id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0405097 | Riccardo Pucella | Hubie Chen, Riccardo Pucella | A Coalgebraic Approach to Kleene Algebra with Tests | 21 pages, 1 figure; preliminary version appeared in Proc. Workshop on
Coalgebraic Methods in Computer Science (CMCS'03) | Theoretical Computer Science, 327 (1-2), 23-44 (2004) | null | null | cs.LO cs.PL | null | Kleene algebra with tests is an extension of Kleene algebra, the algebra of
regular expressions, which can be used to reason about programs. We develop a
coalgebraic theory of Kleene algebra with tests, along the lines of the
coalgebraic theory of regular expressions based on deterministic automata.
Since the known automata-theoretic presentation of Kleene algebra with tests
does not lend itself to a coalgebraic theory, we define a new interpretation of
Kleene algebra with tests expressions and a corresponding automata-theoretic
presentation. One outcome of the theory is a coinductive proof principle, that
can be used to establish equivalence of our Kleene algebra with tests
expressions.
| [
{
"version": "v1",
"created": "Wed, 26 May 2004 16:49:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Hubie",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
cs/0405098 | Riccardo Pucella | Joseph Y. Halpern, Riccardo Pucella | A Logic for Reasoning about Evidence | 34 pages. A preliminary version appeared in Proc. 19th Conference on
Uncertainty in Artificial Intelligence (UAI'03) | Journal of Artificial Intelligence Research 26, pp. 1-34, 2006 | null | null | cs.AI cs.LO | null | We introduce a logic for reasoning about evidence that essentially views
evidence as a function from prior beliefs (before making an observation) to
posterior beliefs (after making the observation). We provide a sound and
complete axiomatization for the logic, and consider the complexity of the
decision problem. Although the reasoning in the logic is mainly propositional,
we allow variables representing numbers and quantification over them. This
expressive power seems necessary to capture important properties of evidence.
| [
{
"version": "v1",
"created": "Wed, 26 May 2004 17:08:38 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Jul 2005 16:19:35 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Aug 2006 17:42:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
cs/0405099 | Liang Wang | Wang Liang, Guo YiPing, Fang Ming | Web search engine based on DNS | 9 pages,2 figures | null | null | null | cs.NI cs.IR | null | Now no web search engine can cover more than 60 percent of all the pages on
Internet. The update interval of most pages database is almost one month. This
condition hasn't changed for many years. Converge and recency problems have
become the bottleneck problem of current web search engine. To solve these
problems, a new system, search engine based on DNS is proposed in this paper.
This system adopts the hierarchical distributed architecture like DNS, which is
different from any current commercial search engine. In theory, this system can
cover all the web pages on Internet. Its update interval could even be one day.
The original idea, detailed content and implementation of this system all are
introduced in this paper.
| [
{
"version": "v1",
"created": "Thu, 27 May 2004 02:36:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liang",
"Wang",
""
],
[
"YiPing",
"Guo",
""
],
[
"Ming",
"Fang",
""
]
] |
cs/0405101 | Jiang Qiu | Samir Genaim, Michael Codish, Jacob M. Howe | Worst-Case Groundness Analysis Using Definite Boolean Functions | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 5,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 5, 2001 | null | null | cs.PL | null | This note illustrates theoretical worst-case scenarios for groundness
analyses obtained through abstract interpretation over the abstract domains of
definite (Def) and positive (Pos) Boolean functions. For Def, an example is
given for which any Def-based abstract interpretation for groundness analysis
follows a chain which is exponential in the number of argument positions as
well as in the number of clauses but sub-exponential in the size of the
program. For Pos, we strengthen a previous result by illustrating an example
for which any Pos-based abstract interpretation for groundness analysis follows
a chain which is exponential in the size of the program. It remains an open
problem to determine if the worst case for Def is really as bad as that for
Pos.
| [
{
"version": "v1",
"created": "Thu, 27 May 2004 02:56:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Genaim",
"Samir",
""
],
[
"Codish",
"Michael",
""
],
[
"Howe",
"Jacob M.",
""
]
] |
cs/0405102 | Jiang Qiu | Francisco Javier Lopez-Fraguas, Jaime Sanchez-Hernandez | A Proof Theoretic Approach to Failure in Functional Logic Programming | Appeared in Theory and Practice of Logic Programming, vol. 4, no.
1&2, 2004 | Theory and Practice of Logic Programming, vol. 4, no. 1&2, 2004 | null | null | cs.PL | null | How to extract negative information from programs is an important issue in
logic programming. Here we address the problem for functional logic programs,
from a proof-theoretic perspective. The starting point of our work is CRWL
(Constructor based ReWriting Logic), a well established theoretical framework
for functional logic programming, whose fundamental notion is that of
non-strict non-deterministic function. We present a proof calculus, CRWLF,
which is able to deduce negative information from CRWL-programs. In particular,
CRWLF is able to prove finite failure of reduction within CRWL.
| [
{
"version": "v1",
"created": "Thu, 27 May 2004 03:08:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lopez-Fraguas",
"Francisco Javier",
""
],
[
"Sanchez-Hernandez",
"Jaime",
""
]
] |
cs/0405103 | Jiang Qiu | R.S. Lazic, T.C. Newcomb, A.W. Roscoe | On model checking data-independent systems with arrays without reset | Appeared in Theory and Practice of Logic Programming, vol. 4, no.
5&6, 2004 | Theory and Practice of Logic Programming, vol. 4, no. 5&6, 2004 | null | null | cs.LO | null | A system is data-independent with respect to a data type X iff the operations
it can perform on values of type X are restricted to just equality testing. The
system may also store, input and output values of type X. We study model
checking of systems which are data-independent with respect to two distinct
type variables X and Y, and may in addition use arrays with indices from X and
values from Y . Our main interest is the following parameterised model-checking
problem: whether a given program satisfies a given temporal-logic formula for
all non-empty nite instances of X and Y . Initially, we consider instead the
abstraction where X and Y are infinite and where partial functions with finite
domains are used to model arrays. Using a translation to data-independent
systems without arrays, we show that the u-calculus model-checking problem is
decidable for these systems. From this result, we can deduce properties of all
systems with finite instances of X and Y . We show that there is a procedure
for the above parameterised model-checking problem of the universal fragment of
the u-calculus, such that it always terminates but may give false negatives. We
also deduce that the parameterised model-checking problem of the universal
disjunction-free fragment of the u-calculus is decidable. Practical motivations
for model checking data-independent systems with arrays include verification of
memory and cache systems, where X is the type of memory addresses, and Y the
type of storable values. As an example we verify a fault-tolerant memory
interface over a set of unreliable memories.
| [
{
"version": "v1",
"created": "Thu, 27 May 2004 03:25:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lazic",
"R. S.",
""
],
[
"Newcomb",
"T. C.",
""
],
[
"Roscoe",
"A. W.",
""
]
] |
cs/0405105 | Muhammad Nadeem Prof | Muhammad Nadeem, Javaid R. Laghari (Szabist, Karachi) | Study of Pakistan Election System as Intelligent e-Election | 6 pages | null | null | null | cs.CY | null | The proposed election system lies in ensuring that it is transparent and
impartial.Thus while the electoral system may vary from country to country, It
has to take into account the peculiarities of every society while at the same
time incorporating remedies to problems prevailing in the system.
The Electoral process expressed serious concerns regarding the independence
of the Election Commission of Pakistan, the restrictions on political parties
and their candidates, the misuse of state resources, some unbalanced coverage
in the state media, deficiencies in the compilation of the voting register and
significant problems relating to the provision of ID cards.
The holding of a general election does not in itself guarantee the
restoration of democracy. The unjustified interference with electoral
arrangements, as detailed above, irrespective of the alleged motivation,
resulted in serious flaws being inflicted on the electoral process.
Additionally, questions remain as to whether or not there will be a full
transfer of power from a military to civilian administration.
The Independent study research has following modules:
Login/Subscription Module Candidate Subscription Module Vote casting Module
Administration Module Intelligent decision data analysis Module
| [
{
"version": "v1",
"created": "Thu, 27 May 2004 13:46:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nadeem",
"Muhammad",
"",
"Szabist, Karachi"
],
[
"Laghari",
"Javaid R.",
"",
"Szabist, Karachi"
]
] |
cs/0405107 | Carlos Ches\~nevar | Carlos Iv\'an Ches\~nevar and Guillermo Ricardo Simari | A Framework for Combining Defeasible Argumentation with Labeled
Deduction | 15 pages, presented at CMSRA Workshop 2003. Buenos Aires, Argentina | In "Computer Modeling of Scientific Reasoning" (C.Delrieux,
J.Legris, Eds.). Pp. 43-56, Ed. Ediuns, Argentina, 2003. ISBN 987-89281-89-6 | null | null | cs.AI cs.SC | null | In the last years, there has been an increasing demand of a variety of
logical systems, prompted mostly by applications of logic in AI and other
related areas. Labeled Deductive Systems (LDS) were developed as a flexible
methodology to formalize such a kind of complex logical systems. Defeasible
argumentation has proven to be a successful approach to formalizing commonsense
reasoning, encompassing many other alternative formalisms for defeasible
reasoning. Argument-based frameworks share some common notions (such as the
concept of argument, defeater, etc.) along with a number of particular features
which make it difficult to compare them with each other from a logical
viewpoint. This paper introduces LDSar, a LDS for defeasible argumentation in
which many important issues concerning defeasible argumentation are captured
within a unified logical framework. We also discuss some logical properties and
extensions that emerge from the proposed framework.
| [
{
"version": "v1",
"created": "Thu, 27 May 2004 18:54:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chesñevar",
"Carlos Iván",
""
],
[
"Simari",
"Guillermo Ricardo",
""
]
] |
cs/0405108 | Paul M. Aoki | Paul M. Aoki and Allison Woodruff | "User Interfaces" and the Social Negotiation of Availability | 3 pages | Workshop on Forecasting Presence and Availability, ACM SIGCHI
Conf. on Human Factors in Computing Systems (CHI 2004), Vienna, Austria, Apr.
2004. | null | null | cs.HC | null | In current presence or availability systems, the method of presenting a
user's state often supposes an instantaneous notion of that state - for
example, a visualization is rendered or an inference is made about the
potential actions that might be consistent with a user's state. Drawing on
observational research on the use of existing communication technology, we
argue (as have others in the past) that determination of availability is often
a joint process, and often one that takes the form of a negotiation (whether
implicit or explicit). We briefly describe our current research on applying
machine learning to infer degrees of conversational engagement from observed
conversational behavior. Such inferences can be applied to facilitate the
implicit negotiation of conversational engagement - in effect, helping users to
weave together the act of contact with the act of determining availability.
| [
{
"version": "v1",
"created": "Fri, 28 May 2004 02:53:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aoki",
"Paul M.",
""
],
[
"Woodruff",
"Allison",
""
]
] |
cs/0405109 | Paul M. Aoki | Allison Woodruff and Paul M. Aoki | Conversation Analysis and the User Experience | 4 pages | Workshop on Exploring Experience Methods Across Disciplines, ACM
SIGCHI Conf. on Human Factors in Computing Systems (CHI 2004), Vienna,
Austria, Apr. 2004. | null | null | cs.HC | null | We provide two case studies in the application of ideas drawn from
conversation analysis to the design of technologies that enhance the experience
of human conversation. We first present a case study of the design of an
electronic guidebook, focusing on how conversation analytic principles played a
role in the design process. We then discuss how the guidebook project has
inspired our continuing work in social, mobile audio spaces. In particular, we
describe some as yet unrealized concepts for adaptive audio spaces.
| [
{
"version": "v1",
"created": "Fri, 28 May 2004 02:59:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Woodruff",
"Allison",
""
],
[
"Aoki",
"Paul M.",
""
]
] |
cs/0405110 | Gopal Ananthraman | Gopal Ananthraman | An analysis of a bounded resource search puzzle | 4 Pages | null | null | null | cs.DS cs.DM | null | Consider the commonly known puzzle, given $k$ glass balls, find an optimal
algorithm to determine the lowest floor of a building of $n$ floors from which
a thrown glass ball will break. This puzzle was originally posed in its
original form in \cite{focs1980}and was later cited in the book \cite{algthc}.
