id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0303032
Marc Toussaint
Christian Igel and Marc Toussaint
Recent Results on No-Free-Lunch Theorems for Optimization
10 pages, LaTeX, see http://www.neuroinformatik.rub.de/PROJECTS/SONN/
null
null
null
cs.NE math.OC nlin.AO
null
The sharpened No-Free-Lunch-theorem (NFL-theorem) states that the performance of all optimization algorithms averaged over any finite set F of functions is equal if and only if F is closed under permutation (c.u.p.) and each target function in F is equally likely. In this paper, we first summarize some consequences of this theorem, which have been proven recently: The average number of evaluations needed to find a desirable (e.g., optimal) solution can be calculated; the number of subsets c.u.p. can be neglected compared to the overall number of possible subsets; and problem classes relevant in practice are not likely to be c.u.p. Second, as the main result, the NFL-theorem is extended. Necessary and sufficient conditions for NFL-results to hold are given for arbitrary, non-uniform distributions of target functions. This yields the most general NFL-theorem for optimization presented so far.
[ { "version": "v1", "created": "Mon, 31 Mar 2003 14:46:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Igel", "Christian", "" ], [ "Toussaint", "Marc", "" ] ]
cs/0303033
David S. H. Rosenthal
David S. H. Rosenthal
A Digital Preservation Appliance Based on OpenBSD
12 pages
Proceedings of BSDcon, 2003
null
null
cs.DC cs.DL
null
The LOCKSS program has developed and deployed in a world-wide test a system for preserving access to academic journals published on the Web. The fundamental problem for any digital preservation system is that it must be affordable for the long term. To reduce the cost of ownership, the LOCKSS system uses generic PC hardware, open source software, and peer-to-peer technology. It is packaged as a ``network appliance'', a single-function box that can be connected to the Internet, configured and left alone to do its job with minimal monitoring or administration. The first version of this system was based on a Linux boot floppy. After three years of testing it was replaced by a second version, based on OpenBSD and booting from CD-ROM. We focus in this paper on the design, implementation and deployment of a network appliance based on an open source operating system. We provide an overview of the LOCKSS application and describe the experience of deploying and supporting its first version. We list the requirements we took from this to drive the design of the second version, describe how we satisfied them in the OpenBSD environment, and report on the initial
[ { "version": "v1", "created": "Sun, 30 Mar 2003 18:46:46 GMT" }, { "version": "v2", "created": "Sat, 12 Apr 2003 15:05:11 GMT" }, { "version": "v3", "created": "Sun, 21 Nov 2004 23:54:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosenthal", "David S. H.", "" ] ]
cs/0304001
Norman G. Vinson
Norman G. Vinson
Design Guidelines for Landmarks to Support Navigation in Virtual Environments
9 pages, 1 figure
Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit, p.278-285, May 15-20, 1999, Pittsburgh, Pennsylvania, United States
null
NRC 43578
cs.HC
null
Unfamiliar, large-scale virtual environments are difficult to navigate. This paper presents design guidelines to ease navigation in such virtual environments. The guidelines presented here focus on the design and placement of landmarks in virtual environments. Moreover, the guidelines are based primarily on the extensive empirical literature on navigation in the real world. A rationale for this approach is provided by the similarities between navigational behavior in real and virtual environments.
[ { "version": "v1", "created": "Mon, 31 Mar 2003 22:49:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Vinson", "Norman G.", "" ] ]
cs/0304002
Paul M. Aoki
Paul M. Aoki, Matthew Romaine, Margaret H. Szymanski, James D. Thornton, Daniel Wilson, Allison Woodruff
The Mad Hatter´s Cocktail Party: A Social Mobile Audio Space Supporting Multiple Simultaneous Conversations
8 pages
Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems, Ft. Lauderdale, FL, Apr. 2003, 425-432. ACM Press.
10.1145/642611.642686
null
cs.HC cs.SD
null
This paper presents a mobile audio space intended for use by gelled social groups. In face-to-face interactions in such social groups, conversational floors change frequently, e.g., two participants split off to form a new conversational floor, a participant moves from one conversational floor to another, etc. To date, audio spaces have provided little support for such dynamic regroupings of participants, either requiring that the participants explicitly specify with whom they wish to talk or simply presenting all participants as though they are in a single floor. By contrast, the audio space described here monitors participant behavior to identify conversational floors as they emerge. The system dynamically modifies the audio delivered to each participant to enhance the salience of the participants with whom they are currently conversing. We report a user study of the system, focusing on conversation analytic results.
[ { "version": "v1", "created": "Tue, 1 Apr 2003 05:15:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Aoki", "Paul M.", "" ], [ "Romaine", "Matthew", "" ], [ "Szymanski", "Margaret H.", "" ], [ "Thornton", "James D.", "" ], [ "Wilson", "Daniel", "" ], [ "Woodruff", "Allison", "" ] ]
cs/0304003
Fang Yu
Farn Wang, Geng-Dian Hwang and Fang Yu
TCTL Inevitability Analysis of Dense-time Systems
22 pages
null
null
null
cs.SC
null
Inevitability properties in branching temporal logics are of the syntax forall eventually \phi, where \phi is an arbitrary (timed) CTL formula. In the sense that "good things will happen", they are parallel to the "liveness" properties in linear temporal logics. Such inevitability properties in dense-time logics can be analyzed with greatest fixpoint calculation. We present algorithms to model-check inevitability properties both with and without requirement of non-Zeno computations. We discuss a technique for early decision on greatest fixpoints in the temporal logics, and experiment with the effect of non-Zeno computations on the evaluation of greatest fixpoints. We also discuss the TCTL subclass with only universal path quantifiers which allows for the safe abstraction analysis of inevitability properties. Finally, we report our implementation and experiments to show the plausibility of our ideas.
[ { "version": "v1", "created": "Tue, 1 Apr 2003 07:28:29 GMT" }, { "version": "v2", "created": "Tue, 20 May 2003 03:07:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Farn", "" ], [ "Hwang", "Geng-Dian", "" ], [ "Yu", "Fang", "" ] ]
cs/0304004
Martin Ziegler
Martin Ziegler
Quasi-Optimal Arithmetic for Quaternion Polynomials
published version (11 pages) plus appendix (2 pages)
pp.705-715 in Proc.14th ISAAC (2003), Springer LNCS 2906
null
null
cs.SC
null
Fast algorithms for arithmetic on real or complex polynomials are well-known and have proven to be not only asymptotically efficient but also very practical. Based on Fast Fourier Transform (FFT), they for instance multiply two polynomials of degree up to N or multi-evaluate one at N points simultaneously within quasi-linear time O(N.polylog N). An extension to (and in fact the mere definition of) polynomials over the skew-field H of quaternions is promising but still missing. The present work proposes three such definitions which in the commutative case coincide but for H turn out to differ, each one satisfying some desirable properties while lacking others. For each notion we devise algorithms for according arithmetic; these are quasi-optimal in that their running times match lower complexity bounds up to polylogarithmic factors.
[ { "version": "v1", "created": "Tue, 1 Apr 2003 19:21:21 GMT" }, { "version": "v2", "created": "Fri, 2 Jan 2004 12:10:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Ziegler", "Martin", "" ] ]
cs/0304005
Oded Regev
Oded Regev
Quantum Computation and Lattice Problems
null
null
null
null
cs.DS
null
We present the first explicit connection between quantum computation and lattice problems. Namely, we show a solution to the Unique Shortest Vector Problem (SVP) under the assumption that there exists an algorithm that solves the hidden subgroup problem on the dihedral group by coset sampling. Moreover, we solve the hidden subgroup problem on the dihedral group by using an average case subset sum routine. By combining the two results, we get a quantum reduction from $\Theta(n^{2.5})$-unique-SVP to the average case subset sum problem.
[ { "version": "v1", "created": "Tue, 1 Apr 2003 23:35:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Regev", "Oded", "" ] ]
cs/0304006
Lillian Lee
Regina Barzilay and Lillian Lee
Learning to Paraphrase: An Unsupervised Approach Using Multiple-Sequence Alignment
Proceedings of HLT-NAACL 2003 (Human Language Technology Conference)
null
null
null
cs.CL
null
We address the text-to-text generation problem of sentence-level paraphrasing -- a phenomenon distinct from and more difficult than word- or phrase-level paraphrasing. Our approach applies multiple-sequence alignment to sentences gathered from unannotated comparable corpora: it learns a set of paraphrasing patterns represented by word lattice pairs and automatically determines how to apply these patterns to rewrite new sentences. The results of our evaluation experiments show that the system derives accurate paraphrases, outperforming baseline systems.
[ { "version": "v1", "created": "Wed, 2 Apr 2003 23:02:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Barzilay", "Regina", "" ], [ "Lee", "Lillian", "" ] ]
cs/0304007
Gonzalo Alvarez
Slobodan Petrovic, Gonzalo Alvarez
A Method for Clustering Web Attacks Using Edit Distance
10 pages, 2 figures, latex format
null
null
null
cs.IR cs.AI cs.CR
null
Cluster analysis often serves as the initial step in the process of data classification. In this paper, the problem of clustering different length input data is considered. The edit distance as the minimum number of elementary edit operations needed to transform one vector into another is used. A heuristic for clustering unequal length vectors, analogue to the well known k-means algorithm is described and analyzed. This heuristic determines cluster centroids expanding shorter vectors to the lengths of the longest ones in each cluster in a specific way. It is shown that the time and space complexities of the heuristic are linear in the number of input vectors. Experimental results on real data originating from a system for classification of Web attacks are given.
[ { "version": "v1", "created": "Thu, 3 Apr 2003 10:17:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrovic", "Slobodan", "" ], [ "Alvarez", "Gonzalo", "" ] ]
cs/0304008
Stephen A. Fenner
Stephen A. Fenner
A Physics-Free Introduction to the Quantum Computation Model
18 pages, 18 figures. Expanded write-up for BEATCS of introductory talk given at Dagstuhl Seminar 02421, "Algebraic Methods in Quantum and Classical Models of Computation," October 2002
Bulletin of the European Association for Theoretical Computer Science, 79(Feb 2003), 69-85
null
null
cs.CC quant-ph
null
This article defines and proves basic properties of the standard quantum circuit model of computation. The model is developed abstractly in close analogy with (classical) deterministic and probabilistic circuits, without recourse to any physical concepts or principles. It is intended as a primer for theoretical computer scientists who do not know--and perhaps do not care to know--any physics.
[ { "version": "v1", "created": "Fri, 4 Apr 2003 20:01:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Fenner", "Stephen A.", "" ] ]
cs/0304009
Gilles Daniel
Gilles Daniel
Stochastic Volatility in a Quantitative Model of Stock Market Returns
MSc thesis (2002), 83 pages, 15 figures
null
null
null
cs.CE
null
Standard quantitative models of the stock market predict a log-normal distribution for stock returns (Bachelier 1900, Osborne 1959), but it is recognised (Fama 1965) that empirical data, in comparison with a Gaussian, exhibit leptokurtosis (it has more probability mass in its tails and centre) and fat tails (probabilities of extreme events are underestimated). Different attempts to explain this departure from normality have coexisted. In particular, since one of the strong assumptions of the Gaussian model concerns the volatility, considered finite and constant, the new models were built on a non finite (Mandelbrot 1963) or non constant (Cox, Ingersoll and Ross 1985) volatility. We investigate in this thesis a very recent model (Dragulescu et al. 2002) based on a Brownian motion process for the returns, and a stochastic mean-reverting process for the volatility. In this model, the forward Kolmogorov equation that governs the time evolution of returns is solved analytically. We test this new theory against different stock indexes (Dow Jones Industrial Average, Standard and Poor s and Footsie), over different periods (from 20 to 105 years). Our aim is to compare this model with the classical Gaussian and with a simple Neural Network, used as a benchmark. We perform the usual statistical tests on the kurtosis and tails of the expected distributions, paying particular attention to the outliers. As claimed by the authors, the new model outperforms the Gaussian for any time lag, but is artificially too complex for medium and low frequencies, where the Gaussian is preferable. Moreover this model is still rejected for high frequencies, at a 0.05 level of significance, due to the kurtosis, incorrectly handled.
[ { "version": "v1", "created": "Mon, 7 Apr 2003 17:37:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Daniel", "Gilles", "" ] ]
cs/0304011
Goncalo Carvalho
Paul Anderson and Goncalo Carvalho
Embedded Reflection Mapping
null
null
null
null
cs.GR
null
Environment maps are used to simulate reflections off curved objects. We present a technique to reflect a user, or a group of users, in a real environment, onto a virtual object, in a virtual reality application, using the live video feeds from a set of cameras, in real-time. Our setup can be used in a variety of environments ranging from outdoor or indoor scenes.
[ { "version": "v1", "created": "Tue, 8 Apr 2003 14:17:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Anderson", "Paul", "" ], [ "Carvalho", "Goncalo", "" ] ]
cs/0304012
Paul Vitanyi
Harry Buhrman (CWI and University of Amsterdam), Hartmut Klauck (IAS, Princeton), Nikolai Vereshchagin (Moscow University), Paul Vitanyi (CWI and University of Amsterdam)
Individual Communication Complexity
11 pages, LaTeX
null
null
null
cs.CC cs.DC
null
We initiate the theory of communication complexity of individual inputs held by the agents, rather than worst-case or average-case. We consider total, partial, and partially correct protocols, one-way versus two-way, with and without help bits. The results are expressed in trems of Kolmogorov complexity.
