id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0510017 | Svante Janson | Svante Janson and Wojciech Szpankowski | Partial fillup and search time in LC tries | 13 pages | null | null | null | cs.DS math.PR | null | Andersson and Nilsson introduced in 1993 a level-compressed trie (in short:
LC trie) in which a full subtree of a node is compressed to a single node of
degree being the size of the subtree. Recent experimental results indicated a
'dramatic improvement' when full subtrees are replaced by partially filled
subtrees. In this paper, we provide a theoretical justification of these
experimental results showing, among others, a rather moderate improvement of
the search time over the original LC tries. For such an analysis, we assume
that n strings are generated independently by a binary memoryless source with p
denoting the probability of emitting a 1. We first prove that the so called
alpha-fillup level (i.e., the largest level in a trie with alpha fraction of
nodes present at this level) is concentrated on two values with high
probability. We give these values explicitly up to O(1), and observe that the
value of alpha (strictly between 0 and 1) does not affect the leading term.
This result directly yields the typical depth (search time) in the alpha-LC
tries with p not equal to 1/2, which turns out to be C loglog n for an
explicitly given constant C (depending on p but not on alpha). This should be
compared with recently found typical depth in the original LC tries which is C'
loglog n for a larger constant C'. The search time in alpha-LC tries is thus
smaller but of the same order as in the original LC tries.
| [
{
"version": "v1",
"created": "Thu, 6 Oct 2005 10:04:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Janson",
"Svante",
""
],
[
"Szpankowski",
"Wojciech",
""
]
] |
cs/0510018 | Danilo Gligoroski | Danilo Gligoroski | Candidate One-Way Functions and One-Way Permutations Based on Quasigroup
String Transformations | Submitetd to conference | null | null | null | cs.CR cs.CC | null | In this paper we propose a definition and construction of a new family of
one-way candidate functions ${\cal R}_N:Q^N \to Q^N$, where $Q=\{0,1,...,s-1\}$
is an alphabet with $s$ elements. Special instances of these functions can have
the additional property to be permutations (i.e. one-way permutations). These
one-way functions have the property that for achieving the security level of
$2^n$ computations in order to invert them, only $n$ bits of input are needed.
The construction is based on quasigroup string transformations. Since
quasigroups in general do not have algebraic properties such as associativity,
commutativity, neutral elements, inverting these functions seems to require
exponentially many readings from the lookup table that defines them (a Latin
Square) in order to check the satisfiability for the initial conditions, thus
making them natural candidates for one-way functions.
| [
{
"version": "v1",
"created": "Fri, 7 Oct 2005 00:29:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gligoroski",
"Danilo",
""
]
] |
cs/0510019 | Panigrahy Rina | Rina Panigrahy | Entropy based Nearest Neighbor Search in High Dimensions | null | null | null | null | cs.DS | null | In this paper we study the problem of finding the approximate nearest
neighbor of a query point in the high dimensional space, focusing on the
Euclidean space. The earlier approaches use locality-preserving hash functions
(that tend to map nearby points to the same value) to construct several hash
tables to ensure that the query point hashes to the same bucket as its nearest
neighbor in at least one table. Our approach is different -- we use one (or a
few) hash table and hash several randomly chosen points in the neighborhood of
the query point showing that at least one of them will hash to the bucket
containing its nearest neighbor. We show that the number of randomly chosen
points in the neighborhood of the query point $q$ required depends on the
entropy of the hash value $h(p)$ of a random point $p$ at the same distance
from $q$ at its nearest neighbor, given $q$ and the locality preserving hash
function $h$ chosen randomly from the hash family. Precisely, we show that if
the entropy $I(h(p)|q,h) = M$ and $g$ is a bound on the probability that two
far-off points will hash to the same bucket, then we can find the approximate
nearest neighbor in $O(n^\rho)$ time and near linear $\tilde O(n)$ space where
$\rho = M/\log(1/g)$. Alternatively we can build a data structure of size
$\tilde O(n^{1/(1-\rho)})$ to answer queries in $\tilde O(d)$ time. By applying
this analysis to the locality preserving hash functions in and adjusting the
parameters we show that the $c$ nearest neighbor can be computed in time
$\tilde O(n^\rho)$ and near linear space where $\rho \approx 2.06/c$ as $c$
becomes large.
| [
{
"version": "v1",
"created": "Fri, 7 Oct 2005 00:55:06 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Nov 2005 16:55:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Panigrahy",
"Rina",
""
]
] |
cs/0510020 | Thierry Poibeau | Thierry Poibeau (LIPN) | Sur le statut r\'{e}f\'{e}rentiel des entit\'{e}s nomm\'{e}es | 11 pages | Conf\'{e}rence Traitement Automatique des Langues 2005, France
(2005) | null | null | cs.AI cs.IR | null | We show in this paper that, on the one hand, named entities can be designated
using different denominations and that, on the second hand, names denoting
named entities are polysemous. The analysis cannot be limited to reference
resolution but should take into account naming strategies, which are mainly
based on two linguistic operations: synecdoche and metonymy. Lastly, we present
a model that explicitly represents the different denominations in discourse,
unifying the way to represent linguistic knowledge and world knowledge.
| [
{
"version": "v1",
"created": "Fri, 7 Oct 2005 17:39:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
] |
cs/0510022 | Sam Bretheim | Sam Bretheim | Cryptographic Authentication of Navigation Protocols | 12 pages | null | null | null | cs.CR | null | We examine the security of existing radio navigation protocols and attempt to
define secure, scalable replacements.
| [
{
"version": "v1",
"created": "Sun, 9 Oct 2005 02:39:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bretheim",
"Sam",
""
]
] |
cs/0510024 | David Eppstein | David Eppstein, Michael T. Goodrich, and Jeremy Yu Meng | Delta-confluent Drawings | 14 pages, 8 figures. A preliminary version of this work was presented
at the 13th Int. Symp. Graph Drawing, Limerick, Ireland, September 2005 | null | null | null | cs.CG | null | We generalize the tree-confluent graphs to a broader class of graphs called
Delta-confluent graphs. This class of graphs and distance-hereditary graphs, a
well-known class of graphs, coincide. Some results about the visualization of
Delta-confluent graphs are also given.
| [
{
"version": "v1",
"created": "Tue, 11 Oct 2005 00:47:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Meng",
"Jeremy Yu",
""
]
] |
cs/0510025 | Thierry Despeyroux | Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis) | Practical Semantic Analysis of Web Sites and Documents | null | null | null | null | cs.IR | null | As Web sites are now ordinary products, it is necessary to explicit the
notion of quality of a Web site. The quality of a site may be linked to the
easiness of accessibility and also to other criteria such as the fact that the
site is up to date and coherent. This last quality is difficult to insure
because sites may be updated very frequently, may have many authors, may be
partially generated and in this context proof-reading is very difficult. The
same piece of information may be found in different occurrences, but also in
data or meta-data, leading to the need for consistency checking. In this paper
we make a parallel between programs and Web sites. We present some examples of
semantic constraints that one would like to specify (constraints between the
meaning of categories and sub-categories in a thematic directory, consistency
between the organization chart and the rest of the site in an academic site).
We present quickly the Natural Semantics, a way to specify the semantics of
programming languages that inspires our works. Then we propose a specification
language for semantic constraints in Web sites that, in conjunction with the
well known ``make'' program, permits to generate some site verification tools
by compiling the specification into Prolog code. We apply our method to a large
XML document which is the scientific part of our institute activity report,
tracking errors or inconsistencies and also constructing some indicators that
can be used by the management of the institute.
| [
{
"version": "v1",
"created": "Tue, 11 Oct 2005 08:40:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Despeyroux",
"Thierry",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
]
] |
cs/0510027 | Alexandre d'Aspremont | Alexandre d'Aspremont | A Market Test for the Positivity of Arrow-Debreu Prices | New version, fixes a few minor errors and typos | null | null | null | cs.CE | null | We derive tractable necessary and sufficient conditions for the absence of
buy-and-hold arbitrage opportunities in a perfectly liquid, one period market.
We formulate the positivity of Arrow-Debreu prices as a generalized moment
problem to show that this no arbitrage condition is equivalent to the positive
semidefiniteness of matrices formed by the market price of tradeable securities
and their products. We apply this result to a market with multiple assets and
basket call options.
| [
{
"version": "v1",
"created": "Tue, 11 Oct 2005 13:40:17 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jun 2006 17:05:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
]
] |
cs/0510028 | Victor Grishchenko | Victor S. Grishchenko | Geo-aggregation permits low stretch and routing tables of logarithmical
size | 6 pages | null | null | null | cs.NI | null | This article first addresses applicability of Euclidean models to the domain
of Internet routing. Those models are found (limitedly) applicable. Then a
simplistic model of routing is constructed for Euclidean plane densely covered
with points-routers. The model guarantees low stretch and logarithmical size of
routing tables at any node. The paper concludes with a discussion on
applicability of the model to real-world Internet routing.
| [
{
"version": "v1",
"created": "Tue, 11 Oct 2005 16:20:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grishchenko",
"Victor S.",
""
]
] |
cs/0510031 | Constantinos Daskalakis | Constantinos Daskalakis | Computing Pure Nash Equilibria via Markov Random Fields | null | null | null | null | cs.GT | null | In this paper we present a novel generic mapping between Graphical Games and
Markov Random Fields so that pure Nash equilibria in the former can be found by
statistical inference on the latter. Thus, the problem of deciding whether a
graphical game has a pure Nash equilibrium, a well-known intractable problem,
can be attacked by well-established algorithms such as Belief Propagation,
Junction Trees, Markov Chain Monte Carlo and Simulated Annealing. Large classes
of graphical games become thus tractable, including all classes already known,
but also new classes such as the games with O(log n) treewidth.
| [
{
"version": "v1",
"created": "Thu, 13 Oct 2005 04:42:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
]
] |
cs/0510036 | Jan Chomicki | Jan Chomicki | Semantic Optimization Techniques for Preference Queries | null | null | null | null | cs.DB cs.AI cs.LO | null | Preference queries are relational algebra or SQL queries that contain
occurrences of the winnow operator ("find the most preferred tuples in a given
relation"). Such queries are parameterized by specific preference relations.
Semantic optimization techniques make use of integrity constraints holding in
the database. In the context of semantic optimization of preference queries, we
identify two fundamental properties: containment of preference relations
relative to integrity constraints and satisfaction of order axioms relative to
integrity constraints. We show numerous applications of those notions to
preference query evaluation and optimization. As integrity constraints, we
consider constraint-generating dependencies, a class generalizing functional
dependencies. We demonstrate that the problems of containment and satisfaction
of order axioms can be captured as specific instances of constraint-generating
dependency entailment. This makes it possible to formulate necessary and
sufficient conditions for the applicability of our techniques as constraint
validity problems. We characterize the computational complexity of such
problems.
| [
{
"version": "v1",
"created": "Fri, 14 Oct 2005 13:25:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chomicki",
"Jan",
""
]
] |
cs/0510037 | Rokia Bendaoud | Rokia Bendaoud (INRIA Lorraine - LORIA), Yannick Toussaint (INRIA
Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA) | Hi\'{e}rarchisation des r\`{e}gles d'association en fouille de textes | null | null | null | null | cs.IR cs.AI | null | Extraction of association rules is widely used as a data mining method.
However, one of the limit of this approach comes from the large number of
extracted rules and the difficulty for a human expert to deal with the totality
of these rules. We propose to solve this problem by structuring the set of
rules into hierarchy. The expert can then therefore explore the rules, access
from one rule to another one more general when we raise up in the hierarchy,
and in other hand, or a more specific rules. Rules are structured at two
levels. The global level aims at building a hierarchy from the set of rules
extracted. Thus we define a first type of rule-subsomption relying on Galois
lattices. The second level consists in a local and more detailed analysis of
each rule. It generate for a given rule a set of generalization rules
structured into a local hierarchy. This leads to the definition of a second
type of subsomption. This subsomption comes from inductive logic programming
and integrates a terminological model.
| [
{
"version": "v1",
"created": "Fri, 14 Oct 2005 14:24:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bendaoud",
"Rokia",
"",
"INRIA Lorraine - LORIA"
],
[
"Toussaint",
"Yannick",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Napoli",
"Amedeo",
"",
"INRIA Lorraine - LORIA"
]
] |
cs/0510039 | Sandor P. Fekete | Christophe Bobda, Ali Ahmadinia, Mateusz Majer, Juergen Teich, Sandor
P. Fekete, Jan van der Veen | DyNoC: A Dynamic Infrastructure for Communication in Dynamically
Reconfigurable Devices | 9 pages, 7 figures, 1 table, Latex, to appear in 15th International
Conference on Field-Programmable Logic and Application | null | null | null | cs.AR | null | A new paradigm to support the communication among modules dynamically placed
on a reconfigurable device at run-time is presented. Based on the network on
chip (NoC) infrastructure, we developed a dynamic communication infrastructure
as well as routing methodologies capable to handle routing in a NoC with
obstacles created by dynamically placed components. We prove the unrestricted
reachability of components and pins, the deadlock-freeness and we finally show
the feasibility of our approach by means on real life example applications.
