id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0402001 | Robert G. Capra III | Robert G. Capra, Manuel A. Perez-Quinones | Mobile Re-Finding of Web Information Using a Voice Interface | null | null | null | null | cs.HC cs.IR | null | Mobile access to information is a considerable problem for many users,
especially to information found on the Web. In this paper, we explore how a
voice-controlled service, accessible by telephone, could support mobile users'
needs for refinding specific information previously found on the Web. We
outline challenges in creating such a service and describe architectural and
user interfaces issues discovered in an exploratory prototype we built called
WebContext.
We also present the results of a study, motivated by our experience with
WebContext, to explore what people remember about information that they are
trying to refind and how they express information refinding requests in a
collaborative conversation. As part of the study, we examine how
end-usercreated Web page annotations can be used to help support mobile
information re-finding. We observed the use of URLs, page titles, and
descriptions of page contents to help identify waypoints in the search process.
Furthermore, we observed that the annotations were utilized extensively,
indicating that explicitly added context by the user can play an important role
in re-finding.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2004 20:09:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Capra",
"Robert G.",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
]
] |
cs/0402002 | Ofer Strichman | Ofer Strichman | Deciding Disjunctive Linear Arithmetic with SAT | null | null | null | null | cs.LO | null | Disjunctive Linear Arithmetic (DLA) is a major decidable theory that is
supported by almost all existing theorem provers. The theory consists of
Boolean combinations of predicates of the form $\Sigma_{j=1}^{n}a_j\cdot x_j
\le b$, where the coefficients $a_j$, the bound $b$ and the variables $x_1 >...
x_n$ are of type Real ($\mathbb{R}$). We show a reduction to propositional
logic from disjunctive linear arithmetic based on Fourier-Motzkin elimination.
While the complexity of this procedure is not better than competing techniques,
it has practical advantages in solving verification problems. It also promotes
the option of deciding a combination of theories by reducing them to this
logic. Results from experiments show that this method has a strong advantage
over existing techniques when there are many disjunctions in the formula.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2004 12:42:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Strichman",
"Ofer",
""
]
] |
cs/0402004 | Shujun Li Dr. | Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou and Yuanlong Cai | Baptista-type chaotic cryptosystems: Problems and countermeasures | 13 pages, 2 figures | Physics Letters A, 332(5-6):368-375, 2004 | 10.1016/j.physleta.2004.09.028 | null | cs.CR nlin.CD | null | In 1998, M. S. Baptista proposed a chaotic cryptosystem, which has attracted
much attention from the chaotic cryptography community: some of its
modifications and also attacks have been reported in recent years. In [Phys.
Lett. A 307 (2003) 22], we suggested a method to enhance the security of
Baptista-type cryptosystem, which can successfully resist all proposed attacks.
However, the enhanced Baptista-type cryptosystem has a nontrivial defect, which
produces errors in the decrypted data with a generally small but nonzero
probability, and the consequent error propagation exists. In this Letter, we
analyze this defect and discuss how to rectify it. In addition, we point out
some newly-found problems existing in all Baptista-type cryptosystems and
consequently propose corresponding countermeasures.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2004 10:39:12 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Nov 2004 05:41:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Shujun",
""
],
[
"Chen",
"Guanrong",
""
],
[
"Wong",
"Kwok-Wo",
""
],
[
"Mou",
"Xuanqin",
""
],
[
"Cai",
"Yuanlong",
""
]
] |
cs/0402005 | Krzysztof C. Kiwiel | Krzysztof C. Kiwiel | Improved randomized selection | 14 pages | null | null | PMMO-04-02 | cs.DS | null | We show that several versions of Floyd and Rivest's improved algorithm Select
for finding the $k$th smallest of $n$ elements require at most
$n+\min\{k,n-k\}+O(n^{1/2}\ln^{1/2}n)$ comparisons on average and with high
probability. This rectifies the analysis of Floyd and Rivest, and extends it to
the case of nondistinct elements. Encouraging computational results on large
median-finding problems are reported.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2004 14:16:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiwiel",
"Krzysztof C.",
""
]
] |
cs/0402006 | Richard McClatchey | S. Roberto Amendolia, Michael Brady, Richard McClatchey, Miguel
Mulet-Parada, Mohammed Odeh & Tony Solomonides | MammoGrid: Large-Scale Distributed Mammogram Analysis | 6 Pages, Presented at Medical Informatics Europe MIE'2003. ST Malo,
France May 2003 | null | null | null | cs.SE | null | Breast cancer as a medical condition and mammograms as images exhibit many
dimensions of variability across the population. Similarly, the way diagnostic
systems are used and maintained by clinicians varies between imaging centres
and breast screening programmes, and so does the appearance of the mammograms
generated. A distributed database that reflects the spread of pathologies
across the population is an invaluable tool for the epidemiologist and the
understanding of the variation in image acquisition protocols is essential to a
radiologist in a screening programme. Exploiting emerging grid technology, the
aim of the MammoGrid [1] project is to develop a Europe-wide database of
mammograms that will be used to investigate a set of important healthcare
applications and to explore the potential of the grid to support effective
co-working between healthcare professionals.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2004 19:34:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amendolia",
"S. Roberto",
""
],
[
"Brady",
"Michael",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Mulet-Parada",
"Miguel",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"Solomonides",
"Tony",
""
]
] |
cs/0402009 | Richard McClatchey | F Estrella, C del Frate, T Hauer, R McClatchey, M Odeh, D Rogulin, S R
Amendolia, D Schottlander, T Solomonides, R Warren | Resolving Clinicians Queries Across a Grids Infrastructure | 8 pages, 3 figures. Presented at the 2nd Int Conf on HealthGrids
Clermont-Ferrand, France January 2004 and accepted by Methods of Information
in Medicine | null | null | null | cs.DB cs.SE | null | The past decade has witnessed order of magnitude increases in computing
power, data storage capacity and network speed, giving birth to applications
which may handle large data volumes of increased complexity, distributed over
the Internet. Grids computing promises to resolve many of the difficulties in
facilitating medical image analysis to allow radiologists to collaborate
without having to co-locate. The EU-funded MammoGrid project aims to
investigate the feasibility of developing a Grid-enabled European database of
mammograms and provide an information infrastructure which federates multiple
mammogram databases. This will enable clinicians to develop new common,
collaborative and co-operative approaches to the analysis of mammographic data.
This paper focuses on one of the key requirements for large-scale distributed
mammogram analysis: resolving queries across a grid-connected federation of
images.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2004 14:32:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Estrella",
"F",
""
],
[
"del Frate",
"C",
""
],
[
"Hauer",
"T",
""
],
[
"McClatchey",
"R",
""
],
[
"Odeh",
"M",
""
],
[
"Rogulin",
"D",
""
],
[
"Amendolia",
"S R",
""
],
[
"Schottlander",
"D",
""
],
[
"Solomonides",
"T",
""
],
[
"Warren",
"R",
""
]
] |
cs/0402010 | Judith Beumer | Olga Shumsky Matlin and William McCune | Encapsulation for Practical Simplification Procedures | 6 pages | null | null | Preprint ANL/MCS-P1039-0403 | cs.LO | null | ACL2 was used to prove properties of two simplification procedures. The
procedures differ in complexity but solve the same programming problem that
arises in the context of a resolution/paramodulation theorem proving system.
Term rewriting is at the core of the two procedures, but details of the
rewriting procedure itself are irrelevant. The ACL2 encapsulate construct was
used to assert the existence of the rewriting function and to state some of its
properties. Termination, irreducibility, and soundness properties were
established for each procedure. The availability of the encapsulation mechanism
in ACL2 is considered essential to rapid and efficient verification of this
kind of algorithm.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2004 19:04:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Matlin",
"Olga Shumsky",
""
],
[
"McCune",
"William",
""
]
] |
cs/0402012 | Joseph Y. Halpern | Joseph Y. Halpern and Aleta Ricciardi | A Knowledge-Theoretic Analysis of Uniform Distributed Coordination and
Failure Detectors | A preliminary version of this paper appeared in the 18th ACM
Symposium on Principles of Distributed Computing, 1999, pp. 73-82. This
version will appear in Distributed Computing | null | null | null | cs.DC | null | It is shown that, in a precise sense, if there is no bound on the number of
faulty processes in a system with unreliable but fair communication, Uniform
Distributed Coordination (UDC) can be attained if and only if a system has
perfect failure detectors. This result is generalized to the case where there
is a bound t on the number of faulty processes. It is shown that a certain type
of generalized failure detector is necessary and sufficient for achieving UDC
in a context with at most t faulty processes. Reasoning about processes'
knowledge as to which other processes are faulty plays a key role in the
analysis.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2004 17:15:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Ricciardi",
"Aleta",
""
]
] |
cs/0402013 | Pascal Hitzler | Pascal Hitzler | Corollaries on the fixpoint completion: studying the stable semantics by
means of the Clark completion | 15 pages. Presented at the 18th Workshop on Logic Programming,
Potsdam, Germany, March 2004 | null | null | null | cs.AI cs.LO | null | The fixpoint completion fix(P) of a normal logic program P is a program
transformation such that the stable models of P are exactly the models of the
Clark completion of fix(P). This is well-known and was studied by Dung and
Kanchanasut (1989). The correspondence, however, goes much further: The
Gelfond-Lifschitz operator of P coincides with the immediate consequence
operator of fix(P), as shown by Wendt (2002), and even carries over to standard
operators used for characterizing the well-founded and the Kripke-Kleene
semantics. We will apply this knowledge to the study of the stable semantics,
and this will allow us to almost effortlessly derive new results concerning
fixed-point and metric-based semantics, and neural-symbolic integration.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2004 11:03:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hitzler",
"Pascal",
""
]
] |
cs/0402015 | Ramon Asensio | Ramon Asensio Monge, Francisco Sanchis Marco, Fernando Torre Cervigon,
Victor Garcia Garcia, Gustavo Uria Paino | A Preliminary Study for the development of an Early Method for the
Measurement in Function Points of a Software Product | 6 pages, 3 figures | null | null | null | cs.SE | null | The Function Points Analysis (FPA) of A.J. Albrecht is a method to determine
the functional size of software products. The International Function Point
Users Group, (IFPUG), establishes the FPA like a standard in the software
functional size measurement. The IFPUG [3] [4] method follows the Albrecht's
method and incorporates in its succesive versions modifications to the rules
and hints with the intention of improving it [7]. The required documentation
level to apply the method is the functional specification which corresponds to
level I in the Rudolph's clasification [8]. This documentation is avalaible
with some difficulty for those companies which are dedicated to develop
software for third parties when they have to prepare the appropiate budget for
this development. Then, we face the need of developing an early method [6] [9]
for measuring the functional size of a software product that we will name to
abbreviate it Early Method or EFPM (Early Function Point Method). The required
documentation to apply the EFPM would be the User Requirements or some
analogous documentations. This is a part of a research work now in process in
Oviedo University. In this article we only show the following, results:
From the measurements of a set of projects using the IFPUG method v. 4.1 we
obtain the linear correlation coefficients between the total number of Function
Points for each project and the counters of the ILFs number, ILFs+EIFs number
and EIs+EOs+EQs number.
Using the preliminary results we compute the regression functions. This
results we will allow us to determine the factors to be considered in the
development of EFPM and to estimate the function points.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2004 12:43:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Monge",
"Ramon Asensio",
""
],
[
"Marco",
"Francisco Sanchis",
""
],
[
"Cervigon",
"Fernando Torre",
""
],
[
"Garcia",
"Victor Garcia",
""
],
[
"Paino",
"Gustavo Uria",
""
]
] |
cs/0402017 | Rajkumar Buyya | Akshay Luther, Rajkumar Buyya, Rajiv Ranjan, and Srikumar Venugopal | Alchemi: A .NET-based Grid Computing Framework and its Integration into
Global Grids | 17 pages, 12 figures, 2 tables | Technical Report, GRIDS-TR-2003-8, Grid Computing and Distributed
Systems Laboratory, University of Melbourne, Australia, December 2003 | null | GRIDS-TR-2003-8 | cs.DC | null | Computational grids that couple geographically distributed resources are
becoming the de-facto computing platform for solving large-scale problems in
science, engineering, and commerce. Software to enable grid computing has been
primarily written for Unix-class operating systems, thus severely limiting the
ability to effectively utilize the computing resources of the vast majority of
desktop computers i.e. those running variants of the Microsoft Windows
operating system. Addressing Windows-based grid computing is particularly
important from the software industry's viewpoint where interest in grids is
emerging rapidly. Microsoft's .NET Framework has become near-ubiquitous for
implementing commercial distributed systems for Windows-based platforms,
positioning it as the ideal platform for grid computing in this context. In
this paper we present Alchemi, a .NET-based grid computing framework that
provides the runtime machinery and programming environment required to
construct desktop grids and develop grid applications. It allows flexible
application composition by supporting an object-oriented grid application
programming model in addition to a grid job model. Cross-platform support is
provided via a web services interface and a flexible execution model supports
dedicated and non-dedicated (voluntary) execution by grid nodes.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2004 09:18:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luther",
"Akshay",
""
],
[
"Buyya",
"Rajkumar",
""
],
[
"Ranjan",
"Rajiv",
""
],
[
"Venugopal",
"Srikumar",
""
]
] |
cs/0402018 | Rajkumar Buyya | Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya | P2P Networks for Content Sharing | 35 pages, 26 figures | Technical Report, GRIDS-TR-2003-7, Grid Computing and Distributed
Systems Laboratory, University of Melbourne, Australia, December 2003 | null | GRIDS-TR-2003-7 | cs.DC | null | Peer-to-peer (P2P) technologies have been widely used for content sharing,
popularly called "file-swapping" networks. This chapter gives a broad overview
of content sharing P2P technologies. It starts with the fundamental concept of
P2P computing followed by the analysis of network topologies used in
peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster,
Gnutella, and Fasttrack are explored in details, and they are finally concluded
with the comparison table in the last section.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2004 14:24:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ding",
"Choon Hoong",
""
],
[
"Nutanong",
"Sarana",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0402019 | Thom Fruehwirth | Thom Fruehwirth and Slim Abdennadher | The Munich Rent Advisor: A Success for Logic Programming on the Internet | null | null | null | null | cs.AI cs.DS | null | Most cities in Germany regularly publish a booklet called the {\em
Mietspiegel}. It basically contains a verbal description of an expert system.
