id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0405097
Riccardo Pucella
Hubie Chen, Riccardo Pucella
A Coalgebraic Approach to Kleene Algebra with Tests
21 pages, 1 figure; preliminary version appeared in Proc. Workshop on Coalgebraic Methods in Computer Science (CMCS'03)
Theoretical Computer Science, 327 (1-2), 23-44 (2004)
null
null
cs.LO cs.PL
null
Kleene algebra with tests is an extension of Kleene algebra, the algebra of regular expressions, which can be used to reason about programs. We develop a coalgebraic theory of Kleene algebra with tests, along the lines of the coalgebraic theory of regular expressions based on deterministic automata. Since the known automata-theoretic presentation of Kleene algebra with tests does not lend itself to a coalgebraic theory, we define a new interpretation of Kleene algebra with tests expressions and a corresponding automata-theoretic presentation. One outcome of the theory is a coinductive proof principle, that can be used to establish equivalence of our Kleene algebra with tests expressions.
[ { "version": "v1", "created": "Wed, 26 May 2004 16:49:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hubie", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0405098
Riccardo Pucella
Joseph Y. Halpern, Riccardo Pucella
A Logic for Reasoning about Evidence
34 pages. A preliminary version appeared in Proc. 19th Conference on Uncertainty in Artificial Intelligence (UAI'03)
Journal of Artificial Intelligence Research 26, pp. 1-34, 2006
null
null
cs.AI cs.LO
null
We introduce a logic for reasoning about evidence that essentially views evidence as a function from prior beliefs (before making an observation) to posterior beliefs (after making the observation). We provide a sound and complete axiomatization for the logic, and consider the complexity of the decision problem. Although the reasoning in the logic is mainly propositional, we allow variables representing numbers and quantification over them. This expressive power seems necessary to capture important properties of evidence.
[ { "version": "v1", "created": "Wed, 26 May 2004 17:08:38 GMT" }, { "version": "v2", "created": "Tue, 5 Jul 2005 16:19:35 GMT" }, { "version": "v3", "created": "Thu, 3 Aug 2006 17:42:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0405099
Liang Wang
Wang Liang, Guo YiPing, Fang Ming
Web search engine based on DNS
9 pages,2 figures
null
null
null
cs.NI cs.IR
null
Now no web search engine can cover more than 60 percent of all the pages on Internet. The update interval of most pages database is almost one month. This condition hasn't changed for many years. Converge and recency problems have become the bottleneck problem of current web search engine. To solve these problems, a new system, search engine based on DNS is proposed in this paper. This system adopts the hierarchical distributed architecture like DNS, which is different from any current commercial search engine. In theory, this system can cover all the web pages on Internet. Its update interval could even be one day. The original idea, detailed content and implementation of this system all are introduced in this paper.
[ { "version": "v1", "created": "Thu, 27 May 2004 02:36:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Liang", "Wang", "" ], [ "YiPing", "Guo", "" ], [ "Ming", "Fang", "" ] ]
cs/0405101
Jiang Qiu
Samir Genaim, Michael Codish, Jacob M. Howe
Worst-Case Groundness Analysis Using Definite Boolean Functions
Appeared in Theory and Practice of Logic Programming, vol. 1, no. 5, 2001
Theory and Practice of Logic Programming, vol. 1, no. 5, 2001
null
null
cs.PL
null
This note illustrates theoretical worst-case scenarios for groundness analyses obtained through abstract interpretation over the abstract domains of definite (Def) and positive (Pos) Boolean functions. For Def, an example is given for which any Def-based abstract interpretation for groundness analysis follows a chain which is exponential in the number of argument positions as well as in the number of clauses but sub-exponential in the size of the program. For Pos, we strengthen a previous result by illustrating an example for which any Pos-based abstract interpretation for groundness analysis follows a chain which is exponential in the size of the program. It remains an open problem to determine if the worst case for Def is really as bad as that for Pos.
[ { "version": "v1", "created": "Thu, 27 May 2004 02:56:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Genaim", "Samir", "" ], [ "Codish", "Michael", "" ], [ "Howe", "Jacob M.", "" ] ]
cs/0405102
Jiang Qiu
Francisco Javier Lopez-Fraguas, Jaime Sanchez-Hernandez
A Proof Theoretic Approach to Failure in Functional Logic Programming
Appeared in Theory and Practice of Logic Programming, vol. 4, no. 1&2, 2004
Theory and Practice of Logic Programming, vol. 4, no. 1&2, 2004
null
null
cs.PL
null
How to extract negative information from programs is an important issue in logic programming. Here we address the problem for functional logic programs, from a proof-theoretic perspective. The starting point of our work is CRWL (Constructor based ReWriting Logic), a well established theoretical framework for functional logic programming, whose fundamental notion is that of non-strict non-deterministic function. We present a proof calculus, CRWLF, which is able to deduce negative information from CRWL-programs. In particular, CRWLF is able to prove finite failure of reduction within CRWL.
[ { "version": "v1", "created": "Thu, 27 May 2004 03:08:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Lopez-Fraguas", "Francisco Javier", "" ], [ "Sanchez-Hernandez", "Jaime", "" ] ]
cs/0405103
Jiang Qiu
R.S. Lazic, T.C. Newcomb, A.W. Roscoe
On model checking data-independent systems with arrays without reset
Appeared in Theory and Practice of Logic Programming, vol. 4, no. 5&6, 2004
Theory and Practice of Logic Programming, vol. 4, no. 5&6, 2004
null
null
cs.LO
null
A system is data-independent with respect to a data type X iff the operations it can perform on values of type X are restricted to just equality testing. The system may also store, input and output values of type X. We study model checking of systems which are data-independent with respect to two distinct type variables X and Y, and may in addition use arrays with indices from X and values from Y . Our main interest is the following parameterised model-checking problem: whether a given program satisfies a given temporal-logic formula for all non-empty nite instances of X and Y . Initially, we consider instead the abstraction where X and Y are infinite and where partial functions with finite domains are used to model arrays. Using a translation to data-independent systems without arrays, we show that the u-calculus model-checking problem is decidable for these systems. From this result, we can deduce properties of all systems with finite instances of X and Y . We show that there is a procedure for the above parameterised model-checking problem of the universal fragment of the u-calculus, such that it always terminates but may give false negatives. We also deduce that the parameterised model-checking problem of the universal disjunction-free fragment of the u-calculus is decidable. Practical motivations for model checking data-independent systems with arrays include verification of memory and cache systems, where X is the type of memory addresses, and Y the type of storable values. As an example we verify a fault-tolerant memory interface over a set of unreliable memories.
[ { "version": "v1", "created": "Thu, 27 May 2004 03:25:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Lazic", "R. S.", "" ], [ "Newcomb", "T. C.", "" ], [ "Roscoe", "A. W.", "" ] ]
cs/0405105
Muhammad Nadeem Prof
Muhammad Nadeem, Javaid R. Laghari (Szabist, Karachi)
Study of Pakistan Election System as Intelligent e-Election
6 pages
null
null
null
cs.CY
null
The proposed election system lies in ensuring that it is transparent and impartial.Thus while the electoral system may vary from country to country, It has to take into account the peculiarities of every society while at the same time incorporating remedies to problems prevailing in the system. The Electoral process expressed serious concerns regarding the independence of the Election Commission of Pakistan, the restrictions on political parties and their candidates, the misuse of state resources, some unbalanced coverage in the state media, deficiencies in the compilation of the voting register and significant problems relating to the provision of ID cards. The holding of a general election does not in itself guarantee the restoration of democracy. The unjustified interference with electoral arrangements, as detailed above, irrespective of the alleged motivation, resulted in serious flaws being inflicted on the electoral process. Additionally, questions remain as to whether or not there will be a full transfer of power from a military to civilian administration. The Independent study research has following modules: Login/Subscription Module Candidate Subscription Module Vote casting Module Administration Module Intelligent decision data analysis Module
[ { "version": "v1", "created": "Thu, 27 May 2004 13:46:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Nadeem", "Muhammad", "", "Szabist, Karachi" ], [ "Laghari", "Javaid R.", "", "Szabist, Karachi" ] ]
cs/0405107
Carlos Ches\~nevar
Carlos Iv\'an Ches\~nevar and Guillermo Ricardo Simari
A Framework for Combining Defeasible Argumentation with Labeled Deduction
15 pages, presented at CMSRA Workshop 2003. Buenos Aires, Argentina
In "Computer Modeling of Scientific Reasoning" (C.Delrieux, J.Legris, Eds.). Pp. 43-56, Ed. Ediuns, Argentina, 2003. ISBN 987-89281-89-6
null
null
cs.AI cs.SC
null
In the last years, there has been an increasing demand of a variety of logical systems, prompted mostly by applications of logic in AI and other related areas. Labeled Deductive Systems (LDS) were developed as a flexible methodology to formalize such a kind of complex logical systems. Defeasible argumentation has proven to be a successful approach to formalizing commonsense reasoning, encompassing many other alternative formalisms for defeasible reasoning. Argument-based frameworks share some common notions (such as the concept of argument, defeater, etc.) along with a number of particular features which make it difficult to compare them with each other from a logical viewpoint. This paper introduces LDSar, a LDS for defeasible argumentation in which many important issues concerning defeasible argumentation are captured within a unified logical framework. We also discuss some logical properties and extensions that emerge from the proposed framework.
[ { "version": "v1", "created": "Thu, 27 May 2004 18:54:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Chesñevar", "Carlos Iván", "" ], [ "Simari", "Guillermo Ricardo", "" ] ]
cs/0405108
Paul M. Aoki
Paul M. Aoki and Allison Woodruff
"User Interfaces" and the Social Negotiation of Availability
3 pages
Workshop on Forecasting Presence and Availability, ACM SIGCHI Conf. on Human Factors in Computing Systems (CHI 2004), Vienna, Austria, Apr. 2004.
null
null
cs.HC
null
In current presence or availability systems, the method of presenting a user's state often supposes an instantaneous notion of that state - for example, a visualization is rendered or an inference is made about the potential actions that might be consistent with a user's state. Drawing on observational research on the use of existing communication technology, we argue (as have others in the past) that determination of availability is often a joint process, and often one that takes the form of a negotiation (whether implicit or explicit). We briefly describe our current research on applying machine learning to infer degrees of conversational engagement from observed conversational behavior. Such inferences can be applied to facilitate the implicit negotiation of conversational engagement - in effect, helping users to weave together the act of contact with the act of determining availability.
[ { "version": "v1", "created": "Fri, 28 May 2004 02:53:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Aoki", "Paul M.", "" ], [ "Woodruff", "Allison", "" ] ]
cs/0405109
Paul M. Aoki
Allison Woodruff and Paul M. Aoki
Conversation Analysis and the User Experience
4 pages
Workshop on Exploring Experience Methods Across Disciplines, ACM SIGCHI Conf. on Human Factors in Computing Systems (CHI 2004), Vienna, Austria, Apr. 2004.
null
null
cs.HC
null
We provide two case studies in the application of ideas drawn from conversation analysis to the design of technologies that enhance the experience of human conversation. We first present a case study of the design of an electronic guidebook, focusing on how conversation analytic principles played a role in the design process. We then discuss how the guidebook project has inspired our continuing work in social, mobile audio spaces. In particular, we describe some as yet unrealized concepts for adaptive audio spaces.
[ { "version": "v1", "created": "Fri, 28 May 2004 02:59:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Woodruff", "Allison", "" ], [ "Aoki", "Paul M.", "" ] ]
cs/0405110
Gopal Ananthraman
Gopal Ananthraman
An analysis of a bounded resource search puzzle
4 Pages
null
null
null
cs.DS cs.DM
null
Consider the commonly known puzzle, given $k$ glass balls, find an optimal algorithm to determine the lowest floor of a building of $n$ floors from which a thrown glass ball will break. This puzzle was originally posed in its original form in \cite{focs1980}and was later cited in the book \cite{algthc}. There are several internet sites that presents this puzzle and its solution to the special case of $k=2$ balls. This is the first such analysis of the puzzle in its general form. Several variations of this puzzle have been studied with applications in Network Loading \cite{cgstctl} which analyzes a case similar to a scenario where an adversary is changing the lowest floor with time. Although the algorithm specified in \cite{algthc} solves the problem, it is not an efficient algorithm. In this paper another algorithm for the same problem is analyzed. It is shown that if $m$ is the minimum number of attempts required then for $k \geq m$ we have $m = \log (n+1)$ and for $k < m$ we have, $1 + \sum_{i=1}^{k}{{m-1}\choose{i}} < n \leq \sum_{i=1}^{k}{{m}\choose{i}}$
[ { "version": "v1", "created": "Fri, 28 May 2004 21:26:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Ananthraman", "Gopal", "" ] ]
cs/0405111
T. J. Giuli
T.J. Giuli, Petros Maniatis, Mary Baker, David S. H. Rosenthal, Mema Roussopoulos
Attrition Defenses for a Peer-to-Peer Digital Preservation System
14 pages, 8 figures. version 2: Reworked the paper according to reviews. Expanded the evaluation section with experiments with more AUs
null
null
null
cs.CR
null
In peer-to-peer systems, attrition attacks include both traditional, network-level denial of service attacks as well as application-level attacks in which malign peers conspire to waste loyal peers' resources. We describe several defenses for LOCKSS, a peer-to-peer digital preservation system, that help ensure that application-level attacks even from powerful adversaries are less effective than simple network-level attacks, and that network-level attacks must be intense, wide-spread, and prolonged to impair the system.
