id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0303032 | Marc Toussaint | Christian Igel and Marc Toussaint | Recent Results on No-Free-Lunch Theorems for Optimization | 10 pages, LaTeX, see http://www.neuroinformatik.rub.de/PROJECTS/SONN/ | null | null | null | cs.NE math.OC nlin.AO | null | The sharpened No-Free-Lunch-theorem (NFL-theorem) states that the performance
of all optimization algorithms averaged over any finite set F of functions is
equal if and only if F is closed under permutation (c.u.p.) and each target
function in F is equally likely. In this paper, we first summarize some
consequences of this theorem, which have been proven recently: The average
number of evaluations needed to find a desirable (e.g., optimal) solution can
be calculated; the number of subsets c.u.p. can be neglected compared to the
overall number of possible subsets; and problem classes relevant in practice
are not likely to be c.u.p. Second, as the main result, the NFL-theorem is
extended. Necessary and sufficient conditions for NFL-results to hold are given
for arbitrary, non-uniform distributions of target functions. This yields the
most general NFL-theorem for optimization presented so far.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2003 14:46:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Igel",
"Christian",
""
],
[
"Toussaint",
"Marc",
""
]
] |
cs/0303033 | David S. H. Rosenthal | David S. H. Rosenthal | A Digital Preservation Appliance Based on OpenBSD | 12 pages | Proceedings of BSDcon, 2003 | null | null | cs.DC cs.DL | null | The LOCKSS program has developed and deployed in a world-wide test a system
for preserving access to academic journals published on the Web. The
fundamental problem for any digital preservation system is that it must be
affordable for the long term. To reduce the cost of ownership, the LOCKSS
system uses generic PC hardware, open source software, and peer-to-peer
technology. It is packaged as a ``network appliance'', a single-function box
that can be connected to the Internet, configured and left alone to do its job
with minimal monitoring or administration. The first version of this system was
based on a Linux boot floppy. After three years of testing it was replaced by a
second version, based on OpenBSD and booting from CD-ROM.
We focus in this paper on the design, implementation and deployment of a
network appliance based on an open source operating system. We provide an
overview of the LOCKSS application and describe the experience of deploying and
supporting its first version. We list the requirements we took from this to
drive the design of the second version, describe how we satisfied them in the
OpenBSD environment, and report on the initial
| [
{
"version": "v1",
"created": "Sun, 30 Mar 2003 18:46:46 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Apr 2003 15:05:11 GMT"
},
{
"version": "v3",
"created": "Sun, 21 Nov 2004 23:54:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rosenthal",
"David S. H.",
""
]
] |
cs/0304001 | Norman G. Vinson | Norman G. Vinson | Design Guidelines for Landmarks to Support Navigation in Virtual
Environments | 9 pages, 1 figure | Proceedings of the SIGCHI conference on Human factors in computing
systems: the CHI is the limit, p.278-285, May 15-20, 1999, Pittsburgh,
Pennsylvania, United States | null | NRC 43578 | cs.HC | null | Unfamiliar, large-scale virtual environments are difficult to navigate. This
paper presents design guidelines to ease navigation in such virtual
environments. The guidelines presented here focus on the design and placement
of landmarks in virtual environments. Moreover, the guidelines are based
primarily on the extensive empirical literature on navigation in the real
world. A rationale for this approach is provided by the similarities between
navigational behavior in real and virtual environments.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2003 22:49:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vinson",
"Norman G.",
""
]
] |
cs/0304002 | Paul M. Aoki | Paul M. Aoki, Matthew Romaine, Margaret H. Szymanski, James D.
Thornton, Daniel Wilson, Allison Woodruff | The Mad Hatter´s Cocktail Party: A Social Mobile Audio Space
Supporting Multiple Simultaneous Conversations | 8 pages | Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems, Ft.
Lauderdale, FL, Apr. 2003, 425-432. ACM Press. | 10.1145/642611.642686 | null | cs.HC cs.SD | null | This paper presents a mobile audio space intended for use by gelled social
groups. In face-to-face interactions in such social groups, conversational
floors change frequently, e.g., two participants split off to form a new
conversational floor, a participant moves from one conversational floor to
another, etc. To date, audio spaces have provided little support for such
dynamic regroupings of participants, either requiring that the participants
explicitly specify with whom they wish to talk or simply presenting all
participants as though they are in a single floor. By contrast, the audio space
described here monitors participant behavior to identify conversational floors
as they emerge. The system dynamically modifies the audio delivered to each
participant to enhance the salience of the participants with whom they are
currently conversing. We report a user study of the system, focusing on
conversation analytic results.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2003 05:15:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aoki",
"Paul M.",
""
],
[
"Romaine",
"Matthew",
""
],
[
"Szymanski",
"Margaret H.",
""
],
[
"Thornton",
"James D.",
""
],
[
"Wilson",
"Daniel",
""
],
[
"Woodruff",
"Allison",
""
]
] |
cs/0304003 | Fang Yu | Farn Wang, Geng-Dian Hwang and Fang Yu | TCTL Inevitability Analysis of Dense-time Systems | 22 pages | null | null | null | cs.SC | null | Inevitability properties in branching temporal logics are of the syntax
forall eventually \phi, where \phi is an arbitrary (timed) CTL formula. In the
sense that "good things will happen", they are parallel to the "liveness"
properties in linear temporal logics. Such inevitability properties in
dense-time logics can be analyzed with greatest fixpoint calculation. We
present algorithms to model-check inevitability properties both with and
without requirement of non-Zeno computations. We discuss a technique for early
decision on greatest fixpoints in the temporal logics, and experiment with the
effect of non-Zeno computations on the evaluation of greatest fixpoints. We
also discuss the TCTL subclass with only universal path quantifiers which
allows for the safe abstraction analysis of inevitability properties. Finally,
we report our implementation and experiments to show the plausibility of our
ideas.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2003 07:28:29 GMT"
},
{
"version": "v2",
"created": "Tue, 20 May 2003 03:07:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Farn",
""
],
[
"Hwang",
"Geng-Dian",
""
],
[
"Yu",
"Fang",
""
]
] |
cs/0304004 | Martin Ziegler | Martin Ziegler | Quasi-Optimal Arithmetic for Quaternion Polynomials | published version (11 pages) plus appendix (2 pages) | pp.705-715 in Proc.14th ISAAC (2003), Springer LNCS 2906 | null | null | cs.SC | null | Fast algorithms for arithmetic on real or complex polynomials are well-known
and have proven to be not only asymptotically efficient but also very
practical. Based on Fast Fourier Transform (FFT), they for instance multiply
two polynomials of degree up to N or multi-evaluate one at N points
simultaneously within quasi-linear time O(N.polylog N). An extension to (and in
fact the mere definition of) polynomials over the skew-field H of quaternions
is promising but still missing. The present work proposes three such
definitions which in the commutative case coincide but for H turn out to
differ, each one satisfying some desirable properties while lacking others. For
each notion we devise algorithms for according arithmetic; these are
quasi-optimal in that their running times match lower complexity bounds up to
polylogarithmic factors.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2003 19:21:21 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Jan 2004 12:10:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ziegler",
"Martin",
""
]
] |
cs/0304005 | Oded Regev | Oded Regev | Quantum Computation and Lattice Problems | null | null | null | null | cs.DS | null | We present the first explicit connection between quantum computation and
lattice problems. Namely, we show a solution to the Unique Shortest Vector
Problem (SVP) under the assumption that there exists an algorithm that solves
the hidden subgroup problem on the dihedral group by coset sampling. Moreover,
we solve the hidden subgroup problem on the dihedral group by using an average
case subset sum routine. By combining the two results, we get a quantum
reduction from $\Theta(n^{2.5})$-unique-SVP to the average case subset sum
problem.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2003 23:35:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Regev",
"Oded",
""
]
] |
cs/0304006 | Lillian Lee | Regina Barzilay and Lillian Lee | Learning to Paraphrase: An Unsupervised Approach Using Multiple-Sequence
Alignment | Proceedings of HLT-NAACL 2003 (Human Language Technology Conference) | null | null | null | cs.CL | null | We address the text-to-text generation problem of sentence-level paraphrasing
-- a phenomenon distinct from and more difficult than word- or phrase-level
paraphrasing. Our approach applies multiple-sequence alignment to sentences
gathered from unannotated comparable corpora: it learns a set of paraphrasing
patterns represented by word lattice pairs and automatically determines how to
apply these patterns to rewrite new sentences. The results of our evaluation
experiments show that the system derives accurate paraphrases, outperforming
baseline systems.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2003 23:02:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barzilay",
"Regina",
""
],
[
"Lee",
"Lillian",
""
]
] |
cs/0304007 | Gonzalo Alvarez | Slobodan Petrovic, Gonzalo Alvarez | A Method for Clustering Web Attacks Using Edit Distance | 10 pages, 2 figures, latex format | null | null | null | cs.IR cs.AI cs.CR | null | Cluster analysis often serves as the initial step in the process of data
classification. In this paper, the problem of clustering different length input
data is considered. The edit distance as the minimum number of elementary edit
operations needed to transform one vector into another is used. A heuristic for
clustering unequal length vectors, analogue to the well known k-means algorithm
is described and analyzed. This heuristic determines cluster centroids
expanding shorter vectors to the lengths of the longest ones in each cluster in
a specific way. It is shown that the time and space complexities of the
heuristic are linear in the number of input vectors. Experimental results on
real data originating from a system for classification of Web attacks are
given.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2003 10:17:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petrovic",
"Slobodan",
""
],
[
"Alvarez",
"Gonzalo",
""
]
] |
cs/0304008 | Stephen A. Fenner | Stephen A. Fenner | A Physics-Free Introduction to the Quantum Computation Model | 18 pages, 18 figures. Expanded write-up for BEATCS of introductory
talk given at Dagstuhl Seminar 02421, "Algebraic Methods in Quantum and
Classical Models of Computation," October 2002 | Bulletin of the European Association for Theoretical Computer
Science, 79(Feb 2003), 69-85 | null | null | cs.CC quant-ph | null | This article defines and proves basic properties of the standard quantum
circuit model of computation. The model is developed abstractly in close
analogy with (classical) deterministic and probabilistic circuits, without
recourse to any physical concepts or principles. It is intended as a primer for
theoretical computer scientists who do not know--and perhaps do not care to
know--any physics.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2003 20:01:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fenner",
"Stephen A.",
""
]
] |
cs/0304009 | Gilles Daniel | Gilles Daniel | Stochastic Volatility in a Quantitative Model of Stock Market Returns | MSc thesis (2002), 83 pages, 15 figures | null | null | null | cs.CE | null | Standard quantitative models of the stock market predict a log-normal
distribution for stock returns (Bachelier 1900, Osborne 1959), but it is
recognised (Fama 1965) that empirical data, in comparison with a Gaussian,
exhibit leptokurtosis (it has more probability mass in its tails and centre)
and fat tails (probabilities of extreme events are underestimated). Different
attempts to explain this departure from normality have coexisted. In
particular, since one of the strong assumptions of the Gaussian model concerns
the volatility, considered finite and constant, the new models were built on a
non finite (Mandelbrot 1963) or non constant (Cox, Ingersoll and Ross 1985)
volatility. We investigate in this thesis a very recent model (Dragulescu et
al. 2002) based on a Brownian motion process for the returns, and a stochastic
mean-reverting process for the volatility. In this model, the forward
Kolmogorov equation that governs the time evolution of returns is solved
analytically. We test this new theory against different stock indexes (Dow
Jones Industrial Average, Standard and Poor s and Footsie), over different
periods (from 20 to 105 years). Our aim is to compare this model with the
classical Gaussian and with a simple Neural Network, used as a benchmark. We
perform the usual statistical tests on the kurtosis and tails of the expected
distributions, paying particular attention to the outliers. As claimed by the
authors, the new model outperforms the Gaussian for any time lag, but is
artificially too complex for medium and low frequencies, where the Gaussian is
preferable. Moreover this model is still rejected for high frequencies, at a
0.05 level of significance, due to the kurtosis, incorrectly handled.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2003 17:37:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daniel",
"Gilles",
""
]
] |
cs/0304011 | Goncalo Carvalho | Paul Anderson and Goncalo Carvalho | Embedded Reflection Mapping | null | null | null | null | cs.GR | null | Environment maps are used to simulate reflections off curved objects. We
present a technique to reflect a user, or a group of users, in a real
environment, onto a virtual object, in a virtual reality application, using the
live video feeds from a set of cameras, in real-time. Our setup can be used in
a variety of environments ranging from outdoor or indoor scenes.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2003 14:17:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Anderson",
"Paul",
""
],
[
"Carvalho",
"Goncalo",
""
]
] |
cs/0304012 | Paul Vitanyi | Harry Buhrman (CWI and University of Amsterdam), Hartmut Klauck (IAS,
Princeton), Nikolai Vereshchagin (Moscow University), Paul Vitanyi (CWI and
University of Amsterdam) | Individual Communication Complexity | 11 pages, LaTeX | null | null | null | cs.CC cs.DC | null | We initiate the theory of communication complexity of individual inputs held
by the agents, rather than worst-case or average-case. We consider total,
partial, and partially correct protocols, one-way versus two-way, with and
without help bits. The results are expressed in trems of Kolmogorov complexity.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2003 15:41:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"Harry",
"",
"CWI and University of Amsterdam"
],
[
"Klauck",
"Hartmut",
"",
"IAS,\n Princeton"
],
[
"Vereshchagin",
"Nikolai",
"",
"Moscow University"
],
[
"Vitanyi",
"Paul",
"",
"CWI and\n University of Amsterdam"
]
] |
cs/0304013 | Ilia Toli | Ilia Toli | Hidden Polynomial(s) Cryptosystems | null | null | null | null | cs.CR cs.SC | null | We propose public-key cryptosystems with public key a system of polynomial
equations, algebraic or differential, and private key a single polynomial or a
small-size ideal. We set up probabilistic encryption, signature, and
signcryption protocols.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2003 12:28:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toli",
"Ilia",
""
]
] |
cs/0304014 | Andreas Winter | Andreas Winter, Anderson C. A. Nascimento, Hideki Imai | Commitment Capacity of Discrete Memoryless Channels | 20 pages, LaTeX2e | Proc. 9th Cirencester Crypto and Coding Conf., LNCS 2989, pp
35-51, Springer, Berlin 2003. | null | null | cs.CR quant-ph | null | In extension of the bit commitment task and following work initiated by
Crepeau and Kilian, we introduce and solve the problem of characterising the
optimal rate at which a discrete memoryless channel can be used for bit
commitment. It turns out that the answer is very intuitive: it is the maximum
equivocation of the channel (after removing trivial redundancy), even when
unlimited noiseless bidirectional side communication is allowed.
