id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0605021 | Harald Zankl | Harald Zankl | SAT Techniques for Lexicographic Path Orders | 29 pages, Seminar Report | null | null | null | cs.SC | null | This seminar report is concerned with expressing LPO-termination of term
rewrite systems as a satisfiability problem in propositional logic. After
relevant algorithms are explained, experimental results are reported.
| [
{
"version": "v1",
"created": "Fri, 5 May 2006 19:11:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zankl",
"Harald",
""
]
] |
cs/0605022 | Martin Kurth | Martin Kurth, Jim LeBlanc | Toward a Collection-based Metadata Maintenance Model | 10 pages, 4 figures; submitted to DC 2006 | null | null | null | cs.DL | null | In this paper, the authors identify key entities and relationships in the
operational management of metadata catalogs that describe digital collections,
and they draft a data model to support the administration of metadata
maintenance for collections. Further, they consider this proposed model in
light of other data schemes to which it relates and discuss the implications of
the model for library metadata maintenance operations.
| [
{
"version": "v1",
"created": "Fri, 5 May 2006 18:16:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kurth",
"Martin",
""
],
[
"LeBlanc",
"Jim",
""
]
] |
cs/0605024 | Marcus Hutter | Shane Legg and Marcus Hutter | A Formal Measure of Machine Intelligence | 8 two-column pages | Proc. 15th Annual Machine Learning Conference of {B}elgium and The
Netherlands (Benelearn 2006) pages 73-80 | null | IDSIA-10-06 | cs.AI cs.LG | null | A fundamental problem in artificial intelligence is that nobody really knows
what intelligence is. The problem is especially acute when we need to consider
artificial systems which are significantly different to humans. In this paper
we approach this problem in the following way: We take a number of well known
informal definitions of human intelligence that have been given by experts, and
extract their essential features. These are then mathematically formalised to
produce a general measure of intelligence for arbitrary machines. We believe
that this measure formally captures the concept of machine intelligence in the
broadest reasonable sense.
| [
{
"version": "v1",
"created": "Sat, 6 May 2006 16:56:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Legg",
"Shane",
""
],
[
"Hutter",
"Marcus",
""
]
] |
cs/0605025 | Vytautas Perlibakas | Vytautas Perlibakas | Face Recognition using Principal Component Analysis and Log-Gabor
Filters | Unpublished manuscript. March 2005. 23 pages, 7 figures, 5 tables | null | null | null | cs.CV | null | In this article we propose a novel face recognition method based on Principal
Component Analysis (PCA) and Log-Gabor filters. The main advantages of the
proposed method are its simple implementation, training, and very high
recognition accuracy. For recognition experiments we used 5151 face images of
1311 persons from different sets of the FERET and AR databases that allow to
analyze how recognition accuracy is affected by the change of facial
expressions, illumination, and aging. Recognition experiments with the FERET
database (containing photographs of 1196 persons) showed that our method can
achieve maximal 97-98% first one recognition rate and 0.3-0.4% Equal Error
Rate. The experiments also showed that the accuracy of our method is less
affected by eye location errors and used image normalization method than of
traditional PCA -based recognition method.
| [
{
"version": "v1",
"created": "Sun, 7 May 2006 13:30:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perlibakas",
"Vytautas",
""
]
] |
cs/0605026 | Yuri Pritykin | Yuri Pritykin | Strongly Almost Periodic Sequences under Finite Automata Mappings | 7 pages | null | null | null | cs.DM | null | The notion of almost periodicity nontrivially generalizes the notion of
periodicity. Strongly almost periodic sequences (=uniformly recurrent infinite
words) first appeared in the field of symbolic dynamics, but then turned out to
be interesting in connection with computer science. The paper studies the class
of eventually strongly almost periodic sequences (i. e., becoming strongly
almost periodic after deleting some prefix). We prove that the property of
eventual strong almost periodicity is preserved under the mappings done by
finite automata and finite transducers. The class of almost periodic sequences
includes the class of eventually strongly almost periodic sequences. We prove
this inclusion to be strict.
| [
{
"version": "v1",
"created": "Sun, 7 May 2006 14:46:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pritykin",
"Yuri",
""
]
] |
cs/0605027 | Vytautas Perlibakas | Vytautas Perlibakas | Recognition of expression variant faces using masked log-Gabor features
and Principal Component Analysis | Unpublished manuscript. June 2005. 20 pages, 8 figures, 5 tables | null | null | null | cs.CV | null | In this article we propose a method for the recognition of faces with
different facial expressions. For recognition we extract feature vectors by
using log-Gabor filters of multiple orientations and scales. Using sliding
window algorithm and variances -based masking these features are extracted at
image regions that are less affected by the changes of facial expressions.
