id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0510017
Svante Janson
Svante Janson and Wojciech Szpankowski
Partial fillup and search time in LC tries
13 pages
null
null
null
cs.DS math.PR
null
Andersson and Nilsson introduced in 1993 a level-compressed trie (in short: LC trie) in which a full subtree of a node is compressed to a single node of degree being the size of the subtree. Recent experimental results indicated a 'dramatic improvement' when full subtrees are replaced by partially filled subtrees. In this paper, we provide a theoretical justification of these experimental results showing, among others, a rather moderate improvement of the search time over the original LC tries. For such an analysis, we assume that n strings are generated independently by a binary memoryless source with p denoting the probability of emitting a 1. We first prove that the so called alpha-fillup level (i.e., the largest level in a trie with alpha fraction of nodes present at this level) is concentrated on two values with high probability. We give these values explicitly up to O(1), and observe that the value of alpha (strictly between 0 and 1) does not affect the leading term. This result directly yields the typical depth (search time) in the alpha-LC tries with p not equal to 1/2, which turns out to be C loglog n for an explicitly given constant C (depending on p but not on alpha). This should be compared with recently found typical depth in the original LC tries which is C' loglog n for a larger constant C'. The search time in alpha-LC tries is thus smaller but of the same order as in the original LC tries.
[ { "version": "v1", "created": "Thu, 6 Oct 2005 10:04:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Janson", "Svante", "" ], [ "Szpankowski", "Wojciech", "" ] ]
cs/0510018
Danilo Gligoroski
Danilo Gligoroski
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
Submitetd to conference
null
null
null
cs.CR cs.CC
null
In this paper we propose a definition and construction of a new family of one-way candidate functions ${\cal R}_N:Q^N \to Q^N$, where $Q=\{0,1,...,s-1\}$ is an alphabet with $s$ elements. Special instances of these functions can have the additional property to be permutations (i.e. one-way permutations). These one-way functions have the property that for achieving the security level of $2^n$ computations in order to invert them, only $n$ bits of input are needed. The construction is based on quasigroup string transformations. Since quasigroups in general do not have algebraic properties such as associativity, commutativity, neutral elements, inverting these functions seems to require exponentially many readings from the lookup table that defines them (a Latin Square) in order to check the satisfiability for the initial conditions, thus making them natural candidates for one-way functions.
[ { "version": "v1", "created": "Fri, 7 Oct 2005 00:29:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Gligoroski", "Danilo", "" ] ]
cs/0510019
Panigrahy Rina
Rina Panigrahy
Entropy based Nearest Neighbor Search in High Dimensions
null
null
null
null
cs.DS
null
In this paper we study the problem of finding the approximate nearest neighbor of a query point in the high dimensional space, focusing on the Euclidean space. The earlier approaches use locality-preserving hash functions (that tend to map nearby points to the same value) to construct several hash tables to ensure that the query point hashes to the same bucket as its nearest neighbor in at least one table. Our approach is different -- we use one (or a few) hash table and hash several randomly chosen points in the neighborhood of the query point showing that at least one of them will hash to the bucket containing its nearest neighbor. We show that the number of randomly chosen points in the neighborhood of the query point $q$ required depends on the entropy of the hash value $h(p)$ of a random point $p$ at the same distance from $q$ at its nearest neighbor, given $q$ and the locality preserving hash function $h$ chosen randomly from the hash family. Precisely, we show that if the entropy $I(h(p)|q,h) = M$ and $g$ is a bound on the probability that two far-off points will hash to the same bucket, then we can find the approximate nearest neighbor in $O(n^\rho)$ time and near linear $\tilde O(n)$ space where $\rho = M/\log(1/g)$. Alternatively we can build a data structure of size $\tilde O(n^{1/(1-\rho)})$ to answer queries in $\tilde O(d)$ time. By applying this analysis to the locality preserving hash functions in and adjusting the parameters we show that the $c$ nearest neighbor can be computed in time $\tilde O(n^\rho)$ and near linear space where $\rho \approx 2.06/c$ as $c$ becomes large.
[ { "version": "v1", "created": "Fri, 7 Oct 2005 00:55:06 GMT" }, { "version": "v2", "created": "Fri, 4 Nov 2005 16:55:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Panigrahy", "Rina", "" ] ]
cs/0510020
Thierry Poibeau
Thierry Poibeau (LIPN)
Sur le statut r\'{e}f\'{e}rentiel des entit\'{e}s nomm\'{e}es
11 pages
Conf\'{e}rence Traitement Automatique des Langues 2005, France (2005)
null
null
cs.AI cs.IR
null
We show in this paper that, on the one hand, named entities can be designated using different denominations and that, on the second hand, names denoting named entities are polysemous. The analysis cannot be limited to reference resolution but should take into account naming strategies, which are mainly based on two linguistic operations: synecdoche and metonymy. Lastly, we present a model that explicitly represents the different denominations in discourse, unifying the way to represent linguistic knowledge and world knowledge.
[ { "version": "v1", "created": "Fri, 7 Oct 2005 17:39:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Poibeau", "Thierry", "", "LIPN" ] ]
cs/0510022
Sam Bretheim
Sam Bretheim
Cryptographic Authentication of Navigation Protocols
12 pages
null
null
null
cs.CR
null
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
[ { "version": "v1", "created": "Sun, 9 Oct 2005 02:39:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Bretheim", "Sam", "" ] ]
cs/0510024
David Eppstein
David Eppstein, Michael T. Goodrich, and Jeremy Yu Meng
Delta-confluent Drawings
14 pages, 8 figures. A preliminary version of this work was presented at the 13th Int. Symp. Graph Drawing, Limerick, Ireland, September 2005
null
null
null
cs.CG
null
We generalize the tree-confluent graphs to a broader class of graphs called Delta-confluent graphs. This class of graphs and distance-hereditary graphs, a well-known class of graphs, coincide. Some results about the visualization of Delta-confluent graphs are also given.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 00:47:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Meng", "Jeremy Yu", "" ] ]
cs/0510025
Thierry Despeyroux
Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis)
Practical Semantic Analysis of Web Sites and Documents
null
null
null
null
cs.IR
null
As Web sites are now ordinary products, it is necessary to explicit the notion of quality of a Web site. The quality of a site may be linked to the easiness of accessibility and also to other criteria such as the fact that the site is up to date and coherent. This last quality is difficult to insure because sites may be updated very frequently, may have many authors, may be partially generated and in this context proof-reading is very difficult. The same piece of information may be found in different occurrences, but also in data or meta-data, leading to the need for consistency checking. In this paper we make a parallel between programs and Web sites. We present some examples of semantic constraints that one would like to specify (constraints between the meaning of categories and sub-categories in a thematic directory, consistency between the organization chart and the rest of the site in an academic site). We present quickly the Natural Semantics, a way to specify the semantics of programming languages that inspires our works. Then we propose a specification language for semantic constraints in Web sites that, in conjunction with the well known ``make'' program, permits to generate some site verification tools by compiling the specification into Prolog code. We apply our method to a large XML document which is the scientific part of our institute activity report, tracking errors or inconsistencies and also constructing some indicators that can be used by the management of the institute.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 08:40:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Despeyroux", "Thierry", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ] ]
cs/0510027
Alexandre d'Aspremont
Alexandre d'Aspremont
A Market Test for the Positivity of Arrow-Debreu Prices
New version, fixes a few minor errors and typos
null
null
null
cs.CE
null
We derive tractable necessary and sufficient conditions for the absence of buy-and-hold arbitrage opportunities in a perfectly liquid, one period market. We formulate the positivity of Arrow-Debreu prices as a generalized moment problem to show that this no arbitrage condition is equivalent to the positive semidefiniteness of matrices formed by the market price of tradeable securities and their products. We apply this result to a market with multiple assets and basket call options.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 13:40:17 GMT" }, { "version": "v2", "created": "Thu, 15 Jun 2006 17:05:08 GMT" } ]
2007-05-23T00:00:00
[ [ "d'Aspremont", "Alexandre", "" ] ]
cs/0510028
Victor Grishchenko
Victor S. Grishchenko
Geo-aggregation permits low stretch and routing tables of logarithmical size
6 pages
null
null
null
cs.NI
null
This article first addresses applicability of Euclidean models to the domain of Internet routing. Those models are found (limitedly) applicable. Then a simplistic model of routing is constructed for Euclidean plane densely covered with points-routers. The model guarantees low stretch and logarithmical size of routing tables at any node. The paper concludes with a discussion on applicability of the model to real-world Internet routing.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 16:20:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Grishchenko", "Victor S.", "" ] ]
cs/0510031
Constantinos Daskalakis
Constantinos Daskalakis
Computing Pure Nash Equilibria via Markov Random Fields
null
null
null
null
cs.GT
null
In this paper we present a novel generic mapping between Graphical Games and Markov Random Fields so that pure Nash equilibria in the former can be found by statistical inference on the latter. Thus, the problem of deciding whether a graphical game has a pure Nash equilibrium, a well-known intractable problem, can be attacked by well-established algorithms such as Belief Propagation, Junction Trees, Markov Chain Monte Carlo and Simulated Annealing. Large classes of graphical games become thus tractable, including all classes already known, but also new classes such as the games with O(log n) treewidth.
[ { "version": "v1", "created": "Thu, 13 Oct 2005 04:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Daskalakis", "Constantinos", "" ] ]
cs/0510036
Jan Chomicki
Jan Chomicki
Semantic Optimization Techniques for Preference Queries
null
null
null
null
cs.DB cs.AI cs.LO
null
Preference queries are relational algebra or SQL queries that contain occurrences of the winnow operator ("find the most preferred tuples in a given relation"). Such queries are parameterized by specific preference relations. Semantic optimization techniques make use of integrity constraints holding in the database. In the context of semantic optimization of preference queries, we identify two fundamental properties: containment of preference relations relative to integrity constraints and satisfaction of order axioms relative to integrity constraints. We show numerous applications of those notions to preference query evaluation and optimization. As integrity constraints, we consider constraint-generating dependencies, a class generalizing functional dependencies. We demonstrate that the problems of containment and satisfaction of order axioms can be captured as specific instances of constraint-generating dependency entailment. This makes it possible to formulate necessary and sufficient conditions for the applicability of our techniques as constraint validity problems. We characterize the computational complexity of such problems.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 13:25:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Chomicki", "Jan", "" ] ]
cs/0510037
Rokia Bendaoud
Rokia Bendaoud (INRIA Lorraine - LORIA), Yannick Toussaint (INRIA Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA)
Hi\'{e}rarchisation des r\`{e}gles d'association en fouille de textes
null
null
null
null
cs.IR cs.AI
null
Extraction of association rules is widely used as a data mining method. However, one of the limit of this approach comes from the large number of extracted rules and the difficulty for a human expert to deal with the totality of these rules. We propose to solve this problem by structuring the set of rules into hierarchy. The expert can then therefore explore the rules, access from one rule to another one more general when we raise up in the hierarchy, and in other hand, or a more specific rules. Rules are structured at two levels. The global level aims at building a hierarchy from the set of rules extracted. Thus we define a first type of rule-subsomption relying on Galois lattices. The second level consists in a local and more detailed analysis of each rule. It generate for a given rule a set of generalization rules structured into a local hierarchy. This leads to the definition of a second type of subsomption. This subsomption comes from inductive logic programming and integrates a terminological model.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 14:24:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Bendaoud", "Rokia", "", "INRIA Lorraine - LORIA" ], [ "Toussaint", "Yannick", "", "INRIA\n Lorraine - LORIA" ], [ "Napoli", "Amedeo", "", "INRIA Lorraine - LORIA" ] ]
cs/0510039
Sandor P. Fekete
Christophe Bobda, Ali Ahmadinia, Mateusz Majer, Juergen Teich, Sandor P. Fekete, Jan van der Veen
DyNoC: A Dynamic Infrastructure for Communication in Dynamically Reconfigurable Devices
9 pages, 7 figures, 1 table, Latex, to appear in 15th International Conference on Field-Programmable Logic and Application
null
null
null
cs.AR
null
A new paradigm to support the communication among modules dynamically placed on a reconfigurable device at run-time is presented. Based on the network on chip (NoC) infrastructure, we developed a dynamic communication infrastructure as well as routing methodologies capable to handle routing in a NoC with obstacles created by dynamically placed components. We prove the unrestricted reachability of components and pins, the deadlock-freeness and we finally show the feasibility of our approach by means on real life example applications.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 22:03:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Bobda", "Christophe", "" ], [ "Ahmadinia", "Ali", "" ], [ "Majer", "Mateusz", "" ], [ "Teich", "Juergen", "" ], [ "Fekete", "Sandor P.", "" ], [ "van der Veen", "Jan", "" ] ]
cs/0510042
David Naccache
David Naccache
Secure and {\sl Practical} Identity-Based Encryption
null
null
null
null
cs.CR
null
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In essence, the new scheme divides Waters' public key size by a factor $\ell$ at the cost of (negligibly) reducing security by $\ell$ bits. Therefore, our construction settles an open question asked by Waters and constitutes the first fully secure {\sl practical} Identity-Based Encryption scheme
[ { "version": "v1", "created": "Sat, 15 Oct 2005 11:08:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Naccache", "David", "" ] ]
cs/0510046
Dmitry Mogilevsky
Dmitry Mogilevsky, Adam Lee, William Yurcik
Defining a Comprehensive Threat Model for High Performance Computational Clusters
null
null
null
null
cs.CR cs.DC
null
Over the past decade, high performance computational (HPC) clusters have become mainstream in academic and industrial settings as accessible means of computation. Throughout their proliferation, HPC security has been a secondary concern to performance. It is evident, however, that ensuring HPC security presents different challenges than the ones faced when dealing with traditional networks. To design suitable security measures for high performance computing, it is necessary to first realize the threats faced by such an environment. This task can be accomplished by the means of constructing a comprehensive threat model. To our knowledge, no such threat model exists with regards to Cluster Computing. In this paper, we explore the unique challenges of securing HPCs and propose a threat model based on the classical Confidentiality, Integrity and Availability security principles.