By a well-known reduction, this result provides a lower bound on the
channel's capacity for implementing coin tossing, which we conjecture to be an
equality.
The method of proving this relates the problem to Wyner's wire--tap channel
in an amusing way. We also discuss extensions to quantum channels.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2003 13:55:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Winter",
"Andreas",
""
],
[
"Nascimento",
"Anderson C. A.",
""
],
[
"Imai",
"Hideki",
""
]
] |
cs/0304015 | Judith Beumer | Xuehai Zhang, Jeffrey Freschl, and Jennifer M. Schopf | A Performance Study of Monitoring and Information Services for
Distributed Systems | 12 pages, 20 figures | null | null | Preprint ANL/MCS-P1040-0403 | cs.PF | null | Monitoring and information services form a key component of a distributed
system, or Grid. A quantitative study of such services can aid in understanding
the performance limitations, advise in the deployment of the systems, and help
evaluate future development work. To this end, we study the performance of
three monitoring and information services for distributed systems: the Globus
Toolkit's Monitoring and Discovery Service (MDS), the European Data Grid
Relational Grid Monitoring Architecture (R-GMA), and Hawkeye, part of the
Condor project. We perform experiments to test their scalability with respect
to number of users, number of resources, and amount of data collected. Our
study shows that each approach has different behaviors, often due to their
different design goals. In the four sets of experiments we conducted to
evaluate the performance of the service components under different
circumstances, we found a strong advantage to caching or prefetching the data,
as well as the need to have primary components at well connected sites due to
high load seen by all systems.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2003 14:01:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Xuehai",
""
],
[
"Freschl",
"Jeffrey",
""
],
[
"Schopf",
"Jennifer M.",
""
]
] |
cs/0304017 | Nachum Dershowitz | Nachum Dershowitz | Ground Canonicity | null | null | null | null | cs.LO | null | We explore how different proof orderings induce different notions of
saturation. We relate completion, paramodulation, saturation, redundancy
elimination, and rewrite system reduction to proof orderings.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2003 20:08:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dershowitz",
"Nachum",
""
]
] |
cs/0304018 | David Eppstein | David Eppstein | Quasiconvex Analysis of Backtracking Algorithms | 12 pages, 2 figures. This revision includes a larger example
recurrence and reports on a second implementation of the algorithm | null | null | null | cs.DS cs.CG math.CO | null | We consider a class of multivariate recurrences frequently arising in the
worst case analysis of Davis-Putnam-style exponential time backtracking
algorithms for NP-hard problems. We describe a technique for proving asymptotic
upper bounds on these recurrences, by using a suitable weight function to
reduce the problem to that of solving univariate linear recurrences; show how
to use quasiconvex programming to determine the weight function yielding the
smallest upper bound; and prove that the resulting upper bounds are within a
polynomial factor of the true asymptotics of the recurrence. We develop and
implement a multiple-gradient descent algorithm for the resulting quasiconvex
programs, using a real-number arithmetic package for guaranteed accuracy of the
computed worst case time bounds.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2003 20:25:12 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Jul 2003 21:21:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
] |
cs/0304020 | Pranab Sen | Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen | A direct sum theorem in communication complexity via message compression | 21 pages. Full version of a paper to appear at ICALP 2003 | null | null | null | cs.CC | null | We prove lower bounds for the direct sum problem for two-party bounded error
randomised multiple-round communication protocols. Our proofs use the notion of
information cost of a protocol, as defined by Chakrabarti, Shi, Wirth and Yao
and refined further by Bar-Yossef, Jayram, Kumar and Sivakumar. Our main
technical result is a `compression' theorem saying that, for any probability
distribution $\mu$ over the inputs, a $k$-round private coin bounded error
protocol for a function $f$ with information cost $c$ can be converted into a
$k$-round deterministic protocol for $f$ with bounded distributional error and
communication cost $O(kc)$. We prove this result using a substate theorem about
relative entropy and a rejection sampling argument. Our direct sum result
follows from this `compression' result via elementary information theoretic
arguments.
We also consider the direct sum problem in quantum communication. Using a
probabilistic argument, we show that messages cannot be compressed in this
manner even if they carry small information. Hence, new techniques may be
necessary to tackle the direct sum problem in quantum communication.
| [
{
"version": "v1",
"created": "Sat, 12 Apr 2003 02:26:26 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2003 20:21:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"Rahul",
""
],
[
"Radhakrishnan",
"Jaikumar",
""
],
[
"Sen",
"Pranab",
""
]
] |
cs/0304021 | Peter Buchholz | Peter Buchholz and Peter Kemper | Model Checking for a Class of Weighted Automata | 24 pages | null | null | University of Dortmund, Department of Computer Science Technical
report No. 779 | cs.LO | null | A large number of different model checking approaches has been proposed
during the last decade. The different approaches are applicable to different
model types including untimed, timed, probabilistic and stochastic models. This
paper presents a new framework for model checking techniques which includes
some of the known approaches, but enlarges the class of models for which model
checking can be applied to the general class of weighted automata. The approach
allows an easy adaption of model checking to models which have not been
considered yet for this purpose. Examples for those new model types for which
model checking can be applied are max/plus or min/plus automata which are well
established models to describe different forms of dynamic systems and
optimization problems. In this context, model checking can be used to verify
temporal or quantitative properties of a system. The paper first presents
briefly our class of weighted automata, as a very general model type. Then
Valued Computational Tree Logic (CTL$) is introduced as a natural extension of
the well known branching time logic CTL. Afterwards, algorithms to check a
weighted automaton according to a CTL$ formula are presented. As a last result,
a bisimulation is presented for weighted automata and for CTL$.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2003 19:08:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buchholz",
"Peter",
""
],
[
"Kemper",
"Peter",
""
]
] |
cs/0304023 | Mirela Damian | Mirela Damian and Joseph O'Rourke | Partitioning Regular Polygons into Circular Pieces I: Convex Partitions | 21 pages, 25 figures | null | null | null | cs.CG | null | We explore an instance of the question of partitioning a polygon into pieces,
each of which is as ``circular'' as possible, in the sense of having an aspect
ratio close to 1. The aspect ratio of a polygon is the ratio of the diameters
of the smallest circumscribing circle to the largest inscribed disk. The
problem is rich even for partitioning regular polygons into convex pieces, the
focus of this paper. We show that the optimal (most circular) partition for an
equilateral triangle has an infinite number of pieces, with the lower bound
approachable to any accuracy desired by a particular finite partition. For
pentagons and all regular k-gons, k > 5, the unpartitioned polygon is already
optimal. The square presents an interesting intermediate case. Here the
one-piece partition is not optimal, but nor is the trivial lower bound
approachable. We narrow the optimal ratio to an aspect-ratio gap of 0.01082
with several somewhat intricate partitions.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2003 12:29:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0304024 | Victor Kromer | Kromer Victor | Glottochronologic Retrognostic of Language System | 10 pages, 7 figures. In Russian | null | null | null | cs.CL | null | A glottochronologic retrognostic of language system is proposed
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2003 02:22:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Victor",
"Kromer",
""
]
] |
cs/0304025 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 44 | 3 pages, 3 figures | null | null | null | cs.CG | null | The open problem of whether or not every pair of equal-area polygons has a
hinged dissection is discussed.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2003 21:12:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0304026 | Oded Regev | Irit Dinur, Venkatesan Guruswami, Subhash Khot, Oded Regev | A New Multilayered PCP and the Hardness of Hypergraph Vertex Cover | null | null | null | null | cs.CC | null | Given a $k$-uniform hyper-graph, the E$k$-Vertex-Cover problem is to find the
smallest subset of vertices that intersects every hyper-edge. We present a new
multilayered PCP construction that extends the Raz verifier. This enables us to
prove that E$k$-Vertex-Cover is NP-hard to approximate within factor
$(k-1-\epsilon)$ for any $k \geq 3$ and any $\epsilon>0$. The result is
essentially tight as this problem can be easily approximated within factor $k$.
Our construction makes use of the biased Long-Code and is analyzed using
combinatorial properties of $s$-wise $t$-intersecting families of subsets.
| [
{
"version": "v1",
"created": "Sat, 19 Apr 2003 17:59:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dinur",
"Irit",
""
],
[
"Guruswami",
"Venkatesan",
""
],
[
"Khot",
"Subhash",
""
],
[
"Regev",
"Oded",
""
]
] |
cs/0304027 | Lillian Lee | Lillian Lee | "I'm sorry Dave, I'm afraid I can't do that": Linguistics, Statistics,
and Natural Language Processing circa 2001 | To appear, National Research Council study on the Fundamentals of
Computer Science. 7 pages | In "Computer Science: Reflections on the Field, Reflections from
the Field" (report of the National Academies' Study on the Fundamentals of
Computer Science), pp. 111--118, 2004 | null | null | cs.CL | null | A brief, general-audience overview of the history of natural language
processing, focusing on data-driven approaches.Topics include "Ambiguity and
language analysis", "Firth things first", "A 'C' change", and "The empiricists
strike back".
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2003 22:10:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Lillian",
""
]
] |
cs/0304028 | Baden Hughes | Baden Hughes and Steven Bird | Grid-Enabling Natural Language Engineering By Stealth | null | null | null | null | cs.DC cs.CL | null | We describe a proposal for an extensible, component-based software
architecture for natural language engineering applications. Our model leverages
existing linguistic resource description and discovery mechanisms based on
extended Dublin Core metadata. In addition, the application design is flexible,
allowing disparate components to be combined to suit the overall application
functionality. An application specification language provides abstraction from
the programming environment and allows ease of interface with computational
grids via a broker.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2003 02:51:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hughes",
"Baden",
""
],
[
"Bird",
"Steven",
""
]
] |
cs/0304029 | Manuela Kunze | Dietmar Roesner, Manuela Kunze | An XML based Document Suite | null | Proceedings of COLING 2002; p. 1278-1282 | null | null | cs.CL | null | We report about the current state of development of a document suite and its
applications. This collection of tools for the flexible and robust processing
of documents in German is based on the use of XML as unifying formalism for
encoding input and output data as well as process information. It is organized
in modules with limited responsibilities that can easily be combined into
pipelines to solve complex tasks. Strong emphasis is laid on a number of
techniques to deal with lexical and conceptual gaps that are typical when
starting a new application.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2003 13:45:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roesner",
"Dietmar",
""
],
[
"Kunze",
"Manuela",
""
]
] |
cs/0304030 | John M. Hitchcock | John M. Hitchcock | Small Spans in Scaled Dimension | 28 pages | null | null | null | cs.CC | null | Juedes and Lutz (1995) proved a small span theorem for polynomial-time
many-one reductions in exponential time. This result says that for language A
decidable in exponential time, either the class of languages reducible to A
(the lower span) or the class of problems to which A can be reduced (the upper
span) is small in the sense of resource-bounded measure and, in particular,
that the degree of A is small. Small span theorems have been proven for
increasingly stronger polynomial-time reductions, and a small span theorem for
polynomial-time Turing reductions would imply BPP != EXP. In contrast to the
progress in resource-bounded measure, Ambos-Spies, Merkle, Reimann, and Stephan
(2001) showed that there is no small span theorem for the resource-bounded
dimension of Lutz (2000), even for polynomial-time many-one reductions.
Resource-bounded scaled dimension, recently introduced by Hitchcock, Lutz,
and Mayordomo (2003), provides rescalings of resource-bounded dimension. We use
scaled dimension to further understand the contrast between measure and
dimension regarding polynomial-time spans and degrees. We strengthen prior
results by showing that the small span theorem holds for polynomial-time
many-one reductions in the -3rd-order scaled dimension, but fails to hold in
the -2nd-order scaled dimension. Our results also hold in exponential space.
