id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0311029
Saverio Perugini
Michael Narayan, Chris Williams, Saverio Perugini, and Naren Ramakrishnan
Staging Transformations for Multimodal Web Interaction Management
Describes framework and software architecture for multimodal web interaction management
null
null
null
cs.IR cs.PL
null
Multimodal interfaces are becoming increasingly ubiquitous with the advent of mobile devices, accessibility considerations, and novel software technologies that combine diverse interaction media. In addition to improving access and delivery capabilities, such interfaces enable flexible and personalized dialogs with websites, much like a conversation between humans. In this paper, we present a software framework for multimodal web interaction management that supports mixed-initiative dialogs between users and websites. A mixed-initiative dialog is one where the user and the website take turns changing the flow of interaction. The framework supports the functional specification and realization of such dialogs using staging transformations -- a theory for representing and reasoning about dialogs based on partial input. It supports multiple interaction interfaces, and offers sessioning, caching, and co-ordination functions through the use of an interaction manager. Two case studies are presented to illustrate the promise of this approach.
[ { "version": "v1", "created": "Thu, 20 Nov 2003 17:27:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Narayan", "Michael", "" ], [ "Williams", "Chris", "" ], [ "Perugini", "Saverio", "" ], [ "Ramakrishnan", "Naren", "" ] ]
cs/0311030
Zoe Abrams
Zoe Abrams, Ashish Goel, Serge Plotkin
Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks
null
null
null
null
cs.DS
null
Wireless sensor networks (WSNs) are emerging as an effective means for environment monitoring. This paper investigates a strategy for energy efficient monitoring in WSNs that partitions the sensors into covers, and then activates the covers iteratively in a round-robin fashion. This approach takes advantage of the overlap created when many sensors monitor a single area. Our work builds upon previous work in "Power Efficient Organization of Wireless Sensor Networks" by Slijepcevic and Potkonjak, where the model is first formulated. We have designed three approximation algorithms for a variation of the SET K-COVER problem, where the objective is to partition the sensors into covers such that the number of covers that include an area, summed over all areas, is maximized. The first algorithm is randomized and partitions the sensors, in expectation, within a fraction 1 - 1/e (~.63) of the optimum. We present two other deterministic approximation algorithms. One is a distributed greedy algorithm with a 1/2 approximation ratio and the other is a centralized greedy algorithm with a 1 - 1/e approximation ratio. We show that it is NP-Complete to guarantee better than 15/16 of the optimal coverage, indicating that all three algorithms perform well with respect to the best approximation algorithm possible. Simulations indicate that in practice, the deterministic algorithms perform far above their worst case bounds, consistently covering more than 72% of what is covered by an optimum solution. Simulations also indicate that the increase in longevity is proportional to the amount of overlap amongst the sensors. The algorithms are fast, easy to use, and according to simulations, significantly increase the longevity of sensor networks. The randomized algorithm in particular seems quite practical.
[ { "version": "v1", "created": "Thu, 20 Nov 2003 22:47:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Abrams", "Zoe", "" ], [ "Goel", "Ashish", "" ], [ "Plotkin", "Serge", "" ] ]
cs/0311032
Oleg Mazonka
Oleg Mazonka, Daniel B. Cristofani
A Very Short Self-Interpreter
null
null
null
null
cs.PL
null
In this paper we would like to present a very short (possibly the shortest) self-interpreter, based on a simplistic Turing-complete imperative language. This interpreter explicitly processes the statements of the language, which means the interpreter constitutes a description of the language inside that same language. The paper does not require any specific knowledge; however, experience in programming and a vivid imagination are beneficial.
[ { "version": "v1", "created": "Fri, 21 Nov 2003 06:18:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Mazonka", "Oleg", "" ], [ "Cristofani", "Daniel B.", "" ] ]
cs/0311033
Andrij Rovenchak
Solomija N. Buk, Andrij A. Rovenchak
The Rank-Frequency Analysis for the Functional Style Corpora in the Ukrainian Language
8 pages
Journal of Quantitative Linguistics, Vol. 11, No. 3, P. 161-171 (2004)
10.1080/0929617042000314912
null
cs.CL
null
We use the rank-frequency analysis for the estimation of Kernel Vocabulary size within specific corpora of Ukrainian. The extrapolation of high-rank behaviour is utilized for estimation of the total vocabulary size.
[ { "version": "v1", "created": "Fri, 21 Nov 2003 19:48:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Buk", "Solomija N.", "" ], [ "Rovenchak", "Andrij A.", "" ] ]
cs/0311034
Gibby Koldenhof
Gibby Koldenhof
Visualization of variations in human brain morphology using differentiating reflection functions
10 pages, keywords: MRI, Medical Visualization, Volume rendering, BRDF, Specular reflection overlap
null
null
null
cs.GR
null
Conventional visualization media such as MRI prints and computer screens are inherently two dimensional, making them incapable of displaying true 3D volume data sets. By applying only transparency or intensity projection, and ignoring light-matter interaction, results will likely fail to give optimal results. Little research has been done on using reflectance functions to visually separate the various segments of a MRI volume. We will explore if applying specific reflectance functions to individual anatomical structures can help in building an intuitive 2D image from a 3D dataset. We will test our hypothesis by visualizing a statistical analysis of the genetic influences on variations in human brain morphology because it inherently contains complex and many different types of data making it a good candidate for our approach
[ { "version": "v1", "created": "Sat, 22 Nov 2003 18:17:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Koldenhof", "Gibby", "" ] ]
cs/0311035
Milenko Petrovi\'c
Milenko Petrovic and Mokhtar Aboelaze
Improving TCP/IP Performance over Wireless IEEE 802.11 Link
7 pages, ICWN 2002 (International Conference on Wireless Networks)
null
null
null
cs.NI cs.PF
null
Cellular phones, wireless laptops, personal portable devices that supports both voice and data access are all examples of communicating devices that uses wireless communication. Sine TCP/IP (and UDP) is the dominant technology in use in the internet, it is expected that they will be used (and they are currently) over wireless connections. In this paper, we investigate the performance of the TCP (and UDP) over IEEE802.11 wireless MAC protocol. We investigate the performance of the TCP and UDP assuming three different traffic patterns. First bulk transmission where the main concern is the throughput. Second real-time audio (using UDP) in the existence of bulk TCP transmission where the main concern is the packet loss for audio traffic. Finally web traffic where the main concern is the response time. We also investigate the effect of using forward Error Correction (FEC) technique and the MAC sublayer parameters on the throughput and response time.
[ { "version": "v1", "created": "Mon, 24 Nov 2003 04:49:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrovic", "Milenko", "" ], [ "Aboelaze", "Mokhtar", "" ] ]
cs/0311036
Dinoj Surendran
Dinoj Surendran and Partha Niyogi
Measuring the Functional Load of Phonological Contrasts
28 pages, 3 figures, submitted to Computational Linguistics, currently available as a tech report on http://www.cs.uchicago.edu/research/publications/techreports
null
null
TR-2003-12
cs.CL
null
Frequency counts are a measure of how much use a language makes of a linguistic unit, such as a phoneme or word. However, what is often important is not the units themselves, but the contrasts between them. A measure is therefore needed for how much use a language makes of a contrast, i.e. the functional load (FL) of the contrast. We generalize previous work in linguistics and speech recognition and propose a family of measures for the FL of several phonological contrasts, including phonemic oppositions, distinctive features, suprasegmentals, and phonological rules. We then test it for robustness to changes of corpora. Finally, we provide examples in Cantonese, Dutch, English, German and Mandarin, in the context of historical linguistics, language acquisition and speech recognition. More information can be found at http://dinoj.info/research/fload
[ { "version": "v1", "created": "Mon, 24 Nov 2003 18:05:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Surendran", "Dinoj", "" ], [ "Niyogi", "Partha", "" ] ]
cs/0311037
David Abramson
Aaron Searle, John Gough, David Abramson
DUCT: An Interactive Define-Use Chain Navigation Tool for Relative Debugging
7 pages
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated De-bugging (AADEBUG 2003), September 2003, Ghent
null
null
cs.SE
null
This paper describes an interactive tool that facilitates following define-use chains in large codes. The motivation for the work is to support relative debugging, where it is necessary to iteratively refine a set of asser-tions between different versions of a program. DUCT is novel because it exploits the Microsoft Intermediate Language (MSIL) that underpins the .NET Framework. Accordingly, it works on a wide range of programming languages without any modification. The paper describes the design and implementation of DUCT, and then illustrates its use with a small case study.
[ { "version": "v1", "created": "Tue, 25 Nov 2003 01:38:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Searle", "Aaron", "" ], [ "Gough", "John", "" ], [ "Abramson", "David", "" ] ]
cs/0311038
Wolfgang May
Wolfgang May
XPath-Logic and XPathLog: A Logic-Programming Style XML Data Manipulation Language
null
null
null
null
cs.DB
null
We define XPathLog as a Datalog-style extension of XPath. XPathLog provides a clear, declarative language for querying and manipulating XML whose perspectives are especially in XML data integration. In our characterization, the formal semantics is defined wrt. an edge-labeled graph-based model which covers the XML data model. We give a complete, logic-based characterization of XML data and the main language concept for XML, XPath. XPath-Logic extends the XPath language with variable bindings and embeds it into first-order logic. XPathLog is then the Horn fragment of XPath-Logic, providing a Datalog-style, rule-based language for querying and manipulating XML data. The model-theoretic semantics of XPath-Logic serves as the base of XPathLog as a logic-programming language, whereas also an equivalent answer-set semantics for evaluating XPathLog queries is given. In contrast to other approaches, the XPath syntax and semantics is also used for a declarative specification how the database should be updated: when used in rule heads, XPath filters are interpreted as specifications of elements and properties which should be added to the database.
[ { "version": "v1", "created": "Tue, 25 Nov 2003 09:42:59 GMT" } ]
2007-05-23T00:00:00
[ [ "May", "Wolfgang", "" ] ]
cs/0311039
Zhide Chen
Zhide Chen, Hong Zhu
Quantum m-out-of-n Oblivious Transfer
To Appear in The Ninth IEEE Symposium On Computers And Communications (ISCC'2004)
null
null
null
cs.CR quant-ph
null
In the m-out-of-n oblivious transfer (OT) model, one party Alice sends n bits to another party Bob, Bob can get only m bits from the n bits. However, Alice cannot know which m bits Bob received. Y.Mu[MJV02]} and Naor[Naor01] presented classical m-out-of-n oblivious transfer based on discrete logarithm. As the work of Shor [Shor94], the discrete logarithm can be solved in polynomial time by quantum computers, so such OTs are unsafe to the quantum computer. In this paper, we construct a quantum m-out-of-n OT (QOT) scheme based on the transmission of polarized light and show that the scheme is robust to general attacks, i.e. the QOT scheme satisfies statistical correctness and statistical privacy.
[ { "version": "v1", "created": "Wed, 26 Nov 2003 09:07:21 GMT" }, { "version": "v2", "created": "Fri, 16 Apr 2004 02:39:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Zhide", "" ], [ "Zhu", "Hong", "" ] ]
cs/0311040
Zoltan Somogyi
Zoltan Somogyi
Idempotent I/O for safe time travel
In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/0309027
null
null
null
cs.PL cs.SE
null
Debuggers for logic programming languages have traditionally had a capability most other debuggers did not: the ability to jump back to a previous state of the program, effectively travelling back in time in the history of the computation. This ``retry'' capability is very useful, allowing programmers to examine in detail a part of the computation that they previously stepped over. Unfortunately, it also creates a problem: while the debugger may be able to restore the previous values of variables, it cannot restore the part of the program's state that is affected by I/O operations. If the part of the computation being jumped back over performs I/O, then the program will perform these I/O operations twice, which will result in unwanted effects ranging from the benign (e.g. output appearing twice) to the fatal (e.g. trying to close an already closed file). We present a simple mechanism for ensuring that every I/O action called for by the program is executed at most once, even if the programmer asks the debugger to travel back in time from after the action to before the action. The overhead of this mechanism is low enough and can be controlled well enough to make it practical to use it to debug computations that do significant amounts of I/O.
[ { "version": "v1", "created": "Wed, 26 Nov 2003 04:45:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Somogyi", "Zoltan", "" ] ]
cs/0311041
Milenko Petrovi\'c
Milenko Petrovic and Ioana Burcea and Hans-Arno Jacobsen
S-ToPSS: Semantic Toronto Publish/Subscribe System
4 pages, 2 figures, VLDB 2003 demo (29th International Conference on Very Large Databases)
null
null
null
cs.DC cs.DB
null
The increase in the amount of data on the Internet has led to the development of a new generation of applications based on selective information dissemination where, data is distributed only to interested clients. Such applications require a new middleware architecture that can efficiently match user interests with available information. Middleware that can satisfy this requirement include event-based architectures such as publish-subscribe systems. In this demonstration paper we address the problem of semantic matching. We investigate how current publish/subscribe systems can be extended with semantic capabilities. Our main contribution is the development and validation (through demonstration) of a semantic pub/sub system prototype S-ToPSS (Semantic Toronto Publish/Subscribe System).