There are several internet sites that presents this puzzle and its solution to
the special case of $k=2$ balls. This is the first such analysis of the puzzle
in its general form. Several variations of this puzzle have been studied with
applications in Network Loading \cite{cgstctl} which analyzes a case similar to
a scenario where an adversary is changing the lowest floor with time. Although
the algorithm specified in \cite{algthc} solves the problem, it is not an
efficient algorithm. In this paper another algorithm for the same problem is
analyzed. It is shown that if $m$ is the minimum number of attempts required
then for $k \geq m$ we have $m = \log (n+1)$ and for $k < m$ we have, $1 +
\sum_{i=1}^{k}{{m-1}\choose{i}} < n \leq \sum_{i=1}^{k}{{m}\choose{i}}$
| [
{
"version": "v1",
"created": "Fri, 28 May 2004 21:26:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ananthraman",
"Gopal",
""
]
] |
cs/0405111 | T. J. Giuli | T.J. Giuli, Petros Maniatis, Mary Baker, David S. H. Rosenthal, Mema
Roussopoulos | Attrition Defenses for a Peer-to-Peer Digital Preservation System | 14 pages, 8 figures. version 2: Reworked the paper according to
reviews. Expanded the evaluation section with experiments with more AUs | null | null | null | cs.CR | null | In peer-to-peer systems, attrition attacks include both traditional,
network-level denial of service attacks as well as application-level attacks in
which malign peers conspire to waste loyal peers' resources. We describe
several defenses for LOCKSS, a peer-to-peer digital preservation system, that
help ensure that application-level attacks even from powerful adversaries are
less effective than simple network-level attacks, and that network-level
attacks must be intense, wide-spread, and prolonged to impair the system.
| [
{
"version": "v1",
"created": "Fri, 28 May 2004 22:47:09 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Nov 2004 18:30:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giuli",
"T. J.",
""
],
[
"Maniatis",
"Petros",
""
],
[
"Baker",
"Mary",
""
],
[
"Rosenthal",
"David S. H.",
""
],
[
"Roussopoulos",
"Mema",
""
]
] |
cs/0405113 | Andrea Severe | Andrea Severe | A proposal to design expert system for the calculations in the domain of
QFT | null | null | null | null | cs.AI | null | Main purposes of the paper are followings: 1) To show examples of the
calculations in domain of QFT via ``derivative rules'' of an expert system; 2)
To consider advantages and disadvantage that technology of the calculations; 3)
To reflect about how one would develop new physical theories, what knowledge
would be useful in their investigations and how this problem can be connected
with designing an expert system.
| [
{
"version": "v1",
"created": "Mon, 31 May 2004 10:50:23 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Jun 2004 11:59:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Severe",
"Andrea",
""
]
] |
cs/0406002 | Thomas Fischbacher | Thomas Fischbacher | A novel approach to symbolic algebra | 15 pages | null | null | AEI-2004-043 | cs.SC | null | A prototype for an extensible interactive graphical term manipulation system
is presented that combines pattern matching and nondeterministic evaluation to
provide a convenient framework for doing tedious algebraic manipulations that
so far had to be done manually in a semi-automatic fashion.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 2004 12:13:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fischbacher",
"Thomas",
""
]
] |
cs/0406004 | Muhammad Nadeem Prof | Muhammad Nadeem and Syed Ata Hussain Jaffri (Szabist) | Application of Business Intelligence In Banks (Pakistan) | 6 Pages | null | null | null | cs.DB | null | The financial services industry is rapidly changing. Factors such as
globalization, deregulation, mergers and acquisitions, competition from
non-financial institutions, and technological innovation, have forced companies
to re-think their business.Many large companies have been using Business
Intelligence (BI) computer software for some years to help them gain
competitive advantage. With the introduction of cheaper and more generalized
products to the market place BI is now in the reach of smaller and medium sized
companies. Business Intelligence is also known as knowledge management,
management information systems (MIS), Executive information systems (EIS) and
On-line analytical Processing (OLAP).
| [
{
"version": "v1",
"created": "Wed, 2 Jun 2004 12:55:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nadeem",
"Muhammad",
"",
"Szabist"
],
[
"Jaffri",
"Syed Ata Hussain",
"",
"Szabist"
]
] |
cs/0406005 | George Candea | George Candea, Shinichi Kawamoto, Yuichi Fujiki, Greg Friedman,
Armando Fox | Microreboot -- A Technique for Cheap Recovery | 14 pages | Proc. 6th Symposium on Operating Systems Design and Implementation
(OSDI), San Francisco, CA, Dec 2004 | null | null | cs.OS cs.DC | null | A significant fraction of software failures in large-scale Internet systems
are cured by rebooting, even when the exact failure causes are unknown.
However, rebooting can be expensive, causing nontrivial service disruption or
downtime even when clusters and failover are employed. In this work we separate
process recovery from data recovery to enable microrebooting -- a fine-grain
technique for surgically recovering faulty application components, without
disturbing the rest of the application.
We evaluate microrebooting in an Internet auction system running on an
application server. Microreboots recover most of the same failures as full
reboots, but do so an order of magnitude faster and result in an order of
magnitude savings in lost work. This cheap form of recovery engenders a new
approach to high availability: microreboots can be employed at the slightest
hint of failure, prior to node failover in multi-node clusters, even when
mistakes in failure detection are likely; failure and recovery can be masked
from end users through transparent call-level retries; and systems can be
rejuvenated by parts, without ever being shut down.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 2004 21:54:50 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jun 2004 20:02:07 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Oct 2004 05:43:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Candea",
"George",
""
],
[
"Kawamoto",
"Shinichi",
""
],
[
"Fujiki",
"Yuichi",
""
],
[
"Friedman",
"Greg",
""
],
[
"Fox",
"Armando",
""
]
] |
cs/0406006 | Edith Hemaspaandra | Edith Hemaspaandra | Dichotomy Theorems for Alternation-Bounded Quantified Boolean Formulas | null | null | null | null | cs.CC cs.LO | null | In 1978, Schaefer proved his famous dichotomy theorem for generalized
satisfiability problems. He defined an infinite number of propositional
satisfiability problems, showed that all these problems are either in P or
NP-complete, and gave a simple criterion to determine which of the two cases
holds. This result is surprising in light of Ladner's theorem, which implies
that there are an infinite number of complexity classes between P and
NP-complete (under the assumption that P is not equal to NP).
Schaefer also stated a dichotomy theorem for quantified generalized Boolean
formulas, but this theorem was only recently proven by Creignou, Khanna, and
Sudan, and independently by Dalmau: Determining truth of quantified Boolean
formulas is either PSPACE-complete or in P.
This paper looks at alternation-bounded quantified generalized Boolean
formulas. In their unrestricted forms, these problems are the canonical
problems complete for the levels of the polynomial hierarchy. In this paper, we
prove dichotomy theorems for alternation-bounded quantified generalized Boolean
formulas, by showing that these problems are either $\Sigma_i^p$-complete or in
P, and we give a simple criterion to determine which of the two cases holds.
This is the first result that obtains dichotomy for an infinite number of
classes at once.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 2004 23:17:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
]
] |
cs/0406007 | Jiri Ocenasek | Jiri Ocenasek, Martin Pelikan | Parallel Mixed Bayesian Optimization Algorithm: A Scaleup Analysis | Optimization by Building and Using Probabilistic Models OBUPM-2004 | null | null | null | cs.NE cs.DC | null | Estimation of Distribution Algorithms have been proposed as a new paradigm
for evolutionary optimization. This paper focuses on the parallelization of
Estimation of Distribution Algorithms. More specifically, the paper discusses
how to predict performance of parallel Mixed Bayesian Optimization Algorithm
(MBOA) that is based on parallel construction of Bayesian networks with
decision trees. We determine the time complexity of parallel Mixed Bayesian
Optimization Algorithm and compare this complexity with experimental results
obtained by solving the spin glass optimization problem. The empirical results
fit well the theoretical time complexity, so the scalability and efficiency of
parallel Mixed Bayesian Optimization Algorithm for unknown instances of spin
glass benchmarks can be predicted. Furthermore, we derive the guidelines that
can be used to design effective parallel Estimation of Distribution Algorithms
with the speedup proportional to the number of variables in the problem.
| [
{
"version": "v1",
"created": "Thu, 3 Jun 2004 15:43:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ocenasek",
"Jiri",
""
],
[
"Pelikan",
"Martin",
""
]
] |
cs/0406008 | Vyacheslav Zavadsky | Vyacheslav Zavadsky | Image compression by rectangular wavelet transform | null | null | null | null | cs.CV | null | We study image compression by a separable wavelet basis
$\big\{\psi(2^{k_1}x-i)\psi(2^{k_2}y-j),$ $\phi(x-i)\psi(2^{k_2}y-j),$
$\psi(2^{k_1}(x-i)\phi(y-j),$ $\phi(x-i)\phi(y-i)\big\},$ where $k_1, k_2 \in
\mathbb{Z}_+$; $i,j\in\mathbb{Z}$; and $\phi,\psi$ are elements of a standard
biorthogonal wavelet basis in $L_2(\mathbb{R})$. Because $k_1\ne k_2$, the
supports of the basis elements are rectangles, and the corresponding transform
is known as the {\em rectangular wavelet transform}. We prove that if
one-dimensional wavelet basis has $M$ dual vanishing moments then the rate of
approximation by $N$ coefficients of rectangular wavelet transform is
$\mathcal{O}(N^{-M}\log^C N)$ for functions with mixed derivative of order $M$
in each direction.
The square wavelet transform yields the approximation rate is
$\mathcal{O}(N^{-M/2})$ for functions with all derivatives of the total order
$M$. Thus, the rectangular wavelet transform can outperform the square one if
an image has a mixed derivative. We provide experimental comparison of image
compression which shows that rectangular wavelet transform outperform the
square one.
| [
{
"version": "v1",
"created": "Fri, 4 Jun 2004 12:28:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zavadsky",
"Vyacheslav",
""
]
] |
cs/0406009 | Jean-Philippe Rennard | J.-P. Rennard | Implementation of Logical Functions in the Game of Life | 17 pages, 28 figures | Rennard, J.-P. (2002). Implementation of Logical Functions in the
Game of Life. In A. Adamatzky (Ed.), Collision-Based Computing (pp. 491-512).
London: Springer | null | null | cs.CC | null | The Game of Life cellular automaton is a classical example of a massively
parallel collision-based computing device. The automaton exhibits mobile
patterns, gliders, and generators of the mobile patterns, glider guns, in its
evolution. We show how to construct the basic logical operations, AND, OR, NOT
in space-time configurations of the cellular automaton. Also decomposition of
complicated Boolean functions is discussed. Advantages of our technique are
demonstrated on an example of binary adder, realized via collision of glider
streams.
| [
{
"version": "v1",
"created": "Fri, 4 Jun 2004 14:53:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rennard",
"J. -P.",
""
]
] |
cs/0406010 | Yidong Sun | Yidong Sun | Another Proof of an Extension of a Curious Identity | 3 pages | null | null | null | cs.DM | null | Based on Jensen formulae and the second kind of Chebyshev polynomials,
another proof is presented for an extension of a curious binomial identity due
to Z. W. Sun and K. J. Wu.
| [
{
"version": "v1",
"created": "Sun, 6 Jun 2004 09:34:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sun",
"Yidong",
""
]
] |
cs/0406012 | Jiang Qiu | Seng Wai Loke, Andrew Davison | Secure Prolog-Based Mobile Code | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 3,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 3, 2001 | null | null | cs.PL | null | LogicWeb mobile code consists of Prolog-like rules embedded in Web pages,
thereby adding logic programming behaviour to those pages. Since LogicWeb
programs are downloaded from foreign hosts and executed locally, there is a
need to protect the client from buggy or malicious code. A security model is
crucial for making LogicWeb mobile code safe to execute. This paper presents
such a model, which supports programs of varying trust levels by using
different resource access policies. The implementation of the model derives
from an extended operational semantics for the LogicWeb language, which
provides a precise meaning of safety.
| [
{
"version": "v1",
"created": "Mon, 7 Jun 2004 07:01:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Loke",
"Seng Wai",
""
],
[
"Davison",
"Andrew",
""
]
] |
cs/0406013 | Ester Zumpano | G. Greco, S. Greco, I. Trubtsyna, E. Zumpano | Optimization of Bound Disjunctive Queries with Constraints | 35 pages | null | null | null | cs.LO | null | "To Appear in Theory and Practice of Logic Programming (TPLP)" This paper
presents a technique for the optimization of bound queries over disjunctive
deductive databases with constraints. The proposed approach is an extension of
the well-known Magic-Set technique and is well-suited for being integrated in
current bottom-up (stable) model inference engines. More specifically, it is
based on the exploitation of binding propagation techniques which reduce the
size of the data relevant to answer the query and, consequently, reduces both
the complexity of computing a single model and the number of models to be
considered. The motivation of this work stems from the observation that
traditional binding propagation optimization techniques for bottom-up model
generator systems, simulating the goal driven evaluation of top-down engines,
are only suitable for positive (disjunctive) queries, while hard problems are
expressed using unstratified negation. The main contribution of the paper
consists in the extension of a previous technique, defined for positive
disjunctive queries, to queries containing both disjunctive heads and
constraints (a simple and expressive form of unstratified negation). As the
usual way of expressing declaratively hard problems is based on the
guess-and-check technique, where the guess part is expressed by means of
disjunctive rules and the check part is expressed by means of constraints, the
technique proposed here is highly relevant for the optimization of queries
expressing hard problems. The value of the technique has been proved by several
experiments.
| [
{
"version": "v1",
"created": "Mon, 7 Jun 2004 12:13:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Greco",
"G.",
""
],
[
"Greco",
"S.",
""
],
[
"Trubtsyna",
"I.",
""
],
[
"Zumpano",
"E.",
""
]
] |
cs/0406014 | Jiang Qiu | Richard A. O'Keefe | O(1) Reversible Tree Navigation Without Cycles | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 5,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 5, 2001 | null | null | cs.PL | null | Imperative programmers often use cyclically linked trees in order to achieve
O(1) navigation time to neighbours. Some logic programmers believe that cyclic
terms are necessary to achieve the same in logic-based languages. An old but
little-known technique provides O(1) time and space navigation without cyclic
links, in the form of reversible predicates. A small modification provides O(1)
amortised time and space editing.
| [
{
"version": "v1",
"created": "Mon, 7 Jun 2004 14:04:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Keefe",
"Richard A.",
""
]
] |
cs/0406015 | Damian H. Zanette | Damian H. Zanette | Zipf's law and the creation of musical context | null | null | null | null | cs.CL cond-mat.stat-mech | null | This article discusses the extension of the notion of context from
linguistics to the domain of music. In language, the statistical regularity
known as Zipf's law -which concerns the frequency of usage of different words-
has been quantitatively related to the process of text generation. This
connection is established by Simon's model, on the basis of a few assumptions
regarding the accompanying creation of context. Here, it is shown that the
statistics of note usage in musical compositions are compatible with the
predictions of Simon's model. This result, which gives objective support to the
conceptual likeness of context in language and music, is obtained through
automatic analysis of the digital versions of several compositions. As a
by-product, a quantitative measure of context definiteness is introduced and
used to compare tonal and atonal works.
| [
{
"version": "v1",
"created": "Mon, 7 Jun 2004 17:52:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zanette",
"Damian H.",
""
]
] |
cs/0406016 | Christoph Koch | Christoph Koch, Stefanie Scherzinger, Nicole Schweikardt, Bernhard
Stegmaier | Schema-based Scheduling of Event Processors and Buffer Minimization for
Queries on Structured Data Streams | 14 pages, 4 figures, to appear in Proc. 30th VLDB 2004, Toronto,
Canada. Extended version | null | null | null | cs.DB | null | We introduce an extension of the XQuery language, FluX, that supports
event-based query processing and the conscious handling of main memory buffers.
