id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0404027
Rajkumar Buyya
Rajkumar Buyya and Srikumar Venugopal
The Gridbus Toolkit for Service Oriented Grid and Utility Computing: An Overview and Status Report
11 pages, 3 figures, 3 tables
null
null
Technical Report, GRIDS-TR-2004-2, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, April 2004
cs.DC
null
Grids aim at exploiting synergies that result from cooperation of autonomous distributed entities. The synergies that result from grid cooperation include the sharing, exchange, selection, and aggregation of geographically distributed resources such as computers, data bases, software, and scientific instruments for solving large-scale problems in science, engineering, and commerce. For this cooperation to be sustainable, participants need to have economic incentive. Therefore, "incentive" mechanisms should be considered as one of key design parameters of Grid architectures. In this article, we present an overview and status of an open source Grid toolkit, called Gridbus, whose architecture is fundamentally driven by the requirements of Grid economy. Gridbus technologies provide services for both computational and data grids that power the emerging eScience and eBusiness applications.
[ { "version": "v1", "created": "Tue, 13 Apr 2004 09:16:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Buyya", "Rajkumar", "" ], [ "Venugopal", "Srikumar", "" ] ]
cs/0404028
Saju Jude Dominic
Saju Jude Dominic and G. Sajith
The Random Buffer Tree : A Randomized Technique for I/O-efficient Algorithms
13 pages with no figures, unpublished
null
null
null
cs.DS
null
In this paper, we present a probabilistic self-balancing dictionary data structure for massive data sets, and prove expected amortized I/O-optimal bounds on the dictionary operations. We show how to use the structure as an I/O-optimal priority queue. The data structure, which we call as the random buffer tree, abstracts the properties of the random treap and the buffer tree and has the same expected I/O-bounds as the buffer tree.
[ { "version": "v1", "created": "Tue, 13 Apr 2004 13:49:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Dominic", "Saju Jude", "" ], [ "Sajith", "G.", "" ] ]
cs/0404032
David Finton
David J. Finton
When Do Differences Matter? On-Line Feature Extraction Through Cognitive Economy
20 pages, 10 PostScript figures, LaTeX2e
null
null
null
cs.LG cs.AI cs.NE
null
For an intelligent agent to be truly autonomous, it must be able to adapt its representation to the requirements of its task as it interacts with the world. Most current approaches to on-line feature extraction are ad hoc; in contrast, this paper presents an algorithm that bases judgments of state compatibility and state-space abstraction on principled criteria derived from the psychological principle of cognitive economy. The algorithm incorporates an active form of Q-learning, and partitions continuous state-spaces by merging and splitting Voronoi regions. The experiments illustrate a new methodology for testing and comparing representations by means of learning curves. Results from the puck-on-a-hill task demonstrate the algorithm's ability to learn effective representations, superior to those produced by some other, well-known, methods.
[ { "version": "v1", "created": "Thu, 15 Apr 2004 02:59:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Finton", "David J.", "" ] ]
cs/0404033
Saju Jude Dominic
Saju Jude Dominic and G. Sajith
The Persistent Buffer Tree : An I/O-efficient Index for Temporal Data
11 pages with no figures, unpublished
null
null
null
cs.GL cs.DB
null
In a variety of applications, we need to keep track of the development of a data set over time. For maintaining and querying this multi version data I/O-efficiently, external memory data structures are required. In this paper, we present a probabilistic self-balancing persistent data structure in external memory called the persistent buffer tree, which supports insertions, updates and deletions of data items at the present version and range queries for any version, past or present. The persistent buffer tree is I/O-optimal in the sense that the expected amortized I/O performance bounds are asymptotically the same as the deterministic amortized bounds of the (single version) buffer tree in the worst case.
[ { "version": "v1", "created": "Thu, 15 Apr 2004 03:17:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Dominic", "Saju Jude", "" ], [ "Sajith", "G.", "" ] ]
cs/0404035
Andreas Mielke
Andreas Mielke
Elements for Response Time Statistics in ERP Transaction Systems
revtex, twocolumn, 8 pages, 13 figures. figures replaced by coloured versions
Performance Evaluation 64, 635-653 (2006)
10.1016/j.peva.2005.05.006
null
cs.PF
null
We present some measurements and ideas for response time statistics in ERP systems. It is shown that the response time distribution of a given transaction in a given system is generically a log-normal distribution or, in some situations, a sum of two or more log-normal distributions. We present some arguments for this form of the distribution based on heuristic rules for response times, and we show data from performance measurements in actual systems to support the log-normal form. Deviations of the log-normal form can often be traced back to performance problems in the system. Consequences for the interpretation of response time data and for service level agreements are discussed.
[ { "version": "v1", "created": "Fri, 16 Apr 2004 16:03:05 GMT" }, { "version": "v2", "created": "Wed, 21 Apr 2004 16:05:09 GMT" }, { "version": "v3", "created": "Mon, 16 May 2005 21:22:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Mielke", "Andreas", "" ] ]
cs/0404036
Sandor P. Fekete
Sandor P. Fekete and Rolf Klein and Andreas Nuechter
Online Searching with an Autonomous Robot
16 pages, 8 figures, 12 photographs, 1 table, Latex, submitted for publication
null
null
null
cs.RO cs.DS
null
We discuss online strategies for visibility-based searching for an object hidden behind a corner, using Kurt3D, a real autonomous mobile robot. This task is closely related to a number of well-studied problems. Our robot uses a three-dimensional laser scanner in a stop, scan, plan, go fashion for building a virtual three-dimensional environment. Besides planning trajectories and avoiding obstacles, Kurt3D is capable of identifying objects like a chair. We derive a practically useful and asymptotically optimal strategy that guarantees a competitive ratio of 2, which differs remarkably from the well-studied scenario without the need of stopping for surveying the environment. Our strategy is used by Kurt3D, documented in a separate video.
[ { "version": "v1", "created": "Fri, 16 Apr 2004 21:46:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Klein", "Rolf", "" ], [ "Nuechter", "Andreas", "" ] ]
cs/0404038
Douglas Powell
D. B. Powell
2-Sat Sub-Clauses and the Hypernodal Structure of the 3-Sat Problem
16 pages; 8 figures
null
null
null
cs.CC cs.AI
null
Like simpler graphs, nested (hypernodal) graphs consist of two components: a set of nodes and a set of edges, where each edge connects a pair of nodes. In the hypernodal graph model, however, a node may contain other graphs, so that a node may be contained in a graph that it contains. The inherently recursive structure of the hypernodal graph model aptly characterizes both the structure and dynamic of the 3-sat problem, a broadly applicable, though intractable, computer science problem. In this paper I first discuss the structure of the 3-sat problem, analyzing the relation of 3-sat to 2-sat, a related, though tractable problem. I then discuss sub-clauses and sub-clause thresholds and the transformation of sub-clauses into implication graphs, demonstrating how combinations of implication graphs are equivalent to hypernodal graphs. I conclude with a brief discussion of the use of hypernodal graphs to model the 3-sat problem, illustrating how hypernodal graphs model both the conditions for satisfiability and the process by which particular 3-sat assignments either succeed or fail.
[ { "version": "v1", "created": "Tue, 20 Apr 2004 08:23:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Powell", "D. B.", "" ] ]
cs/0404039
Alexei Kaltchenko
Alexei Kaltchenko
Algorithms for Estimating Information Distance with Application to Bioinformatics and Linguistics
4 pages
null
null
null
cs.CC cs.CE q-bio.GN
null
After reviewing unnormalized and normalized information distances based on incomputable notions of Kolmogorov complexity, we discuss how Kolmogorov complexity can be approximated by data compression algorithms. We argue that optimal algorithms for data compression with side information can be successfully used to approximate the normalized distance. Next, we discuss an alternative information distance, which is based on relative entropy rate (also known as Kullback-Leibler divergence), and compression-based algorithms for its estimation. Based on available biological and linguistic data, we arrive to unexpected conclusion that in Bioinformatics and Computational Linguistics this alternative distance is more relevant and important than the ones based on Kolmogorov complexity.
[ { "version": "v1", "created": "Tue, 20 Apr 2004 15:18:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaltchenko", "Alexei", "" ] ]
cs/0404040
Nicolas Christin
Nicolas Christin, Jens Grossklags and John Chuang
Near Rationality and Competitive Equilibria in Networked Systems
13 pages, no figures
null
null
p2pecon TR-2004-04-CGC
cs.GT cs.NI
null
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-interested users. Most game-theoretic models applied to system research only describe competitive equilibria in terms of pure Nash equilibria, that is, a situation where the strategy of each user is deterministic, and is her best response to the strategies of all the other users. However, the assumptions necessary for a pure Nash equilibrium to hold may be too stringent for practical systems. Using three case studies on computer security, TCP congestion control, and network formation, we outline the limits of game-theoretic models relying on Nash equilibria, and we argue that considering competitive equilibria of a more general form may help reconcile predictions from game-theoretic models with empirically observed behavior.
[ { "version": "v1", "created": "Tue, 20 Apr 2004 22:26:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Christin", "Nicolas", "" ], [ "Grossklags", "Jens", "" ], [ "Chuang", "John", "" ] ]
cs/0404041
Jiyou Jia
Jiyou Jia
NLOMJ--Natural Language Object Model in Java
11 pages, 1 figure. Submitted to ICICP04
null
null
null
cs.CL cs.PL
null
In this paper we present NLOMJ--a natural language object model in Java with English as the experiment language. This modal describes the grammar elements of any permissible expression in a natural language and their complicated relations with each other with the concept "Object" in OOP(Object Oriented Programming). Directly mapped to the syntax and semantics of the natural language, it can be used in information retrieval as a linguistic method. Around the UML diagram of the NLOMJ the important classes(Sentence, Clause and Phrase) and their sub classes are introduced and their syntactic and semantic meanings are explained.
[ { "version": "v1", "created": "Wed, 21 Apr 2004 06:30:28 GMT" }, { "version": "v2", "created": "Mon, 6 Feb 2006 15:05:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Jia", "Jiyou", "" ] ]
cs/0404042
Wajahat Ali
W. Ali, R.J. Mondragon and F. Alavi
Extraction of topological features from communication network topological patterns using self-organizing feature maps
8 Pages, 5 figures, To be appeared in IEE Electronics Letter Journal
null
null
null
cs.NE cs.CV
null
Different classes of communication network topologies and their representation in the form of adjacency matrix and its eigenvalues are presented. A self-organizing feature map neural network is used to map different classes of communication network topological patterns. The neural network simulation results are reported.
[ { "version": "v1", "created": "Wed, 21 Apr 2004 16:05:27 GMT" }, { "version": "v2", "created": "Thu, 22 Apr 2004 09:00:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Ali", "W.", "" ], [ "Mondragon", "R. J.", "" ], [ "Alavi", "F.", "" ] ]
cs/0404045
Bayle Shanks
Bayle Shanks
Speculation on graph computation architectures and computing via synchronization
61 pages. Informal, rambling. (replacment changed only abstract)
null
null
null
cs.NE cs.AI
null
A speculative overview of a future topic of research. The paper is a collection of ideas concerning two related areas: 1) Graph computation machines ("computing with graphs"). This is the class of models of computation in which the state of the computation is represented as a graph or network. 2) Arc-based neural networks, which store information not as activation in the nodes, but rather by adding and deleting arcs. Sometimes the arcs may be interpreted as synchronization. Warnings to readers: this is not the sort of thing that one might submit to a journal or conference. No proofs are presented. The presentation is informal, and written at an introductory level. You'll probably want to wait for a more concise presentation.
[ { "version": "v1", "created": "Thu, 22 Apr 2004 07:29:19 GMT" }, { "version": "v2", "created": "Sat, 24 Apr 2004 16:56:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Shanks", "Bayle", "" ] ]
cs/0404046
Sanjay Rana
Sanjay Rana and Mike Batty
Visualising the structure of architectural open spaces based on shape analysis
10 pages, 9 figures
International Journal of Architectural Computing, 2(1), 2004
null
null
cs.CV cs.CG cs.DS
null
This paper proposes the application of some well known two-dimensional geometrical shape descriptors for the visualisation of the structure of architectural open spaces. The paper demonstrates the use of visibility measures such as distance to obstacles and amount of visible space to calculate shape descriptors such as convexity and skeleton of the open space. The aim of the paper is to indicate a simple, objective and quantifiable approach to understand the structure of open spaces otherwise impossible due to the complex construction of built structures.
[ { "version": "v1", "created": "Thu, 22 Apr 2004 13:42:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Rana", "Sanjay", "" ], [ "Batty", "Mike", "" ] ]
cs/0404047
Gianluca Argentini
Gianluca Argentini
Using matrices in post-processing phase of CFD simulations
Paper based on presentation-talk at SCICOMP9, Bologna (Italy), March 23-26, 2004; workshop organized by IBM, CINECA (Italy) (dr. Sigismondo Boschi, dr. Giovanni Erbacci), NERSC-DOE (USA) (dr. David Skinner), web site: www.spscicomp.org ; main topics: Computational Fluid Dynamics
Progress in Industrial Mathematics at ECMI 2004 - Eindhoven (Netherlands), Springer, 2005
null
null
cs.NA cs.DC physics.comp-ph
null
In this work I present a technique of construction and fast evaluation of a family of cubic polynomials for analytic smoothing and graphical rendering of particles trajectories for flows in a generic geometry. The principal result of the work was implementation and test of a method for interpolating 3D points by regular parametric curves and their fast and efficient evaluation for a good resolution of rendering. For the purpose I have used a parallel environment using a multiprocessor cluster architecture. The efficiency of the used method is good, mainly reducing the number of floating-points computations by caching the numerical values of some line-parameter's powers, and reducing the necessity of communication among processes. This work has been developed for the Research and Development Department of my company for planning advanced customized models of industrial burners.
