id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0207072 | Thomas Eiter | Marco Cadoli, Thomas Eiter, and Georg Gottlob | Complexity of Nested Circumscription and Nested Abnormality Theories | A preliminary abstract of this paper appeared in Proc. Seventeenth
International Joint Conference on Artificial Intelligence (IJCAI-01), pages
169--174. Morgan Kaufmann, 2001 | null | null | INFSYS RR-1843-02-10, Institut f. Informationssysteme, TU Vienna,
2002 | cs.AI cs.CC cs.LO | null | The need for a circumscriptive formalism that allows for simple yet elegant
modular problem representation has led Lifschitz (AIJ, 1995) to introduce
nested abnormality theories (NATs) as a tool for modular knowledge
representation, tailored for applying circumscription to minimize exceptional
circumstances. Abstracting from this particular objective, we propose L_{CIRC},
which is an extension of generic propositional circumscription by allowing
propositional combinations and nesting of circumscriptive theories. As shown,
NATs are naturally embedded into this language, and are in fact of equal
expressive capability. We then analyze the complexity of L_{CIRC} and NATs, and
in particular the effect of nesting. The latter is found to be a source of
complexity, which climbs the Polynomial Hierarchy as the nesting depth
increases and reaches PSPACE-completeness in the general case. We also identify
meaningful syntactic fragments of NATs which have lower complexity. In
particular, we show that the generalization of Horn circumscription in the NAT
framework remains CONP-complete, and that Horn NATs without fixed letters can
be efficiently transformed into an equivalent Horn CNF, which implies
polynomial solvability of principal reasoning tasks. Finally, we also study
extensions of NATs and briefly address the complexity in the first-order case.
Our results give insight into the ``cost'' of using L_{CIRC} (resp. NATs) as a
host language for expressing other formalisms such as action theories,
narratives, or spatial theories.
| [
{
"version": "v1",
"created": "Sat, 20 Jul 2002 19:59:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cadoli",
"Marco",
""
],
[
"Eiter",
"Thomas",
""
],
[
"Gottlob",
"Georg",
""
]
] |
cs/0207073 | Naren Ramakrishnan | Srinidhi Varadarajan and Naren Ramakrishnan | Reinforcing Reachable Routes | null | null | null | null | cs.NI cs.AI | null | This paper studies the evaluation of routing algorithms from the perspective
of reachability routing, where the goal is to determine all paths between a
sender and a receiver. Reachability routing is becoming relevant with the
changing dynamics of the Internet and the emergence of low-bandwidth
wireless/ad-hoc networks. We make the case for reinforcement learning as the
framework of choice to realize reachability routing, within the confines of the
current Internet infrastructure. The setting of the reinforcement learning
problem offers several advantages, including loop resolution, multi-path
forwarding capability, cost-sensitive routing, and minimizing state overhead,
while maintaining the incremental spirit of current backbone routing
algorithms. We identify research issues in reinforcement learning applied to
the reachability routing problem to achieve a fluid and robust backbone routing
framework. The paper is targeted toward practitioners seeking to implement a
reachability routing algorithm.
| [
{
"version": "v1",
"created": "Sun, 21 Jul 2002 02:02:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Varadarajan",
"Srinidhi",
""
],
[
"Ramakrishnan",
"Naren",
""
]
] |
cs/0207074 | Dina Q. Goldin | Dina Goldin (U. of Connecticut), Peter Wegner (Brown U.) | Paraconsistency of Interactive Computation | 10 pages, no figures. Originally published in proc. PCL 2002, a FLoC
workshop; eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu
Waragai (http://floc02.diku.dk/PCL/) | null | null | null | cs.LO | null | The goal of computational logic is to allow us to model computation as well
as to reason about it. We argue that a computational logic must be able to
model interactive computation. We show that first-order logic cannot model
interactive computation due to the incompleteness of interaction. We show that
interactive computation is necessarily paraconsistent, able to model both a
fact and its negation, due to the role of the world (environment) in
determining the course of the computation. We conclude that paraconsistency is
a necessary property for a logic that can model interactive computation.
| [
{
"version": "v1",
"created": "Sun, 21 Jul 2002 06:19:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldin",
"Dina",
"",
"U. of Connecticut"
],
[
"Wegner",
"Peter",
"",
"Brown U."
]
] |
cs/0207075 | Thomas Lukasiewicz | Thomas Lukasiewicz | Nonmonotonic Probabilistic Logics between Model-Theoretic Probabilistic
Logic and Probabilistic Logic under Coherence | 10 pages; in Proceedings of the 9th International Workshop on
Non-Monotonic Reasoning (NMR-2002), Special Session on Uncertainty Frameworks
in Nonmonotonic Reasoning, pages 265-274, Toulouse, France, April 2002 | null | null | null | cs.AI | null | Recently, it has been shown that probabilistic entailment under coherence is
weaker than model-theoretic probabilistic entailment. Moreover, probabilistic
entailment under coherence is a generalization of default entailment in System
P. In this paper, we continue this line of research by presenting probabilistic
generalizations of more sophisticated notions of classical default entailment
that lie between model-theoretic probabilistic entailment and probabilistic
entailment under coherence. That is, the new formalisms properly generalize
their counterparts in classical default reasoning, they are weaker than
model-theoretic probabilistic entailment, and they are stronger than
probabilistic entailment under coherence. The new formalisms are useful
especially for handling probabilistic inconsistencies related to conditioning
on zero events. They can also be applied for probabilistic belief revision.
More generally, in the same spirit as a similar previous paper, this paper
sheds light on exciting new formalisms for probabilistic reasoning beyond the
well-known standard ones.
| [
{
"version": "v1",
"created": "Mon, 22 Jul 2002 01:44:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lukasiewicz",
"Thomas",
""
]
] |
cs/0207076 | Paolo Perlasca | Elisa Bertino, Barbara Catania, and Paolo Perlasca | Introducing Dynamic Behavior in Amalgamated Knowledge Bases | Other Keywords: Deductive databases; Heterogeneous databases; Active
rules; Updates | null | null | null | cs.PL cs.DB cs.LO | null | The problem of integrating knowledge from multiple and heterogeneous sources
is a fundamental issue in current information systems. In order to cope with
this problem, the concept of mediator has been introduced as a software
component providing intermediate services, linking data resources and
application programs, and making transparent the heterogeneity of the
underlying systems. In designing a mediator architecture, we believe that an
important aspect is the definition of a formal framework by which one is able
to model integration according to a declarative style. To this purpose, the use
of a logical approach seems very promising. Another important aspect is the
ability to model both static integration aspects, concerning query execution,
and dynamic ones, concerning data updates and their propagation among the
various data sources. Unfortunately, as far as we know, no formal proposals for
logically modeling mediator architectures both from a static and dynamic point
of view have already been developed. In this paper, we extend the framework for
amalgamated knowledge bases, presented by Subrahmanian, to deal with dynamic
aspects. The language we propose is based on the Active U-Datalog language, and
extends it with annotated logic and amalgamation concepts. We model the sources
of information and the mediator (also called supervisor) as Active U-Datalog
deductive databases, thus modeling queries, transactions, and active rules,
interpreted according to the PARK semantics. By using active rules, the system
can efficiently perform update propagation among different databases. The
result is a logical environment, integrating active and deductive rules, to
perform queries and update propagation in an heterogeneous mediated framework.
| [
{
"version": "v1",
"created": "Mon, 22 Jul 2002 07:50:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bertino",
"Elisa",
""
],
[
"Catania",
"Barbara",
""
],
[
"Perlasca",
"Paolo",
""
]
] |
cs/0207077 | Rajkumar Buyya | Jahanzeb Sherwani, Nosheen Ali, Nausheen Lotia, Zahra Hayat, and
Rajkumar Buyya | Libra: An Economy driven Job Scheduling System for Clusters | 13 pages | null | null | Technical Report, July 2002, Dept. of Computer Science and Software
Engineering, The University of Melbourne | cs.DC cs.DS | null | Clusters of computers have emerged as mainstream parallel and distributed
platforms for high-performance, high-throughput and high-availability
computing. To enable effective resource management on clusters, numerous
cluster managements systems and schedulers have been designed. However, their
focus has essentially been on maximizing CPU performance, but not on improving
the value of utility delivered to the user and quality of services. This paper
presents a new computational economy driven scheduling system called Libra,
which has been designed to support allocation of resources based on the users?
quality of service (QoS) requirements. It is intended to work as an add-on to
the existing queuing and resource management system. The first version has been
implemented as a plugin scheduler to the PBS (Portable Batch System) system.
The scheduler offers market-based economy driven service for managing batch
jobs on clusters by scheduling CPU time according to user utility as determined
by their budget and deadline rather than system performance considerations. The
Libra scheduler ensures that both these constraints are met within an O(n)
run-time. The Libra scheduler has been simulated using the GridSim toolkit to
carry out a detailed performance analysis. Results show that the deadline and
budget based proportional resource allocation strategy improves the utility of
the system and user satisfaction as compared to system-centric scheduling
strategies.
| [
{
"version": "v1",
"created": "Mon, 22 Jul 2002 11:35:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sherwani",
"Jahanzeb",
""
],
[
"Ali",
"Nosheen",
""
],
[
"Lotia",
"Nausheen",
""
],
[
"Hayat",
"Zahra",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0207078 | David Karger | Andras Benczur and David R. Karger | Randomized Approximation Schemes for Cuts and Flows in Capacitated
Graphs | Draft journal version combining conference publications in STOC '96
and SODA '98 | null | null | null | cs.DS cs.DM | null | We improve on random sampling techniques for approximately solving problems
that involve cuts and flows in graphs. We give a near-linear-time construction
that transforms any graph on n vertices into an O(n\log n)-edge graph on the
same vertices whose cuts have approximately the same value as the original
graph's. In this new graph, for example, we can run the O(m^{3/2})-time maximum
flow algorithm of Goldberg and Rao to find an s--t minimum cut in O(n^{3/2})
time. This corresponds to a (1+epsilon)-times minimum s--t cut in the original
graph. In a similar way, we can approximate a sparsest cut to within O(log n)
in O(n^2) time using a previous O(mn)-time algorithm. A related approach leads
to a randomized divide and conquer algorithm producing an approximately maximum
flow in O(m sqrt{n}) time.
| [
{
"version": "v1",
"created": "Tue, 23 Jul 2002 04:27:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Benczur",
"Andras",
""
],
[
"Karger",
"David R.",
""
]
] |
cs/0207079 | Ilia Ponomarenko | D. Grigoriev and I. Ponomarenko | On non-abelian homomorphic public-key cryptosystems | 15 pages, LaTeX | null | null | null | cs.CR | null | An important problem of modern cryptography concerns secret public-key
computations in algebraic structures. We construct homomorphic cryptosystems
being (secret) epimorphisms f:G --> H, where G, H are (publically known) groups
and H is finite. A letter of a message to be encrypted is an element h element
of H, while its encryption g element of G is such that f(g)=h. A homomorphic
cryptosystem allows one to perform computations (operating in a group G) with
encrypted information (without knowing the original message over H).
In this paper certain homomorphic cryptosystems are constructed for the first
time for non-abelian groups H (earlier, homomorphic cryptosystems were known
only in the Abelian case). In fact, we present such a system for any solvable
(fixed) group H.
| [
{
"version": "v1",
"created": "Tue, 23 Jul 2002 07:28:59 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Sep 2002 11:51:17 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Sep 2002 10:12:29 GMT"
},
{
"version": "v4",
"created": "Thu, 14 Nov 2002 10:04:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grigoriev",
"D.",
""
],
[
"Ponomarenko",
"I.",
""
]
] |
cs/0207080 | Dima Grigorev | D. Grigoriev | Public-key cryptography and invariant theory | 10 pages, LaTeX | null | null | null | cs.CR | null | Public-key cryptosystems are suggested based on invariants of groups. We give
also an overview of the known cryptosystems which involve groups.
| [
{
"version": "v1",
"created": "Tue, 23 Jul 2002 07:37:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grigoriev",
"D.",
""
]
] |
cs/0207081 | David Eppstein | Marshall Bern, David Eppstein | Moebius-Invariant Natural Neighbor Interpolation | 2 pages, 1 figure | null | null | null | cs.CG | null | We propose an interpolation method that is invariant under Moebius
transformations; that is, interpolation followed by transformation gives the
same result as transformation followed by interpolation. The method uses
natural (Delaunay) neighbors, but weights neighbors according to angles formed
by Delaunay circles.
| [
{
"version": "v1",
"created": "Wed, 24 Jul 2002 19:00:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bern",
"Marshall",
""
],
[
"Eppstein",
"David",
""
]
] |
cs/0207082 | David Eppstein | David Eppstein | Dynamic Generators of Topologically Embedded Graphs | 13 pages, 2 figures | null | null | null | cs.DS | null | We provide a data structure for maintaining an embedding of a graph on a
surface (represented combinatorially by a permutation of edges around each
vertex) and computing generators of the fundamental group of the surface, in
amortized time O(log n + log g(log log g)^3) per update on a surface of genus
g; we can also test orientability of the surface in the same time, and maintain
the minimum and maximum spanning tree of the graph in time O(log n + log^4 g)
per update. Our data structure allows edge insertion and deletion as well as
the dual operations; these operations may implicitly change the genus of the
embedding surface. We apply similar ideas to improve the constant factor in a
separator theorem for low-genus graphs, and to find in linear time a
tree-decomposition of low-genus low-diameter graphs.
| [
{
"version": "v1",
"created": "Wed, 24 Jul 2002 19:56:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
] |
cs/0207083 | Choh Man Teng | Henry E. Kyburg Jr. and Choh Man Teng | Evaluating Defaults | 8 pages | null | null | null | cs.AI | null | We seek to find normative criteria of adequacy for nonmonotonic logic similar
to the criterion of validity for deductive logic. Rather than stipulating that
the conclusion of an inference be true in all models in which the premises are
true, we require that the conclusion of a nonmonotonic inference be true in
``almost all'' models of a certain sort in which the premises are true. This
``certain sort'' specification picks out the models that are relevant to the
inference, taking into account factors such as specificity and vagueness, and
previous inferences. The frequencies characterizing the relevant models reflect
known frequencies in our actual world. The criteria of adequacy for a default
inference can be extended by thresholding to criteria of adequacy for an
extension. We show that this avoids the implausibilities that might otherwise
result from the chaining of default inferences. The model proportions, when
construed in terms of frequencies, provide a verifiable grounding of default
rules, and can become the basis for generating default rules from statistics.
| [
{
"version": "v1",
"created": "Wed, 24 Jul 2002 23:05:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kyburg",
"Henry E.",
"Jr."
