id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0411059
Didier Donsez
Frederic Briclet (JACQUARD Ur-F Lifl), Christophe Contreras (JACQUARD Ur-F Lifl), Philippe Merle (JACQUARD Ur-F Lifl)
OpenCCM : une infrastructure a composants pour le deploiement d'applications a base de composants CORBA
null
DECOR04 (2004) 101-112
null
null
cs.NI
null
Deployment of software components for building distributed applications consists of the coordination of a set of basic tasks like uploading component binaries to the execution sites, loading them in memory, instantiating components, interconnecting their ports, setting their business and technical attributes. The automation of the deployment process then requires the presence of a software infrastructure distributed itself on the different execution sites. This paper presents the characteristics of such an infrastructure for the deployment of CORBA component-based applications. This latter is designed and implemented in the context of our OpenCCM platform, an open source implementation of the CORBA Component Model. The main characteristic lays on the fact that this infrastructure is itself designed as a set of CORBA component assemblies. This allows its dynamic assembly during its deployment over the execution sites
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:35:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Briclet", "Frederic", "", "JACQUARD Ur-F Lifl" ], [ "Contreras", "Christophe", "", "JACQUARD\n Ur-F Lifl" ], [ "Merle", "Philippe", "", "JACQUARD Ur-F Lifl" ] ]
cs/0411060
Didier Donsez
Stephane Frenot (ARES UR-RA)
Gestion du deploiement de composants sur reseau P2P
null
DECOR04 (2004) 113-124
null
null
cs.NI
null
The deployment of component-based applications relies on a centralized directory to store the components. This paper describes an approach to distribute software components to be deployed on a set of peers of a peer to peer network in order to exploit some associated characteristics (load balancing, fault-tolerance, self-organisation). The proposed architecture is situated in the context of OSGI application deployment management. The software components (bundles) are distributed among a set of nodes participating in the execution of services. When a node wants to install a component which is not deployed locally, the component is looked for and installed using a p2p network. ----- Le deploiement d'applications a composants repose sur une approche d'annuaire centralise de stockage des composants. Cet article decrit une approche pour distribuer les composants logiciels a deployer sur un ensemble de noeuds d'un reseau pair-a-pair afin de pouvoir exploiter certaines caracteristiques associees (equilibrage de charge, tolerance de panne, auto-organisation). L'architecture proposee entre dans le cadre de la gestion du deploiement d'applications sur le modele OSGi. Les composants logiciels (ou bundles) sont repartis a travers un ensemble de noeuds participant a l'execution de services. Lorsqu'un noeud veut installer un composant et si celui-ci n'est pas encore deploye localement, il est recherche et installe en utilisant un reseau p2p
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:36:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Frenot", "Stephane", "", "ARES UR-RA" ] ]
cs/0411061
Didier Donsez
Noelle Merle (LSR - IMAG)
Un meta-modele pour l'automatisation du deploiement d'applications logicielles
null
DECOR04 (2004) 125-132
null
null
cs.NI
null
Le deploiement est maintenant considere comme une activite a part entiere du cycle de vie du logiciel. Les grandes entreprises souhaitent pouvoir automatiser cette etape tout en prenant en compte les caracteristiques de chaque machine cible. Pour repondre a ces besoins, nous avons defini un environnement de deploiement : ORYA (Open enviRonment to deploY Applications). Cet environnement utilise un meta-modele de deploiement, decrit dans ce papier. Notre approche utilise aussi les technologies des federations et des procedes, fournissant un environnement flexible et extensible pour l'utilisateur. ----- The deployment is now a full activity of the software lifecycle. Large enterprises want to automate this step, taking into account characteristics of each target machine. To satisfy these needs, we have defined an environment for the deployment phase: ORYA (Open enviRonment to deploY Applications). This environment uses a deployment metamodel, described in this paper. Our approach is based also on federation and process federations, providing a flexible and extensible environment to the user
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:41:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Merle", "Noelle", "", "LSR - IMAG" ] ]
cs/0411062
Didier Donsez
Didier Donsez (LSR - IMAG), Humberto Cervantes (LSR - IMAG), Mikael Desertot (LSR - IMAG)
FROGi : Deploiement de composants Fractal sur OSGi
null
DECOR04 (2004) 147-158
null
null
cs.NI
null
Cet article presente FROGi, une proposition visant a introduire le modele a composants Fractal a l'interieur de la plateforme de services OSGi. La motivation derriere ce travail est double. D'un cote, FROGi offre aux developpeurs de services OSGi un modele a composants extensibles qui facilite le developpement des bundles ; ces derniers restent toutefois compatibles avec les bundles "patrimoniaux". D'un autre cote, FROGi beneficie de l'infrastructure de deploiement que represente OSGi et qui facilite la realisation du conditionnement et du deploiement de composants Fractal. Dans FROGi, une application Fractal est conditionnee sous la forme d'un ou plusieurs bundles et elle peut etre deployee de facon partielle et les activites de deploiement peuvent avoir lieu de facon continue. -- This paper presents FROGi, a proposal to introduce the Fractal component model into the OSGi services platform. There are two motivations for this work. The first one is to offer a flexible component model to the OSGi developers to simplify bundle development. Bundles developed with FROGi are nevertheless compatible with standard bundles. The second motivation is to leverage OSGi's deployment capabilities to package and deploy Fractal components. In FROGi, a Fractal application is packaged and delivered as a set of OSGi bundles; such an application supports partial deployment and additionally, deployment activities can occur continuously.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:43:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Donsez", "Didier", "", "LSR - IMAG" ], [ "Cervantes", "Humberto", "", "LSR - IMAG" ], [ "Desertot", "Mikael", "", "LSR - IMAG" ] ]
cs/0411063
Christiane Lechner
Christiane Lechner, Dana Alic, Sascha Husa
From Tensor Equations to Numerical Code -- Computer Algebra Tools for Numerical Relativity
LaTeX llncs style, 9 pages, 1 figure, to appaer in the proceedings of "SYNASC 2004 - 6th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", Timisoara, Romania, September 26-30 2004
null
null
AEI-2004-108
cs.SC
null
In this paper we present our recent work in developing a computer-algebra tool for systems of partial differential equations (PDEs), termed "Kranc". Our work is motivated by the problem of finding solutions of the Einstein equations through numerical simulations. Kranc consists of Mathematica based computer-algebra packages, that facilitate the task of dealing with symbolic tensorial calculations and realize the conversion of systems of partial differential evolution equations into parallelized C or Fortran code.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 14:30:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Lechner", "Christiane", "" ], [ "Alic", "Dana", "" ], [ "Husa", "Sascha", "" ] ]
cs/0411064
Daniel A. Spielman
Michael Elkin, Yuval Emek, Daniel A. Spielman and Shang-Hua Teng
Lower-Stretch Spanning Trees
null
null
null
null
cs.DS cs.DM
null
We prove that every weighted graph contains a spanning tree subgraph of average stretch O((log n log log n)^2). Moreover, we show how to construct such a tree in time O(m log^2 n).
[ { "version": "v1", "created": "Wed, 17 Nov 2004 22:07:46 GMT" }, { "version": "v2", "created": "Wed, 5 Jan 2005 21:06:44 GMT" }, { "version": "v3", "created": "Mon, 14 Feb 2005 21:17:11 GMT" }, { "version": "v4", "created": "Mon, 21 Mar 2005 21:52:20 GMT" }, { "version": "v5", "created": "Fri, 13 May 2005 17:20:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Elkin", "Michael", "" ], [ "Emek", "Yuval", "" ], [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0411066
Alex Wiesmaier
V. Karatsiolis, M. Lippert and A. Wiesmaier
Using LDAP Directories for Management of PKI Processes
9 pages, 1 figure
In Proceedings of Public Key Infrastructure: First European PKI Workshop: Research and Applications, EuroPKI 2004, volume 3093 of Lecture Notes in Computer Science, pages 126-134, June 2004
null
null
cs.CR
null
We present a framework for extending the functionality of LDAP servers from their typical use as a public directory in public key infrastructures. In this framework the LDAP servers are used for administrating infrastructure processes. One application of this framework is a method for providing proof-of-possession, especially in the case of encryption keys. Another one is the secure delivery of software personal security environments.
[ { "version": "v1", "created": "Thu, 18 Nov 2004 19:00:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Karatsiolis", "V.", "" ], [ "Lippert", "M.", "" ], [ "Wiesmaier", "A.", "" ] ]
cs/0411068
Alex Wiesmaier
V. Karatsiolis, M. Lippert, A. Wiesmaier
Planning for Directory Services in Public Key Infrastructures
12 pages; 1 figure; accepted at QSIG2005 (see http://www-sec.uni-regensburg.de/sicherheit2005/index.shtml); camera ready version
Proceedings of "Sicherheit 2005"; April 2005
null
null
cs.CR
null
In this paper we provide a guide for public key infrastructure designers and administrators when planning for directory services. We concentrate on the LDAP directories and how they can be used to successfully publish PKI information. We analyse their available mechanisms and propose a best practice guide for use in PKI. We then take a look into the German Signature Act and Ordinance and discuss their part as far as directories concerning. Finally, we translate those to the LDAP directories practices.
[ { "version": "v1", "created": "Thu, 18 Nov 2004 19:40:59 GMT" }, { "version": "v2", "created": "Thu, 13 Jan 2005 17:07:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Karatsiolis", "V.", "" ], [ "Lippert", "M.", "" ], [ "Wiesmaier", "A.", "" ] ]
cs/0411070
Pradipta De Pradipta De
Pradipta De
Data Path Processing in Fast Programmable Routers
ECSL Technical Report #127, Stony Brook University
null
null
null
cs.NI
null
Internet is growing at a fast pace. The link speeds are surging toward 40 Gbps with the emergence of faster link technologies. New applications are coming up which require intelligent processing at the intermediate routers. Switches and routers are becoming the bottlenecks in fast communication. On one hand faster links deliver more packets every second and on the other hand intelligent processing consumes more CPU cycles at the router. The conflicting goals of providing faster but computationally expensive processing call for new approaches in designing routers. This survey takes a look at the core functionalities, like packet classification, buffer memory management, switch scheduling and output link scheduling performed by a router in its data path processing and discusses the algorithms that aim to reduce the performance bound for these operations. An important requirement for the routers is to provide Quality of Service guarantees. We propose an algorithm to guarantee QoS in Input Queued Routers. The hardware solution to speed up router operation was Application Specific Integrated Circuits (ASICs). But the inherent inflexibility of the method is a demerit as network standards and application requirements are constantly evolving, which seek a faster turnaround time to keep up with the changes. The promise of Network Processors (NP) is the flexibility of general-purpose processors together with the speed of ASICs. We will study the architectural choices for the design of Network Processors and focus on some of the commercially available NPs. There is a plethora of NP vendors in the market. The discussion on the NP benchmarks sets the normalizing platform to evaluate these NPs.
[ { "version": "v1", "created": "Thu, 18 Nov 2004 23:19:44 GMT" } ]
2007-05-23T00:00:00
[ [ "De", "Pradipta", "" ] ]
cs/0411074
Daniel Gayo Avello
Daniel Gayo-Avello
Building Chinese Lexicons from Scratch by Unsupervised Short Document Self-Segmentation
9 pages 3 figures 2 tables
null
null
null
cs.CL cs.IR
null
Chinese text segmentation is a well-known and difficult problem. On one side, there is not a simple notion of "word" in Chinese language making really hard to implement rule-based systems to segment written texts, thus lexicons and statistical information are usually employed to achieve such a task. On the other side, any piece of Chinese text usually includes segments present neither in the lexicons nor in the training data. Even worse, such unseen sequences can be segmented into a number of totally unrelated words making later processing phases difficult. For instance, using a lexicon-based system the sequence ???(Baluozuo, Barroso, current president-designate of the European Commission) can be segmented into ?(ba, to hope, to wish) and ??(luozuo, an undefined word) changing completely the meaning of the sentence. A new and extremely simple algorithm specially suited to work over short Chinese documents is introduced. This new algorithm performs text "self-segmentation" producing results comparable to those achieved by native speakers without using either lexicons or any statistical information beyond the obtained from the input text. Furthermore, it is really robust for finding new "words", especially proper nouns, and it is well suited to build lexicons from scratch. Some preliminary results are provided in addition to examples of its employment.
[ { "version": "v1", "created": "Sat, 20 Nov 2004 00:22:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Gayo-Avello", "Daniel", "" ] ]
cs/0411075
Darran Nathan
Andreas Weisensee, Darran Nathan
A Self-Reconfigurable Computing Platform Hardware Architecture
5 pages, 6 figures
null
null
null
cs.AR cs.DC
null
Field Programmable Gate Arrays (FPGAs) have recently been increasingly used for highly-parallel processing of compute intensive tasks. This paper introduces an FPGA hardware platform architecture that is PC-based, allows for fast reconfiguration over the PCI bus, and retains a simple physical hardware design. The design considerations are first discussed, then the resulting system architecture designed is illustrated. Finally, experimental results on the FPGA resources utilized for this design are presented.
[ { "version": "v1", "created": "Sat, 20 Nov 2004 06:31:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Weisensee", "Andreas", "" ], [ "Nathan", "Darran", "" ] ]
cs/0411077
David S. H. Rosenthal
David S. H. Rosenthal, Thomas Lipkis, Thomas Robertson, Seth Morabito
Transparent Format Migration of Preserved Web Content
6 pages, 2 figures
null
null
null
cs.DL
null
The LOCKSS digital preservation system collects content by crawling the web and preserves it in the format supplied by the publisher. Eventually, browsers will no longer understand that format. A process called format migration converts it to a newer format that the browsers do understand. The LOCKSS program has designed and tested an initial implementation of format migration for Web content that is transparent to readers, building on the content negotiation capabilities of HTTP.
