id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0507070
Anne-Marie Vercoustre
Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre
Hybrid XML Retrieval: Combining Information Retrieval and a Native XML Database
Postprint version. The editor version can be accessed through the DOI
null
10.1007/s10791-005-0748-1
null
cs.IR
null
This paper investigates the impact of three approaches to XML retrieval: using Zettair, a full-text information retrieval system; using eXist, a native XML database; and using a hybrid system that takes full article answers from Zettair and uses eXist to extract elements from those articles. For the content-only topics, we undertake a preliminary analysis of the INEX 2003 relevance assessments in order to identify the types of highly relevant document components. Further analysis identifies two complementary sub-cases of relevance assessments ("General" and "Specific") and two categories of topics ("Broad" and "Narrow"). We develop a novel retrieval module that for a content-only topic utilises the information from the resulting answer list of a native XML database and dynamically determines the preferable units of retrieval, which we call "Coherent Retrieval Elements". The results of our experiments show that -- when each of the three systems is evaluated against different retrieval scenarios (such as different cases of relevance assessments, different topic categories and different choices of evaluation metrics) -- the XML retrieval systems exhibit varying behaviour and the best performance can be reached for different values of the retrieval parameters. In the case of INEX 2003 relevance assessments for the content-only topics, our newly developed hybrid XML retrieval system is substantially more effective than either Zettair or eXist, and yields a robust and a very effective XML retrieval.
[ { "version": "v1", "created": "Thu, 28 Jul 2005 19:19:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Pehcevski", "Jovan", "", "RMIT" ], [ "Thom", "James A.", "", "RMIT" ], [ "Vercoustre", "Anne-Marie", "" ] ]
cs/0507071
Andreas U. Schmidt
Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt
Security for Distributed Web-Applications via Aspect-Oriented Programming
Refereed contribution to the Conference Information Security South Africa (ISSA 2005) Sandton, South Africa, 29. June - 1. July 2005
null
null
null
cs.CR
null
Identity Management is becoming more and more important in business systems as they are opened for third parties including trading partners, consumers and suppliers. This paper presents an approach securing a system without any knowledge of the system source code. The security module adds to the existing system authentication and authorisation based on aspect oriented programming and the liberty alliance framework, an upcoming industrie standard providing single sign on. In an initial training phase the module is adapted to the application which is to be secured. Moreover the use of hardware tokens and proactive computing is demonstrated. The high modularisation is achived through use of AspectJ, a programming language extension of Java.
[ { "version": "v1", "created": "Fri, 29 Jul 2005 10:44:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Rauch", "Thomas", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0507072
Matthew Leslie
Matthew Leslie
Reliable Data Storage in Distributed Hash Tables
null
null
null
null
cs.DC cs.NI
null
Distributed Hash Tables offer a resilient lookup service for unstable distributed environments. Resilient data storage, however, requires additional data replication and maintenance algorithms. These algorithms can have an impact on both the performance and the scalability of the system. In this paper, we describe the goals and design space of these replication algorithms. We examine an existing replication algorithm, and present a new analysis of its reliability. We then present a new dynamic replication algorithm which can operate in unstable environments. We give several possible replica placement strategies for this algorithm, and show how they impact reliability and performance. Finally we compare all replication algorithms through simulation, showing quantitatively the difference between their bandwidth use, fault tolerance and performance.
[ { "version": "v1", "created": "Fri, 29 Jul 2005 16:54:00 GMT" }, { "version": "v2", "created": "Fri, 29 Jul 2005 21:49:19 GMT" }, { "version": "v3", "created": "Tue, 2 Aug 2005 22:47:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Leslie", "Matthew", "" ] ]
cs/0507073
Michel Dagenais
Michel R. Dagenais (Dept. of Computer Engineering, Ecole Polytechnique, Montreal, Canada) Karim Yaghmour (Opersys, Montreal, Canada) Charles Levert (Ericsson Research, Montreal, Canada) Makan Pourzandi (Ericsson Research, Montreal, Canada)
Software Performance Analysis
null
null
null
null
cs.PF cs.OS
null
The key to speeding up applications is often understanding where the elapsed time is spent, and why. This document reviews in depth the full array of performance analysis tools and techniques available on Linux for this task, from the traditional tools like gcov and gprof, to the more advanced tools still under development like oprofile and the Linux Trace Toolkit. The focus is more on the underlying data collection and processing algorithms, and their overhead and precision, than on the cosmetic details of the graphical user interface frontends.
[ { "version": "v1", "created": "Fri, 29 Jul 2005 19:33:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Dagenais", "Michel R.", "", "Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada" ], [ "Yaghmour", "Karim", "", "Opersys, Montreal, Canada" ], [ "Levert", "Charles", "", "Ericsson Research, Montreal, Canada" ], [ "Pourzandi", "Makan", "", "Ericsson Research, Montreal, Canada" ] ]
cs/0508002
Adilson Xavier V.
Gilson A. Giraldi, Luis C. da Costa, Adilson V. Xavier, Paulo S. Rodrigues
Methods for Analytical Understanding of Agent-Based Modeling of Complex Systems
null
null
null
null
cs.GR
null
Von Neuman's work on universal machines and the hardware development have allowed the simulation of dynamical systems through a large set of interacting agents. This is a bottom-up approach which tries to derive global properties of a complex system through local interaction rules and agent behaviour. Traditionally, such systems are modeled and simulated through top-down methods based on differential equations. Agent-Based Modeling has the advantage of simplicity and low computational cost. However, unlike differential equations, there is no standard way to express agent behaviour. Besides, it is not clear how to analytically predict the results obtained by the simulation. In this paper we survey some of these methods. For expressing agent behaviour formal methods, like Stochastic Process Algebras have been used. Such approach is useful if the global properties of interest can be expressed as a function of stochastic time series. However, if space variables must be considered, we shall change the focus. In this case, multiscale techniques, based on Chapman-Enskog expansion, was used to establish the connection between the microscopic dynamics and the macroscopic observables. Also, we use data mining techniques,like Principal Component Analysis (PCA), to study agent systems like Cellular Automata. With the help of these tools we will discuss a simple society model, a Lattice Gas Automaton for fluid modeling, and knowledge discovery in CA databases. Besides, we show the capabilities of the NetLogo, a software for agent simulation of complex system and show our experience about.
[ { "version": "v1", "created": "Sat, 30 Jul 2005 12:31:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "da Costa", "Luis C.", "" ], [ "Xavier", "Adilson V.", "" ], [ "Rodrigues", "Paulo S.", "" ] ]
cs/0508005
Riccardo Pucella
Nick Papanikolaou
Logic Column 13: Reasoning Formally about Quantum Systems: An Overview
17 pages
SIGACT News, 36(3), pp. 51-66, 2005
null
null
cs.LO
null
This article is intended as an introduction to the subject of quantum logic, and as a brief survey of the relevant literature. Also discussed here are logics for specification and analysis of quantum information systems, in particular, recent work by P. Mateus and A. Sernadas, and also by R. van der Meyden and M. Patra. Overall, our objective is to provide a high-level presentation of the logical aspects of quantum theory. Mateus' and Sernadas' EQPL logic is illustrated with a small example, namely the state of an entangled pair of qubits. The "KT" logic of van der Meyden and Patra is demonstrated briefly in the context of the B92 protocol for quantum key distribution.
[ { "version": "v1", "created": "Mon, 1 Aug 2005 14:34:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Papanikolaou", "Nick", "" ] ]
cs/0508006
Sandor P. Fekete
Sandor P. Fekete, Michael Kaufmann, Alexander Kroeller, and Katharina Lehmann
A New Approach for Boundary Recognition in Geometric Sensor Networks
4 pages, 5 figures, Latex, to appear in Canadian Conference on Computational Geometry (CCCG 2005)
null
null
null
cs.DS cs.DC
null
We describe a new approach for dealing with the following central problem in the self-organization of a geometric sensor network: Given a polygonal region R, and a large, dense set of sensor nodes that are scattered uniformly at random in R. There is no central control unit, and nodes can only communicate locally by wireless radio to all other nodes that are within communication radius r, without knowing their coordinates or distances to other nodes. The objective is to develop a simple distributed protocol that allows nodes to identify themselves as being located near the boundary of R and form connected pieces of the boundary. We give a comparison of several centrality measures commonly used in the analysis of social networks and show that restricted stress centrality is particularly suited for geometric networks; we provide mathematical as well as experimental evidence for the quality of this measure.
[ { "version": "v1", "created": "Mon, 1 Aug 2005 19:44:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Kaufmann", "Michael", "" ], [ "Kroeller", "Alexander", "" ], [ "Lehmann", "Katharina", "" ] ]
cs/0508010
Yongjin Kim
Yongjin Kim, Ahmed Helmy
ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION
null
null
null
null
cs.NI
null
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promising solution to take a proper countermeasure near the attack origins, to discourage attackers from launching attacks, and for forensics. However, attacker traceback in Mobile Ad-hoc Networks (MANETs) is a challenging problem due to the dynamic topology, and limited network resources. It is especially difficult to trace back attacker(s) when they are moving to avoid traceback. In this paper, we introduce the ATTENTION protocol framework, which pays special attention to MAC layer abnormal activity under attack. ATTENTION consists of three classes, namely, coarse-grained traceback, fine-grained traceback and spatio-temporal fusion architecture. For energy-efficient attacker searching in MANETs, we also utilize small-world model. Our simulation analysis shows 79% of success rate in DoS attacker traceback with coarse-grained attack signature. In addition, with fine-grained attack signature, it shows 97% of success rate in DoS attacker traceback and 83% of success rate in DDoS attacker traceback. We also show that ATTENTION has robustness against node collusion and mobility.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 04:04:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Yongjin", "" ], [ "Helmy", "Ahmed", "" ] ]
cs/0508016
Jang-Won Lee
Jang-Won Lee, Mung Chiang, and A. Robert Calderbank
Distributed Algorithms for Optimal Rate-Reliability Tradeoff in Networks
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.NI
null
The current framework of network utility maximization for distributed rate allocation assumes fixed channel code rates. However, by adapting the physical layer channel coding, different rate-reliability tradeoffs can be achieved on each link and for each end user. Consider a network where each user has a utility function that depends on both signal quality and data rate, and each link may provide a `fatter' (`thinner') information `pipe' by allowing a higher (lower) decoding error probability. We propose two distributed, pricing-based algorithms to attain optimal rate-reliability tradeoff, with an interpretation that each user provides its willingness to pay for reliability to the network and the network feeds back congestion prices to users. The proposed algorithms converge to a tradeoff point between rate and reliability, which is proved to be globally optimal for codes with sufficiently large codeword lengths and user utilities with sufficiently negative curvatures.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 14:35:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Jang-Won", "" ], [ "Chiang", "Mung", "" ], [ "Calderbank", "A. Robert", "" ] ]
cs/0508017
Anne-Marie Vercoustre
Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre
Enhancing Content-And-Structure Information Retrieval using a Native XML Database
null
null
null
null
cs.IR
null
Three approaches to content-and-structure XML retrieval are analysed in this paper: first by using Zettair, a full-text information retrieval system; second by using eXist, a native XML database, and third by using a hybrid XML retrieval system that uses eXist to produce the final answers from likely relevant articles retrieved by Zettair. INEX 2003 content-and-structure topics can be classified in two categories: the first retrieving full articles as final answers, and the second retrieving more specific elements within articles as final answers. We show that for both topic categories our initial hybrid system improves the retrieval effectiveness of a native XML database. For ranking the final answer elements, we propose and evaluate a novel retrieval model that utilises the structural relationships between the answer elements of a native XML database and retrieves Coherent Retrieval Elements. The final results of our experiments show that when the XML retrieval task focusses on highly relevant elements our hybrid XML retrieval system with the Coherent Retrieval Elements module is 1.8 times more effective than Zettair and 3 times more effective than eXist, and yields an effective content-and-structure XML retrieval.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 15:05:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Pehcevski", "Jovan", "", "RMIT" ], [ "Thom", "James A.", "", "RMIT" ], [ "Vercoustre", "Anne-Marie", "" ] ]
cs/0508021
Dmitri Krioukov
Dmitri Krioukov, kc claffy
Toward Compact Interdomain Routing
null
null
null
null
cs.NI
null
Despite prevailing concerns that the current Internet interdomain routing system will not scale to meet the needs of the 21st century global Internet, networking research has not yet led to the construction of a new routing architecture with satisfactory and mathematically provable scalability characteristics. Worse, continuing empirical trends of the existing routing and topology structure of the Internet are alarming: the foundational principles of the current routing and addressing architecture are an inherently bad match for the naturally evolving structure of Internet interdomain topology. We are fortunate that a sister discipline, theory of distributed computation, has developed routing algorithms that offer promising potential for genuinely scalable routing on realistic Internet-like topologies. Indeed, there are many recent breakthroughs in the area of compact routing, which has been shown to drastically outperform, in terms of efficiency and scalability, even the boldest proposals developed in networking research. Many open questions remain, but we believe the applicability of compact routing techniques to Internet interdomain routing is a research area whose potential payoff for the future of networking is too high to ignore.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 19:32:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Krioukov", "Dmitri", "" ], [ "claffy", "kc", "" ] ]
cs/0508028
Bernardo Huberman
Fang Wu, Zi Zhang and Bernardo A. Huberman
Truth-telling Reservations
null
null
null
null
cs.GT cond-mat.stat-mech cs.MA
null
