id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0307034
Pat Morin
Danny Krizanc, Pat Morin and Michiel Smid
Range Mode and Range Median Queries on Lists and Trees
12 pages, 6 figures
null
null
null
cs.DS
null
We consider algorithms for preprocessing labelled lists and trees so that, for any two nodes u and v we can answer queries of the form: What is the mode or median label in the sequence of labels on the path from u to v.
[ { "version": "v1", "created": "Sat, 12 Jul 2003 21:41:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Krizanc", "Danny", "" ], [ "Morin", "Pat", "" ], [ "Smid", "Michiel", "" ] ]
cs/0307035
Pavel Motuzenko
Pavel Motuzenko
Adaptive Domain Model: Dealing With Multiple Attributes of Self-Managing Distributed Object Systems
6 pages, 3 figures
null
null
null
cs.AR cs.DC
null
Self-managing software has emerged as modern systems have become more complex. Some of the distributed object systems may contain thousands of objects deployed on tens or even hundreds hosts. Development and support of such systems often costs a lot. To solve this issue the systems, which are capable supporting multiple self-managing attributes, should be created. In the paper, the Adaptive domain concept is introduced as an extension to the basic domain concept to support a generic adaptation environment for building distributed object systems with multiple self-managing attributes.
[ { "version": "v1", "created": "Sun, 13 Jul 2003 13:01:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Motuzenko", "Pavel", "" ] ]
cs/0307036
Adriana Iamnitchi
Adriana Iamnitchi, Matei Ripeanu, Ian Foster
Small-World File-Sharing Communities
null
null
null
null
cs.DC cond-mat cs.NI
null
Web caches, content distribution networks, peer-to-peer file sharing networks, distributed file systems, and data grids all have in common that they involve a community of users who generate requests for shared data. In each case, overall system performance can be improved significantly if we can first identify and then exploit interesting structure within a community's access patterns. To this end, we propose a novel perspective on file sharing based on the study of the relationships that form among users based on the files in which they are interested. We propose a new structure that captures common user interests in data--the data-sharing graph-- and justify its utility with studies on three data-distribution systems: a high-energy physics collaboration, the Web, and the Kazaa peer-to-peer network. We find small-world patterns in the data-sharing graphs of all three communities. We analyze these graphs and propose some probable causes for these emergent small-world patterns. The significance of small-world patterns is twofold: it provides a rigorous support to intuition and, perhaps most importantly, it suggests ways to design mechanisms that exploit these naturally emerging patterns.
[ { "version": "v1", "created": "Sun, 13 Jul 2003 18:44:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Iamnitchi", "Adriana", "" ], [ "Ripeanu", "Matei", "" ], [ "Foster", "Ian", "" ] ]
cs/0307038
Alfred Hero III
Jose Costa and Alfred Hero
Manifold Learning with Geodesic Minimal Spanning Trees
13 pages, 3 figures
null
null
null
cs.CV cs.LG
null
In the manifold learning problem one seeks to discover a smooth low dimensional surface, i.e., a manifold embedded in a higher dimensional linear vector space, based on a set of measured sample points on the surface. In this paper we consider the closely related problem of estimating the manifold's intrinsic dimension and the intrinsic entropy of the sample points. Specifically, we view the sample points as realizations of an unknown multivariate density supported on an unknown smooth manifold. We present a novel geometrical probability approach, called the geodesic-minimal-spanning-tree (GMST), to obtaining asymptotically consistent estimates of the manifold dimension and the R\'{e}nyi $\alpha$-entropy of the sample density on the manifold. The GMST approach is striking in its simplicity and does not require reconstructing the manifold or estimating the multivariate density of the samples. The GMST method simply constructs a minimal spanning tree (MST) sequence using a geodesic edge matrix and uses the overall lengths of the MSTs to simultaneously estimate manifold dimension and entropy. We illustrate the GMST approach for dimension and entropy estimation of a human face dataset.
[ { "version": "v1", "created": "Wed, 16 Jul 2003 23:50:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Costa", "Jose", "" ], [ "Hero", "Alfred", "" ] ]
cs/0307039
Valdis Vitolins
Valdis Vitolins, Audris Kalnins
Modeling Business
5 pages, 7 figures, Proceedings of Internation Conference 'Modeling and Simulation of Business Systems", Vilnius, Lithuania (May 13-14, 2003)
Vitolins Valdis, Audris Kalnins. Modeling Business. Modeling and Simulation of Business Systems, Kaunas University of Technology Press, Vilnius, May 13-14, 2003, pp. 215.-220.
null
null
cs.CE
null
Business concepts are studied using a metamodel-based approach, using UML 2.0. The Notation Independent Business concepts metamodel is introduced. The approach offers a mapping between different business modeling notations which could be used for bridging BM tools and boosting the MDA approach.
[ { "version": "v1", "created": "Thu, 17 Jul 2003 15:41:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Vitolins", "Valdis", "" ], [ "Kalnins", "Audris", "" ] ]
cs/0307040
Amar Isli
Amar Isli
Bridging the gap between modal temporal logics and constraint-based QSR as an ALC(D) spatio-temporalisation with weakly cyclic TBoxes
58 pages, 7 figures (I have only split each of Figures 1, 2 and 3, as it appears in the first version, into two figures, so that the number of figures is now 7 instead of the original 4 -it is expected that the reader will find the look of the paper better)
null
null
Technical Report FBI-HH-M-311/02, Fachbereich Informatik, Universitaet Hamburg
cs.AI cs.LO
null
The aim of this work is to provide a family of qualitative theories for spatial change in general, and for motion of spatial scenes in particular. To achieve this, we consider a spatio-temporalisation MTALC(D_x), of the well-known ALC(D) family of Description Logics (DLs) with a concrete domainan. In particular, the concrete domain D_x is generated by a qualitative spatial Relation Algebra (RA) x. We show the important result that satisfiability of an MTALC(D_x) concept with respect to a weakly cyclic TBox is decidable in nondeterministic exponential time, by reducing it to the emptiness problem of a weak alternating automaton augmented with spatial constraints, which we show to remain decidable, although the accepting condition of a run involves, additionally to the standard case, consistency of a CSP (Constraint Satisfaction Problem) potentially infinite. The result provides an effective tableaux-like satisfiability procedure which is discussed.
[ { "version": "v1", "created": "Thu, 17 Jul 2003 14:46:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Isli", "Amar", "" ] ]
cs/0307041
Vince Grolmusz
Vince Grolmusz
High-density and Secure Data Transmission via Linear Combinations
Preliminary version
null
null
null
cs.CC cs.AR
null
Suppose that there are $n$ Senders and $n$ Receivers. Our goal is to send long messages from Sender $i$ to Receiver $i$ such that no other receiver can retrieve the message intended for Receiver $i$. The task can easily be completed using $n$ private channels between the pairs. Solutions, using one channel needs either encryption or switching elements for routing the messages to their addressee. The main result of the present work is a description of a network in which The Senders and the Receivers are connected with only $n^{o(1)}$ channels; the encoding and de-coding is nothing else just very fast linear combinations of the message-bits; and there are no switching or routing-elements in the network, just linear combinations are computed, with fixed connections (channels or wires). In the proofs we do not use {\em any} unproven cryptographical or complexity theoretical assumptions.
[ { "version": "v1", "created": "Thu, 17 Jul 2003 12:10:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Grolmusz", "Vince", "" ] ]
cs/0307042
Joseph O'Rourke
Mirela Damian and Joseph O'Rourke
A Note on Objects Built From Bricks without Corners
5 pages, 3 figures
null
null
null
cs.CG cs.DM
null
We report a small advance on a question raised by Robertson, Schweitzer, and Wagon in [RSW02]. They constructed a genus-13 polyhedron built from bricks without corners, and asked whether every genus-0 such polyhedron must have a corner. A brick is a parallelopiped, and a corner is a brick of degree three or less in the brick graph. We describe a genus-3 polyhedron built from bricks with no corner, narrowing the genus gap.
[ { "version": "v1", "created": "Thu, 17 Jul 2003 20:46:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Damian", "Mirela", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/0307043
Aravind Srinivasan
Aravind Srinivasan
An Extension of the Lovasz Local Lemma, and its Applications to Integer Programming
22 pages, preliminary version appeared in the SODA 1996 conference
null
null
null
cs.DS
null
The Lovasz Local Lemma due to Erdos and Lovasz is a powerful tool in proving the existence of rare events. We present an extension of this lemma, which works well when the event to be shown to exist is a conjunction of individual events, each of which asserts that a random variable does not deviate much from its mean. As applications, we consider two classes of NP-hard integer programs: minimax and covering integer programs. A key technique, randomized rounding of linear relaxations, was developed by Raghavan and Thompson to derive good approximation algorithms for such problems. We use our extension of the Local Lemma to prove that randomized rounding produces, with non-zero probability, much better feasible solutions than known before, if the constraint matrices of these integer programs are column-sparse (e.g., routing using short paths, problems on hypergraphs with small dimension/degree). This complements certain well-known results from discrepancy theory. We also generalize the method of pessimistic estimators due to Raghavan, to obtain constructive (algorithmic) versions of our results for covering integer programs.
[ { "version": "v1", "created": "Fri, 18 Jul 2003 04:02:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Srinivasan", "Aravind", "" ] ]
cs/0307044
K\^oiti Hasida
Koiti Hasida
The Linguistic DS: Linguisitic Description in MPEG-7
40 pages, 4 figures
null
null
null
cs.CL
null
MPEG-7 (Moving Picture Experts Group Phase 7) is an XML-based international standard on semantic description of multimedia content. This document discusses the Linguistic DS and related tools. The linguistic DS is a tool, based on the GDA tag set (http://i-content.org/GDA/tagset.html), for semantic annotation of linguistic data in or associated with multimedia content. The current document text reflects `Study of FPDAM - MPEG-7 MDS Extensions' issued in March 2003, and not most part of MPEG-7 MDS, for which the readers are referred to the first version of MPEG-7 MDS document available from ISO (http://www.iso.org). Without that reference, however, this document should be mostly intelligible to those who are familiar with XML and linguistic theories. Comments are welcome and will be considered in the standardization process.
[ { "version": "v1", "created": "Sat, 19 Jul 2003 12:24:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Hasida", "Koiti", "" ] ]
cs/0307045
Lili Ma
Lili Ma, YangQuan Chen and Kevin L. Moore (Utah State University)
Flexible Camera Calibration Using a New Analytical Radial Undistortion Formula with Application to Mobile Robot Localization
6 pages, 2 Postscript figures
null
null
null
cs.CV
null
Most algorithms in 3D computer vision rely on the pinhole camera model because of its simplicity, whereas virtually all imaging devices introduce certain amount of nonlinear distortion, where the radial distortion is the most severe part. Common approach to radial distortion is by the means of polynomial approximation, which introduces distortion-specific parameters into the camera model and requires estimation of these distortion parameters. The task of estimating radial distortion is to find a radial distortion model that allows easy undistortion as well as satisfactory accuracy. This paper presents a new radial distortion model with an easy analytical undistortion formula, which also belongs to the polynomial approximation category. Experimental results are presented to show that with this radial distortion model, satisfactory accuracy is achieved. An application of the new radial distortion model is non-iterative yellow line alignment with a calibrated camera on ODIS, a robot built in our CSOIS.
[ { "version": "v1", "created": "Sun, 20 Jul 2003 02:35:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Lili", "", "Utah State University" ], [ "Chen", "YangQuan", "", "Utah State University" ], [ "Moore", "Kevin L.", "", "Utah State University" ] ]
cs/0307046
Lili Ma
Lili Ma, YangQuan Chen, Kevin L. Moore
A New Analytical Radial Distortion Model for Camera Calibration
2 Postscript figures
null
null
null
cs.CV
null
Common approach to radial distortion is by the means of polynomial approximation, which introduces distortion-specific parameters into the camera model and requires estimation of these distortion parameters. The task of estimating radial distortion is to find a radial distortion model that allows easy undistortion as well as satisfactory accuracy. This paper presents a new radial distortion model with an easy analytical undistortion formula, which also belongs to the polynomial approximation category. Experimental results are presented to show that with this radial distortion model, satisfactory accuracy is achieved.
[ { "version": "v1", "created": "Sun, 20 Jul 2003 05:18:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Lili", "" ], [ "Chen", "YangQuan", "" ], [ "Moore", "Kevin L.", "" ] ]
cs/0307047
Lili Ma
Lili Ma, YangQuan Chen, Kevin L. Moore
Rational Radial Distortion Models with Analytical Undistortion Formulae
6 pages
null
null
null
cs.CV
null
The common approach to radial distortion is by the means of polynomial approximation, which introduces distortion-specific parameters into the camera model and requires estimation of these distortion parameters. The task of estimating radial distortion is to find a radial distortion model that allows easy undistortion as well as satisfactory accuracy. This paper presents a new class of rational radial distortion models with easy analytical undistortion formulae. Experimental results are presented to show that with this class of rational radial distortion models, satisfactory and comparable accuracy is achieved.
[ { "version": "v1", "created": "Sun, 20 Jul 2003 05:54:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Lili", "" ], [ "Chen", "YangQuan", "" ], [ "Moore", "Kevin L.", "" ] ]
cs/0307048
Amar Isli
Amar Isli
Integrating cardinal direction relations and other orientation relations in Qualitative Spatial Reasoning
Includes new material, such as a section on the use of the work in the concrete domain of the ALC(D) spatio-temporalisation defined in http://arXiv.org/abs/cs.AI/0307040
null
null
Technical report FBI-HH-M-304/01, Fachbereich Informatik, Universitaet Hamburg
cs.AI
null
We propose a calculus integrating two calculi well-known in Qualitative Spatial Reasoning (QSR): Frank's projection-based cardinal direction calculus, and a coarser version of Freksa's relative orientation calculus. An original constraint propagation procedure is presented, which implements the interaction between the two integrated calculi. The importance of taking into account the interaction is shown with a real example providing an inconsistent knowledge base, whose inconsistency (a) cannot be detected by reasoning separately about each of the two components of the knowledge, just because, taken separately, each is consistent, but (b) is detected by the proposed algorithm, thanks to the interaction knowledge propagated from each of the two compnents to the other.
