id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0402001
Robert G. Capra III
Robert G. Capra, Manuel A. Perez-Quinones
Mobile Re-Finding of Web Information Using a Voice Interface
null
null
null
null
cs.HC cs.IR
null
Mobile access to information is a considerable problem for many users, especially to information found on the Web. In this paper, we explore how a voice-controlled service, accessible by telephone, could support mobile users' needs for refinding specific information previously found on the Web. We outline challenges in creating such a service and describe architectural and user interfaces issues discovered in an exploratory prototype we built called WebContext. We also present the results of a study, motivated by our experience with WebContext, to explore what people remember about information that they are trying to refind and how they express information refinding requests in a collaborative conversation. As part of the study, we examine how end-usercreated Web page annotations can be used to help support mobile information re-finding. We observed the use of URLs, page titles, and descriptions of page contents to help identify waypoints in the search process. Furthermore, we observed that the annotations were utilized extensively, indicating that explicitly added context by the user can play an important role in re-finding.
[ { "version": "v1", "created": "Sat, 31 Jan 2004 20:09:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Capra", "Robert G.", "" ], [ "Perez-Quinones", "Manuel A.", "" ] ]
cs/0402002
Ofer Strichman
Ofer Strichman
Deciding Disjunctive Linear Arithmetic with SAT
null
null
null
null
cs.LO
null
Disjunctive Linear Arithmetic (DLA) is a major decidable theory that is supported by almost all existing theorem provers. The theory consists of Boolean combinations of predicates of the form $\Sigma_{j=1}^{n}a_j\cdot x_j \le b$, where the coefficients $a_j$, the bound $b$ and the variables $x_1 >... x_n$ are of type Real ($\mathbb{R}$). We show a reduction to propositional logic from disjunctive linear arithmetic based on Fourier-Motzkin elimination. While the complexity of this procedure is not better than competing techniques, it has practical advantages in solving verification problems. It also promotes the option of deciding a combination of theories by reducing them to this logic. Results from experiments show that this method has a strong advantage over existing techniques when there are many disjunctions in the formula.
[ { "version": "v1", "created": "Sun, 1 Feb 2004 12:42:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Strichman", "Ofer", "" ] ]
cs/0402004
Shujun Li Dr.
Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou and Yuanlong Cai
Baptista-type chaotic cryptosystems: Problems and countermeasures
13 pages, 2 figures
Physics Letters A, 332(5-6):368-375, 2004
10.1016/j.physleta.2004.09.028
null
cs.CR nlin.CD
null
In 1998, M. S. Baptista proposed a chaotic cryptosystem, which has attracted much attention from the chaotic cryptography community: some of its modifications and also attacks have been reported in recent years. In [Phys. Lett. A 307 (2003) 22], we suggested a method to enhance the security of Baptista-type cryptosystem, which can successfully resist all proposed attacks. However, the enhanced Baptista-type cryptosystem has a nontrivial defect, which produces errors in the decrypted data with a generally small but nonzero probability, and the consequent error propagation exists. In this Letter, we analyze this defect and discuss how to rectify it. In addition, we point out some newly-found problems existing in all Baptista-type cryptosystems and consequently propose corresponding countermeasures.
[ { "version": "v1", "created": "Mon, 2 Feb 2004 10:39:12 GMT" }, { "version": "v2", "created": "Wed, 3 Nov 2004 05:41:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Shujun", "" ], [ "Chen", "Guanrong", "" ], [ "Wong", "Kwok-Wo", "" ], [ "Mou", "Xuanqin", "" ], [ "Cai", "Yuanlong", "" ] ]
cs/0402005
Krzysztof C. Kiwiel
Krzysztof C. Kiwiel
Improved randomized selection
14 pages
null
null
PMMO-04-02
cs.DS
null
We show that several versions of Floyd and Rivest's improved algorithm Select for finding the $k$th smallest of $n$ elements require at most $n+\min\{k,n-k\}+O(n^{1/2}\ln^{1/2}n)$ comparisons on average and with high probability. This rectifies the analysis of Floyd and Rivest, and extends it to the case of nondistinct elements. Encouraging computational results on large median-finding problems are reported.
[ { "version": "v1", "created": "Mon, 2 Feb 2004 14:16:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiwiel", "Krzysztof C.", "" ] ]
cs/0402006
Richard McClatchey
S. Roberto Amendolia, Michael Brady, Richard McClatchey, Miguel Mulet-Parada, Mohammed Odeh & Tony Solomonides
MammoGrid: Large-Scale Distributed Mammogram Analysis
6 Pages, Presented at Medical Informatics Europe MIE'2003. ST Malo, France May 2003
null
null
null
cs.SE
null
Breast cancer as a medical condition and mammograms as images exhibit many dimensions of variability across the population. Similarly, the way diagnostic systems are used and maintained by clinicians varies between imaging centres and breast screening programmes, and so does the appearance of the mammograms generated. A distributed database that reflects the spread of pathologies across the population is an invaluable tool for the epidemiologist and the understanding of the variation in image acquisition protocols is essential to a radiologist in a screening programme. Exploiting emerging grid technology, the aim of the MammoGrid [1] project is to develop a Europe-wide database of mammograms that will be used to investigate a set of important healthcare applications and to explore the potential of the grid to support effective co-working between healthcare professionals.
[ { "version": "v1", "created": "Mon, 2 Feb 2004 19:34:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Amendolia", "S. Roberto", "" ], [ "Brady", "Michael", "" ], [ "McClatchey", "Richard", "" ], [ "Mulet-Parada", "Miguel", "" ], [ "Odeh", "Mohammed", "" ], [ "Solomonides", "Tony", "" ] ]
cs/0402009
Richard McClatchey
F Estrella, C del Frate, T Hauer, R McClatchey, M Odeh, D Rogulin, S R Amendolia, D Schottlander, T Solomonides, R Warren
Resolving Clinicians Queries Across a Grids Infrastructure
8 pages, 3 figures. Presented at the 2nd Int Conf on HealthGrids Clermont-Ferrand, France January 2004 and accepted by Methods of Information in Medicine
null
null
null
cs.DB cs.SE
null
The past decade has witnessed order of magnitude increases in computing power, data storage capacity and network speed, giving birth to applications which may handle large data volumes of increased complexity, distributed over the Internet. Grids computing promises to resolve many of the difficulties in facilitating medical image analysis to allow radiologists to collaborate without having to co-locate. The EU-funded MammoGrid project aims to investigate the feasibility of developing a Grid-enabled European database of mammograms and provide an information infrastructure which federates multiple mammogram databases. This will enable clinicians to develop new common, collaborative and co-operative approaches to the analysis of mammographic data. This paper focuses on one of the key requirements for large-scale distributed mammogram analysis: resolving queries across a grid-connected federation of images.
[ { "version": "v1", "created": "Tue, 3 Feb 2004 14:32:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Estrella", "F", "" ], [ "del Frate", "C", "" ], [ "Hauer", "T", "" ], [ "McClatchey", "R", "" ], [ "Odeh", "M", "" ], [ "Rogulin", "D", "" ], [ "Amendolia", "S R", "" ], [ "Schottlander", "D", "" ], [ "Solomonides", "T", "" ], [ "Warren", "R", "" ] ]
cs/0402010
Judith Beumer
Olga Shumsky Matlin and William McCune
Encapsulation for Practical Simplification Procedures
6 pages
null
null
Preprint ANL/MCS-P1039-0403
cs.LO
null
ACL2 was used to prove properties of two simplification procedures. The procedures differ in complexity but solve the same programming problem that arises in the context of a resolution/paramodulation theorem proving system. Term rewriting is at the core of the two procedures, but details of the rewriting procedure itself are irrelevant. The ACL2 encapsulate construct was used to assert the existence of the rewriting function and to state some of its properties. Termination, irreducibility, and soundness properties were established for each procedure. The availability of the encapsulation mechanism in ACL2 is considered essential to rapid and efficient verification of this kind of algorithm.
[ { "version": "v1", "created": "Tue, 3 Feb 2004 19:04:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Matlin", "Olga Shumsky", "" ], [ "McCune", "William", "" ] ]
cs/0402012
Joseph Y. Halpern
Joseph Y. Halpern and Aleta Ricciardi
A Knowledge-Theoretic Analysis of Uniform Distributed Coordination and Failure Detectors
A preliminary version of this paper appeared in the 18th ACM Symposium on Principles of Distributed Computing, 1999, pp. 73-82. This version will appear in Distributed Computing
null
null
null
cs.DC
null
It is shown that, in a precise sense, if there is no bound on the number of faulty processes in a system with unreliable but fair communication, Uniform Distributed Coordination (UDC) can be attained if and only if a system has perfect failure detectors. This result is generalized to the case where there is a bound t on the number of faulty processes. It is shown that a certain type of generalized failure detector is necessary and sufficient for achieving UDC in a context with at most t faulty processes. Reasoning about processes' knowledge as to which other processes are faulty plays a key role in the analysis.
[ { "version": "v1", "created": "Thu, 5 Feb 2004 17:15:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Ricciardi", "Aleta", "" ] ]
cs/0402013
Pascal Hitzler
Pascal Hitzler
Corollaries on the fixpoint completion: studying the stable semantics by means of the Clark completion
15 pages. Presented at the 18th Workshop on Logic Programming, Potsdam, Germany, March 2004
null
null
null
cs.AI cs.LO
null
The fixpoint completion fix(P) of a normal logic program P is a program transformation such that the stable models of P are exactly the models of the Clark completion of fix(P). This is well-known and was studied by Dung and Kanchanasut (1989). The correspondence, however, goes much further: The Gelfond-Lifschitz operator of P coincides with the immediate consequence operator of fix(P), as shown by Wendt (2002), and even carries over to standard operators used for characterizing the well-founded and the Kripke-Kleene semantics. We will apply this knowledge to the study of the stable semantics, and this will allow us to almost effortlessly derive new results concerning fixed-point and metric-based semantics, and neural-symbolic integration.
[ { "version": "v1", "created": "Mon, 9 Feb 2004 11:03:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Hitzler", "Pascal", "" ] ]
cs/0402015
Ramon Asensio
Ramon Asensio Monge, Francisco Sanchis Marco, Fernando Torre Cervigon, Victor Garcia Garcia, Gustavo Uria Paino
A Preliminary Study for the development of an Early Method for the Measurement in Function Points of a Software Product
6 pages, 3 figures
null
null
null
cs.SE
null
The Function Points Analysis (FPA) of A.J. Albrecht is a method to determine the functional size of software products. The International Function Point Users Group, (IFPUG), establishes the FPA like a standard in the software functional size measurement. The IFPUG [3] [4] method follows the Albrecht's method and incorporates in its succesive versions modifications to the rules and hints with the intention of improving it [7]. The required documentation level to apply the method is the functional specification which corresponds to level I in the Rudolph's clasification [8]. This documentation is avalaible with some difficulty for those companies which are dedicated to develop software for third parties when they have to prepare the appropiate budget for this development. Then, we face the need of developing an early method [6] [9] for measuring the functional size of a software product that we will name to abbreviate it Early Method or EFPM (Early Function Point Method). The required documentation to apply the EFPM would be the User Requirements or some analogous documentations. This is a part of a research work now in process in Oviedo University. In this article we only show the following, results: From the measurements of a set of projects using the IFPUG method v. 4.1 we obtain the linear correlation coefficients between the total number of Function Points for each project and the counters of the ILFs number, ILFs+EIFs number and EIs+EOs+EQs number. Using the preliminary results we compute the regression functions. This results we will allow us to determine the factors to be considered in the development of EFPM and to estimate the function points.
[ { "version": "v1", "created": "Mon, 9 Feb 2004 12:43:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Monge", "Ramon Asensio", "" ], [ "Marco", "Francisco Sanchis", "" ], [ "Cervigon", "Fernando Torre", "" ], [ "Garcia", "Victor Garcia", "" ], [ "Paino", "Gustavo Uria", "" ] ]
cs/0402017
Rajkumar Buyya
Akshay Luther, Rajkumar Buyya, Rajiv Ranjan, and Srikumar Venugopal
Alchemi: A .NET-based Grid Computing Framework and its Integration into Global Grids
17 pages, 12 figures, 2 tables
Technical Report, GRIDS-TR-2003-8, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, December 2003
null
GRIDS-TR-2003-8
cs.DC
null
Computational grids that couple geographically distributed resources are becoming the de-facto computing platform for solving large-scale problems in science, engineering, and commerce. Software to enable grid computing has been primarily written for Unix-class operating systems, thus severely limiting the ability to effectively utilize the computing resources of the vast majority of desktop computers i.e. those running variants of the Microsoft Windows operating system. Addressing Windows-based grid computing is particularly important from the software industry's viewpoint where interest in grids is emerging rapidly. Microsoft's .NET Framework has become near-ubiquitous for implementing commercial distributed systems for Windows-based platforms, positioning it as the ideal platform for grid computing in this context. In this paper we present Alchemi, a .NET-based grid computing framework that provides the runtime machinery and programming environment required to construct desktop grids and develop grid applications. It allows flexible application composition by supporting an object-oriented grid application programming model in addition to a grid job model. Cross-platform support is provided via a web services interface and a flexible execution model supports dedicated and non-dedicated (voluntary) execution by grid nodes.