We present a mechanism for reservations of bursty resources that is both truthful and robust. It consists of option contracts whose pricing structure induces users to reveal the true likelihoods that they will purchase a given resource. Users are also allowed to adjust their options as their likelihood changes. This scheme helps users save cost and the providers to plan ahead so as to reduce the risk of under-utilization and overbooking. The mechanism extracts revenue similar to that of a monopoly provider practicing temporal pricing discrimination with a user population whose preference distribution is known in advance.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 17:11:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Wu", "Fang", "" ], [ "Zhang", "Zi", "" ], [ "Huberman", "Bernardo A.", "" ] ]
cs/0508029
Johannes Schneider
Johannes J. Schneider and Scott Kirkpatrick
Selfish vs. Unselfish Optimization of Network Creation
16 pages, 6 figures
null
10.1088/1742-5468/2005/08/P08007
null
cs.NI cs.AR cs.MA
null
We investigate several variants of a network creation model: a group of agents builds up a network between them while trying to keep the costs of this network small. The cost function consists of two addends, namely (i) a constant amount for each edge an agent buys and (ii) the minimum number of hops it takes sending messages to other agents. Despite the simplicity of this model, various complex network structures emerge depending on the weight between the two addends of the cost function and on the selfish or unselfish behaviour of the agents.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 18:16:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Schneider", "Johannes J.", "" ], [ "Kirkpatrick", "Scott", "" ] ]
cs/0508032
Derek Messie
Derek Messie (1) and Jae C. Oh (1) ((1) Syracuse University)
Polymorphic Self-* Agents for Stigmergic Fault Mitigation in Large-Scale Real-Time Embedded Systems
Fourth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), Utrecht, Netherlands, July, 2005
null
null
null
cs.AI cs.MA
null
Organization and coordination of agents within large-scale, complex, distributed environments is one of the primary challenges in the field of multi-agent systems. A lot of interest has surfaced recently around self-* (self-organizing, self-managing, self-optimizing, self-protecting) agents. This paper presents polymorphic self-* agents that evolve a core set of roles and behavior based on environmental cues. The agents adapt these roles based on the changing demands of the environment, and are directly implementable in computer systems applications. The design combines strategies from game theory, stigmergy, and other biologically inspired models to address fault mitigation in large-scale, real-time, distributed systems. The agents are embedded within the individual digital signal processors of BTeV, a High Energy Physics experiment consisting of 2500 such processors. Results obtained using a SWARM simulation of the BTeV environment demonstrate the polymorphic character of the agents, and show how this design exceeds performance and reliability metrics obtained from comparable centralized, and even traditional decentralized approaches.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 01:43:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Messie", "Derek", "", "Syracuse University" ], [ "Oh", "Jae C.", "", "Syracuse University" ] ]
cs/0508033
Dmitri Krioukov
Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Bradley Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
Lessons from Three Views of the Internet Topology
null
null
null
CAIDA-TR-2005-02
cs.NI physics.soc-ph
null
Network topology plays a vital role in understanding the performance of network applications and protocols. Thus, recently there has been tremendous interest in generating realistic network topologies. Such work must begin with an understanding of existing network topologies, which today typically consists of a relatively small number of data sources. In this paper, we calculate an extensive set of important characteristics of Internet AS-level topologies extracted from the three data sources most frequently used by the research community: traceroutes, BGP, and WHOIS. We find that traceroute and BGP topologies are similar to one another but differ substantially from the WHOIS topology. We discuss the interplay between the properties of the data sources that result from specific data collection mechanisms and the resulting topology views. We find that, among metrics widely considered, the joint degree distribution appears to fundamentally characterize Internet AS-topologies: it narrowly defines values for other important metrics. We also introduce an evaluation criteria for the accuracy of topology generators and verify previous observations that generators solely reproducing degree distributions cannot capture the full spectrum of critical topological characteristics of any of the three topologies. Finally, we release to the community the input topology datasets, along with the scripts and output of our calculations. This supplement should enable researchers to validate their models against real data and to make more informed selection of topology data sources for their specific needs.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 02:35:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Mahadevan", "Priya", "" ], [ "Krioukov", "Dmitri", "" ], [ "Fomenkov", "Marina", "" ], [ "Huffaker", "Bradley", "" ], [ "Dimitropoulos", "Xenofontas", "" ], [ "claffy", "kc", "" ], [ "Vahdat", "Amin", "" ] ]
cs/0508036
Anne-Marie Vercoustre
Thierry Despeyroux, Yves Lechevallier, Brigitte Trousse, Anne-Marie Vercoustre
Exp\'{e}riences de classification d'une collection de documents XML de structure homog\`{e}ne
Cette version corrige des erreurs dans le nom de 2 auteurs cites dans la bibliographie
Dans 5\`{e}me Journ\'{e}es d' Extraction et de Gestion des Connaissances (EGC 2005)
null
null
cs.IR
null
This paper presents some experiments in clustering homogeneous XMLdocuments to validate an existing classification or more generally anorganisational structure. Our approach integrates techniques for extracting knowledge from documents with unsupervised classification (clustering) of documents. We focus on the feature selection used for representing documents and its impact on the emerging classification. We mix the selection of structured features with fine textual selection based on syntactic characteristics.We illustrate and evaluate this approach with a collection of Inria activity reports for the year 2003. The objective is to cluster projects into larger groups (Themes), based on the keywords or different chapters of these activity reports. We then compare the results of clustering using different feature selections, with the official theme structure used by Inria.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 14:14:59 GMT" }, { "version": "v2", "created": "Tue, 9 Aug 2005 13:15:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Despeyroux", "Thierry", "" ], [ "Lechevallier", "Yves", "" ], [ "Trousse", "Brigitte", "" ], [ "Vercoustre", "Anne-Marie", "" ] ]
cs/0508038
Robert Burger PhD
John Robert Burger
Quantum Algorithm Processor For Finding Exact Divisors
null
null
null
null
cs.AR
null
Wiring diagrams are given for a quantum algorithm processor in CMOS to compute, in parallel, all divisors of an n-bit integer. Lines required in a wiring diagram are proportional to n. Execution time is proportional to the square of n.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 17:35:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
cs/0508041
Tian-Jian Jiang
Tian-Jian Jiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong Tan, Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu
OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services
4 pages
null
null
null
cs.HC
null
Input method (IM) is a sine qua non for text entry of many Asian languages, but its potential applications on other languages remain under-explored. This paper proposes a philosophy of input method design by seeing it as a nonintrusive plug-in text service framework. Such design allows new functionalities of text processing to be attached onto a running application without any tweaking of code. We also introduce OpenVanilla, a cross-platform framework that is designed with the above-mentioned model in mind. Frameworks like OpenVanilla have shown that an input method can be more than just a text entry tool: it offers a convenient way for developing various text service and language tools.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 22:39:49 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2006 06:41:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Jiang", "Tian-Jian", "" ], [ "Deng-Liu", "", "" ], [ "Liu", "Kang-min", "" ], [ "Yang", "Weizhong", "" ], [ "Tan", "Pek-tiong", "" ], [ "Hsieh", "Mengjuei", "" ], [ "Chang", "Tsung-hsiang", "" ], [ "Hsu", "Wen-Lien", "" ] ]
cs/0508042
Tian-Jian Jiang
Tien-chien Chiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong Tan, Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu
OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services
This paper has been withdrawn
null
null
null
cs.HC
null
This paper has been withdrawn by the author, because it was merged into cs.HC/0508041
[ { "version": "v1", "created": "Thu, 4 Aug 2005 22:49:38 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2006 06:46:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Chiang", "Tien-chien", "" ], [ "Deng-Liu", "", "" ], [ "Liu", "Kang-min", "" ], [ "Yang", "Weizhong", "" ], [ "Tan", "Pek-tiong", "" ], [ "Hsieh", "Mengjuei", "" ], [ "Chang", "Tsung-hsiang", "" ], [ "Hsu", "Wen-Lien", "" ] ]
cs/0508045
Ion Mandoiu
Christoph Albrecht, Andrew B. Kahng, Ion I. Mandoiu, and Alexander Zelikovsky
Multicommodity Flow Algorithms for Buffered Global Routing
null
null
null
null
cs.DS
null
In this paper we describe a new algorithm for buffered global routing according to a prescribed buffer site map. Specifically, we describe a provably good multi-commodity flow based algorithm that finds a global routing minimizing buffer and wire congestion subject to given constraints on routing area (wirelength and number of buffers) and sink delays. Our algorithm allows computing the tradeoff curve between routing area and wire/buffer congestion under any combination of delay and capacity constraints, and simultaneously performs buffer/wire sizing, as well as layer and pin assignment. Experimental results show that near-optimal results are obtained with a practical runtime.
[ { "version": "v1", "created": "Sat, 6 Aug 2005 12:44:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Albrecht", "Christoph", "" ], [ "Kahng", "Andrew B.", "" ], [ "Mandoiu", "Ion I.", "" ], [ "Zelikovsky", "Alexander", "" ] ]
cs/0508052
Olivier Powell
Pierre Leone, Olivier Powell and Jose Rolim
Energy Optimal Data Propagation in Wireless Sensor Networks
19 pages
Journal of Parallel and Distributed Computing Volume 67, Issue 3 , March 2007, Pages 302-317
10.1016/j.jpdc.2006.10.007
null
cs.DC
null
We propose an algorithm which produces a randomized strategy reaching optimal data propagation in wireless sensor networks (WSN).In [6] and [8], an energy balanced solution is sought using an approximation algorithm. Our algorithm improves by (a) when an energy-balanced solution does not exist, it still finds an optimal solution (whereas previous algorithms did not consider this case and provide no useful solution) (b) instead of being an approximation algorithm, it finds the exact solution in one pass. We also provide a rigorous proof of the optimality of our solution.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 15:54:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Leone", "Pierre", "" ], [ "Powell", "Olivier", "" ], [ "Rolim", "Jose", "" ] ]
cs/0508053
Peter Turney
Peter D. Turney (National Research Council of Canada)
Measuring Semantic Similarity by Latent Relational Analysis
6 pages, related work available at http://purl.org/peter.turney/
Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05), (2005), Edinburgh, Scotland, 1136-1141
null
NRC-48255
cs.LG cs.CL cs.IR
null
This paper introduces Latent Relational Analysis (LRA), a method for measuring semantic similarity. LRA measures similarity in the semantic relations between two pairs of words. When two pairs have a high degree of relational similarity, they are analogous. For example, the pair cat:meow is analogous to the pair dog:bark. There is evidence from cognitive science that relational similarity is fundamental to many cognitive and linguistic tasks (e.g., analogical reasoning). In the Vector Space Model (VSM) approach to measuring relational similarity, the similarity between two pairs is calculated by the cosine of the angle between the vectors that represent the two pairs. The elements in the vectors are based on the frequencies of manually constructed patterns in a large corpus. LRA extends the VSM approach in three ways: (1) patterns are derived automatically from the corpus, (2) Singular Value Decomposition is used to smooth the frequency data, and (3) synonyms are used to reformulate word pairs. This paper describes the LRA algorithm and experimentally compares LRA to VSM on two tasks, answering college-level multiple-choice word analogy questions and classifying semantic relations in noun-modifier expressions. LRA achieves state-of-the-art results, reaching human-level performance on the analogy questions and significantly exceeding VSM performance on both tasks.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 19:35:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
cs/0508061
L.T. Handoko
L.T. Handoko
SciBlog : A Tool for Scientific Collaboration
4 figures, invited talk at the Workshop on Knowledge Management (6-9 December 2004)
Proceeding of the WKM 2004
null
FISIKALIPI-04013
cs.CY
null
I describe a newly developed online scientific web-log (SciBlog). The online facility consists of several moduls needed in a common and conventional research activity. I show that this enables scientists around the world to perform an online collaboration over the net.
[ { "version": "v1", "created": "Thu, 11 Aug 2005 22:29:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Handoko", "L. T.", "" ] ]
cs/0508063
Michel Dagenais
Michel R. Dagenais (Dept. of Computer Engineering, Ecole Polytechnique, Montreal, Canada)
Disks, Partitions, Volumes and RAID Performance with the Linux Operating System
null
null
null
null
cs.PF cs.OS
null
Block devices in computer operating systems typically correspond to disks or disk partitions, and are used to store files in a filesystem. Disks are not the only real or virtual device which adhere to the block accessible stream of bytes block device model. Files, remote devices, or even RAM may be used as a virtual disks. This article examines several common combinations of block device layers used as virtual disks in the Linux operating system: disk partitions, loopback files, software RAID, Logical Volume Manager, and Network Block Devices. It measures their relative performance using different filesystems: Ext2, Ext3, ReiserFS, JFS, XFS,NFS.
[ { "version": "v1", "created": "Fri, 12 Aug 2005 16:13:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Dagenais", "Michel R.", "", "Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada" ] ]
cs/0508065
Herbert van de Sompel
Jeroen Bekaert, Herbert Van de Sompel
Representing Digital Assets using MPEG-21 Digital Item Declaration
27 pages, accepted submission to the special edition on complex objects of the International Journal on Digital Libraries
null
null
null
cs.DL cs.AR
null
Various XML-based approaches aimed at representing compound digital assets have emerged over the last several years. Approaches that are of specific relevance to the digital library community include the Metadata Encoding and Transmission Standard (METS), the IMS Content Packaging XML Binding, and the XML Formatted Data Units (XFDU) developed by CCSDS Panel 2. The MPEG-21 Digital Item Declaration (MPEG-21 DID) is another standard specifying the representation of digital assets in XML that, so far, has received little attention in the digital library community. This article gives a brief insight into the MPEG-21 standardization effort, highlights the major characteristics of the MPEG-21 DID Abstract Model, and describes the MPEG-21 Digital Item Declaration Language (MPEG-21 DIDL), an XML syntax for the representation of digital assets based on the MPEG-21 DID Abstract Model. Also, it briefly demonstrates the potential relevance of MPEG-21 DID to the digital library community by describing its use in the aDORe repository environment at the Research Library of the Los Alamos National Laboratory (LANL) for the representation of digital assets.
