id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0412091
Florentin Smarandache
Florentin Smarandache, Jean Dezert
The Combination of Paradoxical, Uncertain, and Imprecise Sources of Information based on DSmT and Neutro-Fuzzy Inference
20 pages
A version of this paper published in Proceedings of 10th International Conference on Fuzzy Theory and Technology (FT&T 2005), Salt Lake City, Utah, USA, July 21-26, 2005.
null
null
cs.AI
null
The management and combination of uncertain, imprecise, fuzzy and even paradoxical or high conflicting sources of information has always been, and still remains today, of primal importance for the development of reliable modern information systems involving artificial reasoning. In this chapter, we present a survey of our recent theory of plausible and paradoxical reasoning, known as Dezert-Smarandache Theory (DSmT) in the literature, developed for dealing with imprecise, uncertain and paradoxical sources of information. We focus our presentation here rather on the foundations of DSmT, and on the two important new rules of combination, than on browsing specific applications of DSmT available in literature. Several simple examples are given throughout the presentation to show the efficiency and the generality of this new approach. The last part of this chapter concerns the presentation of the neutrosophic logic, the neutro-fuzzy inference and its connection with DSmT. Fuzzy logic and neutrosophic logic are useful tools in decision making after fusioning the information using the DSm hybrid rule of combination of masses.
[ { "version": "v1", "created": "Sun, 19 Dec 2004 14:56:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
cs/0412092
Alasdair Earl
A. Earl and P. Clark
Mass Storage Management and the Grid
4 pages, 3 figures, Presented at Computing for High Energy and Nuclear Physics 2004 (CHEP '04), Interlaken, Switzerland, September 2004
null
null
null
cs.DC cs.SE
null
The University of Edinburgh has a significant interest in mass storage systems as it is one of the core groups tasked with the roll out of storage software for the UK's particle physics grid, GridPP. We present the results of a development project to provide software interfaces between the SDSC Storage Resource Broker, the EU DataGrid and the Storage Resource Manager. This project was undertaken in association with the eDikt group at the National eScience Centre, the Universities of Bristol and Glasgow, Rutherford Appleton Laboratory and the San Diego Supercomputing Center.
[ { "version": "v1", "created": "Mon, 20 Dec 2004 11:50:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Earl", "A.", "" ], [ "Clark", "P.", "" ] ]
cs/0412093
Alasdair Earl
A. Earl, P. Clark, S. Thorn
ScotGrid: A Prototype Tier 2 Centre
4 pages, 4 diagrams. Presented at Computing for High Energy and Nuclear Physics 2004 (CHEP '04). Interlaken, Switzerland, September 2004
null
null
null
cs.AR cs.DC
null
ScotGrid is a prototype regional computing centre formed as a collaboration between the universities of Durham, Edinburgh and Glasgow as part of the UK's national particle physics grid, GridPP. We outline the resources available at the three core sites and our optimisation efforts for our user communities. We discuss the work which has been conducted in extending the centre to embrace new projects both from particle physics and new user communities and explain our methodology for doing this.
[ { "version": "v1", "created": "Mon, 20 Dec 2004 11:55:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Earl", "A.", "" ], [ "Clark", "P.", "" ], [ "Thorn", "S.", "" ] ]
cs/0412094
Christoph Durr
Philippe Baptiste, Marek Chrobak, Christoph Durr, Francis Sourd
Preemptive Multi-Machine Scheduling of Equal-Length Jobs to Minimize the Average Flow Time
null
null
null
This paper is now part of the report cs.DS/0605078.
cs.DS
null
We study the problem of preemptive scheduling of n equal-length jobs with given release times on m identical parallel machines. The objective is to minimize the average flow time. Recently, Brucker and Kravchenko proved that the optimal schedule can be computed in polynomial time by solving a linear program with O(n^3) variables and constraints, followed by some substantial post-processing (where n is the number of jobs.) In this note we describe a simple linear program with only O(mn) variables and constraints. Our linear program produces directly the optimal schedule and does not require any post-processing.
[ { "version": "v1", "created": "Mon, 20 Dec 2004 16:15:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Baptiste", "Philippe", "" ], [ "Chrobak", "Marek", "" ], [ "Durr", "Christoph", "" ], [ "Sourd", "Francis", "" ] ]
cs/0412095
Mirela Damian
Mirela Damian and Joseph O'Rourke
Partitioning Regular Polygons into Circular Pieces II:Nonconvex Partitions
13 pages, 11 figures
null
null
null
cs.CG cs.DM
null
We explore optimal circular nonconvex partitions of regular k-gons. The circularity of a polygon is measured by its aspect ratio: the ratio of the radii of the smallest circumscribing circle to the largest inscribed disk. An optimal circular partition minimizes the maximum ratio over all pieces in the partition. We show that the equilateral triangle has an optimal 4-piece nonconvex partition, the square an optimal 13-piece nonconvex partition, and the pentagon has an optimal nonconvex partition with more than 20 thousand pieces. For hexagons and beyond, we provide a general algorithm that approaches optimality, but does not achieve it.
[ { "version": "v1", "created": "Tue, 21 Dec 2004 05:41:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Damian", "Mirela", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/0412100
Stephan Tobies
Peter H. Deussen and Stephan Tobies
Formal Test Purposes and The Validity of Test Cases
This paper appeared in the proceedings of the 22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2002), number 2529 Lecture Notes in Computer Science
null
null
null
cs.DS
null
We give a formalization of the notion of test purpose based on (suitably restricted) Message Sequence Charts. We define the validity of test cases with respect to such a formal test purpose and provide a simple decision procedure for validity.
[ { "version": "v1", "created": "Wed, 22 Dec 2004 08:53:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Deussen", "Peter H.", "" ], [ "Tobies", "Stephan", "" ] ]
cs/0412101
Stephan Tobies
Franz Baader and Stephan Tobies
The Inverse Method Implements the Automata Approach for Modal Satisfiability
A short version of this report has appeared at the First International Joint Conference on Automated Reasoning, IJCAR 2001
null
null
null
cs.LO
null
Tableaux-based decision procedures for satisfiability of modal and description logics behave quite well in practice, but it is sometimes hard to obtain exact worst-case complexity results using these approaches, especially for EXPTIME-complete logics. In contrast, automata-based approaches often yield algorithms for which optimal worst-case complexity can easily be proved. However, the algorithms obtained this way are usually not only worst-case, but also best-case exponential: they first construct an automaton that is always exponential in the size of the input, and then apply the (polynomial) emptiness test to this large automaton. To overcome this problem, one must try to construct the automaton "on-the-fly" while performing the emptiness test. In this paper we will show that Voronkov's inverse method for the modal logic K can be seen as an on-the-fly realization of the emptiness test done by the automata approach for K. The benefits of this result are two-fold. First, it shows that Voronkov's implementation of the inverse method, which behaves quite well in practice, is an optimized on-the-fly implementation of the automata-based satisfiability procedure for K. Second, it can be used to give a simpler proof of the fact that Voronkov's optimizations do not destroy completeness of the procedure. We will also show that the inverse method can easily be extended to handle global axioms, and that the correspondence to the automata approach still holds in this setting. In particular, the inverse method yields an EXPTIME-algorithm for satisfiability in K w.r.t. global axioms.
[ { "version": "v1", "created": "Wed, 22 Dec 2004 14:17:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Baader", "Franz", "" ], [ "Tobies", "Stephan", "" ] ]
cs/0412104
Tomas Klos
Koye Somefun (1), Tomas Klos (1), Han La Poutr\'e (1 and 2) ((1) Center for Mathematics and Computer Science (CWI), Amsterdam, The Netherlands, (2) Eindhoven University of Technology, Eindhoven, The Netherlands)
Negotiating over Bundles and Prices Using Aggregate Knowledge
15 pages, 7 eps figures, Springer llncs documentclass. Extended version of the paper published in "E-Commerce and Web Technologies," Kurt Bauknecht, Martin Bichler and Birgit Pr\"{o}ll (eds.). Springer Lecture Notes in Computer Science, Volume 3182, Berlin: Springer, p. 218--227
null
null
SEN-E0405
cs.MA cs.GT
null
Combining two or more items and selling them as one good, a practice called bundling, can be a very effective strategy for reducing the costs of producing, marketing, and selling goods. In this paper, we consider a form of multi-issue negotiation where a shop negotiates both the contents and the price of bundles of goods with his customers. We present some key insights about, as well as a technique for, locating mutually beneficial alternatives to the bundle currently under negotiation. The essence of our approach lies in combining historical sales data, condensed into aggregate knowledge, with current data about the ongoing negotiation process, to exploit these insights. In particular, when negotiating a given bundle of goods with a customer, the shop analyzes the sequence of the customer's offers to determine the progress in the negotiation process. In addition, it uses aggregate knowledge concerning customers' valuations of goods in general. We show how the shop can use these two sources of data to locate promising alternatives to the current bundle. When the current negotiation's progress slows down, the shop may suggest the most promising of those alternatives and, depending on the customer's response, continue negotiating about the alternative bundle, or propose another alternative. Extensive computer simulation experiments show that our approach increases the speed with which deals are reached, as well as the number and quality of the deals reached, as compared to a benchmark. In addition, we show that the performance of our system is robust to a variety of changes in the negotiation strategies employed by the customers.
[ { "version": "v1", "created": "Thu, 23 Dec 2004 11:31:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Somefun", "Koye", "", "1 and 2" ], [ "Klos", "Tomas", "", "1 and 2" ], [ "La Poutré", "Han", "", "1 and 2" ] ]
cs/0412105
Stefania Costantini
Stefania Costantini
On the existence of stable models of non-stratified logic programs
null
null
null
null
cs.AI cs.LO
null
This paper introduces a fundamental result, which is relevant for Answer Set programming, and planning. For the first time since the definition of the stable model semantics, the class of logic programs for which a stable model exists is given a syntactic characterization. This condition may have a practical importance both for defining new algorithms for checking consistency and computing answer sets, and for improving the existing systems. The approach of this paper is to introduce a new canonical form (to which any logic program can be reduced to), to focus the attention on cyclic dependencies. The technical result is then given in terms of programs in canonical form (canonical programs), without loss of generality. The result is based on identifying the cycles contained in the program, showing that stable models of the overall program are composed of stable models of suitable sub-programs, corresponding to the cycles, and on defining the Cycle Graph. Each vertex of this graph corresponds to one cycle, and each edge corresponds to onehandle, which is a literal containing an atom that, occurring in both cycles, actually determines a connection between them. In fact, the truth value of the handle in the cycle where it appears as the head of a rule, influences the truth value of the atoms of the cycle(s) where it occurs in the body. We can therefore introduce the concept of a handle path, connecting different cycles. If for every odd cycle we can find a handle path with certain properties, then the existence of stable model is guaranteed.
[ { "version": "v1", "created": "Thu, 23 Dec 2004 12:02:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Costantini", "Stefania", "" ] ]
cs/0412106
Tomas Klos
Koye Somefun (1), Tomas Klos (1), Han La Poutr\'e (1 and 2) ((1) Center for Mathematics and Computer Science (CWI), Amsterdam, The Netherlands, (2) Eindhoven University of Technology, Eindhoven, The Netherlands)
Online Learning of Aggregate Knowledge about Non-linear Preferences Applied to Negotiating Prices and Bundles
10 pages, 5 eps figures, ACM Proceedings documentclass, Published in "Proc. 6th Int'l Conf. on Electronic Commerce ICEC04, Delft, The Netherlands," M. Janssen, H. Sol, R. Wagenaar (eds.). ACM Press
null
null
SEN-E0415
cs.MA cs.GT cs.LG
null
In this paper, we consider a form of multi-issue negotiation where a shop negotiates both the contents and the price of bundles of goods with his customers. We present some key insights about, as well as a procedure for, locating mutually beneficial alternatives to the bundle currently under negotiation. The essence of our approach lies in combining aggregate (anonymous) knowledge of customer preferences with current data about the ongoing negotiation process. The developed procedure either works with already obtained aggregate knowledge or, in the absence of such knowledge, learns the relevant information online. We conduct computer experiments with simulated customers that have_nonlinear_ preferences. We show how, for various types of customers, with distinct negotiation heuristics, our procedure (with and without the necessary aggregate knowledge) increases the speed with which deals are reached, as well as the number and the Pareto efficiency of the deals reached compared to a benchmark.
[ { "version": "v1", "created": "Thu, 23 Dec 2004 15:21:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Somefun", "Koye", "", "1 and 2" ], [ "Klos", "Tomas", "", "1 and 2" ], [ "La Poutré", "Han", "", "1 and 2" ] ]
cs/0412107
Carlos Cabrillo
L. A. Garcia-Cortes and C. Cabrillo
A Monte Carlo algorithm for efficient large matrix inversion
13 pages, no figure. Title corrected
null
null
null
cs.DS cs.NA hep-lat
null
This paper introduces a new Monte Carlo algorithm to invert large matrices. It is based on simultaneous coupled draws from two random vectors whose covariance is the required inverse. It can be considered a generalization of a previously reported algorithm for hermitian matrices inversion based in only one draw. The use of two draws allows the inversion on non-hermitian matrices. Both the conditions for convergence and the rate of convergence are similar to the Gauss-Seidel algorithm. Results on two examples are presented, a real non-symmetric matrix related to quantitative genetics and a complex non-hermitian matrix relevant for physicists. Compared with other Monte Carlo algorithms it reveals a large reduction of the processing time showing eight times faster processing in the examples studied.