As an application, we show that determining the -2nd- or -1st-order scaled
dimension in ESPACE of the many-one complete languages for E would yield a
proof of P = BPP or P != PSPACE. On the other hand, it is shown unconditionally
that the complete languages for E have -3rd-order scaled dimension 0 in ESPACE
and -2nd- and -1st-order scaled dimension 1 in E.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2003 19:43:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hitchcock",
"John M.",
""
]
] |
cs/0304031 | Douglas A. Galbi | Douglas A. Galbi | Transforming the Structure of Network Interconnection and Transport | null | CommLaw Conspectus, v. 8, n. 2 (Summer 2000) pp. 203-18 | null | null | cs.CY | null | Vibrant development of a network-based economy requires separating investment
in highly location specific local access technology from the development of
standardized, geography-independent, wide-area network services. Thus far
interconnection arrangements and associated regulations have been too closely
tied to the idiosyncratic geographic structure of individual operators'
networks. A key industry challenge is to foster the development of a wide area
lattice of common geographic points of interconnection. Sound regulatory and
anti-trust policy can help address this industry need.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2003 20:18:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Galbi",
"Douglas A.",
""
]
] |
cs/0304032 | Douglas A. Galbi | Douglas A. Galbi | Growth in the "New Economy": U.S. Bandwidth Use and Pricing Across the
1990s | null | Telecommunications Policy 25 (2001) 139-154 | null | null | cs.CY | null | An acceleration in the growth of communications bandwidth in use and a rapid
reduction in bandwidth prices have not accompanied the U.S. economy's strong
performance in the second half of the 1990s. Overall U.S. bandwidth in use has
grown robustly throughout the 1990s, but growth has not significantly
accelerated in the second half of 1990s. Average prices for U.S. bandwidth in
use have fallen little in nominal terms in the second half of the 1990s. Policy
makers and policy analysts should recognize that institutional change, rather
than more competitors of established types, appears to be key to dramatic
improvements in bandwidth growth and prices. Such a development could provide a
significant additional impetus to aggregate growth and productivity.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2003 20:33:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Galbi",
"Douglas A.",
""
]
] |
cs/0304033 | Douglas A. Galbi | Douglas A. Galbi | A New Account of Personalization and Effective Communication | null | null | null | null | cs.CY | null | To contribute to understanding of information economies of daily life, this
paper explores over the past millennium given names of a large number of
persons. Analysts have long both condemned and praised mass media as a source
of common culture, national unity, or shared symbolic experiences. Names,
however, indicate a large decline in shared symbolic experience over the past
two centuries, a decline that the growth of mass media does not appear to have
affected significantly. Study of names also shows that action and personal
relationships, along with time horizon, are central aspects of effective
communication across a large population. The observed preference for
personalization over the past two centuries and the importance of action and
personal relationships to effective communication are aspects of information
economies that are likely to have continuing significance for industry
developments, economic statistics, and public policy.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2003 21:37:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Galbi",
"Douglas A.",
""
]
] |
cs/0304034 | Douglas A. Galbi | Douglas A. Galbi | Revolutionary Ideas for Radio Regulation | null | null | null | null | cs.CY | null | Radio technology seems destined to become part of the standard
micro-processor input/output system. But unlike for memory or display systems,
for radio systems government regulation matters a lot. Much discussion of radio
regulation has focused on narrow spectrum management and interference issues.
Reflecting on historical experience and centuries of conversation about
fundamental political choices, persons working with radio technology should
also ponder three questions. First, what is a good separation and balance of
powers in radio regulation? Second, how should radio regulation be
geographically configured? Third, how should radio regulation understand and
respect personal freedom and equality? Working out answering to these questions
involves a general process of shaping good government. This process will be
hugely important for radio regulation, technology, and applications.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2003 21:46:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Galbi",
"Douglas A.",
""
]
] |
cs/0304035 | Manuela Kunze | Dietmar Roesner, Manuela Kunze | Exploiting Sublanguage and Domain Characteristics in a Bootstrapping
Approach to Lexicon and Ontology Creation | null | Workshop-Proceedings of the OntoLex 2002 - Ontologies and Lexical
Knowledge Bases at the LREC 2002, p. 68-73 | null | null | cs.CL | null | It is very costly to build up lexical resources and domain ontologies.
Especially when confronted with a new application domain lexical gaps and a
poor coverage of domain concepts are a problem for the successful exploitation
of natural language document analysis systems that need and exploit such
knowledge sources. In this paper we report about ongoing experiments with
`bootstrapping techniques' for lexicon and ontology creation.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2003 08:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roesner",
"Dietmar",
""
],
[
"Kunze",
"Manuela",
""
]
] |
cs/0304036 | Manuela Kunze | Manuela Kunze, Chun Xiao | An Approach for Resource Sharing in Multilingual NLP | poster | STAIRS 2002 - STarting Artificial Intelligence Researchers
Symposium at the ECAI 2002. Lyon, France. ISBN 158603 259 3. IOS Press
Amsterdam, p. 123-124 | null | null | cs.CL | null | In this paper we describe an approach for the analysis of documents in German
and English with a shared pool of resources. For the analysis of German
documents we use a document suite, which supports the user in tasks like
information retrieval and information extraction. The core of the document
suite is based on our tool XDOC. Now we want to exploit these methods for the
analysis of English documents as well. For this aim we need a multilingual
presentation format of the resources. These resources must be transformed into
an unified format, in which we can set additional information about linguistic
characteristics of the language depending on the analyzed documents. In this
paper we describe our approach for such an exchange model for multilingual
resources based on XML.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2003 08:32:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kunze",
"Manuela",
""
],
[
"Xiao",
"Chun",
""
]
] |
cs/0304037 | Judith Beumer | Sudharshan Vazhkudai and Jennifer M. Schopf | Using Regression Techniques to Predict Large Data Transfers | 29 pages, 11 figures | null | null | Preprint ANL/MCS-P1033-0303 | cs.DC | null | The recent proliferation of Data Grids and the increasingly common practice
of using resources as distributed data stores provide a convenient environment
for communities of researchers to share, replicate, and manage access to copies
of large datasets. This has led to the question of which replica can be
accessed most efficiently. In such environments, fetching data from one of the
several replica locations requires accurate predictions of end-to-end transfer
times. The answer to this question can depend on many factors, including
physical characteristics of the resources and the load behavior on the CPUs,
networks, and storage devices that are part of the end-to-end data path linking
possible sources and sinks. Our approach combines end-to-end application
throughput observations with network and disk load variations and captures
whole-system performance and variations in load patterns. Our predictions
characterize the effect of load variations of several shared devices (network
and disk) on file transfer times. We develop a suite of univariate and
multivariate predictors that can use multiple data sources to improve the
accuracy of the predictions as well as address Data Grid variations
(availability of data and sporadic nature of transfers). We ran a large set of
data transfer experiments using GridFTP and observed performance predictions
within 15% error for our testbed sites, which is quite promising for a
pragmatic system.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2003 20:36:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vazhkudai",
"Sudharshan",
""
],
[
"Schopf",
"Jennifer M.",
""
]
] |
cs/0304042 | Alexander Roitershtein | A. Ben-Hur, A. Roitershtein, H. Siegelmann | On probabilistic analog automata | null | null | null | null | cs.OH | null | We consider probabilistic automata on a general state space and study their
computational power. The model is based on the concept of language recognition
by probabilistic automata due to Rabin and models of analog computation in a
noisy environment suggested by Maass and Orponen, and Maass and Sontag. Our
main result is a generalization of Rabin's reduction theorem that implies that
under very mild conditions, the computational power of the automaton is limited
to regular languages.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2003 01:48:44 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Apr 2003 20:06:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ben-Hur",
"A.",
""
],
[
"Roitershtein",
"A.",
""
],
[
"Siegelmann",
"H.",
""
]
] |
cs/0304044 | Michael N. Vyalyi | M.N.Vyalyi | Hardness of approximating the weight enumerator of a binary linear code | 7 pages | null | null | null | cs.CC | null | We consider the problem of evaluation of the weight enumerator of a binary
linear code. We show that the exact evaluation is hard for polynomial
hierarchy. More exactly, if WE is an oracle answering the solution of the
evaluation problem then P^WE=P^GapP. Also we consider the approximative
evaluation of the weight enumerator. In the case of approximation with additive
accuracy $2^{\alpha n}$, $\alpha$ is constant the problem is hard in the above
sense. We also prove that approximate evaluation at a single point $e^{\pi
i/4}$ is hard for $0<\al<\al_0\approx0.88$.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2003 03:13:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vyalyi",
"M. N.",
""
]
] |
cs/0304045 | Simone Severini | Simone Severini (U. Bristol) | On a composition of digraphs | 6 pages, 1 figure. Abstract accepted for the Third Haifa Workshop on
Interdisciplinary Applications of Graph Theory, Combinatorics and Algorithms,
May 27-29, 2003, Haifa, Israel | null | null | null | cs.DM cs.AR cs.NI | null | Many "good" topologies for interconnection networks are based on line
digraphs of regular digraphs. These digraphs support unitary matrices. We
propose the property "being the digraph of a unitary matrix" as additional
criterion for the design of new interconnection networks. We define a
composition of digraphs, which we call diagonal union. Diagonal union can be
used to construct digraphs of unitary matrices. We remark that digraphs
obtained via diagonal union are state split graphs, as defined in symbolic
dynamics. Finally, we list some potential directions for future research.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2003 16:11:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Severini",
"Simone",
"",
"U. Bristol"
]
] |
cs/0305001 | Ambuj Mahanti | Ambuj Mahanti, Supriyo Ghose and Samir K. Sadhukhan | A Framework for Searching AND/OR Graphs with Cycles | 40 pages, 20 figures, 5 tables | null | null | null | cs.AI | null | Search in cyclic AND/OR graphs was traditionally known to be an unsolved
problem. In the recent past several important studies have been reported in
this domain. In this paper, we have taken a fresh look at the problem. First, a
new and comprehensive theoretical framework for cyclic AND/OR graphs has been
presented, which was found missing in the recent literature. Based on this
framework, two best-first search algorithms, S1 and S2, have been developed. S1
does uninformed search and is a simple modification of the Bottom-up algorithm
by Martelli and Montanari. S2 performs a heuristically guided search and
replicates the modification in Bottom-up's successors, namely HS and AO*. Both
S1 and S2 solve the problem of searching AND/OR graphs in presence of cycles.
We then present a detailed analysis for the correctness and complexity results
of S1 and S2, using the proposed framework. We have observed through
experiments that S1 and S2 output correct results in all cases.
| [
{
"version": "v1",
"created": "Thu, 1 May 2003 04:48:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mahanti",
"Ambuj",
""
],
[
"Ghose",
"Supriyo",
""
],
[
"Sadhukhan",
"Samir K.",
""
]
] |
cs/0305002 | Marcus Hutter | Monaldo Mastrolilli and Marcus Hutter | Hybrid Rounding Techniques for Knapsack Problems | 19 LaTeX pages | Discrete Applied Mathematics, 154:4 (2006) 640-649 | 10.1016/j.dam.2005.08.004 | IDSIA-03-02 | cs.CC cs.DM cs.DS | null | We address the classical knapsack problem and a variant in which an upper
bound is imposed on the number of items that can be selected. We show that
appropriate combinations of rounding techniques yield novel and powerful ways
of rounding. As an application of these techniques, we present a linear-storage
Polynomial Time Approximation Scheme (PTAS) and a Fully Polynomial Time
Approximation Scheme (FPTAS) that compute an approximate solution, of any fixed
accuracy, in linear time. This linear complexity bound gives a substantial
improvement of the best previously known polynomial bounds.
| [
{
"version": "v1",
"created": "Fri, 2 May 2003 20:40:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mastrolilli",
"Monaldo",
""
],
[
"Hutter",
"Marcus",
""
]
] |
cs/0305003 | Stina Nylander | Stina Nylander, Markus Bylund, Annika Waern | The Ubiquitous Interactor - Device Independent Access to Mobile Services | null | null | null | null | cs.HC | null | The Ubiquitous Interactor (UBI) addresses the problems of design and
development that arise around services that need to be accessed from many
different devices. In UBI, the same service can present itself with different
user interfaces on different devices. This is done by separating interaction
between users and services from presentation. The interaction is kept the same
for all devices, and different presentation information is provided for
different devices. This way, tailored user interfaces for many different
devices can be created without multiplying development and maintenance work. In
this paper we describe the system design of UBI, the system implementation, and
two services implemented for the system: a calendar service and a stockbroker
service.
| [
{
"version": "v1",
"created": "Mon, 5 May 2003 11:32:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nylander",
"Stina",
""
],
[
"Bylund",
"Markus",
""
],
[
"Waern",
"Annika",
""
]
] |
cs/0305004 | V. Sriram | V.Sriram, B. Ravi Sekar Reddy and R. Sangal | Approximate Grammar for Information Extraction | 10 pages, 3 figures, 2 tables, Presented at "International Conference
on Universal Knowledge and Language, Goa'2002" | Conference on Universal Knowledge and Language, Goa'2002 | null | null | cs.CL cs.AI | null | In this paper, we present the concept of Approximate grammar and how it can
be used to extract information from a documemt. As the structure of
informational strings cannot be defined well in a document, we cannot use the
conventional grammar rules to represent the information. Hence, the need arises
to design an approximate grammar that can be used effectively to accomplish the
task of Information extraction. Approximate grammars are a novel step in this
direction. The rules of an approximate grammar can be given by a user or the
machine can learn the rules from an annotated document. We have performed our
experiments in both the above areas and the results have been impressive.
| [
{
"version": "v1",
"created": "Tue, 6 May 2003 14:06:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sriram",
"V.",
""
],
[
"Reddy",
"B. Ravi Sekar",
""
],
[
"Sangal",
"R.",
""
]
] |
cs/0305005 | Gianni Franceschini | Gianni Franceschini and Viliam Geffert | An In-Place Sorting with O(n log n) Comparisons and O(n) Moves | null | null | null | null | cs.DS cs.CC | null | We present the first in-place algorithm for sorting an array of size n that
performs, in the worst case, at most O(n log n) element comparisons and O(n)
element transports.
This solves a long-standing open problem, stated explicitly, e.g., in [J.I.
