id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0601117
Prashant Singh
Dhananjay D. Kulkarni, Shekhar Verma, Prashant
Finding Cliques of a Graph using Prime Numbers
7 pages, 1 figure
null
null
null
cs.DS
null
This paper proposes a new algorithm for solving maximal cliques for simple undirected graphs using the theory of prime numbers. A novel approach using prime numbers is used to find cliques and ends with a discussion of the algorithm.
[ { "version": "v1", "created": "Fri, 27 Jan 2006 20:11:14 GMT" }, { "version": "v2", "created": "Thu, 18 Jan 2007 22:48:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Kulkarni", "Dhananjay D.", "" ], [ "Verma", "Shekhar", "" ], [ "Prashant", "", "" ] ]
cs/0601118
Richard McClatchey
David Manset, Herve Verjus, Richard McClatchey, Flavio Oquendo
A Formal Architecture-Centric Model-Driven Approach for the Automatic Generation of Grid Applications
11 pages, 9 figures. Proc of the 8th International Conference on Enterprise Information Systems (ICEIS06) Paphos, Cyprus. May 2006
null
null
null
cs.SE
null
This paper discusses the concept of model-driven software engineering applied to the Grid application domain. As an extension to this concept, the approach described here, attempts to combine both formal architecture-centric and model-driven paradigms. It is a commonly recognized statement that Grid systems have seldom been designed using formal techniques although from past experience such techniques have shown advantages. This paper advocates a formal engineering approach to Grid system developments in an effort to contribute to the rigorous development of Grids software architectures. This approach addresses quality of service and cross-platform developments by applying the model-driven paradigm to a formal architecture-centric engineering method. This combination benefits from a formal semantic description power in addition to model-based transformations. The result of such a novel combined concept promotes the re-use of design models and facilitates developments in Grid computing.
[ { "version": "v1", "created": "Sat, 28 Jan 2006 00:08:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Manset", "David", "" ], [ "Verjus", "Herve", "" ], [ "McClatchey", "Richard", "" ], [ "Oquendo", "Flavio", "" ] ]
cs/0601119
Richard McClatchey
Haya El-Ghalayini, Mohammed Odeh, & Richard McClatchey
Engineering Conceptual Data Models from Domain Ontologies: A Critical Evaluation
12 pages, 3 figures, presented at the 4th International Conference on Computer Science and Information Technology (CSIT'06). Amman Jordan April 2006
null
null
null
cs.SE
null
This paper studies the differences and similarities between domain ontologies and conceptual data models and the role that ontologies can play in establishing conceptual data models during the process of information systems development. A mapping algorithm has been proposed and embedded in a special purpose Transformation Engine to generate a conceptual data model from a given domain ontology. Both quantitative and qualitative methods have been adopted to critically evaluate this new approach. In addition, this paper focuses on evaluating the quality of the generated conceptual data model elements using Bunge-Wand-Weber and OntoClean ontologies. The results of this evaluation indicate that the generated conceptual data model provides a high degree of accuracy in identifying the substantial domain entities along with their attributes and relationships being derived from the consensual semantics of domain knowledge. The results are encouraging and support the potential role that this approach can take part in process of information system development.
[ { "version": "v1", "created": "Sat, 28 Jan 2006 17:40:44 GMT" } ]
2007-05-23T00:00:00
[ [ "El-Ghalayini", "Haya", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ] ]
cs/0601121
Marko Antonio Rodriguez
Marko A. Rodriguez
A Multi-Relational Network to Support the Scholarly Communication Process
keywords: digital libraries and scholarly communication
International Journal of Public Information Systems, volume 2007, issue 1, pp. 13-29
null
LA-UR-06-2416
cs.DL cs.AI cs.IR
null
The general pupose of the scholarly communication process is to support the creation and dissemination of ideas within the scientific community. At a finer granularity, there exists multiple stages which, when confronted by a member of the community, have different requirements and therefore different solutions. In order to take a researcher's idea from an initial inspiration to a community resource, the scholarly communication infrastructure may be required to 1) provide a scientist initial seed ideas; 2) form a team of well suited collaborators; 3) located the most appropriate venue to publish the formalized idea; 4) determine the most appropriate peers to review the manuscript; and 5) disseminate the end product to the most interested members of the community. Through the various delinieations of this process, the requirements of each stage are tied soley to the multi-functional resources of the community: its researchers, its journals, and its manuscritps. It is within the collection of these resources and their inherent relationships that the solutions to scholarly communication are to be found. This paper describes an associative network composed of multiple scholarly artifacts that can be used as a medium for supporting the scholarly communication process.
[ { "version": "v1", "created": "Sat, 28 Jan 2006 22:45:42 GMT" }, { "version": "v2", "created": "Mon, 21 May 2007 13:35:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodriguez", "Marko A.", "" ] ]
cs/0601125
Carl Lagoze
Carl Lagoze, Dean Krafft, Tim Cornwell, Naomi Dushay, Dean Eckstrom, and John Saylor
Metadata aggregation and "automated digital libraries": A retrospective on the NSDL experience
Submission to JCDL 2006
null
null
null
cs.DL
null
Over three years ago, the Core Integration team of the National Science Digital Library (NSDL) implemented a digital library based on metadata aggregation using Dublin Core and OAI-PMH. The initial expectation was that such low-barrier technologies would be relatively easy to automate and administer. While this architectural choice permitted rapid deployment of a production NSDL, our three years of experience have contradicted our original expectations of easy automation and low people cost. We have learned that alleged "low-barrier" standards are often harder to deploy than expected. In this paper we report on this experience and comment on the general cost, the functionality, and the ultimate effectiveness of this architecture.
[ { "version": "v1", "created": "Mon, 30 Jan 2006 12:26:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Krafft", "Dean", "" ], [ "Cornwell", "Tim", "" ], [ "Dushay", "Naomi", "" ], [ "Eckstrom", "Dean", "" ], [ "Saylor", "John", "" ] ]
cs/0601129
Abhilash Ponnath
Abhilash Ponnath
Instantaneously Trained Neural Networks
13 pages
null
null
null
cs.NE cs.AI
null
This paper presents a review of instantaneously trained neural networks (ITNNs). These networks trade learning time for size and, in the basic model, a new hidden node is created for each training sample. Various versions of the corner-classification family of ITNNs, which have found applications in artificial intelligence (AI), are described. Implementation issues are also considered.
[ { "version": "v1", "created": "Mon, 30 Jan 2006 22:02:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Ponnath", "Abhilash", "" ] ]
cs/0602001
Lane A. Hemaspaandra
Lane A. Hemaspaandra and Mayur Thakur
Query-Monotonic Turing Reductions
null
null
null
URCS-TR-818
cs.CC
null
We study reductions that limit the extreme adaptivity of Turing reductions. In particular, we study reductions that make a rapid, structured progression through the set to which they are reducing: Each query is strictly longer (shorter) than the previous one. We call these reductions query-increasing (query-decreasing) Turing reductions. We also study query-nonincreasing (query-nondecreasing) Turing reductions. These are Turing reductions in which the sequence of query lengths is nonincreasing (nondecreasing). We ask whether these restrictions in fact limit the power of reductions. We prove that query-increasing and query-decreasing Turing reductions are incomparable with (that is, are neither strictly stronger than nor strictly weaker than) truth-table reductions and are strictly weaker than Turing reductions. In addition, we prove that query-nonincreasing and query-nondecreasing Turing reductions are strictly stronger than truth-table reductions and strictly weaker than Turing reductions. Despite the fact that we prove query-increasing and query-decreasing Turing reductions to in the general case be strictly weaker than Turing reductions, we identify a broad class of sets A for which any set that Turing reduces to A will also reduce to A via both query-increasing and query-decreasing Turing reductions. In particular, this holds for all tight paddable sets, where a set is said to be tight paddable exactly if it is paddable via a function whose output length is bounded tightly both from above and from below in the length of the input. We prove that many natural NP-complete problems such as satisfiability, clique, and vertex cover are tight paddable.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 22:02:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Thakur", "Mayur", "" ] ]
cs/0602003
Subhash Kak
Navneet Mandhani and Subhash Kak
Watermarking Using Decimal Sequences
8 pages, 9 figures
Cryptologia, vol. 29, pp. 50-58, 2005
null
null
cs.CR
null
This paper introduces the use of decimal sequences in a code division multiple access (CDMA) based watermarking system to hide information for authentication in black and white images. Matlab version 6.5 was used to implement the algorithms discussed in this paper. The advantage of using d-sequences over PN sequences is that one can choose from a variety of prime numbers which provides a more flexible system.
[ { "version": "v1", "created": "Thu, 2 Feb 2006 19:43:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Mandhani", "Navneet", "" ], [ "Kak", "Subhash", "" ] ]
cs/0602004
Christoph Koch
Georg Gottlob, Christoph Koch, Klaus U. Schulz
Conjunctive Queries over Trees
36 pages, 12 figures, 2 tables, long version of PODS 2004 papers. To appear in Journal of the ACM 53(2), March 2006
null
null
null
cs.DB cs.AI cs.CC cs.LO
null
We study the complexity and expressive power of conjunctive queries over unranked labeled trees represented using a variety of structure relations such as ``child'', ``descendant'', and ``following'' as well as unary relations for node labels. We establish a framework for characterizing structures representing trees for which conjunctive queries can be evaluated efficiently. Then we completely chart the tractability frontier of the problem and establish a dichotomy theorem for our axis relations, i.e., we find all subset-maximal sets of axes for which query evaluation is in polynomial time and show that for all other cases, query evaluation is NP-complete. All polynomial-time results are obtained immediately using the proof techniques from our framework. Finally, we study the expressiveness of conjunctive queries over trees and show that for each conjunctive query, there is an equivalent acyclic positive query (i.e., a set of acyclic conjunctive queries), but that in general this query is not of polynomial size.
[ { "version": "v1", "created": "Thu, 2 Feb 2006 23:28:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Gottlob", "Georg", "" ], [ "Koch", "Christoph", "" ], [ "Schulz", "Klaus U.", "" ] ]
cs/0602008
Julio Mari\~no
Julio Marino, Angel Herranz and Juan Jose Moreno-Navarro
Demand Analysis with Partial Predicates
This is the extended version of a paper accepted for publication in a forthcoming special issue of Theory and Practice of Logic Programming on Multiparadigm and Constraint Programming (Falaschi and Maher, eds.) Appendices are missing in the printed version
null
null
null
cs.PL cs.SC
null
In order to alleviate the inefficiencies caused by the interaction of the logic and functional sides, integrated languages may take advantage of \emph{demand} information -- i.e. knowing in advance which computations are needed and, to which extent, in a particular context. This work studies \emph{demand analysis} -- which is closely related to \emph{backwards strictness analysis} -- in a semantic framework of \emph{partial predicates}, which in turn are constructive realizations of ideals in a domain. This will allow us to give a concise, unified presentation of demand analysis, to relate it to other analyses based on abstract interpretation or strictness logics, some hints for the implementation, and, more important, to prove the soundness of our analysis based on \emph{demand equations}. There are also some innovative results. One of them is that a set constraint-based analysis has been derived in a stepwise manner using ideas taken from the area of program transformation. The other one is the possibility of using program transformation itself to perform the analysis, specially in those domains of properties where algorithms based on constraint solving are too weak.
[ { "version": "v1", "created": "Sat, 4 Feb 2006 20:22:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Marino", "Julio", "" ], [ "Herranz", "Angel", "" ], [ "Moreno-Navarro", "Juan Jose", "" ] ]
cs/0602010
Robert Schweller
Ming-Yang Kao, Robert Schweller
Reducing Tile Complexity for Self-Assembly Through Temperature Programming
A preliminary version of this paper appeared in Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2006), Miami, Florida, Jan. 2006
null
null
null
cs.CC
null
We consider the tile self-assembly model and how tile complexity can be eliminated by permitting the temperature of the self-assembly system to be adjusted throughout the assembly process. To do this, we propose novel techniques for designing tile sets that permit an arbitrary length $m$ binary number to be encoded into a sequence of $O(m)$ temperature changes such that the tile set uniquely assembles a supertile that precisely encodes the corresponding binary number. As an application, we show how this provides a general tile set of size O(1) that is capable of uniquely assembling essentially any $n\times n$ square, where the assembled square is determined by a temperature sequence of length $O(\log n)$ that encodes a binary description of $n$. This yields an important decrease in tile complexity from the required $\Omega(\frac{\log n}{\log\log n})$ for almost all $n$ when the temperature of the system is fixed. We further show that for almost all $n$, no tile system can simultaneously achieve both $o(\log n)$ temperature complexity and $o(\frac{\log n}{\log\log n})$ tile complexity, showing that both versions of an optimal square building scheme have been discovered. This work suggests that temperature change can constitute a natural, dynamic method for providing input to self-assembly systems that is potentially superior to the current technique of designing large tile sets with specific inputs hardwired into the tileset.
