id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0512010
Timothy Porter
Jonathan Gratus and Timothy Porter
A geometry of information, I: Nerves, posets and differential forms
28 pages. A version of this paper appears also on the Dagstuhl seminar portal http://drops.dagstuhl.de/portals/04351/
null
null
null
cs.AI cs.GR
null
The main theme of this workshop (Dagstuhl seminar 04351) is `Spatial Representation: Continuous vs. Discrete'. Spatial representation has two contrasting but interacting aspects (i) representation of spaces' and (ii) representation by spaces. In this paper, we will examine two aspects that are common to both interpretations of the theme, namely nerve constructions and refinement. Representations change, data changes, spaces change. We will examine the possibility of a `differential geometry' of spatial representations of both types, and in the sequel give an algebra of differential forms that has the potential to handle the dynamical aspect of such a geometry. We will discuss briefly a conjectured class of spaces, generalising the Cantor set which would seem ideal as a test-bed for the set of tools we are developing.
[ { "version": "v1", "created": "Fri, 2 Dec 2005 16:18:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Gratus", "Jonathan", "" ], [ "Porter", "Timothy", "" ] ]
cs/0512011
Shi Zhou Dr.
Shi Zhou
Understanding the internet topology evolution dynamics
15 figures
Physical Review E, vol. 70, no. 016124, July 2006.
10.1103/PhysRevE.74.016124
null
cs.NI
null
The internet structure is extremely complex. The Positive-Feedback Preference (PFP) model is a recently introduced internet topology generator. The model uses two generic algorithms to replicate the evolution dynamics observed on the internet historic data. The phenomenological model was originally designed to match only two topology properties of the internet, i.e. the rich-club connectivity and the exact form of degree distribution. Whereas numerical evaluation has shown that the PFP model accurately reproduces a large set of other nontrivial characteristics as well. This paper aims to investigate why and how this generative model captures so many diverse properties of the internet. Based on comprehensive simulation results, the paper presents a detailed analysis on the exact origin of each of the topology properties produced by the model. This work reveals how network evolution mechanisms control the obtained topology properties and it also provides insights on correlations between various structural characteristics of complex networks.
[ { "version": "v1", "created": "Fri, 2 Dec 2005 18:24:10 GMT" }, { "version": "v2", "created": "Tue, 18 Apr 2006 11:45:01 GMT" }, { "version": "v3", "created": "Thu, 13 Jul 2006 08:37:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Shi", "" ] ]
cs/0512016
Mikl\'os Cs\H{u}r\"os
Mikl\'os Cs\H{u}r\"os
A linear-time algorithm for finding the longest segment which scores above a given threshold
null
null
null
null
cs.DS cs.CE
null
This paper describes a linear-time algorithm that finds the longest stretch in a sequence of real numbers (``scores'') in which the sum exceeds an input parameter. The algorithm also solves the problem of finding the longest interval in which the average of the scores is above a fixed threshold. The problem originates from molecular sequence analysis: for instance, the algorithm can be employed to identify long GC-rich regions in DNA sequences. The algorithm can also be used to trim low-quality ends of shotgun sequences in a preprocessing step of whole-genome assembly.
[ { "version": "v1", "created": "Sun, 4 Dec 2005 04:28:00 GMT" }, { "version": "v2", "created": "Sun, 12 Mar 2006 02:40:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Csűrös", "Miklós", "" ] ]
cs/0512019
Marek W. Gutowski
Marek W. Gutowski
Amazing geometry of genetic space or are genetic algorithms convergent?
7 pages, presented on VII KAEiOG (VII Domestic Conference on Evolutionary Algorithms and Global Optimization), May 24-26, 2004, Kazimierz Dolny, Poland
null
null
null
cs.NE cs.DM cs.SE
null
There is no proof yet of convergence of Genetic Algorithms. We do not supply it too. Instead, we present some thoughts and arguments to convince the Reader, that Genetic Algorithms are essentially bound for success. For this purpose, we consider only the crossover operators, single- or multiple-point, together with selection procedure. We also give a proof that the soft selection is superior to other selection schemes.
[ { "version": "v1", "created": "Mon, 5 Dec 2005 11:12:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutowski", "Marek W.", "" ] ]
cs/0512021
Ted Herman
Brahim Hamid (1), Ted Herman (2), Morten Mjelde (3) ((1) LaBRI University of Bordeaux-1 France, (2) University of Iowa, (3) University in Bergen Norway)
The Poster Session of SSS 2005
3 pages, related to Springer LNCS 3764, Proceedings of Symposium on Self-Stabilizing Systems
null
null
TR-05-13
cs.DC cs.DS
null
This technical report documents the poster session of SSS 2005, the Symposium on Self-Stabilizing Systems published by Springer as LNCS volume 3764. The poster session included five presentations. Two of these presentations are summarized in brief abstracts contained in this technical report.
[ { "version": "v1", "created": "Mon, 5 Dec 2005 22:51:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Hamid", "Brahim", "" ], [ "Herman", "Ted", "" ], [ "Mjelde", "Morten", "" ] ]
cs/0512026
Ingo Josopait
I. Josopait
Checking C++ Programs for Dimensional Consistency
submitted to "Computing in Science and Engineering"
null
null
null
cs.PL
null
I will present my implementation 'n-units' of physical units into C++ programs. It allows the compiler to check for dimensional consistency.
[ { "version": "v1", "created": "Wed, 7 Dec 2005 15:51:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Josopait", "I.", "" ] ]
cs/0512031
Slawomir Lasota
Slawomir Lasota and Igor Walukiewicz
Alternating Timed Automata
the full version of the Fossacs'05 conference preliminary paper revised according ot the referee's comments
null
null
null
cs.LO
null
A notion of alternating timed automata is proposed. It is shown that such automata with only one clock have decidable emptiness problem over finite words. This gives a new class of timed languages which is closed under boolean operations and which has an effective presentation. We prove that the complexity of the emptiness problem for alternating timed automata with one clock is non-primitive recursive. The proof gives also the same lower bound for the universality problem for nondeterministic timed automata with one clock. We investigate extension of the model with epsilon-transitions and prove that emptiness is undecidable. Over infinite words, we show undecidability of the universality problem.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 08:50:35 GMT" }, { "version": "v2", "created": "Thu, 24 Aug 2006 14:56:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lasota", "Slawomir", "" ], [ "Walukiewicz", "Igor", "" ] ]
cs/0512033
Bernardo Huberman
Bernardo A. Huberman and Fang Wu
Bootstrapping the Long Tail in Peer to Peer Systems
null
null
null
null
cs.NI cs.CY physics.soc-ph
null
We describe an efficient incentive mechanism for P2P systems that generates a wide diversity of content offerings while responding adaptively to customer demand. Files are served and paid for through a parimutuel market similar to that commonly used for betting in horse races. An analysis of the performance of such a system shows that there exists an equilibrium with a long tail in the distribution of content offerings, which guarantees the real time provision of any content regardless of its popularity.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 18:02:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Huberman", "Bernardo A.", "" ], [ "Wu", "Fang", "" ] ]
cs/0512034
Bernardo Huberman
Bernardo A. Huberman, Fang Wu and Li Zhang
Ensuring Trust in One Time Exchanges: Solving the QoS Problem
null
null
null
null
cs.GT physics.soc-ph
null
We describe a pricing structure for the provision of IT services that ensures trust without requiring repeated interactions between service providers and users. It does so by offering a pricing structure that elicits truthful reporting of quality of service (QoS) by providers while making them profitable. This mechanism also induces truth-telling on the part of users reserving the service.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 19:44:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Huberman", "Bernardo A.", "" ], [ "Wu", "Fang", "" ], [ "Zhang", "Li", "" ] ]
cs/0512035
Michael N. Vyalyi
Sergey P. Tarasov, Mikhail N. Vyalyi
Semidefinite programming and arithmetic circuit evaluation
Submitted to Special issue of DAM in memory of L.Khachiyan
null
null
null
cs.CC
null
A rational number can be naturally presented by an arithmetic computation (AC): a sequence of elementary arithmetic operations starting from a fixed constant, say 1. The asymptotic complexity issues of such a representation are studied e.g. in the framework of the algebraic complexity theory over arbitrary field. Here we study a related problem of the complexity of performing arithmetic operations and computing elementary predicates, e.g. ``='' or ``>'', on rational numbers given by AC. In the first place, we prove that AC can be efficiently simulated by the exact semidefinite programming (SDP). Secondly, we give a BPP-algorithm for the equality predicate. Thirdly, we put ``>''-predicate into the complexity class PSPACE. We conjecture that ``>''-predicate is hard to compute. This conjecture, if true, would clarify the complexity status of the exact SDP - a well known open problem in the field of mathematical programming.
[ { "version": "v1", "created": "Fri, 9 Dec 2005 16:01:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Tarasov", "Sergey P.", "" ], [ "Vyalyi", "Mikhail N.", "" ] ]
cs/0512039
Jianqin Zhou
Jianqin Zhou, Xirong Xu
An algorithm for the k-error linear complexity of a sequence with period 2pn over GF(q)
6 pages
null
null
null
cs.CR
null
The union cost is used, so that an efficient algorithm for computing the k-error linear complexity of a sequence with period 2pn over GF(q) is presented, where p and q are odd primes, and q is a primitive root of modulo p2.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 00:21:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Jianqin", "" ], [ "Xu", "Xirong", "" ] ]
cs/0512040
Jianqin Zhou
Jianqin Zhou
A fast algorithm for determining the linear complexity of periodic sequences
7 pages
null
null
null
cs.CR
null
A fast algorithm is presented for determining the linear complexity and the minimal polynomial of periodic sequences over GF(q) with period q n p m, where p is a prime, q is a prime and a primitive root modulo p2. The algorithm presented here generalizes both the algorithm in [4] where the period of a sequence over GF(q) is p m and the algorithm in [5] where the period of a binary sequence is 2 n p m . When m=0, the algorithm simplifies the generalized Games-Chan algorithm.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 00:38:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Jianqin", "" ] ]
cs/0512041
Jianqin Zhou
Jianqin Zhou
Generalized partially bent functions
7 pages
null
null
null
cs.CR
null
Based on the definition of generalized partially bent functions, using the theory of linear transformation, the relationship among generalized partially bent functions over ring Z N, generalized bent functions over ring Z N and affine functions is discussed. When N is a prime number, it is proved that a generalized partially bent function can be decomposed as the addition of a generalized bent function and an affine function. The result obtained here generalizes the main works concerning partially bent functions by Claud Carlet in [1].
[ { "version": "v1", "created": "Sat, 10 Dec 2005 00:43:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Jianqin", "" ] ]
cs/0512042
Xiaoyang Gu
Xiaoyang Gu, Jack H. Lutz, Elvira Mayordomo
Points on Computable Curves
10 pages, 12 pages appendix
null
null
null
cs.CC cs.CG
null
The ``analyst's traveling salesman theorem'' of geometric measure theory characterizes those subsets of Euclidean space that are contained in curves of finite length. This result, proven for the plane by Jones (1990) and extended to higher-dimensional Euclidean spaces by Okikiolu (1991), says that a bounded set $K$ is contained in some curve of finite length if and only if a certain ``square beta sum'', involving the ``width of $K$'' in each element of an infinite system of overlapping ``tiles'' of descending size, is finite. In this paper we characterize those {\it points} of Euclidean space that lie on {\it computable} curves of finite length by formulating and proving a computable extension of the analyst's traveling salesman theorem. Our extension says that a point in Euclidean space lies on some computable curve of finite length if and only if it is ``permitted'' by some computable ``Jones constriction''. A Jones constriction here is an explicit assignment of a rational cylinder to each of the above-mentioned tiles in such a way that, when the radius of the cylinder corresponding to a tile is used in place of the ``width of $K$'' in each tile, the square beta sum is finite. A point is permitted by a Jones constriction if it is contained in the cylinder assigned to each tile containing the point. The main part of our proof is the construction of a computable curve of finite length traversing all the points permitted by a given Jones constriction. Our construction uses the main ideas of Jones's ``farthest insertion'' construction, but our algorithm for computing the curve must work exclusively with the Jones constriction itself, because it has no direct access to the (typically uncomputable) points permitted by the Jones constriction.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 03:08:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Gu", "Xiaoyang", "" ], [ "Lutz", "Jack H.", "" ], [ "Mayordomo", "Elvira", "" ] ]
cs/0512043
Dirk Wagner
Dirk Wagner, John Noga
Random Walks with Anti-Correlated Steps
5 pages, 1 chart, 2 tables
null
null
null
cs.DM cs.PF
null
We conjecture the expected value of random walks with anti-correlated steps to be exactly 1. We support this conjecture with 2 plausibility arguments and experimental data. The experimental analysis includes the computation of the expected values of random walks for steps up to 22. The result shows the expected value asymptotically converging to 1.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 08:04:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Wagner", "Dirk", "" ], [ "Noga", "John", "" ] ]
cs/0512045
Xuan-Ha Vu
Xuan-Ha Vu, Marius-Calin Silaghi, Djamila Sam-Haroud and Boi Faltings
Branch-and-Prune Search Strategies for Numerical Constraint Solving
43 pages, 11 figures
null
null
LIA-REPORT-2006-007
cs.AI
null
When solving numerical constraints such as nonlinear equations and inequalities, solvers often exploit pruning techniques, which remove redundant value combinations from the domains of variables, at pruning steps. To find the complete solution set, most of these solvers alternate the pruning steps with branching steps, which split each problem into subproblems. This forms the so-called branch-and-prune framework, well known among the approaches for solving numerical constraints. The basic branch-and-prune search strategy that uses domain bisections in place of the branching steps is called the bisection search. In general, the bisection search works well in case (i) the solutions are isolated, but it can be improved further in case (ii) there are continuums of solutions (this often occurs when inequalities are involved). In this paper, we propose a new branch-and-prune search strategy along with several variants, which not only allow yielding better branching decisions in the latter case, but also work as well as the bisection search does in the former case. These new search algorithms enable us to employ various pruning techniques in the construction of inner and outer approximations of the solution set. Our experiments show that these algorithms speed up the solving process often by one order of magnitude or more when solving problems with continuums of solutions, while keeping the same performance as the bisection search when the solutions are isolated.