[ { "version": "v1", "created": "Sat, 13 Aug 2005 03:09:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Bekaert", "Jeroen", "" ], [ "Van de Sompel", "Herbert", "" ] ]
cs/0508066
Jonathan Bowen
Silvia Filippini-Fantoni and Jonathan P. Bowen
Can Small Museums Develop Compelling, Educational and Accessible Web Resources? The Case of Accademia Carrara
14 pages, 6 figures
In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005 London Conference Proceedings, University College London, UK, 25-29 July 2005, pages 18.1-18.14. ISBN: 0-9543146-6-2
null
null
cs.MM cs.CY cs.DL cs.IR
null
Due to the lack of budget, competence, personnel and time, small museums are often unable to develop compelling, educational and accessible web resources for their permanent collections or temporary exhibitions. In an attempt to prove that investing in these types of resources can be very fruitful even for small institutions, we will illustrate the case of Accademia Carrara, a museum in Bergamo, northern Italy, which, for a current temporary exhibition on Cezanne and Renoir's masterpieces from the Paul Guillaume collection, developed a series of multimedia applications, including an accessible website, rich in content and educational material [www.cezannerenoir.it].
[ { "version": "v1", "created": "Sat, 13 Aug 2005 14:46:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Filippini-Fantoni", "Silvia", "" ], [ "Bowen", "Jonathan P.", "" ] ]
cs/0508067
Jonathan Bowen
Teresa Numerico and Jonathan P. Bowen
Copyright and Promotion: Oxymoron or Opportunity?
10 pages, 0 figures
In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005 London Conference Proceedings, University College London, UK, 25-29 July 2005, pages 25.1-25.10. ISBN: 0-9543146-6-2
null
null
cs.CY cs.DL
null
Copyright in the cultural sphere can act as a barrier to the dissemination of high-quality information. On the other hand it protects works of art that might not be made available otherwise. This dichotomy makes the area of copyright difficult, especially when it applies to the digital arena of the web where copying is so easy and natural. Here we present a snapshot of the issues for online copyright, with particular emphasis on the relevance to cultural institutions. We concentrate on Europe and the US; as an example we include a special section dedicated to the situation in Italy.
[ { "version": "v1", "created": "Sat, 13 Aug 2005 14:58:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Numerico", "Teresa", "" ], [ "Bowen", "Jonathan P.", "" ] ]
cs/0508071
Oded Schramm
Ryan O'Donnell, Michael Saks, Oded Schramm, Rocco A. Servedio
Every decision tree has an influential variable
This paper is posted by permission from the IEEE Computer Society. To appear in FOCS 2005
null
null
null
cs.CC cs.DM math.PR
null
We prove that for any decision tree calculating a boolean function $f:\{-1,1\}^n\to\{-1,1\}$, \[ \Var[f] \le \sum_{i=1}^n \delta_i \Inf_i(f), \] where $\delta_i$ is the probability that the $i$th input variable is read and $\Inf_i(f)$ is the influence of the $i$th variable on $f$. The variance, influence and probability are taken with respect to an arbitrary product measure on $\{-1,1\}^n$. It follows that the minimum depth of a decision tree calculating a given balanced function is at least the reciprocal of the largest influence of any input variable. Likewise, any balanced boolean function with a decision tree of depth $d$ has a variable with influence at least $\frac{1}{d}$. The only previous nontrivial lower bound known was $\Omega(d 2^{-d})$. Our inequality has many generalizations, allowing us to prove influence lower bounds for randomized decision trees, decision trees on arbitrary product probability spaces, and decision trees with non-boolean outputs. As an application of our results we give a very easy proof that the randomized query complexity of nontrivial monotone graph properties is at least $\Omega(v^{4/3}/p^{1/3})$, where $v$ is the number of vertices and $p \leq \half$ is the critical threshold probability. This supersedes the milestone $\Omega(v^{4/3})$ bound of Hajnal and is sometimes superior to the best known lower bounds of Chakrabarti-Khot and Friedgut-Kahn-Wigderson.
[ { "version": "v1", "created": "Tue, 16 Aug 2005 01:00:05 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Donnell", "Ryan", "" ], [ "Saks", "Michael", "" ], [ "Schramm", "Oded", "" ], [ "Servedio", "Rocco A.", "" ] ]
cs/0508073
Marcus Hutter
Jan Poland and Marcus Hutter
Universal Learning of Repeated Matrix Games
16 LaTeX pages, 8 eps figures
Proc. 15th Annual Machine Learning Conf. of Belgium and The Netherlands (Benelearn 2006) pages 7-14
null
IDSIA-18-05
cs.LG cs.AI
null
We study and compare the learning dynamics of two universal learning algorithms, one based on Bayesian learning and the other on prediction with expert advice. Both approaches have strong asymptotic performance guarantees. When confronted with the task of finding good long-term strategies in repeated 2x2 matrix games, they behave quite differently.
[ { "version": "v1", "created": "Tue, 16 Aug 2005 16:27:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Poland", "Jan", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0508078
Serebrenik Alexander
Alexander Serebrenik, Susana Munoz-Hernandez
Proceedings of the 15th Workshop on Logic-based methods in Programming Environments WLPE'05 -- October 5, 2005 -- Sitges (Barcelona), Spain
Seven accepted papers
null
null
null
cs.PL cs.LO cs.SE
null
This volume contains papers presented at WLPE 2005, 15th International Workshop on Logic-based methods in Programming Environments. The aim of the workshop is to provide an informal meeting for the researchers working on logic-based tools for development and analysis of programs. This year we emphasized two aspects: on one hand the presentation, pragmatics and experiences of tools for logic programming environments; on the other one, logic-based environmental tools for programming in general. The workshop took place in Sitges (Barcelona), Spain as a satellite workshop of the 21th International Conference on Logic Programming (ICLP 2005). This workshop continues the series of successful international workshops on logic programming environments held in Ohio, USA (1989), Eilat, Israel (1990), Paris, France (1991), Washington, USA (1992), Vancouver, Canada (1993), Santa Margherita Ligure, Italy (1994), Portland, USA (1995), Leuven, Belgium and Port Jefferson, USA (1997), Las Cruces, USA (1999), Paphos, Cyprus (2001), Copenhagen, Denmark (2002), Mumbai, India (2003) and Saint Malo, France (2004). We have received eight submissions (2 from France, 2 Spain-US cooperations, one Spain-Argentina cooperation, one from Japan, one from the United Kingdom and one Sweden-France cooperation). Program committee has decided to accept seven papers. This volume contains revised versions of the accepted papers. We are grateful to the authors of the papers, the reviewers and the members of the Program Committee for the help and fruitful discussions.
[ { "version": "v1", "created": "Wed, 17 Aug 2005 13:35:20 GMT" }, { "version": "v2", "created": "Mon, 22 Aug 2005 07:57:41 GMT" }, { "version": "v3", "created": "Wed, 24 Aug 2005 16:15:24 GMT" }, { "version": "v4", "created": "Thu, 25 Aug 2005 06:42:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Serebrenik", "Alexander", "" ], [ "Munoz-Hernandez", "Susana", "" ] ]
cs/0508079
Nithin Nagaraj
Nithin Nagaraj and Vivek Vaidya and Prabhakar G Vaidya
Re-visiting the One-Time Pad
13 pages, 3 figures, submitted for publication to IndoCrypt 2005 conference
null
null
null
cs.CR
null
In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic system,also popularly known as the One-Time Pad (OTP). Since then, it has been believed that the perfectly random and uncompressible OTP which is transmitted needs to have a length equal to the message length for this result to be true. In this paper, we prove that the length of the transmitted OTP which actually contains useful information need not be compromised and could be less than the message length without sacrificing perfect secrecy. We also provide a new interpretation for the OTP encryption by treating the message bits as making True/False statements about the pad, which we define as a private-object. We introduce the paradigm of private-object cryptography where messages are transmitted by verifying statements about a secret-object. We conclude by suggesting the use of Formal Axiomatic Systems for investing N bits of secret.
[ { "version": "v1", "created": "Thu, 18 Aug 2005 04:37:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Nagaraj", "Nithin", "" ], [ "Vaidya", "Vivek", "" ], [ "Vaidya", "Prabhakar G", "" ] ]
cs/0508080
Kirti Chawla
Kirti Chawla
A 3D RGB Axis-based Color-oriented Cryptography
16 Pages, 12 figures
null
null
null
cs.CR
null
In this document, a formal approach to encrypt, decrypt, transmit and receive information using colors is explored. A piece of information consists of set of symbols with a definite property imposed on the generating set. The symbols are usually encoded using ascii scheme. A linear to 3d transformation is presented. The change of axis from traditional xyz to rgb is highlighted and its effect are studied. A point in this new axis is then represented as a unique color and a vector or matrix is associated with it, making it amenable to standard vector or matrix operations. A formal notion on hybrid cryptography is introduced as the algorithm lies on the boundary of symmetric and asymmetric cryptography. No discussion is complete, without mentioning reference to communication aspects of secure information in a channel. Transmission scheme pertaining to light as carrier is introduced and studied. Key-exchanges do not come under the scope of current frame of document.
[ { "version": "v1", "created": "Thu, 18 Aug 2005 07:07:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Chawla", "Kirti", "" ] ]
cs/0508081
Kirti Chawla
Kirti Chawla
ZEUS - A Domain-Oriented Fact Comparison Based Authentication Protocol
5 Pages
null
null
null
cs.CR
null
In this paper, facts existing in different domains are explored, which are comparable by their end result. Properties of various domains and the facts that are part of such a unit are also presented, examples of comparison and methods of usage as means of zero-knowledge protocols are given, finally a zero-knowledge protocol based on afore-mentioned concept is given.
[ { "version": "v1", "created": "Thu, 18 Aug 2005 07:17:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Chawla", "Kirti", "" ] ]
cs/0508082
Bernardo Huberman
Scott Golder, Bernardo A. Huberman
The Structure of Collaborative Tagging Systems
null
null
null
null
cs.DL cs.CY
null
Collaborative tagging describes the process by which many users add metadata in the form of keywords to shared content. Recently, collaborative tagging has grown in popularity on the web, on sites that allow users to tag bookmarks, photographs and other content. In this paper we analyze the structure of collaborative tagging systems as well as their dynamical aspects. Specifically, we discovered regularities in user activity, tag frequencies, kinds of tags used, bursts of popularity in bookmarking and a remarkable stability in the relative proportions of tags within a given url. We also present a dynamical model of collaborative tagging that predicts these stable patterns and relates them to imitation and shared knowledge.
[ { "version": "v1", "created": "Thu, 18 Aug 2005 18:34:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Golder", "Scott", "" ], [ "Huberman", "Bernardo A.", "" ] ]
cs/0508086
Dragos Trinca
Dragos Trinca
High-performance BWT-based Encoders
12 pages
null
null
null
cs.DS
null
In 1994, Burrows and Wheeler developed a data compression algorithm which performs significantly better than Lempel-Ziv based algorithms. Since then, a lot of work has been done in order to improve their algorithm, which is based on a reversible transformation of the input string, called BWT (the Burrows-Wheeler transformation). In this paper, we propose a compression scheme based on BWT, MTF (move-to-front coding), and a version of the algorithms presented in [Dragos Trinca, ITCC-2004].
[ { "version": "v1", "created": "Sun, 21 Aug 2005 05:47:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
cs/0508087
Dragos Trinca
Dragos Trinca
Modelling the Eulerian Path Problem using a String Matching Framework
10 pages
null
null
null
cs.DS
null
The well-known Eulerian path problem can be solved in polynomial time (more exactly, there exists a linear time algorithm for this problem). In this paper, we model the problem using a string matching framework, and then initiate an algorithmic study on a variant of this problem, called the (2,1)-STRING-MATCH problem (which is actually a generalization of the Eulerian path problem). Then, we present a polynomial-time algorithm for the (2,1)-STRING-MATCH problem, which is the most important result of this paper. Specifically, we get a lower bound of Omega(n), and an upper bound of O(n^{2}).
[ { "version": "v1", "created": "Sun, 21 Aug 2005 06:08:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
cs/0508089
Dragos Trinca
Dragos Trinca
Modelling the EAH Data Compression Algorithm using Graph Theory
10 pages
null
null
null
cs.DS
null
Adaptive codes associate variable-length codewords to symbols being encoded depending on the previous symbols in the input data string. This class of codes has been introduced in [Dragos Trinca, cs.DS/0505007] as a new class of non-standard variable-length codes. New algorithms for data compression, based on adaptive codes of order one, have been presented in [Dragos Trinca, ITCC-2004], where we have behaviorally shown that for a large class of input data strings, these algorithms substantially outperform the Lempel-Ziv universal data compression algorithm. EAH has been introduced in [Dragos Trinca, cs.DS/0505061], as an improved generalization of these algorithms. In this paper, we present a translation of the EAH algorithm into the graph theory.
[ { "version": "v1", "created": "Sun, 21 Aug 2005 19:32:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
cs/0508090
Dragos Trinca
Dragos Trinca
Translating the EAH Data Compression Algorithm into Automata Theory
9 pages
null
null
null
cs.DS
null
Adaptive codes have been introduced in [Dragos Trinca, cs.DS/0505007] as a new class of non-standard variable-length codes. These codes associate variable-length codewords to symbols being encoded depending on the previous symbols in the input data string. A new data compression algorithm, called EAH, has been introduced in [Dragos Trinca, cs.DS/0505061], where we have behaviorally shown that for a large class of input data strings, this algorithm substantially outperforms the well-known Lempel-Ziv universal data compression algorithm. In this paper, we translate the EAH encoder into automata theory.
