id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0212055
Shafi Goldwasser
Shafi Goldwasser
Mathematical foundations of modern cryptography: computational complexity perspective
null
Proceedings of the ICM, Beijing 2002, vol. 1, 245--272
null
ICM-2002
cs.CR cs.CC
null
Theoretical computer science has found fertile ground in many areas of mathematics. The approach has been to consider classical problems through the prism of computational complexity, where the number of basic computational steps taken to solve a problem is the crucial qualitative parameter. This new approach has led to a sequence of advances, in setting and solving new mathematical challenges as well as in harnessing discrete mathematics to the task of solving real-world problems. In this talk, I will survey the development of modern cryptography -- the mathematics behind secret communications and protocols -- in this light. I will describe the complexity theoretic foundations underlying the cryptographic tasks of encryption, pseudo-randomness number generators and functions, zero knowledge interactive proofs, and multi-party secure protocols. I will attempt to highlight the paradigms and proof techniques which unify these foundations, and which have made their way into the mainstream of complexity theory.
[ { "version": "v1", "created": "Sun, 1 Dec 2002 00:00:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldwasser", "Shafi", "" ] ]
cs/0212056
Shafi Goldwasser
Shafi Goldwasser
On the Work of Madhu Sudan: the 2002 Nevalinna Prize Winner
null
Proceedings of the ICM, Beijing 2002, vol. 1, 105--115
null
ICM-2002
cs.CC
null
Madhu Sudan's work spans many areas of computer science theory including computational complexity theory, the design of efficient algorithms, algorithmic coding theory, and the theory of program checking and correcting. Two results of Sudan stand out in the impact they have had on the mathematics of computation. The first work shows a probabilistic characterization of the class NP -- those sets for which short and easily checkable proofs of membership exist, and demonstrates consequences of this characterization to classifying the complexity of approximation problems. The second work shows a polynomial time algorithm for list decoding the Reed Solomon error correcting codes. This short note will be devoted to describing Sudan's work on probabilistically checkable proofs -- the so called {\it PCP theorem} and its implications.
[ { "version": "v1", "created": "Sun, 1 Dec 2002 00:00:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldwasser", "Shafi", "" ] ]
cs/0301001
Nikolai Chernov
N. Chernov and C. Lesort
Least squares fitting of circles and lines
26 pages, 14 figures, submitted
null
null
null
cs.CV
null
We study theoretical and computational aspects of the least squares fit (LSF) of circles and circular arcs. First we discuss the existence and uniqueness of LSF and various parametrization schemes. Then we evaluate several popular circle fitting algorithms and propose a new one that surpasses the existing methods in reliability. We also discuss and compare direct (algebraic) circle fits.
[ { "version": "v1", "created": "Wed, 1 Jan 2003 19:58:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Chernov", "N.", "" ], [ "Lesort", "C.", "" ] ]
cs/0301002
Mark J. Kilgard
Cass Everitt, Mark J. Kilgard
Practical and Robust Stenciled Shadow Volumes for Hardware-Accelerated Rendering
8 pages, 5 figures
null
null
null
cs.GR cs.CG
null
Twenty-five years ago, Crow published the shadow volume approach for determining shadowed regions in a scene. A decade ago, Heidmann described a hardware-accelerated stencil buffer-based shadow volume algorithm. Unfortunately hardware-accelerated stenciled shadow volume techniques have not been widely adopted by 3D games and applications due in large part to the lack of robustness of described techniques. This situation persists despite widely available hardware support. Specifically what has been lacking is a technique that robustly handles various "hard" situations created by near or far plane clipping of shadow volumes. We describe a robust, artifact-free technique for hardware-accelerated rendering of stenciled shadow volumes. Assuming existing hardware, we resolve the issues otherwise caused by shadow volume near and far plane clipping through a combination of (1) placing the conventional far clip plane "at infinity", (2) rasterization with infinite shadow volume polygons via homogeneous coordinates, and (3) adopting a zfail stencil-testing scheme. Depth clamping, a new rasterization feature provided by NVIDIA's GeForce3, preserves existing depth precision by not requiring the far plane to be placed at infinity. We also propose two-sided stencil testing to improve the efficiency of rendering stenciled shadow volumes.
[ { "version": "v1", "created": "Mon, 6 Jan 2003 20:57:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Everitt", "Cass", "" ], [ "Kilgard", "Mark J.", "" ] ]
cs/0301003
Danny Hong
Alexandros Eleftheriadis and Danny Hong
Flavor: A Language for Media Representation
20 pages and 15 figures
null
null
null
cs.PL
null
Flavor (Formal Language for Audio-Visual Object Representation) has been created as a language for describing coded multimedia bitstreams in a formal way so that the code for reading and writing bitstreams can be automatically generated. It is an extension of C++ and Java, in which the typing system incorporates bitstream representation semantics. This allows describing in a single place both the in-memory representation of data as well as their bitstream-level (compressed) representation. Flavor also comes with a translator that automatically generates standard C++ or Java code from the Flavor source code so that direct access to compressed multimedia information by application developers can be achieved with essentially zero programming. Flavor has gone through many enhancements and this paper fully describes the latest version of the language and the translator. The software has been made into an open source project as of Version 4.1, and the latest downloadable Flavor package is available at http://flavor.sourceforge.net.
[ { "version": "v1", "created": "Tue, 7 Jan 2003 07:53:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Eleftheriadis", "Alexandros", "" ], [ "Hong", "Danny", "" ] ]
cs/0301004
Vince Grolmusz
Vince Grolmusz
Near Quadratic Matrix Multiplication Modulo Composites
Prelimanary version, 6 pages
null
null
null
cs.CC cs.DM
null
We show how one can use non-prime-power, composite moduli for computing representations of the product of two $n\times n$ matrices using only $n^{2+o(1)}$ multiplications.
[ { "version": "v1", "created": "Wed, 8 Jan 2003 14:35:25 GMT" }, { "version": "v2", "created": "Thu, 9 Jan 2003 09:15:45 GMT" }, { "version": "v3", "created": "Tue, 4 Feb 2003 15:31:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Grolmusz", "Vince", "" ] ]
cs/0301005
Ganesh Ramakrishnan
R. Ganesh, B.Kaushik, R.Sadhu
Modelling Delay Jitter in Voice over IP
null
null
null
null
cs.PF
null
It has been suggested in voice over IP that an appropriate choice of the distribution used in modeling the delay jitters, can improve the play-out algorithm. In this paper, we propose a tool using which, one can determine, at a given instance, which distribution model best explains the jitter distribution. This is done using Expectation Maximization, to choose amongst possible distribution models which include, the i.i.d exponential distribution, the gamma distribution etc.
[ { "version": "v1", "created": "Thu, 9 Jan 2003 05:46:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Ganesh", "R.", "" ], [ "Kaushik", "B.", "" ], [ "Sadhu", "R.", "" ] ]
cs/0301006
Balint Takacs
Balint Takacs, Istvan Szita, Andras Lorincz
Temporal plannability by variance of the episode length
null
null
null
null
cs.AI
null
Optimization of decision problems in stochastic environments is usually concerned with maximizing the probability of achieving the goal and minimizing the expected episode length. For interacting agents in time-critical applications, learning of the possibility of scheduling of subtasks (events) or the full task is an additional relevant issue. Besides, there exist highly stochastic problems where the actual trajectories show great variety from episode to episode, but completing the task takes almost the same amount of time. The identification of sub-problems of this nature may promote e.g., planning, scheduling and segmenting Markov decision processes. In this work, formulae for the average duration as well as the standard deviation of the duration of events are derived. The emerging Bellman-type equation is a simple extension of Sobel's work (1982). Methods of dynamic programming as well as methods of reinforcement learning can be applied for our extension. Computer demonstration on a toy problem serve to highlight the principle.
[ { "version": "v1", "created": "Thu, 9 Jan 2003 12:39:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Takacs", "Balint", "" ], [ "Szita", "Istvan", "" ], [ "Lorincz", "Andras", "" ] ]
cs/0301007
Istvan szita
Istvan Szita, Andras Lorincz
Kalman filter control in the reinforcement learning framework
4 pages
null
null
null
cs.LG cs.AI
null
There is a growing interest in using Kalman-filter models in brain modelling. In turn, it is of considerable importance to make Kalman-filters amenable for reinforcement learning. In the usual formulation of optimal control it is computed off-line by solving a backward recursion. In this technical note we show that slight modification of the linear-quadratic-Gaussian Kalman-filter model allows the on-line estimation of optimal control and makes the bridge to reinforcement learning. Moreover, the learning rule for value estimation assumes a Hebbian form weighted by the error of the value estimation.
[ { "version": "v1", "created": "Thu, 9 Jan 2003 15:08:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Szita", "Istvan", "" ], [ "Lorincz", "Andras", "" ] ]
cs/0301008
Pascal Hitzler
Pascal Hitzler and Matthias Wendt (Artificial Intelligence Institute, Dresden University of Technology)
Formal Concept Analysis and Resolution in Algebraic Domains
14 pages. We have rewritten the old version according to the suggestions of some referees. The results are the same. The presentation is completely different
null
null
null
cs.LO cs.AI
null
We relate two formerly independent areas: Formal concept analysis and logic of domains. We will establish a correspondene between contextual attribute logic on formal contexts resp. concept lattices and a clausal logic on coherent algebraic cpos. We show how to identify the notion of formal concept in the domain theoretic setting. In particular, we show that a special instance of the resolution rule from the domain logic coincides with the concept closure operator from formal concept analysis. The results shed light on the use of contexts and domains for knowledge representation and reasoning purposes.
[ { "version": "v1", "created": "Thu, 9 Jan 2003 23:37:57 GMT" }, { "version": "v2", "created": "Thu, 1 May 2003 16:16:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Hitzler", "Pascal", "", "Artificial Intelligence Institute,\n Dresden University of Technology" ], [ "Wendt", "Matthias", "", "Artificial Intelligence Institute,\n Dresden University of Technology" ] ]
cs/0301009
Qingguo Zheng
Qingguo Zheng
A Script Language for Data Integration in Database
9 pages
null
null
Report:9-1-1999
cs.DB
null
A Script Language in this paper is designed to transform the original data into the target data by the computing formula. The Script Language can be translated into the corresponding SQL Language, and the computation is finally implemented by the first type of dynamic SQL. The Script Language has the operations of insert, update, delete, union, intersect, and minus for the table in the database.The Script Language is edited by a text file and you can easily modify the computing formula in the text file to deal with the situations when the computing formula have been changed. So you only need modify the text of the script language, but needn't change the programs that have complied.
[ { "version": "v1", "created": "Mon, 13 Jan 2003 05:34:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Zheng", "Qingguo", "" ] ]
cs/0301010
Kewen Wang
Kewen Wang, Lizhu Zhou
Comparisons and Computation of Well-founded Semantics for Disjunctive Logic Programs
31 pages
null
null
null
cs.AI
null
Much work has been done on extending the well-founded semantics to general disjunctive logic programs and various approaches have been proposed. However, these semantics are different from each other and no consensus is reached about which semantics is the most intended. In this paper we look at disjunctive well-founded reasoning from different angles. We show that there is an intuitive form of the well-founded reasoning in disjunctive logic programming which can be characterized by slightly modifying some exisitng approaches to defining disjunctive well-founded semantics, including program transformations, argumentation, unfounded sets (and resolution-like procedure). We also provide a bottom-up procedure for this semantics. The significance of our work is not only in clarifying the relationship among different approaches, but also shed some light on what is an intended well-founded semantics for disjunctive logic programs.
[ { "version": "v1", "created": "Tue, 14 Jan 2003 08:14:43 GMT" }, { "version": "v2", "created": "Thu, 16 Jan 2003 01:10:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Kewen", "" ], [ "Zhou", "Lizhu", "" ] ]
cs/0301011
Michael J. O'Donnell
Michael J. O'Donnell
Open Network Handles Implemented in DNS
Internet Draft draft-odonnell-onhs-imp-dns-00.txt, 5 September 2002
null
null
null
cs.NI
null
An Open Network Handle System (ONHS) provides an intermediate level of service between IP numbers and domain names. A handle adheres permanently to an owner, who may assign and reassign it to different addresses at will. But a handle is a number, carrying no significance in natural language. Any user desiring a handle may generate one from a public key. This memo describes a simple implementation of an Open Network Handle System using the security extensions to the Domain Name System (DNSSEC).