[ { "version": "v1", "created": "Tue, 10 Feb 2004 09:18:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Luther", "Akshay", "" ], [ "Buyya", "Rajkumar", "" ], [ "Ranjan", "Rajiv", "" ], [ "Venugopal", "Srikumar", "" ] ]
cs/0402018
Rajkumar Buyya
Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya
P2P Networks for Content Sharing
35 pages, 26 figures
Technical Report, GRIDS-TR-2003-7, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, December 2003
null
GRIDS-TR-2003-7
cs.DC
null
Peer-to-peer (P2P) technologies have been widely used for content sharing, popularly called "file-swapping" networks. This chapter gives a broad overview of content sharing P2P technologies. It starts with the fundamental concept of P2P computing followed by the analysis of network topologies used in peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster, Gnutella, and Fasttrack are explored in details, and they are finally concluded with the comparison table in the last section.
[ { "version": "v1", "created": "Tue, 10 Feb 2004 14:24:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "Choon Hoong", "" ], [ "Nutanong", "Sarana", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0402019
Thom Fruehwirth
Thom Fruehwirth and Slim Abdennadher
The Munich Rent Advisor: A Success for Logic Programming on the Internet
null
null
null
null
cs.AI cs.DS
null
Most cities in Germany regularly publish a booklet called the {\em Mietspiegel}. It basically contains a verbal description of an expert system. It allows the calculation of the estimated fair rent for a flat. By hand, one may need a weekend to do so. With our computerized version, the {\em Munich Rent Advisor}, the user just fills in a form in a few minutes and the rent is calculated immediately. We also extended the functionality and applicability of the {\em Mietspiegel} so that the user need not answer all questions on the form. The key to computing with partial information using high-level programming was to use constraint logic programming. We rely on the internet, and more specifically the World Wide Web, to provide this service to a broad user group. More than ten thousand people have used our service in the last three years. This article describes the experiences in implementing and using the {\em Munich Rent Advisor}. Our results suggests that logic programming with constraints can be an important ingredient in intelligent internet systems.
[ { "version": "v1", "created": "Tue, 10 Feb 2004 15:10:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Fruehwirth", "Thom", "" ], [ "Abdennadher", "Slim", "" ] ]
cs/0402020
Tin Kam Ho
Tin Kam Ho
Geometrical Complexity of Classification Problems
Proceedings of the 7th Course on Ensemble Methods for Learning Machines at the International School on Neural Nets ``E.R. Caianiello''
null
null
null
cs.CV
null
Despite encouraging recent progresses in ensemble approaches, classification methods seem to have reached a plateau in development. Further advances depend on a better understanding of geometrical and topological characteristics of point sets in high-dimensional spaces, the preservation of such characteristics under feature transformations and sampling processes, and their interaction with geometrical models used in classifiers. We discuss an attempt to measure such properties from data sets and relate them to classifier accuracies.
[ { "version": "v1", "created": "Wed, 11 Feb 2004 16:34:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Ho", "Tin Kam", "" ] ]
cs/0402021
Tin Kam Ho
Tin Kam Ho
A Numerical Example on the Principles of Stochastic Discrimination
Proceedings of the 7th Course on Ensemble Methods for Learning Machines at the International School on Neural Nets ``E.R. Caianiello''
null
null
null
cs.CV cs.LG
null
Studies on ensemble methods for classification suffer from the difficulty of modeling the complementary strengths of the components. Kleinberg's theory of stochastic discrimination (SD) addresses this rigorously via mathematical notions of enrichment, uniformity, and projectability of an ensemble. We explain these concepts via a very simple numerical example that captures the basic principles of the SD theory and method. We focus on a fundamental symmetry in point set covering that is the key observation leading to the foundation of the theory. We believe a better understanding of the SD method will lead to developments of better tools for analyzing other ensemble methods.
[ { "version": "v1", "created": "Wed, 11 Feb 2004 15:45:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Ho", "Tin Kam", "" ] ]
cs/0402022
Saverio Perugini
Saverio Perugini, Naren Ramakrishnan, and Edward A. Fox
Automatically Generating Interfaces for Personalized Interaction with Digital Libraries
Communicated as a short paper to the Fourth ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'04), Tuscon, AZ, June 2004; 2 pages, 1 figure
null
null
null
cs.DL cs.HC
null
We present an approach to automatically generate interfaces supporting personalized interaction with digital libraries; these interfaces augment the user-DL dialog by empowering the user to (optionally) supply out-of-turn information during an interaction, flatten or restructure the dialog, and enquire about dialog options. Interfaces generated using this approach for CITIDEL are described.
[ { "version": "v1", "created": "Thu, 12 Feb 2004 03:00:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Perugini", "Saverio", "" ], [ "Ramakrishnan", "Naren", "" ], [ "Fox", "Edward A.", "" ] ]
cs/0402023
Richard McClatchey
Florida Estrella, Richard McClatchey, Dmitry Rogulina, Roberto Amendolia, Tony Solomonides
A Service-Based Approach for Managing Mammography Data
5 pages, 7 figures. Accepted by the 11th World Congress on Medical Informatics (MedInfo'04). San Francisco, USA. September 2004
null
null
null
cs.DB cs.SE
null
Grid-based technologies are emerging as a potential open-source standards-based solution for managing and collabo-rating distributed resources. In view of these new computing solutions, the Mammogrid project is developing a service-based and Grid-aware application which manages a Euro-pean-wide database of mammograms. Medical conditions such as breast cancer, and mammograms as images, are ex-tremely complex with many dimensions of variability across the population. An effective solution for the management of disparate mammogram data sources is a federation of autonomous multi-centre sites which transcends national boundaries. The Mammogrid solution utilizes the Grid tech-nologies to integrate geographically distributed data sets. The Mammogrid application will explore the potential of the Grid to support effective co-working among radiologists through-out the EU. This paper outlines the Mammogrid service-based approach in managing a federation of grid-connected mam-mography databases.
[ { "version": "v1", "created": "Thu, 12 Feb 2004 15:00:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Estrella", "Florida", "" ], [ "McClatchey", "Richard", "" ], [ "Rogulina", "Dmitry", "" ], [ "Amendolia", "Roberto", "" ], [ "Solomonides", "Tony", "" ] ]
cs/0402024
Richard McClatchey
Florida Estrella, Zsolt Kovacs, Jean-Marie Le Goff, Richard McClatchey, Tony Solomonides & Norbert Toth
Pattern Reification as the Basis for Description-Driven Systems
20 pages, 10 figures
Journal of Software and System Modeling Vol 2 No 2, pp 108-119 Springer-Verlag, ISSN: 1619-1366, 2003
null
null
cs.DB cs.SE
null
One of the main factors driving object-oriented software development for information systems is the requirement for systems to be tolerant to change. To address this issue in designing systems, this paper proposes a pattern-based, object-oriented, description-driven system (DDS) architecture as an extension to the standard UML four-layer meta-model. A DDS architecture is proposed in which aspects of both static and dynamic systems behavior can be captured via descriptive models and meta-models. The proposed architecture embodies four main elements - firstly, the adoption of a multi-layered meta-modeling architecture and reflective meta-level architecture, secondly the identification of four data modeling relationships that can be made explicit such that they can be modified dynamically, thirdly the identification of five design patterns which have emerged from practice and have proved essential in providing reusable building blocks for data management, and fourthly the encoding of the structural properties of the five design patterns by means of one fundamental pattern, the Graph pattern. A practical example of this philosophy, the CRISTAL project, is used to demonstrate the use of description-driven data objects to handle system evolution.
[ { "version": "v1", "created": "Thu, 12 Feb 2004 14:25:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Estrella", "Florida", "" ], [ "Kovacs", "Zsolt", "" ], [ "Goff", "Jean-Marie Le", "" ], [ "McClatchey", "Richard", "" ], [ "Solomonides", "Tony", "" ], [ "Toth", "Norbert", "" ] ]
cs/0402026
Shi Zhou
Shi Zhou and Raul J. Mondragon
Redundancy and Robustness of the AS-level Internet topology and its models
null
IEE Electronic Letters, vol. 40, no. 2, pp. 151-15. on 22 January 2004
10.1049/el:20040078
null
cs.NI
null
A comparison between the topological properties of the measured Internet topology, at the autonomous system level (AS graph), and the equivalent graphs generated by two different power law topology generators is presented. Only one of the synthetic generators reproduces the tier connectivity of the AS graph.
[ { "version": "v1", "created": "Thu, 12 Feb 2004 19:09:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Shi", "" ], [ "Mondragon", "Raul J.", "" ] ]
cs/0402027
Judith Beumer
Weikuan Yu, Darius Buntinas, Rich L. Graham, and Dhabaleswar K. Panda
Efficient and Scalable Barrier over Quadrics and Myrinet with a New NIC-Based Collective Message Passing Protocol
8 pages, 8 figures
null
null
Preprint ANL/MCS-P1121-0204
cs.DC cs.AR
null
Modern interconnects often have programmable processors in the network interface that can be utilized to offload communication processing from host CPU. In this paper, we explore different schemes to support collective operations at the network interface and propose a new collective protocol. With barrier as an initial case study, we have demontrated that much of the communication processing can be greatly simplified with this collective protocol. Accordingly, %with our proposed collective processing scheme, we have designed and implemented efficient and scalable NIC-based barrier operations over two high performance interconnects, Quadrics and Myrinet. Our evaluation shows that, over a Quadrics cluster of 8 nodes with ELan3 Network, the NIC-based barrier operation achieves a barrier latency of only 5.60$\mu$s. This result is a 2.48 factor of improvement over the Elanlib tree-based barrier operation. Over a Myrinet cluster of 8 nodes with LANai-XP NIC cards, a barrier latency of 14.20$\mu$s over 8 nodes is achieved. This is a 2.64 factor of improvement over the host-based barrier algorithm. Furthermore, an analytical model developed for the proposed scheme indicates that a NIC-based barrier operation on a 1024-node cluster can be performed with only 22.13$\mu$s latency over Quadrics and with 38.94$\mu$s latency over Myrinet. These results indicate the potential for developing high performance communication subsystems for next generation clusters.
[ { "version": "v1", "created": "Thu, 12 Feb 2004 20:37:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Yu", "Weikuan", "" ], [ "Buntinas", "Darius", "" ], [ "Graham", "Rich L.", "" ], [ "Panda", "Dhabaleswar K.", "" ] ]
cs/0402028
David Eppstein
David Eppstein
The lattice dimension of a graph
6 pages, 3 figures
Eur. J. Combinatorics 26(6):585-592, 2005
10.1016/j.ejc.2004.05.001
null
cs.DS math.CO
null
We describe a polynomial time algorithm for, given an undirected graph G, finding the minimum dimension d such that G may be isometrically embedded into the d-dimensional integer lattice Z^d.
[ { "version": "v1", "created": "Fri, 13 Feb 2004 05:23:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
cs/0402031
Martin Pelikan
Martin Pelikan and Tz-Kai Lin
Parameter-less hierarchical BOA
about 12 pages, submitted to GECCO-2004
null
null
null
cs.NE cs.AI
null
The parameter-less hierarchical Bayesian optimization algorithm (hBOA) enables the use of hBOA without the need for tuning parameters for solving each problem instance. There are three crucial parameters in hBOA: (1) the selection pressure, (2) the window size for restricted tournaments, and (3) the population size. Although both the selection pressure and the window size influence hBOA performance, performance should remain low-order polynomial with standard choices of these two parameters. However, there is no standard population size that would work for all problems of interest and the population size must thus be eliminated in a different way. To eliminate the population size, the parameter-less hBOA adopts the population-sizing technique of the parameter-less genetic algorithm. Based on the existing theory, the parameter-less hBOA should be able to solve nearly decomposable and hierarchical problems in quadratic or subquadratic number of function evaluations without the need for setting any parameters whatsoever. A number of experiments are presented to verify scalability of the parameter-less hBOA.
[ { "version": "v1", "created": "Sun, 15 Feb 2004 06:56:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Pelikan", "Martin", "" ], [ "Lin", "Tz-Kai", "" ] ]
cs/0402033
Fangzhen Lin
Fangzhen Lin and Jia-Huai You
Recycling Computed Answers in Rewrite Systems for Abduction
20 pages. Full version of our IJCAI-03 paper
null
null
null
cs.AI
null
In rule-based systems, goal-oriented computations correspond naturally to the possible ways that an observation may be explained. In some applications, we need to compute explanations for a series of observations with the same domain. The question whether previously computed answers can be recycled arises. A yes answer could result in substantial savings of repeated computations. For systems based on classic logic, the answer is YES. For nonmonotonic systems however, one tends to believe that the answer should be NO, since recycling is a form of adding information. In this paper, we show that computed answers can always be recycled, in a nontrivial way, for the class of rewrite procedures that we proposed earlier for logic programs with negation. We present some experimental results on an encoding of the logistics domain.