[ { "version": "v1", "created": "Wed, 26 Nov 2003 21:55:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrovic", "Milenko", "" ], [ "Burcea", "Ioana", "" ], [ "Jacobsen", "Hans-Arno", "" ] ]
cs/0311042
Adam Klivans
Adam R. Klivans and Rocco A. Servedio
Toward Attribute Efficient Learning Algorithms
null
null
null
null
cs.LG
null
We make progress on two important problems regarding attribute efficient learnability. First, we give an algorithm for learning decision lists of length $k$ over $n$ variables using $2^{\tilde{O}(k^{1/3})} \log n$ examples and time $n^{\tilde{O}(k^{1/3})}$. This is the first algorithm for learning decision lists that has both subexponential sample complexity and subexponential running time in the relevant parameters. Our approach establishes a relationship between attribute efficient learning and polynomial threshold functions and is based on a new construction of low degree, low weight polynomial threshold functions for decision lists. For a wide range of parameters our construction matches a 1994 lower bound due to Beigel for the ODDMAXBIT predicate and gives an essentially optimal tradeoff between polynomial threshold function degree and weight. Second, we give an algorithm for learning an unknown parity function on $k$ out of $n$ variables using $O(n^{1-1/k})$ examples in time polynomial in $n$. For $k=o(\log n)$ this yields a polynomial time algorithm with sample complexity $o(n)$. This is the first polynomial time algorithm for learning parity on a superconstant number of variables with sublinear sample complexity.
[ { "version": "v1", "created": "Thu, 27 Nov 2003 05:34:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Klivans", "Adam R.", "" ], [ "Servedio", "Rocco A.", "" ] ]
cs/0311043
Maurizio Proietti
F. Fioravanti, A. Pettorossi, M. Proietti
Combining Logic Programs and Monadic Second Order Logics by Program Transformation
25 pages. Full version of a paper that appears in: M. Leuschel (ed.) Proceedings of LOPSTR'02, Twelfth International Workshop on Logic-based Program Development and Transformation, Madrid, Spain, 17-20 Sept. 2002. Lecture Notes in Computer Science 2664. Springer-Verlag Berlin Heidelberg, 2003, pp. 160-181
null
null
null
cs.PL cs.LO
null
We present a program synthesis method based on unfold/fold transformation rules which can be used for deriving terminating definite logic programs from formulas of the Weak Monadic Second Order theory of one successor (WS1S). This synthesis method can also be used as a proof method which is a decision procedure for closed formulas of WS1S. We apply our synthesis method for translating CLP(WS1S) programs into logic programs and we use it also as a proof method for verifying safety properties of infinite state systems.
[ { "version": "v1", "created": "Thu, 27 Nov 2003 09:47:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Fioravanti", "F.", "" ], [ "Pettorossi", "A.", "" ], [ "Proietti", "M.", "" ] ]
cs/0311044
Maurizio Proietti
Alberto Pettorossi, Maurizio Proietti, Sophie Renault
Derivation of Efficient Logic Programs by Specialization and Reduction of Nondeterminism
74 pages. To appear in: Higher-Order and Symbolic Computation (Special Issue in Honor of Bob Paige)
null
null
null
cs.PL cs.LO
null
Program specialization is a program transformation methodology which improves program efficiency by exploiting the information about the input data which are available at compile time. We show that current techniques for program specialization based on partial evaluation do not perform well on nondeterministic logic programs. We then consider a set of transformation rules which extend the ones used for partial evaluation, and we propose a strategy for guiding the application of these extended rules so to derive very efficient specialized programs. The efficiency improvements which sometimes are exponential, are due to the reduction of nondeterminism and to the fact that the computations which are performed by the initial programs in different branches of the computation trees, are performed by the specialized programs within single branches. In order to reduce nondeterminism we also make use of mode information for guiding the unfolding process. To exemplify our technique, we show that we can automatically derive very efficient matching programs and parsers for regular languages. The derivations we have performed could not have been done by previously known partial evaluation techniques.
[ { "version": "v1", "created": "Thu, 27 Nov 2003 10:04:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Pettorossi", "Alberto", "" ], [ "Proietti", "Maurizio", "" ], [ "Renault", "Sophie", "" ] ]
cs/0311045
J. G. Wolff
J Gerard Wolff
Unsupervised Grammar Induction in a Framework of Information Compression by Multiple Alignment, Unification and Search
null
Proceedings of the Workshop and Tutorial on Learning Context-Free Grammars (in association with the 14th European Conference on Machine Learning and the 7th European Conference on Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD 2003), September 2003, Cavtat-Dubrovnik, Croata), editors: C. de la Higuera and P. Adriaans and M. van Zaanen and J. Oncina, pp 113-124
null
null
cs.AI
null
This paper describes a novel approach to grammar induction that has been developed within a framework designed to integrate learning with other aspects of computing, AI, mathematics and logic. This framework, called "information compression by multiple alignment, unification and search" (ICMAUS), is founded on principles of Minimum Length Encoding pioneered by Solomonoff and others. Most of the paper describes SP70, a computer model of the ICMAUS framework that incorporates processes for unsupervised learning of grammars. An example is presented to show how the model can infer a plausible grammar from appropriate input. Limitations of the current model and how they may be overcome are briefly discussed.
[ { "version": "v1", "created": "Thu, 27 Nov 2003 11:18:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolff", "J Gerard", "" ] ]
cs/0311046
Magnus Boman
Jan Odelstad, Magnus Boman
Algebras for Agent Norm-Regulation
25 pages
null
null
null
cs.LO
null
An abstract architecture for idealized multi-agent systems whose behaviour is regulated by normative systems is developed and discussed. Agent choices are determined partially by the preference ordering of possible states and partially by normative considerations: The agent chooses that act which leads to the best outcome of all permissible actions. If an action is non-permissible depends on if the result of performing that action leads to a state satisfying a condition which is forbidden, according to the norms regulating the multi-agent system. This idea is formalized by defining set-theoretic predicates characterizing multi-agent systems. The definition of the predicate uses decision theory, the Kanger-Lindahl theory of normative positions, and an algebraic representation of normative systems.
[ { "version": "v1", "created": "Thu, 27 Nov 2003 13:03:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Odelstad", "Jan", "" ], [ "Boman", "Magnus", "" ] ]
cs/0311047
Milenko Petrovi\'c
Ioana Burcea, Milenko Petrovic and Hans-Arno Jacobsen
I know what you mean: semantic issues in Internet-scale publish/subscribe systems
12 pages, 1 figure, SWDB 2003 (1st Workshop on Semantic Web and Databases)
null
null
null
cs.DC cs.DB
null
In recent years, the amount of information on the Internet has increased exponentially developing great interest in selective information dissemination systems. The publish/subscribe paradigm is particularly suited for designing systems for routing information and requests according to their content throughout wide-area network of brokers. Current publish/subscribe systems use limited syntax-based content routing but since publishers and subscribers are anonymous and decoupled in time, space and location, often over wide-area network boundary, they do not necessarily speak the same language. Consequently, adding semantics to current publish/subscribe systems is important. In this paper we identify and examine the issues in developing semantic-based content routing for publish/subscribe broker networks.
[ { "version": "v1", "created": "Thu, 27 Nov 2003 16:00:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Burcea", "Ioana", "" ], [ "Petrovic", "Milenko", "" ], [ "Jacobsen", "Hans-Arno", "" ] ]
cs/0311048
Naren Ramakrishnan
Deept Kumar, Naren Ramakrishnan, Malcolm Potts, and Richard F. Helm
Turning CARTwheels: An Alternating Algorithm for Mining Redescriptions
null
null
null
null
cs.CE cs.AI
null
We present an unusual algorithm involving classification trees where two trees are grown in opposite directions so that they are matched at their leaves. This approach finds application in a new data mining task we formulate, called "redescription mining". A redescription is a shift-of-vocabulary, or a different way of communicating information about a given subset of data; the goal of redescription mining is to find subsets of data that afford multiple descriptions. We highlight the importance of this problem in domains such as bioinformatics, which exhibit an underlying richness and diversity of data descriptors (e.g., genes can be studied in a variety of ways). Our approach helps integrate multiple forms of characterizing datasets, situates the knowledge gained from one dataset in the context of others, and harnesses high-level abstractions for uncovering cryptic and subtle features of data. Algorithm design decisions, implementation details, and experimental results are presented.
[ { "version": "v1", "created": "Thu, 27 Nov 2003 18:13:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Deept", "" ], [ "Ramakrishnan", "Naren", "" ], [ "Potts", "Malcolm", "" ], [ "Helm", "Richard F.", "" ] ]
cs/0311049
Milenko Petrovi\'c
Milenko Petrovic and Mokhtar Aboelaze
Performance of TCP/UDP under Ad Hoc IEEE802.11
9 pages, 5 figures, ICT 2003 (10th International Conference on Telecommunication)
null
null
null
cs.NI cs.PF
null
TCP is the De facto standard for connection oriented transport layer protocol, while UDP is the De facto standard for transport layer protocol, which is used with real time traffic for audio and video. Although there have been many attempts to measure and analyze the performance of the TCP protocol in wireless networks, very few research was done on the UDP or the interaction between TCP and UDP traffic over the wireless link. In this paper, we tudy the performance of TCP and UDP over IEEE802.11 ad hoc network. We used two topologies, a string and a mesh topology. Our work indicates that IEEE802.11 as a ad-hoc network is not very suitable for bulk transfer using TCP. It also indicates that it is much better for real-time audio. Although one has to be careful here since real-time audio does require much less bandwidth than the wireless link bandwidth. Careful and detailed studies are needed to further clarify that issue.
[ { "version": "v1", "created": "Thu, 27 Nov 2003 23:02:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrovic", "Milenko", "" ], [ "Aboelaze", "Mokhtar", "" ] ]
cs/0311050
Nick Punin
Max Voskob, Nuck Punin
Data mining and Privacy in Public Sector using Intelligent Agents (discussion paper)
12 pages, 5 figures, scope limited to high level concepts
null
null
null
cs.CY cs.AI cs.IR cs.MA
null
The public sector comprises government agencies, ministries, education institutions, health providers and other types of government, commercial and not-for-profit organisations. Unlike commercial enterprises, this environment is highly heterogeneous in all aspects. This forms a complex network which is not always optimised. A lack of optimisation and communication hinders information sharing between the network nodes limiting the flow of information. Another limiting aspect is privacy of personal information and security of operations of some nodes or segments of the network. Attempts to reorganise the network or improve communications to make more information available for sharing and analysis may be hindered or completely halted by public concerns over privacy, political agendas, social and technological barriers. This paper discusses a technical solution for information sharing while addressing the privacy concerns with no need for reorganisation of the existing public sector infrastructure . The solution is based on imposing an additional layer of Intelligent Software Agents and Knowledge Bases for data mining and analysis.
[ { "version": "v1", "created": "Fri, 28 Nov 2003 00:06:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Voskob", "Max", "" ], [ "Punin", "Nuck", "" ] ]
cs/0311051
Amar Isli
Amar Isli
Integrating existing cone-shaped and projection-based cardinal direction relations and a TCSP-like decidable generalisation
I should be able to provide a longer version soon. A shorter version has been submitted to the conference KR'2004
null
null
null
cs.AI
null
We consider the integration of existing cone-shaped and projection-based calculi of cardinal direction relations, well-known in QSR. The more general, integrating language we consider is based on convex constraints of the qualitative form $r(x,y)$, $r$ being a cone-shaped or projection-based cardinal direction atomic relation, or of the quantitative form $(\alpha ,\beta)(x,y)$, with $\alpha ,\beta\in [0,2\pi)$ and $(\beta -\alpha)\in [0,\pi ]$: the meaning of the quantitative constraint, in particular, is that point $x$ belongs to the (convex) cone-shaped area rooted at $y$, and bounded by angles $\alpha$ and $\beta$. The general form of a constraint is a disjunction of the form $[r_1\vee...\vee r_{n_1}\vee (\alpha_1,\beta_1)\vee...\vee (\alpha _{n_2},\beta_{n_2})](x,y)$, with $r_i(x,y)$, $i=1... n_1$, and $(\alpha _i,\beta_i)(x,y)$, $i=1... n_2$, being convex constraints as described above: the meaning of such a general constraint is that, for some $i=1... n_1$, $r_i(x,y)$ holds, or, for some $i=1... n_2$, $(\alpha_i,\beta_i)(x,y)$ holds. A conjunction of such general constraints is a $\tcsp$-like CSP, which we will refer to as an $\scsp$ (Spatial Constraint Satisfaction Problem). An effective solution search algorithm for an $\scsp$ will be described, which uses (1) constraint propagation, based on a composition operation to be defined, as the filtering method during the search, and (2) the Simplex algorithm, guaranteeing completeness, at the leaves of the search tree. The approach is particularly suited for large-scale high-level vision, such as, e.g., satellite-like surveillance of a geographic area.
[ { "version": "v1", "created": "Fri, 28 Nov 2003 04:06:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Isli", "Amar", "" ] ]
cs/0311052
Wenyu Dong
Dong Wen-Yu, Xu Ke, Lin Meng-Xiang
A Situation Calculus-based Approach To Model Ubiquitous Information Services
null
null
null
null
cs.AI cs.HC
null
This paper presents an augmented situation calculus-based approach to model autonomous computing paradigm in ubiquitous information services. To make it practical for commercial development and easier to support autonomous paradigm imposed by ubiquitous information services, we made improvements based on Reiter's standard situation calculus. First we explore the inherent relationship between fluents and evolution: since not all fluents contribute to systems' evolution and some fluents can be derived from some others, we define those fluents that are sufficient and necessary to determine evolutional potential as decisive fluents, and then we prove that their successor states wrt to deterministic complex actions satisfy Markov property. Then, within the calculus framework we build, we introduce validity theory to model the autonomous services with application-specific validity requirements, including: validity fluents to axiomatize validity requirements, heuristic multiple alternative service choices ranging from complete acceptance, partial acceptance, to complete rejection, and validity-ensured policy to comprise such alternative service choices into organic, autonomously-computable services. Our approach is demonstrated by a ubiquitous calendaring service, ACS, throughout the paper.
