id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0507070 | Anne-Marie Vercoustre | Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre | Hybrid XML Retrieval: Combining Information Retrieval and a Native XML
Database | Postprint version. The editor version can be accessed through the DOI | null | 10.1007/s10791-005-0748-1 | null | cs.IR | null | This paper investigates the impact of three approaches to XML retrieval:
using Zettair, a full-text information retrieval system; using eXist, a native
XML database; and using a hybrid system that takes full article answers from
Zettair and uses eXist to extract elements from those articles. For the
content-only topics, we undertake a preliminary analysis of the INEX 2003
relevance assessments in order to identify the types of highly relevant
document components. Further analysis identifies two complementary sub-cases of
relevance assessments ("General" and "Specific") and two categories of topics
("Broad" and "Narrow"). We develop a novel retrieval module that for a
content-only topic utilises the information from the resulting answer list of a
native XML database and dynamically determines the preferable units of
retrieval, which we call "Coherent Retrieval Elements". The results of our
experiments show that -- when each of the three systems is evaluated against
different retrieval scenarios (such as different cases of relevance
assessments, different topic categories and different choices of evaluation
metrics) -- the XML retrieval systems exhibit varying behaviour and the best
performance can be reached for different values of the retrieval parameters. In
the case of INEX 2003 relevance assessments for the content-only topics, our
newly developed hybrid XML retrieval system is substantially more effective
than either Zettair or eXist, and yields a robust and a very effective XML
retrieval.
| [
{
"version": "v1",
"created": "Thu, 28 Jul 2005 19:19:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pehcevski",
"Jovan",
"",
"RMIT"
],
[
"Thom",
"James A.",
"",
"RMIT"
],
[
"Vercoustre",
"Anne-Marie",
""
]
] |
cs/0507071 | Andreas U. Schmidt | Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt | Security for Distributed Web-Applications via Aspect-Oriented
Programming | Refereed contribution to the Conference Information Security South
Africa (ISSA 2005) Sandton, South Africa, 29. June - 1. July 2005 | null | null | null | cs.CR | null | Identity Management is becoming more and more important in business systems
as they are opened for third parties including trading partners, consumers and
suppliers. This paper presents an approach securing a system without any
knowledge of the system source code. The security module adds to the existing
system authentication and authorisation based on aspect oriented programming
and the liberty alliance framework, an upcoming industrie standard providing
single sign on. In an initial training phase the module is adapted to the
application which is to be secured. Moreover the use of hardware tokens and
proactive computing is demonstrated. The high modularisation is achived through
use of AspectJ, a programming language extension of Java.
| [
{
"version": "v1",
"created": "Fri, 29 Jul 2005 10:44:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Rauch",
"Thomas",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0507072 | Matthew Leslie | Matthew Leslie | Reliable Data Storage in Distributed Hash Tables | null | null | null | null | cs.DC cs.NI | null | Distributed Hash Tables offer a resilient lookup service for unstable
distributed environments. Resilient data storage, however, requires additional
data replication and maintenance algorithms. These algorithms can have an
impact on both the performance and the scalability of the system. In this
paper, we describe the goals and design space of these replication algorithms.
We examine an existing replication algorithm, and present a new analysis of
its reliability. We then present a new dynamic replication algorithm which can
operate in unstable environments. We give several possible replica placement
strategies for this algorithm, and show how they impact reliability and
performance.
Finally we compare all replication algorithms through simulation, showing
quantitatively the difference between their bandwidth use, fault tolerance and
performance.
| [
{
"version": "v1",
"created": "Fri, 29 Jul 2005 16:54:00 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Jul 2005 21:49:19 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Aug 2005 22:47:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leslie",
"Matthew",
""
]
] |
cs/0507073 | Michel Dagenais | Michel R. Dagenais (Dept. of Computer Engineering, Ecole
Polytechnique, Montreal, Canada) Karim Yaghmour (Opersys, Montreal, Canada)
Charles Levert (Ericsson Research, Montreal, Canada) Makan Pourzandi
(Ericsson Research, Montreal, Canada) | Software Performance Analysis | null | null | null | null | cs.PF cs.OS | null | The key to speeding up applications is often understanding where the elapsed
time is spent, and why. This document reviews in depth the full array of
performance analysis tools and techniques available on Linux for this task,
from the traditional tools like gcov and gprof, to the more advanced tools
still under development like oprofile and the Linux Trace Toolkit. The focus is
more on the underlying data collection and processing algorithms, and their
overhead and precision, than on the cosmetic details of the graphical user
interface frontends.
| [
{
"version": "v1",
"created": "Fri, 29 Jul 2005 19:33:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dagenais",
"Michel R.",
"",
"Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada"
],
[
"Yaghmour",
"Karim",
"",
"Opersys, Montreal, Canada"
],
[
"Levert",
"Charles",
"",
"Ericsson Research, Montreal, Canada"
],
[
"Pourzandi",
"Makan",
"",
"Ericsson Research, Montreal, Canada"
]
] |
cs/0508002 | Adilson Xavier V. | Gilson A. Giraldi, Luis C. da Costa, Adilson V. Xavier, Paulo S.
Rodrigues | Methods for Analytical Understanding of Agent-Based Modeling of Complex
Systems | null | null | null | null | cs.GR | null | Von Neuman's work on universal machines and the hardware development have
allowed the simulation of dynamical systems through a large set of interacting
agents. This is a bottom-up approach which tries to derive global properties of
a complex system through local interaction rules and agent behaviour.
Traditionally, such systems are modeled and simulated through top-down methods
based on differential equations. Agent-Based Modeling has the advantage of
simplicity and low computational cost. However, unlike differential equations,
there is no standard way to express agent behaviour. Besides, it is not clear
how to analytically predict the results obtained by the simulation. In this
paper we survey some of these methods. For expressing agent behaviour formal
methods, like Stochastic Process Algebras have been used. Such approach is
useful if the global properties of interest can be expressed as a function of
stochastic time series. However, if space variables must be considered, we
shall change the focus. In this case, multiscale techniques, based on
Chapman-Enskog expansion, was used to establish the connection between the
microscopic dynamics and the macroscopic observables. Also, we use data mining
techniques,like Principal Component Analysis (PCA), to study agent systems like
Cellular Automata. With the help of these tools we will discuss a simple
society model, a Lattice Gas Automaton for fluid modeling, and knowledge
discovery in CA databases. Besides, we show the capabilities of the NetLogo, a
software for agent simulation of complex system and show our experience about.
| [
{
"version": "v1",
"created": "Sat, 30 Jul 2005 12:31:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson A.",
""
],
[
"da Costa",
"Luis C.",
""
],
[
"Xavier",
"Adilson V.",
""
],
[
"Rodrigues",
"Paulo S.",
""
]
] |
cs/0508005 | Riccardo Pucella | Nick Papanikolaou | Logic Column 13: Reasoning Formally about Quantum Systems: An Overview | 17 pages | SIGACT News, 36(3), pp. 51-66, 2005 | null | null | cs.LO | null | This article is intended as an introduction to the subject of quantum logic,
and as a brief survey of the relevant literature. Also discussed here are
logics for specification and analysis of quantum information systems, in
particular, recent work by P. Mateus and A. Sernadas, and also by R. van der
Meyden and M. Patra. Overall, our objective is to provide a high-level
presentation of the logical aspects of quantum theory. Mateus' and Sernadas'
EQPL logic is illustrated with a small example, namely the state of an
entangled pair of qubits. The "KT" logic of van der Meyden and Patra is
demonstrated briefly in the context of the B92 protocol for quantum key
distribution.
| [
{
"version": "v1",
"created": "Mon, 1 Aug 2005 14:34:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Papanikolaou",
"Nick",
""
]
] |
cs/0508006 | Sandor P. Fekete | Sandor P. Fekete, Michael Kaufmann, Alexander Kroeller, and Katharina
Lehmann | A New Approach for Boundary Recognition in Geometric Sensor Networks | 4 pages, 5 figures, Latex, to appear in Canadian Conference on
Computational Geometry (CCCG 2005) | null | null | null | cs.DS cs.DC | null | We describe a new approach for dealing with the following central problem in
the self-organization of a geometric sensor network: Given a polygonal region
R, and a large, dense set of sensor nodes that are scattered uniformly at
random in R. There is no central control unit, and nodes can only communicate
locally by wireless radio to all other nodes that are within communication
radius r, without knowing their coordinates or distances to other nodes. The
objective is to develop a simple distributed protocol that allows nodes to
identify themselves as being located near the boundary of R and form connected
pieces of the boundary. We give a comparison of several centrality measures
commonly used in the analysis of social networks and show that restricted
stress centrality is particularly suited for geometric networks; we provide
mathematical as well as experimental evidence for the quality of this measure.
| [
{
"version": "v1",
"created": "Mon, 1 Aug 2005 19:44:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Kaufmann",
"Michael",
""
],
[
"Kroeller",
"Alexander",
""
],
[
"Lehmann",
"Katharina",
""
]
] |
cs/0508010 | Yongjin Kim | Yongjin Kim, Ahmed Helmy | ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION | null | null | null | null | cs.NI | null | Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious
problems in wireless networks due to limited network and host resources.
Attacker traceback is a promising solution to take a proper countermeasure near
the attack origins, to discourage attackers from launching attacks, and for
forensics. However, attacker traceback in Mobile Ad-hoc Networks (MANETs) is a
challenging problem due to the dynamic topology, and limited network resources.
It is especially difficult to trace back attacker(s) when they are moving to
avoid traceback. In this paper, we introduce the ATTENTION protocol framework,
which pays special attention to MAC layer abnormal activity under attack.
ATTENTION consists of three classes, namely, coarse-grained traceback,
fine-grained traceback and spatio-temporal fusion architecture. For
energy-efficient attacker searching in MANETs, we also utilize small-world
model. Our simulation analysis shows 79% of success rate in DoS attacker
traceback with coarse-grained attack signature. In addition, with fine-grained
attack signature, it shows 97% of success rate in DoS attacker traceback and
83% of success rate in DDoS attacker traceback. We also show that ATTENTION has
robustness against node collusion and mobility.
| [
{
"version": "v1",
"created": "Tue, 2 Aug 2005 04:04:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kim",
"Yongjin",
""
],
[
"Helmy",
"Ahmed",
""
]
] |
cs/0508016 | Jang-Won Lee | Jang-Won Lee, Mung Chiang, and A. Robert Calderbank | Distributed Algorithms for Optimal Rate-Reliability Tradeoff in Networks | To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005 | null | null | null | cs.NI | null | The current framework of network utility maximization for distributed rate
allocation assumes fixed channel code rates. However, by adapting the physical
layer channel coding, different rate-reliability tradeoffs can be achieved on
each link and for each end user. Consider a network where each user has a
utility function that depends on both signal quality and data rate, and each
link may provide a `fatter' (`thinner') information `pipe' by allowing a higher
(lower) decoding error probability. We propose two distributed, pricing-based
algorithms to attain optimal rate-reliability tradeoff, with an interpretation
that each user provides its willingness to pay for reliability to the network
and the network feeds back congestion prices to users. The proposed algorithms
converge to a tradeoff point between rate and reliability, which is proved to
be globally optimal for codes with sufficiently large codeword lengths and user
utilities with sufficiently negative curvatures.
| [
{
"version": "v1",
"created": "Tue, 2 Aug 2005 14:35:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Jang-Won",
""
],
[
"Chiang",
"Mung",
""
],
[
"Calderbank",
"A. Robert",
""
]
] |
cs/0508017 | Anne-Marie Vercoustre | Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre | Enhancing Content-And-Structure Information Retrieval using a Native XML
Database | null | null | null | null | cs.IR | null | Three approaches to content-and-structure XML retrieval are analysed in this
paper: first by using Zettair, a full-text information retrieval system; second
by using eXist, a native XML database, and third by using a hybrid XML
retrieval system that uses eXist to produce the final answers from likely
relevant articles retrieved by Zettair. INEX 2003 content-and-structure topics
can be classified in two categories: the first retrieving full articles as
final answers, and the second retrieving more specific elements within articles
as final answers. We show that for both topic categories our initial hybrid
system improves the retrieval effectiveness of a native XML database. For
ranking the final answer elements, we propose and evaluate a novel retrieval
model that utilises the structural relationships between the answer elements of
a native XML database and retrieves Coherent Retrieval Elements. The final
results of our experiments show that when the XML retrieval task focusses on
highly relevant elements our hybrid XML retrieval system with the Coherent
Retrieval Elements module is 1.8 times more effective than Zettair and 3 times
more effective than eXist, and yields an effective content-and-structure XML
retrieval.
| [
{
"version": "v1",
"created": "Tue, 2 Aug 2005 15:05:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pehcevski",
"Jovan",
"",
"RMIT"
],
[
"Thom",
"James A.",
"",
"RMIT"
],
[
"Vercoustre",
"Anne-Marie",
""
]
] |
cs/0508021 | Dmitri Krioukov | Dmitri Krioukov, kc claffy | Toward Compact Interdomain Routing | null | null | null | null | cs.NI | null | Despite prevailing concerns that the current Internet interdomain routing
system will not scale to meet the needs of the 21st century global Internet,
networking research has not yet led to the construction of a new routing
architecture with satisfactory and mathematically provable scalability
characteristics. Worse, continuing empirical trends of the existing routing and
topology structure of the Internet are alarming: the foundational principles of
the current routing and addressing architecture are an inherently bad match for
the naturally evolving structure of Internet interdomain topology. We are
fortunate that a sister discipline, theory of distributed computation, has
developed routing algorithms that offer promising potential for genuinely
scalable routing on realistic Internet-like topologies. Indeed, there are many
recent breakthroughs in the area of compact routing, which has been shown to
drastically outperform, in terms of efficiency and scalability, even the
boldest proposals developed in networking research. Many open questions remain,
but we believe the applicability of compact routing techniques to Internet
interdomain routing is a research area whose potential payoff for the future of
networking is too high to ignore.
| [
{
"version": "v1",
"created": "Tue, 2 Aug 2005 19:32:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krioukov",
"Dmitri",
""
],
[
"claffy",
"kc",
""
]
] |
cs/0508028 | Bernardo Huberman | Fang Wu, Zi Zhang and Bernardo A. Huberman | Truth-telling Reservations | null | null | null | null | cs.GT cond-mat.stat-mech cs.MA | null | We present a mechanism for reservations of bursty resources that is both
truthful and robust. It consists of option contracts whose pricing structure
induces users to reveal the true likelihoods that they will purchase a given
resource. Users are also allowed to adjust their options as their likelihood
changes. This scheme helps users save cost and the providers to plan ahead so
as to reduce the risk of under-utilization and overbooking. The mechanism
extracts revenue similar to that of a monopoly provider practicing temporal
pricing discrimination with a user population whose preference distribution is
known in advance.
