id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0412091 | Florentin Smarandache | Florentin Smarandache, Jean Dezert | The Combination of Paradoxical, Uncertain, and Imprecise Sources of
Information based on DSmT and Neutro-Fuzzy Inference | 20 pages | A version of this paper published in Proceedings of 10th
International Conference on Fuzzy Theory and Technology (FT&T 2005), Salt
Lake City, Utah, USA, July 21-26, 2005. | null | null | cs.AI | null | The management and combination of uncertain, imprecise, fuzzy and even
paradoxical or high conflicting sources of information has always been, and
still remains today, of primal importance for the development of reliable
modern information systems involving artificial reasoning. In this chapter, we
present a survey of our recent theory of plausible and paradoxical reasoning,
known as Dezert-Smarandache Theory (DSmT) in the literature, developed for
dealing with imprecise, uncertain and paradoxical sources of information. We
focus our presentation here rather on the foundations of DSmT, and on the two
important new rules of combination, than on browsing specific applications of
DSmT available in literature. Several simple examples are given throughout the
presentation to show the efficiency and the generality of this new approach.
The last part of this chapter concerns the presentation of the neutrosophic
logic, the neutro-fuzzy inference and its connection with DSmT. Fuzzy logic and
neutrosophic logic are useful tools in decision making after fusioning the
information using the DSm hybrid rule of combination of masses.
| [
{
"version": "v1",
"created": "Sun, 19 Dec 2004 14:56:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] |
cs/0412092 | Alasdair Earl | A. Earl and P. Clark | Mass Storage Management and the Grid | 4 pages, 3 figures, Presented at Computing for High Energy and
Nuclear Physics 2004 (CHEP '04), Interlaken, Switzerland, September 2004 | null | null | null | cs.DC cs.SE | null | The University of Edinburgh has a significant interest in mass storage
systems as it is one of the core groups tasked with the roll out of storage
software for the UK's particle physics grid, GridPP. We present the results of
a development project to provide software interfaces between the SDSC Storage
Resource Broker, the EU DataGrid and the Storage Resource Manager. This project
was undertaken in association with the eDikt group at the National eScience
Centre, the Universities of Bristol and Glasgow, Rutherford Appleton Laboratory
and the San Diego Supercomputing Center.
| [
{
"version": "v1",
"created": "Mon, 20 Dec 2004 11:50:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Earl",
"A.",
""
],
[
"Clark",
"P.",
""
]
] |
cs/0412093 | Alasdair Earl | A. Earl, P. Clark, S. Thorn | ScotGrid: A Prototype Tier 2 Centre | 4 pages, 4 diagrams. Presented at Computing for High Energy and
Nuclear Physics 2004 (CHEP '04). Interlaken, Switzerland, September 2004 | null | null | null | cs.AR cs.DC | null | ScotGrid is a prototype regional computing centre formed as a collaboration
between the universities of Durham, Edinburgh and Glasgow as part of the UK's
national particle physics grid, GridPP. We outline the resources available at
the three core sites and our optimisation efforts for our user communities. We
discuss the work which has been conducted in extending the centre to embrace
new projects both from particle physics and new user communities and explain
our methodology for doing this.
| [
{
"version": "v1",
"created": "Mon, 20 Dec 2004 11:55:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Earl",
"A.",
""
],
[
"Clark",
"P.",
""
],
[
"Thorn",
"S.",
""
]
] |
cs/0412094 | Christoph Durr | Philippe Baptiste, Marek Chrobak, Christoph Durr, Francis Sourd | Preemptive Multi-Machine Scheduling of Equal-Length Jobs to Minimize the
Average Flow Time | null | null | null | This paper is now part of the report cs.DS/0605078. | cs.DS | null | We study the problem of preemptive scheduling of n equal-length jobs with
given release times on m identical parallel machines. The objective is to
minimize the average flow time. Recently, Brucker and Kravchenko proved that
the optimal schedule can be computed in polynomial time by solving a linear
program with O(n^3) variables and constraints, followed by some substantial
post-processing (where n is the number of jobs.) In this note we describe a
simple linear program with only O(mn) variables and constraints. Our linear
program produces directly the optimal schedule and does not require any
post-processing.
| [
{
"version": "v1",
"created": "Mon, 20 Dec 2004 16:15:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baptiste",
"Philippe",
""
],
[
"Chrobak",
"Marek",
""
],
[
"Durr",
"Christoph",
""
],
[
"Sourd",
"Francis",
""
]
] |
cs/0412095 | Mirela Damian | Mirela Damian and Joseph O'Rourke | Partitioning Regular Polygons into Circular Pieces II:Nonconvex
Partitions | 13 pages, 11 figures | null | null | null | cs.CG cs.DM | null | We explore optimal circular nonconvex partitions of regular k-gons. The
circularity of a polygon is measured by its aspect ratio: the ratio of the
radii of the smallest circumscribing circle to the largest inscribed disk. An
optimal circular partition minimizes the maximum ratio over all pieces in the
partition. We show that the equilateral triangle has an optimal 4-piece
nonconvex partition, the square an optimal 13-piece nonconvex partition, and
the pentagon has an optimal nonconvex partition with more than 20 thousand
pieces. For hexagons and beyond, we provide a general algorithm that approaches
optimality, but does not achieve it.
| [
{
"version": "v1",
"created": "Tue, 21 Dec 2004 05:41:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0412100 | Stephan Tobies | Peter H. Deussen and Stephan Tobies | Formal Test Purposes and The Validity of Test Cases | This paper appeared in the proceedings of the 22nd IFIP WG 6.1
International Conference on Formal Techniques for Networked and Distributed
Systems (FORTE 2002), number 2529 Lecture Notes in Computer Science | null | null | null | cs.DS | null | We give a formalization of the notion of test purpose based on (suitably
restricted) Message Sequence Charts. We define the validity of test cases with
respect to such a formal test purpose and provide a simple decision procedure
for validity.
| [
{
"version": "v1",
"created": "Wed, 22 Dec 2004 08:53:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Deussen",
"Peter H.",
""
],
[
"Tobies",
"Stephan",
""
]
] |
cs/0412101 | Stephan Tobies | Franz Baader and Stephan Tobies | The Inverse Method Implements the Automata Approach for Modal
Satisfiability | A short version of this report has appeared at the First
International Joint Conference on Automated Reasoning, IJCAR 2001 | null | null | null | cs.LO | null | Tableaux-based decision procedures for satisfiability of modal and
description logics behave quite well in practice, but it is sometimes hard to
obtain exact worst-case complexity results using these approaches, especially
for EXPTIME-complete logics. In contrast, automata-based approaches often yield
algorithms for which optimal worst-case complexity can easily be proved.
However, the algorithms obtained this way are usually not only worst-case, but
also best-case exponential: they first construct an automaton that is always
exponential in the size of the input, and then apply the (polynomial) emptiness
test to this large automaton. To overcome this problem, one must try to
construct the automaton "on-the-fly" while performing the emptiness test.
In this paper we will show that Voronkov's inverse method for the modal logic
K can be seen as an on-the-fly realization of the emptiness test done by the
automata approach for K. The benefits of this result are two-fold. First, it
shows that Voronkov's implementation of the inverse method, which behaves quite
well in practice, is an optimized on-the-fly implementation of the
automata-based satisfiability procedure for K. Second, it can be used to give a
simpler proof of the fact that Voronkov's optimizations do not destroy
completeness of the procedure. We will also show that the inverse method can
easily be extended to handle global axioms, and that the correspondence to the
automata approach still holds in this setting. In particular, the inverse
method yields an EXPTIME-algorithm for satisfiability in K w.r.t. global
axioms.
| [
{
"version": "v1",
"created": "Wed, 22 Dec 2004 14:17:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baader",
"Franz",
""
],
[
"Tobies",
"Stephan",
""
]
] |
cs/0412104 | Tomas Klos | Koye Somefun (1), Tomas Klos (1), Han La Poutr\'e (1 and 2) ((1)
Center for Mathematics and Computer Science (CWI), Amsterdam, The
Netherlands, (2) Eindhoven University of Technology, Eindhoven, The
Netherlands) | Negotiating over Bundles and Prices Using Aggregate Knowledge | 15 pages, 7 eps figures, Springer llncs documentclass. Extended
version of the paper published in "E-Commerce and Web Technologies," Kurt
Bauknecht, Martin Bichler and Birgit Pr\"{o}ll (eds.). Springer Lecture Notes
in Computer Science, Volume 3182, Berlin: Springer, p. 218--227 | null | null | SEN-E0405 | cs.MA cs.GT | null | Combining two or more items and selling them as one good, a practice called
bundling, can be a very effective strategy for reducing the costs of producing,
marketing, and selling goods. In this paper, we consider a form of multi-issue
negotiation where a shop negotiates both the contents and the price of bundles
of goods with his customers. We present some key insights about, as well as a
technique for, locating mutually beneficial alternatives to the bundle
currently under negotiation. The essence of our approach lies in combining
historical sales data, condensed into aggregate knowledge, with current data
about the ongoing negotiation process, to exploit these insights. In
particular, when negotiating a given bundle of goods with a customer, the shop
analyzes the sequence of the customer's offers to determine the progress in the
negotiation process. In addition, it uses aggregate knowledge concerning
customers' valuations of goods in general. We show how the shop can use these
two sources of data to locate promising alternatives to the current bundle.
When the current negotiation's progress slows down, the shop may suggest the
most promising of those alternatives and, depending on the customer's response,
continue negotiating about the alternative bundle, or propose another
alternative. Extensive computer simulation experiments show that our approach
increases the speed with which deals are reached, as well as the number and
quality of the deals reached, as compared to a benchmark. In addition, we show
that the performance of our system is robust to a variety of changes in the
negotiation strategies employed by the customers.
| [
{
"version": "v1",
"created": "Thu, 23 Dec 2004 11:31:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Somefun",
"Koye",
"",
"1 and 2"
],
[
"Klos",
"Tomas",
"",
"1 and 2"
],
[
"La Poutré",
"Han",
"",
"1 and 2"
]
] |
cs/0412105 | Stefania Costantini | Stefania Costantini | On the existence of stable models of non-stratified logic programs | null | null | null | null | cs.AI cs.LO | null | This paper introduces a fundamental result, which is relevant for Answer Set
programming, and planning. For the first time since the definition of the
stable model semantics, the class of logic programs for which a stable model
exists is given a syntactic characterization. This condition may have a
practical importance both for defining new algorithms for checking consistency
and computing answer sets, and for improving the existing systems. The approach
of this paper is to introduce a new canonical form (to which any logic program
can be reduced to), to focus the attention on cyclic dependencies. The
technical result is then given in terms of programs in canonical form
(canonical programs), without loss of generality. The result is based on
identifying the cycles contained in the program, showing that stable models of
the overall program are composed of stable models of suitable sub-programs,
corresponding to the cycles, and on defining the Cycle Graph. Each vertex of
this graph corresponds to one cycle, and each edge corresponds to onehandle,
which is a literal containing an atom that, occurring in both cycles, actually
determines a connection between them. In fact, the truth value of the handle in
the cycle where it appears as the head of a rule, influences the truth value of
the atoms of the cycle(s) where it occurs in the body. We can therefore
introduce the concept of a handle path, connecting different cycles. If for
every odd cycle we can find a handle path with certain properties, then the
existence of stable model is guaranteed.
| [
{
"version": "v1",
"created": "Thu, 23 Dec 2004 12:02:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Costantini",
"Stefania",
""
]
] |
cs/0412106 | Tomas Klos | Koye Somefun (1), Tomas Klos (1), Han La Poutr\'e (1 and 2) ((1)
Center for Mathematics and Computer Science (CWI), Amsterdam, The
Netherlands, (2) Eindhoven University of Technology, Eindhoven, The
Netherlands) | Online Learning of Aggregate Knowledge about Non-linear Preferences
Applied to Negotiating Prices and Bundles | 10 pages, 5 eps figures, ACM Proceedings documentclass, Published in
"Proc. 6th Int'l Conf. on Electronic Commerce ICEC04, Delft, The
Netherlands," M. Janssen, H. Sol, R. Wagenaar (eds.). ACM Press | null | null | SEN-E0415 | cs.MA cs.GT cs.LG | null | In this paper, we consider a form of multi-issue negotiation where a shop
negotiates both the contents and the price of bundles of goods with his
customers. We present some key insights about, as well as a procedure for,
locating mutually beneficial alternatives to the bundle currently under
negotiation. The essence of our approach lies in combining aggregate
(anonymous) knowledge of customer preferences with current data about the
ongoing negotiation process. The developed procedure either works with already
obtained aggregate knowledge or, in the absence of such knowledge, learns the
relevant information online. We conduct computer experiments with simulated
customers that have_nonlinear_ preferences. We show how, for various types of
customers, with distinct negotiation heuristics, our procedure (with and
without the necessary aggregate knowledge) increases the speed with which deals
are reached, as well as the number and the Pareto efficiency of the deals
reached compared to a benchmark.
| [
{
"version": "v1",
"created": "Thu, 23 Dec 2004 15:21:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Somefun",
"Koye",
"",
"1 and 2"
],
[
"Klos",
"Tomas",
"",
"1 and 2"
],
[
"La Poutré",
"Han",
"",
"1 and 2"
]
] |
cs/0412107 | Carlos Cabrillo | L. A. Garcia-Cortes and C. Cabrillo | A Monte Carlo algorithm for efficient large matrix inversion | 13 pages, no figure. Title corrected | null | null | null | cs.DS cs.NA hep-lat | null | This paper introduces a new Monte Carlo algorithm to invert large matrices.