[ { "version": "v1", "created": "Sun, 5 Feb 2006 01:00:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Kao", "Ming-Yang", "" ], [ "Schweller", "Robert", "" ] ]
cs/0602013
David Pritchard
David Pritchard
An Optimal Distributed Edge-Biconnectivity Algorithm
Submitted to PODC 2006. Contains a pstricks figure
null
null
null
cs.DC
null
We describe a synchronous distributed algorithm which identifies the edge-biconnected components of a connected network. It requires a leader, and uses messages of size O(log |V|). The main idea is to preorder a BFS spanning tree, and then to efficiently compute least common ancestors so as to mark cycle edges. This algorithm takes O(Diam) time and uses O(|E|) messages. Furthermore, we show that no correct singly-initiated edge-biconnectivity algorithm can beat either bound on any graph by more than a constant factor. We also describe a near-optimal local algorithm for edge-biconnectivity.
[ { "version": "v1", "created": "Sun, 5 Feb 2006 20:47:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritchard", "David", "" ] ]
cs/0602018
Jiyou Jia Dr.
Jiyou Jia, Shufen Hou, Weichao Chen
Improving the CSIEC Project and Adapting It to the English Teaching and Learning in China
null
null
null
null
cs.CY cs.AI cs.CL cs.HC cs.MA
null
In this paper after short review of the CSIEC project initialized by us in 2003 we present the continuing development and improvement of the CSIEC project in details, including the design of five new Microsoft agent characters representing different virtual chatting partners and the limitation of simulated dialogs in specific practical scenarios like graduate job application interview, then briefly analyze the actual conditions and features of its application field: web-based English education in China. Finally we introduce our efforts to adapt this system to the requirements of English teaching and learning in China and point out the work next to do.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 15:17:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Jia", "Jiyou", "" ], [ "Hou", "Shufen", "" ], [ "Chen", "Weichao", "" ] ]
cs/0602019
Nie Nie
Nie Nie and Cristina Comaniciu
Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks
ACM MONET (Mobile Networks and Applications), special issue on "Reconfigurable Radio Technologies in Support of Ubiquitous Seamless Computing"
null
null
null
cs.GT
null
In this work, we propose a game theoretic framework to analyze the behavior of cognitive radios for distributed adaptive channel allocation. We define two different objective functions for the spectrum sharing games, which capture the utility of selfish users and cooperative users, respectively. Based on the utility definition for cooperative users, we show that the channel allocation problem can be formulated as a potential game, and thus converges to a deterministic channel allocation Nash equilibrium point. Alternatively, a no-regret learning implementation is proposed for both scenarios and it is shown to have similar performance with the potential game when cooperation is enforced, but with a higher variability across users. The no-regret learning formulation is particularly useful to accommodate selfish users. Non-cooperative learning games have the advantage of a very low overhead for information exchange in the network. We show that cooperation based spectrum sharing etiquette improves the overall network performance at the expense of an increased overhead required for information exchange.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 00:25:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Nie", "Nie", "" ], [ "Comaniciu", "Cristina", "" ] ]
cs/0602025
Gianluca Argentini
Gianluca Argentini
On local symbolic approximation and resolution of ODEs using Implicit Function Theorem
12 pages, 2 figures; keywords: ordinary differential equations, implicit function theorem, local solutions, symbolic solutions, cavitation
null
null
null
cs.NA math.CA physics.comp-ph
null
In this work the implicit function theorem is used for searching local symbolic resolution of differential equations. General results of existence for first order equations are proven and some examples, one relative to cavitation in a fluid, are developed. These examples seem to show that local approximation of non linear differential equations can give useful informations about symbolic form of possible solutions, and in the case a global solution is known, locally the accuracy of approximation can be good.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 11:44:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0602026
Richard McClatchey
Ashiq Anjum, Richard McClatchey, Arshad Ali & Ian Willers
Bulk Scheduling with DIANA Scheduler
4 pages, 5 figures. Accepted by the Computing for High Energy Physics Conference. Mumbai, Indai. February 2006
null
null
null
cs.DC
null
Results from and progress on the development of a Data Intensive and Network Aware (DIANA) Scheduling engine, primarily for data intensive sciences such as physics analysis, are described. Scientific analysis tasks can involve thousands of computing, data handling, and network resources and the size of the input and output files and the amount of overall storage space allocated to a user necessarily can have significant bearing on the scheduling of data intensive applications. If the input or output files must be retrieved from a remote location, then the time required transferring the files must also be taken into consideration when scheduling compute resources for the given application. The central problem in this study is the coordinated management of computation and data at multiple locations and not simply data movement. However, this can be a very costly operation and efficient scheduling can be a challenge if compute and data resources are mapped without network cost. We have implemented an adaptive algorithm within the DIANA Scheduler which takes into account data location and size, network performance and computation capability to make efficient global scheduling decisions. DIANA is a performance-aware as well as an economy-guided Meta Scheduler. It iteratively allocates each job to the site that is likely to produce the best performance as well as optimizing the global queue for any remaining pending jobs. Therefore it is equally suitable whether a single job is being submitted or bulk scheduling is being performed. Results suggest that considerable performance improvements are to be gained by adopting the DIANA scheduling approach.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 16:47:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Anjum", "Ashiq", "" ], [ "McClatchey", "Richard", "" ], [ "Ali", "Arshad", "" ], [ "Willers", "Ian", "" ] ]
cs/0602027
Krzysztof R. Apt
Krzysztof R. Apt
Explaining Constraint Programming
15 pages, appeared in "Processes, Terms and Cycles: Steps on the Road to Infinity", (A. Middeldorp, V. van Oostrom, F. van Raamsdonk, R. de Vrijer, eds.), LNCS 3838, pp. 55-69. (2005)
null
null
null
cs.PL cs.AI
null
We discuss here constraint programming (CP) by using a proof-theoretic perspective. To this end we identify three levels of abstraction. Each level sheds light on the essence of CP. In particular, the highest level allows us to bring CP closer to the computation as deduction paradigm. At the middle level we can explain various constraint propagation algorithms. Finally, at the lowest level we can address the issue of automatic generation and optimization of the constraint propagation algorithms.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 15:19:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/0602031
Wit Jakuczun
Wit Jakuczun
Classifying Signals with Local Classifiers
null
null
null
null
cs.AI
null
This paper deals with the problem of classifying signals. The new method for building so called local classifiers and local features is presented. The method is a combination of the lifting scheme and the support vector machines. Its main aim is to produce effective and yet comprehensible classifiers that would help in understanding processes hidden behind classified signals. To illustrate the method we present the results obtained on an artificial and a real dataset.
[ { "version": "v1", "created": "Wed, 8 Feb 2006 11:38:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Jakuczun", "Wit", "" ] ]
cs/0602037
Elisa Gorla
J. J. Climent, E. Gorla, J. Rosenthal
Cryptanalysis of the CFVZ cryptosystem
12 pages
null
null
null
cs.CR
null
The paper analyzes a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an elliptic curve. Using an adapted Pollard rho algorithm it is shown that this problem is essentially as hard as solving one discrete logarithm problem in the group of an elliptic curve.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 08:40:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Climent", "J. J.", "" ], [ "Gorla", "E.", "" ], [ "Rosenthal", "J.", "" ] ]
cs/0602038
Gregory Gutin
G. Gutin, P. Hell, A. Rafiey, A. Yeo
Minimum Cost Homomorphisms to Proper Interval Graphs and Bigraphs
null
null
null
null
cs.DM cs.AI
null
For graphs $G$ and $H$, a mapping $f: V(G)\dom V(H)$ is a homomorphism of $G$ to $H$ if $uv\in E(G)$ implies $f(u)f(v)\in E(H).$ If, moreover, each vertex $u \in V(G)$ is associated with costs $c_i(u), i \in V(H)$, then the cost of the homomorphism $f$ is $\sum_{u\in V(G)}c_{f(u)}(u)$. For each fixed graph $H$, we have the {\em minimum cost homomorphism problem}, written as MinHOM($H)$. The problem is to decide, for an input graph $G$ with costs $c_i(u),$ $u \in V(G), i\in V(H)$, whether there exists a homomorphism of $G$ to $H$ and, if one exists, to find one of minimum cost. Minimum cost homomorphism problems encompass (or are related to) many well studied optimization problems. We describe a dichotomy of the minimum cost homomorphism problems for graphs $H$, with loops allowed. When each connected component of $H$ is either a reflexive proper interval graph or an irreflexive proper interval bigraph, the problem MinHOM($H)$ is polynomial time solvable. In all other cases the problem MinHOM($H)$ is NP-hard. This solves an open problem from an earlier paper. Along the way, we prove a new characterization of the class of proper interval bigraphs.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 09:39:36 GMT" }, { "version": "v2", "created": "Tue, 14 Feb 2006 15:36:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Hell", "P.", "" ], [ "Rafiey", "A.", "" ], [ "Yeo", "A.", "" ] ]
cs/0602039
Andrei Arion
Andrei Arion (INRIA Futurs), Angela Bonifati, Ioana Manolescu (INRIA Futurs), Andrea Pugliese
Path Summaries and Path Partitioning in Modern XML Databases
null
null
null
null
cs.DB
null
We study the applicability of XML path summaries in the context of current-day XML databases. We find that summaries provide an excellent basis for optimizing data access methods, which furthermore mixes very well with path-partitioned stores. We provide practical algorithms for building and exploiting summaries, and prove its benefits through extensive experiments.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 12:21:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Arion", "Andrei", "", "INRIA Futurs" ], [ "Bonifati", "Angela", "", "INRIA\n Futurs" ], [ "Manolescu", "Ioana", "", "INRIA\n Futurs" ], [ "Pugliese", "Andrea", "" ] ]
cs/0602042
Wojciech Mazurczyk
Wojciech Mazurczyk, Zbigniew Kotulski
New security and control protocol for VoIP based on steganography and digital watermarking
8 pages, 4 figures, 1 table
Annales UMCS, Informatica, AI 4 (2006), ISNN 1732-1360
null
null
cs.CR cs.MM
null
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic. Additionally this solution offers authentication and integrity, it is capable of exchanging and verifying QoS and security parameters. It is based on digital watermarking and steganography that is why it does not consume additional bandwidth and the data transmitted is inseparably bound to the voice content.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 22:49:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0602043
Shanghua Teng
Xi Chen, Xiaotie Deng and Shang-Hua Teng
Computing Nash Equilibria: Approximation and Smoothed Complexity
null
null
null
null
cs.CC cs.GT
null
We show that the BIMATRIX game does not have a fully polynomial-time approximation scheme, unless PPAD is in P. In other words, no algorithm with time polynomial in n and 1/\epsilon can compute an \epsilon-approximate Nash equilibrium of an n by nbimatrix game, unless PPAD is in P. Instrumental to our proof, we introduce a new discrete fixed-point problem on a high-dimensional cube with a constant side-length, such as on an n-dimensional cube with side-length 7, and show that they are PPAD-complete. Furthermore, we prove, unless PPAD is in RP, that the smoothed complexity of the Lemke-Howson algorithm or any algorithm for computing a Nash equilibrium of a bimatrix game is polynomial in n and 1/\sigma under perturbations with magnitude \sigma. Our result answers a major open question in the smoothed analysis of algorithms and the approximation of Nash equilibria.
[ { "version": "v1", "created": "Sat, 11 Feb 2006 22:46:55 GMT" }, { "version": "v2", "created": "Wed, 22 Feb 2006 00:18:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Xi", "" ], [ "Deng", "Xiaotie", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0602044
Prasanta K. Panigrahi
Siddharth Arora, Jayadev Acharya, Amit Verma, Prasanta K. Panigrahi
Multilevel Thresholding for Image Segmentation through a Fast Statistical Recursive Algorithm
9 pages, 3 figures
null
null
null
cs.CV
null
A novel algorithm is proposed for segmenting an image into multiple levels using its mean and variance. Starting from the extreme pixel values at both ends of the histogram plot, the algorithm is applied recursively on sub-ranges computed from the previous step, so as to find a threshold level and a new sub-range for the next step, until no significant improvement in image quality can be achieved. The method makes use of the fact that a number of distributions tend towards Dirac delta function, peaking at the mean, in the limiting condition of vanishing variance. The procedure naturally provides for variable size segmentation with bigger blocks near the extreme pixel values and finer divisions around the mean or other chosen value for better visualization. Experiments on a variety of images show that the new algorithm effectively segments the image in computationally very less time.
