id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0311029 | Saverio Perugini | Michael Narayan, Chris Williams, Saverio Perugini, and Naren
Ramakrishnan | Staging Transformations for Multimodal Web Interaction Management | Describes framework and software architecture for multimodal web
interaction management | null | null | null | cs.IR cs.PL | null | Multimodal interfaces are becoming increasingly ubiquitous with the advent of
mobile devices, accessibility considerations, and novel software technologies
that combine diverse interaction media. In addition to improving access and
delivery capabilities, such interfaces enable flexible and personalized dialogs
with websites, much like a conversation between humans. In this paper, we
present a software framework for multimodal web interaction management that
supports mixed-initiative dialogs between users and websites. A
mixed-initiative dialog is one where the user and the website take turns
changing the flow of interaction. The framework supports the functional
specification and realization of such dialogs using staging transformations --
a theory for representing and reasoning about dialogs based on partial input.
It supports multiple interaction interfaces, and offers sessioning, caching,
and co-ordination functions through the use of an interaction manager. Two case
studies are presented to illustrate the promise of this approach.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2003 17:27:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Narayan",
"Michael",
""
],
[
"Williams",
"Chris",
""
],
[
"Perugini",
"Saverio",
""
],
[
"Ramakrishnan",
"Naren",
""
]
] |
cs/0311030 | Zoe Abrams | Zoe Abrams, Ashish Goel, Serge Plotkin | Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless
Sensor Networks | null | null | null | null | cs.DS | null | Wireless sensor networks (WSNs) are emerging as an effective means for
environment monitoring. This paper investigates a strategy for energy efficient
monitoring in WSNs that partitions the sensors into covers, and then activates
the covers iteratively in a round-robin fashion. This approach takes advantage
of the overlap created when many sensors monitor a single area. Our work builds
upon previous work in "Power Efficient Organization of Wireless Sensor
Networks" by Slijepcevic and Potkonjak, where the model is first formulated. We
have designed three approximation algorithms for a variation of the SET K-COVER
problem, where the objective is to partition the sensors into covers such that
the number of covers that include an area, summed over all areas, is maximized.
The first algorithm is randomized and partitions the sensors, in expectation,
within a fraction 1 - 1/e (~.63) of the optimum. We present two other
deterministic approximation algorithms. One is a distributed greedy algorithm
with a 1/2 approximation ratio and the other is a centralized greedy algorithm
with a 1 - 1/e approximation ratio. We show that it is NP-Complete to guarantee
better than 15/16 of the optimal coverage, indicating that all three algorithms
perform well with respect to the best approximation algorithm possible.
Simulations indicate that in practice, the deterministic algorithms perform far
above their worst case bounds, consistently covering more than 72% of what is
covered by an optimum solution. Simulations also indicate that the increase in
longevity is proportional to the amount of overlap amongst the sensors. The
algorithms are fast, easy to use, and according to simulations, significantly
increase the longevity of sensor networks. The randomized algorithm in
particular seems quite practical.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2003 22:47:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abrams",
"Zoe",
""
],
[
"Goel",
"Ashish",
""
],
[
"Plotkin",
"Serge",
""
]
] |
cs/0311032 | Oleg Mazonka | Oleg Mazonka, Daniel B. Cristofani | A Very Short Self-Interpreter | null | null | null | null | cs.PL | null | In this paper we would like to present a very short (possibly the shortest)
self-interpreter, based on a simplistic Turing-complete imperative language.
This interpreter explicitly processes the statements of the language, which
means the interpreter constitutes a description of the language inside that
same language. The paper does not require any specific knowledge; however,
experience in programming and a vivid imagination are beneficial.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2003 06:18:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mazonka",
"Oleg",
""
],
[
"Cristofani",
"Daniel B.",
""
]
] |
cs/0311033 | Andrij Rovenchak | Solomija N. Buk, Andrij A. Rovenchak | The Rank-Frequency Analysis for the Functional Style Corpora in the
Ukrainian Language | 8 pages | Journal of Quantitative Linguistics, Vol. 11, No. 3, P. 161-171
(2004) | 10.1080/0929617042000314912 | null | cs.CL | null | We use the rank-frequency analysis for the estimation of Kernel Vocabulary
size within specific corpora of Ukrainian. The extrapolation of high-rank
behaviour is utilized for estimation of the total vocabulary size.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2003 19:48:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buk",
"Solomija N.",
""
],
[
"Rovenchak",
"Andrij A.",
""
]
] |
cs/0311034 | Gibby Koldenhof | Gibby Koldenhof | Visualization of variations in human brain morphology using
differentiating reflection functions | 10 pages, keywords: MRI, Medical Visualization, Volume rendering,
BRDF, Specular reflection overlap | null | null | null | cs.GR | null | Conventional visualization media such as MRI prints and computer screens are
inherently two dimensional, making them incapable of displaying true 3D volume
data sets. By applying only transparency or intensity projection, and ignoring
light-matter interaction, results will likely fail to give optimal results.
Little research has been done on using reflectance functions to visually
separate the various segments of a MRI volume. We will explore if applying
specific reflectance functions to individual anatomical structures can help in
building an intuitive 2D image from a 3D dataset. We will test our hypothesis
by visualizing a statistical analysis of the genetic influences on variations
in human brain morphology because it inherently contains complex and many
different types of data making it a good candidate for our approach
| [
{
"version": "v1",
"created": "Sat, 22 Nov 2003 18:17:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Koldenhof",
"Gibby",
""
]
] |
cs/0311035 | Milenko Petrovi\'c | Milenko Petrovic and Mokhtar Aboelaze | Improving TCP/IP Performance over Wireless IEEE 802.11 Link | 7 pages, ICWN 2002 (International Conference on Wireless Networks) | null | null | null | cs.NI cs.PF | null | Cellular phones, wireless laptops, personal portable devices that supports
both voice and data access are all examples of communicating devices that uses
wireless communication. Sine TCP/IP (and UDP) is the dominant technology in use
in the internet, it is expected that they will be used (and they are currently)
over wireless connections. In this paper, we investigate the performance of the
TCP (and UDP) over IEEE802.11 wireless MAC protocol. We investigate the
performance of the TCP and UDP assuming three different traffic patterns. First
bulk transmission where the main concern is the throughput. Second real-time
audio (using UDP) in the existence of bulk TCP transmission where the main
concern is the packet loss for audio traffic. Finally web traffic where the
main concern is the response time. We also investigate the effect of using
forward Error Correction (FEC) technique and the MAC sublayer parameters on the
throughput and response time.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2003 04:49:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petrovic",
"Milenko",
""
],
[
"Aboelaze",
"Mokhtar",
""
]
] |
cs/0311036 | Dinoj Surendran | Dinoj Surendran and Partha Niyogi | Measuring the Functional Load of Phonological Contrasts | 28 pages, 3 figures, submitted to Computational Linguistics,
currently available as a tech report on
http://www.cs.uchicago.edu/research/publications/techreports | null | null | TR-2003-12 | cs.CL | null | Frequency counts are a measure of how much use a language makes of a
linguistic unit, such as a phoneme or word. However, what is often important is
not the units themselves, but the contrasts between them. A measure is
therefore needed for how much use a language makes of a contrast, i.e. the
functional load (FL) of the contrast. We generalize previous work in
linguistics and speech recognition and propose a family of measures for the FL
of several phonological contrasts, including phonemic oppositions, distinctive
features, suprasegmentals, and phonological rules. We then test it for
robustness to changes of corpora. Finally, we provide examples in Cantonese,
Dutch, English, German and Mandarin, in the context of historical linguistics,
language acquisition and speech recognition. More information can be found at
http://dinoj.info/research/fload
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2003 18:05:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Surendran",
"Dinoj",
""
],
[
"Niyogi",
"Partha",
""
]
] |
cs/0311037 | David Abramson | Aaron Searle, John Gough, David Abramson | DUCT: An Interactive Define-Use Chain Navigation Tool for Relative
Debugging | 7 pages | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated De-bugging (AADEBUG 2003), September
2003, Ghent | null | null | cs.SE | null | This paper describes an interactive tool that facilitates following
define-use chains in large codes. The motivation for the work is to support
relative debugging, where it is necessary to iteratively refine a set of
asser-tions between different versions of a program. DUCT is novel because it
exploits the Microsoft Intermediate Language (MSIL) that underpins the .NET
Framework. Accordingly, it works on a wide range of programming languages
without any modification. The paper describes the design and implementation of
DUCT, and then illustrates its use with a small case study.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2003 01:38:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Searle",
"Aaron",
""
],
[
"Gough",
"John",
""
],
[
"Abramson",
"David",
""
]
] |
cs/0311038 | Wolfgang May | Wolfgang May | XPath-Logic and XPathLog: A Logic-Programming Style XML Data
Manipulation Language | null | null | null | null | cs.DB | null | We define XPathLog as a Datalog-style extension of XPath. XPathLog provides a
clear, declarative language for querying and manipulating XML whose
perspectives are especially in XML data integration. In our characterization,
the formal semantics is defined wrt. an edge-labeled graph-based model which
covers the XML data model. We give a complete, logic-based characterization of
XML data and the main language concept for XML, XPath. XPath-Logic extends the
XPath language with variable bindings and embeds it into first-order logic.
XPathLog is then the Horn fragment of XPath-Logic, providing a Datalog-style,
rule-based language for querying and manipulating XML data. The model-theoretic
semantics of XPath-Logic serves as the base of XPathLog as a logic-programming
language, whereas also an equivalent answer-set semantics for evaluating
XPathLog queries is given. In contrast to other approaches, the XPath syntax
and semantics is also used for a declarative specification how the database
should be updated: when used in rule heads, XPath filters are interpreted as
specifications of elements and properties which should be added to the
database.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2003 09:42:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"May",
"Wolfgang",
""
]
] |
cs/0311039 | Zhide Chen | Zhide Chen, Hong Zhu | Quantum m-out-of-n Oblivious Transfer | To Appear in The Ninth IEEE Symposium On Computers And Communications
(ISCC'2004) | null | null | null | cs.CR quant-ph | null | In the m-out-of-n oblivious transfer (OT) model, one party Alice sends n bits
to another party Bob, Bob can get only m bits from the n bits. However, Alice
cannot know which m bits Bob received. Y.Mu[MJV02]} and Naor[Naor01] presented
classical m-out-of-n oblivious transfer based on discrete logarithm. As the
work of Shor [Shor94], the discrete logarithm can be solved in polynomial time
by quantum computers, so such OTs are unsafe to the quantum computer. In this
paper, we construct a quantum m-out-of-n OT (QOT) scheme based on the
transmission of polarized light and show that the scheme is robust to general
attacks, i.e. the QOT scheme satisfies statistical correctness and statistical
privacy.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2003 09:07:21 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Apr 2004 02:39:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Zhide",
""
],
[
"Zhu",
"Hong",
""
]
] |
cs/0311040 | Zoltan Somogyi | Zoltan Somogyi | Idempotent I/O for safe time travel | In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/0309027 | null | null | null | cs.PL cs.SE | null | Debuggers for logic programming languages have traditionally had a capability
most other debuggers did not: the ability to jump back to a previous state of
the program, effectively travelling back in time in the history of the
computation. This ``retry'' capability is very useful, allowing programmers to
examine in detail a part of the computation that they previously stepped over.
Unfortunately, it also creates a problem: while the debugger may be able to
restore the previous values of variables, it cannot restore the part of the
program's state that is affected by I/O operations. If the part of the
computation being jumped back over performs I/O, then the program will perform
these I/O operations twice, which will result in unwanted effects ranging from
the benign (e.g. output appearing twice) to the fatal (e.g. trying to close an
already closed file). We present a simple mechanism for ensuring that every I/O
action called for by the program is executed at most once, even if the
programmer asks the debugger to travel back in time from after the action to
before the action. The overhead of this mechanism is low enough and can be
controlled well enough to make it practical to use it to debug computations
that do significant amounts of I/O.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2003 04:45:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Somogyi",
"Zoltan",
""
]
] |
cs/0311041 | Milenko Petrovi\'c | Milenko Petrovic and Ioana Burcea and Hans-Arno Jacobsen | S-ToPSS: Semantic Toronto Publish/Subscribe System | 4 pages, 2 figures, VLDB 2003 demo (29th International Conference on
Very Large Databases) | null | null | null | cs.DC cs.DB | null | The increase in the amount of data on the Internet has led to the development
of a new generation of applications based on selective information
dissemination where, data is distributed only to interested clients. Such
applications require a new middleware architecture that can efficiently match
user interests with available information. Middleware that can satisfy this
requirement include event-based architectures such as publish-subscribe
systems. In this demonstration paper we address the problem of semantic
matching. We investigate how current publish/subscribe systems can be extended
with semantic capabilities. Our main contribution is the development and
validation (through demonstration) of a semantic pub/sub system prototype
S-ToPSS (Semantic Toronto Publish/Subscribe System).
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2003 21:55:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petrovic",
"Milenko",
""
],
[
"Burcea",
"Ioana",
""
],
[
"Jacobsen",
"Hans-Arno",
""
]
] |
cs/0311042 | Adam Klivans | Adam R. Klivans and Rocco A. Servedio | Toward Attribute Efficient Learning Algorithms | null | null | null | null | cs.LG | null | We make progress on two important problems regarding attribute efficient
learnability.
