id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0512010 | Timothy Porter | Jonathan Gratus and Timothy Porter | A geometry of information, I: Nerves, posets and differential forms | 28 pages. A version of this paper appears also on the Dagstuhl
seminar portal http://drops.dagstuhl.de/portals/04351/ | null | null | null | cs.AI cs.GR | null | The main theme of this workshop (Dagstuhl seminar 04351) is `Spatial
Representation: Continuous vs. Discrete'. Spatial representation has two
contrasting but interacting aspects (i) representation of spaces' and (ii)
representation by spaces. In this paper, we will examine two aspects that are
common to both interpretations of the theme, namely nerve constructions and
refinement. Representations change, data changes, spaces change. We will
examine the possibility of a `differential geometry' of spatial representations
of both types, and in the sequel give an algebra of differential forms that has
the potential to handle the dynamical aspect of such a geometry. We will
discuss briefly a conjectured class of spaces, generalising the Cantor set
which would seem ideal as a test-bed for the set of tools we are developing.
| [
{
"version": "v1",
"created": "Fri, 2 Dec 2005 16:18:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gratus",
"Jonathan",
""
],
[
"Porter",
"Timothy",
""
]
] |
cs/0512011 | Shi Zhou Dr. | Shi Zhou | Understanding the internet topology evolution dynamics | 15 figures | Physical Review E, vol. 70, no. 016124, July 2006. | 10.1103/PhysRevE.74.016124 | null | cs.NI | null | The internet structure is extremely complex. The Positive-Feedback Preference
(PFP) model is a recently introduced internet topology generator. The model
uses two generic algorithms to replicate the evolution dynamics observed on the
internet historic data. The phenomenological model was originally designed to
match only two topology properties of the internet, i.e. the rich-club
connectivity and the exact form of degree distribution. Whereas numerical
evaluation has shown that the PFP model accurately reproduces a large set of
other nontrivial characteristics as well. This paper aims to investigate why
and how this generative model captures so many diverse properties of the
internet. Based on comprehensive simulation results, the paper presents a
detailed analysis on the exact origin of each of the topology properties
produced by the model. This work reveals how network evolution mechanisms
control the obtained topology properties and it also provides insights on
correlations between various structural characteristics of complex networks.
| [
{
"version": "v1",
"created": "Fri, 2 Dec 2005 18:24:10 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Apr 2006 11:45:01 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Jul 2006 08:37:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Shi",
""
]
] |
cs/0512016 | Mikl\'os Cs\H{u}r\"os | Mikl\'os Cs\H{u}r\"os | A linear-time algorithm for finding the longest segment which scores
above a given threshold | null | null | null | null | cs.DS cs.CE | null | This paper describes a linear-time algorithm that finds the longest stretch
in a sequence of real numbers (``scores'') in which the sum exceeds an input
parameter. The algorithm also solves the problem of finding the longest
interval in which the average of the scores is above a fixed threshold. The
problem originates from molecular sequence analysis: for instance, the
algorithm can be employed to identify long GC-rich regions in DNA sequences.
The algorithm can also be used to trim low-quality ends of shotgun sequences in
a preprocessing step of whole-genome assembly.
| [
{
"version": "v1",
"created": "Sun, 4 Dec 2005 04:28:00 GMT"
},
{
"version": "v2",
"created": "Sun, 12 Mar 2006 02:40:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Csűrös",
"Miklós",
""
]
] |
cs/0512019 | Marek W. Gutowski | Marek W. Gutowski | Amazing geometry of genetic space or are genetic algorithms convergent? | 7 pages, presented on VII KAEiOG (VII Domestic Conference on
Evolutionary Algorithms and Global Optimization), May 24-26, 2004, Kazimierz
Dolny, Poland | null | null | null | cs.NE cs.DM cs.SE | null | There is no proof yet of convergence of Genetic Algorithms. We do not supply
it too. Instead, we present some thoughts and arguments to convince the Reader,
that Genetic Algorithms are essentially bound for success. For this purpose, we
consider only the crossover operators, single- or multiple-point, together with
selection procedure. We also give a proof that the soft selection is superior
to other selection schemes.
| [
{
"version": "v1",
"created": "Mon, 5 Dec 2005 11:12:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gutowski",
"Marek W.",
""
]
] |
cs/0512021 | Ted Herman | Brahim Hamid (1), Ted Herman (2), Morten Mjelde (3) ((1) LaBRI
University of Bordeaux-1 France, (2) University of Iowa, (3) University in
Bergen Norway) | The Poster Session of SSS 2005 | 3 pages, related to Springer LNCS 3764, Proceedings of Symposium on
Self-Stabilizing Systems | null | null | TR-05-13 | cs.DC cs.DS | null | This technical report documents the poster session of SSS 2005, the Symposium
on Self-Stabilizing Systems published by Springer as LNCS volume 3764. The
poster session included five presentations. Two of these presentations are
summarized in brief abstracts contained in this technical report.
| [
{
"version": "v1",
"created": "Mon, 5 Dec 2005 22:51:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hamid",
"Brahim",
""
],
[
"Herman",
"Ted",
""
],
[
"Mjelde",
"Morten",
""
]
] |
cs/0512026 | Ingo Josopait | I. Josopait | Checking C++ Programs for Dimensional Consistency | submitted to "Computing in Science and Engineering" | null | null | null | cs.PL | null | I will present my implementation 'n-units' of physical units into C++
programs. It allows the compiler to check for dimensional consistency.
| [
{
"version": "v1",
"created": "Wed, 7 Dec 2005 15:51:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Josopait",
"I.",
""
]
] |
cs/0512031 | Slawomir Lasota | Slawomir Lasota and Igor Walukiewicz | Alternating Timed Automata | the full version of the Fossacs'05 conference preliminary paper
revised according ot the referee's comments | null | null | null | cs.LO | null | A notion of alternating timed automata is proposed. It is shown that such
automata with only one clock have decidable emptiness problem over finite
words. This gives a new class of timed languages which is closed under boolean
operations and which has an effective presentation. We prove that the
complexity of the emptiness problem for alternating timed automata with one
clock is non-primitive recursive. The proof gives also the same lower bound for
the universality problem for nondeterministic timed automata with one clock. We
investigate extension of the model with epsilon-transitions and prove that
emptiness is undecidable. Over infinite words, we show undecidability of the
universality problem.
| [
{
"version": "v1",
"created": "Thu, 8 Dec 2005 08:50:35 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Aug 2006 14:56:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lasota",
"Slawomir",
""
],
[
"Walukiewicz",
"Igor",
""
]
] |
cs/0512033 | Bernardo Huberman | Bernardo A. Huberman and Fang Wu | Bootstrapping the Long Tail in Peer to Peer Systems | null | null | null | null | cs.NI cs.CY physics.soc-ph | null | We describe an efficient incentive mechanism for P2P systems that generates a
wide diversity of content offerings while responding adaptively to customer
demand. Files are served and paid for through a parimutuel market similar to
that commonly used for betting in horse races. An analysis of the performance
of such a system shows that there exists an equilibrium with a long tail in the
distribution of content offerings, which guarantees the real time provision of
any content regardless of its popularity.
| [
{
"version": "v1",
"created": "Thu, 8 Dec 2005 18:02:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huberman",
"Bernardo A.",
""
],
[
"Wu",
"Fang",
""
]
] |
cs/0512034 | Bernardo Huberman | Bernardo A. Huberman, Fang Wu and Li Zhang | Ensuring Trust in One Time Exchanges: Solving the QoS Problem | null | null | null | null | cs.GT physics.soc-ph | null | We describe a pricing structure for the provision of IT services that ensures
trust without requiring repeated interactions between service providers and
users. It does so by offering a pricing structure that elicits truthful
reporting of quality of service (QoS) by providers while making them
profitable. This mechanism also induces truth-telling on the part of users
reserving the service.
| [
{
"version": "v1",
"created": "Thu, 8 Dec 2005 19:44:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huberman",
"Bernardo A.",
""
],
[
"Wu",
"Fang",
""
],
[
"Zhang",
"Li",
""
]
] |
cs/0512035 | Michael N. Vyalyi | Sergey P. Tarasov, Mikhail N. Vyalyi | Semidefinite programming and arithmetic circuit evaluation | Submitted to Special issue of DAM in memory of L.Khachiyan | null | null | null | cs.CC | null | A rational number can be naturally presented by an arithmetic computation
(AC): a sequence of elementary arithmetic operations starting from a fixed
constant, say 1. The asymptotic complexity issues of such a representation are
studied e.g. in the framework of the algebraic complexity theory over arbitrary
field.
Here we study a related problem of the complexity of performing arithmetic
operations and computing elementary predicates, e.g. ``='' or ``>'', on
rational numbers given by AC.
In the first place, we prove that AC can be efficiently simulated by the
exact semidefinite programming (SDP).
Secondly, we give a BPP-algorithm for the equality predicate.
Thirdly, we put ``>''-predicate into the complexity class PSPACE.
We conjecture that ``>''-predicate is hard to compute. This conjecture, if
true, would clarify the complexity status of the exact SDP - a well known open
problem in the field of mathematical programming.
| [
{
"version": "v1",
"created": "Fri, 9 Dec 2005 16:01:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tarasov",
"Sergey P.",
""
],
[
"Vyalyi",
"Mikhail N.",
""
]
] |
cs/0512039 | Jianqin Zhou | Jianqin Zhou, Xirong Xu | An algorithm for the k-error linear complexity of a sequence with period
2pn over GF(q) | 6 pages | null | null | null | cs.CR | null | The union cost is used, so that an efficient algorithm for computing the
k-error linear complexity of a sequence with period 2pn over GF(q) is
presented, where p and q are odd primes, and q is a primitive root of modulo
p2.
| [
{
"version": "v1",
"created": "Sat, 10 Dec 2005 00:21:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Jianqin",
""
],
[
"Xu",
"Xirong",
""
]
] |
cs/0512040 | Jianqin Zhou | Jianqin Zhou | A fast algorithm for determining the linear complexity of periodic
sequences | 7 pages | null | null | null | cs.CR | null | A fast algorithm is presented for determining the linear complexity and the
minimal polynomial of periodic sequences over GF(q) with period q n p m, where
p is a prime, q is a prime and a primitive root modulo p2. The algorithm
presented here generalizes both the algorithm in [4] where the period of a
sequence over GF(q) is p m and the algorithm in [5] where the period of a
binary sequence is 2 n p m . When m=0, the algorithm simplifies the generalized
Games-Chan algorithm.
| [
{
"version": "v1",
"created": "Sat, 10 Dec 2005 00:38:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Jianqin",
""
]
] |
cs/0512041 | Jianqin Zhou | Jianqin Zhou | Generalized partially bent functions | 7 pages | null | null | null | cs.CR | null | Based on the definition of generalized partially bent functions, using the
theory of linear transformation, the relationship among generalized partially
bent functions over ring Z N, generalized bent functions over ring Z N and
affine functions is discussed. When N is a prime number, it is proved that a
generalized partially bent function can be decomposed as the addition of a
generalized bent function and an affine function. The result obtained here
generalizes the main works concerning partially bent functions by Claud Carlet
in [1].
| [
{
"version": "v1",
"created": "Sat, 10 Dec 2005 00:43:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhou",
"Jianqin",
""
]
] |
cs/0512042 | Xiaoyang Gu | Xiaoyang Gu, Jack H. Lutz, Elvira Mayordomo | Points on Computable Curves | 10 pages, 12 pages appendix | null | null | null | cs.CC cs.CG | null | The ``analyst's traveling salesman theorem'' of geometric measure theory
characterizes those subsets of Euclidean space that are contained in curves of
finite length. This result, proven for the plane by Jones (1990) and extended
to higher-dimensional Euclidean spaces by Okikiolu (1991), says that a bounded
set $K$ is contained in some curve of finite length if and only if a certain
``square beta sum'', involving the ``width of $K$'' in each element of an
infinite system of overlapping ``tiles'' of descending size, is finite.