It is based on simultaneous coupled draws from two random vectors whose
covariance is the required inverse. It can be considered a generalization of a
previously reported algorithm for hermitian matrices inversion based in only
one draw. The use of two draws allows the inversion on non-hermitian matrices.
Both the conditions for convergence and the rate of convergence are similar to
the Gauss-Seidel algorithm. Results on two examples are presented, a real
non-symmetric matrix related to quantitative genetics and a complex
non-hermitian matrix relevant for physicists. Compared with other Monte Carlo
algorithms it reveals a large reduction of the processing time showing eight
times faster processing in the examples studied.
| [
{
"version": "v1",
"created": "Thu, 23 Dec 2004 17:01:14 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Jan 2005 16:41:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Garcia-Cortes",
"L. A.",
""
],
[
"Cabrillo",
"C.",
""
]
] |
cs/0412109 | Leonid Litinskii | L.B.Litinskii, B.M.Magomedov | Global minimization of a quadratic functional: neural network approach | 4 pages, Lecture on 7th International Conference on Pattern
Recognition and Image Analysis PRIA-07-2004, St. Petersburg, Russia | null | null | IONT-04-16 | cs.NE cs.DM | null | The problem of finding out the global minimum of a multiextremal functional
is discussed. One frequently faces with such a functional in various
applications. We propose a procedure, which depends on the dimensionality of
the problem polynomially. In our approach we use the eigenvalues and
eigenvectors of the connection matrix.
| [
{
"version": "v1",
"created": "Fri, 24 Dec 2004 13:41:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Litinskii",
"L. B.",
""
],
[
"Magomedov",
"B. M.",
""
]
] |
cs/0412110 | Leonid Litinskii | D.I.Alieva, B.V.Kryzhanovsky, V.M.Kryzhanovsky, A.B.Fonarev | Q-valued neural network as a system of fast identification and pattern
recognition | 4 pages, Presentation on the 7th International Conference on Pattern
Recognition and Image Analysis PRIA-07-2004, St. Petersburg, Russia | null | null | IONT-04-17 | cs.NE cs.CV | null | An effective neural network algorithm of the perceptron type is proposed. The
algorithm allows us to identify strongly distorted input vector reliably. It is
shown that its reliability and processing speed are orders of magnitude higher
than that of full connected neural networks. The processing speed of our
algorithm exceeds the one of the stack fast-access retrieval algorithm that is
modified for working when there are noises in the input channel.
| [
{
"version": "v1",
"created": "Fri, 24 Dec 2004 13:48:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alieva",
"D. I.",
""
],
[
"Kryzhanovsky",
"B. V.",
""
],
[
"Kryzhanovsky",
"V. M.",
""
],
[
"Fonarev",
"A. B.",
""
]
] |
cs/0412114 | Pierre Andrews | Martin Rajman and Martin Vesely and Pierre Andrews | State of the Art, Evaluation and Recommendations regarding "Document
Processing and Visualization Techniques" | 54 pages, Report of Working Group 1 for the European Network of
Excellence (NoE) in Text Mining and its Applications in Statistics (NEMIS) | null | null | null | cs.CL | null | Several Networks of Excellence have been set up in the framework of the
European FP5 research program. Among these Networks of Excellence, the NEMIS
project focuses on the field of Text Mining.
Within this field, document processing and visualization was identified as
one of the key topics and the WG1 working group was created in the NEMIS
project, to carry out a detailed survey of techniques associated with the text
mining process and to identify the relevant research topics in related research
areas.
In this document we present the results of this comprehensive survey. The
report includes a description of the current state-of-the-art and practice, a
roadmap for follow-up research in the identified areas, and recommendations for
anticipated technological development in the domain of text mining.
| [
{
"version": "v1",
"created": "Wed, 29 Dec 2004 15:19:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rajman",
"Martin",
""
],
[
"Vesely",
"Martin",
""
],
[
"Andrews",
"Pierre",
""
]
] |
cs/0412115 | Bernadette Charron-Bost | Bernadette Charron-Bost | Reductions in Distributed Computing Part I: Consensus and Atomic
Commitment Tasks | 27 pages, 3 figures | null | null | null | cs.DC | null | We introduce several notions of reduction in distributed computing, and
investigate reduction properties of two fundamental agreement tasks, namely
Consensus and Atomic Commitment.
We first propose the notion of reduction "a la Karp'', an analog for
distributed computing of the classical Karp reduction. We then define a weaker
reduction which is the analog of Cook reduction. These two reductions are
called K-reduction and C-reduction, respectively.
We also introduce the notion of C*-reduction which has no counterpart in
classical (namely, non distributed) systems, and which naturally arises when
dealing with symmetric tasks.
We establish various reducibility and irreducibility theorems with respect to
these three reductions. Our main result is an incomparability statement for
Consensus and Atomic Commitment tasks: we show that they are incomparable with
respect to the C-reduction, except when the resiliency degree is 1, in which
case Atomic Commitment is strictly harder than Consensus. A side consequence of
these results is that our notion of C-reduction is strictly weaker than the one
of K-reduction, even for unsolvable tasks.
| [
{
"version": "v1",
"created": "Wed, 29 Dec 2004 19:50:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Charron-Bost",
"Bernadette",
""
]
] |
cs/0412116 | Bernadette Charron-Bost | Bernadette Charron-Bost | Reductions in Distributed Computing Part II: k-Threshold Agreement Tasks | 27 pages, 4 figures | null | null | null | cs.DC | null | We extend the results of Part I by considering a new class of agreement
tasks, the so-called k-Threshold Agreement tasks (previously introduced by
Charron-Bost and Le Fessant). These tasks naturally interpolate between Atomic
Commitment and Consensus. Moreover, they constitute a valuable tool to derive
irreducibility results between Consensus tasks only. In particular, they allow
us to show that (A) for a fixed set of processes, the higher the resiliency
degree is, the harder the Consensus task is, and (B) for a fixed resiliency
degree, the smaller the set of processes is, the harder the Consensus task is.
The proofs of these results lead us to consider new oracle-based reductions,
involving a weaker variant of the C-reduction introduced in Part I. We also
discuss the relationship between our results and previous ones relating
f-resiliency and wait-freedom.
| [
{
"version": "v1",
"created": "Wed, 29 Dec 2004 20:51:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Charron-Bost",
"Bernadette",
""
]
] |
cs/0412117 | Pierre Andrews | Pierre Andrews and Martin Rajman | Thematic Annotation: extracting concepts out of documents | Technical report EPFL/LIA. 81 pages, 16 figures | null | null | IC/2004/68 | cs.CL | null | Contrarily to standard approaches to topic annotation, the technique used in
this work does not centrally rely on some sort of -- possibly statistical --
keyword extraction. In fact, the proposed annotation algorithm uses a large
scale semantic database -- the EDR Electronic Dictionary -- that provides a
concept hierarchy based on hyponym and hypernym relations. This concept
hierarchy is used to generate a synthetic representation of the document by
aggregating the words present in topically homogeneous document segments into a
set of concepts best preserving the document's content.
This new extraction technique uses an unexplored approach to topic selection.
Instead of using semantic similarity measures based on a semantic resource, the
later is processed to extract the part of the conceptual hierarchy relevant to
the document content. Then this conceptual hierarchy is searched to extract the
most relevant set of concepts to represent the topics discussed in the
document. Notice that this algorithm is able to extract generic concepts that
are not directly present in the document.
| [
{
"version": "v1",
"created": "Thu, 30 Dec 2004 02:01:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andrews",
"Pierre",
""
],
[
"Rajman",
"Martin",
""
]
] |
cs/0412119 | Shmuel Varner | Shmuel Vagner | CDTP Chain Distributed Transfer Protocol | PDF. 47 pages | null | null | 1937340 | cs.NI cs.AR | null | The rapid growth of the internet in general and of bandwidth capacity at
internet clients in particular poses increasing computation and bandwidth
demands on internet servers. Internet access technologies like ADSL [DSL],
Cable Modem and Wireless modem allow internet clients to access the internet
with orders of magnitude more bandwidth than using traditional modems. We
present CDTP a distributed transfer protocol that allows clients to cooperate
and therefore remove the strain from the internet server thus achieving much
better performance than traditional transfer protocols (e.g. FTP [FTP]). The
CDTP server and client tools are presented also as well as results of
experiments. Finally a bandwidth measurement technique is presented. CDTP tools
use this technique to differentiate between slow and fast clients.
| [
{
"version": "v1",
"created": "Thu, 30 Dec 2004 19:43:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vagner",
"Shmuel",
""
]
] |
cs/0412120 | Gianluca Argentini | Gianluca Argentini | An estimate of accuracy for interpolant numerical solutions of a PDE
problem | 13 pages, 1 figure | APPLIED AND INDUSTRIAL MATHEMATICS IN ITALY, Series on Advances in
Mathematics for Applied Sciences - Vol. 69, World Scientific Company, 2005,
56 - 64. | null | null | cs.NA math-ph math.MP | null | In this paper we present an estimate of accuracy for a piecewise polynomial
approximation of a classical numerical solution to a non linear differential
problem. We suppose the numerical solution U is computed using a grid with a
small linear step and interval time Tu, while the polynomial approximation V is
an interpolation of the values of a numerical solution on a less fine grid and
interval time Tv << Tu. The estimate shows that the interpolant solution V can
be, under suitable hypotheses, a good approximation and in general its
computational cost is much lower of the cost of the fine numerical solution. We
present two possible applications to linear case and periodic case.
| [
{
"version": "v1",
"created": "Fri, 31 Dec 2004 18:16:00 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Jan 2005 23:23:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0412121 | Michael Treaster | Michael Treaster, Nadir Kiyanclar, Gregory A. Koenig, William Yurcik | A Distributed Economics-based Infrastructure for Utility Computing | 8 pages, 1 figure | null | null | null | cs.DC | null | Existing attempts at utility computing revolve around two approaches. The
first consists of proprietary solutions involving renting time on dedicated
utility computing machines. The second requires the use of heavy, monolithic
applications that are difficult to deploy, maintain, and use.
We propose a distributed, community-oriented approach to utility computing.
Our approach provides an infrastructure built on Web Services in which modular
components are combined to create a seemingly simple, yet powerful system. The
community-oriented nature generates an economic environment which results in
fair transactions between consumers and providers of computing cycles while
simultaneously encouraging improvements in the infrastructure of the
computational grid itself.
| [
{
"version": "v1",
"created": "Fri, 31 Dec 2004 19:16:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Treaster",
"Michael",
""
],
[
"Kiyanclar",
"Nadir",
""
],
[
"Koenig",
"Gregory A.",
""
],
[
"Yurcik",
"William",
""
]
] |
cs/0501001 | Michael Treaster | Michael Treaster | A Survey of Distributed Intrusion Detection Approaches | null | null | null | null | cs.CR | null | Distributed intrustion detection systems detect attacks on computer systems
by analyzing data aggregated from distributed sources. The distributed nature
of the data sources allows patterns in the data to be seen that might not be
detectable if each of the sources were examined individually. This paper
describes the various approaches that have been developed to share and analyze
data in such systems, and discusses some issues that must be addressed before
fully decentralized distributed intrusion detection systems can be made viable.
| [
{
"version": "v1",
"created": "Sat, 1 Jan 2005 03:14:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Treaster",
"Michael",
""
]
] |
cs/0501002 | Michael Treaster | Michael Treaster | A Survey of Fault-Tolerance and Fault-Recovery Techniques in Parallel
Systems | 11 pages | null | null | null | cs.DC | null | Supercomputing systems today often come in the form of large numbers of
commodity systems linked together into a computing cluster. These systems, like
any distributed system, can have large numbers of independent hardware
components cooperating or collaborating on a computation. Unfortunately, any of
this vast number of components can fail at any time, resulting in potentially
erroneous output. In order to improve the robustness of supercomputing
applications in the presence of failures, many techniques have been developed
to provide resilience to these kinds of system faults. This survey provides an
overview of these various fault-tolerance techniques.
| [
{
"version": "v1",
"created": "Sat, 1 Jan 2005 03:32:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Treaster",
"Michael",
""
]
] |
cs/0501003 | Pavel Burovsky | P.A. Burovsky | Implementation of Motzkin-Burger algorithm in Maple | 9 pages, 4 additional text files | null | null | null | cs.CG cs.CC cs.SC | null | Subject of this paper is an implementation of a well-known Motzkin-Burger
algorithm, which solves the problem of finding the full set of solutions of a
system of linear homogeneous inequalities. There exist a number of
implementations of this algorithm, but there was no one in Maple, to the best
of the author's knowledge.
| [
{
"version": "v1",
"created": "Sat, 1 Jan 2005 04:55:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burovsky",
"P. A.",
""
]
] |
cs/0501006 | A. Prasad Sistla | A. Prasad Sistla | Formal Languages and Algorithms for Similarity based Retrieval from
Sequence Databases | null | null | null | null | cs.LO cs.DB | null | The paper considers various formalisms based on Automata, Temporal Logic and
Regular Expressions for specifying queries over sequences. Unlike traditional
binary semantics, the paper presents a similarity based semantics for thse
formalisms. More specifically, a distance measure in the range [0,1] is
associated with a sequence, query pair denoting how closely the sequence
satisfies the query. These measures are defined using a spectrum of normed
vector distance measures. Various distance measures based on the syntax and the
traditional semantics of the query are presented. Efficient algorithms for
computing these distance measure are presented. These algorithms can be
employed for retrieval of sequence from a database that closely satisfy a
given.
| [
{
"version": "v1",
"created": "Tue, 4 Jan 2005 01:05:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sistla",
"A. Prasad",
""
]
] |
cs/0501007 | Sariel Har-Peled | Sariel Har-Peled and Alper Ungor | A Time-Optimal Delaunay Refinement Algorithm in Two Dimensions | null | null | null | null | cs.CG | null | We propose a new refinement algorithm to generate size-optimal
quality-guaranteed Delaunay triangulations in the plane. The algorithm takes
$O(n \log n + m)$ time, where $n$ is the input size and $m$ is the output size.