[ { "version": "v1", "created": "Fri, 28 May 2004 22:47:09 GMT" }, { "version": "v2", "created": "Sat, 27 Nov 2004 18:30:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Giuli", "T. J.", "" ], [ "Maniatis", "Petros", "" ], [ "Baker", "Mary", "" ], [ "Rosenthal", "David S. H.", "" ], [ "Roussopoulos", "Mema", "" ] ]
cs/0405113
Andrea Severe
Andrea Severe
A proposal to design expert system for the calculations in the domain of QFT
null
null
null
null
cs.AI
null
Main purposes of the paper are followings: 1) To show examples of the calculations in domain of QFT via ``derivative rules'' of an expert system; 2) To consider advantages and disadvantage that technology of the calculations; 3) To reflect about how one would develop new physical theories, what knowledge would be useful in their investigations and how this problem can be connected with designing an expert system.
[ { "version": "v1", "created": "Mon, 31 May 2004 10:50:23 GMT" }, { "version": "v2", "created": "Tue, 1 Jun 2004 11:59:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Severe", "Andrea", "" ] ]
cs/0406002
Thomas Fischbacher
Thomas Fischbacher
A novel approach to symbolic algebra
15 pages
null
null
AEI-2004-043
cs.SC
null
A prototype for an extensible interactive graphical term manipulation system is presented that combines pattern matching and nondeterministic evaluation to provide a convenient framework for doing tedious algebraic manipulations that so far had to be done manually in a semi-automatic fashion.
[ { "version": "v1", "created": "Wed, 2 Jun 2004 12:13:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Fischbacher", "Thomas", "" ] ]
cs/0406004
Muhammad Nadeem Prof
Muhammad Nadeem and Syed Ata Hussain Jaffri (Szabist)
Application of Business Intelligence In Banks (Pakistan)
6 Pages
null
null
null
cs.DB
null
The financial services industry is rapidly changing. Factors such as globalization, deregulation, mergers and acquisitions, competition from non-financial institutions, and technological innovation, have forced companies to re-think their business.Many large companies have been using Business Intelligence (BI) computer software for some years to help them gain competitive advantage. With the introduction of cheaper and more generalized products to the market place BI is now in the reach of smaller and medium sized companies. Business Intelligence is also known as knowledge management, management information systems (MIS), Executive information systems (EIS) and On-line analytical Processing (OLAP).
[ { "version": "v1", "created": "Wed, 2 Jun 2004 12:55:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Nadeem", "Muhammad", "", "Szabist" ], [ "Jaffri", "Syed Ata Hussain", "", "Szabist" ] ]
cs/0406005
George Candea
George Candea, Shinichi Kawamoto, Yuichi Fujiki, Greg Friedman, Armando Fox
Microreboot -- A Technique for Cheap Recovery
14 pages
Proc. 6th Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, Dec 2004
null
null
cs.OS cs.DC
null
A significant fraction of software failures in large-scale Internet systems are cured by rebooting, even when the exact failure causes are unknown. However, rebooting can be expensive, causing nontrivial service disruption or downtime even when clusters and failover are employed. In this work we separate process recovery from data recovery to enable microrebooting -- a fine-grain technique for surgically recovering faulty application components, without disturbing the rest of the application. We evaluate microrebooting in an Internet auction system running on an application server. Microreboots recover most of the same failures as full reboots, but do so an order of magnitude faster and result in an order of magnitude savings in lost work. This cheap form of recovery engenders a new approach to high availability: microreboots can be employed at the slightest hint of failure, prior to node failover in multi-node clusters, even when mistakes in failure detection are likely; failure and recovery can be masked from end users through transparent call-level retries; and systems can be rejuvenated by parts, without ever being shut down.
[ { "version": "v1", "created": "Wed, 2 Jun 2004 21:54:50 GMT" }, { "version": "v2", "created": "Thu, 3 Jun 2004 20:02:07 GMT" }, { "version": "v3", "created": "Tue, 12 Oct 2004 05:43:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Candea", "George", "" ], [ "Kawamoto", "Shinichi", "" ], [ "Fujiki", "Yuichi", "" ], [ "Friedman", "Greg", "" ], [ "Fox", "Armando", "" ] ]
cs/0406006
Edith Hemaspaandra
Edith Hemaspaandra
Dichotomy Theorems for Alternation-Bounded Quantified Boolean Formulas
null
null
null
null
cs.CC cs.LO
null
In 1978, Schaefer proved his famous dichotomy theorem for generalized satisfiability problems. He defined an infinite number of propositional satisfiability problems, showed that all these problems are either in P or NP-complete, and gave a simple criterion to determine which of the two cases holds. This result is surprising in light of Ladner's theorem, which implies that there are an infinite number of complexity classes between P and NP-complete (under the assumption that P is not equal to NP). Schaefer also stated a dichotomy theorem for quantified generalized Boolean formulas, but this theorem was only recently proven by Creignou, Khanna, and Sudan, and independently by Dalmau: Determining truth of quantified Boolean formulas is either PSPACE-complete or in P. This paper looks at alternation-bounded quantified generalized Boolean formulas. In their unrestricted forms, these problems are the canonical problems complete for the levels of the polynomial hierarchy. In this paper, we prove dichotomy theorems for alternation-bounded quantified generalized Boolean formulas, by showing that these problems are either $\Sigma_i^p$-complete or in P, and we give a simple criterion to determine which of the two cases holds. This is the first result that obtains dichotomy for an infinite number of classes at once.
[ { "version": "v1", "created": "Wed, 2 Jun 2004 23:17:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ] ]
cs/0406007
Jiri Ocenasek
Jiri Ocenasek, Martin Pelikan
Parallel Mixed Bayesian Optimization Algorithm: A Scaleup Analysis
Optimization by Building and Using Probabilistic Models OBUPM-2004
null
null
null
cs.NE cs.DC
null
Estimation of Distribution Algorithms have been proposed as a new paradigm for evolutionary optimization. This paper focuses on the parallelization of Estimation of Distribution Algorithms. More specifically, the paper discusses how to predict performance of parallel Mixed Bayesian Optimization Algorithm (MBOA) that is based on parallel construction of Bayesian networks with decision trees. We determine the time complexity of parallel Mixed Bayesian Optimization Algorithm and compare this complexity with experimental results obtained by solving the spin glass optimization problem. The empirical results fit well the theoretical time complexity, so the scalability and efficiency of parallel Mixed Bayesian Optimization Algorithm for unknown instances of spin glass benchmarks can be predicted. Furthermore, we derive the guidelines that can be used to design effective parallel Estimation of Distribution Algorithms with the speedup proportional to the number of variables in the problem.
[ { "version": "v1", "created": "Thu, 3 Jun 2004 15:43:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Ocenasek", "Jiri", "" ], [ "Pelikan", "Martin", "" ] ]
cs/0406008
Vyacheslav Zavadsky
Vyacheslav Zavadsky
Image compression by rectangular wavelet transform
null
null
null
null
cs.CV
null
We study image compression by a separable wavelet basis $\big\{\psi(2^{k_1}x-i)\psi(2^{k_2}y-j),$ $\phi(x-i)\psi(2^{k_2}y-j),$ $\psi(2^{k_1}(x-i)\phi(y-j),$ $\phi(x-i)\phi(y-i)\big\},$ where $k_1, k_2 \in \mathbb{Z}_+$; $i,j\in\mathbb{Z}$; and $\phi,\psi$ are elements of a standard biorthogonal wavelet basis in $L_2(\mathbb{R})$. Because $k_1\ne k_2$, the supports of the basis elements are rectangles, and the corresponding transform is known as the {\em rectangular wavelet transform}. We prove that if one-dimensional wavelet basis has $M$ dual vanishing moments then the rate of approximation by $N$ coefficients of rectangular wavelet transform is $\mathcal{O}(N^{-M}\log^C N)$ for functions with mixed derivative of order $M$ in each direction. The square wavelet transform yields the approximation rate is $\mathcal{O}(N^{-M/2})$ for functions with all derivatives of the total order $M$. Thus, the rectangular wavelet transform can outperform the square one if an image has a mixed derivative. We provide experimental comparison of image compression which shows that rectangular wavelet transform outperform the square one.
[ { "version": "v1", "created": "Fri, 4 Jun 2004 12:28:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Zavadsky", "Vyacheslav", "" ] ]
cs/0406009
Jean-Philippe Rennard
J.-P. Rennard
Implementation of Logical Functions in the Game of Life
17 pages, 28 figures
Rennard, J.-P. (2002). Implementation of Logical Functions in the Game of Life. In A. Adamatzky (Ed.), Collision-Based Computing (pp. 491-512). London: Springer
null
null
cs.CC
null
The Game of Life cellular automaton is a classical example of a massively parallel collision-based computing device. The automaton exhibits mobile patterns, gliders, and generators of the mobile patterns, glider guns, in its evolution. We show how to construct the basic logical operations, AND, OR, NOT in space-time configurations of the cellular automaton. Also decomposition of complicated Boolean functions is discussed. Advantages of our technique are demonstrated on an example of binary adder, realized via collision of glider streams.
[ { "version": "v1", "created": "Fri, 4 Jun 2004 14:53:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Rennard", "J. -P.", "" ] ]
cs/0406010
Yidong Sun
Yidong Sun
Another Proof of an Extension of a Curious Identity
3 pages
null
null
null
cs.DM
null
Based on Jensen formulae and the second kind of Chebyshev polynomials, another proof is presented for an extension of a curious binomial identity due to Z. W. Sun and K. J. Wu.
[ { "version": "v1", "created": "Sun, 6 Jun 2004 09:34:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Sun", "Yidong", "" ] ]
cs/0406012
Jiang Qiu
Seng Wai Loke, Andrew Davison
Secure Prolog-Based Mobile Code
Appeared in Theory and Practice of Logic Programming, vol. 1, no. 3, 2001
Theory and Practice of Logic Programming, vol. 1, no. 3, 2001
null
null
cs.PL
null
LogicWeb mobile code consists of Prolog-like rules embedded in Web pages, thereby adding logic programming behaviour to those pages. Since LogicWeb programs are downloaded from foreign hosts and executed locally, there is a need to protect the client from buggy or malicious code. A security model is crucial for making LogicWeb mobile code safe to execute. This paper presents such a model, which supports programs of varying trust levels by using different resource access policies. The implementation of the model derives from an extended operational semantics for the LogicWeb language, which provides a precise meaning of safety.
[ { "version": "v1", "created": "Mon, 7 Jun 2004 07:01:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Loke", "Seng Wai", "" ], [ "Davison", "Andrew", "" ] ]
cs/0406013
Ester Zumpano
G. Greco, S. Greco, I. Trubtsyna, E. Zumpano
Optimization of Bound Disjunctive Queries with Constraints
35 pages
null
null
null
cs.LO
null
"To Appear in Theory and Practice of Logic Programming (TPLP)" This paper presents a technique for the optimization of bound queries over disjunctive deductive databases with constraints. The proposed approach is an extension of the well-known Magic-Set technique and is well-suited for being integrated in current bottom-up (stable) model inference engines. More specifically, it is based on the exploitation of binding propagation techniques which reduce the size of the data relevant to answer the query and, consequently, reduces both the complexity of computing a single model and the number of models to be considered. The motivation of this work stems from the observation that traditional binding propagation optimization techniques for bottom-up model generator systems, simulating the goal driven evaluation of top-down engines, are only suitable for positive (disjunctive) queries, while hard problems are expressed using unstratified negation. The main contribution of the paper consists in the extension of a previous technique, defined for positive disjunctive queries, to queries containing both disjunctive heads and constraints (a simple and expressive form of unstratified negation). As the usual way of expressing declaratively hard problems is based on the guess-and-check technique, where the guess part is expressed by means of disjunctive rules and the check part is expressed by means of constraints, the technique proposed here is highly relevant for the optimization of queries expressing hard problems. The value of the technique has been proved by several experiments.
[ { "version": "v1", "created": "Mon, 7 Jun 2004 12:13:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Greco", "G.", "" ], [ "Greco", "S.", "" ], [ "Trubtsyna", "I.", "" ], [ "Zumpano", "E.", "" ] ]
cs/0406014
Jiang Qiu
Richard A. O'Keefe
O(1) Reversible Tree Navigation Without Cycles
Appeared in Theory and Practice of Logic Programming, vol. 1, no. 5, 2001
Theory and Practice of Logic Programming, vol. 1, no. 5, 2001
null
null
cs.PL
null
Imperative programmers often use cyclically linked trees in order to achieve O(1) navigation time to neighbours. Some logic programmers believe that cyclic terms are necessary to achieve the same in logic-based languages. An old but little-known technique provides O(1) time and space navigation without cyclic links, in the form of reversible predicates. A small modification provides O(1) amortised time and space editing.
[ { "version": "v1", "created": "Mon, 7 Jun 2004 14:04:48 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Keefe", "Richard A.", "" ] ]
cs/0406015
Damian H. Zanette
Damian H. Zanette
Zipf's law and the creation of musical context
null
null
null
null
cs.CL cond-mat.stat-mech
null
This article discusses the extension of the notion of context from linguistics to the domain of music. In language, the statistical regularity known as Zipf's law -which concerns the frequency of usage of different words- has been quantitatively related to the process of text generation. This connection is established by Simon's model, on the basis of a few assumptions regarding the accompanying creation of context. Here, it is shown that the statistics of note usage in musical compositions are compatible with the predictions of Simon's model. This result, which gives objective support to the conceptual likeness of context in language and music, is obtained through automatic analysis of the digital versions of several compositions. As a by-product, a quantitative measure of context definiteness is introduced and used to compare tonal and atonal works.
