id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0212055 | Shafi Goldwasser | Shafi Goldwasser | Mathematical foundations of modern cryptography: computational
complexity perspective | null | Proceedings of the ICM, Beijing 2002, vol. 1, 245--272 | null | ICM-2002 | cs.CR cs.CC | null | Theoretical computer science has found fertile ground in many areas of
mathematics. The approach has been to consider classical problems through the
prism of computational complexity, where the number of basic computational
steps taken to solve a problem is the crucial qualitative parameter. This new
approach has led to a sequence of advances, in setting and solving new
mathematical challenges as well as in harnessing discrete mathematics to the
task of solving real-world problems.
In this talk, I will survey the development of modern cryptography -- the
mathematics behind secret communications and protocols -- in this light. I will
describe the complexity theoretic foundations underlying the cryptographic
tasks of encryption, pseudo-randomness number generators and functions, zero
knowledge interactive proofs, and multi-party secure protocols. I will attempt
to highlight the paradigms and proof techniques which unify these foundations,
and which have made their way into the mainstream of complexity theory.
| [
{
"version": "v1",
"created": "Sun, 1 Dec 2002 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldwasser",
"Shafi",
""
]
] |
cs/0212056 | Shafi Goldwasser | Shafi Goldwasser | On the Work of Madhu Sudan: the 2002 Nevalinna Prize Winner | null | Proceedings of the ICM, Beijing 2002, vol. 1, 105--115 | null | ICM-2002 | cs.CC | null | Madhu Sudan's work spans many areas of computer science theory including
computational complexity theory, the design of efficient algorithms,
algorithmic coding theory, and the theory of program checking and correcting.
Two results of Sudan stand out in the impact they have had on the mathematics
of computation. The first work shows a probabilistic characterization of the
class NP -- those sets for which short and easily checkable proofs of
membership exist, and demonstrates consequences of this characterization to
classifying the complexity of approximation problems. The second work shows a
polynomial time algorithm for list decoding the Reed Solomon error correcting
codes.
This short note will be devoted to describing Sudan's work on
probabilistically checkable proofs -- the so called {\it PCP theorem} and its
implications.
| [
{
"version": "v1",
"created": "Sun, 1 Dec 2002 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldwasser",
"Shafi",
""
]
] |
cs/0301001 | Nikolai Chernov | N. Chernov and C. Lesort | Least squares fitting of circles and lines | 26 pages, 14 figures, submitted | null | null | null | cs.CV | null | We study theoretical and computational aspects of the least squares fit (LSF)
of circles and circular arcs. First we discuss the existence and uniqueness of
LSF and various parametrization schemes. Then we evaluate several popular
circle fitting algorithms and propose a new one that surpasses the existing
methods in reliability. We also discuss and compare direct (algebraic) circle
fits.
| [
{
"version": "v1",
"created": "Wed, 1 Jan 2003 19:58:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chernov",
"N.",
""
],
[
"Lesort",
"C.",
""
]
] |
cs/0301002 | Mark J. Kilgard | Cass Everitt, Mark J. Kilgard | Practical and Robust Stenciled Shadow Volumes for Hardware-Accelerated
Rendering | 8 pages, 5 figures | null | null | null | cs.GR cs.CG | null | Twenty-five years ago, Crow published the shadow volume approach for
determining shadowed regions in a scene. A decade ago, Heidmann described a
hardware-accelerated stencil buffer-based shadow volume algorithm.
Unfortunately hardware-accelerated stenciled shadow volume techniques have
not been widely adopted by 3D games and applications due in large part to the
lack of robustness of described techniques. This situation persists despite
widely available hardware support. Specifically what has been lacking is a
technique that robustly handles various "hard" situations created by near or
far plane clipping of shadow volumes.
We describe a robust, artifact-free technique for hardware-accelerated
rendering of stenciled shadow volumes. Assuming existing hardware, we resolve
the issues otherwise caused by shadow volume near and far plane clipping
through a combination of (1) placing the conventional far clip plane "at
infinity", (2) rasterization with infinite shadow volume polygons via
homogeneous coordinates, and (3) adopting a zfail stencil-testing scheme. Depth
clamping, a new rasterization feature provided by NVIDIA's GeForce3, preserves
existing depth precision by not requiring the far plane to be placed at
infinity. We also propose two-sided stencil testing to improve the efficiency
of rendering stenciled shadow volumes.
| [
{
"version": "v1",
"created": "Mon, 6 Jan 2003 20:57:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Everitt",
"Cass",
""
],
[
"Kilgard",
"Mark J.",
""
]
] |
cs/0301003 | Danny Hong | Alexandros Eleftheriadis and Danny Hong | Flavor: A Language for Media Representation | 20 pages and 15 figures | null | null | null | cs.PL | null | Flavor (Formal Language for Audio-Visual Object Representation) has been
created as a language for describing coded multimedia bitstreams in a formal
way so that the code for reading and writing bitstreams can be automatically
generated. It is an extension of C++ and Java, in which the typing system
incorporates bitstream representation semantics. This allows describing in a
single place both the in-memory representation of data as well as their
bitstream-level (compressed) representation. Flavor also comes with a
translator that automatically generates standard C++ or Java code from the
Flavor source code so that direct access to compressed multimedia information
by application developers can be achieved with essentially zero programming.
Flavor has gone through many enhancements and this paper fully describes the
latest version of the language and the translator. The software has been made
into an open source project as of Version 4.1, and the latest downloadable
Flavor package is available at http://flavor.sourceforge.net.
| [
{
"version": "v1",
"created": "Tue, 7 Jan 2003 07:53:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eleftheriadis",
"Alexandros",
""
],
[
"Hong",
"Danny",
""
]
] |
cs/0301004 | Vince Grolmusz | Vince Grolmusz | Near Quadratic Matrix Multiplication Modulo Composites | Prelimanary version, 6 pages | null | null | null | cs.CC cs.DM | null | We show how one can use non-prime-power, composite moduli for computing
representations of the product of two $n\times n$ matrices using only
$n^{2+o(1)}$ multiplications.
| [
{
"version": "v1",
"created": "Wed, 8 Jan 2003 14:35:25 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jan 2003 09:15:45 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Feb 2003 15:31:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grolmusz",
"Vince",
""
]
] |
cs/0301005 | Ganesh Ramakrishnan | R. Ganesh, B.Kaushik, R.Sadhu | Modelling Delay Jitter in Voice over IP | null | null | null | null | cs.PF | null | It has been suggested in voice over IP that an appropriate choice of the
distribution used in modeling the delay jitters, can improve the play-out
algorithm. In this paper, we propose a tool using which, one can determine, at
a given instance, which distribution model best explains the jitter
distribution. This is done using Expectation Maximization, to choose amongst
possible distribution models which include, the i.i.d exponential distribution,
the gamma distribution etc.
| [
{
"version": "v1",
"created": "Thu, 9 Jan 2003 05:46:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ganesh",
"R.",
""
],
[
"Kaushik",
"B.",
""
],
[
"Sadhu",
"R.",
""
]
] |
cs/0301006 | Balint Takacs | Balint Takacs, Istvan Szita, Andras Lorincz | Temporal plannability by variance of the episode length | null | null | null | null | cs.AI | null | Optimization of decision problems in stochastic environments is usually
concerned with maximizing the probability of achieving the goal and minimizing
the expected episode length. For interacting agents in time-critical
applications, learning of the possibility of scheduling of subtasks (events) or
the full task is an additional relevant issue. Besides, there exist highly
stochastic problems where the actual trajectories show great variety from
episode to episode, but completing the task takes almost the same amount of
time. The identification of sub-problems of this nature may promote e.g.,
planning, scheduling and segmenting Markov decision processes. In this work,
formulae for the average duration as well as the standard deviation of the
duration of events are derived. The emerging Bellman-type equation is a simple
extension of Sobel's work (1982). Methods of dynamic programming as well as
methods of reinforcement learning can be applied for our extension. Computer
demonstration on a toy problem serve to highlight the principle.
| [
{
"version": "v1",
"created": "Thu, 9 Jan 2003 12:39:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Takacs",
"Balint",
""
],
[
"Szita",
"Istvan",
""
],
[
"Lorincz",
"Andras",
""
]
] |
cs/0301007 | Istvan szita | Istvan Szita, Andras Lorincz | Kalman filter control in the reinforcement learning framework | 4 pages | null | null | null | cs.LG cs.AI | null | There is a growing interest in using Kalman-filter models in brain modelling.
In turn, it is of considerable importance to make Kalman-filters amenable for
reinforcement learning. In the usual formulation of optimal control it is
computed off-line by solving a backward recursion. In this technical note we
show that slight modification of the linear-quadratic-Gaussian Kalman-filter
model allows the on-line estimation of optimal control and makes the bridge to
reinforcement learning. Moreover, the learning rule for value estimation
assumes a Hebbian form weighted by the error of the value estimation.
| [
{
"version": "v1",
"created": "Thu, 9 Jan 2003 15:08:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szita",
"Istvan",
""
],
[
"Lorincz",
"Andras",
""
]
] |
cs/0301008 | Pascal Hitzler | Pascal Hitzler and Matthias Wendt (Artificial Intelligence Institute,
Dresden University of Technology) | Formal Concept Analysis and Resolution in Algebraic Domains | 14 pages. We have rewritten the old version according to the
suggestions of some referees. The results are the same. The presentation is
completely different | null | null | null | cs.LO cs.AI | null | We relate two formerly independent areas: Formal concept analysis and logic
of domains. We will establish a correspondene between contextual attribute
logic on formal contexts resp. concept lattices and a clausal logic on coherent
algebraic cpos. We show how to identify the notion of formal concept in the
domain theoretic setting. In particular, we show that a special instance of the
resolution rule from the domain logic coincides with the concept closure
operator from formal concept analysis. The results shed light on the use of
contexts and domains for knowledge representation and reasoning purposes.
| [
{
"version": "v1",
"created": "Thu, 9 Jan 2003 23:37:57 GMT"
},
{
"version": "v2",
"created": "Thu, 1 May 2003 16:16:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hitzler",
"Pascal",
"",
"Artificial Intelligence Institute,\n Dresden University of Technology"
],
[
"Wendt",
"Matthias",
"",
"Artificial Intelligence Institute,\n Dresden University of Technology"
]
] |
cs/0301009 | Qingguo Zheng | Qingguo Zheng | A Script Language for Data Integration in Database | 9 pages | null | null | Report:9-1-1999 | cs.DB | null | A Script Language in this paper is designed to transform the original data
into the target data by the computing formula. The Script Language can be
translated into the corresponding SQL Language, and the computation is finally
implemented by the first type of dynamic SQL. The Script Language has the
operations of insert, update, delete, union, intersect, and minus for the table
in the database.The Script Language is edited by a text file and you can easily
modify the computing formula in the text file to deal with the situations when
the computing formula have been changed. So you only need modify the text of
the script language, but needn't change the programs that have complied.
| [
{
"version": "v1",
"created": "Mon, 13 Jan 2003 05:34:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zheng",
"Qingguo",
""
]
] |
cs/0301010 | Kewen Wang | Kewen Wang, Lizhu Zhou | Comparisons and Computation of Well-founded Semantics for Disjunctive
Logic Programs | 31 pages | null | null | null | cs.AI | null | Much work has been done on extending the well-founded semantics to general
disjunctive logic programs and various approaches have been proposed. However,
these semantics are different from each other and no consensus is reached about
which semantics is the most intended. In this paper we look at disjunctive
well-founded reasoning from different angles. We show that there is an
intuitive form of the well-founded reasoning in disjunctive logic programming
which can be characterized by slightly modifying some exisitng approaches to
defining disjunctive well-founded semantics, including program transformations,
argumentation, unfounded sets (and resolution-like procedure). We also provide
a bottom-up procedure for this semantics. The significance of our work is not
only in clarifying the relationship among different approaches, but also shed
some light on what is an intended well-founded semantics for disjunctive logic
programs.
| [
{
"version": "v1",
"created": "Tue, 14 Jan 2003 08:14:43 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Jan 2003 01:10:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Kewen",
""
],
[
"Zhou",
"Lizhu",
""
]
] |
cs/0301011 | Michael J. O'Donnell | Michael J. O'Donnell | Open Network Handles Implemented in DNS | Internet Draft draft-odonnell-onhs-imp-dns-00.txt, 5 September 2002 | null | null | null | cs.NI | null | An Open Network Handle System (ONHS) provides an intermediate level of
service between IP numbers and domain names. A handle adheres permanently to an
owner, who may assign and reassign it to different addresses at will. But a
handle is a number, carrying no significance in natural language. Any user
desiring a handle may generate one from a public key. This memo describes a
simple implementation of an Open Network Handle System using the security
extensions to the Domain Name System (DNSSEC).
| [
{
"version": "v1",
"created": "Tue, 14 Jan 2003 21:37:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Donnell",
"Michael J.",
""
]
] |
cs/0301012 | Sergey I. Nikolenko | Sergey I. Nikolenko | Hard satisfiable formulas for DPLL-type algorithms | 9 pages | null | null | null | cs.CC | null | We address lower bounds on the time complexity of algorithms solving the
propositional satisfiability problem. Namely, we consider two DPLL-type
algorithms, enhanced with the unit clause and pure literal heuristics.
