id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0505079
Boris Ryabko
Boris Ryabko and Jaakko Astola and Alex Gammerman
Application of Kolmogorov complexity and universal codes to identity testing and nonparametric testing of serial independence for time series
submitted
null
null
null
cs.CC
null
We show that Kolmogorov complexity and such its estimators as universal codes (or data compression methods) can be applied for hypotheses testing in a framework of classical mathematical statistics. The methods for identity testing and nonparametric testing of serial independence for time series are suggested.
[ { "version": "v1", "created": "Sun, 29 May 2005 17:12:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Ryabko", "Boris", "" ], [ "Astola", "Jaakko", "" ], [ "Gammerman", "Alex", "" ] ]
cs/0505081
Gilles Kassel
Sabine Bruaux (LaRIA), Gilles Kassel (LaRIA), Gilles Morel (LaRIA)
An ontological approach to the construction of problem-solving models
null
null
null
LRR 2005-03
cs.AI
null
Our ongoing work aims at defining an ontology-centered approach for building expertise models for the CommonKADS methodology. This approach (which we have named "OntoKADS") is founded on a core problem-solving ontology which distinguishes between two conceptualization levels: at an object level, a set of concepts enable us to define classes of problem-solving situations, and at a meta level, a set of meta-concepts represent modeling primitives. In this article, our presentation of OntoKADS will focus on the core ontology and, in particular, on roles - the primitive situated at the interface between domain knowledge and reasoning, and whose ontological status is still much debated. We first propose a coherent, global, ontological framework which enables us to account for this primitive. We then show how this novel characterization of the primitive allows definition of new rules for the construction of expertise models.
[ { "version": "v1", "created": "Mon, 30 May 2005 13:42:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Bruaux", "Sabine", "", "LaRIA" ], [ "Kassel", "Gilles", "", "LaRIA" ], [ "Morel", "Gilles", "", "LaRIA" ] ]
cs/0505083
Vladimir Vovk
Vladimir Vovk, Akimichi Takemura, Glenn Shafer
Defensive forecasting
15 pages, 2 figures, to appear in the AIStats'2005 electronic proceedings
Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics, 2005, pages 365--372.
null
null
cs.LG cs.AI
null
We consider how to make probability forecasts of binary labels. Our main mathematical result is that for any continuous gambling strategy used for detecting disagreement between the forecasts and the actual labels, there exists a forecasting strategy whose forecasts are ideal as far as this gambling strategy is concerned. A forecasting strategy obtained in this way from a gambling strategy demonstrating a strong law of large numbers is simplified and studied empirically.
[ { "version": "v1", "created": "Mon, 30 May 2005 21:12:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ], [ "Takemura", "Akimichi", "" ], [ "Shafer", "Glenn", "" ] ]
cs/0505084
Valentin Brimkov
Valentin Brimkov, Angelo Maimone, Giorgio Nordo
An explicit formula for the number of tunnels in digital objects
9 pages, 4 figures
null
null
null
cs.DM cs.CG cs.CV
null
An important concept in digital geometry for computer imagery is that of tunnel. In this paper we obtain a formula for the number of tunnels as a function of the number of the object vertices, pixels, holes, connected components, and 2x2 grid squares. It can be used to test for tunnel-freedom a digital object, in particular a digital curve.
[ { "version": "v1", "created": "Tue, 31 May 2005 00:44:16 GMT" }, { "version": "v2", "created": "Wed, 7 Sep 2005 23:28:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Brimkov", "Valentin", "" ], [ "Maimone", "Angelo", "" ], [ "Nordo", "Giorgio", "" ] ]
cs/0505087
Michael Soltys
Michael Soltys
Feasible Proofs of Matrix Properties with Csanky's Algorithm
null
null
null
null
cs.LO
null
We show that Csanky's fast parallel algorithm for computing the characteristic polynomial of a matrix can be formalized in the logical theory LAP, and can be proved correct in LAP from the principle of linear independence. LAP is a natural theory for reasoning about linear algebra introduced by Cook and Soltys. Further, we show that several principles of matrix algebra, such as linear independence or the Cayley-Hamilton Theorem, can be shown equivalent in the logical theory QLA. Applying the separation between complexity classes AC^0[2] contained in DET(GF(2)), we show that these principles are in fact not provable in QLA. In a nutshell, we show that linear independence is ``all there is'' to elementary linear algebra (from a proof complexity point of view), and furthermore, linear independence cannot be proved trivially (again, from a proof complexity point of view).
[ { "version": "v1", "created": "Tue, 31 May 2005 11:13:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Soltys", "Michael", "" ] ]
cs/0506001
Dmitry Mogilevsky
Dmitry Mogilevsky, Sean Keller
SafeMPI - Extending MPI for Byzantine Error Detection on Parallel Clusters
null
null
null
null
cs.DC
null
Modern high-performance computing relies heavily on the use of commodity processors arranged together in clusters. These clusters consist of individual nodes (typically off-the-shelf single or dual processor machines) connected together with a high speed interconnect. Using cluster computation has many benefits, but also carries the liability of being failure prone due to the sheer number of components involved. Many effective solutions have been proposed to aid failure recovery in clusters, their one significant downside being the failure models they support. Most of the work in the area has focused on detecting and correcting fail-stop errors. We propose a system that will also detect more general error models, such as Byzantine errors, thus allowing existing failure recovery methods to handle them correctly.
[ { "version": "v1", "created": "Tue, 31 May 2005 21:05:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Mogilevsky", "Dmitry", "" ], [ "Keller", "Sean", "" ] ]
cs/0506002
Angela Bonifati
Angela Bonifati (Icar CNR, Italy), Elaine Qing Chang (UBC, Canada), Terence Ho (UBC, Canada), and Laks V.S. Lakshmanan (UBC, Canada)
HepToX: Heterogeneous Peer to Peer XML Databases
11 pages plus cover page
null
null
UBC TR-2005-15
cs.DB
null
We study a collection of heterogeneous XML databases maintaining similar and related information, exchanging data via a peer to peer overlay network. In this setting, a mediated global schema is unrealistic. Yet, users/applications wish to query the databases via one peer using its schema. We have recently developed HepToX, a P2P Heterogeneous XML database system. A key idea is that whenever a peer enters the system, it establishes an acquaintance with a small number of peer databases, possibly with different schema. The peer administrator provides correspondences between the local schema and the acquaintance schema using an informal and intuitive notation of arrows and boxes. We develop a novel algorithm that infers a set of precise mapping rules between the schemas from these visual annotations. We pin down a semantics of query translation given such mapping rules, and present a novel query translation algorithm for a simple but expressive fragment of XQuery, that employs the mapping rules in either direction. We show the translation algorithm is correct. Finally, we demonstrate the utility and scalability of our ideas and algorithms with a detailed set of experiments on top of the Emulab, a large scale P2P network emulation testbed.
[ { "version": "v1", "created": "Wed, 1 Jun 2005 01:30:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Bonifati", "Angela", "", "Icar CNR, Italy" ], [ "Chang", "Elaine Qing", "", "UBC, Canada" ], [ "Ho", "Terence", "", "UBC, Canada" ], [ "Lakshmanan", "Laks V. S.", "", "UBC, Canada" ] ]
cs/0506003
Andrea Pasquinucci
Andrea Pasquinucci
Authentication and routing in simple Quantum Key Distribution networks
12 pages, latex, 6 eps figures
null
null
null
cs.NI cs.CR quant-ph
null
We consider various issues which arise as soon as one tries to practically implement simple networks of quantum relays for QKD. In particular we discuss authentication and routing which are essential ingredients of any QKD network. This paper aims to address some gaps between quantum and networking aspects of QKD networks usually reserved to specialist in physics and computer science respectively.
[ { "version": "v1", "created": "Wed, 1 Jun 2005 10:37:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Pasquinucci", "Andrea", "" ] ]
cs/0506004
Vladimir Vovk
Vladimir Vovk
Non-asymptotic calibration and resolution
20 pages
null
null
null
cs.LG
null
We analyze a new algorithm for probability forecasting of binary observations on the basis of the available data, without making any assumptions about the way the observations are generated. The algorithm is shown to be well calibrated and to have good resolution for long enough sequences of observations and for a suitable choice of its parameter, a kernel on the Cartesian product of the forecast space $[0,1]$ and the data space. Our main results are non-asymptotic: we establish explicit inequalities, shown to be tight, for the performance of the algorithm.
[ { "version": "v1", "created": "Wed, 1 Jun 2005 14:03:20 GMT" }, { "version": "v2", "created": "Wed, 27 Jul 2005 16:15:54 GMT" }, { "version": "v3", "created": "Sun, 21 Aug 2005 19:55:55 GMT" }, { "version": "v4", "created": "Sat, 1 Jul 2006 13:46:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0506005
Neng-Fa Zhou
Neng-Fa Zhou
Programming Finite-Domain Constraint Propagators in Action Rules
null
TPLP Vol 5(4&5) 2005
null
null
cs.PL
null
In this paper, we propose a new language, called AR ({\it Action Rules}), and describe how various propagators for finite-domain constraints can be implemented in it. An action rule specifies a pattern for agents, an action that the agents can carry out, and an event pattern for events that can activate the agents. AR combines the goal-oriented execution model of logic programming with the event-driven execution model. This hybrid execution model facilitates programming constraint propagators. A propagator for a constraint is an agent that maintains the consistency of the constraint and is activated by the updates of the domain variables in the constraint. AR has a much stronger descriptive power than {\it indexicals}, the language widely used in the current finite-domain constraint systems, and is flexible for implementing not only interval-consistency but also arc-consistency algorithms. As examples, we present a weak arc-consistency propagator for the {\tt all\_distinct} constraint and a hybrid algorithm for n-ary linear equality constraints. B-Prolog has been extended to accommodate action rules. Benchmarking shows that B-Prolog as a CLP(FD) system significantly outperforms other CLP(FD) systems.
[ { "version": "v1", "created": "Thu, 2 Jun 2005 03:49:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Neng-Fa", "" ] ]
cs/0506007
Vladimir Vovk
Vladimir Vovk, Ilia Nouretdinov, Akimichi Takemura, Glenn Shafer
Defensive forecasting for linear protocols
16 pages
null
null
null
cs.LG
null
We consider a general class of forecasting protocols, called "linear protocols", and discuss several important special cases, including multi-class forecasting. Forecasting is formalized as a game between three players: Reality, whose role is to generate observations; Forecaster, whose goal is to predict the observations; and Skeptic, who tries to make money on any lack of agreement between Forecaster's predictions and the actual observations. Our main mathematical result is that for any continuous strategy for Skeptic in a linear protocol there exists a strategy for Forecaster that does not allow Skeptic's capital to grow. This result is a meta-theorem that allows one to transform any continuous law of probability in a linear protocol into a forecasting strategy whose predictions are guaranteed to satisfy this law. We apply this meta-theorem to a weak law of large numbers in Hilbert spaces to obtain a version of the K29 prediction algorithm for linear protocols and show that this version also satisfies the attractive properties of proper calibration and resolution under a suitable choice of its kernel parameter, with no assumptions about the way the data is generated.
[ { "version": "v1", "created": "Thu, 2 Jun 2005 13:26:43 GMT" }, { "version": "v2", "created": "Sat, 24 Sep 2005 16:55:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ], [ "Nouretdinov", "Ilia", "" ], [ "Takemura", "Akimichi", "" ], [ "Shafer", "Glenn", "" ] ]
cs/0506008
Felix Klaedtke
Felix Klaedtke
Bounds on the Automata Size for Presburger Arithmetic
null
null
null
null
cs.LO
null
Automata provide a decision procedure for Presburger arithmetic. However, until now only crude lower and upper bounds were known on the sizes of the automata produced by this approach. In this paper, we prove an upper bound on the the number of states of the minimal deterministic automaton for a Presburger arithmetic formula. This bound depends on the length of the formula and the quantifiers occurring in the formula. The upper bound is established by comparing the automata for Presburger arithmetic formulas with the formulas produced by a quantifier elimination method. We also show that our bound is tight, even for nondeterministic automata. Moreover, we provide optimal automata constructions for linear equations and inequations.
[ { "version": "v1", "created": "Thu, 2 Jun 2005 15:11:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Klaedtke", "Felix", "" ] ]
cs/0506010
Simeon Warner
Simeon Warner (Cornell University)
The OAI Data-Provider Registration and Validation Service
null
null
null
null
cs.DL
null
I present a summary of recent use of the Open Archives Initiative (OAI) registration and validation services for data-providers. The registration service has seen a steady stream of registrations since its launch in 2002, and there are now over 220 registered repositories. I examine the validation logs to produce a breakdown of reasons why repositories fail validation. This breakdown highlights some common problems and will be used to guide work to improve the validation service.
