id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0411059 | Didier Donsez | Frederic Briclet (JACQUARD Ur-F Lifl), Christophe Contreras (JACQUARD
Ur-F Lifl), Philippe Merle (JACQUARD Ur-F Lifl) | OpenCCM : une infrastructure a composants pour le deploiement
d'applications a base de composants CORBA | null | DECOR04 (2004) 101-112 | null | null | cs.NI | null | Deployment of software components for building distributed applications
consists of the coordination of a set of basic tasks like uploading component
binaries to the execution sites, loading them in memory, instantiating
components, interconnecting their ports, setting their business and technical
attributes. The automation of the deployment process then requires the presence
of a software infrastructure distributed itself on the different execution
sites. This paper presents the characteristics of such an infrastructure for
the deployment of CORBA component-based applications. This latter is designed
and implemented in the context of our OpenCCM platform, an open source
implementation of the CORBA Component Model. The main characteristic lays on
the fact that this infrastructure is itself designed as a set of CORBA
component assemblies. This allows its dynamic assembly during its deployment
over the execution sites
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:35:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Briclet",
"Frederic",
"",
"JACQUARD Ur-F Lifl"
],
[
"Contreras",
"Christophe",
"",
"JACQUARD\n Ur-F Lifl"
],
[
"Merle",
"Philippe",
"",
"JACQUARD Ur-F Lifl"
]
] |
cs/0411060 | Didier Donsez | Stephane Frenot (ARES UR-RA) | Gestion du deploiement de composants sur reseau P2P | null | DECOR04 (2004) 113-124 | null | null | cs.NI | null | The deployment of component-based applications relies on a centralized
directory to store the components. This paper describes an approach to
distribute software components to be deployed on a set of peers of a peer to
peer network in order to exploit some associated characteristics (load
balancing, fault-tolerance, self-organisation). The proposed architecture is
situated in the context of OSGI application deployment management. The software
components (bundles) are distributed among a set of nodes participating in the
execution of services. When a node wants to install a component which is not
deployed locally, the component is looked for and installed using a p2p
network.
-----
Le deploiement d'applications a composants repose sur une approche d'annuaire
centralise de stockage des composants. Cet article decrit une approche pour
distribuer les composants logiciels a deployer sur un ensemble de noeuds d'un
reseau pair-a-pair afin de pouvoir exploiter certaines caracteristiques
associees (equilibrage de charge, tolerance de panne, auto-organisation).
L'architecture proposee entre dans le cadre de la gestion du deploiement
d'applications sur le modele OSGi. Les composants logiciels (ou bundles) sont
repartis a travers un ensemble de noeuds participant a l'execution de services.
Lorsqu'un noeud veut installer un composant et si celui-ci n'est pas encore
deploye localement, il est recherche et installe en utilisant un reseau p2p
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:36:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Frenot",
"Stephane",
"",
"ARES UR-RA"
]
] |
cs/0411061 | Didier Donsez | Noelle Merle (LSR - IMAG) | Un meta-modele pour l'automatisation du deploiement d'applications
logicielles | null | DECOR04 (2004) 125-132 | null | null | cs.NI | null | Le deploiement est maintenant considere comme une activite a part entiere du
cycle de vie du logiciel. Les grandes entreprises souhaitent pouvoir
automatiser cette etape tout en prenant en compte les caracteristiques de
chaque machine cible. Pour repondre a ces besoins, nous avons defini un
environnement de deploiement : ORYA (Open enviRonment to deploY Applications).
Cet environnement utilise un meta-modele de deploiement, decrit dans ce papier.
Notre approche utilise aussi les technologies des federations et des procedes,
fournissant un environnement flexible et extensible pour l'utilisateur.
-----
The deployment is now a full activity of the software lifecycle. Large
enterprises want to automate this step, taking into account characteristics of
each target machine. To satisfy these needs, we have defined an environment for
the deployment phase: ORYA (Open enviRonment to deploY Applications). This
environment uses a deployment metamodel, described in this paper. Our approach
is based also on federation and process federations, providing a flexible and
extensible environment to the user
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:41:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Merle",
"Noelle",
"",
"LSR - IMAG"
]
] |
cs/0411062 | Didier Donsez | Didier Donsez (LSR - IMAG), Humberto Cervantes (LSR - IMAG), Mikael
Desertot (LSR - IMAG) | FROGi : Deploiement de composants Fractal sur OSGi | null | DECOR04 (2004) 147-158 | null | null | cs.NI | null | Cet article presente FROGi, une proposition visant a introduire le modele a
composants Fractal a l'interieur de la plateforme de services OSGi. La
motivation derriere ce travail est double. D'un cote, FROGi offre aux
developpeurs de services OSGi un modele a composants extensibles qui facilite
le developpement des bundles ; ces derniers restent toutefois compatibles avec
les bundles "patrimoniaux". D'un autre cote, FROGi beneficie de
l'infrastructure de deploiement que represente OSGi et qui facilite la
realisation du conditionnement et du deploiement de composants Fractal. Dans
FROGi, une application Fractal est conditionnee sous la forme d'un ou plusieurs
bundles et elle peut etre deployee de facon partielle et les activites de
deploiement peuvent avoir lieu de facon continue.
-- This paper presents FROGi, a proposal to introduce the Fractal component
model into the OSGi services platform. There are two motivations for this work.
The first one is to offer a flexible component model to the OSGi developers to
simplify bundle development. Bundles developed with FROGi are nevertheless
compatible with standard bundles. The second motivation is to leverage OSGi's
deployment capabilities to package and deploy Fractal components. In FROGi, a
Fractal application is packaged and delivered as a set of OSGi bundles; such an
application supports partial deployment and additionally, deployment activities
can occur continuously.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:43:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Donsez",
"Didier",
"",
"LSR - IMAG"
],
[
"Cervantes",
"Humberto",
"",
"LSR - IMAG"
],
[
"Desertot",
"Mikael",
"",
"LSR - IMAG"
]
] |
cs/0411063 | Christiane Lechner | Christiane Lechner, Dana Alic, Sascha Husa | From Tensor Equations to Numerical Code -- Computer Algebra Tools for
Numerical Relativity | LaTeX llncs style, 9 pages, 1 figure, to appaer in the proceedings of
"SYNASC 2004 - 6th International Symposium on Symbolic and Numeric Algorithms
for Scientific Computing", Timisoara, Romania, September 26-30 2004 | null | null | AEI-2004-108 | cs.SC | null | In this paper we present our recent work in developing a computer-algebra
tool for systems of partial differential equations (PDEs), termed "Kranc". Our
work is motivated by the problem of finding solutions of the Einstein equations
through numerical simulations. Kranc consists of Mathematica based
computer-algebra packages, that facilitate the task of dealing with symbolic
tensorial calculations and realize the conversion of systems of partial
differential evolution equations into parallelized C or Fortran code.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 14:30:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lechner",
"Christiane",
""
],
[
"Alic",
"Dana",
""
],
[
"Husa",
"Sascha",
""
]
] |
cs/0411064 | Daniel A. Spielman | Michael Elkin, Yuval Emek, Daniel A. Spielman and Shang-Hua Teng | Lower-Stretch Spanning Trees | null | null | null | null | cs.DS cs.DM | null | We prove that every weighted graph contains a spanning tree subgraph of
average stretch O((log n log log n)^2). Moreover, we show how to construct such
a tree in time O(m log^2 n).
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 22:07:46 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jan 2005 21:06:44 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Feb 2005 21:17:11 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Mar 2005 21:52:20 GMT"
},
{
"version": "v5",
"created": "Fri, 13 May 2005 17:20:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Elkin",
"Michael",
""
],
[
"Emek",
"Yuval",
""
],
[
"Spielman",
"Daniel A.",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
cs/0411066 | Alex Wiesmaier | V. Karatsiolis, M. Lippert and A. Wiesmaier | Using LDAP Directories for Management of PKI Processes | 9 pages, 1 figure | In Proceedings of Public Key Infrastructure: First European PKI
Workshop: Research and Applications, EuroPKI 2004, volume 3093 of Lecture
Notes in Computer Science, pages 126-134, June 2004 | null | null | cs.CR | null | We present a framework for extending the functionality of LDAP servers from
their typical use as a public directory in public key infrastructures. In this
framework the LDAP servers are used for administrating infrastructure
processes. One application of this framework is a method for providing
proof-of-possession, especially in the case of encryption keys. Another one is
the secure delivery of software personal security environments.
| [
{
"version": "v1",
"created": "Thu, 18 Nov 2004 19:00:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karatsiolis",
"V.",
""
],
[
"Lippert",
"M.",
""
],
[
"Wiesmaier",
"A.",
""
]
] |
cs/0411068 | Alex Wiesmaier | V. Karatsiolis, M. Lippert, A. Wiesmaier | Planning for Directory Services in Public Key Infrastructures | 12 pages; 1 figure; accepted at QSIG2005 (see
http://www-sec.uni-regensburg.de/sicherheit2005/index.shtml); camera ready
version | Proceedings of "Sicherheit 2005"; April 2005 | null | null | cs.CR | null | In this paper we provide a guide for public key infrastructure designers and
administrators when planning for directory services. We concentrate on the LDAP
directories and how they can be used to successfully publish PKI information.
We analyse their available mechanisms and propose a best practice guide for use
in PKI. We then take a look into the German Signature Act and Ordinance and
discuss their part as far as directories concerning. Finally, we translate
those to the LDAP directories practices.
| [
{
"version": "v1",
"created": "Thu, 18 Nov 2004 19:40:59 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jan 2005 17:07:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karatsiolis",
"V.",
""
],
[
"Lippert",
"M.",
""
],
[
"Wiesmaier",
"A.",
""
]
] |
cs/0411070 | Pradipta De Pradipta De | Pradipta De | Data Path Processing in Fast Programmable Routers | ECSL Technical Report #127, Stony Brook University | null | null | null | cs.NI | null | Internet is growing at a fast pace. The link speeds are surging toward 40
Gbps with the emergence of faster link technologies. New applications are
coming up which require intelligent processing at the intermediate routers.
Switches and routers are becoming the bottlenecks in fast communication. On one
hand faster links deliver more packets every second and on the other hand
intelligent processing consumes more CPU cycles at the router. The conflicting
goals of providing faster but computationally expensive processing call for new
approaches in designing routers.
This survey takes a look at the core functionalities, like packet
classification, buffer memory management, switch scheduling and output link
scheduling performed by a router in its data path processing and discusses the
algorithms that aim to reduce the performance bound for these operations. An
important requirement for the routers is to provide Quality of Service
guarantees. We propose an algorithm to guarantee QoS in Input Queued Routers.
The hardware solution to speed up router operation was Application Specific
Integrated Circuits (ASICs). But the inherent inflexibility of the method is a
demerit as network standards and application requirements are constantly
evolving, which seek a faster turnaround time to keep up with the changes. The
promise of Network Processors (NP) is the flexibility of general-purpose
processors together with the speed of ASICs. We will study the architectural
choices for the design of Network Processors and focus on some of the
commercially available NPs. There is a plethora of NP vendors in the market.
The discussion on the NP benchmarks sets the normalizing platform to evaluate
these NPs.
| [
{
"version": "v1",
"created": "Thu, 18 Nov 2004 23:19:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"De",
"Pradipta",
""
]
] |
cs/0411074 | Daniel Gayo Avello | Daniel Gayo-Avello | Building Chinese Lexicons from Scratch by Unsupervised Short Document
Self-Segmentation | 9 pages 3 figures 2 tables | null | null | null | cs.CL cs.IR | null | Chinese text segmentation is a well-known and difficult problem. On one side,
there is not a simple notion of "word" in Chinese language making really hard
to implement rule-based systems to segment written texts, thus lexicons and
statistical information are usually employed to achieve such a task. On the
other side, any piece of Chinese text usually includes segments present neither
in the lexicons nor in the training data. Even worse, such unseen sequences can
be segmented into a number of totally unrelated words making later processing
phases difficult. For instance, using a lexicon-based system the sequence
???(Baluozuo, Barroso, current president-designate of the European Commission)
can be segmented into ?(ba, to hope, to wish) and ??(luozuo, an undefined word)
changing completely the meaning of the sentence. A new and extremely simple
algorithm specially suited to work over short Chinese documents is introduced.
This new algorithm performs text "self-segmentation" producing results
comparable to those achieved by native speakers without using either lexicons
or any statistical information beyond the obtained from the input text.