[ { "version": "v1", "created": "Mon, 22 Nov 2004 00:35:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosenthal", "David S. H.", "" ], [ "Lipkis", "Thomas", "" ], [ "Robertson", "Thomas", "" ], [ "Morabito", "Seth", "" ] ]
cs/0411078
David S. H. Rosenthal
David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, T.J. Giuli, Mary Baker
Notes On The Design Of An Internet Adversary
null
Second Annual Adaptive and Resilient Computing Security Workshop, Santa Fe, 2003
null
null
cs.DL
null
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an assessment of the capabilities of the adversary. The design typically evolves through a process of simulating both the system and the adversary. This requires the design and implementation of a simulated adversary based on the capability assessment. Consensus on the capabilities of a suitable adversary is not evident. Part of the recent redesign of the protocol used by peers in the LOCKSS digital preservation system included a conservative assessment of the adversary's capabilities. We present our assessment and the implications we drew from it as a step towards a reusable adversary specification.
[ { "version": "v1", "created": "Mon, 22 Nov 2004 00:22:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosenthal", "David S. H.", "" ], [ "Maniatis", "Petros", "" ], [ "Roussopoulos", "Mema", "" ], [ "Giuli", "T. J.", "" ], [ "Baker", "Mary", "" ] ]
cs/0411079
Srikant Sharma
Srikant Sharma and Kartik Gopalan and Ningning Zhu and Gang Peng and Pradipta De and Tzi-cker Chiueh
Supporting Bandwidth Guarantee and Mobility for Real-Time Applications on Wireless LANs
This paper integrates the QoS scheme published in MMCN 2002 with a low latency mobility scheme that appeared in IEEE JSAC May 2004. This paper deals with both the issues with a fresh perspective of new networking technologies and standards such as 802.11e
null
null
null
cs.NI
null
The proliferation of IEEE 802.11-based wireless LANs opens up avenues for creation of several tetherless and mobility oriented services. Most of these services, like voice over WLAN, media streaming etc., generate delay and bandwidth sensitive traffic. These traffic flows require undisrupted network connectivity with some QoS guarantees. Unfortunately, there is no adequate support built into these wireless LANs towards QoS provisioning. Further, the network layer handoff latency incurred by mobile nodes in these wireless LANs is too high for real-time applications to function properly. In this paper, we describe a QoS mechanism, called Rether, to effectively support bandwidth guarantee on wireless LANs. Rether is designed to support the current wireless LAN technologies like 802.11b and 802.11a with a specific capability of being tailored for QoS oriented technology like 802.11e. We also describe a low-latency handoff mechanism which expedites network level handoff to provide real-time applications with an added advantage of seamless mobility.
[ { "version": "v1", "created": "Mon, 22 Nov 2004 18:10:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Sharma", "Srikant", "" ], [ "Gopalan", "Kartik", "" ], [ "Zhu", "Ningning", "" ], [ "Peng", "Gang", "" ], [ "De", "Pradipta", "" ], [ "Chiueh", "Tzi-cker", "" ] ]
cs/0411080
Valmir Barbosa
C. A. G. Assis, E. S. T. Fernandes, V. C. Barbosa
Modeling the input history of programs for improved instruction-memory performance
null
Computer Journal 49 (2006), 744-761
10.1093/comjnl/bxl044
ES-662/04
cs.OS
null
When a program is loaded into memory for execution, the relative position of its basic blocks is crucial, since loading basic blocks that are unlikely to be executed first places them high in the instruction-memory hierarchy only to be dislodged as the execution goes on. In this paper we study the use of Bayesian networks as models of the input history of a program. The main point is the creation of a probabilistic model that persists as the program is run on different inputs and at each new input refines its own parameters in order to reflect the program's input history more accurately. As the model is thus tuned, it causes basic blocks to be reordered so that, upon arrival of the next input for execution, loading the basic blocks into memory automatically takes into account the input history of the program. We report on extensive experiments, whose results demonstrate the efficacy of the overall approach in progressively lowering the execution times of a program on identical inputs placed randomly in a sequence of varied inputs. We provide results on selected SPEC CINT2000 programs and also evaluate our approach as compared to the gcc level-3 optimization and to Pettis-Hansen reordering.
[ { "version": "v1", "created": "Tue, 23 Nov 2004 16:52:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Assis", "C. A. G.", "" ], [ "Fernandes", "E. S. T.", "" ], [ "Barbosa", "V. C.", "" ] ]
cs/0411081
Didier Donsez
Assia Hachichi (REGAL Ur-R Lip6), Cyril Martin (REGAL Ur-R Lip6), Gael Thomas (REGAL Ur-R Lip6), Simon Patarin (REGAL Ur-R Lip6), Bertil Folliot (REGAL Ur-R Lip6)
Reconfigurations dynamiques de services dans un intergiciel a composants CORBA CCM
null
DECOR04 (2004) 159-170
null
null
cs.NI
null
Today, component oriented middlewares are used to design, develop and deploy easily distributed applications, by ensuring the heterogeneity, interoperability, and reuse of the software modules, and the separation between the business code encapsulated in the components and the system code managed by the containers. Several standards answer this definition such as: CCM (CORBA Component Model), EJB (Enterprise Java Beans) and .Net. However these standards offer a limited and fixed number of system services, removing any possibility to add system services or to reconfigure dynamically the middleware. Our works propose mechanisms to add and to adapt dynamically the system services, based on a reconfiguration language which is dynamically adaptable to the need of the reconfiguration, and on a tool of dynamic reconfiguration, a prototype was achieved for the OpenCCM platform, that is an implementation of the CCM specification. This work was partially financed by the european project IST-COACH (2001-34445).
[ { "version": "v1", "created": "Wed, 24 Nov 2004 10:26:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Hachichi", "Assia", "", "REGAL Ur-R Lip6" ], [ "Martin", "Cyril", "", "REGAL Ur-R Lip6" ], [ "Thomas", "Gael", "", "REGAL Ur-R Lip6" ], [ "Patarin", "Simon", "", "REGAL Ur-R Lip6" ], [ "Folliot", "Bertil", "", "REGAL Ur-R Lip6" ] ]
cs/0411082
Didier Donsez
Jakub Kornas (SARDES Ur-Ra Imag), Matthieu Leclercq (SARDES Ur-Ra Imag), Vivien Quema (SARDES Ur-Ra Imag), Jean-Bernard Stefani (SARDES Ur-Ra Imag)
Support pour la reconfiguration d'implantation dans les applications a composants Java
null
DECOR04 (2004) 171-184
null
null
cs.NI
null
Nowadays, numerous component models are used for various purposes: to build applications, middleware or even operating systems. Those models commonly support structure reconfiguration, that is modification of application's architecture at runtime. On the other hand, very few allow implementation reconfiguration, that is runtime modification of the code of components building the application. In this article we present the work we performed on JULIA, a Java-based implementation of the FRACTAL component model, in order for it to support implementation reconfigurations. We show how we overcame the limitations of Java class loading mechanism to allow runtime modifications of components' implementation and interfaces. We also describe the integration of our solution with the JULIA ADL.
[ { "version": "v1", "created": "Wed, 24 Nov 2004 10:27:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Kornas", "Jakub", "", "SARDES Ur-Ra Imag" ], [ "Leclercq", "Matthieu", "", "SARDES Ur-Ra\n Imag" ], [ "Quema", "Vivien", "", "SARDES Ur-Ra Imag" ], [ "Stefani", "Jean-Bernard", "", "SARDES Ur-Ra\n Imag" ] ]
cs/0411090
Valmir Barbosa
A. O. Stauffer, V. C. Barbosa
Local heuristics and the emergence of spanning subgraphs in complex networks
null
Theoretical Computer Science 355 (2006), 80-95
10.1016/j.tcs.2005.12.007
ES-663/04
cs.NI
null
We study the use of local heuristics to determine spanning subgraphs for use in the dissemination of information in complex networks. We introduce two different heuristics and analyze their behavior in giving rise to spanning subgraphs that perform well in terms of allowing every node of the network to be reached, of requiring relatively few messages and small node bandwidth for information dissemination, and also of stretching paths with respect to the underlying network only modestly. We contribute a detailed mathematical analysis of one of the heuristics and provide extensive simulation results on random graphs for both of them. These results indicate that, within certain limits, spanning subgraphs are indeed expected to emerge that perform well in respect to all requirements. We also discuss the spanning subgraphs' inherent resilience to failures and adaptability to topological changes.
[ { "version": "v1", "created": "Thu, 25 Nov 2004 09:04:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Stauffer", "A. O.", "" ], [ "Barbosa", "V. C.", "" ] ]
cs/0411091
H. M. Gladney
H.M. Gladney
Principles for Digital Preservation
7 pages with 2b figures
null
null
null
cs.DL
null
The immense investments in creating and disseminating digitally represented information have not been accompanied by commensurate effort to ensure the longevity of information of permanent interest. Asserted difficulties with long-term digital preservation prove to be largely underestimation of what technology can provide. We show how to clarify prominent misunderstandings and sketch a 'Trustworthy Digital Object (TDO)' method that solves all the published technical challenges.
[ { "version": "v1", "created": "Wed, 24 Nov 2004 20:54:43 GMT" }, { "version": "v2", "created": "Sun, 19 Dec 2004 00:32:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Gladney", "H. M.", "" ] ]
cs/0411092
H. M. Gladney
H.M. Gladney, R.A. Lorie
Trustworthy 100-Year Digital Objects: Durable Encoding for When It's Too Late to Ask
null
null
null
null
cs.DL
null
How can an author store digital information so that it will be reliably useful, even years later when he is no longer available to answer questions? Methods that might work are not good enough; what is preserved today should be reliably useful whenever someone wants it. Prior proposals fail because they confound saved data with irrelevant details of today's information technology--details that are difficult to define, extract, and save completely and accurately. We use a virtual machine to represent and eventually to render any data whatsoever. We focus on a case of intermediate difficulty--an executable procedure--and identify a variant for every other data type. This solution might be more elaborate than needed to render some text, image, audio, or video data. Simple data can be preserved as representations using well-known standards. We sketch practical methods for files ranging from simple structures to those containing computer programs, treating simple cases here and deferring complex cases for future work. Enough of the complete solution is known to enable practical aggressive preservation programs today.
[ { "version": "v1", "created": "Wed, 24 Nov 2004 21:26:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Gladney", "H. M.", "" ], [ "Lorie", "R. A.", "" ] ]
cs/0411093
Vlady Ravelomanana
Vlady Ravelomanana (LIPN), Loys Thimonier (LARIA)
Forbidden Subgraphs in Connected Graphs
null
null
null
null
cs.DS cs.DM math.CO
null
Given a set $\xi=\{H_1,H_2,...\}$ of connected non acyclic graphs, a $\xi$-free graph is one which does not contain any member of $% \xi$ as copy. Define the excess of a graph as the difference between its number of edges and its number of vertices. Let ${\gr{W}}_{k,\xi}$ be theexponential generating function (EGF for brief) of connected $\xi$-free graphs of excess equal to $k$ ($k \geq 1$). For each fixed $\xi$, a fundamental differential recurrence satisfied by the EGFs ${\gr{W}}_{k,\xi}$ is derived. We give methods on how to solve this nonlinear recurrence for the first few values of $k$ by means of graph surgery. We also show that for any finite collection $\xi$ of non-acyclic graphs, the EGFs ${\gr{W}}_{k,\xi}$ are always rational functions of the generating function, $T$, of Cayley's rooted (non-planar) labelled trees. From this, we prove that almost all connected graphs with $n$ nodes and $n+k$ edges are $\xi$-free, whenever $k=o(n^{1/3})$ and $|\xi| < \infty$ by means of Wright's inequalities and saddle point method. Limiting distributions are derived for sparse connected $\xi$-free components that are present when a random graph on $n$ nodes has approximately $\frac{n}{2}$ edges. In particular, the probability distribution that it consists of trees, unicyclic components, $...$, $(q+1)$-cyclic components all $\xi$-free is derived. Similar results are also obtained for multigraphs, which are graphs where self-loops and multiple-edges are allowed.
[ { "version": "v1", "created": "Thu, 25 Nov 2004 09:32:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ], [ "Thimonier", "Loys", "", "LARIA" ] ]
cs/0411094
Radhakrishnan Srinivasan
Radhakrishnan Srinivasan, H. P. Raghunandan
On the existence of truly autonomic computing systems and the link with quantum computing
13 pages (two-column, single-spaced), 2 figures. Section 4 and Appendix B (with a figure in each) added. Improved explanations given for the NAFL model of (hyper-) computation (Sec. 6) and for the failure of relativistic locality in NAFL (Appendix B)
null
null
null
cs.LO math.LO quant-ph
null
A theoretical model of truly autonomic computing systems (ACS), with infinitely many constraints, is proposed. An argument similar to Turing's for the unsolvability of the halting problem, which is permitted in classical logic, shows that such systems cannot exist. Turing's argument fails in the recently proposed non-Aristotelian finitary logic (NAFL), which permits the existence of ACS. NAFL also justifies quantum superposition and entanglement, which are essential ingredients of quantum algorithms, and resolves the Einstein-Podolsky-Rosen (EPR) paradox in favour of quantum mechanics and non-locality. NAFL requires that the autonomic manager (AM) must be conceptually and architecturally distinct from the managed element, in order for the ACS to exist as a non-self-referential entity. Such a scenario is possible if the AM uses quantum algorithms and is protected from all problems by (unbreakable) quantum encryption, while the managed element remains classical. NAFL supports such a link between autonomic and quantum computing, with the AM existing as a metamathematical entity. NAFL also allows quantum algorithms to access truly random elements and thereby supports non-standard models of quantum (hyper-) computation that permit infinite parallelism.
[ { "version": "v1", "created": "Thu, 25 Nov 2004 13:16:55 GMT" }, { "version": "v2", "created": "Wed, 23 Feb 2005 11:41:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Srinivasan", "Radhakrishnan", "" ], [ "Raghunandan", "H. P.", "" ] ]
cs/0411095
Christian Lavault
Christian Lavault (LIPN)
Embeddings into the Pancake Interconnection Network
Article paru en 2002 dans Parallel Processing Letters
Parallel Processing Letters 12, 3-4 (2002) 297-310
null
null
cs.DC cs.DM cs.DS
null
Owing to its nice properties, the pancake is one of the Cayley graphs that were proposed as alternatives to the hypercube for interconnecting processors in parallel computers. In this paper, we present embeddings of rings, grids and hypercubes into the pancake with constant dilation and congestion. We also extend the results to similar efficient embeddings into the star graph.
[ { "version": "v1", "created": "Fri, 26 Nov 2004 20:13:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ] ]
cs/0411096
Nathan LaBelle Mr.