It allows the calculation of the estimated fair rent for a flat. By hand, one
may need a weekend to do so. With our computerized version, the {\em Munich
Rent Advisor}, the user just fills in a form in a few minutes and the rent is
calculated immediately. We also extended the functionality and applicability of
the {\em Mietspiegel} so that the user need not answer all questions on the
form. The key to computing with partial information using high-level
programming was to use constraint logic programming. We rely on the internet,
and more specifically the World Wide Web, to provide this service to a broad
user group. More than ten thousand people have used our service in the last
three years. This article describes the experiences in implementing and using
the {\em Munich Rent Advisor}. Our results suggests that logic programming with
constraints can be an important ingredient in intelligent internet systems.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2004 15:10:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fruehwirth",
"Thom",
""
],
[
"Abdennadher",
"Slim",
""
]
] |
cs/0402020 | Tin Kam Ho | Tin Kam Ho | Geometrical Complexity of Classification Problems | Proceedings of the 7th Course on Ensemble Methods for Learning
Machines at the International School on Neural Nets ``E.R. Caianiello'' | null | null | null | cs.CV | null | Despite encouraging recent progresses in ensemble approaches, classification
methods seem to have reached a plateau in development. Further advances depend
on a better understanding of geometrical and topological characteristics of
point sets in high-dimensional spaces, the preservation of such characteristics
under feature transformations and sampling processes, and their interaction
with geometrical models used in classifiers. We discuss an attempt to measure
such properties from data sets and relate them to classifier accuracies.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2004 16:34:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ho",
"Tin Kam",
""
]
] |
cs/0402021 | Tin Kam Ho | Tin Kam Ho | A Numerical Example on the Principles of Stochastic Discrimination | Proceedings of the 7th Course on Ensemble Methods for Learning
Machines at the International School on Neural Nets ``E.R. Caianiello'' | null | null | null | cs.CV cs.LG | null | Studies on ensemble methods for classification suffer from the difficulty of
modeling the complementary strengths of the components. Kleinberg's theory of
stochastic discrimination (SD) addresses this rigorously via mathematical
notions of enrichment, uniformity, and projectability of an ensemble. We
explain these concepts via a very simple numerical example that captures the
basic principles of the SD theory and method. We focus on a fundamental
symmetry in point set covering that is the key observation leading to the
foundation of the theory. We believe a better understanding of the SD method
will lead to developments of better tools for analyzing other ensemble methods.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2004 15:45:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ho",
"Tin Kam",
""
]
] |
cs/0402022 | Saverio Perugini | Saverio Perugini, Naren Ramakrishnan, and Edward A. Fox | Automatically Generating Interfaces for Personalized Interaction with
Digital Libraries | Communicated as a short paper to the Fourth ACM/IEEE-CS Joint
Conference on Digital Libraries (JCDL'04), Tuscon, AZ, June 2004; 2 pages, 1
figure | null | null | null | cs.DL cs.HC | null | We present an approach to automatically generate interfaces supporting
personalized interaction with digital libraries; these interfaces augment the
user-DL dialog by empowering the user to (optionally) supply out-of-turn
information during an interaction, flatten or restructure the dialog, and
enquire about dialog options. Interfaces generated using this approach for
CITIDEL are described.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2004 03:00:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perugini",
"Saverio",
""
],
[
"Ramakrishnan",
"Naren",
""
],
[
"Fox",
"Edward A.",
""
]
] |
cs/0402023 | Richard McClatchey | Florida Estrella, Richard McClatchey, Dmitry Rogulina, Roberto
Amendolia, Tony Solomonides | A Service-Based Approach for Managing Mammography Data | 5 pages, 7 figures. Accepted by the 11th World Congress on Medical
Informatics (MedInfo'04). San Francisco, USA. September 2004 | null | null | null | cs.DB cs.SE | null | Grid-based technologies are emerging as a potential open-source
standards-based solution for managing and collabo-rating distributed resources.
In view of these new computing solutions, the Mammogrid project is developing a
service-based and Grid-aware application which manages a Euro-pean-wide
database of mammograms. Medical conditions such as breast cancer, and
mammograms as images, are ex-tremely complex with many dimensions of
variability across the population. An effective solution for the management of
disparate mammogram data sources is a federation of autonomous multi-centre
sites which transcends national boundaries. The Mammogrid solution utilizes the
Grid tech-nologies to integrate geographically distributed data sets. The
Mammogrid application will explore the potential of the Grid to support
effective co-working among radiologists through-out the EU. This paper outlines
the Mammogrid service-based approach in managing a federation of grid-connected
mam-mography databases.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2004 15:00:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Estrella",
"Florida",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Rogulina",
"Dmitry",
""
],
[
"Amendolia",
"Roberto",
""
],
[
"Solomonides",
"Tony",
""
]
] |
cs/0402024 | Richard McClatchey | Florida Estrella, Zsolt Kovacs, Jean-Marie Le Goff, Richard
McClatchey, Tony Solomonides & Norbert Toth | Pattern Reification as the Basis for Description-Driven Systems | 20 pages, 10 figures | Journal of Software and System Modeling Vol 2 No 2, pp 108-119
Springer-Verlag, ISSN: 1619-1366, 2003 | null | null | cs.DB cs.SE | null | One of the main factors driving object-oriented software development for
information systems is the requirement for systems to be tolerant to change. To
address this issue in designing systems, this paper proposes a pattern-based,
object-oriented, description-driven system (DDS) architecture as an extension
to the standard UML four-layer meta-model. A DDS architecture is proposed in
which aspects of both static and dynamic systems behavior can be captured via
descriptive models and meta-models. The proposed architecture embodies four
main elements - firstly, the adoption of a multi-layered meta-modeling
architecture and reflective meta-level architecture, secondly the
identification of four data modeling relationships that can be made explicit
such that they can be modified dynamically, thirdly the identification of five
design patterns which have emerged from practice and have proved essential in
providing reusable building blocks for data management, and fourthly the
encoding of the structural properties of the five design patterns by means of
one fundamental pattern, the Graph pattern. A practical example of this
philosophy, the CRISTAL project, is used to demonstrate the use of
description-driven data objects to handle system evolution.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2004 14:25:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Estrella",
"Florida",
""
],
[
"Kovacs",
"Zsolt",
""
],
[
"Goff",
"Jean-Marie Le",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Solomonides",
"Tony",
""
],
[
"Toth",
"Norbert",
""
]
] |
cs/0402026 | Shi Zhou | Shi Zhou and Raul J. Mondragon | Redundancy and Robustness of the AS-level Internet topology and its
models | null | IEE Electronic Letters, vol. 40, no. 2, pp. 151-15. on 22 January
2004 | 10.1049/el:20040078 | null | cs.NI | null | A comparison between the topological properties of the measured Internet
topology, at the autonomous system level (AS graph), and the equivalent graphs
generated by two different power law topology generators is presented. Only one
of the synthetic generators reproduces the tier connectivity of the AS graph.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2004 19:09:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Shi",
""
],
[
"Mondragon",
"Raul J.",
""
]
] |
cs/0402027 | Judith Beumer | Weikuan Yu, Darius Buntinas, Rich L. Graham, and Dhabaleswar K. Panda | Efficient and Scalable Barrier over Quadrics and Myrinet with a New
NIC-Based Collective Message Passing Protocol | 8 pages, 8 figures | null | null | Preprint ANL/MCS-P1121-0204 | cs.DC cs.AR | null | Modern interconnects often have programmable processors in the network
interface that can be utilized to offload communication processing from host
CPU. In this paper, we explore different schemes to support collective
operations at the network interface and propose a new collective protocol. With
barrier as an initial case study, we have demontrated that much of the
communication processing can be greatly simplified with this collective
protocol. Accordingly, %with our proposed collective processing scheme, we have
designed and implemented efficient and scalable NIC-based barrier operations
over two high performance interconnects, Quadrics and Myrinet.
Our evaluation shows that, over a Quadrics cluster of 8 nodes with ELan3
Network, the NIC-based barrier operation achieves a barrier latency of only
5.60$\mu$s. This result is a 2.48 factor of improvement over the Elanlib
tree-based barrier operation. Over a Myrinet cluster of 8 nodes with LANai-XP
NIC cards, a barrier latency of 14.20$\mu$s over 8 nodes is achieved. This is a
2.64 factor of improvement over the host-based barrier algorithm. Furthermore,
an analytical model developed for the proposed scheme indicates that a
NIC-based barrier operation on a 1024-node cluster can be performed with only
22.13$\mu$s latency over Quadrics and with 38.94$\mu$s latency over Myrinet.
These results indicate the potential for developing high performance
communication subsystems for next generation clusters.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2004 20:37:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yu",
"Weikuan",
""
],
[
"Buntinas",
"Darius",
""
],
[
"Graham",
"Rich L.",
""
],
[
"Panda",
"Dhabaleswar K.",
""
]
] |
cs/0402028 | David Eppstein | David Eppstein | The lattice dimension of a graph | 6 pages, 3 figures | Eur. J. Combinatorics 26(6):585-592, 2005 | 10.1016/j.ejc.2004.05.001 | null | cs.DS math.CO | null | We describe a polynomial time algorithm for, given an undirected graph G,
finding the minimum dimension d such that G may be isometrically embedded into
the d-dimensional integer lattice Z^d.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2004 05:23:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
] |
cs/0402031 | Martin Pelikan | Martin Pelikan and Tz-Kai Lin | Parameter-less hierarchical BOA | about 12 pages, submitted to GECCO-2004 | null | null | null | cs.NE cs.AI | null | The parameter-less hierarchical Bayesian optimization algorithm (hBOA)
enables the use of hBOA without the need for tuning parameters for solving each
problem instance. There are three crucial parameters in hBOA: (1) the selection
pressure, (2) the window size for restricted tournaments, and (3) the
population size. Although both the selection pressure and the window size
influence hBOA performance, performance should remain low-order polynomial with
standard choices of these two parameters. However, there is no standard
population size that would work for all problems of interest and the population
size must thus be eliminated in a different way. To eliminate the population
size, the parameter-less hBOA adopts the population-sizing technique of the
parameter-less genetic algorithm. Based on the existing theory, the
parameter-less hBOA should be able to solve nearly decomposable and
hierarchical problems in quadratic or subquadratic number of function
evaluations without the need for setting any parameters whatsoever. A number of
experiments are presented to verify scalability of the parameter-less hBOA.
| [
{
"version": "v1",
"created": "Sun, 15 Feb 2004 06:56:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pelikan",
"Martin",
""
],
[
"Lin",
"Tz-Kai",
""
]
] |
cs/0402033 | Fangzhen Lin | Fangzhen Lin and Jia-Huai You | Recycling Computed Answers in Rewrite Systems for Abduction | 20 pages. Full version of our IJCAI-03 paper | null | null | null | cs.AI | null | In rule-based systems, goal-oriented computations correspond naturally to the
possible ways that an observation may be explained. In some applications, we
need to compute explanations for a series of observations with the same domain.