| [
{
"version": "v1",
"created": "Fri, 14 Oct 2005 22:03:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bobda",
"Christophe",
""
],
[
"Ahmadinia",
"Ali",
""
],
[
"Majer",
"Mateusz",
""
],
[
"Teich",
"Juergen",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"van der Veen",
"Jan",
""
]
] |
cs/0510042 | David Naccache | David Naccache | Secure and {\sl Practical} Identity-Based Encryption | null | null | null | null | cs.CR | null | In this paper, we present a variant of Waters' Identity-Based Encryption
scheme with a much smaller public-key size (only a few kilobytes). We show that
this variant is semantically secure against passive adversaries in the standard
model.\smallskip
In essence, the new scheme divides Waters' public key size by a factor $\ell$
at the cost of (negligibly) reducing security by $\ell$ bits. Therefore, our
construction settles an open question asked by Waters and constitutes the first
fully secure {\sl practical} Identity-Based Encryption scheme
| [
{
"version": "v1",
"created": "Sat, 15 Oct 2005 11:08:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Naccache",
"David",
""
]
] |
cs/0510046 | Dmitry Mogilevsky | Dmitry Mogilevsky, Adam Lee, William Yurcik | Defining a Comprehensive Threat Model for High Performance Computational
Clusters | null | null | null | null | cs.CR cs.DC | null | Over the past decade, high performance computational (HPC) clusters have
become mainstream in academic and industrial settings as accessible means of
computation. Throughout their proliferation, HPC security has been a secondary
concern to performance. It is evident, however, that ensuring HPC security
presents different challenges than the ones faced when dealing with traditional
networks. To design suitable security measures for high performance computing,
it is necessary to first realize the threats faced by such an environment. This
task can be accomplished by the means of constructing a comprehensive threat
model. To our knowledge, no such threat model exists with regards to Cluster
Computing. In this paper, we explore the unique challenges of securing HPCs and
propose a threat model based on the classical Confidentiality, Integrity and
Availability security principles.
| [
{
"version": "v1",
"created": "Sun, 16 Oct 2005 23:32:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mogilevsky",
"Dmitry",
""
],
[
"Lee",
"Adam",
""
],
[
"Yurcik",
"William",
""
]
] |
cs/0510048 | Sandor P. Fekete | Alexander Kroeller and Sandor P. Fekete and Dennis Pfisterer and
Stefan Fischer | Deterministic boundary recognition and topology extraction for large
sensor networks | 10 pages, 9 figures, Latex, to appear in Symposium on Discrete
Algorithms (SODA 2006) | null | null | null | cs.DC cs.CG | null | We present a new framework for the crucial challenge of self-organization of
a large sensor network. The basic scenario can be described as follows: Given a
large swarm of immobile sensor nodes that have been scattered in a polygonal
region, such as a street network. Nodes have no knowledge of size or shape of
the environment or the position of other nodes. Moreover, they have no way of
measuring coordinates, geometric distances to other nodes, or their direction.
Their only way of interacting with other nodes is to send or to receive
messages from any node that is within communication range. The objective is to
develop algorithms and protocols that allow self-organization of the swarm into
large-scale structures that reflect the structure of the street network,
setting the stage for global routing, tracking and guiding algorithms.
| [
{
"version": "v1",
"created": "Mon, 17 Oct 2005 12:23:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kroeller",
"Alexander",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Pfisterer",
"Dennis",
""
],
[
"Fischer",
"Stefan",
""
]
] |
cs/0510050 | Gilles Kassel | Gilles Kassel (LaRIA) | Integration of the DOLCE top-level ontology into the OntoSpec
methodology | null | null | null | LRR-2005-08 | cs.AI | null | This report describes a new version of the OntoSpec methodology for ontology
building. Defined by the LaRIA Knowledge Engineering Team (University of
Picardie Jules Verne, Amiens, France), OntoSpec aims at helping builders to
model ontological knowledge (upstream of formal representation). The
methodology relies on a set of rigorously-defined modelling primitives and
principles. Its application leads to the elaboration of a semi-informal
ontology, which is independent of knowledge representation languages. We
recently enriched the OntoSpec methodology by endowing it with a new resource,
the DOLCE top-level ontology defined at the LOA (IST-CNR, Trento, Italy). The
goal of this integration is to provide modellers with additional help in
structuring application ontologies, while maintaining independence
vis-\`{a}-vis formal representation languages. In this report, we first provide
an overview of the OntoSpec methodology's general principles and then describe
the DOLCE re-engineering process. A complete version of DOLCE-OS (i.e. a
specification of DOLCE in the semi-informal OntoSpec language) is presented in
an appendix.
| [
{
"version": "v1",
"created": "Tue, 18 Oct 2005 08:32:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kassel",
"Gilles",
"",
"LaRIA"
]
] |
cs/0510051 | Gianluca Argentini | Gianluca Argentini | Numerical resolution of some BVP using Bernstein polynomials | 7 pages, 3 figures | Posted since 2005-11-29 at Applied Mathematics E-Notes,
http://www.math.nthu.edu.tw/~amen/ | null | null | cs.NA cs.MS math.CA physics.comp-ph | null | In this work we present a method, based on the use of Bernstein polynomials,
for the numerical resolution of some boundary values problems. The computations
have not need of particular approximations of derivatives, such as finite
differences, or particular techniques, such as finite elements. Also, the
method doesn't require the use of matrices, as in resolution of linear
algebraic systems, nor the use of like-Newton algorithms, as in resolution of
non linear sets of equations. An initial equation is resolved only once, then
the method is based on iterated evaluations of appropriate polynomials.
| [
{
"version": "v1",
"created": "Tue, 18 Oct 2005 09:55:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0510052 | Victor Grishchenko | Victor S. Grishchenko | Remarks on "Toward Compact Interdomain Routing" | null | null | null | null | cs.NI | null | This paper critically examines some propositions and arguments of
cs.NI/0508021 regarding applicability of hierarchical routing and perspectives
of compact routing. Arguments against the former are found to be inaccurate
while the latter is found to be equivalent to well-known deployed solutions.
Also, multiple (stacked) application of compact-routing solutions is found to
be equivalent to hierarchical routing.
| [
{
"version": "v1",
"created": "Tue, 18 Oct 2005 13:01:08 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Oct 2005 15:18:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grishchenko",
"Victor S.",
""
]
] |
cs/0510053 | Martin Kutz | Martin Kutz | A pair of trees without a simultaneous geometric embedding in the plane | This paper has been withdrawn by the author because it had turned out
that the result was already known before | null | null | null | cs.CG | null | Any planar graph has a crossing-free straight-line drawing in the plane. A
simultaneous geometric embedding of two n-vertex graphs is a straight-line
drawing of both graphs on a common set of n points, such that the edges withing
each individual graph do not cross. We consider simultaneous embeddings of two
labeled trees, with predescribed vertex correspondences, and present an
instance of such a pair that cannot be embedded. Further we provide an example
of a planar graph that cannot be embedded together with a path when vertex
correspondences are given.
| [
{
"version": "v1",
"created": "Tue, 18 Oct 2005 18:26:00 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Nov 2005 13:14:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kutz",
"Martin",
""
]
] |
cs/0510054 | Le Zhao Mr. | Le Zhao, Min Zhang, Shaoping Ma | The Nature of Novelty Detection | This paper pointed out the future direction for novelty detection
research. 37 pages, double spaced version | null | null | null | cs.IR cs.CL | null | Sentence level novelty detection aims at reducing redundant sentences from a
sentence list. In the task, sentences appearing later in the list with no new
meanings are eliminated. Aiming at a better accuracy for detecting redundancy,
this paper reveals the nature of the novelty detection task currently
overlooked by the Novelty community $-$ Novelty as a combination of the partial
overlap (PO, two sentences sharing common facts) and complete overlap (CO, the
first sentence covers all the facts of the second sentence) relations. By
formalizing novelty detection as a combination of the two relations between
sentences, new viewpoints toward techniques dealing with Novelty are proposed.
Among the methods discussed, the similarity, overlap, pool and language
modeling approaches are commonly used. Furthermore, a novel approach, selected
pool method is provided, which is immediate following the nature of the task.
Experimental results obtained on all the three currently available novelty
datasets showed that selected pool is significantly better or no worse than the
current methods. Knowledge about the nature of the task also affects the
evaluation methodologies. We propose new evaluation measures for Novelty
according to the nature of the task, as well as possible directions for future
study.
| [
{
"version": "v1",
"created": "Wed, 19 Oct 2005 14:56:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhao",
"Le",
""
],
[
"Zhang",
"Min",
""
],
[
"Ma",
"Shaoping",
""
]
] |
cs/0510056 | Jackie (Jianhong) Shen | Yoon-Mo Jung and Jianhong Shen | First-Order Modeling and Stability Analysis of Illusory Contours | 21 pages | null | null | null | cs.CV cs.AI | null | In visual cognition, illusions help elucidate certain intriguing latent
perceptual functions of the human vision system, and their proper mathematical
modeling and computational simulation are therefore deeply beneficial to both
biological and computer vision. Inspired by existent prior works, the current
paper proposes a first-order energy-based model for analyzing and simulating
illusory contours. The lower complexity of the proposed model facilitates
rigorous mathematical analysis on the detailed geometric structures of illusory
contours. After being asymptotically approximated by classical active contours,
the proposed model is then robustly computed using the celebrated level-set
method of Osher and Sethian (J. Comput. Phys., 79:12-49, 1988) with a natural
supervising scheme. Potential cognitive implications of the mathematical
results are addressed, and generic computational examples are demonstrated and
discussed.
| [
{
"version": "v1",
"created": "Wed, 19 Oct 2005 20:44:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jung",
"Yoon-Mo",
""
],
[
"Shen",
"Jianhong",
""
]
] |
cs/0510059 | Arnaud De La Fortelle | Michel Parent (INRIA Rocquencourt), Arnaud De La Fortelle (INRIA
Rocquencourt) | Cybercars : Past, Present and Future of the Technology | null | Dans ITS World Congress 2005 | null | null | cs.RO | null | Automobile has become the dominant transport mode in the world in the last
century. In order to meet a continuously growing demand for transport, one
solution is to change the control approach for vehicle to full driving
automation, which removes the driver from the control loop to improve
efficiency and reduce accidents. Recent work shows that there are several
realistic paths towards this deployment : driving assistance on passenger cars,
automated commercial vehicles on dedicated infrastructures, and new forms of
urban transport (car-sharing and cybercars). Cybercars have already been put
into operation in Europe, and it seems that this approach could lead the way
towards full automation on most urban, and later interurban infrastructures.
The European project CyberCars has brought many improvements in the technology
needed to operate cybercars over the last three years. A new, larger European
project is now being prepared to carry this work further in order to meet more
ambitious objectives in terms of safety and efficiency. This paper will present
past and present technologies and will focus on the future developments.
| [
{
"version": "v1",
"created": "Thu, 20 Oct 2005 15:03:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Parent",
"Michel",
"",
"INRIA Rocquencourt"
],
[
"De La Fortelle",
"Arnaud",
"",
"INRIA\n Rocquencourt"
]
] |
cs/0510062 | Jamal Saboune | Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA
Lorraine - LORIA) | Using Interval Particle Filtering for Marker less 3D Human Motion
Capture | null | null | null | null | cs.AI | null | In this paper we present a new approach for marker less human motion capture
from conventional camera feeds. The aim of our study is to recover 3D positions
of key points of the body that can serve for gait analysis. Our approach is
based on foreground segmentation, an articulated body model and particle
filters. In order to be generic and simple no restrictive dynamic modelling was
used. A new modified particle filtering algorithm was introduced. It is used
efficiently to search the model configuration space. This new algorithm which
we call Interval Particle Filtering reorganizes the configurations search space
in an optimal deterministic way and proved to be efficient in tracking natural
human movement. Results for human motion capture from a single camera are
presented and compared to results obtained from a marker based system. The
system proved to be able to track motion successfully even in partial
occlusions.
| [
{
"version": "v1",
"created": "Fri, 21 Oct 2005 13:45:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Saboune",
"Jamal",
"",
"INRIA Lorraine - LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA\n Lorraine - LORIA"
]
] |
cs/0510063 | Jamal Saboune | Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA
Lorraine - LORIA) | Markerless Human Motion Capture for Gait Analysis | null | null | null | null | cs.AI | null | The aim of our study is to detect balance disorders and a tendency towards
the falls in the elderly, knowing gait parameters. In this paper we present a
new tool for gait analysis based on markerless human motion capture, from
camera feeds. The system introduced here, recovers the 3D positions of several
key points of the human body while walking. Foreground segmentation, an
articulated body model and particle filtering are basic elements of our
approach. No dynamic model is used thus this system can be described as generic
and simple to implement. A modified particle filtering algorithm, which we call
Interval Particle Filtering, is used to reorganise and search through the
model's configurations search space in a deterministic optimal way. This
algorithm was able to perform human movement tracking with success. Results
from the treatment of a single cam feeds are shown and compared to results
obtained using a marker based human motion capture system.
| [
{
"version": "v1",
"created": "Fri, 21 Oct 2005 13:45:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Saboune",
"Jamal",
"",
"INRIA Lorraine - LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA\n Lorraine - LORIA"
]
] |
cs/0510065 | Aneta Zwierko | Adam Wierzbicki, Aneta Zwierko and Zbigniew Kotulski | A new authentication protocol for revocable anonymity in ad-hoc networks | 8 pages, 8 figures, this an extended version of paper accepted for
IASTED conference CNIS'2005 | null | null | null | cs.CR cs.DC cs.NI | null | This paper describes a new protocol for authentication in ad-hoc networks.