First, we give an algorithm for learning decision lists of length $k$ over
$n$ variables using $2^{\tilde{O}(k^{1/3})} \log n$ examples and time
$n^{\tilde{O}(k^{1/3})}$. This is the first algorithm for learning decision
lists that has both subexponential sample complexity and subexponential running
time in the relevant parameters. Our approach establishes a relationship
between attribute efficient learning and polynomial threshold functions and is
based on a new construction of low degree, low weight polynomial threshold
functions for decision lists. For a wide range of parameters our construction
matches a 1994 lower bound due to Beigel for the ODDMAXBIT predicate and gives
an essentially optimal tradeoff between polynomial threshold function degree
and weight.
Second, we give an algorithm for learning an unknown parity function on $k$
out of $n$ variables using $O(n^{1-1/k})$ examples in time polynomial in $n$.
For $k=o(\log n)$ this yields a polynomial time algorithm with sample
complexity $o(n)$. This is the first polynomial time algorithm for learning
parity on a superconstant number of variables with sublinear sample complexity.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2003 05:34:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Klivans",
"Adam R.",
""
],
[
"Servedio",
"Rocco A.",
""
]
] |
cs/0311043 | Maurizio Proietti | F. Fioravanti, A. Pettorossi, M. Proietti | Combining Logic Programs and Monadic Second Order Logics by Program
Transformation | 25 pages. Full version of a paper that appears in: M. Leuschel (ed.)
Proceedings of LOPSTR'02, Twelfth International Workshop on Logic-based
Program Development and Transformation, Madrid, Spain, 17-20 Sept. 2002.
Lecture Notes in Computer Science 2664. Springer-Verlag Berlin Heidelberg,
2003, pp. 160-181 | null | null | null | cs.PL cs.LO | null | We present a program synthesis method based on unfold/fold transformation
rules which can be used for deriving terminating definite logic programs from
formulas of the Weak Monadic Second Order theory of one successor (WS1S). This
synthesis method can also be used as a proof method which is a decision
procedure for closed formulas of WS1S. We apply our synthesis method for
translating CLP(WS1S) programs into logic programs and we use it also as a
proof method for verifying safety properties of infinite state systems.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2003 09:47:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fioravanti",
"F.",
""
],
[
"Pettorossi",
"A.",
""
],
[
"Proietti",
"M.",
""
]
] |
cs/0311044 | Maurizio Proietti | Alberto Pettorossi, Maurizio Proietti, Sophie Renault | Derivation of Efficient Logic Programs by Specialization and Reduction
of Nondeterminism | 74 pages. To appear in: Higher-Order and Symbolic Computation
(Special Issue in Honor of Bob Paige) | null | null | null | cs.PL cs.LO | null | Program specialization is a program transformation methodology which improves
program efficiency by exploiting the information about the input data which are
available at compile time. We show that current techniques for program
specialization based on partial evaluation do not perform well on
nondeterministic logic programs. We then consider a set of transformation rules
which extend the ones used for partial evaluation, and we propose a strategy
for guiding the application of these extended rules so to derive very efficient
specialized programs. The efficiency improvements which sometimes are
exponential, are due to the reduction of nondeterminism and to the fact that
the computations which are performed by the initial programs in different
branches of the computation trees, are performed by the specialized programs
within single branches. In order to reduce nondeterminism we also make use of
mode information for guiding the unfolding process. To exemplify our technique,
we show that we can automatically derive very efficient matching programs and
parsers for regular languages. The derivations we have performed could not have
been done by previously known partial evaluation techniques.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2003 10:04:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pettorossi",
"Alberto",
""
],
[
"Proietti",
"Maurizio",
""
],
[
"Renault",
"Sophie",
""
]
] |
cs/0311045 | J. G. Wolff | J Gerard Wolff | Unsupervised Grammar Induction in a Framework of Information Compression
by Multiple Alignment, Unification and Search | null | Proceedings of the Workshop and Tutorial on Learning Context-Free
Grammars (in association with the 14th European Conference on Machine
Learning and the 7th European Conference on Principles and Practice of
Knowledge Discovery in Databases (ECML/PKDD 2003), September 2003,
Cavtat-Dubrovnik, Croata), editors: C. de la Higuera and P. Adriaans and M.
van Zaanen and J. Oncina, pp 113-124 | null | null | cs.AI | null | This paper describes a novel approach to grammar induction that has been
developed within a framework designed to integrate learning with other aspects
of computing, AI, mathematics and logic. This framework, called "information
compression by multiple alignment, unification and search" (ICMAUS), is founded
on principles of Minimum Length Encoding pioneered by Solomonoff and others.
Most of the paper describes SP70, a computer model of the ICMAUS framework that
incorporates processes for unsupervised learning of grammars. An example is
presented to show how the model can infer a plausible grammar from appropriate
input. Limitations of the current model and how they may be overcome are
briefly discussed.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2003 11:18:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolff",
"J Gerard",
""
]
] |
cs/0311046 | Magnus Boman | Jan Odelstad, Magnus Boman | Algebras for Agent Norm-Regulation | 25 pages | null | null | null | cs.LO | null | An abstract architecture for idealized multi-agent systems whose behaviour is
regulated by normative systems is developed and discussed. Agent choices are
determined partially by the preference ordering of possible states and
partially by normative considerations: The agent chooses that act which leads
to the best outcome of all permissible actions. If an action is non-permissible
depends on if the result of performing that action leads to a state satisfying
a condition which is forbidden, according to the norms regulating the
multi-agent system. This idea is formalized by defining set-theoretic
predicates characterizing multi-agent systems. The definition of the predicate
uses decision theory, the Kanger-Lindahl theory of normative positions, and an
algebraic representation of normative systems.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2003 13:03:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Odelstad",
"Jan",
""
],
[
"Boman",
"Magnus",
""
]
] |
cs/0311047 | Milenko Petrovi\'c | Ioana Burcea, Milenko Petrovic and Hans-Arno Jacobsen | I know what you mean: semantic issues in Internet-scale
publish/subscribe systems | 12 pages, 1 figure, SWDB 2003 (1st Workshop on Semantic Web and
Databases) | null | null | null | cs.DC cs.DB | null | In recent years, the amount of information on the Internet has increased
exponentially developing great interest in selective information dissemination
systems. The publish/subscribe paradigm is particularly suited for designing
systems for routing information and requests according to their content
throughout wide-area network of brokers. Current publish/subscribe systems use
limited syntax-based content routing but since publishers and subscribers are
anonymous and decoupled in time, space and location, often over wide-area
network boundary, they do not necessarily speak the same language.
Consequently, adding semantics to current publish/subscribe systems is
important. In this paper we identify and examine the issues in developing
semantic-based content routing for publish/subscribe broker networks.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2003 16:00:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burcea",
"Ioana",
""
],
[
"Petrovic",
"Milenko",
""
],
[
"Jacobsen",
"Hans-Arno",
""
]
] |
cs/0311048 | Naren Ramakrishnan | Deept Kumar, Naren Ramakrishnan, Malcolm Potts, and Richard F. Helm | Turning CARTwheels: An Alternating Algorithm for Mining Redescriptions | null | null | null | null | cs.CE cs.AI | null | We present an unusual algorithm involving classification trees where two
trees are grown in opposite directions so that they are matched at their
leaves. This approach finds application in a new data mining task we formulate,
called "redescription mining". A redescription is a shift-of-vocabulary, or a
different way of communicating information about a given subset of data; the
goal of redescription mining is to find subsets of data that afford multiple
descriptions. We highlight the importance of this problem in domains such as
bioinformatics, which exhibit an underlying richness and diversity of data
descriptors (e.g., genes can be studied in a variety of ways). Our approach
helps integrate multiple forms of characterizing datasets, situates the
knowledge gained from one dataset in the context of others, and harnesses
high-level abstractions for uncovering cryptic and subtle features of data.
Algorithm design decisions, implementation details, and experimental results
are presented.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2003 18:13:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kumar",
"Deept",
""
],
[
"Ramakrishnan",
"Naren",
""
],
[
"Potts",
"Malcolm",
""
],
[
"Helm",
"Richard F.",
""
]
] |
cs/0311049 | Milenko Petrovi\'c | Milenko Petrovic and Mokhtar Aboelaze | Performance of TCP/UDP under Ad Hoc IEEE802.11 | 9 pages, 5 figures, ICT 2003 (10th International Conference on
Telecommunication) | null | null | null | cs.NI cs.PF | null | TCP is the De facto standard for connection oriented transport layer
protocol, while UDP is the De facto standard for transport layer protocol,
which is used with real time traffic for audio and video. Although there have
been many attempts to measure and analyze the performance of the TCP protocol
in wireless networks, very few research was done on the UDP or the interaction
between TCP and UDP traffic over the wireless link. In this paper, we tudy the
performance of TCP and UDP over IEEE802.11 ad hoc network. We used two
topologies, a string and a mesh topology. Our work indicates that IEEE802.11 as
a ad-hoc network is not very suitable for bulk transfer using TCP. It also
indicates that it is much better for real-time audio. Although one has to be
careful here since real-time audio does require much less bandwidth than the
wireless link bandwidth. Careful and detailed studies are needed to further
clarify that issue.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2003 23:02:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petrovic",
"Milenko",
""
],
[
"Aboelaze",
"Mokhtar",
""
]
] |
cs/0311050 | Nick Punin | Max Voskob, Nuck Punin | Data mining and Privacy in Public Sector using Intelligent Agents
(discussion paper) | 12 pages, 5 figures, scope limited to high level concepts | null | null | null | cs.CY cs.AI cs.IR cs.MA | null | The public sector comprises government agencies, ministries, education
institutions, health providers and other types of government, commercial and
not-for-profit organisations. Unlike commercial enterprises, this environment
is highly heterogeneous in all aspects. This forms a complex network which is
not always optimised. A lack of optimisation and communication hinders
information sharing between the network nodes limiting the flow of information.
Another limiting aspect is privacy of personal information and security of
operations of some nodes or segments of the network. Attempts to reorganise the
network or improve communications to make more information available for
sharing and analysis may be hindered or completely halted by public concerns
over privacy, political agendas, social and technological barriers. This paper
discusses a technical solution for information sharing while addressing the
privacy concerns with no need for reorganisation of the existing public sector
infrastructure . The solution is based on imposing an additional layer of
Intelligent Software Agents and Knowledge Bases for data mining and analysis.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2003 00:06:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Voskob",
"Max",
""
],
[
"Punin",
"Nuck",
""
]
] |
cs/0311051 | Amar Isli | Amar Isli | Integrating existing cone-shaped and projection-based cardinal direction
relations and a TCSP-like decidable generalisation | I should be able to provide a longer version soon. A shorter version
has been submitted to the conference KR'2004 | null | null | null | cs.AI | null | We consider the integration of existing cone-shaped and projection-based
calculi of cardinal direction relations, well-known in QSR. The more general,
integrating language we consider is based on convex constraints of the
qualitative form $r(x,y)$, $r$ being a cone-shaped or projection-based cardinal
direction atomic relation, or of the quantitative form $(\alpha ,\beta)(x,y)$,
with $\alpha ,\beta\in [0,2\pi)$ and $(\beta -\alpha)\in [0,\pi ]$: the meaning
of the quantitative constraint, in particular, is that point $x$ belongs to the
(convex) cone-shaped area rooted at $y$, and bounded by angles $\alpha$ and
$\beta$. The general form of a constraint is a disjunction of the form
$[r_1\vee...\vee r_{n_1}\vee (\alpha_1,\beta_1)\vee...\vee (\alpha
_{n_2},\beta_{n_2})](x,y)$, with $r_i(x,y)$, $i=1... n_1$, and $(\alpha
_i,\beta_i)(x,y)$, $i=1... n_2$, being convex constraints as described above:
the meaning of such a general constraint is that, for some $i=1... n_1$,
$r_i(x,y)$ holds, or, for some $i=1... n_2$, $(\alpha_i,\beta_i)(x,y)$ holds. A
conjunction of such general constraints is a $\tcsp$-like CSP, which we will
refer to as an $\scsp$ (Spatial Constraint Satisfaction Problem). An effective
solution search algorithm for an $\scsp$ will be described, which uses (1)
constraint propagation, based on a composition operation to be defined, as the
filtering method during the search, and (2) the Simplex algorithm, guaranteeing
completeness, at the leaves of the search tree. The approach is particularly
suited for large-scale high-level vision, such as, e.g., satellite-like
surveillance of a geographic area.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2003 04:06:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Isli",
"Amar",
""
]
] |
cs/0311052 | Wenyu Dong | Dong Wen-Yu, Xu Ke, Lin Meng-Xiang | A Situation Calculus-based Approach To Model Ubiquitous Information
Services | null | null | null | null | cs.AI cs.HC | null | This paper presents an augmented situation calculus-based approach to model
autonomous computing paradigm in ubiquitous information services. To make it
practical for commercial development and easier to support autonomous paradigm
imposed by ubiquitous information services, we made improvements based on
Reiter's standard situation calculus. First we explore the inherent
relationship between fluents and evolution: since not all fluents contribute to
systems' evolution and some fluents can be derived from some others, we define
those fluents that are sufficient and necessary to determine evolutional
potential as decisive fluents, and then we prove that their successor states
wrt to deterministic complex actions satisfy Markov property. Then, within the
calculus framework we build, we introduce validity theory to model the
autonomous services with application-specific validity requirements, including:
validity fluents to axiomatize validity requirements, heuristic multiple
alternative service choices ranging from complete acceptance, partial
acceptance, to complete rejection, and validity-ensured policy to comprise such
alternative service choices into organic, autonomously-computable services. Our
approach is demonstrated by a ubiquitous calendaring service, ACS, throughout
the paper.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2003 09:29:35 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Apr 2004 15:40:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wen-Yu",
"Dong",
""
],
[
"Ke",
"Xu",
""
],
[
"Meng-Xiang",
"Lin",
""
]
] |
cs/0311053 | Grigoriev Dima | Dima Grigoriev | Weak Bezout inequality for D-modules | 10 pages | null | null | null | cs.SC cs.CC | null | Let $\{w_{i,j}\}_{1\leq i\leq n, 1\leq j\leq s} \subset
L_m=F(X_1,...,X_m)[{\partial \over \partial X_1},..., {\partial \over \partial
X_m}]$ be linear partial differential operators of orders with respect to
${\partial \over \partial X_1},..., {\partial \over \partial X_m}$ at most $d$.