[ { "version": "v1", "created": "Sun, 12 Feb 2006 18:22:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Arora", "Siddharth", "" ], [ "Acharya", "Jayadev", "" ], [ "Verma", "Amit", "" ], [ "Panigrahi", "Prasanta K.", "" ] ]
cs/0602045
Russ Abbott
Russ Abbott
Emergence Explained
67 pages. Earlier versions presented at Lake ArrowHead conference on human complex systems (2005), GECCO 2005 workshop on Biological Applications of Genetic and Evolutionary Computation, and Symposium on Understanding Complex Systems (2005)
null
null
null
cs.MA cs.DC cs.GL
null
Emergence (macro-level effects from micro-level causes) is at the heart of the conflict between reductionism and functionalism. How can there be autonomous higher level laws of nature (the functionalist claim) if everything can be reduced to the fundamental forces of physics (the reductionist position)? We cut through this debate by applying a computer science lens to the way we view nature. We conclude (a) that what functionalism calls the special sciences (sciences other than physics) do indeed study autonomous laws and furthermore that those laws pertain to real higher level entities but (b) that interactions among such higher-level entities is epiphenomenal in that they can always be reduced to primitive physical forces. In other words, epiphenomena, which we will identify with emergent phenomena, do real higher-level work. The proposed perspective provides a framework for understanding many thorny issues including the nature of entities, stigmergy, the evolution of complexity, phase transitions, supervenience, and downward entailment. We also discuss some practical considerations pertaining to systems of systems and the limitations of modeling.
[ { "version": "v1", "created": "Sun, 12 Feb 2006 22:11:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbott", "Russ", "" ] ]
cs/0602051
Fernando Lobo
Fernando G. Lobo, Claudio F. Lima
On the utility of the multimodal problem generator for assessing the performance of Evolutionary Algorithms
Also UALG-ILAB Report No. 200601
null
null
null
cs.NE
null
This paper looks in detail at how an evolutionary algorithm attempts to solve instances from the multimodal problem generator. The paper shows that in order to consistently reach the global optimum, an evolutionary algorithm requires a population size that should grow at least linearly with the number of peaks. It is also shown a close relationship between the supply and decision making issues that have been identified previously in the context of population sizing models for additively decomposable problems. The most important result of the paper, however, is that solving an instance of the multimodal problem generator is like solving a peak-in-a-haystack, and it is argued that evolutionary algorithms are not the best algorithms for such a task. Finally, and as opposed to what several researchers have been doing, it is our strong belief that the multimodal problem generator is not adequate for assessing the performance of evolutionary algorithms.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 10:30:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Fernando G.", "" ], [ "Lima", "Claudio F.", "" ] ]
cs/0602052
Grigoriev Evgeniy
Evgeniy Grigoriev
The OverRelational Manifesto
34 pages
null
null
null
cs.DB cs.DS
null
The OverRelational Manifesto (below ORM) proposes a possible approach to creation of data storage systems of the next generation. ORM starts from the requirement that information in a relational database is represented by a set of relation values. Accordingly, it is assumed that the information about any entity of an enterprise must also be represented as a set of relation values (the ORM main requirement). A system of types is introduced, which allows one to fulfill the main requirement. The data are represented in the form of complex objects, and the state of any object is described as a set of relation values. Emphasize that the types describing the objects are encapsulated, inherited, and polymorphic. Then, it is shown that the data represented as a set of such objects may also be represented as a set of relational values defined on the set of scalar domains (dual data representation). In the general case, any class is associated with a set of relation variables (R-variables) each one containing some data about all objects of this class existing in the system. One of the key points is the fact that the usage of complex (from the user's viewpoint) refined names of R-variables and their attributes makes it possible to preserve the semantics of complex data structures represented in the form of a set of relation values. The most important part of the data storage system created on the approach proposed is an object-oriented translator operating over a relational DBMS. The expressiveness of such a system is comparable with that of OO programming languages.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 12:19:08 GMT" }, { "version": "v2", "created": "Wed, 15 Feb 2006 10:28:24 GMT" }, { "version": "v3", "created": "Fri, 17 Mar 2006 09:57:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Grigoriev", "Evgeniy", "" ] ]
cs/0602053
Thomas Hayes
Varsha Dani and Thomas P. Hayes
How to Beat the Adaptive Multi-Armed Bandit
null
null
null
null
cs.DS cs.LG
null
The multi-armed bandit is a concise model for the problem of iterated decision-making under uncertainty. In each round, a gambler must pull one of $K$ arms of a slot machine, without any foreknowledge of their payouts, except that they are uniformly bounded. A standard objective is to minimize the gambler's regret, defined as the gambler's total payout minus the largest payout which would have been achieved by any fixed arm, in hindsight. Note that the gambler is only told the payout for the arm actually chosen, not for the unchosen arms. Almost all previous work on this problem assumed the payouts to be non-adaptive, in the sense that the distribution of the payout of arm $j$ in round $i$ is completely independent of the choices made by the gambler on rounds $1, \dots, i-1$. In the more general model of adaptive payouts, the payouts in round $i$ may depend arbitrarily on the history of past choices made by the algorithm. We present a new algorithm for this problem, and prove nearly optimal guarantees for the regret against both non-adaptive and adaptive adversaries. After $T$ rounds, our algorithm has regret $O(\sqrt{T})$ with high probability (the tail probability decays exponentially). This dependence on $T$ is best possible, and matches that of the full-information version of the problem, in which the gambler is told the payouts for all $K$ arms after each round. Previously, even for non-adaptive payouts, the best high-probability bounds known were $O(T^{2/3})$, due to Auer, Cesa-Bianchi, Freund and Schapire. The expected regret of their algorithm is $O(T^{1/2}) for non-adaptive payouts, but as we show, $\Omega(T^{2/3})$ for adaptive payouts.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 23:57:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Dani", "Varsha", "" ], [ "Hayes", "Thomas P.", "" ] ]
cs/0602055
Fernando Lobo
Fernando G. Lobo, Claudio F. Lima
Revisiting Evolutionary Algorithms with On-the-Fly Population Size Adjustment
Also UALG-ILAB Report No. 200602
null
null
null
cs.NE
null
In an evolutionary algorithm, the population has a very important role as its size has direct implications regarding solution quality, speed, and reliability. Theoretical studies have been done in the past to investigate the role of population sizing in evolutionary algorithms. In addition to those studies, several self-adjusting population sizing mechanisms have been proposed in the literature. This paper revisits the latter topic and pays special attention to the genetic algorithm with adaptive population size (APGA), for which several researchers have claimed to be very effective at autonomously (re)sizing the population. As opposed to those previous claims, this paper suggests a complete opposite view. Specifically, it shows that APGA is not capable of adapting the population size at all. This claim is supported on theoretical grounds and confirmed by computer simulations.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 13:48:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Fernando G.", "" ], [ "Lima", "Claudio F.", "" ] ]
cs/0602056
Domenico Camarda Dr.
Dino Borri, Domenico Camarda
Building Scenarios for Environmental Management and Planning: An IT-Based Approach
null
null
null
null
cs.MA
null
Oftentimes, the need to build multidiscipline knowledge bases, oriented to policy scenarios, entails the involvement of stakeholders in manifold domains, with a juxtaposition of different languages whose semantics can hardly allow inter-domain transfers. A useful support for planning is the building up of durable IT based interactive platforms, where it is possible to modify initial positions toward a semantic convergence. The present paper shows an area-based application of these tools, for the integrated distance-management of different forms of knowledge expressed by selected stakeholders about environmental planning issues, in order to build alternative development scenarios. Keywords: Environmental planning, Scenario building, Multi-source knowledge, IT-based
[ { "version": "v1", "created": "Wed, 15 Feb 2006 14:46:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Borri", "Dino", "" ], [ "Camarda", "Domenico", "" ] ]
cs/0602057
Christopher Homan
Melanie J. Agnew and Christopher M. Homan
Plane Decompositions as Tools for Approximation
null
null
null
null
cs.DS
null
Tree decompositions were developed by Robertson and Seymour. Since then algorithms have been developed to solve intractable problems efficiently for graphs of bounded treewidth. In this paper we extend tree decompositions to allow cycles to exist in the decomposition graph; we call these new decompositions plane decompositions because we require that the decomposition graph be planar. First, we give some background material about tree decompositions and an overview of algorithms both for decompositions and for approximations of planar graphs. Then, we give our plane decomposition definition and an algorithm that uses this decomposition to approximate the size of the maximum independent set of the underlying graph in polynomial time.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 19:09:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Agnew", "Melanie J.", "" ], [ "Homan", "Christopher M.", "" ] ]
cs/0602059
Suchitra Manepalli
Suchitra Manepalli, Giridhar Manepalli, Michael L. Nelson
D2D: Digital Archive to MPEG-21 DIDL
28 pages, 8 figures
null
null
null
cs.DL
null
Digital Archive to MPEG-21 DIDL (D2D) analyzes the contents of the digital archive and produces an MPEG-21 Digital Item Declaration Language (DIDL) encapsulating the analysis results. DIDL is an extensible XML-based language that aggregates resources and the metadata. We provide a brief report on several analysis techniques applied on the digital archive by the D2D and provide an evaluation of its run-time performance.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 22:18:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Manepalli", "Suchitra", "" ], [ "Manepalli", "Giridhar", "" ], [ "Nelson", "Michael L.", "" ] ]
cs/0602060
Philip Davis
Philip M. Davis, Jason S. Price
eJournal interface can influence usage statistics: implications for libraries, publishers, and Project COUNTER
22 pages, 5 figures. JASIST (in press, 2006)
JASIST v57 n9 (2006):1243-1248
10.1002/asi.20405
null
cs.IR cs.DL
null
The design of a publisher's electronic interface can have a measurable effect on electronic journal usage statistics. A study of journal usage from six COUNTER-compliant publishers at thirty-two research institutions in the United States, the United Kingdom and Sweden indicates that the ratio of PDF to HTML views is not consistent across publisher interfaces, even after controlling for differences in publisher content. The number of fulltext downloads may be artificially inflated when publishers require users to view HTML versions before accessing PDF versions or when linking mechanisms, such as CrossRef, direct users to the full text, rather than the abstract, of each article. These results suggest that usage reports from COUNTER-compliant publishers are not directly comparable in their current form. One solution may be to modify publisher numbers with adjustment factors deemed to be representative of the benefit or disadvantage due to its interface. Standardization of some interface and linking protocols may obviate these differences and allow for more accurate cross-publisher comparisons.
[ { "version": "v1", "created": "Thu, 16 Feb 2006 20:29:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Davis", "Philip M.", "" ], [ "Price", "Jason S.", "" ] ]
cs/0602061
David Anderson
David P. Anderson, Gilles Fedak
The Computational and Storage Potential of Volunteer Computing
8 pages. To appear in CCGrid 2006
null
null
null
cs.DC cs.PF
null
"Volunteer computing" uses Internet-connected computers, volunteered by their owners, as a source of computing power and storage. This paper studies the potential capacity of volunteer computing. We analyzed measurements of over 330,000 hosts participating in a volunteer computing project. These measurements include processing power, memory, disk space, network throughput, host availability, user-specified limits on resource usage, and host churn. We show that volunteer computing can support applications that are significantly more data-intensive, or have larger memory and storage requirements, than those in current projects.
[ { "version": "v1", "created": "Thu, 16 Feb 2006 22:33:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Anderson", "David P.", "" ], [ "Fedak", "Gilles", "" ] ]
cs/0602062
Francois Denis
Fran\c{c}ois Denis (LIF), Yann Esposito (LIF), Amaury Habrard (LIF)
Learning rational stochastic languages
15 pages
null
null
null
cs.LG
null
Given a finite set of words w1,...,wn independently drawn according to a fixed unknown distribution law P called a stochastic language, an usual goal in Grammatical Inference is to infer an estimate of P in some class of probabilistic models, such as Probabilistic Automata (PA). Here, we study the class of rational stochastic languages, which consists in stochastic languages that can be generated by Multiplicity Automata (MA) and which strictly includes the class of stochastic languages generated by PA. Rational stochastic languages have minimal normal representation which may be very concise, and whose parameters can be efficiently estimated from stochastic samples. We design an efficient inference algorithm DEES which aims at building a minimal normal representation of the target. Despite the fact that no recursively enumerable class of MA computes exactly the set of rational stochastic languages over Q, we show that DEES strongly identifies tis set in the limit. We study the intermediary MA output by DEES and show that they compute rational series which converge absolutely to one and which can be used to provide stochastic languages which closely estimate the target.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 08:57:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Denis", "François", "", "LIF" ], [ "Esposito", "Yann", "", "LIF" ], [ "Habrard", "Amaury", "", "LIF" ] ]
cs/0602063
Tony Thomas
Tony Thomas, Arbind Kumar Lal
Group Signature Schemes Using Braid Groups
null
null
null
null
cs.CR
null
Artin's braid groups have been recently suggested as a new source for public-key cryptography. In this paper we propose the first group signature schemes based on the conjugacy problem, decomposition problem and root problem in the braid groups which are believed to be hard problems.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 10:32:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Thomas", "Tony", "" ], [ "Lal", "Arbind Kumar", "" ] ]
cs/0602064
Ana Romero
A. Romero, J. Rubio, F. Sergeraert
Computing spectral sequences
null
null
null
null
cs.SC
null
In this paper, a set of programs enhancing the Kenzo system is presented. Kenzo is a Common Lisp program designed for computing in Algebraic Topology, in particular it allows the user to calculate homology and homotopy groups of complicated spaces. The new programs presented here entirely compute Serre and Eilenberg-Moore spectral sequences, in particular the groups and differential maps for arbitrary r. They also determine when the spectral sequence has converged and describe the filtration of the target homology groups induced by the spectral sequence.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 12:29:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Romero", "A.", "" ], [ "Rubio", "J.", "" ], [ "Sergeraert", "F.", "" ] ]
cs/0602065
Paul Vitanyi
Rudi Cilibrasi (CWI) and Paul Vitanyi (CWI and University of Amsterdam)
Similarity of Objects and the Meaning of Words
LaTeX, 25 pages, 7 figures. Proc. 3rd Conf. Theory and Applications of Models of Computation (TAMC), 15-20 May, 2006, Beijing, China (Invited paper) This is an extended version of the 5-page abstract cs.IR/0504089
null
null
null
cs.CV cs.IR
null
We survey the emerging area of compression-based, parameter-free, similarity distance measures useful in data-mining, pattern recognition, learning and automatic semantics extraction. Given a family of distances on a set of objects, a distance is universal up to a certain precision for that family if it minorizes every distance in the family between every two objects in the set, up to the stated precision (we do not require the universal distance to be an element of the family). We consider similarity distances for two types of objects: literal objects that as such contain all of their meaning, like genomes or books, and names for objects. The latter may have literal embodyments like the first type, but may also be abstract like ``red'' or ``christianity.'' For the first type we consider a family of computable distance measures corresponding to parameters expressing similarity according to particular featuresdistances generated by web users corresponding to particular semantic relations between the (names for) the designated objects. For both families we give universal similarity distance measures, incorporating all particular distance measures in the family. In the first case the universal distance is based on compression and in the second case it is based on Google page counts related to search terms. In both cases experiments on a massive scale give evidence of the viability of the approaches. between pairs of literal objects. For the second type we consider similarity
[ { "version": "v1", "created": "Fri, 17 Feb 2006 16:15:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Cilibrasi", "Rudi", "", "CWI" ], [ "Vitanyi", "Paul", "", "CWI and University of\n Amsterdam" ] ]
cs/0602068
Kenneth Koehler
K. R. Koehler
Parallel Symbolic Computation of Curvature Invariants in General Relativity
9 pages, submitted to Journal of Computational Physics
null
null
null
cs.DC cs.SC gr-qc
null
We present a practical application of parallel symbolic computation in General Relativity: the calculation of curvature invariants for large dimension. We discuss the structure of the calculations, an implementation of the technique and scaling of the computation with spacetime dimension for various invariants.