Munro and V. Raman, Sorting with minimum data movement, J. Algorithms, 13,
374-93, 1992], of whether there exists a sorting algorithm that matches the
asymptotic lower bounds on all computational resources simultaneously.
| [
{
"version": "v1",
"created": "Fri, 9 May 2003 14:56:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Franceschini",
"Gianni",
""
],
[
"Geffert",
"Viliam",
""
]
] |
cs/0305006 | Hsueh-I. Lu | Ming-Yang Chen, Hsueh-I. Lu, and Hsu-Chun Yen | On the Ramsey Numbers for Bipartite Multigraphs | 10 pages, 3 figures | null | null | null | cs.DM | null | A coloring of a complete bipartite graph is shuffle-preserved if it is the
case that assigning a color $c$ to edges $(u, v)$ and $(u', v')$ enforces the
same color assignment for edges $(u, v')$ and $(u',v)$. (In words, the induced
subgraph with respect to color $c$ is complete.) In this paper, we investigate
a variant of the Ramsey problem for the class of complete bipartite
multigraphs. (By a multigraph we mean a graph in which multiple edges, but no
loops, are allowed.) Unlike the conventional m-coloring scheme in Ramsey theory
which imposes a constraint (i.e., $m$) on the total number of colors allowed in
a graph, we introduce a relaxed version called m-local coloring which only
requires that, for every vertex $v$, the number of colors associated with $v$'s
incident edges is bounded by $m$. Note that the number of colors found in a
graph under $m$-local coloring may exceed m. We prove that given any $n \times
n$ complete bipartite multigraph $G$, every shuffle-preserved $m$-local
coloring displays a monochromatic copy of $K_{p,p}$ provided that $2(p-1)(m-1)
< n$. Moreover, the above bound is tight when (i) $m=2$, or (ii) $n=2^k$ and
$m=3\cdot 2^{k-2}$ for every integer $k\geq 2$. As for the lower bound of $p$,
we show that the existence of a monochromatic $K_{p,p}$ is not guaranteed if
$p> \lceil \frac{n}{m} \rceil$. Finally, we give a generalization for
$k$-partite graphs and a method applicable to general graphs. Many conclusions
found in $m$-local coloring can be inferred to similar results of $m$-coloring.
| [
{
"version": "v1",
"created": "Mon, 12 May 2003 16:17:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Ming-Yang",
""
],
[
"Lu",
"Hsueh-I.",
""
],
[
"Yen",
"Hsu-Chun",
""
]
] |
cs/0305007 | Chris Johnson | C. A. Johnson | Computing only minimal answers in disjunctive deductive databases | 48 pages | null | null | null | cs.LO | null | A method is presented for computing minimal answers in disjunctive deductive
databases under the disjunctive stable model semantics. Such answers are
constructed by repeatedly extending partial answers. Our method is complete (in
that every minimal answer can be computed) and does not admit redundancy (in
the sense that every partial answer generated can be extended to a minimal
answer), whence no non-minimal answer is generated. For stratified databases,
the method does not (necessarily) require the computation of models of the
database in their entirety. Compilation is proposed as a tool by which problems
relating to computational efficiency and the non-existence of disjunctive
stable models can be overcome. The extension of our method to other semantics
is also considered.
| [
{
"version": "v1",
"created": "Tue, 13 May 2003 08:27:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Johnson",
"C. A.",
""
]
] |
cs/0305008 | MyungHo Kim | Gene Kim and MyungHo Kim | A Representation of Changes of Images and its Application for
Developmental Biolology | 10 pages | null | null | null | cs.CC cs.MS q-bio | null | In this paper, we consider a series of events observed at spaced time
intervals and present a method of representation of the series. To explain an
idea, by dealing with a set of gene expression data, which could be obtained
from developmental biology, the procedures are sketched with comments in some
details. We mean representation by choosing a proper function, which fits well
with observed data of a series, and turning its characteristics into numbers,
which extract the intrinsic properties of fluctuating data. With help of a
machine learning techniques, this method will give a classification of
developmental biological data as well as any varying data during a certain
period and the classification can be applied for diagnosis of a disease.
| [
{
"version": "v1",
"created": "Tue, 13 May 2003 17:48:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kim",
"Gene",
""
],
[
"Kim",
"MyungHo",
""
]
] |
cs/0305009 | Dimitris Achlioptas | Dimitris Achlioptas, Yuval Peres | The Threshold for Random k-SAT is 2^k ln2 - O(k) | Added figures and explained the intuition behind our approach. Made a
correction following comments of Chris Calabro | null | null | null | cs.CC cond-mat.stat-mech cs.DM math.PR | null | Let F be a random k-SAT formula on n variables, formed by selecting uniformly
and independently m = rn out of all possible k-clauses. It is well-known that
if r>2^k ln 2, then the formula F is unsatisfiable with probability that tends
to 1 as n tends to infinity. We prove that there exists a sequence t_k = O(k)
such that if r < 2^k ln 2 - t_k, then the formula F is satisfiable with
probability that tends to 1 as n tends to infinity.
Our technique yields an explicit lower bound for the random k-SAT threshold
for every k. For k>3 this improves upon all previously known lower bounds. For
example, when k=10 our lower bound is 704.94 while the upper bound is 708.94.
| [
{
"version": "v1",
"created": "Wed, 14 May 2003 01:30:10 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Sep 2003 05:56:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Achlioptas",
"Dimitris",
""
],
[
"Peres",
"Yuval",
""
]
] |
cs/0305010 | Faulstich | Lukas C. Faulstich | The NPC Framework for Building Information Dissemination Networks | Erroneous title in PostScript version fixed, two figures added | null | null | null | cs.DL cs.NI | null | Numerous systems for dissemination, retrieval, and archiving of documents
have been developed in the past. Those systems often focus on one of these
aspects and are hard to extend and combine. Typically, the transmission
protocols, query and filtering languages are fixed as well as the interfaces to
other systems. We rather envisage the seamless establishment of networks among
the providers, repositories and consumers of information, supporting
information retrieval and dissemination while being highly interoperable and
extensible.
We propose a framework with a single event-based mechanism that unifies
document storage, retrieval, and dissemination. This framework offers complete
openness with respect to document and metadata formats, transmission protocols,
and filtering mechanisms. It specifies a high-level building kit, by which
arbitrary processors for document streams can be incorporated to support the
retrieval, transformation, aggregation and disaggregation of documents. Using
the same kit, interfaces for different transmission protocols can be added
easily to enable the communication with various information sources and
information consumers.
| [
{
"version": "v1",
"created": "Wed, 14 May 2003 09:49:05 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Jul 2003 11:41:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Faulstich",
"Lukas C.",
""
]
] |
cs/0305011 | Paolo Coppola | Paolo Coppola and Simone Martini | Optimizing Optimal Reduction: A Type Inference Algorithm for Elementary
Affine Logic | null | ACM Transactions on Computational Logic, vol 7 (2006) pp. 219 -
260. | null | null | cs.LO | null | We present a type inference algorithm for lambda-terms in Elementary Affine
Logic using linear constraints. We prove that the algorithm is correct and
complete.
| [
{
"version": "v1",
"created": "Thu, 15 May 2003 10:46:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Coppola",
"Paolo",
""
],
[
"Martini",
"Simone",
""
]
] |
cs/0305012 | Carlos Gershenson | Carlos Gershenson, Gottfried Mayer-Kress, Atin Das, Pritha Das, Matus
Marko | Time-scales, Meaning, and Availability of Information in a Global Brain | 8 pages, 1 figure | null | null | null | cs.AI cs.CY cs.NI | null | We note the importance of time-scales, meaning, and availability of
information for the emergence of novel information meta-structures at a global
scale. We discuss previous work in this area and develop future perspectives.
We focus on the transmission of scientific articles and the integration of
traditional conferences with their virtual extensions on the Internet, their
time-scales, and availability. We mention the Semantic Web as an effort for
integrating meaningful information.
| [
{
"version": "v1",
"created": "Thu, 15 May 2003 16:30:49 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Jul 2003 19:22:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gershenson",
"Carlos",
""
],
[
"Mayer-Kress",
"Gottfried",
""
],
[
"Das",
"Atin",
""
],
[
"Das",
"Pritha",
""
],
[
"Marko",
"Matus",
""
]
] |
cs/0305013 | Johan Schubert | Johan Schubert | On Nonspecific Evidence | 15 pages, 0 figures | International Journal of Intelligent Systems 8(6) (1993) 711-725 | null | FOA Report B 20112-2.7 | cs.AI cs.NE | null | When simultaneously reasoning with evidences about several different events
it is necessary to separate the evidence according to event. These events
should then be handled independently. However, when propositions of evidences
are weakly specified in the sense that it may not be certain to which event
they are referring, this may not be directly possible. In this paper a
criterion for partitioning evidences into subsets representing events is
established. This criterion, derived from the conflict within each subset,
involves minimising a criterion function for the overall conflict of the
partition. An algorithm based on characteristics of the criterion function and
an iterative optimisation among partitionings of evidences is proposed.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 13:39:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305015 | Johan Schubert | Johan Schubert | Finding a Posterior Domain Probability Distribution by Specifying
Nonspecific Evidence | 23 pages, 1 figure | International Journal of Uncertainty, Fuzziness and
Knowledge-Based Systems 3(2) (1995) 163-185 | null | FOA-B-95-00077-3.4-SE | cs.AI cs.NE | null | This article is an extension of the results of two earlier articles. In [J.
Schubert, On nonspecific evidence, Int. J. Intell. Syst. 8 (1993) 711-725] we
established within Dempster-Shafer theory a criterion function called the
metaconflict function. With this criterion we can partition into subsets a set
of several pieces of evidence with propositions that are weakly specified in
the sense that it may be uncertain to which event a proposition is referring.
In a second article [J. Schubert, Specifying nonspecific evidence, in
Cluster-based specification techniques in Dempster-Shafer theory for an
evidential intelligence analysis of multiple target tracks, Ph.D. Thesis,
TRITA-NA-9410, Royal Institute of Technology, Stockholm, 1994, ISBN
91-7170-801-4] we not only found the most plausible subset for each piece of
evidence, we also found the plausibility for every subset that this piece of
evidence belongs to the subset. In this article we aim to find a posterior
probability distribution regarding the number of subsets. We use the idea that
each piece of evidence in a subset supports the existence of that subset to the
degree that this piece of evidence supports anything at all. From this we can
derive a bpa that is concerned with the question of how many subsets we have.
That bpa can then be combined with a given prior domain probability
distribution in order to obtain the sought-after posterior domain distribution.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 14:36:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305016 | Sandor P. Fekete | Sandor P. Fekete and Henk Meijer | The one-round Voronoi game replayed | 14 pages, 6 figures, Latex; revised for journal version, to appear in
Computational Geometry: Theory and Applications. Extended abstract version
appeared in Workshop on Algorithms and Data Structures, Springer Lecture
Notes in Computer Science, vol.2748, 2003, pp. 150-161 | null | null | null | cs.CG cs.GT | null | We consider the one-round Voronoi game, where player one (``White'', called
``Wilma'') places a set of n points in a rectangular area of aspect ratio r
<=1, followed by the second player (``Black'', called ``Barney''), who places
the same number of points. Each player wins the fraction of the board closest
to one of his points, and the goal is to win more than half of the total area.
This problem has been studied by Cheong et al., who showed that for large
enough $n$ and r=1, Barney has a strategy that guarantees a fraction of 1/2+a,
for some small fixed a.
We resolve a number of open problems raised by that paper. In particular, we
give a precise characterization of the outcome of the game for optimal play: We
show that Barney has a winning strategy for n>2 and r>sqrt{2}/n, and for n=2
and r>sqrt{3}/2. Wilma wins in all remaining cases, i.e., for n>=3 and
r<=sqrt{2}/n, for n=2 and r<=sqrt{3}/2, and for n=1. We also discuss complexity
aspects of the game on more general boards, by proving that for a polygon with
holes, it is NP-hard to maximize the area Barney can win against a given set of
points by Wilma.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 14:43:04 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Apr 2004 14:15:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Meijer",
"Henk",
""
]
] |
cs/0305017 | Johan Schubert | Johan Schubert | Cluster-based Specification Techniques in Dempster-Shafer Theory | 10 pages, 1 figure | in Symbolic and Quantitative Approaches to Reasoning and
Uncertainty, C. Froidevaux and J. Kohlas (Eds.), Proceedings of the European
Conference on Symbolic and Quantitative Approaches to Reasoning and
Uncertainty (ECSQARU'95), pp. 395-404, Universite' de Fribourg, Switzerland,
3-5 July 1995, Springer-Verlag (LNAI 946), Berlin, 1995 | null | FOA-B-95-00078-3.4-SE | cs.AI cs.NE | null | When reasoning with uncertainty there are many situations where evidences are
not only uncertain but their propositions may also be weakly specified in the
sense that it may not be certain to which event a proposition is referring. It
is then crucial not to combine such evidences in the mistaken belief that they
are referring to the same event. This situation would become manageable if the
evidences could be clustered into subsets representing events that should be
handled separately. In an earlier article we established within Dempster-Shafer
theory a criterion function called the metaconflict function. With this
criterion we can partition a set of evidences into subsets. Each subset
representing a separate event. In this article we will not only find the most
plausible subset for each piece of evidence, we will also find the plausibility
for every subset that the evidence belongs to the subset. Also, when the number
of subsets are uncertain we aim to find a posterior probability distribution
regarding the number of subsets.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 14:46:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305018 | Johan Schubert | Johan Schubert | Cluster-based Specification Techniques in Dempster-Shafer Theory for an
Evidential Intelligence Analysis of MultipleTarget Tracks (Thesis Abstract) | 4 pages, 1 figure | AI Communications 8(2) (1995) 107-110 | null | FOA-B-95-00079-3.4-SE | cs.AI cs.NE | null | In Intelligence Analysis it is of vital importance to manage uncertainty.
