id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0309032 | Alexandre Tessier | Gerard Ferrand, Willy Lesaint, Alexandre Tessier | Towards declarative diagnosis of constraint programs over finite domains | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.SE | null | The paper proposes a theoretical approach of the debugging of constraint
programs based on a notion of explanation tree. The proposed approach is an
attempt to adapt algorithmic debugging to constraint programming. In this
theoretical framework for domain reduction, explanations are proof trees
explaining value removals. These proof trees are defined by inductive
definitions which express the removals of values as consequences of other value
removals. Explanations may be considered as the essence of constraint
programming. They are a declarative view of the computation trace. The
diagnosis consists in locating an error in an explanation rooted by a symptom.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2003 12:42:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ferrand",
"Gerard",
""
],
[
"Lesaint",
"Willy",
""
],
[
"Tessier",
"Alexandre",
""
]
] |
cs/0309033 | Pranab Sen | Pranab Sen and S. Venkatesh | Lower bounds for predecessor searching in the cell probe model | Journal version of a paper at ICALP 2001 (quant-ph/0104100) and a
paper at CCC 2003. 27 pages | null | null | null | cs.CC cs.DS quant-ph | null | We consider a fundamental problem in data structures, static predecessor
searching: Given a subset S of size n from the universe [m], store S so that
queries of the form "What is the predecessor of x in S?" can be answered
efficiently. We study this problem in the cell probe model introduced by Yao.
Recently, Beame and Fich obtained optimal bounds on the number of probes needed
by any deterministic query scheme if the associated storage scheme uses only
n^{O(1)} cells of word size (\log m)^{O(1)} bits. We give a new lower bound
proof for this problem that matches the bounds of Beame and Fich. Our lower
bound proof has the following advantages: it works for randomised query schemes
too, while Beame and Fich's proof works for deterministic query schemes only.
It also extends to `quantum address-only' query schemes that we define in this
paper, and is simpler than Beame and Fich's proof. We prove our lower bound
using the round elimination approach of Miltersen, Nisan, Safra and Wigderson.
Using tools from information theory, we prove a strong round elimination lemma
for communication complexity that enables us to obtain a tight lower bound for
the predecessor problem. Our strong round elimination lemma also extends to
quantum communication complexity. We also use our round elimination lemma to
obtain a rounds versus communication tradeoff for the `greater-than' problem,
improving on the tradeoff in Miltersen et al. We believe that our round
elimination lemma is of independent interest and should have other
applications.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2003 19:14:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sen",
"Pranab",
""
],
[
"Venkatesh",
"S.",
""
]
] |
cs/0309034 | Peter Turney | Peter D. Turney (National Research Council of Canada), Michael L.
Littman (Rutgers University) | Measuring Praise and Criticism: Inference of Semantic Orientation from
Association | 37 pages, related work available at
http://www.cs.rutgers.edu/~mlittman/ and http://purl.org/peter.turney/ | ACM Transactions on Information Systems (TOIS), (2003), 21 (4),
315-346 | null | NRC-46516 | cs.CL cs.IR cs.LG | null | The evaluative character of a word is called its semantic orientation.
Positive semantic orientation indicates praise (e.g., "honest", "intrepid") and
negative semantic orientation indicates criticism (e.g., "disturbing",
"superfluous"). Semantic orientation varies in both direction (positive or
negative) and degree (mild to strong). An automated system for measuring
semantic orientation would have application in text classification, text
filtering, tracking opinions in online discussions, analysis of survey
responses, and automated chat systems (chatbots). This paper introduces a
method for inferring the semantic orientation of a word from its statistical
association with a set of positive and negative paradigm words. Two instances
of this approach are evaluated, based on two different statistical measures of
word association: pointwise mutual information (PMI) and latent semantic
analysis (LSA). The method is experimentally tested with 3,596 words (including
adjectives, adverbs, nouns, and verbs) that have been manually labeled positive
(1,614 words) and negative (1,982 words). The method attains an accuracy of
82.8% on the full test set, but the accuracy rises above 95% when the algorithm
is allowed to abstain from classifying mild words.
| [
{
"version": "v1",
"created": "Fri, 19 Sep 2003 16:30:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
],
[
"Littman",
"Michael L.",
"",
"Rutgers University"
]
] |
cs/0309035 | Peter Turney | Peter D. Turney, Michael L. Littman, Jeffrey Bigham, Victor Shnayder | Combining Independent Modules to Solve Multiple-choice Synonym and
Analogy Problems | 8 pages, related work available at
http://www.cs.rutgers.edu/~mlittman/ and http://purl.org/peter.turney/ | Proceedings of the International Conference on Recent Advances in
Natural Language Processing (RANLP-03), (2003), Borovets, Bulgaria, 482-489 | null | NRC-46506 | cs.CL cs.IR cs.LG | null | Existing statistical approaches to natural language problems are very coarse
approximations to the true complexity of language processing. As such, no
single technique will be best for all problem instances. Many researchers are
examining ensemble methods that combine the output of successful, separately
developed modules to create more accurate solutions. This paper examines three
merging rules for combining probability distributions: the well known mixture
rule, the logarithmic rule, and a novel product rule. These rules were applied
with state-of-the-art results to two problems commonly used to assess human
mastery of lexical semantics -- synonym questions and analogy questions. All
three merging rules result in ensembles that are more accurate than any of
their component modules. The differences among the three rules are not
statistically significant, but it is suggestive that the popular mixture rule
is not the best rule for either of the two problems.
| [
{
"version": "v1",
"created": "Fri, 19 Sep 2003 20:13:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
""
],
[
"Littman",
"Michael L.",
""
],
[
"Bigham",
"Jeffrey",
""
],
[
"Shnayder",
"Victor",
""
]
] |
cs/0309036 | Petro M. Gopych | Petro M. Gopych | A Neural Network Assembly Memory Model Based on an Optimal Binary Signal
Detection Theory | The revised contribution submitted to the 1st International Workshop
on the Future of Neural Networks (FUNN 2003) held on July 5, 2003, Eindhoven,
the Netherlands (Workshop affiliated to ICALP 2003, June 30 - July 4, 2003),
12 pages, 3 Figures, 23 references | Problemy Programmirovaniya (Programming Problems, Kyiv, Ukraine),
2004, no. 2-3, pp. 473-479. | null | null | cs.AI cs.IR cs.NE q-bio.NC q-bio.QM | null | A ternary/binary data coding algorithm and conditions under which Hopfield
networks implement optimal convolutional or Hamming decoding algorithms has
been described. Using the coding/decoding approach (an optimal Binary Signal
Detection Theory, BSDT) introduced a Neural Network Assembly Memory Model
(NNAMM) is built. The model provides optimal (the best) basic memory
performance and demands the use of a new memory unit architecture with
two-layer Hopfield network, N-channel time gate, auxiliary reference memory,
and two nested feedback loops. NNAMM explicitly describes the dependence on
time of a memory trace retrieval, gives a possibility of metamemory simulation,
generalized knowledge representation, and distinct description of conscious and
unconscious mental processes. A model of smallest inseparable part or an "atom"
of consciousness is also defined. The NNAMM's neurobiological backgrounds and
its applications to solving some interdisciplinary problems are shortly
discussed. BSDT could implement the "best neural code" used in nervous tissues
of animals and humans.
| [
{
"version": "v1",
"created": "Sun, 21 Sep 2003 17:11:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gopych",
"Petro M.",
""
]
] |
cs/0309037 | Bryan Cantrill | Bryan M. Cantrill | Postmortem Object Type Identification | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.SE | null | This paper presents a novel technique for the automatic type identification
of arbitrary memory objects from a memory dump. Our motivating application is
debugging memory corruption problems in optimized, production systems -- a
problem domain largely unserved by extant methodologies. We describe our
algorithm as applicable to any typed language, and we discuss it with respect
to the formidable obstacles posed by C. We describe the heuristics that we have
developed to overcome these difficulties and achieve effective type
identification on C-based systems. We further describe the implementation of
our heuristics on one C-based system -- the Solaris operating system kernel --
and describe the extensions that we have added to the Solaris postmortem
debugger to allow for postmortem type identification. We show that our
implementation yields a sufficiently high rate of type identification to be
useful for debugging memory corruption problems. Finally, we discuss some of
the novel automated debugging mechanisms that can be layered upon postmortem
type identification.
| [
{
"version": "v1",
"created": "Mon, 22 Sep 2003 00:52:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cantrill",
"Bryan M.",
""
]
] |
cs/0309038 | Valmir Barbosa | V. C. Barbosa, L. C. D. Campos | A novel evolutionary formulation of the maximum independent set problem | null | Journal of Combinatorial Optimization 8 (2004), 419-437 | 10.1007/s10878-004-4835-9 | ES-615/03 | cs.NE | null | We introduce a novel evolutionary formulation of the problem of finding a
maximum independent set of a graph. The new formulation is based on the
relationship that exists between a graph's independence number and its acyclic
orientations. It views such orientations as individuals and evolves them with
the aid of evolutionary operators that are very heavily based on the structure
of the graph and its acyclic orientations. The resulting heuristic has been
tested on some of the Second DIMACS Implementation Challenge benchmark graphs,
and has been found to be competitive when compared to several of the other
heuristics that have also been tested on those graphs.
| [
{
"version": "v1",
"created": "Mon, 22 Sep 2003 13:05:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barbosa",
"V. C.",
""
],
[
"Campos",
"L. C. D.",
""
]
] |
cs/0309039 | Valmir Barbosa | V. C. Barbosa, C. A. G. Assis, J. O. do Nascimento | Two novel evolutionary formulations of the graph coloring problem | To appear in Journal of Combinatorial Optimization | Journal of Combinatorial Optimization 8 (2004), 41-63 | 10.1023/B:JOCO.0000021937.26468.b2 | ES-553/01 | cs.NE | null | We introduce two novel evolutionary formulations of the problem of coloring
the nodes of a graph. The first formulation is based on the relationship that
exists between a graph's chromatic number and its acyclic orientations. It
views such orientations as individuals and evolves them with the aid of
evolutionary operators that are very heavily based on the structure of the
graph and its acyclic orientations. The second formulation, unlike the first
one, does not tackle one graph at a time, but rather aims at evolving a
`program' to color all graphs belonging to a class whose members all have the
same number of nodes and other common attributes. The heuristics that result
from these formulations have been tested on some of the Second DIMACS
Implementation Challenge benchmark graphs, and have been found to be
competitive when compared to the several other heuristics that have also been
tested on those graphs.
| [
{
"version": "v1",
"created": "Tue, 23 Sep 2003 00:53:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barbosa",
"V. C.",
""
],
[
"Assis",
"C. A. G.",
""
],
[
"Nascimento",
"J. O. do",
""
]
] |
cs/0309040 | Valmir Barbosa | L. D. Penso, V. C. Barbosa | A distributed algorithm to find k-dominating sets | To appear in Discrete Applied Mathematics | Discrete Applied Mathematics 141 (2004), 243-253 | 10.1016/S0166-218X(03)00368-8 | ES-552/01 | cs.DC | null | We consider a connected undirected graph $G(n,m)$ with $n$ nodes and $m$
edges. A $k$-dominating set $D$ in $G$ is a set of nodes having the property
that every node in $G$ is at most $k$ edges away from at least one node in $D$.
Finding a $k$-dominating set of minimum size is NP-hard. We give a new
synchronous distributed algorithm to find a $k$-dominating set in $G$ of size
no greater than $\lfloor n/(k+1)\rfloor$. Our algorithm requires $O(k\log^*n)$
time and $O(m\log k+n\log k\log^*n)$ messages to run. It has the same time
complexity as the best currently known algorithm, but improves on that
algorithm's message complexity and is, in addition, conceptually simpler.
| [
{
"version": "v1",
"created": "Tue, 23 Sep 2003 01:14:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Penso",
"L. D.",
""
],
[
"Barbosa",
"V. C.",
""
]
] |
cs/0309041 | Konstantin Rybnikov | Konstantin Rybnikov | Fast Verification of Convexity of Piecewise-linear Surfaces | 10 pages (abbreviated version). Significantly different from all
older versions. Discount the previous version -- it had many omissions and
typos, like the following one: everything works starting from dimension n=3,
not n=2 as was printed in the old abstract. Hyperbolic and spherical cases
have been substantially rewritten and errors fixed. This preprint is close to
a similar preprint on the MATH part of arxiv.org | null | null | null | cs.CG cs.CV | null | We show that a realization of a closed connected PL-manifold of dimension n-1
in n-dimensional Euclidean space (n>2) is the boundary of a convex polyhedron
(finite or infinite) if and only if the interior of each (n-3)-face has a
point, which has a neighborhood lying on the boundary of an n-dimensional
convex body. No initial assumptions about the topology or orientability of the
input surface are made. The theorem is derived from a refinement and
generalization of Van Heijenoort's theorem on locally convex manifolds to
spherical spaces. Our convexity criterion for PL-manifolds implies an easy
polynomial-time algorithm for checking convexity of a given PL-surface in
n-dimensional Euclidean or spherical space, n>2. The algorithm is worst case
optimal with respect to both the number of operations and the algebraic degree.
The algorithm works under significantly weaker assumptions and is easier to
implement than convexity verification algorithms suggested by Mehlhorn et al
(1996-1999), and Devillers et al.(1998). A paradigm of approximate convexity is
suggested and a simplified algorithm of smaller degree and complexity is
suggested for approximate floating point convexity verification.
| [
{
"version": "v1",
"created": "Tue, 23 Sep 2003 06:47:28 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Nov 2003 11:23:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rybnikov",
"Konstantin",
""
]
] |
cs/0309042 | Valmir Barbosa | L. M. A. Drummond, V. C. Barbosa | On reducing the complexity of matrix clocks | null | Parallel Computing 29 (2003), 895-905 | 10.1016/S0167-8191(03)00066-8 | null | cs.DC | null | Matrix clocks are a generalization of the notion of vector clocks that allows
the local representation of causal precedence to reach into an asynchronous
distributed computation's past with depth $x$, where $x\ge 1$ is an integer.
