id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0502041
Mihai Patrascu
Mihai Patrascu and Erik D. Demaine
Logarithmic Lower Bounds in the Cell-Probe Model
Second version contains significant changes to the presentation. 32 pages, 1 figure. Journal version of two conference publications: "Tight Bounds for the Partial-Sums Problem" Proc. 15th ACM-SIAM Symposium on Discrete Algorithms (SODA'04), pp 20-29. "Lower Bounds for Dynamic Connectivity" Proc. 36th ACM Symposium on Theory of Computing (STOC'04), pp 546-553
null
null
null
cs.DS cs.CC
null
We develop a new technique for proving cell-probe lower bounds on dynamic data structures. This technique enables us to prove an amortized randomized Omega(lg n) lower bound per operation for several data structural problems on n elements, including partial sums, dynamic connectivity among disjoint paths (or a forest or a graph), and several other dynamic graph problems (by simple reductions). Such a lower bound breaks a long-standing barrier of Omega(lg n / lglg n) for any dynamic language membership problem. It also establishes the optimality of several existing data structures, such as Sleator and Tarjan's dynamic trees. We also prove the first Omega(log_B n) lower bound in the external-memory model without assumptions on the data structure (such as the comparison model). Our lower bounds also give a query-update trade-off curve matched, e.g., by several data structures for dynamic connectivity in graphs. We also prove matching upper and lower bounds for partial sums when parameterized by the word size and the maximum additive change in an update.
[ { "version": "v1", "created": "Tue, 8 Feb 2005 03:03:55 GMT" }, { "version": "v2", "created": "Sat, 28 May 2005 21:49:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Patrascu", "Mihai", "" ], [ "Demaine", "Erik D.", "" ] ]
cs/0502043
Satyan L. Devadoss
Jeff Danciger, Satyan L. Devadoss, Don Sheehy
Compatible Triangulations and Point Partitions by Series-Triangular Graphs
11 pages, 8 figures
Computational Geometry: Theory and Applications, 34 (2006) 195-202
null
null
cs.CG cs.DM
null
We introduce series-triangular graph embeddings and show how to partition point sets with them. This result is then used to improve the upper bound on the number of Steiner points needed to obtain compatible triangulations of point sets. The problem is generalized to finding compatible triangulations for more than two point sets and we show that such triangulations can be constructed with only a linear number of Steiner points added to each point set.
[ { "version": "v1", "created": "Tue, 8 Feb 2005 16:19:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Danciger", "Jeff", "" ], [ "Devadoss", "Satyan L.", "" ], [ "Sheehy", "Don", "" ] ]
cs/0502044
Martin Lotz
Peter Buergisser, Martin Lotz
The complexity of computing the Hilbert polynomial of smooth equidimensional complex projective varieties
null
null
null
null
cs.SC cs.CC
null
We continue the study of counting complexity begun in [Buergisser, Cucker 04] and [Buergisser, Cucker, Lotz 05] by proving upper and lower bounds on the complexity of computing the Hilbert polynomial of a homogeneous ideal. We show that the problem of computing the Hilbert polynomial of a smooth equidimensional complex projective variety can be reduced in polynomial time to the problem of counting the number of complex common zeros of a finite set of multivariate polynomials. Moreover, we prove that the more general problem of computing the Hilbert polynomial of a homogeneous ideal is polynomial space hard. This implies polynomial space lower bounds for both the problems of computing the rank and the Euler characteristic of cohomology groups of coherent sheaves on projective space, improving the #P-lower bound of Bach (JSC 1999).
[ { "version": "v1", "created": "Tue, 8 Feb 2005 17:10:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Buergisser", "Peter", "" ], [ "Lotz", "Martin", "" ] ]
cs/0502045
Gianluca Argentini
Gianluca Argentini
Adaptive grids as parametrized scale-free networks
10 pages, 3 figures
null
null
null
cs.NA math-ph math.AP math.MP physics.flu-dyn
null
In this paper we present a possible model of adaptive grids for numerical resolution of differential problems, using physical or geometrical properties, as viscosity or velocity gradient of a moving fluid. The relation between the values of grid step and these entities is based on the mathematical scheme offered by the model of scale-free networks, due to Barabasi, so that the step can be connected to the other variables by a constitutive relation. Some examples and an application are discussed, showing that this approach can be further developed for treatment of more complex situations.
[ { "version": "v1", "created": "Tue, 8 Feb 2005 17:51:26 GMT" }, { "version": "v2", "created": "Wed, 9 Feb 2005 00:12:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0502046
Didier Bert
Hector Ruiz Barradas (LSR - IMAG), Didier Bert (LSR - IMAG)
Proof obligations for specification and refinement of liveness properties under weak fairness
null
null
null
Rapport LSR IMAG : RR 1071-I LSR 20
cs.LO
null
In this report, we present a formal model of fair iteration of events for B event systems. The model is used to justify proof obligations for basic liveness properties and preservation under refinement of general liveness properties. The model of fair iteration of events uses the dovetail operator, an operator proposed by Broy and Nelson to model fair choice. The proofs are mainly founded in fixpoint calculations of fair iteration of events and weakest precondition calculus.
[ { "version": "v1", "created": "Wed, 9 Feb 2005 09:23:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Barradas", "Hector Ruiz", "", "LSR - IMAG" ], [ "Bert", "Didier", "", "LSR - IMAG" ] ]
cs/0502048
Nikolaos Papanikolaou
Rajagopal Nagarajan, Nikolaos Papanikolaou, Garry Bowen, Simon Gay
An Automated Analysis of the Security of Quantum Key Distribution
null
null
null
null
cs.CR quant-ph
null
This paper discusses the use of computer-aided verification as a practical means for analysing quantum information systems; specifically, the BB84 protocol for quantum key distribution is examined using this method. This protocol has been shown to be unconditionally secure against all attacks in an information-theoretic setting, but the relevant security proof requires a thorough understanding of the formalism of quantum mechanics and is not easily adaptable to practical scenarios. Our approach is based on probabilistic model-checking; we have used the PRISM model-checker to show that, as the number of qubits transmitted in BB84 is increased, the equivocation of the eavesdropper with respect to the channel decreases exponentially. We have also shown that the probability of detecting the presence of an eavesdropper increases exponentially with the number of qubits. The results presented here are a testament to the effectiveness of the model-checking approach for systems where analytical solutions may not be possible or plausible.
[ { "version": "v1", "created": "Wed, 9 Feb 2005 13:49:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Nagarajan", "Rajagopal", "" ], [ "Papanikolaou", "Nikolaos", "" ], [ "Bowen", "Garry", "" ], [ "Gay", "Simon", "" ] ]
cs/0502051
Richard McClatchey
Zaheer Abbas, Muhammad Umer, Mohammed Odeh, Richard McClatchey, Arshad Ali, Farooq Ahmad
A Semantic Grid-based E-Learning Framework (SELF)
8 pages, 2 tables, 3 figures
null
null
null
cs.DC
null
E-learning can be loosely defined as a wide set of applications and processes, which uses available electronic media (and tools) to deliver vocational education and training. With its increasing recognition as an ubiquitous mode of instruction and interaction in the academic as well as corporate world, the need for a scaleable and realistic model is becoming important. In this paper we introduce SELF; a Semantic grid-based E-Learning Framework. SELF aims to identify the key-enablers in a practical grid-based E-learning environment and to minimize technological reworking by proposing a well-defined interaction plan among currently available tools and technologies. We define a dichotomy with E-learning specific application layers on top and semantic grid-based support layers underneath. We also map the latest open and freeware technologies with various components in SELF.
[ { "version": "v1", "created": "Wed, 9 Feb 2005 17:22:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbas", "Zaheer", "" ], [ "Umer", "Muhammad", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ], [ "Ali", "Arshad", "" ], [ "Ahmad", "Farooq", "" ] ]
cs/0502052
Dmitry Mogilevsky
Dmitry Mogilevsky
Log Analysis Case Study Using LoGS
null
null
null
null
cs.CR cs.IR
null
A very useful technique a network administrator can use to identify problematic network behavior is careful analysis of logs of incoming and outgoing network flows. The challenge one faces when attempting to undertake this course of action, though, is that large networks tend to generate an extremely large quantity of network traffic in a very short period of time, resulting in very large traffic logs which must be analyzed post-generation with an eye for contextual information which may reveal symptoms of problematic traffic. A better technique is to perform real-time log analysis using a real-time context-generating tool such as LoGS.
[ { "version": "v1", "created": "Wed, 9 Feb 2005 19:49:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Mogilevsky", "Dmitry", "" ] ]
cs/0502054
Ion Mandoiu
Ion I. Mandoiu, Claudia Prajescu, Dragos Trinca
Improved Tag Set Design and Multiplexing Algorithms for Universal Arrays
null
null
null
null
cs.DS
null
In this paper we address two optimization problems arising in the design of genomic assays based on universal tag arrays. First, we address the universal array tag set design problem. For this problem, we extend previous formulations to incorporate antitag-to-antitag hybridization constraints in addition to constraints on antitag-to-tag hybridization specificity, establish a constructive upper bound on the maximum number of tags satisfying the extended constraints, and propose a simple greedy tag selection algorithm. Second, we give methods for improving the multiplexing rate in large-scale genomic assays by combining primer selection with tag assignment. Experimental results on simulated data show that this integrated optimization leads to reductions of up to 50% in the number of required arrays.
[ { "version": "v1", "created": "Thu, 10 Feb 2005 20:20:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Mandoiu", "Ion I.", "" ], [ "Prajescu", "Claudia", "" ], [ "Trinca", "Dragos", "" ] ]
cs/0502057
Kumara Sastry
Kumara Sastry, Martin Pelikan, David E. Goldberg
Decomposable Problems, Niching, and Scalability of Multiobjective Estimation of Distribution Algorithms
Submitted to Genetic and Evolutionary Computation Conference, GECCO-2005
null
null
IlliGAL Report No. 2005004
cs.NE cs.AI
null
The paper analyzes the scalability of multiobjective estimation of distribution algorithms (MOEDAs) on a class of boundedly-difficult additively-separable multiobjective optimization problems. The paper illustrates that even if the linkage is correctly identified, massive multimodality of the search problems can easily overwhelm the nicher and lead to exponential scale-up. Facetwise models are subsequently used to propose a growth rate of the number of differing substructures between the two objectives to avoid the niching method from being overwhelmed and lead to polynomial scalability of MOEDAs.
[ { "version": "v1", "created": "Sat, 12 Feb 2005 22:29:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Sastry", "Kumara", "" ], [ "Pelikan", "Martin", "" ], [ "Goldberg", "David E.", "" ] ]
cs/0502059
Stanko Shtrakov
Stanko Shtrakov and Anton Stoilov
New approach for Finite Difference Method for Thermal Analysis of Passive Solar Systems
7 pages, 4 figures
null
null
null
cs.NA
null
Mathematical treatment of massive wall systems is a useful tool for investigation of these solar applications. The objectives of this work are to develop (and validate) a numerical solution model for predication the thermal behaviour of passive solar systems with massive wall, to improve knowledge of using indirect passive solar systems and assess its energy efficiency according to climatic conditions in Bulgaria. The problem of passive solar systems with massive walls is modelled by thermal and mass transfer equations. As a boundary conditions for the mathematical problem are used equations, which describe influence of weather data and constructive parameters of building on the thermal performance of the passive system. The mathematical model is solved by means of finite differences method and improved solution procedure. In article are presented results of theoretical and experimental study for developing and validating a numerical solution model for predication the thermal behaviour of passive solar systems with massive wall.
[ { "version": "v1", "created": "Sun, 13 Feb 2005 15:29:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Stanko", "" ], [ "Stoilov", "Anton", "" ] ]
cs/0502060
Jean-Philippe Rennard
J.-Ph Rennard
Perspectives for Strong Artificial Life
19 pages, 5 figures
Rennard, J.-Ph., (2004), Perspective for Strong Artificial Life in De Castro, L.N. & von Zuben F.J. (Eds), Recent Developments in Biologically Inspired Computing, Hershey:IGP, 301-318
null
null
cs.AI
null
This text introduces the twin deadlocks of strong artificial life. Conceptualization of life is a deadlock both because of the existence of a continuum between the inert and the living, and because we only know one instance of life. Computationalism is a second deadlock since it remains a matter of faith. Nevertheless, artificial life realizations quickly progress and recent constructions embed an always growing set of the intuitive properties of life. This growing gap between theory and realizations should sooner or later crystallize in some kind of paradigm shift and then give clues to break the twin deadlocks.
[ { "version": "v1", "created": "Sun, 13 Feb 2005 18:20:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Rennard", "J. -Ph", "" ] ]
cs/0502061
Avishai Wool
Sagy Bar, Mira Gonen, Avishai Wool
A Geographic Directed Preferential Internet Topology Model
21 pages, 4 figures
null
null
null
cs.NI cs.AR
null
The goal of this work is to model the peering arrangements between Autonomous Systems (ASes). Most existing models of the AS-graph assume an undirected graph. However, peering arrangements are mostly asymmetric Customer-Provider arrangements, which are better modeled as directed edges. Furthermore, it is well known that the AS-graph, and in particular its clustering structure, is influenced by geography. We introduce a new model that describes the AS-graph as a directed graph, with an edge going from the customer to the provider, but also models symmetric peer-to-peer arrangements, and takes geography into account. We are able to mathematically analyze its power-law exponent and number of leaves. Beyond the analysis we have implemented our model as a synthetic network generator we call GdTang. Experimentation with GdTang shows that the networks it produces are more realistic than those generated by other network generators, in terms of its power-law exponent, fractions of customer-provider and symmetric peering arrangements, and the size of its dense core. We believe that our model is the first to manifest realistic regional dense cores that have a clear geographic flavor. Our synthetic networks also exhibit path inflation effects that are similar to those observed in the real AS graph.