Intelligence data is almost always uncertain and incomplete, making it
necessary to reason and taking decisions under uncertainty. One way to manage
the uncertainty in Intelligence Analysis is Dempster-Shafer Theory. This thesis
contains five results regarding multiple target tracks and intelligence
specification.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 14:59:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305020 | Johan Schubert | Johan Schubert | Specifying nonspecific evidence | 39 pages, 2 figures | International Journal of Intelligent Systems 11(8), 525-563, 1996 | null | FOA-B-96-00174-3.4-SE | cs.AI cs.NE | null | In an earlier article [J. Schubert, On nonspecific evidence, Int. J. Intell.
Syst. 8(6), 711-725 (1993)] we established within Dempster-Shafer theory a
criterion function called the metaconflict function. With this criterion we can
partition into subsets a set of several pieces of evidence with propositions
that are weakly specified in the sense that it may be uncertain to which event
a proposition is referring. Each subset in the partitioning is representing a
separate event. The metaconflict function was derived as the plausibility that
the partitioning is correct when viewing the conflict in Dempster's rule within
each subset as a newly constructed piece of metalevel evidence with a
proposition giving support against the entire partitioning. In this article we
extend the results of the previous article. We will not only find the most
plausible subset for each piece of evidence as was done in the earlier article.
In addition we will specify each piece of nonspecific evidence, in the sense
that we find to which events the proposition might be referring, by finding the
plausibility for every subset that this piece of evidence belong to the subset.
In doing this we will automatically receive indication that some evidence might
be false. We will then develop a new methodology to exploit these newly
specified pieces of evidence in a subsequent reasoning process. This will
include methods to discount evidence based on their degree of falsity and on
their degree of credibility due to a partial specification of affiliation, as
well as a refined method to infer the event of each subset.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 15:13:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305021 | Johan Schubert | Johan Schubert | Creating Prototypes for Fast Classification in Dempster-Shafer
Clustering | 11 pages, 3 figures | in Qualitative and Quantitative Practical Reasoning, Proceedings
of the First International Joint Conference on Qualitative and Quantitative
Practical Reasoning (ECSQARU-FAPR'97), pp. 525-535, Bad Honnef, Germany, 9-12
June 1997, Springer-Verlag (LNAI 1244), Berlin, 1997 | null | FOA-B-97-00244-505-SE | cs.AI cs.NE | null | We develop a classification method for incoming pieces of evidence in
Dempster-Shafer theory. This methodology is based on previous work with
clustering and specification of originally nonspecific evidence. This
methodology is here put in order for fast classification of future incoming
pieces of evidence by comparing them with prototypes representing the clusters,
instead of making a full clustering of all evidence. This method has a
computational complexity of O(M * N) for each new piece of evidence, where M is
the maximum number of subsets and N is the number of prototypes chosen for each
subset. That is, a computational complexity independent of the total number of
previously arrived pieces of evidence. The parameters M and N are typically
fixed and domain dependent in any application.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 15:32:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305022 | Johan Schubert | Ulla Bergsten, Johan Schubert, Per Svensson | Applying Data Mining and Machine Learning Techniques to Submarine
Intelligence Analysis | 4 pages, 7 figures | in Proceedings of the Third International Conference on Knowledge
Discovery and Data Mining (KDD'97), pp. 127-130, Newport Beach, USA, 14-17
August 1997, The AAAI Press, Menlo Park, 1997 | null | FOA-B-97-00263-505-SE | cs.AI cs.DB cs.NE | null | We describe how specialized database technology and data analysis methods
were applied by the Swedish defense to help deal with the violation of Swedish
marine territory by foreign submarine intruders during the Eighties and early
Nineties. Among several approaches tried some yielded interesting information,
although most of the key questions remain unanswered. We conclude with a survey
of belief-function- and genetic-algorithm-based methods which were proposed to
support interpretation of intelligence reports and prediction of future
submarine positions, respectively.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 15:41:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bergsten",
"Ulla",
""
],
[
"Schubert",
"Johan",
""
],
[
"Svensson",
"Per",
""
]
] |
cs/0305023 | Johan Schubert | Johan Schubert | Fast Dempster-Shafer clustering using a neural network structure | 8 pages, 7 figures | in Proceedings of the Seventh International Conference on
Information Processing and Management of Uncertainty in Knowledge-based
Systems (IPMU'98), pp. 1438-1445, Universite' de La Sorbonne, Paris, France,
6-10 July 1998, Editions EDK, Paris, 1998 | null | FOA-B-98-00355-505-SE | cs.AI cs.NE | null | In this paper we study a problem within Dempster-Shafer theory where 2**n - 1
pieces of evidence are clustered by a neural structure into n clusters. The
clustering is done by minimizing a metaconflict function. Previously we
developed a method based on iterative optimization. However, for large scale
problems we need a method with lower computational complexity. The neural
structure was found to be effective and much faster than iterative optimization
for larger problems. While the growth in metaconflict was faster for the neural
structure compared with iterative optimization in medium sized problems, the
metaconflict per cluster and evidence was moderate. The neural structure was
able to find a global minimum over ten runs for problem sizes up to six
clusters.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 15:48:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305024 | Johan Schubert | Johan Schubert | A neural network and iterative optimization hybrid for Dempster-Shafer
clustering | 8 pages, 10 figures | in Proceedings of EuroFusion98 International Conference on Data
Fusion (EF'98), M. Bedworth, J. O'Brien (Eds.), pp. 29-36, Great Malvern, UK,
6-7 October 1998 | null | FOA-B-98-00383-505-SE | cs.AI cs.NE | null | In this paper we extend an earlier result within Dempster-Shafer theory
["Fast Dempster-Shafer Clustering Using a Neural Network Structure," in Proc.
Seventh Int. Conf. Information Processing and Management of Uncertainty in
Knowledge-Based Systems (IPMU 98)] where a large number of pieces of evidence
are clustered into subsets by a neural network structure. The clustering is
done by minimizing a metaconflict function. Previously we developed a method
based on iterative optimization. While the neural method had a much lower
computation time than iterative optimization its average clustering performance
was not as good. Here, we develop a hybrid of the two methods. We let the
neural structure do the initial clustering in order to achieve a high
computational performance. Its solution is fed as the initial state to the
iterative optimization in order to improve the clustering performance.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 15:54:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305026 | Johan Schubert | Johan Schubert | Fast Dempster-Shafer clustering using a neural network structure | 12 pages, 6 figures | in Information, Uncertainty and Fusion, B. Bouchon-Meunier, R.R.
Yager, L.A. Zadeh (Eds.), pp. 419-430, Kluwer Academic Publishers, Boston,
1999 | null | FOA-B-99-00504-505-SE | cs.AI cs.NE | null | In this article we study a problem within Dempster-Shafer theory where 2**n -
1 pieces of evidence are clustered by a neural structure into n clusters. The
clustering is done by minimizing a metaconflict function. Previously we
developed a method based on iterative optimization. However, for large scale
problems we need a method with lower computational complexity. The neural
structure was found to be effective and much faster than iterative optimization
for larger problems. While the growth in metaconflict was faster for the neural
structure compared with iterative optimization in medium sized problems, the
metaconflict per cluster and evidence was moderate. The neural structure was
able to find a global minimum over ten runs for problem sizes up to six
clusters.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 16:06:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305027 | Johan Schubert | Johan Schubert | Managing Inconsistent Intelligence | 7 pages, 3 figures | in Proceedings of the Third International Conference on
Information Fusion (FUSION 2000), pp. TuB4/10-16, Paris, France, 10-13 July
2000, International Society of Information Fusion, Sunnyvale, 2000 | null | FOA-B-00-00619-505-SE | cs.AI cs.NE | null | In this paper we demonstrate that it is possible to manage intelligence in
constant time as a pre-process to information fusion through a series of
processes dealing with issues such as clustering reports, ranking reports with
respect to importance, extraction of prototypes from clusters and immediate
classification of newly arriving intelligence reports. These methods are used
when intelligence reports arrive which concerns different events which should
be handled independently, when it is not known a priori to which event each
intelligence report is related. We use clustering that runs as a back-end
process to partition the intelligence into subsets representing the events, and
in parallel, a fast classification that runs as a front-end process in order to
put the newly arriving intelligence into its correct information fusion
process.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 16:16:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305028 | Johan Schubert | Mats Bengtsson, Johan Schubert | Dempster-Shafer clustering using Potts spin mean field theory | 14 pages, 9 figures | Soft Computing 5(3) (2001) 215-228 | null | FOI-S-0027-SE | cs.AI cs.NE | null | In this article we investigate a problem within Dempster-Shafer theory where
2**q - 1 pieces of evidence are clustered into q clusters by minimizing a
metaconflict function, or equivalently, by minimizing the sum of weight of
conflict over all clusters. Previously one of us developed a method based on a
Hopfield and Tank model. However, for very large problems we need a method with
lower computational complexity. We demonstrate that the weight of conflict of
evidence can, as an approximation, be linearized and mapped to an
antiferromagnetic Potts Spin model. This facilitates efficient numerical
solution, even for large problem sizes. Optimal or nearly optimal solutions are
found for Dempster-Shafer clustering benchmark tests with a time complexity of
approximately O(N**2 log**2 N). Furthermore, an isomorphism between the
antiferromagnetic Potts spin model and a graph optimization problem is shown.
The graph model has dynamic variables living on the links, which have a priori
probabilities that are directly related to the pairwise conflict between pieces
of evidence. Hence, the relations between three different models are shown.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 16:28:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bengtsson",
"Mats",
""
],
[
"Schubert",
"Johan",
""
]
] |
cs/0305029 | Johan Schubert | John Cantwell, Johan Schubert, Johan Walter | Conflict-based Force Aggregation | 15 pages, 17 figures | in Cd Proceedings of the Sixth International Command and Control
Research and Technology Symposium, Track 7, Paper 031, pp. 1-15, Annapolis,
USA, 19-21 June 2001, US Department of Defence CCRP, Washington, DC, 2001 | null | FOI-S-0040-SE | cs.AI cs.NE | null | In this paper we present an application where we put together two methods for
clustering and classification into a force aggregation method. Both methods are
based on conflicts between elements. These methods work with different type of
elements (intelligence reports, vehicles, military units) on different
hierarchical levels using specific conflict assessment methods on each level.
We use Dempster-Shafer theory for conflict calculation between elements,
Dempster-Shafer clustering for clustering these elements, and templates for
classification. The result of these processes is a complete force aggregation
on all levels handled.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 16:37:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cantwell",
"John",
""
],
[
"Schubert",
"Johan",
""
],
[
"Walter",
"Johan",
""
]
] |
cs/0305030 | Johan Schubert | Johan Schubert | Reliable Force Aggregation Using a Refined Evidence Specification from
Dempster-Shafer Clustering | 8 pages, 5 figures | in Proceedings of the Fourth Annual Conference on Information
Fusion (FUSION 2001), pp. TuB3/15-22, Montreal, Canada, 7-10 August 2001,
International Society of Information Fusion, Sunnyvale, 2001 | null | FOI-S-0050-SE | cs.AI cs.NE | null | In this paper we develop methods for selection of templates and use these
templates to recluster an already performed Dempster-Shafer clustering taking
into account intelligence to template fit during the reclustering phase. By
this process the risk of erroneous force aggregation based on some misplace
pieces of evidence from the first clustering process is greatly reduced.
Finally, a more reliable force aggregation is performed using the result of the
second clustering. These steps are taken in order to maintain most of the
excellent computational performance of Dempster-Shafer clustering, while at the
same time improve on the clustering result by including some higher relations
among intelligence reports described by the templates. The new improved
algorithm has a computational complexity of O(n**3 log**2 n) compared to O(n**2
log**2 n) of standard Dempster-Shafer clustering using Potts spin mean field
theory.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 16:45:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305031 | Johan Schubert | Johan Schubert | Clustering belief functions based on attracting and conflicting
metalevel evidence | 8 pages, 3 figures | in Proceedings of the Ninth International Conference on
Information Processing and Management of Uncertainty in Knowledge-based
Systems (IPMU'02), pp. 571-578, Annecy, France, 1-5 July 2002 | null | FOI-S-0524-SE | cs.AI cs.NE | null | In this paper we develop a method for clustering belief functions based on
attracting and conflicting metalevel evidence. Such clustering is done when the
belief functions concern multiple events, and all belief functions are mixed
up. The clustering process is used as the means for separating the belief
functions into subsets that should be handled independently. While the
conflicting metalevel evidence is generated internally from pairwise conflicts
of all belief functions, the attracting metalevel evidence is assumed given by
some external source.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 16:52:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305032 | Johan Schubert | Johan Schubert | Robust Report Level Cluster-to-Track Fusion | 6 pages, 5 figures | in Proceedings of the Fifth International Conference on
Information Fusion (FUSION 2002), pp. 913-918, Annapolis, USA, 8-11 July
2002, International Society of Information Fusion, 2002 | null | FOI-S-0525-SE | cs.AI cs.NE | null | In this paper we develop a method for report level tracking based on
Dempster-Shafer clustering using Potts spin neural networks where clusters of
incoming reports are gradually fused into existing tracks, one cluster for each
track. Incoming reports are put into a cluster and continuous reclustering of
older reports is made in order to obtain maximum association fit within the
cluster and towards the track. Over time, the oldest reports of the cluster
leave the cluster for the fixed track at the same rate as new incoming reports
are put into it. Fusing reports to existing tracks in this fashion allows us to
take account of both existing tracks and the probable future of each track, as
represented by younger reports within the corresponding cluster. This gives us
a robust report-to-track association. Compared to clustering of all available
reports this approach is computationally faster and has a better
report-to-track association than simple step-by-step association.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 16:58:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0305033 | Johan Schubert | Ulla Bergsten, Johan Schubert, Per Svensson | Beslutst\"odssystemet Dezzy - en \"oversikt | 18 pages, 8 figures, in Swedish, with appendix in English | in Dokumentation 7 juni av Seminarium och fackutst\"allning om
samband, sensorer och datorer f\"or ledningssystem till f\"orsvaret
(MILINF'89), pp. 07B2:19-31, Enk\"oping, June 1989, Telub AB, V\"axj\"o, 1989 | null | FOA Report B 20078-2.7 | cs.AI cs.DB | null | Within the scope of the three-year ANTI-SUBMARINE WARFARE project of the
National Defence Research Establishment, the INFORMATION SYSTEMS subproject has
developed the demonstration prototype Dezzy for handling and analysis of
intelligence reports concerning foreign underwater activities.