[ { "version": "v1", "created": "Fri, 3 Jun 2005 17:15:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Warner", "Simeon", "", "Cornell University" ] ]
cs/0506014
Sebastian Maneth
Joost Engelfriet and Sebastian Maneth
The Equivalence Problem for Deterministic MSO Tree Transducers is Decidable
null
null
null
null
cs.LO
null
It is decidable for deterministic MSO definable graph-to-string or graph-to-tree transducers whether they are equivalent on a context-free set of graphs.
[ { "version": "v1", "created": "Mon, 6 Jun 2005 07:05:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Engelfriet", "Joost", "" ], [ "Maneth", "Sebastian", "" ] ]
cs/0506015
Raju Gangishetti
Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems
Submitted to National Workshop on Cryptology 2005, India
null
null
null
cs.CR
null
To remove key escrow problem and avoid the need of secure channel in ID based cryptosystem Lee et al. proposed a secure key issuing protocol. However we show that it suffers from impersonation, insider attacks and incompetency of the key privacy authorities. We also cryptanalyze Sui et al.'s separable and anonymous key issuing protocol.
[ { "version": "v1", "created": "Mon, 6 Jun 2005 09:48:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Gangishetti", "Raju", "" ], [ "Gorantla", "M. Choudary", "" ], [ "Das", "Manik Lal", "" ], [ "Saxena", "Ashutosh", "" ] ]
cs/0506019
Vicky Choi
Vicky Choi, Navin Goyal
An Efficient Approximation Algorithm for Point Pattern Matching Under Noise
18 pages
null
null
null
cs.CV cs.CG
null
Point pattern matching problems are of fundamental importance in various areas including computer vision and structural bioinformatics. In this paper, we study one of the more general problems, known as LCP (largest common point set problem): Let $\PP$ and $\QQ$ be two point sets in $\mathbb{R}^3$, and let $\epsilon \geq 0$ be a tolerance parameter, the problem is to find a rigid motion $\mu$ that maximizes the cardinality of subset $\II$ of $Q$, such that the Hausdorff distance $\distance(\PP,\mu(\II)) \leq \epsilon$. We denote the size of the optimal solution to the above problem by $\LCP(P,Q)$. The problem is called exact-LCP for $\epsilon=0$, and \tolerant-LCP when $\epsilon>0$ and the minimum interpoint distance is greater than $2\epsilon$. A $\beta$-distance-approximation algorithm for tolerant-LCP finds a subset $I \subseteq \QQ$ such that $|I|\geq \LCP(P,Q)$ and $\distance(\PP,\mu(\II)) \leq \beta \epsilon$ for some $\beta \ge 1$. This paper has three main contributions. (1) We introduce a new algorithm, called {\DA}, which gives the fastest known deterministic 4-distance-approximation algorithm for \tolerant-LCP. (2) For the exact-LCP, when the matched set is required to be large, we give a simple sampling strategy that improves the running times of all known deterministic algorithms, yielding the fastest known deterministic algorithm for this problem. (3) We use expander graphs to speed-up the \DA algorithm for \tolerant-LCP when the size of the matched set is required to be large, at the expense of approximation in the matched set size. Our algorithms also work when the transformation $\mu$ is allowed to be scaling transformation.
[ { "version": "v1", "created": "Tue, 7 Jun 2005 17:41:53 GMT" }, { "version": "v2", "created": "Thu, 21 Jul 2005 21:33:55 GMT" }, { "version": "v3", "created": "Wed, 21 Sep 2005 15:43:28 GMT" }, { "version": "v4", "created": "Sun, 2 Jul 2006 22:19:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Choi", "Vicky", "" ], [ "Goyal", "Navin", "" ] ]
cs/0506023
Alexandre d'Aspremont
Onureena Banerjee, Alexandre d'Aspremont, Laurent El Ghaoui
Sparse Covariance Selection via Robust Maximum Likelihood Estimation
Submitted to NIPS 2005
null
null
null
cs.CE cs.AI
null
We address a problem of covariance selection, where we seek a trade-off between a high likelihood against the number of non-zero elements in the inverse covariance matrix. We solve a maximum likelihood problem with a penalty term given by the sum of absolute values of the elements of the inverse covariance matrix, and allow for imposing bounds on the condition number of the solution. The problem is directly amenable to now standard interior-point algorithms for convex optimization, but remains challenging due to its size. We first give some results on the theoretical computational complexity of the problem, by showing that a recent methodology for non-smooth convex optimization due to Nesterov can be applied to this problem, to greatly improve on the complexity estimate given by interior-point algorithms. We then examine two practical algorithms aimed at solving large-scale, noisy (hence dense) instances: one is based on a block-coordinate descent approach, where columns and rows are updated sequentially, another applies a dual version of Nesterov's method.
[ { "version": "v1", "created": "Wed, 8 Jun 2005 21:08:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Banerjee", "Onureena", "" ], [ "d'Aspremont", "Alexandre", "" ], [ "Ghaoui", "Laurent El", "" ] ]
cs/0506024
Marko Antonio Rodriguez
Marko A. Rodriguez
The Hyper-Cortex of Human Collective-Intelligence Systems
ECCO Working Paper 06-2005 (17-pages) This paper will be shortened to just the multi-layered digital-library hyper-cortex
null
null
null
cs.CY cs.AI cs.DL cs.NE
null
Individual-intelligence research, from a neurological perspective, discusses the hierarchical layers of the cortex as a structure that performs conceptual abstraction and specification. This theory has been used to explain how motor-cortex regions responsible for different behavioral modalities such as writing and speaking can be utilized to express the same general concept represented higher in the cortical hierarchy. For example, the concept of a dog, represented across a region of high-level cortical-neurons, can either be written or spoken about depending on the individual's context. The higher-layer cortical areas project down the hierarchy, sending abstract information to specific regions of the motor-cortex for contextual implementation. In this paper, this idea is expanded to incorporate collective-intelligence within a hyper-cortical construct. This hyper-cortex is a multi-layered network used to represent abstract collective concepts. These ideas play an important role in understanding how collective-intelligence systems can be engineered to handle problem abstraction and solution specification. Finally, a collection of common problems in the scientific community are solved using an artificial hyper-cortex generated from digital-library metadata.
[ { "version": "v1", "created": "Wed, 8 Jun 2005 21:33:44 GMT" }, { "version": "v2", "created": "Thu, 9 Jun 2005 21:14:29 GMT" }, { "version": "v3", "created": "Fri, 17 Jun 2005 19:24:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodriguez", "Marko A.", "" ] ]
cs/0506026
Rada Chirkova
Rada Chirkova and Michael R. Genesereth
Database Reformulation with Integrity Constraints (extended abstract)
In the proceedings of the the Logic and Computational Complexity Workshop, in conjunction with of the Logic in Computer Science Conference (LICS), Chicago, June 2005
null
null
null
cs.DB
null
In this paper we study the problem of reducing the evaluation costs of queries on finite databases in presence of integrity constraints, by designing and materializing views. Given a database schema, a set of queries defined on the schema, a set of integrity constraints, and a storage limit, to find a solution to this problem means to find a set of views that satisfies the storage limit, provides equivalent rewritings of the queries under the constraints (this requirement is weaker than equivalence in the absence of constraints), and reduces the total costs of evaluating the queries. This problem, database reformulation, is important for many applications, including data warehousing and query optimization. We give complexity results and algorithms for database reformulation in presence of constraints, for conjunctive queries, views, and rewritings and for several types of constraints, including functional and inclusion dependencies. To obtain better complexity results, we introduce an unchase technique, which reduces the problem of query equivalence under constraints to equivalence in the absence of constraints without increasing query size.
[ { "version": "v1", "created": "Wed, 8 Jun 2005 22:03:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Chirkova", "Rada", "" ], [ "Genesereth", "Michael R.", "" ] ]
cs/0506027
Travis Gagie
Travis Gagie
Sorting a Low-Entropy Sequence
null
null
null
null
cs.DS
null
We give the first sorting algorithm with bounds in terms of higher-order entropies: let $S$ be a sequence of length $m$ containing $n$ distinct elements and let (H_\ell (S)) be the $\ell$th-order empirical entropy of $S$, with (n^{\ell + 1} \log n \in O (m)); our algorithm sorts $S$ using ((H_\ell (S) + O (1)) m) comparisons.
[ { "version": "v1", "created": "Wed, 8 Jun 2005 22:15:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Gagie", "Travis", "" ] ]
cs/0506030
Jonathan Ben-Naim
Jonathan Ben-Naim (LIF)
Preferential and Preferential-discriminative Consequence relations
team Logic and Complexity, written in 2004-2005
Journal of Logic and Computation 15 (2005) number 3, pp. 263-294
10.1093/logcom/exi013
null
cs.AI cs.LO
null
The present paper investigates consequence relations that are both non-monotonic and paraconsistent. More precisely, we put the focus on preferential consequence relations, i.e. those relations that can be defined by a binary preference relation on states labelled by valuations. We worked with a general notion of valuation that covers e.g. the classical valuations as well as certain kinds of many-valued valuations. In the many-valued cases, preferential consequence relations are paraconsistant (in addition to be non-monotonic), i.e. they are capable of drawing reasonable conclusions which contain contradictions. The first purpose of this paper is to provide in our general framework syntactic characterizations of several families of preferential relations. The second and main purpose is to provide, again in our general framework, characterizations of several families of preferential discriminative consequence relations. They are defined exactly as the plain version, but any conclusion such that its negation is also a conclusion is rejected (these relations bring something new essentially in the many-valued cases).
[ { "version": "v1", "created": "Thu, 9 Jun 2005 12:53:47 GMT" }, { "version": "v2", "created": "Mon, 6 Feb 2006 12:19:55 GMT" }, { "version": "v3", "created": "Wed, 1 Mar 2006 14:47:04 GMT" }, { "version": "v4", "created": "Mon, 19 Jun 2006 08:17:49 GMT" }, { "version": "v5", "created": "Tue, 3 Apr 2007 14:52:32 GMT" }, { "version": "v6", "created": "Sun, 8 Apr 2007 15:04:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Ben-Naim", "Jonathan", "", "LIF" ] ]
cs/0506031
Laurent Henocque
Patrick Albert, Laurent Henocque, Mathias Kleiner
A Constrained Object Model for Configuration Based Workflow Composition
This is an extended version of the article published at BPM'05, Third International Conference on Business Process Management, Nancy France
null
null
null
cs.AI
null
Automatic or assisted workflow composition is a field of intense research for applications to the world wide web or to business process modeling. Workflow composition is traditionally addressed in various ways, generally via theorem proving techniques. Recent research observed that building a composite workflow bears strong relationships with finite model search, and that some workflow languages can be defined as constrained object metamodels . This lead to consider the viability of applying configuration techniques to this problem, which was proven feasible. Constrained based configuration expects a constrained object model as input. The purpose of this document is to formally specify the constrained object model involved in ongoing experiments and research using the Z specification language.