[ { "version": "v1", "created": "Sun, 11 Dec 2005 19:47:42 GMT" }, { "version": "v2", "created": "Tue, 8 May 2007 22:59:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Vu", "Xuan-Ha", "" ], [ "Silaghi", "Marius-Calin", "" ], [ "Sam-Haroud", "Djamila", "" ], [ "Faltings", "Boi", "" ] ]
cs/0512049
Gq Zhang Ph.D.
Jeff Stuckman and Guo-Qiang Zhang
Mastermind is NP-Complete
null
null
null
null
cs.CC cs.DM
null
In this paper we show that the Mastermind Satisfiability Problem (MSP) is NP-complete. The Mastermind is a popular game which can be turned into a logical puzzle called Mastermind Satisfiability Problem in a similar spirit to the Minesweeper puzzle. By proving that MSP is NP-complete, we reveal its intrinsic computational property that makes it challenging and interesting. This serves as an addition to our knowledge about a host of other puzzles, such as Minesweeper, Mah-Jongg, and the 15-puzzle.
[ { "version": "v1", "created": "Tue, 13 Dec 2005 04:19:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Stuckman", "Jeff", "" ], [ "Zhang", "Guo-Qiang", "" ] ]
cs/0512052
Ion Mandoiu
Ion I. Mandoiu and Claudia Prajescu
High-Throughput SNP Genotyping by SBE/SBH
19 pages
null
null
null
cs.DS q-bio.GN
null
Despite much progress over the past decade, current Single Nucleotide Polymorphism (SNP) genotyping technologies still offer an insufficient degree of multiplexing when required to handle user-selected sets of SNPs. In this paper we propose a new genotyping assay architecture combining multiplexed solution-phase single-base extension (SBE) reactions with sequencing by hybridization (SBH) using universal DNA arrays such as all $k$-mer arrays. In addition to PCR amplification of genomic DNA, SNP genotyping using SBE/SBH assays involves the following steps: (1) Synthesizing primers complementing the genomic sequence immediately preceding SNPs of interest; (2) Hybridizing these primers with the genomic DNA; (3) Extending each primer by a single base using polymerase enzyme and dideoxynucleotides labeled with 4 different fluorescent dyes; and finally (4) Hybridizing extended primers to a universal DNA array and determining the identity of the bases that extend each primer by hybridization pattern analysis. Our contributions include a study of multiplexing algorithms for SBE/SBH genotyping assays and preliminary experimental results showing the achievable tradeoffs between the number of array probes and primer length on one hand and the number of SNPs that can be assayed simultaneously on the other. Simulation results on datasets both randomly generated and extracted from the NCBI dbSNP database suggest that the SBE/SBH architecture provides a flexible and cost-effective alternative to genotyping assays currently used in the industry, enabling genotyping of up to hundreds of thousands of user-specified SNPs per assay.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 18:01:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Mandoiu", "Ion I.", "" ], [ "Prajescu", "Claudia", "" ] ]
cs/0512053
John Hitchcock
John M. Hitchcock
Online Learning and Resource-Bounded Dimension: Winnow Yields New Lower Bounds for Hard Sets
null
null
null
null
cs.CC cs.LG
null
We establish a relationship between the online mistake-bound model of learning and resource-bounded dimension. This connection is combined with the Winnow algorithm to obtain new results about the density of hard sets under adaptive reductions. This improves previous work of Fu (1995) and Lutz and Zhao (2000), and solves one of Lutz and Mayordomo's "Twelve Problems in Resource-Bounded Measure" (1999).
[ { "version": "v1", "created": "Tue, 13 Dec 2005 22:01:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Hitchcock", "John M.", "" ] ]
cs/0512054
Vyacheslav Gorshkov Mr
Gennady P.Berman (Los Alamos National Laboratory, T-13), Vyacheslav N.Gorshkov (Los Alamos National Laboratory, Center for Nonlinear Studies), Xidi Wang (Citigroup, Sao Paulo, Brasil)
Irreducible Frequent Patterns in Transactional Databases
30 pages, 18 figures
null
null
null
cs.DS cs.DB
null
Irreducible frequent patters (IFPs) are introduced for transactional databases. An IFP is such a frequent pattern (FP),(x1,x2,...xn), the probability of which, P(x1,x2,...xn), cannot be represented as a product of the probabilities of two (or more) other FPs of the smaller lengths. We have developed an algorithm for searching IFPs in transactional databases. We argue that IFPs represent useful tools for characterizing the transactional databases and may have important applications to bio-systems including the immune systems and for improving vaccination strategies. The effectiveness of the IFPs approach has been illustrated in application to a classification problem.
[ { "version": "v1", "created": "Tue, 13 Dec 2005 22:53:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Berman", "Gennady P.", "", "Los Alamos National Laboratory, T-13" ], [ "Gorshkov", "Vyacheslav N.", "", "Los Alamos National Laboratory, Center for Nonlinear Studies" ], [ "Wang", "Xidi", "", "Citigroup, Sao Paulo, Brasil" ] ]
cs/0512055
Yi-Dong Shen
Yi-Dong Shen and Danny De Schreye
Termination Analysis of General Logic Programs for Moded Queries: A Dynamic Approach
24 Pages
null
null
null
cs.LO cs.PL
null
The termination problem of a logic program can be addressed in either a static or a dynamic way. A static approach performs termination analysis at compile time, while a dynamic approach characterizes and tests termination of a logic program by applying a loop checking technique. In this paper, we present a novel dynamic approach to termination analysis for general logic programs with moded queries. We address several interesting questions, including how to formulate an SLDNF-derivation for a moded query, how to characterize an infinite SLDNF-derivation with a moded query, and how to apply a loop checking mechanism to cut infinite SLDNF-derivations for the purpose of termination analysis. The proposed approach is very powerful and useful. It can be used (1) to test if a logic program terminates for a given concrete or moded query, (2) to test if a logic program terminates for all concrete or moded queries, and (3) to find all (most general) concrete/moded queries that are most likely terminating (or non-terminating).
[ { "version": "v1", "created": "Wed, 14 Dec 2005 07:09:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Yi-Dong", "" ], [ "De Schreye", "Danny", "" ] ]
cs/0512056
Roberto Bagnara
Roberto Bagnara, Andrea Pescetti, Alessandro Zaccagnini, Enea Zaffanella (University of Parma)
PURRS: Towards Computer Algebra Support for Fully Automatic Worst-Case Complexity Analysis
6 pages
null
null
null
cs.MS cs.CC
null
Fully automatic worst-case complexity analysis has a number of applications in computer-assisted program manipulation. A classical and powerful approach to complexity analysis consists in formally deriving, from the program syntax, a set of constraints expressing bounds on the resources required by the program, which are then solved, possibly applying safe approximations. In several interesting cases, these constraints take the form of recurrence relations. While techniques for solving recurrences are known and implemented in several computer algebra systems, these do not completely fulfill the needs of fully automatic complexity analysis: they only deal with a somewhat restricted class of recurrence relations, or sometimes require user intervention, or they are restricted to the computation of exact solutions that are often so complex to be unmanageable, and thus useless in practice. In this paper we briefly describe PURRS, a system and software library aimed at providing all the computer algebra services needed by applications performing or exploiting the results of worst-case complexity analyses. The capabilities of the system are illustrated by means of examples derived from the analysis of programs written in a domain-specific functional programming language for real-time embedded systems.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 09:54:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagnara", "Roberto", "", "University of Parma" ], [ "Pescetti", "Andrea", "", "University of Parma" ], [ "Zaccagnini", "Alessandro", "", "University of Parma" ], [ "Zaffanella", "Enea", "", "University of Parma" ] ]
cs/0512059
Vladimir Vovk
Vladimir Vovk
Competing with wild prediction rules
28 pages, 3 figures
null
null
null
cs.LG
null
We consider the problem of on-line prediction competitive with a benchmark class of continuous but highly irregular prediction rules. It is known that if the benchmark class is a reproducing kernel Hilbert space, there exists a prediction algorithm whose average loss over the first N examples does not exceed the average loss of any prediction rule in the class plus a "regret term" of O(N^(-1/2)). The elements of some natural benchmark classes, however, are so irregular that these classes are not Hilbert spaces. In this paper we develop Banach-space methods to construct a prediction algorithm with a regret term of O(N^(-1/p)), where p is in [2,infty) and p-2 reflects the degree to which the benchmark class fails to be a Hilbert space.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 20:03:30 GMT" }, { "version": "v2", "created": "Wed, 25 Jan 2006 17:36:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0512060
Chiranjeeb Buragohain
Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri
Distributed Navigation Algorithms for Sensor Networks
To Appear in INFOCOM 2006
null
null
null
cs.NI cs.DC cs.DS
null
We propose efficient distributed algorithms to aid navigation of a user through a geographic area covered by sensors. The sensors sense the level of danger at their locations and we use this information to find a safe path for the user through the sensor field. Traditional distributed navigation algorithms rely upon flooding the whole network with packets to find an optimal safe path. To reduce the communication expense, we introduce the concept of a skeleton graph which is a sparse subset of the true sensor network communication graph. Using skeleton graphs we show that it is possible to find approximate safe paths with much lower communication cost. We give tight theoretical guarantees on the quality of our approximation and by simulation, show the effectiveness of our algorithms in realistic sensor network situations.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 22:36:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Buragohain", "Chiranjeeb", "" ], [ "Agrawal", "Divyakant", "" ], [ "Suri", "Subhash", "" ] ]
cs/0512062
Matteo Gagliolo
Juergen Schmidhuber, Matteo Gagliolo, Daan Wierstra, Faustino Gomez
Evolino for recurrent support vector machines
10 pages, 2 figures
null
null
IDSIA-19-05 version 2.0
cs.NE
null
Traditional Support Vector Machines (SVMs) need pre-wired finite time windows to predict and classify time series. They do not have an internal state necessary to deal with sequences involving arbitrary long-term dependencies. Here we introduce a new class of recurrent, truly sequential SVM-like devices with internal adaptive states, trained by a novel method called EVOlution of systems with KErnel-based outputs (Evoke), an instance of the recent Evolino class of methods. Evoke evolves recurrent neural networks to detect and represent temporal dependencies while using quadratic programming/support vector regression to produce precise outputs. Evoke is the first SVM-based mechanism learning to classify a context-sensitive language. It also outperforms recent state-of-the-art gradient-based recurrent neural networks (RNNs) on various time series prediction tasks.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 15:05:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidhuber", "Juergen", "" ], [ "Gagliolo", "Matteo", "" ], [ "Wierstra", "Daan", "" ], [ "Gomez", "Faustino", "" ] ]
cs/0512064
Martin Kutz
Martin Kutz
Computing shortest non-trivial cycles on orientable surfaces of bounded genus in almost linear time
13 pages, 7 figures
null
null
null
cs.CG
null
We present an algorithm that computes a shortest non-contractible and a shortest non-separating cycle on an orientable combinatorial surface of bounded genus in O(n \log n) time, where n denotes the complexity of the surface. This solves a central open problem in computational topology, improving upon the current-best O(n^{3/2})-time algorithm by Cabello and Mohar (ESA 2005). Our algorithm uses universal-cover constructions to find short cycles and makes extensive use of existing tools from the field.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 17:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Kutz", "Martin", "" ] ]
cs/0512070
Bertrand Nouvel
Bertrand Nouvel (LIP), Eric Remila (LIP)
Incremental and Transitive Discrete Rotations
null
null
null
null
cs.DM cs.GR
null
A discrete rotation algorithm can be apprehended as a parametric application $f\_\alpha$ from $\ZZ[i]$ to $\ZZ[i]$, whose resulting permutation ``looks like'' the map induced by an Euclidean rotation. For this kind of algorithm, to be incremental means to compute successively all the intermediate rotate d copies of an image for angles in-between 0 and a destination angle. The di scretized rotation consists in the composition of an Euclidean rotation with a discretization; the aim of this article is to describe an algorithm whic h computes incrementally a discretized rotation. The suggested method uses o nly integer arithmetic and does not compute any sine nor any cosine. More pr ecisely, its design relies on the analysis of the discretized rotation as a step function: the precise description of the discontinuities turns to be th e key ingredient that will make the resulting procedure optimally fast and e xact. A complete description of the incremental rotation process is provided, also this result may be useful in the specification of a consistent set of defin itions for discrete geometry.