],
[
"Teng",
"Choh Man",
""
]
] |
cs/0207084 | Dina Q. Goldin | Philippe Besnard (1), Torsten Schaub (1), Hans Tompits (2), Stefan
Woltran (2) ((1) Institut f\"ur Informatik, Universit\"at Potsdam, (2)
Institut f\"ur Informationssysteme, Technische Universit\"at Wien) | Paraconsistent Reasoning via Quantified Boolean Formulas,I: Axiomatising
Signed Systems | 15 pages. Originally published in proc. PCL 2002, a FLoC workshop;
eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai
(http://floc02.diku.dk/PCL/) | null | null | null | cs.LO cs.CC | null | Signed systems were introduced as a general, syntax-independent framework for
paraconsistent reasoning, that is, non-trivialised reasoning from inconsistent
information. In this paper, we show how the family of corresponding
paraconsistent consequence relations can be axiomatised by means of quantified
Boolean formulas. This approach has several benefits. First, it furnishes an
axiomatic specification of paraconsistent reasoning within the framework of
signed systems. Second, this axiomatisation allows us to identify upper bounds
for the complexity of the different signed consequence relations. We strengthen
these upper bounds by providing strict complexity results for the considered
reasoning tasks. Finally, we obtain an implementation of different forms of
paraconsistent reasoning by appeal to the existing system QUIP.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2002 14:40:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Besnard",
"Philippe",
""
],
[
"Schaub",
"Torsten",
""
],
[
"Tompits",
"Hans",
""
],
[
"Woltran",
"Stefan",
""
]
] |
cs/0207085 | Dina Q. Goldin | Ofer Arieli (1), Marc Denecker (2), Bert Van Nuffelen (2), Maurice
Bruynooghe (2) ((1) The Academic College of Tel-Aviv, Israel (2) The Catholic
University of Leuven, Belgium) | Repairing Inconsistent Databases: A Model-Theoretic Approach and
Abductive Reasoning | 15 pages. Originally published in proc. PCL 2002, a FLoC workshop;
eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai
(http://floc02.diku.dk/PCL/) | null | null | null | cs.LO cs.DB | null | In this paper we consider two points of views to the problem of coherent
integration of distributed data. First we give a pure model-theoretic analysis
of the possible ways to `repair' a database. We do so by characterizing the
possibilities to `recover' consistent data from an inconsistent database in
terms of those models of the database that exhibit as minimal inconsistent
information as reasonably possible. Then we introduce an abductive application
to restore the consistency of a given database. This application is based on an
abductive solver (A-system) that implements an SLDNFA-resolution procedure, and
computes a list of data-facts that should be inserted to the database or
retracted from it in order to keep the database consistent. The two approaches
for coherent data integration are related by soundness and completeness
results.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2002 15:13:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arieli",
"Ofer",
""
],
[
"Denecker",
"Marc",
""
],
[
"Van Nuffelen",
"Bert",
""
],
[
"Bruynooghe",
"Maurice",
""
]
] |
cs/0207086 | Dina Q. Goldin | Michael J. Maher (Loyola University, Chicago) | A Model-Theoretic Semantics for Defeasible Logic | 14 pages. Originally published in proc. PCL 2002, a FLoC workshop;
eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai
(http://floc02.diku.dk/PCL/) | null | null | null | cs.LO | null | Defeasible logic is an efficient logic for defeasible reasoning. It is
defined through a proof theory and, until now, has had no model theory. In this
paper a model-theoretic semantics is given for defeasible logic. The logic is
sound and complete with respect to the semantics. We also briefly outline how
this approach extends to a wide range of defeasible logics.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2002 15:39:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maher",
"Michael J.",
"",
"Loyola University, Chicago"
]
] |
cs/0207087 | Dina Q. Goldin | Guo-Qiang Zhang (Case Western Reserve University) | Axiomatic Aspects of Default Inference | 16 pages. Originally published in proc. PCL 2002, a FLoC workshop;
eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai
(http://floc02.diku.dk/PCL/) | null | null | null | cs.LO | null | This paper studies axioms for nonmonotonic consequences from a
semantics-based point of view, focusing on a class of mathematical structures
for reasoning about partial information without a predefined syntax/logic. This
structure is called a default structure. We study axioms for the nonmonotonic
consequence relation derived from extensions as in Reiter's default logic,
using skeptical reasoning, but extensions are now used for the construction of
possible worlds in a default information structure.
In previous work we showed that skeptical reasoning arising from
default-extensions obeys a well-behaved set of axioms including the axiom of
cautious cut. We show here that, remarkably, the converse is also true: any
consequence relation obeying this set of axioms can be represented as one
constructed from skeptical reasoning. We provide representation theorems to
relate axioms for nonmonotonic consequence relation and properties about
extensions, and provide one-to-one correspondence between nonmonotonic systems
which satisfies the law of cautious monotony and default structures with unique
extensions. Our results give a theoretical justification for a set of basic
rules governing the update of nonmonotonic knowledge bases, demonstrating the
derivation of them from the more concrete and primitive construction of
extensions. It is also striking to note that proofs of the representation
theorems show that only shallow extensions are necessary, in the sense that the
number of iterations needed to achieve an extension is at most three. All of
these developments are made possible by taking a more liberal view of
consistency: consistency is a user defined predicate, satisfying some basic
properties.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2002 16:19:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Guo-Qiang",
"",
"Case Western Reserve University"
]
] |
cs/0207088 | Dina Q. Goldin | J{\o}rgen Villadsen | A Paraconsistent Higher Order Logic | Originally in the proceedings of PCL 2002, editors Hendrik Decker,
Joergen Villadsen, Toshiharu Waragai (http://floc02.diku.dk/PCL/). Corrected | null | null | null | cs.LO cs.AI | null | Classical logic predicts that everything (thus nothing useful at all) follows
from inconsistency. A paraconsistent logic is a logic where an inconsistency
does not lead to such an explosion, and since in practice consistency is
difficult to achieve there are many potential applications of paraconsistent
logics in knowledge-based systems, logical semantics of natural language, etc.
Higher order logics have the advantages of being expressive and with several
automated theorem provers available. Also the type system can be helpful. We
present a concise description of a paraconsistent higher order logic with
countable infinite indeterminacy, where each basic formula can get its own
indeterminate truth value (or as we prefer: truth code). The meaning of the
logical operators is new and rather different from traditional many-valued
logics as well as from logics based on bilattices. The adequacy of the logic is
examined by a case study in the domain of medicine. Thus we try to build a
bridge between the HOL and MVL communities. A sequent calculus is proposed
based on recent work by Muskens.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2002 16:35:47 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Aug 2002 09:45:07 GMT"
},
{
"version": "v3",
"created": "Fri, 26 Dec 2003 10:45:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Villadsen",
"Jørgen",
""
]
] |
cs/0207089 | Dina Q. Goldin | Jan Ma{\l}uszy\'nski and Aida Vit\'oria (Link\"oping University,
Sweden) | Defining Rough Sets by Extended Logic Programs | 10 pages. Originally published in proc. PCL 2002, a FLoC workshop;
eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai
(http://floc02.diku.dk/PCL/) | null | null | null | cs.LO cs.PL | null | We show how definite extended logic programs can be used for defining and
reasoning with rough sets. Moreover, a rough-set-specific query language is
presented and an answering algorithm is outlined. Thus, we not only show a
possible application of a paraconsistent logic to the field of rough sets as we
also establish a link between rough set theory and logic programming, making
possible transfer of expertise between both fields.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2002 16:52:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Małuszyński",
"Jan",
"",
"Linköping University,\n Sweden"
],
[
"Vitória",
"Aida",
"",
"Linköping University,\n Sweden"
]
] |
cs/0207090 | Dina Q. Goldin | Diderik Batens (Universiteit Gent, Belgium) | On a Partial Decision Method for Dynamic Proofs | 18 pages. Originally published in proc. PCL 2002, a FLoC workshop;
eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai
(http://floc02.diku.dk/PCL/) | null | null | null | cs.LO | null | This paper concerns a goal directed proof procedure for the propositional
fragment of the adaptive logic ACLuN1. At the propositional level, it forms an
algorithm for final derivability. If extended to the predicative level, it
provides a criterion for final derivability. This is essential in view of the
absence of a positive test. The procedure may be generalized to all flat
adaptive logics.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2002 17:14:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Batens",
"Diderik",
"",
"Universiteit Gent, Belgium"
]
] |
cs/0207091 | Dina Q. Goldin | Fran\c{c}ois Bry (University of Munich, Germany) | An Almost Classical Logic for Logic Programming and Nonmonotonic
Reasoning | 16 pages. Originally published in proc. PCL 2002, a FLoC workshop;
eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai
(http://floc02.diku.dk/PCL/) | null | null | null | cs.LO | null | The model theory of a first-order logic called N^4 is introduced. N^4 does
not eliminate double negations, as classical logic does, but instead reduces
fourfold negations. N^4 is very close to classical logic: N^4 has two truth
values; implications in N^4 are material, like in classical logic; and negation
distributes over compound formulas in N^4 as it does in classical logic.
Results suggest that the semantics of normal logic programs is conveniently
formalized in N^4: Classical logic Herbrand interpretations generalize
straightforwardly to N^4; the classical minimal Herbrand model of a positive
logic program coincides with its unique minimal N^4 Herbrand model; the stable
models of a normal logic program and its so-called complete minimal N^4
Herbrand models coincide.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2002 17:40:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bry",
"François",
"",
"University of Munich, Germany"
]
] |
cs/0207093 | Jan Chomicki | Jan Chomicki | Preference Queries | 34 pages | null | null | null | cs.DB | null | The handling of user preferences is becoming an increasingly important issue
in present-day information systems. Among others, preferences are used for
information filtering and extraction to reduce the volume of data presented to
the user. They are also used to keep track of user profiles and formulate
policies to improve and automate decision making.
We propose here a simple, logical framework for formulating preferences as
preference formulas. The framework does not impose any restrictions on the
preference relations and allows arbitrary operation and predicate signatures in
preference formulas. It also makes the composition of preference relations
straightforward. We propose a simple, natural embedding of preference formulas
into relational algebra (and SQL) through a single winnow operator
parameterized by a preference formula. The embedding makes possible the
formulation of complex preference queries, e.g., involving aggregation, by
piggybacking on existing SQL constructs. It also leads in a natural way to the
definition of further, preference-related concepts like ranking. Finally, we
present general algebraic laws governing the winnow operator and its
interaction with other relational algebra operators. The preconditions on the
applicability of the laws are captured by logical formulas. The laws provide a
formal foundation for the algebraic optimization of preference queries. We
demonstrate the usefulness of our approach through numerous examples.
| [
{
"version": "v1",
"created": "Sat, 27 Jul 2002 00:46:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chomicki",
"Jan",
""
]
] |
cs/0207094 | Jan Chomicki | Marcelo Arenas, Leopoldo Bertossi, Jan Chomicki | Answer Sets for Consistent Query Answering in Inconsistent Databases | 34 pages | null | null | null | cs.DB | null | A relational database is inconsistent if it does not satisfy a given set of
integrity constraints. Nevertheless, it is likely that most of the data in it
is consistent with the constraints. In this paper we apply logic programming
based on answer sets to the problem of retrieving consistent information from a
possibly inconsistent database. Since consistent information persists from the
original database to every of its minimal repairs, the approach is based on a
specification of database repairs using disjunctive logic programs with
exceptions, whose answer set semantics can be represented and computed by
systems that implement stable model semantics. These programs allow us to
declare persistence by defaults and repairing changes by exceptions. We
concentrate mainly on logic programs for binary integrity constraints, among
which we find most of the integrity constraints found in practice.
| [
{
"version": "v1",
"created": "Fri, 26 Jul 2002 21:18:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arenas",
"Marcelo",
""
],
[
"Bertossi",
"Leopoldo",
""
],
[
"Chomicki",
"Jan",
""
]
] |
cs/0207095 | Wim H. Hesselink | Wim H. Hesselink | Eternity variables to prove simulation of specifications | 28 pages, to appear in ACM-TOCL | ACM Trans. on Computational Logic 6 (2005) 175-201. | null | null | cs.DC cs.LO | null | Simulations of specifications are introduced as a unification and
generalization of refinement mappings, history variables, forward simulations,
prophecy variables, and backward simulations. A specification implements
another specification if and only if there is a simulation from the first one
to the second one that satisfies a certain condition. By adding stutterings,
the formalism allows that the concrete behaviours take more (or possibly less)
steps than the abstract ones.
Eternity variables are introduced as a more powerful alternative for prophecy
variables and backward simulations. This formalism is semantically complete:
every simulation that preserves quiescence is a composition of a forward
simulation, an extension with eternity variables, and a refinement mapping.