[ { "version": "v1", "created": "Sun, 16 Oct 2005 23:32:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Mogilevsky", "Dmitry", "" ], [ "Lee", "Adam", "" ], [ "Yurcik", "William", "" ] ]
cs/0510048
Sandor P. Fekete
Alexander Kroeller and Sandor P. Fekete and Dennis Pfisterer and Stefan Fischer
Deterministic boundary recognition and topology extraction for large sensor networks
10 pages, 9 figures, Latex, to appear in Symposium on Discrete Algorithms (SODA 2006)
null
null
null
cs.DC cs.CG
null
We present a new framework for the crucial challenge of self-organization of a large sensor network. The basic scenario can be described as follows: Given a large swarm of immobile sensor nodes that have been scattered in a polygonal region, such as a street network. Nodes have no knowledge of size or shape of the environment or the position of other nodes. Moreover, they have no way of measuring coordinates, geometric distances to other nodes, or their direction. Their only way of interacting with other nodes is to send or to receive messages from any node that is within communication range. The objective is to develop algorithms and protocols that allow self-organization of the swarm into large-scale structures that reflect the structure of the street network, setting the stage for global routing, tracking and guiding algorithms.
[ { "version": "v1", "created": "Mon, 17 Oct 2005 12:23:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Kroeller", "Alexander", "" ], [ "Fekete", "Sandor P.", "" ], [ "Pfisterer", "Dennis", "" ], [ "Fischer", "Stefan", "" ] ]
cs/0510050
Gilles Kassel
Gilles Kassel (LaRIA)
Integration of the DOLCE top-level ontology into the OntoSpec methodology
null
null
null
LRR-2005-08
cs.AI
null
This report describes a new version of the OntoSpec methodology for ontology building. Defined by the LaRIA Knowledge Engineering Team (University of Picardie Jules Verne, Amiens, France), OntoSpec aims at helping builders to model ontological knowledge (upstream of formal representation). The methodology relies on a set of rigorously-defined modelling primitives and principles. Its application leads to the elaboration of a semi-informal ontology, which is independent of knowledge representation languages. We recently enriched the OntoSpec methodology by endowing it with a new resource, the DOLCE top-level ontology defined at the LOA (IST-CNR, Trento, Italy). The goal of this integration is to provide modellers with additional help in structuring application ontologies, while maintaining independence vis-\`{a}-vis formal representation languages. In this report, we first provide an overview of the OntoSpec methodology's general principles and then describe the DOLCE re-engineering process. A complete version of DOLCE-OS (i.e. a specification of DOLCE in the semi-informal OntoSpec language) is presented in an appendix.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 08:32:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Kassel", "Gilles", "", "LaRIA" ] ]
cs/0510051
Gianluca Argentini
Gianluca Argentini
Numerical resolution of some BVP using Bernstein polynomials
7 pages, 3 figures
Posted since 2005-11-29 at Applied Mathematics E-Notes, http://www.math.nthu.edu.tw/~amen/
null
null
cs.NA cs.MS math.CA physics.comp-ph
null
In this work we present a method, based on the use of Bernstein polynomials, for the numerical resolution of some boundary values problems. The computations have not need of particular approximations of derivatives, such as finite differences, or particular techniques, such as finite elements. Also, the method doesn't require the use of matrices, as in resolution of linear algebraic systems, nor the use of like-Newton algorithms, as in resolution of non linear sets of equations. An initial equation is resolved only once, then the method is based on iterated evaluations of appropriate polynomials.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 09:55:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0510052
Victor Grishchenko
Victor S. Grishchenko
Remarks on "Toward Compact Interdomain Routing"
null
null
null
null
cs.NI
null
This paper critically examines some propositions and arguments of cs.NI/0508021 regarding applicability of hierarchical routing and perspectives of compact routing. Arguments against the former are found to be inaccurate while the latter is found to be equivalent to well-known deployed solutions. Also, multiple (stacked) application of compact-routing solutions is found to be equivalent to hierarchical routing.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 13:01:08 GMT" }, { "version": "v2", "created": "Thu, 20 Oct 2005 15:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Grishchenko", "Victor S.", "" ] ]
cs/0510053
Martin Kutz
Martin Kutz
A pair of trees without a simultaneous geometric embedding in the plane
This paper has been withdrawn by the author because it had turned out that the result was already known before
null
null
null
cs.CG
null
Any planar graph has a crossing-free straight-line drawing in the plane. A simultaneous geometric embedding of two n-vertex graphs is a straight-line drawing of both graphs on a common set of n points, such that the edges withing each individual graph do not cross. We consider simultaneous embeddings of two labeled trees, with predescribed vertex correspondences, and present an instance of such a pair that cannot be embedded. Further we provide an example of a planar graph that cannot be embedded together with a path when vertex correspondences are given.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 18:26:00 GMT" }, { "version": "v2", "created": "Tue, 1 Nov 2005 13:14:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Kutz", "Martin", "" ] ]
cs/0510054
Le Zhao Mr.
Le Zhao, Min Zhang, Shaoping Ma
The Nature of Novelty Detection
This paper pointed out the future direction for novelty detection research. 37 pages, double spaced version
null
null
null
cs.IR cs.CL
null
Sentence level novelty detection aims at reducing redundant sentences from a sentence list. In the task, sentences appearing later in the list with no new meanings are eliminated. Aiming at a better accuracy for detecting redundancy, this paper reveals the nature of the novelty detection task currently overlooked by the Novelty community $-$ Novelty as a combination of the partial overlap (PO, two sentences sharing common facts) and complete overlap (CO, the first sentence covers all the facts of the second sentence) relations. By formalizing novelty detection as a combination of the two relations between sentences, new viewpoints toward techniques dealing with Novelty are proposed. Among the methods discussed, the similarity, overlap, pool and language modeling approaches are commonly used. Furthermore, a novel approach, selected pool method is provided, which is immediate following the nature of the task. Experimental results obtained on all the three currently available novelty datasets showed that selected pool is significantly better or no worse than the current methods. Knowledge about the nature of the task also affects the evaluation methodologies. We propose new evaluation measures for Novelty according to the nature of the task, as well as possible directions for future study.
[ { "version": "v1", "created": "Wed, 19 Oct 2005 14:56:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhao", "Le", "" ], [ "Zhang", "Min", "" ], [ "Ma", "Shaoping", "" ] ]
cs/0510056
Jackie (Jianhong) Shen
Yoon-Mo Jung and Jianhong Shen
First-Order Modeling and Stability Analysis of Illusory Contours
21 pages
null
null
null
cs.CV cs.AI
null
In visual cognition, illusions help elucidate certain intriguing latent perceptual functions of the human vision system, and their proper mathematical modeling and computational simulation are therefore deeply beneficial to both biological and computer vision. Inspired by existent prior works, the current paper proposes a first-order energy-based model for analyzing and simulating illusory contours. The lower complexity of the proposed model facilitates rigorous mathematical analysis on the detailed geometric structures of illusory contours. After being asymptotically approximated by classical active contours, the proposed model is then robustly computed using the celebrated level-set method of Osher and Sethian (J. Comput. Phys., 79:12-49, 1988) with a natural supervising scheme. Potential cognitive implications of the mathematical results are addressed, and generic computational examples are demonstrated and discussed.
[ { "version": "v1", "created": "Wed, 19 Oct 2005 20:44:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Jung", "Yoon-Mo", "" ], [ "Shen", "Jianhong", "" ] ]
cs/0510059
Arnaud De La Fortelle
Michel Parent (INRIA Rocquencourt), Arnaud De La Fortelle (INRIA Rocquencourt)
Cybercars : Past, Present and Future of the Technology
null
Dans ITS World Congress 2005
null
null
cs.RO
null
Automobile has become the dominant transport mode in the world in the last century. In order to meet a continuously growing demand for transport, one solution is to change the control approach for vehicle to full driving automation, which removes the driver from the control loop to improve efficiency and reduce accidents. Recent work shows that there are several realistic paths towards this deployment : driving assistance on passenger cars, automated commercial vehicles on dedicated infrastructures, and new forms of urban transport (car-sharing and cybercars). Cybercars have already been put into operation in Europe, and it seems that this approach could lead the way towards full automation on most urban, and later interurban infrastructures. The European project CyberCars has brought many improvements in the technology needed to operate cybercars over the last three years. A new, larger European project is now being prepared to carry this work further in order to meet more ambitious objectives in terms of safety and efficiency. This paper will present past and present technologies and will focus on the future developments.
[ { "version": "v1", "created": "Thu, 20 Oct 2005 15:03:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Parent", "Michel", "", "INRIA Rocquencourt" ], [ "De La Fortelle", "Arnaud", "", "INRIA\n Rocquencourt" ] ]
cs/0510062
Jamal Saboune
Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA)
Using Interval Particle Filtering for Marker less 3D Human Motion Capture
null
null
null
null
cs.AI
null
In this paper we present a new approach for marker less human motion capture from conventional camera feeds. The aim of our study is to recover 3D positions of key points of the body that can serve for gait analysis. Our approach is based on foreground segmentation, an articulated body model and particle filters. In order to be generic and simple no restrictive dynamic modelling was used. A new modified particle filtering algorithm was introduced. It is used efficiently to search the model configuration space. This new algorithm which we call Interval Particle Filtering reorganizes the configurations search space in an optimal deterministic way and proved to be efficient in tracking natural human movement. Results for human motion capture from a single camera are presented and compared to results obtained from a marker based system. The system proved to be able to track motion successfully even in partial occlusions.
[ { "version": "v1", "created": "Fri, 21 Oct 2005 13:45:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Saboune", "Jamal", "", "INRIA Lorraine - LORIA" ], [ "Charpillet", "François", "", "INRIA\n Lorraine - LORIA" ] ]
cs/0510063
Jamal Saboune
Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA)
Markerless Human Motion Capture for Gait Analysis
null
null
null
null
cs.AI
null
The aim of our study is to detect balance disorders and a tendency towards the falls in the elderly, knowing gait parameters. In this paper we present a new tool for gait analysis based on markerless human motion capture, from camera feeds. The system introduced here, recovers the 3D positions of several key points of the human body while walking. Foreground segmentation, an articulated body model and particle filtering are basic elements of our approach. No dynamic model is used thus this system can be described as generic and simple to implement. A modified particle filtering algorithm, which we call Interval Particle Filtering, is used to reorganise and search through the model's configurations search space in a deterministic optimal way. This algorithm was able to perform human movement tracking with success. Results from the treatment of a single cam feeds are shown and compared to results obtained using a marker based human motion capture system.
[ { "version": "v1", "created": "Fri, 21 Oct 2005 13:45:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Saboune", "Jamal", "", "INRIA Lorraine - LORIA" ], [ "Charpillet", "François", "", "INRIA\n Lorraine - LORIA" ] ]
cs/0510065
Aneta Zwierko
Adam Wierzbicki, Aneta Zwierko and Zbigniew Kotulski
A new authentication protocol for revocable anonymity in ad-hoc networks
8 pages, 8 figures, this an extended version of paper accepted for IASTED conference CNIS'2005
null
null
null
cs.CR cs.DC cs.NI
null
This paper describes a new protocol for authentication in ad-hoc networks. The protocol has been designed to meet specialized requirements of ad-hoc networks, such as lack of direct communication between nodes or requirements for revocable anonymity. At the same time, a ad-hoc authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. The article analyzes existing authentication methods based on the Public Key Infrastructure, and finds that they have several drawbacks in ad-hoc networks. Therefore, a new authentication protocol, basing on established cryptographic primitives (Merkle's puzzles and zero-knowledge proofs) is proposed. The protocol is studied for a model ad-hoc chat application that provides private conversations.