[ { "version": "v1", "created": "Sun, 19 Feb 2006 19:28:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Koehler", "K. R.", "" ] ]
cs/0602069
Vicky Choi
Vicky Choi
Faster Algorithms for Constructing a Concept (Galois) Lattice
15 pages, 3 figures
null
null
null
cs.DM cs.DS
null
In this paper, we present a fast algorithm for constructing a concept (Galois) lattice of a binary relation, including computing all concepts and their lattice order. We also present two efficient variants of the algorithm, one for computing all concepts only, and one for constructing a frequent closed itemset lattice. The running time of our algorithms depends on the lattice structure and is faster than all other existing algorithms for these problems.
[ { "version": "v1", "created": "Sun, 19 Feb 2006 19:47:56 GMT" }, { "version": "v2", "created": "Thu, 1 Jun 2006 19:03:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Choi", "Vicky", "" ] ]
cs/0602070
Nathan Boeger
Nathan Boeger
Methods for scaling a large member base
12 pages
null
null
null
cs.GL
null
The technical challenges of scaling websites with large and growing member bases, like social networking sites, are numerous. One of these challenges is how to evenly distribute the growing member base across all available resources. This paper will explore various methods that address this issue. The techniques used in this paper can be generalized and applied to various other problems that need to distribute data evenly amongst a finite amount of resources.
[ { "version": "v1", "created": "Mon, 20 Feb 2006 18:08:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Boeger", "Nathan", "" ] ]
cs/0602073
Tobias Friedrich
Deepak Ajwani, Tobias Friedrich and Ulrich Meyer
An O(n^{2.75}) algorithm for online topological ordering
20 pages, long version of SWAT'06 paper
null
null
null
cs.DS
null
We present a simple algorithm which maintains the topological order of a directed acyclic graph with n nodes under an online edge insertion sequence in O(n^{2.75}) time, independent of the number of edges m inserted. For dense DAGs, this is an improvement over the previous best result of O(min(m^{3/2} log(n), m^{3/2} + n^2 log(n)) by Katriel and Bodlaender. We also provide an empirical comparison of our algorithm with other algorithms for online topological sorting. Our implementation outperforms them on certain hard instances while it is still competitive on random edge insertion sequences leading to complete DAGs.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 10:32:15 GMT" }, { "version": "v2", "created": "Thu, 20 Apr 2006 16:31:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Ajwani", "Deepak", "" ], [ "Friedrich", "Tobias", "" ], [ "Meyer", "Ulrich", "" ] ]
cs/0602075
Peter Jonsson
Vladimir Deineko, Peter Jonsson, Mikael Klasson, and Andrei Krokhin
The approximability of MAX CSP with fixed-value constraints
null
null
null
null
cs.CC
null
In the maximum constraint satisfaction problem (MAX CSP), one is given a finite collection of (possibly weighted) constraints on overlapping sets of variables, and the goal is to assign values from a given finite domain to the variables so as to maximize the number (or the total weight, for the weighted case) of satisfied constraints. This problem is NP-hard in general, and, therefore, it is natural to study how restricting the allowed types of constraints affects the approximability of the problem. In this paper, we show that any MAX CSP problem with a finite set of allowed constraint types, which includes all fixed-value constraints (i.e., constraints of the form x=a), is either solvable exactly in polynomial-time or else is APX-complete, even if the number of occurrences of variables in instances are bounded. Moreover, we present a simple description of all polynomial-time solvable cases of our problem. This description relies on the well-known algebraic combinatorial property of supermodularity.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 14:13:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Deineko", "Vladimir", "" ], [ "Jonsson", "Peter", "" ], [ "Klasson", "Mikael", "" ], [ "Krokhin", "Andrei", "" ] ]
cs/0602076
Ioannis Antonellis
Ioannis Antonellis and Efstratios Gallopoulos
Exploring term-document matrices from matrix models in text mining
SIAM Text Mining Workshop, SIAM Conference Data Mining, 2006
null
null
03/02-06
cs.IR cs.DB cs.DL
null
We explore a matrix-space model, that is a natural extension to the vector space model for Information Retrieval. Each document can be represented by a matrix that is based on document extracts (e.g. sentences, paragraphs, sections). We focus on the performance of this model for the specific case in which documents are originally represented as term-by-sentence matrices. We use the singular value decomposition to approximate the term-by-sentence matrices and assemble these results to form the pseudo-``term-document'' matrix that forms the basis of a text mining method alternative to traditional VSM and LSI. We investigate the singular values of this matrix and provide experimental evidence suggesting that the method can be particularly effective in terms of accuracy for text collections with multi-topic documents, such as web pages with news.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 16:14:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Antonellis", "Ioannis", "" ], [ "Gallopoulos", "Efstratios", "" ] ]
cs/0602077
Vincent Schmitt RR
Vincent Schmitt and Krzysztof Worytkiewicz
Bisimulations of enrichments
null
null
null
null
cs.LO
null
In this paper we show that classical notions from automata theory such as simulation and bisimulation can be lifted to the context of enriched categories. The usual properties of bisimulation are nearly all preserved in this new context. The class of enriched functors that correspond to functionnal bisimulations surjective on objects is investigated and appears "nearly" open in the sense of Joyal and Moerdijk. Seeing the change of base techniques as a convenient means to define process refinement/abstractions, we give sufficient conditions for the change of base categories to preserve bisimularity. We apply these concepts to Betti's generalized automata, categorical transition systems, and other exotic categories.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 17:27:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmitt", "Vincent", "" ], [ "Worytkiewicz", "Krzysztof", "" ] ]
cs/0602078
Robert Burger PhD
John Robert Burger
Associative Memory For Reversible Programming and Charge Recovery
null
null
null
null
cs.AR cs.DC
null
Presented below is an interesting type of associative memory called toggle memory based on the concept of T flip flops, as opposed to D flip flops. Toggle memory supports both reversible programming and charge recovery. Circuits designed using the principles delineated below permit matchlines to charge and discharge with near zero energy dissipation. The resulting lethargy is compensated by the massive parallelism of associative memory. Simulation indicates over 33x reduction in energy dissipation using a sinusoidal power supply at 2 MHz, assuming realistic 50 nm MOSFET models.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 21:58:06 GMT" }, { "version": "v2", "created": "Thu, 23 Feb 2006 23:59:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
cs/0602082
Richard McClatchey
Zaheer Abbas Khan, Mohammed Odeh, Richard McClatchey
Digital Libraries: From Process Modelling to Grid-based Service Oriented Architecture
6 pages, 5 figures, 1 table. The 2nd international conference on Information and Communication Technologies from Theory to Application (ICTTA06
null
null
null
cs.DL cs.SE
null
Graphical Business Process Modelling Languages (BPML) like Role Activity Diagrams (RAD) provide ease and flexibility for modelling business behaviour. However, these languages show limited applicability in terms of enactment over distributed systems paradigms like Service Oriented Architecture (SOA) based grid computing. This paper investigates RAD modelling of a Scientific Publishing Process (SPP) for Digital Libraries (DL) and tries to determine the suitability of Pi-Calculus based formal approaches to enact SOA based grid computing. In order to achieve this purpose, the Pi-Calculus based formal transformation from a RAD model of SPP for DL draws attention towards a number of challenging issues including issues that require particular design considerations for appropriate enactment in a SOA based grid system.
[ { "version": "v1", "created": "Thu, 23 Feb 2006 23:12:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Khan", "Zaheer Abbas", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ] ]
cs/0602090
Shanghua Teng
Li-Sha Huang and Shang-Hua Teng
On the Approximation and Smoothed Complexity of Leontief Market Equilibria
null
null
null
null
cs.GT cs.CC
null
We show that the problem of finding an \epsilon-approximate Nash equilibrium of an n by n two-person games can be reduced to the computation of an (\epsilon/n)^2-approximate market equilibrium of a Leontief economy. Together with a recent result of Chen, Deng and Teng, this polynomial reduction implies that the Leontief market exchange problem does not have a fully polynomial-time approximation scheme, that is, there is no algorithm that can compute an \epsilon-approximate market equilibrium in time polynomial in m, n, and 1/\epsilon, unless PPAD is not in P, We also extend the analysis of our reduction to show, unless PPAD is not in RP, that the smoothed complexity of the Scarf's general fixed-point approximation algorithm (when applying to solve the approximate Leontief market exchange problem) or of any algorithm for computing an approximate market equilibrium of Leontief economies is not polynomial in n and 1/\sigma, under Gaussian or uniform perturbations with magnitude \sigma.
[ { "version": "v1", "created": "Sun, 26 Feb 2006 07:53:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Li-Sha", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0602093
Francois Denis
Fran\c{c}ois Denis (LIF), Yann Esposito (LIF)
Rational stochastic languages
35 pages
null
null
null
cs.LG cs.CL
null
The goal of the present paper is to provide a systematic and comprehensive study of rational stochastic languages over a semiring K \in {Q, Q +, R, R+}. A rational stochastic language is a probability distribution over a free monoid \Sigma^* which is rational over K, that is which can be generated by a multiplicity automata with parameters in K. We study the relations between the classes of rational stochastic languages S rat K (\Sigma). We define the notion of residual of a stochastic language and we use it to investigate properties of several subclasses of rational stochastic languages. Lastly, we study the representation of rational stochastic languages by means of multiplicity automata.
[ { "version": "v1", "created": "Mon, 27 Feb 2006 10:08:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Denis", "François", "", "LIF" ], [ "Esposito", "Yann", "", "LIF" ] ]
cs/0602094
Altyeb Taha mr
Altyeb Altaher
Effect of CSMA/CD on Self-Similarity of Network Traffic
4 pages, 2 figures
null
null
null
cs.NI
null
It is now well known that Internet traffic exhibits self-similarity, which cannot be described by traditional Markovian models such as the Poisson process. The causes of self-similarity of network traffic must be identified because understanding the nature of network traffic is critical in order to properly design and implement computer networks and network services like the World Wide Web. While some researchers have argued self similarity is generated by the typical applications or caused by Transport layer Protocols, it is also possible that the CSMA/CD protocol may cause or at least contribute to this phenomenon. In this paper, we use NS simulator to study the effect of CSMA/CD Exponential Backoff retransmission algorithm on Traffic Self similarity.
