id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0502041 | Mihai Patrascu | Mihai Patrascu and Erik D. Demaine | Logarithmic Lower Bounds in the Cell-Probe Model | Second version contains significant changes to the presentation. 32
pages, 1 figure. Journal version of two conference publications: "Tight
Bounds for the Partial-Sums Problem" Proc. 15th ACM-SIAM Symposium on
Discrete Algorithms (SODA'04), pp 20-29. "Lower Bounds for Dynamic
Connectivity" Proc. 36th ACM Symposium on Theory of Computing (STOC'04), pp
546-553 | null | null | null | cs.DS cs.CC | null | We develop a new technique for proving cell-probe lower bounds on dynamic
data structures. This technique enables us to prove an amortized randomized
Omega(lg n) lower bound per operation for several data structural problems on n
elements, including partial sums, dynamic connectivity among disjoint paths (or
a forest or a graph), and several other dynamic graph problems (by simple
reductions). Such a lower bound breaks a long-standing barrier of Omega(lg n /
lglg n) for any dynamic language membership problem. It also establishes the
optimality of several existing data structures, such as Sleator and Tarjan's
dynamic trees. We also prove the first Omega(log_B n) lower bound in the
external-memory model without assumptions on the data structure (such as the
comparison model). Our lower bounds also give a query-update trade-off curve
matched, e.g., by several data structures for dynamic connectivity in graphs.
We also prove matching upper and lower bounds for partial sums when
parameterized by the word size and the maximum additive change in an update.
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 03:03:55 GMT"
},
{
"version": "v2",
"created": "Sat, 28 May 2005 21:49:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Patrascu",
"Mihai",
""
],
[
"Demaine",
"Erik D.",
""
]
] |
cs/0502043 | Satyan L. Devadoss | Jeff Danciger, Satyan L. Devadoss, Don Sheehy | Compatible Triangulations and Point Partitions by Series-Triangular
Graphs | 11 pages, 8 figures | Computational Geometry: Theory and Applications, 34 (2006) 195-202 | null | null | cs.CG cs.DM | null | We introduce series-triangular graph embeddings and show how to partition
point sets with them. This result is then used to improve the upper bound on
the number of Steiner points needed to obtain compatible triangulations of
point sets. The problem is generalized to finding compatible triangulations for
more than two point sets and we show that such triangulations can be
constructed with only a linear number of Steiner points added to each point
set.
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 16:19:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Danciger",
"Jeff",
""
],
[
"Devadoss",
"Satyan L.",
""
],
[
"Sheehy",
"Don",
""
]
] |
cs/0502044 | Martin Lotz | Peter Buergisser, Martin Lotz | The complexity of computing the Hilbert polynomial of smooth
equidimensional complex projective varieties | null | null | null | null | cs.SC cs.CC | null | We continue the study of counting complexity begun in [Buergisser, Cucker 04]
and [Buergisser, Cucker, Lotz 05] by proving upper and lower bounds on the
complexity of computing the Hilbert polynomial of a homogeneous ideal. We show
that the problem of computing the Hilbert polynomial of a smooth
equidimensional complex projective variety can be reduced in polynomial time to
the problem of counting the number of complex common zeros of a finite set of
multivariate polynomials. Moreover, we prove that the more general problem of
computing the Hilbert polynomial of a homogeneous ideal is polynomial space
hard. This implies polynomial space lower bounds for both the problems of
computing the rank and the Euler characteristic of cohomology groups of
coherent sheaves on projective space, improving the #P-lower bound of Bach (JSC
1999).
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 17:10:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buergisser",
"Peter",
""
],
[
"Lotz",
"Martin",
""
]
] |
cs/0502045 | Gianluca Argentini | Gianluca Argentini | Adaptive grids as parametrized scale-free networks | 10 pages, 3 figures | null | null | null | cs.NA math-ph math.AP math.MP physics.flu-dyn | null | In this paper we present a possible model of adaptive grids for numerical
resolution of differential problems, using physical or geometrical properties,
as viscosity or velocity gradient of a moving fluid. The relation between the
values of grid step and these entities is based on the mathematical scheme
offered by the model of scale-free networks, due to Barabasi, so that the step
can be connected to the other variables by a constitutive relation. Some
examples and an application are discussed, showing that this approach can be
further developed for treatment of more complex situations.
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 17:51:26 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Feb 2005 00:12:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0502046 | Didier Bert | Hector Ruiz Barradas (LSR - IMAG), Didier Bert (LSR - IMAG) | Proof obligations for specification and refinement of liveness
properties under weak fairness | null | null | null | Rapport LSR IMAG : RR 1071-I LSR 20 | cs.LO | null | In this report, we present a formal model of fair iteration of events for B
event systems. The model is used to justify proof obligations for basic
liveness properties and preservation under refinement of general liveness
properties. The model of fair iteration of events uses the dovetail operator,
an operator proposed by Broy and Nelson to model fair choice. The proofs are
mainly founded in fixpoint calculations of fair iteration of events and weakest
precondition calculus.
| [
{
"version": "v1",
"created": "Wed, 9 Feb 2005 09:23:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barradas",
"Hector Ruiz",
"",
"LSR - IMAG"
],
[
"Bert",
"Didier",
"",
"LSR - IMAG"
]
] |
cs/0502048 | Nikolaos Papanikolaou | Rajagopal Nagarajan, Nikolaos Papanikolaou, Garry Bowen, Simon Gay | An Automated Analysis of the Security of Quantum Key Distribution | null | null | null | null | cs.CR quant-ph | null | This paper discusses the use of computer-aided verification as a practical
means for analysing quantum information systems; specifically, the BB84
protocol for quantum key distribution is examined using this method. This
protocol has been shown to be unconditionally secure against all attacks in an
information-theoretic setting, but the relevant security proof requires a
thorough understanding of the formalism of quantum mechanics and is not easily
adaptable to practical scenarios. Our approach is based on probabilistic
model-checking; we have used the PRISM model-checker to show that, as the
number of qubits transmitted in BB84 is increased, the equivocation of the
eavesdropper with respect to the channel decreases exponentially. We have also
shown that the probability of detecting the presence of an eavesdropper
increases exponentially with the number of qubits. The results presented here
are a testament to the effectiveness of the model-checking approach for systems
where analytical solutions may not be possible or plausible.
| [
{
"version": "v1",
"created": "Wed, 9 Feb 2005 13:49:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nagarajan",
"Rajagopal",
""
],
[
"Papanikolaou",
"Nikolaos",
""
],
[
"Bowen",
"Garry",
""
],
[
"Gay",
"Simon",
""
]
] |
cs/0502051 | Richard McClatchey | Zaheer Abbas, Muhammad Umer, Mohammed Odeh, Richard McClatchey, Arshad
Ali, Farooq Ahmad | A Semantic Grid-based E-Learning Framework (SELF) | 8 pages, 2 tables, 3 figures | null | null | null | cs.DC | null | E-learning can be loosely defined as a wide set of applications and
processes, which uses available electronic media (and tools) to deliver
vocational education and training. With its increasing recognition as an
ubiquitous mode of instruction and interaction in the academic as well as
corporate world, the need for a scaleable and realistic model is becoming
important. In this paper we introduce SELF; a Semantic grid-based E-Learning
Framework. SELF aims to identify the key-enablers in a practical grid-based
E-learning environment and to minimize technological reworking by proposing a
well-defined interaction plan among currently available tools and technologies.
We define a dichotomy with E-learning specific application layers on top and
semantic grid-based support layers underneath. We also map the latest open and
freeware technologies with various components in SELF.
| [
{
"version": "v1",
"created": "Wed, 9 Feb 2005 17:22:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abbas",
"Zaheer",
""
],
[
"Umer",
"Muhammad",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Ali",
"Arshad",
""
],
[
"Ahmad",
"Farooq",
""
]
] |
cs/0502052 | Dmitry Mogilevsky | Dmitry Mogilevsky | Log Analysis Case Study Using LoGS | null | null | null | null | cs.CR cs.IR | null | A very useful technique a network administrator can use to identify
problematic network behavior is careful analysis of logs of incoming and
outgoing network flows. The challenge one faces when attempting to undertake
this course of action, though, is that large networks tend to generate an
extremely large quantity of network traffic in a very short period of time,
resulting in very large traffic logs which must be analyzed post-generation
with an eye for contextual information which may reveal symptoms of problematic
traffic. A better technique is to perform real-time log analysis using a
real-time context-generating tool such as LoGS.
| [
{
"version": "v1",
"created": "Wed, 9 Feb 2005 19:49:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mogilevsky",
"Dmitry",
""
]
] |
cs/0502054 | Ion Mandoiu | Ion I. Mandoiu, Claudia Prajescu, Dragos Trinca | Improved Tag Set Design and Multiplexing Algorithms for Universal Arrays | null | null | null | null | cs.DS | null | In this paper we address two optimization problems arising in the design of
genomic assays based on universal tag arrays. First, we address the universal
array tag set design problem. For this problem, we extend previous formulations
to incorporate antitag-to-antitag hybridization constraints in addition to
constraints on antitag-to-tag hybridization specificity, establish a
constructive upper bound on the maximum number of tags satisfying the extended
constraints, and propose a simple greedy tag selection algorithm. Second, we
give methods for improving the multiplexing rate in large-scale genomic assays
by combining primer selection with tag assignment. Experimental results on
simulated data show that this integrated optimization leads to reductions of up
to 50% in the number of required arrays.
| [
{
"version": "v1",
"created": "Thu, 10 Feb 2005 20:20:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mandoiu",
"Ion I.",
""
],
[
"Prajescu",
"Claudia",
""
],
[
"Trinca",
"Dragos",
""
]
] |
cs/0502057 | Kumara Sastry | Kumara Sastry, Martin Pelikan, David E. Goldberg | Decomposable Problems, Niching, and Scalability of Multiobjective
Estimation of Distribution Algorithms | Submitted to Genetic and Evolutionary Computation Conference,
GECCO-2005 | null | null | IlliGAL Report No. 2005004 | cs.NE cs.AI | null | The paper analyzes the scalability of multiobjective estimation of
distribution algorithms (MOEDAs) on a class of boundedly-difficult
additively-separable multiobjective optimization problems. The paper
illustrates that even if the linkage is correctly identified, massive
multimodality of the search problems can easily overwhelm the nicher and lead
to exponential scale-up. Facetwise models are subsequently used to propose a
growth rate of the number of differing substructures between the two objectives
to avoid the niching method from being overwhelmed and lead to polynomial
scalability of MOEDAs.
| [
{
"version": "v1",
"created": "Sat, 12 Feb 2005 22:29:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sastry",
"Kumara",
""
],
[
"Pelikan",
"Martin",
""
],
[
"Goldberg",
"David E.",
""
]
] |
cs/0502059 | Stanko Shtrakov | Stanko Shtrakov and Anton Stoilov | New approach for Finite Difference Method for Thermal Analysis of
Passive Solar Systems | 7 pages, 4 figures | null | null | null | cs.NA | null | Mathematical treatment of massive wall systems is a useful tool for
investigation of these solar applications. The objectives of this work are to
develop (and validate) a numerical solution model for predication the thermal
behaviour of passive solar systems with massive wall, to improve knowledge of
using indirect passive solar systems and assess its energy efficiency according
to climatic conditions in Bulgaria. The problem of passive solar systems with
massive walls is modelled by thermal and mass transfer equations. As a boundary
conditions for the mathematical problem are used equations, which describe
influence of weather data and constructive parameters of building on the
thermal performance of the passive system. The mathematical model is solved by
means of finite differences method and improved solution procedure. In article
are presented results of theoretical and experimental study for developing and
validating a numerical solution model for predication the thermal behaviour of
passive solar systems with massive wall.
| [
{
"version": "v1",
"created": "Sun, 13 Feb 2005 15:29:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Stanko",
""
],
[
"Stoilov",
"Anton",
""
]
] |
cs/0502060 | Jean-Philippe Rennard | J.-Ph Rennard | Perspectives for Strong Artificial Life | 19 pages, 5 figures | Rennard, J.-Ph., (2004), Perspective for Strong Artificial Life in
De Castro, L.N. & von Zuben F.J. (Eds), Recent Developments in Biologically
Inspired Computing, Hershey:IGP, 301-318 | null | null | cs.AI | null | This text introduces the twin deadlocks of strong artificial life.
Conceptualization of life is a deadlock both because of the existence of a
continuum between the inert and the living, and because we only know one
instance of life. Computationalism is a second deadlock since it remains a
matter of faith. Nevertheless, artificial life realizations quickly progress
and recent constructions embed an always growing set of the intuitive
properties of life. This growing gap between theory and realizations should
sooner or later crystallize in some kind of paradigm shift and then give clues
to break the twin deadlocks.
| [
{
"version": "v1",
"created": "Sun, 13 Feb 2005 18:20:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rennard",
"J. -Ph",
""
]
] |
cs/0502061 | Avishai Wool | Sagy Bar, Mira Gonen, Avishai Wool | A Geographic Directed Preferential Internet Topology Model | 21 pages, 4 figures | null | null | null | cs.NI cs.AR | null | The goal of this work is to model the peering arrangements between Autonomous
Systems (ASes). Most existing models of the AS-graph assume an undirected
graph. However, peering arrangements are mostly asymmetric Customer-Provider
arrangements, which are better modeled as directed edges. Furthermore, it is
well known that the AS-graph, and in particular its clustering structure, is
influenced by geography.