[ { "version": "v1", "created": "Thu, 9 Jun 2005 14:57:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Albert", "Patrick", "" ], [ "Henocque", "Laurent", "" ], [ "Kleiner", "Mathias", "" ] ]
cs/0506032
Shankar Ramachandran Mr
R. Shankar
Framework for Hopfield Network based Adaptive routing - A design level approach for adaptive routing phenomena with Artificial Neural Network
(13 pages, 7 figures, code)
null
null
null
cs.NE
null
Routing, as a basic phenomena, by itself, has got umpteen scopes to analyse, discuss and arrive at an optimal solution for the technocrats over years. Routing is analysed based on many factors; few key constraints that decide the factors are communication medium, time dependency, information source nature. Parametric routing has become the requirement of the day, with some kind of adaptation to the underlying network environment. Satellite constellations, particularly LEO satellite constellations have become a reality in operational to have a non-breaking voice/data communication around the world.Routing in these constellations has to be treated in a non conventional way, taking their network geometry into consideration. One of the efficient methods of optimization is putting Neural Networks to use. Few Artificial Neural Network models are very much suitable for the adaptive control mechanism, by their nature of network arrangement. One such efficient model is Hopfield Network model. This paper is an attempt to design a framework for the Hopfield Network based adaptive routing phenomena in satellite constellations.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 05:30:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Shankar", "R.", "" ] ]
cs/0506034
Srikumar Venugopal
Srikumar Venugopal, Rajkumar Buyya and Kotagiri Ramamohanarao
A Taxonomy of Data Grids for Distributed Data Sharing, Management and Processing
46 pages, 16 figures, Technical Report
null
null
GRIDS-TR-2005-3
cs.DC cs.CE
null
Data Grids have been adopted as the platform for scientific communities that need to share, access, transport, process and manage large data collections distributed worldwide. They combine high-end computing technologies with high-performance networking and wide-area storage management techniques. In this paper, we discuss the key concepts behind Data Grids and compare them with other data sharing and distribution paradigms such as content delivery networks, peer-to-peer networks and distributed databases. We then provide comprehensive taxonomies that cover various aspects of architecture, data transportation, data replication and resource allocation and scheduling. Finally, we map the proposed taxonomy to various Data Grid systems not only to validate the taxonomy but also to identify areas for future exploration. Through this taxonomy, we aim to categorise existing systems to better understand their goals and their methodology. This would help evaluate their applicability for solving similar problems. This taxonomy also provides a "gap analysis" of this area through which researchers can potentially identify new issues for investigation. Finally, we hope that the proposed taxonomy and mapping also helps to provide an easy way for new practitioners to understand this complex area of research.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 10:59:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Venugopal", "Srikumar", "" ], [ "Buyya", "Rajkumar", "" ], [ "Ramamohanarao", "Kotagiri", "" ] ]
cs/0506035
Michel Dagenais
Jerome Collin (Computer Engineering, Ecole Polytechnique de Montreal), Michel Dagenais (Computer Engineering, Ecole Polytechnique de Montreal)
Fast Recompilation of Object Oriented Modules
null
null
null
null
cs.PL
null
Once a program file is modified, the recompilation time should be minimized, without sacrificing execution speed or high level object oriented features. The recompilation time is often a problem for the large graphical interactive distributed applications tackled by modern OO languages. A compilation server and fast code generator were developed and integrated with the SRC Modula-3 compiler and Linux ELF dynamic linker. The resulting compilation and recompilation speedups are impressive. The impact of different language features, processor speed, and application size are discussed.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 15:28:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Collin", "Jerome", "", "Computer Engineering, Ecole Polytechnique de Montreal" ], [ "Dagenais", "Michel", "", "Computer Engineering, Ecole Polytechnique de Montreal" ] ]
cs/0506038
Wen Ding
Wen Ding & William Yurcik
A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market
16 pages, 2 figures
null
null
null
cs.GT
null
On information security outsourcing market, an important reason that firms do not want to let outside firms(usually called MSSPs-Managed Security Service Providers) to take care of their security need is that they worry about service quality MSSPs provide because they cannot monitor effort of the MSSPs. Since MSSPs action is unobservable to buyers, MSSPs can lower cost by working less hard than required in the contract and get higher profit. In the asymmetric information literature, this possible secret shirking behavior is termed as moral hazard problem. This paper considers a game theoretic economic framework to show that under information asymmetry, an optimal contract can be designed so that MSSPs will stick to their promised effort level. We also show that the optimal contract should be performance-based, i.e., payment to MSSP should base on performance of MSSP's security service period by period. For comparison, we also showed that if the moral hazard problem does not exist, the optimal contract does not depend on MSSP's performance. A contract that specifies constant payment to MSSP will be optimal. Besides these, we show that for no matter under perfect information scenario or imperfect information scenario, the higher the transaction cost is, the lower payment to MSSPs will be.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 23:58:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "Wen", "" ], [ "Yurcik", "William", "" ] ]
cs/0506041
Vladimir Vovk
Vladimir Vovk
Competitive on-line learning with a convex loss function
26 pages
null
null
null
cs.LG cs.AI
null
We consider the problem of sequential decision making under uncertainty in which the loss caused by a decision depends on the following binary observation. In competitive on-line learning, the goal is to design decision algorithms that are almost as good as the best decision rules in a wide benchmark class, without making any assumptions about the way the observations are generated. However, standard algorithms in this area can only deal with finite-dimensional (often countable) benchmark classes. In this paper we give similar results for decision rules ranging over an arbitrary reproducing kernel Hilbert space. For example, it is shown that for a wide class of loss functions (including the standard square, absolute, and log loss functions) the average loss of the master algorithm, over the first $N$ observations, does not exceed the average loss of the best decision rule with a bounded norm plus $O(N^{-1/2})$. Our proof technique is very different from the standard ones and is based on recent results about defensive forecasting. Given the probabilities produced by a defensive forecasting algorithm, which are known to be well calibrated and to have good resolution in the long run, we use the expected loss minimization principle to find a suitable decision.
[ { "version": "v1", "created": "Sat, 11 Jun 2005 18:11:22 GMT" }, { "version": "v2", "created": "Wed, 27 Jul 2005 16:49:33 GMT" }, { "version": "v3", "created": "Fri, 2 Sep 2005 14:27:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0506046
Bernard Jacquemin
Bernard Jacquemin (ISC)
Dictionaries merger for text expansion in question answering
4 pp
Proceedings of COLING 2004 (2004) 1398
null
null
cs.DL
null
This paper presents an original way to add new data in a reference dictionary from several other lexical resources, without loosing any consistence. This operation is carried in order to get lexical information classified by the sense of the entry. This classification makes it possible to enrich utterances (in QA: the queries) following the meaning, and to reduce noise. An analysis of the experienced problems shows the interest of this method, and insists on the points that have to be tackled.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 16:36:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacquemin", "Bernard", "", "ISC" ] ]
cs/0506047
Bernard Jacquemin
Bernard Jacquemin (ISC)
Analyse et expansion des textes en question-r\'{e}ponse
11 pp
Le poids des mots. Actes des 7es journ\'{e}es internationales d'Analyse statistique des Donn\'{e}es Textuelles (2004) 1219
null
null
cs.IR
null
This paper presents an original methodology to consider question answering. We noticed that query expansion is often incorrect because of a bad understanding of the question. But the automatic good understanding of an utterance is linked to the context length, and the question are often short. This methodology proposes to analyse the documents and to construct an informative structure from the results of the analysis and from a semantic text expansion. The linguistic analysis identifies words (tokenization and morphological analysis), links between words (syntactic analysis) and word sense (semantic disambiguation). The text expansion adds to each word the synonyms matching its sense and replaces the words in the utterances by derivatives, modifying the syntactic schema if necessary. In this way, whatever enrichment may be, the text keeps the same meaning, but each piece of information matches many realisations. The questioning method consists in constructing a local informative structure without enrichment, and matches it with the documentary structure. If a sentence in the informative structure matches the question structure, this sentence is the answer to the question.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 16:39:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacquemin", "Bernard", "", "ISC" ] ]
cs/0506048
Bernard Jacquemin
Bernard Jacquemin (ISC), Caroline Brun, Claude Roux
Enriching a Text by Semantic Disambiguation for Information Extraction
7 pp
LREC 2002 Workshop Proceedings "Using semantics for informaiton retrival and filtering" (2002) 45-51
null
null
cs.IR
null
External linguistic resources have been used for a very long time in information extraction. These methods enrich a document with data that are semantically equivalent, in order to improve recall. For instance, some of these methods use synonym dictionaries. These dictionaries enrich a sentence with words that have a similar meaning. However, these methods present some serious drawbacks, since words are usually synonyms only in restricted contexts. The method we propose here consists of using word sense disambiguation rules (WSD) to restrict the selection of synonyms to only these that match a specific syntactico-semantic context. We show how WSD rules are built and how information extraction techniques can benefit from the application of these rules.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 16:44:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacquemin", "Bernard", "", "ISC" ], [ "Brun", "Caroline", "" ], [ "Roux", "Claude", "" ] ]
cs/0506050
Alex Wiesmaier
A. Wiesmaier, V. Karatsiolis, M. Lippert, J. Buchmann
The Workshop - Implementing Well Structured Enterprise Applications
7 pages (ieee), 1 figure, accepted for SERP'05
Proceedings of "The 2005 International Conference on Software Engineering Research and Practice"; June 2005
null
null
cs.SE
null
We specify an abstraction layer to be used between an enterprise application and the utilized enterprise framework (like J2EE or .NET). This specification is called the Workshop. It provides an intuitive metaphor supporting the programmer in designing easy understandable code. We present an implementation of this specification. It is based upon the J2EE framework and is called the JWorkshop. As a proof of concept we implement a special certification authority called the Key Authority based upon the JWorkshop. The mentioned certification authority runs very successfully in a variety of different real world projects.
[ { "version": "v1", "created": "Mon, 13 Jun 2005 13:25:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Wiesmaier", "A.", "" ], [ "Karatsiolis", "V.", "" ], [ "Lippert", "M.", "" ], [ "Buchmann", "J.", "" ] ]
cs/0506051
Heiko Herrmann
Heiko Herrmann, Gunnar Rueckner
Comparison of two different implementations of a finite-difference-method for first-order pde in mathematica and matlab
LaTeX, 6 pages, 9 eps-figures, v2: minor additions/corrections
null
null
null
cs.CE cs.DM
null
In this article two implementations of a symmetric finite difference algorithm for a first-order partial differential equation are discussed. The considered partial differential equation discribes the time evolution of the crack length distribution of microcracks in brittle materia.
[ { "version": "v1", "created": "Mon, 13 Jun 2005 15:26:16 GMT" }, { "version": "v2", "created": "Fri, 11 Nov 2005 10:25:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Herrmann", "Heiko", "" ], [ "Rueckner", "Gunnar", "" ] ]
cs/0506054
Ramesh Johari
Ramesh Johari (Stanford University), Shie Mannor (McGill University), John N. Tsitsiklis (MIT)
Efficiency Loss in a Network Resource Allocation Game: The Case of Elastic Supply
Originally Laboratory for Information and Decision Systems (MIT) Publication 2605
null
null
null
cs.GT
null
We consider a resource allocation problem where individual users wish to send data across a network to maximize their utility, and a cost is incurred at each link that depends on the total rate sent through the link. It is known that as long as users do not anticipate the effect of their actions on prices, a simple proportional pricing mechanism can maximize the sum of users' utilities minus the cost (called aggregate surplus). Continuing previous efforts to quantify the effects of selfish behavior in network pricing mechanisms, we consider the possibility that users anticipate the effect of their actions on link prices. Under the assumption that the links' marginal cost functions are convex, we establish existence of a Nash equilibrium. We show that the aggregate surplus at a Nash equilibrium is no worse than a factor of 4*sqrt{2} - 5 times the optimal aggregate surplus; thus, the efficiency loss when users are selfish is no more than approximately 34%.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 02:11:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Johari", "Ramesh", "", "Stanford University" ], [ "Mannor", "Shie", "", "McGill University" ], [ "Tsitsiklis", "John N.", "", "MIT" ] ]
cs/0506055
Lane A. Hemaspaandra
Edith Hemaspaandra, Lane A. Hemaspaandra, Osamu Watanabe
The Complexity of Kings
null
null
null
URCS-TR-2005-870
cs.CC cs.DM
null
A king in a directed graph is a node from which each node in the graph can be reached via paths of length at most two. There is a broad literature on tournaments (completely oriented digraphs), and it has been known for more than half a century that all tournaments have at least one king [Lan53]. Recently, kings have proven useful in theoretical computer science, in particular in the study of the complexity of the semifeasible sets [HNP98,HT05] and in the study of the complexity of reachability problems [Tan01,NT02]. In this paper, we study the complexity of recognizing kings. For each succinctly specified family of tournaments, the king problem is known to belong to $\Pi_2^p$ [HOZZ]. We prove that this bound is optimal: We construct a succinctly specified tournament family whose king problem is $\Pi_2^p$-complete. It follows easily from our proof approach that the problem of testing kingship in succinctly specified graphs (which need not be tournaments) is $\Pi_2^p$-complete. We also obtain $\Pi_2^p$-completeness results for k-kings in succinctly specified j-partite tournaments, $k,j \geq 2$, and we generalize our main construction to show that $\Pi_2^p$-completeness holds for testing k-kingship in succinctly specified families of tournaments for all $k \geq 2$.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 02:31:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/0506057
Victor Kromer
Kromer Victor
About one 3-parameter Model of Testing
9 pages; in Russian; Paper with changed content
null
null
null
cs.LG
null
This article offers a 3-parameter model of testing, with 1) the difference between the ability level of the examinee and item difficulty; 2) the examinee discrimination and 3) the item discrimination as model parameters.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 04:00:38 GMT" }, { "version": "v2", "created": "Thu, 21 Jul 2005 02:43:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Victor", "Kromer", "" ] ]
cs/0506059
Hubie Chen
Hubie Chen
Existentially Restricted Quantified Constraint Satisfaction
null
null
null
null
cs.CC cs.LO
null
The quantified constraint satisfaction problem (QCSP) is a powerful framework for modelling computational problems. The general intractability of the QCSP has motivated the pursuit of restricted cases that avoid its maximal complexity. In this paper, we introduce and study a new model for investigating QCSP complexity in which the types of constraints given by the existentially quantified variables, is restricted. Our primary technical contribution is the development and application of a general technology for proving positive results on parameterizations of the model, of inclusion in the complexity class coNP.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 11:57:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hubie", "" ] ]
cs/0506060
Yong Luo
Yong Luo
Yet another normalisation proof for Martin-Lof's logical framework--Terms with correct arities are strongly normalising
19 pages
null
null
null
cs.LO
null
In this paper, we prove the strong normalisation for Martin-L\"{o}f's Logical Framework, and suggest that {}``correct arity'', a condition weaker than well-typedness, will also guarantee the strong normalisation.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 12:13:22 GMT" }, { "version": "v2", "created": "Wed, 15 Jun 2005 16:56:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Luo", "Yong", "" ] ]
cs/0506063
Slawomir Staworko
Slawomir Staworko and Jan Chomicki
Priority-Based Conflict Resolution in Inconsistent Relational Databases
null
null
null
UB CSE Technical Report 2005-11
cs.DB
null
We study here the impact of priorities on conflict resolution in inconsistent relational databases. We extend the framework of repairs and consistent query answers. We propose a set of postulates that an extended framework should satisfy and consider two instantiations of the framework: (locally preferred) l-repairs and (globally preferred) g-repairs. We study the relationships between them and the impact each notion of repair has on the computational complexity of repair checking and consistent query answers.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 23:10:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Staworko", "Slawomir", "" ], [ "Chomicki", "Jan", "" ] ]
cs/0506066
Yoo Chung
Yoo Chung and Dongman Lee
Impersonation with the Echo Protocol
submitted to ACM Workshop on Wireless Security (2005)
null
null
null
cs.CR cs.NI
null
The Echo protocol tries to do secure location verification using physical limits imposed by the speeds of light and sound. While the protocol is able to guarantee that a certain object is within a certain region, it cannot ensure the authenticity of further messages from the object without using cryptography. This paper describes an impersonation attack against the protocol based on this weakness. It also describes a couple of approaches which can be used to defend against the attack.