[ { "version": "v1", "created": "Mon, 27 Feb 2006 12:37:34 GMT" }, { "version": "v2", "created": "Sun, 26 Mar 2006 09:06:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Altaher", "Altyeb", "" ] ]
cs/0602095
Joseph O'Rourke
Mirela Damian, Robin Flatland, Joseph O'Rourke
Epsilon-Unfolding Orthogonal Polyhedra
23 pages, 20 figures, 7 references. Revised version improves language and figures, updates references, and sharpens the conclusion
null
null
null
cs.CG
null
An unfolding of a polyhedron is produced by cutting the surface and flattening to a single, connected, planar piece without overlap (except possibly at boundary points). It is a long unsolved problem to determine whether every polyhedron may be unfolded. Here we prove, via an algorithm, that every orthogonal polyhedron (one whose faces meet at right angles) of genus zero may be unfolded. Our cuts are not necessarily along edges of the polyhedron, but they are always parallel to polyhedron edges. For a polyhedron of n vertices, portions of the unfolding will be rectangular strips which, in the worst case, may need to be as thin as epsilon = 1/2^{Omega(n)}.
[ { "version": "v1", "created": "Mon, 27 Feb 2006 17:03:19 GMT" }, { "version": "v2", "created": "Wed, 22 Mar 2006 14:11:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Flatland", "Robin", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/0602096
Abhilash Ponnath
Abhilash Ponnath
Difficulties in the Implementation of Quantum Computers
6 pages
null
null
null
cs.AR
null
This paper reviews various engineering hurdles facing the field of quantum computing. Specifically, problems related to decoherence, state preparation, error correction, and implementability of gates are considered.
[ { "version": "v1", "created": "Mon, 27 Feb 2006 18:59:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Ponnath", "Abhilash", "" ] ]
cs/0602098
M. H. van Emden
M.H. van Emden
Compositional Semantics for the Procedural Interpretation of Logic
17 pages; no figures
null
null
DCS-307-IR
cs.PL
null
Semantics of logic programs has been given by proof theory, model theory and by fixpoint of the immediate-consequence operator. If clausal logic is a programming language, then it should also have a compositional semantics. Compositional semantics for programming languages follows the abstract syntax of programs, composing the meaning of a unit by a mathematical operation on the meanings of its constituent units. The procedural interpretation of logic has only yielded an incomplete abstract syntax for logic programs. We complete it and use the result as basis of a compositional semantics. We present for comparison Tarski's algebraization of first-order predicate logic, which is in substance the compositional semantics for his choice of syntax. We characterize our semantics by equivalence with the immediate-consequence operator.
[ { "version": "v1", "created": "Tue, 28 Feb 2006 19:28:31 GMT" }, { "version": "v2", "created": "Sun, 7 May 2006 17:41:17 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ] ]
cs/0602099
M. H. van Emden
H. Ibrahim and M.H. van Emden
Towards Applicative Relational Programming
10 pages; no figures
null
null
null
cs.PL
null
Functional programming comes in two flavours: one where ``functions are first-class citizens'' (we call this applicative) and one which is based on equations (we call this declarative). In relational programming clauses play the role of equations. Hence Prolog is declarative. The purpose of this paper is to provide in relational programming a mathematical basis for the relational analog of applicative functional programming. We use the cylindric semantics of first-order logic due to Tarski and provide a new notation for the required cylinders that we call tables. We define the Table/Relation Algebra with operators sufficient to translate Horn clauses into algebraic form. We establish basic mathematical properties of these operators. We show how relations can be first-class citizens, and devise mechanisms for modularity, for local scoping of predicates, and for exporting/importing relations between programs.
[ { "version": "v1", "created": "Tue, 28 Feb 2006 19:53:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Ibrahim", "H.", "" ], [ "van Emden", "M. H.", "" ] ]
cs/0603001
Alois Schl\"ogl
Alois Schl\"ogl
BioSig - An application of Octave
6 pages, submission for the Octave 2006 meeting
null
null
Octave2006/16
cs.MS
null
BioSig is an open source software library for biomedical signal processing. Most users in the field are using Matlab; however, significant effort was undertaken to provide compatibility to Octave, too. This effort has been widely successful, only some non-critical components relying on a graphical user interface are missing. Now, installing BioSig on Octave is as easy as on Matlab. Moreover, a benchmark test based on BioSig has been developed and the benchmark results of several platforms are presented.
[ { "version": "v1", "created": "Wed, 1 Mar 2006 15:45:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Schlögl", "Alois", "" ] ]
cs/0603002
Cheng Qi
Qi Cheng
On comparing sums of square roots of small integers
null
null
null
null
cs.CG
null
Let $k$ and $n$ be positive integers, $n>k$. Define $r(n,k)$ to be the minimum positive value of $$ |\sqrt{a_1} + ... + \sqrt{a_k} - \sqrt{b_1} - >... -\sqrt{b_k} | $$ where $ a_1, a_2, ..., a_k, b_1, b_2, ..., b_k $ are positive integers no larger than $n$. It is an important problem in computational geometry to determine a good upper bound of $-\log r(n,k)$. In this paper we prove an upper bound of $ 2^{O(n/\log n)} \log n$, which is better than the best known result $O(2^{2k} \log n)$ whenever $ n \leq ck\log k$ for some constant $c$. In particular, our result implies a {\em subexponential} algorithm to compare two sums of square roots of integers of size $o(k\log k)$.
[ { "version": "v1", "created": "Tue, 28 Feb 2006 22:35:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheng", "Qi", "" ] ]
cs/0603003
Michel Fliess
Michel Fliess (LIX, INRIA Futurs)
Analyse non standard du bruit
null
null
null
null
cs.CE math.LO math.OC math.PR quant-ph
null
Thanks to the nonstandard formalization of fast oscillating functions, due to P. Cartier and Y. Perrin, an appropriate mathematical framework is derived for new non-asymptotic estimation techniques, which do not necessitate any statistical analysis of the noises corrupting any sensor. Various applications are deduced for multiplicative noises, for the length of the parametric estimation windows, and for burst errors.
[ { "version": "v1", "created": "Wed, 1 Mar 2006 11:26:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Fliess", "Michel", "", "LIX, INRIA Futurs" ] ]
cs/0603004
Juan J. Merelo Pr.
P.A. Castillo, M.G. Arenas, J.G. Castellano, J.J. Merelo, A. Prieto, V. Rivas and G. Romero
Lamarckian Evolution and the Baldwin Effect in Evolutionary Neural Networks
Presented in a Spanish conference, MAEB
null
null
null
cs.NE
null
Hybrid neuro-evolutionary algorithms may be inspired on Darwinian or Lamarckian evolu- tion. In the case of Darwinian evolution, the Baldwin effect, that is, the progressive incorporation of learned characteristics to the genotypes, can be observed and leveraged to improve the search. The purpose of this paper is to carry out an exper- imental study into how learning can improve G-Prop genetic search. Two ways of combining learning and genetic search are explored: one exploits the Baldwin effect, while the other uses a Lamarckian strategy. Our experiments show that using a Lamarckian op- erator makes the algorithm find networks with a low error rate, and the smallest size, while using the Bald- win effect obtains MLPs with the smallest error rate, and a larger size, taking longer to reach a solution. Both approaches obtain a lower average error than other BP-based algorithms like RPROP, other evolu- tionary methods and fuzzy logic based methods
[ { "version": "v1", "created": "Wed, 1 Mar 2006 12:26:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Castillo", "P. A.", "" ], [ "Arenas", "M. G.", "" ], [ "Castellano", "J. G.", "" ], [ "Merelo", "J. J.", "" ], [ "Prieto", "A.", "" ], [ "Rivas", "V.", "" ], [ "Romero", "G.", "" ] ]
cs/0603006
Jonathan Ben-Naim
Jonathan Ben-Naim (LIF)
Pivotal and Pivotal-discriminative Consequence Relations
null
Journal of Logic and Computation Volume 15, number 5 (2005) 679-700
10.1093/logcom/exi030
null
cs.LO
null
In the present paper, we investigate consequence relations that are both paraconsistent and plausible (but still monotonic). More precisely, we put the focus on pivotal consequence relations, i.e. those relations that can be defined by a pivot (in the style of e.g. D. Makinson). A pivot is a fixed subset of valuations which are considered to be the important ones in the absolute sense. We worked with a general notion of valuation that covers e.g. the classical valuations as well as certain kinds of many-valued valuations. In the many-valued cases, pivotal consequence relations are paraconsistant (in addition to be plausible), i.e. they are capable of drawing reasonable conclusions which contain contradictions. We will provide in our general framework syntactic characterizations of several families of pivotal relations. In addition, we will provide, again in our general framework, characterizations of several families of pivotal discriminative consequence relations. The latter are defined exactly as the plain version, but contradictory conclusions are rejected. We will also answer negatively a representation problem that was left open by Makinson. Finally, we will put in evidence a connexion with X-logics from Forget, Risch, and Siegel. The motivations and the framework of the present paper are very close to those of a previous paper of the author which is about preferential consequence relations.
[ { "version": "v1", "created": "Wed, 1 Mar 2006 15:15:46 GMT" }, { "version": "v2", "created": "Mon, 19 Jun 2006 08:16:43 GMT" }, { "version": "v3", "created": "Tue, 3 Apr 2007 14:53:14 GMT" }, { "version": "v4", "created": "Sun, 8 Apr 2007 15:04:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Ben-Naim", "Jonathan", "", "LIF" ] ]
cs/0603010
Ketan Savla
Ketan Savla, Emilio Frazzoli and Francesco Bullo
Asymptotic constant-factor approximation algorithm for the Traveling Salesperson Problem for Dubins' vehicle
null
null
null
null
cs.RO
null
This article proposes the first known algorithm that achieves a constant-factor approximation of the minimum length tour for a Dubins' vehicle through $n$ points on the plane. By Dubins' vehicle, we mean a vehicle constrained to move at constant speed along paths with bounded curvature without reversing direction. For this version of the classic Traveling Salesperson Problem, our algorithm closes the gap between previously established lower and upper bounds; the achievable performance is of order $n^{2/3}$.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 07:07:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Savla", "Ketan", "" ], [ "Frazzoli", "Emilio", "" ], [ "Bullo", "Francesco", "" ] ]
cs/0603012
Nils Hebbinghaus
Benjamin Doerr, Nils Hebbinghaus, S\"oren Werth
Improved Bounds and Schemes for the Declustering Problem
19 pages, 1 figure
null
null
null
cs.DM cs.DS
null
The declustering problem is to allocate given data on parallel working storage devices in such a manner that typical requests find their data evenly distributed on the devices. Using deep results from discrepancy theory, we improve previous work of several authors concerning range queries to higher-dimensional data. We give a declustering scheme with an additive error of $O_d(\log^{d-1} M)$ independent of the data size, where $d$ is the dimension, $M$ the number of storage devices and $d-1$ does not exceed the smallest prime power in the canonical decomposition of $M$ into prime powers. In particular, our schemes work for arbitrary $M$ in dimensions two and three. For general $d$, they work for all $M\geq d-1$ that are powers of two. Concerning lower bounds, we show that a recent proof of a $\Omega_d(\log^{\frac{d-1}{2}} M)$ bound contains an error. We close the gap in the proof and thus establish the bound.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 15:51:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Doerr", "Benjamin", "" ], [ "Hebbinghaus", "Nils", "" ], [ "Werth", "Sören", "" ] ]
cs/0603015
Pritam Rajagopal
Pritam Rajagopal
The Basic Kak Neural Network with Complex Inputs
17 pages, 9 figures, 7 tables
null
null
null
cs.NE
null
The Kak family of neural networks is able to learn patterns quickly, and this speed of learning can be a decisive advantage over other competing models in many applications. Amongst the implementations of these networks are those using reconfigurable networks, FPGAs and optical networks. In some applications, it is useful to use complex data, and it is with that in mind that this introduction to the basic Kak network with complex inputs is being presented. The training algorithm is prescriptive and the network weights are assigned simply upon examining the inputs. The input is mapped using quaternary encoding for purpose of efficienty. This network family is part of a larger hierarchy of learning schemes that include quantum models.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 23:59:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Rajagopal", "Pritam", "" ] ]
cs/0603016
M. H. van Emden
M.H. van Emden and S.C. Somosan
Object-Oriented Modeling of Programming Paradigms
Re-written introduction and abstract, new title, some references deleted; 10 pages; 4 figures
null
null
DCS-310-IR
cs.SE cs.PL
null
For the right application, the use of programming paradigms such as functional or logic programming can enormously increase productivity in software development. But these powerful paradigms are tied to exotic programming languages, while the management of software development dictates standardization on a single language. This dilemma can be resolved by using object-oriented programming in a new way. It is conventional to analyze an application by object-oriented modeling. In the new approach, the analysis identifies the paradigm that is ideal for the application; development starts with object-oriented modeling of the paradigm. In this paper we illustrate the new approach by giving examples of object-oriented modeling of dataflow and constraint programming. These examples suggest that it is no longer necessary to embody a programming paradigm in a language dedicated to it.
