id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0309032
Alexandre Tessier
Gerard Ferrand, Willy Lesaint, Alexandre Tessier
Towards declarative diagnosis of constraint programs over finite domains
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE
null
The paper proposes a theoretical approach of the debugging of constraint programs based on a notion of explanation tree. The proposed approach is an attempt to adapt algorithmic debugging to constraint programming. In this theoretical framework for domain reduction, explanations are proof trees explaining value removals. These proof trees are defined by inductive definitions which express the removals of values as consequences of other value removals. Explanations may be considered as the essence of constraint programming. They are a declarative view of the computation trace. The diagnosis consists in locating an error in an explanation rooted by a symptom.
[ { "version": "v1", "created": "Wed, 17 Sep 2003 12:42:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Ferrand", "Gerard", "" ], [ "Lesaint", "Willy", "" ], [ "Tessier", "Alexandre", "" ] ]
cs/0309033
Pranab Sen
Pranab Sen and S. Venkatesh
Lower bounds for predecessor searching in the cell probe model
Journal version of a paper at ICALP 2001 (quant-ph/0104100) and a paper at CCC 2003. 27 pages
null
null
null
cs.CC cs.DS quant-ph
null
We consider a fundamental problem in data structures, static predecessor searching: Given a subset S of size n from the universe [m], store S so that queries of the form "What is the predecessor of x in S?" can be answered efficiently. We study this problem in the cell probe model introduced by Yao. Recently, Beame and Fich obtained optimal bounds on the number of probes needed by any deterministic query scheme if the associated storage scheme uses only n^{O(1)} cells of word size (\log m)^{O(1)} bits. We give a new lower bound proof for this problem that matches the bounds of Beame and Fich. Our lower bound proof has the following advantages: it works for randomised query schemes too, while Beame and Fich's proof works for deterministic query schemes only. It also extends to `quantum address-only' query schemes that we define in this paper, and is simpler than Beame and Fich's proof. We prove our lower bound using the round elimination approach of Miltersen, Nisan, Safra and Wigderson. Using tools from information theory, we prove a strong round elimination lemma for communication complexity that enables us to obtain a tight lower bound for the predecessor problem. Our strong round elimination lemma also extends to quantum communication complexity. We also use our round elimination lemma to obtain a rounds versus communication tradeoff for the `greater-than' problem, improving on the tradeoff in Miltersen et al. We believe that our round elimination lemma is of independent interest and should have other applications.
[ { "version": "v1", "created": "Wed, 17 Sep 2003 19:14:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Sen", "Pranab", "" ], [ "Venkatesh", "S.", "" ] ]
cs/0309034
Peter Turney
Peter D. Turney (National Research Council of Canada), Michael L. Littman (Rutgers University)
Measuring Praise and Criticism: Inference of Semantic Orientation from Association
37 pages, related work available at http://www.cs.rutgers.edu/~mlittman/ and http://purl.org/peter.turney/
ACM Transactions on Information Systems (TOIS), (2003), 21 (4), 315-346
null
NRC-46516
cs.CL cs.IR cs.LG
null
The evaluative character of a word is called its semantic orientation. Positive semantic orientation indicates praise (e.g., "honest", "intrepid") and negative semantic orientation indicates criticism (e.g., "disturbing", "superfluous"). Semantic orientation varies in both direction (positive or negative) and degree (mild to strong). An automated system for measuring semantic orientation would have application in text classification, text filtering, tracking opinions in online discussions, analysis of survey responses, and automated chat systems (chatbots). This paper introduces a method for inferring the semantic orientation of a word from its statistical association with a set of positive and negative paradigm words. Two instances of this approach are evaluated, based on two different statistical measures of word association: pointwise mutual information (PMI) and latent semantic analysis (LSA). The method is experimentally tested with 3,596 words (including adjectives, adverbs, nouns, and verbs) that have been manually labeled positive (1,614 words) and negative (1,982 words). The method attains an accuracy of 82.8% on the full test set, but the accuracy rises above 95% when the algorithm is allowed to abstain from classifying mild words.
[ { "version": "v1", "created": "Fri, 19 Sep 2003 16:30:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ], [ "Littman", "Michael L.", "", "Rutgers University" ] ]
cs/0309035
Peter Turney
Peter D. Turney, Michael L. Littman, Jeffrey Bigham, Victor Shnayder
Combining Independent Modules to Solve Multiple-choice Synonym and Analogy Problems
8 pages, related work available at http://www.cs.rutgers.edu/~mlittman/ and http://purl.org/peter.turney/
Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP-03), (2003), Borovets, Bulgaria, 482-489
null
NRC-46506
cs.CL cs.IR cs.LG
null
Existing statistical approaches to natural language problems are very coarse approximations to the true complexity of language processing. As such, no single technique will be best for all problem instances. Many researchers are examining ensemble methods that combine the output of successful, separately developed modules to create more accurate solutions. This paper examines three merging rules for combining probability distributions: the well known mixture rule, the logarithmic rule, and a novel product rule. These rules were applied with state-of-the-art results to two problems commonly used to assess human mastery of lexical semantics -- synonym questions and analogy questions. All three merging rules result in ensembles that are more accurate than any of their component modules. The differences among the three rules are not statistically significant, but it is suggestive that the popular mixture rule is not the best rule for either of the two problems.
[ { "version": "v1", "created": "Fri, 19 Sep 2003 20:13:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "" ], [ "Littman", "Michael L.", "" ], [ "Bigham", "Jeffrey", "" ], [ "Shnayder", "Victor", "" ] ]
cs/0309036
Petro M. Gopych
Petro M. Gopych
A Neural Network Assembly Memory Model Based on an Optimal Binary Signal Detection Theory
The revised contribution submitted to the 1st International Workshop on the Future of Neural Networks (FUNN 2003) held on July 5, 2003, Eindhoven, the Netherlands (Workshop affiliated to ICALP 2003, June 30 - July 4, 2003), 12 pages, 3 Figures, 23 references
Problemy Programmirovaniya (Programming Problems, Kyiv, Ukraine), 2004, no. 2-3, pp. 473-479.
null
null
cs.AI cs.IR cs.NE q-bio.NC q-bio.QM
null
A ternary/binary data coding algorithm and conditions under which Hopfield networks implement optimal convolutional or Hamming decoding algorithms has been described. Using the coding/decoding approach (an optimal Binary Signal Detection Theory, BSDT) introduced a Neural Network Assembly Memory Model (NNAMM) is built. The model provides optimal (the best) basic memory performance and demands the use of a new memory unit architecture with two-layer Hopfield network, N-channel time gate, auxiliary reference memory, and two nested feedback loops. NNAMM explicitly describes the dependence on time of a memory trace retrieval, gives a possibility of metamemory simulation, generalized knowledge representation, and distinct description of conscious and unconscious mental processes. A model of smallest inseparable part or an "atom" of consciousness is also defined. The NNAMM's neurobiological backgrounds and its applications to solving some interdisciplinary problems are shortly discussed. BSDT could implement the "best neural code" used in nervous tissues of animals and humans.
[ { "version": "v1", "created": "Sun, 21 Sep 2003 17:11:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Gopych", "Petro M.", "" ] ]
cs/0309037
Bryan Cantrill
Bryan M. Cantrill
Postmortem Object Type Identification
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE
null
This paper presents a novel technique for the automatic type identification of arbitrary memory objects from a memory dump. Our motivating application is debugging memory corruption problems in optimized, production systems -- a problem domain largely unserved by extant methodologies. We describe our algorithm as applicable to any typed language, and we discuss it with respect to the formidable obstacles posed by C. We describe the heuristics that we have developed to overcome these difficulties and achieve effective type identification on C-based systems. We further describe the implementation of our heuristics on one C-based system -- the Solaris operating system kernel -- and describe the extensions that we have added to the Solaris postmortem debugger to allow for postmortem type identification. We show that our implementation yields a sufficiently high rate of type identification to be useful for debugging memory corruption problems. Finally, we discuss some of the novel automated debugging mechanisms that can be layered upon postmortem type identification.
[ { "version": "v1", "created": "Mon, 22 Sep 2003 00:52:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Cantrill", "Bryan M.", "" ] ]
cs/0309038
Valmir Barbosa
V. C. Barbosa, L. C. D. Campos
A novel evolutionary formulation of the maximum independent set problem
null
Journal of Combinatorial Optimization 8 (2004), 419-437
10.1007/s10878-004-4835-9
ES-615/03
cs.NE
null
We introduce a novel evolutionary formulation of the problem of finding a maximum independent set of a graph. The new formulation is based on the relationship that exists between a graph's independence number and its acyclic orientations. It views such orientations as individuals and evolves them with the aid of evolutionary operators that are very heavily based on the structure of the graph and its acyclic orientations. The resulting heuristic has been tested on some of the Second DIMACS Implementation Challenge benchmark graphs, and has been found to be competitive when compared to several of the other heuristics that have also been tested on those graphs.
[ { "version": "v1", "created": "Mon, 22 Sep 2003 13:05:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Barbosa", "V. C.", "" ], [ "Campos", "L. C. D.", "" ] ]
cs/0309039
Valmir Barbosa
V. C. Barbosa, C. A. G. Assis, J. O. do Nascimento
Two novel evolutionary formulations of the graph coloring problem
To appear in Journal of Combinatorial Optimization
Journal of Combinatorial Optimization 8 (2004), 41-63
10.1023/B:JOCO.0000021937.26468.b2
ES-553/01
cs.NE
null
We introduce two novel evolutionary formulations of the problem of coloring the nodes of a graph. The first formulation is based on the relationship that exists between a graph's chromatic number and its acyclic orientations. It views such orientations as individuals and evolves them with the aid of evolutionary operators that are very heavily based on the structure of the graph and its acyclic orientations. The second formulation, unlike the first one, does not tackle one graph at a time, but rather aims at evolving a `program' to color all graphs belonging to a class whose members all have the same number of nodes and other common attributes. The heuristics that result from these formulations have been tested on some of the Second DIMACS Implementation Challenge benchmark graphs, and have been found to be competitive when compared to the several other heuristics that have also been tested on those graphs.
[ { "version": "v1", "created": "Tue, 23 Sep 2003 00:53:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Barbosa", "V. C.", "" ], [ "Assis", "C. A. G.", "" ], [ "Nascimento", "J. O. do", "" ] ]
cs/0309040
Valmir Barbosa
L. D. Penso, V. C. Barbosa
A distributed algorithm to find k-dominating sets
To appear in Discrete Applied Mathematics
Discrete Applied Mathematics 141 (2004), 243-253
10.1016/S0166-218X(03)00368-8
ES-552/01
cs.DC
null
We consider a connected undirected graph $G(n,m)$ with $n$ nodes and $m$ edges. A $k$-dominating set $D$ in $G$ is a set of nodes having the property that every node in $G$ is at most $k$ edges away from at least one node in $D$. Finding a $k$-dominating set of minimum size is NP-hard. We give a new synchronous distributed algorithm to find a $k$-dominating set in $G$ of size no greater than $\lfloor n/(k+1)\rfloor$. Our algorithm requires $O(k\log^*n)$ time and $O(m\log k+n\log k\log^*n)$ messages to run. It has the same time complexity as the best currently known algorithm, but improves on that algorithm's message complexity and is, in addition, conceptually simpler.
[ { "version": "v1", "created": "Tue, 23 Sep 2003 01:14:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Penso", "L. D.", "" ], [ "Barbosa", "V. C.", "" ] ]
cs/0309041
Konstantin Rybnikov
Konstantin Rybnikov
Fast Verification of Convexity of Piecewise-linear Surfaces
10 pages (abbreviated version). Significantly different from all older versions. Discount the previous version -- it had many omissions and typos, like the following one: everything works starting from dimension n=3, not n=2 as was printed in the old abstract. Hyperbolic and spherical cases have been substantially rewritten and errors fixed. This preprint is close to a similar preprint on the MATH part of arxiv.org
null
null
null
cs.CG cs.CV
null
We show that a realization of a closed connected PL-manifold of dimension n-1 in n-dimensional Euclidean space (n>2) is the boundary of a convex polyhedron (finite or infinite) if and only if the interior of each (n-3)-face has a point, which has a neighborhood lying on the boundary of an n-dimensional convex body. No initial assumptions about the topology or orientability of the input surface are made. The theorem is derived from a refinement and generalization of Van Heijenoort's theorem on locally convex manifolds to spherical spaces. Our convexity criterion for PL-manifolds implies an easy polynomial-time algorithm for checking convexity of a given PL-surface in n-dimensional Euclidean or spherical space, n>2. The algorithm is worst case optimal with respect to both the number of operations and the algebraic degree. The algorithm works under significantly weaker assumptions and is easier to implement than convexity verification algorithms suggested by Mehlhorn et al (1996-1999), and Devillers et al.(1998). A paradigm of approximate convexity is suggested and a simplified algorithm of smaller degree and complexity is suggested for approximate floating point convexity verification.