Purely event-based queries of this language can be executed on streaming XML
data in a very direct way. We then develop an algorithm that allows to
efficiently rewrite XQueries into the event-based FluX language. This algorithm
uses order constraints from a DTD to schedule event handlers and to thus
minimize the amount of buffering required for evaluating a query. We discuss
the various technical aspects of query optimization and query evaluation within
our framework. This is complemented with an experimental evaluation of our
approach.
| [
{
"version": "v1",
"created": "Mon, 7 Jun 2004 20:45:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Koch",
"Christoph",
""
],
[
"Scherzinger",
"Stefanie",
""
],
[
"Schweikardt",
"Nicole",
""
],
[
"Stegmaier",
"Bernhard",
""
]
] |
cs/0406017 | Stephen Luttrell | Stephen Luttrell | Using Self-Organising Mappings to Learn the Structure of Data Manifolds | 26 pages, 19 figures, version 1 translated into LaTeX | null | null | null | cs.NE cs.CV | null | In this paper it is shown how to map a data manifold into a simpler form by
progressively discarding small degrees of freedom. This is the key to
self-organising data fusion, where the raw data is embedded in a very
high-dimensional space (e.g. the pixel values of one or more images), and the
requirement is to isolate the important degrees of freedom which lie on a
low-dimensional manifold. A useful advantage of the approach used in this paper
is that the computations are arranged as a feed-forward processing chain, where
all the details of the processing in each stage of the chain are learnt by
self-organisation. This approach is demonstrated using hierarchically
correlated data, which causes the processing chain to split the data into
separate processing channels, and then to progressively merge these channels
wherever they are correlated with each other. This is the key to
self-organising data fusion.
| [
{
"version": "v1",
"created": "Tue, 8 Jun 2004 14:45:45 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Aug 2004 15:06:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
] |
cs/0406018 | Alexei Eremin A. | A. A. Eremin | Effects of wireless computing technology | HTML, also available at http://verystrangeplace.com/ | null | null | null | cs.OH | null | Wireless technology can provide many benefits to computing including faster
response to queries, reduced time spent on paperwork, increased online time for
users, just-in-time and real time control, tighter communications between
clients and hosts. Wireless Computing is governed by two general forces:
Technology, which provides a set of basic building blocks and User
Applications, which determine a set of operations that must be carried out
efficiently on demand. This paper summarizes technological changes that are
underway and describes their impact on wireless computing development and
implementation. It also describes the applications that influence the
development and implementation of wireless computing and shows what current
systems offer.
| [
{
"version": "v1",
"created": "Fri, 11 Jun 2004 11:33:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eremin",
"A. A.",
""
]
] |
cs/0406019 | Nicolas Christin | Victor Firoiu, Xiaohui Zhang, Emre Gunduzhan, Nicolas Christin | Providing Service Guarantees in High-Speed Switching Systems with
Feedback Output Queuing | 30 pages, 9 figures. Shorter preliminary version appeared in
Proceedings of Hot Interconnects X, Stanford CA, August 2002 | null | null | null | cs.NI | null | We consider the problem of providing service guarantees in a high-speed
packet switch. As basic requirements, the switch should be scalable to high
speeds per port, a large number of ports and a large number of traffic flows
with independent guarantees. Existing scalable solutions are based on Virtual
Output Queuing, which is computationally complex when required to provide
service guarantees for a large number of flows.
We present a novel architecture for packet switching that provides support
for such service guarantees. A cost-effective fabric with small external
speedup is combined with a feedback mechanism that enables the fabric to be
virtually lossless, thus avoiding packet drops indiscriminate of flows. Through
analysis and simulation, we show that this architecture provides accurate
support for service guarantees, has low computational complexity and is
scalable to very high port speeds.
| [
{
"version": "v1",
"created": "Sat, 12 Jun 2004 03:27:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Firoiu",
"Victor",
""
],
[
"Zhang",
"Xiaohui",
""
],
[
"Gunduzhan",
"Emre",
""
],
[
"Christin",
"Nicolas",
""
]
] |
cs/0406020 | David Eppstein | David Eppstein | Algorithms for Drawing Media | 13 pages, 11 figures | null | null | null | cs.DS cs.CG | null | We describe algorithms for drawing media, systems of states, tokens and
actions that have state transition graphs in the form of partial cubes. Our
algorithms are based on two principles: embedding the state transition graph in
a low-dimensional integer lattice and projecting the lattice onto the plane, or
drawing the medium as a planar graph with centrally symmetric faces.
| [
{
"version": "v1",
"created": "Wed, 16 Jun 2004 00:49:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
] |
cs/0406021 | Alexandre d'Aspremont | Alexandre d'Aspremont, Laurent El Ghaoui, Michael I. Jordan, Gert R.
G. Lanckriet | A direct formulation for sparse PCA using semidefinite programming | Final version, to appear in SIAM review | null | null | Working paper: UCB//CSD-04-1330 | cs.CE | null | We examine the problem of approximating, in the Frobenius-norm sense, a
positive, semidefinite symmetric matrix by a rank-one matrix, with an upper
bound on the cardinality of its eigenvector. The problem arises in the
decomposition of a covariance matrix into sparse factors, and has wide
applications ranging from biology to finance. We use a modification of the
classical variational representation of the largest eigenvalue of a symmetric
matrix, where cardinality is constrained, and derive a semidefinite programming
based relaxation for our problem. We also discuss Nesterov's smooth
minimization technique applied to the SDP arising in the direct sparse PCA
method.
| [
{
"version": "v1",
"created": "Wed, 16 Jun 2004 01:23:03 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Oct 2004 15:14:14 GMT"
},
{
"version": "v3",
"created": "Sat, 20 May 2006 14:25:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
],
[
"Ghaoui",
"Laurent El",
""
],
[
"Jordan",
"Michael I.",
""
],
[
"Lanckriet",
"Gert R. G.",
""
]
] |
cs/0406022 | Chris Kimble | David King and Chris Kimble | Uncovering the epistemological and ontological assumptions of software
designers | 9 pages | Proceedings 9e colloque de l'AIM, Evry, France, May 2004 | null | null | cs.SE cs.GL | null | The ontological and epistemological positions adopted by information systems
design methods are incommensur-able when pushed to their extremes. Information
systems research has therefore tended to focus on the similarities between
different positions, usually in search of a single, unifying position. However,
by focusing on the similari-ties, the clarity of argument provided by any one
philoso-phical position is necessarily diminished. Consequently, researchers
often treat the philosophical foundations of design methods as being of only
minor importance. In this paper, we have deliberately chosen to focus on the
differences between various philosophical positions. From this focus, we
believe we can offer a clearer under-standing of the empirical behaviour of
software as viewed from particular philosophical positions. Since the
em-pirical evidence does not favour any single position, we conclude by arguing
for the validity of ad hoc approaches to software design which we believe
provides a stronger and more theoretically grounded approach to software
design.
| [
{
"version": "v1",
"created": "Wed, 16 Jun 2004 10:01:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"King",
"David",
""
],
[
"Kimble",
"Chris",
""
]
] |
cs/0406025 | Frederic Goualard | Frederic Goualard and Laurent Granvilliers | Directional Consistency for Continuous Numerical Constraints | 16 pages, 3 figures | null | null | null | cs.AI cs.MS | null | Bounds consistency is usually enforced on continuous constraints by first
decomposing them into binary and ternary primitives. This decomposition has
long been shown to drastically slow down the computation of solutions. To
tackle this, Benhamou et al. have introduced an algorithm that avoids formally
decomposing constraints. Its better efficiency compared to the former method
has already been experimentally demonstrated. It is shown here that their
algorithm implements a strategy to enforce on a continuous constraint a
consistency akin to Directional Bounds Consistency as introduced by Dechter and
Pearl for discrete problems. The algorithm is analyzed in this framework, and
compared with algorithms that enforce bounds consistency. These theoretical
results are eventually contrasted with new experimental results on standard
benchmarks from the interval constraint community.
| [
{
"version": "v1",
"created": "Wed, 16 Jun 2004 16:33:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goualard",
"Frederic",
""
],
[
"Granvilliers",
"Laurent",
""
]
] |
cs/0406026 | Serebrenik Alexander | Tom Schrijvers, Alexander Serebrenik | Improving Prolog Programs: Refactoring for Prolog | To appear in ICLP 2004 | null | null | null | cs.SE cs.PL | null | Refactoring is an established technique from the OO-community to restructure
code: it aims at improving software readability, maintainability and
extensibility. Although refactoring is not tied to the OO-paradigm in
particular, its ideas have not been applied to Logic Programming until now.
This paper applies the ideas of refactoring to Prolog programs. A catalogue
is presented listing refactorings classified according to scope. Some of the
refactorings have been adapted from the OO-paradigm, while others have been
specifically designed for Prolog. Also the discrepancy between intended and
operational semantics in Prolog is addressed by some of the refactorings.
In addition, ViPReSS, a semi-automatic refactoring browser, is discussed and
the experience with applying \vipress to a large Prolog legacy system is
reported. Our main conclusion is that refactoring is not only a viable
technique in Prolog but also a rather desirable one.
| [
{
"version": "v1",
"created": "Wed, 16 Jun 2004 16:55:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schrijvers",
"Tom",
""
],
[
"Serebrenik",
"Alexander",
""
]
] |
cs/0406027 | Dietrich Fahrenholtz | Dietrich Fahrenholtz and Volker Turau | Fluctuation in Peer-to-Peer Networks: Mitigating Its Effect on DHT
Performance | 5 pages | null | null | null | cs.NI cs.DC | null | Due to the transient nature of peers, any Peer-to-Peer network is in peril to
falling apart if peers do not receive routing table updates periodically. To
this end, maintenance, which affects every peer, ensures connectedness and
sustained data operation performance. However, a high rate of change in peer
population usually incurs lots of network maintenance messages and can severely
degrade overall performance. We discuss three methods how to tackle and
mitigate the effect of peer fluctuation on a tree-based distributed hash table.
| [
{
"version": "v1",
"created": "Wed, 16 Jun 2004 17:32:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fahrenholtz",
"Dietrich",
""
],
[
"Turau",
"Volker",
""
]
] |
cs/0406028 | Manor Mendel | Yair Bartal, Bela Bollobas, Manor Mendel | Ramsey-type theorems for metric spaces with applications to online
problems | Fix an error in the metadata. 31 pages, 0 figures. Preliminary
version in FOCS '01. To be published in J. Comput. System Sci | J. Comput. System Sci. 72(5):890-921, 2006 | 10.1016/j.jcss.2005.05.008 | null | cs.DS | null | A nearly logarithmic lower bound on the randomized competitive ratio for the
metrical task systems problem is presented. This implies a similar lower bound
for the extensively studied k-server problem. The proof is based on Ramsey-type
theorems for metric spaces, that state that every metric space contains a large
subspace which is approximately a hierarchically well-separated tree (and in
particular an ultrametric). These Ramsey-type theorems may be of independent
interest.
| [
{
"version": "v1",
"created": "Wed, 16 Jun 2004 21:56:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bartal",
"Yair",
""
],
[
"Bollobas",
"Bela",
""
],
[
"Mendel",
"Manor",
""
]
] |
cs/0406029 | Kamalakar Karlapalem | Satyanarayana R Valluri and Kamalakar Karlapalem | Subset Queries in Relational Databases | 15 pages | null | null | null | cs.DB | null | In this paper, we motivated the need for relational database systems to
support subset query processing. We defined new operators in relational
algebra, and new constructs in SQL for expressing subset queries. We also
illustrated the applicability of subset queries through different examples
expressed using extended SQL statements and relational algebra expressions. Our
aim is to show the utility of subset queries for next generation applications.
| [
{
"version": "v1",
"created": "Thu, 17 Jun 2004 09:11:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Valluri",
"Satyanarayana R",
""
],
[
"Karlapalem",
"Kamalakar",
""
]
] |
cs/0406031 | Long Qiu | Long Qiu, Min-Yen Kan, Tat-Seng Chua | A Public Reference Implementation of the RAP Anaphora Resolution
Algorithm | 4-page LREC 2004 paper | null | null | null | cs.CL | null | This paper describes a standalone, publicly-available implementation of the
Resolution of Anaphora Procedure (RAP) given by Lappin and Leass (1994). The
RAP algorithm resolves third person pronouns, lexical anaphors, and identifies
pleonastic pronouns. Our implementation, JavaRAP, fills a current need in
anaphora resolution research by providing a reference implementation that can
be benchmarked against current algorithms. The implementation uses the
standard, publicly available Charniak (2000) parser as input, and generates a
list of anaphora-antecedent pairs as output. Alternately, an in-place
annotation or substitution of the anaphors with their antecedents can be
produced. Evaluation on the MUC-6 co-reference task shows that JavaRAP has an
accuracy of 57.9%, similar to the performance given previously in the
literature (e.g., Preiss 2002).