[ { "version": "v1", "created": "Wed, 15 Jun 2005 10:57:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Chung", "Yoo", "" ], [ "Lee", "Dongman", "" ] ]
cs/0506067
Juan Jose Amor
Juan Jose Amor, Gregorio Robles, Jesus Gonzalez-Barahona
Measuring Woody: The Size of Debian 3.0
null
null
null
null
cs.SE
null
Debian is possibly the largest free software distribution, with well over 4,500 source packages in the latest stable release (Debian 3.0) and more than 8,000 source packages in the release currently in preparation. However, we wish to know what these numbers mean. In this paper, we use David A. Wheeler's SLOCCount system to determine the number of physical source lines of code (SLOC) of Debian 3.0 (aka woody). We show that Debian 3.0 includes more than 105,000,000 physical SLOC (almost twice than Red Hat 9, released about 8 months later), showing that the Debian development model (based on the work of a large group of voluntary developers spread around the world) is at least as capable as other development methods (like the more centralized one, based on the work of employees, used by Red Hat or Microsoft) to manage distributions of this size. It is also shown that if Debian had been developed using traditional proprietary methods, the COCOMO model estimates that its cost would be close to $6.1 billion USD to develop Debian 3.0. In addition, we offer both an analysis of the programming languages used in the distribution (C amounts for about 65%, C++ for about 12%, Shell for about 8% and LISP is around 4%, with many others to follow), and the largest packages (The Linux kernel, Mozilla, XFree86, PM3, etc.)
[ { "version": "v1", "created": "Wed, 15 Jun 2005 21:48:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Amor", "Juan Jose", "" ], [ "Robles", "Gregorio", "" ], [ "Gonzalez-Barahona", "Jesus", "" ] ]
cs/0506068
John Watrous
Chris Marriott and John Watrous
Quantum Arthur-Merlin Games
22 pages
Computational Complexity, 14(2): 122 - 152, 2005
null
null
cs.CC quant-ph
null
This paper studies quantum Arthur-Merlin games, which are Arthur-Merlin games in which Arthur and Merlin can perform quantum computations and Merlin can send Arthur quantum information. As in the classical case, messages from Arthur to Merlin are restricted to be strings of uniformly generated random bits. It is proved that for one-message quantum Arthur-Merlin games, which correspond to the complexity class QMA, completeness and soundness errors can be reduced exponentially without increasing the length of Merlin's message. Previous constructions for reducing error required a polynomial increase in the length of Merlin's message. Applications of this fact include a proof that logarithmic length quantum certificates yield no increase in power over BQP and a simple proof that QMA is contained in PP. Other facts that are proved include the equivalence of three (or more) message quantum Arthur-Merlin games with ordinary quantum interactive proof systems and some basic properties concerning two-message quantum Arthur-Merlin games.
[ { "version": "v1", "created": "Wed, 15 Jun 2005 22:13:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Marriott", "Chris", "" ], [ "Watrous", "John", "" ] ]
cs/0506070
Yuriy Chashkov
Ph.D. Yuriy A. Chashkov
Data Visualization on Shared Usage Multi-Screen Environment
4 pages, 1 figure
null
null
null
cs.MM
null
The modern multimedia technologies based on the whole palette of hardware and software facilities of real-time high-speed information processing, in a combination with effective facilities of the remote access to information resources, allow us to visualize diverse types of information. Data visualization facilities – is the face of the Automated Control System on whom often judge about their efficiency. They take a special place, providing visualization of the diverse information necessary for decision-making by a final control link - the person allocated by certain powers.
[ { "version": "v1", "created": "Thu, 16 Jun 2005 10:15:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Chashkov", "Ph. D. Yuriy A.", "" ] ]
cs/0506071
Yuriy Reznykov
Yu. Reznykov
Signal transmission on lossy lines as a dissipative quantum state propagation
6 pages, revtex4
null
null
BTU LTP-05-06
cs.NI
null
The transmission of electric signals on a coupled line with distributed RLC-parameters is considered as a propagation of a dissipative quasi particle. A calculation technique is developed, alternative to the one, accepted for lumped lines. The relativistic wave equation for the transient response is deduced following the common Ohm-low-type considerations. The exact expressions for the Green function, for information transfer velocity and for time delay are obtained on this base. The fundamental restrictions on the measurement accuracy of the time delay are pointed out. The obtained results are naturally generalized for the multilevel networks of the arbitrary dimension.
[ { "version": "v1", "created": "Thu, 16 Jun 2005 11:40:54 GMT" }, { "version": "v2", "created": "Fri, 17 Jun 2005 07:28:35 GMT" }, { "version": "v3", "created": "Tue, 21 Jun 2005 09:31:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Reznykov", "Yu.", "" ] ]
cs/0506075
Lillian Lee
Bo Pang and Lillian Lee
Seeing stars: Exploiting class relationships for sentiment categorization with respect to rating scales
To appear, Proceedings of ACL 2005
null
null
null
cs.CL cs.LG
null
We address the rating-inference problem, wherein rather than simply decide whether a review is "thumbs up" or "thumbs down", as in previous sentiment analysis work, one must determine an author's evaluation with respect to a multi-point scale (e.g., one to five "stars"). This task represents an interesting twist on standard multi-class text categorization because there are several different degrees of similarity between class labels; for example, "three stars" is intuitively closer to "four stars" than to "one star". We first evaluate human performance at the task. Then, we apply a meta-algorithm, based on a metric labeling formulation of the problem, that alters a given n-ary classifier's output in an explicit attempt to ensure that similar items receive similar labels. We show that the meta-algorithm can provide significant improvements over both multi-class and regression versions of SVMs when we employ a novel similarity measure appropriate to the problem.
[ { "version": "v1", "created": "Fri, 17 Jun 2005 20:10:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Pang", "Bo", "" ], [ "Lee", "Lillian", "" ] ]
cs/0506076
Wojciech Mazurczyk
Wojciech Mazurczyk, Zbigniew Kotulski
Alternative security architecture for IP Telephony based on digital watermarking
10 pages, 5 figures
Lecture Notes in Computer Science 4166, pp. 170 - 181, Springer, Heidelberg 2006. ISBN 978-3-540-45762-6
null
null
cs.CR cs.MM
null
Problems with securing IP Telephony systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper a new, alternative security architecture for voice-systems is presented. It is based on digital watermarking: a new, flexible and powerful technology that is increasingly gaining more and more attention. Besides known applications e.g. to solve copyright protection problems, we propose to use digital watermarking to secure not only transmitted audio but also signaling protocol that IP Telephony is based on.
[ { "version": "v1", "created": "Sat, 18 Jun 2005 21:41:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0506078
David Renato Carreta Dominguez
David Dominguez, Kostadin Koroutchev, Eduardo Serrano & Francisco B. Rodriguez
Dynamical Neural Network: Information and Topology
10pg, 5fig
null
null
null
cs.IR cs.NE
null
A neural network works as an associative memory device if it has large storage capacity and the quality of the retrieval is good enough. The learning and attractor abilities of the network both can be measured by the mutual information (MI), between patterns and retrieval states. This paper deals with a search for an optimal topology, of a Hebb network, in the sense of the maximal MI. We use small-world topology. The connectivity $\gamma$ ranges from an extremely diluted to the fully connected network; the randomness $\omega$ ranges from purely local to completely random neighbors. It is found that, while stability implies an optimal $MI(\gamma,\omega)$ at $\gamma_{opt}(\omega)\to 0$, for the dynamics, the optimal topology holds at certain $\gamma_{opt}>0$ whenever $0\leq\omega<0.3$.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 14:54:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Dominguez", "David", "" ], [ "Koroutchev", "Kostadin", "" ], [ "Serrano", "Eduardo", "" ], [ "Rodriguez", "Francisco B.", "" ] ]
cs/0506079
Ugo Dal Lago
U. Dal Lago and M. Hofmann
Quantitative Models and Implicit Complexity
29 pages
null
null
null
cs.LO cs.CC
null
We give new proofs of soundness (all representable functions on base types lies in certain complexity classes) for Elementary Affine Logic, LFPL (a language for polytime computation close to realistic functional programming introduced by one of us), Light Affine Logic and Soft Affine Logic. The proofs are based on a common semantical framework which is merely instantiated in four different ways. The framework consists of an innovative modification of realizability which allows us to use resource-bounded computations as realisers as opposed to including all Turing computable functions as is usually the case in realizability constructions. For example, all realisers in the model for LFPL are polynomially bounded computations whence soundness holds by construction of the model. The work then lies in being able to interpret all the required constructs in the model. While being the first entirely semantical proof of polytime soundness for light logi cs, our proof also provides a notable simplification of the original already semantical proof of polytime soundness for LFPL. A new result made possible by the semantic framework is the addition of polymorphism and a modality to LFPL thus allowing for an internal definition of inductive datatypes.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 16:00:10 GMT" }, { "version": "v2", "created": "Fri, 24 Jun 2005 13:20:25 GMT" }, { "version": "v3", "created": "Tue, 25 Oct 2005 15:21:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Lago", "U. Dal", "" ], [ "Hofmann", "M.", "" ] ]
cs/0506081
Gatis Midrijanis
Gatis Midrijanis
Three lines proof of the lower bound for the matrix rigidity
4 pages
null
null
null
cs.CC
null
The rigidity of a matrix describes the minimal number of entries one has to change to reduce matrix's rank to r. We give very simple combinatorial proof of the lower bound for the rigidity of Sylvester (special case of Hadamard) matrix that matches the best known result by de Wolf(2005) for Hadamard matrices proved by quantum information theoretical arguments.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 19:54:48 GMT" }, { "version": "v2", "created": "Mon, 20 Jun 2005 20:12:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Midrijanis", "Gatis", "" ] ]
cs/0506082
Lane A. Hemaspaandra
Piotr Faliszewski and Lane A. Hemaspaandra
Open Questions in the Theory of Semifeasible Computation
null
null
null
URCS-TR-2005-872
cs.CC
null
The study of semifeasible algorithms was initiated by Selman's work a quarter of century ago [Sel79,Sel81,Sel82]. Informally put, this research stream studies the power of those sets L for which there is a deterministic (or in some cases, the function may belong to one of various nondeterministic function classes) polynomial-time function f such that when at least one of x and y belongs to L, then f(x,y) \in L \cap \{x,y\}. The intuition here is that it is saying: ``Regarding membership in L, if you put a gun to my head and forced me to bet on one of x or y as belonging to L, my money would be on f(x,y).'' In this article, we present a number of open problems from the theory of semifeasible algorithms. For each we present its background and review what partial results, if any, are known.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 22:33:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Faliszewski", "Piotr", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
cs/0506084
Jason Holt
Jason E. Holt (BYU)
The One Page Model Checker
12 pages
null
null
null
cs.LO
null
We show how standard IPC mechanisms can be used with the fork() system call to perform explicit state model checking on all interleavings of a multithreaded application. We specifically show how to check for deadlock and race conditions in programs with two threads. Our techniques are easy to apply to other languages, and require only the most rudimentary parsing of the target language. Our fundamental system fits in one page of C code.
