id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0601117 | Prashant Singh | Dhananjay D. Kulkarni, Shekhar Verma, Prashant | Finding Cliques of a Graph using Prime Numbers | 7 pages, 1 figure | null | null | null | cs.DS | null | This paper proposes a new algorithm for solving maximal cliques for simple
undirected graphs using the theory of prime numbers. A novel approach using
prime numbers is used to find cliques and ends with a discussion of the
algorithm.
| [
{
"version": "v1",
"created": "Fri, 27 Jan 2006 20:11:14 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jan 2007 22:48:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kulkarni",
"Dhananjay D.",
""
],
[
"Verma",
"Shekhar",
""
],
[
"Prashant",
"",
""
]
] |
cs/0601118 | Richard McClatchey | David Manset, Herve Verjus, Richard McClatchey, Flavio Oquendo | A Formal Architecture-Centric Model-Driven Approach for the Automatic
Generation of Grid Applications | 11 pages, 9 figures. Proc of the 8th International Conference on
Enterprise Information Systems (ICEIS06) Paphos, Cyprus. May 2006 | null | null | null | cs.SE | null | This paper discusses the concept of model-driven software engineering applied
to the Grid application domain. As an extension to this concept, the approach
described here, attempts to combine both formal architecture-centric and
model-driven paradigms. It is a commonly recognized statement that Grid systems
have seldom been designed using formal techniques although from past experience
such techniques have shown advantages. This paper advocates a formal
engineering approach to Grid system developments in an effort to contribute to
the rigorous development of Grids software architectures. This approach
addresses quality of service and cross-platform developments by applying the
model-driven paradigm to a formal architecture-centric engineering method. This
combination benefits from a formal semantic description power in addition to
model-based transformations. The result of such a novel combined concept
promotes the re-use of design models and facilitates developments in Grid
computing.
| [
{
"version": "v1",
"created": "Sat, 28 Jan 2006 00:08:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Manset",
"David",
""
],
[
"Verjus",
"Herve",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Oquendo",
"Flavio",
""
]
] |
cs/0601119 | Richard McClatchey | Haya El-Ghalayini, Mohammed Odeh, & Richard McClatchey | Engineering Conceptual Data Models from Domain Ontologies: A Critical
Evaluation | 12 pages, 3 figures, presented at the 4th International Conference on
Computer Science and Information Technology (CSIT'06). Amman Jordan April
2006 | null | null | null | cs.SE | null | This paper studies the differences and similarities between domain ontologies
and conceptual data models and the role that ontologies can play in
establishing conceptual data models during the process of information systems
development. A mapping algorithm has been proposed and embedded in a special
purpose Transformation Engine to generate a conceptual data model from a given
domain ontology. Both quantitative and qualitative methods have been adopted to
critically evaluate this new approach. In addition, this paper focuses on
evaluating the quality of the generated conceptual data model elements using
Bunge-Wand-Weber and OntoClean ontologies. The results of this evaluation
indicate that the generated conceptual data model provides a high degree of
accuracy in identifying the substantial domain entities along with their
attributes and relationships being derived from the consensual semantics of
domain knowledge. The results are encouraging and support the potential role
that this approach can take part in process of information system development.
| [
{
"version": "v1",
"created": "Sat, 28 Jan 2006 17:40:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"El-Ghalayini",
"Haya",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
]
] |
cs/0601121 | Marko Antonio Rodriguez | Marko A. Rodriguez | A Multi-Relational Network to Support the Scholarly Communication
Process | keywords: digital libraries and scholarly communication | International Journal of Public Information Systems, volume 2007,
issue 1, pp. 13-29 | null | LA-UR-06-2416 | cs.DL cs.AI cs.IR | null | The general pupose of the scholarly communication process is to support the
creation and dissemination of ideas within the scientific community. At a finer
granularity, there exists multiple stages which, when confronted by a member of
the community, have different requirements and therefore different solutions.
In order to take a researcher's idea from an initial inspiration to a community
resource, the scholarly communication infrastructure may be required to 1)
provide a scientist initial seed ideas; 2) form a team of well suited
collaborators; 3) located the most appropriate venue to publish the formalized
idea; 4) determine the most appropriate peers to review the manuscript; and 5)
disseminate the end product to the most interested members of the community.
Through the various delinieations of this process, the requirements of each
stage are tied soley to the multi-functional resources of the community: its
researchers, its journals, and its manuscritps. It is within the collection of
these resources and their inherent relationships that the solutions to
scholarly communication are to be found. This paper describes an associative
network composed of multiple scholarly artifacts that can be used as a medium
for supporting the scholarly communication process.
| [
{
"version": "v1",
"created": "Sat, 28 Jan 2006 22:45:42 GMT"
},
{
"version": "v2",
"created": "Mon, 21 May 2007 13:35:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
] |
cs/0601125 | Carl Lagoze | Carl Lagoze, Dean Krafft, Tim Cornwell, Naomi Dushay, Dean Eckstrom,
and John Saylor | Metadata aggregation and "automated digital libraries": A retrospective
on the NSDL experience | Submission to JCDL 2006 | null | null | null | cs.DL | null | Over three years ago, the Core Integration team of the National Science
Digital Library (NSDL) implemented a digital library based on metadata
aggregation using Dublin Core and OAI-PMH. The initial expectation was that
such low-barrier technologies would be relatively easy to automate and
administer. While this architectural choice permitted rapid deployment of a
production NSDL, our three years of experience have contradicted our original
expectations of easy automation and low people cost. We have learned that
alleged "low-barrier" standards are often harder to deploy than expected. In
this paper we report on this experience and comment on the general cost, the
functionality, and the ultimate effectiveness of this architecture.
| [
{
"version": "v1",
"created": "Mon, 30 Jan 2006 12:26:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Krafft",
"Dean",
""
],
[
"Cornwell",
"Tim",
""
],
[
"Dushay",
"Naomi",
""
],
[
"Eckstrom",
"Dean",
""
],
[
"Saylor",
"John",
""
]
] |
cs/0601129 | Abhilash Ponnath | Abhilash Ponnath | Instantaneously Trained Neural Networks | 13 pages | null | null | null | cs.NE cs.AI | null | This paper presents a review of instantaneously trained neural networks
(ITNNs). These networks trade learning time for size and, in the basic model, a
new hidden node is created for each training sample. Various versions of the
corner-classification family of ITNNs, which have found applications in
artificial intelligence (AI), are described. Implementation issues are also
considered.
| [
{
"version": "v1",
"created": "Mon, 30 Jan 2006 22:02:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ponnath",
"Abhilash",
""
]
] |
cs/0602001 | Lane A. Hemaspaandra | Lane A. Hemaspaandra and Mayur Thakur | Query-Monotonic Turing Reductions | null | null | null | URCS-TR-818 | cs.CC | null | We study reductions that limit the extreme adaptivity of Turing reductions.
In particular, we study reductions that make a rapid, structured progression
through the set to which they are reducing: Each query is strictly longer
(shorter) than the previous one. We call these reductions query-increasing
(query-decreasing) Turing reductions. We also study query-nonincreasing
(query-nondecreasing) Turing reductions. These are Turing reductions in which
the sequence of query lengths is nonincreasing (nondecreasing). We ask whether
these restrictions in fact limit the power of reductions. We prove that
query-increasing and query-decreasing Turing reductions are incomparable with
(that is, are neither strictly stronger than nor strictly weaker than)
truth-table reductions and are strictly weaker than Turing reductions. In
addition, we prove that query-nonincreasing and query-nondecreasing Turing
reductions are strictly stronger than truth-table reductions and strictly
weaker than Turing reductions. Despite the fact that we prove query-increasing
and query-decreasing Turing reductions to in the general case be strictly
weaker than Turing reductions, we identify a broad class of sets A for which
any set that Turing reduces to A will also reduce to A via both
query-increasing and query-decreasing Turing reductions. In particular, this
holds for all tight paddable sets, where a set is said to be tight paddable
exactly if it is paddable via a function whose output length is bounded tightly
both from above and from below in the length of the input. We prove that many
natural NP-complete problems such as satisfiability, clique, and vertex cover
are tight paddable.
| [
{
"version": "v1",
"created": "Tue, 31 Jan 2006 22:02:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Thakur",
"Mayur",
""
]
] |
cs/0602003 | Subhash Kak | Navneet Mandhani and Subhash Kak | Watermarking Using Decimal Sequences | 8 pages, 9 figures | Cryptologia, vol. 29, pp. 50-58, 2005 | null | null | cs.CR | null | This paper introduces the use of decimal sequences in a code division
multiple access (CDMA) based watermarking system to hide information for
authentication in black and white images. Matlab version 6.5 was used to
implement the algorithms discussed in this paper. The advantage of using
d-sequences over PN sequences is that one can choose from a variety of prime
numbers which provides a more flexible system.
| [
{
"version": "v1",
"created": "Thu, 2 Feb 2006 19:43:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mandhani",
"Navneet",
""
],
[
"Kak",
"Subhash",
""
]
] |
cs/0602004 | Christoph Koch | Georg Gottlob, Christoph Koch, Klaus U. Schulz | Conjunctive Queries over Trees | 36 pages, 12 figures, 2 tables, long version of PODS 2004 papers. To
appear in Journal of the ACM 53(2), March 2006 | null | null | null | cs.DB cs.AI cs.CC cs.LO | null | We study the complexity and expressive power of conjunctive queries over
unranked labeled trees represented using a variety of structure relations such
as ``child'', ``descendant'', and ``following'' as well as unary relations for
node labels. We establish a framework for characterizing structures
representing trees for which conjunctive queries can be evaluated efficiently.
Then we completely chart the tractability frontier of the problem and establish
a dichotomy theorem for our axis relations, i.e., we find all subset-maximal
sets of axes for which query evaluation is in polynomial time and show that for
all other cases, query evaluation is NP-complete. All polynomial-time results
are obtained immediately using the proof techniques from our framework.
Finally, we study the expressiveness of conjunctive queries over trees and show
that for each conjunctive query, there is an equivalent acyclic positive query
(i.e., a set of acyclic conjunctive queries), but that in general this query is
not of polynomial size.
| [
{
"version": "v1",
"created": "Thu, 2 Feb 2006 23:28:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gottlob",
"Georg",
""
],
[
"Koch",
"Christoph",
""
],
[
"Schulz",
"Klaus U.",
""
]
] |
cs/0602008 | Julio Mari\~no | Julio Marino, Angel Herranz and Juan Jose Moreno-Navarro | Demand Analysis with Partial Predicates | This is the extended version of a paper accepted for publication in a
forthcoming special issue of Theory and Practice of Logic Programming on
Multiparadigm and Constraint Programming (Falaschi and Maher, eds.)
Appendices are missing in the printed version | null | null | null | cs.PL cs.SC | null | In order to alleviate the inefficiencies caused by the interaction of the
logic and functional sides, integrated languages may take advantage of
\emph{demand} information -- i.e. knowing in advance which computations are
needed and, to which extent, in a particular context. This work studies
\emph{demand analysis} -- which is closely related to \emph{backwards
strictness analysis} -- in a semantic framework of \emph{partial predicates},
which in turn are constructive realizations of ideals in a domain. This will
allow us to give a concise, unified presentation of demand analysis, to relate
it to other analyses based on abstract interpretation or strictness logics,
some hints for the implementation, and, more important, to prove the soundness
of our analysis based on \emph{demand equations}. There are also some
innovative results. One of them is that a set constraint-based analysis has
been derived in a stepwise manner using ideas taken from the area of program
transformation. The other one is the possibility of using program
transformation itself to perform the analysis, specially in those domains of
properties where algorithms based on constraint solving are too weak.
| [
{
"version": "v1",
"created": "Sat, 4 Feb 2006 20:22:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marino",
"Julio",
""
],
[
"Herranz",
"Angel",
""
],
[
"Moreno-Navarro",
"Juan Jose",
""
]
] |
cs/0602010 | Robert Schweller | Ming-Yang Kao, Robert Schweller | Reducing Tile Complexity for Self-Assembly Through Temperature
Programming | A preliminary version of this paper appeared in Proceedings of the
17th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2006), Miami,
Florida, Jan. 2006 | null | null | null | cs.CC | null | We consider the tile self-assembly model and how tile complexity can be
eliminated by permitting the temperature of the self-assembly system to be
adjusted throughout the assembly process. To do this, we propose novel
techniques for designing tile sets that permit an arbitrary length $m$ binary
number to be encoded into a sequence of $O(m)$ temperature changes such that
the tile set uniquely assembles a supertile that precisely encodes the
corresponding binary number. As an application, we show how this provides a
general tile set of size O(1) that is capable of uniquely assembling
essentially any $n\times n$ square, where the assembled square is determined by
a temperature sequence of length $O(\log n)$ that encodes a binary description
of $n$. This yields an important decrease in tile complexity from the required
$\Omega(\frac{\log n}{\log\log n})$ for almost all $n$ when the temperature of
the system is fixed. We further show that for almost all $n$, no tile system
can simultaneously achieve both $o(\log n)$ temperature complexity and
$o(\frac{\log n}{\log\log n})$ tile complexity, showing that both versions of
an optimal square building scheme have been discovered. This work suggests that
temperature change can constitute a natural, dynamic method for providing input
to self-assembly systems that is potentially superior to the current technique
of designing large tile sets with specific inputs hardwired into the tileset.
| [
{
"version": "v1",
"created": "Sun, 5 Feb 2006 01:00:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kao",
"Ming-Yang",
""
],
[
"Schweller",
"Robert",
""
]
] |
cs/0602013 | David Pritchard | David Pritchard | An Optimal Distributed Edge-Biconnectivity Algorithm | Submitted to PODC 2006. Contains a pstricks figure | null | null | null | cs.DC | null | We describe a synchronous distributed algorithm which identifies the
edge-biconnected components of a connected network. It requires a leader, and
uses messages of size O(log |V|). The main idea is to preorder a BFS spanning
tree, and then to efficiently compute least common ancestors so as to mark
cycle edges. This algorithm takes O(Diam) time and uses O(|E|) messages.
