahmed Helmy
Contact-Based Architecture for Resource Discovery (CARD) in Large Scale MANets
10 pages, 15 figures
null
null
null
cs.NI
null
In this paper we propose a novel architecture, CARD, for resource discovery in large scale Mobile Ad hoc Networks (MANets) which, may scale up to thousands of nodes and may span wide geographical regions. Unlike previously proposed schemes, our architecture avoids expensive mechanisms such as global flooding as well as complex coordination between nodes to form a hierarchy. CARD is also independent of any external source of information such as GPS. In our architecture nodes within a limited number of hops from each node form the neighborhood of that node. Resources within the neighborhood can be readily accessed with the help of a proactive scheme within the neighborhood. For accessing resources beyond the neighborhood, each node also maintains a few distant nodes called contacts. Contacts help in creating a small world in the network and provide an efficient way to query for resources beyond the neighborhood. As the number of contacts of a node increases, the network view (reachability) of the node increases. Paths to contacts are validated periodically to adapt to mobility. We present mechanisms for contact selection and maintenance that attempt to increase reachability while minimizing overhead. Our simulation results show a clear trade-off between increase in reachability on one hand, and contact selection and maintenance overhead on the other. Our results suggest that CARD can be configured to provide a desirable reachability distribution for different network sizes. Comparisons with other schemes for resource discovery, such as flooding and bordercasting, show our architecture to be much more efficient and scalable.
[ { "version": "v1", "created": "Fri, 16 Aug 2002 17:21:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Garg", "Saurabh", "" ], [ "Pamu", "Priyatham", "" ], [ "Nahata", "Nitin", "" ], [ "Helmy", "Ahmed", "" ] ]
cs/0208025
Ahmed Helmy
Ahmed Helmy, Muhammad Jaseemuddin, Ganesha Bhaskara
Efficient Micro-Mobility using Intra-domain Multicast-based Mechanisms (M&M)
12 pages, 11 figures
null
null
null
cs.NI
null
One of the most important metrics in the design of IP mobility protocols is the handover performance. The current Mobile IP (MIP) standard has been shown to exhibit poor handover performance. Most other work attempts to modify MIP to slightly improve its efficiency, while others propose complex techniques to replace MIP. Rather than taking these approaches, we instead propose a new architecture for providing efficient and smooth handover, while being able to co-exist and inter-operate with other technologies. Specifically, we propose an intra-domain multicast-based mobility architecture, where a visiting mobile is assigned a multicast address to use while moving within a domain. Efficient handover is achieved using standard multicast join/prune mechanisms. Two approaches are proposed and contrasted. The first introduces the concept proxy-based mobility, while the other uses algorithmic mapping to obtain the multicast address of visiting mobiles. We show that the algorithmic mapping approach has several advantages over the proxy approach, and provide mechanisms to support it. Network simulation (using NS-2) is used to evaluate our scheme and compare it to other routing-based micro-mobility schemes - CIP and HAWAII. The proactive handover results show that both M&M and CIP shows low handoff delay and packet reordering depth as compared to HAWAII. The reason for M&M's comparable performance with CIP is that both use bi-cast in proactive handover. The M&M, however, handles multiple border routers in a domain, where CIP fails. We also provide a handover algorithm leveraging the proactive path setup capability of M&M, which is expected to outperform CIP in case of reactive handover.
[ { "version": "v1", "created": "Fri, 16 Aug 2002 18:04:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Helmy", "Ahmed", "" ], [ "Jaseemuddin", "Muhammad", "" ], [ "Bhaskara", "Ganesha", "" ] ]
cs/0208026
C Sauerbier
Charles Sauerbier
Mathematical basis for polySAT implication operator
7 pages, 7 figures. Keywords: algorithms, complexity, computation theory, satisfiability, group theory, field theory, set theory
null
null
S3E-2002-03
cs.CC cs.LO
null
The mathematical basis motivating the "implication operator" of the polySAT algorithm and its function is examined. Such is not undertaken with onerous rigor of symbolic mathematics; a more intuitive visual appeal being employed to present some of the mathematical premises underlying function of the implication operator.
[ { "version": "v1", "created": "Sun, 18 Aug 2002 04:31:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Sauerbier", "Charles", "" ] ]
cs/0208027
Robert C. Steinke
Robert C. Steinke and Gary J. Nutt
A Unified Theory of Shared Memory Consistency
null
null
null
null
cs.DC
null
Memory consistency models have been developed to specify what values may be returned by a read given that, in a distributed system, memory operations may only be partially ordered. Before this work, consistency models were defined independently. Each model followed a set of rules which was separate from the rules of every other model. In our work we have defined a set of four consistency properties. Any subset of the four properties yields a set of rules which constitute a consistency model. Every consistency model previously described in the literature can be defined based on our four properties. Therefore, we present these properties as a unfied theory of shared memory consistency.
[ { "version": "v1", "created": "Mon, 19 Aug 2002 19:09:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Steinke", "Robert C.", "" ], [ "Nutt", "Gary J.", "" ] ]
cs/0208028
Joseph Y. Halpern
Joseph Y. Halpern and Ron van der Meyden
A logical reconstruction of SPKI
This is an updated version of a paper that appears in the Proceedings of the 14th IEEE Computer Security Foundations Workshop. It will appear in a special issue of the Journal of Computer Security devoted to papers from that conference
null
null
null
cs.CR cs.LO
null
SPKI/SDSI is a proposed public key infrastructure standard that incorporates the SDSI public key infrastructure. SDSI's key innovation was the use of local names. We previously introduced a Logic of Local Name Containment that has a clear semantics and was shown to completely characterize SDSI name resolution. Here we show how our earlier approach can be extended to deal with a number of key features of SPKI, including revocation, expiry dates, and tuple reduction. We show that these extensions add relatively little complexity to the logic. In particular, we do not need a nonmonotonic logic to capture revocation. We then use our semantics to examine SPKI's tuple reduction rules. Our analysis highlights places where SPKI's informal description of tuple reduction is somewhat vague, and shows that extra reduction rules are necessary in order to capture general information about binding and authorization.
[ { "version": "v1", "created": "Mon, 19 Aug 2002 21:03:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "van der Meyden", "Ron", "" ] ]
cs/0208029
Peter Van Roy
Peter Van Roy, Per Brand, Denys Duchier, Seif Haridi, Martin Henz, Christian Schulte
Logic programming in the context of multiparadigm programming: the Oz experience
48 pages, to appear in the journal "Theory and Practice of Logic Programming"
null
null
null
cs.PL
null
Oz is a multiparadigm language that supports logic programming as one of its major paradigms. A multiparadigm language is designed to support different programming paradigms (logic, functional, constraint, object-oriented, sequential, concurrent, etc.) with equal ease. This article has two goals: to give a tutorial of logic programming in Oz and to show how logic programming fits naturally into the wider context of multiparadigm programming. Our experience shows that there are two classes of problems, which we call algorithmic and search problems, for which logic programming can help formulate practical solutions. Algorithmic problems have known efficient algorithms. Search problems do not have known efficient algorithms but can be solved with search. The Oz support for logic programming targets these two problem classes specifically, using the concepts needed for each. This is in contrast to the Prolog approach, which targets both classes with one set of concepts, which results in less than optimal support for each class. To explain the essential difference between algorithmic and search programs, we define the Oz execution model. This model subsumes both concurrent logic programming (committed-choice-style) and search-based logic programming (Prolog-style). Instead of Horn clause syntax, Oz has a simple, fully compositional, higher-order syntax that accommodates the abilities of the language. We conclude with lessons learned from this work, a brief history of Oz, and many entry points into the Oz literature.