Nathan LaBelle, Eugene Wallingford
Inter-Package Dependency Networks in Open-Source Software
6 Pages, 1 Figure, Submitted to J. Theoretical Comp. Science
null
null
null
cs.SE
null
This research analyzes complex networks in open-source software at the inter-package level, where package dependencies often span across projects and between development groups. We review complex networks identified at ``lower'' levels of abstraction, and then formulate a description of interacting software components at the package level, a relatively ``high'' level of abstraction. By mining open-source software repositories from two sources, we empirically show that the coupling of modules at this granularity creates a small-world and scale-free network in both instances.
[ { "version": "v1", "created": "Mon, 29 Nov 2004 03:38:48 GMT" } ]
2007-05-23T00:00:00
[ [ "LaBelle", "Nathan", "" ], [ "Wallingford", "Eugene", "" ] ]
cs/0411099
Andreas Maurer
Andreas Maurer
A Note on the PAC Bayesian Theorem
9 pages
null
null
null
cs.LG cs.AI
null
We prove general exponential moment inequalities for averages of [0,1]-valued iid random variables and use them to tighten the PAC Bayesian Theorem. The logarithmic dependence on the sample count in the enumerator of the PAC Bayesian bound is halved.
[ { "version": "v1", "created": "Tue, 30 Nov 2004 08:36:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Maurer", "Andreas", "" ] ]
cs/0411100
Ruggero Lanotte Dr
Ruggero Lanotte (Dipartimento di Scienze della Cultura, Politiche e dell'Informazione), Daniele Beauquier (LACL, Dept. of Informatics)
A Decidable Probability Logic for Timed Probabilistic Systems
null
null
null
null
cs.LO
null
In this paper we extend the predicate logic introduced in [Beauquier et al. 2002] in order to deal with Semi-Markov Processes. We prove that with respect to qualitative probabilistic properties, model checking is decidable for this logic applied to Semi-Markov Processes. Furthermore we apply our logic to Probabilistic Timed Automata considering classical and urgent semantics, and considering also predicates on clock. We prove that results on Semi Markov Processes hold also for Probabilistic Timed Automata for both the two semantics considered. Moreover, we prove that results for Markov Processes shown in [Beauquier et al. 2002] are extensible to Probabilistic Timed Automata where urgent semantics is considered.
[ { "version": "v1", "created": "Tue, 30 Nov 2004 10:42:35 GMT" }, { "version": "v2", "created": "Wed, 29 Mar 2006 17:37:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Lanotte", "Ruggero", "", "Dipartimento di Scienze della Cultura, Politiche e\n dell'Informazione" ], [ "Beauquier", "Daniele", "", "LACL, Dept. of Informatics" ] ]
cs/0412001
Francesca Leinardi
Serge Rouveyrol (IMAG), Yves Chiaramella (IMAG), Francesca Leinardi (IMAG), Joanna Janik (IMAG), Bruno Marmol (INRIA-RA), Carole Silvy (INRIA-RA), Catherine Allauzun (INRIA-RA)
EURYDICE : A platform for unified access to documents
redige le 14 octobre 2001
null
null
null
cs.DL
null
In this paper we present Eurydice, a platform dedicated to provide a unified gateway to documents. Its basic functionalities about collecting documents have been designed based on a long experience about the management of scientific documentation among large and demanding academic communities such as IMAG and INRIA. Besides the basic problem of accessing documents - which was of course the original and main motivation of the project - a great effort has been dedicated to the development of management functionalities which could help institutions to control, analyse the current situation about the use of the documentation, and finally to set a better ground for a documentation policy. Finally a great emphasis - and corresponding technical investment - has been put on the protection of property and reproduction rights both from the users' intitution side and from the editors' side.
[ { "version": "v1", "created": "Wed, 1 Dec 2004 13:14:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Rouveyrol", "Serge", "", "IMAG" ], [ "Chiaramella", "Yves", "", "IMAG" ], [ "Leinardi", "Francesca", "", "IMAG" ], [ "Janik", "Joanna", "", "IMAG" ], [ "Marmol", "Bruno", "", "INRIA-RA" ], [ "Silvy", "Carole", "", "INRIA-RA" ], [ "Allauzun", "Catherine", "", "INRIA-RA" ] ]
cs/0412002
Mark Levene
Jose Borges and Mark Levene
Ranking Pages by Topology and Popularity within Web Sites
15 pages, 6 figures
null
null
null
cs.AI cs.IR
null
We compare two link analysis ranking methods of web pages in a site. The first, called Site Rank, is an adaptation of PageRank to the granularity of a web site and the second, called Popularity Rank, is based on the frequencies of user clicks on the outlinks in a page that are captured by navigation sessions of users through the web site. We ran experiments on artificially created web sites of different sizes and on two real data sets, employing the relative entropy to compare the distributions of the two ranking methods. For the real data sets we also employ a nonparametric measure, called Spearman's footrule, which we use to compare the top-ten web pages ranked by the two methods. Our main result is that the distributions of the Popularity Rank and Site Rank are surprisingly close to each other, implying that the topology of a web site is very instrumental in guiding users through the site. Thus, in practice, the Site Rank provides a reasonable first order approximation of the aggregate behaviour of users within a web site given by the Popularity Rank.
[ { "version": "v1", "created": "Wed, 1 Dec 2004 13:22:47 GMT" }, { "version": "v2", "created": "Wed, 8 Dec 2004 09:10:55 GMT" }, { "version": "v3", "created": "Thu, 9 Dec 2004 10:03:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Borges", "Jose", "" ], [ "Levene", "Mark", "" ] ]
cs/0412003
Joanna Janik
Florence Duchene (TIMC - IMAG), Catherine Garbay (TIMC - IMAG), Vincent Rialle (TIMC - IMAG, SIIM)
Mining Heterogeneous Multivariate Time-Series for Learning Meaningful Patterns: Application to Home Health Telecare
null
null
null
null
cs.LG
null
For the last years, time-series mining has become a challenging issue for researchers. An important application lies in most monitoring purposes, which require analyzing large sets of time-series for learning usual patterns. Any deviation from this learned profile is then considered as an unexpected situation. Moreover, complex applications may involve the temporal study of several heterogeneous parameters. In that paper, we propose a method for mining heterogeneous multivariate time-series for learning meaningful patterns. The proposed approach allows for mixed time-series -- containing both pattern and non-pattern data -- such as for imprecise matches, outliers, stretching and global translating of patterns instances in time. We present the early results of our approach in the context of monitoring the health status of a person at home. The purpose is to build a behavioral profile of a person by analyzing the time variations of several quantitative or qualitative parameters recorded through a provision of sensors installed in the home.
[ { "version": "v1", "created": "Wed, 1 Dec 2004 16:32:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Duchene", "Florence", "", "TIMC - IMAG" ], [ "Garbay", "Catherine", "", "TIMC - IMAG" ], [ "Rialle", "Vincent", "", "TIMC - IMAG, SIIM" ] ]
cs/0412004
Lloyd Allison
L. Allison
Finding Approximate Palindromes in Strings Quickly and Simply
4 pages, 3 figures, code of the simple algorithm will soon be placed at http://www.csse.monash.edu.au/~lloyd/tildeProgLang/Java2/Palindromes/
null
null
2004/162
cs.DS
null
Described are two algorithms to find long approximate palindromes in a string, for example a DNA sequence. A simple algorithm requires O(n)-space and almost always runs in $O(k.n)$-time where n is the length of the string and k is the number of ``errors'' allowed in the palindrome. Its worst-case time-complexity is $O(n^2)$ but this does not occur with real biological sequences. A more complex algorithm guarantees $O(k.n)$ worst-case time complexity.
[ { "version": "v1", "created": "Wed, 1 Dec 2004 17:08:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Allison", "L.", "" ] ]
cs/0412005
Bernard Parisse
Bernard Parisse (IF), Morgane Vaughan (IF)
Jordan Normal and Rational Normal Form Algorithms
null
null
null
null
cs.SC
null
In this paper, we present a determinist Jordan normal form algorithms based on the Fadeev formula: \[(\lambda \cdot I-A) \cdot B(\lambda)=P(\lambda) \cdot I\] where $B(\lambda)$ is $(\lambda \cdot I-A)$'s comatrix and $P(\lambda)$ is $A$'s characteristic polynomial. This rational Jordan normal form algorithm differs from usual algorithms since it is not based on the Frobenius/Smith normal form but rather on the idea already remarked in Gantmacher that the non-zero column vectors of $B(\lambda_0)$ are eigenvectors of $A$ associated to $\lambda_0$ for any root $\lambda_0$ of the characteristical polynomial. The complexity of the algorithm is $O(n^4)$ field operations if we know the factorization of the characteristic polynomial (or $O(n^5 \ln(n))$ operations for a matrix of integers of fixed size). This algorithm has been implemented using the Maple and Giac/Xcas computer algebra systems.
[ { "version": "v1", "created": "Thu, 2 Dec 2004 09:39:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Parisse", "Bernard", "", "IF" ], [ "Vaughan", "Morgane", "", "IF" ] ]
cs/0412006
Sidi Mohamed Sedjelmaci
Sidi Mohamed Sedjelmaci (LIPN)
The Accelerated Euclidean Algorithm
null
Proceedings of the EACA, (2004) 283-287
null
null
cs.DS
null
We present a new GCD algorithm of two integers or polynomials. The algorithm is iterative and its time complexity is still $O(n \\log^2 n ~ log \\log n)$ for $n$-bit inputs.
[ { "version": "v1", "created": "Thu, 2 Dec 2004 15:01:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Sedjelmaci", "Sidi Mohamed", "", "LIPN" ] ]
cs/0412008
Manor Mendel
Robert Krauthgamer, James R. Lee, Manor Mendel, Assaf Naor
Measured descent: A new embedding method for finite metrics
17 pages. No figures. Appeared in FOCS '04. To appeaer in Geometric & Functional Analysis. This version fixes a subtle error in Section 2.2
Geom. Funct. Anal. 15(4):839-858, 2005
10.1007/s00039-005-0527-6
null
cs.DS math.MG
null
We devise a new embedding technique, which we call measured descent, based on decomposing a metric space locally, at varying speeds, according to the density of some probability measure. This provides a refined and unified framework for the two primary methods of constructing Frechet embeddings for finite metrics, due to [Bourgain, 1985] and [Rao, 1999]. We prove that any n-point metric space (X,d) embeds in Hilbert space with distortion O(sqrt{alpha_X log n}), where alpha_X is a geometric estimate on the decomposability of X. As an immediate corollary, we obtain an O(sqrt{(log lambda_X) \log n}) distortion embedding, where \lambda_X is the doubling constant of X. Since \lambda_X\le n, this result recovers Bourgain's theorem, but when the metric X is, in a sense, ``low-dimensional,'' improved bounds are achieved. Our embeddings are volume-respecting for subsets of arbitrary size. One consequence is the existence of (k, O(log n)) volume-respecting embeddings for all 1 \leq k \leq n, which is the best possible, and answers positively a question posed by U. Feige. Our techniques are also used to answer positively a question of Y. Rabinovich, showing that any weighted n-point planar graph embeds in l_\infty^{O(log n)} with O(1) distortion. The O(log n) bound on the dimension is optimal, and improves upon the previously known bound of O((log n)^2).
[ { "version": "v1", "created": "Thu, 2 Dec 2004 17:06:41 GMT" }, { "version": "v2", "created": "Thu, 18 Aug 2005 06:56:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Krauthgamer", "Robert", "" ], [ "Lee", "James R.", "" ], [ "Mendel", "Manor", "" ], [ "Naor", "Assaf", "" ] ]
cs/0412010
Jeremie Guiochet
Jeremie Guiochet (LAAS), Gilles Motet, Claude Baron, Guy Boy
Toward a Human-Centered Uml for Risk Analysis
null
Proc. of the 18th IFIP World Computer Congress (WCC), Human Error, Safety and Systems Development (HESSD04) (2004) 177-191
null
null
cs.OH
null
Safety is now a major concern in many complex systems such as medical robots. A way to control the complexity of such systems is to manage risk. The first and important step of this activity is risk analysis. During risk analysis, two main studies concerning human factors must be integrated: task analysis and human error analysis. This multidisciplinary analysis often leads to a work sharing between several stakeholders who use their own languages and techniques. This often produces consistency errors and understanding difficulties between them. Hence, this paper proposes to treat the risk analysis on the common expression language UML (Unified Modeling Language) and to handle human factors concepts for task analysis and human error analysis based on the features of this language. The approach is applied to the development of a medical robot for teleechography.
