id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0505079 | Boris Ryabko | Boris Ryabko and Jaakko Astola and Alex Gammerman | Application of Kolmogorov complexity and universal codes to identity
testing and nonparametric testing of serial independence for time series | submitted | null | null | null | cs.CC | null | We show that Kolmogorov complexity and such its estimators as universal codes
(or data compression methods) can be applied for hypotheses testing in a
framework of classical mathematical statistics. The methods for identity
testing and nonparametric testing of serial independence for time series are
suggested.
| [
{
"version": "v1",
"created": "Sun, 29 May 2005 17:12:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ryabko",
"Boris",
""
],
[
"Astola",
"Jaakko",
""
],
[
"Gammerman",
"Alex",
""
]
] |
cs/0505081 | Gilles Kassel | Sabine Bruaux (LaRIA), Gilles Kassel (LaRIA), Gilles Morel (LaRIA) | An ontological approach to the construction of problem-solving models | null | null | null | LRR 2005-03 | cs.AI | null | Our ongoing work aims at defining an ontology-centered approach for building
expertise models for the CommonKADS methodology. This approach (which we have
named "OntoKADS") is founded on a core problem-solving ontology which
distinguishes between two conceptualization levels: at an object level, a set
of concepts enable us to define classes of problem-solving situations, and at a
meta level, a set of meta-concepts represent modeling primitives. In this
article, our presentation of OntoKADS will focus on the core ontology and, in
particular, on roles - the primitive situated at the interface between domain
knowledge and reasoning, and whose ontological status is still much debated. We
first propose a coherent, global, ontological framework which enables us to
account for this primitive. We then show how this novel characterization of the
primitive allows definition of new rules for the construction of expertise
models.
| [
{
"version": "v1",
"created": "Mon, 30 May 2005 13:42:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bruaux",
"Sabine",
"",
"LaRIA"
],
[
"Kassel",
"Gilles",
"",
"LaRIA"
],
[
"Morel",
"Gilles",
"",
"LaRIA"
]
] |
cs/0505083 | Vladimir Vovk | Vladimir Vovk, Akimichi Takemura, Glenn Shafer | Defensive forecasting | 15 pages, 2 figures, to appear in the AIStats'2005 electronic
proceedings | Proceedings of the Tenth International Workshop on Artificial
Intelligence and Statistics, 2005, pages 365--372. | null | null | cs.LG cs.AI | null | We consider how to make probability forecasts of binary labels. Our main
mathematical result is that for any continuous gambling strategy used for
detecting disagreement between the forecasts and the actual labels, there
exists a forecasting strategy whose forecasts are ideal as far as this gambling
strategy is concerned. A forecasting strategy obtained in this way from a
gambling strategy demonstrating a strong law of large numbers is simplified and
studied empirically.
| [
{
"version": "v1",
"created": "Mon, 30 May 2005 21:12:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
],
[
"Takemura",
"Akimichi",
""
],
[
"Shafer",
"Glenn",
""
]
] |
cs/0505084 | Valentin Brimkov | Valentin Brimkov, Angelo Maimone, Giorgio Nordo | An explicit formula for the number of tunnels in digital objects | 9 pages, 4 figures | null | null | null | cs.DM cs.CG cs.CV | null | An important concept in digital geometry for computer imagery is that of
tunnel. In this paper we obtain a formula for the number of tunnels as a
function of the number of the object vertices, pixels, holes, connected
components, and 2x2 grid squares. It can be used to test for tunnel-freedom a
digital object, in particular a digital curve.
| [
{
"version": "v1",
"created": "Tue, 31 May 2005 00:44:16 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Sep 2005 23:28:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brimkov",
"Valentin",
""
],
[
"Maimone",
"Angelo",
""
],
[
"Nordo",
"Giorgio",
""
]
] |
cs/0505087 | Michael Soltys | Michael Soltys | Feasible Proofs of Matrix Properties with Csanky's Algorithm | null | null | null | null | cs.LO | null | We show that Csanky's fast parallel algorithm for computing the
characteristic polynomial of a matrix can be formalized in the logical theory
LAP, and can be proved correct in LAP from the principle of linear
independence. LAP is a natural theory for reasoning about linear algebra
introduced by Cook and Soltys. Further, we show that several principles of
matrix algebra, such as linear independence or the Cayley-Hamilton Theorem, can
be shown equivalent in the logical theory QLA. Applying the separation between
complexity classes AC^0[2] contained in DET(GF(2)), we show that these
principles are in fact not provable in QLA. In a nutshell, we show that linear
independence is ``all there is'' to elementary linear algebra (from a proof
complexity point of view), and furthermore, linear independence cannot be
proved trivially (again, from a proof complexity point of view).
| [
{
"version": "v1",
"created": "Tue, 31 May 2005 11:13:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Soltys",
"Michael",
""
]
] |
cs/0506001 | Dmitry Mogilevsky | Dmitry Mogilevsky, Sean Keller | SafeMPI - Extending MPI for Byzantine Error Detection on Parallel
Clusters | null | null | null | null | cs.DC | null | Modern high-performance computing relies heavily on the use of commodity
processors arranged together in clusters. These clusters consist of individual
nodes (typically off-the-shelf single or dual processor machines) connected
together with a high speed interconnect. Using cluster computation has many
benefits, but also carries the liability of being failure prone due to the
sheer number of components involved. Many effective solutions have been
proposed to aid failure recovery in clusters, their one significant downside
being the failure models they support. Most of the work in the area has focused
on detecting and correcting fail-stop errors. We propose a system that will
also detect more general error models, such as Byzantine errors, thus allowing
existing failure recovery methods to handle them correctly.
| [
{
"version": "v1",
"created": "Tue, 31 May 2005 21:05:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mogilevsky",
"Dmitry",
""
],
[
"Keller",
"Sean",
""
]
] |
cs/0506002 | Angela Bonifati | Angela Bonifati (Icar CNR, Italy), Elaine Qing Chang (UBC, Canada),
Terence Ho (UBC, Canada), and Laks V.S. Lakshmanan (UBC, Canada) | HepToX: Heterogeneous Peer to Peer XML Databases | 11 pages plus cover page | null | null | UBC TR-2005-15 | cs.DB | null | We study a collection of heterogeneous XML databases maintaining similar and
related information, exchanging data via a peer to peer overlay network. In
this setting, a mediated global schema is unrealistic. Yet, users/applications
wish to query the databases via one peer using its schema. We have recently
developed HepToX, a P2P Heterogeneous XML database system. A key idea is that
whenever a peer enters the system, it establishes an acquaintance with a small
number of peer databases, possibly with different schema. The peer
administrator provides correspondences between the local schema and the
acquaintance schema using an informal and intuitive notation of arrows and
boxes. We develop a novel algorithm that infers a set of precise mapping rules
between the schemas from these visual annotations. We pin down a semantics of
query translation given such mapping rules, and present a novel query
translation algorithm for a simple but expressive fragment of XQuery, that
employs the mapping rules in either direction. We show the translation
algorithm is correct. Finally, we demonstrate the utility and scalability of
our ideas and algorithms with a detailed set of experiments on top of the
Emulab, a large scale P2P network emulation testbed.
| [
{
"version": "v1",
"created": "Wed, 1 Jun 2005 01:30:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bonifati",
"Angela",
"",
"Icar CNR, Italy"
],
[
"Chang",
"Elaine Qing",
"",
"UBC, Canada"
],
[
"Ho",
"Terence",
"",
"UBC, Canada"
],
[
"Lakshmanan",
"Laks V. S.",
"",
"UBC, Canada"
]
] |
cs/0506003 | Andrea Pasquinucci | Andrea Pasquinucci | Authentication and routing in simple Quantum Key Distribution networks | 12 pages, latex, 6 eps figures | null | null | null | cs.NI cs.CR quant-ph | null | We consider various issues which arise as soon as one tries to practically
implement simple networks of quantum relays for QKD. In particular we discuss
authentication and routing which are essential ingredients of any QKD network.
This paper aims to address some gaps between quantum and networking aspects of
QKD networks usually reserved to specialist in physics and computer science
respectively.
| [
{
"version": "v1",
"created": "Wed, 1 Jun 2005 10:37:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pasquinucci",
"Andrea",
""
]
] |
cs/0506004 | Vladimir Vovk | Vladimir Vovk | Non-asymptotic calibration and resolution | 20 pages | null | null | null | cs.LG | null | We analyze a new algorithm for probability forecasting of binary observations
on the basis of the available data, without making any assumptions about the
way the observations are generated. The algorithm is shown to be well
calibrated and to have good resolution for long enough sequences of
observations and for a suitable choice of its parameter, a kernel on the
Cartesian product of the forecast space $[0,1]$ and the data space. Our main
results are non-asymptotic: we establish explicit inequalities, shown to be
tight, for the performance of the algorithm.
| [
{
"version": "v1",
"created": "Wed, 1 Jun 2005 14:03:20 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jul 2005 16:15:54 GMT"
},
{
"version": "v3",
"created": "Sun, 21 Aug 2005 19:55:55 GMT"
},
{
"version": "v4",
"created": "Sat, 1 Jul 2006 13:46:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0506005 | Neng-Fa Zhou | Neng-Fa Zhou | Programming Finite-Domain Constraint Propagators in Action Rules | null | TPLP Vol 5(4&5) 2005 | null | null | cs.PL | null | In this paper, we propose a new language, called AR ({\it Action Rules}), and
describe how various propagators for finite-domain constraints can be
implemented in it. An action rule specifies a pattern for agents, an action
that the agents can carry out, and an event pattern for events that can
activate the agents. AR combines the goal-oriented execution model of logic
programming with the event-driven execution model. This hybrid execution model
facilitates programming constraint propagators. A propagator for a constraint
is an agent that maintains the consistency of the constraint and is activated
by the updates of the domain variables in the constraint. AR has a much
stronger descriptive power than {\it indexicals}, the language widely used in
the current finite-domain constraint systems, and is flexible for implementing
not only interval-consistency but also arc-consistency algorithms. As examples,
we present a weak arc-consistency propagator for the {\tt all\_distinct}
constraint and a hybrid algorithm for n-ary linear equality constraints.
B-Prolog has been extended to accommodate action rules. Benchmarking shows that
B-Prolog as a CLP(FD) system significantly outperforms other CLP(FD) systems.
| [
{
"version": "v1",
"created": "Thu, 2 Jun 2005 03:49:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Neng-Fa",
""
]
] |
cs/0506007 | Vladimir Vovk | Vladimir Vovk, Ilia Nouretdinov, Akimichi Takemura, Glenn Shafer | Defensive forecasting for linear protocols | 16 pages | null | null | null | cs.LG | null | We consider a general class of forecasting protocols, called "linear
protocols", and discuss several important special cases, including multi-class
forecasting. Forecasting is formalized as a game between three players:
Reality, whose role is to generate observations; Forecaster, whose goal is to
predict the observations; and Skeptic, who tries to make money on any lack of
agreement between Forecaster's predictions and the actual observations. Our
main mathematical result is that for any continuous strategy for Skeptic in a
linear protocol there exists a strategy for Forecaster that does not allow
Skeptic's capital to grow. This result is a meta-theorem that allows one to
transform any continuous law of probability in a linear protocol into a
forecasting strategy whose predictions are guaranteed to satisfy this law. We
apply this meta-theorem to a weak law of large numbers in Hilbert spaces to
obtain a version of the K29 prediction algorithm for linear protocols and show
that this version also satisfies the attractive properties of proper
calibration and resolution under a suitable choice of its kernel parameter,
with no assumptions about the way the data is generated.
| [
{
"version": "v1",
"created": "Thu, 2 Jun 2005 13:26:43 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Sep 2005 16:55:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
],
[
"Nouretdinov",
"Ilia",
""
],
[
"Takemura",
"Akimichi",
""
],
[
"Shafer",
"Glenn",
""
]
] |
cs/0506008 | Felix Klaedtke | Felix Klaedtke | Bounds on the Automata Size for Presburger Arithmetic | null | null | null | null | cs.LO | null | Automata provide a decision procedure for Presburger arithmetic. However,
until now only crude lower and upper bounds were known on the sizes of the
automata produced by this approach. In this paper, we prove an upper bound on
the the number of states of the minimal deterministic automaton for a
Presburger arithmetic formula. This bound depends on the length of the formula
and the quantifiers occurring in the formula. The upper bound is established by
comparing the automata for Presburger arithmetic formulas with the formulas
produced by a quantifier elimination method. We also show that our bound is
tight, even for nondeterministic automata. Moreover, we provide optimal
automata constructions for linear equations and inequations.
| [
{
"version": "v1",
"created": "Thu, 2 Jun 2005 15:11:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Klaedtke",
"Felix",
""
]
] |
cs/0506010 | Simeon Warner | Simeon Warner (Cornell University) | The OAI Data-Provider Registration and Validation Service | null | null | null | null | cs.DL | null | I present a summary of recent use of the Open Archives Initiative (OAI)
registration and validation services for data-providers. The registration
service has seen a steady stream of registrations since its launch in 2002, and
there are now over 220 registered repositories. I examine the validation logs
to produce a breakdown of reasons why repositories fail validation. This
breakdown highlights some common problems and will be used to guide work to
improve the validation service.