| [
{
"version": "v1",
"created": "Thu, 17 Jun 2004 12:29:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Qiu",
"Long",
""
],
[
"Kan",
"Min-Yen",
""
],
[
"Chua",
"Tat-Seng",
""
]
] |
cs/0406032 | Jos\'e Borges | Jos\'e Borges (1), Mark Levene (2) ((1) School of Engineering,
University of Porto, Portuga,(2)Birkbeck, University of London, U.K) | A Dynamic Clustering-Based Markov Model for Web Usage Mining | null | null | null | null | cs.IR cs.AI | null | Markov models have been widely utilized for modelling user web navigation
behaviour. In this work we propose a dynamic clustering-based method to
increase a Markov model's accuracy in representing a collection of user web
navigation sessions. The method makes use of the state cloning concept to
duplicate states in a way that separates in-links whose corresponding
second-order probabilities diverge. In addition, the new method incorporates a
clustering technique which determines an effcient way to assign in-links with
similar second-order probabilities to the same clone. We report on experiments
conducted with both real and random data and we provide a comparison with the
N-gram Markov concept. The results show that the number of additional states
induced by the dynamic clustering method can be controlled through a threshold
parameter, and suggest that the method's performance is linear time in the size
of the model.
| [
{
"version": "v1",
"created": "Thu, 17 Jun 2004 13:38:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borges",
"José",
""
],
[
"Levene",
"Mark",
""
]
] |
cs/0406034 | Manor Mendel | Amos Fiat, Manor Mendel | Better algorithms for unfair metrical task systems and applications | 20 pages, 1 figure | SIAM Journal on Computing 32(6), pp. 1403-1422, 2003 | 10.1137/S0097539700376159 | null | cs.DS | null | Unfair metrical task systems are a generalization of online metrical task
systems. In this paper we introduce new techniques to combine algorithms for
unfair metrical task systems and apply these techniques to obtain improved
randomized online algorithms for metrical task systems on arbitrary metric
spaces.
| [
{
"version": "v1",
"created": "Thu, 17 Jun 2004 18:49:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fiat",
"Amos",
""
],
[
"Mendel",
"Manor",
""
]
] |
cs/0406036 | Manor Mendel | Manor Mendel, Steven S. Seiden | Online Companion Caching | 17 pages, 1 figure. Preliminary version in ESA '02. To be published
in Theoretical Computer Science A | Theoret. Comput. Sci. 324(2-3): 183-200, 2004 | 10.1016/j.tcs.2004.05.015 | null | cs.DS | null | This paper is concerned with online caching algorithms for the
(n,k)-companion cache, defined by Brehob et. al. In this model the cache is
composed of two components: a k-way set-associative cache and a companion
fully-associative cache of size n. We show that the deterministic competitive
ratio for this problem is (n+1)(k+1)-1, and the randomized competitive ratio is
O(\log n \log k) and \Omega(\log n +\log k).
| [
{
"version": "v1",
"created": "Fri, 18 Jun 2004 16:20:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mendel",
"Manor",
""
],
[
"Seiden",
"Steven S.",
""
]
] |
cs/0406038 | Vladan Vuckovic V. | Vladan Vuckovic, Djordje Vidanovic | A New Approach to Draw Detection by Move Repetition in Computer Chess
Programming | 15 pages, 4 figures | null | null | null | cs.AI | null | We will try to tackle both the theoretical and practical aspects of a very
important problem in chess programming as stated in the title of this article -
the issue of draw detection by move repetition. The standard approach that has
so far been employed in most chess programs is based on utilising positional
matrices in original and compressed format as well as on the implementation of
the so-called bitboard format.
The new approach that we will be trying to introduce is based on using
variant strings generated by the search algorithm (searcher) during the tree
expansion in decision making. We hope to prove that this approach is more
efficient than the standard treatment of the issue, especially in positions
with few pieces (endgames). To illustrate what we have in mind a machine
language routine that implements our theoretical assumptions is attached. The
routine is part of the Axon chess program, developed by the authors. Axon, in
its current incarnation, plays chess at master strength (ca. 2400-2450 Elo,
based on both Axon vs computer programs and Axon vs human masters in over 3000
games altogether).
| [
{
"version": "v1",
"created": "Mon, 21 Jun 2004 13:42:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vuckovic",
"Vladan",
""
],
[
"Vidanovic",
"Djordje",
""
]
] |
cs/0406040 | Bonifac Donat | Bonifac Donat | Alchemistry of the P versus NP question | null | null | null | null | cs.CC cs.LO | null | Are P and NP provably inseparable ? Take a look at some unorthodox, guilty
mentioned folklore and related unpublished results.
| [
{
"version": "v1",
"created": "Mon, 21 Jun 2004 20:17:28 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Jun 2004 09:56:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Donat",
"Bonifac",
""
]
] |
cs/0406041 | Etienne Payet | Etienne Payet and Fred Mesnard | Non-Termination Inference of Logic Programs | Long version (algorithms and proofs included) of a paper submitted to
TOPLAS | null | null | null | cs.PL cs.LO | null | We present a static analysis technique for non-termination inference of logic
programs. Our framework relies on an extension of the subsumption test, where
some specific argument positions can be instantiated while others are
generalized. We give syntactic criteria to statically identify such argument
positions from the text of a program. Atomic left looping queries are generated
bottom-up from selected subsets of the binary unfoldings of the program of
interest. We propose a set of correct algorithms for automating the approach.
Then, non-termination inference is tailored to attempt proofs of optimality of
left termination conditions computed by a termination inference tool. An
experimental evaluation is reported. When termination and non-termination
analysis produce complementary results for a logic procedure, then with respect
to the leftmost selection rule and the language used to describe sets of atomic
queries, each analysis is optimal and together, they induce a characterization
of the operational behavior of the logic procedure.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 2004 11:44:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Payet",
"Etienne",
""
],
[
"Mesnard",
"Fred",
""
]
] |
cs/0406042 | Valdis Vitolins | Valdis Vitolins | Business Process Measures | 12 pages, 7 figures, 2 tables, Proceedings of International
Conference "Baltic DB&IS 2004", Riga, Latvia (June 6-9, 2004) | Vitolins Valdis, Business Process Measures. Computer Science and
Information Technologies, Databases and Information Systems Doctoral
Consortium, Scientific Papers University of Latvia Vol. 673, University of
Latvia, 2004, pp. 186.-197 | null | null | cs.CE cs.PF | null | The paper proposes a new methodology for defining business process measures
and their computation. The approach is based on metamodeling according to MOF.
Especially, a metamodel providing precise definitions of typical process
measures for UML activity diagram-like notation is proposed, including precise
definitions how measures should be aggregated for composite process elements.
The proposed approach allows defining values in a natural way, and measurement
of data, which are of interest to business, without deep investigation into
specific technical solutions. This provides new possibilities for business
process measurement, decreasing the gap between technical solutions and asset
management methodologies.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 2004 12:19:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vitolins",
"Valdis",
""
]
] |
cs/0406043 | Taneli Mielik\"ainen | Taneli Mielik\"ainen, Janne Ravantti, Esko Ukkonen | The Computational Complexity of Orientation Search Problems in
Cryo-Electron Microscopy | null | null | null | C-2004-3, Department of Computer Science, University of Helsinki | cs.DS cs.CG cs.CV | null | In this report we study the problem of determining three-dimensional
orientations for noisy projections of randomly oriented identical particles.
The problem is of central importance in the tomographic reconstruction of the
density map of macromolecular complexes from electron microscope images and it
has been studied intensively for more than 30 years.
We analyze the computational complexity of the orientation problem and show
that while several variants of the problem are $NP$-hard, inapproximable and
fixed-parameter intractable, some restrictions are polynomial-time approximable
within a constant factor or even solvable in logarithmic space. The orientation
search problem is formalized as a constrained line arrangement problem that is
of independent interest. The negative complexity results give a partial
justification for the heuristic methods used in orientation search, and the
positive complexity results on the orientation search have some positive
implications also to the problem of finding functionally analogous genes.
A preliminary version ``The Computational Complexity of Orientation Search in
Cryo-Electron Microscopy'' appeared in Proc. ICCS 2004, LNCS 3036, pp.
231--238. Springer-Verlag 2004.
| [
{
"version": "v1",
"created": "Wed, 23 Jun 2004 14:28:17 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jun 2004 08:29:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mielikäinen",
"Taneli",
""
],
[
"Ravantti",
"Janne",
""
],
[
"Ukkonen",
"Esko",
""
]
] |
cs/0406044 | Oleg Verbitsky | Frank Harary, Wolfgang Slany, Oleg Verbitsky | On the Computational Complexity of the Forcing Chromatic Number | 24 pages; This is the final version | null | null | null | cs.CC | null | We consider vertex colorings of graphs in which adjacent vertices have
distinct colors. A graph is $s$-chromatic if it is colorable in $s$ colors and
any coloring of it uses at least $s$ colors. The forcing chromatic number
$F(G)$ of an $s$-chromatic graph $G$ is the smallest number of vertices which
must be colored so that, with the restriction that $s$ colors are used, every
remaining vertex has its color determined uniquely. We estimate the
computational complexity of $F(G)$ relating it to the complexity class US
introduced by Blass and Gurevich. We prove that recognizing if $F(G)\le 2$ is
US-hard with respect to polynomial-time many-one reductions. Moreover, this
problem is coNP-hard even under the promises that $F(G)\le 3$ and $G$ is
3-chromatic. On the other hand, recognizing if $F(G)\le k$, for each constant
$k$, is reducible to a problem in US via disjunctive truth-table reduction.
Similar results are obtained also for forcing variants of the clique and the
domination numbers of a graph.
| [
{
"version": "v1",
"created": "Wed, 23 Jun 2004 15:21:46 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Aug 2004 08:32:22 GMT"
},
{
"version": "v3",
"created": "Thu, 20 Jan 2005 12:34:22 GMT"
},
{
"version": "v4",
"created": "Tue, 30 Aug 2005 09:10:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Harary",
"Frank",
""
],
[
"Slany",
"Wolfgang",
""
],
[
"Verbitsky",
"Oleg",
""
]
] |
cs/0406045 | Sandor P. Fekete | Erik D. Demaine, Sandor P. Fekete, and Shmuel Gal | Online Searching with Turn Cost | 15 pages, 2 figures, 1 table; to appear in Theoretical Computer
Science. Did some minor editorial changes, fixed some typos, etc | null | null | null | cs.DS | null | We consider the problem of searching for an object on a line at an unknown
distance OPT from the original position of the searcher, in the presence of a
cost of d for each time the searcher changes direction. This is a
generalization of the well-studied linear-search problem. We describe a
strategy that is guaranteed to find the object at a cost of at most 9*OPT + 2d,
which has the optimal competitive ratio 9 with respect to OPT plus the minimum
corresponding additive term. Our argument for upper and lower bound uses an
infinite linear program, which we solve by experimental solution of an infinite
series of approximating finite linear programs, estimating the limits, and
solving the resulting recurrences. We feel that this technique is interesting
in its own right and should help solve other searching problems. In particular,
we consider the star search or cow-path problem with turn cost, where the
hidden object is placed on one of m rays emanating from the original position
of the searcher. For this problem we give a tight bound of
(1+(2(m^m)/((m-1)^(m-1))) OPT + m ((m/(m-1))^(m-1) - 1) d. We also discuss
tradeoff between the corresponding coefficients, and briefly consider
randomized strategies on the line.
| [
{
"version": "v1",
"created": "Wed, 23 Jun 2004 16:56:53 GMT"
},
{
"version": "v2",
"created": "Sat, 18 Sep 2004 09:26:50 GMT"
},
{
"version": "v3",
"created": "Fri, 4 Mar 2005 14:16:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Gal",
"Shmuel",
""
]
] |
cs/0406046 | Andrew Huang | Andrew C. Huang and Armando Fox | Cheap Recovery: A Key to Self-Managing State | Submitted to the Sixth Symposium on Operating Systems Design and
Implementation (OSDI '04) | null | null | null | cs.NI cs.DC | null | Cluster hash tables (CHTs) are a key persistent-storage component of many
large-scale Internet services due to their high performance and scalability. We
show that a correctly-designed CHT can also be as easy to manage as a farm of
stateless servers. Specifically, we trade away some consistency to obtain
reboot-based recovery that is simple, maintains full data availability, and
only has modest impact on performance. This simplifies management in two ways.