[ { "version": "v1", "created": "Mon, 7 Jun 2004 17:52:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Zanette", "Damian H.", "" ] ]
cs/0406016
Christoph Koch
Christoph Koch, Stefanie Scherzinger, Nicole Schweikardt, Bernhard Stegmaier
Schema-based Scheduling of Event Processors and Buffer Minimization for Queries on Structured Data Streams
14 pages, 4 figures, to appear in Proc. 30th VLDB 2004, Toronto, Canada. Extended version
null
null
null
cs.DB
null
We introduce an extension of the XQuery language, FluX, that supports event-based query processing and the conscious handling of main memory buffers. Purely event-based queries of this language can be executed on streaming XML data in a very direct way. We then develop an algorithm that allows to efficiently rewrite XQueries into the event-based FluX language. This algorithm uses order constraints from a DTD to schedule event handlers and to thus minimize the amount of buffering required for evaluating a query. We discuss the various technical aspects of query optimization and query evaluation within our framework. This is complemented with an experimental evaluation of our approach.
[ { "version": "v1", "created": "Mon, 7 Jun 2004 20:45:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Koch", "Christoph", "" ], [ "Scherzinger", "Stefanie", "" ], [ "Schweikardt", "Nicole", "" ], [ "Stegmaier", "Bernhard", "" ] ]
cs/0406017
Stephen Luttrell
Stephen Luttrell
Using Self-Organising Mappings to Learn the Structure of Data Manifolds
26 pages, 19 figures, version 1 translated into LaTeX
null
null
null
cs.NE cs.CV
null
In this paper it is shown how to map a data manifold into a simpler form by progressively discarding small degrees of freedom. This is the key to self-organising data fusion, where the raw data is embedded in a very high-dimensional space (e.g. the pixel values of one or more images), and the requirement is to isolate the important degrees of freedom which lie on a low-dimensional manifold. A useful advantage of the approach used in this paper is that the computations are arranged as a feed-forward processing chain, where all the details of the processing in each stage of the chain are learnt by self-organisation. This approach is demonstrated using hierarchically correlated data, which causes the processing chain to split the data into separate processing channels, and then to progressively merge these channels wherever they are correlated with each other. This is the key to self-organising data fusion.
[ { "version": "v1", "created": "Tue, 8 Jun 2004 14:45:45 GMT" }, { "version": "v2", "created": "Sun, 22 Aug 2004 15:06:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Luttrell", "Stephen", "" ] ]
cs/0406018
Alexei Eremin A.
A. A. Eremin
Effects of wireless computing technology
HTML, also available at http://verystrangeplace.com/
null
null
null
cs.OH
null
Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a set of operations that must be carried out efficiently on demand. This paper summarizes technological changes that are underway and describes their impact on wireless computing development and implementation. It also describes the applications that influence the development and implementation of wireless computing and shows what current systems offer.
[ { "version": "v1", "created": "Fri, 11 Jun 2004 11:33:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Eremin", "A. A.", "" ] ]
cs/0406019
Nicolas Christin
Victor Firoiu, Xiaohui Zhang, Emre Gunduzhan, Nicolas Christin
Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing
30 pages, 9 figures. Shorter preliminary version appeared in Proceedings of Hot Interconnects X, Stanford CA, August 2002
null
null
null
cs.NI
null
We consider the problem of providing service guarantees in a high-speed packet switch. As basic requirements, the switch should be scalable to high speeds per port, a large number of ports and a large number of traffic flows with independent guarantees. Existing scalable solutions are based on Virtual Output Queuing, which is computationally complex when required to provide service guarantees for a large number of flows. We present a novel architecture for packet switching that provides support for such service guarantees. A cost-effective fabric with small external speedup is combined with a feedback mechanism that enables the fabric to be virtually lossless, thus avoiding packet drops indiscriminate of flows. Through analysis and simulation, we show that this architecture provides accurate support for service guarantees, has low computational complexity and is scalable to very high port speeds.
[ { "version": "v1", "created": "Sat, 12 Jun 2004 03:27:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Firoiu", "Victor", "" ], [ "Zhang", "Xiaohui", "" ], [ "Gunduzhan", "Emre", "" ], [ "Christin", "Nicolas", "" ] ]
cs/0406020
David Eppstein
David Eppstein
Algorithms for Drawing Media
13 pages, 11 figures
null
null
null
cs.DS cs.CG
null
We describe algorithms for drawing media, systems of states, tokens and actions that have state transition graphs in the form of partial cubes. Our algorithms are based on two principles: embedding the state transition graph in a low-dimensional integer lattice and projecting the lattice onto the plane, or drawing the medium as a planar graph with centrally symmetric faces.
[ { "version": "v1", "created": "Wed, 16 Jun 2004 00:49:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
cs/0406021
Alexandre d'Aspremont
Alexandre d'Aspremont, Laurent El Ghaoui, Michael I. Jordan, Gert R. G. Lanckriet
A direct formulation for sparse PCA using semidefinite programming
Final version, to appear in SIAM review
null
null
Working paper: UCB//CSD-04-1330
cs.CE
null
We examine the problem of approximating, in the Frobenius-norm sense, a positive, semidefinite symmetric matrix by a rank-one matrix, with an upper bound on the cardinality of its eigenvector. The problem arises in the decomposition of a covariance matrix into sparse factors, and has wide applications ranging from biology to finance. We use a modification of the classical variational representation of the largest eigenvalue of a symmetric matrix, where cardinality is constrained, and derive a semidefinite programming based relaxation for our problem. We also discuss Nesterov's smooth minimization technique applied to the SDP arising in the direct sparse PCA method.
[ { "version": "v1", "created": "Wed, 16 Jun 2004 01:23:03 GMT" }, { "version": "v2", "created": "Thu, 14 Oct 2004 15:14:14 GMT" }, { "version": "v3", "created": "Sat, 20 May 2006 14:25:21 GMT" } ]
2007-05-23T00:00:00
[ [ "d'Aspremont", "Alexandre", "" ], [ "Ghaoui", "Laurent El", "" ], [ "Jordan", "Michael I.", "" ], [ "Lanckriet", "Gert R. G.", "" ] ]
cs/0406022
Chris Kimble
David King and Chris Kimble
Uncovering the epistemological and ontological assumptions of software designers
9 pages
Proceedings 9e colloque de l'AIM, Evry, France, May 2004
null
null
cs.SE cs.GL
null
The ontological and epistemological positions adopted by information systems design methods are incommensur-able when pushed to their extremes. Information systems research has therefore tended to focus on the similarities between different positions, usually in search of a single, unifying position. However, by focusing on the similari-ties, the clarity of argument provided by any one philoso-phical position is necessarily diminished. Consequently, researchers often treat the philosophical foundations of design methods as being of only minor importance. In this paper, we have deliberately chosen to focus on the differences between various philosophical positions. From this focus, we believe we can offer a clearer under-standing of the empirical behaviour of software as viewed from particular philosophical positions. Since the em-pirical evidence does not favour any single position, we conclude by arguing for the validity of ad hoc approaches to software design which we believe provides a stronger and more theoretically grounded approach to software design.
[ { "version": "v1", "created": "Wed, 16 Jun 2004 10:01:06 GMT" } ]
2007-05-23T00:00:00
[ [ "King", "David", "" ], [ "Kimble", "Chris", "" ] ]
cs/0406025
Frederic Goualard
Frederic Goualard and Laurent Granvilliers
Directional Consistency for Continuous Numerical Constraints
16 pages, 3 figures
null
null
null
cs.AI cs.MS
null
Bounds consistency is usually enforced on continuous constraints by first decomposing them into binary and ternary primitives. This decomposition has long been shown to drastically slow down the computation of solutions. To tackle this, Benhamou et al. have introduced an algorithm that avoids formally decomposing constraints. Its better efficiency compared to the former method has already been experimentally demonstrated. It is shown here that their algorithm implements a strategy to enforce on a continuous constraint a consistency akin to Directional Bounds Consistency as introduced by Dechter and Pearl for discrete problems. The algorithm is analyzed in this framework, and compared with algorithms that enforce bounds consistency. These theoretical results are eventually contrasted with new experimental results on standard benchmarks from the interval constraint community.
[ { "version": "v1", "created": "Wed, 16 Jun 2004 16:33:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Goualard", "Frederic", "" ], [ "Granvilliers", "Laurent", "" ] ]
cs/0406026
Serebrenik Alexander
Tom Schrijvers, Alexander Serebrenik
Improving Prolog Programs: Refactoring for Prolog
To appear in ICLP 2004
null
null
null
cs.SE cs.PL
null
Refactoring is an established technique from the OO-community to restructure code: it aims at improving software readability, maintainability and extensibility. Although refactoring is not tied to the OO-paradigm in particular, its ideas have not been applied to Logic Programming until now. This paper applies the ideas of refactoring to Prolog programs. A catalogue is presented listing refactorings classified according to scope. Some of the refactorings have been adapted from the OO-paradigm, while others have been specifically designed for Prolog. Also the discrepancy between intended and operational semantics in Prolog is addressed by some of the refactorings. In addition, ViPReSS, a semi-automatic refactoring browser, is discussed and the experience with applying \vipress to a large Prolog legacy system is reported. Our main conclusion is that refactoring is not only a viable technique in Prolog but also a rather desirable one.
[ { "version": "v1", "created": "Wed, 16 Jun 2004 16:55:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Schrijvers", "Tom", "" ], [ "Serebrenik", "Alexander", "" ] ]
cs/0406027
Dietrich Fahrenholtz
Dietrich Fahrenholtz and Volker Turau
Fluctuation in Peer-to-Peer Networks: Mitigating Its Effect on DHT Performance
5 pages
null
null
null
cs.NI cs.DC
null
Due to the transient nature of peers, any Peer-to-Peer network is in peril to falling apart if peers do not receive routing table updates periodically. To this end, maintenance, which affects every peer, ensures connectedness and sustained data operation performance. However, a high rate of change in peer population usually incurs lots of network maintenance messages and can severely degrade overall performance. We discuss three methods how to tackle and mitigate the effect of peer fluctuation on a tree-based distributed hash table.
[ { "version": "v1", "created": "Wed, 16 Jun 2004 17:32:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Fahrenholtz", "Dietrich", "" ], [ "Turau", "Volker", "" ] ]
cs/0406028
Manor Mendel
Yair Bartal, Bela Bollobas, Manor Mendel
Ramsey-type theorems for metric spaces with applications to online problems
Fix an error in the metadata. 31 pages, 0 figures. Preliminary version in FOCS '01. To be published in J. Comput. System Sci
J. Comput. System Sci. 72(5):890-921, 2006
10.1016/j.jcss.2005.05.008
null
cs.DS
null
A nearly logarithmic lower bound on the randomized competitive ratio for the metrical task systems problem is presented. This implies a similar lower bound for the extensively studied k-server problem. The proof is based on Ramsey-type theorems for metric spaces, that state that every metric space contains a large subspace which is approximately a hierarchically well-separated tree (and in particular an ultrametric). These Ramsey-type theorems may be of independent interest.
[ { "version": "v1", "created": "Wed, 16 Jun 2004 21:56:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Bartal", "Yair", "" ], [ "Bollobas", "Bela", "" ], [ "Mendel", "Manor", "" ] ]
cs/0406029
Kamalakar Karlapalem
Satyanarayana R Valluri and Kamalakar Karlapalem
Subset Queries in Relational Databases
15 pages
null
null
null
cs.DB
null
In this paper, we motivated the need for relational database systems to support subset query processing. We defined new operators in relational algebra, and new constructs in SQL for expressing subset queries. We also illustrated the applicability of subset queries through different examples expressed using extended SQL statements and relational algebra expressions. Our aim is to show the utility of subset queries for next generation applications.
[ { "version": "v1", "created": "Thu, 17 Jun 2004 09:11:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Valluri", "Satyanarayana R", "" ], [ "Karlapalem", "Kamalakar", "" ] ]
cs/0406031
Long Qiu
Long Qiu, Min-Yen Kan, Tat-Seng Chua
A Public Reference Implementation of the RAP Anaphora Resolution Algorithm
4-page LREC 2004 paper
null
null
null
cs.CL
null
This paper describes a standalone, publicly-available implementation of the Resolution of Anaphora Procedure (RAP) given by Lappin and Leass (1994). The RAP algorithm resolves third person pronouns, lexical anaphors, and identifies pleonastic pronouns. Our implementation, JavaRAP, fills a current need in anaphora resolution research by providing a reference implementation that can be benchmarked against current algorithms. The implementation uses the standard, publicly available Charniak (2000) parser as input, and generates a list of anaphora-antecedent pairs as output. Alternately, an in-place annotation or substitution of the anaphors with their antecedents can be produced. Evaluation on the MUC-6 co-reference task shows that JavaRAP has an accuracy of 57.9%, similar to the performance given previously in the literature (e.g., Preiss 2002).
[ { "version": "v1", "created": "Thu, 17 Jun 2004 12:29:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Qiu", "Long", "" ], [ "Kan", "Min-Yen", "" ], [ "Chua", "Tat-Seng", "" ] ]
cs/0406032
Jos\'e Borges
Jos\'e Borges (1), Mark Levene (2) ((1) School of Engineering, University of Porto, Portuga,(2)Birkbeck, University of London, U.K)
A Dynamic Clustering-Based Markov Model for Web Usage Mining
null
null
null
null
cs.IR cs.AI
null
Markov models have been widely utilized for modelling user web navigation behaviour. In this work we propose a dynamic clustering-based method to increase a Markov model's accuracy in representing a collection of user web navigation sessions. The method makes use of the state cloning concept to duplicate states in a way that separates in-links whose corresponding second-order probabilities diverge. In addition, the new method incorporates a clustering technique which determines an effcient way to assign in-links with similar second-order probabilities to the same clone. We report on experiments conducted with both real and random data and we provide a comparison with the N-gram Markov concept. The results show that the number of additional states induced by the dynamic clustering method can be controlled through a threshold parameter, and suggest that the method's performance is linear time in the size of the model.