[ { "version": "v1", "created": "Fri, 28 Nov 2003 09:29:35 GMT" }, { "version": "v2", "created": "Fri, 2 Apr 2004 15:40:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Wen-Yu", "Dong", "" ], [ "Ke", "Xu", "" ], [ "Meng-Xiang", "Lin", "" ] ]
cs/0311053
Grigoriev Dima
Dima Grigoriev
Weak Bezout inequality for D-modules
10 pages
null
null
null
cs.SC cs.CC
null
Let $\{w_{i,j}\}_{1\leq i\leq n, 1\leq j\leq s} \subset L_m=F(X_1,...,X_m)[{\partial \over \partial X_1},..., {\partial \over \partial X_m}]$ be linear partial differential operators of orders with respect to ${\partial \over \partial X_1},..., {\partial \over \partial X_m}$ at most $d$. We prove an upper bound n(4m^2d\min\{n,s\})^{4^{m-t-1}(2(m-t))} on the leading coefficient of the Hilbert-Kolchin polynomial of the left $L_m$-module $<\{w_{1,j}, ..., w_{n,j}\}_{1\leq j \leq s} > \subset L_m^n$ having the differential type $t$ (also being equal to the degree of the Hilbert-Kolchin polynomial). The main technical tool is the complexity bound on solving systems of linear equations over {\it algebras of fractions} of the form $$L_m(F[X_1,..., X_m, {\partial \over \partial X_1},..., {\partial \over \partial X_k}])^{-1}.$$
[ { "version": "v1", "created": "Fri, 28 Nov 2003 15:28:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Grigoriev", "Dima", "" ] ]
cs/0311054
Douglas A. Galbi
Douglas A. Galbi
Copyright and Creativity: Authors and Photographers
Part of a larger work, "Sense in Communication," available at http://www.galbithink.org That work includes material on "human/computer interaction" and "neurons and cognition."
null
null
null
cs.CY cs.DL
null
The history of the occupations "author" and "photographer" provides an insightful perspective on copyright and creativity. The concept of the romantic author, associated with personal creative genius, gained prominence in the eighteenth century. However, in the U.S. in 1900 only about three thousand persons professed their occupation to be "author." Self-professed "photographers" were then about ten times as numerous as authors. Being a photographer was associated with manufacturing and depended only on mastering technical skills and making a living. Being an author, in contrast, was an elite status associated with science and literature. Across the twentieth century, the number of writers and authors grew much more rapidly than the number of photographers. The relative success of writers and authors in creating jobs seems to have depended not on differences in copyright or possibilities for self-production, but on greater occupational innovation. Creativity in organizing daily work is an important form of creativity.
[ { "version": "v1", "created": "Fri, 28 Nov 2003 19:33:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Galbi", "Douglas A.", "" ] ]
cs/0312001
Martin Lisewski
A. M. Lisewski
The concept of strong and weak virtual reality
17 pages; several edits in v2
Minds and Machines, 16 (2), 201-219 (2006)
10.1007/s11023-006-9037-z
null
cs.LO nlin.AO physics.comp-ph
null
We approach the virtual reality phenomenon by studying its relationship to set theory, and we investigate the case where this is done using the wellfoundedness property of sets. Our hypothesis is that non-wellfounded sets (hypersets) give rise to a different quality of virtual reality than do familiar wellfounded sets. We initially provide an alternative approach to virtual reality based on Sommerhoff's idea of first and second order self-awareness; both categories of self-awareness are considered as necessary conditions for consciousness in terms of higher cognitive functions. We then introduce a representation of first and second order self-awareness through sets, and assume that these sets, which we call events, originally form a collection of wellfounded sets. Strong virtual reality characterizes virtual reality environments which have the limited capacity to create only events associated with wellfounded sets. In contrast, the more general concept of weak virtual reality characterizes collections of virtual reality mediated events altogether forming an entirety larger than any collection of wellfounded sets. By giving reference to Aczel's hyperset theory we indicate that this definition is not empty, because hypersets encompass wellfounded sets already. Moreover, we argue that weak virtual reality could be realized in human history through continued progress in computer technology. Finally, we reformulate our characterization into a more general framework, and use Baltag's Structural Theory of Sets (STS) to show that within this general hyperset theory Sommerhoff's first and second order self-awareness as well as both concepts of virtual reality admit a consistent mathematical representation.
[ { "version": "v1", "created": "Sat, 29 Nov 2003 14:08:56 GMT" }, { "version": "v2", "created": "Thu, 30 Mar 2006 20:21:55 GMT" }, { "version": "v3", "created": "Thu, 30 Mar 2006 22:38:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Lisewski", "A. M.", "" ] ]
cs/0312003
Edward Sazonov
E.S. Sazonov, P. Klinkhachorn and R. L. Klein
Hybrid LQG-Neural Controller for Inverted Pendulum System
null
Proceedings of 35th Southeastern Symposium on System Theory (SSST), Morgantown, WV, March 2003
null
null
cs.NE cs.LG
null
The paper presents a hybrid system controller, incorporating a neural and an LQG controller. The neural controller has been optimized by genetic algorithms directly on the inverted pendulum system. The failure free optimization process stipulated a relatively small region of the asymptotic stability of the neural controller, which is concentrated around the regulation point. The presented hybrid controller combines benefits of a genetically optimized neural controller and an LQG controller in a single system controller. High quality of the regulation process is achieved through utilization of the neural controller, while stability of the system during transient processes and a wide range of operation are assured through application of the LQG controller. The hybrid controller has been validated by applying it to a simulation model of an inherently unstable system of inverted pendulum.
[ { "version": "v1", "created": "Sun, 30 Nov 2003 00:19:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Sazonov", "E. S.", "" ], [ "Klinkhachorn", "P.", "" ], [ "Klein", "R. L.", "" ] ]
cs/0312004
Daniel Etzold
Daniel Etzold
Improving spam filtering by combining Naive Bayes with simple k-nearest neighbor searches
null
null
null
null
cs.LG
null
Using naive Bayes for email classification has become very popular within the last few months. They are quite easy to implement and very efficient. In this paper we want to present empirical results of email classification using a combination of naive Bayes and k-nearest neighbor searches. Using this technique we show that the accuracy of a Bayes filter can be improved slightly for a high number of features and significantly for a small number of features.
[ { "version": "v1", "created": "Sun, 30 Nov 2003 20:41:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Etzold", "Daniel", "" ] ]
cs/0312005
Alvaro Francisco Huertas Rosero
Alvaro Francisco Huertas-Rosero
A Cartography for 2x2 Symmetric Games
13 pages, 7 figures This is a new version of the work, adapted to be presented in the III Colombian Congress and I Andean International Conference of Operational Research (Cartagena, Colombia, March 2004)
null
null
null
cs.GT
null
A bidimensional representation of the space of 2x2 Symmetric Games in the strategic representation is proposed. This representation provides a tool for the classification of 2x2 symmetric games, quantification of the fraction of them having a certain feature, and predictions of changes in the characteristics of a game when a change in done on the payoff matrix that defines it.
[ { "version": "v1", "created": "Tue, 2 Dec 2003 15:52:46 GMT" }, { "version": "v2", "created": "Tue, 2 Mar 2004 23:36:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Huertas-Rosero", "Alvaro Francisco", "" ] ]
cs/0312008
Wessel Kraaij
Wessel Kraaij, Jian-Yun Nie and Michel Simard
Embedding Web-based Statistical Translation Models in Cross-Language Information Retrieval
37 pages
Computational Linguistics 29(3) september 2003
null
null
cs.CL cs.IR
null
Although more and more language pairs are covered by machine translation services, there are still many pairs that lack translation resources. Cross-language information retrieval (CLIR) is an application which needs translation functionality of a relatively low level of sophistication since current models for information retrieval (IR) are still based on a bag-of-words. The Web provides a vast resource for the automatic construction of parallel corpora which can be used to train statistical translation models automatically. The resulting translation models can be embedded in several ways in a retrieval model. In this paper, we will investigate the problem of automatically mining parallel texts from the Web and different ways of integrating the translation models within the retrieval process. Our experiments on standard test collections for CLIR show that the Web-based translation models can surpass commercial MT systems in CLIR tasks. These results open the perspective of constructing a fully automatic query translation device for CLIR at a very low cost.
[ { "version": "v1", "created": "Wed, 3 Dec 2003 13:09:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Kraaij", "Wessel", "" ], [ "Nie", "Jian-Yun", "" ], [ "Simard", "Michel", "" ] ]
cs/0312009
Edward Sazonov
E.S.Sazonov, D. Del Gobbo, P. Klinkhachorn and R. L. Klein
Failure-Free Genetic Algorithm Optimization of a System Controller Using SAFE/LEARNING Controllers in Tandem
null
Proceedings of 34th Southeastern Symposium on System Theory (SSST), Huntsville, AL, March 2002
null
null
cs.NE cs.LG
null
The paper presents a method for failure free genetic algorithm optimization of a system controller. Genetic algorithms present a powerful tool that facilitates producing near-optimal system controllers. Applied to such methods of computational intelligence as neural networks or fuzzy logic, these methods are capable of combining the non-linear mapping capabilities of the latter with learning the system behavior directly, that is, without a prior model. At the same time, genetic algorithms routinely produce solutions that lead to the failure of the controlled system. Such solutions are generally unacceptable for applications where safe operation must be guaranteed. We present here a method of design, which allows failure-free application of genetic algorithms through utilization of SAFE and LEARNING controllers in tandem, where the SAFE controller recovers the system from dangerous states while the LEARNING controller learns its behavior. The method has been validated by applying it to an inherently unstable system of inverted pendulum.
[ { "version": "v1", "created": "Wed, 3 Dec 2003 22:29:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Sazonov", "E. S.", "" ], [ "Del Gobbo", "D.", "" ], [ "Klinkhachorn", "P.", "" ], [ "Klein", "R. L.", "" ] ]
cs/0312010
Kathleen McDevitt
Kathleen McDevitt, Manuel A. Perez-Quinones, Olga I. Padilla-Falto
Designing of a Community-based Translation Center
8 pages, 4 figures
null
null
TR-03-30
cs.HC cs.DL
null
Interfaces that support multi-lingual content can reach a broader community. We wish to extend the reach of CITIDEL, a digital library for computing education materials, to support multiple languages. By doing so, we hope that it will increase the number of users, and in turn the number of resources. This paper discusses three approaches to translation (automated translation, developer-based, and community-based), and a brief evaluation of these approaches. It proposes a design for an online community translation center where volunteers help translate interface components and educational materials available in CITIDEL.
[ { "version": "v1", "created": "Thu, 4 Dec 2003 05:26:51 GMT" } ]
2007-05-23T00:00:00
[ [ "McDevitt", "Kathleen", "" ], [ "Perez-Quinones", "Manuel A.", "" ], [ "Padilla-Falto", "Olga I.", "" ] ]
cs/0312011
Giorgio Parisi
Giorgio Parisi
Constraint Optimization and Statistical Mechanics
22 pages, 1 figure Lectures given at the Varenna summer school
null
null
null
cs.CC cond-mat.dis-nn cs.DS
null
In these lectures I will present an introduction to the results that have been recently obtained in constraint optimization of random problems using statistical mechanics techniques. After presenting the general results, in order to simplify the presentation I will describe in details only the problems related to the coloring of a random graph.
[ { "version": "v1", "created": "Fri, 5 Dec 2003 16:46:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Parisi", "Giorgio", "" ] ]
cs/0312012
Judith Beumer
Olga Shumsky Matlin, William McCune, and Ewing Lusk
Methods to Model-Check Parallel Systems Software
12 pages, 3 figures, 1 table
null
null
ANL/MCS-TM-261
cs.LO cs.DC
null
We report on an effort to develop methodologies for formal verification of parts of the Multi-Purpose Daemon (MPD) parallel process management system. MPD is a distributed collection of communicating processes. While the individual components of the collection execute simple algorithms, their interaction leads to unexpected errors that are difficult to uncover by conventional means. Two verification approaches are discussed here: the standard model checking approach using the software model checker SPIN and the nonstandard use of a general-purpose first-order resolution-style theorem prover OTTER to conduct the traditional state space exploration. We compare modeling methodology and analyze performance and scalability of the two methods with respect to verification of MPD.
[ { "version": "v1", "created": "Fri, 5 Dec 2003 16:57:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Matlin", "Olga Shumsky", "" ], [ "McCune", "William", "" ], [ "Lusk", "Ewing", "" ] ]
cs/0312014
Greta Yorsh
G. Yorsh, T. Reps, M. Sagiv, R. Wilhelm
Logical Characterizations of Heap Abstractions
null
null
null
null
cs.LO
null
Shape analysis concerns the problem of determining "shape invariants" for programs that perform destructive updating on dynamically allocated storage. In recent work, we have shown how shape analysis can be performed, using an abstract interpretation based on 3-valued first-order logic. In that work, concrete stores are finite 2-valued logical structures, and the sets of stores that can possibly arise during execution are represented (conservatively) using a certain family of finite 3-valued logical structures. In this paper, we show how 3-valued structures that arise in shape analysis can be characterized using formulas in first-order logic with transitive closure. We also define a non-standard ("supervaluational") semantics for 3-valued first-order logic that is more precise than a conventional 3-valued semantics, and demonstrate that the supervaluational semantics can be effectively implemented using existing theorem provers.