First, it simplifies failure detection by lowering the cost of acting on false
positives, allowing us to use simple but aggressive statistical techniques to
quickly detect potential failures and node degradations; even when a false
alarm is raised or when rebooting will not fix the problem, attempting recovery
by rebooting is relatively non-intrusive to system availability and
performance. Second, it allows us to re-cast online repartitioning as failure
plus recovery, simplifying dynamic scaling and capacity planning. These
properties make it possible for the system to be continuously self-adjusting, a
key property of self-managing, autonomic systems.
| [
{
"version": "v1",
"created": "Wed, 23 Jun 2004 18:08:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huang",
"Andrew C.",
""
],
[
"Fox",
"Armando",
""
]
] |
cs/0406047 | Alexei Stadnik | G.A. Ososkov, S.G. Dmitrievskiy, A.V. Stadnik | Self-organizing neural networks in classification and image recognition | null | null | null | null | cs.CV cs.AI | null | Self-organizing neural networks are used for brick finding in OPERA
experiment. Self-organizing neural networks and wavelet analysis used for
recognition and extraction of car numbers from images.
| [
{
"version": "v1",
"created": "Thu, 24 Jun 2004 13:14:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ososkov",
"G. A.",
""
],
[
"Dmitrievskiy",
"S. G.",
""
],
[
"Stadnik",
"A. V.",
""
]
] |
cs/0406049 | Marcus Mendenhall | Marcus H. Mendenhall | A Fast, Vectorizable Algorithm for Producing Single-Precision
Sine-Cosine Pairs | 4 pages, 1 block sample code | null | null | null | cs.MS | null | This paper presents an algorithm for computing Sine-Cosine pairs to modest
accuracy, but in a manner which contains no conditional tests or branching,
making it highly amenable to vectorization. An exemplary implementation for
PowerPC AltiVec processors is included, but the algorithm should be easily
portable to other achitectures, such as Intel SSE.
| [
{
"version": "v1",
"created": "Fri, 25 Jun 2004 20:37:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mendenhall",
"Marcus H.",
""
]
] |
cs/0406051 | Somdeb Lahiri | Somdeb Lahiri | Stable Outcomes for Two-Sided Contract Choice Problems | 13 pages; source file: MS Word | null | null | null | cs.GT | null | We show, that a simple generalization of the Deferred Acceptance Procedure
with firms proposing due to Gale and Shapley(1962), yeild outcomes for a
two-sided contract choice problem, which necessarily belong to the core and are
Weakly Pareto Optimal for firms. Under additional assumptions: (a) given any
two distinct workers, the set of yields acheivable by a firm with the first
worker is disjoint from the set of yields acheivable by it with the second, and
(b) the contract choice problem is pair-wise efficient, we prove that there is
no stable outcome at which a firm can get more than what it gets at the unique
outcome of our procedure.
| [
{
"version": "v1",
"created": "Sun, 27 Jun 2004 11:40:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lahiri",
"Somdeb",
""
]
] |
cs/0406053 | Ion Mandoiu | K. Konwar, I. Mandoiu, A. Russell, A. Shvartsman | Approximation Algorithms for Minimum PCR Primer Set Selection with
Amplification Length and Uniqueness Constraints | null | null | null | null | cs.DS cs.DM q-bio.QM | null | A critical problem in the emerging high-throughput genotyping protocols is to
minimize the number of polymerase chain reaction (PCR) primers required to
amplify the single nucleotide polymorphism loci of interest. In this paper we
study PCR primer set selection with amplification length and uniqueness
constraints from both theoretical and practical perspectives. We give a greedy
algorithm that achieves a logarithmic approximation factor for the problem of
minimizing the number of primers subject to a given upperbound on the length of
PCR amplification products. We also give, using randomized rounding, the first
non-trivial approximation algorithm for a version of the problem that requires
unique amplification of each amplification target. Empirical results on
randomly generated testcases as well as testcases extracted from the from the
National Center for Biotechnology Information's genomic databases show that our
algorithms are highly scalable and produce better results compared to previous
heuristics.
| [
{
"version": "v1",
"created": "Mon, 28 Jun 2004 07:04:14 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jul 2004 17:39:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Konwar",
"K.",
""
],
[
"Mandoiu",
"I.",
""
],
[
"Russell",
"A.",
""
],
[
"Shvartsman",
"A.",
""
]
] |
cs/0406055 | Andrea Ferrara Ing. | Andrea Ferrara | Web Services: A Process Algebra Approach | null | null | null | null | cs.AI cs.DB | null | It is now well-admitted that formal methods are helpful for many issues
raised in the Web service area. In this paper we present a framework for the
design and verification of WSs using process algebras and their tools. We
define a two-way mapping between abstract specifications written using these
calculi and executable Web services written in BPEL4WS. Several choices are
available: design and correct errors in BPEL4WS, using process algebra
verification tools, or design and correct in process algebra and automatically
obtaining the corresponding BPEL4WS code. The approaches can be combined.
Process algebra are not useful only for temporal logic verification: we remark
the use of simulation/bisimulation both for verification and for the
hierarchical refinement design method. It is worth noting that our approach
allows the use of any process algebra depending on the needs of the user at
different levels (expressiveness, existence of reasoning tools, user
expertise).
| [
{
"version": "v1",
"created": "Mon, 28 Jun 2004 15:42:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ferrara",
"Andrea",
""
]
] |
cs/0406056 | Selmer Bringsjord | Selmer Bringsjord and Joshua Taylor | P=NP | null | null | null | null | cs.CC cs.AI | null | We claim to resolve the P=?NP problem via a formal argument for P=NP.
| [
{
"version": "v1",
"created": "Mon, 28 Jun 2004 19:11:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bringsjord",
"Selmer",
""
],
[
"Taylor",
"Joshua",
""
]
] |
cs/0406057 | Maximillian Dornseif | Maximillian Dornseif, Sascha May | Modelling the costs and benefits of Honeynets | was presented at the "Third Annual Workshop on Economics and
Information Security" 2004 (WEIS04) | null | null | null | cs.CR cs.CY | null | For many IT-security measures exact costs and benefits are not known. This
makes it difficult to allocate resources optimally to different security
measures. We present a model for costs and benefits of so called Honeynets.
This can foster informed reasoning about the deployment of honeynet technology.
| [
{
"version": "v1",
"created": "Mon, 28 Jun 2004 21:11:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dornseif",
"Maximillian",
""
],
[
"May",
"Sascha",
""
]
] |
cs/0406058 | Matthias Bauer | Matthias Bauer | Proofs of Zero Knowledge | 16 pages | null | null | null | cs.CR cs.DB | null | We present a protocol for verification of ``no such entry'' replies from
databases. We introduce a new cryptographic primitive as the underlying
structure, the keyed hash tree, which is an extension of Merkle's hash tree. We
compare our scheme to Buldas et al.'s Undeniable Attesters and Micali et al.'s
Zero Knowledge Sets.
| [
{
"version": "v1",
"created": "Tue, 29 Jun 2004 11:05:29 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jul 2004 12:47:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bauer",
"Matthias",
""
]
] |
cs/0406059 | Maximillian Dornseif | Maximillian Dornseif, Felix C. Gaertner, Thorsten Holz | Ermittlung von Verwundbarkeiten mit elektronischen Koedern | Presented at Detection of Intrusions and Malware & Vulnerability
Assessment (DIMVA 2004), in German | null | null | null | cs.CR | null | Electronic bait (honeypots) are network resources whose value consists of
being attacked and compromised. These are often computers which do not have a
task in the network, but are otherwise indestinguishable from regular
computers. Such bait systems could be interconnected (honeynets). These
honeynets are equipped with special software, facilitating forensic anylisis of
incidents. Taking average of the wide variety of recorded data it is possible
to learn considerable more about the behaviour of attackers in networks than
with traditional methods. This article is an introduction into electronic bait
and a description of the setup and first experiences of such a network deployed
at RWTH Aachen University.
-----
Als elektronische Koeder (honeypots) bezeichnet man Netzwerkressourcen, deren
Wert darin besteht, angegriffen und kompromittiert zu werden. Oft sind dies
Computer, die keine spezielle Aufgabe im Netzwerk haben, aber ansonsten nicht
von regulaeren Rechnern zu unterscheiden sind. Koeder koennen zu
Koeder-Netzwerken (honeynets) zusammengeschlossen werden. Sie sind mit
spezieller Software ausgestattet, die die Forensik einer eingetretenen
Schutzzielverletzung erleichtert. Durch die Vielfalt an mitgeschnittenen Daten
kann man deutlich mehr ueber das Verhalten von Angreifern in Netzwerken lernen
als mit herkoemmlichen forensischen Methoden. Dieser Beitrag stellt die
Philosophie der Koeder-Netzwerke vor und beschreibt die ersten Erfahrungen, die
mit einem solchen Netzwerk an der RWTH Aachen gemacht wurden.
| [
{
"version": "v1",
"created": "Tue, 29 Jun 2004 15:14:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dornseif",
"Maximillian",
""
],
[
"Gaertner",
"Felix C.",
""
],
[
"Holz",
"Thorsten",
""
]
] |
cs/0406060 | Stijn Vansummeren | Jan Van den Bussche, Dirk Van Gucht, Stijn Vansummeren | Well-Definedness and Semantic Type-Checking in the Nested Relational
Calculus and XQuery | null | null | null | null | cs.DB cs.PL | null | Two natural decision problems regarding the XML query language XQuery are
well-definedness and semantic type-checking. We study these problems in the
setting of a relational fragment of XQuery. We show that well-definedness and
semantic type-checking are undecidable, even in the positive-existential case.
Nevertheless, for a ``pure'' variant of XQuery, in which no identification is
made between an item and the singleton containing that item, the problems
become decidable. We also consider the analogous problems in the setting of the
nested relational calculus.
| [
{
"version": "v1",
"created": "Tue, 29 Jun 2004 16:09:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bussche",
"Jan Van den",
""
],
[
"Van Gucht",
"Dirk",
""
],
[
"Vansummeren",
"Stijn",
""
]
] |
cs/0406061 | Scott Aaronson | Scott Aaronson | The Complexity of Agreement | 27 pages, 4 figures | null | null | null | cs.CC cs.GT | null | A celebrated 1976 theorem of Aumann asserts that honest, rational Bayesian
agents with common priors will never "agree to disagree": if their opinions
about any topic are common knowledge, then those opinions must be equal.
Economists have written numerous papers examining the assumptions behind this
theorem. But two key questions went unaddressed: first, can the agents reach
agreement after a conversation of reasonable length? Second, can the
computations needed for that conversation be performed efficiently? This paper
answers both questions in the affirmative, thereby strengthening Aumann's
original conclusion.
We first show that, for two agents with a common prior to agree within
epsilon about the expectation of a [0,1] variable with high probability over
their prior, it suffices for them to exchange order 1/epsilon^2 bits. This
bound is completely independent of the number of bits n of relevant knowledge
that the agents have. We then extend the bound to three or more agents; and we
give an example where the economists' "standard protocol" (which consists of
repeatedly announcing one's current expectation) nearly saturates the bound,
while a new "attenuated protocol" does better. Finally, we give a protocol that
would cause two Bayesians to agree within epsilon after exchanging order
1/epsilon^2 messages, and that can be simulated by agents with limited
computational resources. By this we mean that, after examining the agents'
knowledge and a transcript of their conversation, no one would be able to
distinguish the agents from perfect Bayesians. The time used by the simulation
procedure is exponential in 1/epsilon^6 but not in n.
| [
{
"version": "v1",
"created": "Wed, 30 Jun 2004 06:28:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aaronson",
"Scott",
""
]
] |
cs/0407001 | Rajkumar Buyya | Parvin Asadzadeh, Rajkumar Buyya, Chun Ling Kei, Deepa Nayar, and
Srikumar Venugopal | Global Grids and Software Toolkits: A Study of Four Grid Middleware
Technologies | 19 pages, 10 figures | null | null | * Technical Report, GRIDS-TR-2004-4, Grid Computing and Distributed
Systems Laboratory, University of Melbourne, Australia, July 1, 2004 | cs.DC | null | Grid is an infrastructure that involves the integrated and collaborative use
of computers, networks, databases and scientific instruments owned and managed
by multiple organizations. Grid applications often involve large amounts of
data and/or computing resources that require secure resource sharing across
organizational boundaries. This makes Grid application management and
deployment a complex undertaking. Grid middlewares provide users with seamless
computing ability and uniform access to resources in the heterogeneous Grid
environment. Several software toolkits and systems have been developed, most of
which are results of academic research projects, all over the world. This
chapter will focus on four of these middlewares--UNICORE, Globus, Legion and
Gridbus. It also presents our implementation of a resource broker for UNICORE
as this functionality was not supported in it. A comparison of these systems on
the basis of the architecture, implementation model and several other features
is included.
| [
{
"version": "v1",
"created": "Thu, 1 Jul 2004 11:54:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Asadzadeh",
"Parvin",
""
],
[
"Buyya",
"Rajkumar",
""
],
[
"Kei",
"Chun Ling",
""
],
[
"Nayar",
"Deepa",
""
],
[
"Venugopal",
"Srikumar",
""
]
] |
cs/0407002 | Hendrik Feddes | Lea Cyrus, Hendrik Feddes, Frank Schumacher | Annotating Predicate-Argument Structure for a Parallel Treebank | 8 pages, 5 figures | Proceedings of the LREC 2004 Workshop on Building Lexical
Resources from Semantically Annotated Corpora, Lisbon, May 30, 2004, pp.
39-46 | null | null | cs.CL | null | We report on a recently initiated project which aims at building a
multi-layered parallel treebank of English and German. Particular attention is
devoted to a dedicated predicate-argument layer which is used for aligning
translationally equivalent sentences of the two languages. We describe both our
conceptual decisions and aspects of their technical realisation. We discuss
some selected problems and conclude with a few remarks on how this project
relates to similar projects in the field.
| [
{
"version": "v1",
"created": "Thu, 1 Jul 2004 16:18:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cyrus",
"Lea",
""
],
[
"Feddes",
"Hendrik",
""
],
[
"Schumacher",
"Frank",
""
]
] |
cs/0407003 | Miguel Mosteiro | Michael A. Bender, Martin Farach-Colton, Miguel Mosteiro | Insertion Sort is O(n log n) | 6 pages, Latex. In Proceedings of the Third International Conference
on Fun With Algorithms, FUN 2004 | null | null | null | cs.DS | null | Traditional Insertion Sort runs in O(n^2) time because each insertion takes
O(n) time. When people run Insertion Sort in the physical world, they leave
gaps between items to accelerate insertions. Gaps help in computers as well.
This paper shows that Gapped Insertion Sort has insertion times of O(log n)
with high probability, yielding a total running time of O(n log n) with high
probability.
| [
{
"version": "v1",
"created": "Thu, 1 Jul 2004 15:50:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bender",
"Michael A.",
""
],
[
"Farach-Colton",
"Martin",
""
],
[
"Mosteiro",
"Miguel",
""
]
] |
cs/0407005 | Wei Wang | I. Dan Melamed and Wei Wang | Statistical Machine Translation by Generalized Parsing | 45 pages, with fixes for generating correct PDF format | null | null | null | cs.CL | null | Designers of statistical machine translation (SMT) systems have begun to
employ tree-structured translation models. Systems involving tree-structured
translation models tend to be complex. This article aims to reduce the
conceptual complexity of such systems, in order to make them easier to design,
implement, debug, use, study, understand, explain, modify, and improve. In
service of this goal, the article extends the theory of semiring parsing to
arrive at a novel abstract parsing algorithm with five functional parameters: a
logic, a grammar, a semiring, a search strategy, and a termination condition.
The article then shows that all the common algorithms that revolve around
tree-structured translation models, including hierarchical alignment, inference
for parameter estimation, translation, and structured evaluation, can be
derived by generalizing two of these parameters -- the grammar and the logic.