[ { "version": "v1", "created": "Tue, 8 Apr 2003 15:41:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Buhrman", "Harry", "", "CWI and University of Amsterdam" ], [ "Klauck", "Hartmut", "", "IAS,\n Princeton" ], [ "Vereshchagin", "Nikolai", "", "Moscow University" ], [ "Vitanyi", "Paul", "", "CWI and\n University of Amsterdam" ] ]
cs/0304013
Ilia Toli
Ilia Toli
Hidden Polynomial(s) Cryptosystems
null
null
null
null
cs.CR cs.SC
null
We propose public-key cryptosystems with public key a system of polynomial equations, algebraic or differential, and private key a single polynomial or a small-size ideal. We set up probabilistic encryption, signature, and signcryption protocols.
[ { "version": "v1", "created": "Wed, 9 Apr 2003 12:28:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Toli", "Ilia", "" ] ]
cs/0304014
Andreas Winter
Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
Commitment Capacity of Discrete Memoryless Channels
20 pages, LaTeX2e
Proc. 9th Cirencester Crypto and Coding Conf., LNCS 2989, pp 35-51, Springer, Berlin 2003.
null
null
cs.CR quant-ph
null
In extension of the bit commitment task and following work initiated by Crepeau and Kilian, we introduce and solve the problem of characterising the optimal rate at which a discrete memoryless channel can be used for bit commitment. It turns out that the answer is very intuitive: it is the maximum equivocation of the channel (after removing trivial redundancy), even when unlimited noiseless bidirectional side communication is allowed. By a well-known reduction, this result provides a lower bound on the channel's capacity for implementing coin tossing, which we conjecture to be an equality. The method of proving this relates the problem to Wyner's wire--tap channel in an amusing way. We also discuss extensions to quantum channels.
[ { "version": "v1", "created": "Thu, 10 Apr 2003 13:55:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Winter", "Andreas", "" ], [ "Nascimento", "Anderson C. A.", "" ], [ "Imai", "Hideki", "" ] ]
cs/0304015
Judith Beumer
Xuehai Zhang, Jeffrey Freschl, and Jennifer M. Schopf
A Performance Study of Monitoring and Information Services for Distributed Systems
12 pages, 20 figures
null
null
Preprint ANL/MCS-P1040-0403
cs.PF
null
Monitoring and information services form a key component of a distributed system, or Grid. A quantitative study of such services can aid in understanding the performance limitations, advise in the deployment of the systems, and help evaluate future development work. To this end, we study the performance of three monitoring and information services for distributed systems: the Globus Toolkit's Monitoring and Discovery Service (MDS), the European Data Grid Relational Grid Monitoring Architecture (R-GMA), and Hawkeye, part of the Condor project. We perform experiments to test their scalability with respect to number of users, number of resources, and amount of data collected. Our study shows that each approach has different behaviors, often due to their different design goals. In the four sets of experiments we conducted to evaluate the performance of the service components under different circumstances, we found a strong advantage to caching or prefetching the data, as well as the need to have primary components at well connected sites due to high load seen by all systems.
[ { "version": "v1", "created": "Thu, 10 Apr 2003 14:01:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Xuehai", "" ], [ "Freschl", "Jeffrey", "" ], [ "Schopf", "Jennifer M.", "" ] ]
cs/0304017
Nachum Dershowitz
Nachum Dershowitz
Ground Canonicity
null
null
null
null
cs.LO
null
We explore how different proof orderings induce different notions of saturation. We relate completion, paramodulation, saturation, redundancy elimination, and rewrite system reduction to proof orderings.
[ { "version": "v1", "created": "Thu, 10 Apr 2003 20:08:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Dershowitz", "Nachum", "" ] ]
cs/0304018
David Eppstein
David Eppstein
Quasiconvex Analysis of Backtracking Algorithms
12 pages, 2 figures. This revision includes a larger example recurrence and reports on a second implementation of the algorithm
null
null
null
cs.DS cs.CG math.CO
null
We consider a class of multivariate recurrences frequently arising in the worst case analysis of Davis-Putnam-style exponential time backtracking algorithms for NP-hard problems. We describe a technique for proving asymptotic upper bounds on these recurrences, by using a suitable weight function to reduce the problem to that of solving univariate linear recurrences; show how to use quasiconvex programming to determine the weight function yielding the smallest upper bound; and prove that the resulting upper bounds are within a polynomial factor of the true asymptotics of the recurrence. We develop and implement a multiple-gradient descent algorithm for the resulting quasiconvex programs, using a real-number arithmetic package for guaranteed accuracy of the computed worst case time bounds.
[ { "version": "v1", "created": "Thu, 10 Apr 2003 20:25:12 GMT" }, { "version": "v2", "created": "Wed, 9 Jul 2003 21:21:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
cs/0304020
Pranab Sen
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen
A direct sum theorem in communication complexity via message compression
21 pages. Full version of a paper to appear at ICALP 2003
null
null
null
cs.CC
null
We prove lower bounds for the direct sum problem for two-party bounded error randomised multiple-round communication protocols. Our proofs use the notion of information cost of a protocol, as defined by Chakrabarti, Shi, Wirth and Yao and refined further by Bar-Yossef, Jayram, Kumar and Sivakumar. Our main technical result is a `compression' theorem saying that, for any probability distribution $\mu$ over the inputs, a $k$-round private coin bounded error protocol for a function $f$ with information cost $c$ can be converted into a $k$-round deterministic protocol for $f$ with bounded distributional error and communication cost $O(kc)$. We prove this result using a substate theorem about relative entropy and a rejection sampling argument. Our direct sum result follows from this `compression' result via elementary information theoretic arguments. We also consider the direct sum problem in quantum communication. Using a probabilistic argument, we show that messages cannot be compressed in this manner even if they carry small information. Hence, new techniques may be necessary to tackle the direct sum problem in quantum communication.
[ { "version": "v1", "created": "Sat, 12 Apr 2003 02:26:26 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2003 20:21:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "Rahul", "" ], [ "Radhakrishnan", "Jaikumar", "" ], [ "Sen", "Pranab", "" ] ]
cs/0304021
Peter Buchholz
Peter Buchholz and Peter Kemper
Model Checking for a Class of Weighted Automata
24 pages
null
null
University of Dortmund, Department of Computer Science Technical report No. 779
cs.LO
null
A large number of different model checking approaches has been proposed during the last decade. The different approaches are applicable to different model types including untimed, timed, probabilistic and stochastic models. This paper presents a new framework for model checking techniques which includes some of the known approaches, but enlarges the class of models for which model checking can be applied to the general class of weighted automata. The approach allows an easy adaption of model checking to models which have not been considered yet for this purpose. Examples for those new model types for which model checking can be applied are max/plus or min/plus automata which are well established models to describe different forms of dynamic systems and optimization problems. In this context, model checking can be used to verify temporal or quantitative properties of a system. The paper first presents briefly our class of weighted automata, as a very general model type. Then Valued Computational Tree Logic (CTL$) is introduced as a natural extension of the well known branching time logic CTL. Afterwards, algorithms to check a weighted automaton according to a CTL$ formula are presented. As a last result, a bisimulation is presented for weighted automata and for CTL$.
[ { "version": "v1", "created": "Tue, 15 Apr 2003 19:08:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Buchholz", "Peter", "" ], [ "Kemper", "Peter", "" ] ]
cs/0304023
Mirela Damian
Mirela Damian and Joseph O'Rourke
Partitioning Regular Polygons into Circular Pieces I: Convex Partitions
21 pages, 25 figures
null
null
null
cs.CG
null
We explore an instance of the question of partitioning a polygon into pieces, each of which is as ``circular'' as possible, in the sense of having an aspect ratio close to 1. The aspect ratio of a polygon is the ratio of the diameters of the smallest circumscribing circle to the largest inscribed disk. The problem is rich even for partitioning regular polygons into convex pieces, the focus of this paper. We show that the optimal (most circular) partition for an equilateral triangle has an infinite number of pieces, with the lower bound approachable to any accuracy desired by a particular finite partition. For pentagons and all regular k-gons, k > 5, the unpartitioned polygon is already optimal. The square presents an interesting intermediate case. Here the one-piece partition is not optimal, but nor is the trivial lower bound approachable. We narrow the optimal ratio to an aspect-ratio gap of 0.01082 with several somewhat intricate partitions.
[ { "version": "v1", "created": "Thu, 17 Apr 2003 12:29:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Damian", "Mirela", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/0304024
Victor Kromer
Kromer Victor
Glottochronologic Retrognostic of Language System
10 pages, 7 figures. In Russian
null
null
null
cs.CL
null
A glottochronologic retrognostic of language system is proposed
[ { "version": "v1", "created": "Thu, 17 Apr 2003 02:22:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Victor", "Kromer", "" ] ]
cs/0304025
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 44
3 pages, 3 figures
null
null
null
cs.CG
null
The open problem of whether or not every pair of equal-area polygons has a hinged dissection is discussed.
[ { "version": "v1", "created": "Fri, 18 Apr 2003 21:12:35 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/0304026
Oded Regev
Irit Dinur, Venkatesan Guruswami, Subhash Khot, Oded Regev
A New Multilayered PCP and the Hardness of Hypergraph Vertex Cover
null
null
null
null
cs.CC
null
Given a $k$-uniform hyper-graph, the E$k$-Vertex-Cover problem is to find the smallest subset of vertices that intersects every hyper-edge. We present a new multilayered PCP construction that extends the Raz verifier. This enables us to prove that E$k$-Vertex-Cover is NP-hard to approximate within factor $(k-1-\epsilon)$ for any $k \geq 3$ and any $\epsilon>0$. The result is essentially tight as this problem can be easily approximated within factor $k$. Our construction makes use of the biased Long-Code and is analyzed using combinatorial properties of $s$-wise $t$-intersecting families of subsets.
[ { "version": "v1", "created": "Sat, 19 Apr 2003 17:59:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Dinur", "Irit", "" ], [ "Guruswami", "Venkatesan", "" ], [ "Khot", "Subhash", "" ], [ "Regev", "Oded", "" ] ]
cs/0304027
Lillian Lee
Lillian Lee
"I'm sorry Dave, I'm afraid I can't do that": Linguistics, Statistics, and Natural Language Processing circa 2001
To appear, National Research Council study on the Fundamentals of Computer Science. 7 pages
In "Computer Science: Reflections on the Field, Reflections from the Field" (report of the National Academies' Study on the Fundamentals of Computer Science), pp. 111--118, 2004
null
null
cs.CL
null
A brief, general-audience overview of the history of natural language processing, focusing on data-driven approaches.Topics include "Ambiguity and language analysis", "Firth things first", "A 'C' change", and "The empiricists strike back".
[ { "version": "v1", "created": "Mon, 21 Apr 2003 22:10:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Lillian", "" ] ]
cs/0304028
Baden Hughes
Baden Hughes and Steven Bird
Grid-Enabling Natural Language Engineering By Stealth
null
null
null
null
cs.DC cs.CL
null
We describe a proposal for an extensible, component-based software architecture for natural language engineering applications. Our model leverages existing linguistic resource description and discovery mechanisms based on extended Dublin Core metadata. In addition, the application design is flexible, allowing disparate components to be combined to suit the overall application functionality. An application specification language provides abstraction from the programming environment and allows ease of interface with computational grids via a broker.
[ { "version": "v1", "created": "Tue, 22 Apr 2003 02:51:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Hughes", "Baden", "" ], [ "Bird", "Steven", "" ] ]
cs/0304029
Manuela Kunze
Dietmar Roesner, Manuela Kunze
An XML based Document Suite
null
Proceedings of COLING 2002; p. 1278-1282
null
null
cs.CL
null
We report about the current state of development of a document suite and its applications. This collection of tools for the flexible and robust processing of documents in German is based on the use of XML as unifying formalism for encoding input and output data as well as process information. It is organized in modules with limited responsibilities that can easily be combined into pipelines to solve complex tasks. Strong emphasis is laid on a number of techniques to deal with lexical and conceptual gaps that are typical when starting a new application.
[ { "version": "v1", "created": "Tue, 22 Apr 2003 13:45:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Roesner", "Dietmar", "" ], [ "Kunze", "Manuela", "" ] ]
cs/0304030
John M. Hitchcock
John M. Hitchcock
Small Spans in Scaled Dimension
28 pages
null
null
null
cs.CC
null
Juedes and Lutz (1995) proved a small span theorem for polynomial-time many-one reductions in exponential time. This result says that for language A decidable in exponential time, either the class of languages reducible to A (the lower span) or the class of problems to which A can be reduced (the upper span) is small in the sense of resource-bounded measure and, in particular, that the degree of A is small. Small span theorems have been proven for increasingly stronger polynomial-time reductions, and a small span theorem for polynomial-time Turing reductions would imply BPP != EXP. In contrast to the progress in resource-bounded measure, Ambos-Spies, Merkle, Reimann, and Stephan (2001) showed that there is no small span theorem for the resource-bounded dimension of Lutz (2000), even for polynomial-time many-one reductions. Resource-bounded scaled dimension, recently introduced by Hitchcock, Lutz, and Mayordomo (2003), provides rescalings of resource-bounded dimension. We use scaled dimension to further understand the contrast between measure and dimension regarding polynomial-time spans and degrees. We strengthen prior results by showing that the small span theorem holds for polynomial-time many-one reductions in the -3rd-order scaled dimension, but fails to hold in the -2nd-order scaled dimension. Our results also hold in exponential space. As an application, we show that determining the -2nd- or -1st-order scaled dimension in ESPACE of the many-one complete languages for E would yield a proof of P = BPP or P != PSPACE. On the other hand, it is shown unconditionally that the complete languages for E have -3rd-order scaled dimension 0 in ESPACE and -2nd- and -1st-order scaled dimension 1 in E.