Furthermore, it is really robust for finding new "words", especially proper
nouns, and it is well suited to build lexicons from scratch. Some preliminary
results are provided in addition to examples of its employment.
| [
{
"version": "v1",
"created": "Sat, 20 Nov 2004 00:22:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gayo-Avello",
"Daniel",
""
]
] |
cs/0411075 | Darran Nathan | Andreas Weisensee, Darran Nathan | A Self-Reconfigurable Computing Platform Hardware Architecture | 5 pages, 6 figures | null | null | null | cs.AR cs.DC | null | Field Programmable Gate Arrays (FPGAs) have recently been increasingly used
for highly-parallel processing of compute intensive tasks. This paper
introduces an FPGA hardware platform architecture that is PC-based, allows for
fast reconfiguration over the PCI bus, and retains a simple physical hardware
design. The design considerations are first discussed, then the resulting
system architecture designed is illustrated. Finally, experimental results on
the FPGA resources utilized for this design are presented.
| [
{
"version": "v1",
"created": "Sat, 20 Nov 2004 06:31:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Weisensee",
"Andreas",
""
],
[
"Nathan",
"Darran",
""
]
] |
cs/0411077 | David S. H. Rosenthal | David S. H. Rosenthal, Thomas Lipkis, Thomas Robertson, Seth Morabito | Transparent Format Migration of Preserved Web Content | 6 pages, 2 figures | null | null | null | cs.DL | null | The LOCKSS digital preservation system collects content by crawling the web
and preserves it in the format supplied by the publisher. Eventually, browsers
will no longer understand that format. A process called format migration
converts it to a newer format that the browsers do understand. The LOCKSS
program has designed and tested an initial implementation of format migration
for Web content that is transparent to readers, building on the content
negotiation capabilities of HTTP.
| [
{
"version": "v1",
"created": "Mon, 22 Nov 2004 00:35:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rosenthal",
"David S. H.",
""
],
[
"Lipkis",
"Thomas",
""
],
[
"Robertson",
"Thomas",
""
],
[
"Morabito",
"Seth",
""
]
] |
cs/0411078 | David S. H. Rosenthal | David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, T.J. Giuli,
Mary Baker | Notes On The Design Of An Internet Adversary | null | Second Annual Adaptive and Resilient Computing Security Workshop,
Santa Fe, 2003 | null | null | cs.DL | null | The design of the defenses Internet systems can deploy against attack,
especially adaptive and resilient defenses, must start from a realistic model
of the threat. This requires an assessment of the capabilities of the
adversary. The design typically evolves through a process of simulating both
the system and the adversary. This requires the design and implementation of a
simulated adversary based on the capability assessment. Consensus on the
capabilities of a suitable adversary is not evident. Part of the recent
redesign of the protocol used by peers in the LOCKSS digital preservation
system included a conservative assessment of the adversary's capabilities. We
present our assessment and the implications we drew from it as a step towards a
reusable adversary specification.
| [
{
"version": "v1",
"created": "Mon, 22 Nov 2004 00:22:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rosenthal",
"David S. H.",
""
],
[
"Maniatis",
"Petros",
""
],
[
"Roussopoulos",
"Mema",
""
],
[
"Giuli",
"T. J.",
""
],
[
"Baker",
"Mary",
""
]
] |
cs/0411079 | Srikant Sharma | Srikant Sharma and Kartik Gopalan and Ningning Zhu and Gang Peng and
Pradipta De and Tzi-cker Chiueh | Supporting Bandwidth Guarantee and Mobility for Real-Time Applications
on Wireless LANs | This paper integrates the QoS scheme published in MMCN 2002 with a
low latency mobility scheme that appeared in IEEE JSAC May 2004. This paper
deals with both the issues with a fresh perspective of new networking
technologies and standards such as 802.11e | null | null | null | cs.NI | null | The proliferation of IEEE 802.11-based wireless LANs opens up avenues for
creation of several tetherless and mobility oriented services. Most of these
services, like voice over WLAN, media streaming etc., generate delay and
bandwidth sensitive traffic. These traffic flows require undisrupted network
connectivity with some QoS guarantees. Unfortunately, there is no adequate
support built into these wireless LANs towards QoS provisioning. Further, the
network layer handoff latency incurred by mobile nodes in these wireless LANs
is too high for real-time applications to function properly. In this paper, we
describe a QoS mechanism, called Rether, to effectively support bandwidth
guarantee on wireless LANs. Rether is designed to support the current wireless
LAN technologies like 802.11b and 802.11a with a specific capability of being
tailored for QoS oriented technology like 802.11e. We also describe a
low-latency handoff mechanism which expedites network level handoff to provide
real-time applications with an added advantage of seamless mobility.
| [
{
"version": "v1",
"created": "Mon, 22 Nov 2004 18:10:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sharma",
"Srikant",
""
],
[
"Gopalan",
"Kartik",
""
],
[
"Zhu",
"Ningning",
""
],
[
"Peng",
"Gang",
""
],
[
"De",
"Pradipta",
""
],
[
"Chiueh",
"Tzi-cker",
""
]
] |
cs/0411080 | Valmir Barbosa | C. A. G. Assis, E. S. T. Fernandes, V. C. Barbosa | Modeling the input history of programs for improved instruction-memory
performance | null | Computer Journal 49 (2006), 744-761 | 10.1093/comjnl/bxl044 | ES-662/04 | cs.OS | null | When a program is loaded into memory for execution, the relative position of
its basic blocks is crucial, since loading basic blocks that are unlikely to be
executed first places them high in the instruction-memory hierarchy only to be
dislodged as the execution goes on. In this paper we study the use of Bayesian
networks as models of the input history of a program. The main point is the
creation of a probabilistic model that persists as the program is run on
different inputs and at each new input refines its own parameters in order to
reflect the program's input history more accurately. As the model is thus
tuned, it causes basic blocks to be reordered so that, upon arrival of the next
input for execution, loading the basic blocks into memory automatically takes
into account the input history of the program. We report on extensive
experiments, whose results demonstrate the efficacy of the overall approach in
progressively lowering the execution times of a program on identical inputs
placed randomly in a sequence of varied inputs. We provide results on selected
SPEC CINT2000 programs and also evaluate our approach as compared to the gcc
level-3 optimization and to Pettis-Hansen reordering.
| [
{
"version": "v1",
"created": "Tue, 23 Nov 2004 16:52:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Assis",
"C. A. G.",
""
],
[
"Fernandes",
"E. S. T.",
""
],
[
"Barbosa",
"V. C.",
""
]
] |
cs/0411081 | Didier Donsez | Assia Hachichi (REGAL Ur-R Lip6), Cyril Martin (REGAL Ur-R Lip6), Gael
Thomas (REGAL Ur-R Lip6), Simon Patarin (REGAL Ur-R Lip6), Bertil Folliot
(REGAL Ur-R Lip6) | Reconfigurations dynamiques de services dans un intergiciel a composants
CORBA CCM | null | DECOR04 (2004) 159-170 | null | null | cs.NI | null | Today, component oriented middlewares are used to design, develop and deploy
easily distributed applications, by ensuring the heterogeneity,
interoperability, and reuse of the software modules, and the separation between
the business code encapsulated in the components and the system code managed by
the containers. Several standards answer this definition such as: CCM (CORBA
Component Model), EJB (Enterprise Java Beans) and .Net. However these standards
offer a limited and fixed number of system services, removing any possibility
to add system services or to reconfigure dynamically the middleware. Our works
propose mechanisms to add and to adapt dynamically the system services, based
on a reconfiguration language which is dynamically adaptable to the need of the
reconfiguration, and on a tool of dynamic reconfiguration, a prototype was
achieved for the OpenCCM platform, that is an implementation of the CCM
specification. This work was partially financed by the european project
IST-COACH (2001-34445).
| [
{
"version": "v1",
"created": "Wed, 24 Nov 2004 10:26:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hachichi",
"Assia",
"",
"REGAL Ur-R Lip6"
],
[
"Martin",
"Cyril",
"",
"REGAL Ur-R Lip6"
],
[
"Thomas",
"Gael",
"",
"REGAL Ur-R Lip6"
],
[
"Patarin",
"Simon",
"",
"REGAL Ur-R Lip6"
],
[
"Folliot",
"Bertil",
"",
"REGAL Ur-R Lip6"
]
] |
cs/0411082 | Didier Donsez | Jakub Kornas (SARDES Ur-Ra Imag), Matthieu Leclercq (SARDES Ur-Ra
Imag), Vivien Quema (SARDES Ur-Ra Imag), Jean-Bernard Stefani (SARDES Ur-Ra
Imag) | Support pour la reconfiguration d'implantation dans les applications a
composants Java | null | DECOR04 (2004) 171-184 | null | null | cs.NI | null | Nowadays, numerous component models are used for various purposes: to build
applications, middleware or even operating systems. Those models commonly
support structure reconfiguration, that is modification of application's
architecture at runtime. On the other hand, very few allow implementation
reconfiguration, that is runtime modification of the code of components
building the application. In this article we present the work we performed on
JULIA, a Java-based implementation of the FRACTAL component model, in order for
it to support implementation reconfigurations. We show how we overcame the
limitations of Java class loading mechanism to allow runtime modifications of
components' implementation and interfaces. We also describe the integration of
our solution with the JULIA ADL.
| [
{
"version": "v1",
"created": "Wed, 24 Nov 2004 10:27:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kornas",
"Jakub",
"",
"SARDES Ur-Ra Imag"
],
[
"Leclercq",
"Matthieu",
"",
"SARDES Ur-Ra\n Imag"
],
[
"Quema",
"Vivien",
"",
"SARDES Ur-Ra Imag"
],
[
"Stefani",
"Jean-Bernard",
"",
"SARDES Ur-Ra\n Imag"
]
] |
cs/0411090 | Valmir Barbosa | A. O. Stauffer, V. C. Barbosa | Local heuristics and the emergence of spanning subgraphs in complex
networks | null | Theoretical Computer Science 355 (2006), 80-95 | 10.1016/j.tcs.2005.12.007 | ES-663/04 | cs.NI | null | We study the use of local heuristics to determine spanning subgraphs for use
in the dissemination of information in complex networks. We introduce two
different heuristics and analyze their behavior in giving rise to spanning
subgraphs that perform well in terms of allowing every node of the network to
be reached, of requiring relatively few messages and small node bandwidth for
information dissemination, and also of stretching paths with respect to the
underlying network only modestly. We contribute a detailed mathematical
analysis of one of the heuristics and provide extensive simulation results on
random graphs for both of them. These results indicate that, within certain
limits, spanning subgraphs are indeed expected to emerge that perform well in
respect to all requirements. We also discuss the spanning subgraphs' inherent
resilience to failures and adaptability to topological changes.
| [
{
"version": "v1",
"created": "Thu, 25 Nov 2004 09:04:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stauffer",
"A. O.",
""
],
[
"Barbosa",
"V. C.",
""
]
] |
cs/0411091 | H. M. Gladney | H.M. Gladney | Principles for Digital Preservation | 7 pages with 2b figures | null | null | null | cs.DL | null | The immense investments in creating and disseminating digitally represented
information have not been accompanied by commensurate effort to ensure the
longevity of information of permanent interest. Asserted difficulties with
long-term digital preservation prove to be largely underestimation of what
technology can provide. We show how to clarify prominent misunderstandings and
sketch a 'Trustworthy Digital Object (TDO)' method that solves all the
published technical challenges.
| [
{
"version": "v1",
"created": "Wed, 24 Nov 2004 20:54:43 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Dec 2004 00:32:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gladney",
"H. M.",
""
]
] |
cs/0411092 | H. M. Gladney | H.M. Gladney, R.A. Lorie | Trustworthy 100-Year Digital Objects: Durable Encoding for When It's Too
Late to Ask | null | null | null | null | cs.DL | null | How can an author store digital information so that it will be reliably
useful, even years later when he is no longer available to answer questions?
Methods that might work are not good enough; what is preserved today should be
reliably useful whenever someone wants it. Prior proposals fail because they
confound saved data with irrelevant details of today's information
technology--details that are difficult to define, extract, and save completely
and accurately.
We use a virtual machine to represent and eventually to render any data
whatsoever. We focus on a case of intermediate difficulty--an executable
procedure--and identify a variant for every other data type. This solution
might be more elaborate than needed to render some text, image, audio, or video
data. Simple data can be preserved as representations using well-known
standards. We sketch practical methods for files ranging from simple structures
to those containing computer programs, treating simple cases here and deferring
complex cases for future work. Enough of the complete solution is known to
enable practical aggressive preservation programs today.
| [
{
"version": "v1",
"created": "Wed, 24 Nov 2004 21:26:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gladney",
"H. M.",
""
],
[
"Lorie",
"R. A.",
""
]
] |
cs/0411093 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN), Loys Thimonier (LARIA) | Forbidden Subgraphs in Connected Graphs | null | null | null | null | cs.DS cs.DM math.CO | null | Given a set $\xi=\{H_1,H_2,...\}$ of connected non acyclic graphs, a
$\xi$-free graph is one which does not contain any member of $% \xi$ as copy.
Define the excess of a graph as the difference between its number of edges and
its number of vertices. Let ${\gr{W}}_{k,\xi}$ be theexponential generating
function (EGF for brief) of connected $\xi$-free graphs of excess equal to $k$
($k \geq 1$). For each fixed $\xi$, a fundamental differential recurrence
satisfied by the EGFs ${\gr{W}}_{k,\xi}$ is derived. We give methods on how to
solve this nonlinear recurrence for the first few values of $k$ by means of
graph surgery. We also show that for any finite collection $\xi$ of non-acyclic
graphs, the EGFs ${\gr{W}}_{k,\xi}$ are always rational functions of the
generating function, $T$, of Cayley's rooted (non-planar) labelled trees. From
this, we prove that almost all connected graphs with $n$ nodes and $n+k$ edges
are $\xi$-free, whenever $k=o(n^{1/3})$ and $|\xi| < \infty$ by means of
Wright's inequalities and saddle point method. Limiting distributions are
derived for sparse connected $\xi$-free components that are present when a
random graph on $n$ nodes has approximately $\frac{n}{2}$ edges. In particular,
the probability distribution that it consists of trees, unicyclic components,
$...$, $(q+1)$-cyclic components all $\xi$-free is derived. Similar results are
also obtained for multigraphs, which are graphs where self-loops and
multiple-edges are allowed.
| [
{
"version": "v1",
"created": "Thu, 25 Nov 2004 09:32:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Thimonier",
"Loys",
"",
"LARIA"
]
] |
cs/0411094 | Radhakrishnan Srinivasan | Radhakrishnan Srinivasan, H. P. Raghunandan | On the existence of truly autonomic computing systems and the link with
quantum computing | 13 pages (two-column, single-spaced), 2 figures. Section 4 and
Appendix B (with a figure in each) added. Improved explanations given for the
NAFL model of (hyper-) computation (Sec. 6) and for the failure of
relativistic locality in NAFL (Appendix B) | null | null | null | cs.LO math.LO quant-ph | null | A theoretical model of truly autonomic computing systems (ACS), with
infinitely many constraints, is proposed. An argument similar to Turing's for
the unsolvability of the halting problem, which is permitted in classical
logic, shows that such systems cannot exist. Turing's argument fails in the
recently proposed non-Aristotelian finitary logic (NAFL), which permits the
existence of ACS. NAFL also justifies quantum superposition and entanglement,
which are essential ingredients of quantum algorithms, and resolves the
Einstein-Podolsky-Rosen (EPR) paradox in favour of quantum mechanics and
non-locality. NAFL requires that the autonomic manager (AM) must be
conceptually and architecturally distinct from the managed element, in order
for the ACS to exist as a non-self-referential entity. Such a scenario is
possible if the AM uses quantum algorithms and is protected from all problems
by (unbreakable) quantum encryption, while the managed element remains
classical. NAFL supports such a link between autonomic and quantum computing,
with the AM existing as a metamathematical entity. NAFL also allows quantum
algorithms to access truly random elements and thereby supports non-standard
models of quantum (hyper-) computation that permit infinite parallelism.
| [
{
"version": "v1",
"created": "Thu, 25 Nov 2004 13:16:55 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Feb 2005 11:41:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Srinivasan",
"Radhakrishnan",
""
],
[
"Raghunandan",
"H. P.",
""
]
] |
cs/0411095 | Christian Lavault | Christian Lavault (LIPN) | Embeddings into the Pancake Interconnection Network | Article paru en 2002 dans Parallel Processing Letters | Parallel Processing Letters 12, 3-4 (2002) 297-310 | null | null | cs.DC cs.DM cs.DS | null | Owing to its nice properties, the pancake is one of the Cayley graphs that
were proposed as alternatives to the hypercube for interconnecting processors
in parallel computers. In this paper, we present embeddings of rings, grids and
hypercubes into the pancake with constant dilation and congestion. We also
extend the results to similar efficient embeddings into the star graph.
| [
{
"version": "v1",
"created": "Fri, 26 Nov 2004 20:13:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"LIPN"
]
] |
cs/0411096 | Nathan LaBelle Mr. | Nathan LaBelle, Eugene Wallingford | Inter-Package Dependency Networks in Open-Source Software | 6 Pages, 1 Figure, Submitted to J. Theoretical Comp. Science | null | null | null | cs.SE | null | This research analyzes complex networks in open-source software at the
inter-package level, where package dependencies often span across projects and
between development groups. We review complex networks identified at ``lower''
levels of abstraction, and then formulate a description of interacting software
components at the package level, a relatively ``high'' level of abstraction. By
mining open-source software repositories from two sources, we empirically show
that the coupling of modules at this granularity creates a small-world and
scale-free network in both instances.
| [
{
"version": "v1",
"created": "Mon, 29 Nov 2004 03:38:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"LaBelle",
"Nathan",
""
],
[
"Wallingford",
"Eugene",
""
]
] |
cs/0411099 | Andreas Maurer | Andreas Maurer | A Note on the PAC Bayesian Theorem | 9 pages | null | null | null | cs.LG cs.AI | null | We prove general exponential moment inequalities for averages of [0,1]-valued
iid random variables and use them to tighten the PAC Bayesian Theorem. The
logarithmic dependence on the sample count in the enumerator of the PAC
Bayesian bound is halved.
| [
{
"version": "v1",
"created": "Tue, 30 Nov 2004 08:36:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maurer",
"Andreas",
""
]
] |
cs/0411100 | Ruggero Lanotte Dr | Ruggero Lanotte (Dipartimento di Scienze della Cultura, Politiche e
dell'Informazione), Daniele Beauquier (LACL, Dept. of Informatics) | A Decidable Probability Logic for Timed Probabilistic Systems | null | null | null | null | cs.LO | null | In this paper we extend the predicate logic introduced in [Beauquier et al.