In this paper we characterize those {\it points} of Euclidean space that lie
on {\it computable} curves of finite length by formulating and proving a
computable extension of the analyst's traveling salesman theorem. Our extension
says that a point in Euclidean space lies on some computable curve of finite
length if and only if it is ``permitted'' by some computable ``Jones
constriction''. A Jones constriction here is an explicit assignment of a
rational cylinder to each of the above-mentioned tiles in such a way that, when
the radius of the cylinder corresponding to a tile is used in place of the
``width of $K$'' in each tile, the square beta sum is finite. A point is
permitted by a Jones constriction if it is contained in the cylinder assigned
to each tile containing the point. The main part of our proof is the
construction of a computable curve of finite length traversing all the points
permitted by a given Jones constriction. Our construction uses the main ideas
of Jones's ``farthest insertion'' construction, but our algorithm for computing
the curve must work exclusively with the Jones constriction itself, because it
has no direct access to the (typically uncomputable) points permitted by the
Jones constriction.
| [
{
"version": "v1",
"created": "Sat, 10 Dec 2005 03:08:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gu",
"Xiaoyang",
""
],
[
"Lutz",
"Jack H.",
""
],
[
"Mayordomo",
"Elvira",
""
]
] |
cs/0512043 | Dirk Wagner | Dirk Wagner, John Noga | Random Walks with Anti-Correlated Steps | 5 pages, 1 chart, 2 tables | null | null | null | cs.DM cs.PF | null | We conjecture the expected value of random walks with anti-correlated steps
to be exactly 1. We support this conjecture with 2 plausibility arguments and
experimental data. The experimental analysis includes the computation of the
expected values of random walks for steps up to 22. The result shows the
expected value asymptotically converging to 1.
| [
{
"version": "v1",
"created": "Sat, 10 Dec 2005 08:04:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wagner",
"Dirk",
""
],
[
"Noga",
"John",
""
]
] |
cs/0512045 | Xuan-Ha Vu | Xuan-Ha Vu, Marius-Calin Silaghi, Djamila Sam-Haroud and Boi Faltings | Branch-and-Prune Search Strategies for Numerical Constraint Solving | 43 pages, 11 figures | null | null | LIA-REPORT-2006-007 | cs.AI | null | When solving numerical constraints such as nonlinear equations and
inequalities, solvers often exploit pruning techniques, which remove redundant
value combinations from the domains of variables, at pruning steps. To find the
complete solution set, most of these solvers alternate the pruning steps with
branching steps, which split each problem into subproblems. This forms the
so-called branch-and-prune framework, well known among the approaches for
solving numerical constraints. The basic branch-and-prune search strategy that
uses domain bisections in place of the branching steps is called the bisection
search. In general, the bisection search works well in case (i) the solutions
are isolated, but it can be improved further in case (ii) there are continuums
of solutions (this often occurs when inequalities are involved). In this paper,
we propose a new branch-and-prune search strategy along with several variants,
which not only allow yielding better branching decisions in the latter case,
but also work as well as the bisection search does in the former case. These
new search algorithms enable us to employ various pruning techniques in the
construction of inner and outer approximations of the solution set. Our
experiments show that these algorithms speed up the solving process often by
one order of magnitude or more when solving problems with continuums of
solutions, while keeping the same performance as the bisection search when the
solutions are isolated.
| [
{
"version": "v1",
"created": "Sun, 11 Dec 2005 19:47:42 GMT"
},
{
"version": "v2",
"created": "Tue, 8 May 2007 22:59:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vu",
"Xuan-Ha",
""
],
[
"Silaghi",
"Marius-Calin",
""
],
[
"Sam-Haroud",
"Djamila",
""
],
[
"Faltings",
"Boi",
""
]
] |
cs/0512049 | Gq Zhang Ph.D. | Jeff Stuckman and Guo-Qiang Zhang | Mastermind is NP-Complete | null | null | null | null | cs.CC cs.DM | null | In this paper we show that the Mastermind Satisfiability Problem (MSP) is
NP-complete. The Mastermind is a popular game which can be turned into a
logical puzzle called Mastermind Satisfiability Problem in a similar spirit to
the Minesweeper puzzle. By proving that MSP is NP-complete, we reveal its
intrinsic computational property that makes it challenging and interesting.
This serves as an addition to our knowledge about a host of other puzzles, such
as Minesweeper, Mah-Jongg, and the 15-puzzle.
| [
{
"version": "v1",
"created": "Tue, 13 Dec 2005 04:19:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stuckman",
"Jeff",
""
],
[
"Zhang",
"Guo-Qiang",
""
]
] |
cs/0512052 | Ion Mandoiu | Ion I. Mandoiu and Claudia Prajescu | High-Throughput SNP Genotyping by SBE/SBH | 19 pages | null | null | null | cs.DS q-bio.GN | null | Despite much progress over the past decade, current Single Nucleotide
Polymorphism (SNP) genotyping technologies still offer an insufficient degree
of multiplexing when required to handle user-selected sets of SNPs. In this
paper we propose a new genotyping assay architecture combining multiplexed
solution-phase single-base extension (SBE) reactions with sequencing by
hybridization (SBH) using universal DNA arrays such as all $k$-mer arrays. In
addition to PCR amplification of genomic DNA, SNP genotyping using SBE/SBH
assays involves the following steps: (1) Synthesizing primers complementing the
genomic sequence immediately preceding SNPs of interest; (2) Hybridizing these
primers with the genomic DNA; (3) Extending each primer by a single base using
polymerase enzyme and dideoxynucleotides labeled with 4 different fluorescent
dyes; and finally (4) Hybridizing extended primers to a universal DNA array and
determining the identity of the bases that extend each primer by hybridization
pattern analysis. Our contributions include a study of multiplexing algorithms
for SBE/SBH genotyping assays and preliminary experimental results showing the
achievable tradeoffs between the number of array probes and primer length on
one hand and the number of SNPs that can be assayed simultaneously on the
other. Simulation results on datasets both randomly generated and extracted
from the NCBI dbSNP database suggest that the SBE/SBH architecture provides a
flexible and cost-effective alternative to genotyping assays currently used in
the industry, enabling genotyping of up to hundreds of thousands of
user-specified SNPs per assay.
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2005 18:01:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mandoiu",
"Ion I.",
""
],
[
"Prajescu",
"Claudia",
""
]
] |
cs/0512053 | John Hitchcock | John M. Hitchcock | Online Learning and Resource-Bounded Dimension: Winnow Yields New Lower
Bounds for Hard Sets | null | null | null | null | cs.CC cs.LG | null | We establish a relationship between the online mistake-bound model of
learning and resource-bounded dimension. This connection is combined with the
Winnow algorithm to obtain new results about the density of hard sets under
adaptive reductions. This improves previous work of Fu (1995) and Lutz and Zhao
(2000), and solves one of Lutz and Mayordomo's "Twelve Problems in
Resource-Bounded Measure" (1999).
| [
{
"version": "v1",
"created": "Tue, 13 Dec 2005 22:01:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hitchcock",
"John M.",
""
]
] |
cs/0512054 | Vyacheslav Gorshkov Mr | Gennady P.Berman (Los Alamos National Laboratory, T-13), Vyacheslav
N.Gorshkov (Los Alamos National Laboratory, Center for Nonlinear Studies),
Xidi Wang (Citigroup, Sao Paulo, Brasil) | Irreducible Frequent Patterns in Transactional Databases | 30 pages, 18 figures | null | null | null | cs.DS cs.DB | null | Irreducible frequent patters (IFPs) are introduced for transactional
databases. An IFP is such a frequent pattern (FP),(x1,x2,...xn), the
probability of which, P(x1,x2,...xn), cannot be represented as a product of the
probabilities of two (or more) other FPs of the smaller lengths. We have
developed an algorithm for searching IFPs in transactional databases. We argue
that IFPs represent useful tools for characterizing the transactional databases
and may have important applications to bio-systems including the immune systems
and for improving vaccination strategies. The effectiveness of the IFPs
approach has been illustrated in application to a classification problem.
| [
{
"version": "v1",
"created": "Tue, 13 Dec 2005 22:53:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berman",
"Gennady P.",
"",
"Los Alamos National Laboratory, T-13"
],
[
"Gorshkov",
"Vyacheslav N.",
"",
"Los Alamos National Laboratory, Center for Nonlinear Studies"
],
[
"Wang",
"Xidi",
"",
"Citigroup, Sao Paulo, Brasil"
]
] |
cs/0512055 | Yi-Dong Shen | Yi-Dong Shen and Danny De Schreye | Termination Analysis of General Logic Programs for Moded Queries: A
Dynamic Approach | 24 Pages | null | null | null | cs.LO cs.PL | null | The termination problem of a logic program can be addressed in either a
static or a dynamic way. A static approach performs termination analysis at
compile time, while a dynamic approach characterizes and tests termination of a
logic program by applying a loop checking technique. In this paper, we present
a novel dynamic approach to termination analysis for general logic programs
with moded queries. We address several interesting questions, including how to
formulate an SLDNF-derivation for a moded query, how to characterize an
infinite SLDNF-derivation with a moded query, and how to apply a loop checking
mechanism to cut infinite SLDNF-derivations for the purpose of termination
analysis. The proposed approach is very powerful and useful. It can be used (1)
to test if a logic program terminates for a given concrete or moded query, (2)
to test if a logic program terminates for all concrete or moded queries, and
(3) to find all (most general) concrete/moded queries that are most likely
terminating (or non-terminating).
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2005 07:09:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shen",
"Yi-Dong",
""
],
[
"De Schreye",
"Danny",
""
]
] |
cs/0512056 | Roberto Bagnara | Roberto Bagnara, Andrea Pescetti, Alessandro Zaccagnini, Enea
Zaffanella (University of Parma) | PURRS: Towards Computer Algebra Support for Fully Automatic Worst-Case
Complexity Analysis | 6 pages | null | null | null | cs.MS cs.CC | null | Fully automatic worst-case complexity analysis has a number of applications
in computer-assisted program manipulation. A classical and powerful approach to
complexity analysis consists in formally deriving, from the program syntax, a
set of constraints expressing bounds on the resources required by the program,
which are then solved, possibly applying safe approximations. In several
interesting cases, these constraints take the form of recurrence relations.
While techniques for solving recurrences are known and implemented in several
computer algebra systems, these do not completely fulfill the needs of fully
automatic complexity analysis: they only deal with a somewhat restricted class
of recurrence relations, or sometimes require user intervention, or they are
restricted to the computation of exact solutions that are often so complex to
be unmanageable, and thus useless in practice. In this paper we briefly
describe PURRS, a system and software library aimed at providing all the
computer algebra services needed by applications performing or exploiting the
results of worst-case complexity analyses. The capabilities of the system are
illustrated by means of examples derived from the analysis of programs written
in a domain-specific functional programming language for real-time embedded
systems.
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2005 09:54:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bagnara",
"Roberto",
"",
"University of Parma"
],
[
"Pescetti",
"Andrea",
"",
"University of Parma"
],
[
"Zaccagnini",
"Alessandro",
"",
"University of Parma"
],
[
"Zaffanella",
"Enea",
"",
"University of Parma"
]
] |
cs/0512059 | Vladimir Vovk | Vladimir Vovk | Competing with wild prediction rules | 28 pages, 3 figures | null | null | null | cs.LG | null | We consider the problem of on-line prediction competitive with a benchmark
class of continuous but highly irregular prediction rules. It is known that if
the benchmark class is a reproducing kernel Hilbert space, there exists a
prediction algorithm whose average loss over the first N examples does not
exceed the average loss of any prediction rule in the class plus a "regret
term" of O(N^(-1/2)). The elements of some natural benchmark classes, however,
are so irregular that these classes are not Hilbert spaces. In this paper we
develop Banach-space methods to construct a prediction algorithm with a regret
term of O(N^(-1/p)), where p is in [2,infty) and p-2 reflects the degree to
which the benchmark class fails to be a Hilbert space.
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2005 20:03:30 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jan 2006 17:36:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0512060 | Chiranjeeb Buragohain | Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri | Distributed Navigation Algorithms for Sensor Networks | To Appear in INFOCOM 2006 | null | null | null | cs.NI cs.DC cs.DS | null | We propose efficient distributed algorithms to aid navigation of a user
through a geographic area covered by sensors. The sensors sense the level of
danger at their locations and we use this information to find a safe path for
the user through the sensor field. Traditional distributed navigation
algorithms rely upon flooding the whole network with packets to find an optimal
safe path. To reduce the communication expense, we introduce the concept of a
skeleton graph which is a sparse subset of the true sensor network
communication graph. Using skeleton graphs we show that it is possible to find
approximate safe paths with much lower communication cost. We give tight
theoretical guarantees on the quality of our approximation and by simulation,
show the effectiveness of our algorithms in realistic sensor network
situations.
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2005 22:36:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buragohain",
"Chiranjeeb",
""
],
[
"Agrawal",
"Divyakant",
""
],
[
"Suri",
"Subhash",
""
]
] |
cs/0512062 | Matteo Gagliolo | Juergen Schmidhuber, Matteo Gagliolo, Daan Wierstra, Faustino Gomez | Evolino for recurrent support vector machines | 10 pages, 2 figures | null | null | IDSIA-19-05 version 2.0 | cs.NE | null | Traditional Support Vector Machines (SVMs) need pre-wired finite time windows
to predict and classify time series. They do not have an internal state
necessary to deal with sequences involving arbitrary long-term dependencies.