[ { "version": "v1", "created": "Mon, 21 Jul 2003 13:03:19 GMT" }, { "version": "v2", "created": "Tue, 5 Oct 2004 15:45:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Isli", "Amar", "" ] ]
cs/0307049
Christian Rossi
Vincent Guirardel
Limit groups and groups acting freely on $\bbR^n$-trees
null
null
null
null
cs.DL
null
We give a simple proof of the finite presentation of Sela's limit groups by using free actions on $\bbR^n$-trees. We first prove that Sela's limit groups do have a free action on an $\bbR^n$-tree. We then prove that a finitely generated group having a free action on an $\bbR^n$-tree can be obtained from free abelian groups and surface groups by a finite sequence of free products and amalgamations over cyclic groups. As a corollary, such a group is finitely presented, has a finite classifying space, its abelian subgroups are finitely generated and contains only finitely many conjugacy classes of non-cyclic maximal abelian subgroups.
[ { "version": "v1", "created": "Mon, 21 Jul 2003 14:31:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Guirardel", "Vincent", "" ] ]
cs/0307050
Amar Isli
Amar Isli
A ternary Relation Algebra of directed lines
60 pages. Submitted. Technical report mentioned in "Report-no" below is an earlier version of the work, and its title differs slightly (Reasoning about relative position of directed lines as a ternary Relation Algebra (RA): presentation of the RA and of its use in the concrete domain of an ALC(D)-like description logic)
null
null
Technical report FBI-HH-M-313/02, Fachbereich Informatik, Universitaet Hamburg
cs.AI
null
We define a ternary Relation Algebra (RA) of relative position relations on two-dimensional directed lines (d-lines for short). A d-line has two degrees of freedom (DFs): a rotational DF (RDF), and a translational DF (TDF). The representation of the RDF of a d-line will be handled by an RA of 2D orientations, CYC_t, known in the literature. A second algebra, TA_t, which will handle the TDF of a d-line, will be defined. The two algebras, CYC_t and TA_t, will constitute, respectively, the translational and the rotational components of the RA, PA_t, of relative position relations on d-lines: the PA_t atoms will consist of those pairs <t,r> of a TA_t atom and a CYC_t atom that are compatible. We present in detail the RA PA_t, with its converse table, its rotation table and its composition tables. We show that a (polynomial) constraint propagation algorithm, known in the literature, is complete for a subset of PA_t relations including almost all of the atomic relations. We will discuss the application scope of the RA, which includes incidence geometry, GIS (Geographic Information Systems), shape representation, localisation in (multi-)robot navigation, and the representation of motion prepositions in NLP (Natural Language Processing). We then compare the RA to existing ones, such as an algebra for reasoning about rectangles parallel to the axes of an (orthogonal) coordinate system, a ``spatial Odyssey'' of Allen's interval algebra, and an algebra for reasoning about 2D segments.
[ { "version": "v1", "created": "Mon, 21 Jul 2003 16:01:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Isli", "Amar", "" ] ]
cs/0307051
Lili Ma
Lili Ma, YangQuan Chen, Kevin L. Moore
An Analytical Piecewise Radial Distortion Model for Precision Camera Calibration
6 pages, 6 PostScript figures
null
null
null
cs.CV
null
The common approach to radial distortion is by the means of polynomial approximation, which introduces distortion-specific parameters into the camera model and requires estimation of these distortion parameters. The task of estimating radial distortion is to find a radial distortion model that allows easy undistortion as well as satisfactory accuracy. This paper presents a new piecewise radial distortion model with easy analytical undistortion formula. The motivation for seeking a piecewise radial distortion model is that, when a camera is resulted in a low quality during manufacturing, the nonlinear radial distortion can be complex. Using low order polynomials to approximate the radial distortion might not be precise enough. On the other hand, higher order polynomials suffer from the inverse problem. With the new piecewise radial distortion function, more flexibility is obtained and the radial undistortion can be performed analytically. Experimental results are presented to show that with this new piecewise radial distortion model, better performance is achieved than that using the single function. Furthermore, a comparable performance with the conventional polynomial model using 2 coefficients can also be accomplished.
[ { "version": "v1", "created": "Mon, 21 Jul 2003 16:30:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Lili", "" ], [ "Chen", "YangQuan", "" ], [ "Moore", "Kevin L.", "" ] ]
cs/0307052
Rajkumar Buyya
Hussein Gibbins and Rajkumar Buyya
Gridscape: A Tool for the Creation of Interactive and Dynamic Grid Testbed Web Portals
12 pages, 6 figures
null
null
July 2003 Research Report, GRIDS Lab @ The University of Melbourne
cs.DC
null
The notion of grid computing has gained an increasing popularity recently as a realistic solution to many of our large-scale data storage and processing needs. It enables the sharing, selection and aggregation of resources geographically distributed across collaborative organisations. Now more and more people are beginning to embrace grid computing and thus are seeing the need to set up their own grids and grid testbeds. With this comes the need to have some means to enable them to view and monitor the status of the resources in these testbeds (eg. Web based Grid portal). Generally developers invest a substantial amount of time and effort developing custom monitoring software. To overcome this limitation, this paper proposes Gridscape ? a tool that enables the rapid creation of interactive and dynamic testbed portals (without any programming effort). Gridscape primarily aims to provide a solution for those users who need to be able to create a grid testbed portal but don?t necessarily have the time or resources to build a system of their own from scratch.
[ { "version": "v1", "created": "Tue, 22 Jul 2003 12:27:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gibbins", "Hussein", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0307053
Vito Antonelli
P. Aliani, V. Antonelli, M. Picariello, Emilio Torrente-Lujan
Hamevol1.0: a C++ code for differential equations based on Runge-Kutta algorithm. An application to matter enhanced neutrino oscillation
18 pages, Latex
null
null
IFUM-841-FT; CERN-TH-03-101 ; FT-UM-TH-03-06
cs.CE
null
We present a C++ implementation of a fifth order semi-implicit Runge-Kutta algorithm for solving Ordinary Differential Equations. This algorithm can be used for studying many different problems and in particular it can be applied for computing the evolution of any system whose Hamiltonian is known. We consider in particular the problem of calculating the neutrino oscillation probabilities in presence of matter interactions. The time performance and the accuracy of this implementation is competitive with respect to the other analytical and numerical techniques used in literature. The algorithm design and the salient features of the code are presented and discussed and some explicit examples of code application are given.
[ { "version": "v1", "created": "Wed, 23 Jul 2003 19:30:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Aliani", "P.", "" ], [ "Antonelli", "V.", "" ], [ "Picariello", "M.", "" ], [ "Torrente-Lujan", "Emilio", "" ] ]
cs/0307054
Mihai V. Putz
Viorel Putz and Mihai V. Putz
Contributions to the Development and Improvement of a Regulatory and Pre-Regulatory Digitally System for the Tools within Flexible Fabrication Systems
5 pages, 3 figures
null
null
null
cs.CE cs.SE
null
The paper reports the obtained results for the projection and realization of a digitally system aiming to assist the equipment for a regulatory and pre-regulatory tools and holding tools within the flexible fabrication systems (FFS). Moreover, based on the present results, the same methodology can be applied for assisting tools from the point of view of their integrity and to wear compensation in the FFS framework.
[ { "version": "v1", "created": "Thu, 24 Jul 2003 14:01:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Putz", "Viorel", "" ], [ "Putz", "Mihai V.", "" ] ]
cs/0307055
Peter Turney
Peter D. Turney (National Research Council of Canada), Michael L. Littman (Rutgers University)
Learning Analogies and Semantic Relations
28 pages, issued 2003
null
null
NRC-46488
cs.LG cs.CL cs.IR
null
We present an algorithm for learning from unlabeled text, based on the Vector Space Model (VSM) of information retrieval, that can solve verbal analogy questions of the kind found in the Scholastic Aptitude Test (SAT). A verbal analogy has the form A:B::C:D, meaning "A is to B as C is to D"; for example, mason:stone::carpenter:wood. SAT analogy questions provide a word pair, A:B, and the problem is to select the most analogous word pair, C:D, from a set of five choices. The VSM algorithm correctly answers 47% of a collection of 374 college-level analogy questions (random guessing would yield 20% correct). We motivate this research by relating it to work in cognitive science and linguistics, and by applying it to a difficult problem in natural language processing, determining semantic relations in noun-modifier pairs. The problem is to classify a noun-modifier pair, such as "laser printer", according to the semantic relation between the noun (printer) and the modifier (laser). We use a supervised nearest-neighbour algorithm that assigns a class to a given noun-modifier pair by finding the most analogous noun-modifier pair in the training data. With 30 classes of semantic relations, on a collection of 600 labeled noun-modifier pairs, the learning algorithm attains an F value of 26.5% (random guessing: 3.3%). With 5 classes of semantic relations, the F value is 43.2% (random: 20%). The performance is state-of-the-art for these challenging problems.
[ { "version": "v1", "created": "Thu, 24 Jul 2003 21:09:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ], [ "Littman", "Michael L.", "", "Rutgers University" ] ]
cs/0307056
Joseph Y. Halpern
Fahiem Bacchus, Adam Grove, Joseph Y. Halpern, and Daphne Koller
From Statistical Knowledge Bases to Degrees of Belief
null
Artificial Intelligence 87:1-2, 1996, pp. 75-143
null
null
cs.AI
null
An intelligent agent will often be uncertain about various properties of its environment, and when acting in that environment it will frequently need to quantify its uncertainty. For example, if the agent wishes to employ the expected-utility paradigm of decision theory to guide its actions, it will need to assign degrees of belief (subjective probabilities) to various assertions. Of course, these degrees of belief should not be arbitrary, but rather should be based on the information available to the agent. This paper describes one approach for inducing degrees of belief from very rich knowledge bases, that can include information about particular individuals, statistical correlations, physical laws, and default rules. We call our approach the random-worlds method. The method is based on the principle of indifference: it treats all of the worlds the agent considers possible as being equally likely. It is able to integrate qualitative default reasoning with quantitative probabilistic reasoning by providing a language in which both types of information can be easily expressed. Our results show that a number of desiderata that arise in direct inference (reasoning from statistical information to conclusions about individuals) and default reasoning follow directly {from} the semantics of random worlds. For example, random worlds captures important patterns of reasoning such as specificity, inheritance, indifference to irrelevant information, and default assumptions of independence. Furthermore, the expressive power of the language used and the intuitive semantics of random worlds allow the method to deal with problems that are beyond the scope of many other non-deductive reasoning systems.
[ { "version": "v1", "created": "Thu, 24 Jul 2003 21:32:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Bacchus", "Fahiem", "" ], [ "Grove", "Adam", "" ], [ "Halpern", "Joseph Y.", "" ], [ "Koller", "Daphne", "" ] ]
cs/0307057
Joseph Y. Halpern
Kevin R. O'Neill and Joseph Y. Halpern
Secrecy in Multiagent Systems
This is an extended version of a paper that appears in the Proceedings of the 15th IEEE Computer Security Foundations Workshop}, 2002, pp. 32-46
null
null
null
cs.CR cs.LO
null
We introduce a general framework for reasoning about secrecy and privacy requirements in multiagent systems. Our definitions extend earlier definitions of secrecy and nondeducibility given by Shannon and Sutherland. Roughly speaking, one agent maintains secrecy with respect to another if the second agent cannot rule out any possibilities for the behavior or state of the first agent. We show that the framework can handle probability and nondeterminism in a clean way, is useful for reasoning about asynchronous systems as well as synchronous systems, and suggests generalizations of secrecy that may be useful for dealing with issues such as resource-bounded reasoning. We also show that a number of well-known attempts to characterize the absence of information flow are special cases of our definitions of secrecy.
[ { "version": "v1", "created": "Thu, 24 Jul 2003 22:22:47 GMT" }, { "version": "v2", "created": "Wed, 16 Mar 2005 20:59:27 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Neill", "Kevin R.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/0307058
Raimondas Lencevicius
Edu Metz, Raimondas Lencevicius
Efficient Instrumentation for Performance Profiling
3 pages, 1 figure, published in proceedings of WODA'2003, ICSE Workshop on Dynamic Analysis
null
null
null
cs.PF cs.SE
null
Performance profiling consists of tracing a software system during execution and then analyzing the obtained traces. However, traces themselves affect the performance of the system distorting its execution. Therefore, there is a need to minimize the effect of the tracing on the underlying system's performance. To achieve this, the trace set needs to be optimized according to the performance profiling problem being solved. Our position is that such minimization can be achieved only by adding the software trace design and implementation to the overall software development process. In such a process, the performance analyst supplies the knowledge of performance measurement requirements, while the software developer supplies the knowledge of the software. Both of these are needed for an optimal trace placement.
[ { "version": "v1", "created": "Fri, 25 Jul 2003 21:45:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Metz", "Edu", "" ], [ "Lencevicius", "Raimondas", "" ] ]
cs/0307060
J. G. Wolff
J. Gerard Wolff
Neural realisation of the SP theory: cell assemblies revisited
This is a radical revision with new content which is shorter and, I hope, clearer
null
null
null
cs.AI cs.NE
null
This paper describes how the elements of the SP theory (Wolff, 2003a) may be realised with neural structures and processes. To the extent that this is successful, the insights that have been achieved in the SP theory - the integration and simplification of a range of phenomena in perception and cognition - may be incorporated in a neural view of brain function. These proposals may be seen as a development of Hebb's (1949) concept of a 'cell assembly'. By contrast with that concept and variants of it, the version described in this paper proposes that any one neuron can belong in one assembly and only one assembly. A distinctive feature of the present proposals is that any neuron or cluster of neurons within a cell assembly may serve as a proxy or reference for another cell assembly or class of cell assemblies. This device provides solutions to many of the problems associated with cell assemblies, it allows information to be stored in a compressed form, and it provides a robust mechanism by which assemblies may be connected to form hierarchies, grammars and other kinds of knowledge structure. Drawing on insights derived from the SP theory, the paper also describes how unsupervised learning may be achieved with neural structures and processes. This theory of learning overcomes weaknesses in the Hebbian concept of learning and it is, at the same time, compatible with the observations that Hebb's theory was designed to explain.
