id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0409055
Jonathan Bowen
Alpay Beler, Ann Borda, Jonathan P. Bowen, Silvia Filippini-Fantoni
The Building of Online Communities: An approach for learning organizations, with a particular focus on the museum sector
(15 pages, 1 figure)
In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2004 London Conference Proceedings, University College London, The Institute of Archaeology, UK, 26-30 July 2004, pages 2.1-2.15
null
null
cs.CY cs.DL
null
This paper considers the move toward and potential of building online communities, with a particular focus on the museum sector. For instance, the increase in the use of `personalized' toolkits that are becoming an integral part of the online presence for learning organizations, like museums, can provide a basis for creating and sustaining communities. A set of case studies further illustrates working examples of the ways in which personalization and specific tools are developing collaborative spaces, community channels and group interactions.
[ { "version": "v1", "created": "Tue, 28 Sep 2004 18:10:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Beler", "Alpay", "" ], [ "Borda", "Ann", "" ], [ "Bowen", "Jonathan P.", "" ], [ "Filippini-Fantoni", "Silvia", "" ] ]
cs/0409056
Gianluca Argentini
Gianluca Argentini
Using sparse matrices and splines-based interpolation in computational fluid dynamics simulations
Talk at SIMAI (Societa' Italiana di Matematica Applicata e Industriale) 2004 Congress, Venice, San Servolo Island, September 20-24, 2004
null
null
null
cs.NA cs.CE physics.comp-ph
null
In this relation I present a technique of construction and fast evaluation of a family of cubic polynomials for analytic smoothing and graphical rendering of particles trajectories for flows in a generic geometry. The principal result of the work was implementation and test of a method for interpolating 3D points by regular parametric curves and their fast and efficient evaluation for a good resolution of rendering. For the purpose a parallel environment using a multiprocessor cluster architecture has been used. This work has been developed for the Research and Development Department of my company for planning advanced customized models of industrial burners.
[ { "version": "v1", "created": "Wed, 29 Sep 2004 10:34:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0409057
Manor Mendel
Sariel Har-Peled, Manor Mendel
Fast Construction of Nets in Low Dimensional Metrics, and Their Applications
41 pages. Extensive clean-up of minor English errors
SIAM J. Comput. 35(5):1148-1184, 2006
10.1137/S0097539704446281
null
cs.DS cs.CG
null
We present a near linear time algorithm for constructing hierarchical nets in finite metric spaces with constant doubling dimension. This data-structure is then applied to obtain improved algorithms for the following problems: Approximate nearest neighbor search, well-separated pair decomposition, compact representation scheme, doubling measure, and computation of the (approximate) Lipschitz constant of a function. In all cases, the running (preprocessing) time is near-linear and the space being used is linear.
[ { "version": "v1", "created": "Wed, 29 Sep 2004 17:44:15 GMT" }, { "version": "v2", "created": "Fri, 6 May 2005 21:18:00 GMT" }, { "version": "v3", "created": "Mon, 22 Aug 2005 05:03:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Har-Peled", "Sariel", "" ], [ "Mendel", "Manor", "" ] ]
cs/0409058
Lillian Lee
Bo Pang and Lillian Lee
A Sentimental Education: Sentiment Analysis Using Subjectivity Summarization Based on Minimum Cuts
Data available at http://www.cs.cornell.edu/people/pabo/movie-review-data/
Proceedings of the 42nd ACL, pp. 271--278, 2004
null
null
cs.CL
null
Sentiment analysis seeks to identify the viewpoint(s) underlying a text span; an example application is classifying a movie review as "thumbs up" or "thumbs down". To determine this sentiment polarity, we propose a novel machine-learning method that applies text-categorization techniques to just the subjective portions of the document. Extracting these portions can be implemented using efficient techniques for finding minimum cuts in graphs; this greatly facilitates incorporation of cross-sentence contextual constraints.
[ { "version": "v1", "created": "Wed, 29 Sep 2004 20:34:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Pang", "Bo", "" ], [ "Lee", "Lillian", "" ] ]
cs/0409059
Vita Hinze-Hoare
Vita Hinze-Hoare
From Digital Television to Internet?
null
null
null
null
cs.MM cs.CY
null
This paper provides a general technical overview of the Multimedia Home Platform (MHP) specifications. MHP is a generic interface between digital applications and user machines, whether they happen to be set top boxes, digital TV sets or Multimedia PC's. MHP extends the DVB open standards. Addressed are MHP architexture, System core and MHP Profiles.
[ { "version": "v1", "created": "Thu, 30 Sep 2004 19:08:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
cs/0410001
Chriatian Jensen
C. S. Jensen, H. Lahrmann, S. Pakalnis, and J. Runge
The Infati Data
null
null
null
TR-79
cs.DB
null
The ability to perform meaningful empirical studies is of essence in research in spatio-temporal query processing. Such studies are often necessary to gain detailed insight into the functional and performance characteristics of proposals for new query processing techniques. We present a collection of spatio-temporal data, collected during an intelligent speed adaptation project, termed INFATI, in which some two dozen cars equipped with GPS receivers and logging equipment took part. We describe how the data was collected and how it was "modified" to afford the drivers some degree of anonymity. We also present the road network in which the cars were moving during data collection. The GPS data is publicly available for non-commercial purposes. It is our hope that this resource will help the spatio-temporal research community in its efforts to develop new and better query processing techniques.
[ { "version": "v1", "created": "Fri, 1 Oct 2004 16:55:38 GMT" }, { "version": "v2", "created": "Sat, 2 Oct 2004 12:01:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Jensen", "C. S.", "" ], [ "Lahrmann", "H.", "" ], [ "Pakalnis", "S.", "" ], [ "Runge", "J.", "" ] ]
cs/0410004
Andras Lorincz
I. Szita and A. Lorincz
Applying Policy Iteration for Training Recurrent Neural Networks
Supplementary material. 17 papes, 1 figure
null
null
null
cs.AI cs.LG cs.NE
null
Recurrent neural networks are often used for learning time-series data. Based on a few assumptions we model this learning task as a minimization problem of a nonlinear least-squares cost function. The special structure of the cost function allows us to build a connection to reinforcement learning. We exploit this connection and derive a convergent, policy iteration-based algorithm. Furthermore, we argue that RNN training can be fit naturally into the reinforcement learning framework.
[ { "version": "v1", "created": "Sat, 2 Oct 2004 07:19:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Szita", "I.", "" ], [ "Lorincz", "A.", "" ] ]
cs/0410006
Mark Dumay
Mark Dumay
Demo or Practice: Critical Analysis of the Language/Action Perspective
23 pages
null
null
null
cs.OH
null
Despite offering several promising concepts, the Language/Action Perspective (LAP) is still not in the mainstream of Information Systems Development (ISD). Since at present there is only a limited understanding of LAP theory and practice, it remains unclear whether the lack of LAP's impact is due to shortcomings in LAP theory itself. One classic problem within ISD is the dichotomy between social perspectives and technical perspectives. LAP claims it offers a solution to this problem. This paper investigates this claim as a means to review LAP theory. To provide a structure to a critical analysis of DEMO - an example methodology that belongs to the LAP research community - this paper utilizes a paradigmatic framework. This framework is augmented by the opinion of several DEMO practitioners by means of an expert discussion. With use of a comparative evaluation of LAP theory and DEMO theory, the implication of DEMO's reflection upon LAP is determined. The paper concludes by outlining an agenda for further research if LAP is to improve its footprint in the field.
[ { "version": "v1", "created": "Sun, 3 Oct 2004 20:03:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Dumay", "Mark", "" ] ]
cs/0410007
Ignatios Souvatzis
Ignatios Souvatzis
A Shared Write-protected Root Filesystem for a Group of Networked Clients
Presented at the 2nd European BSD Conference, 2002, Amsterdam, The Netherlands; v2: reformatted to help citation browser
Proceedings of the 2nd European BSD Conference, 2002, Amsterdam, The Netherlands
null
null
cs.OS cs.DC
null
A method to boot a cluster of diskless network clients from a single write-protected NFS root file system is shown. The problems encountered when first implementing the setup and their solution are discussed. Finally, the setup is briefly compared to using a kernel-embedded root file system.
[ { "version": "v1", "created": "Mon, 4 Oct 2004 14:49:00 GMT" }, { "version": "v2", "created": "Sun, 9 Jan 2005 19:07:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Souvatzis", "Ignatios", "" ] ]
cs/0410009
Aaron Harwood
Scott Douglas and Aaron Harwood
Diffusive Load Balancing of Loosely-Synchronous Parallel Programs over Peer-to-Peer Networks
14 pages with 10 figures
null
null
null
cs.DC
null
The use of under-utilized Internet resources is widely recognized as a viable form of high performance computing. Sustained processing power of roughly 40T FLOPS using 4 million volunteered Internet hosts has been reported for embarrassingly parallel problems. At the same time, peer-to-peer (P2P) file sharing networks, with more than 50 million participants, have demonstrated the capacity for scale in distributed systems. This paper contributes a study of load balancing techniques for a general class of loosely-synchronous parallel algorithms when executed over a P2P network. We show that decentralized, diffusive load balancing can be effective at balancing load and is facilitated by the dynamic properties of P2P. While a moderate degree of dynamicity can benefit load balancing, significant dynamicity hinders the parallel program performance due to the need for increased load migration. To the best of our knowledge this study provides new insight into the performance of loosely-synchronous parallel programs over the Internet.
[ { "version": "v1", "created": "Tue, 5 Oct 2004 08:23:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Douglas", "Scott", "" ], [ "Harwood", "Aaron", "" ] ]
cs/0410010
Amit K. Awasthi
Amit K. Awasthi and Sunder Lal
A New Proxy Ring Signature Scheme
RMS 2004, Agra, INDIA
Proceeding of RMS 2004, Page 29
null
null
cs.CR math.RA
null
The concept of ring signature was introduced by Rivest, Shamir and Tauman. This signature is considered to be a simplified group signature from which identity of signer is ambiguous although verifier knows the group to which signer belong. In this paper we introduce a new proxy ring signature scheme.
[ { "version": "v1", "created": "Tue, 5 Oct 2004 18:58:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Awasthi", "Amit K.", "" ], [ "Lal", "Sunder", "" ] ]
cs/0410011
Amit K. Awasthi
Amit K Awasthi
Comment on A dynamic ID-based Remote User Authentication Scheme
3 pages. Available at : http://gfcr.org
Transaction on Cryptology, Vol. 01, Issue 02, Page 15-17, Sep 2004
null
null
cs.CR
null
Since 1981, when Lamport introduced the remote user authentication scheme using table, a plenty of schemes had been proposed with tables or without table using. Recently Das et al. proposed a dynamic id-based remote user authentication scheme. They claimed that their scheme is secure against ID-theft, and can resist the reply attacks, forgery attacks, insider attacks an so on. In this paper we show that Das et al's scheme is completly insecure and using of this scheme is like an open server access without password.
[ { "version": "v1", "created": "Tue, 5 Oct 2004 21:54:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Awasthi", "Amit K", "" ] ]
cs/0410015
Andras Lorincz
Z. Szabo and A. Lorincz
L1 regularization is better than L2 for learning and predicting chaotic systems
13 pages, 4 figures
null
null
null
cs.LG cs.AI
null
Emergent behaviors are in the focus of recent research interest. It is then of considerable importance to investigate what optimizations suit the learning and prediction of chaotic systems, the putative candidates for emergence. We have compared L1 and L2 regularizations on predicting chaotic time series using linear recurrent neural networks. The internal representation and the weights of the networks were optimized in a unifying framework. Computational tests on different problems indicate considerable advantages for the L1 regularization: It had considerably better learning time and better interpolating capabilities. We shall argue that optimization viewed as a maximum likelihood estimation justifies our results, because L1 regularization fits heavy-tailed distributions -- an apparently general feature of emergent systems -- better.
[ { "version": "v1", "created": "Thu, 7 Oct 2004 10:57:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Szabo", "Z.", "" ], [ "Lorincz", "A.", "" ] ]
cs/0410016
Pedro Andrade
Antonio Amorim, Jaime Villate and Pedro Andrade
HEP@Home - A distributed computing system based on BOINC
4 pages, 4 Postscript figures, uses CHEP2004.cls, submitted to CHEP2004
null
null
null
cs.DC
null
Project SETI@HOME has proven to be one of the biggest successes of distributed computing during the last years. With a quite simple approach SETI manages to process large volumes of data using a vast amount of distributed computer power. To extend the generic usage of this kind of distributed computing tools, BOINC is being developed. In this paper we propose HEP@HOME, a BOINC version tailored to the specific requirements of the High Energy Physics (HEP) community. The HEP@HOME will be able to process large amounts of data using virtually unlimited computing power, as BOINC does, and it should be able to work according to HEP specifications. In HEP the amounts of data to be analyzed or reconstructed are of central importance. Therefore, one of the design principles of this tool is to avoid data transfer. This will allow scientists to run their analysis applications and taking advantage of a large number of CPUs. This tool also satisfies other important requirements in HEP, namely, security, fault-tolerance and monitoring.