[ { "version": "v1", "created": "Tue, 22 Apr 2003 19:43:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Hitchcock", "John M.", "" ] ]
cs/0304031
Douglas A. Galbi
Douglas A. Galbi
Transforming the Structure of Network Interconnection and Transport
null
CommLaw Conspectus, v. 8, n. 2 (Summer 2000) pp. 203-18
null
null
cs.CY
null
Vibrant development of a network-based economy requires separating investment in highly location specific local access technology from the development of standardized, geography-independent, wide-area network services. Thus far interconnection arrangements and associated regulations have been too closely tied to the idiosyncratic geographic structure of individual operators' networks. A key industry challenge is to foster the development of a wide area lattice of common geographic points of interconnection. Sound regulatory and anti-trust policy can help address this industry need.
[ { "version": "v1", "created": "Tue, 22 Apr 2003 20:18:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Galbi", "Douglas A.", "" ] ]
cs/0304032
Douglas A. Galbi
Douglas A. Galbi
Growth in the "New Economy": U.S. Bandwidth Use and Pricing Across the 1990s
null
Telecommunications Policy 25 (2001) 139-154
null
null
cs.CY
null
An acceleration in the growth of communications bandwidth in use and a rapid reduction in bandwidth prices have not accompanied the U.S. economy's strong performance in the second half of the 1990s. Overall U.S. bandwidth in use has grown robustly throughout the 1990s, but growth has not significantly accelerated in the second half of 1990s. Average prices for U.S. bandwidth in use have fallen little in nominal terms in the second half of the 1990s. Policy makers and policy analysts should recognize that institutional change, rather than more competitors of established types, appears to be key to dramatic improvements in bandwidth growth and prices. Such a development could provide a significant additional impetus to aggregate growth and productivity.
[ { "version": "v1", "created": "Tue, 22 Apr 2003 20:33:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Galbi", "Douglas A.", "" ] ]
cs/0304033
Douglas A. Galbi
Douglas A. Galbi
A New Account of Personalization and Effective Communication
null
null
null
null
cs.CY
null
To contribute to understanding of information economies of daily life, this paper explores over the past millennium given names of a large number of persons. Analysts have long both condemned and praised mass media as a source of common culture, national unity, or shared symbolic experiences. Names, however, indicate a large decline in shared symbolic experience over the past two centuries, a decline that the growth of mass media does not appear to have affected significantly. Study of names also shows that action and personal relationships, along with time horizon, are central aspects of effective communication across a large population. The observed preference for personalization over the past two centuries and the importance of action and personal relationships to effective communication are aspects of information economies that are likely to have continuing significance for industry developments, economic statistics, and public policy.
[ { "version": "v1", "created": "Tue, 22 Apr 2003 21:37:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Galbi", "Douglas A.", "" ] ]
cs/0304034
Douglas A. Galbi
Douglas A. Galbi
Revolutionary Ideas for Radio Regulation
null
null
null
null
cs.CY
null
Radio technology seems destined to become part of the standard micro-processor input/output system. But unlike for memory or display systems, for radio systems government regulation matters a lot. Much discussion of radio regulation has focused on narrow spectrum management and interference issues. Reflecting on historical experience and centuries of conversation about fundamental political choices, persons working with radio technology should also ponder three questions. First, what is a good separation and balance of powers in radio regulation? Second, how should radio regulation be geographically configured? Third, how should radio regulation understand and respect personal freedom and equality? Working out answering to these questions involves a general process of shaping good government. This process will be hugely important for radio regulation, technology, and applications.
[ { "version": "v1", "created": "Tue, 22 Apr 2003 21:46:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Galbi", "Douglas A.", "" ] ]
cs/0304035
Manuela Kunze
Dietmar Roesner, Manuela Kunze
Exploiting Sublanguage and Domain Characteristics in a Bootstrapping Approach to Lexicon and Ontology Creation
null
Workshop-Proceedings of the OntoLex 2002 - Ontologies and Lexical Knowledge Bases at the LREC 2002, p. 68-73
null
null
cs.CL
null
It is very costly to build up lexical resources and domain ontologies. Especially when confronted with a new application domain lexical gaps and a poor coverage of domain concepts are a problem for the successful exploitation of natural language document analysis systems that need and exploit such knowledge sources. In this paper we report about ongoing experiments with `bootstrapping techniques' for lexicon and ontology creation.
[ { "version": "v1", "created": "Wed, 23 Apr 2003 08:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Roesner", "Dietmar", "" ], [ "Kunze", "Manuela", "" ] ]
cs/0304036
Manuela Kunze
Manuela Kunze, Chun Xiao
An Approach for Resource Sharing in Multilingual NLP
poster
STAIRS 2002 - STarting Artificial Intelligence Researchers Symposium at the ECAI 2002. Lyon, France. ISBN 158603 259 3. IOS Press Amsterdam, p. 123-124
null
null
cs.CL
null
In this paper we describe an approach for the analysis of documents in German and English with a shared pool of resources. For the analysis of German documents we use a document suite, which supports the user in tasks like information retrieval and information extraction. The core of the document suite is based on our tool XDOC. Now we want to exploit these methods for the analysis of English documents as well. For this aim we need a multilingual presentation format of the resources. These resources must be transformed into an unified format, in which we can set additional information about linguistic characteristics of the language depending on the analyzed documents. In this paper we describe our approach for such an exchange model for multilingual resources based on XML.
[ { "version": "v1", "created": "Wed, 23 Apr 2003 08:32:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Kunze", "Manuela", "" ], [ "Xiao", "Chun", "" ] ]
cs/0304037
Judith Beumer
Sudharshan Vazhkudai and Jennifer M. Schopf
Using Regression Techniques to Predict Large Data Transfers
29 pages, 11 figures
null
null
Preprint ANL/MCS-P1033-0303
cs.DC
null
The recent proliferation of Data Grids and the increasingly common practice of using resources as distributed data stores provide a convenient environment for communities of researchers to share, replicate, and manage access to copies of large datasets. This has led to the question of which replica can be accessed most efficiently. In such environments, fetching data from one of the several replica locations requires accurate predictions of end-to-end transfer times. The answer to this question can depend on many factors, including physical characteristics of the resources and the load behavior on the CPUs, networks, and storage devices that are part of the end-to-end data path linking possible sources and sinks. Our approach combines end-to-end application throughput observations with network and disk load variations and captures whole-system performance and variations in load patterns. Our predictions characterize the effect of load variations of several shared devices (network and disk) on file transfer times. We develop a suite of univariate and multivariate predictors that can use multiple data sources to improve the accuracy of the predictions as well as address Data Grid variations (availability of data and sporadic nature of transfers). We ran a large set of data transfer experiments using GridFTP and observed performance predictions within 15% error for our testbed sites, which is quite promising for a pragmatic system.
[ { "version": "v1", "created": "Wed, 23 Apr 2003 20:36:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Vazhkudai", "Sudharshan", "" ], [ "Schopf", "Jennifer M.", "" ] ]
cs/0304042
Alexander Roitershtein
A. Ben-Hur, A. Roitershtein, H. Siegelmann
On probabilistic analog automata
null
null
null
null
cs.OH
null
We consider probabilistic automata on a general state space and study their computational power. The model is based on the concept of language recognition by probabilistic automata due to Rabin and models of analog computation in a noisy environment suggested by Maass and Orponen, and Maass and Sontag. Our main result is a generalization of Rabin's reduction theorem that implies that under very mild conditions, the computational power of the automaton is limited to regular languages.
[ { "version": "v1", "created": "Tue, 29 Apr 2003 01:48:44 GMT" }, { "version": "v2", "created": "Wed, 30 Apr 2003 20:06:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Ben-Hur", "A.", "" ], [ "Roitershtein", "A.", "" ], [ "Siegelmann", "H.", "" ] ]
cs/0304044
Michael N. Vyalyi
M.N.Vyalyi
Hardness of approximating the weight enumerator of a binary linear code
7 pages
null
null
null
cs.CC
null
We consider the problem of evaluation of the weight enumerator of a binary linear code. We show that the exact evaluation is hard for polynomial hierarchy. More exactly, if WE is an oracle answering the solution of the evaluation problem then P^WE=P^GapP. Also we consider the approximative evaluation of the weight enumerator. In the case of approximation with additive accuracy $2^{\alpha n}$, $\alpha$ is constant the problem is hard in the above sense. We also prove that approximate evaluation at a single point $e^{\pi i/4}$ is hard for $0<\al<\al_0\approx0.88$.
[ { "version": "v1", "created": "Wed, 30 Apr 2003 03:13:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Vyalyi", "M. N.", "" ] ]
cs/0304045
Simone Severini
Simone Severini (U. Bristol)
On a composition of digraphs
6 pages, 1 figure. Abstract accepted for the Third Haifa Workshop on Interdisciplinary Applications of Graph Theory, Combinatorics and Algorithms, May 27-29, 2003, Haifa, Israel
null
null
null
cs.DM cs.AR cs.NI
null
Many "good" topologies for interconnection networks are based on line digraphs of regular digraphs. These digraphs support unitary matrices. We propose the property "being the digraph of a unitary matrix" as additional criterion for the design of new interconnection networks. We define a composition of digraphs, which we call diagonal union. Diagonal union can be used to construct digraphs of unitary matrices. We remark that digraphs obtained via diagonal union are state split graphs, as defined in symbolic dynamics. Finally, we list some potential directions for future research.
[ { "version": "v1", "created": "Wed, 30 Apr 2003 16:11:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Severini", "Simone", "", "U. Bristol" ] ]
cs/0305001
Ambuj Mahanti
Ambuj Mahanti, Supriyo Ghose and Samir K. Sadhukhan
A Framework for Searching AND/OR Graphs with Cycles
40 pages, 20 figures, 5 tables
null
null
null
cs.AI
null
Search in cyclic AND/OR graphs was traditionally known to be an unsolved problem. In the recent past several important studies have been reported in this domain. In this paper, we have taken a fresh look at the problem. First, a new and comprehensive theoretical framework for cyclic AND/OR graphs has been presented, which was found missing in the recent literature. Based on this framework, two best-first search algorithms, S1 and S2, have been developed. S1 does uninformed search and is a simple modification of the Bottom-up algorithm by Martelli and Montanari. S2 performs a heuristically guided search and replicates the modification in Bottom-up's successors, namely HS and AO*. Both S1 and S2 solve the problem of searching AND/OR graphs in presence of cycles. We then present a detailed analysis for the correctness and complexity results of S1 and S2, using the proposed framework. We have observed through experiments that S1 and S2 output correct results in all cases.
[ { "version": "v1", "created": "Thu, 1 May 2003 04:48:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Mahanti", "Ambuj", "" ], [ "Ghose", "Supriyo", "" ], [ "Sadhukhan", "Samir K.", "" ] ]
cs/0305002
Marcus Hutter
Monaldo Mastrolilli and Marcus Hutter
Hybrid Rounding Techniques for Knapsack Problems
19 LaTeX pages
Discrete Applied Mathematics, 154:4 (2006) 640-649
10.1016/j.dam.2005.08.004
IDSIA-03-02
cs.CC cs.DM cs.DS
null
We address the classical knapsack problem and a variant in which an upper bound is imposed on the number of items that can be selected. We show that appropriate combinations of rounding techniques yield novel and powerful ways of rounding. As an application of these techniques, we present a linear-storage Polynomial Time Approximation Scheme (PTAS) and a Fully Polynomial Time Approximation Scheme (FPTAS) that compute an approximate solution, of any fixed accuracy, in linear time. This linear complexity bound gives a substantial improvement of the best previously known polynomial bounds.
[ { "version": "v1", "created": "Fri, 2 May 2003 20:40:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Mastrolilli", "Monaldo", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0305003
Stina Nylander
Stina Nylander, Markus Bylund, Annika Waern
The Ubiquitous Interactor - Device Independent Access to Mobile Services
null
null
null
null
cs.HC
null
The Ubiquitous Interactor (UBI) addresses the problems of design and development that arise around services that need to be accessed from many different devices. In UBI, the same service can present itself with different user interfaces on different devices. This is done by separating interaction between users and services from presentation. The interaction is kept the same for all devices, and different presentation information is provided for different devices. This way, tailored user interfaces for many different devices can be created without multiplying development and maintenance work. In this paper we describe the system design of UBI, the system implementation, and two services implemented for the system: a calendar service and a stockbroker service.
[ { "version": "v1", "created": "Mon, 5 May 2003 11:32:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Nylander", "Stina", "" ], [ "Bylund", "Markus", "" ], [ "Waern", "Annika", "" ] ]
cs/0305004
V. Sriram
V.Sriram, B. Ravi Sekar Reddy and R. Sangal
Approximate Grammar for Information Extraction
10 pages, 3 figures, 2 tables, Presented at "International Conference on Universal Knowledge and Language, Goa'2002"
Conference on Universal Knowledge and Language, Goa'2002
null
null
cs.CL cs.AI
null
In this paper, we present the concept of Approximate grammar and how it can be used to extract information from a documemt. As the structure of informational strings cannot be defined well in a document, we cannot use the conventional grammar rules to represent the information. Hence, the need arises to design an approximate grammar that can be used effectively to accomplish the task of Information extraction. Approximate grammars are a novel step in this direction. The rules of an approximate grammar can be given by a user or the machine can learn the rules from an annotated document. We have performed our experiments in both the above areas and the results have been impressive.