[ { "version": "v1", "created": "Tue, 20 Aug 2002 11:12:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Van Roy", "Peter", "" ], [ "Brand", "Per", "" ], [ "Duchier", "Denys", "" ], [ "Haridi", "Seif", "" ], [ "Henz", "Martin", "" ], [ "Schulte", "Christian", "" ] ]
cs/0208030
Wen Chen
W Chen
A direct time-domain FEM modeling of broadband frequency-dependent absorption with the presence of matrix fractional power: Model I
null
null
null
Simula Research Laboratory Report, April 2002
cs.CE cs.CG
null
The frequency-dependent attenuation of broadband acoustics is often confronted in many different areas. However, the related time domain simulation is rarely found in literature due to enormous technical difficulty. The currently popular relaxation models with the presence of convolution operation require some material parameters which are not readily available. In this study, three reports are contributed to address broadband ultrasound frequency-dependent absorptions using the readily available empirical parameters. This report is the first in series concerned with developing a direct time domain FEM formulation. The next two reports are about the frequency decomposition model and the fractional derivative model.
[ { "version": "v1", "created": "Tue, 20 Aug 2002 12:36:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W", "" ] ]
cs/0208031
Alina Andreica
Alina Andreica
Parameterized Type Definitions in Mathematica: Methods and Advantages
14 pages
null
null
null
cs.SC
null
The theme of symbolic computation in algebraic categories has become of utmost importance in the last decade since it enables the automatic modeling of modern algebra theories. On this theoretical background, the present paper reveals the utility of the parameterized categorical approach by deriving a multivariate polynomial category (over various coefficient domains), which is used by our Mathematica implementation of Buchberger's algorithms for determining the Groebner basis. These implementations are designed according to domain and category parameterization principles underlining their advantages: operation protection, inheritance, generality, easy extendibility. In particular, such an extension of Mathematica, a widely used symbolic computation system, with a new type system has a certain practical importance. The approach we propose for Mathematica is inspired from D. Gruntz and M. Monagan's work in Gauss, for Maple.
[ { "version": "v1", "created": "Tue, 20 Aug 2002 13:19:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Andreica", "Alina", "" ] ]
cs/0208032
C. F. M. Vermeulen
K.R. Apt and C.F.M. Vermeulen
First-order Logic as a Constraint Programming Language
17 pages. v2: improved version corrected reference to Turing (instead of Tarski)
"Logic for Programming, Artificial Intelligence and Reasoning", Proceedings of the 9th International Conference LPAR2002, Tbilisi, Georgia; Editors: A. Voronkov and M. Baaz; Springer Verlag LNAI2514; pages 19-35; October 2002
null
null
cs.LO
null
We provide a denotational semantics for first-order logic that captures the two-level view of the computation process typical for constraint programming. At one level we have the usual program execution. At the other level an automatic maintenance of the constraint store takes place. We prove that the resulting semantics is sound with respect to the truth definition. By instantiating it by specific forms of constraint management policies we obtain several sound evaluation policies of first-order formulas. This semantics can also be used a basis for sound implementation of constraint maintenance in presence of block declarations and conditionals.
[ { "version": "v1", "created": "Tue, 20 Aug 2002 14:53:37 GMT" }, { "version": "v2", "created": "Tue, 19 Nov 2002 12:30:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "K. R.", "" ], [ "Vermeulen", "C. F. M.", "" ] ]
cs/0208033
Joseph Y. Halpern
Joseph Y. Halpern, Ron van der Meyden, and Moshe Y. Vardi
Complete Axiomatizations for Reasoning About Knowledge and Time
To appear, SIAM Journal on Computing
null
null
null
cs.LO cs.AI
null
Sound and complete axiomatizations are provided for a number of different logics involving modalities for knowledge and time. These logics arise from different choices for various parameters. All the logics considered involve the discrete time linear temporal logic operators `next' and `until' and an operator for the knowledge of each of a number of agents. Both the single agent and multiple agent cases are studied: in some instances of the latter there is also an operator for the common knowledge of the group of all agents. Four different semantic properties of agents are considered: whether they have a unique initial state, whether they operate synchronously, whether they have perfect recall, and whether they learn. The property of no learning is essentially dual to perfect recall. Not all settings of these parameters lead to recursively axiomatizable logics, but sound and complete axiomatizations are presented for all the ones that do.
[ { "version": "v1", "created": "Tue, 20 Aug 2002 22:55:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "van der Meyden", "Ron", "" ], [ "Vardi", "Moshe Y.", "" ] ]
cs/0208034
Joseph Y. Halpern
Joseph Y. Halpern and Judea Pearl
Causes and Explanations: A Structural-Model Approach. Part II: Explanations
Part I of the paper (on causes) is also on the arxiv. The two papers originally were posted as one submission. The conference version of the paper appears in IJCAI '01. This paper will appear in the British Journal for Philosophy of Science
null
null
null
cs.AI
null
We propose new definitions of (causal) explanation, using structural equations to model counterfactuals. The definition is based on the notion of actual cause, as defined and motivated in a companion paper. Essentially, an explanation is a fact that is not known for certain but, if found to be true, would constitute an actual cause of the fact to be explained, regardless of the agent's initial uncertainty. We show that the definition handles well a number of problematic examples from the literature.
[ { "version": "v1", "created": "Tue, 20 Aug 2002 23:08:49 GMT" }, { "version": "v2", "created": "Mon, 7 Nov 2005 20:13:44 GMT" }, { "version": "v3", "created": "Sat, 19 Nov 2005 23:16:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pearl", "Judea", "" ] ]
cs/0208035
Andrei Popescu-Belis
Andrei Popescu-Belis, Isabelle Robba
Evaluation of Coreference Rules on Complex Narrative Texts
9 pages
Proceedings of DAARC2 (Discourse Anaphora and Anaphor Resolution Colloquium), Lancaster, UK, 1998, p.178-185
null
null
cs.CL
null
This article studies the problem of assessing relevance to each of the rules of a reference resolution system. The reference solver described here stems from a formal model of reference and is integrated in a reference processing workbench. Evaluation of the reference resolution is essential, as it enables differential evaluation of individual rules. Numerical values of these measures are given, and discussed, for simple selection rules and other processing rules; such measures are then studied for numerical parameters.
[ { "version": "v1", "created": "Wed, 21 Aug 2002 14:09:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Popescu-Belis", "Andrei", "" ], [ "Robba", "Isabelle", "" ] ]
cs/0208036
Andrei Popescu-Belis
Andrei Popescu-Belis, Isabelle Robba
Three New Methods for Evaluating Reference Resolution
7 pages
Proceedings of the LREC'98 Workshop on Linguistic Coreference, Madrid, Spain, 1998
null
null
cs.CL
null
Reference resolution on extended texts (several thousand references) cannot be evaluated manually. An evaluation algorithm has been proposed for the MUC tests, using equivalence classes for the coreference relation. However, we show here that this algorithm is too indulgent, yielding good scores even for poor resolution strategies. We elaborate on the same formalism to propose two new evaluation algorithms, comparing them first with the MUC algorithm and giving then results on a variety of examples. A third algorithm using only distributional comparison of equivalence classes is finally described; it assesses the relative importance of the recall vs. precision errors.
[ { "version": "v1", "created": "Wed, 21 Aug 2002 14:28:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Popescu-Belis", "Andrei", "" ], [ "Robba", "Isabelle", "" ] ]
cs/0208037
Andrei Popescu-Belis
Andrei Popescu-Belis, Isabelle Robba
Cooperation between Pronoun and Reference Resolution for Unrestricted Texts
7 pages
Proceedings of the ACL'97 Workshop on Operational Factors in Practical, Robust Anaphora Resolution for Unrestricted Texts, Madrid, Spain, 1998, p.94-99
null
null
cs.CL
null
Anaphora resolution is envisaged in this paper as part of the reference resolution process. A general open architecture is proposed, which can be particularized and configured in order to simulate some classic anaphora resolution methods. With the aim of improving pronoun resolution, the system takes advantage of elementary cues about characters of the text, which are represented through a particular data structure. In its most robust configuration, the system uses only a general lexicon, a local morpho-syntactic parser and a dictionary of synonyms. A short comparative corpus analysis shows that narrative texts are the most suitable for testing such a system.