[ { "version": "v1", "created": "Thu, 22 Apr 2004 15:33:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0404048
Francesco Ranzato
Roberto Giacobazzi and Francesco Ranzato
Incompleteness of States w.r.t. Traces in Model Checking
null
null
null
null
cs.LO
null
Cousot and Cousot introduced and studied a general past/future-time specification language, called mu*-calculus, featuring a natural time-symmetric trace-based semantics. The standard state-based semantics of the mu*-calculus is an abstract interpretation of its trace-based semantics, which turns out to be incomplete (i.e., trace-incomplete), even for finite systems. As a consequence, standard state-based model checking of the mu*-calculus is incomplete w.r.t. trace-based model checking. This paper shows that any refinement or abstraction of the domain of sets of states induces a corresponding semantics which is still trace-incomplete for any propositional fragment of the mu*-calculus. This derives from a number of results, one for each incomplete logical/temporal connective of the mu*-calculus, that characterize the structure of models, i.e. transition systems, whose corresponding state-based semantics of the mu*-calculus is trace-complete.
[ { "version": "v1", "created": "Fri, 23 Apr 2004 08:49:18 GMT" }, { "version": "v2", "created": "Wed, 24 Aug 2005 09:34:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Giacobazzi", "Roberto", "" ], [ "Ranzato", "Francesco", "" ] ]
cs/0404050
Jiang Qiu
Puri Arenas-Sanchez, Mario Rodriguez-Artalejo
A General Framework For Lazy Functional Logic Programming With Algebraic Polymorphic Types
Appeared in Theory and Practice of Logic Programming, vol. 1, no. 2, 2001
Theory and Practice of Logic Programming, vol. 1, no. 2, 2001
null
null
cs.PL
null
We propose a general framework for first-order functional logic programming, supporting lazy functions, non-determinism and polymorphic datatypes whose data constructors obey a set C of equational axioms. On top of a given C, we specify a program as a set R of C-based conditional rewriting rules for defined functions. We argue that equational logic does not supply the proper semantics for such programs. Therefore, we present an alternative logic which includes C-based rewriting calculi and a notion of model. We get soundness and completeness for C-based rewriting w.r.t. models, existence of free models for all programs, and type preservation results. As operational semantics, we develop a sound and complete procedure for goal solving, which is based on the combination of lazy narrowing with unification modulo C. Our framework is quite expressive for many purposes, such as solving action and change problems, or realizing the GAMMA computation model.
[ { "version": "v1", "created": "Sat, 24 Apr 2004 14:02:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Arenas-Sanchez", "Puri", "" ], [ "Rodriguez-Artalejo", "Mario", "" ] ]
cs/0404051
Jiang Qiu
Jorge Lobo, Gisela Mendez, Stuart R. Taylor
Knowledge And The Action Description Language A
Appeared in Theory and Practice of Logic Programming, vol. 1, no. 2, 2001
Theory and Practice of Logic Programming, vol. 1, no. 2, 2001
null
null
cs.AI
null
We introduce Ak, an extension of the action description language A (Gelfond and Lifschitz, 1993) to handle actions which affect knowledge. We use sensing actions to increase an agent's knowledge of the world and non-deterministic actions to remove knowledge. We include complex plans involving conditionals and loops in our query language for hypothetical reasoning. We also present a translation of Ak domain descriptions into epistemic logic programs.
[ { "version": "v1", "created": "Sat, 24 Apr 2004 14:16:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Jorge", "" ], [ "Mendez", "Gisela", "" ], [ "Taylor", "Stuart R.", "" ] ]
cs/0404052
Jiang Qiu
Keith L. Clark, Peter J. Robinson, Richard Hagen
Multi-Threading And Message Communication In Qu-Prolog
Appeared in Theory and Practice of Logic Programming, vol. 1, no. 3, 2001
Theory and Practice of Logic Programming, vol. 1, no. 3, 2001
null
null
cs.PL
null
This paper presents the multi-threading and internet message communication capabilities of Qu-Prolog. Message addresses are symbolic and the communications package provides high-level support that completely hides details of IP addresses and port numbers as well as the underlying TCP/IP transport layer. The combination of the multi-threads and the high level inter-thread message communications provide simple, powerful support for implementing internet distributed intelligent applications.
[ { "version": "v1", "created": "Sun, 25 Apr 2004 03:49:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Clark", "Keith L.", "" ], [ "Robinson", "Peter J.", "" ], [ "Hagen", "Richard", "" ] ]
cs/0404053
Jiang Qiu
Javier Leach, Susana Nieva, Mario Rodriguez-Artalejo
Constraint Logic Programming with Hereditary Harrop Formula
Appeared in Theory and Practice of Logic Programming, vol. 1, no. 4, 2001. Appeared in Theory and Practice of Logic Programming, vol. 1, no. 4, 2001
null
null
null
cs.PL
null
Constraint Logic Programming (CLP) and Hereditary Harrop formulas (HH) are two well known ways to enhance the expressivity of Horn clauses. In this paper, we present a novel combination of these two approaches. We show how to enrich the syntax and proof theory of HH with the help of a given constraint system, in such a way that the key property of HH as a logic programming language (namely, the existence of uniform proofs) is preserved. We also present a procedure for goal solving, showing its soundness and completeness for computing answer constraints. As a consequence of this result, we obtain a new strong completeness theorem for CLP that avoids the need to build disjunctions of computed answers, as well as a more abstract formulation of a known completeness theorem for HH.
[ { "version": "v1", "created": "Mon, 26 Apr 2004 13:22:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Leach", "Javier", "" ], [ "Nieva", "Susana", "" ], [ "Rodriguez-Artalejo", "Mario", "" ] ]
cs/0404054
Matthias Bauer
Matthias Bauer
New Covert Channels in HTTP
7 pages
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society
null
null
cs.CR cs.NI
null
This paper presents new methods enabling anonymous communication on the Internet. We describe a new protocol that allows us to create an anonymous overlay network by exploiting the web browsing activities of regular users. We show that the overlay network provides an anonymity set greater than the set of senders and receivers in a realistic threat model. In particular, the protocol provides unobservability in our threat model.
[ { "version": "v1", "created": "Mon, 26 Apr 2004 17:20:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Bauer", "Matthias", "" ] ]
cs/0404055
Roberto Bagnara
Roberto Bagnara, Roberta Gori, Patricia M. Hill, and Enea Zaffanella
Finite-Tree Analysis for Constraint Logic-Based Languages: The Complete Unabridged Version
89 pages, 1 table
null
null
null
cs.PL
null
Logic languages based on the theory of rational, possibly infinite, trees have much appeal in that rational trees allow for faster unification (due to the safe omission of the occurs-check) and increased expressivity (cyclic terms can provide very efficient representations of grammars and other useful objects). Unfortunately, the use of infinite rational trees has problems. For instance, many of the built-in and library predicates are ill-defined for such trees and need to be supplemented by run-time checks whose cost may be significant. Moreover, some widely-used program analysis and manipulation techniques are correct only for those parts of programs working over finite trees. It is thus important to obtain, automatically, a knowledge of the program variables (the finite variables) that, at the program points of interest, will always be bound to finite terms. For these reasons, we propose here a new data-flow analysis, based on abstract interpretation, that captures such information.
[ { "version": "v1", "created": "Mon, 26 Apr 2004 20:44:49 GMT" }, { "version": "v2", "created": "Tue, 27 Apr 2004 20:13:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagnara", "Roberto", "" ], [ "Gori", "Roberta", "" ], [ "Hill", "Patricia M.", "" ], [ "Zaffanella", "Enea", "" ] ]
cs/0405001
Nurlan Djenchuraev D.
Nurlan Djenchuraev
Toward a New Policy for Scientific and Technical Communication: the Case of Kyrgyz Republic
Policy Paper
null
null
null
cs.CY
null
The objective of this policy paper is to formulate a new policy in the field of scientific and technical information (STI) in Kyrgyz Republic in the light of emergence and rapid development of electronic scientific communication. The major problem with communication in science in the Republic is lack of adequate access to information by scientists. An equally serious problem is poor visibility of research conducted in Kyrgyzstan and, as consequence, negligible research impact on academic society globally. The paper proposes an integrated approach to formulation of a new STI policy based on a number of policy components: telecommunication networks, computerization, STI systems, legislation & standards, and education & trainings. Two alternatives were considered: electronic vs. paper-based scientific communication and development of the national STI system vs. cross-national virtual collaboration. The study results in suggesting a number of policy recommendations for identified stakeholders.
[ { "version": "v1", "created": "Sat, 1 May 2004 04:21:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Djenchuraev", "Nurlan", "" ] ]
cs/0405002
Joost Vennekens
Joost Vennekens, David Gilis, Marc Denecker
Splitting an operator: Algebraic modularity results for logics with fixpoint semantics
Revised to correct a substantial error in Section 4.2.2 (certain results which only hold for_consistent_ possible world sets were stated to hold in general)
ACM Transactions on Computational Logic, Volume 7, Number 4, 2006
null
null
cs.AI cs.LO
null
It is well known that, under certain conditions, it is possible to split logic programs under stable model semantics, i.e. to divide such a program into a number of different "levels", such that the models of the entire program can be constructed by incrementally constructing models for each level. Similar results exist for other non-monotonic formalisms, such as auto-epistemic logic and default logic. In this work, we present a general, algebraicsplitting theory for logics with a fixpoint semantics. Together with the framework of approximation theory, a general fixpoint theory for arbitrary operators, this gives us a uniform and powerful way of deriving splitting results for each logic with a fixpoint semantics. We demonstrate the usefulness of these results, by generalizing existing results for logic programming, auto-epistemic logic and default logic.
[ { "version": "v1", "created": "Mon, 3 May 2004 09:05:14 GMT" }, { "version": "v2", "created": "Thu, 26 Oct 2006 13:37:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Vennekens", "Joost", "" ], [ "Gilis", "David", "" ], [ "Denecker", "Marc", "" ] ]
cs/0405003
Aniello Buonocore
Laura Bozzelli
Model checking for Process Rewrite Systems and a class of action--based regular properties
31 pages, 1 figures
null
null
null
cs.OH
null
We consider the model checking problem for Process Rewrite Systems (PRSs), an infinite-state formalism (non Turing-powerful) which subsumes many common models such as Pushdown Processes and Petri Nets. PRSs can be adopted as formal models for programs with dynamic creation and synchronization of concurrent processes, and with recursive procedures. The model-checking problem for PRSs and action-based linear temporal logic (ALTL) is undecidable. However, decidability for some interesting fragment of ALTL remains an open question. In this paper we state decidability results concerning generalized acceptance properties about infinite derivations (infinite term rewriting) in PRSs. As a consequence, we obtain decidability of the model-checking (restricted to infinite runs) for PRSs and a meaningful fragment of ALTL.
[ { "version": "v1", "created": "Mon, 3 May 2004 15:19:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Bozzelli", "Laura", "" ] ]
cs/0405004
Archil Avaliani
Archil Avaliani
Quantum Computers
null
null
null
null
cs.AI cs.AR
null
This research paper gives an overview of quantum computers - description of their operation, differences between quantum and silicon computers, major construction problems of a quantum computer and many other basic aspects. No special scientific knowledge is necessary for the reader.
[ { "version": "v1", "created": "Mon, 3 May 2004 20:25:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Avaliani", "Archil", "" ] ]
cs/0405007
Tom Fawcett
Tom Fawcett
"In vivo" spam filtering: A challenge problem for data mining
null
KDD Explorations vol.5 no.2, Dec 2003. pp.140-148
null
null
cs.AI cs.DB cs.IR
null
Spam, also known as Unsolicited Commercial Email (UCE), is the bane of email communication. Many data mining researchers have addressed the problem of detecting spam, generally by treating it as a static text classification problem. True in vivo spam filtering has characteristics that make it a rich and challenging domain for data mining. Indeed, real-world datasets with these characteristics are typically difficult to acquire and to share. This paper demonstrates some of these characteristics and argues that researchers should pursue in vivo spam filtering as an accessible domain for investigating them.
[ { "version": "v1", "created": "Tue, 4 May 2004 18:56:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Fawcett", "Tom", "" ] ]
cs/0405008
Ajith Abraham
Ravi Jain and Ajith Abraham
A Comparative Study of Fuzzy Classification Methods on Breast Cancer Data
null
Australiasian Physical And Engineering Sciences in Medicine, Australia, 2004 (forth coming)
null
null
cs.AI
null
In this paper, we examine the performance of four fuzzy rule generation methods on Wisconsin breast cancer data. The first method generates fuzzy if then rules using the mean and the standard deviation of attribute values. The second approach generates fuzzy if then rules using the histogram of attributes values. The third procedure generates fuzzy if then rules with certainty of each attribute into homogeneous fuzzy sets. In the fourth approach, only overlapping areas are partitioned. The first two approaches generate a single fuzzy if then rule for each class by specifying the membership function of each antecedent fuzzy set using the information about attribute values of training patterns. The other two approaches are based on fuzzy grids with homogeneous fuzzy partitions of each attribute. The performance of each approach is evaluated on breast cancer data sets. Simulation results show that the Modified grid approach has a high classification rate of 99.73 %.
