id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0404027 | Rajkumar Buyya | Rajkumar Buyya and Srikumar Venugopal | The Gridbus Toolkit for Service Oriented Grid and Utility Computing: An
Overview and Status Report | 11 pages, 3 figures, 3 tables | null | null | Technical Report, GRIDS-TR-2004-2, Grid Computing and Distributed
Systems Laboratory, University of Melbourne, Australia, April 2004 | cs.DC | null | Grids aim at exploiting synergies that result from cooperation of autonomous
distributed entities. The synergies that result from grid cooperation include
the sharing, exchange, selection, and aggregation of geographically distributed
resources such as computers, data bases, software, and scientific instruments
for solving large-scale problems in science, engineering, and commerce. For
this cooperation to be sustainable, participants need to have economic
incentive. Therefore, "incentive" mechanisms should be considered as one of key
design parameters of Grid architectures. In this article, we present an
overview and status of an open source Grid toolkit, called Gridbus, whose
architecture is fundamentally driven by the requirements of Grid economy.
Gridbus technologies provide services for both computational and data grids
that power the emerging eScience and eBusiness applications.
| [
{
"version": "v1",
"created": "Tue, 13 Apr 2004 09:16:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buyya",
"Rajkumar",
""
],
[
"Venugopal",
"Srikumar",
""
]
] |
cs/0404028 | Saju Jude Dominic | Saju Jude Dominic and G. Sajith | The Random Buffer Tree : A Randomized Technique for I/O-efficient
Algorithms | 13 pages with no figures, unpublished | null | null | null | cs.DS | null | In this paper, we present a probabilistic self-balancing dictionary data
structure for massive data sets, and prove expected amortized I/O-optimal
bounds on the dictionary operations. We show how to use the structure as an
I/O-optimal priority queue. The data structure, which we call as the random
buffer tree, abstracts the properties of the random treap and the buffer tree
and has the same expected I/O-bounds as the buffer tree.
| [
{
"version": "v1",
"created": "Tue, 13 Apr 2004 13:49:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dominic",
"Saju Jude",
""
],
[
"Sajith",
"G.",
""
]
] |
cs/0404032 | David Finton | David J. Finton | When Do Differences Matter? On-Line Feature Extraction Through Cognitive
Economy | 20 pages, 10 PostScript figures, LaTeX2e | null | null | null | cs.LG cs.AI cs.NE | null | For an intelligent agent to be truly autonomous, it must be able to adapt its
representation to the requirements of its task as it interacts with the world.
Most current approaches to on-line feature extraction are ad hoc; in contrast,
this paper presents an algorithm that bases judgments of state compatibility
and state-space abstraction on principled criteria derived from the
psychological principle of cognitive economy. The algorithm incorporates an
active form of Q-learning, and partitions continuous state-spaces by merging
and splitting Voronoi regions. The experiments illustrate a new methodology for
testing and comparing representations by means of learning curves. Results from
the puck-on-a-hill task demonstrate the algorithm's ability to learn effective
representations, superior to those produced by some other, well-known, methods.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 2004 02:59:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Finton",
"David J.",
""
]
] |
cs/0404033 | Saju Jude Dominic | Saju Jude Dominic and G. Sajith | The Persistent Buffer Tree : An I/O-efficient Index for Temporal Data | 11 pages with no figures, unpublished | null | null | null | cs.GL cs.DB | null | In a variety of applications, we need to keep track of the development of a
data set over time. For maintaining and querying this multi version data
I/O-efficiently, external memory data structures are required. In this paper,
we present a probabilistic self-balancing persistent data structure in external
memory called the persistent buffer tree, which supports insertions, updates
and deletions of data items at the present version and range queries for any
version, past or present. The persistent buffer tree is I/O-optimal in the
sense that the expected amortized I/O performance bounds are asymptotically the
same as the deterministic amortized bounds of the (single version) buffer tree
in the worst case.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 2004 03:17:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dominic",
"Saju Jude",
""
],
[
"Sajith",
"G.",
""
]
] |
cs/0404035 | Andreas Mielke | Andreas Mielke | Elements for Response Time Statistics in ERP Transaction Systems | revtex, twocolumn, 8 pages, 13 figures. figures replaced by coloured
versions | Performance Evaluation 64, 635-653 (2006) | 10.1016/j.peva.2005.05.006 | null | cs.PF | null | We present some measurements and ideas for response time statistics in ERP
systems. It is shown that the response time distribution of a given transaction
in a given system is generically a log-normal distribution or, in some
situations, a sum of two or more log-normal distributions. We present some
arguments for this form of the distribution based on heuristic rules for
response times, and we show data from performance measurements in actual
systems to support the log-normal form. Deviations of the log-normal form can
often be traced back to performance problems in the system. Consequences for
the interpretation of response time data and for service level agreements are
discussed.
| [
{
"version": "v1",
"created": "Fri, 16 Apr 2004 16:03:05 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Apr 2004 16:05:09 GMT"
},
{
"version": "v3",
"created": "Mon, 16 May 2005 21:22:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mielke",
"Andreas",
""
]
] |
cs/0404036 | Sandor P. Fekete | Sandor P. Fekete and Rolf Klein and Andreas Nuechter | Online Searching with an Autonomous Robot | 16 pages, 8 figures, 12 photographs, 1 table, Latex, submitted for
publication | null | null | null | cs.RO cs.DS | null | We discuss online strategies for visibility-based searching for an object
hidden behind a corner, using Kurt3D, a real autonomous mobile robot. This task
is closely related to a number of well-studied problems. Our robot uses a
three-dimensional laser scanner in a stop, scan, plan, go fashion for building
a virtual three-dimensional environment. Besides planning trajectories and
avoiding obstacles, Kurt3D is capable of identifying objects like a chair. We
derive a practically useful and asymptotically optimal strategy that guarantees
a competitive ratio of 2, which differs remarkably from the well-studied
scenario without the need of stopping for surveying the environment. Our
strategy is used by Kurt3D, documented in a separate video.
| [
{
"version": "v1",
"created": "Fri, 16 Apr 2004 21:46:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Klein",
"Rolf",
""
],
[
"Nuechter",
"Andreas",
""
]
] |
cs/0404038 | Douglas Powell | D. B. Powell | 2-Sat Sub-Clauses and the Hypernodal Structure of the 3-Sat Problem | 16 pages; 8 figures | null | null | null | cs.CC cs.AI | null | Like simpler graphs, nested (hypernodal) graphs consist of two components: a
set of nodes and a set of edges, where each edge connects a pair of nodes. In
the hypernodal graph model, however, a node may contain other graphs, so that a
node may be contained in a graph that it contains. The inherently recursive
structure of the hypernodal graph model aptly characterizes both the structure
and dynamic of the 3-sat problem, a broadly applicable, though intractable,
computer science problem. In this paper I first discuss the structure of the
3-sat problem, analyzing the relation of 3-sat to 2-sat, a related, though
tractable problem. I then discuss sub-clauses and sub-clause thresholds and the
transformation of sub-clauses into implication graphs, demonstrating how
combinations of implication graphs are equivalent to hypernodal graphs. I
conclude with a brief discussion of the use of hypernodal graphs to model the
3-sat problem, illustrating how hypernodal graphs model both the conditions for
satisfiability and the process by which particular 3-sat assignments either
succeed or fail.
| [
{
"version": "v1",
"created": "Tue, 20 Apr 2004 08:23:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Powell",
"D. B.",
""
]
] |
cs/0404039 | Alexei Kaltchenko | Alexei Kaltchenko | Algorithms for Estimating Information Distance with Application to
Bioinformatics and Linguistics | 4 pages | null | null | null | cs.CC cs.CE q-bio.GN | null | After reviewing unnormalized and normalized information distances based on
incomputable notions of Kolmogorov complexity, we discuss how Kolmogorov
complexity can be approximated by data compression algorithms. We argue that
optimal algorithms for data compression with side information can be
successfully used to approximate the normalized distance. Next, we discuss an
alternative information distance, which is based on relative entropy rate (also
known as Kullback-Leibler divergence), and compression-based algorithms for its
estimation. Based on available biological and linguistic data, we arrive to
unexpected conclusion that in Bioinformatics and Computational Linguistics this
alternative distance is more relevant and important than the ones based on
Kolmogorov complexity.
| [
{
"version": "v1",
"created": "Tue, 20 Apr 2004 15:18:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kaltchenko",
"Alexei",
""
]
] |
cs/0404040 | Nicolas Christin | Nicolas Christin, Jens Grossklags and John Chuang | Near Rationality and Competitive Equilibria in Networked Systems | 13 pages, no figures | null | null | p2pecon TR-2004-04-CGC | cs.GT cs.NI | null | A growing body of literature in networked systems research relies on game
theory and mechanism design to model and address the potential lack of
cooperation between self-interested users. Most game-theoretic models applied
to system research only describe competitive equilibria in terms of pure Nash
equilibria, that is, a situation where the strategy of each user is
deterministic, and is her best response to the strategies of all the other
users. However, the assumptions necessary for a pure Nash equilibrium to hold
may be too stringent for practical systems. Using three case studies on
computer security, TCP congestion control, and network formation, we outline
the limits of game-theoretic models relying on Nash equilibria, and we argue
that considering competitive equilibria of a more general form may help
reconcile predictions from game-theoretic models with empirically observed
behavior.
| [
{
"version": "v1",
"created": "Tue, 20 Apr 2004 22:26:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Christin",
"Nicolas",
""
],
[
"Grossklags",
"Jens",
""
],
[
"Chuang",
"John",
""
]
] |
cs/0404041 | Jiyou Jia | Jiyou Jia | NLOMJ--Natural Language Object Model in Java | 11 pages, 1 figure. Submitted to ICICP04 | null | null | null | cs.CL cs.PL | null | In this paper we present NLOMJ--a natural language object model in Java with
English as the experiment language. This modal describes the grammar elements
of any permissible expression in a natural language and their complicated
relations with each other with the concept "Object" in OOP(Object Oriented
Programming). Directly mapped to the syntax and semantics of the natural
language, it can be used in information retrieval as a linguistic method.
Around the UML diagram of the NLOMJ the important classes(Sentence, Clause and
Phrase) and their sub classes are introduced and their syntactic and semantic
meanings are explained.
| [
{
"version": "v1",
"created": "Wed, 21 Apr 2004 06:30:28 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Feb 2006 15:05:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jia",
"Jiyou",
""
]
] |
cs/0404042 | Wajahat Ali | W. Ali, R.J. Mondragon and F. Alavi | Extraction of topological features from communication network
topological patterns using self-organizing feature maps | 8 Pages, 5 figures, To be appeared in IEE Electronics Letter Journal | null | null | null | cs.NE cs.CV | null | Different classes of communication network topologies and their
representation in the form of adjacency matrix and its eigenvalues are
presented. A self-organizing feature map neural network is used to map
different classes of communication network topological patterns. The neural
network simulation results are reported.
| [
{
"version": "v1",
"created": "Wed, 21 Apr 2004 16:05:27 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Apr 2004 09:00:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ali",
"W.",
""
],
[
"Mondragon",
"R. J.",
""
],
[
"Alavi",
"F.",
""
]
] |
cs/0404045 | Bayle Shanks | Bayle Shanks | Speculation on graph computation architectures and computing via
synchronization | 61 pages. Informal, rambling. (replacment changed only abstract) | null | null | null | cs.NE cs.AI | null | A speculative overview of a future topic of research. The paper is a
collection of ideas concerning two related areas:
1) Graph computation machines ("computing with graphs"). This is the class of
models of computation in which the state of the computation is represented as a
graph or network.
2) Arc-based neural networks, which store information not as activation in
the nodes, but rather by adding and deleting arcs. Sometimes the arcs may be
interpreted as synchronization.
Warnings to readers: this is not the sort of thing that one might submit to a
journal or conference. No proofs are presented. The presentation is informal,
and written at an introductory level. You'll probably want to wait for a more
concise presentation.
| [
{
"version": "v1",
"created": "Thu, 22 Apr 2004 07:29:19 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Apr 2004 16:56:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shanks",
"Bayle",
""
]
] |
cs/0404046 | Sanjay Rana | Sanjay Rana and Mike Batty | Visualising the structure of architectural open spaces based on shape
analysis | 10 pages, 9 figures | International Journal of Architectural Computing, 2(1), 2004 | null | null | cs.CV cs.CG cs.DS | null | This paper proposes the application of some well known two-dimensional
geometrical shape descriptors for the visualisation of the structure of
architectural open spaces. The paper demonstrates the use of visibility
measures such as distance to obstacles and amount of visible space to calculate
shape descriptors such as convexity and skeleton of the open space. The aim of
the paper is to indicate a simple, objective and quantifiable approach to
understand the structure of open spaces otherwise impossible due to the complex
construction of built structures.
| [
{
"version": "v1",
"created": "Thu, 22 Apr 2004 13:42:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rana",
"Sanjay",
""
],
[
"Batty",
"Mike",
""
]
] |
cs/0404047 | Gianluca Argentini | Gianluca Argentini | Using matrices in post-processing phase of CFD simulations | Paper based on presentation-talk at SCICOMP9, Bologna (Italy), March
23-26, 2004; workshop organized by IBM, CINECA (Italy) (dr. Sigismondo
Boschi, dr. Giovanni Erbacci), NERSC-DOE (USA) (dr. David Skinner), web site:
www.spscicomp.org ; main topics: Computational Fluid Dynamics | Progress in Industrial Mathematics at ECMI 2004 - Eindhoven
(Netherlands), Springer, 2005 | null | null | cs.NA cs.DC physics.comp-ph | null | In this work I present a technique of construction and fast evaluation of a
family of cubic polynomials for analytic smoothing and graphical rendering of
particles trajectories for flows in a generic geometry. The principal result of
the work was implementation and test of a method for interpolating 3D points by
regular parametric curves and their fast and efficient evaluation for a good
resolution of rendering. For the purpose I have used a parallel environment
using a multiprocessor cluster architecture. The efficiency of the used method
is good, mainly reducing the number of floating-points computations by caching
the numerical values of some line-parameter's powers, and reducing the
necessity of communication among processes. This work has been developed for
the Research and Development Department of my company for planning advanced
customized models of industrial burners.