[ { "version": "v1", "created": "Wed, 21 Aug 2002 14:36:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Popescu-Belis", "Andrei", "" ], [ "Robba", "Isabelle", "" ] ]
cs/0208038
Andrei Popescu-Belis
Andrei Popescu-Belis, Isabelle Robba, Gerard Sabah
Reference Resolution Beyond Coreference: a Conceptual Frame and its Application
8 pages
Proceedings of COLING-ACL'98, Montreal, Canada, 1998, p.1046-1052
null
null
cs.CL
null
A model for reference use in communication is proposed, from a representationist point of view. Both the sender and the receiver of a message handle representations of their common environment, including mental representations of objects. Reference resolution by a computer is viewed as the construction of object representations using referring expressions from the discourse, whereas often only coreference links between such expressions are looked for. Differences between these two approaches are discussed. The model has been implemented with elementary rules, and tested on complex narrative texts (hundreds to thousands of referring expressions). The results support the mental representations paradigm.
[ { "version": "v1", "created": "Wed, 21 Aug 2002 14:43:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Popescu-Belis", "Andrei", "" ], [ "Robba", "Isabelle", "" ], [ "Sabah", "Gerard", "" ] ]
cs/0208039
Jean Slisz
Elizabeth Anderson, Robert Atkinson, Elizabeth Buckley-Geer, Cynthia Crego, Lisa Giacchetti, Stephen Hanson, David Ritchie, Jean Slisz, Sara Tompson, Stephen Wolbers
A Virtual Library of Technical Publications
Presented at 6th International World Wide Web Conference, Santa Clara, CA, 7-12 Apr 1997 and at Inforum'97, Oak Ridge TN, 6-8 May 1997
null
null
FERMILAB-TM-2004
cs.DL
null
Through a collaborative effort, the Fermilab Information Resources Department and Computing Division have created a "virtual library" of technical publications that provides public access to electronic full-text documents. This paper will discuss the vision, planning and milestones of the project, as well as the hardware, software and interdepartmental cooperation components.
[ { "version": "v1", "created": "Fri, 23 Aug 2002 19:14:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Anderson", "Elizabeth", "" ], [ "Atkinson", "Robert", "" ], [ "Buckley-Geer", "Elizabeth", "" ], [ "Crego", "Cynthia", "" ], [ "Giacchetti", "Lisa", "" ], [ "Hanson", "Stephen", "" ], [ "Ritchie", "David", "" ], [ "Slisz", "Jean", "" ], [ "Tompson", "Sara", "" ], [ "Wolbers", "Stephen", "" ] ]
cs/0208040
Naren Ramakrishnan
Alex Verstak, Naren Ramakrishnan, Kyung Kyoon Bae, William H. Tranter, Layne T. Watson, Jian He, Clifford A. Shaffer, and Theodore S. Rappaport
Using Hierarchical Data Mining to Characterize Performance of Wireless System Configurations
null
null
null
null
cs.CE
null
This paper presents a statistical framework for assessing wireless systems performance using hierarchical data mining techniques. We consider WCDMA (wideband code division multiple access) systems with two-branch STTD (space time transmit diversity) and 1/2 rate convolutional coding (forward error correction codes). Monte Carlo simulation estimates the bit error probability (BEP) of the system across a wide range of signal-to-noise ratios (SNRs). A performance database of simulation runs is collected over a targeted space of system configurations. This database is then mined to obtain regions of the configuration space that exhibit acceptable average performance. The shape of the mined regions illustrates the joint influence of configuration parameters on system performance. The role of data mining in this application is to provide explainable and statistically valid design conclusions. The research issue is to define statistically meaningful aggregation of data in a manner that permits efficient and effective data mining algorithms. We achieve a good compromise between these goals and help establish the applicability of data mining for characterizing wireless systems performance.
[ { "version": "v1", "created": "Sun, 25 Aug 2002 16:28:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Verstak", "Alex", "" ], [ "Ramakrishnan", "Naren", "" ], [ "Bae", "Kyung Kyoon", "" ], [ "Tranter", "William H.", "" ], [ "Watson", "Layne T.", "" ], [ "He", "Jian", "" ], [ "Shaffer", "Clifford A.", "" ], [ "Rappaport", "Theodore S.", "" ] ]
cs/0208041
Yongge Wang
Yvo Desmedt and Yongge Wang
Perfectly Secure Message Transmission Revisited
null
null
null
null
cs.CR cs.CC
null
Achieving secure communications in networks has been one of the most important problems in information technology. Dolev, Dwork, Waarts, and Yung have studied secure message transmission in one-way or two-way channels. They only consider the case when all channels are two-way or all channels are one-way. Goldreich, Goldwasser, and Linial, Franklin and Yung, Franklin and Wright, and Wang and Desmedt have studied secure communication and secure computation in multi-recipient (multicast) models. In a ``multicast channel'' (such as Ethernet), one processor can send the same message--simultaneously and privately--to a fixed subset of processors. In this paper, we shall study necessary and sufficient conditions for achieving secure communications against active adversaries in mixed one-way and two-way channels. We also discuss multicast channels and neighbor network channels.
[ { "version": "v1", "created": "Mon, 26 Aug 2002 21:02:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Desmedt", "Yvo", "" ], [ "Wang", "Yongge", "" ] ]
cs/0208042
Maurizio Gabbrielli
F.S. de Boer, M. Gabbrielli and M.C. Meo
Proving correctness of Timed Concurrent Constraint Programs
null
null
null
null
cs.LO cs.PL
null
A temporal logic is presented for reasoning about the correctness of timed concurrent constraint programs. The logic is based on modalities which allow one to specify what a process produces as a reaction to what its environment inputs. These modalities provide an assumption/commitment style of specification which allows a sound and complete compositional axiomatization of the reactive behavior of timed concurrent constraint programs.
[ { "version": "v1", "created": "Wed, 28 Aug 2002 14:34:31 GMT" } ]
2007-05-23T00:00:00
[ [ "de Boer", "F. S.", "" ], [ "Gabbrielli", "M.", "" ], [ "Meo", "M. C.", "" ] ]
cs/0208043
John M. Hitchcock
John M. Hitchcock
Gales Suffice for Constructive Dimension
4 pages
null
null
null
cs.CC
null
Supergales, generalizations of supermartingales, have been used by Lutz (2002) to define the constructive dimensions of individual binary sequences. Here it is shown that gales, the corresponding generalizations of martingales, can be equivalently used to define constructive dimension.
[ { "version": "v1", "created": "Thu, 29 Aug 2002 20:48:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Hitchcock", "John M.", "" ] ]
cs/0208044
Stephen A. Fenner
Stephen A. Fenner
Gales and supergales are equivalent for defining constructive Hausdorff dimension
7 pages, no figures
null
null
null
cs.CC
null
We show that for a wide range of probability measures, constructive gales are interchangable with constructive supergales for defining constructive Hausdorff dimension, thus generalizing a previous independent result of Hitchcock (cs.CC/0208043) and partially answering an open question of Lutz (cs.CC/0203017).
[ { "version": "v1", "created": "Thu, 29 Aug 2002 21:25:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Fenner", "Stephen A.", "" ] ]
cs/0209001
MyungHo Kim
Gene Kim and MyungHo Kim
A Novel Statistical Diagnosis of Clinical Data
20 pages, 4 figures
null
null
null
cs.CE cs.CC
null
In this paper, we present a diagnosis method of diseases from clinical data. The data are routine test such as urine test, hematology, chemistries etc. Though those tests have been done for people who check in medical institutes, how each item of the data interacts each other and which combination of them cause a disease are neither understood nor studied well. Here we attack the practically important problem by putting the data into mathematical setup and applying support vector machine. Finally we present simulation results for fatty liver, gastritis etc and discuss about their implications.