-----
Inom ramen f\"or FOA:s tre{\aa}riga huvudprojekt UB{\AA}TSSKYDD har
delprojekt INFORMATIONSSYSTEM utvecklat demonstrationsprototypen Dezzy till ett
beslutsst\"odsystem f\"or hantering och analys av underr\"attelser om
fr\"ammande undervattensverksamhet.
| [
{
"version": "v1",
"created": "Fri, 16 May 2003 18:26:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bergsten",
"Ulla",
""
],
[
"Schubert",
"Johan",
""
],
[
"Svensson",
"Per",
""
]
] |
cs/0305034 | Ilia Toli | Ilia Toli | Cryptanalysis of HFE | 7 pages. Minor changes expected | null | null | null | cs.CR cs.SC | null | I transform the trapdoor problem of HFE into a linear algebra problem.
| [
{
"version": "v1",
"created": "Sat, 17 May 2003 19:41:32 GMT"
},
{
"version": "v2",
"created": "Tue, 27 May 2003 12:48:14 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Jun 2003 23:07:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toli",
"Ilia",
""
]
] |
cs/0305037 | Richard Wheeldon | Richard Wheeldon and Steve Counsell | Power Law Distributions in Class Relationships | To appear in proceedings of Third IEEE International Workshop on
Source Code Analysis and Manipulation. 10 pages, 10 figures. Minor errors
fixed | null | null | null | cs.SE | null | Power law distributions have been found in many natural and social phenomena,
and more recently in the source code and run-time characteristics of
Object-Oriented (OO) systems. A power law implies that small values are
extremely common, whereas large values are extremely rare. In this paper, we
identify twelve new power laws relating to the static graph structures of Java
programs. The graph structures analyzed represented different forms of OO
coupling, namely, inheritance, aggregation, interface, parameter type and
return type. Identification of these new laws provide the basis for predicting
likely features of classes in future developments. The research in this paper
ties together work in object-based coupling and World Wide Web structures.
| [
{
"version": "v1",
"created": "Tue, 20 May 2003 10:21:17 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Jul 2003 15:32:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wheeldon",
"Richard",
""
],
[
"Counsell",
"Steve",
""
]
] |
cs/0305038 | Nancy Hartline Bercich | Nancy Hartline Bercich | The Evolution of the Computerized Database | 13 pages, including figures and bibliography | null | null | null | cs.DB | null | Databases, collections of related data, are as old as the written word. A
database can be anything from a homemaker's metal recipe file to a
sophisticated data warehouse. Yet today, when we think of a database we
invariably think of computerized data and their DBMSs (database management
systems). How did we go from organizing our data in a simple metal filing box
or cabinet to storing our data in a sophisticated computerized database? How
did the computerized database evolve?
This paper defines what we mean by a database. It traces the evolution of the
database, from its start as a non-computerized set of related data, to the, now
standard, computerized RDBMS (relational database management system). Early
computerized storage methods are reviewed including both the ISAM (Indexed
Sequential Access Method) and VSAM (Virtual Storage Access Method) storage
methods. Early database models are explored including the network and
hierarchical database models. Eventually, the relational, object-relational and
object-oriented databases models are discussed. An appendix of diagrams,
including hierarchical occurrence tree, network schema, ER (entity
relationship) and UML (unified modeling language) diagrams, is included to
support the text.
This paper concludes with an exploration of current and future trends in DBMS
development. It discusses the factors affecting these trends. It delves into
the relationship between DBMSs and the increasingly popular object-oriented
development methodologies. Finally, it speculates on the future of the DBMS.
| [
{
"version": "v1",
"created": "Wed, 21 May 2003 15:59:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bercich",
"Nancy Hartline",
""
]
] |
cs/0305039 | Dirk Nowotka | Tero Harju and Dirk Nowotka | Periodicity and Unbordered Words: A Proof of the Extended Duval
Conjecture | 16 pages | null | null | null | cs.DM | null | The relationship between the length of a word and the maximum length of its
unbordered factors is investigated in this paper. Consider a finite word w of
length n. We call a word bordered, if it has a proper prefix which is also a
suffix of that word. Let f(w) denote the maximum length of all unbordered
factors of w, and let p(w) denote the period of w. Clearly, f(w) < p(w)+1.
We establish that f(w) = p(w), if w has an unbordered prefix of length f(w)
and n > 2f(w)-2. This bound is tight and solves the stronger version of a 21
years old conjecture by Duval. It follows from this result that, in general, n
> 3f(w)-3 implies f(w) = p(w) which gives an improved bound for the question
asked by Ehrenfeucht and Silberger in 1979.
| [
{
"version": "v1",
"created": "Fri, 23 May 2003 11:28:00 GMT"
},
{
"version": "v2",
"created": "Sun, 25 May 2003 10:36:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Harju",
"Tero",
""
],
[
"Nowotka",
"Dirk",
""
]
] |
cs/0305040 | Keijo Heljanko | Keijo Heljanko and Ilkka Niemel\"a | Bounded LTL Model Checking with Stable Models | 32 pages, to appear in Theory and Practice of Logic Programming | null | null | null | cs.LO cs.AI | null | In this paper bounded model checking of asynchronous concurrent systems is
introduced as a promising application area for answer set programming. As the
model of asynchronous systems a generalisation of communicating automata,
1-safe Petri nets, are used. It is shown how a 1-safe Petri net and a
requirement on the behaviour of the net can be translated into a logic program
such that the bounded model checking problem for the net can be solved by
computing stable models of the corresponding program. The use of the stable
model semantics leads to compact encodings of bounded reachability and deadlock
detection tasks as well as the more general problem of bounded model checking
of linear temporal logic. Correctness proofs of the devised translations are
given, and some experimental results using the translation and the Smodels
system are presented.
| [
{
"version": "v1",
"created": "Fri, 23 May 2003 17:16:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heljanko",
"Keijo",
""
],
[
"Niemelä",
"Ilkka",
""
]
] |
cs/0305041 | Wei Wang | Wei Wang | Factorization of Language Models through Backing-Off Lattices | 7 pages and 1 figure; technical report; added one more related work,
and removed some errors | null | null | null | cs.CL | null | Factorization of statistical language models is the task that we resolve the
most discriminative model into factored models and determine a new model by
combining them so as to provide better estimate. Most of previous works mainly
focus on factorizing models of sequential events, each of which allows only one
factorization manner. To enable parallel factorization, which allows a model
event to be resolved in more than one ways at the same time, we propose a
general framework, where we adopt a backing-off lattice to reflect parallel
factorizations and to define the paths along which a model is resolved into
factored models, we use a mixture model to combine parallel paths in the
lattice, and generalize Katz's backing-off method to integrate all the mixture
models got by traversing the entire lattice. Based on this framework, we
formulate two types of model factorizations that are used in natural language
modeling.
| [
{
"version": "v1",
"created": "Fri, 23 May 2003 19:38:22 GMT"
},
{
"version": "v2",
"created": "Mon, 26 May 2003 19:42:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Wei",
""
]
] |
cs/0305042 | Filippo Menczer | Markus Jakobsson, Filippo Menczer | Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of
Service | null | null | null | null | cs.CY cs.NI | null | We uncover a vulnerability that allows for an attacker to perform an
email-based attack on selected victims, using only standard scripts and agents.
What differentiates the attack we describe from other, already known forms of
distributed denial of service (DDoS) attacks is that an attacker does not need
to infiltrate the network in any manner -- as is normally required to launch a
DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is
the attack easy to mount, but it is also almost impossible to trace back to the
perpetrator. Along with descriptions of our attack, we demonstrate its
destructive potential with (limited and contained) experimental results. We
illustrate the potential impact of our attack by describing how an attacker can
disable an email account by flooding its inbox; block competition during
on-line auctions; harm competitors with an on-line presence; disrupt phone
service to a given victim; cheat in SMS-based games; disconnect mobile
corporate leaders from their networks; and disrupt electronic elections.
Finally, we propose a set of countermeasures that are light-weight, do not
require modifications to the infrastructure, and can be deployed in a gradual
manner.
| [
{
"version": "v1",
"created": "Fri, 23 May 2003 22:10:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jakobsson",
"Markus",
""
],
[
"Menczer",
"Filippo",
""
]
] |
cs/0305044 | Marco Zaffalon | Gert de Cooman and Marco Zaffalon | Updating beliefs with incomplete observations | Replaced with extended version | null | null | null | cs.AI | null | Currently, there is renewed interest in the problem, raised by Shafer in
1985, of updating probabilities when observations are incomplete. This is a
fundamental problem in general, and of particular interest for Bayesian
networks. Recently, Grunwald and Halpern have shown that commonly used updating
strategies fail in this case, except under very special assumptions. In this
paper we propose a new method for updating probabilities with incomplete
observations. Our approach is deliberately conservative: we make no assumptions
about the so-called incompleteness mechanism that associates complete with
incomplete observations. We model our ignorance about this mechanism by a
vacuous lower prevision, a tool from the theory of imprecise probabilities, and
we use only coherence arguments to turn prior into posterior probabilities. In
general, this new approach to updating produces lower and upper posterior
probabilities and expectations, as well as partially determinate decisions.
This is a logical consequence of the existing ignorance about the
incompleteness mechanism. We apply the new approach to the problem of
classification of new evidence in probabilistic expert systems, where it leads
to a new, so-called conservative updating rule. In the special case of Bayesian
networks constructed using expert knowledge, we provide an exact algorithm for
classification based on our updating rule, which has linear-time complexity for
a class of networks wider than polytrees. This result is then extended to the
more general framework of credal networks, where computations are often much
harder than with Bayesian nets. Using an example, we show that our rule appears
to provide a solid basis for reliable updating with incomplete observations,
when no strong assumptions about the incompleteness mechanism are justified.
| [
{
"version": "v1",
"created": "Tue, 27 May 2003 11:05:52 GMT"
},
{
"version": "v2",
"created": "Mon, 17 May 2004 15:03:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Cooman",
"Gert",
""
],
[
"Zaffalon",
"Marco",
""
]
] |
cs/0305046 | Juan Antonio Navarro | Mauricio Osorio, Juan Antonio Navarro and Jose Arrazola | Applications of Intuitionistic Logic in Answer Set Programming | 30 pages, Under consideration for publication in Theory and Practice
of Logic Programming | null | null | null | cs.LO | null | We present some applications of intermediate logics in the field of Answer
Set Programming (ASP). A brief, but comprehensive introduction to the answer
set semantics, intuitionistic and other intermediate logics is given. Some
equivalence notions and their applications are discussed. Some results on
intermediate logics are shown, and applied later to prove properties of answer
sets. A characterization of answer sets for logic programs with nested
expressions is provided in terms of intuitionistic provability, generalizing a
recent result given by Pearce.
It is known that the answer set semantics for logic programs with nested
expressions may select non-minimal models. Minimal models can be very important
in some applications, therefore we studied them; in particular we obtain a
characterization, in terms of intuitionistic logic, of answer sets which are
also minimal models. We show that the logic G3 characterizes the notion of
strong equivalence between programs under the semantic induced by these models.
Finally we discuss possible applications and consequences of our results. They
clearly state interesting links between ASP and intermediate logics, which
might bring research in these two areas together.
| [
{
"version": "v1",
"created": "Tue, 27 May 2003 16:40:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Osorio",
"Mauricio",
""
],
[
"Navarro",
"Juan Antonio",
""
],
[
"Arrazola",
"Jose",
""
]
] |
cs/0305048 | MyungHo Kim | Gene Kim and MyungHo Kim | 2D Electrophoresis Gel Image and Diagnosis of a Disease | 10 pages, DIMACS workshop of Rutgers University, on complexity in
Biosystems | null | null | null | cs.CC cs.CV q-bio.QM | null | The process of diagnosing a disease from the 2D gel electrophoresis image is
a challenging problem. This is due to technical difficulties of generating
reproducible images with a normalized form and the effect of negative stain. In
this paper, we will discuss a new concept of interpreting the 2D images and
overcoming the aforementioned technical difficulties using mathematical
transformation. The method makes use of 2D gel images of proteins in serums and
we explain a way of representing the images into vectors in order to apply
machine-learning methods, such as the support vector machine.
| [
{
"version": "v1",
"created": "Wed, 28 May 2003 13:48:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kim",
"Gene",
""
],
[
"Kim",
"MyungHo",
""
]
] |
cs/0305051 | Tanya Y. Berger-Wolf | Tanya Y. Berger-Wolf and Mitchell A. Harris | Sharp Bounds for Bandwidth of Clique Products | 15 pages, 13 figures. Presented at the SIAM Discrete Math 2002
conference | null | null | null | cs.DM | null | The bandwidth of a graph is the labeling of vertices with minimum maximum
edge difference. For many graph families this is NP-complete. A classic result
computes the bandwidth for the hypercube. We generalize this result to give
sharp lower bounds for products of cliques. This problem turns out to be
equivalent to one in communication over multiple channels in which channels can
fail and the information sent over those channels is lost. The goal is to
create an encoding that minimizes the difference between the received and the
original information while having as little redundancy as possible. Berger-Wolf
and Reingold [2] have considered the problem for the equal size cliques (or
equal capacity channels). This paper presents a tight lower bound and an
algorithm for constructing the labeling for the product of any number of
arbitrary size cliques.
| [
{
"version": "v1",
"created": "Wed, 28 May 2003 20:28:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berger-Wolf",
"Tanya Y.",
""
],
[
"Harris",
"Mitchell A.",
""
]
] |
cs/0305053 | Baden Hughes | Baden Hughes | Developing Open Data Models for Linguistic Field Data | null | null | null | null | cs.DL cs.CL | null | The UQ Flint Archive houses the field notes and elicitation recordings made
by Elwyn Flint in the 1950's and 1960's during extensive linguistic survey work
across Queensland, Australia.