[ { "version": "v1", "created": "Sun, 27 Jul 2003 22:53:12 GMT" }, { "version": "v2", "created": "Thu, 13 May 2004 10:16:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolff", "J. Gerard", "" ] ]
cs/0307061
Wen Chen
W. Chen
Boundary knot method for Laplace and biharmonic problems
Welcome any comments to [email protected]
null
null
Proc. of the 14th Nordic Seminar on Computational Mechanics, pp. 117-120, Lund, Sweden, Oct. 2001
cs.CE cs.MS
null
The boundary knot method (BKM) [1] is a meshless boundary-type radial basis function (RBF) collocation scheme, where the nonsingular general solution is used instead of fundamental solution to evaluate the homogeneous solution, while the dual reciprocity method (DRM) is employed to approximation of particular solution. Despite the fact that there are not nonsingular RBF general solutions available for Laplace and biharmonic problems, this study shows that the method can be successfully applied to these problems. The high-order general and fundamental solutions of Burger and Winkler equations are also first presented here.
[ { "version": "v1", "created": "Mon, 28 Jul 2003 09:35:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "W.", "" ] ]
cs/0307062
Viviane Baladi
Viviane Baladi and Brigitte Vallee
Euclidean algorithms are Gaussian
fourth revised version - 2 figures - the strict convexity condition used has been clarified
null
null
null
cs.DS cs.CC
null
This study provides new results about the probabilistic behaviour of a class of Euclidean algorithms: the asymptotic distribution of a whole class of cost-parameters associated to these algorithms is normal. For the cost corresponding to the number of steps Hensley already has proved a Local Limit Theorem; we give a new proof, and extend his result to other euclidean algorithms and to a large class of digit costs, obtaining a faster, optimal, rate of convergence. The paper is based on the dynamical systems methodology, and the main tool is the transfer operator. In particular, we use recent results of Dolgopyat.
[ { "version": "v1", "created": "Mon, 28 Jul 2003 10:31:53 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2003 13:30:45 GMT" }, { "version": "v3", "created": "Fri, 24 Oct 2003 14:21:38 GMT" }, { "version": "v4", "created": "Wed, 5 May 2004 16:00:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Baladi", "Viviane", "" ], [ "Vallee", "Brigitte", "" ] ]
cs/0307063
J. G. Wolff
J Gerard Wolff
An Alternative to RDF-Based Languages for the Representation and Processing of Ontologies in the Semantic Web
null
null
null
null
cs.AI
null
This paper describes an approach to the representation and processing of ontologies in the Semantic Web, based on the ICMAUS theory of computation and AI. This approach has strengths that complement those of languages based on the Resource Description Framework (RDF) such as RDF Schema and DAML+OIL. The main benefits of the ICMAUS approach are simplicity and comprehensibility in the representation of ontologies, an ability to cope with errors and uncertainties in knowledge, and a versatile reasoning system with capabilities in the kinds of probabilistic reasoning that seem to be required in the Semantic Web.
[ { "version": "v1", "created": "Tue, 29 Jul 2003 11:13:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolff", "J Gerard", "" ] ]
cs/0307064
Magnus Boman
Magnus Boman and Anna Sandin
Implementing an Agent Trade Server
14 pages, 7 figures, intended for B/W printing
null
null
null
cs.CE
null
An experimental server for stock trading autonomous agents is presented and made available, together with an agent shell for swift development. The server, written in Java, was implemented as proof-of-concept for an agent trade server for a real financial exchange.
[ { "version": "v1", "created": "Tue, 29 Jul 2003 12:58:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Boman", "Magnus", "" ], [ "Sandin", "Anna", "" ] ]
cs/0307065
Stanimire Tomov
Stanimire Tomov (1), Robert Bennett (1), Michael McGuigan (1), Arnold Peskin (1), Gordon Smith (1), John Spiletic (1) ((1) Brookhaven National Laboratory)
Application of interactive parallel visualization for commodity-based clusters using visualization APIs
12 pages, 4 figures
null
null
null
cs.GR
null
We present an efficient and inexpensive to develop application for interactive high-performance parallel visualization. We extend popular APIs such as Open Inventor and VTK to support commodity-based cluster visualization. Our implementation follows a standard master/slave concept: the general idea is to have a ``Master'' node, which will intercept a sequential graphical user interface (GUI) and broadcast it to the ``Slave'' nodes. The interactions between the nodes are implemented using MPI. The parallel remote rendering uses Chromium. This paper is mainly the report of our implementation experiences. We present in detail the proposed model and key aspects of its implementation. Also, we present performance measurements, we benchmark and quantitatively demonstrate the dependence of the visualization speed on the data size and the network bandwidth, and we identify the singularities and draw conclusions on Chromium's sort-first rendering architecture. The most original part of this work is the combined use of Open Inventor and Chromium.
[ { "version": "v1", "created": "Tue, 29 Jul 2003 13:40:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Tomov", "Stanimire", "" ], [ "Bennett", "Robert", "" ], [ "McGuigan", "Michael", "" ], [ "Peskin", "Arnold", "" ], [ "Smith", "Gordon", "" ], [ "Spiletic", "John", "" ] ]
cs/0307067
C. F. M. Vermeulen
C.F.M. Vermeulen
Sound search in a denotational semantics for first order logic
To appear in print shortly in the Progress in Computer Science Series of Novapublications
null
null
null
cs.LO
null
In this paper we adapt the definitions and results from Apt and Vermeulen on `First order logic as a constraint programming language' (in: Proceedings of LPAR2001, Baaz and Voronkov (eds.), Springer LNAI 2514) to include important ideas about search and choice into the system. We give motivating examples. Then we set up denotational semantics for first order logic as follows: the semantic universe includes states that consist of two components: a substitution, which can be seen as the computed answer; and a constraint satisfaction problem, which can be seen as the residue of the original problem, yet to be handled by constraint programming. The interaction between these components is regulated by an operator called: infer. In this paper we regard infer as an operator on sets of states to enable us to analyze ideas about search among states and choice between states. The precise adaptations of definitions and results are able to deal with the examples and we show that, given several reasonable conditions, the new definitions ensure soundness of the system with respect to the standard interpretation of first order logic. In this way the `reasonable conditions' can be read as conditions for sound search. We indicate briefly how to investigate efficiency of search in future research.
[ { "version": "v1", "created": "Wed, 30 Jul 2003 13:57:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Vermeulen", "C. F. M.", "" ] ]
cs/0307068
Jonathan Bowen
Jonathan P. Bowen
Web Access to Cultural Heritage for the Disabled
10 pages, see http://www.museophile.sbu.ac.uk/pub/jpb/eva2003.pdf
Jonathan P. Bowen, Web Access to Cultural Heritage for the Disabled. In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2003 London Conference Proceedings, University College London, UK, 22-26 July 2003, pages s1:1-11. Keynote address. ISBN 0-9543146-3-8
null
null
cs.CY cs.HC cs.IR
null
Physical disabled access is something that most cultural institutions such as museums consider very seriously. Indeed, there are normally legal requirements to do so. However, online disabled access is still a relatively novel and developing field. Many cultural organizations have not yet considered the issues in depth and web developers are not necessarily experts either. The interface for websites is normally tested with major browsers, but not with specialist software like text to audio converters for the blind or against the relevant accessibility and validation standards. We consider the current state of the art in this area, especially with respect to aspects of particular importance to the access of cultural heritage.
[ { "version": "v1", "created": "Wed, 30 Jul 2003 18:37:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Bowen", "Jonathan P.", "" ] ]
cs/0307069
Joseph Y. Halpern
Joseph Y. Halpern and Riccardo Pucella
A logic for reasoning about upper probabilities
A preliminary version of this paper appeared in Proc. of the 17th Conference on Uncertainty in AI, 2001
Journal of AI Research 17, 2001, pp. 57-81
null
null
cs.AI cs.LO
null
We present a propositional logic %which can be used to reason about the uncertainty of events, where the uncertainty is modeled by a set of probability measures assigning an interval of probability to each event. We give a sound and complete axiomatization for the logic, and show that the satisfiability problem is NP-complete, no harder than satisfiability for propositional logic.
[ { "version": "v1", "created": "Wed, 30 Jul 2003 21:08:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0307070
Joseph Y. Halpern
Nir Friedman and Joseph Y. Halpern
Modeling Belief in Dynamic Systems, Part I: Foundations
null
Aritificial Intelligence 95:2, 1997, pp. 257-316
null
null
cs.AI cs.LO
null
Belief change is a fundamental problem in AI: Agents constantly have to update their beliefs to accommodate new observations. In recent years, there has been much work on axiomatic characterizations of belief change. We claim that a better understanding of belief change can be gained from examining appropriate semantic models. In this paper we propose a general framework in which to model belief change. We begin by defining belief in terms of knowledge and plausibility: an agent believes p if he knows that p is more plausible than its negation. We then consider some properties defining the interaction between knowledge and plausibility, and show how these properties affect the properties of belief. In particular, we show that by assuming two of the most natural properties, belief becomes a KD45 operator. Finally, we add time to the picture. This gives us a framework in which we can talk about knowledge, plausibility (and hence belief), and time, which extends the framework of Halpern and Fagin for modeling knowledge in multi-agent systems. We then examine the problem of ``minimal change''. This notion can be captured by using prior plausibilities, an analogue to prior probabilities, which can be updated by ``conditioning''. We show by example that conditioning on a plausibility measure can capture many scenarios of interest. In a companion paper, we show how the two best-studied scenarios of belief change, belief revisionand belief update, fit into our framework.
[ { "version": "v1", "created": "Wed, 30 Jul 2003 21:36:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Nir", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/0307071
Joseph Y. Halpern
Nir Friedman and Joseph Y. Halpern
Modeling Belief in Dynamic Systems, Part II: Revisions and Update
null
Aritificial Intelligence 95:2, 1997, pp. 257-316
null
null
cs.AI cs.LO
null
The study of belief change has been an active area in philosophy and AI. In recent years two special cases of belief change, belief revision and belief update, have been studied in detail. In a companion paper, we introduce a new framework to model belief change. This framework combines temporal and epistemic modalities with a notion of plausibility, allowing us to examine the change of beliefs over time. In this paper, we show how belief revision and belief update can be captured in our framework. This allows us to compare the assumptions made by each method, and to better understand the principles underlying them. In particular, it shows that Katsuno and Mendelzon's notion of belief update depends on several strong assumptions that may limit its applicability in artificial intelligence. Finally, our analysis allow us to identify a notion of minimal change that underlies a broad range of belief change operations including revision and update.
[ { "version": "v1", "created": "Wed, 30 Jul 2003 21:51:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Nir", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/0307073
Richard Wheeldon
Richard Wheeldon, Mark Levene and Kevin Keenoy
Search and Navigation in Relational Databases
12 pages, 7 figures
null
null
null
cs.DB
null
We present a new application for keyword search within relational databases, which uses a novel algorithm to solve the join discovery problem by finding Memex-like trails through the graph of foreign key dependencies. It differs from previous efforts in the algorithms used, in the presentation mechanism and in the use of primary-key only database queries at query-time to maintain a fast response for users. We present examples using the DBLP data set.
[ { "version": "v1", "created": "Thu, 31 Jul 2003 11:18:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Wheeldon", "Richard", "" ], [ "Levene", "Mark", "" ], [ "Keenoy", "Kevin", "" ] ]
cs/0308001
Jan Van den Bussche
Floris Geerts, Lieven Smits, Jan Van den Bussche
Two- versus three-dimensional connectivity testing of first-order queries to semi-algebraic sets
corrected minor confusion in Proof of Theorem 1
A revised version has been published online (21 July 2005) in Acta Informatica under the title "N- versus (N-1)-dimensional connectivity testing of first-order queries to semi-algebraic sets"
10.1007/s00236-005-0171-5
null
cs.LO cs.CG cs.DB
null
This paper addresses the question whether one can determine the connectivity of a semi-algebraic set in three dimensions by testing the connectivity of a finite number of two-dimensional ``samples'' of the set, where these samples are defined by first-order queries. The question is answered negatively for two classes of first-order queries: cartesian-product-free, and positive one-pass.
[ { "version": "v1", "created": "Fri, 1 Aug 2003 00:59:41 GMT" }, { "version": "v2", "created": "Fri, 1 Aug 2003 21:44:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Geerts", "Floris", "" ], [ "Smits", "Lieven", "" ], [ "Bussche", "Jan Van den", "" ] ]
cs/0308002
Aleks Jakulin
Aleks Jakulin and Ivan Bratko
Quantifying and Visualizing Attribute Interactions
30 pages, 11 figures. Changes from v2: improved bibliography
null
null
null
cs.AI
null
Interactions are patterns between several attributes in data that cannot be inferred from any subset of these attributes. While mutual information is a well-established approach to evaluating the interactions between two attributes, we surveyed its generalizations as to quantify interactions between several attributes. We have chosen McGill's interaction information, which has been independently rediscovered a number of times under various names in various disciplines, because of its many intuitively appealing properties. We apply interaction information to visually present the most important interactions of the data. Visualization of interactions has provided insight into the structure of data on a number of domains, identifying redundant attributes and opportunities for constructing new features, discovering unexpected regularities in data, and have helped during construction of predictive models; we illustrate the methods on numerous examples. A machine learning method that disregards interactions may get caught in two traps: myopia is caused by learning algorithms assuming independence in spite of interactions, whereas fragmentation arises from assuming an interaction in spite of independence.