[ { "version": "v1", "created": "Mon, 2 Sep 2002 03:52:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Gene", "" ], [ "Kim", "MyungHo", "" ] ]
cs/0209002
Pascal Vaillant
Pascal Vaillant (ENST, Paris)
A Chart-Parsing Algorithm for Efficient Semantic Analysis
7 pages, 1 figure, LaTeX 2e using COLACL and EPSF packages. Proceedings of the 19th International Conference on Computational Linguistics (COLING 2002), Taipei, Republic of China (Taiwan), 24 Aug. - 1 Sept. 2002
COLING 2002, Proceedings of the main Conference; The Association for Computational Linguistics and Chinese Language Processing; vol. 2, p. 1044-1050
null
null
cs.CL
null
In some contexts, well-formed natural language cannot be expected as input to information or communication systems. In these contexts, the use of grammar-independent input (sequences of uninflected semantic units like e.g. language-independent icons) can be an answer to the users' needs. A semantic analysis can be performed, based on lexical semantic knowledge: it is equivalent to a dependency analysis with no syntactic or morphological clues. However, this requires that an intelligent system should be able to interpret this input with reasonable accuracy and in reasonable time. Here we propose a method allowing a purely semantic-based analysis of sequences of semantic units. It uses an algorithm inspired by the idea of ``chart parsing'' known in Natural Language Processing, which stores intermediate parsing results in order to bring the calculation time down. In comparison with using declarative logic programming - where the calculation time, left to a prolog engine, is hyperexponential -, this method brings the calculation time down to a polynomial time, where the order depends on the valency of the predicates.
[ { "version": "v1", "created": "Mon, 2 Sep 2002 16:55:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Vaillant", "Pascal", "", "ENST, Paris" ] ]
cs/0209003
Anna Rumshisky
J. Pustejovsky, A. Rumshisky, J. Castano
Rerendering Semantic Ontologies: Automatic Extensions to UMLS through Corpus Analytics
8 pages
LREC 2002 Workshop on Ontologies and Lexical Knowledge Bases
null
null
cs.CL
null
In this paper, we discuss the utility and deficiencies of existing ontology resources for a number of language processing applications. We describe a technique for increasing the semantic type coverage of a specific ontology, the National Library of Medicine's UMLS, with the use of robust finite state methods used in conjunction with large-scale corpus analytics of the domain corpus. We call this technique "semantic rerendering" of the ontology. This research has been done in the context of Medstract, a joint Brandeis-Tufts effort aimed at developing tools for analyzing biomedical language (i.e., Medline), as well as creating targeted databases of bio-entities, biological relations, and pathway data for biological researchers. Motivating the current research is the need to have robust and reliable semantic typing of syntactic elements in the Medline corpus, in order to improve the overall performance of the information extraction applications mentioned above.
[ { "version": "v1", "created": "Tue, 3 Sep 2002 05:28:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Pustejovsky", "J.", "" ], [ "Rumshisky", "A.", "" ], [ "Castano", "J.", "" ] ]
cs/0209004
Tatsuya Mori
Tatsuya Mori, Ryoichi Kawahara, Shozo Naito
Analysis of Non-Gaussian Nature of Network Traffic and its Implication on Network Performance
11 pages, 12 figures
null
null
null
cs.NI
null
We analyzed the non-Gaussian nature of network traffic using some Internet traffic data. We found that (1) the non-Gaussian nature degrades network performance, (2) it is caused by `greedy flows' that exist with non-negligible probability, and (3) a large majority of `greedy flows' are TCP flows having relatively small hop counts, which correspond to small round-trip times. We conclude that in a network hat has greedy flows with non-negligible probability, a traffic controlling scheme or bandwidth design that considers non-Gaussian nature is essential.
[ { "version": "v1", "created": "Tue, 3 Sep 2002 02:24:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Mori", "Tatsuya", "" ], [ "Kawahara", "Ryoichi", "" ], [ "Naito", "Shozo", "" ] ]
cs/0209005
Mario Catalani
Mario Catalani
Sampling from a couple of positively correlated binomial variables
null
null
null
DECON0902
cs.DM
null
We know that the marginals in a multinomial distribution are binomial variates exhibiting a negative correlation. But we can construct two linear combinations of such marginals in such a way to obtain a positive correlation. We discuss the restrictions that are to be imposed on the parameters of the given marginals to accomplish such a result. Next we discuss the regression function, showing that it is a linear function but not homoscedastic.
[ { "version": "v1", "created": "Wed, 4 Sep 2002 15:38:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Catalani", "Mario", "" ] ]
cs/0209008
Chung-chieh Shan
Chung-chieh Shan (Harvard University) and Balder D. ten Cate (Universiteit van Amsterdam)
The partition semantics of questions, syntactically
14 pages
Proceedings of the 2002 European Summer School in Logic, Language and Information student session, ed. Malvina Nissim
null
null
cs.CL cs.AI cs.LO
null
Groenendijk and Stokhof (1984, 1996; Groenendijk 1999) provide a logically attractive theory of the semantics of natural language questions, commonly referred to as the partition theory. Two central notions in this theory are entailment between questions and answerhood. For example, the question "Who is going to the party?" entails the question "Is John going to the party?", and "John is going to the party" counts as an answer to both. Groenendijk and Stokhof define these two notions in terms of partitions of a set of possible worlds. We provide a syntactic characterization of entailment between questions and answerhood . We show that answers are, in some sense, exactly those formulas that are built up from instances of the question. This result lets us compare the partition theory with other approaches to interrogation -- both linguistic analyses, such as Hamblin's and Karttunen's semantics, and computational systems, such as Prolog. Our comparison separates a notion of answerhood into three aspects: equivalence (when two questions or answers are interchangeable), atomic answers (what instances of a question count as answers), and compound answers (how answers compose).
[ { "version": "v1", "created": "Wed, 4 Sep 2002 20:11:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Shan", "Chung-chieh", "", "Harvard University" ], [ "Cate", "Balder D. ten", "", "Universiteit van Amsterdam" ] ]
cs/0209009
Chung-chieh Shan
Balder D. ten Cate (Universiteit van Amsterdam) and Chung-chieh Shan (Harvard University)
Question answering: from partitions to Prolog
15 pages
Proceedings of TABLEAUX 2002: Automated Reasoning with Analytic Tableaux and Related Methods, ed. Uwe Egly and Christian G. Fermueller, Lecture Notes in Artificial Intelligence 2381, 251-265; also in Proceedings of NLULP 2002, ed. Shuly Wintner
null
null
cs.CL cs.AI cs.LO
null
We implement Groenendijk and Stokhof's partition semantics of questions in a simple question answering algorithm. The algorithm is sound, complete, and based on tableau theorem proving. The algorithm relies on a syntactic characterization of answerhood: Any answer to a question is equivalent to some formula built up only from instances of the question. We prove this characterization by translating the logic of interrogation to classical predicate logic and applying Craig's interpolation theorem.
[ { "version": "v1", "created": "Wed, 4 Sep 2002 20:46:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Cate", "Balder D. ten", "", "Universiteit van Amsterdam" ], [ "Shan", "Chung-chieh", "", "Harvard University" ] ]
cs/0209010
Erik Tjong Kim Sang
Erik F. Tjong Kim Sang
Introduction to the CoNLL-2002 Shared Task: Language-Independent Named Entity Recognition
4 pages
Dan Roth and Antal van den Bosch (eds.), Proceedings of CoNLL-2002, Taipei, Taiwan, 2002, pp. 155-158
null
null
cs.CL
null
We describe the CoNLL-2002 shared task: language-independent named entity recognition. We give background information on the data sets and the evaluation method, present a general overview of the systems that have taken part in the task and discuss their performance.
[ { "version": "v1", "created": "Thu, 5 Sep 2002 19:03:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Sang", "Erik F. Tjong Kim", "" ] ]
cs/0209011
Erran L. Li
Zygmunt Haas, Joseph Y. Halpern and Erran L. Li
Gossip Based Ad-Hoc Routing
10 pages
IEEE INFOCOM, June 2002
null
null
cs.NI
null
Many ad hoc routing protocols are based on some variant of flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossiping-based approach, where each node forwards a message with some probability, to reduce the overhead of the routing protocols. Gossiping exhibits bimodal behavior in sufficiently large networks: in some executions, the gossip dies out quickly and hardly any node gets the message; in the remaining executions, a substantial fraction of the nodes gets the message. The fraction of executions in which most nodes get the message depends on the gossiping probability and the topology of the network. In the networks we have considered, using gossiping probability between 0.6 and 0.8 suffices to ensure that almost every node gets the message in almost every execution. For large networks, this simple gossiping protocol uses up to 35% fewer messages than flooding, with improved performance. Gossiping can also be combined with various optimizations of flooding to yield further benefits. Simulations show that adding gossiping to AODV results in significant performance improvement, even in networks as small as 150 nodes. We expect that the improvement should be even more significant in larger networks.
