id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0605021
Harald Zankl
Harald Zankl
SAT Techniques for Lexicographic Path Orders
29 pages, Seminar Report
null
null
null
cs.SC
null
This seminar report is concerned with expressing LPO-termination of term rewrite systems as a satisfiability problem in propositional logic. After relevant algorithms are explained, experimental results are reported.
[ { "version": "v1", "created": "Fri, 5 May 2006 19:11:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Zankl", "Harald", "" ] ]
cs/0605022
Martin Kurth
Martin Kurth, Jim LeBlanc
Toward a Collection-based Metadata Maintenance Model
10 pages, 4 figures; submitted to DC 2006
null
null
null
cs.DL
null
In this paper, the authors identify key entities and relationships in the operational management of metadata catalogs that describe digital collections, and they draft a data model to support the administration of metadata maintenance for collections. Further, they consider this proposed model in light of other data schemes to which it relates and discuss the implications of the model for library metadata maintenance operations.
[ { "version": "v1", "created": "Fri, 5 May 2006 18:16:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurth", "Martin", "" ], [ "LeBlanc", "Jim", "" ] ]
cs/0605024
Marcus Hutter
Shane Legg and Marcus Hutter
A Formal Measure of Machine Intelligence
8 two-column pages
Proc. 15th Annual Machine Learning Conference of {B}elgium and The Netherlands (Benelearn 2006) pages 73-80
null
IDSIA-10-06
cs.AI cs.LG
null
A fundamental problem in artificial intelligence is that nobody really knows what intelligence is. The problem is especially acute when we need to consider artificial systems which are significantly different to humans. In this paper we approach this problem in the following way: We take a number of well known informal definitions of human intelligence that have been given by experts, and extract their essential features. These are then mathematically formalised to produce a general measure of intelligence for arbitrary machines. We believe that this measure formally captures the concept of machine intelligence in the broadest reasonable sense.
[ { "version": "v1", "created": "Sat, 6 May 2006 16:56:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0605025
Vytautas Perlibakas
Vytautas Perlibakas
Face Recognition using Principal Component Analysis and Log-Gabor Filters
Unpublished manuscript. March 2005. 23 pages, 7 figures, 5 tables
null
null
null
cs.CV
null
In this article we propose a novel face recognition method based on Principal Component Analysis (PCA) and Log-Gabor filters. The main advantages of the proposed method are its simple implementation, training, and very high recognition accuracy. For recognition experiments we used 5151 face images of 1311 persons from different sets of the FERET and AR databases that allow to analyze how recognition accuracy is affected by the change of facial expressions, illumination, and aging. Recognition experiments with the FERET database (containing photographs of 1196 persons) showed that our method can achieve maximal 97-98% first one recognition rate and 0.3-0.4% Equal Error Rate. The experiments also showed that the accuracy of our method is less affected by eye location errors and used image normalization method than of traditional PCA -based recognition method.
[ { "version": "v1", "created": "Sun, 7 May 2006 13:30:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Perlibakas", "Vytautas", "" ] ]
cs/0605026
Yuri Pritykin
Yuri Pritykin
Strongly Almost Periodic Sequences under Finite Automata Mappings
7 pages
null
null
null
cs.DM
null
The notion of almost periodicity nontrivially generalizes the notion of periodicity. Strongly almost periodic sequences (=uniformly recurrent infinite words) first appeared in the field of symbolic dynamics, but then turned out to be interesting in connection with computer science. The paper studies the class of eventually strongly almost periodic sequences (i. e., becoming strongly almost periodic after deleting some prefix). We prove that the property of eventual strong almost periodicity is preserved under the mappings done by finite automata and finite transducers. The class of almost periodic sequences includes the class of eventually strongly almost periodic sequences. We prove this inclusion to be strict.
[ { "version": "v1", "created": "Sun, 7 May 2006 14:46:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritykin", "Yuri", "" ] ]
cs/0605027
Vytautas Perlibakas
Vytautas Perlibakas
Recognition of expression variant faces using masked log-Gabor features and Principal Component Analysis
Unpublished manuscript. June 2005. 20 pages, 8 figures, 5 tables
null
null
null
cs.CV
null
In this article we propose a method for the recognition of faces with different facial expressions. For recognition we extract feature vectors by using log-Gabor filters of multiple orientations and scales. Using sliding window algorithm and variances -based masking these features are extracted at image regions that are less affected by the changes of facial expressions. Extracted features are passed to the Principal Component Analysis (PCA) -based recognition method. The results of face recognition experiments using expression variant faces showed that the proposed method could achieve higher recognition accuracy than many other methods. For development and testing we used facial images from the AR and FERET databases. Using facial photographs of more than one thousand persons from the FERET database the proposed method achieved 96.6-98.9% first one recognition rate and 0.2-0.6% Equal Error Rate (EER).
[ { "version": "v1", "created": "Sun, 7 May 2006 15:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Perlibakas", "Vytautas", "" ] ]
cs/0605030
Randy Cogill
Randy Cogill and Sanjay Lall
A Delay Analysis of Maximal Matching Switching with Speedup
11 pages, 2 figures. Submitted to the 2006 IEEE Conference on Decision and Control
null
null
null
cs.NI cs.PF
null
In this paper we analyze the average queue backlog in a combined input-output queued switch using a maximal size matching scheduling algorithm. We compare this average backlog to the average backlog achieved by an optimal switch. We model the cell arrival process as independent and identically distributed between time slots and uniformly distributed among input and output ports. For switches with many input and output ports, the backlog associated with maximal size matching with speedup 3 is no more than 10/3 times the backlog associated with an optimal switch. Moreover, this performance ratio rapidly approaches 2 as speedup increases.
[ { "version": "v1", "created": "Mon, 8 May 2006 08:04:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Cogill", "Randy", "" ], [ "Lall", "Sanjay", "" ] ]
cs/0605031
Mihaela Dinsoreanu PhD
Mihaela Dinsoreanu, Ioan Salomie, Kalman Pusztai
On the Design of Agent-Based Systems using UML and Extensions
null
null
null
null
cs.AI cs.MA cs.SE
null
The Unified Software Development Process (USDP) and UML have been now generally accepted as the standard methodology and modeling language for developing Object-Oriented Systems. Although Agent-based Systems introduces new issues, we consider that USDP and UML can be used in an extended manner for modeling Agent-based Systems. The paper presents a methodology for designing agent-based systems and the specific models expressed in an UML-based notation corresponding to each phase of the software development process. UML was extended using the provided mechanism: stereotypes. Therefore, this approach can be managed with any CASE tool supporting UML. A Case Study, the development of a specific agent-based Student Evaluation System (SAS), is presented.
[ { "version": "v1", "created": "Mon, 8 May 2006 12:21:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Dinsoreanu", "Mihaela", "" ], [ "Salomie", "Ioan", "" ], [ "Pusztai", "Kalman", "" ] ]
cs/0605032
Mihaela Dinsoreanu PhD
Tudor Marian, Bogdan Dumitriu, Mihaela Dinsoreanu, Ioan Salomie
A framework of reusable structures for mobile agent development
null
null
null
null
cs.MA cs.AI cs.SE
null
Mobile agents research is clearly aiming towards imposing agent based development as the next generation of tools for writing software. This paper comes with its own contribution to this global goal by introducing a novel unifying framework meant to bring simplicity and interoperability to and among agent platforms as we know them today. In addition to this, we also introduce a set of agent behaviors which, although tailored for and from the area of virtual learning environments, are none the less generic enough to be used for rapid, simple, useful and reliable agent deployment. The paper also presents an illustrative case study brought forward to prove the feasibility of our design.
[ { "version": "v1", "created": "Mon, 8 May 2006 12:27:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Marian", "Tudor", "" ], [ "Dumitriu", "Bogdan", "" ], [ "Dinsoreanu", "Mihaela", "" ], [ "Salomie", "Ioan", "" ] ]
cs/0605033
Mihaela Dinsoreanu PhD
Mihaela Dinsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom Coffey
Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments
null
null
null
null
cs.MA cs.AI cs.SE
null
E-learning is nowadays one of the most interesting of the "e- " domains available through the Internet. The main problem to create a Web-based, virtual environment is to model the traditional domain and to implement the model using the most suitable technologies. We analyzed the distance learning domain and investigated the possibility to implement some e-learning services using mobile agent technologies. This paper presents a model of the Student Assessment Service (SAS) and an agent-based framework developed to be used for implementing specific applications. A specific Student Assessment application that relies on the framework was developed.
[ { "version": "v1", "created": "Mon, 8 May 2006 12:37:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Dinsoreanu", "Mihaela", "" ], [ "Godja", "Cristian", "" ], [ "Anghel", "Claudiu", "" ], [ "Salomie", "Ioan", "" ], [ "Coffey", "Tom", "" ] ]
cs/0605034
Srinivas Shakkottai
Srinivas Shakkottai, R. Srikant
Peer to Peer Networks for Defense Against Internet Worms
11 Pages
null
null
null
cs.CR cs.AR cs.NI
null
Internet worms, which spread in computer networks without human mediation, pose a severe threat to computer systems today. The rate of propagation of worms has been measured to be extremely high and they can infect a large fraction of their potential hosts in a short time. We study two different methods of patch dissemination to combat the spread of worms. We first show that using a fixed number of patch servers performs woefully inadequately against Internet worms. We then show that by exploiting the exponential data dissemination capability of P2P systems, the spread of worms can be halted very effectively. We compare the two methods by using fluid models to compute two quantities of interest: the time taken to effectively combat the progress of the worm and the maximum number of infected hosts. We validate our models using Internet measurements and simulations.
[ { "version": "v1", "created": "Mon, 8 May 2006 17:02:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Shakkottai", "Srinivas", "" ], [ "Srikant", "R.", "" ] ]
cs/0605035
Filip Radlinski
Filip Radlinski and Thorsten Joachims
Query Chains: Learning to Rank from Implicit Feedback
10 pages
Proceedings of the ACM Conference on Knowledge Discovery and Data Mining (KDD), ACM, 2005
null
null
cs.LG cs.IR
null
This paper presents a novel approach for using clickthrough data to learn ranked retrieval functions for web search results. We observe that users searching the web often perform a sequence, or chain, of queries with a similar information need. Using query chains, we generate new types of preference judgments from search engine logs, thus taking advantage of user intelligence in reformulating queries. To validate our method we perform a controlled user study comparing generated preference judgments to explicit relevance judgments. We also implemented a real-world search engine to test our approach, using a modified ranking SVM to learn an improved ranking function from preference data. Our results demonstrate significant improvements in the ranking given by the search engine. The learned rankings outperform both a static ranking function, as well as one trained without considering query chains.
[ { "version": "v1", "created": "Mon, 8 May 2006 22:05:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Radlinski", "Filip", "" ], [ "Joachims", "Thorsten", "" ] ]
cs/0605036
Filip Radlinski
Filip Radlinski and Thorsten Joachims
Evaluating the Robustness of Learning from Implicit Feedback
8 pages, Presented at ICML Workshop on Learning In Web Search, 2005
null
null
null
cs.LG cs.IR
null
This paper evaluates the robustness of learning from implicit feedback in web search. In particular, we create a model of user behavior by drawing upon user studies in laboratory and real-world settings. The model is used to understand the effect of user behavior on the performance of a learning algorithm for ranked retrieval. We explore a wide range of possible user behaviors and find that learning from implicit feedback can be surprisingly robust. This complements previous results that demonstrated our algorithm's effectiveness in a real-world search engine application.
[ { "version": "v1", "created": "Mon, 8 May 2006 23:38:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Radlinski", "Filip", "" ], [ "Joachims", "Thorsten", "" ] ]
cs/0605037
Filip Radlinski
Filip Radlinski and Thorsten Joachims
Minimally Invasive Randomization for Collecting Unbiased Preferences from Clickthrough Logs
7 pages. Proceedings of the 21st National Conference on Artificial Intelligence (AAAI), 2006
null
null
null
cs.IR cs.LG
null
Clickthrough data is a particularly inexpensive and plentiful resource to obtain implicit relevance feedback for improving and personalizing search engines. However, it is well known that the probability of a user clicking on a result is strongly biased toward documents presented higher in the result set irrespective of relevance. We introduce a simple method to modify the presentation of search results that provably gives relevance judgments that are unaffected by presentation bias under reasonable assumptions. We validate this property of the training data in interactive real world experiments. Finally, we show that using these unbiased relevance judgments learning methods can be guaranteed to converge to an ideal ranking given sufficient data.
