id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0407059 | Sergey Tsarev P. | Sergey P. Tsarev | On rational definite summation | LaTeX 2.09, 7 pages, submitted to "Programming & Computer Software" | null | null | null | cs.SC cs.DM | null | We present a partial proof of van Hoeij-Abramov conjecture about the
algorithmic possibility of computation of finite sums of rational functions.
The theoretical results proved in this paper provide an algorithm for
computation of a large class of sums $ S(n) = \sum_{k=0}^{n-1}R(k,n)$.
| [
{
"version": "v1",
"created": "Sat, 24 Jul 2004 14:11:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tsarev",
"Sergey P.",
""
]
] |
cs/0407061 | Vincent Blondel | Vincent Blondel, Anahi Gajardo, Maureen Heymans, Pierre Senellart,
Paul Van Dooren | A measure of similarity between graph vertices | null | null | null | null | cs.IR cond-mat.dis-nn cs.DM physics.data-an | null | We introduce a concept of similarity between vertices of directed graphs. Let
G_A and G_B be two directed graphs. We define a similarity matrix whose (i,
j)-th real entry expresses how similar vertex j (in G_A) is to vertex i (in
G_B. The similarity matrix can be obtained as the limit of the normalized even
iterates of a linear transformation. In the special case where G_A=G_B=G, the
matrix is square and the (i, j)-th entry is the similarity score between the
vertices i and j of G. We point out that Kleinberg's "hub and authority" method
to identify web-pages relevant to a given query can be viewed as a special case
of our definition in the case where one of the graphs has two vertices and a
unique directed edge between them. In analogy to Kleinberg, we show that our
similarity scores are given by the components of a dominant eigenvector of a
non-negative matrix. Potential applications of our similarity concept are
numerous. We illustrate an application for the automatic extraction of synonyms
in a monolingual dictionary.
| [
{
"version": "v1",
"created": "Wed, 28 Jul 2004 13:42:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Blondel",
"Vincent",
""
],
[
"Gajardo",
"Anahi",
""
],
[
"Heymans",
"Maureen",
""
],
[
"Senellart",
"Pierre",
""
],
[
"Van Dooren",
"Paul",
""
]
] |
cs/0407062 | Judith Beumer | Xuehai Zhang and Jennifer M. Schopf | Performance Analysis of the Globus Toolkit Monitoring and Discovery
Service, MDS2 | null | null | null | Preprint ANL/MCS-P1115-0104 | cs.DC cs.PF | null | Monitoring and information services form a key component of a distributed
system, or Grid. A quantitative study of such services can aid in understanding
the performance limitations, advise in the deployment of the monitoring system,
and help evaluate future development work. To this end, we examined the
performance of the Globus Toolkit(reg. trdmrk) Monitoring and Discovery Service
(MDS2) by instrumenting its main services using NetLogger. Our study shows a
strong advantage to caching or prefetching the data, as well as the need to
have primary components at well-connected sites.
| [
{
"version": "v1",
"created": "Wed, 28 Jul 2004 14:07:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Xuehai",
""
],
[
"Schopf",
"Jennifer M.",
""
]
] |
cs/0407064 | Gian Luca Pozzato | Nicola Olivetti, Gian Luca Pozzato, Camilla Schwind | A Sequent Calculus and a Theorem Prover for Standard Conditional Logics | 45 pages with 2 figures, uses prooftree.sty | null | null | null | cs.LO cs.AI | null | In this paper we present a cut-free sequent calculus, called SeqS, for some
standard conditional logics, namely CK, CK+ID, CK+MP and CK+MP+ID. The calculus
uses labels and transition formulas and can be used to prove decidability and
space complexity bounds for the respective logics. We also present CondLean, a
theorem prover for these logics implementing SeqS calculi written in SICStus
Prolog.
| [
{
"version": "v1",
"created": "Thu, 29 Jul 2004 14:17:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Olivetti",
"Nicola",
""
],
[
"Pozzato",
"Gian Luca",
""
],
[
"Schwind",
"Camilla",
""
]
] |
cs/0407065 | Peter Turney | Peter D. Turney (National Research Council of Canada) | Word Sense Disambiguation by Web Mining for Word Co-occurrence
Probabilities | related work available at http://purl.org/peter.turney/ | Proceedings of the Third International Workshop on the Evaluation
of Systems for the Semantic Analysis of Text (SENSEVAL-3), (2004), Barcelona,
Spain, 239-242 | null | null | cs.CL cs.IR cs.LG | null | This paper describes the National Research Council (NRC) Word Sense
Disambiguation (WSD) system, as applied to the English Lexical Sample (ELS)
task in Senseval-3. The NRC system approaches WSD as a classical supervised
machine learning problem, using familiar tools such as the Weka machine
learning software and Brill's rule-based part-of-speech tagger. Head words are
represented as feature vectors with several hundred features. Approximately
half of the features are syntactic and the other half are semantic. The main
novelty in the system is the method for generating the semantic features, based
on word \hbox{co-occurrence} probabilities. The probabilities are estimated
using the Waterloo MultiText System with a corpus of about one terabyte of
unlabeled text, collected by a web crawler.
| [
{
"version": "v1",
"created": "Thu, 29 Jul 2004 19:46:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] |
cs/0407066 | Tentyukov Mikhail | M.Tentyukov, D.Fliegner, M.Frank, A.Onischenko, A.Retey,
H.M.Staudenmaier and J.A.M.Vermaseren | ParFORM: Parallel Version of the Symbolic Manipulation Program FORM | 5 pages, 4 Encapsulated postscript figures, LaTeX2e uses casc.cls
(included). Presented at CASC'04 http://wwwmayr.in.tum.de/CASC2004/ | null | null | TTP04-15 | cs.SC cs.DC hep-ph | null | After an introduction to the sequential version of FORM and the mechanisms
behind, we report on the status of our project of parallelization. We have now
a parallel version of FORM running on Cluster- and SMP-architectures. This
version can be used to run arbitrary FORM programs in parallel.
| [
{
"version": "v1",
"created": "Fri, 30 Jul 2004 10:06:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tentyukov",
"M.",
""
],
[
"Fliegner",
"D.",
""
],
[
"Frank",
"M.",
""
],
[
"Onischenko",
"A.",
""
],
[
"Retey",
"A.",
""
],
[
"Staudenmaier",
"H. M.",
""
],
[
"Vermaseren",
"J. A. M.",
""
]
] |
cs/0408001 | Thomas Schmidt C. | Michael Engelhardt, Thomas C. Schmidt | Semantic Linking - a Context-Based Approach to Interactivity in
Hypermedia | null | R. Tolksdorf, R. Eckstein: Proc. of Berliner XML Tage.
Humboldt-Universitaet zu Berlin; pp. 55-66; ISBN 3-88579-116-1; Berlin; 2003 | null | null | cs.IR cs.LG | null | The semantic Web initiates new, high level access schemes to online content
and applications. One area of superior need for a redefined content exploration
is given by on-line educational applications and their concepts of
interactivity in the framework of open hypermedia systems. In the present paper
we discuss aspects and opportunities of gaining interactivity schemes from
semantic notions of components. A transition from standard educational
annotation to semantic statements of hyperlinks is discussed. Further on we
introduce the concept of semantic link contexts as an approach to manage a
coherent rhetoric of linking. A practical implementation is introduced, as
well. Our semantic hyperlink implementation is based on the more general
Multimedia Information Repository MIR, an open hypermedia system supporting the
standards XML, Corba and JNDI.
| [
{
"version": "v1",
"created": "Sat, 31 Jul 2004 14:04:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Engelhardt",
"Michael",
""
],
[
"Schmidt",
"Thomas C.",
""
]
] |
cs/0408002 | Thomas Schmidt C. | Thomas C. Schmidt, Matthias W\"ahlisch | Roaming Real-Time Applications - Mobility Services in IPv6 Networks | 15 pages, 5 figures | Proceedings TERENA Networking Conference Zagreb, 2003,
http://www.terena.nl/conferences/tnc2003/programme/final-programme.html | null | null | cs.NI cs.PF | null | Emerging mobility standards within the next generation Internet Protocol,
IPv6, promise to continuously operate devices roaming between IP networks.
Associated with the paradigm of ubiquitous computing and communication, network
technology is on the spot to deliver voice and videoconferencing as a standard
internet solution. However, current roaming procedures are too slow, to remain
seamless for real-time applications. Multicast mobility still waits for a
convincing design. This paper investigates the temporal behaviour of mobile
IPv6 with dedicated focus on topological impacts. Extending the hierarchical
mobile IPv6 approach we suggest protocol improvements for a continuous
handover, which may serve bidirectional multicast communication, as well. Along
this line a multicast mobility concept is introduced as a service for clients
and sources, as they are of dedicated importance in multipoint conferencing
applications. The mechanisms introduced do not rely on assumptions of any
specific multicast routing protocol in use.
| [
{
"version": "v1",
"created": "Sat, 31 Jul 2004 14:43:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidt",
"Thomas C.",
""
],
[
"Wählisch",
"Matthias",
""
]
] |
cs/0408003 | Manor Mendel | Yair Bartal, Manor Mendel | Multi-Embedding of Metric Spaces | null | SIAM J. Comput. 34(1): 248-259, 2004 | 10.1137/S0097539703433122 | null | cs.DS | null | Metric embedding has become a common technique in the design of algorithms.
Its applicability is often dependent on how high the embedding's distortion is.
For example, embedding finite metric space into trees may require linear
distortion as a function of its size. Using probabilistic metric embeddings,
the bound on the distortion reduces to logarithmic in the size.
We make a step in the direction of bypassing the lower bound on the
distortion in terms of the size of the metric. We define "multi-embeddings" of
metric spaces in which a point is mapped onto a set of points, while keeping
the target metric of polynomial size and preserving the distortion of paths.
The distortion obtained with such multi-embeddings into ultrametrics is at most
O(log Delta loglog Delta) where Delta is the aspect ratio of the metric. In
particular, for expander graphs, we are able to obtain constant distortion
embeddings into trees in contrast with the Omega(log n) lower bound for all
previous notions of embeddings.
We demonstrate the algorithmic application of the new embeddings for two
optimization problems: group Steiner tree and metrical task systems.
| [
{
"version": "v1",
"created": "Mon, 2 Aug 2004 16:42:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bartal",
"Yair",
""
],
[
"Mendel",
"Manor",
""
]
] |
cs/0408004 | Thomas Schmidt C. | Michael Engelhardt, Andreas K\'arp\'ati, Torsten Rack, Ivette Schmidt,
Thomas C. Schmidt | Hypermedia Learning Objects System - On the Way to a Semantic
Educational Web | 11 pages, 7 figures | Proceedings of the International Workshop {"}Interactive Computer
aided Learning{"} ICL 2003. Learning Objects and Reusability of Content,
Kassel University Press 2003, ISBN 3-89958-029-X | null | null | cs.IR cs.LG | null | While eLearning systems become more and more popular in daily education,
available applications lack opportunities to structure, annotate and manage
their contents in a high-level fashion. General efforts to improve these
deficits are taken by initiatives to define rich meta data sets and a
semanticWeb layer. In the present paper we introduce Hylos, an online learning
system. Hylos is based on a cellular eLearning Object (ELO) information model
encapsulating meta data conforming to the LOM standard. Content management is
provisioned on this semantic meta data level and allows for variable,
dynamically adaptable access structures. Context aware multifunctional links
permit a systematic navigation depending on the learners and didactic needs,
thereby exploring the capabilities of the semantic web. Hylos is built upon the
more general Multimedia Information Repository (MIR) and the MIR adaptive
context linking environment (MIRaCLE), its linking extension. MIR is an open
system supporting the standards XML, Corba and JNDI. Hylos benefits from
manageable information structures, sophisticated access logic and high-level
authoring tools like the ELO editor responsible for the semi-manual creation of
meta data and WYSIWYG like content editing.
| [
{
"version": "v1",
"created": "Sat, 31 Jul 2004 22:16:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Engelhardt",
"Michael",
""
],
[
"Kárpáti",
"Andreas",
""
],
[
"Rack",
"Torsten",
""
],
[
"Schmidt",
"Ivette",
""
],
[
"Schmidt",
"Thomas C.",
""
]
] |
cs/0408005 | Thomas C. Schmidt | Michael Engelhardt, Arne Hildebrand, Andreas K\'arp\'ati, Torsten
Rack, Thomas C. Schmidt | Educational Content Management - A Cellular Approach | 9 pages, 6 figures | Proceedings of the International Workshop "Interactive Computer
aided Learning" ICL 2002. Blended Learning. Kassel University Press 2002,
ISBN 3-933146-83-6 | null | null | cs.CY cs.IR | null | In recent times online educational applications more and more are requested
to provide self-consistent learning offers for students at the university
level. Consequently they need to cope with the wide range of complexity and
interrelations university course teaching brings along. An urgent need to
overcome simplistically linked HTMLc ontent pages becomes apparent. In the
present paper we discuss a schematic concept of educational content
construction from information cells and introduce its implementation on the
storage and runtime layer. Starting from cells content is annotated according
to didactic needs, structured for dynamic arrangement, dynamically decorated
with hyperlinks and, as all works are based on XML, open to any presentation
layer. Data can be variably accessed through URIs built on semantic path-names
and edited via an adaptive authoring toolbox. Our content management approach
is based on the more general Multimedia Information Repository MIR. and allows
for personalisation, as well. MIR is an open system supporting the standards
XML, Corba and JNDI.
| [
{
"version": "v1",
"created": "Sun, 1 Aug 2004 11:34:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Engelhardt",
"Michael",
""
],
[
"Hildebrand",
"Arne",
""
],
[
"Kárpáti",
"Andreas",
""
],
[
"Rack",
"Torsten",
""
],
[
"Schmidt",
"Thomas C.",
""
]
] |
cs/0408006 | Boris D. Lubachevsky | Vigen A. Geodakian | Why Two Sexes? | 12 pages, 3 figures | Nauka i zhizn (Science and Life), 1965 | null | null | cs.NE cs.GL q-bio.PE | null | Evolutionary role of the separation into two sexes from a cyberneticist's
point of view. [I translated this 1965 article from Russian "Nauka i Zhizn"
(Science and Life) in 1988. In a popular form, the article puts forward several
useful ideas not all of which even today are necessarily well known or widely
accepted. Boris Lubachevsky, [email protected] ]
| [
{
"version": "v1",
"created": "Sun, 1 Aug 2004 15:04:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Geodakian",
"Vigen A.",
""
]
] |
cs/0408007 | Adam Kalai | Abraham D. Flaxman, Adam Tauman Kalai, and H. Brendan McMahan | Online convex optimization in the bandit setting: gradient descent
without a gradient | 12 pages | null | null | null | cs.LG cs.CC | null | We consider a the general online convex optimization framework introduced by
Zinkevich. In this setting, there is a sequence of convex functions. Each
period, we must choose a signle point (from some feasible set) and pay a cost
equal to the value of the next function on our chosen point. Zinkevich shows
that, if the each function is revealed after the choice is made, then one can
achieve vanishingly small regret relative the best single decision chosen in
hindsight.