[ { "version": "v1", "created": "Thu, 5 Sep 2002 21:45:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Haas", "Zygmunt", "" ], [ "Halpern", "Joseph Y.", "" ], [ "Li", "Erran L.", "" ] ]
cs/0209012
Erran L. Li
Erran L. Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang and Roger Wattenhofer
Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks
10 pages
ACM PODC, 2001
null
null
cs.NI
null
The topology of a wireless multi-hop network can be controlled by varying the transmission power at each node. In this paper, we give a detailed analysis of a cone-based distributed topology control algorithm. This algorithm, introduced in [16], does not assume that nodes have GPS information available; rather it depends only on directional information. Roughly speaking, the basic idea of the algorithm is that a node $u$ transmits with the minimum power $p_{u,\alpha}$ required to ensure that in every cone of degree $\alpha$ around $u$, there is some node that $u$ can reach with power $p_{u,\alpha}$. We show that taking $\alpha = 5\pi/6$ is a necessary and sufficient condition to guarantee that network connectivity is preserved. More precisely, if there is a path from $s$ to $t$ when every node communicates at maximum power, then, if $\alpha <= 5\pi/6$, there is still a path in the smallest symmetric graph $G_\alpha$ containing all edges $(u,v)$ such that $u$ can communicate with $v$ using power $p_{u,\alpha}$. On the other hand, if $\alpha > 5\pi/6$, connectivity is not necessarily preserved. We also propose a set of optimizations that further reduce power consumption and prove that they retain network connectivity. Dynamic reconfiguration in the presence of failures and mobility is also discussed. Simulation results are presented to demonstrate the effectiveness of the algorithm and the optimizations.
[ { "version": "v1", "created": "Thu, 5 Sep 2002 22:23:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Erran L.", "" ], [ "Halpern", "Joseph Y.", "" ], [ "Bahl", "Paramvir", "" ], [ "Wang", "Yi-Min", "" ], [ "Wattenhofer", "Roger", "" ] ]
cs/0209013
Erran L. Li
Erran L. Li and Joseph Y. Halpern
Minimum-Energy Mobile Wireless Networks Revisited
6 pages
IEEE ICC, 2001
null
null
cs.NI
null
We propose a protocol that, given a communication network, computes a subnetwork such that, for every pair $(u,v)$ of nodes connected in the original network, there is a minimum-energy path between $u$ and $v$ in the subnetwork (where a minimum-energy path is one that allows messages to be transmitted with a minimum use of energy). The network computed by our protocol is in general a subnetwork of the one computed by the protocol given in [13]. Moreover, our protocol is computationally simpler. We demonstrate the performance improvements obtained by using the subnetwork computed by our protocol through simulation.
[ { "version": "v1", "created": "Thu, 5 Sep 2002 22:47:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Erran L.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/0209014
James Aspnes
James Aspnes
Randomized protocols for asynchronous consensus
29 pages; survey paper written for PODC 20th anniversary issue of Distributed Computing
null
null
null
cs.DS cs.DC
null
The famous Fischer, Lynch, and Paterson impossibility proof shows that it is impossible to solve the consensus problem in a natural model of an asynchronous distributed system if even a single process can fail. Since its publication, two decades of work on fault-tolerant asynchronous consensus algorithms have evaded this impossibility result by using extended models that provide (a) randomization, (b) additional timing assumptions, (c) failure detectors, or (d) stronger synchronization mechanisms than are available in the basic model. Concentrating on the first of these approaches, we illustrate the history and structure of randomized asynchronous consensus protocols by giving detailed descriptions of several such protocols.
[ { "version": "v1", "created": "Fri, 6 Sep 2002 15:36:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Aspnes", "James", "" ] ]
cs/0209016
Michael H. Albert
M.H.Albert and M.D.Atkinson
Sorting with a forklift
24 pages, 2 figures
null
null
null
cs.DM cs.DS math.CO
null
A fork stack is a generalised stack which allows pushes and pops of several items at a time. We consider the problem of determining which input streams can be sorted using a single forkstack, or dually, which permutations of a fixed input stream can be produced using a single forkstack. An algorithm is given to solve the sorting problem and the minimal unsortable sequences are found. The results are extended to fork stacks where there are bounds on how many items can be pushed and popped at one time. In this context we also establish how to enumerate the collection of sortable sequences.
[ { "version": "v1", "created": "Tue, 10 Sep 2002 22:05:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Albert", "M. H.", "" ], [ "Atkinson", "M. D.", "" ] ]
cs/0209017
Michele Tucci
Michele Tucci (U. of Rome "La Sapienza")
Evolution and Gravitation: a Computer Simulation of a Non-Walrasian Equilibrium Model
PDF, 33 pages
null
null
null
cs.CY
null
The paper contains a computer simulation concerning a basic non-Walrasian equilibrium system, following the Edmond Malinvaud "short side" approach, as far as the price adjustment is concerned, and the sequential Hicksian "weeks" structure with regard of the temporal characterization.
[ { "version": "v1", "created": "Sun, 15 Sep 2002 18:59:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Tucci", "Michele", "", "U. of Rome \"La Sapienza\"" ] ]
cs/0209019
Thomas Eiter
T. Eiter, M. Fink, G. Sabbatini, H. Tompits
Reasoning about Evolving Nonmonotonic Knowledge Bases
47 pages.A preliminary version appeared in: Proc. 8th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR 2001), R. Nieuwenhuis and A. Voronkov (eds), pp. 407--421, LNCS 2250, Springer 2001
null
null
INFSYS RR-1843-02-11
cs.AI
null
Recently, several approaches to updating knowledge bases modeled as extended logic programs have been introduced, ranging from basic methods to incorporate (sequences of) sets of rules into a logic program, to more elaborate methods which use an update policy for specifying how updates must be incorporated. In this paper, we introduce a framework for reasoning about evolving knowledge bases, which are represented as extended logic programs and maintained by an update policy. We first describe a formal model which captures various update approaches, and we define a logical language for expressing properties of evolving knowledge bases. We then investigate semantical and computational properties of our framework, where we focus on properties of knowledge states with respect to the canonical reasoning task of whether a given formula holds on a given evolving knowledge base. In particular, we present finitary characterizations of the evolution for certain classes of framework instances, which can be exploited for obtaining decidability results. In more detail, we characterize the complexity of reasoning for some meaningful classes of evolving knowledge bases, ranging from polynomial to double exponential space complexity.
[ { "version": "v1", "created": "Mon, 16 Sep 2002 19:23:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiter", "T.", "" ], [ "Fink", "M.", "" ], [ "Sabbatini", "G.", "" ], [ "Tompits", "H.", "" ] ]
cs/0209020
Wen Chen
W. Chen
A new definition of the fractional Laplacian
This study is carred out with the ongoing project of "mathematical and numerical modelling of medical ultasound wave propagation" sponsored by the Simula Research Laboratory
null
null
null
cs.NA cs.CE
null
It is noted that the standard definition of the fractional Laplacian leads to a hyper-singular convolution integral and is also obscure about how to implement the boundary conditions. This purpose of this note is to introduce a new definition of the fractional Laplacian to overcome these major drawbacks.
[ { "version": "v1", "created": "Wed, 18 Sep 2002 12:45:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0209021
Paul Prekop
Paul Prekop and Mark Burnett
Activities, Context and Ubiquitous Computing
null
Computer Communications 26 (2003) 1168-1176
null
null
cs.IR
null
Context and context-awareness provides computing environments with the ability to usefully adapt the services or information they provide. It is the ability to implicitly sense and automatically derive the user needs that separates context-aware applications from traditionally designed applications, and this makes them more attentive, responsive, and aware of their user's identity, and their user's environment. This paper argues that context-aware applications capable of supporting complex, cognitive activities can be built from a model of context called Activity-Centric Context. A conceptual model of Activity-Centric context is presented. The model is illustrated via a detailed example.