Here we introduce a new class of recurrent, truly sequential SVM-like devices
with internal adaptive states, trained by a novel method called EVOlution of
systems with KErnel-based outputs (Evoke), an instance of the recent Evolino
class of methods. Evoke evolves recurrent neural networks to detect and
represent temporal dependencies while using quadratic programming/support
vector regression to produce precise outputs. Evoke is the first SVM-based
mechanism learning to classify a context-sensitive language. It also
outperforms recent state-of-the-art gradient-based recurrent neural networks
(RNNs) on various time series prediction tasks.
| [
{
"version": "v1",
"created": "Thu, 15 Dec 2005 15:05:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidhuber",
"Juergen",
""
],
[
"Gagliolo",
"Matteo",
""
],
[
"Wierstra",
"Daan",
""
],
[
"Gomez",
"Faustino",
""
]
] |
cs/0512064 | Martin Kutz | Martin Kutz | Computing shortest non-trivial cycles on orientable surfaces of bounded
genus in almost linear time | 13 pages, 7 figures | null | null | null | cs.CG | null | We present an algorithm that computes a shortest non-contractible and a
shortest non-separating cycle on an orientable combinatorial surface of bounded
genus in O(n \log n) time, where n denotes the complexity of the surface. This
solves a central open problem in computational topology, improving upon the
current-best O(n^{3/2})-time algorithm by Cabello and Mohar (ESA 2005). Our
algorithm uses universal-cover constructions to find short cycles and makes
extensive use of existing tools from the field.
| [
{
"version": "v1",
"created": "Thu, 15 Dec 2005 17:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kutz",
"Martin",
""
]
] |
cs/0512070 | Bertrand Nouvel | Bertrand Nouvel (LIP), Eric Remila (LIP) | Incremental and Transitive Discrete Rotations | null | null | null | null | cs.DM cs.GR | null | A discrete rotation algorithm can be apprehended as a parametric application
$f\_\alpha$ from $\ZZ[i]$ to $\ZZ[i]$, whose resulting permutation ``looks
like'' the map induced by an Euclidean rotation. For this kind of algorithm, to
be incremental means to compute successively all the intermediate rotate d
copies of an image for angles in-between 0 and a destination angle. The di
scretized rotation consists in the composition of an Euclidean rotation with a
discretization; the aim of this article is to describe an algorithm whic h
computes incrementally a discretized rotation. The suggested method uses o nly
integer arithmetic and does not compute any sine nor any cosine. More pr
ecisely, its design relies on the analysis of the discretized rotation as a
step function: the precise description of the discontinuities turns to be th e
key ingredient that will make the resulting procedure optimally fast and e
xact. A complete description of the incremental rotation process is provided,
also this result may be useful in the specification of a consistent set of
defin itions for discrete geometry.
| [
{
"version": "v1",
"created": "Fri, 16 Dec 2005 16:12:12 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jan 2006 07:02:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nouvel",
"Bertrand",
"",
"LIP"
],
[
"Remila",
"Eric",
"",
"LIP"
]
] |
cs/0512071 | Martyn Amos | Jon Timmis, Martyn Amos, Wolfgang Banzhaf and Andy Tyrrell | "Going back to our roots": second generation biocomputing | Submitted to the International Journal of Unconventional Computing | null | null | null | cs.AI cs.NE | null | Researchers in the field of biocomputing have, for many years, successfully
"harvested and exploited" the natural world for inspiration in developing
systems that are robust, adaptable and capable of generating novel and even
"creative" solutions to human-defined problems. However, in this position paper
we argue that the time has now come for a reassessment of how we exploit
biology to generate new computational systems. Previous solutions (the "first
generation" of biocomputing techniques), whilst reasonably effective, are crude
analogues of actual biological systems. We believe that a new, inherently
inter-disciplinary approach is needed for the development of the emerging
"second generation" of bio-inspired methods. This new modus operandi will
require much closer interaction between the engineering and life sciences
communities, as well as a bidirectional flow of concepts, applications and
expertise. We support our argument by examining, in this new light, three
existing areas of biocomputing (genetic programming, artificial immune systems
and evolvable hardware), as well as an emerging area (natural genetic
engineering) which may provide useful pointers as to the way forward.
| [
{
"version": "v1",
"created": "Fri, 16 Dec 2005 16:42:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Timmis",
"Jon",
""
],
[
"Amos",
"Martyn",
""
],
[
"Banzhaf",
"Wolfgang",
""
],
[
"Tyrrell",
"Andy",
""
]
] |
cs/0512072 | Elias Tsigaridas | Ioannis Z. Emiris and Elias P. Tsigaridas | Computations with one and two real algebraic numbers | null | null | null | null | cs.SC cs.MS | null | We present algorithmic and complexity results concerning computations with
one and two real algebraic numbers, as well as real solving of univariate
polynomials and bivariate polynomial systems with integer coefficients using
Sturm-Habicht sequences.
Our main results, in the univariate case, concern the problems of real root
isolation (Th. 19) and simultaneous inequalities (Cor.26) and in the bivariate,
the problems of system real solving (Th.42), sign evaluation (Th. 37) and
simultaneous inequalities (Cor. 43).
| [
{
"version": "v1",
"created": "Sun, 18 Dec 2005 16:58:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Emiris",
"Ioannis Z.",
""
],
[
"Tsigaridas",
"Elias P.",
""
]
] |
cs/0512080 | Grigorii Pivovarov | G. B. Pivovarov and S. E. Trunov | EqRank: Theme Evolution in Citation Graphs | 8 pages, 7 figs, 2 tables | null | null | null | cs.DS cs.DL | null | Time evolution of the classification scheme generated by the EqRank algorithm
is studied with hep-th citation graph as an example. Intuitive expectations
about evolution of an adequate classification scheme for a growing set of
objects are formulated. Evolution compliant with these expectations is called
natural. It is demonstrated that EqRank yields a naturally evolving
classification scheme. We conclude that EqRank can be used as a means to detect
new scientific themes, and to track their development.
| [
{
"version": "v1",
"created": "Tue, 20 Dec 2005 14:01:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pivovarov",
"G. B.",
""
],
[
"Trunov",
"S. E.",
""
]
] |
cs/0512081 | Mihai Patrascu | Erik D. Demaine, Friedhelm Meyer auf der Heide, Rasmus Pagh and Mihai
Patrascu | De Dictionariis Dynamicis Pauco Spatio Utentibus | 14 pages. Full version of a paper accepted to LATIN'06 | null | null | null | cs.DS | null | We develop dynamic dictionaries on the word RAM that use asymptotically
optimal space, up to constant factors, subject to insertions and deletions, and
subject to supporting perfect-hashing queries and/or membership queries, each
operation in constant time with high probability. When supporting only
membership queries, we attain the optimal space bound of Theta(n lg(u/n)) bits,
where n and u are the sizes of the dictionary and the universe, respectively.
Previous dictionaries either did not achieve this space bound or had time
bounds that were only expected and amortized. When supporting perfect-hashing
queries, the optimal space bound depends on the range {1,2,...,n+t} of
hashcodes allowed as output. We prove that the optimal space bound is Theta(n
lglg(u/n) + n lg(n/(t+1))) bits when supporting only perfect-hashing queries,
and it is Theta(n lg(u/n) + n lg(n/(t+1))) bits when also supporting membership
queries. All upper bounds are new, as is the Omega(n lg(n/(t+1))) lower bound.
| [
{
"version": "v1",
"created": "Tue, 20 Dec 2005 23:01:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"der Heide",
"Friedhelm Meyer auf",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Patrascu",
"Mihai",
""
]
] |
cs/0512082 | Didier Bert | Hector Ruiz Barradas (LSR - IMAG), Didier Bert (LSR - IMAG) | A Fixpoint Semantics of Event Systems with and without Fairness
Assumptions | null | null | null | RR 1081-L LSR 21 | cs.LO | null | We present a fixpoint semantics of event systems. The semantics is presented
in a general framework without concerns of fairness. Soundness and completeness
of rules for deriving "leads-to" properties are proved in this general
framework. The general framework is instantiated to minimal progress and weak
fairness assumptions and similar results are obtained. We show the power of
these results by deriving sufficient conditions for "leads-to" under minimal
progress proving soundness of proof obligations without reasoning over
state-traces.
| [
{
"version": "v1",
"created": "Wed, 21 Dec 2005 08:23:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barradas",
"Hector Ruiz",
"",
"LSR - IMAG"
],
[
"Bert",
"Didier",
"",
"LSR - IMAG"
]
] |
cs/0512084 | Hanna E. Makaruk | Nikita Sakhanenko, Hanna Makaruk | Understanding physics from interconnected data | 9 pages, 8 figures | null | null | LA-UR-05-5921 | cs.CV | null | Metal melting on release after explosion is a physical system far from
quilibrium. A complete physical model of this system does not exist, because
many interrelated effects have to be considered. General methodology needs to
be developed so as to describe and understand physical phenomena involved.
The high noise of the data, moving blur of images, the high degree of
uncertainty due to the different types of sensors, and the information
entangled and hidden inside the noisy images makes reasoning about the physical
processes very difficult. Major problems include proper information extraction
and the problem of reconstruction, as well as prediction of the missing data.
In this paper, several techniques addressing the first problem are given,
building the basis for tackling the second problem.
| [
{
"version": "v1",
"created": "Wed, 21 Dec 2005 20:23:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sakhanenko",
"Nikita",
""
],
[
"Makaruk",
"Hanna",
""
]
] |
cs/0512085 | Todd Holloway | Todd Holloway, Miran Bozicevic, Katy B\"orner | Analyzing and Visualizing the Semantic Coverage of Wikipedia and Its
Authors | null | null | null | null | cs.IR | null | This paper presents a novel analysis and visualization of English Wikipedia
data. Our specific interest is the analysis of basic statistics, the
identification of the semantic structure and age of the categories in this free
online encyclopedia, and the content coverage of its highly productive authors.
The paper starts with an introduction of Wikipedia and a review of related
work. We then introduce a suite of measures and approaches to analyze and map
the semantic structure of Wikipedia. The results show that co-occurrences of
categories within individual articles have a power-law distribution, and when
mapped reveal the nicely clustered semantic structure of Wikipedia. The results
also reveal the content coverage of the article's authors, although the roles
these authors play are as varied as the authors themselves. We conclude with a
discussion of major results and planned future work.
| [
{
"version": "v1",
"created": "Wed, 21 Dec 2005 19:31:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Holloway",
"Todd",
""
],
[
"Bozicevic",
"Miran",
""
],
[
"Börner",
"Katy",
""
]
] |
cs/0512089 | Stephen F. Bush PhD | Stephen F. Bush, Todd Hughes | On The Effectiveness of Kolmogorov Complexity Estimation to Discriminate
Semantic Types | null | SFI Workshop: Resilient and Adaptive Defense of Computing Networks
2003, Santa Fe Institute, Santa Fe, NM, Nov 5-6, 2003 | null | null | cs.NI cs.CR | null | We present progress on the experimental validation of a fundamental and
universally applicable vulnerability analysis framework that is capable of
identifying new types of vulnerabilities before attackers innovate attacks.
This new framework proactively identifies system components that are vulnerable
based upon their Kolmogorov Complexity estimates and it facilitates prediction
of previously unknown vulnerabilities that are likely to be exploited by future
attack methods. A tool that utilizes a growing library of complexity estimators
is presented. This work is an incremental step towards validation of the
concept of complexity-based vulnerability analysis. In particular, results
indicate that data types (semantic types) can be identified by estimates of
their complexity. Thus, a map of complexity can identify suspicious types, such
as executable data embedded within passive data types, without resorting to
predefined headers, signatures, or other limiting a priori information.
| [
{
"version": "v1",
"created": "Thu, 22 Dec 2005 22:02:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Hughes",
"Todd",
""
]
] |
cs/0512092 | Stephen F. Bush PhD | Stephen F. Bush and Nathan Smith | The Limits of Motion Prediction Support for Ad hoc Wireless Network
Performance | Introduces flash routing | The 2005 International Conference on Wireless Networks (ICWN-05)
Monte Carlo Resort, Las Vegas, Nevada, USA, June 27-30, 2005 | null | null | cs.NI | null | A fundamental understanding of gain provided by motion prediction in wireless
ad hoc routing is currently lacking. This paper examines benefits in routing
obtainable via prediction. A theoretical best-case non-predictive routing model
is quantified in terms of both message overhead and update time for
non-predictive routing. This best- case model of existing routing performance
is compared with predictive routing. Several specific instances of predictive
improvements in routing are examined. The primary contribution of this paper is
quantification of predictive gain for wireless ad hoc routing.
| [
{
"version": "v1",
"created": "Thu, 22 Dec 2005 22:17:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Smith",
"Nathan",
""
]
] |
cs/0512094 | Stephen F. Bush PhD | Stephen F. Bush | Low-Energy Sensor Network Time Synchronization as an Emergent Property | null | null | null | null | cs.NI | null | The primary contribution of this work is to examine the energy efficiency of
pulse coupled oscillation for time synchronization in a realistic wireless
network environment and to explore the impact of mobility on convergence rate.
Energy coupled oscillation is susceptible to interference; this approach uses
reception and decoding of short packet bursts to eliminate this problem. The
energy efficiency of a commonly used timestamp broadcast algorithm is compared
and contrasted with pulse-coupled oscillation. The emergent pulse coupled
oscillation technique shows greater energy efficiency as well as robustness
with mobility. A proportion of the sensors may be integrated with GPS receivers
in order to obtain a master clock time.
| [
{
"version": "v1",
"created": "Fri, 23 Dec 2005 21:45:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
]
] |
cs/0512096 | Ralf L\"ammel | Ralf Laemmel | Book review "The Haskell Road to Logic, Maths and Programming" | To appear in the JoLLI journal in 2006 | null | null | null | cs.PL cs.LO | null | The textbook by Doets and van Eijck puts the Haskell programming language
systematically to work for presenting a major piece of logic and mathematics.