[ { "version": "v1", "created": "Sun, 7 Dec 2003 20:31:23 GMT" }, { "version": "v2", "created": "Sun, 11 Apr 2004 14:04:21 GMT" }, { "version": "v3", "created": "Wed, 16 Mar 2005 17:03:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Yorsh", "G.", "" ], [ "Reps", "T.", "" ], [ "Sagiv", "M.", "" ], [ "Wilhelm", "R.", "" ] ]
cs/0312015
Patrick Baillot
Patrick Baillot, Virgile Mogbil
Soft lambda-calculus: a language for polynomial time computation
20 pages
null
null
null
cs.LO cs.CC
null
Soft linear logic ([Lafont02]) is a subsystem of linear logic characterizing the class PTIME. We introduce Soft lambda-calculus as a calculus typable in the intuitionistic and affine variant of this logic. We prove that the (untyped) terms of this calculus are reducible in polynomial time. We then extend the type system of Soft logic with recursive types. This allows us to consider non-standard types for representing lists. Using these datatypes we examine the concrete expressivity of Soft lambda-calculus with the example of the insertion sort algorithm.
[ { "version": "v1", "created": "Sun, 7 Dec 2003 23:42:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Baillot", "Patrick", "" ], [ "Mogbil", "Virgile", "" ] ]
cs/0312016
Saverio Perugini
Saverio Perugini, Mary E. Pinney, Naren Ramakrishnan, Manuel A. Perez-Quinones, and Mary Beth Rosson
Taking the Initiative with Extempore: Exploring Out-of-Turn Interactions with Websites
Introduces out-of-turn interaction with websites: a technique which sustains, rather than curbs, the user-system dialog
null
null
null
cs.HC cs.IR
null
We present the first study to explore the use of out-of-turn interaction in websites. Out-of-turn interaction is a technique which empowers the user to supply unsolicited information while browsing. This approach helps flexibly bridge any mental mismatch between the user and the website, in a manner fundamentally different from faceted browsing and site-specific search tools. We built a user interface (Extempore) which accepts out-of-turn input via voice or text; and employed it in a US congressional website, to determine if users utilize out-of-turn interaction for information-finding tasks, and their rationale for doing so. The results indicate that users are adept at discerning when out-of-turn interaction is necessary in a particular task, and actively interleaved it with browsing. However, users found cascading information across information-finding subtasks challenging. Therefore, this work not only improves our understanding of out-of-turn interaction, but also suggests further opportunities to enrich browsing experiences for users.
[ { "version": "v1", "created": "Mon, 8 Dec 2003 16:25:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Perugini", "Saverio", "" ], [ "Pinney", "Mary E.", "" ], [ "Ramakrishnan", "Naren", "" ], [ "Perez-Quinones", "Manuel A.", "" ], [ "Rosson", "Mary Beth", "" ] ]
cs/0312017
Paul Prekop
Paul Prekop
An Exploratory Study of Mobile Computing Use by Knowledge Workers
To appear in: Proceedings of the 2003 Australasian Computer Human Interaction Conference (OzCHI 2003), University of Queensland, Australia, November 26-28 2003
null
null
null
cs.HC
null
This paper describes some preliminary results from a 20-week study on the use of Compaq iPAQ Personal Digital Assistants (PDAs) by 10 senior developers, analysts, technical managers, and senior organisational managers. The goal of the study was to identify what applications were used, how and where they were used, the problems and issues that arose, and how use of the iPAQs changed over the study period. The paper highlights some interesting uses of the iPAQs, and identifies some of the characteristics of successful mobile applications.
[ { "version": "v1", "created": "Tue, 9 Dec 2003 03:44:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Prekop", "Paul", "" ] ]
cs/0312020
Laurent Henocque
Laurent Henocque
Modeling Object Oriented Constraint Programs in Z
null
null
null
RR-LSIS-03-006
cs.AI
null
Object oriented constraint programs (OOCPs) emerge as a leading evolution of constraint programming and artificial intelligence, first applied to a range of industrial applications called configuration problems. The rich variety of technical approaches to solving configuration problems (CLP(FD), CC(FD), DCSP, Terminological systems, constraint programs with set variables ...) is a source of difficulty. No universally accepted formal language exists for communicating about OOCPs, which makes the comparison of systems difficult. We present here a Z based specification of OOCPs which avoids the falltrap of hidden object semantics. The object system is part of the specification, and captures all of the most advanced notions from the object oriented modeling standard UML. The paper illustrates these issues and the conciseness and precision of Z by the specification of a working OOCP that solves an historical AI problem : parsing a context free grammar. Being written in Z, an OOCP specification also supports formal proofs. The whole builds the foundation of an adaptative and evolving framework for communicating about constrained object models and programs.
[ { "version": "v1", "created": "Fri, 12 Dec 2003 10:15:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Henocque", "Laurent", "" ] ]
cs/0312021
Domenico Camarda
Domenico Camarda
ICT-based planning and the missing educational link
Issues and ideas reflected in this paper were partly presented by the Author during the III INCOSUSW Meeting (Local resources and global trades: Environments and agriculture in the Mediterranean region), held in Rabat, Morocco, from April 25 to 30, 2002, and funded by the European Union
null
null
null
cs.CY
null
The past century ended with an unexpected explosion of Information and Communication Technologies (ICT), both in planning/managing public policies, and in exchanging knowledge. However, the extent to which ICT-based tools increase the level of public knowledge, or help decision makers is still uncertain. Although indirectly, the overload of unfiltered Web-based information seems able to hamper the knowledge growth of people, particularly in some developing communities, whereas Decision Support Systems (DSS) and Geographical Information Systems (GIS) prove to be ineffective if managed by unskilled planning bodies. Given such warns, this paper outlines how the different social and cultural awareness of local communities can affect the outcomes of ICT-based tools. It further explores the impacts of ICT-based tools on community development and spatial planning, emphasizing the role of proper literacy and education for effective management.
[ { "version": "v1", "created": "Fri, 12 Dec 2003 11:36:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Camarda", "Domenico", "" ] ]
cs/0312022
Rajkumar Buyya
Manjuka Soysa, Rajkumar Buyya, and Baikunth Nath
GridEmail: A Case for Economically Regulated Internet-based Interpersonal Communications
15 pages, 10 figures, A Technical Report from Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia
null
null
GRIDS-TR-2003-6
cs.DC
null
Email has emerged as a dominant form of electronic communication between people. Spam is a major problem for email users, with estimates of up to 56% of email falling into that category. Control of Spam is being attempted with technical and legislative methods. In this paper we look at email and spam from a supply-demand perspective. We propose Gridemail, an email system based on an economy of communicating parties, where participants? motivations are represented as pricing policies and profiles. This system is expected to help people regulate their personal communications to suit their conditions, and help in removing unwanted messages.
[ { "version": "v1", "created": "Fri, 12 Dec 2003 11:42:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Soysa", "Manjuka", "" ], [ "Buyya", "Rajkumar", "" ], [ "Nath", "Baikunth", "" ] ]
cs/0312023
Samir Genaim
Samir Genaim and Michael Codish
Inferring Termination Conditions for Logic Programs using Backwards Analysis
null
null
null
null
cs.PL
null
This paper focuses on the inference of modes for which a logic program is guaranteed to terminate. This generalises traditional termination analysis where an analyser tries to verify termination for a specified mode. Our contribution is a methodology in which components of traditional termination analysis are combined with backwards analysis to obtain an analyser for termination inference. We identify a condition on the components of the analyser which guarantees that termination inference will infer all modes which can be checked to terminate. The application of this methodology to enhance a traditional termination analyser to perform also termination inference is demonstrated.
[ { "version": "v1", "created": "Fri, 12 Dec 2003 16:14:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Genaim", "Samir", "" ], [ "Codish", "Michael", "" ] ]
cs/0312024
Liang Wang
Wang Liang, Guo Yiping, Fang Ming
Evolution: Google vs. DRIS
5 pages,6 figures
null
null
null
cs.DL cs.IR cs.NI
null
This paper gives an absolute new search system that builds the information retrieval infrastructure for Internet. Now most search engine companies are mainly concerned with how to make profit from company users by advertisement and ranking prominence, but never consider what its real customers will feel. Few web search engines can sell billions dollars just at the cost of inconvenience of most Internet users, but not its high quality of search service. When we have to bear the bothersome advertisements in the awful results and have no choices, Internet as the kind of public good will surely be undermined. If current Internet can't fully ensure our right to know, it may need some sound improvements or a revolution.
[ { "version": "v1", "created": "Sat, 13 Dec 2003 03:15:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Liang", "Wang", "" ], [ "Yiping", "Guo", "" ], [ "Ming", "Fang", "" ] ]
cs/0312026
Jan Hruza
Jan Hruza, Petr Stepanek
Speedup of Logic Programs by Binarization and Partial Deduction
15 pages; to appear in Theory and Practice of Logic Programming
null
null
null
cs.PL cs.AI
null
Binary logic programs can be obtained from ordinary logic programs by a binarizing transformation. In most cases, binary programs obtained this way are less efficient than the original programs. (Demoen, 1992) showed an interesting example of a logic program whose computational behaviour was improved when it was transformed to a binary program and then specialized by partial deduction. The class of B-stratifiable logic programs is defined. It is shown that for every B-stratifiable logic program, binarization and subsequent partial deduction produce a binary program which does not contain variables for continuations introduced by binarization. Such programs usually have a better computational behaviour than the original ones. Both binarization and partial deduction can be easily automated. A comparison with other related approaches to program transformation is given.
[ { "version": "v1", "created": "Mon, 15 Dec 2003 12:23:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Hruza", "Jan", "" ], [ "Stepanek", "Petr", "" ] ]
cs/0312027
Gerda Janssens
Henk Vandecasteele and Gerda Janssens
An Open Ended Tree
null
TPLP Vol 3(3) 2003 pp 377-385
null
null
cs.PL
null
An open ended list is a well known data structure in Prolog programs. It is frequently used to represent a value changing over time, while this value is referred to from several places in the data structure of the application. A weak point in this technique is that the time complexity is linear in the number of updates to the value represented by the open ended list. In this programming pearl we present a variant of the open ended list, namely an open ended tree, with an update and access time complexity logarithmic in the number of updates to the value.
[ { "version": "v1", "created": "Mon, 15 Dec 2003 13:43:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Vandecasteele", "Henk", "" ], [ "Janssens", "Gerda", "" ] ]
cs/0312028
Sergio Greco
Filippo Furfaro, Gianluigi Greco, Sergio Greco
Minimal founded semantics for disjunctive logic programs and deductive databases
20 pages
Theory and Practice of Logic Programming, 4(1): 75-93 (2004)
null
null
cs.LO cs.AI
null
In this paper, we propose a variant of stable model semantics for disjunctive logic programming and deductive databases. The semantics, called minimal founded, generalizes stable model semantics for normal (i.e. non disjunctive) programs but differs from disjunctive stable model semantics (the extension of stable model semantics for disjunctive programs). Compared with disjunctive stable model semantics, minimal founded semantics seems to be more intuitive, it gives meaning to programs which are meaningless under stable model semantics and is no harder to compute. More specifically, minimal founded semantics differs from stable model semantics only for disjunctive programs having constraint rules or rules working as constraints. We study the expressive power of the semantics and show that for general disjunctive datalog programs it has the same power as disjunctive stable model semantics.
[ { "version": "v1", "created": "Mon, 15 Dec 2003 18:29:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Furfaro", "Filippo", "" ], [ "Greco", "Gianluigi", "" ], [ "Greco", "Sergio", "" ] ]
cs/0312029
Hudson Turner
Hudson Turner
Strong Equivalence Made Easy: Nested Expressions and Weight Constraints
null
Theory and Practice of Logic Programming, vol 3 (4&5), pages 609-622, 2003
null
null
cs.LO cs.AI
null
Logic programs P and Q are strongly equivalent if, given any program R, programs P union R and Q union R are equivalent (that is, have the same answer sets). Strong equivalence is convenient for the study of equivalent transformations of logic programs: one can prove that a local change is correct without considering the whole program. Lifschitz, Pearce and Valverde showed that Heyting's logic of here-and-there can be used to characterize strong equivalence for logic programs with nested expressions (which subsume the better-known extended disjunctive programs). This note considers a simpler, more direct characterization of strong equivalence for such programs, and shows that it can also be applied without modification to the weight constraint programs of Niemela and Simons. Thus, this characterization of strong equivalence is convenient for the study of equivalent transformations of logic programs written in the input languages of answer set programming systems dlv and smodels. The note concludes with a brief discussion of results that can be used to automate reasoning about strong equivalence, including a novel encoding that reduces the problem of deciding the strong equivalence of a pair of weight constraint programs to that of deciding the inconsistency of a weight constraint program.
[ { "version": "v1", "created": "Mon, 15 Dec 2003 20:58:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Turner", "Hudson", "" ] ]
cs/0312030
Jiyou Jia
Jiyou Jia
CSIEC (Computer Simulator in Educational Communication): An Intelligent Web-Based Teaching System for Foreign Language Learning
8 pages, 4 figures, 5 tables to appear on ED-MEDIA 2004 (World Conference on Educational Multimedia, Hypermedia & Telecommunications)
null
null
null
cs.CY
null
In this paper we present an innovative intelligent web-based computer-aided instruction system for foreign language learning: CSIEC (Computer Simulator in Educational Communication). This system can not only grammatically understand the sentences in English given from the users via Internet, but also reasonably and individually speak with the users. At first the related works in this research field are analyzed. Then we introduce the system goals and the system framework, i.e., the natural language understanding mechanism (NLML, NLOMJ and NLDB) and the communicational response (CR). Finally we give the syntactic and semantic content of this instruction system, i.e. some important notations of English grammar used in it and their relations with the NLOMJ.