[ { "version": "v1", "created": "Thu, 19 Sep 2002 06:53:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Prekop", "Paul", "" ], [ "Burnett", "Mark", "" ] ]
cs/0209023
Mema Roussopoulos
Mema Roussopoulos and Mary Baker
Practical Load Balancing for Content Requests in Peer-to-Peer Networks
23 pages, 38 figures
null
null
null
cs.NI cs.DC
null
This paper studies the problem of load-balancing the demand for content in a peer-to-peer network across heterogeneous peer nodes that hold replicas of the content. Previous decentralized load balancing techniques in distributed systems base their decisions on periodic updates containing information about load or available capacity observed at the serving entities. We show that these techniques do not work well in the peer-to-peer context; either they do not address peer node heterogeneity, or they suffer from significant load oscillations. We propose a new decentralized algorithm, Max-Cap, based on the maximum inherent capacities of the replica nodes and show that unlike previous algorithms, it is not tied to the timeliness or frequency of updates. Yet, Max-Cap can handle the heterogeneity of a peer-to-peer environment without suffering from load oscillations.
[ { "version": "v1", "created": "Sat, 21 Sep 2002 00:09:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Roussopoulos", "Mema", "" ], [ "Baker", "Mary", "" ] ]
cs/0209026
Peter Rowlands
Peter Rowlands and Bernard Diaz
A universal alphabet and rewrite system
15 pages
null
null
null
cs.OH
null
We present two ways in which an infinite universal alphabet may be generated using a novel rewrite system that conserves zero (a special character of the alphabet and the symbol for that character) at every step. The recursive method delivers the entire alphabet in one step when invoked with the zero character as the initial subset alphabet. The iterative method with the same start delivers characters that act as ciphers for properties that the developing subset alphabet contains. These properties emerge in an arbitrary sequence and there are an infinite number of ways they may be selected. The subset alphabets in addition to having mathematical interpretation as algebra can also be constrained to emerge in a minimal way which then has application as a foundational physical system. Each subset alphabet may itself be the basis of a rewrite system where rules that operate on symbols (representing characters) or collections of symbols manipulate the specific properties in a dynamic way.
[ { "version": "v1", "created": "Mon, 23 Sep 2002 14:26:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Rowlands", "Peter", "" ], [ "Diaz", "Bernard", "" ] ]
cs/0209027
Yaneff
A. G. Yaneff
Remarks on d-Dimensional TSP Optimal Tour Length Behaviour
8 pages, 5 charts
null
null
null
cs.CG
null
The well-known $O(n^{1-1/d})$ behaviour of the optimal tour length for TSP in d-dimensional Cartesian space causes breaches of the triangle inequality. Other practical inadequacies of this model are discussed, including its use as basis for approximation of the TSP optimal tour length or bounds derivations, which I attempt to remedy.
[ { "version": "v1", "created": "Mon, 23 Sep 2002 21:53:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Yaneff", "A. G.", "" ] ]
cs/0209028
Matei Ripeanu
Matei Ripeanu, Ian Foster and Adriana Iamnitchi
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
null
IEEE Internet Computing Journal (special issue on peer-to-peer networking), vol. 6(1) 2002
null
null
cs.DC cond-mat.stat-mech cs.NI
null
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2P systems behavior. The open architecture, achieved scale, and self-organizing structure of the Gnutella network make it an interesting P2P architecture to study. Like most other P2P applications, Gnutella builds, at the application level, a virtual network with its own routing mechanisms. The topology of this virtual network and the routing mechanisms used have a significant influence on application properties such as performance, reliability, and scalability. We have built a "crawler" to extract the topology of Gnutella's application level network. In this paper we analyze the topology graph and evaluate generated network traffic. Our two major findings are that: (1) although Gnutella is not a pure power-law network, its current configuration has the benefits and drawbacks of a power-law structure, and (2) the Gnutella virtual network topology does not match well the underlying Internet topology, hence leading to ineffective use of the physical networking infrastructure. These findings guide us to propose changes to the Gnutella protocol and implementations that may bring significant performance and scalability improvements. We believe that our findings as well as our measurement and analysis techniques have broad applicability to P2P systems and provide unique insights into P2P system design tradeoffs.
[ { "version": "v1", "created": "Wed, 25 Sep 2002 08:27:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Ripeanu", "Matei", "" ], [ "Foster", "Ian", "" ], [ "Iamnitchi", "Adriana", "" ] ]
cs/0209029
Gianluca Argentini
Gianluca Argentini
A generalization of Amdahl's law and relative conditions of parallelism
11 pages, 4 figures
null
null
null
cs.DC cs.PF
null
In this work I present a generalization of Amdahl's law on the limits of a parallel implementation with many processors. In particular I establish some mathematical relations involving the number of processors and the dimension of the treated problem, and with these conditions I define, on the ground of the reachable speedup, some classes of parallelism for the implementations. I also derive a condition for obtaining superlinear speedup. The used mathematical technics are those of differential calculus. I describe some examples from classical problems offered by the specialized literature on the subject.
[ { "version": "v1", "created": "Wed, 25 Sep 2002 08:50:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0209030
Stefan Boettcher
Stefan Boettcher (Emory U) and Allon G. Percus (Los Alamos)
Extremal Optimization: an Evolutionary Local-Search Algorithm
Latex, 17 pages, to appear in the {\it Proceedings of the 8th INFORMS Computing Society Conference,} (2003)
null
null
null
cs.NE cs.AI
null
A recently introduced general-purpose heuristic for finding high-quality solutions for many hard optimization problems is reviewed. The method is inspired by recent progress in understanding far-from-equilibrium phenomena in terms of {\em self-organized criticality,} a concept introduced to describe emergent complexity in physical systems. This method, called {\em extremal optimization,} successively replaces the value of extremely undesirable variables in a sub-optimal solution with new, random ones. Large, avalanche-like fluctuations in the cost function self-organize from this dynamics, effectively scaling barriers to explore local optima in distant neighborhoods of the configuration space while eliminating the need to tune parameters. Drawing upon models used to simulate the dynamics of granular media, evolution, or geology, extremal optimization complements approximation methods inspired by equilibrium statistical physics, such as {\em simulated annealing}. It may be but one example of applying new insights into {\em non-equilibrium phenomena} systematically to hard optimization problems. This method is widely applicable and so far has proved competitive with -- and even superior to -- more elaborate general-purpose heuristics on testbeds of constrained optimization problems with up to $10^5$ variables, such as bipartitioning, coloring, and satisfiability. Analysis of a suitable model predicts the only free parameter of the method in accordance with all experimental results.
[ { "version": "v1", "created": "Thu, 26 Sep 2002 14:16:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Boettcher", "Stefan", "", "Emory U" ], [ "Percus", "Allon G.", "", "Los Alamos" ] ]
cs/0209031
Adriana Iamnitchi
Adriana Iamnitchi, Matei Ripeanu, Ian Foster
Locating Data in (Small-World?) Peer-to-Peer Scientific Collaborations
8 pages
1st International Workshop on Peer-to-Peer Systems IPTPS 2002
null
null
cs.DC cond-mat
null
Data-sharing scientific collaborations have particular characteristics, potentially different from the current peer-to-peer environments. In this paper we advocate the benefits of exploiting emergent patterns in self-configuring networks specialized for scientific data-sharing collaborations. We speculate that a peer-to-peer scientific collaboration network will exhibit small-world topology, as do a large number of social networks for which the same pattern has been documented. We propose a solution for locating data in decentralized, scientific, data-sharing environments that exploits the small-worlds topology. The research challenge we raise is: what protocols should be used to allow a self-configuring peer-to-peer network to form small worlds similar to the way in which the humans that use the network do in their social interactions?
[ { "version": "v1", "created": "Thu, 26 Sep 2002 19:14:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Iamnitchi", "Adriana", "" ], [ "Ripeanu", "Matei", "" ], [ "Foster", "Ian", "" ] ]
cs/0209033
Christoph Durr
Philippe Baptiste, Marek Chrobak, Christoph Durr, Wojciech Jawor and Nodari Vakhania
Preemptive Scheduling of Equal-Length Jobs to Maximize Weighted Throughput
gained one author and lost one degree in the complexity
null
null
null
cs.DS
null
We study the problem of computing a preemptive schedule of equal-length jobs with given release times, deadlines and weights. Our goal is to maximize the weighted throughput, which is the total weight of completed jobs. In Graham's notation this problem is described as (1 | r_j;p_j=p;pmtn | sum w_j U_j). We provide an O(n^4)-time algorithm for this problem, improving the previous bound of O(n^{10}) by Baptiste.