[ { "version": "v1", "created": "Tue, 4 May 2004 23:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "Ravi", "" ], [ "Abraham", "Ajith", "" ] ]
cs/0405009
Ajith Abraham
Ajith Abraham
Intelligent Systems: Architectures and Perspectives
null
Recent Advances in Intelligent Paradigms and Applications, Abraham A., Jain L. and Kacprzyk J. (Eds.), Studies in Fuzziness and Soft Computing, Springer Verlag Germany, ISBN 3790815381, Chapter 1, pp. 1-35, 2002
null
null
cs.AI
null
The integration of different learning and adaptation techniques to overcome individual limitations and to achieve synergetic effects through the hybridization or fusion of these techniques has, in recent years, contributed to a large number of new intelligent system designs. Computational intelligence is an innovative framework for constructing intelligent hybrid architectures involving Neural Networks (NN), Fuzzy Inference Systems (FIS), Probabilistic Reasoning (PR) and derivative free optimization techniques such as Evolutionary Computation (EC). Most of these hybridization approaches, however, follow an ad hoc design methodology, justified by success in certain application domains. Due to the lack of a common framework it often remains difficult to compare the various hybrid systems conceptually and to evaluate their performance comparatively. This chapter introduces the different generic architectures for integrating intelligent systems. The designing aspects and perspectives of different hybrid archirectures like NN-FIS, EC-FIS, EC-NN, FIS-PR and NN-FIS-EC systems are presented. Some conclusions are also provided towards the end.
[ { "version": "v1", "created": "Tue, 4 May 2004 23:48:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ajith", "" ] ]
cs/0405010
Ajith Abraham
Ajith Abraham and Baikunth Nath
A Neuro-Fuzzy Approach for Modelling Electricity Demand in Victoria
null
Applied Soft Computing Journal, Elsevier Science, Volume 1&2, pp. 127-138, 2001
null
null
cs.AI
null
Neuro-fuzzy systems have attracted growing interest of researchers in various scientific and engineering areas due to the increasing need of intelligent systems. This paper evaluates the use of two popular soft computing techniques and conventional statistical approach based on Box--Jenkins autoregressive integrated moving average (ARIMA) model to predict electricity demand in the State of Victoria, Australia. The soft computing methods considered are an evolving fuzzy neural network (EFuNN) and an artificial neural network (ANN) trained using scaled conjugate gradient algorithm (CGA) and backpropagation (BP) algorithm. The forecast accuracy is compared with the forecasts used by Victorian Power Exchange (VPX) and the actual energy demand. To evaluate, we considered load demand patterns for 10 consecutive months taken every 30 min for training the different prediction models. Test results show that the neuro-fuzzy system performed better than neural networks, ARIMA model and the VPX forecasts.
[ { "version": "v1", "created": "Wed, 5 May 2004 00:27:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ajith", "" ], [ "Nath", "Baikunth", "" ] ]
cs/0405011
Ajith Abraham
Ajith Abraham
Neuro Fuzzy Systems: Sate-of-the-Art Modeling Techniques
null
Connectionist Models of Neurons, Learning Processes, and Artificial Intelligence, Lecture Notes in Computer Science. Volume. 2084, Springer Verlag Germany, Jose Mira and Alberto Prieto (Eds.), ISBN 3540422358, Spain, pp. 269-276, 2001
null
null
cs.AI
null
Fusion of Artificial Neural Networks (ANN) and Fuzzy Inference Systems (FIS) have attracted the growing interest of researchers in various scientific and engineering areas due to the growing need of adaptive intelligent systems to solve the real world problems. ANN learns from scratch by adjusting the interconnections between layers. FIS is a popular computing framework based on the concept of fuzzy set theory, fuzzy if-then rules, and fuzzy reasoning. The advantages of a combination of ANN and FIS are obvious. There are several approaches to integrate ANN and FIS and very often it depends on the application. We broadly classify the integration of ANN and FIS into three categories namely concurrent model, cooperative model and fully fused model. This paper starts with a discussion of the features of each model and generalize the advantages and deficiencies of each model. We further focus the review on the different types of fused neuro-fuzzy systems and citing the advantages and disadvantages of each model.
[ { "version": "v1", "created": "Wed, 5 May 2004 00:32:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ajith", "" ] ]
cs/0405012
Ajith Abraham
Ajith Abraham & Dan Steinberg
Is Neural Network a Reliable Forecaster on Earth? A MARS Query!
null
Bio-Inspired Applications of Connectionism, Lecture Notes in Computer Science. Volume. 2085, Springer Verlag Germany, Jose Mira and Alberto Prieto (Eds.), ISBN 3540422374, Spain, pp.679-686, 2001
null
null
cs.AI
null
Long-term rainfall prediction is a challenging task especially in the modern world where we are facing the major environmental problem of global warming. In general, climate and rainfall are highly non-linear phenomena in nature exhibiting what is known as the butterfly effect. While some regions of the world are noticing a systematic decrease in annual rainfall, others notice increases in flooding and severe storms. The global nature of this phenomenon is very complicated and requires sophisticated computer modeling and simulation to predict accurately. In this paper, we report a performance analysis for Multivariate Adaptive Regression Splines (MARS)and artificial neural networks for one month ahead prediction of rainfall. To evaluate the prediction efficiency, we made use of 87 years of rainfall data in Kerala state, the southern part of the Indian peninsula situated at latitude -longitude pairs (8o29'N - 76o57' E). We used an artificial neural network trained using the scaled conjugate gradient algorithm. The neural network and MARS were trained with 40 years of rainfall data. For performance evaluation, network predicted outputs were compared with the actual rainfall data. Simulation results reveal that MARS is a good forecasting tool and performed better than the considered neural network.
[ { "version": "v1", "created": "Wed, 5 May 2004 00:36:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ajith", "" ], [ "Steinberg", "Dan", "" ] ]
cs/0405013
Ajith Abraham
Golam Sorwar and Ajith Abraham
DCT Based Texture Classification Using Soft Computing Approach
null
Malaysian Journal of Computer Science, 2004 (forth coming)
null
null
cs.AI
null
Classification of texture pattern is one of the most important problems in pattern recognition. In this paper, we present a classification method based on the Discrete Cosine Transform (DCT) coefficients of texture image. As DCT works on gray level image, the color scheme of each image is transformed into gray levels. For classifying the images using DCT we used two popular soft computing techniques namely neurocomputing and neuro-fuzzy computing. We used a feedforward neural network trained using the backpropagation learning and an evolving fuzzy neural network to classify the textures. The soft computing models were trained using 80% of the texture data and remaining was used for testing and validation purposes. A performance comparison was made among the soft computing models for the texture classification problem. We also analyzed the effects of prolonged training of neural networks. It is observed that the proposed neuro-fuzzy model performed better than neural network.
[ { "version": "v1", "created": "Wed, 5 May 2004 00:44:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Sorwar", "Golam", "" ], [ "Abraham", "Ajith", "" ] ]
cs/0405014
Ajith Abraham
Andy AuYeung and Ajith Abraham
Estimating Genome Reversal Distance by Genetic Algorithm
null
2003 IEEE Congress on Evolutionary Computation (CEC2003), Australia, IEEE Press, ISBN 0780378040, pp. 1157-1161, 2003
null
null
cs.AI
null
Sorting by reversals is an important problem in inferring the evolutionary relationship between two genomes. The problem of sorting unsigned permutation has been proven to be NP-hard. The best guaranteed error bounded is the 3/2- approximation algorithm. However, the problem of sorting signed permutation can be solved easily. Fast algorithms have been developed both for finding the sorting sequence and finding the reversal distance of signed permutation. In this paper, we present a way to view the problem of sorting unsigned permutation as signed permutation. And the problem can then be seen as searching an optimal signed permutation in all n2 corresponding signed permutations. We use genetic algorithm to conduct the search. Our experimental result shows that the proposed method outperform the 3/2-approximation algorithm.
[ { "version": "v1", "created": "Wed, 5 May 2004 00:57:34 GMT" } ]
2007-05-23T00:00:00
[ [ "AuYeung", "Andy", "" ], [ "Abraham", "Ajith", "" ] ]
cs/0405015
Darran Nathan
Darran Nathan, Kelvin Lim Mun Kit, Kelly Choo Hon Min, Philip Wong Jit Chin, Andreas Weisensee
A High-Level Reconfigurable Computing Platform Software Frameworks
4 pages, 8 figures
null
null
null
cs.AR
null
Reconfigurable computing refers to the use of processors, such as Field Programmable Gate Arrays (FPGAs), that can be modified at the hardware level to take on different processing tasks. A reconfigurable computing platform describes the hardware and software base on top of which modular extensions can be created, depending on the desired application. Such reconfigurable computing platforms can take on varied designs and implementations, according to the constraints imposed and features desired by the scope of applications. This paper introduces a PC-based reconfigurable computing platform software frameworks that is flexible and extensible enough to abstract the different hardware types and functionality that different PCs may have. The requirements of the software platform, architectural issues addressed, rationale behind the decisions made, and frameworks design implemented are discussed.
[ { "version": "v1", "created": "Wed, 5 May 2004 01:56:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Nathan", "Darran", "" ], [ "Kit", "Kelvin Lim Mun", "" ], [ "Min", "Kelly Choo Hon", "" ], [ "Chin", "Philip Wong Jit", "" ], [ "Weisensee", "Andreas", "" ] ]
cs/0405016
Ajith Abraham
Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham and Vitorino Ramos
Intrusion Detection Systems Using Adaptive Regression Splines
null
6th International Conference on Enterprise Information Systems, ICEIS'04, Portugal, I. Seruca, J. Filipe, S. Hammoudi and J. Cordeiro (Eds.), ISBN 972-8865-00-7, Vol. 3, pp. 26-33, 2004
null
null
cs.AI
null
Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable intrusion detection systems. Due to increasing incidents of cyber attacks, building effective intrusion detection systems (IDS) are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. In this paper, we report a performance analysis between Multivariate Adaptive Regression Splines (MARS), neural networks and support vector machines. The MARS procedure builds flexible regression models by fitting separate splines to distinct intervals of the predictor variables. A brief comparison of different neural network learning algorithms is also given.
[ { "version": "v1", "created": "Wed, 5 May 2004 02:22:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Mukkamala", "Srinivas", "" ], [ "Sung", "Andrew H.", "" ], [ "Abraham", "Ajith", "" ], [ "Ramos", "Vitorino", "" ] ]
cs/0405017
Ajith Abraham
Marcin Paprzycki, Ajith Abraham and Ruiyuan Guo
Data Mining Approach for Analyzing Call Center Performance
null
The 17th International Conference on Industrial & Engineering Applications of Artificial Intelligence and Expert Systems, Canada, Springer Verlag, Germany, 2004 (forth coming)
null
null
cs.AI
null
The aim of our research was to apply well-known data mining techniques (such as linear neural networks, multi-layered perceptrons, probabilistic neural networks, classification and regression trees, support vector machines and finally a hybrid decision tree neural network approach) to the problem of predicting the quality of service in call centers; based on the performance data actually collected in a call center of a large insurance company. Our aim was two-fold. First, to compare the performance of models built using the above-mentioned techniques and, second, to analyze the characteristics of the input sensitivity in order to better understand the relationship between the perform-ance evaluation process and the actual performance and in this way help improve the performance of call centers. In this paper we summarize our findings.
[ { "version": "v1", "created": "Wed, 5 May 2004 02:27:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Paprzycki", "Marcin", "" ], [ "Abraham", "Ajith", "" ], [ "Guo", "Ruiyuan", "" ] ]
cs/0405018
Ajith Abraham
Ajith Abraham, Ninan Sajith Philip and P. Saratchandran
Modeling Chaotic Behavior of Stock Indices Using Intelligent Paradigms
null
International Journal of Neural, Parallel & Scientific Computations, USA, Volume 11, Issue (1&2), pp. 143-160, 2003
null
null
cs.AI
null
The use of intelligent systems for stock market predictions has been widely established. In this paper, we investigate how the seemingly chaotic behavior of stock markets could be well represented using several connectionist paradigms and soft computing techniques. To demonstrate the different techniques, we considered Nasdaq-100 index of Nasdaq Stock MarketS and the S&P CNX NIFTY stock index. We analyzed 7 year's Nasdaq 100 main index values and 4 year's NIFTY index values. This paper investigates the development of a reliable and efficient technique to model the seemingly chaotic behavior of stock markets. We considered an artificial neural network trained using Levenberg-Marquardt algorithm, Support Vector Machine (SVM), Takagi-Sugeno neuro-fuzzy model and a Difference Boosting Neural Network (DBNN). This paper briefly explains how the different connectionist paradigms could be formulated using different learning methods and then investigates whether they can provide the required level of performance, which are sufficiently good and robust so as to provide a reliable forecast model for stock market indices. Experiment results reveal that all the connectionist paradigms considered could represent the stock indices behavior very accurately.