[ { "version": "v1", "created": "Sat, 22 Oct 2005 11:51:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Wierzbicki", "Adam", "" ], [ "Zwierko", "Aneta", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0510073
Christian Attiogb
Christian Attiogbe
Semantic Embedding of Petri Nets into Event-B
16 pages, 3 figures
null
null
null
cs.LO
null
We present an embedding of Petri nets into B abstract systems. The embedding is achieved by translating both the static structure (modelling aspect) and the evolution semantics of Petri nets. The static structure of a Petri-net is captured within a B abstract system through a graph structure. This abstract system is then included in another abstract system which captures the evolution semantics of Petri-nets. The evolution semantics results in some B events depending on the chosen policies: basic nets or high level Petri nets. The current embedding enables one to use conjointly Petri nets and Event-B in the same system development, but at different steps and for various analysis.
[ { "version": "v1", "created": "Mon, 24 Oct 2005 09:17:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Attiogbe", "Christian", "" ] ]
cs/0510074
Riccardo Pucella
Matthew Fluet, Riccardo Pucella
Practical Datatype Specializations with Phantom Types and Recursion Schemes
25 pages. Appeared in the Proc. of the 2005 ACM SIGPLAN Workshop on ML
null
null
null
cs.PL
null
Datatype specialization is a form of subtyping that captures program invariants on data structures that are expressed using the convenient and intuitive datatype notation. Of particular interest are structural invariants such as well-formedness. We investigate the use of phantom types for describing datatype specializations. We show that it is possible to express statically-checked specializations within the type system of Standard ML. We also show that this can be done in a way that does not lose useful programming facilities such as pattern matching in case expressions.
[ { "version": "v1", "created": "Mon, 24 Oct 2005 16:27:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Fluet", "Matthew", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0510076
Olivier Pauplin
Olivier Pauplin (INRIA Rocquencourt), Jean Louchet (INRIA Rocquencourt), Evelyne Lutton (INRIA Rocquencourt), Michel Parent (INRIA Rocquencourt)
Applying Evolutionary Optimisation to Robot Obstacle Avoidance
null
Dans ISCIIA 2004
null
null
cs.AI cs.RO
null
This paper presents an artificial evolutionbased method for stereo image analysis and its application to real-time obstacle detection and avoidance for a mobile robot. It uses the Parisian approach, which consists here in splitting the representation of the robot's environment into a large number of simple primitives, the "flies", which are evolved following a biologically inspired scheme and give a fast, low-cost solution to the obstacle detection problem in mobile robotics.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 07:07:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Pauplin", "Olivier", "", "INRIA Rocquencourt" ], [ "Louchet", "Jean", "", "INRIA\n Rocquencourt" ], [ "Lutton", "Evelyne", "", "INRIA Rocquencourt" ], [ "Parent", "Michel", "", "INRIA\n Rocquencourt" ] ]
cs/0510079
Riccardo Pucella
Joseph Y. Halpern, Riccardo Pucella
Evidence with Uncertain Likelihoods
21 pages. A preliminary version appeared in the Proceedings of UAI'05
null
null
null
cs.AI
null
An agent often has a number of hypotheses, and must choose among them based on observations, or outcomes of experiments. Each of these observations can be viewed as providing evidence for or against various hypotheses. All the attempts to formalize this intuition up to now have assumed that associated with each hypothesis h there is a likelihood function \mu_h, which is a probability measure that intuitively describes how likely each observation is, conditional on h being the correct hypothesis. We consider an extension of this framework where there is uncertainty as to which of a number of likelihood functions is appropriate, and discuss how one formal approach to defining evidence, which views evidence as a function from priors to posteriors, can be generalized to accommodate this uncertainty.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 21:15:31 GMT" }, { "version": "v2", "created": "Thu, 3 Aug 2006 17:34:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0510080
Joseph Y. Halpern
Peter D. Grunwald and Joseph Y. Halpern
When Ignorance is Bliss
In Proceedings of the Twentieth Conference on Uncertainty in AI, 2004, pp. 226-234
null
null
null
cs.AI cs.LG
null
It is commonly-accepted wisdom that more information is better, and that information should never be ignored. Here we argue, using both a Bayesian and a non-Bayesian analysis, that in some situations you are better off ignoring information if your uncertainty is represented by a set of probability measures. These include situations in which the information is relevant for the prediction task at hand. In the non-Bayesian analysis, we show how ignoring information avoids dilation, the phenomenon that additional pieces of information sometimes lead to an increase in uncertainty. In the Bayesian analysis, we show that for small sample sizes and certain prediction tasks, the Bayesian posterior based on a noninformative prior yields worse predictions than simply ignoring the given information.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 22:14:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Grunwald", "Peter D.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/0510083
Nizar Kerkeni
Nizar Kerkeni (TIM), Frederic Alexandre (CORTEX), Mohamed Hedi Bedoui (TIM), Laurent Bougrain (CORTEX), Mohamed Dogui (SAHLOUL)
Neuronal Spectral Analysis of EEG and Expert Knowledge Integration for Automatic Classification of Sleep Stages
null
null
null
null
cs.AI
null
Being able to analyze and interpret signal coming from electroencephalogram (EEG) recording can be of high interest for many applications including medical diagnosis and Brain-Computer Interfaces. Indeed, human experts are today able to extract from this signal many hints related to physiological as well as cognitive states of the recorded subject and it would be very interesting to perform such task automatically but today no completely automatic system exists. In previous studies, we have compared human expertise and automatic processing tools, including artificial neural networks (ANN), to better understand the competences of each and determine which are the difficult aspects to integrate in a fully automatic system. In this paper, we bring more elements to that study in reporting the main results of a practical experiment which was carried out in an hospital for sleep pathology study. An EEG recording was studied and labeled by a human expert and an ANN. We describe here the characteristics of the experiment, both human and neuronal procedure of analysis, compare their performances and point out the main limitations which arise from this study.
[ { "version": "v1", "created": "Wed, 26 Oct 2005 14:47:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Kerkeni", "Nizar", "", "TIM" ], [ "Alexandre", "Frederic", "", "CORTEX" ], [ "Bedoui", "Mohamed Hedi", "", "TIM" ], [ "Bougrain", "Laurent", "", "CORTEX" ], [ "Dogui", "Mohamed", "", "SAHLOUL" ] ]
cs/0510084
Michel Fliess
Michel Fliess
R\'{e}flexions sur la question fr\'{e}quentielle en traitement du signal
null
null
null
null
cs.CE cs.IR math-ph math.MP math.SP
null
New definitions are suggested for frequencies which may be instantaneous or not. The Heisenberg-Gabor inequality and the Shannon sampling theorem are briefly discussed.
[ { "version": "v1", "created": "Wed, 26 Oct 2005 14:49:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Fliess", "Michel", "" ] ]
cs/0510086
Krishnaram Kenthapadi
K. Kenthapadi and R. Panigrahy
Balanced Allocation on Graphs
null
null
null
null
cs.DS
null
In this paper, we study the two choice balls and bins process when balls are not allowed to choose any two random bins, but only bins that are connected by an edge in an underlying graph. We show that for $n$ balls and $n$ bins, if the graph is almost regular with degree $n^\epsilon$, where $\epsilon$ is not too small, the previous bounds on the maximum load continue to hold. Precisely, the maximum load is $\log \log n + O(1/\epsilon) + O(1)$. For general $\Delta$-regular graphs, we show that the maximum load is $\log\log n + O(\frac{\log n}{\log (\Delta/\log^4 n)}) + O(1)$ and also provide an almost matching lower bound of $\log \log n + \frac{\log n}{\log (\Delta \log n)}$. V{\"o}cking [Voc99] showed that the maximum bin size with $d$ choice load balancing can be further improved to $O(\log\log n /d)$ by breaking ties to the left. This requires $d$ random bin choices. We show that such bounds can be achieved by making only two random accesses and querying $d/2$ contiguous bins in each access. By grouping a sequence of $n$ bins into $2n/d$ groups, each of $d/2$ consecutive bins, if each ball chooses two groups at random and inserts the new ball into the least-loaded bin in the lesser loaded group, then the maximum load is $O(\log\log n/d)$ with high probability.
[ { "version": "v1", "created": "Thu, 27 Oct 2005 21:59:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Kenthapadi", "K.", "" ], [ "Panigrahy", "R.", "" ] ]
cs/0510087
Johannes Gro{\ss}e
J. Grosse
MathPSfrag: Creating Publication-Quality Labels in Mathematica Plots
7 pages, 8 figures, for associated Mathematica package, see http://wwwth.mppmu.mpg.de/members/jgrosse/mathpsfrag/MathPSfrag-1.0.tar.gz
null
null
LMU-ASC 70/05; MPP-2005-126
cs.GR
null
This article introduces a Mathematica package providing a graphics export function that automatically replaces Mathematica expressions in a graphic by the corresponding LaTeX constructs and positions them correctly. It thus facilitates the creation of publication-quality Enscapulated PostScript (EPS) graphics.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 09:40:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Grosse", "J.", "" ] ]
cs/0510088
Assaf Naor
Rajeev Motwani and Assaf Naor and Rina Panigrahy
Lower bounds on Locality Sensitive Hashing
null
null
null
null
cs.CG
null
Given a metric space $(X,d_X)$, $c\ge 1$, $r>0$, and $p,q\in [0,1]$, a distribution over mappings $\h:X\to \mathbb N$ is called a $(r,cr,p,q)$-sensitive hash family if any two points in $X$ at distance at most $r$ are mapped by $\h$ to the same value with probability at least $p$, and any two points at distance greater than $cr$ are mapped by $\h$ to the same value with probability at most $q$. This notion was introduced by Indyk and Motwani in 1998 as the basis for an efficient approximate nearest neighbor search algorithm, and has since been used extensively for this purpose. The performance of these algorithms is governed by the parameter $\rho=\frac{\log(1/p)}{\log(1/q)}$, and constructing hash families with small $\rho$ automatically yields improved nearest neighbor algorithms. Here we show that for $X=\ell_1$ it is impossible to achieve $\rho\le \frac{1}{2c}$. This almost matches the construction of Indyk and Motwani which achieves $\rho\le \frac{1}{c}$.
[ { "version": "v1", "created": "Sat, 29 Oct 2005 15:05:52 GMT" }, { "version": "v2", "created": "Sat, 26 Nov 2005 20:32:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Motwani", "Rajeev", "" ], [ "Naor", "Assaf", "" ], [ "Panigrahy", "Rina", "" ] ]
cs/0510090
Sheng-Gwo Chen
Jyh-Yang Wu, Sheng-Gwo Chen and Mei-Hsiu Chi
A simple effective method for curvatures estimation on triangular meshes
null
null
null
null
cs.CG
null
To definite and compute differential invariants, like curvatures, for triangular meshes (or polyhedral surfaces) is a key problem in CAGD and the computer vision. The Gaussian curvature and the mean curvature are determined by the differential of the Gauss map of the underlying surface. The Gauss map assigns to each point in the surface the unit normal vector of the tangent plane to the surface at this point. We follow the ideas developed in Chen and Wu \cite{Chen2}(2004) and Wu, Chen and Chi\cite{Wu}(2005) to describe a new and simple approach to estimate the differential of the Gauss map and curvatures from the viewpoint of the gradient and the centroid weights. This will give us a much better estimation of curvatures than Taubin's algorithm \cite{Taubin} (1995).