[ { "version": "v1", "created": "Fri, 3 Mar 2006 05:19:42 GMT" }, { "version": "v2", "created": "Thu, 9 Nov 2006 18:46:06 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ], [ "Somosan", "S. C.", "" ] ]
cs/0603019
Leandro R\^ego
Joseph Y. Halpern and Leandro Chaves Rego
Characterizing the NP-PSPACE Gap in the Satisfiability Problem for Modal Logic
6 pages
null
null
null
cs.LO cs.CC
null
There has been a great of work on characterizing the complexity of the satisfiability and validity problem for modal logics. In particular, Ladner showed that the validity problem for all logics between K, T, and S4 is {\sl PSPACE}-complete, while for S5 it is {\sl NP}-complete. We show that, in a precise sense, it is \emph{negative introspection}, the axiom $\neg K p \rimp K \neg K p$, that causes the gap. In a precise sense, if we require this axiom, then the satisfiability problem is {\sl NP}-complete; without it, it is {\sl PSPACE}-complete.
[ { "version": "v1", "created": "Sun, 5 Mar 2006 23:11:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Rego", "Leandro Chaves", "" ] ]
cs/0603020
Leandro R\^ego
Joseph Y. halpern and Leandro Chaves Rego
Reasoning About Knowledge of Unawareness
32 pages
null
null
null
cs.LO cs.MA
null
Awareness has been shown to be a useful addition to standard epistemic logic for many applications. However, standard propositional logics for knowledge and awareness cannot express the fact that an agent knows that there are facts of which he is unaware without there being an explicit fact that the agent knows he is unaware of. We propose a logic for reasoning about knowledge of unawareness, by extending Fagin and Halpern's \emph{Logic of General Awareness}. The logic allows quantification over variables, so that there is a formula in the language that can express the fact that ``an agent explicitly knows that there exists a fact of which he is unaware''. Moreover, that formula can be true without the agent explicitly knowing that he is unaware of any particular formula. We provide a sound and complete axiomatization of the logic, using standard axioms from the literature to capture the quantification operator. Finally, we show that the validity problem for the logic is recursively enumerable, but not decidable.
[ { "version": "v1", "created": "Sun, 5 Mar 2006 21:14:59 GMT" } ]
2007-05-23T00:00:00
[ [ "halpern", "Joseph Y.", "" ], [ "Rego", "Leandro Chaves", "" ] ]
cs/0603021
Joy Mukherjee
Joy Mukherjee, Srinidhi Varadarajan
Language Support for Optional Functionality
6 pages, 8 figures
null
null
null
cs.PL cs.OS cs.SE
null
We recommend a programming construct - availability check - for programs that need to automatically adjust to presence or absence of segments of code. The idea is to check the existence of a valid definition before a function call is invoked. The syntax is that of a simple 'if' statement. The vision is to enable customization of application functionality through addition or removal of optional components, but without requiring complete re-building. Focus is on C-like compiled procedural languages and UNIX-based systems. Essentially, our approach attempts to combine the flexibility of dynamic libraries with the usability of utility (dependency) libraries. We outline the benefits over prevalent strategies mainly in terms of development complexity, crudely measured as lesser lines of code. We also allude to performance and flexibility facets. A Preliminary implementation and figures from early experimental evaluation are presented.
[ { "version": "v1", "created": "Mon, 6 Mar 2006 00:46:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Mukherjee", "Joy", "" ], [ "Varadarajan", "Srinidhi", "" ] ]
cs/0603023
Marcus Hutter
Viktor Zhumatiy and Faustino Gomez and Marcus Hutter and Juergen Schmidhuber
Metric State Space Reinforcement Learning for a Vision-Capable Mobile Robot
14 pages, 8 figures
Proc. 9th International Conf. on Intelligent Autonomous Systems (IAS 2006) pages 272-281
null
IDSIA-05-06
cs.RO cs.LG
null
We address the problem of autonomously learning controllers for vision-capable mobile robots. We extend McCallum's (1995) Nearest-Sequence Memory algorithm to allow for general metrics over state-action trajectories. We demonstrate the feasibility of our approach by successfully running our algorithm on a real mobile robot. The algorithm is novel and unique in that it (a) explores the environment and learns directly on a mobile robot without using a hand-made computer model as an intermediate step, (b) does not require manual discretization of the sensor input space, (c) works in piecewise continuous perceptual spaces, and (d) copes with partial observability. Together this allows learning from much less experience compared to previous methods.
[ { "version": "v1", "created": "Tue, 7 Mar 2006 08:44:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhumatiy", "Viktor", "" ], [ "Gomez", "Faustino", "" ], [ "Hutter", "Marcus", "" ], [ "Schmidhuber", "Juergen", "" ] ]
cs/0603024
Carl Lagoze
Carl Lagoze, Dean Krafft, Tim Cornwell, Dean Eckstrom, Susan Jesuroga, Chris Wilper
Representing Contextualized Information in the NSDL
null
null
null
null
cs.DL
null
The NSDL (National Science Digital Library) is funded by the National Science Foundation to advance science and match education. The inital product was a metadata-based digital library providing search and access to distributed resources. Our recent work recognizes the importance of context - relations, metadata, annotations - for the pedagogical value of a digital library. This new architecture uses Fedora, a tool for representing complex content, data, metadata, web-based services, and semantic relationships, as the basis of an information network overlay (INO). The INO provides an extensible knowl-edge base for an expanding suite of digital library services.
[ { "version": "v1", "created": "Tue, 7 Mar 2006 15:50:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Krafft", "Dean", "" ], [ "Cornwell", "Tim", "" ], [ "Eckstrom", "Dean", "" ], [ "Jesuroga", "Susan", "" ], [ "Wilper", "Chris", "" ] ]
cs/0603025
Stijn Heymans
Stijn Heymans, Davy Van Nieuwenborgh and Dirk Vermeir
Open Answer Set Programming with Guarded Programs
51 pages, 1 figure, accepted for publication in ACM's TOCL
null
null
null
cs.AI
null
Open answer set programming (OASP) is an extension of answer set programming where one may ground a program with an arbitrary superset of the program's constants. We define a fixed point logic (FPL) extension of Clark's completion such that open answer sets correspond to models of FPL formulas and identify a syntactic subclass of programs, called (loosely) guarded programs. Whereas reasoning with general programs in OASP is undecidable, the FPL translation of (loosely) guarded programs falls in the decidable (loosely) guarded fixed point logic (mu(L)GF). Moreover, we reduce normal closed ASP to loosely guarded OASP, enabling for the first time, a characterization of an answer set semantics by muLGF formulas. We further extend the open answer set semantics for programs with generalized literals. Such generalized programs (gPs) have interesting properties, e.g., the ability to express infinity axioms. We restrict the syntax of gPs such that both rules and generalized literals are guarded. Via a translation to guarded fixed point logic, we deduce 2-exptime-completeness of satisfiability checking in such guarded gPs (GgPs). Bound GgPs are restricted GgPs with exptime-complete satisfiability checking, but still sufficiently expressive to optimally simulate computation tree logic (CTL). We translate Datalog lite programs to GgPs, establishing equivalence of GgPs under an open answer set semantics, alternation-free muGF, and Datalog lite.
[ { "version": "v1", "created": "Tue, 7 Mar 2006 17:54:59 GMT" }, { "version": "v2", "created": "Sun, 25 Feb 2007 12:32:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Heymans", "Stijn", "" ], [ "Van Nieuwenborgh", "Davy", "" ], [ "Vermeir", "Dirk", "" ] ]
cs/0603026
Valentin Polishchuk
Esther M. Arkin (1), Michael A. Bender (2), Joseph S. B. Mitchell (1), Valentin Polishchuk (1) ((1) Department of Applied Mathematics and Statistics, Stony Brook University, (2) Department of Computer Science, Stony Brook University)
The Snowblower Problem
19 pages, 10 figures, 1 table. Submitted to WAFR 2006
null
null
null
cs.DS cs.CC cs.RO
null
We introduce the snowblower problem (SBP), a new optimization problem that is closely related to milling problems and to some material-handling problems. The objective in the SBP is to compute a short tour for the snowblower to follow to remove all the snow from a domain (driveway, sidewalk, etc.). When a snowblower passes over each region along the tour, it displaces snow into a nearby region. The constraint is that if the snow is piled too high, then the snowblower cannot clear the pile. We give an algorithmic study of the SBP. We show that in general, the problem is NP-complete, and we present polynomial-time approximation algorithms for removing snow under various assumptions about the operation of the snowblower. Most commercially-available snowblowers allow the user to control the direction in which the snow is thrown. We differentiate between the cases in which the snow can be thrown in any direction, in any direction except backwards, and only to the right. For all cases, we give constant-factor approximation algorithms; the constants increase as the throw direction becomes more restricted. Our results are also applicable to robotic vacuuming (or lawnmowing) with bounded capacity dust bin and to some versions of material-handling problems, in which the goal is to rearrange cartons on the floor of a warehouse.
[ { "version": "v1", "created": "Tue, 7 Mar 2006 20:35:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Arkin", "Esther M.", "" ], [ "Bender", "Michael A.", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Polishchuk", "Valentin", "" ] ]
cs/0603028
Jan Van den Bussche
Wim Janssen, Alexandr Korlyukov, Jan Van den Bussche
On the tree-transformation power of XSLT
null
Acta Informatica, Volume 43, Number 6 / January, 2007
10.1007/s00236-006-0026-8
null
cs.PL cs.DB
null
XSLT is a standard rule-based programming language for expressing transformations of XML data. The language is currently in transition from version 1.0 to 2.0. In order to understand the computational consequences of this transition, we restrict XSLT to its pure tree-transformation capabilities. Under this focus, we observe that XSLT~1.0 was not yet a computationally complete tree-transformation language: every 1.0 program can be implemented in exponential time. A crucial new feature of version~2.0, however, which allows nodesets over temporary trees, yields completeness. We provide a formal operational semantics for XSLT programs, and establish confluence for this semantics.