[ { "version": "v1", "created": "Mon, 16 Feb 2004 06:15:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Lin", "Fangzhen", "" ], [ "You", "Jia-Huai", "" ] ]
cs/0402036
Pardha Pyla
Pardha S. Pyla, Manuel A. Perez-Quinones, James D. Arthur & H. Rex Hartson
Towards a Model-Based Framework for Integrating Usability and Software Engineering Life Cycles
This document contains 8 pages with 5 figures. This appeared in Bridging the SE & HCI Communities Workshop in INTERACT 2003 (http://www.se-hci.org/bridging/interact)
null
null
null
cs.HC
null
In this position paper we propose a process model that provides a development infrastructure in which the usability engineering and software engineering life cycles co-exist in complementary roles. We describe the motivation, hurdles, rationale, arguments, and implementation plan for the need, specification, and the usefulness of such a model.
[ { "version": "v1", "created": "Mon, 16 Feb 2004 21:56:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Pyla", "Pardha S.", "" ], [ "Perez-Quinones", "Manuel A.", "" ], [ "Arthur", "James D.", "" ], [ "Hartson", "H. Rex", "" ] ]
cs/0402037
Petrus H. Potgieter
P.H. Potgieter
The pre-history of quantum computation
11 pages, in Afrikaans (title: Die voorgeskiedenis van kwantumberekening) with English abstract
Suid-Afrikaanse Tydskrif vir Natuurwetenskap en Tegnologie, Vol 23, Issue 1 / 2, Mar / Jun, 2-6 (2004)
null
null
cs.GL
null
The main ideas behind developments in the theory and technology of quantum computation were formulated in the late 1970s and early 1980s by two physicists in the West and a mathematician in the former Soviet Union. It is not generally known in the West that the subject has roots in the Russian technical literature. The author hopes to present as impartial a synthesis as possible of the early history of thought on this subject. The role of reversible and irreversible computational processes is examined briefly as it relates to the origins of quantum computing and the so-called Information Paradox in physics.
[ { "version": "v1", "created": "Tue, 17 Feb 2004 06:54:26 GMT" }, { "version": "v2", "created": "Tue, 16 Nov 2004 05:15:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Potgieter", "P. H.", "" ] ]
cs/0402038
Serban Vlad E.
Serban E. Vlad
Towards a Mathematical Theory of the Delays of the Asynchronous Circuits
null
Analele Universitatii din Oradea, Fascicola Matematica, TOM IX, 2002
null
null
cs.LO
null
The inequations of the delays of the asynchronous circuits are written, by making use of pseudo-Boolean differential calculus. We consider these efforts to be a possible starting point in the semi-formalized reconstruction of the digital electrical engineering (which is a non-formalized theory).
[ { "version": "v1", "created": "Tue, 17 Feb 2004 12:11:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0402039
Serban Vlad E.
Serban E. Vlad
On the Inertia of the Asynchronous Circuits
null
CAIM 2003, Oradea, Romania, May 29-31, 2003
null
null
cs.LO
null
We present the bounded delays, the absolute inertia and the relative inertia.
[ { "version": "v1", "created": "Tue, 17 Feb 2004 12:54:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0402040
Serban Vlad E.
Serban E. Vlad
Defining the Delays of the Asynchronous Circuits
null
CAIM 2003, Oradea, Romania, May 29-31, 2003
null
null
cs.LO
null
We define the delays of a circuit, as well as the properties of determinism, order, time invariance, constancy, symmetry and the serial connection.
[ { "version": "v1", "created": "Tue, 17 Feb 2004 13:01:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0402041
Serban Vlad E.
Serban E. Vlad
Examples of Models of the Asynchronous Circuits
null
the 10-th Symposium of Mathematics and its Applications, Politehnica University of Timisoara, Timisoara, 2003
null
null
cs.LO
null
We define the delays of a circuit, as well as the properties of determinism, order, time invariance, constancy, symmetry and the serial connection.
[ { "version": "v1", "created": "Tue, 17 Feb 2004 13:07:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0402042
Kevin O'Neill
Joseph Y. Halpern and Kevin R. O'Neill
Anonymity and Information Hiding in Multiagent Systems
Replacement. 36 pages. Full version of CSFW '03 paper, submitted to JCS. Made substantial changes to Section 6; added references throughout
null
null
null
cs.CR cs.LO cs.MA
null
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework, much in the spirit of our earlier work on secrecy [Halpern and O'Neill 2002]. We give several definitions of anonymity with respect to agents, actions, and observers in multiagent systems, and we relate our definitions of anonymity to other definitions of information hiding, such as secrecy. We also give probabilistic definitions of anonymity that are able to quantify an observer s uncertainty about the state of the system. Finally, we relate our definitions of anonymity to other formalizations of anonymity and information hiding, including definitions of anonymity in the process algebra CSP and definitions of information hiding using function views.
[ { "version": "v1", "created": "Wed, 18 Feb 2004 20:46:52 GMT" }, { "version": "v2", "created": "Mon, 17 May 2004 19:21:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "O'Neill", "Kevin R.", "" ] ]
cs/0402044
Sandor P. Fekete
Sandor P. Fekete and Joerg Schepers
A General Framework for Bounds for Higher-Dimensional Orthogonal Packing Problems
16 pages, 4 figures, Latex, to appear in Mathematical Methods of Operations Research
null
null
null
cs.DS cs.CG
null
Higher-dimensional orthogonal packing problems have a wide range of practical applications, including packing, cutting, and scheduling. In the context of a branch-and-bound framework for solving these packing problems to optimality, it is of crucial importance to have good and easy bounds for an optimal solution. Previous efforts have produced a number of special classes of such bounds. Unfortunately, some of these bounds are somewhat complicated and hard to generalize. We present a new approach for obtaining classes of lower bounds for higher-dimensional packing problems; our bounds improve and simplify several well-known bounds from previous literature. In addition, our approach provides an easy framework for proving correctness of new bounds.
[ { "version": "v1", "created": "Wed, 18 Feb 2004 16:05:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Schepers", "Joerg", "" ] ]
cs/0402045
Sandor P. Fekete
Esther M. Arkin, Michael A. Bender, Sandor P. Fekete, Joseph S. B. Mitchell, and Martin Skutella
The Freeze-Tag Problem: How to Wake Up a Swarm of Robots
27 pages, 9 figures, Latex, to appear in Algorithmica. Cleaned up various parts of the paper, removed one overly technical section
null
null
null
cs.DS
null
An optimization problem that naturally arises in the study of swarm robotics is the Freeze-Tag Problem (FTP) of how to awaken a set of ``asleep'' robots, by having an awakened robot move to their locations. Once a robot is awake, it can assist in awakening other slumbering robots.The objective is to have all robots awake as early as possible. While the FTP bears some resemblance to problems from areas in combinatorial optimization such as routing, broadcasting, scheduling, and covering, its algorithmic characteristics are surprisingly different. We consider both scenarios on graphs and in geometric environments.In graphs, robots sleep at vertices and there is a length function on the edges. Awake robots travel along edges, with time depending on edge length. For most scenarios, we consider the offline version of the problem, in which each awake robot knows the position of all other robots. We prove that the problem is NP-hard, even for the special case of star graphs. We also establish hardness of approximation, showing that it is NP-hard to obtain an approximation factor better than 5/3, even for graphs of bounded degree.These lower bounds are complemented with several positive algorithmic results, including: (1) We show that the natural greedy strategy on star graphs has a tight worst-case performance of 7/3 and give a polynomial-time approximation scheme (PTAS) for star graphs. (2) We give a simple O(log D)-competitive online algorithm for graphs with maximum degree D and locally bounded edge weights. (3) We give a PTAS, running in nearly linear time, for geometrically embedded instances.
[ { "version": "v1", "created": "Wed, 18 Feb 2004 20:49:02 GMT" }, { "version": "v2", "created": "Wed, 7 Sep 2005 23:31:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Arkin", "Esther M.", "" ], [ "Bender", "Michael A.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Skutella", "Martin", "" ] ]
cs/0402046
Jaap-Henk Hoepman
Flavio D. Garcia, Jaap-Henk Hoepman
Spam filter analysis
Submitted to SEC 2004
null
null
null
cs.CR
null
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that genetic algorithm based spam filters perform best at server level and naive Bayesian filters are the most appropriate for filtering at user level.
[ { "version": "v1", "created": "Thu, 19 Feb 2004 09:32:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Garcia", "Flavio D.", "" ], [ "Hoepman", "Jaap-Henk", "" ] ]
cs/0402047
Cl\'audio Lima
Claudio F. Lima, Fernando G. Lobo
Parameter-less Optimization with the Extended Compact Genetic Algorithm and Iterated Local Search
12 pages, submitted to gecco 2004
null
null
null
cs.NE
null
This paper presents a parameter-less optimization framework that uses the extended compact genetic algorithm (ECGA) and iterated local search (ILS), but is not restricted to these algorithms. The presented optimization algorithm (ILS+ECGA) comes as an extension of the parameter-less genetic algorithm (GA), where the parameters of a selecto-recombinative GA are eliminated. The approach that we propose is tested on several well known problems. In the absence of domain knowledge, it is shown that ILS+ECGA is a robust and easy-to-use optimization method.
[ { "version": "v1", "created": "Thu, 19 Feb 2004 19:37:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Lima", "Claudio F.", "" ], [ "Lobo", "Fernando G.", "" ] ]
cs/0402048
Maurizio Proietti
Fabio Fioravanti, Alberto Pettorossi, Maurizio Proietti
Transformation Rules for Locally Stratified Constraint Logic Programs
To appear in: M. Bruynooghe, K.-K. Lau (Eds.) Program Development in Computational Logic, Lecture Notes in Computer Science, Springer
null
null
null
cs.PL cs.LO
null
We propose a set of transformation rules for constraint logic programs with negation. We assume that every program is locally stratified and, thus, it has a unique perfect model. We give sufficient conditions which ensure that the proposed set of transformation rules preserves the perfect model of the programs. Our rules extend in some respects the rules for logic programs and constraint logic programs already considered in the literature and, in particular, they include a rule for unfolding a clause with respect to a negative literal.
[ { "version": "v1", "created": "Fri, 20 Feb 2004 14:09:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Fioravanti", "Fabio", "" ], [ "Pettorossi", "Alberto", "" ], [ "Proietti", "Maurizio", "" ] ]
cs/0402049
Fernando Lobo
Fernando G. Lobo, Claudio F. Lima, Hugo Martires
An architecture for massive parallelization of the compact genetic algorithm
12 pages, submitted to gecco 2004
null
null
null
cs.NE
null
This paper presents an architecture which is suitable for a massive parallelization of the compact genetic algorithm. The resulting scheme has three major advantages. First, it has low synchronization costs. Second, it is fault tolerant, and third, it is scalable. The paper argues that the benefits that can be obtained with the proposed approach is potentially higher than those obtained with traditional parallel genetic algorithms. In addition, the ideas suggested in the paper may also be relevant towards parallelizing more complex probabilistic model building genetic algorithms.
[ { "version": "v1", "created": "Fri, 20 Feb 2004 16:36:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Fernando G.", "" ], [ "Lima", "Claudio F.", "" ], [ "Martires", "Hugo", "" ] ]
cs/0402051
Vadim Tropashko
Vadim Tropashko
Nested Intervals Tree Encoding with Continued Fractions
8 pages
null
null
null
cs.DB
null
We introduce a new variation of Tree Encoding with Nested Intervals, find connections with Materialized Path, and suggest a method for moving parts of the hierarchy.
[ { "version": "v1", "created": "Fri, 20 Feb 2004 19:45:56 GMT" }, { "version": "v2", "created": "Tue, 11 May 2004 20:56:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Tropashko", "Vadim", "" ] ]
cs/0402052
Andrej Dujella
Andrej Dujella
Continued fractions and RSA with small secret exponent
11 pages, to appear in Tatra Mt. Math. Publ
Tatra Mt. Math. Publ. 29 (2004), 101-112.
null
null
cs.CR math.NT
null
Extending the classical Legendre's result, we describe all solutions of the inequality |x - a/b| < c/b^2 in terms of convergents of continued fraction expansion of x. Namely, we show that a/b = (rp_{m+1} +- sp_m) / (rq_{m+1} +- sq_m) for some nonnegative integers m,r,s such that rs < 2c. As an application of this result, we describe a modification of Verheul and van Tilborg variant of Wiener's attack on RSA cryptosystem with small secret exponent.
[ { "version": "v1", "created": "Fri, 20 Feb 2004 22:06:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Dujella", "Andrej", "" ] ]
cs/0402053
Paolo Liberatore
Paolo Liberatore
The Complexity of Modified Instances
null
null
null
null
cs.CC cs.AI
null
In this paper we study the complexity of solving a problem when a solution of a similar instance is known. This problem is relevant whenever instances may change from time to time, and known solutions may not remain valid after the change. We consider two scenarios: in the first one, what is known is only a solution of the problem before the change; in the second case, we assume that some additional information, found during the search for this solution, is also known. In the first setting, the techniques from the theory of NP-completeness suffice to show complexity results. In the second case, negative results can only be proved using the techniques of compilability, and are often related to the size of considered changes.