| [
{
"version": "v1",
"created": "Wed, 3 Aug 2005 17:11:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wu",
"Fang",
""
],
[
"Zhang",
"Zi",
""
],
[
"Huberman",
"Bernardo A.",
""
]
] |
cs/0508029 | Johannes Schneider | Johannes J. Schneider and Scott Kirkpatrick | Selfish vs. Unselfish Optimization of Network Creation | 16 pages, 6 figures | null | 10.1088/1742-5468/2005/08/P08007 | null | cs.NI cs.AR cs.MA | null | We investigate several variants of a network creation model: a group of
agents builds up a network between them while trying to keep the costs of this
network small. The cost function consists of two addends, namely (i) a constant
amount for each edge an agent buys and (ii) the minimum number of hops it takes
sending messages to other agents. Despite the simplicity of this model, various
complex network structures emerge depending on the weight between the two
addends of the cost function and on the selfish or unselfish behaviour of the
agents.
| [
{
"version": "v1",
"created": "Wed, 3 Aug 2005 18:16:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schneider",
"Johannes J.",
""
],
[
"Kirkpatrick",
"Scott",
""
]
] |
cs/0508032 | Derek Messie | Derek Messie (1) and Jae C. Oh (1) ((1) Syracuse University) | Polymorphic Self-* Agents for Stigmergic Fault Mitigation in Large-Scale
Real-Time Embedded Systems | Fourth International Joint Conference on Autonomous Agents and
Multi-Agent Systems (AAMAS), Utrecht, Netherlands, July, 2005 | null | null | null | cs.AI cs.MA | null | Organization and coordination of agents within large-scale, complex,
distributed environments is one of the primary challenges in the field of
multi-agent systems. A lot of interest has surfaced recently around self-*
(self-organizing, self-managing, self-optimizing, self-protecting) agents. This
paper presents polymorphic self-* agents that evolve a core set of roles and
behavior based on environmental cues. The agents adapt these roles based on the
changing demands of the environment, and are directly implementable in computer
systems applications. The design combines strategies from game theory,
stigmergy, and other biologically inspired models to address fault mitigation
in large-scale, real-time, distributed systems. The agents are embedded within
the individual digital signal processors of BTeV, a High Energy Physics
experiment consisting of 2500 such processors. Results obtained using a SWARM
simulation of the BTeV environment demonstrate the polymorphic character of the
agents, and show how this design exceeds performance and reliability metrics
obtained from comparable centralized, and even traditional decentralized
approaches.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 01:43:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Messie",
"Derek",
"",
"Syracuse University"
],
[
"Oh",
"Jae C.",
"",
"Syracuse University"
]
] |
cs/0508033 | Dmitri Krioukov | Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Bradley Huffaker,
Xenofontas Dimitropoulos, kc claffy, Amin Vahdat | Lessons from Three Views of the Internet Topology | null | null | null | CAIDA-TR-2005-02 | cs.NI physics.soc-ph | null | Network topology plays a vital role in understanding the performance of
network applications and protocols. Thus, recently there has been tremendous
interest in generating realistic network topologies. Such work must begin with
an understanding of existing network topologies, which today typically consists
of a relatively small number of data sources. In this paper, we calculate an
extensive set of important characteristics of Internet AS-level topologies
extracted from the three data sources most frequently used by the research
community: traceroutes, BGP, and WHOIS. We find that traceroute and BGP
topologies are similar to one another but differ substantially from the WHOIS
topology. We discuss the interplay between the properties of the data sources
that result from specific data collection mechanisms and the resulting topology
views. We find that, among metrics widely considered, the joint degree
distribution appears to fundamentally characterize Internet AS-topologies: it
narrowly defines values for other important metrics. We also introduce an
evaluation criteria for the accuracy of topology generators and verify previous
observations that generators solely reproducing degree distributions cannot
capture the full spectrum of critical topological characteristics of any of the
three topologies. Finally, we release to the community the input topology
datasets, along with the scripts and output of our calculations. This
supplement should enable researchers to validate their models against real data
and to make more informed selection of topology data sources for their specific
needs.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 02:35:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mahadevan",
"Priya",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Fomenkov",
"Marina",
""
],
[
"Huffaker",
"Bradley",
""
],
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"claffy",
"kc",
""
],
[
"Vahdat",
"Amin",
""
]
] |
cs/0508036 | Anne-Marie Vercoustre | Thierry Despeyroux, Yves Lechevallier, Brigitte Trousse, Anne-Marie
Vercoustre | Exp\'{e}riences de classification d'une collection de documents XML de
structure homog\`{e}ne | Cette version corrige des erreurs dans le nom de 2 auteurs cites dans
la bibliographie | Dans 5\`{e}me Journ\'{e}es d' Extraction et de Gestion des
Connaissances (EGC 2005) | null | null | cs.IR | null | This paper presents some experiments in clustering homogeneous XMLdocuments
to validate an existing classification or more generally anorganisational
structure. Our approach integrates techniques for extracting knowledge from
documents with unsupervised classification (clustering) of documents. We focus
on the feature selection used for representing documents and its impact on the
emerging classification. We mix the selection of structured features with fine
textual selection based on syntactic characteristics.We illustrate and evaluate
this approach with a collection of Inria activity reports for the year 2003.
The objective is to cluster projects into larger groups (Themes), based on the
keywords or different chapters of these activity reports. We then compare the
results of clustering using different feature selections, with the official
theme structure used by Inria.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 14:14:59 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Aug 2005 13:15:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Despeyroux",
"Thierry",
""
],
[
"Lechevallier",
"Yves",
""
],
[
"Trousse",
"Brigitte",
""
],
[
"Vercoustre",
"Anne-Marie",
""
]
] |
cs/0508038 | Robert Burger PhD | John Robert Burger | Quantum Algorithm Processor For Finding Exact Divisors | null | null | null | null | cs.AR | null | Wiring diagrams are given for a quantum algorithm processor in CMOS to
compute, in parallel, all divisors of an n-bit integer. Lines required in a
wiring diagram are proportional to n. Execution time is proportional to the
square of n.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 17:35:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burger",
"John Robert",
""
]
] |
cs/0508041 | Tian-Jian Jiang | Tian-Jian Jiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong Tan,
Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu | OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services | 4 pages | null | null | null | cs.HC | null | Input method (IM) is a sine qua non for text entry of many Asian languages,
but its potential applications on other languages remain under-explored. This
paper proposes a philosophy of input method design by seeing it as a
nonintrusive plug-in text service framework. Such design allows new
functionalities of text processing to be attached onto a running application
without any tweaking of code. We also introduce OpenVanilla, a cross-platform
framework that is designed with the above-mentioned model in mind. Frameworks
like OpenVanilla have shown that an input method can be more than just a text
entry tool: it offers a convenient way for developing various text service and
language tools.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 22:39:49 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jun 2006 06:41:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jiang",
"Tian-Jian",
""
],
[
"Deng-Liu",
"",
""
],
[
"Liu",
"Kang-min",
""
],
[
"Yang",
"Weizhong",
""
],
[
"Tan",
"Pek-tiong",
""
],
[
"Hsieh",
"Mengjuei",
""
],
[
"Chang",
"Tsung-hsiang",
""
],
[
"Hsu",
"Wen-Lien",
""
]
] |
cs/0508042 | Tian-Jian Jiang | Tien-chien Chiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong
Tan, Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu | OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services | This paper has been withdrawn | null | null | null | cs.HC | null | This paper has been withdrawn by the author, because it was merged into
cs.HC/0508041
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 22:49:38 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jun 2006 06:46:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chiang",
"Tien-chien",
""
],
[
"Deng-Liu",
"",
""
],
[
"Liu",
"Kang-min",
""
],
[
"Yang",
"Weizhong",
""
],
[
"Tan",
"Pek-tiong",
""
],
[
"Hsieh",
"Mengjuei",
""
],
[
"Chang",
"Tsung-hsiang",
""
],
[
"Hsu",
"Wen-Lien",
""
]
] |
cs/0508045 | Ion Mandoiu | Christoph Albrecht, Andrew B. Kahng, Ion I. Mandoiu, and Alexander
Zelikovsky | Multicommodity Flow Algorithms for Buffered Global Routing | null | null | null | null | cs.DS | null | In this paper we describe a new algorithm for buffered global routing
according to a prescribed buffer site map. Specifically, we describe a provably
good multi-commodity flow based algorithm that finds a global routing
minimizing buffer and wire congestion subject to given constraints on routing
area (wirelength and number of buffers) and sink delays. Our algorithm allows
computing the tradeoff curve between routing area and wire/buffer congestion
under any combination of delay and capacity constraints, and simultaneously
performs buffer/wire sizing, as well as layer and pin assignment. Experimental
results show that near-optimal results are obtained with a practical runtime.
| [
{
"version": "v1",
"created": "Sat, 6 Aug 2005 12:44:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Albrecht",
"Christoph",
""
],
[
"Kahng",
"Andrew B.",
""
],
[
"Mandoiu",
"Ion I.",
""
],
[
"Zelikovsky",
"Alexander",
""
]
] |
cs/0508052 | Olivier Powell | Pierre Leone, Olivier Powell and Jose Rolim | Energy Optimal Data Propagation in Wireless Sensor Networks | 19 pages | Journal of Parallel and Distributed Computing Volume 67, Issue 3 ,
March 2007, Pages 302-317 | 10.1016/j.jpdc.2006.10.007 | null | cs.DC | null | We propose an algorithm which produces a randomized strategy reaching optimal
data propagation in wireless sensor networks (WSN).In [6] and [8], an energy
balanced solution is sought using an approximation algorithm. Our algorithm
improves by (a) when an energy-balanced solution does not exist, it still finds
an optimal solution (whereas previous algorithms did not consider this case and
provide no useful solution) (b) instead of being an approximation algorithm, it
finds the exact solution in one pass. We also provide a rigorous proof of the
optimality of our solution.
| [
{
"version": "v1",
"created": "Wed, 10 Aug 2005 15:54:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leone",
"Pierre",
""
],
[
"Powell",
"Olivier",
""
],
[
"Rolim",
"Jose",
""
]
] |
cs/0508053 | Peter Turney | Peter D. Turney (National Research Council of Canada) | Measuring Semantic Similarity by Latent Relational Analysis | 6 pages, related work available at http://purl.org/peter.turney/ | Proceedings of the Nineteenth International Joint Conference on
Artificial Intelligence (IJCAI-05), (2005), Edinburgh, Scotland, 1136-1141 | null | NRC-48255 | cs.LG cs.CL cs.IR | null | This paper introduces Latent Relational Analysis (LRA), a method for
measuring semantic similarity. LRA measures similarity in the semantic
relations between two pairs of words. When two pairs have a high degree of
relational similarity, they are analogous. For example, the pair cat:meow is
analogous to the pair dog:bark. There is evidence from cognitive science that
relational similarity is fundamental to many cognitive and linguistic tasks
(e.g., analogical reasoning). In the Vector Space Model (VSM) approach to
measuring relational similarity, the similarity between two pairs is calculated
by the cosine of the angle between the vectors that represent the two pairs.
The elements in the vectors are based on the frequencies of manually
constructed patterns in a large corpus. LRA extends the VSM approach in three
ways: (1) patterns are derived automatically from the corpus, (2) Singular
Value Decomposition is used to smooth the frequency data, and (3) synonyms are
used to reformulate word pairs. This paper describes the LRA algorithm and
experimentally compares LRA to VSM on two tasks, answering college-level
multiple-choice word analogy questions and classifying semantic relations in
noun-modifier expressions. LRA achieves state-of-the-art results, reaching
human-level performance on the analogy questions and significantly exceeding
VSM performance on both tasks.
| [
{
"version": "v1",
"created": "Wed, 10 Aug 2005 19:35:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] |
cs/0508061 | L.T. Handoko | L.T. Handoko | SciBlog : A Tool for Scientific Collaboration | 4 figures, invited talk at the Workshop on Knowledge Management (6-9
December 2004) | Proceeding of the WKM 2004 | null | FISIKALIPI-04013 | cs.CY | null | I describe a newly developed online scientific web-log (SciBlog). The online
facility consists of several moduls needed in a common and conventional
research activity. I show that this enables scientists around the world to
perform an online collaboration over the net.
| [
{
"version": "v1",
"created": "Thu, 11 Aug 2005 22:29:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Handoko",
"L. T.",
""
]
] |
cs/0508063 | Michel Dagenais | Michel R. Dagenais (Dept. of Computer Engineering, Ecole
Polytechnique, Montreal, Canada) | Disks, Partitions, Volumes and RAID Performance with the Linux Operating
System | null | null | null | null | cs.PF cs.OS | null | Block devices in computer operating systems typically correspond to disks or
disk partitions, and are used to store files in a filesystem. Disks are not the
only real or virtual device which adhere to the block accessible stream of
bytes block device model. Files, remote devices, or even RAM may be used as a
virtual disks. This article examines several common combinations of block
device layers used as virtual disks in the Linux operating system: disk
partitions, loopback files, software RAID, Logical Volume Manager, and Network
Block Devices. It measures their relative performance using different
filesystems: Ext2, Ext3, ReiserFS, JFS, XFS,NFS.
| [
{
"version": "v1",
"created": "Fri, 12 Aug 2005 16:13:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dagenais",
"Michel R.",
"",
"Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada"
]
] |
cs/0508065 | Herbert van de Sompel | Jeroen Bekaert, Herbert Van de Sompel | Representing Digital Assets using MPEG-21 Digital Item Declaration | 27 pages, accepted submission to the special edition on complex
objects of the International Journal on Digital Libraries | null | null | null | cs.DL cs.AR | null | Various XML-based approaches aimed at representing compound digital assets
have emerged over the last several years. Approaches that are of specific
relevance to the digital library community include the Metadata Encoding and
Transmission Standard (METS), the IMS Content Packaging XML Binding, and the
XML Formatted Data Units (XFDU) developed by CCSDS Panel 2. The MPEG-21 Digital
Item Declaration (MPEG-21 DID) is another standard specifying the
representation of digital assets in XML that, so far, has received little
attention in the digital library community. This article gives a brief insight
into the MPEG-21 standardization effort, highlights the major characteristics
of the MPEG-21 DID Abstract Model, and describes the MPEG-21 Digital Item
Declaration Language (MPEG-21 DIDL), an XML syntax for the representation of
digital assets based on the MPEG-21 DID Abstract Model. Also, it briefly
demonstrates the potential relevance of MPEG-21 DID to the digital library
community by describing its use in the aDORe repository environment at the
Research Library of the Los Alamos National Laboratory (LANL) for the
representation of digital assets.