We introduce a new model that describes the AS-graph as a directed graph,
with an edge going from the customer to the provider, but also models symmetric
peer-to-peer arrangements, and takes geography into account. We are able to
mathematically analyze its power-law exponent and number of leaves. Beyond the
analysis we have implemented our model as a synthetic network generator we call
GdTang. Experimentation with GdTang shows that the networks it produces are
more realistic than those generated by other network generators, in terms of
its power-law exponent, fractions of customer-provider and symmetric peering
arrangements, and the size of its dense core. We believe that our model is the
first to manifest realistic regional dense cores that have a clear geographic
flavor. Our synthetic networks also exhibit path inflation effects that are
similar to those observed in the real AS graph.
| [
{
"version": "v1",
"created": "Mon, 14 Feb 2005 11:39:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bar",
"Sagy",
""
],
[
"Gonen",
"Mira",
""
],
[
"Wool",
"Avishai",
""
]
] |
cs/0502062 | Markus Volkmer | Markus Volkmer and Sebastian Wallner | Tree Parity Machine Rekeying Architectures | null | IEEE Transactions on Computers Vol. 54 No. 4, pp. 421-427, April
2005 | null | null | cs.CR cs.AR | null | The necessity to secure the communication between hardware components in
embedded systems becomes increasingly important with regard to the secrecy of
data and particularly its commercial use. We suggest a low-cost (i.e. small
logic-area) solution for flexible security levels and short key lifetimes. The
basis is an approach for symmetric key exchange using the synchronisation of
Tree Parity Machines. Fast successive key generation enables a key exchange
within a few milliseconds, given realistic communication channels with a
limited bandwidth. For demonstration we evaluate characteristics of a
standard-cell ASIC design realisation as IP-core in 0.18-micrometer
CMOS-technology.
| [
{
"version": "v1",
"created": "Mon, 14 Feb 2005 13:06:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Volkmer",
"Markus",
""
],
[
"Wallner",
"Sebastian",
""
]
] |
cs/0502064 | J\=anis Buls | Janis Buls | The Lattice of Machine Invariant Sets and Subword Complexity | 9 pages, extended abstract published in 67th Workshop on General
Algebra | null | null | null | cs.CR cs.CC cs.DM | null | We investigate the lattice of machine invariant classes. This is an infinite
completely distributive lattice but it is not a Boolean lattice. We show the
subword complexity and the growth function create machine invariant classes. So
the lattice would serve as a measure of words cryptographic quality if we like
to identify new stream ciphers suitable for widespread adoption.
| [
{
"version": "v1",
"created": "Mon, 14 Feb 2005 15:28:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buls",
"Janis",
""
]
] |
cs/0502066 | Mark Braverman | Mark Braverman | On the Complexity of Real Functions | null | null | null | null | cs.CC cs.NA math.NA | null | We develop a notion of computability and complexity of functions over the
reals, which seems to be very natural when one tries to determine just how
"difficult" a certain function is. This notion can be viewed as an extension of
both BSS computability [Blum, Cucker, Shub, Smale 1998], and bit computability
in the tradition of computable analysis [Weihrauch 2000] as it relies on the
latter but allows some discontinuities and multiple values.
| [
{
"version": "v1",
"created": "Tue, 15 Feb 2005 05:24:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Braverman",
"Mark",
""
]
] |
cs/0502067 | Marcus Hutter | Jan Poland and Marcus Hutter | Master Algorithms for Active Experts Problems based on Increasing Loss
Values | 8 two-column pages, latex2e | Proc. 14th Dutch-Belgium Conf. on Machine Learning (Benelearn
2005) 59-66 | null | IDSIA-01-05 | cs.LG cs.AI | null | We specify an experts algorithm with the following characteristics: (a) it
uses only feedback from the actions actually chosen (bandit setup), (b) it can
be applied with countably infinite expert classes, and (c) it copes with losses
that may grow in time appropriately slowly. We prove loss bounds against an
adaptive adversary. From this, we obtain master algorithms for "active experts
problems", which means that the master's actions may influence the behavior of
the adversary. Our algorithm can significantly outperform standard experts
algorithms on such problems. Finally, we combine it with a universal expert
class. This results in a (computationally infeasible) universal master
algorithm which performs - in a certain sense - almost as well as any
computable strategy, for any online problem.
| [
{
"version": "v1",
"created": "Tue, 15 Feb 2005 14:59:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Poland",
"Jan",
""
],
[
"Hutter",
"Marcus",
""
]
] |
cs/0502068 | John Tromp | John Tromp and Rudi Cilibrasi | Limits of Rush Hour Logic Complexity | null | null | null | null | cs.CC | null | Rush Hour Logic was introduced in [Flake&Baum99] as a model of computation
inspired by the ``Rush Hour'' toy puzzle, in which cars can move horizontally
or vertically within a parking lot. The authors show how the model supports
polynomial space computation, using certain car configurations as building
blocks to construct boolean circuits for a cpu and memory. They consider the
use of cars of length 3 crucial to their construction, and conjecture that cars
of size 2 only, which we'll call `Size 2 Rush Hour', do not support polynomial
space computation. We settle this conjecture by showing that the required
building blocks are constructible in Size 2 Rush Hour. Furthermore, we consider
Unit Rush Hour, which was hitherto believed to be trivial, show its relation to
maze puzzles, and provide empirical support for its hardness.
| [
{
"version": "v1",
"created": "Tue, 15 Feb 2005 14:22:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tromp",
"John",
""
],
[
"Cilibrasi",
"Rudi",
""
]
] |
cs/0502070 | Erik Demaine | Erik D. Demaine and MohammadTaghi Hajiaghayi | Bidimensionality, Map Graphs, and Grid Minors | 12 pages | null | null | null | cs.DM cs.DS | null | In this paper we extend the theory of bidimensionality to two families of
graphs that do not exclude fixed minors: map graphs and power graphs. In both
cases we prove a polynomial relation between the treewidth of a graph in the
family and the size of the largest grid minor. These bounds improve the running
times of a broad class of fixed-parameter algorithms. Our novel technique of
using approximate max-min relations between treewidth and size of grid minors
is powerful, and we show how it can also be used, e.g., to prove a linear
relation between the treewidth of a bounded-genus graph and the treewidth of
its dual.
| [
{
"version": "v1",
"created": "Wed, 16 Feb 2005 19:01:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Hajiaghayi",
"MohammadTaghi",
""
]
] |
cs/0502072 | Jim Gray | William OMullane, Nolan Li, Maria Nieto-Santisteban, Alex Szalay, Ani
Thakar, Jim Gray | Batch is back: CasJobs, serving multi-TB data on the Web | null | null | null | Microsoft Technical Report MSR TR 2005 19 | cs.DC cs.DB | null | The Sloan Digital Sky Survey (SDSS) science database describes over 140
million objects and is over 1.5 TB in size. The SDSS Catalog Archive Server
(CAS) provides several levels of query interface to the SDSS data via the
SkyServer website. Most queries execute in seconds or minutes. However, some
queries can take hours or days, either because they require non-index scans of
the largest tables, or because they request very large result sets, or because
they represent very complex aggregations of the data. These "monster queries"
not only take a long time, they also affect response times for everyone else -
one or more of them can clog the entire system. To ameliorate this problem, we
developed a multi-server multi-queue batch job submission and tracking system
for the CAS called CasJobs. The transfer of very large result sets from queries
over the network is another serious problem. Statistics suggested that much of
this data transfer is unnecessary; users would prefer to store results locally
in order to allow further joins and filtering. To allow local analysis, a
system was developed that gives users their own personal databases (MyDB) at
the server side. Users may transfer data to their MyDB, and then perform
further analysis before extracting it to their own machine. MyDB tables also
provide a convenient way to share results of queries with collaborators without
downloading them. CasJobs is built using SOAP XML Web services and has been in
operation since May 2004.
| [
{
"version": "v1",
"created": "Thu, 17 Feb 2005 01:55:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"OMullane",
"William",
""
],
[
"Li",
"Nolan",
""
],
[
"Nieto-Santisteban",
"Maria",
""
],
[
"Szalay",
"Alex",
""
],
[
"Thakar",
"Ani",
""
],
[
"Gray",
"Jim",
""
]
] |
cs/0502078 | Michael Fink | Thomas Eiter, Michael Fink, and Stefan Woltran | Semantical Characterizations and Complexity of Equivalences in Answer
Set Programming | 58 pages, 6 tables. The contents were partially published in:
Proceedings 19th International Conference on Logic Programming (ICLP 2003),
pp. 224-238, LNCS 2916, Springer, 2003; and Proceedings 9th European
Conference on Logics in Artificial Intelligence (JELIA 2004), pp. 161-173,
LNCS 3229, Springer, 2004 | null | null | 1843-05-01 | cs.AI cs.CC | null | In recent research on non-monotonic logic programming, repeatedly strong
equivalence of logic programs P and Q has been considered, which holds if the
programs P union R and Q union R have the same answer sets for any other
program R. This property strengthens equivalence of P and Q with respect to
answer sets (which is the particular case for R is the empty set), and has its
applications in program optimization, verification, and modular logic
programming. In this paper, we consider more liberal notions of strong
equivalence, in which the actual form of R may be syntactically restricted. On
the one hand, we consider uniform equivalence, where R is a set of facts rather
than a set of rules. This notion, which is well known in the area of deductive
databases, is particularly useful for assessing whether programs P and Q are
equivalent as components of a logic program which is modularly structured. On
the other hand, we consider relativized notions of equivalence, where R ranges
over rules over a fixed alphabet, and thus generalize our results to
relativized notions of strong and uniform equivalence. For all these notions,
we consider disjunctive logic programs in the propositional (ground) case, as
well as some restricted classes, provide semantical characterizations and
analyze the computational complexity. Our results, which naturally extend to
answer set semantics for programs with strong negation, complement the results
on strong equivalence of logic programs and pave the way for optimizations in
answer set solvers as a tool for input-based problem solving.
| [
{
"version": "v1",
"created": "Fri, 18 Feb 2005 11:01:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eiter",
"Thomas",
""
],
[
"Fink",
"Michael",
""
],
[
"Woltran",
"Stefan",
""
]
] |
cs/0502082 | Thomas Linke | Kathrin Konczak, Thomas Linke, Torsten Schaub | Graphs and colorings for answer set programming | null | null | null | null | cs.AI cs.LO | null | We investigate the usage of rule dependency graphs and their colorings for
characterizing and computing answer sets of logic programs. This approach
provides us with insights into the interplay between rules when inducing answer
sets. We start with different characterizations of answer sets in terms of
totally colored dependency graphs that differ in graph-theoretical aspects. We
then develop a series of operational characterizations of answer sets in terms
of operators on partial colorings. In analogy to the notion of a derivation in
proof theory, our operational characterizations are expressed as
(non-deterministically formed) sequences of colorings, turning an uncolored
graph into a totally colored one. In this way, we obtain an operational
framework in which different combinations of operators result in different
formal properties. Among others, we identify the basic strategy employed by the
noMoRe system and justify its algorithmic approach. Furthermore, we distinguish
operations corresponding to Fitting's operator as well as to well-founded
semantics. (To appear in Theory and Practice of Logic Programming (TPLP))
| [
{
"version": "v1",
"created": "Mon, 21 Feb 2005 14:28:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Konczak",
"Kathrin",
""
],
[
"Linke",
"Thomas",
""
],
[
"Schaub",
"Torsten",
""
]
] |
cs/0502085 | Fabien Viger | Fabien Viger (LIAFA, Regal Ur-R Lip6), Matthieu Latapy (LIAFA) | Fast generation of random connected graphs with prescribed degrees | null | null | null | null | cs.NI cond-mat.dis-nn cs.DM | null | We address here the problem of generating random graphs uniformly from the
set of simple connected graphs having a prescribed degree sequence. Our goal is
to provide an algorithm designed for practical use both because of its ability
to generate very large graphs (efficiency) and because it is easy to implement
(simplicity). We focus on a family of heuristics for which we prove optimality
conditions, and show how this optimality can be reached in practice. We then
propose a different approach, specifically designed for typical real-world
degree distributions, which outperforms the first one. Assuming a conjecture
which we state and argue rigorously, we finally obtain an log-linear algorithm,
which, in spite of being very simple, improves the best known complexity.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2005 07:59:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Viger",
"Fabien",
"",
"LIAFA, Regal Ur-R Lip6"
],
[
"Latapy",
"Matthieu",
"",
"LIAFA"
]
] |
cs/0502086 | Pierre-Yves Oudeyer | Pierre-Yves Oudeyer | The Self-Organization of Speech Sounds | null | Journal of Theoretical Biology 233 (2005) Issue 3, Pages 435-449 | null | null | cs.LG cs.AI cs.CL cs.NE cs.RO math.DS | null | The speech code is a vehicle of language: it defines a set of forms used by a
community to carry information. Such a code is necessary to support the
linguistic interactions that allow humans to communicate. How then may a speech
code be formed prior to the existence of linguistic interactions? Moreover, the
human speech code is discrete and compositional, shared by all the individuals
of a community but different across communities, and phoneme inventories are
characterized by statistical regularities. How can a speech code with these
properties form? We try to approach these questions in the paper, using the
"methodology of the artificial". We build a society of artificial agents, and
detail a mechanism that shows the formation of a discrete speech code without
pre-supposing the existence of linguistic capacities or of coordinated
interactions. The mechanism is based on a low-level model of sensory-motor
interactions. We show that the integration of certain very simple and non
language-specific neural devices leads to the formation of a speech code that
has properties similar to the human speech code. This result relies on the
self-organizing properties of a generic coupling between perception and
production within agents, and on the interactions between agents. The
artificial system helps us to develop better intuitions on how speech might
have appeared, by showing how self-organization might have helped natural
selection to find speech.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2005 09:51:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Oudeyer",
"Pierre-Yves",
""
]
] |
cs/0502087 | Peter Turney | Robert Ewaschuk, Peter Turney | Self-Replicating Strands that Self-Assemble into User-Specified Meshes | 27 pages, issued 2005, Java code available at
http://purl.org/net/johnnyvon/ | null | null | NRC-47442, ERB-1121 | cs.NE cs.CE cs.MA | null | It has been argued that a central objective of nanotechnology is to make
products inexpensively, and that self-replication is an effective approach to
very low-cost manufacturing. The research presented here is intended to be a
step towards this vision. In previous work (JohnnyVon 1.0), we simulated
machines that bonded together to form self-replicating strands. There were two
types of machines (called types 0 and 1), which enabled strands to encode
arbitrary bit strings. However, the information encoded in the strands had no
functional role in the simulation. The information was replicated without being
interpreted, which was a significant limitation for potential manufacturing
applications. In the current work (JohnnyVon 2.0), the information in a strand
is interpreted as instructions for assembling a polygonal mesh. There are now
four types of machines and the information encoded in a strand determines how
it folds. A strand may be in an unfolded state, in which the bonds are straight
(although they flex slightly due to virtual forces acting on the machines), or
in a folded state, in which the bond angles depend on the types of machines. By
choosing the sequence of machine types in a strand, the user can specify a
variety of polygonal shapes. A simulation typically begins with an initial
unfolded seed strand in a soup of unbonded machines. The seed strand replicates
by bonding with free machines in the soup. The child strands fold into the
encoded polygonal shape, and then the polygons drift together and bond to form
a mesh. We demonstrate that a variety of polygonal meshes can be manufactured
in the simulation, by simply changing the sequence of machine types in the
seed.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2005 16:53:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ewaschuk",
"Robert",
""
],
[
"Turney",
"Peter",
""
]
] |
cs/0502088 | Pascal Hitzler | Pascal Hitzler | Towards a Systematic Account of Different Semantics for Logic Programs | 20 pages | null | null | null | cs.AI cs.LO | null | In [Hitzler and Wendt 2002, 2005], a new methodology has been proposed which
allows to derive uniform characterizations of different declarative semantics
for logic programs with negation. One result from this work is that the
well-founded semantics can formally be understood as a stratified version of
the Fitting (or Kripke-Kleene) semantics. The constructions leading to this
result, however, show a certain asymmetry which is not readily understood. We
will study this situation here with the result that we will obtain a coherent
picture of relations between different semantics for normal logic programs.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2005 18:53:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hitzler",
"Pascal",
""
]
] |
cs/0502090 | Achim Streit | A. Streit, D. Erwin, Th. Lippert, D. Mallmann, R. Menday, M. Rambadt,
M. Riedel, M. Romberg, B. Schuller, Ph. Wieder | UNICORE - From Project Results to Production Grids | 21 pages, 3 figures | null | null | null | cs.DC cs.OS | null | The UNICORE Grid-technology provides a seamless, secure and intuitive access
to distributed Grid resources. In this paper we present the recent evolution
from project results to production Grids. At the beginning UNICORE was
developed as a prototype software in two projects funded by the German research
ministry (BMBF). Over the following years, in various European-funded projects,
UNICORE evolved to a full-grown and well-tested Grid middleware system, which
today is used in daily production at many supercomputing centers worldwide.