[ { "version": "v1", "created": "Tue, 9 May 2006 01:53:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Radlinski", "Filip", "" ], [ "Joachims", "Thorsten", "" ] ]
cs/0605038
Enrico Pontelli
Tran Cao Son, Enrico Pontelli, Islam Elkabani
An Unfolding-Based Semantics for Logic Programming with Aggregates
null
null
null
null
cs.SE cs.AI
null
The paper presents two equivalent definitions of answer sets for logic programs with aggregates. These definitions build on the notion of unfolding of aggregates, and they are aimed at creating methodologies to translate logic programs with aggregates to normal logic programs or positive programs, whose answer set semantics can be used to defined the semantics of the original programs. The first definition provides an alternative view of the semantics for logic programming with aggregates described by Pelov et al. The second definition is similar to the traditional answer set definition for normal logic programs, in that, given a logic program with aggregates and an interpretation, the unfolding process produces a positive program. The paper shows how this definition can be extended to consider aggregates in the head of the rules. The proposed views of logic programming with aggregates are simple and coincide with the ultimate stable model semantics, and with other semantic characterizations for large classes of program (e.g., programs with monotone aggregates and programs that are aggregate-stratified). Moreover, it can be directly employed to support an implementation using available answer set solvers. The paper describes a system, called ASP^A, that is capable of computing answer sets of programs with arbitrary (e.g., recursively defined) aggregates.
[ { "version": "v1", "created": "Tue, 9 May 2006 04:08:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Son", "Tran Cao", "" ], [ "Pontelli", "Enrico", "" ], [ "Elkabani", "Islam", "" ] ]
cs/0605039
Amitabha Roy
Amitabha Roy, Stephan Zeisset, Charles J. Fleckenstein, John C. Huang
Fast and Generalized Polynomial Time Memory Consistency Verification
To appear in the proceedings of Computer Aided Verification (CAV) 2006
null
null
null
cs.AR cs.LO cs.PF
null
The problem of verifying multi-threaded execution against the memory consistency model of a processor is known to be an NP hard problem. However polynomial time algorithms exist that detect almost all failures in such execution. These are often used in practice for microprocessor verification. We present a low complexity and fully parallelized algorithm to check program execution against the processor consistency model. In addition our algorithm is general enough to support a number of consistency models without any degradation in performance. An implementation of this algorithm is currently used in practice to verify processors in the post silicon stage for multiple architectures.
[ { "version": "v1", "created": "Tue, 9 May 2006 05:45:52 GMT" }, { "version": "v2", "created": "Wed, 17 May 2006 12:07:57 GMT" }, { "version": "v3", "created": "Tue, 23 May 2006 10:03:21 GMT" }, { "version": "v4", "created": "Mon, 29 May 2006 06:33:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Roy", "Amitabha", "" ], [ "Zeisset", "Stephan", "" ], [ "Fleckenstein", "Charles J.", "" ], [ "Huang", "John C.", "" ] ]
cs/0605040
Marcus Hutter
Marcus Hutter
General Discounting versus Average Reward
17 pages, 1 table
Proc. 17th International Conf. on Algorithmic Learning Theory (ALT 2006) pages 244-258
null
IDSIA-11-06
cs.LG
null
Consider an agent interacting with an environment in cycles. In every interaction cycle the agent is rewarded for its performance. We compare the average reward U from cycle 1 to m (average value) with the future discounted reward V from cycle k to infinity (discounted value). We consider essentially arbitrary (non-geometric) discount sequences and arbitrary reward sequences (non-MDP environments). We show that asymptotically U for m->infinity and V for k->infinity are equal, provided both limits exist. Further, if the effective horizon grows linearly with k or faster, then existence of the limit of U implies that the limit of V exists. Conversely, if the effective horizon grows linearly with k or slower, then existence of the limit of V implies that the limit of U exists.
[ { "version": "v1", "created": "Tue, 9 May 2006 10:39:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
cs/0605043
Stefano Guerrini
Stefano Guerrini and Andrea Masini
Continuations, proofs and tests
32 pages, uses xy-pic
null
null
null
cs.LO cs.PL
null
Continuation Passing Style (CPS) is one of the most important issues in the field of functional programming languages, and the quest for a primitive notion of types for continuation is still open. Starting from the notion of ``test'' proposed by Girard, we develop a notion of test for intuitionistic logic. We give a complete deductive system for tests and we show that it is good to deal with ``continuations''. In particular, in the proposed system it is possible to work with Call by Value and Call by Name translations in a uniform way.
[ { "version": "v1", "created": "Tue, 9 May 2006 20:11:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Guerrini", "Stefano", "" ], [ "Masini", "Andrea", "" ] ]
cs/0605045
R.N.Mohan Professor
R.N.Mohan
On Orthogonalities in Matrices
null
null
null
null
cs.DM
null
In this paper we have discussed different possible orthogonalities in matrices, namely orthogonal, quasi-orthogonal, semi-orthogonal and non-orthogonal matrices including completely positive matrices, while giving some of their constructions besides studying some of their properties.
[ { "version": "v1", "created": "Wed, 10 May 2006 03:12:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohan", "R. N.", "" ] ]
cs/0605049
R.N.Mohan Professor
V.M.Siddlenikov, R.N.Mohan, Moon Ho Lee
On fractionally linear functions over a finite field
null
null
null
null
cs.DM
null
Abstrct: In this note, by considering fractionally linear functions over a finite field and consequently developing an abstract sequence, we study some of its properties.
[ { "version": "v1", "created": "Thu, 11 May 2006 06:58:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Siddlenikov", "V. M.", "" ], [ "Mohan", "R. N.", "" ], [ "Lee", "Moon Ho", "" ] ]
cs/0605050
V. Arvind
V. Arvind and Piyush P Kurur
A Polynomial Time Nilpotence Test for Galois Groups and Related Results
12 pages
null
null
null
cs.CC cs.DS
null
We give a deterministic polynomial-time algorithm to check whether the Galois group $\Gal{f}$ of an input polynomial $f(X) \in \Q[X]$ is nilpotent: the running time is polynomial in $\size{f}$. Also, we generalize the Landau-Miller solvability test to an algorithm that tests if $\Gal{f}$ is in $\Gamma_d$: this algorithm runs in time polynomial in $\size{f}$ and $n^d$ and, moreover, if $\Gal{f}\in\Gamma_d$ it computes all the prime factors of $# \Gal{f}$.
[ { "version": "v1", "created": "Thu, 11 May 2006 08:20:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Arvind", "V.", "" ], [ "Kurur", "Piyush P", "" ] ]
cs/0605053
Rajkumar Buyya
Hussein Gibbins and Rajkumar Buyya
Gridscape II: A Customisable and Pluggable Grid Monitoring Portal and its Integration with Google Maps
12 pages
null
null
Technical Report, GRIDS-TR-2006-8, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, May 12, 2006
cs.DC
null
Grid computing has emerged as an effective means of facilitating the sharing of distributed heterogeneous resources, enabling collaboration in large scale environments. However, the nature of Grid systems, coupled with the overabundance and fragmentation of information, makes it difficult to monitor resources, services, and computations in order to plan and make decisions. In this paper we present Gridscape II, a customisable portal component that can be used on its own or plugged in to compliment existing Grid portals. Gridscape II manages the gathering of information from arbitrary, heterogeneous and distributed sources and presents them together seamlessly within a single interface. It also leverages the Google Maps API in order to provide a highly interactive user interface. Gridscape II is simple and easy to use, providing a solution to those users who do not wish to invest heavily in developing their own monitoring portal from scratch, and also for those users who want something that is easy to customise and extend for their specific needs.
[ { "version": "v1", "created": "Fri, 12 May 2006 09:41:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gibbins", "Hussein", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0605056
Rajkumar Buyya
Chee Shin Yeo, Marcos Dias de Assuncao, Jia Yu, Anthony Sulistio, Srikumar Venugopal, Martin Placek, and Rajkumar Buyya
Utility Computing and Global Grids
23 pages
null
null
Technical Report, GRIDS-TR-2006-7, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, April 13, 2006
cs.DC
null
This chapter focuses on the use of Grid technologies to achieve utility computing. An overview of how Grids can support utility computing is first presented through the architecture of Utility Grids. Then, utility-based resource allocation is described in detail at each level of the architecture. Finally, some industrial solutions for utility computing are discussed.
[ { "version": "v1", "created": "Fri, 12 May 2006 20:36:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Yeo", "Chee Shin", "" ], [ "de Assuncao", "Marcos Dias", "" ], [ "Yu", "Jia", "" ], [ "Sulistio", "Anthony", "" ], [ "Venugopal", "Srikumar", "" ], [ "Placek", "Martin", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0605057
Rajiv Ranjan Mr.
Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya
SLA-Based Coordinated Superscheduling Scheme and Performance for Computational Grids
null
In Proceedings of the 8th IEEE International Conference on Cluster Computing (Cluster 2006), IEEE Computer Society Press, September 27 - 30, 2006, Barcelona, Spain.
null
null
cs.DC
null
The Service Level Agreement~(SLA) based grid superscheduling approach promotes coordinated resource sharing. Superscheduling is facilitated between administratively and topologically distributed grid sites by grid schedulers such as Resource brokers. In this work, we present a market-based SLA coordination mechanism. We based our SLA model on a well known \emph{contract net protocol}. The key advantages of our approach are that it allows:~(i) resource owners to have finer degree of control over the resource allocation that was previously not possible through traditional mechanism; and (ii) superschedulers to bid for SLA contracts in the contract net with focus on completing the job within the user specified deadline. In this work, we use simulation to show the effectiveness of our proposed approach.
[ { "version": "v1", "created": "Mon, 15 May 2006 13:41:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Ranjan", "Rajiv", "" ], [ "Harwood", "Aaron", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0605059
Jean-Marc Rosengard
Jean-Marc Rosengard, Marian Ursu
Ontological Representations of Software Patterns
7 pages
Proceedings of KES'04, Lecture Notes in Computer Science, vol. 3215, pp. 31-37, Springer-Verlag, 2004
10.1007/b100916
null
cs.SE cs.AI
null
This paper is based on and advocates the trend in software engineering of extending the use of software patterns as means of structuring solutions to software development problems (be they motivated by best practice or by company interests and policies). The paper argues that, on the one hand, this development requires tools for automatic organisation, retrieval and explanation of software patterns. On the other hand, that the existence of such tools itself will facilitate the further development and employment of patterns in the software development process. The paper analyses existing pattern representations and concludes that they are inadequate for the kind of automation intended here. Adopting a standpoint similar to that taken in the semantic web, the paper proposes that feasible solutions can be built on the basis of ontological representations.
[ { "version": "v1", "created": "Sun, 14 May 2006 18:31:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosengard", "Jean-Marc", "" ], [ "Ursu", "Marian", "" ] ]
cs/0605061
Al-Mukaddim Khan Pathan
Al-Mukaddim Khan Pathan, Md. Abdul Mottalib and Minhaz Fahim Zibran
An Internet Framework to Bring Coherence between WAP and HTTP Ensuring Better Mobile Internet Security
8th International Conference on Advanced Communication Technology (ICACT 2006)
null
null
null
cs.NI
null
To bring coherence between Wireless Access Protocol (WAP) and Hyper Text Transfer Protocol (HTTP), in this paper, we have proposed an enhanced Internet framework, which incorporates a new markup language and a browser compatible with both of the access control protocols. This Markup Language and the browser enables co-existence of both Hyper Text Markup Language (HTML) and Wireless Markup Language (WML) contents in a single source file, whereas the browser incorporates the ability to hold contents compliant with both HTTP and WAP. The proposed framework also bridges the security gap that is present in the existing mobile Internet framework. Keywords: WAP, WML, HTTP, HTML, browser, parser, wireless devices.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:25:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Pathan", "Al-Mukaddim Khan", "" ], [ "Mottalib", "Md. Abdul", "" ], [ "Zibran", "Minhaz Fahim", "" ] ]
cs/0605062
Al-Mukaddim Khan Pathan
Al-Mukaddim Khan Pathan and Md. Golam Shagadul Amin Talukder
QoSIP: A QoS Aware IP Routing Ptotocol for Multimedia Data
8th International Conference of Advanced Communication Technology (ICACT 2006)
null
null
null
cs.NI
null
Conventional IP routing protocols are not suitable for multimedia applications which have very stringent Quality-of-Service (QoS) demands and they require a connection oriented service. For multimedia applications it is expected that the router should be able to forward the packet according to the demand of the packet and it is necessary to find a path that satisfies the specific demands of a particular application. In order to address these issues, in this paper, we have presented a QoS aware IP routing protocol where a router stores information about the QoS parameters and routes the packet accordingly. Keywords: IP Routing Protocol, Quality of Service (QoS) parameter, QoSIP, Selective Flooding.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:39:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Pathan", "Al-Mukaddim Khan", "" ], [ "Talukder", "Md. Golam Shagadul Amin", "" ] ]
cs/0605063
Al-Mukaddim Khan Pathan
Asif Ahmed Anik and Al-Mukaddim Khan Pathan
An Electronic Payment System to Ensure Cost Effectiveness with Easy Security Incorporation for the Developing Countries
International Conference on Intelligent Agents, Web Technology and Internet Commerce (IAWTIC 2004)
null
null
null
cs.OH
null
With the rapid growth of Information and Communication Technology, Electronic commerce is now acting as a new means of carrying out business transactions through electronic means such as Internet environment. To avoid the complexities associated with the digital cash and electronic cash, consumers and vendors are looking for credit card payments on the Internet as one possible time-tested alternative. This gave rise of the on-line payment processing using a third-party verification; which is not suitable for the developing countries in most of the cases because of the excessive costs associated with it for maintenance and establishment of an online third-party processor. As a remedy of this problem, in this paper, we have proposed a framework for easy security incorporation in credit card based electronic payment system without the use of an on-line third- party processor; which tends to be low cost and effective for the developing countries.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:57:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Anik", "Asif Ahmed", "" ], [ "Pathan", "Al-Mukaddim Khan", "" ] ]
cs/0605066
Xiaowen Zhang
Xiaowen Zhang, Ke Tang, Li Shu
A Chaotic Cipher Mmohocc and Its Randomness Evaluation
8 pages, 4 figures, and 3 tables, submitted to ICCS06
null
null
null
cs.CR
null
After a brief introduction to a new chaotic stream cipher Mmohocc which utilizes the fundamental chaos characteristics of mixing, unpredictability, and sensitivity to initial conditions, we conducted the randomness statistical tests against the keystreams generated by the cipher. Two batteries of most stringent randomness tests, namely the NIST Suite and the Diehard Suite, were performed. The results showed that the keystreams have successfully passed all the statistical tests. We conclude that Mmohocc can generate high-quality pseudorandom numbers from a statistical point of view.