| [
{
"version": "v1",
"created": "Sat, 13 Aug 2005 03:09:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bekaert",
"Jeroen",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] |
cs/0508066 | Jonathan Bowen | Silvia Filippini-Fantoni and Jonathan P. Bowen | Can Small Museums Develop Compelling, Educational and Accessible Web
Resources? The Case of Accademia Carrara | 14 pages, 6 figures | In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005
London Conference Proceedings, University College London, UK, 25-29 July
2005, pages 18.1-18.14. ISBN: 0-9543146-6-2 | null | null | cs.MM cs.CY cs.DL cs.IR | null | Due to the lack of budget, competence, personnel and time, small museums are
often unable to develop compelling, educational and accessible web resources
for their permanent collections or temporary exhibitions. In an attempt to
prove that investing in these types of resources can be very fruitful even for
small institutions, we will illustrate the case of Accademia Carrara, a museum
in Bergamo, northern Italy, which, for a current temporary exhibition on
Cezanne and Renoir's masterpieces from the Paul Guillaume collection, developed
a series of multimedia applications, including an accessible website, rich in
content and educational material [www.cezannerenoir.it].
| [
{
"version": "v1",
"created": "Sat, 13 Aug 2005 14:46:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Filippini-Fantoni",
"Silvia",
""
],
[
"Bowen",
"Jonathan P.",
""
]
] |
cs/0508067 | Jonathan Bowen | Teresa Numerico and Jonathan P. Bowen | Copyright and Promotion: Oxymoron or Opportunity? | 10 pages, 0 figures | In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005
London Conference Proceedings, University College London, UK, 25-29 July
2005, pages 25.1-25.10. ISBN: 0-9543146-6-2 | null | null | cs.CY cs.DL | null | Copyright in the cultural sphere can act as a barrier to the dissemination of
high-quality information. On the other hand it protects works of art that might
not be made available otherwise. This dichotomy makes the area of copyright
difficult, especially when it applies to the digital arena of the web where
copying is so easy and natural. Here we present a snapshot of the issues for
online copyright, with particular emphasis on the relevance to cultural
institutions. We concentrate on Europe and the US; as an example we include a
special section dedicated to the situation in Italy.
| [
{
"version": "v1",
"created": "Sat, 13 Aug 2005 14:58:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Numerico",
"Teresa",
""
],
[
"Bowen",
"Jonathan P.",
""
]
] |
cs/0508071 | Oded Schramm | Ryan O'Donnell, Michael Saks, Oded Schramm, Rocco A. Servedio | Every decision tree has an influential variable | This paper is posted by permission from the IEEE Computer Society. To
appear in FOCS 2005 | null | null | null | cs.CC cs.DM math.PR | null | We prove that for any decision tree calculating a boolean function
$f:\{-1,1\}^n\to\{-1,1\}$, \[ \Var[f] \le \sum_{i=1}^n \delta_i \Inf_i(f), \]
where $\delta_i$ is the probability that the $i$th input variable is read and
$\Inf_i(f)$ is the influence of the $i$th variable on $f$. The variance,
influence and probability are taken with respect to an arbitrary product
measure on $\{-1,1\}^n$. It follows that the minimum depth of a decision tree
calculating a given balanced function is at least the reciprocal of the largest
influence of any input variable. Likewise, any balanced boolean function with a
decision tree of depth $d$ has a variable with influence at least
$\frac{1}{d}$. The only previous nontrivial lower bound known was $\Omega(d
2^{-d})$. Our inequality has many generalizations, allowing us to prove
influence lower bounds for randomized decision trees, decision trees on
arbitrary product probability spaces, and decision trees with non-boolean
outputs. As an application of our results we give a very easy proof that the
randomized query complexity of nontrivial monotone graph properties is at least
$\Omega(v^{4/3}/p^{1/3})$, where $v$ is the number of vertices and $p \leq
\half$ is the critical threshold probability. This supersedes the milestone
$\Omega(v^{4/3})$ bound of Hajnal and is sometimes superior to the best known
lower bounds of Chakrabarti-Khot and Friedgut-Kahn-Wigderson.
| [
{
"version": "v1",
"created": "Tue, 16 Aug 2005 01:00:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Donnell",
"Ryan",
""
],
[
"Saks",
"Michael",
""
],
[
"Schramm",
"Oded",
""
],
[
"Servedio",
"Rocco A.",
""
]
] |
cs/0508073 | Marcus Hutter | Jan Poland and Marcus Hutter | Universal Learning of Repeated Matrix Games | 16 LaTeX pages, 8 eps figures | Proc. 15th Annual Machine Learning Conf. of Belgium and The
Netherlands (Benelearn 2006) pages 7-14 | null | IDSIA-18-05 | cs.LG cs.AI | null | We study and compare the learning dynamics of two universal learning
algorithms, one based on Bayesian learning and the other on prediction with
expert advice. Both approaches have strong asymptotic performance guarantees.
When confronted with the task of finding good long-term strategies in repeated
2x2 matrix games, they behave quite differently.
| [
{
"version": "v1",
"created": "Tue, 16 Aug 2005 16:27:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Poland",
"Jan",
""
],
[
"Hutter",
"Marcus",
""
]
] |
cs/0508078 | Serebrenik Alexander | Alexander Serebrenik, Susana Munoz-Hernandez | Proceedings of the 15th Workshop on Logic-based methods in Programming
Environments WLPE'05 -- October 5, 2005 -- Sitges (Barcelona), Spain | Seven accepted papers | null | null | null | cs.PL cs.LO cs.SE | null | This volume contains papers presented at WLPE 2005, 15th International
Workshop on Logic-based methods in Programming Environments.
The aim of the workshop is to provide an informal meeting for the researchers
working on logic-based tools for development and analysis of programs. This
year we emphasized two aspects: on one hand the presentation, pragmatics and
experiences of tools for logic programming environments; on the other one,
logic-based environmental tools for programming in general.
The workshop took place in Sitges (Barcelona), Spain as a satellite workshop
of the 21th International Conference on Logic Programming (ICLP 2005). This
workshop continues the series of successful international workshops on logic
programming environments held in Ohio, USA (1989), Eilat, Israel (1990), Paris,
France (1991), Washington, USA (1992), Vancouver, Canada (1993), Santa
Margherita Ligure, Italy (1994), Portland, USA (1995), Leuven, Belgium and Port
Jefferson, USA (1997), Las Cruces, USA (1999), Paphos, Cyprus (2001),
Copenhagen, Denmark (2002), Mumbai, India (2003) and Saint Malo, France (2004).
We have received eight submissions (2 from France, 2 Spain-US cooperations,
one Spain-Argentina cooperation, one from Japan, one from the United Kingdom
and one Sweden-France cooperation). Program committee has decided to accept
seven papers. This volume contains revised versions of the accepted papers.
We are grateful to the authors of the papers, the reviewers and the members
of the Program Committee for the help and fruitful discussions.
| [
{
"version": "v1",
"created": "Wed, 17 Aug 2005 13:35:20 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Aug 2005 07:57:41 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Aug 2005 16:15:24 GMT"
},
{
"version": "v4",
"created": "Thu, 25 Aug 2005 06:42:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Serebrenik",
"Alexander",
""
],
[
"Munoz-Hernandez",
"Susana",
""
]
] |
cs/0508079 | Nithin Nagaraj | Nithin Nagaraj and Vivek Vaidya and Prabhakar G Vaidya | Re-visiting the One-Time Pad | 13 pages, 3 figures, submitted for publication to IndoCrypt 2005
conference | null | null | null | cs.CR | null | In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic
system,also popularly known as the One-Time Pad (OTP). Since then, it has been
believed that the perfectly random and uncompressible OTP which is transmitted
needs to have a length equal to the message length for this result to be true.
In this paper, we prove that the length of the transmitted OTP which actually
contains useful information need not be compromised and could be less than the
message length without sacrificing perfect secrecy. We also provide a new
interpretation for the OTP encryption by treating the message bits as making
True/False statements about the pad, which we define as a private-object. We
introduce the paradigm of private-object cryptography where messages are
transmitted by verifying statements about a secret-object. We conclude by
suggesting the use of Formal Axiomatic Systems for investing N bits of secret.
| [
{
"version": "v1",
"created": "Thu, 18 Aug 2005 04:37:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nagaraj",
"Nithin",
""
],
[
"Vaidya",
"Vivek",
""
],
[
"Vaidya",
"Prabhakar G",
""
]
] |
cs/0508080 | Kirti Chawla | Kirti Chawla | A 3D RGB Axis-based Color-oriented Cryptography | 16 Pages, 12 figures | null | null | null | cs.CR | null | In this document, a formal approach to encrypt, decrypt, transmit and receive
information using colors is explored. A piece of information consists of set of
symbols with a definite property imposed on the generating set. The symbols are
usually encoded using ascii scheme. A linear to 3d transformation is presented.
The change of axis from traditional xyz to rgb is highlighted and its effect
are studied. A point in this new axis is then represented as a unique color and
a vector or matrix is associated with it, making it amenable to standard vector
or matrix operations. A formal notion on hybrid cryptography is introduced as
the algorithm lies on the boundary of symmetric and asymmetric cryptography. No
discussion is complete, without mentioning reference to communication aspects
of secure information in a channel. Transmission scheme pertaining to light as
carrier is introduced and studied. Key-exchanges do not come under the scope of
current frame of document.
| [
{
"version": "v1",
"created": "Thu, 18 Aug 2005 07:07:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chawla",
"Kirti",
""
]
] |
cs/0508081 | Kirti Chawla | Kirti Chawla | ZEUS - A Domain-Oriented Fact Comparison Based Authentication Protocol | 5 Pages | null | null | null | cs.CR | null | In this paper, facts existing in different domains are explored, which are
comparable by their end result. Properties of various domains and the facts
that are part of such a unit are also presented, examples of comparison and
methods of usage as means of zero-knowledge protocols are given, finally a
zero-knowledge protocol based on afore-mentioned concept is given.
| [
{
"version": "v1",
"created": "Thu, 18 Aug 2005 07:17:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chawla",
"Kirti",
""
]
] |
cs/0508082 | Bernardo Huberman | Scott Golder, Bernardo A. Huberman | The Structure of Collaborative Tagging Systems | null | null | null | null | cs.DL cs.CY | null | Collaborative tagging describes the process by which many users add metadata
in the form of keywords to shared content. Recently, collaborative tagging has
grown in popularity on the web, on sites that allow users to tag bookmarks,
photographs and other content. In this paper we analyze the structure of
collaborative tagging systems as well as their dynamical aspects. Specifically,
we discovered regularities in user activity, tag frequencies, kinds of tags
used, bursts of popularity in bookmarking and a remarkable stability in the
relative proportions of tags within a given url. We also present a dynamical
model of collaborative tagging that predicts these stable patterns and relates
them to imitation and shared knowledge.
| [
{
"version": "v1",
"created": "Thu, 18 Aug 2005 18:34:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Golder",
"Scott",
""
],
[
"Huberman",
"Bernardo A.",
""
]
] |
cs/0508086 | Dragos Trinca | Dragos Trinca | High-performance BWT-based Encoders | 12 pages | null | null | null | cs.DS | null | In 1994, Burrows and Wheeler developed a data compression algorithm which
performs significantly better than Lempel-Ziv based algorithms. Since then, a
lot of work has been done in order to improve their algorithm, which is based
on a reversible transformation of the input string, called BWT (the
Burrows-Wheeler transformation). In this paper, we propose a compression scheme
based on BWT, MTF (move-to-front coding), and a version of the algorithms
presented in [Dragos Trinca, ITCC-2004].
| [
{
"version": "v1",
"created": "Sun, 21 Aug 2005 05:47:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Trinca",
"Dragos",
""
]
] |
cs/0508087 | Dragos Trinca | Dragos Trinca | Modelling the Eulerian Path Problem using a String Matching Framework | 10 pages | null | null | null | cs.DS | null | The well-known Eulerian path problem can be solved in polynomial time (more
exactly, there exists a linear time algorithm for this problem). In this paper,
we model the problem using a string matching framework, and then initiate an
algorithmic study on a variant of this problem, called the (2,1)-STRING-MATCH
problem (which is actually a generalization of the Eulerian path problem).
Then, we present a polynomial-time algorithm for the (2,1)-STRING-MATCH
problem, which is the most important result of this paper. Specifically, we get
a lower bound of Omega(n), and an upper bound of O(n^{2}).
| [
{
"version": "v1",
"created": "Sun, 21 Aug 2005 06:08:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Trinca",
"Dragos",
""
]
] |
cs/0508089 | Dragos Trinca | Dragos Trinca | Modelling the EAH Data Compression Algorithm using Graph Theory | 10 pages | null | null | null | cs.DS | null | Adaptive codes associate variable-length codewords to symbols being encoded
depending on the previous symbols in the input data string. This class of codes
has been introduced in [Dragos Trinca, cs.DS/0505007] as a new class of
non-standard variable-length codes. New algorithms for data compression, based
on adaptive codes of order one, have been presented in [Dragos Trinca,
ITCC-2004], where we have behaviorally shown that for a large class of input
data strings, these algorithms substantially outperform the Lempel-Ziv
universal data compression algorithm. EAH has been introduced in [Dragos
Trinca, cs.DS/0505061], as an improved generalization of these algorithms. In
this paper, we present a translation of the EAH algorithm into the graph
theory.
| [
{
"version": "v1",
"created": "Sun, 21 Aug 2005 19:32:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Trinca",
"Dragos",
""
]
] |
cs/0508090 | Dragos Trinca | Dragos Trinca | Translating the EAH Data Compression Algorithm into Automata Theory | 9 pages | null | null | null | cs.DS | null | Adaptive codes have been introduced in [Dragos Trinca, cs.DS/0505007] as a
new class of non-standard variable-length codes. These codes associate
variable-length codewords to symbols being encoded depending on the previous
symbols in the input data string. A new data compression algorithm, called EAH,
has been introduced in [Dragos Trinca, cs.DS/0505061], where we have
behaviorally shown that for a large class of input data strings, this algorithm
substantially outperforms the well-known Lempel-Ziv universal data compression
algorithm. In this paper, we translate the EAH encoder into automata theory.
| [
{
"version": "v1",
"created": "Sun, 21 Aug 2005 19:56:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Trinca",
"Dragos",
""
]
] |
cs/0508091 | Serebrenik Alexander | Susana Munoz-Hernandez and Claudio Vaucheret | Extending Prolog with Incomplete Fuzzy Information | null | null | null | null | cs.PL cs.SE | null | Incomplete information is a problem in many aspects of actual environments.