We extend this to the bandit setting where we do not find out the entire
functions but rather just their value at our chosen point. We show how to get
vanishingly small regret in this setting.
Our approach uses a simple approximation of the gradient that is computed
from evaluating a function at a single (random) point. We show that this
estimate is sufficient to mimic Zinkevich's gradient descent online analysis,
with access to the gradient (only being able to evaluate the function at a
single point).
| [
{
"version": "v1",
"created": "Mon, 2 Aug 2004 21:24:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Flaxman",
"Abraham D.",
""
],
[
"Kalai",
"Adam Tauman",
""
],
[
"McMahan",
"H. Brendan",
""
]
] |
cs/0408009 | Thomas C. Schmidt | Thomas C. Schmidt, Matthias W\"ahlisch | Performance Analysis of Multicast Mobility in a Hierarchical Mobile IP
Proxy Environment | 11 pages, 7 figures | Selected Papers from TERENA Networking Conference Rhodes, 2004,
http://www.terena.nl/library/tnc2004-proceedings/papers/schmidt.pdf | null | null | cs.NI cs.PF | null | Mobility support in IPv6 networks is ready for release as an RFC, stimulating
major discussions on improvements to meet real-time communication requirements.
Sprawling hot spots of IP-only wireless networks at the same time await voice
and videoconferencing as standard mobile Internet services, thereby adding the
request for multicast support to real-time mobility. This paper briefly
introduces current approaches for seamless multicast extensions to Mobile IPv6.
Key issues of multicast mobility are discussed. Both analytically and in
simulations comparisons are drawn between handover performance characteristics,
dedicating special focus on the M-HMIPv6 approach.
| [
{
"version": "v1",
"created": "Tue, 3 Aug 2004 10:18:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidt",
"Thomas C.",
""
],
[
"Wählisch",
"Matthias",
""
]
] |
cs/0408010 | Florentin Smarandache | Florentin Smarandache, Jean Dezert | A Simple Proportional Conflict Redistribution Rule | 21 pages | International Journal of Applied Mathematics and Statistics, Vol.
3, No. J05, 1-36, 2005. | null | null | cs.AI | null | One proposes a first alternative rule of combination to WAO (Weighted Average
Operator) proposed recently by Josang, Daniel and Vannoorenberghe, called
Proportional Conflict Redistribution rule (denoted PCR1). PCR1 and WAO are
particular cases of WO (the Weighted Operator) because the conflicting mass is
redistributed with respect to some weighting factors. In this first PCR rule,
the proportionalization is done for each non-empty set with respect to the
non-zero sum of its corresponding mass matrix - instead of its mass column
average as in WAO, but the results are the same as Ph. Smets has pointed out.
Also, we extend WAO (which herein gives no solution) for the degenerate case
when all column sums of all non-empty sets are zero, and then the conflicting
mass is transferred to the non-empty disjunctive form of all non-empty sets
together; but if this disjunctive form happens to be empty, then one considers
an open world (i.e. the frame of discernment might contain new hypotheses) and
thus all conflicting mass is transferred to the empty set. In addition to WAO,
we propose a general formula for PCR1 (WAO for non-degenerate cases).
| [
{
"version": "v1",
"created": "Tue, 3 Aug 2004 16:08:37 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Aug 2004 00:30:31 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Aug 2004 19:46:40 GMT"
},
{
"version": "v4",
"created": "Fri, 20 Aug 2004 17:38:59 GMT"
},
{
"version": "v5",
"created": "Sun, 19 Sep 2004 16:28:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] |
cs/0408013 | Viktor Kuncak | Viktor Kuncak, Patrick Lam, Martin Rinard | Roles Are Really Great! | 29 pages. A version appeared in POPL 2002 | null | null | MIT CSAIL 822 | cs.PL cs.SE | null | We present a new role system for specifying changing referencing
relationships of heap objects. The role of an object depends, in large part, on
its aliasing relationships with other objects, with the role of each object
changing as its aliasing relationships change. Roles therefore capture
important object and data structure properties and provide useful information
about how the actions of the program interact with these properties. Our role
system enables the programmer to specify the legal aliasing relationships that
define the set of roles that objects may play, the roles of procedure
parameters and object fields, and the role changes that procedures perform
while manipulating objects. We present an interprocedural, compositional, and
context-sensitive role analysis algorithm that verifies that a program respects
the role constraints.
| [
{
"version": "v1",
"created": "Thu, 5 Aug 2004 03:02:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuncak",
"Viktor",
""
],
[
"Lam",
"Patrick",
""
],
[
"Rinard",
"Martin",
""
]
] |
cs/0408014 | Viktor Kuncak | Viktor Kuncak, Martin Rinard | Typestate Checking and Regular Graph Constraints | 21 page. A version appeared in SAS 2003 | null | null | MIT CSAIL 863 | cs.PL cs.LO | null | We introduce regular graph constraints and explore their decidability
properties. The motivation for regular graph constraints is 1) type checking of
changing types of objects in the presence of linked data structures, 2) shape
analysis techniques, and 3) generalization of similar constraints over trees
and grids. We define a subclass of graphs called heaps as an abstraction of the
data structures that a program constructs during its execution. We prove that
determining the validity of implication for regular graph constraints over the
class of heaps is undecidable. We show undecidability by exhibiting a
characterization of certain "corresponder graphs" in terms of presence and
absence of homomorphisms to a finite number of fixed graphs. The undecidability
of implication of regular graph constraints implies that there is no algorithm
that will verify that procedure preconditions are met or that the invariants
are maintained when these properties are expressed in any specification
language at least as expressive as regular graph constraints.
| [
{
"version": "v1",
"created": "Thu, 5 Aug 2004 03:41:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuncak",
"Viktor",
""
],
[
"Rinard",
"Martin",
""
]
] |
cs/0408015 | Viktor Kuncak | Viktor Kuncak, Martin Rinard | On the Theory of Structural Subtyping | 51 page. A version appeared in LICS 2003 | null | null | MIT CSAIL 879 | cs.LO cs.PL cs.SE | null | We show that the first-order theory of structural subtyping of non-recursive
types is decidable. Let $\Sigma$ be a language consisting of function symbols
(representing type constructors) and $C$ a decidable structure in the
relational language $L$ containing a binary relation $\leq$. $C$ represents
primitive types; $\leq$ represents a subtype ordering. We introduce the notion
of $\Sigma$-term-power of $C$, which generalizes the structure arising in
structural subtyping. The domain of the $\Sigma$-term-power of $C$ is the set
of $\Sigma$-terms over the set of elements of $C$. We show that the
decidability of the first-order theory of $C$ implies the decidability of the
first-order theory of the $\Sigma$-term-power of $C$. Our decision procedure
makes use of quantifier elimination for term algebras and Feferman-Vaught
theorem. Our result implies the decidability of the first-order theory of
structural subtyping of non-recursive types.
| [
{
"version": "v1",
"created": "Thu, 5 Aug 2004 04:12:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuncak",
"Viktor",
""
],
[
"Rinard",
"Martin",
""
]
] |
cs/0408016 | H{\aa}kan Sundell | H{\aa}kan Sundell and Philippas Tsigas | Lock-Free and Practical Deques using Single-Word Compare-And-Swap | null | null | null | 2004-02 | cs.DC cs.DS | null | We present an efficient and practical lock-free implementation of a
concurrent deque that is disjoint-parallel accessible and uses atomic
primitives which are available in modern computer systems. Previously known
lock-free algorithms of deques are either based on non-available atomic
synchronization primitives, only implement a subset of the functionality, or
are not designed for disjoint accesses. Our algorithm is based on a doubly
linked list, and only requires single-word compare-and-swap atomic primitives,
even for dynamic memory sizes. We have performed an empirical study using full
implementations of the most efficient algorithms of lock-free deques known. For
systems with low concurrency, the algorithm by Michael shows the best
performance. However, as our algorithm is designed for disjoint accesses, it
performs significantly better on systems with high concurrency and non-uniform
memory architecture.
| [
{
"version": "v1",
"created": "Thu, 5 Aug 2004 14:17:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sundell",
"Håkan",
""
],
[
"Tsigas",
"Philippas",
""
]
] |
cs/0408018 | Viktor Kuncak | Viktor Kuncak, Martin Rinard | On Role Logic | 20 pages. Our later SAS 2004 result builds on this work | null | null | MIT CSAIL 925 | cs.PL cs.LO | null | We present role logic, a notation for describing properties of relational
structures in shape analysis, databases, and knowledge bases. We construct role
logic using the ideas of de Bruijn's notation for lambda calculus, an encoding
of first-order logic in lambda calculus, and a simple rule for implicit
arguments of unary and binary predicates. The unrestricted version of role
logic has the expressive power of first-order logic with transitive closure.
Using a syntactic restriction on role logic formulas, we identify a natural
fragment RL^2 of role logic. We show that the RL^2 fragment has the same
expressive power as two-variable logic with counting C^2 and is therefore
decidable. We present a translation of an imperative language into the
decidable fragment RL^2, which allows compositional verification of programs
that manipulate relational structures. In addition, we show how RL^2 encodes
boolean shape analysis constraints and an expressive description logic.
| [
{
"version": "v1",
"created": "Thu, 5 Aug 2004 23:01:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuncak",
"Viktor",
""
],
[
"Rinard",
"Martin",
""
]
] |
cs/0408019 | Viktor Kuncak | Viktor Kuncak, Martin Rinard | On Generalized Records and Spatial Conjunction in Role Logic | 30 pages. A version appears in SAS 2004 | null | null | MIT CSAIL 942 | cs.PL cs.LO | null | We have previously introduced role logic as a notation for describing
properties of relational structures in shape analysis, databases and knowledge
bases. A natural fragment of role logic corresponds to two-variable logic with
counting and is therefore decidable. We show how to use role logic to describe
open and closed records, as well the dual of records, inverse records. We
observe that the spatial conjunction operation of separation logic naturally
models record concatenation. Moreover, we show how to eliminate the spatial
conjunction of formulas of quantifier depth one in first-order logic with
counting. As a result, allowing spatial conjunction of formulas of quantifier
depth one preserves the decidability of two-variable logic with counting. This
result applies to two-variable role logic fragment as well. The resulting logic
smoothly integrates type system and predicate calculus notation and can be
viewed as a natural generalization of the notation for constraints arising in
role analysis and similar shape analysis approaches.
| [
{
"version": "v1",
"created": "Thu, 5 Aug 2004 23:25:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuncak",
"Viktor",
""
],
[
"Rinard",
"Martin",
""
]
] |
cs/0408020 | Sameer Tilak | Sameer Tilak, Nael Abu-Ghazaleh, Wendi Heinzelman | Collaborative Storage Management In Sensor Networks | 13 pages, 7 figures | null | null | CS-TR-04-NA01 | cs.NI cs.AR | null | In this paper, we consider a class of sensor networks where the data is not
required in real-time by an observer; for example, a sensor network monitoring
a scientific phenomenon for later play back and analysis. In such networks, the
data must be stored in the network. Thus, in addition to battery power, storage
is a primary resource: the useful lifetime of the network is constrained by its
ability to store the generated data samples. We explore the use of
collaborative storage technique to efficiently manage data in storage
constrained sensor networks. The proposed collaborative storage technique takes
advantage of spatial correlation among the data collected by nearby sensors to
significantly reduce the size of the data near the data sources. We show that
the proposed approach provides significant savings in the size of the stored
data vs. local buffering, allowing the network to run for a longer time without
running out of storage space and reducing the amount of data that will
eventually be relayed to the observer. In addition, collaborative storage
performs load balancing of the available storage space if data generation rates
are not uniform across sensors (as would be the case in an event driven sensor
network), or if the available storage varies across the network.
| [
{
"version": "v1",
"created": "Fri, 6 Aug 2004 12:56:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tilak",
"Sameer",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
],
[
"Heinzelman",
"Wendi",
""
]
] |
cs/0408022 | Gerard Chang Jennhwa | Guey-Yun Chang, Gerard J. Chang and Gen-Huey Chen | Diagnosabilities of regular networks | 26 pages | null | null | NCTS/TPE-Math Technical Report 2004-013 | cs.NI | null | In this paper, we study diagnosabilities of multiprocessor systems under two
diagnosis models: the PMC model and the comparison model. In each model, we
further consider two different diagnosis strategies: the precise diagnosis
strategy proposed by Preparata et al. and the pessimistic diagnosis strategy
proposed by Friedman. The main result of this paper is to determine
diagnosabilities of regular networks with certain conditions, which include
several widely used multiprocessor systems such as variants of hypercubes and
many others.
| [
{
"version": "v1",
"created": "Mon, 9 Aug 2004 08:28:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chang",
"Guey-Yun",
""
],
[
"Chang",
"Gerard J.",
""
],
[
"Chen",
"Gen-Huey",
""
]
] |
cs/0408023 | W. J. van Hoeve | Willem Jan van Hoeve and Gilles Pesant and Louis-Martin Rousseau | On Global Warming (Softening Global Constraints) | 15 pages, 7 figures. Accepted at the 6th International Workshop on
Preferences and Soft Constraints | null | null | null | cs.AI cs.PL | null | We describe soft versions of the global cardinality constraint and the
regular constraint, with efficient filtering algorithms maintaining domain
consistency. For both constraints, the softening is achieved by augmenting the
underlying graph. The softened constraints can be used to extend the
meta-constraint framework for over-constrained problems proposed by Petit,
Regin and Bessiere.