[ { "version": "v1", "created": "Thu, 17 Jun 2004 13:38:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Borges", "José", "" ], [ "Levene", "Mark", "" ] ]
cs/0406034
Manor Mendel
Amos Fiat, Manor Mendel
Better algorithms for unfair metrical task systems and applications
20 pages, 1 figure
SIAM Journal on Computing 32(6), pp. 1403-1422, 2003
10.1137/S0097539700376159
null
cs.DS
null
Unfair metrical task systems are a generalization of online metrical task systems. In this paper we introduce new techniques to combine algorithms for unfair metrical task systems and apply these techniques to obtain improved randomized online algorithms for metrical task systems on arbitrary metric spaces.
[ { "version": "v1", "created": "Thu, 17 Jun 2004 18:49:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Fiat", "Amos", "" ], [ "Mendel", "Manor", "" ] ]
cs/0406036
Manor Mendel
Manor Mendel, Steven S. Seiden
Online Companion Caching
17 pages, 1 figure. Preliminary version in ESA '02. To be published in Theoretical Computer Science A
Theoret. Comput. Sci. 324(2-3): 183-200, 2004
10.1016/j.tcs.2004.05.015
null
cs.DS
null
This paper is concerned with online caching algorithms for the (n,k)-companion cache, defined by Brehob et. al. In this model the cache is composed of two components: a k-way set-associative cache and a companion fully-associative cache of size n. We show that the deterministic competitive ratio for this problem is (n+1)(k+1)-1, and the randomized competitive ratio is O(\log n \log k) and \Omega(\log n +\log k).
[ { "version": "v1", "created": "Fri, 18 Jun 2004 16:20:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Mendel", "Manor", "" ], [ "Seiden", "Steven S.", "" ] ]
cs/0406038
Vladan Vuckovic V.
Vladan Vuckovic, Djordje Vidanovic
A New Approach to Draw Detection by Move Repetition in Computer Chess Programming
15 pages, 4 figures
null
null
null
cs.AI
null
We will try to tackle both the theoretical and practical aspects of a very important problem in chess programming as stated in the title of this article - the issue of draw detection by move repetition. The standard approach that has so far been employed in most chess programs is based on utilising positional matrices in original and compressed format as well as on the implementation of the so-called bitboard format. The new approach that we will be trying to introduce is based on using variant strings generated by the search algorithm (searcher) during the tree expansion in decision making. We hope to prove that this approach is more efficient than the standard treatment of the issue, especially in positions with few pieces (endgames). To illustrate what we have in mind a machine language routine that implements our theoretical assumptions is attached. The routine is part of the Axon chess program, developed by the authors. Axon, in its current incarnation, plays chess at master strength (ca. 2400-2450 Elo, based on both Axon vs computer programs and Axon vs human masters in over 3000 games altogether).
[ { "version": "v1", "created": "Mon, 21 Jun 2004 13:42:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Vuckovic", "Vladan", "" ], [ "Vidanovic", "Djordje", "" ] ]
cs/0406040
Bonifac Donat
Bonifac Donat
Alchemistry of the P versus NP question
null
null
null
null
cs.CC cs.LO
null
Are P and NP provably inseparable ? Take a look at some unorthodox, guilty mentioned folklore and related unpublished results.
[ { "version": "v1", "created": "Mon, 21 Jun 2004 20:17:28 GMT" }, { "version": "v2", "created": "Sat, 26 Jun 2004 09:56:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Donat", "Bonifac", "" ] ]
cs/0406041
Etienne Payet
Etienne Payet and Fred Mesnard
Non-Termination Inference of Logic Programs
Long version (algorithms and proofs included) of a paper submitted to TOPLAS
null
null
null
cs.PL cs.LO
null
We present a static analysis technique for non-termination inference of logic programs. Our framework relies on an extension of the subsumption test, where some specific argument positions can be instantiated while others are generalized. We give syntactic criteria to statically identify such argument positions from the text of a program. Atomic left looping queries are generated bottom-up from selected subsets of the binary unfoldings of the program of interest. We propose a set of correct algorithms for automating the approach. Then, non-termination inference is tailored to attempt proofs of optimality of left termination conditions computed by a termination inference tool. An experimental evaluation is reported. When termination and non-termination analysis produce complementary results for a logic procedure, then with respect to the leftmost selection rule and the language used to describe sets of atomic queries, each analysis is optimal and together, they induce a characterization of the operational behavior of the logic procedure.
[ { "version": "v1", "created": "Tue, 22 Jun 2004 11:44:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Payet", "Etienne", "" ], [ "Mesnard", "Fred", "" ] ]
cs/0406042
Valdis Vitolins
Valdis Vitolins
Business Process Measures
12 pages, 7 figures, 2 tables, Proceedings of International Conference "Baltic DB&IS 2004", Riga, Latvia (June 6-9, 2004)
Vitolins Valdis, Business Process Measures. Computer Science and Information Technologies, Databases and Information Systems Doctoral Consortium, Scientific Papers University of Latvia Vol. 673, University of Latvia, 2004, pp. 186.-197
null
null
cs.CE cs.PF
null
The paper proposes a new methodology for defining business process measures and their computation. The approach is based on metamodeling according to MOF. Especially, a metamodel providing precise definitions of typical process measures for UML activity diagram-like notation is proposed, including precise definitions how measures should be aggregated for composite process elements. The proposed approach allows defining values in a natural way, and measurement of data, which are of interest to business, without deep investigation into specific technical solutions. This provides new possibilities for business process measurement, decreasing the gap between technical solutions and asset management methodologies.
[ { "version": "v1", "created": "Tue, 22 Jun 2004 12:19:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Vitolins", "Valdis", "" ] ]
cs/0406043
Taneli Mielik\"ainen
Taneli Mielik\"ainen, Janne Ravantti, Esko Ukkonen
The Computational Complexity of Orientation Search Problems in Cryo-Electron Microscopy
null
null
null
C-2004-3, Department of Computer Science, University of Helsinki
cs.DS cs.CG cs.CV
null
In this report we study the problem of determining three-dimensional orientations for noisy projections of randomly oriented identical particles. The problem is of central importance in the tomographic reconstruction of the density map of macromolecular complexes from electron microscope images and it has been studied intensively for more than 30 years. We analyze the computational complexity of the orientation problem and show that while several variants of the problem are $NP$-hard, inapproximable and fixed-parameter intractable, some restrictions are polynomial-time approximable within a constant factor or even solvable in logarithmic space. The orientation search problem is formalized as a constrained line arrangement problem that is of independent interest. The negative complexity results give a partial justification for the heuristic methods used in orientation search, and the positive complexity results on the orientation search have some positive implications also to the problem of finding functionally analogous genes. A preliminary version ``The Computational Complexity of Orientation Search in Cryo-Electron Microscopy'' appeared in Proc. ICCS 2004, LNCS 3036, pp. 231--238. Springer-Verlag 2004.
[ { "version": "v1", "created": "Wed, 23 Jun 2004 14:28:17 GMT" }, { "version": "v2", "created": "Mon, 28 Jun 2004 08:29:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Mielikäinen", "Taneli", "" ], [ "Ravantti", "Janne", "" ], [ "Ukkonen", "Esko", "" ] ]
cs/0406044
Oleg Verbitsky
Frank Harary, Wolfgang Slany, Oleg Verbitsky
On the Computational Complexity of the Forcing Chromatic Number
24 pages; This is the final version
null
null
null
cs.CC
null
We consider vertex colorings of graphs in which adjacent vertices have distinct colors. A graph is $s$-chromatic if it is colorable in $s$ colors and any coloring of it uses at least $s$ colors. The forcing chromatic number $F(G)$ of an $s$-chromatic graph $G$ is the smallest number of vertices which must be colored so that, with the restriction that $s$ colors are used, every remaining vertex has its color determined uniquely. We estimate the computational complexity of $F(G)$ relating it to the complexity class US introduced by Blass and Gurevich. We prove that recognizing if $F(G)\le 2$ is US-hard with respect to polynomial-time many-one reductions. Moreover, this problem is coNP-hard even under the promises that $F(G)\le 3$ and $G$ is 3-chromatic. On the other hand, recognizing if $F(G)\le k$, for each constant $k$, is reducible to a problem in US via disjunctive truth-table reduction. Similar results are obtained also for forcing variants of the clique and the domination numbers of a graph.
[ { "version": "v1", "created": "Wed, 23 Jun 2004 15:21:46 GMT" }, { "version": "v2", "created": "Thu, 12 Aug 2004 08:32:22 GMT" }, { "version": "v3", "created": "Thu, 20 Jan 2005 12:34:22 GMT" }, { "version": "v4", "created": "Tue, 30 Aug 2005 09:10:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Harary", "Frank", "" ], [ "Slany", "Wolfgang", "" ], [ "Verbitsky", "Oleg", "" ] ]
cs/0406045
Sandor P. Fekete
Erik D. Demaine, Sandor P. Fekete, and Shmuel Gal
Online Searching with Turn Cost
15 pages, 2 figures, 1 table; to appear in Theoretical Computer Science. Did some minor editorial changes, fixed some typos, etc
null
null
null
cs.DS
null
We consider the problem of searching for an object on a line at an unknown distance OPT from the original position of the searcher, in the presence of a cost of d for each time the searcher changes direction. This is a generalization of the well-studied linear-search problem. We describe a strategy that is guaranteed to find the object at a cost of at most 9*OPT + 2d, which has the optimal competitive ratio 9 with respect to OPT plus the minimum corresponding additive term. Our argument for upper and lower bound uses an infinite linear program, which we solve by experimental solution of an infinite series of approximating finite linear programs, estimating the limits, and solving the resulting recurrences. We feel that this technique is interesting in its own right and should help solve other searching problems. In particular, we consider the star search or cow-path problem with turn cost, where the hidden object is placed on one of m rays emanating from the original position of the searcher. For this problem we give a tight bound of (1+(2(m^m)/((m-1)^(m-1))) OPT + m ((m/(m-1))^(m-1) - 1) d. We also discuss tradeoff between the corresponding coefficients, and briefly consider randomized strategies on the line.
[ { "version": "v1", "created": "Wed, 23 Jun 2004 16:56:53 GMT" }, { "version": "v2", "created": "Sat, 18 Sep 2004 09:26:50 GMT" }, { "version": "v3", "created": "Fri, 4 Mar 2005 14:16:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Gal", "Shmuel", "" ] ]
cs/0406046
Andrew Huang
Andrew C. Huang and Armando Fox
Cheap Recovery: A Key to Self-Managing State
Submitted to the Sixth Symposium on Operating Systems Design and Implementation (OSDI '04)
null
null
null
cs.NI cs.DC
null
Cluster hash tables (CHTs) are a key persistent-storage component of many large-scale Internet services due to their high performance and scalability. We show that a correctly-designed CHT can also be as easy to manage as a farm of stateless servers. Specifically, we trade away some consistency to obtain reboot-based recovery that is simple, maintains full data availability, and only has modest impact on performance. This simplifies management in two ways. First, it simplifies failure detection by lowering the cost of acting on false positives, allowing us to use simple but aggressive statistical techniques to quickly detect potential failures and node degradations; even when a false alarm is raised or when rebooting will not fix the problem, attempting recovery by rebooting is relatively non-intrusive to system availability and performance. Second, it allows us to re-cast online repartitioning as failure plus recovery, simplifying dynamic scaling and capacity planning. These properties make it possible for the system to be continuously self-adjusting, a key property of self-managing, autonomic systems.
[ { "version": "v1", "created": "Wed, 23 Jun 2004 18:08:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Andrew C.", "" ], [ "Fox", "Armando", "" ] ]
cs/0406047
Alexei Stadnik
G.A. Ososkov, S.G. Dmitrievskiy, A.V. Stadnik
Self-organizing neural networks in classification and image recognition
null
null
null
null
cs.CV cs.AI
null
Self-organizing neural networks are used for brick finding in OPERA experiment. Self-organizing neural networks and wavelet analysis used for recognition and extraction of car numbers from images.
[ { "version": "v1", "created": "Thu, 24 Jun 2004 13:14:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Ososkov", "G. A.", "" ], [ "Dmitrievskiy", "S. G.", "" ], [ "Stadnik", "A. V.", "" ] ]
cs/0406049
Marcus Mendenhall
Marcus H. Mendenhall
A Fast, Vectorizable Algorithm for Producing Single-Precision Sine-Cosine Pairs
4 pages, 1 block sample code
null
null
null
cs.MS
null
This paper presents an algorithm for computing Sine-Cosine pairs to modest accuracy, but in a manner which contains no conditional tests or branching, making it highly amenable to vectorization. An exemplary implementation for PowerPC AltiVec processors is included, but the algorithm should be easily portable to other achitectures, such as Intel SSE.