[ { "version": "v1", "created": "Tue, 14 Jan 2003 21:37:19 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Donnell", "Michael J.", "" ] ]
cs/0301012
Sergey I. Nikolenko
Sergey I. Nikolenko
Hard satisfiable formulas for DPLL-type algorithms
9 pages
null
null
null
cs.CC
null
We address lower bounds on the time complexity of algorithms solving the propositional satisfiability problem. Namely, we consider two DPLL-type algorithms, enhanced with the unit clause and pure literal heuristics. Exponential lower bounds for solving satisfiability on provably satisfiable formulas are proven.
[ { "version": "v1", "created": "Wed, 15 Jan 2003 08:44:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Nikolenko", "Sergey I.", "" ] ]
cs/0301013
Steve Kautz
S. M. Kautz
Independence Properties of Algorithmically Random Sequences
20 pages
null
null
null
cs.CC
null
A bounded Kolmogorov-Loveland selection rule is an adaptive strategy for recursively selecting a subsequence of an infinite binary sequence; such a subsequence may be interpreted as the query sequence of a time-bounded Turing machine. In this paper we show that if A is an algorithmically random sequence, A_0 is selected from A via a bounded Kolmogorov-Loveland selection rule, and A_1 denotes the sequence of nonselected bits of A, then A_1 is independent of A_0; that is, A_1 is algorithmically random relative to A_0. This result has been used by Kautz and Miltersen [1] to show that relative to a random oracle, NP does not have p-measure zero (in the sense of Lutz [2]). [1] S. M. Kautz and P. B. Miltersen. Relative to a random oracle, NP is not small. Journal of Computer and System Sciences, 53:235-250, 1996. [2] J. H. Lutz. Almost everywhere high nonuniform complexity. Journal of Computer and System Sciences, 44:220-258, 1992.
[ { "version": "v1", "created": "Thu, 16 Jan 2003 02:56:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Kautz", "S. M.", "" ] ]
cs/0301015
Giorgio Parisi
Giorgio Parisi
Some remarks on the survey decimation algorithm for K-satisfiability
null
null
null
null
cs.CC cond-mat.dis-nn cs.DS
null
In this note we study the convergence of the survey decimation algorithm. An analytic formula for the reduction of the complexity during the decimation is derived. The limit of the converge of the algorithm are estimated in the random case: interesting phenomena appear near the boundary of convergence.
[ { "version": "v1", "created": "Thu, 16 Jan 2003 10:38:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Parisi", "Giorgio", "" ] ]
cs/0301016
Martin Lotz
Peter Buergisser and Martin Lotz
Lower Bounds on the Bounded Coefficient Complexity of Bilinear Maps
19 pages
null
null
null
cs.CC
null
We prove lower bounds of order $n\log n$ for both the problem to multiply polynomials of degree $n$, and to divide polynomials with remainder, in the model of bounded coefficient arithmetic circuits over the complex numbers. These lower bounds are optimal up to order of magnitude. The proof uses a recent idea of R. Raz [Proc. 34th STOC 2002] proposed for matrix multiplication. It reduces the linear problem to multiply a random circulant matrix with a vector to the bilinear problem of cyclic convolution. We treat the arising linear problem by extending J. Morgenstern's bound [J. ACM 20, pp. 305-306, 1973] in a unitarily invariant way. This establishes a new lower bound on the bounded coefficient complexity of linear forms in terms of the singular values of the corresponding matrix. In addition, we extend these lower bounds for linear and bilinear maps to a model of circuits that allows a restricted number of unbounded scalar multiplications.
[ { "version": "v1", "created": "Thu, 16 Jan 2003 15:36:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Buergisser", "Peter", "" ], [ "Lotz", "Martin", "" ] ]
cs/0301017
Millist W. Vincent
Millist W. Vincent and Jixue Liu
Completeness and Decidability Properties for Functional Dependencies in XML
null
null
null
null
cs.DB
null
XML is of great importance in information storage and retrieval because of its recent emergence as a standard for data representation and interchange on the Internet. However XML provides little semantic content and as a result several papers have addressed the topic of how to improve the semantic expressiveness of XML. Among the most important of these approaches has been that of defining integrity constraints in XML. In a companion paper we defined strong functional dependencies in XML(XFDs). We also presented a set of axioms for reasoning about the implication of XFDs and showed that the axiom system is sound for arbitrary XFDs. In this paper we prove that the axioms are also complete for unary XFDs (XFDs with a single path on the l.h.s.). The second contribution of the paper is to prove that the implication problem for unary XFDs is decidable and to provide a linear time algorithm for it.
[ { "version": "v1", "created": "Mon, 20 Jan 2003 00:13:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Vincent", "Millist W.", "" ], [ "Liu", "Jixue", "" ] ]
cs/0301018
Naren Ramakrishnan
Srinidhi Varadarajan and Naren Ramakrishnan
Novel Runtime Systems Support for Adaptive Compositional Modeling on the Grid
null
null
null
null
cs.CE cs.DC
null
Grid infrastructures and computing environments have progressed significantly in the past few years. The vision of truly seamless Grid usage relies on runtime systems support that is cognizant of the operational issues underlying grid computations and, at the same time, is flexible enough to accommodate diverse application scenarios. This paper addresses the twin aspects of Grid infrastructure and application support through a novel combination of two computational technologies: Weaves - a source-language independent parallel runtime compositional framework that operates through reverse-analysis of compiled object files, and runtime recommender systems that aid in dynamic knowledge-based application composition. Domain-specific adaptivity is exploited through a novel compositional system that supports runtime recommendation of code modules and a sophisticated checkpointing and runtime migration solution that can be transparently deployed over Grid infrastructures. A core set of "adaptivity schemas" are provided as templates for adaptive composition of large-scale scientific computations. Implementation issues, motivating application contexts, and preliminary results are described.
[ { "version": "v1", "created": "Tue, 21 Jan 2003 02:26:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Varadarajan", "Srinidhi", "" ], [ "Ramakrishnan", "Naren", "" ] ]
cs/0301019
Daniel A. Spielman
Daniel A. Spielman and Shang-Hua Teng
Smoothed Analysis of Interior-Point Algorithms: Termination
to be presented at the 2003 International Symposium on Mathematical Programming
null
null
null
cs.DS
null
We perform a smoothed analysis of the termination phase of an interior-point method. By combining this analysis with the smoothed analysis of Renegar's interior-point algorithm by Dunagan, Spielman and Teng, we show that the smoothed complexity of an interior-point algorithm for linear programming is $O (m^{3} \log (m/\sigma))$. In contrast, the best known bound on the worst-case complexity of linear programming is $O (m^{3} L)$, where $L$ could be as large as $m$. We include an introduction to smoothed analysis and a tutorial on proof techniques that have been useful in smoothed analyses.
[ { "version": "v1", "created": "Tue, 21 Jan 2003 17:47:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0301020
Vivolo
P. Dusart, G. Letourneux, O. Vivolo
Differential Fault Analysis on A.E.S
10 pages
null
null
null
cs.CR
null
We explain how a differential fault analysis (DFA) works on AES 128, 192 or 256 bits.
[ { "version": "v1", "created": "Tue, 21 Jan 2003 20:19:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Dusart", "P.", "" ], [ "Letourneux", "G.", "" ], [ "Vivolo", "O.", "" ] ]
cs/0301021
Sostenes Lins
Lauro Lins, Sostenes Lins and Silvio Melo
PHORMA: Perfectly Hashable Order Restricted Multidimensional Arrays
12 pages, 4 figures, 2 tables. Revised version. Submitted to Discrete Applied Mathematics
null
null
null
cs.DS
null
In this paper we propose a simple and efficient data structure yielding a perfect hashing of quite general arrays. The data structure is named phorma, which is an acronym for perfectly hashable order restricted multidimensional array. Keywords: Perfect hash function, Digraph, Implicit enumeration, Nijenhuis-Wilf combinatorial family.
[ { "version": "v1", "created": "Tue, 21 Jan 2003 23:55:17 GMT" }, { "version": "v2", "created": "Sun, 23 Mar 2003 16:33:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Lins", "Lauro", "" ], [ "Lins", "Sostenes", "" ], [ "Melo", "Silvio", "" ] ]
cs/0301022
Ponomarenko
Dima Grigoriev and Ilia Ponomarenko
Homomorphic public-key cryptosystems and encrypting boolean circuits
null
null
null
null
cs.CR
null
In this paper homomorphic cryptosystems are designed for the first time over any finite group. Applying Barrington's construction we produce for any boolean circuit of the logarithmic depth its encrypted simulation of a polynomial size over an appropriate finitely generated group.
[ { "version": "v1", "created": "Wed, 22 Jan 2003 08:49:17 GMT" }, { "version": "v2", "created": "Tue, 4 Feb 2003 07:38:36 GMT" }, { "version": "v3", "created": "Wed, 26 Feb 2003 06:21:43 GMT" }, { "version": "v4", "created": "Fri, 28 Feb 2003 06:23:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Grigoriev", "Dima", "" ], [ "Ponomarenko", "Ilia", "" ] ]
cs/0301023
T. Schaub
Torsten Schaub and Kewen Wang
A semantic framework for preference handling in answer set programming
39 pages. To appear in Theory and Practice of Logic Programming
null
null
null
cs.AI
null
We provide a semantic framework for preference handling in answer set programming. To this end, we introduce preference preserving consequence operators. The resulting fixpoint characterizations provide us with a uniform semantic framework for characterizing preference handling in existing approaches. Although our approach is extensible to other semantics by means of an alternating fixpoint theory, we focus here on the elaboration of preferences under answer set semantics. Alternatively, we show how these approaches can be characterized by the concept of order preservation. These uniform semantic characterizations provide us with new insights about interrelationships and moreover about ways of implementation.
[ { "version": "v1", "created": "Thu, 23 Jan 2003 09:09:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Schaub", "Torsten", "" ], [ "Wang", "Kewen", "" ] ]
cs/0301024
Ranee Brylinski
Jean-Luc Brylinski and Ranee Brylinski
Complexity and Completeness of Immanants
10 pages, Latex
null
null
null
cs.CC math.CO
null
Immanants are polynomial functions of n by n matrices attached to irreducible characters of the symmetric group S_n, or equivalently to Young diagrams of size n. Immanants include determinants and permanents as extreme cases. Valiant proved that computation of permanents is a complete problem in his algebraic model of NP theory, i.e., it is VNP-complete. We prove that computation of immanants is VNP-complete if the immanants are attached to a family of diagrams whose separation is $\Omega(n^\delta)$ for some $\delta>0$. We define the separation of a diagram to be the largest number of overhanging boxes contained in a single row. Our theorem proves a conjecture of Buergisser for a large variety of families, and in particular we recover with new proofs his VNP-completeness results for hooks and rectangles.
[ { "version": "v1", "created": "Thu, 23 Jan 2003 20:31:46 GMT" }, { "version": "v2", "created": "Thu, 23 Jan 2003 21:48:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Brylinski", "Jean-Luc", "" ], [ "Brylinski", "Ranee", "" ] ]
cs/0301025
Sostenes Lins
Lauro Lins, Sostenes Lins and Silvio Melo
PHORMA: Perfectly Hashed Order Restricted Multidimensional Array
12 pages, 4 figures
null
null
null
cs.DM
null
In this paper we propose a simple and efficient strategy to obtain a data structure generator to accomplish a perfect hash of quite general order restricted multidimensional arrays named {\em phormas}. The constructor of such objects gets two parameters as input: an n-vector a of non negative integers and a boolean function B on the types of order restrictions on the coordinates of the valid n-vectors bounded by a. At compiler time, the phorma constructor builds, from the pair a,B, a digraph G(a,B) with a single source s and a single sink t such that the st-paths are in 1-1 correspondence with the members of the B-restricted a-bounded array A(a,B). Besides perfectly hashing A(a,B), G(a,B) is an instance of an NW-family. This permits other useful computational tasks on it.