[ { "version": "v1", "created": "Tue, 23 Sep 2003 06:47:28 GMT" }, { "version": "v2", "created": "Mon, 24 Nov 2003 11:23:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Rybnikov", "Konstantin", "" ] ]
cs/0309042
Valmir Barbosa
L. M. A. Drummond, V. C. Barbosa
On reducing the complexity of matrix clocks
null
Parallel Computing 29 (2003), 895-905
10.1016/S0167-8191(03)00066-8
null
cs.DC
null
Matrix clocks are a generalization of the notion of vector clocks that allows the local representation of causal precedence to reach into an asynchronous distributed computation's past with depth $x$, where $x\ge 1$ is an integer. Maintaining matrix clocks correctly in a system of $n$ nodes requires that everymessage be accompanied by $O(n^x)$ numbers, which reflects an exponential dependency of the complexity of matrix clocks upon the desired depth $x$. We introduce a novel type of matrix clock, one that requires only $nx$ numbers to be attached to each message while maintaining what for many applications may be the most significant portion of the information that the original matrix clock carries. In order to illustrate the new clock's applicability, we demonstrate its use in the monitoring of certain resource-sharing computations.
[ { "version": "v1", "created": "Tue, 23 Sep 2003 12:57:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Drummond", "L. M. A.", "" ], [ "Barbosa", "V. C.", "" ] ]
cs/0309043
Valmir Barbosa
A. H. L. Porto, V. C. Barbosa
Finding approximate palindromes in strings
null
Pattern Recognition 35 (2002), 2581-2591
10.1016/S0031-3203(01)00179-0
null
cs.DS
null
We introduce a novel definition of approximate palindromes in strings, and provide an algorithm to find all maximal approximate palindromes in a string with up to $k$ errors. Our definition is based on the usual edit operations of approximate pattern matching, and the algorithm we give, for a string of size $n$ on a fixed alphabet, runs in $O(k^2 n)$ time. We also discuss two implementation-related improvements to the algorithm, and demonstrate their efficacy in practice by means of both experiments and an average-case analysis.
[ { "version": "v1", "created": "Tue, 23 Sep 2003 13:45:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Porto", "A. H. L.", "" ], [ "Barbosa", "V. C.", "" ] ]
cs/0309045
Gianfranco Rossi
Agostino Dovier, Carla Piazza and Gianfranco Rossi
A uniform approach to constraint-solving for lists, multisets, compact lists, and sets
27 pages, 11 figures
null
null
"Quaderni del Dipartimento di Matematica", 235
cs.PL cs.LO cs.SC
null
Lists, multisets, and sets are well-known data structures whose usefulness is widely recognized in various areas of Computer Science. These data structures have been analyzed from an axiomatic point of view with a parametric approach in (*) where the relevant unification algorithms have been developed. In this paper we extend these results considering more general constraints including not only equality but also membership constraints as well as their negative counterparts. (*) A. Dovier, A. Policriti, and G. Rossi. A uniform axiomatic view of lists, multisets, and sets, and the relevant unification algorithms. Fundamenta Informaticae, 36(2/3):201--234, 1998.
[ { "version": "v1", "created": "Wed, 24 Sep 2003 10:08:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Dovier", "Agostino", "" ], [ "Piazza", "Carla", "" ], [ "Rossi", "Gianfranco", "" ] ]
cs/0309047
Andreas Zeller
Andreas Zeller
Causes and Effects in Computer Programs
null
null
null
null
cs.SE
null
Debugging is commonly understood as finding and fixing the cause of a problem. But what does ``cause'' mean? How can we find causes? How can we prove that a cause is a cause--or even ``the'' cause? This paper defines common terms in debugging, highlights the principal techniques, their capabilities and limitations.
[ { "version": "v1", "created": "Wed, 24 Sep 2003 12:51:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Zeller", "Andreas", "" ] ]
cs/0309048
Juergen Schmidhuber
Juergen Schmidhuber
Goedel Machines: Self-Referential Universal Problem Solvers Making Provably Optimal Self-Improvements
29 pages, 1 figure, minor improvements, updated references
Variants published in "Adaptive Agents and Multi-Agent Systems II", LNCS 3394, p. 1-23, Springer, 2005: ISBN 978-3-540-25260-3; as well as in Proc. ICANN 2005, LNCS 3697, p. 223-233, Springer, 2005 (plenary talk); as well as in "Artificial General Intelligence", Series: Cognitive Technologies, Springer, 2006: ISBN-13: 978-3-540-23733-4
null
IDSIA-19-03
cs.LO cs.AI
null
We present the first class of mathematically rigorous, general, fully self-referential, self-improving, optimally efficient problem solvers. Inspired by Kurt Goedel's celebrated self-referential formulas (1931), such a problem solver rewrites any part of its own code as soon as it has found a proof that the rewrite is useful, where the problem-dependent utility function and the hardware and the entire initial code are described by axioms encoded in an initial proof searcher which is also part of the initial code. The searcher systematically and efficiently tests computable proof techniques (programs whose outputs are proofs) until it finds a provably useful, computable self-rewrite. We show that such a self-rewrite is globally optimal - no local maxima! - since the code first had to prove that it is not useful to continue the proof search for alternative self-rewrites. Unlike previous non-self-referential methods based on hardwired proof searchers, ours not only boasts an optimal order of complexity but can optimally reduce any slowdowns hidden by the O()-notation, provided the utility of such speed-ups is provable at all.
[ { "version": "v1", "created": "Thu, 25 Sep 2003 15:59:46 GMT" }, { "version": "v2", "created": "Tue, 28 Oct 2003 09:56:02 GMT" }, { "version": "v3", "created": "Thu, 11 Dec 2003 09:34:17 GMT" }, { "version": "v4", "created": "Mon, 27 Dec 2004 11:16:21 GMT" }, { "version": "v5", "created": "Sun, 17 Dec 2006 23:01:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidhuber", "Juergen", "" ] ]
cs/0309049
Jo\~ao Louren\c{c}o
Joao Lourenco, Jose C. Cunha, Vitor Moreira
Control and Debugging of Distributed Programs Using Fiddle
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.DC
null
The main goal of Fiddle, a distributed debugging engine, is to provide a flexible platform for developing debugging tools. Fiddle provides a layered set of interfaces with a minimal set of debugging functionalities, for the inspection and control of distributed and multi-threaded applications. This paper illustrates how Fiddle is used to support integrated testing and debugging. The approach described is based on a tool, called Deipa, that interprets sequences of commands read from an input file, generated by an independent testing tool. Deipa acts as a Fiddle client, in order to enforce specific execution paths in a distributed PVM program. Other Fiddle clients may be used along with Deipa for the fine debugging at process level. Fiddle and Deipa functionalities and architectures are described, and a working example shows a step-by-step application of these tools.
[ { "version": "v1", "created": "Fri, 26 Sep 2003 11:49:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Lourenco", "Joao", "" ], [ "Cunha", "Jose C.", "" ], [ "Moreira", "Vitor", "" ] ]
cs/0309050
W. A. Zuniga-Galindo
W. A. Zuniga-Galindo
Computing Igusa's Local Zeta Functions of Univariate Polynomials, and Linear Feedback Shift Registers
To appear in The Journal of Integer Sequences
null
null
null
cs.SC cs.CR
null
We give a polynomial time algorithm for computing the Igusa local zeta function $Z(s,f)$ attached to a polynomial $f(x)\in \QTR{Bbb}{Z}[x]$, in one variable, with splitting field $\QTR{Bbb}{Q}$, and a prime number $p$. We also propose a new class of Linear Feedback Shift Registers based on the computation of Igusa's local zeta function.
[ { "version": "v1", "created": "Fri, 26 Sep 2003 22:57:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Zuniga-Galindo", "W. A.", "" ] ]
cs/0309051
Oded Regev
Oded Regev
New Lattice Based Cryptographic Constructions
null
null
null
null
cs.CR
null
We introduce the use of Fourier analysis on lattices as an integral part of a lattice based construction. The tools we develop provide an elegant description of certain Gaussian distributions around lattice points. Our results include two cryptographic constructions which are based on the worst-case hardness of the unique shortest vector problem. The main result is a new public key cryptosystem whose security guarantee is considerably stronger than previous results ($O(n^{1.5})$ instead of $O(n^7)$). This provides the first alternative to Ajtai and Dwork's original 1996 cryptosystem. Our second result is a family of collision resistant hash functions which, apart from improving the security in terms of the unique shortest vector problem, is also the first example of an analysis which is not based on Ajtai's iterative step. Surprisingly, both results are derived from one theorem which presents two indistinguishable distributions on the segment $[0,1)$. It seems that this theorem can have further applications and as an example we mention how it can be used to solve an open problem related to quantum computation.
[ { "version": "v1", "created": "Sun, 28 Sep 2003 20:41:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Regev", "Oded", "" ] ]
cs/0309053
David A. Plaisted
David A. Plaisted
A Hierarchical Situation Calculus
Internal report, University of North Carolina at Chapel Hill, January 2003
null
null
null
cs.AI cs.LO
null
A situation calculus is presented that provides a solution to the frame problem for hierarchical situations, that is, situations that have a modular structure in which parts of the situation behave in a relatively independent manner. This situation calculus is given in a relational, functional, and modal logic form. Each form permits both a single level hierarchy or a multiple level hierarchy, giving six versions of the formalism in all, and a number of sub-versions of these. For multiple level hierarchies, it is possible to give equations between parts of the situation to impose additional structure on the problem. This approach is compared to others in the literature.
[ { "version": "v1", "created": "Mon, 29 Sep 2003 17:13:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Plaisted", "David A.", "" ] ]
cs/0309055
Tsuyoshi Ohta
Tsuyoshi Ohta, Tadanori Mizuno (Shizuoka University)
A mathematical framework for automated bug localization
4 pages, 2 figures, In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE
null
In this paper, we propose a mathematical framework for automated bug localization. This framework can be briefly summarized as follows. A program execution can be represented as a rooted acyclic directed graph. We define an execution snapshot by a cut-set on the graph. A program state can be regarded as a conjunction of labels on edges in a cut-set. Then we argue that a debugging task is a pruning process of the execution graph by using cut-sets. A pruning algorithm, i.e., a debugging task, is also presented.
[ { "version": "v1", "created": "Tue, 30 Sep 2003 01:19:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Ohta", "Tsuyoshi", "", "Shizuoka University" ], [ "Mizuno", "Tadanori", "", "Shizuoka University" ] ]
cs/0310001
Raimondas Lencevicius
Edu Metz, Raimondas Lencevicius
A Performance Analysis Tool for Nokia Mobile Phone Software
4 pages, 5 figures. In M. Ronsse, K. De Bosschere (eds), Proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE cs.PF
null
Performance problems are often observed in embedded software systems. The reasons for poor performance are frequently not obvious. Bottlenecks can occur in any of the software components along the execution path. Therefore it is important to instrument and monitor the different components contributing to the runtime behavior of an embedded software system. Performance analysis tools can help locate performance bottlenecks in embedded software systems by monitoring the software's execution and producing easily understandable performance data. We maintain and further develop a tool for analyzing the performance of Nokia mobile phone software. The user can select among four performance analysis reports to be generated: average processor load, processor utilization, task execution time statistics, and task execution timeline. Each of these reports provides important information about where execution time is being spent. The demo will show how the tool helps to identify performance bottlenecks in Nokia mobile phone software and better understand areas of poor performance.
[ { "version": "v1", "created": "Fri, 3 Oct 2003 21:01:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Metz", "Edu", "" ], [ "Lencevicius", "Raimondas", "" ] ]
cs/0310002
Suresh Venkatasubramanian
Suresh Venkatasubramanian
The Graphics Card as a Streaming Computer
2 pages: corrected missing bibliographic references
In SIGMOD Workshop on Management and Processing of Massive Data (June 2003)
null
null
cs.GR cs.AR
null
Massive data sets have radically changed our understanding of how to design efficient algorithms; the streaming paradigm, whether it in terms of number of passes of an external memory algorithm, or the single pass and limited memory of a stream algorithm, appears to be the dominant method for coping with large data. A very different kind of massive computation has had the same effect at the level of the CPU. The most prominent example is that of the computations performed by a graphics card. The operations themselves are very simple, and require very little memory, but require the ability to perform many computations extremely fast and in parallel to whatever degree possible. What has resulted is a stream processor that is highly optimized for stream computations. An intriguing side effect of this is the growing use of a graphics card as a general purpose stream processing engine. In an ever-increasing array of applications, researchers are discovering that performing a computation on a graphics card is far faster than performing it on a CPU, and so are using a GPU as a stream co-processor.
[ { "version": "v1", "created": "Sun, 5 Oct 2003 06:30:56 GMT" }, { "version": "v2", "created": "Tue, 7 Oct 2003 18:36:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Venkatasubramanian", "Suresh", "" ] ]
cs/0310003
Darin Goldstein
Darin Goldstein and Nick Meyer
The Wake Up and Report Problem is Time-Equivalent to the Firing Squad Synchronization Problem
13 pages, 4 figures, in Symposium on Discrete Algorithms, (SODA) pp. 578-587, January 6-8, 2002 (journal version to appear in the Journal of Distributed Computing)
null
null
null
cs.DC cs.DS
null
We consider several problems relating to strongly-connected directed networks of identical finite-state processors that work synchronously in discrete time steps. The conceptually simplest of these is the Wake Up and Report Problem; this is the problem of having a unique "root" processor send a signal to all other processors in the network and then enter a special "done" state only when all other processors have received the signal. The most difficult of the problems we consider is the classic Firing Squad Synchronization Problem; this is the much-studied problem of achieving macro-synchronization in a network given micro-synchronization. We show via a complex algorithmic application of the "snake" data structure first introduced in Even, Litman, and Winkler [ELW], that these two problems are asymptotically time-equivalent up to a constant factor. This result leads immediately to the inclusion of several other related problems into this new asymptotic time-class.