[ { "version": "v1", "created": "Tue, 16 Dec 2003 14:14:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Jia", "Jiyou", "" ] ]
cs/0312031
Daniel Cabeza
Daniel Cabeza and Manuel V. Hermenegildo
Distributed WWW Programming using (Ciao-)Prolog and the PiLLoW library
32 pages, 4 figures
Theory and Practice of Logic Programming, Vol 1(3), 2001, 251-282
null
null
cs.DC cs.PL
null
We discuss from a practical point of view a number of issues involved in writing distributed Internet and WWW applications using LP/CLP systems. We describe PiLLoW, a public-domain Internet and WWW programming library for LP/CLP systems that we have designed in order to simplify the process of writing such applications. PiLLoW provides facilities for accessing documents and code on the WWW; parsing, manipulating and generating HTML and XML structured documents and data; producing HTML forms; writing form handlers and CGI-scripts; and processing HTML/XML templates. An important contribution of PiLLoW is to model HTML/XML code (and, thus, the content of WWW pages) as terms. The PiLLoW library has been developed in the context of the Ciao Prolog system, but it has been adapted to a number of popular LP/CLP systems, supporting most of its functionality. We also describe the use of concurrency and a high-level model of client-server interaction, Ciao Prolog's active modules, in the context of WWW programming. We propose a solution for client-side downloading and execution of Prolog code, using generic browsers. Finally, we also provide an overview of related work on the topic.
[ { "version": "v1", "created": "Tue, 16 Dec 2003 19:09:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Cabeza", "Daniel", "" ], [ "Hermenegildo", "Manuel V.", "" ] ]
cs/0312032
Anja Remshagen
Anja Remshagen and Klaus Truemper
Learning in a Compiler for MINSAT Algorithms
16 pages
Theory and practice of Logic Programming, Vol 3(3), pp 271-286, 2003
null
null
cs.LO
null
This paper describes learning in a compiler for algorithms solving classes of the logic minimization problem MINSAT, where the underlying propositional formula is in conjunctive normal form (CNF) and where costs are associated with the True/False values of the variables. Each class consists of all instances that may be derived from a given propositional formula and costs for True/False values by fixing or deleting variables, and by deleting clauses. The learning step begins once the compiler has constructed a solution algorithm for a given class. The step applies that algorithm to comparatively few instances of the class, analyses the performance of the algorithm on these instances, and modifies the underlying propositional formula, with the goal that the algorithm will perform much better on all instances of the class.
[ { "version": "v1", "created": "Tue, 16 Dec 2003 17:24:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Remshagen", "Anja", "" ], [ "Truemper", "Klaus", "" ] ]
cs/0312033
Ilya Zemskov
Ilya Zemskov
Using sensors in the web crawling process
4 pages, 4 figures. The article was accepted for the IADIS International WWW/Internet 2003 Conference but not published in the proceedings due to the lack of financial support
null
null
null
cs.IR cs.DL
null
This paper offers a short description of an Internet information field monitoring system, which places a special module-sensor on the side of the Web-server to detect changes in information resources and subsequently reindexes only the resources signalized by the corresponding sensor. Concise results of simulation research and an implementation attempt of the given "sensors" concept are provided.
[ { "version": "v1", "created": "Wed, 17 Dec 2003 11:30:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Zemskov", "Ilya", "" ] ]
cs/0312034
Gonzalo Alvarez
Gonzalo Alvarez, Luis Hernandez, Angel Martin
Sharing secret color images using cellular automata with memory
17 pages, 6 figures, LaTeX format
null
null
null
cs.CR
null
A {k,n}-threshold scheme based on two-dimensional memory cellular automata is proposed to share images in a secret way. This method allows to encode an image into n shared images so that only qualified subsets of k or more shares can recover the secret image, but any k-1 or fewer of them gain no information about the original image. The main characteristics of this new scheme are: each shared image has the same size that the original one, and the recovered image is exactly the same than the secret image; i.e., there is no loss of resolution.
[ { "version": "v1", "created": "Wed, 17 Dec 2003 11:59:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Alvarez", "Gonzalo", "" ], [ "Hernandez", "Luis", "" ], [ "Martin", "Angel", "" ] ]
cs/0312035
Marcin Rogawski
Marcin Rogawski
Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices
29 pages, presented on Enigma conferance in 2003r
null
null
null
cs.CR cs.PF
null
Alghoritms: HIEROCRYPT-3, CAMELLIA and ANUBIS, GRAND CRU, NOEKEON, NUSH, Q, RC6, SAFER++128, SC2000, SHACAL were requested for the submission of block ciphers (high level block cipher) to NESSIE (New European Schemes for Signatures, Integrity, and Encryption) project. The main purpose of this project was to put forward a portfolio of strong cryptographic primitives of various types. The NESSIE project was a three year long project and has been divided into two phases. The first was finished in June 2001r. CAMELLIA, RC6, SAFER++128 and SHACAL were accepted for the second phase of the evaluation process. HIEROCRYPT-3 had key schedule problems, and there were attacks for up to 3,5 rounds out of 6, at least hardware implementations of this cipher were extremely slow [12]. HIEROCRYPT-3 was not selected to Phase II. CAMELLIA was selected as an algorithm suggested for future standard. In the paper we present the hardware implementations these two algorithms with 128-bit blocks and 128-bit keys, using ALTERA devices and their comparisons.
[ { "version": "v1", "created": "Wed, 17 Dec 2003 13:01:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Rogawski", "Marcin", "" ] ]
cs/0312036
Joseph Y. Halpern
Hana Chockler, Joseph Y. Halpern, and Orna Kupferman
What Causes a System to Satisfy a Specification?
null
null
null
null
cs.LO cs.AI
null
Even when a system is proven to be correct with respect to a specification, there is still a question of how complete the specification is, and whether it really covers all the behaviors of the system. Coverage metrics attempt to check which parts of a system are actually relevant for the verification process to succeed. Recent work on coverage in model checking suggests several coverage metrics and algorithms for finding parts of the system that are not covered by the specification. The work has already proven to be effective in practice, detecting design errors that escape early verification efforts in industrial settings. In this paper, we relate a formal definition of causality given by Halpern and Pearl [2001] to coverage. We show that it gives significant insight into unresolved issues regarding the definition of coverage and leads to potentially useful extensions of coverage. In particular, we introduce the notion of responsibility, which assigns to components of a system a quantitative measure of their relevance to the satisfaction of the specification.
[ { "version": "v1", "created": "Wed, 17 Dec 2003 16:42:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Chockler", "Hana", "" ], [ "Halpern", "Joseph Y.", "" ], [ "Kupferman", "Orna", "" ] ]
cs/0312037
Joseph Y. Halpern
Joseph Y. Halpern and Riccardo Pucella
Characterizing and Reasoning about Probabilistic and Non-Probabilistic Expectation
To appear in Journal of the ACM
null
null
null
cs.AI cs.LO
null
Expectation is a central notion in probability theory. The notion of expectation also makes sense for other notions of uncertainty. We introduce a propositional logic for reasoning about expectation, where the semantics depends on the underlying representation of uncertainty. We give sound and complete axiomatizations for the logic in the case that the underlying representation is (a) probability, (b) sets of probability measures, (c) belief functions, and (d) possibility measures. We show that this logic is more expressive than the corresponding logic for reasoning about likelihood in the case of sets of probability measures, but equi-expressive in the case of probability, belief, and possibility. Finally, we show that satisfiability for these logics is NP-complete, no harder than satisfiability for propositional logic.
[ { "version": "v1", "created": "Wed, 17 Dec 2003 16:50:39 GMT" }, { "version": "v2", "created": "Fri, 20 Apr 2007 18:53:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0312038
Joseph Y. Halpern
Hana Chockler and Joseph Y. Halpern
Responsibility and blame: a structural-model approach
null
null
null
null
cs.AI cs.LO
null
Causality is typically treated an all-or-nothing concept; either A is a cause of B or it is not. We extend the definition of causality introduced by Halpern and Pearl [2001] to take into account the degree of responsibility of A for B. For example, if someone wins an election 11--0, then each person who votes for him is less responsible for the victory than if he had won 6--5. We then define a notion of degree of blame, which takes into account an agent's epistemic state. Roughly speaking, the degree of blame of A for B is the expected degree of responsibility of A for B, taken over the epistemic state of an agent.
[ { "version": "v1", "created": "Wed, 17 Dec 2003 16:59:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Chockler", "Hana", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/0312040
Marcello Balduccini
Marcello Balduccini and Michael Gelfond
Diagnostic reasoning with A-Prolog
46 pages, 1 Postscript figure
TPLP Vol 3(4&5) (2003) 425-461
null
null
cs.AI
null
In this paper we suggest an architecture for a software agent which operates a physical device and is capable of making observations and of testing and repairing the device's components. We present simplified definitions of the notions of symptom, candidate diagnosis, and diagnosis which are based on the theory of action language ${\cal AL}$. The definitions allow one to give a simple account of the agent's behavior in which many of the agent's tasks are reduced to computing stable models of logic programs.
[ { "version": "v1", "created": "Thu, 18 Dec 2003 13:38:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Balduccini", "Marcello", "" ], [ "Gelfond", "Michael", "" ] ]
cs/0312041
Sergio Greco
Sergio Greco, Carlo Zaniolo
Greedy Algorithms in Datalog
27 pages
Theory and Practice of Logic Programming, 1(4): 381-407, 2001
null
null
cs.DB cs.AI
null
In the design of algorithms, the greedy paradigm provides a powerful tool for solving efficiently classical computational problems, within the framework of procedural languages. However, expressing these algorithms within the declarative framework of logic-based languages has proven a difficult research challenge. In this paper, we extend the framework of Datalog-like languages to obtain simple declarative formulations for such problems, and propose effective implementation techniques to ensure computational complexities comparable to those of procedural formulations. These advances are achieved through the use of the "choice" construct, extended with preference annotations to effect the selection of alternative stable-models and nondeterministic fixpoints. We show that, with suitable storage structures, the differential fixpoint computation of our programs matches the complexity of procedural algorithms in classical search and optimization problems.
[ { "version": "v1", "created": "Thu, 18 Dec 2003 17:29:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Greco", "Sergio", "" ], [ "Zaniolo", "Carlo", "" ] ]
cs/0312042
Sergio Greco
Sergio Flesca, Sergio Greco
Declarative Semantics for Active Rules
27 pages
Theory and Practice of Logic Programming, 1(1): 43-69, 2001
null
null
cs.DB
null
In this paper we analyze declarative deterministic and non-deterministic semantics for active rules. In particular we consider several (partial) stable model semantics, previously defined for deductive rules, such as well-founded, max deterministic, unique total stable model, total stable model, and maximal stable model semantics. The semantics of an active program AP is given by first rewriting it into a deductive program P, then computing a model M defining the declarative semantics of P and, finally, applying `consistent' updates contained in M to the source database. The framework we propose permits a natural integration of deductive and active rules and can also be applied to queries with function symbols or to queries over infinite databases.
[ { "version": "v1", "created": "Thu, 18 Dec 2003 17:43:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Flesca", "Sergio", "" ], [ "Greco", "Sergio", "" ] ]
cs/0312043
Hui Wang
Laks V. S. Lakshmanan and Fereidoon Sadri
On A Theory of Probabilistic Deductive Databases
38 pages, 0 figures
null
null
null
cs.DB
null
We propose a framework for modeling uncertainty where both belief and doubt can be given independent, first-class status. We adopt probability theory as the mathematical formalism for manipulating uncertainty. An agent can express the uncertainty in her knowledge about a piece of information in the form of a confidence level, consisting of a pair of intervals of probability, one for each of her belief and doubt. The space of confidence levels naturally leads to the notion of a trilattice, similar in spirit to Fitting's bilattices. Intuitively, thep oints in such a trilattice can be ordered according to truth, information, or precision. We develop a framework for probabilistic deductive databases by associating confidence levels with the facts and rules of a classical deductive database. While the trilattice structure offers a variety of choices for defining the semantics of probabilistic deductive databases, our choice of semantics is based on the truth-ordering, which we find to be closest to the classical framework for deductive databases. In addition to proposing a declarative semantics based on valuations and an equivalent semantics based on fixpoint theory, we also propose a proof procedure and prove it sound and complete. We show that while classical Datalog query programs have a polynomial time data complexity, certain query programs in the probabilistic deductive database framework do not even terminate on some input databases. We identify a large natural class of query programs of practical interest in our framework, and show that programs in this class possess polynomial time data complexity, i.e., not only do they terminate on every input database, they are guaranteed to do so in a number of steps polynomial in the input database size.