[ { "version": "v1", "created": "Mon, 23 Feb 2004 18:08:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Liberatore", "Paolo", "" ] ]
cs/0402054
Shujun Li Dr.
Shujun Li, Guanrong Chen and Xuanqin Mou
On the Security of the Yi-Tan-Siew Chaos-Based Cipher
5 pages, 3 figures, IEEEtrans.cls v 1.6
IEEE Trans. CAS-II, vol. 51, no. 12, pp. 665-669, 2004
10.1109/TCSII.2004.838657
null
cs.CR cs.PF nlin.CD
null
This paper presents a comprehensive analysis on the security of the Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A differential chosen-plaintext attack and a differential chosen-ciphertext attack are suggested to break the sub-key K, under the assumption that the time stamp can be altered by the attacker, which is reasonable in such attacks. Also, some security Problems about the sub-keys $\alpha$ and $\beta$ are clarified, from both theoretical and experimental points of view. Further analysis shows that the security of this cipher is independent of the use of the chaotic tent map, once the sub-key $K$ is removed via the proposed suggested differential chosen-plaintext attack.
[ { "version": "v1", "created": "Tue, 24 Feb 2004 08:28:21 GMT" }, { "version": "v2", "created": "Tue, 30 Nov 2004 09:47:22 GMT" }, { "version": "v3", "created": "Wed, 1 Dec 2004 07:11:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Shujun", "" ], [ "Chen", "Guanrong", "" ], [ "Mou", "Xuanqin", "" ] ]
cs/0402056
Hilda Angela Larrondo
C.M. Gonzalez, H.A. Larrondo, C.A. Gayoso, L.J. Arnone, E.I. Boemo
Digital Signal Transmission with Chaotic Encryption: Design and Evaluation of a FPGA Realization
null
null
null
null
cs.CR
null
A discrete-time discrete-value pseudo-chaotic encoder/decoder system is presented. The pseudo-chaotic module is a 3D discrete version of the well-known Lorenz dynamical system. Scaling and biasing transformations as well as natural number arithmetics are employed in order to simplify realizations on a small size Field Programmable Gate Array (FPGA. The encryption ability is improved by using only the least significant byte of one of the pseudo chaotic state variables as the key to encrypt the plain text. The key is periodically perturbed by another chaotic state variable. The statistical properties of the pseudo chaotic cipher are compared with those of other pseudo-random generators available in the literature. As an example of applicability of the technique, a full duplex communication system is designed and constructed using FPGA's as technological framework.
[ { "version": "v1", "created": "Wed, 25 Feb 2004 12:53:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Gonzalez", "C. M.", "" ], [ "Larrondo", "H. A.", "" ], [ "Gayoso", "C. A.", "" ], [ "Arnone", "L. J.", "" ], [ "Boemo", "E. I.", "" ] ]
cs/0402057
Carlos Ches\nevar
Sergio Alejandro Gomez and Carlos Ivan Ches\~nevar
Integrating Defeasible Argumentation and Machine Learning Techniques
5 pages
Procs. WICC 2003 . Pp. 787-791. Tandil, Argentina, Mayo 2003
null
null
cs.AI
null
The field of machine learning (ML) is concerned with the question of how to construct algorithms that automatically improve with experience. In recent years many successful ML applications have been developed, such as datamining programs, information-filtering systems, etc. Although ML algorithms allow the detection and extraction of interesting patterns of data for several kinds of problems, most of these algorithms are based on quantitative reasoning, as they rely on training data in order to infer so-called target functions. In the last years defeasible argumentation has proven to be a sound setting to formalize common-sense qualitative reasoning. This approach can be combined with other inference techniques, such as those provided by machine learning theory. In this paper we outline different alternatives for combining defeasible argumentation and machine learning techniques. We suggest how different aspects of a generic argument-based framework can be integrated with other ML-based approaches.
[ { "version": "v1", "created": "Wed, 25 Feb 2004 18:02:29 GMT" }, { "version": "v2", "created": "Fri, 28 May 2004 17:04:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Gomez", "Sergio Alejandro", "" ], [ "Chesñevar", "Carlos Ivan", "" ] ]
cs/0402058
Jacques Cohen
Jacques Cohen
A Tribute to Alain Colmerauer
9 pages
null
null
null
cs.PL
null
The paper describes the contributions of Alain Colmerauer to the areas of logic programs (LP) and constraint logic programs (CLP).
[ { "version": "v1", "created": "Wed, 25 Feb 2004 19:00:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Cohen", "Jacques", "" ] ]
cs/0402061
Jean-Luc Falcone
Jean-Luc Falcone and Paul Albuquerque
A Correlation-Based Distance
null
null
null
null
cs.IR
null
In this short technical report, we define on the sample space R^D a distance between data points which depends on their correlation. We also derive an expression for the center of mass of a set of points with respect to this distance.
[ { "version": "v1", "created": "Fri, 27 Feb 2004 14:13:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Falcone", "Jean-Luc", "" ], [ "Albuquerque", "Paul", "" ] ]
cs/0403001
Vitorino Ramos Dr.
Vitorino Ramos, Ajith Abraham
Evolving a Stigmergic Self-Organized Data-Mining
10 pages, 3 figures, submitted to Intelligent Systems, Design and Applications 2004
null
null
null
cs.AI cs.IR
null
Self-organizing complex systems typically are comprised of a large number of frequently similar components or events. Through their process, a pattern at the global-level of a system emerges solely from numerous interactions among the lower-level components of the system. Moreover, the rules specifying interactions among the system's components are executed using only local information, without reference to the global pattern, which, as in many real-world problems is not easily accessible or possible to be found. Stigmergy, a kind of indirect communication and learning by the environment found in social insects is a well know example of self-organization, providing not only vital clues in order to understand how the components can interact to produce a complex pattern, as can pinpoint simple biological non-linear rules and methods to achieve improved artificial intelligent adaptive categorization systems, critical for Data-Mining. On the present work it is our intention to show that a new type of Data-Mining can be designed based on Stigmergic paradigms, taking profit of several natural features of this phenomenon. By hybridizing bio-inspired Swarm Intelligence with Evolutionary Computation we seek for an entire distributed, adaptive, collective and cooperative self-organized Data-Mining. As a real-world, real-time test bed for our proposal, World-Wide-Web Mining will be used. Having that purpose in mind, Web usage Data was collected from the Monash University's Web site (Australia), with over 7 million hits every week. Results are compared to other recent systems, showing that the system presented is by far promising.
[ { "version": "v1", "created": "Sat, 28 Feb 2004 23:50:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Abraham", "Ajith", "" ] ]
cs/0403003
Gilson Antonio Giraldi
Gilson A. Giraldi, Renato Portugal, Ricardo N. Thess
Genetic Algorithms and Quantum Computation
27 pages, 5 figures, 3 tables
null
null
null
cs.NE
null
Recently, researchers have applied genetic algorithms (GAs) to address some problems in quantum computation. Also, there has been some works in the designing of genetic algorithms based on quantum theoretical concepts and techniques. The so called Quantum Evolutionary Programming has two major sub-areas: Quantum Inspired Genetic Algorithms (QIGAs) and Quantum Genetic Algorithms (QGAs). The former adopts qubit chromosomes as representations and employs quantum gates for the search of the best solution. The later tries to solve a key question in this field: what GAs will look like as an implementation on quantum hardware? As we shall see, there is not a complete answer for this question. An important point for QGAs is to build a quantum algorithm that takes advantage of both the GA and quantum computing parallelism as well as true randomness provided by quantum computers. In the first part of this paper we present a survey of the main works in GAs plus quantum computing including also our works in this area. Henceforth, we review some basic concepts in quantum computation and GAs and emphasize their inherent parallelism. Next, we review the application of GAs for learning quantum operators and circuit design. Then, quantum evolutionary programming is considered. Finally, we present our current research in this field and some perspectives.
[ { "version": "v1", "created": "Thu, 4 Mar 2004 19:24:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "Portugal", "Renato", "" ], [ "Thess", "Ricardo N.", "" ] ]
cs/0403004
Zur Izhakian
Zur Izhakian
New Visualization of Surfaces in Parallel Coordinates - Eliminating Ambiguity and Some "Over-Plotting"
13 pages 8 figures
Journal of WSCG, 2004, volume 1-3, no 12, pp 183-191, ISSN 1213-6972
null
null
cs.OH
null
$\cal{A}$ point $P \in \Real^n$ is represented in Parallel Coordinates by a polygonal line $\bar{P}$ (see \cite{Insel99a} for a recent survey). Earlier \cite{inselberg85plane}, a surface $\sigma$ was represented as the {\em envelope} of the polygonal lines representing it's points. This is ambiguous in the sense that {\em different} surfaces can provide the {\em same} envelopes. Here the ambiguity is eliminated by considering the surface $\sigma$ as the envelope of it's {\em tangent planes} and in turn, representing each of these planes by $n$-1 points \cite{Insel99a}. This, with some future extension, can yield a new and unambiguous representation, $\bar{\sigma}$, of the surface consisting of $n$-1 planar regions whose properties correspond lead to the {\em recognition} of the surfaces' properties i.e. developable, ruled etc. \cite{hung92smooth}) and {\em classification} criteria. It is further shown that the image (i.e. representation) of an algebraic surface of degree 2 in $\Real^n$ is a region whose boundary is also an algebraic curve of degree 2. This includes some {\em non-convex} surfaces which with the previous ambiguous representation could not be treated. An efficient construction algorithm for the representation of the quadratic surfaces (given either by {\em explicit} or {\em implicit} equation) is provided. The results obtained are suitable for applications, to be presented in a future paper, and in particular for the approximation of complex surfaces based on their {\em planar} images. An additional benefit is the elimination of the ``over-plotting'' problem i.e. the ``bunching'' of polygonal lines which often obscure part of the parallel-coordinate display.
[ { "version": "v1", "created": "Thu, 4 Mar 2004 23:08:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Izhakian", "Zur", "" ] ]
cs/0403005
Zur Izhakian
Zur Izhakian
Algebraic Curves in Parallel Coordinates - Avoiding the "Over-Plotting" Problem
null
null
null
null
cs.OH
null
${\cal U}$ntil now the representation (i.e. plotting) of curve in Parallel Coordinates is constructed from the point $\leftrightarrow$ line duality. The result is a ``line-curve'' which is seen as the envelope of it's tangents. Usually this gives an unclear image and is at the heart of the ``over-plotting'' problem; a barrier in the effective use of Parallel Coordinates. This problem is overcome by a transformation which provides directly the ``point-curve'' representation of a curve. Earlier this was applied to conics and their generalizations. Here the representation, also called dual, is extended to all planar algebraic curves. Specifically, it is shown that the dual of an algebraic curve of degree $n$ is an algebraic of degree at most $n(n - 1)$ in the absence of singular points. The result that conics map into conics follows as an easy special case. An algorithm, based on algebraic geometry using resultants and homogeneous polynomials, is obtained which constructs the dual image of the curve. This approach has potential generalizations to multi-dimensional algebraic surfaces and their approximation. The ``trade-off'' price then for obtaining {\em planar} representation of multidimensional algebraic curves and hyper-surfaces is the higher degree of the image's boundary which is also an algebraic curve in $\|$-coords.
[ { "version": "v1", "created": "Thu, 4 Mar 2004 23:35:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Izhakian", "Zur", "" ] ]
cs/0403006
Carlos Gershenson
Carlos R. de la Mora B., Carlos Gershenson, Angelica Garcia-Vega
The role of behavior modifiers in representation development
8 pages
null
null
null
cs.AI
null
We address the problem of the development of representations and their relationship to the environment. We study a software agent which develops in a network a representation of its simple environment which captures and integrates the relationships between agent and environment through a closure mechanism. The inclusion of a variable behavior modifier allows better representation development. This can be confirmed with an internal description of the closure mechanism, and with an external description of the properties of the representation network.
[ { "version": "v1", "created": "Fri, 5 Mar 2004 12:53:57 GMT" } ]
2007-05-23T00:00:00
[ [ "B.", "Carlos R. de la Mora", "" ], [ "Gershenson", "Carlos", "" ], [ "Garcia-Vega", "Angelica", "" ] ]
cs/0403007
George Candea
George Candea and Armando Fox
End-User Effects of Microreboots in Three-Tiered Internet Systems
14 pages
null
null
null
cs.OS cs.AR cs.NI
null
Microreboots restart fine-grained components of software systems "with a clean slate," and only take a fraction of the time needed for full system reboot. Microreboots provide an application-generic recovery technique for Internet services, which can be supported entirely in middleware and requires no changes to the applications or any a priori knowledge of application semantics. This paper investigates the effect of microreboots on end-users of an eBay-like online auction application; we find that microreboots are nearly as effective as full reboots, but are significantly less disruptive in terms of downtime and lost work. In our experiments, microreboots reduced the number of failed user requests by 65% and the perceived downtime by 78% compared to a server process restart. We also show how to replace user-visible transient failures with transparent call-retry, at the cost of a slight increase in end-user-visible latency during recovery. Due to their low cost, microreboots can be used aggressively, even when their necessity is less than certain, hence adding to the reduced recovery time a reduction in the fault detection time, which further improves availability.