[ { "version": "v1", "created": "Thu, 23 Dec 2004 17:01:14 GMT" }, { "version": "v2", "created": "Mon, 10 Jan 2005 16:41:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Garcia-Cortes", "L. A.", "" ], [ "Cabrillo", "C.", "" ] ]
cs/0412109
Leonid Litinskii
L.B.Litinskii, B.M.Magomedov
Global minimization of a quadratic functional: neural network approach
4 pages, Lecture on 7th International Conference on Pattern Recognition and Image Analysis PRIA-07-2004, St. Petersburg, Russia
null
null
IONT-04-16
cs.NE cs.DM
null
The problem of finding out the global minimum of a multiextremal functional is discussed. One frequently faces with such a functional in various applications. We propose a procedure, which depends on the dimensionality of the problem polynomially. In our approach we use the eigenvalues and eigenvectors of the connection matrix.
[ { "version": "v1", "created": "Fri, 24 Dec 2004 13:41:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Litinskii", "L. B.", "" ], [ "Magomedov", "B. M.", "" ] ]
cs/0412110
Leonid Litinskii
D.I.Alieva, B.V.Kryzhanovsky, V.M.Kryzhanovsky, A.B.Fonarev
Q-valued neural network as a system of fast identification and pattern recognition
4 pages, Presentation on the 7th International Conference on Pattern Recognition and Image Analysis PRIA-07-2004, St. Petersburg, Russia
null
null
IONT-04-17
cs.NE cs.CV
null
An effective neural network algorithm of the perceptron type is proposed. The algorithm allows us to identify strongly distorted input vector reliably. It is shown that its reliability and processing speed are orders of magnitude higher than that of full connected neural networks. The processing speed of our algorithm exceeds the one of the stack fast-access retrieval algorithm that is modified for working when there are noises in the input channel.
[ { "version": "v1", "created": "Fri, 24 Dec 2004 13:48:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Alieva", "D. I.", "" ], [ "Kryzhanovsky", "B. V.", "" ], [ "Kryzhanovsky", "V. M.", "" ], [ "Fonarev", "A. B.", "" ] ]
cs/0412114
Pierre Andrews
Martin Rajman and Martin Vesely and Pierre Andrews
State of the Art, Evaluation and Recommendations regarding "Document Processing and Visualization Techniques"
54 pages, Report of Working Group 1 for the European Network of Excellence (NoE) in Text Mining and its Applications in Statistics (NEMIS)
null
null
null
cs.CL
null
Several Networks of Excellence have been set up in the framework of the European FP5 research program. Among these Networks of Excellence, the NEMIS project focuses on the field of Text Mining. Within this field, document processing and visualization was identified as one of the key topics and the WG1 working group was created in the NEMIS project, to carry out a detailed survey of techniques associated with the text mining process and to identify the relevant research topics in related research areas. In this document we present the results of this comprehensive survey. The report includes a description of the current state-of-the-art and practice, a roadmap for follow-up research in the identified areas, and recommendations for anticipated technological development in the domain of text mining.
[ { "version": "v1", "created": "Wed, 29 Dec 2004 15:19:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Rajman", "Martin", "" ], [ "Vesely", "Martin", "" ], [ "Andrews", "Pierre", "" ] ]
cs/0412115
Bernadette Charron-Bost
Bernadette Charron-Bost
Reductions in Distributed Computing Part I: Consensus and Atomic Commitment Tasks
27 pages, 3 figures
null
null
null
cs.DC
null
We introduce several notions of reduction in distributed computing, and investigate reduction properties of two fundamental agreement tasks, namely Consensus and Atomic Commitment. We first propose the notion of reduction "a la Karp'', an analog for distributed computing of the classical Karp reduction. We then define a weaker reduction which is the analog of Cook reduction. These two reductions are called K-reduction and C-reduction, respectively. We also introduce the notion of C*-reduction which has no counterpart in classical (namely, non distributed) systems, and which naturally arises when dealing with symmetric tasks. We establish various reducibility and irreducibility theorems with respect to these three reductions. Our main result is an incomparability statement for Consensus and Atomic Commitment tasks: we show that they are incomparable with respect to the C-reduction, except when the resiliency degree is 1, in which case Atomic Commitment is strictly harder than Consensus. A side consequence of these results is that our notion of C-reduction is strictly weaker than the one of K-reduction, even for unsolvable tasks.
[ { "version": "v1", "created": "Wed, 29 Dec 2004 19:50:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Charron-Bost", "Bernadette", "" ] ]
cs/0412116
Bernadette Charron-Bost
Bernadette Charron-Bost
Reductions in Distributed Computing Part II: k-Threshold Agreement Tasks
27 pages, 4 figures
null
null
null
cs.DC
null
We extend the results of Part I by considering a new class of agreement tasks, the so-called k-Threshold Agreement tasks (previously introduced by Charron-Bost and Le Fessant). These tasks naturally interpolate between Atomic Commitment and Consensus. Moreover, they constitute a valuable tool to derive irreducibility results between Consensus tasks only. In particular, they allow us to show that (A) for a fixed set of processes, the higher the resiliency degree is, the harder the Consensus task is, and (B) for a fixed resiliency degree, the smaller the set of processes is, the harder the Consensus task is. The proofs of these results lead us to consider new oracle-based reductions, involving a weaker variant of the C-reduction introduced in Part I. We also discuss the relationship between our results and previous ones relating f-resiliency and wait-freedom.
[ { "version": "v1", "created": "Wed, 29 Dec 2004 20:51:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Charron-Bost", "Bernadette", "" ] ]
cs/0412117
Pierre Andrews
Pierre Andrews and Martin Rajman
Thematic Annotation: extracting concepts out of documents
Technical report EPFL/LIA. 81 pages, 16 figures
null
null
IC/2004/68
cs.CL
null
Contrarily to standard approaches to topic annotation, the technique used in this work does not centrally rely on some sort of -- possibly statistical -- keyword extraction. In fact, the proposed annotation algorithm uses a large scale semantic database -- the EDR Electronic Dictionary -- that provides a concept hierarchy based on hyponym and hypernym relations. This concept hierarchy is used to generate a synthetic representation of the document by aggregating the words present in topically homogeneous document segments into a set of concepts best preserving the document's content. This new extraction technique uses an unexplored approach to topic selection. Instead of using semantic similarity measures based on a semantic resource, the later is processed to extract the part of the conceptual hierarchy relevant to the document content. Then this conceptual hierarchy is searched to extract the most relevant set of concepts to represent the topics discussed in the document. Notice that this algorithm is able to extract generic concepts that are not directly present in the document.
[ { "version": "v1", "created": "Thu, 30 Dec 2004 02:01:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Andrews", "Pierre", "" ], [ "Rajman", "Martin", "" ] ]
cs/0412119
Shmuel Varner
Shmuel Vagner
CDTP Chain Distributed Transfer Protocol
PDF. 47 pages
null
null
1937340
cs.NI cs.AR
null
The rapid growth of the internet in general and of bandwidth capacity at internet clients in particular poses increasing computation and bandwidth demands on internet servers. Internet access technologies like ADSL [DSL], Cable Modem and Wireless modem allow internet clients to access the internet with orders of magnitude more bandwidth than using traditional modems. We present CDTP a distributed transfer protocol that allows clients to cooperate and therefore remove the strain from the internet server thus achieving much better performance than traditional transfer protocols (e.g. FTP [FTP]). The CDTP server and client tools are presented also as well as results of experiments. Finally a bandwidth measurement technique is presented. CDTP tools use this technique to differentiate between slow and fast clients.
[ { "version": "v1", "created": "Thu, 30 Dec 2004 19:43:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Vagner", "Shmuel", "" ] ]
cs/0412120
Gianluca Argentini
Gianluca Argentini
An estimate of accuracy for interpolant numerical solutions of a PDE problem
13 pages, 1 figure
APPLIED AND INDUSTRIAL MATHEMATICS IN ITALY, Series on Advances in Mathematics for Applied Sciences - Vol. 69, World Scientific Company, 2005, 56 - 64.
null
null
cs.NA math-ph math.MP
null
In this paper we present an estimate of accuracy for a piecewise polynomial approximation of a classical numerical solution to a non linear differential problem. We suppose the numerical solution U is computed using a grid with a small linear step and interval time Tu, while the polynomial approximation V is an interpolation of the values of a numerical solution on a less fine grid and interval time Tv << Tu. The estimate shows that the interpolant solution V can be, under suitable hypotheses, a good approximation and in general its computational cost is much lower of the cost of the fine numerical solution. We present two possible applications to linear case and periodic case.
[ { "version": "v1", "created": "Fri, 31 Dec 2004 18:16:00 GMT" }, { "version": "v2", "created": "Sun, 2 Jan 2005 23:23:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0412121
Michael Treaster
Michael Treaster, Nadir Kiyanclar, Gregory A. Koenig, William Yurcik
A Distributed Economics-based Infrastructure for Utility Computing
8 pages, 1 figure
null
null
null
cs.DC
null
Existing attempts at utility computing revolve around two approaches. The first consists of proprietary solutions involving renting time on dedicated utility computing machines. The second requires the use of heavy, monolithic applications that are difficult to deploy, maintain, and use. We propose a distributed, community-oriented approach to utility computing. Our approach provides an infrastructure built on Web Services in which modular components are combined to create a seemingly simple, yet powerful system. The community-oriented nature generates an economic environment which results in fair transactions between consumers and providers of computing cycles while simultaneously encouraging improvements in the infrastructure of the computational grid itself.
[ { "version": "v1", "created": "Fri, 31 Dec 2004 19:16:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Treaster", "Michael", "" ], [ "Kiyanclar", "Nadir", "" ], [ "Koenig", "Gregory A.", "" ], [ "Yurcik", "William", "" ] ]
cs/0501001
Michael Treaster
Michael Treaster
A Survey of Distributed Intrusion Detection Approaches
null
null
null
null
cs.CR
null
Distributed intrustion detection systems detect attacks on computer systems by analyzing data aggregated from distributed sources. The distributed nature of the data sources allows patterns in the data to be seen that might not be detectable if each of the sources were examined individually. This paper describes the various approaches that have been developed to share and analyze data in such systems, and discusses some issues that must be addressed before fully decentralized distributed intrusion detection systems can be made viable.
[ { "version": "v1", "created": "Sat, 1 Jan 2005 03:14:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Treaster", "Michael", "" ] ]
cs/0501002
Michael Treaster
Michael Treaster
A Survey of Fault-Tolerance and Fault-Recovery Techniques in Parallel Systems
11 pages
null
null
null
cs.DC
null
Supercomputing systems today often come in the form of large numbers of commodity systems linked together into a computing cluster. These systems, like any distributed system, can have large numbers of independent hardware components cooperating or collaborating on a computation. Unfortunately, any of this vast number of components can fail at any time, resulting in potentially erroneous output. In order to improve the robustness of supercomputing applications in the presence of failures, many techniques have been developed to provide resilience to these kinds of system faults. This survey provides an overview of these various fault-tolerance techniques.
[ { "version": "v1", "created": "Sat, 1 Jan 2005 03:32:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Treaster", "Michael", "" ] ]
cs/0501003
Pavel Burovsky
P.A. Burovsky
Implementation of Motzkin-Burger algorithm in Maple
9 pages, 4 additional text files
null
null
null
cs.CG cs.CC cs.SC
null
Subject of this paper is an implementation of a well-known Motzkin-Burger algorithm, which solves the problem of finding the full set of solutions of a system of linear homogeneous inequalities. There exist a number of implementations of this algorithm, but there was no one in Maple, to the best of the author's knowledge.
[ { "version": "v1", "created": "Sat, 1 Jan 2005 04:55:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Burovsky", "P. A.", "" ] ]
cs/0501006
A. Prasad Sistla
A. Prasad Sistla
Formal Languages and Algorithms for Similarity based Retrieval from Sequence Databases
null
null
null
null
cs.LO cs.DB
null
The paper considers various formalisms based on Automata, Temporal Logic and Regular Expressions for specifying queries over sequences. Unlike traditional binary semantics, the paper presents a similarity based semantics for thse formalisms. More specifically, a distance measure in the range [0,1] is associated with a sequence, query pair denoting how closely the sequence satisfies the query. These measures are defined using a spectrum of normed vector distance measures. Various distance measures based on the syntax and the traditional semantics of the query are presented. Efficient algorithms for computing these distance measure are presented. These algorithms can be employed for retrieval of sequence from a database that closely satisfy a given.
[ { "version": "v1", "created": "Tue, 4 Jan 2005 01:05:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Sistla", "A. Prasad", "" ] ]
cs/0501007
Sariel Har-Peled
Sariel Har-Peled and Alper Ungor
A Time-Optimal Delaunay Refinement Algorithm in Two Dimensions
null
null
null
null
cs.CG
null
We propose a new refinement algorithm to generate size-optimal quality-guaranteed Delaunay triangulations in the plane. The algorithm takes $O(n \log n + m)$ time, where $n$ is the input size and $m$ is the output size. This is the first time-optimal Delaunay refinement algorithm.