[ { "version": "v1", "created": "Thu, 2 Dec 2004 21:32:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Guiochet", "Jeremie", "", "LAAS" ], [ "Motet", "Gilles", "" ], [ "Baron", "Claude", "" ], [ "Boy", "Guy", "" ] ]
cs/0412011
Archil Avaliani
Archil Avaliani
Successful E-Business Systems - Paypal
6 pages, Accepted at IADIS Conference, Lisbon. But because nobody was able to present this research paper, it didn't publish in proceedings. Extended version was written at International University under supervision of Prof.Keiichi Nakata. Keywords: PayPal, Payment Systems, E-business, Money Transactions, PayPal Analyses
null
null
null
cs.OH
null
PayPal is an account-based system that allows anyone with an email address to send and receive online payment s. This service is easy to use for customers. Members can instantaneously send money to anyone. Recipients are informed by email that they have received a payment. PayPal is also available to people in 38 countries. This paper starts with introduction to the company and its services. The information about the history and the current company situation are covered. Later some interesting and different technical issues are discussed. The Paper ends with analysis of the company and several future recommendations.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 02:33:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Avaliani", "Archil", "" ] ]
cs/0412012
Joanna Janik
Catherine Oriat (LSR - IMAG)
Jartege: a Tool for Random Generation of Unit Tests for Java Classes
null
null
null
RR-1069-I
cs.PL
null
This report presents Jartege, a tool which allows random generation of unit tests for Java classes specified in JML. JML (Java Modeling Language) is a specification language for Java which allows one to write invariants for classes, and pre- and postconditions for operations. As in the JML-JUnit tool, we use JML specifications on the one hand to eliminate irrelevant test cases, and on the other hand as a test oracle. Jartege randomly generates test cases, which consist of a sequence of constructor and method calls for the classes under test. The random aspect of the tool can be parameterized by associating weights to classes and operations, and by controlling the number of instances which are created for each class under test. The practical use of Jartege is illustrated by a small case study.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 12:19:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Oriat", "Catherine", "", "LSR - IMAG" ] ]
cs/0412013
Jean-Christophe Dubacq
Jean-Christophe Dubacq (LIPN, GREYC), Veronique Terrier (GREYC)
Signals for Cellular Automata in dimension 2 or higher
null
LATIN 2002: Theoretical Informatics (2002) 451-464
null
null
cs.CC cs.DC cs.DM math.CO
null
We investigate how increasing the dimension of the array can help to draw signals on cellular automata.We show the existence of a gap of constructible signals in any dimension. We exhibit two cellular automata in dimension 2 to show that increasing the dimension allows to reduce the number of states required for some constructions.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 16:35:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Dubacq", "Jean-Christophe", "", "LIPN, GREYC" ], [ "Terrier", "Veronique", "", "GREYC" ] ]
cs/0412014
Vlady Ravelomanana
Vlady Ravelomanana (LIPN)
Randomized Initialization of a Wireless Multihop Network
null
null
null
null
cs.DC cs.DM
null
Address autoconfiguration is an important mechanism required to set the IP address of a node automatically in a wireless network. The address autoconfiguration, also known as initialization or naming, consists to give a unique identifier ranging from 1 to $n$ for a set of $n$ indistinguishable nodes. We consider a wireless network where $n$ nodes (processors) are randomly thrown in a square $X$, uniformly and independently. We assume that the network is synchronous and two nodes are able to communicate if they are within distance at most of $r$ of each other ($r$ is the transmitting/receiving range). The model of this paper concerns nodes without the collision detection ability: if two or more neighbors of a processor $u$ transmit concurrently at the same time, then $u$ would not receive either messages. We suppose also that nodes know neither the topology of the network nor the number of nodes in the network. Moreover, they start indistinguishable, anonymous and unnamed. Under this extremal scenario, we design and analyze a fully distributed protocol to achieve the initialization task for a wireless multihop network of $n$ nodes uniformly scattered in a square $X$. We show how the transmitting range of the deployed stations can affect the typical characteristics such as the degrees and the diameter of the network. By allowing the nodes to transmit at a range $r= \sqrt{\frac{(1+\ell) \ln{n} \SIZE}{\pi n}}$ (slightly greater than the one required to have a connected network), we show how to design a randomized protocol running in expected time $O(n^{3/2} \log^2{n})$ in order to assign a unique number ranging from 1 to $n$ to each of the $n$ participating nodes.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 16:39:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
cs/0412015
Detlef Prescher
Detlef Prescher
A Tutorial on the Expectation-Maximization Algorithm Including Maximum-Likelihood Estimation and EM Training of Probabilistic Context-Free Grammars
Presented at the 15th European Summer School in Logic, Language and Information (ESSLLI 2003). Example 5 extended (and partially corrected)
null
null
null
cs.CL
null
The paper gives a brief review of the expectation-maximization algorithm (Dempster 1977) in the comprehensible framework of discrete mathematics. In Section 2, two prominent estimation methods, the relative-frequency estimation and the maximum-likelihood estimation are presented. Section 3 is dedicated to the expectation-maximization algorithm and a simpler variant, the generalized expectation-maximization algorithm. In Section 4, two loaded dice are rolled. A more interesting example is presented in Section 5: The estimation of probabilistic context-free grammars.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 17:10:17 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2005 14:05:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Prescher", "Detlef", "" ] ]
cs/0412016
Detlef Prescher
Detlef Prescher
Inside-Outside Estimation Meets Dynamic EM
4 pages, some typos corrected
Proceedings of IWPT 2001
null
null
cs.CL
null
We briefly review the inside-outside and EM algorithm for probabilistic context-free grammars. As a result, we formally prove that inside-outside estimation is a dynamic-programming variant of EM. This is interesting in its own right, but even more when considered in a theoretical context since the well-known convergence behavior of inside-outside estimation has been confirmed by many experiments but apparently has never been formally proved. However, being a version of EM, inside-outside estimation also inherits the good convergence behavior of EM. Therefore, the as yet imperfect line of argumentation can be transformed into a coherent proof.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 18:10:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Prescher", "Detlef", "" ] ]
cs/0412018
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
Modeling Complex Higher Order Patterns
11 pages
null
null
Tr-04-11
cs.DB cs.AI
null
The goal of this paper is to show that generalizing the notion of frequent patterns can be useful in extending association analysis to more complex higher order patterns. To that end, we describe a general framework for modeling a complex pattern based on evaluating the interestingness of its sub-patterns. A key goal of any framework is to allow people to more easily express, explore, and communicate ideas, and hence, we illustrate how our framework can be used to describe a variety of commonly used patterns, such as frequent patterns, frequent closed patterns, indirect association patterns, hub patterns and authority patterns. To further illustrate the usefulness of the framework, we also present two new kinds of patterns that derived from the framework: clique pattern and bi-clique pattern and illustrate their practical use.
[ { "version": "v1", "created": "Sat, 4 Dec 2004 12:28:29 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0412019
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
A Link Clustering Based Approach for Clustering Categorical Data
10 pages
A poster paper in Proc. of WAIM 2004
null
null
cs.DL cs.AI
null
Categorical data clustering (CDC) and link clustering (LC) have been considered as separate research and application areas. The main focus of this paper is to investigate the commonalities between these two problems and the uses of these commonalities for the creation of new clustering algorithms for categorical data based on cross-fertilization between the two disjoint research fields. More precisely, we formally transform the CDC problem into an LC problem, and apply LC approach for clustering categorical data. Experimental results on real datasets show that LC based clustering method is competitive with existing CDC algorithms with respect to clustering accuracy.
[ { "version": "v1", "created": "Sat, 4 Dec 2004 12:41:08 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0412020
Paul Rogers
Paul Rogers and Nael Abu-Ghazaleh
Towards Reliable Network Wide Broadcast in Mobile Ad Hoc Networks
12 pages, 22 figures
null
null
Tech Report: tr-cs-02-04
cs.NI
null
Network-Wide Broadcast (NWB) is a common operation in Mobile Ad hoc Networks (MANETs) used by routing protocols to discover routes and in group communication operations. NWB is commonly performed via flooding, which has been shown to be expensive in dense MANETs because of its high redundancy. Several efforts have targeted reducing the redundancy of floods. In this work, we target another problem that can substantially impact the success of NWBs: since MAC level broadcasts are unreliable, it is possible for critical rebroadcasts to be lost, leading to a significant drop in the node coverage. This is especially true under heavy load and in sparse topologies. We show that the techniques that target reducing the overhead of flooding, reduce its inherent redundancy and harm its reliability. In addition, we show that static approaches are more vulnerable to this problem. We then present a selective rebroadcast approach to improve the robustness of NWBs. We show that our approach leads to considerable improvement in NWB coverage relative to a recently proposed solution to this problem, with a small increase in overhead. The proposed approaches do not require proactive neighbor discovery and are therefore resilient to mobility. Finally, the solution can be added to virtually all NWB approaches to improve their reliability.
[ { "version": "v1", "created": "Sat, 4 Dec 2004 18:30:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Rogers", "Paul", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
cs/0412021
Chiu Wo Choi
Chiu Wo Choi, Warwick Harvey, Jimmy Ho-Man Lee, Peter J. Stuckey
Finite Domain Bounds Consistency Revisited
12 pages
null
null
null
cs.AI cs.LO
null
A widely adopted approach to solving constraint satisfaction problems combines systematic tree search with constraint propagation for pruning the search space. Constraint propagation is performed by propagators implementing a certain notion of consistency. Bounds consistency is the method of choice for building propagators for arithmetic constraints and several global constraints in the finite integer domain. However, there has been some confusion in the definition of bounds consistency. In this paper we clarify the differences and similarities among the three commonly used notions of bounds consistency.
[ { "version": "v1", "created": "Mon, 6 Dec 2004 08:04:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Choi", "Chiu Wo", "" ], [ "Harvey", "Warwick", "" ], [ "Lee", "Jimmy Ho-Man", "" ], [ "Stuckey", "Peter J.", "" ] ]
cs/0412022
Petrus H. Potgieter
Petrus H. Potgieter
Zeno machines and hypercomputation
11 pages. First submitted in December 2004, substantially revised in July and in November 2005. To appear in Theoretical Computer Science
null
null
null
cs.CC
null
This paper reviews the Church-Turing Thesis (or rather, theses) with reference to their origin and application and considers some models of "hypercomputation", concentrating on perhaps the most straight-forward option: Zeno machines (Turing machines with accelerating clock). The halting problem is briefly discussed in a general context and the suggestion that it is an inevitable companion of any reasonable computational model is emphasised. It is hinted that claims to have "broken the Turing barrier" could be toned down and that the important and well-founded role of Turing computability in the mathematical sciences stands unchallenged.
[ { "version": "v1", "created": "Mon, 6 Dec 2004 12:18:05 GMT" }, { "version": "v2", "created": "Fri, 22 Jul 2005 10:20:30 GMT" }, { "version": "v3", "created": "Wed, 11 Jan 2006 08:08:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Potgieter", "Petrus H.", "" ] ]
cs/0412023
Praveen Boinee
P. Boinee, F. Barbarino, A. De Angelis
Multidimensional data classification with artificial neural networks
8 pages, 4 figures, Submitted to EURASIP Journal on Applied Signal Processing, 2004
null
null
null
cs.NE cs.AI
null
Multi-dimensional data classification is an important and challenging problem in many astro-particle experiments. Neural networks have proved to be versatile and robust in multi-dimensional data classification. In this article we shall study the classification of gamma from the hadrons for the MAGIC Experiment. Two neural networks have been used for the classification task. One is Multi-Layer Perceptron based on supervised learning and other is Self-Organising Map (SOM), which is based on unsupervised learning technique. The results have been shown and the possible ways of combining these networks have been proposed to yield better and faster classification results.
[ { "version": "v1", "created": "Mon, 6 Dec 2004 20:23:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Boinee", "P.", "" ], [ "Barbarino", "F.", "" ], [ "De Angelis", "A.", "" ] ]
cs/0412024
Peter Turney
Peter D. Turney (National Research Council of Canada)
Human-Level Performance on Word Analogy Questions by Latent Relational Analysis
32 pages, issued 2004, related work available at http://purl.org/peter.turney
null
null
NRC-47422
cs.CL cs.IR cs.LG
null
This paper introduces Latent Relational Analysis (LRA), a method for measuring relational similarity. LRA has potential applications in many areas, including information extraction, word sense disambiguation, machine translation, and information retrieval. Relational similarity is correspondence between relations, in contrast with attributional similarity, which is correspondence between attributes. When two words have a high degree of attributional similarity, we call them synonyms. When two pairs of words have a high degree of relational similarity, we say that their relations are analogous. For example, the word pair mason/stone is analogous to the pair carpenter/wood. Past work on semantic similarity measures has mainly been concerned with attributional similarity. Recently the Vector Space Model (VSM) of information retrieval has been adapted to the task of measuring relational similarity, achieving a score of 47% on a collection of 374 college-level multiple-choice word analogy questions. In the VSM approach, the relation between a pair of words is characterized by a vector of frequencies of predefined patterns in a large corpus. LRA extends the VSM approach in three ways: (1) the patterns are derived automatically from the corpus (they are not predefined), (2) the Singular Value Decomposition (SVD) is used to smooth the frequency data (it is also used this way in Latent Semantic Analysis), and (3) automatically generated synonyms are used to explore reformulations of the word pairs. LRA achieves 56% on the 374 analogy questions, statistically equivalent to the average human score of 57%. On the related problem of classifying noun-modifier relations, LRA achieves similar gains over the VSM, while using a smaller corpus.
[ { "version": "v1", "created": "Mon, 6 Dec 2004 21:50:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
cs/0412026
Chiu Wo Choi
Chiu Wo Choi, Jimmy Ho-Man Lee, Peter J. Stuckey
Removing Propagation Redundant Constraints in Redundant Modeling
30 pages, submitted to ACM Transactions on Computational Logic (TOCL)
null
null
null
cs.LO cs.AI
null
A widely adopted approach to solving constraint satisfaction problems combines systematic tree search with various degrees of constraint propagation for pruning the search space. One common technique to improve the execution efficiency is to add redundant constraints, which are constraints logically implied by others in the problem model. However, some redundant constraints are propagation redundant and hence do not contribute additional propagation information to the constraint solver. Redundant constraints arise naturally in the process of redundant modeling where two models of the same problem are connected and combined through channeling constraints. In this paper, we give general theorems for proving propagation redundancy of one constraint with respect to channeling constraints and constraints in the other model. We illustrate, on problems from CSPlib (http://www.csplib.org/), how detecting and removing propagation redundant constraints in redundant modeling can significantly speed up constraint solving.
[ { "version": "v1", "created": "Tue, 7 Dec 2004 06:31:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Choi", "Chiu Wo", "" ], [ "Lee", "Jimmy Ho-Man", "" ], [ "Stuckey", "Peter J.", "" ] ]
cs/0412028
Kazushige Terui
Patrick Baillot and Kazushige Terui
A feasible algorithm for typing in Elementary Affine Logic
20 pages
null
null
null
cs.LO
null
We give a new type inference algorithm for typing lambda-terms in Elementary Affine Logic (EAL), which is motivated by applications to complexity and optimal reduction. Following previous references on this topic, the variant of EAL type system we consider (denoted EAL*) is a variant without sharing and without polymorphism. Our algorithm improves over the ones already known in that it offers a better complexity bound: if a simple type derivation for the term t is given our algorithm performs EAL* type inference in polynomial time.