[ { "version": "v1", "created": "Wed, 5 May 2004 02:38:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ajith", "" ], [ "Philip", "Ninan Sajith", "" ], [ "Saratchandran", "P.", "" ] ]
cs/0405019
Ajith Abraham
Sonja Petrovic-Lazarevic and Ajith Abraham
Hybrid Fuzzy-Linear Programming Approach for Multi Criteria Decision Making Problems
null
International Journal of Neural, Parallel & Scientific Computations, USA, Volume 11, Issues (1&2), pp. 53-68, 2003
null
null
cs.AI
null
The purpose of this paper is to point to the usefulness of applying a linear mathematical formulation of fuzzy multiple criteria objective decision methods in organising business activities. In this respect fuzzy parameters of linear programming are modelled by preference-based membership functions. This paper begins with an introduction and some related research followed by some fundamentals of fuzzy set theory and technical concepts of fuzzy multiple objective decision models. Further a real case study of a manufacturing plant and the implementation of the proposed technique is presented. Empirical results clearly show the superiority of the fuzzy technique in optimising individual objective functions when compared to non-fuzzy approach. Furthermore, for the problem considered, the optimal solution helps to infer that by incorporating fuzziness in a linear programming model either in constraints, or both in objective functions and constraints, provides a similar (or even better) level of satisfaction for obtained results compared to non-fuzzy linear programming.
[ { "version": "v1", "created": "Wed, 5 May 2004 02:44:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrovic-Lazarevic", "Sonja", "" ], [ "Abraham", "Ajith", "" ] ]
cs/0405020
Joel Friedman
Joel Friedman
A proof of Alon's second eigenvalue conjecture and related problems
To appear in Memoirs of the American Mathematical Society. 118 pages. This newer version should have a two page glossary
null
null
null
cs.DM math.CO
null
In this paper we show the following conjecture of Noga Alon. Fix a positive integer d>2 and real epsilon > 0; consider the probability that a random d-regular graph on n vertices has the second eigenvalue of its adjacency matrix greater than 2 sqrt(d-1) + epsilon; then this probability goes to zero as n tends to infinity. We prove the conjecture for a number of notions of random d-regular graph, including models for d odd. We also estimate the aforementioned probability more precisely, showing in many cases and models (but not all) that it decays like a polynomial in 1/n.
[ { "version": "v1", "created": "Wed, 5 May 2004 16:42:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Joel", "" ] ]
cs/0405022
Eric Weber
Ryan Harkins, Eric Weber and Andrew Westmeyer
Encryption Schemes using Finite Frames and Hadamard Arrays
14 pages, 11 figures
null
null
null
cs.CR
null
We propose a cipher similar to the One Time Pad and McEliece cipher based on a subband coding scheme. The encoding process is an approximation to the One Time Pad encryption scheme. We present results of numerical experiments which suggest that a brute force attack to the proposed scheme does not result in all possible plaintexts, as the One Time Pad does, but still the brute force attack does not compromise the system. However, we demonstrate that the cipher is vulnerable to a chosen-plaintext attack.
[ { "version": "v1", "created": "Thu, 6 May 2004 16:33:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Harkins", "Ryan", "" ], [ "Weber", "Eric", "" ], [ "Westmeyer", "Andrew", "" ] ]
cs/0405023
Rajkumar Buyya
Srikumar Venugopal, Rajkumar Buyya and Lyle Winton
A Grid Service Broker for Scheduling Distributed Data-Oriented Applications on Global Grids
15 pages, 11 figures, 1 table
null
null
Technical Report, GRIDS-TR-2004-1, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, February 2004
cs.DC
null
The next generation of scientific experiments and studies, popularly called as e-Science, is carried out by large collaborations of researchers distributed around the world engaged in analysis of huge collections of data generated by scientific instruments. Grid computing has emerged as an enabler for e-Science as it permits the creation of virtual organizations that bring together communities with common objectives. Within a community, data collections are stored or replicated on distributed resources to enhance storage capability or efficiency of access. In such an environment, scientists need to have the ability to carry out their studies by transparently accessing distributed data and computational resources. In this paper, we propose and develop a Grid broker that mediates access to distributed resources by (a) discovering suitable data sources for a given analysis scenario, (b) suitable computational resources, (c) optimally mapping analysis jobs to resources, (d) deploying and monitoring job execution on selected resources, (e) accessing data from local or remote data source during job execution and (f) collating and presenting results. The broker supports a declarative and dynamic parametric programming model for creating grid applications. We have used this model in grid-enabling a high energy physics analysis application (Belle Analysis Software Framework). The broker has been used in deploying Belle experiment data analysis jobs on a grid testbed, called Belle Analysis Data Grid, having resources distributed across Australia interconnected through GrangeNet.
[ { "version": "v1", "created": "Thu, 6 May 2004 10:15:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Venugopal", "Srikumar", "" ], [ "Buyya", "Rajkumar", "" ], [ "Winton", "Lyle", "" ] ]
cs/0405024
Ajith Abraham
Ajith Abraham
Meta-Learning Evolutionary Artificial Neural Networks
null
Neurocomputing Journal, Elsevier Science, Netherlands, Vol. 56c, pp. 1-38, 2004
null
null
cs.AI
null
In this paper, we present MLEANN (Meta-Learning Evolutionary Artificial Neural Network), an automatic computational framework for the adaptive optimization of artificial neural networks wherein the neural network architecture, activation function, connection weights; learning algorithm and its parameters are adapted according to the problem. We explored the performance of MLEANN and conventionally designed artificial neural networks for function approximation problems. To evaluate the comparative performance, we used three different well-known chaotic time series. We also present the state of the art popular neural network learning algorithms and some experimentation results related to convergence speed and generalization performance. We explored the performance of backpropagation algorithm; conjugate gradient algorithm, quasi-Newton algorithm and Levenberg-Marquardt algorithm for the three chaotic time series. Performances of the different learning algorithms were evaluated when the activation functions and architecture were changed. We further present the theoretical background, algorithm, design strategy and further demonstrate how effective and inevitable is the proposed MLEANN framework to design a neural network, which is smaller, faster and with a better generalization performance.
[ { "version": "v1", "created": "Thu, 6 May 2004 13:44:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ajith", "" ] ]
cs/0405025
Ajith Abraham
Andy Auyeung and Ajith Abraham
The Largest Compatible Subset Problem for Phylogenetic Data
null
Genetic and Evolutionary Computation 2004 Conference (GECCO-2004), Bird-of-a-feather Workshop On Application of Hybrid Evolutionary Algorithms to Complex Optimization Problems, Springer Verlag Germany, 2004 (forth coming)
null
null
cs.AI
null
The phylogenetic tree construction is to infer the evolutionary relationship between species from the experimental data. However, the experimental data are often imperfect and conflicting each others. Therefore, it is important to extract the motif from the imperfect data. The largest compatible subset problem is that, given a set of experimental data, we want to discard the minimum such that the remaining is compatible. The largest compatible subset problem can be viewed as the vertex cover problem in the graph theory that has been proven to be NP-hard. In this paper, we propose a hybrid Evolutionary Computing (EC) method for this problem. The proposed method combines the EC approach and the algorithmic approach for special structured graphs. As a result, the complexity of the problem is dramatically reduced. Experiments were performed on randomly generated graphs with different edge densities. The vertex covers produced by the proposed method were then compared to the vertex covers produced by a 2-approximation algorithm. The experimental results showed that the proposed method consistently outperformed a classical 2- approximation algorithm. Furthermore, a significant improvement was found when the graph density was small.
[ { "version": "v1", "created": "Thu, 6 May 2004 13:52:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Auyeung", "Andy", "" ], [ "Abraham", "Ajith", "" ] ]
cs/0405027
Julian Togelius
Julian Togelius
Evolution of a Subsumption Architecture Neurocontroller
null
Journal of Intelligent and Fuzzy Systems, Vol. 15, No. 1 (2004)
null
null
cs.AI cs.NE
null
An approach to robotics called layered evolution and merging features from the subsumption architecture into evolutionary robotics is presented, and its advantages are discussed. This approach is used to construct a layered controller for a simulated robot that learns which light source to approach in an environment with obstacles. The evolvability and performance of layered evolution on this task is compared to (standard) monolithic evolution, incremental and modularised evolution. To corroborate the hypothesis that a layered controller performs at least as well as an integrated one, the evolved layers are merged back into a single network. On the grounds of the test results, it is argued that layered evolution provides a superior approach for many tasks, and it is suggested that this approach may be the key to scaling up evolutionary robotics.
[ { "version": "v1", "created": "Thu, 6 May 2004 19:37:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Togelius", "Julian", "" ] ]
cs/0405030
Ajith Abraham
Ajith Abraham
Business Intelligence from Web Usage Mining
null
Journal of Information & Knowledge Management (JIKM), World Scientific Publishing Co., Singapore, Vol. 2, No. 4, pp. 375-390, 2003
null
null
cs.AI
null
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on one hand and the customer's option to choose from several alternatives business community has realized the necessity of intelligent marketing strategies and relationship management. Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical for effective Web site management, creating adaptive Web sites, business and support services, personalization, network traffic flow analysis and so on. In this paper, we present the important concepts of Web usage mining and its various practical applications. We further present a novel approach 'intelligent-miner' (i-Miner) to optimize the concurrent architecture of a fuzzy clustering algorithm (to discover web data clusters) and a fuzzy inference system to analyze the Web site visitor trends. A hybrid evolutionary fuzzy clustering algorithm is proposed in this paper to optimally segregate similar user interests. The clustered data is then used to analyze the trends using a Takagi-Sugeno fuzzy inference system learned using a combination of evolutionary algorithm and neural network learning. Proposed approach is compared with self-organizing maps (to discover patterns) and several function approximation techniques like neural networks, linear genetic programming and Takagi-Sugeno fuzzy inference system (to analyze the clusters). The results are graphically illustrated and the practical significance is discussed in detail. Empirical results clearly show that the proposed Web usage-mining framework is efficient.
[ { "version": "v1", "created": "Thu, 6 May 2004 23:54:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ajith", "" ] ]
cs/0405031
Ajith Abraham
Cong Tran, Lakhmi Jain, Ajith Abraham
Adaptation of Mamdani Fuzzy Inference System Using Neuro - Genetic Approach for Tactical Air Combat Decision Support System
null
15th Australian Joint Conference on Artificial Intelligence (AI'02) Australia, LNAI 2557, Springer Verlag, Germany, pp. 672-679, 2002
null
null
cs.AI
null
Normally a decision support system is build to solve problem where multi-criteria decisions are involved. The knowledge base is the vital part of the decision support containing the information or data that is used in decision-making process. This is the field where engineers and scientists have applied several intelligent techniques and heuristics to obtain optimal decisions from imprecise information. In this paper, we present a hybrid neuro-genetic learning approach for the adaptation a Mamdani fuzzy inference system for the Tactical Air Combat Decision Support System (TACDSS). Some simulation results demonstrating the difference of the learning techniques and are also provided.
[ { "version": "v1", "created": "Thu, 6 May 2004 23:58:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Tran", "Cong", "" ], [ "Jain", "Lakhmi", "" ], [ "Abraham", "Ajith", "" ] ]
cs/0405034
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 45
4 pages, to appear in SIGACT News and in IJCGA, 2004
null
null
null
cs.CG cs.DM
null
The algorithm of Edelsbrunner for surface reconstruction by ``wrapping'' a set of points in R^3 is described.
[ { "version": "v1", "created": "Fri, 7 May 2004 19:22:28 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/0405035
Rajgopal Kannan
Rajgopal Kannan, Lydia Ray, Arjan Durresi, S. Iyengar
Security-Performance Tradeoffs of Inheritance based Key Predistribution for Wireless Sensor Networks
18 pages, ESAS'04 1st Euro Wkshp on Security in Ad-Hoc and Sensor Networks
null
null
null
cs.NI cs.CR
null
Key predistribution is a well-known technique for ensuring secure communication via encryption among sensors deployed in an ad-hoc manner to form a sensor network. In this paper, we propose a novel 2-Phase technique for key predistribution based on a combination of inherited and random key assignments from the given key pool to individual sensor nodes. We also develop an analytical framework for measuring security-performance tradeoffs of different key distribution schemes by providing metrics for measuring sensornet connectivity and resiliency to enemy attacks. In particular, we show analytically that the 2-Phase scheme provides better average connectivity and superior $q$-composite connectivity than the random scheme. We then prove that the invulnerability of a communication link under arbitrary number of node captures by an adversary is higher under the 2-Phase scheme. The probability of a communicating node pair having an exclusive key also scales better with network size under the 2-Phase scheme. We also show analytically that the vulnerability of an arbitrary communication link in the sensornet to single node capture is lower under 2-Phase assuming both network-wide as well as localized capture. Simulation results also show that the number of exclusive keys shared between any two nodes is higher while the number of $q$-composite links compromised when a given number of nodes are captured by the enemy is smaller under the 2-Phase scheme as compared to the random one.
[ { "version": "v1", "created": "Mon, 10 May 2004 18:56:02 GMT" }, { "version": "v2", "created": "Fri, 14 May 2004 17:56:46 GMT" }, { "version": "v3", "created": "Mon, 21 Jun 2004 21:57:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Kannan", "Rajgopal", "" ], [ "Ray", "Lydia", "" ], [ "Durresi", "Arjan", "" ], [ "Iyengar", "S.", "" ] ]
cs/0405036
David Eppstein
M. Gopi and David Eppstein
Single-Strip Triangulation of Manifolds with Arbitrary Topology
12 pages, 10 figures. To appear at Eurographics 2004
null
null
null
cs.CG cs.GR
null
Triangle strips have been widely used for efficient rendering. It is NP-complete to test whether a given triangulated model can be represented as a single triangle strip, so many heuristics have been proposed to partition models into few long strips. In this paper, we present a new algorithm for creating a single triangle loop or strip from a triangulated model. Our method applies a dual graph matching algorithm to partition the mesh into cycles, and then merges pairs of cycles by splitting adjacent triangles when necessary. New vertices are introduced at midpoints of edges and the new triangles thus formed are coplanar with their parent triangles, hence the visual fidelity of the geometry is not changed. We prove that the increase in the number of triangles due to this splitting is 50% in the worst case, however for all models we tested the increase was less than 2%. We also prove tight bounds on the number of triangles needed for a single-strip representation of a model with holes on its boundary. Our strips can be used not only for efficient rendering, but also for other applications including the generation of space filling curves on a manifold of any arbitrary topology.