The protocol has been designed to meet specialized requirements of ad-hoc
networks, such as lack of direct communication between nodes or requirements
for revocable anonymity. At the same time, a ad-hoc authentication protocol
must be resistant to spoofing, eavesdropping and playback, and
man-in-the-middle attacks. The article analyzes existing authentication methods
based on the Public Key Infrastructure, and finds that they have several
drawbacks in ad-hoc networks. Therefore, a new authentication protocol, basing
on established cryptographic primitives (Merkle's puzzles and zero-knowledge
proofs) is proposed. The protocol is studied for a model ad-hoc chat
application that provides private conversations.
| [
{
"version": "v1",
"created": "Sat, 22 Oct 2005 11:51:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wierzbicki",
"Adam",
""
],
[
"Zwierko",
"Aneta",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
cs/0510073 | Christian Attiogb | Christian Attiogbe | Semantic Embedding of Petri Nets into Event-B | 16 pages, 3 figures | null | null | null | cs.LO | null | We present an embedding of Petri nets into B abstract systems. The embedding
is achieved by translating both the static structure (modelling aspect) and the
evolution semantics of Petri nets. The static structure of a Petri-net is
captured within a B abstract system through a graph structure. This abstract
system is then included in another abstract system which captures the evolution
semantics of Petri-nets. The evolution semantics results in some B events
depending on the chosen policies: basic nets or high level Petri nets. The
current embedding enables one to use conjointly Petri nets and Event-B in the
same system development, but at different steps and for various analysis.
| [
{
"version": "v1",
"created": "Mon, 24 Oct 2005 09:17:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Attiogbe",
"Christian",
""
]
] |
cs/0510074 | Riccardo Pucella | Matthew Fluet, Riccardo Pucella | Practical Datatype Specializations with Phantom Types and Recursion
Schemes | 25 pages. Appeared in the Proc. of the 2005 ACM SIGPLAN Workshop on
ML | null | null | null | cs.PL | null | Datatype specialization is a form of subtyping that captures program
invariants on data structures that are expressed using the convenient and
intuitive datatype notation. Of particular interest are structural invariants
such as well-formedness. We investigate the use of phantom types for describing
datatype specializations. We show that it is possible to express
statically-checked specializations within the type system of Standard ML. We
also show that this can be done in a way that does not lose useful programming
facilities such as pattern matching in case expressions.
| [
{
"version": "v1",
"created": "Mon, 24 Oct 2005 16:27:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fluet",
"Matthew",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
cs/0510076 | Olivier Pauplin | Olivier Pauplin (INRIA Rocquencourt), Jean Louchet (INRIA
Rocquencourt), Evelyne Lutton (INRIA Rocquencourt), Michel Parent (INRIA
Rocquencourt) | Applying Evolutionary Optimisation to Robot Obstacle Avoidance | null | Dans ISCIIA 2004 | null | null | cs.AI cs.RO | null | This paper presents an artificial evolutionbased method for stereo image
analysis and its application to real-time obstacle detection and avoidance for
a mobile robot. It uses the Parisian approach, which consists here in splitting
the representation of the robot's environment into a large number of simple
primitives, the "flies", which are evolved following a biologically inspired
scheme and give a fast, low-cost solution to the obstacle detection problem in
mobile robotics.
| [
{
"version": "v1",
"created": "Tue, 25 Oct 2005 07:07:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pauplin",
"Olivier",
"",
"INRIA Rocquencourt"
],
[
"Louchet",
"Jean",
"",
"INRIA\n Rocquencourt"
],
[
"Lutton",
"Evelyne",
"",
"INRIA Rocquencourt"
],
[
"Parent",
"Michel",
"",
"INRIA\n Rocquencourt"
]
] |
cs/0510079 | Riccardo Pucella | Joseph Y. Halpern, Riccardo Pucella | Evidence with Uncertain Likelihoods | 21 pages. A preliminary version appeared in the Proceedings of UAI'05 | null | null | null | cs.AI | null | An agent often has a number of hypotheses, and must choose among them based
on observations, or outcomes of experiments. Each of these observations can be
viewed as providing evidence for or against various hypotheses. All the
attempts to formalize this intuition up to now have assumed that associated
with each hypothesis h there is a likelihood function \mu_h, which is a
probability measure that intuitively describes how likely each observation is,
conditional on h being the correct hypothesis. We consider an extension of this
framework where there is uncertainty as to which of a number of likelihood
functions is appropriate, and discuss how one formal approach to defining
evidence, which views evidence as a function from priors to posteriors, can be
generalized to accommodate this uncertainty.
| [
{
"version": "v1",
"created": "Tue, 25 Oct 2005 21:15:31 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Aug 2006 17:34:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
cs/0510080 | Joseph Y. Halpern | Peter D. Grunwald and Joseph Y. Halpern | When Ignorance is Bliss | In Proceedings of the Twentieth Conference on Uncertainty in AI,
2004, pp. 226-234 | null | null | null | cs.AI cs.LG | null | It is commonly-accepted wisdom that more information is better, and that
information should never be ignored. Here we argue, using both a Bayesian and a
non-Bayesian analysis, that in some situations you are better off ignoring
information if your uncertainty is represented by a set of probability
measures. These include situations in which the information is relevant for the
prediction task at hand. In the non-Bayesian analysis, we show how ignoring
information avoids dilation, the phenomenon that additional pieces of
information sometimes lead to an increase in uncertainty. In the Bayesian
analysis, we show that for small sample sizes and certain prediction tasks, the
Bayesian posterior based on a noninformative prior yields worse predictions
than simply ignoring the given information.
| [
{
"version": "v1",
"created": "Tue, 25 Oct 2005 22:14:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grunwald",
"Peter D.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/0510083 | Nizar Kerkeni | Nizar Kerkeni (TIM), Frederic Alexandre (CORTEX), Mohamed Hedi Bedoui
(TIM), Laurent Bougrain (CORTEX), Mohamed Dogui (SAHLOUL) | Neuronal Spectral Analysis of EEG and Expert Knowledge Integration for
Automatic Classification of Sleep Stages | null | null | null | null | cs.AI | null | Being able to analyze and interpret signal coming from electroencephalogram
(EEG) recording can be of high interest for many applications including medical
diagnosis and Brain-Computer Interfaces. Indeed, human experts are today able
to extract from this signal many hints related to physiological as well as
cognitive states of the recorded subject and it would be very interesting to
perform such task automatically but today no completely automatic system
exists. In previous studies, we have compared human expertise and automatic
processing tools, including artificial neural networks (ANN), to better
understand the competences of each and determine which are the difficult
aspects to integrate in a fully automatic system. In this paper, we bring more
elements to that study in reporting the main results of a practical experiment
which was carried out in an hospital for sleep pathology study. An EEG
recording was studied and labeled by a human expert and an ANN. We describe
here the characteristics of the experiment, both human and neuronal procedure
of analysis, compare their performances and point out the main limitations
which arise from this study.
| [
{
"version": "v1",
"created": "Wed, 26 Oct 2005 14:47:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kerkeni",
"Nizar",
"",
"TIM"
],
[
"Alexandre",
"Frederic",
"",
"CORTEX"
],
[
"Bedoui",
"Mohamed Hedi",
"",
"TIM"
],
[
"Bougrain",
"Laurent",
"",
"CORTEX"
],
[
"Dogui",
"Mohamed",
"",
"SAHLOUL"
]
] |
cs/0510084 | Michel Fliess | Michel Fliess | R\'{e}flexions sur la question fr\'{e}quentielle en traitement du signal | null | null | null | null | cs.CE cs.IR math-ph math.MP math.SP | null | New definitions are suggested for frequencies which may be instantaneous or
not. The Heisenberg-Gabor inequality and the Shannon sampling theorem are
briefly discussed.
| [
{
"version": "v1",
"created": "Wed, 26 Oct 2005 14:49:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fliess",
"Michel",
""
]
] |
cs/0510086 | Krishnaram Kenthapadi | K. Kenthapadi and R. Panigrahy | Balanced Allocation on Graphs | null | null | null | null | cs.DS | null | In this paper, we study the two choice balls and bins process when balls are
not allowed to choose any two random bins, but only bins that are connected by
an edge in an underlying graph. We show that for $n$ balls and $n$ bins, if the
graph is almost regular with degree $n^\epsilon$, where $\epsilon$ is not too
small, the previous bounds on the maximum load continue to hold. Precisely, the
maximum load is $\log \log n + O(1/\epsilon) + O(1)$. For general
$\Delta$-regular graphs, we show that the maximum load is $\log\log n +
O(\frac{\log n}{\log (\Delta/\log^4 n)}) + O(1)$ and also provide an almost
matching lower bound of $\log \log n + \frac{\log n}{\log (\Delta \log n)}$.
V{\"o}cking [Voc99] showed that the maximum bin size with $d$ choice load
balancing can be further improved to $O(\log\log n /d)$ by breaking ties to the
left. This requires $d$ random bin choices. We show that such bounds can be
achieved by making only two random accesses and querying $d/2$ contiguous bins
in each access. By grouping a sequence of $n$ bins into $2n/d$ groups, each of
$d/2$ consecutive bins, if each ball chooses two groups at random and inserts
the new ball into the least-loaded bin in the lesser loaded group, then the
maximum load is $O(\log\log n/d)$ with high probability.
| [
{
"version": "v1",
"created": "Thu, 27 Oct 2005 21:59:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kenthapadi",
"K.",
""
],
[
"Panigrahy",
"R.",
""
]
] |
cs/0510087 | Johannes Gro{\ss}e | J. Grosse | MathPSfrag: Creating Publication-Quality Labels in Mathematica Plots | 7 pages, 8 figures, for associated Mathematica package, see
http://wwwth.mppmu.mpg.de/members/jgrosse/mathpsfrag/MathPSfrag-1.0.tar.gz | null | null | LMU-ASC 70/05; MPP-2005-126 | cs.GR | null | This article introduces a Mathematica package providing a graphics export
function that automatically replaces Mathematica expressions in a graphic by
the corresponding LaTeX constructs and positions them correctly. It thus
facilitates the creation of publication-quality Enscapulated PostScript (EPS)
graphics.
| [
{
"version": "v1",
"created": "Mon, 31 Oct 2005 09:40:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grosse",
"J.",
""
]
] |
cs/0510088 | Assaf Naor | Rajeev Motwani and Assaf Naor and Rina Panigrahy | Lower bounds on Locality Sensitive Hashing | null | null | null | null | cs.CG | null | Given a metric space $(X,d_X)$, $c\ge 1$, $r>0$, and $p,q\in [0,1]$, a
distribution over mappings $\h:X\to \mathbb N$ is called a
$(r,cr,p,q)$-sensitive hash family if any two points in $X$ at distance at most
$r$ are mapped by $\h$ to the same value with probability at least $p$, and any
two points at distance greater than $cr$ are mapped by $\h$ to the same value
with probability at most $q$. This notion was introduced by Indyk and Motwani
in 1998 as the basis for an efficient approximate nearest neighbor search
algorithm, and has since been used extensively for this purpose. The
performance of these algorithms is governed by the parameter
$\rho=\frac{\log(1/p)}{\log(1/q)}$, and constructing hash families with small
$\rho$ automatically yields improved nearest neighbor algorithms. Here we show
that for $X=\ell_1$ it is impossible to achieve $\rho\le \frac{1}{2c}$. This
almost matches the construction of Indyk and Motwani which achieves $\rho\le
\frac{1}{c}$.
| [
{
"version": "v1",
"created": "Sat, 29 Oct 2005 15:05:52 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Nov 2005 20:32:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Motwani",
"Rajeev",
""
],
[
"Naor",
"Assaf",
""
],
[
"Panigrahy",
"Rina",
""
]
] |
cs/0510090 | Sheng-Gwo Chen | Jyh-Yang Wu, Sheng-Gwo Chen and Mei-Hsiu Chi | A simple effective method for curvatures estimation on triangular meshes | null | null | null | null | cs.CG | null | To definite and compute differential invariants, like curvatures, for
triangular meshes (or polyhedral surfaces) is a key problem in CAGD and the
computer vision. The Gaussian curvature and the mean curvature are determined
by the differential of the Gauss map of the underlying surface. The Gauss map
assigns to each point in the surface the unit normal vector of the tangent
plane to the surface at this point. We follow the ideas developed in Chen and
Wu \cite{Chen2}(2004) and Wu, Chen and Chi\cite{Wu}(2005) to describe a new and
simple approach to estimate the differential of the Gauss map and curvatures
from the viewpoint of the gradient and the centroid weights. This will give us
a much better estimation of curvatures than Taubin's algorithm \cite{Taubin}
(1995).
| [
{
"version": "v1",
"created": "Mon, 31 Oct 2005 02:41:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wu",
"Jyh-Yang",
""
],
[
"Chen",
"Sheng-Gwo",
""
],
[
"Chi",
"Mei-Hsiu",
""
]
] |
cs/0510091 | Marc Schoenauer | Marc Schoenauer (INRIA Futurs), Yann Semet (INRIA Futurs) | An efficient memetic, permutation-based evolutionary algorithm for
real-world train timetabling | null | null | null | null | cs.AI | null | Train timetabling is a difficult and very tightly constrained combinatorial
problem that deals with the construction of train schedules. We focus on the
particular problem of local reconstruction of the schedule following a small
perturbation, seeking minimisation of the total accumulated delay by adapting
times of departure and arrival for each train and allocation of resources
(tracks, routing nodes, etc.). We describe a permutation-based evolutionary
algorithm that relies on a semi-greedy heuristic to gradually reconstruct the
schedule by inserting trains one after the other following the permutation.