[ { "version": "v1", "created": "Thu, 7 Oct 2004 12:42:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Amorim", "Antonio", "" ], [ "Villate", "Jaime", "" ], [ "Andrade", "Pedro", "" ] ]
cs/0410018
Russell Martin
Petra Berenbrink, Leslie Ann Goldberg, Paul Goldberg, Russell Martin
Utilitarian resource assignment
19 pages
null
null
null
cs.GT math.GM
null
This paper studies a resource allocation problem introduced by Koutsoupias and Papadimitriou. The scenario is modelled as a multiple-player game in which each player selects one of a finite number of known resources. The cost to the player is the total weight of all players who choose that resource, multiplied by the ``delay'' of that resource. Recent papers have studied the Nash equilibria and social optima of this game in terms of the $L_\infty$ cost metric, in which the social cost is taken to be the maximum cost to any player. We study the $L_1$ variant of this game, in which the social cost is taken to be the sum of the costs to the individual players, rather than the maximum of these costs. We give bounds on the size of the coordination ratio, which is the ratio between the social cost incurred by selfish behavior and the optimal social cost; we also study the algorithmic problem of finding optimal (lowest-cost) assignments and Nash Equilibria. Additionally, we obtain bounds on the ratio between alternative Nash equilibria for some special cases of the problem.
[ { "version": "v1", "created": "Mon, 11 Oct 2004 13:06:55 GMT" }, { "version": "v2", "created": "Tue, 15 Mar 2005 18:19:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Berenbrink", "Petra", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Goldberg", "Paul", "" ], [ "Martin", "Russell", "" ] ]
cs/0410020
Stephen Luttrell
Stephen Luttrell
Adaptive Cluster Expansion (ACE): A Hierarchical Bayesian Network
35 pages, 20 figures
null
null
null
cs.NE cs.CV
null
Using the maximum entropy method, we derive the "adaptive cluster expansion" (ACE), which can be trained to estimate probability density functions in high dimensional spaces. The main advantage of ACE over other Bayesian networks is its ability to capture high order statistics after short training times, which it achieves by making use of a hierarchical vector quantisation of the input data. We derive a scheme for representing the state of an ACE network as a "probability image", which allows us to identify statistically anomalous regions in an otherwise statistically homogeneous image, for instance. Finally, we present some probability images that we obtained after training ACE on some Brodatz texture images - these demonstrate the ability of ACE to detect subtle textural anomalies.
[ { "version": "v1", "created": "Sun, 10 Oct 2004 18:30:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Luttrell", "Stephen", "" ] ]
cs/0410021
Lane A. Hemaspaandra
Edith Hemaspaandra, Lane A. Hemaspaandra, Stanislaw P. Radziszowski, Rahul Tripathi
Complexity Results in Graph Reconstruction
null
null
null
URCS-TR-2004-852
cs.CC cs.DM
null
We investigate the relative complexity of the graph isomorphism problem (GI) and problems related to the reconstruction of a graph from its vertex-deleted or edge-deleted subgraphs (in particular, deck checking (DC) and legitimate deck (LD) problems). We show that these problems are closely related for all amounts $c \geq 1$ of deletion: 1) $GI \equiv^{l}_{iso} VDC_{c}$, $GI \equiv^{l}_{iso} EDC_{c}$, $GI \leq^{l}_{m} LVD_c$, and $GI \equiv^{p}_{iso} LED_c$. 2) For all $k \geq 2$, $GI \equiv^{p}_{iso} k-VDC_c$ and $GI \equiv^{p}_{iso} k-EDC_c$. 3) For all $k \geq 2$, $GI \leq^{l}_{m} k-LVD_c$. 4)$GI \equiv^{p}_{iso} 2-LVC_c$. 5) For all $k \geq 2$, $GI \equiv^{p}_{iso} k-LED_c$. For many of these results, even the $c = 1$ case was not previously known. Similar to the definition of reconstruction numbers $vrn_{\exists}(G)$ [HP85] and $ern_{\exists}(G)$ (see page 120 of [LS03]), we introduce two new graph parameters, $vrn_{\forall}(G)$ and $ern_{\forall}(G)$, and give an example of a family $\{G_n\}_{n \geq 4}$ of graphs on $n$ vertices for which $vrn_{\exists}(G_n) < vrn_{\forall}(G_n)$. For every $k \geq 2$ and $n \geq 1$, we show that there exists a collection of $k$ graphs on $(2^{k-1}+1)n+k$ vertices with $2^{n}$ 1-vertex-preimages, i.e., one has families of graph collections whose number of 1-vertex-preimages is huge relative to the size of the graphs involved.
[ { "version": "v1", "created": "Mon, 11 Oct 2004 00:57:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Radziszowski", "Stanislaw P.", "" ], [ "Tripathi", "Rahul", "" ] ]
cs/0410022
Paul Piwek
P. Piwek, B. Krenn, M. Schroeder, M. Grice, S. Baumann and H. Pirker
RRL: A Rich Representation Language for the Description of Agent Behaviour in NECA
7 pages, 4 figures
In Proceedings of the AAMAS-02 Workshop ``Embodied conversational agents - let's specify and evaluate them!'', July 16 2002, Bologna, Italy.
null
null
cs.MM cs.MA
null
In this paper, we describe the Rich Representation Language (RRL) which is used in the NECA system. The NECA system generates interactions between two or more animated characters. The RRL is an XML compliant framework for representing the information that is exchanged at the interfaces between the various NECA system modules. The full XML Schemas for the RRL are available at http://www.ai.univie.ac.at/NECA/RRL
[ { "version": "v1", "created": "Mon, 11 Oct 2004 12:34:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Piwek", "P.", "" ], [ "Krenn", "B.", "" ], [ "Schroeder", "M.", "" ], [ "Grice", "M.", "" ], [ "Baumann", "S.", "" ], [ "Pirker", "H.", "" ] ]
cs/0410023
Lane A. Hemaspaandra
Edith Hemaspaandra, Lane A. Hemaspaandra, Harald Hempel
All Superlinear Inverse Schemes are coNP-Hard
Conf. version was in MFCS 2004
null
null
URCS-TR-2004-841
cs.CC cs.CR
null
How hard is it to invert NP-problems? We show that all superlinearly certified inverses of NP problems are coNP-hard. To do so, we develop a novel proof technique that builds diagonalizations against certificates directly into a circuit.
[ { "version": "v1", "created": "Tue, 12 Oct 2004 02:38:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/0410024
Alex Wiesmaier
A. Wiesmaier (1), M. Lippert (1), V. Karatsiolis (1) ((1) TU Darmstadt)
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures
5 pages, 2 figures
in Proceedings of the International Conference on Security and Management. CSREA Press, June 2004, pp. 89-93
null
null
cs.CR
null
We model a private key`s life cycle as a finite state machine. The states are the key`s phases of life and the transition functions describe tasks to be done with the key. Based on this we define and describe the key authority, a trust center module, which potentiates the easy enforcement of secure management of private keys in hierarchical public key infrastructures. This is done by assembling all trust center tasks concerning the crucial handling of private keys within one centralized module. As this module resides under full control of the trust center`s carrier it can easily be protected by well-known organizational and technical measures.
[ { "version": "v1", "created": "Tue, 12 Oct 2004 12:28:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Wiesmaier", "A.", "" ], [ "Lippert", "M.", "" ], [ "Karatsiolis", "V.", "" ] ]
cs/0410025
Alex Wiesmaier
A. Wiesmaier, M. Fischer, M. Lippert, J. Buchmann
Outflanking and securely using the PIN/TAN-System
7 pages; 2 figures; IEEE style; final version
Proceedings of the 2005 International Conference on Security and Management (SAM'05); June 2005
null
null
cs.CR
null
The PIN/TAN-system is an authentication and authorization scheme used in e-business. Like other similar schemes it is successfully attacked by criminals. After shortly classifying the various kinds of attacks we accomplish malicious code attacks on real World Wide Web transaction systems. In doing so we find that it is really easy to outflank these systems. This is even supported by the users' behavior. We give a few simple behavior rules to improve this situation. But their impact is limited. Also the providers support the attacks by having implementation flaws in their installations. Finally we show that the PIN/TAN-system is not suitable for usage in highly secure applications.
[ { "version": "v1", "created": "Tue, 12 Oct 2004 13:47:33 GMT" }, { "version": "v2", "created": "Thu, 6 Jan 2005 23:05:48 GMT" }, { "version": "v3", "created": "Thu, 26 May 2005 13:41:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Wiesmaier", "A.", "" ], [ "Fischer", "M.", "" ], [ "Lippert", "M.", "" ], [ "Buchmann", "J.", "" ] ]
cs/0410026
Eric Neilsen Jr.
Eric H. Neilsen Jr, James Simone
Lattice QCD Data and Metadata Archives at Fermilab and the International Lattice Data Grid
Proceedings for CHEP 2004 presentation
null
null
null
cs.DC hep-lat
null
The lattice gauge theory community produces large volumes of data. Because the data produced by completed computations form the basis for future work, the maintenance of archives of existing data and metadata describing the provenance, generation parameters, and derived characteristics of that data is essential not only as a reference, but also as a basis for future work. Development of these archives according to uniform standards both in the data and metadata formats provided and in the software interfaces to the component services could greatly simplify collaborations between institutions and enable the dissemination of meaningful results. This paper describes the progress made in the development of a set of such archives at the Fermilab lattice QCD facility. We are coordinating the development of the interfaces to these facilities and the formats of the data and metadata they provide with the efforts of the international lattice data grid (ILDG) metadata and middleware working groups, whose goals are to develop standard formats for lattice QCD data and metadata and a uniform interface to archive facilities that store them. Services under development include those commonly associate with data grids: a service registry, a metadata database, a replica catalog, and an interface to a mass storage system. All services provide GSI authenticated web service interfaces following modern standards, including WSDL and SOAP, and accept and provide data and metadata following recent XML based formats proposed by the ILDG metadata working group.
[ { "version": "v1", "created": "Tue, 12 Oct 2004 15:34:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Neilsen", "Eric H.", "Jr" ], [ "Simone", "James", "" ] ]
cs/0410027
Paul M. Aoki
Chen Yu, Paul M. Aoki, Allison Woodruff
Detecting User Engagement in Everyday Conversations
4 pages (A4), 1 figure (EPS)
Proc. 8th Int'l Conf. on Spoken Language Processing (ICSLP) (Vol. 2), Jeju Island, Republic of Korea, Oct. 2004, 1329-1332. ISCA.
null
null
cs.SD cs.CL cs.HC
null
This paper presents a novel application of speech emotion recognition: estimation of the level of conversational engagement between users of a voice communication system. We begin by using machine learning techniques, such as the support vector machine (SVM), to classify users' emotions as expressed in individual utterances. However, this alone fails to model the temporal and interactive aspects of conversational engagement. We therefore propose the use of a multilevel structure based on coupled hidden Markov models (HMM) to estimate engagement levels in continuous natural speech. The first level is comprised of SVM-based classifiers that recognize emotional states, which could be (e.g.) discrete emotion types or arousal/valence levels. A high-level HMM then uses these emotional states as input, estimating users' engagement in conversation by decoding the internal states of the HMM. We report experimental results obtained by applying our algorithms to the LDC Emotional Prosody and CallFriend speech corpora.
[ { "version": "v1", "created": "Wed, 13 Oct 2004 02:28:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Yu", "Chen", "" ], [ "Aoki", "Paul M.", "" ], [ "Woodruff", "Allison", "" ] ]
cs/0410031
Yongzhi Cao
Yongzhi Cao and Mingsheng Ying
Similarity-Based Supervisory Control of Discrete Event Systems
22 pages, 5 figures
A short version has been published in the IEEE Transactions on Automatic Control, 51(2), pp. 325-330, February 2006.
null
null
cs.DM
null
Due to the appearance of uncontrollable events in discrete event systems, one may wish to replace the behavior leading to the uncontrollability of pre-specified language by some quite similar one. To capture this similarity, we introduce metric to traditional supervisory control theory and generalize the concept of original controllability to $\ld$-controllability, where $\ld$ indicates the similarity degree of two languages. A necessary and sufficient condition for a language to be $\ld$-controllable is provided. We then examine some properties of $\ld$-controllable languages and present an approach to optimizing a realization.
[ { "version": "v1", "created": "Thu, 14 Oct 2004 07:28:33 GMT" }, { "version": "v2", "created": "Thu, 31 Mar 2005 14:13:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Cao", "Yongzhi", "" ], [ "Ying", "Mingsheng", "" ] ]
cs/0410035
Lane A. Hemaspaandra
Lane A. Hemaspaandra, Proshanto Mukherji, and Till Tantau
Overhead-Free Computation, DCFLs, and CFLs
null
null
null
URCS-TR-2004-844
cs.CC
null
We study Turing machines that are allowed absolutely no space overhead. The only work space the machines have, beyond the fixed amount of memory implicit in their finite-state control, is that which they can create by cannibalizing the input bits' own space. This model more closely reflects the fixed-sized memory of real computers than does the standard complexity-theoretic model of linear space. Though some context-sensitive languages cannot be accepted by such machines, we show that all context-free languages can be accepted nondeterministically in polynomial time with absolutely no space overhead, and that all deterministic context-free languages can be accepted deterministically in polynomial time with absolutely no space overhead.
