id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0307034 | Pat Morin | Danny Krizanc, Pat Morin and Michiel Smid | Range Mode and Range Median Queries on Lists and Trees | 12 pages, 6 figures | null | null | null | cs.DS | null | We consider algorithms for preprocessing labelled lists and trees so that,
for any two nodes u and v we can answer queries of the form: What is the mode
or median label in the sequence of labels on the path from u to v.
| [
{
"version": "v1",
"created": "Sat, 12 Jul 2003 21:41:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krizanc",
"Danny",
""
],
[
"Morin",
"Pat",
""
],
[
"Smid",
"Michiel",
""
]
] |
cs/0307035 | Pavel Motuzenko | Pavel Motuzenko | Adaptive Domain Model: Dealing With Multiple Attributes of Self-Managing
Distributed Object Systems | 6 pages, 3 figures | null | null | null | cs.AR cs.DC | null | Self-managing software has emerged as modern systems have become more
complex. Some of the distributed object systems may contain thousands of
objects deployed on tens or even hundreds hosts. Development and support of
such systems often costs a lot. To solve this issue the systems, which are
capable supporting multiple self-managing attributes, should be created. In the
paper, the Adaptive domain concept is introduced as an extension to the basic
domain concept to support a generic adaptation environment for building
distributed object systems with multiple self-managing attributes.
| [
{
"version": "v1",
"created": "Sun, 13 Jul 2003 13:01:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Motuzenko",
"Pavel",
""
]
] |
cs/0307036 | Adriana Iamnitchi | Adriana Iamnitchi, Matei Ripeanu, Ian Foster | Small-World File-Sharing Communities | null | null | null | null | cs.DC cond-mat cs.NI | null | Web caches, content distribution networks, peer-to-peer file sharing
networks, distributed file systems, and data grids all have in common that they
involve a community of users who generate requests for shared data. In each
case, overall system performance can be improved significantly if we can first
identify and then exploit interesting structure within a community's access
patterns. To this end, we propose a novel perspective on file sharing based on
the study of the relationships that form among users based on the files in
which they are interested.
We propose a new structure that captures common user interests in data--the
data-sharing graph-- and justify its utility with studies on three
data-distribution systems: a high-energy physics collaboration, the Web, and
the Kazaa peer-to-peer network. We find small-world patterns in the
data-sharing graphs of all three communities. We analyze these graphs and
propose some probable causes for these emergent small-world patterns. The
significance of small-world patterns is twofold: it provides a rigorous support
to intuition and, perhaps most importantly, it suggests ways to design
mechanisms that exploit these naturally emerging patterns.
| [
{
"version": "v1",
"created": "Sun, 13 Jul 2003 18:44:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Iamnitchi",
"Adriana",
""
],
[
"Ripeanu",
"Matei",
""
],
[
"Foster",
"Ian",
""
]
] |
cs/0307038 | Alfred Hero III | Jose Costa and Alfred Hero | Manifold Learning with Geodesic Minimal Spanning Trees | 13 pages, 3 figures | null | null | null | cs.CV cs.LG | null | In the manifold learning problem one seeks to discover a smooth low
dimensional surface, i.e., a manifold embedded in a higher dimensional linear
vector space, based on a set of measured sample points on the surface. In this
paper we consider the closely related problem of estimating the manifold's
intrinsic dimension and the intrinsic entropy of the sample points.
Specifically, we view the sample points as realizations of an unknown
multivariate density supported on an unknown smooth manifold. We present a
novel geometrical probability approach, called the
geodesic-minimal-spanning-tree (GMST), to obtaining asymptotically consistent
estimates of the manifold dimension and the R\'{e}nyi $\alpha$-entropy of the
sample density on the manifold. The GMST approach is striking in its simplicity
and does not require reconstructing the manifold or estimating the multivariate
density of the samples. The GMST method simply constructs a minimal spanning
tree (MST) sequence using a geodesic edge matrix and uses the overall lengths
of the MSTs to simultaneously estimate manifold dimension and entropy. We
illustrate the GMST approach for dimension and entropy estimation of a human
face dataset.
| [
{
"version": "v1",
"created": "Wed, 16 Jul 2003 23:50:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Costa",
"Jose",
""
],
[
"Hero",
"Alfred",
""
]
] |
cs/0307039 | Valdis Vitolins | Valdis Vitolins, Audris Kalnins | Modeling Business | 5 pages, 7 figures, Proceedings of Internation Conference 'Modeling
and Simulation of Business Systems", Vilnius, Lithuania (May 13-14, 2003) | Vitolins Valdis, Audris Kalnins. Modeling Business. Modeling and
Simulation of Business Systems, Kaunas University of Technology Press,
Vilnius, May 13-14, 2003, pp. 215.-220. | null | null | cs.CE | null | Business concepts are studied using a metamodel-based approach, using UML
2.0. The Notation Independent Business concepts metamodel is introduced. The
approach offers a mapping between different business modeling notations which
could be used for bridging BM tools and boosting the MDA approach.
| [
{
"version": "v1",
"created": "Thu, 17 Jul 2003 15:41:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vitolins",
"Valdis",
""
],
[
"Kalnins",
"Audris",
""
]
] |
cs/0307040 | Amar Isli | Amar Isli | Bridging the gap between modal temporal logics and constraint-based QSR
as an ALC(D) spatio-temporalisation with weakly cyclic TBoxes | 58 pages, 7 figures (I have only split each of Figures 1, 2 and 3, as
it appears in the first version, into two figures, so that the number of
figures is now 7 instead of the original 4 -it is expected that the reader
will find the look of the paper better) | null | null | Technical Report FBI-HH-M-311/02, Fachbereich Informatik,
Universitaet Hamburg | cs.AI cs.LO | null | The aim of this work is to provide a family of qualitative theories for
spatial change in general, and for motion of spatial scenes in particular. To
achieve this, we consider a spatio-temporalisation MTALC(D_x), of the
well-known ALC(D) family of Description Logics (DLs) with a concrete domainan.
In particular, the concrete domain D_x is generated by a qualitative spatial
Relation Algebra (RA) x. We show the important result that satisfiability of an
MTALC(D_x) concept with respect to a weakly cyclic TBox is decidable in
nondeterministic exponential time, by reducing it to the emptiness problem of a
weak alternating automaton augmented with spatial constraints, which we show to
remain decidable, although the accepting condition of a run involves,
additionally to the standard case, consistency of a CSP (Constraint
Satisfaction Problem) potentially infinite. The result provides an effective
tableaux-like satisfiability procedure which is discussed.
| [
{
"version": "v1",
"created": "Thu, 17 Jul 2003 14:46:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Isli",
"Amar",
""
]
] |
cs/0307041 | Vince Grolmusz | Vince Grolmusz | High-density and Secure Data Transmission via Linear Combinations | Preliminary version | null | null | null | cs.CC cs.AR | null | Suppose that there are $n$ Senders and $n$ Receivers. Our goal is to send
long messages from Sender $i$ to Receiver $i$ such that no other receiver can
retrieve the message intended for Receiver $i$. The task can easily be
completed using $n$ private channels between the pairs. Solutions, using one
channel needs either encryption or switching elements for routing the messages
to their addressee.
The main result of the present work is a description of a network in which
The Senders and the Receivers are connected with only $n^{o(1)}$ channels; the
encoding and de-coding is nothing else just very fast linear combinations of
the message-bits; and there are no switching or routing-elements in the
network, just linear combinations are computed, with fixed connections
(channels or wires).
In the proofs we do not use {\em any} unproven cryptographical or complexity
theoretical assumptions.
| [
{
"version": "v1",
"created": "Thu, 17 Jul 2003 12:10:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grolmusz",
"Vince",
""
]
] |
cs/0307042 | Joseph O'Rourke | Mirela Damian and Joseph O'Rourke | A Note on Objects Built From Bricks without Corners | 5 pages, 3 figures | null | null | null | cs.CG cs.DM | null | We report a small advance on a question raised by Robertson, Schweitzer, and
Wagon in [RSW02]. They constructed a genus-13 polyhedron built from bricks
without corners, and asked whether every genus-0 such polyhedron must have a
corner. A brick is a parallelopiped, and a corner is a brick of degree three or
less in the brick graph. We describe a genus-3 polyhedron built from bricks
with no corner, narrowing the genus gap.
| [
{
"version": "v1",
"created": "Thu, 17 Jul 2003 20:46:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0307043 | Aravind Srinivasan | Aravind Srinivasan | An Extension of the Lovasz Local Lemma, and its Applications to Integer
Programming | 22 pages, preliminary version appeared in the SODA 1996 conference | null | null | null | cs.DS | null | The Lovasz Local Lemma due to Erdos and Lovasz is a powerful tool in proving
the existence of rare events. We present an extension of this lemma, which
works well when the event to be shown to exist is a conjunction of individual
events, each of which asserts that a random variable does not deviate much from
its mean. As applications, we consider two classes of NP-hard integer programs:
minimax and covering integer programs. A key technique, randomized rounding of
linear relaxations, was developed by Raghavan and Thompson to derive good
approximation algorithms for such problems. We use our extension of the Local
Lemma to prove that randomized rounding produces, with non-zero probability,
much better feasible solutions than known before, if the constraint matrices of
these integer programs are column-sparse (e.g., routing using short paths,
problems on hypergraphs with small dimension/degree). This complements certain
well-known results from discrepancy theory. We also generalize the method of
pessimistic estimators due to Raghavan, to obtain constructive (algorithmic)
versions of our results for covering integer programs.
| [
{
"version": "v1",
"created": "Fri, 18 Jul 2003 04:02:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Srinivasan",
"Aravind",
""
]
] |
cs/0307044 | K\^oiti Hasida | Koiti Hasida | The Linguistic DS: Linguisitic Description in MPEG-7 | 40 pages, 4 figures | null | null | null | cs.CL | null | MPEG-7 (Moving Picture Experts Group Phase 7) is an XML-based international
standard on semantic description of multimedia content. This document discusses
the Linguistic DS and related tools. The linguistic DS is a tool, based on the
GDA tag set (http://i-content.org/GDA/tagset.html), for semantic annotation of
linguistic data in or associated with multimedia content. The current document
text reflects `Study of FPDAM - MPEG-7 MDS Extensions' issued in March 2003,
and not most part of MPEG-7 MDS, for which the readers are referred to the
first version of MPEG-7 MDS document available from ISO (http://www.iso.org).
Without that reference, however, this document should be mostly intelligible to
those who are familiar with XML and linguistic theories. Comments are welcome
and will be considered in the standardization process.
| [
{
"version": "v1",
"created": "Sat, 19 Jul 2003 12:24:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hasida",
"Koiti",
""
]
] |
cs/0307045 | Lili Ma | Lili Ma, YangQuan Chen and Kevin L. Moore (Utah State University) | Flexible Camera Calibration Using a New Analytical Radial Undistortion
Formula with Application to Mobile Robot Localization | 6 pages, 2 Postscript figures | null | null | null | cs.CV | null | Most algorithms in 3D computer vision rely on the pinhole camera model
because of its simplicity, whereas virtually all imaging devices introduce
certain amount of nonlinear distortion, where the radial distortion is the most
severe part. Common approach to radial distortion is by the means of polynomial
approximation, which introduces distortion-specific parameters into the camera
model and requires estimation of these distortion parameters. The task of
estimating radial distortion is to find a radial distortion model that allows
easy undistortion as well as satisfactory accuracy. This paper presents a new
radial distortion model with an easy analytical undistortion formula, which
also belongs to the polynomial approximation category. Experimental results are
presented to show that with this radial distortion model, satisfactory accuracy
is achieved. An application of the new radial distortion model is non-iterative
yellow line alignment with a calibrated camera on ODIS, a robot built in our
CSOIS.
| [
{
"version": "v1",
"created": "Sun, 20 Jul 2003 02:35:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ma",
"Lili",
"",
"Utah State University"
],
[
"Chen",
"YangQuan",
"",
"Utah State University"
],
[
"Moore",
"Kevin L.",
"",
"Utah State University"
]
] |
cs/0307046 | Lili Ma | Lili Ma, YangQuan Chen, Kevin L. Moore | A New Analytical Radial Distortion Model for Camera Calibration | 2 Postscript figures | null | null | null | cs.CV | null | Common approach to radial distortion is by the means of polynomial
approximation, which introduces distortion-specific parameters into the camera
model and requires estimation of these distortion parameters. The task of
estimating radial distortion is to find a radial distortion model that allows
easy undistortion as well as satisfactory accuracy. This paper presents a new
radial distortion model with an easy analytical undistortion formula, which
also belongs to the polynomial approximation category. Experimental results are
presented to show that with this radial distortion model, satisfactory accuracy
is achieved.
| [
{
"version": "v1",
"created": "Sun, 20 Jul 2003 05:18:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ma",
"Lili",
""
],
[
"Chen",
"YangQuan",
""
],
[
"Moore",
"Kevin L.",
""
]
] |
cs/0307047 | Lili Ma | Lili Ma, YangQuan Chen, Kevin L. Moore | Rational Radial Distortion Models with Analytical Undistortion Formulae | 6 pages | null | null | null | cs.CV | null | The common approach to radial distortion is by the means of polynomial
approximation, which introduces distortion-specific parameters into the camera
model and requires estimation of these distortion parameters. The task of
estimating radial distortion is to find a radial distortion model that allows
easy undistortion as well as satisfactory accuracy. This paper presents a new
class of rational radial distortion models with easy analytical undistortion
formulae. Experimental results are presented to show that with this class of
rational radial distortion models, satisfactory and comparable accuracy is
achieved.