[ { "version": "v1", "created": "Tue, 4 Jan 2005 22:30:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Har-Peled", "Sariel", "" ], [ "Ungor", "Alper", "" ] ]
cs/0501009
Mircea Alexandru Popescu Moscu
Mircea Alexandru Popescu Moscu
On The Liniar Time Complexity of Finite Languages
null
null
null
null
cs.CC
null
The present paper presents and proves a proposition concerning the time complexity of finite languages. It is shown herein, that for any finite language (a language for which the set of words composing it is finite) there is a Turing machine that computes the language in such a way that for any input of length k the machine stops in, at most, k + 1 steps.
[ { "version": "v1", "created": "Wed, 5 Jan 2005 19:13:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Moscu", "Mircea Alexandru Popescu", "" ] ]
cs/0501010
Manoj Kumar
Manoj Kumar
A Cryptographic Study of Some Digital Signature Schemes
This is a Ph.D. thesis,under the supervision of Prof Sunder Lal, Dr. B.R. Ambedkar University, I.B.S. Khandri,AGRA- INDIA
null
null
null
cs.CR
null
In this thesis, we propose some directed signature schemes. In addition, we have discussed their applications in different situations. In this thesis, we would like to discuss the security aspects during the design process of the proposed directed digital signature schemes. The security of the most digital signature schemes widely use in practice is based on the two difficult problems, viz; the problem of factoring integers (The RSA scheme) and the problem of finding discrete logarithms over finite fields (The ElGamal scheme). The proposed works in this thesis is divided into seven chapters.
[ { "version": "v1", "created": "Thu, 6 Jan 2005 10:21:20 GMT" }, { "version": "v2", "created": "Fri, 7 Jan 2005 05:33:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Manoj", "" ] ]
cs/0501012
Carl Lagoze
Carl Lagoze, Sandy Payette, Edwin Shin, Chris Wilper
Fedora: An Architecture for Complex Objects and their Relationships
25 pages, 8 figures Draft of submission to Journal of Digital Libraries Special Issue on Complex Objects
null
null
null
cs.DL cs.MM
null
The Fedora architecture is an extensible framework for the storage, management, and dissemination of complex objects and the relationships among them. Fedora accommodates the aggregation of local and distributed content into digital objects and the association of services with objects. This al-lows an object to have several accessible representations, some of them dy-namically produced. The architecture includes a generic RDF-based relation-ship model that represents relationships among objects and their components. Queries against these relationships are supported by an RDF triple store. The architecture is implemented as a web service, with all aspects of the complex object architecture and related management functions exposed through REST and SOAP interfaces. The implementation is available as open-source soft-ware, providing the foundation for a variety of end-user applications for digital libraries, archives, institutional repositories, and learning object systems.
[ { "version": "v1", "created": "Fri, 7 Jan 2005 17:57:05 GMT" }, { "version": "v2", "created": "Wed, 12 Jan 2005 13:16:45 GMT" }, { "version": "v3", "created": "Fri, 25 Feb 2005 20:13:37 GMT" }, { "version": "v4", "created": "Mon, 7 Mar 2005 15:14:47 GMT" }, { "version": "v5", "created": "Fri, 29 Jul 2005 13:04:31 GMT" }, { "version": "v6", "created": "Tue, 23 Aug 2005 13:26:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Payette", "Sandy", "" ], [ "Shin", "Edwin", "" ], [ "Wilper", "Chris", "" ] ]
cs/0501013
Shujun Li Dr.
Chengqing Li, Shujun Li, Der-Chyuan Lou and Dan Zhang
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
11 pages, 5 figures
Journal of Systems and Software, vol. 79, no. 2, pp. 253-258, 2006
10.1016/j.jss.2005.04.021
null
cs.CR cs.MM nlin.CD
null
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security of DSEA, and points out the following weaknesses: 1) its security against the brute-force attack was overestimated; 2) it is not sufficiently secure against ciphertext-only attacks, and only one ciphertext is enough to get some information about the plaintext and to break the value of a sub-key; 3) it is insecure against known/chosen-plaintext attacks, in the sense that the secret key can be recovered from a number of continuous bytes of only one known/chosen plaintext and the corresponding ciphertext. Experimental results are given to show the performance of the proposed attacks, and some countermeasures are discussed to improve DSEA.
[ { "version": "v1", "created": "Sat, 8 Jan 2005 15:35:13 GMT" }, { "version": "v2", "created": "Sun, 27 Aug 2006 17:27:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Chengqing", "" ], [ "Li", "Shujun", "" ], [ "Lou", "Der-Chyuan", "" ], [ "Zhang", "Dan", "" ] ]
cs/0501014
Shujun Li Dr.
Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung Lo
On the Design of Perceptual MPEG-Video Encryption Algorithms
10 pages, 5 figures, IEEEtran.cls
IEEE Transactions on Circuits and Systems for Video Technology, vol. 17, no. 2, pp. 214-223, 2007
10.1109/TCSVT.2006.888840
null
cs.MM cs.CR
null
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a simpler and more effective design is suggested, which selectively encrypts fixed-length codewords (FLC) in MPEG-video bitstreams under the control of three perceptibility factors. The proposed design is actually an encryption configuration that can work with any stream cipher or block cipher. Compared with the previously-proposed schemes, the new design provides more useful features, such as strict size-preservation, on-the-fly encryption and multiple perceptibility, which make it possible to support more applications with different requirements. In addition, four different measures are suggested to provide better security against known/chosen-plaintext attacks.
[ { "version": "v1", "created": "Sat, 8 Jan 2005 15:55:30 GMT" }, { "version": "v2", "created": "Thu, 31 Aug 2006 11:30:21 GMT" }, { "version": "v3", "created": "Tue, 27 Mar 2007 17:12:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Shujun", "" ], [ "Chen", "Guanrong", "" ], [ "Cheung", "Albert", "" ], [ "Bhargava", "Bharat", "" ], [ "Lo", "Kwok-Tung", "" ] ]
cs/0501018
Peter Turney
Peter D. Turney, Michael L. Littman, Jeffrey Bigham, Victor Shnayder
Combining Independent Modules in Lexical Multiple-Choice Problems
10 pages, related work available at http://www.cs.rutgers.edu/~mlittman/ and http://purl.org/peter.turney/
Recent Advances in Natural Language Processing III: Selected Papers from RANLP 2003, Eds: N. Nicolov, K. Botcheva, G. Angelova, and R. Mitkov, (2004), Current Issues in Linguistic Theory (CILT), 260, John Benjamins, 101-110
null
NRC-47434
cs.LG cs.CL cs.IR
null
Existing statistical approaches to natural language problems are very coarse approximations to the true complexity of language processing. As such, no single technique will be best for all problem instances. Many researchers are examining ensemble methods that combine the output of multiple modules to create more accurate solutions. This paper examines three merging rules for combining probability distributions: the familiar mixture rule, the logarithmic rule, and a novel product rule. These rules were applied with state-of-the-art results to two problems used to assess human mastery of lexical semantics -- synonym questions and analogy questions. All three merging rules result in ensembles that are more accurate than any of their component modules. The differences among the three rules are not statistically significant, but it is suggestive that the popular mixture rule is not the best rule for either of the two problems.
[ { "version": "v1", "created": "Mon, 10 Jan 2005 21:03:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "" ], [ "Littman", "Michael L.", "" ], [ "Bigham", "Jeffrey", "" ], [ "Shnayder", "Victor", "" ] ]
cs/0501019
Grigorii Pivovarov
G. B. Pivovarov and S. E. Trunov
Clustering SPIRES with EqRank
3 pp
null
null
null
cs.DL cs.IR
null
SPIRES is the largest database of scientific papers in the subject field of high energy and nuclear physics. It contains information on the citation graph of more than half a million of papers (vertexes of the citation graph). We outline the EqRank algorithm designed to cluster vertexes of directed graphs, and present the results of EqRank application to the SPIRES citation graph. The hierarchical clustering of SPIRES yielded by EqRank is used to set up a web service, which is also outlined.
[ { "version": "v1", "created": "Tue, 11 Jan 2005 05:00:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Pivovarov", "G. B.", "" ], [ "Trunov", "S. E.", "" ] ]
cs/0501020
Gianluca Lax
Francesco Buccafurri, Gianluca Lax, Domenico Sacca', Luigi Pontieri and Domenico Rosaci
Enhancing Histograms by Tree-Like Bucket Indices
26 pages, 9 figures
null
null
null
cs.DS
null
Histograms are used to summarize the contents of relations into a number of buckets for the estimation of query result sizes. Several techniques (e.g., MaxDiff and V-Optimal) have been proposed in the past for determining bucket boundaries which provide accurate estimations. However, while search strategies for optimal bucket boundaries are rather sophisticated, no much attention has been paid for estimating queries inside buckets and all of the above techniques adopt naive methods for such an estimation. This paper focuses on the problem of improving the estimation inside a bucket once its boundaries have been fixed. The proposed technique is based on the addition, to each bucket, of 32-bit additional information (organized into a 4-level tree index), storing approximate cumulative frequencies at 7 internal intervals of the bucket. Both theoretical analysis and experimental results show that, among a number of alternative ways to organize the additional information, the 4-level tree index provides the best frequency estimation inside a bucket. The index is later added to two well-known histograms, MaxDiff and V-Optimal, obtaining the non-obvious result that despite the spatial cost of 4LT which reduces the number of allowed buckets once the storage space has been fixed, the original methods are strongly improved in terms of accuracy.
[ { "version": "v1", "created": "Tue, 11 Jan 2005 10:15:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Buccafurri", "Francesco", "" ], [ "Lax", "Gianluca", "" ], [ "Sacca'", "Domenico", "" ], [ "Pontieri", "Luigi", "" ], [ "Rosaci", "Domenico", "" ] ]
cs/0501022
Lane A. Hemaspaandra
Lane A. Hemaspaandra, Harald Hempel, and Arfst Nickelsen
Algebraic Properties for Selector Functions
More recent version of most of this report appears in SICOMP, but the appendix here is not included there
SICOMP, V. 33, Number 6, pp. 1309--1337, 2004
null
URCS-TR-778 (January 7, 2004 revision)
cs.CC
null
The nondeterministic advice complexity of the P-selective sets is known to be exactly linear. Regarding the deterministic advice complexity of the P-selective sets--i.e., the amount of Karp--Lipton advice needed for polynomial-time machines to recognize them in general--the best current upper bound is quadratic [Ko, 1983] and the best current lower bound is linear [Hemaspaandra and Torenvliet, 1996]. We prove that every associatively P-selective set is commutatively, associatively P-selective. Using this, we establish an algebraic sufficient condition for the P-selective sets to have a linear upper bound (which thus would match the existing lower bound) on their deterministic advice complexity: If all P-selective sets are associatively P-selective then the deterministic advice complexity of the P-selective sets is linear. The weakest previously known sufficient condition was P=NP. We also establish related results for algebraic properties of, and advice complexity of, the nondeterministically selective sets.
[ { "version": "v1", "created": "Tue, 11 Jan 2005 23:55:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ], [ "Nickelsen", "Arfst", "" ] ]
cs/0501025
Eugenia Ternovska
Marc Denecker and Eugenia Ternovska
A Logic for Non-Monotone Inductive Definitions
50 pages, TOCL submission
null
null
null
cs.AI cs.LO
null
Well-known principles of induction include monotone induction and different sorts of non-monotone induction such as inflationary induction, induction over well-founded sets and iterated induction. In this work, we define a logic formalizing induction over well-founded sets and monotone and iterated induction. Just as the principle of positive induction has been formalized in FO(LFP), and the principle of inflationary induction has been formalized in FO(IFP), this paper formalizes the principle of iterated induction in a new logic for Non-Monotone Inductive Definitions (ID-logic). The semantics of the logic is strongly influenced by the well-founded semantics of logic programming. Our main result concerns the modularity properties of inductive definitions in ID-logic. Specifically, we formulate conditions under which a simultaneous definition $\D$ of several relations is logically equivalent to a conjunction of smaller definitions $\D_1 \land ... \land \D_n$ with disjoint sets of defined predicates. The difficulty of the result comes from the fact that predicates $P_i$ and $P_j$ defined in $\D_i$ and $\D_j$, respectively, may be mutually connected by simultaneous induction. Since logic programming and abductive logic programming under well-founded semantics are proper fragments of our logic, our modularity results are applicable there as well.
[ { "version": "v1", "created": "Thu, 13 Jan 2005 02:53:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Denecker", "Marc", "" ], [ "Ternovska", "Eugenia", "" ] ]
cs/0501026
Sourav Chakraborty
Sourav Chakraborty
On the Sensitivity of Cyclically-Invariant Boolean Functions
null
null
null
null
cs.CC
null
In this paper we construct a cyclically invariant Boolean function whose sensitivity is $\Theta(n^{1/3})$. This result answers two previously published questions. Tur\'an (1984) asked if any Boolean function, invariant under some transitive group of permutations, has sensitivity $\Omega(\sqrt{n})$. Kenyon and Kutin (2004) asked whether for a ``nice'' function the product of 0-sensitivity and 1-sensitivity is $\Omega(n)$. Our function answers both questions in the negative. We also prove that for minterm-transitive functions (a natural class of Boolean functions including our example) the sensitivity is $\Omega(n^{1/3})$. Hence for this class of functions sensitivity and block sensitivity are polynomially related.