[ { "version": "v1", "created": "Fri, 15 Oct 2004 18:18:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Mukherji", "Proshanto", "" ], [ "Tantau", "Till", "" ] ]
cs/0410036
Stephen Luttrell
Stephen Luttrell
Self-Organised Factorial Encoding of a Toroidal Manifold
46 pages, 11 figures, corrected equation 39
null
null
null
cs.LG cs.CV
null
It is shown analytically how a neural network can be used optimally to encode input data that is derived from a toroidal manifold. The case of a 2-layer network is considered, where the output is assumed to be a set of discrete neural firing events. The network objective function measures the average Euclidean error that occurs when the network attempts to reconstruct its input from its output. This optimisation problem is solved analytically for a toroidal input manifold, and two types of solution are obtained: a joint encoder in which the network acts as a soft vector quantiser, and a factorial encoder in which the network acts as a pair of soft vector quantisers (one for each of the circular subspaces of the torus). The factorial encoder is favoured for small network sizes when the number of observed firing events is large. Such self-organised factorial encoding may be used to restrict the size of network that is required to perform a given encoding task, and will decompose an input manifold into its constituent submanifolds.
[ { "version": "v1", "created": "Fri, 15 Oct 2004 20:25:24 GMT" }, { "version": "v2", "created": "Fri, 9 Sep 2005 17:48:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Luttrell", "Stephen", "" ] ]
cs/0410037
Mark Burgin
Mark Burgin
Hardware-Oriented Group Solutions for Hard Problems
null
null
null
null
cs.CC
null
Group and individual solutions are considered for hard problems such as satisfiability problem. Time-space trade-off in a structured active memory provides means to achieve lower time complexity for solutions of these problems.
[ { "version": "v1", "created": "Fri, 15 Oct 2004 23:12:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Burgin", "Mark", "" ] ]
cs/0410038
Floris Geerts
Floris Geerts
Frequent Knot Discovery
7 pages, 2 figures, recreational data mining
null
null
null
cs.DB
null
We explore the possibility of applying the framework of frequent pattern mining to a class of continuous objects appearing in nature, namely knots. We introduce the frequent knot mining problem and present a solution. The key observation is that a database consisting of knots can be transformed into a transactional database. This observation is based on the Prime Decomposition Theorem of knots.
[ { "version": "v1", "created": "Sat, 16 Oct 2004 13:14:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Geerts", "Floris", "" ] ]
cs/0410039
Sara Cohen
Sara Cohen and Yehoshua Sagiv
Generating All Maximal Induced Subgraphs for Hereditary, Connected-Hereditary and Rooted-Hereditary Properties
null
null
null
null
cs.DS cs.DM
null
The problem of computing all maximal induced subgraphs of a graph G that have a graph property P, also called the maximal P-subgraphs problem, is considered. This problem is studied for hereditary, connected-hereditary and rooted-hereditary graph properties. The maximal P-subgraphs problem is reduced to restricted versions of this problem by providing algorithms that solve the general problem, assuming that an algorithm for a restricted version is given. The complexity of the algorithms are analyzed in terms of total polynomial time, incremental polynomial time and the complexity class P-enumerable. The general results presented allow simple proofs that the maximal P-subgraphs problem can be solved efficiently (in terms of the input and output) for many different properties.
[ { "version": "v1", "created": "Sun, 17 Oct 2004 20:30:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Cohen", "Sara", "" ], [ "Sagiv", "Yehoshua", "" ] ]
cs/0410042
Patrick C. McGuire
H. Ritter, J.J. Steil, C. Noelker, F. Roethling, P.C. McGuire
Neural Architectures for Robot Intelligence
37 pages, 17 figures
Reviews in the Neurosciences, vol. 14, no. 1-2, pp. 121-143 (2003)
null
null
cs.RO cs.CV cs.HC cs.LG cs.NE q-bio.NC
null
We argue that the direct experimental approaches to elucidate the architecture of higher brains may benefit from insights gained from exploring the possibilities and limits of artificial control architectures for robot systems. We present some of our recent work that has been motivated by that view and that is centered around the study of various aspects of hand actions since these are intimately linked with many higher cognitive abilities. As examples, we report on the development of a modular system for the recognition of continuous hand postures based on neural nets, the use of vision and tactile sensing for guiding prehensile movements of a multifingered hand, and the recognition and use of hand gestures for robot teaching. Regarding the issue of learning, we propose to view real-world learning from the perspective of data mining and to focus more strongly on the imitation of observed actions instead of purely reinforcement-based exploration. As a concrete example of such an effort we report on the status of an ongoing project in our lab in which a robot equipped with an attention system with a neurally inspired architecture is taught actions by using hand gestures in conjunction with speech commands. We point out some of the lessons learnt from this system, and discuss how systems of this kind can contribute to the study of issues at the junction between natural and artificial cognitive systems.
[ { "version": "v1", "created": "Mon, 18 Oct 2004 10:50:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Ritter", "H.", "" ], [ "Steil", "J. J.", "" ], [ "Noelker", "C.", "" ], [ "Roethling", "F.", "" ], [ "McGuire", "P. C.", "" ] ]
cs/0410047
Jaap-Henk Hoepman
Jaap-Henk Hoepman
Simple Distributed Weighted Matchings
null
null
null
null
cs.DC cs.DM
null
Wattenhofer [WW04] derive a complicated distributed algorithm to compute a weighted matching of an arbitrary weighted graph, that is at most a factor 5 away from the maximum weighted matching of that graph. We show that a variant of the obvious sequential greedy algorithm [Pre99], that computes a weighted matching at most a factor 2 away from the maximum, is easily distributed. This yields the best known distributed approximation algorithm for this problem so far.
[ { "version": "v1", "created": "Tue, 19 Oct 2004 09:00:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoepman", "Jaap-Henk", "" ] ]
cs/0410049
Joseph Y. Halpern
Joseph Y. Halpern
Intransitivity and Vagueness
A preliminary version of this paper appears in Principles of Knowledge Representation and Reasoning: Proceedings of the Ninth International Conference (KR 2004)
null
null
null
cs.AI
null
There are many examples in the literature that suggest that indistinguishability is intransitive, despite the fact that the indistinguishability relation is typically taken to be an equivalence relation (and thus transitive). It is shown that if the uncertainty perception and the question of when an agent reports that two things are indistinguishable are both carefully modeled, the problems disappear, and indistinguishability can indeed be taken to be an equivalence relation. Moreover, this model also suggests a logic of vagueness that seems to solve many of the problems related to vagueness discussed in the philosophical literature. In particular, it is shown here how the logic can handle the sorites paradox.
[ { "version": "v1", "created": "Tue, 19 Oct 2004 17:31:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
cs/0410050
Joseph Y. Halpern
Joseph Y. Halpern
Sleeping Beauty Reconsidered: Conditioning and Reflection in Asynchronous Systems
A preliminary version of this paper appears in Principles of Knowledge Representation and Reasoning: Proceedings of the Ninth International Conference (KR 2004). This version will appear in Oxford Studies in Epistemology
null
null
null
cs.AI
null
A careful analysis of conditioning in the Sleeping Beauty problem is done, using the formal model for reasoning about knowledge and probability developed by Halpern and Tuttle. While the Sleeping Beauty problem has been viewed as revealing problems with conditioning in the presence of imperfect recall, the analysis done here reveals that the problems are not so much due to imperfect recall as to asynchrony. The implications of this analysis for van Fraassen's Reflection Principle and Savage's Sure-Thing Principle are considered.
[ { "version": "v1", "created": "Tue, 19 Oct 2004 17:31:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
cs/0410051
Alex Vinokur
Alex Vinokur
Turing Machine with Faults, Failures and Recovery
8 pages; C++ Simulator has been developed
null
null
null
cs.LO
null
A Turing machine with faults, failures and recovery (TMF) is described. TMF is (weakly) non-deterministic Turing machine consisting of five semi-infinite tapes (Master Tape, Synchro Tape, Backup Tape, Backup Synchro Tape, User Tape) and four controlling components (Program, Daemon, Apparatus, User). Computational process consists of three phases (Program Phase, Failure Phase, Repair Phase). C++ Simulator of a Turing machine with faults, failures and recovery has been developed.
[ { "version": "v1", "created": "Wed, 20 Oct 2004 12:43:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Vinokur", "Alex", "" ] ]
cs/0410052
Joseph O'Rourke
Julie Glass, Stefan Langerman, Joseph O'Rourke, Jack Snoeyink, Jianyuan K. Zhong
A 2-chain can interlock with a k-chain
10 pages, 6 figures
null
null
null
cs.CG cs.DM
null
One of the open problems posed in [3] is: what is the minimal number k such that an open, flexible k-chain can interlock with a flexible 2-chain? In this paper, we establish the assumption behind this problem, that there is indeed some k that achieves interlocking. We prove that a flexible 2-chain can interlock with a flexible, open 16-chain.
[ { "version": "v1", "created": "Wed, 20 Oct 2004 00:55:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Glass", "Julie", "" ], [ "Langerman", "Stefan", "" ], [ "O'Rourke", "Joseph", "" ], [ "Snoeyink", "Jack", "" ], [ "Zhong", "Jianyuan K.", "" ] ]
cs/0410053
Haibin Wang
Haibin Wang, Hao Tian, Rajshekhar Sunderraman
An Extended Generalized Disjunctive Paraconsistent Data Model for Disjunctive Information
10 pages
null
null
null
cs.DB
null
This paper presents an extension of generalized disjunctive paraconsistent relational data model in which pure disjunctive positive and negative information as well as mixed disjunctive positive and negative information can be represented explicitly and manipulated. We consider explicit mixed disjunctive information in the context of disjunctive databases as there is an interesting interplay between these two types of information. Extended generalized disjunctive paraconsistent relation is introduced as the main structure in this model. The relational algebra is appropriately generalized to work on extended generalized disjunctive paraconsistent relations and their correctness is established.
[ { "version": "v1", "created": "Wed, 20 Oct 2004 08:50:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Haibin", "" ], [ "Tian", "Hao", "" ], [ "Sunderraman", "Rajshekhar", "" ] ]
cs/0410054
Haibin Wang
Rajshekhar Sunderraman, Haibin Wang
Paraconsistent Intuitionistic Fuzzy Relational Data Model
19 pages, 1 figure
null
null
null
cs.DB
null
In this paper, we present a generalization of the relational data model based on paraconsistent intuitionistic fuzzy sets. Our data model is capable of manipulating incomplete as well as inconsistent information. Fuzzy relation or intuitionistic fuzzy relation can only handle incomplete information. Associated with each relation are two membership functions one is called truth-membership function $T$ which keeps track of the extent to which we believe the tuple is in the relation, another is called false-membership function which keeps track of the extent to which we believe that it is not in the relation. A paraconsistent intuitionistic fuzzy relation is inconsistent if there exists one tuple $a$ such that $T(a) + F(a) > 1$. In order to handle inconsistent situation, we propose an operator called split to transform inconsistent paraconsistent intuitionistic fuzzy relations into pseudo-consistent paraconsistent intuitionistic fuzzy relations and do the set-theoretic and relation-theoretic operations on them and finally use another operator called combine to transform the result back to paraconsistent intuitionistic fuzzy relation. For this model, we define algebraic operators that are generalisations of the usual operators such as union, selection, join on fuzzy relations. Our data model can underlie any database and knowledge-base management system that deals with incomplete and inconsistent information.
[ { "version": "v1", "created": "Wed, 20 Oct 2004 11:40:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Sunderraman", "Rajshekhar", "" ], [ "Wang", "Haibin", "" ] ]
cs/0410055
Michiel Hazewinkel
Michiel Hazewinkel
Mathematical knowledge management is needed
Keynote speech at the November, 2003 MKM meeting ar Herriott-Watt, Edinburg, UK. Nine pages, one figure
null
null
null
cs.IR
null
In this lecture I discuss some aspects of MKM, Mathematical Knowledge Management, with particuar emphasis on information storage and information retrieval.
[ { "version": "v1", "created": "Thu, 21 Oct 2004 15:51:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Hazewinkel", "Michiel", "" ] ]
cs/0410056
Haibin Wang
Haibin Wang, Florentin Smarandache, Yanqing Zhang, Rajshekhar Sunderraman
Interval Neutrosophic Logics: Theory and Applications
18 pages, 4 figures
null
null
null
cs.LO
null
In this paper, we present the interval neutrosophic logics which generalizes the fuzzy logic, paraconsistent logic, intuitionistic fuzzy logic and many other non-classical and non-standard logics. We will give the formal definition of interval neutrosophic propositional calculus and interval neutrosophic predicate calculus. Then we give one application of interval neutrosophic logics to do approximate reasoning.