The question whether previously computed answers can be recycled arises. A yes
answer could result in substantial savings of repeated computations. For
systems based on classic logic, the answer is YES. For nonmonotonic systems
however, one tends to believe that the answer should be NO, since recycling is
a form of adding information. In this paper, we show that computed answers can
always be recycled, in a nontrivial way, for the class of rewrite procedures
that we proposed earlier for logic programs with negation. We present some
experimental results on an encoding of the logistics domain.
| [
{
"version": "v1",
"created": "Mon, 16 Feb 2004 06:15:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lin",
"Fangzhen",
""
],
[
"You",
"Jia-Huai",
""
]
] |
cs/0402036 | Pardha Pyla | Pardha S. Pyla, Manuel A. Perez-Quinones, James D. Arthur & H. Rex
Hartson | Towards a Model-Based Framework for Integrating Usability and Software
Engineering Life Cycles | This document contains 8 pages with 5 figures. This appeared in
Bridging the SE & HCI Communities Workshop in INTERACT 2003
(http://www.se-hci.org/bridging/interact) | null | null | null | cs.HC | null | In this position paper we propose a process model that provides a development
infrastructure in which the usability engineering and software engineering life
cycles co-exist in complementary roles. We describe the motivation, hurdles,
rationale, arguments, and implementation plan for the need, specification, and
the usefulness of such a model.
| [
{
"version": "v1",
"created": "Mon, 16 Feb 2004 21:56:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pyla",
"Pardha S.",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
],
[
"Arthur",
"James D.",
""
],
[
"Hartson",
"H. Rex",
""
]
] |
cs/0402037 | Petrus H. Potgieter | P.H. Potgieter | The pre-history of quantum computation | 11 pages, in Afrikaans (title: Die voorgeskiedenis van
kwantumberekening) with English abstract | Suid-Afrikaanse Tydskrif vir Natuurwetenskap en Tegnologie, Vol
23, Issue 1 / 2, Mar / Jun, 2-6 (2004) | null | null | cs.GL | null | The main ideas behind developments in the theory and technology of quantum
computation were formulated in the late 1970s and early 1980s by two physicists
in the West and a mathematician in the former Soviet Union. It is not generally
known in the West that the subject has roots in the Russian technical
literature. The author hopes to present as impartial a synthesis as possible of
the early history of thought on this subject. The role of reversible and
irreversible computational processes is examined briefly as it relates to the
origins of quantum computing and the so-called Information Paradox in physics.
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2004 06:54:26 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Nov 2004 05:15:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Potgieter",
"P. H.",
""
]
] |
cs/0402038 | Serban Vlad E. | Serban E. Vlad | Towards a Mathematical Theory of the Delays of the Asynchronous Circuits | null | Analele Universitatii din Oradea, Fascicola Matematica, TOM IX,
2002 | null | null | cs.LO | null | The inequations of the delays of the asynchronous circuits are written, by
making use of pseudo-Boolean differential calculus. We consider these efforts
to be a possible starting point in the semi-formalized reconstruction of the
digital electrical engineering (which is a non-formalized theory).
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2004 12:11:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] |
cs/0402039 | Serban Vlad E. | Serban E. Vlad | On the Inertia of the Asynchronous Circuits | null | CAIM 2003, Oradea, Romania, May 29-31, 2003 | null | null | cs.LO | null | We present the bounded delays, the absolute inertia and the relative inertia.
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2004 12:54:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] |
cs/0402040 | Serban Vlad E. | Serban E. Vlad | Defining the Delays of the Asynchronous Circuits | null | CAIM 2003, Oradea, Romania, May 29-31, 2003 | null | null | cs.LO | null | We define the delays of a circuit, as well as the properties of determinism,
order, time invariance, constancy, symmetry and the serial connection.
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2004 13:01:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] |
cs/0402041 | Serban Vlad E. | Serban E. Vlad | Examples of Models of the Asynchronous Circuits | null | the 10-th Symposium of Mathematics and its Applications,
Politehnica University of Timisoara, Timisoara, 2003 | null | null | cs.LO | null | We define the delays of a circuit, as well as the properties of determinism,
order, time invariance, constancy, symmetry and the serial connection.
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2004 13:07:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] |
cs/0402042 | Kevin O'Neill | Joseph Y. Halpern and Kevin R. O'Neill | Anonymity and Information Hiding in Multiagent Systems | Replacement. 36 pages. Full version of CSFW '03 paper, submitted to
JCS. Made substantial changes to Section 6; added references throughout | null | null | null | cs.CR cs.LO cs.MA | null | We provide a framework for reasoning about information-hiding requirements in
multiagent systems and for reasoning about anonymity in particular. Our
framework employs the modal logic of knowledge within the context of the runs
and systems framework, much in the spirit of our earlier work on secrecy
[Halpern and O'Neill 2002]. We give several definitions of anonymity with
respect to agents, actions, and observers in multiagent systems, and we relate
our definitions of anonymity to other definitions of information hiding, such
as secrecy. We also give probabilistic definitions of anonymity that are able
to quantify an observer s uncertainty about the state of the system. Finally,
we relate our definitions of anonymity to other formalizations of anonymity and
information hiding, including definitions of anonymity in the process algebra
CSP and definitions of information hiding using function views.
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2004 20:46:52 GMT"
},
{
"version": "v2",
"created": "Mon, 17 May 2004 19:21:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"O'Neill",
"Kevin R.",
""
]
] |
cs/0402044 | Sandor P. Fekete | Sandor P. Fekete and Joerg Schepers | A General Framework for Bounds for Higher-Dimensional Orthogonal Packing
Problems | 16 pages, 4 figures, Latex, to appear in Mathematical Methods of
Operations Research | null | null | null | cs.DS cs.CG | null | Higher-dimensional orthogonal packing problems have a wide range of practical
applications, including packing, cutting, and scheduling. In the context of a
branch-and-bound framework for solving these packing problems to optimality, it
is of crucial importance to have good and easy bounds for an optimal solution.
Previous efforts have produced a number of special classes of such bounds.
Unfortunately, some of these bounds are somewhat complicated and hard to
generalize. We present a new approach for obtaining classes of lower bounds for
higher-dimensional packing problems; our bounds improve and simplify several
well-known bounds from previous literature. In addition, our approach provides
an easy framework for proving correctness of new bounds.
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2004 16:05:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Schepers",
"Joerg",
""
]
] |
cs/0402045 | Sandor P. Fekete | Esther M. Arkin, Michael A. Bender, Sandor P. Fekete, Joseph S. B.
Mitchell, and Martin Skutella | The Freeze-Tag Problem: How to Wake Up a Swarm of Robots | 27 pages, 9 figures, Latex, to appear in Algorithmica. Cleaned up
various parts of the paper, removed one overly technical section | null | null | null | cs.DS | null | An optimization problem that naturally arises in the study of swarm robotics
is the Freeze-Tag Problem (FTP) of how to awaken a set of ``asleep'' robots, by
having an awakened robot move to their locations. Once a robot is awake, it can
assist in awakening other slumbering robots.The objective is to have all robots
awake as early as possible. While the FTP bears some resemblance to problems
from areas in combinatorial optimization such as routing, broadcasting,
scheduling, and covering, its algorithmic characteristics are surprisingly
different. We consider both scenarios on graphs and in geometric
environments.In graphs, robots sleep at vertices and there is a length function
on the edges. Awake robots travel along edges, with time depending on edge
length. For most scenarios, we consider the offline version of the problem, in
which each awake robot knows the position of all other robots. We prove that
the problem is NP-hard, even for the special case of star graphs. We also
establish hardness of approximation, showing that it is NP-hard to obtain an
approximation factor better than 5/3, even for graphs of bounded degree.These
lower bounds are complemented with several positive algorithmic results,
including: (1) We show that the natural greedy strategy on star graphs has a
tight worst-case performance of 7/3 and give a polynomial-time approximation
scheme (PTAS) for star graphs. (2) We give a simple O(log D)-competitive online
algorithm for graphs with maximum degree D and locally bounded edge weights.
(3) We give a PTAS, running in nearly linear time, for geometrically embedded
instances.
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2004 20:49:02 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Sep 2005 23:31:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arkin",
"Esther M.",
""
],
[
"Bender",
"Michael A.",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Skutella",
"Martin",
""
]
] |
cs/0402046 | Jaap-Henk Hoepman | Flavio D. Garcia, Jaap-Henk Hoepman | Spam filter analysis | Submitted to SEC 2004 | null | null | null | cs.CR | null | Unsolicited bulk email (aka. spam) is a major problem on the Internet. To
counter spam, several techniques, ranging from spam filters to mail protocol
extensions like hashcash, have been proposed. In this paper we investigate the
effectiveness of several spam filtering techniques and technologies. Our
analysis was performed by simulating email traffic under different conditions.
We show that genetic algorithm based spam filters perform best at server level
and naive Bayesian filters are the most appropriate for filtering at user
level.
| [
{
"version": "v1",
"created": "Thu, 19 Feb 2004 09:32:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Garcia",
"Flavio D.",
""
],
[
"Hoepman",
"Jaap-Henk",
""
]
] |
cs/0402047 | Cl\'audio Lima | Claudio F. Lima, Fernando G. Lobo | Parameter-less Optimization with the Extended Compact Genetic Algorithm
and Iterated Local Search | 12 pages, submitted to gecco 2004 | null | null | null | cs.NE | null | This paper presents a parameter-less optimization framework that uses the
extended compact genetic algorithm (ECGA) and iterated local search (ILS), but
is not restricted to these algorithms. The presented optimization algorithm
(ILS+ECGA) comes as an extension of the parameter-less genetic algorithm (GA),
where the parameters of a selecto-recombinative GA are eliminated. The approach
that we propose is tested on several well known problems. In the absence of
domain knowledge, it is shown that ILS+ECGA is a robust and easy-to-use
optimization method.
| [
{
"version": "v1",
"created": "Thu, 19 Feb 2004 19:37:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lima",
"Claudio F.",
""
],
[
"Lobo",
"Fernando G.",
""
]
] |
cs/0402048 | Maurizio Proietti | Fabio Fioravanti, Alberto Pettorossi, Maurizio Proietti | Transformation Rules for Locally Stratified Constraint Logic Programs | To appear in: M. Bruynooghe, K.-K. Lau (Eds.) Program Development in
Computational Logic, Lecture Notes in Computer Science, Springer | null | null | null | cs.PL cs.LO | null | We propose a set of transformation rules for constraint logic programs with
negation. We assume that every program is locally stratified and, thus, it has
a unique perfect model. We give sufficient conditions which ensure that the
proposed set of transformation rules preserves the perfect model of the
programs. Our rules extend in some respects the rules for logic programs and
constraint logic programs already considered in the literature and, in
particular, they include a rule for unfolding a clause with respect to a
negative literal.
| [
{
"version": "v1",
"created": "Fri, 20 Feb 2004 14:09:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fioravanti",
"Fabio",
""
],
[
"Pettorossi",
"Alberto",
""
],
[
"Proietti",
"Maurizio",
""
]
] |
cs/0402049 | Fernando Lobo | Fernando G. Lobo, Claudio F. Lima, Hugo Martires | An architecture for massive parallelization of the compact genetic
algorithm | 12 pages, submitted to gecco 2004 | null | null | null | cs.NE | null | This paper presents an architecture which is suitable for a massive
parallelization of the compact genetic algorithm. The resulting scheme has
three major advantages. First, it has low synchronization costs. Second, it is
fault tolerant, and third, it is scalable.
The paper argues that the benefits that can be obtained with the proposed
approach is potentially higher than those obtained with traditional parallel
genetic algorithms. In addition, the ideas suggested in the paper may also be
relevant towards parallelizing more complex probabilistic model building
genetic algorithms.
| [
{
"version": "v1",
"created": "Fri, 20 Feb 2004 16:36:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lobo",
"Fernando G.",
""
],
[
"Lima",
"Claudio F.",
""
],
[
"Martires",
"Hugo",
""
]
] |
cs/0402051 | Vadim Tropashko | Vadim Tropashko | Nested Intervals Tree Encoding with Continued Fractions | 8 pages | null | null | null | cs.DB | null | We introduce a new variation of Tree Encoding with Nested Intervals, find
connections with Materialized Path, and suggest a method for moving parts of
the hierarchy.
| [
{
"version": "v1",
"created": "Fri, 20 Feb 2004 19:45:56 GMT"
},
{
"version": "v2",
"created": "Tue, 11 May 2004 20:56:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tropashko",
"Vadim",
""
]
] |
cs/0402052 | Andrej Dujella | Andrej Dujella | Continued fractions and RSA with small secret exponent | 11 pages, to appear in Tatra Mt. Math. Publ | Tatra Mt. Math. Publ. 29 (2004), 101-112. | null | null | cs.CR math.NT | null | Extending the classical Legendre's result, we describe all solutions of the
inequality |x - a/b| < c/b^2 in terms of convergents of continued fraction
expansion of x. Namely, we show that a/b = (rp_{m+1} +- sp_m) / (rq_{m+1} +-
sq_m) for some nonnegative integers m,r,s such that rs < 2c.
As an application of this result, we describe a modification of Verheul and
van Tilborg variant of Wiener's attack on RSA cryptosystem with small secret
exponent.
| [
{
"version": "v1",
"created": "Fri, 20 Feb 2004 22:06:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dujella",
"Andrej",
""
]
] |
cs/0402053 | Paolo Liberatore | Paolo Liberatore | The Complexity of Modified Instances | null | null | null | null | cs.CC cs.AI | null | In this paper we study the complexity of solving a problem when a solution of
a similar instance is known. This problem is relevant whenever instances may
change from time to time, and known solutions may not remain valid after the
change. We consider two scenarios: in the first one, what is known is only a
solution of the problem before the change; in the second case, we assume that
some additional information, found during the search for this solution, is also
known. In the first setting, the techniques from the theory of NP-completeness
suffice to show complexity results. In the second case, negative results can
only be proved using the techniques of compilability, and are often related to
the size of considered changes.
| [
{
"version": "v1",
"created": "Mon, 23 Feb 2004 18:08:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liberatore",
"Paolo",
""
]
] |
cs/0402054 | Shujun Li Dr. | Shujun Li, Guanrong Chen and Xuanqin Mou | On the Security of the Yi-Tan-Siew Chaos-Based Cipher | 5 pages, 3 figures, IEEEtrans.cls v 1.6 | IEEE Trans. CAS-II, vol. 51, no. 12, pp. 665-669, 2004 | 10.1109/TCSII.2004.838657 | null | cs.CR cs.PF nlin.CD | null | This paper presents a comprehensive analysis on the security of the
Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A
differential chosen-plaintext attack and a differential chosen-ciphertext
attack are suggested to break the sub-key K, under the assumption that the time
stamp can be altered by the attacker, which is reasonable in such attacks.