| [
{
"version": "v1",
"created": "Fri, 3 Jun 2005 17:15:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Warner",
"Simeon",
"",
"Cornell University"
]
] |
cs/0506014 | Sebastian Maneth | Joost Engelfriet and Sebastian Maneth | The Equivalence Problem for Deterministic MSO Tree Transducers is
Decidable | null | null | null | null | cs.LO | null | It is decidable for deterministic MSO definable graph-to-string or
graph-to-tree transducers whether they are equivalent on a context-free set of
graphs.
| [
{
"version": "v1",
"created": "Mon, 6 Jun 2005 07:05:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Engelfriet",
"Joost",
""
],
[
"Maneth",
"Sebastian",
""
]
] |
cs/0506015 | Raju Gangishetti | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena | Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems | Submitted to National Workshop on Cryptology 2005, India | null | null | null | cs.CR | null | To remove key escrow problem and avoid the need of secure channel in ID based
cryptosystem Lee et al. proposed a secure key issuing protocol. However we show
that it suffers from impersonation, insider attacks and incompetency of the key
privacy authorities. We also cryptanalyze Sui et al.'s separable and anonymous
key issuing protocol.
| [
{
"version": "v1",
"created": "Mon, 6 Jun 2005 09:48:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gangishetti",
"Raju",
""
],
[
"Gorantla",
"M. Choudary",
""
],
[
"Das",
"Manik Lal",
""
],
[
"Saxena",
"Ashutosh",
""
]
] |
cs/0506019 | Vicky Choi | Vicky Choi, Navin Goyal | An Efficient Approximation Algorithm for Point Pattern Matching Under
Noise | 18 pages | null | null | null | cs.CV cs.CG | null | Point pattern matching problems are of fundamental importance in various
areas including computer vision and structural bioinformatics. In this paper,
we study one of the more general problems, known as LCP (largest common point
set problem): Let $\PP$ and $\QQ$ be two point sets in $\mathbb{R}^3$, and let
$\epsilon \geq 0$ be a tolerance parameter, the problem is to find a rigid
motion $\mu$ that maximizes the cardinality of subset $\II$ of $Q$, such that
the Hausdorff distance $\distance(\PP,\mu(\II)) \leq \epsilon$. We denote the
size of the optimal solution to the above problem by $\LCP(P,Q)$. The problem
is called exact-LCP for $\epsilon=0$, and \tolerant-LCP when $\epsilon>0$ and
the minimum interpoint distance is greater than $2\epsilon$. A
$\beta$-distance-approximation algorithm for tolerant-LCP finds a subset $I
\subseteq \QQ$ such that $|I|\geq \LCP(P,Q)$ and $\distance(\PP,\mu(\II)) \leq
\beta \epsilon$ for some $\beta \ge 1$.
This paper has three main contributions. (1) We introduce a new algorithm,
called {\DA}, which gives the fastest known deterministic
4-distance-approximation algorithm for \tolerant-LCP. (2) For the exact-LCP,
when the matched set is required to be large, we give a simple sampling
strategy that improves the running times of all known deterministic algorithms,
yielding the fastest known deterministic algorithm for this problem. (3) We use
expander graphs to speed-up the \DA algorithm for \tolerant-LCP when the size
of the matched set is required to be large, at the expense of approximation in
the matched set size. Our algorithms also work when the transformation $\mu$ is
allowed to be scaling transformation.
| [
{
"version": "v1",
"created": "Tue, 7 Jun 2005 17:41:53 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jul 2005 21:33:55 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Sep 2005 15:43:28 GMT"
},
{
"version": "v4",
"created": "Sun, 2 Jul 2006 22:19:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Choi",
"Vicky",
""
],
[
"Goyal",
"Navin",
""
]
] |
cs/0506023 | Alexandre d'Aspremont | Onureena Banerjee, Alexandre d'Aspremont, Laurent El Ghaoui | Sparse Covariance Selection via Robust Maximum Likelihood Estimation | Submitted to NIPS 2005 | null | null | null | cs.CE cs.AI | null | We address a problem of covariance selection, where we seek a trade-off
between a high likelihood against the number of non-zero elements in the
inverse covariance matrix. We solve a maximum likelihood problem with a penalty
term given by the sum of absolute values of the elements of the inverse
covariance matrix, and allow for imposing bounds on the condition number of the
solution. The problem is directly amenable to now standard interior-point
algorithms for convex optimization, but remains challenging due to its size. We
first give some results on the theoretical computational complexity of the
problem, by showing that a recent methodology for non-smooth convex
optimization due to Nesterov can be applied to this problem, to greatly improve
on the complexity estimate given by interior-point algorithms. We then examine
two practical algorithms aimed at solving large-scale, noisy (hence dense)
instances: one is based on a block-coordinate descent approach, where columns
and rows are updated sequentially, another applies a dual version of Nesterov's
method.
| [
{
"version": "v1",
"created": "Wed, 8 Jun 2005 21:08:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Banerjee",
"Onureena",
""
],
[
"d'Aspremont",
"Alexandre",
""
],
[
"Ghaoui",
"Laurent El",
""
]
] |
cs/0506024 | Marko Antonio Rodriguez | Marko A. Rodriguez | The Hyper-Cortex of Human Collective-Intelligence Systems | ECCO Working Paper 06-2005 (17-pages) This paper will be shortened to
just the multi-layered digital-library hyper-cortex | null | null | null | cs.CY cs.AI cs.DL cs.NE | null | Individual-intelligence research, from a neurological perspective, discusses
the hierarchical layers of the cortex as a structure that performs conceptual
abstraction and specification. This theory has been used to explain how
motor-cortex regions responsible for different behavioral modalities such as
writing and speaking can be utilized to express the same general concept
represented higher in the cortical hierarchy. For example, the concept of a
dog, represented across a region of high-level cortical-neurons, can either be
written or spoken about depending on the individual's context. The higher-layer
cortical areas project down the hierarchy, sending abstract information to
specific regions of the motor-cortex for contextual implementation. In this
paper, this idea is expanded to incorporate collective-intelligence within a
hyper-cortical construct. This hyper-cortex is a multi-layered network used to
represent abstract collective concepts. These ideas play an important role in
understanding how collective-intelligence systems can be engineered to handle
problem abstraction and solution specification. Finally, a collection of common
problems in the scientific community are solved using an artificial
hyper-cortex generated from digital-library metadata.
| [
{
"version": "v1",
"created": "Wed, 8 Jun 2005 21:33:44 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jun 2005 21:14:29 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Jun 2005 19:24:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
] |
cs/0506026 | Rada Chirkova | Rada Chirkova and Michael R. Genesereth | Database Reformulation with Integrity Constraints (extended abstract) | In the proceedings of the the Logic and Computational Complexity
Workshop, in conjunction with of the Logic in Computer Science Conference
(LICS), Chicago, June 2005 | null | null | null | cs.DB | null | In this paper we study the problem of reducing the evaluation costs of
queries on finite databases in presence of integrity constraints, by designing
and materializing views. Given a database schema, a set of queries defined on
the schema, a set of integrity constraints, and a storage limit, to find a
solution to this problem means to find a set of views that satisfies the
storage limit, provides equivalent rewritings of the queries under the
constraints (this requirement is weaker than equivalence in the absence of
constraints), and reduces the total costs of evaluating the queries. This
problem, database reformulation, is important for many applications, including
data warehousing and query optimization. We give complexity results and
algorithms for database reformulation in presence of constraints, for
conjunctive queries, views, and rewritings and for several types of
constraints, including functional and inclusion dependencies. To obtain better
complexity results, we introduce an unchase technique, which reduces the
problem of query equivalence under constraints to equivalence in the absence of
constraints without increasing query size.
| [
{
"version": "v1",
"created": "Wed, 8 Jun 2005 22:03:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chirkova",
"Rada",
""
],
[
"Genesereth",
"Michael R.",
""
]
] |
cs/0506027 | Travis Gagie | Travis Gagie | Sorting a Low-Entropy Sequence | null | null | null | null | cs.DS | null | We give the first sorting algorithm with bounds in terms of higher-order
entropies: let $S$ be a sequence of length $m$ containing $n$ distinct elements
and let (H_\ell (S)) be the $\ell$th-order empirical entropy of $S$, with
(n^{\ell + 1} \log n \in O (m)); our algorithm sorts $S$ using ((H_\ell (S) + O
(1)) m) comparisons.
| [
{
"version": "v1",
"created": "Wed, 8 Jun 2005 22:15:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gagie",
"Travis",
""
]
] |
cs/0506030 | Jonathan Ben-Naim | Jonathan Ben-Naim (LIF) | Preferential and Preferential-discriminative Consequence relations | team Logic and Complexity, written in 2004-2005 | Journal of Logic and Computation 15 (2005) number 3, pp. 263-294 | 10.1093/logcom/exi013 | null | cs.AI cs.LO | null | The present paper investigates consequence relations that are both
non-monotonic and paraconsistent. More precisely, we put the focus on
preferential consequence relations, i.e. those relations that can be defined by
a binary preference relation on states labelled by valuations. We worked with a
general notion of valuation that covers e.g. the classical valuations as well
as certain kinds of many-valued valuations. In the many-valued cases,
preferential consequence relations are paraconsistant (in addition to be
non-monotonic), i.e. they are capable of drawing reasonable conclusions which
contain contradictions. The first purpose of this paper is to provide in our
general framework syntactic characterizations of several families of
preferential relations. The second and main purpose is to provide, again in our
general framework, characterizations of several families of preferential
discriminative consequence relations. They are defined exactly as the plain
version, but any conclusion such that its negation is also a conclusion is
rejected (these relations bring something new essentially in the many-valued
cases).
| [
{
"version": "v1",
"created": "Thu, 9 Jun 2005 12:53:47 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Feb 2006 12:19:55 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Mar 2006 14:47:04 GMT"
},
{
"version": "v4",
"created": "Mon, 19 Jun 2006 08:17:49 GMT"
},
{
"version": "v5",
"created": "Tue, 3 Apr 2007 14:52:32 GMT"
},
{
"version": "v6",
"created": "Sun, 8 Apr 2007 15:04:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ben-Naim",
"Jonathan",
"",
"LIF"
]
] |
cs/0506031 | Laurent Henocque | Patrick Albert, Laurent Henocque, Mathias Kleiner | A Constrained Object Model for Configuration Based Workflow Composition | This is an extended version of the article published at BPM'05, Third
International Conference on Business Process Management, Nancy France | null | null | null | cs.AI | null | Automatic or assisted workflow composition is a field of intense research for
applications to the world wide web or to business process modeling. Workflow
composition is traditionally addressed in various ways, generally via theorem
proving techniques. Recent research observed that building a composite workflow
bears strong relationships with finite model search, and that some workflow
languages can be defined as constrained object metamodels . This lead to
consider the viability of applying configuration techniques to this problem,
which was proven feasible. Constrained based configuration expects a
constrained object model as input. The purpose of this document is to formally
specify the constrained object model involved in ongoing experiments and
research using the Z specification language.
| [
{
"version": "v1",
"created": "Thu, 9 Jun 2005 14:57:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Albert",
"Patrick",
""
],
[
"Henocque",
"Laurent",
""
],
[
"Kleiner",
"Mathias",
""
]
] |
cs/0506032 | Shankar Ramachandran Mr | R. Shankar | Framework for Hopfield Network based Adaptive routing - A design level
approach for adaptive routing phenomena with Artificial Neural Network | (13 pages, 7 figures, code) | null | null | null | cs.NE | null | Routing, as a basic phenomena, by itself, has got umpteen scopes to analyse,
discuss and arrive at an optimal solution for the technocrats over years.
Routing is analysed based on many factors; few key constraints that decide the
factors are communication medium, time dependency, information source nature.
Parametric routing has become the requirement of the day, with some kind of
adaptation to the underlying network environment. Satellite constellations,
particularly LEO satellite constellations have become a reality in operational
to have a non-breaking voice/data communication around the world.Routing in
these constellations has to be treated in a non conventional way, taking their
network geometry into consideration. One of the efficient methods of
optimization is putting Neural Networks to use. Few Artificial Neural Network
models are very much suitable for the adaptive control mechanism, by their
nature of network arrangement. One such efficient model is Hopfield Network
model.
This paper is an attempt to design a framework for the Hopfield Network based
adaptive routing phenomena in satellite constellations.
| [
{
"version": "v1",
"created": "Fri, 10 Jun 2005 05:30:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shankar",
"R.",
""
]
] |
cs/0506034 | Srikumar Venugopal | Srikumar Venugopal, Rajkumar Buyya and Kotagiri Ramamohanarao | A Taxonomy of Data Grids for Distributed Data Sharing, Management and
Processing | 46 pages, 16 figures, Technical Report | null | null | GRIDS-TR-2005-3 | cs.DC cs.CE | null | Data Grids have been adopted as the platform for scientific communities that
need to share, access, transport, process and manage large data collections
distributed worldwide. They combine high-end computing technologies with
high-performance networking and wide-area storage management techniques. In
this paper, we discuss the key concepts behind Data Grids and compare them with
other data sharing and distribution paradigms such as content delivery
networks, peer-to-peer networks and distributed databases. We then provide
comprehensive taxonomies that cover various aspects of architecture, data
transportation, data replication and resource allocation and scheduling.
Finally, we map the proposed taxonomy to various Data Grid systems not only to
validate the taxonomy but also to identify areas for future exploration.