[ { "version": "v1", "created": "Sun, 21 Aug 2005 19:56:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
cs/0508091
Serebrenik Alexander
Susana Munoz-Hernandez and Claudio Vaucheret
Extending Prolog with Incomplete Fuzzy Information
null
null
null
null
cs.PL cs.SE
null
Incomplete information is a problem in many aspects of actual environments. Furthermore, in many sceneries the knowledge is not represented in a crisp way. It is common to find fuzzy concepts or problems with some level of uncertainty. There are not many practical systems which handle fuzziness and uncertainty and the few examples that we can find are used by a minority. To extend a popular system (which many programmers are using) with the ability of combining crisp and fuzzy knowledge representations seems to be an interesting issue. Our first work (Fuzzy Prolog) was a language that models $\mathcal{B}([0,1])$-valued Fuzzy Logic. In the Borel algebra, $\mathcal{B}([0,1])$, truth value is represented using unions of intervals of real numbers. This work was more general in truth value representation and propagation than previous works. An interpreter for this language using Constraint Logic Programming over Real numbers (CLP(${\cal R}$)) was implemented and is available in the Ciao system. Now, we enhance our former approach by using default knowledge to represent incomplete information in Logic Programming. We also provide the implementation of this new framework. This new release of Fuzzy Prolog handles incomplete information, it has a complete semantics (the previous one was incomplete as Prolog) and moreover it is able to combine crisp and fuzzy logic in Prolog programs. Therefore, new Fuzzy Prolog is more expressive to represent real world. Fuzzy Prolog inherited from Prolog its incompleteness. The incorporation of default reasoning to Fuzzy Prolog removes this problem and requires a richer semantics which we discuss.
[ { "version": "v1", "created": "Mon, 22 Aug 2005 07:41:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Munoz-Hernandez", "Susana", "" ], [ "Vaucheret", "Claudio", "" ] ]
cs/0508092
Stergos Afantenos
Stergos D. Afantenos, Vangelis Karkaletsis and Panagiotis Stamatopoulos
Summarizing Reports on Evolving Events; Part I: Linear Evolution
7 pages. Published on the Conference Recent Advances in Natural Language Processing (RANLP, 2005)
Edited by Galia Angelova, Kalina Bontcheva, Ruslan Mitkov, Nicolas Nicolov, and Nikolai Nikolov, Recent Advances in Natural Language Processing (RANLP 2005). Borovets, Bulgaria: INCOMA, 18-24.
null
null
cs.CL cs.IR
null
We present an approach for summarization from multiple documents which report on events that evolve through time, taking into account the different document sources. We distinguish the evolution of an event into linear and non-linear. According to our approach, each document is represented by a collection of messages which are then used in order to instantiate the cross-document relations that determine the summary content. The paper presents the summarization system that implements this approach through a case study on linear evolution.
[ { "version": "v1", "created": "Mon, 22 Aug 2005 12:56:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Afantenos", "Stergos D.", "" ], [ "Karkaletsis", "Vangelis", "" ], [ "Stamatopoulos", "Panagiotis", "" ] ]
cs/0508100
Alessandro Provetti
Alessandro Provetti
A primer on Answer Set Programming
6 pages
null
null
null
cs.AI cs.LO
null
A introduction to the syntax and Semantics of Answer Set Programming intended as an handout to [under]graduate students taking Artificial Intlligence or Logic Programming classes.
[ { "version": "v1", "created": "Tue, 23 Aug 2005 15:05:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Provetti", "Alessandro", "" ] ]
cs/0508102
Emily Stone
Emily Stone, Suhail Ahmed, Abe Askari and Hong Tat
Investigations of Process Damping Forces in Metal Cutting
27 pages, 27 figures, submitted to Journal of Computational Methods in Science and Engineering, Feb. 2005
null
null
null
cs.CE
null
Using finite element software developed for metal cutting by Third Wave Systems we investigate the forces involved in chatter, a self-sustained oscillation of the cutting tool. The phenomena is decomposed into a vibrating tool cutting a flat surface work piece, and motionless tool cutting a work piece with a wavy surface. While cutting the wavy surface, the shearplane was seen to oscillate in advance of the oscillation of the depth of cut, as were the cutting, thrust, and shear plane forces. The vibrating tool was used to investigate process damping through the interaction of the relief face of the tool and the workpiece. Crushing forces are isolated and compared to the contact length between the tool and workpiece. We found that the wavelength dependence of the forces depended on the relative size of the wavelength to the length of the relief face of the tool. The results indicate that the damping force from crushing will be proportional to the cutting speed for short tools, and inversely proportional for long tools.
[ { "version": "v1", "created": "Tue, 23 Aug 2005 19:52:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Stone", "Emily", "" ], [ "Ahmed", "Suhail", "" ], [ "Askari", "Abe", "" ], [ "Tat", "Hong", "" ] ]
cs/0508103
Peter Turney
Peter D. Turney (National Research Council of Canada), Michael L. Littman (Rutgers University)
Corpus-based Learning of Analogies and Semantic Relations
related work available at http://purl.org/peter.turney/ and http://www.cs.rutgers.edu/~mlittman/
Machine Learning, (2005), 60(1-3), 251-278
null
NRC-48273
cs.LG cs.CL cs.IR
null
We present an algorithm for learning from unlabeled text, based on the Vector Space Model (VSM) of information retrieval, that can solve verbal analogy questions of the kind found in the SAT college entrance exam. A verbal analogy has the form A:B::C:D, meaning "A is to B as C is to D"; for example, mason:stone::carpenter:wood. SAT analogy questions provide a word pair, A:B, and the problem is to select the most analogous word pair, C:D, from a set of five choices. The VSM algorithm correctly answers 47% of a collection of 374 college-level analogy questions (random guessing would yield 20% correct; the average college-bound senior high school student answers about 57% correctly). We motivate this research by applying it to a difficult problem in natural language processing, determining semantic relations in noun-modifier pairs. The problem is to classify a noun-modifier pair, such as "laser printer", according to the semantic relation between the noun (printer) and the modifier (laser). We use a supervised nearest-neighbour algorithm that assigns a class to a given noun-modifier pair by finding the most analogous noun-modifier pair in the training data. With 30 classes of semantic relations, on a collection of 600 labeled noun-modifier pairs, the learning algorithm attains an F value of 26.5% (random guessing: 3.3%). With 5 classes of semantic relations, the F value is 43.2% (random: 20%). The performance is state-of-the-art for both verbal analogies and noun-modifier relations.
[ { "version": "v1", "created": "Tue, 23 Aug 2005 20:21:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ], [ "Littman", "Michael L.", "", "Rutgers University" ] ]
cs/0508105
Ludovic Langevine
Ludovic Langevine and Mireille Ducasse
A Tracer Driver for Versatile Dynamic Analyses of Constraint Logic Programs
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the 15th Workshop on Logic-based methods in Programming Environments, October 2005, Spain. Whole proceedings: cs.PL/0508078. 15 pages
null
null
null
cs.SE
null
Programs with constraints are hard to debug. In this paper, we describe a general architecture to help develop new debugging tools for constraint programming. The possible tools are fed by a single general-purpose tracer. A tracer-driver is used to adapt the actual content of the trace, according to the needs of the tool. This enables the tools and the tracer to communicate in a client-server scheme. Each tool describes its needs of execution data thanks to event patterns. The tracer driver scrutinizes the execution according to these event patterns and sends only the data that are relevant to the connected tools. Experimental measures show that this approach leads to good performance in the context of constraint logic programming, where a large variety of tools exists and the trace is potentially huge.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 11:30:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Langevine", "Ludovic", "" ], [ "Ducasse", "Mireille", "" ] ]
cs/0508106
Fred Mesnard
Etienne Payet and Fred Mesnard
An Improved Non-Termination Criterion for Binary Constraint Logic Programs
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the 15th Workshop on Logic-based methods in Programming Environments October 2005, Sitges. cs.PL/0508078
null
null
null
cs.PL
null
On one hand, termination analysis of logic programs is now a fairly established research topic within the logic programming community. On the other hand, non-termination analysis seems to remain a much less attractive subject. If we divide this line of research into two kinds of approaches: dynamic versus static analysis, this paper belongs to the latter. It proposes a criterion for detecting non-terminating atomic queries with respect to binary CLP clauses, which strictly generalizes our previous works on this subject. We give a generic operational definition and a logical form of this criterion. Then we show that the logical form is correct and complete with respect to the operational definition.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 12:18:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Payet", "Etienne", "" ], [ "Mesnard", "Fred", "" ] ]
cs/0508108
Tristan Denmat
Tristan Denmat, Arnaud Gotlieb and Mireille Ducasse
Proving or Disproving likely Invariants with Constraint Reasoning
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the 15th Workshop on Logic-based methods in Programming Environments October 2005, Sitges. cs.PL/0508078
null
null
null
cs.SE cs.PL
null
A program invariant is a property that holds for every execution of the program. Recent work suggest to infer likely-only invariants, via dynamic analysis. A likely invariant is a property that holds for some executions but is not guaranteed to hold for all executions. In this paper, we present work in progress addressing the challenging problem of automatically verifying that likely invariants are actual invariants. We propose a constraint-based reasoning approach that is able, unlike other approaches, to both prove or disprove likely invariants. In the latter case, our approach provides counter-examples. We illustrate the approach on a motivating example where automatically generated likely invariants are verified.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 13:30:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Denmat", "Tristan", "" ], [ "Gotlieb", "Arnaud", "" ], [ "Ducasse", "Mireille", "" ] ]
cs/0508109
William Heaven
William Heaven and Alessandra Russo
Enhancing the Alloy Analyzer with Patterns of Analysis
17 pages, 15th Workshop on Logic Programming Environments (WLPE05), Sitges (Barcelona), Spain, 2005
15th Workshop on Logic Programming Environments (WLPE05), Sitges (Barcelona), Spain, 2005
null
null
cs.SE cs.LO
null
Formal techniques have been shown to be useful in the development of correct software. But the level of expertise required of practitioners of these techniques prohibits their widespread adoption. Formal techniques need to be tailored to the commercial software developer. Alloy is a lightweight specification language supported by the Alloy Analyzer (AA), a tool based on off-the-shelf SAT technology. The tool allows a user to check interactively whether given properties are consistent or valid with respect to a high-level specification, providing an environment in which the correctness of such a specification may be established. However, Alloy is not particularly suited to expressing program specifications and the feedback provided by AA can be misleading where the specification under analysis or the property being checked contains inconsistencies. In this paper, we address these two shortcomings. Firstly, we present a lightweight language called "Loy", tailored to the specification of object-oriented programs. An encoding of Loy into Alloy is provided so that AA can be used for automated analysis of Loy program specifications. Secondly, we present some "patterns of analysis" that guide a developer through the analysis of a Loy specification in order to establish its correctness before implementation.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 15:35:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Heaven", "William", "" ], [ "Russo", "Alessandra", "" ] ]
cs/0508110
Ali Bagherzandi
Ali Bagherzandi, Kooshiar Azimian, Javad Mohajeri and Mahmoud Salmasizadeh
Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework
8 pages, 1 figure
null
null
null
cs.CR
null
In this paper we try to unify the frameworks of definitions of semantic security, indistinguishability and non-malleability by defining semantic security in comparison based framework. This facilitates the study of relations among these goals against different attack models and makes the proof of the equivalence of semantic security and indistinguishability easier and more understandable. Besides, our proof of the equivalence of semantic security and indistinguishability does not need any intermediate goals such as non devidability to change the definition framework.
[ { "version": "v1", "created": "Thu, 25 Aug 2005 04:58:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagherzandi", "Ali", "" ], [ "Azimian", "Kooshiar", "" ], [ "Mohajeri", "Javad", "" ], [ "Salmasizadeh", "Mahmoud", "" ] ]
cs/0508111
Elvira Albert
German Puebla, Elvira Albert, Manuel Hermenegildo
A Generic Framework for the Analysis and Specialization of Logic Programs
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the 15th Workshop on Logic-based methods in Programming Environments October 2005, Sitges. cs.PL/0508078
null
null
null
cs.PL cs.SE
null
The relationship between abstract interpretation and partial deduction has received considerable attention and (partial) integrations have been proposed starting from both the partial deduction and abstract interpretation perspectives. In this work we present what we argue is the first fully described generic algorithm for efficient and precise integration of abstract interpretation and partial deduction. Taking as starting point state-of-the-art algorithms for context-sensitive, polyvariant abstract interpretation and (abstract) partial deduction, we present an algorithm which combines the best of both worlds. Key ingredients include the accurate success propagation inherent to abstract interpretation and the powerful program transformations achievable by partial deduction. In our algorithm, the calls which appear in the analysis graph are not analyzed w.r.t. the original definition of the procedure but w.r.t. specialized definitions of these procedures. Such specialized definitions are obtained by applying both unfolding and abstract executability. Our framework is parametric w.r.t. different control strategies and abstract domains. Different combinations of such parameters correspond to existing algorithms for program analysis and specialization. Simultaneously, our approach opens the door to the efficient computation of strictly more precise results than those achievable by each of the individual techniques. The algorithm is now one of the key components of the CiaoPP analysis and specialization system.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 21:50:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Puebla", "German", "" ], [ "Albert", "Elvira", "" ], [ "Hermenegildo", "Manuel", "" ] ]
cs/0508113
Gilles Villard
Claude-Pierre Jeannerod (LIP), Gilles Villard (LIP)
Asymptotically fast polynomial matrix algorithms for multivariable systems
null
null
null
JeVi05
cs.SC cs.CC
null
We present the asymptotically fastest known algorithms for some basic problems on univariate polynomial matrices: rank, nullspace, determinant, generic inverse, reduced form. We show that they essentially can be reduced to two computer algebra techniques, minimal basis computations and matrix fraction expansion/reconstruction, and to polynomial matrix multiplication. Such reductions eventually imply that all these problems can be solved in about the same amount of time as polynomial matrix multiplication.