[ { "version": "v1", "created": "Mon, 15 May 2006 18:25:35 GMT" }, { "version": "v2", "created": "Tue, 30 May 2006 11:58:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Xiaowen", "" ], [ "Tang", "Ke", "" ], [ "Shu", "Li", "" ] ]
cs/0605070
Stephen Smith
Stephen L. Smith, Mireille E. Broucke, and Bruce A. Francis
Curve Shortening and the Rendezvous Problem for Mobile Autonomous Robots
15 pages, 18 figures
null
null
null
cs.RO cs.MA
null
If a smooth, closed, and embedded curve is deformed along its normal vector field at a rate proportional to its curvature, it shrinks to a circular point. This curve evolution is called Euclidean curve shortening and the result is known as the Gage-Hamilton-Grayson Theorem. Motivated by the rendezvous problem for mobile autonomous robots, we address the problem of creating a polygon shortening flow. A linear scheme is proposed that exhibits several analogues to Euclidean curve shortening: The polygon shrinks to an elliptical point, convex polygons remain convex, and the perimeter of the polygon is monotonically decreasing.
[ { "version": "v1", "created": "Tue, 16 May 2006 22:30:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Smith", "Stephen L.", "" ], [ "Broucke", "Mireille E.", "" ], [ "Francis", "Bruce A.", "" ] ]
cs/0605074
Michael Codish
Michael Codish (1), Peter Schneider-Kamp (2), Vitaly Lagoon (3), Ren\'e Thiemann (2), J\"urgen Giesl (2) ((1) Department of Computer Science, Ben-Gurion University, Israel (2) LuFG Informatik 2, RWTH Aachen, Germany (3) Department of Computer Science and Software Engineering, University of Melbourne, Australia)
SAT Solving for Argument Filterings
null
null
null
null
cs.LO
null
This paper introduces a propositional encoding for lexicographic path orders in connection with dependency pairs. This facilitates the application of SAT solvers for termination analysis of term rewrite systems based on the dependency pair method. We address two main inter-related issues and encode them as satisfiability problems of propositional formulas that can be efficiently handled by SAT solving: (1) the combined search for a lexicographic path order together with an \emph{argument filtering} to orient a set of inequalities; and (2) how the choice of the argument filtering influences the set of inequalities that have to be oriented. We have implemented our contributions in the termination prover AProVE. Extensive experiments show that by our encoding and the application of SAT solvers one obtains speedups in orders of magnitude as well as increased termination proving power.
[ { "version": "v1", "created": "Wed, 17 May 2006 12:47:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Codish", "Michael", "" ], [ "Schneider-Kamp", "Peter", "" ], [ "Lagoon", "Vitaly", "" ], [ "Thiemann", "René", "" ], [ "Giesl", "Jürgen", "" ] ]
cs/0605076
J. F. J. Laros
J. F. J. Laros
Numeration-automatic sequences
25 pages, 22 figures
null
null
null
cs.CL cs.DM
null
We present a base class of automata that induce a numeration system and we give an algorithm to give the n-th word in the language of the automaton when the expansion of n in the induced numeration system is feeded to the automaton. Furthermore we give some algorithms for reverse reading of this expansion and a way to combine automata to other automata having the same properties.
[ { "version": "v1", "created": "Wed, 17 May 2006 17:12:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Laros", "J. F. J.", "" ] ]
cs/0605078
Christoph D\"urr
Philippe Baptiste, Peter Brucker, Marek Chrobak, Christoph Durr, Svetlana A. Kravchenko, Francis Sourd
The Complexity of Mean Flow Time Scheduling Problems with Release Times
Subsumes and replaces cs.DS/0412094 and "Complexity of mean flow time scheduling problems with release dates" by P.B, S.K
null
null
null
cs.DS
null
We study the problem of preemptive scheduling n jobs with given release times on m identical parallel machines. The objective is to minimize the average flow time. We show that when all jobs have equal processing times then the problem can be solved in polynomial time using linear programming. Our algorithm can also be applied to the open-shop problem with release times and unit processing times. For the general case (when processing times are arbitrary), we show that the problem is unary NP-hard.
[ { "version": "v1", "created": "Wed, 17 May 2006 22:07:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Baptiste", "Philippe", "" ], [ "Brucker", "Peter", "" ], [ "Chrobak", "Marek", "" ], [ "Durr", "Christoph", "" ], [ "Kravchenko", "Svetlana A.", "" ], [ "Sourd", "Francis", "" ] ]
cs/0605081
Marc Daumas
Marc Daumas (LP2A, LIRMM), Guillaume Da Gra\c{c}a (LP2A), David Defour (LP2A)
Caract\'{e}ristiques arithm\'{e}tiques des processeurs graphiques
null
null
null
null
cs.MS
null
Les unit\'{e}s graphiques (Graphic Processing Units- GPU) sont d\'{e}sormais des processeurs puissants et flexibles. Les derni\`{e}res g\'{e}n\'{e}rations de GPU contiennent des unit\'{e}s programmables de traitement des sommets (vertex shader) et des pixels (pixel shader) supportant des op\'{e}rations en virgule flottante sur 8, 16 ou 32 bits. La repr\'{e}sentation flottante sur 32 bits correspond \`{a} la simple pr\'{e}cision de la norme IEEE sur l'arithm\'{e}tique en virgule flottante (IEEE-754). Les GPU sont bien adapt\'{e}s aux applications avec un fort parall\'{e}lisme de donn\'{e}es. Cependant ils ne sont que peu utilis\'{e}s en dehors des calculs graphiques (General Purpose computation on GPU -- GPGPU). Une des raisons de cet \'{e}tat de faits est la pauvret\'{e} des documentations techniques fournies par les fabricants (ATI et Nvidia), particuli\`{e}rement en ce qui concerne l'implantation des diff\'{e}rents op\'{e}rateurs arithm\'{e}tiques embarqu\'{e}s dans les diff\'{e}rentes unit\'{e}s de traitement. Or ces informations sont essentielles pour estimer et contr\^{o}ler les erreurs d'arrondi ou pour mettre en oeuvre des techniques de r\'{e}duction ou de compensation afin de travailler en pr\'{e}cision double, quadruple ou arbitrairement \'{e}tendue. Nous proposons dans cet article un ensemble de programmes qui permettent de d\'{e}couvrir les caract\'{e}ristiques principales des GPU en ce qui concerne l'arithm\'{e}tique \`{a} virgule flottante. Nous donnons les r\'{e}sultats obtenus sur deux cartes graphiques r\'{e}centes: la Nvidia 7800GTX et l'ATI RX1800XL.
[ { "version": "v1", "created": "Thu, 18 May 2006 15:49:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Daumas", "Marc", "", "LP2A, LIRMM" ], [ "Da Graça", "Guillaume", "", "LP2A" ], [ "Defour", "David", "", "LP2A" ] ]
cs/0605082
Saugata Basu
Saugata Basu
Efficient algorithm for computing the Euler-Poincar\'e characteristic of a semi-algebraic set defined by few quadratic inequalities
17 pages, accepted for publication in Computational Complexity
null
null
null
cs.SC cs.CG
null
We present an algorithm which takes as input a closed semi-algebraic set, $S \subset \R^k$, defined by \[ P_1 \leq 0, ..., P_\ell \leq 0, P_i \in \R[X_1,...,X_k], \deg(P_i) \leq 2, \] and computes the Euler-Poincar\'e characteristic of $S$. The complexity of the algorithm is $k^{O(\ell)}$.
[ { "version": "v1", "created": "Thu, 18 May 2006 18:03:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Basu", "Saugata", "" ] ]
cs/0605083
Partha Basuchowdhuri
Partha Basuchowdhuri
Classical Authentication Aided Three-Stage Quantum Protocol
7 pages, 3 figures
null
null
null
cs.CR
null
This paper modifies Kak's three-stage protocol so that it can guarantee secure transmission of information. Although avoiding man-in-the-middle attack is our primary objective in the introduction of classical authentication inside the three-stage protocol, we also benefit from the inherent advantages of the chosen classical authentication protocol. We have tried to implement ideas like key distribution center, session key, time-stamp, and nonce, within the quantum cryptography protocol.
[ { "version": "v1", "created": "Thu, 18 May 2006 21:41:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Basuchowdhuri", "Partha", "" ] ]
cs/0605088
Ke Liu
Ke Liu, Adnan Majeed and Nael B. Abu-Ghazaleh
TARMAC: Traffic-Analysis Reslient MAC Protocol for Multi-Hop Wireless Networks
null
null
null
null
cs.NI cs.CR
null
Traffic analysis in Multi-hop Wireless Networks can expose the structure of the network allowing attackers to focus their efforts on critical nodes. For example, jamming the only data sink in a sensor network can cripple the network. We propose a new communication protocol that is part of the MAC layer, but resides conceptually between the routing layer and MAC, that is resilient to traffic analysis. Each node broadcasts the data that it has to transmit according to a fixed transmission schedule that is independent of the traffic being generated, making the network immune to time correlation analysis. The transmission pattern is identical, with the exception of a possible time shift, at all nodes, removing spatial correlation of transmissions to network strucutre. Data for all neighbors resides in the same encrypted packet. Each neighbor then decides which subset of the data in a packet to forward onwards using a routing protocol whose details are orthogonal to the proposed scheme. We analyze the basic scheme, exploring the tradeoffs in terms of frequency of transmission and packet size. We also explore adaptive and time changing patterns and analyze their performance under a number of representative scenarios.
[ { "version": "v1", "created": "Fri, 19 May 2006 22:42:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Liu", "Ke", "" ], [ "Majeed", "Adnan", "" ], [ "Abu-Ghazaleh", "Nael B.", "" ] ]
cs/0605094
Simone Bova
S. Bova (1) and F. Montagna (1) ((1) University of Siena, Italy)
Proof Search in Hajek's Basic Logic
26 pages
null
null
null
cs.LO cs.CC
null
We introduce a proof system for Hajek's logic BL based on a relational hypersequents framework. We prove that the rules of our logical calculus, called RHBL, are sound and invertible with respect to any valuation of BL into a suitable algebra, called omega[0,1]. Refining the notion of reduction tree that arises naturally from RHBL, we obtain a decision algorithm for BL provability whose running time upper bound is 2^O(n), where n is the number of connectives of the input formula. Moreover, if a formula is unprovable, we exploit the constructiveness of a polynomial time algorithm for leaves validity for providing a procedure to build countermodels in omega[0,1]. Finally, since the size of the reduction tree branches is O(n^3), we can describe a polynomial time verification algorithm for BL unprovability.
[ { "version": "v1", "created": "Mon, 22 May 2006 08:18:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Bova", "S.", "", "University of Siena, Italy" ], [ "Montagna", "F.", "", "University of Siena, Italy" ] ]
cs/0605097
Emina Torlak
Marten van Dijk, Emina Torlak, Blaise Gassend, and Srinivas Devadas
A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols
16 pages
null
null
null
cs.CR
null
We introduce knowledge flow analysis, a simple and flexible formalism for checking cryptographic protocols. Knowledge flows provide a uniform language for expressing the actions of principals, assump- tions about intruders, and the properties of cryptographic primitives. Our approach enables a generalized two-phase analysis: we extend the two-phase theory by identifying the necessary and sufficient proper- ties of a broad class of cryptographic primitives for which the theory holds. We also contribute a library of standard primitives and show that they satisfy our criteria.