[ { "version": "v1", "created": "Thu, 18 Dec 2003 20:08:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Lakshmanan", "Laks V. S.", "" ], [ "Sadri", "Fereidoon", "" ] ]
cs/0312044
Paul Vitanyi
Rudi Cilibrasi (CWI) and Paul Vitanyi (CWI and University of Amsterdam)
Clustering by compression
LaTeX, 27 pages, 20 figures
null
null
null
cs.CV cond-mat.stat-mech cs.AI physics.data-an q-bio.GN q-bio.QM
null
We present a new method for clustering based on compression. The method doesn't use subject-specific features or background knowledge, and works as follows: First, we determine a universal similarity distance, the normalized compression distance or NCD, computed from the lengths of compressed data files (singly and in pairwise concatenation). Second, we apply a hierarchical clustering method. The NCD is universal in that it is not restricted to a specific application area, and works across application area boundaries. A theoretical precursor, the normalized information distance, co-developed by one of the authors, is provably optimal but uses the non-computable notion of Kolmogorov complexity. We propose precise notions of similarity metric, normal compressor, and show that the NCD based on a normal compressor is a similarity metric that approximates universality. To extract a hierarchy of clusters from the distance matrix, we determine a dendrogram (binary tree) by a new quartet method and a fast heuristic to implement it. The method is implemented and available as public software, and is robust under choice of different compressors. To substantiate our claims of universality and robustness, we report evidence of successful application in areas as diverse as genomics, virology, languages, literature, music, handwritten digits, astronomy, and combinations of objects from completely different domains, using statistical, dictionary, and block sorting compressors. In genomics we presented new evidence for major questions in Mammalian evolution, based on whole-mitochondrial genomic analysis: the Eutherian orders and the Marsupionta hypothesis against the Theria hypothesis.
[ { "version": "v1", "created": "Fri, 19 Dec 2003 18:41:29 GMT" }, { "version": "v2", "created": "Fri, 9 Apr 2004 15:29:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Cilibrasi", "Rudi", "", "CWI" ], [ "Vitanyi", "Paul", "", "CWI and University of\n Amsterdam" ] ]
cs/0312045
Paolo Ferraris
Paolo Ferraris and Vladimir Lifschitz
Weight Constraints as Nested Expressions
To appear in Theory and Practice of Logic Programming
null
null
null
cs.AI
null
We compare two recent extensions of the answer set (stable model) semantics of logic programs. One of them, due to Lifschitz, Tang and Turner, allows the bodies and heads of rules to contain nested expressions. The other, due to Niemela and Simons, uses weight constraints. We show that there is a simple, modular translation from the language of weight constraints into the language of nested expressions that preserves the program's answer sets. Nested expressions can be eliminated from the result of this translation in favor of additional atoms. The translation makes it possible to compute answer sets for some programs with weight constraints using satisfiability solvers, and to prove the strong equivalence of programs with weight constraints using the logic of here-and there.
[ { "version": "v1", "created": "Fri, 19 Dec 2003 16:00:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Ferraris", "Paolo", "" ], [ "Lifschitz", "Vladimir", "" ] ]
cs/0312046
Toni Urp\'i
Ernest Teniente and Toni Urpi
On the Abductive or Deductive Nature of Database Schema Validation and Update Processing Problems
null
Theory and Practice of Logic Programming 3(3):287-327, may 2003
null
null
cs.DB cs.LO
null
We show that database schema validation and update processing problems such as view updating, materialized view maintenance, integrity constraint checking, integrity constraint maintenance or condition monitoring can be classified as problems of either abductive or deductive nature, according to the reasoning paradigm that inherently suites them. This is done by performing abductive and deductive reasoning on the event rules [Oli91], a set of rules that define the difference between consecutive database states In this way, we show that it is possible to provide methods able to deal with all these problems as a whole. We also show how some existing general deductive and abductive procedures may be used to reason on the event rules. In this way, we show that these procedures can deal with all database schema validation and update processing problems considered in this paper.
[ { "version": "v1", "created": "Fri, 19 Dec 2003 15:25:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Teniente", "Ernest", "" ], [ "Urpi", "Toni", "" ] ]
cs/0312047
Juan J. Merelo Pr.
Juan-J. Merelo-Guervos, Beatriz Prieto, Fatima Rateb, Fernando Tricas
Mapping weblog communities
22 pages, 8 figures, to be submitted to Computer Networks
null
null
null
cs.NE
null
Websites of a particular class form increasingly complex networks, and new tools are needed to map and understand them. A way of visualizing this complex network is by mapping it. A map highlights which members of the community have similar interests, and reveals the underlying social network. In this paper, we will map a network of websites using Kohonen's self-organizing map (SOM), a neural-net like method generally used for clustering and visualization of complex data sets. The set of websites considered has been the Blogalia weblog hosting site (based at http://www.blogalia.com/), a thriving community of around 200 members, created in January 2002. In this paper we show how SOM discovers interesting community features, its relation with other community-discovering algorithms, and the way it highlights the set of communities formed over the network.
[ { "version": "v1", "created": "Sat, 20 Dec 2003 08:55:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Merelo-Guervos", "Juan-J.", "" ], [ "Prieto", "Beatriz", "" ], [ "Rateb", "Fatima", "" ], [ "Tricas", "Fernando", "" ] ]
cs/0312048
Joseph Y. Halpern
Joseph Y. Halpern and Daphne Koller
Representation Dependence in Probabilistic Inference
A preliminary version of the is paper appears in IJCAI, 1995. This version will appear in the Journal of AI Research
null
null
null
cs.AI cs.LO
null
Non-deductive reasoning systems are often {\em representation dependent}: representing the same situation in two different ways may cause such a system to return two different answers. Some have viewed this as a significant problem. For example, the principle of maximum entropy has been subjected to much criticism due to its representation dependence. There has, however, been almost no work investigating representation dependence. In this paper, we formalize this notion and show that it is not a problem specific to maximum entropy. In fact, we show that any representation-independent probabilistic inference procedure that ignores irrelevant information is essentially entailment, in a precise sense. Moreover, we show that representation independence is incompatible with even a weak default assumption of independence. We then show that invariance under a restricted class of representation changes can form a reasonable compromise between representation independence and other desiderata, and provide a construction of a family of inference procedures that provides such restricted representation independence, using relative entropy.
[ { "version": "v1", "created": "Sat, 20 Dec 2003 16:30:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Koller", "Daphne", "" ] ]
cs/0312049
Gianluca Argentini
Gianluca Argentini
Using virtual processors for SPMD parallel programs
9 pages; numeric tables; script code inserted
null
null
null
cs.DC
null
In this paper I describe some results on the use of virtual processors technology for parallelize some SPMD computational programs. The tested technology is the INTEL Hyper Threading on real processors, and the programs are MATLAB scripts for floating points computation. The conclusions of the work concern on the utility and limits of the used approach. The main result is that using virtual processors is a good technique for improving parallel programs not only for memory-based computations, but in the case of massive disk-storage operations too.
[ { "version": "v1", "created": "Sun, 21 Dec 2003 14:37:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0312050
Paul Piwek
Paul Piwek
A Flexible Pragmatics-driven Language Generator for Animated Agents
null
Proceedings of the Research Note Sessions of the 10th Conference of the European Chapter of the Association for Computational Linguistics (EACL'03), 2003, pp. 151-154
null
ITRI-03-05
cs.CL cs.MM
null
This paper describes the NECA MNLG; a fully implemented Multimodal Natural Language Generation module. The MNLG is deployed as part of the NECA system which generates dialogues between animated agents. The generation module supports the seamless integration of full grammar rules, templates and canned text. The generator takes input which allows for the specification of syntactic, semantic and pragmatic constraints on the output.
[ { "version": "v1", "created": "Mon, 22 Dec 2003 16:23:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Piwek", "Paul", "" ] ]
cs/0312051
Paul Piwek
Paul Piwek, Kees van Deemter
Towards Automated Generation of Scripted Dialogue: Some Time-Honoured Strategies
null
Proceedings of EDILOG: 6th Workshop on the Semantics and Pragmatics of Dialogue, 2002, pp. 141-148
null
ITRI-02-11
cs.CL cs.AI
null
The main aim of this paper is to introduce automated generation of scripted dialogue as a worthwhile topic of investigation. In particular the fact that scripted dialogue involves two layers of communication, i.e., uni-directional communication between the author and the audience of a scripted dialogue and bi-directional pretended communication between the characters featuring in the dialogue, is argued to raise some interesting issues. Our hope is that the combined study of the two layers will forge links between research in text generation and dialogue processing. The paper presents a first attempt at creating such links by studying three types of strategies for the automated generation of scripted dialogue. The strategies are derived from examples of human-authored and naturally occurring dialogue.
[ { "version": "v1", "created": "Mon, 22 Dec 2003 16:51:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Piwek", "Paul", "" ], [ "van Deemter", "Kees", "" ] ]
cs/0312052
Paul Piwek
Paul Piwek, Kees van Deemter
Dialogue as Discourse: Controlling Global Properties of Scripted Dialogue
null
Proceedings of AAAI Spring Symposium on Natural Language Generation in Spoken and Written Dialogue, Stanford, 2003
null
ITRI-03-04
cs.CL cs.AI
null
This paper explains why scripted dialogue shares some crucial properties with discourse. In particular, when scripted dialogues are generated by a Natural Language Generation system, the generator can apply revision strategies that cannot normally be used when the dialogue results from an interaction between autonomous agents (i.e., when the dialogue is not scripted). The paper explains that the relevant revision operators are best applied at the level of a dialogue plan and discusses how the generator may decide when to apply a given revision operator.
[ { "version": "v1", "created": "Mon, 22 Dec 2003 17:07:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Piwek", "Paul", "" ], [ "van Deemter", "Kees", "" ] ]
cs/0312053
Victor Marek
Victor W. Marek and Jeffrey B. Remmel
On the Expressibility of Stable Logic Programming
17 pages
TCLP 3(2003), pp. 551-567q
null
null
cs.AI
null
(We apologize for pidgin LaTeX) Schlipf \cite{sch91} proved that Stable Logic Programming (SLP) solves all $\mathit{NP}$ decision problems. We extend Schlipf's result to prove that SLP solves all search problems in the class $\mathit{NP}$. Moreover, we do this in a uniform way as defined in \cite{mt99}. Specifically, we show that there is a single $\mathrm{DATALOG}^{\neg}$ program $P_{\mathit{Trg}}$ such that given any Turing machine $M$, any polynomial $p$ with non-negative integer coefficients and any input $\sigma$ of size $n$ over a fixed alphabet $\Sigma$, there is an extensional database $\mathit{edb}_{M,p,\sigma}$ such that there is a one-to-one correspondence between the stable models of $\mathit{edb}_{M,p,\sigma} \cup P_{\mathit{Trg}}$ and the accepting computations of the machine $M$ that reach the final state in at most $p(n)$ steps. Moreover, $\mathit{edb}_{M,p,\sigma}$ can be computed in polynomial time from $p$, $\sigma$ and the description of $M$ and the decoding of such accepting computations from its corresponding stable model of $\mathit{edb}_{M,p,\sigma} \cup P_{\mathit{Trg}}$ can be computed in linear time. A similar statement holds for Default Logic with respect to $\Sigma_2^\mathrm{P}$-search problems\footnote{The proof of this result involves additional technical complications and will be a subject of another publication.}.
[ { "version": "v1", "created": "Mon, 22 Dec 2003 18:34:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Marek", "Victor W.", "" ], [ "Remmel", "Jeffrey B.", "" ] ]
cs/0312054
Krzysztof C. Kiwiel
Krzysztof C. Kiwiel
Partitioning schemes for quicksort and quickselect
21 pages
null
null
PMMO-03-01
cs.DS
null
We introduce several modifications of the partitioning schemes used in Hoare's quicksort and quickselect algorithms, including ternary schemes which identify keys less or greater than the pivot. We give estimates for the numbers of swaps made by each scheme. Our computational experiments indicate that ternary schemes allow quickselect to identify all keys equal to the selected key at little additional cost.
[ { "version": "v1", "created": "Tue, 23 Dec 2003 03:47:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiwiel", "Krzysztof C.", "" ] ]
cs/0312055
Krzysztof C. Kiwiel
Krzysztof C. Kiwiel
Randomized selection with quintary partitions
21 pages
null
null
PMMO-03-02
cs.DS
null
We show that several versions of Floyd and Rivest's algorithm Select for finding the $k$th smallest of $n$ elements require at most $n+\min\{k,n-k\}+o(n)$ comparisons on average and with high probability. This rectifies the analysis of Floyd and Rivest, and extends it to the case of nondistinct elements. Our computational results confirm that Select may be the best algorithm in practice.
[ { "version": "v1", "created": "Tue, 23 Dec 2003 04:12:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiwiel", "Krzysztof C.", "" ] ]
cs/0312056
Christian Duncan
Christian A. Duncan (University of Miami), David Eppstein (University of California, Irvine), Stephen G. Kobourov (University of Arizona)
The Geometric Thickness of Low Degree Graphs
10 pages, 7 figures, submitted to SoCG 2004
null
null
null
cs.CG cs.DM
null
We prove that the geometric thickness of graphs whose maximum degree is no more than four is two. All of our algorithms run in O(n) time, where n is the number of vertices in the graph. In our proofs, we present an embedding algorithm for graphs with maximum degree three that uses an n x n grid and a more complex algorithm for embedding a graph with maximum degree four. We also show a variation using orthogonal edges for maximum degree four graphs that also uses an n x n grid. The results have implications in graph theory, graph drawing, and VLSI design.