| [
{
"version": "v1",
"created": "Sun, 20 Jul 2003 05:54:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ma",
"Lili",
""
],
[
"Chen",
"YangQuan",
""
],
[
"Moore",
"Kevin L.",
""
]
] |
cs/0307048 | Amar Isli | Amar Isli | Integrating cardinal direction relations and other orientation relations
in Qualitative Spatial Reasoning | Includes new material, such as a section on the use of the work in
the concrete domain of the ALC(D) spatio-temporalisation defined in
http://arXiv.org/abs/cs.AI/0307040 | null | null | Technical report FBI-HH-M-304/01, Fachbereich Informatik,
Universitaet Hamburg | cs.AI | null | We propose a calculus integrating two calculi well-known in Qualitative
Spatial Reasoning (QSR): Frank's projection-based cardinal direction calculus,
and a coarser version of Freksa's relative orientation calculus. An original
constraint propagation procedure is presented, which implements the interaction
between the two integrated calculi. The importance of taking into account the
interaction is shown with a real example providing an inconsistent knowledge
base, whose inconsistency (a) cannot be detected by reasoning separately about
each of the two components of the knowledge, just because, taken separately,
each is consistent, but (b) is detected by the proposed algorithm, thanks to
the interaction knowledge propagated from each of the two compnents to the
other.
| [
{
"version": "v1",
"created": "Mon, 21 Jul 2003 13:03:19 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Oct 2004 15:45:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Isli",
"Amar",
""
]
] |
cs/0307049 | Christian Rossi | Vincent Guirardel | Limit groups and groups acting freely on $\bbR^n$-trees | null | null | null | null | cs.DL | null | We give a simple proof of the finite presentation of Sela's limit groups by
using free actions on $\bbR^n$-trees. We first prove that Sela's limit groups
do have a free action on an $\bbR^n$-tree. We then prove that a finitely
generated group having a free action on an $\bbR^n$-tree can be obtained from
free abelian groups and surface groups by a finite sequence of free products
and amalgamations over cyclic groups. As a corollary, such a group is finitely
presented, has a finite classifying space, its abelian subgroups are finitely
generated and contains only finitely many conjugacy classes of non-cyclic
maximal abelian subgroups.
| [
{
"version": "v1",
"created": "Mon, 21 Jul 2003 14:31:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guirardel",
"Vincent",
""
]
] |
cs/0307050 | Amar Isli | Amar Isli | A ternary Relation Algebra of directed lines | 60 pages. Submitted. Technical report mentioned in "Report-no" below
is an earlier version of the work, and its title differs slightly (Reasoning
about relative position of directed lines as a ternary Relation Algebra (RA):
presentation of the RA and of its use in the concrete domain of an
ALC(D)-like description logic) | null | null | Technical report FBI-HH-M-313/02, Fachbereich Informatik,
Universitaet Hamburg | cs.AI | null | We define a ternary Relation Algebra (RA) of relative position relations on
two-dimensional directed lines (d-lines for short). A d-line has two degrees of
freedom (DFs): a rotational DF (RDF), and a translational DF (TDF). The
representation of the RDF of a d-line will be handled by an RA of 2D
orientations, CYC_t, known in the literature. A second algebra, TA_t, which
will handle the TDF of a d-line, will be defined. The two algebras, CYC_t and
TA_t, will constitute, respectively, the translational and the rotational
components of the RA, PA_t, of relative position relations on d-lines: the PA_t
atoms will consist of those pairs <t,r> of a TA_t atom and a CYC_t atom that
are compatible. We present in detail the RA PA_t, with its converse table, its
rotation table and its composition tables. We show that a (polynomial)
constraint propagation algorithm, known in the literature, is complete for a
subset of PA_t relations including almost all of the atomic relations. We will
discuss the application scope of the RA, which includes incidence geometry, GIS
(Geographic Information Systems), shape representation, localisation in
(multi-)robot navigation, and the representation of motion prepositions in NLP
(Natural Language Processing). We then compare the RA to existing ones, such as
an algebra for reasoning about rectangles parallel to the axes of an
(orthogonal) coordinate system, a ``spatial Odyssey'' of Allen's interval
algebra, and an algebra for reasoning about 2D segments.
| [
{
"version": "v1",
"created": "Mon, 21 Jul 2003 16:01:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Isli",
"Amar",
""
]
] |
cs/0307051 | Lili Ma | Lili Ma, YangQuan Chen, Kevin L. Moore | An Analytical Piecewise Radial Distortion Model for Precision Camera
Calibration | 6 pages, 6 PostScript figures | null | null | null | cs.CV | null | The common approach to radial distortion is by the means of polynomial
approximation, which introduces distortion-specific parameters into the camera
model and requires estimation of these distortion parameters. The task of
estimating radial distortion is to find a radial distortion model that allows
easy undistortion as well as satisfactory accuracy. This paper presents a new
piecewise radial distortion model with easy analytical undistortion formula.
The motivation for seeking a piecewise radial distortion model is that, when a
camera is resulted in a low quality during manufacturing, the nonlinear radial
distortion can be complex. Using low order polynomials to approximate the
radial distortion might not be precise enough. On the other hand, higher order
polynomials suffer from the inverse problem. With the new piecewise radial
distortion function, more flexibility is obtained and the radial undistortion
can be performed analytically. Experimental results are presented to show that
with this new piecewise radial distortion model, better performance is achieved
than that using the single function. Furthermore, a comparable performance with
the conventional polynomial model using 2 coefficients can also be
accomplished.
| [
{
"version": "v1",
"created": "Mon, 21 Jul 2003 16:30:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ma",
"Lili",
""
],
[
"Chen",
"YangQuan",
""
],
[
"Moore",
"Kevin L.",
""
]
] |
cs/0307052 | Rajkumar Buyya | Hussein Gibbins and Rajkumar Buyya | Gridscape: A Tool for the Creation of Interactive and Dynamic Grid
Testbed Web Portals | 12 pages, 6 figures | null | null | July 2003 Research Report, GRIDS Lab @ The University of Melbourne | cs.DC | null | The notion of grid computing has gained an increasing popularity recently as
a realistic solution to many of our large-scale data storage and processing
needs. It enables the sharing, selection and aggregation of resources
geographically distributed across collaborative organisations. Now more and
more people are beginning to embrace grid computing and thus are seeing the
need to set up their own grids and grid testbeds. With this comes the need to
have some means to enable them to view and monitor the status of the resources
in these testbeds (eg. Web based Grid portal). Generally developers invest a
substantial amount of time and effort developing custom monitoring software. To
overcome this limitation, this paper proposes Gridscape ? a tool that enables
the rapid creation of interactive and dynamic testbed portals (without any
programming effort). Gridscape primarily aims to provide a solution for those
users who need to be able to create a grid testbed portal but don?t necessarily
have the time or resources to build a system of their own from scratch.
| [
{
"version": "v1",
"created": "Tue, 22 Jul 2003 12:27:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gibbins",
"Hussein",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0307053 | Vito Antonelli | P. Aliani, V. Antonelli, M. Picariello, Emilio Torrente-Lujan | Hamevol1.0: a C++ code for differential equations based on Runge-Kutta
algorithm. An application to matter enhanced neutrino oscillation | 18 pages, Latex | null | null | IFUM-841-FT; CERN-TH-03-101 ; FT-UM-TH-03-06 | cs.CE | null | We present a C++ implementation of a fifth order semi-implicit Runge-Kutta
algorithm for solving Ordinary Differential Equations. This algorithm can be
used for studying many different problems and in particular it can be applied
for computing the evolution of any system whose Hamiltonian is known. We
consider in particular the problem of calculating the neutrino oscillation
probabilities in presence of matter interactions. The time performance and the
accuracy of this implementation is competitive with respect to the other
analytical and numerical techniques used in literature. The algorithm design
and the salient features of the code are presented and discussed and some
explicit examples of code application are given.
| [
{
"version": "v1",
"created": "Wed, 23 Jul 2003 19:30:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aliani",
"P.",
""
],
[
"Antonelli",
"V.",
""
],
[
"Picariello",
"M.",
""
],
[
"Torrente-Lujan",
"Emilio",
""
]
] |
cs/0307054 | Mihai V. Putz | Viorel Putz and Mihai V. Putz | Contributions to the Development and Improvement of a Regulatory and
Pre-Regulatory Digitally System for the Tools within Flexible Fabrication
Systems | 5 pages, 3 figures | null | null | null | cs.CE cs.SE | null | The paper reports the obtained results for the projection and realization of
a digitally system aiming to assist the equipment for a regulatory and
pre-regulatory tools and holding tools within the flexible fabrication systems
(FFS). Moreover, based on the present results, the same methodology can be
applied for assisting tools from the point of view of their integrity and to
wear compensation in the FFS framework.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2003 14:01:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Putz",
"Viorel",
""
],
[
"Putz",
"Mihai V.",
""
]
] |
cs/0307055 | Peter Turney | Peter D. Turney (National Research Council of Canada), Michael L.
Littman (Rutgers University) | Learning Analogies and Semantic Relations | 28 pages, issued 2003 | null | null | NRC-46488 | cs.LG cs.CL cs.IR | null | We present an algorithm for learning from unlabeled text, based on the Vector
Space Model (VSM) of information retrieval, that can solve verbal analogy
questions of the kind found in the Scholastic Aptitude Test (SAT). A verbal
analogy has the form A:B::C:D, meaning "A is to B as C is to D"; for example,
mason:stone::carpenter:wood. SAT analogy questions provide a word pair, A:B,
and the problem is to select the most analogous word pair, C:D, from a set of
five choices. The VSM algorithm correctly answers 47% of a collection of 374
college-level analogy questions (random guessing would yield 20% correct). We
motivate this research by relating it to work in cognitive science and
linguistics, and by applying it to a difficult problem in natural language
processing, determining semantic relations in noun-modifier pairs. The problem
is to classify a noun-modifier pair, such as "laser printer", according to the
semantic relation between the noun (printer) and the modifier (laser). We use a
supervised nearest-neighbour algorithm that assigns a class to a given
noun-modifier pair by finding the most analogous noun-modifier pair in the
training data. With 30 classes of semantic relations, on a collection of 600
labeled noun-modifier pairs, the learning algorithm attains an F value of 26.5%
(random guessing: 3.3%). With 5 classes of semantic relations, the F value is
43.2% (random: 20%). The performance is state-of-the-art for these challenging
problems.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2003 21:09:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
],
[
"Littman",
"Michael L.",
"",
"Rutgers University"
]
] |
cs/0307056 | Joseph Y. Halpern | Fahiem Bacchus, Adam Grove, Joseph Y. Halpern, and Daphne Koller | From Statistical Knowledge Bases to Degrees of Belief | null | Artificial Intelligence 87:1-2, 1996, pp. 75-143 | null | null | cs.AI | null | An intelligent agent will often be uncertain about various properties of its
environment, and when acting in that environment it will frequently need to
quantify its uncertainty. For example, if the agent wishes to employ the
expected-utility paradigm of decision theory to guide its actions, it will need
to assign degrees of belief (subjective probabilities) to various assertions.
Of course, these degrees of belief should not be arbitrary, but rather should
be based on the information available to the agent. This paper describes one
approach for inducing degrees of belief from very rich knowledge bases, that
can include information about particular individuals, statistical correlations,
physical laws, and default rules. We call our approach the random-worlds
method. The method is based on the principle of indifference: it treats all of
the worlds the agent considers possible as being equally likely. It is able to
integrate qualitative default reasoning with quantitative probabilistic
reasoning by providing a language in which both types of information can be
easily expressed. Our results show that a number of desiderata that arise in
direct inference (reasoning from statistical information to conclusions about
individuals) and default reasoning follow directly {from} the semantics of
random worlds. For example, random worlds captures important patterns of
reasoning such as specificity, inheritance, indifference to irrelevant
information, and default assumptions of independence. Furthermore, the
expressive power of the language used and the intuitive semantics of random
worlds allow the method to deal with problems that are beyond the scope of many
other non-deductive reasoning systems.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2003 21:32:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bacchus",
"Fahiem",
""
],
[
"Grove",
"Adam",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Koller",
"Daphne",
""
]
] |
cs/0307057 | Joseph Y. Halpern | Kevin R. O'Neill and Joseph Y. Halpern | Secrecy in Multiagent Systems | This is an extended version of a paper that appears in the
Proceedings of the 15th IEEE Computer Security Foundations Workshop}, 2002,
pp. 32-46 | null | null | null | cs.CR cs.LO | null | We introduce a general framework for reasoning about secrecy and privacy
requirements in multiagent systems. Our definitions extend earlier definitions
of secrecy and nondeducibility given by Shannon and Sutherland. Roughly
speaking, one agent maintains secrecy with respect to another if the second
agent cannot rule out any possibilities for the behavior or state of the first
agent. We show that the framework can handle probability and nondeterminism in
a clean way, is useful for reasoning about asynchronous systems as well as
synchronous systems, and suggests generalizations of secrecy that may be useful
for dealing with issues such as resource-bounded reasoning. We also show that a
number of well-known attempts to characterize the absence of information flow
are special cases of our definitions of secrecy.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2003 22:22:47 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Mar 2005 20:59:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Neill",
"Kevin R.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0307058 | Raimondas Lencevicius | Edu Metz, Raimondas Lencevicius | Efficient Instrumentation for Performance Profiling | 3 pages, 1 figure, published in proceedings of WODA'2003, ICSE
Workshop on Dynamic Analysis | null | null | null | cs.PF cs.SE | null | Performance profiling consists of tracing a software system during execution
and then analyzing the obtained traces. However, traces themselves affect the
performance of the system distorting its execution. Therefore, there is a need
to minimize the effect of the tracing on the underlying system's performance.