[ { "version": "v1", "created": "Fri, 1 Aug 2003 10:50:07 GMT" }, { "version": "v2", "created": "Tue, 11 Nov 2003 13:07:12 GMT" }, { "version": "v3", "created": "Tue, 2 Mar 2004 12:57:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Jakulin", "Aleks", "" ], [ "Bratko", "Ivan", "" ] ]
cs/0308004
Gene Cooperman
Gene Cooperman, Xiaoqin Ma and Viet Ha Nguyen
DPG: A Cache-Efficient Accelerator for Sorting and for Join Operators
12 pages, 11 figures
null
null
null
cs.DB cs.DS
null
We present a new algorithm for fast record retrieval, distribute-probe-gather, or DPG. DPG has important applications both in sorting and in joins. Current main memory sorting algorithms split their work into three phases: extraction of key-pointer pairs; sorting of the key-pointer pairs; and copying of the original records into the destination array according the sorted key-pointer pairs. The copying in the last phase dominates today's sorting time. Hence, the use of DPG in the third phase provides an accelerator for existing sorting algorithms. DPG also provides two new join methods for foreign key joins: DPG-move join and DPG-sort join. The resulting join methods with DPG are faster because DPG join is cache-efficient and at the same time DPG join avoids the need for sorting or for hashing. The ideas presented for foreign key join can also be extended to faster record pair retrieval for spatial and temporal databases.
[ { "version": "v1", "created": "Sat, 2 Aug 2003 08:13:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Cooperman", "Gene", "" ], [ "Ma", "Xiaoqin", "" ], [ "Nguyen", "Viet Ha", "" ] ]
cs/0308005
Jonathan Bowen
Jonathan P. Bowen
Disabled Access for Museum Websites
2 pages, see http://www2003.org/cdrom/papers/poster/p335/p335-bowen.html
Jonathan P. Bowen. Disabled Access for Museum Websites. WWW2003: The Twelfth International World Wide Web Conference, Budapest, Hungary, 20-24 May 2003. Conference poster
null
null
cs.CY cs.HC cs.IR
null
Physical disabled access is something that most museums consider very seriously. Indeed, there are normally legal requirements to do so. However, online disabled access is still a relatively novel field. Most museums have not yet considered the issues in depth. The Human-Computer Interface for their websites is normally tested with major browsers, but not with specialist browsers or against the relevant accessibility and validation standards. We consider the current state of the art in this area and mention an accessibility survey of some museum websites.
[ { "version": "v1", "created": "Sun, 3 Aug 2003 17:57:24 GMT" }, { "version": "v2", "created": "Wed, 6 Oct 2004 14:02:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Bowen", "Jonathan P.", "" ] ]
cs/0308006
Sandor P. Fekete
Sandor P. Fekete and Ekkehard Koehler and Juergen Teich
Higher-Dimensional Packing with Order Constraints
23 pages, 14 figures, 5 tables, Latex; revision clarifies various minor points, fixes typos, etc. To appear in SIAM Journal on Discrete Mathematics
null
null
null
cs.DS cs.DM
null
We present a first exact study on higher-dimensional packing problems with order constraints. Problems of this type occur naturally in applications such as logistics or computer architecture and can be interpreted as higher-dimensional generalizations of scheduling problems. Using graph-theoretic structures to describe feasible solutions, we develop a novel exact branch-and-bound algorithm. This extends previous work by Fekete and Schepers; a key tool is a new order-theoretic characterization of feasible extensions of a partial order to a given complementarity graph that is tailor-made for use in a branch-and-bound environment. The usefulness of our approach is validated by computational results.
[ { "version": "v1", "created": "Mon, 4 Aug 2003 14:28:00 GMT" }, { "version": "v2", "created": "Thu, 28 Jul 2005 00:24:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Koehler", "Ekkehard", "" ], [ "Teich", "Juergen", "" ] ]
cs/0308007
Ricardo Rocha
Ricardo Rocha and Fernando Silva and Vitor Santos Costa
On Applying Or-Parallelism and Tabling to Logic Programs
45 pages, 12 figures, to appear in the journal of Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL
null
The past years have seen widening efforts at increasing Prolog's declarativeness and expressiveness. Tabling has proved to be a viable technique to efficiently overcome SLD's susceptibility to infinite loops and redundant subcomputations. Our research demonstrates that implicit or-parallelism is a natural fit for logic programs with tabling. To substantiate this belief, we have designed and implemented an or-parallel tabling engine -- OPTYap -- and we used a shared-memory parallel machine to evaluate its performance. To the best of our knowledge, OPTYap is the first implementation of a parallel tabling engine for logic programming systems. OPTYap builds on Yap's efficient sequential Prolog engine. Its execution model is based on the SLG-WAM for tabling, and on the environment copying for or-parallelism. Preliminary results indicate that the mechanisms proposed to parallelize search in the context of SLD resolution can indeed be effectively and naturally generalized to parallelize tabled computations, and that the resulting systems can achieve good performance on shared-memory parallel machines. More importantly, it emphasizes our belief that through applying or-parallelism and tabling to logic programs the range of applications for Logic Programming can be increased.
[ { "version": "v1", "created": "Mon, 4 Aug 2003 18:59:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Rocha", "Ricardo", "" ], [ "Silva", "Fernando", "" ], [ "Costa", "Vitor Santos", "" ] ]
cs/0308008
Baden Hughes
Baden Hughes and Steven Bird
A Grid Based Architecture for High-Performance NLP
null
null
null
null
cs.DC cs.CL
null
We describe the design and early implementation of an extensible, component-based software architecture for natural language engineering applications which interfaces with high performance distributed computing services. The architecture leverages existing linguistic resource description and discovery mechanisms based on metadata descriptions, combining these in a compatible fashion with other software definition abstractions. Within this architecture, application design is highly flexible, allowing disparate components to be combined to suit the overall application functionality, and formally described independently of processing concerns. An application specification language provides abstraction from the programming environment and allows ease of interface with high performance computational grids via a broker.
[ { "version": "v1", "created": "Tue, 5 Aug 2003 00:46:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Hughes", "Baden", "" ], [ "Bird", "Steven", "" ] ]
cs/0308010
Giorgio Parisi
Giorgio Parisi
On the probabilistic approach to the random satisfiability problem
11 pages, proceedings of SAT 2003
null
null
null
cs.CC cond-mat.dis-nn
null
In this note I will review some of the recent results that have been obtained in the probabilistic approach to the random satisfiability problem. At the present moment the results are only heuristic. In the case of the random 3-satisfiability problem a phase transition from the satisfiable to the unsatisfiable phase is found at $\alpha=4.267$. There are other values of $\alpha$ that separates different regimes and they will be described in details. In this context the properties of the survey decimation algorithm will also be discussed.
[ { "version": "v1", "created": "Tue, 5 Aug 2003 10:34:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Parisi", "Giorgio", "" ] ]
cs/0308012
Nathan Segerlind
Russell Impagliazzo and Nathan Segerlind
Constant-Depth Frege Systems with Counting Axioms Polynomially Simulate Nullstellensatz Refutations
17 pages
null
null
null
cs.CC cs.LO
null
We show that constant-depth Frege systems with counting axioms modulo $m$ polynomially simulate Nullstellensatz refutations modulo $m$. Central to this is a new definition of reducibility from formulas to systems of polynomials with the property that, for most previously studied translations of formulas to systems of polynomials, a formula reduces to its translation. When combined with a previous result of the authors, this establishes the first size separation between Nullstellensatz and polynomial calculus refutations. We also obtain new, small refutations for certain CNFs by constant-depth Frege systems with counting axioms.
[ { "version": "v1", "created": "Tue, 5 Aug 2003 19:25:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Impagliazzo", "Russell", "" ], [ "Segerlind", "Nathan", "" ] ]
cs/0308013
Andrei Lopatenko
Enrico Franconi, Gabriel Kuper, Andrei Lopatenko, Luciano Serafini
A Robust and Computational Characterisation of Peer-to-Peer Database Systems
13 pages
"International Workshop On Databases, Information Systems and Peer-to-Peer Computing", 2003
null
null
cs.DC cs.DB
null
In this paper we give a robust logical and computational characterisation of peer-to-peer database systems. We first define a pre- cise model-theoretic semantics of a peer-to-peer system, which allows for local inconsistency handling. We then characterise the general computa- tional properties for the problem of answering queries to such a peer-to- peer system. Finally, we devise tight complexity bounds and distributed procedures for the problem of answering queries in few relevant special cases.
[ { "version": "v1", "created": "Wed, 6 Aug 2003 12:50:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Franconi", "Enrico", "" ], [ "Kuper", "Gabriel", "" ], [ "Lopatenko", "Andrei", "" ], [ "Serafini", "Luciano", "" ] ]
cs/0308014
Dirk Leinders
Dirk Leinders (Limburgs Universitair Centrum, Belgium), Jerzy Tyszkiewicz (Warsaw University), Jan Van den Bussche (Limburgs Universitair Centrum, Belgium)
On the expressive power of semijoin queries
9 pages, to appear in Information Processing Letters; added results that more clearly delineate the expressive power of SA, added a section that discusses the impact of order on the expressive power of SA, deemphasized the discussion on the relationship with GF
null
null
null
cs.DB cs.LO
null
The semijoin algebra is the variant of the relational algebra obtained by replacing the join operator by the semijoin operator. We provide an Ehrenfeucht-Fraiss\'{e} game, characterizing the discerning power of the semijoin algebra. This game gives a method for showing that queries are not expressible in the semijoin algebra.
[ { "version": "v1", "created": "Wed, 6 Aug 2003 14:12:11 GMT" }, { "version": "v2", "created": "Wed, 3 Mar 2004 13:43:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Leinders", "Dirk", "", "Limburgs Universitair Centrum, Belgium" ], [ "Tyszkiewicz", "Jerzy", "", "Warsaw University" ], [ "Bussche", "Jan Van den", "", "Limburgs Universitair\n Centrum, Belgium" ] ]
cs/0308015
Shinji Yamane
Shinji Yamane, Jiahong Wang, Hironobu Suzuki, Norihisa Segawa and Yuko Murayama
Rethinking OpenPGP PKI and OpenPGP Public Keyserver
8 pages, 2 figures
null
null
null
cs.CY cs.CR
null
OpenPGP, an IETF Proposed Standard based on PGP application, has its own Public Key Infrastructure (PKI) architecture which is different from the one based on X.509, another standard from ITU. This paper describes the OpenPGP PKI; the historical perspective as well as its current use. The current OpenPGP PKI issues include the capability of a PGP keyserver and its performance. PGP keyservers have been developed and operated by volunteers since the 1990s. The keyservers distribute, merge, and expire the OpenPGP public keys. Major keyserver managers from several countries have built the globally distributed network of PGP keyservers. However, the current PGP Public Keyserver (pksd) has some limitations. It does not support fully the OpenPGP format so that it is neither expandable nor flexible, without any cluster technology. Finally we introduce the project on the next generation OpenPGP public keyserver called the OpenPKSD, lead by Hironobu Suzuki, one of the authors, and funded by Japanese Information-technology Promotion Agency(IPA).
[ { "version": "v1", "created": "Thu, 7 Aug 2003 16:33:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Yamane", "Shinji", "" ], [ "Wang", "Jiahong", "" ], [ "Suzuki", "Hironobu", "" ], [ "Segawa", "Norihisa", "" ], [ "Murayama", "Yuko", "" ] ]
cs/0308016
P. V. S. Ram Babu
Akshar Bharati, Rajeev Sangal
Collaborative Creation of Digital Content in Indian Languages
null
null
null
null
cs.CL
null
The world is passing through a major revolution called the information revolution, in which information and knowledge is becoming available to people in unprecedented amounts wherever and whenever they need it. Those societies which fail to take advantage of the new technology will be left behind, just like in the industrial revolution. The information revolution is based on two major technologies: computers and communication. These technologies have to be delivered in a COST EFFECTIVE manner, and in LANGUAGES accessible to people. One way to deliver them in cost effective manner is to make suitable technology choices, and to allow people to access through shared resources. This could be done throuch street corner shops (for computer usage, e-mail etc.), schools, community centres and local library centres.
[ { "version": "v1", "created": "Thu, 7 Aug 2003 09:01:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Bharati", "Akshar", "" ], [ "Sangal", "Rajeev", "" ] ]
cs/0308017
P. V. S. Ram Babu
Akshar Bharati, Vineet Chaitanya, Rajeev Sangal
Information Revolution
Published as a keynote lecture in IRIL-99: Information Revolution and Indian Languages, 12-14 Nov 1999
Published as a keynote lecture in IRIL-99: Information Revolution and Indian Languages, 12-14 Nov 1999
null
LTRC-TR007
cs.CL
null
The world is passing through a major revolution called the information revolution, in which information and knowledge is becoming available to people in unprecedented amounts wherever and whenever they need it. Those societies which fail to take advantage of the new technology will be left behind, just like in the industrial revolution. The information revolution is based on two major technologies: computers and communication. These technologies have to be delivered in a COST EFFECTIVE manner, and in LANGUAGES accessible to people. One way to deliver them in cost effective manner is to make suitable technology choices (discussed later), and to allow people to access through shared resources. This could be done throuch street corner shops (for computer usage, e-mail etc.), schools, community centers and local library centres.