| [
{
"version": "v1",
"created": "Mon, 9 Aug 2004 12:06:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Hoeve",
"Willem Jan",
""
],
[
"Pesant",
"Gilles",
""
],
[
"Rousseau",
"Louis-Martin",
""
]
] |
cs/0408024 | Sameer Tilak | Sameer Tilak, Amy Murphy, Wendi Heinzelman and Nael B. Abu-Ghazaleh | Non-uniform Information Dissemination for Sensor Networks | 16 pages, 7 Figures, An earlier version of this paper appeared in the
International Conference on Networking Protocols (ICNP 2003). Significant
changes in this paper include the addition of an analysis of the protocol in
the presence of mobility, as well as an expanded discussion section. At
present this paper has been submitted for a journal publication and it is
currently under review | null | null | CS-TR-04-NA03 | cs.NI | null | Future smart environments will be characterized by multiple nodes that sense,
collect, and disseminate information about environmental phenomena through a
wireless network. In this paper, we define a set of applications that require a
new form of distributed knowledge about the environment, referred to as
non-uniform information granularity. By non-uniform information granularity we
mean that the required accuracy or precision of information is proportional to
the distance between a source node (information producer) and current sink node
(information consumer). That is, as the distance between the source node and
sink node increases, loss in information precision is acceptable. Applications
that can benefit from this type of knowledge range from battlefield scenarios
to rescue operations. The main objectives of this paper are two-fold: first, we
will precisely define non-uniform information granularity, and second, we will
describe different protocols that achieve non-uniform information dissemination
and analyze these protocols based on complexity, energy consumption, and
accuracy of information.
| [
{
"version": "v1",
"created": "Tue, 10 Aug 2004 03:23:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tilak",
"Sameer",
""
],
[
"Murphy",
"Amy",
""
],
[
"Heinzelman",
"Wendi",
""
],
[
"Abu-Ghazaleh",
"Nael B.",
""
]
] |
cs/0408026 | Wojciech Skut | Wojciech Skut | Incremental Construction of Minimal Acyclic Sequential Transducers from
Unsorted Data | Proceedings of COLING 2004 (to appear), 7 pages, 5 figures | null | null | null | cs.CL cs.DS | null | This paper presents an efficient algorithm for the incremental construction
of a minimal acyclic sequential transducer (ST) for a dictionary consisting of
a list of input and output strings. The algorithm generalises a known method of
constructing minimal finite-state automata (Daciuk et al. 2000). Unlike the
algorithm published by Mihov and Maurel (2001), it does not require the input
strings to be sorted. The new method is illustrated by an application to
pronunciation dictionaries.
| [
{
"version": "v1",
"created": "Tue, 10 Aug 2004 11:09:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Skut",
"Wojciech",
""
]
] |
cs/0408027 | Henning Christiansen | Henning Christiansen | CHR Grammars | 36 pp. To appear in TPLP, 2005 | null | null | null | cs.CL cs.PL | null | A grammar formalism based upon CHR is proposed analogously to the way
Definite Clause Grammars are defined and implemented on top of Prolog. These
grammars execute as robust bottom-up parsers with an inherent treatment of
ambiguity and a high flexibility to model various linguistic phenomena. The
formalism extends previous logic programming based grammars with a form of
context-sensitive rules and the possibility to include extra-grammatical
hypotheses in both head and body of grammar rules. Among the applications are
straightforward implementations of Assumption Grammars and abduction under
integrity constraints for language analysis. CHR grammars appear as a powerful
tool for specification and implementation of language processors and may be
proposed as a new standard for bottom-up grammars in logic programming.
To appear in Theory and Practice of Logic Programming (TPLP), 2005
| [
{
"version": "v1",
"created": "Thu, 12 Aug 2004 11:15:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Christiansen",
"Henning",
""
]
] |
cs/0408028 | Joel Friedman | Joel Friedman and Jean-Pierre Tillich | Calculus on Graphs | 63 pages, LaTeX | null | null | null | cs.DM math.CO | null | The purpose of this paper is to develop a "calculus" on graphs that allows
graph theory to have new connections to analysis. For example, our framework
gives rise to many new partial differential equations on graphs, most notably a
new (Laplacian based) wave equation; this wave equation gives rise to a partial
improvement on the Chung-Faber-Manteuffel diameter/eigenvalue bound in graph
theory, and the Chung-Grigoryan-Yau and (in a certain case) Bobkov-Ledoux
distance/eigenvalue bounds in analysis. Our framework also allows most
techniques for the non-linear p-Laplacian in analysis to be easily carried over
to graph theory.
| [
{
"version": "v1",
"created": "Thu, 12 Aug 2004 18:04:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedman",
"Joel",
""
],
[
"Tillich",
"Jean-Pierre",
""
]
] |
cs/0408029 | Jason Cantarella | Jason Cantarella and Michael Piatek | Tsnnls: A solver for large sparse least squares problems with
non-negative variables | 7 pages, 2 figures | null | null | null | cs.MS | null | The solution of large, sparse constrained least-squares problems is a staple
in scientific and engineering applications. However, currently available codes
for such problems are proprietary or based on MATLAB. We announce a freely
available C implementation of the fast block pivoting algorithm of Portugal,
Judice, and Vicente. Our version is several times faster than Matstoms' MATLAB
implementation of the same algorithm. Further, our code matches the accuracy of
MATLAB's built-in lsqnonneg function.
| [
{
"version": "v1",
"created": "Fri, 13 Aug 2004 21:25:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cantarella",
"Jason",
""
],
[
"Piatek",
"Michael",
""
]
] |
cs/0408030 | Jim Gray | Jim Gray | The Revolution In Database System Architecture | Original at
http://research.microsoft.com/research/pubs/view.aspx?tr_id=735 | Proc ACM SIGMOD 2004, Paris, pp 1-4 | null | MSR-TR-2004-31 | cs.DB | null | Database system architectures are undergoing revolutionary changes.
Algorithms and data are being unified by integrating programming languages with
the database system. This gives an extensible object-relational system where
non-procedural relational operators manipulate object sets. Coupled with this,
each DBMS is now a web service. This has huge implications for how we structure
applications. DBMSs are now object containers. Queues are the first objects to
be added. These queues are the basis for transaction processing and workflow
applica-tions. Future workflow systems are likely to be built on this core.
Data cubes and online analytic processing are now baked into most DBMSs. Beyond
that, DBMSs have a framework for data mining and machine learning algorithms.
Decision trees, Bayes nets, clustering, and time series analysis are built in;
new algorithms can be added. Text, temporal, and spatial data access methods,
along with their probabilistic reasoning have been added to database systems.
Allowing approximate and probabilistic answers is essential for many
applications. Many believe that XML and xQuery will be the main data structure
and access pattern. Database systems must accommodate that perspective.These
changes mandate a much more dynamic query optimization strategy. Intelligence
is moving to the periphery of the network. Each disk and each sensor will be a
competent database machine. Relational algebra is a convenient way to program
these systems. Database systems are now expected to be self-managing,
self-healing, and always-up.
| [
{
"version": "v1",
"created": "Sat, 14 Aug 2004 02:31:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] |
cs/0408031 | Jim Gray | Jim Gray, Alexander S. Szalay, Aniruddha R. Thakar, Gyorgy Fekete,
William O'Mullane, Maria A. Nieto-Santisteban, Gerd Heber, Arnold H. Rots | There Goes the Neighborhood: Relational Algebra for Spatial Data Search | Original at
http://research.microsoft.com/research/pubs/view.aspx?tr_id=736 | null | null | MSR-TR-2004-32 | cs.DB | null | We explored ways of doing spatial search within a relational database: (1)
hierarchical triangular mesh (a tessellation of the sphere), (2) a zoned
bucketing system, and (3) representing areas as disjunctive-normal form
constraints. Each of these approaches has merits. They all allow efficient
point-in-region queries. A relational representation for regions allows Boolean
operations among them and allows quick tests for point-in-region,
regions-containing-point, and region-overlap. The speed of these algorithms is
much improved by a zone and multi-scale zone-pyramid scheme. The approach has
the virtue that the zone mechanism works well on B-Trees native to all SQL
systems and integrates naturally with current query optimizers - rather than
requiring a new spatial access method and concomitant query optimizer
extensions. Over the last 5 years, we have used these techniques extensively in
our work on SkyServer.sdss.org, and SkyQuery.net.
| [
{
"version": "v1",
"created": "Sat, 14 Aug 2004 02:40:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Thakar",
"Aniruddha R.",
""
],
[
"Fekete",
"Gyorgy",
""
],
[
"O'Mullane",
"William",
""
],
[
"Nieto-Santisteban",
"Maria A.",
""
],
[
"Heber",
"Gerd",
""
],
[
"Rots",
"Arnold H.",
""
]
] |
cs/0408032 | M. Luiz Angelo Barchet-Estefanel | Luiz Angelo Barchet-Estefanel (ID - IMAG), Gregory Mounie (ID - IMAG) | Performance Characterisation of Intra-Cluster Collective Communications | null | Proceedings of the SBAC-PAD 2004 16th Symposium on Computer
Architecture and High Performance Computing (2004) 254-261 | null | null | cs.DC | null | Although recent works try to improve collective communication in grid systems
by separating intra and inter-cluster communication, the optimisation of
communications focus only on inter-cluster communications. We believe, instead,
that the overall performance of the application may be improved if
intra-cluster collective communications performance is known in advance. Hence,
it is important to have an accurate model of the intra-cluster collective
communications, which provides the necessary evidences to tune and to predict
their performance correctly. In this paper we present our experience on
modelling such communication strategies. We describe and compare different
implementation strategies with their communication models, evaluating the
models' accuracy and describing the practical challenges that can be found when
modelling collective communications.
| [
{
"version": "v1",
"created": "Sat, 14 Aug 2004 06:31:10 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Nov 2004 14:23:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barchet-Estefanel",
"Luiz Angelo",
"",
"ID - IMAG"
],
[
"Mounie",
"Gregory",
"",
"ID - IMAG"
]
] |
cs/0408033 | M. Luiz Angelo Barchet-Estefanel | Luiz Angelo Barchet-Estefanel (ID - Imag, Apache Ur-Ra Id Imag),
Gregory Mounie (ID - Imag, Apache Ur-Ra Id Imag) | Identifying Logical Homogeneous Clusters for Efficient Wide-area
Communications | http://www.springerlink.com/index/TTJJL61R1EXDLCMC | Lecture Notes in Computer Sciences Proceedings of the EuroPVM/MPI
2004 11th European PVM/MPI Users' Group Meeting (2004) 319-326 | null | null | cs.DC | null | Recently, many works focus on the implementation of collective communication
operations adapted to wide area computational systems, like computational Grids
or global-computing. Due to the inherently heterogeneity of such environments,
most works separate "clusters" in different hierarchy levels. to better model
the communication. However, in our opinion, such works do not give enough
attention to the delimitation of such clusters, as they normally use the
locality or the IP subnet from the machines to delimit a cluster without
verifying the "homogeneity" of such clusters. In this paper, we describe a
strategy to gather network information from different local-area networks and
to construct "logical homogeneous clusters", better suited to the performance
modelling.
| [
{
"version": "v1",
"created": "Sat, 14 Aug 2004 07:39:57 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Nov 2004 14:24:24 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Dec 2004 10:32:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barchet-Estefanel",
"Luiz Angelo",
"",
"ID - Imag, Apache Ur-Ra Id Imag"
],
[
"Mounie",
"Gregory",
"",
"ID - Imag, Apache Ur-Ra Id Imag"
]
] |
cs/0408034 | M. Luiz Angelo Barchet-Estefanel | Luiz Angelo Barchet-Estefanel (ID - Imag, Apache Ur-Ra Id Imag),
Gregory Mounie (ID - Imag, Apache Ur-Ra Id Imag) | Fast Tuning of Intra-Cluster Collective Communications | http://www.springerlink.com/index/0NWE43KUHCB15JCD | Lecture Notes in Computer Sciences - Proceedings of the
EuroPVM/MPI 2004 11th European PVM/MPI Users' Group Meeting (2004) 28-35 | null | null | cs.DC | null | Recent works try to optimise collective communication in grid systems
focusing mostly on the optimisation of communications among different clusters.
We believe that intra-cluster collective communications should also be
optimised, as a way to improve the overall efficiency and to allow the
construction of multi-level collective operations. Indeed, inside homogeneous
clusters, a simple optimisation approach rely on the comparison from different
implementation strategies, through their communication models. In this paper we
evaluate this approach, comparing different implementation strategies with
their predicted performances. As a result, we are able to choose the
communication strategy that better adapts to each network environment.
| [
{
"version": "v1",
"created": "Sat, 14 Aug 2004 07:40:33 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Nov 2004 14:23:51 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Dec 2004 10:32:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barchet-Estefanel",
"Luiz Angelo",
"",
"ID - Imag, Apache Ur-Ra Id Imag"
],
[
"Mounie",
"Gregory",
"",
"ID - Imag, Apache Ur-Ra Id Imag"
]
] |
cs/0408035 | David Oppenheimer | David Oppenheimer, Vitaliy Vatkovskiy, Hakim Weatherspoon, Jason Lee,
David A. Patterson and John Kubiatowicz | Monitoring, Analyzing, and Controlling Internet-scale Systems with ACME | null | null | null | UCB//CSD-03-1276 | cs.DC cs.NI | null | Analyzing and controlling large distributed services under a wide range of
conditions is difficult. Yet these capabilities are essential to a number of
important development and operational tasks such as benchmarking, testing, and
system management. To facilitate these tasks, we have built the Application
Control and Monitoring Environment (ACME), a scalable, flexible infrastructure
for monitoring, analyzing, and controlling Internet-scale systems. ACME
consists of two parts. ISING, the Internet Sensor In-Network agGregator,
queries sensors and aggregates the results as they are routed through an
overlay network. ENTRIE, the ENgine for TRiggering Internet Events, uses the
data streams supplied by ISING, in combination with a user's XML configuration
file, to trigger actuators such as killing processes during a robustness
benchmark or paging a system administrator when predefined anomalous conditions
are observed. In this paper we describe the design, implementation, and
evaluation of ACME and its constituent parts. We find that for a 512-node
system running atop an emulated Internet topology, ISING's use of in-network
aggregation can reduce end-to-end query-response latency by more than 50%
compared to using either direct network connections or the same overlay network
without aggregation. We also find that an untuned implementation of ACME can
invoke an actuator on one or all nodes in response to a discrete or aggregate
event in less than four seconds, and we illustrate ACME's applicability to
concrete benchmarking and monitoring scenarios.