Maintaining matrix clocks correctly in a system of $n$ nodes requires that
everymessage be accompanied by $O(n^x)$ numbers, which reflects an exponential
dependency of the complexity of matrix clocks upon the desired depth $x$. We
introduce a novel type of matrix clock, one that requires only $nx$ numbers to
be attached to each message while maintaining what for many applications may be
the most significant portion of the information that the original matrix clock
carries. In order to illustrate the new clock's applicability, we demonstrate
its use in the monitoring of certain resource-sharing computations.
| [
{
"version": "v1",
"created": "Tue, 23 Sep 2003 12:57:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Drummond",
"L. M. A.",
""
],
[
"Barbosa",
"V. C.",
""
]
] |
cs/0309043 | Valmir Barbosa | A. H. L. Porto, V. C. Barbosa | Finding approximate palindromes in strings | null | Pattern Recognition 35 (2002), 2581-2591 | 10.1016/S0031-3203(01)00179-0 | null | cs.DS | null | We introduce a novel definition of approximate palindromes in strings, and
provide an algorithm to find all maximal approximate palindromes in a string
with up to $k$ errors. Our definition is based on the usual edit operations of
approximate pattern matching, and the algorithm we give, for a string of size
$n$ on a fixed alphabet, runs in $O(k^2 n)$ time. We also discuss two
implementation-related improvements to the algorithm, and demonstrate their
efficacy in practice by means of both experiments and an average-case analysis.
| [
{
"version": "v1",
"created": "Tue, 23 Sep 2003 13:45:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Porto",
"A. H. L.",
""
],
[
"Barbosa",
"V. C.",
""
]
] |
cs/0309045 | Gianfranco Rossi | Agostino Dovier, Carla Piazza and Gianfranco Rossi | A uniform approach to constraint-solving for lists, multisets, compact
lists, and sets | 27 pages, 11 figures | null | null | "Quaderni del Dipartimento di Matematica", 235 | cs.PL cs.LO cs.SC | null | Lists, multisets, and sets are well-known data structures whose usefulness is
widely recognized in various areas of Computer Science. These data structures
have been analyzed from an axiomatic point of view with a parametric approach
in (*) where the relevant unification algorithms have been developed. In this
paper we extend these results considering more general constraints including
not only equality but also membership constraints as well as their negative
counterparts.
(*) A. Dovier, A. Policriti, and G. Rossi. A uniform axiomatic view of lists,
multisets, and sets, and the relevant unification algorithms. Fundamenta
Informaticae, 36(2/3):201--234, 1998.
| [
{
"version": "v1",
"created": "Wed, 24 Sep 2003 10:08:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dovier",
"Agostino",
""
],
[
"Piazza",
"Carla",
""
],
[
"Rossi",
"Gianfranco",
""
]
] |
cs/0309047 | Andreas Zeller | Andreas Zeller | Causes and Effects in Computer Programs | null | null | null | null | cs.SE | null | Debugging is commonly understood as finding and fixing the cause of a
problem. But what does ``cause'' mean? How can we find causes? How can we prove
that a cause is a cause--or even ``the'' cause? This paper defines common terms
in debugging, highlights the principal techniques, their capabilities and
limitations.
| [
{
"version": "v1",
"created": "Wed, 24 Sep 2003 12:51:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zeller",
"Andreas",
""
]
] |
cs/0309048 | Juergen Schmidhuber | Juergen Schmidhuber | Goedel Machines: Self-Referential Universal Problem Solvers Making
Provably Optimal Self-Improvements | 29 pages, 1 figure, minor improvements, updated references | Variants published in "Adaptive Agents and Multi-Agent Systems
II", LNCS 3394, p. 1-23, Springer, 2005: ISBN 978-3-540-25260-3; as well as
in Proc. ICANN 2005, LNCS 3697, p. 223-233, Springer, 2005 (plenary talk); as
well as in "Artificial General Intelligence", Series: Cognitive Technologies,
Springer, 2006: ISBN-13: 978-3-540-23733-4 | null | IDSIA-19-03 | cs.LO cs.AI | null | We present the first class of mathematically rigorous, general, fully
self-referential, self-improving, optimally efficient problem solvers. Inspired
by Kurt Goedel's celebrated self-referential formulas (1931), such a problem
solver rewrites any part of its own code as soon as it has found a proof that
the rewrite is useful, where the problem-dependent utility function and the
hardware and the entire initial code are described by axioms encoded in an
initial proof searcher which is also part of the initial code. The searcher
systematically and efficiently tests computable proof techniques (programs
whose outputs are proofs) until it finds a provably useful, computable
self-rewrite. We show that such a self-rewrite is globally optimal - no local
maxima! - since the code first had to prove that it is not useful to continue
the proof search for alternative self-rewrites. Unlike previous
non-self-referential methods based on hardwired proof searchers, ours not only
boasts an optimal order of complexity but can optimally reduce any slowdowns
hidden by the O()-notation, provided the utility of such speed-ups is provable
at all.
| [
{
"version": "v1",
"created": "Thu, 25 Sep 2003 15:59:46 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Oct 2003 09:56:02 GMT"
},
{
"version": "v3",
"created": "Thu, 11 Dec 2003 09:34:17 GMT"
},
{
"version": "v4",
"created": "Mon, 27 Dec 2004 11:16:21 GMT"
},
{
"version": "v5",
"created": "Sun, 17 Dec 2006 23:01:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidhuber",
"Juergen",
""
]
] |
cs/0309049 | Jo\~ao Louren\c{c}o | Joao Lourenco, Jose C. Cunha, Vitor Moreira | Control and Debugging of Distributed Programs Using Fiddle | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.DC | null | The main goal of Fiddle, a distributed debugging engine, is to provide a
flexible platform for developing debugging tools. Fiddle provides a layered set
of interfaces with a minimal set of debugging functionalities, for the
inspection and control of distributed and multi-threaded applications.
This paper illustrates how Fiddle is used to support integrated testing and
debugging. The approach described is based on a tool, called Deipa, that
interprets sequences of commands read from an input file, generated by an
independent testing tool. Deipa acts as a Fiddle client, in order to enforce
specific execution paths in a distributed PVM program. Other Fiddle clients may
be used along with Deipa for the fine debugging at process level. Fiddle and
Deipa functionalities and architectures are described, and a working example
shows a step-by-step application of these tools.
| [
{
"version": "v1",
"created": "Fri, 26 Sep 2003 11:49:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lourenco",
"Joao",
""
],
[
"Cunha",
"Jose C.",
""
],
[
"Moreira",
"Vitor",
""
]
] |
cs/0309050 | W. A. Zuniga-Galindo | W. A. Zuniga-Galindo | Computing Igusa's Local Zeta Functions of Univariate Polynomials, and
Linear Feedback Shift Registers | To appear in The Journal of Integer Sequences | null | null | null | cs.SC cs.CR | null | We give a polynomial time algorithm for computing the Igusa local zeta
function $Z(s,f)$ attached to a polynomial $f(x)\in \QTR{Bbb}{Z}[x]$, in one
variable, with splitting field $\QTR{Bbb}{Q}$, and a prime number $p$. We also
propose a new class of Linear Feedback Shift Registers based on the computation
of Igusa's local zeta function.
| [
{
"version": "v1",
"created": "Fri, 26 Sep 2003 22:57:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zuniga-Galindo",
"W. A.",
""
]
] |
cs/0309051 | Oded Regev | Oded Regev | New Lattice Based Cryptographic Constructions | null | null | null | null | cs.CR | null | We introduce the use of Fourier analysis on lattices as an integral part of a
lattice based construction. The tools we develop provide an elegant description
of certain Gaussian distributions around lattice points. Our results include
two cryptographic constructions which are based on the worst-case hardness of
the unique shortest vector problem. The main result is a new public key
cryptosystem whose security guarantee is considerably stronger than previous
results ($O(n^{1.5})$ instead of $O(n^7)$). This provides the first alternative
to Ajtai and Dwork's original 1996 cryptosystem. Our second result is a family
of collision resistant hash functions which, apart from improving the security
in terms of the unique shortest vector problem, is also the first example of an
analysis which is not based on Ajtai's iterative step. Surprisingly, both
results are derived from one theorem which presents two indistinguishable
distributions on the segment $[0,1)$. It seems that this theorem can have
further applications and as an example we mention how it can be used to solve
an open problem related to quantum computation.
| [
{
"version": "v1",
"created": "Sun, 28 Sep 2003 20:41:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Regev",
"Oded",
""
]
] |
cs/0309053 | David A. Plaisted | David A. Plaisted | A Hierarchical Situation Calculus | Internal report, University of North Carolina at Chapel Hill, January
2003 | null | null | null | cs.AI cs.LO | null | A situation calculus is presented that provides a solution to the frame
problem for hierarchical situations, that is, situations that have a modular
structure in which parts of the situation behave in a relatively independent
manner. This situation calculus is given in a relational, functional, and modal
logic form. Each form permits both a single level hierarchy or a multiple level
hierarchy, giving six versions of the formalism in all, and a number of
sub-versions of these. For multiple level hierarchies, it is possible to give
equations between parts of the situation to impose additional structure on the
problem. This approach is compared to others in the literature.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2003 17:13:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Plaisted",
"David A.",
""
]
] |
cs/0309055 | Tsuyoshi Ohta | Tsuyoshi Ohta, Tadanori Mizuno (Shizuoka University) | A mathematical framework for automated bug localization | 4 pages, 2 figures, In M. Ronsse, K. De Bosschere (eds), proceedings
of the Fifth International Workshop on Automated Debugging (AADEBUG 2003),
September 2003, Ghent. cs.SE/0309027 | null | null | null | cs.SE | null | In this paper, we propose a mathematical framework for automated bug
localization. This framework can be briefly summarized as follows. A program
execution can be represented as a rooted acyclic directed graph. We define an
execution snapshot by a cut-set on the graph. A program state can be regarded
as a conjunction of labels on edges in a cut-set. Then we argue that a
debugging task is a pruning process of the execution graph by using cut-sets. A
pruning algorithm, i.e., a debugging task, is also presented.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2003 01:19:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ohta",
"Tsuyoshi",
"",
"Shizuoka University"
],
[
"Mizuno",
"Tadanori",
"",
"Shizuoka University"
]
] |
cs/0310001 | Raimondas Lencevicius | Edu Metz, Raimondas Lencevicius | A Performance Analysis Tool for Nokia Mobile Phone Software | 4 pages, 5 figures. In M. Ronsse, K. De Bosschere (eds), Proceedings
of the Fifth International Workshop on Automated Debugging (AADEBUG 2003),
September 2003, Ghent. cs.SE/0309027 | null | null | null | cs.SE cs.PF | null | Performance problems are often observed in embedded software systems. The
reasons for poor performance are frequently not obvious. Bottlenecks can occur
in any of the software components along the execution path. Therefore it is
important to instrument and monitor the different components contributing to
the runtime behavior of an embedded software system. Performance analysis tools
can help locate performance bottlenecks in embedded software systems by
monitoring the software's execution and producing easily understandable
performance data. We maintain and further develop a tool for analyzing the
performance of Nokia mobile phone software. The user can select among four
performance analysis reports to be generated: average processor load, processor
utilization, task execution time statistics, and task execution timeline. Each
of these reports provides important information about where execution time is
being spent. The demo will show how the tool helps to identify performance
bottlenecks in Nokia mobile phone software and better understand areas of poor
performance.
| [
{
"version": "v1",
"created": "Fri, 3 Oct 2003 21:01:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Metz",
"Edu",
""
],
[
"Lencevicius",
"Raimondas",
""
]
] |
cs/0310002 | Suresh Venkatasubramanian | Suresh Venkatasubramanian | The Graphics Card as a Streaming Computer | 2 pages: corrected missing bibliographic references | In SIGMOD Workshop on Management and Processing of Massive Data
(June 2003) | null | null | cs.GR cs.AR | null | Massive data sets have radically changed our understanding of how to design
efficient algorithms; the streaming paradigm, whether it in terms of number of
passes of an external memory algorithm, or the single pass and limited memory
of a stream algorithm, appears to be the dominant method for coping with large
data.
A very different kind of massive computation has had the same effect at the
level of the CPU. The most prominent example is that of the computations
performed by a graphics card. The operations themselves are very simple, and
require very little memory, but require the ability to perform many
computations extremely fast and in parallel to whatever degree possible. What
has resulted is a stream processor that is highly optimized for stream
computations. An intriguing side effect of this is the growing use of a
graphics card as a general purpose stream processing engine. In an
ever-increasing array of applications, researchers are discovering that
performing a computation on a graphics card is far faster than performing it on
a CPU, and so are using a GPU as a stream co-processor.
| [
{
"version": "v1",
"created": "Sun, 5 Oct 2003 06:30:56 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Oct 2003 18:36:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venkatasubramanian",
"Suresh",
""
]
] |
cs/0310003 | Darin Goldstein | Darin Goldstein and Nick Meyer | The Wake Up and Report Problem is Time-Equivalent to the Firing Squad
Synchronization Problem | 13 pages, 4 figures, in Symposium on Discrete Algorithms, (SODA) pp.