| [
{
"version": "v1",
"created": "Thu, 22 Apr 2004 15:33:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0404048 | Francesco Ranzato | Roberto Giacobazzi and Francesco Ranzato | Incompleteness of States w.r.t. Traces in Model Checking | null | null | null | null | cs.LO | null | Cousot and Cousot introduced and studied a general past/future-time
specification language, called mu*-calculus, featuring a natural time-symmetric
trace-based semantics. The standard state-based semantics of the mu*-calculus
is an abstract interpretation of its trace-based semantics, which turns out to
be incomplete (i.e., trace-incomplete), even for finite systems. As a
consequence, standard state-based model checking of the mu*-calculus is
incomplete w.r.t. trace-based model checking. This paper shows that any
refinement or abstraction of the domain of sets of states induces a
corresponding semantics which is still trace-incomplete for any propositional
fragment of the mu*-calculus. This derives from a number of results, one for
each incomplete logical/temporal connective of the mu*-calculus, that
characterize the structure of models, i.e. transition systems, whose
corresponding state-based semantics of the mu*-calculus is trace-complete.
| [
{
"version": "v1",
"created": "Fri, 23 Apr 2004 08:49:18 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Aug 2005 09:34:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giacobazzi",
"Roberto",
""
],
[
"Ranzato",
"Francesco",
""
]
] |
cs/0404050 | Jiang Qiu | Puri Arenas-Sanchez, Mario Rodriguez-Artalejo | A General Framework For Lazy Functional Logic Programming With Algebraic
Polymorphic Types | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 2,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 2, 2001 | null | null | cs.PL | null | We propose a general framework for first-order functional logic programming,
supporting lazy functions, non-determinism and polymorphic datatypes whose data
constructors obey a set C of equational axioms. On top of a given C, we specify
a program as a set R of C-based conditional rewriting rules for defined
functions. We argue that equational logic does not supply the proper semantics
for such programs. Therefore, we present an alternative logic which includes
C-based rewriting calculi and a notion of model. We get soundness and
completeness for C-based rewriting w.r.t. models, existence of free models for
all programs, and type preservation results. As operational semantics, we
develop a sound and complete procedure for goal solving, which is based on the
combination of lazy narrowing with unification modulo C. Our framework is quite
expressive for many purposes, such as solving action and change problems, or
realizing the GAMMA computation model.
| [
{
"version": "v1",
"created": "Sat, 24 Apr 2004 14:02:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arenas-Sanchez",
"Puri",
""
],
[
"Rodriguez-Artalejo",
"Mario",
""
]
] |
cs/0404051 | Jiang Qiu | Jorge Lobo, Gisela Mendez, Stuart R. Taylor | Knowledge And The Action Description Language A | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 2,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 2, 2001 | null | null | cs.AI | null | We introduce Ak, an extension of the action description language A (Gelfond
and Lifschitz, 1993) to handle actions which affect knowledge. We use sensing
actions to increase an agent's knowledge of the world and non-deterministic
actions to remove knowledge. We include complex plans involving conditionals
and loops in our query language for hypothetical reasoning. We also present a
translation of Ak domain descriptions into epistemic logic programs.
| [
{
"version": "v1",
"created": "Sat, 24 Apr 2004 14:16:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lobo",
"Jorge",
""
],
[
"Mendez",
"Gisela",
""
],
[
"Taylor",
"Stuart R.",
""
]
] |
cs/0404052 | Jiang Qiu | Keith L. Clark, Peter J. Robinson, Richard Hagen | Multi-Threading And Message Communication In Qu-Prolog | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 3,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 3, 2001 | null | null | cs.PL | null | This paper presents the multi-threading and internet message communication
capabilities of Qu-Prolog. Message addresses are symbolic and the
communications package provides high-level support that completely hides
details of IP addresses and port numbers as well as the underlying TCP/IP
transport layer. The combination of the multi-threads and the high level
inter-thread message communications provide simple, powerful support for
implementing internet distributed intelligent applications.
| [
{
"version": "v1",
"created": "Sun, 25 Apr 2004 03:49:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Clark",
"Keith L.",
""
],
[
"Robinson",
"Peter J.",
""
],
[
"Hagen",
"Richard",
""
]
] |
cs/0404053 | Jiang Qiu | Javier Leach, Susana Nieva, Mario Rodriguez-Artalejo | Constraint Logic Programming with Hereditary Harrop Formula | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 4,
2001. Appeared in Theory and Practice of Logic Programming, vol. 1, no. 4,
2001 | null | null | null | cs.PL | null | Constraint Logic Programming (CLP) and Hereditary Harrop formulas (HH) are
two well known ways to enhance the expressivity of Horn clauses. In this paper,
we present a novel combination of these two approaches. We show how to enrich
the syntax and proof theory of HH with the help of a given constraint system,
in such a way that the key property of HH as a logic programming language
(namely, the existence of uniform proofs) is preserved. We also present a
procedure for goal solving, showing its soundness and completeness for
computing answer constraints. As a consequence of this result, we obtain a new
strong completeness theorem for CLP that avoids the need to build disjunctions
of computed answers, as well as a more abstract formulation of a known
completeness theorem for HH.
| [
{
"version": "v1",
"created": "Mon, 26 Apr 2004 13:22:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leach",
"Javier",
""
],
[
"Nieva",
"Susana",
""
],
[
"Rodriguez-Artalejo",
"Mario",
""
]
] |
cs/0404054 | Matthias Bauer | Matthias Bauer | New Covert Channels in HTTP | 7 pages | Proceedings of the 2003 ACM Workshop on Privacy in the Electronic
Society | null | null | cs.CR cs.NI | null | This paper presents new methods enabling anonymous communication on the
Internet. We describe a new protocol that allows us to create an anonymous
overlay network by exploiting the web browsing activities of regular users. We
show that the overlay network provides an anonymity set greater than the set of
senders and receivers in a realistic threat model. In particular, the protocol
provides unobservability in our threat model.
| [
{
"version": "v1",
"created": "Mon, 26 Apr 2004 17:20:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bauer",
"Matthias",
""
]
] |
cs/0404055 | Roberto Bagnara | Roberto Bagnara, Roberta Gori, Patricia M. Hill, and Enea Zaffanella | Finite-Tree Analysis for Constraint Logic-Based Languages: The Complete
Unabridged Version | 89 pages, 1 table | null | null | null | cs.PL | null | Logic languages based on the theory of rational, possibly infinite, trees
have much appeal in that rational trees allow for faster unification (due to
the safe omission of the occurs-check) and increased expressivity (cyclic terms
can provide very efficient representations of grammars and other useful
objects). Unfortunately, the use of infinite rational trees has problems. For
instance, many of the built-in and library predicates are ill-defined for such
trees and need to be supplemented by run-time checks whose cost may be
significant. Moreover, some widely-used program analysis and manipulation
techniques are correct only for those parts of programs working over finite
trees. It is thus important to obtain, automatically, a knowledge of the
program variables (the finite variables) that, at the program points of
interest, will always be bound to finite terms. For these reasons, we propose
here a new data-flow analysis, based on abstract interpretation, that captures
such information.
| [
{
"version": "v1",
"created": "Mon, 26 Apr 2004 20:44:49 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Apr 2004 20:13:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Gori",
"Roberta",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Zaffanella",
"Enea",
""
]
] |
cs/0405001 | Nurlan Djenchuraev D. | Nurlan Djenchuraev | Toward a New Policy for Scientific and Technical Communication: the Case
of Kyrgyz Republic | Policy Paper | null | null | null | cs.CY | null | The objective of this policy paper is to formulate a new policy in the field
of scientific and technical information (STI) in Kyrgyz Republic in the light
of emergence and rapid development of electronic scientific communication. The
major problem with communication in science in the Republic is lack of adequate
access to information by scientists. An equally serious problem is poor
visibility of research conducted in Kyrgyzstan and, as consequence, negligible
research impact on academic society globally. The paper proposes an integrated
approach to formulation of a new STI policy based on a number of policy
components: telecommunication networks, computerization, STI systems,
legislation & standards, and education & trainings. Two alternatives were
considered: electronic vs. paper-based scientific communication and development
of the national STI system vs. cross-national virtual collaboration. The study
results in suggesting a number of policy recommendations for identified
stakeholders.
| [
{
"version": "v1",
"created": "Sat, 1 May 2004 04:21:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Djenchuraev",
"Nurlan",
""
]
] |
cs/0405002 | Joost Vennekens | Joost Vennekens, David Gilis, Marc Denecker | Splitting an operator: Algebraic modularity results for logics with
fixpoint semantics | Revised to correct a substantial error in Section 4.2.2 (certain
results which only hold for_consistent_ possible world sets were stated to
hold in general) | ACM Transactions on Computational Logic, Volume 7, Number 4, 2006 | null | null | cs.AI cs.LO | null | It is well known that, under certain conditions, it is possible to split
logic programs under stable model semantics, i.e. to divide such a program into
a number of different "levels", such that the models of the entire program can
be constructed by incrementally constructing models for each level. Similar
results exist for other non-monotonic formalisms, such as auto-epistemic logic
and default logic. In this work, we present a general, algebraicsplitting
theory for logics with a fixpoint semantics. Together with the framework of
approximation theory, a general fixpoint theory for arbitrary operators, this
gives us a uniform and powerful way of deriving splitting results for each
logic with a fixpoint semantics. We demonstrate the usefulness of these
results, by generalizing existing results for logic programming, auto-epistemic
logic and default logic.
| [
{
"version": "v1",
"created": "Mon, 3 May 2004 09:05:14 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Oct 2006 13:37:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vennekens",
"Joost",
""
],
[
"Gilis",
"David",
""
],
[
"Denecker",
"Marc",
""
]
] |
cs/0405003 | Aniello Buonocore | Laura Bozzelli | Model checking for Process Rewrite Systems and a class of action--based
regular properties | 31 pages, 1 figures | null | null | null | cs.OH | null | We consider the model checking problem for Process Rewrite Systems (PRSs), an
infinite-state formalism (non Turing-powerful) which subsumes many common
models such as Pushdown Processes and Petri Nets. PRSs can be adopted as formal
models for programs with dynamic creation and synchronization of concurrent
processes, and with recursive procedures. The model-checking problem for PRSs
and action-based linear temporal logic (ALTL) is undecidable. However,
decidability for some interesting fragment of ALTL remains an open question. In
this paper we state decidability results concerning generalized acceptance
properties about infinite derivations (infinite term rewriting) in PRSs. As a
consequence, we obtain decidability of the model-checking (restricted to
infinite runs) for PRSs and a meaningful fragment of ALTL.
| [
{
"version": "v1",
"created": "Mon, 3 May 2004 15:19:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bozzelli",
"Laura",
""
]
] |
cs/0405004 | Archil Avaliani | Archil Avaliani | Quantum Computers | null | null | null | null | cs.AI cs.AR | null | This research paper gives an overview of quantum computers - description of
their operation, differences between quantum and silicon computers, major
construction problems of a quantum computer and many other basic aspects. No
special scientific knowledge is necessary for the reader.
| [
{
"version": "v1",
"created": "Mon, 3 May 2004 20:25:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Avaliani",
"Archil",
""
]
] |
cs/0405007 | Tom Fawcett | Tom Fawcett | "In vivo" spam filtering: A challenge problem for data mining | null | KDD Explorations vol.5 no.2, Dec 2003. pp.140-148 | null | null | cs.AI cs.DB cs.IR | null | Spam, also known as Unsolicited Commercial Email (UCE), is the bane of email
communication. Many data mining researchers have addressed the problem of
detecting spam, generally by treating it as a static text classification
problem. True in vivo spam filtering has characteristics that make it a rich
and challenging domain for data mining. Indeed, real-world datasets with these
characteristics are typically difficult to acquire and to share. This paper
demonstrates some of these characteristics and argues that researchers should
pursue in vivo spam filtering as an accessible domain for investigating them.
| [
{
"version": "v1",
"created": "Tue, 4 May 2004 18:56:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fawcett",
"Tom",
""
]
] |
cs/0405008 | Ajith Abraham | Ravi Jain and Ajith Abraham | A Comparative Study of Fuzzy Classification Methods on Breast Cancer
Data | null | Australiasian Physical And Engineering Sciences in Medicine,
Australia, 2004 (forth coming) | null | null | cs.AI | null | In this paper, we examine the performance of four fuzzy rule generation
methods on Wisconsin breast cancer data. The first method generates fuzzy if
then rules using the mean and the standard deviation of attribute values. The
second approach generates fuzzy if then rules using the histogram of attributes
values. The third procedure generates fuzzy if then rules with certainty of
each attribute into homogeneous fuzzy sets. In the fourth approach, only
overlapping areas are partitioned. The first two approaches generate a single
fuzzy if then rule for each class by specifying the membership function of each
antecedent fuzzy set using the information about attribute values of training
patterns. The other two approaches are based on fuzzy grids with homogeneous
fuzzy partitions of each attribute. The performance of each approach is
evaluated on breast cancer data sets. Simulation results show that the Modified
grid approach has a high classification rate of 99.73 %.
| [
{
"version": "v1",
"created": "Tue, 4 May 2004 23:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"Ravi",
""
],
[
"Abraham",
"Ajith",
""
]
] |
cs/0405009 | Ajith Abraham | Ajith Abraham | Intelligent Systems: Architectures and Perspectives | null | Recent Advances in Intelligent Paradigms and Applications, Abraham
A., Jain L. and Kacprzyk J. (Eds.), Studies in Fuzziness and Soft Computing,
Springer Verlag Germany, ISBN 3790815381, Chapter 1, pp. 1-35, 2002 | null | null | cs.AI | null | The integration of different learning and adaptation techniques to overcome
individual limitations and to achieve synergetic effects through the
hybridization or fusion of these techniques has, in recent years, contributed
to a large number of new intelligent system designs. Computational intelligence
is an innovative framework for constructing intelligent hybrid architectures
involving Neural Networks (NN), Fuzzy Inference Systems (FIS), Probabilistic
Reasoning (PR) and derivative free optimization techniques such as Evolutionary
Computation (EC). Most of these hybridization approaches, however, follow an ad
hoc design methodology, justified by success in certain application domains.