[ { "version": "v1", "created": "Wed, 22 Jun 2005 20:54:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Holt", "Jason E.", "", "BYU" ] ]
cs/0506085
Jason Holt
Jason E. Holt (BYU)
On the Job Training
8 pages, submitted to NIPS 2005
null
null
null
cs.LG
null
We propose a new framework for building and evaluating machine learning algorithms. We argue that many real-world problems require an agent which must quickly learn to respond to demands, yet can continue to perform and respond to new training throughout its useful life. We give a framework for how such agents can be built, describe several metrics for evaluating them, and show that subtle changes in system construction can significantly affect agent performance.
[ { "version": "v1", "created": "Wed, 22 Jun 2005 21:21:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Holt", "Jason E.", "", "BYU" ] ]
cs/0506090
Tobias Riege
Tobias Riege, J\"org Rothe
An Exact 2.9416^n Algorithm for the Three Domatic Number Problem
20 pages, 1 figure
null
null
null
cs.CC
null
The three domatic number problem asks whether a given undirected graph can be partitioned into at least three dominating sets, i.e., sets whose closed neighborhood equals the vertex set of the graph. Since this problem is NP-complete, no polynomial-time algorithm is known for it. The naive deterministic algorithm for this problem runs in time 3^n, up to polynomial factors. In this paper, we design an exact deterministic algorithm for this problem running in time 2.9416^n. Thus, our algorithm can handle problem instances of larger size than the naive algorithm in the same amount of time. We also present another deterministic and a randomized algorithm for this problem that both have an even better performance for graphs with small maximum degree.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 12:58:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Riege", "Tobias", "" ], [ "Rothe", "Jörg", "" ] ]
cs/0506092
Simone Alfarano
Thomas Lux
Emergent Statistical Wealth Distributions in Simple Monetary Exchange Models: A Critical Review
null
null
null
null
cs.MA
null
This paper reviews recent attempts at modelling inequality of wealth as an emergent phenomenon of interacting-agent processes. We point out that recent models of wealth condensation which draw their inspiration from molecular dynamics have, in fact, reinvented a process introduced quite some time ago by Angle (1986) in the sociological literature. We emphasize some problematic aspects of simple wealth exchange models and contrast them with a monetary model based on economic principles of market mediated exchange. The paper also reports new results on the influence of market power on the wealth distribution in statistical equilibrium. As it turns out, inequality increases but market power alone is not sufficient for changing the exponential tails of simple exchange models into Pareto tails.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 16:46:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Lux", "Thomas", "" ] ]
cs/0506095
Yi-Dong Shen
Y. D. Shen, Q. Yang, J. H. You and L. Y. Yuan
Deriving a Stationary Dynamic Bayesian Network from a Logic Program with Recursive Loops
29 pages
null
null
null
cs.AI cs.LG cs.LO
null
Recursive loops in a logic program present a challenging problem to the PLP framework. On the one hand, they loop forever so that the PLP backward-chaining inferences would never stop. On the other hand, they generate cyclic influences, which are disallowed in Bayesian networks. Therefore, in existing PLP approaches logic programs with recursive loops are considered to be problematic and thus are excluded. In this paper, we propose an approach that makes use of recursive loops to build a stationary dynamic Bayesian network. Our work stems from an observation that recursive loops in a logic program imply a time sequence and thus can be used to model a stationary dynamic Bayesian network without using explicit time parameters. We introduce a Bayesian knowledge base with logic clauses of the form $A \leftarrow A_1,...,A_l, true, Context, Types$, which naturally represents the knowledge that the $A_i$s have direct influences on $A$ in the context $Context$ under the type constraints $Types$. We then use the well-founded model of a logic program to define the direct influence relation and apply SLG-resolution to compute the space of random variables together with their parental connections. We introduce a novel notion of influence clauses, based on which a declarative semantics for a Bayesian knowledge base is established and algorithms for building a two-slice dynamic Bayesian network from a logic program are developed.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 04:07:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Y. D.", "" ], [ "Yang", "Q.", "" ], [ "You", "J. H.", "" ], [ "Yuan", "L. Y.", "" ] ]
cs/0506097
Samuel Thibault
Samuel Thibault (INRIA Futurs)
A Flexible Thread Scheduler for Hierarchical Multiprocessor Machines
null
null
null
null
cs.DC
null
With the current trend of multiprocessor machines towards more and more hierarchical architectures, exploiting the full computational power requires careful distribution of execution threads and data so as to limit expensive remote memory accesses. Existing multi-threaded libraries provide only limited facilities to let applications express distribution indications, so that programmers end up with explicitly distributing tasks according to the underlying architecture, which is difficult and not portable. In this article, we present: (1) a model for dynamically expressing the structure of the computation; (2) a scheduler interpreting this model so as to make judicious hierarchical distribution decisions; (3) an implementation within the Marcel user-level thread library. We experimented our proposal on a scientific application running on a ccNUMA Bull NovaScale with 16 Intel Itanium II processors; results show a 30% gain compared to a classical scheduler, and are similar to what a handmade scheduler achieves in a non-portable way.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 14:32:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Thibault", "Samuel", "", "INRIA Futurs" ] ]
cs/0506098
Russell Martin
Petra Berenbrink, Tom Friedetzky, Leslie Ann Goldberg, Paul Goldberg, Zengjian Hu, Russell Martin
Distributed Selfish Load Balancing
null
null
null
null
cs.GT math.OC
null
Suppose that a set of $m$ tasks are to be shared as equally as possible amongst a set of $n$ resources. A game-theoretic mechanism to find a suitable allocation is to associate each task with a ``selfish agent'', and require each agent to select a resource, with the cost of a resource being the number of agents to select it. Agents would then be expected to migrate from overloaded to underloaded resources, until the allocation becomes balanced. Recent work has studied the question of how this can take place within a distributed setting in which agents migrate selfishly without any centralized control. In this paper we discuss a natural protocol for the agents which combines the following desirable features: It can be implemented in a strongly distributed setting, uses no central control, and has good convergence properties. For $m\gg n$, the system becomes approximately balanced (an $\epsilon$-Nash equilibrium) in expected time $O(\log\log m)$. We show using a martingale technique that the process converges to a perfectly balanced allocation in expected time $O(\log\log m+n^4)$. We also give a lower bound of $\Omega(\max\{\log\log m,n\})$ for the convergence time.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 14:54:23 GMT" }, { "version": "v2", "created": "Mon, 22 May 2006 18:04:06 GMT" }, { "version": "v3", "created": "Mon, 2 Apr 2007 15:20:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Berenbrink", "Petra", "" ], [ "Friedetzky", "Tom", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Goldberg", "Paul", "" ], [ "Hu", "Zengjian", "" ], [ "Martin", "Russell", "" ] ]
cs/0506099
Yuval Shavitt
Yuval Shavitt and Eran Shir
DIMES: Let the Internet Measure Itself
10 pages, 12 figures
null
null
null
cs.NI
null
Today's Internet maps, which are all collected from a small number of vantage points, are falling short of being accurate. We suggest here a paradigm shift for this task. DIMES is a distributed measurement infrastructure for the Internet that is based on the deployment of thousands of light weight measurement agents around the globe. We describe the rationale behind DIMES deployment, discuss its design trade-offs and algorithmic challenges, and analyze the structure of the Internet as it seen with DIMES.
[ { "version": "v1", "created": "Tue, 28 Jun 2005 20:29:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Shavitt", "Yuval", "" ], [ "Shir", "Eran", "" ] ]
cs/0506100
Satu Elisa Schaeffer
Jiri Sima and Satu Elisa Schaeffer
On the NP-Completeness of Some Graph Cluster Measures
9 pages, no figures
null
null
null
cs.CC
null
Graph clustering is the problem of identifying sparsely connected dense subgraphs (clusters) in a given graph. Proposed clustering algorithms usually optimize various fitness functions that measure the quality of a cluster within the graph. Examples of such cluster measures include the conductance, the local and relative densities, and single cluster editing. We prove that the decision problems associated with the optimization tasks of finding the clusters that are optimal with respect to these fitness measures are NP-complete.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 18:12:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Sima", "Jiri", "" ], [ "Schaeffer", "Satu Elisa", "" ] ]
cs/0506101
Patrick Haffner
Patrick Haffner, Steven Phillips, Rob Schapire
Efficient Multiclass Implementations of L1-Regularized Maximum Entropy
13 pages, describes new conditional maxent algorithm, to be submitted
null
null
null
cs.LG cs.CL
null
This paper discusses the application of L1-regularized maximum entropy modeling or SL1-Max [9] to multiclass categorization problems. A new modification to the SL1-Max fast sequential learning algorithm is proposed to handle conditional distributions. Furthermore, unlike most previous studies, the present research goes beyond a single type of conditional distribution. It describes and compares a variety of modeling assumptions about the class distribution (independent or exclusive) and various types of joint or conditional distributions. It results in a new methodology for combining binary regularized classifiers to achieve multiclass categorization. In this context, Maximum Entropy can be considered as a generic and efficient regularized classification tool that matches or outperforms the state-of-the art represented by AdaBoost and SVMs.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 20:26:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Haffner", "Patrick", "" ], [ "Phillips", "Steven", "" ], [ "Schapire", "Rob", "" ] ]
cs/0506103
Aneta Zwierko
Aneta Zwierko, Zbigniew Kotulski
Security of mobile agents: a new concept of the integrity protection
11 pages, 2 figures
null
null
null
cs.CR
null
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The proposed mechanisms not only secure the compiled program, but also the data, that can be gathered during its "journey". The oldest and the simplest methods are more concentrated on integrity of the code itself and on the detection of unauthorized manipulation. Other, more advanced proposals protect not only the code but also the execution state and the collected data. The paper is divided into two parts. The first one is mostly devoted to different methods of securing the code and protecting its integrity; starting from watermarking and fingerprinting, up to methods designed specially for mobile agent systems: encrypted function, cryptographic traces, time limited black-box security, chained-MAC protocol, publicly-verifiable chained digital signatures The second part presents new concept for providing mobile agents with integrity protection, based on a zero-knowledge proof system.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 22:01:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Zwierko", "Aneta", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0506104
Miroslaw Truszczynski
Z. Lonc, M. Truszczynski
Computing minimal models, stable models and answer sets
55 pages, 1 figure. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO cs.DS
null
We propose and study algorithms to compute minimal models, stable models and answer sets of t-CNF theories, and normal and disjunctive t-programs. We are especially interested in algorithms with non-trivial worst-case performance bounds. The bulk of the paper is concerned with the classes of 2- and 3-CNF theories, and normal and disjunctive 2- and 3-programs, for which we obtain significantly stronger results than those implied by our general considerations. We show that one can find all minimal models of 2-CNF theories and all answer sets of disjunctive 2-programs in time O(m 1.4422..^n). Our main results concern computing stable models of normal 3-programs, minimal models of 3-CNF theories and answer sets of disjunctive 3-programs. We design algorithms that run in time O(m 1.6701..^n), in the case of the first problem, and in time O(mn^2 2.2782..^n), in the case of the latter two. All these bounds improve by exponential factors the best algorithms known previously. We also obtain closely related upper bounds on the number of minimal models, stable models and answer sets a t-CNF theory, a normal t-program or a disjunctive t-program may have. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Thu, 30 Jun 2005 01:51:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Lonc", "Z.", "" ], [ "Truszczynski", "M.", "" ] ]
cs/0506105
Ren-Chiun Wang
Ren-Chiun Wang, Chou-Chen Yang, Kun-Ru Mo
A protected password change protocol
null
null
null
null
cs.CR
null
Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password change protocol. At the same time, authors shall propose a new password change protocol to withstand all the threats of security.
[ { "version": "v1", "created": "Thu, 30 Jun 2005 03:20:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Ren-Chiun", "" ], [ "Yang", "Chou-Chen", "" ], [ "Mo", "Kun-Ru", "" ] ]
cs/0507010
Jiayang Wang
Jiayang Wang
A Study for the Feature Core of Dynamic Reduct
9 pages
null
null
null
cs.AI
null
To the reduct problems of decision system, the paper proposes the notion of dynamic core according to the dynamic reduct model. It describes various formal definitions of dynamic core, and discusses some properties about dynamic core. All of these show that dynamic core possesses the essential characters of the feature core.
[ { "version": "v1", "created": "Tue, 5 Jul 2005 13:02:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Jiayang", "" ] ]
cs/0507012
Adilson Xavier V.