[ { "version": "v1", "created": "Thu, 13 Jan 2005 22:06:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Chakraborty", "Sourav", "" ] ]
cs/0501027
Evan Greenberg
Evan P. Greenberg, David R. Cheriton
Enforcing Bulk Mail Classification
6 pages, changed spin on paper, added new idea (explicit tagging as a feature)
null
null
null
cs.NI
null
Spam costs US corporations upwards of $8.9 billion a year, and comprises as much as 40% of all email received. Solutions exist to reduce the amount of spam seen by end users, but cannot withstand sophisticated attacks. Worse yet, many will occasionally misclassify and silently drop legitimate email. Spammers take advantage of the near-zero cost of sending email to flood the network, knowing that success even a tiny fraction of the time means a profit. End users, however, have proven unwilling to pay money to send email to friends and family. We show that it is feasible to extend the existing mail system to reduce the amount of unwanted email, without misclassifying email, and without charging well-behaved users. We require that bulk email senders accurately classify each email message they send as an advertisement with an area of interest or else be charged a small negative incentive per message delivered. Recipients are able to filter out email outside their scope of interest, while senders are able to focus their sendings to the appropriate audience.
[ { "version": "v1", "created": "Thu, 13 Jan 2005 23:37:10 GMT" }, { "version": "v2", "created": "Thu, 19 May 2005 21:22:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Greenberg", "Evan P.", "" ], [ "Cheriton", "David R.", "" ] ]
cs/0501029
Filippo Furfaro
Francesco Buccafurri, Filippo Furfaro, Domenico Sacca'
Estimating Range Queries using Aggregate Data with Integrity Constraints: a Probabilistic Approach
46 pages, 6 figures
null
null
null
cs.DB
null
The problem of recovering (count and sum) range queries over multidimensional data only on the basis of aggregate information on such data is addressed. This problem can be formalized as follows. Suppose that a transformation T producing a summary from a multidimensional data set is used. Now, given a data set D, a summary S=T(D) and a range query r on D, the problem consists of studying r by modelling it as a random variable defined over the sample space of all the data sets D' such that T(D) = S. The study of such a random variable, done by the definition of its probability distribution and the computation of its mean value and variance, represents a well-founded, theoretical probabilistic approach for estimating the query only on the basis of the available information (that is the summary S) without assumptions on original data.
[ { "version": "v1", "created": "Fri, 14 Jan 2005 19:45:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Buccafurri", "Francesco", "" ], [ "Furfaro", "Filippo", "" ], [ "Sacca'", "Domenico", "" ] ]
cs/0501030
Sergey Tsarev P.
Sergey P. Tsarev
Generalized Laplace transformations and integration of hyperbolic systems of linear partial differential equations
LaTeX, 17 pages, Submitted to ISSAC 2005, Beijing, China, July 24--27 2005
null
null
null
cs.SC math.AP nlin.SI
null
We give a new procedure for generalized factorization and construction of the complete solution of strictly hyperbolic linear partial differential equations or strictly hyperbolic systems of such equations in the plane. This procedure generalizes the classical theory of Laplace transformations of second-order equations in the plane.
[ { "version": "v1", "created": "Sat, 15 Jan 2005 15:57:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Tsarev", "Sergey P.", "" ] ]
cs/0501032
Riccardo Pucella
Riccardo Pucella
On Partially Additive Kleene Algebras
23 pages; to be presented at the 8th International Conference on Relational Methods in Computer Science (RelMiCS 8)
null
null
null
cs.LO
null
We define the notion of a partially additive Kleene algebra, which is a Kleene algebra where the + operation need only be partially defined. These structures formalize a number of examples that cannot be handled directly by Kleene algebras. We relate partially additive Kleene algebras to existing algebraic structures, by exhibiting categorical connections with Kleene algebras, partially additive categories, and closed semirings.
[ { "version": "v1", "created": "Sun, 16 Jan 2005 20:39:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
cs/0501036
Jos\'e Ghislain Quenum
Jose Ghislain Quenum Samir Aknine
Enabling Agents to Dynamically Select Protocols for Interactions
null
null
null
null
cs.MA cs.SE
null
in this paper we describe a method which allows agents to dynamically select protocols and roles when they need to execute collaborative tasks
[ { "version": "v1", "created": "Tue, 18 Jan 2005 17:08:05 GMT" }, { "version": "v2", "created": "Tue, 25 Jan 2005 18:31:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Aknine", "Jose Ghislain Quenum Samir", "" ] ]
cs/0501037
Michele Tucci
Michele Tucci
Oligopolistic Competition in an Evolutionary Environment: a Computer Simulation
PDF, 20 pages, 4 graphs and a post-scriptum
null
null
null
cs.CY
null
The following notes contain a computer simulation concerning effective competition in an evolutionary environment. The scope is to underline the existence of a side effect pertaining to the competitive processes: the tendency toward an excess of supply by producers which operate in a strongly competitive situation. A set of four oligopolistic firms will be employed in the formal reconstruction. The simulation will operate following the Edmond Malinvaud "short side" approach, as far as the price adjustment is concerned, and the sequential Hicksian "weeks" structure with regard of the temporal characterization. The content of the present paper ought to be considered as a development of the writing: Michele Tucci, Evolution and Gravitation: a Computer Simulation of a Non-Walrasian Equilibrium Model, published with the E-print Archives at arXiv.com (section: Computer Science, registration number: cs.CY/0209017). In such a paper there can be found some preliminary considerations regarding the comparison between the evolutionary and the gravitational paradigms and the evaluation of approaches belonging to rival schools of economic thought.
[ { "version": "v1", "created": "Tue, 18 Jan 2005 18:52:49 GMT" }, { "version": "v2", "created": "Tue, 18 Jan 2005 21:59:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Tucci", "Michele", "" ] ]
cs/0501038
D. J. Capelis
D.J. Capelis
Data Tastes Better Seasoned: Introducing the ASH Family of Hashing Algorithms
5 pages
null
null
null
cs.CR
null
Over the recent months it has become clear that the current generation of cryptographic hashing algorithms are insufficient to meet future needs. The ASH family of algorithms provides modifications to the existing SHA-2 family. These modifications are designed with two main goals: 1) Providing increased collision resistance. 2) Increasing mitigation of security risks post-collision. The unique public/private sections and salt/pepper design elements provide increased flexibility for a broad range of applications. The ASH family is a new generation of cryptographic hashing algorithms.
[ { "version": "v1", "created": "Wed, 19 Jan 2005 10:28:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Capelis", "D. J.", "" ] ]
cs/0501041
Alexander Kondratiev
A. S. Kondratiev (1 and 2) and N. P. Polishchuk (2) ((1) Moscow Power Engineering Institute, (2) Altair Naval Research Institute of Radio Electronics)
Two Iterative Algorithms for Solving Systems of Simultaneous Linear Algebraic Equations with Real Matrices of Coefficients
5 pages; 0 figures; 4 references
null
null
null
cs.NA
null
The paper describes two iterative algorithms for solving general systems of M simultaneous linear algebraic equations (SLAE) with real matrices of coefficients. The system can be determined, underdetermined, and overdetermined. Linearly dependent equations are also allowed. Both algorithms use the method of Lagrange multipliers to transform the original SLAE into a positively determined function F of real original variables X(i) (i=1,...,N) and Lagrange multipliers Lambda(i) (i=1,...,M). Function F is differentiated with respect to variables X(i) and the obtained relationships are used to express F in terms of Lagrange multipliers Lambda(i). The obtained function is minimized with respect to variables Lambda(i) with the help of one of two the following minimization techniques: (1) relaxation method or (2) method of conjugate gradients by Fletcher and Reeves. Numerical examples are given.
[ { "version": "v1", "created": "Thu, 20 Jan 2005 13:20:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Kondratiev", "A. S.", "", "1 and 2" ], [ "Polishchuk", "N. P.", "" ] ]
cs/0501042
Martin Bernauer
Martin Bernauer
Maintaining Consistency of Data on the Web
null
null
null
null
cs.DB cs.DS
null
Increasingly more data is becoming available on the Web, estimates speaking of 1 billion documents in 2002. Most of the documents are Web pages whose data is considered to be in XML format, expecting it to eventually replace HTML. A common problem in designing and maintaining a Web site is that data on a Web page often replicates or derives from other data, the so-called base data, that is usually not contained in the deriving or replicating page. Consequently, replicas and derivations become inconsistent upon modifying base data in a Web page or a relational database. For example, after assigning a thesis to a student and modifying the Web page that describes it in detail, the thesis is still incorrectly contained in the list of offered thesis, missing in the list of ongoing thesis, and missing in the advisor's teaching record. The thesis presents a solution by proposing a combined approach that provides for maintaining consistency of data in Web pages that (i) replicate data in relational databases, or (ii) replicate or derive from data in Web pages. Upon modifying base data, the modification is immediately pushed to affected Web pages. There, maintenance is performed incrementally by only modifying the affected part of the page instead of re-generating the whole page from scratch.
[ { "version": "v1", "created": "Thu, 20 Jan 2005 14:11:03 GMT" }, { "version": "v2", "created": "Tue, 25 Jan 2005 16:00:49 GMT" }, { "version": "v3", "created": "Wed, 9 Feb 2005 19:59:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bernauer", "Martin", "" ] ]
cs/0501044
Alexander Haubold
Alexander Haubold, John R. Kender
Augmented Segmentation and Visualization for Presentation Videos
null
null
null
null
cs.MM cs.IR
null
We investigate methods of segmenting, visualizing, and indexing presentation videos by separately considering audio and visual data. The audio track is segmented by speaker, and augmented with key phrases which are extracted using an Automatic Speech Recognizer (ASR). The video track is segmented by visual dissimilarities and augmented by representative key frames. An interactive user interface combines a visual representation of audio, video, text, and key frames, and allows the user to navigate a presentation video. We also explore clustering and labeling of speaker data and present preliminary results.
[ { "version": "v1", "created": "Thu, 20 Jan 2005 17:12:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ], [ "Kender", "John R.", "" ] ]
cs/0501045
Kenneth Clarkson
Kenneth L. Clarkson and Kasturi Varadarajan
Improved Approximation Algorithms for Geometric Set Cover
null
null
null
null
cs.CG cs.DS
null
Given a collection S of subsets of some set U, and M a subset of U, the set cover problem is to find the smallest subcollection C of S such that M is a subset of the union of the sets in C. While the general problem is NP-hard to solve, even approximately, here we consider some geometric special cases, where usually U = R^d. Extending prior results, we show that approximation algorithms with provable performance exist, under a certain general condition: that for a random subset R of S and function f(), there is a decomposition of the portion of U not covered by R into an expected f(|R|) regions, each region of a particular simple form. We show that under this condition, a cover of size O(f(|C|)) can be found. Our proof involves the generalization of shallow cuttings to more general geometric situations. We obtain constant-factor approximation algorithms for covering by unit cubes in R^3, for guarding a one-dimensional terrain, and for covering by similar-sized fat triangles in R^2. We also obtain improved approximation guarantees for fat triangles, of arbitrary size, and for a class of fat objects.
[ { "version": "v1", "created": "Thu, 20 Jan 2005 21:31:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Clarkson", "Kenneth L.", "" ], [ "Varadarajan", "Kasturi", "" ] ]
cs/0501053
Vadim Tropashko
Vadim Tropashko
Relational Algebra as non-Distributive Lattice
9 pages
null
null
null
cs.DB
null
We reduce the set of classic relational algebra operators to two binary operations: natural join and generalized union. We further demonstrate that this set of operators is relationally complete and honors lattice axioms.
[ { "version": "v1", "created": "Fri, 21 Jan 2005 20:07:32 GMT" }, { "version": "v2", "created": "Thu, 3 Feb 2005 03:45:10 GMT" }, { "version": "v3", "created": "Fri, 4 Feb 2005 01:12:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Tropashko", "Vadim", "" ] ]
cs/0501059
Farn Wang
Farn Wang
Under-approximation of the Greatest Fixpoint in Real-Time System Verification
null
null
null
null
cs.SE cs.LO
null
Techniques for the efficient successive under-approximation of the greatest fixpoint in TCTL formulas can be useful in fast refutation of inevitability properties and vacuity checking. We first give an integrated algorithmic framework for both under and over-approximate model-checking. We design the {\em NZF (Non-Zeno Fairness) predicate}, with a greatest fixpoint formulation, as a unified framework for the evaluation of formulas like $\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then prove the correctness of a new formulation for the characterization of the NZF predicate based on zone search and the least fixpoint evaluation. The new formulation then leads to the design of an evaluation algorithm, with the capability of successive under-approximation, for $\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then present techniques to efficiently search for the zones and to speed up the under-approximate evaluation of those three formulas. Our experiments show that the techniques have significantly enhanced the verification performance against several benchmarks over exact model-checking.