[ { "version": "v1", "created": "Mon, 22 May 2006 15:51:35 GMT" } ]
2007-05-23T00:00:00
[ [ "van Dijk", "Marten", "" ], [ "Torlak", "Emina", "" ], [ "Gassend", "Blaise", "" ], [ "Devadas", "Srinivas", "" ] ]
cs/0605101
Victor Kryssanov
Victor V. Kryssanov, Frank J. Rinaldo, Evgeny L. Kuleshov, Hitoshi Ogawa
Modeling the Dynamics of Social Networks
8 pages, 3 figures. Preprint (as of May 24, 2006)
null
null
null
cs.CY cs.CE cs.CL cs.HC cs.NI physics.data-an
null
Modeling human dynamics responsible for the formation and evolution of the so-called social networks - structures comprised of individuals or organizations and indicating connectivities existing in a community - is a topic recently attracting a significant research interest. It has been claimed that these dynamics are scale-free in many practically important cases, such as impersonal and personal communication, auctioning in a market, accessing sites on the WWW, etc., and that human response times thus conform to the power law. While a certain amount of progress has recently been achieved in predicting the general response rate of a human population, existing formal theories of human behavior can hardly be found satisfactory to accommodate and comprehensively explain the scaling observed in social networks. In the presented study, a novel system-theoretic modeling approach is proposed and successfully applied to determine important characteristics of a communication network and to analyze consumer behavior on the WWW.
[ { "version": "v1", "created": "Wed, 24 May 2006 02:13:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "Victor V.", "" ], [ "Rinaldo", "Frank J.", "" ], [ "Kuleshov", "Evgeny L.", "" ], [ "Ogawa", "Hitoshi", "" ] ]
cs/0605102
Shaili Jain
Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh Venkatasubramanian and Ke Yi
Restricted Strip Covering and the Sensor Cover Problem
14 pages, 6 figures
null
null
null
cs.DS cs.CG
null
Given a set of objects with durations (jobs) that cover a base region, can we schedule the jobs to maximize the duration the original region remains covered? We call this problem the sensor cover problem. This problem arises in the context of covering a region with sensors. For example, suppose you wish to monitor activity along a fence by sensors placed at various fixed locations. Each sensor has a range and limited battery life. The problem is to schedule when to turn on the sensors so that the fence is fully monitored for as long as possible. This one dimensional problem involves intervals on the real line. Associating a duration to each yields a set of rectangles in space and time, each specified by a pair of fixed horizontal endpoints and a height. The objective is to assign a position to each rectangle to maximize the height at which the spanning interval is fully covered. We call this one dimensional problem restricted strip covering. If we replace the covering constraint by a packing constraint, the problem is identical to dynamic storage allocation, a scheduling problem that is a restricted case of the strip packing problem. We show that the restricted strip covering problem is NP-hard and present an O(log log n)-approximation algorithm. We present better approximations or exact algorithms for some special cases. For the uniform-duration case of restricted strip covering we give a polynomial-time, exact algorithm but prove that the uniform-duration case for higher-dimensional regions is NP-hard. Finally, we consider regions that are arbitrary sets, and we present an O(log n)-approximation algorithm.
[ { "version": "v1", "created": "Wed, 24 May 2006 03:27:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Buchsbaum", "Adam L.", "" ], [ "Efrat", "Alon", "" ], [ "Jain", "Shaili", "" ], [ "Venkatasubramanian", "Suresh", "" ], [ "Yi", "Ke", "" ] ]
cs/0605103
Daniel Lemire
Daniel Lemire
A Better Alternative to Piecewise Linear Time Series Segmentation
to appear in SIAM Data Mining 2007
null
null
null
cs.DB cs.CV
null
Time series are difficult to monitor, summarize and predict. Segmentation organizes time series into few intervals having uniform characteristics (flatness, linearity, modality, monotonicity and so on). For scalability, we require fast linear time algorithms. The popular piecewise linear model can determine where the data goes up or down and at what rate. Unfortunately, when the data does not follow a linear model, the computation of the local slope creates overfitting. We propose an adaptive time series model where the polynomial degree of each interval vary (constant, linear and so on). Given a number of regressors, the cost of each interval is its polynomial degree: constant intervals cost 1 regressor, linear intervals cost 2 regressors, and so on. Our goal is to minimize the Euclidean (l_2) error for a given model complexity. Experimentally, we investigate the model where intervals can be either constant or linear. Over synthetic random walks, historical stock market prices, and electrocardiograms, the adaptive model provides a more accurate segmentation than the piecewise linear model without increasing the cross-validation error or the running time, while providing a richer vocabulary to applications. Implementation issues, such as numerical stability and real-world performance, are discussed.
[ { "version": "v1", "created": "Wed, 24 May 2006 04:42:53 GMT" }, { "version": "v2", "created": "Sat, 27 May 2006 00:32:03 GMT" }, { "version": "v3", "created": "Wed, 31 May 2006 01:28:40 GMT" }, { "version": "v4", "created": "Sun, 25 Jun 2006 14:21:45 GMT" }, { "version": "v5", "created": "Tue, 3 Oct 2006 17:04:41 GMT" }, { "version": "v6", "created": "Thu, 4 Jan 2007 18:36:01 GMT" }, { "version": "v7", "created": "Mon, 23 Apr 2007 01:24:44 GMT" }, { "version": "v8", "created": "Sat, 28 Apr 2007 23:13:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Lemire", "Daniel", "" ] ]
cs/0605104
Blake Hegerle
Blake Hegerle
Parsing Transformative LR(1) Languages
68 pages, 4 figures. Numerous stylistic and grammatical fixes; new material in Sections 2.2 and 4.2
null
null
null
cs.PL
null
We consider, as a means of making programming languages more flexible and powerful, a parsing algorithm in which the parser may freely modify the grammar while parsing. We are particularly interested in a modification of the canonical LR(1) parsing algorithm in which, after the reduction of certain productions, we examine the source sentence seen so far to determine the grammar to use to continue parsing. A naive modification of the canonical LR(1) parsing algorithm along these lines cannot be guaranteed to halt; as a result, we develop a test which examines the grammar as it changes, stopping the parse if the grammar changes in a way that would invalidate earlier assumptions made by the parser. With this test in hand, we can develop our parsing algorithm and prove that it is correct. That being done, we turn to earlier, related work; the idea of programming languages which can be extended to include new syntactic constructs has existed almost as long as the idea of high-level programming languages. Early efforts to construct such a programming language were hampered by an immature theory of formal languages. More recent efforts to construct transformative languages relied either on an inefficient chain of source-to-source translators; or they have a defect, present in our naive parsing algorithm, in that they cannot be known to halt. The present algorithm does not have these undesirable properties, and as such, it should prove a useful foundation for a new kind of programming language.
[ { "version": "v1", "created": "Wed, 24 May 2006 19:09:39 GMT" }, { "version": "v2", "created": "Wed, 26 Jul 2006 14:39:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Hegerle", "Blake", "" ] ]
cs/0605109
Emina Torlak
Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, and Srinivas Devadas
Knowledge Flow Analysis for Security Protocols
20 pages
null
null
MIT-CSAIL-TR-2005-066
cs.CR cs.SE
null
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely to informal descriptions of protocols, it allows a succinct and natural formalization; because it abstracts away message ordering, and handles communications between principals and applications of cryptographic primitives uniformly, it is readily represented in a standard logic. A generic framework in the Alloy modelling language is presented, and instantiated for two standard protocols, and a new key management scheme.
[ { "version": "v1", "created": "Wed, 24 May 2006 15:58:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Torlak", "Emina", "" ], [ "van Dijk", "Marten", "" ], [ "Gassend", "Blaise", "" ], [ "Jackson", "Daniel", "" ], [ "Devadas", "Srinivas", "" ] ]
cs/0605111
Jon Phipps
Diane I. Hillmann (1), Stuart A. Sutton (2), Jon Phipps (1), Ryan Laundry (2) ((1) Cornell University, (2) University of Washington)
A Metadata Registry from Vocabularies UP: The NSDL Registry Project
Submitted to Dublin Core 2006 Conference (DC2006)
null
null
null
cs.DL
null
The NSDL Metadata Registry is designed to provide humans and machines with the means to discover, create, access and manage metadata schemes, schemas, application profiles, crosswalks and concept mappings. This paper describes the general goals and architecture of the NSDL Metadata Registry as well as issues encountered during the first year of the project's implementation.
[ { "version": "v1", "created": "Wed, 24 May 2006 16:51:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Hillmann", "Diane I.", "", "Cornell University" ], [ "Sutton", "Stuart A.", "", "University of Washington" ], [ "Phipps", "Jon", "", "Cornell University" ], [ "Laundry", "Ryan", "", "University of Washington" ] ]
cs/0605113
Johan Bollen
Johan Bollen and Herbert Van de Sompel
An Architecture for the Aggregation and Analysis of Scholarly Usage Data
to be published in Proceedings of the Joint Conference on Digital Libraries, 2006
null
null
null
cs.DL
null
Although recording of usage data is common in scholarly information services, its exploitation for the creation of value-added services remains limited due to concerns regarding, among others, user privacy, data validity, and the lack of accepted standards for the representation, sharing and aggregation of usage data. This paper presents a technical, standards-based architecture for sharing usage information, which we have designed and implemented. In this architecture, OpenURL-compliant linking servers aggregate usage information of a specific user community as it navigates the distributed information environment that it has access to. This usage information is made OAI-PMH harvestable so that usage information exposed by many linking servers can be aggregated to facilitate the creation of value-added services with a reach beyond that of a single community or a single information service. This paper also discusses issues that were encountered when implementing the proposed approach, and it presents preliminary results obtained from analyzing a usage data set containing about 3,500,000 requests aggregated by a federation of linking servers at the California State University system over a 20 month period.
[ { "version": "v1", "created": "Wed, 24 May 2006 18:06:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Bollen", "Johan", "" ], [ "Van de Sompel", "Herbert", "" ] ]
cs/0605119
Victor Kryssanov
V.V. Kryssanov, H. Tamaki, and K. Ueda
An Internet-enabled technology to support Evolutionary Design
23 pages, 3 figures. Preprint completed in 2000
Journal of Engineering Manufacture. 2001, Vol.215, No.B5, 647-655
null
null
cs.CE cs.AI cs.AR cs.MA cs.NI
null
This paper discusses the systematic use of product feedback information to support life-cycle design approaches and provides guidelines for developing a design at both the product and the system levels. Design activities are surveyed in the light of the product life cycle, and the design information flow is interpreted from a semiotic perspective. The natural evolution of a design is considered, the notion of design expectations is introduced, and the importance of evaluation of these expectations in dynamic environments is argued. Possible strategies for reconciliation of the expectations and environmental factors are described. An Internet-enabled technology is proposed to monitor product functionality, usage, and operational environment and supply the designer with relevant information. A pilot study of assessing design expectations of a refrigerator is outlined, and conclusions are drawn.
[ { "version": "v1", "created": "Thu, 25 May 2006 04:39:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Tamaki", "H.", "" ], [ "Ueda", "K.", "" ] ]
cs/0605120
Victor Kryssanov
V.V. Kryssanov, H. Tamaki, and S. Kitamura
Understanding Design Fundamentals: How Synthesis and Analysis Drive Creativity, Resulting in Emergence
33pages, 4 figures. Preprint completed in 2000
AI in Engineering. 2001, Vol.15/4, 329-342
null
null
cs.AI cs.CE cs.HC
null
This paper presents results of an ongoing interdisciplinary study to develop a computational theory of creativity for engineering design. Human design activities are surveyed, and popular computer-aided design methodologies are examined. It is argued that semiotics has the potential to merge and unite various design approaches into one fundamental theory that is naturally interpretable and so comprehensible in terms of computer use. Reviewing related work in philosophy, psychology, and cognitive science provides a general and encompassing vision of the creativity phenomenon. Basic notions of algebraic semiotics are given and explained in terms of design. This is to define a model of the design creative process, which is seen as a process of semiosis, where concepts and their attributes represented as signs organized into systems are evolved, blended, and analyzed, resulting in the development of new concepts. The model allows us to formally describe and investigate essential properties of the design process, namely its dynamics and non-determinism inherent in creative thinking. A stable pattern of creative thought - analogical and metaphorical reasoning - is specified to demonstrate the expressive power of the modeling approach; illustrative examples are given. The developed theory is applied to clarify the nature of emergence in design: it is shown that while emergent properties of a product may influence its creative value, emergence can simply be seen as a by-product of the creative process. Concluding remarks summarize the research, point to some unresolved issues, and outline directions for future work.
[ { "version": "v1", "created": "Thu, 25 May 2006 11:35:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Tamaki", "H.", "" ], [ "Kitamura", "S.", "" ] ]
cs/0605121
Victor Kryssanov
Victor V. Kryssanov, Masayuki Okabe, Koh Kakusho, and Michihiko Minoh
Communication of Social Agents and the Digital City - A Semiotic Perspective
15 pages, 1 figure. Preprint completed in 2001. An earlier version of the paper was presented at the Second Kyoto Workshop on Digital Cities, Kyoto, Japan in 2001
Lecture Notes in Computer Science. 2002, Vol. 2362, 56-70
null
null
cs.AI cs.CL cs.CY cs.HC
null
This paper investigates the concept of digital city. First, a functional analysis of a digital city is made in the light of the modern study of urbanism; similarities between the virtual and urban constructions are pointed out. Next, a semiotic perspective on the subject matter is elaborated, and a terminological basis is introduced to treat a digital city as a self-organizing meaning-producing system intended to support social or spatial navigation. An explicit definition of a digital city is formulated. Finally, the proposed approach is discussed, conclusions are given, and future work is outlined.