[ { "version": "v1", "created": "Fri, 16 Dec 2005 16:12:12 GMT" }, { "version": "v2", "created": "Thu, 5 Jan 2006 07:02:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Nouvel", "Bertrand", "", "LIP" ], [ "Remila", "Eric", "", "LIP" ] ]
cs/0512071
Martyn Amos
Jon Timmis, Martyn Amos, Wolfgang Banzhaf and Andy Tyrrell
"Going back to our roots": second generation biocomputing
Submitted to the International Journal of Unconventional Computing
null
null
null
cs.AI cs.NE
null
Researchers in the field of biocomputing have, for many years, successfully "harvested and exploited" the natural world for inspiration in developing systems that are robust, adaptable and capable of generating novel and even "creative" solutions to human-defined problems. However, in this position paper we argue that the time has now come for a reassessment of how we exploit biology to generate new computational systems. Previous solutions (the "first generation" of biocomputing techniques), whilst reasonably effective, are crude analogues of actual biological systems. We believe that a new, inherently inter-disciplinary approach is needed for the development of the emerging "second generation" of bio-inspired methods. This new modus operandi will require much closer interaction between the engineering and life sciences communities, as well as a bidirectional flow of concepts, applications and expertise. We support our argument by examining, in this new light, three existing areas of biocomputing (genetic programming, artificial immune systems and evolvable hardware), as well as an emerging area (natural genetic engineering) which may provide useful pointers as to the way forward.
[ { "version": "v1", "created": "Fri, 16 Dec 2005 16:42:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Timmis", "Jon", "" ], [ "Amos", "Martyn", "" ], [ "Banzhaf", "Wolfgang", "" ], [ "Tyrrell", "Andy", "" ] ]
cs/0512072
Elias Tsigaridas
Ioannis Z. Emiris and Elias P. Tsigaridas
Computations with one and two real algebraic numbers
null
null
null
null
cs.SC cs.MS
null
We present algorithmic and complexity results concerning computations with one and two real algebraic numbers, as well as real solving of univariate polynomials and bivariate polynomial systems with integer coefficients using Sturm-Habicht sequences. Our main results, in the univariate case, concern the problems of real root isolation (Th. 19) and simultaneous inequalities (Cor.26) and in the bivariate, the problems of system real solving (Th.42), sign evaluation (Th. 37) and simultaneous inequalities (Cor. 43).
[ { "version": "v1", "created": "Sun, 18 Dec 2005 16:58:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Emiris", "Ioannis Z.", "" ], [ "Tsigaridas", "Elias P.", "" ] ]
cs/0512080
Grigorii Pivovarov
G. B. Pivovarov and S. E. Trunov
EqRank: Theme Evolution in Citation Graphs
8 pages, 7 figs, 2 tables
null
null
null
cs.DS cs.DL
null
Time evolution of the classification scheme generated by the EqRank algorithm is studied with hep-th citation graph as an example. Intuitive expectations about evolution of an adequate classification scheme for a growing set of objects are formulated. Evolution compliant with these expectations is called natural. It is demonstrated that EqRank yields a naturally evolving classification scheme. We conclude that EqRank can be used as a means to detect new scientific themes, and to track their development.
[ { "version": "v1", "created": "Tue, 20 Dec 2005 14:01:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Pivovarov", "G. B.", "" ], [ "Trunov", "S. E.", "" ] ]
cs/0512081
Mihai Patrascu
Erik D. Demaine, Friedhelm Meyer auf der Heide, Rasmus Pagh and Mihai Patrascu
De Dictionariis Dynamicis Pauco Spatio Utentibus
14 pages. Full version of a paper accepted to LATIN'06
null
null
null
cs.DS
null
We develop dynamic dictionaries on the word RAM that use asymptotically optimal space, up to constant factors, subject to insertions and deletions, and subject to supporting perfect-hashing queries and/or membership queries, each operation in constant time with high probability. When supporting only membership queries, we attain the optimal space bound of Theta(n lg(u/n)) bits, where n and u are the sizes of the dictionary and the universe, respectively. Previous dictionaries either did not achieve this space bound or had time bounds that were only expected and amortized. When supporting perfect-hashing queries, the optimal space bound depends on the range {1,2,...,n+t} of hashcodes allowed as output. We prove that the optimal space bound is Theta(n lglg(u/n) + n lg(n/(t+1))) bits when supporting only perfect-hashing queries, and it is Theta(n lg(u/n) + n lg(n/(t+1))) bits when also supporting membership queries. All upper bounds are new, as is the Omega(n lg(n/(t+1))) lower bound.
[ { "version": "v1", "created": "Tue, 20 Dec 2005 23:01:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "der Heide", "Friedhelm Meyer auf", "" ], [ "Pagh", "Rasmus", "" ], [ "Patrascu", "Mihai", "" ] ]
cs/0512082
Didier Bert
Hector Ruiz Barradas (LSR - IMAG), Didier Bert (LSR - IMAG)
A Fixpoint Semantics of Event Systems with and without Fairness Assumptions
null
null
null
RR 1081-L LSR 21
cs.LO
null
We present a fixpoint semantics of event systems. The semantics is presented in a general framework without concerns of fairness. Soundness and completeness of rules for deriving "leads-to" properties are proved in this general framework. The general framework is instantiated to minimal progress and weak fairness assumptions and similar results are obtained. We show the power of these results by deriving sufficient conditions for "leads-to" under minimal progress proving soundness of proof obligations without reasoning over state-traces.
[ { "version": "v1", "created": "Wed, 21 Dec 2005 08:23:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Barradas", "Hector Ruiz", "", "LSR - IMAG" ], [ "Bert", "Didier", "", "LSR - IMAG" ] ]
cs/0512084
Hanna E. Makaruk
Nikita Sakhanenko, Hanna Makaruk
Understanding physics from interconnected data
9 pages, 8 figures
null
null
LA-UR-05-5921
cs.CV
null
Metal melting on release after explosion is a physical system far from quilibrium. A complete physical model of this system does not exist, because many interrelated effects have to be considered. General methodology needs to be developed so as to describe and understand physical phenomena involved. The high noise of the data, moving blur of images, the high degree of uncertainty due to the different types of sensors, and the information entangled and hidden inside the noisy images makes reasoning about the physical processes very difficult. Major problems include proper information extraction and the problem of reconstruction, as well as prediction of the missing data. In this paper, several techniques addressing the first problem are given, building the basis for tackling the second problem.
[ { "version": "v1", "created": "Wed, 21 Dec 2005 20:23:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Sakhanenko", "Nikita", "" ], [ "Makaruk", "Hanna", "" ] ]
cs/0512085
Todd Holloway
Todd Holloway, Miran Bozicevic, Katy B\"orner
Analyzing and Visualizing the Semantic Coverage of Wikipedia and Its Authors
null
null
null
null
cs.IR
null
This paper presents a novel analysis and visualization of English Wikipedia data. Our specific interest is the analysis of basic statistics, the identification of the semantic structure and age of the categories in this free online encyclopedia, and the content coverage of its highly productive authors. The paper starts with an introduction of Wikipedia and a review of related work. We then introduce a suite of measures and approaches to analyze and map the semantic structure of Wikipedia. The results show that co-occurrences of categories within individual articles have a power-law distribution, and when mapped reveal the nicely clustered semantic structure of Wikipedia. The results also reveal the content coverage of the article's authors, although the roles these authors play are as varied as the authors themselves. We conclude with a discussion of major results and planned future work.
[ { "version": "v1", "created": "Wed, 21 Dec 2005 19:31:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Holloway", "Todd", "" ], [ "Bozicevic", "Miran", "" ], [ "Börner", "Katy", "" ] ]
cs/0512089
Stephen F. Bush PhD
Stephen F. Bush, Todd Hughes
On The Effectiveness of Kolmogorov Complexity Estimation to Discriminate Semantic Types
null
SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003, Santa Fe Institute, Santa Fe, NM, Nov 5-6, 2003
null
null
cs.NI cs.CR
null
We present progress on the experimental validation of a fundamental and universally applicable vulnerability analysis framework that is capable of identifying new types of vulnerabilities before attackers innovate attacks. This new framework proactively identifies system components that are vulnerable based upon their Kolmogorov Complexity estimates and it facilitates prediction of previously unknown vulnerabilities that are likely to be exploited by future attack methods. A tool that utilizes a growing library of complexity estimators is presented. This work is an incremental step towards validation of the concept of complexity-based vulnerability analysis. In particular, results indicate that data types (semantic types) can be identified by estimates of their complexity. Thus, a map of complexity can identify suspicious types, such as executable data embedded within passive data types, without resorting to predefined headers, signatures, or other limiting a priori information.
[ { "version": "v1", "created": "Thu, 22 Dec 2005 22:02:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ], [ "Hughes", "Todd", "" ] ]
cs/0512092
Stephen F. Bush PhD
Stephen F. Bush and Nathan Smith
The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance
Introduces flash routing
The 2005 International Conference on Wireless Networks (ICWN-05) Monte Carlo Resort, Las Vegas, Nevada, USA, June 27-30, 2005
null
null
cs.NI
null
A fundamental understanding of gain provided by motion prediction in wireless ad hoc routing is currently lacking. This paper examines benefits in routing obtainable via prediction. A theoretical best-case non-predictive routing model is quantified in terms of both message overhead and update time for non-predictive routing. This best- case model of existing routing performance is compared with predictive routing. Several specific instances of predictive improvements in routing are examined. The primary contribution of this paper is quantification of predictive gain for wireless ad hoc routing.
[ { "version": "v1", "created": "Thu, 22 Dec 2005 22:17:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ], [ "Smith", "Nathan", "" ] ]
cs/0512094
Stephen F. Bush PhD
Stephen F. Bush
Low-Energy Sensor Network Time Synchronization as an Emergent Property
null
null
null
null
cs.NI
null
The primary contribution of this work is to examine the energy efficiency of pulse coupled oscillation for time synchronization in a realistic wireless network environment and to explore the impact of mobility on convergence rate. Energy coupled oscillation is susceptible to interference; this approach uses reception and decoding of short packet bursts to eliminate this problem. The energy efficiency of a commonly used timestamp broadcast algorithm is compared and contrasted with pulse-coupled oscillation. The emergent pulse coupled oscillation technique shows greater energy efficiency as well as robustness with mobility. A proportion of the sensors may be integrated with GPS receivers in order to obtain a master clock time.