Due to the lack of a common framework it often remains difficult to compare the
various hybrid systems conceptually and to evaluate their performance
comparatively. This chapter introduces the different generic architectures for
integrating intelligent systems. The designing aspects and perspectives of
different hybrid archirectures like NN-FIS, EC-FIS, EC-NN, FIS-PR and NN-FIS-EC
systems are presented. Some conclusions are also provided towards the end.
| [
{
"version": "v1",
"created": "Tue, 4 May 2004 23:48:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abraham",
"Ajith",
""
]
] |
cs/0405010 | Ajith Abraham | Ajith Abraham and Baikunth Nath | A Neuro-Fuzzy Approach for Modelling Electricity Demand in Victoria | null | Applied Soft Computing Journal, Elsevier Science, Volume 1&2, pp.
127-138, 2001 | null | null | cs.AI | null | Neuro-fuzzy systems have attracted growing interest of researchers in various
scientific and engineering areas due to the increasing need of intelligent
systems. This paper evaluates the use of two popular soft computing techniques
and conventional statistical approach based on Box--Jenkins autoregressive
integrated moving average (ARIMA) model to predict electricity demand in the
State of Victoria, Australia. The soft computing methods considered are an
evolving fuzzy neural network (EFuNN) and an artificial neural network (ANN)
trained using scaled conjugate gradient algorithm (CGA) and backpropagation
(BP) algorithm. The forecast accuracy is compared with the forecasts used by
Victorian Power Exchange (VPX) and the actual energy demand. To evaluate, we
considered load demand patterns for 10 consecutive months taken every 30 min
for training the different prediction models. Test results show that the
neuro-fuzzy system performed better than neural networks, ARIMA model and the
VPX forecasts.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 00:27:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abraham",
"Ajith",
""
],
[
"Nath",
"Baikunth",
""
]
] |
cs/0405011 | Ajith Abraham | Ajith Abraham | Neuro Fuzzy Systems: Sate-of-the-Art Modeling Techniques | null | Connectionist Models of Neurons, Learning Processes, and
Artificial Intelligence, Lecture Notes in Computer Science. Volume. 2084,
Springer Verlag Germany, Jose Mira and Alberto Prieto (Eds.), ISBN
3540422358, Spain, pp. 269-276, 2001 | null | null | cs.AI | null | Fusion of Artificial Neural Networks (ANN) and Fuzzy Inference Systems (FIS)
have attracted the growing interest of researchers in various scientific and
engineering areas due to the growing need of adaptive intelligent systems to
solve the real world problems. ANN learns from scratch by adjusting the
interconnections between layers. FIS is a popular computing framework based on
the concept of fuzzy set theory, fuzzy if-then rules, and fuzzy reasoning. The
advantages of a combination of ANN and FIS are obvious. There are several
approaches to integrate ANN and FIS and very often it depends on the
application. We broadly classify the integration of ANN and FIS into three
categories namely concurrent model, cooperative model and fully fused model.
This paper starts with a discussion of the features of each model and
generalize the advantages and deficiencies of each model. We further focus the
review on the different types of fused neuro-fuzzy systems and citing the
advantages and disadvantages of each model.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 00:32:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abraham",
"Ajith",
""
]
] |
cs/0405012 | Ajith Abraham | Ajith Abraham & Dan Steinberg | Is Neural Network a Reliable Forecaster on Earth? A MARS Query! | null | Bio-Inspired Applications of Connectionism, Lecture Notes in
Computer Science. Volume. 2085, Springer Verlag Germany, Jose Mira and
Alberto Prieto (Eds.), ISBN 3540422374, Spain, pp.679-686, 2001 | null | null | cs.AI | null | Long-term rainfall prediction is a challenging task especially in the modern
world where we are facing the major environmental problem of global warming. In
general, climate and rainfall are highly non-linear phenomena in nature
exhibiting what is known as the butterfly effect. While some regions of the
world are noticing a systematic decrease in annual rainfall, others notice
increases in flooding and severe storms. The global nature of this phenomenon
is very complicated and requires sophisticated computer modeling and simulation
to predict accurately. In this paper, we report a performance analysis for
Multivariate Adaptive Regression Splines (MARS)and artificial neural networks
for one month ahead prediction of rainfall. To evaluate the prediction
efficiency, we made use of 87 years of rainfall data in Kerala state, the
southern part of the Indian peninsula situated at latitude -longitude pairs
(8o29'N - 76o57' E). We used an artificial neural network trained using the
scaled conjugate gradient algorithm. The neural network and MARS were trained
with 40 years of rainfall data. For performance evaluation, network predicted
outputs were compared with the actual rainfall data. Simulation results reveal
that MARS is a good forecasting tool and performed better than the considered
neural network.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 00:36:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abraham",
"Ajith",
""
],
[
"Steinberg",
"Dan",
""
]
] |
cs/0405013 | Ajith Abraham | Golam Sorwar and Ajith Abraham | DCT Based Texture Classification Using Soft Computing Approach | null | Malaysian Journal of Computer Science, 2004 (forth coming) | null | null | cs.AI | null | Classification of texture pattern is one of the most important problems in
pattern recognition. In this paper, we present a classification method based on
the Discrete Cosine Transform (DCT) coefficients of texture image. As DCT works
on gray level image, the color scheme of each image is transformed into gray
levels. For classifying the images using DCT we used two popular soft computing
techniques namely neurocomputing and neuro-fuzzy computing. We used a
feedforward neural network trained using the backpropagation learning and an
evolving fuzzy neural network to classify the textures. The soft computing
models were trained using 80% of the texture data and remaining was used for
testing and validation purposes. A performance comparison was made among the
soft computing models for the texture classification problem. We also analyzed
the effects of prolonged training of neural networks. It is observed that the
proposed neuro-fuzzy model performed better than neural network.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 00:44:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sorwar",
"Golam",
""
],
[
"Abraham",
"Ajith",
""
]
] |
cs/0405014 | Ajith Abraham | Andy AuYeung and Ajith Abraham | Estimating Genome Reversal Distance by Genetic Algorithm | null | 2003 IEEE Congress on Evolutionary Computation (CEC2003),
Australia, IEEE Press, ISBN 0780378040, pp. 1157-1161, 2003 | null | null | cs.AI | null | Sorting by reversals is an important problem in inferring the evolutionary
relationship between two genomes. The problem of sorting unsigned permutation
has been proven to be NP-hard. The best guaranteed error bounded is the 3/2-
approximation algorithm. However, the problem of sorting signed permutation can
be solved easily. Fast algorithms have been developed both for finding the
sorting sequence and finding the reversal distance of signed permutation. In
this paper, we present a way to view the problem of sorting unsigned
permutation as signed permutation. And the problem can then be seen as
searching an optimal signed permutation in all n2 corresponding signed
permutations. We use genetic algorithm to conduct the search. Our experimental
result shows that the proposed method outperform the 3/2-approximation
algorithm.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 00:57:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"AuYeung",
"Andy",
""
],
[
"Abraham",
"Ajith",
""
]
] |
cs/0405015 | Darran Nathan | Darran Nathan, Kelvin Lim Mun Kit, Kelly Choo Hon Min, Philip Wong Jit
Chin, Andreas Weisensee | A High-Level Reconfigurable Computing Platform Software Frameworks | 4 pages, 8 figures | null | null | null | cs.AR | null | Reconfigurable computing refers to the use of processors, such as Field
Programmable Gate Arrays (FPGAs), that can be modified at the hardware level to
take on different processing tasks. A reconfigurable computing platform
describes the hardware and software base on top of which modular extensions can
be created, depending on the desired application. Such reconfigurable computing
platforms can take on varied designs and implementations, according to the
constraints imposed and features desired by the scope of applications. This
paper introduces a PC-based reconfigurable computing platform software
frameworks that is flexible and extensible enough to abstract the different
hardware types and functionality that different PCs may have. The requirements
of the software platform, architectural issues addressed, rationale behind the
decisions made, and frameworks design implemented are discussed.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 01:56:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nathan",
"Darran",
""
],
[
"Kit",
"Kelvin Lim Mun",
""
],
[
"Min",
"Kelly Choo Hon",
""
],
[
"Chin",
"Philip Wong Jit",
""
],
[
"Weisensee",
"Andreas",
""
]
] |
cs/0405016 | Ajith Abraham | Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham and Vitorino Ramos | Intrusion Detection Systems Using Adaptive Regression Splines | null | 6th International Conference on Enterprise Information Systems,
ICEIS'04, Portugal, I. Seruca, J. Filipe, S. Hammoudi and J. Cordeiro (Eds.),
ISBN 972-8865-00-7, Vol. 3, pp. 26-33, 2004 | null | null | cs.AI | null | Past few years have witnessed a growing recognition of intelligent techniques
for the construction of efficient and reliable intrusion detection systems. Due
to increasing incidents of cyber attacks, building effective intrusion
detection systems (IDS) are essential for protecting information systems
security, and yet it remains an elusive goal and a great challenge. In this
paper, we report a performance analysis between Multivariate Adaptive
Regression Splines (MARS), neural networks and support vector machines. The
MARS procedure builds flexible regression models by fitting separate splines to
distinct intervals of the predictor variables. A brief comparison of different
neural network learning algorithms is also given.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 02:22:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mukkamala",
"Srinivas",
""
],
[
"Sung",
"Andrew H.",
""
],
[
"Abraham",
"Ajith",
""
],
[
"Ramos",
"Vitorino",
""
]
] |
cs/0405017 | Ajith Abraham | Marcin Paprzycki, Ajith Abraham and Ruiyuan Guo | Data Mining Approach for Analyzing Call Center Performance | null | The 17th International Conference on Industrial & Engineering
Applications of Artificial Intelligence and Expert Systems, Canada, Springer
Verlag, Germany, 2004 (forth coming) | null | null | cs.AI | null | The aim of our research was to apply well-known data mining techniques (such
as linear neural networks, multi-layered perceptrons, probabilistic neural
networks, classification and regression trees, support vector machines and
finally a hybrid decision tree neural network approach) to the problem of
predicting the quality of service in call centers; based on the performance
data actually collected in a call center of a large insurance company. Our aim
was two-fold. First, to compare the performance of models built using the
above-mentioned techniques and, second, to analyze the characteristics of the
input sensitivity in order to better understand the relationship between the
perform-ance evaluation process and the actual performance and in this way help
improve the performance of call centers. In this paper we summarize our
findings.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 02:27:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paprzycki",
"Marcin",
""
],
[
"Abraham",
"Ajith",
""
],
[
"Guo",
"Ruiyuan",
""
]
] |
cs/0405018 | Ajith Abraham | Ajith Abraham, Ninan Sajith Philip and P. Saratchandran | Modeling Chaotic Behavior of Stock Indices Using Intelligent Paradigms | null | International Journal of Neural, Parallel & Scientific
Computations, USA, Volume 11, Issue (1&2), pp. 143-160, 2003 | null | null | cs.AI | null | The use of intelligent systems for stock market predictions has been widely
established. In this paper, we investigate how the seemingly chaotic behavior
of stock markets could be well represented using several connectionist
paradigms and soft computing techniques. To demonstrate the different
techniques, we considered Nasdaq-100 index of Nasdaq Stock MarketS and the S&P
CNX NIFTY stock index. We analyzed 7 year's Nasdaq 100 main index values and 4
year's NIFTY index values. This paper investigates the development of a
reliable and efficient technique to model the seemingly chaotic behavior of
stock markets. We considered an artificial neural network trained using
Levenberg-Marquardt algorithm, Support Vector Machine (SVM), Takagi-Sugeno
neuro-fuzzy model and a Difference Boosting Neural Network (DBNN). This paper
briefly explains how the different connectionist paradigms could be formulated
using different learning methods and then investigates whether they can provide
the required level of performance, which are sufficiently good and robust so as
to provide a reliable forecast model for stock market indices. Experiment
results reveal that all the connectionist paradigms considered could represent
the stock indices behavior very accurately.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 02:38:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abraham",
"Ajith",
""
],
[
"Philip",
"Ninan Sajith",
""
],
[
"Saratchandran",
"P.",
""
]
] |
cs/0405019 | Ajith Abraham | Sonja Petrovic-Lazarevic and Ajith Abraham | Hybrid Fuzzy-Linear Programming Approach for Multi Criteria Decision
Making Problems | null | International Journal of Neural, Parallel & Scientific
Computations, USA, Volume 11, Issues (1&2), pp. 53-68, 2003 | null | null | cs.AI | null | The purpose of this paper is to point to the usefulness of applying a linear
mathematical formulation of fuzzy multiple criteria objective decision methods
in organising business activities. In this respect fuzzy parameters of linear
programming are modelled by preference-based membership functions. This paper
begins with an introduction and some related research followed by some
fundamentals of fuzzy set theory and technical concepts of fuzzy multiple
objective decision models. Further a real case study of a manufacturing plant
and the implementation of the proposed technique is presented. Empirical
results clearly show the superiority of the fuzzy technique in optimising
individual objective functions when compared to non-fuzzy approach.