[ { "version": "v1", "created": "Thu, 25 May 2006 11:54:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "Victor V.", "" ], [ "Okabe", "Masayuki", "" ], [ "Kakusho", "Koh", "" ], [ "Minoh", "Michihiko", "" ] ]
cs/0605123
Jaime Cardoso
Jaime S. Cardoso
Classification of Ordinal Data
62 pages, MSc thesis
null
null
null
cs.AI
null
Classification of ordinal data is one of the most important tasks of relation learning. In this thesis a novel framework for ordered classes is proposed. The technique reduces the problem of classifying ordered classes to the standard two-class problem. The introduced method is then mapped into support vector machines and neural networks. Compared with a well-known approach using pairwise objects as training samples, the new algorithm has a reduced complexity and training time. A second novel model, the unimodal model, is also introduced and a parametric version is mapped into neural networks. Several case studies are presented to assert the validity of the proposed models.
[ { "version": "v1", "created": "Fri, 26 May 2006 09:44:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Cardoso", "Jaime S.", "" ] ]
cs/0605124
Marcelo Arenas
Jorge Perez, Marcelo Arenas and Claudio Gutierrez
Semantics and Complexity of SPARQL
null
null
null
null
cs.DB
null
SPARQL is the W3C candidate recommendation query language for RDF. In this paper we address systematically the formal study of SPARQL, concentrating in its graph pattern facility. We consider for this study a fragment without literals and a simple version of filters which encompasses all the main issues yet is simple to formalize. We provide a compositional semantics, prove there are normal forms, prove complexity bounds, among others that the evaluation of SPARQL patterns is PSPACE-complete, compare our semantics to an alternative operational semantics, give simple and natural conditions when both semantics coincide and discuss optimizations procedures.
[ { "version": "v1", "created": "Fri, 26 May 2006 16:41:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Perez", "Jorge", "" ], [ "Arenas", "Marcelo", "" ], [ "Gutierrez", "Claudio", "" ] ]
cs/0605125
Germain Drolet
Germain Drolet (Department of Electrical & Computer Engineering, Royal Military College of Canada)
Combinational Logic Circuit Design with the Buchberger Algorithm
15 pages, 1 table
null
null
null
cs.AR
null
We detail a procedure for the computation of the polynomial form of an electronic combinational circuit from the design equations in a truth table. The method uses the Buchberger algorithm rather than current traditional methods based on search algorithms. We restrict the analysis to a single output, but the procedure can be generalized to multiple outputs. The procedure is illustrated with the design of a simple arithmetic and logic unit with two 3-bit operands and two control bits.
[ { "version": "v1", "created": "Fri, 26 May 2006 18:43:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Drolet", "Germain", "", "Department of Electrical & Computer Engineering, Royal\n Military College of Canada" ] ]
cs/0605126
David Bunde
David P. Bunde
Power-aware scheduling for makespan and flow
13 pages, 3 figures. To appear in 18th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2006
null
null
null
cs.DS
null
We consider offline scheduling algorithms that incorporate speed scaling to address the bicriteria problem of minimizing energy consumption and a scheduling metric. For makespan, we give linear-time algorithms to compute all non-dominated solutions for the general uniprocessor problem and for the multiprocessor problem when every job requires the same amount of work. We also show that the multiprocessor problem becomes NP-hard when jobs can require different amounts of work. For total flow, we show that the optimal flow corresponding to a particular energy budget cannot be exactly computed on a machine supporting arithmetic and the extraction of roots. This hardness result holds even when scheduling equal-work jobs on a uniprocessor. We do, however, extend previous work by Pruhs et al. to give an arbitrarily-good approximation for scheduling equal-work jobs on a multiprocessor.
[ { "version": "v1", "created": "Fri, 26 May 2006 21:57:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Bunde", "David P.", "" ] ]
cs/0605127
Daniel Lemire
Steven Keith, Owen Kaser, Daniel Lemire
Analyzing Large Collections of Electronic Text Using OLAP
null
null
null
TR-05-001
cs.DB cs.DL
null
Computer-assisted reading and analysis of text has various applications in the humanities and social sciences. The increasing size of many electronic text archives has the advantage of a more complete analysis but the disadvantage of taking longer to obtain results. On-Line Analytical Processing is a method used to store and quickly analyze multidimensional data. By storing text analysis information in an OLAP system, a user can obtain solutions to inquiries in a matter of seconds as opposed to minutes, hours, or even days. This analysis is user-driven allowing various users the freedom to pursue their own direction of research.
[ { "version": "v1", "created": "Sat, 27 May 2006 00:51:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Keith", "Steven", "" ], [ "Kaser", "Owen", "" ], [ "Lemire", "Daniel", "" ] ]
cs/0605128
Riccardo Pucella
Alexander Kurz
Logic Column 15: Coalgebras and Their Logics
21 pages
SIGACT News 37 (2), pp. 57-77, 2006
null
null
cs.LO
null
This article describes recent work on the topic of specifying properties of transition systems. By giving a suitably abstract description of transition systems as coalgebras, it is possible to derive logics for capturing properties of these transition systems in an elegant way.
[ { "version": "v1", "created": "Sun, 28 May 2006 19:30:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurz", "Alexander", "" ] ]
cs/0605131
Simon Morgan
Simon P Morgan
Notes on Geometric Measure Theory Applications to Image Processing; De-noising, Segmentation, Pattern, Texture, Lines, Gestalt and Occlusion
9 pages, no figures. This informal discussion paper will be updated periodically
null
null
null
cs.CV
null
Regularization functionals that lower level set boundary length when used with L^1 fidelity functionals on signal de-noising on images create artifacts. These are (i) rounding of corners, (ii) shrinking of radii, (iii) shrinking of cusps, and (iv) non-smoothing of staircasing. Regularity functionals based upon total curvature of level set boundaries do not create artifacts (i) and (ii). An adjusted fidelity term based on the flat norm on the current (a distributional graph) representing the density of curvature of level sets boundaries can minimize (iii) by weighting the position of a cusp. A regularity term to eliminate staircasing can be based upon the mass of the current representing the graph of an image function or its second derivatives. Densities on the Grassmann bundle of the Grassmann bundle of the ambient space of the graph can be used to identify patterns, textures, occlusion and lines.
[ { "version": "v1", "created": "Mon, 29 May 2006 13:27:38 GMT" }, { "version": "v2", "created": "Tue, 30 May 2006 05:50:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Morgan", "Simon P", "" ] ]
cs/0605132
Krzysztof R. Apt
Krzysztof R. Apt and Tadeusz Radzik
Stable partitions in coalitional games
18 pages
null
null
null
cs.GT cs.MA
null
We propose a notion of a stable partition in a coalitional game that is parametrized by the concept of a defection function. This function assigns to each partition of the grand coalition a set of different coalition arrangements for a group of defecting players. The alternatives are compared using their social welfare. We characterize the stability of a partition for a number of most natural defection functions and investigate whether and how so defined stable partitions can be reached from any initial partition by means of simple transformations. The approach is illustrated by analyzing an example in which a set of stores seeks an optimal transportation arrangement.
[ { "version": "v1", "created": "Mon, 29 May 2006 16:03:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Radzik", "Tadeusz", "" ] ]
cs/0605133
Benoit Donnet
Benoit Donnet Philippe Raoult Timur Friedman
Efficient Route Tracing from a Single Source
null
null
null
null
cs.NI
null
Traceroute is a networking tool that allows one to discover the path that packets take from a source machine, through the network, to a destination machine. It is widely used as an engineering tool, and also as a scientific tool, such as for discovery of the network topology at the IP level. In prior work, authors on this technical report have shown how to improve the efficiency of route tracing from multiple cooperating monitors. However, it is not unusual for a route tracing monitor to operate in isolation. Somewhat different strategies are required for this case, and this report is the first systematic study of those requirements. Standard traceroute is inefficient when used repeatedly towards multiple destinations, as it repeatedly probes the same interfaces close to the source. Others have recognized this inefficiency and have proposed tracing backwards from the destinations and stopping probing upon encounter with a previously-seen interface. One of this technical report's contributions is to quantify for the first time the efficiency of this approach. Another contribution is to describe the effect of non-responding destinations on this efficiency. Since a large portion of destination machines do not reply to probe packets, backwards probing from the destination is often infeasible. We propose an algorithm to tackle non-responding destinations, and we find that our algorithm can strongly decrease probing redundancy at the cost of a small reduction in node and link discovery.
[ { "version": "v1", "created": "Mon, 29 May 2006 16:08:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Benoit Donnet Philippe Raoult Timur", "" ] ]
cs/0605134
Boon-Chong Seet
Boon-Chong Seet, Bu-Sung Lee, and Chiew-Tong Lau
DSR with Non-Optimal Route Suppression for MANETs
10 pages, 17 figures
null
null
null
cs.NI
null
This paper revisits the issue of route discovery in dynamic source routing (DSR) for mobile ad hoc networks (MANETs), and puts forward a proposal of a lightweight non-optimal route suppression technique based on the observation of a rarely noted but commonly occurring phenomenon in route discovery. The technique exploits the observed phenomenon to extract query state information that permits intermediate nodes to identify and suppress the initiation of route replies with non-optimal routes, even if the route query is received for the first time. A detailed evaluation of DSR with non-optimal route suppression is found to yield significant improvements in both protocol efficiency and performance.
[ { "version": "v1", "created": "Mon, 29 May 2006 17:33:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Seet", "Boon-Chong", "" ], [ "Lee", "Bu-Sung", "" ], [ "Lau", "Chiew-Tong", "" ] ]
cs/0605136
Bourgeois Gerald
Gerald Bourgeois
Attaque algebrique de NTRU a l'aide des vecteurs de Witt
6 pages; correction of the miscalculations
null
null
null
cs.CR
null
One improves an algebraic attack of NTRU due to Silverman, Smart and Vercauteren; the latter considered the first 2 bits of a Witt vector attached to the research of the secret key; here the first 4 bits are considered, which provides additional equations of degrees 4 and 8.
[ { "version": "v1", "created": "Mon, 29 May 2006 22:42:24 GMT" }, { "version": "v2", "created": "Mon, 5 Jun 2006 22:44:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Bourgeois", "Gerald", "" ] ]
cs/0605138
Victor Kryssanov
V.V. Kryssanov, V.A. Abramov, Y. Fukuda, K. Konishi
The meaning of manufacturing know-how
12 pages. Preprint completed in March 1998. Presented in part at PROLAMAT'98
In: G. Jacucci, G.J. Olling, K. Preiss, and M. Wozny (eds), The Globalization of Manufacturing in the Digital Communications Era of the 21st Century: Innovation, Agility and the Virtual Enterprise, pp. 375-387. 1998, Kluwer Academic Publishers
null
null
cs.AI cs.CE
null
This paper investigates the phenomenon of manufacturing know-how. First, the abstract notion of knowledge is discussed, and a terminological basis is introduced to treat know-how as a kind of knowledge. Next, a brief survey of the recently reported works dealt with manufacturing know-how is presented, and an explicit definition of know-how is formulated. Finally, the problem of utilizing know-how with knowledge-based systems is analyzed, and some ideas useful for its solving are given.
[ { "version": "v1", "created": "Tue, 30 May 2006 05:12:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Abramov", "V. A.", "" ], [ "Fukuda", "Y.", "" ], [ "Konishi", "K.", "" ] ]
cs/0605139
Na Li
Na Li and Wen-Feng Qi
Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity
This paper has been submitted on March 9, 2006
null
null
null
cs.CR
null
Algebraic immunity has been proposed as an important property of Boolean functions. To resist algebraic attack, a Boolean function should possess high algebraic immunity. It is well known now that the algebraic immunity of an $n$-variable Boolean function is upper bounded by $\left\lceil {\frac{n}{2}} \right\rceil $. In this paper, for an odd integer $n$, we present a construction method which can efficiently generate a Boolean function of $n$ variables with maximum algebraic immunity, and we also show that any such function can be generated by this method. Moreover, the number of such Boolean functions is greater than $2^{2^{n-1}}$.
[ { "version": "v1", "created": "Tue, 30 May 2006 16:54:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Na", "" ], [ "Qi", "Wen-Feng", "" ] ]
cs/0606001
David Steurer
David Steurer
Tight Bounds for the Min-Max Boundary Decomposition Cost of Weighted Graphs
41 pages, full version of a paper that will appear in SPAA`06
null
null
null
cs.DS cs.DM
null
Many load balancing problems that arise in scientific computing applications ask to partition a graph with weights on the vertices and costs on the edges into a given number of almost equally-weighted parts such that the maximum boundary cost over all parts is small. Here, this partitioning problem is considered for bounded-degree graphs G=(V,E) with edge costs c: E->R+ that have a p-separator theorem for some p>1, i.e., any (arbitrarily weighted) subgraph of G can be separated into two parts of roughly the same weight by removing a vertex set S such that the edges incident to S in the subgraph have total cost at most proportional to (SUM_e c^p_e)^(1/p), where the sum is over all edges e in the subgraph. We show for all positive integers k and weights w that the vertices of G can be partitioned into k parts such that the weight of each part differs from the average weight by less than MAX{w_v; v in V}, and the boundary edges of each part have cost at most proportional to (SUM_e c_e^p/k)^(1/p) + MAX_e c_e. The partition can be computed in time nearly proportional to the time for computing a separator S of G. Our upper bound on the boundary costs is shown to be tight up to a constant factor for infinitely many instances with a broad range of parameters. Previous results achieved this bound only if one has c=1, w=1, and one allows parts with weight exceeding the average by a constant fraction.