[ { "version": "v1", "created": "Thu, 21 Oct 2004 20:24:28 GMT" }, { "version": "v2", "created": "Wed, 3 Nov 2004 20:18:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Haibin", "" ], [ "Smarandache", "Florentin", "" ], [ "Zhang", "Yanqing", "" ], [ "Sunderraman", "Rajshekhar", "" ] ]
cs/0410057
M. V. Panduranga Rao
M. V. Panduranga Rao
Generalized Counters and Reversal Complexity
9 pages, no figures; Layout and content changed to some extent; Conference version
pp.318-326, Proceedings of TAMC 2006, Beijing, China, Springer LNCS, 3959
null
null
cs.CC
null
We generalize the definition of a counter and counter reversal complexity and investigate the power of generalized deterministic counter automata in terms of language recognition.
[ { "version": "v1", "created": "Mon, 25 Oct 2004 19:36:07 GMT" }, { "version": "v2", "created": "Tue, 27 Jun 2006 19:37:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Rao", "M. V. Panduranga", "" ] ]
cs/0410058
Vincenzo Pallotta
Vincenzo Pallotta, Afzal Ballim
Robust Dialogue Understanding in HERALD
6 pages
Proceedings of RANLP 2001 - EuroConference on Recent Advances in Natural Language Processing, September 5-7, 2001, Tzigov-Chark, Bulgaria
null
null
cs.CL cs.AI cs.HC cs.MA cs.SE
null
We tackle the problem of robust dialogue processing from the perspective of language engineering. We propose an agent-oriented architecture that allows us a flexible way of composing robust processors. Our approach is based on Shoham's Agent Oriented Programming (AOP) paradigm. We will show how the AOP agent model can be enriched with special features and components that allow us to deal with classical problems of dialogue understanding.
[ { "version": "v1", "created": "Fri, 22 Oct 2004 23:41:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Pallotta", "Vincenzo", "" ], [ "Ballim", "Afzal", "" ] ]
cs/0410059
Vincenzo Pallotta
Afzal Ballim, Nastaran Fatemi, Hatem Ghorbel, Vincenzo Pallotta
A knowledge-based approach to semi-automatic annotation of multimedia documents via user adaptation
4 pages
First EAGLES/ISLE Workshop on Meta-Descriptions and Annotation Schemas for Multimodal/Multimedia Language Resources (LREC 2000 Pre-Conference Workshop), 29-30 May 2000, Athens, Greece
null
null
cs.DL cs.CL cs.IR
null
Current approaches to the annotation process focus on annotation schemas, languages for annotation, or are very application driven. In this paper it is proposed that a more flexible architecture for annotation requires a knowledge component to allow for flexible search and navigation of the annotated material. In particular, it is claimed that a general approach must take into account the needs, competencies, and goals of the producers, annotators, and consumers of the annotated material. We propose that a user-model based approach is, therefore, necessary.
[ { "version": "v1", "created": "Sat, 23 Oct 2004 00:06:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Ballim", "Afzal", "" ], [ "Fatemi", "Nastaran", "" ], [ "Ghorbel", "Hatem", "" ], [ "Pallotta", "Vincenzo", "" ] ]
cs/0410060
Vincenzo Pallotta
Afzal Ballim, Vincenzo Pallotta
Semantic filtering by inference on domain knowledge in spoken dialogue systems
6 pages
Proceedings of the LREC 2000 Workshop "From spoken dialogue to full natural interactive dialogue. Theory, empirical analysis and evaluation", May 29th, 2000 Athen, Greece
null
null
cs.CL cs.AI cs.HC cs.IR
null
General natural dialogue processing requires large amounts of domain knowledge as well as linguistic knowledge in order to ensure acceptable coverage and understanding. There are several ways of integrating lexical resources (e.g. dictionaries, thesauri) and knowledge bases or ontologies at different levels of dialogue processing. We concentrate in this paper on how to exploit domain knowledge for filtering interpretation hypotheses generated by a robust semantic parser. We use domain knowledge to semantically constrain the hypothesis space. Moreover, adding an inference mechanism allows us to complete the interpretation when information is not explicitly available. Further, we discuss briefly how this can be generalized towards a predictive natural interactive system.
[ { "version": "v1", "created": "Sat, 23 Oct 2004 00:20:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Ballim", "Afzal", "" ], [ "Pallotta", "Vincenzo", "" ] ]
cs/0410061
Vincenzo Pallotta
Vincenzo Pallotta, Hatem Ghorbel, Patrick Ruch, Giovanni Coray
An argumentative annotation schema for meeting discussions
4 pages
Procedings of the LREC 2004 international conference, 26-28 May 2004, Lisbon, Portugal. Pages 1003-1006
null
null
cs.CL cs.DL cs.IR
null
In this article, we are interested in the annotation of transcriptions of human-human dialogue taken from meeting records. We first propose a meeting content model where conversational acts are interpreted with respect to their argumentative force and their role in building the argumentative structure of the meeting discussion. Argumentation in dialogue describes the way participants take part in the discussion and argue their standpoints. Then, we propose an annotation scheme based on such an argumentative dialogue model as well as the evaluation of its adequacy. The obtained higher-level semantic annotations are exploited in the conceptual indexing of the information contained in meeting discussions.
[ { "version": "v1", "created": "Mon, 25 Oct 2004 01:38:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Pallotta", "Vincenzo", "" ], [ "Ghorbel", "Hatem", "" ], [ "Ruch", "Patrick", "" ], [ "Coray", "Giovanni", "" ] ]
cs/0410062
Vincenzo Pallotta
Lonneke van der Plas, Vincenzo Pallotta, Martin Rajman, Hatem Ghorbel
Automatic Keyword Extraction from Spoken Text. A Comparison of two Lexical Resources: the EDR and WordNet
4 pages
Procedings of the LREC 2004 international conference, 26-28 May 2004, Lisbon, Portugal. Pages 2205-2208
null
null
cs.CL cs.DL cs.IR
null
Lexical resources such as WordNet and the EDR electronic dictionary have been used in several NLP tasks. Probably, partly due to the fact that the EDR is not freely available, WordNet has been used far more often than the EDR. We have used both resources on the same task in order to make a comparison possible. The task is automatic assignment of keywords to multi-party dialogue episodes (i.e. thematically coherent stretches of spoken text). We show that the use of lexical resources in such a task results in slightly higher performances than the use of a purely statistically based method.
[ { "version": "v1", "created": "Mon, 25 Oct 2004 01:50:03 GMT" } ]
2007-05-23T00:00:00
[ [ "van der Plas", "Lonneke", "" ], [ "Pallotta", "Vincenzo", "" ], [ "Rajman", "Martin", "" ], [ "Ghorbel", "Hatem", "" ] ]
cs/0410063
Vincenzo Pallotta
Sebastian Moeller, Jan Krebber, Alexander Raake, Paula Smeele, Martin Rajman, Mirek Melichar, Vincenzo Pallotta, Gianna Tsakou, Basilis Kladis, Anestis Vovos, Jettie Hoonhout, Dietmar Schuchardt, Nikos Fakotakis, Todor Ganchev, Ilyas Potamitis
INSPIRE: Evaluation of a Smart-Home System for Infotainment Management and Device Control
4 pages
Procedings of the LREC 2004 international conference, 26-28 May 2004, Lisbon, Portugal. Pages 1603-1606
null
null
cs.HC cs.CL
null
This paper gives an overview of the assessment and evaluation methods which have been used to determine the quality of the INSPIRE smart home system. The system allows different home appliances to be controlled via speech, and consists of speech and speaker recognition, speech understanding, dialogue management, and speech output components. The performance of these components is first assessed individually, and then the entire system is evaluated in an interaction experiment with test users. Initial results of the assessment and evaluation are given, in particular with respect to the transmission channel impact on speech and speaker recognition, and the assessment of speech output for different system metaphors.
[ { "version": "v1", "created": "Mon, 25 Oct 2004 02:17:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Moeller", "Sebastian", "" ], [ "Krebber", "Jan", "" ], [ "Raake", "Alexander", "" ], [ "Smeele", "Paula", "" ], [ "Rajman", "Martin", "" ], [ "Melichar", "Mirek", "" ], [ "Pallotta", "Vincenzo", "" ], [ "Tsakou", "Gianna", "" ], [ "Kladis", "Basilis", "" ], [ "Vovos", "Anestis", "" ], [ "Hoonhout", "Jettie", "" ], [ "Schuchardt", "Dietmar", "" ], [ "Fakotakis", "Nikos", "" ], [ "Ganchev", "Todor", "" ], [ "Potamitis", "Ilyas", "" ] ]
cs/0410064
Joze Balic
J. Balic
Intelligent Computer Numerical Control unit for machine tools
7 pages, 4 figures, 17 references
Neural-Network-Based Numerical Control for Milling Machine, Journal of Intelligent and Robotic System, Volume 40, Issue 4, Aug 2004; Pages: 343-358 (extended version)
null
null
cs.CE
null
The paper describes a new CNC control unit for machining centres with learning ability and automatic intelligent generating of NC programs on the bases of a neural network, which is built-in into a CNC unit as special device. The device performs intelligent and completely automatically the NC part programs only on the bases of 2D, 2,5D or 3D computer model of prismatic part. Intervention of the operator is not needed. The neural network for milling, drilling, reaming, threading and operations alike has learned to generate NC programs in the learning module, which is a part of intelligent CAD/CAM system.
[ { "version": "v1", "created": "Mon, 25 Oct 2004 15:55:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Balic", "J.", "" ] ]
cs/0410066
Xiaoqin Ma
Xiaoqin Ma and Gene Cooperman
Fast Query Processing by Distributing an Index over CPU Caches
New version published at IEEE Cluster Computing 2005
null
null
null
cs.DC cs.PF
null
Data intensive applications on clusters often require requests quickly be sent to the node managing the desired data. In many applications, one must look through a sorted tree structure to determine the responsible node for accessing or storing the data. Examples include object tracking in sensor networks, packet routing over the internet, request processing in publish-subscribe middleware, and query processing in database systems. When the tree structure is larger than the CPU cache, the standard implementation potentially incurs many cache misses for each lookup; one cache miss at each successive level of the tree. As the CPU-RAM gap grows, this performance degradation will only become worse in the future. We propose a solution that takes advantage of the growing speed of local area networks for clusters. We split the sorted tree structure among the nodes of the cluster. We assume that the structure will fit inside the aggregation of the CPU caches of the entire cluster. We then send a word over the network (as part of a larger packet containing other words) in order to examine the tree structure in another node's CPU cache. We show that this is often faster than the standard solution, which locally incurs multiple cache misses while accessing each successive level of the tree.
[ { "version": "v1", "created": "Mon, 25 Oct 2004 22:23:17 GMT" }, { "version": "v2", "created": "Tue, 11 Oct 2005 15:42:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Xiaoqin", "" ], [ "Cooperman", "Gene", "" ] ]
cs/0410067
Richard Troy III
Richard M. Troy III
Computational Unification: a Vision for Connecting Researchers
Three page white-paper which was written for the December 2002 AGU meeting in San Francisco, CA. Also note that the author is Chief Scientist of Science Tools and developed a working system capable of implementing the ideas expressed in this abstract in 1997
null
null
null
cs.DC cs.CY
null
The extent to which the benefits of science can be fully realized depends critically upon the quality of the connection between researchers themselves and between researchers and members of the public. We believe that it is now possible to improve these connections on a community-wide and even world-wide basis through the use of an appropriate information management system. In this paper we explore the concepts and challenges, and propose an architecture for the implementation of such a system. "One of the greatest visions for science is a computational unification in which every researcher can interact with all other researchers through use of their own research system." "These features not only enable research collaboration on a scale never previously envisaged, they also enable sharing and dissemination of scientific knowledge to the public at large with a sophistication unparalleled in history."
[ { "version": "v1", "created": "Tue, 26 Oct 2004 18:21:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Troy", "Richard M.", "III" ] ]
cs/0410068
Zhuowei Li
Zhuowei Li and Amitabha Das
Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors
Submit to journal for publication
null
null
cais-tr-2004-001
cs.CR cs.AI
null
Anomaly-based intrusion detection (AID) techniques are useful for detecting novel intrusions into computing resources. One of the most successful AID detectors proposed to date is stide, which is based on analysis of system call sequences. In this paper, we present a detailed formal framework to analyze, understand and improve the performance of stide and similar AID techniques. Several important properties of stide-like detectors are established through formal proofs, and validated by carefully conducted experiments using test datasets. Finally, the framework is utilized to design two applications to improve the cost and performance of stide-like detectors which are based on sequence analysis. The first application reduces the cost of developing AID detectors by identifying the critical sections in the training dataset, and the second application identifies the intrusion context in the intrusive dataset, that helps to fine-tune the detectors. Such fine-tuning in turn helps to improve detection rate and reduce false alarm rate, thereby increasing the effectiveness and efficiency of the intrusion detectors.