[ { "version": "v1", "created": "Mon, 14 Feb 2005 11:39:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Bar", "Sagy", "" ], [ "Gonen", "Mira", "" ], [ "Wool", "Avishai", "" ] ]
cs/0502062
Markus Volkmer
Markus Volkmer and Sebastian Wallner
Tree Parity Machine Rekeying Architectures
null
IEEE Transactions on Computers Vol. 54 No. 4, pp. 421-427, April 2005
null
null
cs.CR cs.AR
null
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e. small logic-area) solution for flexible security levels and short key lifetimes. The basis is an approach for symmetric key exchange using the synchronisation of Tree Parity Machines. Fast successive key generation enables a key exchange within a few milliseconds, given realistic communication channels with a limited bandwidth. For demonstration we evaluate characteristics of a standard-cell ASIC design realisation as IP-core in 0.18-micrometer CMOS-technology.
[ { "version": "v1", "created": "Mon, 14 Feb 2005 13:06:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Volkmer", "Markus", "" ], [ "Wallner", "Sebastian", "" ] ]
cs/0502064
J\=anis Buls
Janis Buls
The Lattice of Machine Invariant Sets and Subword Complexity
9 pages, extended abstract published in 67th Workshop on General Algebra
null
null
null
cs.CR cs.CC cs.DM
null
We investigate the lattice of machine invariant classes. This is an infinite completely distributive lattice but it is not a Boolean lattice. We show the subword complexity and the growth function create machine invariant classes. So the lattice would serve as a measure of words cryptographic quality if we like to identify new stream ciphers suitable for widespread adoption.
[ { "version": "v1", "created": "Mon, 14 Feb 2005 15:28:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Buls", "Janis", "" ] ]
cs/0502066
Mark Braverman
Mark Braverman
On the Complexity of Real Functions
null
null
null
null
cs.CC cs.NA math.NA
null
We develop a notion of computability and complexity of functions over the reals, which seems to be very natural when one tries to determine just how "difficult" a certain function is. This notion can be viewed as an extension of both BSS computability [Blum, Cucker, Shub, Smale 1998], and bit computability in the tradition of computable analysis [Weihrauch 2000] as it relies on the latter but allows some discontinuities and multiple values.
[ { "version": "v1", "created": "Tue, 15 Feb 2005 05:24:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Braverman", "Mark", "" ] ]
cs/0502067
Marcus Hutter
Jan Poland and Marcus Hutter
Master Algorithms for Active Experts Problems based on Increasing Loss Values
8 two-column pages, latex2e
Proc. 14th Dutch-Belgium Conf. on Machine Learning (Benelearn 2005) 59-66
null
IDSIA-01-05
cs.LG cs.AI
null
We specify an experts algorithm with the following characteristics: (a) it uses only feedback from the actions actually chosen (bandit setup), (b) it can be applied with countably infinite expert classes, and (c) it copes with losses that may grow in time appropriately slowly. We prove loss bounds against an adaptive adversary. From this, we obtain master algorithms for "active experts problems", which means that the master's actions may influence the behavior of the adversary. Our algorithm can significantly outperform standard experts algorithms on such problems. Finally, we combine it with a universal expert class. This results in a (computationally infeasible) universal master algorithm which performs - in a certain sense - almost as well as any computable strategy, for any online problem.
[ { "version": "v1", "created": "Tue, 15 Feb 2005 14:59:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Poland", "Jan", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0502068
John Tromp
John Tromp and Rudi Cilibrasi
Limits of Rush Hour Logic Complexity
null
null
null
null
cs.CC
null
Rush Hour Logic was introduced in [Flake&Baum99] as a model of computation inspired by the ``Rush Hour'' toy puzzle, in which cars can move horizontally or vertically within a parking lot. The authors show how the model supports polynomial space computation, using certain car configurations as building blocks to construct boolean circuits for a cpu and memory. They consider the use of cars of length 3 crucial to their construction, and conjecture that cars of size 2 only, which we'll call `Size 2 Rush Hour', do not support polynomial space computation. We settle this conjecture by showing that the required building blocks are constructible in Size 2 Rush Hour. Furthermore, we consider Unit Rush Hour, which was hitherto believed to be trivial, show its relation to maze puzzles, and provide empirical support for its hardness.
[ { "version": "v1", "created": "Tue, 15 Feb 2005 14:22:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Tromp", "John", "" ], [ "Cilibrasi", "Rudi", "" ] ]
cs/0502070
Erik Demaine
Erik D. Demaine and MohammadTaghi Hajiaghayi
Bidimensionality, Map Graphs, and Grid Minors
12 pages
null
null
null
cs.DM cs.DS
null
In this paper we extend the theory of bidimensionality to two families of graphs that do not exclude fixed minors: map graphs and power graphs. In both cases we prove a polynomial relation between the treewidth of a graph in the family and the size of the largest grid minor. These bounds improve the running times of a broad class of fixed-parameter algorithms. Our novel technique of using approximate max-min relations between treewidth and size of grid minors is powerful, and we show how it can also be used, e.g., to prove a linear relation between the treewidth of a bounded-genus graph and the treewidth of its dual.
[ { "version": "v1", "created": "Wed, 16 Feb 2005 19:01:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Hajiaghayi", "MohammadTaghi", "" ] ]
cs/0502072
Jim Gray
William OMullane, Nolan Li, Maria Nieto-Santisteban, Alex Szalay, Ani Thakar, Jim Gray
Batch is back: CasJobs, serving multi-TB data on the Web
null
null
null
Microsoft Technical Report MSR TR 2005 19
cs.DC cs.DB
null
The Sloan Digital Sky Survey (SDSS) science database describes over 140 million objects and is over 1.5 TB in size. The SDSS Catalog Archive Server (CAS) provides several levels of query interface to the SDSS data via the SkyServer website. Most queries execute in seconds or minutes. However, some queries can take hours or days, either because they require non-index scans of the largest tables, or because they request very large result sets, or because they represent very complex aggregations of the data. These "monster queries" not only take a long time, they also affect response times for everyone else - one or more of them can clog the entire system. To ameliorate this problem, we developed a multi-server multi-queue batch job submission and tracking system for the CAS called CasJobs. The transfer of very large result sets from queries over the network is another serious problem. Statistics suggested that much of this data transfer is unnecessary; users would prefer to store results locally in order to allow further joins and filtering. To allow local analysis, a system was developed that gives users their own personal databases (MyDB) at the server side. Users may transfer data to their MyDB, and then perform further analysis before extracting it to their own machine. MyDB tables also provide a convenient way to share results of queries with collaborators without downloading them. CasJobs is built using SOAP XML Web services and has been in operation since May 2004.
[ { "version": "v1", "created": "Thu, 17 Feb 2005 01:55:35 GMT" } ]
2007-05-23T00:00:00
[ [ "OMullane", "William", "" ], [ "Li", "Nolan", "" ], [ "Nieto-Santisteban", "Maria", "" ], [ "Szalay", "Alex", "" ], [ "Thakar", "Ani", "" ], [ "Gray", "Jim", "" ] ]
cs/0502078
Michael Fink
Thomas Eiter, Michael Fink, and Stefan Woltran
Semantical Characterizations and Complexity of Equivalences in Answer Set Programming
58 pages, 6 tables. The contents were partially published in: Proceedings 19th International Conference on Logic Programming (ICLP 2003), pp. 224-238, LNCS 2916, Springer, 2003; and Proceedings 9th European Conference on Logics in Artificial Intelligence (JELIA 2004), pp. 161-173, LNCS 3229, Springer, 2004
null
null
1843-05-01
cs.AI cs.CC
null
In recent research on non-monotonic logic programming, repeatedly strong equivalence of logic programs P and Q has been considered, which holds if the programs P union R and Q union R have the same answer sets for any other program R. This property strengthens equivalence of P and Q with respect to answer sets (which is the particular case for R is the empty set), and has its applications in program optimization, verification, and modular logic programming. In this paper, we consider more liberal notions of strong equivalence, in which the actual form of R may be syntactically restricted. On the one hand, we consider uniform equivalence, where R is a set of facts rather than a set of rules. This notion, which is well known in the area of deductive databases, is particularly useful for assessing whether programs P and Q are equivalent as components of a logic program which is modularly structured. On the other hand, we consider relativized notions of equivalence, where R ranges over rules over a fixed alphabet, and thus generalize our results to relativized notions of strong and uniform equivalence. For all these notions, we consider disjunctive logic programs in the propositional (ground) case, as well as some restricted classes, provide semantical characterizations and analyze the computational complexity. Our results, which naturally extend to answer set semantics for programs with strong negation, complement the results on strong equivalence of logic programs and pave the way for optimizations in answer set solvers as a tool for input-based problem solving.
[ { "version": "v1", "created": "Fri, 18 Feb 2005 11:01:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiter", "Thomas", "" ], [ "Fink", "Michael", "" ], [ "Woltran", "Stefan", "" ] ]
cs/0502082
Thomas Linke
Kathrin Konczak, Thomas Linke, Torsten Schaub
Graphs and colorings for answer set programming
null
null
null
null
cs.AI cs.LO
null
We investigate the usage of rule dependency graphs and their colorings for characterizing and computing answer sets of logic programs. This approach provides us with insights into the interplay between rules when inducing answer sets. We start with different characterizations of answer sets in terms of totally colored dependency graphs that differ in graph-theoretical aspects. We then develop a series of operational characterizations of answer sets in terms of operators on partial colorings. In analogy to the notion of a derivation in proof theory, our operational characterizations are expressed as (non-deterministically formed) sequences of colorings, turning an uncolored graph into a totally colored one. In this way, we obtain an operational framework in which different combinations of operators result in different formal properties. Among others, we identify the basic strategy employed by the noMoRe system and justify its algorithmic approach. Furthermore, we distinguish operations corresponding to Fitting's operator as well as to well-founded semantics. (To appear in Theory and Practice of Logic Programming (TPLP))
[ { "version": "v1", "created": "Mon, 21 Feb 2005 14:28:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Konczak", "Kathrin", "" ], [ "Linke", "Thomas", "" ], [ "Schaub", "Torsten", "" ] ]
cs/0502085
Fabien Viger
Fabien Viger (LIAFA, Regal Ur-R Lip6), Matthieu Latapy (LIAFA)
Fast generation of random connected graphs with prescribed degrees
null
null
null
null
cs.NI cond-mat.dis-nn cs.DM
null
We address here the problem of generating random graphs uniformly from the set of simple connected graphs having a prescribed degree sequence. Our goal is to provide an algorithm designed for practical use both because of its ability to generate very large graphs (efficiency) and because it is easy to implement (simplicity). We focus on a family of heuristics for which we prove optimality conditions, and show how this optimality can be reached in practice. We then propose a different approach, specifically designed for typical real-world degree distributions, which outperforms the first one. Assuming a conjecture which we state and argue rigorously, we finally obtain an log-linear algorithm, which, in spite of being very simple, improves the best known complexity.
[ { "version": "v1", "created": "Tue, 22 Feb 2005 07:59:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Viger", "Fabien", "", "LIAFA, Regal Ur-R Lip6" ], [ "Latapy", "Matthieu", "", "LIAFA" ] ]
cs/0502086
Pierre-Yves Oudeyer
Pierre-Yves Oudeyer
The Self-Organization of Speech Sounds
null
Journal of Theoretical Biology 233 (2005) Issue 3, Pages 435-449
null
null
cs.LG cs.AI cs.CL cs.NE cs.RO math.DS
null
The speech code is a vehicle of language: it defines a set of forms used by a community to carry information. Such a code is necessary to support the linguistic interactions that allow humans to communicate. How then may a speech code be formed prior to the existence of linguistic interactions? Moreover, the human speech code is discrete and compositional, shared by all the individuals of a community but different across communities, and phoneme inventories are characterized by statistical regularities. How can a speech code with these properties form? We try to approach these questions in the paper, using the "methodology of the artificial". We build a society of artificial agents, and detail a mechanism that shows the formation of a discrete speech code without pre-supposing the existence of linguistic capacities or of coordinated interactions. The mechanism is based on a low-level model of sensory-motor interactions. We show that the integration of certain very simple and non language-specific neural devices leads to the formation of a speech code that has properties similar to the human speech code. This result relies on the self-organizing properties of a generic coupling between perception and production within agents, and on the interactions between agents. The artificial system helps us to develop better intuitions on how speech might have appeared, by showing how self-organization might have helped natural selection to find speech.
[ { "version": "v1", "created": "Tue, 22 Feb 2005 09:51:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Oudeyer", "Pierre-Yves", "" ] ]
cs/0502087
Peter Turney
Robert Ewaschuk, Peter Turney
Self-Replicating Strands that Self-Assemble into User-Specified Meshes
27 pages, issued 2005, Java code available at http://purl.org/net/johnnyvon/
null
null
NRC-47442, ERB-1121
cs.NE cs.CE cs.MA
null
It has been argued that a central objective of nanotechnology is to make products inexpensively, and that self-replication is an effective approach to very low-cost manufacturing. The research presented here is intended to be a step towards this vision. In previous work (JohnnyVon 1.0), we simulated machines that bonded together to form self-replicating strands. There were two types of machines (called types 0 and 1), which enabled strands to encode arbitrary bit strings. However, the information encoded in the strands had no functional role in the simulation. The information was replicated without being interpreted, which was a significant limitation for potential manufacturing applications. In the current work (JohnnyVon 2.0), the information in a strand is interpreted as instructions for assembling a polygonal mesh. There are now four types of machines and the information encoded in a strand determines how it folds. A strand may be in an unfolded state, in which the bonds are straight (although they flex slightly due to virtual forces acting on the machines), or in a folded state, in which the bond angles depend on the types of machines. By choosing the sequence of machine types in a strand, the user can specify a variety of polygonal shapes. A simulation typically begins with an initial unfolded seed strand in a soup of unbonded machines. The seed strand replicates by bonding with free machines in the soup. The child strands fold into the encoded polygonal shape, and then the polygons drift together and bond to form a mesh. We demonstrate that a variety of polygonal meshes can be manufactured in the simulation, by simply changing the sequence of machine types in the seed.