[ { "version": "v1", "created": "Wed, 8 Mar 2006 13:48:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Janssen", "Wim", "" ], [ "Korlyukov", "Alexandr", "" ], [ "Bussche", "Jan Van den", "" ] ]
cs/0603032
Somdeb Lahiri
Somdeb Lahiri
Market Equilibrium for Bundle Auctions and the Matching Core of Nonnegative TU Games
17 pages
null
null
null
cs.GT
null
We discuss bundle auctions within the framework of an integer allocation problem. We show that for multi-unit auctions, of which bundle auctions are a special case, market equilibrium and constrained market equilibrium are equivalent concepts. This equivalence, allows us to obtain a computable necessary and sufficient condition for the existence of constrained market equilibrium for bundle auctions. We use this result to obtain a necessary and sufficient condition for the existence of market equilibrium for multi-unit auctions. After obtaining the induced bundle auction of a nonnegative TU game, we show that the existence of market equilibrium implies the existence of a possibly different market equilibrium as well, which corresponds very naturally to an outcome in the matching core of the TU game. Consequently we show that the matching core of the nonnegative TU game is non-empty if and only if the induced market game has a market equilibrium.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 12:45:19 GMT" }, { "version": "v2", "created": "Fri, 10 Mar 2006 05:29:06 GMT" }, { "version": "v3", "created": "Sat, 8 Apr 2006 10:08:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Lahiri", "Somdeb", "" ] ]
cs/0603033
Vaghinak Petrosyan
Vaghinak Petrosyan
Inter-component communication methods in object-oriented frameworks
null
null
null
null
cs.SE
null
Modern frameworks for development of graphical interfaces are using the native controls of the operating system. Because of that they are using operating system events model for inter-component communication. We consider a method to increase inter-component communication speed by sending messages from one component to the other passing over the operating system. Besides the messages subscription helps to avoid receiving of unnecessary messages.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 08:44:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrosyan", "Vaghinak", "" ] ]
cs/0603035
Richard McClatchey
Chiara Del Frate, Jose Galvez, Tamas Hauer, David Manset, Richard McClatchey, Mohammed Odeh, Dmitry Rogulin, Tony Solomonides, Ruth Warren
Final Results from and Exploitation Plans for MammoGrid
11 pages, 3 figures, 2 tables. Accepted at the 4th International HealthGrid conference, Valencia Spain June 2006
null
null
null
cs.DC
null
The MammoGrid project has delivered the first deployed instance of a healthgrid for clinical mammography that spans national boundaries. During the last year, the final MammoGrid prototype has undergone a series of rigorous tests undertaken by radiologists in the UK and Italy and this paper draws conclusions from those tests for the benefit of the Healthgrid community. In addition, lessons learned during the lifetime of the project are detailed and recommendations drawn for future health applications using grids. Following the completion of the project, plans have been put in place for the commercialisation of the MammoGrid system and this is also reported in this article. Particular emphasis is placed on the issues surrounding the transition from collaborative research project to a marketable product. This paper concludes by highlighting some of the potential areas of future development and research.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 13:49:14 GMT" }, { "version": "v2", "created": "Sat, 11 Mar 2006 19:17:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Del Frate", "Chiara", "" ], [ "Galvez", "Jose", "" ], [ "Hauer", "Tamas", "" ], [ "Manset", "David", "" ], [ "McClatchey", "Richard", "" ], [ "Odeh", "Mohammed", "" ], [ "Rogulin", "Dmitry", "" ], [ "Solomonides", "Tony", "" ], [ "Warren", "Ruth", "" ] ]
cs/0603036
Richard McClatchey
Joerg Freund, Dorin Comaniciu, Yannis Ioannis, Peiya Liu, Richard McClatchey, Edwin Morley-Fletcher, Xavier Pennec, Giacomo Pongiglione, Xiang (Sean)ZHOU
Health-e-Child : An Integrated Biomedical Platform for Grid-Based Paediatric Applications
12 pages, 2 figures. Accepted at the 4th International HealthGrid conference, Valencia, Spain June 2006
null
null
null
cs.DC
null
There is a compelling demand for the integration and exploitation of heterogeneous biomedical information for improved clinical practice, medical research, and personalised healthcare across the EU. The Health-e-Child project aims at developing an integrated healthcare platform for European Paediatrics, providing seamless integration of traditional and emerging sources of biomedical information. The long-term goal of the project is to provide uninhibited access to universal biomedical knowledge repositories for personalised and preventive healthcare, large-scale information-based biomedical research and training, and informed policy making. The project focus will be on individualised disease prevention, screening, early diagnosis, therapy and follow-up of paediatric heart diseases, inflammatory diseases, and brain tumours. The project will build a Grid-enabled European network of leading clinical centres that will share and annotate biomedical data, validate systems clinically, and diffuse clinical excellence across Europe by setting up new technologies, clinical workflows, and standards. This paper outlines the design approach being adopted in Health-e-Child to enable the delivery of an integrated biomedical information platform.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 13:54:15 GMT" }, { "version": "v2", "created": "Sat, 11 Mar 2006 19:18:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Freund", "Joerg", "", "Sean" ], [ "Comaniciu", "Dorin", "", "Sean" ], [ "Ioannis", "Yannis", "", "Sean" ], [ "Liu", "Peiya", "", "Sean" ], [ "McClatchey", "Richard", "", "Sean" ], [ "Morley-Fletcher", "Edwin", "", "Sean" ], [ "Pennec", "Xavier", "", "Sean" ], [ "Pongiglione", "Giacomo", "", "Sean" ], [ "Xiang", "", "", "Sean" ], [ "ZHOU", "", "" ] ]
cs/0603037
Richard McClatchey
Haya El-Ghalayini, Mohammed Odeh, Richard McClatchey
Deriving Conceptual Data Models from Domain Ontologies for Bioinformatics
6 pages, 1 figure. The 2nd international conference on Information and Communication Technologies from Theory to Application (ICTTA06)
null
null
null
cs.SE
null
This paper studies the role that ontologies can play in establishing conceptual data models during the process of information systems development. A mapping algorithm has been proposed and embedded in a special purpose Transformation-Engine to generate a conceptual data model from a given domain ontology. In addition, this paper focuses on applying the proposed approach to a bioinformatics context as the nature of biological data is considered a barrier in representing biological conceptual data models. Both quantitative and qualitative methods have been adopted to critically evaluate this new approach. The results of this evaluation indicate that the quality of the generated conceptual data models can reflect the problem domain entities and the associations between them. The results are encouraging and support the potential role that this approach can play in providing a suitable starting point for conceptual data model development.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 13:59:18 GMT" } ]
2007-05-23T00:00:00
[ [ "El-Ghalayini", "Haya", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ] ]
cs/0603038
Patrik O. Hoyer
Patrik O. Hoyer, Shohei Shimizu, Antti J. Kerminen
Estimation of linear, non-gaussian causal models in the presence of confounding latent variables
8 pages, 4 figures, pdflatex
null
null
null
cs.AI
null
The estimation of linear causal models (also known as structural equation models) from data is a well-known problem which has received much attention in the past. Most previous work has, however, made an explicit or implicit assumption of gaussianity, limiting the identifiability of the models. We have recently shown (Shimizu et al, 2005; Hoyer et al, 2006) that for non-gaussian distributions the full causal model can be estimated in the no hidden variables case. In this contribution, we discuss the estimation of the model when confounding latent variables are present. Although in this case uniqueness is no longer guaranteed, there is at most a finite set of models which can fit the data. We develop an algorithm for estimating this set, and describe numerical simulations which confirm the theoretical arguments and demonstrate the practical viability of the approach. Full Matlab code is provided for all simulations.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 14:46:18 GMT" }, { "version": "v2", "created": "Mon, 22 May 2006 17:02:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoyer", "Patrik O.", "" ], [ "Shimizu", "Shohei", "" ], [ "Kerminen", "Antti J.", "" ] ]
cs/0603041
Prasanta K. Panigrahi
S. Hemachander, Amit Verma, Siddharth Arora, Prasanta K. Panigrahi
Locally Adaptive Block Thresholding Method with Continuity Constraint
12 Pages, 4 figures, 1 Table
null
null
null
cs.CV
null
We present an algorithm that enables one to perform locally adaptive block thresholding, while maintaining image continuity. Images are divided into sub-images based some standard image attributes and thresholding technique is employed over the sub-images. The present algorithm makes use of the thresholds of neighboring sub-images to calculate a range of values. The image continuity is taken care by choosing the threshold of the sub-image under consideration to lie within the above range. After examining the average range values for various sub-image sizes of a variety of images, it was found that the range of acceptable threshold values is substantially high, justifying our assumption of exploiting the freedom of range for bringing out local details.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 17:14:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemachander", "S.", "" ], [ "Verma", "Amit", "" ], [ "Arora", "Siddharth", "" ], [ "Panigrahi", "Prasanta K.", "" ] ]
cs/0603042
Will Scott II
Willie L. Scott II
The NoN Approach to Autonomic Face Recognition
15 pages, 6 figures, 6 tables
null
null
null
cs.NE
null
A method of autonomic face recognition based on the biologically plausible network of networks (NoN) model of information processing is presented. The NoN model is based on locally parallel and globally coordinated transformations in which the neurons or computational units form distributed networks, which themselves link to form larger networks. This models the structures in the cerebral cortex described by Mountcastle and the architecture based on that proposed for information processing by Sutton. In the proposed implementation, face images are processed by a nested family of locally operating networks along with a hierarchically superior network that classifies the information from each of the local networks. The results of the experiments yielded a maximum of 98.5% recognition accuracy and an average of 97.4% recognition accuracy on a benchmark database.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 17:35:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Scott", "Willie L.", "II" ] ]
cs/0603043
Mihai Patrascu
Mihai Patrascu and Mikkel Thorup
Time-Space Trade-Offs for Predecessor Search
29 pages. Full version (preliminary) of a paper appearing in STOC'06
null
null
null
cs.CC cs.DS
null
We develop a new technique for proving cell-probe lower bounds for static data structures. Previous lower bounds used a reduction to communication games, which was known not to be tight by counting arguments. We give the first lower bound for an explicit problem which breaks this communication complexity barrier. In addition, our bounds give the first separation between polynomial and near linear space. Such a separation is inherently impossible by communication complexity. Using our lower bound technique and new upper bound constructions, we obtain tight bounds for searching predecessors among a static set of integers. Given a set Y of n integers of l bits each, the goal is to efficiently find predecessor(x) = max{y in Y | y <= x}, by representing Y on a RAM using space S. In external memory, it follows that the optimal strategy is to use either standard B-trees, or a RAM algorithm ignoring the larger block size. In the important case of l = c*lg n, for c>1 (i.e. polynomial universes), and near linear space (such as S = n*poly(lg n)), the optimal search time is Theta(lg l). Thus, our lower bound implies the surprising conclusion that van Emde Boas' classic data structure from [FOCS'75] is optimal in this case. Note that for space n^{1+eps}, a running time of O(lg l / lglg l) was given by Beame and Fich [STOC'99].
[ { "version": "v1", "created": "Fri, 10 Mar 2006 14:50:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Patrascu", "Mihai", "" ], [ "Thorup", "Mikkel", "" ] ]
cs/0603044
Vadim Tropashko
Marshall Spight, Vadim Tropashko
First Steps in Relational Lattice
11 pages, 3 figures
null
null
null
cs.DB
null
Relational lattice reduces the set of six classic relational algebra operators to two binary lattice operations: natural join and inner union. We give an introduction to this theory with emphasis on formal algebraic laws. New results include Spight distributivity criteria and its applications to query transformations.
[ { "version": "v1", "created": "Fri, 10 Mar 2006 18:11:49 GMT" }, { "version": "v2", "created": "Wed, 15 Mar 2006 04:54:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Spight", "Marshall", "" ], [ "Tropashko", "Vadim", "" ] ]
cs/0603046
William Perkins
William Perkins
Trusted Certificates in Quantum Cryptography
4 pages, 2 figures
null
null
null
cs.CR
null
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
[ { "version": "v1", "created": "Fri, 10 Mar 2006 23:05:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Perkins", "William", "" ] ]
cs/0603047
Simone Severini
Stefano Mancini and Simone Severini
The Quantum Separability Problem for Gaussian States
8 pages
Electronic Notes in Theoretical Computer Science, Volume 169 , March 2007, pp. 121-131
10.1016/j.entcs.2006.07.034
null
cs.CC quant-ph
null
Determining whether a quantum state is separable or entangled is a problem of fundamental importance in quantum information science. This is a brief review in which we consider the problem for states in infinite dimensional Hilbert spaces. We show how the problem becomes tractable for a class of Gaussian states.
[ { "version": "v1", "created": "Sun, 12 Mar 2006 14:33:41 GMT" }, { "version": "v2", "created": "Fri, 31 Mar 2006 12:38:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Mancini", "Stefano", "" ], [ "Severini", "Simone", "" ] ]
cs/0603048
Vincent Limouzy
Binh Minh Bui Xuan (LIRMM), Michel Habib (LIAFA), Vincent Limouzy (LIAFA), Fabien De Montgolfier (LIAFA)
Homogeneity vs. Adjacency: generalising some graph decomposition algorithms
soumis \`{a} WG 2006
Graph-Theoretic Concepts in Computer Science Springer (Ed.) (22/06/2006) 278-288
10.1007/11917496\_25
null
cs.DS
null
In this paper, a new general decomposition theory inspired from modular graph decomposition is presented. Our main result shows that, within this general theory, most of the nice algorithmic tools developed for modular decomposition are still efficient. This theory not only unifies the usual modular decomposition generalisations such as modular decomposition of directed graphs or decomposition of 2-structures, but also star cutsets and bimodular decomposition. Our general framework provides a decomposition algorithm which improves the best known algorithms for bimodular decomposition.
[ { "version": "v1", "created": "Mon, 13 Mar 2006 09:48:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Xuan", "Binh Minh Bui", "", "LIRMM" ], [ "Habib", "Michel", "", "LIAFA" ], [ "Limouzy", "Vincent", "", "LIAFA" ], [ "De Montgolfier", "Fabien", "", "LIAFA" ] ]
cs/0603051
Andreas U. Schmidt
Nicolai Kuntze and Andreas U. Schmidt
Transitive trust in mobile scenarios
Pre-refereed version. To appear in Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), Freiburg im Breisgau, Germany 6th-9th June 2006. Lecture Notes in Computer Science, Springer-Verlag
null
null
null
cs.CR
null
Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enables the desired crossdomain authentication functionality. The focus of target application scenarios lies in the realm of mobile networks and devices.
[ { "version": "v1", "created": "Mon, 13 Mar 2006 11:14:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0603052
Evgueni Petrov
Evgueni Petrov
Evaluation of interval extension of the power function by graph decomposition
submitted to the INTERVAL 2006 workshop to be held in St. Petersburg June 2006, Russia; extended abstract
null
null
null
cs.MS
null
The subject of our talk is the correct evaluation of interval extension of the function specified by the expression x^y without any constraints on the values of x and y. The core of our approach is a decomposition of the graph of x^y into a small number of parts which can be transformed into subsets of the graph of x^y for non-negative bases x. Because of this fact, evaluation of interval extension of x^y, without any constraints on x and y, is not much harder than evaluation of interval extension of x^y for non-negative bases x.