[ { "version": "v1", "created": "Sat, 22 Jan 2005 11:02:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Farn", "" ] ]
cs/0501060
Farn Wang
Farn Wang
Under-approximation of the Greatest Fixpoints in Real-Time System Verification
null
null
null
null
cs.SE cs.LO
null
Techniques for the efficient successive under-approximation of the greatest fixpoint in TCTL formulas can be useful in fast refutation of inevitability properties and vacuity checking. We first give an integrated algorithmic framework for both under and over-approximate model-checking. We design the {\em NZF (Non-Zeno Fairness) predicate}, with a greatest fixpoint formulation, as a unified framework for the evaluation of formulas like $\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then prove the correctness of a new formulation for the characterization of the NZF predicate based on zone search and the least fixpoint evaluation. The new formulation then leads to the design of an evaluation algorithm, with the capability of successive under-approximation, for $\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then present techniques to efficiently search for the zones and to speed up the under-approximate evaluation of those three formulas. Our experiments show that the techniques have significantly enhanced the verification performance against several benchmarks over exact model-checking.
[ { "version": "v1", "created": "Sat, 22 Jan 2005 11:03:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Farn", "" ] ]
cs/0501065
Vladimir Clue Mr
Vladimir I Clue
Harmonic Analysis
This new twist in harmonic analysis was primary introduced in Milwaukee's conference http://www.eit-conference.info/papers.asp
null
null
null
cs.NA cs.DM
null
This paper describes a method of calculating the transforms, currently obtained via Fourier and reverse Fourier transforms. The method allows calculating efficiently the transforms of a signal having an arbitrary dimension of the digital representation by reducing the transform to a vector-to-circulant matrix multiplying. There is a connection between harmonic equations in rectangular and polar coordinate systems. The connection established here and used to create a very robust iterative algorithm for a conformal mapping calculation. There is also suggested a new ratio (and an efficient way of computing it) of two oscillative signals.
[ { "version": "v1", "created": "Mon, 24 Jan 2005 00:01:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Clue", "Vladimir I", "" ] ]
cs/0501068
Jean-Francois Mari
Olivier Aycard (GRAVIR - Imag, Orpailleur Loria), Jean-Francois Mari (ORPAILLEUR Loria), Richard Washington
Learning to automatically detect features for mobile robots using second-order Hidden Markov Models
2004
null
null
null
cs.AI
null
In this paper, we propose a new method based on Hidden Markov Models to interpret temporal sequences of sensor data from mobile robots to automatically detect features. Hidden Markov Models have been used for a long time in pattern recognition, especially in speech recognition. Their main advantages over other methods (such as neural networks) are their ability to model noisy temporal signals of variable length. We show in this paper that this approach is well suited for interpretation of temporal sequences of mobile-robot sensor data. We present two distinct experiments and results: the first one in an indoor environment where a mobile robot learns to detect features like open doors or T-intersections, the second one in an outdoor environment where a different mobile robot has to identify situations like climbing a hill or crossing a rock.
[ { "version": "v1", "created": "Mon, 24 Jan 2005 11:05:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Aycard", "Olivier", "", "GRAVIR - Imag, Orpailleur Loria" ], [ "Mari", "Jean-Francois", "", "ORPAILLEUR Loria" ], [ "Washington", "Richard", "" ] ]
cs/0501069
Supriya Krishnamurthy
Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell and Seif Haridi
A Statistical Theory of Chord under Churn
6 pages, In the 4th International Workshop on Peer-to- Peer Systems (IPTPS'05), Ithaca, New York, USA, 2005
null
null
null
cs.NI cond-mat.stat-mech cs.DC
null
Most earlier studies of Distributed Hash Tables (DHTs) under churn have either depended on simulations as the primary investigation tool, or on establishing bounds for DHTs to function. In this paper, we present a complete analytical study of churn using a master-equation-based approach, used traditionally in non-equilibrium statistical mechanics to describe steady-state or transient phenomena. Simulations are used to verify all theoretical predictions. We demonstrate the application of our methodology to the Chord system. For any rate of churn and stabilization rates, and any system size, we accurately predict the fraction of failed or incorrect successor and finger pointers and show how we can use these quantities to predict the performance and consistency of lookups under churn. We also discuss briefly how churn may actually be of different 'types' and the implications this will have for the functioning of DHTs in general.
[ { "version": "v1", "created": "Mon, 24 Jan 2005 16:22:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Krishnamurthy", "Supriya", "" ], [ "El-Ansary", "Sameh", "" ], [ "Aurell", "Erik", "" ], [ "Haridi", "Seif", "" ] ]
cs/0501070
David Lorenz
David H. Lorenz, Therapon Skotiniotis
Extending Design by Contract for Aspect-Oriented Programming
null
null
null
NU-CCIS-04-14
cs.SE cs.PL
null
Design by Contract (DbC) and runtime enforcement of program assertions enables the construction of more robust software. It also enables the assignment of blame in error reporting. Unfortunately, there is no support for runtime contract enforcement and blame assignment for Aspect-Oriented Programming (AOP). Extending DbC to also cover aspects brings forward a plethora of issues related to the correct order of assertion validation. We show that there is no generally correct execution sequence of object assertions and aspect assertions. A further classification of aspects as agnostic, obedient, or rebellious defines the order of assertion validation that needs to be followed. We describe the application of this classification in a prototyped DbC tool for AOP named Cona, where aspects are used for implementing contracts, and contracts are used for enforcing assertions on aspects.
[ { "version": "v1", "created": "Mon, 24 Jan 2005 20:28:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Lorenz", "David H.", "" ], [ "Skotiniotis", "Therapon", "" ] ]
cs/0501072
Thierry Poibeau
Dominique Dutoit, Thierry Poibeau (LIPN)
Inferring knowledge from a large semantic network
null
Inferring knowledge from a large semantic network (2002) 232-238
null
null
cs.AI
null
In this paper, we present a rich semantic network based on a differential analysis. We then detail implemented measures that take into account common and differential features between words. In a last section, we describe some industrial applications.
[ { "version": "v1", "created": "Tue, 25 Jan 2005 16:09:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Dutoit", "Dominique", "", "LIPN" ], [ "Poibeau", "Thierry", "", "LIPN" ] ]
cs/0501073
Tom Schrijvers
Tom Schrijvers and Thom Fruehwirth
Optimal Union-Find in Constraint Handling Rules
12 pages, 3 figures, to appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.CC cs.DS cs.PF
null
Constraint Handling Rules (CHR) is a committed-choice rule-based language that was originally intended for writing constraint solvers. In this paper we show that it is also possible to write the classic union-find algorithm and variants in CHR. The programs neither compromise in declarativeness nor efficiency. We study the time complexity of our programs: they match the almost-linear complexity of the best known imperative implementations. This fact is illustrated with experimental results.
[ { "version": "v1", "created": "Tue, 25 Jan 2005 13:28:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Schrijvers", "Tom", "" ], [ "Fruehwirth", "Thom", "" ] ]
cs/0501075
Marius Zimand
Marius Zimand
Simple extractors via constructions of cryptographic pseudo-random generators
21 pages, an extended abstract will appear in Proc. ICALP 2005; small corrections, some comments and references added
null
null
null
cs.CC cs.CR
null
Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-random generators from one-way permutations (the Blum-Micali-Yao approach) can be used for building extractors as well. Using this new technique we build extractors that do not use designs and polynomial-based error-correcting codes and that are very simple and efficient. For example, one extractor produces each output bit separately in $O(\log^2 n)$ time. These extractors work for weak sources with min entropy $\lambda n$, for arbitrary constant $\lambda > 0$, have seed length $O(\log^2 n)$, and their output length is $\approx n^{\lambda/3}$.
[ { "version": "v1", "created": "Tue, 25 Jan 2005 15:43:11 GMT" }, { "version": "v2", "created": "Wed, 2 Feb 2005 17:55:47 GMT" }, { "version": "v3", "created": "Mon, 9 May 2005 13:29:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Zimand", "Marius", "" ] ]
cs/0501076
Ketan Mulmuley D.
Ketan D. Mulmuley and Milind Sohoni
Geometric Complexity III: on deciding positivity of Littlewood-Richardson coefficients
10 pages
null
null
null
cs.CC math.RT
null
We point out that the remarkable Knutson and Tao Saturation Theorem and polynomial time algorithms for LP have together an important and immediate consequence in Geometric Complexity Theory. The problem of deciding positivity of Littlewood-Richardson coefficients for GLn(C) belongs to P. Furthermore, the algorithm is strongly polynomial. The main goal of this article is to explain the significance of this result in the context of Geometric Complexity Theory. Furthermore, it is also conjectured that an analogous result holds for arbitrary symmetrizable Kac-Moody algebras.
[ { "version": "v1", "created": "Wed, 26 Jan 2005 11:58:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ], [ "Sohoni", "Milind", "" ] ]
cs/0501077
Andrew Krizhanovsky A.
Alexander Smirnov, Mikhail Pashkin, Nikolai Chilov, Tatiana Levashova, Andrew Krizhanovsky and Alexey Kashevnik
Ontology-Based Users & Requests Clustering in Customer Service Management System
15 pages, 4 figures, published in Lecture Notes in Computer Science
Smirnov A., Pashkin M., Chilov N., Levashova T., Krizhanovsky A., Kashevnik A. 2005. Ontology-Based Users and Requests Clustering in Customer Service Management System. Springer-Verlag GmbH, Lecture Notes in Computer Science, 3505: 231-246
null
null
cs.IR cs.CL
null
Customer Service Management is one of major business activities to better serve company customers through the introduction of reliable processes and procedures. Today this kind of activities is implemented through e-services to directly involve customers into business processes. Traditionally Customer Service Management involves application of data mining techniques to discover usage patterns from the company knowledge memory. Hence grouping of customers/requests to clusters is one of major technique to improve the level of company customization. The goal of this paper is to present an efficient for implementation approach for clustering users and their requests. The approach uses ontology as knowledge representation model to improve the semantic interoperability between units of the company and customers. Some fragments of the approach tested in an industrial company are also presented in the paper.
[ { "version": "v1", "created": "Wed, 26 Jan 2005 14:11:38 GMT" }, { "version": "v2", "created": "Fri, 27 May 2005 13:59:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Smirnov", "Alexander", "" ], [ "Pashkin", "Mikhail", "" ], [ "Chilov", "Nikolai", "" ], [ "Levashova", "Tatiana", "" ], [ "Krizhanovsky", "Andrew", "" ], [ "Kashevnik", "Alexey", "" ] ]
cs/0501078
Liang Zhou
Liang Zhou, Miruna Ticrea and Eduard Hovy
Multi-document Biography Summarization
null
Proceedings of EMNLP, pp. 434-441, 2004
null
null
cs.CL
null
In this paper we describe a biography summarization system using sentence classification and ideas from information retrieval. Although the individual techniques are not new, assembling and applying them to generate multi-document biographies is new. Our system was evaluated in DUC2004. It is among the top performers in task 5-short summaries focused by person questions.
[ { "version": "v1", "created": "Wed, 26 Jan 2005 22:43:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Liang", "" ], [ "Ticrea", "Miruna", "" ], [ "Hovy", "Eduard", "" ] ]
cs/0501079
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
Data Mining for Actionable Knowledge: A Survey
11 pages
null
null
Tr-05-01
cs.DB cs.AI
null
The data mining process consists of a series of steps ranging from data cleaning, data selection and transformation, to pattern evaluation and visualization. One of the central problems in data mining is to make the mined patterns or knowledge actionable. Here, the term actionable refers to the mined patterns suggest concrete and profitable actions to the decision-maker. That is, the user can do something to bring direct benefits (increase in profits, reduction in cost, improvement in efficiency, etc.) to the organization's advantage. However, there has been written no comprehensive survey available on this topic. The goal of this paper is to fill the void. In this paper, we first present two frameworks for mining actionable knowledge that are inexplicitly adopted by existing research methods. Then we try to situate some of the research on this topic from two different viewpoints: 1) data mining tasks and 2) adopted framework. Finally, we specify issues that are either not addressed or insufficiently studied yet and conclude the paper.
[ { "version": "v1", "created": "Thu, 27 Jan 2005 12:13:16 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0501080
Carl Lagoze
Carl Lagoze, Dean B. Krafft, Susan Jesuroga, Tim Cornwell, Ellen J. Cramer, Eddie Shin
An Information Network Overlay Architecture for the NSDL
null
null
null
null
cs.DL
null
We describe the underlying data model and implementation of a new architecture for the National Science Digital Library (NSDL) by the Core Integration Team (CI). The architecture is based on the notion of an information network overlay. This network, implemented as a graph of digital objects in a Fedora repository, allows the representation of multiple information entities and their relationships. The architecture provides the framework for contextualization and reuse of resources, which we argue is essential for the utility of the NSDL as a tool for teaching and learning.