To achieve this, the trace set needs to be optimized according to the
performance profiling problem being solved. Our position is that such
minimization can be achieved only by adding the software trace design and
implementation to the overall software development process. In such a process,
the performance analyst supplies the knowledge of performance measurement
requirements, while the software developer supplies the knowledge of the
software. Both of these are needed for an optimal trace placement.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2003 21:45:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Metz",
"Edu",
""
],
[
"Lencevicius",
"Raimondas",
""
]
] |
cs/0307060 | J. G. Wolff | J. Gerard Wolff | Neural realisation of the SP theory: cell assemblies revisited | This is a radical revision with new content which is shorter and, I
hope, clearer | null | null | null | cs.AI cs.NE | null | This paper describes how the elements of the SP theory (Wolff, 2003a) may be
realised with neural structures and processes. To the extent that this is
successful, the insights that have been achieved in the SP theory - the
integration and simplification of a range of phenomena in perception and
cognition - may be incorporated in a neural view of brain function.
These proposals may be seen as a development of Hebb's (1949) concept of a
'cell assembly'. By contrast with that concept and variants of it, the version
described in this paper proposes that any one neuron can belong in one assembly
and only one assembly. A distinctive feature of the present proposals is that
any neuron or cluster of neurons within a cell assembly may serve as a proxy or
reference for another cell assembly or class of cell assemblies. This device
provides solutions to many of the problems associated with cell assemblies, it
allows information to be stored in a compressed form, and it provides a robust
mechanism by which assemblies may be connected to form hierarchies, grammars
and other kinds of knowledge structure.
Drawing on insights derived from the SP theory, the paper also describes how
unsupervised learning may be achieved with neural structures and processes.
This theory of learning overcomes weaknesses in the Hebbian concept of learning
and it is, at the same time, compatible with the observations that Hebb's
theory was designed to explain.
| [
{
"version": "v1",
"created": "Sun, 27 Jul 2003 22:53:12 GMT"
},
{
"version": "v2",
"created": "Thu, 13 May 2004 10:16:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolff",
"J. Gerard",
""
]
] |
cs/0307061 | Wen Chen | W. Chen | Boundary knot method for Laplace and biharmonic problems | Welcome any comments to [email protected] | null | null | Proc. of the 14th Nordic Seminar on Computational Mechanics, pp.
117-120, Lund, Sweden, Oct. 2001 | cs.CE cs.MS | null | The boundary knot method (BKM) [1] is a meshless boundary-type radial basis
function (RBF) collocation scheme, where the nonsingular general solution is
used instead of fundamental solution to evaluate the homogeneous solution,
while the dual reciprocity method (DRM) is employed to approximation of
particular solution. Despite the fact that there are not nonsingular RBF
general solutions available for Laplace and biharmonic problems, this study
shows that the method can be successfully applied to these problems. The
high-order general and fundamental solutions of Burger and Winkler equations
are also first presented here.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2003 09:35:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] |
cs/0307062 | Viviane Baladi | Viviane Baladi and Brigitte Vallee | Euclidean algorithms are Gaussian | fourth revised version - 2 figures - the strict convexity condition
used has been clarified | null | null | null | cs.DS cs.CC | null | This study provides new results about the probabilistic behaviour of a class
of Euclidean algorithms: the asymptotic distribution of a whole class of
cost-parameters associated to these algorithms is normal. For the cost
corresponding to the number of steps Hensley already has proved a Local Limit
Theorem; we give a new proof, and extend his result to other euclidean
algorithms and to a large class of digit costs, obtaining a faster, optimal,
rate of convergence. The paper is based on the dynamical systems methodology,
and the main tool is the transfer operator. In particular, we use recent
results of Dolgopyat.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2003 10:31:53 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Sep 2003 13:30:45 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Oct 2003 14:21:38 GMT"
},
{
"version": "v4",
"created": "Wed, 5 May 2004 16:00:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baladi",
"Viviane",
""
],
[
"Vallee",
"Brigitte",
""
]
] |
cs/0307063 | J. G. Wolff | J Gerard Wolff | An Alternative to RDF-Based Languages for the Representation and
Processing of Ontologies in the Semantic Web | null | null | null | null | cs.AI | null | This paper describes an approach to the representation and processing of
ontologies in the Semantic Web, based on the ICMAUS theory of computation and
AI. This approach has strengths that complement those of languages based on the
Resource Description Framework (RDF) such as RDF Schema and DAML+OIL. The main
benefits of the ICMAUS approach are simplicity and comprehensibility in the
representation of ontologies, an ability to cope with errors and uncertainties
in knowledge, and a versatile reasoning system with capabilities in the kinds
of probabilistic reasoning that seem to be required in the Semantic Web.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2003 11:13:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolff",
"J Gerard",
""
]
] |
cs/0307064 | Magnus Boman | Magnus Boman and Anna Sandin | Implementing an Agent Trade Server | 14 pages, 7 figures, intended for B/W printing | null | null | null | cs.CE | null | An experimental server for stock trading autonomous agents is presented and
made available, together with an agent shell for swift development. The server,
written in Java, was implemented as proof-of-concept for an agent trade server
for a real financial exchange.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2003 12:58:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boman",
"Magnus",
""
],
[
"Sandin",
"Anna",
""
]
] |
cs/0307065 | Stanimire Tomov | Stanimire Tomov (1), Robert Bennett (1), Michael McGuigan (1), Arnold
Peskin (1), Gordon Smith (1), John Spiletic (1) ((1) Brookhaven National
Laboratory) | Application of interactive parallel visualization for commodity-based
clusters using visualization APIs | 12 pages, 4 figures | null | null | null | cs.GR | null | We present an efficient and inexpensive to develop application for
interactive high-performance parallel visualization. We extend popular APIs
such as Open Inventor and VTK to support commodity-based cluster visualization.
Our implementation follows a standard master/slave concept: the general idea is
to have a ``Master'' node, which will intercept a sequential graphical user
interface (GUI) and broadcast it to the ``Slave'' nodes. The interactions
between the nodes are implemented using MPI. The parallel remote rendering uses
Chromium. This paper is mainly the report of our implementation experiences. We
present in detail the proposed model and key aspects of its implementation.
Also, we present performance measurements, we benchmark and quantitatively
demonstrate the dependence of the visualization speed on the data size and the
network bandwidth, and we identify the singularities and draw conclusions on
Chromium's sort-first rendering architecture. The most original part of this
work is the combined use of Open Inventor and Chromium.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2003 13:40:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tomov",
"Stanimire",
""
],
[
"Bennett",
"Robert",
""
],
[
"McGuigan",
"Michael",
""
],
[
"Peskin",
"Arnold",
""
],
[
"Smith",
"Gordon",
""
],
[
"Spiletic",
"John",
""
]
] |
cs/0307067 | C. F. M. Vermeulen | C.F.M. Vermeulen | Sound search in a denotational semantics for first order logic | To appear in print shortly in the Progress in Computer Science Series
of Novapublications | null | null | null | cs.LO | null | In this paper we adapt the definitions and results from Apt and Vermeulen on
`First order logic as a constraint programming language' (in: Proceedings of
LPAR2001, Baaz and Voronkov (eds.), Springer LNAI 2514) to include important
ideas about search and choice into the system. We give motivating examples.
Then we set up denotational semantics for first order logic as follows: the
semantic universe includes states that consist of two components: a
substitution, which can be seen as the computed answer; and a constraint
satisfaction problem, which can be seen as the residue of the original problem,
yet to be handled by constraint programming. The interaction between these
components is regulated by an operator called: infer. In this paper we regard
infer as an operator on sets of states to enable us to analyze ideas about
search among states and choice between states.
The precise adaptations of definitions and results are able to deal with the
examples and we show that, given several reasonable conditions, the new
definitions ensure soundness of the system with respect to the standard
interpretation of first order logic. In this way the `reasonable conditions'
can be read as conditions for sound search.
We indicate briefly how to investigate efficiency of search in future
research.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2003 13:57:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vermeulen",
"C. F. M.",
""
]
] |
cs/0307068 | Jonathan Bowen | Jonathan P. Bowen | Web Access to Cultural Heritage for the Disabled | 10 pages, see http://www.museophile.sbu.ac.uk/pub/jpb/eva2003.pdf | Jonathan P. Bowen, Web Access to Cultural Heritage for the
Disabled. In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2003
London Conference Proceedings, University College London, UK, 22-26 July
2003, pages s1:1-11. Keynote address. ISBN 0-9543146-3-8 | null | null | cs.CY cs.HC cs.IR | null | Physical disabled access is something that most cultural institutions such as
museums consider very seriously. Indeed, there are normally legal requirements
to do so. However, online disabled access is still a relatively novel and
developing field. Many cultural organizations have not yet considered the
issues in depth and web developers are not necessarily experts either. The
interface for websites is normally tested with major browsers, but not with
specialist software like text to audio converters for the blind or against the
relevant accessibility and validation standards. We consider the current state
of the art in this area, especially with respect to aspects of particular
importance to the access of cultural heritage.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2003 18:37:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bowen",
"Jonathan P.",
""
]
] |
cs/0307069 | Joseph Y. Halpern | Joseph Y. Halpern and Riccardo Pucella | A logic for reasoning about upper probabilities | A preliminary version of this paper appeared in Proc. of the 17th
Conference on Uncertainty in AI, 2001 | Journal of AI Research 17, 2001, pp. 57-81 | null | null | cs.AI cs.LO | null | We present a propositional logic %which can be used to reason about the
uncertainty of events, where the uncertainty is modeled by a set of probability
measures assigning an interval of probability to each event. We give a sound
and complete axiomatization for the logic, and show that the satisfiability
problem is NP-complete, no harder than satisfiability for propositional logic.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2003 21:08:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
cs/0307070 | Joseph Y. Halpern | Nir Friedman and Joseph Y. Halpern | Modeling Belief in Dynamic Systems, Part I: Foundations | null | Aritificial Intelligence 95:2, 1997, pp. 257-316 | null | null | cs.AI cs.LO | null | Belief change is a fundamental problem in AI: Agents constantly have to
update their beliefs to accommodate new observations. In recent years, there
has been much work on axiomatic characterizations of belief change. We claim
that a better understanding of belief change can be gained from examining
appropriate semantic models. In this paper we propose a general framework in
which to model belief change. We begin by defining belief in terms of knowledge
and plausibility: an agent believes p if he knows that p is more plausible than
its negation. We then consider some properties defining the interaction between
knowledge and plausibility, and show how these properties affect the properties
of belief. In particular, we show that by assuming two of the most natural
properties, belief becomes a KD45 operator. Finally, we add time to the
picture. This gives us a framework in which we can talk about knowledge,
plausibility (and hence belief), and time, which extends the framework of
Halpern and Fagin for modeling knowledge in multi-agent systems. We then
examine the problem of ``minimal change''. This notion can be captured by using
prior plausibilities, an analogue to prior probabilities, which can be updated
by ``conditioning''. We show by example that conditioning on a plausibility
measure can capture many scenarios of interest. In a companion paper, we show
how the two best-studied scenarios of belief change, belief revisionand belief
update, fit into our framework.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2003 21:36:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedman",
"Nir",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0307071 | Joseph Y. Halpern | Nir Friedman and Joseph Y. Halpern | Modeling Belief in Dynamic Systems, Part II: Revisions and Update | null | Aritificial Intelligence 95:2, 1997, pp. 257-316 | null | null | cs.AI cs.LO | null | The study of belief change has been an active area in philosophy and AI. In
recent years two special cases of belief change, belief revision and belief
update, have been studied in detail. In a companion paper, we introduce a new
framework to model belief change. This framework combines temporal and
epistemic modalities with a notion of plausibility, allowing us to examine the
change of beliefs over time. In this paper, we show how belief revision and
belief update can be captured in our framework. This allows us to compare the
assumptions made by each method, and to better understand the principles
underlying them. In particular, it shows that Katsuno and Mendelzon's notion of
belief update depends on several strong assumptions that may limit its
applicability in artificial intelligence. Finally, our analysis allow us to
identify a notion of minimal change that underlies a broad range of belief
change operations including revision and update.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2003 21:51:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedman",
"Nir",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0307073 | Richard Wheeldon | Richard Wheeldon, Mark Levene and Kevin Keenoy | Search and Navigation in Relational Databases | 12 pages, 7 figures | null | null | null | cs.DB | null | We present a new application for keyword search within relational databases,
which uses a novel algorithm to solve the join discovery problem by finding
Memex-like trails through the graph of foreign key dependencies. It differs
from previous efforts in the algorithms used, in the presentation mechanism and
in the use of primary-key only database queries at query-time to maintain a
fast response for users. We present examples using the DBLP data set.
| [
{
"version": "v1",
"created": "Thu, 31 Jul 2003 11:18:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wheeldon",
"Richard",
""
],
[
"Levene",
"Mark",
""
],
[
"Keenoy",
"Kevin",
""
]
] |
cs/0308001 | Jan Van den Bussche | Floris Geerts, Lieven Smits, Jan Van den Bussche | Two- versus three-dimensional connectivity testing of first-order
queries to semi-algebraic sets | corrected minor confusion in Proof of Theorem 1 | A revised version has been published online (21 July 2005) in Acta
Informatica under the title "N- versus (N-1)-dimensional connectivity testing
of first-order queries to semi-algebraic sets" | 10.1007/s00236-005-0171-5 | null | cs.LO cs.CG cs.DB | null | This paper addresses the question whether one can determine the connectivity
of a semi-algebraic set in three dimensions by testing the connectivity of a
finite number of two-dimensional ``samples'' of the set, where these samples
are defined by first-order queries. The question is answered negatively for two
classes of first-order queries: cartesian-product-free, and positive one-pass.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2003 00:59:41 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Aug 2003 21:44:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Geerts",
"Floris",
""
],
[
"Smits",
"Lieven",
""
],
[
"Bussche",
"Jan Van den",
""
]
] |
cs/0308002 | Aleks Jakulin | Aleks Jakulin and Ivan Bratko | Quantifying and Visualizing Attribute Interactions | 30 pages, 11 figures. Changes from v2: improved bibliography | null | null | null | cs.AI | null | Interactions are patterns between several attributes in data that cannot be
inferred from any subset of these attributes. While mutual information is a
well-established approach to evaluating the interactions between two
attributes, we surveyed its generalizations as to quantify interactions between
several attributes. We have chosen McGill's interaction information, which has
been independently rediscovered a number of times under various names in
various disciplines, because of its many intuitively appealing properties. We
apply interaction information to visually present the most important
interactions of the data. Visualization of interactions has provided insight
into the structure of data on a number of domains, identifying redundant
attributes and opportunities for constructing new features, discovering
unexpected regularities in data, and have helped during construction of
predictive models; we illustrate the methods on numerous examples. A machine
learning method that disregards interactions may get caught in two traps:
myopia is caused by learning algorithms assuming independence in spite of
interactions, whereas fragmentation arises from assuming an interaction in
spite of independence.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2003 10:50:07 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Nov 2003 13:07:12 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Mar 2004 12:57:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jakulin",
"Aleks",
""
],
[
"Bratko",
"Ivan",
""
]
] |
cs/0308004 | Gene Cooperman | Gene Cooperman, Xiaoqin Ma and Viet Ha Nguyen | DPG: A Cache-Efficient Accelerator for Sorting and for Join Operators | 12 pages, 11 figures | null | null | null | cs.DB cs.DS | null | We present a new algorithm for fast record retrieval,
distribute-probe-gather, or DPG. DPG has important applications both in sorting
and in joins. Current main memory sorting algorithms split their work into
three phases: extraction of key-pointer pairs; sorting of the key-pointer
pairs; and copying of the original records into the destination array according
the sorted key-pointer pairs. The copying in the last phase dominates today's
sorting time. Hence, the use of DPG in the third phase provides an accelerator
for existing sorting algorithms.