This is the first time-optimal Delaunay refinement algorithm.
| [
{
"version": "v1",
"created": "Tue, 4 Jan 2005 22:30:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Har-Peled",
"Sariel",
""
],
[
"Ungor",
"Alper",
""
]
] |
cs/0501009 | Mircea Alexandru Popescu Moscu | Mircea Alexandru Popescu Moscu | On The Liniar Time Complexity of Finite Languages | null | null | null | null | cs.CC | null | The present paper presents and proves a proposition concerning the time
complexity of finite languages. It is shown herein, that for any finite
language (a language for which the set of words composing it is finite) there
is a Turing machine that computes the language in such a way that for any input
of length k the machine stops in, at most, k + 1 steps.
| [
{
"version": "v1",
"created": "Wed, 5 Jan 2005 19:13:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Moscu",
"Mircea Alexandru Popescu",
""
]
] |
cs/0501010 | Manoj Kumar | Manoj Kumar | A Cryptographic Study of Some Digital Signature Schemes | This is a Ph.D. thesis,under the supervision of Prof Sunder Lal, Dr.
B.R. Ambedkar University, I.B.S. Khandri,AGRA- INDIA | null | null | null | cs.CR | null | In this thesis, we propose some directed signature schemes. In addition, we
have discussed their applications in different situations. In this thesis, we
would like to discuss the security aspects during the design process of the
proposed directed digital signature schemes. The security of the most digital
signature schemes widely use in practice is based on the two difficult
problems, viz; the problem of factoring integers (The RSA scheme) and the
problem of finding discrete logarithms over finite fields (The ElGamal scheme).
The proposed works in this thesis is divided into seven chapters.
| [
{
"version": "v1",
"created": "Thu, 6 Jan 2005 10:21:20 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Jan 2005 05:33:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
] |
cs/0501012 | Carl Lagoze | Carl Lagoze, Sandy Payette, Edwin Shin, Chris Wilper | Fedora: An Architecture for Complex Objects and their Relationships | 25 pages, 8 figures Draft of submission to Journal of Digital
Libraries Special Issue on Complex Objects | null | null | null | cs.DL cs.MM | null | The Fedora architecture is an extensible framework for the storage,
management, and dissemination of complex objects and the relationships among
them. Fedora accommodates the aggregation of local and distributed content into
digital objects and the association of services with objects. This al-lows an
object to have several accessible representations, some of them dy-namically
produced. The architecture includes a generic RDF-based relation-ship model
that represents relationships among objects and their components. Queries
against these relationships are supported by an RDF triple store. The
architecture is implemented as a web service, with all aspects of the complex
object architecture and related management functions exposed through REST and
SOAP interfaces. The implementation is available as open-source soft-ware,
providing the foundation for a variety of end-user applications for digital
libraries, archives, institutional repositories, and learning object systems.
| [
{
"version": "v1",
"created": "Fri, 7 Jan 2005 17:57:05 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jan 2005 13:16:45 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Feb 2005 20:13:37 GMT"
},
{
"version": "v4",
"created": "Mon, 7 Mar 2005 15:14:47 GMT"
},
{
"version": "v5",
"created": "Fri, 29 Jul 2005 13:04:31 GMT"
},
{
"version": "v6",
"created": "Tue, 23 Aug 2005 13:26:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Payette",
"Sandy",
""
],
[
"Shin",
"Edwin",
""
],
[
"Wilper",
"Chris",
""
]
] |
cs/0501013 | Shujun Li Dr. | Chengqing Li, Shujun Li, Der-Chyuan Lou and Dan Zhang | On the security of the Yen-Guo's domino signal encryption algorithm
(DSEA) | 11 pages, 5 figures | Journal of Systems and Software, vol. 79, no. 2, pp. 253-258, 2006 | 10.1016/j.jss.2005.04.021 | null | cs.CR cs.MM nlin.CD | null | Recently, a new domino signal encryption algorithm (DSEA) was proposed for
digital signal transmission, especially for digital images and videos. This
paper analyzes the security of DSEA, and points out the following weaknesses:
1) its security against the brute-force attack was overestimated; 2) it is not
sufficiently secure against ciphertext-only attacks, and only one ciphertext is
enough to get some information about the plaintext and to break the value of a
sub-key; 3) it is insecure against known/chosen-plaintext attacks, in the sense
that the secret key can be recovered from a number of continuous bytes of only
one known/chosen plaintext and the corresponding ciphertext. Experimental
results are given to show the performance of the proposed attacks, and some
countermeasures are discussed to improve DSEA.
| [
{
"version": "v1",
"created": "Sat, 8 Jan 2005 15:35:13 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Aug 2006 17:27:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Chengqing",
""
],
[
"Li",
"Shujun",
""
],
[
"Lou",
"Der-Chyuan",
""
],
[
"Zhang",
"Dan",
""
]
] |
cs/0501014 | Shujun Li Dr. | Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung
Lo | On the Design of Perceptual MPEG-Video Encryption Algorithms | 10 pages, 5 figures, IEEEtran.cls | IEEE Transactions on Circuits and Systems for Video Technology,
vol. 17, no. 2, pp. 214-223, 2007 | 10.1109/TCSVT.2006.888840 | null | cs.MM cs.CR | null | In this paper, some existing perceptual encryption algorithms of MPEG videos
are reviewed and some problems, especially security defects of two recently
proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a
simpler and more effective design is suggested, which selectively encrypts
fixed-length codewords (FLC) in MPEG-video bitstreams under the control of
three perceptibility factors. The proposed design is actually an encryption
configuration that can work with any stream cipher or block cipher. Compared
with the previously-proposed schemes, the new design provides more useful
features, such as strict size-preservation, on-the-fly encryption and multiple
perceptibility, which make it possible to support more applications with
different requirements. In addition, four different measures are suggested to
provide better security against known/chosen-plaintext attacks.
| [
{
"version": "v1",
"created": "Sat, 8 Jan 2005 15:55:30 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Aug 2006 11:30:21 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Mar 2007 17:12:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Shujun",
""
],
[
"Chen",
"Guanrong",
""
],
[
"Cheung",
"Albert",
""
],
[
"Bhargava",
"Bharat",
""
],
[
"Lo",
"Kwok-Tung",
""
]
] |
cs/0501018 | Peter Turney | Peter D. Turney, Michael L. Littman, Jeffrey Bigham, Victor Shnayder | Combining Independent Modules in Lexical Multiple-Choice Problems | 10 pages, related work available at
http://www.cs.rutgers.edu/~mlittman/ and http://purl.org/peter.turney/ | Recent Advances in Natural Language Processing III: Selected
Papers from RANLP 2003, Eds: N. Nicolov, K. Botcheva, G. Angelova, and R.
Mitkov, (2004), Current Issues in Linguistic Theory (CILT), 260, John
Benjamins, 101-110 | null | NRC-47434 | cs.LG cs.CL cs.IR | null | Existing statistical approaches to natural language problems are very coarse
approximations to the true complexity of language processing. As such, no
single technique will be best for all problem instances. Many researchers are
examining ensemble methods that combine the output of multiple modules to
create more accurate solutions. This paper examines three merging rules for
combining probability distributions: the familiar mixture rule, the logarithmic
rule, and a novel product rule. These rules were applied with state-of-the-art
results to two problems used to assess human mastery of lexical semantics --
synonym questions and analogy questions. All three merging rules result in
ensembles that are more accurate than any of their component modules. The
differences among the three rules are not statistically significant, but it is
suggestive that the popular mixture rule is not the best rule for either of the
two problems.
| [
{
"version": "v1",
"created": "Mon, 10 Jan 2005 21:03:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
""
],
[
"Littman",
"Michael L.",
""
],
[
"Bigham",
"Jeffrey",
""
],
[
"Shnayder",
"Victor",
""
]
] |
cs/0501019 | Grigorii Pivovarov | G. B. Pivovarov and S. E. Trunov | Clustering SPIRES with EqRank | 3 pp | null | null | null | cs.DL cs.IR | null | SPIRES is the largest database of scientific papers in the subject field of
high energy and nuclear physics. It contains information on the citation graph
of more than half a million of papers (vertexes of the citation graph). We
outline the EqRank algorithm designed to cluster vertexes of directed graphs,
and present the results of EqRank application to the SPIRES citation graph. The
hierarchical clustering of SPIRES yielded by EqRank is used to set up a web
service, which is also outlined.
| [
{
"version": "v1",
"created": "Tue, 11 Jan 2005 05:00:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pivovarov",
"G. B.",
""
],
[
"Trunov",
"S. E.",
""
]
] |
cs/0501020 | Gianluca Lax | Francesco Buccafurri, Gianluca Lax, Domenico Sacca', Luigi Pontieri
and Domenico Rosaci | Enhancing Histograms by Tree-Like Bucket Indices | 26 pages, 9 figures | null | null | null | cs.DS | null | Histograms are used to summarize the contents of relations into a number of
buckets for the estimation of query result sizes. Several techniques (e.g.,
MaxDiff and V-Optimal) have been proposed in the past for determining bucket
boundaries which provide accurate estimations. However, while search strategies
for optimal bucket boundaries are rather sophisticated, no much attention has
been paid for estimating queries inside buckets and all of the above techniques
adopt naive methods for such an estimation. This paper focuses on the problem
of improving the estimation inside a bucket once its boundaries have been
fixed. The proposed technique is based on the addition, to each bucket, of
32-bit additional information (organized into a 4-level tree index), storing
approximate cumulative frequencies at 7 internal intervals of the bucket. Both
theoretical analysis and experimental results show that, among a number of
alternative ways to organize the additional information, the 4-level tree index
provides the best frequency estimation inside a bucket. The index is later
added to two well-known histograms, MaxDiff and V-Optimal, obtaining the
non-obvious result that despite the spatial cost of 4LT which reduces the
number of allowed buckets once the storage space has been fixed, the original
methods are strongly improved in terms of accuracy.
| [
{
"version": "v1",
"created": "Tue, 11 Jan 2005 10:15:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buccafurri",
"Francesco",
""
],
[
"Lax",
"Gianluca",
""
],
[
"Sacca'",
"Domenico",
""
],
[
"Pontieri",
"Luigi",
""
],
[
"Rosaci",
"Domenico",
""
]
] |
cs/0501022 | Lane A. Hemaspaandra | Lane A. Hemaspaandra, Harald Hempel, and Arfst Nickelsen | Algebraic Properties for Selector Functions | More recent version of most of this report appears in SICOMP, but the
appendix here is not included there | SICOMP, V. 33, Number 6, pp. 1309--1337, 2004 | null | URCS-TR-778 (January 7, 2004 revision) | cs.CC | null | The nondeterministic advice complexity of the P-selective sets is known to be
exactly linear. Regarding the deterministic advice complexity of the
P-selective sets--i.e., the amount of Karp--Lipton advice needed for
polynomial-time machines to recognize them in general--the best current upper
bound is quadratic [Ko, 1983] and the best current lower bound is linear
[Hemaspaandra and Torenvliet, 1996].
We prove that every associatively P-selective set is commutatively,
associatively P-selective. Using this, we establish an algebraic sufficient
condition for the P-selective sets to have a linear upper bound (which thus
would match the existing lower bound) on their deterministic advice complexity:
If all P-selective sets are associatively P-selective then the deterministic
advice complexity of the P-selective sets is linear. The weakest previously
known sufficient condition was P=NP.
We also establish related results for algebraic properties of, and advice
complexity of, the nondeterministically selective sets.
| [
{
"version": "v1",
"created": "Tue, 11 Jan 2005 23:55:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
],
[
"Nickelsen",
"Arfst",
""
]
] |
cs/0501025 | Eugenia Ternovska | Marc Denecker and Eugenia Ternovska | A Logic for Non-Monotone Inductive Definitions | 50 pages, TOCL submission | null | null | null | cs.AI cs.LO | null | Well-known principles of induction include monotone induction and different
sorts of non-monotone induction such as inflationary induction, induction over
well-founded sets and iterated induction. In this work, we define a logic
formalizing induction over well-founded sets and monotone and iterated
induction. Just as the principle of positive induction has been formalized in
FO(LFP), and the principle of inflationary induction has been formalized in
FO(IFP), this paper formalizes the principle of iterated induction in a new
logic for Non-Monotone Inductive Definitions (ID-logic). The semantics of the
logic is strongly influenced by the well-founded semantics of logic
programming. Our main result concerns the modularity properties of inductive
definitions in ID-logic. Specifically, we formulate conditions under which a
simultaneous definition $\D$ of several relations is logically equivalent to a
conjunction of smaller definitions $\D_1 \land ... \land \D_n$ with disjoint
sets of defined predicates. The difficulty of the result comes from the fact
that predicates $P_i$ and $P_j$ defined in $\D_i$ and $\D_j$, respectively, may
be mutually connected by simultaneous induction. Since logic programming and
abductive logic programming under well-founded semantics are proper fragments
of our logic, our modularity results are applicable there as well.
| [
{
"version": "v1",
"created": "Thu, 13 Jan 2005 02:53:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Denecker",
"Marc",
""
],
[
"Ternovska",
"Eugenia",
""
]
] |
cs/0501026 | Sourav Chakraborty | Sourav Chakraborty | On the Sensitivity of Cyclically-Invariant Boolean Functions | null | null | null | null | cs.CC | null | In this paper we construct a cyclically invariant Boolean function whose
sensitivity is $\Theta(n^{1/3})$. This result answers two previously published
questions. Tur\'an (1984) asked if any Boolean function, invariant under some
transitive group of permutations, has sensitivity $\Omega(\sqrt{n})$. Kenyon
and Kutin (2004) asked whether for a ``nice'' function the product of
0-sensitivity and 1-sensitivity is $\Omega(n)$. Our function answers both
questions in the negative.