2002] in order to deal with Semi-Markov Processes. We prove that with respect
to qualitative probabilistic properties, model checking is decidable for this
logic applied to Semi-Markov Processes. Furthermore we apply our logic to
Probabilistic Timed Automata considering classical and urgent semantics, and
considering also predicates on clock. We prove that results on Semi Markov
Processes hold also for Probabilistic Timed Automata for both the two semantics
considered. Moreover, we prove that results for Markov Processes shown in
[Beauquier et al. 2002] are extensible to Probabilistic Timed Automata where
urgent semantics is considered.
| [
{
"version": "v1",
"created": "Tue, 30 Nov 2004 10:42:35 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Mar 2006 17:37:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lanotte",
"Ruggero",
"",
"Dipartimento di Scienze della Cultura, Politiche e\n dell'Informazione"
],
[
"Beauquier",
"Daniele",
"",
"LACL, Dept. of Informatics"
]
] |
cs/0412001 | Francesca Leinardi | Serge Rouveyrol (IMAG), Yves Chiaramella (IMAG), Francesca Leinardi
(IMAG), Joanna Janik (IMAG), Bruno Marmol (INRIA-RA), Carole Silvy
(INRIA-RA), Catherine Allauzun (INRIA-RA) | EURYDICE : A platform for unified access to documents | redige le 14 octobre 2001 | null | null | null | cs.DL | null | In this paper we present Eurydice, a platform dedicated to provide a unified
gateway to documents. Its basic functionalities about collecting documents have
been designed based on a long experience about the management of scientific
documentation among large and demanding academic communities such as IMAG and
INRIA. Besides the basic problem of accessing documents - which was of course
the original and main motivation of the project - a great effort has been
dedicated to the development of management functionalities which could help
institutions to control, analyse the current situation about the use of the
documentation, and finally to set a better ground for a documentation policy.
Finally a great emphasis - and corresponding technical investment - has been
put on the protection of property and reproduction rights both from the users'
intitution side and from the editors' side.
| [
{
"version": "v1",
"created": "Wed, 1 Dec 2004 13:14:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rouveyrol",
"Serge",
"",
"IMAG"
],
[
"Chiaramella",
"Yves",
"",
"IMAG"
],
[
"Leinardi",
"Francesca",
"",
"IMAG"
],
[
"Janik",
"Joanna",
"",
"IMAG"
],
[
"Marmol",
"Bruno",
"",
"INRIA-RA"
],
[
"Silvy",
"Carole",
"",
"INRIA-RA"
],
[
"Allauzun",
"Catherine",
"",
"INRIA-RA"
]
] |
cs/0412002 | Mark Levene | Jose Borges and Mark Levene | Ranking Pages by Topology and Popularity within Web Sites | 15 pages, 6 figures | null | null | null | cs.AI cs.IR | null | We compare two link analysis ranking methods of web pages in a site. The
first, called Site Rank, is an adaptation of PageRank to the granularity of a
web site and the second, called Popularity Rank, is based on the frequencies of
user clicks on the outlinks in a page that are captured by navigation sessions
of users through the web site. We ran experiments on artificially created web
sites of different sizes and on two real data sets, employing the relative
entropy to compare the distributions of the two ranking methods. For the real
data sets we also employ a nonparametric measure, called Spearman's footrule,
which we use to compare the top-ten web pages ranked by the two methods. Our
main result is that the distributions of the Popularity Rank and Site Rank are
surprisingly close to each other, implying that the topology of a web site is
very instrumental in guiding users through the site. Thus, in practice, the
Site Rank provides a reasonable first order approximation of the aggregate
behaviour of users within a web site given by the Popularity Rank.
| [
{
"version": "v1",
"created": "Wed, 1 Dec 2004 13:22:47 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Dec 2004 09:10:55 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Dec 2004 10:03:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borges",
"Jose",
""
],
[
"Levene",
"Mark",
""
]
] |
cs/0412003 | Joanna Janik | Florence Duchene (TIMC - IMAG), Catherine Garbay (TIMC - IMAG),
Vincent Rialle (TIMC - IMAG, SIIM) | Mining Heterogeneous Multivariate Time-Series for Learning Meaningful
Patterns: Application to Home Health Telecare | null | null | null | null | cs.LG | null | For the last years, time-series mining has become a challenging issue for
researchers. An important application lies in most monitoring purposes, which
require analyzing large sets of time-series for learning usual patterns. Any
deviation from this learned profile is then considered as an unexpected
situation. Moreover, complex applications may involve the temporal study of
several heterogeneous parameters. In that paper, we propose a method for mining
heterogeneous multivariate time-series for learning meaningful patterns. The
proposed approach allows for mixed time-series -- containing both pattern and
non-pattern data -- such as for imprecise matches, outliers, stretching and
global translating of patterns instances in time. We present the early results
of our approach in the context of monitoring the health status of a person at
home. The purpose is to build a behavioral profile of a person by analyzing the
time variations of several quantitative or qualitative parameters recorded
through a provision of sensors installed in the home.
| [
{
"version": "v1",
"created": "Wed, 1 Dec 2004 16:32:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Duchene",
"Florence",
"",
"TIMC - IMAG"
],
[
"Garbay",
"Catherine",
"",
"TIMC - IMAG"
],
[
"Rialle",
"Vincent",
"",
"TIMC - IMAG, SIIM"
]
] |
cs/0412004 | Lloyd Allison | L. Allison | Finding Approximate Palindromes in Strings Quickly and Simply | 4 pages, 3 figures, code of the simple algorithm will soon be placed
at http://www.csse.monash.edu.au/~lloyd/tildeProgLang/Java2/Palindromes/ | null | null | 2004/162 | cs.DS | null | Described are two algorithms to find long approximate palindromes in a
string, for example a DNA sequence. A simple algorithm requires O(n)-space and
almost always runs in $O(k.n)$-time where n is the length of the string and k
is the number of ``errors'' allowed in the palindrome. Its worst-case
time-complexity is $O(n^2)$ but this does not occur with real biological
sequences. A more complex algorithm guarantees $O(k.n)$ worst-case time
complexity.
| [
{
"version": "v1",
"created": "Wed, 1 Dec 2004 17:08:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Allison",
"L.",
""
]
] |
cs/0412005 | Bernard Parisse | Bernard Parisse (IF), Morgane Vaughan (IF) | Jordan Normal and Rational Normal Form Algorithms | null | null | null | null | cs.SC | null | In this paper, we present a determinist Jordan normal form algorithms based
on the Fadeev formula: \[(\lambda \cdot I-A) \cdot B(\lambda)=P(\lambda) \cdot
I\] where $B(\lambda)$ is $(\lambda \cdot I-A)$'s comatrix and $P(\lambda)$ is
$A$'s characteristic polynomial. This rational Jordan normal form algorithm
differs from usual algorithms since it is not based on the Frobenius/Smith
normal form but rather on the idea already remarked in Gantmacher that the
non-zero column vectors of $B(\lambda_0)$ are eigenvectors of $A$ associated to
$\lambda_0$ for any root $\lambda_0$ of the characteristical polynomial. The
complexity of the algorithm is $O(n^4)$ field operations if we know the
factorization of the characteristic polynomial (or $O(n^5 \ln(n))$ operations
for a matrix of integers of fixed size). This algorithm has been implemented
using the Maple and Giac/Xcas computer algebra systems.
| [
{
"version": "v1",
"created": "Thu, 2 Dec 2004 09:39:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Parisse",
"Bernard",
"",
"IF"
],
[
"Vaughan",
"Morgane",
"",
"IF"
]
] |
cs/0412006 | Sidi Mohamed Sedjelmaci | Sidi Mohamed Sedjelmaci (LIPN) | The Accelerated Euclidean Algorithm | null | Proceedings of the EACA, (2004) 283-287 | null | null | cs.DS | null | We present a new GCD algorithm of two integers or polynomials. The algorithm
is iterative and its time complexity is still $O(n \\log^2 n ~ log \\log n)$
for $n$-bit inputs.
| [
{
"version": "v1",
"created": "Thu, 2 Dec 2004 15:01:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sedjelmaci",
"Sidi Mohamed",
"",
"LIPN"
]
] |
cs/0412008 | Manor Mendel | Robert Krauthgamer, James R. Lee, Manor Mendel, Assaf Naor | Measured descent: A new embedding method for finite metrics | 17 pages. No figures. Appeared in FOCS '04. To appeaer in Geometric &
Functional Analysis. This version fixes a subtle error in Section 2.2 | Geom. Funct. Anal. 15(4):839-858, 2005 | 10.1007/s00039-005-0527-6 | null | cs.DS math.MG | null | We devise a new embedding technique, which we call measured descent, based on
decomposing a metric space locally, at varying speeds, according to the density
of some probability measure. This provides a refined and unified framework for
the two primary methods of constructing Frechet embeddings for finite metrics,
due to [Bourgain, 1985] and [Rao, 1999]. We prove that any n-point metric space
(X,d) embeds in Hilbert space with distortion O(sqrt{alpha_X log n}), where
alpha_X is a geometric estimate on the decomposability of X. As an immediate
corollary, we obtain an O(sqrt{(log lambda_X) \log n}) distortion embedding,
where \lambda_X is the doubling constant of X. Since \lambda_X\le n, this
result recovers Bourgain's theorem, but when the metric X is, in a sense,
``low-dimensional,'' improved bounds are achieved.
Our embeddings are volume-respecting for subsets of arbitrary size. One
consequence is the existence of (k, O(log n)) volume-respecting embeddings for
all 1 \leq k \leq n, which is the best possible, and answers positively a
question posed by U. Feige. Our techniques are also used to answer positively a
question of Y. Rabinovich, showing that any weighted n-point planar graph
embeds in l_\infty^{O(log n)} with O(1) distortion. The O(log n) bound on the
dimension is optimal, and improves upon the previously known bound of O((log
n)^2).
| [
{
"version": "v1",
"created": "Thu, 2 Dec 2004 17:06:41 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Aug 2005 06:56:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krauthgamer",
"Robert",
""
],
[
"Lee",
"James R.",
""
],
[
"Mendel",
"Manor",
""
],
[
"Naor",
"Assaf",
""
]
] |
cs/0412010 | Jeremie Guiochet | Jeremie Guiochet (LAAS), Gilles Motet, Claude Baron, Guy Boy | Toward a Human-Centered Uml for Risk Analysis | null | Proc. of the 18th IFIP World Computer Congress (WCC), Human Error,
Safety and Systems Development (HESSD04) (2004) 177-191 | null | null | cs.OH | null | Safety is now a major concern in many complex systems such as medical robots.
A way to control the complexity of such systems is to manage risk. The first
and important step of this activity is risk analysis. During risk analysis, two
main studies concerning human factors must be integrated: task analysis and
human error analysis. This multidisciplinary analysis often leads to a work
sharing between several stakeholders who use their own languages and
techniques. This often produces consistency errors and understanding
difficulties between them. Hence, this paper proposes to treat the risk
analysis on the common expression language UML (Unified Modeling Language) and
to handle human factors concepts for task analysis and human error analysis
based on the features of this language. The approach is applied to the
development of a medical robot for teleechography.
| [
{
"version": "v1",
"created": "Thu, 2 Dec 2004 21:32:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guiochet",
"Jeremie",
"",
"LAAS"
],
[
"Motet",
"Gilles",
""
],
[
"Baron",
"Claude",
""
],
[
"Boy",
"Guy",
""
]
] |
cs/0412011 | Archil Avaliani | Archil Avaliani | Successful E-Business Systems - Paypal | 6 pages, Accepted at IADIS Conference, Lisbon. But because nobody was
able to present this research paper, it didn't publish in proceedings.
Extended version was written at International University under supervision of
Prof.Keiichi Nakata. Keywords: PayPal, Payment Systems, E-business, Money
Transactions, PayPal Analyses | null | null | null | cs.OH | null | PayPal is an account-based system that allows anyone with an email address to
send and receive online payment s. This service is easy to use for customers.