Also, some security Problems about the sub-keys $\alpha$ and $\beta$ are
clarified, from both theoretical and experimental points of view. Further
analysis shows that the security of this cipher is independent of the use of
the chaotic tent map, once the sub-key $K$ is removed via the proposed
suggested differential chosen-plaintext attack.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2004 08:28:21 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Nov 2004 09:47:22 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Dec 2004 07:11:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Shujun",
""
],
[
"Chen",
"Guanrong",
""
],
[
"Mou",
"Xuanqin",
""
]
] |
cs/0402056 | Hilda Angela Larrondo | C.M. Gonzalez, H.A. Larrondo, C.A. Gayoso, L.J. Arnone, E.I. Boemo | Digital Signal Transmission with Chaotic Encryption: Design and
Evaluation of a FPGA Realization | null | null | null | null | cs.CR | null | A discrete-time discrete-value pseudo-chaotic encoder/decoder system is
presented. The pseudo-chaotic module is a 3D discrete version of the well-known
Lorenz dynamical system. Scaling and biasing transformations as well as natural
number arithmetics are employed in order to simplify realizations on a small
size Field Programmable Gate Array (FPGA. The encryption ability is improved by
using only the least significant byte of one of the pseudo chaotic state
variables as the key to encrypt the plain text. The key is periodically
perturbed by another chaotic state variable. The statistical properties of the
pseudo chaotic cipher are compared with those of other pseudo-random generators
available in the literature. As an example of applicability of the technique, a
full duplex communication system is designed and constructed using FPGA's as
technological framework.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2004 12:53:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gonzalez",
"C. M.",
""
],
[
"Larrondo",
"H. A.",
""
],
[
"Gayoso",
"C. A.",
""
],
[
"Arnone",
"L. J.",
""
],
[
"Boemo",
"E. I.",
""
]
] |
cs/0402057 | Carlos Ches\nevar | Sergio Alejandro Gomez and Carlos Ivan Ches\~nevar | Integrating Defeasible Argumentation and Machine Learning Techniques | 5 pages | Procs. WICC 2003 . Pp. 787-791. Tandil, Argentina, Mayo 2003 | null | null | cs.AI | null | The field of machine learning (ML) is concerned with the question of how to
construct algorithms that automatically improve with experience. In recent
years many successful ML applications have been developed, such as datamining
programs, information-filtering systems, etc. Although ML algorithms allow the
detection and extraction of interesting patterns of data for several kinds of
problems, most of these algorithms are based on quantitative reasoning, as they
rely on training data in order to infer so-called target functions.
In the last years defeasible argumentation has proven to be a sound setting
to formalize common-sense qualitative reasoning. This approach can be combined
with other inference techniques, such as those provided by machine learning
theory.
In this paper we outline different alternatives for combining defeasible
argumentation and machine learning techniques. We suggest how different aspects
of a generic argument-based framework can be integrated with other ML-based
approaches.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2004 18:02:29 GMT"
},
{
"version": "v2",
"created": "Fri, 28 May 2004 17:04:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gomez",
"Sergio Alejandro",
""
],
[
"Chesñevar",
"Carlos Ivan",
""
]
] |
cs/0402058 | Jacques Cohen | Jacques Cohen | A Tribute to Alain Colmerauer | 9 pages | null | null | null | cs.PL | null | The paper describes the contributions of Alain Colmerauer to the areas of
logic programs (LP) and constraint logic programs (CLP).
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2004 19:00:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cohen",
"Jacques",
""
]
] |
cs/0402061 | Jean-Luc Falcone | Jean-Luc Falcone and Paul Albuquerque | A Correlation-Based Distance | null | null | null | null | cs.IR | null | In this short technical report, we define on the sample space R^D a distance
between data points which depends on their correlation. We also derive an
expression for the center of mass of a set of points with respect to this
distance.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2004 14:13:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Falcone",
"Jean-Luc",
""
],
[
"Albuquerque",
"Paul",
""
]
] |
cs/0403001 | Vitorino Ramos Dr. | Vitorino Ramos, Ajith Abraham | Evolving a Stigmergic Self-Organized Data-Mining | 10 pages, 3 figures, submitted to Intelligent Systems, Design and
Applications 2004 | null | null | null | cs.AI cs.IR | null | Self-organizing complex systems typically are comprised of a large number of
frequently similar components or events. Through their process, a pattern at
the global-level of a system emerges solely from numerous interactions among
the lower-level components of the system. Moreover, the rules specifying
interactions among the system's components are executed using only local
information, without reference to the global pattern, which, as in many
real-world problems is not easily accessible or possible to be found.
Stigmergy, a kind of indirect communication and learning by the environment
found in social insects is a well know example of self-organization, providing
not only vital clues in order to understand how the components can interact to
produce a complex pattern, as can pinpoint simple biological non-linear rules
and methods to achieve improved artificial intelligent adaptive categorization
systems, critical for Data-Mining. On the present work it is our intention to
show that a new type of Data-Mining can be designed based on Stigmergic
paradigms, taking profit of several natural features of this phenomenon. By
hybridizing bio-inspired Swarm Intelligence with Evolutionary Computation we
seek for an entire distributed, adaptive, collective and cooperative
self-organized Data-Mining. As a real-world, real-time test bed for our
proposal, World-Wide-Web Mining will be used. Having that purpose in mind, Web
usage Data was collected from the Monash University's Web site (Australia),
with over 7 million hits every week. Results are compared to other recent
systems, showing that the system presented is by far promising.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2004 23:50:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Abraham",
"Ajith",
""
]
] |
cs/0403003 | Gilson Antonio Giraldi | Gilson A. Giraldi, Renato Portugal, Ricardo N. Thess | Genetic Algorithms and Quantum Computation | 27 pages, 5 figures, 3 tables | null | null | null | cs.NE | null | Recently, researchers have applied genetic algorithms (GAs) to address some
problems in quantum computation. Also, there has been some works in the
designing of genetic algorithms based on quantum theoretical concepts and
techniques. The so called Quantum Evolutionary Programming has two major
sub-areas: Quantum Inspired Genetic Algorithms (QIGAs) and Quantum Genetic
Algorithms (QGAs). The former adopts qubit chromosomes as representations and
employs quantum gates for the search of the best solution. The later tries to
solve a key question in this field: what GAs will look like as an
implementation on quantum hardware? As we shall see, there is not a complete
answer for this question. An important point for QGAs is to build a quantum
algorithm that takes advantage of both the GA and quantum computing parallelism
as well as true randomness provided by quantum computers. In the first part of
this paper we present a survey of the main works in GAs plus quantum computing
including also our works in this area. Henceforth, we review some basic
concepts in quantum computation and GAs and emphasize their inherent
parallelism. Next, we review the application of GAs for learning quantum
operators and circuit design. Then, quantum evolutionary programming is
considered. Finally, we present our current research in this field and some
perspectives.
| [
{
"version": "v1",
"created": "Thu, 4 Mar 2004 19:24:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson A.",
""
],
[
"Portugal",
"Renato",
""
],
[
"Thess",
"Ricardo N.",
""
]
] |
cs/0403004 | Zur Izhakian | Zur Izhakian | New Visualization of Surfaces in Parallel Coordinates - Eliminating
Ambiguity and Some "Over-Plotting" | 13 pages 8 figures | Journal of WSCG, 2004, volume 1-3, no 12, pp 183-191, ISSN
1213-6972 | null | null | cs.OH | null | $\cal{A}$ point $P \in \Real^n$ is represented in Parallel Coordinates by a
polygonal line $\bar{P}$ (see \cite{Insel99a} for a recent survey). Earlier
\cite{inselberg85plane}, a surface $\sigma$ was represented as the {\em
envelope} of the polygonal lines representing it's points. This is ambiguous in
the sense that {\em different} surfaces can provide the {\em same} envelopes.
Here the ambiguity is eliminated by considering the surface $\sigma$ as the
envelope of it's {\em tangent planes} and in turn, representing each of these
planes by $n$-1 points \cite{Insel99a}. This, with some future extension, can
yield a new and unambiguous representation, $\bar{\sigma}$, of the surface
consisting of $n$-1 planar regions whose properties correspond lead to the {\em
recognition} of the surfaces' properties i.e. developable, ruled etc.
\cite{hung92smooth}) and {\em classification} criteria.
It is further shown that the image (i.e. representation) of an algebraic
surface of degree 2 in $\Real^n$ is a region whose boundary is also an
algebraic curve of degree 2. This includes some {\em non-convex} surfaces which
with the previous ambiguous representation could not be treated. An efficient
construction algorithm for the representation of the quadratic surfaces (given
either by {\em explicit} or {\em implicit} equation) is provided. The results
obtained are suitable for applications, to be presented in a future paper, and
in particular for the approximation of complex surfaces based on their {\em
planar} images. An additional benefit is the elimination of the
``over-plotting'' problem i.e. the ``bunching'' of polygonal lines which often
obscure part of the parallel-coordinate display.
| [
{
"version": "v1",
"created": "Thu, 4 Mar 2004 23:08:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Izhakian",
"Zur",
""
]
] |
cs/0403005 | Zur Izhakian | Zur Izhakian | Algebraic Curves in Parallel Coordinates - Avoiding the "Over-Plotting"
Problem | null | null | null | null | cs.OH | null | ${\cal U}$ntil now the representation (i.e. plotting) of curve in Parallel
Coordinates is constructed from the point $\leftrightarrow$ line duality. The
result is a ``line-curve'' which is seen as the envelope of it's tangents.
Usually this gives an unclear image and is at the heart of the
``over-plotting'' problem; a barrier in the effective use of Parallel
Coordinates. This problem is overcome by a transformation which provides
directly the ``point-curve'' representation of a curve. Earlier this was
applied to conics and their generalizations. Here the representation, also
called dual, is extended to all planar algebraic curves. Specifically, it is
shown that the dual of an algebraic curve of degree $n$ is an algebraic of
degree at most $n(n - 1)$ in the absence of singular points. The result that
conics map into conics follows as an easy special case. An algorithm, based on
algebraic geometry using resultants and homogeneous polynomials, is obtained
which constructs the dual image of the curve. This approach has potential
generalizations to multi-dimensional algebraic surfaces and their
approximation. The ``trade-off'' price then for obtaining {\em planar}
representation of multidimensional algebraic curves and hyper-surfaces is the
higher degree of the image's boundary which is also an algebraic curve in
$\|$-coords.
| [
{
"version": "v1",
"created": "Thu, 4 Mar 2004 23:35:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Izhakian",
"Zur",
""
]
] |
cs/0403006 | Carlos Gershenson | Carlos R. de la Mora B., Carlos Gershenson, Angelica Garcia-Vega | The role of behavior modifiers in representation development | 8 pages | null | null | null | cs.AI | null | We address the problem of the development of representations and their
relationship to the environment. We study a software agent which develops in a
network a representation of its simple environment which captures and
integrates the relationships between agent and environment through a closure
mechanism. The inclusion of a variable behavior modifier allows better
representation development. This can be confirmed with an internal description
of the closure mechanism, and with an external description of the properties of
the representation network.
| [
{
"version": "v1",
"created": "Fri, 5 Mar 2004 12:53:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"B.",
"Carlos R. de la Mora",
""
],
[
"Gershenson",
"Carlos",
""
],
[
"Garcia-Vega",
"Angelica",
""
]
] |
cs/0403007 | George Candea | George Candea and Armando Fox | End-User Effects of Microreboots in Three-Tiered Internet Systems | 14 pages | null | null | null | cs.OS cs.AR cs.NI | null | Microreboots restart fine-grained components of software systems "with a
clean slate," and only take a fraction of the time needed for full system
reboot. Microreboots provide an application-generic recovery technique for
Internet services, which can be supported entirely in middleware and requires
no changes to the applications or any a priori knowledge of application
semantics.