[ { "version": "v1", "created": "Wed, 24 Dec 2003 06:59:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Duncan", "Christian A.", "", "University of Miami" ], [ "Eppstein", "David", "", "University\n of California, Irvine" ], [ "Kobourov", "Stephen G.", "", "University of Arizona" ] ]
cs/0312058
Oren Glickman
Oren Glickman and Ido Dagan
Acquiring Lexical Paraphrases from a Single Corpus
null
null
null
null
cs.CL cs.AI cs.IR cs.LG
null
This paper studies the potential of identifying lexical paraphrases within a single corpus, focusing on the extraction of verb paraphrases. Most previous approaches detect individual paraphrase instances within a pair (or set) of comparable corpora, each of them containing roughly the same information, and rely on the substantial level of correspondence of such corpora. We present a novel method that successfully detects isolated paraphrase instances within a single corpus without relying on any a-priori structure and information. A comparison suggests that an instance-based approach may be combined with a vector based approach in order to assess better the paraphrase likelihood for many verb pairs.
[ { "version": "v1", "created": "Thu, 25 Dec 2003 16:45:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Glickman", "Oren", "" ], [ "Dagan", "Ido", "" ] ]
cs/0312059
Maria Babikova
Pavel Babikov, Oleg Gontcharov, Maria Babikova
Polyhierarchical Classifications Induced by Criteria Polyhierarchies, and Taxonomy Algebra
11 pages; 1 figure; to be presented at the "Artificial Intelligence and Applications 2004" conference
null
null
null
cs.AI cs.IR
null
A new approach to the construction of general persistent polyhierarchical classifications is proposed. It is based on implicit description of category polyhierarchy by a generating polyhierarchy of classification criteria. Similarly to existing approaches, the classification categories are defined by logical functions encoded by attributive expressions. However, the generating hierarchy explicitly predefines domains of criteria applicability, and the semantics of relations between categories is invariant to changes in the universe composition, extending variety of criteria, and increasing their cardinalities. The generating polyhierarchy is an independent, compact, portable, and re-usable information structure serving as a template classification. It can be associated with one or more particular sets of objects, included in more general classifications as a standard component, or used as a prototype for more comprehensive classifications. The approach dramatically simplifies development and unplanned modifications of persistent hierarchical classifications compared with tree, DAG, and faceted schemes. It can be efficiently implemented in common DBMS, while considerably reducing amount of computer resources required for storage, maintenance, and use of complex polyhierarchies.
[ { "version": "v1", "created": "Fri, 26 Dec 2003 05:30:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Babikov", "Pavel", "" ], [ "Gontcharov", "Oleg", "" ], [ "Babikova", "Maria", "" ] ]
cs/0401001
Johan Bollen
Terry L. Harrison, Aravind Elango, Johan Bollen and Michael Nelson
Initial Experiences Re-Exporting Duplicate and Similarity Computation with an OAI-PMH aggregator
10 pages
null
null
null
cs.DL cs.DS
null
The proliferation of the Open Archive Initiative Protocol for Metadata Harvesting (OAI-PMH) has resulted in the creation of a large number of service providers, all harvesting from either data providers or aggregators. If data were available regarding the similarity of metadata records, service providers could track redundant records across harvests from multiple sources as well as provide additional end-user services. Due to the large number of metadata formats and the diverse mapping strategies employed by data providers, similarity calculation requirements necessitate the use of information retrieval strategies. We describe an OAI-PMH aggregator implementation that uses the optional ``<about>'' container to re-export the results of similarity calculations. Metadata records (3751) were harvested from a NASA data provider and similarities for the records were computed. The results were useful for detecting duplicates, similarities and metadata errors.
[ { "version": "v1", "created": "Mon, 5 Jan 2004 05:41:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Harrison", "Terry L.", "" ], [ "Elango", "Aravind", "" ], [ "Bollen", "Johan", "" ], [ "Nelson", "Michael", "" ] ]
cs/0401002
Joshua Brandon Holden
Joshua Holden
A Comparison of Cryptography Courses
14 pages; to appear in Cryptologia
Cryptologia, 28 (2), 2004
null
null
cs.CR cs.CY
null
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and computer science majors. Both tried to incorporate technical and societal aspects of cryptography, with varying emphases. This paper will discuss the strengths and weaknesses of both courses and compare the differences in the author's approach.
[ { "version": "v1", "created": "Sat, 3 Jan 2004 20:11:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Holden", "Joshua", "" ] ]
cs/0401003
Krzysztof C. Kiwiel
Krzysztof C. Kiwiel
Randomized selection with tripartitioning
19 pages
null
null
PMMO-04-01
cs.DS
null
We show that several versions of Floyd and Rivest's algorithm Select [Comm.\ ACM {\bf 18} (1975) 173] for finding the $k$th smallest of $n$ elements require at most $n+\min\{k,n-k\}+o(n)$ comparisons on average, even when equal elements occur. This parallels our recent analysis of another variant due to Floyd and Rivest [Comm. ACM {\bf 18} (1975) 165--172]. Our computational results suggest that both variants perform well in practice, and may compete with other selection methods, such as Hoare's Find or quickselect with median-of-3 pivots.
[ { "version": "v1", "created": "Sun, 4 Jan 2004 05:29:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiwiel", "Krzysztof C.", "" ] ]
cs/0401004
Patrick C. McGuire
Patrick C. McGuire, J.A. Rodriguez-Manfredi, E. Sebastian-Martinez, J. Gomez-Elvira, E. Diaz-Martinez, J. Ormo, K. Neuffer, A. Giaquinta, F. Camps-Martinez, A. Lepinette-Malvitte, J. Perez-Mercader, H. Ritter, M. Oesker, J. Ontrup, J. Walter
Cyborg Systems as Platforms for Computer-Vision Algorithm-Development for Astrobiology
Updated biblio info
Proc. of the III European Workshop on Exo-Astrobiology, "Mars: The Search for Life", Madrid, November 2003 (ESA SP-545, March 2004) pp.141-144
null
null
cs.CV astro-ph cs.AI
null
Employing the allegorical imagery from the film "The Matrix", we motivate and discuss our `Cyborg Astrobiologist' research program. In this research program, we are using a wearable computer and video camcorder in order to test and train a computer-vision system to be a field-geologist and field-astrobiologist.
[ { "version": "v1", "created": "Fri, 2 Jan 2004 12:39:15 GMT" }, { "version": "v2", "created": "Sun, 9 May 2004 18:27:29 GMT" } ]
2007-05-23T00:00:00
[ [ "McGuire", "Patrick C.", "" ], [ "Rodriguez-Manfredi", "J. A.", "" ], [ "Sebastian-Martinez", "E.", "" ], [ "Gomez-Elvira", "J.", "" ], [ "Diaz-Martinez", "E.", "" ], [ "Ormo", "J.", "" ], [ "Neuffer", "K.", "" ], [ "Giaquinta", "A.", "" ], [ "Camps-Martinez", "F.", "" ], [ "Lepinette-Malvitte", "A.", "" ], [ "Perez-Mercader", "J.", "" ], [ "Ritter", "H.", "" ], [ "Oesker", "M.", "" ], [ "Ontrup", "J.", "" ], [ "Walter", "J.", "" ] ]
cs/0401005
Victor Kromer
Kromer Victor
About Unitary Rating Score Constructing
10 pages, 3 figures
null
null
null
cs.LG
null
It is offered to pool test points of different subjects and different aspects of the same subject together in order to get the unitary rating score, by the way of nonlinear transformation of indicator points in accordance with Zipf's distribution. It is proposed to use the well-studied distribution of Intellectuality Quotient IQ as the reference distribution for latent variable "progress in studies".
[ { "version": "v1", "created": "Thu, 8 Jan 2004 07:50:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Victor", "Kromer", "" ] ]
cs/0401006
Gianluca Argentini
Gianluca Argentini
Cluster computing performances using virtual processors and mathematical software
9 pages; 1 figure; keywords: cluster computing, virtual processors, performances
null
null
null
cs.DC cs.MS
null
In this paper I describe some results on the use of virtual processors technology for parallelize some SPMD computational programs in a cluster environment. The tested technology is the INTEL Hyper Threading on real processors, and the programs are MATLAB 6.5 Release 13 scripts for floating points computation. By the use of this technology, I tested that a cluster can run with benefit a number of concurrent processes double the amount of physical processors. The conclusions of the work concern on the utility and limits of the used approach. The main result is that using virtual processors is a good technique for improving parallel programs not only for memory-based computations, but in the case of massive disk-storage operations too.
[ { "version": "v1", "created": "Fri, 9 Jan 2004 12:09:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0401007
Manuel A. P\'erez-Qui\~nones
K. McDevitt, M. A. P\'erez-Qui\~nones, O. I. Padilla-Falto
Design of a Community-based Translation Center
null
null
null
null
cs.HC cs.DL
null
Interfaces that support multi-lingual content can reach a broader community. We wish to extend the reach of CITIDEL, a digital library for computing education materials, to support multiple languages. By doing so, we hope that it will increase the number of users, and in turn the number of resources. This paper discusses three approaches to translation (automated translation, developer-based, and community-based), and a brief evaluation of these approaches. It proposes a design for an online community translation center where volunteers help translate interface components and educational materials available in CITIDEL.
[ { "version": "v1", "created": "Mon, 12 Jan 2004 18:45:47 GMT" } ]
2007-05-23T00:00:00
[ [ "McDevitt", "K.", "" ], [ "Pérez-Quiñones", "M. A.", "" ], [ "Padilla-Falto", "O. I.", "" ] ]
cs/0401008
Javier Segura
Amparo Gil, Javier Segura, Nico M. Temme
Algorithm xxx: Modified Bessel functions of imaginary order and positive argument
6 pages, 4 figures. To appear in ACM T. Math. Software
null
null
null
cs.MS cs.NA math.NA
null
Fortran 77 programs for the computation of modified Bessel functions of purely imaginary order are presented. The codes compute the functions $K_{ia}(x)$, $L_{ia}(x)$ and their derivatives for real $a$ and positive $x$; these functions are independent solutions of the differential equation $x^2 w'' +x w' +(a^2 -x^2)w=0$. The code also computes exponentially scaled functions. The range of computation is $(x,a)\in (0,1500]\times [-1500,1500]$ when scaled functions are considered and it is larger than $(0,500]\times [-400,400]$ for standard IEEE double precision arithmetic. The relative accuracy is better than $10^{-13}$ in the range $(0,200]\times [-200,200]$ and close to $10^{-12}$ in $(0,1500]\times [-1500,1500]$.
[ { "version": "v1", "created": "Tue, 13 Jan 2004 14:29:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Gil", "Amparo", "" ], [ "Segura", "Javier", "" ], [ "Temme", "Nico M.", "" ] ]
cs/0401009
J. G. Wolff
J Gerard Wolff
Unifying Computing and Cognition: The SP Theory and its Applications
null
null
null
null
cs.AI
null
This book develops the conjecture that all kinds of information processing in computers and in brains may usefully be understood as "information compression by multiple alignment, unification and search". This "SP theory", which has been under development since 1987, provides a unified view of such things as the workings of a universal Turing machine, the nature of 'knowledge', the interpretation and production of natural language, pattern recognition and best-match information retrieval, several kinds of probabilistic reasoning, planning and problem solving, unsupervised learning, and a range of concepts in mathematics and logic. The theory also provides a basis for the design of an 'SP' computer with several potential advantages compared with traditional digital computers.
[ { "version": "v1", "created": "Tue, 13 Jan 2004 16:16:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolff", "J Gerard", "" ] ]
cs/0401010
Nicolas Christin
Nicolas Christin and John Chuang
On the Cost of Participating in a Peer-to-Peer Network
17 pages, 4 figures. Short version to be published in the Proceedings of the Third International Workshop on Peer-to-Peer Systems (IPTPS'04). San Diego, CA. February 2004
null
null
p2pecon TR-2003-12-CC
cs.NI
null
In this paper, we model the cost incurred by each peer participating in a peer-to-peer network. Such a cost model allows to gauge potential disincentives for peers to collaborate, and provides a measure of the ``total cost'' of a network, which is a possible benchmark to distinguish between proposals. We characterize the cost imposed on a node as a function of the experienced load and the node connectivity, and show how our model applies to a few proposed routing geometries for distributed hash tables (DHTs). We further outline a number of open questions this research has raised.
[ { "version": "v1", "created": "Wed, 14 Jan 2004 02:32:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Christin", "Nicolas", "" ], [ "Chuang", "John", "" ] ]
cs/0401013
Aniello Buonocore
Laura Bozzelli
Verification of Process Rewrite Systems in normal form
53 pages, 1 figure
null
null
null
cs.OH
null
We consider the problem of model--checking for Process Rewrite Systems (PRSs) in normal form. In a PRS in normal form every rewrite rule either only deals with procedure calls and procedure termination, possibly with value return, (this kind of rules allows to capture Pushdown Processes), or only deals with dynamic activation of processes and synchronization (this kind of rules allows to capture Petri Nets). The model-checking problem for PRSs and action-based linear temporal logic (ALTL) is undecidable. However, decidability of model--checking for PRSs and some interesting fragment of ALTL remains an open question. In this paper we state decidability results concerning generalized acceptance properties about infinite derivations (infinite term rewritings) in PRSs in normal form. As a consequence, we obtain decidability of the model-checking (restricted to infinite runs) for PRSs in normal form and a meaningful fragment of ALTL.
[ { "version": "v1", "created": "Fri, 16 Jan 2004 14:12:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Bozzelli", "Laura", "" ] ]
cs/0401014
Vadim Tropashko
Vadim Tropashko
Nested Intervals with Farey Fractions
1 figure
null
null
null
cs.DB
null
Relational Databases are universally conceived as an advance over their predecessors Network and Hierarchical models. Superior in every querying respect, they turned out to be surprisingly incomplete when modeling transitive dependencies. Almost every couple of months a question how to model a tree in the database surfaces at comp.database.theory newsgroup. This article completes a series of articles exploring Nested Intervals Model. Previous articles introduced tree encoding with Binary Rational Numbers. However, binary encoding grows exponentially, both in breadth and in depth. In this article, we'll leverage Farey fractions in order to overcome this problem. We'll also demonstrate that our implementation scales to a tree with 1M nodes.