[ { "version": "v1", "created": "Mon, 10 May 2004 14:31:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Gopi", "M.", "" ], [ "Eppstein", "David", "" ] ]
cs/0405037
Konstantin Petrov
G.E. Miram and V.K. Petrov
A Probabilistic Model of Machine Translation
null
null
null
null
cs.CL
null
A probabilistic model for computer-based generation of a machine translation system on the basis of English-Russian parallel text corpora is suggested. The model is trained using parallel text corpora with pre-aligned source and target sentences. The training of the model results in a bilingual dictionary of words and "word blocks" with relevant translation probability.
[ { "version": "v1", "created": "Mon, 10 May 2004 16:05:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Miram", "G. E.", "" ], [ "Petrov", "V. K.", "" ] ]
cs/0405038
Riccardo Pucella
Riccardo Pucella
Deductive Algorithmic Knowledge
28 pages. A preliminary version of this paper appeared in the Proceedings of the 8th International Symposium on Artificial Intelligence and Mathematics, AI&M 22-2004, 2004
Journal of Logic and Computation 16 (2), pp. 287-309, 2006
null
null
cs.AI cs.LO
null
The framework of algorithmic knowledge assumes that agents use algorithms to compute the facts they explicitly know. In many cases of interest, a deductive system, rather than a particular algorithm, captures the formal reasoning used by the agents to compute what they explicitly know. We introduce a logic for reasoning about both implicit and explicit knowledge with the latter defined with respect to a deductive system formalizing a logical theory for agents. The highly structured nature of deductive systems leads to very natural axiomatizations of the resulting logic when interpreted over any fixed deductive system. The decision problem for the logic, in the presence of a single agent, is NP-complete in general, no harder than propositional logic. It remains NP-complete when we fix a deductive system that is decidable in nondeterministic polynomial time. These results extend in a straightforward way to multiple agents.
[ { "version": "v1", "created": "Tue, 11 May 2004 18:01:39 GMT" }, { "version": "v2", "created": "Fri, 17 Jun 2005 02:43:07 GMT" }, { "version": "v3", "created": "Wed, 18 Jan 2006 19:08:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
cs/0405039
Lillian Lee
Regina Barzilay and Lillian Lee
Catching the Drift: Probabilistic Content Models, with Applications to Generation and Summarization
Best paper award
HLT-NAACL 2004: Proceedings of the Main Conference, pp. 113--120
null
null
cs.CL
null
We consider the problem of modeling the content structure of texts within a specific domain, in terms of the topics the texts address and the order in which these topics appear. We first present an effective knowledge-lean method for learning content models from un-annotated documents, utilizing a novel adaptation of algorithms for Hidden Markov Models. We then apply our method to two complementary tasks: information ordering and extractive summarization. Our experiments show that incorporating content models in these applications yields substantial improvement over previously-proposed methods.
[ { "version": "v1", "created": "Wed, 12 May 2004 14:14:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Barzilay", "Regina", "" ], [ "Lee", "Lillian", "" ] ]
cs/0405040
Yongzhi Cao
Yongzhi Cao and Mingsheng Ying
Supervisory Control of Fuzzy Discrete Event Systems
12 pages, 2 figures
A short version has been published in the IEEE Transactions on Systems, Man, and Cybernetics--Part B: Cybernetics, 35(2), pp. 366-371, April 2005.
null
null
cs.DM cs.DC
null
In order to cope with situations in which a plant's dynamics are not precisely known, we consider the problem of supervisory control for a class of discrete event systems modelled by fuzzy automata. The behavior of such discrete event systems is described by fuzzy languages; the supervisors are event feedback and can disable only controllable events with any degree. The concept of discrete event system controllability is thus extended by incorporating fuzziness. In this new sense, we present a necessary and sufficient condition for a fuzzy language to be controllable. We also study the supremal controllable fuzzy sublanguage and the infimal controllable fuzzy superlanguage when a given pre-specified desired fuzzy language is uncontrollable. Our framework generalizes that of Ramadge-Wonham and reduces to Ramadge-Wonham framework when membership grades in all fuzzy languages must be either 0 or 1. The theoretical development is accompanied by illustrative numerical examples.
[ { "version": "v1", "created": "Wed, 12 May 2004 03:35:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Cao", "Yongzhi", "" ], [ "Ying", "Mingsheng", "" ] ]
cs/0405041
Vladimir Migunov
Vladimir V. Migunov
The modulus in the CAD system drawings as a base of developing of the problem-oriented extensions
2 pages, no figures, in Russian
null
null
null
cs.CE cs.DS
null
The concept of the "modulus" in the CAD system drawings is characterized, being a base of developing of the problem-oriented extensions. The modulus consists of visible geometric elements of the drawing and invisible parametric representation of the modelling object. The technological advantages of moduluss in a complex CAD system developing are described.
[ { "version": "v1", "created": "Wed, 12 May 2004 07:55:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0405042
Ted Herman
T. Herman, S. Tixeuil
A Distributed TDMA Slot Assignment Algorithm for Wireless Sensor Networks
null
null
null
TR04-02 University of Iowa Department of Computer Science
cs.DC cs.NI
null
Wireless sensor networks benefit from communication protocols that reduce power requirements by avoiding frame collision. Time Division Media Access methods schedule transmission in slots to avoid collision, however these methods often lack scalability when implemented in \emph{ad hoc} networks subject to node failures and dynamic topology. This paper reports a distributed algorithm for TDMA slot assignment that is self-stabilizing to transient faults and dynamic topology change. The expected local convergence time is O(1) for any size network satisfying a constant bound on the size of a node neighborhood.
[ { "version": "v1", "created": "Wed, 12 May 2004 14:53:29 GMT" }, { "version": "v2", "created": "Wed, 19 May 2004 16:59:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Herman", "T.", "" ], [ "Tixeuil", "S.", "" ] ]
cs/0405043
Marcus Hutter
Marcus Hutter and Jan Poland
Prediction with Expert Advice by Following the Perturbed Leader for General Weights
16 LaTeX pages
Proc. 15th International Conf. on Algorithmic Learning Theory (ALT-2004), pages 279-293
null
IDSIA-08-04
cs.LG cs.AI
null
When applying aggregating strategies to Prediction with Expert Advice, the learning rate must be adaptively tuned. The natural choice of sqrt(complexity/current loss) renders the analysis of Weighted Majority derivatives quite complicated. In particular, for arbitrary weights there have been no results proven so far. The analysis of the alternative "Follow the Perturbed Leader" (FPL) algorithm from Kalai (2003} (based on Hannan's algorithm) is easier. We derive loss bounds for adaptive learning rate and both finite expert classes with uniform weights and countable expert classes with arbitrary weights. For the former setup, our loss bounds match the best known results so far, while for the latter our results are (to our knowledge) new.
[ { "version": "v1", "created": "Wed, 12 May 2004 16:41:01 GMT" }, { "version": "v2", "created": "Wed, 12 May 2004 20:37:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ], [ "Poland", "Jan", "" ] ]
cs/0405044
Lillian Lee
Oren Kurland and Lillian Lee
Corpus structure, language models, and ad hoc information retrieval
To appear, SIGIR 2004
null
null
null
cs.IR cs.CL
null
Most previous work on the recently developed language-modeling approach to information retrieval focuses on document-specific characteristics, and therefore does not take into account the structure of the surrounding corpus. We propose a novel algorithmic framework in which information provided by document-based language models is enhanced by the incorporation of information drawn from clusters of similar documents. Using this framework, we develop a suite of new algorithms. Even the simplest typically outperforms the standard language-modeling approach in precision and recall, and our new interpolation algorithm posts statistically significant improvements for both metrics over all three corpora tested.
[ { "version": "v1", "created": "Wed, 12 May 2004 20:18:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurland", "Oren", "" ], [ "Lee", "Lillian", "" ] ]
cs/0405045
Manuel A. P\'erez-Qui\~nones
Ravikiran Vatrapu, Manuel A. Perez-Quinones
Culture and International Usability Testing: The Effects of Culture in Structured Interviews
8 pages
null
null
null
cs.HC cs.SE
null
The global audience for software products includes members of different countries, religions, and cultures: people who speak different languages, have different life styles, and have different perceptions and expectations of any given product. A major impediment in interface development is that there is inadequate empirical evidence for the effects of culture in the usability engineering methods used for developing user interfaces. This paper presents a controlled study investigating the effects of culture on the effectiveness of structured interviews in usability testing. The experiment consisted of usability testing of a website with two independent groups of Indian participants by two interviewers; one belonging to the Indian culture and the other to the Anglo-American culture. Participants found more usability problems and made more suggestions to an interviewer who was a member of the same (Indian) culture than to the foreign (Anglo-American) interviewer. The results of the study empirically establish that culture significantly affects the efficacy of structured interviews during international user testing. The implications of this work for usability engineering are discussed.
[ { "version": "v1", "created": "Thu, 13 May 2004 18:46:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Vatrapu", "Ravikiran", "" ], [ "Perez-Quinones", "Manuel A.", "" ] ]
cs/0405046
Ajith Abraham
Ajith Abraham and Ravi Jain
Soft Computing Models for Network Intrusion Detection Systems
null
Soft Computing in Knowledge Discovery: Methods and Applications, Saman Halgamuge and Lipo Wang (Eds.), Studies in Fuzziness and Soft Computing, Springer Verlag Germany, Chapter 16, 20 pages, 2004
null
null
cs.CR
null
Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: external intruders, who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with some restrictions. This chapter presents a soft computing approach to detect intrusions in a network. Among the several soft computing paradigms, we investigated fuzzy rule-based classifiers, decision trees, support vector machines, linear genetic programming and an ensemble method to model fast and efficient intrusion detection systems. Empirical results clearly show that soft computing approach could play a major role for intrusion detection.
[ { "version": "v1", "created": "Thu, 13 May 2004 23:27:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ajith", "" ], [ "Jain", "Ravi", "" ] ]
cs/0405047
Vladimir Migunov
Vladimir V. Migunov
Modular technology of developing of the problem-oriented extensions of a CAD system of reconstruction of the plant
8 pages, no figures, in Russian
null
null
null
cs.CE cs.DS
null
The modular technology of creation of the problem-oriented extensions of a CAD system is described, which was realised in a system TechnoCAD GlassX for designing of reconstruction of the plants. The modularity of the technology is expressed in storage of all parameters of the design in one element of the drawing - modulus, with automatic generation of a geometrical part of the modulus from these parameters. The common principles of the system organization of extensions developing are described: separation of the part of the design to automize in this extension, architecture of parameters in the form of the lists of objects with their properties and links to another objects, separation of common and special operations, stages of the developing, boundaries of applicability of technology.
[ { "version": "v1", "created": "Fri, 14 May 2004 17:43:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0405048
Stanimire Tomov
Stanimire Tomov and Michael McGuigan
Interactive visualization of higher dimensional data in a multiview environment
6 pages, 3 figures
null
null
null
cs.GR
null
We develop multiple view visualization of higher dimensional data. Our work was chiefly motivated by the need to extract insight from four dimensional Quantum Chromodynamic (QCD) data. We develop visualization where multiple views, generally views of 3D projections or slices of a higher dimensional data, are tightly coupled not only by their specific order but also by a view synchronizing interaction style, and an internally defined interaction language. The tight coupling of the different views allows a fast and well-coordinated exploration of the data. In particular, the visualization allowed us to easily make consistency checks of the 4D QCD data and to infer the correctness of particle properties calculations. The software developed was also successfully applied in material studies, in particular studies of meteorite properties. Our implementation uses the VTK API. To handle a large number of views (slices/projections) and to still maintain good resolution, we use IBM T221 display (3840 X 2400 pixels).
[ { "version": "v1", "created": "Fri, 14 May 2004 18:18:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Tomov", "Stanimire", "" ], [ "McGuigan", "Michael", "" ] ]
cs/0405049
Ajith Abraham
Ron Edwards, Ajith Abraham and Sonja Petrovic-Lazarevic
Export Behaviour Modeling Using EvoNF Approach
null
The International Conference on Computational Science 2003 (ICCS 2003), Springer Verlag, Lecture Notes in Computer Science Volume 2660, Sloot P.M.A. et al (Eds.), pp. 169-178, 2003
null
null
cs.AI
null
The academic literature suggests that the extent of exporting by multinational corporation subsidiaries (MCS) depends on their product manufactured, resources, tax protection, customers and markets, involvement strategy, financial independence and suppliers' relationship with a multinational corporation (MNC). The aim of this paper is to model the complex export pattern behaviour using a Takagi-Sugeno fuzzy inference system in order to determine the actual volume of MCS export output (sales exported). The proposed fuzzy inference system is optimised by using neural network learning and evolutionary computation. Empirical results clearly show that the proposed approach could model the export behaviour reasonable well compared to a direct neural network approach.