578-587, January 6-8, 2002 (journal version to appear in the Journal of
Distributed Computing) | null | null | null | cs.DC cs.DS | null | We consider several problems relating to strongly-connected directed networks
of identical finite-state processors that work synchronously in discrete time
steps. The conceptually simplest of these is the Wake Up and Report Problem;
this is the problem of having a unique "root" processor send a signal to all
other processors in the network and then enter a special "done" state only when
all other processors have received the signal. The most difficult of the
problems we consider is the classic Firing Squad Synchronization Problem; this
is the much-studied problem of achieving macro-synchronization in a network
given micro-synchronization. We show via a complex algorithmic application of
the "snake" data structure first introduced in Even, Litman, and Winkler [ELW],
that these two problems are asymptotically time-equivalent up to a constant
factor. This result leads immediately to the inclusion of several other related
problems into this new asymptotic time-class.
| [
{
"version": "v1",
"created": "Sun, 5 Oct 2003 18:27:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldstein",
"Darin",
""
],
[
"Meyer",
"Nick",
""
]
] |
cs/0310004 | Darin Goldstein | Darin Goldstein | Determination of the Topology of a Directed Network | 9 pages, no figures, accepted to appear in IPDPS 2002 (unable to
attend), (journal version to appear in Information Processing Letters) | null | null | null | cs.DC cs.DS | null | We consider strongly-connected directed networks of identical synchronous,
finite-state processors with in- and out-degree uniformly bounded by a network
constant. Via a straightforward extension of Ostrovsky and Wilkerson's
Backwards Communication Algorithm in [OW], we exhibit a protocol which solves
the Global Topology Determination Problem, the problem of having the root
processor map the global topology of a network of unknown size and topology,
with running time O(ND) where N represents the number of processors and D
represents the diameter of the network. A simple counting argument suffices to
show that the Global Topology Determination Problem has time-complexity Omega(N
logN) which makes the protocol presented asymptotically time-optimal for many
large networks.
| [
{
"version": "v1",
"created": "Sun, 5 Oct 2003 18:41:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldstein",
"Darin",
""
]
] |
cs/0310005 | Darin Goldstein | Darin Goldstein, William Murray, and Binh Yang | Using Artificial Intelligence for Model Selection | 10 pages, no figures, in Proceedings, Hawaii International Conference
on Statistics and Related Fields, June 5-8, 2003 | null | null | null | cs.AI q-bio.QM | null | We apply the optimization algorithm Adaptive Simulated Annealing (ASA) to the
problem of analyzing data on a large population and selecting the best model to
predict that an individual with various traits will have a particular disease.
We compare ASA with traditional forward and backward regression on computer
simulated data. We find that the traditional methods of modeling are better for
smaller data sets whereas a numerically stable ASA seems to perform better on
larger and more complicated data sets.
| [
{
"version": "v1",
"created": "Sun, 5 Oct 2003 18:59:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldstein",
"Darin",
""
],
[
"Murray",
"William",
""
],
[
"Yang",
"Binh",
""
]
] |
cs/0310006 | Jim Gray | Serge Abiteboul, Rakesh Agrawal, Phil Bernstein, Mike Carey, Stefano
Ceri, Bruce Croft, David DeWitt, Mike Franklin, Hector Garcia Molina, Dieter
Gawlick, Jim Gray, Laura Haas, Alon Halevy, Joe Hellerstein, Yannis
Ioannidis, Martin Kersten, Michael Pazzani, Mike Lesk, David Maier, Jeff
Naughton, Hans Schek, Timos Sellis, Avi Silberschatz, Mike Stonebraker, Rick
Snodgrass, Jeff Ullman, Gerhard Weikum, Jennifer Widom, and Stan Zdonik | The Lowell Database Research Self Assessment | Details of this workshop (presentations and notes) are at
http://research.microsoft.com/~gray/lowell/ | null | null | null | cs.DB | null | A group of senior database researchers gathers every few years to assess the
state of database research and to point out problem areas that deserve
additional focus. This report summarizes the discussion and conclusions of the
sixth ad-hoc meeting held May 4-6, 2003 in Lowell, Mass. It observes that
information management continues to be a critical component of most complex
software systems. It recommends that database researchers increase focus on:
integration of text, data, code, and streams; fusion of information from
heterogeneous data sources; reasoning about uncertain data; unsupervised data
mining for interesting correlations; information privacy; and self-adaptation
and repair.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2003 05:42:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abiteboul",
"Serge",
""
],
[
"Agrawal",
"Rakesh",
""
],
[
"Bernstein",
"Phil",
""
],
[
"Carey",
"Mike",
""
],
[
"Ceri",
"Stefano",
""
],
[
"Croft",
"Bruce",
""
],
[
"DeWitt",
"David",
""
],
[
"Franklin",
"Mike",
""
],
[
"Molina",
"Hector Garcia",
""
],
[
"Gawlick",
"Dieter",
""
],
[
"Gray",
"Jim",
""
],
[
"Haas",
"Laura",
""
],
[
"Halevy",
"Alon",
""
],
[
"Hellerstein",
"Joe",
""
],
[
"Ioannidis",
"Yannis",
""
],
[
"Kersten",
"Martin",
""
],
[
"Pazzani",
"Michael",
""
],
[
"Lesk",
"Mike",
""
],
[
"Maier",
"David",
""
],
[
"Naughton",
"Jeff",
""
],
[
"Schek",
"Hans",
""
],
[
"Sellis",
"Timos",
""
],
[
"Silberschatz",
"Avi",
""
],
[
"Stonebraker",
"Mike",
""
],
[
"Snodgrass",
"Rick",
""
],
[
"Ullman",
"Jeff",
""
],
[
"Weikum",
"Gerhard",
""
],
[
"Widom",
"Jennifer",
""
],
[
"Zdonik",
"Stan",
""
]
] |
cs/0310007 | Christian Schaubschlaeger | Ch. Schaubschlaeger, D. Kranzlmueller, J. Volkert | Event-based Program Analysis with DeWiz | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.SE | null | Due to the increased complexity of parallel and distributed programs,
debugging of them is considered to be the most difficult and time consuming
part of the software lifecycle. Tool support is hence a crucial necessity to
hide complexity from the user. However, most existing tools seem inadequate as
soon as the program under consideration exploits more than a few processors
over a long execution time. This problem is addressed by the novel debugging
tool DeWiz (Debugging Wizard), whose focus lies on scalability. DeWiz has a
modular, scalable architecture, and uses the event graph model as a
representation of the investigated program. DeWiz provides a set of modules,
which can be combined to generate, analyze, and visualize event graph data.
Within this processing pipeline the toolset tries to extract useful
information, which is presented to the user at an arbitrary level of
abstraction. Additionally, DeWiz is a framework, which can be used to easily
implement arbitrary user-defined modules.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2003 11:51:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schaubschlaeger",
"Ch.",
""
],
[
"Kranzlmueller",
"D.",
""
],
[
"Volkert",
"J.",
""
]
] |
cs/0310008 | Gianluca Argentini | Gianluca Argentini | Poster on MPI application in Computational Fluid Dynamics | 1 page, PDF version of a poster-session presentation during
"EuroPVM/MPI 2003", Sep. 29 - Oct. 2, Venice (Italy), please visit
http://www.dsi.unive.it/pvmmpi03 | null | null | null | cs.DC cs.GR | null | Poster-presentation of the paper "Message Passing Fluids: molecules as
processes in parallel computational fluids" held at "EURO PVMMPI 2003"
Congress; the paper is on the proceedings "Recent Advances in Parallel Virtual
Machine and Message Passing Interface", 10th European PVM/MPI User's Group
Meeting, LNCS 2840, Springer-Verlag, Dongarra-Laforenza-Orlando editors, pp.
550-554.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2003 14:20:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0310009 | Artur Rataj | Artur Rataj | On Interference of Signals and Generalization in Feedforward Neural
Networks | 6 pages, 3 figures. Some changes in text to make it more concise | null | null | IITiS-2002-08-1-1.04 | cs.NE | null | This paper studies how the generalization ability of neurons can be affected
by mutual processing of different signals. This study is done on the basis of a
feedforward artificial neural network. The mutual processing of signals can
possibly be a good model of patterns in a set generalized by a neural network
and in effect may improve generalization. In this paper it is discussed that
the interference may also cause a highly random generalization. Adaptive
activation functions are discussed as a way of reducing that type of
generalization. A test of a feedforward neural network is performed that shows
the discussed random generalization.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2003 15:40:44 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Oct 2003 14:43:35 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Nov 2003 12:52:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rataj",
"Artur",
""
]
] |
cs/0310010 | David Lyback | David Lyback | Transient Diversity in Multi-Agent Systems | 44 pages, 5 figures | null | null | M.Sc. thesis No. 99-x-097. Dept. of Computer and Systems Sciences,
Royal Inst. of Technology, Sweden | cs.AI cs.MA | null | Diversity is an important aspect of highly efficient multi-agent teams. We
introduce the main factors that drive a multi-agent system in either direction
along the diversity scale. A metric for diversity is described, and we
speculate on the concept of transient diversity. Finally, an experiment on
social entropy using a RoboCup simulated soccer team is presented.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2003 16:13:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lyback",
"David",
""
]
] |
cs/0310011 | Robert G. Capra iii | Robert G. Capra, Manuel A. Perez-Quinones | Re-Finding Found Things: An Exploratory Study of How Users Re-Find
Information | null | null | null | null | cs.HC cs.IR | null | The problem of how people find information is studied extensively; however,
the problem of how people organize, re-use, and re-find information that they
have found is not as well understood. Recently, several projects have conducted
in-situ studies to explore how people re-find and re-use information. Here, we
present results and observations from a controlled, laboratory study of
refinding information found on the web.
Our study was conducted as a collaborative exercise with pairs of
participants. One participant acted as a retriever, helping the other
participant re-find information by telephone. This design allowed us to gain
insight into the strategies that users employed to re-find information, and
into how domain artifacts and contextual information were used to aid the
re-finding process. We also introduced the ability for users to add their own
explicitly artifacts in the form of making annotations on the web pages they
viewed.
We observe that re-finding often occurs as a two stage, iterative process in
which users first attempt to locate an information source (search), and once
found, begin a process to find the specific information being sought (browse).