Exponential lower bounds for solving satisfiability on provably satisfiable
formulas are proven.
| [
{
"version": "v1",
"created": "Wed, 15 Jan 2003 08:44:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nikolenko",
"Sergey I.",
""
]
] |
cs/0301013 | Steve Kautz | S. M. Kautz | Independence Properties of Algorithmically Random Sequences | 20 pages | null | null | null | cs.CC | null | A bounded Kolmogorov-Loveland selection rule is an adaptive strategy for
recursively selecting a subsequence of an infinite binary sequence; such a
subsequence may be interpreted as the query sequence of a time-bounded Turing
machine. In this paper we show that if A is an algorithmically random sequence,
A_0 is selected from A via a bounded Kolmogorov-Loveland selection rule, and
A_1 denotes the sequence of nonselected bits of A, then A_1 is independent of
A_0; that is, A_1 is algorithmically random relative to A_0. This result has
been used by Kautz and Miltersen [1] to show that relative to a random oracle,
NP does not have p-measure zero (in the sense of Lutz [2]).
[1] S. M. Kautz and P. B. Miltersen. Relative to a random oracle, NP is not
small. Journal of Computer and System Sciences, 53:235-250, 1996.
[2] J. H. Lutz. Almost everywhere high nonuniform complexity. Journal of
Computer and System Sciences, 44:220-258, 1992.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2003 02:56:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kautz",
"S. M.",
""
]
] |
cs/0301015 | Giorgio Parisi | Giorgio Parisi | Some remarks on the survey decimation algorithm for K-satisfiability | null | null | null | null | cs.CC cond-mat.dis-nn cs.DS | null | In this note we study the convergence of the survey decimation algorithm. An
analytic formula for the reduction of the complexity during the decimation is
derived. The limit of the converge of the algorithm are estimated in the random
case: interesting phenomena appear near the boundary of convergence.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2003 10:38:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Parisi",
"Giorgio",
""
]
] |
cs/0301016 | Martin Lotz | Peter Buergisser and Martin Lotz | Lower Bounds on the Bounded Coefficient Complexity of Bilinear Maps | 19 pages | null | null | null | cs.CC | null | We prove lower bounds of order $n\log n$ for both the problem to multiply
polynomials of degree $n$, and to divide polynomials with remainder, in the
model of bounded coefficient arithmetic circuits over the complex numbers.
These lower bounds are optimal up to order of magnitude. The proof uses a
recent idea of R. Raz [Proc. 34th STOC 2002] proposed for matrix
multiplication. It reduces the linear problem to multiply a random circulant
matrix with a vector to the bilinear problem of cyclic convolution. We treat
the arising linear problem by extending J. Morgenstern's bound [J. ACM 20, pp.
305-306, 1973] in a unitarily invariant way. This establishes a new lower bound
on the bounded coefficient complexity of linear forms in terms of the singular
values of the corresponding matrix. In addition, we extend these lower bounds
for linear and bilinear maps to a model of circuits that allows a restricted
number of unbounded scalar multiplications.
| [
{
"version": "v1",
"created": "Thu, 16 Jan 2003 15:36:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buergisser",
"Peter",
""
],
[
"Lotz",
"Martin",
""
]
] |
cs/0301017 | Millist W. Vincent | Millist W. Vincent and Jixue Liu | Completeness and Decidability Properties for Functional Dependencies in
XML | null | null | null | null | cs.DB | null | XML is of great importance in information storage and retrieval because of
its recent emergence as a standard for data representation and interchange on
the Internet. However XML provides little semantic content and as a result
several papers have addressed the topic of how to improve the semantic
expressiveness of XML. Among the most important of these approaches has been
that of defining integrity constraints in XML. In a companion paper we defined
strong functional dependencies in XML(XFDs). We also presented a set of axioms
for reasoning about the implication of XFDs and showed that the axiom system is
sound for arbitrary XFDs. In this paper we prove that the axioms are also
complete for unary XFDs (XFDs with a single path on the l.h.s.). The second
contribution of the paper is to prove that the implication problem for unary
XFDs is decidable and to provide a linear time algorithm for it.
| [
{
"version": "v1",
"created": "Mon, 20 Jan 2003 00:13:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vincent",
"Millist W.",
""
],
[
"Liu",
"Jixue",
""
]
] |
cs/0301018 | Naren Ramakrishnan | Srinidhi Varadarajan and Naren Ramakrishnan | Novel Runtime Systems Support for Adaptive Compositional Modeling on the
Grid | null | null | null | null | cs.CE cs.DC | null | Grid infrastructures and computing environments have progressed significantly
in the past few years. The vision of truly seamless Grid usage relies on
runtime systems support that is cognizant of the operational issues underlying
grid computations and, at the same time, is flexible enough to accommodate
diverse application scenarios. This paper addresses the twin aspects of Grid
infrastructure and application support through a novel combination of two
computational technologies: Weaves - a source-language independent parallel
runtime compositional framework that operates through reverse-analysis of
compiled object files, and runtime recommender systems that aid in dynamic
knowledge-based application composition. Domain-specific adaptivity is
exploited through a novel compositional system that supports runtime
recommendation of code modules and a sophisticated checkpointing and runtime
migration solution that can be transparently deployed over Grid
infrastructures. A core set of "adaptivity schemas" are provided as templates
for adaptive composition of large-scale scientific computations. Implementation
issues, motivating application contexts, and preliminary results are described.
| [
{
"version": "v1",
"created": "Tue, 21 Jan 2003 02:26:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Varadarajan",
"Srinidhi",
""
],
[
"Ramakrishnan",
"Naren",
""
]
] |
cs/0301019 | Daniel A. Spielman | Daniel A. Spielman and Shang-Hua Teng | Smoothed Analysis of Interior-Point Algorithms: Termination | to be presented at the 2003 International Symposium on Mathematical
Programming | null | null | null | cs.DS | null | We perform a smoothed analysis of the termination phase of an interior-point
method. By combining this analysis with the smoothed analysis of Renegar's
interior-point algorithm by Dunagan, Spielman and Teng, we show that the
smoothed complexity of an interior-point algorithm for linear programming is $O
(m^{3} \log (m/\sigma))$. In contrast, the best known bound on the worst-case
complexity of linear programming is $O (m^{3} L)$, where $L$ could be as large
as $m$. We include an introduction to smoothed analysis and a tutorial on proof
techniques that have been useful in smoothed analyses.
| [
{
"version": "v1",
"created": "Tue, 21 Jan 2003 17:47:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Spielman",
"Daniel A.",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
cs/0301020 | Vivolo | P. Dusart, G. Letourneux, O. Vivolo | Differential Fault Analysis on A.E.S | 10 pages | null | null | null | cs.CR | null | We explain how a differential fault analysis (DFA) works on AES 128, 192 or
256 bits.
| [
{
"version": "v1",
"created": "Tue, 21 Jan 2003 20:19:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dusart",
"P.",
""
],
[
"Letourneux",
"G.",
""
],
[
"Vivolo",
"O.",
""
]
] |
cs/0301021 | Sostenes Lins | Lauro Lins, Sostenes Lins and Silvio Melo | PHORMA: Perfectly Hashable Order Restricted Multidimensional Arrays | 12 pages, 4 figures, 2 tables. Revised version. Submitted to Discrete
Applied Mathematics | null | null | null | cs.DS | null | In this paper we propose a simple and efficient data structure yielding a
perfect hashing of quite general arrays. The data structure is named phorma,
which is an acronym for perfectly hashable order restricted multidimensional
array.
Keywords: Perfect hash function, Digraph, Implicit enumeration,
Nijenhuis-Wilf combinatorial family.
| [
{
"version": "v1",
"created": "Tue, 21 Jan 2003 23:55:17 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Mar 2003 16:33:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lins",
"Lauro",
""
],
[
"Lins",
"Sostenes",
""
],
[
"Melo",
"Silvio",
""
]
] |
cs/0301022 | Ponomarenko | Dima Grigoriev and Ilia Ponomarenko | Homomorphic public-key cryptosystems and encrypting boolean circuits | null | null | null | null | cs.CR | null | In this paper homomorphic cryptosystems are designed for the first time over
any finite group. Applying Barrington's construction we produce for any boolean
circuit of the logarithmic depth its encrypted simulation of a polynomial size
over an appropriate finitely generated group.
| [
{
"version": "v1",
"created": "Wed, 22 Jan 2003 08:49:17 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Feb 2003 07:38:36 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Feb 2003 06:21:43 GMT"
},
{
"version": "v4",
"created": "Fri, 28 Feb 2003 06:23:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grigoriev",
"Dima",
""
],
[
"Ponomarenko",
"Ilia",
""
]
] |
cs/0301023 | T. Schaub | Torsten Schaub and Kewen Wang | A semantic framework for preference handling in answer set programming | 39 pages. To appear in Theory and Practice of Logic Programming | null | null | null | cs.AI | null | We provide a semantic framework for preference handling in answer set
programming. To this end, we introduce preference preserving consequence
operators. The resulting fixpoint characterizations provide us with a uniform
semantic framework for characterizing preference handling in existing
approaches. Although our approach is extensible to other semantics by means of
an alternating fixpoint theory, we focus here on the elaboration of preferences
under answer set semantics. Alternatively, we show how these approaches can be
characterized by the concept of order preservation. These uniform semantic
characterizations provide us with new insights about interrelationships and
moreover about ways of implementation.
| [
{
"version": "v1",
"created": "Thu, 23 Jan 2003 09:09:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schaub",
"Torsten",
""
],
[
"Wang",
"Kewen",
""
]
] |
cs/0301024 | Ranee Brylinski | Jean-Luc Brylinski and Ranee Brylinski | Complexity and Completeness of Immanants | 10 pages, Latex | null | null | null | cs.CC math.CO | null | Immanants are polynomial functions of n by n matrices attached to irreducible
characters of the symmetric group S_n, or equivalently to Young diagrams of
size n. Immanants include determinants and permanents as extreme cases. Valiant
proved that computation of permanents is a complete problem in his algebraic
model of NP theory, i.e., it is VNP-complete. We prove that computation of
immanants is VNP-complete if the immanants are attached to a family of diagrams
whose separation is $\Omega(n^\delta)$ for some $\delta>0$. We define the
separation of a diagram to be the largest number of overhanging boxes contained
in a single row. Our theorem proves a conjecture of Buergisser for a large
variety of families, and in particular we recover with new proofs his
VNP-completeness results for hooks and rectangles.
| [
{
"version": "v1",
"created": "Thu, 23 Jan 2003 20:31:46 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Jan 2003 21:48:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brylinski",
"Jean-Luc",
""
],
[
"Brylinski",
"Ranee",
""
]
] |
cs/0301025 | Sostenes Lins | Lauro Lins, Sostenes Lins and Silvio Melo | PHORMA: Perfectly Hashed Order Restricted Multidimensional Array | 12 pages, 4 figures | null | null | null | cs.DM | null | In this paper we propose a simple and efficient strategy to obtain a data
structure generator to accomplish a perfect hash of quite general order
restricted multidimensional arrays named {\em phormas}. The constructor of such
objects gets two parameters as input: an n-vector a of non negative integers
and a boolean function B on the types of order restrictions on the coordinates
of the valid n-vectors bounded by a. At compiler time, the phorma constructor
builds, from the pair a,B, a digraph G(a,B) with a single source s and a single
sink t such that the st-paths are in 1-1 correspondence with the members of the
B-restricted a-bounded array A(a,B). Besides perfectly hashing A(a,B), G(a,B)
is an instance of an NW-family. This permits other useful computational tasks
on it.
| [
{
"version": "v1",
"created": "Fri, 24 Jan 2003 13:30:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lins",
"Lauro",
""
],
[
"Lins",
"Sostenes",
""
],
[
"Melo",
"Silvio",
""
]
] |
cs/0301026 | Judith Beumer | Michael Beeson, Robert Veroff, Larry Wos | Double-Negation Elimination in Some Propositional Logics | 32 pages, no figures | null | null | Preprint ANL/MCS-P1014-1202 | cs.LO | null | This article answers two questions (posed in the literature), each concerning
the guaranteed existence of proofs free of double negation. A proof is free of
double negation if none of its deduced steps contains a term of the form
n(n(t)) for some term t, where n denotes negation. The first question asks for
conditions on the hypotheses that, if satisfied, guarantee the existence of a
double-negation-free proof when the conclusion is free of double negation. The
second question asks about the existence of an axiom system for classical
propositional calculus whose use, for theorems with a conclusion free of double
negation, guarantees the existence of a double-negation-free proof. After
giving conditions that answer the first question, we answer the second question
by focusing on the Lukasiewicz three-axiom system. We then extend our studies
to infinite-valued sentential calculus and to intuitionistic logic and
generalize the notion of being double-negation free. The double-negation proofs
of interest rely exclusively on the inference rule condensed detachment, a rule
that combines modus ponens with an appropriately general rule of substitution.