[ { "version": "v1", "created": "Mon, 31 Oct 2005 02:41:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Wu", "Jyh-Yang", "" ], [ "Chen", "Sheng-Gwo", "" ], [ "Chi", "Mei-Hsiu", "" ] ]
cs/0510091
Marc Schoenauer
Marc Schoenauer (INRIA Futurs), Yann Semet (INRIA Futurs)
An efficient memetic, permutation-based evolutionary algorithm for real-world train timetabling
null
null
null
null
cs.AI
null
Train timetabling is a difficult and very tightly constrained combinatorial problem that deals with the construction of train schedules. We focus on the particular problem of local reconstruction of the schedule following a small perturbation, seeking minimisation of the total accumulated delay by adapting times of departure and arrival for each train and allocation of resources (tracks, routing nodes, etc.). We describe a permutation-based evolutionary algorithm that relies on a semi-greedy heuristic to gradually reconstruct the schedule by inserting trains one after the other following the permutation. This algorithm can be hybridised with ILOG commercial MIP programming tool CPLEX in a coarse-grained manner: the evolutionary part is used to quickly obtain a good but suboptimal solution and this intermediate solution is refined using CPLEX. Experimental results are presented on a large real-world case involving more than one million variables and 2 million constraints. Results are surprisingly good as the evolutionary algorithm, alone or hybridised, produces excellent solutions much faster than CPLEX alone.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 06:06:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Schoenauer", "Marc", "", "INRIA Futurs" ], [ "Semet", "Yann", "", "INRIA Futurs" ] ]
cs/0510094
Angel de Vicente
Angel de Vicente, Nayra Rodriguez
Big Science with a Small Budget: Non-Embarrassingly Parallel Applications in a Non-Dedicated Network of Workstations
4 pages; to appear in Proceedings of ADASS XV (http://www.adass.org:8080/Conferences/2005/Venue/)
null
null
null
cs.DC astro-ph
null
Many astronomers and astrophysicists require large computing resources for their research, which are usually obtained via dedicated (and expensive) parallel machines. Depending on the type of the problem to be solved, an alternative solution can be provided by creating dynamically a computer cluster out of non-dedicated workstations using the Condor High Throughput Computing System and the Master-Worker (MW) framework. As an example of this we show in this paper how a radiative transfer application previously coded with MPI is solved using this solution without the need for dedicated machines.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 14:55:57 GMT" } ]
2007-05-23T00:00:00
[ [ "de Vicente", "Angel", "" ], [ "Rodriguez", "Nayra", "" ] ]
cs/0511002
Alberto Accomazzi
Alberto Accomazzi, Michael J. Kurtz, Guenther Eichhorn, Edwin Henneken, Carolyn S. Grant, Markus Demleitner, Stephen S. Murray
Bibliographic Classification using the ADS Databases
Latex, 4 pages, 1 Figure. To be published in the Proceedings of the Conference "Astronomical Data Analysis Software & Systems XV" held October 2-5, 2005, in San Lorenzo de El Escorial, Spain
null
null
null
cs.IR cs.DL
null
We discuss two techniques used to characterize bibliographic records based on their similarity to and relationship with the contents of the NASA Astrophysics Data System (ADS) databases. The first method has been used to classify input text as being relevant to one or more subject areas based on an analysis of the frequency distribution of its individual words. The second method has been used to classify existing records as being relevant to one or more databases based on the distribution of the papers citing them. Both techniques have proven to be valuable tools in assigning new and existing bibliographic records to different disciplines within the ADS databases.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 22:34:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Accomazzi", "Alberto", "" ], [ "Kurtz", "Michael J.", "" ], [ "Eichhorn", "Guenther", "" ], [ "Henneken", "Edwin", "" ], [ "Grant", "Carolyn S.", "" ], [ "Demleitner", "Markus", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0511004
Marc Schoenauer
Aguston E. Eiben (VU), Marc Schoenauer (FRACTALES)
Evolutionary Computing
null
null
null
null
cs.AI
null
Evolutionary computing (EC) is an exciting development in Computer Science. It amounts to building, applying and studying algorithms based on the Darwinian principles of natural selection. In this paper we briefly introduce the main concepts behind evolutionary computing. We present the main components all evolutionary algorithms (EA), sketch the differences between different types of EAs and survey application areas ranging from optimization, modeling and simulation to entertainment.
[ { "version": "v1", "created": "Tue, 1 Nov 2005 19:46:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiben", "Aguston E.", "", "VU" ], [ "Schoenauer", "Marc", "", "FRACTALES" ] ]
cs/0511010
Nadir Kiyanclar
Nadir Kiyanclar
A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing
null
null
null
null
cs.OS
null
Virtualization, a technique once used to multiplex the resources of high-priced mainframe hardware, is seeing a resurgence in applicability with the increasing computing power of commodity computers. By inserting a layer of software between the machine and traditional operating systems, this technology allows access to a shared computing medium in a manner that is secure, resource-controlled, and efficient. These properties are attractive in the field of on-demand computing, where the fine-grained subdivision of resources provided by virtualized systems allows potentially higher utilization of computing resources. It this work, we survey a number of virtual machine systems with the goal of finding an appropriate candidate to serve as the basis for the On-Demand Secure Cluster Computing project at the National Center for Supercomputing Applications. Contenders are reviewed on a number of desirable properties including portability and security. We conclude with a comparison and justification of our choice.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 19:52:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiyanclar", "Nadir", "" ] ]
cs/0511011
Hamilton Link
Hamilton Link and Jared Saia and Terran Lane and Randall A. LaViolette
The Impact of Social Networks on Multi-Agent Recommender Systems
12 pages, 4 figures. Published in the Proceedings of the Workshop on Cooperative Multi-Agent Learning (ECML/PKDD '05). Resubmitted to fix citations and metadata
null
null
null
cs.LG cs.CC cs.MA
null
Awerbuch et al.'s approach to distributed recommender systems (DRSs) is to have agents sample products at random while randomly querying one another for the best item they have found; we improve upon this by adding a communication network. Agents can only communicate with their immediate neighbors in the network, but neighboring agents may or may not represent users with common interests. We define two network structures: in the ``mailing-list model,'' agents representing similar users form cliques, while in the ``word-of-mouth model'' the agents are distributed randomly in a scale-free network (SFN). In both models, agents tell their neighbors about satisfactory products as they are found. In the word-of-mouth model, knowledge of items propagates only through interested agents, and the SFN parameters affect the system's performance. We include a summary of our new results on the character and parameters of random subgraphs of SFNs, in particular SFNs with power-law degree distributions down to minimum degree 1. These networks are not as resilient as Cohen et al. originally suggested. In the case of the widely-cited ``Internet resilience'' result, high failure rates actually lead to the orphaning of half of the surviving nodes after 60% of the network has failed and the complete disintegration of the network at 90%. We show that given an appropriate network, the communication network reduces the number of sampled items, the number of messages sent, and the amount of ``spam.'' We conclude that in many cases DRSs will be useful for sharing information in a multi-agent learning system.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 23:44:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Link", "Hamilton", "" ], [ "Saia", "Jared", "" ], [ "Lane", "Terran", "" ], [ "LaViolette", "Randall A.", "" ] ]
cs/0511012
Hamilton Link
Hamilton Link and Randall A. LaViolette and Jared Saia and Terran Lane
Parameters Affecting the Resilience of Scale-Free Networks to Random Failures
12 pages, 7 figures. Submitting to Phys. Rev. Lett
null
null
null
cs.NI cs.AR cs.MA
null
It is commonly believed that scale-free networks are robust to massive numbers of random node deletions. For example, Cohen et al. study scale-free networks including some which approximate the measured degree distribution of the Internet. Their results suggest that if each node in this network failed independently with probability 0.99, the remaining network would continue to have a giant component. In this paper, we show that a large and important subclass of scale-free networks are not robust to massive numbers of random node deletions for practical purposes. In particular, we study finite scale-free networks which have minimum node degree of 1 and a power-law degree distribution beginning with nodes of degree 1 (power-law networks). We show that, in a power-law network approximating the Internet's reported distribution, when the probability of deletion of each node is 0.5 only about 25% of the surviving nodes in the network remain connected in a giant component, and the giant component does not persist beyond a critical failure rate of 0.9. The new result is partially due to improved analytical accommodation of the large number of degree-0 nodes that result after node deletions. Our results apply to finite power-law networks with a wide range of power-law exponents, including Internet-like networks. We give both analytical and empirical evidence that such networks are not generally robust to massive random node deletions.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 22:22:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Link", "Hamilton", "" ], [ "LaViolette", "Randall A.", "" ], [ "Saia", "Jared", "" ], [ "Lane", "Terran", "" ] ]
cs/0511013
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
K-ANMI: A Mutual Information Based Clustering Algorithm for Categorical Data
18 pages
null
null
Tr-2004-03
cs.AI cs.DB
null
Clustering categorical data is an integral part of data mining and has attracted much attention recently. In this paper, we present k-ANMI, a new efficient algorithm for clustering categorical data. The k-ANMI algorithm works in a way that is similar to the popular k-means algorithm, and the goodness of clustering in each step is evaluated using a mutual information based criterion (namely, Average Normalized Mutual Information-ANMI) borrowed from cluster ensemble. Experimental results on real datasets show that k-ANMI algorithm is competitive with those state-of-art categorical data clustering algorithms with respect to clustering accuracy.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 01:18:47 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0511014
Kumar Neeraj Verma
Helmut Seidl, Kumar Neeraj Verma
Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying
Long version of paper presented at LPAR 2004
null
null
null
cs.LO cs.CR
null
Cryptographic protocols with single blind copying were defined and modeled by Comon and Cortier using the new class $\mathcal C$ of first order clauses. They showed its satisfiability problem to be in 3-DEXPTIME. We improve this result by showing that satisfiability for this class is NEXPTIME-complete, using new resolution techniques. We show satisfiability to be DEXPTIME-complete if clauses are Horn, which is what is required for modeling cryptographic protocols. While translation to Horn clauses only gives a DEXPTIME upper bound for the secrecy problem for these protocols, we further show that this secrecy problem is actually DEXPTIME-complete.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 13:40:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Seidl", "Helmut", "" ], [ "Verma", "Kumar Neeraj", "" ] ]
cs/0511015
Prashant Singh
Prashant
Towards a Hierarchical Model of Consciousness, Intelligence, Mind and Body
12 pages, 2 figures
null
null
null
cs.AI
null
This article is taken out.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 16:28:05 GMT" }, { "version": "v2", "created": "Sat, 13 Jan 2007 00:00:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
cs/0511016
Santo Fortunato Dr
Santo Fortunato, Marian Boguna, Alessandro Flammini, Filippo Menczer
How to make the top ten: Approximating PageRank from in-degree
8 pages, 7 figures, 2 tables
null
null
null
cs.IR physics.soc-ph
null
PageRank has become a key element in the success of search engines, allowing to rank the most important hits in the top screen of results. One key aspect that distinguishes PageRank from other prestige measures such as in-degree is its global nature. From the information provider perspective, this makes it difficult or impossible to predict how their pages will be ranked. Consequently a market has emerged for the optimization of search engine results. Here we study the accuracy with which PageRank can be approximated by in-degree, a local measure made freely available by search engines. Theoretical and empirical analyses lead to conclude that given the weak degree correlations in the Web link graph, the approximation can be relatively accurate, giving service and information providers an effective new marketing tool.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 23:01:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Fortunato", "Santo", "" ], [ "Boguna", "Marian", "" ], [ "Flammini", "Alessandro", "" ], [ "Menczer", "Filippo", "" ] ]
cs/0511017
Gus Gutoski
Gus Gutoski
Short Quantum Games
MSc thesis, 79 pages single-spaced
null
null
null
cs.CC quant-ph
null
In this thesis we introduce quantum refereed games, which are quantum interactive proof systems with two competing provers. We focus on a restriction of this model that we call "short quantum games" and we prove an upper bound and a lower bound on the expressive power of these games. For the lower bound, we prove that every language having an ordinary quantum interactive proof system also has a short quantum game. An important part of this proof is the establishment of a quantum measurement that reliably distinguishes between quantum states chosen from disjoint convex sets. For the upper bound, we show that certain types of quantum refereed games, including short quantum games, are decidable in deterministic exponential time by supplying a separation oracle for use with the ellipsoid method for convex feasibility.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 23:00:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutoski", "Gus", "" ] ]
cs/0511018
Prashant Singh
Prashant
From General Systems to Soft Systems to Soft Computing: Applications for Large and Complex Real World Systems
9 pages
null
null
null
cs.SE
null
This is article is taken out.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 23:29:55 GMT" }, { "version": "v2", "created": "Sat, 13 Jan 2007 00:00:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
cs/0511020
David P{\l}aneta S
David S. P{\l}aneta
Pbit and other list sorting algorithms
25 pages, 4 tables
Cornell University Computing and Information Science Technical Reports, 2006
null
TR2006-2013
cs.DS
null
Pbit, besides its simplicity, is definitely the fastest list sorting algorithm. It considerably surpasses all already known methods. Among many advantages, it is stable, linear and be made to run in place. I will compare Pbit with algorithm described by Donald E. Knuth in the third volume of ''The Art of Computer Programming'' and other (QuickerSort, MergeSort) list sorting algorithms.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 01:52:02 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2006 23:48:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Płaneta", "David S.", "" ] ]
cs/0511021
Thorsten Theobald
Ravi Kannan and Thorsten Theobald
Games of fixed rank: A hierarchy of bimatrix games
13 pages
null
null
null
cs.GT math.CO
null
We propose a new hierarchical approach to understand the complexity of the open problem of computing a Nash equilibrium in a bimatrix game. Specifically, we investigate a hierarchy of bimatrix games $(A,B)$ which results from restricting the rank of the matrix $A+B$ to be of fixed rank at most $k$. For every fixed $k$, this class strictly generalizes the class of zero-sum games, but is a very special case of general bimatrix games. We show that even for $k=1$ the set of Nash equilibria of these games can consist of an arbitrarily large number of connected components. While the question of exact polynomial time algorithms to find a Nash equilibrium remains open for games of fixed rank, we can provide polynomial time algorithms for finding an $\epsilon$-approximation.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 10:29:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Kannan", "Ravi", "" ], [ "Theobald", "Thorsten", "" ] ]
cs/0511022
Emanuel Diamant
Emanuel Diamant
Does a Plane Imitate a Bird? Does Computer Vision Have to Follow Biological Paradigms?