Our findings are consistent with research on waypoints; orienteering approaches
to re-finding; and navigation of electronic spaces. Furthermore, we observed
that annotations were utilized extensively, indicating that explicitly added
context by the user can play an important role in re-finding.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2003 19:36:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Capra",
"Robert G.",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
]
] |
cs/0310012 | Christoph Koch | Georg Gottlob and Christoph Koch | A Formal Comparison of Visual Web Wrapper Generators | 12 pages, 0 figures, second part of long version of PODS 2002 paper
"Monadic Datalog and the Expressive Power of Languages for Web Information
Extraction". First part accepted for JACM | null | null | null | cs.DB | null | We study the core fragment of the Elog wrapping language used in the Lixto
system (a visual wrapper generator) and formally compare Elog to other wrapping
languages proposed in the literature.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2003 00:18:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gottlob",
"Georg",
""
],
[
"Koch",
"Christoph",
""
]
] |
cs/0310013 | Franco Bagnoli | Franco Bagnoli, Fabio Franci, Francesco Mugelli, Andrea Sterbini | WebTeach in practice: the entrance test to the Engineering faculty in
Florence | 6 pages, 5 figures | null | null | null | cs.HC cs.IR | null | We present the WebTeach project, formed by a web interface to database for
test management, a wiki site for the diffusion of teaching material and student
forums, and a suite for the generation of multiple-choice mathematical quiz
with automatic elaboration of forms. This system has been massively tested for
the entrance test to the Engineering Faculty of the University of Florence,
Italy
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2003 14:07:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bagnoli",
"Franco",
""
],
[
"Franci",
"Fabio",
""
],
[
"Mugelli",
"Francesco",
""
],
[
"Sterbini",
"Andrea",
""
]
] |
cs/0310014 | Philip Windridge | Rodney J. Clarke, Philip C. Windridge and Dali Dong | Effective XML Representation for Spoken Language in Organisations | 10 pages, 3 figures | null | null | null | cs.CL | null | Spoken Language can be used to provide insights into organisational
processes, unfortunately transcription and coding stages are very time
consuming and expensive. The concept of partial transcription and coding is
proposed in which spoken language is indexed prior to any subsequent
processing. The functional linguistic theory of texture is used to describe the
effects of partial transcription on observational records. The standard used to
encode transcript context and metadata is called CHAT, but a previous XML
schema developed to implement it contains design assumptions that make it
difficult to support partial transcription for example. This paper describes a
more effective XML schema that overcomes many of these problems and is intended
for use in applications that support the rapid development of spoken language
deliverables.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2003 16:40:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Clarke",
"Rodney J.",
""
],
[
"Windridge",
"Philip C.",
""
],
[
"Dong",
"Dali",
""
]
] |
cs/0310015 | Masao Okita | Masao Okita, Fumihiko Ino and Kenichi Hagihara | Debugging Tool for Localizing Faulty Processes in Message Passing
Programs | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.SE | null | In message passing programs, once a process terminates with an unexpected
error, the terminated process can propagate the error to the rest of processes
through communication dependencies, resulting in a program failure. Therefore,
to locate faults, developers must identify the group of processes involved in
the original error and faulty processes that activate faults. This paper
presents a novel debugging tool, named MPI-PreDebugger (MPI-PD), for localizing
faulty processes in message passing programs. MPI-PD automatically
distinguishes the original and the propagated errors by checking communication
errors during program execution. If MPI-PD observes any communication errors,
it backtraces communication dependencies and points out potential faulty
processes in a timeline view. We also introduce three case studies, in which
MPI-PD has been shown to play the key role in their debugging. From these
studies, we believe that MPI-PD helps developers to locate faults and allows
them to concentrate in correcting their programs.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2003 07:00:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Okita",
"Masao",
""
],
[
"Ino",
"Fumihiko",
""
],
[
"Hagihara",
"Kenichi",
""
]
] |
cs/0310017 | Chris Doran | Chris Doran | Circle and sphere blending with conformal geometric algebra | 20 pages, 13 figures | null | null | null | cs.CG cs.GR | null | Blending schemes based on circles provide smooth `fair' interpolations
between series of points. Here we demonstrate a simple, robust set of
algorithms for performing circle blends for a range of cases. An arbitrary
level of G-continuity can be achieved by simple alterations to the underlying
parameterisation. Our method exploits the computational framework provided by
conformal geometric algebra. This employs a five-dimensional representation of
points in space, in contrast to the four-dimensional representation typically
used in projective geometry. The advantage of the conformal scheme is that
straight lines and circles are treated in a single, unified framework. As a
further illustration of the power of the conformal framework, the basic idea is
extended to the case of sphere blending to interpolate over a surface.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2003 15:15:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Doran",
"Chris",
""
]
] |
cs/0310018 | Jiyou Jia | Jiyou Jia | The Study of the Application of a Keywords-based Chatbot System on the
Teaching of Foreign Languages | 11 pages, 2 figures, 10 tables | null | null | null | cs.CY cs.CL | null | This paper reports the findings of a study conducted on the application of an
on-line human-computer dialog system with natural language (chatbot) on the
teaching of foreign languages. A keywords-based human-computer dialog system
makes it possible that the user could chat with the computer using a natural
language, i.e. in English or in German to some extent. So an experiment has
been made using this system online to work as a chat partner with the users
learning the foreign languages. Dialogs between the users and the chatbot are
collected. Findings indicate that the dialogs between the human and the
computer are mostly very short because the user finds the responses from the
computer are mostly repeated and irrelevant with the topics and context and the
program does not understand the language at all. With analysis of the keywords
or pattern-matching mechanism used in this chatbot it can be concluded that
this kind of system can not work as a teaching assistant program in foreign
language learning.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2003 15:25:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jia",
"Jiyou",
""
]
] |
cs/0310019 | Koskas Michel | Michel Koskas | A hierarchical Algorithm to Solve the Shortest Path Problem in Valued
Graphs | 18 pages, 5 figures | null | null | null | cs.DS cs.DM | null | This paper details a new algorithm to solve the shortest path problem in
valued graphs. Its complexity is $O(D \log v)$ where $D$ is the graph diameter
and $v$ its number of vertices. This complexity has to be compared to the one
of the Dijkstra's algorithm, which is $O(e\log v)$ where $e$ is the number of
edges of the graph. This new algorithm lies on a hierarchical representation of
the graph, using radix trees. The performances of this algorithm show a major
improvement over the ones of the algorithms known up to now.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2003 18:01:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Koskas",
"Michel",
""
]
] |
cs/0310020 | Marija Kulas | Marija Kulas | Pure Prolog Execution in 21 Rules | 15 pages. Appeared in Proc. of the 5th Workshop on Rule-Based
Constraint Reasoning and Programming (RCoRP'03), within CP'03, Kinsale,
September 2003 | null | null | null | cs.PL cs.LO | null | A simple mathematical definition of the 4-port model for pure Prolog is
given. The model combines the intuition of ports with a compact representation
of execution state. Forward and backward derivation steps are possible. The
model satisfies a modularity claim, making it suitable for formal reasoning.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2003 18:46:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kulas",
"Marija",
""
]
] |
cs/0310021 | Ladislav J. Kohout | Ladislav J. Kohout, Eunjin Kim, Gary Zenz | Fuzzy Relational Modeling of Cost and Affordability for Advanced
Technology Manufacturing Environment | 30 pages, Design & Manufacturing Grantees Conference Proceedings.
Table of contents added | null | null | null | cs.CE cs.AI math.OC | null | Relational representation of knowledge makes it possible to perform all the
computations and decision making in a uniform relational way by means of
special relational compositions called triangle and square products. In this
paper some applications in manufacturing related to cost analysis are
described. Testing fuzzy relational structures for various relational
properties allows us to discover dependencies, hierarchies, similarities, and
equivalences of the attributes characterizing technological processes and
manufactured artifacts in their relationship to costs and performance.
A brief overview of mathematical aspects of BK-relational products is given
in Appendix 1 together with further references in the literature.
| [
{
"version": "v1",
"created": "Sat, 11 Oct 2003 14:39:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kohout",
"Ladislav J.",
""
],
[
"Kim",
"Eunjin",
""
],
[
"Zenz",
"Gary",
""
]
] |
cs/0310022 | Daniel A. Spielman | Arvind Sankar, Daniel A. Spielman, Shang-Hua Teng | Smoothed Analysis of the Condition Numbers and Growth Factors of
Matrices | corrected some minor mistakes | null | null | null | cs.NA cs.DS | null | Let $\orig{A}$ be any matrix and let $A$ be a slight random perturbation of
$\orig{A}$. We prove that it is unlikely that $A$ has large condition number.
Using this result, we prove it is unlikely that $A$ has large growth factor
under Gaussian elimination without pivoting. By combining these results, we
bound the smoothed precision needed by Gaussian elimination without pivoting.
Our results improve the average-case analysis of Gaussian elimination without
pivoting performed by Yeung and Chan (SIAM J. Matrix Anal. Appl., 1997).
| [
{
"version": "v1",
"created": "Sun, 12 Oct 2003 04:06:09 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Oct 2003 19:29:06 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Mar 2005 20:18:49 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Nov 2005 15:39:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sankar",
"Arvind",
""
],
[
"Spielman",
"Daniel A.",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
cs/0310023 | Igor Bocharov | Igor Bocharov, Pavel Lukin | Application of Kullback-Leibler Metric to Speech Recognition | 10 pages, 4 figures, Word to PDF auto converted | null | null | null | cs.AI | null | Article discusses the application of Kullback-Leibler divergence to the
recognition of speech signals and suggests three algorithms implementing this
divergence criterion: correlation algorithm, spectral algorithm and filter
algorithm. Discussion covers an approach to the problem of speech variability
and is illustrated with the results of experimental modeling of speech signals.
The article gives a number of recommendations on the choice of appropriate
model parameters and provides a comparison to some other methods of speech
recognition.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2003 16:17:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bocharov",
"Igor",
""
],
[
"Lukin",
"Pavel",
""
]
] |
cs/0310025 | Mikhail Auguston | Mikhail Auguston, Clinton Jeffery, Scott Underwood | A Monitoring Language for Run Time and Post-Mortem Behavior Analysis and
Visualization | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.SE cs.PL | null | UFO is a new implementation of FORMAN, a declarative monitoring language, in
which rules are compiled into execution monitors that run on a virtual machine
supported by the Alamo monitor architecture.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2003 21:06:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Auguston",
"Mikhail",
""
],
[
"Jeffery",
"Clinton",
""
],
[
"Underwood",
"Scott",
""
]
] |
cs/0310026 | Akira Sasaki | Akira Sasaki and Masataka Sassa | Generalized Systematic Debugging for Attribute Grammars | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.SE | null | Attribute grammars (AGs) are known to be a useful formalism for semantic
analysis and translation. However, debugging AGs is complex owing to inherent
difficulties of AGs, such as recursive grammar structure and attribute
dependency. In this paper, a new systematic method of debugging AGs is
proposed. Our approach is, in principle, based on previously proposed
algorithmic debugging of AGs, but is more general. This easily enables
integration of various query-based systematic debugging methods, including the
slice-based method. The proposed method has been implemented in Aki, a debugger
for AG description. We evaluated our new approach experimentally using Aki,
which demonstrates the usability of our debugging method.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2003 08:26:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sasaki",
"Akira",
""
],
[
"Sassa",
"Masataka",
""
]
] |
cs/0310027 | Sandor P. Fekete | Sandor P. Fekete and Joseph S.B. Mitchell and Karin Beurer | On the continuous Fermat-Weber problem | 28 pages, 18 figures, Latex, to appear in Operations Research,
extended abstract version appeared in SoCG 2000 | null | null | null | cs.CG cs.DS | null | We give the first exact algorithmic study of facility location problems that
deal with finding a median for a continuum of demand points. In particular, we
consider versions of the ``continuous k-median (Fermat-Weber) problem'' where
the goal is to select one or more center points that minimize the average
distance to a set of points in a demand region. In such problems, the average
is computed as an integral over the relevant region, versus the usual discrete
sum of distances. The resulting facility location problems are inherently
geometric, requiring analysis techniques of computational geometry. We provide
polynomial-time algorithms for various versions of the L1 1-median
(Fermat-Weber) problem. We also consider the multiple-center version of the L1
k-median problem, which we prove is NP-hard for large k.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2003 15:59:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Beurer",
"Karin",
""
]
] |
cs/0310028 | Parag Sarda | Anoop Jain, Parag Sarda, Jayant R. Haritsa | Providing Diversity in K-Nearest Neighbor Query Results | 20 pages, 11 figures | null | null | null | cs.DB | null | Given a point query Q in multi-dimensional space, K-Nearest Neighbor (KNN)
queries return the K closest answers according to given distance metric in the
database with respect to Q. In this scenario, it is possible that a majority of
the answers may be very similar to some other, especially when the data has
clusters. For a variety of applications, such homogeneous result sets may not
add value to the user. In this paper, we consider the problem of providing
diversity in the results of KNN queries, that is, to produce the closest result
set such that each answer is sufficiently different from the rest. We first
propose a user-tunable definition of diversity, and then present an algorithm,
called MOTLEY, for producing a diverse result set as per this definition.
Through a detailed experimental evaluation on real and synthetic data, we show
that MOTLEY can produce diverse result sets by reading only a small fraction of
the tuples in the database. Further, it imposes no additional overhead on the
evaluation of traditional KNN queries, thereby providing a seamless interface
between diversity and distance.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2003 16:07:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"Anoop",
""
],
[
"Sarda",
"Parag",
""
],
[
"Haritsa",
"Jayant R.",
""
]
] |
cs/0310029 | Judith Beumer | Rajeev Thakur, William Gropp, Ewing Lusk | Optimizing Noncontiguous Accesses in MPI-IO | 18 pages, 12 figures | Parallel Computing 28(1) (January 2002), pp. 83-105 | null | ANL/MCS-P913-1001 | cs.DC | null | The I/O access patterns of many parallel applications consist of accesses to
a large number of small, noncontiguous pieces of data. If an application's I/O
needs are met by making many small, distinct I/O requests, however, the I/O
performance degrades drastically. To avoid this problem, MPI-IO allows users to
access noncontiguous data with a single I/O function call, unlike in Unix I/O.
In this paper, we explain how critical this feature of MPI-IO is for high
performance and how it enables implementations to perform optimizations. We
first provide a classification of the different ways of expressing an
application's I/O needs in MPI-IO--we classify them into four levels, called
level~0 through level~3. We demonstrate that, for applications with
noncontiguous access patterns, the I/O performance improves dramatically if
users write their applications to make level-3 requests (noncontiguous,
collective) rather than level-0 requests (Unix style). We then describe how our
MPI-IO implementation, ROMIO, delivers high performance for noncontiguous
requests. We explain in detail the two key optimizations ROMIO performs: data
sieving for noncontiguous requests from one process and collective I/O for
noncontiguous requests from multiple processes. We describe how we have
implemented these optimizations portably on multiple machines and file systems,
controlled their memory requirements, and also achieved high performance. We
demonstrate the performance and portability with performance results for three
applications--an astrophysics-application template (DIST3D), the NAS BTIO
benchmark, and an unstructured code (UNSTRUC)--on five different parallel
machines: HP Exemplar, IBM SP, Intel Paragon, NEC SX-4, and SGI Origin2000.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2003 19:35:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thakur",
"Rajeev",
""
],
[
"Gropp",
"William",
""
],
[
"Lusk",
"Ewing",
""
]
] |
cs/0310030 | Oliver Oppitz | Oliver Oppitz | A Particular Bug Trap: Execution Replay Using Virtual Machines | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.DC | null | Execution-replay (ER) is well known in the literature but has been restricted
to special system architectures for many years. Improved hardware resources and
the maturity of virtual machine technology promise to make ER useful for a
broader range of development projects.
This paper describes an approach to create a practical, generic ER
infrastructure for desktop PC systems using virtual machine technology. In the
created VM environment arbitrary application programs will run and be replayed
unmodified, neither instrumentation nor recompilation are required.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2003 20:54:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Oppitz",
"Oliver",
""
]
] |
cs/0310031 | Vin de Silva | Vin de Silva | A weak definition of Delaunay triangulation | 8 pages, 4 figures | null | null | null | cs.CG | null | We show that the traditional criterion for a simplex to belong to the
Delaunay triangulation of a point set is equivalent to a criterion which is a
priori weaker. The argument is quite general; as well as the classical
Euclidean case, it applies to hyperbolic and hemispherical geometries and to
Edelsbrunner's weighted Delaunay triangulation. In spherical geometry, we
establish a similar theorem under a genericity condition. The weak definition
finds natural application in the problem of approximating a point-cloud data
set with a simplical complex.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2003 00:14:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Silva",
"Vin",
""
]
] |
cs/0310032 | Sandor P. Fekete | Sandor P. Fekete and Joerg Schepers | A combinatorial characterization of higher-dimensional orthogonal
packing | 21 pages, 8 figures, Latex, to appear in Mathematics of Operations
Research | null | null | null | cs.DS cs.CG | null | Higher-dimensional orthogonal packing problems have a wide range of practical
applications, including packing, cutting, and scheduling. Previous efforts for
exact algorithms have been unable to avoid structural problems that appear for
instances in two- or higher-dimensional space. We present a new approach for
modeling packings, using a graph-theoretical characterization of feasible
packings. Our characterization allows it to deal with classes of packings that
share a certain combinatorial structure, instead of having to consider one
packing at a time. In addition, we can make use of elegant algorithmic
properties of certain classes of graphs. This allows our characterization to be
the basis for a successful branch-and-bound framework.