The automated reasoning program OTTER played an indispensable role in this
study.
| [
{
"version": "v1",
"created": "Fri, 24 Jan 2003 20:25:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Beeson",
"Michael",
""
],
[
"Veroff",
"Robert",
""
],
[
"Wos",
"Larry",
""
]
] |
cs/0301027 | Thomas Wolf | Thomas Wolf | A comparison of four approaches to the calculation of conservation laws | updated source code download link | Euro. Jnl of Applied Mathematics, 13, part 2 (2002) 129-152 | null | null | cs.SC math-ph math.MP | null | The paper compares computational aspects of four approaches to compute
conservation laws of single differential equations (DEs) or systems of them,
ODEs and PDEs. The only restriction, required by two of the four corresponding
computer algebra programs, is that each DE has to be solvable for a leading
derivative. Extra constraints for the conservation laws can be specified.
Examples include new conservation laws that are non-polynomial in the
functions, that have an explicit variable dependence and families of
conservation laws involving arbitrary functions. The following equations are
investigated in examples: Ito, Liouville, Burgers, Kadomtsev-Petviashvili,
Karney-Sen-Chu-Verheest, Boussinesq, Tzetzeica, Benney.
| [
{
"version": "v1",
"created": "Sat, 25 Jan 2003 04:42:12 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Feb 2003 17:43:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolf",
"Thomas",
""
]
] |
cs/0301028 | Thomas Wolf | Thomas Wolf | The integration of systems of linear PDEs using conservation laws of
syzygies | 26 pages | J. of Symb. Comp. 35, no 5 (2003) 499-526. | null | null | cs.SC math.AP | null | A new integration technique is presented for systems of linear partial
differential equations (PDEs) for which syzygies can be formulated that obey
conservation laws. These syzygies come for free as a by-product of the
differential Groebner Basis computation. Compared with the more obvious way of
integrating a single equation and substituting the result in other equations
the new technique integrates more than one equation at once and therefore
introduces temporarily fewer new functions of integration that in addition
depend on fewer variables. Especially for high order PDE systems in many
variables the conventional integration technique may lead to an explosion of
the number of functions of integration which is avoided with the new method. A
further benefit is that redundant free functions in the solution are either
prevented or that their number is at least reduced.
| [
{
"version": "v1",
"created": "Tue, 28 Jan 2003 05:20:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolf",
"Thomas",
""
]
] |
cs/0301029 | Thomas Wolf | Thomas Wolf | Size reduction and partial decoupling of systems of equations | null | J. Symb. Comp. 33, no 3 (2002) 367-383 | null | null | cs.SC | null | A method is presented that reduces the number of terms of systems of linear
equations (algebraic, ordinary and partial differential equations). As a
byproduct these systems have a tendency to become partially decoupled and are
more likely to be factorizable or integrable. A variation of this method is
applicable to non-linear systems. Modifications to improve efficiency are given
and examples are shown. This procedure can be used in connection with the
computation of the radical of a differential ideal (differential Groebner
basis).
| [
{
"version": "v1",
"created": "Tue, 28 Jan 2003 06:16:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolf",
"Thomas",
""
]
] |
cs/0301030 | Ronald I. Greenberg | Ronald I. Greenberg | Bounds on the Number of Longest Common Subsequences | 13 pages. Corrected typos, corrected operation of hyperlinks,
improved presentation | null | null | null | cs.DM cs.DS | null | This paper performs the analysis necessary to bound the running time of
known, efficient algorithms for generating all longest common subsequences.
That is, we bound the running time as a function of input size for algorithms
with time essentially proportional to the output size. This paper considers
both the case of computing all distinct LCSs and the case of computing all LCS
embeddings. Also included is an analysis of how much better the efficient
algorithms are than the standard method of generating LCS embeddings. A full
analysis is carried out with running times measured as a function of the total
number of input characters, and much of the analysis is also provided for cases
in which the two input sequences are of the same specified length or of two
independently specified lengths.
| [
{
"version": "v1",
"created": "Tue, 28 Jan 2003 17:53:16 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Aug 2003 20:54:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Greenberg",
"Ronald I.",
""
]
] |
cs/0301031 | Judith Beumer | K. Keahey and V. Welch | Fine-Grain Authorization for Resource Management in the Grid Environment | 7 pages | null | null | ANL/MCS-P991-0802 | cs.CR cs.DC | null | In this document we describe our work-in-progress for enabling fine-grain
authorization of resource management. In particular, we address the needs of
Virtual Organizations (VOs) to enforce their own policies in addition to those
of the resource owners.
| [
{
"version": "v1",
"created": "Tue, 28 Jan 2003 19:27:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Keahey",
"K.",
""
],
[
"Welch",
"V.",
""
]
] |
cs/0301032 | null | Oleg Kiselyov | Subclassing errors, OOP, and practically checkable rules to prevent them | 10 pages, 1 LaTeX file; accompanying C++ and Haskell code and
compilation instructions | Proc. "Monterey Workshop 2001: Engineering Automation for Software
Intensive System Integration," sponsored by ONR/AFOSR/ARO/DARPA. June 18-22,
2001, Monterey, CA. -- pp. 33-42 | null | null | cs.PL cs.SE | null | This paper considers an example of Object-Oriented Programming (OOP) leading
to subtle errors that break separation of interface and implementations. A
comprehensive principle that guards against such errors is undecidable. The
paper introduces a set of mechanically verifiable rules that prevent these
insidious problems. Although the rules seem restrictive, they are powerful and
expressive, as we show on several familiar examples. The rules contradict both
the spirit and the letter of the OOP. The present examples as well as available
theoretical and experimental results pose a question if OOP is conducive to
software development at all.
| [
{
"version": "v1",
"created": "Tue, 28 Jan 2003 19:41:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiselyov",
"Oleg",
""
]
] |
cs/0301033 | Judith Beumer | K. Keahey, T. Fredian, Q. Peng, D. P. Schissel, M. Thompson, I.
Foster, M. Greenwald, D. McCune | Computational Grids in Action: The Natinal Fusion Collaboratory | null | Future Generation Computer Systems 18 (2002), 1005-1015 | null | null | cs.DC | null | The National Fusion Collaboratory (NFC) project was created to advance
scientific understanding and innovation in magnetic fusion research by enabling
more efficient use of existing experimental facilities through more effective
integration of experiment, theory, and modeling. To achieve this objective, NFC
introduced the concept of "network services", which build on top of
computational Grids, and provide Fusion codes, together with their maintenance
and hardware resources as a service to the community. This mode of operation
requires the development of new authorization and enforcement capabilities. In
addition, the nature of Fusion experiments places strident quality of service
requirements on codes run during the experimental cycle. In this paper, we
describe Grid computing requirements of the Fusion community, and present our
first experiments in meeting those requirements.
| [
{
"version": "v1",
"created": "Tue, 28 Jan 2003 20:11:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Keahey",
"K.",
""
],
[
"Fredian",
"T.",
""
],
[
"Peng",
"Q.",
""
],
[
"Schissel",
"D. P.",
""
],
[
"Thompson",
"M.",
""
],
[
"Foster",
"I.",
""
],
[
"Greenwald",
"M.",
""
],
[
"McCune",
"D.",
""
]
] |
cs/0301034 | Ronald I. Greenberg | Ronald I. Greenberg | Computing the Number of Longest Common Subsequences | 3 pages, LaTeX | null | null | null | cs.DS cs.DM | null | This note provides very simple, efficient algorithms for computing the number
of distinct longest common subsequences of two input strings and for computing
the number of LCS embeddings.
| [
{
"version": "v1",
"created": "Wed, 29 Jan 2003 20:02:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Greenberg",
"Ronald I.",
""
]
] |
cs/0301035 | Alex Brodsky | Alex Brodsky, Jan B. Pedersen, and Alan Wagner | On the Complexity of Buffer Allocation in Message Passing Systems | 35 Pages, lots of figures | null | null | null | cs.DC | null | Message passing programs commonly use buffers to avoid unnecessary
synchronizations and to improve performance by overlapping communication with
computation. Unfortunately, using buffers makes the program no longer portable,
potentially unable to complete on systems without a sufficient number of
buffers. Effective buffer use entails that the minimum number needed for a safe
execution be allocated.
We explore a variety of problems related to buffer allocation for safe and
efficient execution of message passing programs. We show that determining the
minimum number of buffers or verifying a buffer assignment are intractable
problems. However, we give a polynomial time algorithm to determine the minimum
number of buffers needed to allow for asynchronous execution. We extend these
results to several different buffering schemes, which in some cases make the
problems tractable.
| [
{
"version": "v1",
"created": "Fri, 31 Jan 2003 01:21:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brodsky",
"Alex",
""
],
[
"Pedersen",
"Jan B.",
""
],
[
"Wagner",
"Alan",
""
]
] |
cs/0301036 | Joe Francoeur | Joe Francoeur | Algorithms using Java for Spreadsheet Dependent Cell Recomputation | 23 pages, 4 figures, 2 tables | null | null | null | cs.DS cs.DM | null | Java implementations of algorithms used by spreadsheets to automatically
recompute the set of cells dependent on a changed cell are described using a
mathematical model for spreadsheets based on graph theory. These solutions
comprise part of a Java API that allows a client application to read, modify,
and maintain spreadsheet data without using the spreadsheet application program
that produced it. Features of the Java language that successfully improve the
running time performance of the algorithms are also described.
| [
{
"version": "v1",
"created": "Fri, 31 Jan 2003 20:19:21 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Jun 2003 21:21:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Francoeur",
"Joe",
""
]
] |
cs/0302001 | Ke Xu | Ke Xu and Wei Li | Many Hard Examples in Exact Phase Transitions with Application to
Generating Hard Satisfiable Instances | 19 pages, corrected mistakes in Theorems 5 and 6 | null | null | null | cs.CC cond-mat.stat-mech cs.AI cs.DM | null | This paper first analyzes the resolution complexity of two random CSP models
(i.e. Model RB/RD) for which we can establish the existence of phase
transitions and identify the threshold points exactly. By encoding CSPs into
CNF formulas, it is proved that almost all instances of Model RB/RD have no
tree-like resolution proofs of less than exponential size. Thus, we not only
introduce new families of CNF formulas hard for resolution, which is a central
task of Proof-Complexity theory, but also propose models with both many hard
instances and exact phase transitions. Then, the implications of such models
are addressed. It is shown both theoretically and experimentally that an
application of Model RB/RD might be in the generation of hard satisfiable
instances, which is not only of practical importance but also related to some
open problems in cryptography such as generating one-way functions.
Subsequently, a further theoretical support for the generation method is shown
by establishing exponential lower bounds on the complexity of solving random
satisfiable and forced satisfiable instances of RB/RD near the threshold.