We prove an upper bound n(4m^2d\min\{n,s\})^{4^{m-t-1}(2(m-t))} on the leading
coefficient of the Hilbert-Kolchin polynomial of the left $L_m$-module
$<\{w_{1,j}, ..., w_{n,j}\}_{1\leq j \leq s} > \subset L_m^n$ having the
differential type $t$ (also being equal to the degree of the Hilbert-Kolchin
polynomial). The main technical tool is the complexity bound on solving systems
of linear equations over {\it algebras of fractions} of the form
$$L_m(F[X_1,..., X_m, {\partial \over \partial X_1},..., {\partial \over
\partial X_k}])^{-1}.$$
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2003 15:28:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grigoriev",
"Dima",
""
]
] |
cs/0311054 | Douglas A. Galbi | Douglas A. Galbi | Copyright and Creativity: Authors and Photographers | Part of a larger work, "Sense in Communication," available at
http://www.galbithink.org That work includes material on "human/computer
interaction" and "neurons and cognition." | null | null | null | cs.CY cs.DL | null | The history of the occupations "author" and "photographer" provides an
insightful perspective on copyright and creativity. The concept of the romantic
author, associated with personal creative genius, gained prominence in the
eighteenth century. However, in the U.S. in 1900 only about three thousand
persons professed their occupation to be "author." Self-professed
"photographers" were then about ten times as numerous as authors. Being a
photographer was associated with manufacturing and depended only on mastering
technical skills and making a living. Being an author, in contrast, was an
elite status associated with science and literature. Across the twentieth
century, the number of writers and authors grew much more rapidly than the
number of photographers. The relative success of writers and authors in
creating jobs seems to have depended not on differences in copyright or
possibilities for self-production, but on greater occupational innovation.
Creativity in organizing daily work is an important form of creativity.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2003 19:33:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Galbi",
"Douglas A.",
""
]
] |
cs/0312001 | Martin Lisewski | A. M. Lisewski | The concept of strong and weak virtual reality | 17 pages; several edits in v2 | Minds and Machines, 16 (2), 201-219 (2006) | 10.1007/s11023-006-9037-z | null | cs.LO nlin.AO physics.comp-ph | null | We approach the virtual reality phenomenon by studying its relationship to
set theory, and we investigate the case where this is done using the
wellfoundedness property of sets. Our hypothesis is that non-wellfounded sets
(hypersets) give rise to a different quality of virtual reality than do
familiar wellfounded sets. We initially provide an alternative approach to
virtual reality based on Sommerhoff's idea of first and second order
self-awareness; both categories of self-awareness are considered as necessary
conditions for consciousness in terms of higher cognitive functions. We then
introduce a representation of first and second order self-awareness through
sets, and assume that these sets, which we call events, originally form a
collection of wellfounded sets. Strong virtual reality characterizes virtual
reality environments which have the limited capacity to create only events
associated with wellfounded sets. In contrast, the more general concept of weak
virtual reality characterizes collections of virtual reality mediated events
altogether forming an entirety larger than any collection of wellfounded sets.
By giving reference to Aczel's hyperset theory we indicate that this definition
is not empty, because hypersets encompass wellfounded sets already. Moreover,
we argue that weak virtual reality could be realized in human history through
continued progress in computer technology. Finally, we reformulate our
characterization into a more general framework, and use Baltag's Structural
Theory of Sets (STS) to show that within this general hyperset theory
Sommerhoff's first and second order self-awareness as well as both concepts of
virtual reality admit a consistent mathematical representation.
| [
{
"version": "v1",
"created": "Sat, 29 Nov 2003 14:08:56 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Mar 2006 20:21:55 GMT"
},
{
"version": "v3",
"created": "Thu, 30 Mar 2006 22:38:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lisewski",
"A. M.",
""
]
] |
cs/0312003 | Edward Sazonov | E.S. Sazonov, P. Klinkhachorn and R. L. Klein | Hybrid LQG-Neural Controller for Inverted Pendulum System | null | Proceedings of 35th Southeastern Symposium on System Theory
(SSST), Morgantown, WV, March 2003 | null | null | cs.NE cs.LG | null | The paper presents a hybrid system controller, incorporating a neural and an
LQG controller. The neural controller has been optimized by genetic algorithms
directly on the inverted pendulum system. The failure free optimization process
stipulated a relatively small region of the asymptotic stability of the neural
controller, which is concentrated around the regulation point. The presented
hybrid controller combines benefits of a genetically optimized neural
controller and an LQG controller in a single system controller. High quality of
the regulation process is achieved through utilization of the neural
controller, while stability of the system during transient processes and a wide
range of operation are assured through application of the LQG controller. The
hybrid controller has been validated by applying it to a simulation model of an
inherently unstable system of inverted pendulum.
| [
{
"version": "v1",
"created": "Sun, 30 Nov 2003 00:19:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sazonov",
"E. S.",
""
],
[
"Klinkhachorn",
"P.",
""
],
[
"Klein",
"R. L.",
""
]
] |
cs/0312004 | Daniel Etzold | Daniel Etzold | Improving spam filtering by combining Naive Bayes with simple k-nearest
neighbor searches | null | null | null | null | cs.LG | null | Using naive Bayes for email classification has become very popular within the
last few months. They are quite easy to implement and very efficient. In this
paper we want to present empirical results of email classification using a
combination of naive Bayes and k-nearest neighbor searches. Using this
technique we show that the accuracy of a Bayes filter can be improved slightly
for a high number of features and significantly for a small number of features.
| [
{
"version": "v1",
"created": "Sun, 30 Nov 2003 20:41:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Etzold",
"Daniel",
""
]
] |
cs/0312005 | Alvaro Francisco Huertas Rosero | Alvaro Francisco Huertas-Rosero | A Cartography for 2x2 Symmetric Games | 13 pages, 7 figures This is a new version of the work, adapted to be
presented in the III Colombian Congress and I Andean International Conference
of Operational Research (Cartagena, Colombia, March 2004) | null | null | null | cs.GT | null | A bidimensional representation of the space of 2x2 Symmetric Games in the
strategic representation is proposed. This representation provides a tool for
the classification of 2x2 symmetric games, quantification of the fraction of
them having a certain feature, and predictions of changes in the
characteristics of a game when a change in done on the payoff matrix that
defines it.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2003 15:52:46 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Mar 2004 23:36:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huertas-Rosero",
"Alvaro Francisco",
""
]
] |
cs/0312008 | Wessel Kraaij | Wessel Kraaij, Jian-Yun Nie and Michel Simard | Embedding Web-based Statistical Translation Models in Cross-Language
Information Retrieval | 37 pages | Computational Linguistics 29(3) september 2003 | null | null | cs.CL cs.IR | null | Although more and more language pairs are covered by machine translation
services, there are still many pairs that lack translation resources.
Cross-language information retrieval (CLIR) is an application which needs
translation functionality of a relatively low level of sophistication since
current models for information retrieval (IR) are still based on a
bag-of-words. The Web provides a vast resource for the automatic construction
of parallel corpora which can be used to train statistical translation models
automatically. The resulting translation models can be embedded in several ways
in a retrieval model. In this paper, we will investigate the problem of
automatically mining parallel texts from the Web and different ways of
integrating the translation models within the retrieval process. Our
experiments on standard test collections for CLIR show that the Web-based
translation models can surpass commercial MT systems in CLIR tasks. These
results open the perspective of constructing a fully automatic query
translation device for CLIR at a very low cost.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2003 13:09:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kraaij",
"Wessel",
""
],
[
"Nie",
"Jian-Yun",
""
],
[
"Simard",
"Michel",
""
]
] |
cs/0312009 | Edward Sazonov | E.S.Sazonov, D. Del Gobbo, P. Klinkhachorn and R. L. Klein | Failure-Free Genetic Algorithm Optimization of a System Controller Using
SAFE/LEARNING Controllers in Tandem | null | Proceedings of 34th Southeastern Symposium on System Theory
(SSST), Huntsville, AL, March 2002 | null | null | cs.NE cs.LG | null | The paper presents a method for failure free genetic algorithm optimization
of a system controller. Genetic algorithms present a powerful tool that
facilitates producing near-optimal system controllers. Applied to such methods
of computational intelligence as neural networks or fuzzy logic, these methods
are capable of combining the non-linear mapping capabilities of the latter with
learning the system behavior directly, that is, without a prior model. At the
same time, genetic algorithms routinely produce solutions that lead to the
failure of the controlled system. Such solutions are generally unacceptable for
applications where safe operation must be guaranteed. We present here a method
of design, which allows failure-free application of genetic algorithms through
utilization of SAFE and LEARNING controllers in tandem, where the SAFE
controller recovers the system from dangerous states while the LEARNING
controller learns its behavior. The method has been validated by applying it to
an inherently unstable system of inverted pendulum.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2003 22:29:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sazonov",
"E. S.",
""
],
[
"Del Gobbo",
"D.",
""
],
[
"Klinkhachorn",
"P.",
""
],
[
"Klein",
"R. L.",
""
]
] |
cs/0312010 | Kathleen McDevitt | Kathleen McDevitt, Manuel A. Perez-Quinones, Olga I. Padilla-Falto | Designing of a Community-based Translation Center | 8 pages, 4 figures | null | null | TR-03-30 | cs.HC cs.DL | null | Interfaces that support multi-lingual content can reach a broader community.
We wish to extend the reach of CITIDEL, a digital library for computing
education materials, to support multiple languages. By doing so, we hope that
it will increase the number of users, and in turn the number of resources. This
paper discusses three approaches to translation (automated translation,
developer-based, and community-based), and a brief evaluation of these
approaches. It proposes a design for an online community translation center
where volunteers help translate interface components and educational materials
available in CITIDEL.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2003 05:26:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McDevitt",
"Kathleen",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
],
[
"Padilla-Falto",
"Olga I.",
""
]
] |
cs/0312011 | Giorgio Parisi | Giorgio Parisi | Constraint Optimization and Statistical Mechanics | 22 pages, 1 figure Lectures given at the Varenna summer school | null | null | null | cs.CC cond-mat.dis-nn cs.DS | null | In these lectures I will present an introduction to the results that have
been recently obtained in constraint optimization of random problems using
statistical mechanics techniques. After presenting the general results, in
order to simplify the presentation I will describe in details only the problems
related to the coloring of a random graph.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2003 16:46:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Parisi",
"Giorgio",
""
]
] |
cs/0312012 | Judith Beumer | Olga Shumsky Matlin, William McCune, and Ewing Lusk | Methods to Model-Check Parallel Systems Software | 12 pages, 3 figures, 1 table | null | null | ANL/MCS-TM-261 | cs.LO cs.DC | null | We report on an effort to develop methodologies for formal verification of
parts of the Multi-Purpose Daemon (MPD) parallel process management system. MPD
is a distributed collection of communicating processes. While the individual
components of the collection execute simple algorithms, their interaction leads
to unexpected errors that are difficult to uncover by conventional means. Two
verification approaches are discussed here: the standard model checking
approach using the software model checker SPIN and the nonstandard use of a
general-purpose first-order resolution-style theorem prover OTTER to conduct
the traditional state space exploration. We compare modeling methodology and
analyze performance and scalability of the two methods with respect to
verification of MPD.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2003 16:57:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Matlin",
"Olga Shumsky",
""
],
[
"McCune",
"William",
""
],
[
"Lusk",
"Ewing",
""
]
] |
cs/0312014 | Greta Yorsh | G. Yorsh, T. Reps, M. Sagiv, R. Wilhelm | Logical Characterizations of Heap Abstractions | null | null | null | null | cs.LO | null | Shape analysis concerns the problem of determining "shape invariants" for
programs that perform destructive updating on dynamically allocated storage. In
recent work, we have shown how shape analysis can be performed, using an
abstract interpretation based on 3-valued first-order logic. In that work,
concrete stores are finite 2-valued logical structures, and the sets of stores
that can possibly arise during execution are represented (conservatively) using
a certain family of finite 3-valued logical structures. In this paper, we show
how 3-valued structures that arise in shape analysis can be characterized using
formulas in first-order logic with transitive closure.