[ { "version": "v1", "created": "Thu, 1 Jun 2006 01:47:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Steurer", "David", "" ] ]
cs/0606003
David Lorenz
Sergei Kojarski and David H. Lorenz
Modeling Aspect Mechanisms: A Top-Down Approach
null
In Proceedings of the 28th International Conference on Software Engineering (ICSE'06), pages 212--221, Shanghai, China, May 20-28, 2006
null
CS-2006-04
cs.SE cs.PL
null
A plethora of diverse aspect mechanisms exist today, all of which integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a characterization of the design space that these aspect mechanisms inhabit and a model description of their weaving processes. A good design space representation provides a common framework for understanding and evaluating existing mechanisms. A well-understood model of the weaving process can guide the implementor of new aspect mechanisms. It can guide the designer when mechanisms implementing new kinds of weaving are needed. It can also help teach aspect-oriented programming (AOP). In this paper we present and evaluate such a model of the design space for aspect mechanisms and their weaving processes. We model weaving, at an abstract level, as a concern integration process. We derive a weaving process model (WPM) top-down, differentiating a reactive from a nonreactive process. The model provides an in-depth explanation of the key subpro existing aspect mechanisms.
[ { "version": "v1", "created": "Thu, 1 Jun 2006 02:14:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Kojarski", "Sergei", "" ], [ "Lorenz", "David H.", "" ] ]
cs/0606004
Victor Kryssanov
V.V. Kryssanov, V.A. Abramov, H. Hibino, Y. Fukuda
A Framework for the Development of Manufacturing Simulators: Towards New Generation of Simulation Systems
9 pages, 6 figures. Preprint completed in 1998
In: H. Fujimoto and R.E. DeVor (eds), Proceedings of the 1998 Japan-U.S.A. Symposium on Flexible Automation. 1998, Vol. III, pp. 1307-1314
null
null
cs.CE cs.HC
null
In this paper, an attempt is made to systematically discuss the development of simulation systems for manufacturing system design. General requirements on manufacturing simulators are formulated and a framework to address the requirements is suggested. Problems of information representation as an activity underlying simulation are considered. This is to form the necessary mathematical foundation for manufacturing simulations. The theoretical findings are explored through a pilot study. A conclusion about the suitability of the suggested approach to the development of simulation systems for manufacturing system design is made, and implications for future research are described.
[ { "version": "v1", "created": "Thu, 1 Jun 2006 02:36:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Abramov", "V. A.", "" ], [ "Hibino", "H.", "" ], [ "Fukuda", "Y.", "" ] ]
cs/0606007
Andrew Pavlo
Andrew Pavlo (1), Christopher Homan (2), Jonathan Schull (2) ((1) University of Wisconsin-Madison, (2) Rochester Institute of Technology)
A parent-centered radial layout algorithm for interactive graph visualization and animation
null
null
null
null
cs.HC cs.CG cs.GR
null
We have developed (1) a graph visualization system that allows users to explore graphs by viewing them as a succession of spanning trees selected interactively, (2) a radial graph layout algorithm, and (3) an animation algorithm that generates meaningful visualizations and smooth transitions between graphs while minimizing edge crossings during transitions and in static layouts. Our system is similar to the radial layout system of Yee et al. (2001), but differs primarily in that each node is positioned on a coordinate system centered on its own parent rather than on a single coordinate system for all nodes. Our system is thus easy to define recursively and lends itself to parallelization. It also guarantees that layouts have many nice properties, such as: it guarantees certain edges never cross during an animation. We compared the layouts and transitions produced by our algorithms to those produced by Yee et al. Results from several experiments indicate that our system produces fewer edge crossings during transitions between graph drawings, and that the transitions more often involve changes in local scaling rather than structure. These findings suggest the system has promise as an interactive graph exploration tool in a variety of settings.
[ { "version": "v1", "created": "Thu, 1 Jun 2006 16:56:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Pavlo", "Andrew", "" ], [ "Homan", "Christopher", "" ], [ "Schull", "Jonathan", "" ] ]
cs/0606009
Lane A. Hemaspaandra
Piotr Faliszewski and Lane A. Hemaspaandra
The Consequences of Eliminating NP Solutions
null
null
null
URCS TR-2006-898
cs.CC
null
Given a function based on the computation of an NP machine, can one in general eliminate some solutions? That is, can one in general decrease the ambiguity? This simple question remains, even after extensive study by many researchers over many years, mostly unanswered. However, complexity-theoretic consequences and enabling conditions are known. In this tutorial-style article we look at some of those, focusing on the most natural framings: reducing the number of solutions of NP functions, refining the solutions of NP functions, and subtracting from or otherwise shrinking #P functions. We will see how small advice strings are important here, but we also will see how increasing advice size to achieve robustness is central to the proof of a key ambiguity-reduction result for NP functions.
[ { "version": "v1", "created": "Fri, 2 Jun 2006 01:34:26 GMT" }, { "version": "v2", "created": "Tue, 13 Jun 2006 18:01:43 GMT" }, { "version": "v3", "created": "Mon, 19 Jun 2006 18:21:11 GMT" }, { "version": "v4", "created": "Wed, 16 Aug 2006 17:15:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Faliszewski", "Piotr", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
cs/0606010
Victor Kryssanov
V.V. Kryssanov, V.A. Abramov, Y. Fukuda, K. Konishi
A Decision-Making Support System Based on Know-How
6 pages, 5 figures. Preprint completed in 1997
CIRP Journal of Manufacturing Systems. 1998, Vol. 27, No.4, 427-432
null
null
cs.CE cs.AI
null
The research results described are concerned with: - developing a domain modeling method and tools to provide the design and implementation of decision-making support systems for computer integrated manufacturing; - building a decision-making support system based on know-how and its software environment. The research is funded by NEDO, Japan.
[ { "version": "v1", "created": "Fri, 2 Jun 2006 03:06:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Abramov", "V. A.", "" ], [ "Fukuda", "Y.", "" ], [ "Konishi", "K.", "" ] ]
cs/0606013
Manuel Abellanas
M. Abellanas, A. Bajuelos, G. Hern\'andez, F. Hurtado, I. Matos, B. Palop
Good Illumination of Minimum Range
null
null
null
null
cs.CG
null
A point p is 1-well illuminated by a set F of n point lights if p lies in the interior of the convex hull of F. This concept corresponds to triangle-guarding or well-covering. In this paper we consider the illumination range of the light sources as a parameter to be optimized. First, we solve the problem of minimizing the light sources' illumination range to 1-well illuminate a given point p. We also compute a minimal set of light sources that 1-well illuminates p with minimum illumination range. Second, we solve the problem of minimizing the light sources' illumination range to 1-well illuminate all the points of a line segment with an O(n^2) algorithm. Finally, we give an O(n^2 log n) algorithm for preprocessing the data so that one can obtain the illumination range needed to 1-well illuminate a point of a line segment in O(log n) time. These results can be applied to solve problems of 1-well illuminating a trajectory by approaching it to a polygonal path.
[ { "version": "v1", "created": "Fri, 2 Jun 2006 11:24:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Abellanas", "M.", "" ], [ "Bajuelos", "A.", "" ], [ "Hernández", "G.", "" ], [ "Hurtado", "F.", "" ], [ "Matos", "I.", "" ], [ "Palop", "B.", "" ] ]
cs/0606018
Matthias Bauer
Matthias Bauer and Benjamin Fabian and Matthias Fischmann and Seda G\"urses
Emerging Markets for RFID Traces
submitted to WPES2006. Two figures are missing because of latex vs. pdflatex incompatibilities
null
null
null
cs.CY cs.CR
null
RFID tags are held to become ubiquitous in logistics in the near future, and item-level tagging will pave the way for Ubiquitous Computing, for example in application fields like smart homes. Our paper addresses the value and the production cost of information that can be gathered by observing these tags over time and different locations. We argue that RFID technology will induce a thriving market for such information, resulting in easy data access for analysts to infer business intelligence and individual profiles of unusually high detail. Understanding these information markets is important for many reasons: They represent new business opportunities, and market players need to be aware of their roles in these markets. Policy makers need to confirm that the market structure will not negatively affect overall welfare. Finally, though we are not addressing the complex issue of privacy, we are convinced that market forces will have a significant impact on the effectiveness of deployed security enhancements to RFID technology. In this paper we take a few first steps into a relatively new field of economic research and conclude with a list of research problems that promise deeper insights into the matter.
[ { "version": "v1", "created": "Mon, 5 Jun 2006 15:29:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Bauer", "Matthias", "" ], [ "Fabian", "Benjamin", "" ], [ "Fischmann", "Matthias", "" ], [ "Gürses", "Seda", "" ] ]
cs/0606020
Vadim Astakhov
Vadim Astakhov, Tamara Astakhova, Brian Sanders
Imagination as Holographic Processor for Text Animation
10 pages, 10 figures, prototype presented at 4th International Conference on Computer Science and its Applications (ICCSA-2006), paper submited to SIGCHI 2007
null
null
null
cs.AI
null
Imagination is the critical point in developing of realistic artificial intelligence (AI) systems. One way to approach imagination would be simulation of its properties and operations. We developed two models: AI-Brain Network Hierarchy of Languages and Semantical Holographic Calculus as well as simulation system ScriptWriter that emulate the process of imagination through an automatic animation of English texts. The purpose of this paper is to demonstrate the model and to present ScriptWriter system http://nvo.sdsc.edu/NVO/JCSG/get_SRB_mime_file2.cgi//home/tamara.sdsc/test/demo.zip?F=/home/tamara.sdsc/test/demo.zip&M=application/x-gtar for simulation of the imagination.
[ { "version": "v1", "created": "Mon, 5 Jun 2006 23:55:37 GMT" }, { "version": "v2", "created": "Wed, 10 Jan 2007 23:47:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Astakhov", "Vadim", "" ], [ "Astakhova", "Tamara", "" ], [ "Sanders", "Brian", "" ] ]
cs/0606021
Victor Kryssanov
H. Tamaki, V.V. Kryssanov, S. Kitamura
A simulation engine to support production scheduling using genetics-based machine learning
8 pages, 2 figures, 1 table. Preprint completed in 1998
In: K. Mertins, O. Krause, and B. Schallock (eds), Global Production Management, pp. 482-489. 1999, Kluwer Academic Publishers
null
null
cs.CE cs.AI
null
The ever higher complexity of manufacturing systems, continually shortening life cycles of products and their increasing variety, as well as the unstable market situation of the recent years require introducing grater flexibility and responsiveness to manufacturing processes. From this perspective, one of the critical manufacturing tasks, which traditionally attract significant attention in both academia and the industry, but which have no satisfactory universal solution, is production scheduling. This paper proposes an approach based on genetics-based machine learning (GBML) to treat the problem of flow shop scheduling. By the approach, a set of scheduling rules is represented as an individual of genetic algorithms, and the fitness of the individual is estimated based on the makespan of the schedule generated by using the rule-set. A concept of the interactive software environment consisting of a simulator and a GBML simulation engine is introduced to support human decision-making during scheduling. A pilot study is underway to evaluate the performance of the GBML technique in comparison with other methods (such as Johnson's algorithm and simulated annealing) while completing test examples.
[ { "version": "v1", "created": "Tue, 6 Jun 2006 09:30:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Tamaki", "H.", "" ], [ "Kryssanov", "V. V.", "" ], [ "Kitamura", "S.", "" ] ]
cs/0606024
Edgar Graaf de
Edgar de Graaf, Jeannette de Graaf, and Walter A. Kosters
Consecutive Support: Better Be Close!
10 pages
null
null
null
cs.AI cs.DB
null
We propose a new measure of support (the number of occur- rences of a pattern), in which instances are more important if they occur with a certain frequency and close after each other in the stream of trans- actions. We will explain this new consecutive support and discuss how patterns can be found faster by pruning the search space, for instance using so-called parent support recalculation. Both consecutiveness and the notion of hypercliques are incorporated into the Eclat algorithm. Synthetic examples show how interesting phenomena can now be discov- ered in the datasets. The new measure can be applied in many areas, ranging from bio-informatics to trade, supermarkets, and even law en- forcement. E.g., in bio-informatics it is important to find patterns con- tained in many individuals, where patterns close together in one chro- mosome are more significant.