Members can instantaneously send money to anyone. Recipients are informed by
email that they have received a payment. PayPal is also available to people in
38 countries. This paper starts with introduction to the company and its
services. The information about the history and the current company situation
are covered. Later some interesting and different technical issues are
discussed. The Paper ends with analysis of the company and several future
recommendations.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 02:33:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Avaliani",
"Archil",
""
]
] |
cs/0412012 | Joanna Janik | Catherine Oriat (LSR - IMAG) | Jartege: a Tool for Random Generation of Unit Tests for Java Classes | null | null | null | RR-1069-I | cs.PL | null | This report presents Jartege, a tool which allows random generation of unit
tests for Java classes specified in JML. JML (Java Modeling Language) is a
specification language for Java which allows one to write invariants for
classes, and pre- and postconditions for operations. As in the JML-JUnit tool,
we use JML specifications on the one hand to eliminate irrelevant test cases,
and on the other hand as a test oracle. Jartege randomly generates test cases,
which consist of a sequence of constructor and method calls for the classes
under test. The random aspect of the tool can be parameterized by associating
weights to classes and operations, and by controlling the number of instances
which are created for each class under test. The practical use of Jartege is
illustrated by a small case study.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 12:19:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Oriat",
"Catherine",
"",
"LSR - IMAG"
]
] |
cs/0412013 | Jean-Christophe Dubacq | Jean-Christophe Dubacq (LIPN, GREYC), Veronique Terrier (GREYC) | Signals for Cellular Automata in dimension 2 or higher | null | LATIN 2002: Theoretical Informatics (2002) 451-464 | null | null | cs.CC cs.DC cs.DM math.CO | null | We investigate how increasing the dimension of the array can help to draw
signals on cellular automata.We show the existence of a gap of constructible
signals in any dimension. We exhibit two cellular automata in dimension 2 to
show that increasing the dimension allows to reduce the number of states
required for some constructions.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 16:35:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dubacq",
"Jean-Christophe",
"",
"LIPN, GREYC"
],
[
"Terrier",
"Veronique",
"",
"GREYC"
]
] |
cs/0412014 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN) | Randomized Initialization of a Wireless Multihop Network | null | null | null | null | cs.DC cs.DM | null | Address autoconfiguration is an important mechanism required to set the IP
address of a node automatically in a wireless network. The address
autoconfiguration, also known as initialization or naming, consists to give a
unique identifier ranging from 1 to $n$ for a set of $n$ indistinguishable
nodes. We consider a wireless network where $n$ nodes (processors) are randomly
thrown in a square $X$, uniformly and independently. We assume that the network
is synchronous and two nodes are able to communicate if they are within
distance at most of $r$ of each other ($r$ is the transmitting/receiving
range). The model of this paper concerns nodes without the collision detection
ability: if two or more neighbors of a processor $u$ transmit concurrently at
the same time, then $u$ would not receive either messages. We suppose also that
nodes know neither the topology of the network nor the number of nodes in the
network. Moreover, they start indistinguishable, anonymous and unnamed. Under
this extremal scenario, we design and analyze a fully distributed protocol to
achieve the initialization task for a wireless multihop network of $n$ nodes
uniformly scattered in a square $X$. We show how the transmitting range of the
deployed stations can affect the typical characteristics such as the degrees
and the diameter of the network. By allowing the nodes to transmit at a range
$r= \sqrt{\frac{(1+\ell) \ln{n} \SIZE}{\pi n}}$ (slightly greater than the one
required to have a connected network), we show how to design a randomized
protocol running in expected time $O(n^{3/2} \log^2{n})$ in order to assign a
unique number ranging from 1 to $n$ to each of the $n$ participating nodes.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 16:39:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
] |
cs/0412015 | Detlef Prescher | Detlef Prescher | A Tutorial on the Expectation-Maximization Algorithm Including
Maximum-Likelihood Estimation and EM Training of Probabilistic Context-Free
Grammars | Presented at the 15th European Summer School in Logic, Language and
Information (ESSLLI 2003). Example 5 extended (and partially corrected) | null | null | null | cs.CL | null | The paper gives a brief review of the expectation-maximization algorithm
(Dempster 1977) in the comprehensible framework of discrete mathematics. In
Section 2, two prominent estimation methods, the relative-frequency estimation
and the maximum-likelihood estimation are presented. Section 3 is dedicated to
the expectation-maximization algorithm and a simpler variant, the generalized
expectation-maximization algorithm. In Section 4, two loaded dice are rolled. A
more interesting example is presented in Section 5: The estimation of
probabilistic context-free grammars.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 17:10:17 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Mar 2005 14:05:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prescher",
"Detlef",
""
]
] |
cs/0412016 | Detlef Prescher | Detlef Prescher | Inside-Outside Estimation Meets Dynamic EM | 4 pages, some typos corrected | Proceedings of IWPT 2001 | null | null | cs.CL | null | We briefly review the inside-outside and EM algorithm for probabilistic
context-free grammars. As a result, we formally prove that inside-outside
estimation is a dynamic-programming variant of EM. This is interesting in its
own right, but even more when considered in a theoretical context since the
well-known convergence behavior of inside-outside estimation has been confirmed
by many experiments but apparently has never been formally proved. However,
being a version of EM, inside-outside estimation also inherits the good
convergence behavior of EM. Therefore, the as yet imperfect line of
argumentation can be transformed into a coherent proof.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 18:10:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prescher",
"Detlef",
""
]
] |
cs/0412018 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | Modeling Complex Higher Order Patterns | 11 pages | null | null | Tr-04-11 | cs.DB cs.AI | null | The goal of this paper is to show that generalizing the notion of frequent
patterns can be useful in extending association analysis to more complex higher
order patterns. To that end, we describe a general framework for modeling a
complex pattern based on evaluating the interestingness of its sub-patterns. A
key goal of any framework is to allow people to more easily express, explore,
and communicate ideas, and hence, we illustrate how our framework can be used
to describe a variety of commonly used patterns, such as frequent patterns,
frequent closed patterns, indirect association patterns, hub patterns and
authority patterns. To further illustrate the usefulness of the framework, we
also present two new kinds of patterns that derived from the framework: clique
pattern and bi-clique pattern and illustrate their practical use.
| [
{
"version": "v1",
"created": "Sat, 4 Dec 2004 12:28:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
cs/0412019 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | A Link Clustering Based Approach for Clustering Categorical Data | 10 pages | A poster paper in Proc. of WAIM 2004 | null | null | cs.DL cs.AI | null | Categorical data clustering (CDC) and link clustering (LC) have been
considered as separate research and application areas. The main focus of this
paper is to investigate the commonalities between these two problems and the
uses of these commonalities for the creation of new clustering algorithms for
categorical data based on cross-fertilization between the two disjoint research
fields. More precisely, we formally transform the CDC problem into an LC
problem, and apply LC approach for clustering categorical data. Experimental
results on real datasets show that LC based clustering method is competitive
with existing CDC algorithms with respect to clustering accuracy.
| [
{
"version": "v1",
"created": "Sat, 4 Dec 2004 12:41:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
cs/0412020 | Paul Rogers | Paul Rogers and Nael Abu-Ghazaleh | Towards Reliable Network Wide Broadcast in Mobile Ad Hoc Networks | 12 pages, 22 figures | null | null | Tech Report: tr-cs-02-04 | cs.NI | null | Network-Wide Broadcast (NWB) is a common operation in Mobile Ad hoc Networks
(MANETs) used by routing protocols to discover routes and in group
communication operations. NWB is commonly performed via flooding, which has
been shown to be expensive in dense MANETs because of its high redundancy.
Several efforts have targeted reducing the redundancy of floods. In this work,
we target another problem that can substantially impact the success of NWBs:
since MAC level broadcasts are unreliable, it is possible for critical
rebroadcasts to be lost, leading to a significant drop in the node coverage.
This is especially true under heavy load and in sparse topologies. We show that
the techniques that target reducing the overhead of flooding, reduce its
inherent redundancy and harm its reliability. In addition, we show that static
approaches are more vulnerable to this problem. We then present a selective
rebroadcast approach to improve the robustness of NWBs. We show that our
approach leads to considerable improvement in NWB coverage relative to a
recently proposed solution to this problem, with a small increase in overhead.
The proposed approaches do not require proactive neighbor discovery and are
therefore resilient to mobility. Finally, the solution can be added to
virtually all NWB approaches to improve their reliability.
| [
{
"version": "v1",
"created": "Sat, 4 Dec 2004 18:30:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rogers",
"Paul",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
] |
cs/0412021 | Chiu Wo Choi | Chiu Wo Choi, Warwick Harvey, Jimmy Ho-Man Lee, Peter J. Stuckey | Finite Domain Bounds Consistency Revisited | 12 pages | null | null | null | cs.AI cs.LO | null | A widely adopted approach to solving constraint satisfaction problems
combines systematic tree search with constraint propagation for pruning the
search space. Constraint propagation is performed by propagators implementing a
certain notion of consistency. Bounds consistency is the method of choice for
building propagators for arithmetic constraints and several global constraints
in the finite integer domain. However, there has been some confusion in the
definition of bounds consistency. In this paper we clarify the differences and
similarities among the three commonly used notions of bounds consistency.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 2004 08:04:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Choi",
"Chiu Wo",
""
],
[
"Harvey",
"Warwick",
""
],
[
"Lee",
"Jimmy Ho-Man",
""
],
[
"Stuckey",
"Peter J.",
""
]
] |
cs/0412022 | Petrus H. Potgieter | Petrus H. Potgieter | Zeno machines and hypercomputation | 11 pages. First submitted in December 2004, substantially revised in
July and in November 2005. To appear in Theoretical Computer Science | null | null | null | cs.CC | null | This paper reviews the Church-Turing Thesis (or rather, theses) with
reference to their origin and application and considers some models of
"hypercomputation", concentrating on perhaps the most straight-forward option:
Zeno machines (Turing machines with accelerating clock). The halting problem is
briefly discussed in a general context and the suggestion that it is an
inevitable companion of any reasonable computational model is emphasised. It is
hinted that claims to have "broken the Turing barrier" could be toned down and
that the important and well-founded role of Turing computability in the
mathematical sciences stands unchallenged.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 2004 12:18:05 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Jul 2005 10:20:30 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Jan 2006 08:08:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Potgieter",
"Petrus H.",
""
]
] |
cs/0412023 | Praveen Boinee | P. Boinee, F. Barbarino, A. De Angelis | Multidimensional data classification with artificial neural networks | 8 pages, 4 figures, Submitted to EURASIP Journal on Applied Signal
Processing, 2004 | null | null | null | cs.NE cs.AI | null | Multi-dimensional data classification is an important and challenging problem
in many astro-particle experiments. Neural networks have proved to be versatile
and robust in multi-dimensional data classification. In this article we shall
study the classification of gamma from the hadrons for the MAGIC Experiment.
Two neural networks have been used for the classification task. One is
Multi-Layer Perceptron based on supervised learning and other is
Self-Organising Map (SOM), which is based on unsupervised learning technique.
The results have been shown and the possible ways of combining these networks
have been proposed to yield better and faster classification results.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 2004 20:23:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boinee",
"P.",
""
],
[
"Barbarino",
"F.",
""
],
[
"De Angelis",
"A.",
""
]
] |
cs/0412024 | Peter Turney | Peter D. Turney (National Research Council of Canada) | Human-Level Performance on Word Analogy Questions by Latent Relational
Analysis | 32 pages, issued 2004, related work available at
http://purl.org/peter.turney | null | null | NRC-47422 | cs.CL cs.IR cs.LG | null | This paper introduces Latent Relational Analysis (LRA), a method for
measuring relational similarity. LRA has potential applications in many areas,
including information extraction, word sense disambiguation, machine
translation, and information retrieval. Relational similarity is correspondence
between relations, in contrast with attributional similarity, which is
correspondence between attributes. When two words have a high degree of
attributional similarity, we call them synonyms. When two pairs of words have a
high degree of relational similarity, we say that their relations are
analogous. For example, the word pair mason/stone is analogous to the pair
carpenter/wood. Past work on semantic similarity measures has mainly been
concerned with attributional similarity. Recently the Vector Space Model (VSM)
of information retrieval has been adapted to the task of measuring relational
similarity, achieving a score of 47% on a collection of 374 college-level
multiple-choice word analogy questions. In the VSM approach, the relation
between a pair of words is characterized by a vector of frequencies of
predefined patterns in a large corpus. LRA extends the VSM approach in three
ways: (1) the patterns are derived automatically from the corpus (they are not
predefined), (2) the Singular Value Decomposition (SVD) is used to smooth the
frequency data (it is also used this way in Latent Semantic Analysis), and (3)
automatically generated synonyms are used to explore reformulations of the word
pairs. LRA achieves 56% on the 374 analogy questions, statistically equivalent
to the average human score of 57%. On the related problem of classifying
noun-modifier relations, LRA achieves similar gains over the VSM, while using a
smaller corpus.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 2004 21:50:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] |
cs/0412026 | Chiu Wo Choi | Chiu Wo Choi, Jimmy Ho-Man Lee, Peter J. Stuckey | Removing Propagation Redundant Constraints in Redundant Modeling | 30 pages, submitted to ACM Transactions on Computational Logic (TOCL) | null | null | null | cs.LO cs.AI | null | A widely adopted approach to solving constraint satisfaction problems
combines systematic tree search with various degrees of constraint propagation
for pruning the search space. One common technique to improve the execution
efficiency is to add redundant constraints, which are constraints logically
implied by others in the problem model. However, some redundant constraints are
propagation redundant and hence do not contribute additional propagation
information to the constraint solver. Redundant constraints arise naturally in
the process of redundant modeling where two models of the same problem are
connected and combined through channeling constraints. In this paper, we give
general theorems for proving propagation redundancy of one constraint with
respect to channeling constraints and constraints in the other model. We
illustrate, on problems from CSPlib (http://www.csplib.org/), how detecting and
removing propagation redundant constraints in redundant modeling can
significantly speed up constraint solving.
| [
{
"version": "v1",
"created": "Tue, 7 Dec 2004 06:31:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Choi",
"Chiu Wo",
""
],
[
"Lee",
"Jimmy Ho-Man",
""
],
[
"Stuckey",
"Peter J.",
""
]
] |
cs/0412028 | Kazushige Terui | Patrick Baillot and Kazushige Terui | A feasible algorithm for typing in Elementary Affine Logic | 20 pages | null | null | null | cs.LO | null | We give a new type inference algorithm for typing lambda-terms in Elementary
Affine Logic (EAL), which is motivated by applications to complexity and
optimal reduction. Following previous references on this topic, the variant of
EAL type system we consider (denoted EAL*) is a variant without sharing and
without polymorphism. Our algorithm improves over the ones already known in
that it offers a better complexity bound: if a simple type derivation for the
term t is given our algorithm performs EAL* type inference in polynomial time.