[ { "version": "v1", "created": "Tue, 22 Feb 2005 16:53:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Ewaschuk", "Robert", "" ], [ "Turney", "Peter", "" ] ]
cs/0502088
Pascal Hitzler
Pascal Hitzler
Towards a Systematic Account of Different Semantics for Logic Programs
20 pages
null
null
null
cs.AI cs.LO
null
In [Hitzler and Wendt 2002, 2005], a new methodology has been proposed which allows to derive uniform characterizations of different declarative semantics for logic programs with negation. One result from this work is that the well-founded semantics can formally be understood as a stratified version of the Fitting (or Kripke-Kleene) semantics. The constructions leading to this result, however, show a certain asymmetry which is not readily understood. We will study this situation here with the result that we will obtain a coherent picture of relations between different semantics for normal logic programs.
[ { "version": "v1", "created": "Tue, 22 Feb 2005 18:53:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Hitzler", "Pascal", "" ] ]
cs/0502090
Achim Streit
A. Streit, D. Erwin, Th. Lippert, D. Mallmann, R. Menday, M. Rambadt, M. Riedel, M. Romberg, B. Schuller, Ph. Wieder
UNICORE - From Project Results to Production Grids
21 pages, 3 figures
null
null
null
cs.DC cs.OS
null
The UNICORE Grid-technology provides a seamless, secure and intuitive access to distributed Grid resources. In this paper we present the recent evolution from project results to production Grids. At the beginning UNICORE was developed as a prototype software in two projects funded by the German research ministry (BMBF). Over the following years, in various European-funded projects, UNICORE evolved to a full-grown and well-tested Grid middleware system, which today is used in daily production at many supercomputing centers worldwide. Beyond this production usage, the UNICORE technology serves as a solid basis in many European and International research projects, which use existing UNICORE components to implement advanced features, high level services, and support for applications from a growing range of domains. In order to foster these ongoing developments, UNICORE is available as open source under BSD licence at SourceForge, where new releases are published on a regular basis. This paper is a review of the UNICORE achievements so far and gives a glimpse on the UNICORE roadmap.
[ { "version": "v1", "created": "Thu, 24 Feb 2005 14:13:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Streit", "A.", "" ], [ "Erwin", "D.", "" ], [ "Lippert", "Th.", "" ], [ "Mallmann", "D.", "" ], [ "Menday", "R.", "" ], [ "Rambadt", "M.", "" ], [ "Riedel", "M.", "" ], [ "Romberg", "M.", "" ], [ "Schuller", "B.", "" ], [ "Wieder", "Ph.", "" ] ]
cs/0502093
Alessandro Mei
Alessandro Mei and Romeo Rizzi
Online Permutation Routing in Partitioned Optical Passive Star Networks
null
null
null
null
cs.DC
null
This paper establishes the state of the art in both deterministic and randomized online permutation routing in the POPS network. Indeed, we show that any permutation can be routed online on a POPS network either with $O(\frac{d}{g}\log g)$ deterministic slots, or, with high probability, with $5c\lceil d/g\rceil+o(d/g)+O(\log\log g)$ randomized slots, where constant $c=\exp (1+e^{-1})\approx 3.927$. When $d=\Theta(g)$, that we claim to be the "interesting" case, the randomized algorithm is exponentially faster than any other algorithm in the literature, both deterministic and randomized ones. This is true in practice as well. Indeed, experiments show that it outperforms its rivals even starting from as small a network as a POPS(2,2), and the gap grows exponentially with the size of the network. We can also show that, under proper hypothesis, no deterministic algorithm can asymptotically match its performance.
[ { "version": "v1", "created": "Sat, 26 Feb 2005 00:07:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Mei", "Alessandro", "" ], [ "Rizzi", "Romeo", "" ] ]
cs/0502094
Samir Aknine
Samir Aknine, Onn Shehory
Coalition Formation: Concessions, Task Relationships and Complexity Reduction
null
null
null
null
cs.MA
null
Solutions to the coalition formation problem commonly assume agent rationality and, correspondingly, utility maximization. This in turn may prevent agents from making compromises. As shown in recent studies, compromise may facilitate coalition formation and increase agent utilities. In this study we leverage on those new results. We devise a novel coalition formation mechanism that enhances compromise. Our mechanism can utilize information on task dependencies to reduce formation complexity. Further, it works well with both cardinal and ordinal task values. Via experiments we show that the use of the suggested compromise-based coalition formation mechanism provides significant savings in the computation and communication complexity of coalition formation. Our results also show that when information on task dependencies is used, the complexity of coalition formation is further reduced. We demonstrate successful use of the mechanism for collaborative information filtering, where agents combine linguistic rules to analyze documents' contents.
[ { "version": "v1", "created": "Sun, 27 Feb 2005 18:16:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Aknine", "Samir", "" ], [ "Shehory", "Onn", "" ] ]
cs/0502095
Leandro Marturelli Schaeffer
Gilson A. Giraldi, Leandro S. Marturelli, Paulo S. Rodrigues
Gradient Vector Flow Models for Boundary Extraction in 2D Images
8 pages, 11 figures
null
null
null
cs.CV
null
The Gradient Vector Flow (GVF) is a vector diffusion approach based on Partial Differential Equations (PDEs). This method has been applied together with snake models for boundary extraction medical images segmentation. The key idea is to use a diffusion-reaction PDE to generate a new external force field that makes snake models less sensitivity to initialization as well as improves the snake's ability to move into boundary concavities. In this paper, we firstly review basic results about convergence and numerical analysis of usual GVF schemes. We point out that GVF presents numerical problems due to discontinuities image intensity. This point is considered from a practical viewpoint from which the GVF parameters must follow a relationship in order to improve numerical convergence. Besides, we present an analytical analysis of the GVF dependency from the parameters values. Also, we observe that the method can be used for multiply connected domains by just imposing the suitable boundary condition. In the experimental results we verify these theoretical points and demonstrate the utility of GVF on a segmentation approach that we have developed based on snakes.
[ { "version": "v1", "created": "Mon, 28 Feb 2005 15:09:08 GMT" }, { "version": "v2", "created": "Wed, 20 Jul 2005 19:19:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "Marturelli", "Leandro S.", "" ], [ "Rodrigues", "Paulo S.", "" ] ]
cs/0502096
Jano van Hemert
J.I. van Hemert
Property analysis of symmetric travelling salesman problem instances acquired through evolution
To be published in G. Raidl and J. Gottlieb, editors, Evolutionary Computation in Combinatorial Optimization, Springer Lecture Notes on Computer Science, pages 122-131. Springer-Verlag, Berlin, 2005
null
null
null
cs.NE cs.AI
null
We show how an evolutionary algorithm can successfully be used to evolve a set of difficult to solve symmetric travelling salesman problem instances for two variants of the Lin-Kernighan algorithm. Then we analyse the instances in those sets to guide us towards deferring general knowledge about the efficiency of the two variants in relation to structural properties of the symmetric travelling sale sman problem.
[ { "version": "v1", "created": "Mon, 28 Feb 2005 16:40:34 GMT" } ]
2007-05-23T00:00:00
[ [ "van Hemert", "J. I.", "" ] ]
cs/0503001
Emanuel Diamant
Emanuel Diamant
Top-Down Unsupervised Image Segmentation (it sounds like oxymoron, but actually it is not)
null
null
null
null
cs.CV cs.IR
null
Pattern recognition is generally assumed as an interaction of two inversely directed image-processing streams: the bottom-up information details gathering and localization (segmentation) stream, and the top-down information features aggregation, association and interpretation (recognition) stream. Inspired by recent evidence from biological vision research and by the insights of Kolmogorov Complexity theory, we propose a new, just top-down evolving, procedure of initial image segmentation. We claim that traditional top-down cognitive reasoning, which is supposed to guide the segmentation process to its final result, is not at all a part of the image information content evaluation. And that initial image segmentation is certainly an unsupervised process. We present some illustrative examples, which support our claims.
[ { "version": "v1", "created": "Tue, 1 Mar 2005 05:17:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
cs/0503002
Lester Lobo
Lester Lobo, James D. Arthur
Local and Global Analysis: Complementary Activities for Increasing the Effectiveness of Requirements Verification and Validation
6 pages, 3 figures, published: ACM Southeast Conference, March 2005
null
null
null
cs.SE
null
This paper presents a unique approach to connecting requirements engineering (RE) activities into a process framework that can be employed to obtain quality requirements with reduced expenditures of effort and cost. We propose a two-phase model that is novel in that it introduces the concept of verification and validation (V&V) early in the requirements life cycle. In the first phase, we perform V&V immediately following the elicitation of requirements for each individually distinct system function. Because the first phase focuses on capturing smaller sets of related requirements iteratively, each corresponding V&V activity is better focused for detecting and correcting errors in each requirement set. In the second phase, a complementary verification activity is initiated; the corresponding focus is on the quality of linkages between requirements sets rather than on the requirements within the sets. Consequently, this approach reduces the effort in verification and enhances the focus on the verification task. Our approach, unlike other models, has a minimal time delay between the elicitation of requirements and the execution of the V&V activities. Because of this short time gap, the stakeholders have a clearer recollection of the requirements, their context and rationale; this enhances the stakeholder feedback. Furthermore, our model includes activities that closely align with the effective RE processes employed in the software industry. Thus, our approach facilitates a better understanding of the flow of requirements, and provides guidance for the implementation of the RE process.
[ { "version": "v1", "created": "Wed, 2 Mar 2005 00:21:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Lester", "" ], [ "Arthur", "James D.", "" ] ]
cs/0503004
Lester Lobo
Lester Lobo, James D. Arthur
Effective Requirements Generation: Synchronizing Early Verification & Validation, Methods and Method Selection Criteria
46 pages, 7 figures, 7 tables, provides elaborate description of the research
null
null
null
cs.SE
null
This paper presents an approach for the implementation and execution of an effective requirements generation process. We achieve this goal by providing a well-defined requirements engineering model that includes verification and validation (V&V), and analysis. In addition, we identify focused activity objectives and map popular methods to lower-level activities, and define a criterion based process for optimizing method selection for attendant activities. Our model, unlike other models, addresses the complete requirements generation process and consists of activities defined at more adequate levels of abstraction. Furthermore, our model also incorporates a unique approach to V&V that enhances quality and reduces the cost of generating requirements. Additionally, activity objectives are identified and explicitly stated - not implied as in the current models. To assist in the selection of an appropriate set of methods, we have mapped commonly used methods to activities based on their objectives. Finally, we have identified method selection criteria and prescribed a reduced set of methods that optimize these criteria for each activity in our model. Thus, our approach assists in the task of selecting methods by using selection criteria to reduce a large collection of potential methods to a smaller, manageable set. The model, clear mapping of methods to activity objectives, and the criteria based process, taken together, provide the much needed guidance for the effective implementation and execution of the requirements generation process.
[ { "version": "v1", "created": "Wed, 2 Mar 2005 01:05:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Lester", "" ], [ "Arthur", "James D.", "" ] ]
cs/0503007
Johan Bollen
Johan Bollen, Herbert Van de Sompel, Joan Smith and Rick Luce
Toward alternative metrics of journal impact: A comparison of download and citation data
34 pages, submitted to Information Processing and Management, special issue on Informetrics
null
null
null
cs.DL
null
We generated networks of journal relationships from citation and download data, and determined journal impact rankings from these networks using a set of social network centrality metrics. The resulting journal impact rankings were compared to the ISI IF. Results indicate that, although social network metrics and ISI IF rankings deviate moderately for citation-based journal networks, they differ considerably for journal networks derived from download data. We believe the results represent a unique aspect of general journal impact that is not captured by the ISI IF. These results furthermore raise questions regarding the validity of the ISI IF as the sole assessment of journal impact, and suggest the possibility of devising impact metrics based on usage information in general.
[ { "version": "v1", "created": "Thu, 3 Mar 2005 05:14:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Bollen", "Johan", "" ], [ "Van de Sompel", "Herbert", "" ], [ "Smith", "Joan", "" ], [ "Luce", "Rick", "" ] ]
cs/0503008
Laurent Tournier
Laurent Tournier (LMC - IMAG)
Approximation of dynamical systems using S-systems theory : application to biological systems
null
null
null
null
cs.SC math.DS q-bio.MN
null
In this paper we propose a new symbolic-numeric algorithm to find positive equilibria of a n-dimensional dynamical system. This algorithm implies a symbolic manipulation of ODE in order to give a local approximation of differential equations with power-law dynamics (S-systems). A numerical calculus is then needed to converge towards an equilibrium, giving at the same time a S-system approximating the initial system around this equilibrium. This algorithm is applied to a real biological example in 14 dimensions which is a subsystem of a metabolic pathway in Arabidopsis Thaliana.
[ { "version": "v1", "created": "Thu, 3 Mar 2005 06:32:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Tournier", "Laurent", "", "LMC - IMAG" ] ]
cs/0503009
Valmir Barbosa
R. S. C. Leao, V. C. Barbosa
Minimal chordal sense of direction and circulant graphs
null
Lecture Notes in Computer Science 4162 (2006), 670-680
10.1007/11821069_58
null
cs.DM
null
A sense of direction is an edge labeling on graphs that follows a globally consistent scheme and is known to considerably reduce the complexity of several distributed problems. In this paper, we study a particular instance of sense of direction, called a chordal sense of direction (CSD). In special, we identify the class of k-regular graphs that admit a CSD with exactly k labels (a minimal CSD). We prove that connected graphs in this class are Hamiltonian and that the class is equivalent to that of circulant graphs, presenting an efficient (polynomial-time) way of recognizing it when the graphs' degree k is fixed.
[ { "version": "v1", "created": "Thu, 3 Mar 2005 12:06:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Leao", "R. S. C.", "" ], [ "Barbosa", "V. C.", "" ] ]
cs/0503014
Christian W. Straka
Christian W. Straka
ADF95: Tool for automatic differentiation of a FORTRAN code designed for large numbers of independent variables
24 pages, 2 figures, 4 tables, accepted in Computer Physics Communications
null
10.1016/j.cpc.2005.01.011
null
cs.MS
null
ADF95 is a tool to automatically calculate numerical first derivatives for any mathematical expression as a function of user defined independent variables. Accuracy of derivatives is achieved within machine precision. ADF95 may be applied to any FORTRAN 77/90/95 conforming code and requires minimal changes by the user. It provides a new derived data type that holds the value and derivatives and applies forward differencing by overloading all FORTRAN operators and intrinsic functions. An efficient indexing technique leads to a reduced memory usage and a substantially increased performance gain over other available tools with operator overloading. This gain is especially pronounced for sparse systems with large number of independent variables. A wide class of numerical simulations, e.g., those employing implicit solvers, can profit from ADF95.