[ { "version": "v1", "created": "Tue, 6 Jun 2006 14:28:42 GMT" } ]
2007-05-23T00:00:00
[ [ "de Graaf", "Edgar", "" ], [ "de Graaf", "Jeannette", "" ], [ "Kosters", "Walter A.", "" ] ]
cs/0606027
Victor Kryssanov
V.V. Kryssanov, A.S. Kleshchev, Y. Fukuda, and K. Konishi
Building a logical model in the machining domain for CAPP expert systems
25 pages, 4 figures. Preprint completed in 1997
International Journal of Production Research, 1998, vol. 36, No. 4, 1075-1089
null
null
cs.AI cs.CE cs.SE
null
Recently, extensive efforts have been made on the application of expert system technique to solving the process planning task in the machining domain. This paper introduces a new formal method to design CAPP expert systems. The formal method is applied to provide a contour of the CAPP expert system building technology. Theoretical aspects of the formalism are described and illustrated by an example of know-how analysis. Flexible facilities to utilize multiple knowledge types and multiple planning strategies within one system are provided by the technology.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 03:46:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Kleshchev", "A. S.", "" ], [ "Fukuda", "Y.", "" ], [ "Konishi", "K.", "" ] ]
cs/0606028
Evgenia Adutskevich
E.V. Adutskevich, S.V. Bakhanovich, N.A. Likhoded
Affine Transformations of Loop Nests for Parallel Execution and Distribution of Data over Processors
9 pages
Preprint / The National Academy of Sciences of Belarus. Institute of Mathematics: N 3 (574). Minsk, 2005
null
null
cs.DC
null
The paper is devoted to the problem of mapping affine loop nests onto distributed memory parallel computers. A method to find affine transformations of loop nests for parallel execution and distribution of data over processors is presented. The method tends to minimize the number of communications between processors and to improve locality of data within one processor. A problem of determination of data exchange sequence is investigated. Conditions to determine the ability to arrange broadcast is presented.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 12:59:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Adutskevich", "E. V.", "" ], [ "Bakhanovich", "S. V.", "" ], [ "Likhoded", "N. A.", "" ] ]
cs/0606029
Audun Josang
Audun Josang
Belief Calculus
22 pages, 10 figures
null
null
null
cs.AI
null
In Dempster-Shafer belief theory, general beliefs are expressed as belief mass distribution functions over frames of discernment. In Subjective Logic beliefs are expressed as belief mass distribution functions over binary frames of discernment. Belief representations in Subjective Logic, which are called opinions, also contain a base rate parameter which express the a priori belief in the absence of evidence. Philosophically, beliefs are quantitative representations of evidence as perceived by humans or by other intelligent agents. The basic operators of classical probability calculus, such as addition and multiplication, can be applied to opinions, thereby making belief calculus practical. Through the equivalence between opinions and Beta probability density functions, this also provides a calculus for Beta probability density functions. This article explains the basic elements of belief calculus.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 14:32:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Josang", "Audun", "" ] ]
cs/0606031
Guillaume Moroz
Guillaume Moroz (LIP6, INRIA Rocquencourt)
Complexity of Resolution of Parametric Systems of Polynomial Equations and Inequations
null
null
null
null
cs.SC
null
Consider a system of n polynomial equations and r polynomial inequations in n indeterminates of degree bounded by d with coefficients in a polynomial ring of s parameters with rational coefficients of bit-size at most $\sigma$. From the real viewpoint, solving such a system often means describing some semi-algebraic sets in the parameter space over which the number of real solutions of the considered parametric system is constant. Following the works of Lazard and Rouillier, this can be done by the computation of a discriminant variety. In this report we focus on the case where for a generic specialization of the parameters the system of equations generates a radical zero-dimensional ideal, which is usual in the applications. In this case, we provide a deterministic method computing the minimal discriminant variety reducing the problem to a problem of elimination. Moreover, we prove that the degree of the computed minimal discriminant variety is bounded by $D:=(n+r)d^{(n+1)}$ and that the complexity of our method is $\sigma^{\mathcal{O}(1)} D^{\mathcal{O}(n+s)}$ bit-operations on a deterministic Turing machine.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 14:44:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Moroz", "Guillaume", "", "LIP6, INRIA Rocquencourt" ] ]
cs/0606032
Andreas U. Schmidt
Christian Hett, Nicolai Kuntze, and Andreas U. Schmidt
A secure archive for Voice-over-IP conversations
9 pages, 2 figures. (C) ACM, (2006). This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of VSW06, June, 2006, Berlin, Germany
null
null
null
cs.CR
null
An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signatures. Security is concentrated in a single, efficient component, allowing for a detailed analysis.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 17:04:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hett", "Christian", "" ], [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0606033
Michael Stay
Cristian S. Calude and Michael A. Stay
Natural Halting Probabilities, Partial Randomness, and Zeta Functions
Accepted for publication in Information and Computing
null
null
CDMTCS 273
cs.CC
null
We introduce the zeta number, natural halting probability and natural complexity of a Turing machine and we relate them to Chaitin's Omega number, halting probability, and program-size complexity. A classification of Turing machines according to their zeta numbers is proposed: divergent, convergent and tuatara. We prove the existence of universal convergent and tuatara machines. Various results on (algorithmic) randomness and partial randomness are proved. For example, we show that the zeta number of a universal tuatara machine is c.e. and random. A new type of partial randomness, asymptotic randomness, is introduced. Finally we show that in contrast to classical (algorithmic) randomness--which cannot be naturally characterised in terms of plain complexity--asymptotic randomness admits such a characterisation.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 20:18:13 GMT" }, { "version": "v2", "created": "Tue, 11 Jul 2006 21:35:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Calude", "Cristian S.", "" ], [ "Stay", "Michael A.", "" ] ]
cs/0606034
Teddy Furon
Teddy Furon (IRISA)
A constructive and unifying framework for zero-bit watermarking
submitted to IEEE Trans. on Information Forensics and Security
null
null
null
cs.MM cs.CR
null
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the presence of this particular weak signal in content. The article looks at this problem from a classical detection theory point of view, but with side information enabled at the embedding side. This means that the watermark signal is a function of the host content. Our study is twofold. The first step is to design the best embedding function for a given detection function, and the best detection function for a given embedding function. This yields two conditions, which are mixed into one `fundamental' partial differential equation. It appears that many famous watermarking schemes are indeed solution to this `fundamental' equation. This study thus gives birth to a constructive framework unifying solutions, so far perceived as very different.
[ { "version": "v1", "created": "Thu, 8 Jun 2006 13:28:07 GMT" }, { "version": "v2", "created": "Fri, 12 Jan 2007 13:11:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Furon", "Teddy", "", "IRISA" ] ]
cs/0606038
Shripad Thite
Shripad Thite
Tight Bounds on the Complexity of Recognizing Odd-Ranked Elements
3 pages
null
null
null
cs.CC cs.DS
null
Let S = <s_1, s_2, s_3, ..., s_n> be a given vector of n real numbers. The rank of a real z with respect to S is defined as the number of elements s_i in S such that s_i is less than or equal to z. We consider the following decision problem: determine whether the odd-numbered elements s_1, s_3, s_5, ... are precisely the elements of S whose rank with respect to S is odd. We prove a bound of Theta(n log n) on the number of operations required to solve this problem in the algebraic computation tree model.
[ { "version": "v1", "created": "Thu, 8 Jun 2006 21:28:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Thite", "Shripad", "" ] ]
cs/0606039
Victor Kryssanov
V.V. Kryssanov, H. Tamaki, S. Kitamura
Evolutionary Design: Philosophy, Theory, and Application Tactics
6 pages, 3 figures. Preprint completed in 1999
CIRP Journal of Manufacturing Systems, 2005, Vol. 34/2
null
null
cs.CE cs.AI
null
Although it has contributed to remarkable improvements in some specific areas, attempts to develop a universal design theory are generally characterized by failure. This paper sketches arguments for a new approach to engineering design based on Semiotics - the science about signs. The approach is to combine different design theories over all the product life cycle stages into one coherent and traceable framework. Besides, it is to bring together the designer's and user's understandings of the notion of 'good product'. Building on the insight from natural sciences that complex systems always exhibit a self-organizing meaning-influential hierarchical dynamics, objective laws controlling product development are found through an examination of design as a semiosis process. These laws are then applied to support evolutionary design of products. An experiment validating some of the theoretical findings is outlined, and concluding remarks are given.
[ { "version": "v1", "created": "Fri, 9 Jun 2006 08:00:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Tamaki", "H.", "" ], [ "Kitamura", "S.", "" ] ]
cs/0606041
Ming-Zhe Chen
Ming-Zhe Chen
Characterization of Pentagons Determined by Two X-rays
4 pages, 2 figures
null
null
null
cs.CG
null
This paper contains some results of pentagons which can be determined by two X-rays. The results reveal this problem is more complicated.
[ { "version": "v1", "created": "Fri, 9 Jun 2006 14:13:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Ming-Zhe", "" ] ]
cs/0606042
Laurent Hascoet
Laurent Hascoet (INRIA Sophia Antipolis), Mauricio Araya-Polo (INRIA Sophia Antipolis)
Enabling user-driven Checkpointing strategies in Reverse-mode Automatic Differentiation
null
null
null
null
cs.DS
null
This paper presents a new functionality of the Automatic Differentiation (AD) tool Tapenade. Tapenade generates adjoint codes which are widely used for optimization or inverse problems. Unfortunately, for large applications the adjoint code demands a great deal of memory, because it needs to store a large set of intermediates values. To cope with that problem, Tapenade implements a sub-optimal version of a technique called checkpointing, which is a trade-off between storage and recomputation. Our long-term goal is to provide an optimal checkpointing strategy for every code, not yet achieved by any AD tool. Towards that goal, we first introduce modifications in Tapenade in order to give the user the choice to select the checkpointing strategy most suitable for their code. Second, we conduct experiments in real-size scientific codes in order to gather hints that help us to deduce an optimal checkpointing strategy. Some of the experimental results show memory savings up to 35% and execution time up to 90%.
[ { "version": "v1", "created": "Fri, 9 Jun 2006 16:01:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Hascoet", "Laurent", "", "INRIA Sophia Antipolis" ], [ "Araya-Polo", "Mauricio", "", "INRIA\n Sophia Antipolis" ] ]
cs/0606043
Pierre Lopez
Christian Artigues (LIA), Pierre Lopez (LAAS), Pierre-Dimitri Ayache (LIA)
Schedule generation schemes for the job-shop problem with sequence-dependent setup times: dominance properties and computational analysis
null
Annals of Operations Research 138 (2005) 21-52
null
null
cs.CC math.CO
null
We consider the job-shop problem with sequence-dependent setup times. We focus on the formal definition of schedule generation schemes (SGSs) based on the semi-active, active, and non-delay schedule categories. We study dominance properties of the sets of schedules obtainable with each SGS. We show how the proposed SGSs can be used within single-pass and multi-pass priority rule based heuristics. We study several priority rules for the problem and provide a comparative computational analysis of the different SGSs on sets of instances taken from the literature. The proposed SGSs significantly improve previously best-known results on a set of hard benchmark instances.
[ { "version": "v1", "created": "Fri, 9 Jun 2006 16:32:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Artigues", "Christian", "", "LIA" ], [ "Lopez", "Pierre", "", "LAAS" ], [ "Ayache", "Pierre-Dimitri", "", "LIA" ] ]
cs/0606045
Andreas U. Schmidt
Nicolai Kuntze and Andreas U. Schmidt
Trusted Computing in Mobile Action
In: Peer-reviewed Proceedings of the Information Security South Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006, Sandton, South Africa
null
null
null
cs.CR
null
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to support more efficient ways to authenticate users and devices, potentially enabling novel services based on the security provided by the infrastructure. In this paper we exhibit some usage scenarios from the mobile domain integrating trusted computing, which show that trusted computing offers new paradigms for implementing trust and by this enables new technical applications and business scenarios. The scenarios show how the traditional boundaries between technical and authentication domains become permeable while a high security level is maintained.
[ { "version": "v1", "created": "Sat, 10 Jun 2006 09:52:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0606046
Andreas U. Schmidt
Jan Piechalski and Andreas U. Schmidt
Authorised Translations of Electronic Documents
In: Peer-reviewed Proceedings of the Information Security South Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006, Sandton, South Africa
null
null
null
cs.OH
null
A concept is proposed to extend authorised translations of documents to electronically signed, digital documents. Central element of the solution is an electronic seal, embodied as an XML data structure, which attests to the correctness of the translation and the authorisation of the translator. The seal contains a digital signature binding together original and translated document, thus enabling forensic inspection and therefore legal security in the appropriation of the translation. Organisational aspects of possible implementation variants of electronic authorised translations are discussed and a realisation as a stand-alone web-service is presented.