DPG also provides two new join methods for foreign key joins: DPG-move join
and DPG-sort join. The resulting join methods with DPG are faster because DPG
join is cache-efficient and at the same time DPG join avoids the need for
sorting or for hashing. The ideas presented for foreign key join can also be
extended to faster record pair retrieval for spatial and temporal databases.
| [
{
"version": "v1",
"created": "Sat, 2 Aug 2003 08:13:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cooperman",
"Gene",
""
],
[
"Ma",
"Xiaoqin",
""
],
[
"Nguyen",
"Viet Ha",
""
]
] |
cs/0308005 | Jonathan Bowen | Jonathan P. Bowen | Disabled Access for Museum Websites | 2 pages, see
http://www2003.org/cdrom/papers/poster/p335/p335-bowen.html | Jonathan P. Bowen. Disabled Access for Museum Websites. WWW2003:
The Twelfth International World Wide Web Conference, Budapest, Hungary, 20-24
May 2003. Conference poster | null | null | cs.CY cs.HC cs.IR | null | Physical disabled access is something that most museums consider very
seriously. Indeed, there are normally legal requirements to do so. However,
online disabled access is still a relatively novel field. Most museums have not
yet considered the issues in depth. The Human-Computer Interface for their
websites is normally tested with major browsers, but not with specialist
browsers or against the relevant accessibility and validation standards. We
consider the current state of the art in this area and mention an accessibility
survey of some museum websites.
| [
{
"version": "v1",
"created": "Sun, 3 Aug 2003 17:57:24 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Oct 2004 14:02:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bowen",
"Jonathan P.",
""
]
] |
cs/0308006 | Sandor P. Fekete | Sandor P. Fekete and Ekkehard Koehler and Juergen Teich | Higher-Dimensional Packing with Order Constraints | 23 pages, 14 figures, 5 tables, Latex; revision clarifies various
minor points, fixes typos, etc. To appear in SIAM Journal on Discrete
Mathematics | null | null | null | cs.DS cs.DM | null | We present a first exact study on higher-dimensional packing problems with
order constraints. Problems of this type occur naturally in applications such
as logistics or computer architecture and can be interpreted as
higher-dimensional generalizations of scheduling problems. Using
graph-theoretic structures to describe feasible solutions, we develop a novel
exact branch-and-bound algorithm. This extends previous work by Fekete and
Schepers; a key tool is a new order-theoretic characterization of feasible
extensions of a partial order to a given complementarity graph that is
tailor-made for use in a branch-and-bound environment. The usefulness of our
approach is validated by computational results.
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2003 14:28:00 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Jul 2005 00:24:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Koehler",
"Ekkehard",
""
],
[
"Teich",
"Juergen",
""
]
] |
cs/0308007 | Ricardo Rocha | Ricardo Rocha and Fernando Silva and Vitor Santos Costa | On Applying Or-Parallelism and Tabling to Logic Programs | 45 pages, 12 figures, to appear in the journal of Theory and Practice
of Logic Programming (TPLP) | null | null | null | cs.PL | null | The past years have seen widening efforts at increasing Prolog's
declarativeness and expressiveness. Tabling has proved to be a viable technique
to efficiently overcome SLD's susceptibility to infinite loops and redundant
subcomputations. Our research demonstrates that implicit or-parallelism is a
natural fit for logic programs with tabling. To substantiate this belief, we
have designed and implemented an or-parallel tabling engine -- OPTYap -- and we
used a shared-memory parallel machine to evaluate its performance. To the best
of our knowledge, OPTYap is the first implementation of a parallel tabling
engine for logic programming systems. OPTYap builds on Yap's efficient
sequential Prolog engine. Its execution model is based on the SLG-WAM for
tabling, and on the environment copying for or-parallelism.
Preliminary results indicate that the mechanisms proposed to parallelize
search in the context of SLD resolution can indeed be effectively and naturally
generalized to parallelize tabled computations, and that the resulting systems
can achieve good performance on shared-memory parallel machines. More
importantly, it emphasizes our belief that through applying or-parallelism and
tabling to logic programs the range of applications for Logic Programming can
be increased.
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2003 18:59:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rocha",
"Ricardo",
""
],
[
"Silva",
"Fernando",
""
],
[
"Costa",
"Vitor Santos",
""
]
] |
cs/0308008 | Baden Hughes | Baden Hughes and Steven Bird | A Grid Based Architecture for High-Performance NLP | null | null | null | null | cs.DC cs.CL | null | We describe the design and early implementation of an extensible,
component-based software architecture for natural language engineering
applications which interfaces with high performance distributed computing
services. The architecture leverages existing linguistic resource description
and discovery mechanisms based on metadata descriptions, combining these in a
compatible fashion with other software definition abstractions. Within this
architecture, application design is highly flexible, allowing disparate
components to be combined to suit the overall application functionality, and
formally described independently of processing concerns. An application
specification language provides abstraction from the programming environment
and allows ease of interface with high performance computational grids via a
broker.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2003 00:46:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hughes",
"Baden",
""
],
[
"Bird",
"Steven",
""
]
] |
cs/0308010 | Giorgio Parisi | Giorgio Parisi | On the probabilistic approach to the random satisfiability problem | 11 pages, proceedings of SAT 2003 | null | null | null | cs.CC cond-mat.dis-nn | null | In this note I will review some of the recent results that have been obtained
in the probabilistic approach to the random satisfiability problem. At the
present moment the results are only heuristic. In the case of the random
3-satisfiability problem a phase transition from the satisfiable to the
unsatisfiable phase is found at $\alpha=4.267$. There are other values of
$\alpha$ that separates different regimes and they will be described in
details. In this context the properties of the survey decimation algorithm will
also be discussed.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2003 10:34:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Parisi",
"Giorgio",
""
]
] |
cs/0308012 | Nathan Segerlind | Russell Impagliazzo and Nathan Segerlind | Constant-Depth Frege Systems with Counting Axioms Polynomially Simulate
Nullstellensatz Refutations | 17 pages | null | null | null | cs.CC cs.LO | null | We show that constant-depth Frege systems with counting axioms modulo $m$
polynomially simulate Nullstellensatz refutations modulo $m$. Central to this
is a new definition of reducibility from formulas to systems of polynomials
with the property that, for most previously studied translations of formulas to
systems of polynomials, a formula reduces to its translation. When combined
with a previous result of the authors, this establishes the first size
separation between Nullstellensatz and polynomial calculus refutations. We also
obtain new, small refutations for certain CNFs by constant-depth Frege systems
with counting axioms.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2003 19:25:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Impagliazzo",
"Russell",
""
],
[
"Segerlind",
"Nathan",
""
]
] |
cs/0308013 | Andrei Lopatenko | Enrico Franconi, Gabriel Kuper, Andrei Lopatenko, Luciano Serafini | A Robust and Computational Characterisation of Peer-to-Peer Database
Systems | 13 pages | "International Workshop On Databases, Information Systems and
Peer-to-Peer Computing", 2003 | null | null | cs.DC cs.DB | null | In this paper we give a robust logical and computational characterisation of
peer-to-peer database systems. We first define a pre- cise model-theoretic
semantics of a peer-to-peer system, which allows for local inconsistency
handling. We then characterise the general computa- tional properties for the
problem of answering queries to such a peer-to- peer system. Finally, we devise
tight complexity bounds and distributed procedures for the problem of answering
queries in few relevant special cases.
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2003 12:50:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Franconi",
"Enrico",
""
],
[
"Kuper",
"Gabriel",
""
],
[
"Lopatenko",
"Andrei",
""
],
[
"Serafini",
"Luciano",
""
]
] |
cs/0308014 | Dirk Leinders | Dirk Leinders (Limburgs Universitair Centrum, Belgium), Jerzy
Tyszkiewicz (Warsaw University), Jan Van den Bussche (Limburgs Universitair
Centrum, Belgium) | On the expressive power of semijoin queries | 9 pages, to appear in Information Processing Letters; added results
that more clearly delineate the expressive power of SA, added a section that
discusses the impact of order on the expressive power of SA, deemphasized the
discussion on the relationship with GF | null | null | null | cs.DB cs.LO | null | The semijoin algebra is the variant of the relational algebra obtained by
replacing the join operator by the semijoin operator. We provide an
Ehrenfeucht-Fraiss\'{e} game, characterizing the discerning power of the
semijoin algebra. This game gives a method for showing that queries are not
expressible in the semijoin algebra.
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2003 14:12:11 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Mar 2004 13:43:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leinders",
"Dirk",
"",
"Limburgs Universitair Centrum, Belgium"
],
[
"Tyszkiewicz",
"Jerzy",
"",
"Warsaw University"
],
[
"Bussche",
"Jan Van den",
"",
"Limburgs Universitair\n Centrum, Belgium"
]
] |
cs/0308015 | Shinji Yamane | Shinji Yamane, Jiahong Wang, Hironobu Suzuki, Norihisa Segawa and Yuko
Murayama | Rethinking OpenPGP PKI and OpenPGP Public Keyserver | 8 pages, 2 figures | null | null | null | cs.CY cs.CR | null | OpenPGP, an IETF Proposed Standard based on PGP application, has its own
Public Key Infrastructure (PKI) architecture which is different from the one
based on X.509, another standard from ITU. This paper describes the OpenPGP
PKI; the historical perspective as well as its current use. The current OpenPGP
PKI issues include the capability of a PGP keyserver and its performance. PGP
keyservers have been developed and operated by volunteers since the 1990s. The
keyservers distribute, merge, and expire the OpenPGP public keys. Major
keyserver managers from several countries have built the globally distributed
network of PGP keyservers. However, the current PGP Public Keyserver (pksd) has
some limitations. It does not support fully the OpenPGP format so that it is
neither expandable nor flexible, without any cluster technology. Finally we
introduce the project on the next generation OpenPGP public keyserver called
the OpenPKSD, lead by Hironobu Suzuki, one of the authors, and funded by
Japanese Information-technology Promotion Agency(IPA).
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2003 16:33:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yamane",
"Shinji",
""
],
[
"Wang",
"Jiahong",
""
],
[
"Suzuki",
"Hironobu",
""
],
[
"Segawa",
"Norihisa",
""
],
[
"Murayama",
"Yuko",
""
]
] |
cs/0308016 | P. V. S. Ram Babu | Akshar Bharati, Rajeev Sangal | Collaborative Creation of Digital Content in Indian Languages | null | null | null | null | cs.CL | null | The world is passing through a major revolution called the information
revolution, in which information and knowledge is becoming available to people
in unprecedented amounts wherever and whenever they need it. Those societies
which fail to take advantage of the new technology will be left behind, just
like in the industrial revolution.
The information revolution is based on two major technologies: computers and
communication. These technologies have to be delivered in a COST EFFECTIVE
manner, and in LANGUAGES accessible to people.
One way to deliver them in cost effective manner is to make suitable
technology choices, and to allow people to access through shared resources.
This could be done throuch street corner shops (for computer usage, e-mail
etc.), schools, community centres and local library centres.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2003 09:01:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bharati",
"Akshar",
""
],
[
"Sangal",
"Rajeev",
""
]
] |
cs/0308017 | P. V. S. Ram Babu | Akshar Bharati, Vineet Chaitanya, Rajeev Sangal | Information Revolution | Published as a keynote lecture in IRIL-99: Information Revolution and
Indian Languages, 12-14 Nov 1999 | Published as a keynote lecture in IRIL-99: Information Revolution
and Indian Languages, 12-14 Nov 1999 | null | LTRC-TR007 | cs.CL | null | The world is passing through a major revolution called the information
revolution, in which information and knowledge is becoming available to people
in unprecedented amounts wherever and whenever they need it. Those societies
which fail to take advantage of the new technology will be left behind, just
like in the industrial revolution.
The information revolution is based on two major technologies: computers and
communication. These technologies have to be delivered in a COST EFFECTIVE
manner, and in LANGUAGES accessible to people.