[ { "version": "v1", "created": "Wed, 8 Dec 2004 08:33:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Baillot", "Patrick", "" ], [ "Terui", "Kazushige", "" ] ]
cs/0412029
Vladimir Migunov
Vladimir V. Migunov, Rustem R. Kafiyatullov, Ilsur T. Safin
The modular technology of development of the CAD expansions: profiles of outside networks of water supply and water drain
8 pages, 2 figures, in Russian
null
null
null
cs.CE cs.DS
null
The modular technology of development of the problem-oriented CAD expansions is applied to a task of designing of profiles of outside networks of water supply and water drain with realization in program system TechnoCAD GlassX. The unity of structure of this profiles is revealed, the system model of the drawings of profiles of networks is developed including the structured parametric representation (properties of objects and their interdependence, general settings and default settings) and operations with it, which efficiently automate designing
[ { "version": "v1", "created": "Wed, 8 Dec 2004 08:42:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ], [ "Kafiyatullov", "Rustem R.", "" ], [ "Safin", "Ilsur T.", "" ] ]
cs/0412030
Vladimir Migunov
Vladimir V. Migunov, Rustem R. Kafiyatullov, Ilsur T. Safin
The modular technology of development of the CAD expansions: protection of the buildings from the lightning
8 pages, 2 figures, in Russian
null
null
null
cs.CE cs.DS
null
The modular technology of development of the problem-oriented CAD expansions is applied to a task of designing of protection of the buildings from the lightning with realization in program system TechnoCAD GlassX. The system model of the drawings of lightning protection is developed including the structured parametric representation (properties of objects and their interdependence, general settings and default settings) and operations with it, which efficiently automate designing
[ { "version": "v1", "created": "Wed, 8 Dec 2004 08:49:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ], [ "Kafiyatullov", "Rustem R.", "" ], [ "Safin", "Ilsur T.", "" ] ]
cs/0412031
Vladimir Migunov
Vladimir V. Migunov
The Features of the Complex CAD system of Reconstruction of the Industrial Plants
6 pages, no figures, in Russian
null
null
null
cs.CE
null
The features of designing of reconstruction of the acting plant by its design department are considered: the results of work are drawings corresponding with the national standards; large number of the small projects for different acting objects; variety of the types of the drawings in one project; large paper archive. The models and methods of developing of the complex CAD system with friend uniform environment of designing, with setting a profile of operations, with usage of the general parts of the project, with a series of problem-oriented subsystems are described on an example of a CAD system TechnoCAD GlassX
[ { "version": "v1", "created": "Wed, 8 Dec 2004 08:52:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0412032
Vladimir Migunov
Vladimir V. Migunov
The methods of support of the requirements of the Russian standards at development of a CAD of industrial objects
8 pages, 4 figures, in Russian
null
null
null
cs.CE cs.DS
null
The methods of support of the requirements of the Russian standards in a CAD of industrial objects are explained, which were implemented in the CAD system TechnoCAD GlassX with an own graphics core and own structures of data storage. It is rotined, that the binding of storage structures and program code of a CAD to the requirements of standards enable not only to fulfil these requirements in project documentation, but also to increase a degree of compactness of storage of drawings both on the disk and in the RAM
[ { "version": "v1", "created": "Wed, 8 Dec 2004 08:57:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0412033
Vladimir Migunov
Vladimir V. Migunov
The modelling of the build constructions in a CAD of the renovation of the enterprises by means of units in the drawings
8 pages, 4 figures, in Russian
null
null
null
cs.CE
null
The parametric model of build constructions and features of design operations are described for making drawings, which are the common component of the different parts of the projects of renovation of enterprises. The key moment of the deep design automation is the using of so-called units in the drawings, which are joining a visible graphic part and invisible parameters. The model has passed check during designing of several hundreds of drawings
[ { "version": "v1", "created": "Wed, 8 Dec 2004 09:01:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0412034
Vladimir Migunov
Vladimir V. Migunov
The informatization of design works at industry firm during its renovation
9 pages, 3 figures, in Russian
null
null
null
cs.CE
null
The characteristic of design works on firm at its renovation and of the common directions of their informatization is given. The implantation of a CAD is selected as the key direction, and the requirements to a complex CAD-system are stated. The methods of such a CAD-system development are featured, and the connectedness of this development with the process of integration of information space of design department of the firm is characterized. The experience of development and implantation of a complex CAD of renovation of firms TechnoCAD GlassX lies in a basis of this reviewing
[ { "version": "v1", "created": "Wed, 8 Dec 2004 11:08:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0412035
Richard McClatchey
S R Amendolia, F Estrella, C del Frate, J Galvez, W Hassan, T Hauer, D Manset, R McClatchey, M Odeh, D Rogulin, T Solomonides, R Warren
Deployment of a Grid-based Medical Imaging Application
10 pages, 5 figures. Accepted by the 2005 HealthGrid Conference
null
null
null
cs.DC cs.DB
null
The MammoGrid project has deployed its Service-Oriented Architecture (SOA)-based Grid application in a real environment comprising actual participating hospitals. The resultant setup is currently being exploited to conduct rigorous in-house tests in the first phase before handing over the setup to the actual clinicians to get their feedback. This paper elaborates the deployment details and the experiences acquired during this phase of the project. Finally the strategy regarding migration to an upcoming middleware from EGEE project will be described. This paper concludes by highlighting some of the potential areas of future work.
[ { "version": "v1", "created": "Wed, 8 Dec 2004 17:15:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Amendolia", "S R", "" ], [ "Estrella", "F", "" ], [ "del Frate", "C", "" ], [ "Galvez", "J", "" ], [ "Hassan", "W", "" ], [ "Hauer", "T", "" ], [ "Manset", "D", "" ], [ "McClatchey", "R", "" ], [ "Odeh", "M", "" ], [ "Rogulin", "D", "" ], [ "Solomonides", "T", "" ], [ "Warren", "R", "" ] ]
cs/0412036
Richard McClatchey
Haya El-Ghalayini, Mohammed Odeh, Richard McClatchey & Tony Solomonides
Reverse Engineering Ontology to Conceptual Data Models
6 pages, 3 figures. Accepted by the IASTED International Conference on Databases and Applications (DBA 2005)
null
null
null
cs.DC cs.DB
null
Ontologies facilitate the integration of heterogeneous data sources by resolving semantic heterogeneity between them. This research aims to study the possibility of generating a domain conceptual model from a given ontology with the vision to grow this generated conceptual data model into a global conceptual model integrating a number of existing data and information sources. Based on ontologically derived semantics of the BWW model, rules are identified that map elements of the ontology language (DAML+OIL) to domain conceptual model elements. This mapping is demonstrated using TAMBIS ontology. A significant corollary of this study is that it is possible to generate a domain conceptual model from a given ontology subject to validation that needs to be performed by the domain specialist before evolving this model into a global conceptual model.
[ { "version": "v1", "created": "Wed, 8 Dec 2004 17:23:07 GMT" } ]
2007-05-23T00:00:00
[ [ "El-Ghalayini", "Haya", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ], [ "Solomonides", "Tony", "" ] ]
cs/0412039
Michel Dagenais
Marc Chatel, Michel Dagenais, Charles Levert, Makan Pourzandi
Security in Carrier Class Server Applications for All-IP Networks
Survey paper on the challenges of all IP networks in telecom applications
null
null
null
cs.NI
null
A revolution is taking place in telecommunication networks. New services are appearing on platforms such as third generation cellular phones (3G) and broadband Internet access. This motivates the transition from mostly switched to all-IP networks. The replacement of the traditional shallow and well-defined interface to telephony networks brings accrued flexibility, but also makes the network accordingly difficult to properly secure. This paper surveys the implications of this transition on security issues in telecom applications. It does not give an exhaustive list of security tools or security protocols. Its goal is rather to initiate the reader to the security issues brought to carrier class servers by this revolution.
[ { "version": "v1", "created": "Thu, 9 Dec 2004 16:57:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Chatel", "Marc", "" ], [ "Dagenais", "Michel", "" ], [ "Levert", "Charles", "" ], [ "Pourzandi", "Makan", "" ] ]
cs/0412040
Robert Burger
J. R. Burger
Data-stationary Architecture to Execute Quantum Algorithms Classically
null
null
null
null
cs.AR
null
This paper presents a data stationary architecture in which each word has an attached address field. Address fields massively update in parallel to record data interchanges. Words do not move until memory is read for post processing. A sea of such cells can test large-scale quantum algorithms, although other programming is possible.
[ { "version": "v1", "created": "Thu, 9 Dec 2004 22:10:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "J. R.", "" ] ]
cs/0412041
Hai-Feng Guo
Hai-Feng Guo and Gopal Gupta
An Efficient and Flexible Engine for Computing Fixed Points
26 pages
null
null
null
cs.PL cs.AI cs.LO
null
An efficient and flexible engine for computing fixed points is critical for many practical applications. In this paper, we firstly present a goal-directed fixed point computation strategy in the logic programming paradigm. The strategy adopts a tabled resolution (or memorized resolution) to mimic the efficient semi-naive bottom-up computation. Its main idea is to dynamically identify and record those clauses that will lead to recursive variant calls, and then repetitively apply those alternatives incrementally until the fixed point is reached. Secondly, there are many situations in which a fixed point contains a large number or even infinite number of solutions. In these cases, a fixed point computation engine may not be efficient enough or feasible at all. We present a mode-declaration scheme which provides the capabilities to reduce a fixed point from a big solution set to a preferred small one, or from an infeasible infinite set to a finite one. The mode declaration scheme can be characterized as a meta-level operation over the original fixed point. We show the correctness of the mode declaration scheme. Thirdly, the mode-declaration scheme provides a new declarative method for dynamic programming, which is typically used for solving optimization problems. There is no need to define the value of an optimal solution recursively, instead, defining a general solution suffices. The optimal value as well as its corresponding concrete solution can be derived implicitly and automatically using a mode-directed fixed point computation engine. Finally, this fixed point computation engine has been successfully implemented in a commercial Prolog system. Experimental results are shown to indicate that the mode declaration improves both time and space performances in solving dynamic programming problems.
[ { "version": "v1", "created": "Thu, 9 Dec 2004 22:59:37 GMT" }, { "version": "v2", "created": "Sun, 2 Jan 2005 21:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Guo", "Hai-Feng", "" ], [ "Gupta", "Gopal", "" ] ]
cs/0412042
Peter Jonsson
Peter Jonsson, Mikael Klasson, and Andrei Krokhin
The approximability of three-valued MAX CSP
null
null
null
null
cs.CC
null
In the maximum constraint satisfaction problem (Max CSP), one is given a finite collection of (possibly weighted) constraints on overlapping sets of variables, and the goal is to assign values from a given domain to the variables so as to maximize the number (or the total weight, for the weighted case) of satisfied constraints. This problem is NP-hard in general, and, therefore, it is natural to study how restricting the allowed types of constraints affects the approximability of the problem. It is known that every Boolean (that is, two-valued) Max CSP problem with a finite set of allowed constraint types is either solvable exactly in polynomial time or else APX-complete (and hence can have no polynomial time approximation scheme unless P=NP. It has been an open problem for several years whether this result can be extended to non-Boolean Max CSP, which is much more difficult to analyze than the Boolean case. In this paper, we make the first step in this direction by establishing this result for Max CSP over a three-element domain. Moreover, we present a simple description of all polynomial-time solvable cases of our problem. This description uses the well-known algebraic combinatorial property of supermodularity. We also show that every hard three-valued Max CSP problem contains, in a certain specified sense, one of the two basic hard Max CSP problems which are the Maximum k-colourable subgraph problems for k=2,3.
[ { "version": "v1", "created": "Fri, 10 Dec 2004 15:34:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Jonsson", "Peter", "" ], [ "Klasson", "Mikael", "" ], [ "Krokhin", "Andrei", "" ] ]
cs/0412043
Roberto Bagnara
Roberto Bagnara, Patricia M. Hill, Elena Mazzi, and Enea Zaffanella
Widening Operators for Weakly-Relational Numeric Abstractions (Extended Abstract)
null
null
null
null
cs.PL
null
We discuss the divergence problems recently identified in some extrapolation operators for weakly-relational numeric domains. We identify the cause of the divergences and point out that resorting to more concrete, syntactic domains can be avoided by researching suitable algorithms for the elimination of redundant constraints in the chosen representation.
[ { "version": "v1", "created": "Fri, 10 Dec 2004 15:52:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagnara", "Roberto", "" ], [ "Hill", "Patricia M.", "" ], [ "Mazzi", "Elena", "" ], [ "Zaffanella", "Enea", "" ] ]
cs/0412045
Riccardo Pucella
Andrew D. Gordon, Riccardo Pucella
Validating a Web Service Security Abstraction by Typing
44 pages. A preliminary version appears in the Proceedings of the Workshop on XML Security 2002, pp. 18-29, November 2002
Formal Aspects of Computing 17 (3), pp. 277-318, 2005
null
null
cs.CR
null
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP. We consider the problem of authenticating requests and responses at the SOAP-level, rather than relying on transport-level security. We propose a security abstraction, inspired by earlier work on secure RPC, in which the methods exported by a web service are annotated with one of three security levels: none, authenticated, or both authenticated and encrypted. We model our abstraction as an object calculus with primitives for defining and calling web services. We describe the semantics of our object calculus by translating to a lower-level language with primitives for message passing and cryptography. To validate our semantics, we embed correspondence assertions that specify the correct authentication of requests and responses. By appeal to the type theory for cryptographic protocols of Gordon and Jeffrey's Cryptyc, we verify the correspondence assertions simply by typing. Finally, we describe an implementation of our semantics via custom SOAP headers.
[ { "version": "v1", "created": "Fri, 10 Dec 2004 21:34:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gordon", "Andrew D.", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0412046
David Eppstein
David Eppstein
Quasiconvex Programming
33 pages, 14 figures
null
null
null
cs.CG
null
We define quasiconvex programming, a form of generalized linear programming in which one seeks the point minimizing the pointwise maximum of a collection of quasiconvex functions. We survey algorithms for solving quasiconvex programs either numerically or via generalizations of the dual simplex method from linear programming, and describe varied applications of this geometric optimization technique in meshing, scientific computation, information visualization, automated algorithm analysis, and robust statistics.