Furthermore, for the problem considered, the optimal solution helps to infer
that by incorporating fuzziness in a linear programming model either in
constraints, or both in objective functions and constraints, provides a similar
(or even better) level of satisfaction for obtained results compared to
non-fuzzy linear programming.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 02:44:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petrovic-Lazarevic",
"Sonja",
""
],
[
"Abraham",
"Ajith",
""
]
] |
cs/0405020 | Joel Friedman | Joel Friedman | A proof of Alon's second eigenvalue conjecture and related problems | To appear in Memoirs of the American Mathematical Society. 118 pages.
This newer version should have a two page glossary | null | null | null | cs.DM math.CO | null | In this paper we show the following conjecture of Noga Alon. Fix a positive
integer d>2 and real epsilon > 0; consider the probability that a random
d-regular graph on n vertices has the second eigenvalue of its adjacency matrix
greater than 2 sqrt(d-1) + epsilon; then this probability goes to zero as n
tends to infinity.
We prove the conjecture for a number of notions of random d-regular graph,
including models for d odd. We also estimate the aforementioned probability
more precisely, showing in many cases and models (but not all) that it decays
like a polynomial in 1/n.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 16:42:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedman",
"Joel",
""
]
] |
cs/0405022 | Eric Weber | Ryan Harkins, Eric Weber and Andrew Westmeyer | Encryption Schemes using Finite Frames and Hadamard Arrays | 14 pages, 11 figures | null | null | null | cs.CR | null | We propose a cipher similar to the One Time Pad and McEliece cipher based on
a subband coding scheme. The encoding process is an approximation to the One
Time Pad encryption scheme. We present results of numerical experiments which
suggest that a brute force attack to the proposed scheme does not result in all
possible plaintexts, as the One Time Pad does, but still the brute force attack
does not compromise the system. However, we demonstrate that the cipher is
vulnerable to a chosen-plaintext attack.
| [
{
"version": "v1",
"created": "Thu, 6 May 2004 16:33:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Harkins",
"Ryan",
""
],
[
"Weber",
"Eric",
""
],
[
"Westmeyer",
"Andrew",
""
]
] |
cs/0405023 | Rajkumar Buyya | Srikumar Venugopal, Rajkumar Buyya and Lyle Winton | A Grid Service Broker for Scheduling Distributed Data-Oriented
Applications on Global Grids | 15 pages, 11 figures, 1 table | null | null | Technical Report, GRIDS-TR-2004-1, Grid Computing and Distributed
Systems Laboratory, University of Melbourne, Australia, February 2004 | cs.DC | null | The next generation of scientific experiments and studies, popularly called
as e-Science, is carried out by large collaborations of researchers distributed
around the world engaged in analysis of huge collections of data generated by
scientific instruments. Grid computing has emerged as an enabler for e-Science
as it permits the creation of virtual organizations that bring together
communities with common objectives. Within a community, data collections are
stored or replicated on distributed resources to enhance storage capability or
efficiency of access. In such an environment, scientists need to have the
ability to carry out their studies by transparently accessing distributed data
and computational resources. In this paper, we propose and develop a Grid
broker that mediates access to distributed resources by (a) discovering
suitable data sources for a given analysis scenario, (b) suitable computational
resources, (c) optimally mapping analysis jobs to resources, (d) deploying and
monitoring job execution on selected resources, (e) accessing data from local
or remote data source during job execution and (f) collating and presenting
results. The broker supports a declarative and dynamic parametric programming
model for creating grid applications. We have used this model in grid-enabling
a high energy physics analysis application (Belle Analysis Software Framework).
The broker has been used in deploying Belle experiment data analysis jobs on a
grid testbed, called Belle Analysis Data Grid, having resources distributed
across Australia interconnected through GrangeNet.
| [
{
"version": "v1",
"created": "Thu, 6 May 2004 10:15:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venugopal",
"Srikumar",
""
],
[
"Buyya",
"Rajkumar",
""
],
[
"Winton",
"Lyle",
""
]
] |
cs/0405024 | Ajith Abraham | Ajith Abraham | Meta-Learning Evolutionary Artificial Neural Networks | null | Neurocomputing Journal, Elsevier Science, Netherlands, Vol. 56c,
pp. 1-38, 2004 | null | null | cs.AI | null | In this paper, we present MLEANN (Meta-Learning Evolutionary Artificial
Neural Network), an automatic computational framework for the adaptive
optimization of artificial neural networks wherein the neural network
architecture, activation function, connection weights; learning algorithm and
its parameters are adapted according to the problem. We explored the
performance of MLEANN and conventionally designed artificial neural networks
for function approximation problems. To evaluate the comparative performance,
we used three different well-known chaotic time series. We also present the
state of the art popular neural network learning algorithms and some
experimentation results related to convergence speed and generalization
performance. We explored the performance of backpropagation algorithm;
conjugate gradient algorithm, quasi-Newton algorithm and Levenberg-Marquardt
algorithm for the three chaotic time series. Performances of the different
learning algorithms were evaluated when the activation functions and
architecture were changed. We further present the theoretical background,
algorithm, design strategy and further demonstrate how effective and inevitable
is the proposed MLEANN framework to design a neural network, which is smaller,
faster and with a better generalization performance.
| [
{
"version": "v1",
"created": "Thu, 6 May 2004 13:44:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abraham",
"Ajith",
""
]
] |
cs/0405025 | Ajith Abraham | Andy Auyeung and Ajith Abraham | The Largest Compatible Subset Problem for Phylogenetic Data | null | Genetic and Evolutionary Computation 2004 Conference (GECCO-2004),
Bird-of-a-feather Workshop On Application of Hybrid Evolutionary Algorithms
to Complex Optimization Problems, Springer Verlag Germany, 2004 (forth
coming) | null | null | cs.AI | null | The phylogenetic tree construction is to infer the evolutionary relationship
between species from the experimental data. However, the experimental data are
often imperfect and conflicting each others. Therefore, it is important to
extract the motif from the imperfect data. The largest compatible subset
problem is that, given a set of experimental data, we want to discard the
minimum such that the remaining is compatible. The largest compatible subset
problem can be viewed as the vertex cover problem in the graph theory that has
been proven to be NP-hard. In this paper, we propose a hybrid Evolutionary
Computing (EC) method for this problem. The proposed method combines the EC
approach and the algorithmic approach for special structured graphs. As a
result, the complexity of the problem is dramatically reduced. Experiments were
performed on randomly generated graphs with different edge densities. The
vertex covers produced by the proposed method were then compared to the vertex
covers produced by a 2-approximation algorithm. The experimental results showed
that the proposed method consistently outperformed a classical 2- approximation
algorithm. Furthermore, a significant improvement was found when the graph
density was small.
| [
{
"version": "v1",
"created": "Thu, 6 May 2004 13:52:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Auyeung",
"Andy",
""
],
[
"Abraham",
"Ajith",
""
]
] |
cs/0405027 | Julian Togelius | Julian Togelius | Evolution of a Subsumption Architecture Neurocontroller | null | Journal of Intelligent and Fuzzy Systems, Vol. 15, No. 1 (2004) | null | null | cs.AI cs.NE | null | An approach to robotics called layered evolution and merging features from
the subsumption architecture into evolutionary robotics is presented, and its
advantages are discussed. This approach is used to construct a layered
controller for a simulated robot that learns which light source to approach in
an environment with obstacles. The evolvability and performance of layered
evolution on this task is compared to (standard) monolithic evolution,
incremental and modularised evolution. To corroborate the hypothesis that a
layered controller performs at least as well as an integrated one, the evolved
layers are merged back into a single network. On the grounds of the test
results, it is argued that layered evolution provides a superior approach for
many tasks, and it is suggested that this approach may be the key to scaling up
evolutionary robotics.
| [
{
"version": "v1",
"created": "Thu, 6 May 2004 19:37:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Togelius",
"Julian",
""
]
] |
cs/0405030 | Ajith Abraham | Ajith Abraham | Business Intelligence from Web Usage Mining | null | Journal of Information & Knowledge Management (JIKM), World
Scientific Publishing Co., Singapore, Vol. 2, No. 4, pp. 375-390, 2003 | null | null | cs.AI | null | The rapid e-commerce growth has made both business community and customers
face a new situation. Due to intense competition on one hand and the customer's
option to choose from several alternatives business community has realized the
necessity of intelligent marketing strategies and relationship management. Web
usage mining attempts to discover useful knowledge from the secondary data
obtained from the interactions of the users with the Web. Web usage mining has
become very critical for effective Web site management, creating adaptive Web
sites, business and support services, personalization, network traffic flow
analysis and so on. In this paper, we present the important concepts of Web
usage mining and its various practical applications. We further present a novel
approach 'intelligent-miner' (i-Miner) to optimize the concurrent architecture
of a fuzzy clustering algorithm (to discover web data clusters) and a fuzzy
inference system to analyze the Web site visitor trends. A hybrid evolutionary
fuzzy clustering algorithm is proposed in this paper to optimally segregate
similar user interests. The clustered data is then used to analyze the trends
using a Takagi-Sugeno fuzzy inference system learned using a combination of
evolutionary algorithm and neural network learning. Proposed approach is
compared with self-organizing maps (to discover patterns) and several function
approximation techniques like neural networks, linear genetic programming and
Takagi-Sugeno fuzzy inference system (to analyze the clusters). The results are
graphically illustrated and the practical significance is discussed in detail.
Empirical results clearly show that the proposed Web usage-mining framework is
efficient.
| [
{
"version": "v1",
"created": "Thu, 6 May 2004 23:54:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abraham",
"Ajith",
""
]
] |
cs/0405031 | Ajith Abraham | Cong Tran, Lakhmi Jain, Ajith Abraham | Adaptation of Mamdani Fuzzy Inference System Using Neuro - Genetic
Approach for Tactical Air Combat Decision Support System | null | 15th Australian Joint Conference on Artificial Intelligence
(AI'02) Australia, LNAI 2557, Springer Verlag, Germany, pp. 672-679, 2002 | null | null | cs.AI | null | Normally a decision support system is build to solve problem where
multi-criteria decisions are involved. The knowledge base is the vital part of
the decision support containing the information or data that is used in
decision-making process. This is the field where engineers and scientists have
applied several intelligent techniques and heuristics to obtain optimal
decisions from imprecise information. In this paper, we present a hybrid
neuro-genetic learning approach for the adaptation a Mamdani fuzzy inference
system for the Tactical Air Combat Decision Support System (TACDSS). Some
simulation results demonstrating the difference of the learning techniques and
are also provided.
| [
{
"version": "v1",
"created": "Thu, 6 May 2004 23:58:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tran",
"Cong",
""
],
[
"Jain",
"Lakhmi",
""
],
[
"Abraham",
"Ajith",
""
]
] |
cs/0405034 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 45 | 4 pages, to appear in SIGACT News and in IJCGA, 2004 | null | null | null | cs.CG cs.DM | null | The algorithm of Edelsbrunner for surface reconstruction by ``wrapping'' a
set of points in R^3 is described.
| [
{
"version": "v1",
"created": "Fri, 7 May 2004 19:22:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0405035 | Rajgopal Kannan | Rajgopal Kannan, Lydia Ray, Arjan Durresi, S. Iyengar | Security-Performance Tradeoffs of Inheritance based Key Predistribution
for Wireless Sensor Networks | 18 pages, ESAS'04 1st Euro Wkshp on Security in Ad-Hoc and Sensor
Networks | null | null | null | cs.NI cs.CR | null | Key predistribution is a well-known technique for ensuring secure
communication via encryption among sensors deployed in an ad-hoc manner to form
a sensor network. In this paper, we propose a novel 2-Phase technique for key
predistribution based on a combination of inherited and random key assignments
from the given key pool to individual sensor nodes. We also develop an
analytical framework for measuring security-performance tradeoffs of different
key distribution schemes by providing metrics for measuring sensornet
connectivity and resiliency to enemy attacks. In particular, we show
analytically that the 2-Phase scheme provides better average connectivity and
superior $q$-composite connectivity than the random scheme. We then prove that
the invulnerability of a communication link under arbitrary number of node
captures by an adversary is higher under the 2-Phase scheme. The probability of
a communicating node pair having an exclusive key also scales better with
network size under the 2-Phase scheme. We also show analytically that the
vulnerability of an arbitrary communication link in the sensornet to single
node capture is lower under 2-Phase assuming both network-wide as well as
localized capture. Simulation results also show that the number of exclusive
keys shared between any two nodes is higher while the number of $q$-composite
links compromised when a given number of nodes are captured by the enemy is
smaller under the 2-Phase scheme as compared to the random one.
| [
{
"version": "v1",
"created": "Mon, 10 May 2004 18:56:02 GMT"
},
{
"version": "v2",
"created": "Fri, 14 May 2004 17:56:46 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Jun 2004 21:57:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kannan",
"Rajgopal",
""
],
[
"Ray",
"Lydia",
""
],
[
"Durresi",
"Arjan",
""
],
[
"Iyengar",
"S.",
""
]
] |
cs/0405036 | David Eppstein | M. Gopi and David Eppstein | Single-Strip Triangulation of Manifolds with Arbitrary Topology | 12 pages, 10 figures. To appear at Eurographics 2004 | null | null | null | cs.CG cs.GR | null | Triangle strips have been widely used for efficient rendering. It is
NP-complete to test whether a given triangulated model can be represented as a
single triangle strip, so many heuristics have been proposed to partition
models into few long strips. In this paper, we present a new algorithm for
creating a single triangle loop or strip from a triangulated model. Our method
applies a dual graph matching algorithm to partition the mesh into cycles, and
then merges pairs of cycles by splitting adjacent triangles when necessary. New
vertices are introduced at midpoints of edges and the new triangles thus formed
are coplanar with their parent triangles, hence the visual fidelity of the
geometry is not changed. We prove that the increase in the number of triangles
due to this splitting is 50% in the worst case, however for all models we
tested the increase was less than 2%. We also prove tight bounds on the number
of triangles needed for a single-strip representation of a model with holes on
its boundary. Our strips can be used not only for efficient rendering, but also
for other applications including the generation of space filling curves on a
manifold of any arbitrary topology.