Proceedings of the 1st International Symposium on Brain, Vision, and Artificial Intelligence, 19-21 October 2005, Naples, Italy
LNCS, vol. 3704, pp. 108-115, 2005, Springer Verlag Berlin Heidelberg 2005
null
null
cs.NE
null
We posit a new paradigm for image information processing. For the last 25 years, this task was usually approached in the frame of Treisman's two-stage paradigm [1]. The latter supposes an unsupervised, bottom-up directed process of preliminary information pieces gathering at the lower processing stages and a supervised, top-down directed process of information pieces binding and grouping at the higher stages. It is acknowledged that these sub-processes interact and intervene between them in a tricky and a complicated manner. Notwithstanding the prevalence of this paradigm in biological and computer vision, we nevertheless propose to replace it with a new one, which we would like to designate as a two-part paradigm. In it, information contained in an image is initially extracted in an independent top-down manner by one part of the system, and then it is examined and interpreted by another, separate system part. We argue that the new paradigm seems to be more plausible than its forerunner. We provide evidence from human attention vision studies and insights of Kolmogorov's complexity theory to support our arguments. We also provide some reasons in favor of separate image interpretation issues.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 15:08:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
cs/0511024
Bourgade Paul
Bourgade Paul, Croissant Olivier
Heat kernel expansion for a family of stochastic volatility models : delta-geometry
null
null
null
null
cs.CE
null
In this paper, we study a family of stochastic volatility processes; this family features a mean reversion term for the volatility and a double CEV-like exponent that generalizes SABR and Heston's models. We derive approximated closed form formulas for the digital prices, the local and implied volatilities. Our formulas are efficient for small maturities. Our method is based on differential geometry, especially small time diffusions on riemanian spaces. This geometrical point of view can be extended to other processes, and is very accurate to produce variate smiles for small maturities and small moneyness.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 18:31:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Paul", "Bourgade", "" ], [ "Olivier", "Croissant", "" ] ]
cs/0511025
Riccardo Pucella
James Cheney
Logic Column 14: Nominal Logic and Abstract Syntax
24 pages
SIGACT News 36 (4), pp. 47-69, 2005
null
null
cs.LO
null
Formalizing syntactic proofs of properties of logics, programming languages, security protocols, and other formal systems is a significant challenge, in large part because of the obligation to handle name-binding correctly. We present an approach called nominal abstract syntax that has attracted considerable interest since its introduction approximately six years ago. After an overview of other approaches, we describe nominal abstract syntax and nominal logic, a logic for reasoning about nominal abstract syntax. We also discuss applications of nominal techniques to programming, automated reasoning, and identify some future directions.
[ { "version": "v1", "created": "Sat, 5 Nov 2005 02:47:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheney", "James", "" ] ]
cs/0511027
Stephen Luttrell
Stephen Luttrell
Discrete Network Dynamics. Part 1: Operator Theory
39 pages, 5 figures
null
null
null
cs.NE
null
An operator algebra implementation of Markov chain Monte Carlo algorithms for simulating Markov random fields is proposed. It allows the dynamics of networks whose nodes have discrete state spaces to be specified by the action of an update operator that is composed of creation and annihilation operators. This formulation of discrete network dynamics has properties that are similar to those of a quantum field theory of bosons, which allows reuse of many conceptual and theoretical structures from QFT. The equilibrium behaviour of one of these generalised MRFs and of the adaptive cluster expansion network (ACEnet) are shown to be equivalent, which provides a way of unifying these two theories.
[ { "version": "v1", "created": "Mon, 7 Nov 2005 19:09:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Luttrell", "Stephen", "" ] ]
cs/0511030
Gregory Gutin
G. Gutin, A. Rafiey, S. Szeider, A. Yeo
The Linear Arrangement Problem Parameterized Above Guaranteed Value
null
null
null
null
cs.DS cs.CC
null
A linear arrangement (LA) is an assignment of distinct integers to the vertices of a graph. The cost of an LA is the sum of lengths of the edges of the graph, where the length of an edge is defined as the absolute value of the difference of the integers assigned to its ends. For many application one hopes to find an LA with small cost. However, it is a classical NP-complete problem to decide whether a given graph $G$ admits an LA of cost bounded by a given integer. Since every edge of $G$ contributes at least one to the cost of any LA, the problem becomes trivially fixed-parameter tractable (FPT) if parameterized by the upper bound of the cost. Fernau asked whether the problem remains FPT if parameterized by the upper bound of the cost minus the number of edges of the given graph; thus whether the problem is FPT ``parameterized above guaranteed value.'' We answer this question positively by deriving an algorithm which decides in time $O(m+n+5.88^k)$ whether a given graph with $m$ edges and $n$ vertices admits an LA of cost at most $m+k$ (the algorithm computes such an LA if it exists). Our algorithm is based on a procedure which generates a problem kernel of linear size in linear time for a connected graph $G$. We also prove that more general parameterized LA problems stated by Serna and Thilikos are not FPT, unless P=NP.
[ { "version": "v1", "created": "Mon, 7 Nov 2005 17:47:55 GMT" }, { "version": "v2", "created": "Mon, 12 Dec 2005 18:26:42 GMT" }, { "version": "v3", "created": "Mon, 13 Mar 2006 10:00:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Rafiey", "A.", "" ], [ "Szeider", "S.", "" ], [ "Yeo", "A.", "" ] ]
cs/0511031
Prashant Singh
Prashant
Internet Protocol Black Holes: A E-Security Threat
null
null
null
null
cs.NI
null
The paper is taken out.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 00:14:06 GMT" }, { "version": "v2", "created": "Thu, 11 Jan 2007 17:05:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
cs/0511032
Yangli Hector Yee
Yang Li Hector Yee (Cornell University)
Spatiotemporal sensistivity and visual attention for efficient rendering of dynamic environments
null
ACM Transactions on Graphics, 20(1), January 2001
null
null
cs.GR cs.CV
null
We present a method to accelerate global illumination computation in dynamic environments by taking advantage of limitations of the human visual system. A model of visual attention is used to locate regions of interest in a scene and to modulate spatiotemporal sensitivity. The method is applied in the form of a spatiotemporal error tolerance map. Perceptual acceleration combined with good sampling protocols provide a global illumination solution feasible for use in animation. Results indicate an order of magnitude improvement in computational speed. The method is adaptable and can also be used in image-based rendering, geometry level of detail selection, realistic image synthesis, video telephony and video compression.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 14:40:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Yee", "Yang Li Hector", "", "Cornell University" ] ]
cs/0511033
Martin Ziegler
Martin Ziegler
Fast (Multi-)Evaluation of Linearly Recurrent Sequences: Improvements and Applications
null
null
null
null
cs.SC
null
For a linearly recurrent vector sequence P[n+1] = A(n) * P[n], consider the problem of calculating either the n-th term P[n] or L<=n arbitrary terms P[n_1],...,P[n_L], both for the case of constant coefficients A(n)=A and for a matrix A(n) with entries polynomial in n. We improve and extend known algorithms for this problem and present new applications for it. Specifically it turns out that for instance * any family (p_n) of classical orthogonal polynomials admits evaluation at given x within O(n^{1/2} log n) operations INDEPENDENT of the family (p_n) under consideration. * For any L indices n_1,...,n_L <= n, the values p_{n_i}(x) can be calculated simultaneously using O(n^{1/2} log n + L log(n/L)) arithmetic operations; again this running time bound holds uniformly. * Every hypergeometric (or, more generally, holonomic) function admits approximate evaluation up to absolute error e>0 within O((log(1/e)^{1/2} loglog(1/e)) -- as opposed to O(log(1/e)) -- arithmetic steps. * Given m and a polynomial p of degree d over a field of characteristic zero, the coefficient of p^m to term X^n can be computed within O(d^2 M(n^{1/2})) steps where M(n) denotes the cost of multiplying two degree-n polynomials. * The same time bound holds for the joint calculation of any L<=n^{1/2} desired coefficients of p^m to terms X^{n_i}, n_1,...,n_L <= n.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 16:46:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Ziegler", "Martin", "" ] ]
cs/0511034
Stanislav Bulygin V.
Stanislav Bulygin
Generalized Hermitian Codes over GF(2^r)
null
null
null
null
cs.DM
null
In this paper we studied generalization of Hermitian function field proposed by A.Garcia and H.Stichtenoth. We calculated a Weierstrass semigroup of the point at infinity for the case q=2, r>=3. It turned out that unlike Hermitian case, we have already three generators for the semigroup. We then applied this result to codes, constructed on generalized Hermitian function fields. Further, we applied results of C.Kirfel and R.Pellikaan to estimating a Feng-Rao designed distance for GH-codes, which improved on Goppa designed distance. Next, we studied the question of codes dual to GH-codes. We identified that the duals are also GH-codes and gave an explicit formula. We concluded with some computational results. In particular, a new record-giving [32,16,>=12]-code over GF(8) was presented.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 19:29:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Bulygin", "Stanislav", "" ] ]
cs/0511041
Susumu Yamasaki
Susumu Yamasaki
Logic Programming with Default, Weak and Strict Negations
14 pages, to appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO
null
This paper treats logic programming with three kinds of negation: default, weak and strict negations. A 3-valued logic model theory is discussed for logic programs with three kinds of negation. The procedure is constructed for negations so that a soundness of the procedure is guaranteed in terms of 3-valued logic model theory.
[ { "version": "v1", "created": "Thu, 10 Nov 2005 06:29:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Yamasaki", "Susumu", "" ] ]
cs/0511042
Pascal Hitzler
Sebastian Bader and Pascal Hitzler
Dimensions of Neural-symbolic Integration - A Structured Survey
28 pages
null
null
null
cs.AI cs.LO cs.NE
null
Research on integrated neural-symbolic systems has made significant progress in the recent past. In particular the understanding of ways to deal with symbolic knowledge within connectionist systems (also called artificial neural networks) has reached a critical mass which enables the community to strive for applicable implementations and use cases. Recent work has covered a great variety of logics used in artificial intelligence and provides a multitude of techniques for dealing with them within the context of artificial neural networks. We present a comprehensive survey of the field of neural-symbolic integration, including a new classification of system according to their architectures and abilities.
[ { "version": "v1", "created": "Thu, 10 Nov 2005 10:00:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bader", "Sebastian", "" ], [ "Hitzler", "Pascal", "" ] ]
cs/0511043
Damiano Bolzoni
Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter Hartel
Poseidon: a 2-tier Anomaly-based Intrusion Detection System
null
null
null
TR-CTIT-05-53
cs.CR
null
We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection rate and lower number of false positives than PAYL and PHAD.
[ { "version": "v1", "created": "Fri, 11 Nov 2005 13:43:04 GMT" }, { "version": "v2", "created": "Wed, 7 Dec 2005 15:11:44 GMT" }, { "version": "v3", "created": "Mon, 30 Jan 2006 14:27:46 GMT" }, { "version": "v4", "created": "Fri, 3 Feb 2006 12:26:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Bolzoni", "Damiano", "" ], [ "Zambon", "Emmanuele", "" ], [ "Etalle", "Sandro", "" ], [ "Hartel", "Pieter", "" ] ]
cs/0511044
Mimmo Parente
J. Gruska, S. La Torre, M. Napoli, M. Parente
Various Solutions to the Firing Squad Synchronization Problems
null
null
null
null
cs.DS cs.CC
null
We present different classes of solutions to the Firing Squad Synchronization Problem on networks of different shapes. The nodes are finite state processors that work at unison discrete steps. The networks considered are the line, the ring and the square. For all of these models we have considered one and two-way communication modes and also constrained the quantity of information that adjacent processors can exchange each step. We are given a particular time expressed as a function of the number of nodes of the network, $f(n)$ and present synchronization algorithms in time $n^2$, $n \log n$, $n\sqrt n$, $2^n$. The solutions are presented as {\em signals} that are used as building blocks to compose new solutions for all times expressed by polynomials with nonnegative coefficients.
[ { "version": "v1", "created": "Sat, 12 Nov 2005 06:44:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Gruska", "J.", "" ], [ "La Torre", "S.", "" ], [ "Napoli", "M.", "" ], [ "Parente", "M.", "" ] ]
cs/0511045
Ugo Dal Lago
Ugo Dal Lago and Simone Martini
An Invariant Cost Model for the Lambda Calculus
19 pages
null
null
null
cs.LO cs.CC
null
We define a new cost model for the call-by-value lambda-calculus satisfying the invariance thesis. That is, under the proposed cost model, Turing machines and the call-by-value lambda-calculus can simulate each other within a polynomial time overhead. The model only relies on combinatorial properties of usual beta-reduction, without any reference to a specific machine or evaluator. In particular, the cost of a single beta reduction is proportional to the difference between the size of the redex and the size of the reduct. In this way, the total cost of normalizing a lambda term will take into account the size of all intermediate results (as well as the number of steps to normal form).