This algorithm can be hybridised with ILOG commercial MIP programming tool
CPLEX in a coarse-grained manner: the evolutionary part is used to quickly
obtain a good but suboptimal solution and this intermediate solution is refined
using CPLEX. Experimental results are presented on a large real-world case
involving more than one million variables and 2 million constraints. Results
are surprisingly good as the evolutionary algorithm, alone or hybridised,
produces excellent solutions much faster than CPLEX alone.
| [
{
"version": "v1",
"created": "Mon, 31 Oct 2005 06:06:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
],
[
"Semet",
"Yann",
"",
"INRIA Futurs"
]
] |
cs/0510094 | Angel de Vicente | Angel de Vicente, Nayra Rodriguez | Big Science with a Small Budget: Non-Embarrassingly Parallel
Applications in a Non-Dedicated Network of Workstations | 4 pages; to appear in Proceedings of ADASS XV
(http://www.adass.org:8080/Conferences/2005/Venue/) | null | null | null | cs.DC astro-ph | null | Many astronomers and astrophysicists require large computing resources for
their research, which are usually obtained via dedicated (and expensive)
parallel machines. Depending on the type of the problem to be solved, an
alternative solution can be provided by creating dynamically a computer cluster
out of non-dedicated workstations using the Condor High Throughput Computing
System and the Master-Worker (MW) framework. As an example of this we show in
this paper how a radiative transfer application previously coded with MPI is
solved using this solution without the need for dedicated machines.
| [
{
"version": "v1",
"created": "Mon, 31 Oct 2005 14:55:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Vicente",
"Angel",
""
],
[
"Rodriguez",
"Nayra",
""
]
] |
cs/0511002 | Alberto Accomazzi | Alberto Accomazzi, Michael J. Kurtz, Guenther Eichhorn, Edwin
Henneken, Carolyn S. Grant, Markus Demleitner, Stephen S. Murray | Bibliographic Classification using the ADS Databases | Latex, 4 pages, 1 Figure. To be published in the Proceedings of the
Conference "Astronomical Data Analysis Software & Systems XV" held October
2-5, 2005, in San Lorenzo de El Escorial, Spain | null | null | null | cs.IR cs.DL | null | We discuss two techniques used to characterize bibliographic records based on
their similarity to and relationship with the contents of the NASA Astrophysics
Data System (ADS) databases. The first method has been used to classify input
text as being relevant to one or more subject areas based on an analysis of the
frequency distribution of its individual words. The second method has been used
to classify existing records as being relevant to one or more databases based
on the distribution of the papers citing them. Both techniques have proven to
be valuable tools in assigning new and existing bibliographic records to
different disciplines within the ADS databases.
| [
{
"version": "v1",
"created": "Mon, 31 Oct 2005 22:34:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Accomazzi",
"Alberto",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Demleitner",
"Markus",
""
],
[
"Murray",
"Stephen S.",
""
]
] |
cs/0511004 | Marc Schoenauer | Aguston E. Eiben (VU), Marc Schoenauer (FRACTALES) | Evolutionary Computing | null | null | null | null | cs.AI | null | Evolutionary computing (EC) is an exciting development in Computer Science.
It amounts to building, applying and studying algorithms based on the Darwinian
principles of natural selection. In this paper we briefly introduce the main
concepts behind evolutionary computing. We present the main components all
evolutionary algorithms (EA), sketch the differences between different types of
EAs and survey application areas ranging from optimization, modeling and
simulation to entertainment.
| [
{
"version": "v1",
"created": "Tue, 1 Nov 2005 19:46:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eiben",
"Aguston E.",
"",
"VU"
],
[
"Schoenauer",
"Marc",
"",
"FRACTALES"
]
] |
cs/0511010 | Nadir Kiyanclar | Nadir Kiyanclar | A Survey of Virtualization Techniques Focusing on Secure On-Demand
Cluster Computing | null | null | null | null | cs.OS | null | Virtualization, a technique once used to multiplex the resources of
high-priced mainframe hardware, is seeing a resurgence in applicability with
the increasing computing power of commodity computers. By inserting a layer of
software between the machine and traditional operating systems, this technology
allows access to a shared computing medium in a manner that is secure,
resource-controlled, and efficient. These properties are attractive in the
field of on-demand computing, where the fine-grained subdivision of resources
provided by virtualized systems allows potentially higher utilization of
computing resources.
It this work, we survey a number of virtual machine systems with the goal of
finding an appropriate candidate to serve as the basis for the On-Demand Secure
Cluster Computing project at the National Center for Supercomputing
Applications. Contenders are reviewed on a number of desirable properties
including portability and security. We conclude with a comparison and
justification of our choice.
| [
{
"version": "v1",
"created": "Wed, 2 Nov 2005 19:52:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kiyanclar",
"Nadir",
""
]
] |
cs/0511011 | Hamilton Link | Hamilton Link and Jared Saia and Terran Lane and Randall A. LaViolette | The Impact of Social Networks on Multi-Agent Recommender Systems | 12 pages, 4 figures. Published in the Proceedings of the Workshop on
Cooperative Multi-Agent Learning (ECML/PKDD '05). Resubmitted to fix
citations and metadata | null | null | null | cs.LG cs.CC cs.MA | null | Awerbuch et al.'s approach to distributed recommender systems (DRSs) is to
have agents sample products at random while randomly querying one another for
the best item they have found; we improve upon this by adding a communication
network. Agents can only communicate with their immediate neighbors in the
network, but neighboring agents may or may not represent users with common
interests. We define two network structures: in the ``mailing-list model,''
agents representing similar users form cliques, while in the ``word-of-mouth
model'' the agents are distributed randomly in a scale-free network (SFN). In
both models, agents tell their neighbors about satisfactory products as they
are found. In the word-of-mouth model, knowledge of items propagates only
through interested agents, and the SFN parameters affect the system's
performance. We include a summary of our new results on the character and
parameters of random subgraphs of SFNs, in particular SFNs with power-law
degree distributions down to minimum degree 1. These networks are not as
resilient as Cohen et al. originally suggested. In the case of the widely-cited
``Internet resilience'' result, high failure rates actually lead to the
orphaning of half of the surviving nodes after 60% of the network has failed
and the complete disintegration of the network at 90%. We show that given an
appropriate network, the communication network reduces the number of sampled
items, the number of messages sent, and the amount of ``spam.'' We conclude
that in many cases DRSs will be useful for sharing information in a multi-agent
learning system.
| [
{
"version": "v1",
"created": "Wed, 2 Nov 2005 23:44:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Link",
"Hamilton",
""
],
[
"Saia",
"Jared",
""
],
[
"Lane",
"Terran",
""
],
[
"LaViolette",
"Randall A.",
""
]
] |
cs/0511012 | Hamilton Link | Hamilton Link and Randall A. LaViolette and Jared Saia and Terran Lane | Parameters Affecting the Resilience of Scale-Free Networks to Random
Failures | 12 pages, 7 figures. Submitting to Phys. Rev. Lett | null | null | null | cs.NI cs.AR cs.MA | null | It is commonly believed that scale-free networks are robust to massive
numbers of random node deletions. For example, Cohen et al. study scale-free
networks including some which approximate the measured degree distribution of
the Internet. Their results suggest that if each node in this network failed
independently with probability 0.99, the remaining network would continue to
have a giant component. In this paper, we show that a large and important
subclass of scale-free networks are not robust to massive numbers of random
node deletions for practical purposes. In particular, we study finite
scale-free networks which have minimum node degree of 1 and a power-law degree
distribution beginning with nodes of degree 1 (power-law networks). We show
that, in a power-law network approximating the Internet's reported
distribution, when the probability of deletion of each node is 0.5 only about
25% of the surviving nodes in the network remain connected in a giant
component, and the giant component does not persist beyond a critical failure
rate of 0.9. The new result is partially due to improved analytical
accommodation of the large number of degree-0 nodes that result after node
deletions. Our results apply to finite power-law networks with a wide range of
power-law exponents, including Internet-like networks. We give both analytical
and empirical evidence that such networks are not generally robust to massive
random node deletions.
| [
{
"version": "v1",
"created": "Wed, 2 Nov 2005 22:22:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Link",
"Hamilton",
""
],
[
"LaViolette",
"Randall A.",
""
],
[
"Saia",
"Jared",
""
],
[
"Lane",
"Terran",
""
]
] |
cs/0511013 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | K-ANMI: A Mutual Information Based Clustering Algorithm for Categorical
Data | 18 pages | null | null | Tr-2004-03 | cs.AI cs.DB | null | Clustering categorical data is an integral part of data mining and has
attracted much attention recently. In this paper, we present k-ANMI, a new
efficient algorithm for clustering categorical data. The k-ANMI algorithm works
in a way that is similar to the popular k-means algorithm, and the goodness of
clustering in each step is evaluated using a mutual information based criterion
(namely, Average Normalized Mutual Information-ANMI) borrowed from cluster
ensemble. Experimental results on real datasets show that k-ANMI algorithm is
competitive with those state-of-art categorical data clustering algorithms with
respect to clustering accuracy.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 01:18:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
cs/0511014 | Kumar Neeraj Verma | Helmut Seidl, Kumar Neeraj Verma | Flat and One-Variable Clauses: Complexity of Verifying Cryptographic
Protocols with Single Blind Copying | Long version of paper presented at LPAR 2004 | null | null | null | cs.LO cs.CR | null | Cryptographic protocols with single blind copying were defined and modeled by
Comon and Cortier using the new class $\mathcal C$ of first order clauses. They
showed its satisfiability problem to be in 3-DEXPTIME. We improve this result
by showing that satisfiability for this class is NEXPTIME-complete, using new
resolution techniques. We show satisfiability to be DEXPTIME-complete if
clauses are Horn, which is what is required for modeling cryptographic
protocols. While translation to Horn clauses only gives a DEXPTIME upper bound
for the secrecy problem for these protocols, we further show that this secrecy
problem is actually DEXPTIME-complete.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 13:40:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Seidl",
"Helmut",
""
],
[
"Verma",
"Kumar Neeraj",
""
]
] |
cs/0511015 | Prashant Singh | Prashant | Towards a Hierarchical Model of Consciousness, Intelligence, Mind and
Body | 12 pages, 2 figures | null | null | null | cs.AI | null | This article is taken out.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 16:28:05 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jan 2007 00:00:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prashant",
"",
""
]
] |
cs/0511016 | Santo Fortunato Dr | Santo Fortunato, Marian Boguna, Alessandro Flammini, Filippo Menczer | How to make the top ten: Approximating PageRank from in-degree | 8 pages, 7 figures, 2 tables | null | null | null | cs.IR physics.soc-ph | null | PageRank has become a key element in the success of search engines, allowing
to rank the most important hits in the top screen of results. One key aspect
that distinguishes PageRank from other prestige measures such as in-degree is
its global nature. From the information provider perspective, this makes it
difficult or impossible to predict how their pages will be ranked. Consequently
a market has emerged for the optimization of search engine results. Here we
study the accuracy with which PageRank can be approximated by in-degree, a
local measure made freely available by search engines. Theoretical and
empirical analyses lead to conclude that given the weak degree correlations in
the Web link graph, the approximation can be relatively accurate, giving
service and information providers an effective new marketing tool.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 23:01:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fortunato",
"Santo",
""
],
[
"Boguna",
"Marian",
""
],
[
"Flammini",
"Alessandro",
""
],
[
"Menczer",
"Filippo",
""
]
] |
cs/0511017 | Gus Gutoski | Gus Gutoski | Short Quantum Games | MSc thesis, 79 pages single-spaced | null | null | null | cs.CC quant-ph | null | In this thesis we introduce quantum refereed games, which are quantum
interactive proof systems with two competing provers. We focus on a restriction
of this model that we call "short quantum games" and we prove an upper bound
and a lower bound on the expressive power of these games.
For the lower bound, we prove that every language having an ordinary quantum
interactive proof system also has a short quantum game. An important part of
this proof is the establishment of a quantum measurement that reliably
distinguishes between quantum states chosen from disjoint convex sets.
For the upper bound, we show that certain types of quantum refereed games,
including short quantum games, are decidable in deterministic exponential time
by supplying a separation oracle for use with the ellipsoid method for convex
feasibility.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 23:00:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gutoski",
"Gus",
""
]
] |
cs/0511018 | Prashant Singh | Prashant | From General Systems to Soft Systems to Soft Computing: Applications for
Large and Complex Real World Systems | 9 pages | null | null | null | cs.SE | null | This is article is taken out.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 23:29:55 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jan 2007 00:00:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prashant",
"",
""
]
] |
cs/0511020 | David P{\l}aneta S | David S. P{\l}aneta | Pbit and other list sorting algorithms | 25 pages, 4 tables | Cornell University Computing and Information Science Technical
Reports, 2006 | null | TR2006-2013 | cs.DS | null | Pbit, besides its simplicity, is definitely the fastest list sorting
algorithm. It considerably surpasses all already known methods. Among many
advantages, it is stable, linear and be made to run in place. I will compare
Pbit with algorithm described by Donald E. Knuth in the third volume of ''The
Art of Computer Programming'' and other (QuickerSort, MergeSort) list sorting
algorithms.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2005 01:52:02 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jan 2006 23:48:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Płaneta",
"David S.",
""
]
] |
cs/0511021 | Thorsten Theobald | Ravi Kannan and Thorsten Theobald | Games of fixed rank: A hierarchy of bimatrix games | 13 pages | null | null | null | cs.GT math.CO | null | We propose a new hierarchical approach to understand the complexity of the
open problem of computing a Nash equilibrium in a bimatrix game. Specifically,
we investigate a hierarchy of bimatrix games $(A,B)$ which results from
restricting the rank of the matrix $A+B$ to be of fixed rank at most $k$. For
every fixed $k$, this class strictly generalizes the class of zero-sum games,
but is a very special case of general bimatrix games. We show that even for
$k=1$ the set of Nash equilibria of these games can consist of an arbitrarily
large number of connected components. While the question of exact polynomial
time algorithms to find a Nash equilibrium remains open for games of fixed
rank, we can provide polynomial time algorithms for finding an
$\epsilon$-approximation.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2005 10:29:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kannan",
"Ravi",
""
],
[
"Theobald",
"Thorsten",
""
]
] |
cs/0511022 | Emanuel Diamant | Emanuel Diamant | Does a Plane Imitate a Bird? Does Computer Vision Have to Follow
Biological Paradigms? | Proceedings of the 1st International Symposium on Brain, Vision, and
Artificial Intelligence, 19-21 October 2005, Naples, Italy | LNCS, vol. 3704, pp. 108-115, 2005, Springer Verlag Berlin
Heidelberg 2005 | null | null | cs.NE | null | We posit a new paradigm for image information processing. For the last 25
years, this task was usually approached in the frame of Treisman's two-stage
paradigm [1]. The latter supposes an unsupervised, bottom-up directed process
of preliminary information pieces gathering at the lower processing stages and
a supervised, top-down directed process of information pieces binding and
grouping at the higher stages. It is acknowledged that these sub-processes
interact and intervene between them in a tricky and a complicated manner.