[ { "version": "v1", "created": "Thu, 25 Aug 2005 13:52:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Jeannerod", "Claude-Pierre", "", "LIP" ], [ "Villard", "Gilles", "", "LIP" ] ]
cs/0508116
Robert Burger PhD
John Robert Burger
Quantum Algorithm Processors to Reveal Hamiltonian Cycles
10 pages
null
null
null
cs.AR cs.CG
null
Quantum computer versus quantum algorithm processor in CMOS are compared to find (in parallel) all Hamiltonian cycles in a graph with m edges and n vertices, each represented by k bits. A quantum computer uses quantum states analogous to CMOS registers. With efficient initialization, number of CMOS registers is proportional to (n-1)! Number of qubits in a quantum computer is approximately proportional to kn+2mn in the approach below. Using CMOS, the bits per register is about proportional to kn, which is less since bits can be irreversibly reset. In either concept, number of gates, or operations to identify Hamiltonian cycles is proportional to kmn. However, a quantum computer needs an additional exponentially large number of operations to accomplish a probabilistic readout. In contrast, CMOS is deterministic and readout is comparable to ordinary memory.
[ { "version": "v1", "created": "Thu, 25 Aug 2005 19:04:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
cs/0508117
Xi Shen
Xi Shen (1), Philippe De Wilde (2) ((1) Imperial College London, United Kingdom, (2) Heriot-Watt University, United Kingdom)
Long-term neuronal behavior caused by two synaptic modification mechanisms
11 pages, 5 figures
null
null
null
cs.NE cs.CE
null
We report the first results of simulating the coupling of neuronal, astrocyte, and cerebrovascular activity. It is suggested that the dynamics of the system is different from systems that only include neurons. In the neuron-vascular coupling, distribution of synapse strengths affects neuronal behavior and thus balance of the blood flow; oscillations are induced in the neuron-to-astrocyte coupling.
[ { "version": "v1", "created": "Fri, 26 Aug 2005 10:38:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Xi", "" ], [ "De Wilde", "Philippe", "" ] ]
cs/0508120
Vyacheslav Gorshkov Mr
Gennady P. Berman, Vyacheslav N. Gorshkov, Edward P. MacKerrow (Theoretical Division, Los Alamos National Laboratory), and Xidi Wang (Global Consumer Bank, Citigroup)
Iterative Algorithm for Finding Frequent Patterns in Transactional Databases
13 pages, 8 tables and figures
null
null
null
cs.DB
null
A high-performance algorithm for searching for frequent patterns (FPs) in transactional databases is presented. The search for FPs is carried out by using an iterative sieve algorithm by computing the set of enclosed cycles. In each inner cycle of level FPs composed of elements are generated. The assigned number of enclosed cycles (the parameter of the problem) defines the maximum length of the desired FPs. The efficiency of the algorithm is produced by (i) the extremely simple logical searching scheme, (ii) the avoidance of recursive procedures, and (iii) the usage of only one-dimensional arrays of integers.
[ { "version": "v1", "created": "Fri, 26 Aug 2005 21:05:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Berman", "Gennady P.", "", "Theoretical Division, Los Alamos National Laboratory" ], [ "Gorshkov", "Vyacheslav N.", "", "Theoretical Division, Los Alamos National Laboratory" ], [ "MacKerrow", "Edward P.", "", "Theoretical Division, Los Alamos National Laboratory" ], [ "Wang", "Xidi", "", "Global\n Consumer Bank, Citigroup" ] ]
cs/0508125
Sheng Bao
Sheng Bao, De-Shun Zheng
A Sorting Algorithm Based on Calculation
null
null
null
null
cs.DS
null
This article introduces an adaptive sorting algorithm that can relocate elements accurately by substituting their values into a function which we name it the guessing function. We focus on building this function which is the mapping relationship between record values and their corresponding sorted locations essentially. The time complexity of this algorithm O(n),when records distributed uniformly. Additionally, similar approach can be used in the searching algorithm.
[ { "version": "v1", "created": "Mon, 29 Aug 2005 14:22:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Bao", "Sheng", "" ], [ "Zheng", "De-Shun", "" ] ]
cs/0508128
Dmitry Zinoviev
Dmitry Zinoviev
Mapping DEVS Models onto UML Models
6 pages, 4 figures Presented at Simulation Multiconference 2005
D. Zinoviev, "Mapping DEVS Models onto UML Models," Proc. of the 2005 DEVS Integrative M&S Symposium, San Diego, CA, April 2005, pp. 101-106
null
null
cs.OH
null
Discrete event simulation specification (DEVS) is a formalism designed to describe both discrete state and continuous state systems. It is a powerful abstract mathematical notation. However, until recently it lacked proper graphical representation, which made computer simulation of DEVS models a challenging issue. Unified modeling language (UML) is a multipurpose graphical modeling language, a de-facto industrial modeling standard. There exist several commercial and open-source UML editors and code generators. Most of them can save UML models in XML-based XMI files ready for further automated processing. In this paper, we propose a mapping of DEVS models onto UML state and component diagrams. This mapping may lead to an eventual unification of the two modeling formalisms, combining the abstractness of DEVS and expressive power and ``computer friendliness'' of the UML.
[ { "version": "v1", "created": "Tue, 30 Aug 2005 00:02:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Zinoviev", "Dmitry", "" ] ]
cs/0508129
Esra Erdem
Esra Erdem, Vladimir Lifschitz, and Don Ringe
Temporal Phylogenetic Networks and Logic Programming
null
null
null
null
cs.LO cs.AI cs.PL
null
The concept of a temporal phylogenetic network is a mathematical model of evolution of a family of natural languages. It takes into account the fact that languages can trade their characteristics with each other when linguistic communities are in contact, and also that a contact is only possible when the languages are spoken at the same time. We show how computational methods of answer set programming and constraint logic programming can be used to generate plausible conjectures about contacts between prehistoric linguistic communities, and illustrate our approach by applying it to the evolutionary history of Indo-European languages. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Tue, 30 Aug 2005 13:04:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Erdem", "Esra", "" ], [ "Lifschitz", "Vladimir", "" ], [ "Ringe", "Don", "" ] ]
cs/0508130
Mehul Shah
Mary Baker, Mehul Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, TJ Giuli, Prashanth Bungale
A Fresh Look at the Reliability of Long-term Digital Storage
null
null
null
null
cs.DL cs.DB cs.OS
null
Many emerging Web services, such as email, photo sharing, and web site archives, need to preserve large amounts of quickly-accessible data indefinitely into the future. In this paper, we make the case that these applications' demands on large scale storage systems over long time horizons require us to re-evaluate traditional storage system designs. We examine threats to long-lived data from an end-to-end perspective, taking into account not just hardware and software faults but also faults due to humans and organizations. We present a simple model of long-term storage failures that helps us reason about the various strategies for addressing these threats in a cost-effective manner. Using this model we show that the most important strategies for increasing the reliability of long-term storage are detecting latent faults quickly, automating fault repair to make it faster and cheaper, and increasing the independence of data replicas.
[ { "version": "v1", "created": "Wed, 31 Aug 2005 01:44:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Baker", "Mary", "" ], [ "Shah", "Mehul", "" ], [ "Rosenthal", "David S. H.", "" ], [ "Roussopoulos", "Mema", "" ], [ "Maniatis", "Petros", "" ], [ "Giuli", "TJ", "" ], [ "Bungale", "Prashanth", "" ] ]
cs/0508131
Vygintas Gontis
V. Gontis, B. Kaulakys, J. Ruseckas
Point Process Models of 1/f Noise and Internet Traffic
6 pages, 2 figures, CNET2004 Proceedings AIP
AIP Conf. Proc. 776, 144 (2005) 144-149
10.1063/1.1985385
null
cs.NI
null
We present a simple model reproducing the long-range autocorrelations and the power spectrum of the web traffic. The model assumes the traffic as Poisson flow of files with size distributed according to the power-law. In this model the long-range autocorrelations are independent of the network properties as well as of inter-packet time distribution.
[ { "version": "v1", "created": "Wed, 31 Aug 2005 13:53:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Gontis", "V.", "" ], [ "Kaulakys", "B.", "" ], [ "Ruseckas", "J.", "" ] ]
cs/0509005
Anne-Marie Vercoustre
Alistair McLean (CSIRO Ict Center), Mingfang Wu (CSIRO Ict Center), Anne-Marie Vercoustre (CSIRO Ict Center)
Combining Structured Corporate Data and Document Content to Improve Expertise Finding
long version of the ADCS'03 paper
null
null
null
cs.IR
null
In this paper, we present an algorithm for automatically building expertise evidence for finding experts within an organization by combining structured corporate information with different content. We also describe our test data collection and our evaluation method. Evaluation of the algorithm shows that using organizational structure leads to a significant improvement in the precision of finding an expert. Furthermore we evaluate the impact of using different data sources on the quality of the results and conclude that Expert Finding is not a "one engine fits all" solution. It requires an analysis of the information space into which a solution will be placed and the appropriate selection and weighting scheme of the data sources.
[ { "version": "v1", "created": "Fri, 2 Sep 2005 08:24:07 GMT" } ]
2007-05-23T00:00:00
[ [ "McLean", "Alistair", "", "CSIRO Ict Center" ], [ "Wu", "Mingfang", "", "CSIRO Ict Center" ], [ "Vercoustre", "Anne-Marie", "", "CSIRO Ict Center" ] ]
cs/0509011
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
Clustering Mixed Numeric and Categorical Data: A Cluster Ensemble Approach
14 pages
null
null
Tr-2002-10
cs.AI
null
Clustering is a widely used technique in data mining applications for discovering patterns in underlying data. Most traditional clustering algorithms are limited to handling datasets that contain either numeric or categorical attributes. However, datasets with mixed types of attributes are common in real life data mining applications. In this paper, we propose a novel divide-and-conquer technique to solve this problem. First, the original mixed dataset is divided into two sub-datasets: the pure categorical dataset and the pure numeric dataset. Next, existing well established clustering algorithms designed for different types of datasets are employed to produce corresponding clusters. Last, the clustering results on the categorical and numeric dataset are combined as a categorical dataset, on which the categorical data clustering algorithm is used to get the final clusters. Our contribution in this paper is to provide an algorithm framework for the mixed attributes clustering problem, in which existing clustering algorithms can be easily integrated, the capabilities of different kinds of clustering algorithms and characteristics of different types of datasets could be fully exploited. Comparisons with other clustering algorithms on real life datasets illustrate the superiority of our approach.
[ { "version": "v1", "created": "Mon, 5 Sep 2005 02:47:12 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0509017
Gilles Daniel
Gilles Daniel, Lev Muchnik, Sorin Solomon
Traders imprint themselves by adaptively updating their own avatar
12 pages, 4 figures, draft of a paper submitted to Artificial Economics 2005, September 15-16, Lille, France
null
null
null
cs.MA cs.CE
null
Simulations of artificial stock markets were considered as early as 1964 and multi-agent ones were introduced as early as 1989. Starting the early 90's, collaborations of economists and physicists produced increasingly realistic simulation platforms. Currently, the market stylized facts are easily reproduced and one has now to address the realistic details of the Market Microstructure and of the Traders Behaviour. This calls for new methods and tools capable of bridging smoothly between simulations and experiments in economics. We propose here the following Avatar-Based Method (ABM). The subjects implement and maintain their Avatars (programs encoding their personal decision making procedures) on NatLab, a market simulation platform. Once these procedures are fed in a computer edible format, they can be operationally used as such without the need for belabouring, interpreting or conceptualising them. Thus ABM short-circuits the usual behavioural economics experiments that search for the psychological mechanisms underlying the subjects behaviour. Finally, ABM maintains a level of objectivity close to the classical behaviourism while extending its scope to subjects' decision making mechanisms. We report on experiments where Avatars designed and maintained by humans from different backgrounds (including real traders) compete in a continuous double-auction market. We hope this unbiased way of capturing the adaptive evolution of real subjects behaviour may lead to a new kind of behavioural economics experiments with a high degree of reliability, analysability and reproducibility.
[ { "version": "v1", "created": "Tue, 6 Sep 2005 17:02:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Daniel", "Gilles", "" ], [ "Muchnik", "Lev", "" ], [ "Solomon", "Sorin", "" ] ]
cs/0509018
David S. H. Rosenthal
David S. H. Rosenthal, Thomas S. Robertson, Tom Lipkis, Vicky Reich, Seth Morabito
Requirements for Digital Preservation Systems: A Bottom-Up Approach
null
null
null
null
cs.DL
null
The field of digital preservation is being defined by a set of standards developed top-down, starting with an abstract reference model (OAIS) and gradually adding more specific detail. Systems claiming conformance to these standards are entering production use. Work is underway to certify that systems conform to requirements derived from OAIS. We complement these requirements derived top-down by presenting an alternate, bottom-up view of the field. The fundamental goal of these systems is to ensure that the information they contain remains accessible for the long term. We develop a parallel set of requirements based on observations of how existing systems handle this task, and on an analysis of the threats to achieving the goal. On this basis we suggest disclosures that systems should provide as to how they satisfy their goals.
[ { "version": "v1", "created": "Tue, 6 Sep 2005 19:26:08 GMT" }, { "version": "v2", "created": "Tue, 6 Sep 2005 20:17:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosenthal", "David S. H.", "" ], [ "Robertson", "Thomas S.", "" ], [ "Lipkis", "Tom", "" ], [ "Reich", "Vicky", "" ], [ "Morabito", "Seth", "" ] ]
cs/0509020
Johannes Stegmann Dr.