Gilson A. Giraldi, Adilson V. Xavier, Antonio L. Apolinario Jr, Paulo S. Rodrigues
Lattice Gas Cellular Automata for Computational Fluid Animation
null
null
null
null
cs.GR
null
The past two decades showed a rapid growing of physically-based modeling of fluids for computer graphics applications. In this area, a common top down approach is to model the fluid dynamics by Navier-Stokes equations and apply a numerical techniques such as Finite Differences or Finite Elements for the simulation. In this paper we focus on fluid modeling through Lattice Gas Cellular Automata (LGCA) for computer graphics applications. LGCA are discrete models based on point particles that move on a lattice, according to suitable and simple rules in order to mimic a fully molecular dynamics. By Chapman-Enskog expansion, a known multiscale technique in this area, it can be demonstrated that the Navier-Stokes model can be reproduced by the LGCA technique. Thus, with LGCA we get a fluid model that does not require solution of complicated equations. Therefore, we combine the advantage of the low computational cost of LGCA and its ability to mimic the realistic fluid dynamics to develop a new animating framework for computer graphics applications. In this work, we discuss the theoretical elements of our proposal and show experimental results.
[ { "version": "v1", "created": "Tue, 5 Jul 2005 19:48:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "Xavier", "Adilson V.", "" ], [ "Apolinario", "Antonio L.", "Jr" ], [ "Rodrigues", "Paulo S.", "" ] ]
cs/0507013
Mirela Damian
Justin Colannino, Mirela Damian, Ferran Hurtado, John Iacono, Henk Meijer, Suneeta Ramaswami and Godfried Toussaint
An O(n log n)-Time Algorithm for the Restricted Scaffold Assignment
13 pages, 8 figures
null
null
null
cs.CG cs.DM
null
The assignment problem takes as input two finite point sets S and T and establishes a correspondence between points in S and points in T, such that each point in S maps to exactly one point in T, and each point in T maps to at least one point in S. In this paper we show that this problem has an O(n log n)-time solution, provided that the points in S and T are restricted to lie on a line (linear time, if S and T are presorted).
[ { "version": "v1", "created": "Tue, 5 Jul 2005 19:50:11 GMT" }, { "version": "v2", "created": "Tue, 5 Jul 2005 21:26:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Colannino", "Justin", "" ], [ "Damian", "Mirela", "" ], [ "Hurtado", "Ferran", "" ], [ "Iacono", "John", "" ], [ "Meijer", "Henk", "" ], [ "Ramaswami", "Suneeta", "" ], [ "Toussaint", "Godfried", "" ] ]
cs/0507014
Moshe Schwartz
Moshe Schwartz
Isomorphism of graphs-a polynomial test
null
null
null
null
cs.DS
null
An explicit algorithm is presented for testing whether two non-directed graphs are isomorphic or not. It is shown that for a graph of n vertices, the number of n independent operations needed for the test is polynomial in n. A proof that the algorithm actually performs the test is presented.
[ { "version": "v1", "created": "Wed, 6 Jul 2005 11:35:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Schwartz", "Moshe", "" ] ]
cs/0507017
Gregory Gutin
G. Gutin, A. Rafiey, A. Yeo
Minimum Cost and List Homomorphisms to Semicomplete Digraphs
8 pages
null
null
null
cs.DM
null
The following optimization problem was introduced in \cite{gutinDAM}, where it was motivated by a real-world problem in defence logistics. Suppose we are given a pair of digraphs $D,H$ and a positive cost $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$ of $D$ to $H$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. For a fixed digraph $H$, the minimum cost homomorphism problem for $H$, MinHOMP($H$), is stated as follows: For an input digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$, verify whether there is a homomorphism of $D$ to $H$ and, if it exists, find such a homomorphism of minimum cost. We obtain dichotomy classifications of the computational complexity of the list homomorphism problem and MinHOMP($H$), when $H$ is a semicomplete digraph (a digraph in which every two vertices have at least one arc between them). Our dichotomy for the list homomorphism problem coincides with the one obtained by Bang-Jensen, Hell and MacGillivray in 1988 for the homomorphism problem when $H$ is a semicomplete digraph: both problems are polynomial solvable if $H$ has at most one cycle; otherwise, both problems are NP-complete. The dichotomy for \MiP is different: the problem is polynomial time solvable if $H$ is acyclic or $H$ is a cycle of length 2 or 3; otherwise, the problem is NP-hard.
[ { "version": "v1", "created": "Wed, 6 Jul 2005 18:45:50 GMT" }, { "version": "v2", "created": "Wed, 24 Aug 2005 13:31:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Rafiey", "A.", "" ], [ "Yeo", "A.", "" ] ]
cs/0507020
Arnaud Durand
Arnaud Durand, Etienne Grandjean
First-order queries on structures of bounded degree are computable with constant delay
18 pages, 1 figure
null
null
null
cs.LO cs.CC
null
A bounded degree structure is either a relational structure all of whose relations are of bounded degree or a functional structure involving bijective functions only. In this paper, we revisit the complexity of the evaluation problem of not necessarily Boolean first-order queries over structures of bounded degree. Query evaluation is considered here as a dynamical process. We prove that any query on bounded degree structures is $\constantdelaylin$, i.e., can be computed by an algorithm that has two separate parts: it has a precomputation step of linear time in the size of the structure and then, it outputs all tuples one by one with a constant (i.e. depending on the size of the formula only) delay between each. Seen as a global process, this implies that queries on bounded structures can be evaluated in total time $O(f(|\phi|).(|\calS|+|\phi(\calS)|))$ and space $O(f(|\phi|).|\calS|)$ where $\calS$ is the structure, $\phi$ is the formula, $\phi(\calS)$ is the result of the query and $f$ is some function. Among other things, our results generalize a result of \cite{Seese-96} on the data complexity of the model-checking problem for bounded degree structures. Besides, the originality of our approach compared to that \cite{Seese-96} and comparable results is that it does not rely on the Hanf's model-theoretic technic (see \cite{Hanf-65}) and is completely effective.
[ { "version": "v1", "created": "Thu, 7 Jul 2005 09:40:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Durand", "Arnaud", "" ], [ "Grandjean", "Etienne", "" ] ]
cs/0507021
Valmir Barbosa
Renato C. Dutra, Valmir C. Barbosa
Finding routes in anonymous sensor networks
null
Information Processing Letters 98 (2006), 139-144
10.1016/j.ipl.2006.01.001
null
cs.NI
null
We consider networks of anonymous sensors and address the problem of constructing routes for the delivery of information from a group of sensors in response to a query by a sink. In order to circumvent the restrictions imposed by anonymity, we rely on using the power level perceived by the sensors in the query from the sink. We introduce a simple distributed algorithm to achieve the building of routes to the sink and evaluate its performance by means of simulations.
[ { "version": "v1", "created": "Thu, 7 Jul 2005 16:28:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Dutra", "Renato C.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
cs/0507023
Valmir Barbosa
Luis O. Rigo Jr., Valmir C. Barbosa
Two-dimensional cellular automata and the analysis of correlated time series
null
Pattern Recognition Letters 27 (2006), 1353-1360
10.1016/j.patrec.2006.01.005
null
cs.AI
null
Correlated time series are time series that, by virtue of the underlying process to which they refer, are expected to influence each other strongly. We introduce a novel approach to handle such time series, one that models their interaction as a two-dimensional cellular automaton and therefore allows them to be treated as a single entity. We apply our approach to the problems of filling gaps and predicting values in rainfall time series. Computational results show that the new approach compares favorably to Kalman smoothing and filtering.
[ { "version": "v1", "created": "Fri, 8 Jul 2005 12:47:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Rigo", "Luis O.", "Jr." ], [ "Barbosa", "Valmir C.", "" ] ]
cs/0507024
Anne-Marie Vercoustre
Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse (INRIA Rocquencourt / INRIA Sophia Antipolis), Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis)
Experiments in Clustering Homogeneous XML Documents to Validate an Existing Typology
(postprint); This version corrects a couple of errors in authors' names in the bibliography
null
null
null
cs.IR
null
This paper presents some experiments in clustering homogeneous XMLdocuments to validate an existing classification or more generally anorganisational structure. Our approach integrates techniques for extracting knowledge from documents with unsupervised classification (clustering) of documents. We focus on the feature selection used for representing documents and its impact on the emerging classification. We mix the selection of structured features with fine textual selection based on syntactic characteristics.We illustrate and evaluate this approach with a collection of Inria activity reports for the year 2003. The objective is to cluster projects into larger groups (Themes), based on the keywords or different chapters of these activity reports. We then compare the results of clustering using different feature selections, with the official theme structure used by Inria.
[ { "version": "v1", "created": "Fri, 8 Jul 2005 13:42:42 GMT" }, { "version": "v2", "created": "Tue, 9 Aug 2005 13:52:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Despeyroux", "Thierry", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Lechevallier", "Yves", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Trousse", "Brigitte", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Vercoustre", "Anne-Marie", "", "INRIA\n Rocquencourt / INRIA Sophia Antipolis" ] ]
cs/0507027
Lane A. Hemaspaandra
Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg Rothe
Anyone but Him: The Complexity of Precluding an Alternative
Preliminary version appeared in AAAI '05. Also appears as URCS-TR-2005-873
null
null
null
cs.GT cs.CC cs.MA
null
Preference aggregation in a multiagent setting is a central issue in both human and computer contexts. In this paper, we study in terms of complexity the vulnerability of preference aggregation to destructive control. That is, we study the ability of an election's chair to, through such mechanisms as voter/candidate addition/suppression/partition, ensure that a particular candidate (equivalently, alternative) does not win. And we study the extent to which election systems can make it impossible, or computationally costly (NP-complete), for the chair to execute such control. Among the systems we study--plurality, Condorcet, and approval voting--we find cases where systems immune or computationally resistant to a chair choosing the winner nonetheless are vulnerable to the chair blocking a victory. Beyond that, we see that among our studied systems no one system offers the best protection against destructive control. Rather, the choice of a preference aggregation system will depend closely on which types of control one wishes to be protected against. We also find concrete cases where the complexity of or susceptibility to control varies dramatically based on the choice among natural tie-handling rules.
[ { "version": "v1", "created": "Sat, 9 Jul 2005 18:20:00 GMT" }, { "version": "v2", "created": "Sun, 17 Jul 2005 23:01:02 GMT" }, { "version": "v3", "created": "Thu, 28 Jul 2005 15:20:07 GMT" }, { "version": "v4", "created": "Thu, 16 Mar 2006 16:51:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/0507028
Robert Milson
Robert Milson, Aaron Krowne
Adapting CBPP platforms for instructional use
Will be presented at the 2005, Emory university symposium on Free Culture and the Digital Library
null
null
null
cs.DL cs.HC
null
Commons based peer-production (CBPP) is the de-centralized, net-based approach to the creation and dissemination of information resources. Underlying every CBPP system is a virtual community brought together by an internet tool (such as a web site) and structured by a specific collaboration protocol. In this talk we will argue that the value of such platforms can be leveraged by adapting them for pedagogical purposes. We report on one such recent adaptation. The Noosphere system is a web-based collaboration environment that underlies the popular Planetmath website, a collaboratively written encyclopedia of mathematics licensed under the GNU Free Documentation License (FDL). Recently, the system was used to host a graduate-level mathematics course at Dalhousie University, in Halifax, Canada. The course consisted of regular lectures and assignment problems. The students in the course collaborated on a set of course notes, encapsulating the lecture content and giving solutions of assigned problems. The successful outcome of this experiment demonstrated that a dedicated Noosphere system is well suited for classroom applications. We argue that this ``proof of concept'' experience also strongly suggests that every successful CBPP platform possesses latent pedagogical value.
[ { "version": "v1", "created": "Sun, 10 Jul 2005 19:05:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Milson", "Robert", "" ], [ "Krowne", "Aaron", "" ] ]
cs/0507030
G\"unter Rote
Imre Barany and Guenter Rote
Strictly convex drawings of planar graphs
20 pages, 13 figures. to be published in Documenta Mathematica. The revision includes numerous small additions, corrections, and improvements, in particular: - a discussion of the constants in the O-notation, after the statement of thm.1. - a different set-up and clarification of the case distinction for Lemma 1
DOCUMENTA MATHEMATICA, Vol. 11 (2006), 369-391
null
null
cs.CG cs.DM
null
Every three-connected planar graph with n vertices has a drawing on an O(n^2) x O(n^2) grid in which all faces are strictly convex polygons. These drawings are obtained by perturbing (not strictly) convex drawings on O(n) x O(n) grids. More generally, a strictly convex drawing exists on a grid of size O(W) x O(n^4/W), for any choice of a parameter W in the range n<W<n^2. Tighter bounds are obtained when the faces have fewer sides. In the proof, we derive an explicit lower bound on the number of primitive vectors in a triangle.