This result does not need finite invisible nondeterminism and machine closure
as in the Abadi-Lamport Theorem. Internal continuity is weakened to
preservation of quiescence.
| [
{
"version": "v1",
"created": "Mon, 29 Jul 2002 09:12:22 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Aug 2002 07:46:41 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Aug 2003 12:27:13 GMT"
},
{
"version": "v4",
"created": "Wed, 27 Aug 2003 17:17:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hesselink",
"Wim H.",
""
]
] |
cs/0207096 | Judith Beumer | Avery Ching, Alok Choudhary, Wei-keng Liao, Rob Ross, William Gropp | Noncontiguous I/O through PVFS | 10 pages, 17 figures | null | null | ANL/MCS-P970-0702 | cs.DC | null | With the tremendous advances in processor and memory technology, I/O has
risen to become the bottleneck in high-performance computing for many
applications. The development of parallel file systems has helped to ease the
performance gap, but I/O still remains an area needing significant performance
improvement. Research has found that noncontiguous I/O access patterns in
scientific applications combined with current file system methods to perform
these accesses lead to unacceptable performance for large data sets. To enhance
performance of noncontiguous I/O we have created list I/O, a native version of
noncontiguous I/O. We have used the Parallel Virtual File System (PVFS) to
implement our ideas. Our research and experimentation shows that list I/O
outperforms current noncontiguous I/O access methods in most I/O situations and
can substantially enhance the performance of real-world scientific
applications.
| [
{
"version": "v1",
"created": "Mon, 29 Jul 2002 16:20:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ching",
"Avery",
""
],
[
"Choudhary",
"Alok",
""
],
[
"Liao",
"Wei-keng",
""
],
[
"Ross",
"Rob",
""
],
[
"Gropp",
"William",
""
]
] |
cs/0207097 | Juergen Schmidhuber | Juergen Schmidhuber | Optimal Ordered Problem Solver | 43 pages, 2 figures, short version at NIPS 2002 (added 1 figure and
references; streamlined presentation) | Machine Learning, 54, 211-254, 2004. | null | IDSIA-12-02 | cs.AI cs.CC cs.LG | null | We present a novel, general, optimally fast, incremental way of searching for
a universal algorithm that solves each task in a sequence of tasks. The Optimal
Ordered Problem Solver (OOPS) continually organizes and exploits previously
found solutions to earlier tasks, efficiently searching not only the space of
domain-specific algorithms, but also the space of search algorithms.
Essentially we extend the principles of optimal nonincremental universal search
to build an incremental universal learner that is able to improve itself
through experience. In illustrative experiments, our self-improver becomes the
first general system that learns to solve all n disk Towers of Hanoi tasks
(solution size 2^n-1) for n up to 30, profiting from previously solved, simpler
tasks involving samples of a simple context free language.
| [
{
"version": "v1",
"created": "Wed, 31 Jul 2002 14:33:11 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Dec 2002 14:11:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidhuber",
"Juergen",
""
]
] |
cs/0208001 | Carlos Gershenson | Carlos Gershenson | Classification of Random Boolean Networks | 8 pages, 11 figures, 5 tables. To be published in Standish, Abbass
and Bedau (eds.) Artificial Life VIII | null | null | null | cs.CC cs.DM math.DS nlin.CG | null | We provide the first classification of different types of Random Boolean
Networks (RBNs). We study the differences of RBNs depending on the degree of
synchronicity and determinism of their updating scheme. For doing so, we first
define three new types of RBNs. We note some similarities and differences
between different types of RBNs with the aid of a public software laboratory we
developed. Particularly, we find that the point attractors are independent of
the updating scheme, and that RBNs are more different depending on their
determinism or non-determinism rather than depending on their synchronicity or
asynchronicity. We also show a way of mapping non-synchronous deterministic
RBNs into synchronous RBNs. Our results are important for justifying the use of
specific types of RBNs for modelling natural phenomena.
| [
{
"version": "v1",
"created": "Thu, 1 Aug 2002 13:26:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gershenson",
"Carlos",
""
]
] |
cs/0208002 | Lavrenov | A. Lavrenov | Theoretical limit of the compression for the information | 5 pages, report at the IMK's conference "Science and pedagogics on a
boundary 21 centuries", in Russian | null | null | null | cs.CR | null | The pit recording of file, the coefficient of compression are introduced. The
theoretical limit of the information compression as minimal coefficient of
compression for the given length of alphabet are found.
| [
{
"version": "v1",
"created": "Fri, 2 Aug 2002 09:11:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavrenov",
"A.",
""
]
] |
cs/0208003 | Lavrenov | A. Lavrenov | MV2-algorithm's clones | 5 pages, report at the IMK's conference "Science and pedagogics on a
boundary 21 centuries", in Russian | null | null | null | cs.CR | null | The clones of MV2 algorithm for any radix are discussed. The three various
examples of ones are represented.
| [
{
"version": "v1",
"created": "Fri, 2 Aug 2002 09:24:33 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Aug 2002 07:50:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavrenov",
"A.",
""
]
] |
cs/0208004 | Hsueh-I. Lu | Philip N. Klein, Hsueh-I Lu, and Rob H.B. Netzer | Detecting Race Conditions in Parallel Programs that Use Semaphores | 24 pages, 12 figures, preliminary versions appeared in WADS 93 and
ESA 96 | Algorithmica, 35(4):321-345, 2003 | 10.1007/s00453-002-1004-3 | null | cs.DS cs.DC | null | We address the problem of detecting race conditions in programs that use
semaphores for synchronization. Netzer and Miller showed that it is NP-complete
to detect race conditions in programs that use many semaphores. We show in this
paper that it remains NP-complete even if only two semaphores are used in the
parallel programs.
For the tractable case, i.e., using only one semaphore, we give two
algorithms for detecting race conditions from the trace of executing a parallel
program on p processors, where n semaphore operations are executed. The first
algorithm determines in O(n) time whether a race condition exists between any
two given operations. The second algorithm runs in O(np log n) time and outputs
a compact representation from which one can determine in O(1) time whether a
race condition exists between any two given operations. The second algorithm is
near-optimal in that the running time is only O(log n) times the time required
simply to write down the output.
| [
{
"version": "v1",
"created": "Sat, 3 Aug 2002 17:20:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Klein",
"Philip N.",
""
],
[
"Lu",
"Hsueh-I",
""
],
[
"Netzer",
"Rob H. B.",
""
]
] |
cs/0208005 | Ulrich Hillenbrand | Ulrich Hillenbrand and Gerd Hirzinger | Probabilistic Search for Object Segmentation and Recognition | 18 pages, 5 figures | Proceedings ECCV 2002, Lecture Notes in Computer Science Vol.
2352, pp. 791-806 | null | null | cs.CV | null | The problem of searching for a model-based scene interpretation is analyzed
within a probabilistic framework. Object models are formulated as generative
models for range data of the scene. A new statistical criterion, the truncated
object probability, is introduced to infer an optimal sequence of object
hypotheses to be evaluated for their match to the data. The truncated
probability is partly determined by prior knowledge of the objects and partly
learned from data. Some experiments on sequence quality and object segmentation
and recognition from stereo data are presented. The article recovers classic
concepts from object recognition (grouping, geometric hashing, alignment) from
the probabilistic perspective and adds insight into the optimal ordering of
object hypotheses for evaluation. Moreover, it introduces point-relation
densities, a key component of the truncated probability, as statistical models
of local surface shape.
| [
{
"version": "v1",
"created": "Mon, 5 Aug 2002 10:57:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hillenbrand",
"Ulrich",
""
],
[
"Hirzinger",
"Gerd",
""
]
] |
cs/0208006 | Hartmut Klauck | Hartmut Klauck | Rectangle Size Bounds and Threshold Covers in Communication Complexity | 34 pages | null | null | null | cs.CC | null | We investigate the power of the most important lower bound technique in
randomized communication complexity, which is based on an evaluation of the
maximal size of approximately monochromatic rectangles, minimized over all
distributions on the inputs. While it is known that the 0-error version of this
bound is polynomially tight for deterministic communication, nothing in this
direction is known for constant error and randomized communication complexity.
We first study a one-sided version of this bound and obtain that its value lies
between the MA- and AM-complexities of the considered function. Hence the lower
bound actually works for a (communication complexity) class between MA cap
co-MA and AM cap co-AM. We also show that the MA-complexity of the disjointness
problem is Omega(sqrt(n)). Following this we consider the conjecture that the
lower bound method is polynomially tight for randomized communication
complexity. First we disprove a distributional version of this conjecture. Then
we give a combinatorial characterization of the value of the lower bound
method, in which the optimization over all distributions is absent. This
characterization is done by what we call a uniform threshold cover. We also
study relaxations of this notion, namely approximate majority covers and
majority covers, and compare these three notions in power, exhibiting
exponential separations. Each of these covers captures a lower bound method
previously used for randomized communication complexity.
| [
{
"version": "v1",
"created": "Mon, 5 Aug 2002 14:36:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Klauck",
"Hartmut",
""
]
] |
cs/0208007 | Kamil Kulesza | Kamil Kulesza, Zbigniew Kotulski | On the graph coloring check-digit scheme with applications to verifiable
secret sharing | null | null | null | null | cs.CR cs.DM math.CO | null | In the paper we apply graph vertex coloring for verification of secret
shares. We start from showing how to convert any graph into the number and vice
versa. Next, theoretical result concerning properties of n-colorable graphs is
stated and proven. From this result we derive graph coloring check-digit
scheme. Feasibility of proposed scheme increases with the size of the number,
which digits are checked and overall probability of errors. The check-digit
scheme is used to build shares verification method that does not require
cooperation of the third party. It allows implementing verification structure
different from the access structure. It does not depend on particular secret
sharing method. It can be used as long as the secret shares can be represented
by numbers or graphs.
| [
{
"version": "v1",
"created": "Tue, 6 Aug 2002 12:47:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kulesza",
"Kamil",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
cs/0208009 | Michael Leuschel | Michael Leuschel, Jesper Joergensen, Wim Vanhoof, Maurice Bruynooghe | Offline Specialisation in Prolog Using a Hand-Written Compiler Generator | 52 pages, to appear in the journal "Theory and Practice of Logic
Programming" | null | null | null | cs.PL cs.AI | null | The so called ``cogen approach'' to program specialisation, writing a
compiler generator instead of a specialiser, has been used with considerable
success in partial evaluation of both functional and imperative languages. This
paper demonstrates that the cogen approach is also applicable to the
specialisation of logic programs (also called partial deduction) and leads to
effective specialisers. Moreover, using good binding-time annotations, the
speed-ups of the specialised programs are comparable to the speed-ups obtained
with online specialisers. The paper first develops a generic approach to
offline partial deduction and then a specific offline partial deduction method,
leading to the offline system LIX for pure logic programs. While this is a
usable specialiser by itself, it is used to develop the cogen system LOGEN.
Given a program, a specification of what inputs will be static, and an
annotation specifying which calls should be unfolded, LOGEN generates a
specialised specialiser for the program at hand. Running this specialiser with
particular values for the static inputs results in the specialised program.
While this requires two steps instead of one, the efficiency of the
specialisation process is improved in situations where the same program is
specialised multiple times. The paper also presents and evaluates an automatic
binding-time analysis that is able to derive the annotations. While the derived
annotations are still suboptimal compared to hand-crafted ones, they enable
non-expert users to use the LOGEN system in a fully automated way. Finally,
LOGEN is extended so as to directly support a large part of Prolog's
declarative and non-declarative features and so as to be able to perform so
called mixline specialisations.
| [
{
"version": "v1",
"created": "Wed, 7 Aug 2002 11:14:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leuschel",
"Michael",
""
],
[
"Joergensen",
"Jesper",
""
],
[
"Vanhoof",
"Wim",
""
],
[
"Bruynooghe",
"Maurice",
""
]
] |
cs/0208010 | Jim Gray | Tom Barclay, Jim Gray, Eric Strand, Steve Ekblad, Jeffrey Richter | TerraService.NET: An Introduction to Web Services | original at
http://research.microsoft.com/scripts/pubs/view.asp?TR_ID=MSR-TR-2002-53 | null | null | MSR-TR-2002-53 | cs.DL cs.DB | null | This article explores the design and construction of a geo-spatial Internet
web service application from the host web site perspective and from the
perspective of an application using the web service. The TerraService.NET web
service was added to the popular TerraServer database and web site with no
major structural changes to the database. The article discusses web service
design, implementation, and deployment concepts and design guidelines. Web
services enable applications that aggregate and interact with information and
resources from Internet-scale distributed servers. The article presents the
design of two USDA applications that interoperate with database and web service
resources in Fort Collins Colorado and the TerraService web service located in
Tukwila Washington.
| [
{
"version": "v1",
"created": "Wed, 7 Aug 2002 22:18:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barclay",
"Tom",
""
],
[
"Gray",
"Jim",
""
],
[
"Strand",
"Eric",
""
],
[
"Ekblad",
"Steve",
""
],
[
"Richter",
"Jeffrey",
""
]
] |
cs/0208011 | Jim Gray | Jim Gray, Wyman Chong, Tom Barclay, Alex Szalay, Jan vandenBerg | TeraScale SneakerNet: Using Inexpensive Disks for Backup, Archiving, and
Data Exchange | original at
http://research.microsoft.com/scripts/pubs/view.asp?TR_ID=MSR-TR-2002-54 | null | null | MSR-TR-2002-54 | cs.NI cs.DC | null | Large datasets are most economically trnsmitted via parcel post given the
current economics of wide-area networking. This article describes how the Sloan
Digital Sky Survey ships terabyte scale datasets both within the US and to
Europe and Asia. We 3GT storage bricks (Ghz processor, GB ram, GbpsEthernet, TB
disk) for about 2k$ each. These bricks act as database servers on the LAN. They
are loaded at one site and read at the second site. The paper describes the
bricks, their economics, and some software issues that they raise.
| [
{
"version": "v1",
"created": "Wed, 7 Aug 2002 22:32:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Chong",
"Wyman",
""
],
[
"Barclay",
"Tom",
""
],
[
"Szalay",
"Alex",
""
],
[
"vandenBerg",
"Jan",
""
]
] |
cs/0208016 | Wen Chen | W. Chen | A note on fractional derivative modeling of broadband
frequency-dependent absorption: Model III | null | null | null | Simula Research Laboratory Report, April 2002 | cs.CE cs.CC | null | By far, the fractional derivative model is mainly related to the modelling of
complicated solid viscoelastic material. In this study, we try to build the
fractional derivative PDE model for broadband ultrasound propagation through
human tissues.
| [
{
"version": "v1",
"created": "Thu, 8 Aug 2002 07:29:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0208017 | Moinard | Yves Moinard | Linking Makinson and Kraus-Lehmann-Magidor preferential entailments | Proceedings of the 9th Int. Workshop on Non-Monotonic Reasoning
(NMR'2002), Toulouse, France, April 19-21, 2002. Also, paper with the same
Title at ECAI 2002 (15th European Conf. on A.I.) | null | null | null | cs.AI | null | About ten years ago, various notions of preferential entailment have been
introduced. The main reference is a paper by Kraus, Lehmann and Magidor (KLM),
one of the main competitor being a more general version defined by Makinson
(MAK). These two versions have already been compared, but it is time to revisit
these comparisons. Here are our three main results: (1) These two notions are
equivalent, provided that we restrict our attention, as done in KLM, to the
cases where the entailment respects logical equivalence (on the left and on the
right). (2) A serious simplification of the description of the fundamental
cases in which MAK is equivalent to KLM, including a natural passage in both
ways. (3) The two previous results are given for preferential entailments more
general than considered in some of the original texts, but they apply also to
the original definitions and, for this particular case also, the models can be
simplified.
| [
{
"version": "v1",
"created": "Thu, 8 Aug 2002 17:08:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Moinard",
"Yves",
""
]
] |
cs/0208019 | Mikalai Birukou | Mikalai Birukou | Knowledge Representation | null | null | null | null | cs.AI | null | This work analyses main features that should be present in knowledge
representation. It suggests a model for representation and a way to implement
this model in software. Representation takes care of both low-level sensor
information and high-level concepts.
| [
{
"version": "v1",
"created": "Mon, 12 Aug 2002 22:34:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Birukou",
"Mikalai",
""
]
] |
cs/0208020 | Masaki Murata | Masaki Murata and Hitoshi Isahara | Using the DIFF Command for Natural Language Processing | 10 pages. Computation and Language. This paper is the rough English
translation of our Japanese papar | null | null | null | cs.CL | null | Diff is a software program that detects differences between two data sets and
is useful in natural language processing. This paper shows several examples of
the application of diff. They include the detection of differences between two
different datasets, extraction of rewriting rules, merging of two different
datasets, and the optimal matching of two different data sets. Since diff comes
with any standard UNIX system, it is readily available and very easy to use.