[ { "version": "v1", "created": "Tue, 26 Oct 2004 02:57:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Zhuowei", "" ], [ "Das", "Amitabha", "" ] ]
cs/0410069
Thomas Petermann
Jacomo Corbo and Thomas Petermann
Selfish peering and routing in the Internet
Contribution to the Proceedings of the Complex Systems Summer School 2004, organized by the Santa Fe Institute (6 pages comprising 4 figures)
null
null
null
cs.GT cond-mat.stat-mech cs.NI
null
The Internet is a loose amalgamation of independent service providers acting in their own self-interest. We examine the implications of this economic reality on peering relationships. Specifically, we consider how the incentives of the providers might determine where they choose to interconnect with each other. We consider a game where two selfish network providers must establish peering points between their respective network graphs, given knowledge of traffic conditions and a nearest-exit routing policy for out-going traffic, as well as costs based on congestion and peering connectivity. We focus on the pairwise stability equilibrium concept and use a stochastic procedure to solve for the stochastically pairwise stable configurations. Stochastically stable networks are selected for their robustness to deviations in strategy and are therefore posited as the more likely networks to emerge in a dynamic setting. We note a paucity of stochastically stable peering configurations under asymmetric conditions, particularly to unequal interdomain traffic flow, with adverse effects on system-wide efficiency. Under bilateral flow conditions, we find that as the cost associated with the establishment of peering links approaches zero, the variance in the number of peering links of stochastically pairwise stable equilibria increases dramatically.
[ { "version": "v1", "created": "Tue, 26 Oct 2004 10:14:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Corbo", "Jacomo", "" ], [ "Petermann", "Thomas", "" ] ]
cs/0410070
Giovanni Gasparri
Giovanni Gasparri
Using image partitions in 4th Dimension
4 pages, 3 figures
null
null
null
cs.DB
null
I have plotted an image by using mathematical functions in the Database "4th Dimension". I'm going to show an alternative method to: detect which sector has been clicked; highlight it and combine it with other sectors already highlighted; store the graph information in an efficient way; load and splat image layers to reconstruct the stored graph.
[ { "version": "v1", "created": "Tue, 26 Oct 2004 17:00:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Gasparri", "Giovanni", "" ] ]
cs/0410071
Patrick C. McGuire
Patrick C. McGuire, Jens Ormo, Enrique Diaz-Martinez, Jose Antonio Rodriguez-Manfredi, Javier Gomez-Elvira, Helge Ritter, Markus Oesker, Joerg Ontrup, (Centro de Astrobiologia, Madrid; University of Bielefeld)
The Cyborg Astrobiologist: First Field Experience
29 pages, 10 figures (in press)
Int.J.Astrobiol. 3 (2004) 189-207
10.1017/S147355040500220X
null
cs.CV astro-ph cs.AI cs.CE cs.HC cs.RO cs.SE q-bio.NC
null
We present results from the first geological field tests of the `Cyborg Astrobiologist', which is a wearable computer and video camcorder system that we are using to test and train a computer-vision system towards having some of the autonomous decision-making capabilities of a field-geologist and field-astrobiologist. The Cyborg Astrobiologist platform has thus far been used for testing and development of these algorithms and systems: robotic acquisition of quasi-mosaics of images, real-time image segmentation, and real-time determination of interesting points in the image mosaics. The hardware and software systems function reliably, and the computer-vision algorithms are adequate for the first field tests. In addition to the proof-of-concept aspect of these field tests, the main result of these field tests is the enumeration of those issues that we can improve in the future, including: first, detection and accounting for shadows caused by 3D jagged edges in the outcrop; second, reincorporation of more sophisticated texture-analysis algorithms into the system; third, creation of hardware and software capabilities to control the camera's zoom lens in an intelligent manner; and fourth, development of algorithms for interpretation of complex geological scenery. Nonetheless, despite these technical inadequacies, this Cyborg Astrobiologist system, consisting of a camera-equipped wearable-computer and its computer-vision algorithms, has demonstrated its ability of finding genuinely interesting points in real-time in the geological scenery, and then gathering more information about these interest points in an automated manner.
[ { "version": "v1", "created": "Wed, 27 Oct 2004 09:14:01 GMT" } ]
2007-05-23T00:00:00
[ [ "McGuire", "Patrick C.", "" ], [ "Ormo", "Jens", "" ], [ "Diaz-Martinez", "Enrique", "" ], [ "Rodriguez-Manfredi", "Jose Antonio", "" ], [ "Gomez-Elvira", "Javier", "" ], [ "Ritter", "Helge", "" ], [ "Oesker", "Markus", "" ], [ "Ontrup", "Joerg", "" ] ]
cs/0410072
Igor Potapov
Alexei Lisitsa, Igor Potapov
Temporal logic with predicate abstraction
14 pages, 4 figures
null
null
null
cs.LO cs.CL
null
A predicate linear temporal logic LTL_{\lambda,=} without quantifiers but with predicate abstraction mechanism and equality is considered. The models of LTL_{\lambda,=} can be naturally seen as the systems of pebbles (flexible constants) moving over the elements of some (possibly infinite) domain. This allows to use LTL_{\lambda,=} for the specification of dynamic systems using some resources, such as processes using memory locations, mobile agents occupying some sites, etc. On the other hand we show that LTL_{\lambda,=} is not recursively axiomatizable and, therefore, fully automated verification of LTL_{\lambda,=} specifications is not, in general, possible.
[ { "version": "v1", "created": "Wed, 27 Oct 2004 17:21:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Lisitsa", "Alexei", "" ], [ "Potapov", "Igor", "" ] ]
cs/0410073
Viktor Kuncak
Viktor Kuncak, Martin Rinard
On Spatial Conjunction as Second-Order Logic
16 pages
null
null
MIT CSAIL 970
cs.LO cs.PL cs.SE
null
Spatial conjunction is a powerful construct for reasoning about dynamically allocated data structures, as well as concurrent, distributed and mobile computation. While researchers have identified many uses of spatial conjunction, its precise expressive power compared to traditional logical constructs was not previously known. In this paper we establish the expressive power of spatial conjunction. We construct an embedding from first-order logic with spatial conjunction into second-order logic, and more surprisingly, an embedding from full second order logic into first-order logic with spatial conjunction. These embeddings show that the satisfiability of formulas in first-order logic with spatial conjunction is equivalent to the satisfiability of formulas in second-order logic. These results explain the great expressive power of spatial conjunction and can be used to show that adding unrestricted spatial conjunction to a decidable logic leads to an undecidable logic. As one example, we show that adding unrestricted spatial conjunction to two-variable logic leads to undecidability. On the side of decidability, the embedding into second-order logic immediately implies the decidability of first-order logic with a form of spatial conjunction over trees. The embedding into spatial conjunction also has useful consequences: because a restricted form of spatial conjunction in two-variable logic preserves decidability, we obtain that a correspondingly restricted form of second-order quantification in two-variable logic is decidable. The resulting language generalizes the first-order theory of boolean algebra over sets and is useful in reasoning about the contents of data structures in object-oriented languages.
[ { "version": "v1", "created": "Thu, 28 Oct 2004 15:00:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuncak", "Viktor", "" ], [ "Rinard", "Martin", "" ] ]
cs/0410075
Serban E. Vlad
Serban E. Vlad
Some first thoughts on the stability of the asynchronous systems
12 pages, conference
The 12-th Conference on Applied and Industrial Mathematics CAIM 2004, University of Pitesti, October 15-17, 2004
null
null
cs.GL
null
The (non-initialized, non-deterministic) asynchronous systems (in the input-output sense) are multi-valued functions from m-dimensional signals to sets of n-dimensional signals, the concept being inspired by the modeling of the asynchronous circuits. Our purpose is to state the problem of the their stability.
[ { "version": "v1", "created": "Fri, 29 Oct 2004 12:08:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0411001
Worytkiewicz Krzysztof
Krzysztof Worytkiewicz
Synchronization from a Categorical Perspective
null
null
null
null
cs.PL cs.DM
null
We introduce a notion of synchronization for higher-dimensional automata, based on coskeletons of cubical sets. Categorification transports this notion to the setting of categorical transition systems. We apply the results to study the semantics of an imperative programming language with message-passing.
[ { "version": "v1", "created": "Mon, 1 Nov 2004 16:00:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Worytkiewicz", "Krzysztof", "" ] ]
cs/0411002
Alex Vinokur
Alex Vinokur
Fibonacci-Like Polynomials Produced by m-ary Huffman Codes for Absolutely Ordered Sequences
10 pages, 2 tables
null
null
null
cs.DM math.NT
null
Fibonacci-like polynomials produced by m-ary Huffman codes for absolutely ordered sequences have been described.
[ { "version": "v1", "created": "Mon, 1 Nov 2004 17:03:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Vinokur", "Alex", "" ] ]
cs/0411004
Gianluca Argentini
Gianluca Argentini
Computational Aspects of a Numerical Model for Combustion Flow
9 pages, 4 figures; Talk at Workshop 2004 on Science and Applications of Advanced Computing Paradigms, Centre of Excellence MIUR (prof. Gianfranco Bilardi), Universita' di Padova, Department of Information Engineering, October 28-29, 2004
null
null
null
cs.NA physics.comp-ph
null
A computational method for numeric resolution of a PDEs system, based on a Finite Differences schema integrated by interpolations of partial results, and an estimate of the error of its solution respect to the normal FD solution.
[ { "version": "v1", "created": "Tue, 2 Nov 2004 11:37:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0411005
Manoj Kumar
Sunder Lal and Manoj Kumar
A Directed Threshold - Signature Scheme
10 Pages, No figures
null
null
null
cs.CR
null
Directed signature is the solution of such problems when the signed message contains information sensitive to the signature receiver. Generally, in many application of directed signature, the signer is generally a single person. But when the message is on behalf of an organization, a valid sensitive message may require the approval of several people. Threshold signature schemes are used to solve these problems. This paper presents a threshold directed signature scheme.
[ { "version": "v1", "created": "Tue, 2 Nov 2004 13:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Lal", "Sunder", "" ], [ "Kumar", "Manoj", "" ] ]
cs/0411007
Benoit Masson
Julien Cervelle (IGM), Enrico Formenti (I3S), Benoit Masson (I3S)
Basic properties for sand automata
submitted to STACS 2005
null
null
null
cs.CC
null
We prove several results about the relations between injectivity and surjectivity for sand automata. Moreover, we begin the exploration of the dynamical behavior of sand automata proving that the property of nilpotency is undecidable. We believe that the proof technique used for this last result might reveal useful for many other results in this context.
[ { "version": "v1", "created": "Thu, 4 Nov 2004 12:33:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Cervelle", "Julien", "", "IGM" ], [ "Formenti", "Enrico", "", "I3S" ], [ "Masson", "Benoit", "", "I3S" ] ]
cs/0411009
Serban Vlad E.
Serban E. Vlad
The equations of the ideal latches
16 pages, 18 figures, conference
The 12-th Conference on Applied and Industrial Mathematics CAIM 2004, University of Pitesti, October 15-17, 2004
null
null
cs.GL
null
The latches are simple circuits with feedback from the digital electrical engineering. We have included in our work the C element of Muller, the RS latch, the clocked RS latch, the D latch and also circuits containing two interconnected latches: the edge triggered RS flip-flop, the D flip-flop, the JK flip-flop, the T flip-flop. The purpose of this study is to model with equations the previous circuits, considered to be ideal, i.e. non-inertial. The technique of analysis is the pseudoboolean differential calculus.
[ { "version": "v1", "created": "Fri, 5 Nov 2004 12:38:05 GMT" }, { "version": "v2", "created": "Mon, 8 Nov 2004 07:17:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0411010
Ricardo Corin
Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter Hartel
A Trace Logic for Local Security Properties
New version
null
null
null
cs.CR
null
We propose a new simple \emph{trace} logic that can be used to specify \emph{local security properties}, i.e. security properties that refer to a single participant of the protocol specification. Our technique allows a protocol designer to provide a formal specification of the desired security properties, and integrate it naturally into the design process of cryptographic protocols. Furthermore, the logic can be used for formal verification. We illustrate the utility of our technique by exposing new attacks on the well studied protocol TMN.