Furthermore, we show that no correct singly-initiated edge-biconnectivity
algorithm can beat either bound on any graph by more than a constant factor. We
also describe a near-optimal local algorithm for edge-biconnectivity.
| [
{
"version": "v1",
"created": "Sun, 5 Feb 2006 20:47:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pritchard",
"David",
""
]
] |
cs/0602018 | Jiyou Jia Dr. | Jiyou Jia, Shufen Hou, Weichao Chen | Improving the CSIEC Project and Adapting It to the English Teaching and
Learning in China | null | null | null | null | cs.CY cs.AI cs.CL cs.HC cs.MA | null | In this paper after short review of the CSIEC project initialized by us in
2003 we present the continuing development and improvement of the CSIEC project
in details, including the design of five new Microsoft agent characters
representing different virtual chatting partners and the limitation of
simulated dialogs in specific practical scenarios like graduate job application
interview, then briefly analyze the actual conditions and features of its
application field: web-based English education in China. Finally we introduce
our efforts to adapt this system to the requirements of English teaching and
learning in China and point out the work next to do.
| [
{
"version": "v1",
"created": "Mon, 6 Feb 2006 15:17:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jia",
"Jiyou",
""
],
[
"Hou",
"Shufen",
""
],
[
"Chen",
"Weichao",
""
]
] |
cs/0602019 | Nie Nie | Nie Nie and Cristina Comaniciu | Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio
Networks | ACM MONET (Mobile Networks and Applications), special issue on
"Reconfigurable Radio Technologies in Support of Ubiquitous Seamless
Computing" | null | null | null | cs.GT | null | In this work, we propose a game theoretic framework to analyze the behavior
of cognitive radios for distributed adaptive channel allocation. We define two
different objective functions for the spectrum sharing games, which capture the
utility of selfish users and cooperative users, respectively. Based on the
utility definition for cooperative users, we show that the channel allocation
problem can be formulated as a potential game, and thus converges to a
deterministic channel allocation Nash equilibrium point. Alternatively, a
no-regret learning implementation is proposed for both scenarios and it is
shown to have similar performance with the potential game when cooperation is
enforced, but with a higher variability across users. The no-regret learning
formulation is particularly useful to accommodate selfish users.
Non-cooperative learning games have the advantage of a very low overhead for
information exchange in the network.
We show that cooperation based spectrum sharing etiquette improves the
overall network performance at the expense of an increased overhead required
for information exchange.
| [
{
"version": "v1",
"created": "Tue, 7 Feb 2006 00:25:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nie",
"Nie",
""
],
[
"Comaniciu",
"Cristina",
""
]
] |
cs/0602025 | Gianluca Argentini | Gianluca Argentini | On local symbolic approximation and resolution of ODEs using Implicit
Function Theorem | 12 pages, 2 figures; keywords: ordinary differential equations,
implicit function theorem, local solutions, symbolic solutions, cavitation | null | null | null | cs.NA math.CA physics.comp-ph | null | In this work the implicit function theorem is used for searching local
symbolic resolution of differential equations. General results of existence for
first order equations are proven and some examples, one relative to cavitation
in a fluid, are developed. These examples seem to show that local approximation
of non linear differential equations can give useful informations about
symbolic form of possible solutions, and in the case a global solution is
known, locally the accuracy of approximation can be good.
| [
{
"version": "v1",
"created": "Tue, 7 Feb 2006 11:44:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] |
cs/0602026 | Richard McClatchey | Ashiq Anjum, Richard McClatchey, Arshad Ali & Ian Willers | Bulk Scheduling with DIANA Scheduler | 4 pages, 5 figures. Accepted by the Computing for High Energy Physics
Conference. Mumbai, Indai. February 2006 | null | null | null | cs.DC | null | Results from and progress on the development of a Data Intensive and Network
Aware (DIANA) Scheduling engine, primarily for data intensive sciences such as
physics analysis, are described. Scientific analysis tasks can involve
thousands of computing, data handling, and network resources and the size of
the input and output files and the amount of overall storage space allocated to
a user necessarily can have significant bearing on the scheduling of data
intensive applications. If the input or output files must be retrieved from a
remote location, then the time required transferring the files must also be
taken into consideration when scheduling compute resources for the given
application. The central problem in this study is the coordinated management of
computation and data at multiple locations and not simply data movement.
However, this can be a very costly operation and efficient scheduling can be a
challenge if compute and data resources are mapped without network cost. We
have implemented an adaptive algorithm within the DIANA Scheduler which takes
into account data location and size, network performance and computation
capability to make efficient global scheduling decisions. DIANA is a
performance-aware as well as an economy-guided Meta Scheduler. It iteratively
allocates each job to the site that is likely to produce the best performance
as well as optimizing the global queue for any remaining pending jobs.
Therefore it is equally suitable whether a single job is being submitted or
bulk scheduling is being performed. Results suggest that considerable
performance improvements are to be gained by adopting the DIANA scheduling
approach.
| [
{
"version": "v1",
"created": "Tue, 7 Feb 2006 16:47:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Anjum",
"Ashiq",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Ali",
"Arshad",
""
],
[
"Willers",
"Ian",
""
]
] |
cs/0602027 | Krzysztof R. Apt | Krzysztof R. Apt | Explaining Constraint Programming | 15 pages, appeared in "Processes, Terms and Cycles: Steps on the Road
to Infinity", (A. Middeldorp, V. van Oostrom, F. van Raamsdonk, R. de Vrijer,
eds.), LNCS 3838, pp. 55-69. (2005) | null | null | null | cs.PL cs.AI | null | We discuss here constraint programming (CP) by using a proof-theoretic
perspective. To this end we identify three levels of abstraction. Each level
sheds light on the essence of CP.
In particular, the highest level allows us to bring CP closer to the
computation as deduction paradigm. At the middle level we can explain various
constraint propagation algorithms. Finally, at the lowest level we can address
the issue of automatic generation and optimization of the constraint
propagation algorithms.
| [
{
"version": "v1",
"created": "Tue, 7 Feb 2006 15:19:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] |
cs/0602031 | Wit Jakuczun | Wit Jakuczun | Classifying Signals with Local Classifiers | null | null | null | null | cs.AI | null | This paper deals with the problem of classifying signals. The new method for
building so called local classifiers and local features is presented. The
method is a combination of the lifting scheme and the support vector machines.
Its main aim is to produce effective and yet comprehensible classifiers that
would help in understanding processes hidden behind classified signals. To
illustrate the method we present the results obtained on an artificial and a
real dataset.
| [
{
"version": "v1",
"created": "Wed, 8 Feb 2006 11:38:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jakuczun",
"Wit",
""
]
] |
cs/0602037 | Elisa Gorla | J. J. Climent, E. Gorla, J. Rosenthal | Cryptanalysis of the CFVZ cryptosystem | 12 pages | null | null | null | cs.CR | null | The paper analyzes a new public key cryptosystem whose security is based on a
matrix version of the discrete logarithm problem over an elliptic curve. It is
shown that the complexity of solving the underlying problem for the proposed
system is dominated by the complexity of solving a fixed number of discrete
logarithm problems in the group of an elliptic curve. Using an adapted Pollard
rho algorithm it is shown that this problem is essentially as hard as solving
one discrete logarithm problem in the group of an elliptic curve.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2006 08:40:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Climent",
"J. J.",
""
],
[
"Gorla",
"E.",
""
],
[
"Rosenthal",
"J.",
""
]
] |
cs/0602038 | Gregory Gutin | G. Gutin, P. Hell, A. Rafiey, A. Yeo | Minimum Cost Homomorphisms to Proper Interval Graphs and Bigraphs | null | null | null | null | cs.DM cs.AI | null | For graphs $G$ and $H$, a mapping $f: V(G)\dom V(H)$ is a homomorphism of $G$
to $H$ if $uv\in E(G)$ implies $f(u)f(v)\in E(H).$ If, moreover, each vertex $u
\in V(G)$ is associated with costs $c_i(u), i \in V(H)$, then the cost of the
homomorphism $f$ is $\sum_{u\in V(G)}c_{f(u)}(u)$. For each fixed graph $H$, we
have the {\em minimum cost homomorphism problem}, written as MinHOM($H)$. The
problem is to decide, for an input graph $G$ with costs $c_i(u),$ $u \in V(G),
i\in V(H)$, whether there exists a homomorphism of $G$ to $H$ and, if one
exists, to find one of minimum cost. Minimum cost homomorphism problems
encompass (or are related to) many well studied optimization problems. We
describe a dichotomy of the minimum cost homomorphism problems for graphs $H$,
with loops allowed. When each connected component of $H$ is either a reflexive
proper interval graph or an irreflexive proper interval bigraph, the problem
MinHOM($H)$ is polynomial time solvable. In all other cases the problem
MinHOM($H)$ is NP-hard. This solves an open problem from an earlier paper.
Along the way, we prove a new characterization of the class of proper interval
bigraphs.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2006 09:39:36 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Feb 2006 15:36:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Hell",
"P.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
] |
cs/0602039 | Andrei Arion | Andrei Arion (INRIA Futurs), Angela Bonifati, Ioana Manolescu (INRIA
Futurs), Andrea Pugliese | Path Summaries and Path Partitioning in Modern XML Databases | null | null | null | null | cs.DB | null | We study the applicability of XML path summaries in the context of
current-day XML databases. We find that summaries provide an excellent basis
for optimizing data access methods, which furthermore mixes very well with
path-partitioned stores. We provide practical algorithms for building and
exploiting summaries, and prove its benefits through extensive experiments.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2006 12:21:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arion",
"Andrei",
"",
"INRIA Futurs"
],
[
"Bonifati",
"Angela",
"",
"INRIA\n Futurs"
],
[
"Manolescu",
"Ioana",
"",
"INRIA\n Futurs"
],
[
"Pugliese",
"Andrea",
""
]
] |
cs/0602042 | Wojciech Mazurczyk | Wojciech Mazurczyk, Zbigniew Kotulski | New security and control protocol for VoIP based on steganography and
digital watermarking | 8 pages, 4 figures, 1 table | Annales UMCS, Informatica, AI 4 (2006), ISNN 1732-1360 | null | null | cs.CR cs.MM | null | In this paper new security and control protocol for Voice over Internet
Protocol (VoIP) service is presented. It is the alternative for the IETF's
(Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for
real-time application's traffic. Additionally this solution offers
authentication and integrity, it is capable of exchanging and verifying QoS and
security parameters. It is based on digital watermarking and steganography that
is why it does not consume additional bandwidth and the data transmitted is
inseparably bound to the voice content.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2006 22:49:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
cs/0602043 | Shanghua Teng | Xi Chen, Xiaotie Deng and Shang-Hua Teng | Computing Nash Equilibria: Approximation and Smoothed Complexity | null | null | null | null | cs.CC cs.GT | null | We show that the BIMATRIX game does not have a fully polynomial-time
approximation scheme, unless PPAD is in P. In other words, no algorithm with
time polynomial in n and 1/\epsilon can compute an \epsilon-approximate Nash
equilibrium of an n by nbimatrix game, unless PPAD is in P. Instrumental to our
proof, we introduce a new discrete fixed-point problem on a high-dimensional
cube with a constant side-length, such as on an n-dimensional cube with
side-length 7, and show that they are PPAD-complete. Furthermore, we prove,
unless PPAD is in RP, that the smoothed complexity of the Lemke-Howson
algorithm or any algorithm for computing a Nash equilibrium of a bimatrix game
is polynomial in n and 1/\sigma under perturbations with magnitude \sigma. Our
result answers a major open question in the smoothed analysis of algorithms and
the approximation of Nash equilibria.
| [
{
"version": "v1",
"created": "Sat, 11 Feb 2006 22:46:55 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Feb 2006 00:18:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Xi",
""
],
[
"Deng",
"Xiaotie",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
cs/0602044 | Prasanta K. Panigrahi | Siddharth Arora, Jayadev Acharya, Amit Verma, Prasanta K. Panigrahi | Multilevel Thresholding for Image Segmentation through a Fast
Statistical Recursive Algorithm | 9 pages, 3 figures | null | null | null | cs.CV | null | A novel algorithm is proposed for segmenting an image into multiple levels
using its mean and variance. Starting from the extreme pixel values at both
ends of the histogram plot, the algorithm is applied recursively on sub-ranges
computed from the previous step, so as to find a threshold level and a new
sub-range for the next step, until no significant improvement in image quality
can be achieved. The method makes use of the fact that a number of
distributions tend towards Dirac delta function, peaking at the mean, in the
limiting condition of vanishing variance. The procedure naturally provides for
variable size segmentation with bigger blocks near the extreme pixel values and
finer divisions around the mean or other chosen value for better visualization.