This paper investigates the effect of microreboots on end-users of an
eBay-like online auction application; we find that microreboots are nearly as
effective as full reboots, but are significantly less disruptive in terms of
downtime and lost work. In our experiments, microreboots reduced the number of
failed user requests by 65% and the perceived downtime by 78% compared to a
server process restart. We also show how to replace user-visible transient
failures with transparent call-retry, at the cost of a slight increase in
end-user-visible latency during recovery. Due to their low cost, microreboots
can be used aggressively, even when their necessity is less than certain, hence
adding to the reduced recovery time a reduction in the fault detection time,
which further improves availability.
| [
{
"version": "v1",
"created": "Sat, 6 Mar 2004 02:52:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Candea",
"George",
""
],
[
"Fox",
"Armando",
""
]
] |
cs/0403008 | Dmitrii V. Pasechnik | Dima Grigoriev, Dmitrii V. Pasechnik | Polynomial-time computing over quadratic maps I: sampling in real
algebraic sets | 34 pages, LaTeX (Computational Complexity (cc.cls) class used);
updated version, to appear in Comp. Complexity | Computational Complexity 14(2005) 20-52 | 10.1007/s00037-005-0189-7 | null | cs.SC cs.CG math.AG | null | Given a quadratic map Q : K^n -> K^k defined over a computable subring D of a
real closed field K, and a polynomial p(Y_1,...,Y_k) of degree d, we consider
the zero set Z=Z(p(Q(X)),K^n) of the polynomial p(Q(X_1,...,X_n)). We present a
procedure that computes, in (dn)^O(k) arithmetic operations in D, a set S of
(real univariate representations of) sampling points in K^n that intersects
nontrivially each connected component of Z. As soon as k=o(n), this is faster
than the standard methods that all have exponential dependence on n in the
complexity. In particular, our procedure is polynomial-time for constant k. In
contrast, the best previously known procedure (due to A.Barvinok) is only
capable of deciding in n^O(k^2) operations the nonemptiness (rather than
constructing sampling points) of the set Z in the case of p(Y)=sum_i Y_i^2 and
homogeneous Q.
A by-product of our procedure is a bound (dn)^O(k) on the number of connected
components of Z.
The procedure consists of exact symbolic computations in D and outputs
vectors of algebraic numbers. It involves extending K by infinitesimals and
subsequent limit computation by a novel procedure that utilizes knowledge of an
explicit isomorphism between real algebraic sets.
| [
{
"version": "v1",
"created": "Sat, 6 Mar 2004 08:20:38 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Mar 2004 01:36:03 GMT"
},
{
"version": "v3",
"created": "Fri, 31 Dec 2004 15:41:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grigoriev",
"Dima",
""
],
[
"Pasechnik",
"Dmitrii V.",
""
]
] |
cs/0403009 | Wolfram Schmied | Wolfram Schmied | Demolishing Searle's Chinese Room | 3 pages, 0 figures; inserted missing ``no'' in section 3 | null | null | null | cs.AI cs.GL | null | Searle's Chinese Room argument is refuted by showing that he has actually
given two different versions of the room, which fail for different reasons.
Hence, Searle does not achieve his stated goal of showing ``that a system could
have input and output capabilities that duplicated those of a native Chinese
speaker and still not understand Chinese''.
| [
{
"version": "v1",
"created": "Mon, 8 Mar 2004 17:50:32 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Mar 2004 14:27:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmied",
"Wolfram",
""
]
] |
cs/0403010 | Amy Felty | Andrew W. Appel and Amy P. Felty | Polymorphic lemmas and definitions in Lambda Prolog and Twelf | null | Andrew W. Appel and Amy P. Felty, Polymorphic Lemmas and
Definitions in Lambda Prolog and Twelf, Theory and Practice of Logic
Programming, 4(1&2):1-39, January & March 2004 | null | null | cs.LO cs.PL | null | Lambda Prolog is known to be well-suited for expressing and implementing
logics and inference systems. We show that lemmas and definitions in such
logics can be implemented with a great economy of expression. We encode a
higher-order logic using an encoding that maps both terms and types of the
object logic (higher-order logic) to terms of the metalanguage (Lambda Prolog).
We discuss both the Terzo and Teyjus implementations of Lambda Prolog. We also
encode the same logic in Twelf and compare the features of these two
metalanguages for our purposes.
| [
{
"version": "v1",
"created": "Tue, 9 Mar 2004 02:38:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Appel",
"Andrew W.",
""
],
[
"Felty",
"Amy P.",
""
]
] |
cs/0403011 | Michael Hanus | Maria Alpuente, Michael Hanus, Salvador Lucas, German Vidal | Specialization of Functional Logic Programs Based on Needed Narrowing | 48 pages. This paper has been accepted for publication in the Journal
of Theory and Practice of Logic Programming. In contrast to the journal
version, this paper contains the detailed proofs of the results presented in
this paper | null | null | null | cs.PL | null | Many functional logic languages are based on narrowing, a unification-based
goal-solving mechanism which subsumes the reduction mechanism of functional
languages and the resolution principle of logic languages. Needed narrowing is
an optimal evaluation strategy which constitutes the basis of modern
(narrowing-based) lazy functional logic languages. In this work, we present the
fundamentals of partial evaluation in such languages. We provide correctness
results for partial evaluation based on needed narrowing and show that the nice
properties of this strategy are essential for the specialization process. In
particular, the structure of the original program is preserved by partial
evaluation and, thus, the same evaluation strategy can be applied for the
execution of specialized programs. This is in contrast to other partial
evaluation schemes for lazy functional logic programs which may change the
program structure in a negative way. Recent proposals for the partial
evaluation of declarative multi-paradigm programs use (some form of) needed
narrowing to perform computations at partial evaluation time. Therefore, our
results constitute the basis for the correctness of such partial evaluators.
| [
{
"version": "v1",
"created": "Tue, 9 Mar 2004 15:43:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alpuente",
"Maria",
""
],
[
"Hanus",
"Michael",
""
],
[
"Lucas",
"Salvador",
""
],
[
"Vidal",
"German",
""
]
] |
cs/0403012 | David Wolpert | David H. Wolpert and Stefan Bieniawski | Distributed Control by Lagrangian Steepest Descent | 8 pages | null | null | null | cs.MA cs.GT nlin.AO | null | Often adaptive, distributed control can be viewed as an iterated game between
independent players. The coupling between the players' mixed strategies,
arising as the system evolves from one instant to the next, is determined by
the system designer. Information theory tells us that the most likely joint
strategy of the players, given a value of the expectation of the overall
control objective function, is the minimizer of a Lagrangian function of the
joint strategy. So the goal of the system designer is to speed evolution of the
joint strategy to that Lagrangian minimizing point, lower the expectated value
of the control objective function, and repeat. Here we elaborate the theory of
algorithms that do this using local descent procedures, and that thereby
achieve efficient, adaptive, distributed control.
| [
{
"version": "v1",
"created": "Wed, 10 Mar 2004 03:49:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolpert",
"David H.",
""
],
[
"Bieniawski",
"Stefan",
""
]
] |
cs/0403013 | George Candea | George Candea | Predictable Software -- A Shortcut to Dependable Computing ? | 6 pages; submitted to 11th ACM SIGOPS European Workshop | WIP Session, USENIX Technical Conference, Boston, MA, June 2004 | null | null | cs.OS cs.DC | null | Many dependability techniques expect certain behaviors from the underlying
subsystems and fail in chaotic ways if these expectations are not met. Under
expected circumstances, however, software tends to work quite well. This paper
suggests that, instead of fixing elusive bugs or rewriting software, we improve
the predictability of conditions faced by our programs. This approach might be
a cheaper and faster way to improve dependability of software. After
identifying some of the common triggers of unpredictability, the paper
describes three engineering principles that hold promise in combating
unpredictability, suggests a way to benchmark predictability, and outlines a
brief research agenda.
| [
{
"version": "v1",
"created": "Thu, 11 Mar 2004 04:01:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Candea",
"George",
""
]
] |
cs/0403014 | Girish Motwani | Girish Motwani, Sandhya G. Nair | Search Efficiency in Indexing Structures for Similarity Searching | null | null | null | null | cs.DB | null | Similarity searching finds application in a wide variety of domains including
multilingual databases, computational biology, pattern recognition and text
retrieval. Similarity is measured in terms of a distance function, edit
distance, in general metric spaces, which is expensive to compute. Indexing
techniques can be used reduce the number of distance computations. We present
an analysis of various existing similarity indexing structures for the same.
The performance obtained using the index structures studied was found to be
unsatisfactory . We propose an indexing technique that combines the features of
clustering with M tree(MTB) and the results indicate that this gives better
performance.
| [
{
"version": "v1",
"created": "Thu, 11 Mar 2004 06:30:30 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Mar 2004 14:33:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Motwani",
"Girish",
""
],
[
"Nair",
"Sandhya G.",
""
]
] |
cs/0403016 | Krzysztof R. Apt | Krzysztof R. Apt and Peter Zoeteweij | A Comparative Study of Arithmetic Constraints on Integer Intervals | 24 pages. To appear in "Recent Advances in Constraints, 2003" K.R.
Apt, F. Fages, F. Rossi, P. Szeredi and J. Vancza, eds, LNAI 3010,
Springer-Verlag, 2004 | null | null | null | cs.PL cs.AI | null | We propose here a number of approaches to implement constraint propagation
for arithmetic constraints on integer intervals. To this end we introduce
integer interval arithmetic. Each approach is explained using appropriate proof
rules that reduce the variable domains. We compare these approaches using a set
of benchmarks.
| [
{
"version": "v1",
"created": "Fri, 12 Mar 2004 08:37:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Zoeteweij",
"Peter",
""
]
] |
cs/0403017 | Jim Gray | Maria A. Nieto-Santisteban, William O'Mullane, Jim Gray, Nolan Li,
Tamas Budavari, Alexander S. Szalay, Aniruddha R. Thakar | Extending the SDSS Batch Query System to the National Virtual
Observatory Grid | original available at
http://research.microsoft.com/research/pubs/view.aspx?tr_id=714 | null | null | MSR-TR-2004-12 | cs.DB | null | The Sloan Digital Sky Survey science database is approaching 2TB. While the
vast majority of queries normally execute in seconds or minutes, this
interactive execution time can be disproportionately increased by a small
fraction of queries that take hours or days to run; either because they require
non-index scans of the largest tables or because they request very large result
sets. In response to this, we added a multi-queue job submission and tracking
system. The transfer of very large result sets from queries over the network is
another serious problem. Statistics suggested that much of this data transfer
is unnecessary; users would prefer to store results locally in order to allow
further cross matching and filtering. To allow local analysis, we implemented a
system that gives users their own personal database (MyDB) at the portal site.
Users may transfer data to their MyDB, and then perform further analysis before
extracting it to their own machine.
We intend to extend the MyDB and asynchronous query ideas to multiple NVO
nodes. This implies development, in a distributed manner, of several features,
which have been demonstrated for a single node in the SDSS Batch Query System
(CasJobs). The generalization of asynchronous queries necessitates some form of
MyDB storage as well as workflow tracking services on each node and
coordination strategies among nodes.
| [
{
"version": "v1",
"created": "Fri, 12 Mar 2004 09:42:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nieto-Santisteban",
"Maria A.",
""
],
[
"O'Mullane",
"William",
""
],
[
"Gray",
"Jim",
""
],
[
"Li",
"Nolan",
""
],
[
"Budavari",
"Tamas",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Thakar",
"Aniruddha R.",
""
]
] |
cs/0403018 | Jim Gray | Jim Gray, Alexander S. Szalay | The World Wide Telescope: An Archetype for Online Science | 6 pages, msword posted at
http://research.microsoft.com/research/pubs/view.aspx?tr_id=590 | CACM, V. 45.11, pp. 50-54, Nov. 2002 | null | MSR-TR-2002-75 | cs.DB | null | Most scientific data will never be directly examined by scientists; rather it
will be put into online databases where it will be analyzed and summarized by
computer programs. Scientists increasingly see their instruments through online
scientific archives and analysis tools, rather than examining the raw data.
Today this analysis is primarily driven by scientists asking queries, but
scientific archives are becoming active databases that self-organize and
recognize interesting and anomalous facts as data arrives. In some fields, data
from many different archives can be cross-correlated to produce new insights.
Astronomy presents an excellent example of these trends; and, federating
Astronomy archives presents interesting challenges for computer scientists.
| [
{
"version": "v1",
"created": "Fri, 12 Mar 2004 09:57:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alexander S.",
""
]
] |
cs/0403019 | Jim Gray | Jim Gray | Distributed Computing Economics | 6 pages, orginal at
http://research.microsoft.com/research/pubs/view.aspx?tr_id=655 | null | null | MSR-TR-2003-24 | cs.NI cs.DC | null | Computing economics are changing. Today there is rough price parity between
(1) one database access, (2) ten bytes of network traffic, (3) 100,000
instructions, (4) 10 bytes of disk storage, and (5) a megabyte of disk
bandwidth. This has implications for how one structures Internet-scale
distributed computing: one puts computing as close to the data as possible in
order to avoid expensive network traffic.
| [
{
"version": "v1",
"created": "Fri, 12 Mar 2004 10:05:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] |
cs/0403020 | Jim Gray | Aniruddha R. Thakar, Alexander S. Szalay, Peter Z. Kunszt, Jim Gray | The Sloan Digital Sky Survey Science Archive: Migrating a Multi-Terabyte
Astronomical Archive from Object to Relational DBMS | null | Comput.Sci.Eng. 5 (2003) 16-29 | null | null | cs.DB | null | The Sloan Digital Sky Survey Science Archive is the first in a series of
multi-Terabyte digital archives in Astronomy and other data-intensive sciences.