The article culminates with a recipe for using such generalized parsers to
train, apply, and evaluate an SMT system that is driven by tree-structured
translation models.
| [
{
"version": "v1",
"created": "Thu, 1 Jul 2004 22:02:10 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Nov 2005 05:02:33 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Nov 2005 04:06:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Melamed",
"I. Dan",
""
],
[
"Wang",
"Wei",
""
]
] |
cs/0407006 | Shuvendu Lahiri Mr. | Shuvendu K. Lahiri, Randal E. Bryant | Predicate Abstraction with Indexed Predicates | 27 pages, 4 figures, 1 table, short version appeared in International
Conference on Verification, Model Checking and Abstract Interpretation
(VMCAI'04), LNCS 2937, pages = 267--281 | null | null | null | cs.LO | null | Predicate abstraction provides a powerful tool for verifying properties of
infinite-state systems using a combination of a decision procedure for a subset
of first-order logic and symbolic methods originally developed for finite-state
model checking. We consider models containing first-order state variables,
where the system state includes mutable functions and predicates. Such a model
can describe systems containing arbitrarily large memories, buffers, and arrays
of identical processes. We describe a form of predicate abstraction that
constructs a formula over a set of universally quantified variables to describe
invariant properties of the first-order state variables. We provide a formal
justification of the soundness of our approach and describe how it has been
used to verify several hardware and software designs, including a
directory-based cache coherence protocol.
| [
{
"version": "v1",
"created": "Fri, 2 Jul 2004 06:17:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lahiri",
"Shuvendu K.",
""
],
[
"Bryant",
"Randal E.",
""
]
] |
cs/0407007 | Dirk Leinders | Dirk Leinders (1), Jerzy Tyszkiewicz (2), Jan Van den Bussche (1) ((1)
Limburgs Universitair Centrum, Diepenbeek, Belgium, (2) Institute of
Informatics, Warsaw University, Warsaw, Poland) | The semijoin algebra and the guarded fragment | 11 pages, 2 figures | null | null | null | cs.DB cs.LO | null | The semijoin algebra is the variant of the relational algebra obtained by
replacing the join operator by the semijoin operator. We discuss some
interesting connections between the semijoin algebra and the guarded fragment
of first-order logic. We also provide an Ehrenfeucht-Fraisse game,
characterizing the discerning power of the semijoin algebra. This game gives a
method for showing that certain queries are not expressible in the semijoin
algebra.
| [
{
"version": "v1",
"created": "Fri, 2 Jul 2004 15:44:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leinders",
"Dirk",
""
],
[
"Tyszkiewicz",
"Jerzy",
""
],
[
"Bussche",
"Jan Van den",
""
]
] |
cs/0407008 | Karthik Narayanaswami | S. Ravichandran and M.N. Karthik | Autogenic Training With Natural Language Processing Modules: A Recent
Tool For Certain Neuro Cognitive Studies | 2 Pages. Proceedings of 11th International Congress on Biological &
Medical Engineering, Singapore (IEEE-EMBS & IFMBE endorsed) | null | null | null | cs.AI | null | Learning to respond to voice-text input involves the subject's ability in
understanding the phonetic and text based contents and his/her ability to
communicate based on his/her experience. The neuro-cognitive facility of the
subject has to support two important domains in order to make the learning
process complete. In many cases, though the understanding is complete, the
response is partial. This is one valid reason why we need to support the
information from the subject with scalable techniques such as Natural Language
Processing (NLP) for abstraction of the contents from the output. This paper
explores the feasibility of using NLP modules interlaced with Neural Networks
to perform the required task in autogenic training related to medical
applications.
| [
{
"version": "v1",
"created": "Fri, 2 Jul 2004 20:15:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravichandran",
"S.",
""
],
[
"Karthik",
"M. N.",
""
]
] |
cs/0407009 | Karthik Narayanaswami | M. N. Karthik and Moshe Davis | Search Using N-gram Technique Based Statistical Analysis for Knowledge
Extraction in Case Based Reasoning Systems | 4 Pages. National Level Mathematics & CS Symposium, Chennai
Mathematical Institute ICS '02, March | null | null | null | cs.AI cs.IR | null | Searching techniques for Case Based Reasoning systems involve extensive
methods of elimination. In this paper, we look at a new method of arriving at
the right solution by performing a series of transformations upon the data.
These involve N-gram based comparison and deduction of the input data with the
case data, using Morphemes and Phonemes as the deciding parameters. A similar
technique for eliminating possible errors using a noise removal function is
performed. The error tracking and elimination is performed through a
statistical analysis of obtained data, where the entire data set is analyzed as
sub-categories of various etymological derivatives. A probability analysis for
the closest match is then performed, which yields the final expression. This
final expression is referred to the Case Base. The output is redirected through
an Expert System based on best possible match. The threshold for the match is
customizable, and could be set by the Knowledge-Architect.
| [
{
"version": "v1",
"created": "Fri, 2 Jul 2004 20:22:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karthik",
"M. N.",
""
],
[
"Davis",
"Moshe",
""
]
] |
cs/0407013 | Richard McClatchey | Naveed Ahmad, Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Ali
Hassan, Ahsan Ikram, Frank van Lingen, Richard McClatchey, Harvey Newman,
Conrad Steenberg, Michael Thomas & Ian Willers | Distributed Analysis and Load Balancing System for Grid Enabled Analysis
on Hand-held devices using Multi-Agents Systems | 4 pages, 3 figures. Proceedings of the 3rd International Conference
on Grid and Cooperative Computing (GCC 2004) | null | null | null | cs.DC | null | Handheld devices, while growing rapidly, are inherently constrained and lack
the capability of executing resource hungry applications. This paper presents
the design and implementation of distributed analysis and load-balancing system
for hand-held devices using multi-agents system. This system enables low
resource mobile handheld devices to act as potential clients for Grid enabled
applications and analysis environments. We propose a system, in which mobile
agents will transport, schedule, execute and return results for heavy
computational jobs submitted by handheld devices. Moreover, in this way, our
system provides high throughput computing environment for hand-held devices.
| [
{
"version": "v1",
"created": "Mon, 5 Jul 2004 16:08:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ahmad",
"Naveed",
""
],
[
"Ali",
"Arshad",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Azim",
"Tahir",
""
],
[
"Bunn",
"Julian",
""
],
[
"Hassan",
"Ali",
""
],
[
"Ikram",
"Ahsan",
""
],
[
"van Lingen",
"Frank",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Newman",
"Harvey",
""
],
[
"Steenberg",
"Conrad",
""
],
[
"Thomas",
"Michael",
""
],
[
"Willers",
"Ian",
""
]
] |
cs/0407014 | Richard McClatchey | Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Ahsan Ikram, Richard
McClatchey, Harvey Newman, Conrad Steenberg, Michael Thomas, Ian Willers | A Grid-enabled Interface to Condor for Interactive Analysis on Handheld
and Resource-limited Devices | This paper has been withdrawn | null | null | null | cs.DC | null | This paper was withdrawn by the authors.
| [
{
"version": "v1",
"created": "Mon, 5 Jul 2004 19:40:00 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Sep 2004 09:05:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ali",
"Arshad",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Azim",
"Tahir",
""
],
[
"Bunn",
"Julian",
""
],
[
"Ikram",
"Ahsan",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Newman",
"Harvey",
""
],
[
"Steenberg",
"Conrad",
""
],
[
"Thomas",
"Michael",
""
],
[
"Willers",
"Ian",
""
]
] |
cs/0407016 | Vadim Bulitko | Vadim Bulitko | Learning for Adaptive Real-time Search | null | null | null | null | cs.AI cs.LG | null | Real-time heuristic search is a popular model of acting and learning in
intelligent autonomous agents. Learning real-time search agents improve their
performance over time by acquiring and refining a value function guiding the
application of their actions. As computing the perfect value function is
typically intractable, a heuristic approximation is acquired instead. Most
studies of learning in real-time search (and reinforcement learning) assume
that a simple value-function-greedy policy is used to select actions. This is
in contrast to practice, where high-performance is usually attained by
interleaving planning and acting via a lookahead search of a non-trivial depth.
In this paper, we take a step toward bridging this gap and propose a novel
algorithm that (i) learns a heuristic function to be used specifically with a
lookahead-based policy, (ii) selects the lookahead depth adaptively in each
state, (iii) gives the user control over the trade-off between exploration and
exploitation. We extensively evaluate the algorithm in the sliding tile puzzle
testbed comparing it to the classical LRTA* and the more recent weighted LRTA*,
bounded LRTA*, and FALCONS. Improvements of 5 to 30 folds in convergence speed
are observed.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 2004 22:18:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bulitko",
"Vadim",
""
]
] |
cs/0407017 | Fronefield Crawford | Andrew Cantino, Fronefield Crawford, Saurav Dhital, John P. Dougherty,
Reid Sherman (Haverford College) | A Low Cost Distributed Computing Approach to Pulsar Searches at a Small
College | Adapted from a talk given at the Eleventh SIAM Conference on Parallel
Computing, February 25-27, 2004 in San Francisco, CA. 18 pages, including 3
figures and 2 tables | null | null | null | cs.DC | null | We describe a distributed processing cluster of inexpensive Linux machines
developed jointly by the Astronomy and Computer Science departments at
Haverford College which has been successfully used to search a large volume of
data from a recent radio pulsar survey. Analysis of radio pulsar surveys
requires significant computational resources to handle the demanding data
storage and processing needs. One goal of this project was to explore issues
encountered when processing a large amount of pulsar survey data with limited
computational resources. This cluster, which was developed and activated in
only a few weeks by supervised undergraduate summer research students, used
existing decommissioned computers, the campus network, and a script-based,
client-oriented, self-scheduled data distribution approach to process the data.
This setup provided simplicity, efficiency, and "on-the-fly" scalability at low
cost. The entire 570 GB data set from the pulsar survey was processed at
Haverford over the course of a ten-week summer period using this cluster. We
conclude that this cluster can serve as a useful computational model in cases
where data processing must be carried out on a limited budget. We have also
constructed a DVD archive of the raw survey data in order to investigate the
feasibility of using DVD as an inexpensive and easily accessible raw data
storage format for pulsar surveys. DVD-based storage has not been widely
explored in the pulsar community, but it has several advantages. The DVD
archive we have constructed is reliable, portable, inexpensive, and can be
easily read by any standard modern machine.
| [
{
"version": "v1",
"created": "Wed, 7 Jul 2004 18:55:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cantino",
"Andrew",
"",
"Haverford College"
],
[
"Crawford",
"Fronefield",
"",
"Haverford College"
],
[
"Dhital",
"Saurav",
"",
"Haverford College"
],
[
"Dougherty",
"John P.",
"",
"Haverford College"
],
[
"Sherman",
"Reid",
"",
"Haverford College"
]
] |
cs/0407018 | Stephen Vavasis | Pritam Ganguly, Stephen A. Vavasis, Katerina D. Papoulia | An algorithm for two-dimensional mesh generation based on the pinwheel
tiling | Short version appears in Proceedings of 2004 International Meshing
Roundtable at http://www.imr.sandia.gov | null | null | null | cs.CG cs.NA | null | We propose a new two-dimensional meshing algorithm called PINW able to
generate meshes that accurately approximate the distance between any two domain
points by paths composed only of cell edges. This technique is based on an
extension of pinwheel tilings proposed by Radin and Conway. We prove that the
algorithm produces triangles of bounded aspect ratio. This kind of mesh would
be useful in cohesive interface finite element modeling when the crack
propagation pathis an outcome of a simulation process.
| [
{
"version": "v1",
"created": "Wed, 7 Jul 2004 19:06:15 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Dec 2004 03:17:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ganguly",
"Pritam",
""
],
[
"Vavasis",
"Stephen A.",
""
],
[
"Papoulia",
"Katerina D.",
""
]
] |
cs/0407020 | Rina Panigrahy | Rina Panigrahy | Minimum Enclosing Polytope in High Dimensions | Submitted to SODA05 | null | null | null | cs.CG | null | We study the problem of covering a given set of $n$ points in a high,
$d$-dimensional space by the minimum enclosing polytope of a given arbitrary
shape. We present algorithms that work for a large family of shapes, provided
either only translations and no rotations are allowed, or only rotation about a
fixed point is allowed; that is, one is allowed to only scale and translate a
given shape, or scale and rotate the shape around a fixed point. Our algorithms
start with a polytope guessed to be of optimal size and iteratively moves it
based on a greedy principle: simply move the current polytope directly towards
any outside point till it touches the surface. For computing the minimum
enclosing ball, this gives a simple greedy algorithm with running time
$O(nd/\eps)$ producing a ball of radius $1+\eps$ times the optimal. This simple
principle generalizes to arbitrary convex shape when only translations are
allowed, requiring at most $O(1/\eps^2)$ iterations. Our algorithm implies that
{\em core-sets} of size $O(1/\eps^2)$ exist not only for minimum enclosing ball
but also for any convex shape with a fixed orientation. A {\em Core-Set} is a
small subset of $poly(1/\eps)$ points whose minimum enclosing polytope is
almost as large as that of the original points. Although we are unable to
combine our techniques for translations and rotations for general shapes, for
the min-cylinder problem, we give an algorithm similar to the one in
\cite{HV03}, but with an improved running time of $2^{O(\frac{1}{\eps^2}\log
\frac{1}{\eps})} nd$.