[ { "version": "v1", "created": "Sun, 5 Oct 2003 18:27:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldstein", "Darin", "" ], [ "Meyer", "Nick", "" ] ]
cs/0310004
Darin Goldstein
Darin Goldstein
Determination of the Topology of a Directed Network
9 pages, no figures, accepted to appear in IPDPS 2002 (unable to attend), (journal version to appear in Information Processing Letters)
null
null
null
cs.DC cs.DS
null
We consider strongly-connected directed networks of identical synchronous, finite-state processors with in- and out-degree uniformly bounded by a network constant. Via a straightforward extension of Ostrovsky and Wilkerson's Backwards Communication Algorithm in [OW], we exhibit a protocol which solves the Global Topology Determination Problem, the problem of having the root processor map the global topology of a network of unknown size and topology, with running time O(ND) where N represents the number of processors and D represents the diameter of the network. A simple counting argument suffices to show that the Global Topology Determination Problem has time-complexity Omega(N logN) which makes the protocol presented asymptotically time-optimal for many large networks.
[ { "version": "v1", "created": "Sun, 5 Oct 2003 18:41:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldstein", "Darin", "" ] ]
cs/0310005
Darin Goldstein
Darin Goldstein, William Murray, and Binh Yang
Using Artificial Intelligence for Model Selection
10 pages, no figures, in Proceedings, Hawaii International Conference on Statistics and Related Fields, June 5-8, 2003
null
null
null
cs.AI q-bio.QM
null
We apply the optimization algorithm Adaptive Simulated Annealing (ASA) to the problem of analyzing data on a large population and selecting the best model to predict that an individual with various traits will have a particular disease. We compare ASA with traditional forward and backward regression on computer simulated data. We find that the traditional methods of modeling are better for smaller data sets whereas a numerically stable ASA seems to perform better on larger and more complicated data sets.
[ { "version": "v1", "created": "Sun, 5 Oct 2003 18:59:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldstein", "Darin", "" ], [ "Murray", "William", "" ], [ "Yang", "Binh", "" ] ]
cs/0310006
Jim Gray
Serge Abiteboul, Rakesh Agrawal, Phil Bernstein, Mike Carey, Stefano Ceri, Bruce Croft, David DeWitt, Mike Franklin, Hector Garcia Molina, Dieter Gawlick, Jim Gray, Laura Haas, Alon Halevy, Joe Hellerstein, Yannis Ioannidis, Martin Kersten, Michael Pazzani, Mike Lesk, David Maier, Jeff Naughton, Hans Schek, Timos Sellis, Avi Silberschatz, Mike Stonebraker, Rick Snodgrass, Jeff Ullman, Gerhard Weikum, Jennifer Widom, and Stan Zdonik
The Lowell Database Research Self Assessment
Details of this workshop (presentations and notes) are at http://research.microsoft.com/~gray/lowell/
null
null
null
cs.DB
null
A group of senior database researchers gathers every few years to assess the state of database research and to point out problem areas that deserve additional focus. This report summarizes the discussion and conclusions of the sixth ad-hoc meeting held May 4-6, 2003 in Lowell, Mass. It observes that information management continues to be a critical component of most complex software systems. It recommends that database researchers increase focus on: integration of text, data, code, and streams; fusion of information from heterogeneous data sources; reasoning about uncertain data; unsupervised data mining for interesting correlations; information privacy; and self-adaptation and repair.
[ { "version": "v1", "created": "Mon, 6 Oct 2003 05:42:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Abiteboul", "Serge", "" ], [ "Agrawal", "Rakesh", "" ], [ "Bernstein", "Phil", "" ], [ "Carey", "Mike", "" ], [ "Ceri", "Stefano", "" ], [ "Croft", "Bruce", "" ], [ "DeWitt", "David", "" ], [ "Franklin", "Mike", "" ], [ "Molina", "Hector Garcia", "" ], [ "Gawlick", "Dieter", "" ], [ "Gray", "Jim", "" ], [ "Haas", "Laura", "" ], [ "Halevy", "Alon", "" ], [ "Hellerstein", "Joe", "" ], [ "Ioannidis", "Yannis", "" ], [ "Kersten", "Martin", "" ], [ "Pazzani", "Michael", "" ], [ "Lesk", "Mike", "" ], [ "Maier", "David", "" ], [ "Naughton", "Jeff", "" ], [ "Schek", "Hans", "" ], [ "Sellis", "Timos", "" ], [ "Silberschatz", "Avi", "" ], [ "Stonebraker", "Mike", "" ], [ "Snodgrass", "Rick", "" ], [ "Ullman", "Jeff", "" ], [ "Weikum", "Gerhard", "" ], [ "Widom", "Jennifer", "" ], [ "Zdonik", "Stan", "" ] ]
cs/0310007
Christian Schaubschlaeger
Ch. Schaubschlaeger, D. Kranzlmueller, J. Volkert
Event-based Program Analysis with DeWiz
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE
null
Due to the increased complexity of parallel and distributed programs, debugging of them is considered to be the most difficult and time consuming part of the software lifecycle. Tool support is hence a crucial necessity to hide complexity from the user. However, most existing tools seem inadequate as soon as the program under consideration exploits more than a few processors over a long execution time. This problem is addressed by the novel debugging tool DeWiz (Debugging Wizard), whose focus lies on scalability. DeWiz has a modular, scalable architecture, and uses the event graph model as a representation of the investigated program. DeWiz provides a set of modules, which can be combined to generate, analyze, and visualize event graph data. Within this processing pipeline the toolset tries to extract useful information, which is presented to the user at an arbitrary level of abstraction. Additionally, DeWiz is a framework, which can be used to easily implement arbitrary user-defined modules.
[ { "version": "v1", "created": "Mon, 6 Oct 2003 11:51:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Schaubschlaeger", "Ch.", "" ], [ "Kranzlmueller", "D.", "" ], [ "Volkert", "J.", "" ] ]
cs/0310008
Gianluca Argentini
Gianluca Argentini
Poster on MPI application in Computational Fluid Dynamics
1 page, PDF version of a poster-session presentation during "EuroPVM/MPI 2003", Sep. 29 - Oct. 2, Venice (Italy), please visit http://www.dsi.unive.it/pvmmpi03
null
null
null
cs.DC cs.GR
null
Poster-presentation of the paper "Message Passing Fluids: molecules as processes in parallel computational fluids" held at "EURO PVMMPI 2003" Congress; the paper is on the proceedings "Recent Advances in Parallel Virtual Machine and Message Passing Interface", 10th European PVM/MPI User's Group Meeting, LNCS 2840, Springer-Verlag, Dongarra-Laforenza-Orlando editors, pp. 550-554.
[ { "version": "v1", "created": "Mon, 6 Oct 2003 14:20:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0310009
Artur Rataj
Artur Rataj
On Interference of Signals and Generalization in Feedforward Neural Networks
6 pages, 3 figures. Some changes in text to make it more concise
null
null
IITiS-2002-08-1-1.04
cs.NE
null
This paper studies how the generalization ability of neurons can be affected by mutual processing of different signals. This study is done on the basis of a feedforward artificial neural network. The mutual processing of signals can possibly be a good model of patterns in a set generalized by a neural network and in effect may improve generalization. In this paper it is discussed that the interference may also cause a highly random generalization. Adaptive activation functions are discussed as a way of reducing that type of generalization. A test of a feedforward neural network is performed that shows the discussed random generalization.
[ { "version": "v1", "created": "Mon, 6 Oct 2003 15:40:44 GMT" }, { "version": "v2", "created": "Mon, 27 Oct 2003 14:43:35 GMT" }, { "version": "v3", "created": "Tue, 4 Nov 2003 12:52:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Rataj", "Artur", "" ] ]
cs/0310010
David Lyback
David Lyback
Transient Diversity in Multi-Agent Systems
44 pages, 5 figures
null
null
M.Sc. thesis No. 99-x-097. Dept. of Computer and Systems Sciences, Royal Inst. of Technology, Sweden
cs.AI cs.MA
null
Diversity is an important aspect of highly efficient multi-agent teams. We introduce the main factors that drive a multi-agent system in either direction along the diversity scale. A metric for diversity is described, and we speculate on the concept of transient diversity. Finally, an experiment on social entropy using a RoboCup simulated soccer team is presented.
[ { "version": "v1", "created": "Mon, 6 Oct 2003 16:13:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Lyback", "David", "" ] ]
cs/0310011
Robert G. Capra iii
Robert G. Capra, Manuel A. Perez-Quinones
Re-Finding Found Things: An Exploratory Study of How Users Re-Find Information
null
null
null
null
cs.HC cs.IR
null
The problem of how people find information is studied extensively; however, the problem of how people organize, re-use, and re-find information that they have found is not as well understood. Recently, several projects have conducted in-situ studies to explore how people re-find and re-use information. Here, we present results and observations from a controlled, laboratory study of refinding information found on the web. Our study was conducted as a collaborative exercise with pairs of participants. One participant acted as a retriever, helping the other participant re-find information by telephone. This design allowed us to gain insight into the strategies that users employed to re-find information, and into how domain artifacts and contextual information were used to aid the re-finding process. We also introduced the ability for users to add their own explicitly artifacts in the form of making annotations on the web pages they viewed. We observe that re-finding often occurs as a two stage, iterative process in which users first attempt to locate an information source (search), and once found, begin a process to find the specific information being sought (browse). Our findings are consistent with research on waypoints; orienteering approaches to re-finding; and navigation of electronic spaces. Furthermore, we observed that annotations were utilized extensively, indicating that explicitly added context by the user can play an important role in re-finding.
[ { "version": "v1", "created": "Mon, 6 Oct 2003 19:36:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Capra", "Robert G.", "" ], [ "Perez-Quinones", "Manuel A.", "" ] ]
cs/0310012
Christoph Koch
Georg Gottlob and Christoph Koch
A Formal Comparison of Visual Web Wrapper Generators
12 pages, 0 figures, second part of long version of PODS 2002 paper "Monadic Datalog and the Expressive Power of Languages for Web Information Extraction". First part accepted for JACM
null
null
null
cs.DB
null
We study the core fragment of the Elog wrapping language used in the Lixto system (a visual wrapper generator) and formally compare Elog to other wrapping languages proposed in the literature.
[ { "version": "v1", "created": "Wed, 8 Oct 2003 00:18:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Gottlob", "Georg", "" ], [ "Koch", "Christoph", "" ] ]
cs/0310013
Franco Bagnoli
Franco Bagnoli, Fabio Franci, Francesco Mugelli, Andrea Sterbini
WebTeach in practice: the entrance test to the Engineering faculty in Florence
6 pages, 5 figures
null
null
null
cs.HC cs.IR
null
We present the WebTeach project, formed by a web interface to database for test management, a wiki site for the diffusion of teaching material and student forums, and a suite for the generation of multiple-choice mathematical quiz with automatic elaboration of forms. This system has been massively tested for the entrance test to the Engineering Faculty of the University of Florence, Italy
[ { "version": "v1", "created": "Wed, 8 Oct 2003 14:07:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagnoli", "Franco", "" ], [ "Franci", "Fabio", "" ], [ "Mugelli", "Francesco", "" ], [ "Sterbini", "Andrea", "" ] ]
cs/0310014
Philip Windridge
Rodney J. Clarke, Philip C. Windridge and Dali Dong
Effective XML Representation for Spoken Language in Organisations
10 pages, 3 figures
null
null
null
cs.CL
null
Spoken Language can be used to provide insights into organisational processes, unfortunately transcription and coding stages are very time consuming and expensive. The concept of partial transcription and coding is proposed in which spoken language is indexed prior to any subsequent processing. The functional linguistic theory of texture is used to describe the effects of partial transcription on observational records. The standard used to encode transcript context and metadata is called CHAT, but a previous XML schema developed to implement it contains design assumptions that make it difficult to support partial transcription for example. This paper describes a more effective XML schema that overcomes many of these problems and is intended for use in applications that support the rapid development of spoken language deliverables.
[ { "version": "v1", "created": "Wed, 8 Oct 2003 16:40:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Clarke", "Rodney J.", "" ], [ "Windridge", "Philip C.", "" ], [ "Dong", "Dali", "" ] ]
cs/0310015
Masao Okita
Masao Okita, Fumihiko Ino and Kenichi Hagihara
Debugging Tool for Localizing Faulty Processes in Message Passing Programs
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE
null
In message passing programs, once a process terminates with an unexpected error, the terminated process can propagate the error to the rest of processes through communication dependencies, resulting in a program failure. Therefore, to locate faults, developers must identify the group of processes involved in the original error and faulty processes that activate faults. This paper presents a novel debugging tool, named MPI-PreDebugger (MPI-PD), for localizing faulty processes in message passing programs. MPI-PD automatically distinguishes the original and the propagated errors by checking communication errors during program execution. If MPI-PD observes any communication errors, it backtraces communication dependencies and points out potential faulty processes in a timeline view. We also introduce three case studies, in which MPI-PD has been shown to play the key role in their debugging. From these studies, we believe that MPI-PD helps developers to locate faults and allows them to concentrate in correcting their programs.
[ { "version": "v1", "created": "Thu, 9 Oct 2003 07:00:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Okita", "Masao", "" ], [ "Ino", "Fumihiko", "" ], [ "Hagihara", "Kenichi", "" ] ]
cs/0310017
Chris Doran
Chris Doran
Circle and sphere blending with conformal geometric algebra
20 pages, 13 figures
null
null
null
cs.CG cs.GR
null
Blending schemes based on circles provide smooth `fair' interpolations between series of points. Here we demonstrate a simple, robust set of algorithms for performing circle blends for a range of cases. An arbitrary level of G-continuity can be achieved by simple alterations to the underlying parameterisation. Our method exploits the computational framework provided by conformal geometric algebra. This employs a five-dimensional representation of points in space, in contrast to the four-dimensional representation typically used in projective geometry. The advantage of the conformal scheme is that straight lines and circles are treated in a single, unified framework. As a further illustration of the power of the conformal framework, the basic idea is extended to the case of sphere blending to interpolate over a surface.