Through this taxonomy, we aim to categorise existing systems to better
understand their goals and their methodology. This would help evaluate their
applicability for solving similar problems. This taxonomy also provides a "gap
analysis" of this area through which researchers can potentially identify new
issues for investigation. Finally, we hope that the proposed taxonomy and
mapping also helps to provide an easy way for new practitioners to understand
this complex area of research.
| [
{
"version": "v1",
"created": "Fri, 10 Jun 2005 10:59:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venugopal",
"Srikumar",
""
],
[
"Buyya",
"Rajkumar",
""
],
[
"Ramamohanarao",
"Kotagiri",
""
]
] |
cs/0506035 | Michel Dagenais | Jerome Collin (Computer Engineering, Ecole Polytechnique de Montreal),
Michel Dagenais (Computer Engineering, Ecole Polytechnique de Montreal) | Fast Recompilation of Object Oriented Modules | null | null | null | null | cs.PL | null | Once a program file is modified, the recompilation time should be minimized,
without sacrificing execution speed or high level object oriented features. The
recompilation time is often a problem for the large graphical interactive
distributed applications tackled by modern OO languages. A compilation server
and fast code generator were developed and integrated with the SRC Modula-3
compiler and Linux ELF dynamic linker. The resulting compilation and
recompilation speedups are impressive. The impact of different language
features, processor speed, and application size are discussed.
| [
{
"version": "v1",
"created": "Fri, 10 Jun 2005 15:28:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Collin",
"Jerome",
"",
"Computer Engineering, Ecole Polytechnique de Montreal"
],
[
"Dagenais",
"Michel",
"",
"Computer Engineering, Ecole Polytechnique de Montreal"
]
] |
cs/0506038 | Wen Ding | Wen Ding & William Yurcik | A Game Theoretic Economics Framework to understanding Information
Security Oursourcing Market | 16 pages, 2 figures | null | null | null | cs.GT | null | On information security outsourcing market, an important reason that firms do
not want to let outside firms(usually called MSSPs-Managed Security Service
Providers) to take care of their security need is that they worry about service
quality MSSPs provide because they cannot monitor effort of the MSSPs. Since
MSSPs action is unobservable to buyers, MSSPs can lower cost by working less
hard than required in the contract and get higher profit. In the asymmetric
information literature, this possible secret shirking behavior is termed as
moral hazard problem. This paper considers a game theoretic economic framework
to show that under information asymmetry, an optimal contract can be designed
so that MSSPs will stick to their promised effort level. We also show that the
optimal contract should be performance-based, i.e., payment to MSSP should base
on performance of MSSP's security service period by period. For comparison, we
also showed that if the moral hazard problem does not exist, the optimal
contract does not depend on MSSP's performance. A contract that specifies
constant payment to MSSP will be optimal. Besides these, we show that for no
matter under perfect information scenario or imperfect information scenario,
the higher the transaction cost is, the lower payment to MSSPs will be.
| [
{
"version": "v1",
"created": "Fri, 10 Jun 2005 23:58:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ding",
"Wen",
""
],
[
"Yurcik",
"William",
""
]
] |
cs/0506041 | Vladimir Vovk | Vladimir Vovk | Competitive on-line learning with a convex loss function | 26 pages | null | null | null | cs.LG cs.AI | null | We consider the problem of sequential decision making under uncertainty in
which the loss caused by a decision depends on the following binary
observation. In competitive on-line learning, the goal is to design decision
algorithms that are almost as good as the best decision rules in a wide
benchmark class, without making any assumptions about the way the observations
are generated. However, standard algorithms in this area can only deal with
finite-dimensional (often countable) benchmark classes. In this paper we give
similar results for decision rules ranging over an arbitrary reproducing kernel
Hilbert space. For example, it is shown that for a wide class of loss functions
(including the standard square, absolute, and log loss functions) the average
loss of the master algorithm, over the first $N$ observations, does not exceed
the average loss of the best decision rule with a bounded norm plus
$O(N^{-1/2})$. Our proof technique is very different from the standard ones and
is based on recent results about defensive forecasting. Given the probabilities
produced by a defensive forecasting algorithm, which are known to be well
calibrated and to have good resolution in the long run, we use the expected
loss minimization principle to find a suitable decision.
| [
{
"version": "v1",
"created": "Sat, 11 Jun 2005 18:11:22 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jul 2005 16:49:33 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Sep 2005 14:27:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0506046 | Bernard Jacquemin | Bernard Jacquemin (ISC) | Dictionaries merger for text expansion in question answering | 4 pp | Proceedings of COLING 2004 (2004) 1398 | null | null | cs.DL | null | This paper presents an original way to add new data in a reference dictionary
from several other lexical resources, without loosing any consistence. This
operation is carried in order to get lexical information classified by the
sense of the entry. This classification makes it possible to enrich utterances
(in QA: the queries) following the meaning, and to reduce noise. An analysis of
the experienced problems shows the interest of this method, and insists on the
points that have to be tackled.
| [
{
"version": "v1",
"created": "Sun, 12 Jun 2005 16:36:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"ISC"
]
] |
cs/0506047 | Bernard Jacquemin | Bernard Jacquemin (ISC) | Analyse et expansion des textes en question-r\'{e}ponse | 11 pp | Le poids des mots. Actes des 7es journ\'{e}es internationales
d'Analyse statistique des Donn\'{e}es Textuelles (2004) 1219 | null | null | cs.IR | null | This paper presents an original methodology to consider question answering.
We noticed that query expansion is often incorrect because of a bad
understanding of the question. But the automatic good understanding of an
utterance is linked to the context length, and the question are often short.
This methodology proposes to analyse the documents and to construct an
informative structure from the results of the analysis and from a semantic text
expansion. The linguistic analysis identifies words (tokenization and
morphological analysis), links between words (syntactic analysis) and word
sense (semantic disambiguation). The text expansion adds to each word the
synonyms matching its sense and replaces the words in the utterances by
derivatives, modifying the syntactic schema if necessary. In this way, whatever
enrichment may be, the text keeps the same meaning, but each piece of
information matches many realisations. The questioning method consists in
constructing a local informative structure without enrichment, and matches it
with the documentary structure. If a sentence in the informative structure
matches the question structure, this sentence is the answer to the question.
| [
{
"version": "v1",
"created": "Sun, 12 Jun 2005 16:39:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"ISC"
]
] |
cs/0506048 | Bernard Jacquemin | Bernard Jacquemin (ISC), Caroline Brun, Claude Roux | Enriching a Text by Semantic Disambiguation for Information Extraction | 7 pp | LREC 2002 Workshop Proceedings "Using semantics for informaiton
retrival and filtering" (2002) 45-51 | null | null | cs.IR | null | External linguistic resources have been used for a very long time in
information extraction. These methods enrich a document with data that are
semantically equivalent, in order to improve recall. For instance, some of
these methods use synonym dictionaries. These dictionaries enrich a sentence
with words that have a similar meaning. However, these methods present some
serious drawbacks, since words are usually synonyms only in restricted
contexts. The method we propose here consists of using word sense
disambiguation rules (WSD) to restrict the selection of synonyms to only these
that match a specific syntactico-semantic context. We show how WSD rules are
built and how information extraction techniques can benefit from the
application of these rules.
| [
{
"version": "v1",
"created": "Sun, 12 Jun 2005 16:44:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"ISC"
],
[
"Brun",
"Caroline",
""
],
[
"Roux",
"Claude",
""
]
] |
cs/0506050 | Alex Wiesmaier | A. Wiesmaier, V. Karatsiolis, M. Lippert, J. Buchmann | The Workshop - Implementing Well Structured Enterprise Applications | 7 pages (ieee), 1 figure, accepted for SERP'05 | Proceedings of "The 2005 International Conference on Software
Engineering Research and Practice"; June 2005 | null | null | cs.SE | null | We specify an abstraction layer to be used between an enterprise application
and the utilized enterprise framework (like J2EE or .NET). This specification
is called the Workshop. It provides an intuitive metaphor supporting the
programmer in designing easy understandable code. We present an implementation
of this specification. It is based upon the J2EE framework and is called the
JWorkshop. As a proof of concept we implement a special certification authority
called the Key Authority based upon the JWorkshop. The mentioned certification
authority runs very successfully in a variety of different real world projects.
| [
{
"version": "v1",
"created": "Mon, 13 Jun 2005 13:25:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wiesmaier",
"A.",
""
],
[
"Karatsiolis",
"V.",
""
],
[
"Lippert",
"M.",
""
],
[
"Buchmann",
"J.",
""
]
] |
cs/0506051 | Heiko Herrmann | Heiko Herrmann, Gunnar Rueckner | Comparison of two different implementations of a
finite-difference-method for first-order pde in mathematica and matlab | LaTeX, 6 pages, 9 eps-figures, v2: minor additions/corrections | null | null | null | cs.CE cs.DM | null | In this article two implementations of a symmetric finite difference
algorithm for a first-order partial differential equation are discussed. The
considered partial differential equation discribes the time evolution of the
crack length distribution of microcracks in brittle materia.
| [
{
"version": "v1",
"created": "Mon, 13 Jun 2005 15:26:16 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Nov 2005 10:25:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Herrmann",
"Heiko",
""
],
[
"Rueckner",
"Gunnar",
""
]
] |
cs/0506054 | Ramesh Johari | Ramesh Johari (Stanford University), Shie Mannor (McGill University),
John N. Tsitsiklis (MIT) | Efficiency Loss in a Network Resource Allocation Game: The Case of
Elastic Supply | Originally Laboratory for Information and Decision Systems (MIT)
Publication 2605 | null | null | null | cs.GT | null | We consider a resource allocation problem where individual users wish to send
data across a network to maximize their utility, and a cost is incurred at each
link that depends on the total rate sent through the link. It is known that as
long as users do not anticipate the effect of their actions on prices, a simple
proportional pricing mechanism can maximize the sum of users' utilities minus
the cost (called aggregate surplus). Continuing previous efforts to quantify
the effects of selfish behavior in network pricing mechanisms, we consider the
possibility that users anticipate the effect of their actions on link prices.
Under the assumption that the links' marginal cost functions are convex, we
establish existence of a Nash equilibrium. We show that the aggregate surplus
at a Nash equilibrium is no worse than a factor of 4*sqrt{2} - 5 times the
optimal aggregate surplus; thus, the efficiency loss when users are selfish is
no more than approximately 34%.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 02:11:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Johari",
"Ramesh",
"",
"Stanford University"
],
[
"Mannor",
"Shie",
"",
"McGill University"
],
[
"Tsitsiklis",
"John N.",
"",
"MIT"
]
] |
cs/0506055 | Lane A. Hemaspaandra | Edith Hemaspaandra, Lane A. Hemaspaandra, Osamu Watanabe | The Complexity of Kings | null | null | null | URCS-TR-2005-870 | cs.CC cs.DM | null | A king in a directed graph is a node from which each node in the graph can be
reached via paths of length at most two. There is a broad literature on
tournaments (completely oriented digraphs), and it has been known for more than
half a century that all tournaments have at least one king [Lan53]. Recently,
kings have proven useful in theoretical computer science, in particular in the
study of the complexity of the semifeasible sets [HNP98,HT05] and in the study
of the complexity of reachability problems [Tan01,NT02].
In this paper, we study the complexity of recognizing kings. For each
succinctly specified family of tournaments, the king problem is known to belong
to $\Pi_2^p$ [HOZZ]. We prove that this bound is optimal: We construct a
succinctly specified tournament family whose king problem is
$\Pi_2^p$-complete. It follows easily from our proof approach that the problem
of testing kingship in succinctly specified graphs (which need not be
tournaments) is $\Pi_2^p$-complete. We also obtain $\Pi_2^p$-completeness
results for k-kings in succinctly specified j-partite tournaments, $k,j \geq
2$, and we generalize our main construction to show that $\Pi_2^p$-completeness
holds for testing k-kingship in succinctly specified families of tournaments
for all $k \geq 2$.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 02:31:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Watanabe",
"Osamu",
""
]
] |
cs/0506057 | Victor Kromer | Kromer Victor | About one 3-parameter Model of Testing | 9 pages; in Russian; Paper with changed content | null | null | null | cs.LG | null | This article offers a 3-parameter model of testing, with 1) the difference
between the ability level of the examinee and item difficulty; 2) the examinee
discrimination and 3) the item discrimination as model parameters.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 04:00:38 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jul 2005 02:43:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Victor",
"Kromer",
""
]
] |
cs/0506059 | Hubie Chen | Hubie Chen | Existentially Restricted Quantified Constraint Satisfaction | null | null | null | null | cs.CC cs.LO | null | The quantified constraint satisfaction problem (QCSP) is a powerful framework
for modelling computational problems. The general intractability of the QCSP
has motivated the pursuit of restricted cases that avoid its maximal
complexity. In this paper, we introduce and study a new model for investigating
QCSP complexity in which the types of constraints given by the existentially
quantified variables, is restricted. Our primary technical contribution is the
development and application of a general technology for proving positive
results on parameterizations of the model, of inclusion in the complexity class
coNP.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 11:57:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Hubie",
""
]
] |
cs/0506060 | Yong Luo | Yong Luo | Yet another normalisation proof for Martin-Lof's logical
framework--Terms with correct arities are strongly normalising | 19 pages | null | null | null | cs.LO | null | In this paper, we prove the strong normalisation for Martin-L\"{o}f's Logical
Framework, and suggest that {}``correct arity'', a condition weaker than
well-typedness, will also guarantee the strong normalisation.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 12:13:22 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Jun 2005 16:56:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luo",
"Yong",
""
]
] |
cs/0506063 | Slawomir Staworko | Slawomir Staworko and Jan Chomicki | Priority-Based Conflict Resolution in Inconsistent Relational Databases | null | null | null | UB CSE Technical Report 2005-11 | cs.DB | null | We study here the impact of priorities on conflict resolution in inconsistent
relational databases. We extend the framework of repairs and consistent query
answers. We propose a set of postulates that an extended framework should
satisfy and consider two instantiations of the framework: (locally preferred)
l-repairs and (globally preferred) g-repairs. We study the relationships
between them and the impact each notion of repair has on the computational
complexity of repair checking and consistent query answers.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 23:10:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Staworko",
"Slawomir",
""
],
[
"Chomicki",
"Jan",
""
]
] |
cs/0506066 | Yoo Chung | Yoo Chung and Dongman Lee | Impersonation with the Echo Protocol | submitted to ACM Workshop on Wireless Security (2005) | null | null | null | cs.CR cs.NI | null | The Echo protocol tries to do secure location verification using physical
limits imposed by the speeds of light and sound. While the protocol is able to
guarantee that a certain object is within a certain region, it cannot ensure
the authenticity of further messages from the object without using
cryptography. This paper describes an impersonation attack against the protocol
based on this weakness. It also describes a couple of approaches which can be
used to defend against the attack.