| [
{
"version": "v1",
"created": "Thu, 8 Jul 2004 19:03:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Panigrahy",
"Rina",
""
]
] |
cs/0407021 | Sanjiang Li | Sanjiang Li, Huaiqing Wang | Multi-agent coordination using nearest neighbor rules: revisiting the
Vicsek model | 11 pages, linguistic mistakes corrected, title modified | null | null | null | cs.MA cs.AI | null | Recently, Jadbabaie, Lin, and Morse (IEEE TAC, 48(6)2003:988-1001) offered a
mathematical analysis of the discrete time model of groups of mobile autonomous
agents raised by Vicsek et al. in 1995. In their paper, Jadbabaie et al. showed
that all agents shall move in the same heading, provided that these agents are
periodically linked together. This paper sharpens this result by showing that
coordination will be reached under a very weak condition that requires all
agents are finally linked together. This condition is also strictly weaker than
the one Jadbabaie et al. desired.
| [
{
"version": "v1",
"created": "Fri, 9 Jul 2004 02:28:02 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jul 2004 06:28:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Sanjiang",
""
],
[
"Wang",
"Huaiqing",
""
]
] |
cs/0407023 | Rina Panigrahy | Rina Panigrahy | Efficient Hashing with Lookups in two Memory Accesses | Submitted to SODA05 | null | null | null | cs.DS | null | The study of hashing is closely related to the analysis of balls and bins. It
is well-known that instead of using a single hash function if we randomly hash
a ball into two bins and place it in the smaller of the two, then this
dramatically lowers the maximum load on bins. This leads to the concept of
two-way hashing where the largest bucket contains $O(\log\log n)$ balls with
high probability. The hash look up will now search in both the buckets an item
hashes to. Since an item may be placed in one of two buckets, we could
potentially move an item after it has been initially placed to reduce maximum
load. with a maximum load of We show that by performing moves during inserts, a
maximum load of 2 can be maintained on-line, with high probability, while
supporting hash update operations. In fact, with $n$ buckets, even if the space
for two items are pre-allocated per bucket, as may be desirable in hardware
implementations, more than $n$ items can be stored giving a high memory
utilization. We also analyze the trade-off between the number of moves
performed during inserts and the maximum load on a bucket. By performing at
most $h$ moves, we can maintain a maximum load of $O(\frac{\log \log n}{h
\log(\log\log n/h)})$. So, even by performing one move, we achieve a better
bound than by performing no moves at all.
| [
{
"version": "v1",
"created": "Fri, 9 Jul 2004 22:23:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Panigrahy",
"Rina",
""
]
] |
cs/0407024 | Ioannis Athanasiadis | Ioannis N Athanasiadis and Pericles A Mitkas | An agent-based intelligent environmental monitoring system | Multi-Agent Systems, Intelligent Applications, Data Mining, Inductive
Agents, Air-Quality Monitoring | Management of Environmental Quality, 15(3):238-249, May 2004 | 10.1108/14777830410531216 | null | cs.MA cs.CE | null | Fairly rapid environmental changes call for continuous surveillance and
on-line decision making. There are two main areas where IT technologies can be
valuable. In this paper we present a multi-agent system for monitoring and
assessing air-quality attributes, which uses data coming from a meteorological
station. A community of software agents is assigned to monitor and validate
measurements coming from several sensors, to assess air-quality, and, finally,
to fire alarms to appropriate recipients, when needed. Data mining techniques
have been used for adding data-driven, customized intelligence into agents. The
architecture of the developed system, its domain ontology, and typical agent
interactions are presented. Finally, the deployment of a real-world test case
is demonstrated.
| [
{
"version": "v1",
"created": "Sat, 10 Jul 2004 11:06:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Athanasiadis",
"Ioannis N",
""
],
[
"Mitkas",
"Pericles A",
""
]
] |
cs/0407025 | Ioannis Athanasiadis | P. Mitkas, A. Symeonidis, D. Kechagias, I. N. Athanasiadis, G. Laleci,
G. Kurt, Y. Kabak, A. Acar, and A. Dogac | An agent framework for dynamic agent retraining: Agent academy | null | In B. Stanford-Smith, E. Chiozza, and M. Edin, editors, Challenges
and Achievements in e-business and e-work, pages 757-764, Prague, Czech
Republic, October 2002. IOS Press | null | null | cs.MA | null | Agent Academy (AA) aims to develop a multi-agent society that can train new
agents for specific or general tasks, while constantly retraining existing
agents in a recursive mode. The system is based on collecting information both
from the environment and the behaviors of the acting agents and their related
successes/failures to generate a body of data, stored in the Agent Use
Repository, which is mined by the Data Miner module, in order to generate
useful knowledge about the application domain. Knowledge extracted by the Data
Miner is used by the Agent Training Module as to train new agents or to enhance
the behavior of agents already running. In this paper the Agent Academy
framework is introduced, and its overall architecture and functionality are
presented. Training issues as well as agent ontologies are discussed. Finally,
a scenario, which aims to provide environmental alerts to both individuals and
public authorities, is described an AA-based use case.
| [
{
"version": "v1",
"created": "Sat, 10 Jul 2004 11:16:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mitkas",
"P.",
""
],
[
"Symeonidis",
"A.",
""
],
[
"Kechagias",
"D.",
""
],
[
"Athanasiadis",
"I. N.",
""
],
[
"Laleci",
"G.",
""
],
[
"Kurt",
"G.",
""
],
[
"Kabak",
"Y.",
""
],
[
"Acar",
"A.",
""
],
[
"Dogac",
"A.",
""
]
] |
cs/0407026 | Atsushi Fujii | Atsushi Fujii, Tetsuya Ishikawa | Summarizing Encyclopedic Term Descriptions on the Web | 7 pages, Proceedings of the 20th International Conference on
Computational Linguistics (to appear) | Proceedings of the 20th International Conference on Computational
Linguistics (COLING 2004), pp.645-651, Aug. 2004 | null | null | cs.CL | null | We are developing an automatic method to compile an encyclopedic corpus from
the Web. In our previous work, paragraph-style descriptions for a term are
extracted from Web pages and organized based on domains. However, these
descriptions are independent and do not comprise a condensed text as in
hand-crafted encyclopedias. To resolve this problem, we propose a summarization
method, which produces a single text from multiple descriptions. The resultant
summary concisely describes a term from different viewpoints. We also show the
effectiveness of our method by means of experiments.
| [
{
"version": "v1",
"created": "Sat, 10 Jul 2004 11:18:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/0407027 | Atsushi Fujii | Atsushi Fujii, Katunobu Itou, Tomoyosi Akiba, Tetsuya Ishikawa | Unsupervised Topic Adaptation for Lecture Speech Retrieval | 4 pages, Proceedings of the 8th International Conference on Spoken
Language Processing (to appear) | Proceedings of the 8th International Conference on Spoken Language
Processing (ICSLP 2004), pp.2957-2960, Oct. 2004 | null | null | cs.CL | null | We are developing a cross-media information retrieval system, in which users
can view specific segments of lecture videos by submitting text queries. To
produce a text index, the audio track is extracted from a lecture video and a
transcription is generated by automatic speech recognition. In this paper, to
improve the quality of our retrieval system, we extensively investigate the
effects of adapting acoustic and language models on speech recognition. We
perform an MLLR-based method to adapt an acoustic model. To obtain a corpus for
language model adaptation, we use the textbook for a target lecture to search a
Web collection for the pages associated with the lecture topic. We show the
effectiveness of our method by means of experiments.
| [
{
"version": "v1",
"created": "Sat, 10 Jul 2004 11:45:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Itou",
"Katunobu",
""
],
[
"Akiba",
"Tomoyosi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/0407028 | Atsushi Fujii | Tomoyosi Akiba, Atsushi Fujii, Katunobu Itou | Effects of Language Modeling on Speech-driven Question Answering | 4 pages, Proceedings of the 8th International Conference on Spoken
Language Processing (to appear) | Proceedings of the 8th International Conference on Spoken Language
Processing (ICSLP 2004), pp.1053-1056, Oct. 2004 | null | null | cs.CL | null | We integrate automatic speech recognition (ASR) and question answering (QA)
to realize a speech-driven QA system, and evaluate its performance. We adapt an
N-gram language model to natural language questions, so that the input of our
system can be recognized with a high accuracy. We target WH-questions which
consist of the topic part and fixed phrase used to ask about something. We
first produce a general N-gram model intended to recognize the topic and
emphasize the counts of the N-grams that correspond to the fixed phrases. Given
a transcription by the ASR engine, the QA engine extracts the answer candidates
from target documents. We propose a passage retrieval method robust against
recognition errors in the transcription. We use the QA test collection produced
in NTCIR, which is a TREC-style evaluation workshop, and show the effectiveness
of our method by means of experiments.
| [
{
"version": "v1",
"created": "Sat, 10 Jul 2004 11:57:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Akiba",
"Tomoyosi",
""
],
[
"Fujii",
"Atsushi",
""
],
[
"Itou",
"Katunobu",
""
]
] |
cs/0407029 | Alexandre d'Aspremont | Alexandre d'Aspremont | Static versus Dynamic Arbitrage Bounds on Multivariate Option Prices | Submitted to IMA series | null | null | null | cs.CE | null | We compare static arbitrage price bounds on basket calls, i.e. bounds that
only involve buy-and-hold trading strategies, with the price range obtained
within a multi-variate generalization of the Black-Scholes model. While there
is no gap between these two sets of prices in the univariate case, we observe
here that contrary to our intuition about model risk for at-the-money calls,
there is a somewhat large gap between model prices and static arbitrage prices,
hence a similarly large set of prices on which a multivariate Black-Scholes
model cannot be calibrated but where no conclusion can be drawn on the presence
or not of a static arbitrage opportunity.
| [
{
"version": "v1",
"created": "Sat, 10 Jul 2004 16:17:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
]
] |
cs/0407030 | Wolfgang Anthony Eiden | Wolfgang Anthony Eiden | Scheduling with Fuzzy Methods | null | null | null | 20040628 | cs.OH | null | Nowadays, manufacturing industries -- driven by fierce competition and rising
customer requirements -- are forced to produce a broader range of individual
products of rising quality at the same (or preferably lower) cost. Meeting
these demands implies an even more complex production process and thus also an
appropriately increasing request to its scheduling. Aggravatingly, vagueness of
scheduling parameters -- such as times and conditions -- are often inherent in
the production process. In addition, the search for an optimal schedule
normally leads to very difficult problems (NP-hard problems in the complexity
theoretical sense), which cannot be solved effciently. With the intent to
minimize these problems, the introduced heuristic method combines standard
scheduling methods with fuzzy methods to get a nearly optimal schedule within
an appropriate time considering vagueness adequately.
| [
{
"version": "v1",
"created": "Mon, 12 Jul 2004 14:02:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eiden",
"Wolfgang Anthony",
""
]
] |
cs/0407031 | Pavel Naumov | Pavel Naumov | On Modal Logics of Partial Recursive Functions | null | null | null | null | cs.LO | null | The classical propositional logic is known to be sound and complete with
respect to the set semantics that interprets connectives as set operations. The
paper extends propositional language by a new binary modality that corresponds
to partial recursive function type constructor under the above interpretation.
The cases of deterministic and non-deterministic functions are considered and
for both of them semantically complete modal logics are described and
decidability of these logics is established.
| [
{
"version": "v1",
"created": "Mon, 12 Jul 2004 22:53:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Naumov",
"Pavel",
""
]
] |
cs/0407032 | Darran Nathan | Darran Nathan | Exposing Software Defined Radio Functionality To Native Operating System
Applications via Virtual Devices | 4 pages, 9 figures | null | null | null | cs.AR | null | Many reconfigurable platforms require that applications be written
specifically to take advantage of the reconfigurable hardware. In a PC-based
environment, this presents an undesirable constraint in that the many already
available applications cannot leverage on such hardware. Greatest benefit can
only be derived from reconfigurable devices if even native OS applications can
transparently utilize reconfigurable devices as they would normal full-fledged
hardware devices. This paper presents how Proteus Virtual Devices are used to
expose reconfigurable hardware in a transparent manner for use by typical
native OS applications.
| [
{
"version": "v1",
"created": "Tue, 13 Jul 2004 08:24:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nathan",
"Darran",
""
]
] |
cs/0407035 | Shipra Agrawal | Shipra Agrawal, Jayant R. Haritsa | A Framework for High-Accuracy Privacy-Preserving Mining | null | null | null | TR-2004-02, DSL/SERC, Indian Institute of Science | cs.DB cs.IR | null | To preserve client privacy in the data mining process, a variety of
techniques based on random perturbation of data records have been proposed
recently. In this paper, we present a generalized matrix-theoretic model of
random perturbation, which facilitates a systematic approach to the design of
perturbation mechanisms for privacy-preserving mining. Specifically, we
demonstrate that (a) the prior techniques differ only in their settings for the
model parameters, and (b) through appropriate choice of parameter settings, we
can derive new perturbation techniques that provide highly accurate mining
results even under strict privacy guarantees. We also propose a novel
perturbation mechanism wherein the model parameters are themselves
characterized as random variables, and demonstrate that this feature provides
significant improvements in privacy at a very marginal cost in accuracy.
While our model is valid for random-perturbation-based privacy-preserving
mining in general, we specifically evaluate its utility here with regard to
frequent-itemset mining on a variety of real datasets. The experimental results
indicate that our mechanisms incur substantially lower identity and support
errors as compared to the prior techniques.
| [
{
"version": "v1",
"created": "Thu, 15 Jul 2004 14:30:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Agrawal",
"Shipra",
""
],
[
"Haritsa",
"Jayant R.",
""
]
] |
cs/0407037 | Ambedkar Dukkipati | Ambedkar Dukkipati, M. Narasimha Murty and Shalabh Bhatnagar | Generalized Evolutionary Algorithm based on Tsallis Statistics | Submitted to Physical Review E, 5 pages, 6 figures | null | null | null | cs.AI | null | Generalized evolutionary algorithm based on Tsallis canonical distribution is
proposed. The algorithm uses Tsallis generalized canonical distribution to
weigh the configurations for `selection' instead of Gibbs-Boltzmann
distribution. Our simulation results show that for an appropriate choice of
non-extensive index that is offered by Tsallis statistics, evolutionary
algorithms based on this generalization outperform algorithms based on
Gibbs-Boltzmann distribution.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 2004 06:08:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dukkipati",
"Ambedkar",
""
],
[
"Murty",
"M. Narasimha",
""
],
[
"Bhatnagar",
"Shalabh",
""
]
] |
cs/0407040 | W. J. van Hoeve | W.J. van Hoeve and M. Milano | Decomposition Based Search - A theoretical and experimental evaluation | 16 pages, 8 figures. LIA Technical Report LIA00203, University of
Bologna, 2003 | null | null | null | cs.AI | null | In this paper we present and evaluate a search strategy called Decomposition
Based Search (DBS) which is based on two steps: subproblem generation and
subproblem solution. The generation of subproblems is done through value
ranking and domain splitting. Subdomains are explored so as to generate,
according to the heuristic chosen, promising subproblems first.