[ { "version": "v1", "created": "Sat, 6 Mar 2004 02:52:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Candea", "George", "" ], [ "Fox", "Armando", "" ] ]
cs/0403008
Dmitrii V. Pasechnik
Dima Grigoriev, Dmitrii V. Pasechnik
Polynomial-time computing over quadratic maps I: sampling in real algebraic sets
34 pages, LaTeX (Computational Complexity (cc.cls) class used); updated version, to appear in Comp. Complexity
Computational Complexity 14(2005) 20-52
10.1007/s00037-005-0189-7
null
cs.SC cs.CG math.AG
null
Given a quadratic map Q : K^n -> K^k defined over a computable subring D of a real closed field K, and a polynomial p(Y_1,...,Y_k) of degree d, we consider the zero set Z=Z(p(Q(X)),K^n) of the polynomial p(Q(X_1,...,X_n)). We present a procedure that computes, in (dn)^O(k) arithmetic operations in D, a set S of (real univariate representations of) sampling points in K^n that intersects nontrivially each connected component of Z. As soon as k=o(n), this is faster than the standard methods that all have exponential dependence on n in the complexity. In particular, our procedure is polynomial-time for constant k. In contrast, the best previously known procedure (due to A.Barvinok) is only capable of deciding in n^O(k^2) operations the nonemptiness (rather than constructing sampling points) of the set Z in the case of p(Y)=sum_i Y_i^2 and homogeneous Q. A by-product of our procedure is a bound (dn)^O(k) on the number of connected components of Z. The procedure consists of exact symbolic computations in D and outputs vectors of algebraic numbers. It involves extending K by infinitesimals and subsequent limit computation by a novel procedure that utilizes knowledge of an explicit isomorphism between real algebraic sets.
[ { "version": "v1", "created": "Sat, 6 Mar 2004 08:20:38 GMT" }, { "version": "v2", "created": "Fri, 19 Mar 2004 01:36:03 GMT" }, { "version": "v3", "created": "Fri, 31 Dec 2004 15:41:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Grigoriev", "Dima", "" ], [ "Pasechnik", "Dmitrii V.", "" ] ]
cs/0403009
Wolfram Schmied
Wolfram Schmied
Demolishing Searle's Chinese Room
3 pages, 0 figures; inserted missing ``no'' in section 3
null
null
null
cs.AI cs.GL
null
Searle's Chinese Room argument is refuted by showing that he has actually given two different versions of the room, which fail for different reasons. Hence, Searle does not achieve his stated goal of showing ``that a system could have input and output capabilities that duplicated those of a native Chinese speaker and still not understand Chinese''.
[ { "version": "v1", "created": "Mon, 8 Mar 2004 17:50:32 GMT" }, { "version": "v2", "created": "Thu, 11 Mar 2004 14:27:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmied", "Wolfram", "" ] ]
cs/0403010
Amy Felty
Andrew W. Appel and Amy P. Felty
Polymorphic lemmas and definitions in Lambda Prolog and Twelf
null
Andrew W. Appel and Amy P. Felty, Polymorphic Lemmas and Definitions in Lambda Prolog and Twelf, Theory and Practice of Logic Programming, 4(1&2):1-39, January & March 2004
null
null
cs.LO cs.PL
null
Lambda Prolog is known to be well-suited for expressing and implementing logics and inference systems. We show that lemmas and definitions in such logics can be implemented with a great economy of expression. We encode a higher-order logic using an encoding that maps both terms and types of the object logic (higher-order logic) to terms of the metalanguage (Lambda Prolog). We discuss both the Terzo and Teyjus implementations of Lambda Prolog. We also encode the same logic in Twelf and compare the features of these two metalanguages for our purposes.
[ { "version": "v1", "created": "Tue, 9 Mar 2004 02:38:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Appel", "Andrew W.", "" ], [ "Felty", "Amy P.", "" ] ]
cs/0403011
Michael Hanus
Maria Alpuente, Michael Hanus, Salvador Lucas, German Vidal
Specialization of Functional Logic Programs Based on Needed Narrowing
48 pages. This paper has been accepted for publication in the Journal of Theory and Practice of Logic Programming. In contrast to the journal version, this paper contains the detailed proofs of the results presented in this paper
null
null
null
cs.PL
null
Many functional logic languages are based on narrowing, a unification-based goal-solving mechanism which subsumes the reduction mechanism of functional languages and the resolution principle of logic languages. Needed narrowing is an optimal evaluation strategy which constitutes the basis of modern (narrowing-based) lazy functional logic languages. In this work, we present the fundamentals of partial evaluation in such languages. We provide correctness results for partial evaluation based on needed narrowing and show that the nice properties of this strategy are essential for the specialization process. In particular, the structure of the original program is preserved by partial evaluation and, thus, the same evaluation strategy can be applied for the execution of specialized programs. This is in contrast to other partial evaluation schemes for lazy functional logic programs which may change the program structure in a negative way. Recent proposals for the partial evaluation of declarative multi-paradigm programs use (some form of) needed narrowing to perform computations at partial evaluation time. Therefore, our results constitute the basis for the correctness of such partial evaluators.
[ { "version": "v1", "created": "Tue, 9 Mar 2004 15:43:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Alpuente", "Maria", "" ], [ "Hanus", "Michael", "" ], [ "Lucas", "Salvador", "" ], [ "Vidal", "German", "" ] ]
cs/0403012
David Wolpert
David H. Wolpert and Stefan Bieniawski
Distributed Control by Lagrangian Steepest Descent
8 pages
null
null
null
cs.MA cs.GT nlin.AO
null
Often adaptive, distributed control can be viewed as an iterated game between independent players. The coupling between the players' mixed strategies, arising as the system evolves from one instant to the next, is determined by the system designer. Information theory tells us that the most likely joint strategy of the players, given a value of the expectation of the overall control objective function, is the minimizer of a Lagrangian function of the joint strategy. So the goal of the system designer is to speed evolution of the joint strategy to that Lagrangian minimizing point, lower the expectated value of the control objective function, and repeat. Here we elaborate the theory of algorithms that do this using local descent procedures, and that thereby achieve efficient, adaptive, distributed control.
[ { "version": "v1", "created": "Wed, 10 Mar 2004 03:49:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolpert", "David H.", "" ], [ "Bieniawski", "Stefan", "" ] ]
cs/0403013
George Candea
George Candea
Predictable Software -- A Shortcut to Dependable Computing ?
6 pages; submitted to 11th ACM SIGOPS European Workshop
WIP Session, USENIX Technical Conference, Boston, MA, June 2004
null
null
cs.OS cs.DC
null
Many dependability techniques expect certain behaviors from the underlying subsystems and fail in chaotic ways if these expectations are not met. Under expected circumstances, however, software tends to work quite well. This paper suggests that, instead of fixing elusive bugs or rewriting software, we improve the predictability of conditions faced by our programs. This approach might be a cheaper and faster way to improve dependability of software. After identifying some of the common triggers of unpredictability, the paper describes three engineering principles that hold promise in combating unpredictability, suggests a way to benchmark predictability, and outlines a brief research agenda.
[ { "version": "v1", "created": "Thu, 11 Mar 2004 04:01:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Candea", "George", "" ] ]
cs/0403014
Girish Motwani
Girish Motwani, Sandhya G. Nair
Search Efficiency in Indexing Structures for Similarity Searching
null
null
null
null
cs.DB
null
Similarity searching finds application in a wide variety of domains including multilingual databases, computational biology, pattern recognition and text retrieval. Similarity is measured in terms of a distance function, edit distance, in general metric spaces, which is expensive to compute. Indexing techniques can be used reduce the number of distance computations. We present an analysis of various existing similarity indexing structures for the same. The performance obtained using the index structures studied was found to be unsatisfactory . We propose an indexing technique that combines the features of clustering with M tree(MTB) and the results indicate that this gives better performance.
[ { "version": "v1", "created": "Thu, 11 Mar 2004 06:30:30 GMT" }, { "version": "v2", "created": "Fri, 12 Mar 2004 14:33:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Motwani", "Girish", "" ], [ "Nair", "Sandhya G.", "" ] ]
cs/0403016
Krzysztof R. Apt
Krzysztof R. Apt and Peter Zoeteweij
A Comparative Study of Arithmetic Constraints on Integer Intervals
24 pages. To appear in "Recent Advances in Constraints, 2003" K.R. Apt, F. Fages, F. Rossi, P. Szeredi and J. Vancza, eds, LNAI 3010, Springer-Verlag, 2004
null
null
null
cs.PL cs.AI
null
We propose here a number of approaches to implement constraint propagation for arithmetic constraints on integer intervals. To this end we introduce integer interval arithmetic. Each approach is explained using appropriate proof rules that reduce the variable domains. We compare these approaches using a set of benchmarks.
[ { "version": "v1", "created": "Fri, 12 Mar 2004 08:37:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Zoeteweij", "Peter", "" ] ]
cs/0403017
Jim Gray
Maria A. Nieto-Santisteban, William O'Mullane, Jim Gray, Nolan Li, Tamas Budavari, Alexander S. Szalay, Aniruddha R. Thakar
Extending the SDSS Batch Query System to the National Virtual Observatory Grid
original available at http://research.microsoft.com/research/pubs/view.aspx?tr_id=714
null
null
MSR-TR-2004-12
cs.DB
null
The Sloan Digital Sky Survey science database is approaching 2TB. While the vast majority of queries normally execute in seconds or minutes, this interactive execution time can be disproportionately increased by a small fraction of queries that take hours or days to run; either because they require non-index scans of the largest tables or because they request very large result sets. In response to this, we added a multi-queue job submission and tracking system. The transfer of very large result sets from queries over the network is another serious problem. Statistics suggested that much of this data transfer is unnecessary; users would prefer to store results locally in order to allow further cross matching and filtering. To allow local analysis, we implemented a system that gives users their own personal database (MyDB) at the portal site. Users may transfer data to their MyDB, and then perform further analysis before extracting it to their own machine. We intend to extend the MyDB and asynchronous query ideas to multiple NVO nodes. This implies development, in a distributed manner, of several features, which have been demonstrated for a single node in the SDSS Batch Query System (CasJobs). The generalization of asynchronous queries necessitates some form of MyDB storage as well as workflow tracking services on each node and coordination strategies among nodes.
[ { "version": "v1", "created": "Fri, 12 Mar 2004 09:42:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Nieto-Santisteban", "Maria A.", "" ], [ "O'Mullane", "William", "" ], [ "Gray", "Jim", "" ], [ "Li", "Nolan", "" ], [ "Budavari", "Tamas", "" ], [ "Szalay", "Alexander S.", "" ], [ "Thakar", "Aniruddha R.", "" ] ]
cs/0403018
Jim Gray
Jim Gray, Alexander S. Szalay
The World Wide Telescope: An Archetype for Online Science
6 pages, msword posted at http://research.microsoft.com/research/pubs/view.aspx?tr_id=590
CACM, V. 45.11, pp. 50-54, Nov. 2002
null
MSR-TR-2002-75
cs.DB
null
Most scientific data will never be directly examined by scientists; rather it will be put into online databases where it will be analyzed and summarized by computer programs. Scientists increasingly see their instruments through online scientific archives and analysis tools, rather than examining the raw data. Today this analysis is primarily driven by scientists asking queries, but scientific archives are becoming active databases that self-organize and recognize interesting and anomalous facts as data arrives. In some fields, data from many different archives can be cross-correlated to produce new insights. Astronomy presents an excellent example of these trends; and, federating Astronomy archives presents interesting challenges for computer scientists.
[ { "version": "v1", "created": "Fri, 12 Mar 2004 09:57:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Szalay", "Alexander S.", "" ] ]
cs/0403019
Jim Gray
Jim Gray
Distributed Computing Economics
6 pages, orginal at http://research.microsoft.com/research/pubs/view.aspx?tr_id=655
null
null
MSR-TR-2003-24
cs.NI cs.DC
null
Computing economics are changing. Today there is rough price parity between (1) one database access, (2) ten bytes of network traffic, (3) 100,000 instructions, (4) 10 bytes of disk storage, and (5) a megabyte of disk bandwidth. This has implications for how one structures Internet-scale distributed computing: one puts computing as close to the data as possible in order to avoid expensive network traffic.