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 08:33:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baillot",
"Patrick",
""
],
[
"Terui",
"Kazushige",
""
]
] |
cs/0412029 | Vladimir Migunov | Vladimir V. Migunov, Rustem R. Kafiyatullov, Ilsur T. Safin | The modular technology of development of the CAD expansions: profiles of
outside networks of water supply and water drain | 8 pages, 2 figures, in Russian | null | null | null | cs.CE cs.DS | null | The modular technology of development of the problem-oriented CAD expansions
is applied to a task of designing of profiles of outside networks of water
supply and water drain with realization in program system TechnoCAD GlassX. The
unity of structure of this profiles is revealed, the system model of the
drawings of profiles of networks is developed including the structured
parametric representation (properties of objects and their interdependence,
general settings and default settings) and operations with it, which
efficiently automate designing
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 08:42:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
],
[
"Kafiyatullov",
"Rustem R.",
""
],
[
"Safin",
"Ilsur T.",
""
]
] |
cs/0412030 | Vladimir Migunov | Vladimir V. Migunov, Rustem R. Kafiyatullov, Ilsur T. Safin | The modular technology of development of the CAD expansions: protection
of the buildings from the lightning | 8 pages, 2 figures, in Russian | null | null | null | cs.CE cs.DS | null | The modular technology of development of the problem-oriented CAD expansions
is applied to a task of designing of protection of the buildings from the
lightning with realization in program system TechnoCAD GlassX. The system model
of the drawings of lightning protection is developed including the structured
parametric representation (properties of objects and their interdependence,
general settings and default settings) and operations with it, which
efficiently automate designing
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 08:49:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
],
[
"Kafiyatullov",
"Rustem R.",
""
],
[
"Safin",
"Ilsur T.",
""
]
] |
cs/0412031 | Vladimir Migunov | Vladimir V. Migunov | The Features of the Complex CAD system of Reconstruction of the
Industrial Plants | 6 pages, no figures, in Russian | null | null | null | cs.CE | null | The features of designing of reconstruction of the acting plant by its design
department are considered: the results of work are drawings corresponding with
the national standards; large number of the small projects for different acting
objects; variety of the types of the drawings in one project; large paper
archive. The models and methods of developing of the complex CAD system with
friend uniform environment of designing, with setting a profile of operations,
with usage of the general parts of the project, with a series of
problem-oriented subsystems are described on an example of a CAD system
TechnoCAD GlassX
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 08:52:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] |
cs/0412032 | Vladimir Migunov | Vladimir V. Migunov | The methods of support of the requirements of the Russian standards at
development of a CAD of industrial objects | 8 pages, 4 figures, in Russian | null | null | null | cs.CE cs.DS | null | The methods of support of the requirements of the Russian standards in a CAD
of industrial objects are explained, which were implemented in the CAD system
TechnoCAD GlassX with an own graphics core and own structures of data storage.
It is rotined, that the binding of storage structures and program code of a CAD
to the requirements of standards enable not only to fulfil these requirements
in project documentation, but also to increase a degree of compactness of
storage of drawings both on the disk and in the RAM
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 08:57:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] |
cs/0412033 | Vladimir Migunov | Vladimir V. Migunov | The modelling of the build constructions in a CAD of the renovation of
the enterprises by means of units in the drawings | 8 pages, 4 figures, in Russian | null | null | null | cs.CE | null | The parametric model of build constructions and features of design operations
are described for making drawings, which are the common component of the
different parts of the projects of renovation of enterprises. The key moment of
the deep design automation is the using of so-called units in the drawings,
which are joining a visible graphic part and invisible parameters. The model
has passed check during designing of several hundreds of drawings
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 09:01:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] |
cs/0412034 | Vladimir Migunov | Vladimir V. Migunov | The informatization of design works at industry firm during its
renovation | 9 pages, 3 figures, in Russian | null | null | null | cs.CE | null | The characteristic of design works on firm at its renovation and of the
common directions of their informatization is given. The implantation of a CAD
is selected as the key direction, and the requirements to a complex CAD-system
are stated. The methods of such a CAD-system development are featured, and the
connectedness of this development with the process of integration of
information space of design department of the firm is characterized. The
experience of development and implantation of a complex CAD of renovation of
firms TechnoCAD GlassX lies in a basis of this reviewing
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 11:08:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] |
cs/0412035 | Richard McClatchey | S R Amendolia, F Estrella, C del Frate, J Galvez, W Hassan, T Hauer, D
Manset, R McClatchey, M Odeh, D Rogulin, T Solomonides, R Warren | Deployment of a Grid-based Medical Imaging Application | 10 pages, 5 figures. Accepted by the 2005 HealthGrid Conference | null | null | null | cs.DC cs.DB | null | The MammoGrid project has deployed its Service-Oriented Architecture
(SOA)-based Grid application in a real environment comprising actual
participating hospitals. The resultant setup is currently being exploited to
conduct rigorous in-house tests in the first phase before handing over the
setup to the actual clinicians to get their feedback. This paper elaborates the
deployment details and the experiences acquired during this phase of the
project. Finally the strategy regarding migration to an upcoming middleware
from EGEE project will be described. This paper concludes by highlighting some
of the potential areas of future work.
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 17:15:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amendolia",
"S R",
""
],
[
"Estrella",
"F",
""
],
[
"del Frate",
"C",
""
],
[
"Galvez",
"J",
""
],
[
"Hassan",
"W",
""
],
[
"Hauer",
"T",
""
],
[
"Manset",
"D",
""
],
[
"McClatchey",
"R",
""
],
[
"Odeh",
"M",
""
],
[
"Rogulin",
"D",
""
],
[
"Solomonides",
"T",
""
],
[
"Warren",
"R",
""
]
] |
cs/0412036 | Richard McClatchey | Haya El-Ghalayini, Mohammed Odeh, Richard McClatchey & Tony
Solomonides | Reverse Engineering Ontology to Conceptual Data Models | 6 pages, 3 figures. Accepted by the IASTED International Conference
on Databases and Applications (DBA 2005) | null | null | null | cs.DC cs.DB | null | Ontologies facilitate the integration of heterogeneous data sources by
resolving semantic heterogeneity between them. This research aims to study the
possibility of generating a domain conceptual model from a given ontology with
the vision to grow this generated conceptual data model into a global
conceptual model integrating a number of existing data and information sources.
Based on ontologically derived semantics of the BWW model, rules are identified
that map elements of the ontology language (DAML+OIL) to domain conceptual
model elements. This mapping is demonstrated using TAMBIS ontology. A
significant corollary of this study is that it is possible to generate a domain
conceptual model from a given ontology subject to validation that needs to be
performed by the domain specialist before evolving this model into a global
conceptual model.
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 17:23:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"El-Ghalayini",
"Haya",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Solomonides",
"Tony",
""
]
] |
cs/0412039 | Michel Dagenais | Marc Chatel, Michel Dagenais, Charles Levert, Makan Pourzandi | Security in Carrier Class Server Applications for All-IP Networks | Survey paper on the challenges of all IP networks in telecom
applications | null | null | null | cs.NI | null | A revolution is taking place in telecommunication networks. New services are
appearing on platforms such as third generation cellular phones (3G) and
broadband Internet access. This motivates the transition from mostly switched
to all-IP networks. The replacement of the traditional shallow and well-defined
interface to telephony networks brings accrued flexibility, but also makes the
network accordingly difficult to properly secure. This paper surveys the
implications of this transition on security issues in telecom applications. It
does not give an exhaustive list of security tools or security protocols. Its
goal is rather to initiate the reader to the security issues brought to carrier
class servers by this revolution.
| [
{
"version": "v1",
"created": "Thu, 9 Dec 2004 16:57:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chatel",
"Marc",
""
],
[
"Dagenais",
"Michel",
""
],
[
"Levert",
"Charles",
""
],
[
"Pourzandi",
"Makan",
""
]
] |
cs/0412040 | Robert Burger | J. R. Burger | Data-stationary Architecture to Execute Quantum Algorithms Classically | null | null | null | null | cs.AR | null | This paper presents a data stationary architecture in which each word has an
attached address field. Address fields massively update in parallel to record
data interchanges. Words do not move until memory is read for post processing.
A sea of such cells can test large-scale quantum algorithms, although other
programming is possible.
| [
{
"version": "v1",
"created": "Thu, 9 Dec 2004 22:10:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burger",
"J. R.",
""
]
] |
cs/0412041 | Hai-Feng Guo | Hai-Feng Guo and Gopal Gupta | An Efficient and Flexible Engine for Computing Fixed Points | 26 pages | null | null | null | cs.PL cs.AI cs.LO | null | An efficient and flexible engine for computing fixed points is critical for
many practical applications. In this paper, we firstly present a goal-directed
fixed point computation strategy in the logic programming paradigm. The
strategy adopts a tabled resolution (or memorized resolution) to mimic the
efficient semi-naive bottom-up computation. Its main idea is to dynamically
identify and record those clauses that will lead to recursive variant calls,
and then repetitively apply those alternatives incrementally until the fixed
point is reached. Secondly, there are many situations in which a fixed point
contains a large number or even infinite number of solutions. In these cases, a
fixed point computation engine may not be efficient enough or feasible at all.
We present a mode-declaration scheme which provides the capabilities to reduce
a fixed point from a big solution set to a preferred small one, or from an
infeasible infinite set to a finite one. The mode declaration scheme can be
characterized as a meta-level operation over the original fixed point. We show
the correctness of the mode declaration scheme. Thirdly, the mode-declaration
scheme provides a new declarative method for dynamic programming, which is
typically used for solving optimization problems. There is no need to define
the value of an optimal solution recursively, instead, defining a general
solution suffices. The optimal value as well as its corresponding concrete
solution can be derived implicitly and automatically using a mode-directed
fixed point computation engine. Finally, this fixed point computation engine
has been successfully implemented in a commercial Prolog system. Experimental
results are shown to indicate that the mode declaration improves both time and
space performances in solving dynamic programming problems.
| [
{
"version": "v1",
"created": "Thu, 9 Dec 2004 22:59:37 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Jan 2005 21:18:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guo",
"Hai-Feng",
""
],
[
"Gupta",
"Gopal",
""
]
] |
cs/0412042 | Peter Jonsson | Peter Jonsson, Mikael Klasson, and Andrei Krokhin | The approximability of three-valued MAX CSP | null | null | null | null | cs.CC | null | In the maximum constraint satisfaction problem (Max CSP), one is given a
finite collection of (possibly weighted) constraints on overlapping sets of
variables, and the goal is to assign values from a given domain to the
variables so as to maximize the number (or the total weight, for the weighted
case) of satisfied constraints. This problem is NP-hard in general, and,
therefore, it is natural to study how restricting the allowed types of
constraints affects the approximability of the problem. It is known that every
Boolean (that is, two-valued) Max CSP problem with a finite set of allowed
constraint types is either solvable exactly in polynomial time or else
APX-complete (and hence can have no polynomial time approximation scheme unless
P=NP. It has been an open problem for several years whether this result can be
extended to non-Boolean Max CSP, which is much more difficult to analyze than
the Boolean case. In this paper, we make the first step in this direction by
establishing this result for Max CSP over a three-element domain. Moreover, we
present a simple description of all polynomial-time solvable cases of our
problem. This description uses the well-known algebraic combinatorial property
of supermodularity. We also show that every hard three-valued Max CSP problem
contains, in a certain specified sense, one of the two basic hard Max CSP
problems which are the Maximum k-colourable subgraph problems for k=2,3.
| [
{
"version": "v1",
"created": "Fri, 10 Dec 2004 15:34:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jonsson",
"Peter",
""
],
[
"Klasson",
"Mikael",
""
],
[
"Krokhin",
"Andrei",
""
]
] |
cs/0412043 | Roberto Bagnara | Roberto Bagnara, Patricia M. Hill, Elena Mazzi, and Enea Zaffanella | Widening Operators for Weakly-Relational Numeric Abstractions (Extended
Abstract) | null | null | null | null | cs.PL | null | We discuss the divergence problems recently identified in some extrapolation
operators for weakly-relational numeric domains. We identify the cause of the
divergences and point out that resorting to more concrete, syntactic domains
can be avoided by researching suitable algorithms for the elimination of
redundant constraints in the chosen representation.
| [
{
"version": "v1",
"created": "Fri, 10 Dec 2004 15:52:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Mazzi",
"Elena",
""
],
[
"Zaffanella",
"Enea",
""
]
] |
cs/0412045 | Riccardo Pucella | Andrew D. Gordon, Riccardo Pucella | Validating a Web Service Security Abstraction by Typing | 44 pages. A preliminary version appears in the Proceedings of the
Workshop on XML Security 2002, pp. 18-29, November 2002 | Formal Aspects of Computing 17 (3), pp. 277-318, 2005 | null | null | cs.CR | null | An XML web service is, to a first approximation, an RPC service in which
requests and responses are encoded in XML as SOAP envelopes, and transported
over HTTP. We consider the problem of authenticating requests and responses at
the SOAP-level, rather than relying on transport-level security. We propose a
security abstraction, inspired by earlier work on secure RPC, in which the
methods exported by a web service are annotated with one of three security
levels: none, authenticated, or both authenticated and encrypted. We model our
abstraction as an object calculus with primitives for defining and calling web
services. We describe the semantics of our object calculus by translating to a
lower-level language with primitives for message passing and cryptography. To
validate our semantics, we embed correspondence assertions that specify the
correct authentication of requests and responses. By appeal to the type theory
for cryptographic protocols of Gordon and Jeffrey's Cryptyc, we verify the
correspondence assertions simply by typing. Finally, we describe an
implementation of our semantics via custom SOAP headers.
| [
{
"version": "v1",
"created": "Fri, 10 Dec 2004 21:34:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gordon",
"Andrew D.",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
cs/0412046 | David Eppstein | David Eppstein | Quasiconvex Programming | 33 pages, 14 figures | null | null | null | cs.CG | null | We define quasiconvex programming, a form of generalized linear programming
in which one seeks the point minimizing the pointwise maximum of a collection
of quasiconvex functions. We survey algorithms for solving quasiconvex programs
either numerically or via generalizations of the dual simplex method from
linear programming, and describe varied applications of this geometric
optimization technique in meshing, scientific computation, information
visualization, automated algorithm analysis, and robust statistics.
| [
{
"version": "v1",
"created": "Fri, 10 Dec 2004 22:50:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
] |
cs/0412047 | Marko Rodriguez | Marko Rodriguez and Daniel Steinbock | A Social Network for Societal-Scale Decision-Making Systems | Dynamically Distributed Democracy algorithm presented in the arena of
a societal-scale decision support system | North American Association for Computational Social and
Organizational Science Conference Proceedings 2004 | null | null | cs.CY cs.DS cs.HC | null | In societal-scale decision-making systems the collective is faced with the
problem of ensuring that the derived group decision is in accord with the
collective's intention. In modern systems, political institutions have
instatiated representative forms of decision-making to ensure that every
individual in the society has a participatory voice in the decision-making
behavior of the whole--even if only indirectly through representation. An
agent-based simulation demonstrates that in modern representative systems, as
the ratio of representatives increases, there exists an exponential decrease in
the ability for the group to behave in accord with the desires of the whole. To
remedy this issue, this paper provides a novel representative power structure
for decision-making that utilizes a social network and power distribution
algorithm to maintain the collective's perspective over varying degrees of
participation and/or ratios of representation. This work shows promise for the
future development of policy-making systems that are supported by the computer
and network infrastructure of our society.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 00:32:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rodriguez",
"Marko",
""
],
[
"Steinbock",
"Daniel",
""
]
] |
cs/0412048 | Benoit Masson | Enrico Formenti (I3S), Benoit Masson (I3S) | On computing fixed points for generalized sandpiles | Presented in DMCS 2004 (Turku, FINLAND) | null | null | null | cs.CC | null | We prove fixed points results for sandpiles starting with arbitrary initial
conditions. We give an effective algorithm for computing such fixed points, and
we refine it in the particular case of SPM.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 07:51:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Formenti",
"Enrico",
"",
"I3S"
],
[
"Masson",
"Benoit",
"",
"I3S"
]
] |
cs/0412049 | Vedran Kordic | Danica Janglova | Neural Networks in Mobile Robot Motion | 9 Pages | International Journal of Advanced Robotic Systems, Volume 1,
Number 1, March 2004, pp.15-22 | null | null | cs.RO cs.AI | null | This paper deals with a path planning and intelligent control of an
autonomous robot which should move safely in partially structured environment.