We show that two well known search strategies, Limited Discrepancy Search
(LDS) and Iterative Broadening (IB), can be seen as special cases of DBS. First
we present a tuning of DBS that visits the same search nodes as IB, but avoids
restarts. Then we compare both theoretically and computationally DBS and LDS
using the same heuristic. We prove that DBS has a higher probability of being
successful than LDS on a comparable number of nodes, under realistic
assumptions. Experiments on a constraint satisfaction problem and an
optimization problem show that DBS is indeed very effective if compared to LDS.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 2004 13:38:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Hoeve",
"W. J.",
""
],
[
"Milano",
"M.",
""
]
] |
cs/0407041 | W. J. van Hoeve | Willem Jan van Hoeve | Exploiting Semidefinite Relaxations in Constraint Programming | 18 pages, 4 figures. Submitted preprint | null | null | null | cs.DM cs.PL | null | Constraint programming uses enumeration and search tree pruning to solve
combinatorial optimization problems. In order to speed up this solution
process, we investigate the use of semidefinite relaxations within constraint
programming. In principle, we use the solution of a semidefinite relaxation to
guide the traversal of the search tree, using a limited discrepancy search
strategy. Furthermore, a semidefinite relaxation produces a bound for the
solution value, which is used to prune parts of the search tree. Experimental
results on stable set and maximum clique problem instances show that constraint
programming can indeed greatly benefit from semidefinite relaxations.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 2004 14:19:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Hoeve",
"Willem Jan",
""
]
] |
cs/0407042 | W. J. van Hoeve | Willem Jan van Hoeve and Michela Milano | Postponing Branching Decisions | 11 pages, 3 figures | null | null | null | cs.AI | null | Solution techniques for Constraint Satisfaction and Optimisation Problems
often make use of backtrack search methods, exploiting variable and value
ordering heuristics. In this paper, we propose and analyse a very simple method
to apply in case the value ordering heuristic produces ties: postponing the
branching decision. To this end, we group together values in a tie, branch on
this sub-domain, and defer the decision among them to lower levels of the
search tree. We show theoretically and experimentally that this simple
modification can dramatically improve the efficiency of the search strategy.
Although in practise similar methods may have been applied already, to our
knowledge, no empirical or theoretical study has been proposed in the
literature to identify when and to what extent this strategy should be used.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 2004 14:37:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Hoeve",
"Willem Jan",
""
],
[
"Milano",
"Michela",
""
]
] |
cs/0407043 | W. J. van Hoeve | Willem Jan van Hoeve | A Hyper-Arc Consistency Algorithm for the Soft Alldifferent Constraint | 11 pages, 1 figure | null | null | null | cs.PL | null | This paper presents an algorithm that achieves hyper-arc consistency for the
soft alldifferent constraint. To this end, we prove and exploit the equivalence
with a minimum-cost flow problem. Consistency of the constraint can be checked
in O(nm) time, and hyper-arc consistency is achieved in O(m) time, where n is
the number of variables involved and m is the sum of the cardinalities of the
domains. It improves a previous method that did not ensure hyper-arc
consistency.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 2004 14:44:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Hoeve",
"Willem Jan",
""
]
] |
cs/0407044 | W. J. van Hoeve | M. Milano and W.J. van Hoeve | Reduced cost-based ranking for generating promising subproblems | 15 pages, 1 figure. Accepted at CP 2002 | null | null | null | cs.AI | null | In this paper, we propose an effective search procedure that interleaves two
steps: subproblem generation and subproblem solution. We mainly focus on the
first part. It consists of a variable domain value ranking based on reduced
costs. Exploiting the ranking, we generate, in a Limited Discrepancy Search
tree, the most promising subproblems first. An interesting result is that
reduced costs provide a very precise ranking that allows to almost always find
the optimal solution in the first generated subproblem, even if its dimension
is significantly smaller than that of the original problem. Concerning the
proof of optimality, we exploit a way to increase the lower bound for
subproblems at higher discrepancies. We show experimental results on the TSP
and its time constrained variant to show the effectiveness of the proposed
approach, but the technique could be generalized for other problems.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 2004 14:53:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Milano",
"M.",
""
],
[
"van Hoeve",
"W. J.",
""
]
] |
cs/0407045 | Viktor Kuncak | Viktor Kuncak and Martin Rinard | The First-Order Theory of Sets with Cardinality Constraints is Decidable | 18 pages | null | null | MIT CSAIL 958 | cs.LO cs.PL | null | We show that the decidability of the first-order theory of the language that
combines Boolean algebras of sets of uninterpreted elements with Presburger
arithmetic operations. We thereby disprove a recent conjecture that this theory
is undecidable. Our language allows relating the cardinalities of sets to the
values of integer variables, and can distinguish finite and infinite sets. We
use quantifier elimination to show the decidability and obtain an elementary
upper bound on the complexity.
Precise program analyses can use our decidability result to verify
representation invariants of data structures that use an integer field to
represent the number of stored elements.
| [
{
"version": "v1",
"created": "Sat, 17 Jul 2004 04:22:39 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Oct 2004 23:12:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuncak",
"Viktor",
""
],
[
"Rinard",
"Martin",
""
]
] |
cs/0407046 | Wojciech Skut | Wojciech Skut, Stefan Ulrich and Kathrine Hammervold | A Bimachine Compiler for Ranked Tagging Rules | 7 pages, 3 figures Proceedings of COLING 2004 (to appear) | null | null | null | cs.CL | null | This paper describes a novel method of compiling ranked tagging rules into a
deterministic finite-state device called a bimachine. The rules are formulated
in the framework of regular rewrite operations and allow unrestricted regular
expressions in both left and right rule contexts. The compiler is illustrated
by an application within a speech synthesis system.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 2004 11:57:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Skut",
"Wojciech",
""
],
[
"Ulrich",
"Stefan",
""
],
[
"Hammervold",
"Kathrine",
""
]
] |
cs/0407048 | Mark Newman | Justin Balthrop, Stephanie Forrest, M. E. J. Newman, and Matthew M.
Williamson | Technological networks and the spread of computer viruses | 9 pages, 1 figure | Science 304, 527-529 (2004) | null | null | cs.NI cs.CY | null | Computer infections such as viruses and worms spread over networks of
contacts between computers, with different types of networks being exploited by
different types of infections. Here we analyze the structures of several of
these networks, exploring their implications for modes of spread and the
control of infection. We argue that vaccination strategies that focus on a
limited number of network nodes, whether targeted or randomly chosen, are in
many cases unlikely to be effective. An alternative dynamic mechanism for the
control of contagion, called throttling, is introduced and argued to be
effective under a range of conditions.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 2004 21:28:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Balthrop",
"Justin",
""
],
[
"Forrest",
"Stephanie",
""
],
[
"Newman",
"M. E. J.",
""
],
[
"Williamson",
"Matthew M.",
""
]
] |
cs/0407049 | Davy Van Nieuwenborgh | Davy Van Nieuwenborgh and Dirk Vermeir | Preferred Answer Sets for Ordered Logic Programs | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.LO cs.AI | null | We extend answer set semantics to deal with inconsistent programs (containing
classical negation), by finding a ``best'' answer set. Within the context of
inconsistent programs, it is natural to have a partial order on rules,
representing a preference for satisfying certain rules, possibly at the cost of
violating less important ones. We show that such a rule order induces a natural
order on extended answer sets, the minimal elements of which we call preferred
answer sets. We characterize the expressiveness of the resulting semantics and
show that it can simulate negation as failure, disjunction and some other
formalisms such as logic programs with ordered disjunction. The approach is
shown to be useful in several application areas, e.g. repairing database, where
minimal repairs correspond to preferred answer sets.
To appear in Theory and Practice of Logic Programming (TPLP).
| [
{
"version": "v1",
"created": "Mon, 19 Jul 2004 22:37:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Van Nieuwenborgh",
"Davy",
""
],
[
"Vermeir",
"Dirk",
""
]
] |
cs/0407051 | G. Gordon Worley III | G Gordon Worley III | Bug shallowness in open-source, Macintosh software | added description of bug shallowness; corrected abstract (5 pages,
PDF only (no LaTeX)) | Worley III, G Gordon. "Bug shallowness in open-source, Macintosh
software". Advanced Developers Hands On Conference 19. 2004 | null | null | cs.SE | null | Central to the power of open-source software is bug shallowness, the relative
ease of finding and fixing bugs. The open-source movement began with Unix
software, so many users were also programmers capable of finding and fixing
bugs given the source code. But as the open-source movement reaches the
Macintosh platform, bugs may not be shallow because few Macintosh users are
programmers. Based on reports from open-source developers, I, however, conclude
that that bugs are as shallow in open-source, Macintosh software as in any
other open-source software.
| [
{
"version": "v1",
"created": "Tue, 20 Jul 2004 13:04:36 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jul 2004 23:08:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Worley",
"G Gordon",
"III"
]
] |
cs/0407055 | Marco Pedicini | M. Pedicini, F. Quaglia | PELCR: Parallel Environment for Optimal Lambda-Calculus Reduction | null | null | null | null | cs.LO cs.DC | null | In this article we present the implementation of an environment supporting
L\'evy's \emph{optimal reduction} for the $\lambda$-calculus \cite{Lev78} on
parallel (or distributed) computing systems. In a similar approach to Lamping's
one in \cite{Lamping90}, we base our work on a graph reduction technique known
as \emph{directed virtual reduction} \cite{DPR97} which is actually a
restriction of Danos-Regnier virtual reduction \cite{DanosRegnier93}.
The environment, which we refer to as PELCR (Parallel Environment for optimal
Lambda-Calculus Reduction) relies on a strategy for directed virtual reduction,
namely {\em half combustion}, which we introduce in this article. While
developing PELCR we have adopted both a message aggregation technique, allowing
a reduction of the communication overhead, and a fair policy for distributing
dynamically originated load among processors.
We also present an experimental study demonstrating the ability of PELCR to
definitely exploit parallelism intrinsic to $\lambda$-terms while performing
the reduction. By the results we show how PELCR allows achieving up to 70/80%
of the ideal speedup on last generation multiprocessor computing systems. As a
last note, the software modules have been developed with the {\tt C} language
and using a standard interface for message passing, i.e. MPI, thus making PELCR
itself a highly portable software package.
| [
{
"version": "v1",
"created": "Thu, 22 Jul 2004 17:52:39 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jul 2004 10:53:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pedicini",
"M.",
""
],
[
"Quaglia",
"F.",
""
]
] |
cs/0407056 | John Watrous | Bill Rosgen and John Watrous | On the hardness of distinguishing mixed-state quantum computations | 17 pages | null | null | null | cs.CC quant-ph | null | This paper considers the following problem. Two mixed-state quantum circuits
Q and R are given, and the goal is to determine which of two possibilities
holds: (i) Q and R act nearly identically on all possible quantum state inputs,
or (ii) there exists some input state that Q and R transform into almost
perfectly distinguishable outputs. This problem may be viewed as an abstraction
of the following problem: given two physical processes described by sequences
of local interactions, are the processes effectively the same or are they
different? We prove that this problem is a complete promise problem for the
class QIP of problems having quantum interactive proof systems, and is
therefore PSPACE-hard. This is in sharp contrast to the fact that the analogous
problem for classical (probabilistic) circuits is in AM, and for unitary
quantum circuits is in QMA.
| [
{
"version": "v1",
"created": "Thu, 22 Jul 2004 20:45:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rosgen",
"Bill",
""
],
[
"Watrous",
"John",
""
]
] |
cs/0407058 | Sandor P. Fekete | Michael A. Bender, David P. Bunde, Erik D. Demaine, Sandor P. Fekete,
Vitus J. Leung, Henk Meijer and Cynthia A. Phillips | Communication-Aware Processor Allocation for Supercomputers | 19 pages, 7 figures, 1 table, Latex, submitted for journal
publication. Previous version is extended abstract (14 pages), appeared in
Proceedings WADS, Springer LNCS 3608, pp. 169-181 | null | null | null | cs.DS cs.DC | null | This paper gives processor-allocation algorithms for minimizing the average
number of communication hops between the assigned processors for grid
architectures, in the presence of occupied cells. The simpler problem of
assigning processors on a free grid has been studied by Karp, McKellar, and
Wong who show that the solutions have nontrivial structure; they left open the
complexity of the problem.
The associated clustering problem is as follows: Given n points in Re^d, find
k points that minimize their average pairwise L1 distance. We present a natural
approximation algorithm and show that it is a 7/4-approximation for 2D grids.
For d-dimensional space, the approximation guarantee is 2-(1/2d), which is
tight. We also give a polynomial-time approximation scheme (PTAS) for constant
dimension d, and report on experimental results.
| [
{
"version": "v1",
"created": "Sat, 24 Jul 2004 13:40:26 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Dec 2005 13:30:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bender",
"Michael A.",
""
],
[
"Bunde",
"David P.",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Leung",
"Vitus J.",
""
],
[
"Meijer",
"Henk",
""
],
[
"Phillips",
"Cynthia A.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.