[ { "version": "v1", "created": "Fri, 4 Mar 2005 19:20:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Straka", "Christian W.", "" ] ]
cs/0503016
Xiaoming Liu
Xiaoming Liu, Lyudmila Balakireva, Patrick Hochstenbach, Herbert Van de Sompel
File-based storage of Digital Objects and constituent datastreams: XMLtapes and Internet Archive ARC files
12 pages, 1 figures (camera-ready copy for ECDL 2005)
null
null
null
cs.DL
null
This paper introduces the write-once/read-many XMLtape/ARC storage approach for Digital Objects and their constituent datastreams. The approach combines two interconnected file-based storage mechanisms that are made accessible in a protocol-based manner. First, XML-based representations of multiple Digital Objects are concatenated into a single file named an XMLtape. An XMLtape is a valid XML file; its format definition is independent of the choice of the XML-based complex object format by which Digital Objects are represented. The creation of indexes for both the identifier and the creation datetime of the XML-based representation of the Digital Objects facilitates OAI-PMH-based access to Digital Objects stored in an XMLtape. Second, ARC files, as introduced by the Internet Archive, are used to contain the constituent datastreams of the Digital Objects in a concatenated manner. An index for the identifier of the datastream facilitates OpenURL-based access to an ARC file. The interconnection between XMLtapes and ARC files is provided by conveying the identifiers of ARC files associated with an XMLtape as administrative information in the XMLtape, and by including OpenURL references to constituent datastreams of a Digital Object in the XML-based representation of that Digital Object.
[ { "version": "v1", "created": "Mon, 7 Mar 2005 23:17:23 GMT" }, { "version": "v2", "created": "Fri, 3 Jun 2005 17:27:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Liu", "Xiaoming", "" ], [ "Balakireva", "Lyudmila", "" ], [ "Hochstenbach", "Patrick", "" ], [ "Van de Sompel", "Herbert", "" ] ]
cs/0503017
Hooman Nikmehr
Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim
A Fast Combined Decimal Adder/Subtractor
This paper has been withdrawn by the authors
null
null
null
cs.OH
null
This paper has been withdrawn.
[ { "version": "v1", "created": "Mon, 7 Mar 2005 23:32:27 GMT" }, { "version": "v2", "created": "Wed, 6 Apr 2005 01:54:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Nikmehr", "Hooman", "" ], [ "Phillips", "Braden", "" ], [ "Lim", "Cheng-Chew", "" ] ]
cs/0503020
Stevan Harnad
Tim Brody, Stevan Harnad
Earlier Web Usage Statistics as Predictors of Later Citation Impact
null
null
null
null
cs.IR
null
The use of citation counts to assess the impact of research articles is well established. However, the citation impact of an article can only be measured several years after it has been published. As research articles are increasingly accessed through the Web, the number of times an article is downloaded can be instantly recorded and counted. One would expect the number of times an article is read to be related both to the number of times it is cited and to how old the article is. This paper analyses how short-term Web usage impact predicts medium-term citation impact. The physics e-print archive (arXiv.org) is used to test this.
[ { "version": "v1", "created": "Tue, 8 Mar 2005 22:26:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Brody", "Tim", "" ], [ "Harnad", "Stevan", "" ] ]
cs/0503021
Stevan Harnad
Stevan Harnad
Fast-Forward on the Green Road to Open Access: The Case Against Mixing Up Green and Gold
null
Ariadne 42 January 2005; http://www.ariadne.ac.uk/issue42/harnad/
null
null
cs.IR
null
This article is a critique of: "The 'Green' and 'Gold' Roads to Open Access: The Case for Mixing and Matching" by Jean-Claude Guedon (in Serials Review 30(4) 2004). Open Access (OA) means: free online access to all peer-reviewed journal articles. Jean-Claude Guedon argues against the efficacy of author self-archiving of peer-reviewed journal articles (the "Green" road to OA). He suggests instead that we should convert to Open Access Publishing (the "Golden" road to OA) by "mixing and matching" Green and Gold as follows: o First, self-archive dissertations (not published, peer-reviewed journal articles). o Second, identify and tag how those dissertations have been evaluated and reviewed. o Third, self-archive unrefereed preprints (not published, peer-reviewed journal articles). o Fourth, develop new mechanisms for evaluating and reviewing those unrefereed preprints, at multiple levels. The result will be OA Publishing (Gold). I argue that rather than yet another 10 years of speculation like this, what is actually needed (and imminent) is for OA self-archiving to be mandated by research funders and institutions so that the self-archiving of published, peer-reviewed journal articles (Green) can be fast-forwarded to 100% OA.
[ { "version": "v1", "created": "Tue, 8 Mar 2005 22:44:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Harnad", "Stevan", "" ] ]
cs/0503022
Daniel Pfeifer
Daniel Pfeifer and Peter C. Lockemann
Theory and Practice of Transactional Method Caching
null
null
null
2005-9
cs.DB
null
Nowadays, tiered architectures are widely accepted for constructing large scale information systems. In this context application servers often form the bottleneck for a system's efficiency. An application server exposes an object oriented interface consisting of set of methods which are accessed by potentially remote clients. The idea of method caching is to store results of read-only method invocations with respect to the application server's interface on the client side. If the client invokes the same method with the same arguments again, the corresponding result can be taken from the cache without contacting the server. It has been shown that this approach can considerably improve a real world system's efficiency. This paper extends the concept of method caching by addressing the case where clients wrap related method invocations in ACID transactions. Demarcating sequences of method calls in this way is supported by many important application server standards. In this context the paper presents an architecture, a theory and an efficient protocol for maintaining full transactional consistency and in particular serializability when using a method cache on the client side. In order to create a protocol for scheduling cached method results, the paper extends a classical transaction formalism. Based on this extension, a recovery protocol and an optimistic serializability protocol are derived. The latter one differs from traditional transactional cache protocols in many essential ways. An efficiency experiment validates the approach: Using the cache a system's performance and scalability are considerably improved.
[ { "version": "v1", "created": "Wed, 9 Mar 2005 17:53:15 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2005 12:35:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Pfeifer", "Daniel", "" ], [ "Lockemann", "Peter C.", "" ] ]
cs/0503023
Josiah Carlson
Josiah Carlson and David Eppstein
The Weighted Maximum-Mean Subtree and Other Bicriterion Subtree Problems
10 pages
null
null
null
cs.CG cs.DS
null
We consider problems in which we are given a rooted tree as input, and must find a subtree with the same root, optimizing some objective function of the nodes in the subtree. When this function is the sum of constant node weights, the problem is trivially solved in linear time. When the objective is the sum of weights that are linear functions of a parameter, we show how to list all optima for all possible parameter values in O(n log n) time; this parametric optimization problem can be used to solve many bicriterion optimizations problems, in which each node has two values xi and yi associated with it, and the objective function is a bivariate function f(SUM(xi),SUM(yi)) of the sums of these two values. A special case, when f is the ratio of the two sums, is the Weighted Maximum-Mean Subtree Problem, or equivalently the Fractional Prize-Collecting Steiner Tree Problem on Trees; for this special case, we provide a linear time algorithm for this problem when all weights are positive, improving a previous O(n log n) solution, and prove that the problem is NP-complete when negative weights are allowed.
[ { "version": "v1", "created": "Wed, 9 Mar 2005 18:16:14 GMT" }, { "version": "v2", "created": "Wed, 4 May 2005 21:45:54 GMT" }, { "version": "v3", "created": "Tue, 16 Aug 2005 06:06:57 GMT" }, { "version": "v4", "created": "Tue, 6 Dec 2005 01:56:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Carlson", "Josiah", "" ], [ "Eppstein", "David", "" ] ]
cs/0503024
Dan Tufis I.
Dan Tufis, Radu Ion, Nancy Ide
Fine-Grained Word Sense Disambiguation Based on Parallel Corpora, Word Alignment, Word Clustering and Aligned Wordnets
7 pages in Proc. of COLING2005
In proceedings of the 20th International Conference on Computational Linguistics, COLING2004, Geneva, 2004, pp. 1312-1318
null
null
cs.AI cs.CL
null
The paper presents a method for word sense disambiguation based on parallel corpora. The method exploits recent advances in word alignment and word clustering based on automatic extraction of translation equivalents and being supported by available aligned wordnets for the languages in the corpus. The wordnets are aligned to the Princeton Wordnet, according to the principles established by EuroWordNet. The evaluation of the WSD system, implementing the method described herein showed very encouraging results. The same system used in a validation mode, can be used to check and spot alignment errors in multilingually aligned wordnets as BalkaNet and EuroWordNet.
[ { "version": "v1", "created": "Thu, 10 Mar 2005 11:49:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Tufis", "Dan", "" ], [ "Ion", "Radu", "" ], [ "Ide", "Nancy", "" ] ]
cs/0503025
Rajkumar Buyya
Jia Yu, Rajkumar Buyya
A Taxonomy of Workflow Management Systems for Grid Computing
29 pages, 15 figures
null
null
GRIDS-TR-2005-1, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, March 10, 2005
cs.DC
null
With the advent of Grid and application technologies, scientists and engineers are building more and more complex applications to manage and process large data sets, and execute scientific experiments on distributed resources. Such application scenarios require means for composing and executing complex workflows. Therefore, many efforts have been made towards the development of workflow management systems for Grid computing. In this paper, we propose a taxonomy that characterizes and classifies various approaches for building and executing workflows on Grids. We also survey several representative Grid workflow systems developed by various projects world-wide to demonstrate the comprehensiveness of the taxonomy. The taxonomy not only highlights the design and engineering similarities and differences of state-of-the-art in Grid workflow systems, but also identifies the areas that need further research.
[ { "version": "v1", "created": "Fri, 11 Mar 2005 01:13:07 GMT" }, { "version": "v2", "created": "Wed, 13 Apr 2005 08:21:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Yu", "Jia", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0503028
Do Duc Hanh
Phan Minh Dung, Do Duc Hanh, and Phan Minh Thang (Asian Institute of Technology)
Stabilization of Cooperative Information Agents in Unpredictable Environment: A Logic Programming Approach
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO cs.MA cs.PL
null
An information agent is viewed as a deductive database consisting of 3 parts: an observation database containing the facts the agent has observed or sensed from its surrounding environment, an input database containing the information the agent has obtained from other agents, and an intensional database which is a set of rules for computing derived information from the information stored in the observation and input databases. Stabilization of a system of information agents represents a capability of the agents to eventually get correct information about their surrounding despite unpredictable environment changes and the incapability of many agents to sense such changes causing them to have temporary incorrect information. We argue that the stabilization of a system of cooperative information agents could be understood as the convergence of the behavior of the whole system toward the behavior of a "superagent", who has the sensing and computing capabilities of all agents combined. We show that unfortunately, stabilization is not guaranteed in general, even if the agents are fully cooperative and do not hide any information from each other. We give sufficient conditions for stabilization and discuss the consequences of our results.
[ { "version": "v1", "created": "Mon, 14 Mar 2005 09:07:24 GMT" }, { "version": "v2", "created": "Thu, 24 Mar 2005 01:57:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Dung", "Phan Minh", "", "Asian Institute of\n Technology" ], [ "Hanh", "Do Duc", "", "Asian Institute of\n Technology" ], [ "Thang", "Phan Minh", "", "Asian Institute of\n Technology" ] ]
cs/0503030
Rajesh Pampapathi
Rajesh M. Pampapathi, Boris Mirkin, Mark Levene
A Suffix Tree Approach to Email Filtering
Revisions made in the light of reviewer comments. Main changes: (i) The extension and elaboration of section 4.4 which describes the scoring algorithm; (ii) Favouring the use of false positive and false negative performance measures over the use of precision and recall; (iii) The addition of ROC curves wherever possible; and (iv) Inclusion of performance statistics for algorithm. Re-submitted 5th August 2005
null
null
null
cs.AI cs.CL
null
We present an approach to email filtering based on the suffix tree data structure. A method for the scoring of emails using the suffix tree is developed and a number of scoring and score normalisation functions are tested. Our results show that the character level representation of emails and classes facilitated by the suffix tree can significantly improve classification accuracy when compared with the currently popular methods, such as naive Bayes. We believe the method can be extended to the classification of documents in other domains.
[ { "version": "v1", "created": "Mon, 14 Mar 2005 18:12:03 GMT" }, { "version": "v2", "created": "Tue, 6 Dec 2005 15:22:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Pampapathi", "Rajesh M.", "" ], [ "Mirkin", "Boris", "" ], [ "Levene", "Mark", "" ] ]
cs/0503032
Loreto Bravo
L. Bertossi (1), L. Bravo (1), E. Franconi (2), A. Lopatenko (2 and 3) ((1) Carleton University (2) Free University of Bozen--Bolzano, (3) University of Manchester)
Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints
35 pages. Extended version of the camera ready version to appear in Proc. of the Databases Programming Languages Conference (DBPL 05), Springer LNCS volume 3774
null
null
null
cs.DB cs.CC
null
Consistent query answering is the problem of computing the answers from a database that are consistent with respect to certain integrity constraints that the database as a whole may fail to satisfy. Those answers are characterized as those that are invariant under minimal forms of restoring the consistency of the database. In this context, we study the problem of repairing databases by fixing integer numerical values at the attribute level with respect to denial and aggregation constraints. We introduce a quantitative definition of database fix, and investigate the complexity of several decision and optimization problems, including DFP, i.e. the existence of fixes within a given distance from the original instance, and CQA, i.e. deciding consistency of answers to aggregate conjunctive queries under different semantics. We provide sharp complexity bounds, identify relevant tractable cases; and introduce approximation algorithms for some of those that are intractable. More specifically, we obtain results like undecidability of existence of fixes for aggregation constraints; MAXSNP-hardness of DFP, but a good approximation algorithm for a relevant special case; and intractability but good approximation for CQA for aggregate queries for one database atom denials (plus built-ins).