[ { "version": "v1", "created": "Thu, 7 Aug 2003 09:17:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Bharati", "Akshar", "" ], [ "Chaitanya", "Vineet", "" ], [ "Sangal", "Rajeev", "" ] ]
cs/0308018
P. V. S. Ram Babu
Akshar Bharati, Vineet Chaitanya, Amba P. Kulkarni, Rajeev Sangal, G Umamaheshwara Rao
Anusaaraka: Overcoming the Language Barrier in India
Published in "Anuvad: Approaches to Translation", Rukmini Bhaya Nair, (editor), Sage, New Delhi, 2001
Published in "Anuvad: Approaches to Translation", Rukmini Bhaya Nair, (editor), Sage, New Delhi, 2001
null
LTRC-TR009
cs.CL
null
The anusaaraka system makes text in one Indian language accessible in another Indian language. In the anusaaraka approach, the load is so divided between man and computer that the language load is taken by the machine, and the interpretation of the text is left to the man. The machine presents an image of the source text in a language close to the target language.In the image, some constructions of the source language (which do not have equivalents) spill over to the output. Some special notation is also devised. The user after some training learns to read and understand the output. Because the Indian languages are close, the learning time of the output language is short, and is expected to be around 2 weeks. The output can also be post-edited by a trained user to make it grammatically correct in the target language. Style can also be changed, if necessary. Thus, in this scenario, it can function as a human assisted translation system. Currently, anusaarakas are being built from Telugu, Kannada, Marathi, Bengali and Punjabi to Hindi. They can be built for all Indian languages in the near future. Everybody must pitch in to build such systems connecting all Indian languages, using the free software model.
[ { "version": "v1", "created": "Thu, 7 Aug 2003 09:24:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bharati", "Akshar", "" ], [ "Chaitanya", "Vineet", "" ], [ "Kulkarni", "Amba P.", "" ], [ "Sangal", "Rajeev", "" ], [ "Rao", "G Umamaheshwara", "" ] ]
cs/0308019
P. V. S. Ram Babu
Akshar Bharati, Vineet Chaitanya, Amba P. Kulkarni, Rajeev Sangal
Language Access: An Information Based Approach
Published in the proceedings of Knowledge Based Computer Systems conference, 2000, Tata McGraw-Hill, New Delhi, Dec. 2000
Published in the proceedings of Knowledge Based Computer Systems Conference, 2000, Tata McGraw Hill, New Delhi 2000
null
LTRC-TR010
cs.CL
null
The anusaaraka system (a kind of machine translation system) makes text in one Indian language accessible through another Indian language. The machine presents an image of the source text in a language close to the target language. In the image, some constructions of the source language (which do not have equivalents in the target language) spill over to the output. Some special notation is also devised. Anusaarakas have been built from five pairs of languages: Telugu,Kannada, Marathi, Bengali and Punjabi to Hindi. They are available for use through Email servers. Anusaarkas follows the principle of substitutibility and reversibility of strings produced. This implies preservation of information while going from a source language to a target language. For narrow subject areas, specialized modules can be built by putting subject domain knowledge into the system, which produce good quality grammatical output. However, it should be remembered, that such modules will work only in narrow areas, and will sometimes go wrong. In such a situation, anusaaraka output will still remain useful.
[ { "version": "v1", "created": "Thu, 7 Aug 2003 09:40:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Bharati", "Akshar", "" ], [ "Chaitanya", "Vineet", "" ], [ "Kulkarni", "Amba P.", "" ], [ "Sangal", "Rajeev", "" ] ]
cs/0308020
P. V. S. Ram Babu
Akshar Bharati, Dipti M Sharma, Vineet Chaitanya, Amba P Kulkarni, Rajeev Sangal, Durgesh D Rao
LERIL : Collaborative Effort for Creating Lexical Resources
[ To appear in Proceedings of Workshop on Language Resources in Asia, along with NLPRS-2001, Tokyo, 27-30 November 2001] Appeared in the Proceedings of Workshop on Language Resources in Asia, along with NLPRS-2001, Tokyo, 27-30 November 2001. Appeared in the proceedings of Workshop on Language Resources in Asia, along with NLPRS-2001, Tokyo, 27-30 November 2001
null
null
LTRC-TR015
cs.CL
null
The paper reports on efforts taken to create lexical resources pertaining to Indian languages, using the collaborative model. The lexical resources being developed are: (1) Transfer lexicon and grammar from English to several Indian languages. (2) Dependencey tree bank of annotated corpora for several Indian languages. The dependency trees are based on the Paninian model. (3) Bilingual dictionary of 'core meanings'.
[ { "version": "v1", "created": "Thu, 7 Aug 2003 10:08:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Bharati", "Akshar", "" ], [ "Sharma", "Dipti M", "" ], [ "Chaitanya", "Vineet", "" ], [ "Kulkarni", "Amba P", "" ], [ "Sangal", "Rajeev", "" ], [ "Rao", "Durgesh D", "" ] ]
cs/0308021
Stephen Vavasis
Stephen Vavasis
A Bernstein-Bezier Sufficient Condition for Invertibility of Polynomial Mapping Functions
null
null
null
null
cs.NA cs.CG
null
We propose a sufficient condition for invertibility of a polynomial mapping function defined on a cube or simplex. This condition is applicable to finite element analysis using curved meshes. The sufficient condition is based on an analysis of the Bernstein-B\'ezier form of the columns of the derivative.
[ { "version": "v1", "created": "Mon, 11 Aug 2003 18:43:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Vavasis", "Stephen", "" ] ]
cs/0308022
Steven Bird
Steven Bird and Gary Simons
Extending Dublin Core Metadata to Support the Description and Discovery of Language Resources
12 pages, 1 figure
Computing and the Humanities, 37 (4), 2003
null
null
cs.CL cs.DL
null
As language data and associated technologies proliferate and as the language resources community expands, it is becoming increasingly difficult to locate and reuse existing resources. Are there any lexical resources for such-and-such a language? What tool works with transcripts in this particular format? What is a good format to use for linguistic data of this type? Questions like these dominate many mailing lists, since web search engines are an unreliable way to find language resources. This paper reports on a new digital infrastructure for discovering language resources being developed by the Open Language Archives Community (OLAC). At the core of OLAC is its metadata format, which is designed to facilitate description and discovery of all kinds of language resources, including data, tools, or advice. The paper describes OLAC metadata, its relationship to Dublin Core metadata, and its dissemination using the metadata harvesting protocol of the Open Archives Initiative.
[ { "version": "v1", "created": "Thu, 14 Aug 2003 23:28:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Bird", "Steven", "" ], [ "Simons", "Gary", "" ] ]
cs/0308024
Steve Fisher
Rob Byrom, Brian Coghlan, Andrew W Cooke, Roney Cordenonsi, Linda Cornwall, Abdeslem Djaoui, Laurence Field, Steve Fisher, Steve Hicks, Stuart Kenny, Jason Leake, James Magowan, Werner Nutt, David O'Callaghan, Norbert Podhorszki, John Ryan, Manish Soni, Paul Taylor, Antony J Wilson
Relational Grid Monitoring Architecture (R-GMA)
Talk given at UK e-Science All-Hands meeting, Nottingham, UK, September 2-4, 2003. 7 pages of LaTeX and 5 PNG figures
null
null
null
cs.DC
null
We describe R-GMA (Relational Grid Monitoring Architecture) which has been developed within the European DataGrid Project as a Grid Information and Monitoring System. Is is based on the GMA from GGF, which is a simple Consumer-Producer model. The special strength of this implementation comes from the power of the relational model. We offer a global view of the information as if each Virtual Organisation had one large relational database. We provide a number of different Producer types with different characteristics; for example some support streaming of information. We also provide combined Consumer/Producers, which are able to combine information and republish it. At the heart of the system is the mediator, which for any query is able to find and connect to the best Producers for the job. We have developed components to allow a measure of inter-working between MDS and R-GMA. We have used it both for information about the grid (primarily to find out about what services are available at any one time) and for application monitoring. R-GMA has been deployed in various testbeds; we describe some preliminary results and experiences of this deployment.
[ { "version": "v1", "created": "Fri, 15 Aug 2003 23:53:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Byrom", "Rob", "" ], [ "Coghlan", "Brian", "" ], [ "Cooke", "Andrew W", "" ], [ "Cordenonsi", "Roney", "" ], [ "Cornwall", "Linda", "" ], [ "Djaoui", "Abdeslem", "" ], [ "Field", "Laurence", "" ], [ "Fisher", "Steve", "" ], [ "Hicks", "Steve", "" ], [ "Kenny", "Stuart", "" ], [ "Leake", "Jason", "" ], [ "Magowan", "James", "" ], [ "Nutt", "Werner", "" ], [ "O'Callaghan", "David", "" ], [ "Podhorszki", "Norbert", "" ], [ "Ryan", "John", "" ], [ "Soni", "Manish", "" ], [ "Taylor", "Paul", "" ], [ "Wilson", "Antony J", "" ] ]
cs/0308025
Andras Lorincz
Andras Lorincz
Controlled hierarchical filtering: Model of neocortical sensory processing
Technical Report, 38 pages, 10 figures
null
null
null
cs.NE cs.AI cs.LG q-bio.NC
null
A model of sensory information processing is presented. The model assumes that learning of internal (hidden) generative models, which can predict the future and evaluate the precision of that prediction, is of central importance for information extraction. Furthermore, the model makes a bridge to goal-oriented systems and builds upon the structural similarity between the architecture of a robust controller and that of the hippocampal entorhinal loop. This generative control architecture is mapped to the neocortex and to the hippocampal entorhinal loop. Implicit memory phenomena; priming and prototype learning are emerging features of the model. Mathematical theorems ensure stability and attractive learning properties of the architecture. Connections to reinforcement learning are also established: both the control network, and the network with a hidden model converge to (near) optimal policy under suitable conditions. Falsifying predictions, including the role of the feedback connections between neocortical areas are made.
[ { "version": "v1", "created": "Sat, 16 Aug 2003 07:31:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Lorincz", "Andras", "" ] ]
cs/0308026
Charles H. Bennett
Charles H. Bennett
Improvements to time bracketed authentication
null
null
null
null
cs.CR cs.CY
null
We describe a collection of techniques whereby audiovisual or other recordings of significant events can be made in a way that hinders falsification, pre-dating, or post-dating by interested parties, even by the makers and operators of the recording equipment. A central feature of these techniques is the interplay between private information, which by its nature is untrustworthy and susceptible to suppression or manipulation by interested parties, and public information, which is too widely known to be manipulated by anyone. While authenticated recordings may be infeasible to falsify, they can be abused in other ways, such as being used for blackmail or harassment; but susceptibility to these abuses can be reduced by encryption and secret sharing.
[ { "version": "v1", "created": "Mon, 18 Aug 2003 19:52:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Bennett", "Charles H.", "" ] ]
cs/0308027
Liam Wagner
Liam Wagner
A Comparison of Secret Sharing Schemes Based on Latin Squares and RSA
null
null
null
null
cs.CR cs.DM math.CO
null
In recent years there has been a great deal of work done on secret sharing scehemes. Secret Sharing Schemes allow for the division of keys so that an authorised set of users may access information. In this paper we wish to present a critical comparison of two of these schemes based on Latin Squares, [Cooper et., al.] and RSA [Shoup]. These two protocols will be examined in terms of their positive and negative aspects of their secuirty.
[ { "version": "v1", "created": "Tue, 19 Aug 2003 07:43:43 GMT" }, { "version": "v2", "created": "Sat, 16 Oct 2004 19:40:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Wagner", "Liam", "" ] ]
cs/0308028
Liam Wagner
Liam Wagner and Stuart McDonald
Finding Traitors in Secure Networks Using Byzantine Agreements
Accepted by International Journal of Network Security
null
null
null
cs.CR cs.DC cs.GT cs.MA
null
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors in such networks. We use the original concept of the Byzantine Generals Problem by Lamport, and the more formal Byzantine Agreement describe by Linial, to nd traitors in secure networks. By applying general fault-tolerance methods to develop a more formal design of secure networks we are able to uncover traitors amongst a group of players. We also propose methods to integrate this system with insecure channels. This new resiliency can be applied to broadcast and peer-to-peer secure communication systems where agents may be traitors or become unreliable due to faults.
[ { "version": "v1", "created": "Tue, 19 Aug 2003 08:42:43 GMT" }, { "version": "v2", "created": "Wed, 1 Oct 2003 14:30:59 GMT" }, { "version": "v3", "created": "Sun, 10 Oct 2004 17:09:47 GMT" }, { "version": "v4", "created": "Sat, 16 Oct 2004 19:25:02 GMT" }, { "version": "v5", "created": "Sun, 5 Feb 2006 12:15:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Wagner", "Liam", "" ], [ "McDonald", "Stuart", "" ] ]
cs/0308029
Fabio Grandi
Fabio Grandi
On Decidability of Expressive Description Logics with Composition of Roles in Number Restrictions
A preliminary version of this paper appeared in Proc. of the 9th Intl' Conf. on Logic for Programming, Artificial Intelligence and Reasoning, LPAR 2002
null
null
CSITE-01-02 (rev. 8/03)
cs.LO
null
Description Logics are knowledge representation formalisms which have been used in a wide range of application domains. Owing to their appealing expressiveness, we consider in this paper extensions of the well-known concept language ALC allowing for number restrictions on complex role expressions. These have been first introduced by Baader and Sattler as ALCN(M) languages, with the adoption of role constructors M subset-of {o,-,And,Or}. In particular, they showed in 1999 that, although ALCN(o) is decidable, the addition of other operators may easily lead to undecidability: in fact, ALCN(o,And) and ALCN(o,-,Or) were proved undecidable. In this work, we further investigate the computational properties of the ALCN family, aiming at narrowing the decidability gap left open by Baader and Sattler's results. In particular, we will show that ALCN(o) extended with inverse roles both in number and in value restrictions becomes undecidable, whereas it can be safely extended with qualified number restrictions without losing decidability.