Beyond this production usage, the UNICORE technology serves as a solid basis in
many European and International research projects, which use existing UNICORE
components to implement advanced features, high level services, and support for
applications from a growing range of domains. In order to foster these ongoing
developments, UNICORE is available as open source under BSD licence at
SourceForge, where new releases are published on a regular basis. This paper is
a review of the UNICORE achievements so far and gives a glimpse on the UNICORE
roadmap.
| [
{
"version": "v1",
"created": "Thu, 24 Feb 2005 14:13:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Streit",
"A.",
""
],
[
"Erwin",
"D.",
""
],
[
"Lippert",
"Th.",
""
],
[
"Mallmann",
"D.",
""
],
[
"Menday",
"R.",
""
],
[
"Rambadt",
"M.",
""
],
[
"Riedel",
"M.",
""
],
[
"Romberg",
"M.",
""
],
[
"Schuller",
"B.",
""
],
[
"Wieder",
"Ph.",
""
]
] |
cs/0502093 | Alessandro Mei | Alessandro Mei and Romeo Rizzi | Online Permutation Routing in Partitioned Optical Passive Star Networks | null | null | null | null | cs.DC | null | This paper establishes the state of the art in both deterministic and
randomized online permutation routing in the POPS network. Indeed, we show that
any permutation can be routed online on a POPS network either with
$O(\frac{d}{g}\log g)$ deterministic slots, or, with high probability, with
$5c\lceil d/g\rceil+o(d/g)+O(\log\log g)$ randomized slots, where constant
$c=\exp (1+e^{-1})\approx 3.927$. When $d=\Theta(g)$, that we claim to be the
"interesting" case, the randomized algorithm is exponentially faster than any
other algorithm in the literature, both deterministic and randomized ones. This
is true in practice as well. Indeed, experiments show that it outperforms its
rivals even starting from as small a network as a POPS(2,2), and the gap grows
exponentially with the size of the network. We can also show that, under proper
hypothesis, no deterministic algorithm can asymptotically match its
performance.
| [
{
"version": "v1",
"created": "Sat, 26 Feb 2005 00:07:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mei",
"Alessandro",
""
],
[
"Rizzi",
"Romeo",
""
]
] |
cs/0502094 | Samir Aknine | Samir Aknine, Onn Shehory | Coalition Formation: Concessions, Task Relationships and Complexity
Reduction | null | null | null | null | cs.MA | null | Solutions to the coalition formation problem commonly assume agent
rationality and, correspondingly, utility maximization. This in turn may
prevent agents from making compromises. As shown in recent studies, compromise
may facilitate coalition formation and increase agent utilities. In this study
we leverage on those new results. We devise a novel coalition formation
mechanism that enhances compromise. Our mechanism can utilize information on
task dependencies to reduce formation complexity. Further, it works well with
both cardinal and ordinal task values. Via experiments we show that the use of
the suggested compromise-based coalition formation mechanism provides
significant savings in the computation and communication complexity of
coalition formation. Our results also show that when information on task
dependencies is used, the complexity of coalition formation is further reduced.
We demonstrate successful use of the mechanism for collaborative information
filtering, where agents combine linguistic rules to analyze documents'
contents.
| [
{
"version": "v1",
"created": "Sun, 27 Feb 2005 18:16:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aknine",
"Samir",
""
],
[
"Shehory",
"Onn",
""
]
] |
cs/0502095 | Leandro Marturelli Schaeffer | Gilson A. Giraldi, Leandro S. Marturelli, Paulo S. Rodrigues | Gradient Vector Flow Models for Boundary Extraction in 2D Images | 8 pages, 11 figures | null | null | null | cs.CV | null | The Gradient Vector Flow (GVF) is a vector diffusion approach based on
Partial Differential Equations (PDEs). This method has been applied together
with snake models for boundary extraction medical images segmentation. The key
idea is to use a diffusion-reaction PDE to generate a new external force field
that makes snake models less sensitivity to initialization as well as improves
the snake's ability to move into boundary concavities. In this paper, we
firstly review basic results about convergence and numerical analysis of usual
GVF schemes. We point out that GVF presents numerical problems due to
discontinuities image intensity. This point is considered from a practical
viewpoint from which the GVF parameters must follow a relationship in order to
improve numerical convergence. Besides, we present an analytical analysis of
the GVF dependency from the parameters values. Also, we observe that the method
can be used for multiply connected domains by just imposing the suitable
boundary condition. In the experimental results we verify these theoretical
points and demonstrate the utility of GVF on a segmentation approach that we
have developed based on snakes.
| [
{
"version": "v1",
"created": "Mon, 28 Feb 2005 15:09:08 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jul 2005 19:19:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson A.",
""
],
[
"Marturelli",
"Leandro S.",
""
],
[
"Rodrigues",
"Paulo S.",
""
]
] |
cs/0502096 | Jano van Hemert | J.I. van Hemert | Property analysis of symmetric travelling salesman problem instances
acquired through evolution | To be published in G. Raidl and J. Gottlieb, editors, Evolutionary
Computation in Combinatorial Optimization, Springer Lecture Notes on Computer
Science, pages 122-131. Springer-Verlag, Berlin, 2005 | null | null | null | cs.NE cs.AI | null | We show how an evolutionary algorithm can successfully be used to evolve a
set of difficult to solve symmetric travelling salesman problem instances for
two variants of the Lin-Kernighan algorithm. Then we analyse the instances in
those sets to guide us towards deferring general knowledge about the efficiency
of the two variants in relation to structural properties of the symmetric
travelling sale sman problem.
| [
{
"version": "v1",
"created": "Mon, 28 Feb 2005 16:40:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Hemert",
"J. I.",
""
]
] |
cs/0503001 | Emanuel Diamant | Emanuel Diamant | Top-Down Unsupervised Image Segmentation (it sounds like oxymoron, but
actually it is not) | null | null | null | null | cs.CV cs.IR | null | Pattern recognition is generally assumed as an interaction of two inversely
directed image-processing streams: the bottom-up information details gathering
and localization (segmentation) stream, and the top-down information features
aggregation, association and interpretation (recognition) stream. Inspired by
recent evidence from biological vision research and by the insights of
Kolmogorov Complexity theory, we propose a new, just top-down evolving,
procedure of initial image segmentation. We claim that traditional top-down
cognitive reasoning, which is supposed to guide the segmentation process to its
final result, is not at all a part of the image information content evaluation.
And that initial image segmentation is certainly an unsupervised process. We
present some illustrative examples, which support our claims.
| [
{
"version": "v1",
"created": "Tue, 1 Mar 2005 05:17:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diamant",
"Emanuel",
""
]
] |
cs/0503002 | Lester Lobo | Lester Lobo, James D. Arthur | Local and Global Analysis: Complementary Activities for Increasing the
Effectiveness of Requirements Verification and Validation | 6 pages, 3 figures, published: ACM Southeast Conference, March 2005 | null | null | null | cs.SE | null | This paper presents a unique approach to connecting requirements engineering
(RE) activities into a process framework that can be employed to obtain quality
requirements with reduced expenditures of effort and cost. We propose a
two-phase model that is novel in that it introduces the concept of verification
and validation (V&V) early in the requirements life cycle. In the first phase,
we perform V&V immediately following the elicitation of requirements for each
individually distinct system function. Because the first phase focuses on
capturing smaller sets of related requirements iteratively, each corresponding
V&V activity is better focused for detecting and correcting errors in each
requirement set. In the second phase, a complementary verification activity is
initiated; the corresponding focus is on the quality of linkages between
requirements sets rather than on the requirements within the sets.
Consequently, this approach reduces the effort in verification and enhances the
focus on the verification task. Our approach, unlike other models, has a
minimal time delay between the elicitation of requirements and the execution of
the V&V activities. Because of this short time gap, the stakeholders have a
clearer recollection of the requirements, their context and rationale; this
enhances the stakeholder feedback. Furthermore, our model includes activities
that closely align with the effective RE processes employed in the software
industry. Thus, our approach facilitates a better understanding of the flow of
requirements, and provides guidance for the implementation of the RE process.
| [
{
"version": "v1",
"created": "Wed, 2 Mar 2005 00:21:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lobo",
"Lester",
""
],
[
"Arthur",
"James D.",
""
]
] |
cs/0503004 | Lester Lobo | Lester Lobo, James D. Arthur | Effective Requirements Generation: Synchronizing Early Verification &
Validation, Methods and Method Selection Criteria | 46 pages, 7 figures, 7 tables, provides elaborate description of the
research | null | null | null | cs.SE | null | This paper presents an approach for the implementation and execution of an
effective requirements generation process. We achieve this goal by providing a
well-defined requirements engineering model that includes verification and
validation (V&V), and analysis. In addition, we identify focused activity
objectives and map popular methods to lower-level activities, and define a
criterion based process for optimizing method selection for attendant
activities. Our model, unlike other models, addresses the complete requirements
generation process and consists of activities defined at more adequate levels
of abstraction. Furthermore, our model also incorporates a unique approach to
V&V that enhances quality and reduces the cost of generating requirements.
Additionally, activity objectives are identified and explicitly stated - not
implied as in the current models. To assist in the selection of an appropriate
set of methods, we have mapped commonly used methods to activities based on
their objectives. Finally, we have identified method selection criteria and
prescribed a reduced set of methods that optimize these criteria for each
activity in our model. Thus, our approach assists in the task of selecting
methods by using selection criteria to reduce a large collection of potential
methods to a smaller, manageable set. The model, clear mapping of methods to
activity objectives, and the criteria based process, taken together, provide
the much needed guidance for the effective implementation and execution of the
requirements generation process.
| [
{
"version": "v1",
"created": "Wed, 2 Mar 2005 01:05:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lobo",
"Lester",
""
],
[
"Arthur",
"James D.",
""
]
] |
cs/0503007 | Johan Bollen | Johan Bollen, Herbert Van de Sompel, Joan Smith and Rick Luce | Toward alternative metrics of journal impact: A comparison of download
and citation data | 34 pages, submitted to Information Processing and Management, special
issue on Informetrics | null | null | null | cs.DL | null | We generated networks of journal relationships from citation and download
data, and determined journal impact rankings from these networks using a set of
social network centrality metrics. The resulting journal impact rankings were
compared to the ISI IF. Results indicate that, although social network metrics
and ISI IF rankings deviate moderately for citation-based journal networks,
they differ considerably for journal networks derived from download data. We
believe the results represent a unique aspect of general journal impact that is
not captured by the ISI IF. These results furthermore raise questions regarding
the validity of the ISI IF as the sole assessment of journal impact, and
suggest the possibility of devising impact metrics based on usage information
in general.
| [
{
"version": "v1",
"created": "Thu, 3 Mar 2005 05:14:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bollen",
"Johan",
""
],
[
"Van de Sompel",
"Herbert",
""
],
[
"Smith",
"Joan",
""
],
[
"Luce",
"Rick",
""
]
] |
cs/0503008 | Laurent Tournier | Laurent Tournier (LMC - IMAG) | Approximation of dynamical systems using S-systems theory : application
to biological systems | null | null | null | null | cs.SC math.DS q-bio.MN | null | In this paper we propose a new symbolic-numeric algorithm to find positive
equilibria of a n-dimensional dynamical system. This algorithm implies a
symbolic manipulation of ODE in order to give a local approximation of
differential equations with power-law dynamics (S-systems). A numerical
calculus is then needed to converge towards an equilibrium, giving at the same
time a S-system approximating the initial system around this equilibrium. This
algorithm is applied to a real biological example in 14 dimensions which is a
subsystem of a metabolic pathway in Arabidopsis Thaliana.
| [
{
"version": "v1",
"created": "Thu, 3 Mar 2005 06:32:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tournier",
"Laurent",
"",
"LMC - IMAG"
]
] |
cs/0503009 | Valmir Barbosa | R. S. C. Leao, V. C. Barbosa | Minimal chordal sense of direction and circulant graphs | null | Lecture Notes in Computer Science 4162 (2006), 670-680 | 10.1007/11821069_58 | null | cs.DM | null | A sense of direction is an edge labeling on graphs that follows a globally
consistent scheme and is known to considerably reduce the complexity of several
distributed problems. In this paper, we study a particular instance of sense of
direction, called a chordal sense of direction (CSD). In special, we identify
the class of k-regular graphs that admit a CSD with exactly k labels (a minimal
CSD). We prove that connected graphs in this class are Hamiltonian and that the
class is equivalent to that of circulant graphs, presenting an efficient
(polynomial-time) way of recognizing it when the graphs' degree k is fixed.
| [
{
"version": "v1",
"created": "Thu, 3 Mar 2005 12:06:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leao",
"R. S. C.",
""
],
[
"Barbosa",
"V. C.",
""
]
] |
cs/0503014 | Christian W. Straka | Christian W. Straka | ADF95: Tool for automatic differentiation of a FORTRAN code designed for
large numbers of independent variables | 24 pages, 2 figures, 4 tables, accepted in Computer Physics
Communications | null | 10.1016/j.cpc.2005.01.011 | null | cs.MS | null | ADF95 is a tool to automatically calculate numerical first derivatives for
any mathematical expression as a function of user defined independent
variables. Accuracy of derivatives is achieved within machine precision. ADF95
may be applied to any FORTRAN 77/90/95 conforming code and requires minimal
changes by the user. It provides a new derived data type that holds the value
and derivatives and applies forward differencing by overloading all FORTRAN
operators and intrinsic functions. An efficient indexing technique leads to a
reduced memory usage and a substantially increased performance gain over other
available tools with operator overloading. This gain is especially pronounced
for sparse systems with large number of independent variables. A wide class of
numerical simulations, e.g., those employing implicit solvers, can profit from
ADF95.
| [
{
"version": "v1",
"created": "Fri, 4 Mar 2005 19:20:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Straka",
"Christian W.",
""
]
] |
cs/0503016 | Xiaoming Liu | Xiaoming Liu, Lyudmila Balakireva, Patrick Hochstenbach, Herbert Van
de Sompel | File-based storage of Digital Objects and constituent datastreams:
XMLtapes and Internet Archive ARC files | 12 pages, 1 figures (camera-ready copy for ECDL 2005) | null | null | null | cs.DL | null | This paper introduces the write-once/read-many XMLtape/ARC storage approach
for Digital Objects and their constituent datastreams. The approach combines
two interconnected file-based storage mechanisms that are made accessible in a
protocol-based manner. First, XML-based representations of multiple Digital
Objects are concatenated into a single file named an XMLtape. An XMLtape is a
valid XML file; its format definition is independent of the choice of the
XML-based complex object format by which Digital Objects are represented. The
creation of indexes for both the identifier and the creation datetime of the
XML-based representation of the Digital Objects facilitates OAI-PMH-based
access to Digital Objects stored in an XMLtape. Second, ARC files, as
introduced by the Internet Archive, are used to contain the constituent
datastreams of the Digital Objects in a concatenated manner. An index for the
identifier of the datastream facilitates OpenURL-based access to an ARC file.