This is the first in a series of papers describing new approaches to
higher-dimensional packing.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2003 08:27:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Schepers",
"Joerg",
""
]
] |
cs/0310033 | Turker Ozsari | Turker Ozsari | A Hash of Hash Functions | 24 pages, a survey | null | null | null | cs.CR cs.CY | null | In this paper, we present a general review of hash functions in a
cryptographic sense. We give special emphasis on some particular topics such as
cipher block chaining message authentication code (CBC MAC) and its variants.
This paper also broadens the information given in some well known surveys, by
including more details on block-cipher based hash functions and security of
different hash schemes.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2003 10:25:13 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Oct 2003 07:37:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ozsari",
"Turker",
""
]
] |
cs/0310035 | Abhijit Kadlag | Abhijit Kadlag, Amol Wanjari, Juliana Freire, Jayant R. Haritsa | Supporting Exploratory Queries in Database Centric Web Applications | Version After chaning the authors, earlier by mistake only first two
Authors were taken | null | null | null | cs.DB | null | Users of database-centric Web applications, especially in the e-commerce
domain, often resort to exploratory ``trial-and-error'' queries since the
underlying data space is huge and unfamiliar, and there are several
alternatives for search attributes in this space. For example, scouting for
cheap airfares typically involves posing multiple queries, varying flight
times, dates, and airport locations. Exploratory queries are problematic from
the perspective of both the user and the server. For the database server, it
results in a drastic reduction in effective throughput since much of the
processing is duplicated in each successive query. For the client, it results
in a marked increase in response times, especially when accessing the service
through wireless channels.
In this paper, we investigate the design of automated techniques to minimize
the need for repetitive exploratory queries. Specifically, we present SAUNA, a
server-side query relaxation algorithm that, given the user's initial range
query and a desired cardinality for the answer set, produces a relaxed query
that is expected to contain the required number of answers. The algorithm
incorporates a range-query-specific distance metric that is weighted to produce
relaxed queries of a desired shape (e.g. aspect ratio preserving), and utilizes
multi-dimensional histograms for query size estimation. A detailed performance
evaluation of SAUNA over a variety of multi-dimensional data sets indicates
that its relaxed queries can significantly reduce the costs associated with
exploratory query processing.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2003 10:02:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kadlag",
"Abhijit",
""
],
[
"Wanjari",
"Amol",
""
],
[
"Freire",
"Juliana",
""
],
[
"Haritsa",
"Jayant R.",
""
]
] |
cs/0310036 | Daniel A. Spielman | Daniel A. Spielman and Shang-Hua Teng | Solving Sparse, Symmetric, Diagonally-Dominant Linear Systems in Time $O
(m^{1.31})$ | fixed a typo on page 9 | null | null | null | cs.DS cs.NA | null | We present a linear-system solver that, given an $n$-by-$n$ symmetric
positive semi-definite, diagonally dominant matrix $A$ with $m$ non-zero
entries and an $n$-vector $\bb $, produces a vector $\xxt$ within relative
distance $\epsilon$ of the solution to $A \xx = \bb$ in time $O (m^{1.31} \log
(n \kappa_{f} (A)/\epsilon)^{O (1)})$, where $\kappa_{f} (A)$ is the log of the
ratio of the largest to smallest non-zero eigenvalue of $A$. In particular,
$\log (\kappa_{f} (A)) = O (b \log n)$, where $b$ is the logarithm of the ratio
of the largest to smallest non-zero entry of $A$. If the graph of $A$ has genus
$m^{2\theta}$ or does not have a $K_{m^{\theta}} $ minor, then the exponent of
$m$ can be improved to the minimum of $1 + 5 \theta $ and $(9/8) (1+\theta)$.
The key contribution of our work is an extension of Vaidya's techniques for
constructing and analyzing combinatorial preconditioners.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2003 15:43:01 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Mar 2004 22:28:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Spielman",
"Daniel A.",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
cs/0310037 | Sandor P. Fekete | Sandor P. Fekete and Henk Meijer | Maximum dispersion and geometric maximum weight cliques | 13 pages, 1 figure, Latex, to appear in Algorithmica | Algorithmica, 38 (3) 2004, 501-511. | null | null | cs.DS cs.CG | null | We consider a facility location problem, where the objective is to
``disperse'' a number of facilities, i.e., select a given number k of locations
from a discrete set of n candidates, such that the average distance between
selected locations is maximized. In particular, we present algorithmic results
for the case where vertices are represented by points in d-dimensional space,
and edge weights correspond to rectilinear distances. Problems of this type
have been considered before, with the best result being an approximation
algorithm with performance ratio 2. For the case where k is fixed, we establish
a linear-time algorithm that finds an optimal solution. For the case where k is
part of the input, we present a polynomial-time approximation scheme.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2003 15:48:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Meijer",
"Henk",
""
]
] |
cs/0310039 | Chiranjeeb Buragohain | Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri | A Game Theoretic Framework for Incentives in P2P Systems | null | Proc. of the Third International Conference on P2P Computing
(P2P2003), Linkoping Sweden, 2003 | null | null | cs.GT | null | Peer-To-Peer (P2P) networks are self-organizing, distributed systems, with no
centralized authority or infrastructure. Because of the voluntary
participation, the availability of resources in a P2P system can be highly
variable and unpredictable. In this paper, we use ideas from Game Theory to
study the interaction of strategic and rational peers, and propose a
differential service-based incentive scheme to improve the system's
performance.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2003 20:56:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buragohain",
"Chiranjeeb",
""
],
[
"Agrawal",
"Divyakant",
""
],
[
"Suri",
"Subhash",
""
]
] |
cs/0310040 | Manos Renieris | Brock Pytlik, Manos Renieris, Shriram Krishnamurthi and Steven P.
Reiss | Automated Fault Localization Using Potential Invariants | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.SE | null | We present a general method for fault localization based on abstracting over
program traces, and a tool that implements the method using Ernst's notion of
potential invariants. Our experiments so far have been unsatisfactory,
suggesting that further research is needed before invariants can be used to
locate faults.
| [
{
"version": "v1",
"created": "Sat, 18 Oct 2003 22:44:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pytlik",
"Brock",
""
],
[
"Renieris",
"Manos",
""
],
[
"Krishnamurthi",
"Shriram",
""
],
[
"Reiss",
"Steven P.",
""
]
] |
cs/0310041 | Athanasios Kehagias | Pavlina Fragkou | A Dynamic Programming Algorithm for the Segmentation of Greek Texts | This paper will appear in the Proceedings of the CONSOLE XII
Conference (Patras, Greece, 2003) | null | null | null | cs.CL cs.DL | null | In this paper we introduce a dynamic programming algorithm to perform linear
text segmentation by global minimization of a segmentation cost function which
consists of: (a) within-segment word similarity and (b) prior information about
segment length. The evaluation of the segmentation accuracy of the algorithm on
a text collection consisting of Greek texts showed that the algorithm achieves
high segmentation accuracy and appears to be very innovating and promissing.
| [
{
"version": "v1",
"created": "Tue, 21 Oct 2003 18:19:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fragkou",
"Pavlina",
""
]
] |
cs/0310042 | Mireille Ducasse | Mireille Ducasse, Ludovic Langevine, Pierre Deransart | Rigorous design of tracers: an experiment for constraint logic
programming | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.SE | null | In order to design and implement tracers, one must decide what exactly to
trace and how to produce this trace. On the one hand, trace designs are too
often guided by implementation concerns and are not as useful as they should
be. On the other hand, an interesting trace which cannot be produced
efficiently, is not very useful either. In this article we propose a
methodology which helps to efficiently produce accurate traces. Firstly, design
a formal specification of the trace model. Secondly, derive a prototype tracer
from this specification. Thirdly, analyze the produced traces. Fourthly,
implement an efficient tracer. Lastly, compare the traces of the two tracers.
At each step, problems can be found. In that case one has to iterate the
process. We have successfully applied the proposed methodology to the design
and implementation of a real tracer for constraint logic programming which is
able to efficiently generate information required to build interesting
graphical views of executions.
| [
{
"version": "v1",
"created": "Wed, 22 Oct 2003 09:31:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ducasse",
"Mireille",
""
],
[
"Langevine",
"Ludovic",
""
],
[
"Deransart",
"Pierre",
""
]
] |
cs/0310043 | Jules SADEFO Kamdem | Jules Sadefo Kamdem | Value-at-Risk and Expected Shortfall for Quadratic portfolio of
securities with mixture of elliptic Distributed Risk Factors | null | null | null | null | cs.CE math.CA | null | Generally, in the financial literature, the notion of quadratic VaR is
implicitly confused with the Delta-Gamma VaR, because more authors dealt with
portfolios that contains derivatives instruments.
In this paper, we postpone to estimate the Value-at-Risk of a quadratic
portfolio of securities (i.e equities) without the Delta and Gamma greeks, when
the joint log-returns changes with multivariate elliptic distribution. We have
reduced the estimation of the quadratic VaR of such portfolio to a resolution
of one dimensional integral equation. To illustrate our method, we give special
attention to the mixture of normal and mixture of t-student distribution. For
given VaR, when joint Risk Factors changes with elliptic distribution, we show
how to estimate an Expected Shortfall .
| [
{
"version": "v1",
"created": "Wed, 22 Oct 2003 18:04:24 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Oct 2003 18:46:30 GMT"
},
{
"version": "v3",
"created": "Wed, 29 Oct 2003 19:09:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kamdem",
"Jules Sadefo",
""
]
] |
cs/0310044 | Ali Abbas E. | Ali E. Abbas | The Algebra of Utility Inference | 15 pages | null | null | null | cs.AI | null | Richard Cox [1] set the axiomatic foundations of probable inference and the
algebra of propositions. He showed that consistency within these axioms
requires certain rules for updating belief. In this paper we use the analogy
between probability and utility introduced in [2] to propose an axiomatic
foundation for utility inference and the algebra of preferences. We show that
consistency within these axioms requires certain rules for updating preference.
We discuss a class of utility functions that stems from the axioms of utility
inference and show that this class is the basic building block for any general
multiattribute utility function. We use this class of utility functions
together with the algebra of preferences to construct utility functions
represented by logical operations on the attributes.
| [
{
"version": "v1",
"created": "Thu, 23 Oct 2003 01:13:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abbas",
"Ali E.",
""
]
] |
cs/0310047 | Simona Perri | Simona Perri, Francesco Scarcello, Nicola Leone | Abductive Logic Programs with Penalization: Semantics, Complexity and
Implementation | 36 pages; will be published in Theory and Practice of Logic
Programming | null | null | null | cs.AI | null | Abduction, first proposed in the setting of classical logics, has been
studied with growing interest in the logic programming area during the last
years.
In this paper we study abduction with penalization in the logic programming
framework. This form of abductive reasoning, which has not been previously
analyzed in logic programming, turns out to represent several relevant
problems, including optimization problems, very naturally. We define a formal
model for abduction with penalization over logic programs, which extends the
abductive framework proposed by Kakas and Mancarella. We address knowledge
representation issues, encoding a number of problems in our abductive
framework. In particular, we consider some relevant problems, taken from
different domains, ranging from optimization theory to diagnosis and planning;
their encodings turn out to be simple and elegant in our formalism. We
thoroughly analyze the computational complexity of the main problems arising in
the context of abduction with penalization from logic programs. Finally, we
implement a system supporting the proposed abductive framework on top of the
DLV engine. To this end, we design a translation from abduction problems with
penalties into logic programs with weak constraints. We prove that this
approach is sound and complete.
| [
{
"version": "v1",
"created": "Fri, 24 Oct 2003 18:03:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perri",
"Simona",
""
],
[
"Scarcello",
"Francesco",
""
],
[
"Leone",
"Nicola",
""
]
] |
cs/0310048 | Richard McClatchey | Sebastien Gaspard, Florida Estrella, Richard McClatchey & Regis
Dindeleux | Managing Evolving Business Workflows through the Capture of Descriptive
Information | 12 pages, 4 figures. Presented at the eCOMO'2003 4th Int. Workshop on
Conceptual Modeling Approaches for e-Business | null | null | null | cs.SE cs.DB | null | Business systems these days need to be agile to address the needs of a
changing world. In particular the discipline of Enterprise Application
Integration requires business process management to be highly reconfigurable
with the ability to support dynamic workflows, inter-application integration
and process reconfiguration. Basing EAI systems on model-resident or on a
so-called description-driven approach enables aspects of flexibility,
distribution, system evolution and integration to be addressed in a
domain-independent manner. Such a system called CRISTAL is described in this
paper with particular emphasis on its application to EAI problem domains. A
practical example of the CRISTAL technology in the domain of manufacturing
systems, called Agilium, is described to demonstrate the principles of
model-driven system evolution and integration. The approach is compared to
other model-driven development approaches such as the Model-Driven Architecture
of the OMG and so-called Adaptive Object Models.
| [
{
"version": "v1",
"created": "Fri, 24 Oct 2003 13:31:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gaspard",
"Sebastien",
""
],
[
"Estrella",
"Florida",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Dindeleux",
"Regis",
""
]
] |
cs/0310050 | Artur Rataj | Artur Rataj | Feedforward Neural Networks with Diffused Nonlinear Weight Functions | 17 pages, 7 figures. Corrected, some parts rewritten | null | null | IITiS-2003-02-23-1-1.06 | cs.NE | null | In this paper, feedforward neural networks are presented that have nonlinear
weight functions based on look--up tables, that are specially smoothed in a
regularization called the diffusion. The idea of such a type of networks is
based on the hypothesis that the greater number of adaptive parameters per a
weight function might reduce the total number of the weight functions needed to
solve a given problem. Then, if the computational complexity of a propagation
through a single such a weight function would be kept low, then the introduced
neural networks might possibly be relatively fast.