[ { "version": "v1", "created": "Tue, 6 May 2003 14:06:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Sriram", "V.", "" ], [ "Reddy", "B. Ravi Sekar", "" ], [ "Sangal", "R.", "" ] ]
cs/0305005
Gianni Franceschini
Gianni Franceschini and Viliam Geffert
An In-Place Sorting with O(n log n) Comparisons and O(n) Moves
null
null
null
null
cs.DS cs.CC
null
We present the first in-place algorithm for sorting an array of size n that performs, in the worst case, at most O(n log n) element comparisons and O(n) element transports. This solves a long-standing open problem, stated explicitly, e.g., in [J.I. Munro and V. Raman, Sorting with minimum data movement, J. Algorithms, 13, 374-93, 1992], of whether there exists a sorting algorithm that matches the asymptotic lower bounds on all computational resources simultaneously.
[ { "version": "v1", "created": "Fri, 9 May 2003 14:56:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Franceschini", "Gianni", "" ], [ "Geffert", "Viliam", "" ] ]
cs/0305006
Hsueh-I. Lu
Ming-Yang Chen, Hsueh-I. Lu, and Hsu-Chun Yen
On the Ramsey Numbers for Bipartite Multigraphs
10 pages, 3 figures
null
null
null
cs.DM
null
A coloring of a complete bipartite graph is shuffle-preserved if it is the case that assigning a color $c$ to edges $(u, v)$ and $(u', v')$ enforces the same color assignment for edges $(u, v')$ and $(u',v)$. (In words, the induced subgraph with respect to color $c$ is complete.) In this paper, we investigate a variant of the Ramsey problem for the class of complete bipartite multigraphs. (By a multigraph we mean a graph in which multiple edges, but no loops, are allowed.) Unlike the conventional m-coloring scheme in Ramsey theory which imposes a constraint (i.e., $m$) on the total number of colors allowed in a graph, we introduce a relaxed version called m-local coloring which only requires that, for every vertex $v$, the number of colors associated with $v$'s incident edges is bounded by $m$. Note that the number of colors found in a graph under $m$-local coloring may exceed m. We prove that given any $n \times n$ complete bipartite multigraph $G$, every shuffle-preserved $m$-local coloring displays a monochromatic copy of $K_{p,p}$ provided that $2(p-1)(m-1) < n$. Moreover, the above bound is tight when (i) $m=2$, or (ii) $n=2^k$ and $m=3\cdot 2^{k-2}$ for every integer $k\geq 2$. As for the lower bound of $p$, we show that the existence of a monochromatic $K_{p,p}$ is not guaranteed if $p> \lceil \frac{n}{m} \rceil$. Finally, we give a generalization for $k$-partite graphs and a method applicable to general graphs. Many conclusions found in $m$-local coloring can be inferred to similar results of $m$-coloring.
[ { "version": "v1", "created": "Mon, 12 May 2003 16:17:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Ming-Yang", "" ], [ "Lu", "Hsueh-I.", "" ], [ "Yen", "Hsu-Chun", "" ] ]
cs/0305007
Chris Johnson
C. A. Johnson
Computing only minimal answers in disjunctive deductive databases
48 pages
null
null
null
cs.LO
null
A method is presented for computing minimal answers in disjunctive deductive databases under the disjunctive stable model semantics. Such answers are constructed by repeatedly extending partial answers. Our method is complete (in that every minimal answer can be computed) and does not admit redundancy (in the sense that every partial answer generated can be extended to a minimal answer), whence no non-minimal answer is generated. For stratified databases, the method does not (necessarily) require the computation of models of the database in their entirety. Compilation is proposed as a tool by which problems relating to computational efficiency and the non-existence of disjunctive stable models can be overcome. The extension of our method to other semantics is also considered.
[ { "version": "v1", "created": "Tue, 13 May 2003 08:27:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Johnson", "C. A.", "" ] ]
cs/0305008
MyungHo Kim
Gene Kim and MyungHo Kim
A Representation of Changes of Images and its Application for Developmental Biolology
10 pages
null
null
null
cs.CC cs.MS q-bio
null
In this paper, we consider a series of events observed at spaced time intervals and present a method of representation of the series. To explain an idea, by dealing with a set of gene expression data, which could be obtained from developmental biology, the procedures are sketched with comments in some details. We mean representation by choosing a proper function, which fits well with observed data of a series, and turning its characteristics into numbers, which extract the intrinsic properties of fluctuating data. With help of a machine learning techniques, this method will give a classification of developmental biological data as well as any varying data during a certain period and the classification can be applied for diagnosis of a disease.
[ { "version": "v1", "created": "Tue, 13 May 2003 17:48:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Gene", "" ], [ "Kim", "MyungHo", "" ] ]
cs/0305009
Dimitris Achlioptas
Dimitris Achlioptas, Yuval Peres
The Threshold for Random k-SAT is 2^k ln2 - O(k)
Added figures and explained the intuition behind our approach. Made a correction following comments of Chris Calabro
null
null
null
cs.CC cond-mat.stat-mech cs.DM math.PR
null
Let F be a random k-SAT formula on n variables, formed by selecting uniformly and independently m = rn out of all possible k-clauses. It is well-known that if r>2^k ln 2, then the formula F is unsatisfiable with probability that tends to 1 as n tends to infinity. We prove that there exists a sequence t_k = O(k) such that if r < 2^k ln 2 - t_k, then the formula F is satisfiable with probability that tends to 1 as n tends to infinity. Our technique yields an explicit lower bound for the random k-SAT threshold for every k. For k>3 this improves upon all previously known lower bounds. For example, when k=10 our lower bound is 704.94 while the upper bound is 708.94.
[ { "version": "v1", "created": "Wed, 14 May 2003 01:30:10 GMT" }, { "version": "v2", "created": "Mon, 8 Sep 2003 05:56:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Achlioptas", "Dimitris", "" ], [ "Peres", "Yuval", "" ] ]
cs/0305010
Faulstich
Lukas C. Faulstich
The NPC Framework for Building Information Dissemination Networks
Erroneous title in PostScript version fixed, two figures added
null
null
null
cs.DL cs.NI
null
Numerous systems for dissemination, retrieval, and archiving of documents have been developed in the past. Those systems often focus on one of these aspects and are hard to extend and combine. Typically, the transmission protocols, query and filtering languages are fixed as well as the interfaces to other systems. We rather envisage the seamless establishment of networks among the providers, repositories and consumers of information, supporting information retrieval and dissemination while being highly interoperable and extensible. We propose a framework with a single event-based mechanism that unifies document storage, retrieval, and dissemination. This framework offers complete openness with respect to document and metadata formats, transmission protocols, and filtering mechanisms. It specifies a high-level building kit, by which arbitrary processors for document streams can be incorporated to support the retrieval, transformation, aggregation and disaggregation of documents. Using the same kit, interfaces for different transmission protocols can be added easily to enable the communication with various information sources and information consumers.
[ { "version": "v1", "created": "Wed, 14 May 2003 09:49:05 GMT" }, { "version": "v2", "created": "Tue, 15 Jul 2003 11:41:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Faulstich", "Lukas C.", "" ] ]
cs/0305011
Paolo Coppola
Paolo Coppola and Simone Martini
Optimizing Optimal Reduction: A Type Inference Algorithm for Elementary Affine Logic
null
ACM Transactions on Computational Logic, vol 7 (2006) pp. 219 - 260.
null
null
cs.LO
null
We present a type inference algorithm for lambda-terms in Elementary Affine Logic using linear constraints. We prove that the algorithm is correct and complete.
[ { "version": "v1", "created": "Thu, 15 May 2003 10:46:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Coppola", "Paolo", "" ], [ "Martini", "Simone", "" ] ]
cs/0305012
Carlos Gershenson
Carlos Gershenson, Gottfried Mayer-Kress, Atin Das, Pritha Das, Matus Marko
Time-scales, Meaning, and Availability of Information in a Global Brain
8 pages, 1 figure
null
null
null
cs.AI cs.CY cs.NI
null
We note the importance of time-scales, meaning, and availability of information for the emergence of novel information meta-structures at a global scale. We discuss previous work in this area and develop future perspectives. We focus on the transmission of scientific articles and the integration of traditional conferences with their virtual extensions on the Internet, their time-scales, and availability. We mention the Semantic Web as an effort for integrating meaningful information.
[ { "version": "v1", "created": "Thu, 15 May 2003 16:30:49 GMT" }, { "version": "v2", "created": "Fri, 11 Jul 2003 19:22:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Gershenson", "Carlos", "" ], [ "Mayer-Kress", "Gottfried", "" ], [ "Das", "Atin", "" ], [ "Das", "Pritha", "" ], [ "Marko", "Matus", "" ] ]
cs/0305013
Johan Schubert
Johan Schubert
On Nonspecific Evidence
15 pages, 0 figures
International Journal of Intelligent Systems 8(6) (1993) 711-725
null
FOA Report B 20112-2.7
cs.AI cs.NE
null
When simultaneously reasoning with evidences about several different events it is necessary to separate the evidence according to event. These events should then be handled independently. However, when propositions of evidences are weakly specified in the sense that it may not be certain to which event they are referring, this may not be directly possible. In this paper a criterion for partitioning evidences into subsets representing events is established. This criterion, derived from the conflict within each subset, involves minimising a criterion function for the overall conflict of the partition. An algorithm based on characteristics of the criterion function and an iterative optimisation among partitionings of evidences is proposed.
[ { "version": "v1", "created": "Fri, 16 May 2003 13:39:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305015
Johan Schubert
Johan Schubert
Finding a Posterior Domain Probability Distribution by Specifying Nonspecific Evidence
23 pages, 1 figure
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 3(2) (1995) 163-185
null
FOA-B-95-00077-3.4-SE
cs.AI cs.NE
null
This article is an extension of the results of two earlier articles. In [J. Schubert, On nonspecific evidence, Int. J. Intell. Syst. 8 (1993) 711-725] we established within Dempster-Shafer theory a criterion function called the metaconflict function. With this criterion we can partition into subsets a set of several pieces of evidence with propositions that are weakly specified in the sense that it may be uncertain to which event a proposition is referring. In a second article [J. Schubert, Specifying nonspecific evidence, in Cluster-based specification techniques in Dempster-Shafer theory for an evidential intelligence analysis of multiple target tracks, Ph.D. Thesis, TRITA-NA-9410, Royal Institute of Technology, Stockholm, 1994, ISBN 91-7170-801-4] we not only found the most plausible subset for each piece of evidence, we also found the plausibility for every subset that this piece of evidence belongs to the subset. In this article we aim to find a posterior probability distribution regarding the number of subsets. We use the idea that each piece of evidence in a subset supports the existence of that subset to the degree that this piece of evidence supports anything at all. From this we can derive a bpa that is concerned with the question of how many subsets we have. That bpa can then be combined with a given prior domain probability distribution in order to obtain the sought-after posterior domain distribution.
[ { "version": "v1", "created": "Fri, 16 May 2003 14:36:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305016
Sandor P. Fekete
Sandor P. Fekete and Henk Meijer
The one-round Voronoi game replayed
14 pages, 6 figures, Latex; revised for journal version, to appear in Computational Geometry: Theory and Applications. Extended abstract version appeared in Workshop on Algorithms and Data Structures, Springer Lecture Notes in Computer Science, vol.2748, 2003, pp. 150-161
null
null
null
cs.CG cs.GT
null
We consider the one-round Voronoi game, where player one (``White'', called ``Wilma'') places a set of n points in a rectangular area of aspect ratio r <=1, followed by the second player (``Black'', called ``Barney''), who places the same number of points. Each player wins the fraction of the board closest to one of his points, and the goal is to win more than half of the total area. This problem has been studied by Cheong et al., who showed that for large enough $n$ and r=1, Barney has a strategy that guarantees a fraction of 1/2+a, for some small fixed a. We resolve a number of open problems raised by that paper. In particular, we give a precise characterization of the outcome of the game for optimal play: We show that Barney has a winning strategy for n>2 and r>sqrt{2}/n, and for n=2 and r>sqrt{3}/2. Wilma wins in all remaining cases, i.e., for n>=3 and r<=sqrt{2}/n, for n=2 and r<=sqrt{3}/2, and for n=1. We also discuss complexity aspects of the game on more general boards, by proving that for a polygon with holes, it is NP-hard to maximize the area Barney can win against a given set of points by Wilma.
[ { "version": "v1", "created": "Fri, 16 May 2003 14:43:04 GMT" }, { "version": "v2", "created": "Mon, 26 Apr 2004 14:15:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Meijer", "Henk", "" ] ]
cs/0305017
Johan Schubert
Johan Schubert
Cluster-based Specification Techniques in Dempster-Shafer Theory
10 pages, 1 figure
in Symbolic and Quantitative Approaches to Reasoning and Uncertainty, C. Froidevaux and J. Kohlas (Eds.), Proceedings of the European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty (ECSQARU'95), pp. 395-404, Universite' de Fribourg, Switzerland, 3-5 July 1995, Springer-Verlag (LNAI 946), Berlin, 1995
null
FOA-B-95-00078-3.4-SE
cs.AI cs.NE
null
When reasoning with uncertainty there are many situations where evidences are not only uncertain but their propositions may also be weakly specified in the sense that it may not be certain to which event a proposition is referring. It is then crucial not to combine such evidences in the mistaken belief that they are referring to the same event. This situation would become manageable if the evidences could be clustered into subsets representing events that should be handled separately. In an earlier article we established within Dempster-Shafer theory a criterion function called the metaconflict function. With this criterion we can partition a set of evidences into subsets. Each subset representing a separate event. In this article we will not only find the most plausible subset for each piece of evidence, we will also find the plausibility for every subset that the evidence belongs to the subset. Also, when the number of subsets are uncertain we aim to find a posterior probability distribution regarding the number of subsets.