This environment may involve any number of obstacles of arbitrary shape and
size; some of them are allowed to move. We describe our approach to solving the
motion-planning problem in mobile robot control using neural networks-based
technique. Our method of the construction of a collision-free path for moving
robot among obstacles is based on two neural networks. The first neural network
is used to determine the "free" space using ultrasound range finder data. The
second neural network "finds" a safe direction for the next robot section of
the path in the workspace while avoiding the nearest obstacles. Simulation
examples of generated path with proposed techniques will be presented.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:32:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Janglova",
"Danica",
""
]
] |
cs/0412050 | Vedran Kordic | Yongsheng Ou & Yangsheng Xu | Gyroscopically Stabilized Robot: Balance and Tracking | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 1, March 2004, pp.23-32 | null | null | cs.RO | null | The single wheel, gyroscopically stabilized robot - Gyrover, is a dynamically
stable but statically unstable, underactuated system. In this paper, based on
the dynamic model of the robot, we investigate two classes of nonholonomic
constraints associated with the system. Then, based on the backstepping
technology, we propose a control law for balance control of Gyrover. Next,
through transferring the systems states from Cartesian coordinate to polar
coordinate, control laws for point-to-point control and line tracking in
Cartesian space are provided.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:38:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ou",
"Yongsheng",
""
],
[
"Xu",
"Yangsheng",
""
]
] |
cs/0412052 | Vedran Kordic | Olivier Michel | WebotsTM: Professional Mobile Robot Simulation | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 1, March 2004, pp.39-42 | null | null | cs.RO | null | Cyberbotics Ltd. develops WebotsTM, a mobile robotics simulation software
that provides you with a rapid prototyping environment for modelling,
programming and simulating mobile robots. The provided robot libraries enable
you to transfer your control programs to several commercially available real
mobile robots. WebotsTM lets you define and modify a complete mobile robotics
setup, even several different robots sharing the same environment. For each
object, you can define a number of properties, such as shape, color, texture,
mass, friction, etc. You can equip each robot with a large number of available
sensors and actuators. You can program these robots using your favorite
development environment, simulate them and optionally transfer the resulting
programs onto your real robots. WebotsTM has been developed in collaboration
with the Swiss Federal Institute of Technology in Lausanne, thoroughly tested,
well documented and continuously maintained for over 7 years. It is now the
main commercial product available from Cyberbotics Ltd.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:45:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Michel",
"Olivier",
""
]
] |
cs/0412053 | Vedran Kordic | Atef A. Ata & Habib Johar | Dynamic simulation of task constrained of a rigid-flexible manipulator | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp.61-66 | null | null | cs.RO | null | A rigid-flexible manipulator may be assigned tasks in a moving environment
where the winds or vibrations affect the position and/or orientation of surface
of operation. Consequently, losses of the contact and perhaps degradation of
the performance may occur as references are changed. When the environment is
moving, knowledge of the angle α between the contact surface and the
horizontal is required at every instant. In this paper, different profiles for
the time varying angle α are proposed to investigate the effect of this
change into the contact force and the joint torques of a rigid-flexible
manipulator. The coefficients of the equation of the proposed rotating surface
are changing with time to determine the new X and Y coordinates of the moving
surface as the surface rotates.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:48:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ata",
"Atef A.",
""
],
[
"Johar",
"Habib",
""
]
] |
cs/0412054 | Vedran Kordic | L. M. Galantucci, G. Percoco & R. Spina | Assembly and Disassembly Planning by using Fuzzy Logic & Genetic
Algorithms | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp.67-74 | null | null | cs.RO | null | The authors propose the implementation of hybrid Fuzzy Logic-Genetic
Algorithm (FL-GA) methodology to plan the automatic assembly and disassembly
sequence of products. The GA-Fuzzy Logic approach is implemented onto two
levels. The first level of hybridization consists of the development of a Fuzzy
controller for the parameters of an assembly or disassembly planner based on
GAs. This controller acts on mutation probability and crossover rate in order
to adapt their values dynamically while the algorithm runs. The second level
consists of the identification of theoptimal assembly or disassembly sequence
by a Fuzzy function, in order to obtain a closer control of the technological
knowledge of the assembly/disassembly process. Two case studies were analyzed
in order to test the efficiency of the Fuzzy-GA methodologies.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:50:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Galantucci",
"L. M.",
""
],
[
"Percoco",
"G.",
""
],
[
"Spina",
"R.",
""
]
] |
cs/0412055 | Vedran Kordic | Alan P. Kypson and W. Randolph Chitwood Jr | Robotic Applications in Cardiac Surgery | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp.87-92 | null | null | cs.RO | null | Traditionally, cardiac surgery has been performed through a median
sternotomy, which allows the surgeon generous access to the heart and
surrounding great vessels. As a paradigm shift in the size and location of
incisions occurs in cardiac surgery, new methods have been developed to allow
the surgeon the same amount of dexterity and accessibility to the heart in
confined spaces and in a less invasive manner. Initially, long instruments
without pivot points were used, however, more recent robotic telemanipulation
systems have been applied that allow for improved dexterity, enabling the
surgeon to perform cardiac surgery from a distance not previously possible. In
this rapidly evolving field, we review the recent history and clinical results
of using robotics in cardiac surgery.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:52:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kypson",
"Alan P.",
""
],
[
"Chitwood",
"W. Randolph",
"Jr"
]
] |
cs/0412056 | Vedran Kordic | Nikita Pashenkov & Ryuichi Iwamasa | One-Chip Solution to Intelligent Robot Control: Implementing Hexapod
Subsumption Architecture Using a Contemporary Microprocessor | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp. 93-98 | null | null | cs.RO | null | This paper introduces a six-legged autonomous robot managed by a single
controller and a software core modeled on subsumption architecture. We begin by
discussing the features and capabilities of IsoPod, a new processor for
robotics which has enabled a streamlined implementation of our project. We
argue that this processor offers a unique set of hardware and software
features, making it a practical development platform for robotics in general
and for subsumption-based control architectures in particular. Next, we
summarize original ideas on subsumption architecture implementation for a
six-legged robot, as presented by its inventor Rodney Brooks in 1980s. A
comparison is then made to a more recent example of a hexapod control
architecture based on subsumption. The merits of both systems are analyzed and
a new subsumption architecture layout is formulated as a response. We conclude
with some remarks regarding the development of this project as a hint at new
potentials for intelligent robot design, opened by a recent development in
embedded controller market.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:55:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pashenkov",
"Nikita",
""
],
[
"Iwamasa",
"Ryuichi",
""
]
] |
cs/0412057 | Vedran Kordic | Miomir Vukobratovic, Dejan Andric & Branislav Borovac | How to achieve various gait patterns from single nominal | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp. 99-108 | null | null | cs.RO | null | In this paper is presented an approach to achieving on-line modification of
nominal biped gait without recomputing entire dynamics when steady motion is
performed. Straight, dynamically balanced walk was used as a nominal gait, and
applied modifications were speed-up and slow-down walk and turning left and
right. It is shown that the disturbances caused by these modifications
jeopardize dynamic stability, but they can be simply compensated to enable walk
continuation.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:57:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vukobratovic",
"Miomir",
""
],
[
"Andric",
"Dejan",
""
],
[
"Borovac",
"Branislav",
""
]
] |
cs/0412058 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng, Joshua Zhexue Huang | Clustering Categorical Data Streams | 23 pages. To Appear in Journal of Computational Methods on Science
and Engineering(JCMSE) | null | null | null | cs.DB cs.AI | null | The data stream model has been defined for new classes of applications
involving massive data being generated at a fast pace. Web click stream
analysis and detection of network intrusions are two examples. Cluster analysis
on data streams becomes more difficult, because the data objects in a data
stream must be accessed in order and can be read only once or few times with
limited resources. Recently, a few clustering algorithms have been developed
for analyzing numeric data streams. However, to our knowledge to date, no
algorithm exists for clustering categorical data streams. In this paper, we
propose an efficient clustering algorithm for analyzing categorical data
streams. It has been proved that the proposed algorithm uses small memory
footprints. We provide empirical analysis on the performance of the algorithm
in clustering both synthetic and real data streams
| [
{
"version": "v1",
"created": "Mon, 13 Dec 2004 06:14:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
],
[
"Huang",
"Joshua Zhexue",
""
]
] |
cs/0412059 | Ross Gayler | Ross W. Gayler | Vector Symbolic Architectures answer Jackendoff's challenges for
cognitive neuroscience | This is a slightly updated version of the paper presented at the
Joint International Conference on Cognitive Science, 13-17 July 2003,
University of New South Wales, Sydney, Australia. 6 pages | null | null | null | cs.NE cs.AI | null | Jackendoff (2002) posed four challenges that linguistic combinatoriality and
rules of language present to theories of brain function. The essence of these
problems is the question of how to neurally instantiate the rapid construction
and transformation of the compositional structures that are typically taken to
be the domain of symbolic processing. He contended that typical connectionist
approaches fail to meet these challenges and that the dialogue between
linguistic theory and cognitive neuroscience will be relatively unproductive
until the importance of these problems is widely recognised and the challenges
answered by some technical innovation in connectionist modelling. This paper
claims that a little-known family of connectionist models (Vector Symbolic
Architectures) are able to meet Jackendoff's challenges.
| [
{
"version": "v1",
"created": "Mon, 13 Dec 2004 08:00:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gayler",
"Ross W.",
""
]
] |
cs/0412061 | Gerard Henry Edmond Duchamp | Gerard Henry Edmond Duchamp (LIPN), Jean-Gabriel Luque (IGM), Karol A.
Penson (LPTL), Christophe Tollu (LIPN) | Free quasi-symmetric functions, product actions and quantum field theory
of partitions | Submitted 28.11.04 | null | null | null | cs.SC math.CO quant-ph | null | We examine two associative products over the ring of symmetric functions
related to the intransitive and Cartesian products of permutation groups. As an
application, we give an enumeration of some Feynman type diagrams arising in
Bender's QFT of partitions. We end by exploring possibilities to construct
noncommutative analogues.
| [
{
"version": "v1",
"created": "Mon, 13 Dec 2004 19:37:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Duchamp",
"Gerard Henry Edmond",
"",
"LIPN"
],
[
"Luque",
"Jean-Gabriel",
"",
"IGM"
],
[
"Penson",
"Karol A.",
"",
"LPTL"
],
[
"Tollu",
"Christophe",
"",
"LIPN"
]
] |
cs/0412062 | Michael Bauland | Michael Bauland and Edith Hemaspaandra | Isomorphic Implication | 22 pages; corrected typos and minor errors | null | null | null | cs.CC | null | We study the isomorphic implication problem for Boolean constraints. We show
that this is a natural analog of the subgraph isomorphism problem. We prove
that, depending on the set of constraints, this problem is in P, NP-complete,
or NP-hard, coNP-hard, and in parallel access to NP. We show how to extend the
NP-hardness and coNP-hardness to hardness for parallel access to NP for some
cases, and conjecture that this can be done in all cases.
| [
{
"version": "v1",
"created": "Tue, 14 Dec 2004 17:15:29 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Apr 2005 12:29:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bauland",
"Michael",
""
],
[
"Hemaspaandra",
"Edith",
""
]
] |
cs/0412064 | Marko Rodriguez | Dan Steinbock, Craig Kaplan, Marko Rodriguez, Juana Diaz, Newton Der,
Suzanne Garcia | Collective Intelligence Quanitifed for Computer-Mediated Group Problem
Solving | University of California, Santa Cruz Tech Report UCSC-CRL-02-28 | null | null | null | cs.CY cs.HC cs.OH | null | Collective Intelligence (CI) is the ability of a group to exhibit greater
intelligence than its individual members. Expressed by the common saying that
"two minds are better than one," CI has been a topic of interest for social
psychology and the information sciences. Computer mediation adds a new element
in the form of distributed networks and group support systems. These facilitate
highly organized group activities that were all but impossible before computer
mediation. This paper presents experimental findings on group problem solving
where a distributed software system automatically integrates input from many
humans. In order to quantify Collective Intelligence, we compare the
performance of groups to individuals when solving a mathematically formalized
problem. This study shows that groups can outperform individuals on difficult
but not easy problems, though groups are slower to produce solutions. The
subjects are 57 university students. The task is the 8-Puzzle sliding tile
game.
| [
{
"version": "v1",
"created": "Wed, 15 Dec 2004 17:13:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steinbock",
"Dan",
""
],
[
"Kaplan",
"Craig",
""
],
[
"Rodriguez",
"Marko",
""
],
[
"Diaz",
"Juana",
""
],
[
"Der",
"Newton",
""
],
[
"Garcia",
"Suzanne",
""
]
] |
cs/0412065 | Riccardo Pucella | Stephen Chong, Riccardo Pucella | A Framework for Creating Natural Language User Interfaces for
Action-Based Applications | 25 pages, 1 figure. A preliminary version of this paper appeared in
the Proceedings of the Third International AMAST Workshop on Algebraic
Methods in Language Processing, TWLT Report 21, pp. 83-98, 2003 | null | null | null | cs.CL cs.HC | null | In this paper we present a framework for creating natural language interfaces
to action-based applications. Our framework uses a number of reusable
application-independent components, in order to reduce the effort of creating a
natural language interface for a given application. Using a type-logical
grammar, we first translate natural language sentences into expressions in an
extended higher-order logic. These expressions can be seen as executable
specifications corresponding to the original sentences. The executable
specifications are then interpreted by invoking appropriate procedures provided
by the application for which a natural language interface is being created.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 03:24:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chong",
"Stephen",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
cs/0412066 | Vitorino Ramos Dr. | Vitorino Ramos, Pedro Pina, Fernando Muge | From Feature Extraction to Classification: A multidisciplinary Approach
applied to Portuguese Granites | 8 pages, 6 figures, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_21.html | SCIA 99, 11th Scandinavian Conf. on Image Analysis, ISBN
87-88306-42-9, Vol.2, pp. 817-824, Kangerlussuaq, Greenland, 7-11, June 1999 | null | null | cs.AI cs.CV | null | The purpose of this paper is to present a complete methodology based on a
multidisciplinary approach, that goes from the extraction of features till the
classification of a set of different portuguese granites. The set of tools to
extract the features that characterise polished surfaces of the granites is
mainly based on mathematical morphology. The classification methodology is
based on a genetic algorithm capable of search the input feature space used by
the nearest neighbour rule classifier. Results show that is adequate to perform
feature reduction and simultaneous improve the recognition rate. Moreover, the
present methodology represents a robust strategy to understand the proper
nature of the images treated, and their discriminant features. KEYWORDS:
Portuguese grey granites, feature extraction, mathematical morphology, feature
reduction, genetic algorithms, nearest neighbour rule classifiers (k-NNR).