Notwithstanding the prevalence of this paradigm in biological and computer
vision, we nevertheless propose to replace it with a new one, which we would
like to designate as a two-part paradigm. In it, information contained in an
image is initially extracted in an independent top-down manner by one part of
the system, and then it is examined and interpreted by another, separate system
part. We argue that the new paradigm seems to be more plausible than its
forerunner. We provide evidence from human attention vision studies and
insights of Kolmogorov's complexity theory to support our arguments. We also
provide some reasons in favor of separate image interpretation issues.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2005 15:08:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diamant",
"Emanuel",
""
]
] |
cs/0511024 | Bourgade Paul | Bourgade Paul, Croissant Olivier | Heat kernel expansion for a family of stochastic volatility models :
delta-geometry | null | null | null | null | cs.CE | null | In this paper, we study a family of stochastic volatility processes; this
family features a mean reversion term for the volatility and a double CEV-like
exponent that generalizes SABR and Heston's models. We derive approximated
closed form formulas for the digital prices, the local and implied
volatilities. Our formulas are efficient for small maturities.
Our method is based on differential geometry, especially small time
diffusions on riemanian spaces. This geometrical point of view can be extended
to other processes, and is very accurate to produce variate smiles for small
maturities and small moneyness.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2005 18:31:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paul",
"Bourgade",
""
],
[
"Olivier",
"Croissant",
""
]
] |
cs/0511025 | Riccardo Pucella | James Cheney | Logic Column 14: Nominal Logic and Abstract Syntax | 24 pages | SIGACT News 36 (4), pp. 47-69, 2005 | null | null | cs.LO | null | Formalizing syntactic proofs of properties of logics, programming languages,
security protocols, and other formal systems is a significant challenge, in
large part because of the obligation to handle name-binding correctly. We
present an approach called nominal abstract syntax that has attracted
considerable interest since its introduction approximately six years ago. After
an overview of other approaches, we describe nominal abstract syntax and
nominal logic, a logic for reasoning about nominal abstract syntax. We also
discuss applications of nominal techniques to programming, automated reasoning,
and identify some future directions.
| [
{
"version": "v1",
"created": "Sat, 5 Nov 2005 02:47:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cheney",
"James",
""
]
] |
cs/0511027 | Stephen Luttrell | Stephen Luttrell | Discrete Network Dynamics. Part 1: Operator Theory | 39 pages, 5 figures | null | null | null | cs.NE | null | An operator algebra implementation of Markov chain Monte Carlo algorithms for
simulating Markov random fields is proposed. It allows the dynamics of networks
whose nodes have discrete state spaces to be specified by the action of an
update operator that is composed of creation and annihilation operators. This
formulation of discrete network dynamics has properties that are similar to
those of a quantum field theory of bosons, which allows reuse of many
conceptual and theoretical structures from QFT. The equilibrium behaviour of
one of these generalised MRFs and of the adaptive cluster expansion network
(ACEnet) are shown to be equivalent, which provides a way of unifying these two
theories.
| [
{
"version": "v1",
"created": "Mon, 7 Nov 2005 19:09:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
] |
cs/0511030 | Gregory Gutin | G. Gutin, A. Rafiey, S. Szeider, A. Yeo | The Linear Arrangement Problem Parameterized Above Guaranteed Value | null | null | null | null | cs.DS cs.CC | null | A linear arrangement (LA) is an assignment of distinct integers to the
vertices of a graph. The cost of an LA is the sum of lengths of the edges of
the graph, where the length of an edge is defined as the absolute value of the
difference of the integers assigned to its ends. For many application one hopes
to find an LA with small cost. However, it is a classical NP-complete problem
to decide whether a given graph $G$ admits an LA of cost bounded by a given
integer. Since every edge of $G$ contributes at least one to the cost of any
LA, the problem becomes trivially fixed-parameter tractable (FPT) if
parameterized by the upper bound of the cost. Fernau asked whether the problem
remains FPT if parameterized by the upper bound of the cost minus the number of
edges of the given graph; thus whether the problem is FPT ``parameterized above
guaranteed value.'' We answer this question positively by deriving an algorithm
which decides in time $O(m+n+5.88^k)$ whether a given graph with $m$ edges and
$n$ vertices admits an LA of cost at most $m+k$ (the algorithm computes such an
LA if it exists). Our algorithm is based on a procedure which generates a
problem kernel of linear size in linear time for a connected graph $G$. We also
prove that more general parameterized LA problems stated by Serna and Thilikos
are not FPT, unless P=NP.
| [
{
"version": "v1",
"created": "Mon, 7 Nov 2005 17:47:55 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Dec 2005 18:26:42 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Mar 2006 10:00:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Szeider",
"S.",
""
],
[
"Yeo",
"A.",
""
]
] |
cs/0511031 | Prashant Singh | Prashant | Internet Protocol Black Holes: A E-Security Threat | null | null | null | null | cs.NI | null | The paper is taken out.
| [
{
"version": "v1",
"created": "Tue, 8 Nov 2005 00:14:06 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2007 17:05:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prashant",
"",
""
]
] |
cs/0511032 | Yangli Hector Yee | Yang Li Hector Yee (Cornell University) | Spatiotemporal sensistivity and visual attention for efficient rendering
of dynamic environments | null | ACM Transactions on Graphics, 20(1), January 2001 | null | null | cs.GR cs.CV | null | We present a method to accelerate global illumination computation in dynamic
environments by taking advantage of limitations of the human visual system. A
model of visual attention is used to locate regions of interest in a scene and
to modulate spatiotemporal sensitivity. The method is applied in the form of a
spatiotemporal error tolerance map. Perceptual acceleration combined with good
sampling protocols provide a global illumination solution feasible for use in
animation. Results indicate an order of magnitude improvement in computational
speed. The method is adaptable and can also be used in image-based rendering,
geometry level of detail selection, realistic image synthesis, video telephony
and video compression.
| [
{
"version": "v1",
"created": "Tue, 8 Nov 2005 14:40:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yee",
"Yang Li Hector",
"",
"Cornell University"
]
] |
cs/0511033 | Martin Ziegler | Martin Ziegler | Fast (Multi-)Evaluation of Linearly Recurrent Sequences: Improvements
and Applications | null | null | null | null | cs.SC | null | For a linearly recurrent vector sequence P[n+1] = A(n) * P[n], consider the
problem of calculating either the n-th term P[n] or L<=n arbitrary terms
P[n_1],...,P[n_L], both for the case of constant coefficients A(n)=A and for a
matrix A(n) with entries polynomial in n. We improve and extend known
algorithms for this problem and present new applications for it. Specifically
it turns out that for instance * any family (p_n) of classical orthogonal
polynomials admits evaluation at given x within O(n^{1/2} log n) operations
INDEPENDENT of the family (p_n) under consideration. * For any L indices
n_1,...,n_L <= n, the values p_{n_i}(x) can be calculated simultaneously using
O(n^{1/2} log n + L log(n/L)) arithmetic operations; again this running time
bound holds uniformly. * Every hypergeometric (or, more generally, holonomic)
function admits approximate evaluation up to absolute error e>0 within
O((log(1/e)^{1/2} loglog(1/e)) -- as opposed to O(log(1/e)) -- arithmetic
steps. * Given m and a polynomial p of degree d over a field of characteristic
zero, the coefficient of p^m to term X^n can be computed within O(d^2
M(n^{1/2})) steps where M(n) denotes the cost of multiplying two degree-n
polynomials. * The same time bound holds for the joint calculation of any
L<=n^{1/2} desired coefficients of p^m to terms X^{n_i}, n_1,...,n_L <= n.
| [
{
"version": "v1",
"created": "Tue, 8 Nov 2005 16:46:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ziegler",
"Martin",
""
]
] |
cs/0511034 | Stanislav Bulygin V. | Stanislav Bulygin | Generalized Hermitian Codes over GF(2^r) | null | null | null | null | cs.DM | null | In this paper we studied generalization of Hermitian function field proposed
by A.Garcia and H.Stichtenoth. We calculated a Weierstrass semigroup of the
point at infinity for the case q=2, r>=3. It turned out that unlike Hermitian
case, we have already three generators for the semigroup. We then applied this
result to codes, constructed on generalized Hermitian function fields. Further,
we applied results of C.Kirfel and R.Pellikaan to estimating a Feng-Rao
designed distance for GH-codes, which improved on Goppa designed distance.
Next, we studied the question of codes dual to GH-codes. We identified that the
duals are also GH-codes and gave an explicit formula. We concluded with some
computational results. In particular, a new record-giving [32,16,>=12]-code
over GF(8) was presented.
| [
{
"version": "v1",
"created": "Tue, 8 Nov 2005 19:29:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bulygin",
"Stanislav",
""
]
] |
cs/0511041 | Susumu Yamasaki | Susumu Yamasaki | Logic Programming with Default, Weak and Strict Negations | 14 pages, to appear in Theory and Practice of Logic Programming
(TPLP) | null | null | null | cs.LO | null | This paper treats logic programming with three kinds of negation: default,
weak and strict negations. A 3-valued logic model theory is discussed for logic
programs with three kinds of negation. The procedure is constructed for
negations so that a soundness of the procedure is guaranteed in terms of
3-valued logic model theory.
| [
{
"version": "v1",
"created": "Thu, 10 Nov 2005 06:29:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yamasaki",
"Susumu",
""
]
] |
cs/0511042 | Pascal Hitzler | Sebastian Bader and Pascal Hitzler | Dimensions of Neural-symbolic Integration - A Structured Survey | 28 pages | null | null | null | cs.AI cs.LO cs.NE | null | Research on integrated neural-symbolic systems has made significant progress
in the recent past. In particular the understanding of ways to deal with
symbolic knowledge within connectionist systems (also called artificial neural
networks) has reached a critical mass which enables the community to strive for
applicable implementations and use cases. Recent work has covered a great
variety of logics used in artificial intelligence and provides a multitude of
techniques for dealing with them within the context of artificial neural
networks. We present a comprehensive survey of the field of neural-symbolic
integration, including a new classification of system according to their
architectures and abilities.
| [
{
"version": "v1",
"created": "Thu, 10 Nov 2005 10:00:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bader",
"Sebastian",
""
],
[
"Hitzler",
"Pascal",
""
]
] |
cs/0511043 | Damiano Bolzoni | Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter Hartel | Poseidon: a 2-tier Anomaly-based Intrusion Detection System | null | null | null | TR-CTIT-05-53 | cs.CR | null | We present Poseidon, a new anomaly based intrusion detection system. Poseidon
is payload-based, and presents a two-tier architecture: the first stage
consists of a Self-Organizing Map, while the second one is a modified PAYL
system. Our benchmarks on the 1999 DARPA data set show a higher detection rate
and lower number of false positives than PAYL and PHAD.
| [
{
"version": "v1",
"created": "Fri, 11 Nov 2005 13:43:04 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Dec 2005 15:11:44 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Jan 2006 14:27:46 GMT"
},
{
"version": "v4",
"created": "Fri, 3 Feb 2006 12:26:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bolzoni",
"Damiano",
""
],
[
"Zambon",
"Emmanuele",
""
],
[
"Etalle",
"Sandro",
""
],
[
"Hartel",
"Pieter",
""
]
] |
cs/0511044 | Mimmo Parente | J. Gruska, S. La Torre, M. Napoli, M. Parente | Various Solutions to the Firing Squad Synchronization Problems | null | null | null | null | cs.DS cs.CC | null | We present different classes of solutions to the Firing Squad Synchronization
Problem on networks of different shapes. The nodes are finite state processors
that work at unison discrete steps. The networks considered are the line, the
ring and the square. For all of these models we have considered one and two-way
communication modes and also constrained the quantity of information that
adjacent processors can exchange each step. We are given a particular time
expressed as a function of the number of nodes of the network, $f(n)$ and
present synchronization algorithms in time $n^2$, $n \log n$, $n\sqrt n$,
$2^n$. The solutions are presented as {\em signals} that are used as building
blocks to compose new solutions for all times expressed by polynomials with
nonnegative coefficients.
| [
{
"version": "v1",
"created": "Sat, 12 Nov 2005 06:44:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gruska",
"J.",
""
],
[
"La Torre",
"S.",
""
],
[
"Napoli",
"M.",
""
],
[
"Parente",
"M.",
""
]
] |
cs/0511045 | Ugo Dal Lago | Ugo Dal Lago and Simone Martini | An Invariant Cost Model for the Lambda Calculus | 19 pages | null | null | null | cs.LO cs.CC | null | We define a new cost model for the call-by-value lambda-calculus satisfying
the invariance thesis. That is, under the proposed cost model, Turing machines
and the call-by-value lambda-calculus can simulate each other within a
polynomial time overhead. The model only relies on combinatorial properties of
usual beta-reduction, without any reference to a specific machine or evaluator.