We also define a non-standard ("supervaluational") semantics for 3-valued
first-order logic that is more precise than a conventional 3-valued semantics,
and demonstrate that the supervaluational semantics can be effectively
implemented using existing theorem provers.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2003 20:31:23 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Apr 2004 14:04:21 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Mar 2005 17:03:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yorsh",
"G.",
""
],
[
"Reps",
"T.",
""
],
[
"Sagiv",
"M.",
""
],
[
"Wilhelm",
"R.",
""
]
] |
cs/0312015 | Patrick Baillot | Patrick Baillot, Virgile Mogbil | Soft lambda-calculus: a language for polynomial time computation | 20 pages | null | null | null | cs.LO cs.CC | null | Soft linear logic ([Lafont02]) is a subsystem of linear logic characterizing
the class PTIME. We introduce Soft lambda-calculus as a calculus typable in the
intuitionistic and affine variant of this logic. We prove that the (untyped)
terms of this calculus are reducible in polynomial time. We then extend the
type system of Soft logic with recursive types. This allows us to consider
non-standard types for representing lists. Using these datatypes we examine the
concrete expressivity of Soft lambda-calculus with the example of the insertion
sort algorithm.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2003 23:42:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baillot",
"Patrick",
""
],
[
"Mogbil",
"Virgile",
""
]
] |
cs/0312016 | Saverio Perugini | Saverio Perugini, Mary E. Pinney, Naren Ramakrishnan, Manuel A.
Perez-Quinones, and Mary Beth Rosson | Taking the Initiative with Extempore: Exploring Out-of-Turn Interactions
with Websites | Introduces out-of-turn interaction with websites: a technique which
sustains, rather than curbs, the user-system dialog | null | null | null | cs.HC cs.IR | null | We present the first study to explore the use of out-of-turn interaction in
websites. Out-of-turn interaction is a technique which empowers the user to
supply unsolicited information while browsing. This approach helps flexibly
bridge any mental mismatch between the user and the website, in a manner
fundamentally different from faceted browsing and site-specific search tools.
We built a user interface (Extempore) which accepts out-of-turn input via voice
or text; and employed it in a US congressional website, to determine if users
utilize out-of-turn interaction for information-finding tasks, and their
rationale for doing so. The results indicate that users are adept at discerning
when out-of-turn interaction is necessary in a particular task, and actively
interleaved it with browsing. However, users found cascading information across
information-finding subtasks challenging. Therefore, this work not only
improves our understanding of out-of-turn interaction, but also suggests
further opportunities to enrich browsing experiences for users.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2003 16:25:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perugini",
"Saverio",
""
],
[
"Pinney",
"Mary E.",
""
],
[
"Ramakrishnan",
"Naren",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
],
[
"Rosson",
"Mary Beth",
""
]
] |
cs/0312017 | Paul Prekop | Paul Prekop | An Exploratory Study of Mobile Computing Use by Knowledge Workers | To appear in: Proceedings of the 2003 Australasian Computer Human
Interaction Conference (OzCHI 2003), University of Queensland, Australia,
November 26-28 2003 | null | null | null | cs.HC | null | This paper describes some preliminary results from a 20-week study on the use
of Compaq iPAQ Personal Digital Assistants (PDAs) by 10 senior developers,
analysts, technical managers, and senior organisational managers. The goal of
the study was to identify what applications were used, how and where they were
used, the problems and issues that arose, and how use of the iPAQs changed over
the study period. The paper highlights some interesting uses of the iPAQs, and
identifies some of the characteristics of successful mobile applications.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2003 03:44:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prekop",
"Paul",
""
]
] |
cs/0312020 | Laurent Henocque | Laurent Henocque | Modeling Object Oriented Constraint Programs in Z | null | null | null | RR-LSIS-03-006 | cs.AI | null | Object oriented constraint programs (OOCPs) emerge as a leading evolution of
constraint programming and artificial intelligence, first applied to a range of
industrial applications called configuration problems. The rich variety of
technical approaches to solving configuration problems (CLP(FD), CC(FD), DCSP,
Terminological systems, constraint programs with set variables ...) is a source
of difficulty. No universally accepted formal language exists for communicating
about OOCPs, which makes the comparison of systems difficult. We present here a
Z based specification of OOCPs which avoids the falltrap of hidden object
semantics. The object system is part of the specification, and captures all of
the most advanced notions from the object oriented modeling standard UML. The
paper illustrates these issues and the conciseness and precision of Z by the
specification of a working OOCP that solves an historical AI problem : parsing
a context free grammar. Being written in Z, an OOCP specification also supports
formal proofs. The whole builds the foundation of an adaptative and evolving
framework for communicating about constrained object models and programs.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2003 10:15:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henocque",
"Laurent",
""
]
] |
cs/0312021 | Domenico Camarda | Domenico Camarda | ICT-based planning and the missing educational link | Issues and ideas reflected in this paper were partly presented by the
Author during the III INCOSUSW Meeting (Local resources and global trades:
Environments and agriculture in the Mediterranean region), held in Rabat,
Morocco, from April 25 to 30, 2002, and funded by the European Union | null | null | null | cs.CY | null | The past century ended with an unexpected explosion of Information and
Communication Technologies (ICT), both in planning/managing public policies,
and in exchanging knowledge. However, the extent to which ICT-based tools
increase the level of public knowledge, or help decision makers is still
uncertain. Although indirectly, the overload of unfiltered Web-based
information seems able to hamper the knowledge growth of people, particularly
in some developing communities, whereas Decision Support Systems (DSS) and
Geographical Information Systems (GIS) prove to be ineffective if managed by
unskilled planning bodies. Given such warns, this paper outlines how the
different social and cultural awareness of local communities can affect the
outcomes of ICT-based tools. It further explores the impacts of ICT-based tools
on community development and spatial planning, emphasizing the role of proper
literacy and education for effective management.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2003 11:36:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Camarda",
"Domenico",
""
]
] |
cs/0312022 | Rajkumar Buyya | Manjuka Soysa, Rajkumar Buyya, and Baikunth Nath | GridEmail: A Case for Economically Regulated Internet-based
Interpersonal Communications | 15 pages, 10 figures, A Technical Report from Grid Computing and
Distributed Systems Laboratory, University of Melbourne, Australia | null | null | GRIDS-TR-2003-6 | cs.DC | null | Email has emerged as a dominant form of electronic communication between
people. Spam is a major problem for email users, with estimates of up to 56% of
email falling into that category. Control of Spam is being attempted with
technical and legislative methods. In this paper we look at email and spam from
a supply-demand perspective. We propose Gridemail, an email system based on an
economy of communicating parties, where participants? motivations are
represented as pricing policies and profiles. This system is expected to help
people regulate their personal communications to suit their conditions, and
help in removing unwanted messages.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2003 11:42:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Soysa",
"Manjuka",
""
],
[
"Buyya",
"Rajkumar",
""
],
[
"Nath",
"Baikunth",
""
]
] |
cs/0312023 | Samir Genaim | Samir Genaim and Michael Codish | Inferring Termination Conditions for Logic Programs using Backwards
Analysis | null | null | null | null | cs.PL | null | This paper focuses on the inference of modes for which a logic program is
guaranteed to terminate. This generalises traditional termination analysis
where an analyser tries to verify termination for a specified mode. Our
contribution is a methodology in which components of traditional termination
analysis are combined with backwards analysis to obtain an analyser for
termination inference. We identify a condition on the components of the
analyser which guarantees that termination inference will infer all modes which
can be checked to terminate. The application of this methodology to enhance a
traditional termination analyser to perform also termination inference is
demonstrated.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2003 16:14:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Genaim",
"Samir",
""
],
[
"Codish",
"Michael",
""
]
] |
cs/0312024 | Liang Wang | Wang Liang, Guo Yiping, Fang Ming | Evolution: Google vs. DRIS | 5 pages,6 figures | null | null | null | cs.DL cs.IR cs.NI | null | This paper gives an absolute new search system that builds the information
retrieval infrastructure for Internet. Now most search engine companies are
mainly concerned with how to make profit from company users by advertisement
and ranking prominence, but never consider what its real customers will feel.
Few web search engines can sell billions dollars just at the cost of
inconvenience of most Internet users, but not its high quality of search
service. When we have to bear the bothersome advertisements in the awful
results and have no choices, Internet as the kind of public good will surely be
undermined. If current Internet can't fully ensure our right to know, it may
need some sound improvements or a revolution.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2003 03:15:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liang",
"Wang",
""
],
[
"Yiping",
"Guo",
""
],
[
"Ming",
"Fang",
""
]
] |
cs/0312026 | Jan Hruza | Jan Hruza, Petr Stepanek | Speedup of Logic Programs by Binarization and Partial Deduction | 15 pages; to appear in Theory and Practice of Logic Programming | null | null | null | cs.PL cs.AI | null | Binary logic programs can be obtained from ordinary logic programs by a
binarizing transformation. In most cases, binary programs obtained this way are
less efficient than the original programs. (Demoen, 1992) showed an interesting
example of a logic program whose computational behaviour was improved when it
was transformed to a binary program and then specialized by partial deduction.
The class of B-stratifiable logic programs is defined. It is shown that for
every B-stratifiable logic program, binarization and subsequent partial
deduction produce a binary program which does not contain variables for
continuations introduced by binarization. Such programs usually have a better
computational behaviour than the original ones. Both binarization and partial
deduction can be easily automated. A comparison with other related approaches
to program transformation is given.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2003 12:23:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hruza",
"Jan",
""
],
[
"Stepanek",
"Petr",
""
]
] |
cs/0312027 | Gerda Janssens | Henk Vandecasteele and Gerda Janssens | An Open Ended Tree | null | TPLP Vol 3(3) 2003 pp 377-385 | null | null | cs.PL | null | An open ended list is a well known data structure in Prolog programs. It is
frequently used to represent a value changing over time, while this value is
referred to from several places in the data structure of the application. A
weak point in this technique is that the time complexity is linear in the
number of updates to the value represented by the open ended list. In this
programming pearl we present a variant of the open ended list, namely an open
ended tree, with an update and access time complexity logarithmic in the number
of updates to the value.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2003 13:43:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vandecasteele",
"Henk",
""
],
[
"Janssens",
"Gerda",
""
]
] |
cs/0312028 | Sergio Greco | Filippo Furfaro, Gianluigi Greco, Sergio Greco | Minimal founded semantics for disjunctive logic programs and deductive
databases | 20 pages | Theory and Practice of Logic Programming, 4(1): 75-93 (2004) | null | null | cs.LO cs.AI | null | In this paper, we propose a variant of stable model semantics for disjunctive
logic programming and deductive databases. The semantics, called minimal
founded, generalizes stable model semantics for normal (i.e. non disjunctive)
programs but differs from disjunctive stable model semantics (the extension of
stable model semantics for disjunctive programs). Compared with disjunctive
stable model semantics, minimal founded semantics seems to be more intuitive,
it gives meaning to programs which are meaningless under stable model semantics
and is no harder to compute. More specifically, minimal founded semantics
differs from stable model semantics only for disjunctive programs having
constraint rules or rules working as constraints. We study the expressive power
of the semantics and show that for general disjunctive datalog programs it has
the same power as disjunctive stable model semantics.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2003 18:29:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Furfaro",
"Filippo",
""
],
[
"Greco",
"Gianluigi",
""
],
[
"Greco",
"Sergio",
""
]
] |
cs/0312029 | Hudson Turner | Hudson Turner | Strong Equivalence Made Easy: Nested Expressions and Weight Constraints | null | Theory and Practice of Logic Programming, vol 3 (4&5), pages
609-622, 2003 | null | null | cs.LO cs.AI | null | Logic programs P and Q are strongly equivalent if, given any program R,
programs P union R and Q union R are equivalent (that is, have the same answer
sets). Strong equivalence is convenient for the study of equivalent
transformations of logic programs: one can prove that a local change is correct
without considering the whole program. Lifschitz, Pearce and Valverde showed
that Heyting's logic of here-and-there can be used to characterize strong
equivalence for logic programs with nested expressions (which subsume the
better-known extended disjunctive programs). This note considers a simpler,
more direct characterization of strong equivalence for such programs, and shows
that it can also be applied without modification to the weight constraint
programs of Niemela and Simons. Thus, this characterization of strong
equivalence is convenient for the study of equivalent transformations of logic
programs written in the input languages of answer set programming systems dlv
and smodels. The note concludes with a brief discussion of results that can be
used to automate reasoning about strong equivalence, including a novel encoding
that reduces the problem of deciding the strong equivalence of a pair of weight
constraint programs to that of deciding the inconsistency of a weight
constraint program.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2003 20:58:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turner",
"Hudson",
""
]
] |
cs/0312030 | Jiyou Jia | Jiyou Jia | CSIEC (Computer Simulator in Educational Communication): An Intelligent
Web-Based Teaching System for Foreign Language Learning | 8 pages, 4 figures, 5 tables to appear on ED-MEDIA 2004 (World
Conference on Educational Multimedia, Hypermedia & Telecommunications) | null | null | null | cs.CY | null | In this paper we present an innovative intelligent web-based computer-aided
instruction system for foreign language learning: CSIEC (Computer Simulator in
Educational Communication). This system can not only grammatically understand
the sentences in English given from the users via Internet, but also reasonably
and individually speak with the users. At first the related works in this
research field are analyzed. Then we introduce the system goals and the system
framework, i.e., the natural language understanding mechanism (NLML, NLOMJ and
NLDB) and the communicational response (CR). Finally we give the syntactic and
semantic content of this instruction system, i.e. some important notations of
English grammar used in it and their relations with the NLOMJ.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2003 14:14:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jia",
"Jiyou",
""
]
] |
cs/0312031 | Daniel Cabeza | Daniel Cabeza and Manuel V. Hermenegildo | Distributed WWW Programming using (Ciao-)Prolog and the PiLLoW library | 32 pages, 4 figures | Theory and Practice of Logic Programming, Vol 1(3), 2001, 251-282 | null | null | cs.DC cs.PL | null | We discuss from a practical point of view a number of issues involved in
writing distributed Internet and WWW applications using LP/CLP systems. We
describe PiLLoW, a public-domain Internet and WWW programming library for
LP/CLP systems that we have designed in order to simplify the process of
writing such applications. PiLLoW provides facilities for accessing documents
and code on the WWW; parsing, manipulating and generating HTML and XML
structured documents and data; producing HTML forms; writing form handlers and
CGI-scripts; and processing HTML/XML templates. An important contribution of
PiLLoW is to model HTML/XML code (and, thus, the content of WWW pages) as
terms. The PiLLoW library has been developed in the context of the Ciao Prolog
system, but it has been adapted to a number of popular LP/CLP systems,
supporting most of its functionality. We also describe the use of concurrency
and a high-level model of client-server interaction, Ciao Prolog's active
modules, in the context of WWW programming. We propose a solution for
client-side downloading and execution of Prolog code, using generic browsers.