The reader is taken through chapters on basic logic, proof recipes, sets and
lists, relations and functions, recursion and co-recursion, the number systems,
polynomials and power series, ending with Cantor's infinities. The book uses
Haskell for the executable and strongly typed manifestation of various
mathematical notions at the level of declarative programming. The book adopts a
systematic but relaxed mathematical style (definition, example, exercise, ...);
the text is very pleasant to read due to a small amount of anecdotal
information, and due to the fact that definitions are fluently integrated in
the running text. An important goal of the book is to get the reader acquainted
with reasoning about programs.
| [
{
"version": "v1",
"created": "Sat, 24 Dec 2005 23:08:25 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jun 2006 00:50:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Laemmel",
"Ralf",
""
]
] |
cs/0512098 | Dmitry Paukov | Dmitry P. Paukov | Mathematical models of the complex surfaces in simulation and
visualization systems | 8 pages, 4 figures | null | null | null | cs.GR cs.CG | null | Modeling, simulation and visualization of three-dimension complex bodies
widely use mathematical model of curves and surfaces. The most important curves
and surfaces for these purposes are curves and surfaces in Hermite and Bezier
forms, splines and NURBS. Article is devoted to survey this way to use
geometrical data in various computer graphics systems and adjacent fields.
| [
{
"version": "v1",
"created": "Mon, 26 Dec 2005 14:45:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paukov",
"Dmitry P.",
""
]
] |
cs/0512099 | Mark Burgin | Mark Burgin | Mathematical Models in Schema Theory | null | null | null | null | cs.AI | null | In this paper, a mathematical schema theory is developed. This theory has
three roots: brain theory schemas, grid automata, and block-shemas. In Section
2 of this paper, elements of the theory of grid automata necessary for the
mathematical schema theory are presented. In Section 3, elements of brain
theory necessary for the mathematical schema theory are presented. In Section
4, other types of schemas are considered. In Section 5, the mathematical schema
theory is developed. The achieved level of schema representation allows one to
model by mathematical tools virtually any type of schemas considered before,
including schemas in neurophisiology, psychology, computer science, Internet
technology, databases, logic, and mathematics.
| [
{
"version": "v1",
"created": "Tue, 27 Dec 2005 21:29:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burgin",
"Mark",
""
]
] |
cs/0512104 | Robert Burger PhD | John Robert Burger | Reversible CAM Processor Modeled After Quantum Computer Behavior | null | null | null | null | cs.AR quant-ph | null | Proposed below is a reversible digital computer modeled after the natural
behavior of a quantum system. Using approaches usually reserved for idealized
quantum computers, the Reversible CAM, or State Vector Parallel (RSVP)
processor can easily find keywords in an unstructured database (that is, it can
solve a needle in a haystack problem). The RSVP processor efficiently solves a
SAT (Satisfiability of Boolean Formulae) problem; also it can aid in the
solution of a GP (Global Properties of Truth Table) problem. The power delay
product of the RSVP processor is exponentially lower than that of a standard
CAM programmed to perform similar operations.
| [
{
"version": "v1",
"created": "Wed, 28 Dec 2005 19:59:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burger",
"John Robert",
""
]
] |
cs/0601003 | Ruben Vandeginste | Ruben Vandeginste, Bart Demoen | Incremental copying garbage collection for WAM-based Prolog systems | 33 pages, 22 figures, 5 tables. To appear in Theory and Practice of
Logic Programming (TPLP) | null | null | null | cs.PL | null | The design and implementation of an incremental copying heap garbage
collector for WAM-based Prolog systems is presented. Its heap layout consists
of a number of equal-sized blocks. Other changes to the standard WAM allow
these blocks to be garbage collected independently. The independent collection
of heap blocks forms the basis of an incremental collecting algorithm which
employs copying without marking (contrary to the more frequently used mark©
or mark&slide algorithms in the context of Prolog). Compared to standard
semi-space copying collectors, this approach to heap garbage collection lowers
in many cases the memory usage and reduces pause times. The algorithm also
allows for a wide variety of garbage collection policies including generational
ones. The algorithm is implemented and evaluated in the context of hProlog.
| [
{
"version": "v1",
"created": "Mon, 2 Jan 2006 20:58:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vandeginste",
"Ruben",
""
],
[
"Demoen",
"Bart",
""
]
] |
cs/0601005 | Jinyun Ke | J-Y Ke and Y. Yao | Analyzing language development from a network approach | 22 pages, 12 figures | null | null | null | cs.CL | null | In this paper we propose some new measures of language development using
network analyses, which is inspired by the recent surge of interests in network
studies of many real-world systems. Children's and care-takers' speech data
from a longitudinal study are represented as a series of networks, word forms
being taken as nodes and collocation of words as links. Measures on the
properties of the networks, such as size, connectivity, hub and authority
analyses, etc., allow us to make quantitative comparison so as to reveal
different paths of development. For example, the asynchrony of development in
network size and average degree suggests that children cannot be simply
classified as early talkers or late talkers by one or two measures. Children
follow different paths in a multi-dimensional space. They may develop faster in
one dimension but slower in another dimension. The network approach requires
little preprocessing of words and analyses on sentence structures, and the
characteristics of words and their usage emerge from the network and are
independent of any grammatical presumptions. We show that the change of the two
articles "the" and "a" in their roles as important nodes in the network
reflects the progress of children's syntactic development: the two articles
often start in children's networks as hubs and later shift to authorities,
while they are authorities constantly in the adult's networks. The network
analyses provide a new approach to study language development, and at the same
time language development also presents a rich area for network theories to
explore.
| [
{
"version": "v1",
"created": "Wed, 4 Jan 2006 18:33:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ke",
"J-Y",
""
],
[
"Yao",
"Y.",
""
]
] |
cs/0601008 | Ben Moszkowski | Ben Moszkowski | A Hierarchical Analysis of Propositional Temporal Logic Based on
Intervals | 64 pages, revised and expanded version of published work. An earlier
version of this appeared in "We Will Show Them: Essays in Honour of Dov
Gabbay on his 60th Birthday", Volume 2. S. Artemov, H. Barringer, A. S.
d'Avila Garcez, L. C. Lamb, and J. Woods (editors.), pages 371-440, College
Publications (formely KCL Publications), King's College, London, 2005,
http://www.collegepublications.co.uk | null | null | null | cs.LO | null | We present a hierarchical framework for analysing propositional linear-time
temporal logic (PTL) to obtain standard results such as a small model property,
decision procedures and axiomatic completeness. Both finite time and infinite
time are considered and one consequent benefit of the framework is the ability
to systematically reduce infinite-time reasoning to finite-time reasoning. The
treatment of PTL with both the operator Until and past time naturally reduces
to that for PTL without either one. Our method utilises a low-level normal form
for PTL called a "transition configuration". In addition, we employ reasoning
about intervals of time. Besides being hierarchical and interval-based, the
approach differs from other analyses of PTL typically based on sets of formulas
and sequences of such sets. Instead we describe models using time intervals
represented as finite and infinite sequences of states. The analysis relates
larger intervals with smaller ones. Steps involved are expressed in
Propositional Interval Temporal Logic (PITL) which is better suited than PTL
for sequentially combining and decomposing formulas. Consequently, we can
articulate issues in PTL model construction of equal relevance in more
conventional analyses but normally only considered at the metalevel. We also
describe a decision procedure based on Binary Decision Diagrams.
| [
{
"version": "v1",
"created": "Thu, 5 Jan 2006 18:35:38 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jan 2006 23:30:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Moszkowski",
"Ben",
""
]
] |
cs/0601010 | Xiaowen Zhang | Xiaowen Zhang, Li Shu, Ke Tang | Multi-Map Orbit Hopping Chaotic Stream Cipher | 9 pages | null | null | null | cs.CR | null | In this paper we propose a multi-map orbit hopping chaotic stream cipher that
utilizes the idea of spread spectrum mechanism for secure digital
communications and fundamental chaos characteristics of mixing, unpredictable,
and extremely sensitive to initial conditions. The design, key and subkeys, and
detail implementation of the system are addressed. A variable number of well
studied chaotic maps form a map bank. And the key determines how the system
hops between multiple orbits, and it also determines the number of maps, the
number of orbits for each map, and the number of sample points for each orbits.
A detailed example is provided.
| [
{
"version": "v1",
"created": "Thu, 5 Jan 2006 21:52:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Xiaowen",
""
],
[
"Shu",
"Li",
""
],
[
"Tang",
"Ke",
""
]
] |
cs/0601011 | Avner Magen | Hamed Hatami and Avner Magen and Vangelis Markakis | Integrality gaps of semidefinite programs for Vertex Cover and relations
to $\ell_1$ embeddability of Negative Type metrics | A more complete version. Changed order of results. A complete proof
of (current) Theorem 5 | null | null | null | cs.DS cs.DM math.MG | null | We study various SDP formulations for {\sc Vertex Cover} by adding different
constraints to the standard formulation. We show that {\sc Vertex Cover} cannot
be approximated better than $2-o(1)$ even when we add the so called pentagonal
inequality constraints to the standard SDP formulation, en route answering an
open question of Karakostas~\cite{Karakostas}. We further show the surprising
fact that by strengthening the SDP with the (intractable) requirement that the
metric interpretation of the solution is an $\ell_1$ metric, we get an exact
relaxation (integrality gap is 1), and on the other hand if the solution is
arbitrarily close to being $\ell_1$ embeddable, the integrality gap may be as
big as $2-o(1)$. Finally, inspired by the above findings, we use ideas from the
integrality gap construction of Charikar \cite{Char02} to provide a family of
simple examples for negative type metrics that cannot be embedded into $\ell_1$
with distortion better than $8/7-\eps$. To this end we prove a new
isoperimetric inequality for the hypercube.
| [
{
"version": "v1",
"created": "Thu, 5 Jan 2006 23:10:58 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Apr 2006 14:01:50 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Apr 2006 20:17:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hatami",
"Hamed",
""
],
[
"Magen",
"Avner",
""
],
[
"Markakis",
"Vangelis",
""
]
] |
cs/0601013 | Germ\'an Vidal | Josep Silva and Germ\'an Vidal | Forward slicing of functional logic programs by partial evaluation | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.PL cs.LO | null | Program slicing has been mainly studied in the context of imperative
languages, where it has been applied to a wide variety of software engineering
tasks, like program understanding, maintenance, debugging, testing, code reuse,
etc. This work introduces the first forward slicing technique for declarative
multi-paradigm programs which integrate features from functional and logic
programming. Basically, given a program and a slicing criterion (a function
call in our setting), the computed forward slice contains those parts of the
original program which are reachable from the slicing criterion. Our approach
to program slicing is based on an extension of (online) partial evaluation.
Therefore, it provides a simple way to develop program slicing tools from
existing partial evaluators and helps to clarify the relation between both
methodologies. A slicing tool for the multi-paradigm language Curry, which
demonstrates the usefulness of our approach, has been implemented in Curry
itself.
| [
{
"version": "v1",
"created": "Fri, 6 Jan 2006 00:41:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Silva",
"Josep",
""
],
[
"Vidal",
"Germán",
""
]
] |
cs/0601018 | Miguel Palomino | Miguel Palomino | A comparison between two logical formalisms for rewriting | 31 pages, 2 figures To appear in Theory and Practice of Logic
Programming | null | null | null | cs.LO | null | Meseguer's rewriting logic and the rewriting logic CRWL are two well-known
approaches to rewriting as logical deduction that, despite some clear
similarities, were designed with different objectives. Here we study the
relationships between them, both at a syntactic and at a semantic level. Even
though it is not possible to establish an entailment system map between them,
both can be naturally simulated in each other. Semantically, there is no
embedding between the corresponding institutions. Along the way, the notions of
entailment and satisfaction in Meseguer's rewriting logic are generalized. We
also use the syntactic results to prove reflective properties of CRWL.
| [
{
"version": "v1",
"created": "Fri, 6 Jan 2006 12:01:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Palomino",
"Miguel",
""
]
] |
cs/0601019 | Antoine Reilles | Antoine Reilles (INRIA Lorraine - LORIA) | Canonical Abstract Syntax Trees | null | Dans Workshop on Rewriting Techniques and Applications (2006) | null | null | cs.PL | null | This paper presents Gom, a language for describing abstract syntax trees and
generating a Java implementation for those trees. Gom includes features
allowing the user to specify and modify the interface of the data structure.