[ { "version": "v1", "created": "Mon, 13 Mar 2006 12:05:08 GMT" }, { "version": "v2", "created": "Tue, 14 Mar 2006 12:48:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrov", "Evgueni", "" ] ]
cs/0603053
Irene Guessarian
A. Ai T -Bouziad (LIAFA), Irene Guessarian (LIAFA), L. Vieille (NCM)
Automatic generation of simplified weakest preconditions for integrity constraint verification
null
null
null
null
cs.DS cs.DB
null
Given a constraint $c$ assumed to hold on a database $B$ and an update $u$ to be performed on $B$, we address the following question: will $c$ still hold after $u$ is performed? When $B$ is a relational database, we define a confluent terminating rewriting system which, starting from $c$ and $u$, automatically derives a simplified weakest precondition $wp(c,u)$ such that, whenever $B$ satisfies $wp(c,u)$, then the updated database $u(B)$ will satisfy $c$, and moreover $wp(c,u)$ is simplified in the sense that its computation depends only upon the instances of $c$ that may be modified by the update. We then extend the definition of a simplified $wp(c,u)$ to the case of deductive databases; we prove it using fixpoint induction.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 14:30:10 GMT" } ]
2007-05-23T00:00:00
[ [ "-Bouziad", "A. Ai T", "", "LIAFA" ], [ "Guessarian", "Irene", "", "LIAFA" ], [ "Vieille", "L.", "", "NCM" ] ]
cs/0603054
Oleg Verbitsky
Martin Grohe and Oleg Verbitsky
Testing Graph Isomorphism in Parallel by Playing a Game
21 pages
null
null
null
cs.CC cs.LO
null
Our starting point is the observation that if graphs in a class C have low descriptive complexity in first order logic, then the isomorphism problem for C is solvable by a fast parallel algorithm (essentially, by a simple combinatorial algorithm known as the multidimensional Weisfeiler-Lehman algorithm). Using this approach, we prove that isomorphism of graphs of bounded treewidth is testable in TC1, answering an open question posed by Chandrasekharan. Furthermore, we obtain an AC1 algorithm for testing isomorphism of rotation systems (combinatorial specifications of graph embeddings). The AC1 upper bound was known before, but the fact that this bound can be achieved by the simple Weisfeiler-Lehman algorithm is new. Combined with other known results, it also yields a new AC1 isomorphism algorithm for planar graphs.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 15:46:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Grohe", "Martin", "" ], [ "Verbitsky", "Oleg", "" ] ]
cs/0603055
Ashfaq Shaik
Ashfaq N Shaik
Improved Watermarking Scheme Using Decimal Sequences
7 pages, 10 figures
null
null
null
cs.CR
null
This paper presents watermarking algorithms using d-sequences so that the peak signal to noise ratio (PSNR) is maximized and the distortion introduced in the image due to the embedding is minimized. By exploiting the cross correlation property of decimal sequences, the concept of embedding more than one watermark in the same cover image is investigated.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 18:55:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Shaik", "Ashfaq N", "" ] ]
cs/0603056
Philip Davis
Philip M. Davis and Michael J. Fromerth
Does the arXiv lead to higher citations and reduced publisher downloads for mathematics articles?
Last updated May 02, 2006
Scientometrics Vol. 71, No. 2. (May, 2007)
10.1007/s11192-007-1661-8
null
cs.DL cs.IR math.HO
null
An analysis of 2,765 articles published in four math journals from 1997 to 2005 indicate that articles deposited in the arXiv received 35% more citations on average than non-deposited articles (an advantage of about 1.1 citations per article), and that this difference was most pronounced for highly-cited articles. Open Access, Early View, and Quality Differential were examined as three non-exclusive postulates for explaining the citation advantage. There was little support for a universal Open Access explanation, and no empirical support for Early View. There was some inferential support for a Quality Differential brought about by more highly-citable articles being deposited in the arXiv. In spite of their citation advantage, arXiv-deposited articles received 23% fewer downloads from the publisher's website (about 10 fewer downloads per article) in all but the most recent two years after publication. The data suggest that arXiv and the publisher's website may be fulfilling distinct functional needs of the reader.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 19:36:24 GMT" }, { "version": "v2", "created": "Wed, 15 Mar 2006 21:08:20 GMT" }, { "version": "v3", "created": "Mon, 20 Mar 2006 17:34:40 GMT" }, { "version": "v4", "created": "Tue, 2 May 2006 19:28:01 GMT" }, { "version": "v5", "created": "Tue, 6 Feb 2007 14:52:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Davis", "Philip M.", "" ], [ "Fromerth", "Michael J.", "" ] ]
cs/0603057
Nodari Sitchinava
David Eppstein, Michael T. Goodrich, Nodari Sitchinava
Guard Placement For Wireless Localization
null
null
null
null
cs.CG
null
Motivated by secure wireless networking, we consider the problem of placing fixed localizers that enable mobile communication devices to prove they belong to a secure region that is defined by the interior of a polygon. Each localizer views an infinite wedge of the plane, and a device can prove membership in the secure region if it is inside the wedges for a set of localizers whose common intersection contains no points outside the polygon. This model leads to a broad class of new art gallery type problems, for which we provide upper and lower bounds.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 20:19:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Sitchinava", "Nodari", "" ] ]
cs/0603060
Tobias Riege
Tobias Riege, J\"org Rothe, Holger Spakowski and Masaki Yamamoto
An Improved Exact Algorithm for the Domatic Number Problem
9 pages, a two-page abstract of this paper is to appear in the Proceedings of the Second IEEE International Conference on Information & Communication Technologies: From Theory to Applications, April 2006
null
null
null
cs.CC
null
The 3-domatic number problem asks whether a given graph can be partitioned intothree dominating sets. We prove that this problem can be solved by a deterministic algorithm in time 2.695^n (up to polynomial factors). This result improves the previous bound of 2.8805^n, which is due to Fomin, Grandoni, Pyatkin, and Stepanov. To prove our result, we combine an algorithm by Fomin et al. with Yamamoto's algorithm for the satisfiability problem. In addition, we show that the 3-domatic number problem can be solved for graphs G with bounded maximum degree Delta(G) by a randomized algorithm, whose running time is better than the previous bound due to Riege and Rothe whenever Delta(G) >= 5. Our new randomized algorithm employs Schoening's approach to constraint satisfaction problems.
[ { "version": "v1", "created": "Thu, 16 Mar 2006 16:05:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Riege", "Tobias", "" ], [ "Rothe", "Jörg", "" ], [ "Spakowski", "Holger", "" ], [ "Yamamoto", "Masaki", "" ] ]
cs/0603062
Benoit Donnet
Benoit Donnet, Bradley Huffaker, Timur Friedman, kc claffy
Implementation and Deployment of a Distributed Network Topology Discovery Algorithm
null
null
null
null
cs.NI
null
In the past few years, the network measurement community has been interested in the problem of internet topology discovery using a large number (hundreds or thousands) of measurement monitors. The standard way to obtain information about the internet topology is to use the traceroute tool from a small number of monitors. Recent papers have made the case that increasing the number of monitors will give a more accurate view of the topology. However, scaling up the number of monitors is not a trivial process. Duplication of effort close to the monitors wastes time by reexploring well-known parts of the network, and close to destinations might appear to be a distributed denial-of-service (DDoS) attack as the probes converge from a set of sources towards a given destination. In prior work, authors of this report proposed Doubletree, an algorithm for cooperative topology discovery, that reduces the load on the network, i.e., router IP interfaces and end-hosts, while discovering almost as many nodes and links as standard approaches based on traceroute. This report presents our open-source and freely downloadable implementation of Doubletree in a tool we call traceroute@home. We describe the deployment and validation of traceroute@home on the PlanetLab testbed and we report on the lessons learned from this experience. We discuss how traceroute@home can be developed further and discuss ideas for future improvements.
[ { "version": "v1", "created": "Thu, 16 Mar 2006 16:13:11 GMT" }, { "version": "v2", "created": "Fri, 17 Mar 2006 10:30:41 GMT" }, { "version": "v3", "created": "Tue, 21 Mar 2006 07:39:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Donnet", "Benoit", "" ], [ "Huffaker", "Bradley", "" ], [ "Friedman", "Timur", "" ], [ "claffy", "kc", "" ] ]
cs/0603067
Priya Sivakumar
Priya Sivakumar
Implementing the Three-Stage Quantum Cryptography Protocol
4 pages, 1 figure
null
null
null
cs.CR
null
We present simple implementations of Kak's three-stage quantum cryptography protocol. The case where the transformation is applied to more than one qubit at the same time is also considered.
[ { "version": "v1", "created": "Thu, 16 Mar 2006 22:20:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Sivakumar", "Priya", "" ] ]
cs/0603069
Xueliang Li
Fengwei Li, Xueliang Li
The neighbor-scattering number can be computed in polynomial time for interval graphs
13 pages
null
null
null
cs.DM math.CO
null
Neighbor-scattering number is a useful measure for graph vulnerability. For some special kinds of graphs, explicit formulas are given for this number. However, for general graphs it is shown that to compute this number is NP-complete. In this paper, we prove that for interval graphs this number can be computed in polynomial time.
[ { "version": "v1", "created": "Fri, 17 Mar 2006 07:00:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Fengwei", "" ], [ "Li", "Xueliang", "" ] ]
cs/0603070
Stefan Stefanov Z
S.Z.Stefanov
Predicting the Path of an Open System
18 pages
null
null
null
cs.RO
null
The expected path of an open system,which is a big Poincare system,has been found in this paper.This path has been obtained from the actual and from the expected droop of the open system.The actual droop has been reconstructed from the variations in the power and in the frequency of the open system.The expected droop has been found as a function of rotation from the expected potential energy of the open system under synchronization of that system.
[ { "version": "v1", "created": "Fri, 17 Mar 2006 09:27:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Stefanov", "S. Z.", "" ] ]
cs/0603071
Martin Ziegler
Klaus Meer, Martin Ziegler
An Explicit Solution to Post's Problem over the Reals
submitted to Journal of Complexity
null
null
null
cs.LO cs.SC
null
In the BCSS model of real number computations we prove a concrete and explicit semi-decidable language to be undecidable yet not reducible from (and thus strictly easier than) the real Halting Language. This solution to Post's Problem over the reals significantly differs from its classical, discrete variant where advanced diagonalization techniques are only known to yield the existence of such intermediate Turing degrees. Strengthening the above result, we construct (that is, obtain again explicitly) as well an uncountable number of incomparable semi-decidable Turing degrees below the real Halting problem in the BCSS model. Finally we show the same to hold for the linear BCSS model, that is over (R,+,-,<) rather than (R,+,-,*,/,<).
[ { "version": "v1", "created": "Fri, 17 Mar 2006 16:12:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Meer", "Klaus", "" ], [ "Ziegler", "Martin", "" ] ]
cs/0603073
Bryan Ford
Bryan Ford
VXA: A Virtual Architecture for Durable Compressed Archives
14 pages, 7 figures, 2 tables
4th USENIX Conference on File and Storage Technologies, December 2005 (FAST '05), San Francisco, CA
null
null
cs.DL cs.IR
null
Data compression algorithms change frequently, and obsolete decoders do not always run on new hardware and operating systems, threatening the long-term usability of content archived using those algorithms. Re-encoding content into new formats is cumbersome, and highly undesirable when lossy compression is involved. Processor architectures, in contrast, have remained comparatively stable over recent decades. VXA, an archival storage system designed around this observation, archives executable decoders along with the encoded content it stores. VXA decoders run in a specialized virtual machine that implements an OS-independent execution environment based on the standard x86 architecture. The VXA virtual machine strictly limits access to host system services, making decoders safe to run even if an archive contains malicious code. VXA's adoption of a "native" processor architecture instead of type-safe language technology allows reuse of existing "hand-optimized" decoders in C and assembly language, and permits decoders access to performance-enhancing architecture features such as vector processing instructions. The performance cost of VXA's virtualization is typically less than 15% compared with the same decoders running natively. The storage cost of archived decoders, typically 30-130KB each, can be amortized across many archived files sharing the same compression method.
[ { "version": "v1", "created": "Sat, 18 Mar 2006 16:31:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ] ]
cs/0603074
Bryan Ford
Bryan Ford, Pyda Srisuresh, Dan Kegel
Peer-to-Peer Communication Across Network Address Translators
8 figures, 1 table
USENIX Annual Technical Conference, April 2005 (USENIX '05), Anaheim, CA
null
null
cs.NI cs.CR
null
Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP address. Several NAT traversal techniques are known, but their documentation is slim, and data about their robustness or relative merits is slimmer. This paper documents and analyzes one of the simplest but most robust and practical NAT traversal techniques, commonly known as "hole punching." Hole punching is moderately well-understood for UDP communication, but we show how it can be reliably used to set up peer-to-peer TCP streams as well. After gathering data on the reliability of this technique on a wide variety of deployed NATs, we find that about 82% of the NATs tested support hole punching for UDP, and about 64% support hole punching for TCP streams. As NAT vendors become increasingly conscious of the needs of important P2P applications such as Voice over IP and online gaming protocols, support for hole punching is likely to increase in the future.
[ { "version": "v1", "created": "Sat, 18 Mar 2006 16:51:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ], [ "Srisuresh", "Pyda", "" ], [ "Kegel", "Dan", "" ] ]
cs/0603075
Bryan Ford
Bryan Ford
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
7 pages, 3 figures
Second Workshop on Hot Topics in Networks (HotNets-II), November 2003, Cambridge, MA
null
null
cs.NI cs.OS
null
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarchical, administratively assigned addresses. Existing ad-hoc routing protocols address the management problem but do not scale to Internet-wide networks. The promise of ubiquitous network computing cannot be fulfilled until we develop an Unmanaged Internet Protocol (UIP), a scalable routing protocol that manages itself automatically. UIP must route within and between constantly changing edge networks potentially containing millions or billions of nodes, and must still function within edge networks disconnected from the main Internet, all without imposing the administrative burden of hierarchical address assignment. Such a protocol appears challenging but feasible. We propose an architecture based on self-certifying, cryptographic node identities and a routing algorithm adapted from distributed hash tables.
[ { "version": "v1", "created": "Sat, 18 Mar 2006 17:11:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ] ]