Finally, we also provide an overview of related work on the topic.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2003 19:09:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cabeza",
"Daniel",
""
],
[
"Hermenegildo",
"Manuel V.",
""
]
] |
cs/0312032 | Anja Remshagen | Anja Remshagen and Klaus Truemper | Learning in a Compiler for MINSAT Algorithms | 16 pages | Theory and practice of Logic Programming, Vol 3(3), pp 271-286,
2003 | null | null | cs.LO | null | This paper describes learning in a compiler for algorithms solving classes of
the logic minimization problem MINSAT, where the underlying propositional
formula is in conjunctive normal form (CNF) and where costs are associated with
the True/False values of the variables. Each class consists of all instances
that may be derived from a given propositional formula and costs for True/False
values by fixing or deleting variables, and by deleting clauses. The learning
step begins once the compiler has constructed a solution algorithm for a given
class. The step applies that algorithm to comparatively few instances of the
class, analyses the performance of the algorithm on these instances, and
modifies the underlying propositional formula, with the goal that the algorithm
will perform much better on all instances of the class.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2003 17:24:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Remshagen",
"Anja",
""
],
[
"Truemper",
"Klaus",
""
]
] |
cs/0312033 | Ilya Zemskov | Ilya Zemskov | Using sensors in the web crawling process | 4 pages, 4 figures. The article was accepted for the IADIS
International WWW/Internet 2003 Conference but not published in the
proceedings due to the lack of financial support | null | null | null | cs.IR cs.DL | null | This paper offers a short description of an Internet information field
monitoring system, which places a special module-sensor on the side of the
Web-server to detect changes in information resources and subsequently
reindexes only the resources signalized by the corresponding sensor. Concise
results of simulation research and an implementation attempt of the given
"sensors" concept are provided.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2003 11:30:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zemskov",
"Ilya",
""
]
] |
cs/0312034 | Gonzalo Alvarez | Gonzalo Alvarez, Luis Hernandez, Angel Martin | Sharing secret color images using cellular automata with memory | 17 pages, 6 figures, LaTeX format | null | null | null | cs.CR | null | A {k,n}-threshold scheme based on two-dimensional memory cellular automata is
proposed to share images in a secret way. This method allows to encode an image
into n shared images so that only qualified subsets of k or more shares can
recover the secret image, but any k-1 or fewer of them gain no information
about the original image. The main characteristics of this new scheme are: each
shared image has the same size that the original one, and the recovered image
is exactly the same than the secret image; i.e., there is no loss of
resolution.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2003 11:59:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alvarez",
"Gonzalo",
""
],
[
"Hernandez",
"Luis",
""
],
[
"Martin",
"Angel",
""
]
] |
cs/0312035 | Marcin Rogawski | Marcin Rogawski | Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to
Camellia algorithm) using ALTERA devices | 29 pages, presented on Enigma conferance in 2003r | null | null | null | cs.CR cs.PF | null | Alghoritms: HIEROCRYPT-3, CAMELLIA and ANUBIS, GRAND CRU, NOEKEON, NUSH, Q,
RC6, SAFER++128, SC2000, SHACAL were requested for the submission of block
ciphers (high level block cipher) to NESSIE (New European Schemes for
Signatures, Integrity, and Encryption) project. The main purpose of this
project was to put forward a portfolio of strong cryptographic primitives of
various types. The NESSIE project was a three year long project and has been
divided into two phases. The first was finished in June 2001r. CAMELLIA, RC6,
SAFER++128 and SHACAL were accepted for the second phase of the evaluation
process. HIEROCRYPT-3 had key schedule problems, and there were attacks for up
to 3,5 rounds out of 6, at least hardware implementations of this cipher were
extremely slow [12]. HIEROCRYPT-3 was not selected to Phase II. CAMELLIA was
selected as an algorithm suggested for future standard. In the paper we present
the hardware implementations these two algorithms with 128-bit blocks and
128-bit keys, using ALTERA devices and their comparisons.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2003 13:01:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rogawski",
"Marcin",
""
]
] |
cs/0312036 | Joseph Y. Halpern | Hana Chockler, Joseph Y. Halpern, and Orna Kupferman | What Causes a System to Satisfy a Specification? | null | null | null | null | cs.LO cs.AI | null | Even when a system is proven to be correct with respect to a specification,
there is still a question of how complete the specification is, and whether it
really covers all the behaviors of the system. Coverage metrics attempt to
check which parts of a system are actually relevant for the verification
process to succeed. Recent work on coverage in model checking suggests several
coverage metrics and algorithms for finding parts of the system that are not
covered by the specification. The work has already proven to be effective in
practice, detecting design errors that escape early verification efforts in
industrial settings. In this paper, we relate a formal definition of causality
given by Halpern and Pearl [2001] to coverage. We show that it gives
significant insight into unresolved issues regarding the definition of coverage
and leads to potentially useful extensions of coverage. In particular, we
introduce the notion of responsibility, which assigns to components of a system
a quantitative measure of their relevance to the satisfaction of the
specification.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2003 16:42:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chockler",
"Hana",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Kupferman",
"Orna",
""
]
] |
cs/0312037 | Joseph Y. Halpern | Joseph Y. Halpern and Riccardo Pucella | Characterizing and Reasoning about Probabilistic and Non-Probabilistic
Expectation | To appear in Journal of the ACM | null | null | null | cs.AI cs.LO | null | Expectation is a central notion in probability theory. The notion of
expectation also makes sense for other notions of uncertainty. We introduce a
propositional logic for reasoning about expectation, where the semantics
depends on the underlying representation of uncertainty. We give sound and
complete axiomatizations for the logic in the case that the underlying
representation is (a) probability, (b) sets of probability measures, (c) belief
functions, and (d) possibility measures. We show that this logic is more
expressive than the corresponding logic for reasoning about likelihood in the
case of sets of probability measures, but equi-expressive in the case of
probability, belief, and possibility. Finally, we show that satisfiability for
these logics is NP-complete, no harder than satisfiability for propositional
logic.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2003 16:50:39 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Apr 2007 18:53:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
cs/0312038 | Joseph Y. Halpern | Hana Chockler and Joseph Y. Halpern | Responsibility and blame: a structural-model approach | null | null | null | null | cs.AI cs.LO | null | Causality is typically treated an all-or-nothing concept; either A is a cause
of B or it is not. We extend the definition of causality introduced by Halpern
and Pearl [2001] to take into account the degree of responsibility of A for B.
For example, if someone wins an election 11--0, then each person who votes for
him is less responsible for the victory than if he had won 6--5. We then define
a notion of degree of blame, which takes into account an agent's epistemic
state. Roughly speaking, the degree of blame of A for B is the expected degree
of responsibility of A for B, taken over the epistemic state of an agent.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2003 16:59:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chockler",
"Hana",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0312040 | Marcello Balduccini | Marcello Balduccini and Michael Gelfond | Diagnostic reasoning with A-Prolog | 46 pages, 1 Postscript figure | TPLP Vol 3(4&5) (2003) 425-461 | null | null | cs.AI | null | In this paper we suggest an architecture for a software agent which operates
a physical device and is capable of making observations and of testing and
repairing the device's components. We present simplified definitions of the
notions of symptom, candidate diagnosis, and diagnosis which are based on the
theory of action language ${\cal AL}$. The definitions allow one to give a
simple account of the agent's behavior in which many of the agent's tasks are
reduced to computing stable models of logic programs.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2003 13:38:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Balduccini",
"Marcello",
""
],
[
"Gelfond",
"Michael",
""
]
] |
cs/0312041 | Sergio Greco | Sergio Greco, Carlo Zaniolo | Greedy Algorithms in Datalog | 27 pages | Theory and Practice of Logic Programming, 1(4): 381-407, 2001 | null | null | cs.DB cs.AI | null | In the design of algorithms, the greedy paradigm provides a powerful tool for
solving efficiently classical computational problems, within the framework of
procedural languages. However, expressing these algorithms within the
declarative framework of logic-based languages has proven a difficult research
challenge. In this paper, we extend the framework of Datalog-like languages to
obtain simple declarative formulations for such problems, and propose effective
implementation techniques to ensure computational complexities comparable to
those of procedural formulations. These advances are achieved through the use
of the "choice" construct, extended with preference annotations to effect the
selection of alternative stable-models and nondeterministic fixpoints. We show
that, with suitable storage structures, the differential fixpoint computation
of our programs matches the complexity of procedural algorithms in classical
search and optimization problems.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2003 17:29:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Greco",
"Sergio",
""
],
[
"Zaniolo",
"Carlo",
""
]
] |
cs/0312042 | Sergio Greco | Sergio Flesca, Sergio Greco | Declarative Semantics for Active Rules | 27 pages | Theory and Practice of Logic Programming, 1(1): 43-69, 2001 | null | null | cs.DB | null | In this paper we analyze declarative deterministic and non-deterministic
semantics for active rules. In particular we consider several (partial) stable
model semantics, previously defined for deductive rules, such as well-founded,
max deterministic, unique total stable model, total stable model, and maximal
stable model semantics. The semantics of an active program AP is given by first
rewriting it into a deductive program P, then computing a model M defining the
declarative semantics of P and, finally, applying `consistent' updates
contained in M to the source database. The framework we propose permits a
natural integration of deductive and active rules and can also be applied to
queries with function symbols or to queries over infinite databases.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2003 17:43:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Flesca",
"Sergio",
""
],
[
"Greco",
"Sergio",
""
]
] |
cs/0312043 | Hui Wang | Laks V. S. Lakshmanan and Fereidoon Sadri | On A Theory of Probabilistic Deductive Databases | 38 pages, 0 figures | null | null | null | cs.DB | null | We propose a framework for modeling uncertainty where both belief and doubt
can be given independent, first-class status. We adopt probability theory as
the mathematical formalism for manipulating uncertainty. An agent can express
the uncertainty in her knowledge about a piece of information in the form of a
confidence level, consisting of a pair of intervals of probability, one for
each of her belief and doubt. The space of confidence levels naturally leads to
the notion of a trilattice, similar in spirit to Fitting's bilattices.