| [
{
"version": "v1",
"created": "Mon, 10 May 2004 14:31:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gopi",
"M.",
""
],
[
"Eppstein",
"David",
""
]
] |
cs/0405037 | Konstantin Petrov | G.E. Miram and V.K. Petrov | A Probabilistic Model of Machine Translation | null | null | null | null | cs.CL | null | A probabilistic model for computer-based generation of a machine translation
system on the basis of English-Russian parallel text corpora is suggested. The
model is trained using parallel text corpora with pre-aligned source and target
sentences. The training of the model results in a bilingual dictionary of words
and "word blocks" with relevant translation probability.
| [
{
"version": "v1",
"created": "Mon, 10 May 2004 16:05:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Miram",
"G. E.",
""
],
[
"Petrov",
"V. K.",
""
]
] |
cs/0405038 | Riccardo Pucella | Riccardo Pucella | Deductive Algorithmic Knowledge | 28 pages. A preliminary version of this paper appeared in the
Proceedings of the 8th International Symposium on Artificial Intelligence and
Mathematics, AI&M 22-2004, 2004 | Journal of Logic and Computation 16 (2), pp. 287-309, 2006 | null | null | cs.AI cs.LO | null | The framework of algorithmic knowledge assumes that agents use algorithms to
compute the facts they explicitly know. In many cases of interest, a deductive
system, rather than a particular algorithm, captures the formal reasoning used
by the agents to compute what they explicitly know. We introduce a logic for
reasoning about both implicit and explicit knowledge with the latter defined
with respect to a deductive system formalizing a logical theory for agents. The
highly structured nature of deductive systems leads to very natural
axiomatizations of the resulting logic when interpreted over any fixed
deductive system. The decision problem for the logic, in the presence of a
single agent, is NP-complete in general, no harder than propositional logic. It
remains NP-complete when we fix a deductive system that is decidable in
nondeterministic polynomial time. These results extend in a straightforward way
to multiple agents.
| [
{
"version": "v1",
"created": "Tue, 11 May 2004 18:01:39 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Jun 2005 02:43:07 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Jan 2006 19:08:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
] |
cs/0405039 | Lillian Lee | Regina Barzilay and Lillian Lee | Catching the Drift: Probabilistic Content Models, with Applications to
Generation and Summarization | Best paper award | HLT-NAACL 2004: Proceedings of the Main Conference, pp. 113--120 | null | null | cs.CL | null | We consider the problem of modeling the content structure of texts within a
specific domain, in terms of the topics the texts address and the order in
which these topics appear. We first present an effective knowledge-lean method
for learning content models from un-annotated documents, utilizing a novel
adaptation of algorithms for Hidden Markov Models. We then apply our method to
two complementary tasks: information ordering and extractive summarization. Our
experiments show that incorporating content models in these applications yields
substantial improvement over previously-proposed methods.
| [
{
"version": "v1",
"created": "Wed, 12 May 2004 14:14:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barzilay",
"Regina",
""
],
[
"Lee",
"Lillian",
""
]
] |
cs/0405040 | Yongzhi Cao | Yongzhi Cao and Mingsheng Ying | Supervisory Control of Fuzzy Discrete Event Systems | 12 pages, 2 figures | A short version has been published in the IEEE Transactions on
Systems, Man, and Cybernetics--Part B: Cybernetics, 35(2), pp. 366-371, April
2005. | null | null | cs.DM cs.DC | null | In order to cope with situations in which a plant's dynamics are not
precisely known, we consider the problem of supervisory control for a class of
discrete event systems modelled by fuzzy automata. The behavior of such
discrete event systems is described by fuzzy languages; the supervisors are
event feedback and can disable only controllable events with any degree. The
concept of discrete event system controllability is thus extended by
incorporating fuzziness. In this new sense, we present a necessary and
sufficient condition for a fuzzy language to be controllable. We also study the
supremal controllable fuzzy sublanguage and the infimal controllable fuzzy
superlanguage when a given pre-specified desired fuzzy language is
uncontrollable. Our framework generalizes that of Ramadge-Wonham and reduces to
Ramadge-Wonham framework when membership grades in all fuzzy languages must be
either 0 or 1. The theoretical development is accompanied by illustrative
numerical examples.
| [
{
"version": "v1",
"created": "Wed, 12 May 2004 03:35:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cao",
"Yongzhi",
""
],
[
"Ying",
"Mingsheng",
""
]
] |
cs/0405041 | Vladimir Migunov | Vladimir V. Migunov | The modulus in the CAD system drawings as a base of developing of the
problem-oriented extensions | 2 pages, no figures, in Russian | null | null | null | cs.CE cs.DS | null | The concept of the "modulus" in the CAD system drawings is characterized,
being a base of developing of the problem-oriented extensions. The modulus
consists of visible geometric elements of the drawing and invisible parametric
representation of the modelling object. The technological advantages of
moduluss in a complex CAD system developing are described.
| [
{
"version": "v1",
"created": "Wed, 12 May 2004 07:55:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] |
cs/0405042 | Ted Herman | T. Herman, S. Tixeuil | A Distributed TDMA Slot Assignment Algorithm for Wireless Sensor
Networks | null | null | null | TR04-02 University of Iowa Department of Computer Science | cs.DC cs.NI | null | Wireless sensor networks benefit from communication protocols that reduce
power requirements by avoiding frame collision. Time Division Media Access
methods schedule transmission in slots to avoid collision, however these
methods often lack scalability when implemented in \emph{ad hoc} networks
subject to node failures and dynamic topology. This paper reports a distributed
algorithm for TDMA slot assignment that is self-stabilizing to transient faults
and dynamic topology change. The expected local convergence time is O(1) for
any size network satisfying a constant bound on the size of a node
neighborhood.
| [
{
"version": "v1",
"created": "Wed, 12 May 2004 14:53:29 GMT"
},
{
"version": "v2",
"created": "Wed, 19 May 2004 16:59:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Herman",
"T.",
""
],
[
"Tixeuil",
"S.",
""
]
] |
cs/0405043 | Marcus Hutter | Marcus Hutter and Jan Poland | Prediction with Expert Advice by Following the Perturbed Leader for
General Weights | 16 LaTeX pages | Proc. 15th International Conf. on Algorithmic Learning Theory
(ALT-2004), pages 279-293 | null | IDSIA-08-04 | cs.LG cs.AI | null | When applying aggregating strategies to Prediction with Expert Advice, the
learning rate must be adaptively tuned. The natural choice of
sqrt(complexity/current loss) renders the analysis of Weighted Majority
derivatives quite complicated. In particular, for arbitrary weights there have
been no results proven so far. The analysis of the alternative "Follow the
Perturbed Leader" (FPL) algorithm from Kalai (2003} (based on Hannan's
algorithm) is easier. We derive loss bounds for adaptive learning rate and both
finite expert classes with uniform weights and countable expert classes with
arbitrary weights. For the former setup, our loss bounds match the best known
results so far, while for the latter our results are (to our knowledge) new.
| [
{
"version": "v1",
"created": "Wed, 12 May 2004 16:41:01 GMT"
},
{
"version": "v2",
"created": "Wed, 12 May 2004 20:37:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
],
[
"Poland",
"Jan",
""
]
] |
cs/0405044 | Lillian Lee | Oren Kurland and Lillian Lee | Corpus structure, language models, and ad hoc information retrieval | To appear, SIGIR 2004 | null | null | null | cs.IR cs.CL | null | Most previous work on the recently developed language-modeling approach to
information retrieval focuses on document-specific characteristics, and
therefore does not take into account the structure of the surrounding corpus.
We propose a novel algorithmic framework in which information provided by
document-based language models is enhanced by the incorporation of information
drawn from clusters of similar documents. Using this framework, we develop a
suite of new algorithms. Even the simplest typically outperforms the standard
language-modeling approach in precision and recall, and our new interpolation
algorithm posts statistically significant improvements for both metrics over
all three corpora tested.
| [
{
"version": "v1",
"created": "Wed, 12 May 2004 20:18:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kurland",
"Oren",
""
],
[
"Lee",
"Lillian",
""
]
] |
cs/0405045 | Manuel A. P\'erez-Qui\~nones | Ravikiran Vatrapu, Manuel A. Perez-Quinones | Culture and International Usability Testing: The Effects of Culture in
Structured Interviews | 8 pages | null | null | null | cs.HC cs.SE | null | The global audience for software products includes members of different
countries, religions, and cultures: people who speak different languages, have
different life styles, and have different perceptions and expectations of any
given product. A major impediment in interface development is that there is
inadequate empirical evidence for the effects of culture in the usability
engineering methods used for developing user interfaces. This paper presents a
controlled study investigating the effects of culture on the effectiveness of
structured interviews in usability testing. The experiment consisted of
usability testing of a website with two independent groups of Indian
participants by two interviewers; one belonging to the Indian culture and the
other to the Anglo-American culture. Participants found more usability problems
and made more suggestions to an interviewer who was a member of the same
(Indian) culture than to the foreign (Anglo-American) interviewer. The results
of the study empirically establish that culture significantly affects the
efficacy of structured interviews during international user testing. The
implications of this work for usability engineering are discussed.
| [
{
"version": "v1",
"created": "Thu, 13 May 2004 18:46:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vatrapu",
"Ravikiran",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
]
] |
cs/0405046 | Ajith Abraham | Ajith Abraham and Ravi Jain | Soft Computing Models for Network Intrusion Detection Systems | null | Soft Computing in Knowledge Discovery: Methods and Applications,
Saman Halgamuge and Lipo Wang (Eds.), Studies in Fuzziness and Soft
Computing, Springer Verlag Germany, Chapter 16, 20 pages, 2004 | null | null | cs.CR | null | Security of computers and the networks that connect them is increasingly
becoming of great significance. Computer security is defined as the protection
of computing systems against threats to confidentiality, integrity, and
availability. There are two types of intruders: external intruders, who are
unauthorized users of the machines they attack, and internal intruders, who
have permission to access the system with some restrictions. This chapter
presents a soft computing approach to detect intrusions in a network. Among the
several soft computing paradigms, we investigated fuzzy rule-based classifiers,
decision trees, support vector machines, linear genetic programming and an
ensemble method to model fast and efficient intrusion detection systems.
Empirical results clearly show that soft computing approach could play a major
role for intrusion detection.
| [
{
"version": "v1",
"created": "Thu, 13 May 2004 23:27:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abraham",
"Ajith",
""
],
[
"Jain",
"Ravi",
""
]
] |
cs/0405047 | Vladimir Migunov | Vladimir V. Migunov | Modular technology of developing of the problem-oriented extensions of a
CAD system of reconstruction of the plant | 8 pages, no figures, in Russian | null | null | null | cs.CE cs.DS | null | The modular technology of creation of the problem-oriented extensions of a
CAD system is described, which was realised in a system TechnoCAD GlassX for
designing of reconstruction of the plants. The modularity of the technology is
expressed in storage of all parameters of the design in one element of the
drawing - modulus, with automatic generation of a geometrical part of the
modulus from these parameters. The common principles of the system organization
of extensions developing are described: separation of the part of the design to
automize in this extension, architecture of parameters in the form of the lists
of objects with their properties and links to another objects, separation of
common and special operations, stages of the developing, boundaries of
applicability of technology.
| [
{
"version": "v1",
"created": "Fri, 14 May 2004 17:43:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] |
cs/0405048 | Stanimire Tomov | Stanimire Tomov and Michael McGuigan | Interactive visualization of higher dimensional data in a multiview
environment | 6 pages, 3 figures | null | null | null | cs.GR | null | We develop multiple view visualization of higher dimensional data. Our work
was chiefly motivated by the need to extract insight from four dimensional
Quantum Chromodynamic (QCD) data. We develop visualization where multiple
views, generally views of 3D projections or slices of a higher dimensional
data, are tightly coupled not only by their specific order but also by a view
synchronizing interaction style, and an internally defined interaction
language. The tight coupling of the different views allows a fast and
well-coordinated exploration of the data. In particular, the visualization
allowed us to easily make consistency checks of the 4D QCD data and to infer
the correctness of particle properties calculations. The software developed was
also successfully applied in material studies, in particular studies of
meteorite properties. Our implementation uses the VTK API. To handle a large
number of views (slices/projections) and to still maintain good resolution, we
use IBM T221 display (3840 X 2400 pixels).
| [
{
"version": "v1",
"created": "Fri, 14 May 2004 18:18:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tomov",
"Stanimire",
""
],
[
"McGuigan",
"Michael",
""
]
] |
cs/0405049 | Ajith Abraham | Ron Edwards, Ajith Abraham and Sonja Petrovic-Lazarevic | Export Behaviour Modeling Using EvoNF Approach | null | The International Conference on Computational Science 2003 (ICCS
2003), Springer Verlag, Lecture Notes in Computer Science Volume 2660, Sloot
P.M.A. et al (Eds.), pp. 169-178, 2003 | null | null | cs.AI | null | The academic literature suggests that the extent of exporting by
multinational corporation subsidiaries (MCS) depends on their product
manufactured, resources, tax protection, customers and markets, involvement
strategy, financial independence and suppliers' relationship with a
multinational corporation (MNC). The aim of this paper is to model the complex
export pattern behaviour using a Takagi-Sugeno fuzzy inference system in order
to determine the actual volume of MCS export output (sales exported). The
proposed fuzzy inference system is optimised by using neural network learning
and evolutionary computation. Empirical results clearly show that the proposed
approach could model the export behaviour reasonable well compared to a direct
neural network approach.
| [
{
"version": "v1",
"created": "Sun, 16 May 2004 03:24:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Edwards",
"Ron",
""
],
[
"Abraham",
"Ajith",
""
],
[
"Petrovic-Lazarevic",
"Sonja",
""
]
] |
cs/0405050 | Ajith Abraham | Miao M. Chong, Ajith Abraham, Marcin Paprzycki | Traffic Accident Analysis Using Decision Trees and Neural Networks | null | IADIS International Conference on Applied Computing, Portugal,
IADIS Press, Pedro Isaias et al. (Eds.), ISBN: 9729894736, Volume 2, pp.