Furthermore, in many sceneries the knowledge is not represented in a crisp way.
It is common to find fuzzy concepts or problems with some level of uncertainty.
There are not many practical systems which handle fuzziness and uncertainty and
the few examples that we can find are used by a minority. To extend a popular
system (which many programmers are using) with the ability of combining crisp
and fuzzy knowledge representations seems to be an interesting issue.
Our first work (Fuzzy Prolog) was a language that models
$\mathcal{B}([0,1])$-valued Fuzzy Logic. In the Borel algebra,
$\mathcal{B}([0,1])$, truth value is represented using unions of intervals of
real numbers. This work was more general in truth value representation and
propagation than previous works.
An interpreter for this language using Constraint Logic Programming over Real
numbers (CLP(${\cal R}$)) was implemented and is available in the Ciao system.
Now, we enhance our former approach by using default knowledge to represent
incomplete information in Logic Programming. We also provide the implementation
of this new framework. This new release of Fuzzy Prolog handles incomplete
information, it has a complete semantics (the previous one was incomplete as
Prolog) and moreover it is able to combine crisp and fuzzy logic in Prolog
programs. Therefore, new Fuzzy Prolog is more expressive to represent real
world.
Fuzzy Prolog inherited from Prolog its incompleteness. The incorporation of
default reasoning to Fuzzy Prolog removes this problem and requires a richer
semantics which we discuss.
| [
{
"version": "v1",
"created": "Mon, 22 Aug 2005 07:41:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Munoz-Hernandez",
"Susana",
""
],
[
"Vaucheret",
"Claudio",
""
]
] |
cs/0508092 | Stergos Afantenos | Stergos D. Afantenos, Vangelis Karkaletsis and Panagiotis
Stamatopoulos | Summarizing Reports on Evolving Events; Part I: Linear Evolution | 7 pages. Published on the Conference Recent Advances in Natural
Language Processing (RANLP, 2005) | Edited by Galia Angelova, Kalina Bontcheva, Ruslan Mitkov, Nicolas
Nicolov, and Nikolai Nikolov, Recent Advances in Natural Language Processing
(RANLP 2005). Borovets, Bulgaria: INCOMA, 18-24. | null | null | cs.CL cs.IR | null | We present an approach for summarization from multiple documents which report
on events that evolve through time, taking into account the different document
sources. We distinguish the evolution of an event into linear and non-linear.
According to our approach, each document is represented by a collection of
messages which are then used in order to instantiate the cross-document
relations that determine the summary content. The paper presents the
summarization system that implements this approach through a case study on
linear evolution.
| [
{
"version": "v1",
"created": "Mon, 22 Aug 2005 12:56:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Afantenos",
"Stergos D.",
""
],
[
"Karkaletsis",
"Vangelis",
""
],
[
"Stamatopoulos",
"Panagiotis",
""
]
] |
cs/0508100 | Alessandro Provetti | Alessandro Provetti | A primer on Answer Set Programming | 6 pages | null | null | null | cs.AI cs.LO | null | A introduction to the syntax and Semantics of Answer Set Programming intended
as an handout to [under]graduate students taking Artificial Intlligence or
Logic Programming classes.
| [
{
"version": "v1",
"created": "Tue, 23 Aug 2005 15:05:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Provetti",
"Alessandro",
""
]
] |
cs/0508102 | Emily Stone | Emily Stone, Suhail Ahmed, Abe Askari and Hong Tat | Investigations of Process Damping Forces in Metal Cutting | 27 pages, 27 figures, submitted to Journal of Computational Methods
in Science and Engineering, Feb. 2005 | null | null | null | cs.CE | null | Using finite element software developed for metal cutting by Third Wave
Systems we investigate the forces involved in chatter, a self-sustained
oscillation of the cutting tool. The phenomena is decomposed into a vibrating
tool cutting a flat surface work piece, and motionless tool cutting a work
piece with a wavy surface. While cutting the wavy surface, the shearplane was
seen to oscillate in advance of the oscillation of the depth of cut, as were
the cutting, thrust, and shear plane forces. The vibrating tool was used to
investigate process damping through the interaction of the relief face of the
tool and the workpiece. Crushing forces are isolated and compared to the
contact length between the tool and workpiece. We found that the wavelength
dependence of the forces depended on the relative size of the wavelength to the
length of the relief face of the tool. The results indicate that the damping
force from crushing will be proportional to the cutting speed for short tools,
and inversely proportional for long tools.
| [
{
"version": "v1",
"created": "Tue, 23 Aug 2005 19:52:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stone",
"Emily",
""
],
[
"Ahmed",
"Suhail",
""
],
[
"Askari",
"Abe",
""
],
[
"Tat",
"Hong",
""
]
] |
cs/0508103 | Peter Turney | Peter D. Turney (National Research Council of Canada), Michael L.
Littman (Rutgers University) | Corpus-based Learning of Analogies and Semantic Relations | related work available at http://purl.org/peter.turney/ and
http://www.cs.rutgers.edu/~mlittman/ | Machine Learning, (2005), 60(1-3), 251-278 | null | NRC-48273 | cs.LG cs.CL cs.IR | null | We present an algorithm for learning from unlabeled text, based on the Vector
Space Model (VSM) of information retrieval, that can solve verbal analogy
questions of the kind found in the SAT college entrance exam. A verbal analogy
has the form A:B::C:D, meaning "A is to B as C is to D"; for example,
mason:stone::carpenter:wood. SAT analogy questions provide a word pair, A:B,
and the problem is to select the most analogous word pair, C:D, from a set of
five choices. The VSM algorithm correctly answers 47% of a collection of 374
college-level analogy questions (random guessing would yield 20% correct; the
average college-bound senior high school student answers about 57% correctly).
We motivate this research by applying it to a difficult problem in natural
language processing, determining semantic relations in noun-modifier pairs. The
problem is to classify a noun-modifier pair, such as "laser printer", according
to the semantic relation between the noun (printer) and the modifier (laser).
We use a supervised nearest-neighbour algorithm that assigns a class to a given
noun-modifier pair by finding the most analogous noun-modifier pair in the
training data. With 30 classes of semantic relations, on a collection of 600
labeled noun-modifier pairs, the learning algorithm attains an F value of 26.5%
(random guessing: 3.3%). With 5 classes of semantic relations, the F value is
43.2% (random: 20%). The performance is state-of-the-art for both verbal
analogies and noun-modifier relations.
| [
{
"version": "v1",
"created": "Tue, 23 Aug 2005 20:21:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
],
[
"Littman",
"Michael L.",
"",
"Rutgers University"
]
] |
cs/0508105 | Ludovic Langevine | Ludovic Langevine and Mireille Ducasse | A Tracer Driver for Versatile Dynamic Analyses of Constraint Logic
Programs | In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments, October
2005, Spain. Whole proceedings: cs.PL/0508078. 15 pages | null | null | null | cs.SE | null | Programs with constraints are hard to debug. In this paper, we describe a
general architecture to help develop new debugging tools for constraint
programming. The possible tools are fed by a single general-purpose tracer. A
tracer-driver is used to adapt the actual content of the trace, according to
the needs of the tool. This enables the tools and the tracer to communicate in
a client-server scheme. Each tool describes its needs of execution data thanks
to event patterns. The tracer driver scrutinizes the execution according to
these event patterns and sends only the data that are relevant to the connected
tools. Experimental measures show that this approach leads to good performance
in the context of constraint logic programming, where a large variety of tools
exists and the trace is potentially huge.
| [
{
"version": "v1",
"created": "Wed, 24 Aug 2005 11:30:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Langevine",
"Ludovic",
""
],
[
"Ducasse",
"Mireille",
""
]
] |
cs/0508106 | Fred Mesnard | Etienne Payet and Fred Mesnard | An Improved Non-Termination Criterion for Binary Constraint Logic
Programs | In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments October
2005, Sitges. cs.PL/0508078 | null | null | null | cs.PL | null | On one hand, termination analysis of logic programs is now a fairly
established research topic within the logic programming community. On the other
hand, non-termination analysis seems to remain a much less attractive subject.
If we divide this line of research into two kinds of approaches: dynamic versus
static analysis, this paper belongs to the latter. It proposes a criterion for
detecting non-terminating atomic queries with respect to binary CLP clauses,
which strictly generalizes our previous works on this subject. We give a
generic operational definition and a logical form of this criterion. Then we
show that the logical form is correct and complete with respect to the
operational definition.
| [
{
"version": "v1",
"created": "Wed, 24 Aug 2005 12:18:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Payet",
"Etienne",
""
],
[
"Mesnard",
"Fred",
""
]
] |
cs/0508108 | Tristan Denmat | Tristan Denmat, Arnaud Gotlieb and Mireille Ducasse | Proving or Disproving likely Invariants with Constraint Reasoning | In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments October
2005, Sitges. cs.PL/0508078 | null | null | null | cs.SE cs.PL | null | A program invariant is a property that holds for every execution of the
program. Recent work suggest to infer likely-only invariants, via dynamic
analysis. A likely invariant is a property that holds for some executions but
is not guaranteed to hold for all executions. In this paper, we present work in
progress addressing the challenging problem of automatically verifying that
likely invariants are actual invariants. We propose a constraint-based
reasoning approach that is able, unlike other approaches, to both prove or
disprove likely invariants. In the latter case, our approach provides
counter-examples. We illustrate the approach on a motivating example where
automatically generated likely invariants are verified.
| [
{
"version": "v1",
"created": "Wed, 24 Aug 2005 13:30:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Denmat",
"Tristan",
""
],
[
"Gotlieb",
"Arnaud",
""
],
[
"Ducasse",
"Mireille",
""
]
] |
cs/0508109 | William Heaven | William Heaven and Alessandra Russo | Enhancing the Alloy Analyzer with Patterns of Analysis | 17 pages, 15th Workshop on Logic Programming Environments (WLPE05),
Sitges (Barcelona), Spain, 2005 | 15th Workshop on Logic Programming Environments (WLPE05), Sitges
(Barcelona), Spain, 2005 | null | null | cs.SE cs.LO | null | Formal techniques have been shown to be useful in the development of correct
software. But the level of expertise required of practitioners of these
techniques prohibits their widespread adoption. Formal techniques need to be
tailored to the commercial software developer. Alloy is a lightweight
specification language supported by the Alloy Analyzer (AA), a tool based on
off-the-shelf SAT technology. The tool allows a user to check interactively
whether given properties are consistent or valid with respect to a high-level
specification, providing an environment in which the correctness of such a
specification may be established. However, Alloy is not particularly suited to
expressing program specifications and the feedback provided by AA can be
misleading where the specification under analysis or the property being checked
contains inconsistencies. In this paper, we address these two shortcomings.
Firstly, we present a lightweight language called "Loy", tailored to the
specification of object-oriented programs. An encoding of Loy into Alloy is
provided so that AA can be used for automated analysis of Loy program
specifications. Secondly, we present some "patterns of analysis" that guide a
developer through the analysis of a Loy specification in order to establish its
correctness before implementation.
| [
{
"version": "v1",
"created": "Wed, 24 Aug 2005 15:35:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heaven",
"William",
""
],
[
"Russo",
"Alessandra",
""
]
] |
cs/0508110 | Ali Bagherzandi | Ali Bagherzandi, Kooshiar Azimian, Javad Mohajeri and Mahmoud
Salmasizadeh | Relations between semantic security and indistinguishability against
cpa, non-adaptive cca and adaptive cca in comparison based framework | 8 pages, 1 figure | null | null | null | cs.CR | null | In this paper we try to unify the frameworks of definitions of semantic
security, indistinguishability and non-malleability by defining semantic
security in comparison based framework. This facilitates the study of relations
among these goals against different attack models and makes the proof of the
equivalence of semantic security and indistinguishability easier and more
understandable. Besides, our proof of the equivalence of semantic security and
indistinguishability does not need any intermediate goals such as non
devidability to change the definition framework.
| [
{
"version": "v1",
"created": "Thu, 25 Aug 2005 04:58:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bagherzandi",
"Ali",
""
],
[
"Azimian",
"Kooshiar",
""
],
[
"Mohajeri",
"Javad",
""
],
[
"Salmasizadeh",
"Mahmoud",
""
]
] |
cs/0508111 | Elvira Albert | German Puebla, Elvira Albert, Manuel Hermenegildo | A Generic Framework for the Analysis and Specialization of Logic
Programs | In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments October
2005, Sitges. cs.PL/0508078 | null | null | null | cs.PL cs.SE | null | The relationship between abstract interpretation and partial deduction has
received considerable attention and (partial) integrations have been proposed
starting from both the partial deduction and abstract interpretation
perspectives. In this work we present what we argue is the first fully
described generic algorithm for efficient and precise integration of abstract
interpretation and partial deduction. Taking as starting point state-of-the-art
algorithms for context-sensitive, polyvariant abstract interpretation and
(abstract) partial deduction, we present an algorithm which combines the best
of both worlds. Key ingredients include the accurate success propagation
inherent to abstract interpretation and the powerful program transformations
achievable by partial deduction. In our algorithm, the calls which appear in
the analysis graph are not analyzed w.r.t. the original definition of the
procedure but w.r.t. specialized definitions of these procedures. Such
specialized definitions are obtained by applying both unfolding and abstract
executability. Our framework is parametric w.r.t. different control strategies
and abstract domains. Different combinations of such parameters correspond to
existing algorithms for program analysis and specialization. Simultaneously,
our approach opens the door to the efficient computation of strictly more
precise results than those achievable by each of the individual techniques. The
algorithm is now one of the key components of the CiaoPP analysis and
specialization system.
| [
{
"version": "v1",
"created": "Wed, 24 Aug 2005 21:50:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Puebla",
"German",
""
],
[
"Albert",
"Elvira",
""
],
[
"Hermenegildo",
"Manuel",
""
]
] |
cs/0508113 | Gilles Villard | Claude-Pierre Jeannerod (LIP), Gilles Villard (LIP) | Asymptotically fast polynomial matrix algorithms for multivariable
systems | null | null | null | JeVi05 | cs.SC cs.CC | null | We present the asymptotically fastest known algorithms for some basic
problems on univariate polynomial matrices: rank, nullspace, determinant,
generic inverse, reduced form. We show that they essentially can be reduced to
two computer algebra techniques, minimal basis computations and matrix fraction
expansion/reconstruction, and to polynomial matrix multiplication. Such
reductions eventually imply that all these problems can be solved in about the
same amount of time as polynomial matrix multiplication.