The process of digitizing the contents of the UQ Flint Archive provides a
number of interesting challenges in the context of EMELD. Firstly, all of the
linguistic data is for languages which are either endangered or extinct, and as
such forms a valuable ethnographic repository. Secondly, the physical format of
the data is itself in danger of decline, and as such digitization is an
important preservation task in the short to medium term. Thirdly, the adoption
of open standards for the encoding and presentation of text and audio data for
linguistic field data, whilst enabling preservation, represents a new field of
research in itself where best practice has yet to be formalised. Fourthly, the
provision of this linguistic data online as a new data source for future
research introduces concerns of data portability and longevity.
This paper will outline the origins of the data model, the content creation
components, presentation forms based on the data model, data capture tools and
media conversion components. It will also address some of the larger questions
regarding the digitization and annotation of linguistic field work based on
experience gained through work with the Flint Archive contents.
| [
{
"version": "v1",
"created": "Thu, 29 May 2003 12:12:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hughes",
"Baden",
""
]
] |
cs/0305055 | Gilles Daniel | Gilles Daniel | Goodness-of-fit of the Heston model | 10 pages, 3 figures, The 9th International Conference of Computing in
Economics and Finance, Seattle (July 2003) | null | null | null | cs.CE | null | An analytical formula for the probability distribution of stock-market
returns, derived from the Heston model assuming a mean-reverting stochastic
volatility, was recently proposed by Dragulescu and Yakovenko in Quantitative
Finance 2002. While replicating their results, we found two significant
weaknesses in their method to pre-process the data, which cast a shadow over
the effective goodness-of-fit of the model. We propose a new method, more truly
capturing the market, and perform a Kolmogorov-Smirnov test and a Chi Square
test on the resulting probability distribution. The results raise some
significant questions for large time lags -- 40 to 250 days -- where the
smoothness of the data does not require such a complex model; nevertheless, we
also provide some statistical evidence in favour of the Heston model for small
time lags -- 1 and 5 days -- compared with the traditional Gaussian model
assuming constant volatility.
| [
{
"version": "v1",
"created": "Thu, 29 May 2003 18:13:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daniel",
"Gilles",
""
]
] |
cs/0305056 | Andrei Salnikov | R. Bartoldus, G. Dubois-Felsmann, Y. Kolomensky, A. Salnikov | Configuration Database for BaBar On-line | Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, 4 figures, PDF. PSN MOKT004 | null | null | SLAC-PUB-9831 | cs.DB cs.IR | null | The configuration database is one of the vital systems in the BaBar on-line
system. It provides services for the different parts of the data acquisition
system and control system, which require run-time parameters. The original
design and implementation of the configuration database played a significant
role in the successful BaBar operations since the beginning of experiment.
Recent additions to the design of the configuration database provide better
means for the management of data and add new tools to simplify main
configuration tasks. We describe the design of the configuration database, its
implementation with the Objectivity/DB object-oriented database, and our
experience collected during the years of operation.
| [
{
"version": "v1",
"created": "Thu, 29 May 2003 21:37:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bartoldus",
"R.",
""
],
[
"Dubois-Felsmann",
"G.",
""
],
[
"Kolomensky",
"Y.",
""
],
[
"Salnikov",
"A.",
""
]
] |
cs/0305061 | Andras Horvath | Andras Horvath, Emanuele Leonardi, Markus Schulz | A Secure Infrastructure For System Console and Reset Access | Conference for Computing in High Energy and Nuclear Physics
(CHEP2003), March 24-28, 2003, La Jolla, California | null | null | null | cs.DC | null | During the last years large farms have been built using commodity hardware.
This hardware lacks components for remote and automated administration.
Products that can be retrofitted to these systems are either costly or
inherently insecure. We present a system based on serial ports and simple
machine controlled relays. We report on experience gained by setting up a
50-machine test environment as well as current work in progress in the area.
| [
{
"version": "v1",
"created": "Fri, 30 May 2003 11:42:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Horvath",
"Andras",
""
],
[
"Leonardi",
"Emanuele",
""
],
[
"Schulz",
"Markus",
""
]
] |
cs/0305065 | James A. Hamilton | James A. Hamilton, Gregory P. Dubois-Felsmann and Rainer Bartoldus | A Generic Multi-node State Monitoring Subsystem | Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 5 pages | null | null | SLAC-PUB-9909 | cs.DC | null | The BaBar online data acquisition (DAQ) system includes approximately fifty
Unix systems that collectively implement the level-three trigger. These systems
all run the same code. Each of these systems has its own state, and this state
is expected to change in response to changes in the overall DAQ system. A
specialized subsystem has been developed to initiate processing on this
collection of systems, and to monitor them both for error conditions and to
ensure that they all follow the same state trajectory within a specifiable
period of time. This subsystem receives start commands from the main DAQ run
control system, and reports major coherent state changes, as well as error
conditions, back to the run control system. This state monitoring subsystem has
the novel feature that it does not know anything about the state machines that
it is monitoring, and hence does not introduce any fundamentally new state
machine into the overall system. This feature makes it trivially applicable to
other multi-node subsystems. Indeed it has already found a second application
beyond the level-three trigger, within the BaBar experiment.
| [
{
"version": "v1",
"created": "Fri, 30 May 2003 17:43:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hamilton",
"James A.",
""
],
[
"Dubois-Felsmann",
"Gregory P.",
""
],
[
"Bartoldus",
"Rainer",
""
]
] |
cs/0306003 | Steve Fisher | Rob Byrom, Brian Coghlan, Andrew W Cooke, Roney Cordenonsi, Linda
Cornwall, Ari Datta, Abdeslem Djaoui, Laurence Field, Steve Fisher, Steve
Hicks, Stuart Kenny, James Magowan, Werner Nutt, David O'Callaghan, Manfred
Oevers, Norbert Podhorszki, John Ryan, Manish Soni, Paul Taylor, Antony J.
Wilson and Xiaomei Zhu | R-GMA: First results after deployment | Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, LaTeX, 3 eps figures. PSN
MOET004 | null | null | null | cs.DC | null | We describe R-GMA (Relational Grid Monitoring Architecture) which is being
developed within the European DataGrid Project as an Grid Information and
Monitoring System. Is is based on the GMA from GGF, which is a simple
Consumer-Producer model. The special strength of this implementation comes from
the power of the relational model. We offer a global view of the information as
if each VO had one large relational database. We provide a number of different
Producer types with different characteristics; for example some support
streaming of information. We also provide combined Consumer/Producers, which
are able to combine information and republish it. At the heart of the system is
the mediator, which for any query is able to find and connect to the best
Producers to do the job. We are able to invoke MDS info-provider scripts and
publish the resulting information via R-GMA in addition to having some of our
own sensors. APIs are available which allow the user to deploy monitoring and
information services for any application that may be needed in the future. We
have used it both for information about the grid (primarily to find what
services are available at any one time) and for application monitoring. R-GMA
has been deployed in Grid testbeds, we describe the results and experiences of
this deployment.
| [
{
"version": "v1",
"created": "Fri, 30 May 2003 20:39:27 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Jun 2003 18:13:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Byrom",
"Rob",
""
],
[
"Coghlan",
"Brian",
""
],
[
"Cooke",
"Andrew W",
""
],
[
"Cordenonsi",
"Roney",
""
],
[
"Cornwall",
"Linda",
""
],
[
"Datta",
"Ari",
""
],
[
"Djaoui",
"Abdeslem",
""
],
[
"Field",
"Laurence",
""
],
[
"Fisher",
"Steve",
""
],
[
"Hicks",
"Steve",
""
],
[
"Kenny",
"Stuart",
""
],
[
"Magowan",
"James",
""
],
[
"Nutt",
"Werner",
""
],
[
"O'Callaghan",
"David",
""
],
[
"Oevers",
"Manfred",
""
],
[
"Podhorszki",
"Norbert",
""
],
[
"Ryan",
"John",
""
],
[
"Soni",
"Manish",
""
],
[
"Taylor",
"Paul",
""
],
[
"Wilson",
"Antony J.",
""
],
[
"Zhu",
"Xiaomei",
""
]
] |
cs/0306006 | Jorge Lima | A.Amorim, J.Lima, C.Oliveira, L.Pedro, N.Barros | Experience with the Open Source based implementation for ATLAS
Conditions Data Management System | 8 pages, 4 figures, 3 tables, conference | null | null | null | cs.DB | null | Conditions Data in high energy physics experiments is frequently seen as
every data needed for reconstruction besides the event data itself. This
includes all sorts of slowly evolving data like detector alignment, calibration
and robustness, and data from detector control system. Also, every Conditions
Data Object is associated with a time interval of validity and a version.
Besides that, quite often is useful to tag collections of Conditions Data
Objects altogether. These issues have already been investigated and a data
model has been proposed and used for different implementations based in
commercial DBMSs, both at CERN and for the BaBar experiment. The special case
of the ATLAS complex trigger that requires online access to calibration and
alignment data poses new challenges that have to be met using a flexible and
customizable solution more in the line of Open Source components. Motivated by
the ATLAS challenges we have developed an alternative implementation, based in
an Open Source RDBMS. Several issues were investigated land will be described
in this paper:
-The best way to map the conditions data model into the relational database
concept considering what are foreseen as the most frequent queries.
-The clustering model best suited to address the scalability problem.
-Extensive tests were performed and will be described.
The very promising results from these tests are attracting the attention from
the HEP community and driving further developments.
| [
{
"version": "v1",
"created": "Fri, 30 May 2003 23:08:44 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Jun 2003 01:51:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amorim",
"A.",
""
],
[
"Lima",
"J.",
""
],
[
"Oliveira",
"C.",
""
],
[
"Pedro",
"L.",
""
],
[
"Barros",
"N.",
""
]
] |
cs/0306007 | Francesco Prelz | G. Avellino, S. Beco, B. Cantalupo, F. Pacini, A. Terracina, A.
Maraschini, D. Colling, S. Monforte, M. Pappalardo, L. Salconi, F. Giacomini,
E. Ronchieri, D. Kouril, A. Krenek, L. Matyska, M. Mulac, J. Pospisil, M.
Ruda, Z. Salvet, J. Sitera, M. Vocu, M. Mezzadri, F. Prelz, A. Gianelle, R.
Peluso, M. Sgaravatto, S. Barale, A. Guarise, A. Werbrouck | The first deployment of workload management services on the EU DataGrid
Testbed: feedback on design and implementation | Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, LaTeX, 2 eps figures | null | null | null | cs.DC | null | Application users have now been experiencing for about a year with the
standardized resource brokering services provided by the 'workload management'
package of the EU DataGrid project (WP1). Understanding, shaping and pushing
the limits of the system has provided valuable feedback on both its design and
implementation. A digest of the lessons, and "better practices", that were
learned, and that were applied towards the second major release of the
software, is given.
| [
{
"version": "v1",
"created": "Sat, 31 May 2003 19:39:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Avellino",
"G.",
""
],
[
"Beco",
"S.",
""
],
[
"Cantalupo",
"B.",
""
],
[
"Pacini",
"F.",
""
],
[
"Terracina",
"A.",
""
],
[
"Maraschini",
"A.",
""
],
[
"Colling",
"D.",
""
],
[
"Monforte",
"S.",
""
],
[
"Pappalardo",
"M.",
""
],
[
"Salconi",
"L.",
""
],
[
"Giacomini",
"F.",
""
],
[
"Ronchieri",
"E.",
""
],
[
"Kouril",
"D.",
""
],
[
"Krenek",
"A.",
""
],
[
"Matyska",
"L.",
""
],
[
"Mulac",
"M.",
""
],
[
"Pospisil",
"J.",
""
],
[
"Ruda",
"M.",
""
],
[
"Salvet",
"Z.",
""
],
[
"Sitera",
"J.",
""
],
[
"Vocu",
"M.",
""
],
[
"Mezzadri",
"M.",
""
],
[
"Prelz",
"F.",
""
],
[
"Gianelle",
"A.",
""
],
[
"Peluso",
"R.",
""
],
[
"Sgaravatto",
"M.",
""
],
[
"Barale",
"S.",
""
],
[
"Guarise",
"A.",
""
],
[
"Werbrouck",
"A.",
""
]
] |
cs/0306008 | Antonio Ceseracciu | A. Ceseracciu, M. Piemontese, F. Safai Tehrani, P. Elmer, D. Johnson,
T. M. Pulliam | The new BaBar Data Reconstruction Control System | Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 9 pages, LaTeX, 2 eps figures PSN
TUDT011 | null | null | SLAC-PUB-9873 | cs.DC | null | The BaBar experiment is characterized by extremely high luminosity, a complex
detector, and a huge data volume, with increasing requirements each year. To
fulfill these requirements a new control system has been designed and developed
for the offline data reconstruction system. The new control system described in
this paper provides the performance and flexibility needed to manage a large
number of small computing farms, and takes full benefit of OO design. The
infrastructure is well isolated from the processing layer, it is generic and
flexible, based on a light framework providing message passing and cooperative
multitasking. The system is actively distributed, enforces the separation
between different processing tiers by using different naming domains, and glues
them together by dedicated brokers. It provides a powerful Finite State Machine
framework to describe custom processing models in a simple regular language.