[ { "version": "v1", "created": "Fri, 25 Jun 2004 20:37:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Mendenhall", "Marcus H.", "" ] ]
cs/0406051
Somdeb Lahiri
Somdeb Lahiri
Stable Outcomes for Two-Sided Contract Choice Problems
13 pages; source file: MS Word
null
null
null
cs.GT
null
We show, that a simple generalization of the Deferred Acceptance Procedure with firms proposing due to Gale and Shapley(1962), yeild outcomes for a two-sided contract choice problem, which necessarily belong to the core and are Weakly Pareto Optimal for firms. Under additional assumptions: (a) given any two distinct workers, the set of yields acheivable by a firm with the first worker is disjoint from the set of yields acheivable by it with the second, and (b) the contract choice problem is pair-wise efficient, we prove that there is no stable outcome at which a firm can get more than what it gets at the unique outcome of our procedure.
[ { "version": "v1", "created": "Sun, 27 Jun 2004 11:40:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Lahiri", "Somdeb", "" ] ]
cs/0406053
Ion Mandoiu
K. Konwar, I. Mandoiu, A. Russell, A. Shvartsman
Approximation Algorithms for Minimum PCR Primer Set Selection with Amplification Length and Uniqueness Constraints
null
null
null
null
cs.DS cs.DM q-bio.QM
null
A critical problem in the emerging high-throughput genotyping protocols is to minimize the number of polymerase chain reaction (PCR) primers required to amplify the single nucleotide polymorphism loci of interest. In this paper we study PCR primer set selection with amplification length and uniqueness constraints from both theoretical and practical perspectives. We give a greedy algorithm that achieves a logarithmic approximation factor for the problem of minimizing the number of primers subject to a given upperbound on the length of PCR amplification products. We also give, using randomized rounding, the first non-trivial approximation algorithm for a version of the problem that requires unique amplification of each amplification target. Empirical results on randomly generated testcases as well as testcases extracted from the from the National Center for Biotechnology Information's genomic databases show that our algorithms are highly scalable and produce better results compared to previous heuristics.
[ { "version": "v1", "created": "Mon, 28 Jun 2004 07:04:14 GMT" }, { "version": "v2", "created": "Tue, 27 Jul 2004 17:39:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Konwar", "K.", "" ], [ "Mandoiu", "I.", "" ], [ "Russell", "A.", "" ], [ "Shvartsman", "A.", "" ] ]
cs/0406055
Andrea Ferrara Ing.
Andrea Ferrara
Web Services: A Process Algebra Approach
null
null
null
null
cs.AI cs.DB
null
It is now well-admitted that formal methods are helpful for many issues raised in the Web service area. In this paper we present a framework for the design and verification of WSs using process algebras and their tools. We define a two-way mapping between abstract specifications written using these calculi and executable Web services written in BPEL4WS. Several choices are available: design and correct errors in BPEL4WS, using process algebra verification tools, or design and correct in process algebra and automatically obtaining the corresponding BPEL4WS code. The approaches can be combined. Process algebra are not useful only for temporal logic verification: we remark the use of simulation/bisimulation both for verification and for the hierarchical refinement design method. It is worth noting that our approach allows the use of any process algebra depending on the needs of the user at different levels (expressiveness, existence of reasoning tools, user expertise).
[ { "version": "v1", "created": "Mon, 28 Jun 2004 15:42:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ferrara", "Andrea", "" ] ]
cs/0406056
Selmer Bringsjord
Selmer Bringsjord and Joshua Taylor
P=NP
null
null
null
null
cs.CC cs.AI
null
We claim to resolve the P=?NP problem via a formal argument for P=NP.
[ { "version": "v1", "created": "Mon, 28 Jun 2004 19:11:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Bringsjord", "Selmer", "" ], [ "Taylor", "Joshua", "" ] ]
cs/0406057
Maximillian Dornseif
Maximillian Dornseif, Sascha May
Modelling the costs and benefits of Honeynets
was presented at the "Third Annual Workshop on Economics and Information Security" 2004 (WEIS04)
null
null
null
cs.CR cs.CY
null
For many IT-security measures exact costs and benefits are not known. This makes it difficult to allocate resources optimally to different security measures. We present a model for costs and benefits of so called Honeynets. This can foster informed reasoning about the deployment of honeynet technology.
[ { "version": "v1", "created": "Mon, 28 Jun 2004 21:11:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Dornseif", "Maximillian", "" ], [ "May", "Sascha", "" ] ]
cs/0406058
Matthias Bauer
Matthias Bauer
Proofs of Zero Knowledge
16 pages
null
null
null
cs.CR cs.DB
null
We present a protocol for verification of ``no such entry'' replies from databases. We introduce a new cryptographic primitive as the underlying structure, the keyed hash tree, which is an extension of Merkle's hash tree. We compare our scheme to Buldas et al.'s Undeniable Attesters and Micali et al.'s Zero Knowledge Sets.
[ { "version": "v1", "created": "Tue, 29 Jun 2004 11:05:29 GMT" }, { "version": "v2", "created": "Wed, 14 Jul 2004 12:47:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Bauer", "Matthias", "" ] ]
cs/0406059
Maximillian Dornseif
Maximillian Dornseif, Felix C. Gaertner, Thorsten Holz
Ermittlung von Verwundbarkeiten mit elektronischen Koedern
Presented at Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004), in German
null
null
null
cs.CR
null
Electronic bait (honeypots) are network resources whose value consists of being attacked and compromised. These are often computers which do not have a task in the network, but are otherwise indestinguishable from regular computers. Such bait systems could be interconnected (honeynets). These honeynets are equipped with special software, facilitating forensic anylisis of incidents. Taking average of the wide variety of recorded data it is possible to learn considerable more about the behaviour of attackers in networks than with traditional methods. This article is an introduction into electronic bait and a description of the setup and first experiences of such a network deployed at RWTH Aachen University. ----- Als elektronische Koeder (honeypots) bezeichnet man Netzwerkressourcen, deren Wert darin besteht, angegriffen und kompromittiert zu werden. Oft sind dies Computer, die keine spezielle Aufgabe im Netzwerk haben, aber ansonsten nicht von regulaeren Rechnern zu unterscheiden sind. Koeder koennen zu Koeder-Netzwerken (honeynets) zusammengeschlossen werden. Sie sind mit spezieller Software ausgestattet, die die Forensik einer eingetretenen Schutzzielverletzung erleichtert. Durch die Vielfalt an mitgeschnittenen Daten kann man deutlich mehr ueber das Verhalten von Angreifern in Netzwerken lernen als mit herkoemmlichen forensischen Methoden. Dieser Beitrag stellt die Philosophie der Koeder-Netzwerke vor und beschreibt die ersten Erfahrungen, die mit einem solchen Netzwerk an der RWTH Aachen gemacht wurden.
[ { "version": "v1", "created": "Tue, 29 Jun 2004 15:14:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Dornseif", "Maximillian", "" ], [ "Gaertner", "Felix C.", "" ], [ "Holz", "Thorsten", "" ] ]
cs/0406060
Stijn Vansummeren
Jan Van den Bussche, Dirk Van Gucht, Stijn Vansummeren
Well-Definedness and Semantic Type-Checking in the Nested Relational Calculus and XQuery
null
null
null
null
cs.DB cs.PL
null
Two natural decision problems regarding the XML query language XQuery are well-definedness and semantic type-checking. We study these problems in the setting of a relational fragment of XQuery. We show that well-definedness and semantic type-checking are undecidable, even in the positive-existential case. Nevertheless, for a ``pure'' variant of XQuery, in which no identification is made between an item and the singleton containing that item, the problems become decidable. We also consider the analogous problems in the setting of the nested relational calculus.
[ { "version": "v1", "created": "Tue, 29 Jun 2004 16:09:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Bussche", "Jan Van den", "" ], [ "Van Gucht", "Dirk", "" ], [ "Vansummeren", "Stijn", "" ] ]
cs/0406061
Scott Aaronson
Scott Aaronson
The Complexity of Agreement
27 pages, 4 figures
null
null
null
cs.CC cs.GT
null
A celebrated 1976 theorem of Aumann asserts that honest, rational Bayesian agents with common priors will never "agree to disagree": if their opinions about any topic are common knowledge, then those opinions must be equal. Economists have written numerous papers examining the assumptions behind this theorem. But two key questions went unaddressed: first, can the agents reach agreement after a conversation of reasonable length? Second, can the computations needed for that conversation be performed efficiently? This paper answers both questions in the affirmative, thereby strengthening Aumann's original conclusion. We first show that, for two agents with a common prior to agree within epsilon about the expectation of a [0,1] variable with high probability over their prior, it suffices for them to exchange order 1/epsilon^2 bits. This bound is completely independent of the number of bits n of relevant knowledge that the agents have. We then extend the bound to three or more agents; and we give an example where the economists' "standard protocol" (which consists of repeatedly announcing one's current expectation) nearly saturates the bound, while a new "attenuated protocol" does better. Finally, we give a protocol that would cause two Bayesians to agree within epsilon after exchanging order 1/epsilon^2 messages, and that can be simulated by agents with limited computational resources. By this we mean that, after examining the agents' knowledge and a transcript of their conversation, no one would be able to distinguish the agents from perfect Bayesians. The time used by the simulation procedure is exponential in 1/epsilon^6 but not in n.
[ { "version": "v1", "created": "Wed, 30 Jun 2004 06:28:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Aaronson", "Scott", "" ] ]
cs/0407001
Rajkumar Buyya
Parvin Asadzadeh, Rajkumar Buyya, Chun Ling Kei, Deepa Nayar, and Srikumar Venugopal
Global Grids and Software Toolkits: A Study of Four Grid Middleware Technologies
19 pages, 10 figures
null
null
* Technical Report, GRIDS-TR-2004-4, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, July 1, 2004
cs.DC
null
Grid is an infrastructure that involves the integrated and collaborative use of computers, networks, databases and scientific instruments owned and managed by multiple organizations. Grid applications often involve large amounts of data and/or computing resources that require secure resource sharing across organizational boundaries. This makes Grid application management and deployment a complex undertaking. Grid middlewares provide users with seamless computing ability and uniform access to resources in the heterogeneous Grid environment. Several software toolkits and systems have been developed, most of which are results of academic research projects, all over the world. This chapter will focus on four of these middlewares--UNICORE, Globus, Legion and Gridbus. It also presents our implementation of a resource broker for UNICORE as this functionality was not supported in it. A comparison of these systems on the basis of the architecture, implementation model and several other features is included.
[ { "version": "v1", "created": "Thu, 1 Jul 2004 11:54:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Asadzadeh", "Parvin", "" ], [ "Buyya", "Rajkumar", "" ], [ "Kei", "Chun Ling", "" ], [ "Nayar", "Deepa", "" ], [ "Venugopal", "Srikumar", "" ] ]
cs/0407002
Hendrik Feddes
Lea Cyrus, Hendrik Feddes, Frank Schumacher
Annotating Predicate-Argument Structure for a Parallel Treebank
8 pages, 5 figures
Proceedings of the LREC 2004 Workshop on Building Lexical Resources from Semantically Annotated Corpora, Lisbon, May 30, 2004, pp. 39-46
null
null
cs.CL
null
We report on a recently initiated project which aims at building a multi-layered parallel treebank of English and German. Particular attention is devoted to a dedicated predicate-argument layer which is used for aligning translationally equivalent sentences of the two languages. We describe both our conceptual decisions and aspects of their technical realisation. We discuss some selected problems and conclude with a few remarks on how this project relates to similar projects in the field.
[ { "version": "v1", "created": "Thu, 1 Jul 2004 16:18:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Cyrus", "Lea", "" ], [ "Feddes", "Hendrik", "" ], [ "Schumacher", "Frank", "" ] ]
cs/0407003
Miguel Mosteiro
Michael A. Bender, Martin Farach-Colton, Miguel Mosteiro
Insertion Sort is O(n log n)
6 pages, Latex. In Proceedings of the Third International Conference on Fun With Algorithms, FUN 2004
null
null
null
cs.DS
null
Traditional Insertion Sort runs in O(n^2) time because each insertion takes O(n) time. When people run Insertion Sort in the physical world, they leave gaps between items to accelerate insertions. Gaps help in computers as well. This paper shows that Gapped Insertion Sort has insertion times of O(log n) with high probability, yielding a total running time of O(n log n) with high probability.
[ { "version": "v1", "created": "Thu, 1 Jul 2004 15:50:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Bender", "Michael A.", "" ], [ "Farach-Colton", "Martin", "" ], [ "Mosteiro", "Miguel", "" ] ]
cs/0407005
Wei Wang
I. Dan Melamed and Wei Wang
Statistical Machine Translation by Generalized Parsing
45 pages, with fixes for generating correct PDF format
null
null
null
cs.CL
null
Designers of statistical machine translation (SMT) systems have begun to employ tree-structured translation models. Systems involving tree-structured translation models tend to be complex. This article aims to reduce the conceptual complexity of such systems, in order to make them easier to design, implement, debug, use, study, understand, explain, modify, and improve. In service of this goal, the article extends the theory of semiring parsing to arrive at a novel abstract parsing algorithm with five functional parameters: a logic, a grammar, a semiring, a search strategy, and a termination condition. The article then shows that all the common algorithms that revolve around tree-structured translation models, including hierarchical alignment, inference for parameter estimation, translation, and structured evaluation, can be derived by generalizing two of these parameters -- the grammar and the logic. The article culminates with a recipe for using such generalized parsers to train, apply, and evaluate an SMT system that is driven by tree-structured translation models.
[ { "version": "v1", "created": "Thu, 1 Jul 2004 22:02:10 GMT" }, { "version": "v2", "created": "Wed, 23 Nov 2005 05:02:33 GMT" }, { "version": "v3", "created": "Thu, 24 Nov 2005 04:06:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Melamed", "I. Dan", "" ], [ "Wang", "Wei", "" ] ]
cs/0407006
Shuvendu Lahiri Mr.
