id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0409055 | Jonathan Bowen | Alpay Beler, Ann Borda, Jonathan P. Bowen, Silvia Filippini-Fantoni | The Building of Online Communities: An approach for learning
organizations, with a particular focus on the museum sector | (15 pages, 1 figure) | In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2004
London Conference Proceedings, University College London, The Institute of
Archaeology, UK, 26-30 July 2004, pages 2.1-2.15 | null | null | cs.CY cs.DL | null | This paper considers the move toward and potential of building online
communities, with a particular focus on the museum sector. For instance, the
increase in the use of `personalized' toolkits that are becoming an integral
part of the online presence for learning organizations, like museums, can
provide a basis for creating and sustaining communities. A set of case studies
further illustrates working examples of the ways in which personalization and
specific tools are developing collaborative spaces, community channels and
group interactions.
| [
{
"version": "v1",
"created": "Tue, 28 Sep 2004 18:10:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Beler",
"Alpay",
""
],
[
"Borda",
"Ann",
""
],
[
"Bowen",
"Jonathan P.",
""
],
[
"Filippini-Fantoni",
"Silvia",
""
]
] |
cs/0409056 | Gianluca Argentini | Gianluca Argentini | Using sparse matrices and splines-based interpolation in computational
fluid dynamics simulations | Talk at SIMAI (Societa' Italiana di Matematica Applicata e
Industriale) 2004 Congress, Venice, San Servolo Island, September 20-24, 2004 | null | null | null | cs.NA cs.CE physics.comp-ph | null | In this relation I present a technique of construction and fast evaluation of
a family of cubic polynomials for analytic smoothing and graphical rendering of
particles trajectories for flows in a generic geometry. The principal result of
the work was implementation and test of a method for interpolating 3D points by
regular parametric curves and their fast and efficient evaluation for a good
resolution of rendering. For the purpose a parallel environment using a
multiprocessor cluster architecture has been used. This work has been developed
for the Research and Development Department of my company for planning advanced
customized models of industrial burners.
| [
{
"version": "v1",
"created": "Wed, 29 Sep 2004 10:34:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0409057 | Manor Mendel | Sariel Har-Peled, Manor Mendel | Fast Construction of Nets in Low Dimensional Metrics, and Their
Applications | 41 pages. Extensive clean-up of minor English errors | SIAM J. Comput. 35(5):1148-1184, 2006 | 10.1137/S0097539704446281 | null | cs.DS cs.CG | null | We present a near linear time algorithm for constructing hierarchical nets in
finite metric spaces with constant doubling dimension. This data-structure is
then applied to obtain improved algorithms for the following problems:
Approximate nearest neighbor search, well-separated pair decomposition, compact
representation scheme, doubling measure, and computation of the (approximate)
Lipschitz constant of a function. In all cases, the running (preprocessing)
time is near-linear and the space being used is linear.
| [
{
"version": "v1",
"created": "Wed, 29 Sep 2004 17:44:15 GMT"
},
{
"version": "v2",
"created": "Fri, 6 May 2005 21:18:00 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Aug 2005 05:03:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Har-Peled",
"Sariel",
""
],
[
"Mendel",
"Manor",
""
]
] |
cs/0409058 | Lillian Lee | Bo Pang and Lillian Lee | A Sentimental Education: Sentiment Analysis Using Subjectivity
Summarization Based on Minimum Cuts | Data available at
http://www.cs.cornell.edu/people/pabo/movie-review-data/ | Proceedings of the 42nd ACL, pp. 271--278, 2004 | null | null | cs.CL | null | Sentiment analysis seeks to identify the viewpoint(s) underlying a text span;
an example application is classifying a movie review as "thumbs up" or "thumbs
down". To determine this sentiment polarity, we propose a novel
machine-learning method that applies text-categorization techniques to just the
subjective portions of the document. Extracting these portions can be
implemented using efficient techniques for finding minimum cuts in graphs; this
greatly facilitates incorporation of cross-sentence contextual constraints.
| [
{
"version": "v1",
"created": "Wed, 29 Sep 2004 20:34:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pang",
"Bo",
""
],
[
"Lee",
"Lillian",
""
]
] |
cs/0409059 | Vita Hinze-Hoare | Vita Hinze-Hoare | From Digital Television to Internet? | null | null | null | null | cs.MM cs.CY | null | This paper provides a general technical overview of the Multimedia Home
Platform (MHP) specifications. MHP is a generic interface between digital
applications and user machines, whether they happen to be set top boxes,
digital TV sets or Multimedia PC's. MHP extends the DVB open standards.
Addressed are MHP architexture, System core and MHP Profiles.
| [
{
"version": "v1",
"created": "Thu, 30 Sep 2004 19:08:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
] |
cs/0410001 | Chriatian Jensen | C. S. Jensen, H. Lahrmann, S. Pakalnis, and J. Runge | The Infati Data | null | null | null | TR-79 | cs.DB | null | The ability to perform meaningful empirical studies is of essence in research
in spatio-temporal query processing. Such studies are often necessary to gain
detailed insight into the functional and performance characteristics of
proposals for new query processing techniques.
We present a collection of spatio-temporal data, collected during an
intelligent speed adaptation project, termed INFATI, in which some two dozen
cars equipped with GPS receivers and logging equipment took part. We describe
how the data was collected and how it was "modified" to afford the drivers some
degree of anonymity.
We also present the road network in which the cars were moving during data
collection.
The GPS data is publicly available for non-commercial purposes. It is our
hope that this resource will help the spatio-temporal research community in its
efforts to develop new and better query processing techniques.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 2004 16:55:38 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Oct 2004 12:01:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jensen",
"C. S.",
""
],
[
"Lahrmann",
"H.",
""
],
[
"Pakalnis",
"S.",
""
],
[
"Runge",
"J.",
""
]
] |
cs/0410004 | Andras Lorincz | I. Szita and A. Lorincz | Applying Policy Iteration for Training Recurrent Neural Networks | Supplementary material. 17 papes, 1 figure | null | null | null | cs.AI cs.LG cs.NE | null | Recurrent neural networks are often used for learning time-series data. Based
on a few assumptions we model this learning task as a minimization problem of a
nonlinear least-squares cost function. The special structure of the cost
function allows us to build a connection to reinforcement learning. We exploit
this connection and derive a convergent, policy iteration-based algorithm.
Furthermore, we argue that RNN training can be fit naturally into the
reinforcement learning framework.
| [
{
"version": "v1",
"created": "Sat, 2 Oct 2004 07:19:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szita",
"I.",
""
],
[
"Lorincz",
"A.",
""
]
] |
cs/0410006 | Mark Dumay | Mark Dumay | Demo or Practice: Critical Analysis of the Language/Action Perspective | 23 pages | null | null | null | cs.OH | null | Despite offering several promising concepts, the Language/Action Perspective
(LAP) is still not in the mainstream of Information Systems Development (ISD).
Since at present there is only a limited understanding of LAP theory and
practice, it remains unclear whether the lack of LAP's impact is due to
shortcomings in LAP theory itself. One classic problem within ISD is the
dichotomy between social perspectives and technical perspectives. LAP claims it
offers a solution to this problem. This paper investigates this claim as a
means to review LAP theory. To provide a structure to a critical analysis of
DEMO - an example methodology that belongs to the LAP research community - this
paper utilizes a paradigmatic framework. This framework is augmented by the
opinion of several DEMO practitioners by means of an expert discussion. With
use of a comparative evaluation of LAP theory and DEMO theory, the implication
of DEMO's reflection upon LAP is determined. The paper concludes by outlining
an agenda for further research if LAP is to improve its footprint in the field.
| [
{
"version": "v1",
"created": "Sun, 3 Oct 2004 20:03:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dumay",
"Mark",
""
]
] |
cs/0410007 | Ignatios Souvatzis | Ignatios Souvatzis | A Shared Write-protected Root Filesystem for a Group of Networked
Clients | Presented at the 2nd European BSD Conference, 2002, Amsterdam, The
Netherlands; v2: reformatted to help citation browser | Proceedings of the 2nd European BSD Conference, 2002, Amsterdam,
The Netherlands | null | null | cs.OS cs.DC | null | A method to boot a cluster of diskless network clients from a single
write-protected NFS root file system is shown. The problems encountered when
first implementing the setup and their solution are discussed. Finally, the
setup is briefly compared to using a kernel-embedded root file system.
| [
{
"version": "v1",
"created": "Mon, 4 Oct 2004 14:49:00 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Jan 2005 19:07:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Souvatzis",
"Ignatios",
""
]
] |
cs/0410009 | Aaron Harwood | Scott Douglas and Aaron Harwood | Diffusive Load Balancing of Loosely-Synchronous Parallel Programs over
Peer-to-Peer Networks | 14 pages with 10 figures | null | null | null | cs.DC | null | The use of under-utilized Internet resources is widely recognized as a viable
form of high performance computing. Sustained processing power of roughly 40T
FLOPS using 4 million volunteered Internet hosts has been reported for
embarrassingly parallel problems. At the same time, peer-to-peer (P2P) file
sharing networks, with more than 50 million participants, have demonstrated the
capacity for scale in distributed systems. This paper contributes a study of
load balancing techniques for a general class of loosely-synchronous parallel
algorithms when executed over a P2P network. We show that decentralized,
diffusive load balancing can be effective at balancing load and is facilitated
by the dynamic properties of P2P. While a moderate degree of dynamicity can
benefit load balancing, significant dynamicity hinders the parallel program
performance due to the need for increased load migration. To the best of our
knowledge this study provides new insight into the performance of
loosely-synchronous parallel programs over the Internet.
| [
{
"version": "v1",
"created": "Tue, 5 Oct 2004 08:23:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Douglas",
"Scott",
""
],
[
"Harwood",
"Aaron",
""
]
] |
cs/0410010 | Amit K. Awasthi | Amit K. Awasthi and Sunder Lal | A New Proxy Ring Signature Scheme | RMS 2004, Agra, INDIA | Proceeding of RMS 2004, Page 29 | null | null | cs.CR math.RA | null | The concept of ring signature was introduced by Rivest, Shamir and Tauman.
This signature is considered to be a simplified group signature from which
identity of signer is ambiguous although verifier knows the group to which
signer belong. In this paper we introduce a new proxy ring signature scheme.
| [
{
"version": "v1",
"created": "Tue, 5 Oct 2004 18:58:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Awasthi",
"Amit K.",
""
],
[
"Lal",
"Sunder",
""
]
] |
cs/0410011 | Amit K. Awasthi | Amit K Awasthi | Comment on A dynamic ID-based Remote User Authentication Scheme | 3 pages. Available at : http://gfcr.org | Transaction on Cryptology, Vol. 01, Issue 02, Page 15-17, Sep 2004 | null | null | cs.CR | null | Since 1981, when Lamport introduced the remote user authentication scheme
using table, a plenty of schemes had been proposed with tables or without table
using. Recently Das et al. proposed a dynamic id-based remote user
authentication scheme. They claimed that their scheme is secure against
ID-theft, and can resist the reply attacks, forgery attacks, insider attacks an
so on. In this paper we show that Das et al's scheme is completly insecure and
using of this scheme is like an open server access without password.
| [
{
"version": "v1",
"created": "Tue, 5 Oct 2004 21:54:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Awasthi",
"Amit K",
""
]
] |
cs/0410015 | Andras Lorincz | Z. Szabo and A. Lorincz | L1 regularization is better than L2 for learning and predicting chaotic
systems | 13 pages, 4 figures | null | null | null | cs.LG cs.AI | null | Emergent behaviors are in the focus of recent research interest. It is then
of considerable importance to investigate what optimizations suit the learning
and prediction of chaotic systems, the putative candidates for emergence. We
have compared L1 and L2 regularizations on predicting chaotic time series using
linear recurrent neural networks. The internal representation and the weights
of the networks were optimized in a unifying framework. Computational tests on
different problems indicate considerable advantages for the L1 regularization:
It had considerably better learning time and better interpolating capabilities.
We shall argue that optimization viewed as a maximum likelihood estimation
justifies our results, because L1 regularization fits heavy-tailed
distributions -- an apparently general feature of emergent systems -- better.
| [
{
"version": "v1",
"created": "Thu, 7 Oct 2004 10:57:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szabo",
"Z.",
""
],
[
"Lorincz",
"A.",
""
]
] |
cs/0410016 | Pedro Andrade | Antonio Amorim, Jaime Villate and Pedro Andrade | HEP@Home - A distributed computing system based on BOINC | 4 pages, 4 Postscript figures, uses CHEP2004.cls, submitted to
CHEP2004 | null | null | null | cs.DC | null | Project SETI@HOME has proven to be one of the biggest successes of
distributed computing during the last years. With a quite simple approach SETI
manages to process large volumes of data using a vast amount of distributed
computer power.
To extend the generic usage of this kind of distributed computing tools,
BOINC is being developed. In this paper we propose HEP@HOME, a BOINC version
tailored to the specific requirements of the High Energy Physics (HEP)
community.