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 19:04:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Pina",
"Pedro",
""
],
[
"Muge",
"Fernando",
""
]
] |
cs/0412068 | Vitorino Ramos Dr. | Vitorino Ramos, Ajith Abraham | ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion
Detection System | 13 pages, 3 figures, Swarm Intelligence and Patterns (SIP)- special
track at WSTST 2005, Muroran, JAPAN | null | null | null | cs.CR cs.AI | null | Security of computers and the networks that connect them is increasingly
becoming of great significance. Computer security is defined as the protection
of computing systems against threats to confidentiality, integrity, and
availability. There are two types of intruders: the external intruders who are
unauthorized users of the machines they attack, and internal intruders, who
have permission to access the system with some restrictions. Due to the fact
that it is more and more improbable to a system administrator to recognize and
manually intervene to stop an attack, there is an increasing recognition that
ID systems should have a lot to earn on following its basic principles on the
behavior of complex natural systems, namely in what refers to
self-organization, allowing for a real distributed and collective perception of
this phenomena. With that aim in mind, the present work presents a
self-organized ant colony based intrusion detection system (ANTIDS) to detect
intrusions in a network infrastructure. The performance is compared among
conventional soft computing paradigms like Decision Trees, Support Vector
Machines and Linear Genetic Programming to model fast, online and efficient
intrusion detection systems.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 13:17:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Abraham",
"Ajith",
""
]
] |
cs/0412069 | Vitorino Ramos Dr. | Vitorino Ramos, Jonathan Campbell, John Slater, John Gillespie, Ivan
F. Bendezu, Fionn Murtagh | Swarming around Shellfish Larvae | 11 pages, 4 figures,
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_53.html, submitted to IbPRIA
2005, Portugal | null | null | null | cs.AI cs.CV | null | The collection of wild larvae seed as a source of raw material is a major sub
industry of shellfish aquaculture. To predict when, where and in what
quantities wild seed will be available, it is necessary to track the appearance
and growth of planktonic larvae. One of the most difficult groups to identify,
particularly at the species level are the Bivalvia. This difficulty arises from
the fact that fundamentally all bivalve larvae have a similar shape and colour.
Identification based on gross morphological appearance is limited by the
time-consuming nature of the microscopic examination and by the limited
availability of expertise in this field. Molecular and immunological methods
are also being studied. We describe the application of computational pattern
recognition methods to the automated identification and size analysis of
scallop larvae. For identification, the shape features used are binary
invariant moments; that is, the features are invariant to shift (position
within the image), scale (induced either by growth or differential image
magnification) and rotation. Images of a sample of scallop and non-scallop
larvae covering a range of maturities have been analysed. In order to overcome
the automatic identification, as well as to allow the system to receive new
unknown samples at any moment, a self-organized and unsupervised ant-like
clustering algorithm based on Swarm Intelligence is proposed, followed by
simple k-NNR nearest neighbour classification on the final map. Results achieve
a full recognition rate of 100% under several situations (k =1 or 3).
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 13:30:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Campbell",
"Jonathan",
""
],
[
"Slater",
"John",
""
],
[
"Gillespie",
"John",
""
],
[
"Bendezu",
"Ivan F.",
""
],
[
"Murtagh",
"Fionn",
""
]
] |
cs/0412070 | Vitorino Ramos Dr. | Vitorino Ramos, Fernando Muge | Less is More - Genetic Optimisation of Nearest Neighbour Classifiers | 9 pages, 7 figures, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_13.html | Proc. RecPad 98 - 10th Portuguese Conference on Pattern
Recognition, F.Muge, C.Pinto and M.Piedade Eds., ISBN 972-97711-0-3, pp.
293-301, Lisbon, March 1998 | null | null | cs.AI cs.CV | null | The present paper deals with optimisation of Nearest Neighbour rule
Classifiers via Genetic Algorithms. The methodology consists on implement a
Genetic Algorithm capable of search the input feature space used by the NNR
classifier. Results show that is adequate to perform feature reduction and
simultaneous improve the Recognition Rate. Some practical examples prove that
is possible to Recognise Portuguese Granites in 100%, with only 3 morphological
features (from an original set of 117 features), which is well suited for real
time applications. Moreover, the present method represents a robust strategy to
understand the proper nature of the images treated, and their discriminant
features. KEYWORDS: Feature Reduction, Genetic Algorithms, Nearest Neighbour
Rule Classifiers (k-NNR).
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 19:09:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Muge",
"Fernando",
""
]
] |
cs/0412073 | Vitorino Ramos Dr. | Vitorino Ramos | Self-Organizing the Abstract: Canvas as a Swarm Habitat for Collective
Memory, Perception and Cooperative Distributed Creativity | 2 pages, 1 figure, Project at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/Artsbot.html. Publication at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_37.html | in First Art and Science Symposium, Models to Know Reality, J.
Rekalde, R. Ibanez and A. Simo (Eds.), pp. 59-60, Facultad de Bellas Artes
EHU/UPV, Universidad del Pais Vasco, 11-12 Dec., Bilbao, Spain, 2003 | null | null | cs.MM cs.AI | null | Past experiences under the designation of "Swarm Paintings" conducted in
2001, not only confirmed the possibility of realizing an artificial art (thus
non-human), as introduced into the process the questioning of creative
migration, specifically from the computer monitors to the canvas via a robotic
harm. In more recent self-organized based research we seek to develop and
profound the initial ideas by using a swarm of autonomous robots (ARTsBOT
project 2002-03), that "live" avoiding the purpose of being merely a simple
perpetrator of order streams coming from an external computer, but instead,
that actually co-evolve within the canvas space, acting (that is, laying ink)
according to simple inner threshold stimulus response functions, reacting
simultaneously to the chromatic stimulus present in the canvas environment done
by the passage of their team-mates, as well as by the distributed feedback,
affecting their future collective behaviour. In parallel, and in what respects
to certain types of collective systems, we seek to confirm, in a physically
embedded way, that the emergence of order (even as a concept) seems to be found
at a lower level of complexity, based on simple and basic interchange of
information, and on the local dynamic of parts, who, by self-organizing
mechanisms tend to form an lived whole, innovative and adapting, allowing for
emergent open-ended creative and distributed production. KEYWORDS: ArtSBots
Project, Swarm Intelligence, Stigmergy, UnManned Art, Symbiotic Art, Swarm
Paintings, Robot Paintings, Non-Human Art, Painting Emergence and Cooperation,
Art and Complexity, ArtBots: The Robot Talent Show.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 15:36:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
] |
cs/0412074 | Elizabeth Haubert | Elizabeth Haubert | Threats of Human Error in a High-Performance Storage System: Problem
Statement and Case Study | 13 pages, 1 figure | null | null | null | cs.HC cs.OS | null | System administration is a difficult, often tedious, job requiring many
skilled laborers. The data that is protected by system administrators is often
valued at or above the value of the institution maintaining that data. A number
of ethnographic studies have confirmed the skill of these operators, and the
difficulty of providing adequate tools. In an effort to minimize the
maintenance costs, an increasing portion of system administration is subject to
automation - particularly simple, routine tasks such as data backup. While such
tools reduce the risk of errors from carelessness, the same tools may result in
reduced skill and system familiarity in experienced workers. Care should be
taken to ensure that operators maintain system awareness without placing the
operator in a passive, monitoring role.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 15:38:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haubert",
"Elizabeth",
""
]
] |
cs/0412075 | Vitorino Ramos Dr. | Vitorino Ramos, Juan J. Merelo | Self-Organized Stigmergic Document Maps: Environment as a Mechanism for
Context Learning | 10 pages, 5 figures, at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_42.html | in AEB 2002, 1st Spanish Conference on Evolutionary and
Bio-Inspired Algorithms, E. Alba, F. Herrera, J.J. Merelo et al. (Eds.), pp.
284-293, Centro Univ. de Merida, Merida, Spain, 6-8 Feb. 2002 | null | null | cs.AI cs.DC | null | Social insect societies and more specifically ant colonies, are distributed
systems that, in spite of the simplicity of their individuals, present a highly
structured social organization. As a result of this organization, ant colonies
can accomplish complex tasks that in some cases exceed the individual
capabilities of a single ant. The study of ant colonies behavior and of their
self-organizing capabilities is of interest to knowledge retrieval/management
and decision support systems sciences, because it provides models of
distributed adaptive organization which are useful to solve difficult
optimization, classification, and distributed control problems, among others.
In the present work we overview some models derived from the observation of
real ants, emphasizing the role played by stigmergy as distributed
communication paradigm, and we present a novel strategy to tackle unsupervised
clustering as well as data retrieval problems. The present ant clustering
system (ACLUSTER) avoids not only short-term memory based strategies, as well
as the use of several artificial ant types (using different speeds), present in
some recent approaches. Moreover and according to our knowledge, this is also
the first application of ant systems into textual document clustering.
KEYWORDS: Swarm Intelligence, Ant Systems, Unsupervised Clustering, Data
Retrieval, Data Mining, Distributed Computing, Document Maps, Textual Document
Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 15:47:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Merelo",
"Juan J.",
""
]
] |
cs/0412076 | Vitorino Ramos Dr. | J.R. Caldas-Pinto, Pedro Pina, Vitorino Ramos, Mario Ramalho | Clustering Techniques for Marbles Classification | 7 pages, 17 figures, at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_41.html | RecPad 2002 -12th Portuguese Conference on Pattern Recognition,
ISBN 972-789-067-9, Aveiro, Portugal, June 27-28, 2002 | null | null | cs.AI cs.CV | null | Automatic marbles classification based on their visual appearance is an
important industrial issue. However, there is no definitive solution to the
problem mainly due to the presence of randomly distributed high number of
different colours and its subjective evaluation by the human expert. In this
paper we present a study of segmentation techniques, we evaluate they overall
performance using a training set and standard quality measures and finally we
apply different clustering techniques to automatically classify the marbles.
KEYWORDS: Segmentation, Clustering, Quadtrees, Learning Vector Quantization
(LVQ), Simulated Annealing (SA).
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 15:55:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Caldas-Pinto",
"J. R.",
""
],
[
"Pina",
"Pedro",
""
],
[
"Ramos",
"Vitorino",
""
],
[
"Ramalho",
"Mario",
""
]
] |
cs/0412077 | Vitorino Ramos Dr. | Vitorino Ramos | On the Implicit and on the Artificial - Morphogenesis and Emergent
Aesthetics in Autonomous Collective Systems | 33 pages, 7 figures, Project at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/Artsbot.html . Publ. at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_37.html | Chapter 2 in ARCHITOPIA Book, Art, Architecture and Science, J.L.