| [
{
"version": "v1",
"created": "Thu, 25 Aug 2005 13:52:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jeannerod",
"Claude-Pierre",
"",
"LIP"
],
[
"Villard",
"Gilles",
"",
"LIP"
]
] |
cs/0508116 | Robert Burger PhD | John Robert Burger | Quantum Algorithm Processors to Reveal Hamiltonian Cycles | 10 pages | null | null | null | cs.AR cs.CG | null | Quantum computer versus quantum algorithm processor in CMOS are compared to
find (in parallel) all Hamiltonian cycles in a graph with m edges and n
vertices, each represented by k bits. A quantum computer uses quantum states
analogous to CMOS registers. With efficient initialization, number of CMOS
registers is proportional to (n-1)! Number of qubits in a quantum computer is
approximately proportional to kn+2mn in the approach below. Using CMOS, the
bits per register is about proportional to kn, which is less since bits can be
irreversibly reset. In either concept, number of gates, or operations to
identify Hamiltonian cycles is proportional to kmn. However, a quantum computer
needs an additional exponentially large number of operations to accomplish a
probabilistic readout. In contrast, CMOS is deterministic and readout is
comparable to ordinary memory.
| [
{
"version": "v1",
"created": "Thu, 25 Aug 2005 19:04:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burger",
"John Robert",
""
]
] |
cs/0508117 | Xi Shen | Xi Shen (1), Philippe De Wilde (2) ((1) Imperial College London,
United Kingdom, (2) Heriot-Watt University, United Kingdom) | Long-term neuronal behavior caused by two synaptic modification
mechanisms | 11 pages, 5 figures | null | null | null | cs.NE cs.CE | null | We report the first results of simulating the coupling of neuronal,
astrocyte, and cerebrovascular activity. It is suggested that the dynamics of
the system is different from systems that only include neurons. In the
neuron-vascular coupling, distribution of synapse strengths affects neuronal
behavior and thus balance of the blood flow; oscillations are induced in the
neuron-to-astrocyte coupling.
| [
{
"version": "v1",
"created": "Fri, 26 Aug 2005 10:38:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shen",
"Xi",
""
],
[
"De Wilde",
"Philippe",
""
]
] |
cs/0508120 | Vyacheslav Gorshkov Mr | Gennady P. Berman, Vyacheslav N. Gorshkov, Edward P. MacKerrow
(Theoretical Division, Los Alamos National Laboratory), and Xidi Wang (Global
Consumer Bank, Citigroup) | Iterative Algorithm for Finding Frequent Patterns in Transactional
Databases | 13 pages, 8 tables and figures | null | null | null | cs.DB | null | A high-performance algorithm for searching for frequent patterns (FPs) in
transactional databases is presented. The search for FPs is carried out by
using an iterative sieve algorithm by computing the set of enclosed cycles. In
each inner cycle of level FPs composed of elements are generated. The assigned
number of enclosed cycles (the parameter of the problem) defines the maximum
length of the desired FPs. The efficiency of the algorithm is produced by (i)
the extremely simple logical searching scheme, (ii) the avoidance of recursive
procedures, and (iii) the usage of only one-dimensional arrays of integers.
| [
{
"version": "v1",
"created": "Fri, 26 Aug 2005 21:05:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berman",
"Gennady P.",
"",
"Theoretical Division, Los Alamos National Laboratory"
],
[
"Gorshkov",
"Vyacheslav N.",
"",
"Theoretical Division, Los Alamos National Laboratory"
],
[
"MacKerrow",
"Edward P.",
"",
"Theoretical Division, Los Alamos National Laboratory"
],
[
"Wang",
"Xidi",
"",
"Global\n Consumer Bank, Citigroup"
]
] |
cs/0508125 | Sheng Bao | Sheng Bao, De-Shun Zheng | A Sorting Algorithm Based on Calculation | null | null | null | null | cs.DS | null | This article introduces an adaptive sorting algorithm that can relocate
elements accurately by substituting their values into a function which we name
it the guessing function. We focus on building this function which is the
mapping relationship between record values and their corresponding sorted
locations essentially. The time complexity of this algorithm O(n),when records
distributed uniformly. Additionally, similar approach can be used in the
searching algorithm.
| [
{
"version": "v1",
"created": "Mon, 29 Aug 2005 14:22:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bao",
"Sheng",
""
],
[
"Zheng",
"De-Shun",
""
]
] |
cs/0508128 | Dmitry Zinoviev | Dmitry Zinoviev | Mapping DEVS Models onto UML Models | 6 pages, 4 figures Presented at Simulation Multiconference 2005 | D. Zinoviev, "Mapping DEVS Models onto UML Models," Proc. of the
2005 DEVS Integrative M&S Symposium, San Diego, CA, April 2005, pp. 101-106 | null | null | cs.OH | null | Discrete event simulation specification (DEVS) is a formalism designed to
describe both discrete state and continuous state systems. It is a powerful
abstract mathematical notation. However, until recently it lacked proper
graphical representation, which made computer simulation of DEVS models a
challenging issue. Unified modeling language (UML) is a multipurpose graphical
modeling language, a de-facto industrial modeling standard. There exist several
commercial and open-source UML editors and code generators. Most of them can
save UML models in XML-based XMI files ready for further automated processing.
In this paper, we propose a mapping of DEVS models onto UML state and component
diagrams. This mapping may lead to an eventual unification of the two modeling
formalisms, combining the abstractness of DEVS and expressive power and
``computer friendliness'' of the UML.
| [
{
"version": "v1",
"created": "Tue, 30 Aug 2005 00:02:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zinoviev",
"Dmitry",
""
]
] |
cs/0508129 | Esra Erdem | Esra Erdem, Vladimir Lifschitz, and Don Ringe | Temporal Phylogenetic Networks and Logic Programming | null | null | null | null | cs.LO cs.AI cs.PL | null | The concept of a temporal phylogenetic network is a mathematical model of
evolution of a family of natural languages. It takes into account the fact that
languages can trade their characteristics with each other when linguistic
communities are in contact, and also that a contact is only possible when the
languages are spoken at the same time. We show how computational methods of
answer set programming and constraint logic programming can be used to generate
plausible conjectures about contacts between prehistoric linguistic
communities, and illustrate our approach by applying it to the evolutionary
history of Indo-European languages.
To appear in Theory and Practice of Logic Programming (TPLP).
| [
{
"version": "v1",
"created": "Tue, 30 Aug 2005 13:04:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erdem",
"Esra",
""
],
[
"Lifschitz",
"Vladimir",
""
],
[
"Ringe",
"Don",
""
]
] |
cs/0508130 | Mehul Shah | Mary Baker, Mehul Shah, David S. H. Rosenthal, Mema Roussopoulos,
Petros Maniatis, TJ Giuli, Prashanth Bungale | A Fresh Look at the Reliability of Long-term Digital Storage | null | null | null | null | cs.DL cs.DB cs.OS | null | Many emerging Web services, such as email, photo sharing, and web site
archives, need to preserve large amounts of quickly-accessible data
indefinitely into the future. In this paper, we make the case that these
applications' demands on large scale storage systems over long time horizons
require us to re-evaluate traditional storage system designs. We examine
threats to long-lived data from an end-to-end perspective, taking into account
not just hardware and software faults but also faults due to humans and
organizations. We present a simple model of long-term storage failures that
helps us reason about the various strategies for addressing these threats in a
cost-effective manner. Using this model we show that the most important
strategies for increasing the reliability of long-term storage are detecting
latent faults quickly, automating fault repair to make it faster and cheaper,
and increasing the independence of data replicas.
| [
{
"version": "v1",
"created": "Wed, 31 Aug 2005 01:44:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baker",
"Mary",
""
],
[
"Shah",
"Mehul",
""
],
[
"Rosenthal",
"David S. H.",
""
],
[
"Roussopoulos",
"Mema",
""
],
[
"Maniatis",
"Petros",
""
],
[
"Giuli",
"TJ",
""
],
[
"Bungale",
"Prashanth",
""
]
] |
cs/0508131 | Vygintas Gontis | V. Gontis, B. Kaulakys, J. Ruseckas | Point Process Models of 1/f Noise and Internet Traffic | 6 pages, 2 figures, CNET2004 Proceedings AIP | AIP Conf. Proc. 776, 144 (2005) 144-149 | 10.1063/1.1985385 | null | cs.NI | null | We present a simple model reproducing the long-range autocorrelations and the
power spectrum of the web traffic. The model assumes the traffic as Poisson
flow of files with size distributed according to the power-law. In this model
the long-range autocorrelations are independent of the network properties as
well as of inter-packet time distribution.
| [
{
"version": "v1",
"created": "Wed, 31 Aug 2005 13:53:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gontis",
"V.",
""
],
[
"Kaulakys",
"B.",
""
],
[
"Ruseckas",
"J.",
""
]
] |
cs/0509005 | Anne-Marie Vercoustre | Alistair McLean (CSIRO Ict Center), Mingfang Wu (CSIRO Ict Center),
Anne-Marie Vercoustre (CSIRO Ict Center) | Combining Structured Corporate Data and Document Content to Improve
Expertise Finding | long version of the ADCS'03 paper | null | null | null | cs.IR | null | In this paper, we present an algorithm for automatically building expertise
evidence for finding experts within an organization by combining structured
corporate information with different content. We also describe our test data
collection and our evaluation method. Evaluation of the algorithm shows that
using organizational structure leads to a significant improvement in the
precision of finding an expert. Furthermore we evaluate the impact of using
different data sources on the quality of the results and conclude that Expert
Finding is not a "one engine fits all" solution. It requires an analysis of the
information space into which a solution will be placed and the appropriate
selection and weighting scheme of the data sources.
| [
{
"version": "v1",
"created": "Fri, 2 Sep 2005 08:24:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McLean",
"Alistair",
"",
"CSIRO Ict Center"
],
[
"Wu",
"Mingfang",
"",
"CSIRO Ict Center"
],
[
"Vercoustre",
"Anne-Marie",
"",
"CSIRO Ict Center"
]
] |
cs/0509011 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | Clustering Mixed Numeric and Categorical Data: A Cluster Ensemble
Approach | 14 pages | null | null | Tr-2002-10 | cs.AI | null | Clustering is a widely used technique in data mining applications for
discovering patterns in underlying data. Most traditional clustering algorithms
are limited to handling datasets that contain either numeric or categorical
attributes. However, datasets with mixed types of attributes are common in real
life data mining applications. In this paper, we propose a novel
divide-and-conquer technique to solve this problem. First, the original mixed
dataset is divided into two sub-datasets: the pure categorical dataset and the
pure numeric dataset. Next, existing well established clustering algorithms
designed for different types of datasets are employed to produce corresponding
clusters. Last, the clustering results on the categorical and numeric dataset
are combined as a categorical dataset, on which the categorical data clustering
algorithm is used to get the final clusters. Our contribution in this paper is
to provide an algorithm framework for the mixed attributes clustering problem,
in which existing clustering algorithms can be easily integrated, the
capabilities of different kinds of clustering algorithms and characteristics of
different types of datasets could be fully exploited. Comparisons with other
clustering algorithms on real life datasets illustrate the superiority of our
approach.
| [
{
"version": "v1",
"created": "Mon, 5 Sep 2005 02:47:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
cs/0509017 | Gilles Daniel | Gilles Daniel, Lev Muchnik, Sorin Solomon | Traders imprint themselves by adaptively updating their own avatar | 12 pages, 4 figures, draft of a paper submitted to Artificial
Economics 2005, September 15-16, Lille, France | null | null | null | cs.MA cs.CE | null | Simulations of artificial stock markets were considered as early as 1964 and
multi-agent ones were introduced as early as 1989. Starting the early 90's,
collaborations of economists and physicists produced increasingly realistic
simulation platforms. Currently, the market stylized facts are easily
reproduced and one has now to address the realistic details of the Market
Microstructure and of the Traders Behaviour. This calls for new methods and
tools capable of bridging smoothly between simulations and experiments in
economics.
We propose here the following Avatar-Based Method (ABM). The subjects
implement and maintain their Avatars (programs encoding their personal decision
making procedures) on NatLab, a market simulation platform. Once these
procedures are fed in a computer edible format, they can be operationally used
as such without the need for belabouring, interpreting or conceptualising them.
Thus ABM short-circuits the usual behavioural economics experiments that search
for the psychological mechanisms underlying the subjects behaviour. Finally,
ABM maintains a level of objectivity close to the classical behaviourism while
extending its scope to subjects' decision making mechanisms.
We report on experiments where Avatars designed and maintained by humans from
different backgrounds (including real traders) compete in a continuous
double-auction market. We hope this unbiased way of capturing the adaptive
evolution of real subjects behaviour may lead to a new kind of behavioural
economics experiments with a high degree of reliability, analysability and
reproducibility.
| [
{
"version": "v1",
"created": "Tue, 6 Sep 2005 17:02:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daniel",
"Gilles",
""
],
[
"Muchnik",
"Lev",
""
],
[
"Solomon",
"Sorin",
""
]
] |
cs/0509018 | David S. H. Rosenthal | David S. H. Rosenthal, Thomas S. Robertson, Tom Lipkis, Vicky Reich,
Seth Morabito | Requirements for Digital Preservation Systems: A Bottom-Up Approach | null | null | null | null | cs.DL | null | The field of digital preservation is being defined by a set of standards
developed top-down, starting with an abstract reference model (OAIS) and
gradually adding more specific detail. Systems claiming conformance to these
standards are entering production use. Work is underway to certify that systems
conform to requirements derived from OAIS.