The HEP@HOME will be able to process large amounts of data using virtually
unlimited computing power, as BOINC does, and it should be able to work
according to HEP specifications. In HEP the amounts of data to be analyzed or
reconstructed are of central importance. Therefore, one of the design
principles of this tool is to avoid data transfer. This will allow scientists
to run their analysis applications and taking advantage of a large number of
CPUs. This tool also satisfies other important requirements in HEP, namely,
security, fault-tolerance and monitoring.
| [
{
"version": "v1",
"created": "Thu, 7 Oct 2004 12:42:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amorim",
"Antonio",
""
],
[
"Villate",
"Jaime",
""
],
[
"Andrade",
"Pedro",
""
]
] |
cs/0410018 | Russell Martin | Petra Berenbrink, Leslie Ann Goldberg, Paul Goldberg, Russell Martin | Utilitarian resource assignment | 19 pages | null | null | null | cs.GT math.GM | null | This paper studies a resource allocation problem introduced by Koutsoupias
and Papadimitriou. The scenario is modelled as a multiple-player game in which
each player selects one of a finite number of known resources. The cost to the
player is the total weight of all players who choose that resource, multiplied
by the ``delay'' of that resource. Recent papers have studied the Nash
equilibria and social optima of this game in terms of the $L_\infty$ cost
metric, in which the social cost is taken to be the maximum cost to any player.
We study the $L_1$ variant of this game, in which the social cost is taken to
be the sum of the costs to the individual players, rather than the maximum of
these costs. We give bounds on the size of the coordination ratio, which is the
ratio between the social cost incurred by selfish behavior and the optimal
social cost; we also study the algorithmic problem of finding optimal
(lowest-cost) assignments and Nash Equilibria. Additionally, we obtain bounds
on the ratio between alternative Nash equilibria for some special cases of the
problem.
| [
{
"version": "v1",
"created": "Mon, 11 Oct 2004 13:06:55 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Mar 2005 18:19:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berenbrink",
"Petra",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Goldberg",
"Paul",
""
],
[
"Martin",
"Russell",
""
]
] |
cs/0410020 | Stephen Luttrell | Stephen Luttrell | Adaptive Cluster Expansion (ACE): A Hierarchical Bayesian Network | 35 pages, 20 figures | null | null | null | cs.NE cs.CV | null | Using the maximum entropy method, we derive the "adaptive cluster expansion"
(ACE), which can be trained to estimate probability density functions in high
dimensional spaces. The main advantage of ACE over other Bayesian networks is
its ability to capture high order statistics after short training times, which
it achieves by making use of a hierarchical vector quantisation of the input
data. We derive a scheme for representing the state of an ACE network as a
"probability image", which allows us to identify statistically anomalous
regions in an otherwise statistically homogeneous image, for instance. Finally,
we present some probability images that we obtained after training ACE on some
Brodatz texture images - these demonstrate the ability of ACE to detect subtle
textural anomalies.
| [
{
"version": "v1",
"created": "Sun, 10 Oct 2004 18:30:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
] |
cs/0410021 | Lane A. Hemaspaandra | Edith Hemaspaandra, Lane A. Hemaspaandra, Stanislaw P. Radziszowski,
Rahul Tripathi | Complexity Results in Graph Reconstruction | null | null | null | URCS-TR-2004-852 | cs.CC cs.DM | null | We investigate the relative complexity of the graph isomorphism problem (GI)
and problems related to the reconstruction of a graph from its vertex-deleted
or edge-deleted subgraphs (in particular, deck checking (DC) and legitimate
deck (LD) problems). We show that these problems are closely related for all
amounts $c \geq 1$ of deletion:
1) $GI \equiv^{l}_{iso} VDC_{c}$, $GI \equiv^{l}_{iso} EDC_{c}$, $GI
\leq^{l}_{m} LVD_c$, and $GI \equiv^{p}_{iso} LED_c$.
2) For all $k \geq 2$, $GI \equiv^{p}_{iso} k-VDC_c$ and $GI \equiv^{p}_{iso}
k-EDC_c$.
3) For all $k \geq 2$, $GI \leq^{l}_{m} k-LVD_c$.
4)$GI \equiv^{p}_{iso} 2-LVC_c$.
5) For all $k \geq 2$, $GI \equiv^{p}_{iso} k-LED_c$.
For many of these results, even the $c = 1$ case was not previously known.
Similar to the definition of reconstruction numbers $vrn_{\exists}(G)$ [HP85]
and $ern_{\exists}(G)$ (see page 120 of [LS03]), we introduce two new graph
parameters, $vrn_{\forall}(G)$ and $ern_{\forall}(G)$, and give an example of a
family $\{G_n\}_{n \geq 4}$ of graphs on $n$ vertices for which
$vrn_{\exists}(G_n) < vrn_{\forall}(G_n)$. For every $k \geq 2$ and $n \geq 1$,
we show that there exists a collection of $k$ graphs on $(2^{k-1}+1)n+k$
vertices with $2^{n}$ 1-vertex-preimages, i.e., one has families of graph
collections whose number of 1-vertex-preimages is huge relative to the size of
the graphs involved.
| [
{
"version": "v1",
"created": "Mon, 11 Oct 2004 00:57:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Radziszowski",
"Stanislaw P.",
""
],
[
"Tripathi",
"Rahul",
""
]
] |
cs/0410022 | Paul Piwek | P. Piwek, B. Krenn, M. Schroeder, M. Grice, S. Baumann and H. Pirker | RRL: A Rich Representation Language for the Description of Agent
Behaviour in NECA | 7 pages, 4 figures | In Proceedings of the AAMAS-02 Workshop ``Embodied conversational
agents - let's specify and evaluate them!'', July 16 2002, Bologna, Italy. | null | null | cs.MM cs.MA | null | In this paper, we describe the Rich Representation Language (RRL) which is
used in the NECA system. The NECA system generates interactions between two or
more animated characters. The RRL is an XML compliant framework for
representing the information that is exchanged at the interfaces between the
various NECA system modules. The full XML Schemas for the RRL are available at
http://www.ai.univie.ac.at/NECA/RRL
| [
{
"version": "v1",
"created": "Mon, 11 Oct 2004 12:34:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Piwek",
"P.",
""
],
[
"Krenn",
"B.",
""
],
[
"Schroeder",
"M.",
""
],
[
"Grice",
"M.",
""
],
[
"Baumann",
"S.",
""
],
[
"Pirker",
"H.",
""
]
] |
cs/0410023 | Lane A. Hemaspaandra | Edith Hemaspaandra, Lane A. Hemaspaandra, Harald Hempel | All Superlinear Inverse Schemes are coNP-Hard | Conf. version was in MFCS 2004 | null | null | URCS-TR-2004-841 | cs.CC cs.CR | null | How hard is it to invert NP-problems? We show that all superlinearly
certified inverses of NP problems are coNP-hard. To do so, we develop a novel
proof technique that builds diagonalizations against certificates directly into
a circuit.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 2004 02:38:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/0410024 | Alex Wiesmaier | A. Wiesmaier (1), M. Lippert (1), V. Karatsiolis (1) ((1) TU
Darmstadt) | The Key Authority - Secure Key Management in Hierarchical Public Key
Infrastructures | 5 pages, 2 figures | in Proceedings of the International Conference on Security and
Management. CSREA Press, June 2004, pp. 89-93 | null | null | cs.CR | null | We model a private key`s life cycle as a finite state machine. The states are
the key`s phases of life and the transition functions describe tasks to be done
with the key. Based on this we define and describe the key authority, a trust
center module, which potentiates the easy enforcement of secure management of
private keys in hierarchical public key infrastructures. This is done by
assembling all trust center tasks concerning the crucial handling of private
keys within one centralized module. As this module resides under full control
of the trust center`s carrier it can easily be protected by well-known
organizational and technical measures.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 2004 12:28:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wiesmaier",
"A.",
""
],
[
"Lippert",
"M.",
""
],
[
"Karatsiolis",
"V.",
""
]
] |
cs/0410025 | Alex Wiesmaier | A. Wiesmaier, M. Fischer, M. Lippert, J. Buchmann | Outflanking and securely using the PIN/TAN-System | 7 pages; 2 figures; IEEE style; final version | Proceedings of the 2005 International Conference on Security and
Management (SAM'05); June 2005 | null | null | cs.CR | null | The PIN/TAN-system is an authentication and authorization scheme used in
e-business. Like other similar schemes it is successfully attacked by
criminals. After shortly classifying the various kinds of attacks we accomplish
malicious code attacks on real World Wide Web transaction systems. In doing so
we find that it is really easy to outflank these systems. This is even
supported by the users' behavior. We give a few simple behavior rules to
improve this situation. But their impact is limited. Also the providers support
the attacks by having implementation flaws in their installations. Finally we
show that the PIN/TAN-system is not suitable for usage in highly secure
applications.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 2004 13:47:33 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jan 2005 23:05:48 GMT"
},
{
"version": "v3",
"created": "Thu, 26 May 2005 13:41:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wiesmaier",
"A.",
""
],
[
"Fischer",
"M.",
""
],
[
"Lippert",
"M.",
""
],
[
"Buchmann",
"J.",
""
]
] |
cs/0410026 | Eric Neilsen Jr. | Eric H. Neilsen Jr, James Simone | Lattice QCD Data and Metadata Archives at Fermilab and the International
Lattice Data Grid | Proceedings for CHEP 2004 presentation | null | null | null | cs.DC hep-lat | null | The lattice gauge theory community produces large volumes of data. Because
the data produced by completed computations form the basis for future work, the
maintenance of archives of existing data and metadata describing the
provenance, generation parameters, and derived characteristics of that data is
essential not only as a reference, but also as a basis for future work.
Development of these archives according to uniform standards both in the data
and metadata formats provided and in the software interfaces to the component
services could greatly simplify collaborations between institutions and enable
the dissemination of meaningful results.
This paper describes the progress made in the development of a set of such
archives at the Fermilab lattice QCD facility. We are coordinating the
development of the interfaces to these facilities and the formats of the data
and metadata they provide with the efforts of the international lattice data
grid (ILDG) metadata and middleware working groups, whose goals are to develop
standard formats for lattice QCD data and metadata and a uniform interface to
archive facilities that store them. Services under development include those
commonly associate with data grids: a service registry, a metadata database, a
replica catalog, and an interface to a mass storage system. All services
provide GSI authenticated web service interfaces following modern standards,
including WSDL and SOAP, and accept and provide data and metadata following
recent XML based formats proposed by the ILDG metadata working group.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 2004 15:34:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Neilsen",
"Eric H.",
"Jr"
],
[
"Simone",
"James",
""
]
] |
cs/0410027 | Paul M. Aoki | Chen Yu, Paul M. Aoki, Allison Woodruff | Detecting User Engagement in Everyday Conversations | 4 pages (A4), 1 figure (EPS) | Proc. 8th Int'l Conf. on Spoken Language Processing (ICSLP) (Vol.
2), Jeju Island, Republic of Korea, Oct. 2004, 1329-1332. ISCA. | null | null | cs.SD cs.CL cs.HC | null | This paper presents a novel application of speech emotion recognition:
estimation of the level of conversational engagement between users of a voice
communication system. We begin by using machine learning techniques, such as
the support vector machine (SVM), to classify users' emotions as expressed in
individual utterances. However, this alone fails to model the temporal and
interactive aspects of conversational engagement. We therefore propose the use
of a multilevel structure based on coupled hidden Markov models (HMM) to
estimate engagement levels in continuous natural speech. The first level is
comprised of SVM-based classifiers that recognize emotional states, which could
be (e.g.) discrete emotion types or arousal/valence levels. A high-level HMM
then uses these emotional states as input, estimating users' engagement in
conversation by decoding the internal states of the HMM. We report experimental
results obtained by applying our algorithms to the LDC Emotional Prosody and
CallFriend speech corpora.
| [
{
"version": "v1",
"created": "Wed, 13 Oct 2004 02:28:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yu",
"Chen",
""
],
[
"Aoki",
"Paul M.",
""
],
[
"Woodruff",
"Allison",
""
]
] |
cs/0410031 | Yongzhi Cao | Yongzhi Cao and Mingsheng Ying | Similarity-Based Supervisory Control of Discrete Event Systems | 22 pages, 5 figures | A short version has been published in the IEEE Transactions on
Automatic Control, 51(2), pp. 325-330, February 2006. | null | null | cs.DM | null | Due to the appearance of uncontrollable events in discrete event systems, one
may wish to replace the behavior leading to the uncontrollability of
pre-specified language by some quite similar one. To capture this similarity,
we introduce metric to traditional supervisory control theory and generalize
the concept of original controllability to $\ld$-controllability, where $\ld$
indicates the similarity degree of two languages. A necessary and sufficient
condition for a language to be $\ld$-controllable is provided. We then examine
some properties of $\ld$-controllable languages and present an approach to
optimizing a realization.
| [
{
"version": "v1",
"created": "Thu, 14 Oct 2004 07:28:33 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Mar 2005 14:13:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cao",
"Yongzhi",
""
],
[
"Ying",
"Mingsheng",
""
]
] |
cs/0410035 | Lane A. Hemaspaandra | Lane A. Hemaspaandra, Proshanto Mukherji, and Till Tantau | Overhead-Free Computation, DCFLs, and CFLs | null | null | null | URCS-TR-2004-844 | cs.CC | null | We study Turing machines that are allowed absolutely no space overhead. The
only work space the machines have, beyond the fixed amount of memory implicit
in their finite-state control, is that which they can create by cannibalizing
the input bits' own space. This model more closely reflects the fixed-sized
memory of real computers than does the standard complexity-theoretic model of
linear space.