| [
{
"version": "v1",
"created": "Sat, 14 Aug 2004 16:05:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Oppenheimer",
"David",
""
],
[
"Vatkovskiy",
"Vitaliy",
""
],
[
"Weatherspoon",
"Hakim",
""
],
[
"Lee",
"Jason",
""
],
[
"Patterson",
"David A.",
""
],
[
"Kubiatowicz",
"John",
""
]
] |
cs/0408036 | Jim Gray | Jim Gray, Leslie Lamport | Consensus on Transaction Commit | Original at
http://research.microsoft.com/research/pubs/view.aspx?tr_id=701 | null | null | MSR-TR-2003-96 | cs.DC cs.DB | null | The distributed transaction commit problem requires reaching agreement on
whether a transaction is committed or aborted. The classic Two-Phase Commit
protocol blocks if the coordinator fails. Fault-tolerant consensus algorithms
also reach agreement, but do not block whenever any majority of the processes
are working. Running a Paxos consensus algorithm on the commit/abort decision
of each participant yields a transaction commit protocol that uses 2F +1
coordinators and makes progress if at least F +1 of them are working. In the
fault-free case, this algorithm requires one extra message delay but has the
same stable-storage write delay as Two-Phase Commit. The classic Two-Phase
Commit algorithm is obtained as the special F = 0 case of the general Paxos
Commit algorithm.
| [
{
"version": "v1",
"created": "Sat, 14 Aug 2004 21:23:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Lamport",
"Leslie",
""
]
] |
cs/0408037 | Joergen Villadsen | J{\o}rgen Villadsen | Multi-dimensional Type Theory: Rules, Categories, and Combinators for
Syntax and Semantics | 20 pages | null | null | null | cs.CL cs.AI cs.LO | null | We investigate the possibility of modelling the syntax and semantics of
natural language by constraints, or rules, imposed by the multi-dimensional
type theory Nabla. The only multiplicity we explicitly consider is two, namely
one dimension for the syntax and one dimension for the semantics, but the
general perspective is important. For example, issues of pragmatics could be
handled as additional dimensions.
One of the main problems addressed is the rather complicated repertoire of
operations that exists besides the notion of categories in traditional Montague
grammar. For the syntax we use a categorial grammar along the lines of Lambek.
For the semantics we use so-called lexical and logical combinators inspired by
work in natural logic. Nabla provides a concise interpretation and a sequent
calculus as the basis for implementations.
| [
{
"version": "v1",
"created": "Sun, 15 Aug 2004 08:51:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Villadsen",
"Jørgen",
""
]
] |
cs/0408039 | Chiranjeeb Buragohain | Nisheeth Shrivastava, Chiranjeeb Buragohain, Divyakant Agrawal,
Subhash Suri | Medians and Beyond: New Aggregation Techniques for Sensor Networks | null | Proceedings of the Second ACM Conference on Embedded Networked
Sensor Systems (SenSys 2004) | null | null | cs.DC cs.DB cs.DS | null | Wireless sensor networks offer the potential to span and monitor large
geographical areas inexpensively. Sensors, however, have significant power
constraint (battery life), making communication very expensive. Another
important issue in the context of sensor-based information systems is that
individual sensor readings are inherently unreliable. In order to address these
two aspects, sensor database systems like TinyDB and Cougar enable in-network
data aggregation to reduce the communication cost and improve reliability. The
existing data aggregation techniques, however, are limited to relatively simple
types of queries such as SUM, COUNT, AVG, and MIN/MAX. In this paper we propose
a data aggregation scheme that significantly extends the class of queries that
can be answered using sensor networks. These queries include (approximate)
quantiles, such as the median, the most frequent data values, such as the
consensus value, a histogram of the data distribution, as well as range
queries. In our scheme, each sensor aggregates the data it has received from
other sensors into a fixed (user specified) size message. We provide strict
theoretical guarantees on the approximation quality of the queries in terms of
the message size. We evaluate the performance of our aggregation scheme by
simulation and demonstrate its accuracy, scalability and low resource
utilization for highly variable input data sets.
| [
{
"version": "v1",
"created": "Tue, 17 Aug 2004 02:21:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shrivastava",
"Nisheeth",
""
],
[
"Buragohain",
"Chiranjeeb",
""
],
[
"Agrawal",
"Divyakant",
""
],
[
"Suri",
"Subhash",
""
]
] |
cs/0408040 | William Gilreath | William F. Gilreath | Hash sort: A linear time complexity multiple-dimensional sort algorithm | null | Proceedings of First Southern Symposium on Computing December 1998 | null | null | cs.DS | null | Sorting and hashing are two completely different concepts in computer
science, and appear mutually exclusive to one another. Hashing is a search
method using the data as a key to map to the location within memory, and is
used for rapid storage and retrieval. Sorting is a process of organizing data
from a random permutation into an ordered arrangement, and is a common activity
performed frequently in a variety of applications.
Almost all conventional sorting algorithms work by comparison, and in doing
so have a linearithmic greatest lower bound on the algorithmic time complexity.
Any improvement in the theoretical time complexity of a sorting algorithm can
result in overall larger gains in implementation performance.. A gain in
algorithmic performance leads to much larger gains in speed for the application
that uses the sort algorithm. Such a sort algorithm needs to use an alternative
method for ordering the data than comparison, to exceed the linearithmic time
complexity boundary on algorithmic performance.
The hash sort is a general purpose non-comparison based sorting algorithm by
hashing, which has some interesting features not found in conventional sorting
algorithms. The hash sort asymptotically outperforms the fastest traditional
sorting algorithm, the quick sort. The hash sort algorithm has a linear time
complexity factor -- even in the worst case. The hash sort opens an area for
further work and investigation into alternative means of sorting.
| [
{
"version": "v1",
"created": "Tue, 17 Aug 2004 09:23:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gilreath",
"William F.",
""
]
] |
cs/0408041 | Ali Eftekhari | Ali Eftekhari | Fractal geometry of literature: first attempt to Shakespeare's works | 26 pages, 7 figures, 3 tables | null | null | null | cs.CL cs.CC | null | It was demonstrated that there is a geometrical order in the structure of
literature. Fractal geometry as a modern mathematical approach and a new
geometrical viewpoint on natural objects including both processes and
structures was employed for analysis of literature. As the first study, the
works of William Shakespeare were chosen as the most important items in western
literature. By counting the number of letters applied in a manuscript, it is
possible to study the whole manuscript statistically. A novel method based on
basic assumption of fractal geometry was proposed for the calculation of
fractal dimensions of the literature. The results were compared with Zipf's
law. Zipf's law was successfully used for letters instead of words. Two new
concepts namely Zipf's dimension and Zipf's order were also introduced. It was
found that changes of both fractal dimension and Zipf's dimension are similar
and dependent on the manuscript length. Interestingly, direct plotting the data
obtained in semi-logarithmic and logarithmic forms also led to a power-law.
| [
{
"version": "v1",
"created": "Tue, 17 Aug 2004 10:14:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eftekhari",
"Ali",
""
]
] |
cs/0408042 | Sameer Tilak | Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh and Kyoung-Don Kang | Dynamic Localization Protocols for Mobile Sensor Networks | 10 Pages | null | null | CS-TR-04-NA02 | cs.NI | null | The ability of a sensor node to determine its physical location within a
network (Localization) is of fundamental importance in sensor networks.
Interpretating data from sensors will not be possible unless the context of the
data is known; this is most often accomplished by tracking its physical
location. Existing research has focused on localization in static sensor
networks where localization is a one-time (or low frequency) activity. In
contrast, this paper considers localization for mobile sensors: when sensors
are mobile, localization must be invoked periodically to enable the sensors to
track their location. The higher the frequency of localization, the lower the
error introduced because of mobility. However, localization is a costly
operation since it involves both communication and computation. In this paper,
we propose and investigate adaptive and predictive protocols that control the
frequency of localization based on sensor mobility behavior to reduce the
energy requirements for localization while bounding the localization error. We
show that such protocols can significantly reduce the localization energy
without sacrificing accuracy (in fact, improving accuracy for most situations).
Using simulation and analysis we explore the tradeoff between energy efficiency
and localization error due to mobility for several protocols.
| [
{
"version": "v1",
"created": "Wed, 18 Aug 2004 14:07:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tilak",
"Sameer",
""
],
[
"Kolar",
"Vinay",
""
],
[
"Abu-Ghazaleh",
"Nael B.",
""
],
[
"Kang",
"Kyoung-Don",
""
]
] |
cs/0408043 | John Hitchcock | John M. Hitchcock, Jack H. Lutz, and Sebastiaan A. Terwijn | The Arithmetical Complexity of Dimension and Randomness | 20 pages | null | null | null | cs.LO cs.CC | null | Constructive dimension and constructive strong dimension are effectivizations
of the Hausdorff and packing dimensions, respectively. Each infinite binary
sequence A is assigned a dimension dim(A) in [0,1] and a strong dimension
Dim(A) in [0,1].
Let DIM^alpha and DIMstr^alpha be the classes of all sequences of dimension
alpha and of strong dimension alpha, respectively. We show that DIM^0 is
properly Pi^0_2, and that for all Delta^0_2-computable alpha in (0,1],
DIM^alpha is properly Pi^0_3.
To classify the strong dimension classes, we use a more powerful effective
Borel hierarchy where a co-enumerable predicate is used rather than a
enumerable predicate in the definition of the Sigma^0_1 level. For all
Delta^0_2-computable alpha in [0,1), we show that DIMstr^alpha is properly in
the Pi^0_3 level of this hierarchy. We show that DIMstr^1 is properly in the
Pi^0_2 level of this hierarchy.
We also prove that the class of Schnorr random sequences and the class of
computably random sequences are properly Pi^0_3.
| [
{
"version": "v1",
"created": "Wed, 18 Aug 2004 16:23:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hitchcock",
"John M.",
""
],
[
"Lutz",
"Jack H.",
""
],
[
"Terwijn",
"Sebastiaan A.",
""
]
] |
cs/0408044 | Michael Thielscher | Michael Thielscher | FLUX: A Logic Programming Method for Reasoning Agents | null | null | null | null | cs.AI | null | FLUX is a programming method for the design of agents that reason logically
about their actions and sensor information in the presence of incomplete
knowledge. The core of FLUX is a system of Constraint Handling Rules, which
enables agents to maintain an internal model of their environment by which they
control their own behavior. The general action representation formalism of the
fluent calculus provides the formal semantics for the constraint solver. FLUX
exhibits excellent computational behavior due to both a carefully restricted
expressiveness and the inference paradigm of progression.
| [
{
"version": "v1",
"created": "Thu, 19 Aug 2004 14:47:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thielscher",
"Michael",
""
]
] |
cs/0408045 | Viktor Kuncak | Viktor Kuncak, K. Rustan M. Leino | On computing the fixpoint of a set of boolean equations | 15 pages | null | null | MSR-TR-2003-08 | cs.PL cs.LO cs.SE | null | This paper presents a method for computing a least fixpoint of a system of
equations over booleans. The resulting computation can be significantly shorter
than the result of iteratively evaluating the entire system until a fixpoint is
reached.
| [
{
"version": "v1",
"created": "Thu, 19 Aug 2004 17:24:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuncak",
"Viktor",
""
],
[
"Leino",
"K. Rustan M.",
""
]
] |
cs/0408046 | Markus Volkmer | Markus Volkmer and Andr\'e Schaumburg | Authenticated tree parity machine key exchange | This work directly relates to cond-mat/0202112 (see also
http://arxiv.org/find/cond-mat/1/au:+Kinzel/0/1/0/all/0/1) | null | null | null | cs.CR cond-mat.dis-nn | null | The synchronisation of Tree Parity Machines (TPMs), has proven to provide a
valuable alternative concept for secure symmetric key exchange. Yet, from a
cryptographer's point of view, authentication is at least as important as a
secure exchange of keys. Adding an authentication via hashing e.g. is
straightforward but with no relation to Neural Cryptography. We consequently
formulate an authenticated key exchange within this concept. Another
alternative, integrating a Zero-Knowledge protocol into the synchronisation, is
also presented. A Man-In-The-Middle attack and even all currently known
attacks, that are based on using identically structured TPMs and
synchronisation as well, can so be averted. This in turn has practical
consequences on using the trajectory in weight space. Both suggestions have the
advantage of not affecting the previously observed physics of this interacting
system at all.
| [
{
"version": "v1",
"created": "Fri, 20 Aug 2004 07:01:13 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Nov 2004 17:06:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Volkmer",
"Markus",
""
],
[
"Schaumburg",
"André",
""
]
] |
cs/0408048 | John Funge PhD | John David Funge | Journal of New Democratic Methods: An Introduction | 8 pages, 1 figure | null | null | null | cs.CY cs.LG | null | This paper describes a new breed of academic journals that use statistical
machine learning techniques to make them more democratic. In particular, not
only can anyone submit an article, but anyone can also become a reviewer.