Our studies showed that diff is a practical tool for research into natural
language processing.
| [
{
"version": "v1",
"created": "Tue, 13 Aug 2002 03:39:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murata",
"Masaki",
""
],
[
"Isahara",
"Hitoshi",
""
]
] |
cs/0208022 | Boris Kovalerchuk | B. Kovalerchuk, E. Vityaev, H. Yusupov | Symbolic Methodology in Numeric Data Mining: Relational Techniques for
Financial Applications | 20 pages, 1 figure, 16 tables | null | null | null | cs.CE | null | Currently statistical and artificial neural network methods dominate in
financial data mining. Alternative relational (symbolic) data mining methods
have shown their effectiveness in robotics, drug design and other applications.
Traditionally symbolic methods prevail in the areas with significant
non-numeric (symbolic) knowledge, such as relative location in robot
navigation. At first glance, stock market forecast looks as a pure numeric area
irrelevant to symbolic methods. One of our major goals is to show that
financial time series can benefit significantly from relational data mining
based on symbolic methods. The paper overviews relational data mining
methodology and develops this techniques for financial data mining.
| [
{
"version": "v1",
"created": "Thu, 15 Aug 2002 03:45:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kovalerchuk",
"B.",
""
],
[
"Vityaev",
"E.",
""
],
[
"Yusupov",
"H.",
""
]
] |
cs/0208024 | Ahmed Helmy | Saurabh Garg, Priyatham Pamu, Nitin Nahata, Ahmed Helmy | Contact-Based Architecture for Resource Discovery (CARD) in Large Scale
MANets | 10 pages, 15 figures | null | null | null | cs.NI | null | In this paper we propose a novel architecture, CARD, for resource discovery
in large scale Mobile Ad hoc Networks (MANets) which, may scale up to thousands
of nodes and may span wide geographical regions. Unlike previously proposed
schemes, our architecture avoids expensive mechanisms such as global flooding
as well as complex coordination between nodes to form a hierarchy. CARD is also
independent of any external source of information such as GPS. In our
architecture nodes within a limited number of hops from each node form the
neighborhood of that node. Resources within the neighborhood can be readily
accessed with the help of a proactive scheme within the neighborhood. For
accessing resources beyond the neighborhood, each node also maintains a few
distant nodes called contacts. Contacts help in creating a small world in the
network and provide an efficient way to query for resources beyond the
neighborhood. As the number of contacts of a node increases, the network view
(reachability) of the node increases. Paths to contacts are validated
periodically to adapt to mobility. We present mechanisms for contact selection
and maintenance that attempt to increase reachability while minimizing
overhead. Our simulation results show a clear trade-off between increase in
reachability on one hand, and contact selection and maintenance overhead on the
other. Our results suggest that CARD can be configured to provide a desirable
reachability distribution for different network sizes. Comparisons with other
schemes for resource discovery, such as flooding and bordercasting, show our
architecture to be much more efficient and scalable.
| [
{
"version": "v1",
"created": "Fri, 16 Aug 2002 17:21:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Garg",
"Saurabh",
""
],
[
"Pamu",
"Priyatham",
""
],
[
"Nahata",
"Nitin",
""
],
[
"Helmy",
"Ahmed",
""
]
] |
cs/0208025 | Ahmed Helmy | Ahmed Helmy, Muhammad Jaseemuddin, Ganesha Bhaskara | Efficient Micro-Mobility using Intra-domain Multicast-based Mechanisms
(M&M) | 12 pages, 11 figures | null | null | null | cs.NI | null | One of the most important metrics in the design of IP mobility protocols is
the handover performance. The current Mobile IP (MIP) standard has been shown
to exhibit poor handover performance. Most other work attempts to modify MIP to
slightly improve its efficiency, while others propose complex techniques to
replace MIP. Rather than taking these approaches, we instead propose a new
architecture for providing efficient and smooth handover, while being able to
co-exist and inter-operate with other technologies. Specifically, we propose an
intra-domain multicast-based mobility architecture, where a visiting mobile is
assigned a multicast address to use while moving within a domain. Efficient
handover is achieved using standard multicast join/prune mechanisms. Two
approaches are proposed and contrasted. The first introduces the concept
proxy-based mobility, while the other uses algorithmic mapping to obtain the
multicast address of visiting mobiles. We show that the algorithmic mapping
approach has several advantages over the proxy approach, and provide mechanisms
to support it. Network simulation (using NS-2) is used to evaluate our scheme
and compare it to other routing-based micro-mobility schemes - CIP and HAWAII.
The proactive handover results show that both M&M and CIP shows low handoff
delay and packet reordering depth as compared to HAWAII. The reason for M&M's
comparable performance with CIP is that both use bi-cast in proactive handover.
The M&M, however, handles multiple border routers in a domain, where CIP fails.
We also provide a handover algorithm leveraging the proactive path setup
capability of M&M, which is expected to outperform CIP in case of reactive
handover.
| [
{
"version": "v1",
"created": "Fri, 16 Aug 2002 18:04:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Helmy",
"Ahmed",
""
],
[
"Jaseemuddin",
"Muhammad",
""
],
[
"Bhaskara",
"Ganesha",
""
]
] |
cs/0208026 | C Sauerbier | Charles Sauerbier | Mathematical basis for polySAT implication operator | 7 pages, 7 figures. Keywords: algorithms, complexity, computation
theory, satisfiability, group theory, field theory, set theory | null | null | S3E-2002-03 | cs.CC cs.LO | null | The mathematical basis motivating the "implication operator" of the polySAT
algorithm and its function is examined. Such is not undertaken with onerous
rigor of symbolic mathematics; a more intuitive visual appeal being employed to
present some of the mathematical premises underlying function of the
implication operator.
| [
{
"version": "v1",
"created": "Sun, 18 Aug 2002 04:31:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sauerbier",
"Charles",
""
]
] |
cs/0208027 | Robert C. Steinke | Robert C. Steinke and Gary J. Nutt | A Unified Theory of Shared Memory Consistency | null | null | null | null | cs.DC | null | Memory consistency models have been developed to specify what values may be
returned by a read given that, in a distributed system, memory operations may
only be partially ordered. Before this work, consistency models were defined
independently. Each model followed a set of rules which was separate from the
rules of every other model. In our work we have defined a set of four
consistency properties. Any subset of the four properties yields a set of rules
which constitute a consistency model. Every consistency model previously
described in the literature can be defined based on our four properties.
Therefore, we present these properties as a unfied theory of shared memory
consistency.
| [
{
"version": "v1",
"created": "Mon, 19 Aug 2002 19:09:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steinke",
"Robert C.",
""
],
[
"Nutt",
"Gary J.",
""
]
] |
cs/0208028 | Joseph Y. Halpern | Joseph Y. Halpern and Ron van der Meyden | A logical reconstruction of SPKI | This is an updated version of a paper that appears in the Proceedings
of the 14th IEEE Computer Security Foundations Workshop. It will appear in a
special issue of the Journal of Computer Security devoted to papers from that
conference | null | null | null | cs.CR cs.LO | null | SPKI/SDSI is a proposed public key infrastructure standard that incorporates
the SDSI public key infrastructure. SDSI's key innovation was the use of local
names. We previously introduced a Logic of Local Name Containment that has a
clear semantics and was shown to completely characterize SDSI name resolution.
Here we show how our earlier approach can be extended to deal with a number of
key features of SPKI, including revocation, expiry dates, and tuple reduction.
We show that these extensions add relatively little complexity to the logic. In
particular, we do not need a nonmonotonic logic to capture revocation. We then
use our semantics to examine SPKI's tuple reduction rules. Our analysis
highlights places where SPKI's informal description of tuple reduction is
somewhat vague, and shows that extra reduction rules are necessary in order to
capture general information about binding and authorization.
| [
{
"version": "v1",
"created": "Mon, 19 Aug 2002 21:03:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"van der Meyden",
"Ron",
""
]
] |
cs/0208029 | Peter Van Roy | Peter Van Roy, Per Brand, Denys Duchier, Seif Haridi, Martin Henz,
Christian Schulte | Logic programming in the context of multiparadigm programming: the Oz
experience | 48 pages, to appear in the journal "Theory and Practice of Logic
Programming" | null | null | null | cs.PL | null | Oz is a multiparadigm language that supports logic programming as one of its
major paradigms. A multiparadigm language is designed to support different
programming paradigms (logic, functional, constraint, object-oriented,
sequential, concurrent, etc.) with equal ease. This article has two goals: to
give a tutorial of logic programming in Oz and to show how logic programming
fits naturally into the wider context of multiparadigm programming. Our
experience shows that there are two classes of problems, which we call
algorithmic and search problems, for which logic programming can help formulate
practical solutions. Algorithmic problems have known efficient algorithms.
Search problems do not have known efficient algorithms but can be solved with
search. The Oz support for logic programming targets these two problem classes
specifically, using the concepts needed for each. This is in contrast to the
Prolog approach, which targets both classes with one set of concepts, which
results in less than optimal support for each class. To explain the essential
difference between algorithmic and search programs, we define the Oz execution
model. This model subsumes both concurrent logic programming
(committed-choice-style) and search-based logic programming (Prolog-style).
Instead of Horn clause syntax, Oz has a simple, fully compositional,
higher-order syntax that accommodates the abilities of the language. We
conclude with lessons learned from this work, a brief history of Oz, and many
entry points into the Oz literature.
| [
{
"version": "v1",
"created": "Tue, 20 Aug 2002 11:12:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Van Roy",
"Peter",
""
],
[
"Brand",
"Per",
""
],
[
"Duchier",
"Denys",
""
],
[
"Haridi",
"Seif",
""
],
[
"Henz",
"Martin",
""
],
[
"Schulte",
"Christian",
""
]
] |
cs/0208030 | Wen Chen | W Chen | A direct time-domain FEM modeling of broadband frequency-dependent
absorption with the presence of matrix fractional power: Model I | null | null | null | Simula Research Laboratory Report, April 2002 | cs.CE cs.CG | null | The frequency-dependent attenuation of broadband acoustics is often
confronted in many different areas. However, the related time domain simulation
is rarely found in literature due to enormous technical difficulty. The
currently popular relaxation models with the presence of convolution operation
require some material parameters which are not readily available. In this
study, three reports are contributed to address broadband ultrasound
frequency-dependent absorptions using the readily available empirical
parameters. This report is the first in series concerned with developing a
direct time domain FEM formulation. The next two reports are about the
frequency decomposition model and the fractional derivative model.
| [
{
"version": "v1",
"created": "Tue, 20 Aug 2002 12:36:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W",
""
]
] |
cs/0208031 | Alina Andreica | Alina Andreica | Parameterized Type Definitions in Mathematica: Methods and Advantages | 14 pages | null | null | null | cs.SC | null | The theme of symbolic computation in algebraic categories has become of
utmost importance in the last decade since it enables the automatic modeling of
modern algebra theories. On this theoretical background, the present paper
reveals the utility of the parameterized categorical approach by deriving a
multivariate polynomial category (over various coefficient domains), which is
used by our Mathematica implementation of Buchberger's algorithms for
determining the Groebner basis. These implementations are designed according to
domain and category parameterization principles underlining their advantages:
operation protection, inheritance, generality, easy extendibility. In
particular, such an extension of Mathematica, a widely used symbolic
computation system, with a new type system has a certain practical importance.
The approach we propose for Mathematica is inspired from D. Gruntz and M.
Monagan's work in Gauss, for Maple.
| [
{
"version": "v1",
"created": "Tue, 20 Aug 2002 13:19:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andreica",
"Alina",
""
]
] |
cs/0208032 | C. F. M. Vermeulen | K.R. Apt and C.F.M. Vermeulen | First-order Logic as a Constraint Programming Language | 17 pages. v2: improved version corrected reference to Turing (instead
of Tarski) | "Logic for Programming, Artificial Intelligence and Reasoning",
Proceedings of the 9th International Conference LPAR2002, Tbilisi, Georgia;
Editors: A. Voronkov and M. Baaz; Springer Verlag LNAI2514; pages 19-35;
October 2002 | null | null | cs.LO | null | We provide a denotational semantics for first-order logic that captures the
two-level view of the computation process typical for constraint programming.