[ { "version": "v1", "created": "Tue, 15 Mar 2005 00:03:59 GMT" }, { "version": "v2", "created": "Wed, 25 May 2005 17:46:21 GMT" }, { "version": "v3", "created": "Fri, 28 Oct 2005 19:43:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertossi", "L.", "", "2 and 3" ], [ "Bravo", "L.", "", "2 and 3" ], [ "Franconi", "E.", "", "2 and 3" ], [ "Lopatenko", "A.", "", "2 and 3" ] ]
cs/0503033
Stergos Afantenos
Stergos D. Afantenos, Konstantina Liontou, Maria Salapata, Vangelis Karkaletsis
An Introduction to the Summarization of Evolving Events: Linear and Non-linear Evolution
10 pages, 3 figures. To be pulished in Natural Language Understanding and Cognitive Science (NLUCS - 2005) conference
Edited by Bernadete Sharp, Proceedings of the 2nd International Workshop on Natural Language Understanding and Cognitive Science, NLUCS 2005. Maiami, Florida, USA: INSTICC Press. pp 91-99.
null
null
cs.CL cs.IR
null
This paper examines the summarization of events that evolve through time. It discusses different types of evolution taking into account the time in which the incidents of an event are happening and the different sources reporting on the specific event. It proposes an approach for multi-document summarization which employs ``messages'' for representing the incidents of an event and cross-document relations that hold between messages according to certain conditions. The paper also outlines the current version of the summarization system we are implementing to realize this approach.
[ { "version": "v1", "created": "Tue, 15 Mar 2005 15:31:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Afantenos", "Stergos D.", "" ], [ "Liontou", "Konstantina", "" ], [ "Salapata", "Maria", "" ], [ "Karkaletsis", "Vangelis", "" ] ]
cs/0503035
Alexey Savvateev
Anna Bogomolnaia, Michel Le Breton, Alexei Savvateev, Shlomo Weber
The egalitarian sharing rule in provision of public projects
7 pages
null
null
null
cs.GT
null
In this note we consider a society that partitions itself into disjoint jurisdictions, each choosing a location of its public project and a taxation scheme to finance it. The set of public project is multi-dimensional, and their costs could vary from jurisdiction to jurisdiction. We impose two principles, egalitarianism, that requires the equalization of the total cost for all agents in the same jurisdiction, and efficiency, that implies the minimization of the aggregate total cost within jurisdiction. We show that these two principles always yield a core-stable partition but a Nash stable partition may fail to exist.
[ { "version": "v1", "created": "Thu, 17 Mar 2005 09:24:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Bogomolnaia", "Anna", "" ], [ "Breton", "Michel Le", "" ], [ "Savvateev", "Alexei", "" ], [ "Weber", "Shlomo", "" ] ]
cs/0503036
Ricardo Corin
R. Corin, S. Etalle, P.H. Hartel and A. Mader
Timed Analysis of Security Protocols
null
null
null
null
cs.CR
null
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL. Further, a taxonomy is obtained by studying and categorising protocols from the well known Clark Jacob library and the Security Protocol Open Repository (SPORE) library. Finally, we present some new challenges and threats that arise when considering time in the analysis, by providing a novel protocol that uses time challenges and exposing a timing attack over an implementation of an existing security protocol.
[ { "version": "v1", "created": "Thu, 17 Mar 2005 10:05:18 GMT" }, { "version": "v2", "created": "Sun, 30 Oct 2005 21:03:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Corin", "R.", "" ], [ "Etalle", "S.", "" ], [ "Hartel", "P. H.", "" ], [ "Mader", "A.", "" ] ]
cs/0503037
Zengyou He
Zengyou He
Mining Top-k Approximate Frequent Patterns
13 pages
null
null
TR-2005-0315
cs.DB cs.AI
null
Frequent pattern (itemset) mining in transactional databases is one of the most well-studied problems in data mining. One obstacle that limits the practical usage of frequent pattern mining is the extremely large number of patterns generated. Such a large size of the output collection makes it difficult for users to understand and use in practice. Even restricting the output to the border of the frequent itemset collection does not help much in alleviating the problem. In this paper we address the issue of overwhelmingly large output size by introducing and studying the following problem: mining top-k approximate frequent patterns. The union of the power sets of these k sets should satisfy the following conditions: (1) including itemsets with larger support as many as possible and (2) including itemsets with smaller support as less as possible. An integrated objective function is designed to combine these two objectives. Consequently, we derive the upper bounds on objective function and present an approximate branch-and-bound method for finding the feasible solution. We give empirical evidence showing that our formulation and approximation methods work well in practice.
[ { "version": "v1", "created": "Thu, 17 Mar 2005 11:01:25 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ] ]
cs/0503043
Paolo Liberatore
Paolo Liberatore
Complexity Issues in Finding Succinct Solutions of PSPACE-Complete Problems
null
null
null
null
cs.AI cs.CC cs.LO
null
We study the problem of deciding whether some PSPACE-complete problems have models of bounded size. Contrary to problems in NP, models of PSPACE-complete problems may be exponentially large. However, such models may take polynomial space in a succinct representation. For example, the models of a QBF are explicitely represented by and-or trees (which are always of exponential size) but can be succinctely represented by circuits (which can be polynomial or exponential). We investigate the complexity of deciding the existence of such succinct models when a bound on size is given.
[ { "version": "v1", "created": "Fri, 18 Mar 2005 17:30:39 GMT" }, { "version": "v2", "created": "Sat, 19 Mar 2005 11:13:15 GMT" }, { "version": "v3", "created": "Tue, 29 Mar 2005 19:32:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Liberatore", "Paolo", "" ] ]
cs/0503045
Gregory Edwin Graham
G. E. Graham (1), M. Anzar Afaq (1), David Evans (1), Gerald Guglielmo (1), Eric Wicklund (1), Peter Love (2) ((1) Fermi National Accelerator Laboratory, (2) University of Lancaster)
Contextual Constraint Modeling in Grid Application Workflows
19 pages, 5 figures; Submitted to Concurrency and Computation: Practice and Experience for the Special Issue on Workflows at GGF10, cpe859
null
null
null
cs.DC
null
This paper introduces a new mechanism for specifying constraints in distributed workflows. By introducing constraints in a contextual form, it is shown how different people and groups within collaborative communities can cooperatively constrain workflows. A comparison with existing state-of-the-art workflow systems is made. These ideas are explored in practice with an illustrative example from High Energy Physics.
[ { "version": "v1", "created": "Sat, 19 Mar 2005 01:28:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Graham", "G. E.", "" ], [ "Afaq", "M. Anzar", "" ], [ "Evans", "David", "" ], [ "Guglielmo", "Gerald", "" ], [ "Wicklund", "Eric", "" ], [ "Love", "Peter", "" ] ]
cs/0503046
Haixia Jia
Dimitris Achlioptas and Haixia Jia and Cristopher Moore
Hiding Satisfying Assignments: Two are Better than One
Preliminary version appeared in AAAI 2004
null
null
null
cs.AI cond-mat.dis-nn cond-mat.stat-mech cs.CC
null
The evaluation of incomplete satisfiability solvers depends critically on the availability of hard satisfiable instances. A plausible source of such instances consists of random k-SAT formulas whose clauses are chosen uniformly from among all clauses satisfying some randomly chosen truth assignment A. Unfortunately, instances generated in this manner tend to be relatively easy and can be solved efficiently by practical heuristics. Roughly speaking, as the formula's density increases, for a number of different algorithms, A acts as a stronger and stronger attractor. Motivated by recent results on the geometry of the space of satisfying truth assignments of random k-SAT and NAE-k-SAT formulas, we introduce a simple twist on this basic model, which appears to dramatically increase its hardness. Namely, in addition to forbidding the clauses violated by the hidden assignment A, we also forbid the clauses violated by its complement, so that both A and complement of A are satisfying. It appears that under this "symmetrization'' the effects of the two attractors largely cancel out, making it much harder for algorithms to find any truth assignment. We give theoretical and experimental evidence supporting this assertion.
[ { "version": "v1", "created": "Sun, 20 Mar 2005 02:46:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Achlioptas", "Dimitris", "" ], [ "Jia", "Haixia", "" ], [ "Moore", "Cristopher", "" ] ]
cs/0503048
Arindam Mitra
Arindam Mitra
Is entanglement necessary to have unconditional security in quantum bit commitment ?
Pdf. 2 pages. Revised
null
null
null
cs.CR
null
A simple un-entanglement based quantum bit commitment scheme is presented. Although commitment is unconditionally secure but concealment is not.
[ { "version": "v1", "created": "Mon, 21 Mar 2005 15:20:14 GMT" }, { "version": "v2", "created": "Fri, 18 Nov 2005 15:39:44 GMT" }, { "version": "v3", "created": "Fri, 31 Mar 2006 13:58:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
cs/0503050
Nikita Sakhanenko
Hanna Makaruk, Robert Owczarek, Nikita Sakhanenko
Systematic Method for Path-Complete White Box Testing
24 pages, 3 figures, submitted to Software Testing, Verification and Reliability (STVR)
null
null
LA-UR-05-1850
cs.SE
null
A systematic, language-independent method of finding a minimal set of paths covering the code of a sequential program is proposed for application in White Box testing. Execution of all paths from the set ensures also statement coverage. Execution fault marks problematic areas of the code. The method starts from a UML activity diagram of a program. The diagram is transformed into a directed graph: graph's nodes substitute decision and action points; graph's directed edges substitute action arrows. The number of independent paths equals easy-to-compute cyclomatic complexity of the graph. Association of a vector to each path creates a path vector space. Independence of the paths is equivalent to linear independence of the vectors. It is sufficient to test any base of the path space to complete the procedure. An effective algorithm for choosing the base paths is presented.
[ { "version": "v1", "created": "Mon, 21 Mar 2005 21:26:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Makaruk", "Hanna", "" ], [ "Owczarek", "Robert", "" ], [ "Sakhanenko", "Nikita", "" ] ]
cs/0503051
Fengfeng Zhou
Fengfeng Zhou, Guoliang Chen, and Yinlong Xu
Construction of Small Worlds in the Physical Topology of Wireless Networks
null
null
null
null
cs.NI
null
The concept of small worlds is introduced into the physical topology of wireless networks in this work. A. Helmy provided two con- struction schemes of small worlds for the wireless networks, link rewiring and link addition, but he mainly focused on the virtual topology. Based on the broadcasting nature of the radio transmission, we propose a con- struction scheme of small worlds for the physical topology of Multiple- Input Multiple-Output (MIMO) wireless networks. Besides the topology- related topics, we also evaluate the reduction of the power required by a request.
[ { "version": "v1", "created": "Tue, 22 Mar 2005 03:23:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Fengfeng", "" ], [ "Chen", "Guoliang", "" ], [ "Xu", "Yinlong", "" ] ]
cs/0503053
Carlos Miravet
Carlos Miravet and Francisco B. Rodriguez (EPS-UAM, Madrid, Spain)
A hybrid MLP-PNN architecture for fast image superresolution
8 pages with 4 figures. ICANN/ICONIP 2003
Lect. Notes Comput. Sc. 2714 (2003) 401-408
null
null
cs.CV cs.MM
null
Image superresolution methods process an input image sequence of a scene to obtain a still image with increased resolution. Classical approaches to this problem involve complex iterative minimization procedures, typically with high computational costs. In this paper is proposed a novel algorithm for super-resolution that enables a substantial decrease in computer load. First, a probabilistic neural network architecture is used to perform a scattered-point interpolation of the image sequence data. The network kernel function is optimally determined for this problem by a multi-layer perceptron trained on synthetic data. Network parameters dependence on sequence noise level is quantitatively analyzed. This super-sampled image is spatially filtered to correct finite pixel size effects, to yield the final high-resolution estimate. Results on a real outdoor sequence are presented, showing the quality of the proposed method.
[ { "version": "v1", "created": "Tue, 22 Mar 2005 11:45:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Miravet", "Carlos", "", "EPS-UAM, Madrid, Spain" ], [ "Rodriguez", "Francisco B.", "", "EPS-UAM, Madrid, Spain" ] ]
cs/0503056
Carlos Miravet
Carlos Miravet, Enrique Coiras and Javier Santamaria (SENER, Madrid, Spain)
Semi-automatic vectorization of linear networks on rasterized cartographic maps
12 pages with 13 figures, in Spanish
Revista de Teledeteccion, 10 (1998)
null
null
cs.CV cs.MM
null
A system for semi-automatic vectorization of linear networks (roads, rivers, etc.) on rasterized cartographic maps is presented. In this system, human intervention is limited to a graphic, interactive selection of the color attributes of the information to be obtained. Using this data, the system performs a preliminary extraction of the linear network, which is subsequently completed, refined and vectorized by means of an automatic procedure. Results on maps of different sources and scales are included. ----- Se presenta un sistema semi-automatico de vectorizacion de redes de objetos lineales (carreteras, rios, etc.) en mapas cartograficos digitalizados. En este sistema, la intervencion humana queda reducida a la seleccion grafica interactiva de los atributos de color de la informacion a obtener. Con estos datos, el sistema realiza una extraccion preliminar de la red lineal, que se completa, refina y vectoriza mediante un procedimiento automatico. Se presentan resultados de la aplicacion del sistema sobre imagenes digitalizadas de mapas de distinta procedencia y escala.
[ { "version": "v1", "created": "Tue, 22 Mar 2005 20:16:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Miravet", "Carlos", "", "SENER, Madrid,\n Spain" ], [ "Coiras", "Enrique", "", "SENER, Madrid,\n Spain" ], [ "Santamaria", "Javier", "", "SENER, Madrid,\n Spain" ] ]
cs/0503057
Ion Mandoiu
Ion I. Mandoiu and Dragos Trinca
Exact and Approximation Algorithms for DNA Tag Set Design
null
null
null
null
cs.DS
null
In this paper we propose new solution methods for designing tag sets for use in universal DNA arrays. First, we give integer linear programming formulations for two previous formalizations of the tag set design problem, and show that these formulations can be solved to optimality for instance sizes of practical interest by using general purpose optimization packages. Second, we note the benefits of periodic tags, and establish an interesting connection between the tag design problem and the problem of packing the maximum number of vertex-disjoint directed cycles in a given graph. We show that combining a simple greedy cycle packing algorithm with a previously proposed alphabetic tree search strategy yields an increase of over 40% in the number of tags compared to previous methods.