Though some context-sensitive languages cannot be accepted by such machines,
we show that all context-free languages can be accepted nondeterministically in
polynomial time with absolutely no space overhead, and that all deterministic
context-free languages can be accepted deterministically in polynomial time
with absolutely no space overhead.
| [
{
"version": "v1",
"created": "Fri, 15 Oct 2004 18:18:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Mukherji",
"Proshanto",
""
],
[
"Tantau",
"Till",
""
]
] |
cs/0410036 | Stephen Luttrell | Stephen Luttrell | Self-Organised Factorial Encoding of a Toroidal Manifold | 46 pages, 11 figures, corrected equation 39 | null | null | null | cs.LG cs.CV | null | It is shown analytically how a neural network can be used optimally to encode
input data that is derived from a toroidal manifold. The case of a 2-layer
network is considered, where the output is assumed to be a set of discrete
neural firing events. The network objective function measures the average
Euclidean error that occurs when the network attempts to reconstruct its input
from its output. This optimisation problem is solved analytically for a
toroidal input manifold, and two types of solution are obtained: a joint
encoder in which the network acts as a soft vector quantiser, and a factorial
encoder in which the network acts as a pair of soft vector quantisers (one for
each of the circular subspaces of the torus). The factorial encoder is favoured
for small network sizes when the number of observed firing events is large.
Such self-organised factorial encoding may be used to restrict the size of
network that is required to perform a given encoding task, and will decompose
an input manifold into its constituent submanifolds.
| [
{
"version": "v1",
"created": "Fri, 15 Oct 2004 20:25:24 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Sep 2005 17:48:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
] |
cs/0410037 | Mark Burgin | Mark Burgin | Hardware-Oriented Group Solutions for Hard Problems | null | null | null | null | cs.CC | null | Group and individual solutions are considered for hard problems such as
satisfiability problem. Time-space trade-off in a structured active memory
provides means to achieve lower time complexity for solutions of these
problems.
| [
{
"version": "v1",
"created": "Fri, 15 Oct 2004 23:12:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burgin",
"Mark",
""
]
] |
cs/0410038 | Floris Geerts | Floris Geerts | Frequent Knot Discovery | 7 pages, 2 figures, recreational data mining | null | null | null | cs.DB | null | We explore the possibility of applying the framework of frequent pattern
mining to a class of continuous objects appearing in nature, namely knots. We
introduce the frequent knot mining problem and present a solution. The key
observation is that a database consisting of knots can be transformed into a
transactional database. This observation is based on the Prime Decomposition
Theorem of knots.
| [
{
"version": "v1",
"created": "Sat, 16 Oct 2004 13:14:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Geerts",
"Floris",
""
]
] |
cs/0410039 | Sara Cohen | Sara Cohen and Yehoshua Sagiv | Generating All Maximal Induced Subgraphs for Hereditary,
Connected-Hereditary and Rooted-Hereditary Properties | null | null | null | null | cs.DS cs.DM | null | The problem of computing all maximal induced subgraphs of a graph G that have
a graph property P, also called the maximal P-subgraphs problem, is considered.
This problem is studied for hereditary, connected-hereditary and
rooted-hereditary graph properties. The maximal P-subgraphs problem is reduced
to restricted versions of this problem by providing algorithms that solve the
general problem, assuming that an algorithm for a restricted version is given.
The complexity of the algorithms are analyzed in terms of total polynomial
time, incremental polynomial time and the complexity class P-enumerable. The
general results presented allow simple proofs that the maximal P-subgraphs
problem can be solved efficiently (in terms of the input and output) for many
different properties.
| [
{
"version": "v1",
"created": "Sun, 17 Oct 2004 20:30:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cohen",
"Sara",
""
],
[
"Sagiv",
"Yehoshua",
""
]
] |
cs/0410042 | Patrick C. McGuire | H. Ritter, J.J. Steil, C. Noelker, F. Roethling, P.C. McGuire | Neural Architectures for Robot Intelligence | 37 pages, 17 figures | Reviews in the Neurosciences, vol. 14, no. 1-2, pp. 121-143 (2003) | null | null | cs.RO cs.CV cs.HC cs.LG cs.NE q-bio.NC | null | We argue that the direct experimental approaches to elucidate the
architecture of higher brains may benefit from insights gained from exploring
the possibilities and limits of artificial control architectures for robot
systems. We present some of our recent work that has been motivated by that
view and that is centered around the study of various aspects of hand actions
since these are intimately linked with many higher cognitive abilities. As
examples, we report on the development of a modular system for the recognition
of continuous hand postures based on neural nets, the use of vision and tactile
sensing for guiding prehensile movements of a multifingered hand, and the
recognition and use of hand gestures for robot teaching.
Regarding the issue of learning, we propose to view real-world learning from
the perspective of data mining and to focus more strongly on the imitation of
observed actions instead of purely reinforcement-based exploration. As a
concrete example of such an effort we report on the status of an ongoing
project in our lab in which a robot equipped with an attention system with a
neurally inspired architecture is taught actions by using hand gestures in
conjunction with speech commands. We point out some of the lessons learnt from
this system, and discuss how systems of this kind can contribute to the study
of issues at the junction between natural and artificial cognitive systems.
| [
{
"version": "v1",
"created": "Mon, 18 Oct 2004 10:50:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ritter",
"H.",
""
],
[
"Steil",
"J. J.",
""
],
[
"Noelker",
"C.",
""
],
[
"Roethling",
"F.",
""
],
[
"McGuire",
"P. C.",
""
]
] |
cs/0410047 | Jaap-Henk Hoepman | Jaap-Henk Hoepman | Simple Distributed Weighted Matchings | null | null | null | null | cs.DC cs.DM | null | Wattenhofer [WW04] derive a complicated distributed algorithm to compute a
weighted matching of an arbitrary weighted graph, that is at most a factor 5
away from the maximum weighted matching of that graph. We show that a variant
of the obvious sequential greedy algorithm [Pre99], that computes a weighted
matching at most a factor 2 away from the maximum, is easily distributed. This
yields the best known distributed approximation algorithm for this problem so
far.
| [
{
"version": "v1",
"created": "Tue, 19 Oct 2004 09:00:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hoepman",
"Jaap-Henk",
""
]
] |
cs/0410049 | Joseph Y. Halpern | Joseph Y. Halpern | Intransitivity and Vagueness | A preliminary version of this paper appears in Principles of
Knowledge Representation and Reasoning: Proceedings of the Ninth
International Conference (KR 2004) | null | null | null | cs.AI | null | There are many examples in the literature that suggest that
indistinguishability is intransitive, despite the fact that the
indistinguishability relation is typically taken to be an equivalence relation
(and thus transitive). It is shown that if the uncertainty perception and the
question of when an agent reports that two things are indistinguishable are
both carefully modeled, the problems disappear, and indistinguishability can
indeed be taken to be an equivalence relation. Moreover, this model also
suggests a logic of vagueness that seems to solve many of the problems related
to vagueness discussed in the philosophical literature. In particular, it is
shown here how the logic can handle the sorites paradox.
| [
{
"version": "v1",
"created": "Tue, 19 Oct 2004 17:31:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0410050 | Joseph Y. Halpern | Joseph Y. Halpern | Sleeping Beauty Reconsidered: Conditioning and Reflection in
Asynchronous Systems | A preliminary version of this paper appears in Principles of
Knowledge Representation and Reasoning: Proceedings of the Ninth
International Conference (KR 2004). This version will appear in Oxford
Studies in Epistemology | null | null | null | cs.AI | null | A careful analysis of conditioning in the Sleeping Beauty problem is done,
using the formal model for reasoning about knowledge and probability developed
by Halpern and Tuttle. While the Sleeping Beauty problem has been viewed as
revealing problems with conditioning in the presence of imperfect recall, the
analysis done here reveals that the problems are not so much due to imperfect
recall as to asynchrony. The implications of this analysis for van Fraassen's
Reflection Principle and Savage's Sure-Thing Principle are considered.
| [
{
"version": "v1",
"created": "Tue, 19 Oct 2004 17:31:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0410051 | Alex Vinokur | Alex Vinokur | Turing Machine with Faults, Failures and Recovery | 8 pages; C++ Simulator has been developed | null | null | null | cs.LO | null | A Turing machine with faults, failures and recovery (TMF) is described. TMF
is (weakly) non-deterministic Turing machine consisting of five semi-infinite
tapes (Master Tape, Synchro Tape, Backup Tape, Backup Synchro Tape, User Tape)
and four controlling components (Program, Daemon, Apparatus, User).
Computational process consists of three phases (Program Phase, Failure Phase,
Repair Phase). C++ Simulator of a Turing machine with faults, failures and
recovery has been developed.
| [
{
"version": "v1",
"created": "Wed, 20 Oct 2004 12:43:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vinokur",
"Alex",
""
]
] |
cs/0410052 | Joseph O'Rourke | Julie Glass, Stefan Langerman, Joseph O'Rourke, Jack Snoeyink,
Jianyuan K. Zhong | A 2-chain can interlock with a k-chain | 10 pages, 6 figures | null | null | null | cs.CG cs.DM | null | One of the open problems posed in [3] is: what is the minimal number k such
that an open, flexible k-chain can interlock with a flexible 2-chain? In this
paper, we establish the assumption behind this problem, that there is indeed
some k that achieves interlocking. We prove that a flexible 2-chain can
interlock with a flexible, open 16-chain.
| [
{
"version": "v1",
"created": "Wed, 20 Oct 2004 00:55:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Glass",
"Julie",
""
],
[
"Langerman",
"Stefan",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Snoeyink",
"Jack",
""
],
[
"Zhong",
"Jianyuan K.",
""
]
] |
cs/0410053 | Haibin Wang | Haibin Wang, Hao Tian, Rajshekhar Sunderraman | An Extended Generalized Disjunctive Paraconsistent Data Model for
Disjunctive Information | 10 pages | null | null | null | cs.DB | null | This paper presents an extension of generalized disjunctive paraconsistent
relational data model in which pure disjunctive positive and negative
information as well as mixed disjunctive positive and negative information can
be represented explicitly and manipulated. We consider explicit mixed
disjunctive information in the context of disjunctive databases as there is an
interesting interplay between these two types of information. Extended
generalized disjunctive paraconsistent relation is introduced as the main
structure in this model. The relational algebra is appropriately generalized to
work on extended generalized disjunctive paraconsistent relations and their
correctness is established.
| [
{
"version": "v1",
"created": "Wed, 20 Oct 2004 08:50:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Haibin",
""
],
[
"Tian",
"Hao",
""
],
[
"Sunderraman",
"Rajshekhar",
""
]
] |
cs/0410054 | Haibin Wang | Rajshekhar Sunderraman, Haibin Wang | Paraconsistent Intuitionistic Fuzzy Relational Data Model | 19 pages, 1 figure | null | null | null | cs.DB | null | In this paper, we present a generalization of the relational data model based
on paraconsistent intuitionistic fuzzy sets. Our data model is capable of
manipulating incomplete as well as inconsistent information. Fuzzy relation or
intuitionistic fuzzy relation can only handle incomplete information.
Associated with each relation are two membership functions one is called
truth-membership function $T$ which keeps track of the extent to which we
believe the tuple is in the relation, another is called false-membership
function which keeps track of the extent to which we believe that it is not in
the relation. A paraconsistent intuitionistic fuzzy relation is inconsistent if
there exists one tuple $a$ such that $T(a) + F(a) > 1$. In order to handle
inconsistent situation, we propose an operator called split to transform
inconsistent paraconsistent intuitionistic fuzzy relations into
pseudo-consistent paraconsistent intuitionistic fuzzy relations and do the
set-theoretic and relation-theoretic operations on them and finally use another
operator called combine to transform the result back to paraconsistent
intuitionistic fuzzy relation. For this model, we define algebraic operators
that are generalisations of the usual operators such as union, selection, join
on fuzzy relations. Our data model can underlie any database and knowledge-base
management system that deals with incomplete and inconsistent information.