[ { "version": "v1", "created": "Thu, 9 Oct 2003 15:15:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Doran", "Chris", "" ] ]
cs/0310018
Jiyou Jia
Jiyou Jia
The Study of the Application of a Keywords-based Chatbot System on the Teaching of Foreign Languages
11 pages, 2 figures, 10 tables
null
null
null
cs.CY cs.CL
null
This paper reports the findings of a study conducted on the application of an on-line human-computer dialog system with natural language (chatbot) on the teaching of foreign languages. A keywords-based human-computer dialog system makes it possible that the user could chat with the computer using a natural language, i.e. in English or in German to some extent. So an experiment has been made using this system online to work as a chat partner with the users learning the foreign languages. Dialogs between the users and the chatbot are collected. Findings indicate that the dialogs between the human and the computer are mostly very short because the user finds the responses from the computer are mostly repeated and irrelevant with the topics and context and the program does not understand the language at all. With analysis of the keywords or pattern-matching mechanism used in this chatbot it can be concluded that this kind of system can not work as a teaching assistant program in foreign language learning.
[ { "version": "v1", "created": "Fri, 10 Oct 2003 15:25:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Jia", "Jiyou", "" ] ]
cs/0310019
Koskas Michel
Michel Koskas
A hierarchical Algorithm to Solve the Shortest Path Problem in Valued Graphs
18 pages, 5 figures
null
null
null
cs.DS cs.DM
null
This paper details a new algorithm to solve the shortest path problem in valued graphs. Its complexity is $O(D \log v)$ where $D$ is the graph diameter and $v$ its number of vertices. This complexity has to be compared to the one of the Dijkstra's algorithm, which is $O(e\log v)$ where $e$ is the number of edges of the graph. This new algorithm lies on a hierarchical representation of the graph, using radix trees. The performances of this algorithm show a major improvement over the ones of the algorithms known up to now.
[ { "version": "v1", "created": "Fri, 10 Oct 2003 18:01:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Koskas", "Michel", "" ] ]
cs/0310020
Marija Kulas
Marija Kulas
Pure Prolog Execution in 21 Rules
15 pages. Appeared in Proc. of the 5th Workshop on Rule-Based Constraint Reasoning and Programming (RCoRP'03), within CP'03, Kinsale, September 2003
null
null
null
cs.PL cs.LO
null
A simple mathematical definition of the 4-port model for pure Prolog is given. The model combines the intuition of ports with a compact representation of execution state. Forward and backward derivation steps are possible. The model satisfies a modularity claim, making it suitable for formal reasoning.
[ { "version": "v1", "created": "Fri, 10 Oct 2003 18:46:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Kulas", "Marija", "" ] ]
cs/0310021
Ladislav J. Kohout
Ladislav J. Kohout, Eunjin Kim, Gary Zenz
Fuzzy Relational Modeling of Cost and Affordability for Advanced Technology Manufacturing Environment
30 pages, Design & Manufacturing Grantees Conference Proceedings. Table of contents added
null
null
null
cs.CE cs.AI math.OC
null
Relational representation of knowledge makes it possible to perform all the computations and decision making in a uniform relational way by means of special relational compositions called triangle and square products. In this paper some applications in manufacturing related to cost analysis are described. Testing fuzzy relational structures for various relational properties allows us to discover dependencies, hierarchies, similarities, and equivalences of the attributes characterizing technological processes and manufactured artifacts in their relationship to costs and performance. A brief overview of mathematical aspects of BK-relational products is given in Appendix 1 together with further references in the literature.
[ { "version": "v1", "created": "Sat, 11 Oct 2003 14:39:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Kohout", "Ladislav J.", "" ], [ "Kim", "Eunjin", "" ], [ "Zenz", "Gary", "" ] ]
cs/0310022
Daniel A. Spielman
Arvind Sankar, Daniel A. Spielman, Shang-Hua Teng
Smoothed Analysis of the Condition Numbers and Growth Factors of Matrices
corrected some minor mistakes
null
null
null
cs.NA cs.DS
null
Let $\orig{A}$ be any matrix and let $A$ be a slight random perturbation of $\orig{A}$. We prove that it is unlikely that $A$ has large condition number. Using this result, we prove it is unlikely that $A$ has large growth factor under Gaussian elimination without pivoting. By combining these results, we bound the smoothed precision needed by Gaussian elimination without pivoting. Our results improve the average-case analysis of Gaussian elimination without pivoting performed by Yeung and Chan (SIAM J. Matrix Anal. Appl., 1997).
[ { "version": "v1", "created": "Sun, 12 Oct 2003 04:06:09 GMT" }, { "version": "v2", "created": "Tue, 14 Oct 2003 19:29:06 GMT" }, { "version": "v3", "created": "Mon, 21 Mar 2005 20:18:49 GMT" }, { "version": "v4", "created": "Mon, 21 Nov 2005 15:39:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Sankar", "Arvind", "" ], [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0310023
Igor Bocharov
Igor Bocharov, Pavel Lukin
Application of Kullback-Leibler Metric to Speech Recognition
10 pages, 4 figures, Word to PDF auto converted
null
null
null
cs.AI
null
Article discusses the application of Kullback-Leibler divergence to the recognition of speech signals and suggests three algorithms implementing this divergence criterion: correlation algorithm, spectral algorithm and filter algorithm. Discussion covers an approach to the problem of speech variability and is illustrated with the results of experimental modeling of speech signals. The article gives a number of recommendations on the choice of appropriate model parameters and provides a comparison to some other methods of speech recognition.
[ { "version": "v1", "created": "Mon, 13 Oct 2003 16:17:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Bocharov", "Igor", "" ], [ "Lukin", "Pavel", "" ] ]
cs/0310025
Mikhail Auguston
Mikhail Auguston, Clinton Jeffery, Scott Underwood
A Monitoring Language for Run Time and Post-Mortem Behavior Analysis and Visualization
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE cs.PL
null
UFO is a new implementation of FORMAN, a declarative monitoring language, in which rules are compiled into execution monitors that run on a virtual machine supported by the Alamo monitor architecture.
[ { "version": "v1", "created": "Tue, 14 Oct 2003 21:06:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Auguston", "Mikhail", "" ], [ "Jeffery", "Clinton", "" ], [ "Underwood", "Scott", "" ] ]
cs/0310026
Akira Sasaki
Akira Sasaki and Masataka Sassa
Generalized Systematic Debugging for Attribute Grammars
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE
null
Attribute grammars (AGs) are known to be a useful formalism for semantic analysis and translation. However, debugging AGs is complex owing to inherent difficulties of AGs, such as recursive grammar structure and attribute dependency. In this paper, a new systematic method of debugging AGs is proposed. Our approach is, in principle, based on previously proposed algorithmic debugging of AGs, but is more general. This easily enables integration of various query-based systematic debugging methods, including the slice-based method. The proposed method has been implemented in Aki, a debugger for AG description. We evaluated our new approach experimentally using Aki, which demonstrates the usability of our debugging method.
[ { "version": "v1", "created": "Wed, 15 Oct 2003 08:26:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Sasaki", "Akira", "" ], [ "Sassa", "Masataka", "" ] ]
cs/0310027
Sandor P. Fekete
Sandor P. Fekete and Joseph S.B. Mitchell and Karin Beurer
On the continuous Fermat-Weber problem
28 pages, 18 figures, Latex, to appear in Operations Research, extended abstract version appeared in SoCG 2000
null
null
null
cs.CG cs.DS
null
We give the first exact algorithmic study of facility location problems that deal with finding a median for a continuum of demand points. In particular, we consider versions of the ``continuous k-median (Fermat-Weber) problem'' where the goal is to select one or more center points that minimize the average distance to a set of points in a demand region. In such problems, the average is computed as an integral over the relevant region, versus the usual discrete sum of distances. The resulting facility location problems are inherently geometric, requiring analysis techniques of computational geometry. We provide polynomial-time algorithms for various versions of the L1 1-median (Fermat-Weber) problem. We also consider the multiple-center version of the L1 k-median problem, which we prove is NP-hard for large k.
[ { "version": "v1", "created": "Wed, 15 Oct 2003 15:59:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Beurer", "Karin", "" ] ]
cs/0310028
Parag Sarda
Anoop Jain, Parag Sarda, Jayant R. Haritsa
Providing Diversity in K-Nearest Neighbor Query Results
20 pages, 11 figures
null
null
null
cs.DB
null
Given a point query Q in multi-dimensional space, K-Nearest Neighbor (KNN) queries return the K closest answers according to given distance metric in the database with respect to Q. In this scenario, it is possible that a majority of the answers may be very similar to some other, especially when the data has clusters. For a variety of applications, such homogeneous result sets may not add value to the user. In this paper, we consider the problem of providing diversity in the results of KNN queries, that is, to produce the closest result set such that each answer is sufficiently different from the rest. We first propose a user-tunable definition of diversity, and then present an algorithm, called MOTLEY, for producing a diverse result set as per this definition. Through a detailed experimental evaluation on real and synthetic data, we show that MOTLEY can produce diverse result sets by reading only a small fraction of the tuples in the database. Further, it imposes no additional overhead on the evaluation of traditional KNN queries, thereby providing a seamless interface between diversity and distance.
[ { "version": "v1", "created": "Wed, 15 Oct 2003 16:07:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "Anoop", "" ], [ "Sarda", "Parag", "" ], [ "Haritsa", "Jayant R.", "" ] ]
cs/0310029
Judith Beumer
Rajeev Thakur, William Gropp, Ewing Lusk
Optimizing Noncontiguous Accesses in MPI-IO
18 pages, 12 figures
Parallel Computing 28(1) (January 2002), pp. 83-105
null
ANL/MCS-P913-1001
cs.DC
null
The I/O access patterns of many parallel applications consist of accesses to a large number of small, noncontiguous pieces of data. If an application's I/O needs are met by making many small, distinct I/O requests, however, the I/O performance degrades drastically. To avoid this problem, MPI-IO allows users to access noncontiguous data with a single I/O function call, unlike in Unix I/O. In this paper, we explain how critical this feature of MPI-IO is for high performance and how it enables implementations to perform optimizations. We first provide a classification of the different ways of expressing an application's I/O needs in MPI-IO--we classify them into four levels, called level~0 through level~3. We demonstrate that, for applications with noncontiguous access patterns, the I/O performance improves dramatically if users write their applications to make level-3 requests (noncontiguous, collective) rather than level-0 requests (Unix style). We then describe how our MPI-IO implementation, ROMIO, delivers high performance for noncontiguous requests. We explain in detail the two key optimizations ROMIO performs: data sieving for noncontiguous requests from one process and collective I/O for noncontiguous requests from multiple processes. We describe how we have implemented these optimizations portably on multiple machines and file systems, controlled their memory requirements, and also achieved high performance. We demonstrate the performance and portability with performance results for three applications--an astrophysics-application template (DIST3D), the NAS BTIO benchmark, and an unstructured code (UNSTRUC)--on five different parallel machines: HP Exemplar, IBM SP, Intel Paragon, NEC SX-4, and SGI Origin2000.
[ { "version": "v1", "created": "Wed, 15 Oct 2003 19:35:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Thakur", "Rajeev", "" ], [ "Gropp", "William", "" ], [ "Lusk", "Ewing", "" ] ]
cs/0310030
Oliver Oppitz
Oliver Oppitz
A Particular Bug Trap: Execution Replay Using Virtual Machines
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.DC
null
Execution-replay (ER) is well known in the literature but has been restricted to special system architectures for many years. Improved hardware resources and the maturity of virtual machine technology promise to make ER useful for a broader range of development projects. This paper describes an approach to create a practical, generic ER infrastructure for desktop PC systems using virtual machine technology. In the created VM environment arbitrary application programs will run and be replayed unmodified, neither instrumentation nor recompilation are required.
[ { "version": "v1", "created": "Wed, 15 Oct 2003 20:54:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Oppitz", "Oliver", "" ] ]
cs/0310031
Vin de Silva
Vin de Silva
A weak definition of Delaunay triangulation
8 pages, 4 figures
null
null
null
cs.CG
null
We show that the traditional criterion for a simplex to belong to the Delaunay triangulation of a point set is equivalent to a criterion which is a priori weaker. The argument is quite general; as well as the classical Euclidean case, it applies to hyperbolic and hemispherical geometries and to Edelsbrunner's weighted Delaunay triangulation. In spherical geometry, we establish a similar theorem under a genericity condition. The weak definition finds natural application in the problem of approximating a point-cloud data set with a simplical complex.
[ { "version": "v1", "created": "Thu, 16 Oct 2003 00:14:55 GMT" } ]
2007-05-23T00:00:00
[ [ "de Silva", "Vin", "" ] ]
cs/0310032
Sandor P. Fekete
Sandor P. Fekete and Joerg Schepers
A combinatorial characterization of higher-dimensional orthogonal packing
21 pages, 8 figures, Latex, to appear in Mathematics of Operations Research
null
null
null
cs.DS cs.CG
null
Higher-dimensional orthogonal packing problems have a wide range of practical applications, including packing, cutting, and scheduling. Previous efforts for exact algorithms have been unable to avoid structural problems that appear for instances in two- or higher-dimensional space. We present a new approach for modeling packings, using a graph-theoretical characterization of feasible packings. Our characterization allows it to deal with classes of packings that share a certain combinatorial structure, instead of having to consider one packing at a time. In addition, we can make use of elegant algorithmic properties of certain classes of graphs. This allows our characterization to be the basis for a successful branch-and-bound framework. This is the first in a series of papers describing new approaches to higher-dimensional packing.