[ { "version": "v1", "created": "Fri, 5 Nov 2004 14:39:03 GMT" }, { "version": "v2", "created": "Tue, 30 Nov 2004 17:36:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Corin", "Ricardo", "" ], [ "Durante", "Antonio", "" ], [ "Etalle", "Sandro", "" ], [ "Hartel", "Pieter", "" ] ]
cs/0411013
Timur Friedman
Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella
Efficient Algorithms for Large-Scale Topology Discovery
23 pages
null
null
null
cs.NI
null
There is a growing interest in discovery of internet topology at the interface level. A new generation of highly distributed measurement systems is currently being deployed. Unfortunately, the research community has not examined the problem of how to perform such measurements efficiently and in a network-friendly manner. In this paper we make two contributions toward that end. First, we show that standard topology discovery methods (e.g., skitter) are quite inefficient, repeatedly probing the same interfaces. This is a concern, because when scaled up, such methods will generate so much traffic that they will begin to resemble DDoS attacks. We measure two kinds of redundancy in probing (intra- and inter-monitor) and show that both kinds are important. We show that straightforward approaches to addressing these two kinds of redundancy must take opposite tacks, and are thus fundamentally in conflict. Our second contribution is to propose and evaluate Doubletree, an algorithm that reduces both types of redundancy simultaneously on routers and end systems. The key ideas are to exploit the tree-like structure of routes to and from a single point in order to guide when to stop probing, and to probe each path by starting near its midpoint. Our results show that Doubletree can reduce both types of measurement load on the network dramatically, while permitting discovery of nearly the same set of nodes and links. We then show how to enable efficient communication between monitors through the use of Bloom filters.
[ { "version": "v1", "created": "Sun, 7 Nov 2004 21:39:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Donnet", "Benoit", "" ], [ "Raoult", "Philippe", "" ], [ "Friedman", "Timur", "" ], [ "Crovella", "Mark", "" ] ]
cs/0411015
Ziny Flikop
Ziny Flikop
Bounded Input Bounded Predefined Control Bounded Output
8 pages, 6 figures
null
null
null
cs.AI
null
The paper is an attempt to generalize a methodology, which is similar to the bounded-input bounded-output method currently widely used for the system stability studies. The presented earlier methodology allows decomposition of input space into bounded subspaces and defining for each subspace its bounding surface. It also defines a corresponding predefined control, which maps any point of a bounded input into a desired bounded output subspace. This methodology was improved by providing a mechanism for the fast defining a bounded surface. This paper presents enhanced bounded-input bounded-predefined-control bounded-output approach, which provides adaptability feature to the control and allows transferring of a controlled system along a suboptimal trajectory.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 01:52:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Flikop", "Ziny", "" ] ]
cs/0411017
Srikant Sharma
Srikant Sharma
Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective
null
null
null
null
cs.NI
null
Wireless LANs have achieved a tremendous amount of growth in recent years. Among various wireless LAN technologies, the IEEE 802.11b based wireless LAN technology can be cited as the most prominent technology today. Despite being widely deployed, 802.11b cannot be termed as a well matured technology. Although 802.11b is adequate for basic connectivity and packet switching, It is evident that there is ample scope for its improvement in areas like quality of service, fairness, performance, security, etc. In this survey report, we identify and argue that the Medium Access Controller for 802.11b networks is the prime area for these improvements. To enunciate our claims we highlight some of the quality of service, fairness, and performance issues related to 802.11b MAC. We also describe and analyze some of the current research aimed at addressing these issues. We then propose a novel scheme called the Intelligent Collision Avoidance, seeking to enhance the MAC to address some of the performance issues in 802.11b and similar networks.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 19:32:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Sharma", "Srikant", "" ] ]
cs/0411018
Vedran Kordic
Pedro U. Lima & Luis M. M. Custodio
Artificial Intelligence and Systems Theory: Applied to Cooperative Robots
null
International Journal of Advanced Robotic Systems, ISSN 1729-8806, Volume 1, Number 3 September 2004, pp.141-148
null
null
cs.RO cs.AI
null
This paper describes an approach to the design of a population of cooperative robots based on concepts borrowed from Systems Theory and Artificial Intelligence. The research has been developed under the SocRob project, carried out by the Intelligent Systems Laboratory at the Institute for Systems and Robotics - Instituto Superior Tecnico (ISR/IST) in Lisbon. The acronym of the project stands both for "Society of Robots" and "Soccer Robots", the case study where we are testing our population of robots. Designing soccer robots is a very challenging problem, where the robots must act not only to shoot a ball towards the goal, but also to detect and avoid static (walls, stopped robots) and dynamic (moving robots) obstacles. Furthermore, they must cooperate to defeat an opposing team. Our past and current research in soccer robotics includes cooperative sensor fusion for world modeling, object recognition and tracking, robot navigation, multi-robot distributed task planning and coordination, including cooperative reinforcement learning in cooperative and adversarial environments, and behavior-based architectures for real time task execution of cooperating robot teams.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:41:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Lima", "Pedro U.", "" ], [ "Custodio", "Luis M. M.", "" ] ]
cs/0411020
Vedran Kordic
A. Albagul and Wahyudi
Dynamic Modelling and Adaptive Traction Control for Mobile Robots
null
International Journal of Advanced Robotic Systems, Volume 1, Number 3, September 2004, pp.149-154
null
null
cs.RO
null
Mobile robots have received a great deal of research in recent years. A significant amount of research has been published in many aspects related to mobile robots. Most of the research is devoted to design and develop some control techniques for robot motion and path planning. A large number of researchers have used kinematic models to develop motion control strategy for mobile robots. Their argument and assumption that these models are valid if the robot has low speed, low acceleration and light load. However, dynamic modelling of mobile robots is very important as they are designed to travel at higher speed and perform heavy duty work. This paper presents and discusses a new approach to develop a dynamic model and control strategy for wheeled mobile robot which I modelled as a rigid body that roles on two wheels and a castor. The motion control strategy consists of two levels. The first level is dealing with the dynamic of the system and denoted as Low level controller. The second level is developed to take care of path planning and trajectory generation.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:44:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Albagul", "A.", "" ], [ "Wahyudi", "", "" ] ]
cs/0411021
Vedran Kordic
Luo Ronghua & Hong Bingrong
Coevolution Based Adaptive Monte Carlo Localization (CEAMCL)
null
International Journal of Advanced Robotic Systems, Volume 1, Number 3, September 2004, pp. 183-190
null
null
cs.RO
null
An adaptive Monte Carlo localization algorithm based on coevolution mechanism of ecological species is proposed. Samples are clustered into species, each of which represents a hypothesis of the robots pose. Since the coevolution between the species ensures that the multiple distinct hypotheses can be tracked stably, the problem of premature convergence when using MCL in highly symmetric environments can be solved. And the sample size can be adjusted adaptively over time according to the uncertainty of the robots pose by using the population growth model. In addition, by using the crossover and mutation operators in evolutionary computation, intra-species evolution can drive the samples move towards the regions where the desired posterior density is large. So a small size of samples can represent the desired density well enough to make precise localization. The new algorithm is termed coevolution based adaptive Monte Carlo localization (CEAMCL). Experiments have been carried out to prove the efficiency of the new localization algorithm.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:45:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Ronghua", "Luo", "" ], [ "Bingrong", "Hong", "" ] ]
cs/0411022
Vedran Kordic
Richard Szabo
Topological Navigation of Simulated Robots using Occupancy Grid
null
International Journal of Advanced Robotic Systems, ISSN 1729-8806, Volume 1, Number 3 (2004), pp.201-206
null
null
cs.RO cs.AI
null
Formerly I presented a metric navigation method in the Webots mobile robot simulator. The navigating Khepera-like robot builds an occupancy grid of the environment and explores the square-shaped room around with a value iteration algorithm. Now I created a topological navigation procedure based on the occupancy grid process. The extension by a skeletonization algorithm results a graph of important places and the connecting routes among them. I also show the significant time profit gained during the process.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:22:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Szabo", "Richard", "" ] ]
cs/0411023
Vedran Kordic
Changda Wang, Xianyi Chen, Xibin Zhao & Shiguang Ju
Design and Implementation of a General Decision-making Model in RoboCup Simulation
null
International Journal of Advanced Robotic Systems, ISSN 1729-8806, Volume 1, Number 3 (2004), pp.207-112
null
null
cs.RO
null
The study of the collaboration, coordination and negotiation among different agents in a multi-agent system (MAS) has always been the most challenging yet popular in the research of distributed artificial intelligence. In this paper, we will suggest for RoboCup simulation, a typical MAS, a general decision-making model, rather than define a different algorithm for each tactic (e.g. ball handling, pass, shoot and interception, etc.) in soccer games as most RoboCup simulation teams did. The general decision-making model is based on two critical factors in soccer games: the vertical distance to the goal line and the visual angle for the goalpost. We have used these two parameters to formalize the defensive and offensive decisions in RoboCup simulation and the results mentioned above had been applied in NOVAURO, original name is UJDB, a RoboCup simulation team of Jiangsu University, whose decision-making model, compared with that of Tsinghua University, the world champion team in 2001, is a universal model and easier to be implemented.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:24:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Changda", "" ], [ "Chen", "Xianyi", "" ], [ "Zhao", "Xibin", "" ], [ "Ju", "Shiguang", "" ] ]
cs/0411024
Vedran Kordic
Alex Ellery
Space Robotics Part 2: Space-based Manipulators
null
International Journal of Advanced Robotic Systems, ISSN 1729-8806, Volume 1, Number 3 (2004), pp.213-216
null
null
cs.RO
null
In this second of three short papers, I introduce some of the basic concepts of space robotics with an emphasis on some specific challenging areas of research that are peculiar to the application of robotics to space infrastructure development. The style of these short papers is pedagogical and the concepts in this paper are developed from fundamental manipulator robotics. This second paper considers the application of space manipulators to on-orbit servicing (OOS), an application which has considerable commercial application. I provide some background to the notion of robotic on-orbit servicing and explore how manipulator control algorithms may be modified to accommodate space manipulators which operate in the micro-gravity of space.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:28:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Ellery", "Alex", "" ] ]
cs/0411025
Vedran Kordic
Yoseph Bar-Cohen
Bionic Humans Using EAP as Artificial Muscles Reality and Challenges
null
International Journal of Advanced Robotic Systems, ISSN 1729-8806, Volume 1, Number 3 (2004), pp.217-222
null
null
cs.RO cs.AI
null
For many years, the idea of a human with bionic muscles immediately conjures up science fiction images of a TV series superhuman character that was implanted with bionic muscles and portrayed with strength and speed far superior to any normal human. As fantastic as this idea may seem, recent developments in electroactive polymers (EAP) may one day make such bionics possible. Polymers that exhibit large displacement in response to stimulation that is other than electrical signal were known for many years. Initially, EAP received relatively little attention due to their limited actuation capability. However, in the recent years, the view of the EAP materials has changed due to the introduction of effective new materials that significantly surpassed the capability of the widely used piezoelectric polymer, PVDF. As this technology continues to evolve, novel mechanisms that are biologically inspired are expected to emerge. EAP materials can potentially provide actuation with lifelike response and more flexible configurations. While further improvements in performance and robustness are still needed, there already have been several reported successes. In recognition of the need for cooperation in this multidisciplinary field, the author initiated and organized a series of international forums that are leading to a growing number of research and development projects and to great advances in the field. In 1999, he challenged the worldwide science and engineering community of EAP experts to develop a robotic arm that is actuated by artificial muscles to win a wrestling match against a human opponent. In this paper, the field of EAP as artificial muscles will be reviewed covering the state of the art, the challenges and the vision for the progress in future years.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:32:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Bar-Cohen", "Yoseph", "" ] ]
cs/0411026
Boris Tylevich
Boris Mark Tylevich (Moscow Institute of Physics and Technology, Moscow, Russia)
A Search Relevancy Tuning Method Using Expert Results Content Evaluation
10 pages, 2 figures
null
null
null
cs.IR
null
The article presents an online relevancy tuning method using explicit user feedback. The author developed and tested a method of words' weights modification based on search result evaluation by user. User decides whether the result is useful or not after inspecting the full result content. The experiment proved that the constantly accumulated words weights base leads to better search quality in a specified data domain. The author also suggested future improvements of the method.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:49:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Tylevich", "Boris Mark", "", "Moscow Institute of Physics and Technology,\n Moscow, Russia" ] ]
cs/0411027
Vlady Ravelomanana
Vlady Ravelomanana (LIPN)
Extremal Properties of Three Dimensional Sensor Networks with Applications
null
IEEE Transactions on Mobile Computing Vol 3 (2004) pages 246--257
null
null
cs.DS cs.DC cs.DM
null
In this paper, we analyze various critical transmitting/sensing ranges for connectivity and coverage in three-dimensional sensor networks. As in other large-scale complex systems, many global parameters of sensor networks undergo phase transitions: For a given property of the network, there is a critical threshold, corresponding to the minimum amount of the communication effort or power expenditure by individual nodes, above (resp. below) which the property exists with high (resp. a low) probability. For sensor networks, properties of interest include simple and multiple degrees of connectivity/coverage. First, we investigate the network topology according to the region of deployment, the number of deployed sensors and their transmitting/sensing ranges. More specifically, we consider the following problems: Assume that $n$ nodes, each capable of sensing events within a radius of $r$, are randomly and uniformly distributed in a 3-dimensional region $\mathcal{R}$ of volume $V$, how large must the sensing range be to ensure a given degree of coverage of the region to monitor? For a given transmission range, what is the minimum (resp. maximum) degree of the network? What is then the typical hop-diameter of the underlying network? Next, we show how these results affect algorithmic aspects of the network by designing specific distributed protocols for sensor networks.