| [
{
"version": "v1",
"created": "Wed, 20 Oct 2004 11:40:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sunderraman",
"Rajshekhar",
""
],
[
"Wang",
"Haibin",
""
]
] |
cs/0410055 | Michiel Hazewinkel | Michiel Hazewinkel | Mathematical knowledge management is needed | Keynote speech at the November, 2003 MKM meeting ar Herriott-Watt,
Edinburg, UK. Nine pages, one figure | null | null | null | cs.IR | null | In this lecture I discuss some aspects of MKM, Mathematical Knowledge
Management, with particuar emphasis on information storage and information
retrieval.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 2004 15:51:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hazewinkel",
"Michiel",
""
]
] |
cs/0410056 | Haibin Wang | Haibin Wang, Florentin Smarandache, Yanqing Zhang, Rajshekhar
Sunderraman | Interval Neutrosophic Logics: Theory and Applications | 18 pages, 4 figures | null | null | null | cs.LO | null | In this paper, we present the interval neutrosophic logics which generalizes
the fuzzy logic, paraconsistent logic, intuitionistic fuzzy logic and many
other non-classical and non-standard logics. We will give the formal definition
of interval neutrosophic propositional calculus and interval neutrosophic
predicate calculus. Then we give one application of interval neutrosophic
logics to do approximate reasoning.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 2004 20:24:28 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Nov 2004 20:18:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Haibin",
""
],
[
"Smarandache",
"Florentin",
""
],
[
"Zhang",
"Yanqing",
""
],
[
"Sunderraman",
"Rajshekhar",
""
]
] |
cs/0410057 | M. V. Panduranga Rao | M. V. Panduranga Rao | Generalized Counters and Reversal Complexity | 9 pages, no figures; Layout and content changed to some extent;
Conference version | pp.318-326, Proceedings of TAMC 2006, Beijing, China, Springer
LNCS, 3959 | null | null | cs.CC | null | We generalize the definition of a counter and counter reversal complexity and
investigate the power of generalized deterministic counter automata in terms of
language recognition.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 19:36:07 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jun 2006 19:37:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rao",
"M. V. Panduranga",
""
]
] |
cs/0410058 | Vincenzo Pallotta | Vincenzo Pallotta, Afzal Ballim | Robust Dialogue Understanding in HERALD | 6 pages | Proceedings of RANLP 2001 - EuroConference on Recent Advances in
Natural Language Processing, September 5-7, 2001, Tzigov-Chark, Bulgaria | null | null | cs.CL cs.AI cs.HC cs.MA cs.SE | null | We tackle the problem of robust dialogue processing from the perspective of
language engineering. We propose an agent-oriented architecture that allows us
a flexible way of composing robust processors. Our approach is based on
Shoham's Agent Oriented Programming (AOP) paradigm. We will show how the AOP
agent model can be enriched with special features and components that allow us
to deal with classical problems of dialogue understanding.
| [
{
"version": "v1",
"created": "Fri, 22 Oct 2004 23:41:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pallotta",
"Vincenzo",
""
],
[
"Ballim",
"Afzal",
""
]
] |
cs/0410059 | Vincenzo Pallotta | Afzal Ballim, Nastaran Fatemi, Hatem Ghorbel, Vincenzo Pallotta | A knowledge-based approach to semi-automatic annotation of multimedia
documents via user adaptation | 4 pages | First EAGLES/ISLE Workshop on Meta-Descriptions and Annotation
Schemas for Multimodal/Multimedia Language Resources (LREC 2000
Pre-Conference Workshop), 29-30 May 2000, Athens, Greece | null | null | cs.DL cs.CL cs.IR | null | Current approaches to the annotation process focus on annotation schemas,
languages for annotation, or are very application driven. In this paper it is
proposed that a more flexible architecture for annotation requires a knowledge
component to allow for flexible search and navigation of the annotated
material. In particular, it is claimed that a general approach must take into
account the needs, competencies, and goals of the producers, annotators, and
consumers of the annotated material. We propose that a user-model based
approach is, therefore, necessary.
| [
{
"version": "v1",
"created": "Sat, 23 Oct 2004 00:06:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ballim",
"Afzal",
""
],
[
"Fatemi",
"Nastaran",
""
],
[
"Ghorbel",
"Hatem",
""
],
[
"Pallotta",
"Vincenzo",
""
]
] |
cs/0410060 | Vincenzo Pallotta | Afzal Ballim, Vincenzo Pallotta | Semantic filtering by inference on domain knowledge in spoken dialogue
systems | 6 pages | Proceedings of the LREC 2000 Workshop "From spoken dialogue to
full natural interactive dialogue. Theory, empirical analysis and
evaluation", May 29th, 2000 Athen, Greece | null | null | cs.CL cs.AI cs.HC cs.IR | null | General natural dialogue processing requires large amounts of domain
knowledge as well as linguistic knowledge in order to ensure acceptable
coverage and understanding. There are several ways of integrating lexical
resources (e.g. dictionaries, thesauri) and knowledge bases or ontologies at
different levels of dialogue processing. We concentrate in this paper on how to
exploit domain knowledge for filtering interpretation hypotheses generated by a
robust semantic parser. We use domain knowledge to semantically constrain the
hypothesis space. Moreover, adding an inference mechanism allows us to complete
the interpretation when information is not explicitly available. Further, we
discuss briefly how this can be generalized towards a predictive natural
interactive system.
| [
{
"version": "v1",
"created": "Sat, 23 Oct 2004 00:20:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ballim",
"Afzal",
""
],
[
"Pallotta",
"Vincenzo",
""
]
] |
cs/0410061 | Vincenzo Pallotta | Vincenzo Pallotta, Hatem Ghorbel, Patrick Ruch, Giovanni Coray | An argumentative annotation schema for meeting discussions | 4 pages | Procedings of the LREC 2004 international conference, 26-28 May
2004, Lisbon, Portugal. Pages 1003-1006 | null | null | cs.CL cs.DL cs.IR | null | In this article, we are interested in the annotation of transcriptions of
human-human dialogue taken from meeting records. We first propose a meeting
content model where conversational acts are interpreted with respect to their
argumentative force and their role in building the argumentative structure of
the meeting discussion. Argumentation in dialogue describes the way
participants take part in the discussion and argue their standpoints. Then, we
propose an annotation scheme based on such an argumentative dialogue model as
well as the evaluation of its adequacy. The obtained higher-level semantic
annotations are exploited in the conceptual indexing of the information
contained in meeting discussions.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 01:38:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pallotta",
"Vincenzo",
""
],
[
"Ghorbel",
"Hatem",
""
],
[
"Ruch",
"Patrick",
""
],
[
"Coray",
"Giovanni",
""
]
] |
cs/0410062 | Vincenzo Pallotta | Lonneke van der Plas, Vincenzo Pallotta, Martin Rajman, Hatem Ghorbel | Automatic Keyword Extraction from Spoken Text. A Comparison of two
Lexical Resources: the EDR and WordNet | 4 pages | Procedings of the LREC 2004 international conference, 26-28 May
2004, Lisbon, Portugal. Pages 2205-2208 | null | null | cs.CL cs.DL cs.IR | null | Lexical resources such as WordNet and the EDR electronic dictionary have been
used in several NLP tasks. Probably, partly due to the fact that the EDR is not
freely available, WordNet has been used far more often than the EDR. We have
used both resources on the same task in order to make a comparison possible.
The task is automatic assignment of keywords to multi-party dialogue episodes
(i.e. thematically coherent stretches of spoken text). We show that the use of
lexical resources in such a task results in slightly higher performances than
the use of a purely statistically based method.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 01:50:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van der Plas",
"Lonneke",
""
],
[
"Pallotta",
"Vincenzo",
""
],
[
"Rajman",
"Martin",
""
],
[
"Ghorbel",
"Hatem",
""
]
] |
cs/0410063 | Vincenzo Pallotta | Sebastian Moeller, Jan Krebber, Alexander Raake, Paula Smeele, Martin
Rajman, Mirek Melichar, Vincenzo Pallotta, Gianna Tsakou, Basilis Kladis,
Anestis Vovos, Jettie Hoonhout, Dietmar Schuchardt, Nikos Fakotakis, Todor
Ganchev, Ilyas Potamitis | INSPIRE: Evaluation of a Smart-Home System for Infotainment Management
and Device Control | 4 pages | Procedings of the LREC 2004 international conference, 26-28 May
2004, Lisbon, Portugal. Pages 1603-1606 | null | null | cs.HC cs.CL | null | This paper gives an overview of the assessment and evaluation methods which
have been used to determine the quality of the INSPIRE smart home system. The
system allows different home appliances to be controlled via speech, and
consists of speech and speaker recognition, speech understanding, dialogue
management, and speech output components. The performance of these components
is first assessed individually, and then the entire system is evaluated in an
interaction experiment with test users. Initial results of the assessment and
evaluation are given, in particular with respect to the transmission channel
impact on speech and speaker recognition, and the assessment of speech output
for different system metaphors.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 02:17:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Moeller",
"Sebastian",
""
],
[
"Krebber",
"Jan",
""
],
[
"Raake",
"Alexander",
""
],
[
"Smeele",
"Paula",
""
],
[
"Rajman",
"Martin",
""
],
[
"Melichar",
"Mirek",
""
],
[
"Pallotta",
"Vincenzo",
""
],
[
"Tsakou",
"Gianna",
""
],
[
"Kladis",
"Basilis",
""
],
[
"Vovos",
"Anestis",
""
],
[
"Hoonhout",
"Jettie",
""
],
[
"Schuchardt",
"Dietmar",
""
],
[
"Fakotakis",
"Nikos",
""
],
[
"Ganchev",
"Todor",
""
],
[
"Potamitis",
"Ilyas",
""
]
] |
cs/0410064 | Joze Balic | J. Balic | Intelligent Computer Numerical Control unit for machine tools | 7 pages, 4 figures, 17 references | Neural-Network-Based Numerical Control for Milling Machine,
Journal of Intelligent and Robotic System, Volume 40, Issue 4, Aug 2004;
Pages: 343-358 (extended version) | null | null | cs.CE | null | The paper describes a new CNC control unit for machining centres with
learning ability and automatic intelligent generating of NC programs on the
bases of a neural network, which is built-in into a CNC unit as special device.
The device performs intelligent and completely automatically the NC part
programs only on the bases of 2D, 2,5D or 3D computer model of prismatic part.
Intervention of the operator is not needed. The neural network for milling,
drilling, reaming, threading and operations alike has learned to generate NC
programs in the learning module, which is a part of intelligent CAD/CAM system.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 15:55:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Balic",
"J.",
""
]
] |
cs/0410066 | Xiaoqin Ma | Xiaoqin Ma and Gene Cooperman | Fast Query Processing by Distributing an Index over CPU Caches | New version published at IEEE Cluster Computing 2005 | null | null | null | cs.DC cs.PF | null | Data intensive applications on clusters often require requests quickly be
sent to the node managing the desired data. In many applications, one must look
through a sorted tree structure to determine the responsible node for accessing
or storing the data.
Examples include object tracking in sensor networks, packet routing over the
internet, request processing in publish-subscribe middleware, and query
processing in database systems. When the tree structure is larger than the CPU
cache, the standard implementation potentially incurs many cache misses for
each lookup; one cache miss at each successive level of the tree. As the
CPU-RAM gap grows, this performance degradation will only become worse in the
future.
We propose a solution that takes advantage of the growing speed of local area
networks for clusters. We split the sorted tree structure among the nodes of
the cluster. We assume that the structure will fit inside the aggregation of
the CPU caches of the entire cluster. We then send a word over the network (as
part of a larger packet containing other words) in order to examine the tree
structure in another node's CPU cache. We show that this is often faster than
the standard solution, which locally incurs multiple cache misses while
accessing each successive level of the tree.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 22:23:17 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Oct 2005 15:42:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ma",
"Xiaoqin",
""
],
[
"Cooperman",
"Gene",
""
]
] |
cs/0410067 | Richard Troy III | Richard M. Troy III | Computational Unification: a Vision for Connecting Researchers | Three page white-paper which was written for the December 2002 AGU
meeting in San Francisco, CA. Also note that the author is Chief Scientist of
Science Tools and developed a working system capable of implementing the
ideas expressed in this abstract in 1997 | null | null | null | cs.DC cs.CY | null | The extent to which the benefits of science can be fully realized depends
critically upon the quality of the connection between researchers themselves
and between researchers and members of the public. We believe that it is now
possible to improve these connections on a community-wide and even world-wide
basis through the use of an appropriate information management system. In this
paper we explore the concepts and challenges, and propose an architecture for
the implementation of such a system.
"One of the greatest visions for science is a computational unification in
which every researcher can interact with all other researchers through use of
their own research system."
"These features not only enable research collaboration on a scale never
previously envisaged, they also enable sharing and dissemination of scientific
knowledge to the public at large with a sophistication unparalleled in
history."
| [
{
"version": "v1",
"created": "Tue, 26 Oct 2004 18:21:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Troy",
"Richard M.",
"III"
]
] |
cs/0410068 | Zhuowei Li | Zhuowei Li and Amitabha Das | Analyzing and Improving Performance of a Class of Anomaly-based
Intrusion Detectors | Submit to journal for publication | null | null | cais-tr-2004-001 | cs.CR cs.AI | null | Anomaly-based intrusion detection (AID) techniques are useful for detecting
novel intrusions into computing resources. One of the most successful AID
detectors proposed to date is stide, which is based on analysis of system call
sequences. In this paper, we present a detailed formal framework to analyze,
understand and improve the performance of stide and similar AID techniques.