Experiments on a variety of images show that the new algorithm effectively
segments the image in computationally very less time.
| [
{
"version": "v1",
"created": "Sun, 12 Feb 2006 18:22:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arora",
"Siddharth",
""
],
[
"Acharya",
"Jayadev",
""
],
[
"Verma",
"Amit",
""
],
[
"Panigrahi",
"Prasanta K.",
""
]
] |
cs/0602045 | Russ Abbott | Russ Abbott | Emergence Explained | 67 pages. Earlier versions presented at Lake ArrowHead conference on
human complex systems (2005), GECCO 2005 workshop on Biological Applications
of Genetic and Evolutionary Computation, and Symposium on Understanding
Complex Systems (2005) | null | null | null | cs.MA cs.DC cs.GL | null | Emergence (macro-level effects from micro-level causes) is at the heart of
the conflict between reductionism and functionalism. How can there be
autonomous higher level laws of nature (the functionalist claim) if everything
can be reduced to the fundamental forces of physics (the reductionist
position)? We cut through this debate by applying a computer science lens to
the way we view nature. We conclude (a) that what functionalism calls the
special sciences (sciences other than physics) do indeed study autonomous laws
and furthermore that those laws pertain to real higher level entities but (b)
that interactions among such higher-level entities is epiphenomenal in that
they can always be reduced to primitive physical forces. In other words,
epiphenomena, which we will identify with emergent phenomena, do real
higher-level work. The proposed perspective provides a framework for
understanding many thorny issues including the nature of entities, stigmergy,
the evolution of complexity, phase transitions, supervenience, and downward
entailment. We also discuss some practical considerations pertaining to systems
of systems and the limitations of modeling.
| [
{
"version": "v1",
"created": "Sun, 12 Feb 2006 22:11:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abbott",
"Russ",
""
]
] |
cs/0602051 | Fernando Lobo | Fernando G. Lobo, Claudio F. Lima | On the utility of the multimodal problem generator for assessing the
performance of Evolutionary Algorithms | Also UALG-ILAB Report No. 200601 | null | null | null | cs.NE | null | This paper looks in detail at how an evolutionary algorithm attempts to solve
instances from the multimodal problem generator. The paper shows that in order
to consistently reach the global optimum, an evolutionary algorithm requires a
population size that should grow at least linearly with the number of peaks. It
is also shown a close relationship between the supply and decision making
issues that have been identified previously in the context of population sizing
models for additively decomposable problems.
The most important result of the paper, however, is that solving an instance
of the multimodal problem generator is like solving a peak-in-a-haystack, and
it is argued that evolutionary algorithms are not the best algorithms for such
a task. Finally, and as opposed to what several researchers have been doing, it
is our strong belief that the multimodal problem generator is not adequate for
assessing the performance of evolutionary algorithms.
| [
{
"version": "v1",
"created": "Tue, 14 Feb 2006 10:30:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lobo",
"Fernando G.",
""
],
[
"Lima",
"Claudio F.",
""
]
] |
cs/0602052 | Grigoriev Evgeniy | Evgeniy Grigoriev | The OverRelational Manifesto | 34 pages | null | null | null | cs.DB cs.DS | null | The OverRelational Manifesto (below ORM) proposes a possible approach to
creation of data storage systems of the next generation. ORM starts from the
requirement that information in a relational database is represented by a set
of relation values. Accordingly, it is assumed that the information about any
entity of an enterprise must also be represented as a set of relation values
(the ORM main requirement). A system of types is introduced, which allows one
to fulfill the main requirement. The data are represented in the form of
complex objects, and the state of any object is described as a set of relation
values. Emphasize that the types describing the objects are encapsulated,
inherited, and polymorphic. Then, it is shown that the data represented as a
set of such objects may also be represented as a set of relational values
defined on the set of scalar domains (dual data representation). In the general
case, any class is associated with a set of relation variables (R-variables)
each one containing some data about all objects of this class existing in the
system. One of the key points is the fact that the usage of complex (from the
user's viewpoint) refined names of R-variables and their attributes makes it
possible to preserve the semantics of complex data structures represented in
the form of a set of relation values. The most important part of the data
storage system created on the approach proposed is an object-oriented
translator operating over a relational DBMS. The expressiveness of such a
system is comparable with that of OO programming languages.
| [
{
"version": "v1",
"created": "Tue, 14 Feb 2006 12:19:08 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Feb 2006 10:28:24 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Mar 2006 09:57:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grigoriev",
"Evgeniy",
""
]
] |
cs/0602053 | Thomas Hayes | Varsha Dani and Thomas P. Hayes | How to Beat the Adaptive Multi-Armed Bandit | null | null | null | null | cs.DS cs.LG | null | The multi-armed bandit is a concise model for the problem of iterated
decision-making under uncertainty. In each round, a gambler must pull one of
$K$ arms of a slot machine, without any foreknowledge of their payouts, except
that they are uniformly bounded. A standard objective is to minimize the
gambler's regret, defined as the gambler's total payout minus the largest
payout which would have been achieved by any fixed arm, in hindsight. Note that
the gambler is only told the payout for the arm actually chosen, not for the
unchosen arms.
Almost all previous work on this problem assumed the payouts to be
non-adaptive, in the sense that the distribution of the payout of arm $j$ in
round $i$ is completely independent of the choices made by the gambler on
rounds $1, \dots, i-1$. In the more general model of adaptive payouts, the
payouts in round $i$ may depend arbitrarily on the history of past choices made
by the algorithm.
We present a new algorithm for this problem, and prove nearly optimal
guarantees for the regret against both non-adaptive and adaptive adversaries.
After $T$ rounds, our algorithm has regret $O(\sqrt{T})$ with high probability
(the tail probability decays exponentially). This dependence on $T$ is best
possible, and matches that of the full-information version of the problem, in
which the gambler is told the payouts for all $K$ arms after each round.
Previously, even for non-adaptive payouts, the best high-probability bounds
known were $O(T^{2/3})$, due to Auer, Cesa-Bianchi, Freund and Schapire. The
expected regret of their algorithm is $O(T^{1/2}) for non-adaptive payouts, but
as we show, $\Omega(T^{2/3})$ for adaptive payouts.
| [
{
"version": "v1",
"created": "Tue, 14 Feb 2006 23:57:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dani",
"Varsha",
""
],
[
"Hayes",
"Thomas P.",
""
]
] |
cs/0602055 | Fernando Lobo | Fernando G. Lobo, Claudio F. Lima | Revisiting Evolutionary Algorithms with On-the-Fly Population Size
Adjustment | Also UALG-ILAB Report No. 200602 | null | null | null | cs.NE | null | In an evolutionary algorithm, the population has a very important role as its
size has direct implications regarding solution quality, speed, and
reliability. Theoretical studies have been done in the past to investigate the
role of population sizing in evolutionary algorithms. In addition to those
studies, several self-adjusting population sizing mechanisms have been proposed
in the literature. This paper revisits the latter topic and pays special
attention to the genetic algorithm with adaptive population size (APGA), for
which several researchers have claimed to be very effective at autonomously
(re)sizing the population.
As opposed to those previous claims, this paper suggests a complete opposite
view. Specifically, it shows that APGA is not capable of adapting the
population size at all. This claim is supported on theoretical grounds and
confirmed by computer simulations.
| [
{
"version": "v1",
"created": "Wed, 15 Feb 2006 13:48:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lobo",
"Fernando G.",
""
],
[
"Lima",
"Claudio F.",
""
]
] |
cs/0602056 | Domenico Camarda Dr. | Dino Borri, Domenico Camarda | Building Scenarios for Environmental Management and Planning: An
IT-Based Approach | null | null | null | null | cs.MA | null | Oftentimes, the need to build multidiscipline knowledge bases, oriented to
policy scenarios, entails the involvement of stakeholders in manifold domains,
with a juxtaposition of different languages whose semantics can hardly allow
inter-domain transfers. A useful support for planning is the building up of
durable IT based interactive platforms, where it is possible to modify initial
positions toward a semantic convergence. The present paper shows an area-based
application of these tools, for the integrated distance-management of different
forms of knowledge expressed by selected stakeholders about environmental
planning issues, in order to build alternative development scenarios.
Keywords: Environmental planning, Scenario building, Multi-source knowledge,
IT-based
| [
{
"version": "v1",
"created": "Wed, 15 Feb 2006 14:46:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borri",
"Dino",
""
],
[
"Camarda",
"Domenico",
""
]
] |
cs/0602057 | Christopher Homan | Melanie J. Agnew and Christopher M. Homan | Plane Decompositions as Tools for Approximation | null | null | null | null | cs.DS | null | Tree decompositions were developed by Robertson and Seymour. Since then
algorithms have been developed to solve intractable problems efficiently for
graphs of bounded treewidth. In this paper we extend tree decompositions to
allow cycles to exist in the decomposition graph; we call these new
decompositions plane decompositions because we require that the decomposition
graph be planar. First, we give some background material about tree
decompositions and an overview of algorithms both for decompositions and for
approximations of planar graphs. Then, we give our plane decomposition
definition and an algorithm that uses this decomposition to approximate the
size of the maximum independent set of the underlying graph in polynomial time.
| [
{
"version": "v1",
"created": "Wed, 15 Feb 2006 19:09:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Agnew",
"Melanie J.",
""
],
[
"Homan",
"Christopher M.",
""
]
] |
cs/0602059 | Suchitra Manepalli | Suchitra Manepalli, Giridhar Manepalli, Michael L. Nelson | D2D: Digital Archive to MPEG-21 DIDL | 28 pages, 8 figures | null | null | null | cs.DL | null | Digital Archive to MPEG-21 DIDL (D2D) analyzes the contents of the digital
archive and produces an MPEG-21 Digital Item Declaration Language (DIDL)
encapsulating the analysis results. DIDL is an extensible XML-based language
that aggregates resources and the metadata. We provide a brief report on
several analysis techniques applied on the digital archive by the D2D and
provide an evaluation of its run-time performance.
| [
{
"version": "v1",
"created": "Wed, 15 Feb 2006 22:18:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Manepalli",
"Suchitra",
""
],
[
"Manepalli",
"Giridhar",
""
],
[
"Nelson",
"Michael L.",
""
]
] |
cs/0602060 | Philip Davis | Philip M. Davis, Jason S. Price | eJournal interface can influence usage statistics: implications for
libraries, publishers, and Project COUNTER | 22 pages, 5 figures. JASIST (in press, 2006) | JASIST v57 n9 (2006):1243-1248 | 10.1002/asi.20405 | null | cs.IR cs.DL | null | The design of a publisher's electronic interface can have a measurable effect
on electronic journal usage statistics. A study of journal usage from six
COUNTER-compliant publishers at thirty-two research institutions in the United
States, the United Kingdom and Sweden indicates that the ratio of PDF to HTML
views is not consistent across publisher interfaces, even after controlling for
differences in publisher content. The number of fulltext downloads may be
artificially inflated when publishers require users to view HTML versions
before accessing PDF versions or when linking mechanisms, such as CrossRef,
direct users to the full text, rather than the abstract, of each article. These
results suggest that usage reports from COUNTER-compliant publishers are not
directly comparable in their current form. One solution may be to modify
publisher numbers with adjustment factors deemed to be representative of the
benefit or disadvantage due to its interface. Standardization of some interface
and linking protocols may obviate these differences and allow for more accurate
cross-publisher comparisons.
| [
{
"version": "v1",
"created": "Thu, 16 Feb 2006 20:29:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Davis",
"Philip M.",
""
],
[
"Price",
"Jason S.",
""
]
] |
cs/0602061 | David Anderson | David P. Anderson, Gilles Fedak | The Computational and Storage Potential of Volunteer Computing | 8 pages. To appear in CCGrid 2006 | null | null | null | cs.DC cs.PF | null | "Volunteer computing" uses Internet-connected computers, volunteered by their
owners, as a source of computing power and storage. This paper studies the
potential capacity of volunteer computing. We analyzed measurements of over
330,000 hosts participating in a volunteer computing project. These
measurements include processing power, memory, disk space, network throughput,
host availability, user-specified limits on resource usage, and host churn. We
show that volunteer computing can support applications that are significantly
more data-intensive, or have larger memory and storage requirements, than those
in current projects.
| [
{
"version": "v1",
"created": "Thu, 16 Feb 2006 22:33:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Anderson",
"David P.",
""
],
[
"Fedak",
"Gilles",
""
]
] |
cs/0602062 | Francois Denis | Fran\c{c}ois Denis (LIF), Yann Esposito (LIF), Amaury Habrard (LIF) | Learning rational stochastic languages | 15 pages | null | null | null | cs.LG | null | Given a finite set of words w1,...,wn independently drawn according to a
fixed unknown distribution law P called a stochastic language, an usual goal in
Grammatical Inference is to infer an estimate of P in some class of
probabilistic models, such as Probabilistic Automata (PA). Here, we study the
class of rational stochastic languages, which consists in stochastic languages
that can be generated by Multiplicity Automata (MA) and which strictly includes
the class of stochastic languages generated by PA. Rational stochastic
languages have minimal normal representation which may be very concise, and
whose parameters can be efficiently estimated from stochastic samples. We
design an efficient inference algorithm DEES which aims at building a minimal
normal representation of the target. Despite the fact that no recursively
enumerable class of MA computes exactly the set of rational stochastic
languages over Q, we show that DEES strongly identifies tis set in the limit.
We study the intermediary MA output by DEES and show that they compute rational
series which converge absolutely to one and which can be used to provide
stochastic languages which closely estimate the target.
| [
{
"version": "v1",
"created": "Fri, 17 Feb 2006 08:57:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Denis",
"François",
"",
"LIF"
],
[
"Esposito",
"Yann",
"",
"LIF"
],
[
"Habrard",
"Amaury",
"",
"LIF"
]
] |
cs/0602063 | Tony Thomas | Tony Thomas, Arbind Kumar Lal | Group Signature Schemes Using Braid Groups | null | null | null | null | cs.CR | null | Artin's braid groups have been recently suggested as a new source for
public-key cryptography. In this paper we propose the first group signature
schemes based on the conjugacy problem, decomposition problem and root problem
in the braid groups which are believed to be hard problems.
| [
{
"version": "v1",
"created": "Fri, 17 Feb 2006 10:32:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thomas",
"Tony",
""
],
[
"Lal",
"Arbind Kumar",
""
]
] |
cs/0602064 | Ana Romero | A. Romero, J. Rubio, F. Sergeraert | Computing spectral sequences | null | null | null | null | cs.SC | null | In this paper, a set of programs enhancing the Kenzo system is presented.