[ { "version": "v1", "created": "Fri, 10 Dec 2004 22:50:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
cs/0412047
Marko Rodriguez
Marko Rodriguez and Daniel Steinbock
A Social Network for Societal-Scale Decision-Making Systems
Dynamically Distributed Democracy algorithm presented in the arena of a societal-scale decision support system
North American Association for Computational Social and Organizational Science Conference Proceedings 2004
null
null
cs.CY cs.DS cs.HC
null
In societal-scale decision-making systems the collective is faced with the problem of ensuring that the derived group decision is in accord with the collective's intention. In modern systems, political institutions have instatiated representative forms of decision-making to ensure that every individual in the society has a participatory voice in the decision-making behavior of the whole--even if only indirectly through representation. An agent-based simulation demonstrates that in modern representative systems, as the ratio of representatives increases, there exists an exponential decrease in the ability for the group to behave in accord with the desires of the whole. To remedy this issue, this paper provides a novel representative power structure for decision-making that utilizes a social network and power distribution algorithm to maintain the collective's perspective over varying degrees of participation and/or ratios of representation. This work shows promise for the future development of policy-making systems that are supported by the computer and network infrastructure of our society.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 00:32:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodriguez", "Marko", "" ], [ "Steinbock", "Daniel", "" ] ]
cs/0412048
Benoit Masson
Enrico Formenti (I3S), Benoit Masson (I3S)
On computing fixed points for generalized sandpiles
Presented in DMCS 2004 (Turku, FINLAND)
null
null
null
cs.CC
null
We prove fixed points results for sandpiles starting with arbitrary initial conditions. We give an effective algorithm for computing such fixed points, and we refine it in the particular case of SPM.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 07:51:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Formenti", "Enrico", "", "I3S" ], [ "Masson", "Benoit", "", "I3S" ] ]
cs/0412049
Vedran Kordic
Danica Janglova
Neural Networks in Mobile Robot Motion
9 Pages
International Journal of Advanced Robotic Systems, Volume 1, Number 1, March 2004, pp.15-22
null
null
cs.RO cs.AI
null
This paper deals with a path planning and intelligent control of an autonomous robot which should move safely in partially structured environment. This environment may involve any number of obstacles of arbitrary shape and size; some of them are allowed to move. We describe our approach to solving the motion-planning problem in mobile robot control using neural networks-based technique. Our method of the construction of a collision-free path for moving robot among obstacles is based on two neural networks. The first neural network is used to determine the "free" space using ultrasound range finder data. The second neural network "finds" a safe direction for the next robot section of the path in the workspace while avoiding the nearest obstacles. Simulation examples of generated path with proposed techniques will be presented.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:32:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Janglova", "Danica", "" ] ]
cs/0412050
Vedran Kordic
Yongsheng Ou & Yangsheng Xu
Gyroscopically Stabilized Robot: Balance and Tracking
null
International Journal of Advanced Robotic Systems, Volume 1, Number 1, March 2004, pp.23-32
null
null
cs.RO
null
The single wheel, gyroscopically stabilized robot - Gyrover, is a dynamically stable but statically unstable, underactuated system. In this paper, based on the dynamic model of the robot, we investigate two classes of nonholonomic constraints associated with the system. Then, based on the backstepping technology, we propose a control law for balance control of Gyrover. Next, through transferring the systems states from Cartesian coordinate to polar coordinate, control laws for point-to-point control and line tracking in Cartesian space are provided.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:38:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Ou", "Yongsheng", "" ], [ "Xu", "Yangsheng", "" ] ]
cs/0412052
Vedran Kordic
Olivier Michel
WebotsTM: Professional Mobile Robot Simulation
null
International Journal of Advanced Robotic Systems, Volume 1, Number 1, March 2004, pp.39-42
null
null
cs.RO
null
Cyberbotics Ltd. develops WebotsTM, a mobile robotics simulation software that provides you with a rapid prototyping environment for modelling, programming and simulating mobile robots. The provided robot libraries enable you to transfer your control programs to several commercially available real mobile robots. WebotsTM lets you define and modify a complete mobile robotics setup, even several different robots sharing the same environment. For each object, you can define a number of properties, such as shape, color, texture, mass, friction, etc. You can equip each robot with a large number of available sensors and actuators. You can program these robots using your favorite development environment, simulate them and optionally transfer the resulting programs onto your real robots. WebotsTM has been developed in collaboration with the Swiss Federal Institute of Technology in Lausanne, thoroughly tested, well documented and continuously maintained for over 7 years. It is now the main commercial product available from Cyberbotics Ltd.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:45:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Michel", "Olivier", "" ] ]
cs/0412053
Vedran Kordic
Atef A. Ata & Habib Johar
Dynamic simulation of task constrained of a rigid-flexible manipulator
null
International Journal of Advanced Robotic Systems, Volume 1, Number 2, June 2004, pp.61-66
null
null
cs.RO
null
A rigid-flexible manipulator may be assigned tasks in a moving environment where the winds or vibrations affect the position and/or orientation of surface of operation. Consequently, losses of the contact and perhaps degradation of the performance may occur as references are changed. When the environment is moving, knowledge of the angle &#945; between the contact surface and the horizontal is required at every instant. In this paper, different profiles for the time varying angle &#945; are proposed to investigate the effect of this change into the contact force and the joint torques of a rigid-flexible manipulator. The coefficients of the equation of the proposed rotating surface are changing with time to determine the new X and Y coordinates of the moving surface as the surface rotates.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:48:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Ata", "Atef A.", "" ], [ "Johar", "Habib", "" ] ]
cs/0412054
Vedran Kordic
L. M. Galantucci, G. Percoco & R. Spina
Assembly and Disassembly Planning by using Fuzzy Logic & Genetic Algorithms
null
International Journal of Advanced Robotic Systems, Volume 1, Number 2, June 2004, pp.67-74
null
null
cs.RO
null
The authors propose the implementation of hybrid Fuzzy Logic-Genetic Algorithm (FL-GA) methodology to plan the automatic assembly and disassembly sequence of products. The GA-Fuzzy Logic approach is implemented onto two levels. The first level of hybridization consists of the development of a Fuzzy controller for the parameters of an assembly or disassembly planner based on GAs. This controller acts on mutation probability and crossover rate in order to adapt their values dynamically while the algorithm runs. The second level consists of the identification of theoptimal assembly or disassembly sequence by a Fuzzy function, in order to obtain a closer control of the technological knowledge of the assembly/disassembly process. Two case studies were analyzed in order to test the efficiency of the Fuzzy-GA methodologies.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:50:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Galantucci", "L. M.", "" ], [ "Percoco", "G.", "" ], [ "Spina", "R.", "" ] ]
cs/0412055
Vedran Kordic
Alan P. Kypson and W. Randolph Chitwood Jr
Robotic Applications in Cardiac Surgery
null
International Journal of Advanced Robotic Systems, Volume 1, Number 2, June 2004, pp.87-92
null
null
cs.RO
null
Traditionally, cardiac surgery has been performed through a median sternotomy, which allows the surgeon generous access to the heart and surrounding great vessels. As a paradigm shift in the size and location of incisions occurs in cardiac surgery, new methods have been developed to allow the surgeon the same amount of dexterity and accessibility to the heart in confined spaces and in a less invasive manner. Initially, long instruments without pivot points were used, however, more recent robotic telemanipulation systems have been applied that allow for improved dexterity, enabling the surgeon to perform cardiac surgery from a distance not previously possible. In this rapidly evolving field, we review the recent history and clinical results of using robotics in cardiac surgery.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:52:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Kypson", "Alan P.", "" ], [ "Chitwood", "W. Randolph", "Jr" ] ]
cs/0412056
Vedran Kordic
Nikita Pashenkov & Ryuichi Iwamasa
One-Chip Solution to Intelligent Robot Control: Implementing Hexapod Subsumption Architecture Using a Contemporary Microprocessor
null
International Journal of Advanced Robotic Systems, Volume 1, Number 2, June 2004, pp. 93-98
null
null
cs.RO
null
This paper introduces a six-legged autonomous robot managed by a single controller and a software core modeled on subsumption architecture. We begin by discussing the features and capabilities of IsoPod, a new processor for robotics which has enabled a streamlined implementation of our project. We argue that this processor offers a unique set of hardware and software features, making it a practical development platform for robotics in general and for subsumption-based control architectures in particular. Next, we summarize original ideas on subsumption architecture implementation for a six-legged robot, as presented by its inventor Rodney Brooks in 1980s. A comparison is then made to a more recent example of a hexapod control architecture based on subsumption. The merits of both systems are analyzed and a new subsumption architecture layout is formulated as a response. We conclude with some remarks regarding the development of this project as a hint at new potentials for intelligent robot design, opened by a recent development in embedded controller market.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:55:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Pashenkov", "Nikita", "" ], [ "Iwamasa", "Ryuichi", "" ] ]
cs/0412057
Vedran Kordic
Miomir Vukobratovic, Dejan Andric & Branislav Borovac
How to achieve various gait patterns from single nominal
null
International Journal of Advanced Robotic Systems, Volume 1, Number 2, June 2004, pp. 99-108
null
null
cs.RO
null
In this paper is presented an approach to achieving on-line modification of nominal biped gait without recomputing entire dynamics when steady motion is performed. Straight, dynamically balanced walk was used as a nominal gait, and applied modifications were speed-up and slow-down walk and turning left and right. It is shown that the disturbances caused by these modifications jeopardize dynamic stability, but they can be simply compensated to enable walk continuation.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:57:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Vukobratovic", "Miomir", "" ], [ "Andric", "Dejan", "" ], [ "Borovac", "Branislav", "" ] ]
cs/0412058
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng, Joshua Zhexue Huang
Clustering Categorical Data Streams
23 pages. To Appear in Journal of Computational Methods on Science and Engineering(JCMSE)
null
null
null
cs.DB cs.AI
null
The data stream model has been defined for new classes of applications involving massive data being generated at a fast pace. Web click stream analysis and detection of network intrusions are two examples. Cluster analysis on data streams becomes more difficult, because the data objects in a data stream must be accessed in order and can be read only once or few times with limited resources. Recently, a few clustering algorithms have been developed for analyzing numeric data streams. However, to our knowledge to date, no algorithm exists for clustering categorical data streams. In this paper, we propose an efficient clustering algorithm for analyzing categorical data streams. It has been proved that the proposed algorithm uses small memory footprints. We provide empirical analysis on the performance of the algorithm in clustering both synthetic and real data streams
[ { "version": "v1", "created": "Mon, 13 Dec 2004 06:14:20 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ], [ "Huang", "Joshua Zhexue", "" ] ]
cs/0412059
Ross Gayler
Ross W. Gayler
Vector Symbolic Architectures answer Jackendoff's challenges for cognitive neuroscience
This is a slightly updated version of the paper presented at the Joint International Conference on Cognitive Science, 13-17 July 2003, University of New South Wales, Sydney, Australia. 6 pages
null
null
null
cs.NE cs.AI
null
Jackendoff (2002) posed four challenges that linguistic combinatoriality and rules of language present to theories of brain function. The essence of these problems is the question of how to neurally instantiate the rapid construction and transformation of the compositional structures that are typically taken to be the domain of symbolic processing. He contended that typical connectionist approaches fail to meet these challenges and that the dialogue between linguistic theory and cognitive neuroscience will be relatively unproductive until the importance of these problems is widely recognised and the challenges answered by some technical innovation in connectionist modelling. This paper claims that a little-known family of connectionist models (Vector Symbolic Architectures) are able to meet Jackendoff's challenges.
[ { "version": "v1", "created": "Mon, 13 Dec 2004 08:00:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Gayler", "Ross W.", "" ] ]
cs/0412061
Gerard Henry Edmond Duchamp
Gerard Henry Edmond Duchamp (LIPN), Jean-Gabriel Luque (IGM), Karol A. Penson (LPTL), Christophe Tollu (LIPN)
Free quasi-symmetric functions, product actions and quantum field theory of partitions
Submitted 28.11.04
null
null
null
cs.SC math.CO quant-ph
null
We examine two associative products over the ring of symmetric functions related to the intransitive and Cartesian products of permutation groups. As an application, we give an enumeration of some Feynman type diagrams arising in Bender's QFT of partitions. We end by exploring possibilities to construct noncommutative analogues.
[ { "version": "v1", "created": "Mon, 13 Dec 2004 19:37:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Duchamp", "Gerard Henry Edmond", "", "LIPN" ], [ "Luque", "Jean-Gabriel", "", "IGM" ], [ "Penson", "Karol A.", "", "LPTL" ], [ "Tollu", "Christophe", "", "LIPN" ] ]
cs/0412062
Michael Bauland
Michael Bauland and Edith Hemaspaandra
Isomorphic Implication
22 pages; corrected typos and minor errors
null
null
null
cs.CC
null
We study the isomorphic implication problem for Boolean constraints. We show that this is a natural analog of the subgraph isomorphism problem. We prove that, depending on the set of constraints, this problem is in P, NP-complete, or NP-hard, coNP-hard, and in parallel access to NP. We show how to extend the NP-hardness and coNP-hardness to hardness for parallel access to NP for some cases, and conjecture that this can be done in all cases.
[ { "version": "v1", "created": "Tue, 14 Dec 2004 17:15:29 GMT" }, { "version": "v2", "created": "Thu, 21 Apr 2005 12:29:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Bauland", "Michael", "" ], [ "Hemaspaandra", "Edith", "" ] ]
cs/0412064
Marko Rodriguez
Dan Steinbock, Craig Kaplan, Marko Rodriguez, Juana Diaz, Newton Der, Suzanne Garcia
Collective Intelligence Quanitifed for Computer-Mediated Group Problem Solving
University of California, Santa Cruz Tech Report UCSC-CRL-02-28
null
null
null
cs.CY cs.HC cs.OH
null
Collective Intelligence (CI) is the ability of a group to exhibit greater intelligence than its individual members. Expressed by the common saying that "two minds are better than one," CI has been a topic of interest for social psychology and the information sciences. Computer mediation adds a new element in the form of distributed networks and group support systems. These facilitate highly organized group activities that were all but impossible before computer mediation. This paper presents experimental findings on group problem solving where a distributed software system automatically integrates input from many humans. In order to quantify Collective Intelligence, we compare the performance of groups to individuals when solving a mathematically formalized problem. This study shows that groups can outperform individuals on difficult but not easy problems, though groups are slower to produce solutions. The subjects are 57 university students. The task is the 8-Puzzle sliding tile game.