Shuvendu K. Lahiri, Randal E. Bryant
Predicate Abstraction with Indexed Predicates
27 pages, 4 figures, 1 table, short version appeared in International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'04), LNCS 2937, pages = 267--281
null
null
null
cs.LO
null
Predicate abstraction provides a powerful tool for verifying properties of infinite-state systems using a combination of a decision procedure for a subset of first-order logic and symbolic methods originally developed for finite-state model checking. We consider models containing first-order state variables, where the system state includes mutable functions and predicates. Such a model can describe systems containing arbitrarily large memories, buffers, and arrays of identical processes. We describe a form of predicate abstraction that constructs a formula over a set of universally quantified variables to describe invariant properties of the first-order state variables. We provide a formal justification of the soundness of our approach and describe how it has been used to verify several hardware and software designs, including a directory-based cache coherence protocol.
[ { "version": "v1", "created": "Fri, 2 Jul 2004 06:17:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Lahiri", "Shuvendu K.", "" ], [ "Bryant", "Randal E.", "" ] ]
cs/0407007
Dirk Leinders
Dirk Leinders (1), Jerzy Tyszkiewicz (2), Jan Van den Bussche (1) ((1) Limburgs Universitair Centrum, Diepenbeek, Belgium, (2) Institute of Informatics, Warsaw University, Warsaw, Poland)
The semijoin algebra and the guarded fragment
11 pages, 2 figures
null
null
null
cs.DB cs.LO
null
The semijoin algebra is the variant of the relational algebra obtained by replacing the join operator by the semijoin operator. We discuss some interesting connections between the semijoin algebra and the guarded fragment of first-order logic. We also provide an Ehrenfeucht-Fraisse game, characterizing the discerning power of the semijoin algebra. This game gives a method for showing that certain queries are not expressible in the semijoin algebra.
[ { "version": "v1", "created": "Fri, 2 Jul 2004 15:44:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Leinders", "Dirk", "" ], [ "Tyszkiewicz", "Jerzy", "" ], [ "Bussche", "Jan Van den", "" ] ]
cs/0407008
Karthik Narayanaswami
S. Ravichandran and M.N. Karthik
Autogenic Training With Natural Language Processing Modules: A Recent Tool For Certain Neuro Cognitive Studies
2 Pages. Proceedings of 11th International Congress on Biological & Medical Engineering, Singapore (IEEE-EMBS & IFMBE endorsed)
null
null
null
cs.AI
null
Learning to respond to voice-text input involves the subject's ability in understanding the phonetic and text based contents and his/her ability to communicate based on his/her experience. The neuro-cognitive facility of the subject has to support two important domains in order to make the learning process complete. In many cases, though the understanding is complete, the response is partial. This is one valid reason why we need to support the information from the subject with scalable techniques such as Natural Language Processing (NLP) for abstraction of the contents from the output. This paper explores the feasibility of using NLP modules interlaced with Neural Networks to perform the required task in autogenic training related to medical applications.
[ { "version": "v1", "created": "Fri, 2 Jul 2004 20:15:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravichandran", "S.", "" ], [ "Karthik", "M. N.", "" ] ]
cs/0407009
Karthik Narayanaswami
M. N. Karthik and Moshe Davis
Search Using N-gram Technique Based Statistical Analysis for Knowledge Extraction in Case Based Reasoning Systems
4 Pages. National Level Mathematics & CS Symposium, Chennai Mathematical Institute ICS '02, March
null
null
null
cs.AI cs.IR
null
Searching techniques for Case Based Reasoning systems involve extensive methods of elimination. In this paper, we look at a new method of arriving at the right solution by performing a series of transformations upon the data. These involve N-gram based comparison and deduction of the input data with the case data, using Morphemes and Phonemes as the deciding parameters. A similar technique for eliminating possible errors using a noise removal function is performed. The error tracking and elimination is performed through a statistical analysis of obtained data, where the entire data set is analyzed as sub-categories of various etymological derivatives. A probability analysis for the closest match is then performed, which yields the final expression. This final expression is referred to the Case Base. The output is redirected through an Expert System based on best possible match. The threshold for the match is customizable, and could be set by the Knowledge-Architect.
[ { "version": "v1", "created": "Fri, 2 Jul 2004 20:22:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Karthik", "M. N.", "" ], [ "Davis", "Moshe", "" ] ]
cs/0407013
Richard McClatchey
Naveed Ahmad, Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Ali Hassan, Ahsan Ikram, Frank van Lingen, Richard McClatchey, Harvey Newman, Conrad Steenberg, Michael Thomas & Ian Willers
Distributed Analysis and Load Balancing System for Grid Enabled Analysis on Hand-held devices using Multi-Agents Systems
4 pages, 3 figures. Proceedings of the 3rd International Conference on Grid and Cooperative Computing (GCC 2004)
null
null
null
cs.DC
null
Handheld devices, while growing rapidly, are inherently constrained and lack the capability of executing resource hungry applications. This paper presents the design and implementation of distributed analysis and load-balancing system for hand-held devices using multi-agents system. This system enables low resource mobile handheld devices to act as potential clients for Grid enabled applications and analysis environments. We propose a system, in which mobile agents will transport, schedule, execute and return results for heavy computational jobs submitted by handheld devices. Moreover, in this way, our system provides high throughput computing environment for hand-held devices.
[ { "version": "v1", "created": "Mon, 5 Jul 2004 16:08:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Ahmad", "Naveed", "" ], [ "Ali", "Arshad", "" ], [ "Anjum", "Ashiq", "" ], [ "Azim", "Tahir", "" ], [ "Bunn", "Julian", "" ], [ "Hassan", "Ali", "" ], [ "Ikram", "Ahsan", "" ], [ "van Lingen", "Frank", "" ], [ "McClatchey", "Richard", "" ], [ "Newman", "Harvey", "" ], [ "Steenberg", "Conrad", "" ], [ "Thomas", "Michael", "" ], [ "Willers", "Ian", "" ] ]
cs/0407014
Richard McClatchey
Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Ahsan Ikram, Richard McClatchey, Harvey Newman, Conrad Steenberg, Michael Thomas, Ian Willers
A Grid-enabled Interface to Condor for Interactive Analysis on Handheld and Resource-limited Devices
This paper has been withdrawn
null
null
null
cs.DC
null
This paper was withdrawn by the authors.
[ { "version": "v1", "created": "Mon, 5 Jul 2004 19:40:00 GMT" }, { "version": "v2", "created": "Thu, 30 Sep 2004 09:05:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Ali", "Arshad", "" ], [ "Anjum", "Ashiq", "" ], [ "Azim", "Tahir", "" ], [ "Bunn", "Julian", "" ], [ "Ikram", "Ahsan", "" ], [ "McClatchey", "Richard", "" ], [ "Newman", "Harvey", "" ], [ "Steenberg", "Conrad", "" ], [ "Thomas", "Michael", "" ], [ "Willers", "Ian", "" ] ]
cs/0407016
Vadim Bulitko
Vadim Bulitko
Learning for Adaptive Real-time Search
null
null
null
null
cs.AI cs.LG
null
Real-time heuristic search is a popular model of acting and learning in intelligent autonomous agents. Learning real-time search agents improve their performance over time by acquiring and refining a value function guiding the application of their actions. As computing the perfect value function is typically intractable, a heuristic approximation is acquired instead. Most studies of learning in real-time search (and reinforcement learning) assume that a simple value-function-greedy policy is used to select actions. This is in contrast to practice, where high-performance is usually attained by interleaving planning and acting via a lookahead search of a non-trivial depth. In this paper, we take a step toward bridging this gap and propose a novel algorithm that (i) learns a heuristic function to be used specifically with a lookahead-based policy, (ii) selects the lookahead depth adaptively in each state, (iii) gives the user control over the trade-off between exploration and exploitation. We extensively evaluate the algorithm in the sliding tile puzzle testbed comparing it to the classical LRTA* and the more recent weighted LRTA*, bounded LRTA*, and FALCONS. Improvements of 5 to 30 folds in convergence speed are observed.
[ { "version": "v1", "created": "Tue, 6 Jul 2004 22:18:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Bulitko", "Vadim", "" ] ]
cs/0407017
Fronefield Crawford
Andrew Cantino, Fronefield Crawford, Saurav Dhital, John P. Dougherty, Reid Sherman (Haverford College)
A Low Cost Distributed Computing Approach to Pulsar Searches at a Small College
Adapted from a talk given at the Eleventh SIAM Conference on Parallel Computing, February 25-27, 2004 in San Francisco, CA. 18 pages, including 3 figures and 2 tables
null
null
null
cs.DC
null
We describe a distributed processing cluster of inexpensive Linux machines developed jointly by the Astronomy and Computer Science departments at Haverford College which has been successfully used to search a large volume of data from a recent radio pulsar survey. Analysis of radio pulsar surveys requires significant computational resources to handle the demanding data storage and processing needs. One goal of this project was to explore issues encountered when processing a large amount of pulsar survey data with limited computational resources. This cluster, which was developed and activated in only a few weeks by supervised undergraduate summer research students, used existing decommissioned computers, the campus network, and a script-based, client-oriented, self-scheduled data distribution approach to process the data. This setup provided simplicity, efficiency, and "on-the-fly" scalability at low cost. The entire 570 GB data set from the pulsar survey was processed at Haverford over the course of a ten-week summer period using this cluster. We conclude that this cluster can serve as a useful computational model in cases where data processing must be carried out on a limited budget. We have also constructed a DVD archive of the raw survey data in order to investigate the feasibility of using DVD as an inexpensive and easily accessible raw data storage format for pulsar surveys. DVD-based storage has not been widely explored in the pulsar community, but it has several advantages. The DVD archive we have constructed is reliable, portable, inexpensive, and can be easily read by any standard modern machine.
[ { "version": "v1", "created": "Wed, 7 Jul 2004 18:55:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Cantino", "Andrew", "", "Haverford College" ], [ "Crawford", "Fronefield", "", "Haverford College" ], [ "Dhital", "Saurav", "", "Haverford College" ], [ "Dougherty", "John P.", "", "Haverford College" ], [ "Sherman", "Reid", "", "Haverford College" ] ]
cs/0407018
Stephen Vavasis
Pritam Ganguly, Stephen A. Vavasis, Katerina D. Papoulia
An algorithm for two-dimensional mesh generation based on the pinwheel tiling
Short version appears in Proceedings of 2004 International Meshing Roundtable at http://www.imr.sandia.gov
null
null
null
cs.CG cs.NA
null
We propose a new two-dimensional meshing algorithm called PINW able to generate meshes that accurately approximate the distance between any two domain points by paths composed only of cell edges. This technique is based on an extension of pinwheel tilings proposed by Radin and Conway. We prove that the algorithm produces triangles of bounded aspect ratio. This kind of mesh would be useful in cohesive interface finite element modeling when the crack propagation pathis an outcome of a simulation process.
[ { "version": "v1", "created": "Wed, 7 Jul 2004 19:06:15 GMT" }, { "version": "v2", "created": "Sun, 19 Dec 2004 03:17:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Ganguly", "Pritam", "" ], [ "Vavasis", "Stephen A.", "" ], [ "Papoulia", "Katerina D.", "" ] ]
cs/0407020
Rina Panigrahy
Rina Panigrahy
Minimum Enclosing Polytope in High Dimensions
Submitted to SODA05
null
null
null
cs.CG
null
We study the problem of covering a given set of $n$ points in a high, $d$-dimensional space by the minimum enclosing polytope of a given arbitrary shape. We present algorithms that work for a large family of shapes, provided either only translations and no rotations are allowed, or only rotation about a fixed point is allowed; that is, one is allowed to only scale and translate a given shape, or scale and rotate the shape around a fixed point. Our algorithms start with a polytope guessed to be of optimal size and iteratively moves it based on a greedy principle: simply move the current polytope directly towards any outside point till it touches the surface. For computing the minimum enclosing ball, this gives a simple greedy algorithm with running time $O(nd/\eps)$ producing a ball of radius $1+\eps$ times the optimal. This simple principle generalizes to arbitrary convex shape when only translations are allowed, requiring at most $O(1/\eps^2)$ iterations. Our algorithm implies that {\em core-sets} of size $O(1/\eps^2)$ exist not only for minimum enclosing ball but also for any convex shape with a fixed orientation. A {\em Core-Set} is a small subset of $poly(1/\eps)$ points whose minimum enclosing polytope is almost as large as that of the original points. Although we are unable to combine our techniques for translations and rotations for general shapes, for the min-cylinder problem, we give an algorithm similar to the one in \cite{HV03}, but with an improved running time of $2^{O(\frac{1}{\eps^2}\log \frac{1}{\eps})} nd$.
[ { "version": "v1", "created": "Thu, 8 Jul 2004 19:03:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Panigrahy", "Rina", "" ] ]
cs/0407021
Sanjiang Li
Sanjiang Li, Huaiqing Wang
Multi-agent coordination using nearest neighbor rules: revisiting the Vicsek model
11 pages, linguistic mistakes corrected, title modified
null
null
null
cs.MA cs.AI
null
Recently, Jadbabaie, Lin, and Morse (IEEE TAC, 48(6)2003:988-1001) offered a mathematical analysis of the discrete time model of groups of mobile autonomous agents raised by Vicsek et al. in 1995. In their paper, Jadbabaie et al. showed that all agents shall move in the same heading, provided that these agents are periodically linked together. This paper sharpens this result by showing that coordination will be reached under a very weak condition that requires all agents are finally linked together. This condition is also strictly weaker than the one Jadbabaie et al. desired.