We also prove that for minterm-transitive functions (a natural class of
Boolean functions including our example) the sensitivity is $\Omega(n^{1/3})$.
Hence for this class of functions sensitivity and block sensitivity are
polynomially related.
| [
{
"version": "v1",
"created": "Thu, 13 Jan 2005 22:06:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chakraborty",
"Sourav",
""
]
] |
cs/0501027 | Evan Greenberg | Evan P. Greenberg, David R. Cheriton | Enforcing Bulk Mail Classification | 6 pages, changed spin on paper, added new idea (explicit tagging as a
feature) | null | null | null | cs.NI | null | Spam costs US corporations upwards of $8.9 billion a year, and comprises as
much as 40% of all email received. Solutions exist to reduce the amount of spam
seen by end users, but cannot withstand sophisticated attacks. Worse yet, many
will occasionally misclassify and silently drop legitimate email. Spammers take
advantage of the near-zero cost of sending email to flood the network, knowing
that success even a tiny fraction of the time means a profit. End users,
however, have proven unwilling to pay money to send email to friends and
family.
We show that it is feasible to extend the existing mail system to reduce the
amount of unwanted email, without misclassifying email, and without charging
well-behaved users. We require that bulk email senders accurately classify each
email message they send as an advertisement with an area of interest or else be
charged a small negative incentive per message delivered. Recipients are able
to filter out email outside their scope of interest, while senders are able to
focus their sendings to the appropriate audience.
| [
{
"version": "v1",
"created": "Thu, 13 Jan 2005 23:37:10 GMT"
},
{
"version": "v2",
"created": "Thu, 19 May 2005 21:22:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Greenberg",
"Evan P.",
""
],
[
"Cheriton",
"David R.",
""
]
] |
cs/0501029 | Filippo Furfaro | Francesco Buccafurri, Filippo Furfaro, Domenico Sacca' | Estimating Range Queries using Aggregate Data with Integrity
Constraints: a Probabilistic Approach | 46 pages, 6 figures | null | null | null | cs.DB | null | The problem of recovering (count and sum) range queries over multidimensional
data only on the basis of aggregate information on such data is addressed. This
problem can be formalized as follows. Suppose that a transformation T producing
a summary from a multidimensional data set is used. Now, given a data set D, a
summary S=T(D) and a range query r on D, the problem consists of studying r by
modelling it as a random variable defined over the sample space of all the data
sets D' such that T(D) = S. The study of such a random variable, done by the
definition of its probability distribution and the computation of its mean
value and variance, represents a well-founded, theoretical probabilistic
approach for estimating the query only on the basis of the available
information (that is the summary S) without assumptions on original data.
| [
{
"version": "v1",
"created": "Fri, 14 Jan 2005 19:45:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buccafurri",
"Francesco",
""
],
[
"Furfaro",
"Filippo",
""
],
[
"Sacca'",
"Domenico",
""
]
] |
cs/0501030 | Sergey Tsarev P. | Sergey P. Tsarev | Generalized Laplace transformations and integration of hyperbolic
systems of linear partial differential equations | LaTeX, 17 pages, Submitted to ISSAC 2005, Beijing, China, July 24--27
2005 | null | null | null | cs.SC math.AP nlin.SI | null | We give a new procedure for generalized factorization and construction of the
complete solution of strictly hyperbolic linear partial differential equations
or strictly hyperbolic systems of such equations in the plane. This procedure
generalizes the classical theory of Laplace transformations of second-order
equations in the plane.
| [
{
"version": "v1",
"created": "Sat, 15 Jan 2005 15:57:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tsarev",
"Sergey P.",
""
]
] |
cs/0501032 | Riccardo Pucella | Riccardo Pucella | On Partially Additive Kleene Algebras | 23 pages; to be presented at the 8th International Conference on
Relational Methods in Computer Science (RelMiCS 8) | null | null | null | cs.LO | null | We define the notion of a partially additive Kleene algebra, which is a
Kleene algebra where the + operation need only be partially defined. These
structures formalize a number of examples that cannot be handled directly by
Kleene algebras. We relate partially additive Kleene algebras to existing
algebraic structures, by exhibiting categorical connections with Kleene
algebras, partially additive categories, and closed semirings.
| [
{
"version": "v1",
"created": "Sun, 16 Jan 2005 20:39:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
] |
cs/0501036 | Jos\'e Ghislain Quenum | Jose Ghislain Quenum Samir Aknine | Enabling Agents to Dynamically Select Protocols for Interactions | null | null | null | null | cs.MA cs.SE | null | in this paper we describe a method which allows agents to dynamically select
protocols and roles when they need to execute collaborative tasks
| [
{
"version": "v1",
"created": "Tue, 18 Jan 2005 17:08:05 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jan 2005 18:31:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aknine",
"Jose Ghislain Quenum Samir",
""
]
] |
cs/0501037 | Michele Tucci | Michele Tucci | Oligopolistic Competition in an Evolutionary Environment: a Computer
Simulation | PDF, 20 pages, 4 graphs and a post-scriptum | null | null | null | cs.CY | null | The following notes contain a computer simulation concerning effective
competition in an evolutionary environment. The scope is to underline the
existence of a side effect pertaining to the competitive processes: the
tendency toward an excess of supply by producers which operate in a strongly
competitive situation. A set of four oligopolistic firms will be employed in
the formal reconstruction. The simulation will operate following the Edmond
Malinvaud "short side" approach, as far as the price adjustment is concerned,
and the sequential Hicksian "weeks" structure with regard of the temporal
characterization. The content of the present paper ought to be considered as a
development of the writing: Michele Tucci, Evolution and Gravitation: a
Computer Simulation of a Non-Walrasian Equilibrium Model, published with the
E-print Archives at arXiv.com (section: Computer Science, registration number:
cs.CY/0209017). In such a paper there can be found some preliminary
considerations regarding the comparison between the evolutionary and the
gravitational paradigms and the evaluation of approaches belonging to rival
schools of economic thought.
| [
{
"version": "v1",
"created": "Tue, 18 Jan 2005 18:52:49 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Jan 2005 21:59:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tucci",
"Michele",
""
]
] |
cs/0501038 | D. J. Capelis | D.J. Capelis | Data Tastes Better Seasoned: Introducing the ASH Family of Hashing
Algorithms | 5 pages | null | null | null | cs.CR | null | Over the recent months it has become clear that the current generation of
cryptographic hashing algorithms are insufficient to meet future needs. The ASH
family of algorithms provides modifications to the existing SHA-2 family. These
modifications are designed with two main goals: 1) Providing increased
collision resistance. 2) Increasing mitigation of security risks
post-collision. The unique public/private sections and salt/pepper design
elements provide increased flexibility for a broad range of applications. The
ASH family is a new generation of cryptographic hashing algorithms.
| [
{
"version": "v1",
"created": "Wed, 19 Jan 2005 10:28:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Capelis",
"D. J.",
""
]
] |
cs/0501041 | Alexander Kondratiev | A. S. Kondratiev (1 and 2) and N. P. Polishchuk (2) ((1) Moscow Power
Engineering Institute, (2) Altair Naval Research Institute of Radio
Electronics) | Two Iterative Algorithms for Solving Systems of Simultaneous Linear
Algebraic Equations with Real Matrices of Coefficients | 5 pages; 0 figures; 4 references | null | null | null | cs.NA | null | The paper describes two iterative algorithms for solving general systems of M
simultaneous linear algebraic equations (SLAE) with real matrices of
coefficients. The system can be determined, underdetermined, and
overdetermined. Linearly dependent equations are also allowed. Both algorithms
use the method of Lagrange multipliers to transform the original SLAE into a
positively determined function F of real original variables X(i) (i=1,...,N)
and Lagrange multipliers Lambda(i) (i=1,...,M). Function F is differentiated
with respect to variables X(i) and the obtained relationships are used to
express F in terms of Lagrange multipliers Lambda(i). The obtained function is
minimized with respect to variables Lambda(i) with the help of one of two the
following minimization techniques: (1) relaxation method or (2) method of
conjugate gradients by Fletcher and Reeves. Numerical examples are given.
| [
{
"version": "v1",
"created": "Thu, 20 Jan 2005 13:20:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kondratiev",
"A. S.",
"",
"1 and 2"
],
[
"Polishchuk",
"N. P.",
""
]
] |
cs/0501042 | Martin Bernauer | Martin Bernauer | Maintaining Consistency of Data on the Web | null | null | null | null | cs.DB cs.DS | null | Increasingly more data is becoming available on the Web, estimates speaking
of 1 billion documents in 2002. Most of the documents are Web pages whose data
is considered to be in XML format, expecting it to eventually replace HTML.
A common problem in designing and maintaining a Web site is that data on a
Web page often replicates or derives from other data, the so-called base data,
that is usually not contained in the deriving or replicating page.
Consequently, replicas and derivations become inconsistent upon modifying base
data in a Web page or a relational database. For example, after assigning a
thesis to a student and modifying the Web page that describes it in detail, the
thesis is still incorrectly contained in the list of offered thesis, missing in
the list of ongoing thesis, and missing in the advisor's teaching record.
The thesis presents a solution by proposing a combined approach that provides
for maintaining consistency of data in Web pages that (i) replicate data in
relational databases, or (ii) replicate or derive from data in Web pages. Upon
modifying base data, the modification is immediately pushed to affected Web
pages. There, maintenance is performed incrementally by only modifying the
affected part of the page instead of re-generating the whole page from scratch.
| [
{
"version": "v1",
"created": "Thu, 20 Jan 2005 14:11:03 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jan 2005 16:00:49 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Feb 2005 19:59:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bernauer",
"Martin",
""
]
] |
cs/0501044 | Alexander Haubold | Alexander Haubold, John R. Kender | Augmented Segmentation and Visualization for Presentation Videos | null | null | null | null | cs.MM cs.IR | null | We investigate methods of segmenting, visualizing, and indexing presentation
videos by separately considering audio and visual data. The audio track is
segmented by speaker, and augmented with key phrases which are extracted using
an Automatic Speech Recognizer (ASR). The video track is segmented by visual
dissimilarities and augmented by representative key frames. An interactive user
interface combines a visual representation of audio, video, text, and key
frames, and allows the user to navigate a presentation video. We also explore
clustering and labeling of speaker data and present preliminary results.
| [
{
"version": "v1",
"created": "Thu, 20 Jan 2005 17:12:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
] |
cs/0501045 | Kenneth Clarkson | Kenneth L. Clarkson and Kasturi Varadarajan | Improved Approximation Algorithms for Geometric Set Cover | null | null | null | null | cs.CG cs.DS | null | Given a collection S of subsets of some set U, and M a subset of U, the set
cover problem is to find the smallest subcollection C of S such that M is a
subset of the union of the sets in C. While the general problem is NP-hard to
solve, even approximately, here we consider some geometric special cases, where
usually U = R^d. Extending prior results, we show that approximation algorithms
with provable performance exist, under a certain general condition: that for a
random subset R of S and function f(), there is a decomposition of the portion
of U not covered by R into an expected f(|R|) regions, each region of a
particular simple form. We show that under this condition, a cover of size
O(f(|C|)) can be found. Our proof involves the generalization of shallow
cuttings to more general geometric situations. We obtain constant-factor
approximation algorithms for covering by unit cubes in R^3, for guarding a
one-dimensional terrain, and for covering by similar-sized fat triangles in
R^2. We also obtain improved approximation guarantees for fat triangles, of
arbitrary size, and for a class of fat objects.
| [
{
"version": "v1",
"created": "Thu, 20 Jan 2005 21:31:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Clarkson",
"Kenneth L.",
""
],
[
"Varadarajan",
"Kasturi",
""
]
] |
cs/0501053 | Vadim Tropashko | Vadim Tropashko | Relational Algebra as non-Distributive Lattice | 9 pages | null | null | null | cs.DB | null | We reduce the set of classic relational algebra operators to two binary
operations: natural join and generalized union. We further demonstrate that
this set of operators is relationally complete and honors lattice axioms.
| [
{
"version": "v1",
"created": "Fri, 21 Jan 2005 20:07:32 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Feb 2005 03:45:10 GMT"
},
{
"version": "v3",
"created": "Fri, 4 Feb 2005 01:12:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tropashko",
"Vadim",
""
]
] |
cs/0501059 | Farn Wang | Farn Wang | Under-approximation of the Greatest Fixpoint in Real-Time System
Verification | null | null | null | null | cs.SE cs.LO | null | Techniques for the efficient successive under-approximation of the greatest
fixpoint in TCTL formulas can be useful in fast refutation of inevitability
properties and vacuity checking. We first give an integrated algorithmic
framework for both under and over-approximate model-checking. We design the
{\em NZF (Non-Zeno Fairness) predicate}, with a greatest fixpoint formulation,
as a unified framework for the evaluation of formulas like
$\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$.