One way to deliver them in cost effective manner is to make suitable
technology choices (discussed later), and to allow people to access through
shared resources. This could be done throuch street corner shops (for computer
usage, e-mail etc.), schools, community centers and local library centres.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2003 09:17:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bharati",
"Akshar",
""
],
[
"Chaitanya",
"Vineet",
""
],
[
"Sangal",
"Rajeev",
""
]
] |
cs/0308018 | P. V. S. Ram Babu | Akshar Bharati, Vineet Chaitanya, Amba P. Kulkarni, Rajeev Sangal, G
Umamaheshwara Rao | Anusaaraka: Overcoming the Language Barrier in India | Published in "Anuvad: Approaches to Translation", Rukmini Bhaya Nair,
(editor), Sage, New Delhi, 2001 | Published in "Anuvad: Approaches to Translation", Rukmini Bhaya
Nair, (editor), Sage, New Delhi, 2001 | null | LTRC-TR009 | cs.CL | null | The anusaaraka system makes text in one Indian language accessible in another
Indian language. In the anusaaraka approach, the load is so divided between man
and computer that the language load is taken by the machine, and the
interpretation of the text is left to the man. The machine presents an image of
the source text in a language close to the target language.In the image, some
constructions of the source language (which do not have equivalents) spill over
to the output. Some special notation is also devised. The user after some
training learns to read and understand the output. Because the Indian languages
are close, the learning time of the output language is short, and is expected
to be around 2 weeks.
The output can also be post-edited by a trained user to make it grammatically
correct in the target language. Style can also be changed, if necessary. Thus,
in this scenario, it can function as a human assisted translation system.
Currently, anusaarakas are being built from Telugu, Kannada, Marathi, Bengali
and Punjabi to Hindi. They can be built for all Indian languages in the near
future. Everybody must pitch in to build such systems connecting all Indian
languages, using the free software model.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2003 09:24:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bharati",
"Akshar",
""
],
[
"Chaitanya",
"Vineet",
""
],
[
"Kulkarni",
"Amba P.",
""
],
[
"Sangal",
"Rajeev",
""
],
[
"Rao",
"G Umamaheshwara",
""
]
] |
cs/0308019 | P. V. S. Ram Babu | Akshar Bharati, Vineet Chaitanya, Amba P. Kulkarni, Rajeev Sangal | Language Access: An Information Based Approach | Published in the proceedings of Knowledge Based Computer Systems
conference, 2000, Tata McGraw-Hill, New Delhi, Dec. 2000 | Published in the proceedings of Knowledge Based Computer Systems
Conference, 2000, Tata McGraw Hill, New Delhi 2000 | null | LTRC-TR010 | cs.CL | null | The anusaaraka system (a kind of machine translation system) makes text in
one Indian language accessible through another Indian language. The machine
presents an image of the source text in a language close to the target
language. In the image, some constructions of the source language (which do not
have equivalents in the target language) spill over to the output. Some special
notation is also devised.
Anusaarakas have been built from five pairs of languages: Telugu,Kannada,
Marathi, Bengali and Punjabi to Hindi. They are available for use through Email
servers.
Anusaarkas follows the principle of substitutibility and reversibility of
strings produced. This implies preservation of information while going from a
source language to a target language.
For narrow subject areas, specialized modules can be built by putting subject
domain knowledge into the system, which produce good quality grammatical
output. However, it should be remembered, that such modules will work only in
narrow areas, and will sometimes go wrong. In such a situation, anusaaraka
output will still remain useful.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2003 09:40:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bharati",
"Akshar",
""
],
[
"Chaitanya",
"Vineet",
""
],
[
"Kulkarni",
"Amba P.",
""
],
[
"Sangal",
"Rajeev",
""
]
] |
cs/0308020 | P. V. S. Ram Babu | Akshar Bharati, Dipti M Sharma, Vineet Chaitanya, Amba P Kulkarni,
Rajeev Sangal, Durgesh D Rao | LERIL : Collaborative Effort for Creating Lexical Resources | [ To appear in Proceedings of Workshop on Language Resources in Asia,
along with NLPRS-2001, Tokyo, 27-30 November 2001] Appeared in the
Proceedings of Workshop on Language Resources in Asia, along with NLPRS-2001,
Tokyo, 27-30 November 2001. Appeared in the proceedings of Workshop on
Language Resources in Asia, along with NLPRS-2001, Tokyo, 27-30 November 2001 | null | null | LTRC-TR015 | cs.CL | null | The paper reports on efforts taken to create lexical resources pertaining to
Indian languages, using the collaborative model. The lexical resources being
developed are: (1) Transfer lexicon and grammar from English to several Indian
languages. (2) Dependencey tree bank of annotated corpora for several Indian
languages. The dependency trees are based on the Paninian model. (3) Bilingual
dictionary of 'core meanings'.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2003 10:08:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bharati",
"Akshar",
""
],
[
"Sharma",
"Dipti M",
""
],
[
"Chaitanya",
"Vineet",
""
],
[
"Kulkarni",
"Amba P",
""
],
[
"Sangal",
"Rajeev",
""
],
[
"Rao",
"Durgesh D",
""
]
] |
cs/0308021 | Stephen Vavasis | Stephen Vavasis | A Bernstein-Bezier Sufficient Condition for Invertibility of Polynomial
Mapping Functions | null | null | null | null | cs.NA cs.CG | null | We propose a sufficient condition for invertibility of a polynomial mapping
function defined on a cube or simplex. This condition is applicable to finite
element analysis using curved meshes. The sufficient condition is based on an
analysis of the Bernstein-B\'ezier form of the columns of the derivative.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2003 18:43:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vavasis",
"Stephen",
""
]
] |
cs/0308022 | Steven Bird | Steven Bird and Gary Simons | Extending Dublin Core Metadata to Support the Description and Discovery
of Language Resources | 12 pages, 1 figure | Computing and the Humanities, 37 (4), 2003 | null | null | cs.CL cs.DL | null | As language data and associated technologies proliferate and as the language
resources community expands, it is becoming increasingly difficult to locate
and reuse existing resources. Are there any lexical resources for such-and-such
a language? What tool works with transcripts in this particular format? What is
a good format to use for linguistic data of this type? Questions like these
dominate many mailing lists, since web search engines are an unreliable way to
find language resources. This paper reports on a new digital infrastructure for
discovering language resources being developed by the Open Language Archives
Community (OLAC). At the core of OLAC is its metadata format, which is designed
to facilitate description and discovery of all kinds of language resources,
including data, tools, or advice. The paper describes OLAC metadata, its
relationship to Dublin Core metadata, and its dissemination using the metadata
harvesting protocol of the Open Archives Initiative.
| [
{
"version": "v1",
"created": "Thu, 14 Aug 2003 23:28:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
],
[
"Simons",
"Gary",
""
]
] |
cs/0308024 | Steve Fisher | Rob Byrom, Brian Coghlan, Andrew W Cooke, Roney Cordenonsi, Linda
Cornwall, Abdeslem Djaoui, Laurence Field, Steve Fisher, Steve Hicks, Stuart
Kenny, Jason Leake, James Magowan, Werner Nutt, David O'Callaghan, Norbert
Podhorszki, John Ryan, Manish Soni, Paul Taylor, Antony J Wilson | Relational Grid Monitoring Architecture (R-GMA) | Talk given at UK e-Science All-Hands meeting, Nottingham, UK,
September 2-4, 2003. 7 pages of LaTeX and 5 PNG figures | null | null | null | cs.DC | null | We describe R-GMA (Relational Grid Monitoring Architecture) which has been
developed within the European DataGrid Project as a Grid Information and
Monitoring System. Is is based on the GMA from GGF, which is a simple
Consumer-Producer model. The special strength of this implementation comes from
the power of the relational model. We offer a global view of the information as
if each Virtual Organisation had one large relational database. We provide a
number of different Producer types with different characteristics; for example
some support streaming of information. We also provide combined
Consumer/Producers, which are able to combine information and republish it. At
the heart of the system is the mediator, which for any query is able to find
and connect to the best Producers for the job. We have developed components to
allow a measure of inter-working between MDS and R-GMA. We have used it both
for information about the grid (primarily to find out about what services are
available at any one time) and for application monitoring. R-GMA has been
deployed in various testbeds; we describe some preliminary results and
experiences of this deployment.
| [
{
"version": "v1",
"created": "Fri, 15 Aug 2003 23:53:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Byrom",
"Rob",
""
],
[
"Coghlan",
"Brian",
""
],
[
"Cooke",
"Andrew W",
""
],
[
"Cordenonsi",
"Roney",
""
],
[
"Cornwall",
"Linda",
""
],
[
"Djaoui",
"Abdeslem",
""
],
[
"Field",
"Laurence",
""
],
[
"Fisher",
"Steve",
""
],
[
"Hicks",
"Steve",
""
],
[
"Kenny",
"Stuart",
""
],
[
"Leake",
"Jason",
""
],
[
"Magowan",
"James",
""
],
[
"Nutt",
"Werner",
""
],
[
"O'Callaghan",
"David",
""
],
[
"Podhorszki",
"Norbert",
""
],
[
"Ryan",
"John",
""
],
[
"Soni",
"Manish",
""
],
[
"Taylor",
"Paul",
""
],
[
"Wilson",
"Antony J",
""
]
] |
cs/0308025 | Andras Lorincz | Andras Lorincz | Controlled hierarchical filtering: Model of neocortical sensory
processing | Technical Report, 38 pages, 10 figures | null | null | null | cs.NE cs.AI cs.LG q-bio.NC | null | A model of sensory information processing is presented. The model assumes
that learning of internal (hidden) generative models, which can predict the
future and evaluate the precision of that prediction, is of central importance
for information extraction. Furthermore, the model makes a bridge to
goal-oriented systems and builds upon the structural similarity between the
architecture of a robust controller and that of the hippocampal entorhinal
loop. This generative control architecture is mapped to the neocortex and to
the hippocampal entorhinal loop. Implicit memory phenomena; priming and
prototype learning are emerging features of the model. Mathematical theorems
ensure stability and attractive learning properties of the architecture.
Connections to reinforcement learning are also established: both the control
network, and the network with a hidden model converge to (near) optimal policy
under suitable conditions. Falsifying predictions, including the role of the
feedback connections between neocortical areas are made.
| [
{
"version": "v1",
"created": "Sat, 16 Aug 2003 07:31:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lorincz",
"Andras",
""
]
] |
cs/0308026 | Charles H. Bennett | Charles H. Bennett | Improvements to time bracketed authentication | null | null | null | null | cs.CR cs.CY | null | We describe a collection of techniques whereby audiovisual or other
recordings of significant events can be made in a way that hinders
falsification, pre-dating, or post-dating by interested parties, even by the
makers and operators of the recording equipment. A central feature of these
techniques is the interplay between private information, which by its nature is
untrustworthy and susceptible to suppression or manipulation by interested
parties, and public information, which is too widely known to be manipulated by
anyone. While authenticated recordings may be infeasible to falsify, they can
be abused in other ways, such as being used for blackmail or harassment; but
susceptibility to these abuses can be reduced by encryption and secret sharing.
| [
{
"version": "v1",
"created": "Mon, 18 Aug 2003 19:52:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bennett",
"Charles H.",
""
]
] |
cs/0308027 | Liam Wagner | Liam Wagner | A Comparison of Secret Sharing Schemes Based on Latin Squares and RSA | null | null | null | null | cs.CR cs.DM math.CO | null | In recent years there has been a great deal of work done on secret sharing
scehemes. Secret Sharing Schemes allow for the division of keys so that an
authorised set of users may access information. In this paper we wish to
present a critical comparison of two of these schemes based on Latin Squares,
[Cooper et., al.] and RSA [Shoup]. These two protocols will be examined in
terms of their positive and negative aspects of their secuirty.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2003 07:43:43 GMT"
},
{
"version": "v2",
"created": "Sat, 16 Oct 2004 19:40:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wagner",
"Liam",
""
]
] |
cs/0308028 | Liam Wagner | Liam Wagner and Stuart McDonald | Finding Traitors in Secure Networks Using Byzantine Agreements | Accepted by International Journal of Network Security | null | null | null | cs.CR cs.DC cs.GT cs.MA | null | Secure networks rely upon players to maintain security and reliability.
However not every player can be assumed to have total loyalty and one must use
methods to uncover traitors in such networks. We use the original concept of
the Byzantine Generals Problem by Lamport, and the more formal Byzantine
Agreement describe by Linial, to nd traitors in secure networks. By applying
general fault-tolerance methods to develop a more formal design of secure
networks we are able to uncover traitors amongst a group of players. We also
propose methods to integrate this system with insecure channels. This new
resiliency can be applied to broadcast and peer-to-peer secure communication
systems where agents may be traitors or become unreliable due to faults.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2003 08:42:43 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Oct 2003 14:30:59 GMT"
},
{
"version": "v3",
"created": "Sun, 10 Oct 2004 17:09:47 GMT"
},
{
"version": "v4",
"created": "Sat, 16 Oct 2004 19:25:02 GMT"
},
{
"version": "v5",
"created": "Sun, 5 Feb 2006 12:15:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wagner",
"Liam",
""
],
[
"McDonald",
"Stuart",
""
]
] |
cs/0308029 | Fabio Grandi | Fabio Grandi | On Decidability of Expressive Description Logics with Composition of
Roles in Number Restrictions | A preliminary version of this paper appeared in Proc. of the 9th
Intl' Conf. on Logic for Programming, Artificial Intelligence and Reasoning,
LPAR 2002 | null | null | CSITE-01-02 (rev. 8/03) | cs.LO | null | Description Logics are knowledge representation formalisms which have been
used in a wide range of application domains. Owing to their appealing
expressiveness, we consider in this paper extensions of the well-known concept
language ALC allowing for number restrictions on complex role expressions.
These have been first introduced by Baader and Sattler as ALCN(M) languages,
with the adoption of role constructors M subset-of {o,-,And,Or}. In particular,
they showed in 1999 that, although ALCN(o) is decidable, the addition of other
operators may easily lead to undecidability: in fact, ALCN(o,And) and
ALCN(o,-,Or) were proved undecidable.