Johannes Stegmann, Guenter Grohmann (Charite, Berlin)
Transitive Text Mining for Information Extraction and Hypothesis Generation
12 pages, 6 figures
null
null
null
cs.IR cs.AI
null
Transitive text mining - also named Swanson Linking (SL) after its primary and principal researcher - tries to establish meaningful links between literature sets which are virtually disjoint in the sense that each does not mention the main concept of the other. If successful, SL may give rise to the development of new hypotheses. In this communication we describe our approach to transitive text mining which employs co-occurrence analysis of the medical subject headings (MeSH), the descriptors assigned to papers indexed in PubMed. In addition, we will outline the current state of our web-based information system which will enable our users to perform literature-driven hypothesis building on their own.
[ { "version": "v1", "created": "Wed, 7 Sep 2005 12:16:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Stegmann", "Johannes", "", "Charite, Berlin" ], [ "Grohmann", "Guenter", "", "Charite, Berlin" ] ]
cs/0509024
Nikolay Pelov
Nikolay Pelov, Marc Denecker, Maurice Bruynooghe
Well-founded and Stable Semantics of Logic Programs with Aggregates
54 pages; To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO
null
In this paper, we present a framework for the semantics and the computation of aggregates in the context of logic programming. In our study, an aggregate can be an arbitrary interpreted second order predicate or function. We define extensions of the Kripke-Kleene, the well-founded and the stable semantics for aggregate programs. The semantics is based on the concept of a three-valued immediate consequence operator of an aggregate program. Such an operator approximates the standard two-valued immediate consequence operator of the program, and induces a unique Kripke-Kleene model, a unique well-founded model and a collection of stable models. We study different ways of defining such operators and thus obtain a framework of semantics, offering different trade-offs between precision and tractability. In particular, we investigate conditions on the operator that guarantee that the computation of the three types of semantics remains on the same level as for logic programs without aggregates. Other results show that, in practice, even efficient three-valued immediate consequence operators which are very low in the precision hierarchy, still provide optimal precision.
[ { "version": "v1", "created": "Thu, 8 Sep 2005 19:54:53 GMT" }, { "version": "v2", "created": "Mon, 15 May 2006 18:41:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Pelov", "Nikolay", "" ], [ "Denecker", "Marc", "" ], [ "Bruynooghe", "Maurice", "" ] ]
cs/0509025
Jeremy Avigad
Jeremy Avigad, Kevin Donnelly, David Gray, and Paul Raff
A formally verified proof of the prime number theorem
23 pages
null
null
null
cs.AI cs.LO cs.SC
null
The prime number theorem, established by Hadamard and de la Vall'ee Poussin independently in 1896, asserts that the density of primes in the positive integers is asymptotic to 1 / ln x. Whereas their proofs made serious use of the methods of complex analysis, elementary proofs were provided by Selberg and Erd"os in 1948. We describe a formally verified version of Selberg's proof, obtained using the Isabelle proof assistant.
[ { "version": "v1", "created": "Fri, 9 Sep 2005 15:47:35 GMT" }, { "version": "v2", "created": "Thu, 19 Jan 2006 21:18:33 GMT" }, { "version": "v3", "created": "Thu, 6 Apr 2006 20:27:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Avigad", "Jeremy", "" ], [ "Donnelly", "Kevin", "" ], [ "Gray", "David", "" ], [ "Raff", "Paul", "" ] ]
cs/0509026
Mikkel Thorup
Nick Duffield, Carsten Lund, Mikkel Thorup
Sampling to estimate arbitrary subset sums
null
null
null
null
cs.DS
null
Starting with a set of weighted items, we want to create a generic sample of a certain size that we can later use to estimate the total weight of arbitrary subsets. For this purpose, we propose priority sampling which tested on Internet data performed better than previous methods by orders of magnitude. Priority sampling is simple to define and implement: we consider a steam of items i=0,...,n-1 with weights w_i. For each item i, we generate a random number r_i in (0,1) and create a priority q_i=w_i/r_i. The sample S consists of the k highest priority items. Let t be the (k+1)th highest priority. Each sampled item i in S gets a weight estimate W_i=max{w_i,t}, while non-sampled items get weight estimate W_i=0. Magically, it turns out that the weight estimates are unbiased, that is, E[W_i]=w_i, and by linearity of expectation, we get unbiased estimators over any subset sum simply by adding the sampled weight estimates from the subset. Also, we can estimate the variance of the estimates, and surpricingly, there is no co-variance between different weight estimates W_i and W_j. We conjecture an extremely strong near-optimality; namely that for any weight sequence, there exists no specialized scheme for sampling k items with unbiased estimators that gets smaller total variance than priority sampling with k+1 items. Very recently Mario Szegedy has settled this conjecture.
[ { "version": "v1", "created": "Fri, 9 Sep 2005 21:47:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Duffield", "Nick", "" ], [ "Lund", "Carsten", "" ], [ "Thorup", "Mikkel", "" ] ]
cs/0509027
Laemmel
Oleg Kiselyov and Ralf Laemmel
Haskell's overlooked object system
79 pages; software available at http://homepages.cwi.nl/~ralf/OOHaskell/
null
null
null
cs.PL
null
Haskell provides type-class-bounded and parametric polymorphism as opposed to subtype polymorphism of object-oriented languages such as Java and OCaml. It is a contentious question whether Haskell 98 without extensions, or with common extensions, or with new extensions can fully support conventional object-oriented programming with encapsulation, mutable state, inheritance, overriding, statically checked implicit and explicit subtyping, and so on. We systematically substantiate that Haskell 98, with some common extensions, supports all the conventional OO features plus more advanced ones, including first-class lexically scoped classes, implicitly polymorphic classes, flexible multiple inheritance, safe downcasts and safe co-variant arguments. Haskell indeed can support width and depth, structural and nominal subtyping. We address the particular challenge to preserve Haskell's type inference even for objects and object-operating functions. The OO features are introduced in Haskell as the OOHaskell library. OOHaskell lends itself as a sandbox for typed OO language design.
[ { "version": "v1", "created": "Sat, 10 Sep 2005 12:35:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiselyov", "Oleg", "" ], [ "Laemmel", "Ralf", "" ] ]
cs/0509030
Liu Jun-Bao Dr.
Liu Jun-Bao, Xiao Guo-Zhen
Multi-Proxy Multi-Signcryption Scheme from Pairings
4 pages
null
null
null
cs.CR
null
A first multi-proxy multi-signcryption scheme from pairings, which efficiently combines a multi-proxy multi-signature scheme with a signcryption, is proposed. Its security is analyzed in detail. In our scheme, a proxy signcrypter group could be authorized as a proxy agent by the cooperation of all members in the original signcrypter group. Then the proxy signcryptions can be generated by the cooperation of all the signcrypters in the authorized proxy signcrypter group on behalf of the original signcrypter group. The correctness and the security of this scheme are proved.
[ { "version": "v1", "created": "Mon, 12 Sep 2005 12:51:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Jun-Bao", "Liu", "" ], [ "Guo-Zhen", "Xiao", "" ] ]
cs/0509031
David S. Johnson
Janos Csirik, David S. Johnson, and Claire Kenyon
On the Worst-case Performance of the Sum-of-Squares Algorithm for Bin Packing
null
null
null
null
cs.DS
null
The Sum of Squares algorithm for bin packing was defined in [2] and studied in great detail in [1], where it was proved that its worst case performance ratio is at most 3. In this note, we improve the asymptotic worst case bound to 2.7777...
[ { "version": "v1", "created": "Mon, 12 Sep 2005 14:49:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Csirik", "Janos", "" ], [ "Johnson", "David S.", "" ], [ "Kenyon", "Claire", "" ] ]
cs/0509033
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng, Bin Dong
K-Histograms: An Efficient Clustering Algorithm for Categorical Dataset
11 pages
null
null
Tr-2003-08
cs.AI
null
Clustering categorical data is an integral part of data mining and has attracted much attention recently. In this paper, we present k-histogram, a new efficient algorithm for clustering categorical data. The k-histogram algorithm extends the k-means algorithm to categorical domain by replacing the means of clusters with histograms, and dynamically updates histograms in the clustering process. Experimental results on real datasets show that k-histogram algorithm can produce better clustering results than k-modes algorithm, the one related with our work most closely.
[ { "version": "v1", "created": "Tue, 13 Sep 2005 06:33:08 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ], [ "Dong", "Bin", "" ] ]
cs/0509034
Maurice Pouzet
Maurice Pouzet (ICJ), Nejib Zaguia (SITE)
N-free extensions of posets.Note on a theorem of P.A.Grillet
7 pages, 4 pictures
null
null
null
cs.DM
null
Let $S\_{N}(P)$ be the poset obtained by adding a dummy vertex on each diagonal edge of the $N$'s of a finite poset $P$. We show that $S\_{N}(S\_{N}(P))$ is $N$-free. It follows that this poset is the smallest $N$-free barycentric subdivision of the diagram of $P$, poset whose existence was proved by P.A. Grillet. This is also the poset obtained by the algorithm starting with $P\_0:=P$ and consisting at step $m$ of adding a dummy vertex on a diagonal edge of some $N$ in $P\_m$, proving that the result of this algorithm does not depend upon the particular choice of the diagonal edge choosen at each step. These results are linked to drawing of posets.
[ { "version": "v1", "created": "Tue, 13 Sep 2005 08:29:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Pouzet", "Maurice", "", "ICJ" ], [ "Zaguia", "Nejib", "", "SITE" ] ]
cs/0509036
Shujun Li Dr.
Shujun Li and Kwok-Tung Lo
Security Problems with Improper Implementations of Improved FEA-M
8 pages, elsart.cls
Journal of Systems and Software, vol. 80, no. 5, pp. 791-794, 2007
10.1016/j.jss.2006.05.002
null
cs.CR cs.MM
null
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-dependent differential chosen-plaintext attack or its chosen-ciphertext counterpart can reveal the secret key of the cryptosystem, if the involved (pseudo-)random process can be tampered (for example, through a public time service). The implementation-dependent differential attack is very efficient in complexity and needs only $O(n^2)$ chosen plaintext or ciphertext bits. In addition, this paper also points out a minor security problem with the selection of the session key. In real implementations of the cryptosystem, these security problems should be carefully avoided, or the cryptosystem has to be further enhanced to work under such weak implementations.
[ { "version": "v1", "created": "Tue, 13 Sep 2005 10:35:52 GMT" }, { "version": "v2", "created": "Sun, 25 Jun 2006 12:20:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Shujun", "" ], [ "Lo", "Kwok-Tung", "" ] ]
cs/0509037
David Hales
David Hales, Stefano Arteconi
Friends for Free: Self-Organizing Artificial Social Networks for Trust and Cooperation
null
null
null
null
cs.MA
null
By harvesting friendship networks from e-mail contacts or instant message "buddy lists" Peer-to-Peer (P2P) applications can improve performance in low trust environments such as the Internet. However, natural social networks are not always suitable, reliable or available. We propose an algorithm (SLACER) that allows peer nodes to create and manage their own friendship networks. We evaluate performance using a canonical test application, requiring cooperation between peers for socially optimal outcomes. The Artificial Social Networks (ASN) produced are connected, cooperative and robust - possessing many of the disable properties of human friendship networks such as trust between friends (directly linked peers) and short paths linking everyone via a chain of friends. In addition to new application possibilities, SLACER could supply ASN to P2P applications that currently depend on human social networks thus transforming them into fully autonomous, self-managing systems.
[ { "version": "v1", "created": "Wed, 14 Sep 2005 07:30:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Hales", "David", "" ], [ "Arteconi", "Stefano", "" ] ]
cs/0509038
Vilhelm Dahll\"of
Vilhelm Dahllof
Algorithms for Max Hamming Exact Satisfiability
null
null
null
null
cs.DS
null
We here study Max Hamming XSAT, ie, the problem of finding two XSAT models at maximum Hamming distance. By using a recent XSAT solver as an auxiliary function, an O(1.911^n) time algorithm can be constructed, where n is the number of variables. This upper time bound can be further improved to O(1.8348^n) by introducing a new kind of branching, more directly suited for finding models at maximum Hamming distance. The techniques presented here are likely to be of practical use as well as of theoretical value, proving that there are non-trivial algorithms for maximum Hamming distance problems.
[ { "version": "v1", "created": "Wed, 14 Sep 2005 09:04:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Dahllof", "Vilhelm", "" ] ]
cs/0509040
Christian Betz
Christian Betz, Alexander Hoernlein and Frank Puppe
Authoring case based training by document data extraction
11 pages, 10th ChEM Workshop, 2005; technical article
null
null
null
cs.AI cs.IR
null
In this paper, we propose an scalable approach to modeling based upon word processing documents, and we describe the tool Phoenix providing the technical infrastructure. For our training environment d3web.Train, we developed a tool to extract case knowledge from existing documents, usually dismissal records, extending Phoenix to d3web.CaseImporter. Independent authors used this tool to develop training systems, observing a significant decrease of time for setteling-in and a decrease of time necessary for developing a case.
[ { "version": "v1", "created": "Wed, 14 Sep 2005 13:20:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Betz", "Christian", "" ], [ "Hoernlein", "Alexander", "" ], [ "Puppe", "Frank", "" ] ]
cs/0509042
Mark Braverman
Mark Braverman, Stephen Cook
Computing over the Reals: Foundations for Scientific Computing
null
null
null
null
cs.CC cs.LO
null
We give a detailed treatment of the ``bit-model'' of computability and complexity of real functions and subsets of R^n, and argue that this is a good way to formalize many problems of scientific computation. In the introduction we also discuss the alternative Blum-Shub-Smale model. In the final section we discuss the issue of whether physical systems could defeat the Church-Turing Thesis.