39-42, 2004 | null | null | cs.AI | null | The costs of fatalities and injuries due to traffic accident have a great
impact on society. This paper presents our research to model the severity of
injury resulting from traffic accidents using artificial neural networks and
decision trees. We have applied them to an actual data set obtained from the
National Automotive Sampling System (NASS) General Estimates System (GES).
Experiment results reveal that in all the cases the decision tree outperforms
the neural network. Our research analysis also shows that the three most
important factors in fatal injury are: driver's seat belt usage, light
condition of the roadway, and driver's alcohol usage.
| [
{
"version": "v1",
"created": "Sun, 16 May 2004 03:33:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chong",
"Miao M.",
""
],
[
"Abraham",
"Ajith",
""
],
[
"Paprzycki",
"Marcin",
""
]
] |
cs/0405051 | Ajith Abraham | Muhammad Riaz Khan and Ajith Abraham | Short Term Load Forecasting Models in Czech Republic Using Soft
Computing Paradigms | null | International Journal of Knowledge-Based Intelligent Engineering
Systems, IOS Press Netherlands, Volume 7, Number 4, pp. 172-179, 2003 | null | null | cs.AI | null | This paper presents a comparative study of six soft computing models namely
multilayer perceptron networks, Elman recurrent neural network, radial basis
function network, Hopfield model, fuzzy inference system and hybrid fuzzy
neural network for the hourly electricity demand forecast of Czech Republic.
The soft computing models were trained and tested using the actual hourly load
data for seven years. A comparison of the proposed techniques is presented for
predicting 2 day ahead demands for electricity. Simulation results indicate
that hybrid fuzzy neural network and radial basis function networks are the
best candidates for the analysis and forecasting of electricity demand.
| [
{
"version": "v1",
"created": "Sun, 16 May 2004 03:44:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Khan",
"Muhammad Riaz",
""
],
[
"Abraham",
"Ajith",
""
]
] |
cs/0405052 | Ajith Abraham | Cong Tran, Ajith Abraham and Lakhmi Jain | Decision Support Systems Using Intelligent Paradigms | null | International Journal of American Romanian Academy of Arts and
Sciences, 2004 (forth coming) | null | null | cs.AI | null | Decision-making is a process of choosing among alternative courses of action
for solving complicated problems where multi-criteria objectives are involved.
The past few years have witnessed a growing recognition of Soft Computing (SC)
technologies that underlie the conception, design and utilization of
intelligent systems. In this paper, we present different SC paradigms involving
an artificial neural network trained using the scaled conjugate gradient
algorithm, two different fuzzy inference methods optimised using neural network
learning/evolutionary algorithms and regression trees for developing
intelligent decision support systems. We demonstrate the efficiency of the
different algorithms by developing a decision support system for a Tactical Air
Combat Environment (TACE). Some empirical comparisons between the different
algorithms are also provided.
| [
{
"version": "v1",
"created": "Sun, 16 May 2004 03:50:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tran",
"Cong",
""
],
[
"Abraham",
"Ajith",
""
],
[
"Jain",
"Lakhmi",
""
]
] |
cs/0405053 | Boris D. Lubachevsky | Boris Lubachevsky and Alan Weiss | Synchronous Relaxation for Parallel Ising Spin Simulations | Extended abstract. Conference version. The full paper in preparation | 15th Workshop on Parallel and Distributed Simulation, Lake
Arrowhead, California, May 2001, pp.185-192 | null | null | cs.DC cond-mat.mtrl-sci cs.DS physics.comp-ph | null | A new parallel algorithm for simulating Ising spin systems is presented. The
sequential prototype is the n-fold way algorithm cite{BKL75}, which is
efficient but is hard to parallelize using conservative methods. Our parallel
algorithm is optimistic. Unlike other optimistic algorithms, e.g., Time Warp,
our algorithm is synchronous. It also belongs to the class of simulations known
as ``relaxation'' cite{CS8 hence it is named ``synchronous relaxation.'' We
derive performance guarantees for this algorithm. If N is the number of PEs,
then under weak assumptions we show that the number of correct events processed
per unit of time is, on average, at least of order N/log(N). All communication
delays, processing time, and busy waits are taken into account.
| [
{
"version": "v1",
"created": "Mon, 17 May 2004 01:32:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lubachevsky",
"Boris",
""
],
[
"Weiss",
"Alan",
""
]
] |
cs/0405054 | Vladimir Migunov | Vladimir V. Migunov | The model of the tables in design documentation for operating with the
electronic catalogs and for specifications making in a CAD system | 5 pages, 4 figures, in Russian | null | null | null | cs.CE cs.DS | null | The hierarchic block model of the tables in design documentation as a part of
a CAD system is described, intended for automatic specifications making of
elements of the drawings, with usage of the electronic catalogs. The model is
created for needs of a CAD system of reconstruction of the industrial plants,
where the result of designing are the drawings, which include the
specifications of different types. The adequate simulation of the specification
tables is ensured with technology of storing in the drawing of the visible
geometric elements and invisible parametric representation, sufficient for
generation of this elements.
| [
{
"version": "v1",
"created": "Mon, 17 May 2004 09:39:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] |
cs/0405055 | Vladimir Migunov | Vladimir V. Migunov, Rustem R. Kafiatullov, Ilsur T. Safin | Modular technology of developing of the extensions of a CAD system.
Axonometric piping diagrams. Parametric representation | 8 pages, 1 figure, in Russian | null | null | null | cs.CE cs.DS | null | Applying the modular technology of developing of the problem-oriented
extensions of a CAD system to a problem of automation of creating of the
axonometric piping diagrams on an example of the program system TechnoCAD
GlassX is described. The proximity of composition of the schemas is detected
for special technological pipe lines, systems of a water line and water drain,
heating, heat supply, ventilating, air conditioning. The structured parametric
representation of the schemas, including properties of objects, their link,
common settings, settings by default and the special links of compatibility is
reviewed.
| [
{
"version": "v1",
"created": "Mon, 17 May 2004 09:46:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
],
[
"Kafiatullov",
"Rustem R.",
""
],
[
"Safin",
"Ilsur T.",
""
]
] |
cs/0405056 | Vladimir Migunov | Ilsur T. Safin, Vladimir V. Migunov, Rustem R. Kafiatullov | Modular technology of developing of the extensions of a CAD system. The
axonometric piping diagrams. Common and special operations | 8 pages, 7 figures, in Russian | null | null | null | cs.CE cs.DS | null | Applying the modular technology of developing of the problem-oriented
extensions of a CAD system to a problem of automation of creating of the
axonometric piping diagrams on an example of the program system TechnoCAD
GlassX is described. The features of realization of common operations,
composition and realization of special operations of a designing of the schemas
of the special technological pipe lines, systems of a water line and water
drain, heating, heat supply, ventilating, air conditioning are reviewed.
| [
{
"version": "v1",
"created": "Mon, 17 May 2004 10:14:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Safin",
"Ilsur T.",
""
],
[
"Migunov",
"Vladimir V.",
""
],
[
"Kafiatullov",
"Rustem R.",
""
]
] |
cs/0405057 | Vladimir Migunov | Vladimir V. Migunov | Mathematical and programming toolkit of the computer aided design of the
axonometric piping diagrams | 3 pages, no figures, in Russian | null | null | null | cs.CE cs.DS | null | The problem of the automation of the designing of the axonometric piping
diagrams include, as the minimum, manipulations with the flat schemas of
three-dimensional wireframe objects (with dimension of 2,5). The specialized
model, methodical and mathematical approaches are required because of large
bulk of calculuss. Coordinate systems, data types, common principles of
realization of operation with data and composition of the basic operations are
described which are realised in the complex CAD system of the reconstruction of
the plants TechnoCAD GlassX.
| [
{
"version": "v1",
"created": "Mon, 17 May 2004 10:34:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] |
cs/0405058 | Sandor P. Fekete | Sandor P. Fekete, Alexander Kroeller, Dennis Pfisterer, Stefan
Fischer, and Carsten Buschmann | Neighborhood-Based Topology Recognition in Sensor Networks | 14 pages, 6 figures, Latex, to appear in Workshop on Algorithms
Aspects of Sensor Networks (ALGOSENSORS 2004) | null | null | null | cs.DS cs.DC | null | We consider a crucial aspect of self-organization of a sensor network
consisting of a large set of simple sensor nodes with no location hardware and
only very limited communication range. After having been distributed randomly
in a given two-dimensional region, the nodes are required to develop a sense
for the environment, based on a limited amount of local communication. We
describe algorithmic approaches for determining the structure of boundary nodes
of the region, and the topology of the region. We also develop methods for
determining the outside boundary, the distance to the closest boundary for each
point, the Voronoi diagram of the different boundaries, and the geometric
thickness of the network. Our methods rely on a number of natural assumptions
that are present in densely distributed sets of nodes, and make use of a
combination of stochastics, topology, and geometry. Evaluation requires only a
limited number of simple local computations.
| [
{
"version": "v1",
"created": "Mon, 17 May 2004 12:16:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Kroeller",
"Alexander",
""
],
[
"Pfisterer",
"Dennis",
""
],
[
"Fischer",
"Stefan",
""
],
[
"Buschmann",
"Carsten",
""
]
] |
cs/0405061 | Ajith Abraham | Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal and Dharma P.
Agrawal | Jigsaw-based Security in Data Transfer in Computer Networks | null | IEEE International Conference on Information Technology: Coding
and Computing (ITCC'04), USA, IEEE Computer Society, Volume 1, pp. 2-6, 2004 | null | null | cs.CR | null | In this paper, we present a novel encryption-less algorithm to enhance
security in transmission of data in networks. The algorithm uses an intuitively
simple idea of a 'jigsaw puzzle' to break the transformed data into multiple
parts where these parts form the pieces of the puzzle. Then these parts are
packaged into packets and sent to the receiver. A secure and efficient
mechanism is provided to convey the information that is necessary for obtaining
the original data at the receiver-end from its parts in the packets, that is,
for solving the 'jigsaw puzzle'. The algorithm is designed to provide
information-theoretic (that is, unconditional) security by the use of a
one-time pad like scheme so that no intermediate or unintended node can obtain
the entire data. An authentication code is also used to ensure authenticity of
every packet.
| [
{
"version": "v1",
"created": "Mon, 17 May 2004 21:40:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vasudevan",
"Rangarajan",
""
],
[
"Abraham",
"Ajith",
""
],
[
"Sanyal",
"Sugata",
""
],
[
"Agrawal",
"Dharma P.",
""
]
] |
cs/0405062 | Kumara Sastry | Kumara Sastry, David E. Goldberg, Martin Pelikan | Efficiency Enhancement of Probabilistic Model Building Genetic
Algorithms | Optimization by Building and Using Probabilistic Models. Workshop at
the 2004 Genetic and Evolutionary Computation Conference | null | null | IlliGAL Report No. 2004020 | cs.NE | null | This paper presents two different efficiency-enhancement techniques for
probabilistic model building genetic algorithms. The first technique proposes
the use of a mutation operator which performs local search in the sub-solution
neighborhood identified through the probabilistic model. The second technique
proposes building and using an internal probabilistic model of the fitness
along with the probabilistic model of variable interactions. The fitness values
of some offspring are estimated using the probabilistic model, thereby avoiding
computationally expensive function evaluations. The scalability of the
aforementioned techniques are analyzed using facetwise models for convergence
time and population sizing. The speed-up obtained by each of the methods is
predicted and verified with empirical results. The results show that for
additively separable problems the competent mutation operator requires O(k 0.5
logm)--where k is the building-block size, and m is the number of building
blocks--less function evaluations than its selectorecombinative counterpart.
The results also show that the use of an internal probabilistic fitness model
reduces the required number of function evaluations to as low as 1-10% and
yields a speed-up of 2--50.
| [
{
"version": "v1",
"created": "Tue, 18 May 2004 16:19:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sastry",
"Kumara",
""
],
[
"Goldberg",
"David E.",
""
],
[
"Pelikan",
"Martin",
""
]
] |
cs/0405064 | Kumara Sastry | Kumara Sastry, David E. Goldberg | Designing Competent Mutation Operators via Probabilistic Model Building
of Neighborhoods | Genetic and Evolutionary Computation Conference (GECCO-2004) | null | null | IlliGAL Report No. 2004006 | cs.NE | null | This paper presents a competent selectomutative genetic algorithm (GA), that
adapts linkage and solves hard problems quickly, reliably, and accurately. A
probabilistic model building process is used to automatically identify key
building blocks (BBs) of the search problem. The mutation operator uses the
probabilistic model of linkage groups to find the best among competing building
blocks. The competent selectomutative GA successfully solves additively
separable problems of bounded difficulty, requiring only subquadratic number of
function evaluations. The results show that for additively separable problems
the probabilistic model building BB-wise mutation scales as O(2^km^{1.5}), and
requires O(k^{0.5}logm) less function evaluations than its selectorecombinative
counterpart, confirming theoretical results reported elsewhere (Sastry &
Goldberg, 2004).
| [
{
"version": "v1",
"created": "Tue, 18 May 2004 16:41:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sastry",
"Kumara",
""
],
[
"Goldberg",
"David E.",
""
]
] |
cs/0405066 | Riccardo Pucella | Riccardo Pucella and Vicky Weissman | A Logic for Reasoning about Digital Rights | 21 pages. Appeared in the Proceedings of the 15th IEEE Computer
Security Foundations Workshop, pp. 282-294, 2002 | null | null | null | cs.CR cs.LO | null | We present a logic for reasoning about licenses, which are ``terms of use''
for digital resources. The logic provides a language for writing both
properties of licenses and specifications that govern a client's actions. We
discuss the complexity of checking properties and specifications written in our
logic and propose a technique for verification. A key feature of our approach
is that it is essentially parameterized by the language in which the licenses
are written, provided that this language can be given a trace-based semantics.