[ { "version": "v1", "created": "Tue, 19 Aug 2003 12:50:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Grandi", "Fabio", "" ] ]
cs/0308031
Carlos Gershenson
Carlos Gershenson
Artificial Neural Networks for Beginners
tutorial, 8 pages
null
null
null
cs.NE cs.AI
null
The scope of this teaching package is to make a brief induction to Artificial Neural Networks (ANNs) for people who have no previous knowledge of them. We first make a brief introduction to models of networks, for then describing in general terms ANNs. As an application, we explain the backpropagation algorithm, since it is widely used and many other algorithms are derived from it. The user should know algebra and the handling of functions and vectors. Differential calculus is recommendable, but not necessary. The contents of this package should be understood by people with high school education. It would be useful for people who are just curious about what are ANNs, or for people who want to become familiar with them, so when they study them more fully, they will already have clear notions of ANNs. Also, people who only want to apply the backpropagation algorithm without a detailed and formal explanation of it will find this material useful. This work should not be seen as "Nets for dummies", but of course it is not a treatise. Much of the formality is skipped for the sake of simplicity. Detailed explanations and demonstrations can be found in the referred readings. The included exercises complement the understanding of the theory. The on-line resources are highly recommended for extending this brief induction.
[ { "version": "v1", "created": "Wed, 20 Aug 2003 09:40:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
cs/0308033
Peter Turney
Peter D. Turney (National Research Council of Canada)
Coherent Keyphrase Extraction via Web Mining
6 pages, related work available at http://purl.org/peter.turney/
Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence (IJCAI-03), (2003), Acapulco, Mexico, 434-439
null
NRC-46496
cs.LG cs.CL cs.IR
null
Keyphrases are useful for a variety of purposes, including summarizing, indexing, labeling, categorizing, clustering, highlighting, browsing, and searching. The task of automatic keyphrase extraction is to select keyphrases from within the text of a given document. Automatic keyphrase extraction makes it feasible to generate keyphrases for the huge number of documents that do not have manually assigned keyphrases. A limitation of previous keyphrase extraction algorithms is that the selected keyphrases are occasionally incoherent. That is, the majority of the output keyphrases may fit together well, but there may be a minority that appear to be outliers, with no clear semantic relation to the majority or to each other. This paper presents enhancements to the Kea keyphrase extraction algorithm that are designed to increase the coherence of the extracted keyphrases. The approach is to use the degree of statistical association among candidate keyphrases as evidence that they may be semantically related. The statistical association is measured using web mining. Experiments demonstrate that the enhancements improve the quality of the extracted keyphrases. Furthermore, the enhancements are not domain-specific: the algorithm generalizes well when it is trained on one domain (computer science documents) and tested on another (physics documents).
[ { "version": "v1", "created": "Wed, 20 Aug 2003 20:42:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
cs/0308034
Gerardo Iovane
G.Iovane, P.Giordano, C.Iovane, F.Rotulo
Fingerprint based bio-starter and bio-access
4 pages, Proceeding of Automotive 2003, Turin (Italy)
null
null
null
cs.CV
null
In the paper will be presented a safety and security system based on fingerprint technology. The results suggest a new scenario where the new cars can use a fingerprint sensor integrated in car handle to allow access and in the dashboard as starter button.
[ { "version": "v1", "created": "Thu, 21 Aug 2003 10:47:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Iovane", "G.", "" ], [ "Giordano", "P.", "" ], [ "Iovane", "C.", "" ], [ "Rotulo", "F.", "" ] ]
cs/0308035
Gerardo Iovane
G.Iovane, F.S.Tortoriello
IS (Iris Security)
7 pages, Proceeding of NIDays 2003 (Sponsored by National Instruments), Rome (Italy)
null
null
null
cs.CV
null
In the paper will be presented a safety system based on iridology. The results suggest a new scenario where the security problem in supervised and unsupervised areas can be treat with the present system and the iris image recognition.
[ { "version": "v1", "created": "Thu, 21 Aug 2003 10:52:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Iovane", "G.", "" ], [ "Tortoriello", "F. S.", "" ] ]
cs/0308036
Shi Zhou
Shi Zhou and Raul J Mondragon
The Rich-Club Phenomenon In The Internet Topology
To be appeared in the IEEE Communications Letters
IEEE Communications Letters, vol. 8, no. 3, pp.180-182, March 2004.
10.1109/LCOMM.2004.823426
null
cs.NI
null
We show that the Internet topology at the Autonomous System (AS) level has a rich--club phenomenon. The rich nodes, which are a small number of nodes with large numbers of links, are very well connected to each other. The rich--club is a core tier that we measured using the rich--club connectivity and the node--node link distribution. We obtained this core tier without any heuristic assumption between the ASes. The rich--club phenomenon is a simple qualitative way to differentiate between power law topologies and provides a criterion for new network models. To show this, we compared the measured rich--club of the AS graph with networks obtained using the Barab\'asi--Albert (BA) scale--free network model, the Fitness BA model and the Inet--3.0 model.
[ { "version": "v1", "created": "Thu, 21 Aug 2003 11:05:19 GMT" }, { "version": "v2", "created": "Wed, 17 Sep 2003 10:49:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Shi", "" ], [ "Mondragon", "Raul J", "" ] ]
cs/0308037
Gerardo Iovane
G.Iovane
Distributed and Parallel Net Imaging
3 pages, 8 figures, Procedding of NIDays 2003 (sponsored by National Instruments), Rome 2003. Winner (2nd classified) of the price "Best Application of Measurement and Automation
null
null
null
cs.CV astro-ph cs.DC
null
A very complex vision system is developed to detect luminosity variations connected with the discovery of new planets in the Universe. The traditional imaging system can not manage a so large load. A private net is implemented to perform an automatic vision and decision architecture. It lets to carry out an on-line discrimination of interesting events by using two levels of triggers. This system can even manage many Tbytes of data per day. The architecture avails itself of a distributed parallel network system based on a maximum of 256 standard workstations with Microsoft Window as OS.
[ { "version": "v1", "created": "Fri, 22 Aug 2003 10:31:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Iovane", "G.", "" ] ]
cs/0308038
Gerardo Iovane
G.Iovane
Image Analysis in Astronomy for very large vision machine
3 pages, 9 figures, Proceeding of NIWEEK 2002 (sponsored by National Instruments), Austin (Usa), 2002
null
null
null
cs.CV astro-ph cs.DC
null
It is developed a very complex system (hardware/software) to detect luminosity variations connected with the discovery of new planets outside the Solar System. Traditional imaging approaches are very demanding in terms of computing time; then, the implementation of an automatic vision and decision software architecture is presented. It allows to perform an on-line discrimination of interesting events by using two levels of triggers. A fundamental challenge was to work with very large CCD camera (even 16k*16k pixels) in line with very large telescopes. Then, the architecture can use a distributed parallel network system based on a maximum of 256 standard workstations.
[ { "version": "v1", "created": "Fri, 22 Aug 2003 18:47:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Iovane", "G.", "" ] ]
cs/0308039
Andreas Schaale
Andreas Schaale, Carsten Wulf-Mathies, Soenke Lieberam-Schmidt
A new approach to relevancy in Internet searching - the "Vox Populi Algorithm"
9 pages Latex
null
null
null
cs.DS cond-mat.dis-nn cs.IR
null
In this paper we will derive a new algorithm for Internet searching. The main idea of this algorithm is to extend the existing algorithms by a component, which reflects the interests of the users more than existing methods. The "Vox Populi Algorithm" (VPA) creates a feedback from the users to the content of the search index. The information derived from the users query analysis is used to modify the existing crawling algorithms. The VPA controls the distribution of the resources of the crawler. Finally, we also discuss methods of suppressing unwanted content (spam).
[ { "version": "v1", "created": "Sat, 23 Aug 2003 13:34:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Schaale", "Andreas", "" ], [ "Wulf-Mathies", "Carsten", "" ], [ "Lieberam-Schmidt", "Soenke", "" ] ]
cs/0308040
Sanatan Rai
Sanatan Rai
Open source software and peer review
4 pages
null
null
null
cs.SE cs.CY
null
We compare the open source model of software development to peer review in academia.
[ { "version": "v1", "created": "Sat, 23 Aug 2003 21:11:41 GMT" }, { "version": "v2", "created": "Sun, 7 Sep 2003 18:20:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Rai", "Sanatan", "" ] ]
cs/0308041
Andrej Brodnik
Andrej Brodnik and Andreas Nilsson
Static Data Structure for Discrete Advance Bandwidth Reservations on the Internet
null
null
null
IMFM-(2003)-PS-889
cs.DS
null
In this paper we present a discrete data structure for reservations of limited resources. A reservation is defined as a tuple consisting of the time interval of when the resource should be reserved, $I_R$, and the amount of the resource that is reserved, $B_R$, formally $R=\{I_R,B_R\}$. The data structure is similar to a segment tree. The maximum spanning interval of the data structure is fixed and defined in advance. The granularity and thereby the size of the intervals of the leaves is also defined in advance. The data structure is built only once. Neither nodes nor leaves are ever inserted, deleted or moved. Hence, the running time of the operations does not depend on the number of reservations previously made. The running time does not depend on the size of the interval of the reservation either. Let $n$ be the number of leaves in the data structure. In the worst case, the number of touched (i.e. traversed) nodes is in any operation $O(\log n)$, hence the running time of any operation is also $O(\log n)$.
[ { "version": "v1", "created": "Sun, 24 Aug 2003 06:30:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Brodnik", "Andrej", "" ], [ "Nilsson", "Andreas", "" ] ]
cs/0308042
Zsolt Palotai
Zsolt Palotai, Sandor Mandusitz, Andras Lorincz
Centralized reward system gives rise to fast and efficient work sharing for intelligent Internet agents lacking direct communication
null
null
null
null
cs.IR
null
WWW has a scale-free structure where novel information is often difficult to locate. Moreover, Intelligent agents easily get trapped in this structure. Here a novel method is put forth, which turns these traps into information repositories, supplies: We populated an Internet environment with intelligent news foragers. Foraging has its associated cost whereas foragers are rewarded if they detect not yet discovered novel information. The intelligent news foragers crawl by using the estimated long-term cumulated reward, and also have a finite sized memory: the list of most promising supplies. Foragers form an artificial life community: the most successful ones are allowed to multiply, while unsuccessful ones die out. The specific property of this community is that there is no direct communication amongst foragers but the centralized rewarding system. Still, fast division of work is achieved.
[ { "version": "v1", "created": "Wed, 27 Aug 2003 13:32:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Palotai", "Zsolt", "" ], [ "Mandusitz", "Sandor", "" ], [ "Lorincz", "Andras", "" ] ]
cs/0308044
Grigorii Pivovarov
Grigorii Pivovarov and Sergei Trunov
EqRank: A Self-Consistent Equivalence Relation on Graph Vertexes
a kdd cup 2003 submission
null
null
null
cs.DS cs.DL
null
A new method of hierarchical clustering of graph vertexes is suggested. In the method, the graph partition is determined with an equivalence relation satisfying a recursive definition stating that vertexes are equivalent if the vertexes they point to (or vertexes pointing to them) are equivalent. Iterative application of the partitioning yields a hierarchical clustering of graph vertexes. The method is applied to the citation graph of hep-th. The outcome is a two-level classification scheme for the subject field presented in hep-th, and indexing of the papers from hep-th in this scheme. A number of tests show that the classification obtained is adequate.
[ { "version": "v1", "created": "Fri, 29 Aug 2003 13:20:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Pivovarov", "Grigorii", "" ], [ "Trunov", "Sergei", "" ] ]
cs/0309001
Allison Woodruff
Allison Woodruff and Paul M. Aoki
Media Affordances of a Mobile Push-To-Talk Communication Service
20 pages
null
null
null
cs.HC
null
This paper presents an exploratory study of college-age students using two-way, push-to-talk cellular radios. We describe the observed and reported use of cellular radio by the participants, the activities and purposes for which they adopted it, and their responses. We then examine these empirical results using mediated communication theory. Cellular radios have a unique combination of affordances relative to other media used by this age group, including instant messaging (IM) and mobile phones; the results of our analysis do suggest explanations for some observed phenomena but also highlight the counter-intuitive nature of other phenomena. For example, although the radios have many important dissimilarities with IM from the viewpoint of mediated communication theory, the observed use patterns resembled those of IM to a surprising degree.
[ { "version": "v1", "created": "Sun, 31 Aug 2003 20:13:10 GMT" }, { "version": "v2", "created": "Tue, 2 Sep 2003 04:12:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Woodruff", "Allison", "" ], [ "Aoki", "Paul M.", "" ] ]
cs/0309002
Ricardo Galli
Ricardo Galli
El informe NERA analizado
Spanish
null
null
null
cs.CY
null
This is a review of the article "Government Preferences for Promoting Open-Source Software: A Solution in Search of A Problem" by David Evans and Bernard J. Reddy. This report was paid for by Microsoft and put together at its request. Now Microsoft is using it as part of their lobbying campaign in Europe against governments' promotion of Open Source Software. As expected, this article is strongly biased and most of the conclusions are based upon false hypotheses and evidence.
[ { "version": "v1", "created": "Mon, 1 Sep 2003 00:11:19 GMT" }, { "version": "v2", "created": "Thu, 4 Sep 2003 22:28:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Galli", "Ricardo", "" ] ]
cs/0309003
Marco Bozzano
M. Bozzano, G. Delzanno and M. Martelli
Model Checking Linear Logic Specifications
53 pages, 12 figures "Under consideration for publication in Theory and Practice of Logic Programming"
null
null
null
cs.PL cs.SC
null
The overall goal of this paper is to investigate the theoretical foundations of algorithmic verification techniques for first order linear logic specifications. The fragment of linear logic we consider in this paper is based on the linear logic programming language called LO enriched with universally quantified goal formulas. Although LO was originally introduced as a theoretical foundation for extensions of logic programming languages, it can also be viewed as a very general language to specify a wide range of infinite-state concurrent systems. Our approach is based on the relation between backward reachability and provability highlighted in our previous work on propositional LO programs. Following this line of research, we define here a general framework for the bottom-up evaluation of first order linear logic specifications. The evaluation procedure is based on an effective fixpoint operator working on a symbolic representation of infinite collections of first order linear logic formulas. The theory of well quasi-orderings can be used to provide sufficient conditions for the termination of the evaluation of non trivial fragments of first order linear logic.