Kenzo is a Common Lisp program designed for computing in Algebraic Topology, in
particular it allows the user to calculate homology and homotopy groups of
complicated spaces. The new programs presented here entirely compute Serre and
Eilenberg-Moore spectral sequences, in particular the groups and differential
maps for arbitrary r. They also determine when the spectral sequence has
converged and describe the filtration of the target homology groups induced by
the spectral sequence.
| [
{
"version": "v1",
"created": "Fri, 17 Feb 2006 12:29:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Romero",
"A.",
""
],
[
"Rubio",
"J.",
""
],
[
"Sergeraert",
"F.",
""
]
] |
cs/0602065 | Paul Vitanyi | Rudi Cilibrasi (CWI) and Paul Vitanyi (CWI and University of
Amsterdam) | Similarity of Objects and the Meaning of Words | LaTeX, 25 pages, 7 figures. Proc. 3rd Conf. Theory and Applications
of Models of Computation (TAMC), 15-20 May, 2006, Beijing, China (Invited
paper) This is an extended version of the 5-page abstract cs.IR/0504089 | null | null | null | cs.CV cs.IR | null | We survey the emerging area of compression-based, parameter-free, similarity
distance measures useful in data-mining, pattern recognition, learning and
automatic semantics extraction. Given a family of distances on a set of
objects, a distance is universal up to a certain precision for that family if
it minorizes every distance in the family between every two objects in the set,
up to the stated precision (we do not require the universal distance to be an
element of the family). We consider similarity distances for two types of
objects: literal objects that as such contain all of their meaning, like
genomes or books, and names for objects. The latter may have literal
embodyments like the first type, but may also be abstract like ``red'' or
``christianity.'' For the first type we consider a family of computable
distance measures corresponding to parameters expressing similarity according
to particular featuresdistances generated by web users corresponding to
particular semantic relations between the (names for) the designated objects.
For both families we give universal similarity distance measures, incorporating
all particular distance measures in the family. In the first case the universal
distance is based on compression and in the second case it is based on Google
page counts related to search terms. In both cases experiments on a massive
scale give evidence of the viability of the approaches. between pairs of
literal objects. For the second type we consider similarity
| [
{
"version": "v1",
"created": "Fri, 17 Feb 2006 16:15:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cilibrasi",
"Rudi",
"",
"CWI"
],
[
"Vitanyi",
"Paul",
"",
"CWI and University of\n Amsterdam"
]
] |
cs/0602068 | Kenneth Koehler | K. R. Koehler | Parallel Symbolic Computation of Curvature Invariants in General
Relativity | 9 pages, submitted to Journal of Computational Physics | null | null | null | cs.DC cs.SC gr-qc | null | We present a practical application of parallel symbolic computation in
General Relativity: the calculation of curvature invariants for large
dimension. We discuss the structure of the calculations, an implementation of
the technique and scaling of the computation with spacetime dimension for
various invariants.
| [
{
"version": "v1",
"created": "Sun, 19 Feb 2006 19:28:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Koehler",
"K. R.",
""
]
] |
cs/0602069 | Vicky Choi | Vicky Choi | Faster Algorithms for Constructing a Concept (Galois) Lattice | 15 pages, 3 figures | null | null | null | cs.DM cs.DS | null | In this paper, we present a fast algorithm for constructing a concept
(Galois) lattice of a binary relation, including computing all concepts and
their lattice order. We also present two efficient variants of the algorithm,
one for computing all concepts only, and one for constructing a frequent closed
itemset lattice. The running time of our algorithms depends on the lattice
structure and is faster than all other existing algorithms for these problems.
| [
{
"version": "v1",
"created": "Sun, 19 Feb 2006 19:47:56 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Jun 2006 19:03:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Choi",
"Vicky",
""
]
] |
cs/0602070 | Nathan Boeger | Nathan Boeger | Methods for scaling a large member base | 12 pages | null | null | null | cs.GL | null | The technical challenges of scaling websites with large and growing member
bases, like social networking sites, are numerous. One of these challenges is
how to evenly distribute the growing member base across all available
resources. This paper will explore various methods that address this issue. The
techniques used in this paper can be generalized and applied to various other
problems that need to distribute data evenly amongst a finite amount of
resources.
| [
{
"version": "v1",
"created": "Mon, 20 Feb 2006 18:08:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boeger",
"Nathan",
""
]
] |
cs/0602073 | Tobias Friedrich | Deepak Ajwani, Tobias Friedrich and Ulrich Meyer | An O(n^{2.75}) algorithm for online topological ordering | 20 pages, long version of SWAT'06 paper | null | null | null | cs.DS | null | We present a simple algorithm which maintains the topological order of a
directed acyclic graph with n nodes under an online edge insertion sequence in
O(n^{2.75}) time, independent of the number of edges m inserted. For dense
DAGs, this is an improvement over the previous best result of O(min(m^{3/2}
log(n), m^{3/2} + n^2 log(n)) by Katriel and Bodlaender. We also provide an
empirical comparison of our algorithm with other algorithms for online
topological sorting. Our implementation outperforms them on certain hard
instances while it is still competitive on random edge insertion sequences
leading to complete DAGs.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2006 10:32:15 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Apr 2006 16:31:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ajwani",
"Deepak",
""
],
[
"Friedrich",
"Tobias",
""
],
[
"Meyer",
"Ulrich",
""
]
] |
cs/0602075 | Peter Jonsson | Vladimir Deineko, Peter Jonsson, Mikael Klasson, and Andrei Krokhin | The approximability of MAX CSP with fixed-value constraints | null | null | null | null | cs.CC | null | In the maximum constraint satisfaction problem (MAX CSP), one is given a
finite collection of (possibly weighted) constraints on overlapping sets of
variables, and the goal is to assign values from a given finite domain to the
variables so as to maximize the number (or the total weight, for the weighted
case) of satisfied constraints. This problem is NP-hard in general, and,
therefore, it is natural to study how restricting the allowed types of
constraints affects the approximability of the problem. In this paper, we show
that any MAX CSP problem with a finite set of allowed constraint types, which
includes all fixed-value constraints (i.e., constraints of the form x=a), is
either solvable exactly in polynomial-time or else is APX-complete, even if the
number of occurrences of variables in instances are bounded. Moreover, we
present a simple description of all polynomial-time solvable cases of our
problem. This description relies on the well-known algebraic combinatorial
property of supermodularity.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2006 14:13:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Deineko",
"Vladimir",
""
],
[
"Jonsson",
"Peter",
""
],
[
"Klasson",
"Mikael",
""
],
[
"Krokhin",
"Andrei",
""
]
] |
cs/0602076 | Ioannis Antonellis | Ioannis Antonellis and Efstratios Gallopoulos | Exploring term-document matrices from matrix models in text mining | SIAM Text Mining Workshop, SIAM Conference Data Mining, 2006 | null | null | 03/02-06 | cs.IR cs.DB cs.DL | null | We explore a matrix-space model, that is a natural extension to the vector
space model for Information Retrieval. Each document can be represented by a
matrix that is based on document extracts (e.g. sentences, paragraphs,
sections). We focus on the performance of this model for the specific case in
which documents are originally represented as term-by-sentence matrices. We use
the singular value decomposition to approximate the term-by-sentence matrices
and assemble these results to form the pseudo-``term-document'' matrix that
forms the basis of a text mining method alternative to traditional VSM and LSI.
We investigate the singular values of this matrix and provide experimental
evidence suggesting that the method can be particularly effective in terms of
accuracy for text collections with multi-topic documents, such as web pages
with news.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2006 16:14:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Antonellis",
"Ioannis",
""
],
[
"Gallopoulos",
"Efstratios",
""
]
] |
cs/0602077 | Vincent Schmitt RR | Vincent Schmitt and Krzysztof Worytkiewicz | Bisimulations of enrichments | null | null | null | null | cs.LO | null | In this paper we show that classical notions from automata theory such as
simulation and bisimulation can be lifted to the context of enriched
categories. The usual properties of bisimulation are nearly all preserved in
this new context. The class of enriched functors that correspond to functionnal
bisimulations surjective on objects is investigated and appears "nearly" open
in the sense of Joyal and Moerdijk. Seeing the change of base techniques as a
convenient means to define process refinement/abstractions, we give sufficient
conditions for the change of base categories to preserve bisimularity. We apply
these concepts to Betti's generalized automata, categorical transition systems,
and other exotic categories.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2006 17:27:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmitt",
"Vincent",
""
],
[
"Worytkiewicz",
"Krzysztof",
""
]
] |
cs/0602078 | Robert Burger PhD | John Robert Burger | Associative Memory For Reversible Programming and Charge Recovery | null | null | null | null | cs.AR cs.DC | null | Presented below is an interesting type of associative memory called toggle
memory based on the concept of T flip flops, as opposed to D flip flops. Toggle
memory supports both reversible programming and charge recovery. Circuits
designed using the principles delineated below permit matchlines to charge and
discharge with near zero energy dissipation. The resulting lethargy is
compensated by the massive parallelism of associative memory. Simulation
indicates over 33x reduction in energy dissipation using a sinusoidal power
supply at 2 MHz, assuming realistic 50 nm MOSFET models.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2006 21:58:06 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Feb 2006 23:59:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burger",
"John Robert",
""
]
] |
cs/0602082 | Richard McClatchey | Zaheer Abbas Khan, Mohammed Odeh, Richard McClatchey | Digital Libraries: From Process Modelling to Grid-based Service Oriented
Architecture | 6 pages, 5 figures, 1 table. The 2nd international conference on
Information and Communication Technologies from Theory to Application
(ICTTA06 | null | null | null | cs.DL cs.SE | null | Graphical Business Process Modelling Languages (BPML) like Role Activity
Diagrams (RAD) provide ease and flexibility for modelling business behaviour.
However, these languages show limited applicability in terms of enactment over
distributed systems paradigms like Service Oriented Architecture (SOA) based
grid computing. This paper investigates RAD modelling of a Scientific
Publishing Process (SPP) for Digital Libraries (DL) and tries to determine the
suitability of Pi-Calculus based formal approaches to enact SOA based grid
computing. In order to achieve this purpose, the Pi-Calculus based formal
transformation from a RAD model of SPP for DL draws attention towards a number
of challenging issues including issues that require particular design
considerations for appropriate enactment in a SOA based grid system.
| [
{
"version": "v1",
"created": "Thu, 23 Feb 2006 23:12:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Khan",
"Zaheer Abbas",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
]
] |
cs/0602090 | Shanghua Teng | Li-Sha Huang and Shang-Hua Teng | On the Approximation and Smoothed Complexity of Leontief Market
Equilibria | null | null | null | null | cs.GT cs.CC | null | We show that the problem of finding an \epsilon-approximate Nash equilibrium
of an n by n two-person games can be reduced to the computation of an
(\epsilon/n)^2-approximate market equilibrium of a Leontief economy. Together
with a recent result of Chen, Deng and Teng, this polynomial reduction implies
that the Leontief market exchange problem does not have a fully polynomial-time
approximation scheme, that is, there is no algorithm that can compute an
\epsilon-approximate market equilibrium in time polynomial in m, n, and
1/\epsilon, unless PPAD is not in P, We also extend the analysis of our
reduction to show, unless PPAD is not in RP, that the smoothed complexity of
the Scarf's general fixed-point approximation algorithm (when applying to solve
the approximate Leontief market exchange problem) or of any algorithm for
computing an approximate market equilibrium of Leontief economies is not
polynomial in n and 1/\sigma, under Gaussian or uniform perturbations with
magnitude \sigma.
| [
{
"version": "v1",
"created": "Sun, 26 Feb 2006 07:53:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huang",
"Li-Sha",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
cs/0602093 | Francois Denis | Fran\c{c}ois Denis (LIF), Yann Esposito (LIF) | Rational stochastic languages | 35 pages | null | null | null | cs.LG cs.CL | null | The goal of the present paper is to provide a systematic and comprehensive
study of rational stochastic languages over a semiring K \in {Q, Q +, R, R+}. A
rational stochastic language is a probability distribution over a free monoid
\Sigma^* which is rational over K, that is which can be generated by a
multiplicity automata with parameters in K. We study the relations between the
classes of rational stochastic languages S rat K (\Sigma). We define the notion
of residual of a stochastic language and we use it to investigate properties of
several subclasses of rational stochastic languages. Lastly, we study the
representation of rational stochastic languages by means of multiplicity
automata.
| [
{
"version": "v1",
"created": "Mon, 27 Feb 2006 10:08:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Denis",
"François",
"",
"LIF"
],
[
"Esposito",
"Yann",
"",
"LIF"
]
] |
cs/0602094 | Altyeb Taha mr | Altyeb Altaher | Effect of CSMA/CD on Self-Similarity of Network Traffic | 4 pages, 2 figures | null | null | null | cs.NI | null | It is now well known that Internet traffic exhibits self-similarity, which
cannot be described by traditional Markovian models such as the Poisson
process. The causes of self-similarity of network traffic must be identified
because understanding the nature of network traffic is critical in order to
properly design and implement computer networks and network services like the
World Wide Web. While some researchers have argued self similarity is generated
by the typical applications or caused by Transport layer Protocols, it is also
possible that the CSMA/CD protocol may cause or at least contribute to this
phenomenon. In this paper, we use NS simulator to study the effect of CSMA/CD
Exponential Backoff retransmission algorithm on Traffic Self similarity.