[ { "version": "v1", "created": "Thu, 16 Oct 2003 08:27:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Schepers", "Joerg", "" ] ]
cs/0310033
Turker Ozsari
Turker Ozsari
A Hash of Hash Functions
24 pages, a survey
null
null
null
cs.CR cs.CY
null
In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in some well known surveys, by including more details on block-cipher based hash functions and security of different hash schemes.
[ { "version": "v1", "created": "Thu, 16 Oct 2003 10:25:13 GMT" }, { "version": "v2", "created": "Mon, 27 Oct 2003 07:37:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ozsari", "Turker", "" ] ]
cs/0310035
Abhijit Kadlag
Abhijit Kadlag, Amol Wanjari, Juliana Freire, Jayant R. Haritsa
Supporting Exploratory Queries in Database Centric Web Applications
Version After chaning the authors, earlier by mistake only first two Authors were taken
null
null
null
cs.DB
null
Users of database-centric Web applications, especially in the e-commerce domain, often resort to exploratory ``trial-and-error'' queries since the underlying data space is huge and unfamiliar, and there are several alternatives for search attributes in this space. For example, scouting for cheap airfares typically involves posing multiple queries, varying flight times, dates, and airport locations. Exploratory queries are problematic from the perspective of both the user and the server. For the database server, it results in a drastic reduction in effective throughput since much of the processing is duplicated in each successive query. For the client, it results in a marked increase in response times, especially when accessing the service through wireless channels. In this paper, we investigate the design of automated techniques to minimize the need for repetitive exploratory queries. Specifically, we present SAUNA, a server-side query relaxation algorithm that, given the user's initial range query and a desired cardinality for the answer set, produces a relaxed query that is expected to contain the required number of answers. The algorithm incorporates a range-query-specific distance metric that is weighted to produce relaxed queries of a desired shape (e.g. aspect ratio preserving), and utilizes multi-dimensional histograms for query size estimation. A detailed performance evaluation of SAUNA over a variety of multi-dimensional data sets indicates that its relaxed queries can significantly reduce the costs associated with exploratory query processing.
[ { "version": "v1", "created": "Fri, 17 Oct 2003 10:02:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Kadlag", "Abhijit", "" ], [ "Wanjari", "Amol", "" ], [ "Freire", "Juliana", "" ], [ "Haritsa", "Jayant R.", "" ] ]
cs/0310036
Daniel A. Spielman
Daniel A. Spielman and Shang-Hua Teng
Solving Sparse, Symmetric, Diagonally-Dominant Linear Systems in Time $O (m^{1.31})$
fixed a typo on page 9
null
null
null
cs.DS cs.NA
null
We present a linear-system solver that, given an $n$-by-$n$ symmetric positive semi-definite, diagonally dominant matrix $A$ with $m$ non-zero entries and an $n$-vector $\bb $, produces a vector $\xxt$ within relative distance $\epsilon$ of the solution to $A \xx = \bb$ in time $O (m^{1.31} \log (n \kappa_{f} (A)/\epsilon)^{O (1)})$, where $\kappa_{f} (A)$ is the log of the ratio of the largest to smallest non-zero eigenvalue of $A$. In particular, $\log (\kappa_{f} (A)) = O (b \log n)$, where $b$ is the logarithm of the ratio of the largest to smallest non-zero entry of $A$. If the graph of $A$ has genus $m^{2\theta}$ or does not have a $K_{m^{\theta}} $ minor, then the exponent of $m$ can be improved to the minimum of $1 + 5 \theta $ and $(9/8) (1+\theta)$. The key contribution of our work is an extension of Vaidya's techniques for constructing and analyzing combinatorial preconditioners.
[ { "version": "v1", "created": "Fri, 17 Oct 2003 15:43:01 GMT" }, { "version": "v2", "created": "Wed, 31 Mar 2004 22:28:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0310037
Sandor P. Fekete
Sandor P. Fekete and Henk Meijer
Maximum dispersion and geometric maximum weight cliques
13 pages, 1 figure, Latex, to appear in Algorithmica
Algorithmica, 38 (3) 2004, 501-511.
null
null
cs.DS cs.CG
null
We consider a facility location problem, where the objective is to ``disperse'' a number of facilities, i.e., select a given number k of locations from a discrete set of n candidates, such that the average distance between selected locations is maximized. In particular, we present algorithmic results for the case where vertices are represented by points in d-dimensional space, and edge weights correspond to rectilinear distances. Problems of this type have been considered before, with the best result being an approximation algorithm with performance ratio 2. For the case where k is fixed, we establish a linear-time algorithm that finds an optimal solution. For the case where k is part of the input, we present a polynomial-time approximation scheme.
[ { "version": "v1", "created": "Fri, 17 Oct 2003 15:48:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Meijer", "Henk", "" ] ]
cs/0310039
Chiranjeeb Buragohain
Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri
A Game Theoretic Framework for Incentives in P2P Systems
null
Proc. of the Third International Conference on P2P Computing (P2P2003), Linkoping Sweden, 2003
null
null
cs.GT
null
Peer-To-Peer (P2P) networks are self-organizing, distributed systems, with no centralized authority or infrastructure. Because of the voluntary participation, the availability of resources in a P2P system can be highly variable and unpredictable. In this paper, we use ideas from Game Theory to study the interaction of strategic and rational peers, and propose a differential service-based incentive scheme to improve the system's performance.
[ { "version": "v1", "created": "Fri, 17 Oct 2003 20:56:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Buragohain", "Chiranjeeb", "" ], [ "Agrawal", "Divyakant", "" ], [ "Suri", "Subhash", "" ] ]
cs/0310040
Manos Renieris
Brock Pytlik, Manos Renieris, Shriram Krishnamurthi and Steven P. Reiss
Automated Fault Localization Using Potential Invariants
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE
null
We present a general method for fault localization based on abstracting over program traces, and a tool that implements the method using Ernst's notion of potential invariants. Our experiments so far have been unsatisfactory, suggesting that further research is needed before invariants can be used to locate faults.
[ { "version": "v1", "created": "Sat, 18 Oct 2003 22:44:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Pytlik", "Brock", "" ], [ "Renieris", "Manos", "" ], [ "Krishnamurthi", "Shriram", "" ], [ "Reiss", "Steven P.", "" ] ]
cs/0310041
Athanasios Kehagias
Pavlina Fragkou
A Dynamic Programming Algorithm for the Segmentation of Greek Texts
This paper will appear in the Proceedings of the CONSOLE XII Conference (Patras, Greece, 2003)
null
null
null
cs.CL cs.DL
null
In this paper we introduce a dynamic programming algorithm to perform linear text segmentation by global minimization of a segmentation cost function which consists of: (a) within-segment word similarity and (b) prior information about segment length. The evaluation of the segmentation accuracy of the algorithm on a text collection consisting of Greek texts showed that the algorithm achieves high segmentation accuracy and appears to be very innovating and promissing.
[ { "version": "v1", "created": "Tue, 21 Oct 2003 18:19:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Fragkou", "Pavlina", "" ] ]
cs/0310042
Mireille Ducasse
Mireille Ducasse, Ludovic Langevine, Pierre Deransart
Rigorous design of tracers: an experiment for constraint logic programming
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.SE
null
In order to design and implement tracers, one must decide what exactly to trace and how to produce this trace. On the one hand, trace designs are too often guided by implementation concerns and are not as useful as they should be. On the other hand, an interesting trace which cannot be produced efficiently, is not very useful either. In this article we propose a methodology which helps to efficiently produce accurate traces. Firstly, design a formal specification of the trace model. Secondly, derive a prototype tracer from this specification. Thirdly, analyze the produced traces. Fourthly, implement an efficient tracer. Lastly, compare the traces of the two tracers. At each step, problems can be found. In that case one has to iterate the process. We have successfully applied the proposed methodology to the design and implementation of a real tracer for constraint logic programming which is able to efficiently generate information required to build interesting graphical views of executions.
[ { "version": "v1", "created": "Wed, 22 Oct 2003 09:31:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Ducasse", "Mireille", "" ], [ "Langevine", "Ludovic", "" ], [ "Deransart", "Pierre", "" ] ]
cs/0310043
Jules SADEFO Kamdem
Jules Sadefo Kamdem
Value-at-Risk and Expected Shortfall for Quadratic portfolio of securities with mixture of elliptic Distributed Risk Factors
null
null
null
null
cs.CE math.CA
null
Generally, in the financial literature, the notion of quadratic VaR is implicitly confused with the Delta-Gamma VaR, because more authors dealt with portfolios that contains derivatives instruments. In this paper, we postpone to estimate the Value-at-Risk of a quadratic portfolio of securities (i.e equities) without the Delta and Gamma greeks, when the joint log-returns changes with multivariate elliptic distribution. We have reduced the estimation of the quadratic VaR of such portfolio to a resolution of one dimensional integral equation. To illustrate our method, we give special attention to the mixture of normal and mixture of t-student distribution. For given VaR, when joint Risk Factors changes with elliptic distribution, we show how to estimate an Expected Shortfall .
[ { "version": "v1", "created": "Wed, 22 Oct 2003 18:04:24 GMT" }, { "version": "v2", "created": "Fri, 24 Oct 2003 18:46:30 GMT" }, { "version": "v3", "created": "Wed, 29 Oct 2003 19:09:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Kamdem", "Jules Sadefo", "" ] ]
cs/0310044
Ali Abbas E.
Ali E. Abbas
The Algebra of Utility Inference
15 pages
null
null
null
cs.AI
null
Richard Cox [1] set the axiomatic foundations of probable inference and the algebra of propositions. He showed that consistency within these axioms requires certain rules for updating belief. In this paper we use the analogy between probability and utility introduced in [2] to propose an axiomatic foundation for utility inference and the algebra of preferences. We show that consistency within these axioms requires certain rules for updating preference. We discuss a class of utility functions that stems from the axioms of utility inference and show that this class is the basic building block for any general multiattribute utility function. We use this class of utility functions together with the algebra of preferences to construct utility functions represented by logical operations on the attributes.
[ { "version": "v1", "created": "Thu, 23 Oct 2003 01:13:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbas", "Ali E.", "" ] ]
cs/0310047
Simona Perri
Simona Perri, Francesco Scarcello, Nicola Leone
Abductive Logic Programs with Penalization: Semantics, Complexity and Implementation
36 pages; will be published in Theory and Practice of Logic Programming
null
null
null
cs.AI
null
Abduction, first proposed in the setting of classical logics, has been studied with growing interest in the logic programming area during the last years. In this paper we study abduction with penalization in the logic programming framework. This form of abductive reasoning, which has not been previously analyzed in logic programming, turns out to represent several relevant problems, including optimization problems, very naturally. We define a formal model for abduction with penalization over logic programs, which extends the abductive framework proposed by Kakas and Mancarella. We address knowledge representation issues, encoding a number of problems in our abductive framework. In particular, we consider some relevant problems, taken from different domains, ranging from optimization theory to diagnosis and planning; their encodings turn out to be simple and elegant in our formalism. We thoroughly analyze the computational complexity of the main problems arising in the context of abduction with penalization from logic programs. Finally, we implement a system supporting the proposed abductive framework on top of the DLV engine. To this end, we design a translation from abduction problems with penalties into logic programs with weak constraints. We prove that this approach is sound and complete.
[ { "version": "v1", "created": "Fri, 24 Oct 2003 18:03:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Perri", "Simona", "" ], [ "Scarcello", "Francesco", "" ], [ "Leone", "Nicola", "" ] ]
cs/0310048
Richard McClatchey
Sebastien Gaspard, Florida Estrella, Richard McClatchey & Regis Dindeleux
Managing Evolving Business Workflows through the Capture of Descriptive Information
12 pages, 4 figures. Presented at the eCOMO'2003 4th Int. Workshop on Conceptual Modeling Approaches for e-Business
null
null
null
cs.SE cs.DB
null
Business systems these days need to be agile to address the needs of a changing world. In particular the discipline of Enterprise Application Integration requires business process management to be highly reconfigurable with the ability to support dynamic workflows, inter-application integration and process reconfiguration. Basing EAI systems on model-resident or on a so-called description-driven approach enables aspects of flexibility, distribution, system evolution and integration to be addressed in a domain-independent manner. Such a system called CRISTAL is described in this paper with particular emphasis on its application to EAI problem domains. A practical example of the CRISTAL technology in the domain of manufacturing systems, called Agilium, is described to demonstrate the principles of model-driven system evolution and integration. The approach is compared to other model-driven development approaches such as the Model-Driven Architecture of the OMG and so-called Adaptive Object Models.