Machine learning is used to decide which reviewers accurately represent the
views of the journal's readers and thus deserve to have their opinions carry
more weight. The paper concentrates on describing a specific experimental
prototype of a democratic journal called the Journal of New Democratic Methods
(JNDM). The paper also mentions the wider implications that machine learning
and the techniques used in the JNDM may have for representative democracy in
general.
| [
{
"version": "v1",
"created": "Sat, 21 Aug 2004 16:57:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Funge",
"John David",
""
]
] |
cs/0408049 | Stephen Luttrell | Stephen Luttrell | Using Stochastic Encoders to Discover Structure in Data | 18 pages, 9 figures. Full version of a short paper that was published
in the Digest of the 5th IMA International Conference on Mathematics in
Signal Processing, 18-20 December 2000, Warwick University, UK | null | null | null | cs.NE cs.CV | null | In this paper a stochastic generalisation of the standard Linde-Buzo-Gray
(LBG) approach to vector quantiser (VQ) design is presented, in which the
encoder is implemented as the sampling of a vector of code indices from a
probability distribution derived from the input vector, and the decoder is
implemented as a superposition of reconstruction vectors. This stochastic VQ
(SVQ) is optimised using a minimum mean Euclidean reconstruction distortion
criterion, as in the LBG case. Numerical simulations are used to demonstrate
how this leads to self-organisation of the SVQ, where different stochastically
sampled code indices become associated with different input subspaces.
| [
{
"version": "v1",
"created": "Sat, 21 Aug 2004 19:40:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
] |
cs/0408050 | Stephen Luttrell | Stephen Luttrell | Invariant Stochastic Encoders | 16 pages, 12 figures. Full version of a short paper that was
published in the Digest of the 5th IMA International Conference on
Mathematics in Signal Processing, 18-20 December 2000, Warwick University, UK | null | null | null | cs.NE cs.CV | null | The theory of stochastic vector quantisers (SVQ) has been extended to allow
the quantiser to develop invariances, so that only "large" degrees of freedom
in the input vector are represented in the code. This has been applied to the
problem of encoding data vectors which are a superposition of a "large" jammer
and a "small" signal, so that only the jammer is represented in the code. This
allows the jammer to be subtracted from the total input vector (i.e. the jammer
is nulled), leaving a residual that contains only the underlying signal. The
main advantage of this approach to jammer nulling is that little prior
knowledge of the jammer is assumed, because these properties are automatically
discovered by the SVQ as it is trained on examples of input vectors.
| [
{
"version": "v1",
"created": "Sat, 21 Aug 2004 23:06:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
] |
cs/0408051 | Zhimao Guo Mr. | Zhimao Guo, Min Li, Xiaoling Wang, Aoying Zhou | Scalable XSLT Evaluation | It appeared on the international conference of APWeb 04. And it
includes 10 pages | In Proc. of APWeb, 2004 | null | null | cs.DB | null | XSLT is an increasingly popular language for processing XML data. It is
widely supported by application platform software. However, little optimization
effort has been made inside the current XSLT processing engines. Evaluating a
very simple XSLT program on a large XML document with a simple schema may
result in extensive usage of memory. In this paper, we present a novel notion
of \emph{Streaming Processing Model} (\emph{SPM}) to evaluate a subset of XSLT
programs on XML documents, especially large ones. With SPM, an XSLT processor
can transform an XML source document to other formats without extra memory
buffers required. Therefore, our approach can not only tackle large source
documents, but also produce large results. We demonstrate with a performance
study the advantages of the SPM approach. Experimental results clearly confirm
that SPM improves XSLT evaluation typically 2 to 10 times better than the
existing approaches. Moreover, the SPM approach also features high scalability.
| [
{
"version": "v1",
"created": "Sun, 22 Aug 2004 03:19:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guo",
"Zhimao",
""
],
[
"Li",
"Min",
""
],
[
"Wang",
"Xiaoling",
""
],
[
"Zhou",
"Aoying",
""
]
] |
cs/0408052 | Daniel Yacob | Daniel Yacob | Application of the Double Metaphone Algorithm to Amharic Orthography | International Conference of Ethiopian Studies XV, 13 pages | null | null | null | cs.CL | null | The Metaphone algorithm applies the phonetic encoding of orthographic
sequences to simplify words prior to comparison. While Metaphone has been
highly successful for the English language, for which it was designed, it may
not be applied directly to Ethiopian languages. The paper details how the
principles of Metaphone can be applied to Ethiopic script and uses Amharic as a
case study. Match results improve as specific considerations are made for
Amharic writing practices. Results are shown to improve further when common
errors from Amharic input methods are considered.
| [
{
"version": "v1",
"created": "Sun, 22 Aug 2004 19:32:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yacob",
"Daniel",
""
]
] |
cs/0408053 | Santos B. Yuste | Santos B. Yuste | Weighted average finite difference methods for fractional diffusion
equations | Communication presented at the FDA'04 Workshop (with some minor
corrections and updates) | null | null | null | cs.NA cond-mat.stat-mech physics.comp-ph | null | Weighted averaged finite difference methods for solving fractional diffusion
equations are discussed and different formulae of the discretization of the
Riemann-Liouville derivative are considered. The stability analysis of the
different numerical schemes is carried out by means of a procedure close to the
well-known von Neumann method of ordinary diffusion equations. The stability
bounds are easily found and checked in some representative examples.
| [
{
"version": "v1",
"created": "Mon, 23 Aug 2004 12:00:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yuste",
"Santos B.",
""
]
] |
cs/0408054 | Peter Keller-Marxer | Stephan Heuscher, Stephan Jaermann, Peter Keller-Marxer, Frank Moehle
(Swiss Federal Archives) | Providing Authentic Long-term Archival Access to Complex Relational Data | 18 pages with 4 figures (color). Submitted to: European Space Agency
Symposium "Ensuring Long-Term Preservation and Adding Value to Scientific and
Technical Data", 5 - 7 October 2004, Frascati, Italy | Proceedings PV-2004: Ensuring the Long-Term Preservation and
Adding Value to the Scientific and Technical Data, 5-7 October 2004,
ESA/ESRIN, Frascati, Italy, (ESA WPP-232), Noordwijk: European Space Agency,
2004, pp. 241\^A?"261. | null | ESA WPP-232, pp. 241 -261 | cs.DL cs.DB | null | We discuss long-term preservation of and access to relational databases. The
focus is on national archives and science data archives which have to ingest
and integrate data from a broad spectrum of vendor-specific relational database
management systems (RDBMS). Furthermore, we present our solution SIARD which
analyzes and extracts data and data logic from almost any RDBMS. It enables, to
a reasonable level of authenticity, complete detachment of databases from their
vendor-specific environment. The user can add archival descriptive metadata
according to a customizable schema. A SIARD database archive integrates data,
data logic, technical metadata, and archival descriptive information in one
archival information package, independent of any specific software and
hardware, based upon plain text files and the standardized languages SQL and
XML. For usage purposes, a SIARD archive can be reloaded into any current or
future RDBMS which supports standard SQL. In addition, SIARD contains a client
that enables 'on demand' reload of archives into a target RDBMS, and multi-user
remote access for querying and browsing the data together with its technical
and descriptive metadata in one graphical user interface.
| [
{
"version": "v1",
"created": "Tue, 24 Aug 2004 07:01:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heuscher",
"Stephan",
"",
"Swiss Federal Archives"
],
[
"Jaermann",
"Stephan",
"",
"Swiss Federal Archives"
],
[
"Keller-Marxer",
"Peter",
"",
"Swiss Federal Archives"
],
[
"Moehle",
"Frank",
"",
"Swiss Federal Archives"
]
] |
cs/0408056 | Marco Alberti | Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, Michela
Milano | A CHR-based Implementation of Known Arc-Consistency | 22 pages, 2 figures, 1 table To appear in Theory and Practice of
Logic Programming (TPLP) | null | null | null | cs.LO cs.AI | null | In classical CLP(FD) systems, domains of variables are completely known at
the beginning of the constraint propagation process. However, in systems
interacting with an external environment, acquiring the whole domains of
variables before the beginning of constraint propagation may cause waste of
computation time, or even obsolescence of the acquired data at the time of use.
For such cases, the Interactive Constraint Satisfaction Problem (ICSP) model
has been proposed as an extension of the CSP model, to make it possible to
start constraint propagation even when domains are not fully known, performing
acquisition of domain elements only when necessary, and without the need for
restarting the propagation after every acquisition.
In this paper, we show how a solver for the two sorted CLP language, defined
in previous work, to express ICSPs, has been implemented in the Constraint
Handling Rules (CHR) language, a declarative language particularly suitable for
high level implementation of constraint solvers.
| [
{
"version": "v1",
"created": "Tue, 24 Aug 2004 10:15:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alberti",
"Marco",
""
],
[
"Gavanelli",
"Marco",
""
],
[
"Lamma",
"Evelina",
""
],
[
"Mello",
"Paola",
""
],
[
"Milano",
"Michela",
""
]
] |
cs/0408057 | Vincenzo Pallotta | Afzal Ballim and Vincenzo Pallotta | The role of robust semantic analysis in spoken language dialogue systems | 6 pages | Proceedings of the 3rd International Workshop on Human-Computer
Conversation, July 3-5, 2000, Bellagio, Italy | null | null | cs.CL cs.AI cs.HC | null | In this paper we summarized a framework for designing grammar-based procedure
for the automatic extraction of the semantic content from spoken queries.
Starting with a case study and following an approach which combines the notions
of fuzziness and robustness in sentence parsing, we showed we built practical
domain-dependent rules which can be applied whenever it is possible to
superimpose a sentence-level semantic structure to a text without relying on a
previous deep syntactical analysis. This kind of procedure can be also
profitably used as a pre-processing tool in order to cut out part of the
sentence which have been recognized to have no relevance in the understanding
process. In the case of particular dialogue applications where there is no need
to build a complex semantic structure (e.g. word spotting or excerpting) the
presented methodology may represent an efficient alternative solution to a
sequential composition of deep linguistic analysis modules. Even if the query
generation problem may not seem a critical application it should be held in
mind that the sentence processing must be done on-line. Having this kind of
constraints we cannot design our system without caring for efficiency and thus
provide an immediate response. Another critical issue is related to whole
robustness of the system. In our case study we tried to make experiences on how
it is possible to deal with an unreliable and noisy input without asking the
user for any repetition or clarification. This may correspond to a similar
problem one may have when processing text coming from informal writing such as
e-mails, news and in many cases Web pages where it is often the case to have
irrelevant surrounding information.
| [
{
"version": "v1",
"created": "Wed, 25 Aug 2004 19:37:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ballim",
"Afzal",
""
],
[
"Pallotta",
"Vincenzo",
""
]
] |
cs/0408058 | Patrik O. Hoyer | Patrik O. Hoyer | Non-negative matrix factorization with sparseness constraints | null | null | null | null | cs.LG cs.NE | null | Non-negative matrix factorization (NMF) is a recently developed technique for
finding parts-based, linear representations of non-negative data. Although it
has successfully been applied in several applications, it does not always
result in parts-based representations. In this paper, we show how explicitly
incorporating the notion of `sparseness' improves the found decompositions.
Additionally, we provide complete MATLAB code both for standard NMF and for our
extension. Our hope is that this will further the application of these methods
to solving novel data-analysis problems.
| [
{
"version": "v1",
"created": "Wed, 25 Aug 2004 20:25:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hoyer",
"Patrik O.",
""
]
] |
cs/0408059 | Aristides Vagelatos | Ch. Tsalidis (1), G. Orphanos (1), A. Iordanidou (2), A. Vagelatos (3)
((1) Neurosoft S.A. (2) Patra's University, (3) RACTI) | Proofing Tools Technology at Neurosoft S.A. | Workshop on International Proofing Tools and Language Technologies
July 1-2, 2004, Patras, Greece | null | null | CTI T.R.: 2004.06.01 | cs.CL | null | The aim of this paper is to present the R&D activities carried out at
Neurosoft S.A. regarding the development of proofing tools for Modern Greek.
Firstly, we focus on infrastructure issues that we faced during our initial
steps. Subsequently, we describe the most important insights of three proofing
tools developed by Neurosoft, i.e. the spelling checker, the hyphenator and the
thesaurus, outlining their efficiencies and inefficiencies. Finally, we discuss
some improvement ideas and give our future directions.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 2004 10:50:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tsalidis",
"Ch.",
"",
"Neurosoft S.A"
],
[
"Orphanos",
"G.",
"",
"Neurosoft S.A"
],
[
"Iordanidou",
"A.",
"",
"Patra's University"
],
[
"Vagelatos",
"A.",
"",
"RACTI"
]
] |
cs/0408060 | Docteur Francois Trouilleux | Gabriel G. Bes (GRIL), Lionel Lamadon (GRIL), Francois Trouilleux
(GRIL) | Verbal chunk extraction in French using limited resources | null | null | null | null | cs.CL | null | A way of extracting French verbal chunks, inflected and infinitive, is
explored and tested on effective corpus. Declarative morphological and local
grammar rules specifying chunks and some simple contextual structures are used,
relying on limited lexical information and some simple heuristic/statistic
properties obtained from restricted corpora. The specific goals, the
architecture and the formalism of the system, the linguistic information on
which it relies and the obtained results on effective corpus are presented.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 2004 12:44:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bes",
"Gabriel G.",
"",
"GRIL"
],
[
"Lamadon",
"Lionel",
"",
"GRIL"
],
[
"Trouilleux",
"Francois",
"",
"GRIL"
]
] |
cs/0408061 | Aristides Vagelatos | Ch. Tsalidis (1), A. Vagelatos (2) and G. Orphanos (1) ((1) Neurosoft
S.A. (2) RACTI) | An electronic dictionary as a basis for NLP tools: The Greek case | Traitement Automatique des Langues Naturelles (TALN) 2004, Fez,
Morocco | null | null | CTI T.R.: 2004.04.03 | cs.CL | null | The existence of a Dictionary in electronic form for Modern Greek (MG) is
mandatory if one is to process MG at the morphological and syntactic levels
since MG is a highly inflectional language with marked stress and a spelling
system with many characteristics carried over from Ancient Greek. Moreover,
such a tool becomes necessary if one is to create efficient and sophisticated
NLP applications with substantial linguistic backing and coverage. The present
paper will focus on the deployment of such an electronic dictionary for Modern
Greek, which was built in two phases: first it was constructed to be the basis
for a spelling correction schema and then it was reconstructed in order to
become the platform for the deployment of a wider spectrum of NLP tools.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 2004 13:17:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tsalidis",
"Ch.",
""
],
[
"Vagelatos",
"A.",
""
],
[
"Orphanos",
"G.",
""
]
] |
cs/0408065 | Somdeb Lahiri | Somdeb Lahiri | The Core of Directed Network Problems with Quotas | 6 pages, 0 figures, source file: MS Word; definitions of the feasible
allocations have been strengthened; examples provided; network obtained by
the procedure can be decentralized | null | null | null | cs.GT | null | This paper proves the existence of non-empty cores for directed network
problems with quotas and for those combinatorial allocation problems which
permit only exclusive allocations.