To facilitate data mining in the SDSS archive, we adapted a commercial database
engine and built specialized tools on top of it. Originally we chose an
object-oriented database management system due to its data organization
capabilities, platform independence, query performance and conceptual fit to
the data. However, after using the object database for the first couple of
years of the project, it soon began to fall short in terms of its query support
and data mining performance. This was as much due to the inability of the
database vendor to respond our demands for features and bug fixes as it was due
to their failure to keep up with the rapid improvements in hardware
performance, particularly faster RAID disk systems. In the end, we were forced
to abandon the object database and migrate our data to a relational database.
We describe below the technical issues that we faced with the object database
and how and why we migrated to relational technology.
| [
{
"version": "v1",
"created": "Fri, 12 Mar 2004 10:20:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thakar",
"Aniruddha R.",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Kunszt",
"Peter Z.",
""
],
[
"Gray",
"Jim",
""
]
] |
cs/0403021 | Jim Gray | Tom Barclay, Wyman Chong, Jim Gray | A Quick Look at SATA Disk Performance | null | null | null | MSR-TR-2003-70, Oct. 2003 | cs.DB cs.PF | null | We have been investigating the use of low-cost, commodity components for
multi-terabyte SQL Server databases. Dubbed storage bricks, these servers are
white box PCs containing the largest ATA drives, value-priced AMD or Intel
processors, and inexpensive ECC memory. One issue has been the wiring mess, air
flow problems, length restrictions, and connector failures created by seven or
more parallel ATA (PATA) ribbon cables and drives in]a tower or 3U rack-mount
chassis. Large capacity Serial ATA (SATA) drives have recently become widely
available for the PC environment at a reasonable price. In addition to being
faster, the SATA connectors seem more reliable, have a more reasonable length
restriction (1m) and allow better airflow. We tested two drive brands along
with two RAID controllers to evaluate SATA drive performance and reliablility.
This paper documents our results so far.
| [
{
"version": "v1",
"created": "Fri, 12 Mar 2004 10:42:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barclay",
"Tom",
""
],
[
"Chong",
"Wyman",
""
],
[
"Gray",
"Jim",
""
]
] |
cs/0403022 | Martin Ziegler | Michael N\"usken, Martin Ziegler | Fast Multipoint-Evaluation of Bivariate Polynomials | 12 pages, 1 figure. To appear in Proc. 12th ESA 2004 | null | null | null | cs.DS | null | We generalize univariate multipoint evaluation of polynomials of degree n at
sublinear amortized cost per point. More precisely, it is shown how to evaluate
a bivariate polynomial p of maximum degree less than n, specified by its n^2
coefficients, simultaneously at n^2 given points using a total of O(n^{2.667})
arithmetic operations. In terms of the input size N being quadratic in n, this
amounts to an amortized cost of O(N^{0.334}) per point.
| [
{
"version": "v1",
"created": "Fri, 12 Mar 2004 14:31:43 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Jun 2004 17:17:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nüsken",
"Michael",
""
],
[
"Ziegler",
"Martin",
""
]
] |
cs/0403023 | Abdelhamid S. Abdelhamid | Ahmed A. Belal, Abdelhamid S. Abdelhamid | Secure Transmission of Sensitive data using multiple channels | 5 pages | null | null | null | cs.CR | null | A new scheme for transmitting sensitive data is proposed, the proposed scheme
depends on partitioning the output of a block encryption module using the
Chinese Remainder Theorem among a set of channels. The purpose of using the
Chinese Remainder Theorem is to hide the cipher text in order to increase the
difficulty of attacking the cipher. The theory, implementation and the security
of this scheme are described in this paper.
| [
{
"version": "v1",
"created": "Sun, 14 Mar 2004 19:58:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Belal",
"Ahmed A.",
""
],
[
"Abdelhamid",
"Abdelhamid S.",
""
]
] |
cs/0403024 | Krzysztof R. Apt | Krzysztof R. Apt | Uniform Proofs of Order Independence for Various Strategy Elimination
Procedures | 48 pages | Contributions to Theoretical Economics, Vol. 4: No. 1, Article 5,
2004, http://www.bepress.com/bejte/contributions/vol4/iss1/art5 | null | null | cs.GT cs.LO | null | We provide elementary and uniform proofs of order independence for various
strategy elimination procedures for finite strategic games, both for dominance
by pure and by mixed strategies. The proofs follow the same pattern and focus
on the structural properties of the dominance relations. They rely on Newman's
Lemma established in 1942 and related results on the abstract reduction
systems.
| [
{
"version": "v1",
"created": "Mon, 15 Mar 2004 07:13:07 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Sep 2004 02:18:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] |
cs/0403026 | Pardha Pyla | Pardha S. Pyla, Manuel A. Perez-Quinones, James D. Arthur and H. Rex
Hartson | What we should teach, but don't: Proposal for a cross pollinated HCI-SE
curriculum | null | null | null | null | cs.OH | null | Software engineering (SE) and usability engineering (UE), as disciplines,
have reached substantial levels of maturity. Each of these two disciplines is
now well represented with respect to most computer science (CS) curricula. But,
the two disciplines are practiced almost independently - missing oppurtunities
to collaborate, coordinate and communicate about the overall design - and
thereby contributing to system failures. Today, a confluence of several
ingredients contribute to these failures: the increasing importance of the user
interface (UI) component in the overall system, the independent maturation of
the human computer interaction area, and the lack of a cohesive process model
to integrate the UI experts' UE development efforts with that of SE. This in
turn, we believe, is a result of a void in computing curricula: a lack of
education and training regarding the importance of communication, collaboration
and coordination between the SE and UE processes. In this paper we describe the
current approach to teaching SE and UE and its shortcomings. We identify and
analyze the barriers and issues involved in developing systems having
substantial interactive components. We then propose four major themes of
learning for a comprehensive computing curriculum integrating SE, UE, and
system architectures in a project environment.
| [
{
"version": "v1",
"created": "Mon, 15 Mar 2004 20:52:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pyla",
"Pardha S.",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
],
[
"Arthur",
"James D.",
""
],
[
"Hartson",
"H. Rex",
""
]
] |
cs/0403027 | Francesc Rossello | Jaume Casasnovas, Joe Miro, Manuel Moya, Francesc Rossello | An approach to membrane computing under inexactitude | 20 pages, 0 figures | null | null | null | cs.OH cs.NE | null | In this paper we introduce a fuzzy version of symport/antiport membrane
systems. Our fuzzy membrane systems handle possibly inexact copies of reactives
and their rules are endowed with threshold functions that determine whether a
rule can be applied or not to a given set of objects, depending of the degree
of accuracy of these objects to the reactives specified in the rule. We prove
that these fuzzy membrane systems generate exactly the recursively enumerable
finite-valued fuzzy sets of natural numbers.
| [
{
"version": "v1",
"created": "Tue, 16 Mar 2004 09:02:39 GMT"
},
{
"version": "v2",
"created": "Tue, 11 May 2004 08:27:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Casasnovas",
"Jaume",
""
],
[
"Miro",
"Joe",
""
],
[
"Moya",
"Manuel",
""
],
[
"Rossello",
"Francesc",
""
]
] |
cs/0403028 | Manuel Carro | Manuel Carro | An Application of Rational Trees in a Logic Programming Interpreter for
a Procedural Language | LaTeX2e, 13 pages, 2 tables, 11 figures (several of them, text). Yet
unpublished | null | null | null | cs.DS cs.LO | null | We describe here a simple application of rational trees to the implementation
of an interpreter for a procedural language written in a logic programming
language. This is possible in languages designed to support rational trees
(such as Prolog II and its descendants), but also in traditional Prolog, whose
data structures are initially based on Herbrand terms, but in which
implementations often omit the occurs check needed to avoid the creation of
infinite data structures. We provide code implementing two interpreters, one of
which needs non-occurs-check unification, which makes it faster (and more
economic). We provide experimental data supporting this, and we argue that
rational trees are interesting enough as to receive thorough support inside the
language.
| [
{
"version": "v1",
"created": "Tue, 16 Mar 2004 16:48:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carro",
"Manuel",
""
]
] |
cs/0403030 | Neil J. Gunther | K. J. Christensen, K. Yoshigoe, A. Roginsky and N. J. Gunther | Performance Evaluation of Packet-to-Cell Segmentation Schemes in Input
Buffered Packet Switches | To be presented at the IEEE International Conference on
Communications (ICC 2004) Paris, France, June 20-24 2004 | null | null | null | cs.NI cs.PF | null | Most input buffered packet switches internally segment variable-length
packets into fixed-length cells. The last cell in a segmented packet will
contain overhead bytes if the packet length is not evenly divisible by the cell
length. Switch speed-up is used to compensate for this overhead. In this paper,
we develop an analytical model of a single-server queue where an input stream
of packets is segmented into cells for service. Analytical models are developed
for M/M/1, M/H2/1, and M/E2/1 queues with a discretized (or quantized) service
time. These models and simulation using real packet traces are used to evaluate
the effect of speed-up on mean queue length. We propose and evaluate a new
method of segmenting a packet trailer and subsequent packet header into a
single cell. This cell merging method reduces the required speed-up. No changes
to switch-matrix scheduling algorithms are needed. Simulation with a packet
trace shows a reduction in the needed speed-up for an iSLIP scheduled input
buffered switch.
| [
{
"version": "v1",
"created": "Wed, 17 Mar 2004 23:02:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Christensen",
"K. J.",
""
],
[
"Yoshigoe",
"K.",
""
],
[
"Roginsky",
"A.",
""
],
[
"Gunther",
"N. J.",
""
]
] |
cs/0403031 | Victor Eliashberg | Victor Eliashberg | Concept of E-machine: How does a "dynamical" brain learn to process
"symbolic" information? Part I | 40 pages, 15 figures. The author is a consulting professor at the
Stanford University, Department of Electrical Engineering and the president
of Avel Electronics (consulting company) | null | null | null | cs.AI cs.LG | null | The human brain has many remarkable information processing characteristics
that deeply puzzle scientists and engineers. Among the most important and the
most intriguing of these characteristics are the brain's broad universality as
a learning system and its mysterious ability to dynamically change
(reconfigure) its behavior depending on a combinatorial number of different
contexts.
This paper discusses a class of hypothetically brain-like dynamically
reconfigurable associative learning systems that shed light on the possible
nature of these brain's properties. The systems are arranged on the general
principle referred to as the concept of E-machine.
The paper addresses the following questions:
1. How can "dynamical" neural networks function as universal programmable
"symbolic" machines?
2. What kind of a universal programmable symbolic machine can form
arbitrarily complex software in the process of programming similar to the
process of biological associative learning?
3. How can a universal learning machine dynamically reconfigure its software
depending on a combinatorial number of possible contexts?
| [
{
"version": "v1",
"created": "Fri, 19 Mar 2004 17:13:55 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Mar 2004 07:51:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eliashberg",
"Victor",
""
]
] |
cs/0403033 | Philip Cox | Omid Banyasad, Philip T. Cox | Integrating design synthesis and assembly of structured objects in a
visual design language | 20 pages, 15 figures, to be published in The Theory and Practice of
Logic programming (TPLP) | null | null | null | cs.LO cs.PL | null | Computer Aided Design systems provide tools for building and manipulating
models of solid objects. Some also provide access to programming languages so
that parametrised designs can be expressed. There is a sharp distinction,
therefore, between building models, a concrete graphical editing activity, and
programming, an abstract, textual, algorithm-construction activity. The
recently proposed Language for Structured Design (LSD) was motivated by a
desire to combine the design and programming activities in one language. LSD
achieves this by extending a visual logic programming language to incorporate
the notions of solids and operations on solids. Here we investigate another
aspect of the LSD approach; namely, that by using visual logic programming as
the engine to drive the parametrised assembly of objects, we also gain the
powerful symbolic problem-solving capability that is the forte of logic
programming languages. This allows the designer/programmer to work at a higher
level, giving declarative specifications of a design in order to obtain the
design descriptions. Hence LSD integrates problem solving, design synthesis,
and prototype assembly in a single homogeneous programming/design environment.