[ { "version": "v1", "created": "Fri, 24 Oct 2003 13:31:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Gaspard", "Sebastien", "" ], [ "Estrella", "Florida", "" ], [ "McClatchey", "Richard", "" ], [ "Dindeleux", "Regis", "" ] ]
cs/0310050
Artur Rataj
Artur Rataj
Feedforward Neural Networks with Diffused Nonlinear Weight Functions
17 pages, 7 figures. Corrected, some parts rewritten
null
null
IITiS-2003-02-23-1-1.06
cs.NE
null
In this paper, feedforward neural networks are presented that have nonlinear weight functions based on look--up tables, that are specially smoothed in a regularization called the diffusion. The idea of such a type of networks is based on the hypothesis that the greater number of adaptive parameters per a weight function might reduce the total number of the weight functions needed to solve a given problem. Then, if the computational complexity of a propagation through a single such a weight function would be kept low, then the introduced neural networks might possibly be relatively fast. A number of tests is performed, showing that the presented neural networks may indeed perform better in some cases than the classic neural networks and a number of other learning machines.
[ { "version": "v1", "created": "Mon, 27 Oct 2003 14:27:14 GMT" }, { "version": "v2", "created": "Sun, 2 Nov 2003 15:55:49 GMT" }, { "version": "v3", "created": "Tue, 4 Nov 2003 12:56:21 GMT" }, { "version": "v4", "created": "Thu, 31 Mar 2005 12:45:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Rataj", "Artur", "" ] ]
cs/0310052
Kamil Kulesza
Kamil Kulesza and Zbigniew Kotulski
On secret sharing for graphs
11 pages
null
null
null
cs.CR
null
In the paper we discuss how to share the secrets, that are graphs. So, far secret sharing schemes were designed to work with numbers. As the first step, we propose conditions for "graph to number" conversion methods. Hence, the existing schemes can be used, without weakening their properties. Next, we show how graph properties can be used to extend capabilities of secret sharing schemes. This leads to proposal of using such properties for number based secret sharing.
[ { "version": "v1", "created": "Tue, 28 Oct 2003 13:08:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Kulesza", "Kamil", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0310053
Kamil Kulesza
Kamil Kulesza and Zbigniew Kotulski
Secret Sharing for n-Colorable Graphs with Application to Public Key Cryptography
10 pages, 5 figures
Proceedings of 5th NATO Regional Conference on Military Communication and Information Systems, Capturing New CIS Technologies, RCMIS 2003. 22-24 pazdziernik 2003
null
null
cs.CR
null
At the beginning some results from the field of graph theory are presented. Next we show how to share a secret that is proper n-coloring of the graph, with the known structure. The graph is described and converted to the form, where colors assigned to vertices form the number with entries from Zn. A secret sharing scheme (SSS) for the graph coloring is proposed. The proposed method is applied to the public-key cryptosystem called "Polly Cracker". In this case the graph structure is a public key, while proper 3-colouring of the graph is a private key. We show how to share the private key. Sharing particular n-coloring (color-to-vertex assignment) for the known-structure graph is presented next.
[ { "version": "v1", "created": "Tue, 28 Oct 2003 13:41:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Kulesza", "Kamil", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0310054
Bernhard M\"oller
J. Desharnais, B. M\"oller, G. Struth
Kleene algebra with domain
40 pages
null
null
null
cs.LO
null
We propose Kleene algebra with domain (KAD), an extension of Kleene algebra with two equational axioms for a domain and a codomain operation, respectively. KAD considerably augments the expressiveness of Kleene algebra, in particular for the specification and analysis of state transition systems. We develop the basic calculus, discuss some related theories and present the most important models of KAD. We demonstrate applicability by two examples: First, an algebraic reconstruction of Noethericity and well-foundedness; second, an algebraic reconstruction of propositional Hoare logic.
[ { "version": "v1", "created": "Tue, 28 Oct 2003 16:09:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Desharnais", "J.", "" ], [ "Möller", "B.", "" ], [ "Struth", "G.", "" ] ]
cs/0310055
Judith Beumer
William McCune
Mace4 Reference Manual and Guide
17 pages
null
null
ANL/MCS-TM-264
cs.SC cs.MS
null
Mace4 is a program that searches for finite models of first-order formulas. For a given domain size, all instances of the formulas over the domain are constructed. The result is a set of ground clauses with equality. Then, a decision procedure based on ground equational rewriting is applied. If satisfiability is detected, one or more models are printed. Mace4 is a useful complement to first-order theorem provers, with the prover searching for proofs and Mace4 looking for countermodels, and it is useful for work on finite algebras. Mace4 performs better on equational problems than did our previous model-searching program Mace2.
[ { "version": "v1", "created": "Tue, 28 Oct 2003 16:56:44 GMT" } ]
2007-05-23T00:00:00
[ [ "McCune", "William", "" ] ]
cs/0310056
Judith Beumer
William McCune
OTTER 3.3 Reference Manual
66 pages
null
null
ANL/MCS-TM-263
cs.SC cs.MS
null
OTTER is a resolution-style theorem-proving program for first-order logic with equality. OTTER includes the inference rules binary resolution, hyperresolution, UR-resolution, and binary paramodulation. Some of its other abilities and features are conversion from first-order formulas to clauses, forward and back subsumption, factoring, weighting, answer literals, term ordering, forward and back demodulation, evaluable functions and predicates, Knuth-Bendix completion, and the hints strategy. OTTER is coded in ANSI C, is free, and is portable to many different kinds of computer.
[ { "version": "v1", "created": "Tue, 28 Oct 2003 19:17:38 GMT" } ]
2007-05-23T00:00:00
[ [ "McCune", "William", "" ] ]
cs/0310057
Judith Beumer
Uwe Naumann and Andrea Walther
An Introduction to Using Software Tools for Automatic Differentiation
23 pages
null
null
ANL/MCS-TM-254
cs.MS
null
We give a gentle introduction to using various software tools for automatic differentiation (AD). Ready-to-use examples are discussed, and links to further information are presented. Our target audience includes all those who are looking for a straightforward way to get started using the available AD technology. The document is dynamic in the sense that its content will be updated as the AD software evolves.
[ { "version": "v1", "created": "Tue, 28 Oct 2003 19:41:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Naumann", "Uwe", "" ], [ "Walther", "Andrea", "" ] ]
cs/0310058
Philip Windridge
Rodney J. Clarke, Dali Dong and Philip C. Windridge
Application Architecture for Spoken Language Resources in Organisational Settings
12 pages, 3 figures
null
null
null
cs.CL
null
Special technologies need to be used to take advantage of, and overcome, the challenges associated with acquiring, transforming, storing, processing, and distributing spoken language resources in organisations. This paper introduces an application architecture consisting of tools and supporting utilities for indexing and transcription, and describes how these tools, together with downstream processing and distribution systems, can be integrated into a workflow. Two sample applications for this architecture are outlined- the analysis of decision-making processes in organisations and the deployment of systems development methods by designers in the field.
[ { "version": "v1", "created": "Wed, 29 Oct 2003 20:13:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Clarke", "Rodney J.", "" ], [ "Dong", "Dali", "" ], [ "Windridge", "Philip C.", "" ] ]
cs/0310059
Judith Beumer
Jiuxing Liu, Weihang Jiang, Pete Wyckoff, Dhabaleswar K. Panda, David Ashton, Darius Buntinas, William Gropp, Brian Toonen
Design and Implementation of MPICH2 over InfiniBand with RDMA Support
12 pages, 17 figures
null
null
Preprint ANL/MCS-P1103-1003
cs.AR cs.DC
null
For several years, MPI has been the de facto standard for writing parallel applications. One of the most popular MPI implementations is MPICH. Its successor, MPICH2, features a completely new design that provides more performance and flexibility. To ensure portability, it has a hierarchical structure based on which porting can be done at different levels. In this paper, we present our experiences designing and implementing MPICH2 over InfiniBand. Because of its high performance and open standard, InfiniBand is gaining popularity in the area of high-performance computing. Our study focuses on optimizing the performance of MPI-1 functions in MPICH2. One of our objectives is to exploit Remote Direct Memory Access (RDMA) in Infiniband to achieve high performance. We have based our design on the RDMA Channel interface provided by MPICH2, which encapsulates architecture-dependent communication functionalities into a very small set of functions. Starting with a basic design, we apply different optimizations and also propose a zero-copy-based design. We characterize the impact of our optimizations and designs using microbenchmarks. We have also performed an application-level evaluation using the NAS Parallel Benchmarks. Our optimized MPICH2 implementation achieves 7.6 $\mu$s latency and 857 MB/s bandwidth, which are close to the raw performance of the underlying InfiniBand layer. Our study shows that the RDMA Channel interface in MPICH2 provides a simple, yet powerful, abstraction that enables implementations with high performance by exploiting RDMA operations in InfiniBand. To the best of our knowledge, this is the first high-performance design and implementation of MPICH2 on InfiniBand using RDMA support.
[ { "version": "v1", "created": "Thu, 30 Oct 2003 18:11:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Liu", "Jiuxing", "" ], [ "Jiang", "Weihang", "" ], [ "Wyckoff", "Pete", "" ], [ "Panda", "Dhabaleswar K.", "" ], [ "Ashton", "David", "" ], [ "Buntinas", "Darius", "" ], [ "Gropp", "William", "" ], [ "Toonen", "Brian", "" ] ]
cs/0310061
Miroslaw Truszczynski
Lengning Liu, Miroslaw Truszczynski
Local-search techniques for propositional logic extended with cardinality constraints
Proceedings of the 9th International Conference on Pronciples and Practice of Constraint Programming - CP 2003, LNCS 2833, pp. 495-509
null
null
null
cs.AI
null
We study local-search satisfiability solvers for propositional logic extended with cardinality atoms, that is, expressions that provide explicit ways to model constraints on cardinalities of sets. Adding cardinality atoms to the language of propositional logic facilitates modeling search problems and often results in concise encodings. We propose two ``native'' local-search solvers for theories in the extended language. We also describe techniques to reduce the problem to standard propositional satisfiability and allow us to use off-the-shelf SAT solvers. We study these methods experimentally. Our general finding is that native solvers designed specifically for the extended language perform better than indirect methods relying on SAT solvers.
[ { "version": "v1", "created": "Fri, 31 Oct 2003 16:29:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Liu", "Lengning", "" ], [ "Truszczynski", "Miroslaw", "" ] ]
cs/0310062
Miroslaw Truszczynski
Lengning Liu, Miroslaw Truszczynski
WSAT(cc) - a fast local-search ASP solver
Proceedings of LPNMR-03 (7th International Conference), LNCS, Springer Verlag
null
null
null
cs.AI
null
We describe WSAT(cc), a local-search solver for computing models of theories in the language of propositional logic extended by cardinality atoms. WSAT(cc) is a processing back-end for the logic PS+, a recently proposed formalism for answer-set programming.
[ { "version": "v1", "created": "Fri, 31 Oct 2003 16:46:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Liu", "Lengning", "" ], [ "Truszczynski", "Miroslaw", "" ] ]
cs/0310063
Miroslaw Truszczynski
Victor W. Marek, Ilkka Niemela, Miroslaw Truszczynski
Logic programs with monotone cardinality atoms
Proceedings of LPNMR-03 (7th International Conference), LNCS, Springer Verlag
null
null
null
cs.LO
null
We investigate mca-programs, that is, logic programs with clauses built of monotone cardinality atoms of the form kX, where k is a non-negative integer and X is a finite set of propositional atoms. We develop a theory of mca-programs. We demonstrate that the operational concept of the one-step provability operator generalizes to mca-programs, but the generalization involves nondeterminism. Our main results show that the formalism of mca-programs is a common generalization of (1) normal logic programming with its semantics of models, supported models and stable models, (2) logic programming with cardinality atoms and with the semantics of stable models, as defined by Niemela, Simons and Soininen, and (3) of disjunctive logic programming with the possible-model semantics of Sakama and Inoue.
[ { "version": "v1", "created": "Fri, 31 Oct 2003 16:56:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Marek", "Victor W.", "" ], [ "Niemela", "Ilkka", "" ], [ "Truszczynski", "Miroslaw", "" ] ]
cs/0310064
Miroslaw Truszczynski
Michael R. Dransfield, Victor W. Marek, Miroslaw Truszczynski
Satisfiability and computing van der Waerden numbers
Proceedings of SAT-2003, LNCS, Springer Verlag
null
null
null
cs.LO
null
In this paper we bring together the areas of combinatorics and propositional satisfiability. Many combinatorial theorems establish, often constructively, the existence of positive integer functions, without actually providing their closed algebraic form or tight lower and upper bounds. The area of Ramsey theory is especially rich in such results. Using the problem of computing van der Waerden numbers as an example, we show that these problems can be represented by parameterized propositional theories in such a way that decisions concerning their satisfiability determine the numbers (function) in question. We show that by using general-purpose complete and local-search techniques for testing propositional satisfiability, this approach becomes effective -- competitive with specialized approaches. By following it, we were able to obtain several new results pertaining to the problem of computing van der Waerden numbers. We also note that due to their properties, especially their structural simplicity and computational hardness, propositional theories that arise in this research can be of use in development, testing and benchmarking of SAT solvers.