[ { "version": "v1", "created": "Thu, 27 Jan 2005 19:49:11 GMT" }, { "version": "v2", "created": "Wed, 2 Feb 2005 21:04:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Krafft", "Dean B.", "" ], [ "Jesuroga", "Susan", "" ], [ "Cornwell", "Tim", "" ], [ "Cramer", "Ellen J.", "" ], [ "Shin", "Eddie", "" ] ]
cs/0501083
Jon Phipps
Jon Phipps, Diane I. Hillmann, Gordon Paynter
Orchestrating Metadata Enhancement Services: Introducing Lenny
null
null
null
null
cs.DL
null
Harvested metadata often suffers from uneven quality to the point that utility is compromised. Although some aggregators have developed methods for evaluating and repairing specific metadata problems, it has been unclear how these methods might be scaled into services that can be used within an automated production environment. The National Science Digital Library (NSDL), as part of its work with INFOMINE, has developed a model of ser-vice interaction that enables loosely-coupled third party services to provide metadata enhancements to a central repository, with interactions orchestrated by a centralized software application.
[ { "version": "v1", "created": "Fri, 28 Jan 2005 18:44:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Phipps", "Jon", "" ], [ "Hillmann", "Diane I.", "" ], [ "Paynter", "Gordon", "" ] ]
cs/0501084
Axel Polleres
Thomas Eiter and Axel Polleres
Towards Automated Integration of Guess and Check Programs in Answer Set Programming: A Meta-Interpreter and Applications
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
1843-04-01
cs.AI
null
Answer set programming (ASP) with disjunction offers a powerful tool for declaratively representing and solving hard problems. Many NP-complete problems can be encoded in the answer set semantics of logic programs in a very concise and intuitive way, where the encoding reflects the typical "guess and check" nature of NP problems: The property is encoded in a way such that polynomial size certificates for it correspond to stable models of a program. However, the problem-solving capacity of full disjunctive logic programs (DLPs) is beyond NP, and captures a class of problems at the second level of the polynomial hierarchy. While these problems also have a clear "guess and check" structure, finding an encoding in a DLP reflecting this structure may sometimes be a non-obvious task, in particular if the "check" itself is a coNP-complete problem; usually, such problems are solved by interleaving separate guess and check programs, where the check is expressed by inconsistency of the check program. In this paper, we present general transformations of head-cycle free (extended) disjunctive logic programs into stratified and positive (extended) disjunctive logic programs based on meta-interpretation techniques. The answer sets of the original and the transformed program are in simple correspondence, and, moreover, inconsistency of the original program is indicated by a designated answer set of the transformed program. Our transformations facilitate the integration of separate "guess" and "check" programs, which are often easy to obtain, automatically into a single disjunctive logic program. Our results complement recent results on meta-interpretation in ASP, and extend methods and techniques for a declarative "guess and check" problem solving paradigm through ASP.
[ { "version": "v1", "created": "Fri, 28 Jan 2005 20:19:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiter", "Thomas", "" ], [ "Polleres", "Axel", "" ] ]
cs/0501086
Manuela Kunze
Peter M. Kruse and Andre Naujoks and Dietmar Roesner and Manuela Kunze
Clever Search: A WordNet Based Wrapper for Internet Search Engines
null
Proceedings of 2nd GermaNet Workshop 2005
null
null
cs.AI
null
This paper presents an approach to enhance search engines with information about word senses available in WordNet. The approach exploits information about the conceptual relations within the lexical-semantic net. In the wrapper for search engines presented, WordNet information is used to specify user's request or to classify the results of a publicly available web search engine, like google, yahoo, etc.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 16:00:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Kruse", "Peter M.", "" ], [ "Naujoks", "Andre", "" ], [ "Roesner", "Dietmar", "" ], [ "Kunze", "Manuela", "" ] ]
cs/0501087
Manoj Kumar
Manoj Kumar
Faults and Improvements of an Enhanced Remote User Authentication Scheme Using Smart Cards
5 pages
null
null
null
cs.CR
null
In 2000, Hwang and Li proposed a remote user authentication scheme using smart cards to solve the problems of Lamport scheme. Later, Chan- Chang, Shen- Lin- Hwang and then Chang-Hwang pointed out some attacks on Hwang &#8211; Li&#8217;s scheme. In 2003, Shen, Lin and Hwang also proposed a modified scheme to remove these attacks. In the same year, Leung-Cheng-Fong-Chan showed that modified scheme proposed by Shen-Lin-Hwang is still insecure. In 2004, Awasthi and Lal enhanced Shen-Lin-Hwang&#8217;s scheme to overcome its security pitfalls. This paper analyses that the user U/smart card does not provide complete information for the execution and proper running of the login phase of the Awasthi- Lal&#8217;s scheme. Furthermore, this paper also modifies the Awasthi- Lal&#8217;s scheme for the proper functioning.
[ { "version": "v1", "created": "Sat, 29 Jan 2005 06:44:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Manoj", "" ] ]
cs/0501089
Manuela Kunze
Manuela Kunze and Dietmar Roesner
Issues in Exploiting GermaNet as a Resource in Real Applications
10 pages, 3 figures
null
null
null
cs.AI
null
This paper reports about experiments with GermaNet as a resource within domain specific document analysis. The main question to be answered is: How is the coverage of GermaNet in a specific domain? We report about results of a field test of GermaNet for analyses of autopsy protocols and present a sketch about the integration of GermaNet inside XDOC. Our remarks will contribute to a GermaNet user's wish list.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 10:07:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Kunze", "Manuela", "" ], [ "Roesner", "Dietmar", "" ] ]
cs/0501093
Manuela Kunze
Manuela Kunze and Dietmar Roesner
Transforming Business Rules Into Natural Language Text
3 pages
in Proceedings of IWCS-6, 2005
null
null
cs.AI
null
The aim of the project presented in this paper is to design a system for an NLG architecture, which supports the documentation process of eBusiness models. A major task is to enrich the formal description of an eBusiness model with additional information needed in an NLG task.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 07:59:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Kunze", "Manuela", "" ], [ "Roesner", "Dietmar", "" ] ]
cs/0501094
Manuela Kunze
Manuela Kunze and Dietmar Roesner
Corpus based Enrichment of GermaNet Verb Frames
4 pages
in Proceedings of LREC 2004
null
null
cs.AI
null
Lexical semantic resources, like WordNet, are often used in real applications of natural language document processing. For example, we integrated GermaNet in our document suite XDOC of processing of German forensic autopsy protocols. In addition to the hypernymy and synonymy relation, we want to adapt GermaNet's verb frames for our analysis. In this paper we outline an approach for the domain related enrichment of GermaNet verb frames by corpus based syntactic and co-occurred data analyses of real documents.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 08:36:39 GMT" }, { "version": "v2", "created": "Tue, 1 Feb 2005 08:06:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Kunze", "Manuela", "" ], [ "Roesner", "Dietmar", "" ] ]
cs/0501095
Manuela Kunze
Manuela Kunze and Dietmar Roesner
Context Related Derivation of Word Senses
5 pages, 2 figures
in Proceedings of Ontolex- Workshop 2004
null
null
cs.AI
null
Real applications of natural language document processing are very often confronted with domain specific lexical gaps during the analysis of documents of a new domain. This paper describes an approach for the derivation of domain specific concepts for the extension of an existing ontology. As resources we need an initial ontology and a partially processed corpus of a domain. We exploit the specific characteristic of the sublanguage in the corpus. Our approach is based on syntactical structures (noun phrases) and compound analyses to extract information required for the extension of GermaNet's lexical resources.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 09:25:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Kunze", "Manuela", "" ], [ "Roesner", "Dietmar", "" ] ]
cs/0501096
Manuela Kunze
Dietmar Roesner and Manuela Kunze and Sylke Kroetzsch
Transforming and Enriching Documents for the Semantic Web
10 pages, 1 figure
KI (1), 2004
null
null
cs.AI
null
We suggest to employ techniques from Natural Language Processing (NLP) and Knowledge Representation (KR) to transform existing documents into documents amenable for the Semantic Web. Semantic Web documents have at least part of their semantics and pragmatics marked up explicitly in both a machine processable as well as human readable manner. XML and its related standards (XSLT, RDF, Topic Maps etc.) are the unifying platform for the tools and methodologies developed for different application scenarios.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 09:48:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Roesner", "Dietmar", "" ], [ "Kunze", "Manuela", "" ], [ "Kroetzsch", "Sylke", "" ] ]
cs/0502002
Manoj Kumar
Manoj Kumar
Directed Threshold Multi &#8211; Signature Scheme without SDC
13 pages
null
null
null
cs.CR
null
In this paper, we propose a Directed threshold multisignature scheme without SDC. This signature scheme is applicable when the message is sensitive to the signature receiver; and the signatures are generated by the cooperation of a number of people from a given group of senders. In this scheme, any malicious set of signers cannot impersonate any other set of signers to forge the signatures. In case of forgery, it is possible to trace the signing set.
[ { "version": "v1", "created": "Tue, 1 Feb 2005 06:29:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Manoj", "" ] ]
cs/0502003
Sandor P. Fekete
Alexander Kroeller, Dennis Pfisterer, Carsten Buschmann, Sandor P. Fekete, and Stefan Fischer
Shawn: A new approach to simulating wireless sensor networks
10 pages, 2 figures, 2 tables, Latex, to appear in Design, Analysis, and Simulation of Distributed Systems 2005
null
null
null
cs.DC cs.PF
null
We consider the simulation of wireless sensor networks (WSN) using a new approach. We present Shawn, an open-source discrete-event simulator that has considerable differences to all other existing simulators. Shawn is very powerful in simulating large scale networks with an abstract point of view. It is, to the best of our knowledge, the first simulator to support generic high-level algorithms as well as distributed protocols on exactly the same underlying networks.
[ { "version": "v1", "created": "Tue, 1 Feb 2005 12:23:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Kroeller", "Alexander", "" ], [ "Pfisterer", "Dennis", "" ], [ "Buschmann", "Carsten", "" ], [ "Fekete", "Sandor P.", "" ], [ "Fischer", "Stefan", "" ] ]
cs/0502006
Alejandro Ceccatto
P.M. Granitto, P.F. Verdes and H.A. Ceccatto
Neural network ensembles: Evaluation of aggregation algorithms
35 pages, 2 figures, In press AI Journal
null
null
null
cs.AI cs.NE
null
Ensembles of artificial neural networks show improved generalization capabilities that outperform those of single networks. However, for aggregation to be effective, the individual networks must be as accurate and diverse as possible. An important problem is, then, how to tune the aggregate members in order to have an optimal compromise between these two conflicting conditions. We present here an extensive evaluation of several algorithms for ensemble construction, including new proposals and comparing them with standard methods in the literature. We also discuss a potential problem with sequential aggregation algorithms: the non-frequent but damaging selection through their heuristics of particularly bad ensemble members. We introduce modified algorithms that cope with this problem by allowing individual weighting of aggregate members. Our algorithms and their weighted modifications are favorably tested against other methods in the literature, producing a sensible improvement in performance on most of the standard statistical databases used as benchmarks.
[ { "version": "v1", "created": "Tue, 1 Feb 2005 21:22:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Granitto", "P. M.", "" ], [ "Verdes", "P. F.", "" ], [ "Ceccatto", "H. A.", "" ] ]
cs/0502007
Alexander Shaydurov S.