[ { "version": "v1", "created": "Fri, 16 May 2003 14:46:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305018
Johan Schubert
Johan Schubert
Cluster-based Specification Techniques in Dempster-Shafer Theory for an Evidential Intelligence Analysis of MultipleTarget Tracks (Thesis Abstract)
4 pages, 1 figure
AI Communications 8(2) (1995) 107-110
null
FOA-B-95-00079-3.4-SE
cs.AI cs.NE
null
In Intelligence Analysis it is of vital importance to manage uncertainty. Intelligence data is almost always uncertain and incomplete, making it necessary to reason and taking decisions under uncertainty. One way to manage the uncertainty in Intelligence Analysis is Dempster-Shafer Theory. This thesis contains five results regarding multiple target tracks and intelligence specification.
[ { "version": "v1", "created": "Fri, 16 May 2003 14:59:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305020
Johan Schubert
Johan Schubert
Specifying nonspecific evidence
39 pages, 2 figures
International Journal of Intelligent Systems 11(8), 525-563, 1996
null
FOA-B-96-00174-3.4-SE
cs.AI cs.NE
null
In an earlier article [J. Schubert, On nonspecific evidence, Int. J. Intell. Syst. 8(6), 711-725 (1993)] we established within Dempster-Shafer theory a criterion function called the metaconflict function. With this criterion we can partition into subsets a set of several pieces of evidence with propositions that are weakly specified in the sense that it may be uncertain to which event a proposition is referring. Each subset in the partitioning is representing a separate event. The metaconflict function was derived as the plausibility that the partitioning is correct when viewing the conflict in Dempster's rule within each subset as a newly constructed piece of metalevel evidence with a proposition giving support against the entire partitioning. In this article we extend the results of the previous article. We will not only find the most plausible subset for each piece of evidence as was done in the earlier article. In addition we will specify each piece of nonspecific evidence, in the sense that we find to which events the proposition might be referring, by finding the plausibility for every subset that this piece of evidence belong to the subset. In doing this we will automatically receive indication that some evidence might be false. We will then develop a new methodology to exploit these newly specified pieces of evidence in a subsequent reasoning process. This will include methods to discount evidence based on their degree of falsity and on their degree of credibility due to a partial specification of affiliation, as well as a refined method to infer the event of each subset.
[ { "version": "v1", "created": "Fri, 16 May 2003 15:13:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305021
Johan Schubert
Johan Schubert
Creating Prototypes for Fast Classification in Dempster-Shafer Clustering
11 pages, 3 figures
in Qualitative and Quantitative Practical Reasoning, Proceedings of the First International Joint Conference on Qualitative and Quantitative Practical Reasoning (ECSQARU-FAPR'97), pp. 525-535, Bad Honnef, Germany, 9-12 June 1997, Springer-Verlag (LNAI 1244), Berlin, 1997
null
FOA-B-97-00244-505-SE
cs.AI cs.NE
null
We develop a classification method for incoming pieces of evidence in Dempster-Shafer theory. This methodology is based on previous work with clustering and specification of originally nonspecific evidence. This methodology is here put in order for fast classification of future incoming pieces of evidence by comparing them with prototypes representing the clusters, instead of making a full clustering of all evidence. This method has a computational complexity of O(M * N) for each new piece of evidence, where M is the maximum number of subsets and N is the number of prototypes chosen for each subset. That is, a computational complexity independent of the total number of previously arrived pieces of evidence. The parameters M and N are typically fixed and domain dependent in any application.
[ { "version": "v1", "created": "Fri, 16 May 2003 15:32:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305022
Johan Schubert
Ulla Bergsten, Johan Schubert, Per Svensson
Applying Data Mining and Machine Learning Techniques to Submarine Intelligence Analysis
4 pages, 7 figures
in Proceedings of the Third International Conference on Knowledge Discovery and Data Mining (KDD'97), pp. 127-130, Newport Beach, USA, 14-17 August 1997, The AAAI Press, Menlo Park, 1997
null
FOA-B-97-00263-505-SE
cs.AI cs.DB cs.NE
null
We describe how specialized database technology and data analysis methods were applied by the Swedish defense to help deal with the violation of Swedish marine territory by foreign submarine intruders during the Eighties and early Nineties. Among several approaches tried some yielded interesting information, although most of the key questions remain unanswered. We conclude with a survey of belief-function- and genetic-algorithm-based methods which were proposed to support interpretation of intelligence reports and prediction of future submarine positions, respectively.
[ { "version": "v1", "created": "Fri, 16 May 2003 15:41:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Bergsten", "Ulla", "" ], [ "Schubert", "Johan", "" ], [ "Svensson", "Per", "" ] ]
cs/0305023
Johan Schubert
Johan Schubert
Fast Dempster-Shafer clustering using a neural network structure
8 pages, 7 figures
in Proceedings of the Seventh International Conference on Information Processing and Management of Uncertainty in Knowledge-based Systems (IPMU'98), pp. 1438-1445, Universite' de La Sorbonne, Paris, France, 6-10 July 1998, Editions EDK, Paris, 1998
null
FOA-B-98-00355-505-SE
cs.AI cs.NE
null
In this paper we study a problem within Dempster-Shafer theory where 2**n - 1 pieces of evidence are clustered by a neural structure into n clusters. The clustering is done by minimizing a metaconflict function. Previously we developed a method based on iterative optimization. However, for large scale problems we need a method with lower computational complexity. The neural structure was found to be effective and much faster than iterative optimization for larger problems. While the growth in metaconflict was faster for the neural structure compared with iterative optimization in medium sized problems, the metaconflict per cluster and evidence was moderate. The neural structure was able to find a global minimum over ten runs for problem sizes up to six clusters.
[ { "version": "v1", "created": "Fri, 16 May 2003 15:48:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305024
Johan Schubert
Johan Schubert
A neural network and iterative optimization hybrid for Dempster-Shafer clustering
8 pages, 10 figures
in Proceedings of EuroFusion98 International Conference on Data Fusion (EF'98), M. Bedworth, J. O'Brien (Eds.), pp. 29-36, Great Malvern, UK, 6-7 October 1998
null
FOA-B-98-00383-505-SE
cs.AI cs.NE
null
In this paper we extend an earlier result within Dempster-Shafer theory ["Fast Dempster-Shafer Clustering Using a Neural Network Structure," in Proc. Seventh Int. Conf. Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU 98)] where a large number of pieces of evidence are clustered into subsets by a neural network structure. The clustering is done by minimizing a metaconflict function. Previously we developed a method based on iterative optimization. While the neural method had a much lower computation time than iterative optimization its average clustering performance was not as good. Here, we develop a hybrid of the two methods. We let the neural structure do the initial clustering in order to achieve a high computational performance. Its solution is fed as the initial state to the iterative optimization in order to improve the clustering performance.
[ { "version": "v1", "created": "Fri, 16 May 2003 15:54:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305026
Johan Schubert
Johan Schubert
Fast Dempster-Shafer clustering using a neural network structure
12 pages, 6 figures
in Information, Uncertainty and Fusion, B. Bouchon-Meunier, R.R. Yager, L.A. Zadeh (Eds.), pp. 419-430, Kluwer Academic Publishers, Boston, 1999
null
FOA-B-99-00504-505-SE
cs.AI cs.NE
null
In this article we study a problem within Dempster-Shafer theory where 2**n - 1 pieces of evidence are clustered by a neural structure into n clusters. The clustering is done by minimizing a metaconflict function. Previously we developed a method based on iterative optimization. However, for large scale problems we need a method with lower computational complexity. The neural structure was found to be effective and much faster than iterative optimization for larger problems. While the growth in metaconflict was faster for the neural structure compared with iterative optimization in medium sized problems, the metaconflict per cluster and evidence was moderate. The neural structure was able to find a global minimum over ten runs for problem sizes up to six clusters.
[ { "version": "v1", "created": "Fri, 16 May 2003 16:06:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305027
Johan Schubert
Johan Schubert
Managing Inconsistent Intelligence
7 pages, 3 figures
in Proceedings of the Third International Conference on Information Fusion (FUSION 2000), pp. TuB4/10-16, Paris, France, 10-13 July 2000, International Society of Information Fusion, Sunnyvale, 2000
null
FOA-B-00-00619-505-SE
cs.AI cs.NE
null
In this paper we demonstrate that it is possible to manage intelligence in constant time as a pre-process to information fusion through a series of processes dealing with issues such as clustering reports, ranking reports with respect to importance, extraction of prototypes from clusters and immediate classification of newly arriving intelligence reports. These methods are used when intelligence reports arrive which concerns different events which should be handled independently, when it is not known a priori to which event each intelligence report is related. We use clustering that runs as a back-end process to partition the intelligence into subsets representing the events, and in parallel, a fast classification that runs as a front-end process in order to put the newly arriving intelligence into its correct information fusion process.
[ { "version": "v1", "created": "Fri, 16 May 2003 16:16:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305028
Johan Schubert
Mats Bengtsson, Johan Schubert
Dempster-Shafer clustering using Potts spin mean field theory
14 pages, 9 figures
Soft Computing 5(3) (2001) 215-228
null
FOI-S-0027-SE
cs.AI cs.NE
null
In this article we investigate a problem within Dempster-Shafer theory where 2**q - 1 pieces of evidence are clustered into q clusters by minimizing a metaconflict function, or equivalently, by minimizing the sum of weight of conflict over all clusters. Previously one of us developed a method based on a Hopfield and Tank model. However, for very large problems we need a method with lower computational complexity. We demonstrate that the weight of conflict of evidence can, as an approximation, be linearized and mapped to an antiferromagnetic Potts Spin model. This facilitates efficient numerical solution, even for large problem sizes. Optimal or nearly optimal solutions are found for Dempster-Shafer clustering benchmark tests with a time complexity of approximately O(N**2 log**2 N). Furthermore, an isomorphism between the antiferromagnetic Potts spin model and a graph optimization problem is shown. The graph model has dynamic variables living on the links, which have a priori probabilities that are directly related to the pairwise conflict between pieces of evidence. Hence, the relations between three different models are shown.
[ { "version": "v1", "created": "Fri, 16 May 2003 16:28:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Bengtsson", "Mats", "" ], [ "Schubert", "Johan", "" ] ]
cs/0305029
Johan Schubert
John Cantwell, Johan Schubert, Johan Walter
Conflict-based Force Aggregation
15 pages, 17 figures
in Cd Proceedings of the Sixth International Command and Control Research and Technology Symposium, Track 7, Paper 031, pp. 1-15, Annapolis, USA, 19-21 June 2001, US Department of Defence CCRP, Washington, DC, 2001
null
FOI-S-0040-SE
cs.AI cs.NE
null
In this paper we present an application where we put together two methods for clustering and classification into a force aggregation method. Both methods are based on conflicts between elements. These methods work with different type of elements (intelligence reports, vehicles, military units) on different hierarchical levels using specific conflict assessment methods on each level. We use Dempster-Shafer theory for conflict calculation between elements, Dempster-Shafer clustering for clustering these elements, and templates for classification. The result of these processes is a complete force aggregation on all levels handled.
[ { "version": "v1", "created": "Fri, 16 May 2003 16:37:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Cantwell", "John", "" ], [ "Schubert", "Johan", "" ], [ "Walter", "Johan", "" ] ]
cs/0305030
Johan Schubert
Johan Schubert
Reliable Force Aggregation Using a Refined Evidence Specification from Dempster-Shafer Clustering
8 pages, 5 figures
in Proceedings of the Fourth Annual Conference on Information Fusion (FUSION 2001), pp. TuB3/15-22, Montreal, Canada, 7-10 August 2001, International Society of Information Fusion, Sunnyvale, 2001
null
FOI-S-0050-SE
cs.AI cs.NE
null
In this paper we develop methods for selection of templates and use these templates to recluster an already performed Dempster-Shafer clustering taking into account intelligence to template fit during the reclustering phase. By this process the risk of erroneous force aggregation based on some misplace pieces of evidence from the first clustering process is greatly reduced. Finally, a more reliable force aggregation is performed using the result of the second clustering. These steps are taken in order to maintain most of the excellent computational performance of Dempster-Shafer clustering, while at the same time improve on the clustering result by including some higher relations among intelligence reports described by the templates. The new improved algorithm has a computational complexity of O(n**3 log**2 n) compared to O(n**2 log**2 n) of standard Dempster-Shafer clustering using Potts spin mean field theory.
[ { "version": "v1", "created": "Fri, 16 May 2003 16:45:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305031
Johan Schubert
Johan Schubert
Clustering belief functions based on attracting and conflicting metalevel evidence
8 pages, 3 figures
in Proceedings of the Ninth International Conference on Information Processing and Management of Uncertainty in Knowledge-based Systems (IPMU'02), pp. 571-578, Annecy, France, 1-5 July 2002
null
FOI-S-0524-SE
cs.AI cs.NE
null
In this paper we develop a method for clustering belief functions based on attracting and conflicting metalevel evidence. Such clustering is done when the belief functions concern multiple events, and all belief functions are mixed up. The clustering process is used as the means for separating the belief functions into subsets that should be handled independently. While the conflicting metalevel evidence is generated internally from pairwise conflicts of all belief functions, the attracting metalevel evidence is assumed given by some external source.