Finally, conclusions are presented, as well as a detailed comparison of Model
RB/RD with the Hamiltonian cycle problem and random 3-SAT, which, respectively,
exhibit three different kinds of phase transition behavior in NP-complete
problems.
| [
{
"version": "v1",
"created": "Sat, 1 Feb 2003 15:58:16 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Mar 2003 15:44:57 GMT"
},
{
"version": "v3",
"created": "Sat, 1 Nov 2003 02:04:04 GMT"
},
{
"version": "v4",
"created": "Thu, 6 Nov 2003 03:25:08 GMT"
},
{
"version": "v5",
"created": "Tue, 11 Nov 2003 16:40:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Xu",
"Ke",
""
],
[
"Li",
"Wei",
""
]
] |
cs/0302002 | Thomas Wolf | Matthew Pratola, Thomas Wolf | Optimizing GoTools' Search Heuristics using Genetic Algorithms | 23 pages, to appear in Journal of ICGA | null | null | null | cs.NE | null | GoTools is a program which solves life & death problems in the game of Go.
This paper describes experiments using a Genetic Algorithm to optimize
heuristic weights used by GoTools' tree-search. The complete set of heuristic
weights is composed of different subgroups, each of which can be optimized with
a suitable fitness function. As a useful side product, an MPI interface for
FreePascal was implemented to allow the use of a parallelized fitness function
running on a Beowulf cluster. The aim of this exercise is to optimize the
current version of GoTools, and to make tools available in preparation of an
extension of GoTools for solving open boundary life & death problems, which
will introduce more heuristic parameters to be fine tuned.
| [
{
"version": "v1",
"created": "Sun, 2 Feb 2003 03:30:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pratola",
"Matthew",
""
],
[
"Wolf",
"Thomas",
""
]
] |
cs/0302003 | Guilhem Semerjian | Simona Cocco, Remi Monasson, Andrea Montanari, Guilhem Semerjian | Approximate analysis of search algorithms with "physical" methods | 28 pages, 23 figures | null | null | null | cs.CC cond-mat.stat-mech | null | An overview of some methods of statistical physics applied to the analysis of
algorithms for optimization problems (satisfiability of Boolean constraints,
vertex cover of graphs, decoding, ...) with distributions of random inputs is
proposed. Two types of algorithms are analyzed: complete procedures with
backtracking (Davis-Putnam-Loveland-Logeman algorithm) and incomplete, local
search procedures (gradient descent, random walksat, ...). The study of
complete algorithms makes use of physical concepts such as phase transitions,
dynamical renormalization flow, growth processes, ... As for local search
procedures, the connection between computational complexity and the structure
of the cost function landscape is questioned, with emphasis on the notion of
metastability.
| [
{
"version": "v1",
"created": "Mon, 3 Feb 2003 11:04:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cocco",
"Simona",
""
],
[
"Monasson",
"Remi",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Semerjian",
"Guilhem",
""
]
] |
cs/0302004 | Stijn Vansummeren | Stijn Vansummeren | Unique Pattern Matching in Strings | 22 pages | null | null | null | cs.PL cs.DB | null | Regular expression patterns are a key feature of document processing
languages like Perl and XDuce. It is in this context that the first and longest
match policies have been proposed to disambiguate the pattern matching process.
We formally define a matching semantics with these policies and show that the
generally accepted method of simulating longest match by first match and
recursion is incorrect. We continue by solving the associated type inference
problem, which consists in calculating for every subexpression the set of words
the subexpression can still match when these policies are in effect, and show
how this algorithm can be used to efficiently implement the matching process.
| [
{
"version": "v1",
"created": "Mon, 3 Feb 2003 15:52:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vansummeren",
"Stijn",
""
]
] |
cs/0302005 | Vicky Choi | Vicky Choi and Martin Farach-Colton | Barnacle: An Assembly Algorithm for Clone-based Sequences of Whole
Genomes | 13 pages, 10 figures | null | null | null | cs.DS cs.DM q-bio | null | We propose an assembly algorithm {\sc Barnacle} for sequences generated by
the clone-based approach. We illustrate our approach by assembling the human
genome. Our novel method abandons the original physical-mapping-first
framework. As we show, {\sc Barnacle} more effectively resolves conflicts due
to repeated sequences. The latter is the main difficulty of the sequence
assembly problem. Inaddition, we are able to detect inconsistencies in the
underlying data. We present and compare our results on the December 2001 freeze
of the public working draft of the human genome with NCBI's assembly (Build
28).
The assembly of December 2001 freeze of the public working draft generated by
{\sc Barnacle} and the source code of {\sc Barnacle} are available at
(http://www.cs.rutgers.edu/~vchoi).
| [
{
"version": "v1",
"created": "Mon, 3 Feb 2003 22:42:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Choi",
"Vicky",
""
],
[
"Farach-Colton",
"Martin",
""
]
] |
cs/0302006 | Rajkumar Buyya | Jia Yu, Srikumar Venugopal, Rajkumar Buyya | Grid Market Directory: A Web Services based Grid Service Publication
Directory | Technical Report, Grid Computing and Distributed Systems Lab,
University of Melbourne, Jan 2003 | null | null | null | cs.DC | null | As Grids are emerging as the next generation service-oriented computing
platforms, they need to support Grid economy that helps in the management of
supply and demand for resources and offers an economic incentive for Grid
resource providers. To enable this Grid economy, a market-like Grid environment
including an infrastructure that supports the publication of services and their
discovery is needed. As part of the Gridbus project, we proposed and have
developed a Grid Market Directory (GMD) that serves as a registry for
high-level service publication and discovery in Virtual Organisations.
| [
{
"version": "v1",
"created": "Thu, 6 Feb 2003 03:31:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yu",
"Jia",
""
],
[
"Venugopal",
"Srikumar",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0302007 | Rajkumar Buyya | Martin Placek and Rajkumar Buyya | G-Monitor: Gridbus web portal for monitoring and steering application
execution on global grids | Technical Report, Grid Computing and Distributed Systems Lab, Dept.
of Computer Science and Software Engineer, The University of Melbourne,
Australia | null | null | null | cs.DC | null | Grids are experiencing a rapid growth in their application and along with
this there is a requirement for a portal which is easy to use and scalable. We
have responded to this requirement by developing an easy to use, scalable,
web-based portal called G-Monitor. This paper proposes a generic architecture
for a web portal into a grid environment and discusses our implementation and
its application.
| [
{
"version": "v1",
"created": "Thu, 6 Feb 2003 03:36:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Placek",
"Martin",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0302008 | Rajkumar Buyya | Shoib Burq, Steve Melnikoff, Kim Branson, Rajkumar Buyya | Visual Environment for Rapid Composition of Parameter-Sweep Applications
for Distributed Processing on Global Grids | Technical Report, Grid Computing and Distributed Systems Lab, Dept.
of Computer Science and Software Engineering, The University of Melbourne,
Australia | null | null | null | cs.DC | null | Computational Grids are emerging as a platform for next-generation parallel
and distributed computing. Large-scale parametric studies and parameter sweep
applications find a natural place in the Grid?s distribution model. There is
little or no communication between jobs. The task of parallelizing and
distributing existing applications is conceptually trivial. These properties of
parametric studies make it an ideal place to start developing integrated
development environments (IDEs) for rapidly Grid-enabling applications.
However, the availability of IDEs for scientists to Grid-enable their
applications, without the need of developing them as parallel applications
explicitly, is still lacking. This paper presents a Java based IDE called
Visual Parametric Tool (VPT), developed as part of the Gridbus project, for
rapid creation of parameter sweep (data parallel/SPMD) applications. It
supports automatic creation of parameter script and parameterisation of the
input data files, which is compatible with the Nimrod-G parameter specification
language. The usefulness of VPT is demonstrated by a case study on composition
of molecular docking application as a parameter sweep application. Such
applications can be deployed on clusters using the Nimrod/enFuzion system and
on global Grids using the Nimrod-G grid resource broker.
| [
{
"version": "v1",
"created": "Thu, 6 Feb 2003 04:06:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burq",
"Shoib",
""
],
[
"Melnikoff",
"Steve",
""
],
[
"Branson",
"Kim",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0302009 | Andrej Brodnik | Andrej Brodnik (1 and 2), Andreas Nilsson (2) ((1) IMFM, Ljubljana,
Slovenia, (2) University of Technology, Lulea, Sweden) | Data Structure for a Time-Based Bandwidth Reservations Problem | null | null | null | null | cs.DS cs.NI | null | We discuss a problem of handling resource reservations. The resource can be
reserved for some time, it can be freed or it can be queried what is the
largest amount of reserved resource during a time interval. We show that the
problem has a lower bound of $\Omega(\log n)$ per operation on average and we
give a matching upper bound algorithm. Our solution also solves a dynamic
version of the related problems of a prefix sum and a partial sum.
| [
{
"version": "v1",
"created": "Thu, 6 Feb 2003 17:48:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brodnik",
"Andrej",
"",
"1 and 2"
],
[
"Nilsson",
"Andreas",
""
]
] |
cs/0302010 | Petros Maniatis | Petros Maniatis and Mary Baker | Authenticated Append-only Skip Lists | 24 pages | null | null | null | cs.CR cs.DC | null | In this work we describe, design and analyze the security of a
tamper-evident, append-only data structure for maintaining secure data
sequences in a loosely coupled distributed system where individual system
components may be mutually distrustful. The resulting data structure, called an
Authenticated Append-Only Skip List (AASL), allows its maintainers to produce
one-way digests of the entire data sequence, which they can publish to others
as a commitment on the contents and order of the sequence. The maintainer can
produce efficiently succinct proofs that authenticate a particular datum in a
particular position of the data sequence against a published digest. AASLs are
secure against tampering even by malicious data structure maintainers. First,
we show that a maintainer cannot ``invent'' and authenticate data elements for
the AASL after he has committed to the structure. Second, he cannot equivocate
by being able to prove conflicting facts about a particular position of the
data sequence. This is the case even when the data sequence grows with time and
its maintainer publishes successive commitments at times of his own choosing.
AASLs can be invaluable in reasoning about the integrity of system logs
maintained by untrusted components of a loosely-coupled distributed system.
| [
{
"version": "v1",
"created": "Fri, 7 Feb 2003 01:51:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maniatis",
"Petros",
""
],
[
"Baker",
"Mary",
""
]
] |
cs/0302011 | Daniel A. Spielman | John Dunagan, Daniel A. Spielman, and Shang-Hua Teng | Smoothed Analysis of Interior-Point Algorithms: Condition Number | Fixed it up quite a bit | null | null | null | cs.DS cs.NA | null | We show that the smoothed complexity of the logarithm of Renegar's condition
number is O(log (n/sigma)).
| [
{
"version": "v1",
"created": "Mon, 10 Feb 2003 06:14:26 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Oct 2003 15:38:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dunagan",
"John",
""
],
[
"Spielman",
"Daniel A.",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
cs/0302012 | Juergen Schmidhuber | Juergen Schmidhuber | The New AI: General & Sound & Relevant for Physics | 23 pages, updated refs, added Goedel machine overview, corrected
computing history timeline. To appear in B. Goertzel and C. Pennachin, eds.:
Artificial General Intelligence | null | null | TR IDSIA-04-03 | cs.AI cs.LG quant-ph | null | Most traditional artificial intelligence (AI) systems of the past 50 years
are either very limited, or based on heuristics, or both. The new millennium,
however, has brought substantial progress in the field of theoretically optimal
and practically feasible algorithms for prediction, search, inductive inference
based on Occam's razor, problem solving, decision making, and reinforcement
learning in environments of a very general type. Since inductive inference is
at the heart of all inductive sciences, some of the results are relevant not
only for AI and computer science but also for physics, provoking nontraditional
predictions based on Zuse's thesis of the computer-generated universe.
| [
{
"version": "v1",
"created": "Mon, 10 Feb 2003 14:17:33 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Nov 2003 10:01:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidhuber",
"Juergen",
""
]
] |
cs/0302013 | Mark J. Kilgard | Mark J. Kilgard | Cg in Two Pages | 2 pages | null | null | null | cs.GR cs.PL | null | Cg is a language for programming GPUs. This paper describes Cg briefly.
| [
{
"version": "v1",
"created": "Wed, 12 Feb 2003 05:16:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kilgard",
"Mark J.",
""
]
] |
cs/0302014 | V. Sriram | Akshar Bharati, V.Sriram, A.Vamshi Krishna, Rajeev Sangal, S.M.Bendre | An Algorithm for Aligning Sentences in Bilingual Corpora Using Lexical
Information | 10 pages, 5 figures, Conference : International Conference on Natural
Language Processing ' 2002, Mumbai | null | null | null | cs.CL | null | In this paper we describe an algorithm for aligning sentences with their
translations in a bilingual corpus using lexical information of the languages.