The interconnection between XMLtapes and ARC files is provided by conveying the
identifiers of ARC files associated with an XMLtape as administrative
information in the XMLtape, and by including OpenURL references to constituent
datastreams of a Digital Object in the XML-based representation of that Digital
Object.
| [
{
"version": "v1",
"created": "Mon, 7 Mar 2005 23:17:23 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Jun 2005 17:27:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liu",
"Xiaoming",
""
],
[
"Balakireva",
"Lyudmila",
""
],
[
"Hochstenbach",
"Patrick",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] |
cs/0503017 | Hooman Nikmehr | Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim | A Fast Combined Decimal Adder/Subtractor | This paper has been withdrawn by the authors | null | null | null | cs.OH | null | This paper has been withdrawn.
| [
{
"version": "v1",
"created": "Mon, 7 Mar 2005 23:32:27 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Apr 2005 01:54:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nikmehr",
"Hooman",
""
],
[
"Phillips",
"Braden",
""
],
[
"Lim",
"Cheng-Chew",
""
]
] |
cs/0503020 | Stevan Harnad | Tim Brody, Stevan Harnad | Earlier Web Usage Statistics as Predictors of Later Citation Impact | null | null | null | null | cs.IR | null | The use of citation counts to assess the impact of research articles is well
established. However, the citation impact of an article can only be measured
several years after it has been published. As research articles are
increasingly accessed through the Web, the number of times an article is
downloaded can be instantly recorded and counted. One would expect the number
of times an article is read to be related both to the number of times it is
cited and to how old the article is. This paper analyses how short-term Web
usage impact predicts medium-term citation impact. The physics e-print archive
(arXiv.org) is used to test this.
| [
{
"version": "v1",
"created": "Tue, 8 Mar 2005 22:26:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brody",
"Tim",
""
],
[
"Harnad",
"Stevan",
""
]
] |
cs/0503021 | Stevan Harnad | Stevan Harnad | Fast-Forward on the Green Road to Open Access: The Case Against Mixing
Up Green and Gold | null | Ariadne 42 January 2005; http://www.ariadne.ac.uk/issue42/harnad/ | null | null | cs.IR | null | This article is a critique of: "The 'Green' and 'Gold' Roads to Open Access:
The Case for Mixing and Matching" by Jean-Claude Guedon (in Serials Review
30(4) 2004).
Open Access (OA) means: free online access to all peer-reviewed journal
articles. Jean-Claude Guedon argues against the efficacy of author
self-archiving of peer-reviewed journal articles (the "Green" road to OA). He
suggests instead that we should convert to Open Access Publishing (the "Golden"
road to OA) by "mixing and matching" Green and Gold as follows: o First,
self-archive dissertations (not published, peer-reviewed journal articles). o
Second, identify and tag how those dissertations have been evaluated and
reviewed. o Third, self-archive unrefereed preprints (not published,
peer-reviewed journal articles). o Fourth, develop new mechanisms for
evaluating and reviewing those unrefereed preprints, at multiple levels. The
result will be OA Publishing (Gold). I argue that rather than yet another 10
years of speculation like this, what is actually needed (and imminent) is for
OA self-archiving to be mandated by research funders and institutions so that
the self-archiving of published, peer-reviewed journal articles (Green) can be
fast-forwarded to 100% OA.
| [
{
"version": "v1",
"created": "Tue, 8 Mar 2005 22:44:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Harnad",
"Stevan",
""
]
] |
cs/0503022 | Daniel Pfeifer | Daniel Pfeifer and Peter C. Lockemann | Theory and Practice of Transactional Method Caching | null | null | null | 2005-9 | cs.DB | null | Nowadays, tiered architectures are widely accepted for constructing large
scale information systems. In this context application servers often form the
bottleneck for a system's efficiency. An application server exposes an object
oriented interface consisting of set of methods which are accessed by
potentially remote clients. The idea of method caching is to store results of
read-only method invocations with respect to the application server's interface
on the client side. If the client invokes the same method with the same
arguments again, the corresponding result can be taken from the cache without
contacting the server. It has been shown that this approach can considerably
improve a real world system's efficiency.
This paper extends the concept of method caching by addressing the case where
clients wrap related method invocations in ACID transactions. Demarcating
sequences of method calls in this way is supported by many important
application server standards. In this context the paper presents an
architecture, a theory and an efficient protocol for maintaining full
transactional consistency and in particular serializability when using a method
cache on the client side. In order to create a protocol for scheduling cached
method results, the paper extends a classical transaction formalism. Based on
this extension, a recovery protocol and an optimistic serializability protocol
are derived. The latter one differs from traditional transactional cache
protocols in many essential ways. An efficiency experiment validates the
approach: Using the cache a system's performance and scalability are
considerably improved.
| [
{
"version": "v1",
"created": "Wed, 9 Mar 2005 17:53:15 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Mar 2005 12:35:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pfeifer",
"Daniel",
""
],
[
"Lockemann",
"Peter C.",
""
]
] |
cs/0503023 | Josiah Carlson | Josiah Carlson and David Eppstein | The Weighted Maximum-Mean Subtree and Other Bicriterion Subtree Problems | 10 pages | null | null | null | cs.CG cs.DS | null | We consider problems in which we are given a rooted tree as input, and must
find a subtree with the same root, optimizing some objective function of the
nodes in the subtree. When this function is the sum of constant node weights,
the problem is trivially solved in linear time. When the objective is the sum
of weights that are linear functions of a parameter, we show how to list all
optima for all possible parameter values in O(n log n) time; this parametric
optimization problem can be used to solve many bicriterion optimizations
problems, in which each node has two values xi and yi associated with it, and
the objective function is a bivariate function f(SUM(xi),SUM(yi)) of the sums
of these two values. A special case, when f is the ratio of the two sums, is
the Weighted Maximum-Mean Subtree Problem, or equivalently the Fractional
Prize-Collecting Steiner Tree Problem on Trees; for this special case, we
provide a linear time algorithm for this problem when all weights are positive,
improving a previous O(n log n) solution, and prove that the problem is
NP-complete when negative weights are allowed.
| [
{
"version": "v1",
"created": "Wed, 9 Mar 2005 18:16:14 GMT"
},
{
"version": "v2",
"created": "Wed, 4 May 2005 21:45:54 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Aug 2005 06:06:57 GMT"
},
{
"version": "v4",
"created": "Tue, 6 Dec 2005 01:56:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carlson",
"Josiah",
""
],
[
"Eppstein",
"David",
""
]
] |
cs/0503024 | Dan Tufis I. | Dan Tufis, Radu Ion, Nancy Ide | Fine-Grained Word Sense Disambiguation Based on Parallel Corpora, Word
Alignment, Word Clustering and Aligned Wordnets | 7 pages in Proc. of COLING2005 | In proceedings of the 20th International Conference on
Computational Linguistics, COLING2004, Geneva, 2004, pp. 1312-1318 | null | null | cs.AI cs.CL | null | The paper presents a method for word sense disambiguation based on parallel
corpora. The method exploits recent advances in word alignment and word
clustering based on automatic extraction of translation equivalents and being
supported by available aligned wordnets for the languages in the corpus. The
wordnets are aligned to the Princeton Wordnet, according to the principles
established by EuroWordNet. The evaluation of the WSD system, implementing the
method described herein showed very encouraging results. The same system used
in a validation mode, can be used to check and spot alignment errors in
multilingually aligned wordnets as BalkaNet and EuroWordNet.
| [
{
"version": "v1",
"created": "Thu, 10 Mar 2005 11:49:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tufis",
"Dan",
""
],
[
"Ion",
"Radu",
""
],
[
"Ide",
"Nancy",
""
]
] |
cs/0503025 | Rajkumar Buyya | Jia Yu, Rajkumar Buyya | A Taxonomy of Workflow Management Systems for Grid Computing | 29 pages, 15 figures | null | null | GRIDS-TR-2005-1, Grid Computing and Distributed Systems Laboratory,
University of Melbourne, Australia, March 10, 2005 | cs.DC | null | With the advent of Grid and application technologies, scientists and
engineers are building more and more complex applications to manage and process
large data sets, and execute scientific experiments on distributed resources.
Such application scenarios require means for composing and executing complex
workflows. Therefore, many efforts have been made towards the development of
workflow management systems for Grid computing. In this paper, we propose a
taxonomy that characterizes and classifies various approaches for building and
executing workflows on Grids. We also survey several representative Grid
workflow systems developed by various projects world-wide to demonstrate the
comprehensiveness of the taxonomy. The taxonomy not only highlights the design
and engineering similarities and differences of state-of-the-art in Grid
workflow systems, but also identifies the areas that need further research.
| [
{
"version": "v1",
"created": "Fri, 11 Mar 2005 01:13:07 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Apr 2005 08:21:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yu",
"Jia",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0503028 | Do Duc Hanh | Phan Minh Dung, Do Duc Hanh, and Phan Minh Thang (Asian Institute of
Technology) | Stabilization of Cooperative Information Agents in Unpredictable
Environment: A Logic Programming Approach | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.LO cs.MA cs.PL | null | An information agent is viewed as a deductive database consisting of 3 parts:
an observation database containing the facts the agent has observed or sensed
from its surrounding environment, an input database containing the information
the agent has obtained from other agents, and an intensional database which is
a set of rules for computing derived information from the information stored in
the observation and input databases. Stabilization of a system of information
agents represents a capability of the agents to eventually get correct
information about their surrounding despite unpredictable environment changes
and the incapability of many agents to sense such changes causing them to have
temporary incorrect information. We argue that the stabilization of a system of
cooperative information agents could be understood as the convergence of the
behavior of the whole system toward the behavior of a "superagent", who has the
sensing and computing capabilities of all agents combined. We show that
unfortunately, stabilization is not guaranteed in general, even if the agents
are fully cooperative and do not hide any information from each other. We give
sufficient conditions for stabilization and discuss the consequences of our
results.
| [
{
"version": "v1",
"created": "Mon, 14 Mar 2005 09:07:24 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Mar 2005 01:57:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dung",
"Phan Minh",
"",
"Asian Institute of\n Technology"
],
[
"Hanh",
"Do Duc",
"",
"Asian Institute of\n Technology"
],
[
"Thang",
"Phan Minh",
"",
"Asian Institute of\n Technology"
]
] |
cs/0503030 | Rajesh Pampapathi | Rajesh M. Pampapathi, Boris Mirkin, Mark Levene | A Suffix Tree Approach to Email Filtering | Revisions made in the light of reviewer comments. Main changes: (i)
The extension and elaboration of section 4.4 which describes the scoring
algorithm; (ii) Favouring the use of false positive and false negative
performance measures over the use of precision and recall; (iii) The addition
of ROC curves wherever possible; and (iv) Inclusion of performance statistics
for algorithm. Re-submitted 5th August 2005 | null | null | null | cs.AI cs.CL | null | We present an approach to email filtering based on the suffix tree data
structure. A method for the scoring of emails using the suffix tree is
developed and a number of scoring and score normalisation functions are tested.
Our results show that the character level representation of emails and classes
facilitated by the suffix tree can significantly improve classification
accuracy when compared with the currently popular methods, such as naive Bayes.
We believe the method can be extended to the classification of documents in
other domains.
| [
{
"version": "v1",
"created": "Mon, 14 Mar 2005 18:12:03 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Dec 2005 15:22:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pampapathi",
"Rajesh M.",
""
],
[
"Mirkin",
"Boris",
""
],
[
"Levene",
"Mark",
""
]
] |
cs/0503032 | Loreto Bravo | L. Bertossi (1), L. Bravo (1), E. Franconi (2), A. Lopatenko (2 and 3)
((1) Carleton University (2) Free University of Bozen--Bolzano, (3)
University of Manchester) | Complexity and Approximation of Fixing Numerical Attributes in Databases
Under Integrity Constraints | 35 pages. Extended version of the camera ready version to appear in
Proc. of the Databases Programming Languages Conference (DBPL 05), Springer
LNCS volume 3774 | null | null | null | cs.DB cs.CC | null | Consistent query answering is the problem of computing the answers from a
database that are consistent with respect to certain integrity constraints that
the database as a whole may fail to satisfy. Those answers are characterized as
those that are invariant under minimal forms of restoring the consistency of
the database. In this context, we study the problem of repairing databases by
fixing integer numerical values at the attribute level with respect to denial
and aggregation constraints. We introduce a quantitative definition of database
fix, and investigate the complexity of several decision and optimization
problems, including DFP, i.e. the existence of fixes within a given distance
from the original instance, and CQA, i.e. deciding consistency of answers to
aggregate conjunctive queries under different semantics. We provide sharp
complexity bounds, identify relevant tractable cases; and introduce
approximation algorithms for some of those that are intractable. More
specifically, we obtain results like undecidability of existence of fixes for
aggregation constraints; MAXSNP-hardness of DFP, but a good approximation
algorithm for a relevant special case; and intractability but good
approximation for CQA for aggregate queries for one database atom denials (plus
built-ins).
| [
{
"version": "v1",
"created": "Tue, 15 Mar 2005 00:03:59 GMT"
},
{
"version": "v2",
"created": "Wed, 25 May 2005 17:46:21 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Oct 2005 19:43:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bertossi",
"L.",
"",
"2 and 3"
],
[
"Bravo",
"L.",
"",
"2 and 3"
],
[
"Franconi",
"E.",
"",
"2 and 3"
],
[
"Lopatenko",
"A.",
"",
"2 and 3"
]
] |
cs/0503033 | Stergos Afantenos | Stergos D. Afantenos, Konstantina Liontou, Maria Salapata, Vangelis
Karkaletsis | An Introduction to the Summarization of Evolving Events: Linear and
Non-linear Evolution | 10 pages, 3 figures. To be pulished in Natural Language Understanding
and Cognitive Science (NLUCS - 2005) conference | Edited by Bernadete Sharp, Proceedings of the 2nd International
Workshop on Natural Language Understanding and Cognitive Science, NLUCS 2005.