Alexander Shaydurov
Identification of complex systems in the basis of wavelets
4 pages, 6 figures
null
null
null
cs.CE cs.NE
null
In this paper is proposed the method of the identification of complex dynamic systems. Method can be used for the identification of linear and nonlinear complex dynamic systems for the determined or stochastic signals at the inputs and the outputs. It is proposed to use a basis of wavelets for obtaining the impulse transient function (ITF) of system. ITF is considered in the form of surface in the 3D space. Are given the results of experiments on the identification of systems in the basis of wavelets.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 00:12:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Shaydurov", "Alexander", "" ] ]
cs/0502008
Jim Gray
Jim Gray, David T. Liu, Maria Nieto-Santisteban, Alexander S. Szalay, David DeWitt, Gerd Heber
Scientific Data Management in the Coming Decade
null
null
null
Microsoft Technical Report MSR-TR-2005-10
cs.DB cs.CE
null
This is a thought piece on data-intensive science requirements for databases and science centers. It argues that peta-scale datasets will be housed by science centers that provide substantial storage and processing for scientists who access the data via smart notebooks. Next-generation science instruments and simulations will generate these peta-scale datasets. The need to publish and share data and the need for generic analysis and visualization tools will finally create a convergence on common metadata standards. Database systems will be judged by their support of these metadata standards and by their ability to manage and access peta-scale datasets. The procedural stream-of-bytes-file-centric approach to data analysis is both too cumbersome and too serial for such large datasets. Non-procedural query and analysis of schematized self-describing data is both easier to use and allows much more parallelism.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 03:15:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Liu", "David T.", "" ], [ "Nieto-Santisteban", "Maria", "" ], [ "Szalay", "Alexander S.", "" ], [ "DeWitt", "David", "" ], [ "Heber", "Gerd", "" ] ]
cs/0502009
Jim Gray
Peter Kukol, Jim Gray
Performance Considerations for Gigabyte per Second Transcontinental Disk-to-Disk File Transfers
null
null
null
Microsoft Technical Report MSR-TR-2004-62
cs.DB cs.PF
null
Moving data from CERN to Pasadena at a gigabyte per second using the next generation Internet requires good networking and good disk IO. Ten Gbps Ethernet and OC192 links are in place, so now it is simply a matter of programming. This report describes our preliminary work and measurements in configuring the disk subsystem for this effort. Using 24 SATA disks at each endpoint we are able to locally read and write an NTFS volume is striped across 24 disks at 1.2 GBps. A 32-disk stripe delivers 1.7 GBps. Experiments on higher performance and higher-capacity systems deliver up to 3.5 GBps.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 03:26:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Kukol", "Peter", "" ], [ "Gray", "Jim", "" ] ]
cs/0502010
Jim Gray
Tom Barclay, Jim Gray
TerraServer SAN-Cluster Architecture and Operations Experience
null
null
null
Microsoft Technical Report MSR-TR-2004-67
cs.DC cs.DB
null
Microsoft TerraServer displays aerial, satellite, and to-pographic images of the earth in a SQL database available via the Internet. It is one of the most popular online at-lases, presenting seventeen terabytes of image data from the United States Geological Survey (USGS). Initially de-ployed in 1998, the system demonstrated the scalability of PC hardware and software - Windows and SQL Server - on a single, mainframe-class processor. In September 2000, the back-end database application was migrated to 4-node active/passive cluster connected to an 18 terabyte Storage Area Network (SAN). The new configuration was designed to achieve 99.99% availability for the back-end application. This paper describes the hardware and software components of the TerraServer Cluster and SAN, and describes our experience in configuring and operating this system for three years. Not surprisingly, the hardware and architecture delivered better than four-9's of availability, but operations mistakes delivered three-9's.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 03:36:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Barclay", "Tom", "" ], [ "Gray", "Jim", "" ] ]
cs/0502011
Jim Gray
Jim Gray, Alexander S. Szalay
Where the Rubber Meets the Sky: Bridging the Gap between Databases and Science
null
IEEE Data Engineering Bulletin, Vol 27.4, Dec. 2004, pp. 3-11
null
Microsoft Technical Report MSR-TR-2004-110
cs.DB cs.CE
null
Scientists in all domains face a data avalanche - both from better instruments and from improved simulations. We believe that computer science tools and computer scientists are in a position to help all the sciences by building tools and developing techniques to manage, analyze, and visualize peta-scale scientific information. This article is summarizes our experiences over the last seven years trying to bridge the gap between database technology and the needs of the astronomy community in building the World-Wide Telescope.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 04:40:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Szalay", "Alexander S.", "" ] ]
cs/0502012
Jim Gray
Peter Kukol, Jim Gray
Sequential File Programming Patterns and Performance with .NET
null
null
null
Microsoft Technical Report MSR-TR-2004-136
cs.PF cs.OS
null
Programming patterns for sequential file access in the .NET Framework are described and the performance is measured. The default behavior provides excellent performance on a single disk - 50 MBps both reading and writing. Using large request sizes and doing file pre-allocation when possible have quantifiable benefits. When one considers disk arrays, .NET unbuffered IO delivers 800 MBps on a 16-disk array, but buffered IO delivers about 12% of that performance. Consequently, high-performance file and database utilities are still forced to use unbuffered IO for maximum sequential performance. The report is accompanied by downloadable source code that demonstrates the concepts and code that was used to obtain these measurements.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 04:43:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Kukol", "Peter", "" ], [ "Gray", "Jim", "" ] ]
cs/0502013
Robert Hearn
Robert A. Hearn
Amazons is PSPACE-complete
7 pages, 5 figures. For 2005 Combinatorial Game Theory Workshop at BIRS
null
null
null
cs.CC cs.GT
null
Amazons is a board game which combines elements of Chess and Go. It has become popular in recent years, and has served as a useful platform for both game-theoretic study and AI games research. Buro showed that simple Amazons endgames are NP-equivalent, leaving the complexity of the general case as an open problem. We settle this problem, by showing that deciding the outcome of an n x n Amazons position is PSPACE-hard. We give a reduction from one of the PSPACE-complete two-player formula games described by Schaefer. Since the number of moves in an Amazons game is polynomially bounded (unlike Chess and Go), Amazons is in PSPACE. It is thus on a par with other two-player, bounded-move, perfect-information games such as Hex, Othello, and Kayles. Our construction also provides an alternate proof that simple Amazons endgames are NP-equivalent. Our reduction uses a number of amazons polynomial in the input formula length; a remaining open problem is the complexity of Amazons when only a constant number of amazons is used.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 18:55:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hearn", "Robert A.", "" ] ]
cs/0502014
Philippe Robert
Philippe Robert (RAP UR-R)
On the asymptotic behavior of some Algorithms
November 2004
Random Structures and Algorithms 27 (2005) 235--250
10.1002/rsa.20075
null
cs.DS math.CA math.PR
null
A simple approach is presented to study the asymptotic behavior of some algorithms with an underlying tree structure. It is shown that some asymptotic oscillating behaviors can be precisely analyzed without resorting to complex analysis techniques as it is usually done in this context. A new explicit representation of periodic functions involved is obtained at the same time.
[ { "version": "v1", "created": "Thu, 3 Feb 2005 08:25:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Philippe", "", "RAP UR-R" ] ]
cs/0502015
Remi Barrere
R. Barrere
Can Computer Algebra be Liberated from its Algebraic Yoke ?
8 pages, 2-column presentation, 2 figures
null
null
null
cs.SC cs.CE
null
So far, the scope of computer algebra has been needlessly restricted to exact algebraic methods. Its possible extension to approximate analytical methods is discussed. The entangled roles of functional analysis and symbolic programming, especially the functional and transformational paradigms, are put forward. In the future, algebraic algorithms could constitute the core of extended symbolic manipulation systems including primitives for symbolic approximations.
[ { "version": "v1", "created": "Thu, 3 Feb 2005 17:28:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Barrere", "R.", "" ] ]
cs/0502016
Cynthia Rudin
Cynthia Rudin
Stability Analysis for Regularized Least Squares Regression
14 pages, 0 figures, 1 class file
null
null
null
cs.LG
null
We discuss stability for a class of learning algorithms with respect to noisy labels. The algorithms we consider are for regression, and they involve the minimization of regularized risk functionals, such as L(f) := 1/N sum_i (f(x_i)-y_i)^2+ lambda ||f||_H^2. We shall call the algorithm `stable' if, when y_i is a noisy version of f*(x_i) for some function f* in H, the output of the algorithm converges to f* as the regularization term and noise simultaneously vanish. We consider two flavors of this problem, one where a data set of N points remains fixed, and the other where N -> infinity. For the case where N -> infinity, we give conditions for convergence to f_E (the function which is the expectation of y(x) for each x), as lambda -> 0. For the fixed N case, we describe the limiting 'non-noisy', 'non-regularized' function f*, and give conditions for convergence. In the process, we develop a set of tools for dealing with functionals such as L(f), which are applicable to many other problems in learning theory.
[ { "version": "v1", "created": "Thu, 3 Feb 2005 19:54:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Rudin", "Cynthia", "" ] ]
cs/0502018
Jim Gray
Maria A. Nieto-Santisteban, Alexander S. Szalay, Aniruddha R. Thakar, William J. O'Mullane, Jim Gray, James Annis
When Database Systems Meet the Grid
better version of the paper (better graphics exceed ArXiv 1MB limit) at http://www-db.cs.wisc.edu/cidr/papers/P13.pdf
Proceedings of CIDR 2005 Conference, Asilomar, CA. Jan. 2005, pp 154-161
null
Microsoft Technical Report MSR-TR-2004-81
cs.DC
null
We illustrate the benefits of combining database systems and Grid technologies for data-intensive applications. Using a cluster of SQL servers, we reimplemented an existing Grid application that finds galaxy clusters in a large astronomical database. The SQL implementation runs an order of magnitude faster than the earlier Tcl-C-file-based implementation. We discuss why and how Grid applications can take advantage of database systems.
[ { "version": "v1", "created": "Thu, 3 Feb 2005 21:43:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Nieto-Santisteban", "Maria A.", "" ], [ "Szalay", "Alexander S.", "" ], [ "Thakar", "Aniruddha R.", "" ], [ "O'Mullane", "William J.", "" ], [ "Gray", "Jim", "" ], [ "Annis", "James", "" ] ]
cs/0502019
Kevin Lai
Michal Feldman, Kevin Lai, Li Zhang
A Price-Anticipating Resource Allocation Mechanism for Distributed Shared Clusters
null
Proceedings of the ACM Conference on Electronic Commerce 2005
null
null
cs.DC cs.GT
null
In this paper we formulate the fixed budget resource allocation game to understand the performance of a distributed market-based resource allocation system. Multiple users decide how to distribute their budget (bids) among multiple machines according to their individual preferences to maximize their individual utility. We look at both the efficiency and the fairness of the allocation at the equilibrium, where fairness is evaluated through the measures of utility uniformity and envy-freeness. We show analytically and through simulations that despite being highly decentralized, such a system converges quickly to an equilibrium and unlike the social optimum that achieves high efficiency but poor fairness, the proposed allocation scheme achieves a nice balance of high degrees of efficiency and fairness at the equilibrium.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 02:48:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Feldman", "Michal", "" ], [ "Lai", "Kevin", "" ], [ "Zhang", "Li", "" ] ]
cs/0502020
Kumara Sastry
K. Sastry, U.-M. O'Reilly, D. E. Goldberg
Population Sizing for Genetic Programming Based Upon Decision Making
Final version published in O'Reilly, U.-M., et al. (2004). Genetic Programming Theory and Practice II. Boston, MA: Kluwer Academic Publishers. 49--66
null
null
IlliGAL Report No. 2004028
cs.AI cs.NE
null
This paper derives a population sizing relationship for genetic programming (GP). Following the population-sizing derivation for genetic algorithms in Goldberg, Deb, and Clark (1992), it considers building block decision making as a key facet. The analysis yields a GP-unique relationship because it has to account for bloat and for the fact that GP solutions often use subsolution multiple times. The population-sizing relationship depends upon tree size, solution complexity, problem difficulty and building block expression probability. The relationship is used to analyze and empirically investigate population sizing for three model GP problems named ORDER, ON-OFF and LOUD. These problems exhibit bloat to differing extents and differ in whether their solutions require the use of a building block multiple times.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 03:58:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Sastry", "K.", "" ], [ "O'Reilly", "U. -M.", "" ], [ "Goldberg", "D. E.", "" ] ]
cs/0502021
Kumara Sastry
H. A. Abbass, K. Sastry, D. E. Goldberg
Oiling the Wheels of Change: The Role of Adaptive Automatic Problem Decomposition in Non--Stationary Environments
null
null
null
null
cs.NE cs.AI
null
Genetic algorithms (GAs) that solve hard problems quickly, reliably and accurately are called competent GAs. When the fitness landscape of a problem changes overtime, the problem is called non--stationary, dynamic or time--variant problem. This paper investigates the use of competent GAs for optimizing non--stationary optimization problems. More specifically, we use an information theoretic approach based on the minimum description length principle to adaptively identify regularities and substructures that can be exploited to respond quickly to changes in the environment. We also develop a special type of problems with bounded difficulties to test non--stationary optimization problems. The results provide new insights into non-stationary optimization problems and show that a search algorithm which automatically identifies and exploits possible decompositions is more robust and responds quickly to changes than a simple genetic algorithm.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 04:15:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbass", "H. A.", "" ], [ "Sastry", "K.", "" ], [ "Goldberg", "D. E.", "" ] ]
cs/0502022
Kumara Sastry
K. Sastry, H. A. Abbass, D. E. Goldberg
Sub-Structural Niching in Non-Stationary Environments
Final version published in 2005 Australian Artificial Intelligence Conference, pp. 873--885
null
null
IlliGAL Report No. 2004035
cs.NE cs.AI
null