[ { "version": "v1", "created": "Sun, 16 May 2004 03:24:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Edwards", "Ron", "" ], [ "Abraham", "Ajith", "" ], [ "Petrovic-Lazarevic", "Sonja", "" ] ]
cs/0405050
Ajith Abraham
Miao M. Chong, Ajith Abraham, Marcin Paprzycki
Traffic Accident Analysis Using Decision Trees and Neural Networks
null
IADIS International Conference on Applied Computing, Portugal, IADIS Press, Pedro Isaias et al. (Eds.), ISBN: 9729894736, Volume 2, pp. 39-42, 2004
null
null
cs.AI
null
The costs of fatalities and injuries due to traffic accident have a great impact on society. This paper presents our research to model the severity of injury resulting from traffic accidents using artificial neural networks and decision trees. We have applied them to an actual data set obtained from the National Automotive Sampling System (NASS) General Estimates System (GES). Experiment results reveal that in all the cases the decision tree outperforms the neural network. Our research analysis also shows that the three most important factors in fatal injury are: driver's seat belt usage, light condition of the roadway, and driver's alcohol usage.
[ { "version": "v1", "created": "Sun, 16 May 2004 03:33:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Chong", "Miao M.", "" ], [ "Abraham", "Ajith", "" ], [ "Paprzycki", "Marcin", "" ] ]
cs/0405051
Ajith Abraham
Muhammad Riaz Khan and Ajith Abraham
Short Term Load Forecasting Models in Czech Republic Using Soft Computing Paradigms
null
International Journal of Knowledge-Based Intelligent Engineering Systems, IOS Press Netherlands, Volume 7, Number 4, pp. 172-179, 2003
null
null
cs.AI
null
This paper presents a comparative study of six soft computing models namely multilayer perceptron networks, Elman recurrent neural network, radial basis function network, Hopfield model, fuzzy inference system and hybrid fuzzy neural network for the hourly electricity demand forecast of Czech Republic. The soft computing models were trained and tested using the actual hourly load data for seven years. A comparison of the proposed techniques is presented for predicting 2 day ahead demands for electricity. Simulation results indicate that hybrid fuzzy neural network and radial basis function networks are the best candidates for the analysis and forecasting of electricity demand.
[ { "version": "v1", "created": "Sun, 16 May 2004 03:44:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Khan", "Muhammad Riaz", "" ], [ "Abraham", "Ajith", "" ] ]
cs/0405052
Ajith Abraham
Cong Tran, Ajith Abraham and Lakhmi Jain
Decision Support Systems Using Intelligent Paradigms
null
International Journal of American Romanian Academy of Arts and Sciences, 2004 (forth coming)
null
null
cs.AI
null
Decision-making is a process of choosing among alternative courses of action for solving complicated problems where multi-criteria objectives are involved. The past few years have witnessed a growing recognition of Soft Computing (SC) technologies that underlie the conception, design and utilization of intelligent systems. In this paper, we present different SC paradigms involving an artificial neural network trained using the scaled conjugate gradient algorithm, two different fuzzy inference methods optimised using neural network learning/evolutionary algorithms and regression trees for developing intelligent decision support systems. We demonstrate the efficiency of the different algorithms by developing a decision support system for a Tactical Air Combat Environment (TACE). Some empirical comparisons between the different algorithms are also provided.
[ { "version": "v1", "created": "Sun, 16 May 2004 03:50:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Tran", "Cong", "" ], [ "Abraham", "Ajith", "" ], [ "Jain", "Lakhmi", "" ] ]
cs/0405053
Boris D. Lubachevsky
Boris Lubachevsky and Alan Weiss
Synchronous Relaxation for Parallel Ising Spin Simulations
Extended abstract. Conference version. The full paper in preparation
15th Workshop on Parallel and Distributed Simulation, Lake Arrowhead, California, May 2001, pp.185-192
null
null
cs.DC cond-mat.mtrl-sci cs.DS physics.comp-ph
null
A new parallel algorithm for simulating Ising spin systems is presented. The sequential prototype is the n-fold way algorithm cite{BKL75}, which is efficient but is hard to parallelize using conservative methods. Our parallel algorithm is optimistic. Unlike other optimistic algorithms, e.g., Time Warp, our algorithm is synchronous. It also belongs to the class of simulations known as ``relaxation'' cite{CS8 hence it is named ``synchronous relaxation.'' We derive performance guarantees for this algorithm. If N is the number of PEs, then under weak assumptions we show that the number of correct events processed per unit of time is, on average, at least of order N/log(N). All communication delays, processing time, and busy waits are taken into account.
[ { "version": "v1", "created": "Mon, 17 May 2004 01:32:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Lubachevsky", "Boris", "" ], [ "Weiss", "Alan", "" ] ]
cs/0405054
Vladimir Migunov
Vladimir V. Migunov
The model of the tables in design documentation for operating with the electronic catalogs and for specifications making in a CAD system
5 pages, 4 figures, in Russian
null
null
null
cs.CE cs.DS
null
The hierarchic block model of the tables in design documentation as a part of a CAD system is described, intended for automatic specifications making of elements of the drawings, with usage of the electronic catalogs. The model is created for needs of a CAD system of reconstruction of the industrial plants, where the result of designing are the drawings, which include the specifications of different types. The adequate simulation of the specification tables is ensured with technology of storing in the drawing of the visible geometric elements and invisible parametric representation, sufficient for generation of this elements.
[ { "version": "v1", "created": "Mon, 17 May 2004 09:39:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0405055
Vladimir Migunov
Vladimir V. Migunov, Rustem R. Kafiatullov, Ilsur T. Safin
Modular technology of developing of the extensions of a CAD system. Axonometric piping diagrams. Parametric representation
8 pages, 1 figure, in Russian
null
null
null
cs.CE cs.DS
null
Applying the modular technology of developing of the problem-oriented extensions of a CAD system to a problem of automation of creating of the axonometric piping diagrams on an example of the program system TechnoCAD GlassX is described. The proximity of composition of the schemas is detected for special technological pipe lines, systems of a water line and water drain, heating, heat supply, ventilating, air conditioning. The structured parametric representation of the schemas, including properties of objects, their link, common settings, settings by default and the special links of compatibility is reviewed.
[ { "version": "v1", "created": "Mon, 17 May 2004 09:46:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ], [ "Kafiatullov", "Rustem R.", "" ], [ "Safin", "Ilsur T.", "" ] ]
cs/0405056
Vladimir Migunov
Ilsur T. Safin, Vladimir V. Migunov, Rustem R. Kafiatullov
Modular technology of developing of the extensions of a CAD system. The axonometric piping diagrams. Common and special operations
8 pages, 7 figures, in Russian
null
null
null
cs.CE cs.DS
null
Applying the modular technology of developing of the problem-oriented extensions of a CAD system to a problem of automation of creating of the axonometric piping diagrams on an example of the program system TechnoCAD GlassX is described. The features of realization of common operations, composition and realization of special operations of a designing of the schemas of the special technological pipe lines, systems of a water line and water drain, heating, heat supply, ventilating, air conditioning are reviewed.
[ { "version": "v1", "created": "Mon, 17 May 2004 10:14:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Safin", "Ilsur T.", "" ], [ "Migunov", "Vladimir V.", "" ], [ "Kafiatullov", "Rustem R.", "" ] ]
cs/0405057
Vladimir Migunov
Vladimir V. Migunov
Mathematical and programming toolkit of the computer aided design of the axonometric piping diagrams
3 pages, no figures, in Russian
null
null
null
cs.CE cs.DS
null
The problem of the automation of the designing of the axonometric piping diagrams include, as the minimum, manipulations with the flat schemas of three-dimensional wireframe objects (with dimension of 2,5). The specialized model, methodical and mathematical approaches are required because of large bulk of calculuss. Coordinate systems, data types, common principles of realization of operation with data and composition of the basic operations are described which are realised in the complex CAD system of the reconstruction of the plants TechnoCAD GlassX.
[ { "version": "v1", "created": "Mon, 17 May 2004 10:34:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0405058
Sandor P. Fekete
Sandor P. Fekete, Alexander Kroeller, Dennis Pfisterer, Stefan Fischer, and Carsten Buschmann
Neighborhood-Based Topology Recognition in Sensor Networks
14 pages, 6 figures, Latex, to appear in Workshop on Algorithms Aspects of Sensor Networks (ALGOSENSORS 2004)
null
null
null
cs.DS cs.DC
null
We consider a crucial aspect of self-organization of a sensor network consisting of a large set of simple sensor nodes with no location hardware and only very limited communication range. After having been distributed randomly in a given two-dimensional region, the nodes are required to develop a sense for the environment, based on a limited amount of local communication. We describe algorithmic approaches for determining the structure of boundary nodes of the region, and the topology of the region. We also develop methods for determining the outside boundary, the distance to the closest boundary for each point, the Voronoi diagram of the different boundaries, and the geometric thickness of the network. Our methods rely on a number of natural assumptions that are present in densely distributed sets of nodes, and make use of a combination of stochastics, topology, and geometry. Evaluation requires only a limited number of simple local computations.
[ { "version": "v1", "created": "Mon, 17 May 2004 12:16:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Kroeller", "Alexander", "" ], [ "Pfisterer", "Dennis", "" ], [ "Fischer", "Stefan", "" ], [ "Buschmann", "Carsten", "" ] ]
cs/0405061
Ajith Abraham
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal and Dharma P. Agrawal
Jigsaw-based Security in Data Transfer in Computer Networks
null
IEEE International Conference on Information Technology: Coding and Computing (ITCC'04), USA, IEEE Computer Society, Volume 1, pp. 2-6, 2004
null
null
cs.CR
null
In this paper, we present a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a 'jigsaw puzzle' to break the transformed data into multiple parts where these parts form the pieces of the puzzle. Then these parts are packaged into packets and sent to the receiver. A secure and efficient mechanism is provided to convey the information that is necessary for obtaining the original data at the receiver-end from its parts in the packets, that is, for solving the 'jigsaw puzzle'. The algorithm is designed to provide information-theoretic (that is, unconditional) security by the use of a one-time pad like scheme so that no intermediate or unintended node can obtain the entire data. An authentication code is also used to ensure authenticity of every packet.
[ { "version": "v1", "created": "Mon, 17 May 2004 21:40:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Vasudevan", "Rangarajan", "" ], [ "Abraham", "Ajith", "" ], [ "Sanyal", "Sugata", "" ], [ "Agrawal", "Dharma P.", "" ] ]
cs/0405062
Kumara Sastry
Kumara Sastry, David E. Goldberg, Martin Pelikan
Efficiency Enhancement of Probabilistic Model Building Genetic Algorithms
Optimization by Building and Using Probabilistic Models. Workshop at the 2004 Genetic and Evolutionary Computation Conference
null
null
IlliGAL Report No. 2004020
cs.NE
null
This paper presents two different efficiency-enhancement techniques for probabilistic model building genetic algorithms. The first technique proposes the use of a mutation operator which performs local search in the sub-solution neighborhood identified through the probabilistic model. The second technique proposes building and using an internal probabilistic model of the fitness along with the probabilistic model of variable interactions. The fitness values of some offspring are estimated using the probabilistic model, thereby avoiding computationally expensive function evaluations. The scalability of the aforementioned techniques are analyzed using facetwise models for convergence time and population sizing. The speed-up obtained by each of the methods is predicted and verified with empirical results. The results show that for additively separable problems the competent mutation operator requires O(k 0.5 logm)--where k is the building-block size, and m is the number of building blocks--less function evaluations than its selectorecombinative counterpart. The results also show that the use of an internal probabilistic fitness model reduces the required number of function evaluations to as low as 1-10% and yields a speed-up of 2--50.
[ { "version": "v1", "created": "Tue, 18 May 2004 16:19:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Sastry", "Kumara", "" ], [ "Goldberg", "David E.", "" ], [ "Pelikan", "Martin", "" ] ]
cs/0405064
Kumara Sastry
Kumara Sastry, David E. Goldberg
Designing Competent Mutation Operators via Probabilistic Model Building of Neighborhoods
Genetic and Evolutionary Computation Conference (GECCO-2004)
null
null
IlliGAL Report No. 2004006
cs.NE
null
This paper presents a competent selectomutative genetic algorithm (GA), that adapts linkage and solves hard problems quickly, reliably, and accurately. A probabilistic model building process is used to automatically identify key building blocks (BBs) of the search problem. The mutation operator uses the probabilistic model of linkage groups to find the best among competing building blocks. The competent selectomutative GA successfully solves additively separable problems of bounded difficulty, requiring only subquadratic number of function evaluations. The results show that for additively separable problems the probabilistic model building BB-wise mutation scales as O(2^km^{1.5}), and requires O(k^{0.5}logm) less function evaluations than its selectorecombinative counterpart, confirming theoretical results reported elsewhere (Sastry & Goldberg, 2004).
[ { "version": "v1", "created": "Tue, 18 May 2004 16:41:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Sastry", "Kumara", "" ], [ "Goldberg", "David E.", "" ] ]
cs/0405066
Riccardo Pucella
Riccardo Pucella and Vicky Weissman
A Logic for Reasoning about Digital Rights
21 pages. Appeared in the Proceedings of the 15th IEEE Computer Security Foundations Workshop, pp. 282-294, 2002
null
null
null
cs.CR cs.LO
null
We present a logic for reasoning about licenses, which are ``terms of use'' for digital resources. The logic provides a language for writing both properties of licenses and specifications that govern a client's actions. We discuss the complexity of checking properties and specifications written in our logic and propose a technique for verification. A key feature of our approach is that it is essentially parameterized by the language in which the licenses are written, provided that this language can be given a trace-based semantics. We consider two license languages to illustrate this flexibility.