[ { "version": "v1", "created": "Fri, 24 Jan 2003 13:30:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Lins", "Lauro", "" ], [ "Lins", "Sostenes", "" ], [ "Melo", "Silvio", "" ] ]
cs/0301026
Judith Beumer
Michael Beeson, Robert Veroff, Larry Wos
Double-Negation Elimination in Some Propositional Logics
32 pages, no figures
null
null
Preprint ANL/MCS-P1014-1202
cs.LO
null
This article answers two questions (posed in the literature), each concerning the guaranteed existence of proofs free of double negation. A proof is free of double negation if none of its deduced steps contains a term of the form n(n(t)) for some term t, where n denotes negation. The first question asks for conditions on the hypotheses that, if satisfied, guarantee the existence of a double-negation-free proof when the conclusion is free of double negation. The second question asks about the existence of an axiom system for classical propositional calculus whose use, for theorems with a conclusion free of double negation, guarantees the existence of a double-negation-free proof. After giving conditions that answer the first question, we answer the second question by focusing on the Lukasiewicz three-axiom system. We then extend our studies to infinite-valued sentential calculus and to intuitionistic logic and generalize the notion of being double-negation free. The double-negation proofs of interest rely exclusively on the inference rule condensed detachment, a rule that combines modus ponens with an appropriately general rule of substitution. The automated reasoning program OTTER played an indispensable role in this study.
[ { "version": "v1", "created": "Fri, 24 Jan 2003 20:25:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Beeson", "Michael", "" ], [ "Veroff", "Robert", "" ], [ "Wos", "Larry", "" ] ]
cs/0301027
Thomas Wolf
Thomas Wolf
A comparison of four approaches to the calculation of conservation laws
updated source code download link
Euro. Jnl of Applied Mathematics, 13, part 2 (2002) 129-152
null
null
cs.SC math-ph math.MP
null
The paper compares computational aspects of four approaches to compute conservation laws of single differential equations (DEs) or systems of them, ODEs and PDEs. The only restriction, required by two of the four corresponding computer algebra programs, is that each DE has to be solvable for a leading derivative. Extra constraints for the conservation laws can be specified. Examples include new conservation laws that are non-polynomial in the functions, that have an explicit variable dependence and families of conservation laws involving arbitrary functions. The following equations are investigated in examples: Ito, Liouville, Burgers, Kadomtsev-Petviashvili, Karney-Sen-Chu-Verheest, Boussinesq, Tzetzeica, Benney.
[ { "version": "v1", "created": "Sat, 25 Jan 2003 04:42:12 GMT" }, { "version": "v2", "created": "Sat, 1 Feb 2003 17:43:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolf", "Thomas", "" ] ]
cs/0301028
Thomas Wolf
Thomas Wolf
The integration of systems of linear PDEs using conservation laws of syzygies
26 pages
J. of Symb. Comp. 35, no 5 (2003) 499-526.
null
null
cs.SC math.AP
null
A new integration technique is presented for systems of linear partial differential equations (PDEs) for which syzygies can be formulated that obey conservation laws. These syzygies come for free as a by-product of the differential Groebner Basis computation. Compared with the more obvious way of integrating a single equation and substituting the result in other equations the new technique integrates more than one equation at once and therefore introduces temporarily fewer new functions of integration that in addition depend on fewer variables. Especially for high order PDE systems in many variables the conventional integration technique may lead to an explosion of the number of functions of integration which is avoided with the new method. A further benefit is that redundant free functions in the solution are either prevented or that their number is at least reduced.
[ { "version": "v1", "created": "Tue, 28 Jan 2003 05:20:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolf", "Thomas", "" ] ]
cs/0301029
Thomas Wolf
Thomas Wolf
Size reduction and partial decoupling of systems of equations
null
J. Symb. Comp. 33, no 3 (2002) 367-383
null
null
cs.SC
null
A method is presented that reduces the number of terms of systems of linear equations (algebraic, ordinary and partial differential equations). As a byproduct these systems have a tendency to become partially decoupled and are more likely to be factorizable or integrable. A variation of this method is applicable to non-linear systems. Modifications to improve efficiency are given and examples are shown. This procedure can be used in connection with the computation of the radical of a differential ideal (differential Groebner basis).
[ { "version": "v1", "created": "Tue, 28 Jan 2003 06:16:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolf", "Thomas", "" ] ]
cs/0301030
Ronald I. Greenberg
Ronald I. Greenberg
Bounds on the Number of Longest Common Subsequences
13 pages. Corrected typos, corrected operation of hyperlinks, improved presentation
null
null
null
cs.DM cs.DS
null
This paper performs the analysis necessary to bound the running time of known, efficient algorithms for generating all longest common subsequences. That is, we bound the running time as a function of input size for algorithms with time essentially proportional to the output size. This paper considers both the case of computing all distinct LCSs and the case of computing all LCS embeddings. Also included is an analysis of how much better the efficient algorithms are than the standard method of generating LCS embeddings. A full analysis is carried out with running times measured as a function of the total number of input characters, and much of the analysis is also provided for cases in which the two input sequences are of the same specified length or of two independently specified lengths.
[ { "version": "v1", "created": "Tue, 28 Jan 2003 17:53:16 GMT" }, { "version": "v2", "created": "Wed, 6 Aug 2003 20:54:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Greenberg", "Ronald I.", "" ] ]
cs/0301031
Judith Beumer
K. Keahey and V. Welch
Fine-Grain Authorization for Resource Management in the Grid Environment
7 pages
null
null
ANL/MCS-P991-0802
cs.CR cs.DC
null
In this document we describe our work-in-progress for enabling fine-grain authorization of resource management. In particular, we address the needs of Virtual Organizations (VOs) to enforce their own policies in addition to those of the resource owners.
[ { "version": "v1", "created": "Tue, 28 Jan 2003 19:27:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Keahey", "K.", "" ], [ "Welch", "V.", "" ] ]
cs/0301032
null
Oleg Kiselyov
Subclassing errors, OOP, and practically checkable rules to prevent them
10 pages, 1 LaTeX file; accompanying C++ and Haskell code and compilation instructions
Proc. "Monterey Workshop 2001: Engineering Automation for Software Intensive System Integration," sponsored by ONR/AFOSR/ARO/DARPA. June 18-22, 2001, Monterey, CA. -- pp. 33-42
null
null
cs.PL cs.SE
null
This paper considers an example of Object-Oriented Programming (OOP) leading to subtle errors that break separation of interface and implementations. A comprehensive principle that guards against such errors is undecidable. The paper introduces a set of mechanically verifiable rules that prevent these insidious problems. Although the rules seem restrictive, they are powerful and expressive, as we show on several familiar examples. The rules contradict both the spirit and the letter of the OOP. The present examples as well as available theoretical and experimental results pose a question if OOP is conducive to software development at all.
[ { "version": "v1", "created": "Tue, 28 Jan 2003 19:41:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiselyov", "Oleg", "" ] ]
cs/0301033
Judith Beumer
K. Keahey, T. Fredian, Q. Peng, D. P. Schissel, M. Thompson, I. Foster, M. Greenwald, D. McCune
Computational Grids in Action: The Natinal Fusion Collaboratory
null
Future Generation Computer Systems 18 (2002), 1005-1015
null
null
cs.DC
null
The National Fusion Collaboratory (NFC) project was created to advance scientific understanding and innovation in magnetic fusion research by enabling more efficient use of existing experimental facilities through more effective integration of experiment, theory, and modeling. To achieve this objective, NFC introduced the concept of "network services", which build on top of computational Grids, and provide Fusion codes, together with their maintenance and hardware resources as a service to the community. This mode of operation requires the development of new authorization and enforcement capabilities. In addition, the nature of Fusion experiments places strident quality of service requirements on codes run during the experimental cycle. In this paper, we describe Grid computing requirements of the Fusion community, and present our first experiments in meeting those requirements.
[ { "version": "v1", "created": "Tue, 28 Jan 2003 20:11:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Keahey", "K.", "" ], [ "Fredian", "T.", "" ], [ "Peng", "Q.", "" ], [ "Schissel", "D. P.", "" ], [ "Thompson", "M.", "" ], [ "Foster", "I.", "" ], [ "Greenwald", "M.", "" ], [ "McCune", "D.", "" ] ]
cs/0301034
Ronald I. Greenberg
Ronald I. Greenberg
Computing the Number of Longest Common Subsequences
3 pages, LaTeX
null
null
null
cs.DS cs.DM
null
This note provides very simple, efficient algorithms for computing the number of distinct longest common subsequences of two input strings and for computing the number of LCS embeddings.
[ { "version": "v1", "created": "Wed, 29 Jan 2003 20:02:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Greenberg", "Ronald I.", "" ] ]
cs/0301035
Alex Brodsky
Alex Brodsky, Jan B. Pedersen, and Alan Wagner
On the Complexity of Buffer Allocation in Message Passing Systems
35 Pages, lots of figures
null
null
null
cs.DC
null
Message passing programs commonly use buffers to avoid unnecessary synchronizations and to improve performance by overlapping communication with computation. Unfortunately, using buffers makes the program no longer portable, potentially unable to complete on systems without a sufficient number of buffers. Effective buffer use entails that the minimum number needed for a safe execution be allocated. We explore a variety of problems related to buffer allocation for safe and efficient execution of message passing programs. We show that determining the minimum number of buffers or verifying a buffer assignment are intractable problems. However, we give a polynomial time algorithm to determine the minimum number of buffers needed to allow for asynchronous execution. We extend these results to several different buffering schemes, which in some cases make the problems tractable.
[ { "version": "v1", "created": "Fri, 31 Jan 2003 01:21:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Brodsky", "Alex", "" ], [ "Pedersen", "Jan B.", "" ], [ "Wagner", "Alan", "" ] ]
cs/0301036
Joe Francoeur
Joe Francoeur
Algorithms using Java for Spreadsheet Dependent Cell Recomputation
23 pages, 4 figures, 2 tables
null
null
null
cs.DS cs.DM
null
Java implementations of algorithms used by spreadsheets to automatically recompute the set of cells dependent on a changed cell are described using a mathematical model for spreadsheets based on graph theory. These solutions comprise part of a Java API that allows a client application to read, modify, and maintain spreadsheet data without using the spreadsheet application program that produced it. Features of the Java language that successfully improve the running time performance of the algorithms are also described.
[ { "version": "v1", "created": "Fri, 31 Jan 2003 20:19:21 GMT" }, { "version": "v2", "created": "Mon, 9 Jun 2003 21:21:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Francoeur", "Joe", "" ] ]
cs/0302001
Ke Xu
Ke Xu and Wei Li
Many Hard Examples in Exact Phase Transitions with Application to Generating Hard Satisfiable Instances
19 pages, corrected mistakes in Theorems 5 and 6
null
null
null
cs.CC cond-mat.stat-mech cs.AI cs.DM
null
This paper first analyzes the resolution complexity of two random CSP models (i.e. Model RB/RD) for which we can establish the existence of phase transitions and identify the threshold points exactly. By encoding CSPs into CNF formulas, it is proved that almost all instances of Model RB/RD have no tree-like resolution proofs of less than exponential size. Thus, we not only introduce new families of CNF formulas hard for resolution, which is a central task of Proof-Complexity theory, but also propose models with both many hard instances and exact phase transitions. Then, the implications of such models are addressed. It is shown both theoretically and experimentally that an application of Model RB/RD might be in the generation of hard satisfiable instances, which is not only of practical importance but also related to some open problems in cryptography such as generating one-way functions. Subsequently, a further theoretical support for the generation method is shown by establishing exponential lower bounds on the complexity of solving random satisfiable and forced satisfiable instances of RB/RD near the threshold. Finally, conclusions are presented, as well as a detailed comparison of Model RB/RD with the Hamiltonian cycle problem and random 3-SAT, which, respectively, exhibit three different kinds of phase transition behavior in NP-complete problems.
[ { "version": "v1", "created": "Sat, 1 Feb 2003 15:58:16 GMT" }, { "version": "v2", "created": "Tue, 25 Mar 2003 15:44:57 GMT" }, { "version": "v3", "created": "Sat, 1 Nov 2003 02:04:04 GMT" }, { "version": "v4", "created": "Thu, 6 Nov 2003 03:25:08 GMT" }, { "version": "v5", "created": "Tue, 11 Nov 2003 16:40:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Xu", "Ke", "" ], [ "Li", "Wei", "" ] ]
cs/0302002
Thomas Wolf
Matthew Pratola, Thomas Wolf
Optimizing GoTools' Search Heuristics using Genetic Algorithms
23 pages, to appear in Journal of ICGA
null
null
null
cs.NE
null
GoTools is a program which solves life & death problems in the game of Go. This paper describes experiments using a Genetic Algorithm to optimize heuristic weights used by GoTools' tree-search. The complete set of heuristic weights is composed of different subgroups, each of which can be optimized with a suitable fitness function. As a useful side product, an MPI interface for FreePascal was implemented to allow the use of a parallelized fitness function running on a Beowulf cluster. The aim of this exercise is to optimize the current version of GoTools, and to make tools available in preparation of an extension of GoTools for solving open boundary life & death problems, which will introduce more heuristic parameters to be fine tuned.