| [
{
"version": "v1",
"created": "Mon, 27 Feb 2006 12:37:34 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Mar 2006 09:06:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Altaher",
"Altyeb",
""
]
] |
cs/0602095 | Joseph O'Rourke | Mirela Damian, Robin Flatland, Joseph O'Rourke | Epsilon-Unfolding Orthogonal Polyhedra | 23 pages, 20 figures, 7 references. Revised version improves language
and figures, updates references, and sharpens the conclusion | null | null | null | cs.CG | null | An unfolding of a polyhedron is produced by cutting the surface and
flattening to a single, connected, planar piece without overlap (except
possibly at boundary points). It is a long unsolved problem to determine
whether every polyhedron may be unfolded. Here we prove, via an algorithm, that
every orthogonal polyhedron (one whose faces meet at right angles) of genus
zero may be unfolded. Our cuts are not necessarily along edges of the
polyhedron, but they are always parallel to polyhedron edges. For a polyhedron
of n vertices, portions of the unfolding will be rectangular strips which, in
the worst case, may need to be as thin as epsilon = 1/2^{Omega(n)}.
| [
{
"version": "v1",
"created": "Mon, 27 Feb 2006 17:03:19 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Mar 2006 14:11:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"Flatland",
"Robin",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/0602096 | Abhilash Ponnath | Abhilash Ponnath | Difficulties in the Implementation of Quantum Computers | 6 pages | null | null | null | cs.AR | null | This paper reviews various engineering hurdles facing the field of quantum
computing. Specifically, problems related to decoherence, state preparation,
error correction, and implementability of gates are considered.
| [
{
"version": "v1",
"created": "Mon, 27 Feb 2006 18:59:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ponnath",
"Abhilash",
""
]
] |
cs/0602098 | M. H. van Emden | M.H. van Emden | Compositional Semantics for the Procedural Interpretation of Logic | 17 pages; no figures | null | null | DCS-307-IR | cs.PL | null | Semantics of logic programs has been given by proof theory, model theory and
by fixpoint of the immediate-consequence operator. If clausal logic is a
programming language, then it should also have a compositional semantics.
Compositional semantics for programming languages follows the abstract syntax
of programs, composing the meaning of a unit by a mathematical operation on the
meanings of its constituent units. The procedural interpretation of logic has
only yielded an incomplete abstract syntax for logic programs. We complete it
and use the result as basis of a compositional semantics. We present for
comparison Tarski's algebraization of first-order predicate logic, which is in
substance the compositional semantics for his choice of syntax. We characterize
our semantics by equivalence with the immediate-consequence operator.
| [
{
"version": "v1",
"created": "Tue, 28 Feb 2006 19:28:31 GMT"
},
{
"version": "v2",
"created": "Sun, 7 May 2006 17:41:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
]
] |
cs/0602099 | M. H. van Emden | H. Ibrahim and M.H. van Emden | Towards Applicative Relational Programming | 10 pages; no figures | null | null | null | cs.PL | null | Functional programming comes in two flavours: one where ``functions are
first-class citizens'' (we call this applicative) and one which is based on
equations (we call this declarative). In relational programming clauses play
the role of equations. Hence Prolog is declarative. The purpose of this paper
is to provide in relational programming a mathematical basis for the relational
analog of applicative functional programming. We use the cylindric semantics of
first-order logic due to Tarski and provide a new notation for the required
cylinders that we call tables. We define the Table/Relation Algebra with
operators sufficient to translate Horn clauses into algebraic form. We
establish basic mathematical properties of these operators. We show how
relations can be first-class citizens, and devise mechanisms for modularity,
for local scoping of predicates, and for exporting/importing relations between
programs.
| [
{
"version": "v1",
"created": "Tue, 28 Feb 2006 19:53:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ibrahim",
"H.",
""
],
[
"van Emden",
"M. H.",
""
]
] |
cs/0603001 | Alois Schl\"ogl | Alois Schl\"ogl | BioSig - An application of Octave | 6 pages, submission for the Octave 2006 meeting | null | null | Octave2006/16 | cs.MS | null | BioSig is an open source software library for biomedical signal processing.
Most users in the field are using Matlab; however, significant effort was
undertaken to provide compatibility to Octave, too. This effort has been widely
successful, only some non-critical components relying on a graphical user
interface are missing. Now, installing BioSig on Octave is as easy as on
Matlab. Moreover, a benchmark test based on BioSig has been developed and the
benchmark results of several platforms are presented.
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2006 15:45:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schlögl",
"Alois",
""
]
] |
cs/0603002 | Cheng Qi | Qi Cheng | On comparing sums of square roots of small integers | null | null | null | null | cs.CG | null | Let $k$ and $n$ be positive integers, $n>k$. Define $r(n,k)$ to be the
minimum positive value of $$ |\sqrt{a_1} + ... + \sqrt{a_k} - \sqrt{b_1} - >...
-\sqrt{b_k} | $$ where $ a_1, a_2, ..., a_k, b_1, b_2, ..., b_k $ are positive
integers no larger than $n$. It is an important problem in computational
geometry to determine a good upper bound of $-\log r(n,k)$. In this paper we
prove an upper bound of $ 2^{O(n/\log n)} \log n$, which is better than the
best known result $O(2^{2k} \log n)$ whenever $ n \leq ck\log k$ for some
constant $c$. In particular, our result implies a {\em subexponential}
algorithm to compare two sums of square roots of integers of size $o(k\log k)$.
| [
{
"version": "v1",
"created": "Tue, 28 Feb 2006 22:35:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cheng",
"Qi",
""
]
] |
cs/0603003 | Michel Fliess | Michel Fliess (LIX, INRIA Futurs) | Analyse non standard du bruit | null | null | null | null | cs.CE math.LO math.OC math.PR quant-ph | null | Thanks to the nonstandard formalization of fast oscillating functions, due to
P. Cartier and Y. Perrin, an appropriate mathematical framework is derived for
new non-asymptotic estimation techniques, which do not necessitate any
statistical analysis of the noises corrupting any sensor. Various applications
are deduced for multiplicative noises, for the length of the parametric
estimation windows, and for burst errors.
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2006 11:26:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fliess",
"Michel",
"",
"LIX, INRIA Futurs"
]
] |
cs/0603004 | Juan J. Merelo Pr. | P.A. Castillo, M.G. Arenas, J.G. Castellano, J.J. Merelo, A. Prieto,
V. Rivas and G. Romero | Lamarckian Evolution and the Baldwin Effect in Evolutionary Neural
Networks | Presented in a Spanish conference, MAEB | null | null | null | cs.NE | null | Hybrid neuro-evolutionary algorithms may be inspired on Darwinian or
Lamarckian evolu- tion. In the case of Darwinian evolution, the Baldwin effect,
that is, the progressive incorporation of learned characteristics to the
genotypes, can be observed and leveraged to improve the search. The purpose of
this paper is to carry out an exper- imental study into how learning can
improve G-Prop genetic search. Two ways of combining learning and genetic
search are explored: one exploits the Baldwin effect, while the other uses a
Lamarckian strategy. Our experiments show that using a Lamarckian op- erator
makes the algorithm find networks with a low error rate, and the smallest size,
while using the Bald- win effect obtains MLPs with the smallest error rate, and
a larger size, taking longer to reach a solution. Both approaches obtain a
lower average error than other BP-based algorithms like RPROP, other evolu-
tionary methods and fuzzy logic based methods
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2006 12:26:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Castillo",
"P. A.",
""
],
[
"Arenas",
"M. G.",
""
],
[
"Castellano",
"J. G.",
""
],
[
"Merelo",
"J. J.",
""
],
[
"Prieto",
"A.",
""
],
[
"Rivas",
"V.",
""
],
[
"Romero",
"G.",
""
]
] |
cs/0603006 | Jonathan Ben-Naim | Jonathan Ben-Naim (LIF) | Pivotal and Pivotal-discriminative Consequence Relations | null | Journal of Logic and Computation Volume 15, number 5 (2005)
679-700 | 10.1093/logcom/exi030 | null | cs.LO | null | In the present paper, we investigate consequence relations that are both
paraconsistent and plausible (but still monotonic). More precisely, we put the
focus on pivotal consequence relations, i.e. those relations that can be
defined by a pivot (in the style of e.g. D. Makinson). A pivot is a fixed
subset of valuations which are considered to be the important ones in the
absolute sense. We worked with a general notion of valuation that covers e.g.
the classical valuations as well as certain kinds of many-valued valuations. In
the many-valued cases, pivotal consequence relations are paraconsistant (in
addition to be plausible), i.e. they are capable of drawing reasonable
conclusions which contain contradictions. We will provide in our general
framework syntactic characterizations of several families of pivotal relations.
In addition, we will provide, again in our general framework, characterizations
of several families of pivotal discriminative consequence relations. The latter
are defined exactly as the plain version, but contradictory conclusions are
rejected. We will also answer negatively a representation problem that was left
open by Makinson. Finally, we will put in evidence a connexion with X-logics
from Forget, Risch, and Siegel. The motivations and the framework of the
present paper are very close to those of a previous paper of the author which
is about preferential consequence relations.
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2006 15:15:46 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Jun 2006 08:16:43 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Apr 2007 14:53:14 GMT"
},
{
"version": "v4",
"created": "Sun, 8 Apr 2007 15:04:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ben-Naim",
"Jonathan",
"",
"LIF"
]
] |
cs/0603010 | Ketan Savla | Ketan Savla, Emilio Frazzoli and Francesco Bullo | Asymptotic constant-factor approximation algorithm for the Traveling
Salesperson Problem for Dubins' vehicle | null | null | null | null | cs.RO | null | This article proposes the first known algorithm that achieves a
constant-factor approximation of the minimum length tour for a Dubins' vehicle
through $n$ points on the plane. By Dubins' vehicle, we mean a vehicle
constrained to move at constant speed along paths with bounded curvature
without reversing direction. For this version of the classic Traveling
Salesperson Problem, our algorithm closes the gap between previously
established lower and upper bounds; the achievable performance is of order
$n^{2/3}$.
| [
{
"version": "v1",
"created": "Thu, 2 Mar 2006 07:07:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Savla",
"Ketan",
""
],
[
"Frazzoli",
"Emilio",
""
],
[
"Bullo",
"Francesco",
""
]
] |
cs/0603012 | Nils Hebbinghaus | Benjamin Doerr, Nils Hebbinghaus, S\"oren Werth | Improved Bounds and Schemes for the Declustering Problem | 19 pages, 1 figure | null | null | null | cs.DM cs.DS | null | The declustering problem is to allocate given data on parallel working
storage devices in such a manner that typical requests find their data evenly
distributed on the devices. Using deep results from discrepancy theory, we
improve previous work of several authors concerning range queries to
higher-dimensional data. We give a declustering scheme with an additive error
of $O_d(\log^{d-1} M)$ independent of the data size, where $d$ is the
dimension, $M$ the number of storage devices and $d-1$ does not exceed the
smallest prime power in the canonical decomposition of $M$ into prime powers.
In particular, our schemes work for arbitrary $M$ in dimensions two and three.
For general $d$, they work for all $M\geq d-1$ that are powers of two.
Concerning lower bounds, we show that a recent proof of a
$\Omega_d(\log^{\frac{d-1}{2}} M)$ bound contains an error. We close the gap in
the proof and thus establish the bound.
| [
{
"version": "v1",
"created": "Thu, 2 Mar 2006 15:51:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Doerr",
"Benjamin",
""
],
[
"Hebbinghaus",
"Nils",
""
],
[
"Werth",
"Sören",
""
]
] |
cs/0603015 | Pritam Rajagopal | Pritam Rajagopal | The Basic Kak Neural Network with Complex Inputs | 17 pages, 9 figures, 7 tables | null | null | null | cs.NE | null | The Kak family of neural networks is able to learn patterns quickly, and this
speed of learning can be a decisive advantage over other competing models in
many applications. Amongst the implementations of these networks are those
using reconfigurable networks, FPGAs and optical networks. In some
applications, it is useful to use complex data, and it is with that in mind
that this introduction to the basic Kak network with complex inputs is being
presented. The training algorithm is prescriptive and the network weights are
assigned simply upon examining the inputs. The input is mapped using quaternary
encoding for purpose of efficienty. This network family is part of a larger
hierarchy of learning schemes that include quantum models.
| [
{
"version": "v1",
"created": "Thu, 2 Mar 2006 23:59:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rajagopal",
"Pritam",
""
]
] |
cs/0603016 | M. H. van Emden | M.H. van Emden and S.C. Somosan | Object-Oriented Modeling of Programming Paradigms | Re-written introduction and abstract, new title, some references
deleted; 10 pages; 4 figures | null | null | DCS-310-IR | cs.SE cs.PL | null | For the right application, the use of programming paradigms such as
functional or logic programming can enormously increase productivity in
software development. But these powerful paradigms are tied to exotic
programming languages, while the management of software development dictates
standardization on a single language.
This dilemma can be resolved by using object-oriented programming in a new
way. It is conventional to analyze an application by object-oriented modeling.
In the new approach, the analysis identifies the paradigm that is ideal for the
application; development starts with object-oriented modeling of the paradigm.