We consider two license languages to illustrate this flexibility.
| [
{
"version": "v1",
"created": "Tue, 18 May 2004 18:22:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
],
[
"Weissman",
"Vicky",
""
]
] |
cs/0405067 | Peter Winkler | Graham R. Brightwell and Peter Winkler | Note on Counting Eulerian Circuits | 2 figures | null | null | null | cs.CC cs.DM | null | We show that the problem of counting the number of Eulerian circuits in an
undirected graph is complete for the class #P.
| [
{
"version": "v1",
"created": "Tue, 18 May 2004 19:47:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brightwell",
"Graham R.",
""
],
[
"Winkler",
"Peter",
""
]
] |
cs/0405068 | Yongzhi Cao | Yongzhi Cao and Mingsheng Ying | Observability and Decentralized Control of Fuzzy Discrete Event Systems | 14 pages, 1 figure. to be published in the IEEE Transactions on Fuzzy
Systems | IEEE Transactions on Fuzzy Systems, 14(2), pp. 202-216, April 2006 | null | null | cs.DM cs.DC | null | Fuzzy discrete event systems as a generalization of (crisp) discrete event
systems have been introduced in order that it is possible to effectively
represent uncertainty, imprecision, and vagueness arising from the dynamic of
systems. A fuzzy discrete event system has been modelled by a fuzzy automaton;
its behavior is described in terms of the fuzzy language generated by the
automaton. In this paper, we are concerned with the supervisory control problem
for fuzzy discrete event systems with partial observation. Observability,
normality, and co-observability of crisp languages are extended to fuzzy
languages. It is shown that the observability, together with controllability,
of the desired fuzzy language is a necessary and sufficient condition for the
existence of a partially observable fuzzy supervisor. When a decentralized
solution is desired, it is proved that there exist local fuzzy supervisors if
and only if the fuzzy language to be synthesized is controllable and
co-observable. Moreover, the infimal controllable and observable fuzzy
superlanguage, and the supremal controllable and normal fuzzy sublanguage are
also discussed. Simple examples are provided to illustrate the theoretical
development.
| [
{
"version": "v1",
"created": "Thu, 20 May 2004 08:19:26 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Oct 2005 00:06:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cao",
"Yongzhi",
""
],
[
"Ying",
"Mingsheng",
""
]
] |
cs/0405070 | Alain Barrat | Alain Barrat, Marc Barthelemy, Alessandro Vespignani | Traffic-driven model of the World Wide Web graph | null | LNCS 3243, 56 (2004) | null | null | cs.NI cond-mat.stat-mech | null | We propose a model for the World Wide Web graph that couples the topological
growth with the traffic's dynamical evolution. The model is based on a simple
traffic-driven dynamics and generates weighted directed graphs exhibiting the
statistical properties observed in the Web. In particular, the model yields a
non-trivial time evolution of vertices and heavy-tail distributions for the
topological and traffic properties. The generated graphs exhibit a complex
architecture with a hierarchy of cohesiveness levels similar to those observed
in the analysis of real data.
| [
{
"version": "v1",
"created": "Thu, 20 May 2004 14:45:57 GMT"
},
{
"version": "v2",
"created": "Mon, 24 May 2004 15:06:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barrat",
"Alain",
""
],
[
"Barthelemy",
"Marc",
""
],
[
"Vespignani",
"Alessandro",
""
]
] |
cs/0405071 | Tuan Le Mr. | Le-Chi Tuan, Chitta Baral, and Tran Cao Son | Regression with respect to sensing actions and partial states | 38 pages | null | null | null | cs.AI | null | In this paper, we present a state-based regression function for planning
domains where an agent does not have complete information and may have sensing
actions. We consider binary domains and employ the 0-approximation [Son & Baral
2001] to define the regression function. In binary domains, the use of
0-approximation means using 3-valued states. Although planning using this
approach is incomplete with respect to the full semantics, we adopt it to have
a lower complexity. We prove the soundness and completeness of our regression
formulation with respect to the definition of progression. More specifically,
we show that (i) a plan obtained through regression for a planning problem is
indeed a progression solution of that planning problem, and that (ii) for each
plan found through progression, using regression one obtains that plan or an
equivalent one. We then develop a conditional planner that utilizes our
regression function. We prove the soundness and completeness of our planning
algorithm and present experimental results with respect to several well known
planning problems in the literature.
| [
{
"version": "v1",
"created": "Fri, 21 May 2004 12:43:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tuan",
"Le-Chi",
""
],
[
"Baral",
"Chitta",
""
],
[
"Son",
"Tran Cao",
""
]
] |
cs/0405073 | Olivier Gay | Olivier Gay | Advanced exploitation of buffer overflow | 92 pages, in french | null | null | null | cs.CR | null | This article describes in depth several ways of exploiting buffer overflows
in the UNIX operating systems.
| [
{
"version": "v1",
"created": "Fri, 21 May 2004 13:33:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gay",
"Olivier",
""
]
] |
cs/0405074 | Richard McClatchey | S R Amendolia, F Estrella, W Hassan, T Hauer, D Manset, R McClatchey,
D Rogulin & T Solomonides | MammoGrid: A Service Oriented Architecture based Medical Grid
Application | 12 pages, 9 figures | Proceedings of the 3rd International Conference on Grid and
Cooperative Computing. Wuhan. China 2004 | null | null | cs.DC cs.DB | null | The MammoGrid project has recently delivered its first proof-of-concept
prototype using a Service-Oriented Architecture (SOA)-based Grid application to
enable distributed computing spanning national borders. The underlying AliEn
Grid infrastructure has been selected because of its practicality and because
of its emergence as a potential open source standards-based solution for
managing and coordinating distributed resources. The resultant prototype is
expected to harness the use of huge amounts of medical image data to perform
epidemiological studies, advanced image processing, radiographic education and
ultimately, tele-diagnosis over communities of medical virtual organisations.
The MammoGrid prototype comprises a high-quality clinician visualization
workstation used for data acquisition and inspection, a DICOM-compliant
interface to a set of medical services (annotation, security, image analysis,
data storage and querying services) residing on a so-called Grid-box and secure
access to a network of other Grid-boxes connected through Grid middleware. This
paper outlines the MammoGrid approach in managing a federation of
Grid-connected mammography databases in the context of the recently delivered
prototype and will also describe the next phase of prototyping.
| [
{
"version": "v1",
"created": "Fri, 21 May 2004 13:41:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amendolia",
"S R",
""
],
[
"Estrella",
"F",
""
],
[
"Hassan",
"W",
""
],
[
"Hauer",
"T",
""
],
[
"Manset",
"D",
""
],
[
"McClatchey",
"R",
""
],
[
"Rogulin",
"D",
""
],
[
"Solomonides",
"T",
""
]
] |
cs/0405075 | Xiaochu Qi | Xiaochu Qi | Reduction Strategies in Lambda Term Normalization and their Effects on
Heap Usage | This is a modified version of the master's thesis of Xiaochu Qi | null | null | null | cs.PL | null | Higher-order representations of objects such as programs, proofs, formulas
and types have become important to many symbolic computation tasks. Systems
that support such representations usually depend on the implementation of an
intensional view of the terms of some variant of the typed lambda-calculus.
Various notations have been proposed for lambda-terms to explicitly treat
substitutions as basis for realizing such implementations. There are, however,
several choices in the actual reduction strategies. The most common strategy
utilizes such notations only implicitly via an incremental use of environments.
This approach does not allow the smaller substitution steps to be intermingled
with other operations of interest on lambda-terms. However, a naive strategy
explicitly using such notations can also be costly: each use of the
substitution propagation rules causes the creation of a new structure on the
heap that is often discarded in the immediately following step. There is thus a
tradeoff between these two approaches. This thesis describes the actual
realization of the two approaches, discusses their tradeoffs based on this and,
finally, offers an amalgamated approach that utilizes recursion in rewrite rule
application but also suspends substitution operations where necessary.
| [
{
"version": "v1",
"created": "Sat, 22 May 2004 07:21:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Qi",
"Xiaochu",
""
]
] |
cs/0405076 | Jiang Qiu | Chiaki Sakama, Katsumi Inoue | An Abductive Framework For Computing Knowledge Base Updates | Appeared in Theory and Practice of Logic Programming, vol. 3, no. 6,
2003 | Theory and Practice of Logic Programming, vol. 3, no. 6, 2003 | null | null | cs.DB | null | This paper introduces an abductive framework for updating knowledge bases
represented by extended disjunctive programs. We first provide a simple
transformation from abductive programs to update programs which are logic
programs specifying changes on abductive hypotheses. Then, extended abduction,
which was introduced by the same authors as a generalization of traditional
abduction, is computed by the answer sets of update programs. Next, different
types of updates, view updates and theory updates are characterized by
abductive programs and computed by update programs. The task of consistency
restoration is also realized as special cases of these updates. Each update
problem is comparatively assessed from the computational complexity viewpoint.
The result of this paper provides a uniform framework for different types of
knowledge base updates, and each update is computed using existing procedures
of logic programming.
| [
{
"version": "v1",
"created": "Sat, 22 May 2004 10:30:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sakama",
"Chiaki",
""
],
[
"Inoue",
"Katsumi",
""
]
] |
cs/0405077 | Boris D. Lubachevsky | Boris D. Lubachevsky | Fast Simulation of Multicomponent Dynamic Systems | 38 pages, 9 figures | Bell Labs Technical Journal, Vol.5, No.2, April-June 2000,
pp.134-156 | null | null | cs.DS cond-mat.mtrl-sci cs.DC | null | A computer simulation has to be fast to be helpful, if it is employed to
study the behavior of a multicomponent dynamic system. This paper discusses
modeling concepts and algorithmic techniques useful for creating such fast
simulations. Concrete examples of simulations that range from econometric
modeling to communications to material science are used to illustrate these
techniques and concepts. The algorithmic and modeling methods discussed include
event-driven processing, ``anticipating'' data structures, and ``lazy''
evaluation, Poisson dispenser, parallel processing by cautious advancements and
by synchronous relaxations. The paper gives examples of how these techniques
and models are employed in assessing efficiency of capacity management methods
in wireless and wired networks, in studies of magnetization, crystalline
structure, and sediment formation in material science, in studies of
competition in economics.
| [
{
"version": "v1",
"created": "Sat, 22 May 2004 16:51:48 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 20:52:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lubachevsky",
"Boris D.",
""
]
] |
cs/0405078 | Jean Vanderdonckt | Max Schlee, Jean Vanderdonckt | Generative Programming of Graphical User Interfaces | 4 pages, 12 figures, ACM Conference on Visual Interfaces AVI'2004 | null | null | null | cs.HC | null | Generative Programming (GP) is a computing paradigm allowing automatic
creation of entire software families utilizing the configuration of elementary
and reusable components. GP can be projected on different technologies, e.g.
C++-templates, Java-Beans, Aspect-Oriented Programming (AOP), or Frame
technology. This paper focuses on Frame Technology, which aids the possible
implementation and completion of software components. The purpose of this paper
is to introduce the GP paradigm in the area of GUI application generation. It
demonstrates how automatically customized executable applications with GUI
parts can be generated from an abstract specification.
| [
{
"version": "v1",
"created": "Sun, 23 May 2004 09:53:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schlee",
"Max",
""
],
[
"Vanderdonckt",
"Jean",
""
]
] |
cs/0405079 | Riccardo Pucella | Riccardo Pucella | Higher-Order Concurrent Win32 Programming | 10 pages; appeared in Proceedings of the 3rd Usenix Windows NT
Symposium, Seattle, pp. 113-122, 1999 | null | null | null | cs.PL | null | We present a concurrent framework for Win32 programming based on Concurrent
ML, a concurrent language with higher-order functions, static typing,
lightweight threads and synchronous communication channels. The key points of
the framework are the move from an event loop model to a threaded model for the
processing of window messages, and the decoupling of controls notifications
from the system messages. This last point allows us to derive a general way of
writing controls that leads to easy composition, and can accommodate ActiveX
Controls in a transparent way.
| [
{
"version": "v1",
"created": "Sun, 23 May 2004 18:56:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
] |
cs/0405081 | Riccardo Pucella | Riccardo Pucella | An Analysis of Lambek's Production Machines | 13 pages, 1 figure | RAIRO Informatique Theorique et Applications, 31 (5), pp. 483-497,
1997 | null | null | cs.LO | null | Lambek's production machines may be used to generate and recognize sentences
in a subset of the language described by a production grammar. We determine in
this paper the subset of the language of a grammar generated and recognized by
such machines.
| [
{
"version": "v1",
"created": "Sun, 23 May 2004 19:22:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
] |
cs/0405082 | Riccardo Pucella | Riccardo Pucella, Erik Meijer, Dino Oliva | Aspects de la Programmation d'Applications Win32 avec un Langage
Fonctionnel | In french, 25 pages, 3 figures. Appeared in the Proceedings of the
"Journees Francophones des Langages Applicatifs" (JFLA'99), 1999 | null | null | null | cs.PL | null | A useful programming language needs to support writing programs that take
advantage of services and communication mechanisms supplied by the operating
system. We examine the problem of programming native Win32 applications under
Windows with Standard ML. We introduce an framework based on the IDL interface
language et a minimal foreign-functions interface to explore the Win32 API et
COM in the context of Standard ML.