We then prove the correctness of a new formulation for the characterization of
the NZF predicate based on zone search and the least fixpoint evaluation. The
new formulation then leads to the design of an evaluation algorithm, with the
capability of successive under-approximation, for $\exists\pfrr\eta_1$,
$\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then present
techniques to efficiently search for the zones and to speed up the
under-approximate evaluation of those three formulas. Our experiments show that
the techniques have significantly enhanced the verification performance against
several benchmarks over exact model-checking.
| [
{
"version": "v1",
"created": "Sat, 22 Jan 2005 11:02:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Farn",
""
]
] |
cs/0501060 | Farn Wang | Farn Wang | Under-approximation of the Greatest Fixpoints in Real-Time System
Verification | null | null | null | null | cs.SE cs.LO | null | Techniques for the efficient successive under-approximation of the greatest
fixpoint in TCTL formulas can be useful in fast refutation of inevitability
properties and vacuity checking. We first give an integrated algorithmic
framework for both under and over-approximate model-checking. We design the
{\em NZF (Non-Zeno Fairness) predicate}, with a greatest fixpoint formulation,
as a unified framework for the evaluation of formulas like
$\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$.
We then prove the correctness of a new formulation for the characterization of
the NZF predicate based on zone search and the least fixpoint evaluation. The
new formulation then leads to the design of an evaluation algorithm, with the
capability of successive under-approximation, for $\exists\pfrr\eta_1$,
$\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then present
techniques to efficiently search for the zones and to speed up the
under-approximate evaluation of those three formulas. Our experiments show that
the techniques have significantly enhanced the verification performance against
several benchmarks over exact model-checking.
| [
{
"version": "v1",
"created": "Sat, 22 Jan 2005 11:03:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Farn",
""
]
] |
cs/0501065 | Vladimir Clue Mr | Vladimir I Clue | Harmonic Analysis | This new twist in harmonic analysis was primary introduced in
Milwaukee's conference http://www.eit-conference.info/papers.asp | null | null | null | cs.NA cs.DM | null | This paper describes a method of calculating the transforms, currently
obtained via Fourier and reverse Fourier transforms. The method allows
calculating efficiently the transforms of a signal having an arbitrary
dimension of the digital representation by reducing the transform to a
vector-to-circulant matrix multiplying. There is a connection between harmonic
equations in rectangular and polar coordinate systems. The connection
established here and used to create a very robust iterative algorithm for a
conformal mapping calculation. There is also suggested a new ratio (and an
efficient way of computing it) of two oscillative signals.
| [
{
"version": "v1",
"created": "Mon, 24 Jan 2005 00:01:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Clue",
"Vladimir I",
""
]
] |
cs/0501068 | Jean-Francois Mari | Olivier Aycard (GRAVIR - Imag, Orpailleur Loria), Jean-Francois Mari
(ORPAILLEUR Loria), Richard Washington | Learning to automatically detect features for mobile robots using
second-order Hidden Markov Models | 2004 | null | null | null | cs.AI | null | In this paper, we propose a new method based on Hidden Markov Models to
interpret temporal sequences of sensor data from mobile robots to automatically
detect features. Hidden Markov Models have been used for a long time in pattern
recognition, especially in speech recognition. Their main advantages over other
methods (such as neural networks) are their ability to model noisy temporal
signals of variable length. We show in this paper that this approach is well
suited for interpretation of temporal sequences of mobile-robot sensor data. We
present two distinct experiments and results: the first one in an indoor
environment where a mobile robot learns to detect features like open doors or
T-intersections, the second one in an outdoor environment where a different
mobile robot has to identify situations like climbing a hill or crossing a
rock.
| [
{
"version": "v1",
"created": "Mon, 24 Jan 2005 11:05:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aycard",
"Olivier",
"",
"GRAVIR - Imag, Orpailleur Loria"
],
[
"Mari",
"Jean-Francois",
"",
"ORPAILLEUR Loria"
],
[
"Washington",
"Richard",
""
]
] |
cs/0501069 | Supriya Krishnamurthy | Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell and Seif Haridi | A Statistical Theory of Chord under Churn | 6 pages, In the 4th International Workshop on Peer-to- Peer Systems
(IPTPS'05), Ithaca, New York, USA, 2005 | null | null | null | cs.NI cond-mat.stat-mech cs.DC | null | Most earlier studies of Distributed Hash Tables (DHTs) under churn have
either depended on simulations as the primary investigation tool, or on
establishing bounds for DHTs to function. In this paper, we present a complete
analytical study of churn using a master-equation-based approach, used
traditionally in non-equilibrium statistical mechanics to describe steady-state
or transient phenomena. Simulations are used to verify all theoretical
predictions. We demonstrate the application of our methodology to the Chord
system. For any rate of churn and stabilization rates, and any system size, we
accurately predict the fraction of failed or incorrect successor and finger
pointers and show how we can use these quantities to predict the performance
and consistency of lookups under churn. We also discuss briefly how churn may
actually be of different 'types' and the implications this will have for the
functioning of DHTs in general.
| [
{
"version": "v1",
"created": "Mon, 24 Jan 2005 16:22:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krishnamurthy",
"Supriya",
""
],
[
"El-Ansary",
"Sameh",
""
],
[
"Aurell",
"Erik",
""
],
[
"Haridi",
"Seif",
""
]
] |
cs/0501070 | David Lorenz | David H. Lorenz, Therapon Skotiniotis | Extending Design by Contract for Aspect-Oriented Programming | null | null | null | NU-CCIS-04-14 | cs.SE cs.PL | null | Design by Contract (DbC) and runtime enforcement of program assertions
enables the construction of more robust software. It also enables the
assignment of blame in error reporting. Unfortunately, there is no support for
runtime contract enforcement and blame assignment for Aspect-Oriented
Programming (AOP). Extending DbC to also cover aspects brings forward a
plethora of issues related to the correct order of assertion validation. We
show that there is no generally correct execution sequence of object assertions
and aspect assertions. A further classification of aspects as agnostic,
obedient, or rebellious defines the order of assertion validation that needs to
be followed. We describe the application of this classification in a prototyped
DbC tool for AOP named Cona, where aspects are used for implementing contracts,
and contracts are used for enforcing assertions on aspects.
| [
{
"version": "v1",
"created": "Mon, 24 Jan 2005 20:28:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lorenz",
"David H.",
""
],
[
"Skotiniotis",
"Therapon",
""
]
] |
cs/0501072 | Thierry Poibeau | Dominique Dutoit, Thierry Poibeau (LIPN) | Inferring knowledge from a large semantic network | null | Inferring knowledge from a large semantic network (2002) 232-238 | null | null | cs.AI | null | In this paper, we present a rich semantic network based on a differential
analysis. We then detail implemented measures that take into account common and
differential features between words. In a last section, we describe some
industrial applications.
| [
{
"version": "v1",
"created": "Tue, 25 Jan 2005 16:09:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dutoit",
"Dominique",
"",
"LIPN"
],
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
] |
cs/0501073 | Tom Schrijvers | Tom Schrijvers and Thom Fruehwirth | Optimal Union-Find in Constraint Handling Rules | 12 pages, 3 figures, to appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.PL cs.CC cs.DS cs.PF | null | Constraint Handling Rules (CHR) is a committed-choice rule-based language
that was originally intended for writing constraint solvers. In this paper we
show that it is also possible to write the classic union-find algorithm and
variants in CHR. The programs neither compromise in declarativeness nor
efficiency. We study the time complexity of our programs: they match the
almost-linear complexity of the best known imperative implementations. This
fact is illustrated with experimental results.
| [
{
"version": "v1",
"created": "Tue, 25 Jan 2005 13:28:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schrijvers",
"Tom",
""
],
[
"Fruehwirth",
"Thom",
""
]
] |
cs/0501075 | Marius Zimand | Marius Zimand | Simple extractors via constructions of cryptographic pseudo-random
generators | 21 pages, an extended abstract will appear in Proc. ICALP 2005; small
corrections, some comments and references added | null | null | null | cs.CC cs.CR | null | Trevisan has shown that constructions of pseudo-random generators from hard
functions (the Nisan-Wigderson approach) also produce extractors. We show that
constructions of pseudo-random generators from one-way permutations (the
Blum-Micali-Yao approach) can be used for building extractors as well. Using
this new technique we build extractors that do not use designs and
polynomial-based error-correcting codes and that are very simple and efficient.
For example, one extractor produces each output bit separately in $O(\log^2 n)$
time. These extractors work for weak sources with min entropy $\lambda n$, for
arbitrary constant $\lambda > 0$, have seed length $O(\log^2 n)$, and their
output length is $\approx n^{\lambda/3}$.
| [
{
"version": "v1",
"created": "Tue, 25 Jan 2005 15:43:11 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Feb 2005 17:55:47 GMT"
},
{
"version": "v3",
"created": "Mon, 9 May 2005 13:29:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zimand",
"Marius",
""
]
] |
cs/0501076 | Ketan Mulmuley D. | Ketan D. Mulmuley and Milind Sohoni | Geometric Complexity III: on deciding positivity of
Littlewood-Richardson coefficients | 10 pages | null | null | null | cs.CC math.RT | null | We point out that the remarkable Knutson and Tao Saturation Theorem and
polynomial time algorithms for LP have together an important and immediate
consequence in Geometric Complexity Theory. The problem of deciding positivity
of Littlewood-Richardson coefficients for GLn(C) belongs to P. Furthermore, the
algorithm is strongly polynomial.
The main goal of this article is to explain the significance of this result
in the context of Geometric Complexity Theory. Furthermore, it is also
conjectured that an analogous result holds for arbitrary symmetrizable
Kac-Moody algebras.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2005 11:58:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mulmuley",
"Ketan D.",
""
],
[
"Sohoni",
"Milind",
""
]
] |
cs/0501077 | Andrew Krizhanovsky A. | Alexander Smirnov, Mikhail Pashkin, Nikolai Chilov, Tatiana Levashova,
Andrew Krizhanovsky and Alexey Kashevnik | Ontology-Based Users & Requests Clustering in Customer Service
Management System | 15 pages, 4 figures, published in Lecture Notes in Computer Science | Smirnov A., Pashkin M., Chilov N., Levashova T., Krizhanovsky A.,
Kashevnik A. 2005. Ontology-Based Users and Requests Clustering in Customer
Service Management System. Springer-Verlag GmbH, Lecture Notes in Computer
Science, 3505: 231-246 | null | null | cs.IR cs.CL | null | Customer Service Management is one of major business activities to better
serve company customers through the introduction of reliable processes and
procedures. Today this kind of activities is implemented through e-services to
directly involve customers into business processes. Traditionally Customer
Service Management involves application of data mining techniques to discover
usage patterns from the company knowledge memory. Hence grouping of
customers/requests to clusters is one of major technique to improve the level
of company customization. The goal of this paper is to present an efficient for
implementation approach for clustering users and their requests. The approach
uses ontology as knowledge representation model to improve the semantic
interoperability between units of the company and customers. Some fragments of
the approach tested in an industrial company are also presented in the paper.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2005 14:11:38 GMT"
},
{
"version": "v2",
"created": "Fri, 27 May 2005 13:59:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smirnov",
"Alexander",
""
],
[
"Pashkin",
"Mikhail",
""
],
[
"Chilov",
"Nikolai",
""
],
[
"Levashova",
"Tatiana",
""
],
[
"Krizhanovsky",
"Andrew",
""
],
[
"Kashevnik",
"Alexey",
""
]
] |
cs/0501078 | Liang Zhou | Liang Zhou, Miruna Ticrea and Eduard Hovy | Multi-document Biography Summarization | null | Proceedings of EMNLP, pp. 434-441, 2004 | null | null | cs.CL | null | In this paper we describe a biography summarization system using sentence
classification and ideas from information retrieval. Although the individual
techniques are not new, assembling and applying them to generate multi-document
biographies is new. Our system was evaluated in DUC2004. It is among the top
performers in task 5-short summaries focused by person questions.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2005 22:43:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Liang",
""
],
[
"Ticrea",
"Miruna",
""
],
[
"Hovy",
"Eduard",
""
]
] |
cs/0501079 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | Data Mining for Actionable Knowledge: A Survey | 11 pages | null | null | Tr-05-01 | cs.DB cs.AI | null | The data mining process consists of a series of steps ranging from data
cleaning, data selection and transformation, to pattern evaluation and
visualization. One of the central problems in data mining is to make the mined
patterns or knowledge actionable. Here, the term actionable refers to the mined
patterns suggest concrete and profitable actions to the decision-maker. That
is, the user can do something to bring direct benefits (increase in profits,
reduction in cost, improvement in efficiency, etc.) to the organization's
advantage. However, there has been written no comprehensive survey available on
this topic. The goal of this paper is to fill the void.
In this paper, we first present two frameworks for mining actionable
knowledge that are inexplicitly adopted by existing research methods. Then we
try to situate some of the research on this topic from two different
viewpoints: 1) data mining tasks and 2) adopted framework. Finally, we specify
issues that are either not addressed or insufficiently studied yet and conclude
the paper.
| [
{
"version": "v1",
"created": "Thu, 27 Jan 2005 12:13:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
cs/0501080 | Carl Lagoze | Carl Lagoze, Dean B. Krafft, Susan Jesuroga, Tim Cornwell, Ellen J.