[ { "version": "v1", "created": "Fri, 23 Dec 2005 21:45:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ] ]
cs/0512096
Ralf L\"ammel
Ralf Laemmel
Book review "The Haskell Road to Logic, Maths and Programming"
To appear in the JoLLI journal in 2006
null
null
null
cs.PL cs.LO
null
The textbook by Doets and van Eijck puts the Haskell programming language systematically to work for presenting a major piece of logic and mathematics. The reader is taken through chapters on basic logic, proof recipes, sets and lists, relations and functions, recursion and co-recursion, the number systems, polynomials and power series, ending with Cantor's infinities. The book uses Haskell for the executable and strongly typed manifestation of various mathematical notions at the level of declarative programming. The book adopts a systematic but relaxed mathematical style (definition, example, exercise, ...); the text is very pleasant to read due to a small amount of anecdotal information, and due to the fact that definitions are fluently integrated in the running text. An important goal of the book is to get the reader acquainted with reasoning about programs.
[ { "version": "v1", "created": "Sat, 24 Dec 2005 23:08:25 GMT" }, { "version": "v2", "created": "Thu, 22 Jun 2006 00:50:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Laemmel", "Ralf", "" ] ]
cs/0512098
Dmitry Paukov
Dmitry P. Paukov
Mathematical models of the complex surfaces in simulation and visualization systems
8 pages, 4 figures
null
null
null
cs.GR cs.CG
null
Modeling, simulation and visualization of three-dimension complex bodies widely use mathematical model of curves and surfaces. The most important curves and surfaces for these purposes are curves and surfaces in Hermite and Bezier forms, splines and NURBS. Article is devoted to survey this way to use geometrical data in various computer graphics systems and adjacent fields.
[ { "version": "v1", "created": "Mon, 26 Dec 2005 14:45:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Paukov", "Dmitry P.", "" ] ]
cs/0512099
Mark Burgin
Mark Burgin
Mathematical Models in Schema Theory
null
null
null
null
cs.AI
null
In this paper, a mathematical schema theory is developed. This theory has three roots: brain theory schemas, grid automata, and block-shemas. In Section 2 of this paper, elements of the theory of grid automata necessary for the mathematical schema theory are presented. In Section 3, elements of brain theory necessary for the mathematical schema theory are presented. In Section 4, other types of schemas are considered. In Section 5, the mathematical schema theory is developed. The achieved level of schema representation allows one to model by mathematical tools virtually any type of schemas considered before, including schemas in neurophisiology, psychology, computer science, Internet technology, databases, logic, and mathematics.
[ { "version": "v1", "created": "Tue, 27 Dec 2005 21:29:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Burgin", "Mark", "" ] ]
cs/0512104
Robert Burger PhD
John Robert Burger
Reversible CAM Processor Modeled After Quantum Computer Behavior
null
null
null
null
cs.AR quant-ph
null
Proposed below is a reversible digital computer modeled after the natural behavior of a quantum system. Using approaches usually reserved for idealized quantum computers, the Reversible CAM, or State Vector Parallel (RSVP) processor can easily find keywords in an unstructured database (that is, it can solve a needle in a haystack problem). The RSVP processor efficiently solves a SAT (Satisfiability of Boolean Formulae) problem; also it can aid in the solution of a GP (Global Properties of Truth Table) problem. The power delay product of the RSVP processor is exponentially lower than that of a standard CAM programmed to perform similar operations.
[ { "version": "v1", "created": "Wed, 28 Dec 2005 19:59:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
cs/0601003
Ruben Vandeginste
Ruben Vandeginste, Bart Demoen
Incremental copying garbage collection for WAM-based Prolog systems
33 pages, 22 figures, 5 tables. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL
null
The design and implementation of an incremental copying heap garbage collector for WAM-based Prolog systems is presented. Its heap layout consists of a number of equal-sized blocks. Other changes to the standard WAM allow these blocks to be garbage collected independently. The independent collection of heap blocks forms the basis of an incremental collecting algorithm which employs copying without marking (contrary to the more frequently used mark&copy or mark&slide algorithms in the context of Prolog). Compared to standard semi-space copying collectors, this approach to heap garbage collection lowers in many cases the memory usage and reduces pause times. The algorithm also allows for a wide variety of garbage collection policies including generational ones. The algorithm is implemented and evaluated in the context of hProlog.
[ { "version": "v1", "created": "Mon, 2 Jan 2006 20:58:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Vandeginste", "Ruben", "" ], [ "Demoen", "Bart", "" ] ]
cs/0601005
Jinyun Ke
J-Y Ke and Y. Yao
Analyzing language development from a network approach
22 pages, 12 figures
null
null
null
cs.CL
null
In this paper we propose some new measures of language development using network analyses, which is inspired by the recent surge of interests in network studies of many real-world systems. Children's and care-takers' speech data from a longitudinal study are represented as a series of networks, word forms being taken as nodes and collocation of words as links. Measures on the properties of the networks, such as size, connectivity, hub and authority analyses, etc., allow us to make quantitative comparison so as to reveal different paths of development. For example, the asynchrony of development in network size and average degree suggests that children cannot be simply classified as early talkers or late talkers by one or two measures. Children follow different paths in a multi-dimensional space. They may develop faster in one dimension but slower in another dimension. The network approach requires little preprocessing of words and analyses on sentence structures, and the characteristics of words and their usage emerge from the network and are independent of any grammatical presumptions. We show that the change of the two articles "the" and "a" in their roles as important nodes in the network reflects the progress of children's syntactic development: the two articles often start in children's networks as hubs and later shift to authorities, while they are authorities constantly in the adult's networks. The network analyses provide a new approach to study language development, and at the same time language development also presents a rich area for network theories to explore.
[ { "version": "v1", "created": "Wed, 4 Jan 2006 18:33:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Ke", "J-Y", "" ], [ "Yao", "Y.", "" ] ]
cs/0601008
Ben Moszkowski
Ben Moszkowski
A Hierarchical Analysis of Propositional Temporal Logic Based on Intervals
64 pages, revised and expanded version of published work. An earlier version of this appeared in "We Will Show Them: Essays in Honour of Dov Gabbay on his 60th Birthday", Volume 2. S. Artemov, H. Barringer, A. S. d'Avila Garcez, L. C. Lamb, and J. Woods (editors.), pages 371-440, College Publications (formely KCL Publications), King's College, London, 2005, http://www.collegepublications.co.uk
null
null
null
cs.LO
null
We present a hierarchical framework for analysing propositional linear-time temporal logic (PTL) to obtain standard results such as a small model property, decision procedures and axiomatic completeness. Both finite time and infinite time are considered and one consequent benefit of the framework is the ability to systematically reduce infinite-time reasoning to finite-time reasoning. The treatment of PTL with both the operator Until and past time naturally reduces to that for PTL without either one. Our method utilises a low-level normal form for PTL called a "transition configuration". In addition, we employ reasoning about intervals of time. Besides being hierarchical and interval-based, the approach differs from other analyses of PTL typically based on sets of formulas and sequences of such sets. Instead we describe models using time intervals represented as finite and infinite sequences of states. The analysis relates larger intervals with smaller ones. Steps involved are expressed in Propositional Interval Temporal Logic (PITL) which is better suited than PTL for sequentially combining and decomposing formulas. Consequently, we can articulate issues in PTL model construction of equal relevance in more conventional analyses but normally only considered at the metalevel. We also describe a decision procedure based on Binary Decision Diagrams.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 18:35:38 GMT" }, { "version": "v2", "created": "Thu, 5 Jan 2006 23:30:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Moszkowski", "Ben", "" ] ]
cs/0601010
Xiaowen Zhang
Xiaowen Zhang, Li Shu, Ke Tang
Multi-Map Orbit Hopping Chaotic Stream Cipher
9 pages
null
null
null
cs.CR
null
In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum mechanism for secure digital communications and fundamental chaos characteristics of mixing, unpredictable, and extremely sensitive to initial conditions. The design, key and subkeys, and detail implementation of the system are addressed. A variable number of well studied chaotic maps form a map bank. And the key determines how the system hops between multiple orbits, and it also determines the number of maps, the number of orbits for each map, and the number of sample points for each orbits. A detailed example is provided.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 21:52:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Xiaowen", "" ], [ "Shu", "Li", "" ], [ "Tang", "Ke", "" ] ]
cs/0601011
Avner Magen
Hamed Hatami and Avner Magen and Vangelis Markakis
Integrality gaps of semidefinite programs for Vertex Cover and relations to $\ell_1$ embeddability of Negative Type metrics
A more complete version. Changed order of results. A complete proof of (current) Theorem 5
null
null
null
cs.DS cs.DM math.MG
null
We study various SDP formulations for {\sc Vertex Cover} by adding different constraints to the standard formulation. We show that {\sc Vertex Cover} cannot be approximated better than $2-o(1)$ even when we add the so called pentagonal inequality constraints to the standard SDP formulation, en route answering an open question of Karakostas~\cite{Karakostas}. We further show the surprising fact that by strengthening the SDP with the (intractable) requirement that the metric interpretation of the solution is an $\ell_1$ metric, we get an exact relaxation (integrality gap is 1), and on the other hand if the solution is arbitrarily close to being $\ell_1$ embeddable, the integrality gap may be as big as $2-o(1)$. Finally, inspired by the above findings, we use ideas from the integrality gap construction of Charikar \cite{Char02} to provide a family of simple examples for negative type metrics that cannot be embedded into $\ell_1$ with distortion better than $8/7-\eps$. To this end we prove a new isoperimetric inequality for the hypercube.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 23:10:58 GMT" }, { "version": "v2", "created": "Wed, 12 Apr 2006 14:01:50 GMT" }, { "version": "v3", "created": "Thu, 13 Apr 2006 20:17:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Hatami", "Hamed", "" ], [ "Magen", "Avner", "" ], [ "Markakis", "Vangelis", "" ] ]
cs/0601013
Germ\'an Vidal
Josep Silva and Germ\'an Vidal
Forward slicing of functional logic programs by partial evaluation
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.LO
null
Program slicing has been mainly studied in the context of imperative languages, where it has been applied to a wide variety of software engineering tasks, like program understanding, maintenance, debugging, testing, code reuse, etc. This work introduces the first forward slicing technique for declarative multi-paradigm programs which integrate features from functional and logic programming. Basically, given a program and a slicing criterion (a function call in our setting), the computed forward slice contains those parts of the original program which are reachable from the slicing criterion. Our approach to program slicing is based on an extension of (online) partial evaluation. Therefore, it provides a simple way to develop program slicing tools from existing partial evaluators and helps to clarify the relation between both methodologies. A slicing tool for the multi-paradigm language Curry, which demonstrates the usefulness of our approach, has been implemented in Curry itself.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 00:41:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Silva", "Josep", "" ], [ "Vidal", "Germán", "" ] ]
cs/0601018
Miguel Palomino
Miguel Palomino
A comparison between two logical formalisms for rewriting
31 pages, 2 figures To appear in Theory and Practice of Logic Programming
null
null
null
cs.LO
null
Meseguer's rewriting logic and the rewriting logic CRWL are two well-known approaches to rewriting as logical deduction that, despite some clear similarities, were designed with different objectives. Here we study the relationships between them, both at a syntactic and at a semantic level. Even though it is not possible to establish an entailment system map between them, both can be naturally simulated in each other. Semantically, there is no embedding between the corresponding institutions. Along the way, the notions of entailment and satisfaction in Meseguer's rewriting logic are generalized. We also use the syntactic results to prove reflective properties of CRWL.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 12:01:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Palomino", "Miguel", "" ] ]
cs/0601019
Antoine Reilles
Antoine Reilles (INRIA Lorraine - LORIA)
Canonical Abstract Syntax Trees
null
Dans Workshop on Rewriting Techniques and Applications (2006)
null
null
cs.PL
null
This paper presents Gom, a language for describing abstract syntax trees and generating a Java implementation for those trees. Gom includes features allowing the user to specify and modify the interface of the data structure. These features provide in particular the capability to maintain the internal representation of data in canonical form with respect to a rewrite system. This explicitly guarantees that the client program only manipulates normal forms for this rewrite system, a feature which is only implicitly used in many implementations.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 19:50:29 GMT" }, { "version": "v2", "created": "Tue, 21 Nov 2006 13:02:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Reilles", "Antoine", "", "INRIA Lorraine - LORIA" ] ]
cs/0601020
William Yurcik
Ruperto P. Majuca, William Yurcik, Jay P. Kesan
The Evolution of Cyberinsurance
16 pages, 6 tables, 2 figures
null
null
null
cs.CR cs.CY
null
Cyberinsurance is a powerful tool to align market incentives toward improving Internet security. We trace the evolution of cyberinsurance from traditional insurance policies to early cyber-risk insurance policies to current comprehensive cyberinsurance products. We find that increasing Internet security risk in combination with the need for compliance with recent corporate legislation has contributed significantly to the demand for cyberinsurance. Cyberinsurance policies have become more comprehensive as insurers better understand the risk landscape and specific business needs. More specifically, cyberinsurers are addressing what used to be considered insurmountable problems (e.g., adverse selection/asymmetric information, moral hazard, etc.) that could lead to a failure of this market solution. Although some implementation issues remain, we suggest the future development of cyberinsurance will resolve these issues as evidenced by insurance solutions in other risk domains.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 20:29:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Majuca", "Ruperto P.", "" ], [ "Yurcik", "William", "" ], [ "Kesan", "Jay P.", "" ] ]
cs/0601021
Alexander Haubold
Alexander Haubold
Lighting Control using Pressure-Sensitive Touchpads
null
null
null
null
cs.HC
null
We introduce a novel approach to control physical lighting parameters by means of a pressure-sensitive touchpad. The two-dimensional area of the touchpad is subdivided into 5 virtual sliders, each controlling the intensity of a color (red, green, blue, yellow, and white). The physical interaction methodology is modeled directly after ubiquitous mechanical sliders and dimmers which tend to be used for intensity/volume control. Our abstraction to a pressure-sensitive touchpad provides advantages and introduces additional benefits over such existing devices.