A number of tests is performed, showing that the presented neural networks
may indeed perform better in some cases than the classic neural networks and a
number of other learning machines.
| [
{
"version": "v1",
"created": "Mon, 27 Oct 2003 14:27:14 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Nov 2003 15:55:49 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Nov 2003 12:56:21 GMT"
},
{
"version": "v4",
"created": "Thu, 31 Mar 2005 12:45:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rataj",
"Artur",
""
]
] |
cs/0310052 | Kamil Kulesza | Kamil Kulesza and Zbigniew Kotulski | On secret sharing for graphs | 11 pages | null | null | null | cs.CR | null | In the paper we discuss how to share the secrets, that are graphs. So, far
secret sharing schemes were designed to work with numbers. As the first step,
we propose conditions for "graph to number" conversion methods. Hence, the
existing schemes can be used, without weakening their properties. Next, we show
how graph properties can be used to extend capabilities of secret sharing
schemes. This leads to proposal of using such properties for number based
secret sharing.
| [
{
"version": "v1",
"created": "Tue, 28 Oct 2003 13:08:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kulesza",
"Kamil",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
cs/0310053 | Kamil Kulesza | Kamil Kulesza and Zbigniew Kotulski | Secret Sharing for n-Colorable Graphs with Application to Public Key
Cryptography | 10 pages, 5 figures | Proceedings of 5th NATO Regional Conference on Military
Communication and Information Systems, Capturing New CIS Technologies, RCMIS
2003. 22-24 pazdziernik 2003 | null | null | cs.CR | null | At the beginning some results from the field of graph theory are presented.
Next we show how to share a secret that is proper n-coloring of the graph, with
the known structure. The graph is described and converted to the form, where
colors assigned to vertices form the number with entries from Zn. A secret
sharing scheme (SSS) for the graph coloring is proposed. The proposed method is
applied to the public-key cryptosystem called "Polly Cracker". In this case the
graph structure is a public key, while proper 3-colouring of the graph is a
private key. We show how to share the private key. Sharing particular
n-coloring (color-to-vertex assignment) for the known-structure graph is
presented next.
| [
{
"version": "v1",
"created": "Tue, 28 Oct 2003 13:41:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kulesza",
"Kamil",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
cs/0310054 | Bernhard M\"oller | J. Desharnais, B. M\"oller, G. Struth | Kleene algebra with domain | 40 pages | null | null | null | cs.LO | null | We propose Kleene algebra with domain (KAD), an extension of Kleene algebra
with two equational axioms for a domain and a codomain operation, respectively.
KAD considerably augments the expressiveness of Kleene algebra, in particular
for the specification and analysis of state transition systems. We develop the
basic calculus, discuss some related theories and present the most important
models of KAD. We demonstrate applicability by two examples: First, an
algebraic reconstruction of Noethericity and well-foundedness; second, an
algebraic reconstruction of propositional Hoare logic.
| [
{
"version": "v1",
"created": "Tue, 28 Oct 2003 16:09:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Desharnais",
"J.",
""
],
[
"Möller",
"B.",
""
],
[
"Struth",
"G.",
""
]
] |
cs/0310055 | Judith Beumer | William McCune | Mace4 Reference Manual and Guide | 17 pages | null | null | ANL/MCS-TM-264 | cs.SC cs.MS | null | Mace4 is a program that searches for finite models of first-order formulas.
For a given domain size, all instances of the formulas over the domain are
constructed. The result is a set of ground clauses with equality. Then, a
decision procedure based on ground equational rewriting is applied. If
satisfiability is detected, one or more models are printed. Mace4 is a useful
complement to first-order theorem provers, with the prover searching for proofs
and Mace4 looking for countermodels, and it is useful for work on finite
algebras. Mace4 performs better on equational problems than did our previous
model-searching program Mace2.
| [
{
"version": "v1",
"created": "Tue, 28 Oct 2003 16:56:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McCune",
"William",
""
]
] |
cs/0310056 | Judith Beumer | William McCune | OTTER 3.3 Reference Manual | 66 pages | null | null | ANL/MCS-TM-263 | cs.SC cs.MS | null | OTTER is a resolution-style theorem-proving program for first-order logic
with equality. OTTER includes the inference rules binary resolution,
hyperresolution, UR-resolution, and binary paramodulation. Some of its other
abilities and features are conversion from first-order formulas to clauses,
forward and back subsumption, factoring, weighting, answer literals, term
ordering, forward and back demodulation, evaluable functions and predicates,
Knuth-Bendix completion, and the hints strategy. OTTER is coded in ANSI C, is
free, and is portable to many different kinds of computer.
| [
{
"version": "v1",
"created": "Tue, 28 Oct 2003 19:17:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McCune",
"William",
""
]
] |
cs/0310057 | Judith Beumer | Uwe Naumann and Andrea Walther | An Introduction to Using Software Tools for Automatic Differentiation | 23 pages | null | null | ANL/MCS-TM-254 | cs.MS | null | We give a gentle introduction to using various software tools for automatic
differentiation (AD). Ready-to-use examples are discussed, and links to further
information are presented. Our target audience includes all those who are
looking for a straightforward way to get started using the available AD
technology. The document is dynamic in the sense that its content will be
updated as the AD software evolves.
| [
{
"version": "v1",
"created": "Tue, 28 Oct 2003 19:41:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Naumann",
"Uwe",
""
],
[
"Walther",
"Andrea",
""
]
] |
cs/0310058 | Philip Windridge | Rodney J. Clarke, Dali Dong and Philip C. Windridge | Application Architecture for Spoken Language Resources in Organisational
Settings | 12 pages, 3 figures | null | null | null | cs.CL | null | Special technologies need to be used to take advantage of, and overcome, the
challenges associated with acquiring, transforming, storing, processing, and
distributing spoken language resources in organisations. This paper introduces
an application architecture consisting of tools and supporting utilities for
indexing and transcription, and describes how these tools, together with
downstream processing and distribution systems, can be integrated into a
workflow. Two sample applications for this architecture are outlined- the
analysis of decision-making processes in organisations and the deployment of
systems development methods by designers in the field.
| [
{
"version": "v1",
"created": "Wed, 29 Oct 2003 20:13:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Clarke",
"Rodney J.",
""
],
[
"Dong",
"Dali",
""
],
[
"Windridge",
"Philip C.",
""
]
] |
cs/0310059 | Judith Beumer | Jiuxing Liu, Weihang Jiang, Pete Wyckoff, Dhabaleswar K. Panda, David
Ashton, Darius Buntinas, William Gropp, Brian Toonen | Design and Implementation of MPICH2 over InfiniBand with RDMA Support | 12 pages, 17 figures | null | null | Preprint ANL/MCS-P1103-1003 | cs.AR cs.DC | null | For several years, MPI has been the de facto standard for writing parallel
applications. One of the most popular MPI implementations is MPICH. Its
successor, MPICH2, features a completely new design that provides more
performance and flexibility. To ensure portability, it has a hierarchical
structure based on which porting can be done at different levels. In this
paper, we present our experiences designing and implementing MPICH2 over
InfiniBand. Because of its high performance and open standard, InfiniBand is
gaining popularity in the area of high-performance computing. Our study focuses
on optimizing the performance of MPI-1 functions in MPICH2. One of our
objectives is to exploit Remote Direct Memory Access (RDMA) in Infiniband to
achieve high performance. We have based our design on the RDMA Channel
interface provided by MPICH2, which encapsulates architecture-dependent
communication functionalities into a very small set of functions. Starting with
a basic design, we apply different optimizations and also propose a
zero-copy-based design. We characterize the impact of our optimizations and
designs using microbenchmarks. We have also performed an application-level
evaluation using the NAS Parallel Benchmarks. Our optimized MPICH2
implementation achieves 7.6 $\mu$s latency and 857 MB/s bandwidth, which are
close to the raw performance of the underlying InfiniBand layer. Our study
shows that the RDMA Channel interface in MPICH2 provides a simple, yet
powerful, abstraction that enables implementations with high performance by
exploiting RDMA operations in InfiniBand. To the best of our knowledge, this is
the first high-performance design and implementation of MPICH2 on InfiniBand
using RDMA support.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2003 18:11:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liu",
"Jiuxing",
""
],
[
"Jiang",
"Weihang",
""
],
[
"Wyckoff",
"Pete",
""
],
[
"Panda",
"Dhabaleswar K.",
""
],
[
"Ashton",
"David",
""
],
[
"Buntinas",
"Darius",
""
],
[
"Gropp",
"William",
""
],
[
"Toonen",
"Brian",
""
]
] |
cs/0310061 | Miroslaw Truszczynski | Lengning Liu, Miroslaw Truszczynski | Local-search techniques for propositional logic extended with
cardinality constraints | Proceedings of the 9th International Conference on Pronciples and
Practice of Constraint Programming - CP 2003, LNCS 2833, pp. 495-509 | null | null | null | cs.AI | null | We study local-search satisfiability solvers for propositional logic extended
with cardinality atoms, that is, expressions that provide explicit ways to
model constraints on cardinalities of sets. Adding cardinality atoms to the
language of propositional logic facilitates modeling search problems and often
results in concise encodings. We propose two ``native'' local-search solvers
for theories in the extended language. We also describe techniques to reduce
the problem to standard propositional satisfiability and allow us to use
off-the-shelf SAT solvers. We study these methods experimentally. Our general
finding is that native solvers designed specifically for the extended language
perform better than indirect methods relying on SAT solvers.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2003 16:29:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liu",
"Lengning",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] |
cs/0310062 | Miroslaw Truszczynski | Lengning Liu, Miroslaw Truszczynski | WSAT(cc) - a fast local-search ASP solver | Proceedings of LPNMR-03 (7th International Conference), LNCS,
Springer Verlag | null | null | null | cs.AI | null | We describe WSAT(cc), a local-search solver for computing models of theories
in the language of propositional logic extended by cardinality atoms. WSAT(cc)
is a processing back-end for the logic PS+, a recently proposed formalism for
answer-set programming.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2003 16:46:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liu",
"Lengning",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] |
cs/0310063 | Miroslaw Truszczynski | Victor W. Marek, Ilkka Niemela, Miroslaw Truszczynski | Logic programs with monotone cardinality atoms | Proceedings of LPNMR-03 (7th International Conference), LNCS,
Springer Verlag | null | null | null | cs.LO | null | We investigate mca-programs, that is, logic programs with clauses built of
monotone cardinality atoms of the form kX, where k is a non-negative integer
and X is a finite set of propositional atoms. We develop a theory of
mca-programs. We demonstrate that the operational concept of the one-step
provability operator generalizes to mca-programs, but the generalization
involves nondeterminism. Our main results show that the formalism of
mca-programs is a common generalization of (1) normal logic programming with
its semantics of models, supported models and stable models, (2) logic
programming with cardinality atoms and with the semantics of stable models, as
defined by Niemela, Simons and Soininen, and (3) of disjunctive logic
programming with the possible-model semantics of Sakama and Inoue.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2003 16:56:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marek",
"Victor W.",
""
],
[
"Niemela",
"Ilkka",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] |
cs/0310064 | Miroslaw Truszczynski | Michael R. Dransfield, Victor W. Marek, Miroslaw Truszczynski | Satisfiability and computing van der Waerden numbers | Proceedings of SAT-2003, LNCS, Springer Verlag | null | null | null | cs.LO | null | In this paper we bring together the areas of combinatorics and propositional
satisfiability. Many combinatorial theorems establish, often constructively,
the existence of positive integer functions, without actually providing their
closed algebraic form or tight lower and upper bounds. The area of Ramsey
theory is especially rich in such results. Using the problem of computing van
der Waerden numbers as an example, we show that these problems can be
represented by parameterized propositional theories in such a way that
decisions concerning their satisfiability determine the numbers (function) in
question. We show that by using general-purpose complete and local-search
techniques for testing propositional satisfiability, this approach becomes
effective -- competitive with specialized approaches. By following it, we were
able to obtain several new results pertaining to the problem of computing van
der Waerden numbers. We also note that due to their properties, especially
their structural simplicity and computational hardness, propositional theories
that arise in this research can be of use in development, testing and
benchmarking of SAT solvers.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2003 17:05:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dransfield",
"Michael R.",
""
],
[
"Marek",
"Victor W.",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] |
cs/0310065 | Mikkel Thorup | Stephen Alstrup, Jacob Holm, Kristian de Lichtenberg, Mikkel Thorup | Maintaining Information in Fully-Dynamic Trees with Top Trees | Preliminary versions of this work presented at ICALP'97 and SWAT'00.
The new version takes layered top trees into account | null | null | null | cs.DS | null | We introduce top trees as a design of a new simpler interface for data
structures maintaining information in a fully-dynamic forest. We demonstrate
how easy and versatile they are to use on a host of different applications. For
example, we show how to maintain the diameter, center, and median of each tree
in the forest. The forest can be updated by insertion and deletion of edges and
by changes to vertex and edge weights. Each update is supported in O(log n)
time, where n is the size of the tree(s) involved in the update. Also, we show
how to support nearest common ancestor queries and level ancestor queries with
respect to arbitrary roots in O(log n) time. Finally, with marked and unmarked
vertices, we show how to compute distances to a nearest marked vertex. The
later has applications to approximate nearest marked vertex in general graphs,
and thereby to static optimization problems over shortest path metrics.