[ { "version": "v1", "created": "Sun, 2 Feb 2003 03:30:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Pratola", "Matthew", "" ], [ "Wolf", "Thomas", "" ] ]
cs/0302003
Guilhem Semerjian
Simona Cocco, Remi Monasson, Andrea Montanari, Guilhem Semerjian
Approximate analysis of search algorithms with "physical" methods
28 pages, 23 figures
null
null
null
cs.CC cond-mat.stat-mech
null
An overview of some methods of statistical physics applied to the analysis of algorithms for optimization problems (satisfiability of Boolean constraints, vertex cover of graphs, decoding, ...) with distributions of random inputs is proposed. Two types of algorithms are analyzed: complete procedures with backtracking (Davis-Putnam-Loveland-Logeman algorithm) and incomplete, local search procedures (gradient descent, random walksat, ...). The study of complete algorithms makes use of physical concepts such as phase transitions, dynamical renormalization flow, growth processes, ... As for local search procedures, the connection between computational complexity and the structure of the cost function landscape is questioned, with emphasis on the notion of metastability.
[ { "version": "v1", "created": "Mon, 3 Feb 2003 11:04:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Cocco", "Simona", "" ], [ "Monasson", "Remi", "" ], [ "Montanari", "Andrea", "" ], [ "Semerjian", "Guilhem", "" ] ]
cs/0302004
Stijn Vansummeren
Stijn Vansummeren
Unique Pattern Matching in Strings
22 pages
null
null
null
cs.PL cs.DB
null
Regular expression patterns are a key feature of document processing languages like Perl and XDuce. It is in this context that the first and longest match policies have been proposed to disambiguate the pattern matching process. We formally define a matching semantics with these policies and show that the generally accepted method of simulating longest match by first match and recursion is incorrect. We continue by solving the associated type inference problem, which consists in calculating for every subexpression the set of words the subexpression can still match when these policies are in effect, and show how this algorithm can be used to efficiently implement the matching process.
[ { "version": "v1", "created": "Mon, 3 Feb 2003 15:52:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Vansummeren", "Stijn", "" ] ]
cs/0302005
Vicky Choi
Vicky Choi and Martin Farach-Colton
Barnacle: An Assembly Algorithm for Clone-based Sequences of Whole Genomes
13 pages, 10 figures
null
null
null
cs.DS cs.DM q-bio
null
We propose an assembly algorithm {\sc Barnacle} for sequences generated by the clone-based approach. We illustrate our approach by assembling the human genome. Our novel method abandons the original physical-mapping-first framework. As we show, {\sc Barnacle} more effectively resolves conflicts due to repeated sequences. The latter is the main difficulty of the sequence assembly problem. Inaddition, we are able to detect inconsistencies in the underlying data. We present and compare our results on the December 2001 freeze of the public working draft of the human genome with NCBI's assembly (Build 28). The assembly of December 2001 freeze of the public working draft generated by {\sc Barnacle} and the source code of {\sc Barnacle} are available at (http://www.cs.rutgers.edu/~vchoi).
[ { "version": "v1", "created": "Mon, 3 Feb 2003 22:42:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Choi", "Vicky", "" ], [ "Farach-Colton", "Martin", "" ] ]
cs/0302006
Rajkumar Buyya
Jia Yu, Srikumar Venugopal, Rajkumar Buyya
Grid Market Directory: A Web Services based Grid Service Publication Directory
Technical Report, Grid Computing and Distributed Systems Lab, University of Melbourne, Jan 2003
null
null
null
cs.DC
null
As Grids are emerging as the next generation service-oriented computing platforms, they need to support Grid economy that helps in the management of supply and demand for resources and offers an economic incentive for Grid resource providers. To enable this Grid economy, a market-like Grid environment including an infrastructure that supports the publication of services and their discovery is needed. As part of the Gridbus project, we proposed and have developed a Grid Market Directory (GMD) that serves as a registry for high-level service publication and discovery in Virtual Organisations.
[ { "version": "v1", "created": "Thu, 6 Feb 2003 03:31:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Yu", "Jia", "" ], [ "Venugopal", "Srikumar", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0302007
Rajkumar Buyya
Martin Placek and Rajkumar Buyya
G-Monitor: Gridbus web portal for monitoring and steering application execution on global grids
Technical Report, Grid Computing and Distributed Systems Lab, Dept. of Computer Science and Software Engineer, The University of Melbourne, Australia
null
null
null
cs.DC
null
Grids are experiencing a rapid growth in their application and along with this there is a requirement for a portal which is easy to use and scalable. We have responded to this requirement by developing an easy to use, scalable, web-based portal called G-Monitor. This paper proposes a generic architecture for a web portal into a grid environment and discusses our implementation and its application.
[ { "version": "v1", "created": "Thu, 6 Feb 2003 03:36:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Placek", "Martin", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0302008
Rajkumar Buyya
Shoib Burq, Steve Melnikoff, Kim Branson, Rajkumar Buyya
Visual Environment for Rapid Composition of Parameter-Sweep Applications for Distributed Processing on Global Grids
Technical Report, Grid Computing and Distributed Systems Lab, Dept. of Computer Science and Software Engineering, The University of Melbourne, Australia
null
null
null
cs.DC
null
Computational Grids are emerging as a platform for next-generation parallel and distributed computing. Large-scale parametric studies and parameter sweep applications find a natural place in the Grid?s distribution model. There is little or no communication between jobs. The task of parallelizing and distributing existing applications is conceptually trivial. These properties of parametric studies make it an ideal place to start developing integrated development environments (IDEs) for rapidly Grid-enabling applications. However, the availability of IDEs for scientists to Grid-enable their applications, without the need of developing them as parallel applications explicitly, is still lacking. This paper presents a Java based IDE called Visual Parametric Tool (VPT), developed as part of the Gridbus project, for rapid creation of parameter sweep (data parallel/SPMD) applications. It supports automatic creation of parameter script and parameterisation of the input data files, which is compatible with the Nimrod-G parameter specification language. The usefulness of VPT is demonstrated by a case study on composition of molecular docking application as a parameter sweep application. Such applications can be deployed on clusters using the Nimrod/enFuzion system and on global Grids using the Nimrod-G grid resource broker.
[ { "version": "v1", "created": "Thu, 6 Feb 2003 04:06:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Burq", "Shoib", "" ], [ "Melnikoff", "Steve", "" ], [ "Branson", "Kim", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0302009
Andrej Brodnik
Andrej Brodnik (1 and 2), Andreas Nilsson (2) ((1) IMFM, Ljubljana, Slovenia, (2) University of Technology, Lulea, Sweden)
Data Structure for a Time-Based Bandwidth Reservations Problem
null
null
null
null
cs.DS cs.NI
null
We discuss a problem of handling resource reservations. The resource can be reserved for some time, it can be freed or it can be queried what is the largest amount of reserved resource during a time interval. We show that the problem has a lower bound of $\Omega(\log n)$ per operation on average and we give a matching upper bound algorithm. Our solution also solves a dynamic version of the related problems of a prefix sum and a partial sum.
[ { "version": "v1", "created": "Thu, 6 Feb 2003 17:48:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Brodnik", "Andrej", "", "1 and 2" ], [ "Nilsson", "Andreas", "" ] ]
cs/0302010
Petros Maniatis
Petros Maniatis and Mary Baker
Authenticated Append-only Skip Lists
24 pages
null
null
null
cs.CR cs.DC
null
In this work we describe, design and analyze the security of a tamper-evident, append-only data structure for maintaining secure data sequences in a loosely coupled distributed system where individual system components may be mutually distrustful. The resulting data structure, called an Authenticated Append-Only Skip List (AASL), allows its maintainers to produce one-way digests of the entire data sequence, which they can publish to others as a commitment on the contents and order of the sequence. The maintainer can produce efficiently succinct proofs that authenticate a particular datum in a particular position of the data sequence against a published digest. AASLs are secure against tampering even by malicious data structure maintainers. First, we show that a maintainer cannot ``invent'' and authenticate data elements for the AASL after he has committed to the structure. Second, he cannot equivocate by being able to prove conflicting facts about a particular position of the data sequence. This is the case even when the data sequence grows with time and its maintainer publishes successive commitments at times of his own choosing. AASLs can be invaluable in reasoning about the integrity of system logs maintained by untrusted components of a loosely-coupled distributed system.
[ { "version": "v1", "created": "Fri, 7 Feb 2003 01:51:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Maniatis", "Petros", "" ], [ "Baker", "Mary", "" ] ]
cs/0302011
Daniel A. Spielman
John Dunagan, Daniel A. Spielman, and Shang-Hua Teng
Smoothed Analysis of Interior-Point Algorithms: Condition Number
Fixed it up quite a bit
null
null
null
cs.DS cs.NA
null
We show that the smoothed complexity of the logarithm of Renegar's condition number is O(log (n/sigma)).
[ { "version": "v1", "created": "Mon, 10 Feb 2003 06:14:26 GMT" }, { "version": "v2", "created": "Fri, 17 Oct 2003 15:38:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Dunagan", "John", "" ], [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0302012
Juergen Schmidhuber
Juergen Schmidhuber
The New AI: General & Sound & Relevant for Physics
23 pages, updated refs, added Goedel machine overview, corrected computing history timeline. To appear in B. Goertzel and C. Pennachin, eds.: Artificial General Intelligence
null
null
TR IDSIA-04-03
cs.AI cs.LG quant-ph
null
Most traditional artificial intelligence (AI) systems of the past 50 years are either very limited, or based on heuristics, or both. The new millennium, however, has brought substantial progress in the field of theoretically optimal and practically feasible algorithms for prediction, search, inductive inference based on Occam's razor, problem solving, decision making, and reinforcement learning in environments of a very general type. Since inductive inference is at the heart of all inductive sciences, some of the results are relevant not only for AI and computer science but also for physics, provoking nontraditional predictions based on Zuse's thesis of the computer-generated universe.
[ { "version": "v1", "created": "Mon, 10 Feb 2003 14:17:33 GMT" }, { "version": "v2", "created": "Thu, 27 Nov 2003 10:01:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidhuber", "Juergen", "" ] ]
cs/0302013
Mark J. Kilgard
Mark J. Kilgard
Cg in Two Pages
2 pages
null
null
null
cs.GR cs.PL
null
Cg is a language for programming GPUs. This paper describes Cg briefly.
[ { "version": "v1", "created": "Wed, 12 Feb 2003 05:16:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Kilgard", "Mark J.", "" ] ]
cs/0302014
V. Sriram
Akshar Bharati, V.Sriram, A.Vamshi Krishna, Rajeev Sangal, S.M.Bendre
An Algorithm for Aligning Sentences in Bilingual Corpora Using Lexical Information
10 pages, 5 figures, Conference : International Conference on Natural Language Processing ' 2002, Mumbai
null
null
null
cs.CL
null
In this paper we describe an algorithm for aligning sentences with their translations in a bilingual corpus using lexical information of the languages. Existing efficient algorithms ignore word identities and consider only the sentence lengths (Brown, 1991; Gale and Church, 1993). For a sentence in the source language text, the proposed algorithm picks the most likely translation from the target language text using lexical information and certain heuristics. It does not do statistical analysis using sentence lengths. The algorithm is language independent. It also aids in detecting addition and deletion of text in translations. The algorithm gives comparable results with the existing algorithms in most of the cases while it does better in cases where statistical algorithms do not give good results.