[ { "version": "v1", "created": "Sat, 7 Jan 2006 11:06:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ] ]
cs/0601024
Xu Hong
Hong Xu and Wen-Feng Qi
Further Results on the Distinctness of Decimations of l-sequences
submitted to IEEE-IT
null
null
null
cs.CR
null
Let $\underline{a}$ be an \textit{l}-sequence generated by a feedback-with-carry shift register with connection integer $q=p^{e}$, where $ p$ is an odd prime and $e\geq 1$. Goresky and Klapper conjectured that when $ p^{e}\notin \{5,9,11,13\}$, all decimations of $\underline{a}$ are cyclically distinct. When $e=1$ and $p>13$, they showed that the set of distinct decimations is large and, in some cases, all deciamtions are distinct. In this article, we further show that when $e\geq 2$ and$ p^{e}\neq 9$, all decimations of $\underline{a}$ are also cyclically distinct.
[ { "version": "v1", "created": "Mon, 9 Jan 2006 11:26:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Xu", "Hong", "" ], [ "Qi", "Wen-Feng", "" ] ]
cs/0601026
Nicholas Harvey
Nicholas J. A. Harvey
Algebraic Structures and Algorithms for Matching and Matroid Problems (Preliminary Version)
null
null
null
null
cs.DS cs.DM
null
Basic path-matchings, introduced by Cunningham and Geelen (FOCS 1996), are a common generalization of matroid intersection and non-bipartite matching. The main results of this paper are a new algebraic characterization of basic path-matching problems and an algorithm for constructing basic path-matchings in O(n^w) time, where n is the number of vertices and w is the exponent for matrix multiplication. Our algorithms are randomized, and our approach assumes that the given matroids are linear and can be represented over the same field. Our main results have interesting consequences for several special cases of path-matching problems. For matroid intersection, we obtain an algorithm with running time O(nr^(w-1))=O(nr^1.38), where the matroids have n elements and rank r. This improves the long-standing bound of O(nr^1.62) due to Gabow and Xu (FOCS 1989). Also, we obtain a simple, purely algebraic algorithm for non-bipartite matching with running time O(n^w). This resolves the central open problem of Mucha and Sankowski (FOCS 2004).
[ { "version": "v1", "created": "Mon, 9 Jan 2006 13:54:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Harvey", "Nicholas J. A.", "" ] ]
cs/0601033
Martin Kutz
Rolf Klein and Martin Kutz
The density of iterated crossing points and a gap result for triangulations of finite point sets
10 pages + appendix
null
null
null
cs.CG
null
Consider a plane graph G, drawn with straight lines. For every pair a,b of vertices of G, we compare the shortest-path distance between a and b in G (with Euclidean edge lengths) to their actual distance in the plane. The worst-case ratio of these two values, for all pairs of points, is called the dilation of G. All finite plane graphs of dilation 1 have been classified. They are closely related to the following iterative procedure. For a given point set P in R^2, we connect every pair of points in P by a line segment and then add to P all those points where two such line segments cross. Repeating this process infinitely often, yields a limit point set P*. The main result of this paper is the following gap theorem: For any finite point set P in the plane for which the above P* is infinite, there exists a threshold t > 1 such that P is not contained in the vertex set of any finite plane graph of dilation at most t. We construct a concrete point set Q such that any planar graph that contains this set amongst its vertices must have a dilation larger than 1.0000047.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 01:13:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Klein", "Rolf", "" ], [ "Kutz", "Martin", "" ] ]
cs/0601034
Vicky Weissman
Joseph Y. Halpern and Vicky Weissman
Using First-Order Logic to Reason about Policies
39 pages, earlier version in Proceedings of the Sixteenth IEEE Computer Security Foundations Workshop, 2003, pp. 187-201
null
null
null
cs.LO cs.CR
null
A policy describes the conditions under which an action is permitted or forbidden. We show that a fragment of (multi-sorted) first-order logic can be used to represent and reason about policies. Because we use first-order logic, policies have a clear syntax and semantics. We show that further restricting the fragment results in a language that is still quite expressive yet is also tractable. More precisely, questions about entailment, such as `May Alice access the file?', can be answered in time that is a low-order polynomial (indeed, almost linear in some cases), as can questions about the consistency of policy sets.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 04:30:49 GMT" }, { "version": "v2", "created": "Thu, 12 Jan 2006 12:58:59 GMT" }, { "version": "v3", "created": "Mon, 15 May 2006 15:10:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Weissman", "Vicky", "" ] ]
cs/0601035
Francois Colonna
Francois Colonna (LCT)
Deductive Object Programming
20 pages
null
null
null
cs.SE
null
We propose some slight additions to O-O languages to implement the necessary features for using Deductive Object Programming (DOP). This way of programming based upon the manipulation of the Production Tree of the Objects of Interest, result in making Persistent these Objects and in sensibly lowering the code complexity.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 09:50:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Colonna", "Francois", "", "LCT" ] ]
cs/0601037
Giorgio Delzanno
Giorgio Delzanno
Constraint-based verification of abstract models of multitreaded programs
To appear in Theory and Practice of Logic Programming
null
null
null
cs.CL cs.PL
null
We present a technique for the automated verification of abstract models of multithreaded programs providing fresh name generation, name mobility, and unbounded control. As high level specification language we adopt here an extension of communication finite-state machines with local variables ranging over an infinite name domain, called TDL programs. Communication machines have been proved very effective for representing communication protocols as well as for representing abstractions of multithreaded software. The verification method that we propose is based on the encoding of TDL programs into a low level language based on multiset rewriting and constraints that can be viewed as an extension of Petri Nets. By means of this encoding, the symbolic verification procedure developed for the low level language in our previous work can now be applied to TDL programs. Furthermore, the encoding allows us to isolate a decidable class of verification problems for TDL programs that still provide fresh name generation, name mobility, and unbounded control. Our syntactic restrictions are in fact defined on the internal structure of threads: In order to obtain a complete and terminating method, threads are only allowed to have at most one local variable (ranging over an infinite domain of names).
[ { "version": "v1", "created": "Tue, 10 Jan 2006 12:57:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Delzanno", "Giorgio", "" ] ]
cs/0601038
Giorgio Delzanno
Giorgio Delzanno
Constraint-based automatic verification of abstract models of multithreaded programs
To appear in Theory and Practice of Logic Programming
null
null
null
cs.LO cs.PL
null
We present a technique for the automated verification of abstract models of multithreaded programs providing fresh name generation, name mobility, and unbounded control. As high level specification language we adopt here an extension of communication finite-state machines with local variables ranging over an infinite name domain, called TDL programs. Communication machines have been proved very effective for representing communication protocols as well as for representing abstractions of multithreaded software. The verification method that we propose is based on the encoding of TDL programs into a low level language based on multiset rewriting and constraints that can be viewed as an extension of Petri Nets. By means of this encoding, the symbolic verification procedure developed for the low level language in our previous work can now be applied to TDL programs. Furthermore, the encoding allows us to isolate a decidable class of verification problems for TDL programs that still provide fresh name generation, name mobility, and unbounded control. Our syntactic restrictions are in fact defined on the internal structure of threads: In order to obtain a complete and terminating method, threads are only allowed to have at most one local variable (ranging over an infinite domain of names).
[ { "version": "v1", "created": "Tue, 10 Jan 2006 12:57:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Delzanno", "Giorgio", "" ] ]
cs/0601039
Santiago Escobar
Maria Alpuente, Santiago Escobar, Salvador Lucas
Removing Redundant Arguments Automatically
Accepted for publication in Theory and Practice of Logic Programming
null
null
null
cs.PL
null
The application of automatic transformation processes during the formal development and optimization of programs can introduce encumbrances in the generated code that programmers usually (or presumably) do not write. An example is the introduction of redundant arguments in the functions defined in the program. Redundancy of a parameter means that replacing it by any expression does not change the result. In this work, we provide methods for the analysis and elimination of redundant arguments in term rewriting systems as a model for the programs that can be written in more sophisticated languages. On the basis of the uselessness of redundant arguments, we also propose an erasure procedure which may avoid wasteful computations while still preserving the semantics (under ascertained conditions). A prototype implementation of these methods has been undertaken, which demonstrates the practicality of our approach.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 13:13:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Alpuente", "Maria", "" ], [ "Escobar", "Santiago", "" ], [ "Lucas", "Salvador", "" ] ]
cs/0601042
Christoph Benzm?ller Dr
Christoph Benzmueller, John Harrison, and Carsten Schuermann (Eds.)
LPAR-05 Workshop: Empirically Successfull Automated Reasoning in Higher-Order Logic (ESHOL)
Workshop Proceedings
null
null
null
cs.AI cs.LO
null
This workshop brings together practioners and researchers who are involved in the everyday aspects of logical systems based on higher-order logic. We hope to create a friendly and highly interactive setting for discussions around the following four topics. Implementation and development of proof assistants based on any notion of impredicativity, automated theorem proving tools for higher-order logic reasoning systems, logical framework technology for the representation of proofs in higher-order logic, formal digital libraries for storing, maintaining and querying databases of proofs. We envision attendees that are interested in fostering the development and visibility of reasoning systems for higher-order logics. We are particularly interested in a discusssion on the development of a higher-order version of the TPTP and in comparisons of the practical strengths of automated higher-order reasoning systems. Additionally, the workshop includes system demonstrations. ESHOL is the successor of the ESCAR and ESFOR workshops held at CADE 2005 and IJCAR 2004.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 18:43:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Benzmueller", "Christoph", "", "Eds." ], [ "Harrison", "John", "", "Eds." ], [ "Schuermann", "Carsten", "", "Eds." ] ]
cs/0601045
Lillian Lee
Oren Kurland and Lillian Lee
PageRank without hyperlinks: Structural re-ranking using links induced by language models
null
Proceedings of SIGIR 2005, pp. 306--313
null
null
cs.IR cs.CL
null
Inspired by the PageRank and HITS (hubs and authorities) algorithms for Web search, we propose a structural re-ranking approach to ad hoc information retrieval: we reorder the documents in an initially retrieved set by exploiting asymmetric relationships between them. Specifically, we consider generation links, which indicate that the language model induced from one document assigns high probability to the text of another; in doing so, we take care to prevent bias against long documents. We study a number of re-ranking criteria based on measures of centrality in the graphs formed by generation links, and show that integrating centrality into standard language-model-based retrieval is quite effective at improving precision at top ranks.