[ { "version": "v1", "created": "Sat, 12 Nov 2005 11:57:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Lago", "Ugo Dal", "" ], [ "Martini", "Simone", "" ] ]
cs/0511049
Gus Gutoski
Gus Gutoski
Entropy, Convex Optimization, and Competitive Quantum Interactions
withdrawn
null
null
null
cs.CC cs.GT quant-ph
null
This paper has been withdrawn by the author due to errors.
[ { "version": "v1", "created": "Sat, 12 Nov 2005 21:15:40 GMT" }, { "version": "v2", "created": "Mon, 21 Nov 2005 23:09:33 GMT" }, { "version": "v3", "created": "Mon, 30 Oct 2006 20:16:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutoski", "Gus", "" ] ]
cs/0511052
Gilson Antonio Giraldi
Gilson A. Giraldi, Antonio A.F. Oliveira, Leonardo Carvalho
Mining Cellular Automata DataBases throug PCA Models
13 pages, 4 figures, 5 tables
null
null
null
cs.DM cs.DB
null
Cellular Automata are discrete dynamical systems that evolve following simple and local rules. Despite of its local simplicity, knowledge discovery in CA is a NP problem. This is the main motivation for using data mining techniques for CA study. The Principal Component Analysis (PCA) is a useful tool for data mining because it provides a compact and optimal description of data sets. Such feature have been explored to compute the best subspace which maximizes the projection of the I/O patterns of CA onto the principal axis. The stability of the principal components against the input patterns is the main result of this approach. In this paper we perform such analysis but in the presence of noise which randomly reverses the CA output values with probability $p$. As expected, the number of principal components increases when the pattern size is increased. However, it seems to remain stable when the pattern size is unchanged but the noise intensity gets larger. We describe our experiments and point out further works using KL transform theory and parameter sensitivity analysis.
[ { "version": "v1", "created": "Mon, 14 Nov 2005 10:54:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "Oliveira", "Antonio A. F.", "" ], [ "Carvalho", "Leonardo", "" ] ]
cs/0511053
Leland Smith
Leland Smith, Muthukumar Thirunavukkarasu, Srinidhi Varadarajan, and Naren Ramakrishnan
A Model Based Approach to Reachability Routing
In submission to IEEE Journal on Selected Areas of Communication
null
null
null
cs.NI
null
Current directions in network routing research have not kept pace with the latest developments in network architectures, such as peer-to-peer networks, sensor networks, ad-hoc wireless networks, and overlay networks. A common characteristic among all of these new technologies is the presence of highly dynamic network topologies. Currently deployed single-path routing protocols cannot adequately cope with this dynamism, and existing multi-path algorithms make trade-offs which lead to less than optimal performance on these networks. This drives the need for routing protocols designed with the unique characteristics of these networks in mind. In this paper we propose the notion of reachability routing as a solution to the challenges posed by routing on such dynamic networks. In particular, our formulation of reachability routing provides cost-sensitive multi-path forwarding along with loop avoidance within the confines of the Internet Protocol (IP) architecture. This is achieved through the application of reinforcement learning within a probabilistic routing framework. Following an explanation of our design decisions and a description of the algorithm, we provide an evaluation of the performance of the algorithm on a variety of network topologies. The results show consistently superior performance compared to other reinforcement learning based routing algorithms.
[ { "version": "v1", "created": "Mon, 14 Nov 2005 16:32:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Smith", "Leland", "" ], [ "Thirunavukkarasu", "Muthukumar", "" ], [ "Varadarajan", "Srinidhi", "" ], [ "Ramakrishnan", "Naren", "" ] ]
cs/0511058
Vladimir Vovk
Vladimir Vovk
On-line regression competitive with reproducing kernel Hilbert spaces
37 pages, 1 figure
null
null
null
cs.LG
null
We consider the problem of on-line prediction of real-valued labels, assumed bounded in absolute value by a known constant, of new objects from known labeled objects. The prediction algorithm's performance is measured by the squared deviation of the predictions from the actual labels. No stochastic assumptions are made about the way the labels and objects are generated. Instead, we are given a benchmark class of prediction rules some of which are hoped to produce good predictions. We show that for a wide range of infinite-dimensional benchmark classes one can construct a prediction algorithm whose cumulative loss over the first N examples does not exceed the cumulative loss of any prediction rule in the class plus O(sqrt(N)); the main differences from the known results are that we do not impose any upper bound on the norm of the considered prediction rules and that we achieve an optimal leading term in the excess loss of our algorithm. If the benchmark class is "universal" (dense in the class of continuous functions on each compact set), this provides an on-line non-stochastic analogue of universally consistent prediction in non-parametric statistics. We use two proof techniques: one is based on the Aggregating Algorithm and the other on the recently developed method of defensive forecasting.
[ { "version": "v1", "created": "Tue, 15 Nov 2005 17:13:50 GMT" }, { "version": "v2", "created": "Tue, 24 Jan 2006 23:27:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0511061
Stephan Merz
Moritz Hammer (IFI-LMU), Alexander Knapp (IFI-LMU), Stephan Merz (INRIA Lorraine - LORIA)
Truly On-The-Fly LTL Model Checking
null
Dans Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2005)
null
null
cs.LO
null
We propose a novel algorithm for automata-based LTL model checking that interleaves the construction of the generalized B\"{u}chi automaton for the negation of the formula and the emptiness check. Our algorithm first converts the LTL formula into a linear weak alternating automaton; configurations of the alternating automaton correspond to the locations of a generalized B\"{u}chi automaton, and a variant of Tarjan's algorithm is used to decide the existence of an accepting run of the product of the transition system and the automaton. Because we avoid an explicit construction of the B\"{u}chi automaton, our approach can yield significant improvements in runtime and memory, for large LTL formulas. The algorithm has been implemented within the SPIN model checker, and we present experimental results for some benchmark examples.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 12:56:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Hammer", "Moritz", "", "IFI-LMU" ], [ "Knapp", "Alexander", "", "IFI-LMU" ], [ "Merz", "Stephan", "", "INRIA Lorraine - LORIA" ] ]
cs/0511062
Liping Lu
Gerd Bumiller, Liping Lu (INRIA Lorraine - LORIA), Yeqiong Song (INRIA Lorraine - LORIA)
Analytic performance comparison of routing protocols in master-slave PLC networks
null
null
null
null
cs.NI
null
In the wide area master-slave PLC (powerline communication) system, the source node cannot reach the destination node without packet relay. Due to the time-variable attenuation in the powerline, the communication distance cannot be defined. Two kind of dynamic repeater algorithms are developed, dynamic source routing and flooding based routing. In this paper, we use analytic approach to compare the performance of those two routing protocols. We give formulas to calculate the average duration of a polling cycle for each protocols. Then we present simulation results to bolster the results of our analysis. We use three metrics, which are bandwidth consumed for routing signaling, normalized routing load and average duration of a polling cycle to evaluate those routing protocols.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 16:24:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Bumiller", "Gerd", "", "INRIA Lorraine - LORIA" ], [ "Lu", "Liping", "", "INRIA Lorraine - LORIA" ], [ "Song", "Yeqiong", "", "INRIA\n Lorraine - LORIA" ] ]
cs/0511063
Michele Finelli
Michele Finelli
Pathwords: a user-friendly schema for common passwords management
null
null
null
null
cs.CR
null
Many computer-based authentication schemata are based on pass- words. Logging on a computer, reading email, accessing content on a web server are all examples of applications where the identification of the user is usually accomplished matching the data provided by the user with data known by the application. Such a widespread approach relies on some assumptions, whose satisfaction is of foremost importance to guarantee the robustness of the solution. Some of these assumptions, like having a "secure" chan- nel to transmit data, or having sound algorithms to check the correct- ness of the data, are not addressed by this paper. We will focus on two simple issues: the problem of using adequate passwords and the problem of managing passwords. The proposed solution, the pathword, is a method that guarantees: 1 that the passwords generated with the help of a pathword are adequate (i.e. that they are not easy to guess), 2 that managing pathwords is more user friendly than managing passwords and that pathwords are less amenable to problems typical of passwords.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 17:46:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Finelli", "Michele", "" ] ]
cs/0511064
Alexander Evako
Alexander V. Evako
The consistency principle for a digitization procedure. An algorithm for building normal digital spaces of continuous n-dimensional objects
13 pages, 11 figures
null
null
null
cs.CV cs.DM
null
This paper considers conditions, which allow to preserve important topological and geometric properties in the process of digitization. For this purpose, we introduce a triplet {C,M,D} consisting of a continuous object C, an intermediate model M, which is a collection of subregions whose union is C, a digital model D, which is the intersection graph of M, and apply the consistency principle and criteria of similarity to M in order to make its mathematical structure consistent with the natural structure of D. Specifically, this paper introduces a locally centered lump collection of subregions and shows that for any locally centered lump cover of an n-dimensional continuous manifold, the digital model of the manifold is a digital normal n-dimensional space. In addition, we give examples of locally centered lump tilings of two-manifolds. We propose an algorithm for constructing normal digital models of continuous objects.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 20:33:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Evako", "Alexander V.", "" ] ]
cs/0511067
Vedran Kordic
Dongqing He and Peisun Ma
Effects of Initial Stance of Quadruped Trotting on Walking Stability
null
null
null
null
cs.RO
null
It is very important for quadruped walking machine to keep its stability in high speed walking. It has been indicated that moment around the supporting diagonal line of quadruped in trotting gait largely influences walking stability. In this paper, moment around the supporting diagonal line of quadruped in trotting gait is modeled and its effects on body attitude are analyzed. The degree of influence varies with different initial stances of quadruped and we get the optimal initial stance of quadruped in trotting gait with maximal walking stability. Simulation results are presented. Keywords: quadruped, trotting, attitude, walking stability.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 14:39:01 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Dongqing", "" ], [ "Ma", "Peisun", "" ] ]
cs/0511068
Vedran Kordic
S. Heinrich, H. Durr, T. Hanel and J. Lassig
An Agent-based Manufacturing Management System for Production and Logistics within Cross-Company Regional and National Production Networks
null
null
null
null
cs.RO
null
The goal is the development of a simultaneous, dynamic, technological as well as logistical real-time planning and an organizational control of the production by the production units themselves, working in the production network under the use of Multi-Agent-Technology. The design of the multi-agent-based manufacturing management system, the models of the single agents, algorithms for the agent-based, decentralized dispatching of orders, strategies and data management concepts as well as their integration into the SCM, basing on the solution described, will be explained in the following. Keywords: production engineering and management, dynamic manufacturing planning and control, multi-agentsystems (MAS), supply-chain-management (SCM), e-manufacturing
[ { "version": "v1", "created": "Fri, 18 Nov 2005 14:41:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Heinrich", "S.", "" ], [ "Durr", "H.", "" ], [ "Hanel", "T.", "" ], [ "Lassig", "J.", "" ] ]
cs/0511069
Vedran Kordic
R. Hedjar and P. Boucher
Nonlinear Receding-Horizon Control of Rigid Link Robot Manipulators
null
null
null
null
cs.RO
null
The approximate nonlinear receding-horizon control law is used to treat the trajectory tracking control problem of rigid link robot manipulators. The derived nonlinear predictive law uses a quadratic performance index of the predicted tracking error and the predicted control effort. A key feature of this control law is that, for their implementation, there is no need to perform an online optimization, and asymptotic tracking of smooth reference trajectories is guaranteed. It is shown that this controller achieves the positions tracking objectives via link position measurements. The stability convergence of the output tracking error to the origin is proved. To enhance the robustness of the closed loop system with respect to payload uncertainties and viscous friction, an integral action is introduced in the loop. A nonlinear observer is used to estimate velocity. Simulation results for a two-link rigid robot are performed to validate the performance of the proposed controller. Keywords: receding-horizon control, nonlinear observer, robot manipulators, integral action, robustness.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 14:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Hedjar", "R.", "" ], [ "Boucher", "P.", "" ] ]
cs/0511071
Francesco Capasso
Francesco Capasso
A polynomial-time heuristic for Circuit-SAT
20 pages, 8 figures
null
null
null
cs.CC cs.DS
null
In this paper is presented an heuristic that, in polynomial time and space in the input dimension, determines if a circuit describes a tautology or a contradiction. If the circuit is neither a tautology nor a contradiction, then the heuristic finds an assignment to the circuit inputs such that the circuit is satisfied.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 20:23:46 GMT" }, { "version": "v2", "created": "Tue, 22 Nov 2005 21:56:11 GMT" }, { "version": "v3", "created": "Wed, 23 Nov 2005 22:19:18 GMT" }, { "version": "v4", "created": "Mon, 28 Nov 2005 19:52:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Capasso", "Francesco", "" ] ]
cs/0511073
Eric Mjolsness
Eric Mjolsness
Stochastic Process Semantics for Dynamical Grammar Syntax: An Overview
Accepted for: Ninth International Symposium on Artificial Intelligence and Mathematics, January 2006
null
null
UCI ICS TR# 05-14
cs.AI cs.LO nlin.AO
null
We define a class of probabilistic models in terms of an operator algebra of stochastic processes, and a representation for this class in terms of stochastic parameterized grammars. A syntactic specification of a grammar is mapped to semantics given in terms of a ring of operators, so that grammatical composition corresponds to operator addition or multiplication. The operators are generators for the time-evolution of stochastic processes. Within this modeling framework one can express data clustering models, logic programs, ordinary and stochastic differential equations, graph grammars, and stochastic chemical reaction kinetics. This mathematical formulation connects these apparently distant fields to one another and to mathematical methods from quantum field theory and operator algebra.