[ { "version": "v1", "created": "Mon, 30 Sep 2002 10:33:13 GMT" }, { "version": "v2", "created": "Tue, 11 Mar 2003 13:06:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Baptiste", "Philippe", "" ], [ "Chrobak", "Marek", "" ], [ "Durr", "Christoph", "" ], [ "Jawor", "Wojciech", "" ], [ "Vakhania", "Nodari", "" ] ]
cs/0209034
Sandor P. Fekete
Esther M. Arkin, Sandor P. Fekete, and Joseph S. B. Mitchell
An Algorithmic Study of Manufacturing Paperclips and Other Folded Structures
28 pages, 14 figures, Latex, to appear in Computational Geometry - Theory and Applications
Computational Geometry: Theory and Applications, 25 (2003), 117-138.
null
null
cs.CG
null
We study algorithmic aspects of bending wires and sheet metal into a specified structure. Problems of this type are closely related to the question of deciding whether a simple non-self-intersecting wire structure (a carpenter's ruler) can be straightened, a problem that was open for several years and has only recently been solved in the affirmative. If we impose some of the constraints that are imposed by the manufacturing process, we obtain quite different results. In particular, we study the variant of the carpenter's ruler problem in which there is a restriction that only one joint can be modified at a time. For a linkage that does not self-intersect or self-touch, the recent results of Connelly et al. and Streinu imply that it can always be straightened, modifying one joint at a time. However, we show that for a linkage with even a single vertex degeneracy, it becomes NP-hard to decide if it can be straightened while altering only one joint at a time. If we add the restriction that each joint can be altered at most once, we show that the problem is NP-complete even without vertex degeneracies. In the special case, arising in wire forming manufacturing, that each joint can be altered at most once, and must be done sequentially from one or both ends of the linkage, we give an efficient algorithm to determine if a linkage can be straightened.
[ { "version": "v1", "created": "Mon, 30 Sep 2002 19:42:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Arkin", "Esther M.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Mitchell", "Joseph S. B.", "" ] ]
cs/0210001
Krzysztof R. Apt
Krzysztof R. Apt
Edsger Wybe Dijkstra (1930 -- 2002): A Portrait of a Genius
10 pages. To appear in Formal Aspects of Computing
null
null
null
cs.GL
null
We discuss the scientific contributions of Edsger Wybe Dijkstra, his opinions and his legacy.
[ { "version": "v1", "created": "Tue, 1 Oct 2002 01:37:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/0210002
Rajkumar Buyya
Alexander Barmouta Rajkumar Buyya
GridBank: A Grid Accounting Services Architecture (GASA) for Distributed Systems Sharing and Integration
12 pages
null
null
null
cs.DC
null
Computational Grids are emerging as new infrastructure for Internet-based parallel and distributed computing. They enable the sharing, exchange, discovery, and aggregation of resources distributed across multiple administrative domains, organizations and enterprises. To accomplish this, Grids need infrastructure that supports various services: security, uniform access, resource management, scheduling, application composition, computational economy, and accountability. Many Grid projects have developed technologies that provide many of these services with an exception of accountability. To overcome this limitation, we propose a new infrastructure called Grid Bank that provides services for accounting. This paper presents requirements of Grid accountability and different models within which it can operate and proposes Grid Bank Services Architecture that meets them. The paper highlights implementation issues with detailed discussion on format for various records/database that the GridBank need to maintain. It also presents protocols for interaction between GridBank and various components within Grid computing environments.
[ { "version": "v1", "created": "Tue, 1 Oct 2002 10:41:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Buyya", "Alexander Barmouta Rajkumar", "" ] ]
cs/0210003
Sandor P. Fekete
Esther M. Arkin, Sandor P. Fekete, Ferran Hurtado, Joseph S. B. Mitchell, Marc Noy, Vera Sacristan, and Saurabh Sethia
On the Reflexivity of Point Sets
28 pages, 16 figures, Latex, short version to appear in Discrete & Computational Geometry -- The Goodman-Pollack Festschrift (2002), Springer-Verlag
null
null
null
cs.CG cs.DS
null
We introduce a new measure for planar point sets S that captures a combinatorial distance that S is from being a convex set: The reflexivity rho(S) of S is given by the smallest number of reflex vertices in a simple polygonalization of S. We prove various combinatorial bounds and provide efficient algorithms to compute reflexivity, both exactly (in special cases) and approximately (in general). Our study considers also some closely related quantities, such as the convex cover number kappa_c(S) of a planar point set, which is the smallest number of convex chains that cover S, and the convex partition number kappa_p(S), which is given by the smallest number of convex chains with pairwise-disjoint convex hulls that cover S. We have proved that it is NP-complete to determine the convex cover or the convex partition number and have given logarithmic-approximation algorithms for determining each.
[ { "version": "v1", "created": "Tue, 1 Oct 2002 14:40:29 GMT" }, { "version": "v2", "created": "Wed, 2 Oct 2002 08:17:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Arkin", "Esther M.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Hurtado", "Ferran", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Noy", "Marc", "" ], [ "Sacristan", "Vera", "" ], [ "Sethia", "Saurabh", "" ] ]
cs/0210004
Sylvain Lagrue
Salem Benferhat, Sylvain Lagrue, Odile Papini
Revising Partially Ordered Beliefs
figures made with the pstricks latex packages
Proc. of the 9th Workshop on Non-monotonic Reasoning (NMR'2002), pp. 142--149
null
null
cs.AI
null
This paper deals with the revision of partially ordered beliefs. It proposes a semantic representation of epistemic states by partial pre-orders on interpretations and a syntactic representation by partially ordered belief bases. Two revision operations, the revision stemming from the history of observations and the possibilistic revision, defined when the epistemic state is represented by a total pre-order, are generalized, at a semantic level, to the case of a partial pre-order on interpretations, and at a syntactic level, to the case of a partially ordered belief base. The equivalence between the two representations is shown for the two revision operations.
[ { "version": "v1", "created": "Thu, 3 Oct 2002 09:29:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Benferhat", "Salem", "" ], [ "Lagrue", "Sylvain", "" ], [ "Papini", "Odile", "" ] ]
cs/0210005
Wen Chen
W Chen
Positive time fractional derivative
Welcome any comments to [email protected]
null
null
Simula Research Laboratory Report, Sept. 2002
cs.CE
null
In mathematical modeling of the non-squared frequency-dependent diffusions, also known as the anomalous diffusions, it is desirable to have a positive real Fourier transform for the time derivative of arbitrary fractional or odd integer order. The Fourier transform of the fractional time derivative in the Riemann-Liouville and Caputo senses, however, involves a complex power function of the fractional order. In this study, a positive time derivative of fractional or odd integer order is introduced to respect the positivity in modeling the anomalous diffusions.
[ { "version": "v1", "created": "Mon, 7 Oct 2002 19:28:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W", "" ] ]
cs/0210006
Mikkel Thorup
Arne Andersson and Mikkel Thorup
Dynamic Ordered Sets with Exponential Search Trees
Revision corrects some typoes and state things better for applications in subsequent papers
null
null
null
cs.DS
null
We introduce exponential search trees as a novel technique for converting static polynomial space search structures for ordered sets into fully-dynamic linear space data structures. This leads to an optimal bound of O(sqrt(log n/loglog n)) for searching and updating a dynamic set of n integer keys in linear space. Here searching an integer y means finding the maximum key in the set which is smaller than or equal to y. This problem is equivalent to the standard text book problem of maintaining an ordered set (see, e.g., Cormen, Leiserson, Rivest, and Stein: Introduction to Algorithms, 2nd ed., MIT Press, 2001). The best previous deterministic linear space bound was O(log n/loglog n) due Fredman and Willard from STOC 1990. No better deterministic search bound was known using polynomial space. We also get the following worst-case linear space trade-offs between the number n, the word length w, and the maximal key U < 2^w: O(min{loglog n+log n/log w, (loglog n)(loglog U)/(logloglog U)}). These trade-offs are, however, not likely to be optimal. Our results are generalized to finger searching and string searching, providing optimal results for both in terms of n.