[ { "version": "v1", "created": "Wed, 11 Jan 2006 21:27:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurland", "Oren", "" ], [ "Lee", "Lillian", "" ] ]
cs/0601046
Lillian Lee
Oren Kurland, Lillian Lee, Carmel Domshlak
Better than the real thing? Iterative pseudo-query processing using cluster-based language models
null
Proceedings of SIGIR 2005, pp. 19--26
null
null
cs.IR cs.CL
null
We present a novel approach to pseudo-feedback-based ad hoc retrieval that uses language models induced from both documents and clusters. First, we treat the pseudo-feedback documents produced in response to the original query as a set of pseudo-queries that themselves can serve as input to the retrieval process. Observing that the documents returned in response to the pseudo-queries can then act as pseudo-queries for subsequent rounds, we arrive at a formulation of pseudo-query-based retrieval as an iterative process. Experiments show that several concrete instantiations of this idea, when applied in conjunction with techniques designed to heighten precision, yield performance results rivaling those of a number of previously-proposed algorithms, including the standard language-modeling approach. The use of cluster-based language models is a key contributing factor to our algorithms' success.
[ { "version": "v1", "created": "Wed, 11 Jan 2006 21:47:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurland", "Oren", "" ], [ "Lee", "Lillian", "" ], [ "Domshlak", "Carmel", "" ] ]
cs/0601047
Juan J. Merelo Pr.
Lourdes Araujo and Juan J. Merelo
Automatic Detection of Trends in Dynamical Text: An Evolutionary Approach
22 pages, submitted to Journal of Information Retrieval
null
null
null
cs.IR cs.NE
null
This paper presents an evolutionary algorithm for modeling the arrival dates of document streams, which is any time-stamped collection of documents, such as newscasts, e-mails, IRC conversations, scientific journals archives and weblog postings. This algorithm assigns frequencies (number of document arrivals per time unit) to time intervals so that it produces an optimal fit to the data. The optimization is a trade off between accurately fitting the data and avoiding too many frequency changes; this way the analysis is able to find fits which ignore the noise. Classical dynamic programming algorithms are limited by memory and efficiency requirements, which can be a problem when dealing with long streams. This suggests to explore alternative search methods which allow for some degree of uncertainty to achieve tractability. Experiments have shown that the designed evolutionary algorithm is able to reach the same solution quality as those classical dynamic programming algorithms in a shorter time. We have also explored different probabilistic models to optimize the fitting of the date streams, and applied these algorithms to infer whether a new arrival increases or decreases {\em interest} in the topic the document stream is about.
[ { "version": "v1", "created": "Thu, 12 Jan 2006 20:23:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Araujo", "Lourdes", "" ], [ "Merelo", "Juan J.", "" ] ]
cs/0601049
Tony Thomas
Tony Thomas, Arbind Kumar Lal
Undeniable Signature Schemes Using Braid Groups
null
null
null
null
cs.CR
null
Artin's braid groups have been recently suggested as a new source for public-key cryptography. In this paper we propose the first undeniable signature schemes using the conjugacy problem and the decomposition problem in the braid groups which are believed to be hard problems.
[ { "version": "v1", "created": "Fri, 13 Jan 2006 07:33:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Thomas", "Tony", "" ], [ "Lal", "Arbind Kumar", "" ] ]
cs/0601050
Alex Vinokur Dr.
Alex Vinokur
Computing Fibonacci numbers on a Turing Machine
5 pages, 1 table
null
null
null
cs.DM
null
A Turing machine that computes Fibonacci numbers is described.
[ { "version": "v1", "created": "Fri, 13 Jan 2006 14:27:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Vinokur", "Alex", "" ] ]
cs/0601051
Enrico Pontelli
Tran Cao Son and Enrico Pontelli
A Constructive Semantic Characterization of Aggregates in ASP
21 pages
null
null
null
cs.AI cs.LO cs.PL cs.SC
null
This technical note describes a monotone and continuous fixpoint operator to compute the answer sets of programs with aggregates. The fixpoint operator relies on the notion of aggregate solution. Under certain conditions, this operator behaves identically to the three-valued immediate consequence operator $\Phi^{aggr}_P$ for aggregate programs, independently proposed Pelov et al. This operator allows us to closely tie the computational complexity of the answer set checking and answer sets existence problems to the cost of checking a solution of the aggregates in the program. Finally, we relate the semantics described by the operator to other proposals for logic programming with aggregates. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Fri, 13 Jan 2006 16:09:36 GMT" }, { "version": "v2", "created": "Wed, 8 Feb 2006 18:31:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Son", "Tran Cao", "" ], [ "Pontelli", "Enrico", "" ] ]
cs/0601052
Subhash Kak
Subhash Kak
Artificial and Biological Intelligence
16 pages
ACM Ubiquity, vol. 6, number 42, 2005, pp. 1-20
null
null
cs.AI
null
This article considers evidence from physical and biological sciences to show machines are deficient compared to biological systems at incorporating intelligence. Machines fall short on two counts: firstly, unlike brains, machines do not self-organize in a recursive manner; secondly, machines are based on classical logic, whereas Nature's intelligence may depend on quantum mechanics.
[ { "version": "v1", "created": "Fri, 13 Jan 2006 19:01:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Kak", "Subhash", "" ] ]
cs/0601053
Vedran Kordic
Adel Al-Jumaily & Cindy Leung
Wavefront Propagation and Fuzzy Based Autonomous Navigation
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
Path planning and obstacle avoidance are the two major issues in any navigation system. Wavefront propagation algorithm, as a good path planner, can be used to determine an optimal path. Obstacle avoidance can be achieved using possibility theory. Combining these two functions enable a robot to autonomously navigate to its destination. This paper presents the approach and results in implementing an autonomous navigation system for an indoor mobile robot. The system developed is based on a laser sensor used to retrieve data to update a two dimensional world model of therobot environment. Waypoints in the path are incorporated into the obstacle avoidance. Features such as ageing of objects and smooth motion planning are implemented to enhance efficiency and also to cater for dynamic environments.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:09:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Al-Jumaily", "Adel", "" ], [ "Leung", "Cindy", "" ] ]
cs/0601054
Vedran Kordic
Victor Etxebarria, Arantza Sanz & Ibone Lizarraga
Control of a Lightweight Flexible Robotic Arm Using Sliding Modes
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
This paper presents a robust control scheme for flexible link robotic manipulators, which is based on considering the flexible mechanical structure as a system with slow (rigid) and fast (flexible) modes that can be controlled separately. The rigid dynamics is controlled by means of a robust sliding-mode approach with wellestablished stability properties while an LQR optimal design is adopted for the flexible dynamics. Experimental results show that this composite approach achieves good closed loop tracking properties both for the rigid and the flexible dynamics.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:10:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Etxebarria", "Victor", "" ], [ "Sanz", "Arantza", "" ], [ "Lizarraga", "Ibone", "" ] ]
cs/0601055
Vedran Kordic
Alborz Geramifard, Peyman Nayeri, Reza Zamani-Nasab & Jafar Habibi
A Hybrid Three Layer Architecture for Fire Agent Management in Rescue Simulation Environment
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
This paper presents a new architecture called FAIS for imple- menting intelligent agents cooperating in a special Multi Agent environ- ment, namely the RoboCup Rescue Simulation System. This is a layered architecture which is customized for solving fire extinguishing problem. Structural decision making algorithms are combined with heuristic ones in this model, so it's a hybrid architecture.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:12:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Geramifard", "Alborz", "" ], [ "Nayeri", "Peyman", "" ], [ "Zamani-Nasab", "Reza", "" ], [ "Habibi", "Jafar", "" ] ]
cs/0601056
Vedran Kordic
Panfeng Huang, Yangsheng Xu & Bin Liang
Dynamic Balance Control of Multi-arm Free-Floating Space Robots
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
This paper investigates the problem of the dynamic balance control of multi-arm free-floating space robot during capturing an active object in close proximity. The position and orientation of space base will be affected during the operation of space manipulator because of the dynamics coupling between the manipulator and space base. This dynamics coupling is unique characteristics of space robot system. Such a disturbance will produce a serious impact between the manipulator hand and the object. To ensure reliable and precise operation, we propose to develop a space robot system consisting of two arms, with one arm (mission arm) for accomplishing the capture mission, and the other one (balance arm) compensating for the disturbance of the base. We present the coordinated control concept for balance of the attitude of the base using the balance arm. The mission arm can move along the given trajectory to approach and capture the target with no considering the disturbance from the coupling of the base. We establish a relationship between the motion of two arm that can realize the zeros reaction to the base. The simulation studies verified the validity and efficiency of the proposed control method.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:13:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Panfeng", "" ], [ "Xu", "Yangsheng", "" ], [ "Liang", "Bin", "" ] ]
cs/0601057
Vedran Kordic
Musa Mailah, Endra Pitowarno & Hishamuddin Jamaluddin
Robust Motion Control for Mobile Manipulator Using Resolved Acceleration and Proportional-Integral Active Force Control
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
A resolved acceleration control (RAC) and proportional-integral active force control (PIAFC) is proposed as an approach for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile platform with a two-link planar arm mounted on top of the platform. The study emphasizes on the integrated kinematic and dynamic control strategy in which the RAC is used to manipulate the kinematic component while the PIAFC is implemented to compensate the dynamic effects including the bounded known/unknown disturbances and uncertainties. The effectivenss and robustness of the proposed scheme are investigated through a rigorous simulation study and later complemented with experimental results obtained through a number of experiments performed on a fully developed working prototype in a laboratory environment. A number of disturbances in the form of vibratory and impact forces are deliberately introduced into the system to evaluate the system performances. The investigation clearly demonstrates the extreme robustness feature of the proposed control scheme compared to other systems considered in the study.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:14:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Mailah", "Musa", "" ], [ "Pitowarno", "Endra", "" ], [ "Jamaluddin", "Hishamuddin", "" ] ]
cs/0601058
Vedran Kordic
Michael Sdahl & Bernd Kuhlenkoetter
CAGD - Computer Aided Gripper Design for a Flexible Gripping System
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
This paper is a summary of the recently accomplished research work on flexible gripping systems. The goal is to develop a gripper which can be used for a great amount of geometrically variant workpieces. The economic aspect is of particular importance during the whole development. The high flexibility of the gripper is obtained by three parallel used principles. These are human and computer based analysis of the gripping object as well as mechanical adaptation of the gripper to the object with the help of servo motors. The focus is on the gripping of free-form surfaces with suction cup.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:15:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Sdahl", "Michael", "" ], [ "Kuhlenkoetter", "Bernd", "" ] ]
cs/0601059
Vedran Kordic
Shu-qin Li, Lan Shuai, Xian-yi Cheng, Zhen-min Tang & Jing-yu Yang
A Descriptive Model of Robot Team and the Dynamic Evolution of Robot Team Cooperation
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
At present, the research on robot team cooperation is still in qualitative analysis phase and lacks the description model that can quantitatively describe the dynamical evolution of team cooperative relationships with constantly changeable task demand in Multi-robot field. First this paper whole and static describes organization model HWROM of robot team, then uses Markov course and Bayesian theorem for reference, dynamical describes the team cooperative relationships building. Finally from cooperative entity layer, ability layer and relative layer we research team formation and cooperative mechanism, and discuss how to optimize relative action sets during the evolution. The dynamic evolution model of robot team and cooperative relationships between robot teams proposed and described in this paper can not only generalize the robot team as a whole, but also depict the dynamic evolving process quantitatively. Users can also make the prediction of the cooperative relationship and the action of the robot team encountering new demands based on this model. Journal web page & a lot of robotic related papers www.ars-journal.com
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:18:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Shu-qin", "" ], [ "Shuai", "Lan", "" ], [ "Cheng", "Xian-yi", "" ], [ "Tang", "Zhen-min", "" ], [ "Yang", "Jing-yu", "" ] ]
cs/0601060
Vedran Kordic
Olga Bogatyreva & Alexandr Shillerov
Robot Swarms in an Uncertain World: Controllable Adaptability
Journal web page & a lot of robotic related papers www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
There is a belief that complexity and chaos are essential for adaptability. But life deals with complexity every moment, without the chaos that engineers fear so, by invoking goal-directed behaviour. Goals can be programmed. That is why living organisms give us hope to achieve adaptability in robots. In this paper a method for the description of a goal-directed, or programmed, behaviour, interacting with uncertainty of environment, is described. We suggest reducing the structural (goals, intentions) and stochastic components (probability to realise the goal) of individual behaviour to random variables with nominal values to apply probabilistic approach. This allowed us to use a Normalized Entropy Index to detect the system state by estimating the contribution of each agent to the group behaviour. The number of possible group states is 27. We argue that adaptation has a limited number of possible paths between these 27 states. Paths and states can be programmed so that after adjustment to any particular case of task and conditions, adaptability will never involve chaos. We suggest the application of the model to operation of robots or other devices in remote and/or dangerous places.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:20:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Bogatyreva", "Olga", "" ], [ "Shillerov", "Alexandr", "" ] ]
cs/0601061
Vedran Kordic
I. Topalova
Modular Adaptive System Based on a Multi-Stage Neural Structure for Recognition of 2D Objects of Discontinuous Production
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No1. (2005)
null
null
cs.RO
null
This is a presentation of a new system for invariant recognition of 2D objects with overlapping classes, that can not be effectively recognized with the traditional methods. The translation, scale and partial rotation invariant contour object description is transformed in a DCT spectrum space. The obtained frequency spectrums are decomposed into frequency bands in order to feed different BPG neural nets (NNs). The NNs are structured in three stages - filtering and full rotation invariance; partial recognition; general classification. The designed multi-stage BPG Neural Structure shows very good accuracy and flexibility when tested with 2D objects used in the discontinuous production. The reached speed and the opportunuty for an easy restructuring and reprogramming of the system makes it suitable for application in different applied systems for real time work.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:25:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Topalova", "I.", "" ] ]
cs/0601062
Vedran Kordic
Ceng Xian-yi, Li Shu-qin & Xia De-shen
Study of Self-Organization Model of Multiple Mobile Robot
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
A good organization model of multiple mobile robot should be able to improve the efficiency of the system, reduce the complication of robot interactions, and detract the difficulty of computation. From the sociology aspect of topology, structure and organization, this paper studies the multiple mobile robot organization formation and running mechanism in the dynamic, complicated and unknown environment. It presents and describes in detail a Hierarchical- Web Recursive Organization Model (HWROM) and forming algorithm. It defines the robot society leader; robotic team leader and individual robot as the same structure by the united framework and describes the organization model by the recursive structure. The model uses task-oriented and top-down method to dynamically build and maintain structures and organization. It uses market-based techniques to assign task, form teams and allocate resources in dynamic environment. The model holds several characteristics of self-organization, dynamic, conciseness, commonness and robustness.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:27:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Xian-yi", "Ceng", "" ], [ "Shu-qin", "Li", "" ], [ "De-shen", "Xia", "" ] ]
cs/0601063
Vedran Kordic
Atef A. Ata & Thi Rein Myo
Optimal Point-to-Point Trajectory Tracking of Redundant Manipulators using Generalized Pattern Search
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
Optimal point-to-point trajectory planning for planar redundant manipulator is considered in this study. The main objective is to minimize the sum of the position error of the end-effector at each intermediate point along the trajectory so that the end-effector can track the prescribed trajectory accurately. An algorithm combining Genetic Algorithm and Pattern Search as a Generalized Pattern Search GPS is introduced to design the optimal trajectory. To verify the proposed algorithm, simulations for a 3-D-O-F planar manipulator with different end-effector trajectories have been carried out. A comparison between the Genetic Algorithm and the Generalized Pattern Search shows that The GPS gives excellent tracking performance.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:29:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Ata", "Atef A.", "" ], [ "Myo", "Thi Rein", "" ] ]
cs/0601064
Vedran Kordic
Chua Kia & Mohd Rizal Arshad
Robotics Vision-based Heuristic Reasoning for Underwater Target Tracking and Navigation
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
This paper presents a robotics vision-based heuristic reasoning system for underwater target tracking and navigation. This system is introduced to improve the level of automation of underwater Remote Operated Vehicles (ROVs) operations. A prototype which combines computer vision with an underwater robotics system is successfully designed and developed to perform target tracking and intelligent navigation. ...