In this paper we illustrate the new approach by giving examples of
object-oriented modeling of dataflow and constraint programming. These examples
suggest that it is no longer necessary to embody a programming paradigm in a
language dedicated to it.
| [
{
"version": "v1",
"created": "Fri, 3 Mar 2006 05:19:42 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Nov 2006 18:46:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
],
[
"Somosan",
"S. C.",
""
]
] |
cs/0603019 | Leandro R\^ego | Joseph Y. Halpern and Leandro Chaves Rego | Characterizing the NP-PSPACE Gap in the Satisfiability Problem for Modal
Logic | 6 pages | null | null | null | cs.LO cs.CC | null | There has been a great of work on characterizing the complexity of the
satisfiability and validity problem for modal logics. In particular, Ladner
showed that the validity problem for all logics between K, T, and S4 is {\sl
PSPACE}-complete, while for S5 it is {\sl NP}-complete. We show that, in a
precise sense, it is \emph{negative introspection}, the axiom $\neg K p \rimp K
\neg K p$, that causes the gap. In a precise sense, if we require this axiom,
then the satisfiability problem is {\sl NP}-complete; without it, it is {\sl
PSPACE}-complete.
| [
{
"version": "v1",
"created": "Sun, 5 Mar 2006 23:11:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Rego",
"Leandro Chaves",
""
]
] |
cs/0603020 | Leandro R\^ego | Joseph Y. halpern and Leandro Chaves Rego | Reasoning About Knowledge of Unawareness | 32 pages | null | null | null | cs.LO cs.MA | null | Awareness has been shown to be a useful addition to standard epistemic logic
for many applications. However, standard propositional logics for knowledge and
awareness cannot express the fact that an agent knows that there are facts of
which he is unaware without there being an explicit fact that the agent knows
he is unaware of. We propose a logic for reasoning about knowledge of
unawareness, by extending Fagin and Halpern's \emph{Logic of General
Awareness}. The logic allows quantification over variables, so that there is a
formula in the language that can express the fact that ``an agent explicitly
knows that there exists a fact of which he is unaware''. Moreover, that formula
can be true without the agent explicitly knowing that he is unaware of any
particular formula. We provide a sound and complete axiomatization of the
logic, using standard axioms from the literature to capture the quantification
operator. Finally, we show that the validity problem for the logic is
recursively enumerable, but not decidable.
| [
{
"version": "v1",
"created": "Sun, 5 Mar 2006 21:14:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"halpern",
"Joseph Y.",
""
],
[
"Rego",
"Leandro Chaves",
""
]
] |
cs/0603021 | Joy Mukherjee | Joy Mukherjee, Srinidhi Varadarajan | Language Support for Optional Functionality | 6 pages, 8 figures | null | null | null | cs.PL cs.OS cs.SE | null | We recommend a programming construct - availability check - for programs that
need to automatically adjust to presence or absence of segments of code. The
idea is to check the existence of a valid definition before a function call is
invoked. The syntax is that of a simple 'if' statement. The vision is to enable
customization of application functionality through addition or removal of
optional components, but without requiring complete re-building. Focus is on
C-like compiled procedural languages and UNIX-based systems. Essentially, our
approach attempts to combine the flexibility of dynamic libraries with the
usability of utility (dependency) libraries. We outline the benefits over
prevalent strategies mainly in terms of development complexity, crudely
measured as lesser lines of code. We also allude to performance and flexibility
facets. A Preliminary implementation and figures from early experimental
evaluation are presented.
| [
{
"version": "v1",
"created": "Mon, 6 Mar 2006 00:46:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mukherjee",
"Joy",
""
],
[
"Varadarajan",
"Srinidhi",
""
]
] |
cs/0603023 | Marcus Hutter | Viktor Zhumatiy and Faustino Gomez and Marcus Hutter and Juergen
Schmidhuber | Metric State Space Reinforcement Learning for a Vision-Capable Mobile
Robot | 14 pages, 8 figures | Proc. 9th International Conf. on Intelligent Autonomous Systems
(IAS 2006) pages 272-281 | null | IDSIA-05-06 | cs.RO cs.LG | null | We address the problem of autonomously learning controllers for
vision-capable mobile robots. We extend McCallum's (1995) Nearest-Sequence
Memory algorithm to allow for general metrics over state-action trajectories.
We demonstrate the feasibility of our approach by successfully running our
algorithm on a real mobile robot. The algorithm is novel and unique in that it
(a) explores the environment and learns directly on a mobile robot without
using a hand-made computer model as an intermediate step, (b) does not require
manual discretization of the sensor input space, (c) works in piecewise
continuous perceptual spaces, and (d) copes with partial observability.
Together this allows learning from much less experience compared to previous
methods.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2006 08:44:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhumatiy",
"Viktor",
""
],
[
"Gomez",
"Faustino",
""
],
[
"Hutter",
"Marcus",
""
],
[
"Schmidhuber",
"Juergen",
""
]
] |
cs/0603024 | Carl Lagoze | Carl Lagoze, Dean Krafft, Tim Cornwell, Dean Eckstrom, Susan Jesuroga,
Chris Wilper | Representing Contextualized Information in the NSDL | null | null | null | null | cs.DL | null | The NSDL (National Science Digital Library) is funded by the National Science
Foundation to advance science and match education. The inital product was a
metadata-based digital library providing search and access to distributed
resources. Our recent work recognizes the importance of context - relations,
metadata, annotations - for the pedagogical value of a digital library. This
new architecture uses Fedora, a tool for representing complex content, data,
metadata, web-based services, and semantic relationships, as the basis of an
information network overlay (INO). The INO provides an extensible knowl-edge
base for an expanding suite of digital library services.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2006 15:50:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Krafft",
"Dean",
""
],
[
"Cornwell",
"Tim",
""
],
[
"Eckstrom",
"Dean",
""
],
[
"Jesuroga",
"Susan",
""
],
[
"Wilper",
"Chris",
""
]
] |
cs/0603025 | Stijn Heymans | Stijn Heymans, Davy Van Nieuwenborgh and Dirk Vermeir | Open Answer Set Programming with Guarded Programs | 51 pages, 1 figure, accepted for publication in ACM's TOCL | null | null | null | cs.AI | null | Open answer set programming (OASP) is an extension of answer set programming
where one may ground a program with an arbitrary superset of the program's
constants. We define a fixed point logic (FPL) extension of Clark's completion
such that open answer sets correspond to models of FPL formulas and identify a
syntactic subclass of programs, called (loosely) guarded programs. Whereas
reasoning with general programs in OASP is undecidable, the FPL translation of
(loosely) guarded programs falls in the decidable (loosely) guarded fixed point
logic (mu(L)GF). Moreover, we reduce normal closed ASP to loosely guarded OASP,
enabling for the first time, a characterization of an answer set semantics by
muLGF formulas. We further extend the open answer set semantics for programs
with generalized literals. Such generalized programs (gPs) have interesting
properties, e.g., the ability to express infinity axioms. We restrict the
syntax of gPs such that both rules and generalized literals are guarded. Via a
translation to guarded fixed point logic, we deduce 2-exptime-completeness of
satisfiability checking in such guarded gPs (GgPs). Bound GgPs are restricted
GgPs with exptime-complete satisfiability checking, but still sufficiently
expressive to optimally simulate computation tree logic (CTL). We translate
Datalog lite programs to GgPs, establishing equivalence of GgPs under an open
answer set semantics, alternation-free muGF, and Datalog lite.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2006 17:54:59 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Feb 2007 12:32:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heymans",
"Stijn",
""
],
[
"Van Nieuwenborgh",
"Davy",
""
],
[
"Vermeir",
"Dirk",
""
]
] |
cs/0603026 | Valentin Polishchuk | Esther M. Arkin (1), Michael A. Bender (2), Joseph S. B. Mitchell (1),
Valentin Polishchuk (1) ((1) Department of Applied Mathematics and
Statistics, Stony Brook University, (2) Department of Computer Science, Stony
Brook University) | The Snowblower Problem | 19 pages, 10 figures, 1 table. Submitted to WAFR 2006 | null | null | null | cs.DS cs.CC cs.RO | null | We introduce the snowblower problem (SBP), a new optimization problem that is
closely related to milling problems and to some material-handling problems. The
objective in the SBP is to compute a short tour for the snowblower to follow to
remove all the snow from a domain (driveway, sidewalk, etc.). When a snowblower
passes over each region along the tour, it displaces snow into a nearby region.
The constraint is that if the snow is piled too high, then the snowblower
cannot clear the pile.
We give an algorithmic study of the SBP. We show that in general, the problem
is NP-complete, and we present polynomial-time approximation algorithms for
removing snow under various assumptions about the operation of the snowblower.
Most commercially-available snowblowers allow the user to control the direction
in which the snow is thrown. We differentiate between the cases in which the
snow can be thrown in any direction, in any direction except backwards, and
only to the right. For all cases, we give constant-factor approximation
algorithms; the constants increase as the throw direction becomes more
restricted.
Our results are also applicable to robotic vacuuming (or lawnmowing) with
bounded capacity dust bin and to some versions of material-handling problems,
in which the goal is to rearrange cartons on the floor of a warehouse.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2006 20:35:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arkin",
"Esther M.",
""
],
[
"Bender",
"Michael A.",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Polishchuk",
"Valentin",
""
]
] |
cs/0603028 | Jan Van den Bussche | Wim Janssen, Alexandr Korlyukov, Jan Van den Bussche | On the tree-transformation power of XSLT | null | Acta Informatica, Volume 43, Number 6 / January, 2007 | 10.1007/s00236-006-0026-8 | null | cs.PL cs.DB | null | XSLT is a standard rule-based programming language for expressing
transformations of XML data. The language is currently in transition from
version 1.0 to 2.0. In order to understand the computational consequences of
this transition, we restrict XSLT to its pure tree-transformation capabilities.
Under this focus, we observe that XSLT~1.0 was not yet a computationally
complete tree-transformation language: every 1.0 program can be implemented in
exponential time. A crucial new feature of version~2.0, however, which allows
nodesets over temporary trees, yields completeness. We provide a formal
operational semantics for XSLT programs, and establish confluence for this
semantics.