Extracted features are passed to the Principal Component Analysis (PCA) -based
recognition method. The results of face recognition experiments using
expression variant faces showed that the proposed method could achieve higher
recognition accuracy than many other methods. For development and testing we
used facial images from the AR and FERET databases. Using facial photographs of
more than one thousand persons from the FERET database the proposed method
achieved 96.6-98.9% first one recognition rate and 0.2-0.6% Equal Error Rate
(EER).
| [
{
"version": "v1",
"created": "Sun, 7 May 2006 15:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perlibakas",
"Vytautas",
""
]
] |
cs/0605030 | Randy Cogill | Randy Cogill and Sanjay Lall | A Delay Analysis of Maximal Matching Switching with Speedup | 11 pages, 2 figures. Submitted to the 2006 IEEE Conference on
Decision and Control | null | null | null | cs.NI cs.PF | null | In this paper we analyze the average queue backlog in a combined input-output
queued switch using a maximal size matching scheduling algorithm. We compare
this average backlog to the average backlog achieved by an optimal switch. We
model the cell arrival process as independent and identically distributed
between time slots and uniformly distributed among input and output ports. For
switches with many input and output ports, the backlog associated with maximal
size matching with speedup 3 is no more than 10/3 times the backlog associated
with an optimal switch. Moreover, this performance ratio rapidly approaches 2
as speedup increases.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 08:04:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cogill",
"Randy",
""
],
[
"Lall",
"Sanjay",
""
]
] |
cs/0605031 | Mihaela Dinsoreanu PhD | Mihaela Dinsoreanu, Ioan Salomie, Kalman Pusztai | On the Design of Agent-Based Systems using UML and Extensions | null | null | null | null | cs.AI cs.MA cs.SE | null | The Unified Software Development Process (USDP) and UML have been now
generally accepted as the standard methodology and modeling language for
developing Object-Oriented Systems. Although Agent-based Systems introduces new
issues, we consider that USDP and UML can be used in an extended manner for
modeling Agent-based Systems. The paper presents a methodology for designing
agent-based systems and the specific models expressed in an UML-based notation
corresponding to each phase of the software development process. UML was
extended using the provided mechanism: stereotypes. Therefore, this approach
can be managed with any CASE tool supporting UML. A Case Study, the development
of a specific agent-based Student Evaluation System (SAS), is presented.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 12:21:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Salomie",
"Ioan",
""
],
[
"Pusztai",
"Kalman",
""
]
] |
cs/0605032 | Mihaela Dinsoreanu PhD | Tudor Marian, Bogdan Dumitriu, Mihaela Dinsoreanu, Ioan Salomie | A framework of reusable structures for mobile agent development | null | null | null | null | cs.MA cs.AI cs.SE | null | Mobile agents research is clearly aiming towards imposing agent based
development as the next generation of tools for writing software. This paper
comes with its own contribution to this global goal by introducing a novel
unifying framework meant to bring simplicity and interoperability to and among
agent platforms as we know them today. In addition to this, we also introduce a
set of agent behaviors which, although tailored for and from the area of
virtual learning environments, are none the less generic enough to be used for
rapid, simple, useful and reliable agent deployment. The paper also presents an
illustrative case study brought forward to prove the feasibility of our design.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 12:27:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marian",
"Tudor",
""
],
[
"Dumitriu",
"Bogdan",
""
],
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Salomie",
"Ioan",
""
]
] |
cs/0605033 | Mihaela Dinsoreanu PhD | Mihaela Dinsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom
Coffey | Mobile Agent Based Solutions for Knowledge Assessment in elearning
Environments | null | null | null | null | cs.MA cs.AI cs.SE | null | E-learning is nowadays one of the most interesting of the "e- " domains
available through the Internet. The main problem to create a Web-based, virtual
environment is to model the traditional domain and to implement the model using
the most suitable technologies. We analyzed the distance learning domain and
investigated the possibility to implement some e-learning services using mobile
agent technologies. This paper presents a model of the Student Assessment
Service (SAS) and an agent-based framework developed to be used for
implementing specific applications. A specific Student Assessment application
that relies on the framework was developed.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 12:37:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Godja",
"Cristian",
""
],
[
"Anghel",
"Claudiu",
""
],
[
"Salomie",
"Ioan",
""
],
[
"Coffey",
"Tom",
""
]
] |