[ { "version": "v1", "created": "Wed, 12 Feb 2003 06:31:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Bharati", "Akshar", "" ], [ "Sriram", "V.", "" ], [ "Krishna", "A. Vamshi", "" ], [ "Sangal", "Rajeev", "" ], [ "Bendre", "S. M.", "" ] ]
cs/0302015
J. G. Wolff
J. G. Wolff
Unsupervised Learning in a Framework of Information Compression by Multiple Alignment, Unification and Search
39 pages, 1 JPEG figure
null
null
null
cs.AI cs.LG
null
This paper describes a novel approach to unsupervised learning that has been developed within a framework of "information compression by multiple alignment, unification and search" (ICMAUS), designed to integrate learning with other AI functions such as parsing and production of language, fuzzy pattern recognition, probabilistic and exact forms of reasoning, and others.
[ { "version": "v1", "created": "Wed, 12 Feb 2003 09:39:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolff", "J. G.", "" ] ]
cs/0302016
Adriana Iamnitchi
Adriana Iamnitchi, Matei Ripeanu, Ian Foster
Data-sharing relationships in the Web
null
null
null
University of Chicago TR-2003-01
cs.NI cond-mat
null
We propose a novel structure, the data-sharing graph, for characterizing sharing patterns in large-scale data distribution systems. We analyze this structure in two such systems and uncover small-world patterns for data-sharing relationships. Using the data-sharing graph for system characterization has potential both for basic science, because we can identify new structures emerging in real, dynamic networks; and for system design, because we can exploit these structures when designing data location and delivery mechanisms. We conjecture that similar patterns arise in other large-scale systems and that these patterns can be exploited for mechanism design.
[ { "version": "v1", "created": "Wed, 12 Feb 2003 19:34:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Iamnitchi", "Adriana", "" ], [ "Ripeanu", "Matei", "" ], [ "Foster", "Ian", "" ] ]
cs/0302017
Michael J. O'Donnell
Michael J. O'Donnell
A Proposal to Separate Handles from Names on the Internet
null
null
null
null
cs.NI
null
Networked communications inherently depend on the ability of the sender of a message to indicate through some token how the message should be delivered to a particular recipient. The tokens that refer messages to recipients are variously known as routes, addresses,handles, and names} ordered by their relative nearness to network topology vs. human meaning. All four sorts of token refer in some way to a recipient, but they are controlled by different authorities and their meanings depend on different contextual parameters. Today's global Internet employs dynamically determined routes, IP addresses, and domain names. Domain names combine the functions of handles and names. The high value of domain names as names leads to substantial social and legal dispute about their assignment, degrading their value as handles. The time has come to provide a distinct open network handle system (ONHS), using handles that are not meaningful in natural language and are therefore not subject to the disputes surrounding the use of names. A handle service may be deployed easily as a handle domain within the current Domain Name System. In order to minimize the administrative load, and maximize their own autonomy, netizens may use public-key cryptography to assign their own handles.
[ { "version": "v1", "created": "Wed, 12 Feb 2003 22:10:04 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Donnell", "Michael J.", "" ] ]
cs/0302018
Rajkumar Buyya
Ding Choon Hoong, Rajkumar Buyya
Guided Google: A Meta Search Engine and its Implementation using the Google Distributed Web Services
Technical Report, Grid Computing and Distributed Systems (GRIDS) Lab, Dept. of Computer Science and Software Engineering, The University of Melbourne, Australia
null
null
null
cs.DC
null
With the advent of the Internet, search engines have begun sprouting like mushrooms after a rainfall. Only in recent years, have developers become more innovative, and came up with guided searching facilities online. The goals of these applications are to help ease and guide the searching efforts of a novice web user toward their desired objectives. A number of implementations of such services are emerging. This paper proposes a guided meta-search engine, called "Guided Google", as it serves as an interface to the actual Google.com search engine, using the Google Web Services.
[ { "version": "v1", "created": "Thu, 13 Feb 2003 04:49:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoong", "Ding Choon", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0302019
Rajkumar Buyya
R. Buyya, S. Date, Y. Mizuno-Matsumoto, S. Venugopal, D. Abramson
Economic and On Demand Brain Activity Analysis on Global Grids
Technical Report, Grid Computing and Distributed Systems (GRIDS) Lab, Dept. of Computer Science and Software Engineering, The University of Melbourne, Australia
null
null
null
cs.DC
null
The lack of computational power within an organization for analyzing scientific data, and the distribution of knowledge (by scientists) and technologies (advanced scientific devices) are two major problems commonly observed in scientific disciplines. One such scientific discipline is brain science. The analysis of brain activity data gathered from the MEG (Magnetoencephalography) instrument is an important research topic in medical science since it helps doctors in identifying symptoms of diseases. The data needs to be analyzed exhaustively to efficiently diagnose and analyze brain functions and requires access to large-scale computational resources. The potential platform for solving such resource intensive applications is the Grid. This paper describes a MEG data analysis system developed by us, leveraging Grid technologies, primarily Nimrod-G, Gridbus, and Globus. This paper explains the application of economy-based grid scheduling algorithms to the problem domain for on-demand processing of analysis jobs.
[ { "version": "v1", "created": "Thu, 13 Feb 2003 04:53:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Buyya", "R.", "" ], [ "Date", "S.", "" ], [ "Mizuno-Matsumoto", "Y.", "" ], [ "Venugopal", "S.", "" ], [ "Abramson", "D.", "" ] ]
cs/0302020
Aaron Harwood
Aaron Harwood
Analytical formulations of Peer-to-Peer Connection Efficiency
9 pages
null
null
null
cs.DC cs.AR cs.NI
null
Use of Peer-to-Peer (P2P) service networks introduces a new communication paradigm because peers are both clients and servers and so each peer may provide/request services to/from other peers. Empirical studies of P2P networks have been undertaken and reveal useful characteristics. However there is to date little analytical work to describe P2P networks with respect to their communication paradigm and their interconnections. This paper provides an analytical formulation and optimisation of peer connection efficiency, in terms of minimising the fraction of wasted connection time. Peer connection efficiency is analysed for both a uni- and multi-connected peer. Given this fundamental optimisation, the paper optimises the number of connections that peers should make use of as a function of network load, in terms of minimising the total queue size that requests in the P2P network experience. The results of this paper provide a basis for engineering high performance P2P interconnection networks. The optimisations are useful for reducing bandwidth and power consumption, e.g. in the case of peers being mobile devices with a limited power supply. Also these results could be used to determine when a (virtual) circuit should be switched to support a connection.
[ { "version": "v1", "created": "Thu, 13 Feb 2003 10:13:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Harwood", "Aaron", "" ] ]
cs/0302021
Steven Bird
Gary Simons and Steven Bird
Building an Open Language Archives Community on the OAI Foundation
12 pages
Library Hi Tech 21(2), 2003
null
null
cs.CL cs.DL
null
The Open Language Archives Community (OLAC) is an international partnership of institutions and individuals who are creating a worldwide virtual library of language resources. The Dublin Core (DC) Element Set and the OAI Protocol have provided a solid foundation for the OLAC framework. However, we need more precision in community-specific aspects of resource description than is offered by DC. Furthermore, many of the institutions and individuals who might participate in OLAC do not have the technical resources to support the OAI protocol. This paper presents our solutions to these two problems. To address the first, we have developed an extensible application profile for language resource metadata. To address the second, we have implemented Vida (the virtual data provider) and Viser (the virtual service provider), which permit community members to provide data and services without having to implement the OAI protocol. These solutions are generic and could be adopted by other specialized subcommunities.
[ { "version": "v1", "created": "Fri, 14 Feb 2003 07:11:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Simons", "Gary", "" ], [ "Bird", "Steven", "" ] ]
cs/0302022
James Aspnes
James Aspnes, Zoe Diamadi, and Gauri Shah
Fault-tolerant routing in peer-to-peer systems
Full version of PODC 2002 paper. New version corrects missing conditioning in Lemma 9 and some related details in the proof of Theorem 10, with no changes to main results
null
null
null
cs.DS cs.DC
null
We consider the problem of designing an overlay network and routing mechanism that permits finding resources efficiently in a peer-to-peer system. We argue that many existing approaches to this problem can be modeled as the construction of a random graph embedded in a metric space whose points represent resource identifiers, where the probability of a connection between two nodes depends only on the distance between them in the metric space. We study the performance of a peer-to-peer system where nodes are embedded at grid points in a simple metric space: a one-dimensional real line. We prove upper and lower bounds on the message complexity of locating particular resources in such a system, under a variety of assumptions about failures of either nodes or the connections between them. Our lower bounds in particular show that the use of inverse power-law distributions in routing, as suggested by Kleinberg (1999), is close to optimal. We also give efficient heuristics to dynamically maintain such a system as new nodes arrive and old nodes depart. Finally, we give experimental results that suggest promising directions for future work.
[ { "version": "v1", "created": "Sat, 15 Feb 2003 17:15:46 GMT" }, { "version": "v2", "created": "Sun, 22 Jun 2003 18:22:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Aspnes", "James", "" ], [ "Diamadi", "Zoe", "" ], [ "Shah", "Gauri", "" ] ]
cs/0302023
Alexander Haubold
Alexander Haubold and John R. Kender
Segmentation, Indexing, and Visualization of Extended Instructional Videos
8 pages, 13 figures
null
null
null
cs.IR cs.CV
null
We present a new method for segmenting, and a new user interface for indexing and visualizing, the semantic content of extended instructional videos. Given a series of key frames from the video, we generate a condensed view of the data by clustering frames according to media type and visual similarities. Using various visual filters, key frames are first assigned a media type (board, class, computer, illustration, podium, and sheet). Key frames of media type board and sheet are then clustered based on contents via an algorithm with near-linear cost. A novel user interface, the result of two user studies, displays related topics using icons linked topologically, allowing users to quickly locate semantically related portions of the video. We analyze the accuracy of the segmentation tool on 17 instructional videos, each of which is from 75 to 150 minutes in duration (a total of 40 hours); the classification accuracy exceeds 96%.
[ { "version": "v1", "created": "Sun, 16 Feb 2003 22:08:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ], [ "Kender", "John R.", "" ] ]
cs/0302024
Alexander Haubold
Alexander Haubold and John R. Kender
Analysis and Interface for Instructional Video
4 pages, 8 figures, ICME 2003
Proceedings of 2003 IEEE International Conference on Multimedia & Expo, Volume II, pages 705-708, July 2003
null
null
cs.IR cs.CV
null
We present a new method for segmenting, and a new user interface for indexing and visualizing, the semantic content of extended instructional videos. Using various visual filters, key frames are first assigned a media type (board, class, computer, illustration, podium, and sheet). Key frames of media type board and sheet are then clustered based on contents via an algorithm with near-linear cost. A novel user interface, the result of two user studies, displays related topics using icons linked topologically, allowing users to quickly locate semantically related portions of the video. We analyze the accuracy of the segmentation tool on 17 instructional videos, each of which is from 75 to 150 minutes in duration (a total of 40 hours); it exceeds 96%.
[ { "version": "v1", "created": "Sun, 16 Feb 2003 22:13:42 GMT" }, { "version": "v2", "created": "Sat, 30 Aug 2003 06:47:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ], [ "Kender", "John R.", "" ] ]
cs/0302025
Andris Ambainis
Andris Ambainis, Markus Jakobsson, Helger Lipmaa
Cryptographic Randomized Response Techniques
21 pages
null
null
null
cs.CC cs.CR cs.CY quant-ph
null
We develop cryptographically secure techniques to guarantee unconditional privacy for respondents to polls. Our constructions are efficient and practical, and are shown not to allow cheating respondents to affect the ``tally'' by more than their own vote -- which will be given the exact same weight as that of other respondents. We demonstrate solutions to this problem based on both traditional cryptographic techniques and quantum cryptography.
[ { "version": "v1", "created": "Tue, 18 Feb 2003 11:23:23 GMT" }, { "version": "v2", "created": "Fri, 23 May 2003 13:59:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Ambainis", "Andris", "" ], [ "Jakobsson", "Markus", "" ], [ "Lipmaa", "Helger", "" ] ]
cs/0302026
Volodymyr Myrnyy
Volodymyr Myrnyy (Brandenburg University of Technology, Cottbus, Germany)
Recursive function templates as a solution of linear algebra expressions in C++
Latex2e, 8 pages, 3 figures
null
null
null
cs.MS cs.PL
null
The article deals with a kind of recursive function templates in C++, where the recursion is realized corresponding template parameters to achieve better computational performance. Some specialization of these template functions ends the recursion and can be implemented using optimized hardware dependent or independent routines. The method is applied in addition to the known expression templates technique to solve linear algebra expressions with the help of the BLAS library. The whole implementation produces a new library, which keeps object-oriented benefits and has a higher computational speed represented in the tests.