| [
{
"version": "v1",
"created": "Wed, 15 Jun 2005 10:57:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chung",
"Yoo",
""
],
[
"Lee",
"Dongman",
""
]
] |
cs/0506067 | Juan Jose Amor | Juan Jose Amor, Gregorio Robles, Jesus Gonzalez-Barahona | Measuring Woody: The Size of Debian 3.0 | null | null | null | null | cs.SE | null | Debian is possibly the largest free software distribution, with well over
4,500 source packages in the latest stable release (Debian 3.0) and more than
8,000 source packages in the release currently in preparation. However, we wish
to know what these numbers mean. In this paper, we use David A. Wheeler's
SLOCCount system to determine the number of physical source lines of code
(SLOC) of Debian 3.0 (aka woody). We show that Debian 3.0 includes more than
105,000,000 physical SLOC (almost twice than Red Hat 9, released about 8 months
later), showing that the Debian development model (based on the work of a large
group of voluntary developers spread around the world) is at least as capable
as other development methods (like the more centralized one, based on the work
of employees, used by Red Hat or Microsoft) to manage distributions of this
size.
It is also shown that if Debian had been developed using traditional
proprietary methods, the COCOMO model estimates that its cost would be close to
$6.1 billion USD to develop Debian 3.0. In addition, we offer both an analysis
of the programming languages used in the distribution (C amounts for about 65%,
C++ for about 12%, Shell for about 8% and LISP is around 4%, with many others
to follow), and the largest packages (The Linux kernel, Mozilla, XFree86, PM3,
etc.)
| [
{
"version": "v1",
"created": "Wed, 15 Jun 2005 21:48:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amor",
"Juan Jose",
""
],
[
"Robles",
"Gregorio",
""
],
[
"Gonzalez-Barahona",
"Jesus",
""
]
] |
cs/0506068 | John Watrous | Chris Marriott and John Watrous | Quantum Arthur-Merlin Games | 22 pages | Computational Complexity, 14(2): 122 - 152, 2005 | null | null | cs.CC quant-ph | null | This paper studies quantum Arthur-Merlin games, which are Arthur-Merlin games
in which Arthur and Merlin can perform quantum computations and Merlin can send
Arthur quantum information. As in the classical case, messages from Arthur to
Merlin are restricted to be strings of uniformly generated random bits. It is
proved that for one-message quantum Arthur-Merlin games, which correspond to
the complexity class QMA, completeness and soundness errors can be reduced
exponentially without increasing the length of Merlin's message. Previous
constructions for reducing error required a polynomial increase in the length
of Merlin's message. Applications of this fact include a proof that logarithmic
length quantum certificates yield no increase in power over BQP and a simple
proof that QMA is contained in PP. Other facts that are proved include the
equivalence of three (or more) message quantum Arthur-Merlin games with
ordinary quantum interactive proof systems and some basic properties concerning
two-message quantum Arthur-Merlin games.
| [
{
"version": "v1",
"created": "Wed, 15 Jun 2005 22:13:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marriott",
"Chris",
""
],
[
"Watrous",
"John",
""
]
] |
cs/0506070 | Yuriy Chashkov | Ph.D. Yuriy A. Chashkov | Data Visualization on Shared Usage Multi-Screen Environment | 4 pages, 1 figure | null | null | null | cs.MM | null | The modern multimedia technologies based on the whole palette of hardware and
software facilities of real-time high-speed information processing, in a
combination with effective facilities of the remote access to information
resources, allow us to visualize diverse types of information. Data
visualization facilities – is the face of the Automated Control System on
whom often judge about their efficiency. They take a special place, providing
visualization of the diverse information necessary for decision-making by a
final control link - the person allocated by certain powers.
| [
{
"version": "v1",
"created": "Thu, 16 Jun 2005 10:15:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chashkov",
"Ph. D. Yuriy A.",
""
]
] |
cs/0506071 | Yuriy Reznykov | Yu. Reznykov | Signal transmission on lossy lines as a dissipative quantum state
propagation | 6 pages, revtex4 | null | null | BTU LTP-05-06 | cs.NI | null | The transmission of electric signals on a coupled line with distributed
RLC-parameters is considered as a propagation of a dissipative quasi particle.
A calculation technique is developed, alternative to the one, accepted for
lumped lines. The relativistic wave equation for the transient response is
deduced following the common Ohm-low-type considerations. The exact expressions
for the Green function, for information transfer velocity and for time delay
are obtained on this base. The fundamental restrictions on the measurement
accuracy of the time delay are pointed out. The obtained results are naturally
generalized for the multilevel networks of the arbitrary dimension.
| [
{
"version": "v1",
"created": "Thu, 16 Jun 2005 11:40:54 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Jun 2005 07:28:35 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Jun 2005 09:31:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Reznykov",
"Yu.",
""
]
] |
cs/0506075 | Lillian Lee | Bo Pang and Lillian Lee | Seeing stars: Exploiting class relationships for sentiment
categorization with respect to rating scales | To appear, Proceedings of ACL 2005 | null | null | null | cs.CL cs.LG | null | We address the rating-inference problem, wherein rather than simply decide
whether a review is "thumbs up" or "thumbs down", as in previous sentiment
analysis work, one must determine an author's evaluation with respect to a
multi-point scale (e.g., one to five "stars"). This task represents an
interesting twist on standard multi-class text categorization because there are
several different degrees of similarity between class labels; for example,
"three stars" is intuitively closer to "four stars" than to "one star". We
first evaluate human performance at the task. Then, we apply a meta-algorithm,
based on a metric labeling formulation of the problem, that alters a given
n-ary classifier's output in an explicit attempt to ensure that similar items
receive similar labels. We show that the meta-algorithm can provide significant
improvements over both multi-class and regression versions of SVMs when we
employ a novel similarity measure appropriate to the problem.
| [
{
"version": "v1",
"created": "Fri, 17 Jun 2005 20:10:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pang",
"Bo",
""
],
[
"Lee",
"Lillian",
""
]
] |
cs/0506076 | Wojciech Mazurczyk | Wojciech Mazurczyk, Zbigniew Kotulski | Alternative security architecture for IP Telephony based on digital
watermarking | 10 pages, 5 figures | Lecture Notes in Computer Science 4166, pp. 170 - 181, Springer,
Heidelberg 2006. ISBN 978-3-540-45762-6 | null | null | cs.CR cs.MM | null | Problems with securing IP Telephony systems, insufficient standardization and
lack of security mechanisms emerged the need for new approaches and solutions.
In this paper a new, alternative security architecture for voice-systems is
presented. It is based on digital watermarking: a new, flexible and powerful
technology that is increasingly gaining more and more attention. Besides known
applications e.g. to solve copyright protection problems, we propose to use
digital watermarking to secure not only transmitted audio but also signaling
protocol that IP Telephony is based on.
| [
{
"version": "v1",
"created": "Sat, 18 Jun 2005 21:41:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
cs/0506078 | David Renato Carreta Dominguez | David Dominguez, Kostadin Koroutchev, Eduardo Serrano & Francisco B.
Rodriguez | Dynamical Neural Network: Information and Topology | 10pg, 5fig | null | null | null | cs.IR cs.NE | null | A neural network works as an associative memory device if it has large
storage capacity and the quality of the retrieval is good enough. The learning
and attractor abilities of the network both can be measured by the mutual
information (MI), between patterns and retrieval states. This paper deals with
a search for an optimal topology, of a Hebb network, in the sense of the
maximal MI. We use small-world topology. The connectivity $\gamma$ ranges from
an extremely diluted to the fully connected network; the randomness $\omega$
ranges from purely local to completely random neighbors. It is found that,
while stability implies an optimal $MI(\gamma,\omega)$ at
$\gamma_{opt}(\omega)\to 0$, for the dynamics, the optimal topology holds at
certain $\gamma_{opt}>0$ whenever $0\leq\omega<0.3$.
| [
{
"version": "v1",
"created": "Mon, 20 Jun 2005 14:54:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dominguez",
"David",
""
],
[
"Koroutchev",
"Kostadin",
""
],
[
"Serrano",
"Eduardo",
""
],
[
"Rodriguez",
"Francisco B.",
""
]
] |
cs/0506079 | Ugo Dal Lago | U. Dal Lago and M. Hofmann | Quantitative Models and Implicit Complexity | 29 pages | null | null | null | cs.LO cs.CC | null | We give new proofs of soundness (all representable functions on base types
lies in certain complexity classes) for Elementary Affine Logic, LFPL (a
language for polytime computation close to realistic functional programming
introduced by one of us), Light Affine Logic and Soft Affine Logic. The proofs
are based on a common semantical framework which is merely instantiated in four
different ways. The framework consists of an innovative modification of
realizability which allows us to use resource-bounded computations as realisers
as opposed to including all Turing computable functions as is usually the case
in realizability constructions. For example, all realisers in the model for
LFPL are polynomially bounded computations whence soundness holds by
construction of the model. The work then lies in being able to interpret all
the required constructs in the model. While being the first entirely semantical
proof of polytime soundness for light logi cs, our proof also provides a
notable simplification of the original already semantical proof of polytime
soundness for LFPL. A new result made possible by the semantic framework is the
addition of polymorphism and a modality to LFPL thus allowing for an internal
definition of inductive datatypes.
| [
{
"version": "v1",
"created": "Mon, 20 Jun 2005 16:00:10 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Jun 2005 13:20:25 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Oct 2005 15:21:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lago",
"U. Dal",
""
],
[
"Hofmann",
"M.",
""
]
] |
cs/0506081 | Gatis Midrijanis | Gatis Midrijanis | Three lines proof of the lower bound for the matrix rigidity | 4 pages | null | null | null | cs.CC | null | The rigidity of a matrix describes the minimal number of entries one has to
change to reduce matrix's rank to r. We give very simple combinatorial proof of
the lower bound for the rigidity of Sylvester (special case of Hadamard) matrix
that matches the best known result by de Wolf(2005) for Hadamard matrices
proved by quantum information theoretical arguments.
| [
{
"version": "v1",
"created": "Mon, 20 Jun 2005 19:54:48 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Jun 2005 20:12:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Midrijanis",
"Gatis",
""
]
] |
cs/0506082 | Lane A. Hemaspaandra | Piotr Faliszewski and Lane A. Hemaspaandra | Open Questions in the Theory of Semifeasible Computation | null | null | null | URCS-TR-2005-872 | cs.CC | null | The study of semifeasible algorithms was initiated by Selman's work a quarter
of century ago [Sel79,Sel81,Sel82]. Informally put, this research stream
studies the power of those sets L for which there is a deterministic (or in
some cases, the function may belong to one of various nondeterministic function
classes) polynomial-time function f such that when at least one of x and y
belongs to L, then f(x,y) \in L \cap \{x,y\}. The intuition here is that it is
saying: ``Regarding membership in L, if you put a gun to my head and forced me
to bet on one of x or y as belonging to L, my money would be on f(x,y).''
In this article, we present a number of open problems from the theory of
semifeasible algorithms. For each we present its background and review what
partial results, if any, are known.
| [
{
"version": "v1",
"created": "Mon, 20 Jun 2005 22:33:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
cs/0506084 | Jason Holt | Jason E. Holt (BYU) | The One Page Model Checker | 12 pages | null | null | null | cs.LO | null | We show how standard IPC mechanisms can be used with the fork() system call
to perform explicit state model checking on all interleavings of a
multithreaded application. We specifically show how to check for deadlock and
race conditions in programs with two threads. Our techniques are easy to apply
to other languages, and require only the most rudimentary parsing of the target
language. Our fundamental system fits in one page of C code.
| [
{
"version": "v1",
"created": "Wed, 22 Jun 2005 20:54:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Holt",
"Jason E.",
"",
"BYU"
]
] |
cs/0506085 | Jason Holt | Jason E. Holt (BYU) | On the Job Training | 8 pages, submitted to NIPS 2005 | null | null | null | cs.LG | null | We propose a new framework for building and evaluating machine learning
algorithms. We argue that many real-world problems require an agent which must
quickly learn to respond to demands, yet can continue to perform and respond to
new training throughout its useful life. We give a framework for how such
agents can be built, describe several metrics for evaluating them, and show
that subtle changes in system construction can significantly affect agent
performance.
| [
{
"version": "v1",
"created": "Wed, 22 Jun 2005 21:21:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Holt",
"Jason E.",
"",
"BYU"
]
] |
cs/0506090 | Tobias Riege | Tobias Riege, J\"org Rothe | An Exact 2.9416^n Algorithm for the Three Domatic Number Problem | 20 pages, 1 figure | null | null | null | cs.CC | null | The three domatic number problem asks whether a given undirected graph can be
partitioned into at least three dominating sets, i.e., sets whose closed
neighborhood equals the vertex set of the graph. Since this problem is
NP-complete, no polynomial-time algorithm is known for it. The naive
deterministic algorithm for this problem runs in time 3^n, up to polynomial
factors. In this paper, we design an exact deterministic algorithm for this
problem running in time 2.9416^n. Thus, our algorithm can handle problem
instances of larger size than the naive algorithm in the same amount of time.