| [
{
"version": "v1",
"created": "Sat, 28 Aug 2004 10:12:17 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Sep 2004 11:18:12 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Sep 2004 11:05:37 GMT"
},
{
"version": "v4",
"created": "Tue, 7 Sep 2004 09:37:08 GMT"
},
{
"version": "v5",
"created": "Wed, 8 Sep 2004 12:15:49 GMT"
},
{
"version": "v6",
"created": "Sat, 11 Sep 2004 10:06:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lahiri",
"Somdeb",
""
]
] |
cs/0408067 | Eric Schmutz | Jennie C. Hansen, Eric Schmutz | The Expected Size of the Rule k Dominating Set | null | null | null | null | cs.DM | null | Rule k is a localized approximation algorithm that finds a small connected
dominating set in a graph. We estimate the expected size of the Rule k
dominating set for the model of random unit disk graphs constructed from n
random points in an s_n by s_n square region of the plane.
| [
{
"version": "v1",
"created": "Tue, 31 Aug 2004 14:03:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hansen",
"Jennie C.",
""
],
[
"Schmutz",
"Eric",
""
]
] |
cs/0408068 | Eric Schmutz | Jennie C. Hansen, Eric Schmutz, Li Sheng | Probabilistic Analysis of Rule 2 | null | null | null | null | cs.DM | null | Li and Wu proposed Rule 2, a localized approximation algorithm that attempts
to find a small connected dominating set in a graph. Here we study the
asymptotic performance of Rule 2 on random unit disk graphs formed from n
random points in an s_n by s_n square region of the plane. If s_n is below the
threshold for connectivity, then Rule 2 produces a dominating set whose
expected size is O(n/(loglog n)^{3/2}). We conjecture that this bound is not
optimal.
| [
{
"version": "v1",
"created": "Tue, 31 Aug 2004 16:02:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hansen",
"Jennie C.",
""
],
[
"Schmutz",
"Eric",
""
],
[
"Sheng",
"Li",
""
]
] |
cs/0408069 | Pascal Hitzler | Sebastian Bader, Pascal Hitzler, Steffen Hoelldobler | The Integration of Connectionism and First-Order Knowledge
Representation and Reasoning as a Challenge for Artificial Intelligence | In Proceedings of INFORMATION'2004, Tokyo, Japan, to appear. 12 pages | null | null | null | cs.AI cs.LO cs.NE | null | Intelligent systems based on first-order logic on the one hand, and on
artificial neural networks (also called connectionist systems) on the other,
differ substantially. It would be very desirable to combine the robust neural
networking machinery with symbolic knowledge representation and reasoning
paradigms like logic programming in such a way that the strengths of either
paradigm will be retained. Current state-of-the-art research, however, fails by
far to achieve this ultimate goal. As one of the main obstacles to be overcome
we perceive the question how symbolic knowledge can be encoded by means of
connectionist systems: Satisfactory answers to this will naturally lead the way
to knowledge extraction algorithms and to integrated neural-symbolic systems.
| [
{
"version": "v1",
"created": "Tue, 31 Aug 2004 16:16:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bader",
"Sebastian",
""
],
[
"Hitzler",
"Pascal",
""
],
[
"Hoelldobler",
"Steffen",
""
]
] |
cs/0409002 | Pascal Hitzler | Pascal Hitzler | Default reasoning over domains and concept hierarchies | Short version appeared in Proceedings of the 27th German conference
on Artificial Intelligence, KI'2004, Ulm, Germany, September 2004, Lecture
Notes in Artificial Intelligence | null | null | null | cs.AI cs.LO | null | W.C. Rounds and G.-Q. Zhang (2001) have proposed to study a form of
disjunctive logic programming generalized to algebraic domains. This system
allows reasoning with information which is hierarchically structured and forms
a (suitable) domain. We extend this framework to include reasoning with default
negation, giving rise to a new nonmonotonic reasoning framework on hierarchical
knowledge which encompasses answer set programming with extended disjunctive
logic programs. We also show that the hierarchically structured knowledge on
which programming in this paradigm can be done, arises very naturally from
formal concept analysis. Together, we obtain a default reasoning paradigm for
conceptual knowledge which is in accordance with mainstream developments in
nonmonotonic reasoning.
| [
{
"version": "v1",
"created": "Wed, 1 Sep 2004 19:22:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hitzler",
"Pascal",
""
]
] |
cs/0409003 | Karthik Narayanaswami | Parth Bhawalkar, Victor Bigio, Adam Davis, Karthik Narayanaswami, Femi
Olumoko | ScheduleNanny: Using GPS to Learn the User's Significant Locations,
Travel Times and Schedule | 7 pages, 10 figures. Adaptive & Ubiquitous Computing | null | null | null | cs.AI cs.CV cs.HC | null | As computing technology becomes more pervasive, personal devices such as the
PDA, cell-phone, and notebook should use context to determine how to act.
Location is one form of context that can be used in many ways. We present a
multiple-device system that collects and clusters GPS data into significant
locations. These locations are then used to determine travel times and a
probabilistic model of the user's schedule, which is used to intelligently
alert the user. We evaluate our system and suggest how it should be integrated
with a variety of applications.
| [
{
"version": "v1",
"created": "Thu, 2 Sep 2004 15:28:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bhawalkar",
"Parth",
""
],
[
"Bigio",
"Victor",
""
],
[
"Davis",
"Adam",
""
],
[
"Narayanaswami",
"Karthik",
""
],
[
"Olumoko",
"Femi",
""
]
] |
cs/0409004 | Manoj Kumar | Manoj Kumar | The Password Change Phase is Still Insecure | 10 Pages, This work is related to the remote user authentication
scheme with smart cards | null | null | null | cs.CR | null | In 2004, W. C. Ku and S. M. Chen proposed an efficient remote user
authentication scheme using smart cards to solve the security problems of Chien
et al.'s scheme. Recently, Hsu and Yoon et al. pointed out the security
weaknesses of the Ku and Chen's scheme Furthermore, Yoon et al. also proposed a
new efficient remote user authentication scheme using smart cards. Yoon et al.
also modified the password change phase of Ku and Chen's scheme. This paper
analyzes that password change phase of Yoon et al's modified scheme is still
insecure.
| [
{
"version": "v1",
"created": "Fri, 3 Sep 2004 11:51:44 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Sep 2004 01:43:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
] |
cs/0409005 | Adam Slagell | Adam J. Slagell and William Yurcik | Sharing Computer Network Logs for Security and Privacy: A Motivation for
New Methodologies of Anonymization | 17 pages, 1 figure | null | null | null | cs.CR | null | Logs are one of the most fundamental resources to any security professional.
It is widely recognized by the government and industry that it is both
beneficial and desirable to share logs for the purpose of security research.
However, the sharing is not happening or not to the degree or magnitude that is
desired. Organizations are reluctant to share logs because of the risk of
exposing sensitive information to potential attackers. We believe this
reluctance remains high because current anonymization techniques are weak and
one-size-fits-all--or better put, one size tries to fit all. We must develop
standards and make anonymization available at varying levels, striking a
balance between privacy and utility. Organizations have different needs and
trust other organizations to different degrees. They must be able to map
multiple anonymization levels with defined risks to the trust levels they share
with (would-be) receivers. It is not until there are industry standards for
multiple levels of anonymization that we will be able to move forward and
achieve the goal of widespread sharing of logs for security researchers.
| [
{
"version": "v1",
"created": "Fri, 3 Sep 2004 20:21:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slagell",
"Adam J.",
""
],
[
"Yurcik",
"William",
""
]
] |
cs/0409006 | Dumitru Vulcanov | Dumitru N. Vulcanov, Valentina D. Vulcanov (The West University of
Timisoara, Romania) | Maple+GrTensorII libraries for cosmology | LaTeX LLNCS style, 8 pages, accepted for SYNASC 2004 - 6th
International Symposium on Symbolic and Numeric Algorithms for Scientific
Computing, Timisoara, Romania, September 26-30 2004 | null | null | null | cs.SC gr-qc | null | The article mainly presents some results in using MAPLE platform for computer
algebra and GrTensorII package in doing calculations for theoretical and
numerical cosmology
| [
{
"version": "v1",
"created": "Sat, 4 Sep 2004 12:52:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vulcanov",
"Dumitru N.",
"",
"The West University of\n Timisoara, Romania"
],
[
"Vulcanov",
"Valentina D.",
"",
"The West University of\n Timisoara, Romania"
]
] |
cs/0409007 | Florentin Smarandache | Jean Dezert, Florentin Smarandache, Milan Daniel | The Generalized Pignistic Transformation | 8 pages, 3 graphs, many tables. The Seventh International Conference
on Information Fusion, Stockholm, Sweden, 28 June - 1 July 2004 | Proceedings of the Seventh International Conference on Information
Fusion, International Society for Information Fusion, Stockholm, Sweden,
384-391, 2004 | null | null | cs.AI | null | This paper presents in detail the generalized pignistic transformation (GPT)
succinctly developed in the Dezert-Smarandache Theory (DSmT) framework as a
tool for decision process. The GPT allows to provide a subjective probability
measure from any generalized basic belief assignment given by any corpus of
evidence. We mainly focus our presentation on the 3D case and provide the
complete result obtained by the GPT and its validation drawn from the
probability theory.
| [
{
"version": "v1",
"created": "Mon, 6 Sep 2004 17:47:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dezert",
"Jean",
""
],
[
"Smarandache",
"Florentin",
""
],
[
"Daniel",
"Milan",
""
]
] |
cs/0409008 | Hendrik Feddes | Lea Cyrus and Hendrik Feddes | A Model for Fine-Grained Alignment of Multilingual Texts | 8 pages, 4 figures | Proc. COLING 2004 Workshop on Multilingual Linguistic Resources
(MLR2004), Geneva, August 28, 2004, pp. 15-22 | null | null | cs.CL | null | While alignment of texts on the sentential level is often seen as being too
coarse, and word alignment as being too fine-grained, bi- or multilingual texts
which are aligned on a level in-between are a useful resource for many
purposes. Starting from a number of examples of non-literal translations, which
tend to make alignment difficult, we describe an alignment model which copes
with these cases by explicitly coding them. The model is based on
predicate-argument structures and thus covers the middle ground between
sentence and word alignment. The model is currently used in a recently
initiated project of a parallel English-German treebank (FuSe), which can in
principle be extended with additional languages.
| [
{
"version": "v1",
"created": "Tue, 7 Sep 2004 13:46:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cyrus",
"Lea",
""
],
[
"Feddes",
"Hendrik",
""
]
] |
cs/0409009 | Dirk Beyer | Dirk Beyer (University of California, Berkeley), Andreas Noack
(Brandenburg University of Technology) | CrocoPat 2.1 Introduction and Reference Manual | 19 pages + cover, 2 eps figures, uses llncs.cls and
cs_techrpt_cover.sty, for downloading the source code, binaries, and RML
examples, see http://www.software-systemtechnik.de/CrocoPat/ | null | null | UCB//CSD-04-1338 | cs.PL cs.DM cs.DS cs.SE | null | CrocoPat is an efficient, powerful and easy-to-use tool for manipulating
relations of arbitrary arity, including directed graphs. This manual provides
an introduction to and a reference for CrocoPat and its programming language
RML. It includes several application examples, in particular from the analysis
of structural models of software systems.
| [
{
"version": "v1",
"created": "Tue, 7 Sep 2004 09:44:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Beyer",
"Dirk",
"",
"University of California, Berkeley"
],
[
"Noack",
"Andreas",
"",
"Brandenburg University of Technology"
]
] |
cs/0409012 | Elchanan Mossel | Eliza N. Maneva and Elchanan Mossel and Martin J. Wainwright | A New Look at Survey Propagation and its Generalizations | v2:typoes and reference corrections; v3: expanded exposition | null | null | null | cs.CC | null | This paper provides a new conceptual perspective on survey propagation, which
is an iterative algorithm recently introduced by the statistical physics
community that is very effective in solving random k-SAT problems even with
densities close to the satisfiability threshold. We first describe how any SAT
formula can be associated with a novel family of Markov random fields (MRFs),
parameterized by a real number \rho \in [0,1]. We then show that applying
belief propagation--a well-known ``message-passing'' technique for estimating
marginal probabilities--to this family of MRFs recovers a known family of
algorithms, ranging from pure survey propagation at one extreme (\rho = 1) to
standard belief propagation on the uniform distribution over SAT assignments at
the other extreme (\rho = 0). Configurations in these MRFs have a natural
interpretation as partial satisfiability assignments, on which a partial order
can be defined. We isolate cores as minimal elements in this partial ordering,
which are also fixed points of survey propagation and the only assignments with
positive probability in the MRF for \rho=1. Our experimental results for k=3
suggest that solutions of random formulas typically do not possess non-trivial
cores. This makes it necessary to study the structure of the space of partial
assignments for \rho<1 and investigate the role of assignments that are very
close to being cores. To that end, we investigate the associated lattice
structure, and prove a weight-preserving identity that shows how any MRF with
\rho>0 can be viewed as a ``smoothed'' version of the uniform distribution over
satisfying assignments (\rho=0). Finally, we isolate properties of Gibbs
sampling and message-passing algorithms that are typical for an ensemble of
k-SAT problems.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 2004 01:27:14 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Oct 2004 02:19:00 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Oct 2005 04:36:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maneva",
"Eliza N.",
""
],
[
"Mossel",
"Elchanan",
""
],
[
"Wainwright",
"Martin J.",
""
]
] |
cs/0409013 | Ching-Chi Lin | Ching-Chi Lin, Gerard J. Chang, Gen-Huey Chen | Locally connected spanning trees on graphs | 14 pages, 3 figures | null | null | null | cs.DS cs.DM | null | A locally connected spanning tree of a graph $G$ is a spanning tree $T$ of
$G$ such that the set of all neighbors of $v$ in $T$ induces a connected
subgraph of $G$ for every $v\in V(G)$. The purpose of this paper is to give
linear-time algorithms for finding locally connected spanning trees on strongly
chordal graphs and proper circular-arc graphs, respectively.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 2004 09:08:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lin",
"Ching-Chi",
""
],
[
"Chang",
"Gerard J.",
""
],
[
"Chen",
"Gen-Huey",
""
]
] |
cs/0409014 | Manoj Kumar | Sunder lal and Manoj Kumar | A Digital Signature with Threshold Generation and Verification | 10 Pages | null | null | null | cs.CR | null | This paper proposes a signature scheme where the signatures are generated by
the cooperation of a number of people from a given group of senders and the
signatures are verified by a certain number of people from the group of
recipients. Shamir's threshold scheme and Schnorr's signature scheme are used
to realize the proposed scheme.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 2004 11:55:58 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Sep 2004 12:29:23 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Nov 2004 12:21:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
] |
cs/0409015 | Stephen Cook | Stephen Cook and Neil Thapen | The strength of replacement in weak arithmetic | null | null | null | null | cs.LO cs.CC | null | The replacement (or collection or choice) axiom scheme asserts bounded
quantifier exchange. We prove the independence of this scheme from various weak
theories of arithmetic, sometimes under a complexity assumption.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 2004 16:18:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cook",
"Stephen",
""
],
[
"Thapen",
"Neil",
""
]
] |
cs/0409016 | Vitaly Lugovsky | V. S. Lugovsky | Using a hierarchy of Domain Specific Languages in complex software
systems design | 8 pages, 1 figure | null | null | null | cs.PL cs.DS cs.SE | null | A new design methodology is introduced, with some examples on building Domain
Specific Languages hierarchy on top of Scheme.
| [
{
"version": "v1",
"created": "Thu, 9 Sep 2004 01:44:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lugovsky",
"V. S.",
""
]
] |
cs/0409017 | Jianyang Zeng | Jianyang Zeng, Wen-Jing Hsu and Jiangdian Wang | Near Optimal Routing for Small-World Networks with Augmented Local
Awareness | 16 pages, 1 table and 3 figures. Experimental results are added | null | null | null | cs.DM cs.DC cs.DS | null | In order to investigate the routing aspects of small-world networks,
Kleinberg proposes a network model based on a $d$-dimensional lattice with
long-range links chosen at random according to the $d$-harmonic distribution.