[ { "version": "v1", "created": "Sun, 20 Nov 2005 00:42:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Mjolsness", "Eric", "" ] ]
cs/0511075
Vasant Honavar
Michael Terribilini, Jae-Hyung Lee, Changhui Yan, Robert L. Jernigan, Susan Carpenter, Vasant Honavar, Drena Dobbs
Identifying Interaction Sites in "Recalcitrant" Proteins: Predicted Protein and Rna Binding Sites in Rev Proteins of Hiv-1 and Eiav Agree with Experimental Data
Pacific Symposium on Biocomputing, Hawaii, In press, Accepted, 2006
null
null
null
cs.LG cs.AI
null
Protein-protein and protein nucleic acid interactions are vitally important for a wide range of biological processes, including regulation of gene expression, protein synthesis, and replication and assembly of many viruses. We have developed machine learning approaches for predicting which amino acids of a protein participate in its interactions with other proteins and/or nucleic acids, using only the protein sequence as input. In this paper, we describe an application of classifiers trained on datasets of well-characterized protein-protein and protein-RNA complexes for which experimental structures are available. We apply these classifiers to the problem of predicting protein and RNA binding sites in the sequence of a clinically important protein for which the structure is not known: the regulatory protein Rev, essential for the replication of HIV-1 and other lentiviruses. We compare our predictions with published biochemical, genetic and partial structural information for HIV-1 and EIAV Rev and with our own published experimental mapping of RNA binding sites in EIAV Rev. The predicted and experimentally determined binding sites are in very good agreement. The ability to predict reliably the residues of a protein that directly contribute to specific binding events - without the requirement for structural information regarding either the protein or complexes in which it participates - can potentially generate new disease intervention strategies.
[ { "version": "v1", "created": "Mon, 21 Nov 2005 01:47:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Terribilini", "Michael", "" ], [ "Lee", "Jae-Hyung", "" ], [ "Yan", "Changhui", "" ], [ "Jernigan", "Robert L.", "" ], [ "Carpenter", "Susan", "" ], [ "Honavar", "Vasant", "" ], [ "Dobbs", "Drena", "" ] ]
cs/0511076
Yves Laprie
Blaise Potard (INRIA Lorraine - LORIA), Yves Laprie (INRIA Lorraine - LORIA)
Using phonetic constraints in acoustic-to-articulatory inversion
null
Proceedings of Interspeech, 9th European Conference on Speech Communication and Technology (2005) 3217-3220
null
null
cs.CL
null
The goal of this work is to recover articulatory information from the speech signal by acoustic-to-articulatory inversion. One of the main difficulties with inversion is that the problem is underdetermined and inversion methods generally offer no guarantee on the phonetical realism of the inverse solutions. A way to adress this issue is to use additional phonetic constraints. Knowledge of the phonetic caracteristics of French vowels enable the derivation of reasonable articulatory domains in the space of Maeda parameters: given the formants frequencies (F1,F2,F3) of a speech sample, and thus the vowel identity, an "ideal" articulatory domain can be derived. The space of formants frequencies is partitioned into vowels, using either speaker-specific data or generic information on formants. Then, to each articulatory vector can be associated a phonetic score varying with the distance to the "ideal domain" associated with the corresponding vowel. Inversion experiments were conducted on isolated vowels and vowel-to-vowel transitions. Articulatory parameters were compared with those obtained without using these constraints and those measured from X-ray data.
[ { "version": "v1", "created": "Mon, 21 Nov 2005 14:50:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Potard", "Blaise", "", "INRIA Lorraine - LORIA" ], [ "Laprie", "Yves", "", "INRIA Lorraine -\n LORIA" ] ]
cs/0511079
Anne Bonneau
Jean-Baptiste Maj (LORIA), Anne Bonneau (LORIA), Dominique Fohr (LORIA), Yves Laprie (LORIA)
An elitist approach for extracting automatically well-realized speech sounds with high confidence
null
null
null
null
cs.CL
null
This paper presents an "elitist approach" for extracting automatically well-realized speech sounds with high confidence. The elitist approach uses a speech recognition system based on Hidden Markov Models (HMM). The HMM are trained on speech sounds which are systematically well-detected in an iterative procedure. The results show that, by using the HMM models defined in the training phase, the speech recognizer detects reliably specific speech sounds with a small rate of errors.
[ { "version": "v1", "created": "Tue, 22 Nov 2005 07:06:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Maj", "Jean-Baptiste", "", "LORIA" ], [ "Bonneau", "Anne", "", "LORIA" ], [ "Fohr", "Dominique", "", "LORIA" ], [ "Laprie", "Yves", "", "LORIA" ] ]
cs/0511080
Valmir Barbosa
Alexandre O. Stauffer, Valmir C. Barbosa
A dissemination strategy for immunizing scale-free networks
null
Physical Review E 74 (2006), 056105
10.1103/PhysRevE.74.056105
null
cs.NI
null
We consider the problem of distributing a vaccine for immunizing a scale-free network against a given virus or worm. We introduce a new method, based on vaccine dissemination, that seems to reflect more accurately what is expected to occur in real-world networks. Also, since the dissemination is performed using only local information, the method can be easily employed in practice. Using a random-graph framework, we analyze our method both mathematically and by means of simulations. We demonstrate its efficacy regarding the trade-off between the expected number of nodes that receive the vaccine and the network's resulting vulnerability to develop an epidemic as the virus or worm attempts to infect one of its nodes. For some scenarios, the new method is seen to render the network practically invulnerable to attacks while requiring only a small fraction of the nodes to receive the vaccine.
[ { "version": "v1", "created": "Tue, 22 Nov 2005 10:59:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Stauffer", "Alexandre O.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
cs/0511083
Olivier Powell
Olivier Powell, Aubin Jarry, Pierre Leone, Jose Rolim
Gradient Based Routing in Wireless Sensor Networks: a Mixed Strategy
4 pages, 2 figures
null
null
null
cs.DC
null
We show how recent theoretical advances for data-propagation in Wireless Sensor Networks (WSNs) can be combined to improve gradient-based routing (GBR) in Wireless Sensor Networks. We propose a mixed-strategy of direct transmission and multi-hop propagation of data which improves the lifespan of WSNs by reaching better energy-load-balancing amongst sensor nodes.
[ { "version": "v1", "created": "Wed, 23 Nov 2005 18:13:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Powell", "Olivier", "" ], [ "Jarry", "Aubin", "" ], [ "Leone", "Pierre", "" ], [ "Rolim", "Jose", "" ] ]
cs/0511085
Ron Cohen
R. A. Cohen
Proving that P is not equal to NP and that P is not equal to the intersection of NP and co-NP
9 pages ; 3 figures
null
null
null
cs.CC
null
The open question, P=NP?, was presented by Cook (1971). In this paper, a proof that P is not equal to NP is presented. In addition, it is shown that P is not equal to the intersection of NP and co-NP. Finally, the exact inclusion relationships between the classes P, NP and co-NP are presented.
[ { "version": "v1", "created": "Fri, 25 Nov 2005 15:23:18 GMT" }, { "version": "v2", "created": "Sat, 26 Nov 2005 14:58:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Cohen", "R. A.", "" ] ]
cs/0511088
Barak Pearlmutter
Barak A. Pearlmutter
Bounds on Query Convergence
6 pages, 2 figures
null
null
null
cs.LG
null
The problem of finding an optimum using noisy evaluations of a smooth cost function arises in many contexts, including economics, business, medicine, experiment design, and foraging theory. We derive an asymptotic bound E[ (x_t - x*)^2 ] >= O(1/sqrt(t)) on the rate of convergence of a sequence (x_0, x_1, >...) generated by an unbiased feedback process observing noisy evaluations of an unknown quadratic function maximised at x*. The bound is tight, as the proof leads to a simple algorithm which meets it. We further establish a bound on the total regret, E[ sum_{i=1..t} (x_i - x*)^2 ] >= O(sqrt(t)) These bounds may impose practical limitations on an agent's performance, as O(eps^-4) queries are made before the queries converge to x* with eps accuracy.
[ { "version": "v1", "created": "Fri, 25 Nov 2005 15:57:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Pearlmutter", "Barak A.", "" ] ]
cs/0511090
Petra Hofstedt
Petra Hofstedt, Peter Pepper
Integration of Declarative and Constraint Programming
30 pages, 9 figures, To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.AI
null
Combining a set of existing constraint solvers into an integrated system of cooperating solvers is a useful and economic principle to solve hybrid constraint problems. In this paper we show that this approach can also be used to integrate different language paradigms into a unified framework. Furthermore, we study the syntactic, semantic and operational impacts of this idea for the amalgamation of declarative and constraint programming.
[ { "version": "v1", "created": "Sun, 27 Nov 2005 14:58:22 GMT" }, { "version": "v2", "created": "Sat, 14 Jan 2006 15:48:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Hofstedt", "Petra", "" ], [ "Pepper", "Peter", "" ] ]
cs/0511091
Marc Schoenauer
Carlos Kavka (INRIA Futurs, UNSL-DI), Patricia Roggero (UNSL-DI), Marc Schoenauer (INRIA Futurs)
Evolution of Voronoi based Fuzzy Recurrent Controllers
null
Dans GECCO 2005
null
null
cs.AI
null
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. Among the most successful methods to automate the fuzzy controllers development process are evolutionary algorithms. In this work, we propose the Recurrent Fuzzy Voronoi (RFV) model, a representation for recurrent fuzzy systems. It is an extension of the FV model proposed by Kavka and Schoenauer that extends the application domain to include temporal problems. The FV model is a representation for fuzzy controllers based on Voronoi diagrams that can represent fuzzy systems with synergistic rules, fulfilling the $\epsilon$-completeness property and providing a simple way to introduce a priory knowledge. In the proposed representation, the temporal relations are embedded by including internal units that provide feedback by connecting outputs to inputs. These internal units act as memory elements. In the RFV model, the semantic of the internal units can be specified together with the a priori rules. The geometric interpretation of the rules allows the use of geometric variational operators during the evolution. The representation and the algorithms are validated in two problems in the area of system identification and evolutionary robotics.
[ { "version": "v1", "created": "Mon, 28 Nov 2005 07:14:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Kavka", "Carlos", "", "INRIA Futurs, UNSL-DI" ], [ "Roggero", "Patricia", "", "UNSL-DI" ], [ "Schoenauer", "Marc", "", "INRIA Futurs" ] ]
cs/0511099
Na Li
Na Li and Wen-feng Qi
Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number of Variables
null
null
null
null
cs.CR
null
To resist algebraic attack, a Boolean function should possess good algebraic immunity (AI). Several papers constructed symmetric functions with the maximum algebraic immunity $\lceil \frac{n}{2}\rceil $. In this correspondence we prove that for each odd $n$, there is exactly one trivial balanced $n$-variable symmetric Boolean function achieving the algebraic immunity $\lceil \frac{n}{2}\rceil $. And we also obtain a necessary condition for the algebraic normal form of a symmetric Boolean function with maximum algebraic immunity.