These features provide in particular the capability to maintain the internal
representation of data in canonical form with respect to a rewrite system. This
explicitly guarantees that the client program only manipulates normal forms for
this rewrite system, a feature which is only implicitly used in many
implementations.
| [
{
"version": "v1",
"created": "Fri, 6 Jan 2006 19:50:29 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Nov 2006 13:02:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Reilles",
"Antoine",
"",
"INRIA Lorraine - LORIA"
]
] |
cs/0601020 | William Yurcik | Ruperto P. Majuca, William Yurcik, Jay P. Kesan | The Evolution of Cyberinsurance | 16 pages, 6 tables, 2 figures | null | null | null | cs.CR cs.CY | null | Cyberinsurance is a powerful tool to align market incentives toward improving
Internet security. We trace the evolution of cyberinsurance from traditional
insurance policies to early cyber-risk insurance policies to current
comprehensive cyberinsurance products. We find that increasing Internet
security risk in combination with the need for compliance with recent corporate
legislation has contributed significantly to the demand for cyberinsurance.
Cyberinsurance policies have become more comprehensive as insurers better
understand the risk landscape and specific business needs. More specifically,
cyberinsurers are addressing what used to be considered insurmountable problems
(e.g., adverse selection/asymmetric information, moral hazard, etc.) that could
lead to a failure of this market solution. Although some implementation issues
remain, we suggest the future development of cyberinsurance will resolve these
issues as evidenced by insurance solutions in other risk domains.
| [
{
"version": "v1",
"created": "Fri, 6 Jan 2006 20:29:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Majuca",
"Ruperto P.",
""
],
[
"Yurcik",
"William",
""
],
[
"Kesan",
"Jay P.",
""
]
] |
cs/0601021 | Alexander Haubold | Alexander Haubold | Lighting Control using Pressure-Sensitive Touchpads | null | null | null | null | cs.HC | null | We introduce a novel approach to control physical lighting parameters by
means of a pressure-sensitive touchpad. The two-dimensional area of the
touchpad is subdivided into 5 virtual sliders, each controlling the intensity
of a color (red, green, blue, yellow, and white). The physical interaction
methodology is modeled directly after ubiquitous mechanical sliders and dimmers
which tend to be used for intensity/volume control. Our abstraction to a
pressure-sensitive touchpad provides advantages and introduces additional
benefits over such existing devices.
| [
{
"version": "v1",
"created": "Sat, 7 Jan 2006 11:06:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
]
] |
cs/0601024 | Xu Hong | Hong Xu and Wen-Feng Qi | Further Results on the Distinctness of Decimations of l-sequences | submitted to IEEE-IT | null | null | null | cs.CR | null | Let $\underline{a}$ be an \textit{l}-sequence generated by a
feedback-with-carry shift register with connection integer $q=p^{e}$, where $
p$ is an odd prime and $e\geq 1$. Goresky and Klapper conjectured that when $
p^{e}\notin \{5,9,11,13\}$, all decimations of $\underline{a}$ are cyclically
distinct. When $e=1$ and $p>13$, they showed that the set of distinct
decimations is large and, in some cases, all deciamtions are distinct. In this
article, we further show that when $e\geq 2$ and$ p^{e}\neq 9$, all decimations
of $\underline{a}$ are also cyclically distinct.
| [
{
"version": "v1",
"created": "Mon, 9 Jan 2006 11:26:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Xu",
"Hong",
""
],
[
"Qi",
"Wen-Feng",
""
]
] |
cs/0601026 | Nicholas Harvey | Nicholas J. A. Harvey | Algebraic Structures and Algorithms for Matching and Matroid Problems
(Preliminary Version) | null | null | null | null | cs.DS cs.DM | null | Basic path-matchings, introduced by Cunningham and Geelen (FOCS 1996), are a
common generalization of matroid intersection and non-bipartite matching. The
main results of this paper are a new algebraic characterization of basic
path-matching problems and an algorithm for constructing basic path-matchings
in O(n^w) time, where n is the number of vertices and w is the exponent for
matrix multiplication. Our algorithms are randomized, and our approach assumes
that the given matroids are linear and can be represented over the same field.
Our main results have interesting consequences for several special cases of
path-matching problems. For matroid intersection, we obtain an algorithm with
running time O(nr^(w-1))=O(nr^1.38), where the matroids have n elements and
rank r. This improves the long-standing bound of O(nr^1.62) due to Gabow and Xu
(FOCS 1989). Also, we obtain a simple, purely algebraic algorithm for
non-bipartite matching with running time O(n^w). This resolves the central open
problem of Mucha and Sankowski (FOCS 2004).
| [
{
"version": "v1",
"created": "Mon, 9 Jan 2006 13:54:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Harvey",
"Nicholas J. A.",
""
]
] |
cs/0601033 | Martin Kutz | Rolf Klein and Martin Kutz | The density of iterated crossing points and a gap result for
triangulations of finite point sets | 10 pages + appendix | null | null | null | cs.CG | null | Consider a plane graph G, drawn with straight lines. For every pair a,b of
vertices of G, we compare the shortest-path distance between a and b in G (with
Euclidean edge lengths) to their actual distance in the plane. The worst-case
ratio of these two values, for all pairs of points, is called the dilation of
G. All finite plane graphs of dilation 1 have been classified. They are closely
related to the following iterative procedure. For a given point set P in R^2,
we connect every pair of points in P by a line segment and then add to P all
those points where two such line segments cross. Repeating this process
infinitely often, yields a limit point set P*.
The main result of this paper is the following gap theorem: For any finite
point set P in the plane for which the above P* is infinite, there exists a
threshold t > 1 such that P is not contained in the vertex set of any finite
plane graph of dilation at most t. We construct a concrete point set Q such
that any planar graph that contains this set amongst its vertices must have a
dilation larger than 1.0000047.
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 01:13:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Klein",
"Rolf",
""
],
[
"Kutz",
"Martin",
""
]
] |
cs/0601034 | Vicky Weissman | Joseph Y. Halpern and Vicky Weissman | Using First-Order Logic to Reason about Policies | 39 pages, earlier version in Proceedings of the Sixteenth IEEE
Computer Security Foundations Workshop, 2003, pp. 187-201 | null | null | null | cs.LO cs.CR | null | A policy describes the conditions under which an action is permitted or
forbidden. We show that a fragment of (multi-sorted) first-order logic can be
used to represent and reason about policies. Because we use first-order logic,
policies have a clear syntax and semantics. We show that further restricting
the fragment results in a language that is still quite expressive yet is also
tractable. More precisely, questions about entailment, such as `May Alice
access the file?', can be answered in time that is a low-order polynomial
(indeed, almost linear in some cases), as can questions about the consistency
of policy sets.
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 04:30:49 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Jan 2006 12:58:59 GMT"
},
{
"version": "v3",
"created": "Mon, 15 May 2006 15:10:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Weissman",
"Vicky",
""
]
] |
cs/0601035 | Francois Colonna | Francois Colonna (LCT) | Deductive Object Programming | 20 pages | null | null | null | cs.SE | null | We propose some slight additions to O-O languages to implement the necessary
features for using Deductive Object Programming (DOP). This way of programming
based upon the manipulation of the Production Tree of the Objects of Interest,
result in making Persistent these Objects and in sensibly lowering the code
complexity.
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 09:50:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Colonna",
"Francois",
"",
"LCT"
]
] |
cs/0601037 | Giorgio Delzanno | Giorgio Delzanno | Constraint-based verification of abstract models of multitreaded
programs | To appear in Theory and Practice of Logic Programming | null | null | null | cs.CL cs.PL | null | We present a technique for the automated verification of abstract models of
multithreaded programs providing fresh name generation, name mobility, and
unbounded control.
As high level specification language we adopt here an extension of
communication finite-state machines with local variables ranging over an
infinite name domain, called TDL programs. Communication machines have been
proved very effective for representing communication protocols as well as for
representing abstractions of multithreaded software.
The verification method that we propose is based on the encoding of TDL
programs into a low level language based on multiset rewriting and constraints
that can be viewed as an extension of Petri Nets. By means of this encoding,
the symbolic verification procedure developed for the low level language in our
previous work can now be applied to TDL programs. Furthermore, the encoding
allows us to isolate a decidable class of verification problems for TDL
programs that still provide fresh name generation, name mobility, and unbounded
control. Our syntactic restrictions are in fact defined on the internal
structure of threads: In order to obtain a complete and terminating method,
threads are only allowed to have at most one local variable (ranging over an
infinite domain of names).
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 12:57:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Delzanno",
"Giorgio",
""
]
] |
cs/0601038 | Giorgio Delzanno | Giorgio Delzanno | Constraint-based automatic verification of abstract models of
multithreaded programs | To appear in Theory and Practice of Logic Programming | null | null | null | cs.LO cs.PL | null | We present a technique for the automated verification of abstract models of
multithreaded programs providing fresh name generation, name mobility, and
unbounded control.
As high level specification language we adopt here an extension of
communication finite-state machines with local variables ranging over an
infinite name domain, called TDL programs. Communication machines have been
proved very effective for representing communication protocols as well as for
representing abstractions of multithreaded software.
The verification method that we propose is based on the encoding of TDL
programs into a low level language based on multiset rewriting and constraints
that can be viewed as an extension of Petri Nets. By means of this encoding,
the symbolic verification procedure developed for the low level language in our
previous work can now be applied to TDL programs. Furthermore, the encoding
allows us to isolate a decidable class of verification problems for TDL
programs that still provide fresh name generation, name mobility, and unbounded
control. Our syntactic restrictions are in fact defined on the internal
structure of threads: In order to obtain a complete and terminating method,
threads are only allowed to have at most one local variable (ranging over an
infinite domain of names).
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 12:57:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Delzanno",
"Giorgio",
""
]
] |
cs/0601039 | Santiago Escobar | Maria Alpuente, Santiago Escobar, Salvador Lucas | Removing Redundant Arguments Automatically | Accepted for publication in Theory and Practice of Logic Programming | null | null | null | cs.PL | null | The application of automatic transformation processes during the formal
development and optimization of programs can introduce encumbrances in the
generated code that programmers usually (or presumably) do not write. An
example is the introduction of redundant arguments in the functions defined in
the program. Redundancy of a parameter means that replacing it by any
expression does not change the result. In this work, we provide methods for the
analysis and elimination of redundant arguments in term rewriting systems as a
model for the programs that can be written in more sophisticated languages. On
the basis of the uselessness of redundant arguments, we also propose an erasure
procedure which may avoid wasteful computations while still preserving the
semantics (under ascertained conditions). A prototype implementation of these
methods has been undertaken, which demonstrates the practicality of our
approach.
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 13:13:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alpuente",
"Maria",
""
],
[
"Escobar",
"Santiago",
""
],
[
"Lucas",
"Salvador",
""
]
] |
cs/0601042 | Christoph Benzm?ller Dr | Christoph Benzmueller, John Harrison, and Carsten Schuermann (Eds.) | LPAR-05 Workshop: Empirically Successfull Automated Reasoning in
Higher-Order Logic (ESHOL) | Workshop Proceedings | null | null | null | cs.AI cs.LO | null | This workshop brings together practioners and researchers who are involved in
the everyday aspects of logical systems based on higher-order logic. We hope to
create a friendly and highly interactive setting for discussions around the
following four topics. Implementation and development of proof assistants based
on any notion of impredicativity, automated theorem proving tools for
higher-order logic reasoning systems, logical framework technology for the
representation of proofs in higher-order logic, formal digital libraries for
storing, maintaining and querying databases of proofs.
We envision attendees that are interested in fostering the development and
visibility of reasoning systems for higher-order logics. We are particularly
interested in a discusssion on the development of a higher-order version of the
TPTP and in comparisons of the practical strengths of automated higher-order
reasoning systems. Additionally, the workshop includes system demonstrations.
ESHOL is the successor of the ESCAR and ESFOR workshops held at CADE 2005 and
IJCAR 2004.
| [
{
"version": "v1",
"created": "Tue, 10 Jan 2006 18:43:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Benzmueller",
"Christoph",
"",
"Eds."
],
[
"Harrison",
"John",
"",
"Eds."
],
[
"Schuermann",
"Carsten",
"",
"Eds."
]
] |
cs/0601045 | Lillian Lee | Oren Kurland and Lillian Lee | PageRank without hyperlinks: Structural re-ranking using links induced
by language models | null | Proceedings of SIGIR 2005, pp. 306--313 | null | null | cs.IR cs.CL | null | Inspired by the PageRank and HITS (hubs and authorities) algorithms for Web
search, we propose a structural re-ranking approach to ad hoc information
retrieval: we reorder the documents in an initially retrieved set by exploiting
asymmetric relationships between them. Specifically, we consider generation
links, which indicate that the language model induced from one document assigns
high probability to the text of another; in doing so, we take care to prevent
bias against long documents. We study a number of re-ranking criteria based on
measures of centrality in the graphs formed by generation links, and show that
integrating centrality into standard language-model-based retrieval is quite
effective at improving precision at top ranks.
| [
{
"version": "v1",
"created": "Wed, 11 Jan 2006 21:27:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kurland",
"Oren",
""
],
[
"Lee",
"Lillian",
""
]
] |
cs/0601046 | Lillian Lee | Oren Kurland, Lillian Lee, Carmel Domshlak | Better than the real thing? Iterative pseudo-query processing using
cluster-based language models | null | Proceedings of SIGIR 2005, pp. 19--26 | null | null | cs.IR cs.CL | null | We present a novel approach to pseudo-feedback-based ad hoc retrieval that
uses language models induced from both documents and clusters. First, we treat
the pseudo-feedback documents produced in response to the original query as a
set of pseudo-queries that themselves can serve as input to the retrieval
process. Observing that the documents returned in response to the
pseudo-queries can then act as pseudo-queries for subsequent rounds, we arrive
at a formulation of pseudo-query-based retrieval as an iterative process.