[ { "version": "v1", "created": "Sat, 10 Jun 2006 10:37:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Piechalski", "Jan", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0606047
Giorgos Kollias
Giorgos Kollias, Efstratios Gallopoulos, Daniel B. Szyld
Asynchronous iterative computations with Web information retrieval structures: The PageRank case
8 pages to appear at ParCo2005 Conference Proceedings
null
null
TR HPCLAB-SCG 5/08-05
cs.DC
null
There are several ideas being used today for Web information retrieval, and specifically in Web search engines. The PageRank algorithm is one of those that introduce a content-neutral ranking function over Web pages. This ranking is applied to the set of pages returned by the Google search engine in response to posting a search query. PageRank is based in part on two simple common sense concepts: (i)A page is important if many important pages include links to it. (ii)A page containing many links has reduced impact on the importance of the pages it links to. In this paper we focus on asynchronous iterative schemes to compute PageRank over large sets of Web pages. The elimination of the synchronizing phases is expected to be advantageous on heterogeneous platforms. The motivation for a possible move to such large scale distributed platforms lies in the size of matrices representing Web structure. In orders of magnitude: $10^{10}$ pages with $10^{11}$ nonzero elements and $10^{12}$ bytes just to store a small percentage of the Web (the already crawled); distributed memory machines are necessary for such computations. The present research is part of our general objective, to explore the potential of asynchronous computational models as an underlying framework for very large scale computations over the Grid. The area of ``internet algorithmics'' appears to offer many occasions for computations of unprecedent dimensionality that would be good candidates for this framework.
[ { "version": "v1", "created": "Sun, 11 Jun 2006 09:36:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Kollias", "Giorgos", "" ], [ "Gallopoulos", "Efstratios", "" ], [ "Szyld", "Daniel B.", "" ] ]
cs/0606050
Prabhu Manyem
Prabhu Manyem
Syntactic Characterisations of Polynomial-Time Optimisation Classes (Syntactic Characterizations of Polynomial-Time Optimization Classes)
17 pages; presented at the July 2005 ACiD workshop at Durham, England; Included both American and British commonwealth spellings, so as to generate hits from readers in North America as well as from Commonwealth countries and Europe
null
null
null
cs.CC cs.LO
null
In Descriptive Complexity, there is a vast amount of literature on decision problems, and their classes such as \textbf{P, NP, L and NL}. ~ However, research on the descriptive complexity of optimisation problems has been limited. Optimisation problems corresponding to the \textbf{NP} class have been characterised in terms of logic expressions by Papadimitriou and Yannakakis, Panconesi and Ranjan, Kolaitis and Thakur, Khanna et al, and by Zimand. Gr\"{a}del characterised the polynomial class \textbf{P} of decision problems. In this paper, we attempt to characterise the optimisation versions of \textbf{P} via expressions in second order logic, many of them using universal Horn formulae with successor relations. The polynomially bound versions of maximisation (maximization) and minimisation (minimization) problems are treated first, and then the maximisation problems in the "not necessarily polynomially bound" class.
[ { "version": "v1", "created": "Mon, 12 Jun 2006 00:42:29 GMT" }, { "version": "v2", "created": "Fri, 6 Oct 2006 23:49:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Manyem", "Prabhu", "" ] ]
cs/0606054
Qiming Lu
Qiming Lu, Gyorgy Korniss, Boleslaw K. Szymanski
Threshold-Controlled Global Cascading in Wireless Sensor Networks
null
Proceeding of third International Conference on Networked Sensing Systems, 164-171 (TRF, 2006)
null
null
cs.NI
null
We investigate cascade dynamics in threshold-controlled (multiplex) propagation on random geometric networks. We find that such local dynamics can serve as an efficient, robust, and reliable prototypical activation protocol in sensor networks in responding to various alarm scenarios. We also consider the same dynamics on a modified network by adding a few long-range communication links, resulting in a small-world network. We find that such construction can further enhance and optimize the speed of the network's response, while keeping energy consumption at a manageable level.
[ { "version": "v1", "created": "Mon, 12 Jun 2006 19:30:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Lu", "Qiming", "" ], [ "Korniss", "Gyorgy", "" ], [ "Szymanski", "Boleslaw K.", "" ] ]
cs/0606055
Jean Gallier
Jean Gallier
Simple Methods For Drawing Rational Surfaces as Four or Six Bezier Patches
33 pages
null
null
null
cs.CG cs.GR
null
In this paper, we give several simple methods for drawing a whole rational surface (without base points) as several Bezier patches. The first two methods apply to surfaces specified by triangular control nets and partition the real projective plane RP2 into four and six triangles respectively. The third method applies to surfaces specified by rectangular control nets and partitions the torus RP1 X RP1 into four rectangular regions. In all cases, the new control nets are obtained by sign flipping and permutation of indices from the original control net. The proofs that these formulae are correct involve very little computations and instead exploit the geometry of the parameter space (RP2 or RP1 X RP1). We illustrate our method on some classical examples. We also propose a new method for resolving base points using a simple ``blowing up'' technique involving the computation of ``resolved'' control nets.
[ { "version": "v1", "created": "Mon, 12 Jun 2006 22:02:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Gallier", "Jean", "" ] ]
cs/0606056
Jean Gallier
Jean Gallier and Weqing Gu
Fast and Simple Methods For Computing Control Points
15 pages
null
null
null
cs.CC cs.GR
null
The purpose of this paper is to present simple and fast methods for computing control points for polynomial curves and polynomial surfaces given explicitly in terms of polynomials (written as sums of monomials). We give recurrence formulae w.r.t. arbitrary affine frames. As a corollary, it is amusing that we can also give closed-form expressions in the case of the frame (r, s) for curves, and the frame ((1, 0, 0), (0, 1, 0), (0, 0, 1) for surfaces. Our methods have the same low polynomial (time and space) complexity as the other best known algorithms, and are very easy to implement.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 00:47:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Gallier", "Jean", "" ], [ "Gu", "Weqing", "" ] ]
cs/0606057
Fredrik Kuivinen
Fredrik Kuivinen
Approximability of Bounded Occurrence Max Ones
Accepted to MFCS 2006
null
null
null
cs.CC
null
We study the approximability of Max Ones when the number of variable occurrences is bounded by a constant. For conservative constraint languages (i.e., when the unary relations are included) we give a complete classification when the number of occurrences is three or more and a partial classification when the bound is two. For the non-conservative case we prove that it is either trivial or equivalent to the corresponding conservative problem under polynomial-time many-one reductions.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 06:44:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuivinen", "Fredrik", "" ] ]
cs/0606058
Philippe Chapdelaine
Philippe Chapdelaine, Etienne Grandjean
Lower bounds and complete problems in nondeterministic linear time and sublinear space complexity classes
19 pages, 4 figures
null
null
null
cs.CC cs.LO
null
Proving lower bounds remains the most difficult of tasks in computational complexity theory. In this paper, we show that whereas most natural NP-complete problems belong to NLIN (linear time on nondeterministic RAMs), some of them, typically the planar versions of many NP-complete problems are recognized by nondeterministic RAMs in linear time and sublinear space. The main results of this paper are the following: as the second author did for NLIN, we give exact logical characterizations of nondeterministic polynomial time-space complexity classes; we derive from them a class of problems, which are complete in these classes, and as a consequence of such a precise result and of some recent separation theorems using diagonalization, prove time-space lower bounds for these problems.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 08:10:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Chapdelaine", "Philippe", "" ], [ "Grandjean", "Etienne", "" ] ]
cs/0606060
Luciano da Fontoura Costa
Luciano da Fontoura Costa
Complex Networks: New Concepts and Tools for Real-Time Imaging and Vision
3 pages
null
null
null
cs.CV cs.DC physics.soc-ph
null
This article discusses how concepts and methods of complex networks can be applied to real-time imaging and computer vision. After a brief introduction of complex networks basic concepts, their use as means to represent and characterize images, as well as for modeling visual saliency, are briefly described. The possibility to apply complex networks in order to model and simulate the performance of parallel and distributed computing systems for performance of visual methods is also proposed.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 12:53:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Costa", "Luciano da Fontoura", "" ] ]
cs/0606061
Jean Gallier
Jean Gallier
On the Efficiency of Strategies for Subdividing Polynomial Triangular Surface Patches
20 pages
null
null
null
cs.CG cs.GR
null
In this paper, we investigate the efficiency of various strategies for subdividing polynomial triangular surface patches. We give a simple algorithm performing a regular subdivision in four calls to the standard de Casteljau algorithm (in its subdivision version). A naive version uses twelve calls. We also show that any method for obtaining a regular subdivision using the standard de Casteljau algorithm requires at least 4 calls. Thus, our method is optimal. We give another subdivision algorithm using only three calls to the de Casteljau algorithm. Instead of being regular, the subdivision pattern is diamond-like. Finally, we present a ``spider-like'' subdivision scheme producing six subtriangles in four calls to the de Casteljau algorithm.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 15:09:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Gallier", "Jean", "" ] ]
cs/0606063
Adam Slagell
Adam Slagell, Kiran Lakkaraju and Katherine Luo
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
16 pages, 4 figures, in submission to USENIX Lisa
null
null
null
cs.CR
null
FLAIM (Framework for Log Anonymization and Information Management) addresses two important needs not well addressed by current log anonymizers. First, it is extremely modular and not tied to the specific log being anonymized. Second, it supports multi-level anonymization, allowing system administrators to make fine-grained trade-offs between information loss and privacy/security concerns. In this paper, we examine anonymization solutions to date and note the above limitations in each. We further describe how FLAIM addresses these problems, and we describe FLAIM's architecture and features in detail.
[ { "version": "v1", "created": "Wed, 14 Jun 2006 03:17:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Slagell", "Adam", "" ], [ "Lakkaraju", "Kiran", "" ], [ "Luo", "Katherine", "" ] ]
cs/0606064
Hongtao Sun
Xin Li, Tian Liu, Han Peng, Hongtao Sun, Jiaqi Zhu
Improved Exponential Time Lower Bound of Knapsack Problem under BT model
9 pages, 3 figures
null
null
null
cs.CC
null
M.Alekhnovich et al. recently have proposed a model of algorithms, called BT model, which covers Greedy, Backtrack and Simple Dynamic Programming methods and can be further divided into fixed, adaptive and fully adaptive three kinds, and have proved exponential time lower bounds of exact and approximation algorithms under adaptive BT model for Knapsack problem which are $\Omega(2^{n/2}/\sqrt n)=\Omega(2^{0.5n}/\sqrt n)$ and $\Omega((1/\epsilon)^{1/3.17})\approx\Omega((1/\epsilon)^{0.315})$(for approximation ratio $1-\epsilon$) respectively (M. Alekhovich, A. Borodin, J. Buresh-Oppenheim, R. Impagliazzo, A. Magen, and T. Pitassi, Toward a Model for Backtracking and Dynamic Programming, \emph{Proceedings of Twentieth Annual IEEE Conference on Computational Complexity}, pp308-322, 2005). In this note, we slightly improved their lower bounds to $\Omega(2^{(2-\epsilon)n/3}/\sqrt{n})\approx \Omega(2^{0.66n}/\sqrt{n})$ and $\Omega((1/\epsilon)^{1/2.38})\approx\Omega((1/\epsilon)^{0.420})$, and proposed as an open question what is the best achievable lower bounds for knapsack under adaptive BT models.
[ { "version": "v1", "created": "Wed, 14 Jun 2006 07:54:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Xin", "" ], [ "Liu", "Tian", "" ], [ "Peng", "Han", "" ], [ "Sun", "Hongtao", "" ], [ "Zhu", "Jiaqi", "" ] ]
cs/0606066
Audun Josang
Audun Josang
The Cumulative Rule for Belief Fusion
null
null
null
null
cs.AI
null
The problem of combining beliefs in the Dempster-Shafer belief theory has attracted considerable attention over the last two decades. The classical Dempster's Rule has often been criticised, and many alternative rules for belief combination have been proposed in the literature. The consensus operator for combining beliefs has nice properties and produces more intuitive results than Dempster's rule, but has the limitation that it can only be applied to belief distribution functions on binary state spaces. In this paper we present a generalisation of the consensus operator that can be applied to Dirichlet belief functions on state spaces of arbitrary size. This rule, called the cumulative rule of belief combination, can be derived from classical statistical theory, and corresponds well with human intuition.
[ { "version": "v1", "created": "Wed, 14 Jun 2006 11:36:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Josang", "Audun", "" ] ]
cs/0606068
Andreas U. Schmidt
Christian Hett, Nicolai Kuntze, and Andreas U. Schmidt
Security and Non-Repudiation for Voice-Over-IP Conversations
Poster presentation at the ISSA 2006 From Insight to Foresight Conference, Sandton, South Africa, 5th-7th July 2006
null
null
null
cs.CR
null
We present a concept to achieve non-repudiation for natural language conversations by electronically signing packet-based, digital, voice communication. Signing a VoIP-based conversation means to protect the integrity and authenticity of the bidirectional data stream and its temporal sequence which together establish the security context of the communication. Our concept is conceptually close to the protocols that embody VoIP and provides a high level of inherent security. It enables signatures over voice as true declarations of will, in principle between unacquainted speakers. We point to trusted computing enabled devices as possible trusted signature terminals for voice communication.
[ { "version": "v1", "created": "Wed, 14 Jun 2006 12:24:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Hett", "Christian", "" ], [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]