[ { "version": "v1", "created": "Fri, 31 Oct 2003 17:05:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Dransfield", "Michael R.", "" ], [ "Marek", "Victor W.", "" ], [ "Truszczynski", "Miroslaw", "" ] ]
cs/0310065
Mikkel Thorup
Stephen Alstrup, Jacob Holm, Kristian de Lichtenberg, Mikkel Thorup
Maintaining Information in Fully-Dynamic Trees with Top Trees
Preliminary versions of this work presented at ICALP'97 and SWAT'00. The new version takes layered top trees into account
null
null
null
cs.DS
null
We introduce top trees as a design of a new simpler interface for data structures maintaining information in a fully-dynamic forest. We demonstrate how easy and versatile they are to use on a host of different applications. For example, we show how to maintain the diameter, center, and median of each tree in the forest. The forest can be updated by insertion and deletion of edges and by changes to vertex and edge weights. Each update is supported in O(log n) time, where n is the size of the tree(s) involved in the update. Also, we show how to support nearest common ancestor queries and level ancestor queries with respect to arbitrary roots in O(log n) time. Finally, with marked and unmarked vertices, we show how to compute distances to a nearest marked vertex. The later has applications to approximate nearest marked vertex in general graphs, and thereby to static optimization problems over shortest path metrics. Technically speaking, top trees are easily implemented either with Frederickson's topology trees [Ambivalent Data Structures for Dynamic 2-Edge-Connectivity and k Smallest Spanning Trees, SIAM J. Comput. 26 (2) pp. 484-538, 1997] or with Sleator and Tarjan's dynamic trees [A Data Structure for Dynamic Trees. J. Comput. Syst. Sc. 26 (3) pp. 362-391, 1983]. However, we claim that the interface is simpler for many applications, and indeed our new bounds are quadratic improvements over previous bounds where they exist.
[ { "version": "v1", "created": "Fri, 31 Oct 2003 18:37:47 GMT" }, { "version": "v2", "created": "Fri, 21 Nov 2003 21:09:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Alstrup", "Stephen", "" ], [ "Holm", "Jacob", "" ], [ "de Lichtenberg", "Kristian", "" ], [ "Thorup", "Mikkel", "" ] ]
cs/0311002
Andy King
Florence Benoy and Andy King and Fred Mesnard
Computing Convex Hulls with a Linear Solver
13 pages, 1 figure
null
null
null
cs.PL
null
A programming tactic involving polyhedra is reported that has been widely applied in the polyhedral analysis of (constraint) logic programs. The method enables the computations of convex hulls that are required for polyhedral analysis to be coded with linear constraint solving machinery that is available in many Prolog systems. To appear in Theory and Practice of Logic Programming (TPLP)
[ { "version": "v1", "created": "Tue, 4 Nov 2003 12:43:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Benoy", "Florence", "" ], [ "King", "Andy", "" ], [ "Mesnard", "Fred", "" ] ]
cs/0311003
Maurice Bruynooghe
Maurice Bruynooghe
Enhancing a Search Algorithm to Perform Intelligent Backtracking
To appear in Theory and Practice of Logic Programming
null
null
null
cs.AI cs.LO
null
This paper illustrates how a Prolog program, using chronological backtracking to find a solution in some search space, can be enhanced to perform intelligent backtracking. The enhancement crucially relies on the impurity of Prolog that allows a program to store information when a dead end is reached. To illustrate the technique, a simple search program is enhanced. To appear in Theory and Practice of Logic Programming. Keywords: intelligent backtracking, dependency-directed backtracking, backjumping, conflict-directed backjumping, nogood sets, look-back.
[ { "version": "v1", "created": "Wed, 5 Nov 2003 09:56:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Bruynooghe", "Maurice", "" ] ]
cs/0311004
Ali Abbas E.
Ali Abbas, Jim Matheson
Utility-Probability Duality
null
null
null
null
cs.AI
null
This paper presents duality between probability distributions and utility functions.
[ { "version": "v1", "created": "Thu, 6 Nov 2003 07:33:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbas", "Ali", "" ], [ "Matheson", "Jim", "" ] ]
cs/0311005
David S. H. Rosenthal
David S. H. Rosenthal
On The Cost Distribution of a Memory Bound Function
8 pages
null
null
LOCKSS TR2003-02
cs.CR cs.DL
null
Memory Bound Functions have been proposed for fighting spam, resisting Sybil attacks and other purposes. A particular implementation of such functions has been proposed in which the average effort required to generate a proof of effort is set by parameters E and l to E * l. The distribution of effort required to generate an individual proof about this average is fairly broad. When particular uses of these functions are envisaged, the choice of E and l, and the system design surrounding the generation and verification of proofs of effort, need to take the breadth of the distribution into account. We show the distribution for this implementation, discuss the system design issues in the context of two proposed applications, and suggest an improved implementation.
[ { "version": "v1", "created": "Thu, 6 Nov 2003 18:54:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosenthal", "David S. H.", "" ] ]
cs/0311006
Paul M. Aoki
Allison Woodruff and Paul M. Aoki
How Push-To-Talk Makes Talk Less Pushy
10 pages
Proc. ACM SIGGROUP Conf. on Supporting Group Work, Sanibel Island, FL, Nov. 2003, 170-179. ACM Press.
10.1145/958160.958187
null
cs.HC
null
This paper presents an exploratory study of college-age students using two-way, push-to-talk cellular radios. We describe the observed and reported use of cellular radio by the participants. We discuss how the half-duplex, lightweight cellular radio communication was associated with reduced interactional commitment, which meant the cellular radios could be used for a wide range of conversation styles. One such style, intermittent conversation, is characterized by response delays. Intermittent conversation is surprising in an audio medium, since it is typically associated with textual media such as instant messaging. We present design implications of our findings.
[ { "version": "v1", "created": "Fri, 7 Nov 2003 02:17:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Woodruff", "Allison", "" ], [ "Aoki", "Paul M.", "" ] ]
cs/0311007
Simona Perri
Simona Perri, Nicola Leone
Parametric Connectives in Disjunctive Logic Programming
null
null
null
null
cs.AI
null
Disjunctive Logic Programming (\DLP) is an advanced formalism for Knowledge Representation and Reasoning (KRR). \DLP is very expressive in a precise mathematical sense: it allows to express every property of finite structures that is decidable in the complexity class $\SigmaP{2}$ ($\NP^{\NP}$). Importantly, the \DLP encodings are often simple and natural. In this paper, we single out some limitations of \DLP for KRR, which cannot naturally express problems where the size of the disjunction is not known ``a priori'' (like N-Coloring), but it is part of the input. To overcome these limitations, we further enhance the knowledge modelling abilities of \DLP, by extending this language by {\em Parametric Connectives (OR and AND)}. These connectives allow us to represent compactly the disjunction/conjunction of a set of atoms having a given property. We formally define the semantics of the new language, named $DLP^{\bigvee,\bigwedge}$ and we show the usefulness of the new constructs on relevant knowledge-based problems. We address implementation issues and discuss related works.
[ { "version": "v1", "created": "Fri, 7 Nov 2003 15:57:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Perri", "Simona", "" ], [ "Leone", "Nicola", "" ] ]
cs/0311008
Ralf Schweimeier
Ralf Schweimeier and Michael Schroeder
A Parameterised Hierarchy of Argumentation Semantics for Extended Logic Programming and its Application to the Well-founded Semantics
To appear in Theory and Practice of Logic Programming
null
null
null
cs.LO cs.AI
null
Argumentation has proved a useful tool in defining formal semantics for assumption-based reasoning by viewing a proof as a process in which proponents and opponents attack each others arguments by undercuts (attack to an argument's premise) and rebuts (attack to an argument's conclusion). In this paper, we formulate a variety of notions of attack for extended logic programs from combinations of undercuts and rebuts and define a general hierarchy of argumentation semantics parameterised by the notions of attack chosen by proponent and opponent. We prove the equivalence and subset relationships between the semantics and examine some essential properties concerning consistency and the coherence principle, which relates default negation and explicit negation. Most significantly, we place existing semantics put forward in the literature in our hierarchy and identify a particular argumentation semantics for which we prove equivalence to the paraconsistent well-founded semantics with explicit negation, WFSX$_p$. Finally, we present a general proof theory, based on dialogue trees, and show that it is sound and complete with respect to the argumentation semantics.
[ { "version": "v1", "created": "Sat, 8 Nov 2003 14:02:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Schweimeier", "Ralf", "" ], [ "Schroeder", "Michael", "" ] ]
cs/0311009
Alexander Kryukov
A. Demichev (1), D. Foster (2), V. Kalyaev (1), A.Kryukov (1), M. Lamanna (2), V. Pose (3), R. B. Da Rocha (2) and C. Wang (4) ((1) Skobeltsyn Institute of Nuclear Physics, Moscow State University, Moscow, Russia, (2) CERN-IT, Geneva, Switzerland, (3) JINR LIT, Dubna, Russia, (4) Academica Sinica, Taipei, Taiwan)
OGSA/Globus Evaluation for Data Intensive Applications
To be published in the proceedings of the XIX International Symposium on Nuclear Electronics and Computing (NEC'2003), Bulgaria, Varna, 15-20 September, 2003
null
null
null
cs.DC
null
We present an architecture of Globus Toolkit 3 based testbed intended for evaluation of applicability of the Open Grid Service Architecture (OGSA) for Data Intensive Applications.
[ { "version": "v1", "created": "Mon, 10 Nov 2003 11:12:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Demichev", "A.", "" ], [ "Foster", "D.", "" ], [ "Kalyaev", "V.", "" ], [ "Kryukov", "A.", "" ], [ "Lamanna", "M.", "" ], [ "Pose", "V.", "" ], [ "Da Rocha", "R. B.", "" ], [ "Wang", "C.", "" ] ]
cs/0311010
Alexander Kryukov
V. Kalyaev, A. Kryukov (Skobektsyn Institute of Nuclear Physics Moscow State University, Moscow, Russia)
Problem of Application Job Monitoring in GRID Systems
To be published in the proceedings of the XIX International Symposium on Nuclear Electronics and Computing (NEC'2003), Bulgaria, Varna, 15-20 September, 2003
null
null
null
cs.DC
null
We present a new approach to monitoring of the execution process of an application job in the GRID environment. The main point of the approach is use of GRID ervices to access monitoring information with the security level available in GRID.
[ { "version": "v1", "created": "Mon, 10 Nov 2003 11:39:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalyaev", "V.", "", "Skobektsyn Institute of Nuclear Physics Moscow\n State University, Moscow, Russia" ], [ "Kryukov", "A.", "", "Skobektsyn Institute of Nuclear Physics Moscow\n State University, Moscow, Russia" ] ]
cs/0311011
Santos B. Yuste
S. B. Yuste and L. Acedo
On an explicit finite difference method for fractional diffusion equations
22 pages, 6 figures
SIAM J. Numer. Anal. Vol. 42, No. 5, pp. 1862--1874 (2005)
10.1137/030602666
null
cs.NA cond-mat.stat-mech cs.CE physics.comp-ph
null
A numerical method to solve the fractional diffusion equation, which could also be easily extended to many other fractional dynamics equations, is considered. These fractional equations have been proposed in order to describe anomalous transport characterized by non-Markovian kinetics and the breakdown of Fick's law. In this paper we combine the forward time centered space (FTCS) method, well known for the numerical integration of ordinary diffusion equations, with the Grunwald-Letnikov definition of the fractional derivative operator to obtain an explicit fractional FTCS scheme for solving the fractional diffusion equation. The resulting method is amenable to a stability analysis a la von Neumann. We show that the analytical stability bounds are in excellent agreement with numerical tests. Comparison between exact analytical solutions and numerical predictions are made.
[ { "version": "v1", "created": "Mon, 10 Nov 2003 13:13:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Yuste", "S. B.", "" ], [ "Acedo", "L.", "" ] ]
cs/0311012
Rui Carvalho
Rui Carvalho and Michael Batty
A rigorous definition of axial lines: ridges on isovist fields
18 pages, 5 figures
null
null
null
cs.CV cs.CG
null
We suggest that 'axial lines' defined by (Hillier and Hanson, 1984) as lines of uninterrupted movement within urban streetscapes or buildings, appear as ridges in isovist fields (Benedikt, 1979). These are formed from the maximum diametric lengths of the individual isovists, sometimes called viewsheds, that make up these fields (Batty and Rana, 2004). We present an image processing technique for the identification of lines from ridges, discuss current strengths and weaknesses of the method, and show how it can be implemented easily and effectively.
[ { "version": "v1", "created": "Wed, 12 Nov 2003 19:15:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Carvalho", "Rui", "" ], [ "Batty", "Michael", "" ] ]
cs/0311013
Vamsi Paruchuri
Vamsi Paruchuri, Arjan Durresi, Raj Jain
Optimized Flooding Protocol for Ad hoc Networks
Number of Pages: 11
null
null
null
cs.NI
null
Flooding provides important control and route establishment functionality for a number of unicast and multicast protocols in Mobile Ad Hoc Networks. Considering its wide use as a building block for other network layer protocols, the flooding methodology should deliver a packet from one node to all other network nodes using as few messages as possible. In this paper, we propose the Optimized Flooding Protocol (OFP), based on a variation of The Covering Problem that is encountered in geometry, to minimize the unnecessary transmissions drastically and still be able to cover the whole region. OFP does not need hello messages and hence OFP saves a significant amount of wireless bandwidth and incurs lesser overhead. We present simulation results to show the efficiency of OFP in both ideal cases and randomly distributed networks. Moreover, OFP is scalable with respect to density; in fact OFP requires lesser number of transmissions at higher densities. OFP is also resilient to transmission errors.