[ { "version": "v1", "created": "Wed, 14 Sep 2005 17:58:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Braverman", "Mark", "" ], [ "Cook", "Stephen", "" ] ]
cs/0509050
Martyn Amos
Martyn Amos and Andrew Wood
Effect of door delay on aircraft evacuation time
8 pages, 2 figures
null
null
null
cs.MA
null
The recent commercial launch of twin-deck Very Large Transport Aircraft (VLTA) such as the Airbus A380 has raised questions concerning the speed at which they may be evacuated. The abnormal height of emergency exits on the upper deck has led to speculation that emotional factors such as fear may lead to door delay, and thus play a significant role in increasing overall evacuation time. Full-scale evacuation tests are financially expensive and potentially hazardous, and systematic studies of the evacuation of VLTA are rare. Here we present a computationally cheap agent-based framework for the general simulation of aircraft evacuation, and apply it to the particular case of the Airbus A380. In particular, we investigate the effect of door delay, and conclude that even a moderate average delay can lead to evacuation times that exceed the maximum for safety certification. The model suggests practical ways to minimise evacuation time, as well as providing a general framework for the simulation of evacuation.
[ { "version": "v1", "created": "Fri, 16 Sep 2005 17:15:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Amos", "Martyn", "" ], [ "Wood", "Andrew", "" ] ]
cs/0509053
Joshua Brandon Holden
Joshua Holden, Richard Layton, Laurence Merkle, and Tina Hudson
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
11 pages, 3 figures, uses amsrefs.sty v2.0 and cryptologiabib.sty (included); to appear in Cryptologia
Cryptologia, 30:69--77, 2006
null
null
cs.CR cs.CE
null
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics and science undergraduates. The competition included a cryptography problem, for which a workshop was run during the conference. This paper describes the competition, focusing on the cryptography problem and the workshop. Notes from the workshop and code for the computer programs are made available via the Internet. The results of a personal self-evaluation (PSE) are described.
[ { "version": "v1", "created": "Sun, 18 Sep 2005 22:11:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Holden", "Joshua", "" ], [ "Layton", "Richard", "" ], [ "Merkle", "Laurence", "" ], [ "Hudson", "Tina", "" ] ]
cs/0509054
Joseph O'Rourke
Mirela Damian, Robin Flatland, Joseph O'Rourke
Grid Vertex-Unfolding Orthogonal Polyhedra
Original: 12 pages, 8 figures, 11 references. Revised: 22 pages, 16 figures, 12 references. New version is a substantial revision superceding the preliminary extended abstract that appeared in Lecture Notes in Computer Science, Volume 3884, Springer, Berlin/Heidelberg, Feb. 2006, pp. 264-276
null
null
null
cs.CG cs.DM
null
An edge-unfolding of a polyhedron is produced by cutting along edges and flattening the faces to a *net*, a connected planar piece with no overlaps. A *grid unfolding* allows additional cuts along grid edges induced by coordinate planes passing through every vertex. A vertex-unfolding permits faces in the net to be connected at single vertices, not necessarily along edges. We show that any orthogonal polyhedron of genus zero has a grid vertex-unfolding. (There are orthogonal polyhedra that cannot be vertex-unfolded, so some type of "gridding" of the faces is necessary.) For any orthogonal polyhedron P with n vertices, we describe an algorithm that vertex-unfolds P in O(n^2) time. Enroute to explaining this algorithm, we present a simpler vertex-unfolding algorithm that requires a 3 x 1 refinement of the vertex grid.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 00:22:03 GMT" }, { "version": "v2", "created": "Wed, 27 Sep 2006 18:21:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Flatland", "Robin", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/0509055
Vikas Hamine
Vikas Hamine and Paul Helman
Learning Optimal Augmented Bayes Networks
4 pages, 1 figure
null
null
TR-CS-2004-11
cs.LG
null
Naive Bayes is a simple Bayesian classifier with strong independence assumptions among the attributes. This classifier, desipte its strong independence assumptions, often performs well in practice. It is believed that relaxing the independence assumptions of a naive Bayes classifier may improve the classification accuracy of the resulting structure. While finding an optimal unconstrained Bayesian Network (for most any reasonable scoring measure) is an NP-hard problem, it is possible to learn in polynomial time optimal networks obeying various structural restrictions. Several authors have examined the possibilities of adding augmenting arcs between attributes of a Naive Bayes classifier. Friedman, Geiger and Goldszmidt define the TAN structure in which the augmenting arcs form a tree on the attributes, and present a polynomial time algorithm that learns an optimal TAN with respect to MDL score. Keogh and Pazzani define Augmented Bayes Networks in which the augmenting arcs form a forest on the attributes (a collection of trees, hence a relaxation of the stuctural restriction of TAN), and present heuristic search methods for learning good, though not optimal, augmenting arc sets. The authors, however, evaluate the learned structure only in terms of observed misclassification error and not against a scoring metric, such as MDL. In this paper, we present a simple, polynomial time greedy algorithm for learning an optimal Augmented Bayes Network with respect to MDL score.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 04:57:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Hamine", "Vikas", "" ], [ "Helman", "Paul", "" ] ]
cs/0509056
David Freeman
David Freeman
Pairing-based identification schemes
null
null
null
null
cs.CR
null
We propose four different identification schemes that make use of bilinear pairings, and prove their security under certain computational assumptions. Each of the schemes is more efficient and/or more secure than any known pairing-based identification scheme.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 07:52:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Freeman", "David", "" ] ]
cs/0509057
Todd Veldhuizen
Todd L. Veldhuizen
Language embeddings that preserve staging and safety
null
null
null
null
cs.PL
null
We study embeddings of programming languages into one another that preserve what reductions take place at compile-time, i.e., staging. A certain condition -- what we call a `Turing complete kernel' -- is sufficient for a language to be stage-universal in the sense that any language may be embedded in it while preserving staging. A similar line of reasoning yields the notion of safety-preserving embeddings, and a useful characterization of safety-universality. Languages universal with respect to staging and safety are good candidates for realizing domain-specific embedded languages (DSELs) and `active libraries' that provide domain-specific optimizations and safety checks.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 15:30:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Veldhuizen", "Todd L.", "" ] ]
cs/0509060
Lane A. Hemaspaandra
Lane A. Hemaspaandra, Christopher M. Homan, Sven Kosub
Cluster Computing and the Power of Edge Recognition
null
null
null
URCS-TR-2005-878
cs.CC cs.DM
null
We study the robustness--the invariance under definition changes--of the cluster class CL#P [HHKW05]. This class contains each #P function that is computed by a balanced Turing machine whose accepting paths always form a cluster with respect to some length-respecting total order with efficient adjacency checks. The definition of CL#P is heavily influenced by the defining paper's focus on (global) orders. In contrast, we define a cluster class, CLU#P, to capture what seems to us a more natural model of cluster computing. We prove that the naturalness is costless: CL#P = CLU#P. Then we exploit the more natural, flexible features of CLU#P to prove new robustness results for CL#P and to expand what is known about the closure properties of CL#P. The complexity of recognizing edges--of an ordered collection of computation paths or of a cluster of accepting computation paths--is central to this study. Most particularly, our proofs exploit the power of unique discovery of edges--the ability of nondeterministic functions to, in certain settings, discover on exactly one (in some cases, on at most one) computation path a critical piece of information regarding edges of orderings or clusters.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 21:25:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Homan", "Christopher M.", "" ], [ "Kosub", "Sven", "" ] ]
cs/0509063
Krzysztof R. Apt
Krzysztof R. Apt
Order Independence and Rationalizability
Appeared in: Proc. of the 10th conference on Theoretical Aspects of Rationality and Knowledge (TARK X), pp. 22-38 (2005)
null
null
null
cs.GT
null
Two natural strategy elimination procedures have been studied for strategic games. The first one involves the notion of (strict, weak, etc) dominance and the second the notion of rationalizability. In the case of dominance the criterion of order independence allowed us to clarify which notions and under what circumstances are robust. In the case of rationalizability this criterion has not been considered. In this paper we investigate the problem of order independence for rationalizability by focusing on three naturally entailed reduction relations on games. These reduction relations are distinguished by the adopted reference point for the notion of a better response. Additionally, they are parametrized by the adopted system of beliefs. We show that for one reduction relation the outcome of its (possibly transfinite) iterations does not depend on the order of elimination of the strategies. This result does not hold for the other two reduction relations. However, under a natural assumption the iterations of all three reduction relations yield the same outcome. The obtained order independence results apply to the frameworks considered in Bernheim 84 and Pearce 84. For finite games the iterations of all three reduction relations coincide and the order independence holds for three natural systems of beliefs considered in the literature.
[ { "version": "v1", "created": "Tue, 20 Sep 2005 08:27:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/0509066
Richard McClatchey
David Manset, Richard McClatchey, Flavio Oquendo, Herve Verjus
A Model-driven Approach for Grid Services Engineering
7 pages, 3 figures. Proc of the 18th international conference on Software and Systems Engineering and Applications. Paris November 2005
null
null
null
cs.SE cs.DC
null
As a consequence to the hype of Grid computing, such systems have seldom been designed using formal techniques. The complexity and rapidly growing demand around Grid technologies has favour the use of classical development techniques, resulting in no guidelines or rules and unstructured engineering processes. This paper advocates a formal approach to Grid applications development in an effort to contribute to the rigorous development of Grids software architectures. This approach addresses cross-platform interoperability and quality of service; the model-driven paradigm is applied to a formal architecture-centric engineering method in order to benefit from the formal semantic description power in addition to model-based transformations. The result of such a novel combined concept promotes the re-use of design models and eases developments in Grid computing by providing an adapted development process and ensuring correctness at each design step.
[ { "version": "v1", "created": "Wed, 21 Sep 2005 17:39:19 GMT" }, { "version": "v2", "created": "Tue, 27 Sep 2005 15:36:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Manset", "David", "" ], [ "McClatchey", "Richard", "" ], [ "Oquendo", "Flavio", "" ], [ "Verjus", "Herve", "" ] ]
cs/0509071
Krzysztof R. Apt
Krzysztof R. Apt, Francesca Rossi and K. Brent Venable
CP-nets and Nash equilibria
6 pages. in: roc. of the Third International Conference on Computational Intelligence, Robotics and Autonomous Systems (CIRAS '05). To appear
null
null
null
cs.GT cs.AI
null
We relate here two formalisms that are used for different purposes in reasoning about multi-agent systems. One of them are strategic games that are used to capture the idea that agents interact with each other while pursuing their own interest. The other are CP-nets that were introduced to express qualitative and conditional preferences of the users and which aim at facilitating the process of preference elicitation. To relate these two formalisms we introduce a natural, qualitative, extension of the notion of a strategic game. We show then that the optimal outcomes of a CP-net are exactly the Nash equilibria of an appropriately defined strategic game in the above sense. This allows us to use the techniques of game theory to search for optimal outcomes of CP-nets and vice-versa, to use techniques developed for CP-nets to search for Nash equilibria of the considered games.
[ { "version": "v1", "created": "Thu, 22 Sep 2005 16:07:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Rossi", "Francesca", "" ], [ "Venable", "K. Brent", "" ] ]
cs/0509072
Kaikai Shen
Kaikai Shen, Lide Wu
Folksonomy as a Complex Network
null
null
null
null
cs.IR cs.DL physics.soc-ph
null
Folksonomy is an emerging technology that works to classify the information over WWW through tagging the bookmarks, photos or other web-based contents. It is understood to be organized by every user while not limited to the authors of the contents and the professional editors. This study surveyed the folksonomy as a complex network. The result indicates that the network, which is composed of the tags from the folksonomy, displays both properties of small world and scale-free. However, the statistics only shows a local and static slice of the vast body of folksonomy which is still evolving.
[ { "version": "v1", "created": "Fri, 23 Sep 2005 13:27:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Kaikai", "" ], [ "Wu", "Lide", "" ] ]
cs/0509074
Assaf Naor
Assaf Naor and Gideon Schechtman
Planar Earthmover is not in $L_1$
null
null
null
null
cs.CG math.FA
null
We show that any $L_1$ embedding of the transportation cost (a.k.a. Earthmover) metric on probability measures supported on the grid $\{0,1,...,n\}^2\subseteq \R^2$ incurs distortion $\Omega(\sqrt{\log n})$. We also use Fourier analytic techniques to construct a simple $L_1$ embedding of this space which has distortion $O(\log n)$.
[ { "version": "v1", "created": "Mon, 26 Sep 2005 16:26:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Naor", "Assaf", "" ], [ "Schechtman", "Gideon", "" ] ]
cs/0509076
Anil Bazaz
Anil Bazaz and James D. Arthur
On Vulnerabilities, Constraints and Assumptions
null
null
null
null
cs.CR
null
This report presents a taxonomy of vulnerabilities created as a part of an effort to develop a framework for deriving verification and validation strategies to assess software security. This taxonomy is grounded in a theoretical model of computing, which establishes the relationship between vulnerabilities, software applications and the computer system resources. This relationship illustrates that a software application is exploited by violating constraints imposed by computer system resources and assumptions made about their usage. In other words, a vulnerability exists in the software application if it allows violation of these constraints and assumptions. The taxonomy classifies these constraints and assumptions. The model also serves as a basis for the classification scheme the taxonomy uses, in which the computer system resources such as, memory, input/output, and cryptographic resources serve as categories and subcategories. Vulnerabilities, which are expressed in the form of constraints and assumptions, are classified according to these categories and subcategories. This taxonomy is both novel and distinctively different from other taxonomies found in the literature.