Cramer, Eddie Shin | An Information Network Overlay Architecture for the NSDL | null | null | null | null | cs.DL | null | We describe the underlying data model and implementation of a new
architecture for the National Science Digital Library (NSDL) by the Core
Integration Team (CI). The architecture is based on the notion of an
information network overlay. This network, implemented as a graph of digital
objects in a Fedora repository, allows the representation of multiple
information entities and their relationships. The architecture provides the
framework for contextualization and reuse of resources, which we argue is
essential for the utility of the NSDL as a tool for teaching and learning.
| [
{
"version": "v1",
"created": "Thu, 27 Jan 2005 19:49:11 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Feb 2005 21:04:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Krafft",
"Dean B.",
""
],
[
"Jesuroga",
"Susan",
""
],
[
"Cornwell",
"Tim",
""
],
[
"Cramer",
"Ellen J.",
""
],
[
"Shin",
"Eddie",
""
]
] |
cs/0501083 | Jon Phipps | Jon Phipps, Diane I. Hillmann, Gordon Paynter | Orchestrating Metadata Enhancement Services: Introducing Lenny | null | null | null | null | cs.DL | null | Harvested metadata often suffers from uneven quality to the point that
utility is compromised. Although some aggregators have developed methods for
evaluating and repairing specific metadata problems, it has been unclear how
these methods might be scaled into services that can be used within an
automated production environment. The National Science Digital Library (NSDL),
as part of its work with INFOMINE, has developed a model of ser-vice
interaction that enables loosely-coupled third party services to provide
metadata enhancements to a central repository, with interactions orchestrated
by a centralized software application.
| [
{
"version": "v1",
"created": "Fri, 28 Jan 2005 18:44:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Phipps",
"Jon",
""
],
[
"Hillmann",
"Diane I.",
""
],
[
"Paynter",
"Gordon",
""
]
] |
cs/0501084 | Axel Polleres | Thomas Eiter and Axel Polleres | Towards Automated Integration of Guess and Check Programs in Answer Set
Programming: A Meta-Interpreter and Applications | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | 1843-04-01 | cs.AI | null | Answer set programming (ASP) with disjunction offers a powerful tool for
declaratively representing and solving hard problems. Many NP-complete problems
can be encoded in the answer set semantics of logic programs in a very concise
and intuitive way, where the encoding reflects the typical "guess and check"
nature of NP problems: The property is encoded in a way such that polynomial
size certificates for it correspond to stable models of a program. However, the
problem-solving capacity of full disjunctive logic programs (DLPs) is beyond
NP, and captures a class of problems at the second level of the polynomial
hierarchy. While these problems also have a clear "guess and check" structure,
finding an encoding in a DLP reflecting this structure may sometimes be a
non-obvious task, in particular if the "check" itself is a coNP-complete
problem; usually, such problems are solved by interleaving separate guess and
check programs, where the check is expressed by inconsistency of the check
program. In this paper, we present general transformations of head-cycle free
(extended) disjunctive logic programs into stratified and positive (extended)
disjunctive logic programs based on meta-interpretation techniques. The answer
sets of the original and the transformed program are in simple correspondence,
and, moreover, inconsistency of the original program is indicated by a
designated answer set of the transformed program. Our transformations
facilitate the integration of separate "guess" and "check" programs, which are
often easy to obtain, automatically into a single disjunctive logic program.
Our results complement recent results on meta-interpretation in ASP, and extend
methods and techniques for a declarative "guess and check" problem solving
paradigm through ASP.
| [
{
"version": "v1",
"created": "Fri, 28 Jan 2005 20:19:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eiter",
"Thomas",
""
],
[
"Polleres",
"Axel",
""
]
] |
cs/0501086 | Manuela Kunze | Peter M. Kruse and Andre Naujoks and Dietmar Roesner and Manuela Kunze | Clever Search: A WordNet Based Wrapper for Internet Search Engines | null | Proceedings of 2nd GermaNet Workshop 2005 | null | null | cs.AI | null | This paper presents an approach to enhance search engines with information
about word senses available in WordNet. The approach exploits information about
the conceptual relations within the lexical-semantic net. In the wrapper for
search engines presented, WordNet information is used to specify user's request
or to classify the results of a publicly available web search engine, like
google, yahoo, etc.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 16:00:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kruse",
"Peter M.",
""
],
[
"Naujoks",
"Andre",
""
],
[
"Roesner",
"Dietmar",
""
],
[
"Kunze",
"Manuela",
""
]
] |
cs/0501087 | Manoj Kumar | Manoj Kumar | Faults and Improvements of an Enhanced Remote User Authentication Scheme
Using Smart Cards | 5 pages | null | null | null | cs.CR | null | In 2000, Hwang and Li proposed a remote user authentication scheme using
smart cards to solve the problems of Lamport scheme. Later, Chan- Chang, Shen-
Lin- Hwang and then Chang-Hwang pointed out some attacks on Hwang –
Li’s scheme. In 2003, Shen, Lin and Hwang also proposed a modified scheme
to remove these attacks. In the same year, Leung-Cheng-Fong-Chan showed that
modified scheme proposed by Shen-Lin-Hwang is still insecure. In 2004, Awasthi
and Lal enhanced Shen-Lin-Hwang’s scheme to overcome its security
pitfalls. This paper analyses that the user U/smart card does not provide
complete information for the execution and proper running of the login phase of
the Awasthi- Lal’s scheme. Furthermore, this paper also modifies the
Awasthi- Lal’s scheme for the proper functioning.
| [
{
"version": "v1",
"created": "Sat, 29 Jan 2005 06:44:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
] |
cs/0501089 | Manuela Kunze | Manuela Kunze and Dietmar Roesner | Issues in Exploiting GermaNet as a Resource in Real Applications | 10 pages, 3 figures | null | null | null | cs.AI | null | This paper reports about experiments with GermaNet as a resource within
domain specific document analysis. The main question to be answered is: How is
the coverage of GermaNet in a specific domain? We report about results of a
field test of GermaNet for analyses of autopsy protocols and present a sketch
about the integration of GermaNet inside XDOC. Our remarks will contribute to a
GermaNet user's wish list.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 10:07:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kunze",
"Manuela",
""
],
[
"Roesner",
"Dietmar",
""
]
] |
cs/0501093 | Manuela Kunze | Manuela Kunze and Dietmar Roesner | Transforming Business Rules Into Natural Language Text | 3 pages | in Proceedings of IWCS-6, 2005 | null | null | cs.AI | null | The aim of the project presented in this paper is to design a system for an
NLG architecture, which supports the documentation process of eBusiness models.
A major task is to enrich the formal description of an eBusiness model with
additional information needed in an NLG task.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 07:59:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kunze",
"Manuela",
""
],
[
"Roesner",
"Dietmar",
""
]
] |
cs/0501094 | Manuela Kunze | Manuela Kunze and Dietmar Roesner | Corpus based Enrichment of GermaNet Verb Frames | 4 pages | in Proceedings of LREC 2004 | null | null | cs.AI | null | Lexical semantic resources, like WordNet, are often used in real applications
of natural language document processing. For example, we integrated GermaNet in
our document suite XDOC of processing of German forensic autopsy protocols. In
addition to the hypernymy and synonymy relation, we want to adapt GermaNet's
verb frames for our analysis. In this paper we outline an approach for the
domain related enrichment of GermaNet verb frames by corpus based syntactic and
co-occurred data analyses of real documents.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 08:36:39 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Feb 2005 08:06:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kunze",
"Manuela",
""
],
[
"Roesner",
"Dietmar",
""
]
] |
cs/0501095 | Manuela Kunze | Manuela Kunze and Dietmar Roesner | Context Related Derivation of Word Senses | 5 pages, 2 figures | in Proceedings of Ontolex- Workshop 2004 | null | null | cs.AI | null | Real applications of natural language document processing are very often
confronted with domain specific lexical gaps during the analysis of documents
of a new domain. This paper describes an approach for the derivation of domain
specific concepts for the extension of an existing ontology. As resources we
need an initial ontology and a partially processed corpus of a domain. We
exploit the specific characteristic of the sublanguage in the corpus. Our
approach is based on syntactical structures (noun phrases) and compound
analyses to extract information required for the extension of GermaNet's
lexical resources.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 09:25:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kunze",
"Manuela",
""
],
[
"Roesner",
"Dietmar",
""
]
] |
cs/0501096 | Manuela Kunze | Dietmar Roesner and Manuela Kunze and Sylke Kroetzsch | Transforming and Enriching Documents for the Semantic Web | 10 pages, 1 figure | KI (1), 2004 | null | null | cs.AI | null | We suggest to employ techniques from Natural Language Processing (NLP) and
Knowledge Representation (KR) to transform existing documents into documents
amenable for the Semantic Web. Semantic Web documents have at least part of
their semantics and pragmatics marked up explicitly in both a machine
processable as well as human readable manner. XML and its related standards
(XSLT, RDF, Topic Maps etc.) are the unifying platform for the tools and
methodologies developed for different application scenarios.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 09:48:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roesner",
"Dietmar",
""
],
[
"Kunze",
"Manuela",
""
],
[
"Kroetzsch",
"Sylke",
""
]
] |
cs/0502002 | Manoj Kumar | Manoj Kumar | Directed Threshold Multi – Signature Scheme without SDC | 13 pages | null | null | null | cs.CR | null | In this paper, we propose a Directed threshold multisignature scheme without
SDC. This signature scheme is applicable when the message is sensitive to the
signature receiver; and the signatures are generated by the cooperation of a
number of people from a given group of senders. In this scheme, any malicious
set of signers cannot impersonate any other set of signers to forge the
signatures. In case of forgery, it is possible to trace the signing set.
| [
{
"version": "v1",
"created": "Tue, 1 Feb 2005 06:29:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
] |
cs/0502003 | Sandor P. Fekete | Alexander Kroeller, Dennis Pfisterer, Carsten Buschmann, Sandor P.
Fekete, and Stefan Fischer | Shawn: A new approach to simulating wireless sensor networks | 10 pages, 2 figures, 2 tables, Latex, to appear in Design, Analysis,
and Simulation of Distributed Systems 2005 | null | null | null | cs.DC cs.PF | null | We consider the simulation of wireless sensor networks (WSN) using a new
approach. We present Shawn, an open-source discrete-event simulator that has
considerable differences to all other existing simulators. Shawn is very
powerful in simulating large scale networks with an abstract point of view. It
is, to the best of our knowledge, the first simulator to support generic
high-level algorithms as well as distributed protocols on exactly the same
underlying networks.
| [
{
"version": "v1",
"created": "Tue, 1 Feb 2005 12:23:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kroeller",
"Alexander",
""
],
[
"Pfisterer",
"Dennis",
""
],
[
"Buschmann",
"Carsten",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Fischer",
"Stefan",
""
]
] |
cs/0502006 | Alejandro Ceccatto | P.M. Granitto, P.F. Verdes and H.A. Ceccatto | Neural network ensembles: Evaluation of aggregation algorithms | 35 pages, 2 figures, In press AI Journal | null | null | null | cs.AI cs.NE | null | Ensembles of artificial neural networks show improved generalization
capabilities that outperform those of single networks. However, for aggregation
to be effective, the individual networks must be as accurate and diverse as
possible. An important problem is, then, how to tune the aggregate members in
order to have an optimal compromise between these two conflicting conditions.
We present here an extensive evaluation of several algorithms for ensemble
construction, including new proposals and comparing them with standard methods
in the literature. We also discuss a potential problem with sequential
aggregation algorithms: the non-frequent but damaging selection through their
heuristics of particularly bad ensemble members. We introduce modified
algorithms that cope with this problem by allowing individual weighting of
aggregate members. Our algorithms and their weighted modifications are
favorably tested against other methods in the literature, producing a sensible
improvement in performance on most of the standard statistical databases used
as benchmarks.