[ { "version": "v1", "created": "Wed, 9 Oct 2002 04:49:56 GMT" }, { "version": "v2", "created": "Fri, 20 Jun 2003 18:25:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Andersson", "Arne", "" ], [ "Thorup", "Mikkel", "" ] ]
cs/0210009
Maxim Makatchev
Maxim Makatchev
On the Cell-based Complexity of Recognition of Bounded Configurations by Finite Dynamic Cellular Automata
11 pages, 1 figure
null
null
null
cs.CC cs.CV
null
This paper studies complexity of recognition of classes of bounded configurations by a generalization of conventional cellular automata (CA) -- finite dynamic cellular automata (FDCA). Inspired by the CA-based models of biological and computer vision, this study attempts to derive the properties of a complexity measure and of the classes of input configurations that make it beneficial to realize the recognition via a two-layered automaton as compared to a one-layered automaton. A formalized model of an image pattern recognition task is utilized to demonstrate that the derived conditions can be satisfied for a non-empty set of practical problems.
[ { "version": "v1", "created": "Fri, 11 Oct 2002 19:55:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Makatchev", "Maxim", "" ] ]
cs/0210010
Nima Sarshar
Nima Sarshar and Vwani Roychowdhury
A Random Structure for Optimum Cache Size Distributed hash table (DHT) Peer-to-Peer design
13 pages, 2 figures, preprint version
null
null
null
cs.NI cs.DC
null
We propose a new and easily-realizable distributed hash table (DHT) peer-to-peer structure, incorporating a random caching strategy that allows for {\em polylogarithmic search time} while having only a {\em constant cache} size. We also show that a very large class of deterministic caching strategies, which covers almost all previously proposed DHT systems, can not achieve polylog search time with constant cache size. In general, the new scheme is the first known DHT structure with the following highly-desired properties: (a) Random caching strategy with constant cache size; (b) Average search time of $O(log^{2}(N))$; (c) Guaranteed search time of $O(log^{3}(N))$; (d) Truly local cache dynamics with constant overhead for node deletions and additions; (e) Self-organization from any initial network state towards the desired structure; and (f) Allows a seamless means for various trade-offs, e.g., search speed or anonymity at the expense of larger cache size.
[ { "version": "v1", "created": "Mon, 14 Oct 2002 03:37:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Sarshar", "Nima", "" ], [ "Roychowdhury", "Vwani", "" ] ]
cs/0210011
Aleksandar Ignjatovic
Aleksandar Ignjatovic
A Note on Induction Schemas in Bounded Arithmetic
null
null
null
null
cs.LO cs.CC
null
As is well known, Buss' theory of bounded arithmetic $S^{1}_{2}$ proves $\Sigma_{0}^{b}(\Sigma_{1}^{b})-LIND$; however, we show that Allen's $D_{2}^{1}$ does not prove $\Sigma_{0}^{b}(\Sigma_{1}^{b})-LLIND$ unless $P = NC$. We also give some interesting alternative axiomatisations of $S^{1}_{2}$.
[ { "version": "v1", "created": "Mon, 14 Oct 2002 05:07:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Ignjatovic", "Aleksandar", "" ] ]
cs/0210012
Konovalov Igor B.
Igor B. Konovalov
Selection of future events from a time series in relation to estimations of forecasting uncertainty
null
null
null
null
cs.NE
null
A new general procedure for a priori selection of more predictable events from a time series of observed variable is proposed. The procedure is applicable to time series which contains different types of events that feature significantly different predictability, or, in other words, to heteroskedastic time series. A priori selection of future events in accordance to expected uncertainty of their forecasts may be helpful for making practical decisions. The procedure first implies creation of two neural network based forecasting models, one of which is aimed at prediction of conditional mean and other - conditional dispersion, and then elaboration of the rule for future event selection into groups of more and less predictable events. The method is demonstrated and tested by the example of the computer generated time series, and then applied to the real world time series, Dow Jones Industrial Average index.
[ { "version": "v1", "created": "Mon, 14 Oct 2002 09:00:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Konovalov", "Igor B.", "" ] ]
cs/0210013
David S. Johnson
Janos Csirik, David S. Johnson, Claire Kenyon, James B. Orlin, Peter W. Shor, and Richard R. Weber
On the Sum-of-Squares Algorithm for Bin Packing
72 pages
null
null
null
cs.DS
null
In this paper we present a theoretical analysis of the deterministic on-line {\em Sum of Squares} algorithm ($SS$) for bin packing introduced and studied experimentally in \cite{CJK99}, along with several new variants. $SS$ is applicable to any instance of bin packing in which the bin capacity $B$ and item sizes $s(a)$ are integral (or can be scaled to be so), and runs in time $O(nB)$. It performs remarkably well from an average case point of view: For any discrete distribution in which the optimal expected waste is sublinear, $SS$ also has sublinear expected waste. For any discrete distribution where the optimal expected waste is bounded, $SS$ has expected waste at most $O(\log n)$. In addition, we discuss several interesting variants on $SS$, including a randomized $O(nB\log B)$-time on-line algorithm $SS^*$, based on $SS$, whose expected behavior is essentially optimal for all discrete distributions. Algorithm $SS^*$ also depends on a new linear-programming-based pseudopolynomial-time algorithm for solving the NP-hard problem of determining, given a discrete distribution $F$, just what is the growth rate for the optimal expected waste. This article is a greatly expanded version of the conference paper \cite{sumsq2000}.
[ { "version": "v1", "created": "Mon, 14 Oct 2002 17:17:28 GMT" }, { "version": "v2", "created": "Mon, 14 Oct 2002 22:08:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Csirik", "Janos", "" ], [ "Johnson", "David S.", "" ], [ "Kenyon", "Claire", "" ], [ "Orlin", "James B.", "" ], [ "Shor", "Peter W.", "" ], [ "Weber", "Richard R.", "" ] ]
cs/0210014
A. Kirilov
A.S.Kirilov
Current state of the Sonix -- the IBR-2 instrument control software and plans for future developments
Invited talk at NOBUGS2002 Conference, NIST, Gaithersburg, MD NOBUGS abstract identifier NOBUGS2002/015 5 pages, pdf, 2 figures
null
null
null
cs.HC
null
The Sonix is the main control software for the IBR-2 instruments. This is a modular configurable and flexible system created using the Varman (real time database) and the X11/OS9 graphical package in the OS-9 environment. In the last few years we were mostly focused on making this system more reliable and user friendly. Because the VME hardware and software upgrade is rather expensive we would like to replace existing VME + OS9 control computers with the PC+Windows XP ones in the future. This could be done with the help of VME-PCI adapters.
[ { "version": "v1", "created": "Wed, 16 Oct 2002 07:42:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Kirilov", "A. S.", "" ] ]
cs/0210015
M. H. van Emden
M.H. van Emden
New Developments in Interval Arithmetic and Their Implications for Floating-Point Standardization
12 pages; 3 tables
null
null
DCS-273-IR
cs.NA
null
We consider the prospect of a processor that can perform interval arithmetic at the same speed as conventional floating-point arithmetic. This makes it possible for all arithmetic to be performed with the superior security of interval methods without any penalty in speed. In such a situation the IEEE floating-point standard needs to be compared with a version of floating-point arithmetic that is ideal for the purpose of interval arithmetic. Such a comparison requires a succinct and complete exposition of interval arithmetic according to its recent developments. We present such an exposition in this paper. We conclude that the directed roundings toward the infinities and the definition of division by the signed zeros are valuable features of the standard. Because the operations of interval arithmetic are always defined, exceptions do not arise. As a result neither Nans nor exceptions are needed. Of the status flags, only the inexact flag may be useful. Denormalized numbers seem to have no use for interval arithmetic; in the use of interval constraints, they are a handicap.
[ { "version": "v1", "created": "Wed, 16 Oct 2002 23:22:13 GMT" }, { "version": "v2", "created": "Wed, 23 Oct 2002 22:18:38 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ] ]