We demonstrate this specification-to-final-assembly capability using the
masterkeying problem for designing systems of locks and keys.
| [
{
"version": "v1",
"created": "Sun, 21 Mar 2004 20:30:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Banyasad",
"Omid",
""
],
[
"Cox",
"Philip T.",
""
]
] |
cs/0403034 | Riccardo Pucella | Matthew Fluet, Riccardo Pucella | Phantom Types and Subtyping | 41 pages. Preliminary version appears in the Proceedings of the 2nd
IFIP International Conference on Theoretical Computer Science, pp. 448--460,
2002 | null | null | null | cs.PL | null | We investigate a technique from the literature, called the phantom-types
technique, that uses parametric polymorphism, type constraints, and unification
of polymorphic types to model a subtyping hierarchy. Hindley-Milner type
systems, such as the one found in Standard ML, can be used to enforce the
subtyping relation, at least for first-order values. We show that this
technique can be used to encode any finite subtyping hierarchy (including
hierarchies arising from multiple interface inheritance). We formally
demonstrate the suitability of the phantom-types technique for capturing
first-order subtyping by exhibiting a type-preserving translation from a simple
calculus with bounded polymorphism to a calculus embodying the type system of
SML.
| [
{
"version": "v1",
"created": "Tue, 23 Mar 2004 06:59:38 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Aug 2005 14:39:37 GMT"
},
{
"version": "v3",
"created": "Sun, 29 Jan 2006 19:23:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fluet",
"Matthew",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
cs/0403035 | Liang Wang | Wang Liang, Guo Yi-Ping, Fang Ming | Web pages search engine based on DNS | 4 pages,1 figure | null | null | null | cs.NI cs.IR | null | Search engine is main access to the largest information source in this world,
Internet. Now Internet is changing every aspect of our life. Information
retrieval service may be its most important services. But for common user,
internet search service is still far from our expectation, too many unrelated
search results, old information, etc. To solve these problems, a new system,
search engine based on DNS is proposed. The original idea, detailed content and
implementation of this system all are introduced in this paper.
| [
{
"version": "v1",
"created": "Tue, 23 Mar 2004 09:20:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liang",
"Wang",
""
],
[
"Yi-Ping",
"Guo",
""
],
[
"Ming",
"Fang",
""
]
] |
cs/0403036 | Liang Wang | Wang Liang, Guo Yi-Ping, Fang Ming | Domain resource integration system | 6 pages,4 figures | null | null | null | cs.NI cs.DL | null | Domain Resource Integrated System (DRIS) is introduced in this paper. DRIS is
a hierarchical distributed Internet information retrieval system. This system
will solve some bottleneck problems such as long update interval, poor coverage
in current web search system. DRIS will build the information retrieval
infrastructure of Internet, but not a commercial search engine. The protocol
series of DRIS are also detailed in this paper.
| [
{
"version": "v1",
"created": "Tue, 23 Mar 2004 09:30:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liang",
"Wang",
""
],
[
"Yi-Ping",
"Guo",
""
],
[
"Ming",
"Fang",
""
]
] |
cs/0403037 | Sebastian Brand | Sebastian Brand and Krzysztof R. Apt | Schedulers and Redundancy for a Class of Constraint Propagation Rules | 25 pages, to appear in the journal "Theory and Practice of Logic
Programming" | null | null | null | cs.DS cs.PL | null | We study here schedulers for a class of rules that naturally arise in the
context of rule-based constraint programming. We systematically derive a
scheduler for them from a generic iteration algorithm of [Apt 2000]. We apply
this study to so-called membership rules of [Apt and Monfroy 2001]. This leads
to an implementation that yields a considerably better performance for these
rules than their execution as standard CHR rules. Finally, we show how
redundant rules can be identified and how appropriately reduced sets of rules
can be computed.
| [
{
"version": "v1",
"created": "Tue, 23 Mar 2004 11:42:45 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Apr 2004 18:31:17 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Nov 2004 12:47:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brand",
"Sebastian",
""
],
[
"Apt",
"Krzysztof R.",
""
]
] |
cs/0403038 | Marcus Hutter | Shane Legg and Marcus Hutter and Akshat Kumar | Tournament versus Fitness Uniform Selection | 10 pages, 8 figures | Proc. 2004 Congress on Evolutionary Computation (CEC-2004), pages
2144--2151 | null | IDSIA-04-04 | cs.LG cs.AI | null | In evolutionary algorithms a critical parameter that must be tuned is that of
selection pressure. If it is set too low then the rate of convergence towards
the optimum is likely to be slow. Alternatively if the selection pressure is
set too high the system is likely to become stuck in a local optimum due to a
loss of diversity in the population. The recent Fitness Uniform Selection
Scheme (FUSS) is a conceptually simple but somewhat radical approach to
addressing this problem - rather than biasing the selection towards higher
fitness, FUSS biases selection towards sparsely populated fitness levels. In
this paper we compare the relative performance of FUSS with the well known
tournament selection scheme on a range of problems.
| [
{
"version": "v1",
"created": "Tue, 23 Mar 2004 15:17:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Legg",
"Shane",
""
],
[
"Hutter",
"Marcus",
""
],
[
"Kumar",
"Akshat",
""
]
] |
cs/0403039 | Wojciech Skut | Wojciech Skut, Stefan Ulrich, Kathrine Hammervold | A Flexible Rule Compiler for Speech Synthesis | 10 pages, 6 figures | In: Klopotek, Mieczyslaw A.; Wierzchon, Slawomir T.; Trojanowski,
Krzysztof (Eds.): "Intelligent Information Processing and Web Mining -
Proceedings of the International IIS:IIPWM?04 Conference"; Springer Verlag,
2004 | null | null | cs.CL cs.AI | null | We present a flexible rule compiler developed for a text-to-speech (TTS)
system. The compiler converts a set of rules into a finite-state transducer
(FST). The input and output of the FST are subject to parameterization, so that
the system can be applied to strings and sequences of feature-structures. The
resulting transducer is guaranteed to realize a function (as opposed to a
relation), and therefore can be implemented as a deterministic device (either a
deterministic FST or a bimachine).
| [
{
"version": "v1",
"created": "Tue, 23 Mar 2004 21:06:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Skut",
"Wojciech",
""
],
[
"Ulrich",
"Stefan",
""
],
[
"Hammervold",
"Kathrine",
""
]
] |
cs/0403040 | Fabrice Philippe | Guy Melancon, Fabrice Philippe | Generating connected acyclic digraphs uniformly at random | 6 pages | null | null | null | cs.DM cs.DS | null | We describe a simple algorithm based on a Markov chain process to generate
simply connected acyclic directed graphs over a fixed set of vertices. This
algorithm is an extension of a previous one, designed to generate acyclic
digraphs, non necessarily connected.
| [
{
"version": "v1",
"created": "Thu, 25 Mar 2004 08:41:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Melancon",
"Guy",
""
],
[
"Philippe",
"Fabrice",
""
]
] |
cs/0403043 | Danilo Gligoroski | Danilo Gligoroski | Stream cipher based on quasigroup string transformations in $Z_p^*$ | Small revisions and added references | null | null | null | cs.CR | null | In this paper we design a stream cipher that uses the algebraic structure of
the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in
ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing
quasigroup string transformations. The cryptographical strength of the proposed
stream cipher is based on the fact that breaking it would be at least as hard
as solving systems of multivariate polynomial equations modulo big prime number
$p$ which is NP-hard problem and there are no known fast randomized or
deterministic algorithms for solving it. Unlikely the speed of known ciphers
that work in $\bbbz_p^*$ for big prime numbers $p$, the speed of this stream
cipher both in encryption and decryption phase is comparable with the fastest
symmetric-key stream ciphers.
| [
{
"version": "v1",
"created": "Tue, 30 Mar 2004 14:09:23 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Apr 2004 13:27:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gligoroski",
"Danilo",
""
]
] |
cs/0403044 | Amitabha Roy | Amitabha Roy and K. Gopinath | Scalable Probabilistic Models for 802.11 Protocol Verification | Currently in the process of submission | null | null | null | cs.LO cs.NI | null | The IEEE 802.11 protocol is a popular standard for wireless local area
networks. Its medium access control layer (MAC) is a carrier sense multiple
access with collision avoidance (CSMA/CA) design and includes an exponential
backoff mechanism that makes it a possible target for probabilistic model
checking. In this work, we identify ways to increase the scope of application
of probabilistic model checking to the 802.11 MAC. Current techniques do not
scale to networks of even moderate size. To work around this problem, we
identify properties of the protocol that can be used to simplify the models and
make verification feasible. Using these observations, we directly optimize the
probabilistic timed automata models while preserving probabilistic reachability
measures. We substantiate our claims of significant reduction by our results
from using the probabilistic model checker PRISM.
| [
{
"version": "v1",
"created": "Wed, 31 Mar 2004 13:42:22 GMT"
},
{
"version": "v2",
"created": "Wed, 5 May 2004 18:30:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roy",
"Amitabha",
""
],
[
"Gopinath",
"K.",
""
]
] |
cs/0404001 | Garrison W. Greenwood | Garrison W. Greenwood | On the Practicality of Intrinsic Reconfiguration As a Fault Recovery
Method in Analog Systems | 6 pages | null | null | null | cs.PF cs.NE | null | Evolvable hardware combines the powerful search capability of evolutionary
algorithms with the flexibility of reprogrammable devices, thereby providing a
natural framework for reconfiguration. This framework has generated an interest
in using evolvable hardware for fault-tolerant systems because reconfiguration
can effectively deal with hardware faults whenever it is impossible to provide
spares. But systems cannot tolerate faults indefinitely, which means
reconfiguration does have a deadline. The focus of previous evolvable hardware
research relating to fault-tolerance has been primarily restricted to restoring
functionality, with no real consideration of time constraints. In this paper we
are concerned with evolvable hardware performing reconfiguration under deadline
constraints. In particular, we investigate reconfigurable hardware that
undergoes intrinsic evolution. We show that fault recovery done by intrinsic
reconfiguration has some restrictions, which designers cannot ignore.
| [
{
"version": "v1",
"created": "Thu, 1 Apr 2004 16:54:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Greenwood",
"Garrison W.",
""
]
] |
cs/0404002 | Tad Hogg | Kristina Lerman, Aram Galstyan, Tad Hogg | Mathematical Analysis of Multi-Agent Systems | latex, 15 figures, 42 pages | null | null | null | cs.RO cs.MA | null | We review existing approaches to mathematical modeling and analysis of
multi-agent systems in which complex collective behavior arises out of local
interactions between many simple agents. Though the behavior of an individual
agent can be considered to be stochastic and unpredictable, the collective
behavior of such systems can have a simple probabilistic description. We show
that a class of mathematical models that describe the dynamics of collective
behavior of multi-agent systems can be written down from the details of the
individual agent controller. The models are valid for Markov or memoryless
agents, in which each agents future state depends only on its present state and
not any of the past states. We illustrate the approach by analyzing in detail
applications from the robotics domain: collaboration and foraging in groups of
robots.
| [
{
"version": "v1",
"created": "Fri, 2 Apr 2004 02:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lerman",
"Kristina",
""
],
[
"Galstyan",
"Aram",
""
],
[
"Hogg",
"Tad",
""
]
] |
cs/0404003 | Jiang Qiu | Elisa Bertino, Barbara Catania, Roberta Gori | Enhancing the expressive power of the U-Datalog language | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 1,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 1, 2001 | null | null | cs.DB | null | U-Datalog has been developed with the aim of providing a set-oriented logical
update language, guaranteeing update parallelism in the context of a
Datalog-like language. In U-Datalog, updates are expressed by introducing
constraints (+p(X), to denote insertion, and [minus sign]p(X), to denote
deletion) inside Datalog rules. A U-Datalog program can be interpreted as a CLP
program. In this framework, a set of updates (constraints) is satisfiable if it
does not represent an inconsistent theory, that is, it does not require the
insertion and the deletion of the same fact. This approach resembles a very
simple form of negation. However, on the other hand, U-Datalog does not provide
any mechanism to explicitly deal with negative information, resulting in a
language with limited expressive power. In this paper, we provide a semantics,
based on stratification, handling the use of negated atoms in U-Datalog
programs, and we show which problems arise in defining a compositional
semantics.
| [
{
"version": "v1",
"created": "Fri, 2 Apr 2004 02:03:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bertino",
"Elisa",
""
],
[
"Catania",
"Barbara",
""
],
[
"Gori",
"Roberta",
""
]
] |
cs/0404004 | Liam Wagner | Liam Wagner | Dealing With Curious Players in Secure Networks | 4 pages and 1 figure | null | null | null | cs.CR cs.GT cs.MA | null | In secure communications networks there are a great number of user
behavioural problems, which need to be dealt with. Curious players pose a very
real and serious threat to the integrity of such a network. By traversing a
network a Curious player could uncover secret information, which that user has
no need to know, by simply posing as a loyalty check. Loyalty checks are done
simply to gauge the integrity of the network with respect to players who act in
a malicious manner. We wish to propose a method, which can deal with Curious
players trying to obtain "Need to Know" information using a combined
Fault-tolerant, Cryptographic and Game Theoretic Approach.
| [
{
"version": "v1",
"created": "Fri, 2 Apr 2004 05:16:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wagner",
"Liam",
""
]
] |
cs/0404005 | Maximillian Dornseif | Maximillian Dornseif | Government mandated blocking of foreign Web content | Preprint, revised 30.6.2003 | In: Jan von Knop, Wilhelm Haverkamp, Eike Jessen (Editors)
Security, E-Learning, E-Services: Proceedings of the 17. DFN-Arbeitstagung
ueber Kommunikationsnetze, Duesseldorf 2003, ISBN 3-88579-373-3; Series:
Lecture Notes in Informatics ISSN 1617-5468; Pages 617-648 | null | null | cs.CY cs.NI | null | Blocking of foreign Web content by Internet access providers has been a hot
topic for the last 18 months in Germany. Since fall 2001 the state of
North-Rhine-Westphalia very actively tries to mandate such blocking. This paper
will take a technical view on the problems imposed by the blocking orders and
blocking content at access or network provider level in general. It will also
give some empirical data on the effects of the blocking orders to help in the
legal assessment of the orders.