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:34:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Kia", "Chua", "" ], [ "Arshad", "Mohd Rizal", "" ] ]
cs/0601065
Vedran Kordic
Nazim Mir-Nasiri & Sulaiman Hussaini
New Intelligent Transmission Concept for Hybrid Mobile Robot Speed Control
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
This paper presents a new concept of a mobile robot speed control by using two degree of freedom gear transmission. The developed intelligent speed controller utilizes a gear box which comprises of epicyclic gear train with two inputs, one coupled with the engine shaft and another with the shaft of a variable speed dc motor. The net output speed is a combination of the two input speeds and is governed by the transmission ratio of the planetary gear train. This new approach eliminates the use of a torque converter which is otherwise an indispensable part of all available automatic transmissions, thereby reducing the power loss that occurs in the box during the fluid coupling. By gradually varying the speed of the dc motor a stepless transmission has been achieved. The other advantages of the developed controller are pulling over and reversing the vehicle, implemented by intelligent mixing of the dc motor and engine speeds. This approach eliminates traditional braking system in entire vehicle design. The use of two power sources, IC engine and battery driven DC motor, utilizes the modern idea of hybrid vehicles. The new mobile robot speed controller is capable of driving the vehicle even in extreme case of IC engine failure, for example, due to gas depletion.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:35:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Mir-Nasiri", "Nazim", "" ], [ "Hussaini", "Sulaiman", "" ] ]
cs/0601068
Sorav Bansal
Sorav Bansal
Checkbochs: Use Hardware to Check Software
4 pages, 4 figures
null
null
null
cs.OS cs.CR
null
In this paper, we present a system called Checkbochs, a machine simulator that checks rules about its guest operating system and applications at the hardware level. The properties to be checked can be implemented as `plugins' in the Checkbochs simulator. Some of the properties that were checked using Checkbochs include null-pointer checks, format-string vulnerabilities, user/kernel pointer checks, and race-conditions. On implementing these checks, we were able to uncover previously-unknown bugs in widely used Linux distributions. We also tested our tools on undergraduate coursework, and found numerous bugs.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 23:21:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Bansal", "Sorav", "" ] ]
cs/0601069
Boris Ryabko
Boris Ryabko
Fast Enumeration of Combinatorial Objects
null
published in Discrete Math.and Applications, v.10, n2, 1998
null
null
cs.CC cs.DM
null
The problem of ranking can be described as follows. We have a set of combinatorial objects $S$, such as, say, the k-subsets of n things, and we can imagine that they have been arranged in some list, say lexicographically, and we want to have a fast method for obtaining the rank of a given object in the list. This problem is widely known in Combinatorial Analysis, Computer Science and Information Theory. Ranking is closely connected with the hashing problem, especially with perfect hashing and with generating of random combinatorial objects. In Information Theory the ranking problem is closely connected with so-called enumerative encoding, which may be described as follows: there is a set of words $S$ and an enumerative code has to one-to-one encode every $s \in S$ by a binary word $code(s)$. The length of the $code(s)$ must be the same for all $s \in S$. Clearly, $|code (s)|\geq \log |S|$. (Here and below $\log x=\log_{2}x)$.) The suggested method allows the exponential growth of the speed of encoding and decoding for all combinatorial problems of enumeration which are considered, including the enumeration of permutations, compositions and others.
[ { "version": "v1", "created": "Sun, 15 Jan 2006 13:55:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Ryabko", "Boris", "" ] ]
cs/0601071
Antonio J. Fernandez
Antonio J. Fernandez, Teresa Hortala-Gonzalez, Fernando Saenz-Perez and Rafael del Vado-Virseda
Constraint Functional Logic Programming over Finite Domains
Accepted for publication in Theory and Practice of Logic programming (TPLP); 47 pages
null
null
null
cs.PL
null
In this paper, we present our proposal to Constraint Functional Logic Programming over Finite Domains (CFLP(FD)) with a lazy functional logic programming language which seamlessly embodies finite domain (FD) constraints. This proposal increases the expressiveness and power of constraint logic programming over finite domains (CLP(FD)) by combining functional and relational notation, curried expressions, higher-order functions, patterns, partial applications, non-determinism, lazy evaluation, logical variables, types, domain variables, constraint composition, and finite domain constraints. We describe the syntax of the language, its type discipline, and its declarative and operational semantics. We also describe TOY(FD), an implementation for CFLPFD(FD), and a comparison of our approach with respect to CLP(FD) from a programming point of view, showing the new features we introduce. And, finally, we show a performance analysis which demonstrates that our implementation is competitive with respect to existing CLP(FD) systems and that clearly outperforms the closer approach to CFLP(FD).
[ { "version": "v1", "created": "Mon, 16 Jan 2006 11:45:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Fernandez", "Antonio J.", "" ], [ "Hortala-Gonzalez", "Teresa", "" ], [ "Saenz-Perez", "Fernando", "" ], [ "del Vado-Virseda", "Rafael", "" ] ]
cs/0601076
Kuan-San Ooi
K. S. Ooi
Learning by Test-infecting Symmetric Ciphers
null
null
null
null
cs.CR
null
We describe a novel way in which students can learn the cipher systems without much supervision. In this work we focus on learning symmetric ciphers by altering them using the agile development approach. Two agile approaches the eXtreme Programming (XP) and the closely related Test-Driven Development (TDD) are mentioned or discussed. To facilitate this development we experiment with an approach that is based on refactoring, with JUnit serves as the automatic testing framework. In this work we exemplify our learning approach by test-infecting the Vernam cipher, an aged but still widely used stream cipher. One can replace the cipher with another symmetric cipher with the same behavior. Software testing is briefly described. Just-in-time introduction to Object-oriented programming (OOP), exemplified by using JavaTM, is advocated. Refactoring exercises, as argued, are kept strategically simple so that they do not become intensive class redesign exercises. The use of free or open-source tools and frameworks is mentioned.
[ { "version": "v1", "created": "Tue, 17 Jan 2006 08:48:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Ooi", "K. S.", "" ] ]
cs/0601078
Benjamin Gaidioz
Benjamin Gaidioz, Birger Koblitz, Nuno Santos
Exploring high performance distributed file storage using LDPC codes
null
null
null
null
cs.DC
null
We explore the feasibility of implementing a reliable, high performance, distributed storage system on a commodity computing cluster. Files are distributed across storage nodes using erasure coding with small Low-Density Parity-Check (LDPC) codes which provide high reliability while keeping the storage and performance overhead small. We present performance measurements done on a prototype system comprising 50 nodes which are self organised using a peer-to-peer overlay.
[ { "version": "v1", "created": "Tue, 17 Jan 2006 13:30:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Gaidioz", "Benjamin", "" ], [ "Koblitz", "Birger", "" ], [ "Santos", "Nuno", "" ] ]
cs/0601079
William Yurcik
Katherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam Slagell
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
19 pages, 11 figures, 4 tables
null
null
null
cs.CR
null
In the UNIX/Linux environment the kernel can log every command process created by every user using process accounting. This data has many potential uses, including the investigation of security incidents. However, process accounting data is also sensitive since it contains private user information. Consequently, security system administrators have been hindered from sharing these logs. Given that many interesting security applications could use process accounting data, it would be useful to have a tool that could protect private user information in the logs. For this reason we introduce SCRUB-PA, a tool that uses multi-level multi-dimensional anonymization on process accounting log files in order to provide different levels of privacy protection. It is our goal that SCRUB-PA will promote the sharing of process accounting logs while preserving privacy.
[ { "version": "v1", "created": "Wed, 18 Jan 2006 01:08:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Luo", "Katherine", "" ], [ "Li", "Yifan", "" ], [ "Ermopoulos", "Charis", "" ], [ "Yurcik", "William", "" ], [ "Slagell", "Adam", "" ] ]
cs/0601081
Andrej (Andy) Brodnik
Andrej Brodnik, Johan Karlsson, J. Ian Munro, Andreas Nilsson
An O(1) Solution to the Prefix Sum Problem on a Specialized Memory Architecture
12 pages
null
null
null
cs.DS cs.CC cs.IR
null
In this paper we study the Prefix Sum problem introduced by Fredman. We show that it is possible to perform both update and retrieval in O(1) time simultaneously under a memory model in which individual bits may be shared by several words. We also show that two variants (generalizations) of the problem can be solved optimally in $\Theta(\lg N)$ time under the comparison based model of computation.
[ { "version": "v1", "created": "Wed, 18 Jan 2006 21:20:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Brodnik", "Andrej", "" ], [ "Karlsson", "Johan", "" ], [ "Munro", "J. Ian", "" ], [ "Nilsson", "Andreas", "" ] ]
cs/0601082
Shai Carmi
Shai Carmi, Reuven Cohen and Danny Dolev
Search in Complex Networks : a New Method of Naming
5 pages, 4 figures
Europhys. Lett., 74 (6), pp. 1102-1108 (2006)
10.1209/epl/i2006-10049-1
null
cs.NI cond-mat.dis-nn
null
We suggest a method for routing when the source does not posses full information about the shortest path to the destination. The method is particularly useful for scale-free networks, and exploits its unique characteristics. By assigning new (short) names to nodes (aka labelling) we are able to reduce significantly the memory requirement at the routers, yet we succeed in routing with high probability through paths very close in distance to the shortest ones.