| [
{
"version": "v1",
"created": "Wed, 8 Mar 2006 13:48:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Janssen",
"Wim",
""
],
[
"Korlyukov",
"Alexandr",
""
],
[
"Bussche",
"Jan Van den",
""
]
] |
cs/0603032 | Somdeb Lahiri | Somdeb Lahiri | Market Equilibrium for Bundle Auctions and the Matching Core of
Nonnegative TU Games | 17 pages | null | null | null | cs.GT | null | We discuss bundle auctions within the framework of an integer allocation
problem. We show that for multi-unit auctions, of which bundle auctions are a
special case, market equilibrium and constrained market equilibrium are
equivalent concepts. This equivalence, allows us to obtain a computable
necessary and sufficient condition for the existence of constrained market
equilibrium for bundle auctions. We use this result to obtain a necessary and
sufficient condition for the existence of market equilibrium for multi-unit
auctions. After obtaining the induced bundle auction of a nonnegative TU game,
we show that the existence of market equilibrium implies the existence of a
possibly different market equilibrium as well, which corresponds very naturally
to an outcome in the matching core of the TU game. Consequently we show that
the matching core of the nonnegative TU game is non-empty if and only if the
induced market game has a market equilibrium.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 12:45:19 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Mar 2006 05:29:06 GMT"
},
{
"version": "v3",
"created": "Sat, 8 Apr 2006 10:08:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lahiri",
"Somdeb",
""
]
] |
cs/0603033 | Vaghinak Petrosyan | Vaghinak Petrosyan | Inter-component communication methods in object-oriented frameworks | null | null | null | null | cs.SE | null | Modern frameworks for development of graphical interfaces are using the
native controls of the operating system. Because of that they are using
operating system events model for inter-component communication. We consider a
method to increase inter-component communication speed by sending messages from
one component to the other passing over the operating system. Besides the
messages subscription helps to avoid receiving of unnecessary messages.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 08:44:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petrosyan",
"Vaghinak",
""
]
] |
cs/0603035 | Richard McClatchey | Chiara Del Frate, Jose Galvez, Tamas Hauer, David Manset, Richard
McClatchey, Mohammed Odeh, Dmitry Rogulin, Tony Solomonides, Ruth Warren | Final Results from and Exploitation Plans for MammoGrid | 11 pages, 3 figures, 2 tables. Accepted at the 4th International
HealthGrid conference, Valencia Spain June 2006 | null | null | null | cs.DC | null | The MammoGrid project has delivered the first deployed instance of a
healthgrid for clinical mammography that spans national boundaries. During the
last year, the final MammoGrid prototype has undergone a series of rigorous
tests undertaken by radiologists in the UK and Italy and this paper draws
conclusions from those tests for the benefit of the Healthgrid community. In
addition, lessons learned during the lifetime of the project are detailed and
recommendations drawn for future health applications using grids. Following the
completion of the project, plans have been put in place for the
commercialisation of the MammoGrid system and this is also reported in this
article. Particular emphasis is placed on the issues surrounding the transition
from collaborative research project to a marketable product. This paper
concludes by highlighting some of the potential areas of future development and
research.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 13:49:14 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Mar 2006 19:17:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Del Frate",
"Chiara",
""
],
[
"Galvez",
"Jose",
""
],
[
"Hauer",
"Tamas",
""
],
[
"Manset",
"David",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"Rogulin",
"Dmitry",
""
],
[
"Solomonides",
"Tony",
""
],
[
"Warren",
"Ruth",
""
]
] |
cs/0603036 | Richard McClatchey | Joerg Freund, Dorin Comaniciu, Yannis Ioannis, Peiya Liu, Richard
McClatchey, Edwin Morley-Fletcher, Xavier Pennec, Giacomo Pongiglione, Xiang
(Sean)ZHOU | Health-e-Child : An Integrated Biomedical Platform for Grid-Based
Paediatric Applications | 12 pages, 2 figures. Accepted at the 4th International HealthGrid
conference, Valencia, Spain June 2006 | null | null | null | cs.DC | null | There is a compelling demand for the integration and exploitation of
heterogeneous biomedical information for improved clinical practice, medical
research, and personalised healthcare across the EU. The Health-e-Child project
aims at developing an integrated healthcare platform for European Paediatrics,
providing seamless integration of traditional and emerging sources of
biomedical information. The long-term goal of the project is to provide
uninhibited access to universal biomedical knowledge repositories for
personalised and preventive healthcare, large-scale information-based
biomedical research and training, and informed policy making. The project focus
will be on individualised disease prevention, screening, early diagnosis,
therapy and follow-up of paediatric heart diseases, inflammatory diseases, and
brain tumours. The project will build a Grid-enabled European network of
leading clinical centres that will share and annotate biomedical data, validate
systems clinically, and diffuse clinical excellence across Europe by setting up
new technologies, clinical workflows, and standards. This paper outlines the
design approach being adopted in Health-e-Child to enable the delivery of an
integrated biomedical information platform.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 13:54:15 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Mar 2006 19:18:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Freund",
"Joerg",
"",
"Sean"
],
[
"Comaniciu",
"Dorin",
"",
"Sean"
],
[
"Ioannis",
"Yannis",
"",
"Sean"
],
[
"Liu",
"Peiya",
"",
"Sean"
],
[
"McClatchey",
"Richard",
"",
"Sean"
],
[
"Morley-Fletcher",
"Edwin",
"",
"Sean"
],
[
"Pennec",
"Xavier",
"",
"Sean"
],
[
"Pongiglione",
"Giacomo",
"",
"Sean"
],
[
"Xiang",
"",
"",
"Sean"
],
[
"ZHOU",
"",
""
]
] |
cs/0603037 | Richard McClatchey | Haya El-Ghalayini, Mohammed Odeh, Richard McClatchey | Deriving Conceptual Data Models from Domain Ontologies for
Bioinformatics | 6 pages, 1 figure. The 2nd international conference on Information
and Communication Technologies from Theory to Application (ICTTA06) | null | null | null | cs.SE | null | This paper studies the role that ontologies can play in establishing
conceptual data models during the process of information systems development. A
mapping algorithm has been proposed and embedded in a special purpose
Transformation-Engine to generate a conceptual data model from a given domain
ontology. In addition, this paper focuses on applying the proposed approach to
a bioinformatics context as the nature of biological data is considered a
barrier in representing biological conceptual data models. Both quantitative
and qualitative methods have been adopted to critically evaluate this new
approach. The results of this evaluation indicate that the quality of the
generated conceptual data models can reflect the problem domain entities and
the associations between them. The results are encouraging and support the
potential role that this approach can play in providing a suitable starting
point for conceptual data model development.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 13:59:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"El-Ghalayini",
"Haya",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
]
] |
cs/0603038 | Patrik O. Hoyer | Patrik O. Hoyer, Shohei Shimizu, Antti J. Kerminen | Estimation of linear, non-gaussian causal models in the presence of
confounding latent variables | 8 pages, 4 figures, pdflatex | null | null | null | cs.AI | null | The estimation of linear causal models (also known as structural equation
models) from data is a well-known problem which has received much attention in
the past. Most previous work has, however, made an explicit or implicit
assumption of gaussianity, limiting the identifiability of the models. We have
recently shown (Shimizu et al, 2005; Hoyer et al, 2006) that for non-gaussian
distributions the full causal model can be estimated in the no hidden variables
case. In this contribution, we discuss the estimation of the model when
confounding latent variables are present. Although in this case uniqueness is
no longer guaranteed, there is at most a finite set of models which can fit the
data. We develop an algorithm for estimating this set, and describe numerical
simulations which confirm the theoretical arguments and demonstrate the
practical viability of the approach. Full Matlab code is provided for all
simulations.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 14:46:18 GMT"
},
{
"version": "v2",
"created": "Mon, 22 May 2006 17:02:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hoyer",
"Patrik O.",
""
],
[
"Shimizu",
"Shohei",
""
],
[
"Kerminen",
"Antti J.",
""
]
] |
cs/0603041 | Prasanta K. Panigrahi | S. Hemachander, Amit Verma, Siddharth Arora, Prasanta K. Panigrahi | Locally Adaptive Block Thresholding Method with Continuity Constraint | 12 Pages, 4 figures, 1 Table | null | null | null | cs.CV | null | We present an algorithm that enables one to perform locally adaptive block
thresholding, while maintaining image continuity. Images are divided into
sub-images based some standard image attributes and thresholding technique is
employed over the sub-images. The present algorithm makes use of the thresholds
of neighboring sub-images to calculate a range of values. The image continuity
is taken care by choosing the threshold of the sub-image under consideration to
lie within the above range. After examining the average range values for
various sub-image sizes of a variety of images, it was found that the range of
acceptable threshold values is substantially high, justifying our assumption of
exploiting the freedom of range for bringing out local details.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 17:14:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemachander",
"S.",
""
],
[
"Verma",
"Amit",
""
],
[
"Arora",
"Siddharth",
""
],
[
"Panigrahi",
"Prasanta K.",
""
]
] |
cs/0603042 | Will Scott II | Willie L. Scott II | The NoN Approach to Autonomic Face Recognition | 15 pages, 6 figures, 6 tables | null | null | null | cs.NE | null | A method of autonomic face recognition based on the biologically plausible
network of networks (NoN) model of information processing is presented. The NoN
model is based on locally parallel and globally coordinated transformations in
which the neurons or computational units form distributed networks, which
themselves link to form larger networks. This models the structures in the
cerebral cortex described by Mountcastle and the architecture based on that
proposed for information processing by Sutton. In the proposed implementation,
face images are processed by a nested family of locally operating networks
along with a hierarchically superior network that classifies the information
from each of the local networks. The results of the experiments yielded a
maximum of 98.5% recognition accuracy and an average of 97.4% recognition
accuracy on a benchmark database.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 17:35:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Scott",
"Willie L.",
"II"
]
] |
cs/0603043 | Mihai Patrascu | Mihai Patrascu and Mikkel Thorup | Time-Space Trade-Offs for Predecessor Search | 29 pages. Full version (preliminary) of a paper appearing in STOC'06 | null | null | null | cs.CC cs.DS | null | We develop a new technique for proving cell-probe lower bounds for static
data structures. Previous lower bounds used a reduction to communication games,
which was known not to be tight by counting arguments. We give the first lower
bound for an explicit problem which breaks this communication complexity
barrier. In addition, our bounds give the first separation between polynomial
and near linear space. Such a separation is inherently impossible by
communication complexity.
Using our lower bound technique and new upper bound constructions, we obtain
tight bounds for searching predecessors among a static set of integers. Given a
set Y of n integers of l bits each, the goal is to efficiently find
predecessor(x) = max{y in Y | y <= x}, by representing Y on a RAM using space
S.
In external memory, it follows that the optimal strategy is to use either
standard B-trees, or a RAM algorithm ignoring the larger block size. In the
important case of l = c*lg n, for c>1 (i.e. polynomial universes), and near
linear space (such as S = n*poly(lg n)), the optimal search time is Theta(lg
l). Thus, our lower bound implies the surprising conclusion that van Emde Boas'
classic data structure from [FOCS'75] is optimal in this case. Note that for
space n^{1+eps}, a running time of O(lg l / lglg l) was given by Beame and Fich
[STOC'99].
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2006 14:50:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Patrascu",
"Mihai",
""
],
[
"Thorup",
"Mikkel",
""
]
] |
cs/0603044 | Vadim Tropashko | Marshall Spight, Vadim Tropashko | First Steps in Relational Lattice | 11 pages, 3 figures | null | null | null | cs.DB | null | Relational lattice reduces the set of six classic relational algebra
operators to two binary lattice operations: natural join and inner union. We
give an introduction to this theory with emphasis on formal algebraic laws. New
results include Spight distributivity criteria and its applications to query
transformations.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2006 18:11:49 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Mar 2006 04:54:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Spight",
"Marshall",
""
],
[
"Tropashko",
"Vadim",
""
]
] |
cs/0603046 | William Perkins | William Perkins | Trusted Certificates in Quantum Cryptography | 4 pages, 2 figures | null | null | null | cs.CR | null | This paper analyzes the performance of Kak's three stage quantum
cryptographic protocol based on public key cryptography against a
man-in-the-middle attack. A method for protecting against such an attack is
presented using certificates distributed by a trusted third party.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2006 23:05:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perkins",
"William",
""
]
] |
cs/0603047 | Simone Severini | Stefano Mancini and Simone Severini | The Quantum Separability Problem for Gaussian States | 8 pages | Electronic Notes in Theoretical Computer Science, Volume 169 ,
March 2007, pp. 121-131 | 10.1016/j.entcs.2006.07.034 | null | cs.CC quant-ph | null | Determining whether a quantum state is separable or entangled is a problem of
fundamental importance in quantum information science. This is a brief review
in which we consider the problem for states in infinite dimensional Hilbert
spaces. We show how the problem becomes tractable for a class of Gaussian
states.
| [
{
"version": "v1",
"created": "Sun, 12 Mar 2006 14:33:41 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Mar 2006 12:38:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mancini",
"Stefano",
""
],
[
"Severini",
"Simone",
""
]
] |
cs/0603048 | Vincent Limouzy | Binh Minh Bui Xuan (LIRMM), Michel Habib (LIAFA), Vincent Limouzy
(LIAFA), Fabien De Montgolfier (LIAFA) | Homogeneity vs. Adjacency: generalising some graph decomposition
algorithms | soumis \`{a} WG 2006 | Graph-Theoretic Concepts in Computer Science Springer (Ed.)
(22/06/2006) 278-288 | 10.1007/11917496\_25 | null | cs.DS | null | In this paper, a new general decomposition theory inspired from modular graph
decomposition is presented. Our main result shows that, within this general
theory, most of the nice algorithmic tools developed for modular decomposition
are still efficient. This theory not only unifies the usual modular
decomposition generalisations such as modular decomposition of directed graphs
or decomposition of 2-structures, but also star cutsets and bimodular
decomposition. Our general framework provides a decomposition algorithm which
improves the best known algorithms for bimodular decomposition.
| [
{
"version": "v1",
"created": "Mon, 13 Mar 2006 09:48:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Xuan",
"Binh Minh Bui",
"",
"LIRMM"
],
[
"Habib",
"Michel",
"",
"LIAFA"
],
[
"Limouzy",
"Vincent",
"",
"LIAFA"
],
[
"De Montgolfier",
"Fabien",
"",
"LIAFA"
]
] |
cs/0603051 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Transitive trust in mobile scenarios | Pre-refereed version. To appear in Proceedings of the International
Conference on Emerging Trends in Information and Communication Security
(ETRICS 2006), Freiburg im Breisgau, Germany 6th-9th June 2006. Lecture Notes
in Computer Science, Springer-Verlag | null | null | null | cs.CR | null | Horizontal integration of access technologies to networks and services should
be accompanied by some kind of convergence of authentication technologies. The
missing link for the federation of user identities across the technological
boundaries separating authentication methods can be provided by trusted
computing platforms. The concept of establishing transitive trust by trusted
computing enables the desired crossdomain authentication functionality. The
focus of target application scenarios lies in the realm of mobile networks and
devices.
| [
{
"version": "v1",
"created": "Mon, 13 Mar 2006 11:14:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0603052 | Evgueni Petrov | Evgueni Petrov | Evaluation of interval extension of the power function by graph
decomposition | submitted to the INTERVAL 2006 workshop to be held in St. Petersburg
June 2006, Russia; extended abstract | null | null | null | cs.MS | null | The subject of our talk is the correct evaluation of interval extension of
the function specified by the expression x^y without any constraints on the
values of x and y. The core of our approach is a decomposition of the graph of
x^y into a small number of parts which can be transformed into subsets of the
graph of x^y for non-negative bases x. Because of this fact, evaluation of
interval extension of x^y, without any constraints on x and y, is not much
harder than evaluation of interval extension of x^y for non-negative bases x.