[ { "version": "v1", "created": "Wed, 23 Mar 2005 02:36:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Mandoiu", "Ion I.", "" ], [ "Trinca", "Dragos", "" ] ]
cs/0503060
Quan Son Nguyen
Quan Son Nguyen (Hanoi University of Technology, Vietnam)
Multi-Dimensional Hash Chains and Application to Micropayment Schemes
9 pages with 2 figures. Accepted for the International Workshop on Coding and Cryptography (WCC'2005), March 2005 in Bergen, Norway
null
null
null
cs.CR
null
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash chains. We show that this construction has storage-computational complexity of O(logN) per chain element, which is comparable with the best result reported in recent literature. Based on multi-dimensional hash chains, we then propose two cash-like micropayment schemes, which have a number of advantages in terms of efficiency and security. We also point out some possible improvements to PayWord and similar schemes by using multi-dimensional hash chains
[ { "version": "v1", "created": "Wed, 23 Mar 2005 09:15:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Nguyen", "Quan Son", "", "Hanoi University of Technology, Vietnam" ] ]
cs/0503061
Sandro Etalle
Sandro Etalle and William H. Winsborough
Integrity Constraints in Trust Management
An extended abstract appears in the proc. of the 10th ACM Symp. on Access Control Models and Technologies (SACMAT). 2005
null
null
null
cs.CR cs.DB
null
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation.
[ { "version": "v1", "created": "Wed, 23 Mar 2005 15:20:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Etalle", "Sandro", "" ], [ "Winsborough", "William H.", "" ] ]
cs/0503062
Christoph Koch
Christoph Koch
On the Complexity of Nonrecursive XQuery and Functional Query Languages on Complex Values
Long version of PODS 2005 paper
null
null
null
cs.DB cs.CC
null
This paper studies the complexity of evaluating functional query languages for complex values such as monad algebra and the recursion-free fragment of XQuery. We show that monad algebra with equality restricted to atomic values is complete for the class TA[2^{O(n)}, O(n)] of problems solvable in linear exponential time with a linear number of alternations. The monotone fragment of monad algebra with atomic value equality but without negation is complete for nondeterministic exponential time. For monad algebra with deep equality, we establish TA[2^{O(n)}, O(n)] lower and exponential-space upper bounds. Then we study a fragment of XQuery, Core XQuery, that seems to incorporate all the features of a query language on complex values that are traditionally deemed essential. A close connection between monad algebra on lists and Core XQuery (with ``child'' as the only axis) is exhibited, and it is shown that these languages are expressively equivalent up to representation issues. We show that Core XQuery is just as hard as monad algebra w.r.t. combined complexity, and that it is in TC0 if the query is assumed fixed.
[ { "version": "v1", "created": "Wed, 23 Mar 2005 15:36:55 GMT" }, { "version": "v2", "created": "Thu, 24 Mar 2005 00:22:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Koch", "Christoph", "" ] ]
cs/0503065
Rachid Echahed
Dominique Duval (LMC - IMAG), Rachid Echahed (Leibniz - IMAG), Frederic Prost (Leibniz - IMAG)
Data-Structure Rewriting
null
null
null
null
cs.PL cs.DS
null
We tackle the problem of data-structure rewriting including pointer redirections. We propose two basic rewrite steps: (i) Local Redirection and Replacement steps the aim of which is redirecting specific pointers determined by means of a pattern, as well as adding new information to an existing data ; and (ii) Global Redirection steps which are aimed to redirect all pointers targeting a node towards another one. We define these two rewriting steps following the double pushout approach. We define first the category of graphs we consider and then define rewrite rules as pairs of graph homomorphisms of the form "L <- K ->R". Unfortunately, inverse pushouts (complement pushouts) are not unique in our setting and pushouts do not always exist. Therefore, we define rewriting steps so that a rewrite rule can always be performed once a matching is found.
[ { "version": "v1", "created": "Thu, 24 Mar 2005 09:55:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Duval", "Dominique", "", "LMC - IMAG" ], [ "Echahed", "Rachid", "", "Leibniz - IMAG" ], [ "Prost", "Frederic", "", "Leibniz - IMAG" ] ]
cs/0503068
Michael Nelson
Michael L. Nelson
A Survey of Reverse Engineering and Program Comprehension
originally released as web-only in 1996
null
null
null
cs.SE
null
Reverse engineering has been a standard practice in the hardware community for some time. It has only been within the last ten years that reverse engineering, or "program comprehension", has grown into the current sub-discipline of software engineering. Traditional software engineering is primarily focused on the development and design of new software. However, most programmers work on software that other people have designed and developed. Up to 50% of a software maintainers time can be spent determining the intent of source code. The growing demand to reevaluate and reimplement legacy software systems, brought on by the proliferation of clientserver and World Wide Web technologies, has underscored the need for reverse engineering tools and techniques. This paper introduces the terminology of reverse engineering and gives some of the obstacles that make reverse engineering difficult. Although reverse engineering remains heavily dependent on the human component, a number of automated tools are presented that aid the reverse engineer.
[ { "version": "v1", "created": "Thu, 24 Mar 2005 13:55:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Nelson", "Michael L.", "" ] ]
cs/0503069
Michael Nelson
Michael L. Nelson, Herbert Van de Sompel, Xiaoming Liu, Terry L. Harrison, Nathan McFarland
mod_oai: An Apache Module for Metadata Harvesting
null
null
null
null
cs.DL
null
We describe mod_oai, an Apache 2.0 module that implements the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). OAIPMH is the de facto standard for metadata exchange in digital libraries and allows repositories to expose their contents in a structured, application-neutral format with semantics optimized for accurate incremental harvesting. Current implementations of OAI-PMH are either separate applications that access an existing repository, or are built-in to repository software packages. mod_oai is different in that it optimizes harvesting web content by building OAI-PMH capability into the Apache server. We discuss the implications of adding harvesting capability to an Apache server and describe our initial experimental results accessing a departmental web site using both web crawling and OAIPMH harvesting techniques.
[ { "version": "v1", "created": "Thu, 24 Mar 2005 14:38:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Nelson", "Michael L.", "" ], [ "Van de Sompel", "Herbert", "" ], [ "Liu", "Xiaoming", "" ], [ "Harrison", "Terry L.", "" ], [ "McFarland", "Nathan", "" ] ]
cs/0503073
Viktor Toth
Viktor Toth
Tensor manipulation in GPL Maxima
26 pages (some formulae fixed, terminology usage corrected, comments added on improved tensor contraction algorithm)
null
null
null
cs.SC
null
GPL Maxima is an open-source computer algebra system based on DOE-MACSYMA. GPL Maxima included two tensor manipulation packages from DOE-MACSYMA, but these were in various states of disrepair. One of the two packages, CTENSOR, implemented component-based tensor manipulation; the other, ITENSOR, treated tensor symbols as opaque, manipulating them based on their index properties. The present paper describes the state in which these packages were found, the steps that were needed to make the packages fully functional again, and the new functionality that was implemented to make them more versatile. A third package, ATENSOR, was also implemented; fully compatible with the identically named package in the commercial version of MACSYMA, ATENSOR implements abstract tensor algebras.
[ { "version": "v1", "created": "Sat, 26 Mar 2005 14:41:49 GMT" }, { "version": "v2", "created": "Wed, 25 May 2005 16:52:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Toth", "Viktor", "" ] ]
cs/0503074
Sameer Tilak
Sameer Tilak, Bhanu Pisupati, Kenneth Chiu, Geoffrey Brown, Nael Abu-Ghazaleh
A File System Abstraction for Sense and Respond Systems
6 pages, 3 figures Workshop on End-to-End, Sense-and-Respond Systems, Applications, and Services In conjunction with MobiSys '05
null
null
null
cs.NI cs.OS
null
The heterogeneity and resource constraints of sense-and-respond systems pose significant challenges to system and application development. In this paper, we present a flexible, intuitive file system abstraction for organizing and managing sense-and-respond systems based on the Plan 9 design principles. A key feature of this abstraction is the ability to support multiple views of the system via filesystem namespaces. Constructed logical views present an application-specific representation of the network, thus enabling high-level programming of the network. Concurrently, structural views of the network enable resource-efficient planning and execution of tasks. We present and motivate the design using several examples, outline research challenges and our research plan to address them, and describe the current state of implementation.
[ { "version": "v1", "created": "Mon, 28 Mar 2005 15:32:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Tilak", "Sameer", "" ], [ "Pisupati", "Bhanu", "" ], [ "Chiu", "Kenneth", "" ], [ "Brown", "Geoffrey", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
cs/0503075
Wing-kai Lin
W.-Y. Ng, W.K. Lin, D.M. Chiu
Statistical Modelling of Information Sharing: Community, Membership and Content
accepted in International Symposium on Computer Performance, Modeling, Measurements and Evaluation, Juan-les-Pins, France, October-2005
null
null
null
cs.NI cond-mat.stat-mech physics.soc-ph
null
File-sharing systems, like many online and traditional information sharing communities (e.g. newsgroups, BBS, forums, interest clubs), are dynamical systems in nature. As peers get in and out of the system, the information content made available by the prevailing membership varies continually in amount as well as composition, which in turn affects all peers' join/leave decisions. As a result, the dynamics of membership and information content are strongly coupled, suggesting interesting issues about growth, sustenance and stability. In this paper, we propose to study such communities with a simple statistical model of an information sharing club. Carrying their private payloads of information goods as potential supply to the club, peers join or leave on the basis of whether the information they demand is currently available. Information goods are chunked and typed, as in a file sharing system where peers contribute different files, or a forum where messages are grouped by topics or threads. Peers' demand and supply are then characterized by statistical distributions over the type domain. This model reveals interesting critical behaviour with multiple equilibria. A sharp growth threshold is derived: the club may grow towards a sustainable equilibrium only if the value of an order parameter is above the threshold, or shrink to emptiness otherwise. The order parameter is composite and comprises the peer population size, the level of their contributed supply, the club's efficiency in information search, the spread of supply and demand over the type domain, as well as the goodness of match between them.
[ { "version": "v1", "created": "Mon, 28 Mar 2005 07:33:37 GMT" }, { "version": "v2", "created": "Fri, 8 Apr 2005 07:48:16 GMT" }, { "version": "v3", "created": "Sat, 2 Jul 2005 01:55:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Ng", "W. -Y.", "" ], [ "Lin", "W. K.", "" ], [ "Chiu", "D. M.", "" ] ]
cs/0503076
Marci Meingast
Marci Meingast, Christopher Geyer, Shankar Sastry
Geometric Models of Rolling-Shutter Cameras
null
null
null
null
cs.CV cs.RO
null
Cameras with rolling shutters are becoming more common as low-power, low-cost CMOS sensors are being used more frequently in cameras. The rolling shutter means that not all scanlines are exposed over the same time interval. The effects of a rolling shutter are noticeable when either the camera or objects in the scene are moving and can lead to systematic biases in projection estimation. We develop a general projection equation for a rolling shutter camera and show how it is affected by different types of camera motion. In the case of fronto-parallel motion, we show how that camera can be modeled as an X-slit camera. We also develop approximate projection equations for a non-zero angular velocity about the optical axis and approximate the projection equation for a constant velocity screw motion. We demonstrate how the rolling shutter effects the projective geometry of the camera and in turn the structure-from-motion.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 00:00:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Meingast", "Marci", "" ], [ "Geyer", "Christopher", "" ], [ "Sastry", "Shankar", "" ] ]
cs/0503077
Mehryar Mohri
Mehryar Mohri, Fernando Pereira, Michael Riley
Weighted Automata in Text and Speech Processing
null
Mehryar Mohri, Fernando Pereira, and Michael Riley. Weighted Automata in Text and Speech Processing. In Proceedings of the 12th biennial European Conference on Artificial Intelligence (ECAI-96), Workshop on Extended finite state models of language. Budapest, Hungary, 1996. John Wiley and Sons, Chichester
null
null
cs.CL cs.HC
null
Finite-state automata are a very effective tool in natural language processing. However, in a variety of applications and especially in speech precessing, it is necessary to consider more general machines in which arcs are assigned weights or costs. We briefly describe some of the main theoretical and algorithmic aspects of these machines. In particular, we describe an efficient composition algorithm for weighted transducers, and give examples illustrating the value of determinization and minimization algorithms for weighted automata.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 04:59:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohri", "Mehryar", "" ], [ "Pereira", "Fernando", "" ], [ "Riley", "Michael", "" ] ]
cs/0503078
Fernando Sasse D.