In this work, we further investigate the computational properties of the ALCN
family, aiming at narrowing the decidability gap left open by Baader and
Sattler's results. In particular, we will show that ALCN(o) extended with
inverse roles both in number and in value restrictions becomes undecidable,
whereas it can be safely extended with qualified number restrictions without
losing decidability.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2003 12:50:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grandi",
"Fabio",
""
]
] |
cs/0308031 | Carlos Gershenson | Carlos Gershenson | Artificial Neural Networks for Beginners | tutorial, 8 pages | null | null | null | cs.NE cs.AI | null | The scope of this teaching package is to make a brief induction to Artificial
Neural Networks (ANNs) for people who have no previous knowledge of them. We
first make a brief introduction to models of networks, for then describing in
general terms ANNs. As an application, we explain the backpropagation
algorithm, since it is widely used and many other algorithms are derived from
it. The user should know algebra and the handling of functions and vectors.
Differential calculus is recommendable, but not necessary. The contents of this
package should be understood by people with high school education. It would be
useful for people who are just curious about what are ANNs, or for people who
want to become familiar with them, so when they study them more fully, they
will already have clear notions of ANNs. Also, people who only want to apply
the backpropagation algorithm without a detailed and formal explanation of it
will find this material useful. This work should not be seen as "Nets for
dummies", but of course it is not a treatise. Much of the formality is skipped
for the sake of simplicity. Detailed explanations and demonstrations can be
found in the referred readings. The included exercises complement the
understanding of the theory. The on-line resources are highly recommended for
extending this brief induction.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2003 09:40:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gershenson",
"Carlos",
""
]
] |
cs/0308033 | Peter Turney | Peter D. Turney (National Research Council of Canada) | Coherent Keyphrase Extraction via Web Mining | 6 pages, related work available at http://purl.org/peter.turney/ | Proceedings of the Eighteenth International Joint Conference on
Artificial Intelligence (IJCAI-03), (2003), Acapulco, Mexico, 434-439 | null | NRC-46496 | cs.LG cs.CL cs.IR | null | Keyphrases are useful for a variety of purposes, including summarizing,
indexing, labeling, categorizing, clustering, highlighting, browsing, and
searching. The task of automatic keyphrase extraction is to select keyphrases
from within the text of a given document. Automatic keyphrase extraction makes
it feasible to generate keyphrases for the huge number of documents that do not
have manually assigned keyphrases. A limitation of previous keyphrase
extraction algorithms is that the selected keyphrases are occasionally
incoherent. That is, the majority of the output keyphrases may fit together
well, but there may be a minority that appear to be outliers, with no clear
semantic relation to the majority or to each other. This paper presents
enhancements to the Kea keyphrase extraction algorithm that are designed to
increase the coherence of the extracted keyphrases. The approach is to use the
degree of statistical association among candidate keyphrases as evidence that
they may be semantically related. The statistical association is measured using
web mining. Experiments demonstrate that the enhancements improve the quality
of the extracted keyphrases. Furthermore, the enhancements are not
domain-specific: the algorithm generalizes well when it is trained on one
domain (computer science documents) and tested on another (physics documents).
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2003 20:42:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] |
cs/0308034 | Gerardo Iovane | G.Iovane, P.Giordano, C.Iovane, F.Rotulo | Fingerprint based bio-starter and bio-access | 4 pages, Proceeding of Automotive 2003, Turin (Italy) | null | null | null | cs.CV | null | In the paper will be presented a safety and security system based on
fingerprint technology. The results suggest a new scenario where the new cars
can use a fingerprint sensor integrated in car handle to allow access and in
the dashboard as starter button.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2003 10:47:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Iovane",
"G.",
""
],
[
"Giordano",
"P.",
""
],
[
"Iovane",
"C.",
""
],
[
"Rotulo",
"F.",
""
]
] |
cs/0308035 | Gerardo Iovane | G.Iovane, F.S.Tortoriello | IS (Iris Security) | 7 pages, Proceeding of NIDays 2003 (Sponsored by National
Instruments), Rome (Italy) | null | null | null | cs.CV | null | In the paper will be presented a safety system based on iridology. The
results suggest a new scenario where the security problem in supervised and
unsupervised areas can be treat with the present system and the iris image
recognition.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2003 10:52:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Iovane",
"G.",
""
],
[
"Tortoriello",
"F. S.",
""
]
] |
cs/0308036 | Shi Zhou | Shi Zhou and Raul J Mondragon | The Rich-Club Phenomenon In The Internet Topology | To be appeared in the IEEE Communications Letters | IEEE Communications Letters, vol. 8, no. 3, pp.180-182, March
2004. | 10.1109/LCOMM.2004.823426 | null | cs.NI | null | We show that the Internet topology at the Autonomous System (AS) level has a
rich--club phenomenon. The rich nodes, which are a small number of nodes with
large numbers of links, are very well connected to each other. The rich--club
is a core tier that we measured using the rich--club connectivity and the
node--node link distribution. We obtained this core tier without any heuristic
assumption between the ASes. The rich--club phenomenon is a simple qualitative
way to differentiate between power law topologies and provides a criterion for
new network models. To show this, we compared the measured rich--club of the AS
graph with networks obtained using the Barab\'asi--Albert (BA) scale--free
network model, the Fitness BA model and the Inet--3.0 model.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2003 11:05:19 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Sep 2003 10:49:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Shi",
""
],
[
"Mondragon",
"Raul J",
""
]
] |
cs/0308037 | Gerardo Iovane | G.Iovane | Distributed and Parallel Net Imaging | 3 pages, 8 figures, Procedding of NIDays 2003 (sponsored by National
Instruments), Rome 2003. Winner (2nd classified) of the price "Best
Application of Measurement and Automation | null | null | null | cs.CV astro-ph cs.DC | null | A very complex vision system is developed to detect luminosity variations
connected with the discovery of new planets in the Universe. The traditional
imaging system can not manage a so large load. A private net is implemented to
perform an automatic vision and decision architecture. It lets to carry out an
on-line discrimination of interesting events by using two levels of triggers.
This system can even manage many Tbytes of data per day. The architecture
avails itself of a distributed parallel network system based on a maximum of
256 standard workstations with Microsoft Window as OS.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2003 10:31:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Iovane",
"G.",
""
]
] |
cs/0308038 | Gerardo Iovane | G.Iovane | Image Analysis in Astronomy for very large vision machine | 3 pages, 9 figures, Proceeding of NIWEEK 2002 (sponsored by National
Instruments), Austin (Usa), 2002 | null | null | null | cs.CV astro-ph cs.DC | null | It is developed a very complex system (hardware/software) to detect
luminosity variations connected with the discovery of new planets outside the
Solar System. Traditional imaging approaches are very demanding in terms of
computing time; then, the implementation of an automatic vision and decision
software architecture is presented. It allows to perform an on-line
discrimination of interesting events by using two levels of triggers. A
fundamental challenge was to work with very large CCD camera (even 16k*16k
pixels) in line with very large telescopes. Then, the architecture can use a
distributed parallel network system based on a maximum of 256 standard
workstations.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2003 18:47:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Iovane",
"G.",
""
]
] |
cs/0308039 | Andreas Schaale | Andreas Schaale, Carsten Wulf-Mathies, Soenke Lieberam-Schmidt | A new approach to relevancy in Internet searching - the "Vox Populi
Algorithm" | 9 pages Latex | null | null | null | cs.DS cond-mat.dis-nn cs.IR | null | In this paper we will derive a new algorithm for Internet searching. The main
idea of this algorithm is to extend the existing algorithms by a component,
which reflects the interests of the users more than existing methods. The "Vox
Populi Algorithm" (VPA) creates a feedback from the users to the content of the
search index. The information derived from the users query analysis is used to
modify the existing crawling algorithms. The VPA controls the distribution of
the resources of the crawler. Finally, we also discuss methods of suppressing
unwanted content (spam).
| [
{
"version": "v1",
"created": "Sat, 23 Aug 2003 13:34:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schaale",
"Andreas",
""
],
[
"Wulf-Mathies",
"Carsten",
""
],
[
"Lieberam-Schmidt",
"Soenke",
""
]
] |
cs/0308040 | Sanatan Rai | Sanatan Rai | Open source software and peer review | 4 pages | null | null | null | cs.SE cs.CY | null | We compare the open source model of software development to peer review in
academia.
| [
{
"version": "v1",
"created": "Sat, 23 Aug 2003 21:11:41 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Sep 2003 18:20:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rai",
"Sanatan",
""
]
] |
cs/0308041 | Andrej Brodnik | Andrej Brodnik and Andreas Nilsson | Static Data Structure for Discrete Advance Bandwidth Reservations on the
Internet | null | null | null | IMFM-(2003)-PS-889 | cs.DS | null | In this paper we present a discrete data structure for reservations of
limited resources. A reservation is defined as a tuple consisting of the time
interval of when the resource should be reserved, $I_R$, and the amount of the
resource that is reserved, $B_R$, formally $R=\{I_R,B_R\}$.
The data structure is similar to a segment tree. The maximum spanning
interval of the data structure is fixed and defined in advance. The granularity
and thereby the size of the intervals of the leaves is also defined in advance.
The data structure is built only once. Neither nodes nor leaves are ever
inserted, deleted or moved. Hence, the running time of the operations does not
depend on the number of reservations previously made. The running time does not
depend on the size of the interval of the reservation either. Let $n$ be the
number of leaves in the data structure. In the worst case, the number of
touched (i.e. traversed) nodes is in any operation $O(\log n)$, hence the
running time of any operation is also $O(\log n)$.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2003 06:30:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brodnik",
"Andrej",
""
],
[
"Nilsson",
"Andreas",
""
]
] |
cs/0308042 | Zsolt Palotai | Zsolt Palotai, Sandor Mandusitz, Andras Lorincz | Centralized reward system gives rise to fast and efficient work sharing
for intelligent Internet agents lacking direct communication | null | null | null | null | cs.IR | null | WWW has a scale-free structure where novel information is often difficult to
locate. Moreover, Intelligent agents easily get trapped in this structure. Here
a novel method is put forth, which turns these traps into information
repositories, supplies: We populated an Internet environment with intelligent
news foragers. Foraging has its associated cost whereas foragers are rewarded
if they detect not yet discovered novel information. The intelligent news
foragers crawl by using the estimated long-term cumulated reward, and also have
a finite sized memory: the list of most promising supplies. Foragers form an
artificial life community: the most successful ones are allowed to multiply,
while unsuccessful ones die out. The specific property of this community is
that there is no direct communication amongst foragers but the centralized
rewarding system. Still, fast division of work is achieved.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2003 13:32:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Palotai",
"Zsolt",
""
],
[
"Mandusitz",
"Sandor",
""
],
[
"Lorincz",
"Andras",
""
]
] |
cs/0308044 | Grigorii Pivovarov | Grigorii Pivovarov and Sergei Trunov | EqRank: A Self-Consistent Equivalence Relation on Graph Vertexes | a kdd cup 2003 submission | null | null | null | cs.DS cs.DL | null | A new method of hierarchical clustering of graph vertexes is suggested. In
the method, the graph partition is determined with an equivalence relation
satisfying a recursive definition stating that vertexes are equivalent if the
vertexes they point to (or vertexes pointing to them) are equivalent. Iterative
application of the partitioning yields a hierarchical clustering of graph
vertexes. The method is applied to the citation graph of hep-th. The outcome is
a two-level classification scheme for the subject field presented in hep-th,
and indexing of the papers from hep-th in this scheme. A number of tests show
that the classification obtained is adequate.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2003 13:20:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pivovarov",
"Grigorii",
""
],
[
"Trunov",
"Sergei",
""
]
] |
cs/0309001 | Allison Woodruff | Allison Woodruff and Paul M. Aoki | Media Affordances of a Mobile Push-To-Talk Communication Service | 20 pages | null | null | null | cs.HC | null | This paper presents an exploratory study of college-age students using
two-way, push-to-talk cellular radios. We describe the observed and reported
use of cellular radio by the participants, the activities and purposes for
which they adopted it, and their responses. We then examine these empirical
results using mediated communication theory. Cellular radios have a unique
combination of affordances relative to other media used by this age group,
including instant messaging (IM) and mobile phones; the results of our analysis
do suggest explanations for some observed phenomena but also highlight the
counter-intuitive nature of other phenomena. For example, although the radios
have many important dissimilarities with IM from the viewpoint of mediated
communication theory, the observed use patterns resembled those of IM to a
surprising degree.
| [
{
"version": "v1",
"created": "Sun, 31 Aug 2003 20:13:10 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Sep 2003 04:12:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Woodruff",
"Allison",
""
],
[
"Aoki",
"Paul M.",
""
]
] |
cs/0309002 | Ricardo Galli | Ricardo Galli | El informe NERA analizado | Spanish | null | null | null | cs.CY | null | This is a review of the article "Government Preferences for Promoting
Open-Source Software: A Solution in Search of A Problem" by David Evans and
Bernard J. Reddy. This report was paid for by Microsoft and put together at its
request. Now Microsoft is using it as part of their lobbying campaign in Europe
against governments' promotion of Open Source Software. As expected, this
article is strongly biased and most of the conclusions are based upon false
hypotheses and evidence.
| [
{
"version": "v1",
"created": "Mon, 1 Sep 2003 00:11:19 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Sep 2003 22:28:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Galli",
"Ricardo",
""
]
] |
cs/0309003 | Marco Bozzano | M. Bozzano, G. Delzanno and M. Martelli | Model Checking Linear Logic Specifications | 53 pages, 12 figures "Under consideration for publication in Theory
and Practice of Logic Programming" | null | null | null | cs.PL cs.SC | null | The overall goal of this paper is to investigate the theoretical foundations
of algorithmic verification techniques for first order linear logic
specifications. The fragment of linear logic we consider in this paper is based
on the linear logic programming language called LO enriched with universally
quantified goal formulas. Although LO was originally introduced as a
theoretical foundation for extensions of logic programming languages, it can
also be viewed as a very general language to specify a wide range of
infinite-state concurrent systems.