| [
{
"version": "v1",
"created": "Mon, 13 Mar 2006 12:05:08 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Mar 2006 12:48:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petrov",
"Evgueni",
""
]
] |
cs/0603053 | Irene Guessarian | A. Ai T -Bouziad (LIAFA), Irene Guessarian (LIAFA), L. Vieille (NCM) | Automatic generation of simplified weakest preconditions for integrity
constraint verification | null | null | null | null | cs.DS cs.DB | null | Given a constraint $c$ assumed to hold on a database $B$ and an update $u$ to
be performed on $B$, we address the following question: will $c$ still hold
after $u$ is performed? When $B$ is a relational database, we define a
confluent terminating rewriting system which, starting from $c$ and $u$,
automatically derives a simplified weakest precondition $wp(c,u)$ such that,
whenever $B$ satisfies $wp(c,u)$, then the updated database $u(B)$ will satisfy
$c$, and moreover $wp(c,u)$ is simplified in the sense that its computation
depends only upon the instances of $c$ that may be modified by the update. We
then extend the definition of a simplified $wp(c,u)$ to the case of deductive
databases; we prove it using fixpoint induction.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2006 14:30:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"-Bouziad",
"A. Ai T",
"",
"LIAFA"
],
[
"Guessarian",
"Irene",
"",
"LIAFA"
],
[
"Vieille",
"L.",
"",
"NCM"
]
] |
cs/0603054 | Oleg Verbitsky | Martin Grohe and Oleg Verbitsky | Testing Graph Isomorphism in Parallel by Playing a Game | 21 pages | null | null | null | cs.CC cs.LO | null | Our starting point is the observation that if graphs in a class C have low
descriptive complexity in first order logic, then the isomorphism problem for C
is solvable by a fast parallel algorithm (essentially, by a simple
combinatorial algorithm known as the multidimensional Weisfeiler-Lehman
algorithm). Using this approach, we prove that isomorphism of graphs of bounded
treewidth is testable in TC1, answering an open question posed by
Chandrasekharan. Furthermore, we obtain an AC1 algorithm for testing
isomorphism of rotation systems (combinatorial specifications of graph
embeddings). The AC1 upper bound was known before, but the fact that this bound
can be achieved by the simple Weisfeiler-Lehman algorithm is new. Combined with
other known results, it also yields a new AC1 isomorphism algorithm for planar
graphs.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2006 15:46:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grohe",
"Martin",
""
],
[
"Verbitsky",
"Oleg",
""
]
] |
cs/0603055 | Ashfaq Shaik | Ashfaq N Shaik | Improved Watermarking Scheme Using Decimal Sequences | 7 pages, 10 figures | null | null | null | cs.CR | null | This paper presents watermarking algorithms using d-sequences so that the
peak signal to noise ratio (PSNR) is maximized and the distortion introduced in
the image due to the embedding is minimized. By exploiting the cross
correlation property of decimal sequences, the concept of embedding more than
one watermark in the same cover image is investigated.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2006 18:55:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shaik",
"Ashfaq N",
""
]
] |
cs/0603056 | Philip Davis | Philip M. Davis and Michael J. Fromerth | Does the arXiv lead to higher citations and reduced publisher downloads
for mathematics articles? | Last updated May 02, 2006 | Scientometrics Vol. 71, No. 2. (May, 2007) | 10.1007/s11192-007-1661-8 | null | cs.DL cs.IR math.HO | null | An analysis of 2,765 articles published in four math journals from 1997 to
2005 indicate that articles deposited in the arXiv received 35% more citations
on average than non-deposited articles (an advantage of about 1.1 citations per
article), and that this difference was most pronounced for highly-cited
articles. Open Access, Early View, and Quality Differential were examined as
three non-exclusive postulates for explaining the citation advantage. There was
little support for a universal Open Access explanation, and no empirical
support for Early View. There was some inferential support for a Quality
Differential brought about by more highly-citable articles being deposited in
the arXiv. In spite of their citation advantage, arXiv-deposited articles
received 23% fewer downloads from the publisher's website (about 10 fewer
downloads per article) in all but the most recent two years after publication.
The data suggest that arXiv and the publisher's website may be fulfilling
distinct functional needs of the reader.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2006 19:36:24 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Mar 2006 21:08:20 GMT"
},
{
"version": "v3",
"created": "Mon, 20 Mar 2006 17:34:40 GMT"
},
{
"version": "v4",
"created": "Tue, 2 May 2006 19:28:01 GMT"
},
{
"version": "v5",
"created": "Tue, 6 Feb 2007 14:52:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Davis",
"Philip M.",
""
],
[
"Fromerth",
"Michael J.",
""
]
] |
cs/0603057 | Nodari Sitchinava | David Eppstein, Michael T. Goodrich, Nodari Sitchinava | Guard Placement For Wireless Localization | null | null | null | null | cs.CG | null | Motivated by secure wireless networking, we consider the problem of placing
fixed localizers that enable mobile communication devices to prove they belong
to a secure region that is defined by the interior of a polygon. Each localizer
views an infinite wedge of the plane, and a device can prove membership in the
secure region if it is inside the wedges for a set of localizers whose common
intersection contains no points outside the polygon. This model leads to a
broad class of new art gallery type problems, for which we provide upper and
lower bounds.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2006 20:19:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Sitchinava",
"Nodari",
""
]
] |
cs/0603060 | Tobias Riege | Tobias Riege, J\"org Rothe, Holger Spakowski and Masaki Yamamoto | An Improved Exact Algorithm for the Domatic Number Problem | 9 pages, a two-page abstract of this paper is to appear in the
Proceedings of the Second IEEE International Conference on Information &
Communication Technologies: From Theory to Applications, April 2006 | null | null | null | cs.CC | null | The 3-domatic number problem asks whether a given graph can be partitioned
intothree dominating sets. We prove that this problem can be solved by a
deterministic algorithm in time 2.695^n (up to polynomial factors). This result
improves the previous bound of 2.8805^n, which is due to Fomin, Grandoni,
Pyatkin, and Stepanov. To prove our result, we combine an algorithm by Fomin et
al. with Yamamoto's algorithm for the satisfiability problem. In addition, we
show that the 3-domatic number problem can be solved for graphs G with bounded
maximum degree Delta(G) by a randomized algorithm, whose running time is better
than the previous bound due to Riege and Rothe whenever Delta(G) >= 5. Our new
randomized algorithm employs Schoening's approach to constraint satisfaction
problems.
| [
{
"version": "v1",
"created": "Thu, 16 Mar 2006 16:05:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Riege",
"Tobias",
""
],
[
"Rothe",
"Jörg",
""
],
[
"Spakowski",
"Holger",
""
],
[
"Yamamoto",
"Masaki",
""
]
] |
cs/0603062 | Benoit Donnet | Benoit Donnet, Bradley Huffaker, Timur Friedman, kc claffy | Implementation and Deployment of a Distributed Network Topology
Discovery Algorithm | null | null | null | null | cs.NI | null | In the past few years, the network measurement community has been interested
in the problem of internet topology discovery using a large number (hundreds or
thousands) of measurement monitors. The standard way to obtain information
about the internet topology is to use the traceroute tool from a small number
of monitors. Recent papers have made the case that increasing the number of
monitors will give a more accurate view of the topology. However, scaling up
the number of monitors is not a trivial process. Duplication of effort close to
the monitors wastes time by reexploring well-known parts of the network, and
close to destinations might appear to be a distributed denial-of-service (DDoS)
attack as the probes converge from a set of sources towards a given
destination. In prior work, authors of this report proposed Doubletree, an
algorithm for cooperative topology discovery, that reduces the load on the
network, i.e., router IP interfaces and end-hosts, while discovering almost as
many nodes and links as standard approaches based on traceroute. This report
presents our open-source and freely downloadable implementation of Doubletree
in a tool we call traceroute@home. We describe the deployment and validation of
traceroute@home on the PlanetLab testbed and we report on the lessons learned
from this experience. We discuss how traceroute@home can be developed further
and discuss ideas for future improvements.
| [
{
"version": "v1",
"created": "Thu, 16 Mar 2006 16:13:11 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Mar 2006 10:30:41 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Mar 2006 07:39:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Donnet",
"Benoit",
""
],
[
"Huffaker",
"Bradley",
""
],
[
"Friedman",
"Timur",
""
],
[
"claffy",
"kc",
""
]
] |
cs/0603067 | Priya Sivakumar | Priya Sivakumar | Implementing the Three-Stage Quantum Cryptography Protocol | 4 pages, 1 figure | null | null | null | cs.CR | null | We present simple implementations of Kak's three-stage quantum cryptography
protocol. The case where the transformation is applied to more than one qubit
at the same time is also considered.
| [
{
"version": "v1",
"created": "Thu, 16 Mar 2006 22:20:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sivakumar",
"Priya",
""
]
] |
cs/0603069 | Xueliang Li | Fengwei Li, Xueliang Li | The neighbor-scattering number can be computed in polynomial time for
interval graphs | 13 pages | null | null | null | cs.DM math.CO | null | Neighbor-scattering number is a useful measure for graph vulnerability. For
some special kinds of graphs, explicit formulas are given for this number.
However, for general graphs it is shown that to compute this number is
NP-complete. In this paper, we prove that for interval graphs this number can
be computed in polynomial time.
| [
{
"version": "v1",
"created": "Fri, 17 Mar 2006 07:00:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Fengwei",
""
],
[
"Li",
"Xueliang",
""
]
] |
cs/0603070 | Stefan Stefanov Z | S.Z.Stefanov | Predicting the Path of an Open System | 18 pages | null | null | null | cs.RO | null | The expected path of an open system,which is a big Poincare system,has been
found in this paper.This path has been obtained from the actual and from the
expected droop of the open system.The actual droop has been reconstructed from
the variations in the power and in the frequency of the open system.The
expected droop has been found as a function of rotation from the expected
potential energy of the open system under synchronization of that system.
| [
{
"version": "v1",
"created": "Fri, 17 Mar 2006 09:27:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stefanov",
"S. Z.",
""
]
] |
cs/0603071 | Martin Ziegler | Klaus Meer, Martin Ziegler | An Explicit Solution to Post's Problem over the Reals | submitted to Journal of Complexity | null | null | null | cs.LO cs.SC | null | In the BCSS model of real number computations we prove a concrete and
explicit semi-decidable language to be undecidable yet not reducible from (and
thus strictly easier than) the real Halting Language. This solution to Post's
Problem over the reals significantly differs from its classical, discrete
variant where advanced diagonalization techniques are only known to yield the
existence of such intermediate Turing degrees. Strengthening the above result,
we construct (that is, obtain again explicitly) as well an uncountable number
of incomparable semi-decidable Turing degrees below the real Halting problem in
the BCSS model. Finally we show the same to hold for the linear BCSS model,
that is over (R,+,-,<) rather than (R,+,-,*,/,<).
| [
{
"version": "v1",
"created": "Fri, 17 Mar 2006 16:12:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Meer",
"Klaus",
""
],
[
"Ziegler",
"Martin",
""
]
] |
cs/0603073 | Bryan Ford | Bryan Ford | VXA: A Virtual Architecture for Durable Compressed Archives | 14 pages, 7 figures, 2 tables | 4th USENIX Conference on File and Storage Technologies, December
2005 (FAST '05), San Francisco, CA | null | null | cs.DL cs.IR | null | Data compression algorithms change frequently, and obsolete decoders do not
always run on new hardware and operating systems, threatening the long-term
usability of content archived using those algorithms. Re-encoding content into
new formats is cumbersome, and highly undesirable when lossy compression is
involved. Processor architectures, in contrast, have remained comparatively
stable over recent decades. VXA, an archival storage system designed around
this observation, archives executable decoders along with the encoded content
it stores. VXA decoders run in a specialized virtual machine that implements an
OS-independent execution environment based on the standard x86 architecture.
The VXA virtual machine strictly limits access to host system services, making
decoders safe to run even if an archive contains malicious code. VXA's adoption
of a "native" processor architecture instead of type-safe language technology
allows reuse of existing "hand-optimized" decoders in C and assembly language,
and permits decoders access to performance-enhancing architecture features such
as vector processing instructions. The performance cost of VXA's virtualization
is typically less than 15% compared with the same decoders running natively.
The storage cost of archived decoders, typically 30-130KB each, can be
amortized across many archived files sharing the same compression method.
| [
{
"version": "v1",
"created": "Sat, 18 Mar 2006 16:31:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ford",
"Bryan",
""
]
] |
cs/0603074 | Bryan Ford | Bryan Ford, Pyda Srisuresh, Dan Kegel | Peer-to-Peer Communication Across Network Address Translators | 8 figures, 1 table | USENIX Annual Technical Conference, April 2005 (USENIX '05),
Anaheim, CA | null | null | cs.NI cs.CR | null | Network Address Translation (NAT) causes well-known difficulties for
peer-to-peer (P2P) communication, since the peers involved may not be reachable
at any globally valid IP address. Several NAT traversal techniques are known,
but their documentation is slim, and data about their robustness or relative
merits is slimmer. This paper documents and analyzes one of the simplest but
most robust and practical NAT traversal techniques, commonly known as "hole
punching." Hole punching is moderately well-understood for UDP communication,
but we show how it can be reliably used to set up peer-to-peer TCP streams as
well. After gathering data on the reliability of this technique on a wide
variety of deployed NATs, we find that about 82% of the NATs tested support
hole punching for UDP, and about 64% support hole punching for TCP streams. As
NAT vendors become increasingly conscious of the needs of important P2P
applications such as Voice over IP and online gaming protocols, support for
hole punching is likely to increase in the future.
| [
{
"version": "v1",
"created": "Sat, 18 Mar 2006 16:51:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ford",
"Bryan",
""
],
[
"Srisuresh",
"Pyda",
""
],
[
"Kegel",
"Dan",
""
]
] |
cs/0603075 | Bryan Ford | Bryan Ford | Unmanaged Internet Protocol: Taming the Edge Network Management Crisis | 7 pages, 3 figures | Second Workshop on Hot Topics in Networks (HotNets-II), November
2003, Cambridge, MA | null | null | cs.NI cs.OS | null | Though appropriate for core Internet infrastructure, the Internet Protocol is
unsuited to routing within and between emerging ad-hoc edge networks due to its
dependence on hierarchical, administratively assigned addresses. Existing
ad-hoc routing protocols address the management problem but do not scale to
Internet-wide networks. The promise of ubiquitous network computing cannot be
fulfilled until we develop an Unmanaged Internet Protocol (UIP), a scalable
routing protocol that manages itself automatically. UIP must route within and
between constantly changing edge networks potentially containing millions or
billions of nodes, and must still function within edge networks disconnected
from the main Internet, all without imposing the administrative burden of
hierarchical address assignment. Such a protocol appears challenging but
feasible. We propose an architecture based on self-certifying, cryptographic
node identities and a routing algorithm adapted from distributed hash tables.
| [
{
"version": "v1",
"created": "Sat, 18 Mar 2006 17:11:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ford",
"Bryan",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.