Experiments show that several concrete instantiations of this idea, when
applied in conjunction with techniques designed to heighten precision, yield
performance results rivaling those of a number of previously-proposed
algorithms, including the standard language-modeling approach. The use of
cluster-based language models is a key contributing factor to our algorithms'
success.
| [
{
"version": "v1",
"created": "Wed, 11 Jan 2006 21:47:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kurland",
"Oren",
""
],
[
"Lee",
"Lillian",
""
],
[
"Domshlak",
"Carmel",
""
]
] |
cs/0601047 | Juan J. Merelo Pr. | Lourdes Araujo and Juan J. Merelo | Automatic Detection of Trends in Dynamical Text: An Evolutionary
Approach | 22 pages, submitted to Journal of Information Retrieval | null | null | null | cs.IR cs.NE | null | This paper presents an evolutionary algorithm for modeling the arrival dates
of document streams, which is any time-stamped collection of documents, such as
newscasts, e-mails, IRC conversations, scientific journals archives and weblog
postings. This algorithm assigns frequencies (number of document arrivals per
time unit) to time intervals so that it produces an optimal fit to the data.
The optimization is a trade off between accurately fitting the data and
avoiding too many frequency changes; this way the analysis is able to find fits
which ignore the noise. Classical dynamic programming algorithms are limited by
memory and efficiency requirements, which can be a problem when dealing with
long streams. This suggests to explore alternative search methods which allow
for some degree of uncertainty to achieve tractability. Experiments have shown
that the designed evolutionary algorithm is able to reach the same solution
quality as those classical dynamic programming algorithms in a shorter time. We
have also explored different probabilistic models to optimize the fitting of
the date streams, and applied these algorithms to infer whether a new arrival
increases or decreases {\em interest} in the topic the document stream is
about.
| [
{
"version": "v1",
"created": "Thu, 12 Jan 2006 20:23:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Araujo",
"Lourdes",
""
],
[
"Merelo",
"Juan J.",
""
]
] |
cs/0601049 | Tony Thomas | Tony Thomas, Arbind Kumar Lal | Undeniable Signature Schemes Using Braid Groups | null | null | null | null | cs.CR | null | Artin's braid groups have been recently suggested as a new source for
public-key cryptography. In this paper we propose the first undeniable
signature schemes using the conjugacy problem and the decomposition problem in
the braid groups which are believed to be hard problems.
| [
{
"version": "v1",
"created": "Fri, 13 Jan 2006 07:33:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thomas",
"Tony",
""
],
[
"Lal",
"Arbind Kumar",
""
]
] |
cs/0601050 | Alex Vinokur Dr. | Alex Vinokur | Computing Fibonacci numbers on a Turing Machine | 5 pages, 1 table | null | null | null | cs.DM | null | A Turing machine that computes Fibonacci numbers is described.
| [
{
"version": "v1",
"created": "Fri, 13 Jan 2006 14:27:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vinokur",
"Alex",
""
]
] |
cs/0601051 | Enrico Pontelli | Tran Cao Son and Enrico Pontelli | A Constructive Semantic Characterization of Aggregates in ASP | 21 pages | null | null | null | cs.AI cs.LO cs.PL cs.SC | null | This technical note describes a monotone and continuous fixpoint operator to
compute the answer sets of programs with aggregates. The fixpoint operator
relies on the notion of aggregate solution. Under certain conditions, this
operator behaves identically to the three-valued immediate consequence operator
$\Phi^{aggr}_P$ for aggregate programs, independently proposed Pelov et al.
This operator allows us to closely tie the computational complexity of the
answer set checking and answer sets existence problems to the cost of checking
a solution of the aggregates in the program. Finally, we relate the semantics
described by the operator to other proposals for logic programming with
aggregates.
To appear in Theory and Practice of Logic Programming (TPLP).
| [
{
"version": "v1",
"created": "Fri, 13 Jan 2006 16:09:36 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Feb 2006 18:31:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Son",
"Tran Cao",
""
],
[
"Pontelli",
"Enrico",
""
]
] |
cs/0601052 | Subhash Kak | Subhash Kak | Artificial and Biological Intelligence | 16 pages | ACM Ubiquity, vol. 6, number 42, 2005, pp. 1-20 | null | null | cs.AI | null | This article considers evidence from physical and biological sciences to show
machines are deficient compared to biological systems at incorporating
intelligence. Machines fall short on two counts: firstly, unlike brains,
machines do not self-organize in a recursive manner; secondly, machines are
based on classical logic, whereas Nature's intelligence may depend on quantum
mechanics.
| [
{
"version": "v1",
"created": "Fri, 13 Jan 2006 19:01:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kak",
"Subhash",
""
]
] |
cs/0601053 | Vedran Kordic | Adel Al-Jumaily & Cindy Leung | Wavefront Propagation and Fuzzy Based Autonomous Navigation | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | Path planning and obstacle avoidance are the two major issues in any
navigation system. Wavefront propagation algorithm, as a good path planner, can
be used to determine an optimal path. Obstacle avoidance can be achieved using
possibility theory. Combining these two functions enable a robot to
autonomously navigate to its destination. This paper presents the approach and
results in implementing an autonomous navigation system for an indoor mobile
robot. The system developed is based on a laser sensor used to retrieve data to
update a two dimensional world model of therobot environment. Waypoints in the
path are incorporated into the obstacle avoidance. Features such as ageing of
objects and smooth motion planning are implemented to enhance efficiency and
also to cater for dynamic environments.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:09:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Al-Jumaily",
"Adel",
""
],
[
"Leung",
"Cindy",
""
]
] |
cs/0601054 | Vedran Kordic | Victor Etxebarria, Arantza Sanz & Ibone Lizarraga | Control of a Lightweight Flexible Robotic Arm Using Sliding Modes | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | This paper presents a robust control scheme for flexible link robotic
manipulators, which is based on considering the flexible mechanical structure
as a system with slow (rigid) and fast (flexible) modes that can be controlled
separately. The rigid dynamics is controlled by means of a robust sliding-mode
approach with wellestablished stability properties while an LQR optimal design
is adopted for the flexible dynamics. Experimental results show that this
composite approach achieves good closed loop tracking properties both for the
rigid and the flexible dynamics.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:10:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Etxebarria",
"Victor",
""
],
[
"Sanz",
"Arantza",
""
],
[
"Lizarraga",
"Ibone",
""
]
] |
cs/0601055 | Vedran Kordic | Alborz Geramifard, Peyman Nayeri, Reza Zamani-Nasab & Jafar Habibi | A Hybrid Three Layer Architecture for Fire Agent Management in Rescue
Simulation Environment | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | This paper presents a new architecture called FAIS for imple- menting
intelligent agents cooperating in a special Multi Agent environ- ment, namely
the RoboCup Rescue Simulation System. This is a layered architecture which is
customized for solving fire extinguishing problem. Structural decision making
algorithms are combined with heuristic ones in this model, so it's a hybrid
architecture.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:12:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Geramifard",
"Alborz",
""
],
[
"Nayeri",
"Peyman",
""
],
[
"Zamani-Nasab",
"Reza",
""
],
[
"Habibi",
"Jafar",
""
]
] |
cs/0601056 | Vedran Kordic | Panfeng Huang, Yangsheng Xu & Bin Liang | Dynamic Balance Control of Multi-arm Free-Floating Space Robots | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | This paper investigates the problem of the dynamic balance control of
multi-arm free-floating space robot during capturing an active object in close
proximity. The position and orientation of space base will be affected during
the operation of space manipulator because of the dynamics coupling between the
manipulator and space base. This dynamics coupling is unique characteristics of
space robot system. Such a disturbance will produce a serious impact between
the manipulator hand and the object. To ensure reliable and precise operation,
we propose to develop a space robot system consisting of two arms, with one arm
(mission arm) for accomplishing the capture mission, and the other one (balance
arm) compensating for the disturbance of the base. We present the coordinated
control concept for balance of the attitude of the base using the balance arm.
The mission arm can move along the given trajectory to approach and capture the
target with no considering the disturbance from the coupling of the base. We
establish a relationship between the motion of two arm that can realize the
zeros reaction to the base. The simulation studies verified the validity and
efficiency of the proposed control method.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:13:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huang",
"Panfeng",
""
],
[
"Xu",
"Yangsheng",
""
],
[
"Liang",
"Bin",
""
]
] |
cs/0601057 | Vedran Kordic | Musa Mailah, Endra Pitowarno & Hishamuddin Jamaluddin | Robust Motion Control for Mobile Manipulator Using Resolved Acceleration
and Proportional-Integral Active Force Control | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | A resolved acceleration control (RAC) and proportional-integral active force
control (PIAFC) is proposed as an approach for the robust motion control of a
mobile manipulator (MM) comprising a differentially driven wheeled mobile
platform with a two-link planar arm mounted on top of the platform. The study
emphasizes on the integrated kinematic and dynamic control strategy in which
the RAC is used to manipulate the kinematic component while the PIAFC is
implemented to compensate the dynamic effects including the bounded
known/unknown disturbances and uncertainties. The effectivenss and robustness
of the proposed scheme are investigated through a rigorous simulation study and
later complemented with experimental results obtained through a number of
experiments performed on a fully developed working prototype in a laboratory
environment. A number of disturbances in the form of vibratory and impact
forces are deliberately introduced into the system to evaluate the system
performances. The investigation clearly demonstrates the extreme robustness
feature of the proposed control scheme compared to other systems considered in
the study.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:14:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mailah",
"Musa",
""
],
[
"Pitowarno",
"Endra",
""
],
[
"Jamaluddin",
"Hishamuddin",
""
]
] |
cs/0601058 | Vedran Kordic | Michael Sdahl & Bernd Kuhlenkoetter | CAGD - Computer Aided Gripper Design for a Flexible Gripping System | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | This paper is a summary of the recently accomplished research work on
flexible gripping systems. The goal is to develop a gripper which can be used
for a great amount of geometrically variant workpieces. The economic aspect is
of particular importance during the whole development. The high flexibility of
the gripper is obtained by three parallel used principles. These are human and
computer based analysis of the gripping object as well as mechanical adaptation
of the gripper to the object with the help of servo motors. The focus is on the
gripping of free-form surfaces with suction cup.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:15:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sdahl",
"Michael",
""
],
[
"Kuhlenkoetter",
"Bernd",
""
]
] |
cs/0601059 | Vedran Kordic | Shu-qin Li, Lan Shuai, Xian-yi Cheng, Zhen-min Tang & Jing-yu Yang | A Descriptive Model of Robot Team and the Dynamic Evolution of Robot
Team Cooperation | null | International Journal of Advanced Robotics Systems, Vol.2No2.
(2005) | null | null | cs.RO | null | At present, the research on robot team cooperation is still in qualitative
analysis phase and lacks the description model that can quantitatively describe
the dynamical evolution of team cooperative relationships with constantly
changeable task demand in Multi-robot field. First this paper whole and static
describes organization model HWROM of robot team, then uses Markov course and
Bayesian theorem for reference, dynamical describes the team cooperative
relationships building. Finally from cooperative entity layer, ability layer
and relative layer we research team formation and cooperative mechanism, and
discuss how to optimize relative action sets during the evolution. The dynamic
evolution model of robot team and cooperative relationships between robot teams
proposed and described in this paper can not only generalize the robot team as
a whole, but also depict the dynamic evolving process quantitatively. Users can
also make the prediction of the cooperative relationship and the action of the
robot team encountering new demands based on this model. Journal web page & a
lot of robotic related papers www.ars-journal.com
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:18:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Shu-qin",
""
],
[
"Shuai",
"Lan",
""
],
[
"Cheng",
"Xian-yi",
""
],
[
"Tang",
"Zhen-min",
""
],
[
"Yang",
"Jing-yu",
""
]
] |
cs/0601060 | Vedran Kordic | Olga Bogatyreva & Alexandr Shillerov | Robot Swarms in an Uncertain World: Controllable Adaptability | Journal web page & a lot of robotic related papers
www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No3.
(2005) | null | null | cs.RO | null | There is a belief that complexity and chaos are essential for adaptability.