Technically speaking, top trees are easily implemented either with
Frederickson's topology trees [Ambivalent Data Structures for Dynamic
2-Edge-Connectivity and k Smallest Spanning Trees, SIAM J. Comput. 26 (2) pp.
484-538, 1997] or with Sleator and Tarjan's dynamic trees [A Data Structure for
Dynamic Trees. J. Comput. Syst. Sc. 26 (3) pp. 362-391, 1983]. However, we
claim that the interface is simpler for many applications, and indeed our new
bounds are quadratic improvements over previous bounds where they exist.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2003 18:37:47 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Nov 2003 21:09:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alstrup",
"Stephen",
""
],
[
"Holm",
"Jacob",
""
],
[
"de Lichtenberg",
"Kristian",
""
],
[
"Thorup",
"Mikkel",
""
]
] |
cs/0311002 | Andy King | Florence Benoy and Andy King and Fred Mesnard | Computing Convex Hulls with a Linear Solver | 13 pages, 1 figure | null | null | null | cs.PL | null | A programming tactic involving polyhedra is reported that has been widely
applied in the polyhedral analysis of (constraint) logic programs. The method
enables the computations of convex hulls that are required for polyhedral
analysis to be coded with linear constraint solving machinery that is available
in many Prolog systems.
To appear in Theory and Practice of Logic Programming (TPLP)
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2003 12:43:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Benoy",
"Florence",
""
],
[
"King",
"Andy",
""
],
[
"Mesnard",
"Fred",
""
]
] |
cs/0311003 | Maurice Bruynooghe | Maurice Bruynooghe | Enhancing a Search Algorithm to Perform Intelligent Backtracking | To appear in Theory and Practice of Logic Programming | null | null | null | cs.AI cs.LO | null | This paper illustrates how a Prolog program, using chronological backtracking
to find a solution in some search space, can be enhanced to perform intelligent
backtracking. The enhancement crucially relies on the impurity of Prolog that
allows a program to store information when a dead end is reached. To illustrate
the technique, a simple search program is enhanced.
To appear in Theory and Practice of Logic Programming.
Keywords: intelligent backtracking, dependency-directed backtracking,
backjumping, conflict-directed backjumping, nogood sets, look-back.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2003 09:56:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bruynooghe",
"Maurice",
""
]
] |
cs/0311004 | Ali Abbas E. | Ali Abbas, Jim Matheson | Utility-Probability Duality | null | null | null | null | cs.AI | null | This paper presents duality between probability distributions and utility
functions.
| [
{
"version": "v1",
"created": "Thu, 6 Nov 2003 07:33:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abbas",
"Ali",
""
],
[
"Matheson",
"Jim",
""
]
] |
cs/0311005 | David S. H. Rosenthal | David S. H. Rosenthal | On The Cost Distribution of a Memory Bound Function | 8 pages | null | null | LOCKSS TR2003-02 | cs.CR cs.DL | null | Memory Bound Functions have been proposed for fighting spam, resisting Sybil
attacks and other purposes. A particular implementation of such functions has
been proposed in which the average effort required to generate a proof of
effort is set by parameters E and l to E * l. The distribution of effort
required to generate an individual proof about this average is fairly broad.
When particular uses of these functions are envisaged, the choice of E and l,
and the system design surrounding the generation and verification of proofs of
effort, need to take the breadth of the distribution into account.
We show the distribution for this implementation, discuss the system design
issues in the context of two proposed applications, and suggest an improved
implementation.
| [
{
"version": "v1",
"created": "Thu, 6 Nov 2003 18:54:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rosenthal",
"David S. H.",
""
]
] |
cs/0311006 | Paul M. Aoki | Allison Woodruff and Paul M. Aoki | How Push-To-Talk Makes Talk Less Pushy | 10 pages | Proc. ACM SIGGROUP Conf. on Supporting Group Work, Sanibel Island,
FL, Nov. 2003, 170-179. ACM Press. | 10.1145/958160.958187 | null | cs.HC | null | This paper presents an exploratory study of college-age students using
two-way, push-to-talk cellular radios. We describe the observed and reported
use of cellular radio by the participants. We discuss how the half-duplex,
lightweight cellular radio communication was associated with reduced
interactional commitment, which meant the cellular radios could be used for a
wide range of conversation styles. One such style, intermittent conversation,
is characterized by response delays. Intermittent conversation is surprising in
an audio medium, since it is typically associated with textual media such as
instant messaging. We present design implications of our findings.
| [
{
"version": "v1",
"created": "Fri, 7 Nov 2003 02:17:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Woodruff",
"Allison",
""
],
[
"Aoki",
"Paul M.",
""
]
] |
cs/0311007 | Simona Perri | Simona Perri, Nicola Leone | Parametric Connectives in Disjunctive Logic Programming | null | null | null | null | cs.AI | null | Disjunctive Logic Programming (\DLP) is an advanced formalism for Knowledge
Representation and Reasoning (KRR). \DLP is very expressive in a precise
mathematical sense: it allows to express every property of finite structures
that is decidable in the complexity class $\SigmaP{2}$ ($\NP^{\NP}$).
Importantly, the \DLP encodings are often simple and natural.
In this paper, we single out some limitations of \DLP for KRR, which cannot
naturally express problems where the size of the disjunction is not known ``a
priori'' (like N-Coloring), but it is part of the input. To overcome these
limitations, we further enhance the knowledge modelling abilities of \DLP, by
extending this language by {\em Parametric Connectives (OR and AND)}. These
connectives allow us to represent compactly the disjunction/conjunction of a
set of atoms having a given property. We formally define the semantics of the
new language, named $DLP^{\bigvee,\bigwedge}$ and we show the usefulness of the
new constructs on relevant knowledge-based problems. We address implementation
issues and discuss related works.
| [
{
"version": "v1",
"created": "Fri, 7 Nov 2003 15:57:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perri",
"Simona",
""
],
[
"Leone",
"Nicola",
""
]
] |
cs/0311008 | Ralf Schweimeier | Ralf Schweimeier and Michael Schroeder | A Parameterised Hierarchy of Argumentation Semantics for Extended Logic
Programming and its Application to the Well-founded Semantics | To appear in Theory and Practice of Logic Programming | null | null | null | cs.LO cs.AI | null | Argumentation has proved a useful tool in defining formal semantics for
assumption-based reasoning by viewing a proof as a process in which proponents
and opponents attack each others arguments by undercuts (attack to an
argument's premise) and rebuts (attack to an argument's conclusion). In this
paper, we formulate a variety of notions of attack for extended logic programs
from combinations of undercuts and rebuts and define a general hierarchy of
argumentation semantics parameterised by the notions of attack chosen by
proponent and opponent. We prove the equivalence and subset relationships
between the semantics and examine some essential properties concerning
consistency and the coherence principle, which relates default negation and
explicit negation. Most significantly, we place existing semantics put forward
in the literature in our hierarchy and identify a particular argumentation
semantics for which we prove equivalence to the paraconsistent well-founded
semantics with explicit negation, WFSX$_p$. Finally, we present a general proof
theory, based on dialogue trees, and show that it is sound and complete with
respect to the argumentation semantics.
| [
{
"version": "v1",
"created": "Sat, 8 Nov 2003 14:02:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schweimeier",
"Ralf",
""
],
[
"Schroeder",
"Michael",
""
]
] |
cs/0311009 | Alexander Kryukov | A. Demichev (1), D. Foster (2), V. Kalyaev (1), A.Kryukov (1), M.
Lamanna (2), V. Pose (3), R. B. Da Rocha (2) and C. Wang (4) ((1) Skobeltsyn
Institute of Nuclear Physics, Moscow State University, Moscow, Russia, (2)
CERN-IT, Geneva, Switzerland, (3) JINR LIT, Dubna, Russia, (4) Academica
Sinica, Taipei, Taiwan) | OGSA/Globus Evaluation for Data Intensive Applications | To be published in the proceedings of the XIX International Symposium
on Nuclear Electronics and Computing (NEC'2003), Bulgaria, Varna, 15-20
September, 2003 | null | null | null | cs.DC | null | We present an architecture of Globus Toolkit 3 based testbed intended for
evaluation of applicability of the Open Grid Service Architecture (OGSA) for
Data Intensive Applications.
| [
{
"version": "v1",
"created": "Mon, 10 Nov 2003 11:12:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demichev",
"A.",
""
],
[
"Foster",
"D.",
""
],
[
"Kalyaev",
"V.",
""
],
[
"Kryukov",
"A.",
""
],
[
"Lamanna",
"M.",
""
],
[
"Pose",
"V.",
""
],
[
"Da Rocha",
"R. B.",
""
],
[
"Wang",
"C.",
""
]
] |
cs/0311010 | Alexander Kryukov | V. Kalyaev, A. Kryukov (Skobektsyn Institute of Nuclear Physics Moscow
State University, Moscow, Russia) | Problem of Application Job Monitoring in GRID Systems | To be published in the proceedings of the XIX International Symposium
on Nuclear Electronics and Computing (NEC'2003), Bulgaria, Varna, 15-20
September, 2003 | null | null | null | cs.DC | null | We present a new approach to monitoring of the execution process of an
application job in the GRID environment. The main point of the approach is use
of GRID ervices to access monitoring information with the security level
available in GRID.
| [
{
"version": "v1",
"created": "Mon, 10 Nov 2003 11:39:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalyaev",
"V.",
"",
"Skobektsyn Institute of Nuclear Physics Moscow\n State University, Moscow, Russia"
],
[
"Kryukov",
"A.",
"",
"Skobektsyn Institute of Nuclear Physics Moscow\n State University, Moscow, Russia"
]
] |
cs/0311011 | Santos B. Yuste | S. B. Yuste and L. Acedo | On an explicit finite difference method for fractional diffusion
equations | 22 pages, 6 figures | SIAM J. Numer. Anal. Vol. 42, No. 5, pp. 1862--1874 (2005) | 10.1137/030602666 | null | cs.NA cond-mat.stat-mech cs.CE physics.comp-ph | null | A numerical method to solve the fractional diffusion equation, which could
also be easily extended to many other fractional dynamics equations, is
considered. These fractional equations have been proposed in order to describe
anomalous transport characterized by non-Markovian kinetics and the breakdown
of Fick's law. In this paper we combine the forward time centered space (FTCS)
method, well known for the numerical integration of ordinary diffusion
equations, with the Grunwald-Letnikov definition of the fractional derivative
operator to obtain an explicit fractional FTCS scheme for solving the
fractional diffusion equation. The resulting method is amenable to a stability
analysis a la von Neumann. We show that the analytical stability bounds are in
excellent agreement with numerical tests. Comparison between exact analytical
solutions and numerical predictions are made.
| [
{
"version": "v1",
"created": "Mon, 10 Nov 2003 13:13:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yuste",
"S. B.",
""
],
[
"Acedo",
"L.",
""
]
] |
cs/0311012 | Rui Carvalho | Rui Carvalho and Michael Batty | A rigorous definition of axial lines: ridges on isovist fields | 18 pages, 5 figures | null | null | null | cs.CV cs.CG | null | We suggest that 'axial lines' defined by (Hillier and Hanson, 1984) as lines
of uninterrupted movement within urban streetscapes or buildings, appear as
ridges in isovist fields (Benedikt, 1979). These are formed from the maximum
diametric lengths of the individual isovists, sometimes called viewsheds, that
make up these fields (Batty and Rana, 2004). We present an image processing
technique for the identification of lines from ridges, discuss current
strengths and weaknesses of the method, and show how it can be implemented
easily and effectively.
| [
{
"version": "v1",
"created": "Wed, 12 Nov 2003 19:15:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carvalho",
"Rui",
""
],
[
"Batty",
"Michael",
""
]
] |
cs/0311013 | Vamsi Paruchuri | Vamsi Paruchuri, Arjan Durresi, Raj Jain | Optimized Flooding Protocol for Ad hoc Networks | Number of Pages: 11 | null | null | null | cs.NI | null | Flooding provides important control and route establishment functionality for
a number of unicast and multicast protocols in Mobile Ad Hoc Networks.
Considering its wide use as a building block for other network layer protocols,
the flooding methodology should deliver a packet from one node to all other
network nodes using as few messages as possible. In this paper, we propose the
Optimized Flooding Protocol (OFP), based on a variation of The Covering Problem
that is encountered in geometry, to minimize the unnecessary transmissions
drastically and still be able to cover the whole region. OFP does not need
hello messages and hence OFP saves a significant amount of wireless bandwidth
and incurs lesser overhead. We present simulation results to show the
efficiency of OFP in both ideal cases and randomly distributed networks.