[ { "version": "v1", "created": "Wed, 15 Dec 2004 17:13:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Steinbock", "Dan", "" ], [ "Kaplan", "Craig", "" ], [ "Rodriguez", "Marko", "" ], [ "Diaz", "Juana", "" ], [ "Der", "Newton", "" ], [ "Garcia", "Suzanne", "" ] ]
cs/0412065
Riccardo Pucella
Stephen Chong, Riccardo Pucella
A Framework for Creating Natural Language User Interfaces for Action-Based Applications
25 pages, 1 figure. A preliminary version of this paper appeared in the Proceedings of the Third International AMAST Workshop on Algebraic Methods in Language Processing, TWLT Report 21, pp. 83-98, 2003
null
null
null
cs.CL cs.HC
null
In this paper we present a framework for creating natural language interfaces to action-based applications. Our framework uses a number of reusable application-independent components, in order to reduce the effort of creating a natural language interface for a given application. Using a type-logical grammar, we first translate natural language sentences into expressions in an extended higher-order logic. These expressions can be seen as executable specifications corresponding to the original sentences. The executable specifications are then interpreted by invoking appropriate procedures provided by the application for which a natural language interface is being created.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 03:24:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Chong", "Stephen", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0412066
Vitorino Ramos Dr.
Vitorino Ramos, Pedro Pina, Fernando Muge
From Feature Extraction to Classification: A multidisciplinary Approach applied to Portuguese Granites
8 pages, 6 figures, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_21.html
SCIA 99, 11th Scandinavian Conf. on Image Analysis, ISBN 87-88306-42-9, Vol.2, pp. 817-824, Kangerlussuaq, Greenland, 7-11, June 1999
null
null
cs.AI cs.CV
null
The purpose of this paper is to present a complete methodology based on a multidisciplinary approach, that goes from the extraction of features till the classification of a set of different portuguese granites. The set of tools to extract the features that characterise polished surfaces of the granites is mainly based on mathematical morphology. The classification methodology is based on a genetic algorithm capable of search the input feature space used by the nearest neighbour rule classifier. Results show that is adequate to perform feature reduction and simultaneous improve the recognition rate. Moreover, the present methodology represents a robust strategy to understand the proper nature of the images treated, and their discriminant features. KEYWORDS: Portuguese grey granites, feature extraction, mathematical morphology, feature reduction, genetic algorithms, nearest neighbour rule classifiers (k-NNR).
[ { "version": "v1", "created": "Fri, 17 Dec 2004 19:04:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Pina", "Pedro", "" ], [ "Muge", "Fernando", "" ] ]
cs/0412068
Vitorino Ramos Dr.
Vitorino Ramos, Ajith Abraham
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
13 pages, 3 figures, Swarm Intelligence and Patterns (SIP)- special track at WSTST 2005, Muroran, JAPAN
null
null
null
cs.CR cs.AI
null
Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: the external intruders who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with some restrictions. Due to the fact that it is more and more improbable to a system administrator to recognize and manually intervene to stop an attack, there is an increasing recognition that ID systems should have a lot to earn on following its basic principles on the behavior of complex natural systems, namely in what refers to self-organization, allowing for a real distributed and collective perception of this phenomena. With that aim in mind, the present work presents a self-organized ant colony based intrusion detection system (ANTIDS) to detect intrusions in a network infrastructure. The performance is compared among conventional soft computing paradigms like Decision Trees, Support Vector Machines and Linear Genetic Programming to model fast, online and efficient intrusion detection systems.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 13:17:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Abraham", "Ajith", "" ] ]
cs/0412069
Vitorino Ramos Dr.
Vitorino Ramos, Jonathan Campbell, John Slater, John Gillespie, Ivan F. Bendezu, Fionn Murtagh
Swarming around Shellfish Larvae
11 pages, 4 figures, http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_53.html, submitted to IbPRIA 2005, Portugal
null
null
null
cs.AI cs.CV
null
The collection of wild larvae seed as a source of raw material is a major sub industry of shellfish aquaculture. To predict when, where and in what quantities wild seed will be available, it is necessary to track the appearance and growth of planktonic larvae. One of the most difficult groups to identify, particularly at the species level are the Bivalvia. This difficulty arises from the fact that fundamentally all bivalve larvae have a similar shape and colour. Identification based on gross morphological appearance is limited by the time-consuming nature of the microscopic examination and by the limited availability of expertise in this field. Molecular and immunological methods are also being studied. We describe the application of computational pattern recognition methods to the automated identification and size analysis of scallop larvae. For identification, the shape features used are binary invariant moments; that is, the features are invariant to shift (position within the image), scale (induced either by growth or differential image magnification) and rotation. Images of a sample of scallop and non-scallop larvae covering a range of maturities have been analysed. In order to overcome the automatic identification, as well as to allow the system to receive new unknown samples at any moment, a self-organized and unsupervised ant-like clustering algorithm based on Swarm Intelligence is proposed, followed by simple k-NNR nearest neighbour classification on the final map. Results achieve a full recognition rate of 100% under several situations (k =1 or 3).
[ { "version": "v1", "created": "Fri, 17 Dec 2004 13:30:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Campbell", "Jonathan", "" ], [ "Slater", "John", "" ], [ "Gillespie", "John", "" ], [ "Bendezu", "Ivan F.", "" ], [ "Murtagh", "Fionn", "" ] ]
cs/0412070
Vitorino Ramos Dr.
Vitorino Ramos, Fernando Muge
Less is More - Genetic Optimisation of Nearest Neighbour Classifiers
9 pages, 7 figures, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_13.html
Proc. RecPad 98 - 10th Portuguese Conference on Pattern Recognition, F.Muge, C.Pinto and M.Piedade Eds., ISBN 972-97711-0-3, pp. 293-301, Lisbon, March 1998
null
null
cs.AI cs.CV
null
The present paper deals with optimisation of Nearest Neighbour rule Classifiers via Genetic Algorithms. The methodology consists on implement a Genetic Algorithm capable of search the input feature space used by the NNR classifier. Results show that is adequate to perform feature reduction and simultaneous improve the Recognition Rate. Some practical examples prove that is possible to Recognise Portuguese Granites in 100%, with only 3 morphological features (from an original set of 117 features), which is well suited for real time applications. Moreover, the present method represents a robust strategy to understand the proper nature of the images treated, and their discriminant features. KEYWORDS: Feature Reduction, Genetic Algorithms, Nearest Neighbour Rule Classifiers (k-NNR).
[ { "version": "v1", "created": "Fri, 17 Dec 2004 19:09:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Muge", "Fernando", "" ] ]
cs/0412073
Vitorino Ramos Dr.
Vitorino Ramos
Self-Organizing the Abstract: Canvas as a Swarm Habitat for Collective Memory, Perception and Cooperative Distributed Creativity
2 pages, 1 figure, Project at http://alfa.ist.utl.pt/~cvrm/staff/vramos/Artsbot.html. Publication at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_37.html
in First Art and Science Symposium, Models to Know Reality, J. Rekalde, R. Ibanez and A. Simo (Eds.), pp. 59-60, Facultad de Bellas Artes EHU/UPV, Universidad del Pais Vasco, 11-12 Dec., Bilbao, Spain, 2003
null
null
cs.MM cs.AI
null
Past experiences under the designation of "Swarm Paintings" conducted in 2001, not only confirmed the possibility of realizing an artificial art (thus non-human), as introduced into the process the questioning of creative migration, specifically from the computer monitors to the canvas via a robotic harm. In more recent self-organized based research we seek to develop and profound the initial ideas by using a swarm of autonomous robots (ARTsBOT project 2002-03), that "live" avoiding the purpose of being merely a simple perpetrator of order streams coming from an external computer, but instead, that actually co-evolve within the canvas space, acting (that is, laying ink) according to simple inner threshold stimulus response functions, reacting simultaneously to the chromatic stimulus present in the canvas environment done by the passage of their team-mates, as well as by the distributed feedback, affecting their future collective behaviour. In parallel, and in what respects to certain types of collective systems, we seek to confirm, in a physically embedded way, that the emergence of order (even as a concept) seems to be found at a lower level of complexity, based on simple and basic interchange of information, and on the local dynamic of parts, who, by self-organizing mechanisms tend to form an lived whole, innovative and adapting, allowing for emergent open-ended creative and distributed production. KEYWORDS: ArtSBots Project, Swarm Intelligence, Stigmergy, UnManned Art, Symbiotic Art, Swarm Paintings, Robot Paintings, Non-Human Art, Painting Emergence and Cooperation, Art and Complexity, ArtBots: The Robot Talent Show.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 15:36:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ] ]
cs/0412074
Elizabeth Haubert
Elizabeth Haubert
Threats of Human Error in a High-Performance Storage System: Problem Statement and Case Study
13 pages, 1 figure
null
null
null
cs.HC cs.OS
null
System administration is a difficult, often tedious, job requiring many skilled laborers. The data that is protected by system administrators is often valued at or above the value of the institution maintaining that data. A number of ethnographic studies have confirmed the skill of these operators, and the difficulty of providing adequate tools. In an effort to minimize the maintenance costs, an increasing portion of system administration is subject to automation - particularly simple, routine tasks such as data backup. While such tools reduce the risk of errors from carelessness, the same tools may result in reduced skill and system familiarity in experienced workers. Care should be taken to ensure that operators maintain system awareness without placing the operator in a passive, monitoring role.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 15:38:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubert", "Elizabeth", "" ] ]
cs/0412075
Vitorino Ramos Dr.
Vitorino Ramos, Juan J. Merelo
Self-Organized Stigmergic Document Maps: Environment as a Mechanism for Context Learning
10 pages, 5 figures, at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_42.html
in AEB 2002, 1st Spanish Conference on Evolutionary and Bio-Inspired Algorithms, E. Alba, F. Herrera, J.J. Merelo et al. (Eds.), pp. 284-293, Centro Univ. de Merida, Merida, Spain, 6-8 Feb. 2002
null
null
cs.AI cs.DC
null
Social insect societies and more specifically ant colonies, are distributed systems that, in spite of the simplicity of their individuals, present a highly structured social organization. As a result of this organization, ant colonies can accomplish complex tasks that in some cases exceed the individual capabilities of a single ant. The study of ant colonies behavior and of their self-organizing capabilities is of interest to knowledge retrieval/management and decision support systems sciences, because it provides models of distributed adaptive organization which are useful to solve difficult optimization, classification, and distributed control problems, among others. In the present work we overview some models derived from the observation of real ants, emphasizing the role played by stigmergy as distributed communication paradigm, and we present a novel strategy to tackle unsupervised clustering as well as data retrieval problems. The present ant clustering system (ACLUSTER) avoids not only short-term memory based strategies, as well as the use of several artificial ant types (using different speeds), present in some recent approaches. Moreover and according to our knowledge, this is also the first application of ant systems into textual document clustering. KEYWORDS: Swarm Intelligence, Ant Systems, Unsupervised Clustering, Data Retrieval, Data Mining, Distributed Computing, Document Maps, Textual Document Clustering.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 15:47:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Merelo", "Juan J.", "" ] ]
cs/0412076
Vitorino Ramos Dr.
J.R. Caldas-Pinto, Pedro Pina, Vitorino Ramos, Mario Ramalho
Clustering Techniques for Marbles Classification
7 pages, 17 figures, at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_41.html
RecPad 2002 -12th Portuguese Conference on Pattern Recognition, ISBN 972-789-067-9, Aveiro, Portugal, June 27-28, 2002
null
null
cs.AI cs.CV
null
Automatic marbles classification based on their visual appearance is an important industrial issue. However, there is no definitive solution to the problem mainly due to the presence of randomly distributed high number of different colours and its subjective evaluation by the human expert. In this paper we present a study of segmentation techniques, we evaluate they overall performance using a training set and standard quality measures and finally we apply different clustering techniques to automatically classify the marbles. KEYWORDS: Segmentation, Clustering, Quadtrees, Learning Vector Quantization (LVQ), Simulated Annealing (SA).
[ { "version": "v1", "created": "Fri, 17 Dec 2004 15:55:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Caldas-Pinto", "J. R.", "" ], [ "Pina", "Pedro", "" ], [ "Ramos", "Vitorino", "" ], [ "Ramalho", "Mario", "" ] ]
cs/0412077
Vitorino Ramos Dr.
Vitorino Ramos
On the Implicit and on the Artificial - Morphogenesis and Emergent Aesthetics in Autonomous Collective Systems
33 pages, 7 figures, Project at http://alfa.ist.utl.pt/~cvrm/staff/vramos/Artsbot.html . Publ. at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_37.html
Chapter 2 in ARCHITOPIA Book, Art, Architecture and Science, J.L. Maubant et al. (Eds.), pp. 25-57, INSTITUT D'ART CONTEMPORAIN (France), ISBN : 2905985631, Feb. 2002
null
null
cs.AI cs.MM
null
Imagine a "machine" where there is no pre-commitment to any particular representational scheme: the desired behaviour is distributed and roughly specified simultaneously among many parts, but there is minimal specification of the mechanism required to generate that behaviour, i.e. the global behaviour evolves from the many relations of multiple simple behaviours. A machine that lives to and from/with Synergy. An artificial super-organism that avoids specific constraints and emerges within multiple low-level implicit bio-inspired mechanisms. KEYWORDS: Complex Science, ArtSBots Project, Swarm Intelligence, Stigmergy, UnManned Art, Symbiotic Art, Swarm Paintings, Robot Paintings, Non-Human Art, Painting Emergence and Cooperation, Art and Complexity, ArtBots: The Robot Talent Show.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:15:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ] ]
cs/0412078
David Renault
D. Renault
The vertex-transitive TLF-planar graphs
Article : 23 pages, 15 figures Appendix : 13 pages, 72 figures Submitted to Discrete Mathematics The appendix is accessible at http://www.labri.fr/~renault/research/research.html
null
null
null
cs.DM
null
We consider the class of the topologically locally finite (in short TLF) planar vertex-transitive graphs, a class containing in particular all the one-ended planar Cayley graphs and the normal transitive tilings. We characterize these graphs with a finite local representation and a special kind of finite state automaton named labeling scheme. As a result, we are able to enumerate and describe all TLF-planar vertex-transitive graphs of any given degree. Also, we are able decide to whether any TLF-planar transitive graph is Cayley or not.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:18:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Renault", "D.", "" ] ]
cs/0412079
Vitorino Ramos Dr.