Intuitively, thep oints in such a trilattice can be ordered according to truth,
information, or precision. We develop a framework for probabilistic deductive
databases by associating confidence levels with the facts and rules of a
classical deductive database. While the trilattice structure offers a variety
of choices for defining the semantics of probabilistic deductive databases, our
choice of semantics is based on the truth-ordering, which we find to be closest
to the classical framework for deductive databases. In addition to proposing a
declarative semantics based on valuations and an equivalent semantics based on
fixpoint theory, we also propose a proof procedure and prove it sound and
complete. We show that while classical Datalog query programs have a polynomial
time data complexity, certain query programs in the probabilistic deductive
database framework do not even terminate on some input databases. We identify a
large natural class of query programs of practical interest in our framework,
and show that programs in this class possess polynomial time data complexity,
i.e., not only do they terminate on every input database, they are guaranteed
to do so in a number of steps polynomial in the input database size.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2003 20:08:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lakshmanan",
"Laks V. S.",
""
],
[
"Sadri",
"Fereidoon",
""
]
] |
cs/0312044 | Paul Vitanyi | Rudi Cilibrasi (CWI) and Paul Vitanyi (CWI and University of
Amsterdam) | Clustering by compression | LaTeX, 27 pages, 20 figures | null | null | null | cs.CV cond-mat.stat-mech cs.AI physics.data-an q-bio.GN q-bio.QM | null | We present a new method for clustering based on compression. The method
doesn't use subject-specific features or background knowledge, and works as
follows: First, we determine a universal similarity distance, the normalized
compression distance or NCD, computed from the lengths of compressed data files
(singly and in pairwise concatenation). Second, we apply a hierarchical
clustering method. The NCD is universal in that it is not restricted to a
specific application area, and works across application area boundaries. A
theoretical precursor, the normalized information distance, co-developed by one
of the authors, is provably optimal but uses the non-computable notion of
Kolmogorov complexity. We propose precise notions of similarity metric, normal
compressor, and show that the NCD based on a normal compressor is a similarity
metric that approximates universality. To extract a hierarchy of clusters from
the distance matrix, we determine a dendrogram (binary tree) by a new quartet
method and a fast heuristic to implement it. The method is implemented and
available as public software, and is robust under choice of different
compressors. To substantiate our claims of universality and robustness, we
report evidence of successful application in areas as diverse as genomics,
virology, languages, literature, music, handwritten digits, astronomy, and
combinations of objects from completely different domains, using statistical,
dictionary, and block sorting compressors. In genomics we presented new
evidence for major questions in Mammalian evolution, based on
whole-mitochondrial genomic analysis: the Eutherian orders and the Marsupionta
hypothesis against the Theria hypothesis.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2003 18:41:29 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Apr 2004 15:29:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cilibrasi",
"Rudi",
"",
"CWI"
],
[
"Vitanyi",
"Paul",
"",
"CWI and University of\n Amsterdam"
]
] |
cs/0312045 | Paolo Ferraris | Paolo Ferraris and Vladimir Lifschitz | Weight Constraints as Nested Expressions | To appear in Theory and Practice of Logic Programming | null | null | null | cs.AI | null | We compare two recent extensions of the answer set (stable model) semantics
of logic programs. One of them, due to Lifschitz, Tang and Turner, allows the
bodies and heads of rules to contain nested expressions. The other, due to
Niemela and Simons, uses weight constraints. We show that there is a simple,
modular translation from the language of weight constraints into the language
of nested expressions that preserves the program's answer sets. Nested
expressions can be eliminated from the result of this translation in favor of
additional atoms. The translation makes it possible to compute answer sets for
some programs with weight constraints using satisfiability solvers, and to
prove the strong equivalence of programs with weight constraints using the
logic of here-and there.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2003 16:00:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ferraris",
"Paolo",
""
],
[
"Lifschitz",
"Vladimir",
""
]
] |
cs/0312046 | Toni Urp\'i | Ernest Teniente and Toni Urpi | On the Abductive or Deductive Nature of Database Schema Validation and
Update Processing Problems | null | Theory and Practice of Logic Programming 3(3):287-327, may 2003 | null | null | cs.DB cs.LO | null | We show that database schema validation and update processing problems such
as view updating, materialized view maintenance, integrity constraint checking,
integrity constraint maintenance or condition monitoring can be classified as
problems of either abductive or deductive nature, according to the reasoning
paradigm that inherently suites them. This is done by performing abductive and
deductive reasoning on the event rules [Oli91], a set of rules that define the
difference between consecutive database states In this way, we show that it is
possible to provide methods able to deal with all these problems as a whole. We
also show how some existing general deductive and abductive procedures may be
used to reason on the event rules. In this way, we show that these procedures
can deal with all database schema validation and update processing problems
considered in this paper.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2003 15:25:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Teniente",
"Ernest",
""
],
[
"Urpi",
"Toni",
""
]
] |
cs/0312047 | Juan J. Merelo Pr. | Juan-J. Merelo-Guervos, Beatriz Prieto, Fatima Rateb, Fernando Tricas | Mapping weblog communities | 22 pages, 8 figures, to be submitted to Computer Networks | null | null | null | cs.NE | null | Websites of a particular class form increasingly complex networks, and new
tools are needed to map and understand them. A way of visualizing this complex
network is by mapping it. A map highlights which members of the community have
similar interests, and reveals the underlying social network. In this paper, we
will map a network of websites using Kohonen's self-organizing map (SOM), a
neural-net like method generally used for clustering and visualization of
complex data sets. The set of websites considered has been the Blogalia weblog
hosting site (based at http://www.blogalia.com/), a thriving community of
around 200 members, created in January 2002. In this paper we show how SOM
discovers interesting community features, its relation with other
community-discovering algorithms, and the way it highlights the set of
communities formed over the network.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2003 08:55:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Merelo-Guervos",
"Juan-J.",
""
],
[
"Prieto",
"Beatriz",
""
],
[
"Rateb",
"Fatima",
""
],
[
"Tricas",
"Fernando",
""
]
] |
cs/0312048 | Joseph Y. Halpern | Joseph Y. Halpern and Daphne Koller | Representation Dependence in Probabilistic Inference | A preliminary version of the is paper appears in IJCAI, 1995. This
version will appear in the Journal of AI Research | null | null | null | cs.AI cs.LO | null | Non-deductive reasoning systems are often {\em representation dependent}:
representing the same situation in two different ways may cause such a system
to return two different answers. Some have viewed this as a significant
problem. For example, the principle of maximum entropy has been subjected to
much criticism due to its representation dependence. There has, however, been
almost no work investigating representation dependence. In this paper, we
formalize this notion and show that it is not a problem specific to maximum
entropy. In fact, we show that any representation-independent probabilistic
inference procedure that ignores irrelevant information is essentially
entailment, in a precise sense. Moreover, we show that representation
independence is incompatible with even a weak default assumption of
independence. We then show that invariance under a restricted class of
representation changes can form a reasonable compromise between representation
independence and other desiderata, and provide a construction of a family of
inference procedures that provides such restricted representation independence,
using relative entropy.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2003 16:30:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Koller",
"Daphne",
""
]
] |
cs/0312049 | Gianluca Argentini | Gianluca Argentini | Using virtual processors for SPMD parallel programs | 9 pages; numeric tables; script code inserted | null | null | null | cs.DC | null | In this paper I describe some results on the use of virtual processors
technology for parallelize some SPMD computational programs. The tested
technology is the INTEL Hyper Threading on real processors, and the programs
are MATLAB scripts for floating points computation. The conclusions of the work
concern on the utility and limits of the used approach. The main result is that
using virtual processors is a good technique for improving parallel programs
not only for memory-based computations, but in the case of massive disk-storage
operations too.
| [
{
"version": "v1",
"created": "Sun, 21 Dec 2003 14:37:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0312050 | Paul Piwek | Paul Piwek | A Flexible Pragmatics-driven Language Generator for Animated Agents | null | Proceedings of the Research Note Sessions of the 10th Conference
of the European Chapter of the Association for Computational Linguistics
(EACL'03), 2003, pp. 151-154 | null | ITRI-03-05 | cs.CL cs.MM | null | This paper describes the NECA MNLG; a fully implemented Multimodal Natural
Language Generation module. The MNLG is deployed as part of the NECA system
which generates dialogues between animated agents. The generation module
supports the seamless integration of full grammar rules, templates and canned
text. The generator takes input which allows for the specification of
syntactic, semantic and pragmatic constraints on the output.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2003 16:23:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Piwek",
"Paul",
""
]
] |
cs/0312051 | Paul Piwek | Paul Piwek, Kees van Deemter | Towards Automated Generation of Scripted Dialogue: Some Time-Honoured
Strategies | null | Proceedings of EDILOG: 6th Workshop on the Semantics and
Pragmatics of Dialogue, 2002, pp. 141-148 | null | ITRI-02-11 | cs.CL cs.AI | null | The main aim of this paper is to introduce automated generation of scripted
dialogue as a worthwhile topic of investigation. In particular the fact that
scripted dialogue involves two layers of communication, i.e., uni-directional
communication between the author and the audience of a scripted dialogue and
bi-directional pretended communication between the characters featuring in the
dialogue, is argued to raise some interesting issues. Our hope is that the
combined study of the two layers will forge links between research in text
generation and dialogue processing. The paper presents a first attempt at
creating such links by studying three types of strategies for the automated
generation of scripted dialogue. The strategies are derived from examples of
human-authored and naturally occurring dialogue.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2003 16:51:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Piwek",
"Paul",
""
],
[
"van Deemter",
"Kees",
""
]
] |
cs/0312052 | Paul Piwek | Paul Piwek, Kees van Deemter | Dialogue as Discourse: Controlling Global Properties of Scripted
Dialogue | null | Proceedings of AAAI Spring Symposium on Natural Language
Generation in Spoken and Written Dialogue, Stanford, 2003 | null | ITRI-03-04 | cs.CL cs.AI | null | This paper explains why scripted dialogue shares some crucial properties with
discourse. In particular, when scripted dialogues are generated by a Natural
Language Generation system, the generator can apply revision strategies that
cannot normally be used when the dialogue results from an interaction between
autonomous agents (i.e., when the dialogue is not scripted). The paper explains
that the relevant revision operators are best applied at the level of a
dialogue plan and discusses how the generator may decide when to apply a given
revision operator.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2003 17:07:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Piwek",
"Paul",
""
],
[
"van Deemter",
"Kees",
""
]
] |
cs/0312053 | Victor Marek | Victor W. Marek and Jeffrey B. Remmel | On the Expressibility of Stable Logic Programming | 17 pages | TCLP 3(2003), pp. 551-567q | null | null | cs.AI | null | (We apologize for pidgin LaTeX) Schlipf \cite{sch91} proved that Stable Logic
Programming (SLP) solves all $\mathit{NP}$ decision problems. We extend
Schlipf's result to prove that SLP solves all search problems in the class
$\mathit{NP}$. Moreover, we do this in a uniform way as defined in \cite{mt99}.
Specifically, we show that there is a single $\mathrm{DATALOG}^{\neg}$ program
$P_{\mathit{Trg}}$ such that given any Turing machine $M$, any polynomial $p$
with non-negative integer coefficients and any input $\sigma$ of size $n$ over
a fixed alphabet $\Sigma$, there is an extensional database
$\mathit{edb}_{M,p,\sigma}$ such that there is a one-to-one correspondence
between the stable models of $\mathit{edb}_{M,p,\sigma} \cup P_{\mathit{Trg}}$
and the accepting computations of the machine $M$ that reach the final state in
at most $p(n)$ steps. Moreover, $\mathit{edb}_{M,p,\sigma}$ can be computed in
polynomial time from $p$, $\sigma$ and the description of $M$ and the decoding
of such accepting computations from its corresponding stable model of
$\mathit{edb}_{M,p,\sigma} \cup P_{\mathit{Trg}}$ can be computed in linear
time. A similar statement holds for Default Logic with respect to
$\Sigma_2^\mathrm{P}$-search problems\footnote{The proof of this result
involves additional technical complications and will be a subject of another
publication.}.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2003 18:34:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marek",
"Victor W.",
""
],
[
"Remmel",
"Jeffrey B.",
""
]
] |
cs/0312054 | Krzysztof C. Kiwiel | Krzysztof C. Kiwiel | Partitioning schemes for quicksort and quickselect | 21 pages | null | null | PMMO-03-01 | cs.DS | null | We introduce several modifications of the partitioning schemes used in
Hoare's quicksort and quickselect algorithms, including ternary schemes which
identify keys less or greater than the pivot. We give estimates for the numbers
of swaps made by each scheme. Our computational experiments indicate that
ternary schemes allow quickselect to identify all keys equal to the selected
key at little additional cost.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2003 03:47:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiwiel",
"Krzysztof C.",
""
]
] |
cs/0312055 | Krzysztof C. Kiwiel | Krzysztof C. Kiwiel | Randomized selection with quintary partitions | 21 pages | null | null | PMMO-03-02 | cs.DS | null | We show that several versions of Floyd and Rivest's algorithm Select for
finding the $k$th smallest of $n$ elements require at most
$n+\min\{k,n-k\}+o(n)$ comparisons on average and with high probability. This
rectifies the analysis of Floyd and Rivest, and extends it to the case of
nondistinct elements. Our computational results confirm that Select may be the
best algorithm in practice.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2003 04:12:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiwiel",
"Krzysztof C.",
""
]
] |
cs/0312056 | Christian Duncan | Christian A. Duncan (University of Miami), David Eppstein (University
of California, Irvine), Stephen G. Kobourov (University of Arizona) | The Geometric Thickness of Low Degree Graphs | 10 pages, 7 figures, submitted to SoCG 2004 | null | null | null | cs.CG cs.DM | null | We prove that the geometric thickness of graphs whose maximum degree is no
more than four is two. All of our algorithms run in O(n) time, where n is the
number of vertices in the graph. In our proofs, we present an embedding
algorithm for graphs with maximum degree three that uses an n x n grid and a
more complex algorithm for embedding a graph with maximum degree four. We also
show a variation using orthogonal edges for maximum degree four graphs that
also uses an n x n grid. The results have implications in graph theory, graph
drawing, and VLSI design.
| [
{
"version": "v1",
"created": "Wed, 24 Dec 2003 06:59:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Duncan",
"Christian A.",
"",
"University of Miami"
],
[
"Eppstein",
"David",
"",
"University\n of California, Irvine"
],
[
"Kobourov",
"Stephen G.",
"",
"University of Arizona"
]
] |
cs/0312058 | Oren Glickman | Oren Glickman and Ido Dagan | Acquiring Lexical Paraphrases from a Single Corpus | null | null | null | null | cs.CL cs.AI cs.IR cs.LG | null | This paper studies the potential of identifying lexical paraphrases within a
single corpus, focusing on the extraction of verb paraphrases. Most previous
approaches detect individual paraphrase instances within a pair (or set) of
comparable corpora, each of them containing roughly the same information, and
rely on the substantial level of correspondence of such corpora. We present a
novel method that successfully detects isolated paraphrase instances within a
single corpus without relying on any a-priori structure and information. A
comparison suggests that an instance-based approach may be combined with a
vector based approach in order to assess better the paraphrase likelihood for
many verb pairs.
| [
{
"version": "v1",
"created": "Thu, 25 Dec 2003 16:45:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Glickman",
"Oren",
""
],
[
"Dagan",
"Ido",
""
]
] |
cs/0312059 | Maria Babikova | Pavel Babikov, Oleg Gontcharov, Maria Babikova | Polyhierarchical Classifications Induced by Criteria Polyhierarchies,
and Taxonomy Algebra | 11 pages; 1 figure; to be presented at the "Artificial Intelligence
and Applications 2004" conference | null | null | null | cs.AI cs.IR | null | A new approach to the construction of general persistent polyhierarchical
classifications is proposed. It is based on implicit description of category
polyhierarchy by a generating polyhierarchy of classification criteria.