[ { "version": "v1", "created": "Mon, 1 Sep 2003 09:34:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Bozzano", "M.", "" ], [ "Delzanno", "G.", "" ], [ "Martelli", "M.", "" ] ]
cs/0309004
Bruce Long
Bruce Long
The Structure of Information
5 Pages
null
null
null
cs.LO
null
A formal model of the structure of information is presented in five axioms which define identity, containment, and joins of infons. Joins are shown to be commutative, associative, provide inverses of infons, and, potentially, have many identity elements, two of which are multiplicative and additive. Those two types of join are distributive. The other identity elements are for operators on entwined states. Multiplicative joins correspond to adding or removing new bits to a system while additive joins correspond to a change of state. The order or size of an infon is defined. This groundwork is intended to be used to model continuous and discreet information structures through time, especially in closed systems.
[ { "version": "v1", "created": "Tue, 2 Sep 2003 10:10:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Long", "Bruce", "" ] ]
cs/0309006
Rajgopal Kannan
Rajgopal Kannan
The KR-Benes Network: A Control-Optimal Rearrangeable Permutation Network
18 pages, 11 figures, website http://www.csc.lsu.edu/~rkannan V3: Proved the (previous) Conjecture on Optimality of K-Benes
IEEE Transactions on Computers, Vol. 54, No. 5, pp. 534-544, May 2005.
null
LSU Computer Science Tech Report LSU-CSC-TR03-01
cs.NI cs.CC
null
The Benes network has been used as a rearrangeable network for over 40 years, yet the uniform $N(2 \log N-1)$ control complexity of the $N \times N$ Benes is not optimal for many permutations. In this paper, we present a novel $O(\log N)$ depth rearrangeable network called KR-Benes that is {\it permutation-specific control-optimal}. The KR-Benes routes {\it every} permutation with the minimal control complexity {\it specific} to that permutation and its worst-case complexity for arbitrary permutations is bounded by the Benes; thus it replaces the Benes when considering control complexity/latency. We design the KR-Benes by first constructing a restricted $2 \log K +2$ depth rearrangeable network called $K$-Benes for routing $K$-bounded permutations with control $2N \log K$, $0 \leq K \leq N/4$. We then show that the $N \times N$ Benes network itself (with one additional stage) contains every $K$-Benes network as a subgraph and use this property to construct the KR-Benes network. With regard to the control-optimality of the KR-Benes, we show that any optimal network for rearrangeably routing $K$-bounded permutations must have depth $2 \log K + 2$, and therefore the $K$-Benes (and hence the KR-Benes) is optimal.
[ { "version": "v1", "created": "Sat, 6 Sep 2003 06:19:30 GMT" }, { "version": "v2", "created": "Sat, 1 Nov 2003 02:14:22 GMT" }, { "version": "v3", "created": "Fri, 7 Nov 2003 02:15:07 GMT" }, { "version": "v4", "created": "Mon, 21 Jun 2004 22:25:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Kannan", "Rajgopal", "" ] ]
cs/0309007
Petro M. Gopych
Petro M. Gopych
ROC Curves Within the Framework of Neural Network Assembly Memory Model: Some Analytic Results
Proceedings of the KDS-2003 Conference held in Varna, Bulgaria on June 16-26, 2003, pages 138-146, 5 Figures, 18 references
International Journal on Information Theories & Applications, 2003, vol. 10, no.2, pp.189-197.
null
null
cs.AI cs.IR q-bio.NC q-bio.QM
null
On the basis of convolutional (Hamming) version of recent Neural Network Assembly Memory Model (NNAMM) for intact two-layer autoassociative Hopfield network optimal receiver operating characteristics (ROCs) have been derived analytically. A method of taking into account explicitly a priori probabilities of alternative hypotheses on the structure of information initiating memory trace retrieval and modified ROCs (mROCs, a posteriori probabilities of correct recall vs. false alarm probability) are introduced. The comparison of empirical and calculated ROCs (or mROCs) demonstrates that they coincide quantitatively and in this way intensities of cues used in appropriate experiments may be estimated. It has been found that basic ROC properties which are one of experimental findings underpinning dual-process models of recognition memory can be explained within our one-factor NNAMM.
[ { "version": "v1", "created": "Sun, 7 Sep 2003 20:11:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Gopych", "Petro M.", "" ] ]
cs/0309008
Eli Appleboim
Eli Appleboim, Emil Saucan
Digital Version of Green`s Theorem and its Application to The Coverage Problem in Formal Verification
13 Pages, 6 figures. Submitted to the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
null
null
null
cs.SC
null
We present a novel scheme to the coverage problem, introducing a quantitative way to estimate the interaction between a block and its enviroment.This is achieved by setting a discrete version of Green`s theorem, specially adapted for Model Checking based verification of integrated circuits.This method is best suited for the coverage problem since it enables one to quantify the incompleteness or, on the other hand, the redundancy of a set of rules, describing the model under verification.Moreover this can be done continuously throughout the verification process, thus enabling the user to pinpoint the stages at which incompleteness/redundancy occurs. Although the method is presented locally on a small hardware example, we additionally show its possibility to provide precise coverage estimation also for large scale systems. We compare this method to others by checking it on the same test-cases.
[ { "version": "v1", "created": "Sun, 7 Sep 2003 05:13:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Appleboim", "Eli", "" ], [ "Saucan", "Emil", "" ] ]
cs/0309009
Victor Eliashberg
Victor Eliashberg
What Is Working Memory and Mental Imagery? A Robot that Learns to Perform Mental Computations
31 pages, 16 figures
null
null
null
cs.AI cs.NE
null
This paper goes back to Turing (1936) and treats his machine as a cognitive model (W,D,B), where W is an "external world" represented by memory device (the tape divided into squares), and (D,B) is a simple robot that consists of the sensory-motor devices, D, and the brain, B. The robot's sensory-motor devices (the "eye", the "hand", and the "organ of speech") allow the robot to simulate the work of any Turing machine. The robot simulates the internal states of a Turing machine by "talking to itself." At the stage of training, the teacher forces the robot (by acting directly on its motor centers) to perform several examples of an algorithm with different input data presented on tape. Two effects are achieved: 1) The robot learns to perform the shown algorithm with any input data using the tape. 2) The robot learns to perform the algorithm "mentally" using an "imaginary tape." The model illustrates the simplest concept of a universal learning neurocomputer, demonstrates universality of associative learning as the mechanism of programming, and provides a simplified, but nontrivial neurobiologically plausible explanation of the phenomena of working memory and mental imagery. The model is implemented as a user-friendly program for Windows called EROBOT. The program is available at www.brain0.com/software.html.
[ { "version": "v1", "created": "Mon, 8 Sep 2003 07:31:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Eliashberg", "Victor", "" ] ]
cs/0309010
Ponomarenko
Dima Grigoriev, Ilia Ponomarenko
Homomorphic public-key cryptosystems over groups and rings
null
null
null
null
cs.CR
null
We propose a new homomorphic public-key cryptosystem over arbitrary nonidentity finite group based on the difficulty of the membership problem for groups of integer matrices. Besides, a homomorphic cryptosystem is designed for the first time over finite commutative rings.
[ { "version": "v1", "created": "Mon, 8 Sep 2003 18:08:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Grigoriev", "Dima", "" ], [ "Ponomarenko", "Ilia", "" ] ]
cs/0309011
Agust Egilsson
Agust S. Egilsson and Hakon Gudbjartsson
Indexing of Tables Referencing Complex Structures
12 pages
null
null
null
cs.DB
null
We introduce indexing of tables referencing complex structures such as digraphs and spatial objects, appearing in genetics and other data intensive analysis. The indexing is achieved by extracting dimension schemas from the referenced structures. The schemas and their dimensionality are determined by proper coloring algorithms and the duality between all such schemas and all such possible proper colorings is established. This duality, in turn, provides us with an extensive library of solutions when addressing indexing questions. It is illustrated how to use the schemas, in connection with additional relational database technologies, to optimize queries conditioned on the structural information being referenced. Comparisons using bitmap indexing in the Oracle 9.2i database, on the one hand, and multidimensional clustering in DB2 8.1.2, on the other hand, are used to illustrate the applicability of the indexing to different technology settings. Finally, we illustrate how the indexing can be used to extract low dimensional schemas from a binary interval tree in order to resolve efficiently interval and stabbing queries.
[ { "version": "v1", "created": "Mon, 8 Sep 2003 19:57:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Egilsson", "Agust S.", "" ], [ "Gudbjartsson", "Hakon", "" ] ]
cs/0309012
Luis Rocha
C. Huang, L.M. Rocha
Exploration of RNA Editing and Design of Robust Genetic Algorithms
Proceedings of the 2003 IEEE Congress on Evolutionary Computation. Camberra, Australia, December 2003
null
null
LAUR 03-4314
cs.NE cs.AI nlin.AO q-bio.GN
null
This paper presents our computational methodology using Genetic Algorithms (GA) for exploring the nature of RNA editing. These models are constructed using several genetic editing characteristics that are gleaned from the RNA editing system as observed in several organisms. We have expanded the traditional Genetic Algorithm with artificial editing mechanisms as proposed by (Rocha, 1997). The incorporation of editing mechanisms provides a means for artificial agents with genetic descriptions to gain greater phenotypic plasticity, which may be environmentally regulated. Our first implementations of these ideas have shed some light into the evolutionary implications of RNA editing. Based on these understandings, we demonstrate how to select proper RNA editors for designing more robust GAs, and the results will show promising applications to real-world problems. We expect that the framework proposed will both facilitate determining the evolutionary role of RNA editing in biology, and advance the current state of research in Genetic Algorithms.
[ { "version": "v1", "created": "Tue, 9 Sep 2003 04:25:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "C.", "" ], [ "Rocha", "L. M.", "" ] ]
cs/0309013
Luis Rocha
L.M. Rocha
Semi-metric Behavior in Document Networks and its Application to Recommendation Systems
null
In: Soft Computing Agents: A New Perspective for Dynamic Information Systems. V. Loia (Ed.) International Series Frontiers in Artificial Intelligence and Applications. IOS Press, pp. 137-163, 2002
null
null
cs.IR cond-mat.dis-nn cond-mat.stat-mech cs.AI cs.DL cs.HC cs.MA
null
Recommendation systems for different Document Networks (DN) such as the World Wide Web (WWW) and Digital Libraries, often use distance functions extracted from relationships among documents and keywords. For instance, documents in the WWW are related via a hyperlink network, while documents in bibliographic databases are related by citation and collaboration networks. Furthermore, documents are related to keyterms. The distance functions computed from these relations establish associative networks among items of the DN, referred to as Distance Graphs, which allow recommendation systems to identify relevant associations for individual users. However, modern recommendation systems need to integrate associative data from multiple sources such as different databases, web sites, and even other users. Thus, we are presented with a problem of combining evidence (about associations between items) from different sources characterized by distance functions. In this paper we describe our work on (1) inferring relevant associations from, as well as characterizing, semi-metric distance graphs and (2) combining evidence from different distance graphs in a recommendation system. Regarding (1), we present the idea of semi-metric distance graphs, and introduce ratios to measure semi-metric behavior. We compute these ratios for several DN such as digital libraries and web sites and show that they are useful to identify implicit associations. Regarding (2), we describe an algorithm to combine evidence from distance graphs that uses Evidence Sets, a set structure based on Interval Valued Fuzzy Sets and Dempster-Shafer Theory of Evidence. This algorithm has been developed for a recommendation system named TalkMine.
[ { "version": "v1", "created": "Tue, 9 Sep 2003 05:24:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Rocha", "L. M.", "" ] ]
cs/0309014
Sandor P. Fekete
Esther M. Arkin, Michael A. Bender, Erik D. Demaine, Sandor P. Fekete, Joseph S. B. Mitchell, and Saurabh Sethia
Optimal Covering Tours with Turn Costs
36 pages, 19 figures, 2 tables, Latex; to appear in SIAM Journal on Computing. New version contains more technical details in Sections 4.1, 5.1, 5.2, 5.5, four more figures, four more pages, as well as numerous smaller changes
null
null
null
cs.DS cs.CG
null
We give the first algorithmic study of a class of ``covering tour'' problems related to the geometric Traveling Salesman Problem: Find a polygonal tour for a cutter so that it sweeps out a specified region (``pocket''), in order to minimize a cost that depends mainly on the number of em turns. These problems arise naturally in manufacturing applications of computational geometry to automatic tool path generation and automatic inspection systems, as well as arc routing (``postman'') problems with turn penalties. We prove the NP-completeness of minimum-turn milling and give efficient approximation algorithms for several natural versions of the problem, including a polynomial-time approximation scheme based on a novel adaptation of the m-guillotine method.
[ { "version": "v1", "created": "Tue, 9 Sep 2003 20:16:30 GMT" }, { "version": "v2", "created": "Tue, 21 Jun 2005 08:25:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Arkin", "Esther M.", "" ], [ "Bender", "Michael A.", "" ], [ "Demaine", "Erik D.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Sethia", "Saurabh", "" ] ]
cs/0309015
Dominik Janzing
Dominik Janzing and Daniel Herrmann
Reliable and Efficient Inference of Bayesian Networks from Sparse Data by Statistical Learning Theory
12 pages
null
null
null
cs.LG
null
To learn (statistical) dependencies among random variables requires exponentially large sample size in the number of observed random variables if any arbitrary joint probability distribution can occur. We consider the case that sparse data strongly suggest that the probabilities can be described by a simple Bayesian network, i.e., by a graph with small in-degree \Delta. Then this simple law will also explain further data with high confidence. This is shown by calculating bounds on the VC dimension of the set of those probability measures that correspond to simple graphs. This allows to select networks by structural risk minimization and gives reliability bounds on the error of the estimated joint measure without (in contrast to a previous paper) any prior assumptions on the set of possible joint measures. The complexity for searching the optimal Bayesian networks of in-degree \Delta increases only polynomially in the number of random varibales for constant \Delta and the optimal joint measure associated with a given graph can be found by convex optimization.