But life deals with complexity every moment, without the chaos that engineers
fear so, by invoking goal-directed behaviour. Goals can be programmed. That is
why living organisms give us hope to achieve adaptability in robots. In this
paper a method for the description of a goal-directed, or programmed,
behaviour, interacting with uncertainty of environment, is described. We
suggest reducing the structural (goals, intentions) and stochastic components
(probability to realise the goal) of individual behaviour to random variables
with nominal values to apply probabilistic approach. This allowed us to use a
Normalized Entropy Index to detect the system state by estimating the
contribution of each agent to the group behaviour. The number of possible group
states is 27. We argue that adaptation has a limited number of possible paths
between these 27 states. Paths and states can be programmed so that after
adjustment to any particular case of task and conditions, adaptability will
never involve chaos. We suggest the application of the model to operation of
robots or other devices in remote and/or dangerous places.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:20:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bogatyreva",
"Olga",
""
],
[
"Shillerov",
"Alexandr",
""
]
] |
cs/0601061 | Vedran Kordic | I. Topalova | Modular Adaptive System Based on a Multi-Stage Neural Structure for
Recognition of 2D Objects of Discontinuous Production | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No1.
(2005) | null | null | cs.RO | null | This is a presentation of a new system for invariant recognition of 2D
objects with overlapping classes, that can not be effectively recognized with
the traditional methods. The translation, scale and partial rotation invariant
contour object description is transformed in a DCT spectrum space. The obtained
frequency spectrums are decomposed into frequency bands in order to feed
different BPG neural nets (NNs). The NNs are structured in three stages -
filtering and full rotation invariance; partial recognition; general
classification. The designed multi-stage BPG Neural Structure shows very good
accuracy and flexibility when tested with 2D objects used in the discontinuous
production. The reached speed and the opportunuty for an easy restructuring and
reprogramming of the system makes it suitable for application in different
applied systems for real time work.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:25:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Topalova",
"I.",
""
]
] |
cs/0601062 | Vedran Kordic | Ceng Xian-yi, Li Shu-qin & Xia De-shen | Study of Self-Organization Model of Multiple Mobile Robot | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No3.
(2005) | null | null | cs.RO | null | A good organization model of multiple mobile robot should be able to improve
the efficiency of the system, reduce the complication of robot interactions,
and detract the difficulty of computation. From the sociology aspect of
topology, structure and organization, this paper studies the multiple mobile
robot organization formation and running mechanism in the dynamic, complicated
and unknown environment. It presents and describes in detail a Hierarchical-
Web Recursive Organization Model (HWROM) and forming algorithm. It defines the
robot society leader; robotic team leader and individual robot as the same
structure by the united framework and describes the organization model by the
recursive structure. The model uses task-oriented and top-down method to
dynamically build and maintain structures and organization. It uses
market-based techniques to assign task, form teams and allocate resources in
dynamic environment. The model holds several characteristics of
self-organization, dynamic, conciseness, commonness and robustness.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:27:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Xian-yi",
"Ceng",
""
],
[
"Shu-qin",
"Li",
""
],
[
"De-shen",
"Xia",
""
]
] |
cs/0601063 | Vedran Kordic | Atef A. Ata & Thi Rein Myo | Optimal Point-to-Point Trajectory Tracking of Redundant Manipulators
using Generalized Pattern Search | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No3.
(2005) | null | null | cs.RO | null | Optimal point-to-point trajectory planning for planar redundant manipulator
is considered in this study. The main objective is to minimize the sum of the
position error of the end-effector at each intermediate point along the
trajectory so that the end-effector can track the prescribed trajectory
accurately. An algorithm combining Genetic Algorithm and Pattern Search as a
Generalized Pattern Search GPS is introduced to design the optimal trajectory.
To verify the proposed algorithm, simulations for a 3-D-O-F planar manipulator
with different end-effector trajectories have been carried out. A comparison
between the Genetic Algorithm and the Generalized Pattern Search shows that The
GPS gives excellent tracking performance.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:29:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ata",
"Atef A.",
""
],
[
"Myo",
"Thi Rein",
""
]
] |
cs/0601064 | Vedran Kordic | Chua Kia & Mohd Rizal Arshad | Robotics Vision-based Heuristic Reasoning for Underwater Target Tracking
and Navigation | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No3.
(2005) | null | null | cs.RO | null | This paper presents a robotics vision-based heuristic reasoning system for
underwater target tracking and navigation. This system is introduced to improve
the level of automation of underwater Remote Operated Vehicles (ROVs)
operations. A prototype which combines computer vision with an underwater
robotics system is successfully designed and developed to perform target
tracking and intelligent navigation. ...
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:34:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kia",
"Chua",
""
],
[
"Arshad",
"Mohd Rizal",
""
]
] |
cs/0601065 | Vedran Kordic | Nazim Mir-Nasiri & Sulaiman Hussaini | New Intelligent Transmission Concept for Hybrid Mobile Robot Speed
Control | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No3.
(2005) | null | null | cs.RO | null | This paper presents a new concept of a mobile robot speed control by using
two degree of freedom gear transmission. The developed intelligent speed
controller utilizes a gear box which comprises of epicyclic gear train with two
inputs, one coupled with the engine shaft and another with the shaft of a
variable speed dc motor. The net output speed is a combination of the two input
speeds and is governed by the transmission ratio of the planetary gear train.
This new approach eliminates the use of a torque converter which is otherwise
an indispensable part of all available automatic transmissions, thereby
reducing the power loss that occurs in the box during the fluid coupling. By
gradually varying the speed of the dc motor a stepless transmission has been
achieved. The other advantages of the developed controller are pulling over and
reversing the vehicle, implemented by intelligent mixing of the dc motor and
engine speeds. This approach eliminates traditional braking system in entire
vehicle design. The use of two power sources, IC engine and battery driven DC
motor, utilizes the modern idea of hybrid vehicles. The new mobile robot speed
controller is capable of driving the vehicle even in extreme case of IC engine
failure, for example, due to gas depletion.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 08:35:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mir-Nasiri",
"Nazim",
""
],
[
"Hussaini",
"Sulaiman",
""
]
] |
cs/0601068 | Sorav Bansal | Sorav Bansal | Checkbochs: Use Hardware to Check Software | 4 pages, 4 figures | null | null | null | cs.OS cs.CR | null | In this paper, we present a system called Checkbochs, a machine simulator
that checks rules about its guest operating system and applications at the
hardware level. The properties to be checked can be implemented as `plugins' in
the Checkbochs simulator. Some of the properties that were checked using
Checkbochs include null-pointer checks, format-string vulnerabilities,
user/kernel pointer checks, and race-conditions. On implementing these checks,
we were able to uncover previously-unknown bugs in widely used Linux
distributions. We also tested our tools on undergraduate coursework, and found
numerous bugs.
| [
{
"version": "v1",
"created": "Sat, 14 Jan 2006 23:21:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bansal",
"Sorav",
""
]
] |
cs/0601069 | Boris Ryabko | Boris Ryabko | Fast Enumeration of Combinatorial Objects | null | published in Discrete Math.and Applications, v.10, n2, 1998 | null | null | cs.CC cs.DM | null | The problem of ranking can be described as follows. We have a set of
combinatorial objects $S$, such as, say, the k-subsets of n things, and we can
imagine that they have been arranged in some list, say lexicographically, and
we want to have a fast method for obtaining the rank of a given object in the
list. This problem is widely known in Combinatorial Analysis, Computer Science
and Information Theory. Ranking is closely connected with the hashing problem,
especially with perfect hashing and with generating of random combinatorial
objects. In Information Theory the ranking problem is closely connected with
so-called enumerative encoding, which may be described as follows: there is a
set of words $S$ and an enumerative code has to one-to-one encode every $s \in
S$ by a binary word $code(s)$. The length of the $code(s)$ must be the same for
all $s \in S$. Clearly, $|code (s)|\geq \log |S|$. (Here and below $\log
x=\log_{2}x)$.) The suggested method allows the exponential growth of the speed
of encoding and decoding for all combinatorial problems of enumeration which
are considered, including the enumeration of permutations, compositions and
others.
| [
{
"version": "v1",
"created": "Sun, 15 Jan 2006 13:55:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ryabko",
"Boris",
""
]
] |
cs/0601071 | Antonio J. Fernandez | Antonio J. Fernandez, Teresa Hortala-Gonzalez, Fernando Saenz-Perez
and Rafael del Vado-Virseda | Constraint Functional Logic Programming over Finite Domains | Accepted for publication in Theory and Practice of Logic programming
(TPLP); 47 pages | null | null | null | cs.PL | null | In this paper, we present our proposal to Constraint Functional Logic
Programming over Finite Domains (CFLP(FD)) with a lazy functional logic
programming language which seamlessly embodies finite domain (FD) constraints.
This proposal increases the expressiveness and power of constraint logic
programming over finite domains (CLP(FD)) by combining functional and
relational notation, curried expressions, higher-order functions, patterns,
partial applications, non-determinism, lazy evaluation, logical variables,
types, domain variables, constraint composition, and finite domain constraints.
We describe the syntax of the language, its type discipline, and its
declarative and operational semantics. We also describe TOY(FD), an
implementation for CFLPFD(FD), and a comparison of our approach with respect to
CLP(FD) from a programming point of view, showing the new features we
introduce. And, finally, we show a performance analysis which demonstrates that
our implementation is competitive with respect to existing CLP(FD) systems and
that clearly outperforms the closer approach to CFLP(FD).
| [
{
"version": "v1",
"created": "Mon, 16 Jan 2006 11:45:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fernandez",
"Antonio J.",
""
],
[
"Hortala-Gonzalez",
"Teresa",
""
],
[
"Saenz-Perez",
"Fernando",
""
],
[
"del Vado-Virseda",
"Rafael",
""
]
] |
cs/0601076 | Kuan-San Ooi | K. S. Ooi | Learning by Test-infecting Symmetric Ciphers | null | null | null | null | cs.CR | null | We describe a novel way in which students can learn the cipher systems
without much supervision. In this work we focus on learning symmetric ciphers
by altering them using the agile development approach. Two agile approaches the
eXtreme Programming (XP) and the closely related Test-Driven Development (TDD)
are mentioned or discussed. To facilitate this development we experiment with
an approach that is based on refactoring, with JUnit serves as the automatic
testing framework. In this work we exemplify our learning approach by
test-infecting the Vernam cipher, an aged but still widely used stream cipher.
One can replace the cipher with another symmetric cipher with the same
behavior. Software testing is briefly described. Just-in-time introduction to
Object-oriented programming (OOP), exemplified by using JavaTM, is advocated.
Refactoring exercises, as argued, are kept strategically simple so that they do
not become intensive class redesign exercises. The use of free or open-source
tools and frameworks is mentioned.
| [
{
"version": "v1",
"created": "Tue, 17 Jan 2006 08:48:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ooi",
"K. S.",
""
]
] |
cs/0601078 | Benjamin Gaidioz | Benjamin Gaidioz, Birger Koblitz, Nuno Santos | Exploring high performance distributed file storage using LDPC codes | null | null | null | null | cs.DC | null | We explore the feasibility of implementing a reliable, high performance,
distributed storage system on a commodity computing cluster. Files are
distributed across storage nodes using erasure coding with small Low-Density
Parity-Check (LDPC) codes which provide high reliability while keeping the
storage and performance overhead small. We present performance measurements
done on a prototype system comprising 50 nodes which are self organised using a
peer-to-peer overlay.
| [
{
"version": "v1",
"created": "Tue, 17 Jan 2006 13:30:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gaidioz",
"Benjamin",
""
],
[
"Koblitz",
"Birger",
""
],
[
"Santos",
"Nuno",
""
]
] |
cs/0601079 | William Yurcik | Katherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam
Slagell | SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process
Accounting | 19 pages, 11 figures, 4 tables | null | null | null | cs.CR | null | In the UNIX/Linux environment the kernel can log every command process
created by every user using process accounting. This data has many potential
uses, including the investigation of security incidents. However, process
accounting data is also sensitive since it contains private user information.
Consequently, security system administrators have been hindered from sharing
these logs. Given that many interesting security applications could use process
accounting data, it would be useful to have a tool that could protect private
user information in the logs. For this reason we introduce SCRUB-PA, a tool
that uses multi-level multi-dimensional anonymization on process accounting log
files in order to provide different levels of privacy protection. It is our
goal that SCRUB-PA will promote the sharing of process accounting logs while
preserving privacy.
| [
{
"version": "v1",
"created": "Wed, 18 Jan 2006 01:08:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luo",
"Katherine",
""
],
[
"Li",
"Yifan",
""
],
[
"Ermopoulos",
"Charis",
""
],
[
"Yurcik",
"William",
""
],
[
"Slagell",
"Adam",
""
]
] |
cs/0601081 | Andrej (Andy) Brodnik | Andrej Brodnik, Johan Karlsson, J. Ian Munro, Andreas Nilsson | An O(1) Solution to the Prefix Sum Problem on a Specialized Memory
Architecture | 12 pages | null | null | null | cs.DS cs.CC cs.IR | null | In this paper we study the Prefix Sum problem introduced by Fredman.
We show that it is possible to perform both update and retrieval in O(1) time
simultaneously under a memory model in which individual bits may be shared by
several words.