[ { "version": "v1", "created": "Wed, 10 Nov 2004 09:10:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
cs/0411028
Ignatios Souvatzis
Ignatios Souvatzis
A machine-independent port of the SR language run-time system to the NetBSD operating system
presented at 3rd European BSD Conference, Karlsruhe, Germany, 2004 Oct. 29-31; 4 pages
Juergen Egeling (Ed.): Proceedings of the 3rd European BSD Conference, Karlsruhe, Germany 2004, p.181
null
null
cs.DC cs.PL
null
SR (synchronizing resources) is a PASCAL - style language enhanced with constructs for concurrent programming developed at the University of Arizona in the late 1980s. MPD (presented in Gregory Andrews' book about Foundations of Multithreaded, Parallel, and Distributed Programming) is its successor, providing the same language primitives with a different syntax. The run-time system (in theory, identical) of both languages provides the illusion of a multiprocessor machine on a single single- or multi- CPU Unix-like system or a (local area) network of Unix-like machines. Chair V of the Computer Science Department of the University of Bonn is operating a laboratory for a practical course in parallel programming consisting of computing nodes running NetBSD/arm, normally used via PVM, MPI etc. We are considering to offer SR and MPD for this, too. As the original language distributions are only targeted at a few commercial Unix systems, some porting effort is needed, outlined in the SR porting guide. The integrated POSIX threads support of NetBSD-2.0 should allow us to use library primitives provided for NetBSD's phtread system to implement the primitives needed by the SR run-time system, thus implementing 13 target CPUs at once and automatically making use of SMP on VAX, Alpha, PowerPC, Sparc, 32-bit Intel and 64 bit AMD CPUs. This paper describes work in progress.
[ { "version": "v1", "created": "Wed, 10 Nov 2004 12:39:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Souvatzis", "Ignatios", "" ] ]
cs/0411029
Virgile Mogbil
Christophe Fouquere and Virgile Mogbil
Modules and Logic Programming
null
null
null
null
cs.LO
null
We study conditions for a concurrent construction of proof-nets in the framework developed by Andreoli in recent papers. We define specific correctness criteria for that purpose. We first study closed modules (i.e. validity of the execution of a logic program), then extend the criterion to open modules (i.e. validity during the execution) distinguishing criteria for acyclicity and connectability in order to allow incremental verification.
[ { "version": "v1", "created": "Wed, 10 Nov 2004 14:01:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Fouquere", "Christophe", "" ], [ "Mogbil", "Virgile", "" ] ]
cs/0411030
Paolo D'Arco
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, and Ljupco Kocarev
Security of public key cryptosystems based on Chebyshev Polynomials
Submitted for publication
null
null
null
cs.CR
null
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries if the cryptosystem is used for signing messages. Then, we point out that also other primitives, a Diffie-Hellman like key agreement scheme and an authentication scheme, designed along the same lines of the cryptosystem, are not secure due to the aforementioned attack. We close the paper by discussing the issues and the possibilities of constructing public key cryptosystems on real numbers.
[ { "version": "v1", "created": "Wed, 10 Nov 2004 15:29:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Bergamo", "Pina", "" ], [ "D'Arco", "Paolo", "" ], [ "De Santis", "Alfredo", "" ], [ "Kocarev", "Ljupco", "" ] ]
cs/0411032
Riccardo Pucella
Riccardo Pucella
Logic Column 10: Specifying Confidentiality
12 pages
SIGACT News, 35(4), pp. 72-83, 2004
null
null
cs.LO
null
This article illustrates the use of a logical specification language to capture various forms of confidentiality properties used in the security literature.
[ { "version": "v1", "created": "Thu, 11 Nov 2004 19:09:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
cs/0411033
Mircea Alexandru Popescu Moscu
Mircea Alexandru Popescu Moscu
On Invariance and Convergence in Time Complexity theory
null
null
null
null
cs.CC
null
This article introduces three invariance principles under which P is different from NP. In the second part a theorem of convergence is proven. This theorem states that for any language L there exists an infinite sequence of languages from O(n) that converges to L.
[ { "version": "v1", "created": "Thu, 11 Nov 2004 21:32:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Moscu", "Mircea Alexandru Popescu", "" ] ]
cs/0411035
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
A FP-Tree Based Approach for Mining All Strongly Correlated Pairs without Candidate Generation
null
null
null
TR-04-06
cs.DB cs.AI
null
Given a user-specified minimum correlation threshold and a transaction database, the problem of mining all-strong correlated pairs is to find all item pairs with Pearson's correlation coefficients above the threshold . Despite the use of upper bound based pruning technique in the Taper algorithm [1], when the number of items and transactions are very large, candidate pair generation and test is still costly. To avoid the costly test of a large number of candidate pairs, in this paper, we propose an efficient algorithm, called Tcp, based on the well-known FP-tree data structure, for mining the complete set of all-strong correlated item pairs. Our experimental results on both synthetic and real world datasets show that, Tcp's performance is significantly better than that of the previously developed Taper algorithm over practical ranges of correlation threshold specifications.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 12:02:17 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0411037
Tetsushi Matsui
Tetsushi Matsui
A Note on Bulk Quantum Turing Machine
8 pages
null
null
null
cs.CC
null
Recently, among experiments for realization of quantum computers, NMR quantum computers have achieved the most impressive succession. There is a model of the NMR quantum computation,namely Atsumi and Nishino's bulk quantum Turing Machine. It assumes, however, an unnatural assumption with quantum mechanics. We, then, define a more natural and quantum mechanically realizable modified bulk quantum Turing Machine, and show its computational ability by comparing complexity classes with quantum Turing Machine's counter part.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 18:56:15 GMT" }, { "version": "v2", "created": "Sat, 13 Nov 2004 01:01:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Matsui", "Tetsushi", "" ] ]
cs/0411038
Shajee Mohan B. S.
B.S. Shajeemohan
Impact of IT on Higher education Through Continuing Education
null
null
null
null
cs.CY
null
Information Technology is emerging to be the technology of 21st century. The paradigm shift from industrial society to information society had already become a reality! It is indeed high time to think about integrating IT in all facets of education -- may it be in secondary level, or be it in reskilling the employed ones. This paper discusses various issues in incorporating IT in various levels of education, and the need to think about a task force to counter the so-called slow down and recession in IT industry. The opportunities for aspiring IT professionals were also discussed. The importance of reskilling as a continuing education programme to make the people aware of the changing trends in IT was also discussed.
[ { "version": "v1", "created": "Mon, 15 Nov 2004 09:45:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Shajeemohan", "B. S.", "" ] ]
cs/0411039
Ioan Raicu
Ioan Raicu, Owen Richter, Loren Schwiebert, Sherali Zeadally
Using Wireless Sensor Networks to Narrow the Gap between Low-Level Information and Context-Awareness
Published at ISCA 17th International Conference on Computers and Their Applications, CATA 2002, April 2002, San Francisco, California, USA. 6 pages
null
null
null
cs.NI
null
Wireless sensor networks are finally becoming a reality. In this paper, we present a scalable architecture for using wireless sensor networks in combination with wireless Ethernet networks to provide a complete end-to-end solution to narrow the gap between the low-level information and context awareness. We developed and implemented a complete proximity detector in order to give a wearable computer, such as a PDA, location context. Since location is only one element of contextawareness, we pursued utilizing photo sensors and temperature sensors in learning as much as possible about the environment. We used the TinyOS RF Motes as our test bed WSN (Wireless Sensor Network), 802.11 compatible hardware as our wireless Ethernet network, and conventional PCs and wired 802.3 networks to build the upper levels of the architecture.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:52:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Raicu", "Ioan", "" ], [ "Richter", "Owen", "" ], [ "Schwiebert", "Loren", "" ], [ "Zeadally", "Sherali", "" ] ]
cs/0411040
Ioan Raicu
Ioan Raicu
Efficient Even Distribution of Power Consumption in Wireless Sensor Networks
Published at ISCA 18th International Conference on Computers and Their Applications, CATA 2003, March 2003, Honolulu, Hawaii, USA. 4 pages
null
null
null
cs.NI
null
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the energy dissipated throughout the wireless sensor network in order to minimize maintenance and maximize overall system performance. We investigate a new routing algorithm that uses diffusion in order to achieve relatively even power dissipation throughout a wireless sensor network by making good local decisions. We leverage from concepts of peer-to-peer networks in which the system acts completely decentralized and all nodes in the network are equal peers. Our algorithm utilizes the node load, power levels, and spatial information in order to make the optimal routing decision. According to our preliminary experimental results, our proposed algorithm performs well according to its goals.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:55:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Raicu", "Ioan", "" ] ]
cs/0411041
Sabu Thampu m
Sabu .M Thampi, K. Chandra Sekaran
Content Based Image Retrieval with Mobile Agents and Steganography
6 pages, 10 figures
null
null
null
cs.CR
null
In this paper we present an image retrieval system based on Gabor texture features, steganography, and mobile agents.. By employing the information hiding technique, the image attributes can be hidden in an image without degrading the image quality. Thus the image retrieval process becomes simple. Java based mobile agents manage the query phase of the system. Based on the simulation results, the proposed system not only shows the efficiency in hiding the attributes but also provides other advantages such as: (1) fast transmission of the retrieval image to the receiver, (2) searching made easy.
[ { "version": "v1", "created": "Mon, 15 Nov 2004 08:53:15 GMT" }, { "version": "v2", "created": "Mon, 19 Jun 2006 08:48:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Thampi", "Sabu . M", "" ], [ "Sekaran", "K. Chandra", "" ] ]
cs/0411042
Ioan Raicu
Ioan Raicu
An Empirical Analysis of Internet Protocol Version 6 (IPv6)
Master Thesis, May 2002, Computer Science Department, Wayne State University, Detroit, Michigan, USA, 146 pages
null
null
null
cs.NI cs.PF
null
Although the current Internet Protocol known as IPv4 has served its purpose for over 20 years, its days are numbered. With IPv6 reaching a mature enough level, there is a need to evaluate the performance benefits or drawbacks that the new IPv6 protocol will have in comparison to the well established IPv4 protocol. Theoretically, the overhead between the two different protocols should be directly proportional to the difference in the packet's header size, however according to our findings, the empirical performance difference between IPv4 and IPv6, especially when the transition mechanisms are taken into consideration, is much larger than anticipated. We first examine the performance of each protocol independently. We then examined two transition mechanisms which perform the encapsulation at various points in the network: host-to-host and router-to-router (tunneling). Our experiments were conducted using two dual stack (IPv4/IPv6) routers using end nodes running both Windows 2000 and Solaris 8.0 in order to compare two different IPv6 implementations side by side. Our tests were written in C++ and utilized metrics such as latency, throughput, CPU utilization, socket creation time, socket connection time, web server simulation, and a video client/server application for TCP/UDP in IPv4/IPv6 under both Windows 2000 and Solaris 8.0. Our empirical evaluation proved that IPv6 is not yet a mature enough technology and that it is still years away from having consistent and good enough implementations, as the performance of IPv6 in many cases proved to be significantly worse than IPv4.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:31:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Raicu", "Ioan", "" ] ]
cs/0411043
Ioan Raicu
Ioan Raicu, Loren Schwiebert, Scott Fowler, Sandeep K.S. Gupta
e3D: An Energy-Efficient Routing Algorithm for Wireless Sensor Networks
Accepted for publication at IEEE ISSNIP 2004 (The International Conference on Intelligent Sensors, Sensor Networks and Information Processing), Melbourne, Australia, December 2004. 6 pages
null
null
null
cs.NI
null
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the energy dissipated throughout the wireless sensor network in order to minimize maintenance and maximize overall system performance. Any communication protocol that involves synchronization of peer nodes incurs some overhead for setting up the communication. We introduce a new algorithm, e3D (energy-efficient Distributed Dynamic Diffusion routing algorithm), and compare it to two other algorithms, namely directed, and random clustering communication. We take into account the setup costs and analyze the energy-efficiency and the useful lifetime of the system. In order to better understand the characteristics of each algorithm and how well e3D really performs, we also compare e3D with its optimum counterpart and an optimum clustering algorithm. The benefit of introducing these ideal algorithms is to show the upper bound on performance at the cost of an astronomical prohibitive synchronization costs. We compare the algorithms in terms of system lifetime, power dissipation distribution, cost of synchronization, and simplicity of the algorithm. Our simulation results show that e3D performs comparable to its optimal counterpart while having significantly less overhead.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:40:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Raicu", "Ioan", "" ], [ "Schwiebert", "Loren", "" ], [ "Fowler", "Scott", "" ], [ "Gupta", "Sandeep K. S.", "" ] ]
cs/0411044
Ioan Raicu
Ioan Raicu
Routing Algorithms for Wireless Sensor Networks
Poster at Grace Hopper Celebration of Women in Computing 2002, GHC2002, October 2002, British Columbia, Canada
null
null
null
cs.NI
null
Our contribution in this paper is e3D, a diffusion based routing protocol that prolongs the system lifetime, evenly distributes the power dissipation throughout the network, and incurs minimal overhead for synchronizing communication. We compare e3D with other algorithms in terms of system lifetime, power dissipation distribution, cost of synchronization, and simplicity of the algorithm.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:42:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Raicu", "Ioan", "" ] ]
cs/0411045
Catalin Dumitrescu
Catalin Dumitrescu, Ian Foster
Usage Policy-based CPU Sharing in VOs
null
null
null
null
cs.DC
null
Resource sharing within Grid collaborations usually implies specific sharing mechanisms at participating sites. Challenging policy issues can arise within virtual organizations (VOs) that integrate participants and resources spanning multiple physical institutions. Resource owners may wish to grant to one or more VOs the right to use certain resources subject to local policy and service level agreements, and each VO may then wish to use those resources subject to VO policy. Thus, we must address the question of what usage policies (UPs) should be considered for resource sharing in VOs. As a first step in addressing this question, we develop and evaluate different UP scenarios within a specialized context that mimics scientific Grids within which the resources to be shared are computers. We also present a UP architecture and define roles and functions for scheduling resources in such grid environments while satisfying resource owner policies.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:48:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Dumitrescu", "Catalin", "" ], [ "Foster", "Ian", "" ] ]
cs/0411046
Jesse Bridgewater
Jesse S. A. Bridgewater, P. Oscar Boykin and Vwani P. Roychowdhury
Balanced Overlay Networks (BON): Decentralized Load Balancing via Self-Organized Random Networks
13 pages, 12 figures. Draft submitted to IEEE TPDS
null
null
null
cs.DC
null
We present a novel framework, called balanced overlay networks (BON), that provides scalable, decentralized load balancing for distributed computing using large-scale pools of heterogeneous computers. Fundamentally, BON encodes the information about each node's available computational resources in the structure of the links connecting the nodes in the network. This distributed encoding is self-organized, with each node managing its in-degree and local connectivity via random-walk sampling. Assignment of incoming jobs to nodes with the most free resources is also accomplished by sampling the nodes via short random walks. Extensive simulations show that the resulting highly dynamic and self-organized graph structure can efficiently balance computational load throughout large-scale networks. These simulations cover a wide spectrum of cases, including significant heterogeneity in available computing resources and high burstiness in incoming load. We provide analytical results that prove BON's scalability for truly large-scale networks: in particular we show that under certain ideal conditions, the network structure converges to Erdos-Renyi (ER) random graphs; our simulation results, however, show that the algorithm does much better, and the structures seem to approach the ideal case of d-regular random graphs. We also make a connection between highly-loaded BONs and the well-known ball-bin randomized load balancing framework.