Several important properties of stide-like detectors are established through
formal proofs, and validated by carefully conducted experiments using test
datasets. Finally, the framework is utilized to design two applications to
improve the cost and performance of stide-like detectors which are based on
sequence analysis. The first application reduces the cost of developing AID
detectors by identifying the critical sections in the training dataset, and the
second application identifies the intrusion context in the intrusive dataset,
that helps to fine-tune the detectors. Such fine-tuning in turn helps to
improve detection rate and reduce false alarm rate, thereby increasing the
effectiveness and efficiency of the intrusion detectors.
| [
{
"version": "v1",
"created": "Tue, 26 Oct 2004 02:57:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Zhuowei",
""
],
[
"Das",
"Amitabha",
""
]
] |
cs/0410069 | Thomas Petermann | Jacomo Corbo and Thomas Petermann | Selfish peering and routing in the Internet | Contribution to the Proceedings of the Complex Systems Summer School
2004, organized by the Santa Fe Institute (6 pages comprising 4 figures) | null | null | null | cs.GT cond-mat.stat-mech cs.NI | null | The Internet is a loose amalgamation of independent service providers acting
in their own self-interest. We examine the implications of this economic
reality on peering relationships. Specifically, we consider how the incentives
of the providers might determine where they choose to interconnect with each
other. We consider a game where two selfish network providers must establish
peering points between their respective network graphs, given knowledge of
traffic conditions and a nearest-exit routing policy for out-going traffic, as
well as costs based on congestion and peering connectivity. We focus on the
pairwise stability equilibrium concept and use a stochastic procedure to solve
for the stochastically pairwise stable configurations. Stochastically stable
networks are selected for their robustness to deviations in strategy and are
therefore posited as the more likely networks to emerge in a dynamic setting.
We note a paucity of stochastically stable peering configurations under
asymmetric conditions, particularly to unequal interdomain traffic flow, with
adverse effects on system-wide efficiency. Under bilateral flow conditions, we
find that as the cost associated with the establishment of peering links
approaches zero, the variance in the number of peering links of stochastically
pairwise stable equilibria increases dramatically.
| [
{
"version": "v1",
"created": "Tue, 26 Oct 2004 10:14:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Corbo",
"Jacomo",
""
],
[
"Petermann",
"Thomas",
""
]
] |
cs/0410070 | Giovanni Gasparri | Giovanni Gasparri | Using image partitions in 4th Dimension | 4 pages, 3 figures | null | null | null | cs.DB | null | I have plotted an image by using mathematical functions in the Database "4th
Dimension". I'm going to show an alternative method to: detect which sector has
been clicked; highlight it and combine it with other sectors already
highlighted; store the graph information in an efficient way; load and splat
image layers to reconstruct the stored graph.
| [
{
"version": "v1",
"created": "Tue, 26 Oct 2004 17:00:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gasparri",
"Giovanni",
""
]
] |
cs/0410071 | Patrick C. McGuire | Patrick C. McGuire, Jens Ormo, Enrique Diaz-Martinez, Jose Antonio
Rodriguez-Manfredi, Javier Gomez-Elvira, Helge Ritter, Markus Oesker, Joerg
Ontrup, (Centro de Astrobiologia, Madrid; University of Bielefeld) | The Cyborg Astrobiologist: First Field Experience | 29 pages, 10 figures (in press) | Int.J.Astrobiol. 3 (2004) 189-207 | 10.1017/S147355040500220X | null | cs.CV astro-ph cs.AI cs.CE cs.HC cs.RO cs.SE q-bio.NC | null | We present results from the first geological field tests of the `Cyborg
Astrobiologist', which is a wearable computer and video camcorder system that
we are using to test and train a computer-vision system towards having some of
the autonomous decision-making capabilities of a field-geologist and
field-astrobiologist. The Cyborg Astrobiologist platform has thus far been used
for testing and development of these algorithms and systems: robotic
acquisition of quasi-mosaics of images, real-time image segmentation, and
real-time determination of interesting points in the image mosaics. The
hardware and software systems function reliably, and the computer-vision
algorithms are adequate for the first field tests. In addition to the
proof-of-concept aspect of these field tests, the main result of these field
tests is the enumeration of those issues that we can improve in the future,
including: first, detection and accounting for shadows caused by 3D jagged
edges in the outcrop; second, reincorporation of more sophisticated
texture-analysis algorithms into the system; third, creation of hardware and
software capabilities to control the camera's zoom lens in an intelligent
manner; and fourth, development of algorithms for interpretation of complex
geological scenery. Nonetheless, despite these technical inadequacies, this
Cyborg Astrobiologist system, consisting of a camera-equipped wearable-computer
and its computer-vision algorithms, has demonstrated its ability of finding
genuinely interesting points in real-time in the geological scenery, and then
gathering more information about these interest points in an automated manner.
| [
{
"version": "v1",
"created": "Wed, 27 Oct 2004 09:14:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McGuire",
"Patrick C.",
""
],
[
"Ormo",
"Jens",
""
],
[
"Diaz-Martinez",
"Enrique",
""
],
[
"Rodriguez-Manfredi",
"Jose Antonio",
""
],
[
"Gomez-Elvira",
"Javier",
""
],
[
"Ritter",
"Helge",
""
],
[
"Oesker",
"Markus",
""
],
[
"Ontrup",
"Joerg",
""
]
] |
cs/0410072 | Igor Potapov | Alexei Lisitsa, Igor Potapov | Temporal logic with predicate abstraction | 14 pages, 4 figures | null | null | null | cs.LO cs.CL | null | A predicate linear temporal logic LTL_{\lambda,=} without quantifiers but
with predicate abstraction mechanism and equality is considered. The models of
LTL_{\lambda,=} can be naturally seen as the systems of pebbles (flexible
constants) moving over the elements of some (possibly infinite) domain. This
allows to use LTL_{\lambda,=} for the specification of dynamic systems using
some resources, such as processes using memory locations, mobile agents
occupying some sites, etc. On the other hand we show that LTL_{\lambda,=} is
not recursively axiomatizable and, therefore, fully automated verification of
LTL_{\lambda,=} specifications is not, in general, possible.
| [
{
"version": "v1",
"created": "Wed, 27 Oct 2004 17:21:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lisitsa",
"Alexei",
""
],
[
"Potapov",
"Igor",
""
]
] |
cs/0410073 | Viktor Kuncak | Viktor Kuncak, Martin Rinard | On Spatial Conjunction as Second-Order Logic | 16 pages | null | null | MIT CSAIL 970 | cs.LO cs.PL cs.SE | null | Spatial conjunction is a powerful construct for reasoning about dynamically
allocated data structures, as well as concurrent, distributed and mobile
computation. While researchers have identified many uses of spatial
conjunction, its precise expressive power compared to traditional logical
constructs was not previously known. In this paper we establish the expressive
power of spatial conjunction. We construct an embedding from first-order logic
with spatial conjunction into second-order logic, and more surprisingly, an
embedding from full second order logic into first-order logic with spatial
conjunction. These embeddings show that the satisfiability of formulas in
first-order logic with spatial conjunction is equivalent to the satisfiability
of formulas in second-order logic. These results explain the great expressive
power of spatial conjunction and can be used to show that adding unrestricted
spatial conjunction to a decidable logic leads to an undecidable logic. As one
example, we show that adding unrestricted spatial conjunction to two-variable
logic leads to undecidability. On the side of decidability, the embedding into
second-order logic immediately implies the decidability of first-order logic
with a form of spatial conjunction over trees. The embedding into spatial
conjunction also has useful consequences: because a restricted form of spatial
conjunction in two-variable logic preserves decidability, we obtain that a
correspondingly restricted form of second-order quantification in two-variable
logic is decidable. The resulting language generalizes the first-order theory
of boolean algebra over sets and is useful in reasoning about the contents of
data structures in object-oriented languages.
| [
{
"version": "v1",
"created": "Thu, 28 Oct 2004 15:00:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuncak",
"Viktor",
""
],
[
"Rinard",
"Martin",
""
]
] |
cs/0410075 | Serban E. Vlad | Serban E. Vlad | Some first thoughts on the stability of the asynchronous systems | 12 pages, conference | The 12-th Conference on Applied and Industrial Mathematics CAIM
2004, University of Pitesti, October 15-17, 2004 | null | null | cs.GL | null | The (non-initialized, non-deterministic) asynchronous systems (in the
input-output sense) are multi-valued functions from m-dimensional signals to
sets of n-dimensional signals, the concept being inspired by the modeling of
the asynchronous circuits. Our purpose is to state the problem of the their
stability.
| [
{
"version": "v1",
"created": "Fri, 29 Oct 2004 12:08:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] |
cs/0411001 | Worytkiewicz Krzysztof | Krzysztof Worytkiewicz | Synchronization from a Categorical Perspective | null | null | null | null | cs.PL cs.DM | null | We introduce a notion of synchronization for higher-dimensional automata,
based on coskeletons of cubical sets. Categorification transports this notion
to the setting of categorical transition systems. We apply the results to study
the semantics of an imperative programming language with message-passing.
| [
{
"version": "v1",
"created": "Mon, 1 Nov 2004 16:00:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Worytkiewicz",
"Krzysztof",
""
]
] |
cs/0411002 | Alex Vinokur | Alex Vinokur | Fibonacci-Like Polynomials Produced by m-ary Huffman Codes for
Absolutely Ordered Sequences | 10 pages, 2 tables | null | null | null | cs.DM math.NT | null | Fibonacci-like polynomials produced by m-ary Huffman codes for absolutely
ordered sequences have been described.
| [
{
"version": "v1",
"created": "Mon, 1 Nov 2004 17:03:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vinokur",
"Alex",
""
]
] |
cs/0411004 | Gianluca Argentini | Gianluca Argentini | Computational Aspects of a Numerical Model for Combustion Flow | 9 pages, 4 figures; Talk at Workshop 2004 on Science and Applications
of Advanced Computing Paradigms, Centre of Excellence MIUR (prof. Gianfranco
Bilardi), Universita' di Padova, Department of Information Engineering,
October 28-29, 2004 | null | null | null | cs.NA physics.comp-ph | null | A computational method for numeric resolution of a PDEs system, based on a
Finite Differences schema integrated by interpolations of partial results, and
an estimate of the error of its solution respect to the normal FD solution.
| [
{
"version": "v1",
"created": "Tue, 2 Nov 2004 11:37:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0411005 | Manoj Kumar | Sunder Lal and Manoj Kumar | A Directed Threshold - Signature Scheme | 10 Pages, No figures | null | null | null | cs.CR | null | Directed signature is the solution of such problems when the signed message
contains information sensitive to the signature receiver. Generally, in many
application of directed signature, the signer is generally a single person. But
when the message is on behalf of an organization, a valid sensitive message may
require the approval of several people. Threshold signature schemes are used to
solve these problems. This paper presents a threshold directed signature
scheme.
| [
{
"version": "v1",
"created": "Tue, 2 Nov 2004 13:42:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
] |
cs/0411007 | Benoit Masson | Julien Cervelle (IGM), Enrico Formenti (I3S), Benoit Masson (I3S) | Basic properties for sand automata | submitted to STACS 2005 | null | null | null | cs.CC | null | We prove several results about the relations between injectivity and
surjectivity for sand automata. Moreover, we begin the exploration of the
dynamical behavior of sand automata proving that the property of nilpotency is
undecidable. We believe that the proof technique used for this last result
might reveal useful for many other results in this context.
| [
{
"version": "v1",
"created": "Thu, 4 Nov 2004 12:33:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cervelle",
"Julien",
"",
"IGM"
],
[
"Formenti",
"Enrico",
"",
"I3S"
],
[
"Masson",
"Benoit",
"",
"I3S"
]
] |
cs/0411009 | Serban Vlad E. | Serban E. Vlad | The equations of the ideal latches | 16 pages, 18 figures, conference | The 12-th Conference on Applied and Industrial Mathematics CAIM
2004, University of Pitesti, October 15-17, 2004 | null | null | cs.GL | null | The latches are simple circuits with feedback from the digital electrical
engineering. We have included in our work the C element of Muller, the RS
latch, the clocked RS latch, the D latch and also circuits containing two
interconnected latches: the edge triggered RS flip-flop, the D flip-flop, the
JK flip-flop, the T flip-flop. The purpose of this study is to model with
equations the previous circuits, considered to be ideal, i.e. non-inertial. The
technique of analysis is the pseudoboolean differential calculus.
| [
{
"version": "v1",
"created": "Fri, 5 Nov 2004 12:38:05 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Nov 2004 07:17:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] |
cs/0411010 | Ricardo Corin | Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter Hartel | A Trace Logic for Local Security Properties | New version | null | null | null | cs.CR | null | We propose a new simple \emph{trace} logic that can be used to specify
\emph{local security properties}, i.e. security properties that refer to a
single participant of the protocol specification. Our technique allows a
protocol designer to provide a formal specification of the desired security
properties, and integrate it naturally into the design process of cryptographic
protocols. Furthermore, the logic can be used for formal verification. We
illustrate the utility of our technique by exposing new attacks on the well
studied protocol TMN.
| [
{
"version": "v1",
"created": "Fri, 5 Nov 2004 14:39:03 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Nov 2004 17:36:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Corin",
"Ricardo",
""
],
[
"Durante",
"Antonio",
""
],
[
"Etalle",
"Sandro",
""
],
[
"Hartel",
"Pieter",
""
]
] |
cs/0411013 | Timur Friedman | Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella | Efficient Algorithms for Large-Scale Topology Discovery | 23 pages | null | null | null | cs.NI | null | There is a growing interest in discovery of internet topology at the
interface level. A new generation of highly distributed measurement systems is
currently being deployed. Unfortunately, the research community has not
examined the problem of how to perform such measurements efficiently and in a
network-friendly manner. In this paper we make two contributions toward that
end. First, we show that standard topology discovery methods (e.g., skitter)
are quite inefficient, repeatedly probing the same interfaces. This is a
concern, because when scaled up, such methods will generate so much traffic
that they will begin to resemble DDoS attacks. We measure two kinds of
redundancy in probing (intra- and inter-monitor) and show that both kinds are
important. We show that straightforward approaches to addressing these two
kinds of redundancy must take opposite tacks, and are thus fundamentally in
conflict. Our second contribution is to propose and evaluate Doubletree, an
algorithm that reduces both types of redundancy simultaneously on routers and
end systems. The key ideas are to exploit the tree-like structure of routes to
and from a single point in order to guide when to stop probing, and to probe
each path by starting near its midpoint. Our results show that Doubletree can
reduce both types of measurement load on the network dramatically, while
permitting discovery of nearly the same set of nodes and links. We then show
how to enable efficient communication between monitors through the use of Bloom
filters.