Similarly to existing approaches, the classification categories are defined by
logical functions encoded by attributive expressions. However, the generating
hierarchy explicitly predefines domains of criteria applicability, and the
semantics of relations between categories is invariant to changes in the
universe composition, extending variety of criteria, and increasing their
cardinalities. The generating polyhierarchy is an independent, compact,
portable, and re-usable information structure serving as a template
classification. It can be associated with one or more particular sets of
objects, included in more general classifications as a standard component, or
used as a prototype for more comprehensive classifications. The approach
dramatically simplifies development and unplanned modifications of persistent
hierarchical classifications compared with tree, DAG, and faceted schemes. It
can be efficiently implemented in common DBMS, while considerably reducing
amount of computer resources required for storage, maintenance, and use of
complex polyhierarchies.
| [
{
"version": "v1",
"created": "Fri, 26 Dec 2003 05:30:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Babikov",
"Pavel",
""
],
[
"Gontcharov",
"Oleg",
""
],
[
"Babikova",
"Maria",
""
]
] |
cs/0401001 | Johan Bollen | Terry L. Harrison, Aravind Elango, Johan Bollen and Michael Nelson | Initial Experiences Re-Exporting Duplicate and Similarity Computation
with an OAI-PMH aggregator | 10 pages | null | null | null | cs.DL cs.DS | null | The proliferation of the Open Archive Initiative Protocol for Metadata
Harvesting (OAI-PMH) has resulted in the creation of a large number of service
providers, all harvesting from either data providers or aggregators. If data
were available regarding the similarity of metadata records, service providers
could track redundant records across harvests from multiple sources as well as
provide additional end-user services. Due to the large number of metadata
formats and the diverse mapping strategies employed by data providers,
similarity calculation requirements necessitate the use of information
retrieval strategies. We describe an OAI-PMH aggregator implementation that
uses the optional ``<about>'' container to re-export the results of similarity
calculations. Metadata records (3751) were harvested from a NASA data provider
and similarities for the records were computed. The results were useful for
detecting duplicates, similarities and metadata errors.
| [
{
"version": "v1",
"created": "Mon, 5 Jan 2004 05:41:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Harrison",
"Terry L.",
""
],
[
"Elango",
"Aravind",
""
],
[
"Bollen",
"Johan",
""
],
[
"Nelson",
"Michael",
""
]
] |
cs/0401002 | Joshua Brandon Holden | Joshua Holden | A Comparison of Cryptography Courses | 14 pages; to appear in Cryptologia | Cryptologia, 28 (2), 2004 | null | null | cs.CR cs.CY | null | The author taught two courses on cryptography, one at Duke University aimed
at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed
at mathematics and computer science majors. Both tried to incorporate technical
and societal aspects of cryptography, with varying emphases. This paper will
discuss the strengths and weaknesses of both courses and compare the
differences in the author's approach.
| [
{
"version": "v1",
"created": "Sat, 3 Jan 2004 20:11:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Holden",
"Joshua",
""
]
] |
cs/0401003 | Krzysztof C. Kiwiel | Krzysztof C. Kiwiel | Randomized selection with tripartitioning | 19 pages | null | null | PMMO-04-01 | cs.DS | null | We show that several versions of Floyd and Rivest's algorithm Select [Comm.\
ACM {\bf 18} (1975) 173] for finding the $k$th smallest of $n$ elements require
at most $n+\min\{k,n-k\}+o(n)$ comparisons on average, even when equal elements
occur. This parallels our recent analysis of another variant due to Floyd and
Rivest [Comm. ACM {\bf 18} (1975) 165--172]. Our computational results suggest
that both variants perform well in practice, and may compete with other
selection methods, such as Hoare's Find or quickselect with median-of-3 pivots.
| [
{
"version": "v1",
"created": "Sun, 4 Jan 2004 05:29:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiwiel",
"Krzysztof C.",
""
]
] |
cs/0401004 | Patrick C. McGuire | Patrick C. McGuire, J.A. Rodriguez-Manfredi, E. Sebastian-Martinez, J.
Gomez-Elvira, E. Diaz-Martinez, J. Ormo, K. Neuffer, A. Giaquinta, F.
Camps-Martinez, A. Lepinette-Malvitte, J. Perez-Mercader, H. Ritter, M.
Oesker, J. Ontrup, J. Walter | Cyborg Systems as Platforms for Computer-Vision Algorithm-Development
for Astrobiology | Updated biblio info | Proc. of the III European Workshop on Exo-Astrobiology, "Mars: The
Search for Life", Madrid, November 2003 (ESA SP-545, March 2004) pp.141-144 | null | null | cs.CV astro-ph cs.AI | null | Employing the allegorical imagery from the film "The Matrix", we motivate and
discuss our `Cyborg Astrobiologist' research program. In this research program,
we are using a wearable computer and video camcorder in order to test and train
a computer-vision system to be a field-geologist and field-astrobiologist.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2004 12:39:15 GMT"
},
{
"version": "v2",
"created": "Sun, 9 May 2004 18:27:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McGuire",
"Patrick C.",
""
],
[
"Rodriguez-Manfredi",
"J. A.",
""
],
[
"Sebastian-Martinez",
"E.",
""
],
[
"Gomez-Elvira",
"J.",
""
],
[
"Diaz-Martinez",
"E.",
""
],
[
"Ormo",
"J.",
""
],
[
"Neuffer",
"K.",
""
],
[
"Giaquinta",
"A.",
""
],
[
"Camps-Martinez",
"F.",
""
],
[
"Lepinette-Malvitte",
"A.",
""
],
[
"Perez-Mercader",
"J.",
""
],
[
"Ritter",
"H.",
""
],
[
"Oesker",
"M.",
""
],
[
"Ontrup",
"J.",
""
],
[
"Walter",
"J.",
""
]
] |
cs/0401005 | Victor Kromer | Kromer Victor | About Unitary Rating Score Constructing | 10 pages, 3 figures | null | null | null | cs.LG | null | It is offered to pool test points of different subjects and different aspects
of the same subject together in order to get the unitary rating score, by the
way of nonlinear transformation of indicator points in accordance with Zipf's
distribution. It is proposed to use the well-studied distribution of
Intellectuality Quotient IQ as the reference distribution for latent variable
"progress in studies".
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2004 07:50:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Victor",
"Kromer",
""
]
] |
cs/0401006 | Gianluca Argentini | Gianluca Argentini | Cluster computing performances using virtual processors and mathematical
software | 9 pages; 1 figure; keywords: cluster computing, virtual processors,
performances | null | null | null | cs.DC cs.MS | null | In this paper I describe some results on the use of virtual processors
technology for parallelize some SPMD computational programs in a cluster
environment. The tested technology is the INTEL Hyper Threading on real
processors, and the programs are MATLAB 6.5 Release 13 scripts for floating
points computation. By the use of this technology, I tested that a cluster can
run with benefit a number of concurrent processes double the amount of physical
processors. The conclusions of the work concern on the utility and limits of
the used approach. The main result is that using virtual processors is a good
technique for improving parallel programs not only for memory-based
computations, but in the case of massive disk-storage operations too.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2004 12:09:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0401007 | Manuel A. P\'erez-Qui\~nones | K. McDevitt, M. A. P\'erez-Qui\~nones, O. I. Padilla-Falto | Design of a Community-based Translation Center | null | null | null | null | cs.HC cs.DL | null | Interfaces that support multi-lingual content can reach a broader community.
We wish to extend the reach of CITIDEL, a digital library for computing
education materials, to support multiple languages. By doing so, we hope that
it will increase the number of users, and in turn the number of resources. This
paper discusses three approaches to translation (automated translation,
developer-based, and community-based), and a brief evaluation of these
approaches. It proposes a design for an online community translation center
where volunteers help translate interface components and educational materials
available in CITIDEL.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2004 18:45:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McDevitt",
"K.",
""
],
[
"Pérez-Quiñones",
"M. A.",
""
],
[
"Padilla-Falto",
"O. I.",
""
]
] |
cs/0401008 | Javier Segura | Amparo Gil, Javier Segura, Nico M. Temme | Algorithm xxx: Modified Bessel functions of imaginary order and positive
argument | 6 pages, 4 figures. To appear in ACM T. Math. Software | null | null | null | cs.MS cs.NA math.NA | null | Fortran 77 programs for the computation of modified Bessel functions of
purely imaginary order are presented. The codes compute the functions
$K_{ia}(x)$, $L_{ia}(x)$ and their derivatives for real $a$ and positive $x$;
these functions are independent solutions of the differential equation $x^2 w''
+x w' +(a^2 -x^2)w=0$. The code also computes exponentially scaled functions.
The range of computation is $(x,a)\in (0,1500]\times [-1500,1500]$ when scaled
functions are considered and it is larger than $(0,500]\times [-400,400]$ for
standard IEEE double precision arithmetic. The relative accuracy is better than
$10^{-13}$ in the range $(0,200]\times [-200,200]$ and close to $10^{-12}$ in
$(0,1500]\times [-1500,1500]$.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2004 14:29:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gil",
"Amparo",
""
],
[
"Segura",
"Javier",
""
],
[
"Temme",
"Nico M.",
""
]
] |
cs/0401009 | J. G. Wolff | J Gerard Wolff | Unifying Computing and Cognition: The SP Theory and its Applications | null | null | null | null | cs.AI | null | This book develops the conjecture that all kinds of information processing in
computers and in brains may usefully be understood as "information compression
by multiple alignment, unification and search". This "SP theory", which has
been under development since 1987, provides a unified view of such things as
the workings of a universal Turing machine, the nature of 'knowledge', the
interpretation and production of natural language, pattern recognition and
best-match information retrieval, several kinds of probabilistic reasoning,
planning and problem solving, unsupervised learning, and a range of concepts in
mathematics and logic. The theory also provides a basis for the design of an
'SP' computer with several potential advantages compared with traditional
digital computers.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2004 16:16:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolff",
"J Gerard",
""
]
] |
cs/0401010 | Nicolas Christin | Nicolas Christin and John Chuang | On the Cost of Participating in a Peer-to-Peer Network | 17 pages, 4 figures. Short version to be published in the Proceedings
of the Third International Workshop on Peer-to-Peer Systems (IPTPS'04). San
Diego, CA. February 2004 | null | null | p2pecon TR-2003-12-CC | cs.NI | null | In this paper, we model the cost incurred by each peer participating in a
peer-to-peer network. Such a cost model allows to gauge potential disincentives
for peers to collaborate, and provides a measure of the ``total cost'' of a
network, which is a possible benchmark to distinguish between proposals. We
characterize the cost imposed on a node as a function of the experienced load
and the node connectivity, and show how our model applies to a few proposed
routing geometries for distributed hash tables (DHTs). We further outline a
number of open questions this research has raised.
| [
{
"version": "v1",
"created": "Wed, 14 Jan 2004 02:32:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Christin",
"Nicolas",
""
],
[
"Chuang",
"John",
""
]
] |
cs/0401013 | Aniello Buonocore | Laura Bozzelli | Verification of Process Rewrite Systems in normal form | 53 pages, 1 figure | null | null | null | cs.OH | null | We consider the problem of model--checking for Process Rewrite Systems (PRSs)
in normal form. In a PRS in normal form every rewrite rule either only deals
with procedure calls and procedure termination, possibly with value return,
(this kind of rules allows to capture Pushdown Processes), or only deals with
dynamic activation of processes and synchronization (this kind of rules allows
to capture Petri Nets). The model-checking problem for PRSs and action-based
linear temporal logic (ALTL) is undecidable. However, decidability of
model--checking for PRSs and some interesting fragment of ALTL remains an open
question. In this paper we state decidability results concerning generalized
acceptance properties about infinite derivations (infinite term rewritings) in
PRSs in normal form. As a consequence, we obtain decidability of the
model-checking (restricted to infinite runs) for PRSs in normal form and a
meaningful fragment of ALTL.