In particular, the cost of a single beta reduction is proportional to the
difference between the size of the redex and the size of the reduct. In this
way, the total cost of normalizing a lambda term will take into account the
size of all intermediate results (as well as the number of steps to normal
form).
| [
{
"version": "v1",
"created": "Sat, 12 Nov 2005 11:57:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lago",
"Ugo Dal",
""
],
[
"Martini",
"Simone",
""
]
] |
cs/0511049 | Gus Gutoski | Gus Gutoski | Entropy, Convex Optimization, and Competitive Quantum Interactions | withdrawn | null | null | null | cs.CC cs.GT quant-ph | null | This paper has been withdrawn by the author due to errors.
| [
{
"version": "v1",
"created": "Sat, 12 Nov 2005 21:15:40 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Nov 2005 23:09:33 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Oct 2006 20:16:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gutoski",
"Gus",
""
]
] |
cs/0511052 | Gilson Antonio Giraldi | Gilson A. Giraldi, Antonio A.F. Oliveira, Leonardo Carvalho | Mining Cellular Automata DataBases throug PCA Models | 13 pages, 4 figures, 5 tables | null | null | null | cs.DM cs.DB | null | Cellular Automata are discrete dynamical systems that evolve following simple
and local rules. Despite of its local simplicity, knowledge discovery in CA is
a NP problem. This is the main motivation for using data mining techniques for
CA study. The Principal Component Analysis (PCA) is a useful tool for data
mining because it provides a compact and optimal description of data sets. Such
feature have been explored to compute the best subspace which maximizes the
projection of the I/O patterns of CA onto the principal axis. The stability of
the principal components against the input patterns is the main result of this
approach. In this paper we perform such analysis but in the presence of noise
which randomly reverses the CA output values with probability $p$. As expected,
the number of principal components increases when the pattern size is
increased. However, it seems to remain stable when the pattern size is
unchanged but the noise intensity gets larger. We describe our experiments and
point out further works using KL transform theory and parameter sensitivity
analysis.
| [
{
"version": "v1",
"created": "Mon, 14 Nov 2005 10:54:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson A.",
""
],
[
"Oliveira",
"Antonio A. F.",
""
],
[
"Carvalho",
"Leonardo",
""
]
] |
cs/0511053 | Leland Smith | Leland Smith, Muthukumar Thirunavukkarasu, Srinidhi Varadarajan, and
Naren Ramakrishnan | A Model Based Approach to Reachability Routing | In submission to IEEE Journal on Selected Areas of Communication | null | null | null | cs.NI | null | Current directions in network routing research have not kept pace with the
latest developments in network architectures, such as peer-to-peer networks,
sensor networks, ad-hoc wireless networks, and overlay networks. A common
characteristic among all of these new technologies is the presence of highly
dynamic network topologies. Currently deployed single-path routing protocols
cannot adequately cope with this dynamism, and existing multi-path algorithms
make trade-offs which lead to less than optimal performance on these networks.
This drives the need for routing protocols designed with the unique
characteristics of these networks in mind.
In this paper we propose the notion of reachability routing as a solution to
the challenges posed by routing on such dynamic networks. In particular, our
formulation of reachability routing provides cost-sensitive multi-path
forwarding along with loop avoidance within the confines of the Internet
Protocol (IP) architecture. This is achieved through the application of
reinforcement learning within a probabilistic routing framework. Following an
explanation of our design decisions and a description of the algorithm, we
provide an evaluation of the performance of the algorithm on a variety of
network topologies. The results show consistently superior performance compared
to other reinforcement learning based routing algorithms.
| [
{
"version": "v1",
"created": "Mon, 14 Nov 2005 16:32:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smith",
"Leland",
""
],
[
"Thirunavukkarasu",
"Muthukumar",
""
],
[
"Varadarajan",
"Srinidhi",
""
],
[
"Ramakrishnan",
"Naren",
""
]
] |
cs/0511058 | Vladimir Vovk | Vladimir Vovk | On-line regression competitive with reproducing kernel Hilbert spaces | 37 pages, 1 figure | null | null | null | cs.LG | null | We consider the problem of on-line prediction of real-valued labels, assumed
bounded in absolute value by a known constant, of new objects from known
labeled objects. The prediction algorithm's performance is measured by the
squared deviation of the predictions from the actual labels. No stochastic
assumptions are made about the way the labels and objects are generated.
Instead, we are given a benchmark class of prediction rules some of which are
hoped to produce good predictions. We show that for a wide range of
infinite-dimensional benchmark classes one can construct a prediction algorithm
whose cumulative loss over the first N examples does not exceed the cumulative
loss of any prediction rule in the class plus O(sqrt(N)); the main differences
from the known results are that we do not impose any upper bound on the norm of
the considered prediction rules and that we achieve an optimal leading term in
the excess loss of our algorithm. If the benchmark class is "universal" (dense
in the class of continuous functions on each compact set), this provides an
on-line non-stochastic analogue of universally consistent prediction in
non-parametric statistics. We use two proof techniques: one is based on the
Aggregating Algorithm and the other on the recently developed method of
defensive forecasting.
| [
{
"version": "v1",
"created": "Tue, 15 Nov 2005 17:13:50 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Jan 2006 23:27:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0511061 | Stephan Merz | Moritz Hammer (IFI-LMU), Alexander Knapp (IFI-LMU), Stephan Merz
(INRIA Lorraine - LORIA) | Truly On-The-Fly LTL Model Checking | null | Dans Tools and Algorithms for the Construction and Analysis of
Systems (TACAS 2005) | null | null | cs.LO | null | We propose a novel algorithm for automata-based LTL model checking that
interleaves the construction of the generalized B\"{u}chi automaton for the
negation of the formula and the emptiness check. Our algorithm first converts
the LTL formula into a linear weak alternating automaton; configurations of the
alternating automaton correspond to the locations of a generalized B\"{u}chi
automaton, and a variant of Tarjan's algorithm is used to decide the existence
of an accepting run of the product of the transition system and the automaton.
Because we avoid an explicit construction of the B\"{u}chi automaton, our
approach can yield significant improvements in runtime and memory, for large
LTL formulas. The algorithm has been implemented within the SPIN model checker,
and we present experimental results for some benchmark examples.
| [
{
"version": "v1",
"created": "Wed, 16 Nov 2005 12:56:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hammer",
"Moritz",
"",
"IFI-LMU"
],
[
"Knapp",
"Alexander",
"",
"IFI-LMU"
],
[
"Merz",
"Stephan",
"",
"INRIA Lorraine - LORIA"
]
] |
cs/0511062 | Liping Lu | Gerd Bumiller, Liping Lu (INRIA Lorraine - LORIA), Yeqiong Song (INRIA
Lorraine - LORIA) | Analytic performance comparison of routing protocols in master-slave PLC
networks | null | null | null | null | cs.NI | null | In the wide area master-slave PLC (powerline communication) system, the
source node cannot reach the destination node without packet relay. Due to the
time-variable attenuation in the powerline, the communication distance cannot
be defined. Two kind of dynamic repeater algorithms are developed, dynamic
source routing and flooding based routing. In this paper, we use analytic
approach to compare the performance of those two routing protocols. We give
formulas to calculate the average duration of a polling cycle for each
protocols. Then we present simulation results to bolster the results of our
analysis. We use three metrics, which are bandwidth consumed for routing
signaling, normalized routing load and average duration of a polling cycle to
evaluate those routing protocols.
| [
{
"version": "v1",
"created": "Wed, 16 Nov 2005 16:24:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bumiller",
"Gerd",
"",
"INRIA Lorraine - LORIA"
],
[
"Lu",
"Liping",
"",
"INRIA Lorraine - LORIA"
],
[
"Song",
"Yeqiong",
"",
"INRIA\n Lorraine - LORIA"
]
] |
cs/0511063 | Michele Finelli | Michele Finelli | Pathwords: a user-friendly schema for common passwords management | null | null | null | null | cs.CR | null | Many computer-based authentication schemata are based on pass- words. Logging
on a computer, reading email, accessing content on a web server are all
examples of applications where the identification of the user is usually
accomplished matching the data provided by the user with data known by the
application.
Such a widespread approach relies on some assumptions, whose satisfaction is
of foremost importance to guarantee the robustness of the solution. Some of
these assumptions, like having a "secure" chan- nel to transmit data, or having
sound algorithms to check the correct- ness of the data, are not addressed by
this paper. We will focus on two simple issues: the problem of using adequate
passwords and the problem of managing passwords.
The proposed solution, the pathword, is a method that guarantees:
1 that the passwords generated with the help of a pathword are adequate (i.e.
that they are not easy to guess),
2 that managing pathwords is more user friendly than managing passwords and
that pathwords are less amenable to problems typical of passwords.
| [
{
"version": "v1",
"created": "Wed, 16 Nov 2005 17:46:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Finelli",
"Michele",
""
]
] |
cs/0511064 | Alexander Evako | Alexander V. Evako | The consistency principle for a digitization procedure. An algorithm for
building normal digital spaces of continuous n-dimensional objects | 13 pages, 11 figures | null | null | null | cs.CV cs.DM | null | This paper considers conditions, which allow to preserve important
topological and geometric properties in the process of digitization. For this
purpose, we introduce a triplet {C,M,D} consisting of a continuous object C, an
intermediate model M, which is a collection of subregions whose union is C, a
digital model D, which is the intersection graph of M, and apply the
consistency principle and criteria of similarity to M in order to make its
mathematical structure consistent with the natural structure of D.
Specifically, this paper introduces a locally centered lump collection of
subregions and shows that for any locally centered lump cover of an
n-dimensional continuous manifold, the digital model of the manifold is a
digital normal n-dimensional space. In addition, we give examples of locally
centered lump tilings of two-manifolds. We propose an algorithm for
constructing normal digital models of continuous objects.
| [
{
"version": "v1",
"created": "Wed, 16 Nov 2005 20:33:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Evako",
"Alexander V.",
""
]
] |
cs/0511067 | Vedran Kordic | Dongqing He and Peisun Ma | Effects of Initial Stance of Quadruped Trotting on Walking Stability | null | null | null | null | cs.RO | null | It is very important for quadruped walking machine to keep its stability in
high speed walking. It has been indicated that moment around the supporting
diagonal line of quadruped in trotting gait largely influences walking
stability. In this paper, moment around the supporting diagonal line of
quadruped in trotting gait is modeled and its effects on body attitude are
analyzed. The degree of influence varies with different initial stances of
quadruped and we get the optimal initial stance of quadruped in trotting gait
with maximal walking stability. Simulation results are presented. Keywords:
quadruped, trotting, attitude, walking stability.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2005 14:39:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Dongqing",
""
],
[
"Ma",
"Peisun",
""
]
] |
cs/0511068 | Vedran Kordic | S. Heinrich, H. Durr, T. Hanel and J. Lassig | An Agent-based Manufacturing Management System for Production and
Logistics within Cross-Company Regional and National Production Networks | null | null | null | null | cs.RO | null | The goal is the development of a simultaneous, dynamic, technological as well
as logistical real-time planning and an organizational control of the
production by the production units themselves, working in the production
network under the use of Multi-Agent-Technology. The design of the
multi-agent-based manufacturing management system, the models of the single
agents, algorithms for the agent-based, decentralized dispatching of orders,
strategies and data management concepts as well as their integration into the
SCM, basing on the solution described, will be explained in the following.
Keywords: production engineering and management, dynamic manufacturing
planning and control, multi-agentsystems (MAS), supply-chain-management (SCM),
e-manufacturing
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2005 14:41:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heinrich",
"S.",
""
],
[
"Durr",
"H.",
""
],
[
"Hanel",
"T.",
""
],
[
"Lassig",
"J.",
""
]
] |
cs/0511069 | Vedran Kordic | R. Hedjar and P. Boucher | Nonlinear Receding-Horizon Control of Rigid Link Robot Manipulators | null | null | null | null | cs.RO | null | The approximate nonlinear receding-horizon control law is used to treat the
trajectory tracking control problem of rigid link robot manipulators. The
derived nonlinear predictive law uses a quadratic performance index of the
predicted tracking error and the predicted control effort. A key feature of
this control law is that, for their implementation, there is no need to perform
an online optimization, and asymptotic tracking of smooth reference
trajectories is guaranteed. It is shown that this controller achieves the
positions tracking objectives via link position measurements. The stability
convergence of the output tracking error to the origin is proved. To enhance
the robustness of the closed loop system with respect to payload uncertainties
and viscous friction, an integral action is introduced in the loop. A nonlinear
observer is used to estimate velocity. Simulation results for a two-link rigid
robot are performed to validate the performance of the proposed controller.