[ { "version": "v1", "created": "Wed, 10 Sep 2003 13:56:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Janzing", "Dominik", "" ], [ "Herrmann", "Daniel", "" ] ]
cs/0309016
Liam Wagner
Stuart McDonald and Liam Wagner
Using Simulated Annealing to Calculate the Trembles of Trembling Hand Perfection
To appear in the Proceedings of IEEE Congress on Evolutionary Computation 2003 (CEC'03)
Proceedings of IEEE Congress on Evolutionary Computation 2003, vol.4, pp. 2482-2489
null
null
cs.GT cs.CC cs.DS cs.LG cs.NE q-bio.PE
null
Within the literature on non-cooperative game theory, there have been a number of attempts to propose logorithms which will compute Nash equilibria. Rather than derive a new algorithm, this paper shows that the family of algorithms known as Markov chain Monte Carlo (MCMC) can be used to calculate Nash equilibria. MCMC is a type of Monte Carlo simulation that relies on Markov chains to ensure its regularity conditions. MCMC has been widely used throughout the statistics and optimization literature, where variants of this algorithm are known as simulated annealing. This paper shows that there is interesting connection between the trembles that underlie the functioning of this algorithm and the type of Nash refinement known as trembling hand perfection.
[ { "version": "v1", "created": "Wed, 10 Sep 2003 15:11:44 GMT" } ]
2007-05-23T00:00:00
[ [ "McDonald", "Stuart", "" ], [ "Wagner", "Liam", "" ] ]
cs/0309017
David Renault
David Renault
Enumerating planar locally finite Cayley graphs
19 pages, 6 PostScript figures, 12 embedded PsTricks figures. An additional file (~ 438ko.) containing the figures in appendix might be found at http://www.labri.fr/Perso/~renault/research/pages.ps.gz
null
null
null
cs.DM
null
We characterize the set of planar locally finite Cayley graphs, and give a finite representation of these graphs by a special kind of finite state automata called labeling schemes. As a result, we are able to enumerate and describe all planar locally finite Cayley graphs of a given degree. This analysis allows us to solve the problem of decision of the locally finite planarity for a word-problem-decidable presentation. Keywords: vertex-transitive, Cayley graph, planar graph, tiling, labeling scheme
[ { "version": "v1", "created": "Thu, 11 Sep 2003 09:59:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Renault", "David", "" ] ]
cs/0309019
Atsushi Fujii
Atsushi Fujii and Katunobu Itou
Building a Test Collection for Speech-Driven Web Retrieval
null
Proceedings of the 8th European Conference on Speech Communication and Technology (Eurospeech 2003), pp.1153-1156, Sep. 2003
null
null
cs.CL
null
This paper describes a test collection (benchmark data) for retrieval systems driven by spoken queries. This collection was produced in the subtask of the NTCIR-3 Web retrieval task, which was performed in a TREC-style evaluation workshop. The search topics and document collection for the Web retrieval task were used to produce spoken queries and language models for speech recognition, respectively. We used this collection to evaluate the performance of our retrieval system. Experimental results showed that (a) the use of target documents for language modeling and (b) enhancement of the vocabulary size in speech recognition were effective in improving the system performance.
[ { "version": "v1", "created": "Fri, 12 Sep 2003 12:43:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Itou", "Katunobu", "" ] ]
cs/0309020
Stephan Mertens
Stephan Mertens, Marc Mezard and Riccardo Zecchina
Threshold values of Random K-SAT from the cavity method
38 pages; extended explanations and derivations; this version is going to appear in Random Structures & Algorithms
null
null
null
cs.CC cond-mat.dis-nn cs.DM
null
Using the cavity equations of \cite{mezard:parisi:zecchina:02,mezard:zecchina:02}, we derive the various threshold values for the number of clauses per variable of the random $K$-satisfiability problem, generalizing the previous results to $K \ge 4$. We also give an analytic solution of the equations, and some closed expressions for these thresholds, in an expansion around large $K$. The stability of the solution is also computed. For any $K$, the satisfiability threshold is found to be in the stable region of the solution, which adds further credit to the conjecture that this computation gives the exact satisfiability threshold.
[ { "version": "v1", "created": "Fri, 12 Sep 2003 19:59:10 GMT" }, { "version": "v2", "created": "Thu, 24 Feb 2005 15:35:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Mertens", "Stephan", "" ], [ "Mezard", "Marc", "" ], [ "Zecchina", "Riccardo", "" ] ]
cs/0309021
Atsushi Fujii
Atsushi Fujii, Katunobu Itou, Tomoyosi Akiba, and Tetsuya Ishikawa
A Cross-media Retrieval System for Lecture Videos
null
Proceedings of the 8th European Conference on Speech Communication and Technology (Eurospeech 2003), pp.1149-1152, Sep. 2003
null
null
cs.CL
null
We propose a cross-media lecture-on-demand system, in which users can selectively view specific segments of lecture videos by submitting text queries. Users can easily formulate queries by using the textbook associated with a target lecture, even if they cannot come up with effective keywords. Our system extracts the audio track from a target lecture video, generates a transcription by large vocabulary continuous speech recognition, and produces a text index. Experimental results showed that by adapting speech recognition to the topic of the lecture, the recognition accuracy increased and the retrieval accuracy was comparable with that obtained by human transcription.
[ { "version": "v1", "created": "Sat, 13 Sep 2003 06:54:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Itou", "Katunobu", "" ], [ "Akiba", "Tomoyosi", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/0309022
Thomas Severiens
Christian Thiemann, Michael Schlenker, Thomas Severiens
Proposed Specification of a Distributed XML-Query Network
null
null
null
null
cs.DC cs.IR
null
W3C's XML-Query language offers a powerful instrument for information retrieval on XML repositories. This article describes an implementation of this retrieval in a real world's scenario. Distributed XML-Query processing reduces load on every single attending node to an acceptable level. The network allows every participant to control their computing load themselves. Furthermore XML-repositories may stay at the rights holder, so every Data-Provider can decide, whether to process critical queries or not. If Data-Providers keep redundant information, this distributed network improves reliability of information with duplicates removed.
[ { "version": "v1", "created": "Sat, 13 Sep 2003 19:24:56 GMT" }, { "version": "v2", "created": "Wed, 15 Oct 2003 13:01:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Thiemann", "Christian", "" ], [ "Schlenker", "Michael", "" ], [ "Severiens", "Thomas", "" ] ]
cs/0309024
Carroll Morgan
Annabelle McIver and Carroll Morgan
Results on the quantitative mu-calculus qMu
45 pages, 4 figures
null
null
null
cs.LO cs.GT
null
The mu-calculus is a powerful tool for specifying and verifying transition systems, including those with both demonic and angelic choice; its quantitative generalisation qMu extends that to probabilistic choice. We show that for a finite-state system the logical interpretation of qMu, via fixed-points in a domain of real-valued functions into [0,1], is equivalent to an operational interpretation given as a turn-based gambling game between two players. The logical interpretation provides direct access to axioms, laws and meta-theorems. The operational, game- based interpretation aids the intuition and continues in the more general context to provide a surprisingly practical specification tool. A corollary of our proofs is an extension of Everett's singly-nested games result in the finite turn-based case: we prove well-definedness of the minimax value, and existence of fixed memoriless strategies, for all qMu games/formulae, of arbitrary (including alternating) nesting structure.
[ { "version": "v1", "created": "Mon, 15 Sep 2003 03:35:56 GMT" } ]
2007-05-23T00:00:00
[ [ "McIver", "Annabelle", "" ], [ "Morgan", "Carroll", "" ] ]
cs/0309025
Johan Schubert
Johan Schubert
Evidential Force Aggregation
7 pages, 2 figures
in Proceedings of the Sixth International Conference on Information Fusion (FUSION 2003), pp. 1223-1229, Cairns, Australia, 8-11 July 2003, International Society of Information Fusion, 2003
null
FOI-S-0960-SE
cs.AI
null
In this paper we develop an evidential force aggregation method intended for classification of evidential intelligence into recognized force structures. We assume that the intelligence has already been partitioned into clusters and use the classification method individually in each cluster. The classification is based on a measure of fitness between template and fused intelligence that makes it possible to handle intelligence reports with multiple nonspecific and uncertain propositions. With this measure we can aggregate on a level-by-level basis, starting from general intelligence to achieve a complete force structure with recognized units on all hierarchical levels.
[ { "version": "v1", "created": "Mon, 15 Sep 2003 07:20:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Schubert", "Johan", "" ] ]
cs/0309026
Mark Little
Mark C. Little
A thought experiment on Quantum Mechanics and Distributed Failure Detection
null
null
null
null
cs.DC
null
One of the biggest problems in current distributed systems is that presented by one machine attempting to determine the liveness of another in a timely manner. Unfortunately, the symptoms exhibited by a failed machine can also be the result of other causes, e.g., an overloaded machine or network which drops messages, making it impossible to detect a machine failure with cetainty until that machine recovers. This is a well understood problem and one which has led to a large body of research into failure suspectors: since it is not possible to detect a failure, the best one can do is suspect a failure and program accordingly. However, one machine's suspicions may not be the same as another's; therefore, these algorithms spend a considerable effort in ensuring a consistent view among all available machines of who is suspects of being failed. This paper describes a thought experiment on how quantum mechanics may be used to provide a failure detector that is guaranteed to give both accurate and instantaneous information about the liveness of machines, no matter the distances involved.
[ { "version": "v1", "created": "Mon, 15 Sep 2003 10:43:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Little", "Mark C.", "" ] ]
cs/0309027
Michiel Ronsse
Michiel Ronsse and Koen De Bosschere
Proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003)
Workshop homepage at http://www.elis.UGent.be/aadebug2003/
null
null
null
cs.SE cs.PL
null
Over the past decades automated debugging has seen major achievements. However, as debugging is by necessity attached to particular programming paradigms, the results are scattered. To alleviate this problem, the Automated and Algorithmic Debugging workshop (AADEBUG for short) was organised in 1993 in Link"oping (Sweden). As this workshop proved to be successful, subsequent workshops have been organised in 1995 (Saint-Malo, France), 1997 (again in Link"oping, Sweden) and 2000 (Munich, Germany). In 2003, the workshop is organised in Ghent, Belgium, the proceedings of which you are reading right now.
[ { "version": "v1", "created": "Mon, 15 Sep 2003 14:58:32 GMT" }, { "version": "v2", "created": "Thu, 27 Nov 2003 12:47:27 GMT" }, { "version": "v3", "created": "Tue, 3 Feb 2004 09:58:08 GMT" }, { "version": "v4", "created": "Tue, 21 Dec 2004 14:59:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ronsse", "Michiel", "" ], [ "De Bosschere", "Koen", "" ] ]
cs/0309028
Roberto Bagnara
Fred Mesnard and Roberto Bagnara
cTI: A constraint-based termination inference tool for ISO-Prolog
16 pages, 3 tables, to appear on "Theory and Practice of Logic Programming"
null
null
null
cs.PL
null
We present cTI, the first system for universal left-termination inference of logic programs. Termination inference generalizes termination analysis and checking. Traditionally, a termination analyzer tries to prove that a given class of queries terminates. This class must be provided to the system, for instance by means of user annotations. Moreover, the analysis must be redone every time the class of queries of interest is updated. Termination inference, in contrast, requires neither user annotations nor recomputation. In this approach, terminating classes for all predicates are inferred at once. We describe the architecture of cTI and report an extensive experimental evaluation of the system covering many classical examples from the logic programming termination literature and several Prolog programs of respectable size and complexity.
[ { "version": "v1", "created": "Tue, 16 Sep 2003 07:43:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Mesnard", "Fred", "" ], [ "Bagnara", "Roberto", "" ] ]
cs/0309030
Wolfgang Mayer
Wolfgang Mayer and Markus Stumptner
Model-Based Debugging using Multiple Abstract Models
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE cs.AI
null
This paper introduces an automatic debugging framework that relies on model-based reasoning techniques to locate faults in programs. In particular, model-based diagnosis, together with an abstract interpretation based conflict detection mechanism is used to derive diagnoses, which correspond to possible faults in programs. Design information and partial specifications are applied to guide a model revision process, which allows for automatic detection and correction of structural faults.
[ { "version": "v1", "created": "Wed, 17 Sep 2003 03:49:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Mayer", "Wolfgang", "" ], [ "Stumptner", "Markus", "" ] ]
cs/0309031
Kazutaka Maruyama
Kazutaka Maruyama, Minoru Terada
Timestamp Based Execution Control for C and Java Programs
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE
null
Many programmers have had to deal with an overwritten variable resulting for example from an aliasing problem. The culprit is obviously the last write-access to that memory location before the manifestation of the bug. The usual technique for removing such bugs starts with the debugger by (1) finding the last write and (2) moving the control point of execution back to that time by re-executing the program from the beginning. We wish to automate this. Step (2) is easy if we can somehow mark the last write found in step (1) and control the execution-point to move it back to this time. In this paper we propose a new concept, position, that is, a point in the program execution trace, as needed for step (2) above. The position enables debuggers to automate the control of program execution to support common debugging activities. We have implemented position in C by modifying GCC and in Java with a bytecode transformer. Measurements show that position can be provided with an acceptable amount of overhead.
[ { "version": "v1", "created": "Wed, 17 Sep 2003 06:35:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Maruyama", "Kazutaka", "" ], [ "Terada", "Minoru", "" ] ]