We complement these requirements derived top-down by presenting an alternate,
bottom-up view of the field. The fundamental goal of these systems is to ensure
that the information they contain remains accessible for the long term. We
develop a parallel set of requirements based on observations of how existing
systems handle this task, and on an analysis of the threats to achieving the
goal. On this basis we suggest disclosures that systems should provide as to
how they satisfy their goals.
| [
{
"version": "v1",
"created": "Tue, 6 Sep 2005 19:26:08 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Sep 2005 20:17:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rosenthal",
"David S. H.",
""
],
[
"Robertson",
"Thomas S.",
""
],
[
"Lipkis",
"Tom",
""
],
[
"Reich",
"Vicky",
""
],
[
"Morabito",
"Seth",
""
]
] |
cs/0509020 | Johannes Stegmann Dr. | Johannes Stegmann, Guenter Grohmann (Charite, Berlin) | Transitive Text Mining for Information Extraction and Hypothesis
Generation | 12 pages, 6 figures | null | null | null | cs.IR cs.AI | null | Transitive text mining - also named Swanson Linking (SL) after its primary
and principal researcher - tries to establish meaningful links between
literature sets which are virtually disjoint in the sense that each does not
mention the main concept of the other. If successful, SL may give rise to the
development of new hypotheses. In this communication we describe our approach
to transitive text mining which employs co-occurrence analysis of the medical
subject headings (MeSH), the descriptors assigned to papers indexed in PubMed.
In addition, we will outline the current state of our web-based information
system which will enable our users to perform literature-driven hypothesis
building on their own.
| [
{
"version": "v1",
"created": "Wed, 7 Sep 2005 12:16:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stegmann",
"Johannes",
"",
"Charite, Berlin"
],
[
"Grohmann",
"Guenter",
"",
"Charite, Berlin"
]
] |
cs/0509024 | Nikolay Pelov | Nikolay Pelov, Marc Denecker, Maurice Bruynooghe | Well-founded and Stable Semantics of Logic Programs with Aggregates | 54 pages; To appear in Theory and Practice of Logic Programming
(TPLP) | null | null | null | cs.LO | null | In this paper, we present a framework for the semantics and the computation
of aggregates in the context of logic programming. In our study, an aggregate
can be an arbitrary interpreted second order predicate or function. We define
extensions of the Kripke-Kleene, the well-founded and the stable semantics for
aggregate programs. The semantics is based on the concept of a three-valued
immediate consequence operator of an aggregate program. Such an operator
approximates the standard two-valued immediate consequence operator of the
program, and induces a unique Kripke-Kleene model, a unique well-founded model
and a collection of stable models. We study different ways of defining such
operators and thus obtain a framework of semantics, offering different
trade-offs between precision and tractability. In particular, we investigate
conditions on the operator that guarantee that the computation of the three
types of semantics remains on the same level as for logic programs without
aggregates. Other results show that, in practice, even efficient three-valued
immediate consequence operators which are very low in the precision hierarchy,
still provide optimal precision.
| [
{
"version": "v1",
"created": "Thu, 8 Sep 2005 19:54:53 GMT"
},
{
"version": "v2",
"created": "Mon, 15 May 2006 18:41:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pelov",
"Nikolay",
""
],
[
"Denecker",
"Marc",
""
],
[
"Bruynooghe",
"Maurice",
""
]
] |
cs/0509025 | Jeremy Avigad | Jeremy Avigad, Kevin Donnelly, David Gray, and Paul Raff | A formally verified proof of the prime number theorem | 23 pages | null | null | null | cs.AI cs.LO cs.SC | null | The prime number theorem, established by Hadamard and de la Vall'ee Poussin
independently in 1896, asserts that the density of primes in the positive
integers is asymptotic to 1 / ln x. Whereas their proofs made serious use of
the methods of complex analysis, elementary proofs were provided by Selberg and
Erd"os in 1948. We describe a formally verified version of Selberg's proof,
obtained using the Isabelle proof assistant.
| [
{
"version": "v1",
"created": "Fri, 9 Sep 2005 15:47:35 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Jan 2006 21:18:33 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2006 20:27:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Avigad",
"Jeremy",
""
],
[
"Donnelly",
"Kevin",
""
],
[
"Gray",
"David",
""
],
[
"Raff",
"Paul",
""
]
] |
cs/0509026 | Mikkel Thorup | Nick Duffield, Carsten Lund, Mikkel Thorup | Sampling to estimate arbitrary subset sums | null | null | null | null | cs.DS | null | Starting with a set of weighted items, we want to create a generic sample of
a certain size that we can later use to estimate the total weight of arbitrary
subsets. For this purpose, we propose priority sampling which tested on
Internet data performed better than previous methods by orders of magnitude.
Priority sampling is simple to define and implement: we consider a steam of
items i=0,...,n-1 with weights w_i. For each item i, we generate a random
number r_i in (0,1) and create a priority q_i=w_i/r_i. The sample S consists of
the k highest priority items. Let t be the (k+1)th highest priority. Each
sampled item i in S gets a weight estimate W_i=max{w_i,t}, while non-sampled
items get weight estimate W_i=0.
Magically, it turns out that the weight estimates are unbiased, that is,
E[W_i]=w_i, and by linearity of expectation, we get unbiased estimators over
any subset sum simply by adding the sampled weight estimates from the subset.
Also, we can estimate the variance of the estimates, and surpricingly, there is
no co-variance between different weight estimates W_i and W_j.
We conjecture an extremely strong near-optimality; namely that for any weight
sequence, there exists no specialized scheme for sampling k items with unbiased
estimators that gets smaller total variance than priority sampling with k+1
items. Very recently Mario Szegedy has settled this conjecture.
| [
{
"version": "v1",
"created": "Fri, 9 Sep 2005 21:47:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Duffield",
"Nick",
""
],
[
"Lund",
"Carsten",
""
],
[
"Thorup",
"Mikkel",
""
]
] |
cs/0509027 | Laemmel | Oleg Kiselyov and Ralf Laemmel | Haskell's overlooked object system | 79 pages; software available at
http://homepages.cwi.nl/~ralf/OOHaskell/ | null | null | null | cs.PL | null | Haskell provides type-class-bounded and parametric polymorphism as opposed to
subtype polymorphism of object-oriented languages such as Java and OCaml. It is
a contentious question whether Haskell 98 without extensions, or with common
extensions, or with new extensions can fully support conventional
object-oriented programming with encapsulation, mutable state, inheritance,
overriding, statically checked implicit and explicit subtyping, and so on. We
systematically substantiate that Haskell 98, with some common extensions,
supports all the conventional OO features plus more advanced ones, including
first-class lexically scoped classes, implicitly polymorphic classes, flexible
multiple inheritance, safe downcasts and safe co-variant arguments. Haskell
indeed can support width and depth, structural and nominal subtyping. We
address the particular challenge to preserve Haskell's type inference even for
objects and object-operating functions. The OO features are introduced in
Haskell as the OOHaskell library. OOHaskell lends itself as a sandbox for typed
OO language design.
| [
{
"version": "v1",
"created": "Sat, 10 Sep 2005 12:35:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiselyov",
"Oleg",
""
],
[
"Laemmel",
"Ralf",
""
]
] |
cs/0509030 | Liu Jun-Bao Dr. | Liu Jun-Bao, Xiao Guo-Zhen | Multi-Proxy Multi-Signcryption Scheme from Pairings | 4 pages | null | null | null | cs.CR | null | A first multi-proxy multi-signcryption scheme from pairings, which
efficiently combines a multi-proxy multi-signature scheme with a signcryption,
is proposed. Its security is analyzed in detail. In our scheme, a proxy
signcrypter group could be authorized as a proxy agent by the cooperation of
all members in the original signcrypter group. Then the proxy signcryptions can
be generated by the cooperation of all the signcrypters in the authorized proxy
signcrypter group on behalf of the original signcrypter group. The correctness
and the security of this scheme are proved.
| [
{
"version": "v1",
"created": "Mon, 12 Sep 2005 12:51:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jun-Bao",
"Liu",
""
],
[
"Guo-Zhen",
"Xiao",
""
]
] |
cs/0509031 | David S. Johnson | Janos Csirik, David S. Johnson, and Claire Kenyon | On the Worst-case Performance of the Sum-of-Squares Algorithm for Bin
Packing | null | null | null | null | cs.DS | null | The Sum of Squares algorithm for bin packing was defined in [2] and studied
in great detail in [1], where it was proved that its worst case performance
ratio is at most 3. In this note, we improve the asymptotic worst case bound to
2.7777...
| [
{
"version": "v1",
"created": "Mon, 12 Sep 2005 14:49:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Csirik",
"Janos",
""
],
[
"Johnson",
"David S.",
""
],
[
"Kenyon",
"Claire",
""
]
] |
cs/0509033 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng, Bin Dong | K-Histograms: An Efficient Clustering Algorithm for Categorical Dataset | 11 pages | null | null | Tr-2003-08 | cs.AI | null | Clustering categorical data is an integral part of data mining and has
attracted much attention recently. In this paper, we present k-histogram, a new
efficient algorithm for clustering categorical data. The k-histogram algorithm
extends the k-means algorithm to categorical domain by replacing the means of
clusters with histograms, and dynamically updates histograms in the clustering
process. Experimental results on real datasets show that k-histogram algorithm
can produce better clustering results than k-modes algorithm, the one related
with our work most closely.
| [
{
"version": "v1",
"created": "Tue, 13 Sep 2005 06:33:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
],
[
"Dong",
"Bin",
""
]
] |
cs/0509034 | Maurice Pouzet | Maurice Pouzet (ICJ), Nejib Zaguia (SITE) | N-free extensions of posets.Note on a theorem of P.A.Grillet | 7 pages, 4 pictures | null | null | null | cs.DM | null | Let $S\_{N}(P)$ be the poset obtained by adding a dummy vertex on each
diagonal edge of the $N$'s of a finite poset $P$. We show that
$S\_{N}(S\_{N}(P))$ is $N$-free. It follows that this poset is the smallest
$N$-free barycentric subdivision of the diagram of $P$, poset whose existence
was proved by P.A. Grillet. This is also the poset obtained by the algorithm
starting with $P\_0:=P$ and consisting at step $m$ of adding a dummy vertex on
a diagonal edge of some $N$ in $P\_m$, proving that the result of this
algorithm does not depend upon the particular choice of the diagonal edge
choosen at each step. These results are linked to drawing of posets.
| [
{
"version": "v1",
"created": "Tue, 13 Sep 2005 08:29:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouzet",
"Maurice",
"",
"ICJ"
],
[
"Zaguia",
"Nejib",
"",
"SITE"
]
] |
cs/0509036 | Shujun Li Dr. | Shujun Li and Kwok-Tung Lo | Security Problems with Improper Implementations of Improved FEA-M | 8 pages, elsart.cls | Journal of Systems and Software, vol. 80, no. 5, pp. 791-794, 2007 | 10.1016/j.jss.2006.05.002 | null | cs.CR cs.MM | null | This paper reports security problems with improper implementations of an
improved version of FEA-M (fast encryption algorithm for multimedia). It is
found that an implementation-dependent differential chosen-plaintext attack or
its chosen-ciphertext counterpart can reveal the secret key of the
cryptosystem, if the involved (pseudo-)random process can be tampered (for
example, through a public time service). The implementation-dependent
differential attack is very efficient in complexity and needs only $O(n^2)$
chosen plaintext or ciphertext bits. In addition, this paper also points out a
minor security problem with the selection of the session key. In real
implementations of the cryptosystem, these security problems should be
carefully avoided, or the cryptosystem has to be further enhanced to work under
such weak implementations.
| [
{
"version": "v1",
"created": "Tue, 13 Sep 2005 10:35:52 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Jun 2006 12:20:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Shujun",
""
],
[
"Lo",
"Kwok-Tung",
""
]
] |
cs/0509037 | David Hales | David Hales, Stefano Arteconi | Friends for Free: Self-Organizing Artificial Social Networks for Trust
and Cooperation | null | null | null | null | cs.MA | null | By harvesting friendship networks from e-mail contacts or instant message
"buddy lists" Peer-to-Peer (P2P) applications can improve performance in low
trust environments such as the Internet. However, natural social networks are
not always suitable, reliable or available. We propose an algorithm (SLACER)
that allows peer nodes to create and manage their own friendship networks.
We evaluate performance using a canonical test application, requiring
cooperation between peers for socially optimal outcomes. The Artificial Social
Networks (ASN) produced are connected, cooperative and robust - possessing many
of the disable properties of human friendship networks such as trust between
friends (directly linked peers) and short paths linking everyone via a chain of
friends.
In addition to new application possibilities, SLACER could supply ASN to P2P
applications that currently depend on human social networks thus transforming
them into fully autonomous, self-managing systems.
| [
{
"version": "v1",
"created": "Wed, 14 Sep 2005 07:30:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hales",
"David",
""
],
[
"Arteconi",
"Stefano",
""
]
] |
cs/0509038 | Vilhelm Dahll\"of | Vilhelm Dahllof | Algorithms for Max Hamming Exact Satisfiability | null | null | null | null | cs.DS | null | We here study Max Hamming XSAT, ie, the problem of finding two XSAT models at
maximum Hamming distance. By using a recent XSAT solver as an auxiliary
function, an O(1.911^n) time algorithm can be constructed, where n is the
number of variables. This upper time bound can be further improved to
O(1.8348^n) by introducing a new kind of branching, more directly suited for
finding models at maximum Hamming distance. The techniques presented here are
likely to be of practical use as well as of theoretical value, proving that
there are non-trivial algorithms for maximum Hamming distance problems.
| [
{
"version": "v1",
"created": "Wed, 14 Sep 2005 09:04:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dahllof",
"Vilhelm",
""
]
] |
cs/0509040 | Christian Betz | Christian Betz, Alexander Hoernlein and Frank Puppe | Authoring case based training by document data extraction | 11 pages, 10th ChEM Workshop, 2005; technical article | null | null | null | cs.AI cs.IR | null | In this paper, we propose an scalable approach to modeling based upon word
processing documents, and we describe the tool Phoenix providing the technical
infrastructure.