Keywords: receding-horizon control, nonlinear observer, robot manipulators,
integral action, robustness.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2005 14:42:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hedjar",
"R.",
""
],
[
"Boucher",
"P.",
""
]
] |
cs/0511071 | Francesco Capasso | Francesco Capasso | A polynomial-time heuristic for Circuit-SAT | 20 pages, 8 figures | null | null | null | cs.CC cs.DS | null | In this paper is presented an heuristic that, in polynomial time and space in
the input dimension, determines if a circuit describes a tautology or a
contradiction. If the circuit is neither a tautology nor a contradiction, then
the heuristic finds an assignment to the circuit inputs such that the circuit
is satisfied.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2005 20:23:46 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Nov 2005 21:56:11 GMT"
},
{
"version": "v3",
"created": "Wed, 23 Nov 2005 22:19:18 GMT"
},
{
"version": "v4",
"created": "Mon, 28 Nov 2005 19:52:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Capasso",
"Francesco",
""
]
] |
cs/0511073 | Eric Mjolsness | Eric Mjolsness | Stochastic Process Semantics for Dynamical Grammar Syntax: An Overview | Accepted for: Ninth International Symposium on Artificial
Intelligence and Mathematics, January 2006 | null | null | UCI ICS TR# 05-14 | cs.AI cs.LO nlin.AO | null | We define a class of probabilistic models in terms of an operator algebra of
stochastic processes, and a representation for this class in terms of
stochastic parameterized grammars. A syntactic specification of a grammar is
mapped to semantics given in terms of a ring of operators, so that grammatical
composition corresponds to operator addition or multiplication. The operators
are generators for the time-evolution of stochastic processes. Within this
modeling framework one can express data clustering models, logic programs,
ordinary and stochastic differential equations, graph grammars, and stochastic
chemical reaction kinetics. This mathematical formulation connects these
apparently distant fields to one another and to mathematical methods from
quantum field theory and operator algebra.
| [
{
"version": "v1",
"created": "Sun, 20 Nov 2005 00:42:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mjolsness",
"Eric",
""
]
] |
cs/0511075 | Vasant Honavar | Michael Terribilini, Jae-Hyung Lee, Changhui Yan, Robert L. Jernigan,
Susan Carpenter, Vasant Honavar, Drena Dobbs | Identifying Interaction Sites in "Recalcitrant" Proteins: Predicted
Protein and Rna Binding Sites in Rev Proteins of Hiv-1 and Eiav Agree with
Experimental Data | Pacific Symposium on Biocomputing, Hawaii, In press, Accepted, 2006 | null | null | null | cs.LG cs.AI | null | Protein-protein and protein nucleic acid interactions are vitally important
for a wide range of biological processes, including regulation of gene
expression, protein synthesis, and replication and assembly of many viruses. We
have developed machine learning approaches for predicting which amino acids of
a protein participate in its interactions with other proteins and/or nucleic
acids, using only the protein sequence as input. In this paper, we describe an
application of classifiers trained on datasets of well-characterized
protein-protein and protein-RNA complexes for which experimental structures are
available. We apply these classifiers to the problem of predicting protein and
RNA binding sites in the sequence of a clinically important protein for which
the structure is not known: the regulatory protein Rev, essential for the
replication of HIV-1 and other lentiviruses. We compare our predictions with
published biochemical, genetic and partial structural information for HIV-1 and
EIAV Rev and with our own published experimental mapping of RNA binding sites
in EIAV Rev. The predicted and experimentally determined binding sites are in
very good agreement. The ability to predict reliably the residues of a protein
that directly contribute to specific binding events - without the requirement
for structural information regarding either the protein or complexes in which
it participates - can potentially generate new disease intervention strategies.
| [
{
"version": "v1",
"created": "Mon, 21 Nov 2005 01:47:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Terribilini",
"Michael",
""
],
[
"Lee",
"Jae-Hyung",
""
],
[
"Yan",
"Changhui",
""
],
[
"Jernigan",
"Robert L.",
""
],
[
"Carpenter",
"Susan",
""
],
[
"Honavar",
"Vasant",
""
],
[
"Dobbs",
"Drena",
""
]
] |
cs/0511076 | Yves Laprie | Blaise Potard (INRIA Lorraine - LORIA), Yves Laprie (INRIA Lorraine -
LORIA) | Using phonetic constraints in acoustic-to-articulatory inversion | null | Proceedings of Interspeech, 9th European Conference on Speech
Communication and Technology (2005) 3217-3220 | null | null | cs.CL | null | The goal of this work is to recover articulatory information from the speech
signal by acoustic-to-articulatory inversion. One of the main difficulties with
inversion is that the problem is underdetermined and inversion methods
generally offer no guarantee on the phonetical realism of the inverse
solutions. A way to adress this issue is to use additional phonetic
constraints. Knowledge of the phonetic caracteristics of French vowels enable
the derivation of reasonable articulatory domains in the space of Maeda
parameters: given the formants frequencies (F1,F2,F3) of a speech sample, and
thus the vowel identity, an "ideal" articulatory domain can be derived. The
space of formants frequencies is partitioned into vowels, using either
speaker-specific data or generic information on formants. Then, to each
articulatory vector can be associated a phonetic score varying with the
distance to the "ideal domain" associated with the corresponding vowel.
Inversion experiments were conducted on isolated vowels and vowel-to-vowel
transitions. Articulatory parameters were compared with those obtained without
using these constraints and those measured from X-ray data.
| [
{
"version": "v1",
"created": "Mon, 21 Nov 2005 14:50:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Potard",
"Blaise",
"",
"INRIA Lorraine - LORIA"
],
[
"Laprie",
"Yves",
"",
"INRIA Lorraine -\n LORIA"
]
] |
cs/0511079 | Anne Bonneau | Jean-Baptiste Maj (LORIA), Anne Bonneau (LORIA), Dominique Fohr
(LORIA), Yves Laprie (LORIA) | An elitist approach for extracting automatically well-realized speech
sounds with high confidence | null | null | null | null | cs.CL | null | This paper presents an "elitist approach" for extracting automatically
well-realized speech sounds with high confidence. The elitist approach uses a
speech recognition system based on Hidden Markov Models (HMM). The HMM are
trained on speech sounds which are systematically well-detected in an iterative
procedure. The results show that, by using the HMM models defined in the
training phase, the speech recognizer detects reliably specific speech sounds
with a small rate of errors.
| [
{
"version": "v1",
"created": "Tue, 22 Nov 2005 07:06:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maj",
"Jean-Baptiste",
"",
"LORIA"
],
[
"Bonneau",
"Anne",
"",
"LORIA"
],
[
"Fohr",
"Dominique",
"",
"LORIA"
],
[
"Laprie",
"Yves",
"",
"LORIA"
]
] |
cs/0511080 | Valmir Barbosa | Alexandre O. Stauffer, Valmir C. Barbosa | A dissemination strategy for immunizing scale-free networks | null | Physical Review E 74 (2006), 056105 | 10.1103/PhysRevE.74.056105 | null | cs.NI | null | We consider the problem of distributing a vaccine for immunizing a scale-free
network against a given virus or worm. We introduce a new method, based on
vaccine dissemination, that seems to reflect more accurately what is expected
to occur in real-world networks. Also, since the dissemination is performed
using only local information, the method can be easily employed in practice.
Using a random-graph framework, we analyze our method both mathematically and
by means of simulations. We demonstrate its efficacy regarding the trade-off
between the expected number of nodes that receive the vaccine and the network's
resulting vulnerability to develop an epidemic as the virus or worm attempts to
infect one of its nodes. For some scenarios, the new method is seen to render
the network practically invulnerable to attacks while requiring only a small
fraction of the nodes to receive the vaccine.
| [
{
"version": "v1",
"created": "Tue, 22 Nov 2005 10:59:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stauffer",
"Alexandre O.",
""
],
[
"Barbosa",
"Valmir C.",
""
]
] |
cs/0511083 | Olivier Powell | Olivier Powell, Aubin Jarry, Pierre Leone, Jose Rolim | Gradient Based Routing in Wireless Sensor Networks: a Mixed Strategy | 4 pages, 2 figures | null | null | null | cs.DC | null | We show how recent theoretical advances for data-propagation in Wireless
Sensor Networks (WSNs) can be combined to improve gradient-based routing (GBR)
in Wireless Sensor Networks. We propose a mixed-strategy of direct transmission
and multi-hop propagation of data which improves the lifespan of WSNs by
reaching better energy-load-balancing amongst sensor nodes.
| [
{
"version": "v1",
"created": "Wed, 23 Nov 2005 18:13:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Powell",
"Olivier",
""
],
[
"Jarry",
"Aubin",
""
],
[
"Leone",
"Pierre",
""
],
[
"Rolim",
"Jose",
""
]
] |
cs/0511085 | Ron Cohen | R. A. Cohen | Proving that P is not equal to NP and that P is not equal to the
intersection of NP and co-NP | 9 pages ; 3 figures | null | null | null | cs.CC | null | The open question, P=NP?, was presented by Cook (1971). In this paper, a
proof that P is not equal to NP is presented. In addition, it is shown that P
is not equal to the intersection of NP and co-NP. Finally, the exact inclusion
relationships between the classes P, NP and co-NP are presented.
| [
{
"version": "v1",
"created": "Fri, 25 Nov 2005 15:23:18 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Nov 2005 14:58:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cohen",
"R. A.",
""
]
] |
cs/0511088 | Barak Pearlmutter | Barak A. Pearlmutter | Bounds on Query Convergence | 6 pages, 2 figures | null | null | null | cs.LG | null | The problem of finding an optimum using noisy evaluations of a smooth cost
function arises in many contexts, including economics, business, medicine,
experiment design, and foraging theory. We derive an asymptotic bound E[ (x_t -
x*)^2 ] >= O(1/sqrt(t)) on the rate of convergence of a sequence (x_0, x_1,
>...) generated by an unbiased feedback process observing noisy evaluations of
an unknown quadratic function maximised at x*. The bound is tight, as the proof
leads to a simple algorithm which meets it. We further establish a bound on the
total regret, E[ sum_{i=1..t} (x_i - x*)^2 ] >= O(sqrt(t)) These bounds may
impose practical limitations on an agent's performance, as O(eps^-4) queries
are made before the queries converge to x* with eps accuracy.
| [
{
"version": "v1",
"created": "Fri, 25 Nov 2005 15:57:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pearlmutter",
"Barak A.",
""
]
] |
cs/0511090 | Petra Hofstedt | Petra Hofstedt, Peter Pepper | Integration of Declarative and Constraint Programming | 30 pages, 9 figures, To appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.PL cs.AI | null | Combining a set of existing constraint solvers into an integrated system of
cooperating solvers is a useful and economic principle to solve hybrid
constraint problems. In this paper we show that this approach can also be used
to integrate different language paradigms into a unified framework.
Furthermore, we study the syntactic, semantic and operational impacts of this
idea for the amalgamation of declarative and constraint programming.
| [
{
"version": "v1",
"created": "Sun, 27 Nov 2005 14:58:22 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Jan 2006 15:48:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hofstedt",
"Petra",
""
],
[
"Pepper",
"Peter",
""
]
] |
cs/0511091 | Marc Schoenauer | Carlos Kavka (INRIA Futurs, UNSL-DI), Patricia Roggero (UNSL-DI), Marc
Schoenauer (INRIA Futurs) | Evolution of Voronoi based Fuzzy Recurrent Controllers | null | Dans GECCO 2005 | null | null | cs.AI | null | A fuzzy controller is usually designed by formulating the knowledge of a
human expert into a set of linguistic variables and fuzzy rules. Among the most
successful methods to automate the fuzzy controllers development process are
evolutionary algorithms. In this work, we propose the Recurrent Fuzzy Voronoi
(RFV) model, a representation for recurrent fuzzy systems. It is an extension
of the FV model proposed by Kavka and Schoenauer that extends the application
domain to include temporal problems. The FV model is a representation for fuzzy
controllers based on Voronoi diagrams that can represent fuzzy systems with
synergistic rules, fulfilling the $\epsilon$-completeness property and
providing a simple way to introduce a priory knowledge. In the proposed
representation, the temporal relations are embedded by including internal units
that provide feedback by connecting outputs to inputs. These internal units act
as memory elements. In the RFV model, the semantic of the internal units can be
specified together with the a priori rules. The geometric interpretation of the
rules allows the use of geometric variational operators during the evolution.
The representation and the algorithms are validated in two problems in the area
of system identification and evolutionary robotics.
| [
{
"version": "v1",
"created": "Mon, 28 Nov 2005 07:14:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kavka",
"Carlos",
"",
"INRIA Futurs, UNSL-DI"
],
[
"Roggero",
"Patricia",
"",
"UNSL-DI"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
]
] |
cs/0511099 | Na Li | Na Li and Wen-feng Qi | Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number
of Variables | null | null | null | null | cs.CR | null | To resist algebraic attack, a Boolean function should possess good algebraic
immunity (AI). Several papers constructed symmetric functions with the maximum
algebraic immunity $\lceil \frac{n}{2}\rceil $. In this correspondence we prove
that for each odd $n$, there is exactly one trivial balanced $n$-variable
symmetric Boolean function achieving the algebraic immunity $\lceil
\frac{n}{2}\rceil $. And we also obtain a necessary condition for the algebraic
normal form of a symmetric Boolean function with maximum algebraic immunity.
| [
{
"version": "v1",
"created": "Tue, 29 Nov 2005 11:42:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Na",
""
],
[
"Qi",
"Wen-feng",
""
]
] |
cs/0511105 | Todd Young | Erik M. Boczko, Todd R. Young | The Signed Distance Function: A New Tool for Binary Classification | 13 pages, 5 figures | null | null | null | cs.LG cs.CG | null | From a geometric perspective most nonlinear binary classification algorithms,
including state of the art versions of Support Vector Machine (SVM) and Radial
Basis Function Network (RBFN) classifiers, and are based on the idea of
reconstructing indicator functions. We propose instead to use reconstruction of
the signed distance function (SDF) as a basis for binary classification. We
discuss properties of the signed distance function that can be exploited in
classification algorithms. We develop simple versions of such classifiers and
test them on several linear and nonlinear problems. On linear tests accuracy of
the new algorithm exceeds that of standard SVM methods, with an average of 50%
fewer misclassifications. Performance of the new methods also matches or
exceeds that of standard methods on several nonlinear problems including
classification of benchmark diagnostic micro-array data sets.