[ { "version": "v1", "created": "Fri, 12 Mar 2004 10:05:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
cs/0403020
Jim Gray
Aniruddha R. Thakar, Alexander S. Szalay, Peter Z. Kunszt, Jim Gray
The Sloan Digital Sky Survey Science Archive: Migrating a Multi-Terabyte Astronomical Archive from Object to Relational DBMS
null
Comput.Sci.Eng. 5 (2003) 16-29
null
null
cs.DB
null
The Sloan Digital Sky Survey Science Archive is the first in a series of multi-Terabyte digital archives in Astronomy and other data-intensive sciences. To facilitate data mining in the SDSS archive, we adapted a commercial database engine and built specialized tools on top of it. Originally we chose an object-oriented database management system due to its data organization capabilities, platform independence, query performance and conceptual fit to the data. However, after using the object database for the first couple of years of the project, it soon began to fall short in terms of its query support and data mining performance. This was as much due to the inability of the database vendor to respond our demands for features and bug fixes as it was due to their failure to keep up with the rapid improvements in hardware performance, particularly faster RAID disk systems. In the end, we were forced to abandon the object database and migrate our data to a relational database. We describe below the technical issues that we faced with the object database and how and why we migrated to relational technology.
[ { "version": "v1", "created": "Fri, 12 Mar 2004 10:20:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Thakar", "Aniruddha R.", "" ], [ "Szalay", "Alexander S.", "" ], [ "Kunszt", "Peter Z.", "" ], [ "Gray", "Jim", "" ] ]
cs/0403021
Jim Gray
Tom Barclay, Wyman Chong, Jim Gray
A Quick Look at SATA Disk Performance
null
null
null
MSR-TR-2003-70, Oct. 2003
cs.DB cs.PF
null
We have been investigating the use of low-cost, commodity components for multi-terabyte SQL Server databases. Dubbed storage bricks, these servers are white box PCs containing the largest ATA drives, value-priced AMD or Intel processors, and inexpensive ECC memory. One issue has been the wiring mess, air flow problems, length restrictions, and connector failures created by seven or more parallel ATA (PATA) ribbon cables and drives in]a tower or 3U rack-mount chassis. Large capacity Serial ATA (SATA) drives have recently become widely available for the PC environment at a reasonable price. In addition to being faster, the SATA connectors seem more reliable, have a more reasonable length restriction (1m) and allow better airflow. We tested two drive brands along with two RAID controllers to evaluate SATA drive performance and reliablility. This paper documents our results so far.
[ { "version": "v1", "created": "Fri, 12 Mar 2004 10:42:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Barclay", "Tom", "" ], [ "Chong", "Wyman", "" ], [ "Gray", "Jim", "" ] ]
cs/0403022
Martin Ziegler
Michael N\"usken, Martin Ziegler
Fast Multipoint-Evaluation of Bivariate Polynomials
12 pages, 1 figure. To appear in Proc. 12th ESA 2004
null
null
null
cs.DS
null
We generalize univariate multipoint evaluation of polynomials of degree n at sublinear amortized cost per point. More precisely, it is shown how to evaluate a bivariate polynomial p of maximum degree less than n, specified by its n^2 coefficients, simultaneously at n^2 given points using a total of O(n^{2.667}) arithmetic operations. In terms of the input size N being quadratic in n, this amounts to an amortized cost of O(N^{0.334}) per point.
[ { "version": "v1", "created": "Fri, 12 Mar 2004 14:31:43 GMT" }, { "version": "v2", "created": "Fri, 25 Jun 2004 17:17:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Nüsken", "Michael", "" ], [ "Ziegler", "Martin", "" ] ]
cs/0403023
Abdelhamid S. Abdelhamid
Ahmed A. Belal, Abdelhamid S. Abdelhamid
Secure Transmission of Sensitive data using multiple channels
5 pages
null
null
null
cs.CR
null
A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem among a set of channels. The purpose of using the Chinese Remainder Theorem is to hide the cipher text in order to increase the difficulty of attacking the cipher. The theory, implementation and the security of this scheme are described in this paper.
[ { "version": "v1", "created": "Sun, 14 Mar 2004 19:58:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Belal", "Ahmed A.", "" ], [ "Abdelhamid", "Abdelhamid S.", "" ] ]
cs/0403024
Krzysztof R. Apt
Krzysztof R. Apt
Uniform Proofs of Order Independence for Various Strategy Elimination Procedures
48 pages
Contributions to Theoretical Economics, Vol. 4: No. 1, Article 5, 2004, http://www.bepress.com/bejte/contributions/vol4/iss1/art5
null
null
cs.GT cs.LO
null
We provide elementary and uniform proofs of order independence for various strategy elimination procedures for finite strategic games, both for dominance by pure and by mixed strategies. The proofs follow the same pattern and focus on the structural properties of the dominance relations. They rely on Newman's Lemma established in 1942 and related results on the abstract reduction systems.
[ { "version": "v1", "created": "Mon, 15 Mar 2004 07:13:07 GMT" }, { "version": "v2", "created": "Tue, 28 Sep 2004 02:18:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/0403026
Pardha Pyla
Pardha S. Pyla, Manuel A. Perez-Quinones, James D. Arthur and H. Rex Hartson
What we should teach, but don't: Proposal for a cross pollinated HCI-SE curriculum
null
null
null
null
cs.OH
null
Software engineering (SE) and usability engineering (UE), as disciplines, have reached substantial levels of maturity. Each of these two disciplines is now well represented with respect to most computer science (CS) curricula. But, the two disciplines are practiced almost independently - missing oppurtunities to collaborate, coordinate and communicate about the overall design - and thereby contributing to system failures. Today, a confluence of several ingredients contribute to these failures: the increasing importance of the user interface (UI) component in the overall system, the independent maturation of the human computer interaction area, and the lack of a cohesive process model to integrate the UI experts' UE development efforts with that of SE. This in turn, we believe, is a result of a void in computing curricula: a lack of education and training regarding the importance of communication, collaboration and coordination between the SE and UE processes. In this paper we describe the current approach to teaching SE and UE and its shortcomings. We identify and analyze the barriers and issues involved in developing systems having substantial interactive components. We then propose four major themes of learning for a comprehensive computing curriculum integrating SE, UE, and system architectures in a project environment.
[ { "version": "v1", "created": "Mon, 15 Mar 2004 20:52:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Pyla", "Pardha S.", "" ], [ "Perez-Quinones", "Manuel A.", "" ], [ "Arthur", "James D.", "" ], [ "Hartson", "H. Rex", "" ] ]
cs/0403027
Francesc Rossello
Jaume Casasnovas, Joe Miro, Manuel Moya, Francesc Rossello
An approach to membrane computing under inexactitude
20 pages, 0 figures
null
null
null
cs.OH cs.NE
null
In this paper we introduce a fuzzy version of symport/antiport membrane systems. Our fuzzy membrane systems handle possibly inexact copies of reactives and their rules are endowed with threshold functions that determine whether a rule can be applied or not to a given set of objects, depending of the degree of accuracy of these objects to the reactives specified in the rule. We prove that these fuzzy membrane systems generate exactly the recursively enumerable finite-valued fuzzy sets of natural numbers.
[ { "version": "v1", "created": "Tue, 16 Mar 2004 09:02:39 GMT" }, { "version": "v2", "created": "Tue, 11 May 2004 08:27:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Casasnovas", "Jaume", "" ], [ "Miro", "Joe", "" ], [ "Moya", "Manuel", "" ], [ "Rossello", "Francesc", "" ] ]
cs/0403028
Manuel Carro
Manuel Carro
An Application of Rational Trees in a Logic Programming Interpreter for a Procedural Language
LaTeX2e, 13 pages, 2 tables, 11 figures (several of them, text). Yet unpublished
null
null
null
cs.DS cs.LO
null
We describe here a simple application of rational trees to the implementation of an interpreter for a procedural language written in a logic programming language. This is possible in languages designed to support rational trees (such as Prolog II and its descendants), but also in traditional Prolog, whose data structures are initially based on Herbrand terms, but in which implementations often omit the occurs check needed to avoid the creation of infinite data structures. We provide code implementing two interpreters, one of which needs non-occurs-check unification, which makes it faster (and more economic). We provide experimental data supporting this, and we argue that rational trees are interesting enough as to receive thorough support inside the language.
[ { "version": "v1", "created": "Tue, 16 Mar 2004 16:48:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Carro", "Manuel", "" ] ]
cs/0403030
Neil J. Gunther
K. J. Christensen, K. Yoshigoe, A. Roginsky and N. J. Gunther
Performance Evaluation of Packet-to-Cell Segmentation Schemes in Input Buffered Packet Switches
To be presented at the IEEE International Conference on Communications (ICC 2004) Paris, France, June 20-24 2004
null
null
null
cs.NI cs.PF
null
Most input buffered packet switches internally segment variable-length packets into fixed-length cells. The last cell in a segmented packet will contain overhead bytes if the packet length is not evenly divisible by the cell length. Switch speed-up is used to compensate for this overhead. In this paper, we develop an analytical model of a single-server queue where an input stream of packets is segmented into cells for service. Analytical models are developed for M/M/1, M/H2/1, and M/E2/1 queues with a discretized (or quantized) service time. These models and simulation using real packet traces are used to evaluate the effect of speed-up on mean queue length. We propose and evaluate a new method of segmenting a packet trailer and subsequent packet header into a single cell. This cell merging method reduces the required speed-up. No changes to switch-matrix scheduling algorithms are needed. Simulation with a packet trace shows a reduction in the needed speed-up for an iSLIP scheduled input buffered switch.
[ { "version": "v1", "created": "Wed, 17 Mar 2004 23:02:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Christensen", "K. J.", "" ], [ "Yoshigoe", "K.", "" ], [ "Roginsky", "A.", "" ], [ "Gunther", "N. J.", "" ] ]
cs/0403031
Victor Eliashberg
Victor Eliashberg
Concept of E-machine: How does a "dynamical" brain learn to process "symbolic" information? Part I
40 pages, 15 figures. The author is a consulting professor at the Stanford University, Department of Electrical Engineering and the president of Avel Electronics (consulting company)
null
null
null
cs.AI cs.LG
null
The human brain has many remarkable information processing characteristics that deeply puzzle scientists and engineers. Among the most important and the most intriguing of these characteristics are the brain's broad universality as a learning system and its mysterious ability to dynamically change (reconfigure) its behavior depending on a combinatorial number of different contexts. This paper discusses a class of hypothetically brain-like dynamically reconfigurable associative learning systems that shed light on the possible nature of these brain's properties. The systems are arranged on the general principle referred to as the concept of E-machine. The paper addresses the following questions: 1. How can "dynamical" neural networks function as universal programmable "symbolic" machines? 2. What kind of a universal programmable symbolic machine can form arbitrarily complex software in the process of programming similar to the process of biological associative learning? 3. How can a universal learning machine dynamically reconfigure its software depending on a combinatorial number of possible contexts?
[ { "version": "v1", "created": "Fri, 19 Mar 2004 17:13:55 GMT" }, { "version": "v2", "created": "Sat, 20 Mar 2004 07:51:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Eliashberg", "Victor", "" ] ]
cs/0403033
Philip Cox
Omid Banyasad, Philip T. Cox
Integrating design synthesis and assembly of structured objects in a visual design language
20 pages, 15 figures, to be published in The Theory and Practice of Logic programming (TPLP)
null
null
null
cs.LO cs.PL
null
Computer Aided Design systems provide tools for building and manipulating models of solid objects. Some also provide access to programming languages so that parametrised designs can be expressed. There is a sharp distinction, therefore, between building models, a concrete graphical editing activity, and programming, an abstract, textual, algorithm-construction activity. The recently proposed Language for Structured Design (LSD) was motivated by a desire to combine the design and programming activities in one language. LSD achieves this by extending a visual logic programming language to incorporate the notions of solids and operations on solids. Here we investigate another aspect of the LSD approach; namely, that by using visual logic programming as the engine to drive the parametrised assembly of objects, we also gain the powerful symbolic problem-solving capability that is the forte of logic programming languages. This allows the designer/programmer to work at a higher level, giving declarative specifications of a design in order to obtain the design descriptions. Hence LSD integrates problem solving, design synthesis, and prototype assembly in a single homogeneous programming/design environment. We demonstrate this specification-to-final-assembly capability using the masterkeying problem for designing systems of locks and keys.
[ { "version": "v1", "created": "Sun, 21 Mar 2004 20:30:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Banyasad", "Omid", "" ], [ "Cox", "Philip T.", "" ] ]
cs/0403034
Riccardo Pucella
Matthew Fluet, Riccardo Pucella
Phantom Types and Subtyping
41 pages. Preliminary version appears in the Proceedings of the 2nd IFIP International Conference on Theoretical Computer Science, pp. 448--460, 2002
null
null
null
cs.PL
null
We investigate a technique from the literature, called the phantom-types technique, that uses parametric polymorphism, type constraints, and unification of polymorphic types to model a subtyping hierarchy. Hindley-Milner type systems, such as the one found in Standard ML, can be used to enforce the subtyping relation, at least for first-order values. We show that this technique can be used to encode any finite subtyping hierarchy (including hierarchies arising from multiple interface inheritance). We formally demonstrate the suitability of the phantom-types technique for capturing first-order subtyping by exhibiting a type-preserving translation from a simple calculus with bounded polymorphism to a calculus embodying the type system of SML.