We also present another deterministic and a randomized algorithm for this
problem that both have an even better performance for graphs with small maximum
degree.
| [
{
"version": "v1",
"created": "Fri, 24 Jun 2005 12:58:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Riege",
"Tobias",
""
],
[
"Rothe",
"Jörg",
""
]
] |
cs/0506092 | Simone Alfarano | Thomas Lux | Emergent Statistical Wealth Distributions in Simple Monetary Exchange
Models: A Critical Review | null | null | null | null | cs.MA | null | This paper reviews recent attempts at modelling inequality of wealth as an
emergent phenomenon of interacting-agent processes. We point out that recent
models of wealth condensation which draw their inspiration from molecular
dynamics have, in fact, reinvented a process introduced quite some time ago by
Angle (1986) in the sociological literature. We emphasize some problematic
aspects of simple wealth exchange models and contrast them with a monetary
model based on economic principles of market mediated exchange. The paper also
reports new results on the influence of market power on the wealth distribution
in statistical equilibrium. As it turns out, inequality increases but market
power alone is not sufficient for changing the exponential tails of simple
exchange models into Pareto tails.
| [
{
"version": "v1",
"created": "Fri, 24 Jun 2005 16:46:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lux",
"Thomas",
""
]
] |
cs/0506095 | Yi-Dong Shen | Y. D. Shen, Q. Yang, J. H. You and L. Y. Yuan | Deriving a Stationary Dynamic Bayesian Network from a Logic Program with
Recursive Loops | 29 pages | null | null | null | cs.AI cs.LG cs.LO | null | Recursive loops in a logic program present a challenging problem to the PLP
framework. On the one hand, they loop forever so that the PLP backward-chaining
inferences would never stop. On the other hand, they generate cyclic
influences, which are disallowed in Bayesian networks. Therefore, in existing
PLP approaches logic programs with recursive loops are considered to be
problematic and thus are excluded. In this paper, we propose an approach that
makes use of recursive loops to build a stationary dynamic Bayesian network.
Our work stems from an observation that recursive loops in a logic program
imply a time sequence and thus can be used to model a stationary dynamic
Bayesian network without using explicit time parameters. We introduce a
Bayesian knowledge base with logic clauses of the form $A \leftarrow
A_1,...,A_l, true, Context, Types$, which naturally represents the knowledge
that the $A_i$s have direct influences on $A$ in the context $Context$ under
the type constraints $Types$. We then use the well-founded model of a logic
program to define the direct influence relation and apply SLG-resolution to
compute the space of random variables together with their parental connections.
We introduce a novel notion of influence clauses, based on which a declarative
semantics for a Bayesian knowledge base is established and algorithms for
building a two-slice dynamic Bayesian network from a logic program are
developed.
| [
{
"version": "v1",
"created": "Mon, 27 Jun 2005 04:07:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shen",
"Y. D.",
""
],
[
"Yang",
"Q.",
""
],
[
"You",
"J. H.",
""
],
[
"Yuan",
"L. Y.",
""
]
] |
cs/0506097 | Samuel Thibault | Samuel Thibault (INRIA Futurs) | A Flexible Thread Scheduler for Hierarchical Multiprocessor Machines | null | null | null | null | cs.DC | null | With the current trend of multiprocessor machines towards more and more
hierarchical architectures, exploiting the full computational power requires
careful distribution of execution threads and data so as to limit expensive
remote memory accesses. Existing multi-threaded libraries provide only limited
facilities to let applications express distribution indications, so that
programmers end up with explicitly distributing tasks according to the
underlying architecture, which is difficult and not portable. In this article,
we present: (1) a model for dynamically expressing the structure of the
computation; (2) a scheduler interpreting this model so as to make judicious
hierarchical distribution decisions; (3) an implementation within the Marcel
user-level thread library. We experimented our proposal on a scientific
application running on a ccNUMA Bull NovaScale with 16 Intel Itanium II
processors; results show a 30% gain compared to a classical scheduler, and are
similar to what a handmade scheduler achieves in a non-portable way.
| [
{
"version": "v1",
"created": "Mon, 27 Jun 2005 14:32:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thibault",
"Samuel",
"",
"INRIA Futurs"
]
] |
cs/0506098 | Russell Martin | Petra Berenbrink, Tom Friedetzky, Leslie Ann Goldberg, Paul Goldberg,
Zengjian Hu, Russell Martin | Distributed Selfish Load Balancing | null | null | null | null | cs.GT math.OC | null | Suppose that a set of $m$ tasks are to be shared as equally as possible
amongst a set of $n$ resources. A game-theoretic mechanism to find a suitable
allocation is to associate each task with a ``selfish agent'', and require each
agent to select a resource, with the cost of a resource being the number of
agents to select it. Agents would then be expected to migrate from overloaded
to underloaded resources, until the allocation becomes balanced.
Recent work has studied the question of how this can take place within a
distributed setting in which agents migrate selfishly without any centralized
control. In this paper we discuss a natural protocol for the agents which
combines the following desirable features: It can be implemented in a strongly
distributed setting, uses no central control, and has good convergence
properties. For $m\gg n$, the system becomes approximately balanced (an
$\epsilon$-Nash equilibrium) in expected time $O(\log\log m)$. We show using a
martingale technique that the process converges to a perfectly balanced
allocation in expected time $O(\log\log m+n^4)$. We also give a lower bound of
$\Omega(\max\{\log\log m,n\})$ for the convergence time.
| [
{
"version": "v1",
"created": "Mon, 27 Jun 2005 14:54:23 GMT"
},
{
"version": "v2",
"created": "Mon, 22 May 2006 18:04:06 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Apr 2007 15:20:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berenbrink",
"Petra",
""
],
[
"Friedetzky",
"Tom",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Goldberg",
"Paul",
""
],
[
"Hu",
"Zengjian",
""
],
[
"Martin",
"Russell",
""
]
] |
cs/0506099 | Yuval Shavitt | Yuval Shavitt and Eran Shir | DIMES: Let the Internet Measure Itself | 10 pages, 12 figures | null | null | null | cs.NI | null | Today's Internet maps, which are all collected from a small number of vantage
points, are falling short of being accurate. We suggest here a paradigm shift
for this task. DIMES is a distributed measurement infrastructure for the
Internet that is based on the deployment of thousands of light weight
measurement agents around the globe.
We describe the rationale behind DIMES deployment, discuss its design
trade-offs and algorithmic challenges, and analyze the structure of the
Internet as it seen with DIMES.
| [
{
"version": "v1",
"created": "Tue, 28 Jun 2005 20:29:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shavitt",
"Yuval",
""
],
[
"Shir",
"Eran",
""
]
] |
cs/0506100 | Satu Elisa Schaeffer | Jiri Sima and Satu Elisa Schaeffer | On the NP-Completeness of Some Graph Cluster Measures | 9 pages, no figures | null | null | null | cs.CC | null | Graph clustering is the problem of identifying sparsely connected dense
subgraphs (clusters) in a given graph. Proposed clustering algorithms usually
optimize various fitness functions that measure the quality of a cluster within
the graph. Examples of such cluster measures include the conductance, the local
and relative densities, and single cluster editing. We prove that the decision
problems associated with the optimization tasks of finding the clusters that
are optimal with respect to these fitness measures are NP-complete.
| [
{
"version": "v1",
"created": "Wed, 29 Jun 2005 18:12:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sima",
"Jiri",
""
],
[
"Schaeffer",
"Satu Elisa",
""
]
] |
cs/0506101 | Patrick Haffner | Patrick Haffner, Steven Phillips, Rob Schapire | Efficient Multiclass Implementations of L1-Regularized Maximum Entropy | 13 pages, describes new conditional maxent algorithm, to be submitted | null | null | null | cs.LG cs.CL | null | This paper discusses the application of L1-regularized maximum entropy
modeling or SL1-Max [9] to multiclass categorization problems. A new
modification to the SL1-Max fast sequential learning algorithm is proposed to
handle conditional distributions. Furthermore, unlike most previous studies,
the present research goes beyond a single type of conditional distribution. It
describes and compares a variety of modeling assumptions about the class
distribution (independent or exclusive) and various types of joint or
conditional distributions. It results in a new methodology for combining binary
regularized classifiers to achieve multiclass categorization. In this context,
Maximum Entropy can be considered as a generic and efficient regularized
classification tool that matches or outperforms the state-of-the art
represented by AdaBoost and SVMs.
| [
{
"version": "v1",
"created": "Wed, 29 Jun 2005 20:26:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haffner",
"Patrick",
""
],
[
"Phillips",
"Steven",
""
],
[
"Schapire",
"Rob",
""
]
] |
cs/0506103 | Aneta Zwierko | Aneta Zwierko, Zbigniew Kotulski | Security of mobile agents: a new concept of the integrity protection | 11 pages, 2 figures | null | null | null | cs.CR | null | The recent developments in the mobile technology (mobile phones, middleware)
created a need for new methods of protecting the code transmitted through the
network. The proposed mechanisms not only secure the compiled program, but also
the data, that can be gathered during its "journey". The oldest and the
simplest methods are more concentrated on integrity of the code itself and on
the detection of unauthorized manipulation. Other, more advanced proposals
protect not only the code but also the execution state and the collected data.
The paper is divided into two parts. The first one is mostly devoted to
different methods of securing the code and protecting its integrity; starting
from watermarking and fingerprinting, up to methods designed specially for
mobile agent systems: encrypted function, cryptographic traces, time limited
black-box security, chained-MAC protocol, publicly-verifiable chained digital
signatures The second part presents new concept for providing mobile agents
with integrity protection, based on a zero-knowledge proof system.
| [
{
"version": "v1",
"created": "Wed, 29 Jun 2005 22:01:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zwierko",
"Aneta",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
cs/0506104 | Miroslaw Truszczynski | Z. Lonc, M. Truszczynski | Computing minimal models, stable models and answer sets | 55 pages, 1 figure. To appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.LO cs.DS | null | We propose and study algorithms to compute minimal models, stable models and
answer sets of t-CNF theories, and normal and disjunctive t-programs. We are
especially interested in algorithms with non-trivial worst-case performance
bounds. The bulk of the paper is concerned with the classes of 2- and 3-CNF
theories, and normal and disjunctive 2- and 3-programs, for which we obtain
significantly stronger results than those implied by our general
considerations. We show that one can find all minimal models of 2-CNF theories
and all answer sets of disjunctive 2-programs in time O(m 1.4422..^n). Our main
results concern computing stable models of normal 3-programs, minimal models of
3-CNF theories and answer sets of disjunctive 3-programs. We design algorithms
that run in time O(m 1.6701..^n), in the case of the first problem, and in time
O(mn^2 2.2782..^n), in the case of the latter two. All these bounds improve by
exponential factors the best algorithms known previously. We also obtain
closely related upper bounds on the number of minimal models, stable models and
answer sets a t-CNF theory, a normal t-program or a disjunctive t-program may
have.
To appear in Theory and Practice of Logic Programming (TPLP).
| [
{
"version": "v1",
"created": "Thu, 30 Jun 2005 01:51:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lonc",
"Z.",
""
],
[
"Truszczynski",
"M.",
""
]
] |
cs/0506105 | Ren-Chiun Wang | Ren-Chiun Wang, Chou-Chen Yang, Kun-Ru Mo | A protected password change protocol | null | null | null | null | cs.CR | null | Some protected password change protocols were proposed. However, the previous
protocols were easily vulnerable to several attacks such as denial of service,
password guessing, stolen-verifier and impersonation atacks etc. Recently,
Chang et al. proposed a simple authenticated key agreement and protected
password change protocol for enhancing the security and efficiency. In this
paper, authors shall show that password guessing, denial of service and
known-key attacks can work in their password change protocol. At the same time,
authors shall propose a new password change protocol to withstand all the
threats of security.
| [
{
"version": "v1",
"created": "Thu, 30 Jun 2005 03:20:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Ren-Chiun",
""
],
[
"Yang",
"Chou-Chen",
""
],
[
"Mo",
"Kun-Ru",
""
]
] |
cs/0507010 | Jiayang Wang | Jiayang Wang | A Study for the Feature Core of Dynamic Reduct | 9 pages | null | null | null | cs.AI | null | To the reduct problems of decision system, the paper proposes the notion of
dynamic core according to the dynamic reduct model. It describes various formal
definitions of dynamic core, and discusses some properties about dynamic core.