Maiami, Florida, USA: INSTICC Press. pp 91-99. | null | null | cs.CL cs.IR | null | This paper examines the summarization of events that evolve through time. It
discusses different types of evolution taking into account the time in which
the incidents of an event are happening and the different sources reporting on
the specific event. It proposes an approach for multi-document summarization
which employs ``messages'' for representing the incidents of an event and
cross-document relations that hold between messages according to certain
conditions. The paper also outlines the current version of the summarization
system we are implementing to realize this approach.
| [
{
"version": "v1",
"created": "Tue, 15 Mar 2005 15:31:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Afantenos",
"Stergos D.",
""
],
[
"Liontou",
"Konstantina",
""
],
[
"Salapata",
"Maria",
""
],
[
"Karkaletsis",
"Vangelis",
""
]
] |
cs/0503035 | Alexey Savvateev | Anna Bogomolnaia, Michel Le Breton, Alexei Savvateev, Shlomo Weber | The egalitarian sharing rule in provision of public projects | 7 pages | null | null | null | cs.GT | null | In this note we consider a society that partitions itself into disjoint
jurisdictions, each choosing a location of its public project and a taxation
scheme to finance it. The set of public project is multi-dimensional, and their
costs could vary from jurisdiction to jurisdiction. We impose two principles,
egalitarianism, that requires the equalization of the total cost for all agents
in the same jurisdiction, and efficiency, that implies the minimization of the
aggregate total cost within jurisdiction. We show that these two principles
always yield a core-stable partition but a Nash stable partition may fail to
exist.
| [
{
"version": "v1",
"created": "Thu, 17 Mar 2005 09:24:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bogomolnaia",
"Anna",
""
],
[
"Breton",
"Michel Le",
""
],
[
"Savvateev",
"Alexei",
""
],
[
"Weber",
"Shlomo",
""
]
] |
cs/0503036 | Ricardo Corin | R. Corin, S. Etalle, P.H. Hartel and A. Mader | Timed Analysis of Security Protocols | null | null | null | null | cs.CR | null | We propose a method for engineering security protocols that are aware of
timing aspects. We study a simplified version of the well-known Needham
Schroeder protocol and the complete Yahalom protocol, where timing information
allows the study of different attack scenarios. We model check the protocols
using UPPAAL. Further, a taxonomy is obtained by studying and categorising
protocols from the well known Clark Jacob library and the Security Protocol
Open Repository (SPORE) library. Finally, we present some new challenges and
threats that arise when considering time in the analysis, by providing a novel
protocol that uses time challenges and exposing a timing attack over an
implementation of an existing security protocol.
| [
{
"version": "v1",
"created": "Thu, 17 Mar 2005 10:05:18 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Oct 2005 21:03:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Corin",
"R.",
""
],
[
"Etalle",
"S.",
""
],
[
"Hartel",
"P. H.",
""
],
[
"Mader",
"A.",
""
]
] |
cs/0503037 | Zengyou He | Zengyou He | Mining Top-k Approximate Frequent Patterns | 13 pages | null | null | TR-2005-0315 | cs.DB cs.AI | null | Frequent pattern (itemset) mining in transactional databases is one of the
most well-studied problems in data mining. One obstacle that limits the
practical usage of frequent pattern mining is the extremely large number of
patterns generated. Such a large size of the output collection makes it
difficult for users to understand and use in practice. Even restricting the
output to the border of the frequent itemset collection does not help much in
alleviating the problem. In this paper we address the issue of overwhelmingly
large output size by introducing and studying the following problem: mining
top-k approximate frequent patterns. The union of the power sets of these k
sets should satisfy the following conditions: (1) including itemsets with
larger support as many as possible and (2) including itemsets with smaller
support as less as possible. An integrated objective function is designed to
combine these two objectives. Consequently, we derive the upper bounds on
objective function and present an approximate branch-and-bound method for
finding the feasible solution. We give empirical evidence showing that our
formulation and approximation methods work well in practice.
| [
{
"version": "v1",
"created": "Thu, 17 Mar 2005 11:01:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
]
] |
cs/0503043 | Paolo Liberatore | Paolo Liberatore | Complexity Issues in Finding Succinct Solutions of PSPACE-Complete
Problems | null | null | null | null | cs.AI cs.CC cs.LO | null | We study the problem of deciding whether some PSPACE-complete problems have
models of bounded size. Contrary to problems in NP, models of PSPACE-complete
problems may be exponentially large. However, such models may take polynomial
space in a succinct representation. For example, the models of a QBF are
explicitely represented by and-or trees (which are always of exponential size)
but can be succinctely represented by circuits (which can be polynomial or
exponential). We investigate the complexity of deciding the existence of such
succinct models when a bound on size is given.
| [
{
"version": "v1",
"created": "Fri, 18 Mar 2005 17:30:39 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Mar 2005 11:13:15 GMT"
},
{
"version": "v3",
"created": "Tue, 29 Mar 2005 19:32:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liberatore",
"Paolo",
""
]
] |
cs/0503045 | Gregory Edwin Graham | G. E. Graham (1), M. Anzar Afaq (1), David Evans (1), Gerald Guglielmo
(1), Eric Wicklund (1), Peter Love (2) ((1) Fermi National Accelerator
Laboratory, (2) University of Lancaster) | Contextual Constraint Modeling in Grid Application Workflows | 19 pages, 5 figures; Submitted to Concurrency and Computation:
Practice and Experience for the Special Issue on Workflows at GGF10, cpe859 | null | null | null | cs.DC | null | This paper introduces a new mechanism for specifying constraints in
distributed workflows. By introducing constraints in a contextual form, it is
shown how different people and groups within collaborative communities can
cooperatively constrain workflows. A comparison with existing state-of-the-art
workflow systems is made. These ideas are explored in practice with an
illustrative example from High Energy Physics.
| [
{
"version": "v1",
"created": "Sat, 19 Mar 2005 01:28:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Graham",
"G. E.",
""
],
[
"Afaq",
"M. Anzar",
""
],
[
"Evans",
"David",
""
],
[
"Guglielmo",
"Gerald",
""
],
[
"Wicklund",
"Eric",
""
],
[
"Love",
"Peter",
""
]
] |
cs/0503046 | Haixia Jia | Dimitris Achlioptas and Haixia Jia and Cristopher Moore | Hiding Satisfying Assignments: Two are Better than One | Preliminary version appeared in AAAI 2004 | null | null | null | cs.AI cond-mat.dis-nn cond-mat.stat-mech cs.CC | null | The evaluation of incomplete satisfiability solvers depends critically on the
availability of hard satisfiable instances. A plausible source of such
instances consists of random k-SAT formulas whose clauses are chosen uniformly
from among all clauses satisfying some randomly chosen truth assignment A.
Unfortunately, instances generated in this manner tend to be relatively easy
and can be solved efficiently by practical heuristics. Roughly speaking, as the
formula's density increases, for a number of different algorithms, A acts as a
stronger and stronger attractor. Motivated by recent results on the geometry of
the space of satisfying truth assignments of random k-SAT and NAE-k-SAT
formulas, we introduce a simple twist on this basic model, which appears to
dramatically increase its hardness. Namely, in addition to forbidding the
clauses violated by the hidden assignment A, we also forbid the clauses
violated by its complement, so that both A and complement of A are satisfying.
It appears that under this "symmetrization'' the effects of the two attractors
largely cancel out, making it much harder for algorithms to find any truth
assignment. We give theoretical and experimental evidence supporting this
assertion.
| [
{
"version": "v1",
"created": "Sun, 20 Mar 2005 02:46:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Achlioptas",
"Dimitris",
""
],
[
"Jia",
"Haixia",
""
],
[
"Moore",
"Cristopher",
""
]
] |
cs/0503048 | Arindam Mitra | Arindam Mitra | Is entanglement necessary to have unconditional security in quantum bit
commitment ? | Pdf. 2 pages. Revised | null | null | null | cs.CR | null | A simple un-entanglement based quantum bit commitment scheme is presented.
Although commitment is unconditionally secure but concealment is not.
| [
{
"version": "v1",
"created": "Mon, 21 Mar 2005 15:20:14 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Nov 2005 15:39:44 GMT"
},
{
"version": "v3",
"created": "Fri, 31 Mar 2006 13:58:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mitra",
"Arindam",
""
]
] |
cs/0503050 | Nikita Sakhanenko | Hanna Makaruk, Robert Owczarek, Nikita Sakhanenko | Systematic Method for Path-Complete White Box Testing | 24 pages, 3 figures, submitted to Software Testing, Verification and
Reliability (STVR) | null | null | LA-UR-05-1850 | cs.SE | null | A systematic, language-independent method of finding a minimal set of paths
covering the code of a sequential program is proposed for application in White
Box testing. Execution of all paths from the set ensures also statement
coverage. Execution fault marks problematic areas of the code. The method
starts from a UML activity diagram of a program. The diagram is transformed
into a directed graph: graph's nodes substitute decision and action points;
graph's directed edges substitute action arrows.
The number of independent paths equals easy-to-compute cyclomatic complexity
of the graph. Association of a vector to each path creates a path vector space.
Independence of the paths is equivalent to linear independence of the vectors.
It is sufficient to test any base of the path space to complete the procedure.
An effective algorithm for choosing the base paths is presented.
| [
{
"version": "v1",
"created": "Mon, 21 Mar 2005 21:26:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Makaruk",
"Hanna",
""
],
[
"Owczarek",
"Robert",
""
],
[
"Sakhanenko",
"Nikita",
""
]
] |
cs/0503051 | Fengfeng Zhou | Fengfeng Zhou, Guoliang Chen, and Yinlong Xu | Construction of Small Worlds in the Physical Topology of Wireless
Networks | null | null | null | null | cs.NI | null | The concept of small worlds is introduced into the physical topology of
wireless networks in this work. A. Helmy provided two con- struction schemes of
small worlds for the wireless networks, link rewiring and link addition, but he
mainly focused on the virtual topology. Based on the broadcasting nature of the
radio transmission, we propose a con- struction scheme of small worlds for the
physical topology of Multiple- Input Multiple-Output (MIMO) wireless networks.
Besides the topology- related topics, we also evaluate the reduction of the
power required by a request.
| [
{
"version": "v1",
"created": "Tue, 22 Mar 2005 03:23:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Fengfeng",
""
],
[
"Chen",
"Guoliang",
""
],
[
"Xu",
"Yinlong",
""
]
] |
cs/0503053 | Carlos Miravet | Carlos Miravet and Francisco B. Rodriguez (EPS-UAM, Madrid, Spain) | A hybrid MLP-PNN architecture for fast image superresolution | 8 pages with 4 figures. ICANN/ICONIP 2003 | Lect. Notes Comput. Sc. 2714 (2003) 401-408 | null | null | cs.CV cs.MM | null | Image superresolution methods process an input image sequence of a scene to
obtain a still image with increased resolution. Classical approaches to this
problem involve complex iterative minimization procedures, typically with high
computational costs. In this paper is proposed a novel algorithm for
super-resolution that enables a substantial decrease in computer load. First, a
probabilistic neural network architecture is used to perform a scattered-point
interpolation of the image sequence data. The network kernel function is
optimally determined for this problem by a multi-layer perceptron trained on
synthetic data. Network parameters dependence on sequence noise level is
quantitatively analyzed. This super-sampled image is spatially filtered to
correct finite pixel size effects, to yield the final high-resolution estimate.
Results on a real outdoor sequence are presented, showing the quality of the
proposed method.
| [
{
"version": "v1",
"created": "Tue, 22 Mar 2005 11:45:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Miravet",
"Carlos",
"",
"EPS-UAM, Madrid, Spain"
],
[
"Rodriguez",
"Francisco B.",
"",
"EPS-UAM, Madrid, Spain"
]
] |
cs/0503056 | Carlos Miravet | Carlos Miravet, Enrique Coiras and Javier Santamaria (SENER, Madrid,
Spain) | Semi-automatic vectorization of linear networks on rasterized
cartographic maps | 12 pages with 13 figures, in Spanish | Revista de Teledeteccion, 10 (1998) | null | null | cs.CV cs.MM | null | A system for semi-automatic vectorization of linear networks (roads, rivers,
etc.) on rasterized cartographic maps is presented. In this system, human
intervention is limited to a graphic, interactive selection of the color
attributes of the information to be obtained. Using this data, the system
performs a preliminary extraction of the linear network, which is subsequently
completed, refined and vectorized by means of an automatic procedure. Results
on maps of different sources and scales are included.