Moreover, OFP is scalable with respect to density; in fact OFP requires lesser
number of transmissions at higher densities. OFP is also resilient to
transmission errors.
| [
{
"version": "v1",
"created": "Wed, 12 Nov 2003 22:48:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paruchuri",
"Vamsi",
""
],
[
"Durresi",
"Arjan",
""
],
[
"Jain",
"Raj",
""
]
] |
cs/0311014 | Marcus Hutter | Marcus Hutter | Optimality of Universal Bayesian Sequence Prediction for General Loss
and Alphabet | 34 pages | Journal of Machine Learning Research 4 (2003) 971-1000 | null | IDSIA-02-02 | cs.LG cs.AI math.PR | null | Various optimality properties of universal sequence predictors based on
Bayes-mixtures in general, and Solomonoff's prediction scheme in particular,
will be studied. The probability of observing $x_t$ at time $t$, given past
observations $x_1...x_{t-1}$ can be computed with the chain rule if the true
generating distribution $\mu$ of the sequences $x_1x_2x_3...$ is known. If
$\mu$ is unknown, but known to belong to a countable or continuous class $\M$
one can base ones prediction on the Bayes-mixture $\xi$ defined as a
$w_\nu$-weighted sum or integral of distributions $\nu\in\M$. The cumulative
expected loss of the Bayes-optimal universal prediction scheme based on $\xi$
is shown to be close to the loss of the Bayes-optimal, but infeasible
prediction scheme based on $\mu$. We show that the bounds are tight and that no
other predictor can lead to significantly smaller bounds. Furthermore, for
various performance measures, we show Pareto-optimality of $\xi$ and give an
Occam's razor argument that the choice $w_\nu\sim 2^{-K(\nu)}$ for the weights
is optimal, where $K(\nu)$ is the length of the shortest program describing
$\nu$. The results are applied to games of chance, defined as a sequence of
bets, observations, and rewards. The prediction schemes (and bounds) are
compared to the popular predictors based on expert advice. Extensions to
infinite alphabets, partial, delayed and probabilistic prediction,
classification, and more active systems are briefly discussed.
| [
{
"version": "v1",
"created": "Thu, 13 Nov 2003 12:02:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] |
cs/0311015 | Liang Wang | Liang Wang, Yiping Guo, Ming Fang | Make search become the internal function of Internet | 7 pages, 3 figures | null | null | null | cs.IR cs.DL cs.NI | null | Domain Resource Integrated System (DRIS) is introduced in this paper. DRIS is
a distributed information retrieval system, which will solve problems like poor
coverage, long update interval in current web search system. The most distinct
character of DRIS is that it's a public opening system, and acts as an internal
component of Internet, but not the production of a company. The implementation
of DRIS is also represented.
| [
{
"version": "v1",
"created": "Fri, 14 Nov 2003 09:53:51 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Nov 2003 13:25:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Liang",
""
],
[
"Guo",
"Yiping",
""
],
[
"Fang",
"Ming",
""
]
] |
cs/0311016 | Erwan Jahier | Erwan Jahier and Mireille Ducass'e | Generic and Efficient Program Monitoring by trace analysis | null | E. Jahier and M. Ducass'e "Generic Program Monitoring by Trace
Analysis" in the Theory and Practice of Logic Programming journal, Volume 2
part 4&5, pp 613-645, September 2002, Special Issue Program Development,
Cambridge University Press | null | null | cs.PL | null | Program execution monitoring consists of checking whole executions for given
properties in order to collect global run-time information.
Monitoring is very useful to maintain programs. However, application
developers face the following dilemma: either they use existing tools which
never exactly fit their needs, or they invest a lot of effort to implement
monitoring code.
In this article we argue that, when an event-oriented tracer exists, the
compiler developers can enable the application developers to easily code their
own, relevant, monitors which will run efficiently.
We propose a high-level operator, called foldt, which operates on execution
traces. One of the key advantages of our approach is that it allows a clean
separation of concerns; the definition of monitors is neither intertwined in
the user source code nor in the language compiler.
We give a number of applications of the foldt operator to compute monitors
for Mercury program executions: execution profiles, graphical abstract views,
and two test coverage measurements. Each example is implemented by a few simple
lines of Mercury.
Detailed measurements show acceptable performance of the basic mechanism of
foldt for executions of several millions of execution events.
| [
{
"version": "v1",
"created": "Fri, 14 Nov 2003 10:23:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jahier",
"Erwan",
""
],
[
"Ducass'e",
"Mireille",
""
]
] |
cs/0311017 | Mema Roussopoulos | Mema Roussopoulos (Harvard University), Mary Baker (HP Labs), David S.
H. Rosenthal (Stanford University Libraries), TJ Giuli (Stanford University),
Petros Maniatis (Intel Research), Jeff Mogul (HP Labs) | 2 P2P or Not 2 P2P? | 6 pages, 1 figure | null | null | null | cs.NI cs.AR | null | In the hope of stimulating discussion, we present a heuristic decision tree
that designers can use to judge the likely suitability of a P2P architecture
for their applications. It is based on the characteristics of a wide range of
P2P systems from the literature, both proposed and deployed.
| [
{
"version": "v1",
"created": "Fri, 14 Nov 2003 22:36:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roussopoulos",
"Mema",
"",
"Harvard University"
],
[
"Baker",
"Mary",
"",
"HP Labs"
],
[
"Rosenthal",
"David S. H.",
"",
"Stanford University Libraries"
],
[
"Giuli",
"TJ",
"",
"Stanford University"
],
[
"Maniatis",
"Petros",
"",
"Intel Research"
],
[
"Mogul",
"Jeff",
"",
"HP Labs"
]
] |
cs/0311020 | Hsueh-I. Lu | Kai-min Chung and Hsueh-I Lu | An Optimal Algorithm for the Maximum-Density Segment Problem | 15 pages, 12 figures, an early version of this paper was presented at
11th Annual European Symposium on Algorithms (ESA 2003), Budapest, Hungary,
September 15-20, 2003 | SIAM Journal on Computing, 34(2):373-387, 2004 | 10.1137/S0097539704440430 | null | cs.DS cs.DM | null | We address a fundamental problem arising from analysis of biomolecular
sequences. The input consists of two numbers $w_{\min}$ and $w_{\max}$ and a
sequence $S$ of $n$ number pairs $(a_i,w_i)$ with $w_i>0$. Let {\em segment}
$S(i,j)$ of $S$ be the consecutive subsequence of $S$ between indices $i$ and
$j$. The {\em density} of $S(i,j)$ is
$d(i,j)=(a_i+a_{i+1}+...+a_j)/(w_i+w_{i+1}+...+w_j)$. The {\em maximum-density
segment problem} is to find a maximum-density segment over all segments
$S(i,j)$ with $w_{\min}\leq w_i+w_{i+1}+...+w_j \leq w_{\max}$. The best
previously known algorithm for the problem, due to Goldwasser, Kao, and Lu,
runs in $O(n\log(w_{\max}-w_{\min}+1))$ time. In the present paper, we solve
the problem in O(n) time. Our approach bypasses the complicated {\em right-skew
decomposition}, introduced by Lin, Jiang, and Chao. As a result, our algorithm
has the capability to process the input sequence in an online manner, which is
an important feature for dealing with genome-scale sequences. Moreover, for a
type of input sequences $S$ representable in $O(m)$ space, we show how to
exploit the sparsity of $S$ and solve the maximum-density segment problem for
$S$ in $O(m)$ time.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2003 09:37:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chung",
"Kai-min",
""
],
[
"Lu",
"Hsueh-I",
""
]
] |
cs/0311021 | Lev Shamardin | L. Shamardin (Skobektsyn Institute of Nuclear Physics Moscow State
University, Moscow, Russia) | LCG-1 Deployment and usage experience | To be published in the proceedings of the XIX International Symposium
on Nuclear Electronics and Computing (NEC'2003), Bulgaria, Varna, 15-20
September, 2003 | null | null | null | cs.DC | null | LCG-1 is the second release of the software framework for the LHC Computing
Grid project. In our work we describe the installation process, arising
problems and their solutions, and configuration tuning details of the complete
LCG-1 site, including all LCG elements required for the self-sufficient site.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2003 13:19:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shamardin",
"L.",
"",
"Skobektsyn Institute of Nuclear Physics Moscow State\n University, Moscow, Russia"
]
] |
cs/0311022 | Massimo Franceschet | M. Franceschet and A. Montanari | Temporalized logics and automata for time granularity | Journal: Theory and Practice of Logic Programming Journal Acronym:
TPLP Category: Paper for Special Issue (Verification and Computational Logic)
Submitted: 18 March 2002, revised: 14 Januari 2003, accepted: 5 September
2003 | null | null | null | cs.LO | null | Suitable extensions of the monadic second-order theory of k successors have
been proposed in the literature to capture the notion of time granularity. In
this paper, we provide the monadic second-order theories of downward unbounded
layered structures, which are infinitely refinable structures consisting of a
coarsest domain and an infinite number of finer and finer domains, and of
upward unbounded layered structures, which consist of a finest domain and an
infinite number of coarser and coarser domains, with expressively complete and
elementarily decidable temporal logic counterparts.
We obtain such a result in two steps. First, we define a new class of
combined automata, called temporalized automata, which can be proved to be the
automata-theoretic counterpart of temporalized logics, and show that relevant
properties, such as closure under Boolean operations, decidability, and
expressive equivalence with respect to temporal logics, transfer from component
automata to temporalized ones. Then, we exploit the correspondence between
temporalized logics and automata to reduce the task of finding the temporal
logic counterparts of the given theories of time granularity to the easier one
of finding temporalized automata counterparts of them.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2003 14:11:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Franceschet",
"M.",
""
],
[
"Montanari",
"A.",
""
]
] |
cs/0311023 | Jeremy Wazny | Peter J. Stuckey, Martin Sulzmann, Jeremy Wazny | The Chameleon Type Debugger (Tool Demonstration) | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.PL | null | In this tool demonstration, we give an overview of the Chameleon type
debugger. The type debugger's primary use is to identify locations within a
source program which are involved in a type error. By further examining these
(potentially) problematic program locations, users gain a better understanding
of their program and are able to work towards the actual mistake which was the
cause of the type error. The debugger is interactive, allowing the user to
provide additional information to narrow down the search space. One of the
novel aspects of the debugger is the ability to explain erroneous-looking
types. In the event that an unexpected type is inferred, the debugger can
highlight program locations which contributed to that result. Furthermore, due
to the flexible constraint-based foundation that the debugger is built upon, it
can naturally handle advanced type system features such as Haskell's type
classes and functional dependencies.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2003 23:06:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stuckey",
"Peter J.",
""
],
[
"Sulzmann",
"Martin",
""
],
[
"Wazny",
"Jeremy",
""
]
] |
cs/0311024 | Viviana Mascardi | Viviana Mascardi, Maurizio Martelli, Leon Sterling | Logic-Based Specification Languages for Intelligent Software Agents | 67 pages, 1 table, 1 figure. Accepted for publication by the Journal
"Theory and Practice of Logic Programming", volume 4, Maurice Bruynooghe
Editor-in-Chief | null | null | null | cs.AI | null | The research field of Agent-Oriented Software Engineering (AOSE) aims to find
abstractions, languages, methodologies and toolkits for modeling, verifying,
validating and prototyping complex applications conceptualized as Multiagent
Systems (MASs). A very lively research sub-field studies how formal methods can
be used for AOSE. This paper presents a detailed survey of six logic-based
executable agent specification languages that have been chosen for their
potential to be integrated in our ARPEGGIO project, an open framework for
specifying and prototyping a MAS. The six languages are ConGoLog, Agent-0, the
IMPACT agent programming language, DyLog, Concurrent METATEM and Ehhf. For each
executable language, the logic foundations are described and an example of use
is shown. A comparison of the six languages and a survey of similar approaches
complete the paper, together with considerations of the advantages of using
logic-based languages in MAS modeling and prototyping.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2003 10:10:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mascardi",
"Viviana",
""
],
[
"Martelli",
"Maurizio",
""
],
[
"Sterling",
"Leon",
""
]
] |
cs/0311026 | Joseph Y. Halpern | Francis C. Chu, Joseph Y. Halpern | Great Expectations. Part I: On the Customizability of Generalized
Expected Utility | Preliminary version appears in Proc. 18th International Joint
Conference on AI (IJCAI), 2003, pp. 291-296 | null | null | null | cs.AI | null | We propose a generalization of expected utility that we call generalized EU
(GEU), where a decision maker's beliefs are represented by plausibility
measures, and the decision maker's tastes are represented by general (i.e.,not
necessarily real-valued) utility functions. We show that every agent,
``rational'' or not, can be modeled as a GEU maximizer. We then show that we
can customize GEU by selectively imposing just the constraints we want. In
particular, we show how each of Savage's postulates corresponds to constraints
on GEU.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2003 17:36:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chu",
"Francis C.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0311027 | Joseph Y. Halpern | Francis C. Chu, Joseph Y. Halpern | Great Expectations. Part II: Generalized Expected Utility as a Universal
Decision Rule | Preliminary version appears in Proc. 18th International Joint
Conference on AI (IJCAI), 2003, pp. 297-302 | null | null | null | cs.AI | null | Many different rules for decision making have been introduced in the
literature. We show that a notion of generalized expected utility proposed in
Part I of this paper is a universal decision rule, in the sense that it can
represent essentially all other decision rules.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2003 17:39:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chu",
"Francis C.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0311028 | Joseph Y. Halpern | Joseph Y. Halpern and Yoram Moses | Using Counterfactuals in Knowledge-Based Programming | Preliminary version appears in Proc. 7th Conference on Theoretical
Aspects of Rationality and Knowledge (TARK), 1998, pp. 97-110. Submitted to
Distributed Computing | null | null | null | cs.DC cs.AI | null | This paper adds counterfactuals to the framework of knowledge-based programs
of Fagin, Halpern, Moses, and Vardi. The use of counterfactuals is illustrated
by designing a protocol in which an agent stops sending messages once it knows
that it is safe to do so. Such behavior is difficult to capture in the original
framework because it involves reasoning about counterfactual executions,
including ones that are not consistent with the protocol. Attempts to formalize
these notions without counterfactuals are shown to lead to rather
counterintuitive behavior.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2003 17:26:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Moses",
"Yoram",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.