Niching enables a genetic algorithm (GA) to maintain diversity in a population. It is particularly useful when the problem has multiple optima where the aim is to find all or as many as possible of these optima. When the fitness landscape of a problem changes overtime, the problem is called non--stationary, dynamic or time--variant problem. In these problems, niching can maintain useful solutions to respond quickly, reliably and accurately to a change in the environment. In this paper, we present a niching method that works on the problem substructures rather than the whole solution, therefore it has less space complexity than previously known niching mechanisms. We show that the method is responding accurately when environmental changes occur.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 04:29:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Sastry", "K.", "" ], [ "Abbass", "H. A.", "" ], [ "Goldberg", "D. E.", "" ] ]
cs/0502023
Kumara Sastry
K. Sastry, H. A. Abbass, D. E. Goldberg, D. D. Johnson
Sub-structural Niching in Estimation of Distribution Algorithms
null
null
null
IlliGAL Report No. 2005002
cs.NE cs.AI
null
We propose a sub-structural niching method that fully exploits the problem decomposition capability of linkage-learning methods such as the estimation of distribution algorithms and concentrate on maintaining diversity at the sub-structural level. The proposed method consists of three key components: (1) Problem decomposition and sub-structure identification, (2) sub-structure fitness estimation, and (3) sub-structural niche preservation. The sub-structural niching method is compared to restricted tournament selection (RTS)--a niching method used in hierarchical Bayesian optimization algorithm--with special emphasis on sustained preservation of multiple global solutions of a class of boundedly-difficult, additively-separable multimodal problems. The results show that sub-structural niching successfully maintains multiple global optima over large number of generations and does so with significantly less population than RTS. Additionally, the market share of each of the niche is much closer to the expected level in sub-structural niching when compared to RTS.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 04:46:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Sastry", "K.", "" ], [ "Abbass", "H. A.", "" ], [ "Goldberg", "D. E.", "" ], [ "Johnson", "D. D.", "" ] ]
cs/0502025
Hahnsang Kim
Hahnsang Kim, Theirry Turletti, Amar Bouali
EPspectra: A Formal Toolkit for Developing DSP Software Applications
31 pages
null
null
null
cs.LO cs.SE
null
The software approach to developing Digital Signal Processing (DSP) applications brings some great features such as flexibility, re-usability of resources and easy upgrading of applications. However, it requires long and tedious tests and verification phases because of the increasing complexity of the software. This implies the need of a software programming environment capable of putting together DSP modules and providing facilities to debug, verify and validate the code. The objective of the work is to provide such facilities as simulation and verification for developing DSP software applications. This led us to develop an extension toolkit, Epspectra, built upon Pspectra, one of the first toolkits available to design basic software radio applications on standard PC workstations. In this paper, we first present Epspectra, an Esterel-based extension of Pspectra that makes the design and implementation of portable DSP applications easier. It allows drastic reduction of testing and verification time while requiring relatively little expertise in formal verification methods. Second, we demonstrate the use of Epspectra, taking as an example the radio interface part of a GSM base station. We also present the verification procedures for the three safety properties of the implementation programs which have complex control-paths. These have to obey strict scheduling rules. In addition, Epspectra achieves the verification of the targeted application since the same model is used for the executable code generation and for the formal verification.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 15:11:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Hahnsang", "" ], [ "Turletti", "Theirry", "" ], [ "Bouali", "Amar", "" ] ]
cs/0502027
Kevin Lai
Kevin Lai
Markets are Dead, Long Live Markets
Fix rotation of figures
null
null
null
cs.OS
null
Researchers have long proposed using economic approaches to resource allocation in computer systems. However, few of these proposals became operational, let alone commercial. Questions persist about the economic approach regarding its assumptions, value, applicability, and relevance to system design. The goal of this paper is to answer these questions. We find that market-based resource allocation is useful, and more importantly, that mechanism design and system design should be integrated to produce systems that are both economically and computationally efficient.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 22:48:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Lai", "Kevin", "" ] ]
cs/0502028
Herbert van de Sompel
Herbert Van de Sompel, Jeroen Bekaert, Xiaoming Liu, Luda Balakireva, Thorsten Schwander
aDORe: a modular, standards-based Digital Object Repository
Draft of submission to Computer Journal
null
null
null
cs.DL
null
This paper describes the aDORe repository architecture, designed and implemented for ingesting, storing, and accessing a vast collection of Digital Objects at the Research Library of the Los Alamos National Laboratory. The aDORe architecture is highly modular and standards-based. In the architecture, the MPEG-21 Digital Item Declaration Language is used as the XML-based format to represent Digital Objects that can consist of multiple datastreams as Open Archival Information System Archival Information Packages (OAIS AIPs).Through an ingestion process, these OAIS AIPs are stored in a multitude of autonomous repositories. A Repository Index keeps track of the creation and location of all the autonomous repositories, whereas an Identifier Locator registers in which autonomous repository a given Digital Object or OAIS AIP resides. A front-end to the complete environment, the OAI-PMH Federator, is introduced for requesting OAIS Dissemination Information Packages (OAIS DIPs). These OAIS DIPs can be the stored OAIS AIPs themselves, or transformations thereof. This front-end allows OAI-PMH harvesters to recurrently and selectively collect batches of OAIS DIPs from aDORe, and hence to create multiple, parallel services using the collected objects. Another front-end, the OpenURL Resolver, is introduced for requesting OAIS Result Sets. An OAIS Result Set is a dissemination of an individual Digital Object or of its constituent datastreams. Both front-ends make use of an MPEG-21 Digital Item Processing Engine to apply services to OAIS AIPs, Digital Objects, or constituent datastreams that were specified in a dissemination request.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 22:09:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Van de Sompel", "Herbert", "" ], [ "Bekaert", "Jeroen", "" ], [ "Liu", "Xiaoming", "" ], [ "Balakireva", "Luda", "" ], [ "Schwander", "Thorsten", "" ] ]
cs/0502029
Martin Pelikan
Radovan Ondas, Martin Pelikan, Kumara Sastry
Scalability of Genetic Programming and Probabilistic Incremental Program Evolution
Submitted to GECCO-2005
null
null
null
cs.NE cs.AI
null
This paper discusses scalability of standard genetic programming (GP) and the probabilistic incremental program evolution (PIPE). To investigate the need for both effective mixing and linkage learning, two test problems are considered: ORDER problem, which is rather easy for any recombination-based GP, and TRAP or the deceptive trap problem, which requires the algorithm to learn interactions among subsets of terminals. The scalability results show that both GP and PIPE scale up polynomially with problem size on the simple ORDER problem, but they both scale up exponentially on the deceptive problem. This indicates that while standard recombination is sufficient when no interactions need to be considered, for some problems linkage learning is necessary. These results are in agreement with the lessons learned in the domain of binary-string genetic algorithms (GAs). Furthermore, the paper investigates the effects of introducing utnnecessary and irrelevant primitives on the performance of GP and PIPE.
[ { "version": "v1", "created": "Mon, 7 Feb 2005 19:40:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Ondas", "Radovan", "" ], [ "Pelikan", "Martin", "" ], [ "Sastry", "Kumara", "" ] ]
cs/0502031
Riccardo Pucella
Riccardo Pucella
Logic Column 11: The Finite and the Infinite in Temporal Logic
14 pages
SIGACT News, 36(1), pp. 86-99, 2005
null
null
cs.LO
null
This article examines the interpretation of the LTL temporal operators over finite and infinite sequences. This is used as the basis for deriving a sound and complete axiomatization for Caret, a recent temporal logic for reasoning about programs with nested procedure calls and returns.
[ { "version": "v1", "created": "Sat, 5 Feb 2005 21:00:13 GMT" }, { "version": "v2", "created": "Sun, 24 Apr 2005 17:51:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
cs/0502032
Mihai P?tra\c{s}cu
Christian Worm Mortensen, Rasmus Pagh and Mihai Patrascu
On Dynamic Range Reporting in One Dimension
18 pages. Full version of a paper that will appear in STOC'05
null
null
null
cs.DS
null
We consider the problem of maintaining a dynamic set of integers and answering queries of the form: report a point (equivalently, all points) in a given interval. Range searching is a natural and fundamental variant of integer search, and can be solved using predecessor search. However, for a RAM with w-bit words, we show how to perform updates in O(lg w) time and answer queries in O(lglg w) time. The update time is identical to the van Emde Boas structure, but the query time is exponentially faster. Existing lower bounds show that achieving our query time for predecessor search requires doubly-exponentially slower updates. We present some arguments supporting the conjecture that our solution is optimal. Our solution is based on a new and interesting recursion idea which is "more extreme" that the van Emde Boas recursion. Whereas van Emde Boas uses a simple recursion (repeated halving) on each path in a trie, we use a nontrivial, van Emde Boas-like recursion on every such path. Despite this, our algorithm is quite clean when seen from the right angle. To achieve linear space for our data structure, we solve a problem which is of independent interest. We develop the first scheme for dynamic perfect hashing requiring sublinear space. This gives a dynamic Bloomier filter (an approximate storage scheme for sparse vectors) which uses low space. We strengthen previous lower bounds to show that these results are optimal.
[ { "version": "v1", "created": "Sat, 5 Feb 2005 23:22:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Mortensen", "Christian Worm", "" ], [ "Pagh", "Rasmus", "" ], [ "Patrascu", "Mihai", "" ] ]
cs/0502034
Martin Pelikan
Martin Pelikan, Kumara Sastry, David E. Goldberg
Multiobjective hBOA, Clustering, and Scalability
Also IlliGAL Report No. 2005005 (http://www-illigal.ge.uiuc.edu/). Submitted to GECCO-2005
null
null
IlliGAL Report No. 2005005
cs.NE cs.AI
null
This paper describes a scalable algorithm for solving multiobjective decomposable problems by combining the hierarchical Bayesian optimization algorithm (hBOA) with the nondominated sorting genetic algorithm (NSGA-II) and clustering in the objective space. It is first argued that for good scalability, clustering or some other form of niching in the objective space is necessary and the size of each niche should be approximately equal. Multiobjective hBOA (mohBOA) is then described that combines hBOA, NSGA-II and clustering in the objective space. The algorithm mohBOA differs from the multiobjective variants of BOA and hBOA proposed in the past by including clustering in the objective space and allocating an approximately equally sized portion of the population to each cluster. The algorithm mohBOA is shown to scale up well on a number of problems on which standard multiobjective evolutionary algorithms perform poorly.
[ { "version": "v1", "created": "Mon, 7 Feb 2005 05:26:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Pelikan", "Martin", "" ], [ "Sastry", "Kumara", "" ], [ "Goldberg", "David E.", "" ] ]
cs/0502038
Stavros Nikolopoulos D.
Stavros D. Nikolopoulos and Charis Papadopoulos
The Number of Spanning Trees in Kn-complements of Quasi-threshold Graphs
13 pages, 2 figures
Graphs and Combinatorics 20(3): 383-397, 2004
null
null
cs.DM
null
In this paper we examine the classes of graphs whose $K_n$-complements are trees and quasi-threshold graphs and derive formulas for their number of spanning trees; for a subgraph $H$ of $K_n$, the $K_n$-complement of $H$ is the graph $K_n-H$ which is obtained from $K_n$ by removing the edges of $H$. Our proofs are based on the complement spanning-tree matrix theorem, which expresses the number of spanning trees of a graph as a function of the determinant of a matrix that can be easily constructed from the adjacency relation of the graph. Our results generalize previous results and extend the family of graphs of the form $K_n-H$ admitting formulas for the number of their spanning trees.
[ { "version": "v1", "created": "Mon, 7 Feb 2005 15:26:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Nikolopoulos", "Stavros D.", "" ], [ "Papadopoulos", "Charis", "" ] ]
cs/0502039
Boris D. Lubachevsky
Boris D. Lubachevsky
Efficient Parallel Simulations of Asynchronous Cellular Arrays
26 pages, 10 figures
Complex Systems, vol.1, no.6, December 1987, pp.1099--1123, S. Wolfram, (ed.)
null
null
cs.DC cond-mat.mtrl-sci cs.PF
null
A definition for a class of asynchronous cellular arrays is proposed. An example of such asynchrony would be independent Poisson arrivals of cell iterations. The Ising model in the continuous time formulation of Glauber falls into this class. Also proposed are efficient parallel algorithms for simulating these asynchronous cellular arrays. In the algorithms, one or several cells are assigned to a processing element (PE), local times for different PEs can be different. Although the standard serial algorithm by Metropolis, Rosenbluth, Rosenbluth, Teller, and Teller can simulate such arrays, it is usually believed to be without an efficient parallel counterpart. However, the proposed parallel algorithms contradict this belief proving to be both efficient and able to perform the same task as the standard algorithm. The results of experiments with the new algorithms are encouraging: the speed-up is greater than 16 using 25 PEs on a shared memory MIMD bus computer, and greater than 1900 using 2**14 PEs on a SIMD computer. The algorithm by Bortz, Kalos, and Lebowitz can be incorporated in the proposed parallel algorithms, further contributing to speed-up. [In this paper I invented the update-cites-of-local-time-minima parallel simulation scheme. Now the scheme is becoming popular. Many misprints of the original 1987 Complex Systems publication are corrected here.-B.L.]
[ { "version": "v1", "created": "Tue, 8 Feb 2005 00:32:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Lubachevsky", "Boris D.", "" ] ]
cs/0502040
Gaoyan Xie
Gaoyan Xie and Zhe Dang
Testing Systems of Concurrent Black-boxes--an Automata-Theoretic and Decompositional Approach
null
null
null
null
cs.SE
null
The global testing problem studied in this paper is to seek a definite answer to whether a system of concurrent black-boxes has an observable behavior in a given finite (but could be huge) set "Bad". We introduce a novel approach to solve the problem that does not require integration testing. Instead, in our approach, the global testing problem is reduced to testing individual black-boxes in the system one by one in some given order. Using an automata-theoretic approach, test sequences for each individual black-box are generated from the system's description as well as the test results of black-boxes prior to this black-box in the given order. In contrast to the conventional compositional/modular verification/testing approaches, our approach is essentially decompositional. Also, our technique is complete, sound, and can be carried out automatically. Our experiment results show that the total number of tests needed to solve the global testing problem is substantially small even for an extremely large "Bad".
[ { "version": "v1", "created": "Tue, 8 Feb 2005 01:15:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Xie", "Gaoyan", "" ], [ "Dang", "Zhe", "" ] ]