[ { "version": "v1", "created": "Wed, 19 Feb 2003 15:59:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Myrnyy", "Volodymyr", "", "Brandenburg University of Technology, Cottbus,\n Germany" ] ]
cs/0302027
Alper Ungor
David Eppstein, John M. Sullivan, and Alper Ungor
Tiling space and slabs with acute tetrahedra
20 pages; 17 figures; 1 table; see also http://www.cs.duke.edu/~ungor/abstracts/acute_tiling.html
Computational Geometry Theory & Applications 27(3):237-255, 2004
10.1016/j.comgeo.2003.11.003
null
cs.CG math.MG
null
We show it is possible to tile three-dimensional space using only tetrahedra with acute dihedral angles. We present several constructions to achieve this, including one in which all dihedral angles are less than $77.08^\circ$, and another which tiles a slab in space.
[ { "version": "v1", "created": "Wed, 19 Feb 2003 20:40:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "Sullivan", "John M.", "" ], [ "Ungor", "Alper", "" ] ]
cs/0302029
Alejandro Javier Garcia
Alejandro Javier Garcia and Guillermo Ricardo Simari
Defeasible Logic Programming: An Argumentative Approach
43 pages, to appear in the journal "Theory and Practice of Logic Programming"
null
null
null
cs.AI
null
The work reported here introduces Defeasible Logic Programming (DeLP), a formalism that combines results of Logic Programming and Defeasible Argumentation. DeLP provides the possibility of representing information in the form of weak rules in a declarative manner, and a defeasible argumentation inference mechanism for warranting the entailed conclusions. In DeLP an argumentation formalism will be used for deciding between contradictory goals. Queries will be supported by arguments that could be defeated by other arguments. A query q will succeed when there is an argument A for q that is warranted, ie, the argument A that supports q is found undefeated by a warrant procedure that implements a dialectical analysis. The defeasible argumentation basis of DeLP allows to build applications that deal with incomplete and contradictory information in dynamic domains. Thus, the resulting approach is suitable for representing agent's knowledge and for providing an argumentation based reasoning mechanism to agents.
[ { "version": "v1", "created": "Thu, 20 Feb 2003 00:48:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Garcia", "Alejandro Javier", "" ], [ "Simari", "Guillermo Ricardo", "" ] ]
cs/0302031
Alper Ungor
Herbert Edelsbrunner and Alper Ungor
Relaxed Scheduling in Dynamic Skin Triangulation
17 pages; 7 figures; 3 tables; see also http://www.cs.duke.edu/~ungor/abstracts/schedule_skin.html
null
null
null
cs.CG
null
We introduce relaxed scheduling as a paradigm for mesh maintenance and demonstrate its applicability to triangulating a skin surface in $\Rspace^3$.
[ { "version": "v1", "created": "Thu, 20 Feb 2003 22:20:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Edelsbrunner", "Herbert", "" ], [ "Ungor", "Alper", "" ] ]
cs/0302032
Philipp Koehn
Philipp Koehn and Kevin Knight
Empirical Methods for Compound Splitting
8 pages, 2 figures. Published at EACL 2003
null
null
null
cs.CL
null
Compounded words are a challenge for NLP applications such as machine translation (MT). We introduce methods to learn splitting rules from monolingual and parallel corpora. We evaluate them against a gold standard and measure their impact on performance of statistical MT systems. Results show accuracy of 99.1% and performance gains for MT of 0.039 BLEU on a German-English noun phrase translation task.
[ { "version": "v1", "created": "Sat, 22 Feb 2003 23:37:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Koehn", "Philipp", "" ], [ "Knight", "Kevin", "" ] ]
cs/0302033
Raimondas Lencevicius
Sampsa Fabritius, Raimondas Lencevicius, Edu Metz, Alexander Ran
Experimental Software Schedulability Estimation For Varied Processor Frequencies
6 pages, 3 figures, published in the Proceedings of the Symposium on Software Engineering at 21th IASTED International Multi-Conference on Applied Informatics (AI 2003)
null
null
null
cs.SE cs.OS
null
This paper describes a new approach to experimentally estimate the application schedulability for various processor frequencies. We use additional workload generated by an artificial high priority routine to simulate the frequency decrease of a processor. Then we estimate the schedulability of applications at different frequencies. The results of such estimation can be used to determine the frequencies and control algorithms of dynamic voltage scaling/dynamic frequency scaling (DVS/DFS) implementations. The paper presents a general problem description, the proposed schedulability estimation method, its analysis and evaluation.
[ { "version": "v1", "created": "Mon, 24 Feb 2003 22:03:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Fabritius", "Sampsa", "" ], [ "Lencevicius", "Raimondas", "" ], [ "Metz", "Edu", "" ], [ "Ran", "Alexander", "" ] ]
cs/0302034
Alexandre d'Aspremont
Alexandre d'Aspremont
Interest Rate Model Calibration Using Semidefinite Programming
null
Applied Mathematical Finance 10(3), pp. 183-213, September 2003
null
CMAPX-491
cs.CE
null
We show that, for the purpose of pricing Swaptions, the Swap rate and the corresponding Forward rates can be considered lognormal under a single martingale measure. Swaptions can then be priced as options on a basket of lognormal assets and an approximation formula is derived for such options. This formula is centered around a Black-Scholes price with an appropriate volatility, plus a correction term that can be interpreted as the expected tracking error. The calibration problem can then be solved very efficiently using semidefinite programming.
[ { "version": "v1", "created": "Tue, 25 Feb 2003 02:48:42 GMT" }, { "version": "v2", "created": "Wed, 5 Oct 2005 21:07:53 GMT" } ]
2007-05-23T00:00:00
[ [ "d'Aspremont", "Alexandre", "" ] ]
cs/0302035
Alexandre d'Aspremont
Alexandre d'Aspremont
Risk-Management Methods for the Libor Market Model Using Semidefinite Programming
null
Journal of Computational Finance 8(4), pp. 77-99, Summer 2005
null
null
cs.CE
null
When interest rate dynamics are described by the Libor Market Model as in BGM97, we show how some essential risk-management results can be obtained from the dual of the calibration program. In particular, if the objetive is to maximize another swaption's price, we show that the optimal dual variables describe a hedging portfolio in the sense of \cite{Avel96}. In the general case, the local sensitivity of the covariance matrix to all market movement scenarios can be directly computed from the optimal dual solution. We also show how semidefinite programming can be used to manage the Gamma exposure of a portfolio.
[ { "version": "v1", "created": "Tue, 25 Feb 2003 03:09:11 GMT" }, { "version": "v2", "created": "Wed, 5 Oct 2005 21:28:13 GMT" } ]
2007-05-23T00:00:00
[ [ "d'Aspremont", "Alexandre", "" ] ]
cs/0302036
Evgueni Petrov
Evgueni Petrov, Eric Monfroy
Constraint-based analysis of composite solvers
submitted to AI SAC 2004
null
null
null
cs.AI
null
Cooperative constraint solving is an area of constraint programming that studies the interaction between constraint solvers with the aim of discovering the interaction patterns that amplify the positive qualities of individual solvers. Automatisation and formalisation of such studies is an important issue of cooperative constraint solving. In this paper we present a constraint-based analysis of composite solvers that integrates reasoning about the individual solvers and the processed data. The idea is to approximate this reasoning by resolution of set constraints on the finite sets representing the predicates that express all the necessary properties. We illustrate application of our analysis to two important cooperation patterns: deterministic choice and loop.
[ { "version": "v1", "created": "Tue, 25 Feb 2003 14:33:08 GMT" }, { "version": "v2", "created": "Sun, 7 Sep 2003 23:03:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrov", "Evgueni", "" ], [ "Monfroy", "Eric", "" ] ]
cs/0302037
Ilia Toli
Ilia Toli
Hidden Polynomial(s) Cryptosystems
17 pages
null
null
null
cs.CR cs.SC
null
We propose variations of the class of hidden monomial cryptosystems in order to make it resistant to all known attacks. We use identities built upon a single bivariate polynomial equation with coefficients in a finite field. Indeed, it can be replaced by a ``small'' ideal, as well. Throughout, we set up probabilistic encryption protocols, too. The same ideas extend to digital signature algorithms, as well. Our schemes work as well on differential fields of positive characteristic, and elsewhere.
[ { "version": "v1", "created": "Wed, 26 Feb 2003 18:30:49 GMT" }, { "version": "v2", "created": "Thu, 27 Feb 2003 20:21:31 GMT" }, { "version": "v3", "created": "Tue, 11 Mar 2003 21:37:59 GMT" }, { "version": "v4", "created": "Sat, 29 Mar 2003 14:00:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Toli", "Ilia", "" ] ]
cs/0302038
Esra Erdem
Esra Erdem and Vladimir Lifschitz
Tight Logic Programs
To appear in Special Issue of the Theory and Practice of Logic Programming Journal on Answer Set Programming, 2003
Theory and Practice of Logic Programming, 3(4--5):499--518, 2003.
null
null
cs.AI cs.LO
null
This note is about the relationship between two theories of negation as failure -- one based on program completion, the other based on stable models, or answer sets. Francois Fages showed that if a logic program satisfies a certain syntactic condition, which is now called ``tightness,'' then its stable models can be characterized as the models of its completion. We extend the definition of tightness and Fages' theorem to programs with nested expressions in the bodies of rules, and study tight logic programs containing the definition of the transitive closure of a predicate.
[ { "version": "v1", "created": "Fri, 28 Feb 2003 01:28:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Erdem", "Esra", "" ], [ "Lifschitz", "Vladimir", "" ] ]
cs/0302039
Barnabas Poczos
Barnabas Poczos, Andras Lorincz
Kalman-filtering using local interactions
null
null
null
null
cs.AI
null
There is a growing interest in using Kalman-filter models for brain modelling. In turn, it is of considerable importance to represent Kalman-filter in connectionist forms with local Hebbian learning rules. To our best knowledge, Kalman-filter has not been given such local representation. It seems that the main obstacle is the dynamic adaptation of the Kalman-gain. Here, a connectionist representation is presented, which is derived by means of the recursive prediction error method. We show that this method gives rise to attractive local learning rules and can adapt the Kalman-gain.
[ { "version": "v1", "created": "Fri, 28 Feb 2003 18:32:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Poczos", "Barnabas", "" ], [ "Lorincz", "Andras", "" ] ]
cs/0303002
Applied Math
V. P. Maslov
About compression of vocabulary in computer oriented languages
Latex, 7 pages
null
null
null
cs.CL
null
The author uses the entropy of the ideal Bose-Einstein gas to minimize losses in computer-oriented languages.
[ { "version": "v1", "created": "Wed, 5 Mar 2003 08:50:42 GMT" }, { "version": "v2", "created": "Fri, 21 Mar 2003 12:34:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Maslov", "V. P.", "" ] ]
cs/0303003
Gianluca Argentini
Gianluca Argentini
A first approach for a possible cellular automaton model of fluids dynamics
7 pages, 6 figures, Computational Fluidodynamics, Cellular Automata model
null
null
null
cs.CC cs.DC nlin.CG physics.comp-ph
null
In this paper I present a first attempt for a possible description of fluids dynamics by mean of a cellular automata technique. With the use of simple and elementary rules, based on random behaviour either, the model permits to obtain the evolution in time for a two-dimensional grid, where one molecule of the material fluid can ideally place itself on a single geometric square. By mean of computational simulations, some realistic effects, here showed by use of digital pictures, have been obtained. In a subsequent step of this work I think to use a parallel program for a high performances computational simulation, for increasing the degree of realism of the digital rendering by mean of a three-dimensional grid too. For the execution of the simulations, numerical methods of resolution for differential equations have not been used.
[ { "version": "v1", "created": "Thu, 6 Mar 2003 00:02:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0303005
H. Ballhausen
H. Ballhausen
Fair Solution to the Reader-Writer-Problem with Semaphores only
2 pages
null
null
null
cs.DC
null
The reader-writer-problem is a standard problem in concurrent programming. A resource is shared by several processes which need either inclusive reading or exclusive writing access. The known solutions to this problem typically involve a number of global counters and queues. Here a very simple algorithm is presented which needs only two semaphores for synchronisation and no other global objects. The approach yields a fair solution without starving.