[ { "version": "v1", "created": "Mon, 26 Sep 2005 21:20:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Bazaz", "Anil", "" ], [ "Arthur", "James D.", "" ] ]
cs/0509082
Yossi Zana
Yossi Zana, Roberto M. Cesar-JR
Face Recognition Based on Polar Frequency Features
ACM Transactions on Applied Perception
null
null
null
cs.CV
null
A novel biologically motivated face recognition algorithm based on polar frequency is presented. Polar frequency descriptors are extracted from face images by Fourier-Bessel transform (FBT). Next, the Euclidean distance between all images is computed and each image is now represented by its dissimilarity to the other images. A Pseudo-Fisher Linear Discriminant was built on this dissimilarity space. The performance of Discrete Fourier transform (DFT) descriptors, and a combination of both feature types was also evaluated. The algorithms were tested on a 40- and 1196-subjects face database (ORL and FERET, respectively). With 5 images per subject in the training and test datasets, error rate on the ORL database was 3.8, 1.25 and 0.2% for the FBT, DFT, and the combined classifier, respectively, as compared to 2.6% achieved by the best previous algorithm. The most informative polar frequency features were concentrated at low-to-medium angular frequencies coupled to low radial frequencies. On the FERET database, where an affine normalization pre-processing was applied, the FBT algorithm outperformed only the PCA in a rank recognition test. However, it achieved performance comparable to state-of-the-art methods when evaluated by verification tests. These results indicate the high informative value of the polar frequency content of face images in relation to recognition and verification tasks, and that the Cartesian frequency content can complement information about the subjects' identity, but possibly only when the images are not pre-normalized. Possible implications for human face recognition are discussed.
[ { "version": "v1", "created": "Tue, 27 Sep 2005 15:50:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Zana", "Yossi", "" ], [ "Cesar-JR", "Roberto M.", "" ] ]
cs/0509083
Yossi Zana
Yossi Zana, Roberto M. Cesar-Jr, Rogerio S. Feris, Matthew Turk
Face Verification in Polar Frequency Domain: a Biologically Motivated Approach
2005, International Symposium on Visual Computing (ISVC)
null
null
null
cs.CV
null
We present a novel local-based face verification system whose components are analogous to those of biological systems. In the proposed system, after global registration and normalization, three eye regions are converted from the spatial to polar frequency domain by a Fourier-Bessel Transform. The resulting representations are embedded in a dissimilarity space, where each image is represented by its distance to all the other images. In this dissimilarity space a Pseudo-Fisher discriminator is built. ROC and equal error rate verification test results on the FERET database showed that the system performed at least as state-of-the-art methods and better than a system based on polar Fourier features. The local-based system is especially robust to facial expression and age variations, but sensitive to registration errors.
[ { "version": "v1", "created": "Tue, 27 Sep 2005 16:06:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Zana", "Yossi", "" ], [ "Cesar-Jr", "Roberto M.", "" ], [ "Feris", "Rogerio S.", "" ], [ "Turk", "Matthew", "" ] ]
cs/0509084
Herbert van de Sompel
Jeroen Bekaert, Xiaoming Liu, Herbert Van de Sompel
Representing Digital Assets for Long-Term Preservation using MPEG-21 DID
Accepted paper for PV 2005 "Ensuring Long-term Preservation and Adding Value to Scientific and Technical data" (http://www.ukoln.ac.uk/events/pv-2005/)
null
null
null
cs.DL
null
Various efforts aimed at representing digital assets have emerged from several communities over the last years, including the Metadata Encoding and Transmission Standard (METS), the IMS Content Packaging (IMS-CP) XML Binding and the XML Formatted Data Units (XFDU). The MPEG-21 Digital Item Declaration (MPEG-21 DID) is another approach that can be used for the representation of digital assets in XML. This paper will explore the potential of the MPEG-21 DID in a Digital Preservation context, by looking at the core building blocks of the OAIS Information Model and the way in which they map to the MPEG-21 DID abstract model and the MPEG-21 DIDL XML syntax.
[ { "version": "v1", "created": "Tue, 27 Sep 2005 19:05:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Bekaert", "Jeroen", "" ], [ "Liu", "Xiaoming", "" ], [ "Van de Sompel", "Herbert", "" ] ]
cs/0509090
Herbert van de Sompel
Jeroen Bekaert, Herbert Van de Sompel
Access Interfaces for Open Archival Information Systems based on the OAI-PMH and the OpenURL Framework for Context-Sensitive Services
Accepted paper for PV 2005 "Ensuring Long-term Preservation and Adding Value to Scientific and Technical data" (http://www.ukoln.ac.uk/events/pv-2005/)
null
null
null
cs.DL
null
In recent years, a variety of digital repository and archival systems have been developed and adopted. All of these systems aim at hosting a variety of compound digital assets and at providing tools for storing, managing and accessing those assets. This paper will focus on the definition of common and standardized access interfaces that could be deployed across such diverse digital respository and archival systems. The proposed interfaces are based on the two formal specifications that have recently emerged from the Digital Library community: The Open Archive Initiative Protocol for Metadata Harvesting (OAI-PMH) and the NISO OpenURL Framework for Context-Sensitive Services (OpenURL Standard). As will be described, the former allows for the retrieval of batches of XML-based representations of digital assets, while the latter facilitates the retrieval of disseminations of a specific digital asset or of one or more of its constituents. The core properties of the proposed interfaces are explained in terms of the Reference Model for an Open Archival Information System (OAIS).
[ { "version": "v1", "created": "Wed, 28 Sep 2005 14:57:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Bekaert", "Jeroen", "" ], [ "Van de Sompel", "Herbert", "" ] ]
cs/0509091
Gregory Gutin
G. Gutin, A. Rafiey, A. Yeo
Minimum Cost Homomorphisms to Semicomplete Multipartite Digraphs
null
null
null
null
cs.DM
null
For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a {\em homomorphism of $D$ to $H$} if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ For a fixed directed or undirected graph $H$ and an input graph $D$, the problem of verifying whether there exists a homomorphism of $D$ to $H$ has been studied in a large number of papers. We study an optimization version of this decision problem. Our optimization problem is motivated by a real-world problem in defence logistics and was introduced very recently by the authors and M. Tso. Suppose we are given a pair of digraphs $D,H$ and a positive integral cost $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$ of $D$ to $H$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. Let $H$ be a fixed digraph. The minimum cost homomorphism problem for $H$, MinHOMP($H$), is stated as follows: For input digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$, verify whether there is a homomorphism of $D$ to $H$ and, if it does exist, find such a homomorphism of minimum cost. In our previous paper we obtained a dichotomy classification of the time complexity of \MiP for $H$ being a semicomplete digraph. In this paper we extend the classification to semicomplete $k$-partite digraphs, $k\ge 3$, and obtain such a classification for bipartite tournaments.
[ { "version": "v1", "created": "Wed, 28 Sep 2005 15:40:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Rafiey", "A.", "" ], [ "Yeo", "A.", "" ] ]
cs/0509094
Carol Minton Morris Ms
Carol Minton Morris
Telling Great Stories: An NSDL Content and Communications System for Aggregation, Display, and Distribution of News and Features
3 pages, 2 figures
null
null
null
cs.DL cs.SE
null
Education digital libraries contain cataloged resources as well as contextual information about innovations in the use of educational technology, exemplar stories about community activities, and news from various user communities that include teachers, students, scholars, and developers. Long-standing library traditions of service, preservation, democratization of knowledge, rich discourse, equal access, and fair use are evident in library communications models that both pull in and push out contextual information from multiple sources integrated with editorial production processes. This paper argues that a dynamic narrative flow [1] is enabled by effective management of complex content and communications in a decentralized web-based education digital library making publishing objects such as aggregations of resources, or selected parts of objects [4] accessible through a Content and Communications System. Providing services that encourage patrons to reuse, reflect out, and contribute resources back [5] to the Library increases the reach and impact of the National Science Digital Library (NSDL). This system is a model for distributed content development and effective communications for education digital libraries in general.
[ { "version": "v1", "created": "Wed, 28 Sep 2005 16:28:19 GMT" }, { "version": "v2", "created": "Wed, 19 Oct 2005 21:20:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Morris", "Carol Minton", "" ] ]
cs/0509100
Shripad Thite
Jeff Erickson (1), Shripad Thite (1), David P. Bunde (1) ((1) Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA)
Distance-2 Edge Coloring is NP-Complete
3 pages, 1 figure in color
null
null
null
cs.DM cs.CC
null
We prove that it is NP-complete to determine whether there exists a distance-2 edge coloring (strong edge coloring) with 5 colors of a bipartite 2-inductive graph with girth 6 and maximum degree 3.
[ { "version": "v1", "created": "Fri, 30 Sep 2005 13:15:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Erickson", "Jeff", "" ], [ "Thite", "Shripad", "" ], [ "Bunde", "David P.", "" ] ]
cs/0510001
Jo\~ao Vitor Baldini Soares
Jo\~ao V. B. Soares, Jorge J. G. Leandro, Roberto M. Cesar Jr., Herbert F. Jelinek, Michael J. Cree
Retinal Vessel Segmentation Using the 2-D Morlet Wavelet and Supervised Classification
9 pages, 7 figures and 1 table. Accepted for publication in IEEE Trans Med Imag; added copyright notice
IEEE Trans Med Imag, Vol. 25, no. 9, pp. 1214- 1222, Sep. 2006.
10.1109/TMI.2006.879967
null
cs.CV
null
We present a method for automated segmentation of the vasculature in retinal images. The method produces segmentations by classifying each image pixel as vessel or non-vessel, based on the pixel's feature vector. Feature vectors are composed of the pixel's intensity and continuous two-dimensional Morlet wavelet transform responses taken at multiple scales. The Morlet wavelet is capable of tuning to specific frequencies, thus allowing noise filtering and vessel enhancement in a single step. We use a Bayesian classifier with class-conditional probability density functions (likelihoods) described as Gaussian mixtures, yielding a fast classification, while being able to model complex decision surfaces and compare its performance with the linear minimum squared error classifier. The probability distributions are estimated based on a training set of labeled pixels obtained from manual segmentations. The method's performance is evaluated on publicly available DRIVE and STARE databases of manually labeled non-mydriatic images. On the DRIVE database, it achieves an area under the receiver operating characteristic (ROC) curve of 0.9598, being slightly superior than that presented by the method of Staal et al.
[ { "version": "v1", "created": "Fri, 30 Sep 2005 22:27:45 GMT" }, { "version": "v2", "created": "Thu, 11 May 2006 17:09:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Soares", "João V. B.", "" ], [ "Leandro", "Jorge J. G.", "" ], [ "Cesar", "Roberto M.", "Jr." ], [ "Jelinek", "Herbert F.", "" ], [ "Cree", "Michael J.", "" ] ]
cs/0510011
David Delahaye
David Delahaye (CEDRIC), Micaela Mayero (LIPN)
Diophantus' 20th Problem and Fermat's Last Theorem for n=4: Formalization of Fermat's Proofs in the Coq Proof Assistant
16 pages
null
null
null
cs.LO cs.SE math.NT
null
We present the proof of Diophantus' 20th problem (book VI of Diophantus' Arithmetica), which consists in wondering if there exist right triangles whose sides may be measured as integers and whose surface may be a square. This problem was negatively solved by Fermat in the 17th century, who used the "wonderful" method (ipse dixit Fermat) of infinite descent. This method, which is, historically, the first use of induction, consists in producing smaller and smaller non-negative integer solutions assuming that one exists; this naturally leads to a reductio ad absurdum reasoning because we are bounded by zero. We describe the formalization of this proof which has been carried out in the Coq proof assistant. Moreover, as a direct and no less historical application, we also provide the proof (by Fermat) of Fermat's last theorem for n=4, as well as the corresponding formalization made in Coq.
[ { "version": "v1", "created": "Tue, 4 Oct 2005 08:53:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Delahaye", "David", "", "CEDRIC" ], [ "Mayero", "Micaela", "", "LIPN" ] ]
cs/0510013
Luc Bouganim
Luc Bouganim (INRIA Rocquencourt), Cosmin Cremarenco (INRIA Rocquencourt), Fran\c{c}ois Dang Ngoc (INRIA Rocquencourt, PRISM - UVSQ), Nicolas Dieu (INRIA Rocquencourt), Philippe Pucheral (INRIA Rocquencourt, PRISM - UVSQ)
Safe Data Sharing and Data Dissemination on Smart Devices
null
null
null
null
cs.CR cs.DB
null
The erosion of trust put in traditional database servers, the growing interest for different forms of data dissemination and the concern for protecting children from suspicious Internet content are different factors that lead to move the access control from servers to clients. Several encryption schemes can be used to serve this purpose but all suffer from a static way of sharing data. In a precedent paper, we devised smarter client-based access control managers exploiting hardware security elements on client devices. The goal pursued is being able to evaluate dynamic and personalized access control rules on a ciphered XML input document, with the benefit of dissociating access rights from encryption. In this demonstration, we validate our solution using a real smart card platform and explain how we deal with the constraints usually met on hardware security elements (small memory and low throughput). Finally, we illustrate the generality of the approach and the easiness of its deployment through two different applications: a collaborative application and a parental control application on video streams.
[ { "version": "v1", "created": "Wed, 5 Oct 2005 12:14:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Bouganim", "Luc", "", "INRIA Rocquencourt" ], [ "Cremarenco", "Cosmin", "", "INRIA\n Rocquencourt" ], [ "Ngoc", "François Dang", "", "INRIA Rocquencourt, PRISM - UVSQ" ], [ "Dieu", "Nicolas", "", "INRIA Rocquencourt" ], [ "Pucheral", "Philippe", "", "INRIA Rocquencourt,\n PRISM - UVSQ" ] ]
cs/0510015
Laurent Audibert
Laurent Audibert (DELIC)
Word sense disambiguation criteria: a systematic study
null
20th International Conference on Computational Linguistics (COLING-2004) (2004) pp. 910-916
null
null
cs.CL
null
This article describes the results of a systematic in-depth study of the criteria used for word sense disambiguation. Our study is based on 60 target words: 20 nouns, 20 adjectives and 20 verbs. Our results are not always in line with some practices in the field. For example, we show that omitting non-content words decreases performance and that bigrams yield better results than unigrams.
[ { "version": "v1", "created": "Wed, 5 Oct 2005 14:23:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Audibert", "Laurent", "", "DELIC" ] ]