-----
Se presenta un sistema semi-automatico de vectorizacion de redes de objetos
lineales (carreteras, rios, etc.) en mapas cartograficos digitalizados. En este
sistema, la intervencion humana queda reducida a la seleccion grafica
interactiva de los atributos de color de la informacion a obtener. Con estos
datos, el sistema realiza una extraccion preliminar de la red lineal, que se
completa, refina y vectoriza mediante un procedimiento automatico. Se presentan
resultados de la aplicacion del sistema sobre imagenes digitalizadas de mapas
de distinta procedencia y escala.
| [
{
"version": "v1",
"created": "Tue, 22 Mar 2005 20:16:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Miravet",
"Carlos",
"",
"SENER, Madrid,\n Spain"
],
[
"Coiras",
"Enrique",
"",
"SENER, Madrid,\n Spain"
],
[
"Santamaria",
"Javier",
"",
"SENER, Madrid,\n Spain"
]
] |
cs/0503057 | Ion Mandoiu | Ion I. Mandoiu and Dragos Trinca | Exact and Approximation Algorithms for DNA Tag Set Design | null | null | null | null | cs.DS | null | In this paper we propose new solution methods for designing tag sets for use
in universal DNA arrays. First, we give integer linear programming formulations
for two previous formalizations of the tag set design problem, and show that
these formulations can be solved to optimality for instance sizes of practical
interest by using general purpose optimization packages. Second, we note the
benefits of periodic tags, and establish an interesting connection between the
tag design problem and the problem of packing the maximum number of
vertex-disjoint directed cycles in a given graph. We show that combining a
simple greedy cycle packing algorithm with a previously proposed alphabetic
tree search strategy yields an increase of over 40% in the number of tags
compared to previous methods.
| [
{
"version": "v1",
"created": "Wed, 23 Mar 2005 02:36:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mandoiu",
"Ion I.",
""
],
[
"Trinca",
"Dragos",
""
]
] |
cs/0503060 | Quan Son Nguyen | Quan Son Nguyen (Hanoi University of Technology, Vietnam) | Multi-Dimensional Hash Chains and Application to Micropayment Schemes | 9 pages with 2 figures. Accepted for the International Workshop on
Coding and Cryptography (WCC'2005), March 2005 in Bergen, Norway | null | null | null | cs.CR | null | One-way hash chains have been used in many micropayment schemes due to their
simplicity and efficiency. In this paper we introduce the notion of
multi-dimensional hash chains, which is a new generalization of traditional
one-way hash chains. We show that this construction has storage-computational
complexity of O(logN) per chain element, which is comparable with the best
result reported in recent literature. Based on multi-dimensional hash chains,
we then propose two cash-like micropayment schemes, which have a number of
advantages in terms of efficiency and security. We also point out some possible
improvements to PayWord and similar schemes by using multi-dimensional hash
chains
| [
{
"version": "v1",
"created": "Wed, 23 Mar 2005 09:15:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nguyen",
"Quan Son",
"",
"Hanoi University of Technology, Vietnam"
]
] |
cs/0503061 | Sandro Etalle | Sandro Etalle and William H. Winsborough | Integrity Constraints in Trust Management | An extended abstract appears in the proc. of the 10th ACM Symp. on
Access Control Models and Technologies (SACMAT). 2005 | null | null | null | cs.CR cs.DB | null | We introduce the use, monitoring, and enforcement of integrity constraints in
trust management-style authorization systems. We consider what portions of the
policy state must be monitored to detect violations of integrity constraints.
Then we address the fact that not all participants in a trust management system
can be trusted to assist in such monitoring, and show how many integrity
constraints can be monitored in a conservative manner so that trusted
participants detect and report if the system enters a policy state from which
evolution in unmonitored portions of the policy could lead to a constraint
violation.
| [
{
"version": "v1",
"created": "Wed, 23 Mar 2005 15:20:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Etalle",
"Sandro",
""
],
[
"Winsborough",
"William H.",
""
]
] |
cs/0503062 | Christoph Koch | Christoph Koch | On the Complexity of Nonrecursive XQuery and Functional Query Languages
on Complex Values | Long version of PODS 2005 paper | null | null | null | cs.DB cs.CC | null | This paper studies the complexity of evaluating functional query languages
for complex values such as monad algebra and the recursion-free fragment of
XQuery.
We show that monad algebra with equality restricted to atomic values is
complete for the class TA[2^{O(n)}, O(n)] of problems solvable in linear
exponential time with a linear number of alternations. The monotone fragment of
monad algebra with atomic value equality but without negation is complete for
nondeterministic exponential time. For monad algebra with deep equality, we
establish TA[2^{O(n)}, O(n)] lower and exponential-space upper bounds.
Then we study a fragment of XQuery, Core XQuery, that seems to incorporate
all the features of a query language on complex values that are traditionally
deemed essential. A close connection between monad algebra on lists and Core
XQuery (with ``child'' as the only axis) is exhibited, and it is shown that
these languages are expressively equivalent up to representation issues. We
show that Core XQuery is just as hard as monad algebra w.r.t. combined
complexity, and that it is in TC0 if the query is assumed fixed.
| [
{
"version": "v1",
"created": "Wed, 23 Mar 2005 15:36:55 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Mar 2005 00:22:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Koch",
"Christoph",
""
]
] |
cs/0503065 | Rachid Echahed | Dominique Duval (LMC - IMAG), Rachid Echahed (Leibniz - IMAG),
Frederic Prost (Leibniz - IMAG) | Data-Structure Rewriting | null | null | null | null | cs.PL cs.DS | null | We tackle the problem of data-structure rewriting including pointer
redirections. We propose two basic rewrite steps: (i) Local Redirection and
Replacement steps the aim of which is redirecting specific pointers determined
by means of a pattern, as well as adding new information to an existing data ;
and (ii) Global Redirection steps which are aimed to redirect all pointers
targeting a node towards another one. We define these two rewriting steps
following the double pushout approach. We define first the category of graphs
we consider and then define rewrite rules as pairs of graph homomorphisms of
the form "L <- K ->R". Unfortunately, inverse pushouts (complement pushouts)
are not unique in our setting and pushouts do not always exist. Therefore, we
define rewriting steps so that a rewrite rule can always be performed once a
matching is found.
| [
{
"version": "v1",
"created": "Thu, 24 Mar 2005 09:55:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Duval",
"Dominique",
"",
"LMC - IMAG"
],
[
"Echahed",
"Rachid",
"",
"Leibniz - IMAG"
],
[
"Prost",
"Frederic",
"",
"Leibniz - IMAG"
]
] |
cs/0503068 | Michael Nelson | Michael L. Nelson | A Survey of Reverse Engineering and Program Comprehension | originally released as web-only in 1996 | null | null | null | cs.SE | null | Reverse engineering has been a standard practice in the hardware community
for some time. It has only been within the last ten years that reverse
engineering, or "program comprehension", has grown into the current
sub-discipline of software engineering. Traditional software engineering is
primarily focused on the development and design of new software. However, most
programmers work on software that other people have designed and developed. Up
to 50% of a software maintainers time can be spent determining the intent of
source code. The growing demand to reevaluate and reimplement legacy software
systems, brought on by the proliferation of clientserver and World Wide Web
technologies, has underscored the need for reverse engineering tools and
techniques. This paper introduces the terminology of reverse engineering and
gives some of the obstacles that make reverse engineering difficult. Although
reverse engineering remains heavily dependent on the human component, a number
of automated tools are presented that aid the reverse engineer.
| [
{
"version": "v1",
"created": "Thu, 24 Mar 2005 13:55:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nelson",
"Michael L.",
""
]
] |
cs/0503069 | Michael Nelson | Michael L. Nelson, Herbert Van de Sompel, Xiaoming Liu, Terry L.
Harrison, Nathan McFarland | mod_oai: An Apache Module for Metadata Harvesting | null | null | null | null | cs.DL | null | We describe mod_oai, an Apache 2.0 module that implements the Open Archives
Initiative Protocol for Metadata Harvesting (OAI-PMH). OAIPMH is the de facto
standard for metadata exchange in digital libraries and allows repositories to
expose their contents in a structured, application-neutral format with
semantics optimized for accurate incremental harvesting. Current
implementations of OAI-PMH are either separate applications that access an
existing repository, or are built-in to repository software packages. mod_oai
is different in that it optimizes harvesting web content by building OAI-PMH
capability into the Apache server. We discuss the implications of adding
harvesting capability to an Apache server and describe our initial experimental
results accessing a departmental web site using both web crawling and OAIPMH
harvesting techniques.
| [
{
"version": "v1",
"created": "Thu, 24 Mar 2005 14:38:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nelson",
"Michael L.",
""
],
[
"Van de Sompel",
"Herbert",
""
],
[
"Liu",
"Xiaoming",
""
],
[
"Harrison",
"Terry L.",
""
],
[
"McFarland",
"Nathan",
""
]
] |
cs/0503073 | Viktor Toth | Viktor Toth | Tensor manipulation in GPL Maxima | 26 pages (some formulae fixed, terminology usage corrected, comments
added on improved tensor contraction algorithm) | null | null | null | cs.SC | null | GPL Maxima is an open-source computer algebra system based on DOE-MACSYMA.
GPL Maxima included two tensor manipulation packages from DOE-MACSYMA, but
these were in various states of disrepair. One of the two packages, CTENSOR,
implemented component-based tensor manipulation; the other, ITENSOR, treated
tensor symbols as opaque, manipulating them based on their index properties.
The present paper describes the state in which these packages were found, the
steps that were needed to make the packages fully functional again, and the new
functionality that was implemented to make them more versatile. A third
package, ATENSOR, was also implemented; fully compatible with the identically
named package in the commercial version of MACSYMA, ATENSOR implements abstract
tensor algebras.
| [
{
"version": "v1",
"created": "Sat, 26 Mar 2005 14:41:49 GMT"
},
{
"version": "v2",
"created": "Wed, 25 May 2005 16:52:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toth",
"Viktor",
""
]
] |
cs/0503074 | Sameer Tilak | Sameer Tilak, Bhanu Pisupati, Kenneth Chiu, Geoffrey Brown, Nael
Abu-Ghazaleh | A File System Abstraction for Sense and Respond Systems | 6 pages, 3 figures Workshop on End-to-End, Sense-and-Respond Systems,
Applications, and Services In conjunction with MobiSys '05 | null | null | null | cs.NI cs.OS | null | The heterogeneity and resource constraints of sense-and-respond systems pose
significant challenges to system and application development. In this paper, we
present a flexible, intuitive file system abstraction for organizing and
managing sense-and-respond systems based on the Plan 9 design principles. A key
feature of this abstraction is the ability to support multiple views of the
system via filesystem namespaces. Constructed logical views present an
application-specific representation of the network, thus enabling high-level
programming of the network. Concurrently, structural views of the network
enable resource-efficient planning and execution of tasks. We present and
motivate the design using several examples, outline research challenges and our
research plan to address them, and describe the current state of
implementation.
| [
{
"version": "v1",
"created": "Mon, 28 Mar 2005 15:32:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tilak",
"Sameer",
""
],
[
"Pisupati",
"Bhanu",
""
],
[
"Chiu",
"Kenneth",
""
],
[
"Brown",
"Geoffrey",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
] |
cs/0503075 | Wing-kai Lin | W.-Y. Ng, W.K. Lin, D.M. Chiu | Statistical Modelling of Information Sharing: Community, Membership and
Content | accepted in International Symposium on Computer Performance,
Modeling, Measurements and Evaluation, Juan-les-Pins, France, October-2005 | null | null | null | cs.NI cond-mat.stat-mech physics.soc-ph | null | File-sharing systems, like many online and traditional information sharing
communities (e.g. newsgroups, BBS, forums, interest clubs), are dynamical
systems in nature. As peers get in and out of the system, the information
content made available by the prevailing membership varies continually in
amount as well as composition, which in turn affects all peers' join/leave
decisions. As a result, the dynamics of membership and information content are
strongly coupled, suggesting interesting issues about growth, sustenance and
stability.
In this paper, we propose to study such communities with a simple statistical
model of an information sharing club. Carrying their private payloads of
information goods as potential supply to the club, peers join or leave on the
basis of whether the information they demand is currently available.
Information goods are chunked and typed, as in a file sharing system where
peers contribute different files, or a forum where messages are grouped by
topics or threads. Peers' demand and supply are then characterized by
statistical distributions over the type domain.
This model reveals interesting critical behaviour with multiple equilibria. A
sharp growth threshold is derived: the club may grow towards a sustainable
equilibrium only if the value of an order parameter is above the threshold, or
shrink to emptiness otherwise. The order parameter is composite and comprises
the peer population size, the level of their contributed supply, the club's
efficiency in information search, the spread of supply and demand over the type
domain, as well as the goodness of match between them.
| [
{
"version": "v1",
"created": "Mon, 28 Mar 2005 07:33:37 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Apr 2005 07:48:16 GMT"
},
{
"version": "v3",
"created": "Sat, 2 Jul 2005 01:55:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ng",
"W. -Y.",
""
],
[
"Lin",
"W. K.",
""
],
[
"Chiu",
"D. M.",
""
]
] |
cs/0503076 | Marci Meingast | Marci Meingast, Christopher Geyer, Shankar Sastry | Geometric Models of Rolling-Shutter Cameras | null | null | null | null | cs.CV cs.RO | null | Cameras with rolling shutters are becoming more common as low-power, low-cost
CMOS sensors are being used more frequently in cameras. The rolling shutter
means that not all scanlines are exposed over the same time interval. The
effects of a rolling shutter are noticeable when either the camera or objects
in the scene are moving and can lead to systematic biases in projection
estimation. We develop a general projection equation for a rolling shutter
camera and show how it is affected by different types of camera motion. In the
case of fronto-parallel motion, we show how that camera can be modeled as an
X-slit camera. We also develop approximate projection equations for a non-zero
angular velocity about the optical axis and approximate the projection equation
for a constant velocity screw motion. We demonstrate how the rolling shutter
effects the projective geometry of the camera and in turn the
structure-from-motion.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 00:00:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Meingast",
"Marci",
""
],
[
"Geyer",
"Christopher",
""
],
[
"Sastry",
"Shankar",
""
]
] |
cs/0503077 | Mehryar Mohri | Mehryar Mohri, Fernando Pereira, Michael Riley | Weighted Automata in Text and Speech Processing | null | Mehryar Mohri, Fernando Pereira, and Michael Riley. Weighted
Automata in Text and Speech Processing. In Proceedings of the 12th biennial
European Conference on Artificial Intelligence (ECAI-96), Workshop on
Extended finite state models of language. Budapest, Hungary, 1996. John Wiley
and Sons, Chichester | null | null | cs.CL cs.HC | null | Finite-state automata are a very effective tool in natural language
processing. However, in a variety of applications and especially in speech
precessing, it is necessary to consider more general machines in which arcs are
assigned weights or costs. We briefly describe some of the main theoretical and
algorithmic aspects of these machines. In particular, we describe an efficient
composition algorithm for weighted transducers, and give examples illustrating
the value of determinization and minimization algorithms for weighted automata.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 04:59:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mohri",
"Mehryar",
""
],
[
"Pereira",
"Fernando",
""
],
[
"Riley",
"Michael",
""
]
] |
cs/0503078 | Fernando Sasse D. | Angelo Luis Pagliosa, Claudio Cesar de Sa and Fernando D. Sasse | Obtaining Membership Functions from a Neuron Fuzzy System extended by
Kohonen Network | 6 pages, 6 figures, 5th Congress of Logic Applied to Technology
(LAPTEC 2005) Himeji, Japan, April 2-6, 2005 | null | null | null | cs.NE | null | This article presents the Neo-Fuzzy-Neuron Modified by Kohonen Network
(NFN-MK), an hybrid computational model that combines fuzzy system technique
and artificial neural networks. Its main task consists in the automatic
generation of membership functions, in particular, triangle forms, aiming a
dynamic modeling of a system. The model is tested by simulating real systems,
here represented by a nonlinear mathematical function. Comparison with the
results obtained by traditional neural networks, and correlated studies of
neurofuzzy systems applied in system identification area, shows that the NFN-MK
model has a similar performance, despite its greater simplicity.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 19:40:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pagliosa",
"Angelo Luis",
""
],
[
"de Sa",
"Claudio Cesar",
""
],
[
"Sasse",
"Fernando D.",
""
]
] |
cs/0503081 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | An Optimization Model for Outlier Detection in Categorical Data | 12 pages | null | null | Tr-05-0329 | cs.DB cs.AI | null | The task of outlier detection is to find small groups of data objects that
are exceptional when compared with rest large amount of data. Detection of such
outliers is important for many applications such as fraud detection and
customer migration. Most existing methods are designed for numeric data. They
will encounter problems with real-life applications that contain categorical
data. In this paper, we formally define the problem of outlier detection in
categorical data as an optimization problem from a global viewpoint. Moreover,
we present a local-search heuristic based algorithm for efficiently finding
feasible solutions. Experimental results on real datasets and large synthetic
datasets demonstrate the superiority of our model and algorithm.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 13:31:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
cs/0503082 | Gabriel Istrate | Gabriel Istrate, Stefan Boettcher, Allon G. Percus | Spines of Random Constraint Satisfaction Problems: Definition and
Connection with Computational Complexity | A revised version of this paper will appear in Annals of Mathematics
and Artificial Intelligence | null | null | null | cs.CC cond-mat.dis-nn cs.AI | null | We study the connection between the order of phase transitions in
combinatorial problems and the complexity of decision algorithms for such
problems. We rigorously show that, for a class of random constraint
satisfaction problems, a limited connection between the two phenomena indeed
exists. Specifically, we extend the definition of the spine order parameter of
Bollobas et al. to random constraint satisfaction problems, rigorously showing
that for such problems a discontinuity of the spine is associated with a
$2^{\Omega(n)}$ resolution complexity (and thus a $2^{\Omega(n)}$ complexity of
DPLL algorithms) on random instances. The two phenomena have a common
underlying cause: the emergence of ``large'' (linear size) minimally
unsatisfiable subformulas of a random formula at the satisfiability phase
transition.