Angelo Luis Pagliosa, Claudio Cesar de Sa and Fernando D. Sasse
Obtaining Membership Functions from a Neuron Fuzzy System extended by Kohonen Network
6 pages, 6 figures, 5th Congress of Logic Applied to Technology (LAPTEC 2005) Himeji, Japan, April 2-6, 2005
null
null
null
cs.NE
null
This article presents the Neo-Fuzzy-Neuron Modified by Kohonen Network (NFN-MK), an hybrid computational model that combines fuzzy system technique and artificial neural networks. Its main task consists in the automatic generation of membership functions, in particular, triangle forms, aiming a dynamic modeling of a system. The model is tested by simulating real systems, here represented by a nonlinear mathematical function. Comparison with the results obtained by traditional neural networks, and correlated studies of neurofuzzy systems applied in system identification area, shows that the NFN-MK model has a similar performance, despite its greater simplicity.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 19:40:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Pagliosa", "Angelo Luis", "" ], [ "de Sa", "Claudio Cesar", "" ], [ "Sasse", "Fernando D.", "" ] ]
cs/0503081
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
An Optimization Model for Outlier Detection in Categorical Data
12 pages
null
null
Tr-05-0329
cs.DB cs.AI
null
The task of outlier detection is to find small groups of data objects that are exceptional when compared with rest large amount of data. Detection of such outliers is important for many applications such as fraud detection and customer migration. Most existing methods are designed for numeric data. They will encounter problems with real-life applications that contain categorical data. In this paper, we formally define the problem of outlier detection in categorical data as an optimization problem from a global viewpoint. Moreover, we present a local-search heuristic based algorithm for efficiently finding feasible solutions. Experimental results on real datasets and large synthetic datasets demonstrate the superiority of our model and algorithm.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 13:31:01 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0503082
Gabriel Istrate
Gabriel Istrate, Stefan Boettcher, Allon G. Percus
Spines of Random Constraint Satisfaction Problems: Definition and Connection with Computational Complexity
A revised version of this paper will appear in Annals of Mathematics and Artificial Intelligence
null
null
null
cs.CC cond-mat.dis-nn cs.AI
null
We study the connection between the order of phase transitions in combinatorial problems and the complexity of decision algorithms for such problems. We rigorously show that, for a class of random constraint satisfaction problems, a limited connection between the two phenomena indeed exists. Specifically, we extend the definition of the spine order parameter of Bollobas et al. to random constraint satisfaction problems, rigorously showing that for such problems a discontinuity of the spine is associated with a $2^{\Omega(n)}$ resolution complexity (and thus a $2^{\Omega(n)}$ complexity of DPLL algorithms) on random instances. The two phenomena have a common underlying cause: the emergence of ``large'' (linear size) minimally unsatisfiable subformulas of a random formula at the satisfiability phase transition. We present several further results that add weight to the intuition that random constraint satisfaction problems with a sharp threshold and a continuous spine are ``qualitatively similar to random 2-SAT''. Finally, we argue that it is the spine rather than the backbone parameter whose continuity has implications for the decision complexity of combinatorial problems, and we provide experimental evidence that the two parameters can behave in a different manner.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 21:58:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Istrate", "Gabriel", "" ], [ "Boettcher", "Stefan", "" ], [ "Percus", "Allon G.", "" ] ]
cs/0503083
Gabriel Istrate
Gabriel Istrate
Coarse and Sharp Thresholds of Boolean Constraint Satisfaction Problems
A revised version of this paper will appear in Discrete Applied Mathematics
null
null
null
cs.DM cs.CC
null
We study threshold properties of random constraint satisfaction problems under a probabilistic model due to Molloy. We give a sufficient condition for the existence of a sharp threshold that leads (for boolean constraints) to a necessary and sufficient for the existence of a sharp threshold in the case where constraint templates are applied with equal probability, solving thus an open problem of Creignou and Daude.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 22:25:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
cs/0503084
Pavlo Nefyodov
P. Nefyodov, V. Reztsov, O. Riabinina
The Peculiarities of Nonstationary Formation of Inhomogeneous Structures of Charged Particles in the Electrodiffusion Processes
6 pages, 6 figures The example of our scientific work
null
null
null
cs.CE
null
In this paper the distribution of charged particles is constructed under the approximation of ambipolar diffusion. The results of mathematical modelling in two-dimensional case taking into account the velocities of the system are presented.
[ { "version": "v1", "created": "Wed, 30 Mar 2005 07:00:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Nefyodov", "P.", "" ], [ "Reztsov", "V.", "" ], [ "Riabinina", "O.", "" ] ]
cs/0503086
Joseph Morlier
Joseph Morlier (LRBB)
Segmentation of the Homogeneity of a Signal Using a Piecewise Linear Recognition Tool
This preprint could help me to receive comments on my work in order to enhance the paper to be submitted
null
null
null
cs.NA
null
In this paper a new method of detection of homogeneous zones and singularity parts of a 1D signal is proposed. The entropy function is used to transform signal in piecewise linear one. The multiple regression permits to detect lines and project them in the Hough parameters space in order to easily recognise homogeneous zone and abrupt changes of the signal. Two application examples are analysed, the first is a classical fractal signal and the other is issued from a dynamic mechanical study.
[ { "version": "v1", "created": "Wed, 30 Mar 2005 13:53:19 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2006 14:41:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Morlier", "Joseph", "", "LRBB" ] ]
cs/0503090
Francesco Sorrentino Ing
David Arrowsmith, Mario di Bernardo, Francesco Sorrentino
Effects of variations of load distribution on network performance
4 pages, 4 figures, included in conference proceedings ISCAS 2005, Kobe Japan
null
null
null
cs.NI
null
This paper is concerned with the characterization of the relationship between topology and traffic dynamics. We use a model of network generation that allows the transition from random to scale free networks. Specifically, we consider three different topological types of network: random, scale-free with \gamma = 3, scale-free with \gamma = 2. By using a novel LRD traffic generator, we observe best performance, in terms of transmission rates and delivered packets, in the case of random networks. We show that, even if scale-free networks are characterized by shorter characteristic-path- length (the lower the exponent, the lower the path-length), they show worst performances in terms of communication. We conjecture this could be explained in terms of changes in the load distribution, defined here as the number of shortest paths going through a given vertex. In fact, that distribu- tion is characterized by (i) a decreasing mean (ii) an increas- ing standard deviation, as the networks becomes scale-free (especially scale-free networks with low exponents). The use of a degree-independent server also discriminates against a scale-free structure. As a result, since the model is un- controlled, most packets will go through the same vertices, favoring the onset of congestion.
[ { "version": "v1", "created": "Thu, 31 Mar 2005 09:01:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Arrowsmith", "David", "" ], [ "di Bernardo", "Mario", "" ], [ "Sorrentino", "Francesco", "" ] ]
cs/0503091
Tatsuaki Okamoto
Tatsuaki Okamoto, Ryo Kashima
Resource Bounded Unprovability of Computational Lower Bounds
78 pages
null
null
null
cs.CC cs.LO
null
This paper introduces new notions of asymptotic proofs, PT(polynomial-time)-extensions, PTM(polynomial-time Turing machine)-omega-consistency, etc. on formal theories of arithmetic including PA (Peano Arithmetic). This paper shows that P not= NP (more generally, any super-polynomial-time lower bound in PSPACE) is unprovable in a PTM-omega-consistent theory T, where T is a consistent PT-extension of PA. This result gives a unified view to the existing two major negative results on proving P not= NP, Natural Proofs and relativizable proofs, through the two manners of characterization of PTM-omega-consistency. We also show that the PTM-omega-consistency of T cannot be proven in any PTM-omega-consistent theory S, where S is a consistent PT-extension of T.
[ { "version": "v1", "created": "Thu, 31 Mar 2005 10:40:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Okamoto", "Tatsuaki", "" ], [ "Kashima", "Ryo", "" ] ]
cs/0503092
Jan Chomicki
Jan Chomicki, Joyce Song
Monotonic and Nonmonotonic Preference Revision
null
null
null
null
cs.DB cs.AI
null
We study here preference revision, considering both the monotonic case where the original preferences are preserved and the nonmonotonic case where the new preferences may override the original ones. We use a relational framework in which preferences are represented using binary relations (not necessarily finite). We identify several classes of revisions that preserve order axioms, for example the axioms of strict partial or weak orders. We consider applications of our results to preference querying in relational databases.
[ { "version": "v1", "created": "Thu, 31 Mar 2005 19:43:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Chomicki", "Jan", "" ], [ "Song", "Joyce", "" ] ]
cs/0504002
Nael Abu-Ghazaleh
Seon-Yeong Han and Nael Abu-Ghazaleh
On the Effect of Fading on Ad hoc Networking
12 pages; 14 figures
null
null
null
cs.NI
null
Most MANET (Mobile Ad hoc NETwork) research assumes idealized propagation models. Experimental results have shown significant divergence from simulation results due to the effect of signal fading in realistic wireless communication channels. In this paper, we characterize the impact of fading on protocol performance. We first study the effect of fading on MAC performance and show that its effect can be dominating. One of our important conclusions is that eliminating RTS/CTS packets results in more effective operation under fading. We also identify an unfairness problem that arises due to backoffs in the presence of fading. Moreover, fading results in several subtle interactions between the MAC and routing layers. We identify several of these problems and make observations about effective approaches for addressing them. For example, the criteria for determining the best path should not only consider the link status but also the link order. In addition, because routing protocols rely on MAC level transmission failure (when the retry limit is exceeded), route failure errors are often generated unnecessarily. Finally, because MAC level broadcasts are unreliable, they are especially vulnerable to fading. We analyze these effects and outline preliminary solutions to them.
[ { "version": "v1", "created": "Fri, 1 Apr 2005 18:16:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Han", "Seon-Yeong", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
cs/0504004
Henning Bostelmann
Henning Bostelmann
Statistical analysis of quality measures for mobile ad hoc networks
Master's thesis; 78 pages, 10 figures
null
null
null
cs.NI cs.DM
null
How can the quality of a mobile ad hoc network (MANET) be quantified? This work aims at an answer based on the lower network layers, i.e. on connectivity between the wireless nodes, using statistical methods. A number of different quality measures are introduced and classified according to their scaling behaviour. They are analysed in a statistical model of a 1-dimensional MANET system (corresponding e.g. to cars on a road). Neglecting boundary effects, the model turns out to be exactly solvable, so that explicit analytical results for the quality levels can be obtained both at fixed system size and in the limit of large systems. In particular, this improves estimates known in the literature for the probability of connectedness of 1-dimensional MANETs.
[ { "version": "v1", "created": "Sat, 2 Apr 2005 23:19:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Bostelmann", "Henning", "" ] ]
cs/0504009
Sanjeeva kumar Chandrasekaran
N. Srinivasan, C. Sanjeevakumar, L. Sudarsan, M. Kasi Rajan, R. Venkatesh
Towards a Group Theoretic Quantum Encryption Scheme Based on Generalized Hidden Subgroup Problem
8 pages, work of undergraduate students
null
null
null
cs.DM cs.CR
null
This paper introduces a completely new approach to encryption based on group theoretic quantum framework. Quantum cryptography has essentially focused only on key distribution and proceeded with classical encryption algorithm with the generated key. Here, we present a first step towards a quantum encryption scheme based on the solution for the hidden subgroup problem. The shared secret key K from QKD evolves as a generator for a subgroup H of a group G, in combination of the plain text data modeled as group elements. The key K helps in regeneration of the plain data on the receiver's side based on subgroup reconstruction. This paper models all quantum computations using group representations. A non-constructive proof is attempted towards the security of the encryption scheme. We also address the issues involved in a such a venture into the realms of Quantum data encryption.
[ { "version": "v1", "created": "Mon, 4 Apr 2005 17:26:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Srinivasan", "N.", "" ], [ "Sanjeevakumar", "C.", "" ], [ "Sudarsan", "L.", "" ], [ "Rajan", "M. Kasi", "" ], [ "Venkatesh", "R.", "" ] ]
cs/0504012
Rodrigo Barra Almeida
Luiz H. Gomes, Fernando D. O. Castro, Rodrigo B. Almeida, Luis M. A. Bettencourt, Virgilio A. F. Almeida, Jussara M. Almeida
Improving Spam Detection Based on Structural Similarity
null
null
null
null
cs.CR
null
We propose a new detection algorithm that uses structural relationships between senders and recipients of email as the basis for the identification of spam messages. Users and receivers are represented as vectors in their reciprocal spaces. A measure of similarity between vectors is constructed and used to group users into clusters. Knowledge of their classification as past senders/receivers of spam or legitimate mail, comming from an auxiliary detection algorithm, is then used to label these clusters probabilistically. This knowledge comes from an auxiliary algorithm. The measure of similarity between the sender and receiver sets of a new message to the center vector of clusters is then used to asses the possibility of that message being legitimate or spam. We show that the proposed algorithm is able to correct part of the false positives (legitimate messages classified as spam) using a testbed of one week smtp log.
[ { "version": "v1", "created": "Tue, 5 Apr 2005 14:30:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Gomes", "Luiz H.", "" ], [ "Castro", "Fernando D. O.", "" ], [ "Almeida", "Rodrigo B.", "" ], [ "Bettencourt", "Luis M. A.", "" ], [ "Almeida", "Virgilio A. F.", "" ], [ "Almeida", "Jussara M.", "" ] ]
cs/0504018
Olivier Brunet
Olivier Brunet (Leibniz - IMAG)
A Rule-Based Logic for Quantum Information
null
null
null
null
cs.LO quant-ph
null
In the present article, we explore a new approach for the study of orthomodular lattices, where we replace the problematic conjunction by a binary operator, called the Sasaki projection. We present a characterization of orthomodular lattices based on the use of an algebraic version of the Sasaki projection operator (together with orthocomplementation) rather than on the conjunction. We then define of a new logic, which we call Sasaki Orthologic, which is closely related to quantum logic, and provide a rule-based definition of this logic.
[ { "version": "v1", "created": "Wed, 6 Apr 2005 08:11:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Brunet", "Olivier", "", "Leibniz - IMAG" ] ]
cs/0504019
Guilin Wang
Guilin Wang, Feng Bao, Changshe Ma, and Kefei Chen
Efficient Authenticated Encryption Schemes with Public Verifiability
Early version appears in the Proc. of The 60th IEEE Vehicular Technology Conference (VTC 2004-Fall) - Wireless Technologies for Global Security. IEEE, 2004
null
null
null
cs.CR
null
An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with public verifiability. That is, in their scheme the receiver can efficiently prove to a third party that a message is indeed originated from a specific sender. In this paper, we first identify two security weaknesses in the Ma-Chen authenticated encryption scheme. Then, based on the Schnorr signature, we proposed an efficient and secure improved scheme such that all the desired security requirements are satisfied.