| [
{
"version": "v1",
"created": "Fri, 16 Jan 2004 14:12:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bozzelli",
"Laura",
""
]
] |
cs/0401014 | Vadim Tropashko | Vadim Tropashko | Nested Intervals with Farey Fractions | 1 figure | null | null | null | cs.DB | null | Relational Databases are universally conceived as an advance over their
predecessors Network and Hierarchical models. Superior in every querying
respect, they turned out to be surprisingly incomplete when modeling transitive
dependencies. Almost every couple of months a question how to model a tree in
the database surfaces at comp.database.theory newsgroup. This article completes
a series of articles exploring Nested Intervals Model. Previous articles
introduced tree encoding with Binary Rational Numbers. However, binary encoding
grows exponentially, both in breadth and in depth. In this article, we'll
leverage Farey fractions in order to overcome this problem. We'll also
demonstrate that our implementation scales to a tree with 1M nodes.
| [
{
"version": "v1",
"created": "Sun, 18 Jan 2004 03:09:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tropashko",
"Vadim",
""
]
] |
cs/0401015 | Loreto Bravo | Leopoldo Bertossi and Loreto Bravo | Query Answering in Peer-to-Peer Data Exchange Systems | 14 pages | null | null | null | cs.DB cs.LO | null | The problem of answering queries posed to a peer who is a member of a
peer-to-peer data exchange system is studied. The answers have to be consistent
wrt to both the local semantic constraints and the data exchange constraints
with other peers; and must also respect certain trust relationships between
peers. A semantics for peer consistent answers under exchange constraints and
trust relationships is introduced and some techniques for obtaining those
answers are presented.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2004 19:26:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bertossi",
"Leopoldo",
""
],
[
"Bravo",
"Loreto",
""
]
] |
cs/0401016 | Francesco Ranzato | Francesco Ranzato and Francesco Tapparo | Generalized Strong Preservation by Abstract Interpretation | null | null | null | null | cs.LO cs.PL | null | Standard abstract model checking relies on abstract Kripke structures which
approximate concrete models by gluing together indistinguishable states, namely
by a partition of the concrete state space. Strong preservation for a
specification language L encodes the equivalence of concrete and abstract model
checking of formulas in L. We show how abstract interpretation can be used to
design abstract models that are more general than abstract Kripke structures.
Accordingly, strong preservation is generalized to abstract
interpretation-based models and precisely related to the concept of
completeness in abstract interpretation. The problem of minimally refining an
abstract model in order to make it strongly preserving for some language L can
be formulated as a minimal domain refinement in abstract interpretation in
order to get completeness w.r.t. the logical/temporal operators of L. It turns
out that this refined strongly preserving abstract model always exists and can
be characterized as a greatest fixed point. As a consequence, some well-known
behavioural equivalences, like bisimulation, simulation and stuttering, and
their corresponding partition refinement algorithms can be elegantly
characterized in abstract interpretation as completeness properties and
refinements.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2004 14:28:32 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Dec 2004 11:33:35 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Mar 2006 09:07:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ranzato",
"Francesco",
""
],
[
"Tapparo",
"Francesco",
""
]
] |
cs/0401018 | Irina Golycheva | E.I. Bolotin, G.Sh. Tsitsiashvili, I.V. Golycheva | Factor Temporal Prognosis of Tick-Borne Encephalitis Foci Functioning on
the South of Russian Far East | 4 pages | null | null | null | cs.CV | null | A method of temporal factor prognosis of TE (tick-borne encephalitis)
infection has been developed. The high precision of the prognosis results for a
number of geographical regions of Primorsky Krai has been achieved. The method
can be applied not only to epidemiological research but also to others.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2004 05:53:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bolotin",
"E. I.",
""
],
[
"Tsitsiashvili",
"G. Sh.",
""
],
[
"Golycheva",
"I. V.",
""
]
] |
cs/0401019 | Tien D. Kieu | Toby Ord and Tien D. Kieu | Using biased coins as oracles | 11 pages | null | null | null | cs.OH quant-ph | null | While it is well known that a Turing machine equipped with the ability to
flip a fair coin cannot compute more that a standard Turing machine, we show
that this is not true for a biased coin. Indeed, any oracle set $X$ may be
coded as a probability $p_{X}$ such that if a Turing machine is given a coin
which lands heads with probability $p_{X}$ it can compute any function
recursive in $X$ with arbitrarily high probability. We also show how the
assumption of a non-recursive bias can be weakened by using a sequence of
increasingly accurate recursive biases or by choosing the bias at random from a
distribution with a non-recursive mean. We conclude by briefly mentioning some
implications regarding the physical realisability of such methods.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2004 06:40:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ord",
"Toby",
""
],
[
"Kieu",
"Tien D.",
""
]
] |
cs/0401021 | Roberto Bagnara | Patricia M. Hill, Enea Zaffanella, Roberto Bagnara | A correct, precise and efficient integration of set-sharing, freeness
and linearity for the analysis of finite and rational tree languages | 35 pages, 1 table, to appear on "Theory and Practice of Logic
Programming" | null | null | null | cs.PL | null | It is well-known that freeness and linearity information positively interact
with aliasing information, allowing both the precision and the efficiency of
the sharing analysis of logic programs to be improved. In this paper we present
a novel combination of set-sharing with freeness and linearity information,
which is characterized by an improved abstract unification operator. We provide
a new abstraction function and prove the correctness of the analysis for both
the finite tree and the rational tree cases. Moreover, we show that the same
notion of redundant information as identified in (Bagnara et al. 2002;
Zaffanella et al. 2002) also applies to this abstract domain combination: this
allows for the implementation of an abstract unification operator running in
polynomial time and achieving the same precision on all the considered
observable properties.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2004 10:14:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hill",
"Patricia M.",
""
],
[
"Zaffanella",
"Enea",
""
],
[
"Bagnara",
"Roberto",
""
]
] |
cs/0401022 | Roberto Bagnara | Roberto Bagnara, Enea Zaffanella, Patricia M. Hill | Enhanced sharing analysis techniques: a comprehensive evaluation | 43 pages, 10 tables, to appear on "Theory and Practice of Logic
Programming" | null | null | null | cs.PL | null | Sharing, an abstract domain developed by D. Jacobs and A. Langen for the
analysis of logic programs, derives useful aliasing information. It is
well-known that a commonly used core of techniques, such as the integration of
Sharing with freeness and linearity information, can significantly improve the
precision of the analysis. However, a number of other proposals for refined
domain combinations have been circulating for years. One feature that is common
to these proposals is that they do not seem to have undergone a thorough
experimental evaluation even with respect to the expected precision gains. In
this paper we experimentally evaluate: helping Sharing with the definitely
ground variables found using Pos, the domain of positive Boolean formulas; the
incorporation of explicit structural information; a full implementation of the
reduced product of Sharing and Pos; the issue of reordering the bindings in the
computation of the abstract mgu; an original proposal for the addition of a new
mode recording the set of variables that are deemed to be ground or free; a
refined way of using linearity to improve the analysis; the recovery of hidden
information in the combination of Sharing with freeness information. Finally,
we discuss the issue of whether tracking compoundness allows the computation of
more sharing information.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2004 10:35:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Zaffanella",
"Enea",
""
],
[
"Hill",
"Patricia M.",
""
]
] |
cs/0401023 | Emil Saucan | Emil Saucan | Surface Triangulation -- The Metric Approach | 29 pages, 13 figures Preliminary version | null | null | null | cs.GR cs.CG math.MG | null | We embark in a program of studying the problem of better approximating
surfaces by triangulations(triangular meshes) by considering the approximating
triangulations as finite metric spaces and the target smooth surface as their
Haussdorff-Gromov limit. This allows us to define in a more natural way the
relevant elements, constants and invariants s.a. principal directions and
principal values, Gaussian and Mean curvature, etc. By a "natural way" we mean
an intrinsic, discrete, metric definitions as opposed to approximating or
paraphrasing the differentiable notions. In this way we hope to circumvent
computational errors and, indeed, conceptual ones, that are often inherent to
the classical, "numerical" approach. In this first study we consider the
problem of determining the Gaussian curvature of a polyhedral surface, by using
the {\em embedding curvature} in the sense of Wald (and Menger). We present two
modalities of employing these definitions for the computation of Gaussian
curvature.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2004 21:51:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Saucan",
"Emil",
""
]
] |
cs/0401024 | Russell K. Standish | Duraid Madina and Russell K. Standish | A system for reflection in C++ | null | Proceedings AUUG 2001: Always on and Everywhere, 207. ISBN
0957753225 | null | null | cs.PL | null | Object-oriented programming languages such as Java and Objective C have
become popular for implementing agent-based and other object-based simulations
since objects in those languages can {\em reflect} (i.e. make runtime queries
of an object's structure). This allows, for example, a fairly trivial {\em
serialisation} routine (conversion of an object into a binary representation
that can be stored or passed over a network) to be written. However C++ does
not offer this ability, as type information is thrown away at compile time. Yet
C++ is often a preferred development environment, whether for performance
reasons or for its expressive features such as operator overloading.
In this paper, we present the {\em Classdesc} system which brings many of the
benefits of object reflection to C++.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2004 03:29:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Madina",
"Duraid",
""
],
[
"Standish",
"Russell K.",
""
]
] |
cs/0401025 | Russell K. Standish | Richard Leow and Russell K. Standish | Running C++ models undet the Swarm environment | null | Proceedings SwarmFest 2003 | null | null | cs.MA | null | Objective-C is still the language of choice if users want to run their
simulation efficiently under the Swarm environment since the Swarm environment
itself was written in Objective-C. The language is a fast, object-oriented and
easy to learn. However, the language is less well known than, less expressive
than, and lacks support for many important features of C++ (eg. OpenMP for high
performance computing application). In this paper, we present a methodology and
software tools that we have developed for auto generating an Objective-C object
template (and all the necessary interfacing functions) from a given C++ model,
utilising the Classdesc's object description technology, so that the C++ model
can both be run and accessed under the Objective-C and C++ environments. We
also present a methodology for modifying an existing Swarm application to make
part of the model (eg. the heatbug's step method) run under the C++
environment.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2004 03:42:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leow",
"Richard",
""
],
[
"Standish",
"Russell K.",
""
]
] |
cs/0401026 | Russell K. Standish | Russell K. Standish and Richard Leow | EcoLab: Agent Based Modeling for C++ programmers | null | Proceedings SwarmFest 2003 | null | null | cs.MA | null | \EcoLab{} is an agent based modeling system for C++ programmers, strongly
influenced by the design of Swarm. This paper is just a brief outline of
\EcoLab's features, more details can be found in other published articles,
documentation and source code from the \EcoLab{} website.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2004 03:46:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Standish",
"Russell K.",
""
],
[
"Leow",
"Richard",
""
]
] |
cs/0401027 | Russell K. Standish | Russell K. Standish and Duraid Madina | ClassdescMP: Easy MPI programming in C++ | null | Computational Science, Sloot et al. (eds), Lecture Notes in
Computer Science 2660, Springer, 896. (2003) | null | null | cs.DC | null | ClassdescMP is a distributed memory parallel programming system for use with
C++ and MPI. It uses the Classdesc reflection system to ease the task of
building complicated messages to be sent between processes. It doesn't hide the
underlying MPI API, so it is an augmentation of MPI capabilities. Users can
still call standard MPI function calls if needed for performance reasons.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2004 03:55:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Standish",
"Russell K.",
""
],
[
"Madina",
"Duraid",
""
]
] |
cs/0401028 | Markus Demleitner | Markus Demleitner, Michael Kurtz, Alberto Accomazzi, G\"unther
Eichhorn, Carolyn S. Grant, Steven S. Murray | Automated Resolution of Noisy Bibliographic References | 10 pages, 1 figure; accepted for publication in the proceedings of
the 2004 Meeting of the International Federation of Classification Societies | null | null | null | cs.DL | null | We describe a system used by the NASA Astrophysics Data System to identify
bibliographic references obtained from scanned article pages by OCR methods
with records in a bibliographic database. We analyze the process generating the
noisy references and conclude that the three-step procedure of correcting the
OCR results, parsing the corrected string and matching it against the database
provides unsatisfactory results. Instead, we propose a method that allows a
controlled merging of correction, parsing and matching, inspired by dependency
grammars. We also report on the effectiveness of various heuristics that we
have employed to improve recall.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2004 10:09:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demleitner",
"Markus",
""
],
[
"Kurtz",
"Michael",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Eichhorn",
"Günther",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Murray",
"Steven S.",
""
]
] |
cs/0401029 | Johan Bollen | Aravind Elango and Johan Bollen and Michael L. Nelson | Dynamic Linking of Smart Digital Objects Based on User Navigation
Patterns | pages: 12 | null | null | null | cs.DL | null | We discuss a methodology to dynamically generate links among digital objects
by means of an unsupervised learning mechanism which analyzes user link
traversal patterns. We performed an experiment with a test bed of 150 complex
data objects, referred to as buckets. Each bucket manages its own content,
provides methods to interact with users and individually maintains a set of
links to other buckets. We demonstrate that buckets were capable of dynamically
adjusting their links to other buckets according to user link selections,
thereby generating a meaningful network of bucket relations. Our results
indicate such adaptive networks of linked buckets approximate the collective
link preferences of a community of user
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2004 00:45:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Elango",
"Aravind",
""
],
[
"Bollen",
"Johan",
""
],
[
"Nelson",
"Michael L.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.