| [
{
"version": "v1",
"created": "Tue, 1 Feb 2005 21:22:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Granitto",
"P. M.",
""
],
[
"Verdes",
"P. F.",
""
],
[
"Ceccatto",
"H. A.",
""
]
] |
cs/0502007 | Alexander Shaydurov S. | Alexander Shaydurov | Identification of complex systems in the basis of wavelets | 4 pages, 6 figures | null | null | null | cs.CE cs.NE | null | In this paper is proposed the method of the identification of complex dynamic
systems. Method can be used for the identification of linear and nonlinear
complex dynamic systems for the determined or stochastic signals at the inputs
and the outputs. It is proposed to use a basis of wavelets for obtaining the
impulse transient function (ITF) of system. ITF is considered in the form of
surface in the 3D space. Are given the results of experiments on the
identification of systems in the basis of wavelets.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 00:12:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shaydurov",
"Alexander",
""
]
] |
cs/0502008 | Jim Gray | Jim Gray, David T. Liu, Maria Nieto-Santisteban, Alexander S. Szalay,
David DeWitt, Gerd Heber | Scientific Data Management in the Coming Decade | null | null | null | Microsoft Technical Report MSR-TR-2005-10 | cs.DB cs.CE | null | This is a thought piece on data-intensive science requirements for databases
and science centers. It argues that peta-scale datasets will be housed by
science centers that provide substantial storage and processing for scientists
who access the data via smart notebooks. Next-generation science instruments
and simulations will generate these peta-scale datasets. The need to publish
and share data and the need for generic analysis and visualization tools will
finally create a convergence on common metadata standards. Database systems
will be judged by their support of these metadata standards and by their
ability to manage and access peta-scale datasets. The procedural
stream-of-bytes-file-centric approach to data analysis is both too cumbersome
and too serial for such large datasets. Non-procedural query and analysis of
schematized self-describing data is both easier to use and allows much more
parallelism.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 03:15:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Liu",
"David T.",
""
],
[
"Nieto-Santisteban",
"Maria",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"DeWitt",
"David",
""
],
[
"Heber",
"Gerd",
""
]
] |
cs/0502009 | Jim Gray | Peter Kukol, Jim Gray | Performance Considerations for Gigabyte per Second Transcontinental
Disk-to-Disk File Transfers | null | null | null | Microsoft Technical Report MSR-TR-2004-62 | cs.DB cs.PF | null | Moving data from CERN to Pasadena at a gigabyte per second using the next
generation Internet requires good networking and good disk IO. Ten Gbps
Ethernet and OC192 links are in place, so now it is simply a matter of
programming. This report describes our preliminary work and measurements in
configuring the disk subsystem for this effort. Using 24 SATA disks at each
endpoint we are able to locally read and write an NTFS volume is striped across
24 disks at 1.2 GBps. A 32-disk stripe delivers 1.7 GBps. Experiments on higher
performance and higher-capacity systems deliver up to 3.5 GBps.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 03:26:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kukol",
"Peter",
""
],
[
"Gray",
"Jim",
""
]
] |
cs/0502010 | Jim Gray | Tom Barclay, Jim Gray | TerraServer SAN-Cluster Architecture and Operations Experience | null | null | null | Microsoft Technical Report MSR-TR-2004-67 | cs.DC cs.DB | null | Microsoft TerraServer displays aerial, satellite, and to-pographic images of
the earth in a SQL database available via the Internet. It is one of the most
popular online at-lases, presenting seventeen terabytes of image data from the
United States Geological Survey (USGS). Initially de-ployed in 1998, the system
demonstrated the scalability of PC hardware and software - Windows and SQL
Server - on a single, mainframe-class processor. In September 2000, the
back-end database application was migrated to 4-node active/passive cluster
connected to an 18 terabyte Storage Area Network (SAN). The new configuration
was designed to achieve 99.99% availability for the back-end application. This
paper describes the hardware and software components of the TerraServer Cluster
and SAN, and describes our experience in configuring and operating this system
for three years. Not surprisingly, the hardware and architecture delivered
better than four-9's of availability, but operations mistakes delivered
three-9's.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 03:36:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barclay",
"Tom",
""
],
[
"Gray",
"Jim",
""
]
] |
cs/0502011 | Jim Gray | Jim Gray, Alexander S. Szalay | Where the Rubber Meets the Sky: Bridging the Gap between Databases and
Science | null | IEEE Data Engineering Bulletin, Vol 27.4, Dec. 2004, pp. 3-11 | null | Microsoft Technical Report MSR-TR-2004-110 | cs.DB cs.CE | null | Scientists in all domains face a data avalanche - both from better
instruments and from improved simulations. We believe that computer science
tools and computer scientists are in a position to help all the sciences by
building tools and developing techniques to manage, analyze, and visualize
peta-scale scientific information. This article is summarizes our experiences
over the last seven years trying to bridge the gap between database technology
and the needs of the astronomy community in building the World-Wide Telescope.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 04:40:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alexander S.",
""
]
] |
cs/0502012 | Jim Gray | Peter Kukol, Jim Gray | Sequential File Programming Patterns and Performance with .NET | null | null | null | Microsoft Technical Report MSR-TR-2004-136 | cs.PF cs.OS | null | Programming patterns for sequential file access in the .NET Framework are
described and the performance is measured. The default behavior provides
excellent performance on a single disk - 50 MBps both reading and writing.
Using large request sizes and doing file pre-allocation when possible have
quantifiable benefits. When one considers disk arrays, .NET unbuffered IO
delivers 800 MBps on a 16-disk array, but buffered IO delivers about 12% of
that performance. Consequently, high-performance file and database utilities
are still forced to use unbuffered IO for maximum sequential performance. The
report is accompanied by downloadable source code that demonstrates the
concepts and code that was used to obtain these measurements.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 04:43:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kukol",
"Peter",
""
],
[
"Gray",
"Jim",
""
]
] |
cs/0502013 | Robert Hearn | Robert A. Hearn | Amazons is PSPACE-complete | 7 pages, 5 figures. For 2005 Combinatorial Game Theory Workshop at
BIRS | null | null | null | cs.CC cs.GT | null | Amazons is a board game which combines elements of Chess and Go. It has
become popular in recent years, and has served as a useful platform for both
game-theoretic study and AI games research. Buro showed that simple Amazons
endgames are NP-equivalent, leaving the complexity of the general case as an
open problem.
We settle this problem, by showing that deciding the outcome of an n x n
Amazons position is PSPACE-hard. We give a reduction from one of the
PSPACE-complete two-player formula games described by Schaefer. Since the
number of moves in an Amazons game is polynomially bounded (unlike Chess and
Go), Amazons is in PSPACE. It is thus on a par with other two-player,
bounded-move, perfect-information games such as Hex, Othello, and Kayles. Our
construction also provides an alternate proof that simple Amazons endgames are
NP-equivalent.
Our reduction uses a number of amazons polynomial in the input formula
length; a remaining open problem is the complexity of Amazons when only a
constant number of amazons is used.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 18:55:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hearn",
"Robert A.",
""
]
] |
cs/0502014 | Philippe Robert | Philippe Robert (RAP UR-R) | On the asymptotic behavior of some Algorithms | November 2004 | Random Structures and Algorithms 27 (2005) 235--250 | 10.1002/rsa.20075 | null | cs.DS math.CA math.PR | null | A simple approach is presented to study the asymptotic behavior of some
algorithms with an underlying tree structure. It is shown that some asymptotic
oscillating behaviors can be precisely analyzed without resorting to complex
analysis techniques as it is usually done in this context. A new explicit
representation of periodic functions involved is obtained at the same time.
| [
{
"version": "v1",
"created": "Thu, 3 Feb 2005 08:25:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robert",
"Philippe",
"",
"RAP UR-R"
]
] |
cs/0502015 | Remi Barrere | R. Barrere | Can Computer Algebra be Liberated from its Algebraic Yoke ? | 8 pages, 2-column presentation, 2 figures | null | null | null | cs.SC cs.CE | null | So far, the scope of computer algebra has been needlessly restricted to exact
algebraic methods. Its possible extension to approximate analytical methods is
discussed. The entangled roles of functional analysis and symbolic programming,
especially the functional and transformational paradigms, are put forward. In
the future, algebraic algorithms could constitute the core of extended symbolic
manipulation systems including primitives for symbolic approximations.
| [
{
"version": "v1",
"created": "Thu, 3 Feb 2005 17:28:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barrere",
"R.",
""
]
] |
cs/0502016 | Cynthia Rudin | Cynthia Rudin | Stability Analysis for Regularized Least Squares Regression | 14 pages, 0 figures, 1 class file | null | null | null | cs.LG | null | We discuss stability for a class of learning algorithms with respect to noisy
labels. The algorithms we consider are for regression, and they involve the
minimization of regularized risk functionals, such as L(f) := 1/N sum_i
(f(x_i)-y_i)^2+ lambda ||f||_H^2. We shall call the algorithm `stable' if, when
y_i is a noisy version of f*(x_i) for some function f* in H, the output of the
algorithm converges to f* as the regularization term and noise simultaneously
vanish. We consider two flavors of this problem, one where a data set of N
points remains fixed, and the other where N -> infinity. For the case where N
-> infinity, we give conditions for convergence to f_E (the function which is
the expectation of y(x) for each x), as lambda -> 0. For the fixed N case, we
describe the limiting 'non-noisy', 'non-regularized' function f*, and give
conditions for convergence. In the process, we develop a set of tools for
dealing with functionals such as L(f), which are applicable to many other
problems in learning theory.
| [
{
"version": "v1",
"created": "Thu, 3 Feb 2005 19:54:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rudin",
"Cynthia",
""
]
] |
cs/0502018 | Jim Gray | Maria A. Nieto-Santisteban, Alexander S. Szalay, Aniruddha R. Thakar,
William J. O'Mullane, Jim Gray, James Annis | When Database Systems Meet the Grid | better version of the paper (better graphics exceed ArXiv 1MB limit)
at http://www-db.cs.wisc.edu/cidr/papers/P13.pdf | Proceedings of CIDR 2005 Conference, Asilomar, CA. Jan. 2005, pp
154-161 | null | Microsoft Technical Report MSR-TR-2004-81 | cs.DC | null | We illustrate the benefits of combining database systems and Grid
technologies for data-intensive applications. Using a cluster of SQL servers,
we reimplemented an existing Grid application that finds galaxy clusters in a
large astronomical database. The SQL implementation runs an order of magnitude
faster than the earlier Tcl-C-file-based implementation. We discuss why and how
Grid applications can take advantage of database systems.
| [
{
"version": "v1",
"created": "Thu, 3 Feb 2005 21:43:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nieto-Santisteban",
"Maria A.",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Thakar",
"Aniruddha R.",
""
],
[
"O'Mullane",
"William J.",
""
],
[
"Gray",
"Jim",
""
],
[
"Annis",
"James",
""
]
] |
cs/0502019 | Kevin Lai | Michal Feldman, Kevin Lai, Li Zhang | A Price-Anticipating Resource Allocation Mechanism for Distributed
Shared Clusters | null | Proceedings of the ACM Conference on Electronic Commerce 2005 | null | null | cs.DC cs.GT | null | In this paper we formulate the fixed budget resource allocation game to
understand the performance of a distributed market-based resource allocation
system. Multiple users decide how to distribute their budget (bids) among
multiple machines according to their individual preferences to maximize their
individual utility. We look at both the efficiency and the fairness of the
allocation at the equilibrium, where fairness is evaluated through the measures
of utility uniformity and envy-freeness. We show analytically and through
simulations that despite being highly decentralized, such a system converges
quickly to an equilibrium and unlike the social optimum that achieves high
efficiency but poor fairness, the proposed allocation scheme achieves a nice
balance of high degrees of efficiency and fairness at the equilibrium.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 02:48:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Feldman",
"Michal",
""
],
[
"Lai",
"Kevin",
""
],
[
"Zhang",
"Li",
""
]
] |
cs/0502020 | Kumara Sastry | K. Sastry, U.-M. O'Reilly, D. E. Goldberg | Population Sizing for Genetic Programming Based Upon Decision Making | Final version published in O'Reilly, U.-M., et al. (2004). Genetic
Programming Theory and Practice II. Boston, MA: Kluwer Academic Publishers.
49--66 | null | null | IlliGAL Report No. 2004028 | cs.AI cs.NE | null | This paper derives a population sizing relationship for genetic programming
(GP). Following the population-sizing derivation for genetic algorithms in
Goldberg, Deb, and Clark (1992), it considers building block decision making as
a key facet. The analysis yields a GP-unique relationship because it has to
account for bloat and for the fact that GP solutions often use subsolution
multiple times. The population-sizing relationship depends upon tree size,
solution complexity, problem difficulty and building block expression
probability. The relationship is used to analyze and empirically investigate
population sizing for three model GP problems named ORDER, ON-OFF and LOUD.