Kleinberg shows that the greedy routing algorithm by using only local
information performs in $O(\log^2 n)$ expected number of hops, where $n$
denotes the number of nodes in the network. Martel and Nguyen have found that
the expected diameter of Kleinberg's small-world networks is $\Theta(\log n)$.
Thus a question arises naturally: Can we improve the routing algorithms to
match the diameter of the networks while keeping the amount of information
stored on each node as small as possible? We extend Kleinberg's model and add
three augmented local links for each node: two of which are connected to nodes
chosen randomly and uniformly within $\log^2 n$ Mahattan distance, and the
third one is connected to a node chosen randomly and uniformly within $\log n$
Mahattan distance. We show that if each node is aware of $O(\log n)$ number of
neighbors via the augmented local links, there exist both non-oblivious and
oblivious algorithms that can route messages between any pair of nodes in
$O(\log n \log \log n)$ expected number of hops, which is a near optimal
routing complexity and outperforms the other related results for routing in
Kleinberg's small-world networks. Our schemes keep only $O(\log^2 n)$ bits of
routing information on each node, thus they are scalable with the network size.
Besides adding new light to the studies of social networks, our results may
also find applications in the design of large-scale distributed networks, such
as peer-to-peer systems, in the same spirit of Symphony.
| [
{
"version": "v1",
"created": "Thu, 9 Sep 2004 03:41:48 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Feb 2005 06:37:37 GMT"
},
{
"version": "v3",
"created": "Wed, 30 Nov 2005 19:08:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zeng",
"Jianyang",
""
],
[
"Hsu",
"Wen-Jing",
""
],
[
"Wang",
"Jiangdian",
""
]
] |
cs/0409018 | Adam Slagell | Adam J Slagell and Rafael Bonilla | PKI Scalability Issues | 23 pages, 2 figures | null | null | null | cs.CR | null | This report surveys different PKI technologies such as PKIX and SPKI and the
issues of PKI that affect scalability. Much focus is spent on certificate
revocation methodologies and status verification systems such as CRLs,
Delta-CRLs, CRS, Certificate Revocation Trees, Windowed Certificate Revocation,
OCSP, SCVP and DVCS.
| [
{
"version": "v1",
"created": "Thu, 9 Sep 2004 08:30:04 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Nov 2005 00:52:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slagell",
"Adam J",
""
],
[
"Bonilla",
"Rafael",
""
]
] |
cs/0409019 | Fabrizio Angiulli | Fabrizio Angiulli, Gianluigi Greco and Luigi Palopoli | Outlier Detection by Logic Programming | null | null | null | null | cs.AI cs.LO | null | The development of effective knowledge discovery techniques has become in the
recent few years a very active research area due to the important impact it has
in several relevant application areas. One interesting task thereof is that of
singling out anomalous individuals from a given population, e.g., to detect
rare events in time-series analysis settings, or to identify objects whose
behavior is deviant w.r.t. a codified standard set of "social" rules. Such
exceptional individuals are usually referred to as outliers in the literature.
Recently, outlier detection has also emerged as a relevant KR&R problem. In
this paper, we formally state the concept of outliers by generalizing in
several respects an approach recently proposed in the context of default logic,
for instance, by having outliers not being restricted to single individuals
but, rather, in the more general case, to correspond to entire (sub)theories.
We do that within the context of logic programming and, mainly through
examples, we discuss its potential practical impact in applications. The
formalization we propose is a novel one and helps in shedding some light on the
real nature of outliers. Moreover, as a major contribution of this work, we
illustrate the exploitation of minimality criteria in outlier detection. The
computational complexity of outlier detection problems arising in this novel
setting is thoroughly investigated and accounted for in the paper as well.
Finally, we also propose a rewriting algorithm that transforms any outlier
detection problem into an equivalent inference problem under the stable model
semantics, thereby making outlier computation effective and realizable on top
of any stable model solver.
| [
{
"version": "v1",
"created": "Thu, 9 Sep 2004 14:20:02 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Oct 2005 14:54:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Angiulli",
"Fabrizio",
""
],
[
"Greco",
"Gianluigi",
""
],
[
"Palopoli",
"Luigi",
""
]
] |
cs/0409020 | Haibin Wang | Haibin Wang, Yuanchun He, Rajshekhar Sunderraman | A Generalized Disjunctive Paraconsistent Data Model for Negative and
Disjunctive Information | 12 pages | null | null | null | cs.DB | null | This paper presents a generalization of the disjunctive paraconsistent
relational data model in which disjunctive positive and negative information
can be represented explicitly and manipulated. There are situations where the
closed world assumption to infer negative facts is not valid or undesirable and
there is a need to represent and reason with negation explicitly. We consider
explicit disjunctive negation in the context of disjunctive databases as there
is an interesting interplay between these two types of information. Generalized
disjunctive paraconsistent relation is introduced as the main structure in this
model. The relational algebra is appropriately generalized to work on
generalized disjunctive paraconsistent relations and their correctness is
established.
| [
{
"version": "v1",
"created": "Sat, 11 Sep 2004 11:02:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Haibin",
""
],
[
"He",
"Yuanchun",
""
],
[
"Sunderraman",
"Rajshekhar",
""
]
] |
cs/0409021 | Vita Hinze-Hoare | Vita Hinze-Hoare | Should Cyberspace Chat Rooms be closed to protect Children? | null | null | null | null | cs.CY | null | The explosion of people networking in cyberspace, disseminating terabytes of
information, is being promoted through the use of broadband, bluetooth
technology, and wireless mobile computing facilities. New communities within
such venues as virtual chat rooms discussion groups, newsgroups etc are being
created daily and even hourly. This is raising issues of cyberethics concerning
privacy,security, crime, human needs, e-business, e-healthcare, e-government
and intellectual property among others that need to be evaluated and reflected
upon. With this new freedom come new moral and ethical responsibilities, which
raise questions as to whether anything can be published or whether there should
be restrictions. This paper addresses one specific area, that has come into the
public eye, the closure by Microsoft of all of its free chat rooms.
| [
{
"version": "v1",
"created": "Sat, 11 Sep 2004 19:23:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
] |
cs/0409022 | Ian Frommer | Ian Frommer, Eric Harder, Brian Hunt, Ryan Lance, Edward Ott and James
Yorke | Two Models for the Study of Congested Internet Connections | 10 pages, 9 figures, extended version of CCN '04 Paper | null | null | null | cs.NI | null | In this paper, we introduce two deterministic models aimed at capturing the
dynamics of congested Internet connections. The first model is a
continuous-time model that combines a system of differential equations with a
sudden change in one of the state variables. The second model is a
discrete-time model with a time step that arises naturally from the system.
Results from these models show good agreement with the well-known ns network
simulator, better than the results of a previous, similar model. This is due in
large part to the use of the sudden change to reflect the impact of lost data
packets. We also discuss the potential use of this model in network traffic
state estimation.
| [
{
"version": "v1",
"created": "Mon, 13 Sep 2004 17:49:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Frommer",
"Ian",
""
],
[
"Harder",
"Eric",
""
],
[
"Hunt",
"Brian",
""
],
[
"Lance",
"Ryan",
""
],
[
"Ott",
"Edward",
""
],
[
"Yorke",
"James",
""
]
] |
cs/0409023 | Brendan Lucier | Brendan Lucier | Proximity Inversion Functions on the Non-Negative Integers | 20 pages, Latex; v2: Introduction expanded, Proof of main theorem
rewritten for clarity, formatting changed | null | null | null | cs.DM | null | We consider functions mapping non-negative integers to non-negative real
numbers such that a and a+n are mapped to values at least 1/n apart. In this
paper we use a novel method to construct such a function. We conjecture that
the supremum of the generated function is optimal and pose some unsolved
problems.
| [
{
"version": "v1",
"created": "Mon, 13 Sep 2004 03:12:33 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Oct 2004 23:11:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lucier",
"Brendan",
""
]
] |
cs/0409028 | Andreas U. Schmidt | Andreas U. Schmidt | Incentive Systems in Multi-Level Markets for Virtual Goods | 18 pages, 5 figures; graphics with reduced resolution. Full
resolution available on author's homepage. Accepted contribution to the
Workshop 'Virtual Goods' at the Conference AXMEDIS 2005, 30. November - 2.
December, Florence, Italy | null | null | null | cs.GT cs.CY | null | As an alternative to rigid DRM measures, ways of marketing virtual goods
through multi-level or networked marketing have raised some interest. This
report is a first approach to multi-level markets for virtual goods from the
viewpoint of theoretical economy. A generic, kinematic model for the monetary
flow in multi-level markets, which quantitatively describes the incentives that
buyers receive through resales revenues, is devised. Building on it, the
competition of goods is examined in a dynamical, utility-theoretic model
enabling, in particular, a treatment of the free-rider problem. The most
important implications for the design of multi-level market mechanisms for
virtual goods, or multi-level incentive management systems, are outlined.
| [
{
"version": "v1",
"created": "Tue, 14 Sep 2004 12:03:23 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Jun 2005 15:17:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0409030 | Christophe Rigotti | Slim Abdennadher and Christophe Rigotti | Automatic Generation of CHR Constraint Solvers | to be published in Theory and Practice of Logic Programming, 16
pages, 2 figures | null | null | null | cs.LO cs.PL | null | In this paper, we present a framework for automatic generation of CHR solvers
given the logical specification of the constraints. This approach takes
advantage of the power of tabled resolution for constraint logic programming,
in order to check the validity of the rules. Compared to previous works where
different methods for automatic generation of constraint solvers have been
proposed, our approach enables the generation of more expressive rules (even
recursive and splitting rules) that can be used directly as CHR solvers.
| [
{
"version": "v1",
"created": "Tue, 14 Sep 2004 20:55:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abdennadher",
"Slim",
""
],
[
"Rigotti",
"Christophe",
""
]
] |
cs/0409031 | Patrick C. McGuire | Patrick C. McGuire, Javier Gomez-Elvira, Jose Antonio
Rodriguez-Manfredi, Eduardo Sebastian-Martinez, Jens Ormo, Enrique
Diaz-Martinez, Helge Ritter, Markus Oesker, Robert Haschke and Joerg Ontrup | Field Geology with a Wearable Computer: First Results of the Cyborg
Astrobiologist System | 7 pages, 6 figures. Submitted to ICRA'2005 (Int'l Conf. on Robotics &
Automation, IEEE), April 18-22, 2005, Barcelona, Spain | null | null | null | cs.CV astro-ph cs.RO | null | We present results from the first geological field tests of the `Cyborg
Astrobiologist', which is a wearable computer and video camcorder system that
we are using to test and train a computer-vision system towards having some of
the autonomous decision-making capabilities of a field-geologist. The Cyborg
Astrobiologist platform has thus far been used for testing and development of
these algorithms and systems: robotic acquisition of quasi-mosaics of images,
real-time image segmentation, and real-time determination of interesting points
in the image mosaics. The hardware and software systems function reliably, and
the computer-vision algorithms are adequate for the first field tests. In
addition to the proof-of-concept aspect of these field tests, the main result
of these field tests is the enumeration of those issues that we can improve in
the future, including: dealing with structural shadow and microtexture, and
also, controlling the camera's zoom lens in an intelligent manner. Nonetheless,
despite these and other technical inadequacies, this Cyborg Astrobiologist
system, consisting of a camera-equipped wearable-computer and its
computer-vision algorithms, has demonstrated its ability of finding genuinely
interesting points in real-time in the geological scenery, and then gathering
more information about these interest points in an automated manner.
| [
{
"version": "v1",
"created": "Wed, 15 Sep 2004 15:38:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McGuire",
"Patrick C.",
""
],
[
"Gomez-Elvira",
"Javier",
""
],
[
"Rodriguez-Manfredi",
"Jose Antonio",
""
],
[
"Sebastian-Martinez",
"Eduardo",
""
],
[
"Ormo",
"Jens",
""
],
[
"Diaz-Martinez",
"Enrique",
""
],
[
"Ritter",
"Helge",
""
],
[
"Oesker",
"Markus",
""
],
[
"Haschke",
"Robert",
""
],
[
"Ontrup",
"Joerg",
""
]
] |
cs/0409032 | Alice Kolakowska | A. Kolakowska and M. A. Novotny | Desynchronization and Speedup in an Asynchronous Conservative Parallel
Update Protocol | Invited chapter in "Progress in Computer Science Research", Nova
Science Publishers; 34 pages, 12 figures, 32 references | Ch.6 in "Artificial Inteligence and Computer Science" ed by S.