[ { "version": "v1", "created": "Fri, 16 May 2003 16:52:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305032
Johan Schubert
Johan Schubert
Robust Report Level Cluster-to-Track Fusion
6 pages, 5 figures
in Proceedings of the Fifth International Conference on Information Fusion (FUSION 2002), pp. 913-918, Annapolis, USA, 8-11 July 2002, International Society of Information Fusion, 2002
null
FOI-S-0525-SE
cs.AI cs.NE
null
In this paper we develop a method for report level tracking based on Dempster-Shafer clustering using Potts spin neural networks where clusters of incoming reports are gradually fused into existing tracks, one cluster for each track. Incoming reports are put into a cluster and continuous reclustering of older reports is made in order to obtain maximum association fit within the cluster and towards the track. Over time, the oldest reports of the cluster leave the cluster for the fixed track at the same rate as new incoming reports are put into it. Fusing reports to existing tracks in this fashion allows us to take account of both existing tracks and the probable future of each track, as represented by younger reports within the corresponding cluster. This gives us a robust report-to-track association. Compared to clustering of all available reports this approach is computationally faster and has a better report-to-track association than simple step-by-step association.
[ { "version": "v1", "created": "Fri, 16 May 2003 16:58:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0305033
Johan Schubert
Ulla Bergsten, Johan Schubert, Per Svensson
Beslutst\"odssystemet Dezzy - en \"oversikt
18 pages, 8 figures, in Swedish, with appendix in English
in Dokumentation 7 juni av Seminarium och fackutst\"allning om samband, sensorer och datorer f\"or ledningssystem till f\"orsvaret (MILINF'89), pp. 07B2:19-31, Enk\"oping, June 1989, Telub AB, V\"axj\"o, 1989
null
FOA Report B 20078-2.7
cs.AI cs.DB
null
Within the scope of the three-year ANTI-SUBMARINE WARFARE project of the National Defence Research Establishment, the INFORMATION SYSTEMS subproject has developed the demonstration prototype Dezzy for handling and analysis of intelligence reports concerning foreign underwater activities. ----- Inom ramen f\"or FOA:s tre{\aa}riga huvudprojekt UB{\AA}TSSKYDD har delprojekt INFORMATIONSSYSTEM utvecklat demonstrationsprototypen Dezzy till ett beslutsst\"odsystem f\"or hantering och analys av underr\"attelser om fr\"ammande undervattensverksamhet.
[ { "version": "v1", "created": "Fri, 16 May 2003 18:26:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Bergsten", "Ulla", "" ], [ "Schubert", "Johan", "" ], [ "Svensson", "Per", "" ] ]
cs/0305034
Ilia Toli
Ilia Toli
Cryptanalysis of HFE
7 pages. Minor changes expected
null
null
null
cs.CR cs.SC
null
I transform the trapdoor problem of HFE into a linear algebra problem.
[ { "version": "v1", "created": "Sat, 17 May 2003 19:41:32 GMT" }, { "version": "v2", "created": "Tue, 27 May 2003 12:48:14 GMT" }, { "version": "v3", "created": "Thu, 26 Jun 2003 23:07:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Toli", "Ilia", "" ] ]
cs/0305037
Richard Wheeldon
Richard Wheeldon and Steve Counsell
Power Law Distributions in Class Relationships
To appear in proceedings of Third IEEE International Workshop on Source Code Analysis and Manipulation. 10 pages, 10 figures. Minor errors fixed
null
null
null
cs.SE
null
Power law distributions have been found in many natural and social phenomena, and more recently in the source code and run-time characteristics of Object-Oriented (OO) systems. A power law implies that small values are extremely common, whereas large values are extremely rare. In this paper, we identify twelve new power laws relating to the static graph structures of Java programs. The graph structures analyzed represented different forms of OO coupling, namely, inheritance, aggregation, interface, parameter type and return type. Identification of these new laws provide the basis for predicting likely features of classes in future developments. The research in this paper ties together work in object-based coupling and World Wide Web structures.
[ { "version": "v1", "created": "Tue, 20 May 2003 10:21:17 GMT" }, { "version": "v2", "created": "Thu, 17 Jul 2003 15:32:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Wheeldon", "Richard", "" ], [ "Counsell", "Steve", "" ] ]
cs/0305038
Nancy Hartline Bercich
Nancy Hartline Bercich
The Evolution of the Computerized Database
13 pages, including figures and bibliography
null
null
null
cs.DB
null
Databases, collections of related data, are as old as the written word. A database can be anything from a homemaker's metal recipe file to a sophisticated data warehouse. Yet today, when we think of a database we invariably think of computerized data and their DBMSs (database management systems). How did we go from organizing our data in a simple metal filing box or cabinet to storing our data in a sophisticated computerized database? How did the computerized database evolve? This paper defines what we mean by a database. It traces the evolution of the database, from its start as a non-computerized set of related data, to the, now standard, computerized RDBMS (relational database management system). Early computerized storage methods are reviewed including both the ISAM (Indexed Sequential Access Method) and VSAM (Virtual Storage Access Method) storage methods. Early database models are explored including the network and hierarchical database models. Eventually, the relational, object-relational and object-oriented databases models are discussed. An appendix of diagrams, including hierarchical occurrence tree, network schema, ER (entity relationship) and UML (unified modeling language) diagrams, is included to support the text. This paper concludes with an exploration of current and future trends in DBMS development. It discusses the factors affecting these trends. It delves into the relationship between DBMSs and the increasingly popular object-oriented development methodologies. Finally, it speculates on the future of the DBMS.
[ { "version": "v1", "created": "Wed, 21 May 2003 15:59:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Bercich", "Nancy Hartline", "" ] ]
cs/0305039
Dirk Nowotka
Tero Harju and Dirk Nowotka
Periodicity and Unbordered Words: A Proof of the Extended Duval Conjecture
16 pages
null
null
null
cs.DM
null
The relationship between the length of a word and the maximum length of its unbordered factors is investigated in this paper. Consider a finite word w of length n. We call a word bordered, if it has a proper prefix which is also a suffix of that word. Let f(w) denote the maximum length of all unbordered factors of w, and let p(w) denote the period of w. Clearly, f(w) < p(w)+1. We establish that f(w) = p(w), if w has an unbordered prefix of length f(w) and n > 2f(w)-2. This bound is tight and solves the stronger version of a 21 years old conjecture by Duval. It follows from this result that, in general, n > 3f(w)-3 implies f(w) = p(w) which gives an improved bound for the question asked by Ehrenfeucht and Silberger in 1979.
[ { "version": "v1", "created": "Fri, 23 May 2003 11:28:00 GMT" }, { "version": "v2", "created": "Sun, 25 May 2003 10:36:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Harju", "Tero", "" ], [ "Nowotka", "Dirk", "" ] ]
cs/0305040
Keijo Heljanko
Keijo Heljanko and Ilkka Niemel\"a
Bounded LTL Model Checking with Stable Models
32 pages, to appear in Theory and Practice of Logic Programming
null
null
null
cs.LO cs.AI
null
In this paper bounded model checking of asynchronous concurrent systems is introduced as a promising application area for answer set programming. As the model of asynchronous systems a generalisation of communicating automata, 1-safe Petri nets, are used. It is shown how a 1-safe Petri net and a requirement on the behaviour of the net can be translated into a logic program such that the bounded model checking problem for the net can be solved by computing stable models of the corresponding program. The use of the stable model semantics leads to compact encodings of bounded reachability and deadlock detection tasks as well as the more general problem of bounded model checking of linear temporal logic. Correctness proofs of the devised translations are given, and some experimental results using the translation and the Smodels system are presented.
[ { "version": "v1", "created": "Fri, 23 May 2003 17:16:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Heljanko", "Keijo", "" ], [ "Niemelä", "Ilkka", "" ] ]
cs/0305041
Wei Wang
Wei Wang
Factorization of Language Models through Backing-Off Lattices
7 pages and 1 figure; technical report; added one more related work, and removed some errors
null
null
null
cs.CL
null
Factorization of statistical language models is the task that we resolve the most discriminative model into factored models and determine a new model by combining them so as to provide better estimate. Most of previous works mainly focus on factorizing models of sequential events, each of which allows only one factorization manner. To enable parallel factorization, which allows a model event to be resolved in more than one ways at the same time, we propose a general framework, where we adopt a backing-off lattice to reflect parallel factorizations and to define the paths along which a model is resolved into factored models, we use a mixture model to combine parallel paths in the lattice, and generalize Katz's backing-off method to integrate all the mixture models got by traversing the entire lattice. Based on this framework, we formulate two types of model factorizations that are used in natural language modeling.
[ { "version": "v1", "created": "Fri, 23 May 2003 19:38:22 GMT" }, { "version": "v2", "created": "Mon, 26 May 2003 19:42:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Wei", "" ] ]
cs/0305042
Filippo Menczer
Markus Jakobsson, Filippo Menczer
Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service
null
null
null
null
cs.CY cs.NI
null
We uncover a vulnerability that allows for an attacker to perform an email-based attack on selected victims, using only standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner -- as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; cheat in SMS-based games; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.
[ { "version": "v1", "created": "Fri, 23 May 2003 22:10:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Jakobsson", "Markus", "" ], [ "Menczer", "Filippo", "" ] ]
cs/0305044
Marco Zaffalon
Gert de Cooman and Marco Zaffalon
Updating beliefs with incomplete observations
Replaced with extended version
null
null
null
cs.AI
null
Currently, there is renewed interest in the problem, raised by Shafer in 1985, of updating probabilities when observations are incomplete. This is a fundamental problem in general, and of particular interest for Bayesian networks. Recently, Grunwald and Halpern have shown that commonly used updating strategies fail in this case, except under very special assumptions. In this paper we propose a new method for updating probabilities with incomplete observations. Our approach is deliberately conservative: we make no assumptions about the so-called incompleteness mechanism that associates complete with incomplete observations. We model our ignorance about this mechanism by a vacuous lower prevision, a tool from the theory of imprecise probabilities, and we use only coherence arguments to turn prior into posterior probabilities. In general, this new approach to updating produces lower and upper posterior probabilities and expectations, as well as partially determinate decisions. This is a logical consequence of the existing ignorance about the incompleteness mechanism. We apply the new approach to the problem of classification of new evidence in probabilistic expert systems, where it leads to a new, so-called conservative updating rule. In the special case of Bayesian networks constructed using expert knowledge, we provide an exact algorithm for classification based on our updating rule, which has linear-time complexity for a class of networks wider than polytrees. This result is then extended to the more general framework of credal networks, where computations are often much harder than with Bayesian nets. Using an example, we show that our rule appears to provide a solid basis for reliable updating with incomplete observations, when no strong assumptions about the incompleteness mechanism are justified.
[ { "version": "v1", "created": "Tue, 27 May 2003 11:05:52 GMT" }, { "version": "v2", "created": "Mon, 17 May 2004 15:03:28 GMT" } ]
2007-05-23T00:00:00
[ [ "de Cooman", "Gert", "" ], [ "Zaffalon", "Marco", "" ] ]
cs/0305046
Juan Antonio Navarro
Mauricio Osorio, Juan Antonio Navarro and Jose Arrazola
Applications of Intuitionistic Logic in Answer Set Programming
30 pages, Under consideration for publication in Theory and Practice of Logic Programming
null
null
null
cs.LO
null
We present some applications of intermediate logics in the field of Answer Set Programming (ASP). A brief, but comprehensive introduction to the answer set semantics, intuitionistic and other intermediate logics is given. Some equivalence notions and their applications are discussed. Some results on intermediate logics are shown, and applied later to prove properties of answer sets. A characterization of answer sets for logic programs with nested expressions is provided in terms of intuitionistic provability, generalizing a recent result given by Pearce. It is known that the answer set semantics for logic programs with nested expressions may select non-minimal models. Minimal models can be very important in some applications, therefore we studied them; in particular we obtain a characterization, in terms of intuitionistic logic, of answer sets which are also minimal models. We show that the logic G3 characterizes the notion of strong equivalence between programs under the semantic induced by these models. Finally we discuss possible applications and consequences of our results. They clearly state interesting links between ASP and intermediate logics, which might bring research in these two areas together.
[ { "version": "v1", "created": "Tue, 27 May 2003 16:40:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Osorio", "Mauricio", "" ], [ "Navarro", "Juan Antonio", "" ], [ "Arrazola", "Jose", "" ] ]
cs/0305048
MyungHo Kim
Gene Kim and MyungHo Kim
2D Electrophoresis Gel Image and Diagnosis of a Disease
10 pages, DIMACS workshop of Rutgers University, on complexity in Biosystems
null
null
null
cs.CC cs.CV q-bio.QM
null
The process of diagnosing a disease from the 2D gel electrophoresis image is a challenging problem. This is due to technical difficulties of generating reproducible images with a normalized form and the effect of negative stain. In this paper, we will discuss a new concept of interpreting the 2D images and overcoming the aforementioned technical difficulties using mathematical transformation. The method makes use of 2D gel images of proteins in serums and we explain a way of representing the images into vectors in order to apply machine-learning methods, such as the support vector machine.