All of these show that dynamic core possesses the essential characters of the
feature core.
| [
{
"version": "v1",
"created": "Tue, 5 Jul 2005 13:02:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Jiayang",
""
]
] |
cs/0507012 | Adilson Xavier V. | Gilson A. Giraldi, Adilson V. Xavier, Antonio L. Apolinario Jr, Paulo
S. Rodrigues | Lattice Gas Cellular Automata for Computational Fluid Animation | null | null | null | null | cs.GR | null | The past two decades showed a rapid growing of physically-based modeling of
fluids for computer graphics applications. In this area, a common top down
approach is to model the fluid dynamics by Navier-Stokes equations and apply a
numerical techniques such as Finite Differences or Finite Elements for the
simulation. In this paper we focus on fluid modeling through Lattice Gas
Cellular Automata (LGCA) for computer graphics applications. LGCA are discrete
models based on point particles that move on a lattice, according to suitable
and simple rules in order to mimic a fully molecular dynamics. By
Chapman-Enskog expansion, a known multiscale technique in this area, it can be
demonstrated that the Navier-Stokes model can be reproduced by the LGCA
technique. Thus, with LGCA we get a fluid model that does not require solution
of complicated equations. Therefore, we combine the advantage of the low
computational cost of LGCA and its ability to mimic the realistic fluid
dynamics to develop a new animating framework for computer graphics
applications. In this work, we discuss the theoretical elements of our proposal
and show experimental results.
| [
{
"version": "v1",
"created": "Tue, 5 Jul 2005 19:48:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson A.",
""
],
[
"Xavier",
"Adilson V.",
""
],
[
"Apolinario",
"Antonio L.",
"Jr"
],
[
"Rodrigues",
"Paulo S.",
""
]
] |
cs/0507013 | Mirela Damian | Justin Colannino, Mirela Damian, Ferran Hurtado, John Iacono, Henk
Meijer, Suneeta Ramaswami and Godfried Toussaint | An O(n log n)-Time Algorithm for the Restricted Scaffold Assignment | 13 pages, 8 figures | null | null | null | cs.CG cs.DM | null | The assignment problem takes as input two finite point sets S and T and
establishes a correspondence between points in S and points in T, such that
each point in S maps to exactly one point in T, and each point in T maps to at
least one point in S. In this paper we show that this problem has an O(n log
n)-time solution, provided that the points in S and T are restricted to lie on
a line (linear time, if S and T are presorted).
| [
{
"version": "v1",
"created": "Tue, 5 Jul 2005 19:50:11 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Jul 2005 21:26:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Colannino",
"Justin",
""
],
[
"Damian",
"Mirela",
""
],
[
"Hurtado",
"Ferran",
""
],
[
"Iacono",
"John",
""
],
[
"Meijer",
"Henk",
""
],
[
"Ramaswami",
"Suneeta",
""
],
[
"Toussaint",
"Godfried",
""
]
] |
cs/0507014 | Moshe Schwartz | Moshe Schwartz | Isomorphism of graphs-a polynomial test | null | null | null | null | cs.DS | null | An explicit algorithm is presented for testing whether two non-directed
graphs are isomorphic or not. It is shown that for a graph of n vertices, the
number of n independent operations needed for the test is polynomial in n. A
proof that the algorithm actually performs the test is presented.
| [
{
"version": "v1",
"created": "Wed, 6 Jul 2005 11:35:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schwartz",
"Moshe",
""
]
] |
cs/0507017 | Gregory Gutin | G. Gutin, A. Rafiey, A. Yeo | Minimum Cost and List Homomorphisms to Semicomplete Digraphs | 8 pages | null | null | null | cs.DM | null | The following optimization problem was introduced in \cite{gutinDAM}, where
it was motivated by a real-world problem in defence logistics. Suppose we are
given a pair of digraphs $D,H$ and a positive cost $c_i(u)$ for each $u\in
V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$ of $D$ to $H$ is
$\sum_{u\in V(D)}c_{f(u)}(u)$. For a fixed digraph $H$, the minimum cost
homomorphism problem for $H$, MinHOMP($H$), is stated as follows: For an input
digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$, verify
whether there is a homomorphism of $D$ to $H$ and, if it exists, find such a
homomorphism of minimum cost.
We obtain dichotomy classifications of the computational complexity of the
list homomorphism problem and MinHOMP($H$), when $H$ is a semicomplete digraph
(a digraph in which every two vertices have at least one arc between them). Our
dichotomy for the list homomorphism problem coincides with the one obtained by
Bang-Jensen, Hell and MacGillivray in 1988 for the homomorphism problem when
$H$ is a semicomplete digraph: both problems are polynomial solvable if $H$ has
at most one cycle; otherwise, both problems are NP-complete. The dichotomy for
\MiP is different: the problem is polynomial time solvable if $H$ is acyclic or
$H$ is a cycle of length 2 or 3; otherwise, the problem is NP-hard.
| [
{
"version": "v1",
"created": "Wed, 6 Jul 2005 18:45:50 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Aug 2005 13:31:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
] |
cs/0507020 | Arnaud Durand | Arnaud Durand, Etienne Grandjean | First-order queries on structures of bounded degree are computable with
constant delay | 18 pages, 1 figure | null | null | null | cs.LO cs.CC | null | A bounded degree structure is either a relational structure all of whose
relations are of bounded degree or a functional structure involving bijective
functions only. In this paper, we revisit the complexity of the evaluation
problem of not necessarily Boolean first-order queries over structures of
bounded degree. Query evaluation is considered here as a dynamical process. We
prove that any query on bounded degree structures is $\constantdelaylin$, i.e.,
can be computed by an algorithm that has two separate parts: it has a
precomputation step of linear time in the size of the structure and then, it
outputs all tuples one by one with a constant (i.e. depending on the size of
the formula only) delay between each. Seen as a global process, this implies
that queries on bounded structures can be evaluated in total time
$O(f(|\phi|).(|\calS|+|\phi(\calS)|))$ and space $O(f(|\phi|).|\calS|)$ where
$\calS$ is the structure, $\phi$ is the formula, $\phi(\calS)$ is the result of
the query and $f$ is some function.
Among other things, our results generalize a result of \cite{Seese-96} on the
data complexity of the model-checking problem for bounded degree structures.
Besides, the originality of our approach compared to that \cite{Seese-96} and
comparable results is that it does not rely on the Hanf's model-theoretic
technic (see \cite{Hanf-65}) and is completely effective.
| [
{
"version": "v1",
"created": "Thu, 7 Jul 2005 09:40:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durand",
"Arnaud",
""
],
[
"Grandjean",
"Etienne",
""
]
] |
cs/0507021 | Valmir Barbosa | Renato C. Dutra, Valmir C. Barbosa | Finding routes in anonymous sensor networks | null | Information Processing Letters 98 (2006), 139-144 | 10.1016/j.ipl.2006.01.001 | null | cs.NI | null | We consider networks of anonymous sensors and address the problem of
constructing routes for the delivery of information from a group of sensors in
response to a query by a sink. In order to circumvent the restrictions imposed
by anonymity, we rely on using the power level perceived by the sensors in the
query from the sink. We introduce a simple distributed algorithm to achieve the
building of routes to the sink and evaluate its performance by means of
simulations.
| [
{
"version": "v1",
"created": "Thu, 7 Jul 2005 16:28:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dutra",
"Renato C.",
""
],
[
"Barbosa",
"Valmir C.",
""
]
] |
cs/0507023 | Valmir Barbosa | Luis O. Rigo Jr., Valmir C. Barbosa | Two-dimensional cellular automata and the analysis of correlated time
series | null | Pattern Recognition Letters 27 (2006), 1353-1360 | 10.1016/j.patrec.2006.01.005 | null | cs.AI | null | Correlated time series are time series that, by virtue of the underlying
process to which they refer, are expected to influence each other strongly. We
introduce a novel approach to handle such time series, one that models their
interaction as a two-dimensional cellular automaton and therefore allows them
to be treated as a single entity. We apply our approach to the problems of
filling gaps and predicting values in rainfall time series. Computational
results show that the new approach compares favorably to Kalman smoothing and
filtering.
| [
{
"version": "v1",
"created": "Fri, 8 Jul 2005 12:47:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rigo",
"Luis O.",
"Jr."
],
[
"Barbosa",
"Valmir C.",
""
]
] |
cs/0507024 | Anne-Marie Vercoustre | Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves
Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse
(INRIA Rocquencourt / INRIA Sophia Antipolis), Anne-Marie Vercoustre (INRIA
Rocquencourt / INRIA Sophia Antipolis) | Experiments in Clustering Homogeneous XML Documents to Validate an
Existing Typology | (postprint); This version corrects a couple of errors in authors'
names in the bibliography | null | null | null | cs.IR | null | This paper presents some experiments in clustering homogeneous XMLdocuments
to validate an existing classification or more generally anorganisational
structure. Our approach integrates techniques for extracting knowledge from
documents with unsupervised classification (clustering) of documents. We focus
on the feature selection used for representing documents and its impact on the
emerging classification. We mix the selection of structured features with fine
textual selection based on syntactic characteristics.We illustrate and evaluate
this approach with a collection of Inria activity reports for the year 2003.
The objective is to cluster projects into larger groups (Themes), based on the
keywords or different chapters of these activity reports. We then compare the
results of clustering using different feature selections, with the official
theme structure used by Inria.
| [
{
"version": "v1",
"created": "Fri, 8 Jul 2005 13:42:42 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Aug 2005 13:52:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Despeyroux",
"Thierry",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Lechevallier",
"Yves",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Trousse",
"Brigitte",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Vercoustre",
"Anne-Marie",
"",
"INRIA\n Rocquencourt / INRIA Sophia Antipolis"
]
] |
cs/0507027 | Lane A. Hemaspaandra | Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg Rothe | Anyone but Him: The Complexity of Precluding an Alternative | Preliminary version appeared in AAAI '05. Also appears as
URCS-TR-2005-873 | null | null | null | cs.GT cs.CC cs.MA | null | Preference aggregation in a multiagent setting is a central issue in both
human and computer contexts. In this paper, we study in terms of complexity the
vulnerability of preference aggregation to destructive control. That is, we
study the ability of an election's chair to, through such mechanisms as
voter/candidate addition/suppression/partition, ensure that a particular
candidate (equivalently, alternative) does not win. And we study the extent to
which election systems can make it impossible, or computationally costly
(NP-complete), for the chair to execute such control. Among the systems we
study--plurality, Condorcet, and approval voting--we find cases where systems
immune or computationally resistant to a chair choosing the winner nonetheless
are vulnerable to the chair blocking a victory. Beyond that, we see that among
our studied systems no one system offers the best protection against
destructive control. Rather, the choice of a preference aggregation system will
depend closely on which types of control one wishes to be protected against. We
also find concrete cases where the complexity of or susceptibility to control
varies dramatically based on the choice among natural tie-handling rules.
| [
{
"version": "v1",
"created": "Sat, 9 Jul 2005 18:20:00 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Jul 2005 23:01:02 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Jul 2005 15:20:07 GMT"
},
{
"version": "v4",
"created": "Thu, 16 Mar 2006 16:51:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/0507028 | Robert Milson | Robert Milson, Aaron Krowne | Adapting CBPP platforms for instructional use | Will be presented at the 2005, Emory university symposium on Free
Culture and the Digital Library | null | null | null | cs.DL cs.HC | null | Commons based peer-production (CBPP) is the de-centralized, net-based
approach to the creation and dissemination of information resources. Underlying
every CBPP system is a virtual community brought together by an internet tool
(such as a web site) and structured by a specific collaboration protocol. In
this talk we will argue that the value of such platforms can be leveraged by
adapting them for pedagogical purposes.
We report on one such recent adaptation. The Noosphere system is a web-based
collaboration environment that underlies the popular Planetmath website, a
collaboratively written encyclopedia of mathematics licensed under the GNU Free
Documentation License (FDL). Recently, the system was used to host a
graduate-level mathematics course at Dalhousie University, in Halifax, Canada.
The course consisted of regular lectures and assignment problems. The students
in the course collaborated on a set of course notes, encapsulating the lecture
content and giving solutions of assigned problems. The successful outcome of
this experiment demonstrated that a dedicated Noosphere system is well suited
for classroom applications. We argue that this ``proof of concept'' experience
also strongly suggests that every successful CBPP platform possesses latent
pedagogical value.
| [
{
"version": "v1",
"created": "Sun, 10 Jul 2005 19:05:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Milson",
"Robert",
""
],
[
"Krowne",
"Aaron",
""
]
] |
cs/0507030 | G\"unter Rote | Imre Barany and Guenter Rote | Strictly convex drawings of planar graphs | 20 pages, 13 figures. to be published in Documenta Mathematica. The
revision includes numerous small additions, corrections, and improvements, in
particular: - a discussion of the constants in the O-notation, after the
statement of thm.1. - a different set-up and clarification of the case
distinction for Lemma 1 | DOCUMENTA MATHEMATICA, Vol. 11 (2006), 369-391 | null | null | cs.CG cs.DM | null | Every three-connected planar graph with n vertices has a drawing on an O(n^2)
x O(n^2) grid in which all faces are strictly convex polygons. These drawings
are obtained by perturbing (not strictly) convex drawings on O(n) x O(n) grids.
More generally, a strictly convex drawing exists on a grid of size O(W) x
O(n^4/W), for any choice of a parameter W in the range n<W<n^2. Tighter bounds
are obtained when the faces have fewer sides.