At one level we have the usual program execution. At the other level an
automatic maintenance of the constraint store takes place. We prove that the
resulting semantics is sound with respect to the truth definition. By
instantiating it by specific forms of constraint management policies we obtain
several sound evaluation policies of first-order formulas. This semantics can
also be used a basis for sound implementation of constraint maintenance in
presence of block declarations and conditionals.
| [
{
"version": "v1",
"created": "Tue, 20 Aug 2002 14:53:37 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Nov 2002 12:30:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"K. R.",
""
],
[
"Vermeulen",
"C. F. M.",
""
]
] |
cs/0208033 | Joseph Y. Halpern | Joseph Y. Halpern, Ron van der Meyden, and Moshe Y. Vardi | Complete Axiomatizations for Reasoning About Knowledge and Time | To appear, SIAM Journal on Computing | null | null | null | cs.LO cs.AI | null | Sound and complete axiomatizations are provided for a number of different
logics involving modalities for knowledge and time. These logics arise from
different choices for various parameters. All the logics considered involve the
discrete time linear temporal logic operators `next' and `until' and an
operator for the knowledge of each of a number of agents. Both the single agent
and multiple agent cases are studied: in some instances of the latter there is
also an operator for the common knowledge of the group of all agents. Four
different semantic properties of agents are considered: whether they have a
unique initial state, whether they operate synchronously, whether they have
perfect recall, and whether they learn. The property of no learning is
essentially dual to perfect recall. Not all settings of these parameters lead
to recursively axiomatizable logics, but sound and complete axiomatizations are
presented for all the ones that do.
| [
{
"version": "v1",
"created": "Tue, 20 Aug 2002 22:55:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"van der Meyden",
"Ron",
""
],
[
"Vardi",
"Moshe Y.",
""
]
] |
cs/0208034 | Joseph Y. Halpern | Joseph Y. Halpern and Judea Pearl | Causes and Explanations: A Structural-Model Approach. Part II:
Explanations | Part I of the paper (on causes) is also on the arxiv. The two papers
originally were posted as one submission. The conference version of the paper
appears in IJCAI '01. This paper will appear in the British Journal for
Philosophy of Science | null | null | null | cs.AI | null | We propose new definitions of (causal) explanation, using structural
equations to model counterfactuals. The definition is based on the notion of
actual cause, as defined and motivated in a companion paper. Essentially, an
explanation is a fact that is not known for certain but, if found to be true,
would constitute an actual cause of the fact to be explained, regardless of the
agent's initial uncertainty. We show that the definition handles well a number
of problematic examples from the literature.
| [
{
"version": "v1",
"created": "Tue, 20 Aug 2002 23:08:49 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Nov 2005 20:13:44 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Nov 2005 23:16:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pearl",
"Judea",
""
]
] |
cs/0208035 | Andrei Popescu-Belis | Andrei Popescu-Belis, Isabelle Robba | Evaluation of Coreference Rules on Complex Narrative Texts | 9 pages | Proceedings of DAARC2 (Discourse Anaphora and Anaphor Resolution
Colloquium), Lancaster, UK, 1998, p.178-185 | null | null | cs.CL | null | This article studies the problem of assessing relevance to each of the rules
of a reference resolution system. The reference solver described here stems
from a formal model of reference and is integrated in a reference processing
workbench. Evaluation of the reference resolution is essential, as it enables
differential evaluation of individual rules. Numerical values of these measures
are given, and discussed, for simple selection rules and other processing
rules; such measures are then studied for numerical parameters.
| [
{
"version": "v1",
"created": "Wed, 21 Aug 2002 14:09:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Popescu-Belis",
"Andrei",
""
],
[
"Robba",
"Isabelle",
""
]
] |
cs/0208036 | Andrei Popescu-Belis | Andrei Popescu-Belis, Isabelle Robba | Three New Methods for Evaluating Reference Resolution | 7 pages | Proceedings of the LREC'98 Workshop on Linguistic Coreference,
Madrid, Spain, 1998 | null | null | cs.CL | null | Reference resolution on extended texts (several thousand references) cannot
be evaluated manually. An evaluation algorithm has been proposed for the MUC
tests, using equivalence classes for the coreference relation. However, we show
here that this algorithm is too indulgent, yielding good scores even for poor
resolution strategies. We elaborate on the same formalism to propose two new
evaluation algorithms, comparing them first with the MUC algorithm and giving
then results on a variety of examples. A third algorithm using only
distributional comparison of equivalence classes is finally described; it
assesses the relative importance of the recall vs. precision errors.
| [
{
"version": "v1",
"created": "Wed, 21 Aug 2002 14:28:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Popescu-Belis",
"Andrei",
""
],
[
"Robba",
"Isabelle",
""
]
] |
cs/0208037 | Andrei Popescu-Belis | Andrei Popescu-Belis, Isabelle Robba | Cooperation between Pronoun and Reference Resolution for Unrestricted
Texts | 7 pages | Proceedings of the ACL'97 Workshop on Operational Factors in
Practical, Robust Anaphora Resolution for Unrestricted Texts, Madrid, Spain,
1998, p.94-99 | null | null | cs.CL | null | Anaphora resolution is envisaged in this paper as part of the reference
resolution process. A general open architecture is proposed, which can be
particularized and configured in order to simulate some classic anaphora
resolution methods. With the aim of improving pronoun resolution, the system
takes advantage of elementary cues about characters of the text, which are
represented through a particular data structure. In its most robust
configuration, the system uses only a general lexicon, a local morpho-syntactic
parser and a dictionary of synonyms. A short comparative corpus analysis shows
that narrative texts are the most suitable for testing such a system.
| [
{
"version": "v1",
"created": "Wed, 21 Aug 2002 14:36:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Popescu-Belis",
"Andrei",
""
],
[
"Robba",
"Isabelle",
""
]
] |
cs/0208038 | Andrei Popescu-Belis | Andrei Popescu-Belis, Isabelle Robba, Gerard Sabah | Reference Resolution Beyond Coreference: a Conceptual Frame and its
Application | 8 pages | Proceedings of COLING-ACL'98, Montreal, Canada, 1998, p.1046-1052 | null | null | cs.CL | null | A model for reference use in communication is proposed, from a
representationist point of view. Both the sender and the receiver of a message
handle representations of their common environment, including mental
representations of objects. Reference resolution by a computer is viewed as the
construction of object representations using referring expressions from the
discourse, whereas often only coreference links between such expressions are
looked for. Differences between these two approaches are discussed. The model
has been implemented with elementary rules, and tested on complex narrative
texts (hundreds to thousands of referring expressions). The results support the
mental representations paradigm.
| [
{
"version": "v1",
"created": "Wed, 21 Aug 2002 14:43:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Popescu-Belis",
"Andrei",
""
],
[
"Robba",
"Isabelle",
""
],
[
"Sabah",
"Gerard",
""
]
] |
cs/0208039 | Jean Slisz | Elizabeth Anderson, Robert Atkinson, Elizabeth Buckley-Geer, Cynthia
Crego, Lisa Giacchetti, Stephen Hanson, David Ritchie, Jean Slisz, Sara
Tompson, Stephen Wolbers | A Virtual Library of Technical Publications | Presented at 6th International World Wide Web Conference, Santa
Clara, CA, 7-12 Apr 1997 and at Inforum'97, Oak Ridge TN, 6-8 May 1997 | null | null | FERMILAB-TM-2004 | cs.DL | null | Through a collaborative effort, the Fermilab Information Resources Department
and Computing Division have created a "virtual library" of technical
publications that provides public access to electronic full-text documents.
This paper will discuss the vision, planning and milestones of the project, as
well as the hardware, software and interdepartmental cooperation components.
| [
{
"version": "v1",
"created": "Fri, 23 Aug 2002 19:14:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Anderson",
"Elizabeth",
""
],
[
"Atkinson",
"Robert",
""
],
[
"Buckley-Geer",
"Elizabeth",
""
],
[
"Crego",
"Cynthia",
""
],
[
"Giacchetti",
"Lisa",
""
],
[
"Hanson",
"Stephen",
""
],
[
"Ritchie",
"David",
""
],
[
"Slisz",
"Jean",
""
],
[
"Tompson",
"Sara",
""
],
[
"Wolbers",
"Stephen",
""
]
] |
cs/0208040 | Naren Ramakrishnan | Alex Verstak, Naren Ramakrishnan, Kyung Kyoon Bae, William H. Tranter,
Layne T. Watson, Jian He, Clifford A. Shaffer, and Theodore S. Rappaport | Using Hierarchical Data Mining to Characterize Performance of Wireless
System Configurations | null | null | null | null | cs.CE | null | This paper presents a statistical framework for assessing wireless systems
performance using hierarchical data mining techniques. We consider WCDMA
(wideband code division multiple access) systems with two-branch STTD (space
time transmit diversity) and 1/2 rate convolutional coding (forward error
correction codes). Monte Carlo simulation estimates the bit error probability
(BEP) of the system across a wide range of signal-to-noise ratios (SNRs). A
performance database of simulation runs is collected over a targeted space of
system configurations. This database is then mined to obtain regions of the
configuration space that exhibit acceptable average performance. The shape of
the mined regions illustrates the joint influence of configuration parameters
on system performance. The role of data mining in this application is to
provide explainable and statistically valid design conclusions. The research
issue is to define statistically meaningful aggregation of data in a manner
that permits efficient and effective data mining algorithms. We achieve a good
compromise between these goals and help establish the applicability of data
mining for characterizing wireless systems performance.
| [
{
"version": "v1",
"created": "Sun, 25 Aug 2002 16:28:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Verstak",
"Alex",
""
],
[
"Ramakrishnan",
"Naren",
""
],
[
"Bae",
"Kyung Kyoon",
""
],
[
"Tranter",
"William H.",
""
],
[
"Watson",
"Layne T.",
""
],
[
"He",
"Jian",
""
],
[
"Shaffer",
"Clifford A.",
""
],
[
"Rappaport",
"Theodore S.",
""
]
] |
cs/0208041 | Yongge Wang | Yvo Desmedt and Yongge Wang | Perfectly Secure Message Transmission Revisited | null | null | null | null | cs.CR cs.CC | null | Achieving secure communications in networks has been one of the most
important problems in information technology. Dolev, Dwork, Waarts, and Yung
have studied secure message transmission in one-way or two-way channels. They
only consider the case when all channels are two-way or all channels are
one-way. Goldreich, Goldwasser, and Linial, Franklin and Yung, Franklin and
Wright, and Wang and Desmedt have studied secure communication and secure
computation in multi-recipient (multicast) models. In a ``multicast channel''
(such as Ethernet), one processor can send the same message--simultaneously and
privately--to a fixed subset of processors. In this paper, we shall study
necessary and sufficient conditions for achieving secure communications against
active adversaries in mixed one-way and two-way channels. We also discuss
multicast channels and neighbor network channels.
| [
{
"version": "v1",
"created": "Mon, 26 Aug 2002 21:02:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Desmedt",
"Yvo",
""
],
[
"Wang",
"Yongge",
""
]
] |
cs/0208042 | Maurizio Gabbrielli | F.S. de Boer, M. Gabbrielli and M.C. Meo | Proving correctness of Timed Concurrent Constraint Programs | null | null | null | null | cs.LO cs.PL | null | A temporal logic is presented for reasoning about the correctness of timed
concurrent constraint programs. The logic is based on modalities which allow
one to specify what a process produces as a reaction to what its environment
inputs. These modalities provide an assumption/commitment style of
specification which allows a sound and complete compositional axiomatization of
the reactive behavior of timed concurrent constraint programs.
| [
{
"version": "v1",
"created": "Wed, 28 Aug 2002 14:34:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Boer",
"F. S.",
""
],
[
"Gabbrielli",
"M.",
""
],
[
"Meo",
"M. C.",
""
]
] |
cs/0208043 | John M. Hitchcock | John M. Hitchcock | Gales Suffice for Constructive Dimension | 4 pages | null | null | null | cs.CC | null | Supergales, generalizations of supermartingales, have been used by Lutz
(2002) to define the constructive dimensions of individual binary sequences.
Here it is shown that gales, the corresponding generalizations of martingales,
can be equivalently used to define constructive dimension.
| [
{
"version": "v1",
"created": "Thu, 29 Aug 2002 20:48:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hitchcock",
"John M.",
""
]
] |
cs/0208044 | Stephen A. Fenner | Stephen A. Fenner | Gales and supergales are equivalent for defining constructive Hausdorff
dimension | 7 pages, no figures | null | null | null | cs.CC | null | We show that for a wide range of probability measures, constructive gales are
interchangable with constructive supergales for defining constructive Hausdorff
dimension, thus generalizing a previous independent result of Hitchcock
(cs.CC/0208043) and partially answering an open question of Lutz
(cs.CC/0203017).
| [
{
"version": "v1",
"created": "Thu, 29 Aug 2002 21:25:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fenner",
"Stephen A.",
""
]
] |
cs/0209001 | MyungHo Kim | Gene Kim and MyungHo Kim | A Novel Statistical Diagnosis of Clinical Data | 20 pages, 4 figures | null | null | null | cs.CE cs.CC | null | In this paper, we present a diagnosis method of diseases from clinical data.
The data are routine test such as urine test, hematology, chemistries etc.
Though those tests have been done for people who check in medical institutes,
how each item of the data interacts each other and which combination of them
cause a disease are neither understood nor studied well. Here we attack the
practically important problem by putting the data into mathematical setup and
applying support vector machine. Finally we present simulation results for
fatty liver, gastritis etc and discuss about their implications.
| [
{
"version": "v1",
"created": "Mon, 2 Sep 2002 03:52:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kim",
"Gene",
""
],
[
"Kim",
"MyungHo",
""
]
] |
cs/0209002 | Pascal Vaillant | Pascal Vaillant (ENST, Paris) | A Chart-Parsing Algorithm for Efficient Semantic Analysis | 7 pages, 1 figure, LaTeX 2e using COLACL and EPSF packages.