| [
{
"version": "v1",
"created": "Sun, 23 May 2004 19:35:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
],
[
"Meijer",
"Erik",
""
],
[
"Oliva",
"Dino",
""
]
] |
cs/0405084 | Riccardo Pucella | Kathleen Fisher, Riccardo Pucella, John Reppy | A Framework for Interoperability | 16 pages; 1 figure; appeared in Proceedings of the 1st International
Workshop on Multi-Language Infrastructure and Interoperability (BABEL'01),
ENTCS 59(1), 2001 | null | null | null | cs.PL | null | Practical implementations of high-level languages must provide access to
libraries and system services that have APIs specified in a low-level language
(usually C). An important characteristic of such mechanisms is the
foreign-interface policy that defines how to bridge the semantic gap between
the high-level language and C. For example, IDL-based tools generate code to
marshal data into and out of the high-level representation according to user
annotations. The design space of foreign-interface policies is large and there
are pros and cons to each approach. Rather than commit to a particular policy,
we choose to focus on the problem of supporting a gamut of interoperability
policies. In this paper, we describe a framework for language interoperability
that is expressive enough to support very efficient implementations of a wide
range of different foreign-interface policies. We describe two tools that
implement substantially different policies on top of our framework and present
benchmarks that demonstrate their efficiency.
| [
{
"version": "v1",
"created": "Sun, 23 May 2004 20:28:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fisher",
"Kathleen",
""
],
[
"Pucella",
"Riccardo",
""
],
[
"Reppy",
"John",
""
]
] |
cs/0405085 | Riccardo Pucella | Riccardo Pucella, Prakash Panangaden | On the Expressive Power of First-Order Boolean Functions in PCF | 23 pages | Theoretical Computer Science 266(1-2), pp. 543-567, 2001 | null | null | cs.PL | null | Recent results of Bucciarelli show that the semilattice of degrees of
parallelism of first-order boolean functions in PCF has both infinite chains
and infinite antichains. By considering a simple subclass of Sieber's
sequentiality relations, we identify levels in the semilattice and derive
inexpressibility results concerning functions on different levels. This allows
us to further explore the structure of the semilattice of degrees of
parallelism: we identify semilattices characterized by simple level properties,
and show the existence of new infinite hierarchies which are in a certain sense
natural with respect to the levels.
| [
{
"version": "v1",
"created": "Mon, 24 May 2004 05:16:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
],
[
"Panangaden",
"Prakash",
""
]
] |
cs/0405086 | Vasilii Zhakhovskii | Vasilii Zhakhovskii, Katsunobu Nishihara, Yuko Fukuda, and Shinji
Shimojo | A New Dynamical Domain Decomposition Method for Parallel Molecular
Dynamics Simulation on Grid | null | null | null | Annual Progress Report 2003, Institute of Laser Engineering,Osaka
University (2004) | cs.DC | null | We develop a new Lagrangian material particle -- dynamical domain
decomposition method (MPD^3) for large scale parallel molecular dynamics (MD)
simulation of nonstationary heterogeneous systems on a heterogeneous computing
net. MPD^3 is based on Voronoi decomposition of simulated matter. The map of
Voronoi polygons is known as the Dirichlet tessellation and used for grid
generation in computational fluid dynamics. From the hydrodynamics point of
view the moving Voronoi polygon looks as a material particle (MP). MPs can
exchange particles and information. To balance heterogeneous computing
conditions the MP centers should be dependent on timing data. We propose a
simple and efficient iterative algorithm which based on definition of the
timing-dependent balancing displacement of MP center for next simulation step.
The MPD^3 program was tested in various computing environments and physical
problems. We have demonstrated that MPD^3 is a high-adaptive decomposition
algorithm for MD simulation. It was shown that the well-balanced decomposition
can result from dynamical Voronoi polygon tessellation. One would expect the
similar approach can be successfully applied for other particle methods like
Monte Carlo, particle-in-cell, and smooth-particle-hydrodynamics.
| [
{
"version": "v1",
"created": "Mon, 24 May 2004 07:29:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhakhovskii",
"Vasilii",
""
],
[
"Nishihara",
"Katsunobu",
""
],
[
"Fukuda",
"Yuko",
""
],
[
"Shimojo",
"Shinji",
""
]
] |
cs/0405087 | Richard McClatchey | D Rogulin, F Estrella, T Hauer, R McClatchey & T Solomonides | A Grid Information Infrastructure for Medical Image Analysis | 9 pages, 5 figures | null | null | null | cs.DB cs.DC | null | The storage and manipulation of digital images and the analysis of the
information held in those images are essential requirements for next-generation
medical information systems. The medical community has been exploring
collaborative approaches for managing image data and exchanging knowledge and
Grid technology [1] is a promising approach to enabling distributed analysis
across medical institutions and for developing new collaborative and
cooperative approaches for image analysis without the necessity for clinicians
to co-locate. The EU-funded MammoGrid project [2] is one example of this and it
aims to develop a Europe-wide database of mammograms to support effective
co-working between healthcare professionals across the EU. The MammoGrid
prototype comprises a high-quality clinician visualization workstation (for
data acquisition and inspection), a DICOM-compliant interface to a set of
medical services (annotation, security, image analysis, data storage and
querying services) residing on a so-called Grid-box and secure access to a
network of other Grid-boxes connected through Grid middleware. One of the main
deliverables of the project is a Grid-enabled infrastructure that manages
federated mammogram databases across Europe. This paper outlines the MammoGrid
Information Infrastructure (MII) for meta-data analysis and knowledge discovery
in the medical imaging domain.
| [
{
"version": "v1",
"created": "Mon, 24 May 2004 10:15:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rogulin",
"D",
""
],
[
"Estrella",
"F",
""
],
[
"Hauer",
"T",
""
],
[
"McClatchey",
"R",
""
],
[
"Solomonides",
"T",
""
]
] |
cs/0405088 | Jiang Qiu | Paul Tarau, Veronica Dahl | High-Level Networking With Mobile Code And First Order AND-Continuations | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 3,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 3, 2001 | null | null | cs.PL | null | We describe a scheme for moving living code between a set of distributed
processes coordinated with unification based Linda operations, and its
application to building a comprehensive Logic programming based Internet
programming framework. Mobile threads are implemented by capturing first order
continuations in a compact data structure sent over the network. Code is
fetched lazily from its original base turned into a server as the continuation
executes at the remote site. Our code migration techniques, in combination with
a dynamic recompilation scheme, ensure that heavily used code moves up smoothly
on a speed hierarchy while volatile dynamic code is kept in a quickly updatable
form. Among the examples, we describe how to build programmable client and
server components (Web servers, in particular) and mobile agents.
| [
{
"version": "v1",
"created": "Mon, 24 May 2004 12:41:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tarau",
"Paul",
""
],
[
"Dahl",
"Veronica",
""
]
] |
cs/0405089 | Andy King | Axel Simon and Andy King | Convex Hull of Planar H-Polyhedra | null | International Journal of Computer Mathematics, 81(4):259-271, 2004 | null | null | cs.CG | null | Suppose $<A_i, \vec{c}_i>$ are planar (convex) H-polyhedra, that is, $A_i \in
\mathbb{R}^{n_i \times 2}$ and $\vec{c}_i \in \mathbb{R}^{n_i}$. Let $P_i =
\{\vec{x} \in \mathbb{R}^2 \mid A_i\vec{x} \leq \vec{c}_i \}$ and $n = n_1 +
n_2$. We present an $O(n \log n)$ algorithm for calculating an H-polyhedron
$<A, \vec{c}>$ with the smallest $P = \{\vec{x} \in \mathbb{R}^2 \mid A\vec{x}
\leq \vec{c} \}$ such that $P_1 \cup P_2 \subseteq P$.
| [
{
"version": "v1",
"created": "Mon, 24 May 2004 13:19:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Simon",
"Axel",
""
],
[
"King",
"Andy",
""
]
] |
cs/0405091 | Jiang Qiu | Yves Caseau, Francois-Xavier Josset, Francois Laburthe | CLAIRE: Combining Sets, Search And Rules To Better Express Algorithms | Appeared in Theory and Practice of Logic Programming, vol. 2, no. 6,
2002 | Theory and Practice of Logic Programming, vol. 2, no. 6, 2002 | null | null | cs.PL | null | This paper presents a programming language which includes paradigms that are
usually associated with declarative languages, such as sets, rules and search,
into an imperative (functional) language. Although these paradigms are
separately well known and are available under various programming environments,
the originality of the CLAIRE language comes from the tight integration, which
yields interesting run-time performances, and from the richness of this
combination, which yields new ways in which to express complex algorithmic
patterns with few elegant lines. To achieve the opposite goals of a high
abstraction level (conciseness and readability) and run-time performance
(CLAIRE is used as a C++ preprocessor), we have developed two kinds of
compiler: first, a pattern pre-processor handles iterations over both concrete
and abstract sets (data types and program fragments), in a completely
user-extensible manner; secondly, an inference compiler transforms a set of
logical rules into a set of functions (demons that are used through procedural
attachment).
| [
{
"version": "v1",
"created": "Mon, 24 May 2004 17:31:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Caseau",
"Yves",
""
],
[
"Josset",
"Francois-Xavier",
""
],
[
"Laburthe",
"Francois",
""
]
] |
cs/0405092 | Jiang Qiu | Yves Caseau, Glenn Silverstein, Francois Laburthe | Learning Hybrid Algorithms for Vehicle Routing Problems | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 6,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 6, 2001 | null | null | cs.PL | null | This paper presents a generic technique for improving hybrid algorithms
through the discovery of and tuning of meta-heuristics. The idea is to
represent a family of push/pull heuristics that are based upon inserting and
removing tasks in a current solution, with an algebra. We then let a learning
algorithm search for the best possible algebraic term, which represents a
hybrid algorithm for a given set of problems and an optimization criterion. In
a previous paper, we described this algebra in detail and provided a set of
preliminary results demonstrating the utility of this approach, using vehicle
routing with time windows (VRPTW) as a domain example. In this paper we expand
upon our results providing a more robust experimental framework and learning
algorithms, and report on some new results using the standard Solomon
benchmarks. In particular, we show that our learning algorithm is able to
achieve results similar to the best-published algorithms using only a fraction
of the CPU time. We also show that the automatic tuning of the best hybrid
combination of such techniques yields a better solution than hand tuning, with
considerably less effort.
| [
{
"version": "v1",
"created": "Mon, 24 May 2004 17:41:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Caseau",
"Yves",
""
],
[
"Silverstein",
"Glenn",
""
],
[
"Laburthe",
"Francois",
""
]
] |
cs/0405093 | Vytautas Perlibakas | Vytautas Perlibakas | Computerized Face Detection and Recognition | PhD dissertation summary. 35 pages, 12 figures, 7 tables | null | null | null | cs.CV | null | This publication presents methods for face detection, analysis and
recognition: fast normalized cross-correlation (fast correlation coefficient)
between multiple templates based face pre-detection method, method for
detection of exact face contour based on snakes and Generalized Gradient Vector
Flow field, method for combining recognition algorithms based on Cumulative
Match Characteristics in order to increase recognition speed and accuracy, and
face recognition method based on Principal Component Analysis of the Wavelet
Packet Decomposition allowing to use PCA - based recognition method with large
number of training images. For all the methods are presented experimental
results and comparisons of speed and accuracy with large face databases.
| [
{
"version": "v1",
"created": "Tue, 25 May 2004 11:36:34 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Oct 2004 10:07:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perlibakas",
"Vytautas",
""
]
] |
cs/0405094 | Taneli Mielik\"ainen | Taneli Mielik\"ainen and Esko Ukkonen | The Complexity of Maximum Matroid-Greedoid Intersection and Weighted
Greedoid Maximization | null | null | null | Report C-2004-2, Department of Computer Science, University of
Helsinki | cs.DS | null | The maximum intersection problem for a matroid and a greedoid, given by
polynomial-time oracles, is shown $NP$-hard by expressing the satisfiability of
boolean formulas in 3-conjunctive normal form as such an intersection. The
corresponding approximation problems are shown $NP$-hard for certain
approximation performance bounds. Moreover, some natural parameterized variants
of the problem are shown $W[P]$-hard. The results are in contrast with the
maximum matroid-matroid intersection which is solvable in polynomial time by an
old result of Edmonds. We also prove that it is $NP$-hard to approximate the
weighted greedoid maximization within $2^{n^{O(1)}}$ where $n$ is the size of
the domain of the greedoid.
A preliminary version ``The Complexity of Maximum Matroid-Greedoid
Intersection'' appeared in Proc. FCT 2001, LNCS 2138, pp. 535--539,
Springer-Verlag 2001.
| [
{
"version": "v1",
"created": "Tue, 25 May 2004 12:09:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mielikäinen",
"Taneli",
""
],
[
"Ukkonen",
"Esko",
""
]
] |
cs/0405095 | Lili Ma Dr. | Lili Ma and YangQuan Chen and Kevin L. Moore | Blind Detection and Compensation of Camera Lens Geometric Distortions | 6 pages, 4 figures, 2 tables | SIAM Imaging Science, 2004 | null | null | cs.CV | null | This paper presents a blind detection and compensation technique for camera
lens geometric distortions. The lens distortion introduces higher-order
correlations in the frequency domain and in turn it can be detected using
higher-order spectral analysis tools without assuming any specific calibration
target. The existing blind lens distortion removal method only considered a
single-coefficient radial distortion model. In this paper, two coefficients are
considered to model approximately the geometric distortion. All the models
considered have analytical closed-form inverse formulae.
| [
{
"version": "v1",
"created": "Tue, 25 May 2004 22:40:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ma",
"Lili",
""
],
[
"Chen",
"YangQuan",
""
],
[
"Moore",
"Kevin L.",
""
]
] |
cs/0405096 | Yuriy Chashkov A. | Yuriy A. Chashkov | Developing Intellectual Network Management Facilities by Means of
Pattern Recognition Theory | 7 pages, 3 figures | null | null | MIEM-02-06 | cs.NI | null | In this paper considered question of using pattern recognition methods in
network equipment state identification.
| [
{
"version": "v1",
"created": "Wed, 26 May 2004 11:46:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chashkov",
"Yuriy A.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.