[ { "version": "v1", "created": "Tue, 23 Mar 2004 06:59:38 GMT" }, { "version": "v2", "created": "Sun, 14 Aug 2005 14:39:37 GMT" }, { "version": "v3", "created": "Sun, 29 Jan 2006 19:23:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Fluet", "Matthew", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0403035
Liang Wang
Wang Liang, Guo Yi-Ping, Fang Ming
Web pages search engine based on DNS
4 pages,1 figure
null
null
null
cs.NI cs.IR
null
Search engine is main access to the largest information source in this world, Internet. Now Internet is changing every aspect of our life. Information retrieval service may be its most important services. But for common user, internet search service is still far from our expectation, too many unrelated search results, old information, etc. To solve these problems, a new system, search engine based on DNS is proposed. The original idea, detailed content and implementation of this system all are introduced in this paper.
[ { "version": "v1", "created": "Tue, 23 Mar 2004 09:20:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Liang", "Wang", "" ], [ "Yi-Ping", "Guo", "" ], [ "Ming", "Fang", "" ] ]
cs/0403036
Liang Wang
Wang Liang, Guo Yi-Ping, Fang Ming
Domain resource integration system
6 pages,4 figures
null
null
null
cs.NI cs.DL
null
Domain Resource Integrated System (DRIS) is introduced in this paper. DRIS is a hierarchical distributed Internet information retrieval system. This system will solve some bottleneck problems such as long update interval, poor coverage in current web search system. DRIS will build the information retrieval infrastructure of Internet, but not a commercial search engine. The protocol series of DRIS are also detailed in this paper.
[ { "version": "v1", "created": "Tue, 23 Mar 2004 09:30:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Liang", "Wang", "" ], [ "Yi-Ping", "Guo", "" ], [ "Ming", "Fang", "" ] ]
cs/0403037
Sebastian Brand
Sebastian Brand and Krzysztof R. Apt
Schedulers and Redundancy for a Class of Constraint Propagation Rules
25 pages, to appear in the journal "Theory and Practice of Logic Programming"
null
null
null
cs.DS cs.PL
null
We study here schedulers for a class of rules that naturally arise in the context of rule-based constraint programming. We systematically derive a scheduler for them from a generic iteration algorithm of [Apt 2000]. We apply this study to so-called membership rules of [Apt and Monfroy 2001]. This leads to an implementation that yields a considerably better performance for these rules than their execution as standard CHR rules. Finally, we show how redundant rules can be identified and how appropriately reduced sets of rules can be computed.
[ { "version": "v1", "created": "Tue, 23 Mar 2004 11:42:45 GMT" }, { "version": "v2", "created": "Tue, 27 Apr 2004 18:31:17 GMT" }, { "version": "v3", "created": "Tue, 2 Nov 2004 12:47:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Brand", "Sebastian", "" ], [ "Apt", "Krzysztof R.", "" ] ]
cs/0403038
Marcus Hutter
Shane Legg and Marcus Hutter and Akshat Kumar
Tournament versus Fitness Uniform Selection
10 pages, 8 figures
Proc. 2004 Congress on Evolutionary Computation (CEC-2004), pages 2144--2151
null
IDSIA-04-04
cs.LG cs.AI
null
In evolutionary algorithms a critical parameter that must be tuned is that of selection pressure. If it is set too low then the rate of convergence towards the optimum is likely to be slow. Alternatively if the selection pressure is set too high the system is likely to become stuck in a local optimum due to a loss of diversity in the population. The recent Fitness Uniform Selection Scheme (FUSS) is a conceptually simple but somewhat radical approach to addressing this problem - rather than biasing the selection towards higher fitness, FUSS biases selection towards sparsely populated fitness levels. In this paper we compare the relative performance of FUSS with the well known tournament selection scheme on a range of problems.
[ { "version": "v1", "created": "Tue, 23 Mar 2004 15:17:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ], [ "Kumar", "Akshat", "" ] ]
cs/0403039
Wojciech Skut
Wojciech Skut, Stefan Ulrich, Kathrine Hammervold
A Flexible Rule Compiler for Speech Synthesis
10 pages, 6 figures
In: Klopotek, Mieczyslaw A.; Wierzchon, Slawomir T.; Trojanowski, Krzysztof (Eds.): "Intelligent Information Processing and Web Mining - Proceedings of the International IIS:IIPWM?04 Conference"; Springer Verlag, 2004
null
null
cs.CL cs.AI
null
We present a flexible rule compiler developed for a text-to-speech (TTS) system. The compiler converts a set of rules into a finite-state transducer (FST). The input and output of the FST are subject to parameterization, so that the system can be applied to strings and sequences of feature-structures. The resulting transducer is guaranteed to realize a function (as opposed to a relation), and therefore can be implemented as a deterministic device (either a deterministic FST or a bimachine).
[ { "version": "v1", "created": "Tue, 23 Mar 2004 21:06:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Skut", "Wojciech", "" ], [ "Ulrich", "Stefan", "" ], [ "Hammervold", "Kathrine", "" ] ]
cs/0403040
Fabrice Philippe
Guy Melancon, Fabrice Philippe
Generating connected acyclic digraphs uniformly at random
6 pages
null
null
null
cs.DM cs.DS
null
We describe a simple algorithm based on a Markov chain process to generate simply connected acyclic directed graphs over a fixed set of vertices. This algorithm is an extension of a previous one, designed to generate acyclic digraphs, non necessarily connected.
[ { "version": "v1", "created": "Thu, 25 Mar 2004 08:41:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Melancon", "Guy", "" ], [ "Philippe", "Fabrice", "" ] ]
cs/0403043
Danilo Gligoroski
Danilo Gligoroski
Stream cipher based on quasigroup string transformations in $Z_p^*$
Small revisions and added references
null
null
null
cs.CR
null
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string transformations. The cryptographical strength of the proposed stream cipher is based on the fact that breaking it would be at least as hard as solving systems of multivariate polynomial equations modulo big prime number $p$ which is NP-hard problem and there are no known fast randomized or deterministic algorithms for solving it. Unlikely the speed of known ciphers that work in $\bbbz_p^*$ for big prime numbers $p$, the speed of this stream cipher both in encryption and decryption phase is comparable with the fastest symmetric-key stream ciphers.
[ { "version": "v1", "created": "Tue, 30 Mar 2004 14:09:23 GMT" }, { "version": "v2", "created": "Thu, 22 Apr 2004 13:27:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Gligoroski", "Danilo", "" ] ]
cs/0403044
Amitabha Roy
Amitabha Roy and K. Gopinath
Scalable Probabilistic Models for 802.11 Protocol Verification
Currently in the process of submission
null
null
null
cs.LO cs.NI
null
The IEEE 802.11 protocol is a popular standard for wireless local area networks. Its medium access control layer (MAC) is a carrier sense multiple access with collision avoidance (CSMA/CA) design and includes an exponential backoff mechanism that makes it a possible target for probabilistic model checking. In this work, we identify ways to increase the scope of application of probabilistic model checking to the 802.11 MAC. Current techniques do not scale to networks of even moderate size. To work around this problem, we identify properties of the protocol that can be used to simplify the models and make verification feasible. Using these observations, we directly optimize the probabilistic timed automata models while preserving probabilistic reachability measures. We substantiate our claims of significant reduction by our results from using the probabilistic model checker PRISM.
[ { "version": "v1", "created": "Wed, 31 Mar 2004 13:42:22 GMT" }, { "version": "v2", "created": "Wed, 5 May 2004 18:30:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Roy", "Amitabha", "" ], [ "Gopinath", "K.", "" ] ]
cs/0404001
Garrison W. Greenwood
Garrison W. Greenwood
On the Practicality of Intrinsic Reconfiguration As a Fault Recovery Method in Analog Systems
6 pages
null
null
null
cs.PF cs.NE
null
Evolvable hardware combines the powerful search capability of evolutionary algorithms with the flexibility of reprogrammable devices, thereby providing a natural framework for reconfiguration. This framework has generated an interest in using evolvable hardware for fault-tolerant systems because reconfiguration can effectively deal with hardware faults whenever it is impossible to provide spares. But systems cannot tolerate faults indefinitely, which means reconfiguration does have a deadline. The focus of previous evolvable hardware research relating to fault-tolerance has been primarily restricted to restoring functionality, with no real consideration of time constraints. In this paper we are concerned with evolvable hardware performing reconfiguration under deadline constraints. In particular, we investigate reconfigurable hardware that undergoes intrinsic evolution. We show that fault recovery done by intrinsic reconfiguration has some restrictions, which designers cannot ignore.
[ { "version": "v1", "created": "Thu, 1 Apr 2004 16:54:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Greenwood", "Garrison W.", "" ] ]
cs/0404002
Tad Hogg
Kristina Lerman, Aram Galstyan, Tad Hogg
Mathematical Analysis of Multi-Agent Systems
latex, 15 figures, 42 pages
null
null
null
cs.RO cs.MA
null
We review existing approaches to mathematical modeling and analysis of multi-agent systems in which complex collective behavior arises out of local interactions between many simple agents. Though the behavior of an individual agent can be considered to be stochastic and unpredictable, the collective behavior of such systems can have a simple probabilistic description. We show that a class of mathematical models that describe the dynamics of collective behavior of multi-agent systems can be written down from the details of the individual agent controller. The models are valid for Markov or memoryless agents, in which each agents future state depends only on its present state and not any of the past states. We illustrate the approach by analyzing in detail applications from the robotics domain: collaboration and foraging in groups of robots.
[ { "version": "v1", "created": "Fri, 2 Apr 2004 02:00:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Lerman", "Kristina", "" ], [ "Galstyan", "Aram", "" ], [ "Hogg", "Tad", "" ] ]
cs/0404003
Jiang Qiu
Elisa Bertino, Barbara Catania, Roberta Gori
Enhancing the expressive power of the U-Datalog language
Appeared in Theory and Practice of Logic Programming, vol. 1, no. 1, 2001
Theory and Practice of Logic Programming, vol. 1, no. 1, 2001
null
null
cs.DB
null
U-Datalog has been developed with the aim of providing a set-oriented logical update language, guaranteeing update parallelism in the context of a Datalog-like language. In U-Datalog, updates are expressed by introducing constraints (+p(X), to denote insertion, and [minus sign]p(X), to denote deletion) inside Datalog rules. A U-Datalog program can be interpreted as a CLP program. In this framework, a set of updates (constraints) is satisfiable if it does not represent an inconsistent theory, that is, it does not require the insertion and the deletion of the same fact. This approach resembles a very simple form of negation. However, on the other hand, U-Datalog does not provide any mechanism to explicitly deal with negative information, resulting in a language with limited expressive power. In this paper, we provide a semantics, based on stratification, handling the use of negated atoms in U-Datalog programs, and we show which problems arise in defining a compositional semantics.
[ { "version": "v1", "created": "Fri, 2 Apr 2004 02:03:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertino", "Elisa", "" ], [ "Catania", "Barbara", "" ], [ "Gori", "Roberta", "" ] ]
cs/0404004
Liam Wagner
Liam Wagner
Dealing With Curious Players in Secure Networks
4 pages and 1 figure
null
null
null
cs.CR cs.GT cs.MA
null
In secure communications networks there are a great number of user behavioural problems, which need to be dealt with. Curious players pose a very real and serious threat to the integrity of such a network. By traversing a network a Curious player could uncover secret information, which that user has no need to know, by simply posing as a loyalty check. Loyalty checks are done simply to gauge the integrity of the network with respect to players who act in a malicious manner. We wish to propose a method, which can deal with Curious players trying to obtain "Need to Know" information using a combined Fault-tolerant, Cryptographic and Game Theoretic Approach.
[ { "version": "v1", "created": "Fri, 2 Apr 2004 05:16:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Wagner", "Liam", "" ] ]
cs/0404005
Maximillian Dornseif
Maximillian Dornseif
Government mandated blocking of foreign Web content
Preprint, revised 30.6.2003
In: Jan von Knop, Wilhelm Haverkamp, Eike Jessen (Editors) Security, E-Learning, E-Services: Proceedings of the 17. DFN-Arbeitstagung ueber Kommunikationsnetze, Duesseldorf 2003, ISBN 3-88579-373-3; Series: Lecture Notes in Informatics ISSN 1617-5468; Pages 617-648
null
null
cs.CY cs.NI
null
Blocking of foreign Web content by Internet access providers has been a hot topic for the last 18 months in Germany. Since fall 2001 the state of North-Rhine-Westphalia very actively tries to mandate such blocking. This paper will take a technical view on the problems imposed by the blocking orders and blocking content at access or network provider level in general. It will also give some empirical data on the effects of the blocking orders to help in the legal assessment of the orders.