Proceedings of the 19th International Conference on Computational Linguistics
(COLING 2002), Taipei, Republic of China (Taiwan), 24 Aug. - 1 Sept. 2002 | COLING 2002, Proceedings of the main Conference; The Association
for Computational Linguistics and Chinese Language Processing; vol. 2, p.
1044-1050 | null | null | cs.CL | null | In some contexts, well-formed natural language cannot be expected as input to
information or communication systems. In these contexts, the use of
grammar-independent input (sequences of uninflected semantic units like e.g.
language-independent icons) can be an answer to the users' needs. A semantic
analysis can be performed, based on lexical semantic knowledge: it is
equivalent to a dependency analysis with no syntactic or morphological clues.
However, this requires that an intelligent system should be able to interpret
this input with reasonable accuracy and in reasonable time. Here we propose a
method allowing a purely semantic-based analysis of sequences of semantic
units. It uses an algorithm inspired by the idea of ``chart parsing'' known in
Natural Language Processing, which stores intermediate parsing results in order
to bring the calculation time down. In comparison with using declarative logic
programming - where the calculation time, left to a prolog engine, is
hyperexponential -, this method brings the calculation time down to a
polynomial time, where the order depends on the valency of the predicates.
| [
{
"version": "v1",
"created": "Mon, 2 Sep 2002 16:55:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vaillant",
"Pascal",
"",
"ENST, Paris"
]
] |
cs/0209003 | Anna Rumshisky | J. Pustejovsky, A. Rumshisky, J. Castano | Rerendering Semantic Ontologies: Automatic Extensions to UMLS through
Corpus Analytics | 8 pages | LREC 2002 Workshop on Ontologies and Lexical Knowledge Bases | null | null | cs.CL | null | In this paper, we discuss the utility and deficiencies of existing ontology
resources for a number of language processing applications. We describe a
technique for increasing the semantic type coverage of a specific ontology, the
National Library of Medicine's UMLS, with the use of robust finite state
methods used in conjunction with large-scale corpus analytics of the domain
corpus. We call this technique "semantic rerendering" of the ontology. This
research has been done in the context of Medstract, a joint Brandeis-Tufts
effort aimed at developing tools for analyzing biomedical language (i.e.,
Medline), as well as creating targeted databases of bio-entities, biological
relations, and pathway data for biological researchers. Motivating the current
research is the need to have robust and reliable semantic typing of syntactic
elements in the Medline corpus, in order to improve the overall performance of
the information extraction applications mentioned above.
| [
{
"version": "v1",
"created": "Tue, 3 Sep 2002 05:28:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pustejovsky",
"J.",
""
],
[
"Rumshisky",
"A.",
""
],
[
"Castano",
"J.",
""
]
] |
cs/0209004 | Tatsuya Mori | Tatsuya Mori, Ryoichi Kawahara, Shozo Naito | Analysis of Non-Gaussian Nature of Network Traffic and its Implication
on Network Performance | 11 pages, 12 figures | null | null | null | cs.NI | null | We analyzed the non-Gaussian nature of network traffic using some Internet
traffic data. We found that (1) the non-Gaussian nature degrades network
performance, (2) it is caused by `greedy flows' that exist with non-negligible
probability, and (3) a large majority of `greedy flows' are TCP flows having
relatively small hop counts, which correspond to small round-trip times. We
conclude that in a network hat has greedy flows with non-negligible
probability, a traffic controlling scheme or bandwidth design that considers
non-Gaussian nature is essential.
| [
{
"version": "v1",
"created": "Tue, 3 Sep 2002 02:24:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mori",
"Tatsuya",
""
],
[
"Kawahara",
"Ryoichi",
""
],
[
"Naito",
"Shozo",
""
]
] |
cs/0209005 | Mario Catalani | Mario Catalani | Sampling from a couple of positively correlated binomial variables | null | null | null | DECON0902 | cs.DM | null | We know that the marginals in a multinomial distribution are binomial
variates exhibiting a negative correlation. But we can construct two linear
combinations of such marginals in such a way to obtain a positive correlation.
We discuss the restrictions that are to be imposed on the parameters of the
given marginals to accomplish such a result. Next we discuss the regression
function, showing that it is a linear function but not homoscedastic.
| [
{
"version": "v1",
"created": "Wed, 4 Sep 2002 15:38:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Catalani",
"Mario",
""
]
] |
cs/0209008 | Chung-chieh Shan | Chung-chieh Shan (Harvard University) and Balder D. ten Cate
(Universiteit van Amsterdam) | The partition semantics of questions, syntactically | 14 pages | Proceedings of the 2002 European Summer School in Logic, Language
and Information student session, ed. Malvina Nissim | null | null | cs.CL cs.AI cs.LO | null | Groenendijk and Stokhof (1984, 1996; Groenendijk 1999) provide a logically
attractive theory of the semantics of natural language questions, commonly
referred to as the partition theory. Two central notions in this theory are
entailment between questions and answerhood. For example, the question "Who is
going to the party?" entails the question "Is John going to the party?", and
"John is going to the party" counts as an answer to both. Groenendijk and
Stokhof define these two notions in terms of partitions of a set of possible
worlds.
We provide a syntactic characterization of entailment between questions and
answerhood . We show that answers are, in some sense, exactly those formulas
that are built up from instances of the question. This result lets us compare
the partition theory with other approaches to interrogation -- both linguistic
analyses, such as Hamblin's and Karttunen's semantics, and computational
systems, such as Prolog. Our comparison separates a notion of answerhood into
three aspects: equivalence (when two questions or answers are interchangeable),
atomic answers (what instances of a question count as answers), and compound
answers (how answers compose).
| [
{
"version": "v1",
"created": "Wed, 4 Sep 2002 20:11:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shan",
"Chung-chieh",
"",
"Harvard University"
],
[
"Cate",
"Balder D. ten",
"",
"Universiteit van Amsterdam"
]
] |
cs/0209009 | Chung-chieh Shan | Balder D. ten Cate (Universiteit van Amsterdam) and Chung-chieh Shan
(Harvard University) | Question answering: from partitions to Prolog | 15 pages | Proceedings of TABLEAUX 2002: Automated Reasoning with Analytic
Tableaux and Related Methods, ed. Uwe Egly and Christian G. Fermueller,
Lecture Notes in Artificial Intelligence 2381, 251-265; also in Proceedings
of NLULP 2002, ed. Shuly Wintner | null | null | cs.CL cs.AI cs.LO | null | We implement Groenendijk and Stokhof's partition semantics of questions in a
simple question answering algorithm. The algorithm is sound, complete, and
based on tableau theorem proving. The algorithm relies on a syntactic
characterization of answerhood: Any answer to a question is equivalent to some
formula built up only from instances of the question. We prove this
characterization by translating the logic of interrogation to classical
predicate logic and applying Craig's interpolation theorem.
| [
{
"version": "v1",
"created": "Wed, 4 Sep 2002 20:46:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cate",
"Balder D. ten",
"",
"Universiteit van Amsterdam"
],
[
"Shan",
"Chung-chieh",
"",
"Harvard University"
]
] |
cs/0209010 | Erik Tjong Kim Sang | Erik F. Tjong Kim Sang | Introduction to the CoNLL-2002 Shared Task: Language-Independent Named
Entity Recognition | 4 pages | Dan Roth and Antal van den Bosch (eds.), Proceedings of
CoNLL-2002, Taipei, Taiwan, 2002, pp. 155-158 | null | null | cs.CL | null | We describe the CoNLL-2002 shared task: language-independent named entity
recognition. We give background information on the data sets and the evaluation
method, present a general overview of the systems that have taken part in the
task and discuss their performance.
| [
{
"version": "v1",
"created": "Thu, 5 Sep 2002 19:03:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sang",
"Erik F. Tjong Kim",
""
]
] |
cs/0209011 | Erran L. Li | Zygmunt Haas, Joseph Y. Halpern and Erran L. Li | Gossip Based Ad-Hoc Routing | 10 pages | IEEE INFOCOM, June 2002 | null | null | cs.NI | null | Many ad hoc routing protocols are based on some variant of flooding. Despite
various optimizations, many routing messages are propagated unnecessarily. We
propose a gossiping-based approach, where each node forwards a message with
some probability, to reduce the overhead of the routing protocols. Gossiping
exhibits bimodal behavior in sufficiently large networks: in some executions,
the gossip dies out quickly and hardly any node gets the message; in the
remaining executions, a substantial fraction of the nodes gets the message. The
fraction of executions in which most nodes get the message depends on the
gossiping probability and the topology of the network. In the networks we have
considered, using gossiping probability between 0.6 and 0.8 suffices to ensure
that almost every node gets the message in almost every execution. For large
networks, this simple gossiping protocol uses up to 35% fewer messages than
flooding, with improved performance. Gossiping can also be combined with
various optimizations of flooding to yield further benefits. Simulations show
that adding gossiping to AODV results in significant performance improvement,
even in networks as small as 150 nodes. We expect that the improvement should
be even more significant in larger networks.
| [
{
"version": "v1",
"created": "Thu, 5 Sep 2002 21:45:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haas",
"Zygmunt",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Li",
"Erran L.",
""
]
] |
cs/0209012 | Erran L. Li | Erran L. Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang and Roger
Wattenhofer | Analysis of a Cone-Based Distributed Topology Control Algorithm for
Wireless Multi-hop Networks | 10 pages | ACM PODC, 2001 | null | null | cs.NI | null | The topology of a wireless multi-hop network can be controlled by varying the
transmission power at each node. In this paper, we give a detailed analysis of
a cone-based distributed topology control algorithm. This algorithm, introduced
in [16], does not assume that nodes have GPS information available; rather it
depends only on directional information. Roughly speaking, the basic idea of
the algorithm is that a node $u$ transmits with the minimum power
$p_{u,\alpha}$ required to ensure that in every cone of degree $\alpha$ around
$u$, there is some node that $u$ can reach with power $p_{u,\alpha}$. We show
that taking $\alpha = 5\pi/6$ is a necessary and sufficient condition to
guarantee that network connectivity is preserved. More precisely, if there is a
path from $s$ to $t$ when every node communicates at maximum power, then, if
$\alpha <= 5\pi/6$, there is still a path in the smallest symmetric graph
$G_\alpha$ containing all edges $(u,v)$ such that $u$ can communicate with $v$
using power $p_{u,\alpha}$. On the other hand, if $\alpha > 5\pi/6$,
connectivity is not necessarily preserved. We also propose a set of
optimizations that further reduce power consumption and prove that they retain
network connectivity. Dynamic reconfiguration in the presence of failures and
mobility is also discussed. Simulation results are presented to demonstrate the
effectiveness of the algorithm and the optimizations.
| [
{
"version": "v1",
"created": "Thu, 5 Sep 2002 22:23:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Erran L.",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Bahl",
"Paramvir",
""
],
[
"Wang",
"Yi-Min",
""
],
[
"Wattenhofer",
"Roger",
""
]
] |
cs/0209013 | Erran L. Li | Erran L. Li and Joseph Y. Halpern | Minimum-Energy Mobile Wireless Networks Revisited | 6 pages | IEEE ICC, 2001 | null | null | cs.NI | null | We propose a protocol that, given a communication network, computes a
subnetwork such that, for every pair $(u,v)$ of nodes connected in the original
network, there is a minimum-energy path between $u$ and $v$ in the subnetwork
(where a minimum-energy path is one that allows messages to be transmitted with
a minimum use of energy). The network computed by our protocol is in general a
subnetwork of the one computed by the protocol given in [13]. Moreover, our
protocol is computationally simpler. We demonstrate the performance
improvements obtained by using the subnetwork computed by our protocol through
simulation.
| [
{
"version": "v1",
"created": "Thu, 5 Sep 2002 22:47:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Erran L.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0209014 | James Aspnes | James Aspnes | Randomized protocols for asynchronous consensus | 29 pages; survey paper written for PODC 20th anniversary issue of
Distributed Computing | null | null | null | cs.DS cs.DC | null | The famous Fischer, Lynch, and Paterson impossibility proof shows that it is
impossible to solve the consensus problem in a natural model of an asynchronous
distributed system if even a single process can fail. Since its publication,
two decades of work on fault-tolerant asynchronous consensus algorithms have
evaded this impossibility result by using extended models that provide (a)
randomization, (b) additional timing assumptions, (c) failure detectors, or (d)
stronger synchronization mechanisms than are available in the basic model.