cs/0605034 | Srinivas Shakkottai | Srinivas Shakkottai, R. Srikant | Peer to Peer Networks for Defense Against Internet Worms | 11 Pages | null | null | null | cs.CR cs.AR cs.NI | null | Internet worms, which spread in computer networks without human mediation,
pose a severe threat to computer systems today. The rate of propagation of
worms has been measured to be extremely high and they can infect a large
fraction of their potential hosts in a short time. We study two different
methods of patch dissemination to combat the spread of worms. We first show
that using a fixed number of patch servers performs woefully inadequately
against Internet worms. We then show that by exploiting the exponential data
dissemination capability of P2P systems, the spread of worms can be halted very
effectively. We compare the two methods by using fluid models to compute two
quantities of interest: the time taken to effectively combat the progress of
the worm and the maximum number of infected hosts. We validate our models using
Internet measurements and simulations.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 17:02:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shakkottai",
"Srinivas",
""
],
[
"Srikant",
"R.",
""
]
] |
cs/0605035 | Filip Radlinski | Filip Radlinski and Thorsten Joachims | Query Chains: Learning to Rank from Implicit Feedback | 10 pages | Proceedings of the ACM Conference on Knowledge Discovery and Data
Mining (KDD), ACM, 2005 | null | null | cs.LG cs.IR | null | This paper presents a novel approach for using clickthrough data to learn
ranked retrieval functions for web search results. We observe that users
searching the web often perform a sequence, or chain, of queries with a similar
information need. Using query chains, we generate new types of preference
judgments from search engine logs, thus taking advantage of user intelligence
in reformulating queries. To validate our method we perform a controlled user
study comparing generated preference judgments to explicit relevance judgments.
We also implemented a real-world search engine to test our approach, using a
modified ranking SVM to learn an improved ranking function from preference
data. Our results demonstrate significant improvements in the ranking given by
the search engine. The learned rankings outperform both a static ranking
function, as well as one trained without considering query chains.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 22:05:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
] |
cs/0605036 | Filip Radlinski | Filip Radlinski and Thorsten Joachims | Evaluating the Robustness of Learning from Implicit Feedback | 8 pages, Presented at ICML Workshop on Learning In Web Search, 2005 | null | null | null | cs.LG cs.IR | null | This paper evaluates the robustness of learning from implicit feedback in web
search. In particular, we create a model of user behavior by drawing upon user
studies in laboratory and real-world settings. The model is used to understand
the effect of user behavior on the performance of a learning algorithm for
ranked retrieval. We explore a wide range of possible user behaviors and find
that learning from implicit feedback can be surprisingly robust. This
complements previous results that demonstrated our algorithm's effectiveness in
a real-world search engine application.
| [
{
"version": "v1",
"created": "Mon, 8 May 2006 23:38:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
] |
cs/0605037 | Filip Radlinski | Filip Radlinski and Thorsten Joachims | Minimally Invasive Randomization for Collecting Unbiased Preferences
from Clickthrough Logs | 7 pages. Proceedings of the 21st National Conference on Artificial
Intelligence (AAAI), 2006 | null | null | null | cs.IR cs.LG | null | Clickthrough data is a particularly inexpensive and plentiful resource to
obtain implicit relevance feedback for improving and personalizing search
engines. However, it is well known that the probability of a user clicking on a
result is strongly biased toward documents presented higher in the result set
irrespective of relevance. We introduce a simple method to modify the
presentation of search results that provably gives relevance judgments that are
unaffected by presentation bias under reasonable assumptions. We validate this
property of the training data in interactive real world experiments. Finally,
we show that using these unbiased relevance judgments learning methods can be
guaranteed to converge to an ideal ranking given sufficient data.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 01:53:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
] |
cs/0605038 | Enrico Pontelli | Tran Cao Son, Enrico Pontelli, Islam Elkabani | An Unfolding-Based Semantics for Logic Programming with Aggregates | null | null | null | null | cs.SE cs.AI | null | The paper presents two equivalent definitions of answer sets for logic
programs with aggregates. These definitions build on the notion of unfolding of
aggregates, and they are aimed at creating methodologies to translate logic
programs with aggregates to normal logic programs or positive programs, whose
answer set semantics can be used to defined the semantics of the original
programs. The first definition provides an alternative view of the semantics
for logic programming with aggregates described by Pelov et al.