Our approach is based on the relation between backward reachability and
provability highlighted in our previous work on propositional LO programs.
Following this line of research, we define here a general framework for the
bottom-up evaluation of first order linear logic specifications. The evaluation
procedure is based on an effective fixpoint operator working on a symbolic
representation of infinite collections of first order linear logic formulas.
The theory of well quasi-orderings can be used to provide sufficient conditions
for the termination of the evaluation of non trivial fragments of first order
linear logic.
| [
{
"version": "v1",
"created": "Mon, 1 Sep 2003 09:34:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bozzano",
"M.",
""
],
[
"Delzanno",
"G.",
""
],
[
"Martelli",
"M.",
""
]
] |
cs/0309004 | Bruce Long | Bruce Long | The Structure of Information | 5 Pages | null | null | null | cs.LO | null | A formal model of the structure of information is presented in five axioms
which define identity, containment, and joins of infons. Joins are shown to be
commutative, associative, provide inverses of infons, and, potentially, have
many identity elements, two of which are multiplicative and additive. Those two
types of join are distributive. The other identity elements are for operators
on entwined states. Multiplicative joins correspond to adding or removing new
bits to a system while additive joins correspond to a change of state. The
order or size of an infon is defined. This groundwork is intended to be used to
model continuous and discreet information structures through time, especially
in closed systems.
| [
{
"version": "v1",
"created": "Tue, 2 Sep 2003 10:10:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Long",
"Bruce",
""
]
] |
cs/0309006 | Rajgopal Kannan | Rajgopal Kannan | The KR-Benes Network: A Control-Optimal Rearrangeable Permutation
Network | 18 pages, 11 figures, website http://www.csc.lsu.edu/~rkannan V3:
Proved the (previous) Conjecture on Optimality of K-Benes | IEEE Transactions on Computers, Vol. 54, No. 5, pp. 534-544, May
2005. | null | LSU Computer Science Tech Report LSU-CSC-TR03-01 | cs.NI cs.CC | null | The Benes network has been used as a rearrangeable network for over 40 years,
yet the uniform $N(2 \log N-1)$ control complexity of the $N \times N$ Benes is
not optimal for many permutations. In this paper, we present a novel $O(\log
N)$ depth rearrangeable network called KR-Benes that is {\it
permutation-specific control-optimal}. The KR-Benes routes {\it every}
permutation with the minimal control complexity {\it specific} to that
permutation and its worst-case complexity for arbitrary permutations is bounded
by the Benes; thus it replaces the Benes when considering control
complexity/latency. We design the KR-Benes by first constructing a restricted
$2 \log K +2$ depth rearrangeable network called $K$-Benes for routing
$K$-bounded permutations with control $2N \log K$, $0 \leq K \leq N/4$. We then
show that the $N \times N$ Benes network itself (with one additional stage)
contains every $K$-Benes network as a subgraph and use this property to
construct the KR-Benes network. With regard to the control-optimality of the
KR-Benes, we show that any optimal network for rearrangeably routing
$K$-bounded permutations must have depth $2 \log K + 2$, and therefore the
$K$-Benes (and hence the KR-Benes) is optimal.
| [
{
"version": "v1",
"created": "Sat, 6 Sep 2003 06:19:30 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Nov 2003 02:14:22 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Nov 2003 02:15:07 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Jun 2004 22:25:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kannan",
"Rajgopal",
""
]
] |
cs/0309007 | Petro M. Gopych | Petro M. Gopych | ROC Curves Within the Framework of Neural Network Assembly Memory Model:
Some Analytic Results | Proceedings of the KDS-2003 Conference held in Varna, Bulgaria on
June 16-26, 2003, pages 138-146, 5 Figures, 18 references | International Journal on Information Theories & Applications,
2003, vol. 10, no.2, pp.189-197. | null | null | cs.AI cs.IR q-bio.NC q-bio.QM | null | On the basis of convolutional (Hamming) version of recent Neural Network
Assembly Memory Model (NNAMM) for intact two-layer autoassociative Hopfield
network optimal receiver operating characteristics (ROCs) have been derived
analytically. A method of taking into account explicitly a priori probabilities
of alternative hypotheses on the structure of information initiating memory
trace retrieval and modified ROCs (mROCs, a posteriori probabilities of correct
recall vs. false alarm probability) are introduced. The comparison of empirical
and calculated ROCs (or mROCs) demonstrates that they coincide quantitatively
and in this way intensities of cues used in appropriate experiments may be
estimated. It has been found that basic ROC properties which are one of
experimental findings underpinning dual-process models of recognition memory
can be explained within our one-factor NNAMM.
| [
{
"version": "v1",
"created": "Sun, 7 Sep 2003 20:11:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gopych",
"Petro M.",
""
]
] |
cs/0309008 | Eli Appleboim | Eli Appleboim, Emil Saucan | Digital Version of Green`s Theorem and its Application to The Coverage
Problem in Formal Verification | 13 Pages, 6 figures. Submitted to the IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems | null | null | null | cs.SC | null | We present a novel scheme to the coverage problem, introducing a quantitative
way to estimate the interaction between a block and its enviroment.This is
achieved by setting a discrete version of Green`s theorem, specially adapted
for Model Checking based verification of integrated circuits.This method is
best suited for the coverage problem since it enables one to quantify the
incompleteness or, on the other hand, the redundancy of a set of rules,
describing the model under verification.Moreover this can be done continuously
throughout the verification process, thus enabling the user to pinpoint the
stages at which incompleteness/redundancy occurs. Although the method is
presented locally on a small hardware example, we additionally show its
possibility to provide precise coverage estimation also for large scale
systems. We compare this method to others by checking it on the same
test-cases.
| [
{
"version": "v1",
"created": "Sun, 7 Sep 2003 05:13:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Appleboim",
"Eli",
""
],
[
"Saucan",
"Emil",
""
]
] |
cs/0309009 | Victor Eliashberg | Victor Eliashberg | What Is Working Memory and Mental Imagery? A Robot that Learns to
Perform Mental Computations | 31 pages, 16 figures | null | null | null | cs.AI cs.NE | null | This paper goes back to Turing (1936) and treats his machine as a cognitive
model (W,D,B), where W is an "external world" represented by memory device (the
tape divided into squares), and (D,B) is a simple robot that consists of the
sensory-motor devices, D, and the brain, B. The robot's sensory-motor devices
(the "eye", the "hand", and the "organ of speech") allow the robot to simulate
the work of any Turing machine. The robot simulates the internal states of a
Turing machine by "talking to itself." At the stage of training, the teacher
forces the robot (by acting directly on its motor centers) to perform several
examples of an algorithm with different input data presented on tape. Two
effects are achieved: 1) The robot learns to perform the shown algorithm with
any input data using the tape. 2) The robot learns to perform the algorithm
"mentally" using an "imaginary tape." The model illustrates the simplest
concept of a universal learning neurocomputer, demonstrates universality of
associative learning as the mechanism of programming, and provides a
simplified, but nontrivial neurobiologically plausible explanation of the
phenomena of working memory and mental imagery. The model is implemented as a
user-friendly program for Windows called EROBOT. The program is available at
www.brain0.com/software.html.
| [
{
"version": "v1",
"created": "Mon, 8 Sep 2003 07:31:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eliashberg",
"Victor",
""
]
] |
cs/0309010 | Ponomarenko | Dima Grigoriev, Ilia Ponomarenko | Homomorphic public-key cryptosystems over groups and rings | null | null | null | null | cs.CR | null | We propose a new homomorphic public-key cryptosystem over arbitrary
nonidentity finite group based on the difficulty of the membership problem for
groups of integer matrices. Besides, a homomorphic cryptosystem is designed for
the first time over finite commutative rings.
| [
{
"version": "v1",
"created": "Mon, 8 Sep 2003 18:08:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grigoriev",
"Dima",
""
],
[
"Ponomarenko",
"Ilia",
""
]
] |
cs/0309011 | Agust Egilsson | Agust S. Egilsson and Hakon Gudbjartsson | Indexing of Tables Referencing Complex Structures | 12 pages | null | null | null | cs.DB | null | We introduce indexing of tables referencing complex structures such as
digraphs and spatial objects, appearing in genetics and other data intensive
analysis. The indexing is achieved by extracting dimension schemas from the
referenced structures. The schemas and their dimensionality are determined by
proper coloring algorithms and the duality between all such schemas and all
such possible proper colorings is established. This duality, in turn, provides
us with an extensive library of solutions when addressing indexing questions.
It is illustrated how to use the schemas, in connection with additional
relational database technologies, to optimize queries conditioned on the
structural information being referenced. Comparisons using bitmap indexing in
the Oracle 9.2i database, on the one hand, and multidimensional clustering in
DB2 8.1.2, on the other hand, are used to illustrate the applicability of the
indexing to different technology settings. Finally, we illustrate how the
indexing can be used to extract low dimensional schemas from a binary interval
tree in order to resolve efficiently interval and stabbing queries.
| [
{
"version": "v1",
"created": "Mon, 8 Sep 2003 19:57:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Egilsson",
"Agust S.",
""
],
[
"Gudbjartsson",
"Hakon",
""
]
] |
cs/0309012 | Luis Rocha | C. Huang, L.M. Rocha | Exploration of RNA Editing and Design of Robust Genetic Algorithms | Proceedings of the 2003 IEEE Congress on Evolutionary Computation.
Camberra, Australia, December 2003 | null | null | LAUR 03-4314 | cs.NE cs.AI nlin.AO q-bio.GN | null | This paper presents our computational methodology using Genetic Algorithms
(GA) for exploring the nature of RNA editing. These models are constructed
using several genetic editing characteristics that are gleaned from the RNA
editing system as observed in several organisms. We have expanded the
traditional Genetic Algorithm with artificial editing mechanisms as proposed by
(Rocha, 1997). The incorporation of editing mechanisms provides a means for
artificial agents with genetic descriptions to gain greater phenotypic
plasticity, which may be environmentally regulated. Our first implementations
of these ideas have shed some light into the evolutionary implications of RNA
editing. Based on these understandings, we demonstrate how to select proper RNA
editors for designing more robust GAs, and the results will show promising
applications to real-world problems. We expect that the framework proposed will
both facilitate determining the evolutionary role of RNA editing in biology,
and advance the current state of research in Genetic Algorithms.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2003 04:25:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huang",
"C.",
""
],
[
"Rocha",
"L. M.",
""
]
] |
cs/0309013 | Luis Rocha | L.M. Rocha | Semi-metric Behavior in Document Networks and its Application to
Recommendation Systems | null | In: Soft Computing Agents: A New Perspective for Dynamic
Information Systems. V. Loia (Ed.) International Series Frontiers in
Artificial Intelligence and Applications. IOS Press, pp. 137-163, 2002 | null | null | cs.IR cond-mat.dis-nn cond-mat.stat-mech cs.AI cs.DL cs.HC cs.MA | null | Recommendation systems for different Document Networks (DN) such as the World
Wide Web (WWW) and Digital Libraries, often use distance functions extracted
from relationships among documents and keywords. For instance, documents in the
WWW are related via a hyperlink network, while documents in bibliographic
databases are related by citation and collaboration networks. Furthermore,
documents are related to keyterms. The distance functions computed from these
relations establish associative networks among items of the DN, referred to as
Distance Graphs, which allow recommendation systems to identify relevant
associations for individual users. However, modern recommendation systems need
to integrate associative data from multiple sources such as different
databases, web sites, and even other users. Thus, we are presented with a
problem of combining evidence (about associations between items) from different
sources characterized by distance functions. In this paper we describe our work
on (1) inferring relevant associations from, as well as characterizing,
semi-metric distance graphs and (2) combining evidence from different distance
graphs in a recommendation system. Regarding (1), we present the idea of
semi-metric distance graphs, and introduce ratios to measure semi-metric
behavior. We compute these ratios for several DN such as digital libraries and
web sites and show that they are useful to identify implicit associations.
Regarding (2), we describe an algorithm to combine evidence from distance
graphs that uses Evidence Sets, a set structure based on Interval Valued Fuzzy
Sets and Dempster-Shafer Theory of Evidence. This algorithm has been developed
for a recommendation system named TalkMine.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2003 05:24:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rocha",
"L. M.",
""
]
] |
cs/0309014 | Sandor P. Fekete | Esther M. Arkin, Michael A. Bender, Erik D. Demaine, Sandor P. Fekete,
Joseph S. B. Mitchell, and Saurabh Sethia | Optimal Covering Tours with Turn Costs | 36 pages, 19 figures, 2 tables, Latex; to appear in SIAM Journal on
Computing. New version contains more technical details in Sections 4.1, 5.1,
5.2, 5.5, four more figures, four more pages, as well as numerous smaller
changes | null | null | null | cs.DS cs.CG | null | We give the first algorithmic study of a class of ``covering tour'' problems
related to the geometric Traveling Salesman Problem: Find a polygonal tour for
a cutter so that it sweeps out a specified region (``pocket''), in order to
minimize a cost that depends mainly on the number of em turns. These problems
arise naturally in manufacturing applications of computational geometry to
automatic tool path generation and automatic inspection systems, as well as arc
routing (``postman'') problems with turn penalties. We prove the
NP-completeness of minimum-turn milling and give efficient approximation
algorithms for several natural versions of the problem, including a
polynomial-time approximation scheme based on a novel adaptation of the
m-guillotine method.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2003 20:16:30 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Jun 2005 08:25:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arkin",
"Esther M.",
""
],
[
"Bender",
"Michael A.",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Sethia",
"Saurabh",
""
]
] |
cs/0309015 | Dominik Janzing | Dominik Janzing and Daniel Herrmann | Reliable and Efficient Inference of Bayesian Networks from Sparse Data
by Statistical Learning Theory | 12 pages | null | null | null | cs.LG | null | To learn (statistical) dependencies among random variables requires
exponentially large sample size in the number of observed random variables if
any arbitrary joint probability distribution can occur.