Concentrating on the first of these approaches, we illustrate the history and
structure of randomized asynchronous consensus protocols by giving detailed
descriptions of several such protocols.
| [
{
"version": "v1",
"created": "Fri, 6 Sep 2002 15:36:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aspnes",
"James",
""
]
] |
cs/0209016 | Michael H. Albert | M.H.Albert and M.D.Atkinson | Sorting with a forklift | 24 pages, 2 figures | null | null | null | cs.DM cs.DS math.CO | null | A fork stack is a generalised stack which allows pushes and pops of several
items at a time. We consider the problem of determining which input streams can
be sorted using a single forkstack, or dually, which permutations of a fixed
input stream can be produced using a single forkstack. An algorithm is given to
solve the sorting problem and the minimal unsortable sequences are found. The
results are extended to fork stacks where there are bounds on how many items
can be pushed and popped at one time. In this context we also establish how to
enumerate the collection of sortable sequences.
| [
{
"version": "v1",
"created": "Tue, 10 Sep 2002 22:05:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Albert",
"M. H.",
""
],
[
"Atkinson",
"M. D.",
""
]
] |
cs/0209017 | Michele Tucci | Michele Tucci (U. of Rome "La Sapienza") | Evolution and Gravitation: a Computer Simulation of a Non-Walrasian
Equilibrium Model | PDF, 33 pages | null | null | null | cs.CY | null | The paper contains a computer simulation concerning a basic non-Walrasian
equilibrium system, following the Edmond Malinvaud "short side" approach, as
far as the price adjustment is concerned, and the sequential Hicksian "weeks"
structure with regard of the temporal characterization.
| [
{
"version": "v1",
"created": "Sun, 15 Sep 2002 18:59:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tucci",
"Michele",
"",
"U. of Rome \"La Sapienza\""
]
] |
cs/0209019 | Thomas Eiter | T. Eiter, M. Fink, G. Sabbatini, H. Tompits | Reasoning about Evolving Nonmonotonic Knowledge Bases | 47 pages.A preliminary version appeared in: Proc. 8th International
Conference on Logic for Programming, Artificial Intelligence and Reasoning
(LPAR 2001), R. Nieuwenhuis and A. Voronkov (eds), pp. 407--421, LNCS 2250,
Springer 2001 | null | null | INFSYS RR-1843-02-11 | cs.AI | null | Recently, several approaches to updating knowledge bases modeled as extended
logic programs have been introduced, ranging from basic methods to incorporate
(sequences of) sets of rules into a logic program, to more elaborate methods
which use an update policy for specifying how updates must be incorporated. In
this paper, we introduce a framework for reasoning about evolving knowledge
bases, which are represented as extended logic programs and maintained by an
update policy. We first describe a formal model which captures various update
approaches, and we define a logical language for expressing properties of
evolving knowledge bases. We then investigate semantical and computational
properties of our framework, where we focus on properties of knowledge states
with respect to the canonical reasoning task of whether a given formula holds
on a given evolving knowledge base. In particular, we present finitary
characterizations of the evolution for certain classes of framework instances,
which can be exploited for obtaining decidability results. In more detail, we
characterize the complexity of reasoning for some meaningful classes of
evolving knowledge bases, ranging from polynomial to double exponential space
complexity.
| [
{
"version": "v1",
"created": "Mon, 16 Sep 2002 19:23:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eiter",
"T.",
""
],
[
"Fink",
"M.",
""
],
[
"Sabbatini",
"G.",
""
],
[
"Tompits",
"H.",
""
]
] |
cs/0209020 | Wen Chen | W. Chen | A new definition of the fractional Laplacian | This study is carred out with the ongoing project of "mathematical
and numerical modelling of medical ultasound wave propagation" sponsored by
the Simula Research Laboratory | null | null | null | cs.NA cs.CE | null | It is noted that the standard definition of the fractional Laplacian leads to
a hyper-singular convolution integral and is also obscure about how to
implement the boundary conditions. This purpose of this note is to introduce a
new definition of the fractional Laplacian to overcome these major drawbacks.
| [
{
"version": "v1",
"created": "Wed, 18 Sep 2002 12:45:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0209021 | Paul Prekop | Paul Prekop and Mark Burnett | Activities, Context and Ubiquitous Computing | null | Computer Communications 26 (2003) 1168-1176 | null | null | cs.IR | null | Context and context-awareness provides computing environments with the
ability to usefully adapt the services or information they provide. It is the
ability to implicitly sense and automatically derive the user needs that
separates context-aware applications from traditionally designed applications,
and this makes them more attentive, responsive, and aware of their user's
identity, and their user's environment. This paper argues that context-aware
applications capable of supporting complex, cognitive activities can be built
from a model of context called Activity-Centric Context. A conceptual model of
Activity-Centric context is presented. The model is illustrated via a detailed
example.
| [
{
"version": "v1",
"created": "Thu, 19 Sep 2002 06:53:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prekop",
"Paul",
""
],
[
"Burnett",
"Mark",
""
]
] |
cs/0209023 | Mema Roussopoulos | Mema Roussopoulos and Mary Baker | Practical Load Balancing for Content Requests in Peer-to-Peer Networks | 23 pages, 38 figures | null | null | null | cs.NI cs.DC | null | This paper studies the problem of load-balancing the demand for content in a
peer-to-peer network across heterogeneous peer nodes that hold replicas of the
content. Previous decentralized load balancing techniques in distributed
systems base their decisions on periodic updates containing information about
load or available capacity observed at the serving entities. We show that these
techniques do not work well in the peer-to-peer context; either they do not
address peer node heterogeneity, or they suffer from significant load
oscillations. We propose a new decentralized algorithm, Max-Cap, based on the
maximum inherent capacities of the replica nodes and show that unlike previous
algorithms, it is not tied to the timeliness or frequency of updates. Yet,
Max-Cap can handle the heterogeneity of a peer-to-peer environment without
suffering from load oscillations.
| [
{
"version": "v1",
"created": "Sat, 21 Sep 2002 00:09:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roussopoulos",
"Mema",
""
],
[
"Baker",
"Mary",
""
]
] |
cs/0209026 | Peter Rowlands | Peter Rowlands and Bernard Diaz | A universal alphabet and rewrite system | 15 pages | null | null | null | cs.OH | null | We present two ways in which an infinite universal alphabet may be generated
using a novel rewrite system that conserves zero (a special character of the
alphabet and the symbol for that character) at every step. The recursive method
delivers the entire alphabet in one step when invoked with the zero character
as the initial subset alphabet. The iterative method with the same start
delivers characters that act as ciphers for properties that the developing
subset alphabet contains. These properties emerge in an arbitrary sequence and
there are an infinite number of ways they may be selected. The subset alphabets
in addition to having mathematical interpretation as algebra can also be
constrained to emerge in a minimal way which then has application as a
foundational physical system. Each subset alphabet may itself be the basis of a
rewrite system where rules that operate on symbols (representing characters) or
collections of symbols manipulate the specific properties in a dynamic way.
| [
{
"version": "v1",
"created": "Mon, 23 Sep 2002 14:26:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rowlands",
"Peter",
""
],
[
"Diaz",
"Bernard",
""
]
] |
cs/0209027 | Yaneff | A. G. Yaneff | Remarks on d-Dimensional TSP Optimal Tour Length Behaviour | 8 pages, 5 charts | null | null | null | cs.CG | null | The well-known $O(n^{1-1/d})$ behaviour of the optimal tour length for TSP in
d-dimensional Cartesian space causes breaches of the triangle inequality. Other
practical inadequacies of this model are discussed, including its use as basis
for approximation of the TSP optimal tour length or bounds derivations, which I
attempt to remedy.
| [
{
"version": "v1",
"created": "Mon, 23 Sep 2002 21:53:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yaneff",
"A. G.",
""
]
] |
cs/0209028 | Matei Ripeanu | Matei Ripeanu, Ian Foster and Adriana Iamnitchi | Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer
Systems and Implications for System Design | null | IEEE Internet Computing Journal (special issue on peer-to-peer
networking), vol. 6(1) 2002 | null | null | cs.DC cond-mat.stat-mech cs.NI | null | Despite recent excitement generated by the peer-to-peer (P2P) paradigm and
the surprisingly rapid deployment of some P2P applications, there are few
quantitative evaluations of P2P systems behavior. The open architecture,
achieved scale, and self-organizing structure of the Gnutella network make it
an interesting P2P architecture to study. Like most other P2P applications,
Gnutella builds, at the application level, a virtual network with its own
routing mechanisms. The topology of this virtual network and the routing
mechanisms used have a significant influence on application properties such as
performance, reliability, and scalability. We have built a "crawler" to extract
the topology of Gnutella's application level network. In this paper we analyze
the topology graph and evaluate generated network traffic. Our two major
findings are that: (1) although Gnutella is not a pure power-law network, its
current configuration has the benefits and drawbacks of a power-law structure,
and (2) the Gnutella virtual network topology does not match well the
underlying Internet topology, hence leading to ineffective use of the physical
networking infrastructure. These findings guide us to propose changes to the
Gnutella protocol and implementations that may bring significant performance
and scalability improvements. We believe that our findings as well as our
measurement and analysis techniques have broad applicability to P2P systems and
provide unique insights into P2P system design tradeoffs.
| [
{
"version": "v1",
"created": "Wed, 25 Sep 2002 08:27:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ripeanu",
"Matei",
""
],
[
"Foster",
"Ian",
""
],
[
"Iamnitchi",
"Adriana",
""
]
] |
cs/0209029 | Gianluca Argentini | Gianluca Argentini | A generalization of Amdahl's law and relative conditions of parallelism | 11 pages, 4 figures | null | null | null | cs.DC cs.PF | null | In this work I present a generalization of Amdahl's law on the limits of a
parallel implementation with many processors. In particular I establish some
mathematical relations involving the number of processors and the dimension of
the treated problem, and with these conditions I define, on the ground of the
reachable speedup, some classes of parallelism for the implementations. I also
derive a condition for obtaining superlinear speedup. The used mathematical
technics are those of differential calculus. I describe some examples from
classical problems offered by the specialized literature on the subject.
| [
{
"version": "v1",
"created": "Wed, 25 Sep 2002 08:50:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0209030 | Stefan Boettcher | Stefan Boettcher (Emory U) and Allon G. Percus (Los Alamos) | Extremal Optimization: an Evolutionary Local-Search Algorithm | Latex, 17 pages, to appear in the {\it Proceedings of the 8th INFORMS
Computing Society Conference,} (2003) | null | null | null | cs.NE cs.AI | null | A recently introduced general-purpose heuristic for finding high-quality
solutions for many hard optimization problems is reviewed. The method is
inspired by recent progress in understanding far-from-equilibrium phenomena in
terms of {\em self-organized criticality,} a concept introduced to describe
emergent complexity in physical systems. This method, called {\em extremal
optimization,} successively replaces the value of extremely undesirable
variables in a sub-optimal solution with new, random ones. Large,
avalanche-like fluctuations in the cost function self-organize from this
dynamics, effectively scaling barriers to explore local optima in distant
neighborhoods of the configuration space while eliminating the need to tune
parameters. Drawing upon models used to simulate the dynamics of granular
media, evolution, or geology, extremal optimization complements approximation
methods inspired by equilibrium statistical physics, such as {\em simulated
annealing}. It may be but one example of applying new insights into {\em
non-equilibrium phenomena} systematically to hard optimization problems. This
method is widely applicable and so far has proved competitive with -- and even
superior to -- more elaborate general-purpose heuristics on testbeds of
constrained optimization problems with up to $10^5$ variables, such as
bipartitioning, coloring, and satisfiability. Analysis of a suitable model
predicts the only free parameter of the method in accordance with all
experimental results.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2002 14:16:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boettcher",
"Stefan",
"",
"Emory U"
],
[
"Percus",
"Allon G.",
"",
"Los Alamos"
]
] |
cs/0209031 | Adriana Iamnitchi | Adriana Iamnitchi, Matei Ripeanu, Ian Foster | Locating Data in (Small-World?) Peer-to-Peer Scientific Collaborations | 8 pages | 1st International Workshop on Peer-to-Peer Systems IPTPS 2002 | null | null | cs.DC cond-mat | null | Data-sharing scientific collaborations have particular characteristics,
potentially different from the current peer-to-peer environments. In this paper
we advocate the benefits of exploiting emergent patterns in self-configuring
networks specialized for scientific data-sharing collaborations. We speculate
that a peer-to-peer scientific collaboration network will exhibit small-world
topology, as do a large number of social networks for which the same pattern
has been documented. We propose a solution for locating data in decentralized,
scientific, data-sharing environments that exploits the small-worlds topology.
The research challenge we raise is: what protocols should be used to allow a
self-configuring peer-to-peer network to form small worlds similar to the way
in which the humans that use the network do in their social interactions?
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2002 19:14:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Iamnitchi",
"Adriana",
""
],
[
"Ripeanu",
"Matei",
""
],
[
"Foster",
"Ian",
""
]
] |
cs/0209033 | Christoph Durr | Philippe Baptiste, Marek Chrobak, Christoph Durr, Wojciech Jawor and
Nodari Vakhania | Preemptive Scheduling of Equal-Length Jobs to Maximize Weighted
Throughput | gained one author and lost one degree in the complexity | null | null | null | cs.DS | null | We study the problem of computing a preemptive schedule of equal-length jobs
with given release times, deadlines and weights. Our goal is to maximize the
weighted throughput, which is the total weight of completed jobs. In Graham's
notation this problem is described as (1 | r_j;p_j=p;pmtn | sum w_j U_j). We
provide an O(n^4)-time algorithm for this problem, improving the previous bound
of O(n^{10}) by Baptiste.
| [
{
"version": "v1",
"created": "Mon, 30 Sep 2002 10:33:13 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Mar 2003 13:06:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baptiste",
"Philippe",
""
],
[
"Chrobak",
"Marek",
""
],
[
"Durr",
"Christoph",
""
],
[
"Jawor",
"Wojciech",
""
],
[
"Vakhania",
"Nodari",
""
]
] |
cs/0209034 | Sandor P. Fekete | Esther M. Arkin, Sandor P. Fekete, and Joseph S. B. Mitchell | An Algorithmic Study of Manufacturing Paperclips and Other Folded
Structures | 28 pages, 14 figures, Latex, to appear in Computational Geometry -
Theory and Applications | Computational Geometry: Theory and Applications, 25 (2003),
117-138. | null | null | cs.CG | null | We study algorithmic aspects of bending wires and sheet metal into a
specified structure. Problems of this type are closely related to the question
of deciding whether a simple non-self-intersecting wire structure (a
carpenter's ruler) can be straightened, a problem that was open for several
years and has only recently been solved in the affirmative.
If we impose some of the constraints that are imposed by the manufacturing
process, we obtain quite different results. In particular, we study the variant
of the carpenter's ruler problem in which there is a restriction that only one
joint can be modified at a time. For a linkage that does not self-intersect or
self-touch, the recent results of Connelly et al. and Streinu imply that it can
always be straightened, modifying one joint at a time. However, we show that
for a linkage with even a single vertex degeneracy, it becomes NP-hard to
decide if it can be straightened while altering only one joint at a time. If we
add the restriction that each joint can be altered at most once, we show that
the problem is NP-complete even without vertex degeneracies.