[ { "version": "v1", "created": "Wed, 28 May 2003 13:48:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Gene", "" ], [ "Kim", "MyungHo", "" ] ]
cs/0305051
Tanya Y. Berger-Wolf
Tanya Y. Berger-Wolf and Mitchell A. Harris
Sharp Bounds for Bandwidth of Clique Products
15 pages, 13 figures. Presented at the SIAM Discrete Math 2002 conference
null
null
null
cs.DM
null
The bandwidth of a graph is the labeling of vertices with minimum maximum edge difference. For many graph families this is NP-complete. A classic result computes the bandwidth for the hypercube. We generalize this result to give sharp lower bounds for products of cliques. This problem turns out to be equivalent to one in communication over multiple channels in which channels can fail and the information sent over those channels is lost. The goal is to create an encoding that minimizes the difference between the received and the original information while having as little redundancy as possible. Berger-Wolf and Reingold [2] have considered the problem for the equal size cliques (or equal capacity channels). This paper presents a tight lower bound and an algorithm for constructing the labeling for the product of any number of arbitrary size cliques.
[ { "version": "v1", "created": "Wed, 28 May 2003 20:28:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Berger-Wolf", "Tanya Y.", "" ], [ "Harris", "Mitchell A.", "" ] ]
cs/0305053
Baden Hughes
Baden Hughes
Developing Open Data Models for Linguistic Field Data
null
null
null
null
cs.DL cs.CL
null
The UQ Flint Archive houses the field notes and elicitation recordings made by Elwyn Flint in the 1950's and 1960's during extensive linguistic survey work across Queensland, Australia. The process of digitizing the contents of the UQ Flint Archive provides a number of interesting challenges in the context of EMELD. Firstly, all of the linguistic data is for languages which are either endangered or extinct, and as such forms a valuable ethnographic repository. Secondly, the physical format of the data is itself in danger of decline, and as such digitization is an important preservation task in the short to medium term. Thirdly, the adoption of open standards for the encoding and presentation of text and audio data for linguistic field data, whilst enabling preservation, represents a new field of research in itself where best practice has yet to be formalised. Fourthly, the provision of this linguistic data online as a new data source for future research introduces concerns of data portability and longevity. This paper will outline the origins of the data model, the content creation components, presentation forms based on the data model, data capture tools and media conversion components. It will also address some of the larger questions regarding the digitization and annotation of linguistic field work based on experience gained through work with the Flint Archive contents.
[ { "version": "v1", "created": "Thu, 29 May 2003 12:12:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Hughes", "Baden", "" ] ]
cs/0305055
Gilles Daniel
Gilles Daniel
Goodness-of-fit of the Heston model
10 pages, 3 figures, The 9th International Conference of Computing in Economics and Finance, Seattle (July 2003)
null
null
null
cs.CE
null
An analytical formula for the probability distribution of stock-market returns, derived from the Heston model assuming a mean-reverting stochastic volatility, was recently proposed by Dragulescu and Yakovenko in Quantitative Finance 2002. While replicating their results, we found two significant weaknesses in their method to pre-process the data, which cast a shadow over the effective goodness-of-fit of the model. We propose a new method, more truly capturing the market, and perform a Kolmogorov-Smirnov test and a Chi Square test on the resulting probability distribution. The results raise some significant questions for large time lags -- 40 to 250 days -- where the smoothness of the data does not require such a complex model; nevertheless, we also provide some statistical evidence in favour of the Heston model for small time lags -- 1 and 5 days -- compared with the traditional Gaussian model assuming constant volatility.
[ { "version": "v1", "created": "Thu, 29 May 2003 18:13:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Daniel", "Gilles", "" ] ]
cs/0305056
Andrei Salnikov
R. Bartoldus, G. Dubois-Felsmann, Y. Kolomensky, A. Salnikov
Configuration Database for BaBar On-line
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, 4 figures, PDF. PSN MOKT004
null
null
SLAC-PUB-9831
cs.DB cs.IR
null
The configuration database is one of the vital systems in the BaBar on-line system. It provides services for the different parts of the data acquisition system and control system, which require run-time parameters. The original design and implementation of the configuration database played a significant role in the successful BaBar operations since the beginning of experiment. Recent additions to the design of the configuration database provide better means for the management of data and add new tools to simplify main configuration tasks. We describe the design of the configuration database, its implementation with the Objectivity/DB object-oriented database, and our experience collected during the years of operation.
[ { "version": "v1", "created": "Thu, 29 May 2003 21:37:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Bartoldus", "R.", "" ], [ "Dubois-Felsmann", "G.", "" ], [ "Kolomensky", "Y.", "" ], [ "Salnikov", "A.", "" ] ]
cs/0305061
Andras Horvath
Andras Horvath, Emanuele Leonardi, Markus Schulz
A Secure Infrastructure For System Console and Reset Access
Conference for Computing in High Energy and Nuclear Physics (CHEP2003), March 24-28, 2003, La Jolla, California
null
null
null
cs.DC
null
During the last years large farms have been built using commodity hardware. This hardware lacks components for remote and automated administration. Products that can be retrofitted to these systems are either costly or inherently insecure. We present a system based on serial ports and simple machine controlled relays. We report on experience gained by setting up a 50-machine test environment as well as current work in progress in the area.
[ { "version": "v1", "created": "Fri, 30 May 2003 11:42:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Horvath", "Andras", "" ], [ "Leonardi", "Emanuele", "" ], [ "Schulz", "Markus", "" ] ]
cs/0305065
James A. Hamilton
James A. Hamilton, Gregory P. Dubois-Felsmann and Rainer Bartoldus
A Generic Multi-node State Monitoring Subsystem
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 5 pages
null
null
SLAC-PUB-9909
cs.DC
null
The BaBar online data acquisition (DAQ) system includes approximately fifty Unix systems that collectively implement the level-three trigger. These systems all run the same code. Each of these systems has its own state, and this state is expected to change in response to changes in the overall DAQ system. A specialized subsystem has been developed to initiate processing on this collection of systems, and to monitor them both for error conditions and to ensure that they all follow the same state trajectory within a specifiable period of time. This subsystem receives start commands from the main DAQ run control system, and reports major coherent state changes, as well as error conditions, back to the run control system. This state monitoring subsystem has the novel feature that it does not know anything about the state machines that it is monitoring, and hence does not introduce any fundamentally new state machine into the overall system. This feature makes it trivially applicable to other multi-node subsystems. Indeed it has already found a second application beyond the level-three trigger, within the BaBar experiment.
[ { "version": "v1", "created": "Fri, 30 May 2003 17:43:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hamilton", "James A.", "" ], [ "Dubois-Felsmann", "Gregory P.", "" ], [ "Bartoldus", "Rainer", "" ] ]
cs/0306003
Steve Fisher
Rob Byrom, Brian Coghlan, Andrew W Cooke, Roney Cordenonsi, Linda Cornwall, Ari Datta, Abdeslem Djaoui, Laurence Field, Steve Fisher, Steve Hicks, Stuart Kenny, James Magowan, Werner Nutt, David O'Callaghan, Manfred Oevers, Norbert Podhorszki, John Ryan, Manish Soni, Paul Taylor, Antony J. Wilson and Xiaomei Zhu
R-GMA: First results after deployment
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, LaTeX, 3 eps figures. PSN MOET004
null
null
null
cs.DC
null
We describe R-GMA (Relational Grid Monitoring Architecture) which is being developed within the European DataGrid Project as an Grid Information and Monitoring System. Is is based on the GMA from GGF, which is a simple Consumer-Producer model. The special strength of this implementation comes from the power of the relational model. We offer a global view of the information as if each VO had one large relational database. We provide a number of different Producer types with different characteristics; for example some support streaming of information. We also provide combined Consumer/Producers, which are able to combine information and republish it. At the heart of the system is the mediator, which for any query is able to find and connect to the best Producers to do the job. We are able to invoke MDS info-provider scripts and publish the resulting information via R-GMA in addition to having some of our own sensors. APIs are available which allow the user to deploy monitoring and information services for any application that may be needed in the future. We have used it both for information about the grid (primarily to find what services are available at any one time) and for application monitoring. R-GMA has been deployed in Grid testbeds, we describe the results and experiences of this deployment.
[ { "version": "v1", "created": "Fri, 30 May 2003 20:39:27 GMT" }, { "version": "v2", "created": "Thu, 12 Jun 2003 18:13:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Byrom", "Rob", "" ], [ "Coghlan", "Brian", "" ], [ "Cooke", "Andrew W", "" ], [ "Cordenonsi", "Roney", "" ], [ "Cornwall", "Linda", "" ], [ "Datta", "Ari", "" ], [ "Djaoui", "Abdeslem", "" ], [ "Field", "Laurence", "" ], [ "Fisher", "Steve", "" ], [ "Hicks", "Steve", "" ], [ "Kenny", "Stuart", "" ], [ "Magowan", "James", "" ], [ "Nutt", "Werner", "" ], [ "O'Callaghan", "David", "" ], [ "Oevers", "Manfred", "" ], [ "Podhorszki", "Norbert", "" ], [ "Ryan", "John", "" ], [ "Soni", "Manish", "" ], [ "Taylor", "Paul", "" ], [ "Wilson", "Antony J.", "" ], [ "Zhu", "Xiaomei", "" ] ]
cs/0306006
Jorge Lima
A.Amorim, J.Lima, C.Oliveira, L.Pedro, N.Barros
Experience with the Open Source based implementation for ATLAS Conditions Data Management System
8 pages, 4 figures, 3 tables, conference
null
null
null
cs.DB
null
Conditions Data in high energy physics experiments is frequently seen as every data needed for reconstruction besides the event data itself. This includes all sorts of slowly evolving data like detector alignment, calibration and robustness, and data from detector control system. Also, every Conditions Data Object is associated with a time interval of validity and a version. Besides that, quite often is useful to tag collections of Conditions Data Objects altogether. These issues have already been investigated and a data model has been proposed and used for different implementations based in commercial DBMSs, both at CERN and for the BaBar experiment. The special case of the ATLAS complex trigger that requires online access to calibration and alignment data poses new challenges that have to be met using a flexible and customizable solution more in the line of Open Source components. Motivated by the ATLAS challenges we have developed an alternative implementation, based in an Open Source RDBMS. Several issues were investigated land will be described in this paper: -The best way to map the conditions data model into the relational database concept considering what are foreseen as the most frequent queries. -The clustering model best suited to address the scalability problem. -Extensive tests were performed and will be described. The very promising results from these tests are attracting the attention from the HEP community and driving further developments.
[ { "version": "v1", "created": "Fri, 30 May 2003 23:08:44 GMT" }, { "version": "v2", "created": "Sat, 14 Jun 2003 01:51:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Amorim", "A.", "" ], [ "Lima", "J.", "" ], [ "Oliveira", "C.", "" ], [ "Pedro", "L.", "" ], [ "Barros", "N.", "" ] ]
cs/0306007
Francesco Prelz
G. Avellino, S. Beco, B. Cantalupo, F. Pacini, A. Terracina, A. Maraschini, D. Colling, S. Monforte, M. Pappalardo, L. Salconi, F. Giacomini, E. Ronchieri, D. Kouril, A. Krenek, L. Matyska, M. Mulac, J. Pospisil, M. Ruda, Z. Salvet, J. Sitera, M. Vocu, M. Mezzadri, F. Prelz, A. Gianelle, R. Peluso, M. Sgaravatto, S. Barale, A. Guarise, A. Werbrouck
The first deployment of workload management services on the EU DataGrid Testbed: feedback on design and implementation
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, LaTeX, 2 eps figures
null
null
null
cs.DC
null
Application users have now been experiencing for about a year with the standardized resource brokering services provided by the 'workload management' package of the EU DataGrid project (WP1). Understanding, shaping and pushing the limits of the system has provided valuable feedback on both its design and implementation. A digest of the lessons, and "better practices", that were learned, and that were applied towards the second major release of the software, is given.
[ { "version": "v1", "created": "Sat, 31 May 2003 19:39:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Avellino", "G.", "" ], [ "Beco", "S.", "" ], [ "Cantalupo", "B.", "" ], [ "Pacini", "F.", "" ], [ "Terracina", "A.", "" ], [ "Maraschini", "A.", "" ], [ "Colling", "D.", "" ], [ "Monforte", "S.", "" ], [ "Pappalardo", "M.", "" ], [ "Salconi", "L.", "" ], [ "Giacomini", "F.", "" ], [ "Ronchieri", "E.", "" ], [ "Kouril", "D.", "" ], [ "Krenek", "A.", "" ], [ "Matyska", "L.", "" ], [ "Mulac", "M.", "" ], [ "Pospisil", "J.", "" ], [ "Ruda", "M.", "" ], [ "Salvet", "Z.", "" ], [ "Sitera", "J.", "" ], [ "Vocu", "M.", "" ], [ "Mezzadri", "M.", "" ], [ "Prelz", "F.", "" ], [ "Gianelle", "A.", "" ], [ "Peluso", "R.", "" ], [ "Sgaravatto", "M.", "" ], [ "Barale", "S.", "" ], [ "Guarise", "A.", "" ], [ "Werbrouck", "A.", "" ] ]
cs/0306008
Antonio Ceseracciu
A. Ceseracciu, M. Piemontese, F. Safai Tehrani, P. Elmer, D. Johnson, T. M. Pulliam
The new BaBar Data Reconstruction Control System
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 9 pages, LaTeX, 2 eps figures PSN TUDT011
null
null
SLAC-PUB-9873
cs.DC
null
The BaBar experiment is characterized by extremely high luminosity, a complex detector, and a huge data volume, with increasing requirements each year. To fulfill these requirements a new control system has been designed and developed for the offline data reconstruction system. The new control system described in this paper provides the performance and flexibility needed to manage a large number of small computing farms, and takes full benefit of OO design. The infrastructure is well isolated from the processing layer, it is generic and flexible, based on a light framework providing message passing and cooperative multitasking. The system is actively distributed, enforces the separation between different processing tiers by using different naming domains, and glues them together by dedicated brokers. It provides a powerful Finite State Machine framework to describe custom processing models in a simple regular language. This paper describes this new control system, currently in use at SLAC and Padova on ~450 CPUs organized in 12 farms.