[ { "version": "v1", "created": "Sat, 8 Mar 2003 17:15:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Ballhausen", "H.", "" ] ]
cs/0303006
Carlos Gershenson
Carlos Gershenson
On the Notion of Cognition
6 pages, 2 figures
null
null
null
cs.AI
null
We discuss philosophical issues concerning the notion of cognition basing ourselves in experimental results in cognitive sciences, especially in computer simulations of cognitive systems. There have been debates on the "proper" approach for studying cognition, but we have realized that all approaches can be in theory equivalent. Different approaches model different properties of cognitive systems from different perspectives, so we can only learn from all of them. We also integrate ideas from several perspectives for enhancing the notion of cognition, such that it can contain other definitions of cognition as special cases. This allows us to propose a simple classification of different types of cognition.
[ { "version": "v1", "created": "Mon, 10 Mar 2003 18:20:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
cs/0303007
Victor Kromer
Kromer Victor
Glottochronology and problems of protolanguage reconstruction
17 pages, 9 figures. In Russian
null
null
null
cs.CL
null
A method of languages genealogical trees construction is proposed.
[ { "version": "v1", "created": "Fri, 14 Mar 2003 05:15:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Victor", "Kromer", "" ] ]
cs/0303008
Givi Bolotashvili
Givi Bolotashvili
Solution of the Linear Ordering Problem (NP=P)
null
null
null
null
cs.CC cs.DM
null
A polynomial algorithm is obtained for the NP-complete linear ordering problem.
[ { "version": "v1", "created": "Fri, 14 Mar 2003 13:53:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Bolotashvili", "Givi", "" ] ]
cs/0303009
Tomi Janhunen
T. Janhunen, I. Niemela, D. Seipel, P. Simons, J. You
Unfolding Partiality and Disjunctions in Stable Model Semantics
49 pages, 4 figures, 1 table
null
null
null
cs.AI
null
The paper studies an implementation methodology for partial and disjunctive stable models where partiality and disjunctions are unfolded from a logic program so that an implementation of stable models for normal (disjunction-free) programs can be used as the core inference engine. The unfolding is done in two separate steps. Firstly, it is shown that partial stable models can be captured by total stable models using a simple linear and modular program transformation. Hence, reasoning tasks concerning partial stable models can be solved using an implementation of total stable models. Disjunctive partial stable models have been lacking implementations which now become available as the translation handles also the disjunctive case. Secondly, it is shown how total stable models of disjunctive programs can be determined by computing stable models for normal programs. Hence, an implementation of stable models of normal programs can be used as a core engine for implementing disjunctive programs. The feasibility of the approach is demonstrated by constructing a system for computing stable models of disjunctive programs using the smodels system as the core engine. The performance of the resulting system is compared to that of dlv which is a state-of-the-art special purpose system for disjunctive programs.
[ { "version": "v1", "created": "Fri, 14 Mar 2003 14:29:32 GMT" }, { "version": "v2", "created": "Fri, 2 Jan 2004 14:27:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Janhunen", "T.", "" ], [ "Niemela", "I.", "" ], [ "Seipel", "D.", "" ], [ "Simons", "P.", "" ], [ "You", "J.", "" ] ]
cs/0303010
Neeraj Mittal
Neeraj Mittal and Vijay K. Garg
Techniques and Applications of Computation Slicing
50 pages, 14 figures
null
null
null
cs.DC cs.SE
null
Writing correct distributed programs is hard. In spite of extensive testing and debugging, software faults persist even in commercial grade software. Many distributed systems, especially those employed in safety-critical environments, should be able to operate properly even in the presence of software faults. Monitoring the execution of a distributed system, and, on detecting a fault, initiating the appropriate corrective action is an important way to tolerate such faults. This gives rise to the predicate detection problem which requires finding a consistent cut of a given computation that satisfies a given global predicate, if it exists. Detecting a predicate in a computation is, however, an NP-complete problem. To ameliorate the associated combinatorial explosion problem, we introduce the notion of computation slice. Formally, the slice of a computation with respect to a predicate is a (sub)computation with the least number of consistent cuts that contains all consistent cuts of the computation satisfying the predicate. To detect a predicate, rather than searching the state-space of the computation, it is much more efficient to search the state-space of the slice. We prove that the slice exists and is uniquely defined for all predicates. We present efficient slicing algorithms for several useful classes of predicates. We develop efficient heuristic algorithms for computing an approximate slice for predicates for which computing the slice is otherwise provably intractable. Our experimental results show that slicing can lead to an exponential improvement over existing techniques for predicate detection in terms of time and space.
[ { "version": "v1", "created": "Sat, 15 Mar 2003 07:41:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Mittal", "Neeraj", "" ], [ "Garg", "Vijay K.", "" ] ]
cs/0303011
Wim H. Hesselink
Hui Gao, Jan Friso Groote, Wim H. Hesselink
Lock-free dynamic hash tables with open addressing
null
Distributed Computing 17 (2005) 21-42
null
null
cs.DC cs.DS
null
We present an efficient lock-free algorithm for parallel accessible hash tables with open addressing, which promises more robust performance and reliability than conventional lock-based implementations. ``Lock-free'' means that it is guaranteed that always at least one process completes its operation within a bounded number of steps. For a single processor architecture our solution is as efficient as sequential hash tables. On a multiprocessor architecture this is also the case when all processors have comparable speeds. The algorithm allows processors that have widely different speeds or come to a halt. It can easily be implemented using C-like languages and requires on average only constant time for insertion, deletion or accessing of elements. The algorithm allows the hash tables to grow and shrink when needed. Lock-free algorithms are hard to design correctly, even when apparently straightforward. Ensuring the correctness of the design at the earliest possible stage is a major challenge in any responsible system development. In view of the complexity of the algorithm, we turned to the interactive theorem prover PVS for mechanical support. We employ standard deductive verification techniques to prove around 200 invariance properties of our algorithm, and describe how this is achieved with the theorem prover PVS.
[ { "version": "v1", "created": "Tue, 18 Mar 2003 09:38:34 GMT" }, { "version": "v2", "created": "Tue, 13 Apr 2004 09:05:30 GMT" }, { "version": "v3", "created": "Wed, 28 Jul 2004 12:51:56 GMT" }, { "version": "v4", "created": "Wed, 27 Oct 2004 07:24:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Gao", "Hui", "" ], [ "Groote", "Jan Friso", "" ], [ "Hesselink", "Wim H.", "" ] ]
cs/0303012
Andrei M. Sukhov
Dmitry Dolgikh, Andrei Sukhov
The measurements, parameters and construction of Web proxy cache
12 pages, 4 figures, 3 tables. Submitted to Compt. Comm
null
null
SSAU-02-13
cs.NI
null
The aim of this paper is an experimental study of cache systems in order to optimize proxy cache systems and to modernize construction principles. Our investigations lead to the criteria for the optimal use of storage capacity and allow the description of the basic effects of the ratio between construction parts, steady-state performance, optimal size, etc. We want to outline that the results obtained and the plan of the experiment follow from the theoretical model. Special consideration is given to the modification of the key formulas supposed by Wolman at al.
[ { "version": "v1", "created": "Tue, 18 Mar 2003 15:42:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Dolgikh", "Dmitry", "" ], [ "Sukhov", "Andrei", "" ] ]
cs/0303014
Andrei M. Sukhov
Dmitry Dolgikh, Andrei Sukhov
Theoretical study of cache syatems
17 pages, 5 figures, 1 tables. submitted to Ther. Com. Sc. A
null
null
SSAU-02-112
cs.NI
null
The aim of this paper is a theoretical study of a cache system in order to optimize proxy cache systems and to modernize construction principles including prefetching schemes. Two types of correlations, Zipf-like distribution and normalizing conditions, play a role of the fundamental laws. A corresponding system of equations allows to describe the basic effects like ratio between construction parts, steady-state performance, optimal size, long-term prefetching, etc. A modification of the fundamental laws leads to the description of new effects of documents' renewal in the global network. An internet traffic caching system based on Zipf-like distribution (ZBS) is invented. The additional module to the cache construction gives an effective prefetching by lifetime.
[ { "version": "v1", "created": "Tue, 18 Mar 2003 16:18:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Dolgikh", "Dmitry", "" ], [ "Sukhov", "Andrei", "" ] ]
cs/0303015
Nikolai Chernov
N. Chernov and C. Lesort
Statistical efficiency of curve fitting algorithms
17 pages, 3 figures
null
null
null
cs.CV
null
We study the problem of fitting parametrized curves to noisy data. Under certain assumptions (known as Cartesian and radial functional models), we derive asymptotic expressions for the bias and the covariance matrix of the parameter estimates. We also extend Kanatani's version of the Cramer-Rao lower bound, which he proved for unbiased estimates only, to more general estimates that include many popular algorithms (most notably, the orthogonal least squares and algebraic fits). We then show that the gradient-weighted algebraic fit is statistically efficient and describe all other statistically efficient algebraic fits.
[ { "version": "v1", "created": "Tue, 18 Mar 2003 21:30:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Chernov", "N.", "" ], [ "Lesort", "C.", "" ] ]
cs/0303016
Thomas Lippert
Thomas Duessel, Norbert Eicker, Florin Isaila, Thomas Lippert, Thomas Moschny, Hartmut Neff, Klaus Schilling, Walter Tichy
Fast Parallel I/O on Cluster Computers
22 pages, 10 figures
null
null
null
cs.DC cs.AR hep-lat
null
Today's cluster computers suffer from slow I/O, which slows down I/O-intensive applications. We show that fast disk I/O can be achieved by operating a parallel file system over fast networks such as Myrinet or Gigabit Ethernet. In this paper, we demonstrate how the ParaStation3 communication system helps speed-up the performance of parallel I/O on clusters using the open source parallel virtual file system (PVFS) as testbed and production system. We will describe the set-up of PVFS on the Alpha-Linux-Cluster-Engine (ALiCE) located at Wuppertal University, Germany. Benchmarks on ALiCE achieve write-performances of up to 1 GB/s from a 32-processor compute-partition to a 32-processor PVFS I/O-partition, outperforming known benchmark results for PVFS on the same network by more than a factor of 2. Read-performance from buffer-cache reaches up to 2.2 GB/s. Our benchmarks are giant, I/O-intensive eigenmode problems from lattice quantum chromodynamics, demonstrating stability and performance of PVFS over Parastation in large-scale production runs.
[ { "version": "v1", "created": "Wed, 19 Mar 2003 11:08:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Duessel", "Thomas", "" ], [ "Eicker", "Norbert", "" ], [ "Isaila", "Florin", "" ], [ "Lippert", "Thomas", "" ], [ "Moschny", "Thomas", "" ], [ "Neff", "Hartmut", "" ], [ "Schilling", "Klaus", "" ], [ "Tichy", "Walter", "" ] ]
cs/0303017
Petro M. Gopych
Petro M. Gopych
A Neural Network Assembly Memory Model with Maximum-Likelihood Recall and Recognition Properties
A report presented at the Vth International Congress on Mathematical Modeling held in Dubna, Russia on September 30 - October 6, 2002 (Book of Abstracts, vol. 2. p. 91), 39 pages, 5 Figures, 1 Table, 70 references
null
null
null
cs.AI cs.IR cs.NE q-bio.NC q-bio.QM
null
It has been shown that a neural network model recently proposed to describe basic memory performance is based on a ternary/binary coding/decoding algorithm which leads to a new neural network assembly memory model (NNAMM) providing maximum-likelihood recall/recognition properties and implying a new memory unit architecture with Hopfield two-layer network, N-channel time gate, auxiliary reference memory, and two nested feedback loops. For the data coding used, conditions are found under which a version of Hopfied network implements maximum-likelihood convolutional decoding algorithm and, simultaneously, linear statistical classifier of arbitrary binary vectors with respect to Hamming distance between vector analyzed and reference vector given. In addition to basic memory performance and etc, the model explicitly describes the dependence on time of memory trace retrieval, gives a possibility of one-trial learning, metamemory simulation, generalized knowledge representation, and distinct description of conscious and unconscious mental processes. It has been shown that an assembly memory unit may be viewed as a model of a smallest inseparable part or an 'atom' of consciousness. Some nontraditional neurobiological backgrounds (dynamic spatiotemporal synchrony, properties of time dependent and error detector neurons, early precise spike firing, etc) and the model's application to solve some interdisciplinary problems from different scientific fields are discussed.