For our training environment d3web.Train, we developed a tool to extract case
knowledge from existing documents, usually dismissal records, extending Phoenix
to d3web.CaseImporter. Independent authors used this tool to develop training
systems, observing a significant decrease of time for setteling-in and a
decrease of time necessary for developing a case.
| [
{
"version": "v1",
"created": "Wed, 14 Sep 2005 13:20:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Betz",
"Christian",
""
],
[
"Hoernlein",
"Alexander",
""
],
[
"Puppe",
"Frank",
""
]
] |
cs/0509042 | Mark Braverman | Mark Braverman, Stephen Cook | Computing over the Reals: Foundations for Scientific Computing | null | null | null | null | cs.CC cs.LO | null | We give a detailed treatment of the ``bit-model'' of computability and
complexity of real functions and subsets of R^n, and argue that this is a good
way to formalize many problems of scientific computation. In the introduction
we also discuss the alternative Blum-Shub-Smale model. In the final section we
discuss the issue of whether physical systems could defeat the Church-Turing
Thesis.
| [
{
"version": "v1",
"created": "Wed, 14 Sep 2005 17:58:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Braverman",
"Mark",
""
],
[
"Cook",
"Stephen",
""
]
] |
cs/0509050 | Martyn Amos | Martyn Amos and Andrew Wood | Effect of door delay on aircraft evacuation time | 8 pages, 2 figures | null | null | null | cs.MA | null | The recent commercial launch of twin-deck Very Large Transport Aircraft
(VLTA) such as the Airbus A380 has raised questions concerning the speed at
which they may be evacuated. The abnormal height of emergency exits on the
upper deck has led to speculation that emotional factors such as fear may lead
to door delay, and thus play a significant role in increasing overall
evacuation time. Full-scale evacuation tests are financially expensive and
potentially hazardous, and systematic studies of the evacuation of VLTA are
rare. Here we present a computationally cheap agent-based framework for the
general simulation of aircraft evacuation, and apply it to the particular case
of the Airbus A380. In particular, we investigate the effect of door delay, and
conclude that even a moderate average delay can lead to evacuation times that
exceed the maximum for safety certification. The model suggests practical ways
to minimise evacuation time, as well as providing a general framework for the
simulation of evacuation.
| [
{
"version": "v1",
"created": "Fri, 16 Sep 2005 17:15:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amos",
"Martyn",
""
],
[
"Wood",
"Andrew",
""
]
] |
cs/0509053 | Joshua Brandon Holden | Joshua Holden, Richard Layton, Laurence Merkle, and Tina Hudson | Underwater Hacker Missile Wars: A Cryptography and Engineering Contest | 11 pages, 3 figures, uses amsrefs.sty v2.0 and cryptologiabib.sty
(included); to appear in Cryptologia | Cryptologia, 30:69--77, 2006 | null | null | cs.CR cs.CE | null | For a recent student conference, the authors developed a day-long design
problem and competition suitable for engineering, mathematics and science
undergraduates. The competition included a cryptography problem, for which a
workshop was run during the conference. This paper describes the competition,
focusing on the cryptography problem and the workshop. Notes from the workshop
and code for the computer programs are made available via the Internet. The
results of a personal self-evaluation (PSE) are described.
| [
{
"version": "v1",
"created": "Sun, 18 Sep 2005 22:11:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Holden",
"Joshua",
""
],
[
"Layton",
"Richard",
""
],
[
"Merkle",
"Laurence",
""
],
[
"Hudson",
"Tina",
""
]
] |
cs/0509054 | Joseph O'Rourke | Mirela Damian, Robin Flatland, Joseph O'Rourke | Grid Vertex-Unfolding Orthogonal Polyhedra | Original: 12 pages, 8 figures, 11 references. Revised: 22 pages, 16
figures, 12 references. New version is a substantial revision superceding the
preliminary extended abstract that appeared in Lecture Notes in Computer
Science, Volume 3884, Springer, Berlin/Heidelberg, Feb. 2006, pp. 264-276 | null | null | null | cs.CG cs.DM | null | An edge-unfolding of a polyhedron is produced by cutting along edges and
flattening the faces to a *net*, a connected planar piece with no overlaps. A
*grid unfolding* allows additional cuts along grid edges induced by coordinate
planes passing through every vertex. A vertex-unfolding permits faces in the
net to be connected at single vertices, not necessarily along edges. We show
that any orthogonal polyhedron of genus zero has a grid vertex-unfolding.
(There are orthogonal polyhedra that cannot be vertex-unfolded, so some type of
"gridding" of the faces is necessary.) For any orthogonal polyhedron P with n
vertices, we describe an algorithm that vertex-unfolds P in O(n^2) time.
Enroute to explaining this algorithm, we present a simpler vertex-unfolding
algorithm that requires a 3 x 1 refinement of the vertex grid.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 2005 00:22:03 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Sep 2006 18:21:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"Flatland",
"Robin",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0509055 | Vikas Hamine | Vikas Hamine and Paul Helman | Learning Optimal Augmented Bayes Networks | 4 pages, 1 figure | null | null | TR-CS-2004-11 | cs.LG | null | Naive Bayes is a simple Bayesian classifier with strong independence
assumptions among the attributes. This classifier, desipte its strong
independence assumptions, often performs well in practice. It is believed that
relaxing the independence assumptions of a naive Bayes classifier may improve
the classification accuracy of the resulting structure. While finding an
optimal unconstrained Bayesian Network (for most any reasonable scoring
measure) is an NP-hard problem, it is possible to learn in polynomial time
optimal networks obeying various structural restrictions. Several authors have
examined the possibilities of adding augmenting arcs between attributes of a
Naive Bayes classifier. Friedman, Geiger and Goldszmidt define the TAN
structure in which the augmenting arcs form a tree on the attributes, and
present a polynomial time algorithm that learns an optimal TAN with respect to
MDL score. Keogh and Pazzani define Augmented Bayes Networks in which the
augmenting arcs form a forest on the attributes (a collection of trees, hence a
relaxation of the stuctural restriction of TAN), and present heuristic search
methods for learning good, though not optimal, augmenting arc sets. The
authors, however, evaluate the learned structure only in terms of observed
misclassification error and not against a scoring metric, such as MDL. In this
paper, we present a simple, polynomial time greedy algorithm for learning an
optimal Augmented Bayes Network with respect to MDL score.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 2005 04:57:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hamine",
"Vikas",
""
],
[
"Helman",
"Paul",
""
]
] |
cs/0509056 | David Freeman | David Freeman | Pairing-based identification schemes | null | null | null | null | cs.CR | null | We propose four different identification schemes that make use of bilinear
pairings, and prove their security under certain computational assumptions.
Each of the schemes is more efficient and/or more secure than any known
pairing-based identification scheme.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 2005 07:52:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Freeman",
"David",
""
]
] |
cs/0509057 | Todd Veldhuizen | Todd L. Veldhuizen | Language embeddings that preserve staging and safety | null | null | null | null | cs.PL | null | We study embeddings of programming languages into one another that preserve
what reductions take place at compile-time, i.e., staging. A certain condition
-- what we call a `Turing complete kernel' -- is sufficient for a language to
be stage-universal in the sense that any language may be embedded in it while
preserving staging. A similar line of reasoning yields the notion of
safety-preserving embeddings, and a useful characterization of
safety-universality. Languages universal with respect to staging and safety are
good candidates for realizing domain-specific embedded languages (DSELs) and
`active libraries' that provide domain-specific optimizations and safety
checks.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 2005 15:30:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Veldhuizen",
"Todd L.",
""
]
] |
cs/0509060 | Lane A. Hemaspaandra | Lane A. Hemaspaandra, Christopher M. Homan, Sven Kosub | Cluster Computing and the Power of Edge Recognition | null | null | null | URCS-TR-2005-878 | cs.CC cs.DM | null | We study the robustness--the invariance under definition changes--of the
cluster class CL#P [HHKW05]. This class contains each #P function that is
computed by a balanced Turing machine whose accepting paths always form a
cluster with respect to some length-respecting total order with efficient
adjacency checks. The definition of CL#P is heavily influenced by the defining
paper's focus on (global) orders. In contrast, we define a cluster class,
CLU#P, to capture what seems to us a more natural model of cluster computing.
We prove that the naturalness is costless: CL#P = CLU#P. Then we exploit the
more natural, flexible features of CLU#P to prove new robustness results for
CL#P and to expand what is known about the closure properties of CL#P.
The complexity of recognizing edges--of an ordered collection of computation
paths or of a cluster of accepting computation paths--is central to this study.
Most particularly, our proofs exploit the power of unique discovery of
edges--the ability of nondeterministic functions to, in certain settings,
discover on exactly one (in some cases, on at most one) computation path a
critical piece of information regarding edges of orderings or clusters.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 2005 21:25:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Homan",
"Christopher M.",
""
],
[
"Kosub",
"Sven",
""
]
] |
cs/0509063 | Krzysztof R. Apt | Krzysztof R. Apt | Order Independence and Rationalizability | Appeared in: Proc. of the 10th conference on Theoretical Aspects of
Rationality and Knowledge (TARK X), pp. 22-38 (2005) | null | null | null | cs.GT | null | Two natural strategy elimination procedures have been studied for strategic
games. The first one involves the notion of (strict, weak, etc) dominance and
the second the notion of rationalizability. In the case of dominance the
criterion of order independence allowed us to clarify which notions and under
what circumstances are robust. In the case of rationalizability this criterion
has not been considered. In this paper we investigate the problem of order
independence for rationalizability by focusing on three naturally entailed
reduction relations on games. These reduction relations are distinguished by
the adopted reference point for the notion of a better response. Additionally,
they are parametrized by the adopted system of beliefs. We show that for one
reduction relation the outcome of its (possibly transfinite) iterations does
not depend on the order of elimination of the strategies. This result does not
hold for the other two reduction relations. However, under a natural assumption
the iterations of all three reduction relations yield the same outcome. The
obtained order independence results apply to the frameworks considered in
Bernheim 84 and Pearce 84. For finite games the iterations of all three
reduction relations coincide and the order independence holds for three natural
systems of beliefs considered in the literature.
| [
{
"version": "v1",
"created": "Tue, 20 Sep 2005 08:27:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] |
cs/0509066 | Richard McClatchey | David Manset, Richard McClatchey, Flavio Oquendo, Herve Verjus | A Model-driven Approach for Grid Services Engineering | 7 pages, 3 figures. Proc of the 18th international conference on
Software and Systems Engineering and Applications. Paris November 2005 | null | null | null | cs.SE cs.DC | null | As a consequence to the hype of Grid computing, such systems have seldom been
designed using formal techniques. The complexity and rapidly growing demand
around Grid technologies has favour the use of classical development
techniques, resulting in no guidelines or rules and unstructured engineering
processes. This paper advocates a formal approach to Grid applications
development in an effort to contribute to the rigorous development of Grids
software architectures. This approach addresses cross-platform interoperability
and quality of service; the model-driven paradigm is applied to a formal
architecture-centric engineering method in order to benefit from the formal
semantic description power in addition to model-based transformations. The
result of such a novel combined concept promotes the re-use of design models
and eases developments in Grid computing by providing an adapted development
process and ensuring correctness at each design step.
| [
{
"version": "v1",
"created": "Wed, 21 Sep 2005 17:39:19 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Sep 2005 15:36:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Manset",
"David",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Oquendo",
"Flavio",
""
],
[
"Verjus",
"Herve",
""
]
] |
cs/0509071 | Krzysztof R. Apt | Krzysztof R. Apt, Francesca Rossi and K. Brent Venable | CP-nets and Nash equilibria | 6 pages. in: roc. of the Third International Conference on
Computational Intelligence, Robotics and Autonomous Systems (CIRAS '05). To
appear | null | null | null | cs.GT cs.AI | null | We relate here two formalisms that are used for different purposes in
reasoning about multi-agent systems. One of them are strategic games that are
used to capture the idea that agents interact with each other while pursuing
their own interest. The other are CP-nets that were introduced to express
qualitative and conditional preferences of the users and which aim at
facilitating the process of preference elicitation. To relate these two
formalisms we introduce a natural, qualitative, extension of the notion of a
strategic game. We show then that the optimal outcomes of a CP-net are exactly
the Nash equilibria of an appropriately defined strategic game in the above
sense. This allows us to use the techniques of game theory to search for
optimal outcomes of CP-nets and vice-versa, to use techniques developed for
CP-nets to search for Nash equilibria of the considered games.
| [
{
"version": "v1",
"created": "Thu, 22 Sep 2005 16:07:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Rossi",
"Francesca",
""
],
[
"Venable",
"K. Brent",
""
]
] |
cs/0509072 | Kaikai Shen | Kaikai Shen, Lide Wu | Folksonomy as a Complex Network | null | null | null | null | cs.IR cs.DL physics.soc-ph | null | Folksonomy is an emerging technology that works to classify the information
over WWW through tagging the bookmarks, photos or other web-based contents. It
is understood to be organized by every user while not limited to the authors of
the contents and the professional editors. This study surveyed the folksonomy
as a complex network. The result indicates that the network, which is composed
of the tags from the folksonomy, displays both properties of small world and
scale-free. However, the statistics only shows a local and static slice of the
vast body of folksonomy which is still evolving.
| [
{
"version": "v1",
"created": "Fri, 23 Sep 2005 13:27:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shen",
"Kaikai",
""
],
[
"Wu",
"Lide",
""
]
] |
cs/0509074 | Assaf Naor | Assaf Naor and Gideon Schechtman | Planar Earthmover is not in $L_1$ | null | null | null | null | cs.CG math.FA | null | We show that any $L_1$ embedding of the transportation cost (a.k.a.