We present several further results that add weight to the intuition that
random constraint satisfaction problems with a sharp threshold and a continuous
spine are ``qualitatively similar to random 2-SAT''. Finally, we argue that it
is the spine rather than the backbone parameter whose continuity has
implications for the decision complexity of combinatorial problems, and we
provide experimental evidence that the two parameters can behave in a different
manner.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 21:58:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Istrate",
"Gabriel",
""
],
[
"Boettcher",
"Stefan",
""
],
[
"Percus",
"Allon G.",
""
]
] |
cs/0503083 | Gabriel Istrate | Gabriel Istrate | Coarse and Sharp Thresholds of Boolean Constraint Satisfaction Problems | A revised version of this paper will appear in Discrete Applied
Mathematics | null | null | null | cs.DM cs.CC | null | We study threshold properties of random constraint satisfaction problems
under a probabilistic model due to Molloy. We give a sufficient condition for
the existence of a sharp threshold that leads (for boolean constraints) to a
necessary and sufficient for the existence of a sharp threshold in the case
where constraint templates are applied with equal probability, solving thus an
open problem of Creignou and Daude.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 22:25:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
] |
cs/0503084 | Pavlo Nefyodov | P. Nefyodov, V. Reztsov, O. Riabinina | The Peculiarities of Nonstationary Formation of Inhomogeneous Structures
of Charged Particles in the Electrodiffusion Processes | 6 pages, 6 figures The example of our scientific work | null | null | null | cs.CE | null | In this paper the distribution of charged particles is constructed under the
approximation of ambipolar diffusion. The results of mathematical modelling in
two-dimensional case taking into account the velocities of the system are
presented.
| [
{
"version": "v1",
"created": "Wed, 30 Mar 2005 07:00:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nefyodov",
"P.",
""
],
[
"Reztsov",
"V.",
""
],
[
"Riabinina",
"O.",
""
]
] |
cs/0503086 | Joseph Morlier | Joseph Morlier (LRBB) | Segmentation of the Homogeneity of a Signal Using a Piecewise Linear
Recognition Tool | This preprint could help me to receive comments on my work in order
to enhance the paper to be submitted | null | null | null | cs.NA | null | In this paper a new method of detection of homogeneous zones and singularity
parts of a 1D signal is proposed. The entropy function is used to transform
signal in piecewise linear one. The multiple regression permits to detect lines
and project them in the Hough parameters space in order to easily recognise
homogeneous zone and abrupt changes of the signal. Two application examples are
analysed, the first is a classical fractal signal and the other is issued from
a dynamic mechanical study.
| [
{
"version": "v1",
"created": "Wed, 30 Mar 2005 13:53:19 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jan 2006 14:41:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Morlier",
"Joseph",
"",
"LRBB"
]
] |
cs/0503090 | Francesco Sorrentino Ing | David Arrowsmith, Mario di Bernardo, Francesco Sorrentino | Effects of variations of load distribution on network performance | 4 pages, 4 figures, included in conference proceedings ISCAS 2005,
Kobe Japan | null | null | null | cs.NI | null | This paper is concerned with the characterization of the relationship between
topology and traffic dynamics. We use a model of network generation that allows
the transition from random to scale free networks. Specifically, we consider
three different topological types of network: random, scale-free with \gamma =
3, scale-free with \gamma = 2. By using a novel LRD traffic generator, we
observe best performance, in terms of transmission rates and delivered packets,
in the case of random networks. We show that, even if scale-free networks are
characterized by shorter characteristic-path- length (the lower the exponent,
the lower the path-length), they show worst performances in terms of
communication. We conjecture this could be explained in terms of changes in the
load distribution, defined here as the number of shortest paths going through a
given vertex. In fact, that distribu- tion is characterized by (i) a decreasing
mean (ii) an increas- ing standard deviation, as the networks becomes
scale-free (especially scale-free networks with low exponents). The use of a
degree-independent server also discriminates against a scale-free structure. As
a result, since the model is un- controlled, most packets will go through the
same vertices, favoring the onset of congestion.
| [
{
"version": "v1",
"created": "Thu, 31 Mar 2005 09:01:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arrowsmith",
"David",
""
],
[
"di Bernardo",
"Mario",
""
],
[
"Sorrentino",
"Francesco",
""
]
] |
cs/0503091 | Tatsuaki Okamoto | Tatsuaki Okamoto, Ryo Kashima | Resource Bounded Unprovability of Computational Lower Bounds | 78 pages | null | null | null | cs.CC cs.LO | null | This paper introduces new notions of asymptotic proofs,
PT(polynomial-time)-extensions, PTM(polynomial-time Turing
machine)-omega-consistency, etc. on formal theories of arithmetic including PA
(Peano Arithmetic). This paper shows that P not= NP (more generally, any
super-polynomial-time lower bound in PSPACE) is unprovable in a
PTM-omega-consistent theory T, where T is a consistent PT-extension of PA. This
result gives a unified view to the existing two major negative results on
proving P not= NP, Natural Proofs and relativizable proofs, through the two
manners of characterization of PTM-omega-consistency. We also show that the
PTM-omega-consistency of T cannot be proven in any PTM-omega-consistent theory
S, where S is a consistent PT-extension of T.
| [
{
"version": "v1",
"created": "Thu, 31 Mar 2005 10:40:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Okamoto",
"Tatsuaki",
""
],
[
"Kashima",
"Ryo",
""
]
] |
cs/0503092 | Jan Chomicki | Jan Chomicki, Joyce Song | Monotonic and Nonmonotonic Preference Revision | null | null | null | null | cs.DB cs.AI | null | We study here preference revision, considering both the monotonic case where
the original preferences are preserved and the nonmonotonic case where the new
preferences may override the original ones. We use a relational framework in
which preferences are represented using binary relations (not necessarily
finite). We identify several classes of revisions that preserve order axioms,
for example the axioms of strict partial or weak orders. We consider
applications of our results to preference querying in relational databases.
| [
{
"version": "v1",
"created": "Thu, 31 Mar 2005 19:43:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chomicki",
"Jan",
""
],
[
"Song",
"Joyce",
""
]
] |
cs/0504002 | Nael Abu-Ghazaleh | Seon-Yeong Han and Nael Abu-Ghazaleh | On the Effect of Fading on Ad hoc Networking | 12 pages; 14 figures | null | null | null | cs.NI | null | Most MANET (Mobile Ad hoc NETwork) research assumes idealized propagation
models. Experimental results have shown significant divergence from simulation
results due to the effect of signal fading in realistic wireless communication
channels. In this paper, we characterize the impact of fading on protocol
performance. We first study the effect of fading on MAC performance and show
that its effect can be dominating. One of our important conclusions is that
eliminating RTS/CTS packets results in more effective operation under fading.
We also identify an unfairness problem that arises due to backoffs in the
presence of fading. Moreover, fading results in several subtle interactions
between the MAC and routing layers. We identify several of these problems and
make observations about effective approaches for addressing them. For example,
the criteria for determining the best path should not only consider the link
status but also the link order. In addition, because routing protocols rely on
MAC level transmission failure (when the retry limit is exceeded), route
failure errors are often generated unnecessarily. Finally, because MAC level
broadcasts are unreliable, they are especially vulnerable to fading. We analyze
these effects and outline preliminary solutions to them.
| [
{
"version": "v1",
"created": "Fri, 1 Apr 2005 18:16:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Han",
"Seon-Yeong",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
] |
cs/0504004 | Henning Bostelmann | Henning Bostelmann | Statistical analysis of quality measures for mobile ad hoc networks | Master's thesis; 78 pages, 10 figures | null | null | null | cs.NI cs.DM | null | How can the quality of a mobile ad hoc network (MANET) be quantified? This
work aims at an answer based on the lower network layers, i.e. on connectivity
between the wireless nodes, using statistical methods. A number of different
quality measures are introduced and classified according to their scaling
behaviour. They are analysed in a statistical model of a 1-dimensional MANET
system (corresponding e.g. to cars on a road). Neglecting boundary effects, the
model turns out to be exactly solvable, so that explicit analytical results for
the quality levels can be obtained both at fixed system size and in the limit
of large systems. In particular, this improves estimates known in the
literature for the probability of connectedness of 1-dimensional MANETs.
| [
{
"version": "v1",
"created": "Sat, 2 Apr 2005 23:19:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bostelmann",
"Henning",
""
]
] |
cs/0504009 | Sanjeeva kumar Chandrasekaran | N. Srinivasan, C. Sanjeevakumar, L. Sudarsan, M. Kasi Rajan, R.
Venkatesh | Towards a Group Theoretic Quantum Encryption Scheme Based on Generalized
Hidden Subgroup Problem | 8 pages, work of undergraduate students | null | null | null | cs.DM cs.CR | null | This paper introduces a completely new approach to encryption based on group
theoretic quantum framework. Quantum cryptography has essentially focused only
on key distribution and proceeded with classical encryption algorithm with the
generated key. Here, we present a first step towards a quantum encryption
scheme based on the solution for the hidden subgroup problem. The shared secret
key K from QKD evolves as a generator for a subgroup H of a group G, in
combination of the plain text data modeled as group elements. The key K helps
in regeneration of the plain data on the receiver's side based on subgroup
reconstruction. This paper models all quantum computations using group
representations. A non-constructive proof is attempted towards the security of
the encryption scheme. We also address the issues involved in a such a venture
into the realms of Quantum data encryption.
| [
{
"version": "v1",
"created": "Mon, 4 Apr 2005 17:26:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Srinivasan",
"N.",
""
],
[
"Sanjeevakumar",
"C.",
""
],
[
"Sudarsan",
"L.",
""
],
[
"Rajan",
"M. Kasi",
""
],
[
"Venkatesh",
"R.",
""
]
] |
cs/0504012 | Rodrigo Barra Almeida | Luiz H. Gomes, Fernando D. O. Castro, Rodrigo B. Almeida, Luis M. A.
Bettencourt, Virgilio A. F. Almeida, Jussara M. Almeida | Improving Spam Detection Based on Structural Similarity | null | null | null | null | cs.CR | null | We propose a new detection algorithm that uses structural relationships
between senders and recipients of email as the basis for the identification of
spam messages. Users and receivers are represented as vectors in their
reciprocal spaces. A measure of similarity between vectors is constructed and
used to group users into clusters. Knowledge of their classification as past
senders/receivers of spam or legitimate mail, comming from an auxiliary
detection algorithm, is then used to label these clusters probabilistically.
This knowledge comes from an auxiliary algorithm. The measure of similarity
between the sender and receiver sets of a new message to the center vector of
clusters is then used to asses the possibility of that message being legitimate
or spam. We show that the proposed algorithm is able to correct part of the
false positives (legitimate messages classified as spam) using a testbed of one
week smtp log.
| [
{
"version": "v1",
"created": "Tue, 5 Apr 2005 14:30:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gomes",
"Luiz H.",
""
],
[
"Castro",
"Fernando D. O.",
""
],
[
"Almeida",
"Rodrigo B.",
""
],
[
"Bettencourt",
"Luis M. A.",
""
],
[
"Almeida",
"Virgilio A. F.",
""
],
[
"Almeida",
"Jussara M.",
""
]
] |
cs/0504018 | Olivier Brunet | Olivier Brunet (Leibniz - IMAG) | A Rule-Based Logic for Quantum Information | null | null | null | null | cs.LO quant-ph | null | In the present article, we explore a new approach for the study of
orthomodular lattices, where we replace the problematic conjunction by a binary
operator, called the Sasaki projection. We present a characterization of
orthomodular lattices based on the use of an algebraic version of the Sasaki
projection operator (together with orthocomplementation) rather than on the
conjunction. We then define of a new logic, which we call Sasaki Orthologic,
which is closely related to quantum logic, and provide a rule-based definition
of this logic.
| [
{
"version": "v1",
"created": "Wed, 6 Apr 2005 08:11:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brunet",
"Olivier",
"",
"Leibniz - IMAG"
]
] |
cs/0504019 | Guilin Wang | Guilin Wang, Feng Bao, Changshe Ma, and Kefei Chen | Efficient Authenticated Encryption Schemes with Public Verifiability | Early version appears in the Proc. of The 60th IEEE Vehicular
Technology Conference (VTC 2004-Fall) - Wireless Technologies for Global
Security. IEEE, 2004 | null | null | null | cs.CR | null | An authenticated encryption scheme allows messages to be encrypted and
authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with
public verifiability. That is, in their scheme the receiver can efficiently
prove to a third party that a message is indeed originated from a specific
sender. In this paper, we first identify two security weaknesses in the Ma-Chen
authenticated encryption scheme. Then, based on the Schnorr signature, we
proposed an efficient and secure improved scheme such that all the desired
security requirements are satisfied.
| [
{
"version": "v1",
"created": "Wed, 6 Apr 2005 09:03:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Guilin",
""
],
[
"Bao",
"Feng",
""
],
[
"Ma",
"Changshe",
""
],
[
"Chen",
"Kefei",
""
]
] |
cs/0504022 | Lillian Lee | Lillian Lee | A Matter of Opinion: Sentiment Analysis and Business Intelligence
(position paper) | 2 pages | Presented at the IBM Faculty Summit on the Architecture of
On-Demand Business, May 2004 | null | null | cs.CL | null | A general-audience introduction to the area of "sentiment analysis", the
computational treatment of subjective, opinion-oriented language (an example
application is determining whether a review is "thumbs up" or "thumbs down").