| [
{
"version": "v1",
"created": "Wed, 30 Nov 2005 14:15:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boczko",
"Erik M.",
""
],
[
"Young",
"Todd R.",
""
]
] |
cs/0511106 | Sergiu Chelcea | Sergiu Theodor Chelcea (INRIA Rocquencourt / INRIA Sophia Antipolis),
Alzennyr Da Silva (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves
Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Doru Tanasa
(INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse (INRIA
Rocquencourt / INRIA Sophia Antipolis) | Benefits of InterSite Pre-Processing and Clustering Methods in
E-Commerce Domain | null | Dans Proceedings of the ECML/PKDD2005 Discovery Challenge, A
Collaborative Effort in Knowledge Discovery from Databases | null | null | cs.DB | null | This paper presents our preprocessing and clustering analysis on the
clickstream dataset proposed for the ECMLPKDD 2005 Discovery Challenge. The
main contributions of this article are double. First, after presenting the
clickstream dataset, we show how we build a rich data warehouse based an
advanced preprocesing. We take into account the intersite aspects in the given
ecommerce domain, which offers an interesting data structuration. A preliminary
statistical analysis based on time period clickstreams is given, emphasing the
importance of intersite user visits in such a context. Secondly, we describe
our crossed-clustering method which is applied on data generated from our data
warehouse. Our preliminary results are interesting and promising illustrating
the benefits of our WUM methods, even if more investigations are needed on the
same dataset.
| [
{
"version": "v1",
"created": "Wed, 30 Nov 2005 16:12:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chelcea",
"Sergiu Theodor",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Da Silva",
"Alzennyr",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Lechevallier",
"Yves",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Tanasa",
"Doru",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Trousse",
"Brigitte",
"",
"INRIA\n Rocquencourt / INRIA Sophia Antipolis"
]
] |
cs/0511107 | J. G. Esteve | J. G. Esteve and F. Falceto | Phase transition in the assignment problem for random matrices | 7 pages, 5 figures; accepted for publication in Europhys. Lett.
http://www.edpsciences.org/journal/index.cfm?edpsname=epl | null | 10.1209/epl/i2005-10296-6 | null | cs.CC cond-mat.stat-mech | null | We report an analytic and numerical study of a phase transition in a P
problem (the assignment problem) that separates two phases whose
representatives are the simple matching problem (an easy P problem) and the
traveling salesman problem (a NP-complete problem). Like other phase
transitions found in combinatoric problems (K-satisfiability, number
partitioning) this can help to understand the nature of the difficulties in
solving NP problems an to find more accurate algorithms for them.
| [
{
"version": "v1",
"created": "Wed, 30 Nov 2005 18:03:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Esteve",
"J. G.",
""
],
[
"Falceto",
"F.",
""
]
] |
cs/0511108 | Abdelhadi Benabdallah | A. Benabdallah and G. Radons | Parameter Estimation of Hidden Diffusion Processes: Particle Filter vs.
Modified Baum-Welch Algorithm | 15 pages, 3 figures, 2 tables | null | null | null | cs.DS cs.LG | null | We propose a new method for the estimation of parameters of hidden diffusion
processes. Based on parametrization of the transition matrix, the Baum-Welch
algorithm is improved. The algorithm is compared to the particle filter in
application to the noisy periodic systems. It is shown that the modified
Baum-Welch algorithm is capable of estimating the system parameters with better
accuracy than particle filters.
| [
{
"version": "v1",
"created": "Wed, 30 Nov 2005 20:23:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Benabdallah",
"A.",
""
],
[
"Radons",
"G.",
""
]
] |
cs/0512001 | Frank Ruskey | Jeremy Carroll (1), Frank Ruskey (2), Mark Weston (2) ((1) HP
Laboratories, Bristol, UK, (2) University of Victoria, Canada) | Which n-Venn diagrams can be drawn with convex k-gons? | 10 pages, 3 figures. To be published in Proceedings of the Second
International Workshop on Euler Diagrams (Euler 2005), Electronic Notes in
Theoretical Computer Science | null | null | null | cs.CG | null | We establish a new lower bound for the number of sides required for the
component curves of simple Venn diagrams made from polygons. Specifically, for
any n-Venn diagram of convex k-gons, we prove that k >= (2^n - 2 - n) / (n
(n-2)). In the process we prove that Venn diagrams of seven curves, simple or
not, cannot be formed from triangles. We then give an example achieving the new
lower bound of a (simple, symmetric) Venn diagram of seven quadrilaterals.
Previously Grunbaum had constructed a 7-Venn diagram of non-convex 5-gons
[``Venn Diagrams II'', Geombinatorics 2:25-31, 1992].
| [
{
"version": "v1",
"created": "Wed, 30 Nov 2005 23:30:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carroll",
"Jeremy",
""
],
[
"Ruskey",
"Frank",
""
],
[
"Weston",
"Mark",
""
]
] |
cs/0512002 | Vitorino Ramos Dr. | Vitorino Ramos, Carlos Fernandes, Agostinho C. Rosa | On Self-Regulated Swarms, Societal Memory, Speed and Dynamics | 11 pages, 8 figures,
http://alfa.ist.utl.pt/~cvrm/staff/vramos/refs_2005.html, KEYWORDS: Dynamic
Optimization, Dynamic Optimal Control problems, Swarm Intelligence,
Self-Organization, Societal Implicit Memory. Submitted to ALIFE-X, Int. Conf.
on the Simulation and Synthesis of Living Systems, Bloomington, Indiana, USA,
June 3-7, 2006 | null | null | null | cs.NE cs.AI | null | We propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the
advantageous characteristics of Swarm Intelligence as the emergence of a
societal environmental memory or cognitive map via collective pheromone laying
in the landscape (properly balancing the exploration/exploitation nature of our
dynamic search strategy), with a simple Evolutionary mechanism that trough a
direct reproduction procedure linked to local environmental features is able to
self-regulate the above exploratory swarm population, speeding it up globally.
In order to test his adaptive response and robustness, we have recurred to
different dynamic multimodal complex functions as well as to Dynamic
Optimization Control problems, measuring reaction speeds and performance. Final
comparisons were made with standard Genetic Algorithms (GAs), Bacterial
Foraging strategies (BFOA), as well as with recent Co-Evolutionary approaches.
SRS's were able to demonstrate quick adaptive responses, while outperforming
the results obtained by the other approaches. Additionally, some successful
behaviors were found. One of the most interesting illustrate that the present
SRS collective swarm of bio-inspired ant-like agents is able to track about 65%
of moving peaks traveling up to ten times faster than the velocity of a single
individual composing that precise swarm tracking system.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 03:10:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Fernandes",
"Carlos",
""
],
[
"Rosa",
"Agostinho C.",
""
]
] |
cs/0512003 | Vitorino Ramos Dr. | Vitorino Ramos, Carlos Fernandes, Agostinho C. Rosa | Societal Implicit Memory and his Speed on Tracking Extrema over Dynamic
Environments using Self-Regulatory Swarms | 20 pages, 25 figures, http://alfa.ist.utl.pt/~cvrm/staff/vramos .
Draft submitted to Journal of Systems Architecture, Farooq M. and Menezes R.
(Eds.), Special issue on Nature Inspired Applied Systems, Elsevier, 2006 | null | null | null | cs.MA cs.AI | null | In order to overcome difficult dynamic optimization and environment extrema
tracking problems, We propose a Self-Regulated Swarm (SRS) algorithm which
hybridizes the advantageous characteristics of Swarm Intelligence as the
emergence of a societal environmental memory or cognitive map via collective
pheromone laying in the landscape (properly balancing the
exploration/exploitation nature of our dynamic search strategy), with a simple
Evolutionary mechanism that trough a direct reproduction procedure linked to
local environmental features is able to self-regulate the above exploratory
swarm population, speeding it up globally. In order to test his adaptive
response and robustness, we have recurred to different dynamic multimodal
complex functions as well as to Dynamic Optimization Control problems,
measuring reaction speeds and performance. Final comparisons were made with
standard Genetic Algorithms (GAs), Bacterial Foraging strategies (BFOA), as
well as with recent Co-Evolutionary approaches. SRS's were able to demonstrate
quick adaptive responses, while outperforming the results obtained by the other
approaches. Additionally, some successful behaviors were found. One of the most
interesting illustrate that the present SRS collective swarm of bio-inspired
ant-like agents is able to track about 65% of moving peaks traveling up to ten
times faster than the velocity of a single individual composing that precise
swarm tracking system.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 04:09:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Fernandes",
"Carlos",
""
],
[
"Rosa",
"Agostinho C.",
""
]
] |
cs/0512004 | Vitorino Ramos Dr. | Carlos Fernandes, Vitorino Ramos and Agostinho C. Rosa | Self-Regulated Artificial Ant Colonies on Digital Image Habitats | 8 pages, 17 figures, full pictures in
http://alfa.ist.utl.pt/~cvrm/staff/vramos/Vramos-WCLC05b.pdf | in International Journal of Lateral Computing, IJLC, vol. 2 (1),
pp. 1-8, ISSN 0973-208X, Dec. 2005 | null | null | cs.MA cs.AI | null | Artificial life models, swarm intelligent and evolutionary computation
algorithms are usually built on fixed size populations. Some studies indicate
however that varying the population size can increase the adaptability of these
systems and their capability to react to changing environments. In this paper
we present an extended model of an artificial ant colony system designed to
evolve on digital image habitats. We will show that the present swarm can adapt
the size of the population according to the type of image on which it is
evolving and reacting faster to changing images, thus converging more rapidly
to the new desired regions, regulating the number of his image foraging agents.
Finally, we will show evidences that the model can be associated with the
Mathematical Morphology Watershed algorithm to improve the segmentation of
digital grey-scale images. KEYWORDS: Swarm Intelligence, Perception and Image
Processing, Pattern Recognition, Mathematical Morphology, Social Cognitive
Maps, Social Foraging, Self-Organization, Distributed Search.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 04:39:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fernandes",
"Carlos",
""
],
[
"Ramos",
"Vitorino",
""
],
[
"Rosa",
"Agostinho C.",
""
]
] |
cs/0512005 | Vitorino Ramos Dr. | Vitorino Ramos, Carlos Fernandes and Agostinho C. Rosa | On Ants, Bacteria and Dynamic Environments | 8 pages, 6 figures, full paper with pictures in
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_63.html, keywords: Swarm
Intelligence and Perception, Social Cognitive Maps, Social Foraging,
Self-Organization, Distributed Search and Optimization in Dynamic
Environments. In NCA-05, Natural Computing and Applications Workshop, IEEE
Computer Press, Timisoara, Romania, Sep. 25-29, 2005 | null | null | null | cs.DC | null | Wasps, bees, ants and termites all make effective use of their environment
and resources by displaying collective swarm intelligence. Termite colonies -
for instance - build nests with a complexity far beyond the comprehension of
the individual termite, while ant colonies dynamically allocate labor to
various vital tasks such as foraging or defense without any central
decision-making ability. Recent research suggests that microbial life can be
even richer: highly social, intricately networked, and teeming with
interactions, as found in bacteria. What strikes from these observations is
that both ant colonies and bacteria have similar natural mechanisms based on
Stigmergy and Self-Organization in order to emerge coherent and sophisticated
patterns of global behaviour. Keeping in mind the above characteristics we will
present a simple model to tackle the collective adaptation of a social swarm
based on real ant colony behaviors (SSA algorithm) for tracking extrema in
dynamic environments and highly multimodal complex functions described in the
well-know De Jong test suite. Then, for the purpose of comparison, a recent
model of artificial bacterial foraging (BFOA algorithm) based on similar
stigmergic features is described and analyzed. Final results indicate that the
SSA collective intelligence is able to cope and quickly adapt to unforeseen
situations even when over the same cooperative foraging period, the community
is requested to deal with two different and contradictory purposes, while
outperforming BFOA in adaptive speed.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 04:52:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Fernandes",
"Carlos",
""
],
[
"Rosa",
"Agostinho C.",
""
]
] |
cs/0512007 | Arindam Mitra | Arindam Mitra | Entangled messages | PDF, 2 Pages | null | null | null | cs.CR cs.IR | null | It is sometimes necessary to send copies of the same email to different
parties, but it is impossible to ensure that if one party reads the message the
other parties will bound to read it. We propose an entanglement based scheme
where if one party reads the message the other party will bound to read it
simultaneously.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 15:40:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mitra",
"Arindam",
""
]
] |
cs/0512008 | Joel Friedman | Joel Friedman | Cohomology in Grothendieck Topologies and Lower Bounds in Boolean
Complexity | 70 pages, abstract corrected and modified | null | null | null | cs.CC math.AG | null | This paper is motivated by questions such as P vs. NP and other questions in
Boolean complexity theory. We describe an approach to attacking such questions
with cohomology, and we show that using Grothendieck topologies and other ideas
from the Grothendieck school gives new hope for such an attack.
We focus on circuit depth complexity, and consider only finite topological
spaces or Grothendieck topologies based on finite categories; as such, we do
not use algebraic geometry or manifolds.
Given two sheaves on a Grothendieck topology, their "cohomological
complexity" is the sum of the dimensions of their Ext groups. We seek to model
the depth complexity of Boolean functions by the cohomological complexity of
sheaves on a Grothendieck topology. We propose that the logical AND of two
Boolean functions will have its corresponding cohomological complexity bounded
in terms of those of the two functions using ``virtual zero extensions.'' We
propose that the logical negation of a function will have its corresponding
cohomological complexity equal to that of the original function using duality
theory. We explain these approaches and show that they are stable under
pullbacks and base change. It is the subject of ongoing work to achieve AND and
negation bounds simultaneously in a way that yields an interesting depth lower
bound.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 22:40:27 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Dec 2005 21:25:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedman",
"Joel",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.