| [
{
"version": "v1",
"created": "Sun, 7 Nov 2004 21:39:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Donnet",
"Benoit",
""
],
[
"Raoult",
"Philippe",
""
],
[
"Friedman",
"Timur",
""
],
[
"Crovella",
"Mark",
""
]
] |
cs/0411015 | Ziny Flikop | Ziny Flikop | Bounded Input Bounded Predefined Control Bounded Output | 8 pages, 6 figures | null | null | null | cs.AI | null | The paper is an attempt to generalize a methodology, which is similar to the
bounded-input bounded-output method currently widely used for the system
stability studies. The presented earlier methodology allows decomposition of
input space into bounded subspaces and defining for each subspace its bounding
surface. It also defines a corresponding predefined control, which maps any
point of a bounded input into a desired bounded output subspace. This
methodology was improved by providing a mechanism for the fast defining a
bounded surface. This paper presents enhanced bounded-input
bounded-predefined-control bounded-output approach, which provides adaptability
feature to the control and allows transferring of a controlled system along a
suboptimal trajectory.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 01:52:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Flikop",
"Ziny",
""
]
] |
cs/0411017 | Srikant Sharma | Srikant Sharma | Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective | null | null | null | null | cs.NI | null | Wireless LANs have achieved a tremendous amount of growth in recent years.
Among various wireless LAN technologies, the IEEE 802.11b based wireless LAN
technology can be cited as the most prominent technology today. Despite being
widely deployed, 802.11b cannot be termed as a well matured technology.
Although 802.11b is adequate for basic connectivity and packet switching, It is
evident that there is ample scope for its improvement in areas like quality of
service, fairness, performance, security, etc. In this survey report, we
identify and argue that the Medium Access Controller for 802.11b networks is
the prime area for these improvements. To enunciate our claims we highlight
some of the quality of service, fairness, and performance issues related to
802.11b MAC. We also describe and analyze some of the current research aimed at
addressing these issues. We then propose a novel scheme called the Intelligent
Collision Avoidance, seeking to enhance the MAC to address some of the
performance issues in 802.11b and similar networks.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 19:32:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sharma",
"Srikant",
""
]
] |
cs/0411018 | Vedran Kordic | Pedro U. Lima & Luis M. M. Custodio | Artificial Intelligence and Systems Theory: Applied to Cooperative
Robots | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 September 2004, pp.141-148 | null | null | cs.RO cs.AI | null | This paper describes an approach to the design of a population of cooperative
robots based on concepts borrowed from Systems Theory and Artificial
Intelligence. The research has been developed under the SocRob project, carried
out by the Intelligent Systems Laboratory at the Institute for Systems and
Robotics - Instituto Superior Tecnico (ISR/IST) in Lisbon. The acronym of the
project stands both for "Society of Robots" and "Soccer Robots", the case study
where we are testing our population of robots. Designing soccer robots is a
very challenging problem, where the robots must act not only to shoot a ball
towards the goal, but also to detect and avoid static (walls, stopped robots)
and dynamic (moving robots) obstacles. Furthermore, they must cooperate to
defeat an opposing team. Our past and current research in soccer robotics
includes cooperative sensor fusion for world modeling, object recognition and
tracking, robot navigation, multi-robot distributed task planning and
coordination, including cooperative reinforcement learning in cooperative and
adversarial environments, and behavior-based architectures for real time task
execution of cooperating robot teams.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:41:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lima",
"Pedro U.",
""
],
[
"Custodio",
"Luis M. M.",
""
]
] |
cs/0411020 | Vedran Kordic | A. Albagul and Wahyudi | Dynamic Modelling and Adaptive Traction Control for Mobile Robots | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 3, September 2004, pp.149-154 | null | null | cs.RO | null | Mobile robots have received a great deal of research in recent years. A
significant amount of research has been published in many aspects related to
mobile robots. Most of the research is devoted to design and develop some
control techniques for robot motion and path planning. A large number of
researchers have used kinematic models to develop motion control strategy for
mobile robots. Their argument and assumption that these models are valid if the
robot has low speed, low acceleration and light load. However, dynamic
modelling of mobile robots is very important as they are designed to travel at
higher speed and perform heavy duty work. This paper presents and discusses a
new approach to develop a dynamic model and control strategy for wheeled mobile
robot which I modelled as a rigid body that roles on two wheels and a castor.
The motion control strategy consists of two levels. The first level is dealing
with the dynamic of the system and denoted as Low level controller. The second
level is developed to take care of path planning and trajectory generation.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:44:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Albagul",
"A.",
""
],
[
"Wahyudi",
"",
""
]
] |
cs/0411021 | Vedran Kordic | Luo Ronghua & Hong Bingrong | Coevolution Based Adaptive Monte Carlo Localization (CEAMCL) | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 3, September 2004, pp. 183-190 | null | null | cs.RO | null | An adaptive Monte Carlo localization algorithm based on coevolution mechanism
of ecological species is proposed. Samples are clustered into species, each of
which represents a hypothesis of the robots pose. Since the coevolution between
the species ensures that the multiple distinct hypotheses can be tracked
stably, the problem of premature convergence when using MCL in highly symmetric
environments can be solved. And the sample size can be adjusted adaptively over
time according to the uncertainty of the robots pose by using the population
growth model. In addition, by using the crossover and mutation operators in
evolutionary computation, intra-species evolution can drive the samples move
towards the regions where the desired posterior density is large. So a small
size of samples can represent the desired density well enough to make precise
localization. The new algorithm is termed coevolution based adaptive Monte
Carlo localization (CEAMCL). Experiments have been carried out to prove the
efficiency of the new localization algorithm.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:45:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ronghua",
"Luo",
""
],
[
"Bingrong",
"Hong",
""
]
] |
cs/0411022 | Vedran Kordic | Richard Szabo | Topological Navigation of Simulated Robots using Occupancy Grid | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 (2004), pp.201-206 | null | null | cs.RO cs.AI | null | Formerly I presented a metric navigation method in the Webots mobile robot
simulator. The navigating Khepera-like robot builds an occupancy grid of the
environment and explores the square-shaped room around with a value iteration
algorithm. Now I created a topological navigation procedure based on the
occupancy grid process. The extension by a skeletonization algorithm results a
graph of important places and the connecting routes among them. I also show the
significant time profit gained during the process.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:22:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szabo",
"Richard",
""
]
] |
cs/0411023 | Vedran Kordic | Changda Wang, Xianyi Chen, Xibin Zhao & Shiguang Ju | Design and Implementation of a General Decision-making Model in RoboCup
Simulation | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 (2004), pp.207-112 | null | null | cs.RO | null | The study of the collaboration, coordination and negotiation among different
agents in a multi-agent system (MAS) has always been the most challenging yet
popular in the research of distributed artificial intelligence. In this paper,
we will suggest for RoboCup simulation, a typical MAS, a general
decision-making model, rather than define a different algorithm for each tactic
(e.g. ball handling, pass, shoot and interception, etc.) in soccer games as
most RoboCup simulation teams did. The general decision-making model is based
on two critical factors in soccer games: the vertical distance to the goal line
and the visual angle for the goalpost. We have used these two parameters to
formalize the defensive and offensive decisions in RoboCup simulation and the
results mentioned above had been applied in NOVAURO, original name is UJDB, a
RoboCup simulation team of Jiangsu University, whose decision-making model,
compared with that of Tsinghua University, the world champion team in 2001, is
a universal model and easier to be implemented.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:24:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Changda",
""
],
[
"Chen",
"Xianyi",
""
],
[
"Zhao",
"Xibin",
""
],
[
"Ju",
"Shiguang",
""
]
] |
cs/0411024 | Vedran Kordic | Alex Ellery | Space Robotics Part 2: Space-based Manipulators | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 (2004), pp.213-216 | null | null | cs.RO | null | In this second of three short papers, I introduce some of the basic concepts
of space robotics with an emphasis on some specific challenging areas of
research that are peculiar to the application of robotics to space
infrastructure development. The style of these short papers is pedagogical and
the concepts in this paper are developed from fundamental manipulator robotics.
This second paper considers the application of space manipulators to on-orbit
servicing (OOS), an application which has considerable commercial application.
I provide some background to the notion of robotic on-orbit servicing and
explore how manipulator control algorithms may be modified to accommodate space
manipulators which operate in the micro-gravity of space.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:28:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ellery",
"Alex",
""
]
] |
cs/0411025 | Vedran Kordic | Yoseph Bar-Cohen | Bionic Humans Using EAP as Artificial Muscles Reality and Challenges | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 (2004), pp.217-222 | null | null | cs.RO cs.AI | null | For many years, the idea of a human with bionic muscles immediately conjures
up science fiction images of a TV series superhuman character that was
implanted with bionic muscles and portrayed with strength and speed far
superior to any normal human. As fantastic as this idea may seem, recent
developments in electroactive polymers (EAP) may one day make such bionics
possible. Polymers that exhibit large displacement in response to stimulation
that is other than electrical signal were known for many years. Initially, EAP
received relatively little attention due to their limited actuation capability.
However, in the recent years, the view of the EAP materials has changed due to
the introduction of effective new materials that significantly surpassed the
capability of the widely used piezoelectric polymer, PVDF. As this technology
continues to evolve, novel mechanisms that are biologically inspired are
expected to emerge. EAP materials can potentially provide actuation with
lifelike response and more flexible configurations. While further improvements
in performance and robustness are still needed, there already have been several
reported successes. In recognition of the need for cooperation in this
multidisciplinary field, the author initiated and organized a series of
international forums that are leading to a growing number of research and
development projects and to great advances in the field. In 1999, he challenged
the worldwide science and engineering community of EAP experts to develop a
robotic arm that is actuated by artificial muscles to win a wrestling match
against a human opponent. In this paper, the field of EAP as artificial muscles
will be reviewed covering the state of the art, the challenges and the vision
for the progress in future years.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:32:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bar-Cohen",
"Yoseph",
""
]
] |
cs/0411026 | Boris Tylevich | Boris Mark Tylevich (Moscow Institute of Physics and Technology,
Moscow, Russia) | A Search Relevancy Tuning Method Using Expert Results Content Evaluation | 10 pages, 2 figures | null | null | null | cs.IR | null | The article presents an online relevancy tuning method using explicit user
feedback. The author developed and tested a method of words' weights
modification based on search result evaluation by user. User decides whether
the result is useful or not after inspecting the full result content. The
experiment proved that the constantly accumulated words weights base leads to
better search quality in a specified data domain. The author also suggested
future improvements of the method.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:49:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tylevich",
"Boris Mark",
"",
"Moscow Institute of Physics and Technology,\n Moscow, Russia"
]
] |
cs/0411027 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN) | Extremal Properties of Three Dimensional Sensor Networks with
Applications | null | IEEE Transactions on Mobile Computing Vol 3 (2004) pages 246--257 | null | null | cs.DS cs.DC cs.DM | null | In this paper, we analyze various critical transmitting/sensing ranges for
connectivity and coverage in three-dimensional sensor networks. As in other
large-scale complex systems, many global parameters of sensor networks undergo
phase transitions: For a given property of the network, there is a critical
threshold, corresponding to the minimum amount of the communication effort or
power expenditure by individual nodes, above (resp. below) which the property
exists with high (resp. a low) probability. For sensor networks, properties of
interest include simple and multiple degrees of connectivity/coverage. First,
we investigate the network topology according to the region of deployment, the
number of deployed sensors and their transmitting/sensing ranges. More
specifically, we consider the following problems: Assume that $n$ nodes, each
capable of sensing events within a radius of $r$, are randomly and uniformly
distributed in a 3-dimensional region $\mathcal{R}$ of volume $V$, how large
must the sensing range be to ensure a given degree of coverage of the region to
monitor? For a given transmission range, what is the minimum (resp. maximum)
degree of the network? What is then the typical hop-diameter of the underlying
network? Next, we show how these results affect algorithmic aspects of the
network by designing specific distributed protocols for sensor networks.