These problems exhibit bloat to differing extents and differ in whether their
solutions require the use of a building block multiple times.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 03:58:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sastry",
"K.",
""
],
[
"O'Reilly",
"U. -M.",
""
],
[
"Goldberg",
"D. E.",
""
]
] |
cs/0502021 | Kumara Sastry | H. A. Abbass, K. Sastry, D. E. Goldberg | Oiling the Wheels of Change: The Role of Adaptive Automatic Problem
Decomposition in Non--Stationary Environments | null | null | null | null | cs.NE cs.AI | null | Genetic algorithms (GAs) that solve hard problems quickly, reliably and
accurately are called competent GAs. When the fitness landscape of a problem
changes overtime, the problem is called non--stationary, dynamic or
time--variant problem. This paper investigates the use of competent GAs for
optimizing non--stationary optimization problems. More specifically, we use an
information theoretic approach based on the minimum description length
principle to adaptively identify regularities and substructures that can be
exploited to respond quickly to changes in the environment. We also develop a
special type of problems with bounded difficulties to test non--stationary
optimization problems. The results provide new insights into non-stationary
optimization problems and show that a search algorithm which automatically
identifies and exploits possible decompositions is more robust and responds
quickly to changes than a simple genetic algorithm.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 04:15:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abbass",
"H. A.",
""
],
[
"Sastry",
"K.",
""
],
[
"Goldberg",
"D. E.",
""
]
] |
cs/0502022 | Kumara Sastry | K. Sastry, H. A. Abbass, D. E. Goldberg | Sub-Structural Niching in Non-Stationary Environments | Final version published in 2005 Australian Artificial Intelligence
Conference, pp. 873--885 | null | null | IlliGAL Report No. 2004035 | cs.NE cs.AI | null | Niching enables a genetic algorithm (GA) to maintain diversity in a
population. It is particularly useful when the problem has multiple optima
where the aim is to find all or as many as possible of these optima. When the
fitness landscape of a problem changes overtime, the problem is called
non--stationary, dynamic or time--variant problem. In these problems, niching
can maintain useful solutions to respond quickly, reliably and accurately to a
change in the environment. In this paper, we present a niching method that
works on the problem substructures rather than the whole solution, therefore it
has less space complexity than previously known niching mechanisms. We show
that the method is responding accurately when environmental changes occur.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 04:29:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sastry",
"K.",
""
],
[
"Abbass",
"H. A.",
""
],
[
"Goldberg",
"D. E.",
""
]
] |
cs/0502023 | Kumara Sastry | K. Sastry, H. A. Abbass, D. E. Goldberg, D. D. Johnson | Sub-structural Niching in Estimation of Distribution Algorithms | null | null | null | IlliGAL Report No. 2005002 | cs.NE cs.AI | null | We propose a sub-structural niching method that fully exploits the problem
decomposition capability of linkage-learning methods such as the estimation of
distribution algorithms and concentrate on maintaining diversity at the
sub-structural level. The proposed method consists of three key components: (1)
Problem decomposition and sub-structure identification, (2) sub-structure
fitness estimation, and (3) sub-structural niche preservation. The
sub-structural niching method is compared to restricted tournament selection
(RTS)--a niching method used in hierarchical Bayesian optimization
algorithm--with special emphasis on sustained preservation of multiple global
solutions of a class of boundedly-difficult, additively-separable multimodal
problems. The results show that sub-structural niching successfully maintains
multiple global optima over large number of generations and does so with
significantly less population than RTS. Additionally, the market share of each
of the niche is much closer to the expected level in sub-structural niching
when compared to RTS.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 04:46:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sastry",
"K.",
""
],
[
"Abbass",
"H. A.",
""
],
[
"Goldberg",
"D. E.",
""
],
[
"Johnson",
"D. D.",
""
]
] |
cs/0502025 | Hahnsang Kim | Hahnsang Kim, Theirry Turletti, Amar Bouali | EPspectra: A Formal Toolkit for Developing DSP Software Applications | 31 pages | null | null | null | cs.LO cs.SE | null | The software approach to developing Digital Signal Processing (DSP)
applications brings some great features such as flexibility, re-usability of
resources and easy upgrading of applications. However, it requires long and
tedious tests and verification phases because of the increasing complexity of
the software. This implies the need of a software programming environment
capable of putting together DSP modules and providing facilities to debug,
verify and validate the code. The objective of the work is to provide such
facilities as simulation and verification for developing DSP software
applications. This led us to develop an extension toolkit, Epspectra, built
upon Pspectra, one of the first toolkits available to design basic software
radio applications on standard PC workstations. In this paper, we first present
Epspectra, an Esterel-based extension of Pspectra that makes the design and
implementation of portable DSP applications easier. It allows drastic reduction
of testing and verification time while requiring relatively little expertise in
formal verification methods. Second, we demonstrate the use of Epspectra,
taking as an example the radio interface part of a GSM base station. We also
present the verification procedures for the three safety properties of the
implementation programs which have complex control-paths. These have to obey
strict scheduling rules. In addition, Epspectra achieves the verification of
the targeted application since the same model is used for the executable code
generation and for the formal verification.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 15:11:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kim",
"Hahnsang",
""
],
[
"Turletti",
"Theirry",
""
],
[
"Bouali",
"Amar",
""
]
] |
cs/0502027 | Kevin Lai | Kevin Lai | Markets are Dead, Long Live Markets | Fix rotation of figures | null | null | null | cs.OS | null | Researchers have long proposed using economic approaches to resource
allocation in computer systems. However, few of these proposals became
operational, let alone commercial. Questions persist about the economic
approach regarding its assumptions, value, applicability, and relevance to
system design. The goal of this paper is to answer these questions. We find
that market-based resource allocation is useful, and more importantly, that
mechanism design and system design should be integrated to produce systems that
are both economically and computationally efficient.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 22:48:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lai",
"Kevin",
""
]
] |
cs/0502028 | Herbert van de Sompel | Herbert Van de Sompel, Jeroen Bekaert, Xiaoming Liu, Luda Balakireva,
Thorsten Schwander | aDORe: a modular, standards-based Digital Object Repository | Draft of submission to Computer Journal | null | null | null | cs.DL | null | This paper describes the aDORe repository architecture, designed and
implemented for ingesting, storing, and accessing a vast collection of Digital
Objects at the Research Library of the Los Alamos National Laboratory. The
aDORe architecture is highly modular and standards-based. In the architecture,
the MPEG-21 Digital Item Declaration Language is used as the XML-based format
to represent Digital Objects that can consist of multiple datastreams as Open
Archival Information System Archival Information Packages (OAIS AIPs).Through
an ingestion process, these OAIS AIPs are stored in a multitude of autonomous
repositories. A Repository Index keeps track of the creation and location of
all the autonomous repositories, whereas an Identifier Locator registers in
which autonomous repository a given Digital Object or OAIS AIP resides. A
front-end to the complete environment, the OAI-PMH Federator, is introduced for
requesting OAIS Dissemination Information Packages (OAIS DIPs). These OAIS DIPs
can be the stored OAIS AIPs themselves, or transformations thereof. This
front-end allows OAI-PMH harvesters to recurrently and selectively collect
batches of OAIS DIPs from aDORe, and hence to create multiple, parallel
services using the collected objects. Another front-end, the OpenURL Resolver,
is introduced for requesting OAIS Result Sets. An OAIS Result Set is a
dissemination of an individual Digital Object or of its constituent
datastreams. Both front-ends make use of an MPEG-21 Digital Item Processing
Engine to apply services to OAIS AIPs, Digital Objects, or constituent
datastreams that were specified in a dissemination request.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 22:09:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Van de Sompel",
"Herbert",
""
],
[
"Bekaert",
"Jeroen",
""
],
[
"Liu",
"Xiaoming",
""
],
[
"Balakireva",
"Luda",
""
],
[
"Schwander",
"Thorsten",
""
]
] |
cs/0502029 | Martin Pelikan | Radovan Ondas, Martin Pelikan, Kumara Sastry | Scalability of Genetic Programming and Probabilistic Incremental Program
Evolution | Submitted to GECCO-2005 | null | null | null | cs.NE cs.AI | null | This paper discusses scalability of standard genetic programming (GP) and the
probabilistic incremental program evolution (PIPE). To investigate the need for
both effective mixing and linkage learning, two test problems are considered:
ORDER problem, which is rather easy for any recombination-based GP, and TRAP or
the deceptive trap problem, which requires the algorithm to learn interactions
among subsets of terminals. The scalability results show that both GP and PIPE
scale up polynomially with problem size on the simple ORDER problem, but they
both scale up exponentially on the deceptive problem. This indicates that while
standard recombination is sufficient when no interactions need to be
considered, for some problems linkage learning is necessary. These results are
in agreement with the lessons learned in the domain of binary-string genetic
algorithms (GAs). Furthermore, the paper investigates the effects of
introducing utnnecessary and irrelevant primitives on the performance of GP and
PIPE.
| [
{
"version": "v1",
"created": "Mon, 7 Feb 2005 19:40:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ondas",
"Radovan",
""
],
[
"Pelikan",
"Martin",
""
],
[
"Sastry",
"Kumara",
""
]
] |
cs/0502031 | Riccardo Pucella | Riccardo Pucella | Logic Column 11: The Finite and the Infinite in Temporal Logic | 14 pages | SIGACT News, 36(1), pp. 86-99, 2005 | null | null | cs.LO | null | This article examines the interpretation of the LTL temporal operators over
finite and infinite sequences. This is used as the basis for deriving a sound
and complete axiomatization for Caret, a recent temporal logic for reasoning
about programs with nested procedure calls and returns.
| [
{
"version": "v1",
"created": "Sat, 5 Feb 2005 21:00:13 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Apr 2005 17:51:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
] |
cs/0502032 | Mihai P?tra\c{s}cu | Christian Worm Mortensen, Rasmus Pagh and Mihai Patrascu | On Dynamic Range Reporting in One Dimension | 18 pages. Full version of a paper that will appear in STOC'05 | null | null | null | cs.DS | null | We consider the problem of maintaining a dynamic set of integers and
answering queries of the form: report a point (equivalently, all points) in a
given interval. Range searching is a natural and fundamental variant of integer
search, and can be solved using predecessor search. However, for a RAM with
w-bit words, we show how to perform updates in O(lg w) time and answer queries
in O(lglg w) time. The update time is identical to the van Emde Boas structure,
but the query time is exponentially faster. Existing lower bounds show that
achieving our query time for predecessor search requires doubly-exponentially
slower updates. We present some arguments supporting the conjecture that our
solution is optimal.
Our solution is based on a new and interesting recursion idea which is "more
extreme" that the van Emde Boas recursion. Whereas van Emde Boas uses a simple
recursion (repeated halving) on each path in a trie, we use a nontrivial, van
Emde Boas-like recursion on every such path. Despite this, our algorithm is
quite clean when seen from the right angle. To achieve linear space for our
data structure, we solve a problem which is of independent interest. We develop
the first scheme for dynamic perfect hashing requiring sublinear space. This
gives a dynamic Bloomier filter (an approximate storage scheme for sparse
vectors) which uses low space. We strengthen previous lower bounds to show that
these results are optimal.
| [
{
"version": "v1",
"created": "Sat, 5 Feb 2005 23:22:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mortensen",
"Christian Worm",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Patrascu",
"Mihai",
""
]
] |
cs/0502034 | Martin Pelikan | Martin Pelikan, Kumara Sastry, David E. Goldberg | Multiobjective hBOA, Clustering, and Scalability | Also IlliGAL Report No. 2005005 (http://www-illigal.ge.uiuc.edu/).
Submitted to GECCO-2005 | null | null | IlliGAL Report No. 2005005 | cs.NE cs.AI | null | This paper describes a scalable algorithm for solving multiobjective
decomposable problems by combining the hierarchical Bayesian optimization
algorithm (hBOA) with the nondominated sorting genetic algorithm (NSGA-II) and
clustering in the objective space. It is first argued that for good
scalability, clustering or some other form of niching in the objective space is
necessary and the size of each niche should be approximately equal.
Multiobjective hBOA (mohBOA) is then described that combines hBOA, NSGA-II and
clustering in the objective space. The algorithm mohBOA differs from the
multiobjective variants of BOA and hBOA proposed in the past by including
clustering in the objective space and allocating an approximately equally sized
portion of the population to each cluster. The algorithm mohBOA is shown to
scale up well on a number of problems on which standard multiobjective
evolutionary algorithms perform poorly.
| [
{
"version": "v1",
"created": "Mon, 7 Feb 2005 05:26:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pelikan",
"Martin",
""
],
[
"Sastry",
"Kumara",
""
],
[
"Goldberg",
"David E.",
""
]
] |
cs/0502038 | Stavros Nikolopoulos D. | Stavros D. Nikolopoulos and Charis Papadopoulos | The Number of Spanning Trees in Kn-complements of Quasi-threshold Graphs | 13 pages, 2 figures | Graphs and Combinatorics 20(3): 383-397, 2004 | null | null | cs.DM | null | In this paper we examine the classes of graphs whose $K_n$-complements are
trees and quasi-threshold graphs and derive formulas for their number of
spanning trees; for a subgraph $H$ of $K_n$, the $K_n$-complement of $H$ is the
graph $K_n-H$ which is obtained from $K_n$ by removing the edges of $H$. Our
proofs are based on the complement spanning-tree matrix theorem, which
expresses the number of spanning trees of a graph as a function of the
determinant of a matrix that can be easily constructed from the adjacency
relation of the graph. Our results generalize previous results and extend the
family of graphs of the form $K_n-H$ admitting formulas for the number of their
spanning trees.
| [
{
"version": "v1",
"created": "Mon, 7 Feb 2005 15:26:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nikolopoulos",
"Stavros D.",
""
],
[
"Papadopoulos",
"Charis",
""
]
] |
cs/0502039 | Boris D. Lubachevsky | Boris D. Lubachevsky | Efficient Parallel Simulations of Asynchronous Cellular Arrays | 26 pages, 10 figures | Complex Systems, vol.1, no.6, December 1987, pp.1099--1123, S.
Wolfram, (ed.) | null | null | cs.DC cond-mat.mtrl-sci cs.PF | null | A definition for a class of asynchronous cellular arrays is proposed. An
example of such asynchrony would be independent Poisson arrivals of cell
iterations. The Ising model in the continuous time formulation of Glauber falls
into this class. Also proposed are efficient parallel algorithms for simulating
these asynchronous cellular arrays. In the algorithms, one or several cells are
assigned to a processing element (PE), local times for different PEs can be
different. Although the standard serial algorithm by Metropolis, Rosenbluth,
Rosenbluth, Teller, and Teller can simulate such arrays, it is usually believed
to be without an efficient parallel counterpart. However, the proposed parallel
algorithms contradict this belief proving to be both efficient and able to
perform the same task as the standard algorithm. The results of experiments
with the new algorithms are encouraging: the speed-up is greater than 16 using
25 PEs on a shared memory MIMD bus computer, and greater than 1900 using 2**14
PEs on a SIMD computer. The algorithm by Bortz, Kalos, and Lebowitz can be
incorporated in the proposed parallel algorithms, further contributing to
speed-up. [In this paper I invented the update-cites-of-local-time-minima
parallel simulation scheme. Now the scheme is becoming popular. Many misprints
of the original 1987 Complex Systems publication are corrected here.-B.L.]
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 00:32:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lubachevsky",
"Boris D.",
""
]
] |
cs/0502040 | Gaoyan Xie | Gaoyan Xie and Zhe Dang | Testing Systems of Concurrent Black-boxes--an Automata-Theoretic and
Decompositional Approach | null | null | null | null | cs.SE | null | The global testing problem studied in this paper is to seek a definite answer
to whether a system of concurrent black-boxes has an observable behavior in a
given finite (but could be huge) set "Bad". We introduce a novel approach to
solve the problem that does not require integration testing. Instead, in our
approach, the global testing problem is reduced to testing individual
black-boxes in the system one by one in some given order. Using an
automata-theoretic approach, test sequences for each individual black-box are
generated from the system's description as well as the test results of
black-boxes prior to this black-box in the given order. In contrast to the
conventional compositional/modular verification/testing approaches, our
approach is essentially decompositional.
Also, our technique is complete, sound, and can be carried out automatically.
Our experiment results show that the total number of tests needed to solve the
global testing problem is substantially small even for an extremely large
"Bad".
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 01:15:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Xie",
"Gaoyan",
""
],
[
"Dang",
"Zhe",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.