[ { "version": "v1", "created": "Mon, 15 Nov 2004 20:05:00 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2006 09:43:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Bridgewater", "Jesse S. A.", "" ], [ "Boykin", "P. Oscar", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
cs/0411050
Darran Nathan
Darran Nathan, Ralf Clemens
Utilizing Reconfigurable Hardware Processors via Grid Services
3 pages, 8 figures
null
null
null
cs.DC cs.AR
null
Computational grids typically consist of nodes utilizing ordinary processors such as the Intel Pentium. Field Programmable Gate Arrays (FPGAs) are able to perform certain compute-intensive tasks very well due to their inherent parallel architecture, often resulting in orders of magnitude speedups. This paper explores how FPGAs can be transparently exposed for remote use via grid services, by integrating the Proteus Software Platform with the Globus Toolkit 3.0.
[ { "version": "v1", "created": "Tue, 16 Nov 2004 01:49:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Nathan", "Darran", "" ], [ "Clemens", "Ralf", "" ] ]
cs/0411051
Timur Friedman
Jeremie Leguay and Matthieu Latapy and Timur Friedman and Kave Salamatian
Describing and Simulating Internet Routes
13 pages
null
null
null
cs.NI
null
This paper introduces relevant statistics for the description of routes in the internet, seen as a graph at the interface level. Based on the observed properties, we propose and evaluate methods for generating artificial routes suitable for simulation purposes. The work in this paper is based upon a study of over seven million route traces produced by CAIDA's skitter infrastructure.
[ { "version": "v1", "created": "Tue, 16 Nov 2004 03:43:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Leguay", "Jeremie", "" ], [ "Latapy", "Matthieu", "" ], [ "Friedman", "Timur", "" ], [ "Salamatian", "Kave", "" ] ]
cs/0411052
Olivier Mazet
H. Soula, G. Beslon, O. Mazet
Spontaneous Dynamics of Asymmetric Random Recurrent Spiking Neural Networks
28 pages, 7 figures
null
null
null
cs.NE math.PR
null
We study in this paper the effect of an unique initial stimulation on random recurrent networks of leaky integrate and fire neurons. Indeed given a stochastic connectivity this so-called spontaneous mode exhibits various non trivial dynamics. This study brings forward a mathematical formalism that allows us to examine the variability of the afterward dynamics according to the parameters of the weight distribution. Provided independence hypothesis (e.g. in the case of very large networks) we are able to compute the average number of neurons that fire at a given time -- the spiking activity. In accordance with numerical simulations, we prove that this spiking activity reaches a steady-state, we characterize this steady-state and explore the transients.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 10:04:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Soula", "H.", "" ], [ "Beslon", "G.", "" ], [ "Mazet", "O.", "" ] ]
cs/0411053
Didier Donsez
Areski Flissi (JACQUARD Ur-F Lifl), Philippe Merle (JACQUARD Ur-F Lifl)
Vers un environnement multi personnalites pour la configuration et le deploiement d'applications a base de composants logiciels
null
DECOR04 (2004) 3-14
null
null
cs.NI
null
The multiplication of architecture description languages, component models and platforms implies a serious dilemma for component based software architects. On the one hand, they have to choose a language to describe concrete configurations which will be automatically deployed on execution platforms. On the other hand, they wish to capitalize their software architectures independently of any description languages or platforms. To solve this problem, we propose a multi personalities environment for the configuration and the deployment of component based applications. This environment is composed of a core capturing a canonical model of configuration and deployment, and a set of personalities tailored to languages and platforms. This paper details the architecture of such an environment and describes the personalities for the CORBA and Fractal component models.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:08:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Flissi", "Areski", "", "JACQUARD Ur-F Lifl" ], [ "Merle", "Philippe", "", "JACQUARD Ur-F\n Lifl" ] ]
cs/0411054
Didier Donsez
Francois Exertier
J2EE Deployment: The JOnAS Case Study
null
DECOR04 (2004) 27-36
null
null
cs.NI
null
La specification J2EE (Java 2 platform Enterprise Edition) definit une architecture de serveur d'application Java. Jusqu'a J2EE 1.3, seuls les aspects de deploiement concernant le developpeur d'applications etaient adresses. Avec J2EE 1.4, les interfaces et les etapes de deploiement ont ete plus precisement specifiees dans la specification "J2EE Deployment". JOnAS (Java Open Application Server) est une plate-forme J2EE developpee au sein du consortium ObjectWeb. Les aspects deploiement sont en cours de developpement. Cet article decrit les concepts lies au deploiement dans J2EE, ainsi que les problematiques levees lors de leur mise en oeuvre pour JOnAS. Il n'a pas pour but de presenter un travail abouti, mais illustre le deploiement par un cas concret et ebauche une liste de besoins non encore satisfaits dans le domaine. ----- The J2EE (Java 2 platform Enterprise Edition) specification defines an architecture for Java Application Servers. Until J2EE 1.3, the deployment aspect was addressed from the developer point of view only. Since J2EE 1.4, deployment APIs and steps have been more precisely specified within the "J2EE Deployment Specification". JOnAS (Java Open Application Server) is a J2EE platform implementation by ObjectWeb. The deployment aspects are under development. This article describes the J2EE Deployment concepts, and the issues raised when implementing deployment features within JOnAS. It does not provide a complete solution, but illustrates deployment through a concrete example and initiates a list of non fulfilled requirements.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:26:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Exertier", "Francois", "" ] ]
cs/0411055
Didier Donsez
Laurent Charles, Manuel Vacelet, Mohamed Chaari, Miguel Santana
SDS : Une infrastructure d'installation de logiciels libres pour des organisations multi-sites
null
DECOR04 (2004) 37-48
null
null
cs.NI
null
Les developpements logiciels sur les systemes UNIX font de plus en plus appel aux logiciels libres. Nous proposons une solution de deploiement et de controle de ces logiciels libres au sein d'une grande organisation. Nous nous attachons particulierement a resoudre les problemes lies au deploiement multi-sites ainsi qu'a la gestion de configuration de ces deploiements. L'originalite de notre approche repose sur sa capacite a etre mise en oeuvre et controlee par les utilisateurs plutot que par les administrateurs, sans necessiter d'expertise particuliere, et par les possibilites de deploiement dans des environnements heterogenes. ----- Free and open source software is more and more used for software developments on UNIX systems. We are proposing a solution to control the deployment of free software in the context of a large corporation, focusing on multi-site deployment and configuration management. The originality of our approach rests on its ability to be implemented and controlled by users rather than administrators, without requiring any particular expertise, and on its facility to be deployed in heterogeneous environments.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:27:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Charles", "Laurent", "" ], [ "Vacelet", "Manuel", "" ], [ "Chaari", "Mohamed", "" ], [ "Santana", "Miguel", "" ] ]
cs/0411056
Didier Donsez
Marcel Cremene, Michel Riveill, Christian Martel, Calin Loghin, Costin Miron
Adaptation dynamique de services
null
DECOR04 (2004) 53-64
null
null
cs.NI
null
This paper proposes a software architecture for dynamical service adaptation. The services are constituted by reusable software components. The adaptation's goal is to optimize the service function of their execution context. For a first step, the context will take into account just the user needs but other elements will be added. A particular feature in our proposition is the profiles that are used not only to describe the context's elements but also the components itself. An Adapter analyzes the compatibility between all these profiles and detects the points where the profiles are not compatibles. The same Adapter search and apply the possible adaptation solutions: component customization, insertion, extraction or replacement.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:31:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Cremene", "Marcel", "" ], [ "Riveill", "Michel", "" ], [ "Martel", "Christian", "" ], [ "Loghin", "Calin", "" ], [ "Miron", "Costin", "" ] ]
cs/0411057
Didier Donsez
Jasminka Matevska-Meyer, Sascha Olliges, Wilhelm Hasselbring
Runtime Reconfiguration of J2EE Applications
null
DECOR04 (2004) 77-84
null
null
cs.NI
null
Runtime reconfiguration considered as "applying required changes to a running system" plays an important role for providing high availability not only of safety- and mission-critical systems, but also for commercial web-applications offering professional services. Hereby, the main concerns are maintaining the consistency of the running system during reconfiguration and minimizing its down-time caused by the reconfiguration. This paper focuses on the platform independent subsystem that realises deployment and redeployment of J2EE modules based on the new J2EE Deployment API as a part of the implementation of our proposed system architecture enabling runtime reconfiguration of component-based systems. Our "controlled runtime redeployment" comprises an extension of hot deployment and dynamic reloading, complemented by allowing for structural change
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:34:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Matevska-Meyer", "Jasminka", "" ], [ "Olliges", "Sascha", "" ], [ "Hasselbring", "Wilhelm", "" ] ]
cs/0411058
Didier Donsez
Jose L. Ruiz, Juan C. Duenas, Fernando Usero, Cristina Diaz
Deployment in dynamic environments
null
DECOR04 (2004) 85-98
null
null
cs.NI
null
Information and communication technologies are moving towards a new stage where applications will be dynamically deployed, uninstalled, updated and (re)configured. Several approaches have been followed with the goal of creating a fully automated and context-aware deployment system. Ideally, this system should be capable of handling the dynamics of this new situation, without losing sight of other factors, such as performance, security, availability or scalability. We will take some of the technologies that follow the principles of Service Oriented Architectures, SOA, as a paradigm of dynamic environments. SOA promote the breaking down of applications into sets of loosely coupled elements, called services. Services can be dynamically bound, deployed, reconfigured, uninstalled and updated. First of all, we will try to offer a broad view on the specific deployment issues that arise in these environments. Later on, we will present our approach to the problem. One of the essential points that has to be tackled to develop an automated deployment engine will be to have enough information to carry out tasks without human intervention. In the article we will focus on the format and contents of deployment descriptors. Additionally, we will go into the details of the deployment framework for OSGi enabled gateways that has been developed by our research group. Finally we will give some concluding remarks and some ideas for future work
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:34:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Ruiz", "Jose L.", "" ], [ "Duenas", "Juan C.", "" ], [ "Usero", "Fernando", "" ], [ "Diaz", "Cristina", "" ] ]