[ { "version": "v1", "created": "Tue, 29 Nov 2005 11:42:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Na", "" ], [ "Qi", "Wen-feng", "" ] ]
cs/0511105
Todd Young
Erik M. Boczko, Todd R. Young
The Signed Distance Function: A New Tool for Binary Classification
13 pages, 5 figures
null
null
null
cs.LG cs.CG
null
From a geometric perspective most nonlinear binary classification algorithms, including state of the art versions of Support Vector Machine (SVM) and Radial Basis Function Network (RBFN) classifiers, and are based on the idea of reconstructing indicator functions. We propose instead to use reconstruction of the signed distance function (SDF) as a basis for binary classification. We discuss properties of the signed distance function that can be exploited in classification algorithms. We develop simple versions of such classifiers and test them on several linear and nonlinear problems. On linear tests accuracy of the new algorithm exceeds that of standard SVM methods, with an average of 50% fewer misclassifications. Performance of the new methods also matches or exceeds that of standard methods on several nonlinear problems including classification of benchmark diagnostic micro-array data sets.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 14:15:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Boczko", "Erik M.", "" ], [ "Young", "Todd R.", "" ] ]
cs/0511106
Sergiu Chelcea
Sergiu Theodor Chelcea (INRIA Rocquencourt / INRIA Sophia Antipolis), Alzennyr Da Silva (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Doru Tanasa (INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse (INRIA Rocquencourt / INRIA Sophia Antipolis)
Benefits of InterSite Pre-Processing and Clustering Methods in E-Commerce Domain
null
Dans Proceedings of the ECML/PKDD2005 Discovery Challenge, A Collaborative Effort in Knowledge Discovery from Databases
null
null
cs.DB
null
This paper presents our preprocessing and clustering analysis on the clickstream dataset proposed for the ECMLPKDD 2005 Discovery Challenge. The main contributions of this article are double. First, after presenting the clickstream dataset, we show how we build a rich data warehouse based an advanced preprocesing. We take into account the intersite aspects in the given ecommerce domain, which offers an interesting data structuration. A preliminary statistical analysis based on time period clickstreams is given, emphasing the importance of intersite user visits in such a context. Secondly, we describe our crossed-clustering method which is applied on data generated from our data warehouse. Our preliminary results are interesting and promising illustrating the benefits of our WUM methods, even if more investigations are needed on the same dataset.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 16:12:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Chelcea", "Sergiu Theodor", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Da Silva", "Alzennyr", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Lechevallier", "Yves", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Tanasa", "Doru", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Trousse", "Brigitte", "", "INRIA\n Rocquencourt / INRIA Sophia Antipolis" ] ]
cs/0511107
J. G. Esteve
J. G. Esteve and F. Falceto
Phase transition in the assignment problem for random matrices
7 pages, 5 figures; accepted for publication in Europhys. Lett. http://www.edpsciences.org/journal/index.cfm?edpsname=epl
null
10.1209/epl/i2005-10296-6
null
cs.CC cond-mat.stat-mech
null
We report an analytic and numerical study of a phase transition in a P problem (the assignment problem) that separates two phases whose representatives are the simple matching problem (an easy P problem) and the traveling salesman problem (a NP-complete problem). Like other phase transitions found in combinatoric problems (K-satisfiability, number partitioning) this can help to understand the nature of the difficulties in solving NP problems an to find more accurate algorithms for them.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 18:03:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Esteve", "J. G.", "" ], [ "Falceto", "F.", "" ] ]
cs/0511108
Abdelhadi Benabdallah
A. Benabdallah and G. Radons
Parameter Estimation of Hidden Diffusion Processes: Particle Filter vs. Modified Baum-Welch Algorithm
15 pages, 3 figures, 2 tables
null
null
null
cs.DS cs.LG
null
We propose a new method for the estimation of parameters of hidden diffusion processes. Based on parametrization of the transition matrix, the Baum-Welch algorithm is improved. The algorithm is compared to the particle filter in application to the noisy periodic systems. It is shown that the modified Baum-Welch algorithm is capable of estimating the system parameters with better accuracy than particle filters.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 20:23:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Benabdallah", "A.", "" ], [ "Radons", "G.", "" ] ]
cs/0512001
Frank Ruskey
Jeremy Carroll (1), Frank Ruskey (2), Mark Weston (2) ((1) HP Laboratories, Bristol, UK, (2) University of Victoria, Canada)
Which n-Venn diagrams can be drawn with convex k-gons?
10 pages, 3 figures. To be published in Proceedings of the Second International Workshop on Euler Diagrams (Euler 2005), Electronic Notes in Theoretical Computer Science
null
null
null
cs.CG
null
We establish a new lower bound for the number of sides required for the component curves of simple Venn diagrams made from polygons. Specifically, for any n-Venn diagram of convex k-gons, we prove that k >= (2^n - 2 - n) / (n (n-2)). In the process we prove that Venn diagrams of seven curves, simple or not, cannot be formed from triangles. We then give an example achieving the new lower bound of a (simple, symmetric) Venn diagram of seven quadrilaterals. Previously Grunbaum had constructed a 7-Venn diagram of non-convex 5-gons [``Venn Diagrams II'', Geombinatorics 2:25-31, 1992].
[ { "version": "v1", "created": "Wed, 30 Nov 2005 23:30:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Carroll", "Jeremy", "" ], [ "Ruskey", "Frank", "" ], [ "Weston", "Mark", "" ] ]
cs/0512002
Vitorino Ramos Dr.
Vitorino Ramos, Carlos Fernandes, Agostinho C. Rosa
On Self-Regulated Swarms, Societal Memory, Speed and Dynamics
11 pages, 8 figures, http://alfa.ist.utl.pt/~cvrm/staff/vramos/refs_2005.html, KEYWORDS: Dynamic Optimization, Dynamic Optimal Control problems, Swarm Intelligence, Self-Organization, Societal Implicit Memory. Submitted to ALIFE-X, Int. Conf. on the Simulation and Synthesis of Living Systems, Bloomington, Indiana, USA, June 3-7, 2006
null
null
null
cs.NE cs.AI
null
We propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the advantageous characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map via collective pheromone laying in the landscape (properly balancing the exploration/exploitation nature of our dynamic search strategy), with a simple Evolutionary mechanism that trough a direct reproduction procedure linked to local environmental features is able to self-regulate the above exploratory swarm population, speeding it up globally. In order to test his adaptive response and robustness, we have recurred to different dynamic multimodal complex functions as well as to Dynamic Optimization Control problems, measuring reaction speeds and performance. Final comparisons were made with standard Genetic Algorithms (GAs), Bacterial Foraging strategies (BFOA), as well as with recent Co-Evolutionary approaches. SRS's were able to demonstrate quick adaptive responses, while outperforming the results obtained by the other approaches. Additionally, some successful behaviors were found. One of the most interesting illustrate that the present SRS collective swarm of bio-inspired ant-like agents is able to track about 65% of moving peaks traveling up to ten times faster than the velocity of a single individual composing that precise swarm tracking system.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 03:10:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "Carlos", "" ], [ "Rosa", "Agostinho C.", "" ] ]
cs/0512003
Vitorino Ramos Dr.
Vitorino Ramos, Carlos Fernandes, Agostinho C. Rosa
Societal Implicit Memory and his Speed on Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms
20 pages, 25 figures, http://alfa.ist.utl.pt/~cvrm/staff/vramos . Draft submitted to Journal of Systems Architecture, Farooq M. and Menezes R. (Eds.), Special issue on Nature Inspired Applied Systems, Elsevier, 2006
null
null
null
cs.MA cs.AI
null
In order to overcome difficult dynamic optimization and environment extrema tracking problems, We propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the advantageous characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map via collective pheromone laying in the landscape (properly balancing the exploration/exploitation nature of our dynamic search strategy), with a simple Evolutionary mechanism that trough a direct reproduction procedure linked to local environmental features is able to self-regulate the above exploratory swarm population, speeding it up globally. In order to test his adaptive response and robustness, we have recurred to different dynamic multimodal complex functions as well as to Dynamic Optimization Control problems, measuring reaction speeds and performance. Final comparisons were made with standard Genetic Algorithms (GAs), Bacterial Foraging strategies (BFOA), as well as with recent Co-Evolutionary approaches. SRS's were able to demonstrate quick adaptive responses, while outperforming the results obtained by the other approaches. Additionally, some successful behaviors were found. One of the most interesting illustrate that the present SRS collective swarm of bio-inspired ant-like agents is able to track about 65% of moving peaks traveling up to ten times faster than the velocity of a single individual composing that precise swarm tracking system.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 04:09:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "Carlos", "" ], [ "Rosa", "Agostinho C.", "" ] ]
cs/0512004
Vitorino Ramos Dr.
Carlos Fernandes, Vitorino Ramos and Agostinho C. Rosa
Self-Regulated Artificial Ant Colonies on Digital Image Habitats
8 pages, 17 figures, full pictures in http://alfa.ist.utl.pt/~cvrm/staff/vramos/Vramos-WCLC05b.pdf
in International Journal of Lateral Computing, IJLC, vol. 2 (1), pp. 1-8, ISSN 0973-208X, Dec. 2005
null
null
cs.MA cs.AI
null
Artificial life models, swarm intelligent and evolutionary computation algorithms are usually built on fixed size populations. Some studies indicate however that varying the population size can increase the adaptability of these systems and their capability to react to changing environments. In this paper we present an extended model of an artificial ant colony system designed to evolve on digital image habitats. We will show that the present swarm can adapt the size of the population according to the type of image on which it is evolving and reacting faster to changing images, thus converging more rapidly to the new desired regions, regulating the number of his image foraging agents. Finally, we will show evidences that the model can be associated with the Mathematical Morphology Watershed algorithm to improve the segmentation of digital grey-scale images. KEYWORDS: Swarm Intelligence, Perception and Image Processing, Pattern Recognition, Mathematical Morphology, Social Cognitive Maps, Social Foraging, Self-Organization, Distributed Search.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 04:39:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Fernandes", "Carlos", "" ], [ "Ramos", "Vitorino", "" ], [ "Rosa", "Agostinho C.", "" ] ]
cs/0512005
Vitorino Ramos Dr.
Vitorino Ramos, Carlos Fernandes and Agostinho C. Rosa
On Ants, Bacteria and Dynamic Environments
8 pages, 6 figures, full paper with pictures in http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_63.html, keywords: Swarm Intelligence and Perception, Social Cognitive Maps, Social Foraging, Self-Organization, Distributed Search and Optimization in Dynamic Environments. In NCA-05, Natural Computing and Applications Workshop, IEEE Computer Press, Timisoara, Romania, Sep. 25-29, 2005
null
null
null
cs.DC
null
Wasps, bees, ants and termites all make effective use of their environment and resources by displaying collective swarm intelligence. Termite colonies - for instance - build nests with a complexity far beyond the comprehension of the individual termite, while ant colonies dynamically allocate labor to various vital tasks such as foraging or defense without any central decision-making ability. Recent research suggests that microbial life can be even richer: highly social, intricately networked, and teeming with interactions, as found in bacteria. What strikes from these observations is that both ant colonies and bacteria have similar natural mechanisms based on Stigmergy and Self-Organization in order to emerge coherent and sophisticated patterns of global behaviour. Keeping in mind the above characteristics we will present a simple model to tackle the collective adaptation of a social swarm based on real ant colony behaviors (SSA algorithm) for tracking extrema in dynamic environments and highly multimodal complex functions described in the well-know De Jong test suite. Then, for the purpose of comparison, a recent model of artificial bacterial foraging (BFOA algorithm) based on similar stigmergic features is described and analyzed. Final results indicate that the SSA collective intelligence is able to cope and quickly adapt to unforeseen situations even when over the same cooperative foraging period, the community is requested to deal with two different and contradictory purposes, while outperforming BFOA in adaptive speed.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 04:52:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "Carlos", "" ], [ "Rosa", "Agostinho C.", "" ] ]
cs/0512007
Arindam Mitra
Arindam Mitra
Entangled messages
PDF, 2 Pages
null
null
null
cs.CR cs.IR
null
It is sometimes necessary to send copies of the same email to different parties, but it is impossible to ensure that if one party reads the message the other parties will bound to read it. We propose an entanglement based scheme where if one party reads the message the other party will bound to read it simultaneously.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 15:40:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
cs/0512008
Joel Friedman
Joel Friedman
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity
70 pages, abstract corrected and modified
null
null
null
cs.CC math.AG
null
This paper is motivated by questions such as P vs. NP and other questions in Boolean complexity theory. We describe an approach to attacking such questions with cohomology, and we show that using Grothendieck topologies and other ideas from the Grothendieck school gives new hope for such an attack. We focus on circuit depth complexity, and consider only finite topological spaces or Grothendieck topologies based on finite categories; as such, we do not use algebraic geometry or manifolds. Given two sheaves on a Grothendieck topology, their "cohomological complexity" is the sum of the dimensions of their Ext groups. We seek to model the depth complexity of Boolean functions by the cohomological complexity of sheaves on a Grothendieck topology. We propose that the logical AND of two Boolean functions will have its corresponding cohomological complexity bounded in terms of those of the two functions using ``virtual zero extensions.'' We propose that the logical negation of a function will have its corresponding cohomological complexity equal to that of the original function using duality theory. We explain these approaches and show that they are stable under pullbacks and base change. It is the subject of ongoing work to achieve AND and negation bounds simultaneously in a way that yields an interesting depth lower bound.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 22:40:27 GMT" }, { "version": "v2", "created": "Fri, 2 Dec 2005 21:25:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Joel", "" ] ]