Existing efficient algorithms ignore word identities and consider only the
sentence lengths (Brown, 1991; Gale and Church, 1993). For a sentence in the
source language text, the proposed algorithm picks the most likely translation
from the target language text using lexical information and certain heuristics.
It does not do statistical analysis using sentence lengths. The algorithm is
language independent. It also aids in detecting addition and deletion of text
in translations. The algorithm gives comparable results with the existing
algorithms in most of the cases while it does better in cases where statistical
algorithms do not give good results.
| [
{
"version": "v1",
"created": "Wed, 12 Feb 2003 06:31:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bharati",
"Akshar",
""
],
[
"Sriram",
"V.",
""
],
[
"Krishna",
"A. Vamshi",
""
],
[
"Sangal",
"Rajeev",
""
],
[
"Bendre",
"S. M.",
""
]
] |
cs/0302015 | J. G. Wolff | J. G. Wolff | Unsupervised Learning in a Framework of Information Compression by
Multiple Alignment, Unification and Search | 39 pages, 1 JPEG figure | null | null | null | cs.AI cs.LG | null | This paper describes a novel approach to unsupervised learning that has been
developed within a framework of "information compression by multiple alignment,
unification and search" (ICMAUS), designed to integrate learning with other AI
functions such as parsing and production of language, fuzzy pattern
recognition, probabilistic and exact forms of reasoning, and others.
| [
{
"version": "v1",
"created": "Wed, 12 Feb 2003 09:39:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolff",
"J. G.",
""
]
] |
cs/0302016 | Adriana Iamnitchi | Adriana Iamnitchi, Matei Ripeanu, Ian Foster | Data-sharing relationships in the Web | null | null | null | University of Chicago TR-2003-01 | cs.NI cond-mat | null | We propose a novel structure, the data-sharing graph, for characterizing
sharing patterns in large-scale data distribution systems. We analyze this
structure in two such systems and uncover small-world patterns for data-sharing
relationships. Using the data-sharing graph for system characterization has
potential both for basic science, because we can identify new structures
emerging in real, dynamic networks; and for system design, because we can
exploit these structures when designing data location and delivery mechanisms.
We conjecture that similar patterns arise in other large-scale systems and that
these patterns can be exploited for mechanism design.
| [
{
"version": "v1",
"created": "Wed, 12 Feb 2003 19:34:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Iamnitchi",
"Adriana",
""
],
[
"Ripeanu",
"Matei",
""
],
[
"Foster",
"Ian",
""
]
] |
cs/0302017 | Michael J. O'Donnell | Michael J. O'Donnell | A Proposal to Separate Handles from Names on the Internet | null | null | null | null | cs.NI | null | Networked communications inherently depend on the ability of the sender of a
message to indicate through some token how the message should be delivered to a
particular recipient. The tokens that refer messages to recipients are
variously known as routes, addresses,handles, and names} ordered by their
relative nearness to network topology vs. human meaning. All four sorts of
token refer in some way to a recipient, but they are controlled by different
authorities and their meanings depend on different contextual parameters.
Today's global Internet employs dynamically determined routes, IP addresses,
and domain names. Domain names combine the functions of handles and names. The
high value of domain names as names leads to substantial social and legal
dispute about their assignment, degrading their value as handles. The time has
come to provide a distinct open network handle system (ONHS), using handles
that are not meaningful in natural language and are therefore not subject to
the disputes surrounding the use of names.
A handle service may be deployed easily as a handle domain within the current
Domain Name System. In order to minimize the administrative load, and maximize
their own autonomy, netizens may use public-key cryptography to assign their
own handles.
| [
{
"version": "v1",
"created": "Wed, 12 Feb 2003 22:10:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Donnell",
"Michael J.",
""
]
] |
cs/0302018 | Rajkumar Buyya | Ding Choon Hoong, Rajkumar Buyya | Guided Google: A Meta Search Engine and its Implementation using the
Google Distributed Web Services | Technical Report, Grid Computing and Distributed Systems (GRIDS) Lab,
Dept. of Computer Science and Software Engineering, The University of
Melbourne, Australia | null | null | null | cs.DC | null | With the advent of the Internet, search engines have begun sprouting like
mushrooms after a rainfall. Only in recent years, have developers become more
innovative, and came up with guided searching facilities online. The goals of
these applications are to help ease and guide the searching efforts of a novice
web user toward their desired objectives. A number of implementations of such
services are emerging. This paper proposes a guided meta-search engine, called
"Guided Google", as it serves as an interface to the actual Google.com search
engine, using the Google Web Services.
| [
{
"version": "v1",
"created": "Thu, 13 Feb 2003 04:49:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hoong",
"Ding Choon",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0302019 | Rajkumar Buyya | R. Buyya, S. Date, Y. Mizuno-Matsumoto, S. Venugopal, D. Abramson | Economic and On Demand Brain Activity Analysis on Global Grids | Technical Report, Grid Computing and Distributed Systems (GRIDS) Lab,
Dept. of Computer Science and Software Engineering, The University of
Melbourne, Australia | null | null | null | cs.DC | null | The lack of computational power within an organization for analyzing
scientific data, and the distribution of knowledge (by scientists) and
technologies (advanced scientific devices) are two major problems commonly
observed in scientific disciplines. One such scientific discipline is brain
science. The analysis of brain activity data gathered from the MEG
(Magnetoencephalography) instrument is an important research topic in medical
science since it helps doctors in identifying symptoms of diseases. The data
needs to be analyzed exhaustively to efficiently diagnose and analyze brain
functions and requires access to large-scale computational resources. The
potential platform for solving such resource intensive applications is the
Grid. This paper describes a MEG data analysis system developed by us,
leveraging Grid technologies, primarily Nimrod-G, Gridbus, and Globus. This
paper explains the application of economy-based grid scheduling algorithms to
the problem domain for on-demand processing of analysis jobs.
| [
{
"version": "v1",
"created": "Thu, 13 Feb 2003 04:53:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buyya",
"R.",
""
],
[
"Date",
"S.",
""
],
[
"Mizuno-Matsumoto",
"Y.",
""
],
[
"Venugopal",
"S.",
""
],
[
"Abramson",
"D.",
""
]
] |
cs/0302020 | Aaron Harwood | Aaron Harwood | Analytical formulations of Peer-to-Peer Connection Efficiency | 9 pages | null | null | null | cs.DC cs.AR cs.NI | null | Use of Peer-to-Peer (P2P) service networks introduces a new communication
paradigm because peers are both clients and servers and so each peer may
provide/request services to/from other peers. Empirical studies of P2P networks
have been undertaken and reveal useful characteristics. However there is to
date little analytical work to describe P2P networks with respect to their
communication paradigm and their interconnections. This paper provides an
analytical formulation and optimisation of peer connection efficiency, in terms
of minimising the fraction of wasted connection time. Peer connection
efficiency is analysed for both a uni- and multi-connected peer. Given this
fundamental optimisation, the paper optimises the number of connections that
peers should make use of as a function of network load, in terms of minimising
the total queue size that requests in the P2P network experience. The results
of this paper provide a basis for engineering high performance P2P
interconnection networks. The optimisations are useful for reducing bandwidth
and power consumption, e.g. in the case of peers being mobile devices with a
limited power supply. Also these results could be used to determine when a
(virtual) circuit should be switched to support a connection.
| [
{
"version": "v1",
"created": "Thu, 13 Feb 2003 10:13:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Harwood",
"Aaron",
""
]
] |
cs/0302021 | Steven Bird | Gary Simons and Steven Bird | Building an Open Language Archives Community on the OAI Foundation | 12 pages | Library Hi Tech 21(2), 2003 | null | null | cs.CL cs.DL | null | The Open Language Archives Community (OLAC) is an international partnership
of institutions and individuals who are creating a worldwide virtual library of
language resources. The Dublin Core (DC) Element Set and the OAI Protocol have
provided a solid foundation for the OLAC framework. However, we need more
precision in community-specific aspects of resource description than is offered
by DC. Furthermore, many of the institutions and individuals who might
participate in OLAC do not have the technical resources to support the OAI
protocol. This paper presents our solutions to these two problems. To address
the first, we have developed an extensible application profile for language
resource metadata. To address the second, we have implemented Vida (the virtual
data provider) and Viser (the virtual service provider), which permit community
members to provide data and services without having to implement the OAI
protocol. These solutions are generic and could be adopted by other specialized
subcommunities.
| [
{
"version": "v1",
"created": "Fri, 14 Feb 2003 07:11:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Simons",
"Gary",
""
],
[
"Bird",
"Steven",
""
]
] |
cs/0302022 | James Aspnes | James Aspnes, Zoe Diamadi, and Gauri Shah | Fault-tolerant routing in peer-to-peer systems | Full version of PODC 2002 paper. New version corrects missing
conditioning in Lemma 9 and some related details in the proof of Theorem 10,
with no changes to main results | null | null | null | cs.DS cs.DC | null | We consider the problem of designing an overlay network and routing mechanism
that permits finding resources efficiently in a peer-to-peer system. We argue
that many existing approaches to this problem can be modeled as the
construction of a random graph embedded in a metric space whose points
represent resource identifiers, where the probability of a connection between
two nodes depends only on the distance between them in the metric space. We
study the performance of a peer-to-peer system where nodes are embedded at grid
points in a simple metric space: a one-dimensional real line. We prove upper
and lower bounds on the message complexity of locating particular resources in
such a system, under a variety of assumptions about failures of either nodes or
the connections between them. Our lower bounds in particular show that the use
of inverse power-law distributions in routing, as suggested by Kleinberg
(1999), is close to optimal. We also give efficient heuristics to dynamically
maintain such a system as new nodes arrive and old nodes depart. Finally, we
give experimental results that suggest promising directions for future work.
| [
{
"version": "v1",
"created": "Sat, 15 Feb 2003 17:15:46 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Jun 2003 18:22:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aspnes",
"James",
""
],
[
"Diamadi",
"Zoe",
""
],
[
"Shah",
"Gauri",
""
]
] |
cs/0302023 | Alexander Haubold | Alexander Haubold and John R. Kender | Segmentation, Indexing, and Visualization of Extended Instructional
Videos | 8 pages, 13 figures | null | null | null | cs.IR cs.CV | null | We present a new method for segmenting, and a new user interface for indexing
and visualizing, the semantic content of extended instructional videos. Given a
series of key frames from the video, we generate a condensed view of the data
by clustering frames according to media type and visual similarities. Using
various visual filters, key frames are first assigned a media type (board,
class, computer, illustration, podium, and sheet). Key frames of media type
board and sheet are then clustered based on contents via an algorithm with
near-linear cost. A novel user interface, the result of two user studies,
displays related topics using icons linked topologically, allowing users to
quickly locate semantically related portions of the video. We analyze the
accuracy of the segmentation tool on 17 instructional videos, each of which is
from 75 to 150 minutes in duration (a total of 40 hours); the classification
accuracy exceeds 96%.
| [
{
"version": "v1",
"created": "Sun, 16 Feb 2003 22:08:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
] |
cs/0302024 | Alexander Haubold | Alexander Haubold and John R. Kender | Analysis and Interface for Instructional Video | 4 pages, 8 figures, ICME 2003 | Proceedings of 2003 IEEE International Conference on Multimedia &
Expo, Volume II, pages 705-708, July 2003 | null | null | cs.IR cs.CV | null | We present a new method for segmenting, and a new user interface for indexing
and visualizing, the semantic content of extended instructional videos. Using
various visual filters, key frames are first assigned a media type (board,
class, computer, illustration, podium, and sheet). Key frames of media type
board and sheet are then clustered based on contents via an algorithm with
near-linear cost. A novel user interface, the result of two user studies,
displays related topics using icons linked topologically, allowing users to
quickly locate semantically related portions of the video. We analyze the
accuracy of the segmentation tool on 17 instructional videos, each of which is
from 75 to 150 minutes in duration (a total of 40 hours); it exceeds 96%.
| [
{
"version": "v1",
"created": "Sun, 16 Feb 2003 22:13:42 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Aug 2003 06:47:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
] |
cs/0302025 | Andris Ambainis | Andris Ambainis, Markus Jakobsson, Helger Lipmaa | Cryptographic Randomized Response Techniques | 21 pages | null | null | null | cs.CC cs.CR cs.CY quant-ph | null | We develop cryptographically secure techniques to guarantee unconditional
privacy for respondents to polls. Our constructions are efficient and
practical, and are shown not to allow cheating respondents to affect the
``tally'' by more than their own vote -- which will be given the exact same
weight as that of other respondents. We demonstrate solutions to this problem
based on both traditional cryptographic techniques and quantum cryptography.