[ { "version": "v1", "created": "Tue, 18 May 2004 18:22:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ], [ "Weissman", "Vicky", "" ] ]
cs/0405067
Peter Winkler
Graham R. Brightwell and Peter Winkler
Note on Counting Eulerian Circuits
2 figures
null
null
null
cs.CC cs.DM
null
We show that the problem of counting the number of Eulerian circuits in an undirected graph is complete for the class #P.
[ { "version": "v1", "created": "Tue, 18 May 2004 19:47:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Brightwell", "Graham R.", "" ], [ "Winkler", "Peter", "" ] ]
cs/0405068
Yongzhi Cao
Yongzhi Cao and Mingsheng Ying
Observability and Decentralized Control of Fuzzy Discrete Event Systems
14 pages, 1 figure. to be published in the IEEE Transactions on Fuzzy Systems
IEEE Transactions on Fuzzy Systems, 14(2), pp. 202-216, April 2006
null
null
cs.DM cs.DC
null
Fuzzy discrete event systems as a generalization of (crisp) discrete event systems have been introduced in order that it is possible to effectively represent uncertainty, imprecision, and vagueness arising from the dynamic of systems. A fuzzy discrete event system has been modelled by a fuzzy automaton; its behavior is described in terms of the fuzzy language generated by the automaton. In this paper, we are concerned with the supervisory control problem for fuzzy discrete event systems with partial observation. Observability, normality, and co-observability of crisp languages are extended to fuzzy languages. It is shown that the observability, together with controllability, of the desired fuzzy language is a necessary and sufficient condition for the existence of a partially observable fuzzy supervisor. When a decentralized solution is desired, it is proved that there exist local fuzzy supervisors if and only if the fuzzy language to be synthesized is controllable and co-observable. Moreover, the infimal controllable and observable fuzzy superlanguage, and the supremal controllable and normal fuzzy sublanguage are also discussed. Simple examples are provided to illustrate the theoretical development.
[ { "version": "v1", "created": "Thu, 20 May 2004 08:19:26 GMT" }, { "version": "v2", "created": "Tue, 18 Oct 2005 00:06:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Cao", "Yongzhi", "" ], [ "Ying", "Mingsheng", "" ] ]
cs/0405070
Alain Barrat
Alain Barrat, Marc Barthelemy, Alessandro Vespignani
Traffic-driven model of the World Wide Web graph
null
LNCS 3243, 56 (2004)
null
null
cs.NI cond-mat.stat-mech
null
We propose a model for the World Wide Web graph that couples the topological growth with the traffic's dynamical evolution. The model is based on a simple traffic-driven dynamics and generates weighted directed graphs exhibiting the statistical properties observed in the Web. In particular, the model yields a non-trivial time evolution of vertices and heavy-tail distributions for the topological and traffic properties. The generated graphs exhibit a complex architecture with a hierarchy of cohesiveness levels similar to those observed in the analysis of real data.
[ { "version": "v1", "created": "Thu, 20 May 2004 14:45:57 GMT" }, { "version": "v2", "created": "Mon, 24 May 2004 15:06:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Barrat", "Alain", "" ], [ "Barthelemy", "Marc", "" ], [ "Vespignani", "Alessandro", "" ] ]
cs/0405071
Tuan Le Mr.
Le-Chi Tuan, Chitta Baral, and Tran Cao Son
Regression with respect to sensing actions and partial states
38 pages
null
null
null
cs.AI
null
In this paper, we present a state-based regression function for planning domains where an agent does not have complete information and may have sensing actions. We consider binary domains and employ the 0-approximation [Son & Baral 2001] to define the regression function. In binary domains, the use of 0-approximation means using 3-valued states. Although planning using this approach is incomplete with respect to the full semantics, we adopt it to have a lower complexity. We prove the soundness and completeness of our regression formulation with respect to the definition of progression. More specifically, we show that (i) a plan obtained through regression for a planning problem is indeed a progression solution of that planning problem, and that (ii) for each plan found through progression, using regression one obtains that plan or an equivalent one. We then develop a conditional planner that utilizes our regression function. We prove the soundness and completeness of our planning algorithm and present experimental results with respect to several well known planning problems in the literature.
[ { "version": "v1", "created": "Fri, 21 May 2004 12:43:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Tuan", "Le-Chi", "" ], [ "Baral", "Chitta", "" ], [ "Son", "Tran Cao", "" ] ]
cs/0405073
Olivier Gay
Olivier Gay
Advanced exploitation of buffer overflow
92 pages, in french
null
null
null
cs.CR
null
This article describes in depth several ways of exploiting buffer overflows in the UNIX operating systems.
[ { "version": "v1", "created": "Fri, 21 May 2004 13:33:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Gay", "Olivier", "" ] ]
cs/0405074
Richard McClatchey
S R Amendolia, F Estrella, W Hassan, T Hauer, D Manset, R McClatchey, D Rogulin & T Solomonides
MammoGrid: A Service Oriented Architecture based Medical Grid Application
12 pages, 9 figures
Proceedings of the 3rd International Conference on Grid and Cooperative Computing. Wuhan. China 2004
null
null
cs.DC cs.DB
null
The MammoGrid project has recently delivered its first proof-of-concept prototype using a Service-Oriented Architecture (SOA)-based Grid application to enable distributed computing spanning national borders. The underlying AliEn Grid infrastructure has been selected because of its practicality and because of its emergence as a potential open source standards-based solution for managing and coordinating distributed resources. The resultant prototype is expected to harness the use of huge amounts of medical image data to perform epidemiological studies, advanced image processing, radiographic education and ultimately, tele-diagnosis over communities of medical virtual organisations. The MammoGrid prototype comprises a high-quality clinician visualization workstation used for data acquisition and inspection, a DICOM-compliant interface to a set of medical services (annotation, security, image analysis, data storage and querying services) residing on a so-called Grid-box and secure access to a network of other Grid-boxes connected through Grid middleware. This paper outlines the MammoGrid approach in managing a federation of Grid-connected mammography databases in the context of the recently delivered prototype and will also describe the next phase of prototyping.
[ { "version": "v1", "created": "Fri, 21 May 2004 13:41:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Amendolia", "S R", "" ], [ "Estrella", "F", "" ], [ "Hassan", "W", "" ], [ "Hauer", "T", "" ], [ "Manset", "D", "" ], [ "McClatchey", "R", "" ], [ "Rogulin", "D", "" ], [ "Solomonides", "T", "" ] ]
cs/0405075
Xiaochu Qi
Xiaochu Qi
Reduction Strategies in Lambda Term Normalization and their Effects on Heap Usage
This is a modified version of the master's thesis of Xiaochu Qi
null
null
null
cs.PL
null
Higher-order representations of objects such as programs, proofs, formulas and types have become important to many symbolic computation tasks. Systems that support such representations usually depend on the implementation of an intensional view of the terms of some variant of the typed lambda-calculus. Various notations have been proposed for lambda-terms to explicitly treat substitutions as basis for realizing such implementations. There are, however, several choices in the actual reduction strategies. The most common strategy utilizes such notations only implicitly via an incremental use of environments. This approach does not allow the smaller substitution steps to be intermingled with other operations of interest on lambda-terms. However, a naive strategy explicitly using such notations can also be costly: each use of the substitution propagation rules causes the creation of a new structure on the heap that is often discarded in the immediately following step. There is thus a tradeoff between these two approaches. This thesis describes the actual realization of the two approaches, discusses their tradeoffs based on this and, finally, offers an amalgamated approach that utilizes recursion in rewrite rule application but also suspends substitution operations where necessary.
[ { "version": "v1", "created": "Sat, 22 May 2004 07:21:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Qi", "Xiaochu", "" ] ]
cs/0405076
Jiang Qiu
Chiaki Sakama, Katsumi Inoue
An Abductive Framework For Computing Knowledge Base Updates
Appeared in Theory and Practice of Logic Programming, vol. 3, no. 6, 2003
Theory and Practice of Logic Programming, vol. 3, no. 6, 2003
null
null
cs.DB
null
This paper introduces an abductive framework for updating knowledge bases represented by extended disjunctive programs. We first provide a simple transformation from abductive programs to update programs which are logic programs specifying changes on abductive hypotheses. Then, extended abduction, which was introduced by the same authors as a generalization of traditional abduction, is computed by the answer sets of update programs. Next, different types of updates, view updates and theory updates are characterized by abductive programs and computed by update programs. The task of consistency restoration is also realized as special cases of these updates. Each update problem is comparatively assessed from the computational complexity viewpoint. The result of this paper provides a uniform framework for different types of knowledge base updates, and each update is computed using existing procedures of logic programming.
[ { "version": "v1", "created": "Sat, 22 May 2004 10:30:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Sakama", "Chiaki", "" ], [ "Inoue", "Katsumi", "" ] ]
cs/0405077
Boris D. Lubachevsky
Boris D. Lubachevsky
Fast Simulation of Multicomponent Dynamic Systems
38 pages, 9 figures
Bell Labs Technical Journal, Vol.5, No.2, April-June 2000, pp.134-156
null
null
cs.DS cond-mat.mtrl-sci cs.DC
null
A computer simulation has to be fast to be helpful, if it is employed to study the behavior of a multicomponent dynamic system. This paper discusses modeling concepts and algorithmic techniques useful for creating such fast simulations. Concrete examples of simulations that range from econometric modeling to communications to material science are used to illustrate these techniques and concepts. The algorithmic and modeling methods discussed include event-driven processing, ``anticipating'' data structures, and ``lazy'' evaluation, Poisson dispenser, parallel processing by cautious advancements and by synchronous relaxations. The paper gives examples of how these techniques and models are employed in assessing efficiency of capacity management methods in wireless and wired networks, in studies of magnetization, crystalline structure, and sediment formation in material science, in studies of competition in economics.
[ { "version": "v1", "created": "Sat, 22 May 2004 16:51:48 GMT" }, { "version": "v2", "created": "Fri, 28 Jul 2006 20:52:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Lubachevsky", "Boris D.", "" ] ]
cs/0405078
Jean Vanderdonckt
Max Schlee, Jean Vanderdonckt
Generative Programming of Graphical User Interfaces
4 pages, 12 figures, ACM Conference on Visual Interfaces AVI'2004
null
null
null
cs.HC
null
Generative Programming (GP) is a computing paradigm allowing automatic creation of entire software families utilizing the configuration of elementary and reusable components. GP can be projected on different technologies, e.g. C++-templates, Java-Beans, Aspect-Oriented Programming (AOP), or Frame technology. This paper focuses on Frame Technology, which aids the possible implementation and completion of software components. The purpose of this paper is to introduce the GP paradigm in the area of GUI application generation. It demonstrates how automatically customized executable applications with GUI parts can be generated from an abstract specification.
[ { "version": "v1", "created": "Sun, 23 May 2004 09:53:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Schlee", "Max", "" ], [ "Vanderdonckt", "Jean", "" ] ]
cs/0405079
Riccardo Pucella
Riccardo Pucella
Higher-Order Concurrent Win32 Programming
10 pages; appeared in Proceedings of the 3rd Usenix Windows NT Symposium, Seattle, pp. 113-122, 1999
null
null
null
cs.PL
null
We present a concurrent framework for Win32 programming based on Concurrent ML, a concurrent language with higher-order functions, static typing, lightweight threads and synchronous communication channels. The key points of the framework are the move from an event loop model to a threaded model for the processing of window messages, and the decoupling of controls notifications from the system messages. This last point allows us to derive a general way of writing controls that leads to easy composition, and can accommodate ActiveX Controls in a transparent way.
[ { "version": "v1", "created": "Sun, 23 May 2004 18:56:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
cs/0405081
Riccardo Pucella
Riccardo Pucella
An Analysis of Lambek's Production Machines
13 pages, 1 figure
RAIRO Informatique Theorique et Applications, 31 (5), pp. 483-497, 1997
null
null
cs.LO
null
Lambek's production machines may be used to generate and recognize sentences in a subset of the language described by a production grammar. We determine in this paper the subset of the language of a grammar generated and recognized by such machines.
[ { "version": "v1", "created": "Sun, 23 May 2004 19:22:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
cs/0405082
Riccardo Pucella
Riccardo Pucella, Erik Meijer, Dino Oliva
Aspects de la Programmation d'Applications Win32 avec un Langage Fonctionnel
In french, 25 pages, 3 figures. Appeared in the Proceedings of the "Journees Francophones des Langages Applicatifs" (JFLA'99), 1999
null
null
null
cs.PL
null
A useful programming language needs to support writing programs that take advantage of services and communication mechanisms supplied by the operating system. We examine the problem of programming native Win32 applications under Windows with Standard ML. We introduce an framework based on the IDL interface language et a minimal foreign-functions interface to explore the Win32 API et COM in the context of Standard ML.