[ { "version": "v1", "created": "Wed, 18 Jan 2006 21:21:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Carmi", "Shai", "" ], [ "Cohen", "Reuven", "" ], [ "Dolev", "Danny", "" ] ]
cs/0601084
Robert Schweller
Ming-Yang Kao, Manan Sanghi, Robert Schweller
Randomized Fast Design of Short DNA Words
null
Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP 2005), Lisboa, Portugal, July 11-15, 2005, pp. 1275-1286
null
null
cs.DS
null
We consider the problem of efficiently designing sets (codes) of equal-length DNA strings (words) that satisfy certain combinatorial constraints. This problem has numerous motivations including DNA computing and DNA self-assembly. Previous work has extended results from coding theory to obtain bounds on code size for new biologically motivated constraints and has applied heuristic local search and genetic algorithm techniques for code design. This paper proposes a natural optimization formulation of the DNA code design problem in which the goal is to design n strings that satisfy a given set of constraints while minimizing the length of the strings. For multiple sets of constraints, we provide high-probability algorithms that run in time polynomial in n and any given constraint parameters, and output strings of length within a constant factor of the optimal. To the best of our knowledge, this work is the first to consider this type of optimization problem in the context of DNA code design.
[ { "version": "v1", "created": "Thu, 19 Jan 2006 00:22:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Kao", "Ming-Yang", "" ], [ "Sanghi", "Manan", "" ], [ "Schweller", "Robert", "" ] ]
cs/0601085
Vicky Weissman
Riccardo Pucella and Vicky Weissman
A Formal Foundation for ODRL
30 pgs, preliminary version presented at WITS-04 (Workshop on Issues in the Theory of Security), 2004
null
null
null
cs.LO cs.CR
null
ODRL is a popular XML-based language for stating the conditions under which resources can be accessed legitimately. The language is described in English and, as a result, agreements written in ODRL are open to interpretation. To address this problem, we propose a formal semantics for a representative fragment of the language. We use this semantics to determine precisely when a permission is implied by a set of ODRL statements and show that answering such questions is a decidable NP-hard problem. Finally, we define a tractable fragment of ODRL that is also fairly expressive.
[ { "version": "v1", "created": "Thu, 19 Jan 2006 02:41:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ], [ "Weissman", "Vicky", "" ] ]
cs/0601086
Stephen Cook
Stephen Cook
Comments on Beckmann's Uniform Reducts
null
null
null
null
cs.CC
null
Arnold Beckmann defined the uniform reduct of a propositional proof system f to be the set of those bounded arithmetical formulas whose propositional translations have polynomial size f-proofs. We prove that the uniform reduct of f + Extended Frege consists of all true bounded arithmetical formulas iff f + Extended Frege simulates every proof system.
[ { "version": "v1", "created": "Thu, 19 Jan 2006 22:56:49 GMT" }, { "version": "v2", "created": "Mon, 23 Jan 2006 18:08:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Cook", "Stephen", "" ] ]
cs/0601087
Victor Kromer
Kromer Victor
Processing of Test Matrices with Guessing Correction
10 pages, in Russian
null
null
null
cs.LG
null
It is suggested to insert into test matrix 1s for correct responses, 0s for response refusals, and negative corrective elements for incorrect responses. With the classical test theory approach test scores of examinees and items are calculated traditionally as sums of matrix elements, organized in rows and columns. Correlation coefficients are estimated using correction coefficients. In item response theory approach examinee and item logits are estimated using maximum likelihood method and probabilities of all matrix elements.
[ { "version": "v1", "created": "Fri, 20 Jan 2006 05:40:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Victor", "Kromer", "" ] ]
cs/0601096
Nicolas Tabareau
Deepak D'Souza, Nicolas Tabareau (PPS)
On timed automata with input-determined guards
null
null
null
null
cs.LO
null
We consider a general notion of timed automata with input-determined guards and show that they admit a robust logical framework along the lines of [D 'Souza03], in terms of a monadic second order logic characterisation and an expressively complete timed temporal logic. We then generalize these automata using the notion of recursive operators introduced by Henzinger, Raskin, and Schobbens, and show that they admit a similar logical framework. These results hold in the ``pointwise'' semantics. We finally use this framework to show that the real-time logic MITL of Alur et al is expressively complete with respect to an MSO corresponding to an appropriate input-determined operator.
[ { "version": "v1", "created": "Mon, 23 Jan 2006 10:45:25 GMT" } ]
2007-05-23T00:00:00
[ [ "D'Souza", "Deepak", "", "PPS" ], [ "Tabareau", "Nicolas", "", "PPS" ] ]
cs/0601097
B.S.Shajee Mohan
B.S. Shajeemohan, Dr. V.K. Govindan
Compression Scheme for Faster and Secure Data Transmission Over Internet
null
null
null
null
cs.PF cs.DC
null
Compression algorithms reduce the redundancy in data representation to decrease the storage required for that data. Data compression offers an attractive approach to reducing communication costs by using available bandwidth effectively. Over the last decade there has been an unprecedented explosion in the amount of digital data transmitted via the Internet, representing text, images, video, sound, computer programs, etc. With this trend expected to continue, it makes sense to pursue research on developing algorithms that can most effectively use available network bandwidth by maximally compressing data. It is also important to consider the security aspects of the data being transmitted while compressing it, as most of the text data transmitted over the Internet is very much vulnerable to a multitude of attacks. This paper is focused on addressing this problem of lossless compression of text files with an added security.
[ { "version": "v1", "created": "Mon, 23 Jan 2006 11:47:06 GMT" }, { "version": "v2", "created": "Tue, 24 Jan 2006 03:33:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Shajeemohan", "B. S.", "" ], [ "Govindan", "Dr. V. K.", "" ] ]
cs/0601100
Luca Trevisan
Luca Trevisan
Pseudorandomness and Combinatorial Constructions
Submitted to the Proceedings of ICM'06, Madrid
null
null
null
cs.CC math.CO
null
In combinatorics, the probabilistic method is a very powerful tool to prove the existence of combinatorial objects with interesting and useful properties. Explicit constructions of objects with such properties are often very difficult, or unknown. In computer science, probabilistic algorithms are sometimes simpler and more efficient than the best known deterministic algorithms for the same problem. Despite this evidence for the power of random choices, the computational theory of pseudorandomness shows that, under certain complexity-theoretic assumptions, every probabilistic algorithm has an efficient deterministic simulation and a large class of applications of the the probabilistic method can be converted into explicit constructions. In this survey paper we describe connections between the conditional ``derandomization'' results of the computational theory of pseudorandomness and unconditional explicit constructions of certain combinatorial objects such as error-correcting codes and ``randomness extractors.''
[ { "version": "v1", "created": "Mon, 23 Jan 2006 19:24:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Trevisan", "Luca", "" ] ]
cs/0601103
Philipp Mayr
Philipp Mayr, Fabio Tosques
Google Web APIs - an Instrument for Webometric Analyses?
2 pages, 2 figures, 10th International Conference of the International Society for Scientometrics and Informetrics
null
null
null
cs.IR
null
This paper introduces Google Web APIs (Google APIs) as an instrument and playground for webometric studies. Several examples of Google APIs implementations are given. Our examples show that this Google Web Service can be used successfully for informetric Internet based studies albeit with some restrictions.
[ { "version": "v1", "created": "Tue, 24 Jan 2006 10:23:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Mayr", "Philipp", "" ], [ "Tosques", "Fabio", "" ] ]
cs/0601105
Vassilios Vassiliadis
Vassilios S. Vassiliadis
The Perceptron Algorithm: Image and Signal Decomposition, Compression, and Analysis by Iterative Gaussian Blurring
null
null
null
null
cs.CV
null
A novel algorithm for tunable compression to within the precision of reproduction targets, or storage, is proposed. The new algorithm is termed the `Perceptron Algorithm', which utilises simple existing concepts in a novel way, has multiple immediate commercial application aspects as well as it opens up a multitude of fronts in computational science and technology. The aims of this paper are to present the concepts underlying the algorithm, observations by its application to some example cases, and the identification of a multitude of potential areas of applications such as: image compression by orders of magnitude, signal compression including sound as well, image analysis in a multilayered detailed analysis, pattern recognition and matching and rapid database searching (e.g. face recognition), motion analysis, biomedical applications e.g. in MRI and CAT scan image analysis and compression, as well as hints on the link of these ideas to the way how biological memory might work leading to new points of view in neural computation. Commercial applications of immediate interest are the compression of images at the source (e.g. photographic equipment, scanners, satellite imaging systems), DVD film compression, pay-per-view downloads acceleration and many others identified in the present paper at its conclusion and future work section.
[ { "version": "v1", "created": "Tue, 24 Jan 2006 17:23:17 GMT" }, { "version": "v2", "created": "Wed, 25 Jan 2006 10:40:53 GMT" }, { "version": "v3", "created": "Thu, 26 Jan 2006 08:42:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Vassiliadis", "Vassilios S.", "" ] ]
cs/0601106
Vassilios Vassiliadis
Vassilios S. Vassiliadis
The `Face on Mars': a photographic approach for the search of signs of past civilizations from a macroscopic point of view, factoring long-term erosion in image reconstruction
9 pages
null
null
null
cs.CV
null
This short article presents an alternative view of high resolution imaging from various sources with the aim of the discovery of potential sites of archaeological importance, or sites that exhibit `anomalies' such that they may merit closer inspection and analysis. It is conjectured, and to a certain extent demonstrated here, that it is possible for advanced civilizations to factor in erosion by natural processes into a large scale design so that main features be preserved even with the passage of millions of years. Alternatively viewed, even without such intent embedded in a design left for posterity, it is possible that a gigantic construction may naturally decay in such a way that even cataclysmic (massive) events may leave sufficient information intact with the passage of time, provided one changes the point of view from high resolution images to enhanced blurred renderings of the sites in question.
[ { "version": "v1", "created": "Tue, 24 Jan 2006 18:12:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Vassiliadis", "Vassilios S.", "" ] ]
cs/0601108
Alain Lifchitz
Alain Lifchitz, Frederic Maire and Dominique Revuz
Fast Lexically Constrained Viterbi Algorithm (FLCVA): Simultaneous Optimization of Speed and Memory
5 pages, 2 figures, 4 tables
null
null
null
cs.CV cs.AI cs.DS
null
Lexical constraints on the input of speech and on-line handwriting systems improve the performance of such systems. A significant gain in speed can be achieved by integrating in a digraph structure the different Hidden Markov Models (HMM) corresponding to the words of the relevant lexicon. This integration avoids redundant computations by sharing intermediate results between HMM's corresponding to different words of the lexicon. In this paper, we introduce a token passing method to perform simultaneously the computation of the a posteriori probabilities of all the words of the lexicon. The coding scheme that we introduce for the tokens is optimal in the information theory sense. The tokens use the minimum possible number of bits. Overall, we optimize simultaneously the execution speed and the memory requirement of the recognition systems.
[ { "version": "v1", "created": "Wed, 25 Jan 2006 17:50:13 GMT" }, { "version": "v2", "created": "Wed, 1 Feb 2006 13:05:36 GMT" }, { "version": "v3", "created": "Thu, 2 Feb 2006 23:00:28 GMT" }, { "version": "v4", "created": "Sun, 19 Mar 2006 16:40:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Lifchitz", "Alain", "" ], [ "Maire", "Frederic", "" ], [ "Revuz", "Dominique", "" ] ]
cs/0601111
Ted Herman
Chen Zhang, Ted Herman
Localization in Wireless Sensor Grids
17 pages, 6 figures
null
null
TR01-06
cs.DC
null
This work reports experiences on using radio ranging to position sensors in a grid topology. The implementation is simple, efficient, and could be practically distributed. The paper describes an implementation and experimental result based on RSSI distance estimation. Novel techniques such as fuzzy membership functions and table lookup are used to obtain more accurate result and simplify the computation. An 86% accuracy is achieved in the experiment in spite of inaccurate RSSI distance estimates with errors up to 60%.
[ { "version": "v1", "created": "Wed, 25 Jan 2006 23:48:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Chen", "" ], [ "Herman", "Ted", "" ] ]