In the special case, arising in wire forming manufacturing, that each joint
can be altered at most once, and must be done sequentially from one or both
ends of the linkage, we give an efficient algorithm to determine if a linkage
can be straightened.
| [
{
"version": "v1",
"created": "Mon, 30 Sep 2002 19:42:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arkin",
"Esther M.",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Mitchell",
"Joseph S. B.",
""
]
] |
cs/0210001 | Krzysztof R. Apt | Krzysztof R. Apt | Edsger Wybe Dijkstra (1930 -- 2002): A Portrait of a Genius | 10 pages. To appear in Formal Aspects of Computing | null | null | null | cs.GL | null | We discuss the scientific contributions of Edsger Wybe Dijkstra, his opinions
and his legacy.
| [
{
"version": "v1",
"created": "Tue, 1 Oct 2002 01:37:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] |
cs/0210002 | Rajkumar Buyya | Alexander Barmouta Rajkumar Buyya | GridBank: A Grid Accounting Services Architecture (GASA) for Distributed
Systems Sharing and Integration | 12 pages | null | null | null | cs.DC | null | Computational Grids are emerging as new infrastructure for Internet-based
parallel and distributed computing. They enable the sharing, exchange,
discovery, and aggregation of resources distributed across multiple
administrative domains, organizations and enterprises. To accomplish this,
Grids need infrastructure that supports various services: security, uniform
access, resource management, scheduling, application composition, computational
economy, and accountability. Many Grid projects have developed technologies
that provide many of these services with an exception of accountability. To
overcome this limitation, we propose a new infrastructure called Grid Bank that
provides services for accounting. This paper presents requirements of Grid
accountability and different models within which it can operate and proposes
Grid Bank Services Architecture that meets them. The paper highlights
implementation issues with detailed discussion on format for various
records/database that the GridBank need to maintain. It also presents protocols
for interaction between GridBank and various components within Grid computing
environments.
| [
{
"version": "v1",
"created": "Tue, 1 Oct 2002 10:41:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buyya",
"Alexander Barmouta Rajkumar",
""
]
] |
cs/0210003 | Sandor P. Fekete | Esther M. Arkin, Sandor P. Fekete, Ferran Hurtado, Joseph S. B.
Mitchell, Marc Noy, Vera Sacristan, and Saurabh Sethia | On the Reflexivity of Point Sets | 28 pages, 16 figures, Latex, short version to appear in Discrete &
Computational Geometry -- The Goodman-Pollack Festschrift (2002),
Springer-Verlag | null | null | null | cs.CG cs.DS | null | We introduce a new measure for planar point sets S that captures a
combinatorial distance that S is from being a convex set: The reflexivity
rho(S) of S is given by the smallest number of reflex vertices in a simple
polygonalization of S. We prove various combinatorial bounds and provide
efficient algorithms to compute reflexivity, both exactly (in special cases)
and approximately (in general). Our study considers also some closely related
quantities, such as the convex cover number kappa_c(S) of a planar point set,
which is the smallest number of convex chains that cover S, and the convex
partition number kappa_p(S), which is given by the smallest number of convex
chains with pairwise-disjoint convex hulls that cover S. We have proved that it
is NP-complete to determine the convex cover or the convex partition number and
have given logarithmic-approximation algorithms for determining each.
| [
{
"version": "v1",
"created": "Tue, 1 Oct 2002 14:40:29 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Oct 2002 08:17:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arkin",
"Esther M.",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Hurtado",
"Ferran",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Noy",
"Marc",
""
],
[
"Sacristan",
"Vera",
""
],
[
"Sethia",
"Saurabh",
""
]
] |
cs/0210004 | Sylvain Lagrue | Salem Benferhat, Sylvain Lagrue, Odile Papini | Revising Partially Ordered Beliefs | figures made with the pstricks latex packages | Proc. of the 9th Workshop on Non-monotonic Reasoning (NMR'2002),
pp. 142--149 | null | null | cs.AI | null | This paper deals with the revision of partially ordered beliefs. It proposes
a semantic representation of epistemic states by partial pre-orders on
interpretations and a syntactic representation by partially ordered belief
bases. Two revision operations, the revision stemming from the history of
observations and the possibilistic revision, defined when the epistemic state
is represented by a total pre-order, are generalized, at a semantic level, to
the case of a partial pre-order on interpretations, and at a syntactic level,
to the case of a partially ordered belief base. The equivalence between the two
representations is shown for the two revision operations.
| [
{
"version": "v1",
"created": "Thu, 3 Oct 2002 09:29:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Benferhat",
"Salem",
""
],
[
"Lagrue",
"Sylvain",
""
],
[
"Papini",
"Odile",
""
]
] |
cs/0210005 | Wen Chen | W Chen | Positive time fractional derivative | Welcome any comments to [email protected] | null | null | Simula Research Laboratory Report, Sept. 2002 | cs.CE | null | In mathematical modeling of the non-squared frequency-dependent diffusions,
also known as the anomalous diffusions, it is desirable to have a positive real
Fourier transform for the time derivative of arbitrary fractional or odd
integer order. The Fourier transform of the fractional time derivative in the
Riemann-Liouville and Caputo senses, however, involves a complex power function
of the fractional order. In this study, a positive time derivative of
fractional or odd integer order is introduced to respect the positivity in
modeling the anomalous diffusions.
| [
{
"version": "v1",
"created": "Mon, 7 Oct 2002 19:28:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W",
""
]
] |
cs/0210006 | Mikkel Thorup | Arne Andersson and Mikkel Thorup | Dynamic Ordered Sets with Exponential Search Trees | Revision corrects some typoes and state things better for
applications in subsequent papers | null | null | null | cs.DS | null | We introduce exponential search trees as a novel technique for converting
static polynomial space search structures for ordered sets into fully-dynamic
linear space data structures.
This leads to an optimal bound of O(sqrt(log n/loglog n)) for searching and
updating a dynamic set of n integer keys in linear space. Here searching an
integer y means finding the maximum key in the set which is smaller than or
equal to y. This problem is equivalent to the standard text book problem of
maintaining an ordered set (see, e.g., Cormen, Leiserson, Rivest, and Stein:
Introduction to Algorithms, 2nd ed., MIT Press, 2001).
The best previous deterministic linear space bound was O(log n/loglog n) due
Fredman and Willard from STOC 1990. No better deterministic search bound was
known using polynomial space.
We also get the following worst-case linear space trade-offs between the
number n, the word length w, and the maximal key U < 2^w: O(min{loglog n+log
n/log w, (loglog n)(loglog U)/(logloglog U)}). These trade-offs are, however,
not likely to be optimal.
Our results are generalized to finger searching and string searching,
providing optimal results for both in terms of n.
| [
{
"version": "v1",
"created": "Wed, 9 Oct 2002 04:49:56 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Jun 2003 18:25:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andersson",
"Arne",
""
],
[
"Thorup",
"Mikkel",
""
]
] |
cs/0210009 | Maxim Makatchev | Maxim Makatchev | On the Cell-based Complexity of Recognition of Bounded Configurations by
Finite Dynamic Cellular Automata | 11 pages, 1 figure | null | null | null | cs.CC cs.CV | null | This paper studies complexity of recognition of classes of bounded
configurations by a generalization of conventional cellular automata (CA) --
finite dynamic cellular automata (FDCA). Inspired by the CA-based models of
biological and computer vision, this study attempts to derive the properties of
a complexity measure and of the classes of input configurations that make it
beneficial to realize the recognition via a two-layered automaton as compared
to a one-layered automaton. A formalized model of an image pattern recognition
task is utilized to demonstrate that the derived conditions can be satisfied
for a non-empty set of practical problems.
| [
{
"version": "v1",
"created": "Fri, 11 Oct 2002 19:55:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Makatchev",
"Maxim",
""
]
] |
cs/0210010 | Nima Sarshar | Nima Sarshar and Vwani Roychowdhury | A Random Structure for Optimum Cache Size Distributed hash table (DHT)
Peer-to-Peer design | 13 pages, 2 figures, preprint version | null | null | null | cs.NI cs.DC | null | We propose a new and easily-realizable distributed hash table (DHT)
peer-to-peer structure, incorporating a random caching strategy that allows for
{\em polylogarithmic search time} while having only a {\em constant cache}
size. We also show that a very large class of deterministic caching strategies,
which covers almost all previously proposed DHT systems, can not achieve
polylog search time with constant cache size. In general, the new scheme is the
first known DHT structure with the following highly-desired properties: (a)
Random caching strategy with constant cache size; (b) Average search time of
$O(log^{2}(N))$; (c) Guaranteed search time of $O(log^{3}(N))$; (d) Truly local
cache dynamics with constant overhead for node deletions and additions; (e)
Self-organization from any initial network state towards the desired structure;
and (f) Allows a seamless means for various trade-offs, e.g., search speed or
anonymity at the expense of larger cache size.
| [
{
"version": "v1",
"created": "Mon, 14 Oct 2002 03:37:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sarshar",
"Nima",
""
],
[
"Roychowdhury",
"Vwani",
""
]
] |
cs/0210011 | Aleksandar Ignjatovic | Aleksandar Ignjatovic | A Note on Induction Schemas in Bounded Arithmetic | null | null | null | null | cs.LO cs.CC | null | As is well known, Buss' theory of bounded arithmetic $S^{1}_{2}$ proves
$\Sigma_{0}^{b}(\Sigma_{1}^{b})-LIND$; however, we show that Allen's
$D_{2}^{1}$ does not prove $\Sigma_{0}^{b}(\Sigma_{1}^{b})-LLIND$ unless $P =
NC$. We also give some interesting alternative axiomatisations of $S^{1}_{2}$.
| [
{
"version": "v1",
"created": "Mon, 14 Oct 2002 05:07:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ignjatovic",
"Aleksandar",
""
]
] |
cs/0210012 | Konovalov Igor B. | Igor B. Konovalov | Selection of future events from a time series in relation to estimations
of forecasting uncertainty | null | null | null | null | cs.NE | null | A new general procedure for a priori selection of more predictable events
from a time series of observed variable is proposed. The procedure is
applicable to time series which contains different types of events that feature
significantly different predictability, or, in other words, to heteroskedastic
time series. A priori selection of future events in accordance to expected
uncertainty of their forecasts may be helpful for making practical decisions.
The procedure first implies creation of two neural network based forecasting
models, one of which is aimed at prediction of conditional mean and other -
conditional dispersion, and then elaboration of the rule for future event
selection into groups of more and less predictable events. The method is
demonstrated and tested by the example of the computer generated time series,
and then applied to the real world time series, Dow Jones Industrial Average
index.
| [
{
"version": "v1",
"created": "Mon, 14 Oct 2002 09:00:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Konovalov",
"Igor B.",
""
]
] |
cs/0210013 | David S. Johnson | Janos Csirik, David S. Johnson, Claire Kenyon, James B. Orlin, Peter
W. Shor, and Richard R. Weber | On the Sum-of-Squares Algorithm for Bin Packing | 72 pages | null | null | null | cs.DS | null | In this paper we present a theoretical analysis of the deterministic on-line
{\em Sum of Squares} algorithm ($SS$) for bin packing introduced and studied
experimentally in \cite{CJK99}, along with several new variants. $SS$ is
applicable to any instance of bin packing in which the bin capacity $B$ and
item sizes $s(a)$ are integral (or can be scaled to be so), and runs in time
$O(nB)$. It performs remarkably well from an average case point of view: For
any discrete distribution in which the optimal expected waste is sublinear,
$SS$ also has sublinear expected waste. For any discrete distribution where the
optimal expected waste is bounded, $SS$ has expected waste at most $O(\log n)$.
In addition, we discuss several interesting variants on $SS$, including a
randomized $O(nB\log B)$-time on-line algorithm $SS^*$, based on $SS$, whose
expected behavior is essentially optimal for all discrete distributions.
Algorithm $SS^*$ also depends on a new linear-programming-based
pseudopolynomial-time algorithm for solving the NP-hard problem of determining,
given a discrete distribution $F$, just what is the growth rate for the optimal
expected waste. This article is a greatly expanded version of the conference
paper \cite{sumsq2000}.
| [
{
"version": "v1",
"created": "Mon, 14 Oct 2002 17:17:28 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Oct 2002 22:08:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Csirik",
"Janos",
""
],
[
"Johnson",
"David S.",
""
],
[
"Kenyon",
"Claire",
""
],
[
"Orlin",
"James B.",
""
],
[
"Shor",
"Peter W.",
""
],
[
"Weber",
"Richard R.",
""
]
] |
cs/0210014 | A. Kirilov | A.S.Kirilov | Current state of the Sonix -- the IBR-2 instrument control software and
plans for future developments | Invited talk at NOBUGS2002 Conference, NIST, Gaithersburg, MD NOBUGS
abstract identifier NOBUGS2002/015 5 pages, pdf, 2 figures | null | null | null | cs.HC | null | The Sonix is the main control software for the IBR-2 instruments. This is a
modular configurable and flexible system created using the Varman (real time
database) and the X11/OS9 graphical package in the OS-9 environment. In the
last few years we were mostly focused on making this system more reliable and
user friendly. Because the VME hardware and software upgrade is rather
expensive we would like to replace existing VME + OS9 control computers with
the PC+Windows XP ones in the future. This could be done with the help of
VME-PCI adapters.
| [
{
"version": "v1",
"created": "Wed, 16 Oct 2002 07:42:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kirilov",
"A. S.",
""
]
] |
cs/0210015 | M. H. van Emden | M.H. van Emden | New Developments in Interval Arithmetic and Their Implications for
Floating-Point Standardization | 12 pages; 3 tables | null | null | DCS-273-IR | cs.NA | null | We consider the prospect of a processor that can perform interval arithmetic
at the same speed as conventional floating-point arithmetic. This makes it
possible for all arithmetic to be performed with the superior security of
interval methods without any penalty in speed. In such a situation the IEEE
floating-point standard needs to be compared with a version of floating-point
arithmetic that is ideal for the purpose of interval arithmetic. Such a
comparison requires a succinct and complete exposition of interval arithmetic
according to its recent developments. We present such an exposition in this
paper. We conclude that the directed roundings toward the infinities and the
definition of division by the signed zeros are valuable features of the
standard. Because the operations of interval arithmetic are always defined,
exceptions do not arise. As a result neither Nans nor exceptions are needed. Of
the status flags, only the inexact flag may be useful. Denormalized numbers
seem to have no use for interval arithmetic; in the use of interval
constraints, they are a handicap.
| [
{
"version": "v1",
"created": "Wed, 16 Oct 2002 23:22:13 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Oct 2002 22:18:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.