[ { "version": "v1", "created": "Wed, 19 Mar 2003 23:17:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Gopych", "Petro M.", "" ] ]
cs/0303018
Hedvig Sidenbladh
Hedvig Sidenbladh
Multi-target particle filtering for the probability hypothesis density
Submitted to International Conference on Information Fusion 2003
null
null
null
cs.AI
null
When tracking a large number of targets, it is often computationally expensive to represent the full joint distribution over target states. In cases where the targets move independently, each target can instead be tracked with a separate filter. However, this leads to a model-data association problem. Another approach to solve the problem with computational complexity is to track only the first moment of the joint distribution, the probability hypothesis density (PHD). The integral of this distribution over any area S is the expected number of targets within S. Since no record of object identity is kept, the model-data association problem is avoided. The contribution of this paper is a particle filter implementation of the PHD filter mentioned above. This PHD particle filter is applied to tracking of multiple vehicles in terrain, a non-linear tracking problem. Experiments show that the filter can track a changing number of vehicles robustly, achieving near-real-time performance.
[ { "version": "v1", "created": "Thu, 20 Mar 2003 13:48:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidenbladh", "Hedvig", "" ] ]
cs/0303019
Sebastien Jodogne
Bernard Boigelot, Sebastien Jodogne and Pierre Wolper
An Effective Decision Procedure for Linear Arithmetic with Integer and Real Variables
20 pages, 6 figures
null
null
null
cs.LO
null
This paper considers finite-automata based algorithms for handling linear arithmetic with both real and integer variables. Previous work has shown that this theory can be dealt with by using finite automata on infinite words, but this involves some difficult and delicate to implement algorithms. The contribution of this paper is to show, using topological arguments, that only a restricted class of automata on infinite words are necessary for handling real and integer linear arithmetic. This allows the use of substantially simpler algorithms, which have been successfully implemented.
[ { "version": "v1", "created": "Thu, 20 Mar 2003 17:05:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Boigelot", "Bernard", "" ], [ "Jodogne", "Sebastien", "" ], [ "Wolper", "Pierre", "" ] ]
cs/0303020
Jeffrey B. Smith
Jeffrey B. Smith
Complex Systems
14 pages
null
null
null
cs.NI
null
The study of Complex Systems is considered by many to be a new scientific field, and is distinguished by being a discipline that has applications within many separate areas of scientific study. The study of Neural Networks, Traffic Patterns, Artificial Intelligence, Social Systems, and many other scientific areas can all be considered to fall within the realm of Complex Systems, and can be studied from this new perspective. The advent of more capable computer systems has allowed these systems to be simulated and modeled with far greater ease, and new understanding of computer modeling approaches has allowed the fledgling science to be studied as never before. The preliminary focus of this paper will be to provide a general overview of the science of Complex Systems, including terminology, definitions, history, and examples. I will attempt to look at some of the most important trends in different areas of research, and give a general overview of research methods that have been used in parallel with computer modeling. Also, I will further define the areas of the science that concern themselves with computer modeling and simulation, and I will attempt to make it clear why the science only came into its own when the proper modeling and simulation tools were finally available. In addition, although there seems to be general agreement between different authors and institutes regarding the generalities of the study, there are some differences in terminology and methodology. I have attempted in this paper to bring as many elements together as possible, as far as the scope of the subject is concerned, without losing focus by studying Complex System techniques that are bound to one particular area of scientific study, unless that area is that of computer modeling.
[ { "version": "v1", "created": "Thu, 20 Mar 2003 18:11:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Smith", "Jeffrey B.", "" ] ]
cs/0303021
Ke Xu
Wei Li
A Development Calculus for Specifications
14 pages with some minor errors in the original version corrected
null
null
null
cs.LO cs.PL
null
A first order inference system, called R-calculus, is defined to develop the specifications. It is used to eliminate the laws which is not consistent with the user's requirements. The R-calculus consists of the structural rules, an axiom, a cut rule, and the rules for logical connectives. Some examples are given to demonstrate the usage of the R-calculus. The properties about reachability and completeness of the R-calculus are formally defined and are proved.
[ { "version": "v1", "created": "Fri, 21 Mar 2003 08:23:33 GMT" }, { "version": "v2", "created": "Wed, 2 Apr 2003 09:54:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Wei", "" ] ]
cs/0303022
Jean-Camille Birget
Dawei Hong, Jean-Camille Birget, Shushuang Man
Probabilistic behavior of hash tables
null
null
null
null
cs.DS cs.DB
null
We extend a result of Goldreich and Ron about estimating the collision probability of a hash function. Their estimate has a polynomial tail. We prove that when the load factor is greater than a certain constant, the estimator has a gaussian tail. As an application we find an estimate of an upper bound for the average search time in hashing with chaining, for a particular user (we allow the overall key distribution to be different from the key distribution of a particular user). The estimator has a gaussian tail.
[ { "version": "v1", "created": "Fri, 21 Mar 2003 17:25:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Hong", "Dawei", "" ], [ "Birget", "Jean-Camille", "" ], [ "Man", "Shushuang", "" ] ]
cs/0303023
Carlos Gershenson
A. Das, G. Mayer-Kress, C. Gershenson, P. Das
Conferences with Internet Web-Casting as Binding Events in a Global Brain: Example Data From Complexity Digest
4 pages, 4 figures
null
null
null
cs.NI cs.AI
null
There is likeness of the Internet to human brains which has led to the metaphor of the world-wide computer network as a `Global Brain'. We consider conferences as 'binding events' in the Global Brain that can lead to metacognitive structures on a global scale. One of the critical factors for that phenomenon to happen (similar to the biological brain) are the time-scales characteristic for the information exchange. In an electronic newsletter- the Complexity Digest (ComDig) we include webcasting of audio (mp3) and video (asf) files from international conferences in the weekly ComDig issues. Here we present the time variation of the weekly rate of accesses to the conference files. From those empirical data it appears that the characteristic time-scales related to access of web-casting files is of the order of a few weeks. This is at least an order of magnitude shorter than the characteristic time-scales of peer reviewed publications and conference proceedings. We predict that this observation will have profound implications on the nature of future conference proceedings, presumably in electronic form.
[ { "version": "v1", "created": "Sat, 22 Mar 2003 13:13:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Das", "A.", "" ], [ "Mayer-Kress", "G.", "" ], [ "Gershenson", "C.", "" ], [ "Das", "P.", "" ] ]
cs/0303024
R. Andrew Hicks
R. Andrew Hicks
Differential Methods in Catadioptric Sensor Design with Applications to Panoramic Imaging
8 pages, 7 figures
null
null
null
cs.CV cs.RO
null
We discuss design techniques for catadioptric sensors that realize given projections. In general, these problems do not have solutions, but approximate solutions may often be found that are visually acceptable. There are several methods to approach this problem, but here we focus on what we call the ``vector field approach''. An application is given where a true panoramic mirror is derived, i.e. a mirror that yields a cylindrical projection to the viewer without any digital unwarping.
[ { "version": "v1", "created": "Mon, 24 Mar 2003 02:36:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Hicks", "R. Andrew", "" ] ]
cs/0303026
Petros Maniatis
Petros Maniatis, Mema Roussopoulos, TJ Giuli, David S. H. Rosenthal, Mary Baker, Yanto Muliadi
Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS
25 Pages, 10 figures. Extended version of conference paper
null
null
null
cs.DC cs.DL
null
The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based on this experience, we present a design for and simulations of a novel protocol for voting in systems of this kind. It incorporates rate limitation and intrusion detection to ensure that even some very powerful adversaries attacking over many years have only a small probability of causing irrecoverable damage before being detected.
[ { "version": "v1", "created": "Tue, 25 Mar 2003 20:11:57 GMT" }, { "version": "v2", "created": "Thu, 27 Mar 2003 02:42:17 GMT" }, { "version": "v3", "created": "Fri, 17 Oct 2003 04:00:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Maniatis", "Petros", "" ], [ "Roussopoulos", "Mema", "" ], [ "Giuli", "TJ", "" ], [ "Rosenthal", "David S. H.", "" ], [ "Baker", "Mary", "" ], [ "Muliadi", "Yanto", "" ] ]
cs/0303027
Fang Yu
Farn Wang, Geng-Dian Hwang and Fang Yu
Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems
27 pages
null
null
null
cs.SE cs.SC
null
Three numerical coverage metrics for the symbolic simulation of dense-time systems and their estimation methods are presented. Special techniques to derive numerical estimations of dense-time state-spaces have also been developed. Properties of the metrics are also discussed with respect to four criteria. Implementation and experiments are then reported.
[ { "version": "v1", "created": "Tue, 25 Mar 2003 21:57:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Farn", "" ], [ "Hwang", "Geng-Dian", "" ], [ "Yu", "Fang", "" ] ]
cs/0303028
Shi Zhou
Shi Zhou and Raul J. Mondragon
The missing links in the BGP-based AS connectivity maps
PAM2003 - The Passive and Active Measurement Workshop(http://www.pam2003.org), San Diego, USA, April 2003
null
null
null
cs.NI
null
A number of recent studies of the Internet topology at the autonomous systems level (AS graph) are based on the BGP-based AS connectivity maps (original maps). The so-called extended maps use additional data sources and contain more complete pictures of the AS graph. In this paper, we compare an original map, an extended map and a synthetic map generated by the Barabasi-Albert model. We examine the recently reported rich-club phenomenon, alternative routing paths and attack tolerance. We point out that the majority of the missing links of the original maps are the connecting links between rich nodes (nodes with large numbers of links) of the extended maps. We show that the missing links are relevant because links between rich nodes can be crucial for the network structure.
[ { "version": "v1", "created": "Wed, 26 Mar 2003 12:03:53 GMT" }, { "version": "v2", "created": "Tue, 1 Apr 2003 14:46:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Shi", "" ], [ "Mondragon", "Raul J.", "" ] ]
cs/0303030
Shi Zhou
Shi Zhou, Raul J. Mondragon
Analyzing and modelling the AS-level Internet topology
To be appeared in proceedings of the HET-NETs' 03 (First International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks), York, UK, July 2003
null
null
null
cs.NI
null
Recently we introduced the rich-club phenomenon as a quantitative metric to characterize the tier structure of the Autonomous Systems level Internet topology (AS graph) and we proposed the Interactive Growth (IG) model, which closely matches the degree distribution and hierarchical structure of the AS graph and compares favourble with other available Internet power-law topology generators. Our research was based on the widely used BGP AS graph obtained from the Oregon BGP routing tables. Researchers argue that Traceroute AS graph, extracted from the traceroute data collected by the CAIDA's active probing tool, Skitter, is more complete and reliable. To be prudent, in this paper we analyze and compare topological structures of Traceroute AS graph and BGP AS graph. Also we compare with two synthetic Internet topologies generated by the IG model and the well-known Barabasi-Albert (BA) model. Result shows that both AS graphs show the rich-club phenomenon and have similar tier structures, which are closely matched by the IG model, however the BA model does not show the rich-club phenomenon at all.
[ { "version": "v1", "created": "Wed, 26 Mar 2003 12:31:13 GMT" }, { "version": "v2", "created": "Tue, 1 Apr 2003 14:45:05 GMT" }, { "version": "v3", "created": "Wed, 18 Jun 2003 11:37:31 GMT" }, { "version": "v4", "created": "Mon, 30 Jun 2003 16:04:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Shi", "" ], [ "Mondragon", "Raul J.", "" ] ]
cs/0303031
Massimo Di Pierro
Massimo Di Pierro
A Bird's eye view of Matrix Distributed Processing
null
Proceedings of the ICCSA 2003 Conference
null
null
cs.DC cs.CE cs.DM cs.MS hep-lat physics.comp-ph
null
We present Matrix Distributed Processing, a C++ library for fast development of efficient parallel algorithms. MDP is based on MPI and consists of a collection of C++ classes and functions such as lattice, site and field. Once an algorithm is written using these components the algorithm is automatically parallel and no explicit call to communication functions is required. MDP is particularly suitable for implementing parallel solvers for multi-dimensional differential equations and mesh-like problems.
[ { "version": "v1", "created": "Fri, 28 Mar 2003 20:47:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Di Pierro", "Massimo", "" ] ]