[ { "version": "v1", "created": "Mon, 11 Jul 2005 20:06:06 GMT" }, { "version": "v2", "created": "Wed, 21 Jun 2006 10:01:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Barany", "Imre", "" ], [ "Rote", "Guenter", "" ] ]
cs/0507033
Marco Cuturi
Marco Cuturi, Kenji Fukumizu
Multiresolution Kernels
8 pages
null
null
null
cs.LG
null
We present in this work a new methodology to design kernels on data which is structured with smaller components, such as text, images or sequences. This methodology is a template procedure which can be applied on most kernels on measures and takes advantage of a more detailed "bag of components" representation of the objects. To obtain such a detailed description, we consider possible decompositions of the original bag into a collection of nested bags, following a prior knowledge on the objects' structure. We then consider these smaller bags to compare two objects both in a detailed perspective, stressing local matches between the smaller bags, and in a global or coarse perspective, by considering the entire bag. This multiresolution approach is likely to be best suited for tasks where the coarse approach is not precise enough, and where a more subtle mixture of both local and global similarities is necessary to compare objects. The approach presented here would not be computationally tractable without a factorization trick that we introduce before presenting promising results on an image retrieval task.
[ { "version": "v1", "created": "Wed, 13 Jul 2005 05:45:28 GMT" }, { "version": "v2", "created": "Mon, 14 Nov 2005 08:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Cuturi", "Marco", "" ], [ "Fukumizu", "Kenji", "" ] ]
cs/0507034
Ittai Abraham
Ittai Abraham and Dahlia Malkhi and Gurmeet Singh Manku
Papillon: Greedy Routing in Rings
null
null
null
null
cs.DC cs.NI
null
We study {\sc greedy} routing over $n$ nodes placed in a ring, with the \emph{distance} between two nodes defined to be the clockwise or the absolute distance between them along the ring. Such graphs arise in the context of modeling social networks and in routing networks for peer-to-peer systems. We construct the first network over $n$ nodes in which {\sc greedy} routing takes $O(\log n / \log d)$ hops in the worst-case, with $d$ out-going links per node. Our result has the first asymptotically optimal greedy routing complexity. Previous constructions required $O(\frac{\log^2 n}{d})$ hops.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 00:34:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ittai", "" ], [ "Malkhi", "Dahlia", "" ], [ "Manku", "Gurmeet Singh", "" ] ]
cs/0507035
Yi-Dong Shen
Yi-Dong Shen, Jia-Huai You and Li-Yan Yuan
Enhancing Global SLS-Resolution with Loop Cutting and Tabling Mechanisms
null
Theoretical Computer Science 328(3):271-287, 2004
null
null
cs.LO cs.AI
null
Global SLS-resolution is a well-known procedural semantics for top-down computation of queries under the well-founded model. It inherits from SLDNF-resolution the {\em linearity} property of derivations, which makes it easy and efficient to implement using a simple stack-based memory structure. However, like SLDNF-resolution it suffers from the problem of infinite loops and redundant computations. To resolve this problem, in this paper we develop a new procedural semantics, called {\em SLTNF-resolution}, by enhancing Global SLS-resolution with loop cutting and tabling mechanisms. SLTNF-resolution is sound and complete w.r.t. the well-founded semantics for logic programs with the bounded-term-size property, and is superior to existing linear tabling procedural semantics such as SLT-resolution.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 08:24:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Yi-Dong", "" ], [ "You", "Jia-Huai", "" ], [ "Yuan", "Li-Yan", "" ] ]
cs/0507036
Martin Sulzmann
Peter J Stuckey, Martin Sulzmann, Jeremy Wazny
Improved Inference for Checking Annotations
null
null
null
null
cs.PL cs.LO
null
We consider type inference in the Hindley/Milner system extended with type annotations and constraints with a particular focus on Haskell-style type classes. We observe that standard inference algorithms are incomplete in the presence of nested type annotations. To improve the situation we introduce a novel inference scheme for checking type annotations. Our inference scheme is also incomplete in general but improves over existing implementations as found e.g. in the Glasgow Haskell Compiler (GHC). For certain cases (e.g. Haskell 98) our inference scheme is complete. Our approach has been fully implemented as part of the Chameleon system (experimental version of Haskell).
[ { "version": "v1", "created": "Thu, 14 Jul 2005 08:47:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Stuckey", "Peter J", "" ], [ "Sulzmann", "Martin", "" ], [ "Wazny", "Jeremy", "" ] ]
cs/0507037
Martin Sulzmann
Peter J. Stuckey, Martin Sulzmann
Type Inference for Guarded Recursive Data Types
null
null
null
null
cs.PL cs.LO
null
We consider type inference for guarded recursive data types (GRDTs) -- a recent generalization of algebraic data types. We reduce type inference for GRDTs to unification under a mixed prefix. Thus, we obtain efficient type inference. Inference is incomplete because the set of type constraints allowed to appear in the type system is only a subset of those type constraints generated by type inference. Hence, inference only succeeds if the program is sufficiently type annotated. We present refined procedures to infer types incrementally and to assist the user in identifying which pieces of type information are missing. Additionally, we introduce procedures to test if a type is not principal and to find a principal type if one exists.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 08:58:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Stuckey", "Peter J.", "" ], [ "Sulzmann", "Martin", "" ] ]
cs/0507038
Zvi Lotker
Khaled Elbassioni, Zvi Lotker, Raimund Seidel
Upper Bound on the Number of Vertices of Polyhedra with $0,1$-Constraint Matrices
3 pages
null
null
null
cs.CG
null
In this note we show that the maximum number of vertices in any polyhedron $P=\{x\in \mathbb{R}^d : Ax\leq b\}$ with $0,1$-constraint matrix $A$ and a real vector $b$ is at most $d!$.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 18:45:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Elbassioni", "Khaled", "" ], [ "Lotker", "Zvi", "" ], [ "Seidel", "Raimund", "" ] ]
cs/0507042
Richard McClatchey
Florida Estrella, Richard McClatchey, Dmitry Rogulin
The MammoGrid Virtual Organisation - Federating Distributed Mammograms
^ pages, 3 figures, 2 tables
null
null
Medical Informatics Europe MIE2005 paper publication
cs.DC cs.DB
null
The MammoGrid project aims to deliver a prototype which enables the effective collaboration between radiologists using grid, service-orientation and database solutions. The grid technologies and service-based database management solution provide the platform for integrating diverse and distributed resources, creating what is called a virtual organisation. The MammoGrid Virtual Organisation facilitates the sharing and coordinated access to mammography data, medical imaging software and computing resources of participating hospitals. Hospitals manage their local database of mammograms, but in addition, radiologists who are part of this organisation can share mammograms, reports, results and image analysis software. The MammoGrid Virtual Organisation is a federation of autonomous multi-centres sites which transcends national boundaries. This paper outlines the service-based approach in the creation and management of the federated distributed mammography database and discusses the role of virtual organisations in distributed image analysis.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 12:17:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Estrella", "Florida", "" ], [ "McClatchey", "Richard", "" ], [ "Rogulin", "Dmitry", "" ] ]
cs/0507043
Yuan Feng
Yuan Feng, Runyao Duan, Zhengfeng Ji, and Mingsheng Ying
Proof rules for purely quantum programs
Now 12 pages, introduction and Section 3 rewritten, some errors corrected
null
null
null
cs.PL quant-ph
null
We apply the notion of quantum predicate proposed by D'Hondt and Panangaden to analyze a purely quantum language fragment which describes the quantum part of a future quantum computer in Knill's architecture. The denotational semantics, weakest precondition semantics, and weakest liberal precondition semantics of this language fragment are introduced. To help reasoning about quantum programs involving quantum loops, we extend proof rules for classical probabilistic programs to our purely quantum programs.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 13:06:13 GMT" }, { "version": "v2", "created": "Mon, 1 Aug 2005 16:08:40 GMT" }, { "version": "v3", "created": "Thu, 16 Mar 2006 08:24:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Feng", "Yuan", "" ], [ "Duan", "Runyao", "" ], [ "Ji", "Zhengfeng", "" ], [ "Ying", "Mingsheng", "" ] ]
cs/0507044
Marcus Hutter
Jan Poland and Marcus Hutter
Defensive Universal Learning with Experts
15 LaTeX pages
Proc. 16th International Conf. on Algorithmic Learning Theory (ALT 2005) 356-370
null
IDSIA-15-05
cs.LG
null
This paper shows how universal learning can be achieved with expert advice. To this aim, we specify an experts algorithm with the following characteristics: (a) it uses only feedback from the actions actually chosen (bandit setup), (b) it can be applied with countably infinite expert classes, and (c) it copes with losses that may grow in time appropriately slowly. We prove loss bounds against an adaptive adversary. From this, we obtain a master algorithm for "reactive" experts problems, which means that the master's actions may influence the behavior of the adversary. Our algorithm can significantly outperform standard experts algorithms on such problems. Finally, we combine it with a universal expert class. The resulting universal learner performs -- in a certain sense -- almost as well as any computable strategy, for any online decision problem. We also specify the (worst-case) convergence speed, which is very slow.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 14:33:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Poland", "Jan", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0507046
Dmitri Krioukov
Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley
Revisiting Internet AS-level Topology Discovery
null
PAM 2005; LNCS 3431, p. 177, 2005
10.1007/b135479
null
cs.NI
null
The development of veracious models of the Internet topology has received a lot of attention in the last few years. Many proposed models are based on topologies derived from RouteViews BGP table dumps (BTDs). However, BTDs do not capture all AS-links of the Internet topology and most importantly the number of the hidden AS-links is unknown, resulting in AS-graphs of questionable quality. As a first step to address this problem, we introduce a new AS-topology discovery methodology that results in more complete and accurate graphs. Moreover, we use data available from existing measurement facilities, circumventing the burden of additional measurement infrastructure. We deploy our methodology and construct an AS-topology that has at least 61.5% more AS-links than BTD-derived AS-topologies we examined. Finally, we analyze the temporal and topological properties of the augmented graph and pinpoint the differences from BTD-derived AS-topologies.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 07:15:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Krioukov", "Dmitri", "" ], [ "Riley", "George", "" ] ]
cs/0507047
Dmitri Krioukov
Xenofontas Dimitropoulos, Dmitri Krioukov, Bradley Huffaker, kc claffy, George Riley
Inferring AS Relationships: Dead End or Lively Beginning?
null
WEA 2005; LNCS 3503, p. 113, 2005
10.1007/11427186_12
null
cs.NI cs.DS
null
Recent techniques for inferring business relationships between ASs have yielded maps that have extremely few invalid BGP paths in the terminology of Gao. However, some relationships inferred by these newer algorithms are incorrect, leading to the deduction of unrealistic AS hierarchies. We investigate this problem and discover what causes it. Having obtained such insight, we generalize the problem of AS relationship inference as a multiobjective optimization problem with node-degree-based corrections to the original objective function of minimizing the number of invalid paths. We solve the generalized version of the problem using the semidefinite programming relaxation of the MAX2SAT problem. Keeping the number of invalid paths small, we obtain a more veracious solution than that yielded by recent heuristics.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 09:32:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Krioukov", "Dmitri", "" ], [ "Huffaker", "Bradley", "" ], [ "claffy", "kc", "" ], [ "Riley", "George", "" ] ]
cs/0507049
David Eppstein
David Eppstein, Michael T. Goodrich, Jonathan Z. Sun
The Skip Quadtree: A Simple Dynamic Data Structure for Multidimensional Data
12 pages, 3 figures. A preliminary version of this paper appeared in the 21st ACM Symp. Comp. Geom., Pisa, 2005, pp. 296-305
null
null
null
cs.CG
null
We present a new multi-dimensional data structure, which we call the skip quadtree (for point data in R^2) or the skip octree (for point data in R^d, with constant d>2). Our data structure combines the best features of two well-known data structures, in that it has the well-defined "box"-shaped regions of region quadtrees and the logarithmic-height search and update hierarchical structure of skip lists. Indeed, the bottom level of our structure is exactly a region quadtree (or octree for higher dimensional data). We describe efficient algorithms for inserting and deleting points in a skip quadtree, as well as fast methods for performing point location and approximate range queries.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 20:17:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Sun", "Jonathan Z.", "" ] ]
cs/0507050
David Eppstein
Lars Arge, David Eppstein, Michael T. Goodrich
Skip-Webs: Efficient Distributed Data Structures for Multi-Dimensional Data Sets
8 pages, 4 figures. Appearing at 24th ACM SIGACT-SIGOPS Symp. Principles of Distributed Computing (PODC 2005), Las Vegas
null
null
null
cs.DC cs.CG cs.DS
null
We present a framework for designing efficient distributed data structures for multi-dimensional data. Our structures, which we call skip-webs, extend and improve previous randomized distributed data structures, including skipnets and skip graphs. Our framework applies to a general class of data querying scenarios, which include linear (one-dimensional) data, such as sorted sets, as well as multi-dimensional data, such as d-dimensional octrees and digital tries of character strings defined over a fixed alphabet. We show how to perform a query over such a set of n items spread among n hosts using O(log n / log log n) messages for one-dimensional data, or O(log n) messages for fixed-dimensional data, while using only O(log n) space per host. We also show how to make such structures dynamic so as to allow for insertions and deletions in O(log n) messages for quadtrees, octrees, and digital tries, and O(log n / log log n) messages for one-dimensional data. Finally, we show how to apply a blocking strategy to skip-webs to further improve message complexity for one-dimensional data when hosts can store more data.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 20:30:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Arge", "Lars", "" ], [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ] ]
cs/0507053
David Eppstein
David Eppstein
Nonrepetitive Paths and Cycles in Graphs with Application to Sudoku
17 pages, 11 figures
null
null
null
cs.DS cs.AI
null
We provide a simple linear time transformation from a directed or undirected graph with labeled edges to an unlabeled digraph, such that paths in the input graph in which no two consecutive edges have the same label correspond to paths in the transformed graph and vice versa. Using this transformation, we provide efficient algorithms for finding paths and cycles with no two consecutive equal labels. We also consider related problems where the paths and cycles are required to be simple; we find efficient algorithms for the undirected case of these problems but show the directed case to be NP-complete. We apply our path and cycle finding algorithms in a program for generating and solving Sudoku puzzles, and show experimentally that they lead to effective puzzle-solving rules that may also be of interest to human Sudoku puzzle solvers.