| [
{
"version": "v1",
"created": "Fri, 2 Apr 2004 09:27:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dornseif",
"Maximillian",
""
]
] |
cs/0404006 | Chung-Chieh Shan | Chung-chieh Shan | Delimited continuations in natural language: quantification and polarity
sensitivity | 10 pages | In CW'04: Proceedings of the 4th ACM SIGPLAN workshop on
continuations, ed. Hayo Thielecke, 55-64. Technical report CSR-04-1, School
of Computer Science, University of Birmingham (2004) | null | null | cs.CL cs.PL | null | Making a linguistic theory is like making a programming language: one
typically devises a type system to delineate the acceptable utterances and a
denotational semantics to explain observations on their behavior. Via this
connection, the programming language concept of delimited continuations can
help analyze natural language phenomena such as quantification and polarity
sensitivity. Using a logical metalanguage whose syntax includes control
operators and whose semantics involves evaluation order, these analyses can be
expressed in direct style rather than continuation-passing style, and these
phenomena can be thought of as computational side effects.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 01:53:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shan",
"Chung-chieh",
""
]
] |
cs/0404007 | Chung-Chieh Shan | Chung-chieh Shan | Polarity sensitivity and evaluation order in type-logical grammar | 4 pages | Proceedings of the 2004 Human Language Technology Conference of
the North American Chapter of the Association for Computational Linguistics | null | null | cs.CL | null | We present a novel, type-logical analysis of_polarity sensitivity_: how
negative polarity items (like "any" and "ever") or positive ones (like "some")
are licensed or prohibited. It takes not just scopal relations but also linear
order into account, using the programming-language notions of delimited
continuations and evaluation order, respectively. It thus achieves greater
empirical coverage than previous proposals.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 02:14:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shan",
"Chung-chieh",
""
]
] |
cs/0404008 | Mme Joanna Janik | Jean-Guillaume Dumas | Efficient dot product over word-size finite fields | null | null | null | IMAG - LMC RR n 1064 - I | cs.SC | null | We want to achieve efficiency for the exact computation of the dot product of
two vectors over word-size finite fields. We therefore compare the practical
behaviors of a wide range of implementation techniques using different
representations. The techniques used include oating point representations,
discrete logarithms, tabulations, Montgomery reduction, delayed modulus.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 07:24:15 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Apr 2004 15:08:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dumas",
"Jean-Guillaume",
""
]
] |
cs/0404009 | Mark-Jan Nederhof | Mark-Jan Nederhof, Giorgio Satta | Tabular Parsing | 21 pages, 14 figures | M.-J. Nederhof and G. Satta. Tabular Parsing. In C. Martin-Vide,
V. Mitrana, and G. Paun, editors, Formal Languages and Applications, Studies
in Fuzziness and Soft Computing 148, pages 529-549. Springer, 2004 | null | null | cs.CL | null | This is a tutorial on tabular parsing, on the basis of tabulation of
nondeterministic push-down automata. Discussed are Earley's algorithm, the
Cocke-Kasami-Younger algorithm, tabular LR parsing, the construction of parse
trees, and further issues.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 11:51:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nederhof",
"Mark-Jan",
""
],
[
"Satta",
"Giorgio",
""
]
] |
cs/0404010 | Lev Shchur | Serge A. Krashakov, Anton B. Teslyuk, Lev N. Shchur | On the universality of rank distributions of website popularity | 6 pages with 5 figures, IEEEtran.cls, paper substantially rewritten,
new figure and tables added | Computer Networks, 50, 1769-1780 (2006) | null | null | cs.NI cond-mat.stat-mech | null | We present an extensive analysis of long-term statistics of the queries to
websites using logs collected on several web caches in Russian academic
networks and on US IRCache caches. We check the sensitivity of the statistics
to several parameters: (1) duration of data collection, (2) geographical
location of the cache server collecting data, and (3) the year of data
collection. We propose a two-parameter modification of the Zipf law and
interpret the parameters. We find that the rank distribution of websites is
stable when approximated by the modified Zipf law. We suggest that website
popularity may be a universal property of Internet.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 15:17:22 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Aug 2005 20:00:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krashakov",
"Serge A.",
""
],
[
"Teslyuk",
"Anton B.",
""
],
[
"Shchur",
"Lev N.",
""
]
] |
cs/0404011 | Francesco Calimeri | G. Ianni, F. Calimeri, A. Pietramala, M.C. Santoro | Parametric external predicates for the DLV System | 10 pages | null | null | null | cs.AI | null | This document describes syntax, semantics and implementation guidelines in
order to enrich the DLV system with the possibility to make external C function
calls. This feature is realized by the introduction of parametric external
predicates, whose extension is not specified through a logic program but
implicitly computed through external code.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 17:15:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ianni",
"G.",
""
],
[
"Calimeri",
"F.",
""
],
[
"Pietramala",
"A.",
""
],
[
"Santoro",
"M. C.",
""
]
] |
cs/0404012 | Francesco Calimeri | Francesco Calimeri, Nicola Leone | Toward the Implementation of Functions in the DLV System (Preliminary
Technical Report) | 7 pages | null | null | null | cs.AI | null | This document describes the functions as they are treated in the DLV system.
We give first the language, then specify the main implementation issues.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 17:23:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Calimeri",
"Francesco",
""
],
[
"Leone",
"Nicola",
""
]
] |
cs/0404013 | Kevin Lai | Kevin Lai, Bernardo A. Huberman, and Leslie Fine | Tycoon: A Distributed Market-based Resource Allocation System | null | null | null | null | cs.DC cs.MA | null | P2P clusters like the Grid and PlanetLab enable in principle the same
statistical multiplexing efficiency gains for computing as the Internet
provides for networking. The key unsolved problem is resource allocation.
Existing solutions are not economically efficient and require high latency to
acquire resources. We designed and implemented Tycoon, a market based
distributed resource allocation system based on an Auction Share scheduling
algorithm. Preliminary results show that Tycoon achieves low latency and high
fairness while providing incentives for truth-telling on the part of strategic
users.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 19:54:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lai",
"Kevin",
""
],
[
"Huberman",
"Bernardo A.",
""
],
[
"Fine",
"Leslie",
""
]
] |
cs/0404018 | Jiyou Jia | Jiyou Jia | NLML--a Markup Language to Describe the Unlimited English Grammar | 15 Pages, 2 Figures, 3 Tables submitted to German Conference for
Artificial Intelligence 2004 Ulm | null | null | null | cs.CL cs.AI | null | In this paper we present NLML (Natural Language Markup Language), a markup
language to describe the syntactic and semantic structure of any grammatically
correct English expression. At first the related works are analyzed to
demonstrate the necessity of the NLML: simple form, easy management and direct
storage. Then the description of the English grammar with NLML is introduced in
details in three levels: sentences (with different complexities, voices, moods,
and tenses), clause (relative clause and noun clause) and phrase (noun phrase,
verb phrase, prepositional phrase, adjective phrase, adverb phrase and
predicate phrase). At last the application fields of the NLML in NLP are shown
with two typical examples: NLOJM (Natural Language Object Modal in Java) and
NLDB (Natural Language Database).
| [
{
"version": "v1",
"created": "Wed, 7 Apr 2004 06:54:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jia",
"Jiyou",
""
]
] |
cs/0404020 | Gopalan Nadathur | Gopalan Nadathur | A treatment of higher-order features in logic programming | 50 pages, 4 figures, 2 tables. To appear in Theory and Practice of
Logic Programming (TPLP) | null | null | null | cs.PL | null | The logic programming paradigm provides the basis for a new intensional view
of higher-order notions. This view is realized primarily by employing the terms
of a typed lambda calculus as representational devices and by using a richer
form of unification for probing their structures. These additions have
important meta-programming applications but they also pose non-trivial
implementation problems. One issue concerns the machine representation of
lambda terms suitable to their intended use: an adequate encoding must
facilitate comparison operations over terms in addition to supporting the usual
reduction computation. Another aspect relates to the treatment of a unification
operation that has a branching character and that sometimes calls for the
delaying of the solution of unification problems. A final issue concerns the
execution of goals whose structures become apparent only in the course of
computation. These various problems are exposed in this paper and solutions to
them are described. A satisfactory representation for lambda terms is developed
by exploiting the nameless notation of de Bruijn as well as explicit encodings
of substitutions. Special mechanisms are molded into the structure of
traditional Prolog implementations to support branching in unification and
carrying of unification problems over other computation steps; a premium is
placed in this context on exploiting determinism and on emulating usual
first-order behaviour. An extended compilation model is presented that treats
higher-order unification and also handles dynamically emergent goals. The ideas
described here have been employed in the Teyjus implementation of the Lambda
Prolog language, a fact that is used to obtain a preliminary assessment of
their efficacy.
| [
{
"version": "v1",
"created": "Wed, 7 Apr 2004 17:26:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nadathur",
"Gopalan",
""
]
] |
cs/0404021 | Jean-Charles Delvenne | Jean-Charles Delvenne, Petr Kurka and Vincent Blondel | Decidability and Universality in Symbolic Dynamical Systems | 23 pages; a shorter version is submitted to conference MCU 2004 v2:
minor orthographic changes v3: section 5.2 (collatz functions) mathematically
improved v4: orthographic corrections, one reference added v5:27 pages.
Important modifications. The formalism is strengthened: temporal logic
replaced by finite automata. New results. Submitted | null | null | null | cs.CC cs.LO | null | Many different definitions of computational universality for various types of
dynamical systems have flourished since Turing's work. We propose a general
definition of universality that applies to arbitrary discrete time symbolic
dynamical systems. Universality of a system is defined as undecidability of a
model-checking problem. For Turing machines, counter machines and tag systems,
our definition coincides with the classical one. It yields, however, a new
definition for cellular automata and subshifts. Our definition is robust with
respect to initial condition, which is a desirable feature for physical
realizability.
We derive necessary conditions for undecidability and universality. For
instance, a universal system must have a sensitive point and a proper
subsystem. We conjecture that universal systems have infinite number of
subsystems. We also discuss the thesis according to which computation should
occur at the `edge of chaos' and we exhibit a universal chaotic system.
| [
{
"version": "v1",
"created": "Thu, 8 Apr 2004 02:45:34 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Apr 2004 13:02:57 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Sep 2004 14:04:06 GMT"
},
{
"version": "v4",
"created": "Fri, 8 Jul 2005 11:43:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Delvenne",
"Jean-Charles",
""
],
[
"Kurka",
"Petr",
""
],
[
"Blondel",
"Vincent",
""
]
] |
cs/0404022 | Artur Rataj | Artur Rataj | An Algorithm for Transforming Color Images into Tactile Graphics | 9 pages, 7 figures | null | null | IITiS-20040408-1-1 | cs.GR | null | This paper presents an algorithm that transforms color visual images, like
photographs or paintings, into tactile graphics. In the algorithm, the edges of
objects are detected and colors of the objects are estimated. Then, the edges
and the colors are encoded into lines and textures in the output tactile image.
Design of the method is substantiated by various qualities of haptic
recognizing of images. Also, means of presentation of the tactile images in
printouts are discussed. Example translated images are shown.
| [
{
"version": "v1",
"created": "Thu, 8 Apr 2004 14:07:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rataj",
"Artur",
""
]
] |
cs/0404025 | Atsushi Fujii | Atsushi Fujii, Makoto Iwayama, and Noriko Kando | Test Collections for Patent-to-Patent Retrieval and Patent Map
Generation in NTCIR-4 Workshop | 4 pages, Proceedings of the 4th International Conference on Language
Resources and Evaluation (to appear) | Proceedings of the 4th International Conference on Language
Resources and Evaluation (LREC-2004), pp.1643-1646, May. 2004. | null | null | cs.CL | null | This paper describes the Patent Retrieval Task in the Fourth NTCIR Workshop,
and the test collections produced in this task. We perform the invalidity
search task, in which each participant group searches a patent collection for
the patents that can invalidate the demand in an existing claim. We also
perform the automatic patent map generation task, in which the patents
associated with a specific topic are organized in a multi-dimensional matrix.
| [
{
"version": "v1",
"created": "Sat, 10 Apr 2004 08:43:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Iwayama",
"Makoto",
""
],
[
"Kando",
"Noriko",
""
]
] |
cs/0404026 | Darran Nathan | Darran Nathan, Eva Rosdiana, Chua Beng Koon | DAB Content Annotation and Receiver Hardware Control with XML | 6 pages, 7 figures | null | null | null | cs.GL cs.CL | null | The Eureka-147 Digital Audio Broadcasting (DAB) standard defines the 'dynamic
labels' data field for holding information about the transmission content.
However, this information does not follow a well-defined structure since it is
designed to carry text for direct output to displays, for human interpretation.
This poses a problem when machine interpretation of DAB content information is
desired. Extensible Markup Language (XML) was developed to allow for the
well-defined, structured machine-to-machine exchange of data over computer
networks. This article proposes a novel technique of machine-interpretable DAB
content annotation and receiver hardware control, involving the utilisation of
XML as metadata in the transmitted DAB frames.
| [
{
"version": "v1",
"created": "Sun, 11 Apr 2004 08:36:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nathan",
"Darran",
""
],
[
"Rosdiana",
"Eva",
""
],
[
"Koon",
"Chua Beng",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.