[ { "version": "v1", "created": "Wed, 12 Nov 2003 22:48:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Paruchuri", "Vamsi", "" ], [ "Durresi", "Arjan", "" ], [ "Jain", "Raj", "" ] ]
cs/0311014
Marcus Hutter
Marcus Hutter
Optimality of Universal Bayesian Sequence Prediction for General Loss and Alphabet
34 pages
Journal of Machine Learning Research 4 (2003) 971-1000
null
IDSIA-02-02
cs.LG cs.AI math.PR
null
Various optimality properties of universal sequence predictors based on Bayes-mixtures in general, and Solomonoff's prediction scheme in particular, will be studied. The probability of observing $x_t$ at time $t$, given past observations $x_1...x_{t-1}$ can be computed with the chain rule if the true generating distribution $\mu$ of the sequences $x_1x_2x_3...$ is known. If $\mu$ is unknown, but known to belong to a countable or continuous class $\M$ one can base ones prediction on the Bayes-mixture $\xi$ defined as a $w_\nu$-weighted sum or integral of distributions $\nu\in\M$. The cumulative expected loss of the Bayes-optimal universal prediction scheme based on $\xi$ is shown to be close to the loss of the Bayes-optimal, but infeasible prediction scheme based on $\mu$. We show that the bounds are tight and that no other predictor can lead to significantly smaller bounds. Furthermore, for various performance measures, we show Pareto-optimality of $\xi$ and give an Occam's razor argument that the choice $w_\nu\sim 2^{-K(\nu)}$ for the weights is optimal, where $K(\nu)$ is the length of the shortest program describing $\nu$. The results are applied to games of chance, defined as a sequence of bets, observations, and rewards. The prediction schemes (and bounds) are compared to the popular predictors based on expert advice. Extensions to infinite alphabets, partial, delayed and probabilistic prediction, classification, and more active systems are briefly discussed.
[ { "version": "v1", "created": "Thu, 13 Nov 2003 12:02:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
cs/0311015
Liang Wang
Liang Wang, Yiping Guo, Ming Fang
Make search become the internal function of Internet
7 pages, 3 figures
null
null
null
cs.IR cs.DL cs.NI
null
Domain Resource Integrated System (DRIS) is introduced in this paper. DRIS is a distributed information retrieval system, which will solve problems like poor coverage, long update interval in current web search system. The most distinct character of DRIS is that it's a public opening system, and acts as an internal component of Internet, but not the production of a company. The implementation of DRIS is also represented.
[ { "version": "v1", "created": "Fri, 14 Nov 2003 09:53:51 GMT" }, { "version": "v2", "created": "Sat, 15 Nov 2003 13:25:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Liang", "" ], [ "Guo", "Yiping", "" ], [ "Fang", "Ming", "" ] ]
cs/0311016
Erwan Jahier
Erwan Jahier and Mireille Ducass'e
Generic and Efficient Program Monitoring by trace analysis
null
E. Jahier and M. Ducass'e "Generic Program Monitoring by Trace Analysis" in the Theory and Practice of Logic Programming journal, Volume 2 part 4&5, pp 613-645, September 2002, Special Issue Program Development, Cambridge University Press
null
null
cs.PL
null
Program execution monitoring consists of checking whole executions for given properties in order to collect global run-time information. Monitoring is very useful to maintain programs. However, application developers face the following dilemma: either they use existing tools which never exactly fit their needs, or they invest a lot of effort to implement monitoring code. In this article we argue that, when an event-oriented tracer exists, the compiler developers can enable the application developers to easily code their own, relevant, monitors which will run efficiently. We propose a high-level operator, called foldt, which operates on execution traces. One of the key advantages of our approach is that it allows a clean separation of concerns; the definition of monitors is neither intertwined in the user source code nor in the language compiler. We give a number of applications of the foldt operator to compute monitors for Mercury program executions: execution profiles, graphical abstract views, and two test coverage measurements. Each example is implemented by a few simple lines of Mercury. Detailed measurements show acceptable performance of the basic mechanism of foldt for executions of several millions of execution events.
[ { "version": "v1", "created": "Fri, 14 Nov 2003 10:23:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Jahier", "Erwan", "" ], [ "Ducass'e", "Mireille", "" ] ]
cs/0311017
Mema Roussopoulos
Mema Roussopoulos (Harvard University), Mary Baker (HP Labs), David S. H. Rosenthal (Stanford University Libraries), TJ Giuli (Stanford University), Petros Maniatis (Intel Research), Jeff Mogul (HP Labs)
2 P2P or Not 2 P2P?
6 pages, 1 figure
null
null
null
cs.NI cs.AR
null
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.
[ { "version": "v1", "created": "Fri, 14 Nov 2003 22:36:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Roussopoulos", "Mema", "", "Harvard University" ], [ "Baker", "Mary", "", "HP Labs" ], [ "Rosenthal", "David S. H.", "", "Stanford University Libraries" ], [ "Giuli", "TJ", "", "Stanford University" ], [ "Maniatis", "Petros", "", "Intel Research" ], [ "Mogul", "Jeff", "", "HP Labs" ] ]
cs/0311020
Hsueh-I. Lu
Kai-min Chung and Hsueh-I Lu
An Optimal Algorithm for the Maximum-Density Segment Problem
15 pages, 12 figures, an early version of this paper was presented at 11th Annual European Symposium on Algorithms (ESA 2003), Budapest, Hungary, September 15-20, 2003
SIAM Journal on Computing, 34(2):373-387, 2004
10.1137/S0097539704440430
null
cs.DS cs.DM
null
We address a fundamental problem arising from analysis of biomolecular sequences. The input consists of two numbers $w_{\min}$ and $w_{\max}$ and a sequence $S$ of $n$ number pairs $(a_i,w_i)$ with $w_i>0$. Let {\em segment} $S(i,j)$ of $S$ be the consecutive subsequence of $S$ between indices $i$ and $j$. The {\em density} of $S(i,j)$ is $d(i,j)=(a_i+a_{i+1}+...+a_j)/(w_i+w_{i+1}+...+w_j)$. The {\em maximum-density segment problem} is to find a maximum-density segment over all segments $S(i,j)$ with $w_{\min}\leq w_i+w_{i+1}+...+w_j \leq w_{\max}$. The best previously known algorithm for the problem, due to Goldwasser, Kao, and Lu, runs in $O(n\log(w_{\max}-w_{\min}+1))$ time. In the present paper, we solve the problem in O(n) time. Our approach bypasses the complicated {\em right-skew decomposition}, introduced by Lin, Jiang, and Chao. As a result, our algorithm has the capability to process the input sequence in an online manner, which is an important feature for dealing with genome-scale sequences. Moreover, for a type of input sequences $S$ representable in $O(m)$ space, we show how to exploit the sparsity of $S$ and solve the maximum-density segment problem for $S$ in $O(m)$ time.
[ { "version": "v1", "created": "Mon, 17 Nov 2003 09:37:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Chung", "Kai-min", "" ], [ "Lu", "Hsueh-I", "" ] ]
cs/0311021
Lev Shamardin
L. Shamardin (Skobektsyn Institute of Nuclear Physics Moscow State University, Moscow, Russia)
LCG-1 Deployment and usage experience
To be published in the proceedings of the XIX International Symposium on Nuclear Electronics and Computing (NEC'2003), Bulgaria, Varna, 15-20 September, 2003
null
null
null
cs.DC
null
LCG-1 is the second release of the software framework for the LHC Computing Grid project. In our work we describe the installation process, arising problems and their solutions, and configuration tuning details of the complete LCG-1 site, including all LCG elements required for the self-sufficient site.
[ { "version": "v1", "created": "Mon, 17 Nov 2003 13:19:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Shamardin", "L.", "", "Skobektsyn Institute of Nuclear Physics Moscow State\n University, Moscow, Russia" ] ]
cs/0311022
Massimo Franceschet
M. Franceschet and A. Montanari
Temporalized logics and automata for time granularity
Journal: Theory and Practice of Logic Programming Journal Acronym: TPLP Category: Paper for Special Issue (Verification and Computational Logic) Submitted: 18 March 2002, revised: 14 Januari 2003, accepted: 5 September 2003
null
null
null
cs.LO
null
Suitable extensions of the monadic second-order theory of k successors have been proposed in the literature to capture the notion of time granularity. In this paper, we provide the monadic second-order theories of downward unbounded layered structures, which are infinitely refinable structures consisting of a coarsest domain and an infinite number of finer and finer domains, and of upward unbounded layered structures, which consist of a finest domain and an infinite number of coarser and coarser domains, with expressively complete and elementarily decidable temporal logic counterparts. We obtain such a result in two steps. First, we define a new class of combined automata, called temporalized automata, which can be proved to be the automata-theoretic counterpart of temporalized logics, and show that relevant properties, such as closure under Boolean operations, decidability, and expressive equivalence with respect to temporal logics, transfer from component automata to temporalized ones. Then, we exploit the correspondence between temporalized logics and automata to reduce the task of finding the temporal logic counterparts of the given theories of time granularity to the easier one of finding temporalized automata counterparts of them.
[ { "version": "v1", "created": "Mon, 17 Nov 2003 14:11:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Franceschet", "M.", "" ], [ "Montanari", "A.", "" ] ]
cs/0311023
Jeremy Wazny
Peter J. Stuckey, Martin Sulzmann, Jeremy Wazny
The Chameleon Type Debugger (Tool Demonstration)
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.PL
null
In this tool demonstration, we give an overview of the Chameleon type debugger. The type debugger's primary use is to identify locations within a source program which are involved in a type error. By further examining these (potentially) problematic program locations, users gain a better understanding of their program and are able to work towards the actual mistake which was the cause of the type error. The debugger is interactive, allowing the user to provide additional information to narrow down the search space. One of the novel aspects of the debugger is the ability to explain erroneous-looking types. In the event that an unexpected type is inferred, the debugger can highlight program locations which contributed to that result. Furthermore, due to the flexible constraint-based foundation that the debugger is built upon, it can naturally handle advanced type system features such as Haskell's type classes and functional dependencies.
[ { "version": "v1", "created": "Mon, 17 Nov 2003 23:06:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Stuckey", "Peter J.", "" ], [ "Sulzmann", "Martin", "" ], [ "Wazny", "Jeremy", "" ] ]
cs/0311024
Viviana Mascardi
Viviana Mascardi, Maurizio Martelli, Leon Sterling
Logic-Based Specification Languages for Intelligent Software Agents
67 pages, 1 table, 1 figure. Accepted for publication by the Journal "Theory and Practice of Logic Programming", volume 4, Maurice Bruynooghe Editor-in-Chief
null
null
null
cs.AI
null
The research field of Agent-Oriented Software Engineering (AOSE) aims to find abstractions, languages, methodologies and toolkits for modeling, verifying, validating and prototyping complex applications conceptualized as Multiagent Systems (MASs). A very lively research sub-field studies how formal methods can be used for AOSE. This paper presents a detailed survey of six logic-based executable agent specification languages that have been chosen for their potential to be integrated in our ARPEGGIO project, an open framework for specifying and prototyping a MAS. The six languages are ConGoLog, Agent-0, the IMPACT agent programming language, DyLog, Concurrent METATEM and Ehhf. For each executable language, the logic foundations are described and an example of use is shown. A comparison of the six languages and a survey of similar approaches complete the paper, together with considerations of the advantages of using logic-based languages in MAS modeling and prototyping.
[ { "version": "v1", "created": "Thu, 20 Nov 2003 10:10:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Mascardi", "Viviana", "" ], [ "Martelli", "Maurizio", "" ], [ "Sterling", "Leon", "" ] ]
cs/0311026
Joseph Y. Halpern
Francis C. Chu, Joseph Y. Halpern
Great Expectations. Part I: On the Customizability of Generalized Expected Utility
Preliminary version appears in Proc. 18th International Joint Conference on AI (IJCAI), 2003, pp. 291-296
null
null
null
cs.AI
null
We propose a generalization of expected utility that we call generalized EU (GEU), where a decision maker's beliefs are represented by plausibility measures, and the decision maker's tastes are represented by general (i.e.,not necessarily real-valued) utility functions. We show that every agent, ``rational'' or not, can be modeled as a GEU maximizer. We then show that we can customize GEU by selectively imposing just the constraints we want. In particular, we show how each of Savage's postulates corresponds to constraints on GEU.
[ { "version": "v1", "created": "Thu, 20 Nov 2003 17:36:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Chu", "Francis C.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/0311027
Joseph Y. Halpern
Francis C. Chu, Joseph Y. Halpern
Great Expectations. Part II: Generalized Expected Utility as a Universal Decision Rule
Preliminary version appears in Proc. 18th International Joint Conference on AI (IJCAI), 2003, pp. 297-302
null
null
null
cs.AI
null
Many different rules for decision making have been introduced in the literature. We show that a notion of generalized expected utility proposed in Part I of this paper is a universal decision rule, in the sense that it can represent essentially all other decision rules.
[ { "version": "v1", "created": "Thu, 20 Nov 2003 17:39:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Chu", "Francis C.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/0311028
Joseph Y. Halpern
Joseph Y. Halpern and Yoram Moses
Using Counterfactuals in Knowledge-Based Programming
Preliminary version appears in Proc. 7th Conference on Theoretical Aspects of Rationality and Knowledge (TARK), 1998, pp. 97-110. Submitted to Distributed Computing
null
null
null
cs.DC cs.AI
null
This paper adds counterfactuals to the framework of knowledge-based programs of Fagin, Halpern, Moses, and Vardi. The use of counterfactuals is illustrated by designing a protocol in which an agent stops sending messages once it knows that it is safe to do so. Such behavior is difficult to capture in the original framework because it involves reasoning about counterfactual executions, including ones that are not consistent with the protocol. Attempts to formalize these notions without counterfactuals are shown to lead to rather counterintuitive behavior.
[ { "version": "v1", "created": "Thu, 20 Nov 2003 17:26:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Moses", "Yoram", "" ] ]