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 09:10:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
] |
cs/0411028 | Ignatios Souvatzis | Ignatios Souvatzis | A machine-independent port of the SR language run-time system to the
NetBSD operating system | presented at 3rd European BSD Conference, Karlsruhe, Germany, 2004
Oct. 29-31; 4 pages | Juergen Egeling (Ed.): Proceedings of the 3rd European BSD
Conference, Karlsruhe, Germany 2004, p.181 | null | null | cs.DC cs.PL | null | SR (synchronizing resources) is a PASCAL - style language enhanced with
constructs for concurrent programming developed at the University of Arizona in
the late 1980s. MPD (presented in Gregory Andrews' book about Foundations of
Multithreaded, Parallel, and Distributed Programming) is its successor,
providing the same language primitives with a different syntax. The run-time
system (in theory, identical) of both languages provides the illusion of a
multiprocessor machine on a single single- or multi- CPU Unix-like system or a
(local area) network of Unix-like machines. Chair V of the Computer Science
Department of the University of Bonn is operating a laboratory for a practical
course in parallel programming consisting of computing nodes running
NetBSD/arm, normally used via PVM, MPI etc. We are considering to offer SR and
MPD for this, too. As the original language distributions are only targeted at
a few commercial Unix systems, some porting effort is needed, outlined in the
SR porting guide. The integrated POSIX threads support of NetBSD-2.0 should
allow us to use library primitives provided for NetBSD's phtread system to
implement the primitives needed by the SR run-time system, thus implementing 13
target CPUs at once and automatically making use of SMP on VAX, Alpha, PowerPC,
Sparc, 32-bit Intel and 64 bit AMD CPUs.
This paper describes work in progress.
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 12:39:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Souvatzis",
"Ignatios",
""
]
] |
cs/0411029 | Virgile Mogbil | Christophe Fouquere and Virgile Mogbil | Modules and Logic Programming | null | null | null | null | cs.LO | null | We study conditions for a concurrent construction of proof-nets in the
framework developed by Andreoli in recent papers. We define specific
correctness criteria for that purpose. We first study closed modules (i.e.
validity of the execution of a logic program), then extend the criterion to
open modules (i.e. validity during the execution) distinguishing criteria for
acyclicity and connectability in order to allow incremental verification.
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 14:01:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fouquere",
"Christophe",
""
],
[
"Mogbil",
"Virgile",
""
]
] |
cs/0411030 | Paolo D'Arco | Pina Bergamo, Paolo D'Arco, Alfredo De Santis, and Ljupco Kocarev | Security of public key cryptosystems based on Chebyshev Polynomials | Submitted for publication | null | null | null | cs.CR | null | Chebyshev polynomials have been recently proposed for designing public-key
systems. Indeed, they enjoy some nice chaotic properties, which seem to be
suitable for use in Cryptography. Moreover, they satisfy a semi-group property,
which makes possible implementing a trapdoor mechanism. In this paper we study
a public key cryptosystem based on such polynomials, which provides both
encryption and digital signature. The cryptosystem works on real numbers and is
quite efficient. Unfortunately, from our analysis it comes up that it is not
secure. We describe an attack which permits to recover the corresponding
plaintext from a given ciphertext. The same attack can be applied to produce
forgeries if the cryptosystem is used for signing messages. Then, we point out
that also other primitives, a Diffie-Hellman like key agreement scheme and an
authentication scheme, designed along the same lines of the cryptosystem, are
not secure due to the aforementioned attack. We close the paper by discussing
the issues and the possibilities of constructing public key cryptosystems on
real numbers.
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 15:29:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bergamo",
"Pina",
""
],
[
"D'Arco",
"Paolo",
""
],
[
"De Santis",
"Alfredo",
""
],
[
"Kocarev",
"Ljupco",
""
]
] |
cs/0411032 | Riccardo Pucella | Riccardo Pucella | Logic Column 10: Specifying Confidentiality | 12 pages | SIGACT News, 35(4), pp. 72-83, 2004 | null | null | cs.LO | null | This article illustrates the use of a logical specification language to
capture various forms of confidentiality properties used in the security
literature.
| [
{
"version": "v1",
"created": "Thu, 11 Nov 2004 19:09:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
] |
cs/0411033 | Mircea Alexandru Popescu Moscu | Mircea Alexandru Popescu Moscu | On Invariance and Convergence in Time Complexity theory | null | null | null | null | cs.CC | null | This article introduces three invariance principles under which P is
different from NP. In the second part a theorem of convergence is proven. This
theorem states that for any language L there exists an infinite sequence of
languages from O(n) that converges to L.
| [
{
"version": "v1",
"created": "Thu, 11 Nov 2004 21:32:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Moscu",
"Mircea Alexandru Popescu",
""
]
] |
cs/0411035 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | A FP-Tree Based Approach for Mining All Strongly Correlated Pairs
without Candidate Generation | null | null | null | TR-04-06 | cs.DB cs.AI | null | Given a user-specified minimum correlation threshold and a transaction
database, the problem of mining all-strong correlated pairs is to find all item
pairs with Pearson's correlation coefficients above the threshold . Despite the
use of upper bound based pruning technique in the Taper algorithm [1], when the
number of items and transactions are very large, candidate pair generation and
test is still costly. To avoid the costly test of a large number of candidate
pairs, in this paper, we propose an efficient algorithm, called Tcp, based on
the well-known FP-tree data structure, for mining the complete set of
all-strong correlated item pairs. Our experimental results on both synthetic
and real world datasets show that, Tcp's performance is significantly better
than that of the previously developed Taper algorithm over practical ranges of
correlation threshold specifications.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 12:02:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
cs/0411037 | Tetsushi Matsui | Tetsushi Matsui | A Note on Bulk Quantum Turing Machine | 8 pages | null | null | null | cs.CC | null | Recently, among experiments for realization of quantum computers, NMR quantum
computers have achieved the most impressive succession. There is a model of the
NMR quantum computation,namely Atsumi and Nishino's bulk quantum Turing
Machine. It assumes, however, an unnatural assumption with quantum mechanics.
We, then, define a more natural and quantum mechanically realizable modified
bulk quantum Turing Machine, and show its computational ability by comparing
complexity classes with quantum Turing Machine's counter part.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 18:56:15 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Nov 2004 01:01:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Matsui",
"Tetsushi",
""
]
] |
cs/0411038 | Shajee Mohan B. S. | B.S. Shajeemohan | Impact of IT on Higher education Through Continuing Education | null | null | null | null | cs.CY | null | Information Technology is emerging to be the technology of 21st century. The
paradigm shift from industrial society to information society had already
become a reality! It is indeed high time to think about integrating IT in all
facets of education -- may it be in secondary level, or be it in reskilling the
employed ones. This paper discusses various issues in incorporating IT in
various levels of education, and the need to think about a task force to
counter the so-called slow down and recession in IT industry. The opportunities
for aspiring IT professionals were also discussed. The importance of reskilling
as a continuing education programme to make the people aware of the changing
trends in IT was also discussed.
| [
{
"version": "v1",
"created": "Mon, 15 Nov 2004 09:45:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shajeemohan",
"B. S.",
""
]
] |
cs/0411039 | Ioan Raicu | Ioan Raicu, Owen Richter, Loren Schwiebert, Sherali Zeadally | Using Wireless Sensor Networks to Narrow the Gap between Low-Level
Information and Context-Awareness | Published at ISCA 17th International Conference on Computers and
Their Applications, CATA 2002, April 2002, San Francisco, California, USA. 6
pages | null | null | null | cs.NI | null | Wireless sensor networks are finally becoming a reality. In this paper, we
present a scalable architecture for using wireless sensor networks in
combination with wireless Ethernet networks to provide a complete end-to-end
solution to narrow the gap between the low-level information and context
awareness. We developed and implemented a complete proximity detector in order
to give a wearable computer, such as a PDA, location context. Since location is
only one element of contextawareness, we pursued utilizing photo sensors and
temperature sensors in learning as much as possible about the environment. We
used the TinyOS RF Motes as our test bed WSN (Wireless Sensor Network), 802.11
compatible hardware as our wireless Ethernet network, and conventional PCs and
wired 802.3 networks to build the upper levels of the architecture.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:52:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
],
[
"Richter",
"Owen",
""
],
[
"Schwiebert",
"Loren",
""
],
[
"Zeadally",
"Sherali",
""
]
] |
cs/0411040 | Ioan Raicu | Ioan Raicu | Efficient Even Distribution of Power Consumption in Wireless Sensor
Networks | Published at ISCA 18th International Conference on Computers and
Their Applications, CATA 2003, March 2003, Honolulu, Hawaii, USA. 4 pages | null | null | null | cs.NI | null | One of the limitations of wireless sensor nodes is their inherent limited
energy resource. Besides maximizing the lifetime of the sensor node, it is
preferable to distribute the energy dissipated throughout the wireless sensor
network in order to minimize maintenance and maximize overall system
performance. We investigate a new routing algorithm that uses diffusion in
order to achieve relatively even power dissipation throughout a wireless sensor
network by making good local decisions. We leverage from concepts of
peer-to-peer networks in which the system acts completely decentralized and all
nodes in the network are equal peers. Our algorithm utilizes the node load,
power levels, and spatial information in order to make the optimal routing
decision. According to our preliminary experimental results, our proposed
algorithm performs well according to its goals.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:55:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
]
] |
cs/0411041 | Sabu Thampu m | Sabu .M Thampi, K. Chandra Sekaran | Content Based Image Retrieval with Mobile Agents and Steganography | 6 pages, 10 figures | null | null | null | cs.CR | null | In this paper we present an image retrieval system based on Gabor texture
features, steganography, and mobile agents.. By employing the information
hiding technique, the image attributes can be hidden in an image without
degrading the image quality. Thus the image retrieval process becomes simple.
Java based mobile agents manage the query phase of the system. Based on the
simulation results, the proposed system not only shows the efficiency in hiding
the attributes but also provides other advantages such as: (1) fast
transmission of the retrieval image to the receiver, (2) searching made easy.
| [
{
"version": "v1",
"created": "Mon, 15 Nov 2004 08:53:15 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Jun 2006 08:48:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thampi",
"Sabu . M",
""
],
[
"Sekaran",
"K. Chandra",
""
]
] |
cs/0411042 | Ioan Raicu | Ioan Raicu | An Empirical Analysis of Internet Protocol Version 6 (IPv6) | Master Thesis, May 2002, Computer Science Department, Wayne State
University, Detroit, Michigan, USA, 146 pages | null | null | null | cs.NI cs.PF | null | Although the current Internet Protocol known as IPv4 has served its purpose
for over 20 years, its days are numbered. With IPv6 reaching a mature enough
level, there is a need to evaluate the performance benefits or drawbacks that
the new IPv6 protocol will have in comparison to the well established IPv4
protocol. Theoretically, the overhead between the two different protocols
should be directly proportional to the difference in the packet's header size,
however according to our findings, the empirical performance difference between
IPv4 and IPv6, especially when the transition mechanisms are taken into
consideration, is much larger than anticipated. We first examine the
performance of each protocol independently. We then examined two transition
mechanisms which perform the encapsulation at various points in the network:
host-to-host and router-to-router (tunneling). Our experiments were conducted
using two dual stack (IPv4/IPv6) routers using end nodes running both Windows
2000 and Solaris 8.0 in order to compare two different IPv6 implementations
side by side. Our tests were written in C++ and utilized metrics such as
latency, throughput, CPU utilization, socket creation time, socket connection
time, web server simulation, and a video client/server application for TCP/UDP
in IPv4/IPv6 under both Windows 2000 and Solaris 8.0. Our empirical evaluation
proved that IPv6 is not yet a mature enough technology and that it is still
years away from having consistent and good enough implementations, as the
performance of IPv6 in many cases proved to be significantly worse than IPv4.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:31:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
]
] |
cs/0411043 | Ioan Raicu | Ioan Raicu, Loren Schwiebert, Scott Fowler, Sandeep K.S. Gupta | e3D: An Energy-Efficient Routing Algorithm for Wireless Sensor Networks | Accepted for publication at IEEE ISSNIP 2004 (The International
Conference on Intelligent Sensors, Sensor Networks and Information
Processing), Melbourne, Australia, December 2004. 6 pages | null | null | null | cs.NI | null | One of the limitations of wireless sensor nodes is their inherent limited
energy resource. Besides maximizing the lifetime of the sensor node, it is
preferable to distribute the energy dissipated throughout the wireless sensor
network in order to minimize maintenance and maximize overall system
performance. Any communication protocol that involves synchronization of peer
nodes incurs some overhead for setting up the communication. We introduce a new
algorithm, e3D (energy-efficient Distributed Dynamic Diffusion routing
algorithm), and compare it to two other algorithms, namely directed, and random
clustering communication. We take into account the setup costs and analyze the
energy-efficiency and the useful lifetime of the system. In order to better
understand the characteristics of each algorithm and how well e3D really
performs, we also compare e3D with its optimum counterpart and an optimum
clustering algorithm. The benefit of introducing these ideal algorithms is to
show the upper bound on performance at the cost of an astronomical prohibitive
synchronization costs. We compare the algorithms in terms of system lifetime,
power dissipation distribution, cost of synchronization, and simplicity of the
algorithm. Our simulation results show that e3D performs comparable to its
optimal counterpart while having significantly less overhead.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:40:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
],
[
"Schwiebert",
"Loren",
""
],
[
"Fowler",
"Scott",
""
],
[
"Gupta",
"Sandeep K. S.",
""
]
] |
cs/0411044 | Ioan Raicu | Ioan Raicu | Routing Algorithms for Wireless Sensor Networks | Poster at Grace Hopper Celebration of Women in Computing 2002,
GHC2002, October 2002, British Columbia, Canada | null | null | null | cs.NI | null | Our contribution in this paper is e3D, a diffusion based routing protocol
that prolongs the system lifetime, evenly distributes the power dissipation
throughout the network, and incurs minimal overhead for synchronizing
communication. We compare e3D with other algorithms in terms of system
lifetime, power dissipation distribution, cost of synchronization, and
simplicity of the algorithm.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:42:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
]
] |
cs/0411045 | Catalin Dumitrescu | Catalin Dumitrescu, Ian Foster | Usage Policy-based CPU Sharing in VOs | null | null | null | null | cs.DC | null | Resource sharing within Grid collaborations usually implies specific sharing
mechanisms at participating sites. Challenging policy issues can arise within
virtual organizations (VOs) that integrate participants and resources spanning
multiple physical institutions. Resource owners may wish to grant to one or
more VOs the right to use certain resources subject to local policy and service
level agreements, and each VO may then wish to use those resources subject to
VO policy. Thus, we must address the question of what usage policies (UPs)
should be considered for resource sharing in VOs. As a first step in addressing
this question, we develop and evaluate different UP scenarios within a
specialized context that mimics scientific Grids within which the resources to
be shared are computers. We also present a UP architecture and define roles and
functions for scheduling resources in such grid environments while satisfying
resource owner policies.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:48:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dumitrescu",
"Catalin",
""
],
[
"Foster",
"Ian",
""
]
] |
cs/0411046 | Jesse Bridgewater | Jesse S. A. Bridgewater, P. Oscar Boykin and Vwani P. Roychowdhury | Balanced Overlay Networks (BON): Decentralized Load Balancing via
Self-Organized Random Networks | 13 pages, 12 figures. Draft submitted to IEEE TPDS | null | null | null | cs.DC | null | We present a novel framework, called balanced overlay networks (BON), that
provides scalable, decentralized load balancing for distributed computing using
large-scale pools of heterogeneous computers. Fundamentally, BON encodes the
information about each node's available computational resources in the
structure of the links connecting the nodes in the network. This distributed
encoding is self-organized, with each node managing its in-degree and local
connectivity via random-walk sampling. Assignment of incoming jobs to nodes
with the most free resources is also accomplished by sampling the nodes via
short random walks. Extensive simulations show that the resulting highly
dynamic and self-organized graph structure can efficiently balance
computational load throughout large-scale networks. These simulations cover a
wide spectrum of cases, including significant heterogeneity in available
computing resources and high burstiness in incoming load. We provide analytical
results that prove BON's scalability for truly large-scale networks: in
particular we show that under certain ideal conditions, the network structure
converges to Erdos-Renyi (ER) random graphs; our simulation results, however,
show that the algorithm does much better, and the structures seem to approach
the ideal case of d-regular random graphs. We also make a connection between
highly-loaded BONs and the well-known ball-bin randomized load balancing
framework.