Shannon, pp.151-176 (2005 Nova Science Piblishers, Inc., New York) ISBN
1-59454-411-5 | null | null | cs.DC cond-mat.mtrl-sci physics.comp-ph | null | In a state-update protocol for a system of $L$ asynchronous parallel
processes that communicate only with nearest neighbors, global
desynchronization in operation times can be deduced from kinetic roughening of
the corresponding virtual-time horizon (VTH). The utilization of the parallel
processing environment can be deduced by analyzing the microscopic structure of
the VTH. We give an overview of how the methods of non-equilibrium surface
growth (physics of complex systems) can be applied to uncover some properties
of state update algorithms used in distributed parallel discrete-event
simulations (PDES). In particular, we focus on the asynchronous conservative
PDES algorithm in a ring communication topology. The time evolution of its VTH
is simulated numerically as asynchronous cellular automaton whose update rule
corresponds to the update rule followed by this algorithm. We give theoretical
estimates of the performance as a function of $L$ and the load per processor,
i.e., approximate formulas for the mean speedup and for the desynchronization.
It is established that, for a given simulation size, there is a theoretical
upper bound for the desynchronization and a theoretical non-zero lower bound
for the utilization. The new approach to performance studies, outlined in this
chapter, is particularly useful in the search for the design of a
new-generation of algorithms that would efficiently carry out an autonomous or
tunable synchronization.
| [
{
"version": "v1",
"created": "Thu, 16 Sep 2004 06:40:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kolakowska",
"A.",
""
],
[
"Novotny",
"M. A.",
""
]
] |
cs/0409034 | Adam Slagell | Paul Stanton | Securing Data in Storage: A Review of Current Research | 22 pages, 4 figures, 3 tables | null | null | null | cs.OS cs.CR | null | Protecting data from malicious computer users continues to grow in
importance. Whether preventing unauthorized access to personal photographs,
ensuring compliance with federal regulations, or ensuring the integrity of
corporate secrets, all applications require increased security to protect data
from talented intruders. Specifically, as more and more files are preserved on
disk the requirement to provide secure storage has increased in importance.
This paper presents a survey of techniques for securely storing data, including
theoretical approaches, prototype systems, and existing systems currently
available. Due to the wide variety of potential solutions available and the
variety of techniques to arrive at a particular solution, it is important to
review the entire field prior to selecting an implementation that satisfies
particular requirements. This paper provides an overview of the prominent
characteristics of several systems to provide a foundation for making an
informed decision. Initially, the paper establishes a set of criteria for
evaluating a storage solution based on confidentiality, integrity,
availability, and performance. Then, using these criteria, the paper explains
the relevant characteristics of select storage systems and provides a
comparison of the major differences.
| [
{
"version": "v1",
"created": "Fri, 17 Sep 2004 21:51:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stanton",
"Paul",
""
]
] |
cs/0409035 | David P. Chassin | Ning Lu, Z. Todd Taylor, David P. Chassin, Ross T. Guttromson, R.
Scott Studham | Parallel Computing Environments and Methods for Power Distribution
System Simulation | 7 pages, 4 figures, 6 tables, submitted to HICSS-38 | null | null | null | cs.DC cs.CE cs.MA cs.PF | null | The development of cost-effective highperformance parallel computing on
multi-processor supercomputers makes it attractive to port excessively time
consuming simulation software from personal computers (PC) to super computes.
The power distribution system simulator (PDSS) takes a bottom-up approach and
simulates load at the appliance level, where detailed thermal models for
appliances are used. This approach works well for a small power distribution
system consisting of a few thousand appliances. When the number of appliances
increases, the simulation uses up the PC memory and its runtime increases to a
point where the approach is no longer feasible to model a practical large power
distribution system. This paper presents an effort made to port a PC-based
power distribution system simulator to a 128-processor shared-memory
supercomputer. The paper offers an overview of the parallel computing
environment and a description of the modification made to the PDSS model. The
performance of the PDSS running on a standalone PC and on the supercomputer is
compared. Future research direction of utilizing parallel computing in the
power distribution system simulation is also addressed.
| [
{
"version": "v1",
"created": "Sat, 18 Sep 2004 17:09:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lu",
"Ning",
""
],
[
"Taylor",
"Z. Todd",
""
],
[
"Chassin",
"David P.",
""
],
[
"Guttromson",
"Ross T.",
""
],
[
"Studham",
"R. Scott",
""
]
] |
cs/0409036 | Manoj Kumar | Sunder Lal and Manoj Kumar | A Directed Signature Scheme and its Applications | 9 Pages, No figures. Presented in the National Conference on
Information Security, New Delhi- India, Jan-2003 | null | null | null | cs.CR | null | This paper presents a directed signature scheme with the property that the
signature can be verified only with the help of signer or signature receiver.
We also propose its applications to share verification of signatures and to
threshold cryptosystems.
| [
{
"version": "v1",
"created": "Sun, 19 Sep 2004 03:12:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
] |
cs/0409037 | Mark Dumay | Mark Dumay | Business Processes: The Theoretical Impact of Process Thinking on
Information Systems Development | 22 pages | null | null | null | cs.OH | null | This paper investigates two aspects of process thinking that affect the
success rate of IT projects. These two aspects are the changes in the structure
of organizations and the epistemology of Information Systems Development.
Firstly, the conception of business processes within the management of
organizations increases the structural complexity of Information Systems,
because existing systems have to be integrated into a coherent cross-functional
architecture. Secondly, process thinking leads to a particular view of
organizations that ultimately has a negative effect on the support of
Information Systems. As an illustration of process thinking, the Business
Process Reengineering movement adheres to a technocratic management perspective
of organizations. Particularly this conception of organization views people as
mechanisms to realize certain organizational goals. As a result of this view
stakeholders are confronted with the implemented systems, rather than consulted
about the scope and functionality of those systems. Therefore, both aspects of
process thinking have a negative impact on the success of IT projects. The
problem of structural complexity is an area that is addressed by Enterprise
Application Integration, and mainly requires technical solutions. However, the
problems associated with the conception of organization require a different,
markedly non-technical, perspective. Several directions are discussed to
overcome some limitations of process thinking, but these directions are merely
small pointers. If truly effective and useful Information Systems are to be
acquired, IT practitioners and scientists require a completely different
mindset.
| [
{
"version": "v1",
"created": "Sun, 19 Sep 2004 09:56:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dumay",
"Mark",
""
]
] |
cs/0409040 | Florentin Smarandache | Florentin Smarandache | Unification of Fusion Theories | 14 pages | Presented at NATO Advanced Study Institute, Albena, Bulgaria,
16-27 May 2005. International Journal of Applied Mathematics & Statistics,
Vol. 2, 1-14, 2004. | null | null | cs.AI | null | Since no fusion theory neither rule fully satisfy all needed applications,
the author proposes a Unification of Fusion Theories and a combination of
fusion rules in solving problems/applications. For each particular application,
one selects the most appropriate model, rule(s), and algorithm of
implementation. We are working in the unification of the fusion theories and
rules, which looks like a cooking recipe, better we'd say like a logical chart
for a computer programmer, but we don't see another method to comprise/unify
all things. The unification scenario presented herein, which is now in an
incipient form, should periodically be updated incorporating new discoveries
from the fusion and engineering research.
| [
{
"version": "v1",
"created": "Thu, 23 Sep 2004 02:02:44 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Sep 2004 13:50:15 GMT"
},
{
"version": "v3",
"created": "Fri, 29 Oct 2004 17:01:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
]
] |
cs/0409041 | Vita Hinze-Hoare | Vita Hinze-Hoare | Four Principles Fundamental to Design Practice for Human Centred Systems | null | null | null | null | cs.HC | null | A Survey of the principal literature on Human Centred Design reveals the four
most referenced principles. These are discussed with reference to the
application of a particular website, and a user survey is constructed based
upon the four principles.
| [
{
"version": "v1",
"created": "Thu, 23 Sep 2004 19:08:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
] |
cs/0409042 | Harry Fiti\'e | Harry Fiti\'e | A new architecture for making highly scalable applications | 13 pages, 7 figures, 5 tables | null | null | null | cs.HC cs.CL | null | An application is a logical image of the world on a computer. A scalable
application is an application that allows one to update that logical image at
run time. To put it in operational terms: an application is scalable if a
client can change between time T1 and time T2 - the logic of the application as
expressed by language L;
- the structure and volume of the stored knowledge;
- the user interface of the application; while clients working with the
application at time T1 will work with the changed application at time T2
without performing any special action between T1 and T2. In order to realize
such a scalable application a new architecture has been developed that fully
orbits around language. In order to verify the soundness of that architecture a
program has been build. Both architecture and program are called CommunSENS.
The main purpose of this paper is: - to list the relevant elements of the
architecture; - to give a visual presentation of how the program and its image
of the world look like; - to give a visual presentation of how the image can be
updated. Some relevant philosophical and practical backgrounds are included in
the appendixes.
| [
{
"version": "v1",
"created": "Thu, 23 Sep 2004 19:29:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fitié",
"Harry",
""
]
] |
cs/0409043 | Luca Trevisan | Luca Trevisan | Inapproximability of Combinatorial Optimization Problems | null | null | null | null | cs.CC | null | We survey results on the hardness of approximating combinatorial optimization
problems.
| [
{
"version": "v1",
"created": "Fri, 24 Sep 2004 02:13:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Trevisan",
"Luca",
""
]
] |
cs/0409045 | Amar Isli | Amar Isli | Augmenting ALC(D) (atemporal) roles and (aspatial) concrete domain with
temporal roles and a spatial concrete domain -first results | in Proceedings of the ECAI Workshop on Spatial and Temporal
Reasoning, pp. 123-127, Valencia, Spain, 2004 | null | null | null | cs.AI cs.LO | null | We consider the well-known family ALC(D) of description logics with a
concrete domain, and provide first results on a framework obtained by
augmenting ALC(D) atemporal roles and aspatial concrete domain with temporal
roles and a spatial concrete domain.
| [
{
"version": "v1",
"created": "Fri, 24 Sep 2004 14:56:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Isli",
"Amar",
""
]
] |
cs/0409046 | Amar Isli | Amar Isli | A TCSP-like decidable constraint language generalising existing cardinal
direction relations | in Proceedings of the ECAI Workshop on Spatial and Temporal
Reasoning, pp. 135-139, Valencia, Spain, 2004 | null | null | null | cs.AI cs.LO | null | We define a quantitative constraint language subsuming two calculi well-known
in QSR (Qualitative Spatial Reasoning): Frank's cone-shaped and
projection-based calculi of cardinal direction relations. We show how to solve
a CSP (Constraint Satisfaction Problem) expressed in the language.
| [
{
"version": "v1",
"created": "Fri, 24 Sep 2004 15:12:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Isli",
"Amar",
""
]
] |
cs/0409049 | Manoj Kumar | Sunder lal and Manoj Kumar | A Directed -Threshold Multi-Signature Scheme | 12 pages, no figures | null | null | null | cs.CR | null | In this paper, we propose a Directed Threshold Multi-Signature Scheme. In
this threshold signature scheme, any malicious set of signers cannot
impersonate any other set of signers to forge the signatures. In case of
forgery, it is possible to trace the signing set. This threshold signature
scheme is applicable when the message is sensitive to the signature receiver;
and the signatures are generated by the cooperation of a number of people from
a given group of senders.
| [
{
"version": "v1",
"created": "Sat, 25 Sep 2004 12:53:47 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Oct 2004 14:55:42 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Nov 2004 12:31:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
] |
cs/0409050 | Manoj Kumar | Sunder Lal and Manoj Kumar | Some Applications of Directed Signature Scheme | 12 pages, no figures, this paper provides some application of
directed signature scheme | null | null | null | cs.CR | null | Directed signature scheme is applicable when the signed message contains
information sensitive to the receiver, because only receiver can directly
verify the signature and that he/she can prove its validity to any third party,
whenever necessary. This paper presents two applications of directed signature
scheme. (i) Directed –Delegated Signature Scheme. This scheme combines
the idea of proxy signatures with directed signature scheme. (ii) Allocation of
registration number. This scheme proposes a registration scheme in which the
registration number cannot be forged and misused.
| [
{
"version": "v1",
"created": "Sun, 26 Sep 2004 13:18:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
] |
cs/0409051 | Tereza Tu\v{s}arov\'a | Tereza Tusarova | Quantum Complexity Classes | Master thesis from 2003. Comparing to the original version, here I
corrected some typos and formal errors. I am now writing a short extract from
this thesis | null | null | IR-TI-001 | cs.CC quant-ph | null | In our thesis, we try to shed more light onto the complexity of quantum
complexity classes by refining the related part of the hierarchy. First, we
review the basic concepts of quantum computing in general. Then, inspired by
BQP, we define new complexity classes. They are placed between BPP and PSPACE.
We show that they incorporate the current important quantum algorithms.
Furthermore, the importance of the unitarity constraint given by quantum
mechanics is revealed. Without this requirement, we naturally arrive at the
class AWPP, which was up to now thought to be just an artificially defined
class. We hope that some of our newly defined classes could find their use in
proving results about BQP.
| [
{
"version": "v1",
"created": "Sun, 26 Sep 2004 19:28:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tusarova",
"Tereza",
""
]
] |
cs/0409052 | Aletta Nyl\'en | Parosh Aziz Abdulla and Aletta Nylen | Better Quasi-Ordered Transition Systems | 30 pages, 6 figures | null | null | null | cs.LO | null | Many existing algorithms for model checking of infinite-state systems operate
on constraints which are used to represent (potentially infinite) sets of
states. A general powerful technique which can be employed for proving
termination of these algorithms is that of well quasi-orderings. Several
methodologies have been proposed for derivation of new well quasi-ordered
constraint systems. However, many of these constraint systems suffer from a
"constraint explosion problem", as the number of the generated constraints
grows exponentially with the size of the problem. In this paper, we demonstrate
that a refinement of the theory of well quasi-orderings, called the theory of
better quasi-orderings, is more appropriate for symbolic model checking, since
it allows inventing constraint systems which are both well quasi-ordered and
compact. As a main application, we introduce existential zones, a constraint
system for verification of systems with unboundedly many clocks and use our
methodology to prove that existential zones are better quasi-ordered. We show
how to use existential zones in verification of timed Petri nets and present
some experimental results. Also, we apply our methodology to derive new
constraint systems for verification of broadcast protocols, lossy channel
systems, and integral relational automata. The new constraint systems are
exponentially more succinct than existing ones, and their well quasi-ordering
cannot be shown by previous methods in the literature.
| [
{
"version": "v1",
"created": "Sun, 26 Sep 2004 21:54:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abdulla",
"Parosh Aziz",
""
],
[
"Nylen",
"Aletta",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.