We consider the case that sparse data strongly suggest that the probabilities
can be described by a simple Bayesian network, i.e., by a graph with small
in-degree \Delta. Then this simple law will also explain further data with high
confidence. This is shown by calculating bounds on the VC dimension of the set
of those probability measures that correspond to simple graphs. This allows to
select networks by structural risk minimization and gives reliability bounds on
the error of the estimated joint measure without (in contrast to a previous
paper) any prior assumptions on the set of possible joint measures.
The complexity for searching the optimal Bayesian networks of in-degree
\Delta increases only polynomially in the number of random varibales for
constant \Delta and the optimal joint measure associated with a given graph can
be found by convex optimization.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2003 13:56:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Janzing",
"Dominik",
""
],
[
"Herrmann",
"Daniel",
""
]
] |
cs/0309016 | Liam Wagner | Stuart McDonald and Liam Wagner | Using Simulated Annealing to Calculate the Trembles of Trembling Hand
Perfection | To appear in the Proceedings of IEEE Congress on Evolutionary
Computation 2003 (CEC'03) | Proceedings of IEEE Congress on Evolutionary Computation 2003,
vol.4, pp. 2482-2489 | null | null | cs.GT cs.CC cs.DS cs.LG cs.NE q-bio.PE | null | Within the literature on non-cooperative game theory, there have been a
number of attempts to propose logorithms which will compute Nash equilibria.
Rather than derive a new algorithm, this paper shows that the family of
algorithms known as Markov chain Monte Carlo (MCMC) can be used to calculate
Nash equilibria. MCMC is a type of Monte Carlo simulation that relies on Markov
chains to ensure its regularity conditions. MCMC has been widely used
throughout the statistics and optimization literature, where variants of this
algorithm are known as simulated annealing. This paper shows that there is
interesting connection between the trembles that underlie the functioning of
this algorithm and the type of Nash refinement known as trembling hand
perfection.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2003 15:11:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McDonald",
"Stuart",
""
],
[
"Wagner",
"Liam",
""
]
] |
cs/0309017 | David Renault | David Renault | Enumerating planar locally finite Cayley graphs | 19 pages, 6 PostScript figures, 12 embedded PsTricks figures. An
additional file (~ 438ko.) containing the figures in appendix might be found
at http://www.labri.fr/Perso/~renault/research/pages.ps.gz | null | null | null | cs.DM | null | We characterize the set of planar locally finite Cayley graphs, and give a
finite representation of these graphs by a special kind of finite state
automata called labeling schemes. As a result, we are able to enumerate and
describe all planar locally finite Cayley graphs of a given degree. This
analysis allows us to solve the problem of decision of the locally finite
planarity for a word-problem-decidable presentation.
Keywords: vertex-transitive, Cayley graph, planar graph, tiling, labeling
scheme
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2003 09:59:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Renault",
"David",
""
]
] |
cs/0309019 | Atsushi Fujii | Atsushi Fujii and Katunobu Itou | Building a Test Collection for Speech-Driven Web Retrieval | null | Proceedings of the 8th European Conference on Speech Communication
and Technology (Eurospeech 2003), pp.1153-1156, Sep. 2003 | null | null | cs.CL | null | This paper describes a test collection (benchmark data) for retrieval systems
driven by spoken queries. This collection was produced in the subtask of the
NTCIR-3 Web retrieval task, which was performed in a TREC-style evaluation
workshop. The search topics and document collection for the Web retrieval task
were used to produce spoken queries and language models for speech recognition,
respectively. We used this collection to evaluate the performance of our
retrieval system. Experimental results showed that (a) the use of target
documents for language modeling and (b) enhancement of the vocabulary size in
speech recognition were effective in improving the system performance.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2003 12:43:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Itou",
"Katunobu",
""
]
] |
cs/0309020 | Stephan Mertens | Stephan Mertens, Marc Mezard and Riccardo Zecchina | Threshold values of Random K-SAT from the cavity method | 38 pages; extended explanations and derivations; this version is
going to appear in Random Structures & Algorithms | null | null | null | cs.CC cond-mat.dis-nn cs.DM | null | Using the cavity equations of
\cite{mezard:parisi:zecchina:02,mezard:zecchina:02}, we derive the various
threshold values for the number of clauses per variable of the random
$K$-satisfiability problem, generalizing the previous results to $K \ge 4$. We
also give an analytic solution of the equations, and some closed expressions
for these thresholds, in an expansion around large $K$. The stability of the
solution is also computed. For any $K$, the satisfiability threshold is found
to be in the stable region of the solution, which adds further credit to the
conjecture that this computation gives the exact satisfiability threshold.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2003 19:59:10 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Feb 2005 15:35:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mertens",
"Stephan",
""
],
[
"Mezard",
"Marc",
""
],
[
"Zecchina",
"Riccardo",
""
]
] |
cs/0309021 | Atsushi Fujii | Atsushi Fujii, Katunobu Itou, Tomoyosi Akiba, and Tetsuya Ishikawa | A Cross-media Retrieval System for Lecture Videos | null | Proceedings of the 8th European Conference on Speech Communication
and Technology (Eurospeech 2003), pp.1149-1152, Sep. 2003 | null | null | cs.CL | null | We propose a cross-media lecture-on-demand system, in which users can
selectively view specific segments of lecture videos by submitting text
queries. Users can easily formulate queries by using the textbook associated
with a target lecture, even if they cannot come up with effective keywords. Our
system extracts the audio track from a target lecture video, generates a
transcription by large vocabulary continuous speech recognition, and produces a
text index. Experimental results showed that by adapting speech recognition to
the topic of the lecture, the recognition accuracy increased and the retrieval
accuracy was comparable with that obtained by human transcription.
| [
{
"version": "v1",
"created": "Sat, 13 Sep 2003 06:54:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Itou",
"Katunobu",
""
],
[
"Akiba",
"Tomoyosi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/0309022 | Thomas Severiens | Christian Thiemann, Michael Schlenker, Thomas Severiens | Proposed Specification of a Distributed XML-Query Network | null | null | null | null | cs.DC cs.IR | null | W3C's XML-Query language offers a powerful instrument for information
retrieval on XML repositories. This article describes an implementation of this
retrieval in a real world's scenario. Distributed XML-Query processing reduces
load on every single attending node to an acceptable level. The network allows
every participant to control their computing load themselves. Furthermore
XML-repositories may stay at the rights holder, so every Data-Provider can
decide, whether to process critical queries or not. If Data-Providers keep
redundant information, this distributed network improves reliability of
information with duplicates removed.
| [
{
"version": "v1",
"created": "Sat, 13 Sep 2003 19:24:56 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Oct 2003 13:01:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thiemann",
"Christian",
""
],
[
"Schlenker",
"Michael",
""
],
[
"Severiens",
"Thomas",
""
]
] |
cs/0309024 | Carroll Morgan | Annabelle McIver and Carroll Morgan | Results on the quantitative mu-calculus qMu | 45 pages, 4 figures | null | null | null | cs.LO cs.GT | null | The mu-calculus is a powerful tool for specifying and verifying transition
systems, including those with both demonic and angelic choice; its quantitative
generalisation qMu extends that to probabilistic choice.
We show that for a finite-state system the logical interpretation of qMu, via
fixed-points in a domain of real-valued functions into [0,1], is equivalent to
an operational interpretation given as a turn-based gambling game between two
players.
The logical interpretation provides direct access to axioms, laws and
meta-theorems. The operational, game- based interpretation aids the intuition
and continues in the more general context to provide a surprisingly practical
specification tool.
A corollary of our proofs is an extension of Everett's singly-nested games
result in the finite turn-based case: we prove well-definedness of the minimax
value, and existence of fixed memoriless strategies, for all qMu
games/formulae, of arbitrary (including alternating) nesting structure.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2003 03:35:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McIver",
"Annabelle",
""
],
[
"Morgan",
"Carroll",
""
]
] |
cs/0309025 | Johan Schubert | Johan Schubert | Evidential Force Aggregation | 7 pages, 2 figures | in Proceedings of the Sixth International Conference on
Information Fusion (FUSION 2003), pp. 1223-1229, Cairns, Australia, 8-11 July
2003, International Society of Information Fusion, 2003 | null | FOI-S-0960-SE | cs.AI | null | In this paper we develop an evidential force aggregation method intended for
classification of evidential intelligence into recognized force structures. We
assume that the intelligence has already been partitioned into clusters and use
the classification method individually in each cluster. The classification is
based on a measure of fitness between template and fused intelligence that
makes it possible to handle intelligence reports with multiple nonspecific and
uncertain propositions. With this measure we can aggregate on a level-by-level
basis, starting from general intelligence to achieve a complete force structure
with recognized units on all hierarchical levels.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2003 07:20:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schubert",
"Johan",
""
]
] |
cs/0309026 | Mark Little | Mark C. Little | A thought experiment on Quantum Mechanics and Distributed Failure
Detection | null | null | null | null | cs.DC | null | One of the biggest problems in current distributed systems is that presented
by one machine attempting to determine the liveness of another in a timely
manner. Unfortunately, the symptoms exhibited by a failed machine can also be
the result of other causes, e.g., an overloaded machine or network which drops
messages, making it impossible to detect a machine failure with cetainty until
that machine recovers. This is a well understood problem and one which has led
to a large body of research into failure suspectors: since it is not possible
to detect a failure, the best one can do is suspect a failure and program
accordingly. However, one machine's suspicions may not be the same as
another's; therefore, these algorithms spend a considerable effort in ensuring
a consistent view among all available machines of who is suspects of being
failed. This paper describes a thought experiment on how quantum mechanics may
be used to provide a failure detector that is guaranteed to give both accurate
and instantaneous information about the liveness of machines, no matter the
distances involved.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2003 10:43:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Little",
"Mark C.",
""
]
] |
cs/0309027 | Michiel Ronsse | Michiel Ronsse and Koen De Bosschere | Proceedings of the Fifth International Workshop on Automated Debugging
(AADEBUG 2003) | Workshop homepage at http://www.elis.UGent.be/aadebug2003/ | null | null | null | cs.SE cs.PL | null | Over the past decades automated debugging has seen major achievements.
However, as debugging is by necessity attached to particular programming
paradigms, the results are scattered. To alleviate this problem, the Automated
and Algorithmic Debugging workshop (AADEBUG for short) was organised in 1993 in
Link"oping (Sweden). As this workshop proved to be successful, subsequent
workshops have been organised in 1995 (Saint-Malo, France), 1997 (again in
Link"oping, Sweden) and 2000 (Munich, Germany). In 2003, the workshop is
organised in Ghent, Belgium, the proceedings of which you are reading right
now.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2003 14:58:32 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Nov 2003 12:47:27 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Feb 2004 09:58:08 GMT"
},
{
"version": "v4",
"created": "Tue, 21 Dec 2004 14:59:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ronsse",
"Michiel",
""
],
[
"De Bosschere",
"Koen",
""
]
] |
cs/0309028 | Roberto Bagnara | Fred Mesnard and Roberto Bagnara | cTI: A constraint-based termination inference tool for ISO-Prolog | 16 pages, 3 tables, to appear on "Theory and Practice of Logic
Programming" | null | null | null | cs.PL | null | We present cTI, the first system for universal left-termination inference of
logic programs. Termination inference generalizes termination analysis and
checking. Traditionally, a termination analyzer tries to prove that a given
class of queries terminates. This class must be provided to the system, for
instance by means of user annotations. Moreover, the analysis must be redone
every time the class of queries of interest is updated. Termination inference,
in contrast, requires neither user annotations nor recomputation. In this
approach, terminating classes for all predicates are inferred at once. We
describe the architecture of cTI and report an extensive experimental
evaluation of the system covering many classical examples from the logic
programming termination literature and several Prolog programs of respectable
size and complexity.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2003 07:43:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mesnard",
"Fred",
""
],
[
"Bagnara",
"Roberto",
""
]
] |
cs/0309030 | Wolfgang Mayer | Wolfgang Mayer and Markus Stumptner | Model-Based Debugging using Multiple Abstract Models | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.SE cs.AI | null | This paper introduces an automatic debugging framework that relies on
model-based reasoning techniques to locate faults in programs. In particular,
model-based diagnosis, together with an abstract interpretation based conflict
detection mechanism is used to derive diagnoses, which correspond to possible
faults in programs. Design information and partial specifications are applied
to guide a model revision process, which allows for automatic detection and
correction of structural faults.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2003 03:49:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mayer",
"Wolfgang",
""
],
[
"Stumptner",
"Markus",
""
]
] |
cs/0309031 | Kazutaka Maruyama | Kazutaka Maruyama, Minoru Terada | Timestamp Based Execution Control for C and Java Programs | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.SE | null | Many programmers have had to deal with an overwritten variable resulting for
example from an aliasing problem. The culprit is obviously the last
write-access to that memory location before the manifestation of the bug. The
usual technique for removing such bugs starts with the debugger by (1) finding
the last write and (2) moving the control point of execution back to that time
by re-executing the program from the beginning. We wish to automate this. Step
(2) is easy if we can somehow mark the last write found in step (1) and control
the execution-point to move it back to this time.
In this paper we propose a new concept, position, that is, a point in the
program execution trace, as needed for step (2) above. The position enables
debuggers to automate the control of program execution to support common
debugging activities. We have implemented position in C by modifying GCC and in
Java with a bytecode transformer. Measurements show that position can be
provided with an acceptable amount of overhead.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2003 06:35:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maruyama",
"Kazutaka",
""
],
[
"Terada",
"Minoru",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.