In the proof, we derive an explicit lower bound on the number of primitive
vectors in a triangle.
| [
{
"version": "v1",
"created": "Mon, 11 Jul 2005 20:06:06 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jun 2006 10:01:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barany",
"Imre",
""
],
[
"Rote",
"Guenter",
""
]
] |
cs/0507033 | Marco Cuturi | Marco Cuturi, Kenji Fukumizu | Multiresolution Kernels | 8 pages | null | null | null | cs.LG | null | We present in this work a new methodology to design kernels on data which is
structured with smaller components, such as text, images or sequences. This
methodology is a template procedure which can be applied on most kernels on
measures and takes advantage of a more detailed "bag of components"
representation of the objects. To obtain such a detailed description, we
consider possible decompositions of the original bag into a collection of
nested bags, following a prior knowledge on the objects' structure. We then
consider these smaller bags to compare two objects both in a detailed
perspective, stressing local matches between the smaller bags, and in a global
or coarse perspective, by considering the entire bag. This multiresolution
approach is likely to be best suited for tasks where the coarse approach is not
precise enough, and where a more subtle mixture of both local and global
similarities is necessary to compare objects. The approach presented here would
not be computationally tractable without a factorization trick that we
introduce before presenting promising results on an image retrieval task.
| [
{
"version": "v1",
"created": "Wed, 13 Jul 2005 05:45:28 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Nov 2005 08:18:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cuturi",
"Marco",
""
],
[
"Fukumizu",
"Kenji",
""
]
] |
cs/0507034 | Ittai Abraham | Ittai Abraham and Dahlia Malkhi and Gurmeet Singh Manku | Papillon: Greedy Routing in Rings | null | null | null | null | cs.DC cs.NI | null | We study {\sc greedy} routing over $n$ nodes placed in a ring, with the
\emph{distance} between two nodes defined to be the clockwise or the absolute
distance between them along the ring. Such graphs arise in the context of
modeling social networks and in routing networks for peer-to-peer systems. We
construct the first network over $n$ nodes in which {\sc greedy} routing takes
$O(\log n / \log d)$ hops in the worst-case, with $d$ out-going links per node.
Our result has the first asymptotically optimal greedy routing complexity.
Previous constructions required $O(\frac{\log^2 n}{d})$ hops.
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2005 00:34:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abraham",
"Ittai",
""
],
[
"Malkhi",
"Dahlia",
""
],
[
"Manku",
"Gurmeet Singh",
""
]
] |
cs/0507035 | Yi-Dong Shen | Yi-Dong Shen, Jia-Huai You and Li-Yan Yuan | Enhancing Global SLS-Resolution with Loop Cutting and Tabling Mechanisms | null | Theoretical Computer Science 328(3):271-287, 2004 | null | null | cs.LO cs.AI | null | Global SLS-resolution is a well-known procedural semantics for top-down
computation of queries under the well-founded model. It inherits from
SLDNF-resolution the {\em linearity} property of derivations, which makes it
easy and efficient to implement using a simple stack-based memory structure.
However, like SLDNF-resolution it suffers from the problem of infinite loops
and redundant computations. To resolve this problem, in this paper we develop a
new procedural semantics, called {\em SLTNF-resolution}, by enhancing Global
SLS-resolution with loop cutting and tabling mechanisms. SLTNF-resolution is
sound and complete w.r.t. the well-founded semantics for logic programs with
the bounded-term-size property, and is superior to existing linear tabling
procedural semantics such as SLT-resolution.
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2005 08:24:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shen",
"Yi-Dong",
""
],
[
"You",
"Jia-Huai",
""
],
[
"Yuan",
"Li-Yan",
""
]
] |
cs/0507036 | Martin Sulzmann | Peter J Stuckey, Martin Sulzmann, Jeremy Wazny | Improved Inference for Checking Annotations | null | null | null | null | cs.PL cs.LO | null | We consider type inference in the Hindley/Milner system extended with type
annotations and constraints with a particular focus on Haskell-style type
classes. We observe that standard inference algorithms are incomplete in the
presence of nested type annotations. To improve the situation we introduce a
novel inference scheme for checking type annotations. Our inference scheme is
also incomplete in general but improves over existing implementations as found
e.g. in the Glasgow Haskell Compiler (GHC). For certain cases (e.g. Haskell 98)
our inference scheme is complete. Our approach has been fully implemented as
part of the Chameleon system (experimental version of Haskell).
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2005 08:47:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stuckey",
"Peter J",
""
],
[
"Sulzmann",
"Martin",
""
],
[
"Wazny",
"Jeremy",
""
]
] |
cs/0507037 | Martin Sulzmann | Peter J. Stuckey, Martin Sulzmann | Type Inference for Guarded Recursive Data Types | null | null | null | null | cs.PL cs.LO | null | We consider type inference for guarded recursive data types (GRDTs) -- a
recent generalization of algebraic data types. We reduce type inference for
GRDTs to unification under a mixed prefix. Thus, we obtain efficient type
inference. Inference is incomplete because the set of type constraints allowed
to appear in the type system is only a subset of those type constraints
generated by type inference. Hence, inference only succeeds if the program is
sufficiently type annotated. We present refined procedures to infer types
incrementally and to assist the user in identifying which pieces of type
information are missing. Additionally, we introduce procedures to test if a
type is not principal and to find a principal type if one exists.
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2005 08:58:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stuckey",
"Peter J.",
""
],
[
"Sulzmann",
"Martin",
""
]
] |
cs/0507038 | Zvi Lotker | Khaled Elbassioni, Zvi Lotker, Raimund Seidel | Upper Bound on the Number of Vertices of Polyhedra with $0,1$-Constraint
Matrices | 3 pages | null | null | null | cs.CG | null | In this note we show that the maximum number of vertices in any polyhedron
$P=\{x\in \mathbb{R}^d : Ax\leq b\}$ with $0,1$-constraint matrix $A$ and a
real vector $b$ is at most $d!$.
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2005 18:45:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Elbassioni",
"Khaled",
""
],
[
"Lotker",
"Zvi",
""
],
[
"Seidel",
"Raimund",
""
]
] |
cs/0507042 | Richard McClatchey | Florida Estrella, Richard McClatchey, Dmitry Rogulin | The MammoGrid Virtual Organisation - Federating Distributed Mammograms | ^ pages, 3 figures, 2 tables | null | null | Medical Informatics Europe MIE2005 paper publication | cs.DC cs.DB | null | The MammoGrid project aims to deliver a prototype which enables the effective
collaboration between radiologists using grid, service-orientation and database
solutions. The grid technologies and service-based database management solution
provide the platform for integrating diverse and distributed resources,
creating what is called a virtual organisation. The MammoGrid Virtual
Organisation facilitates the sharing and coordinated access to mammography
data, medical imaging software and computing resources of participating
hospitals. Hospitals manage their local database of mammograms, but in
addition, radiologists who are part of this organisation can share mammograms,
reports, results and image analysis software. The MammoGrid Virtual
Organisation is a federation of autonomous multi-centres sites which transcends
national boundaries. This paper outlines the service-based approach in the
creation and management of the federated distributed mammography database and
discusses the role of virtual organisations in distributed image analysis.
| [
{
"version": "v1",
"created": "Mon, 18 Jul 2005 12:17:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Estrella",
"Florida",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Rogulin",
"Dmitry",
""
]
] |
cs/0507043 | Yuan Feng | Yuan Feng, Runyao Duan, Zhengfeng Ji, and Mingsheng Ying | Proof rules for purely quantum programs | Now 12 pages, introduction and Section 3 rewritten, some errors
corrected | null | null | null | cs.PL quant-ph | null | We apply the notion of quantum predicate proposed by D'Hondt and Panangaden
to analyze a purely quantum language fragment which describes the quantum part
of a future quantum computer in Knill's architecture. The denotational
semantics, weakest precondition semantics, and weakest liberal precondition
semantics of this language fragment are introduced. To help reasoning about
quantum programs involving quantum loops, we extend proof rules for classical
probabilistic programs to our purely quantum programs.
| [
{
"version": "v1",
"created": "Mon, 18 Jul 2005 13:06:13 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Aug 2005 16:08:40 GMT"
},
{
"version": "v3",
"created": "Thu, 16 Mar 2006 08:24:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Feng",
"Yuan",
""
],
[
"Duan",
"Runyao",
""
],
[
"Ji",
"Zhengfeng",
""
],
[
"Ying",
"Mingsheng",
""
]
] |
cs/0507044 | Marcus Hutter | Jan Poland and Marcus Hutter | Defensive Universal Learning with Experts | 15 LaTeX pages | Proc. 16th International Conf. on Algorithmic Learning Theory (ALT
2005) 356-370 | null | IDSIA-15-05 | cs.LG | null | This paper shows how universal learning can be achieved with expert advice.
To this aim, we specify an experts algorithm with the following
characteristics: (a) it uses only feedback from the actions actually chosen
(bandit setup), (b) it can be applied with countably infinite expert classes,
and (c) it copes with losses that may grow in time appropriately slowly. We
prove loss bounds against an adaptive adversary. From this, we obtain a master
algorithm for "reactive" experts problems, which means that the master's
actions may influence the behavior of the adversary. Our algorithm can
significantly outperform standard experts algorithms on such problems. Finally,
we combine it with a universal expert class. The resulting universal learner
performs -- in a certain sense -- almost as well as any computable strategy,
for any online decision problem. We also specify the (worst-case) convergence
speed, which is very slow.
| [
{
"version": "v1",
"created": "Mon, 18 Jul 2005 14:33:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Poland",
"Jan",
""
],
[
"Hutter",
"Marcus",
""
]
] |
cs/0507046 | Dmitri Krioukov | Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley | Revisiting Internet AS-level Topology Discovery | null | PAM 2005; LNCS 3431, p. 177, 2005 | 10.1007/b135479 | null | cs.NI | null | The development of veracious models of the Internet topology has received a
lot of attention in the last few years. Many proposed models are based on
topologies derived from RouteViews BGP table dumps (BTDs). However, BTDs do not
capture all AS-links of the Internet topology and most importantly the number
of the hidden AS-links is unknown, resulting in AS-graphs of questionable
quality. As a first step to address this problem, we introduce a new
AS-topology discovery methodology that results in more complete and accurate
graphs. Moreover, we use data available from existing measurement facilities,
circumventing the burden of additional measurement infrastructure. We deploy
our methodology and construct an AS-topology that has at least 61.5% more
AS-links than BTD-derived AS-topologies we examined. Finally, we analyze the
temporal and topological properties of the augmented graph and pinpoint the
differences from BTD-derived AS-topologies.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2005 07:15:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Riley",
"George",
""
]
] |
cs/0507047 | Dmitri Krioukov | Xenofontas Dimitropoulos, Dmitri Krioukov, Bradley Huffaker, kc
claffy, George Riley | Inferring AS Relationships: Dead End or Lively Beginning? | null | WEA 2005; LNCS 3503, p. 113, 2005 | 10.1007/11427186_12 | null | cs.NI cs.DS | null | Recent techniques for inferring business relationships between ASs have
yielded maps that have extremely few invalid BGP paths in the terminology of
Gao. However, some relationships inferred by these newer algorithms are
incorrect, leading to the deduction of unrealistic AS hierarchies. We
investigate this problem and discover what causes it. Having obtained such
insight, we generalize the problem of AS relationship inference as a
multiobjective optimization problem with node-degree-based corrections to the
original objective function of minimizing the number of invalid paths. We solve
the generalized version of the problem using the semidefinite programming
relaxation of the MAX2SAT problem. Keeping the number of invalid paths small,
we obtain a more veracious solution than that yielded by recent heuristics.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2005 09:32:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Huffaker",
"Bradley",
""
],
[
"claffy",
"kc",
""
],
[
"Riley",
"George",
""
]
] |
cs/0507049 | David Eppstein | David Eppstein, Michael T. Goodrich, Jonathan Z. Sun | The Skip Quadtree: A Simple Dynamic Data Structure for Multidimensional
Data | 12 pages, 3 figures. A preliminary version of this paper appeared in
the 21st ACM Symp. Comp. Geom., Pisa, 2005, pp. 296-305 | null | null | null | cs.CG | null | We present a new multi-dimensional data structure, which we call the skip
quadtree (for point data in R^2) or the skip octree (for point data in R^d,
with constant d>2). Our data structure combines the best features of two
well-known data structures, in that it has the well-defined "box"-shaped
regions of region quadtrees and the logarithmic-height search and update
hierarchical structure of skip lists. Indeed, the bottom level of our structure
is exactly a region quadtree (or octree for higher dimensional data). We
describe efficient algorithms for inserting and deleting points in a skip
quadtree, as well as fast methods for performing point location and approximate
range queries.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2005 20:17:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Sun",
"Jonathan Z.",
""
]
] |
cs/0507050 | David Eppstein | Lars Arge, David Eppstein, Michael T. Goodrich | Skip-Webs: Efficient Distributed Data Structures for Multi-Dimensional
Data Sets | 8 pages, 4 figures. Appearing at 24th ACM SIGACT-SIGOPS Symp.