[ { "version": "v1", "created": "Wed, 20 Jul 2005 15:58:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
cs/0507054
Andrey Siver S.
A. S. Siver
f2mma: FORTRAN to Mathematica translator
null
null
null
null
cs.OH
null
f2mma program can be used to translate programs written in some subset of the FORTRAN language into {\sl Mathematica} system's programming language. This subset have been enough to translate GAPP (Global Analysis of Particle Properties) programm into {\sl Mathematica} language automatically. Observables table calculated with GAPP({\sl Mathematica}) is presented.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 13:32:15 GMT" }, { "version": "v2", "created": "Tue, 2 Aug 2005 06:48:26 GMT" }, { "version": "v3", "created": "Fri, 5 Aug 2005 09:26:15 GMT" }, { "version": "v4", "created": "Mon, 23 Jan 2006 14:27:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Siver", "A. S.", "" ] ]
cs/0507055
Andrey Siver S.
A. S. Siver
ReacProc: A Tool to Process Reactions Describing Particle Interactions
5 pages
null
null
null
cs.CE
null
ReacProc is a program written in C/C++ programming language which can be used (1) to check out of reactions describing particles interactions against conservation laws and (2) to reduce input reaction into some canonical form. A table with particles properties is available within ReacProc package.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 14:17:47 GMT" }, { "version": "v2", "created": "Tue, 2 Aug 2005 07:14:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Siver", "A. S.", "" ] ]
cs/0507056
Christopher Lee
Candace L. Sidner, Christopher Lee, Cory Kidd, Neal Lesh, Charles Rich
Explorations in engagement for humans and robots
31 pages, 5 figures, 3 tables
Artificial Intelligence, volume 166, issues 1-2, August 2005, pp. 140-164
null
MERL TR2005-017
cs.AI cs.CL cs.RO
null
This paper explores the concept of engagement, the process by which individuals in an interaction start, maintain and end their perceived connection to one another. The paper reports on one aspect of engagement among human interactors--the effect of tracking faces during an interaction. It also describes the architecture of a robot that can participate in conversational, collaborative interactions with engagement gestures. Finally, the paper reports on findings of experiments with human participants who interacted with a robot when it either performed or did not perform engagement gestures. Results of the human-robot studies indicate that people become engaged with robots: they direct their attention to the robot more often in interactions where engagement gestures are present, and they find interactions more appropriate when engagement gestures are present than when they are not.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 21:56:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidner", "Candace L.", "" ], [ "Lee", "Christopher", "" ], [ "Kidd", "Cory", "" ], [ "Lesh", "Neal", "" ], [ "Rich", "Charles", "" ] ]
cs/0507057
Tereza Tu\v{s}arov\'a
Tereza Tusarova
A new sibling of BQP
extended abstract, submitted to UC'05
null
null
null
cs.CC
null
We present a new quantum complexity class, called MQ^2, which is contained in AWPP. This class has a compact and simple mathematical definition, involving only polynomial-time computable functions and a unitarity condition. It contains both Deutsch-Jozsa's and Shor's algorithm, while its relation to BQP is unknown. This shows that in the complexity class hierarchy, BQP is not an extraordinary isolated island, but has ''siblings'' which as well can solve prime-factorization.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 22:36:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Tusarova", "Tereza", "" ] ]
cs/0507058
Emanuel Diamant
Emanuel Diamant
Paving the Way for Image Understanding: A New Kind of Image Decomposition is Desired
14th Scandinavian Conference on Image Analysis (SCIA 2005)
LNCS vol. 3540, pp. 17-24, Springer Verlag, 2005
null
null
cs.CV
null
In this paper we present an unconventional image segmentation approach which is devised to meet the requirements of image understanding and pattern recognition tasks. Generally image understanding assumes interplay of two sub-processes: image information content discovery and image information content interpretation. Despite of its widespread use, the notion of "image information content" is still ill defined, intuitive, and ambiguous. Most often, it is used in the Shannon's sense, which means information content assessment averaged over the whole signal ensemble. Humans, however,rarely resort to such estimates. They are very effective in decomposing images into their meaningful constituents and focusing attention to the perceptually relevant image parts. We posit that following the latest findings in human attention vision studies and the concepts of Kolmogorov's complexity theory an unorthodox segmentation approach can be proposed that provides effective image decomposition to information preserving image fragments well suited for subsequent image interpretation. We provide some illustrative examples, demonstrating effectiveness of this approach.
[ { "version": "v1", "created": "Fri, 22 Jul 2005 12:18:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
cs/0507059
M. Magdalena Ortiz de la Fuente
M. Magdalena Ortiz de la Fuente, Diego Calvanese, Thomas Eiter and Enrico Franconi
Data complexity of answering conjunctive queries over SHIQ knowledge bases
Technical Report, 22 pages
null
null
null
cs.LO cs.AI cs.CC
null
An algorithm for answering conjunctive queries over SHIQ knowledge bases that is coNP in data complexity is given. The algorithm is based on the tableau algorithm for reasoning with individuals in SHIQ. The blocking conditions of the tableau are weakened in such a way that the set of models the modified algorithm yields suffices to check query entailment. The modified blocking conditions are based on the ones proposed by Levy and Rousset for reasoning with Horn Rules in the description logic ALCNR.
[ { "version": "v1", "created": "Fri, 22 Jul 2005 15:43:07 GMT" } ]
2007-05-23T00:00:00
[ [ "de la Fuente", "M. Magdalena Ortiz", "" ], [ "Calvanese", "Diego", "" ], [ "Eiter", "Thomas", "" ], [ "Franconi", "Enrico", "" ] ]
cs/0507061
Andre Adrian
Andre Adrian
Software Architecture Overview
9 pages, version 23jul2005
null
null
null
cs.SE
null
What is Software Architecture? The rules, paradigmen, pattern that help to construct, build and test a serious piece of software. It is the practical experience boiled down to abstract level. Software Architecture builds on System Engineering and the scientific method as established by Galileo Galilei: Measure what you can and make measureable what you can not. The experiment (test) is more important then the deduction. Pieces of information about software architecture are all over the internet. This paper uses citation as much as possible. The aim is to bring together an overview, not to rephrase the wording.
[ { "version": "v1", "created": "Sun, 24 Jul 2005 09:43:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Adrian", "Andre", "" ] ]
cs/0507062
Jan Poland
Jan Poland
FPL Analysis for Adaptive Bandits
null
null
null
null
cs.LG
null
A main problem of "Follow the Perturbed Leader" strategies for online decision problems is that regret bounds are typically proven against oblivious adversary. In partial observation cases, it was not clear how to obtain performance guarantees against adaptive adversary, without worsening the bounds. We propose a conceptually simple argument to resolve this problem. Using this, a regret bound of O(t^(2/3)) for FPL in the adversarial multi-armed bandit problem is shown. This bound holds for the common FPL variant using only the observations from designated exploration rounds. Using all observations allows for the stronger bound of O(t^(1/2)), matching the best bound known so far (and essentially the known lower bound) for adversarial bandits. Surprisingly, this variant does not even need explicit exploration, it is self-stabilizing. However the sampling probabilities have to be either externally provided or approximated to sufficient accuracy, using O(t^2 log t) samples in each step.
[ { "version": "v1", "created": "Tue, 26 Jul 2005 05:00:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Poland", "Jan", "" ] ]
cs/0507064
Isabelle Gnaedig
Isabelle Gnaedig and Helene Kirchner
Termination of rewriting strategies: a generic approach
49 pages
null
null
null
cs.LO
null
We propose a generic termination proof method for rewriting under strategies, based on an explicit induction on the termination property. Rewriting trees on ground terms are modeled by proof trees, generated by alternatively applying narrowing and abstracting steps. The induction principle is applied through the abstraction mechanism, where terms are replaced by variables representing any of their normal forms. The induction ordering is not given a priori, but defined with ordering constraints, incrementally set during the proof. Abstraction constraints can be used to control the narrowing mechanism, well known to easily diverge. The generic method is then instantiated for the innermost, outermost and local strategies.
[ { "version": "v1", "created": "Tue, 26 Jul 2005 20:18:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Gnaedig", "Isabelle", "" ], [ "Kirchner", "Helene", "" ] ]
cs/0507065
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
A Fast Greedy Algorithm for Outlier Mining
11 pages
null
null
Tr-05-0406
cs.DB cs.AI
null
The task of outlier detection is to find small groups of data objects that are exceptional when compared with rest large amount of data. In [38], the problem of outlier detection in categorical data is defined as an optimization problem and a local-search heuristic based algorithm (LSA) is presented. However, as is the case with most iterative type algorithms, the LSA algorithm is still very time-consuming on very large datasets. In this paper, we present a very fast greedy algorithm for mining outliers under the same optimization model. Experimental results on real datasets and large synthetic datasets show that: (1) Our algorithm has comparable performance with respect to those state-of-art outlier detection algorithms on identifying true outliers and (2) Our algorithm can be an order of magnitude faster than LSA algorithm.
[ { "version": "v1", "created": "Wed, 27 Jul 2005 02:14:02 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0507066
Atul Chaturvedi Mr.
Sunder Lal and Atul Chaturvedi (Department of Mathematics Institute of Basic Science)
Authentication Schemes Using Braid Groups
6 pages, 2 figures
null
null
null
cs.CR cs.CY
null
In this paper we proposed two identification schemes based on the root problem. The proposed schemes are secure against passive attacks assuming that the root problem (RP) is hard in braid groups.
[ { "version": "v1", "created": "Wed, 27 Jul 2005 10:14:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lal", "Sunder", "", "Department of Mathematics Institute of\n Basic Science" ], [ "Chaturvedi", "Atul", "", "Department of Mathematics Institute of\n Basic Science" ] ]
cs/0507067
Diego Calvanese
Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini
Conjunctive Query Containment and Answering under Description Logics Constraints
null
null
null
null
cs.DB cs.AI
null
Query containment and query answering are two important computational tasks in databases. While query answering amounts to compute the result of a query over a database, query containment is the problem of checking whether for every database, the result of one query is a subset of the result of another query. In this paper, we deal with unions of conjunctive queries, and we address query containment and query answering under Description Logic constraints. Every such constraint is essentially an inclusion dependencies between concepts and relations, and their expressive power is due to the possibility of using complex expressions, e.g., intersection and difference of relations, special forms of quantification, regular expressions over binary relations, in the specification of the dependencies. These types of constraints capture a great variety of data models, including the relational, the entity-relationship, and the object-oriented model, all extended with various forms of constraints, and also the basic features of the ontology languages used in the context of the Semantic Web. We present the following results on both query containment and query answering. We provide a method for query containment under Description Logic constraints, thus showing that the problem is decidable, and analyze its computational complexity. We prove that query containment is undecidable in the case where we allow inequalities in the right-hand side query, even for very simple constraints and queries. We show that query answering under Description Logic constraints can be reduced to query containment, and illustrate how such a reduction provides upper bound results with respect to both combined and data complexity.
[ { "version": "v1", "created": "Thu, 28 Jul 2005 08:25:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Calvanese", "Diego", "" ], [ "De Giacomo", "Giuseppe", "" ], [ "Lenzerini", "Maurizio", "" ] ]