[ { "version": "v1", "created": "Wed, 6 Apr 2005 09:03:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Guilin", "" ], [ "Bao", "Feng", "" ], [ "Ma", "Changshe", "" ], [ "Chen", "Kefei", "" ] ]
cs/0504022
Lillian Lee
Lillian Lee
A Matter of Opinion: Sentiment Analysis and Business Intelligence (position paper)
2 pages
Presented at the IBM Faculty Summit on the Architecture of On-Demand Business, May 2004
null
null
cs.CL
null
A general-audience introduction to the area of "sentiment analysis", the computational treatment of subjective, opinion-oriented language (an example application is determining whether a review is "thumbs up" or "thumbs down"). Some challenges, applications to business-intelligence tasks, and potential future directions are described.
[ { "version": "v1", "created": "Wed, 6 Apr 2005 20:04:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Lillian", "" ] ]
cs/0504023
Ioannis Giotis
Ioannis Giotis and Venkatesan Guruswami
Correlation Clustering with a Fixed Number of Clusters
16 pages
null
null
null
cs.DS
null
We continue the investigation of problems concerning correlation clustering or clustering with qualitative information, which is a clustering formulation that has been studied recently. The basic setup here is that we are given as input a complete graph on n nodes (which correspond to nodes to be clustered) whose edges are labeled + (for similar pairs of items) and - (for dissimilar pairs of items). Thus we have only as input qualitative information on similarity and no quantitative distance measure between items. The quality of a clustering is measured in terms of its number of agreements, which is simply the number of edges it correctly classifies, that is the sum of number of - edges whose endpoints it places in different clusters plus the number of + edges both of whose endpoints it places within the same cluster. In this paper, we study the problem of finding clusterings that maximize the number of agreements, and the complementary minimization version where we seek clusterings that minimize the number of disagreements. We focus on the situation when the number of clusters is stipulated to be a small constant k. Our main result is that for every k, there is a polynomial time approximation scheme for both maximizing agreements and minimizing disagreements. (The problems are NP-hard for every k >= 2.) The main technical work is for the minimization version, as the PTAS for maximizing agreements follows along the lines of the property tester for Max k-CUT. In contrast, when the number of clusters is not specified, the problem of minimizing disagreements was shown to be APX-hard, even though the maximization version admits a PTAS.
[ { "version": "v1", "created": "Wed, 6 Apr 2005 22:36:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Giotis", "Ioannis", "" ], [ "Guruswami", "Venkatesan", "" ] ]
cs/0504024
Sebastian Brand
Krzysztof R. Apt, Sebastian Brand
Constraint-Based Qualitative Simulation
10 pages, to appear at the conference TIME 2005
null
null
null
cs.AI cs.LO
null
We consider qualitative simulation involving a finite set of qualitative relations in presence of complete knowledge about their interrelationship. We show how it can be naturally captured by means of constraints expressed in temporal logic and constraint satisfaction problems. The constraints relate at each stage the 'past' of a simulation with its 'future'. The benefit of this approach is that it readily leads to an implementation based on constraint technology that can be used to generate simulations and to answer queries about them.
[ { "version": "v1", "created": "Thu, 7 Apr 2005 12:06:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Brand", "Sebastian", "" ] ]
cs/0504026
Yongxi Cheng
Yongxi Cheng, Xiaoming Sun, Yiqun Lisa Yin
Searching Monotone Multi-dimensional Arrays
13 pages, 2 figures; same results, presentation improved, add two figures
null
null
null
cs.DS cs.DM
null
In this paper we investigate the problem of searching monotone multi-dimensional arrays. We generalize Linial and Saks' search algorithm \cite{LS1} for monotone 3-dimensional arrays to $d$-dimensions with $d\geq 4$. Our new search algorithm is asymptotically optimal for $d=4$.
[ { "version": "v1", "created": "Thu, 7 Apr 2005 15:58:18 GMT" }, { "version": "v2", "created": "Mon, 21 Aug 2006 07:52:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheng", "Yongxi", "" ], [ "Sun", "Xiaoming", "" ], [ "Yin", "Yiqun Lisa", "" ] ]
cs/0504029
Devavrat Shah
Damon Mosk-Aoyama and Devavrat Shah
Fast Distributed Algorithms for Computing Separable Functions
15 pages
null
null
null
cs.NI cs.DC cs.DS
null
The problem of computing functions of values at the nodes in a network in a totally distributed manner, where nodes do not have unique identities and make decisions based only on local information, has applications in sensor, peer-to-peer, and ad-hoc networks. The task of computing separable functions, which can be written as linear combinations of functions of individual variables, is studied in this context. Known iterative algorithms for averaging can be used to compute the normalized values of such functions, but these algorithms do not extend in general to the computation of the actual values of separable functions. The main contribution of this paper is the design of a distributed randomized algorithm for computing separable functions. The running time of the algorithm is shown to depend on the running time of a minimum computation algorithm used as a subroutine. Using a randomized gossip mechanism for minimum computation as the subroutine yields a complete totally distributed algorithm for computing separable functions. For a class of graphs with small spectral gap, such as grid graphs, the time used by the algorithm to compute averages is of a smaller order than the time required by a known iterative averaging scheme.
[ { "version": "v1", "created": "Fri, 8 Apr 2005 06:49:29 GMT" }, { "version": "v2", "created": "Sat, 9 Apr 2005 02:53:53 GMT" }, { "version": "v3", "created": "Sat, 4 Feb 2006 21:47:36 GMT" }, { "version": "v4", "created": "Sun, 22 Apr 2007 23:19:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Mosk-Aoyama", "Damon", "" ], [ "Shah", "Devavrat", "" ] ]
cs/0504031
Gilson Antonio Giraldi
Gilson Antonio Giraldi, Antonio Alberto Fernandes de Oliveira
Convexity Analysis of Snake Models Based on Hamiltonian Formulation
17 pages, 3 figures, technical report
null
null
null
cs.CV cs.GR
null
This paper presents a convexity analysis for the dynamic snake model based on the Potential Energy functional and the Hamiltonian formulation of the classical mechanics. First we see the snake model as a dynamical system whose singular points are the borders we seek. Next we show that a necessary condition for a singular point to be an attractor is that the energy functional is strictly convex in a neighborhood of it, that means, if the singular point is a local minimum of the potential energy. As a consequence of this analysis, a local expression relating the dynamic parameters and the rate of convergence arises. Such results link the convexity analysis of the potential energy and the dynamic snake model and point forward to the necessity of a physical quantity whose convexity analysis is related to the dynamic and which incorporate the velocity space. Such a quantity is exactly the (conservative) Hamiltonian of the system.
[ { "version": "v1", "created": "Fri, 8 Apr 2005 16:41:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson Antonio", "" ], [ "de Oliveira", "Antonio Alberto Fernandes", "" ] ]
cs/0504033
Richard McClatchey
Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Atif Mehmood, Richard McClatchey, Harvey Newman, Waqas ur Rehman, Conrad Steenberg, Michael Thomas, Frank van Lingen, Ian Willers, Muhammad Adeel Zafar
Resource Management Services for a Grid Analysis Environment
8 pages, 7 figures. Workshop on Web and Grid Services for Scientific Data Analysis at the Int Conf on Parallel Processing (ICPP05). Norway June 2005
null
null
null
cs.DC
null
Selecting optimal resources for submitting jobs on a computational Grid or accessing data from a data grid is one of the most important tasks of any Grid middleware. Most modern Grid software today satisfies this responsibility and gives a best-effort performance to solve this problem. Almost all decisions regarding scheduling and data access are made by the software automatically, giving users little or no control over the entire process. To solve this problem, a more interactive set of services and middleware is desired that provides users more information about Grid weather, and gives them more control over the decision making process. This paper presents a set of services that have been developed to provide more interactive resource management capabilities within the Grid Analysis Environment (GAE) being developed collaboratively by Caltech, NUST and several other institutes. These include a steering service, a job monitoring service and an estimator service that have been designed and written using a common Grid-enabled Web Services framework named Clarens. The paper also presents a performance analysis of the developed services to show that they have indeed resulted in a more interactive and powerful system for user-centric Grid-enabled physics analysis.
[ { "version": "v1", "created": "Sun, 10 Apr 2005 11:59:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ali", "Arshad", "" ], [ "Anjum", "Ashiq", "" ], [ "Azim", "Tahir", "" ], [ "Bunn", "Julian", "" ], [ "Mehmood", "Atif", "" ], [ "McClatchey", "Richard", "" ], [ "Newman", "Harvey", "" ], [ "Rehman", "Waqas ur", "" ], [ "Steenberg", "Conrad", "" ], [ "Thomas", "Michael", "" ], [ "van Lingen", "Frank", "" ], [ "Willers", "Ian", "" ], [ "Zafar", "Muhammad Adeel", "" ] ]
cs/0504034
Richard McClatchey
Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Saima Iqbal, Richard McClatchey, Harvey Newman, S. Yousaf Shah, Tony Solomonides, Conrad Steenberg, Michael Thomas, Frank van Lingen, Ian Willers
Heterogeneous Relational Databases for a Grid-enabled Analysis Environment
8 pages, 6 figures, 1 table. Workshop on Web and Grid Services for Scientific Data Analysis at the Int Conf on Parallel Processing (ICPP05). Norway June 2005
null
null
null
cs.DC
null
Grid based systems require a database access mechanism that can provide seamless homogeneous access to the requested data through a virtual data access system, i.e. a system which can take care of tracking the data that is stored in geographically distributed heterogeneous databases. This system should provide an integrated view of the data that is stored in the different repositories by using a virtual data access mechanism, i.e. a mechanism which can hide the heterogeneity of the backend databases from the client applications. This paper focuses on accessing data stored in disparate relational databases through a web service interface, and exploits the features of a Data Warehouse and Data Marts. We present a middleware that enables applications to access data stored in geographically distributed relational databases without being aware of their physical locations and underlying schema. A web service interface is provided to enable applications to access this middleware in a language and platform independent way. A prototype implementation was created based on Clarens [4], Unity [7] and POOL [8]. This ability to access the data stored in the distributed relational databases transparently is likely to be a very powerful one for Grid users, especially the scientific community wishing to collate and analyze data distributed over the Grid.
[ { "version": "v1", "created": "Sun, 10 Apr 2005 12:05:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Ali", "Arshad", "" ], [ "Anjum", "Ashiq", "" ], [ "Azim", "Tahir", "" ], [ "Bunn", "Julian", "" ], [ "Iqbal", "Saima", "" ], [ "McClatchey", "Richard", "" ], [ "Newman", "Harvey", "" ], [ "Shah", "S. Yousaf", "" ], [ "Solomonides", "Tony", "" ], [ "Steenberg", "Conrad", "" ], [ "Thomas", "Michael", "" ], [ "van Lingen", "Frank", "" ], [ "Willers", "Ian", "" ] ]
cs/0504035
Marcus Hutter
Shane Legg and Marcus Hutter
Fitness Uniform Deletion: A Simple Way to Preserve Diversity
8 two-column pages, 19 figures
Proc. Genetic and Evolutionary Computation Conference (GECCO 2005) 1271-1278
null
IDSIA-11-04
cs.NE cs.AI
null
A commonly experienced problem with population based optimisation methods is the gradual decline in population diversity that tends to occur over time. This can slow a system's progress or even halt it completely if the population converges on a local optimum from which it cannot escape. In this paper we present the Fitness Uniform Deletion Scheme (FUDS), a simple but somewhat unconventional approach to this problem. Under FUDS the deletion operation is modified to only delete those individuals which are "common" in the sense that there exist many other individuals of similar fitness in the population. This makes it impossible for the population to collapse to a collection of highly related individuals with similar fitness. Our experimental results on a range of optimisation problems confirm this, in particular for deceptive optimisation problems the performance is significantly more robust to variation in the selection intensity.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 10:42:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0504036
Richard Belew
Richard K. Belew
Scientific impact quantity and quality: Analysis of two sources of bibliographic data
12 pages, 1 table, 6 figures
null
null
null
cs.IR cs.DL
null
Attempts to understand the consequence of any individual scientist's activity within the long-term trajectory of science is one of the most difficult questions within the philosophy of science. Because scientific publications play such as central role in the modern enterprise of science, bibliometric techniques which measure the ``impact'' of an individual publication as a function of the number of citations it receives from subsequent authors have provided some of the most useful empirical data on this question. Until recently, Thompson/ISI has provided the only source of large-scale ``inverted'' bibliographic data of the sort required for impact analysis. In the end of 2004, Google introduced a new service, GoogleScholar, making much of this same data available. Here we analyze 203 publications, collectively cited by more than 4000 other publications. We show surprisingly good agreement between data citation counts provided by the two services. Data quality across the systems is analyzed, and potentially useful complementarities between are considered. The additional robustness offered by multiple sources of such data promises to increase the utility of these measurements as open citation protocols and open access increase their impact on electronic scientific publication practices.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 13:52:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Belew", "Richard K.", "" ] ]
cs/0504037
K. P.N. Murthy
K. P. N. Murthy, M. Janani and B. Shenbga Priya
Bayesian Restoration of Digital Images Employing Markov Chain Monte Carlo a Review
42 pages; 16 figures; revised version with several typos removed and mistakes in equations corrected
null
null
null
cs.CV cond-mat.stat-mech physics.comp-ph
null
A review of Bayesian restoration of digital images based on Monte Carlo techniques is presented. The topics covered include Likelihood, Prior and Posterior distributions, Poisson, Binay symmetric channel, and Gaussian channel models of Likelihood distribution,Ising and Potts spin models of Prior distribution, restoration of an image through Posterior maximization, statistical estimation of a true image from Posterior ensembles, Markov Chain Monte Carlo methods and cluster algorithms.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 12:41:19 GMT" }, { "version": "v2", "created": "Tue, 31 Oct 2006 14:34:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Murthy", "K. P. N.", "" ], [ "Janani", "M.", "" ], [ "Priya", "B. Shenbga", "" ] ]
cs/0504039
Andrey Grozin
A. G. Grozin
TeXmacs-maxima interface
html file, 32 png screenshots
null
null
null
cs.SC cs.MS hep-ph
null
This tutorial presents features of the new and improved TeXmacs-maxima interface. It is designed for running maxima-5.9.2 from TeXmacs-1.0.5 (or later).
[ { "version": "v1", "created": "Mon, 11 Apr 2005 16:39:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Grozin", "A. G.", "" ] ]