Earthmover) metric on probability measures supported on the grid
$\{0,1,...,n\}^2\subseteq \R^2$ incurs distortion $\Omega(\sqrt{\log n})$. We
also use Fourier analytic techniques to construct a simple $L_1$ embedding of
this space which has distortion $O(\log n)$.
| [
{
"version": "v1",
"created": "Mon, 26 Sep 2005 16:26:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Naor",
"Assaf",
""
],
[
"Schechtman",
"Gideon",
""
]
] |
cs/0509076 | Anil Bazaz | Anil Bazaz and James D. Arthur | On Vulnerabilities, Constraints and Assumptions | null | null | null | null | cs.CR | null | This report presents a taxonomy of vulnerabilities created as a part of an
effort to develop a framework for deriving verification and validation
strategies to assess software security. This taxonomy is grounded in a
theoretical model of computing, which establishes the relationship between
vulnerabilities, software applications and the computer system resources. This
relationship illustrates that a software application is exploited by violating
constraints imposed by computer system resources and assumptions made about
their usage. In other words, a vulnerability exists in the software application
if it allows violation of these constraints and assumptions. The taxonomy
classifies these constraints and assumptions. The model also serves as a basis
for the classification scheme the taxonomy uses, in which the computer system
resources such as, memory, input/output, and cryptographic resources serve as
categories and subcategories. Vulnerabilities, which are expressed in the form
of constraints and assumptions, are classified according to these categories
and subcategories. This taxonomy is both novel and distinctively different from
other taxonomies found in the literature.
| [
{
"version": "v1",
"created": "Mon, 26 Sep 2005 21:20:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bazaz",
"Anil",
""
],
[
"Arthur",
"James D.",
""
]
] |
cs/0509082 | Yossi Zana | Yossi Zana, Roberto M. Cesar-JR | Face Recognition Based on Polar Frequency Features | ACM Transactions on Applied Perception | null | null | null | cs.CV | null | A novel biologically motivated face recognition algorithm based on polar
frequency is presented. Polar frequency descriptors are extracted from face
images by Fourier-Bessel transform (FBT). Next, the Euclidean distance between
all images is computed and each image is now represented by its dissimilarity
to the other images. A Pseudo-Fisher Linear Discriminant was built on this
dissimilarity space. The performance of Discrete Fourier transform (DFT)
descriptors, and a combination of both feature types was also evaluated. The
algorithms were tested on a 40- and 1196-subjects face database (ORL and FERET,
respectively). With 5 images per subject in the training and test datasets,
error rate on the ORL database was 3.8, 1.25 and 0.2% for the FBT, DFT, and the
combined classifier, respectively, as compared to 2.6% achieved by the best
previous algorithm. The most informative polar frequency features were
concentrated at low-to-medium angular frequencies coupled to low radial
frequencies. On the FERET database, where an affine normalization
pre-processing was applied, the FBT algorithm outperformed only the PCA in a
rank recognition test. However, it achieved performance comparable to
state-of-the-art methods when evaluated by verification tests. These results
indicate the high informative value of the polar frequency content of face
images in relation to recognition and verification tasks, and that the
Cartesian frequency content can complement information about the subjects'
identity, but possibly only when the images are not pre-normalized. Possible
implications for human face recognition are discussed.
| [
{
"version": "v1",
"created": "Tue, 27 Sep 2005 15:50:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zana",
"Yossi",
""
],
[
"Cesar-JR",
"Roberto M.",
""
]
] |
cs/0509083 | Yossi Zana | Yossi Zana, Roberto M. Cesar-Jr, Rogerio S. Feris, Matthew Turk | Face Verification in Polar Frequency Domain: a Biologically Motivated
Approach | 2005, International Symposium on Visual Computing (ISVC) | null | null | null | cs.CV | null | We present a novel local-based face verification system whose components are
analogous to those of biological systems. In the proposed system, after global
registration and normalization, three eye regions are converted from the
spatial to polar frequency domain by a Fourier-Bessel Transform. The resulting
representations are embedded in a dissimilarity space, where each image is
represented by its distance to all the other images. In this dissimilarity
space a Pseudo-Fisher discriminator is built. ROC and equal error rate
verification test results on the FERET database showed that the system
performed at least as state-of-the-art methods and better than a system based
on polar Fourier features. The local-based system is especially robust to
facial expression and age variations, but sensitive to registration errors.
| [
{
"version": "v1",
"created": "Tue, 27 Sep 2005 16:06:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zana",
"Yossi",
""
],
[
"Cesar-Jr",
"Roberto M.",
""
],
[
"Feris",
"Rogerio S.",
""
],
[
"Turk",
"Matthew",
""
]
] |
cs/0509084 | Herbert van de Sompel | Jeroen Bekaert, Xiaoming Liu, Herbert Van de Sompel | Representing Digital Assets for Long-Term Preservation using MPEG-21 DID | Accepted paper for PV 2005 "Ensuring Long-term Preservation and
Adding Value to Scientific and Technical data"
(http://www.ukoln.ac.uk/events/pv-2005/) | null | null | null | cs.DL | null | Various efforts aimed at representing digital assets have emerged from
several communities over the last years, including the Metadata Encoding and
Transmission Standard (METS), the IMS Content Packaging (IMS-CP) XML Binding
and the XML Formatted Data Units (XFDU). The MPEG-21 Digital Item Declaration
(MPEG-21 DID) is another approach that can be used for the representation of
digital assets in XML. This paper will explore the potential of the MPEG-21 DID
in a Digital Preservation context, by looking at the core building blocks of
the OAIS Information Model and the way in which they map to the MPEG-21 DID
abstract model and the MPEG-21 DIDL XML syntax.
| [
{
"version": "v1",
"created": "Tue, 27 Sep 2005 19:05:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bekaert",
"Jeroen",
""
],
[
"Liu",
"Xiaoming",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] |
cs/0509090 | Herbert van de Sompel | Jeroen Bekaert, Herbert Van de Sompel | Access Interfaces for Open Archival Information Systems based on the
OAI-PMH and the OpenURL Framework for Context-Sensitive Services | Accepted paper for PV 2005 "Ensuring Long-term Preservation and
Adding Value to Scientific and Technical data"
(http://www.ukoln.ac.uk/events/pv-2005/) | null | null | null | cs.DL | null | In recent years, a variety of digital repository and archival systems have
been developed and adopted. All of these systems aim at hosting a variety of
compound digital assets and at providing tools for storing, managing and
accessing those assets. This paper will focus on the definition of common and
standardized access interfaces that could be deployed across such diverse
digital respository and archival systems. The proposed interfaces are based on
the two formal specifications that have recently emerged from the Digital
Library community: The Open Archive Initiative Protocol for Metadata Harvesting
(OAI-PMH) and the NISO OpenURL Framework for Context-Sensitive Services
(OpenURL Standard). As will be described, the former allows for the retrieval
of batches of XML-based representations of digital assets, while the latter
facilitates the retrieval of disseminations of a specific digital asset or of
one or more of its constituents. The core properties of the proposed interfaces
are explained in terms of the Reference Model for an Open Archival Information
System (OAIS).
| [
{
"version": "v1",
"created": "Wed, 28 Sep 2005 14:57:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bekaert",
"Jeroen",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] |
cs/0509091 | Gregory Gutin | G. Gutin, A. Rafiey, A. Yeo | Minimum Cost Homomorphisms to Semicomplete Multipartite Digraphs | null | null | null | null | cs.DM | null | For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a {\em homomorphism
of $D$ to $H$} if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ For a fixed directed
or undirected graph $H$ and an input graph $D$, the problem of verifying
whether there exists a homomorphism of $D$ to $H$ has been studied in a large
number of papers. We study an optimization version of this decision problem.
Our optimization problem is motivated by a real-world problem in defence
logistics and was introduced very recently by the authors and M. Tso.
Suppose we are given a pair of digraphs $D,H$ and a positive integral cost
$c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$
of $D$ to $H$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. Let $H$ be a fixed digraph. The
minimum cost homomorphism problem for $H$, MinHOMP($H$), is stated as follows:
For input digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$,
verify whether there is a homomorphism of $D$ to $H$ and, if it does exist,
find such a homomorphism of minimum cost. In our previous paper we obtained a
dichotomy classification of the time complexity of \MiP for $H$ being a
semicomplete digraph. In this paper we extend the classification to
semicomplete $k$-partite digraphs, $k\ge 3$, and obtain such a classification
for bipartite tournaments.
| [
{
"version": "v1",
"created": "Wed, 28 Sep 2005 15:40:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
] |
cs/0509094 | Carol Minton Morris Ms | Carol Minton Morris | Telling Great Stories: An NSDL Content and Communications System for
Aggregation, Display, and Distribution of News and Features | 3 pages, 2 figures | null | null | null | cs.DL cs.SE | null | Education digital libraries contain cataloged resources as well as contextual
information about innovations in the use of educational technology, exemplar
stories about community activities, and news from various user communities that
include teachers, students, scholars, and developers. Long-standing library
traditions of service, preservation, democratization of knowledge, rich
discourse, equal access, and fair use are evident in library communications
models that both pull in and push out contextual information from multiple
sources integrated with editorial production processes. This paper argues that
a dynamic narrative flow [1] is enabled by effective management of complex
content and communications in a decentralized web-based education digital
library making publishing objects such as aggregations of resources, or
selected parts of objects [4] accessible through a Content and Communications
System. Providing services that encourage patrons to reuse, reflect out, and
contribute resources back [5] to the Library increases the reach and impact of
the National Science Digital Library (NSDL). This system is a model for
distributed content development and effective communications for education
digital libraries in general.
| [
{
"version": "v1",
"created": "Wed, 28 Sep 2005 16:28:19 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Oct 2005 21:20:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Morris",
"Carol Minton",
""
]
] |
cs/0509100 | Shripad Thite | Jeff Erickson (1), Shripad Thite (1), David P. Bunde (1) ((1)
Department of Computer Science, University of Illinois at Urbana-Champaign,
Urbana, IL, USA) | Distance-2 Edge Coloring is NP-Complete | 3 pages, 1 figure in color | null | null | null | cs.DM cs.CC | null | We prove that it is NP-complete to determine whether there exists a
distance-2 edge coloring (strong edge coloring) with 5 colors of a bipartite
2-inductive graph with girth 6 and maximum degree 3.
| [
{
"version": "v1",
"created": "Fri, 30 Sep 2005 13:15:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erickson",
"Jeff",
""
],
[
"Thite",
"Shripad",
""
],
[
"Bunde",
"David P.",
""
]
] |
cs/0510001 | Jo\~ao Vitor Baldini Soares | Jo\~ao V. B. Soares, Jorge J. G. Leandro, Roberto M. Cesar Jr.,
Herbert F. Jelinek, Michael J. Cree | Retinal Vessel Segmentation Using the 2-D Morlet Wavelet and Supervised
Classification | 9 pages, 7 figures and 1 table. Accepted for publication in IEEE
Trans Med Imag; added copyright notice | IEEE Trans Med Imag, Vol. 25, no. 9, pp. 1214- 1222, Sep. 2006. | 10.1109/TMI.2006.879967 | null | cs.CV | null | We present a method for automated segmentation of the vasculature in retinal
images. The method produces segmentations by classifying each image pixel as
vessel or non-vessel, based on the pixel's feature vector. Feature vectors are
composed of the pixel's intensity and continuous two-dimensional Morlet wavelet
transform responses taken at multiple scales. The Morlet wavelet is capable of
tuning to specific frequencies, thus allowing noise filtering and vessel
enhancement in a single step. We use a Bayesian classifier with
class-conditional probability density functions (likelihoods) described as
Gaussian mixtures, yielding a fast classification, while being able to model
complex decision surfaces and compare its performance with the linear minimum
squared error classifier. The probability distributions are estimated based on
a training set of labeled pixels obtained from manual segmentations. The
method's performance is evaluated on publicly available DRIVE and STARE
databases of manually labeled non-mydriatic images. On the DRIVE database, it
achieves an area under the receiver operating characteristic (ROC) curve of
0.9598, being slightly superior than that presented by the method of Staal et
al.
| [
{
"version": "v1",
"created": "Fri, 30 Sep 2005 22:27:45 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2006 17:09:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Soares",
"João V. B.",
""
],
[
"Leandro",
"Jorge J. G.",
""
],
[
"Cesar",
"Roberto M.",
"Jr."
],
[
"Jelinek",
"Herbert F.",
""
],
[
"Cree",
"Michael J.",
""
]
] |
cs/0510011 | David Delahaye | David Delahaye (CEDRIC), Micaela Mayero (LIPN) | Diophantus' 20th Problem and Fermat's Last Theorem for n=4:
Formalization of Fermat's Proofs in the Coq Proof Assistant | 16 pages | null | null | null | cs.LO cs.SE math.NT | null | We present the proof of Diophantus' 20th problem (book VI of Diophantus'
Arithmetica), which consists in wondering if there exist right triangles whose
sides may be measured as integers and whose surface may be a square. This
problem was negatively solved by Fermat in the 17th century, who used the
"wonderful" method (ipse dixit Fermat) of infinite descent. This method, which
is, historically, the first use of induction, consists in producing smaller and
smaller non-negative integer solutions assuming that one exists; this naturally
leads to a reductio ad absurdum reasoning because we are bounded by zero. We
describe the formalization of this proof which has been carried out in the Coq
proof assistant. Moreover, as a direct and no less historical application, we
also provide the proof (by Fermat) of Fermat's last theorem for n=4, as well as
the corresponding formalization made in Coq.
| [
{
"version": "v1",
"created": "Tue, 4 Oct 2005 08:53:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Delahaye",
"David",
"",
"CEDRIC"
],
[
"Mayero",
"Micaela",
"",
"LIPN"
]
] |
cs/0510013 | Luc Bouganim | Luc Bouganim (INRIA Rocquencourt), Cosmin Cremarenco (INRIA
Rocquencourt), Fran\c{c}ois Dang Ngoc (INRIA Rocquencourt, PRISM - UVSQ),
Nicolas Dieu (INRIA Rocquencourt), Philippe Pucheral (INRIA Rocquencourt,
PRISM - UVSQ) | Safe Data Sharing and Data Dissemination on Smart Devices | null | null | null | null | cs.CR cs.DB | null | The erosion of trust put in traditional database servers, the growing
interest for different forms of data dissemination and the concern for
protecting children from suspicious Internet content are different factors that
lead to move the access control from servers to clients. Several encryption
schemes can be used to serve this purpose but all suffer from a static way of
sharing data. In a precedent paper, we devised smarter client-based access
control managers exploiting hardware security elements on client devices. The
goal pursued is being able to evaluate dynamic and personalized access control
rules on a ciphered XML input document, with the benefit of dissociating access
rights from encryption. In this demonstration, we validate our solution using a
real smart card platform and explain how we deal with the constraints usually
met on hardware security elements (small memory and low throughput). Finally,
we illustrate the generality of the approach and the easiness of its deployment
through two different applications: a collaborative application and a parental
control application on video streams.
| [
{
"version": "v1",
"created": "Wed, 5 Oct 2005 12:14:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bouganim",
"Luc",
"",
"INRIA Rocquencourt"
],
[
"Cremarenco",
"Cosmin",
"",
"INRIA\n Rocquencourt"
],
[
"Ngoc",
"François Dang",
"",
"INRIA Rocquencourt, PRISM - UVSQ"
],
[
"Dieu",
"Nicolas",
"",
"INRIA Rocquencourt"
],
[
"Pucheral",
"Philippe",
"",
"INRIA Rocquencourt,\n PRISM - UVSQ"
]
] |
cs/0510015 | Laurent Audibert | Laurent Audibert (DELIC) | Word sense disambiguation criteria: a systematic study | null | 20th International Conference on Computational Linguistics
(COLING-2004) (2004) pp. 910-916 | null | null | cs.CL | null | This article describes the results of a systematic in-depth study of the
criteria used for word sense disambiguation. Our study is based on 60 target
words: 20 nouns, 20 adjectives and 20 verbs. Our results are not always in line
with some practices in the field. For example, we show that omitting
non-content words decreases performance and that bigrams yield better results
than unigrams.
| [
{
"version": "v1",
"created": "Wed, 5 Oct 2005 14:23:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Audibert",
"Laurent",
"",
"DELIC"
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.