| [
{
"version": "v1",
"created": "Mon, 15 Nov 2004 20:05:00 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jan 2006 09:43:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bridgewater",
"Jesse S. A.",
""
],
[
"Boykin",
"P. Oscar",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] |
cs/0411050 | Darran Nathan | Darran Nathan, Ralf Clemens | Utilizing Reconfigurable Hardware Processors via Grid Services | 3 pages, 8 figures | null | null | null | cs.DC cs.AR | null | Computational grids typically consist of nodes utilizing ordinary processors
such as the Intel Pentium. Field Programmable Gate Arrays (FPGAs) are able to
perform certain compute-intensive tasks very well due to their inherent
parallel architecture, often resulting in orders of magnitude speedups. This
paper explores how FPGAs can be transparently exposed for remote use via grid
services, by integrating the Proteus Software Platform with the Globus Toolkit
3.0.
| [
{
"version": "v1",
"created": "Tue, 16 Nov 2004 01:49:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nathan",
"Darran",
""
],
[
"Clemens",
"Ralf",
""
]
] |
cs/0411051 | Timur Friedman | Jeremie Leguay and Matthieu Latapy and Timur Friedman and Kave
Salamatian | Describing and Simulating Internet Routes | 13 pages | null | null | null | cs.NI | null | This paper introduces relevant statistics for the description of routes in
the internet, seen as a graph at the interface level. Based on the observed
properties, we propose and evaluate methods for generating artificial routes
suitable for simulation purposes. The work in this paper is based upon a study
of over seven million route traces produced by CAIDA's skitter infrastructure.
| [
{
"version": "v1",
"created": "Tue, 16 Nov 2004 03:43:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leguay",
"Jeremie",
""
],
[
"Latapy",
"Matthieu",
""
],
[
"Friedman",
"Timur",
""
],
[
"Salamatian",
"Kave",
""
]
] |
cs/0411052 | Olivier Mazet | H. Soula, G. Beslon, O. Mazet | Spontaneous Dynamics of Asymmetric Random Recurrent Spiking Neural
Networks | 28 pages, 7 figures | null | null | null | cs.NE math.PR | null | We study in this paper the effect of an unique initial stimulation on random
recurrent networks of leaky integrate and fire neurons. Indeed given a
stochastic connectivity this so-called spontaneous mode exhibits various non
trivial dynamics. This study brings forward a mathematical formalism that
allows us to examine the variability of the afterward dynamics according to the
parameters of the weight distribution. Provided independence hypothesis (e.g.
in the case of very large networks) we are able to compute the average number
of neurons that fire at a given time -- the spiking activity. In accordance
with numerical simulations, we prove that this spiking activity reaches a
steady-state, we characterize this steady-state and explore the transients.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 10:04:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Soula",
"H.",
""
],
[
"Beslon",
"G.",
""
],
[
"Mazet",
"O.",
""
]
] |
cs/0411053 | Didier Donsez | Areski Flissi (JACQUARD Ur-F Lifl), Philippe Merle (JACQUARD Ur-F
Lifl) | Vers un environnement multi personnalites pour la configuration et le
deploiement d'applications a base de composants logiciels | null | DECOR04 (2004) 3-14 | null | null | cs.NI | null | The multiplication of architecture description languages, component models
and platforms implies a serious dilemma for component based software
architects. On the one hand, they have to choose a language to describe
concrete configurations which will be automatically deployed on execution
platforms. On the other hand, they wish to capitalize their software
architectures independently of any description languages or platforms. To solve
this problem, we propose a multi personalities environment for the
configuration and the deployment of component based applications. This
environment is composed of a core capturing a canonical model of configuration
and deployment, and a set of personalities tailored to languages and platforms.
This paper details the architecture of such an environment and describes the
personalities for the CORBA and Fractal component models.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:08:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Flissi",
"Areski",
"",
"JACQUARD Ur-F Lifl"
],
[
"Merle",
"Philippe",
"",
"JACQUARD Ur-F\n Lifl"
]
] |
cs/0411054 | Didier Donsez | Francois Exertier | J2EE Deployment: The JOnAS Case Study | null | DECOR04 (2004) 27-36 | null | null | cs.NI | null | La specification J2EE (Java 2 platform Enterprise Edition) definit une
architecture de serveur d'application Java. Jusqu'a J2EE 1.3, seuls les aspects
de deploiement concernant le developpeur d'applications etaient adresses. Avec
J2EE 1.4, les interfaces et les etapes de deploiement ont ete plus precisement
specifiees dans la specification "J2EE Deployment". JOnAS (Java Open
Application Server) est une plate-forme J2EE developpee au sein du consortium
ObjectWeb. Les aspects deploiement sont en cours de developpement. Cet article
decrit les concepts lies au deploiement dans J2EE, ainsi que les problematiques
levees lors de leur mise en oeuvre pour JOnAS. Il n'a pas pour but de presenter
un travail abouti, mais illustre le deploiement par un cas concret et ebauche
une liste de besoins non encore satisfaits dans le domaine.
-----
The J2EE (Java 2 platform Enterprise Edition) specification defines an
architecture for Java Application Servers. Until J2EE 1.3, the deployment
aspect was addressed from the developer point of view only. Since J2EE 1.4,
deployment APIs and steps have been more precisely specified within the "J2EE
Deployment Specification". JOnAS (Java Open Application Server) is a J2EE
platform implementation by ObjectWeb. The deployment aspects are under
development. This article describes the J2EE Deployment concepts, and the
issues raised when implementing deployment features within JOnAS. It does not
provide a complete solution, but illustrates deployment through a concrete
example and initiates a list of non fulfilled requirements.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:26:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Exertier",
"Francois",
""
]
] |
cs/0411055 | Didier Donsez | Laurent Charles, Manuel Vacelet, Mohamed Chaari, Miguel Santana | SDS : Une infrastructure d'installation de logiciels libres pour des
organisations multi-sites | null | DECOR04 (2004) 37-48 | null | null | cs.NI | null | Les developpements logiciels sur les systemes UNIX font de plus en plus appel
aux logiciels libres. Nous proposons une solution de deploiement et de controle
de ces logiciels libres au sein d'une grande organisation. Nous nous attachons
particulierement a resoudre les problemes lies au deploiement multi-sites ainsi
qu'a la gestion de configuration de ces deploiements. L'originalite de notre
approche repose sur sa capacite a etre mise en oeuvre et controlee par les
utilisateurs plutot que par les administrateurs, sans necessiter d'expertise
particuliere, et par les possibilites de deploiement dans des environnements
heterogenes.
-----
Free and open source software is more and more used for software developments
on UNIX systems. We are proposing a solution to control the deployment of free
software in the context of a large corporation, focusing on multi-site
deployment and configuration management. The originality of our approach rests
on its ability to be implemented and controlled by users rather than
administrators, without requiring any particular expertise, and on its facility
to be deployed in heterogeneous environments.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:27:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Charles",
"Laurent",
""
],
[
"Vacelet",
"Manuel",
""
],
[
"Chaari",
"Mohamed",
""
],
[
"Santana",
"Miguel",
""
]
] |
cs/0411056 | Didier Donsez | Marcel Cremene, Michel Riveill, Christian Martel, Calin Loghin, Costin
Miron | Adaptation dynamique de services | null | DECOR04 (2004) 53-64 | null | null | cs.NI | null | This paper proposes a software architecture for dynamical service adaptation.
The services are constituted by reusable software components. The adaptation's
goal is to optimize the service function of their execution context. For a
first step, the context will take into account just the user needs but other
elements will be added. A particular feature in our proposition is the profiles
that are used not only to describe the context's elements but also the
components itself. An Adapter analyzes the compatibility between all these
profiles and detects the points where the profiles are not compatibles. The
same Adapter search and apply the possible adaptation solutions: component
customization, insertion, extraction or replacement.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:31:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cremene",
"Marcel",
""
],
[
"Riveill",
"Michel",
""
],
[
"Martel",
"Christian",
""
],
[
"Loghin",
"Calin",
""
],
[
"Miron",
"Costin",
""
]
] |
cs/0411057 | Didier Donsez | Jasminka Matevska-Meyer, Sascha Olliges, Wilhelm Hasselbring | Runtime Reconfiguration of J2EE Applications | null | DECOR04 (2004) 77-84 | null | null | cs.NI | null | Runtime reconfiguration considered as "applying required changes to a running
system" plays an important role for providing high availability not only of
safety- and mission-critical systems, but also for commercial web-applications
offering professional services. Hereby, the main concerns are maintaining the
consistency of the running system during reconfiguration and minimizing its
down-time caused by the reconfiguration. This paper focuses on the platform
independent subsystem that realises deployment and redeployment of J2EE modules
based on the new J2EE Deployment API as a part of the implementation of our
proposed system architecture enabling runtime reconfiguration of
component-based systems. Our "controlled runtime redeployment" comprises an
extension of hot deployment and dynamic reloading, complemented by allowing for
structural change
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:34:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Matevska-Meyer",
"Jasminka",
""
],
[
"Olliges",
"Sascha",
""
],
[
"Hasselbring",
"Wilhelm",
""
]
] |
cs/0411058 | Didier Donsez | Jose L. Ruiz, Juan C. Duenas, Fernando Usero, Cristina Diaz | Deployment in dynamic environments | null | DECOR04 (2004) 85-98 | null | null | cs.NI | null | Information and communication technologies are moving towards a new stage
where applications will be dynamically deployed, uninstalled, updated and
(re)configured. Several approaches have been followed with the goal of creating
a fully automated and context-aware deployment system. Ideally, this system
should be capable of handling the dynamics of this new situation, without
losing sight of other factors, such as performance, security, availability or
scalability. We will take some of the technologies that follow the principles
of Service Oriented Architectures, SOA, as a paradigm of dynamic environments.
SOA promote the breaking down of applications into sets of loosely coupled
elements, called services. Services can be dynamically bound, deployed,
reconfigured, uninstalled and updated. First of all, we will try to offer a
broad view on the specific deployment issues that arise in these environments.
Later on, we will present our approach to the problem. One of the essential
points that has to be tackled to develop an automated deployment engine will be
to have enough information to carry out tasks without human intervention. In
the article we will focus on the format and contents of deployment descriptors.
Additionally, we will go into the details of the deployment framework for OSGi
enabled gateways that has been developed by our research group. Finally we will
give some concluding remarks and some ideas for future work
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:34:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ruiz",
"Jose L.",
""
],
[
"Duenas",
"Juan C.",
""
],
[
"Usero",
"Fernando",
""
],
[
"Diaz",
"Cristina",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.