[ { "version": "v1", "created": "Fri, 9 Jul 2004 02:28:02 GMT" }, { "version": "v2", "created": "Wed, 14 Jul 2004 06:28:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Sanjiang", "" ], [ "Wang", "Huaiqing", "" ] ]
cs/0407023
Rina Panigrahy
Rina Panigrahy
Efficient Hashing with Lookups in two Memory Accesses
Submitted to SODA05
null
null
null
cs.DS
null
The study of hashing is closely related to the analysis of balls and bins. It is well-known that instead of using a single hash function if we randomly hash a ball into two bins and place it in the smaller of the two, then this dramatically lowers the maximum load on bins. This leads to the concept of two-way hashing where the largest bucket contains $O(\log\log n)$ balls with high probability. The hash look up will now search in both the buckets an item hashes to. Since an item may be placed in one of two buckets, we could potentially move an item after it has been initially placed to reduce maximum load. with a maximum load of We show that by performing moves during inserts, a maximum load of 2 can be maintained on-line, with high probability, while supporting hash update operations. In fact, with $n$ buckets, even if the space for two items are pre-allocated per bucket, as may be desirable in hardware implementations, more than $n$ items can be stored giving a high memory utilization. We also analyze the trade-off between the number of moves performed during inserts and the maximum load on a bucket. By performing at most $h$ moves, we can maintain a maximum load of $O(\frac{\log \log n}{h \log(\log\log n/h)})$. So, even by performing one move, we achieve a better bound than by performing no moves at all.
[ { "version": "v1", "created": "Fri, 9 Jul 2004 22:23:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Panigrahy", "Rina", "" ] ]
cs/0407024
Ioannis Athanasiadis
Ioannis N Athanasiadis and Pericles A Mitkas
An agent-based intelligent environmental monitoring system
Multi-Agent Systems, Intelligent Applications, Data Mining, Inductive Agents, Air-Quality Monitoring
Management of Environmental Quality, 15(3):238-249, May 2004
10.1108/14777830410531216
null
cs.MA cs.CE
null
Fairly rapid environmental changes call for continuous surveillance and on-line decision making. There are two main areas where IT technologies can be valuable. In this paper we present a multi-agent system for monitoring and assessing air-quality attributes, which uses data coming from a meteorological station. A community of software agents is assigned to monitor and validate measurements coming from several sensors, to assess air-quality, and, finally, to fire alarms to appropriate recipients, when needed. Data mining techniques have been used for adding data-driven, customized intelligence into agents. The architecture of the developed system, its domain ontology, and typical agent interactions are presented. Finally, the deployment of a real-world test case is demonstrated.
[ { "version": "v1", "created": "Sat, 10 Jul 2004 11:06:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Athanasiadis", "Ioannis N", "" ], [ "Mitkas", "Pericles A", "" ] ]
cs/0407025
Ioannis Athanasiadis
P. Mitkas, A. Symeonidis, D. Kechagias, I. N. Athanasiadis, G. Laleci, G. Kurt, Y. Kabak, A. Acar, and A. Dogac
An agent framework for dynamic agent retraining: Agent academy
null
In B. Stanford-Smith, E. Chiozza, and M. Edin, editors, Challenges and Achievements in e-business and e-work, pages 757-764, Prague, Czech Republic, October 2002. IOS Press
null
null
cs.MA
null
Agent Academy (AA) aims to develop a multi-agent society that can train new agents for specific or general tasks, while constantly retraining existing agents in a recursive mode. The system is based on collecting information both from the environment and the behaviors of the acting agents and their related successes/failures to generate a body of data, stored in the Agent Use Repository, which is mined by the Data Miner module, in order to generate useful knowledge about the application domain. Knowledge extracted by the Data Miner is used by the Agent Training Module as to train new agents or to enhance the behavior of agents already running. In this paper the Agent Academy framework is introduced, and its overall architecture and functionality are presented. Training issues as well as agent ontologies are discussed. Finally, a scenario, which aims to provide environmental alerts to both individuals and public authorities, is described an AA-based use case.
[ { "version": "v1", "created": "Sat, 10 Jul 2004 11:16:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Mitkas", "P.", "" ], [ "Symeonidis", "A.", "" ], [ "Kechagias", "D.", "" ], [ "Athanasiadis", "I. N.", "" ], [ "Laleci", "G.", "" ], [ "Kurt", "G.", "" ], [ "Kabak", "Y.", "" ], [ "Acar", "A.", "" ], [ "Dogac", "A.", "" ] ]
cs/0407026
Atsushi Fujii
Atsushi Fujii, Tetsuya Ishikawa
Summarizing Encyclopedic Term Descriptions on the Web
7 pages, Proceedings of the 20th International Conference on Computational Linguistics (to appear)
Proceedings of the 20th International Conference on Computational Linguistics (COLING 2004), pp.645-651, Aug. 2004
null
null
cs.CL
null
We are developing an automatic method to compile an encyclopedic corpus from the Web. In our previous work, paragraph-style descriptions for a term are extracted from Web pages and organized based on domains. However, these descriptions are independent and do not comprise a condensed text as in hand-crafted encyclopedias. To resolve this problem, we propose a summarization method, which produces a single text from multiple descriptions. The resultant summary concisely describes a term from different viewpoints. We also show the effectiveness of our method by means of experiments.
[ { "version": "v1", "created": "Sat, 10 Jul 2004 11:18:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/0407027
Atsushi Fujii
Atsushi Fujii, Katunobu Itou, Tomoyosi Akiba, Tetsuya Ishikawa
Unsupervised Topic Adaptation for Lecture Speech Retrieval
4 pages, Proceedings of the 8th International Conference on Spoken Language Processing (to appear)
Proceedings of the 8th International Conference on Spoken Language Processing (ICSLP 2004), pp.2957-2960, Oct. 2004
null
null
cs.CL
null
We are developing a cross-media information retrieval system, in which users can view specific segments of lecture videos by submitting text queries. To produce a text index, the audio track is extracted from a lecture video and a transcription is generated by automatic speech recognition. In this paper, to improve the quality of our retrieval system, we extensively investigate the effects of adapting acoustic and language models on speech recognition. We perform an MLLR-based method to adapt an acoustic model. To obtain a corpus for language model adaptation, we use the textbook for a target lecture to search a Web collection for the pages associated with the lecture topic. We show the effectiveness of our method by means of experiments.
[ { "version": "v1", "created": "Sat, 10 Jul 2004 11:45:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Itou", "Katunobu", "" ], [ "Akiba", "Tomoyosi", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/0407028
Atsushi Fujii
Tomoyosi Akiba, Atsushi Fujii, Katunobu Itou
Effects of Language Modeling on Speech-driven Question Answering
4 pages, Proceedings of the 8th International Conference on Spoken Language Processing (to appear)
Proceedings of the 8th International Conference on Spoken Language Processing (ICSLP 2004), pp.1053-1056, Oct. 2004
null
null
cs.CL
null
We integrate automatic speech recognition (ASR) and question answering (QA) to realize a speech-driven QA system, and evaluate its performance. We adapt an N-gram language model to natural language questions, so that the input of our system can be recognized with a high accuracy. We target WH-questions which consist of the topic part and fixed phrase used to ask about something. We first produce a general N-gram model intended to recognize the topic and emphasize the counts of the N-grams that correspond to the fixed phrases. Given a transcription by the ASR engine, the QA engine extracts the answer candidates from target documents. We propose a passage retrieval method robust against recognition errors in the transcription. We use the QA test collection produced in NTCIR, which is a TREC-style evaluation workshop, and show the effectiveness of our method by means of experiments.
[ { "version": "v1", "created": "Sat, 10 Jul 2004 11:57:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Akiba", "Tomoyosi", "" ], [ "Fujii", "Atsushi", "" ], [ "Itou", "Katunobu", "" ] ]
cs/0407029
Alexandre d'Aspremont
Alexandre d'Aspremont
Static versus Dynamic Arbitrage Bounds on Multivariate Option Prices
Submitted to IMA series
null
null
null
cs.CE
null
We compare static arbitrage price bounds on basket calls, i.e. bounds that only involve buy-and-hold trading strategies, with the price range obtained within a multi-variate generalization of the Black-Scholes model. While there is no gap between these two sets of prices in the univariate case, we observe here that contrary to our intuition about model risk for at-the-money calls, there is a somewhat large gap between model prices and static arbitrage prices, hence a similarly large set of prices on which a multivariate Black-Scholes model cannot be calibrated but where no conclusion can be drawn on the presence or not of a static arbitrage opportunity.
[ { "version": "v1", "created": "Sat, 10 Jul 2004 16:17:26 GMT" } ]
2007-05-23T00:00:00
[ [ "d'Aspremont", "Alexandre", "" ] ]
cs/0407030
Wolfgang Anthony Eiden
Wolfgang Anthony Eiden
Scheduling with Fuzzy Methods
null
null
null
20040628
cs.OH
null
Nowadays, manufacturing industries -- driven by fierce competition and rising customer requirements -- are forced to produce a broader range of individual products of rising quality at the same (or preferably lower) cost. Meeting these demands implies an even more complex production process and thus also an appropriately increasing request to its scheduling. Aggravatingly, vagueness of scheduling parameters -- such as times and conditions -- are often inherent in the production process. In addition, the search for an optimal schedule normally leads to very difficult problems (NP-hard problems in the complexity theoretical sense), which cannot be solved effciently. With the intent to minimize these problems, the introduced heuristic method combines standard scheduling methods with fuzzy methods to get a nearly optimal schedule within an appropriate time considering vagueness adequately.
[ { "version": "v1", "created": "Mon, 12 Jul 2004 14:02:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiden", "Wolfgang Anthony", "" ] ]
cs/0407031
Pavel Naumov
Pavel Naumov
On Modal Logics of Partial Recursive Functions
null
null
null
null
cs.LO
null
The classical propositional logic is known to be sound and complete with respect to the set semantics that interprets connectives as set operations. The paper extends propositional language by a new binary modality that corresponds to partial recursive function type constructor under the above interpretation. The cases of deterministic and non-deterministic functions are considered and for both of them semantically complete modal logics are described and decidability of these logics is established.
[ { "version": "v1", "created": "Mon, 12 Jul 2004 22:53:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Naumov", "Pavel", "" ] ]
cs/0407032
Darran Nathan
Darran Nathan
Exposing Software Defined Radio Functionality To Native Operating System Applications via Virtual Devices
4 pages, 9 figures
null
null
null
cs.AR
null
Many reconfigurable platforms require that applications be written specifically to take advantage of the reconfigurable hardware. In a PC-based environment, this presents an undesirable constraint in that the many already available applications cannot leverage on such hardware. Greatest benefit can only be derived from reconfigurable devices if even native OS applications can transparently utilize reconfigurable devices as they would normal full-fledged hardware devices. This paper presents how Proteus Virtual Devices are used to expose reconfigurable hardware in a transparent manner for use by typical native OS applications.
[ { "version": "v1", "created": "Tue, 13 Jul 2004 08:24:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Nathan", "Darran", "" ] ]
cs/0407035
Shipra Agrawal
Shipra Agrawal, Jayant R. Haritsa
A Framework for High-Accuracy Privacy-Preserving Mining
null
null
null
TR-2004-02, DSL/SERC, Indian Institute of Science
cs.DB cs.IR
null
To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of data records have been proposed recently. In this paper, we present a generalized matrix-theoretic model of random perturbation, which facilitates a systematic approach to the design of perturbation mechanisms for privacy-preserving mining. Specifically, we demonstrate that (a) the prior techniques differ only in their settings for the model parameters, and (b) through appropriate choice of parameter settings, we can derive new perturbation techniques that provide highly accurate mining results even under strict privacy guarantees. We also propose a novel perturbation mechanism wherein the model parameters are themselves characterized as random variables, and demonstrate that this feature provides significant improvements in privacy at a very marginal cost in accuracy. While our model is valid for random-perturbation-based privacy-preserving mining in general, we specifically evaluate its utility here with regard to frequent-itemset mining on a variety of real datasets. The experimental results indicate that our mechanisms incur substantially lower identity and support errors as compared to the prior techniques.
[ { "version": "v1", "created": "Thu, 15 Jul 2004 14:30:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Agrawal", "Shipra", "" ], [ "Haritsa", "Jayant R.", "" ] ]
cs/0407037
Ambedkar Dukkipati
Ambedkar Dukkipati, M. Narasimha Murty and Shalabh Bhatnagar
Generalized Evolutionary Algorithm based on Tsallis Statistics
Submitted to Physical Review E, 5 pages, 6 figures
null
null
null
cs.AI
null
Generalized evolutionary algorithm based on Tsallis canonical distribution is proposed. The algorithm uses Tsallis generalized canonical distribution to weigh the configurations for `selection' instead of Gibbs-Boltzmann distribution. Our simulation results show that for an appropriate choice of non-extensive index that is offered by Tsallis statistics, evolutionary algorithms based on this generalization outperform algorithms based on Gibbs-Boltzmann distribution.