Vitorino Ramos
The MC2 Project [Machines of Collective Conscience]: A possible walk, up to Life-like Complexity and Behaviour, from bottom, basic and simple bio-inspired heuristics - a walk, up into the morphogenesis of information
14 pages, Project at http://alfa.ist.utl.pt/~cvrm/staff/vramos/MC2.html
at UTOPIA Biennial Art Exposition CATALOGUE, Cascais, Portugal, July 12-22, 2001
null
null
cs.AI cs.MM
null
Synergy (from the Greek word synergos), broadly defined, refers to combined or co-operative effects produced by two or more elements (parts or individuals). The definition is often associated with the holistic conviction quote that "the whole is greater than the sum of its parts" (Aristotle, in Metaphysics), or the whole cannot exceed the sum of the energies invested in each of its parts (e.g. first law of thermodynamics) even if it is more accurate to say that the functional effects produced by wholes are different from what the parts can produce alone. Synergy is a ubiquitous phenomena in nature and human societies alike. One well know example is provided by the emergence of self-organization in social insects, via direct or indirect interactions. The latter types are more subtle and defined as stigmergy to explain task coordination and regulation in the context of nest reconstruction in termites. An example, could be provided by two individuals, who interact indirectly when one of them modifies the environment and the other responds to the new environment at a later time. In other words, stigmergy could be defined as a particular case of environmental or spatial synergy. The system is purely holistic, and their properties are intrinsically emergent and autocatalytic. On the present work we present a "machine" where there is no precommitment to any particular representational scheme: the desired behaviour is distributed and roughly specified simultaneously among many parts, but there is minimal specification of the mechanism required to generate that behaviour, i.e. the global behaviour evolves from the many relations of multiple simple behaviours.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:28:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ] ]
cs/0412080
Vitorino Ramos Dr.
Vitorino Ramos
The Biological Concept of Neoteny in Evolutionary Colour Image Segmentation - Simple Experiments in Simple Non-Memetic Genetic Algorithms
12 pages, 3 figures, at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_35.html
in Applications of Evolutionary Computation, (Eds.), EuroGP / EvoIASP 2001 - 3rd Eur. Works. on Evol. Comp. in Image Analysis and Signal Processing, Lake Como, Milan, Italy, Lecture Notes in Computer Science, Vol. 2037, pp. 364-378, Springer-Verlag, Berlin-Heidelberg, April 18-20, 2001
null
null
cs.AI cs.NE
null
Neoteny, also spelled Paedomorphosis, can be defined in biological terms as the retention by an organism of juvenile or even larval traits into later life. In some species, all morphological development is retarded; the organism is juvenilized but sexually mature. Such shifts of reproductive capability would appear to have adaptive significance to organisms that exhibit it. In terms of evolutionary theory, the process of paedomorphosis suggests that larval stages and developmental phases of existing organisms may give rise, under certain circumstances, to wholly new organisms. Although the present work does not pretend to model or simulate the biological details of such a concept in any way, these ideas were incorporated by a rather simple abstract computational strategy, in order to allow (if possible) for faster convergence into simple non-memetic Genetic Algorithms, i.e. without using local improvement procedures (e.g. via Baldwin or Lamarckian learning). As a case-study, the Genetic Algorithm was used for colour image segmentation purposes by using K-mean unsupervised clustering methods, namely for guiding the evolutionary algorithm in his search for finding the optimal or sub-optimal data partition. Average results suggest that the use of neotonic strategies by employing juvenile genotypes into the later generations and the use of linear-dynamic mutation rates instead of constant, can increase fitness values by 58% comparing to classical Genetic Algorithms, independently from the starting population characteristics on the search space. KEYWORDS: Genetic Algorithms, Artificial Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation, Classification, Clustering.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:39:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ] ]
cs/0412081
Vitorino Ramos Dr.
Vitorino Ramos
Artificial Neoteny in Evolutionary Image Segmentation
10 pages, 4 figures
SIARP 2000 - 5th IberoAmerican Symp. on Pattern Rec., F. Muge, Moises P. and R. Caldas Pinto (Eds.), ISBN 972-97711-1-1, pp. 69-78, Lisbon, Portugal, 11-13 Sep. 2000
null
null
cs.AI cs.NE
null
Neoteny, also spelled Paedomorphosis, can be defined in biological terms as the retention by an organism of juvenile or even larval traits into later life. In some species, all morphological development is retarded; the organism is juvenilized but sexually mature. Such shifts of reproductive capability would appear to have adaptive significance to organisms that exhibit it. In terms of evolutionary theory, the process of paedomorphosis suggests that larval stages and developmental phases of existing organisms may give rise, under certain circumstances, to wholly new organisms. Although the present work does not pretend to model or simulate the biological details of such a concept in any way, these ideas were incorporated by a rather simple abstract computational strategy, in order to allow (if possible) for faster convergence into simple non-memetic Genetic Algorithms, i.e. without using local improvement procedures (e.g. via Baldwin or Lamarckian learning). As a case-study, the Genetic Algorithm was used for colour image segmentation purposes by using K-mean unsupervised clustering methods, namely for guiding the evolutionary algorithm in his search for finding the optimal or sub-optimal data partition. Average results suggest that the use of neotonic strategies by employing juvenile genotypes into the later generations and the use of linear-dynamic mutation rates instead of constant, can increase fitness values by 58% comparing to classical Genetic Algorithms, independently from the starting population characteristics on the search space. KEYWORDS: Genetic Algorithms, Artificial Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation, Classification, Clustering.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:44:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ] ]
cs/0412083
Vitorino Ramos Dr.
A. Marcolino, Vitorino Ramos, Mario Ramalho, J.R. Caldas Pinto
Line and Word Matching in Old Documents
12 pages, 7 figures, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_32.html
SIARP 2000 - 5th IberoAmerican Symp. on Pattern Rec., F. Muge, Moises P. and R. Caldas Pinto (Eds.), ISBN 972-97711-1-1, pp. 123-135, Lisbon, Portugal, 11-13 Sep. 2000
null
null
cs.AI cs.CV
null
This paper is concerned with the problem of establishing an index based on word matching. It is assumed that the book was digitised as better as possible and some pre-processing techniques were already applied as line orientation correction and some noise removal. However two main factor are responsible for being not possible to apply ordinary optical character recognition techniques (OCR): the presence of antique fonts and the degraded state of many characters due to unrecoverable original time degradation. In this paper we make a short introduction to word segmentation that involves finding the lines that characterise a word. After we discuss different approaches for word matching and how they can be combined to obtain an ordered list for candidate words for the matching. This discussion will be illustrated by examples.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:58:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Marcolino", "A.", "" ], [ "Ramos", "Vitorino", "" ], [ "Ramalho", "Mario", "" ], [ "Pinto", "J. R. Caldas", "" ] ]
cs/0412084
Vitorino Ramos Dr.
Vitorino Ramos, Fernando Muge
Map Segmentation by Colour Cube Genetic K-Mean Clustering
4 pages, 1 figure, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_31.html
ECDL 2000 - 4th Eur. Conf. on Research and Advanced Technology for Digital Libraries, J. Borbinha and T. Baker (Eds.), ISBN 3-540-41023-6, LNCS series, Vol. 1923, pp. 319-323, Springer-Verlag, Heidelberg, Lisbon, Portugal, 18-20 Sep. 2000
null
null
cs.AI cs.NE
null
Segmentation of a colour image composed of different kinds of texture regions can be a hard problem, namely to compute for an exact texture fields and a decision of the optimum number of segmentation areas in an image when it contains similar and/or unstationary texture fields. In this work, a method is described for evolving adaptive procedures for these problems. In many real world applications data clustering constitutes a fundamental issue whenever behavioural or feature domains can be mapped into topological domains. We formulate the segmentation problem upon such images as an optimisation problem and adopt evolutionary strategy of Genetic Algorithms for the clustering of small regions in colour feature space. The present approach uses k-Means unsupervised clustering methods into Genetic Algorithms, namely for guiding this last Evolutionary Algorithm in his search for finding the optimal or sub-optimal data partition, task that as we know, requires a non-trivial search because of its NP-complete nature. To solve this task, the appropriate genetic coding is also discussed, since this is a key aspect in the implementation. Our purpose is to demonstrate the efficiency of Genetic Algorithms to automatic and unsupervised texture segmentation. Some examples in Colour Maps are presented and overall results discussed. KEYWORDS: Genetic Algorithms, Artificial Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation, Classification, Clustering.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 17:04:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Muge", "Fernando", "" ] ]
cs/0412086
Vitorino Ramos Dr.
Vitorino Ramos, Filipe Almeida
Artificial Ant Colonies in Digital Image Habitats - A Mass Behaviour Effect Study on Pattern Recognition
11 pages, 3 figures, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_29.html
Proc. of ANTS 2000 - 2nd Int. Works. on Ant Algorithms (From Ant Colonies to Artificial Ants), Marco Dorigo, Martin Middendorf, Thomas Stuzle (Eds.), pp. 113, Brussels, Belgium, 7-9 Sep. 2000
null
null
cs.AI cs.CV
null
Some recent studies have pointed that, the self-organization of neurons into brain-like structures, and the self-organization of ants into a swarm are similar in many respects. If possible to implement, these features could lead to important developments in pattern recognition systems, where perceptive capabilities can emerge and evolve from the interaction of many simple local rules. The principle of the method is inspired by the work of Chialvo and Millonas who developed the first numerical simulation in which swarm cognitive map formation could be explained. From this point, an extended model is presented in order to deal with digital image habitats, in which artificial ants could be able to react to the environment and perceive it. Evolution of pheromone fields point that artificial ant colonies could react and adapt appropriately to any type of digital habitat. KEYWORDS: Swarm Intelligence, Self-Organization, Stigmergy, Artificial Ant Systems, Pattern Recognition and Perception, Image Segmentation, Gestalt Perception Theory, Distributed Computation.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 17:19:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Almeida", "Filipe", "" ] ]
cs/0412087
Vitorino Ramos Dr.
Vitorino Ramos, Fernando Muge
Image Colour Segmentation by Genetic Algorithms
5 pages, 1 figure, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_26.html
RecPad 2000 - 11th Portuguese Conf. on Pattern Recognition, in Aurelio C. Campilho and A.M. Mendonca (Eds.), ISBN 972-96883-2-5, pp. 125-129, Porto, Portugal, May 11-12, 2000
null
null
cs.AI cs.CV
null
Segmentation of a colour image composed of different kinds of texture regions can be a hard problem, namely to compute for an exact texture fields and a decision of the optimum number of segmentation areas in an image when it contains similar and/or unstationary texture fields. In this work, a method is described for evolving adaptive procedures for these problems. In many real world applications data clustering constitutes a fundamental issue whenever behavioural or feature domains can be mapped into topological domains. We formulate the segmentation problem upon such images as an optimisation problem and adopt evolutionary strategy of Genetic Algorithms for the clustering of small regions in colour feature space. The present approach uses k-Means unsupervised clustering methods into Genetic Algorithms, namely for guiding this last Evolutionary Algorithm in his search for finding the optimal or sub-optimal data partition, task that as we know, requires a non-trivial search because of its intrinsic NP-complete nature. To solve this task, the appropriate genetic coding is also discussed, since this is a key aspect in the implementation. Our purpose is to demonstrate the efficiency of Genetic Algorithms to automatic and unsupervised texture segmentation. Some examples in Colour Maps, Ornamental Stones and in Human Skin Mark segmentation are presented and overall results discussed. KEYWORDS: Genetic Algorithms, Colour Image Segmentation, Classification, Clustering.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 17:29:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Muge", "Fernando", "" ] ]
cs/0412088
Vitorino Ramos Dr.
Vitorino Ramos, Fernando Muge
On Image Filtering, Noise and Morphological Size Intensity Diagrams
9 pages, 4 figures, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_25.html
RecPad 2000 - 11th Portuguese Conf. on Pattern Recognition, in Aurelio C. Campilho and A.M. Mendonca (Eds.), ISBN 972-96883-2-5, pp. 483-491, Porto, Portugal, May 11-12, 2000
null
null
cs.CV cs.AI
null
In the absence of a pure noise-free image it is hard to define what noise is, in any original noisy image, and as a consequence also where it is, and in what amount. In fact, the definition of noise depends largely on our own aim in the whole image analysis process, and (perhaps more important) in our self-perception of noise. For instance, when we perceive noise as disconnected and small it is normal to use MM-ASF filters to treat it. There is two evidences of this. First, in many instances there is no ideal and pure noise-free image to compare our filtering process (nothing but our self-perception of its pure image); second, and related with this first point, MM transformations that we chose are only based on our self - and perhaps - fuzzy notion. The present proposal combines the results of two MM filtering transformations (FT1, FT2) and makes use of some measures and quantitative relations on their Size/Intensity Diagrams to find the most appropriate noise removal process. Results can also be used for finding the most appropriate stop criteria, and the right sequence of MM operators combination on Alternating Sequential Filters (ASF), if these measures are applied, for instance, on a Genetic Algorithm's target function.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 18:58:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Muge", "Fernando", "" ] ]
cs/0412089
Evgeny Yanenko O.
Evgeny Yanenko
Evolving Categories: Consistent Framework for Representation of Data and Algorithms
10 pages, 20 pictures
null
null
null
cs.DS
null
A concept of "evolving categories" is suggested to build a simple, scalable, mathematically consistent framework for representing in uniform way both data and algorithms. A state machine for executing algorithms becomes clear, rich and powerful semantics, based on category theory, and still allows easy implementation. Moreover, it gives an original insight into the nature and semantics of algorithms.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 22:58:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Yanenko", "Evgeny", "" ] ]
cs/0412090
Serban Vlad E.
Serban E. Vlad
Real Time Models of the Asynchronous Circuits: The Delay Theory
82 pages, 30 figures
in New Developments in Computer Science Research, Editor Susan Shannon, Nova Science Publishers, Inc., New York, 2005
null
null
cs.GL
null
The chapter from the book introduces the delay theory, whose purpose is the modeling of the asynchronous circuits from digital electrical engineering with ordinary and differential pseudo-boolean equations.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 23:04:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]