Principles of Distributed Computing (PODC 2005), Las Vegas | null | null | null | cs.DC cs.CG cs.DS | null | We present a framework for designing efficient distributed data structures
for multi-dimensional data. Our structures, which we call skip-webs, extend and
improve previous randomized distributed data structures, including skipnets and
skip graphs. Our framework applies to a general class of data querying
scenarios, which include linear (one-dimensional) data, such as sorted sets, as
well as multi-dimensional data, such as d-dimensional octrees and digital tries
of character strings defined over a fixed alphabet. We show how to perform a
query over such a set of n items spread among n hosts using O(log n / log log
n) messages for one-dimensional data, or O(log n) messages for
fixed-dimensional data, while using only O(log n) space per host. We also show
how to make such structures dynamic so as to allow for insertions and deletions
in O(log n) messages for quadtrees, octrees, and digital tries, and O(log n /
log log n) messages for one-dimensional data. Finally, we show how to apply a
blocking strategy to skip-webs to further improve message complexity for
one-dimensional data when hosts can store more data.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2005 20:30:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arge",
"Lars",
""
],
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
]
] |
cs/0507053 | David Eppstein | David Eppstein | Nonrepetitive Paths and Cycles in Graphs with Application to Sudoku | 17 pages, 11 figures | null | null | null | cs.DS cs.AI | null | We provide a simple linear time transformation from a directed or undirected
graph with labeled edges to an unlabeled digraph, such that paths in the input
graph in which no two consecutive edges have the same label correspond to paths
in the transformed graph and vice versa. Using this transformation, we provide
efficient algorithms for finding paths and cycles with no two consecutive equal
labels. We also consider related problems where the paths and cycles are
required to be simple; we find efficient algorithms for the undirected case of
these problems but show the directed case to be NP-complete. We apply our path
and cycle finding algorithms in a program for generating and solving Sudoku
puzzles, and show experimentally that they lead to effective puzzle-solving
rules that may also be of interest to human Sudoku puzzle solvers.
| [
{
"version": "v1",
"created": "Wed, 20 Jul 2005 15:58:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
] |
cs/0507054 | Andrey Siver S. | A. S. Siver | f2mma: FORTRAN to Mathematica translator | null | null | null | null | cs.OH | null | f2mma program can be used to translate programs written in some subset of the
FORTRAN language into {\sl Mathematica} system's programming language. This
subset have been enough to translate GAPP (Global Analysis of Particle
Properties) programm into {\sl Mathematica} language automatically. Observables
table calculated with GAPP({\sl Mathematica}) is presented.
| [
{
"version": "v1",
"created": "Thu, 21 Jul 2005 13:32:15 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Aug 2005 06:48:26 GMT"
},
{
"version": "v3",
"created": "Fri, 5 Aug 2005 09:26:15 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Jan 2006 14:27:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siver",
"A. S.",
""
]
] |
cs/0507055 | Andrey Siver S. | A. S. Siver | ReacProc: A Tool to Process Reactions Describing Particle Interactions | 5 pages | null | null | null | cs.CE | null | ReacProc is a program written in C/C++ programming language which can be used
(1) to check out of reactions describing particles interactions against
conservation laws and (2) to reduce input reaction into some canonical form. A
table with particles properties is available within ReacProc package.
| [
{
"version": "v1",
"created": "Thu, 21 Jul 2005 14:17:47 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Aug 2005 07:14:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siver",
"A. S.",
""
]
] |
cs/0507056 | Christopher Lee | Candace L. Sidner, Christopher Lee, Cory Kidd, Neal Lesh, Charles Rich | Explorations in engagement for humans and robots | 31 pages, 5 figures, 3 tables | Artificial Intelligence, volume 166, issues 1-2, August 2005, pp.
140-164 | null | MERL TR2005-017 | cs.AI cs.CL cs.RO | null | This paper explores the concept of engagement, the process by which
individuals in an interaction start, maintain and end their perceived
connection to one another. The paper reports on one aspect of engagement among
human interactors--the effect of tracking faces during an interaction. It also
describes the architecture of a robot that can participate in conversational,
collaborative interactions with engagement gestures. Finally, the paper reports
on findings of experiments with human participants who interacted with a robot
when it either performed or did not perform engagement gestures. Results of the
human-robot studies indicate that people become engaged with robots: they
direct their attention to the robot more often in interactions where engagement
gestures are present, and they find interactions more appropriate when
engagement gestures are present than when they are not.
| [
{
"version": "v1",
"created": "Thu, 21 Jul 2005 21:56:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sidner",
"Candace L.",
""
],
[
"Lee",
"Christopher",
""
],
[
"Kidd",
"Cory",
""
],
[
"Lesh",
"Neal",
""
],
[
"Rich",
"Charles",
""
]
] |
cs/0507057 | Tereza Tu\v{s}arov\'a | Tereza Tusarova | A new sibling of BQP | extended abstract, submitted to UC'05 | null | null | null | cs.CC | null | We present a new quantum complexity class, called MQ^2, which is contained in
AWPP. This class has a compact and simple mathematical definition, involving
only polynomial-time computable functions and a unitarity condition. It
contains both Deutsch-Jozsa's and Shor's algorithm, while its relation to BQP
is unknown. This shows that in the complexity class hierarchy, BQP is not an
extraordinary isolated island, but has ''siblings'' which as well can solve
prime-factorization.
| [
{
"version": "v1",
"created": "Thu, 21 Jul 2005 22:36:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tusarova",
"Tereza",
""
]
] |
cs/0507058 | Emanuel Diamant | Emanuel Diamant | Paving the Way for Image Understanding: A New Kind of Image
Decomposition is Desired | 14th Scandinavian Conference on Image Analysis (SCIA 2005) | LNCS vol. 3540, pp. 17-24, Springer Verlag, 2005 | null | null | cs.CV | null | In this paper we present an unconventional image segmentation approach which
is devised to meet the requirements of image understanding and pattern
recognition tasks. Generally image understanding assumes interplay of two
sub-processes: image information content discovery and image information
content interpretation. Despite of its widespread use, the notion of "image
information content" is still ill defined, intuitive, and ambiguous. Most
often, it is used in the Shannon's sense, which means information content
assessment averaged over the whole signal ensemble. Humans, however,rarely
resort to such estimates. They are very effective in decomposing images into
their meaningful constituents and focusing attention to the perceptually
relevant image parts. We posit that following the latest findings in human
attention vision studies and the concepts of Kolmogorov's complexity theory an
unorthodox segmentation approach can be proposed that provides effective image
decomposition to information preserving image fragments well suited for
subsequent image interpretation. We provide some illustrative examples,
demonstrating effectiveness of this approach.
| [
{
"version": "v1",
"created": "Fri, 22 Jul 2005 12:18:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diamant",
"Emanuel",
""
]
] |
cs/0507059 | M. Magdalena Ortiz de la Fuente | M. Magdalena Ortiz de la Fuente, Diego Calvanese, Thomas Eiter and
Enrico Franconi | Data complexity of answering conjunctive queries over SHIQ knowledge
bases | Technical Report, 22 pages | null | null | null | cs.LO cs.AI cs.CC | null | An algorithm for answering conjunctive queries over SHIQ knowledge bases that
is coNP in data complexity is given. The algorithm is based on the tableau
algorithm for reasoning with individuals in SHIQ. The blocking conditions of
the tableau are weakened in such a way that the set of models the modified
algorithm yields suffices to check query entailment. The modified blocking
conditions are based on the ones proposed by Levy and Rousset for reasoning
with Horn Rules in the description logic ALCNR.
| [
{
"version": "v1",
"created": "Fri, 22 Jul 2005 15:43:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de la Fuente",
"M. Magdalena Ortiz",
""
],
[
"Calvanese",
"Diego",
""
],
[
"Eiter",
"Thomas",
""
],
[
"Franconi",
"Enrico",
""
]
] |
cs/0507061 | Andre Adrian | Andre Adrian | Software Architecture Overview | 9 pages, version 23jul2005 | null | null | null | cs.SE | null | What is Software Architecture? The rules, paradigmen, pattern that help to
construct, build and test a serious piece of software. It is the practical
experience boiled down to abstract level. Software Architecture builds on
System Engineering and the scientific method as established by Galileo Galilei:
Measure what you can and make measureable what you can not. The experiment
(test) is more important then the deduction. Pieces of information about
software architecture are all over the internet. This paper uses citation as
much as possible. The aim is to bring together an overview, not to rephrase the
wording.
| [
{
"version": "v1",
"created": "Sun, 24 Jul 2005 09:43:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Adrian",
"Andre",
""
]
] |
cs/0507062 | Jan Poland | Jan Poland | FPL Analysis for Adaptive Bandits | null | null | null | null | cs.LG | null | A main problem of "Follow the Perturbed Leader" strategies for online
decision problems is that regret bounds are typically proven against oblivious
adversary. In partial observation cases, it was not clear how to obtain
performance guarantees against adaptive adversary, without worsening the
bounds. We propose a conceptually simple argument to resolve this problem.
Using this, a regret bound of O(t^(2/3)) for FPL in the adversarial multi-armed
bandit problem is shown. This bound holds for the common FPL variant using only
the observations from designated exploration rounds. Using all observations
allows for the stronger bound of O(t^(1/2)), matching the best bound known so
far (and essentially the known lower bound) for adversarial bandits.
Surprisingly, this variant does not even need explicit exploration, it is
self-stabilizing. However the sampling probabilities have to be either
externally provided or approximated to sufficient accuracy, using O(t^2 log t)
samples in each step.
| [
{
"version": "v1",
"created": "Tue, 26 Jul 2005 05:00:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Poland",
"Jan",
""
]
] |
cs/0507064 | Isabelle Gnaedig | Isabelle Gnaedig and Helene Kirchner | Termination of rewriting strategies: a generic approach | 49 pages | null | null | null | cs.LO | null | We propose a generic termination proof method for rewriting under strategies,
based on an explicit induction on the termination property. Rewriting trees on
ground terms are modeled by proof trees, generated by alternatively applying
narrowing and abstracting steps. The induction principle is applied through the
abstraction mechanism, where terms are replaced by variables representing any
of their normal forms. The induction ordering is not given a priori, but
defined with ordering constraints, incrementally set during the proof.
Abstraction constraints can be used to control the narrowing mechanism, well
known to easily diverge. The generic method is then instantiated for the
innermost, outermost and local strategies.
| [
{
"version": "v1",
"created": "Tue, 26 Jul 2005 20:18:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gnaedig",
"Isabelle",
""
],
[
"Kirchner",
"Helene",
""
]
] |
cs/0507065 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | A Fast Greedy Algorithm for Outlier Mining | 11 pages | null | null | Tr-05-0406 | cs.DB cs.AI | null | The task of outlier detection is to find small groups of data objects that
are exceptional when compared with rest large amount of data. In [38], the
problem of outlier detection in categorical data is defined as an optimization
problem and a local-search heuristic based algorithm (LSA) is presented.
However, as is the case with most iterative type algorithms, the LSA algorithm
is still very time-consuming on very large datasets. In this paper, we present
a very fast greedy algorithm for mining outliers under the same optimization
model. Experimental results on real datasets and large synthetic datasets show
that: (1) Our algorithm has comparable performance with respect to those
state-of-art outlier detection algorithms on identifying true outliers and (2)
Our algorithm can be an order of magnitude faster than LSA algorithm.
| [
{
"version": "v1",
"created": "Wed, 27 Jul 2005 02:14:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
cs/0507066 | Atul Chaturvedi Mr. | Sunder Lal and Atul Chaturvedi (Department of Mathematics Institute of
Basic Science) | Authentication Schemes Using Braid Groups | 6 pages, 2 figures | null | null | null | cs.CR cs.CY | null | In this paper we proposed two identification schemes based on the root
problem. The proposed schemes are secure against passive attacks assuming that
the root problem (RP) is hard in braid groups.
| [
{
"version": "v1",
"created": "Wed, 27 Jul 2005 10:14:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
"",
"Department of Mathematics Institute of\n Basic Science"
],
[
"Chaturvedi",
"Atul",
"",
"Department of Mathematics Institute of\n Basic Science"
]
] |
cs/0507067 | Diego Calvanese | Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini | Conjunctive Query Containment and Answering under Description Logics
Constraints | null | null | null | null | cs.DB cs.AI | null | Query containment and query answering are two important computational tasks
in databases. While query answering amounts to compute the result of a query
over a database, query containment is the problem of checking whether for every
database, the result of one query is a subset of the result of another query.
In this paper, we deal with unions of conjunctive queries, and we address
query containment and query answering under Description Logic constraints.
Every such constraint is essentially an inclusion dependencies between concepts
and relations, and their expressive power is due to the possibility of using
complex expressions, e.g., intersection and difference of relations, special
forms of quantification, regular expressions over binary relations, in the
specification of the dependencies. These types of constraints capture a great
variety of data models, including the relational, the entity-relationship, and
the object-oriented model, all extended with various forms of constraints, and
also the basic features of the ontology languages used in the context of the
Semantic Web.
We present the following results on both query containment and query
answering. We provide a method for query containment under Description Logic
constraints, thus showing that the problem is decidable, and analyze its
computational complexity. We prove that query containment is undecidable in the
case where we allow inequalities in the right-hand side query, even for very
simple constraints and queries. We show that query answering under Description
Logic constraints can be reduced to query containment, and illustrate how such
a reduction provides upper bound results with respect to both combined and data
complexity.
| [
{
"version": "v1",
"created": "Thu, 28 Jul 2005 08:25:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Calvanese",
"Diego",
""
],
[
"De Giacomo",
"Giuseppe",
""
],
[
"Lenzerini",
"Maurizio",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.