[ { "version": "v1", "created": "Fri, 16 Jul 2004 06:08:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Dukkipati", "Ambedkar", "" ], [ "Murty", "M. Narasimha", "" ], [ "Bhatnagar", "Shalabh", "" ] ]
cs/0407040
W. J. van Hoeve
W.J. van Hoeve and M. Milano
Decomposition Based Search - A theoretical and experimental evaluation
16 pages, 8 figures. LIA Technical Report LIA00203, University of Bologna, 2003
null
null
null
cs.AI
null
In this paper we present and evaluate a search strategy called Decomposition Based Search (DBS) which is based on two steps: subproblem generation and subproblem solution. The generation of subproblems is done through value ranking and domain splitting. Subdomains are explored so as to generate, according to the heuristic chosen, promising subproblems first. We show that two well known search strategies, Limited Discrepancy Search (LDS) and Iterative Broadening (IB), can be seen as special cases of DBS. First we present a tuning of DBS that visits the same search nodes as IB, but avoids restarts. Then we compare both theoretically and computationally DBS and LDS using the same heuristic. We prove that DBS has a higher probability of being successful than LDS on a comparable number of nodes, under realistic assumptions. Experiments on a constraint satisfaction problem and an optimization problem show that DBS is indeed very effective if compared to LDS.
[ { "version": "v1", "created": "Fri, 16 Jul 2004 13:38:19 GMT" } ]
2007-05-23T00:00:00
[ [ "van Hoeve", "W. J.", "" ], [ "Milano", "M.", "" ] ]
cs/0407041
W. J. van Hoeve
Willem Jan van Hoeve
Exploiting Semidefinite Relaxations in Constraint Programming
18 pages, 4 figures. Submitted preprint
null
null
null
cs.DM cs.PL
null
Constraint programming uses enumeration and search tree pruning to solve combinatorial optimization problems. In order to speed up this solution process, we investigate the use of semidefinite relaxations within constraint programming. In principle, we use the solution of a semidefinite relaxation to guide the traversal of the search tree, using a limited discrepancy search strategy. Furthermore, a semidefinite relaxation produces a bound for the solution value, which is used to prune parts of the search tree. Experimental results on stable set and maximum clique problem instances show that constraint programming can indeed greatly benefit from semidefinite relaxations.
[ { "version": "v1", "created": "Fri, 16 Jul 2004 14:19:16 GMT" } ]
2007-05-23T00:00:00
[ [ "van Hoeve", "Willem Jan", "" ] ]
cs/0407042
W. J. van Hoeve
Willem Jan van Hoeve and Michela Milano
Postponing Branching Decisions
11 pages, 3 figures
null
null
null
cs.AI
null
Solution techniques for Constraint Satisfaction and Optimisation Problems often make use of backtrack search methods, exploiting variable and value ordering heuristics. In this paper, we propose and analyse a very simple method to apply in case the value ordering heuristic produces ties: postponing the branching decision. To this end, we group together values in a tie, branch on this sub-domain, and defer the decision among them to lower levels of the search tree. We show theoretically and experimentally that this simple modification can dramatically improve the efficiency of the search strategy. Although in practise similar methods may have been applied already, to our knowledge, no empirical or theoretical study has been proposed in the literature to identify when and to what extent this strategy should be used.
[ { "version": "v1", "created": "Fri, 16 Jul 2004 14:37:11 GMT" } ]
2007-05-23T00:00:00
[ [ "van Hoeve", "Willem Jan", "" ], [ "Milano", "Michela", "" ] ]
cs/0407043
W. J. van Hoeve
Willem Jan van Hoeve
A Hyper-Arc Consistency Algorithm for the Soft Alldifferent Constraint
11 pages, 1 figure
null
null
null
cs.PL
null
This paper presents an algorithm that achieves hyper-arc consistency for the soft alldifferent constraint. To this end, we prove and exploit the equivalence with a minimum-cost flow problem. Consistency of the constraint can be checked in O(nm) time, and hyper-arc consistency is achieved in O(m) time, where n is the number of variables involved and m is the sum of the cardinalities of the domains. It improves a previous method that did not ensure hyper-arc consistency.
[ { "version": "v1", "created": "Fri, 16 Jul 2004 14:44:21 GMT" } ]
2007-05-23T00:00:00
[ [ "van Hoeve", "Willem Jan", "" ] ]
cs/0407044
W. J. van Hoeve
M. Milano and W.J. van Hoeve
Reduced cost-based ranking for generating promising subproblems
15 pages, 1 figure. Accepted at CP 2002
null
null
null
cs.AI
null
In this paper, we propose an effective search procedure that interleaves two steps: subproblem generation and subproblem solution. We mainly focus on the first part. It consists of a variable domain value ranking based on reduced costs. Exploiting the ranking, we generate, in a Limited Discrepancy Search tree, the most promising subproblems first. An interesting result is that reduced costs provide a very precise ranking that allows to almost always find the optimal solution in the first generated subproblem, even if its dimension is significantly smaller than that of the original problem. Concerning the proof of optimality, we exploit a way to increase the lower bound for subproblems at higher discrepancies. We show experimental results on the TSP and its time constrained variant to show the effectiveness of the proposed approach, but the technique could be generalized for other problems.
[ { "version": "v1", "created": "Fri, 16 Jul 2004 14:53:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Milano", "M.", "" ], [ "van Hoeve", "W. J.", "" ] ]
cs/0407045
Viktor Kuncak
Viktor Kuncak and Martin Rinard
The First-Order Theory of Sets with Cardinality Constraints is Decidable
18 pages
null
null
MIT CSAIL 958
cs.LO cs.PL
null
We show that the decidability of the first-order theory of the language that combines Boolean algebras of sets of uninterpreted elements with Presburger arithmetic operations. We thereby disprove a recent conjecture that this theory is undecidable. Our language allows relating the cardinalities of sets to the values of integer variables, and can distinguish finite and infinite sets. We use quantifier elimination to show the decidability and obtain an elementary upper bound on the complexity. Precise program analyses can use our decidability result to verify representation invariants of data structures that use an integer field to represent the number of stored elements.
[ { "version": "v1", "created": "Sat, 17 Jul 2004 04:22:39 GMT" }, { "version": "v2", "created": "Sun, 3 Oct 2004 23:12:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuncak", "Viktor", "" ], [ "Rinard", "Martin", "" ] ]
cs/0407046
Wojciech Skut
Wojciech Skut, Stefan Ulrich and Kathrine Hammervold
A Bimachine Compiler for Ranked Tagging Rules
7 pages, 3 figures Proceedings of COLING 2004 (to appear)
null
null
null
cs.CL
null
This paper describes a novel method of compiling ranked tagging rules into a deterministic finite-state device called a bimachine. The rules are formulated in the framework of regular rewrite operations and allow unrestricted regular expressions in both left and right rule contexts. The compiler is illustrated by an application within a speech synthesis system.
[ { "version": "v1", "created": "Mon, 19 Jul 2004 11:57:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Skut", "Wojciech", "" ], [ "Ulrich", "Stefan", "" ], [ "Hammervold", "Kathrine", "" ] ]
cs/0407048
Mark Newman
Justin Balthrop, Stephanie Forrest, M. E. J. Newman, and Matthew M. Williamson
Technological networks and the spread of computer viruses
9 pages, 1 figure
Science 304, 527-529 (2004)
null
null
cs.NI cs.CY
null
Computer infections such as viruses and worms spread over networks of contacts between computers, with different types of networks being exploited by different types of infections. Here we analyze the structures of several of these networks, exploring their implications for modes of spread and the control of infection. We argue that vaccination strategies that focus on a limited number of network nodes, whether targeted or randomly chosen, are in many cases unlikely to be effective. An alternative dynamic mechanism for the control of contagion, called throttling, is introduced and argued to be effective under a range of conditions.
[ { "version": "v1", "created": "Mon, 19 Jul 2004 21:28:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Balthrop", "Justin", "" ], [ "Forrest", "Stephanie", "" ], [ "Newman", "M. E. J.", "" ], [ "Williamson", "Matthew M.", "" ] ]
cs/0407049
Davy Van Nieuwenborgh
Davy Van Nieuwenborgh and Dirk Vermeir
Preferred Answer Sets for Ordered Logic Programs
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO cs.AI
null
We extend answer set semantics to deal with inconsistent programs (containing classical negation), by finding a ``best'' answer set. Within the context of inconsistent programs, it is natural to have a partial order on rules, representing a preference for satisfying certain rules, possibly at the cost of violating less important ones. We show that such a rule order induces a natural order on extended answer sets, the minimal elements of which we call preferred answer sets. We characterize the expressiveness of the resulting semantics and show that it can simulate negation as failure, disjunction and some other formalisms such as logic programs with ordered disjunction. The approach is shown to be useful in several application areas, e.g. repairing database, where minimal repairs correspond to preferred answer sets. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Mon, 19 Jul 2004 22:37:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Van Nieuwenborgh", "Davy", "" ], [ "Vermeir", "Dirk", "" ] ]
cs/0407051
G. Gordon Worley III
G Gordon Worley III
Bug shallowness in open-source, Macintosh software
added description of bug shallowness; corrected abstract (5 pages, PDF only (no LaTeX))
Worley III, G Gordon. "Bug shallowness in open-source, Macintosh software". Advanced Developers Hands On Conference 19. 2004
null
null
cs.SE
null
Central to the power of open-source software is bug shallowness, the relative ease of finding and fixing bugs. The open-source movement began with Unix software, so many users were also programmers capable of finding and fixing bugs given the source code. But as the open-source movement reaches the Macintosh platform, bugs may not be shallow because few Macintosh users are programmers. Based on reports from open-source developers, I, however, conclude that that bugs are as shallow in open-source, Macintosh software as in any other open-source software.
[ { "version": "v1", "created": "Tue, 20 Jul 2004 13:04:36 GMT" }, { "version": "v2", "created": "Thu, 29 Jul 2004 23:08:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Worley", "G Gordon", "III" ] ]
cs/0407055
Marco Pedicini
M. Pedicini, F. Quaglia
PELCR: Parallel Environment for Optimal Lambda-Calculus Reduction
null
null
null
null
cs.LO cs.DC
null
In this article we present the implementation of an environment supporting L\'evy's \emph{optimal reduction} for the $\lambda$-calculus \cite{Lev78} on parallel (or distributed) computing systems. In a similar approach to Lamping's one in \cite{Lamping90}, we base our work on a graph reduction technique known as \emph{directed virtual reduction} \cite{DPR97} which is actually a restriction of Danos-Regnier virtual reduction \cite{DanosRegnier93}. The environment, which we refer to as PELCR (Parallel Environment for optimal Lambda-Calculus Reduction) relies on a strategy for directed virtual reduction, namely {\em half combustion}, which we introduce in this article. While developing PELCR we have adopted both a message aggregation technique, allowing a reduction of the communication overhead, and a fair policy for distributing dynamically originated load among processors. We also present an experimental study demonstrating the ability of PELCR to definitely exploit parallelism intrinsic to $\lambda$-terms while performing the reduction. By the results we show how PELCR allows achieving up to 70/80% of the ideal speedup on last generation multiprocessor computing systems. As a last note, the software modules have been developed with the {\tt C} language and using a standard interface for message passing, i.e. MPI, thus making PELCR itself a highly portable software package.
[ { "version": "v1", "created": "Thu, 22 Jul 2004 17:52:39 GMT" }, { "version": "v2", "created": "Fri, 23 Jul 2004 10:53:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Pedicini", "M.", "" ], [ "Quaglia", "F.", "" ] ]
cs/0407056
John Watrous
Bill Rosgen and John Watrous
On the hardness of distinguishing mixed-state quantum computations
17 pages
null
null
null
cs.CC quant-ph
null
This paper considers the following problem. Two mixed-state quantum circuits Q and R are given, and the goal is to determine which of two possibilities holds: (i) Q and R act nearly identically on all possible quantum state inputs, or (ii) there exists some input state that Q and R transform into almost perfectly distinguishable outputs. This problem may be viewed as an abstraction of the following problem: given two physical processes described by sequences of local interactions, are the processes effectively the same or are they different? We prove that this problem is a complete promise problem for the class QIP of problems having quantum interactive proof systems, and is therefore PSPACE-hard. This is in sharp contrast to the fact that the analogous problem for classical (probabilistic) circuits is in AM, and for unitary quantum circuits is in QMA.
[ { "version": "v1", "created": "Thu, 22 Jul 2004 20:45:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosgen", "Bill", "" ], [ "Watrous", "John", "" ] ]
cs/0407058
Sandor P. Fekete
Michael A. Bender, David P. Bunde, Erik D. Demaine, Sandor P. Fekete, Vitus J. Leung, Henk Meijer and Cynthia A. Phillips
Communication-Aware Processor Allocation for Supercomputers
19 pages, 7 figures, 1 table, Latex, submitted for journal publication. Previous version is extended abstract (14 pages), appeared in Proceedings WADS, Springer LNCS 3608, pp. 169-181
null
null
null
cs.DS cs.DC
null
This paper gives processor-allocation algorithms for minimizing the average number of communication hops between the assigned processors for grid architectures, in the presence of occupied cells. The simpler problem of assigning processors on a free grid has been studied by Karp, McKellar, and Wong who show that the solutions have nontrivial structure; they left open the complexity of the problem. The associated clustering problem is as follows: Given n points in Re^d, find k points that minimize their average pairwise L1 distance. We present a natural approximation algorithm and show that it is a 7/4-approximation for 2D grids. For d-dimensional space, the approximation guarantee is 2-(1/2d), which is tight. We also give a polynomial-time approximation scheme (PTAS) for constant dimension d, and report on experimental results.
[ { "version": "v1", "created": "Sat, 24 Jul 2004 13:40:26 GMT" }, { "version": "v2", "created": "Tue, 6 Dec 2005 13:30:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Bender", "Michael A.", "" ], [ "Bunde", "David P.", "" ], [ "Demaine", "Erik D.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Leung", "Vitus J.", "" ], [ "Meijer", "Henk", "" ], [ "Phillips", "Cynthia A.", "" ] ]