Some challenges, applications to business-intelligence tasks, and potential
future directions are described.
| [
{
"version": "v1",
"created": "Wed, 6 Apr 2005 20:04:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Lillian",
""
]
] |
cs/0504023 | Ioannis Giotis | Ioannis Giotis and Venkatesan Guruswami | Correlation Clustering with a Fixed Number of Clusters | 16 pages | null | null | null | cs.DS | null | We continue the investigation of problems concerning correlation clustering
or clustering with qualitative information, which is a clustering formulation
that has been studied recently. The basic setup here is that we are given as
input a complete graph on n nodes (which correspond to nodes to be clustered)
whose edges are labeled + (for similar pairs of items) and - (for dissimilar
pairs of items). Thus we have only as input qualitative information on
similarity and no quantitative distance measure between items. The quality of a
clustering is measured in terms of its number of agreements, which is simply
the number of edges it correctly classifies, that is the sum of number of -
edges whose endpoints it places in different clusters plus the number of +
edges both of whose endpoints it places within the same cluster.
In this paper, we study the problem of finding clusterings that maximize the
number of agreements, and the complementary minimization version where we seek
clusterings that minimize the number of disagreements. We focus on the
situation when the number of clusters is stipulated to be a small constant k.
Our main result is that for every k, there is a polynomial time approximation
scheme for both maximizing agreements and minimizing disagreements. (The
problems are NP-hard for every k >= 2.) The main technical work is for the
minimization version, as the PTAS for maximizing agreements follows along the
lines of the property tester for Max k-CUT.
In contrast, when the number of clusters is not specified, the problem of
minimizing disagreements was shown to be APX-hard, even though the maximization
version admits a PTAS.
| [
{
"version": "v1",
"created": "Wed, 6 Apr 2005 22:36:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giotis",
"Ioannis",
""
],
[
"Guruswami",
"Venkatesan",
""
]
] |
cs/0504024 | Sebastian Brand | Krzysztof R. Apt, Sebastian Brand | Constraint-Based Qualitative Simulation | 10 pages, to appear at the conference TIME 2005 | null | null | null | cs.AI cs.LO | null | We consider qualitative simulation involving a finite set of qualitative
relations in presence of complete knowledge about their interrelationship. We
show how it can be naturally captured by means of constraints expressed in
temporal logic and constraint satisfaction problems. The constraints relate at
each stage the 'past' of a simulation with its 'future'. The benefit of this
approach is that it readily leads to an implementation based on constraint
technology that can be used to generate simulations and to answer queries about
them.
| [
{
"version": "v1",
"created": "Thu, 7 Apr 2005 12:06:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Brand",
"Sebastian",
""
]
] |
cs/0504026 | Yongxi Cheng | Yongxi Cheng, Xiaoming Sun, Yiqun Lisa Yin | Searching Monotone Multi-dimensional Arrays | 13 pages, 2 figures; same results, presentation improved, add two
figures | null | null | null | cs.DS cs.DM | null | In this paper we investigate the problem of searching monotone
multi-dimensional arrays. We generalize Linial and Saks' search algorithm
\cite{LS1} for monotone 3-dimensional arrays to $d$-dimensions with $d\geq 4$.
Our new search algorithm is asymptotically optimal for $d=4$.
| [
{
"version": "v1",
"created": "Thu, 7 Apr 2005 15:58:18 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Aug 2006 07:52:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cheng",
"Yongxi",
""
],
[
"Sun",
"Xiaoming",
""
],
[
"Yin",
"Yiqun Lisa",
""
]
] |
cs/0504029 | Devavrat Shah | Damon Mosk-Aoyama and Devavrat Shah | Fast Distributed Algorithms for Computing Separable Functions | 15 pages | null | null | null | cs.NI cs.DC cs.DS | null | The problem of computing functions of values at the nodes in a network in a
totally distributed manner, where nodes do not have unique identities and make
decisions based only on local information, has applications in sensor,
peer-to-peer, and ad-hoc networks. The task of computing separable functions,
which can be written as linear combinations of functions of individual
variables, is studied in this context. Known iterative algorithms for averaging
can be used to compute the normalized values of such functions, but these
algorithms do not extend in general to the computation of the actual values of
separable functions.
The main contribution of this paper is the design of a distributed randomized
algorithm for computing separable functions. The running time of the algorithm
is shown to depend on the running time of a minimum computation algorithm used
as a subroutine. Using a randomized gossip mechanism for minimum computation as
the subroutine yields a complete totally distributed algorithm for computing
separable functions. For a class of graphs with small spectral gap, such as
grid graphs, the time used by the algorithm to compute averages is of a smaller
order than the time required by a known iterative averaging scheme.
| [
{
"version": "v1",
"created": "Fri, 8 Apr 2005 06:49:29 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Apr 2005 02:53:53 GMT"
},
{
"version": "v3",
"created": "Sat, 4 Feb 2006 21:47:36 GMT"
},
{
"version": "v4",
"created": "Sun, 22 Apr 2007 23:19:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mosk-Aoyama",
"Damon",
""
],
[
"Shah",
"Devavrat",
""
]
] |
cs/0504031 | Gilson Antonio Giraldi | Gilson Antonio Giraldi, Antonio Alberto Fernandes de Oliveira | Convexity Analysis of Snake Models Based on Hamiltonian Formulation | 17 pages, 3 figures, technical report | null | null | null | cs.CV cs.GR | null | This paper presents a convexity analysis for the dynamic snake model based on
the Potential Energy functional and the Hamiltonian formulation of the
classical mechanics. First we see the snake model as a dynamical system whose
singular points are the borders we seek. Next we show that a necessary
condition for a singular point to be an attractor is that the energy functional
is strictly convex in a neighborhood of it, that means, if the singular point
is a local minimum of the potential energy. As a consequence of this analysis,
a local expression relating the dynamic parameters and the rate of convergence
arises. Such results link the convexity analysis of the potential energy and
the dynamic snake model and point forward to the necessity of a physical
quantity whose convexity analysis is related to the dynamic and which
incorporate the velocity space. Such a quantity is exactly the (conservative)
Hamiltonian of the system.
| [
{
"version": "v1",
"created": "Fri, 8 Apr 2005 16:41:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson Antonio",
""
],
[
"de Oliveira",
"Antonio Alberto Fernandes",
""
]
] |
cs/0504033 | Richard McClatchey | Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Atif Mehmood,
Richard McClatchey, Harvey Newman, Waqas ur Rehman, Conrad Steenberg, Michael
Thomas, Frank van Lingen, Ian Willers, Muhammad Adeel Zafar | Resource Management Services for a Grid Analysis Environment | 8 pages, 7 figures. Workshop on Web and Grid Services for Scientific
Data Analysis at the Int Conf on Parallel Processing (ICPP05). Norway June
2005 | null | null | null | cs.DC | null | Selecting optimal resources for submitting jobs on a computational Grid or
accessing data from a data grid is one of the most important tasks of any Grid
middleware. Most modern Grid software today satisfies this responsibility and
gives a best-effort performance to solve this problem. Almost all decisions
regarding scheduling and data access are made by the software automatically,
giving users little or no control over the entire process. To solve this
problem, a more interactive set of services and middleware is desired that
provides users more information about Grid weather, and gives them more control
over the decision making process. This paper presents a set of services that
have been developed to provide more interactive resource management
capabilities within the Grid Analysis Environment (GAE) being developed
collaboratively by Caltech, NUST and several other institutes. These include a
steering service, a job monitoring service and an estimator service that have
been designed and written using a common Grid-enabled Web Services framework
named Clarens. The paper also presents a performance analysis of the developed
services to show that they have indeed resulted in a more interactive and
powerful system for user-centric Grid-enabled physics analysis.
| [
{
"version": "v1",
"created": "Sun, 10 Apr 2005 11:59:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ali",
"Arshad",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Azim",
"Tahir",
""
],
[
"Bunn",
"Julian",
""
],
[
"Mehmood",
"Atif",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Newman",
"Harvey",
""
],
[
"Rehman",
"Waqas ur",
""
],
[
"Steenberg",
"Conrad",
""
],
[
"Thomas",
"Michael",
""
],
[
"van Lingen",
"Frank",
""
],
[
"Willers",
"Ian",
""
],
[
"Zafar",
"Muhammad Adeel",
""
]
] |
cs/0504034 | Richard McClatchey | Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Saima Iqbal, Richard
McClatchey, Harvey Newman, S. Yousaf Shah, Tony Solomonides, Conrad
Steenberg, Michael Thomas, Frank van Lingen, Ian Willers | Heterogeneous Relational Databases for a Grid-enabled Analysis
Environment | 8 pages, 6 figures, 1 table. Workshop on Web and Grid Services for
Scientific Data Analysis at the Int Conf on Parallel Processing (ICPP05).
Norway June 2005 | null | null | null | cs.DC | null | Grid based systems require a database access mechanism that can provide
seamless homogeneous access to the requested data through a virtual data access
system, i.e. a system which can take care of tracking the data that is stored
in geographically distributed heterogeneous databases. This system should
provide an integrated view of the data that is stored in the different
repositories by using a virtual data access mechanism, i.e. a mechanism which
can hide the heterogeneity of the backend databases from the client
applications. This paper focuses on accessing data stored in disparate
relational databases through a web service interface, and exploits the features
of a Data Warehouse and Data Marts. We present a middleware that enables
applications to access data stored in geographically distributed relational
databases without being aware of their physical locations and underlying
schema. A web service interface is provided to enable applications to access
this middleware in a language and platform independent way. A prototype
implementation was created based on Clarens [4], Unity [7] and POOL [8]. This
ability to access the data stored in the distributed relational databases
transparently is likely to be a very powerful one for Grid users, especially
the scientific community wishing to collate and analyze data distributed over
the Grid.
| [
{
"version": "v1",
"created": "Sun, 10 Apr 2005 12:05:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ali",
"Arshad",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Azim",
"Tahir",
""
],
[
"Bunn",
"Julian",
""
],
[
"Iqbal",
"Saima",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Newman",
"Harvey",
""
],
[
"Shah",
"S. Yousaf",
""
],
[
"Solomonides",
"Tony",
""
],
[
"Steenberg",
"Conrad",
""
],
[
"Thomas",
"Michael",
""
],
[
"van Lingen",
"Frank",
""
],
[
"Willers",
"Ian",
""
]
] |
cs/0504035 | Marcus Hutter | Shane Legg and Marcus Hutter | Fitness Uniform Deletion: A Simple Way to Preserve Diversity | 8 two-column pages, 19 figures | Proc. Genetic and Evolutionary Computation Conference (GECCO 2005)
1271-1278 | null | IDSIA-11-04 | cs.NE cs.AI | null | A commonly experienced problem with population based optimisation methods is
the gradual decline in population diversity that tends to occur over time. This
can slow a system's progress or even halt it completely if the population
converges on a local optimum from which it cannot escape. In this paper we
present the Fitness Uniform Deletion Scheme (FUDS), a simple but somewhat
unconventional approach to this problem. Under FUDS the deletion operation is
modified to only delete those individuals which are "common" in the sense that
there exist many other individuals of similar fitness in the population. This
makes it impossible for the population to collapse to a collection of highly
related individuals with similar fitness. Our experimental results on a range
of optimisation problems confirm this, in particular for deceptive optimisation
problems the performance is significantly more robust to variation in the
selection intensity.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 10:42:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Legg",
"Shane",
""
],
[
"Hutter",
"Marcus",
""
]
] |
cs/0504036 | Richard Belew | Richard K. Belew | Scientific impact quantity and quality: Analysis of two sources of
bibliographic data | 12 pages, 1 table, 6 figures | null | null | null | cs.IR cs.DL | null | Attempts to understand the consequence of any individual scientist's activity
within the long-term trajectory of science is one of the most difficult
questions within the philosophy of science. Because scientific publications
play such as central role in the modern enterprise of science, bibliometric
techniques which measure the ``impact'' of an individual publication as a
function of the number of citations it receives from subsequent authors have
provided some of the most useful empirical data on this question. Until
recently, Thompson/ISI has provided the only source of large-scale ``inverted''
bibliographic data of the sort required for impact analysis. In the end of
2004, Google introduced a new service, GoogleScholar, making much of this same
data available. Here we analyze 203 publications, collectively cited by more
than 4000 other publications. We show surprisingly good agreement between data
citation counts provided by the two services. Data quality across the systems
is analyzed, and potentially useful complementarities between are considered.
The additional robustness offered by multiple sources of such data promises to
increase the utility of these measurements as open citation protocols and open
access increase their impact on electronic scientific publication practices.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 13:52:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Belew",
"Richard K.",
""
]
] |
cs/0504037 | K. P.N. Murthy | K. P. N. Murthy, M. Janani and B. Shenbga Priya | Bayesian Restoration of Digital Images Employing Markov Chain Monte
Carlo a Review | 42 pages; 16 figures; revised version with several typos removed and
mistakes in equations corrected | null | null | null | cs.CV cond-mat.stat-mech physics.comp-ph | null | A review of Bayesian restoration of digital images based on Monte Carlo
techniques is presented. The topics covered include Likelihood, Prior and
Posterior distributions, Poisson, Binay symmetric channel, and Gaussian channel
models of Likelihood distribution,Ising and Potts spin models of Prior
distribution, restoration of an image through Posterior maximization,
statistical estimation of a true image from Posterior ensembles, Markov Chain
Monte Carlo methods and cluster algorithms.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 12:41:19 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Oct 2006 14:34:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murthy",
"K. P. N.",
""
],
[
"Janani",
"M.",
""
],
[
"Priya",
"B. Shenbga",
""
]
] |
cs/0504039 | Andrey Grozin | A. G. Grozin | TeXmacs-maxima interface | html file, 32 png screenshots | null | null | null | cs.SC cs.MS hep-ph | null | This tutorial presents features of the new and improved TeXmacs-maxima
interface. It is designed for running maxima-5.9.2 from TeXmacs-1.0.5 (or
later).
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 16:39:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grozin",
"A. G.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.