[ { "version": "v1", "created": "Sun, 23 May 2004 19:35:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ], [ "Meijer", "Erik", "" ], [ "Oliva", "Dino", "" ] ]
cs/0405084
Riccardo Pucella
Kathleen Fisher, Riccardo Pucella, John Reppy
A Framework for Interoperability
16 pages; 1 figure; appeared in Proceedings of the 1st International Workshop on Multi-Language Infrastructure and Interoperability (BABEL'01), ENTCS 59(1), 2001
null
null
null
cs.PL
null
Practical implementations of high-level languages must provide access to libraries and system services that have APIs specified in a low-level language (usually C). An important characteristic of such mechanisms is the foreign-interface policy that defines how to bridge the semantic gap between the high-level language and C. For example, IDL-based tools generate code to marshal data into and out of the high-level representation according to user annotations. The design space of foreign-interface policies is large and there are pros and cons to each approach. Rather than commit to a particular policy, we choose to focus on the problem of supporting a gamut of interoperability policies. In this paper, we describe a framework for language interoperability that is expressive enough to support very efficient implementations of a wide range of different foreign-interface policies. We describe two tools that implement substantially different policies on top of our framework and present benchmarks that demonstrate their efficiency.
[ { "version": "v1", "created": "Sun, 23 May 2004 20:28:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Fisher", "Kathleen", "" ], [ "Pucella", "Riccardo", "" ], [ "Reppy", "John", "" ] ]
cs/0405085
Riccardo Pucella
Riccardo Pucella, Prakash Panangaden
On the Expressive Power of First-Order Boolean Functions in PCF
23 pages
Theoretical Computer Science 266(1-2), pp. 543-567, 2001
null
null
cs.PL
null
Recent results of Bucciarelli show that the semilattice of degrees of parallelism of first-order boolean functions in PCF has both infinite chains and infinite antichains. By considering a simple subclass of Sieber's sequentiality relations, we identify levels in the semilattice and derive inexpressibility results concerning functions on different levels. This allows us to further explore the structure of the semilattice of degrees of parallelism: we identify semilattices characterized by simple level properties, and show the existence of new infinite hierarchies which are in a certain sense natural with respect to the levels.
[ { "version": "v1", "created": "Mon, 24 May 2004 05:16:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ], [ "Panangaden", "Prakash", "" ] ]
cs/0405086
Vasilii Zhakhovskii
Vasilii Zhakhovskii, Katsunobu Nishihara, Yuko Fukuda, and Shinji Shimojo
A New Dynamical Domain Decomposition Method for Parallel Molecular Dynamics Simulation on Grid
null
null
null
Annual Progress Report 2003, Institute of Laser Engineering,Osaka University (2004)
cs.DC
null
We develop a new Lagrangian material particle -- dynamical domain decomposition method (MPD^3) for large scale parallel molecular dynamics (MD) simulation of nonstationary heterogeneous systems on a heterogeneous computing net. MPD^3 is based on Voronoi decomposition of simulated matter. The map of Voronoi polygons is known as the Dirichlet tessellation and used for grid generation in computational fluid dynamics. From the hydrodynamics point of view the moving Voronoi polygon looks as a material particle (MP). MPs can exchange particles and information. To balance heterogeneous computing conditions the MP centers should be dependent on timing data. We propose a simple and efficient iterative algorithm which based on definition of the timing-dependent balancing displacement of MP center for next simulation step. The MPD^3 program was tested in various computing environments and physical problems. We have demonstrated that MPD^3 is a high-adaptive decomposition algorithm for MD simulation. It was shown that the well-balanced decomposition can result from dynamical Voronoi polygon tessellation. One would expect the similar approach can be successfully applied for other particle methods like Monte Carlo, particle-in-cell, and smooth-particle-hydrodynamics.
[ { "version": "v1", "created": "Mon, 24 May 2004 07:29:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhakhovskii", "Vasilii", "" ], [ "Nishihara", "Katsunobu", "" ], [ "Fukuda", "Yuko", "" ], [ "Shimojo", "Shinji", "" ] ]
cs/0405087
Richard McClatchey
D Rogulin, F Estrella, T Hauer, R McClatchey & T Solomonides
A Grid Information Infrastructure for Medical Image Analysis
9 pages, 5 figures
null
null
null
cs.DB cs.DC
null
The storage and manipulation of digital images and the analysis of the information held in those images are essential requirements for next-generation medical information systems. The medical community has been exploring collaborative approaches for managing image data and exchanging knowledge and Grid technology [1] is a promising approach to enabling distributed analysis across medical institutions and for developing new collaborative and cooperative approaches for image analysis without the necessity for clinicians to co-locate. The EU-funded MammoGrid project [2] is one example of this and it aims to develop a Europe-wide database of mammograms to support effective co-working between healthcare professionals across the EU. The MammoGrid prototype comprises a high-quality clinician visualization workstation (for data acquisition and inspection), a DICOM-compliant interface to a set of medical services (annotation, security, image analysis, data storage and querying services) residing on a so-called Grid-box and secure access to a network of other Grid-boxes connected through Grid middleware. One of the main deliverables of the project is a Grid-enabled infrastructure that manages federated mammogram databases across Europe. This paper outlines the MammoGrid Information Infrastructure (MII) for meta-data analysis and knowledge discovery in the medical imaging domain.
[ { "version": "v1", "created": "Mon, 24 May 2004 10:15:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Rogulin", "D", "" ], [ "Estrella", "F", "" ], [ "Hauer", "T", "" ], [ "McClatchey", "R", "" ], [ "Solomonides", "T", "" ] ]
cs/0405088
Jiang Qiu
Paul Tarau, Veronica Dahl
High-Level Networking With Mobile Code And First Order AND-Continuations
Appeared in Theory and Practice of Logic Programming, vol. 1, no. 3, 2001
Theory and Practice of Logic Programming, vol. 1, no. 3, 2001
null
null
cs.PL
null
We describe a scheme for moving living code between a set of distributed processes coordinated with unification based Linda operations, and its application to building a comprehensive Logic programming based Internet programming framework. Mobile threads are implemented by capturing first order continuations in a compact data structure sent over the network. Code is fetched lazily from its original base turned into a server as the continuation executes at the remote site. Our code migration techniques, in combination with a dynamic recompilation scheme, ensure that heavily used code moves up smoothly on a speed hierarchy while volatile dynamic code is kept in a quickly updatable form. Among the examples, we describe how to build programmable client and server components (Web servers, in particular) and mobile agents.
[ { "version": "v1", "created": "Mon, 24 May 2004 12:41:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Tarau", "Paul", "" ], [ "Dahl", "Veronica", "" ] ]
cs/0405089
Andy King
Axel Simon and Andy King
Convex Hull of Planar H-Polyhedra
null
International Journal of Computer Mathematics, 81(4):259-271, 2004
null
null
cs.CG
null
Suppose $<A_i, \vec{c}_i>$ are planar (convex) H-polyhedra, that is, $A_i \in \mathbb{R}^{n_i \times 2}$ and $\vec{c}_i \in \mathbb{R}^{n_i}$. Let $P_i = \{\vec{x} \in \mathbb{R}^2 \mid A_i\vec{x} \leq \vec{c}_i \}$ and $n = n_1 + n_2$. We present an $O(n \log n)$ algorithm for calculating an H-polyhedron $<A, \vec{c}>$ with the smallest $P = \{\vec{x} \in \mathbb{R}^2 \mid A\vec{x} \leq \vec{c} \}$ such that $P_1 \cup P_2 \subseteq P$.
[ { "version": "v1", "created": "Mon, 24 May 2004 13:19:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Simon", "Axel", "" ], [ "King", "Andy", "" ] ]
cs/0405091
Jiang Qiu
Yves Caseau, Francois-Xavier Josset, Francois Laburthe
CLAIRE: Combining Sets, Search And Rules To Better Express Algorithms
Appeared in Theory and Practice of Logic Programming, vol. 2, no. 6, 2002
Theory and Practice of Logic Programming, vol. 2, no. 6, 2002
null
null
cs.PL
null
This paper presents a programming language which includes paradigms that are usually associated with declarative languages, such as sets, rules and search, into an imperative (functional) language. Although these paradigms are separately well known and are available under various programming environments, the originality of the CLAIRE language comes from the tight integration, which yields interesting run-time performances, and from the richness of this combination, which yields new ways in which to express complex algorithmic patterns with few elegant lines. To achieve the opposite goals of a high abstraction level (conciseness and readability) and run-time performance (CLAIRE is used as a C++ preprocessor), we have developed two kinds of compiler: first, a pattern pre-processor handles iterations over both concrete and abstract sets (data types and program fragments), in a completely user-extensible manner; secondly, an inference compiler transforms a set of logical rules into a set of functions (demons that are used through procedural attachment).
[ { "version": "v1", "created": "Mon, 24 May 2004 17:31:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Caseau", "Yves", "" ], [ "Josset", "Francois-Xavier", "" ], [ "Laburthe", "Francois", "" ] ]
cs/0405092
Jiang Qiu
Yves Caseau, Glenn Silverstein, Francois Laburthe
Learning Hybrid Algorithms for Vehicle Routing Problems
Appeared in Theory and Practice of Logic Programming, vol. 1, no. 6, 2001
Theory and Practice of Logic Programming, vol. 1, no. 6, 2001
null
null
cs.PL
null
This paper presents a generic technique for improving hybrid algorithms through the discovery of and tuning of meta-heuristics. The idea is to represent a family of push/pull heuristics that are based upon inserting and removing tasks in a current solution, with an algebra. We then let a learning algorithm search for the best possible algebraic term, which represents a hybrid algorithm for a given set of problems and an optimization criterion. In a previous paper, we described this algebra in detail and provided a set of preliminary results demonstrating the utility of this approach, using vehicle routing with time windows (VRPTW) as a domain example. In this paper we expand upon our results providing a more robust experimental framework and learning algorithms, and report on some new results using the standard Solomon benchmarks. In particular, we show that our learning algorithm is able to achieve results similar to the best-published algorithms using only a fraction of the CPU time. We also show that the automatic tuning of the best hybrid combination of such techniques yields a better solution than hand tuning, with considerably less effort.
[ { "version": "v1", "created": "Mon, 24 May 2004 17:41:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Caseau", "Yves", "" ], [ "Silverstein", "Glenn", "" ], [ "Laburthe", "Francois", "" ] ]
cs/0405093
Vytautas Perlibakas
Vytautas Perlibakas
Computerized Face Detection and Recognition
PhD dissertation summary. 35 pages, 12 figures, 7 tables
null
null
null
cs.CV
null
This publication presents methods for face detection, analysis and recognition: fast normalized cross-correlation (fast correlation coefficient) between multiple templates based face pre-detection method, method for detection of exact face contour based on snakes and Generalized Gradient Vector Flow field, method for combining recognition algorithms based on Cumulative Match Characteristics in order to increase recognition speed and accuracy, and face recognition method based on Principal Component Analysis of the Wavelet Packet Decomposition allowing to use PCA - based recognition method with large number of training images. For all the methods are presented experimental results and comparisons of speed and accuracy with large face databases.
[ { "version": "v1", "created": "Tue, 25 May 2004 11:36:34 GMT" }, { "version": "v2", "created": "Wed, 20 Oct 2004 10:07:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Perlibakas", "Vytautas", "" ] ]
cs/0405094
Taneli Mielik\"ainen
Taneli Mielik\"ainen and Esko Ukkonen
The Complexity of Maximum Matroid-Greedoid Intersection and Weighted Greedoid Maximization
null
null
null
Report C-2004-2, Department of Computer Science, University of Helsinki
cs.DS
null
The maximum intersection problem for a matroid and a greedoid, given by polynomial-time oracles, is shown $NP$-hard by expressing the satisfiability of boolean formulas in 3-conjunctive normal form as such an intersection. The corresponding approximation problems are shown $NP$-hard for certain approximation performance bounds. Moreover, some natural parameterized variants of the problem are shown $W[P]$-hard. The results are in contrast with the maximum matroid-matroid intersection which is solvable in polynomial time by an old result of Edmonds. We also prove that it is $NP$-hard to approximate the weighted greedoid maximization within $2^{n^{O(1)}}$ where $n$ is the size of the domain of the greedoid. A preliminary version ``The Complexity of Maximum Matroid-Greedoid Intersection'' appeared in Proc. FCT 2001, LNCS 2138, pp. 535--539, Springer-Verlag 2001.
[ { "version": "v1", "created": "Tue, 25 May 2004 12:09:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Mielikäinen", "Taneli", "" ], [ "Ukkonen", "Esko", "" ] ]
cs/0405095
Lili Ma Dr.
Lili Ma and YangQuan Chen and Kevin L. Moore
Blind Detection and Compensation of Camera Lens Geometric Distortions
6 pages, 4 figures, 2 tables
SIAM Imaging Science, 2004
null
null
cs.CV
null
This paper presents a blind detection and compensation technique for camera lens geometric distortions. The lens distortion introduces higher-order correlations in the frequency domain and in turn it can be detected using higher-order spectral analysis tools without assuming any specific calibration target. The existing blind lens distortion removal method only considered a single-coefficient radial distortion model. In this paper, two coefficients are considered to model approximately the geometric distortion. All the models considered have analytical closed-form inverse formulae.
[ { "version": "v1", "created": "Tue, 25 May 2004 22:40:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Lili", "" ], [ "Chen", "YangQuan", "" ], [ "Moore", "Kevin L.", "" ] ]
cs/0405096
Yuriy Chashkov A.
Yuriy A. Chashkov
Developing Intellectual Network Management Facilities by Means of Pattern Recognition Theory
7 pages, 3 figures
null
null
MIEM-02-06
cs.NI
null
In this paper considered question of using pattern recognition methods in network equipment state identification.
[ { "version": "v1", "created": "Wed, 26 May 2004 11:46:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Chashkov", "Yuriy A.", "" ] ]