This paper describes this new control system, currently in use at SLAC and
Padova on ~450 CPUs organized in 12 farms.
| [
{
"version": "v1",
"created": "Sat, 31 May 2003 20:48:53 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Jun 2003 22:46:13 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Jun 2003 20:31:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ceseracciu",
"A.",
""
],
[
"Piemontese",
"M.",
""
],
[
"Tehrani",
"F. Safai",
""
],
[
"Elmer",
"P.",
""
],
[
"Johnson",
"D.",
""
],
[
"Pulliam",
"T. M.",
""
]
] |
cs/0306010 | Sudebkumar Prasant Pal | Sudebkumar Prasant Pal and Dilip Sarkar | On multiple connectedness of regions visible due to multiple diffuse
reflections | 10 pages, 3 figures | null | null | null | cs.CG cs.DM cs.GR | null | It is known that the region $V(s)$ of a simple polygon $P$, directly visible
(illuminable) from an internal point $s$, is simply connected. Aronov et al.
\cite{addpp981} established that the region $V_1(s)$ of a simple polygon
visible from an internal point $s$ due to at most one diffuse reflection on the
boundary of the polygon $P$, is also simply connected. In this paper we
establish that the region $V_2(s)$, visible from $s$ due to at most two diffuse
reflections may be multiply connected; we demonstrate the construction of an
$n$-sided simple polygon with a point $s$ inside it so that and the region of
$P$ visible from $s$ after at most two diffuse reflections is multiple
connected.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2003 11:40:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pal",
"Sudebkumar Prasant",
""
],
[
"Sarkar",
"Dilip",
""
]
] |
cs/0306013 | Julius Hrivnac | Julius Hrivnac | Transparent Persistence with Java Data Objects | Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003. PSN TUKT005 | null | null | null | cs.DB | null | Flexible and performant Persistency Service is a necessary component of any
HEP Software Framework. The building of a modular, non-intrusive and performant
persistency component have been shown to be very difficult task. In the past,
it was very often necessary to sacrifice modularity to achieve acceptable
performance. This resulted in the strong dependency of the overall Frameworks
on their Persistency subsystems.
Recent development in software technology has made possible to build a
Persistency Service which can be transparently used from other Frameworks. Such
Service doesn't force a strong architectural constraints on the overall
Framework Architecture, while satisfying high performance requirements. Java
Data Object standard (JDO) has been already implemented for almost all major
databases. It provides truly transparent persistency for any Java object (both
internal and external). Objects in other languages can be handled via
transparent proxies. Being only a thin layer on top of a used database, JDO
doesn't introduce any significant performance degradation. Also Aspect-Oriented
Programming (AOP) makes possible to treat persistency as an orthogonal Aspect
of the Application Framework, without polluting it with persistence-specific
concepts.
All these techniques have been developed primarily (or only) for the Java
environment. It is, however, possible to interface them transparently to
Frameworks built in other languages, like for example C++.
Fully functional prototypes of flexible and non-intrusive persistency modules
have been build for several other packages, as for example FreeHEP AIDA and LCG
Pool AttributeSet (package Indicium).
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2003 09:38:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hrivnac",
"Julius",
""
]
] |
cs/0306015 | Sudebkumar Prasant Pal | P. H. D. Ramakrishna, Sudebkumar Prasant Pal, Samir Bhalla, Hironmay
Basu and Sudhir Kumar Singh | Computing sharp and scalable bounds on errors in approximate zeros of
univariate polynomials | 13 pages, no figures | null | null | null | cs.NA | null | There are several numerical methods for computing approximate zeros of a
given univariate polynomial. In this paper, we develop a simple and novel
method for determining sharp upper bounds on errors in approximate zeros of a
given polynomial using Rouche's theorem from complex analysis. We compute the
error bounds using non-linear optimization. Our bounds are scalable in the
sense that we compute sharper error bounds for better approximations of zeros.
We use high precision computations using the LEDA/real floating-point filter
for computing our bounds robustly.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2003 12:26:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramakrishna",
"P. H. D.",
""
],
[
"Pal",
"Sudebkumar Prasant",
""
],
[
"Bhalla",
"Samir",
""
],
[
"Basu",
"Hironmay",
""
],
[
"Singh",
"Sudhir Kumar",
""
]
] |
cs/0306016 | Francesc Rossello | Merce Llabres, Francesc Rossello | Modelling Biochemical Operations on RNA Secondary Structures | 10 pages | null | null | null | cs.CE q-bio | null | In this paper we model several simple biochemical operations on RNA molecules
that modify their secondary structure by means of a suitable variation of
Gro\ss e-Rhode's Algebra Transformation Systems.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2003 08:48:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Llabres",
"Merce",
""
],
[
"Rossello",
"Francesc",
""
]
] |
cs/0306018 | Rosario Esposito | S. Andreozzi, S. Fantinel, D. Rebatto, L. Vaccarossa, G. Tortone | A monitoring tool for a GRID operation center | Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 3 pages, PDF. PSN MOET002 | null | null | null | cs.DC | null | WorldGRID is an intercontinental testbed spanning Europe and the US
integrating architecturally different Grid implementations based on the Globus
toolkit. The WorldGRID testbed has been successfully demonstrated during the
WorldGRID demos at SuperComputing 2002 (Baltimore) and IST2002 (Copenhagen)
where real HEP application jobs were transparently submitted from US and Europe
using "native" mechanisms and run where resources were available, independently
of their location. To monitor the behavior and performance of such testbed and
spot problems as soon as they arise, DataTAG has developed the EDT-Monitor tool
based on the Nagios package that allows for Virtual Organization centric views
of the Grid through dynamic geographical maps. The tool has been used to spot
several problems during the WorldGRID operations, such as malfunctioning
Resource Brokers or Information Servers, sites not correctly configured, job
dispatching problems, etc. In this paper we give an overview of the package,
its features and scalability solutions and we report on the experience acquired
and the benefit that a GRID operation center would gain from such a tool.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2003 17:22:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andreozzi",
"S.",
""
],
[
"Fantinel",
"S.",
""
],
[
"Rebatto",
"D.",
""
],
[
"Vaccarossa",
"L.",
""
],
[
"Tortone",
"G.",
""
]
] |
cs/0306019 | Irina | I.Sourikova, D.Morrison | Relational databases for data management in PHENIX | Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 4 pages, LaTeX, 4 eps figures. PSN
TUKT003 | null | null | null | cs.DB | null | PHENIX is one of the two large experiments at the Relativistic Heavy Ion
Collider (RHIC) at Brookhaven National Laboratory (BNL) and archives roughly
100TB of experimental data per year. In addition, large volumes of simulated
data are produced at multiple off-site computing centers. For any file catalog
to play a central role in data management it has to face problems associated
with the need for distributed access and updates. To be used effectively by the
hundreds of PHENIX collaborators in 12 countries the catalog must satisfy the
following requirements: 1) contain up-to-date data, 2) provide fast and
reliable access to the data, 3) have write permissions for the sites that store
portions of data. We present an analysis of several available Relational
Database Management Systems (RDBMS) to support a catalog meeting the above
requirements and discuss the PHENIX experience with building and using the
distributed file catalog.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2003 17:38:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sourikova",
"I.",
""
],
[
"Morrison",
"D.",
""
]
] |
cs/0306020 | Jacek Becla | Adeyemi Adesanya, Tofigh Azemoon, Jacek Becla, Andrew Hanushevsky,
Adil Hasan, Wilko Kroeger, Artem Trunov, Daniel Wang, Igor Gaponenko, Simon
Patton, David Quarrie | On the Verge of One Petabyte - the Story Behind the BaBar Database
System | Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 6 pages. PSN MOKT010 | null | null | null | cs.DB | null | The BaBar database has pioneered the use of a commercial ODBMS within the HEP
community. The unique object-oriented architecture of Objectivity/DB has made
it possible to manage over 700 terabytes of production data generated since
May'99, making the BaBar database the world's largest known database. The
ongoing development includes new features, addressing the ever-increasing
luminosity of the detector as well as other changing physics requirements.
Significant efforts are focused on reducing space requirements and operational
costs. The paper discusses our experience with developing a large scale
database system, emphasizing universal aspects which may be applied to any
large scale system, independently of underlying technology used.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2003 19:22:52 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Jun 2003 20:12:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Adesanya",
"Adeyemi",
""
],
[
"Azemoon",
"Tofigh",
""
],
[
"Becla",
"Jacek",
""
],
[
"Hanushevsky",
"Andrew",
""
],
[
"Hasan",
"Adil",
""
],
[
"Kroeger",
"Wilko",
""
],
[
"Trunov",
"Artem",
""
],
[
"Wang",
"Daniel",
""
],
[
"Gaponenko",
"Igor",
""
],
[
"Patton",
"Simon",
""
],
[
"Quarrie",
"David",
""
]
] |
cs/0306021 | Alexander Haubold | Alexander Haubold | Visualization for Periodic Population Movement between Distinct
Localities | Poster Summary: 2 pages, 4 figures, InfoVis 2003 Symposium | null | null | null | cs.IR | null | We present a new visualization method to summarize and present periodic
population movement between distinct locations, such as floors, buildings,
cities, or the like. In the specific case of this paper, we have chosen to
focus on student movement between college dormitories on the Columbia
University campus. The visual information is presented to the information
analyst in the form of an interactive geographical map, in which specific
temporal periods as well as individual buildings can be singled out for
detailed data exploration. The navigational interface has been designed to
specifically meet a geographical setting.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2003 19:40:04 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Aug 2003 06:35:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
]
] |
cs/0306022 | Anand Venkataraman | Anand Venkataraman and Wen Wang | Techniques for effective vocabulary selection | 4 pages. To appear Proc. Eurospeech 2003, Geneva | null | null | null | cs.CL cs.AI | null | The vocabulary of a continuous speech recognition (CSR) system is a
significant factor in determining its performance. In this paper, we present
three principled approaches to select the target vocabulary for a particular
domain by trading off between the target out-of-vocabulary (OOV) rate and
vocabulary size. We evaluate these approaches against an ad-hoc baseline
strategy. Results are presented in the form of OOV rate graphs plotted against
increasing vocabulary size for each technique.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2003 23:08:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venkataraman",
"Anand",
""
],
[
"Wang",
"Wen",
""
]
] |
cs/0306025 | Jie Gao | Jie Gao, and Dianjun Wang | Permutation Generation: Two New Permutation Algorithms | 7 pages, 4 figures | null | null | null | cs.DS cs.CC | null | Two completely new algorithms for generating permutations, shift-cursor
algorithm and level algorithm, and their efficient implementations are
presented in this paper. One implementation of the shift cursor algorithm gives
an optimal solution of the permutation generation problem, and one
implementation of the level algorithm can be used to generate random
permutations.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2003 11:49:22 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Jun 2003 03:20:45 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Jul 2003 13:25:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gao",
"Jie",
""
],
[
"Wang",
"Dianjun",
""
]
] |
cs/0306026 | Alasdair Earl | A.D.Earl, A.Hasan and D. Boutigany | BdbServer++: A User Driven Data Location and Retrieval Tool | Paper based on the poster from the 2003 Computing in High Energy and
Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 4 pages, LaTeX, 0
figures. PSN TUCP011 | null | null | SLAC-PUB-9925 | cs.IR | null | The adoption of Grid technology has the potential to greatly aid the BaBar
experiment. BdbServer was originally designed to extract copies of data from
the Objectivity/DB database at SLAC and IN2P3. With data now stored in multiple
locations in a variety of data formats, we are enhancing this tool. This will
enable users to extract selected deep copies of event collections and ship them
to the requested site using the facilities offered by the existing Grid
infrastructure. By building on the work done by various groups in BaBar, and
the European DataGrid, we have successfully expanded the capabilities of the
BdbServer software. This should provide a framework for future work in data
distribution.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2003 12:20:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Earl",
"A. D.",
""
],
[
"Hasan",
"A.",
""
],
[
"Boutigany",
"D.",
""
]
] |
cs/0306028 | David A. Plaisted | David A. Plaisted | An Abstract Programming System | Internal report | null | null | null | cs.SE cs.LO | null | The system PL permits the translation of abstract proofs of program
correctness into programs in a variety of programming languages. A programming
language satisfying certain axioms may be the target of such a translation. The
system PL also permits the construction and proof of correctness of programs in
an abstract programming language, and permits the translation of these programs
into correct programs in a variety of languages. The abstract programming
language has an imperative style of programming with assignment statements and
side-effects, to allow the efficient generation of code. The abstract programs
may be written by humans and then translated, avoiding the need to write the
same program repeatedly in different languages or even the same language. This
system uses classical logic, is conceptually simple, and permits reasoning
about nonterminating programs using Scott-Strachey style denotational
semantics.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2003 18:31:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Plaisted",
"David A.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.