[ { "version": "v1", "created": "Fri, 2 Apr 2004 09:27:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Dornseif", "Maximillian", "" ] ]
cs/0404006
Chung-Chieh Shan
Chung-chieh Shan
Delimited continuations in natural language: quantification and polarity sensitivity
10 pages
In CW'04: Proceedings of the 4th ACM SIGPLAN workshop on continuations, ed. Hayo Thielecke, 55-64. Technical report CSR-04-1, School of Computer Science, University of Birmingham (2004)
null
null
cs.CL cs.PL
null
Making a linguistic theory is like making a programming language: one typically devises a type system to delineate the acceptable utterances and a denotational semantics to explain observations on their behavior. Via this connection, the programming language concept of delimited continuations can help analyze natural language phenomena such as quantification and polarity sensitivity. Using a logical metalanguage whose syntax includes control operators and whose semantics involves evaluation order, these analyses can be expressed in direct style rather than continuation-passing style, and these phenomena can be thought of as computational side effects.
[ { "version": "v1", "created": "Mon, 5 Apr 2004 01:53:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Shan", "Chung-chieh", "" ] ]
cs/0404007
Chung-Chieh Shan
Chung-chieh Shan
Polarity sensitivity and evaluation order in type-logical grammar
4 pages
Proceedings of the 2004 Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics
null
null
cs.CL
null
We present a novel, type-logical analysis of_polarity sensitivity_: how negative polarity items (like "any" and "ever") or positive ones (like "some") are licensed or prohibited. It takes not just scopal relations but also linear order into account, using the programming-language notions of delimited continuations and evaluation order, respectively. It thus achieves greater empirical coverage than previous proposals.
[ { "version": "v1", "created": "Mon, 5 Apr 2004 02:14:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Shan", "Chung-chieh", "" ] ]
cs/0404008
Mme Joanna Janik
Jean-Guillaume Dumas
Efficient dot product over word-size finite fields
null
null
null
IMAG - LMC RR n 1064 - I
cs.SC
null
We want to achieve efficiency for the exact computation of the dot product of two vectors over word-size finite fields. We therefore compare the practical behaviors of a wide range of implementation techniques using different representations. The techniques used include oating point representations, discrete logarithms, tabulations, Montgomery reduction, delayed modulus.
[ { "version": "v1", "created": "Mon, 5 Apr 2004 07:24:15 GMT" }, { "version": "v2", "created": "Mon, 19 Apr 2004 15:08:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Dumas", "Jean-Guillaume", "" ] ]
cs/0404009
Mark-Jan Nederhof
Mark-Jan Nederhof, Giorgio Satta
Tabular Parsing
21 pages, 14 figures
M.-J. Nederhof and G. Satta. Tabular Parsing. In C. Martin-Vide, V. Mitrana, and G. Paun, editors, Formal Languages and Applications, Studies in Fuzziness and Soft Computing 148, pages 529-549. Springer, 2004
null
null
cs.CL
null
This is a tutorial on tabular parsing, on the basis of tabulation of nondeterministic push-down automata. Discussed are Earley's algorithm, the Cocke-Kasami-Younger algorithm, tabular LR parsing, the construction of parse trees, and further issues.
[ { "version": "v1", "created": "Mon, 5 Apr 2004 11:51:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Nederhof", "Mark-Jan", "" ], [ "Satta", "Giorgio", "" ] ]
cs/0404010
Lev Shchur
Serge A. Krashakov, Anton B. Teslyuk, Lev N. Shchur
On the universality of rank distributions of website popularity
6 pages with 5 figures, IEEEtran.cls, paper substantially rewritten, new figure and tables added
Computer Networks, 50, 1769-1780 (2006)
null
null
cs.NI cond-mat.stat-mech
null
We present an extensive analysis of long-term statistics of the queries to websites using logs collected on several web caches in Russian academic networks and on US IRCache caches. We check the sensitivity of the statistics to several parameters: (1) duration of data collection, (2) geographical location of the cache server collecting data, and (3) the year of data collection. We propose a two-parameter modification of the Zipf law and interpret the parameters. We find that the rank distribution of websites is stable when approximated by the modified Zipf law. We suggest that website popularity may be a universal property of Internet.
[ { "version": "v1", "created": "Mon, 5 Apr 2004 15:17:22 GMT" }, { "version": "v2", "created": "Fri, 5 Aug 2005 20:00:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Krashakov", "Serge A.", "" ], [ "Teslyuk", "Anton B.", "" ], [ "Shchur", "Lev N.", "" ] ]
cs/0404011
Francesco Calimeri
G. Ianni, F. Calimeri, A. Pietramala, M.C. Santoro
Parametric external predicates for the DLV System
10 pages
null
null
null
cs.AI
null
This document describes syntax, semantics and implementation guidelines in order to enrich the DLV system with the possibility to make external C function calls. This feature is realized by the introduction of parametric external predicates, whose extension is not specified through a logic program but implicitly computed through external code.
[ { "version": "v1", "created": "Mon, 5 Apr 2004 17:15:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Ianni", "G.", "" ], [ "Calimeri", "F.", "" ], [ "Pietramala", "A.", "" ], [ "Santoro", "M. C.", "" ] ]
cs/0404012
Francesco Calimeri
Francesco Calimeri, Nicola Leone
Toward the Implementation of Functions in the DLV System (Preliminary Technical Report)
7 pages
null
null
null
cs.AI
null
This document describes the functions as they are treated in the DLV system. We give first the language, then specify the main implementation issues.
[ { "version": "v1", "created": "Mon, 5 Apr 2004 17:23:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Calimeri", "Francesco", "" ], [ "Leone", "Nicola", "" ] ]
cs/0404013
Kevin Lai
Kevin Lai, Bernardo A. Huberman, and Leslie Fine
Tycoon: A Distributed Market-based Resource Allocation System
null
null
null
null
cs.DC cs.MA
null
P2P clusters like the Grid and PlanetLab enable in principle the same statistical multiplexing efficiency gains for computing as the Internet provides for networking. The key unsolved problem is resource allocation. Existing solutions are not economically efficient and require high latency to acquire resources. We designed and implemented Tycoon, a market based distributed resource allocation system based on an Auction Share scheduling algorithm. Preliminary results show that Tycoon achieves low latency and high fairness while providing incentives for truth-telling on the part of strategic users.
[ { "version": "v1", "created": "Mon, 5 Apr 2004 19:54:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Lai", "Kevin", "" ], [ "Huberman", "Bernardo A.", "" ], [ "Fine", "Leslie", "" ] ]
cs/0404018
Jiyou Jia
Jiyou Jia
NLML--a Markup Language to Describe the Unlimited English Grammar
15 Pages, 2 Figures, 3 Tables submitted to German Conference for Artificial Intelligence 2004 Ulm
null
null
null
cs.CL cs.AI
null
In this paper we present NLML (Natural Language Markup Language), a markup language to describe the syntactic and semantic structure of any grammatically correct English expression. At first the related works are analyzed to demonstrate the necessity of the NLML: simple form, easy management and direct storage. Then the description of the English grammar with NLML is introduced in details in three levels: sentences (with different complexities, voices, moods, and tenses), clause (relative clause and noun clause) and phrase (noun phrase, verb phrase, prepositional phrase, adjective phrase, adverb phrase and predicate phrase). At last the application fields of the NLML in NLP are shown with two typical examples: NLOJM (Natural Language Object Modal in Java) and NLDB (Natural Language Database).
[ { "version": "v1", "created": "Wed, 7 Apr 2004 06:54:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Jia", "Jiyou", "" ] ]
cs/0404020
Gopalan Nadathur
Gopalan Nadathur
A treatment of higher-order features in logic programming
50 pages, 4 figures, 2 tables. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL
null
The logic programming paradigm provides the basis for a new intensional view of higher-order notions. This view is realized primarily by employing the terms of a typed lambda calculus as representational devices and by using a richer form of unification for probing their structures. These additions have important meta-programming applications but they also pose non-trivial implementation problems. One issue concerns the machine representation of lambda terms suitable to their intended use: an adequate encoding must facilitate comparison operations over terms in addition to supporting the usual reduction computation. Another aspect relates to the treatment of a unification operation that has a branching character and that sometimes calls for the delaying of the solution of unification problems. A final issue concerns the execution of goals whose structures become apparent only in the course of computation. These various problems are exposed in this paper and solutions to them are described. A satisfactory representation for lambda terms is developed by exploiting the nameless notation of de Bruijn as well as explicit encodings of substitutions. Special mechanisms are molded into the structure of traditional Prolog implementations to support branching in unification and carrying of unification problems over other computation steps; a premium is placed in this context on exploiting determinism and on emulating usual first-order behaviour. An extended compilation model is presented that treats higher-order unification and also handles dynamically emergent goals. The ideas described here have been employed in the Teyjus implementation of the Lambda Prolog language, a fact that is used to obtain a preliminary assessment of their efficacy.
[ { "version": "v1", "created": "Wed, 7 Apr 2004 17:26:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Nadathur", "Gopalan", "" ] ]
cs/0404021
Jean-Charles Delvenne
Jean-Charles Delvenne, Petr Kurka and Vincent Blondel
Decidability and Universality in Symbolic Dynamical Systems
23 pages; a shorter version is submitted to conference MCU 2004 v2: minor orthographic changes v3: section 5.2 (collatz functions) mathematically improved v4: orthographic corrections, one reference added v5:27 pages. Important modifications. The formalism is strengthened: temporal logic replaced by finite automata. New results. Submitted
null
null
null
cs.CC cs.LO
null
Many different definitions of computational universality for various types of dynamical systems have flourished since Turing's work. We propose a general definition of universality that applies to arbitrary discrete time symbolic dynamical systems. Universality of a system is defined as undecidability of a model-checking problem. For Turing machines, counter machines and tag systems, our definition coincides with the classical one. It yields, however, a new definition for cellular automata and subshifts. Our definition is robust with respect to initial condition, which is a desirable feature for physical realizability. We derive necessary conditions for undecidability and universality. For instance, a universal system must have a sensitive point and a proper subsystem. We conjecture that universal systems have infinite number of subsystems. We also discuss the thesis according to which computation should occur at the `edge of chaos' and we exhibit a universal chaotic system.
[ { "version": "v1", "created": "Thu, 8 Apr 2004 02:45:34 GMT" }, { "version": "v2", "created": "Fri, 9 Apr 2004 13:02:57 GMT" }, { "version": "v3", "created": "Mon, 13 Sep 2004 14:04:06 GMT" }, { "version": "v4", "created": "Fri, 8 Jul 2005 11:43:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Delvenne", "Jean-Charles", "" ], [ "Kurka", "Petr", "" ], [ "Blondel", "Vincent", "" ] ]
cs/0404022
Artur Rataj
Artur Rataj
An Algorithm for Transforming Color Images into Tactile Graphics
9 pages, 7 figures
null
null
IITiS-20040408-1-1
cs.GR
null
This paper presents an algorithm that transforms color visual images, like photographs or paintings, into tactile graphics. In the algorithm, the edges of objects are detected and colors of the objects are estimated. Then, the edges and the colors are encoded into lines and textures in the output tactile image. Design of the method is substantiated by various qualities of haptic recognizing of images. Also, means of presentation of the tactile images in printouts are discussed. Example translated images are shown.
[ { "version": "v1", "created": "Thu, 8 Apr 2004 14:07:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Rataj", "Artur", "" ] ]
cs/0404025
Atsushi Fujii
Atsushi Fujii, Makoto Iwayama, and Noriko Kando
Test Collections for Patent-to-Patent Retrieval and Patent Map Generation in NTCIR-4 Workshop
4 pages, Proceedings of the 4th International Conference on Language Resources and Evaluation (to appear)
Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC-2004), pp.1643-1646, May. 2004.
null
null
cs.CL
null
This paper describes the Patent Retrieval Task in the Fourth NTCIR Workshop, and the test collections produced in this task. We perform the invalidity search task, in which each participant group searches a patent collection for the patents that can invalidate the demand in an existing claim. We also perform the automatic patent map generation task, in which the patents associated with a specific topic are organized in a multi-dimensional matrix.
[ { "version": "v1", "created": "Sat, 10 Apr 2004 08:43:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Iwayama", "Makoto", "" ], [ "Kando", "Noriko", "" ] ]
cs/0404026
Darran Nathan
Darran Nathan, Eva Rosdiana, Chua Beng Koon
DAB Content Annotation and Receiver Hardware Control with XML
6 pages, 7 figures
null
null
null
cs.GL cs.CL
null
The Eureka-147 Digital Audio Broadcasting (DAB) standard defines the 'dynamic labels' data field for holding information about the transmission content. However, this information does not follow a well-defined structure since it is designed to carry text for direct output to displays, for human interpretation. This poses a problem when machine interpretation of DAB content information is desired. Extensible Markup Language (XML) was developed to allow for the well-defined, structured machine-to-machine exchange of data over computer networks. This article proposes a novel technique of machine-interpretable DAB content annotation and receiver hardware control, involving the utilisation of XML as metadata in the transmitted DAB frames.
[ { "version": "v1", "created": "Sun, 11 Apr 2004 08:36:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Nathan", "Darran", "" ], [ "Rosdiana", "Eva", "" ], [ "Koon", "Chua Beng", "" ] ]