| [
{
"version": "v1",
"created": "Tue, 18 Feb 2003 11:23:23 GMT"
},
{
"version": "v2",
"created": "Fri, 23 May 2003 13:59:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ambainis",
"Andris",
""
],
[
"Jakobsson",
"Markus",
""
],
[
"Lipmaa",
"Helger",
""
]
] |
cs/0302026 | Volodymyr Myrnyy | Volodymyr Myrnyy (Brandenburg University of Technology, Cottbus,
Germany) | Recursive function templates as a solution of linear algebra expressions
in C++ | Latex2e, 8 pages, 3 figures | null | null | null | cs.MS cs.PL | null | The article deals with a kind of recursive function templates in C++, where
the recursion is realized corresponding template parameters to achieve better
computational performance. Some specialization of these template functions ends
the recursion and can be implemented using optimized hardware dependent or
independent routines. The method is applied in addition to the known expression
templates technique to solve linear algebra expressions with the help of the
BLAS library. The whole implementation produces a new library, which keeps
object-oriented benefits and has a higher computational speed represented in
the tests.
| [
{
"version": "v1",
"created": "Wed, 19 Feb 2003 15:59:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Myrnyy",
"Volodymyr",
"",
"Brandenburg University of Technology, Cottbus,\n Germany"
]
] |
cs/0302027 | Alper Ungor | David Eppstein, John M. Sullivan, and Alper Ungor | Tiling space and slabs with acute tetrahedra | 20 pages; 17 figures; 1 table; see also
http://www.cs.duke.edu/~ungor/abstracts/acute_tiling.html | Computational Geometry Theory & Applications 27(3):237-255, 2004 | 10.1016/j.comgeo.2003.11.003 | null | cs.CG math.MG | null | We show it is possible to tile three-dimensional space using only tetrahedra
with acute dihedral angles. We present several constructions to achieve this,
including one in which all dihedral angles are less than $77.08^\circ$, and
another which tiles a slab in space.
| [
{
"version": "v1",
"created": "Wed, 19 Feb 2003 20:40:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Sullivan",
"John M.",
""
],
[
"Ungor",
"Alper",
""
]
] |
cs/0302029 | Alejandro Javier Garcia | Alejandro Javier Garcia and Guillermo Ricardo Simari | Defeasible Logic Programming: An Argumentative Approach | 43 pages, to appear in the journal "Theory and Practice of Logic
Programming" | null | null | null | cs.AI | null | The work reported here introduces Defeasible Logic Programming (DeLP), a
formalism that combines results of Logic Programming and Defeasible
Argumentation. DeLP provides the possibility of representing information in the
form of weak rules in a declarative manner, and a defeasible argumentation
inference mechanism for warranting the entailed conclusions.
In DeLP an argumentation formalism will be used for deciding between
contradictory goals. Queries will be supported by arguments that could be
defeated by other arguments. A query q will succeed when there is an argument A
for q that is warranted, ie, the argument A that supports q is found undefeated
by a warrant procedure that implements a dialectical analysis.
The defeasible argumentation basis of DeLP allows to build applications that
deal with incomplete and contradictory information in dynamic domains. Thus,
the resulting approach is suitable for representing agent's knowledge and for
providing an argumentation based reasoning mechanism to agents.
| [
{
"version": "v1",
"created": "Thu, 20 Feb 2003 00:48:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Garcia",
"Alejandro Javier",
""
],
[
"Simari",
"Guillermo Ricardo",
""
]
] |
cs/0302031 | Alper Ungor | Herbert Edelsbrunner and Alper Ungor | Relaxed Scheduling in Dynamic Skin Triangulation | 17 pages; 7 figures; 3 tables; see also
http://www.cs.duke.edu/~ungor/abstracts/schedule_skin.html | null | null | null | cs.CG | null | We introduce relaxed scheduling as a paradigm for mesh maintenance and
demonstrate its applicability to triangulating a skin surface in $\Rspace^3$.
| [
{
"version": "v1",
"created": "Thu, 20 Feb 2003 22:20:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Edelsbrunner",
"Herbert",
""
],
[
"Ungor",
"Alper",
""
]
] |
cs/0302032 | Philipp Koehn | Philipp Koehn and Kevin Knight | Empirical Methods for Compound Splitting | 8 pages, 2 figures. Published at EACL 2003 | null | null | null | cs.CL | null | Compounded words are a challenge for NLP applications such as machine
translation (MT). We introduce methods to learn splitting rules from
monolingual and parallel corpora. We evaluate them against a gold standard and
measure their impact on performance of statistical MT systems. Results show
accuracy of 99.1% and performance gains for MT of 0.039 BLEU on a
German-English noun phrase translation task.
| [
{
"version": "v1",
"created": "Sat, 22 Feb 2003 23:37:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Koehn",
"Philipp",
""
],
[
"Knight",
"Kevin",
""
]
] |
cs/0302033 | Raimondas Lencevicius | Sampsa Fabritius, Raimondas Lencevicius, Edu Metz, Alexander Ran | Experimental Software Schedulability Estimation For Varied Processor
Frequencies | 6 pages, 3 figures, published in the Proceedings of the Symposium on
Software Engineering at 21th IASTED International Multi-Conference on Applied
Informatics (AI 2003) | null | null | null | cs.SE cs.OS | null | This paper describes a new approach to experimentally estimate the
application schedulability for various processor frequencies. We use additional
workload generated by an artificial high priority routine to simulate the
frequency decrease of a processor. Then we estimate the schedulability of
applications at different frequencies. The results of such estimation can be
used to determine the frequencies and control algorithms of dynamic voltage
scaling/dynamic frequency scaling (DVS/DFS) implementations. The paper presents
a general problem description, the proposed schedulability estimation method,
its analysis and evaluation.
| [
{
"version": "v1",
"created": "Mon, 24 Feb 2003 22:03:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fabritius",
"Sampsa",
""
],
[
"Lencevicius",
"Raimondas",
""
],
[
"Metz",
"Edu",
""
],
[
"Ran",
"Alexander",
""
]
] |
cs/0302034 | Alexandre d'Aspremont | Alexandre d'Aspremont | Interest Rate Model Calibration Using Semidefinite Programming | null | Applied Mathematical Finance 10(3), pp. 183-213, September 2003 | null | CMAPX-491 | cs.CE | null | We show that, for the purpose of pricing Swaptions, the Swap rate and the
corresponding Forward rates can be considered lognormal under a single
martingale measure. Swaptions can then be priced as options on a basket of
lognormal assets and an approximation formula is derived for such options. This
formula is centered around a Black-Scholes price with an appropriate
volatility, plus a correction term that can be interpreted as the expected
tracking error. The calibration problem can then be solved very efficiently
using semidefinite programming.
| [
{
"version": "v1",
"created": "Tue, 25 Feb 2003 02:48:42 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Oct 2005 21:07:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
]
] |
cs/0302035 | Alexandre d'Aspremont | Alexandre d'Aspremont | Risk-Management Methods for the Libor Market Model Using Semidefinite
Programming | null | Journal of Computational Finance 8(4), pp. 77-99, Summer 2005 | null | null | cs.CE | null | When interest rate dynamics are described by the Libor Market Model as in
BGM97, we show how some essential risk-management results can be obtained from
the dual of the calibration program. In particular, if the objetive is to
maximize another swaption's price, we show that the optimal dual variables
describe a hedging portfolio in the sense of \cite{Avel96}. In the general
case, the local sensitivity of the covariance matrix to all market movement
scenarios can be directly computed from the optimal dual solution. We also show
how semidefinite programming can be used to manage the Gamma exposure of a
portfolio.
| [
{
"version": "v1",
"created": "Tue, 25 Feb 2003 03:09:11 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Oct 2005 21:28:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
]
] |
cs/0302036 | Evgueni Petrov | Evgueni Petrov, Eric Monfroy | Constraint-based analysis of composite solvers | submitted to AI SAC 2004 | null | null | null | cs.AI | null | Cooperative constraint solving is an area of constraint programming that
studies the interaction between constraint solvers with the aim of discovering
the interaction patterns that amplify the positive qualities of individual
solvers. Automatisation and formalisation of such studies is an important issue
of cooperative constraint solving.
In this paper we present a constraint-based analysis of composite solvers
that integrates reasoning about the individual solvers and the processed data.
The idea is to approximate this reasoning by resolution of set constraints on
the finite sets representing the predicates that express all the necessary
properties. We illustrate application of our analysis to two important
cooperation patterns: deterministic choice and loop.
| [
{
"version": "v1",
"created": "Tue, 25 Feb 2003 14:33:08 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Sep 2003 23:03:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petrov",
"Evgueni",
""
],
[
"Monfroy",
"Eric",
""
]
] |
cs/0302037 | Ilia Toli | Ilia Toli | Hidden Polynomial(s) Cryptosystems | 17 pages | null | null | null | cs.CR cs.SC | null | We propose variations of the class of hidden monomial cryptosystems in order
to make it resistant to all known attacks. We use identities built upon a
single bivariate polynomial equation with coefficients in a finite field.
Indeed, it can be replaced by a ``small'' ideal, as well. Throughout, we set up
probabilistic encryption protocols, too. The same ideas extend to digital
signature algorithms, as well. Our schemes work as well on differential fields
of positive characteristic, and elsewhere.
| [
{
"version": "v1",
"created": "Wed, 26 Feb 2003 18:30:49 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Feb 2003 20:21:31 GMT"
},
{
"version": "v3",
"created": "Tue, 11 Mar 2003 21:37:59 GMT"
},
{
"version": "v4",
"created": "Sat, 29 Mar 2003 14:00:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toli",
"Ilia",
""
]
] |
cs/0302038 | Esra Erdem | Esra Erdem and Vladimir Lifschitz | Tight Logic Programs | To appear in Special Issue of the Theory and Practice of Logic
Programming Journal on Answer Set Programming, 2003 | Theory and Practice of Logic Programming, 3(4--5):499--518, 2003. | null | null | cs.AI cs.LO | null | This note is about the relationship between two theories of negation as
failure -- one based on program completion, the other based on stable models,
or answer sets. Francois Fages showed that if a logic program satisfies a
certain syntactic condition, which is now called ``tightness,'' then its stable
models can be characterized as the models of its completion. We extend the
definition of tightness and Fages' theorem to programs with nested expressions
in the bodies of rules, and study tight logic programs containing the
definition of the transitive closure of a predicate.
| [
{
"version": "v1",
"created": "Fri, 28 Feb 2003 01:28:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erdem",
"Esra",
""
],
[
"Lifschitz",
"Vladimir",
""
]
] |
cs/0302039 | Barnabas Poczos | Barnabas Poczos, Andras Lorincz | Kalman-filtering using local interactions | null | null | null | null | cs.AI | null | There is a growing interest in using Kalman-filter models for brain
modelling. In turn, it is of considerable importance to represent Kalman-filter
in connectionist forms with local Hebbian learning rules. To our best
knowledge, Kalman-filter has not been given such local representation. It seems
that the main obstacle is the dynamic adaptation of the Kalman-gain. Here, a
connectionist representation is presented, which is derived by means of the
recursive prediction error method. We show that this method gives rise to
attractive local learning rules and can adapt the Kalman-gain.