We also show that two variants (generalizations) of the problem can be solved
optimally in $\Theta(\lg N)$ time under the comparison based model of
computation.
| [
{
"version": "v1",
"created": "Wed, 18 Jan 2006 21:20:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brodnik",
"Andrej",
""
],
[
"Karlsson",
"Johan",
""
],
[
"Munro",
"J. Ian",
""
],
[
"Nilsson",
"Andreas",
""
]
] |
cs/0601082 | Shai Carmi | Shai Carmi, Reuven Cohen and Danny Dolev | Search in Complex Networks : a New Method of Naming | 5 pages, 4 figures | Europhys. Lett., 74 (6), pp. 1102-1108 (2006) | 10.1209/epl/i2006-10049-1 | null | cs.NI cond-mat.dis-nn | null | We suggest a method for routing when the source does not posses full
information about the shortest path to the destination. The method is
particularly useful for scale-free networks, and exploits its unique
characteristics. By assigning new (short) names to nodes (aka labelling) we are
able to reduce significantly the memory requirement at the routers, yet we
succeed in routing with high probability through paths very close in distance
to the shortest ones.
| [
{
"version": "v1",
"created": "Wed, 18 Jan 2006 21:21:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carmi",
"Shai",
""
],
[
"Cohen",
"Reuven",
""
],
[
"Dolev",
"Danny",
""
]
] |
cs/0601084 | Robert Schweller | Ming-Yang Kao, Manan Sanghi, Robert Schweller | Randomized Fast Design of Short DNA Words | null | Proceedings of the 32nd International Colloquium on Automata,
Languages and Programming (ICALP 2005), Lisboa, Portugal, July 11-15, 2005,
pp. 1275-1286 | null | null | cs.DS | null | We consider the problem of efficiently designing sets (codes) of equal-length
DNA strings (words) that satisfy certain combinatorial constraints. This
problem has numerous motivations including DNA computing and DNA self-assembly.
Previous work has extended results from coding theory to obtain bounds on code
size for new biologically motivated constraints and has applied heuristic local
search and genetic algorithm techniques for code design. This paper proposes a
natural optimization formulation of the DNA code design problem in which the
goal is to design n strings that satisfy a given set of constraints while
minimizing the length of the strings. For multiple sets of constraints, we
provide high-probability algorithms that run in time polynomial in n and any
given constraint parameters, and output strings of length within a constant
factor of the optimal. To the best of our knowledge, this work is the first to
consider this type of optimization problem in the context of DNA code design.
| [
{
"version": "v1",
"created": "Thu, 19 Jan 2006 00:22:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kao",
"Ming-Yang",
""
],
[
"Sanghi",
"Manan",
""
],
[
"Schweller",
"Robert",
""
]
] |
cs/0601085 | Vicky Weissman | Riccardo Pucella and Vicky Weissman | A Formal Foundation for ODRL | 30 pgs, preliminary version presented at WITS-04 (Workshop on Issues
in the Theory of Security), 2004 | null | null | null | cs.LO cs.CR | null | ODRL is a popular XML-based language for stating the conditions under which
resources can be accessed legitimately. The language is described in English
and, as a result, agreements written in ODRL are open to interpretation. To
address this problem, we propose a formal semantics for a representative
fragment of the language. We use this semantics to determine precisely when a
permission is implied by a set of ODRL statements and show that answering such
questions is a decidable NP-hard problem. Finally, we define a tractable
fragment of ODRL that is also fairly expressive.
| [
{
"version": "v1",
"created": "Thu, 19 Jan 2006 02:41:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
],
[
"Weissman",
"Vicky",
""
]
] |
cs/0601086 | Stephen Cook | Stephen Cook | Comments on Beckmann's Uniform Reducts | null | null | null | null | cs.CC | null | Arnold Beckmann defined the uniform reduct of a propositional proof system f
to be the set of those bounded arithmetical formulas whose propositional
translations have polynomial size f-proofs. We prove that the uniform reduct of
f + Extended Frege consists of all true bounded arithmetical formulas iff f +
Extended Frege simulates every proof system.
| [
{
"version": "v1",
"created": "Thu, 19 Jan 2006 22:56:49 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jan 2006 18:08:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cook",
"Stephen",
""
]
] |
cs/0601087 | Victor Kromer | Kromer Victor | Processing of Test Matrices with Guessing Correction | 10 pages, in Russian | null | null | null | cs.LG | null | It is suggested to insert into test matrix 1s for correct responses, 0s for
response refusals, and negative corrective elements for incorrect responses.
With the classical test theory approach test scores of examinees and items are
calculated traditionally as sums of matrix elements, organized in rows and
columns. Correlation coefficients are estimated using correction coefficients.
In item response theory approach examinee and item logits are estimated using
maximum likelihood method and probabilities of all matrix elements.
| [
{
"version": "v1",
"created": "Fri, 20 Jan 2006 05:40:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Victor",
"Kromer",
""
]
] |
cs/0601096 | Nicolas Tabareau | Deepak D'Souza, Nicolas Tabareau (PPS) | On timed automata with input-determined guards | null | null | null | null | cs.LO | null | We consider a general notion of timed automata with input-determined guards
and show that they admit a robust logical framework along the lines of [D
'Souza03], in terms of a monadic second order logic characterisation and an
expressively complete timed temporal logic. We then generalize these automata
using the notion of recursive operators introduced by Henzinger, Raskin, and
Schobbens, and show that they admit a similar logical framework. These results
hold in the ``pointwise'' semantics. We finally use this framework to show that
the real-time logic MITL of Alur et al is expressively complete with respect to
an MSO corresponding to an appropriate input-determined operator.
| [
{
"version": "v1",
"created": "Mon, 23 Jan 2006 10:45:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"D'Souza",
"Deepak",
"",
"PPS"
],
[
"Tabareau",
"Nicolas",
"",
"PPS"
]
] |
cs/0601097 | B.S.Shajee Mohan | B.S. Shajeemohan, Dr. V.K. Govindan | Compression Scheme for Faster and Secure Data Transmission Over Internet | null | null | null | null | cs.PF cs.DC | null | Compression algorithms reduce the redundancy in data representation to
decrease the storage required for that data. Data compression offers an
attractive approach to reducing communication costs by using available
bandwidth effectively. Over the last decade there has been an unprecedented
explosion in the amount of digital data transmitted via the Internet,
representing text, images, video, sound, computer programs, etc. With this
trend expected to continue, it makes sense to pursue research on developing
algorithms that can most effectively use available network bandwidth by
maximally compressing data. It is also important to consider the security
aspects of the data being transmitted while compressing it, as most of the text
data transmitted over the Internet is very much vulnerable to a multitude of
attacks. This paper is focused on addressing this problem of lossless
compression of text files with an added security.
| [
{
"version": "v1",
"created": "Mon, 23 Jan 2006 11:47:06 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Jan 2006 03:33:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shajeemohan",
"B. S.",
""
],
[
"Govindan",
"Dr. V. K.",
""
]
] |
cs/0601100 | Luca Trevisan | Luca Trevisan | Pseudorandomness and Combinatorial Constructions | Submitted to the Proceedings of ICM'06, Madrid | null | null | null | cs.CC math.CO | null | In combinatorics, the probabilistic method is a very powerful tool to prove
the existence of combinatorial objects with interesting and useful properties.
Explicit constructions of objects with such properties are often very
difficult, or unknown. In computer science, probabilistic algorithms are
sometimes simpler and more efficient than the best known deterministic
algorithms for the same problem.
Despite this evidence for the power of random choices, the computational
theory of pseudorandomness shows that, under certain complexity-theoretic
assumptions, every probabilistic algorithm has an efficient deterministic
simulation and a large class of applications of the the probabilistic method
can be converted into explicit constructions.
In this survey paper we describe connections between the conditional
``derandomization'' results of the computational theory of pseudorandomness and
unconditional explicit constructions of certain combinatorial objects such as
error-correcting codes and ``randomness extractors.''
| [
{
"version": "v1",
"created": "Mon, 23 Jan 2006 19:24:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Trevisan",
"Luca",
""
]
] |
cs/0601103 | Philipp Mayr | Philipp Mayr, Fabio Tosques | Google Web APIs - an Instrument for Webometric Analyses? | 2 pages, 2 figures, 10th International Conference of the
International Society for Scientometrics and Informetrics | null | null | null | cs.IR | null | This paper introduces Google Web APIs (Google APIs) as an instrument and
playground for webometric studies. Several examples of Google APIs
implementations are given. Our examples show that this Google Web Service can
be used successfully for informetric Internet based studies albeit with some
restrictions.
| [
{
"version": "v1",
"created": "Tue, 24 Jan 2006 10:23:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mayr",
"Philipp",
""
],
[
"Tosques",
"Fabio",
""
]
] |
cs/0601105 | Vassilios Vassiliadis | Vassilios S. Vassiliadis | The Perceptron Algorithm: Image and Signal Decomposition, Compression,
and Analysis by Iterative Gaussian Blurring | null | null | null | null | cs.CV | null | A novel algorithm for tunable compression to within the precision of
reproduction targets, or storage, is proposed. The new algorithm is termed the
`Perceptron Algorithm', which utilises simple existing concepts in a novel way,
has multiple immediate commercial application aspects as well as it opens up a
multitude of fronts in computational science and technology. The aims of this
paper are to present the concepts underlying the algorithm, observations by its
application to some example cases, and the identification of a multitude of
potential areas of applications such as: image compression by orders of
magnitude, signal compression including sound as well, image analysis in a
multilayered detailed analysis, pattern recognition and matching and rapid
database searching (e.g. face recognition), motion analysis, biomedical
applications e.g. in MRI and CAT scan image analysis and compression, as well
as hints on the link of these ideas to the way how biological memory might work
leading to new points of view in neural computation. Commercial applications of
immediate interest are the compression of images at the source (e.g.
photographic equipment, scanners, satellite imaging systems), DVD film
compression, pay-per-view downloads acceleration and many others identified in
the present paper at its conclusion and future work section.
| [
{
"version": "v1",
"created": "Tue, 24 Jan 2006 17:23:17 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jan 2006 10:40:53 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Jan 2006 08:42:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vassiliadis",
"Vassilios S.",
""
]
] |
cs/0601106 | Vassilios Vassiliadis | Vassilios S. Vassiliadis | The `Face on Mars': a photographic approach for the search of signs of
past civilizations from a macroscopic point of view, factoring long-term
erosion in image reconstruction | 9 pages | null | null | null | cs.CV | null | This short article presents an alternative view of high resolution imaging
from various sources with the aim of the discovery of potential sites of
archaeological importance, or sites that exhibit `anomalies' such that they may
merit closer inspection and analysis. It is conjectured, and to a certain
extent demonstrated here, that it is possible for advanced civilizations to
factor in erosion by natural processes into a large scale design so that main
features be preserved even with the passage of millions of years. Alternatively
viewed, even without such intent embedded in a design left for posterity, it is
possible that a gigantic construction may naturally decay in such a way that
even cataclysmic (massive) events may leave sufficient information intact with
the passage of time, provided one changes the point of view from high
resolution images to enhanced blurred renderings of the sites in question.
| [
{
"version": "v1",
"created": "Tue, 24 Jan 2006 18:12:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vassiliadis",
"Vassilios S.",
""
]
] |
cs/0601108 | Alain Lifchitz | Alain Lifchitz, Frederic Maire and Dominique Revuz | Fast Lexically Constrained Viterbi Algorithm (FLCVA): Simultaneous
Optimization of Speed and Memory | 5 pages, 2 figures, 4 tables | null | null | null | cs.CV cs.AI cs.DS | null | Lexical constraints on the input of speech and on-line handwriting systems
improve the performance of such systems. A significant gain in speed can be
achieved by integrating in a digraph structure the different Hidden Markov
Models (HMM) corresponding to the words of the relevant lexicon. This
integration avoids redundant computations by sharing intermediate results
between HMM's corresponding to different words of the lexicon. In this paper,
we introduce a token passing method to perform simultaneously the computation
of the a posteriori probabilities of all the words of the lexicon. The coding
scheme that we introduce for the tokens is optimal in the information theory
sense. The tokens use the minimum possible number of bits. Overall, we optimize
simultaneously the execution speed and the memory requirement of the
recognition systems.
| [
{
"version": "v1",
"created": "Wed, 25 Jan 2006 17:50:13 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Feb 2006 13:05:36 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Feb 2006 23:00:28 GMT"
},
{
"version": "v4",
"created": "Sun, 19 Mar 2006 16:40:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lifchitz",
"Alain",
""
],
[
"Maire",
"Frederic",
""
],
[
"Revuz",
"Dominique",
""
]
] |
cs/0601111 | Ted Herman | Chen Zhang, Ted Herman | Localization in Wireless Sensor Grids | 17 pages, 6 figures | null | null | TR01-06 | cs.DC | null | This work reports experiences on using radio ranging to position sensors in a
grid topology. The implementation is simple, efficient, and could be
practically distributed. The paper describes an implementation and experimental
result based on RSSI distance estimation. Novel techniques such as fuzzy
membership functions and table lookup are used to obtain more accurate result
and simplify the computation. An 86% accuracy is achieved in the experiment in
spite of inaccurate RSSI distance estimates with errors up to 60%.
| [
{
"version": "v1",
"created": "Wed, 25 Jan 2006 23:48:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Chen",
""
],
[
"Herman",
"Ted",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.