[ { "version": "v1", "created": "Sun, 18 Jan 2004 03:09:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Tropashko", "Vadim", "" ] ]
cs/0401015
Loreto Bravo
Leopoldo Bertossi and Loreto Bravo
Query Answering in Peer-to-Peer Data Exchange Systems
14 pages
null
null
null
cs.DB cs.LO
null
The problem of answering queries posed to a peer who is a member of a peer-to-peer data exchange system is studied. The answers have to be consistent wrt to both the local semantic constraints and the data exchange constraints with other peers; and must also respect certain trust relationships between peers. A semantics for peer consistent answers under exchange constraints and trust relationships is introduced and some techniques for obtaining those answers are presented.
[ { "version": "v1", "created": "Tue, 20 Jan 2004 19:26:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertossi", "Leopoldo", "" ], [ "Bravo", "Loreto", "" ] ]
cs/0401016
Francesco Ranzato
Francesco Ranzato and Francesco Tapparo
Generalized Strong Preservation by Abstract Interpretation
null
null
null
null
cs.LO cs.PL
null
Standard abstract model checking relies on abstract Kripke structures which approximate concrete models by gluing together indistinguishable states, namely by a partition of the concrete state space. Strong preservation for a specification language L encodes the equivalence of concrete and abstract model checking of formulas in L. We show how abstract interpretation can be used to design abstract models that are more general than abstract Kripke structures. Accordingly, strong preservation is generalized to abstract interpretation-based models and precisely related to the concept of completeness in abstract interpretation. The problem of minimally refining an abstract model in order to make it strongly preserving for some language L can be formulated as a minimal domain refinement in abstract interpretation in order to get completeness w.r.t. the logical/temporal operators of L. It turns out that this refined strongly preserving abstract model always exists and can be characterized as a greatest fixed point. As a consequence, some well-known behavioural equivalences, like bisimulation, simulation and stuttering, and their corresponding partition refinement algorithms can be elegantly characterized in abstract interpretation as completeness properties and refinements.
[ { "version": "v1", "created": "Wed, 21 Jan 2004 14:28:32 GMT" }, { "version": "v2", "created": "Mon, 27 Dec 2004 11:33:35 GMT" }, { "version": "v3", "created": "Tue, 14 Mar 2006 09:07:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Ranzato", "Francesco", "" ], [ "Tapparo", "Francesco", "" ] ]
cs/0401018
Irina Golycheva
E.I. Bolotin, G.Sh. Tsitsiashvili, I.V. Golycheva
Factor Temporal Prognosis of Tick-Borne Encephalitis Foci Functioning on the South of Russian Far East
4 pages
null
null
null
cs.CV
null
A method of temporal factor prognosis of TE (tick-borne encephalitis) infection has been developed. The high precision of the prognosis results for a number of geographical regions of Primorsky Krai has been achieved. The method can be applied not only to epidemiological research but also to others.
[ { "version": "v1", "created": "Thu, 22 Jan 2004 05:53:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Bolotin", "E. I.", "" ], [ "Tsitsiashvili", "G. Sh.", "" ], [ "Golycheva", "I. V.", "" ] ]
cs/0401019
Tien D. Kieu
Toby Ord and Tien D. Kieu
Using biased coins as oracles
11 pages
null
null
null
cs.OH quant-ph
null
While it is well known that a Turing machine equipped with the ability to flip a fair coin cannot compute more that a standard Turing machine, we show that this is not true for a biased coin. Indeed, any oracle set $X$ may be coded as a probability $p_{X}$ such that if a Turing machine is given a coin which lands heads with probability $p_{X}$ it can compute any function recursive in $X$ with arbitrarily high probability. We also show how the assumption of a non-recursive bias can be weakened by using a sequence of increasingly accurate recursive biases or by choosing the bias at random from a distribution with a non-recursive mean. We conclude by briefly mentioning some implications regarding the physical realisability of such methods.
[ { "version": "v1", "created": "Fri, 23 Jan 2004 06:40:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Ord", "Toby", "" ], [ "Kieu", "Tien D.", "" ] ]
cs/0401021
Roberto Bagnara
Patricia M. Hill, Enea Zaffanella, Roberto Bagnara
A correct, precise and efficient integration of set-sharing, freeness and linearity for the analysis of finite and rational tree languages
35 pages, 1 table, to appear on "Theory and Practice of Logic Programming"
null
null
null
cs.PL
null
It is well-known that freeness and linearity information positively interact with aliasing information, allowing both the precision and the efficiency of the sharing analysis of logic programs to be improved. In this paper we present a novel combination of set-sharing with freeness and linearity information, which is characterized by an improved abstract unification operator. We provide a new abstraction function and prove the correctness of the analysis for both the finite tree and the rational tree cases. Moreover, we show that the same notion of redundant information as identified in (Bagnara et al. 2002; Zaffanella et al. 2002) also applies to this abstract domain combination: this allows for the implementation of an abstract unification operator running in polynomial time and achieving the same precision on all the considered observable properties.
[ { "version": "v1", "created": "Mon, 26 Jan 2004 10:14:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Hill", "Patricia M.", "" ], [ "Zaffanella", "Enea", "" ], [ "Bagnara", "Roberto", "" ] ]
cs/0401022
Roberto Bagnara
Roberto Bagnara, Enea Zaffanella, Patricia M. Hill
Enhanced sharing analysis techniques: a comprehensive evaluation
43 pages, 10 tables, to appear on "Theory and Practice of Logic Programming"
null
null
null
cs.PL
null
Sharing, an abstract domain developed by D. Jacobs and A. Langen for the analysis of logic programs, derives useful aliasing information. It is well-known that a commonly used core of techniques, such as the integration of Sharing with freeness and linearity information, can significantly improve the precision of the analysis. However, a number of other proposals for refined domain combinations have been circulating for years. One feature that is common to these proposals is that they do not seem to have undergone a thorough experimental evaluation even with respect to the expected precision gains. In this paper we experimentally evaluate: helping Sharing with the definitely ground variables found using Pos, the domain of positive Boolean formulas; the incorporation of explicit structural information; a full implementation of the reduced product of Sharing and Pos; the issue of reordering the bindings in the computation of the abstract mgu; an original proposal for the addition of a new mode recording the set of variables that are deemed to be ground or free; a refined way of using linearity to improve the analysis; the recovery of hidden information in the combination of Sharing with freeness information. Finally, we discuss the issue of whether tracking compoundness allows the computation of more sharing information.
[ { "version": "v1", "created": "Mon, 26 Jan 2004 10:35:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagnara", "Roberto", "" ], [ "Zaffanella", "Enea", "" ], [ "Hill", "Patricia M.", "" ] ]
cs/0401023
Emil Saucan
Emil Saucan
Surface Triangulation -- The Metric Approach
29 pages, 13 figures Preliminary version
null
null
null
cs.GR cs.CG math.MG
null
We embark in a program of studying the problem of better approximating surfaces by triangulations(triangular meshes) by considering the approximating triangulations as finite metric spaces and the target smooth surface as their Haussdorff-Gromov limit. This allows us to define in a more natural way the relevant elements, constants and invariants s.a. principal directions and principal values, Gaussian and Mean curvature, etc. By a "natural way" we mean an intrinsic, discrete, metric definitions as opposed to approximating or paraphrasing the differentiable notions. In this way we hope to circumvent computational errors and, indeed, conceptual ones, that are often inherent to the classical, "numerical" approach. In this first study we consider the problem of determining the Gaussian curvature of a polyhedral surface, by using the {\em embedding curvature} in the sense of Wald (and Menger). We present two modalities of employing these definitions for the computation of Gaussian curvature.
[ { "version": "v1", "created": "Mon, 26 Jan 2004 21:51:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Saucan", "Emil", "" ] ]
cs/0401024
Russell K. Standish
Duraid Madina and Russell K. Standish
A system for reflection in C++
null
Proceedings AUUG 2001: Always on and Everywhere, 207. ISBN 0957753225
null
null
cs.PL
null
Object-oriented programming languages such as Java and Objective C have become popular for implementing agent-based and other object-based simulations since objects in those languages can {\em reflect} (i.e. make runtime queries of an object's structure). This allows, for example, a fairly trivial {\em serialisation} routine (conversion of an object into a binary representation that can be stored or passed over a network) to be written. However C++ does not offer this ability, as type information is thrown away at compile time. Yet C++ is often a preferred development environment, whether for performance reasons or for its expressive features such as operator overloading. In this paper, we present the {\em Classdesc} system which brings many of the benefits of object reflection to C++.
[ { "version": "v1", "created": "Tue, 27 Jan 2004 03:29:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Madina", "Duraid", "" ], [ "Standish", "Russell K.", "" ] ]
cs/0401025
Russell K. Standish
Richard Leow and Russell K. Standish
Running C++ models undet the Swarm environment
null
Proceedings SwarmFest 2003
null
null
cs.MA
null
Objective-C is still the language of choice if users want to run their simulation efficiently under the Swarm environment since the Swarm environment itself was written in Objective-C. The language is a fast, object-oriented and easy to learn. However, the language is less well known than, less expressive than, and lacks support for many important features of C++ (eg. OpenMP for high performance computing application). In this paper, we present a methodology and software tools that we have developed for auto generating an Objective-C object template (and all the necessary interfacing functions) from a given C++ model, utilising the Classdesc's object description technology, so that the C++ model can both be run and accessed under the Objective-C and C++ environments. We also present a methodology for modifying an existing Swarm application to make part of the model (eg. the heatbug's step method) run under the C++ environment.
[ { "version": "v1", "created": "Tue, 27 Jan 2004 03:42:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Leow", "Richard", "" ], [ "Standish", "Russell K.", "" ] ]
cs/0401026
Russell K. Standish
Russell K. Standish and Richard Leow
EcoLab: Agent Based Modeling for C++ programmers
null
Proceedings SwarmFest 2003
null
null
cs.MA
null
\EcoLab{} is an agent based modeling system for C++ programmers, strongly influenced by the design of Swarm. This paper is just a brief outline of \EcoLab's features, more details can be found in other published articles, documentation and source code from the \EcoLab{} website.
[ { "version": "v1", "created": "Tue, 27 Jan 2004 03:46:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Standish", "Russell K.", "" ], [ "Leow", "Richard", "" ] ]
cs/0401027
Russell K. Standish
Russell K. Standish and Duraid Madina
ClassdescMP: Easy MPI programming in C++
null
Computational Science, Sloot et al. (eds), Lecture Notes in Computer Science 2660, Springer, 896. (2003)
null
null
cs.DC
null
ClassdescMP is a distributed memory parallel programming system for use with C++ and MPI. It uses the Classdesc reflection system to ease the task of building complicated messages to be sent between processes. It doesn't hide the underlying MPI API, so it is an augmentation of MPI capabilities. Users can still call standard MPI function calls if needed for performance reasons.
[ { "version": "v1", "created": "Tue, 27 Jan 2004 03:55:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Standish", "Russell K.", "" ], [ "Madina", "Duraid", "" ] ]
cs/0401028
Markus Demleitner
Markus Demleitner, Michael Kurtz, Alberto Accomazzi, G\"unther Eichhorn, Carolyn S. Grant, Steven S. Murray
Automated Resolution of Noisy Bibliographic References
10 pages, 1 figure; accepted for publication in the proceedings of the 2004 Meeting of the International Federation of Classification Societies
null
null
null
cs.DL
null
We describe a system used by the NASA Astrophysics Data System to identify bibliographic references obtained from scanned article pages by OCR methods with records in a bibliographic database. We analyze the process generating the noisy references and conclude that the three-step procedure of correcting the OCR results, parsing the corrected string and matching it against the database provides unsatisfactory results. Instead, we propose a method that allows a controlled merging of correction, parsing and matching, inspired by dependency grammars. We also report on the effectiveness of various heuristics that we have employed to improve recall.
[ { "version": "v1", "created": "Tue, 27 Jan 2004 10:09:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Demleitner", "Markus", "" ], [ "Kurtz", "Michael", "" ], [ "Accomazzi", "Alberto", "" ], [ "Eichhorn", "Günther", "" ], [ "Grant", "Carolyn S.", "" ], [ "Murray", "Steven S.", "" ] ]
cs/0401029
Johan Bollen
Aravind Elango and Johan Bollen and Michael L. Nelson
Dynamic Linking of Smart Digital Objects Based on User Navigation Patterns
pages: 12
null
null
null
cs.DL
null
We discuss a methodology to dynamically generate links among digital objects by means of an unsupervised learning mechanism which analyzes user link traversal patterns. We performed an experiment with a test bed of 150 complex data objects, referred to as buckets. Each bucket manages its own content, provides methods to interact with users and individually maintains a set of links to other buckets. We demonstrate that buckets were capable of dynamically adjusting their links to other buckets according to user link selections, thereby generating a meaningful network of bucket relations. Our results indicate such adaptive networks of linked buckets approximate the collective link preferences of a community of user
[ { "version": "v1", "created": "Wed, 28 Jan 2004 00:45:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Elango", "Aravind", "" ], [ "Bollen", "Johan", "" ], [ "Nelson", "Michael L.", "" ] ]