| [
{
"version": "v1",
"created": "Fri, 28 Feb 2003 18:32:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Poczos",
"Barnabas",
""
],
[
"Lorincz",
"Andras",
""
]
] |
cs/0303002 | Applied Math | V. P. Maslov | About compression of vocabulary in computer oriented languages | Latex, 7 pages | null | null | null | cs.CL | null | The author uses the entropy of the ideal Bose-Einstein gas to minimize losses
in computer-oriented languages.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2003 08:50:42 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Mar 2003 12:34:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maslov",
"V. P.",
""
]
] |
cs/0303003 | Gianluca Argentini | Gianluca Argentini | A first approach for a possible cellular automaton model of fluids
dynamics | 7 pages, 6 figures, Computational Fluidodynamics, Cellular Automata
model | null | null | null | cs.CC cs.DC nlin.CG physics.comp-ph | null | In this paper I present a first attempt for a possible description of fluids
dynamics by mean of a cellular automata technique. With the use of simple and
elementary rules, based on random behaviour either, the model permits to obtain
the evolution in time for a two-dimensional grid, where one molecule of the
material fluid can ideally place itself on a single geometric square. By mean
of computational simulations, some realistic effects, here showed by use of
digital pictures, have been obtained. In a subsequent step of this work I think
to use a parallel program for a high performances computational simulation, for
increasing the degree of realism of the digital rendering by mean of a
three-dimensional grid too. For the execution of the simulations, numerical
methods of resolution for differential equations have not been used.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2003 00:02:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0303005 | H. Ballhausen | H. Ballhausen | Fair Solution to the Reader-Writer-Problem with Semaphores only | 2 pages | null | null | null | cs.DC | null | The reader-writer-problem is a standard problem in concurrent programming. A
resource is shared by several processes which need either inclusive reading or
exclusive writing access. The known solutions to this problem typically involve
a number of global counters and queues. Here a very simple algorithm is
presented which needs only two semaphores for synchronisation and no other
global objects. The approach yields a fair solution without starving.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2003 17:15:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ballhausen",
"H.",
""
]
] |
cs/0303006 | Carlos Gershenson | Carlos Gershenson | On the Notion of Cognition | 6 pages, 2 figures | null | null | null | cs.AI | null | We discuss philosophical issues concerning the notion of cognition basing
ourselves in experimental results in cognitive sciences, especially in computer
simulations of cognitive systems. There have been debates on the "proper"
approach for studying cognition, but we have realized that all approaches can
be in theory equivalent. Different approaches model different properties of
cognitive systems from different perspectives, so we can only learn from all of
them. We also integrate ideas from several perspectives for enhancing the
notion of cognition, such that it can contain other definitions of cognition as
special cases. This allows us to propose a simple classification of different
types of cognition.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2003 18:20:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gershenson",
"Carlos",
""
]
] |
cs/0303007 | Victor Kromer | Kromer Victor | Glottochronology and problems of protolanguage reconstruction | 17 pages, 9 figures. In Russian | null | null | null | cs.CL | null | A method of languages genealogical trees construction is proposed.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2003 05:15:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Victor",
"Kromer",
""
]
] |
cs/0303008 | Givi Bolotashvili | Givi Bolotashvili | Solution of the Linear Ordering Problem (NP=P) | null | null | null | null | cs.CC cs.DM | null | A polynomial algorithm is obtained for the NP-complete linear ordering
problem.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2003 13:53:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bolotashvili",
"Givi",
""
]
] |
cs/0303009 | Tomi Janhunen | T. Janhunen, I. Niemela, D. Seipel, P. Simons, J. You | Unfolding Partiality and Disjunctions in Stable Model Semantics | 49 pages, 4 figures, 1 table | null | null | null | cs.AI | null | The paper studies an implementation methodology for partial and disjunctive
stable models where partiality and disjunctions are unfolded from a logic
program so that an implementation of stable models for normal
(disjunction-free) programs can be used as the core inference engine. The
unfolding is done in two separate steps. Firstly, it is shown that partial
stable models can be captured by total stable models using a simple linear and
modular program transformation. Hence, reasoning tasks concerning partial
stable models can be solved using an implementation of total stable models.
Disjunctive partial stable models have been lacking implementations which now
become available as the translation handles also the disjunctive case.
Secondly, it is shown how total stable models of disjunctive programs can be
determined by computing stable models for normal programs. Hence, an
implementation of stable models of normal programs can be used as a core engine
for implementing disjunctive programs. The feasibility of the approach is
demonstrated by constructing a system for computing stable models of
disjunctive programs using the smodels system as the core engine. The
performance of the resulting system is compared to that of dlv which is a
state-of-the-art special purpose system for disjunctive programs.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2003 14:29:32 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Jan 2004 14:27:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Janhunen",
"T.",
""
],
[
"Niemela",
"I.",
""
],
[
"Seipel",
"D.",
""
],
[
"Simons",
"P.",
""
],
[
"You",
"J.",
""
]
] |
cs/0303010 | Neeraj Mittal | Neeraj Mittal and Vijay K. Garg | Techniques and Applications of Computation Slicing | 50 pages, 14 figures | null | null | null | cs.DC cs.SE | null | Writing correct distributed programs is hard. In spite of extensive testing
and debugging, software faults persist even in commercial grade software. Many
distributed systems, especially those employed in safety-critical environments,
should be able to operate properly even in the presence of software faults.
Monitoring the execution of a distributed system, and, on detecting a fault,
initiating the appropriate corrective action is an important way to tolerate
such faults. This gives rise to the predicate detection problem which requires
finding a consistent cut of a given computation that satisfies a given global
predicate, if it exists.
Detecting a predicate in a computation is, however, an NP-complete problem.
To ameliorate the associated combinatorial explosion problem, we introduce the
notion of computation slice. Formally, the slice of a computation with respect
to a predicate is a (sub)computation with the least number of consistent cuts
that contains all consistent cuts of the computation satisfying the predicate.
To detect a predicate, rather than searching the state-space of the
computation, it is much more efficient to search the state-space of the slice.
We prove that the slice exists and is uniquely defined for all predicates. We
present efficient slicing algorithms for several useful classes of predicates.
We develop efficient heuristic algorithms for computing an approximate slice
for predicates for which computing the slice is otherwise provably intractable.
Our experimental results show that slicing can lead to an exponential
improvement over existing techniques for predicate detection in terms of time
and space.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2003 07:41:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mittal",
"Neeraj",
""
],
[
"Garg",
"Vijay K.",
""
]
] |
cs/0303011 | Wim H. Hesselink | Hui Gao, Jan Friso Groote, Wim H. Hesselink | Lock-free dynamic hash tables with open addressing | null | Distributed Computing 17 (2005) 21-42 | null | null | cs.DC cs.DS | null | We present an efficient lock-free algorithm for parallel accessible hash
tables with open addressing, which promises more robust performance and
reliability than conventional lock-based implementations. ``Lock-free'' means
that it is guaranteed that always at least one process completes its operation
within a bounded number of steps. For a single processor architecture our
solution is as efficient as sequential hash tables. On a multiprocessor
architecture this is also the case when all processors have comparable speeds.
The algorithm allows processors that have widely different speeds or come to a
halt. It can easily be implemented using C-like languages and requires on
average only constant time for insertion, deletion or accessing of elements.
The algorithm allows the hash tables to grow and shrink when needed.
Lock-free algorithms are hard to design correctly, even when apparently
straightforward. Ensuring the correctness of the design at the earliest
possible stage is a major challenge in any responsible system development. In
view of the complexity of the algorithm, we turned to the interactive theorem
prover PVS for mechanical support. We employ standard deductive verification
techniques to prove around 200 invariance properties of our algorithm, and
describe how this is achieved with the theorem prover PVS.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2003 09:38:34 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Apr 2004 09:05:30 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Jul 2004 12:51:56 GMT"
},
{
"version": "v4",
"created": "Wed, 27 Oct 2004 07:24:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gao",
"Hui",
""
],
[
"Groote",
"Jan Friso",
""
],
[
"Hesselink",
"Wim H.",
""
]
] |
cs/0303012 | Andrei M. Sukhov | Dmitry Dolgikh, Andrei Sukhov | The measurements, parameters and construction of Web proxy cache | 12 pages, 4 figures, 3 tables. Submitted to Compt. Comm | null | null | SSAU-02-13 | cs.NI | null | The aim of this paper is an experimental study of cache systems in order to
optimize proxy cache systems and to modernize construction principles. Our
investigations lead to the criteria for the optimal use of storage capacity and
allow the description of the basic effects of the ratio between construction
parts, steady-state performance, optimal size, etc. We want to outline that the
results obtained and the plan of the experiment follow from the theoretical
model. Special consideration is given to the modification of the key formulas
supposed by Wolman at al.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2003 15:42:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dolgikh",
"Dmitry",
""
],
[
"Sukhov",
"Andrei",
""
]
] |
cs/0303014 | Andrei M. Sukhov | Dmitry Dolgikh, Andrei Sukhov | Theoretical study of cache syatems | 17 pages, 5 figures, 1 tables. submitted to Ther. Com. Sc. A | null | null | SSAU-02-112 | cs.NI | null | The aim of this paper is a theoretical study of a cache system in order to
optimize proxy cache systems and to modernize construction principles including
prefetching schemes. Two types of correlations, Zipf-like distribution and
normalizing conditions, play a role of the fundamental laws. A corresponding
system of equations allows to describe the basic effects like ratio between
construction parts, steady-state performance, optimal size, long-term
prefetching, etc. A modification of the fundamental laws leads to the
description of new effects of documents' renewal in the global network. An
internet traffic caching system based on Zipf-like distribution (ZBS) is
invented. The additional module to the cache construction gives an effective
prefetching by lifetime.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2003 16:18:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dolgikh",
"Dmitry",
""
],
[
"Sukhov",
"Andrei",
""
]
] |
cs/0303015 | Nikolai Chernov | N. Chernov and C. Lesort | Statistical efficiency of curve fitting algorithms | 17 pages, 3 figures | null | null | null | cs.CV | null | We study the problem of fitting parametrized curves to noisy data. Under
certain assumptions (known as Cartesian and radial functional models), we
derive asymptotic expressions for the bias and the covariance matrix of the
parameter estimates. We also extend Kanatani's version of the Cramer-Rao lower
bound, which he proved for unbiased estimates only, to more general estimates
that include many popular algorithms (most notably, the orthogonal least
squares and algebraic fits). We then show that the gradient-weighted algebraic
fit is statistically efficient and describe all other statistically efficient
algebraic fits.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2003 21:30:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chernov",
"N.",
""
],
[
"Lesort",
"C.",
""
]
] |
cs/0303016 | Thomas Lippert | Thomas Duessel, Norbert Eicker, Florin Isaila, Thomas Lippert, Thomas
Moschny, Hartmut Neff, Klaus Schilling, Walter Tichy | Fast Parallel I/O on Cluster Computers | 22 pages, 10 figures | null | null | null | cs.DC cs.AR hep-lat | null | Today's cluster computers suffer from slow I/O, which slows down
I/O-intensive applications. We show that fast disk I/O can be achieved by
operating a parallel file system over fast networks such as Myrinet or Gigabit
Ethernet.
In this paper, we demonstrate how the ParaStation3 communication system helps
speed-up the performance of parallel I/O on clusters using the open source
parallel virtual file system (PVFS) as testbed and production system. We will
describe the set-up of PVFS on the Alpha-Linux-Cluster-Engine (ALiCE) located
at Wuppertal University, Germany. Benchmarks on ALiCE achieve
write-performances of up to 1 GB/s from a 32-processor compute-partition to a
32-processor PVFS I/O-partition, outperforming known benchmark results for PVFS
on the same network by more than a factor of 2. Read-performance from
buffer-cache reaches up to 2.2 GB/s. Our benchmarks are giant, I/O-intensive
eigenmode problems from lattice quantum chromodynamics, demonstrating stability
and performance of PVFS over Parastation in large-scale production runs.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2003 11:08:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Duessel",
"Thomas",
""
],
[
"Eicker",
"Norbert",
""
],
[
"Isaila",
"Florin",
""
],
[
"Lippert",
"Thomas",
""
],
[
"Moschny",
"Thomas",
""
],
[
"Neff",
"Hartmut",
""
],
[
"Schilling",
"Klaus",
""
],
[
"Tichy",
"Walter",
""
]
] |
cs/0303017 | Petro M. Gopych | Petro M. Gopych | A Neural Network Assembly Memory Model with Maximum-Likelihood Recall
and Recognition Properties | A report presented at the Vth International Congress on Mathematical
Modeling held in Dubna, Russia on September 30 - October 6, 2002 (Book of
Abstracts, vol. 2. p. 91), 39 pages, 5 Figures, 1 Table, 70 references | null | null | null | cs.AI cs.IR cs.NE q-bio.NC q-bio.QM | null | It has been shown that a neural network model recently proposed to describe
basic memory performance is based on a ternary/binary coding/decoding algorithm
which leads to a new neural network assembly memory model (NNAMM) providing
maximum-likelihood recall/recognition properties and implying a new memory unit
architecture with Hopfield two-layer network, N-channel time gate, auxiliary
reference memory, and two nested feedback loops. For the data coding used,
conditions are found under which a version of Hopfied network implements
maximum-likelihood convolutional decoding algorithm and, simultaneously, linear
statistical classifier of arbitrary binary vectors with respect to Hamming
distance between vector analyzed and reference vector given. In addition to
basic memory performance and etc, the model explicitly describes the dependence
on time of memory trace retrieval, gives a possibility of one-trial learning,
metamemory simulation, generalized knowledge representation, and distinct
description of conscious and unconscious mental processes. It has been shown
that an assembly memory unit may be viewed as a model of a smallest inseparable
part or an 'atom' of consciousness. Some nontraditional neurobiological
backgrounds (dynamic spatiotemporal synchrony, properties of time dependent and
error detector neurons, early precise spike firing, etc) and the model's
application to solve some interdisciplinary problems from different scientific
fields are discussed.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2003 23:17:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gopych",
"Petro M.",
""
]
] |
cs/0303018 | Hedvig Sidenbladh | Hedvig Sidenbladh | Multi-target particle filtering for the probability hypothesis density | Submitted to International Conference on Information Fusion 2003 | null | null | null | cs.AI | null | When tracking a large number of targets, it is often computationally
expensive to represent the full joint distribution over target states. In cases
where the targets move independently, each target can instead be tracked with a
separate filter. However, this leads to a model-data association problem.