[ { "version": "v1", "created": "Sat, 31 May 2003 20:48:53 GMT" }, { "version": "v2", "created": "Fri, 6 Jun 2003 22:46:13 GMT" }, { "version": "v3", "created": "Wed, 11 Jun 2003 20:31:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Ceseracciu", "A.", "" ], [ "Piemontese", "M.", "" ], [ "Tehrani", "F. Safai", "" ], [ "Elmer", "P.", "" ], [ "Johnson", "D.", "" ], [ "Pulliam", "T. M.", "" ] ]
cs/0306010
Sudebkumar Prasant Pal
Sudebkumar Prasant Pal and Dilip Sarkar
On multiple connectedness of regions visible due to multiple diffuse reflections
10 pages, 3 figures
null
null
null
cs.CG cs.DM cs.GR
null
It is known that the region $V(s)$ of a simple polygon $P$, directly visible (illuminable) from an internal point $s$, is simply connected. Aronov et al. \cite{addpp981} established that the region $V_1(s)$ of a simple polygon visible from an internal point $s$ due to at most one diffuse reflection on the boundary of the polygon $P$, is also simply connected. In this paper we establish that the region $V_2(s)$, visible from $s$ due to at most two diffuse reflections may be multiply connected; we demonstrate the construction of an $n$-sided simple polygon with a point $s$ inside it so that and the region of $P$ visible from $s$ after at most two diffuse reflections is multiple connected.
[ { "version": "v1", "created": "Mon, 2 Jun 2003 11:40:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Pal", "Sudebkumar Prasant", "" ], [ "Sarkar", "Dilip", "" ] ]
cs/0306013
Julius Hrivnac
Julius Hrivnac
Transparent Persistence with Java Data Objects
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003. PSN TUKT005
null
null
null
cs.DB
null
Flexible and performant Persistency Service is a necessary component of any HEP Software Framework. The building of a modular, non-intrusive and performant persistency component have been shown to be very difficult task. In the past, it was very often necessary to sacrifice modularity to achieve acceptable performance. This resulted in the strong dependency of the overall Frameworks on their Persistency subsystems. Recent development in software technology has made possible to build a Persistency Service which can be transparently used from other Frameworks. Such Service doesn't force a strong architectural constraints on the overall Framework Architecture, while satisfying high performance requirements. Java Data Object standard (JDO) has been already implemented for almost all major databases. It provides truly transparent persistency for any Java object (both internal and external). Objects in other languages can be handled via transparent proxies. Being only a thin layer on top of a used database, JDO doesn't introduce any significant performance degradation. Also Aspect-Oriented Programming (AOP) makes possible to treat persistency as an orthogonal Aspect of the Application Framework, without polluting it with persistence-specific concepts. All these techniques have been developed primarily (or only) for the Java environment. It is, however, possible to interface them transparently to Frameworks built in other languages, like for example C++. Fully functional prototypes of flexible and non-intrusive persistency modules have been build for several other packages, as for example FreeHEP AIDA and LCG Pool AttributeSet (package Indicium).
[ { "version": "v1", "created": "Mon, 2 Jun 2003 09:38:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Hrivnac", "Julius", "" ] ]
cs/0306015
Sudebkumar Prasant Pal
P. H. D. Ramakrishna, Sudebkumar Prasant Pal, Samir Bhalla, Hironmay Basu and Sudhir Kumar Singh
Computing sharp and scalable bounds on errors in approximate zeros of univariate polynomials
13 pages, no figures
null
null
null
cs.NA
null
There are several numerical methods for computing approximate zeros of a given univariate polynomial. In this paper, we develop a simple and novel method for determining sharp upper bounds on errors in approximate zeros of a given polynomial using Rouche's theorem from complex analysis. We compute the error bounds using non-linear optimization. Our bounds are scalable in the sense that we compute sharper error bounds for better approximations of zeros. We use high precision computations using the LEDA/real floating-point filter for computing our bounds robustly.
[ { "version": "v1", "created": "Mon, 2 Jun 2003 12:26:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramakrishna", "P. H. D.", "" ], [ "Pal", "Sudebkumar Prasant", "" ], [ "Bhalla", "Samir", "" ], [ "Basu", "Hironmay", "" ], [ "Singh", "Sudhir Kumar", "" ] ]
cs/0306016
Francesc Rossello
Merce Llabres, Francesc Rossello
Modelling Biochemical Operations on RNA Secondary Structures
10 pages
null
null
null
cs.CE q-bio
null
In this paper we model several simple biochemical operations on RNA molecules that modify their secondary structure by means of a suitable variation of Gro\ss e-Rhode's Algebra Transformation Systems.
[ { "version": "v1", "created": "Tue, 3 Jun 2003 08:48:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Llabres", "Merce", "" ], [ "Rossello", "Francesc", "" ] ]
cs/0306018
Rosario Esposito
S. Andreozzi, S. Fantinel, D. Rebatto, L. Vaccarossa, G. Tortone
A monitoring tool for a GRID operation center
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 3 pages, PDF. PSN MOET002
null
null
null
cs.DC
null
WorldGRID is an intercontinental testbed spanning Europe and the US integrating architecturally different Grid implementations based on the Globus toolkit. The WorldGRID testbed has been successfully demonstrated during the WorldGRID demos at SuperComputing 2002 (Baltimore) and IST2002 (Copenhagen) where real HEP application jobs were transparently submitted from US and Europe using "native" mechanisms and run where resources were available, independently of their location. To monitor the behavior and performance of such testbed and spot problems as soon as they arise, DataTAG has developed the EDT-Monitor tool based on the Nagios package that allows for Virtual Organization centric views of the Grid through dynamic geographical maps. The tool has been used to spot several problems during the WorldGRID operations, such as malfunctioning Resource Brokers or Information Servers, sites not correctly configured, job dispatching problems, etc. In this paper we give an overview of the package, its features and scalability solutions and we report on the experience acquired and the benefit that a GRID operation center would gain from such a tool.
[ { "version": "v1", "created": "Tue, 3 Jun 2003 17:22:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Andreozzi", "S.", "" ], [ "Fantinel", "S.", "" ], [ "Rebatto", "D.", "" ], [ "Vaccarossa", "L.", "" ], [ "Tortone", "G.", "" ] ]
cs/0306019
Irina
I.Sourikova, D.Morrison
Relational databases for data management in PHENIX
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 4 pages, LaTeX, 4 eps figures. PSN TUKT003
null
null
null
cs.DB
null
PHENIX is one of the two large experiments at the Relativistic Heavy Ion Collider (RHIC) at Brookhaven National Laboratory (BNL) and archives roughly 100TB of experimental data per year. In addition, large volumes of simulated data are produced at multiple off-site computing centers. For any file catalog to play a central role in data management it has to face problems associated with the need for distributed access and updates. To be used effectively by the hundreds of PHENIX collaborators in 12 countries the catalog must satisfy the following requirements: 1) contain up-to-date data, 2) provide fast and reliable access to the data, 3) have write permissions for the sites that store portions of data. We present an analysis of several available Relational Database Management Systems (RDBMS) to support a catalog meeting the above requirements and discuss the PHENIX experience with building and using the distributed file catalog.
[ { "version": "v1", "created": "Wed, 4 Jun 2003 17:38:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Sourikova", "I.", "" ], [ "Morrison", "D.", "" ] ]
cs/0306020
Jacek Becla
Adeyemi Adesanya, Tofigh Azemoon, Jacek Becla, Andrew Hanushevsky, Adil Hasan, Wilko Kroeger, Artem Trunov, Daniel Wang, Igor Gaponenko, Simon Patton, David Quarrie
On the Verge of One Petabyte - the Story Behind the BaBar Database System
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 6 pages. PSN MOKT010
null
null
null
cs.DB
null
The BaBar database has pioneered the use of a commercial ODBMS within the HEP community. The unique object-oriented architecture of Objectivity/DB has made it possible to manage over 700 terabytes of production data generated since May'99, making the BaBar database the world's largest known database. The ongoing development includes new features, addressing the ever-increasing luminosity of the detector as well as other changing physics requirements. Significant efforts are focused on reducing space requirements and operational costs. The paper discusses our experience with developing a large scale database system, emphasizing universal aspects which may be applied to any large scale system, independently of underlying technology used.
[ { "version": "v1", "created": "Wed, 4 Jun 2003 19:22:52 GMT" }, { "version": "v2", "created": "Wed, 4 Jun 2003 20:12:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Adesanya", "Adeyemi", "" ], [ "Azemoon", "Tofigh", "" ], [ "Becla", "Jacek", "" ], [ "Hanushevsky", "Andrew", "" ], [ "Hasan", "Adil", "" ], [ "Kroeger", "Wilko", "" ], [ "Trunov", "Artem", "" ], [ "Wang", "Daniel", "" ], [ "Gaponenko", "Igor", "" ], [ "Patton", "Simon", "" ], [ "Quarrie", "David", "" ] ]
cs/0306021
Alexander Haubold
Alexander Haubold
Visualization for Periodic Population Movement between Distinct Localities
Poster Summary: 2 pages, 4 figures, InfoVis 2003 Symposium
null
null
null
cs.IR
null
We present a new visualization method to summarize and present periodic population movement between distinct locations, such as floors, buildings, cities, or the like. In the specific case of this paper, we have chosen to focus on student movement between college dormitories on the Columbia University campus. The visual information is presented to the information analyst in the form of an interactive geographical map, in which specific temporal periods as well as individual buildings can be singled out for detailed data exploration. The navigational interface has been designed to specifically meet a geographical setting.
[ { "version": "v1", "created": "Wed, 4 Jun 2003 19:40:04 GMT" }, { "version": "v2", "created": "Sat, 30 Aug 2003 06:35:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ] ]
cs/0306022
Anand Venkataraman
Anand Venkataraman and Wen Wang
Techniques for effective vocabulary selection
4 pages. To appear Proc. Eurospeech 2003, Geneva
null
null
null
cs.CL cs.AI
null
The vocabulary of a continuous speech recognition (CSR) system is a significant factor in determining its performance. In this paper, we present three principled approaches to select the target vocabulary for a particular domain by trading off between the target out-of-vocabulary (OOV) rate and vocabulary size. We evaluate these approaches against an ad-hoc baseline strategy. Results are presented in the form of OOV rate graphs plotted against increasing vocabulary size for each technique.
[ { "version": "v1", "created": "Wed, 4 Jun 2003 23:08:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Venkataraman", "Anand", "" ], [ "Wang", "Wen", "" ] ]
cs/0306025
Jie Gao
Jie Gao, and Dianjun Wang
Permutation Generation: Two New Permutation Algorithms
7 pages, 4 figures
null
null
null
cs.DS cs.CC
null
Two completely new algorithms for generating permutations, shift-cursor algorithm and level algorithm, and their efficient implementations are presented in this paper. One implementation of the shift cursor algorithm gives an optimal solution of the permutation generation problem, and one implementation of the level algorithm can be used to generate random permutations.
[ { "version": "v1", "created": "Thu, 5 Jun 2003 11:49:22 GMT" }, { "version": "v2", "created": "Tue, 10 Jun 2003 03:20:45 GMT" }, { "version": "v3", "created": "Wed, 9 Jul 2003 13:25:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Gao", "Jie", "" ], [ "Wang", "Dianjun", "" ] ]
cs/0306026
Alasdair Earl
A.D.Earl, A.Hasan and D. Boutigany
BdbServer++: A User Driven Data Location and Retrieval Tool
Paper based on the poster from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 4 pages, LaTeX, 0 figures. PSN TUCP011
null
null
SLAC-PUB-9925
cs.IR
null
The adoption of Grid technology has the potential to greatly aid the BaBar experiment. BdbServer was originally designed to extract copies of data from the Objectivity/DB database at SLAC and IN2P3. With data now stored in multiple locations in a variety of data formats, we are enhancing this tool. This will enable users to extract selected deep copies of event collections and ship them to the requested site using the facilities offered by the existing Grid infrastructure. By building on the work done by various groups in BaBar, and the European DataGrid, we have successfully expanded the capabilities of the BdbServer software. This should provide a framework for future work in data distribution.
[ { "version": "v1", "created": "Thu, 5 Jun 2003 12:20:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Earl", "A. D.", "" ], [ "Hasan", "A.", "" ], [ "Boutigany", "D.", "" ] ]
cs/0306028
David A. Plaisted
David A. Plaisted
An Abstract Programming System
Internal report
null
null
null
cs.SE cs.LO
null
The system PL permits the translation of abstract proofs of program correctness into programs in a variety of programming languages. A programming language satisfying certain axioms may be the target of such a translation. The system PL also permits the construction and proof of correctness of programs in an abstract programming language, and permits the translation of these programs into correct programs in a variety of languages. The abstract programming language has an imperative style of programming with assignment statements and side-effects, to allow the efficient generation of code. The abstract programs may be written by humans and then translated, avoiding the need to write the same program repeatedly in different languages or even the same language. This system uses classical logic, is conceptually simple, and permits reasoning about nonterminating programs using Scott-Strachey style denotational semantics.
[ { "version": "v1", "created": "Thu, 5 Jun 2003 18:31:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Plaisted", "David A.", "" ] ]