Maubant et al. (Eds.), pp. 25-57, INSTITUT D'ART CONTEMPORAIN (France), ISBN
: 2905985631, Feb. 2002 | null | null | cs.AI cs.MM | null | Imagine a "machine" where there is no pre-commitment to any particular
representational scheme: the desired behaviour is distributed and roughly
specified simultaneously among many parts, but there is minimal specification
of the mechanism required to generate that behaviour, i.e. the global behaviour
evolves from the many relations of multiple simple behaviours. A machine that
lives to and from/with Synergy. An artificial super-organism that avoids
specific constraints and emerges within multiple low-level implicit
bio-inspired mechanisms. KEYWORDS: Complex Science, ArtSBots Project, Swarm
Intelligence, Stigmergy, UnManned Art, Symbiotic Art, Swarm Paintings, Robot
Paintings, Non-Human Art, Painting Emergence and Cooperation, Art and
Complexity, ArtBots: The Robot Talent Show.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:15:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
] |
cs/0412078 | David Renault | D. Renault | The vertex-transitive TLF-planar graphs | Article : 23 pages, 15 figures Appendix : 13 pages, 72 figures
Submitted to Discrete Mathematics The appendix is accessible at
http://www.labri.fr/~renault/research/research.html | null | null | null | cs.DM | null | We consider the class of the topologically locally finite (in short TLF)
planar vertex-transitive graphs, a class containing in particular all the
one-ended planar Cayley graphs and the normal transitive tilings. We
characterize these graphs with a finite local representation and a special kind
of finite state automaton named labeling scheme. As a result, we are able to
enumerate and describe all TLF-planar vertex-transitive graphs of any given
degree. Also, we are able decide to whether any TLF-planar transitive graph is
Cayley or not.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:18:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Renault",
"D.",
""
]
] |
cs/0412079 | Vitorino Ramos Dr. | Vitorino Ramos | The MC2 Project [Machines of Collective Conscience]: A possible walk, up
to Life-like Complexity and Behaviour, from bottom, basic and simple
bio-inspired heuristics - a walk, up into the morphogenesis of information | 14 pages, Project at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/MC2.html | at UTOPIA Biennial Art Exposition CATALOGUE, Cascais, Portugal,
July 12-22, 2001 | null | null | cs.AI cs.MM | null | Synergy (from the Greek word synergos), broadly defined, refers to combined
or co-operative effects produced by two or more elements (parts or
individuals). The definition is often associated with the holistic conviction
quote that "the whole is greater than the sum of its parts" (Aristotle, in
Metaphysics), or the whole cannot exceed the sum of the energies invested in
each of its parts (e.g. first law of thermodynamics) even if it is more
accurate to say that the functional effects produced by wholes are different
from what the parts can produce alone. Synergy is a ubiquitous phenomena in
nature and human societies alike. One well know example is provided by the
emergence of self-organization in social insects, via direct or indirect
interactions. The latter types are more subtle and defined as stigmergy to
explain task coordination and regulation in the context of nest reconstruction
in termites. An example, could be provided by two individuals, who interact
indirectly when one of them modifies the environment and the other responds to
the new environment at a later time. In other words, stigmergy could be defined
as a particular case of environmental or spatial synergy. The system is purely
holistic, and their properties are intrinsically emergent and autocatalytic. On
the present work we present a "machine" where there is no precommitment to any
particular representational scheme: the desired behaviour is distributed and
roughly specified simultaneously among many parts, but there is minimal
specification of the mechanism required to generate that behaviour, i.e. the
global behaviour evolves from the many relations of multiple simple behaviours.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:28:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
] |
cs/0412080 | Vitorino Ramos Dr. | Vitorino Ramos | The Biological Concept of Neoteny in Evolutionary Colour Image
Segmentation - Simple Experiments in Simple Non-Memetic Genetic Algorithms | 12 pages, 3 figures, at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_35.html | in Applications of Evolutionary Computation, (Eds.), EuroGP /
EvoIASP 2001 - 3rd Eur. Works. on Evol. Comp. in Image Analysis and Signal
Processing, Lake Como, Milan, Italy, Lecture Notes in Computer Science, Vol.
2037, pp. 364-378, Springer-Verlag, Berlin-Heidelberg, April 18-20, 2001 | null | null | cs.AI cs.NE | null | Neoteny, also spelled Paedomorphosis, can be defined in biological terms as
the retention by an organism of juvenile or even larval traits into later life.
In some species, all morphological development is retarded; the organism is
juvenilized but sexually mature. Such shifts of reproductive capability would
appear to have adaptive significance to organisms that exhibit it. In terms of
evolutionary theory, the process of paedomorphosis suggests that larval stages
and developmental phases of existing organisms may give rise, under certain
circumstances, to wholly new organisms. Although the present work does not
pretend to model or simulate the biological details of such a concept in any
way, these ideas were incorporated by a rather simple abstract computational
strategy, in order to allow (if possible) for faster convergence into simple
non-memetic Genetic Algorithms, i.e. without using local improvement procedures
(e.g. via Baldwin or Lamarckian learning). As a case-study, the Genetic
Algorithm was used for colour image segmentation purposes by using K-mean
unsupervised clustering methods, namely for guiding the evolutionary algorithm
in his search for finding the optimal or sub-optimal data partition. Average
results suggest that the use of neotonic strategies by employing juvenile
genotypes into the later generations and the use of linear-dynamic mutation
rates instead of constant, can increase fitness values by 58% comparing to
classical Genetic Algorithms, independently from the starting population
characteristics on the search space. KEYWORDS: Genetic Algorithms, Artificial
Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation,
Classification, Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:39:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
] |
cs/0412081 | Vitorino Ramos Dr. | Vitorino Ramos | Artificial Neoteny in Evolutionary Image Segmentation | 10 pages, 4 figures | SIARP 2000 - 5th IberoAmerican Symp. on Pattern Rec., F. Muge,
Moises P. and R. Caldas Pinto (Eds.), ISBN 972-97711-1-1, pp. 69-78, Lisbon,
Portugal, 11-13 Sep. 2000 | null | null | cs.AI cs.NE | null | Neoteny, also spelled Paedomorphosis, can be defined in biological terms as
the retention by an organism of juvenile or even larval traits into later life.
In some species, all morphological development is retarded; the organism is
juvenilized but sexually mature. Such shifts of reproductive capability would
appear to have adaptive significance to organisms that exhibit it. In terms of
evolutionary theory, the process of paedomorphosis suggests that larval stages
and developmental phases of existing organisms may give rise, under certain
circumstances, to wholly new organisms. Although the present work does not
pretend to model or simulate the biological details of such a concept in any
way, these ideas were incorporated by a rather simple abstract computational
strategy, in order to allow (if possible) for faster convergence into simple
non-memetic Genetic Algorithms, i.e. without using local improvement procedures
(e.g. via Baldwin or Lamarckian learning). As a case-study, the Genetic
Algorithm was used for colour image segmentation purposes by using K-mean
unsupervised clustering methods, namely for guiding the evolutionary algorithm
in his search for finding the optimal or sub-optimal data partition. Average
results suggest that the use of neotonic strategies by employing juvenile
genotypes into the later generations and the use of linear-dynamic mutation
rates instead of constant, can increase fitness values by 58% comparing to
classical Genetic Algorithms, independently from the starting population
characteristics on the search space. KEYWORDS: Genetic Algorithms, Artificial
Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation,
Classification, Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:44:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
] |
cs/0412083 | Vitorino Ramos Dr. | A. Marcolino, Vitorino Ramos, Mario Ramalho, J.R. Caldas Pinto | Line and Word Matching in Old Documents | 12 pages, 7 figures, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_32.html | SIARP 2000 - 5th IberoAmerican Symp. on Pattern Rec., F. Muge,
Moises P. and R. Caldas Pinto (Eds.), ISBN 972-97711-1-1, pp. 123-135,
Lisbon, Portugal, 11-13 Sep. 2000 | null | null | cs.AI cs.CV | null | This paper is concerned with the problem of establishing an index based on
word matching. It is assumed that the book was digitised as better as possible
and some pre-processing techniques were already applied as line orientation
correction and some noise removal. However two main factor are responsible for
being not possible to apply ordinary optical character recognition techniques
(OCR): the presence of antique fonts and the degraded state of many characters
due to unrecoverable original time degradation. In this paper we make a short
introduction to word segmentation that involves finding the lines that
characterise a word. After we discuss different approaches for word matching
and how they can be combined to obtain an ordered list for candidate words for
the matching. This discussion will be illustrated by examples.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:58:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marcolino",
"A.",
""
],
[
"Ramos",
"Vitorino",
""
],
[
"Ramalho",
"Mario",
""
],
[
"Pinto",
"J. R. Caldas",
""
]
] |
cs/0412084 | Vitorino Ramos Dr. | Vitorino Ramos, Fernando Muge | Map Segmentation by Colour Cube Genetic K-Mean Clustering | 4 pages, 1 figure, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_31.html | ECDL 2000 - 4th Eur. Conf. on Research and Advanced Technology for
Digital Libraries, J. Borbinha and T. Baker (Eds.), ISBN 3-540-41023-6, LNCS
series, Vol. 1923, pp. 319-323, Springer-Verlag, Heidelberg, Lisbon,
Portugal, 18-20 Sep. 2000 | null | null | cs.AI cs.NE | null | Segmentation of a colour image composed of different kinds of texture regions
can be a hard problem, namely to compute for an exact texture fields and a
decision of the optimum number of segmentation areas in an image when it
contains similar and/or unstationary texture fields. In this work, a method is
described for evolving adaptive procedures for these problems. In many real
world applications data clustering constitutes a fundamental issue whenever
behavioural or feature domains can be mapped into topological domains. We
formulate the segmentation problem upon such images as an optimisation problem
and adopt evolutionary strategy of Genetic Algorithms for the clustering of
small regions in colour feature space. The present approach uses k-Means
unsupervised clustering methods into Genetic Algorithms, namely for guiding
this last Evolutionary Algorithm in his search for finding the optimal or
sub-optimal data partition, task that as we know, requires a non-trivial search
because of its NP-complete nature. To solve this task, the appropriate genetic
coding is also discussed, since this is a key aspect in the implementation. Our
purpose is to demonstrate the efficiency of Genetic Algorithms to automatic and
unsupervised texture segmentation. Some examples in Colour Maps are presented
and overall results discussed. KEYWORDS: Genetic Algorithms, Artificial
Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation,
Classification, Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 17:04:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Muge",
"Fernando",
""
]
] |
cs/0412086 | Vitorino Ramos Dr. | Vitorino Ramos, Filipe Almeida | Artificial Ant Colonies in Digital Image Habitats - A Mass Behaviour
Effect Study on Pattern Recognition | 11 pages, 3 figures, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_29.html | Proc. of ANTS 2000 - 2nd Int. Works. on Ant Algorithms (From Ant
Colonies to Artificial Ants), Marco Dorigo, Martin Middendorf, Thomas Stuzle
(Eds.), pp. 113, Brussels, Belgium, 7-9 Sep. 2000 | null | null | cs.AI cs.CV | null | Some recent studies have pointed that, the self-organization of neurons into
brain-like structures, and the self-organization of ants into a swarm are
similar in many respects. If possible to implement, these features could lead
to important developments in pattern recognition systems, where perceptive
capabilities can emerge and evolve from the interaction of many simple local
rules. The principle of the method is inspired by the work of Chialvo and
Millonas who developed the first numerical simulation in which swarm cognitive
map formation could be explained. From this point, an extended model is
presented in order to deal with digital image habitats, in which artificial
ants could be able to react to the environment and perceive it. Evolution of
pheromone fields point that artificial ant colonies could react and adapt
appropriately to any type of digital habitat. KEYWORDS: Swarm Intelligence,
Self-Organization, Stigmergy, Artificial Ant Systems, Pattern Recognition and
Perception, Image Segmentation, Gestalt Perception Theory, Distributed
Computation.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 17:19:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Almeida",
"Filipe",
""
]
] |
cs/0412087 | Vitorino Ramos Dr. | Vitorino Ramos, Fernando Muge | Image Colour Segmentation by Genetic Algorithms | 5 pages, 1 figure, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_26.html | RecPad 2000 - 11th Portuguese Conf. on Pattern Recognition, in
Aurelio C. Campilho and A.M. Mendonca (Eds.), ISBN 972-96883-2-5, pp.
125-129, Porto, Portugal, May 11-12, 2000 | null | null | cs.AI cs.CV | null | Segmentation of a colour image composed of different kinds of texture regions
can be a hard problem, namely to compute for an exact texture fields and a
decision of the optimum number of segmentation areas in an image when it
contains similar and/or unstationary texture fields. In this work, a method is
described for evolving adaptive procedures for these problems. In many real
world applications data clustering constitutes a fundamental issue whenever
behavioural or feature domains can be mapped into topological domains. We
formulate the segmentation problem upon such images as an optimisation problem
and adopt evolutionary strategy of Genetic Algorithms for the clustering of
small regions in colour feature space. The present approach uses k-Means
unsupervised clustering methods into Genetic Algorithms, namely for guiding
this last Evolutionary Algorithm in his search for finding the optimal or
sub-optimal data partition, task that as we know, requires a non-trivial search
because of its intrinsic NP-complete nature. To solve this task, the
appropriate genetic coding is also discussed, since this is a key aspect in the
implementation. Our purpose is to demonstrate the efficiency of Genetic
Algorithms to automatic and unsupervised texture segmentation. Some examples in
Colour Maps, Ornamental Stones and in Human Skin Mark segmentation are
presented and overall results discussed. KEYWORDS: Genetic Algorithms, Colour
Image Segmentation, Classification, Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 17:29:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Muge",
"Fernando",
""
]
] |
cs/0412088 | Vitorino Ramos Dr. | Vitorino Ramos, Fernando Muge | On Image Filtering, Noise and Morphological Size Intensity Diagrams | 9 pages, 4 figures, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_25.html | RecPad 2000 - 11th Portuguese Conf. on Pattern Recognition, in
Aurelio C. Campilho and A.M. Mendonca (Eds.), ISBN 972-96883-2-5, pp.
483-491, Porto, Portugal, May 11-12, 2000 | null | null | cs.CV cs.AI | null | In the absence of a pure noise-free image it is hard to define what noise is,
in any original noisy image, and as a consequence also where it is, and in what
amount. In fact, the definition of noise depends largely on our own aim in the
whole image analysis process, and (perhaps more important) in our
self-perception of noise. For instance, when we perceive noise as disconnected
and small it is normal to use MM-ASF filters to treat it. There is two
evidences of this. First, in many instances there is no ideal and pure
noise-free image to compare our filtering process (nothing but our
self-perception of its pure image); second, and related with this first point,
MM transformations that we chose are only based on our self - and perhaps -
fuzzy notion. The present proposal combines the results of two MM filtering
transformations (FT1, FT2) and makes use of some measures and quantitative
relations on their Size/Intensity Diagrams to find the most appropriate noise
removal process. Results can also be used for finding the most appropriate stop
criteria, and the right sequence of MM operators combination on Alternating
Sequential Filters (ASF), if these measures are applied, for instance, on a
Genetic Algorithm's target function.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 18:58:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Muge",
"Fernando",
""
]
] |
cs/0412089 | Evgeny Yanenko O. | Evgeny Yanenko | Evolving Categories: Consistent Framework for Representation of Data and
Algorithms | 10 pages, 20 pictures | null | null | null | cs.DS | null | A concept of "evolving categories" is suggested to build a simple, scalable,
mathematically consistent framework for representing in uniform way both data
and algorithms. A state machine for executing algorithms becomes clear, rich
and powerful semantics, based on category theory, and still allows easy
implementation. Moreover, it gives an original insight into the nature and
semantics of algorithms.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 22:58:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yanenko",
"Evgeny",
""
]
] |
cs/0412090 | Serban Vlad E. | Serban E. Vlad | Real Time Models of the Asynchronous Circuits: The Delay Theory | 82 pages, 30 figures | in New Developments in Computer Science Research, Editor Susan
Shannon, Nova Science Publishers, Inc., New York, 2005 | null | null | cs.GL | null | The chapter from the book introduces the delay theory, whose purpose is the
modeling of the asynchronous circuits from digital electrical engineering with
ordinary and differential pseudo-boolean equations.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 23:04:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.