Another approach to solve the problem with computational complexity is to track
only the first moment of the joint distribution, the probability hypothesis
density (PHD). The integral of this distribution over any area S is the
expected number of targets within S. Since no record of object identity is
kept, the model-data association problem is avoided.
The contribution of this paper is a particle filter implementation of the PHD
filter mentioned above. This PHD particle filter is applied to tracking of
multiple vehicles in terrain, a non-linear tracking problem. Experiments show
that the filter can track a changing number of vehicles robustly, achieving
near-real-time performance.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2003 13:48:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sidenbladh",
"Hedvig",
""
]
] |
cs/0303019 | Sebastien Jodogne | Bernard Boigelot, Sebastien Jodogne and Pierre Wolper | An Effective Decision Procedure for Linear Arithmetic with Integer and
Real Variables | 20 pages, 6 figures | null | null | null | cs.LO | null | This paper considers finite-automata based algorithms for handling linear
arithmetic with both real and integer variables. Previous work has shown that
this theory can be dealt with by using finite automata on infinite words, but
this involves some difficult and delicate to implement algorithms. The
contribution of this paper is to show, using topological arguments, that only a
restricted class of automata on infinite words are necessary for handling real
and integer linear arithmetic. This allows the use of substantially simpler
algorithms, which have been successfully implemented.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2003 17:05:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boigelot",
"Bernard",
""
],
[
"Jodogne",
"Sebastien",
""
],
[
"Wolper",
"Pierre",
""
]
] |
cs/0303020 | Jeffrey B. Smith | Jeffrey B. Smith | Complex Systems | 14 pages | null | null | null | cs.NI | null | The study of Complex Systems is considered by many to be a new scientific
field, and is distinguished by being a discipline that has applications within
many separate areas of scientific study. The study of Neural Networks, Traffic
Patterns, Artificial Intelligence, Social Systems, and many other scientific
areas can all be considered to fall within the realm of Complex Systems, and
can be studied from this new perspective. The advent of more capable computer
systems has allowed these systems to be simulated and modeled with far greater
ease, and new understanding of computer modeling approaches has allowed the
fledgling science to be studied as never before.
The preliminary focus of this paper will be to provide a general overview of
the science of Complex Systems, including terminology, definitions, history,
and examples. I will attempt to look at some of the most important trends in
different areas of research, and give a general overview of research methods
that have been used in parallel with computer modeling. Also, I will further
define the areas of the science that concern themselves with computer modeling
and simulation, and I will attempt to make it clear why the science only came
into its own when the proper modeling and simulation tools were finally
available. In addition, although there seems to be general agreement between
different authors and institutes regarding the generalities of the study, there
are some differences in terminology and methodology. I have attempted in this
paper to bring as many elements together as possible, as far as the scope of
the subject is concerned, without losing focus by studying Complex System
techniques that are bound to one particular area of scientific study, unless
that area is that of computer modeling.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2003 18:11:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smith",
"Jeffrey B.",
""
]
] |
cs/0303021 | Ke Xu | Wei Li | A Development Calculus for Specifications | 14 pages with some minor errors in the original version corrected | null | null | null | cs.LO cs.PL | null | A first order inference system, called R-calculus, is defined to develop the
specifications. It is used to eliminate the laws which is not consistent with
the user's requirements. The R-calculus consists of the structural rules, an
axiom, a cut rule, and the rules for logical connectives. Some examples are
given to demonstrate the usage of the R-calculus. The properties about
reachability and completeness of the R-calculus are formally defined and are
proved.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2003 08:23:33 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Apr 2003 09:54:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Wei",
""
]
] |
cs/0303022 | Jean-Camille Birget | Dawei Hong, Jean-Camille Birget, Shushuang Man | Probabilistic behavior of hash tables | null | null | null | null | cs.DS cs.DB | null | We extend a result of Goldreich and Ron about estimating the collision
probability of a hash function. Their estimate has a polynomial tail. We prove
that when the load factor is greater than a certain constant, the estimator has
a gaussian tail. As an application we find an estimate of an upper bound for
the average search time in hashing with chaining, for a particular user (we
allow the overall key distribution to be different from the key distribution of
a particular user). The estimator has a gaussian tail.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2003 17:25:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hong",
"Dawei",
""
],
[
"Birget",
"Jean-Camille",
""
],
[
"Man",
"Shushuang",
""
]
] |
cs/0303023 | Carlos Gershenson | A. Das, G. Mayer-Kress, C. Gershenson, P. Das | Conferences with Internet Web-Casting as Binding Events in a Global
Brain: Example Data From Complexity Digest | 4 pages, 4 figures | null | null | null | cs.NI cs.AI | null | There is likeness of the Internet to human brains which has led to the
metaphor of the world-wide computer network as a `Global Brain'. We consider
conferences as 'binding events' in the Global Brain that can lead to
metacognitive structures on a global scale. One of the critical factors for
that phenomenon to happen (similar to the biological brain) are the time-scales
characteristic for the information exchange. In an electronic newsletter- the
Complexity Digest (ComDig) we include webcasting of audio (mp3) and video (asf)
files from international conferences in the weekly ComDig issues. Here we
present the time variation of the weekly rate of accesses to the conference
files. From those empirical data it appears that the characteristic time-scales
related to access of web-casting files is of the order of a few weeks. This is
at least an order of magnitude shorter than the characteristic time-scales of
peer reviewed publications and conference proceedings. We predict that this
observation will have profound implications on the nature of future conference
proceedings, presumably in electronic form.
| [
{
"version": "v1",
"created": "Sat, 22 Mar 2003 13:13:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Das",
"A.",
""
],
[
"Mayer-Kress",
"G.",
""
],
[
"Gershenson",
"C.",
""
],
[
"Das",
"P.",
""
]
] |
cs/0303024 | R. Andrew Hicks | R. Andrew Hicks | Differential Methods in Catadioptric Sensor Design with Applications to
Panoramic Imaging | 8 pages, 7 figures | null | null | null | cs.CV cs.RO | null | We discuss design techniques for catadioptric sensors that realize given
projections. In general, these problems do not have solutions, but approximate
solutions may often be found that are visually acceptable. There are several
methods to approach this problem, but here we focus on what we call the
``vector field approach''. An application is given where a true panoramic
mirror is derived, i.e. a mirror that yields a cylindrical projection to the
viewer without any digital unwarping.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2003 02:36:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hicks",
"R. Andrew",
""
]
] |
cs/0303026 | Petros Maniatis | Petros Maniatis, Mema Roussopoulos, TJ Giuli, David S. H. Rosenthal,
Mary Baker, Yanto Muliadi | Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS | 25 Pages, 10 figures. Extended version of conference paper | null | null | null | cs.DC cs.DL | null | The LOCKSS project has developed and deployed in a world-wide test a
peer-to-peer system for preserving access to journals and other archival
information published on the Web. It consists of a large number of independent,
low-cost, persistent web caches that cooperate to detect and repair damage to
their content by voting in "opinion polls." Based on this experience, we
present a design for and simulations of a novel protocol for voting in systems
of this kind. It incorporates rate limitation and intrusion detection to ensure
that even some very powerful adversaries attacking over many years have only a
small probability of causing irrecoverable damage before being detected.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2003 20:11:57 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Mar 2003 02:42:17 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Oct 2003 04:00:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maniatis",
"Petros",
""
],
[
"Roussopoulos",
"Mema",
""
],
[
"Giuli",
"TJ",
""
],
[
"Rosenthal",
"David S. H.",
""
],
[
"Baker",
"Mary",
""
],
[
"Muliadi",
"Yanto",
""
]
] |
cs/0303027 | Fang Yu | Farn Wang, Geng-Dian Hwang and Fang Yu | Numerical Coverage Estimation for the Symbolic Simulation of Real-Time
Systems | 27 pages | null | null | null | cs.SE cs.SC | null | Three numerical coverage metrics for the symbolic simulation of dense-time
systems and their estimation methods are presented. Special techniques to
derive numerical estimations of dense-time state-spaces have also been
developed. Properties of the metrics are also discussed with respect to four
criteria. Implementation and experiments are then reported.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2003 21:57:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Farn",
""
],
[
"Hwang",
"Geng-Dian",
""
],
[
"Yu",
"Fang",
""
]
] |
cs/0303028 | Shi Zhou | Shi Zhou and Raul J. Mondragon | The missing links in the BGP-based AS connectivity maps | PAM2003 - The Passive and Active Measurement
Workshop(http://www.pam2003.org), San Diego, USA, April 2003 | null | null | null | cs.NI | null | A number of recent studies of the Internet topology at the autonomous systems
level (AS graph) are based on the BGP-based AS connectivity maps (original
maps). The so-called extended maps use additional data sources and contain more
complete pictures of the AS graph. In this paper, we compare an original map,
an extended map and a synthetic map generated by the Barabasi-Albert model. We
examine the recently reported rich-club phenomenon, alternative routing paths
and attack tolerance. We point out that the majority of the missing links of
the original maps are the connecting links between rich nodes (nodes with large
numbers of links) of the extended maps. We show that the missing links are
relevant because links between rich nodes can be crucial for the network
structure.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2003 12:03:53 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Apr 2003 14:46:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Shi",
""
],
[
"Mondragon",
"Raul J.",
""
]
] |
cs/0303030 | Shi Zhou | Shi Zhou, Raul J. Mondragon | Analyzing and modelling the AS-level Internet topology | To be appeared in proceedings of the HET-NETs' 03 (First
International Working Conference on Performance Modelling and Evaluation of
Heterogeneous Networks), York, UK, July 2003 | null | null | null | cs.NI | null | Recently we introduced the rich-club phenomenon as a quantitative metric to
characterize the tier structure of the Autonomous Systems level Internet
topology (AS graph) and we proposed the Interactive Growth (IG) model, which
closely matches the degree distribution and hierarchical structure of the AS
graph and compares favourble with other available Internet power-law topology
generators. Our research was based on the widely used BGP AS graph obtained
from the Oregon BGP routing tables. Researchers argue that Traceroute AS graph,
extracted from the traceroute data collected by the CAIDA's active probing
tool, Skitter, is more complete and reliable. To be prudent, in this paper we
analyze and compare topological structures of Traceroute AS graph and BGP AS
graph. Also we compare with two synthetic Internet topologies generated by the
IG model and the well-known Barabasi-Albert (BA) model. Result shows that both
AS graphs show the rich-club phenomenon and have similar tier structures, which
are closely matched by the IG model, however the BA model does not show the
rich-club phenomenon at all.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2003 12:31:13 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Apr 2003 14:45:05 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Jun 2003 11:37:31 GMT"
},
{
"version": "v4",
"created": "Mon, 30 Jun 2003 16:04:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Shi",
""
],
[
"Mondragon",
"Raul J.",
""
]
] |
cs/0303031 | Massimo Di Pierro | Massimo Di Pierro | A Bird's eye view of Matrix Distributed Processing | null | Proceedings of the ICCSA 2003 Conference | null | null | cs.DC cs.CE cs.DM cs.MS hep-lat physics.comp-ph | null | We present Matrix Distributed Processing, a C++ library for fast development
of efficient parallel algorithms. MDP is based on MPI and consists of a
collection of C++ classes and functions such as lattice, site and field. Once
an algorithm is written using these components the algorithm is automatically
parallel and no explicit call to communication functions is required. MDP is
particularly suitable for implementing parallel solvers for multi-dimensional
differential equations and mesh-like problems.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2003 20:47:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Di Pierro",
"Massimo",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.