The second definition is similar to the traditional answer set definition for
normal logic programs, in that, given a logic program with aggregates and an
interpretation, the unfolding process produces a positive program. The paper
shows how this definition can be extended to consider aggregates in the head of
the rules.
The proposed views of logic programming with aggregates are simple and
coincide with the ultimate stable model semantics, and with other semantic
characterizations for large classes of program (e.g., programs with monotone
aggregates and programs that are aggregate-stratified).
Moreover, it can be directly employed to support an implementation using
available answer set solvers. The paper describes a system, called ASP^A, that
is capable of computing answer sets of programs with arbitrary (e.g.,
recursively defined) aggregates.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 04:08:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Son",
"Tran Cao",
""
],
[
"Pontelli",
"Enrico",
""
],
[
"Elkabani",
"Islam",
""
]
] |
cs/0605039 | Amitabha Roy | Amitabha Roy, Stephan Zeisset, Charles J. Fleckenstein, John C. Huang | Fast and Generalized Polynomial Time Memory Consistency Verification | To appear in the proceedings of Computer Aided Verification (CAV)
2006 | null | null | null | cs.AR cs.LO cs.PF | null | The problem of verifying multi-threaded execution against the memory
consistency model of a processor is known to be an NP hard problem. However
polynomial time algorithms exist that detect almost all failures in such
execution. These are often used in practice for microprocessor verification. We
present a low complexity and fully parallelized algorithm to check program
execution against the processor consistency model. In addition our algorithm is
general enough to support a number of consistency models without any
degradation in performance. An implementation of this algorithm is currently
used in practice to verify processors in the post silicon stage for multiple
architectures.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 05:45:52 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2006 12:07:57 GMT"
},
{
"version": "v3",
"created": "Tue, 23 May 2006 10:03:21 GMT"
},
{
"version": "v4",
"created": "Mon, 29 May 2006 06:33:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roy",
"Amitabha",
""
],
[
"Zeisset",
"Stephan",
""
],
[
"Fleckenstein",
"Charles J.",
""
],
[
"Huang",
"John C.",
""
]
] |
cs/0605040 | Marcus Hutter | Marcus Hutter | General Discounting versus Average Reward | 17 pages, 1 table | Proc. 17th International Conf. on Algorithmic Learning Theory (ALT
2006) pages 244-258 | null | IDSIA-11-06 | cs.LG | null | Consider an agent interacting with an environment in cycles. In every
interaction cycle the agent is rewarded for its performance. We compare the
average reward U from cycle 1 to m (average value) with the future discounted
reward V from cycle k to infinity (discounted value). We consider essentially
arbitrary (non-geometric) discount sequences and arbitrary reward sequences
(non-MDP environments). We show that asymptotically U for m->infinity and V for
k->infinity are equal, provided both limits exist. Further, if the effective
horizon grows linearly with k or faster, then existence of the limit of U
implies that the limit of V exists. Conversely, if the effective horizon grows
linearly with k or slower, then existence of the limit of V implies that the
limit of U exists.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 10:39:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] |
cs/0605043 | Stefano Guerrini | Stefano Guerrini and Andrea Masini | Continuations, proofs and tests | 32 pages, uses xy-pic | null | null | null | cs.LO cs.PL | null | Continuation Passing Style (CPS) is one of the most important issues in the
field of functional programming languages, and the quest for a primitive notion
of types for continuation is still open. Starting from the notion of ``test''
proposed by Girard, we develop a notion of test for intuitionistic logic. We
give a complete deductive system for tests and we show that it is good to deal
with ``continuations''. In particular, in the proposed system it is possible to
work with Call by Value and Call by Name translations in a uniform way.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 20:11:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guerrini",
"Stefano",
""
],
[
"Masini",
"Andrea",
""
]
] |
cs/0605045 | R.N.Mohan Professor | R.N.Mohan | On Orthogonalities in Matrices | null | null | null | null | cs.DM | null | In this paper we have discussed different possible orthogonalities in
matrices, namely orthogonal, quasi-orthogonal, semi-orthogonal and
non-orthogonal matrices including completely positive matrices, while giving
some of their constructions besides studying some of their properties.
| [
{
"version": "v1",
"created": "Wed, 10 May 2006 03:12:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mohan",
"R. N.",
""
]
] |
cs/0605049 | R.N.Mohan Professor | V.M.Siddlenikov, R.N.Mohan, Moon Ho Lee | On fractionally linear functions over a finite field | null | null | null | null | cs.DM | null | Abstrct: In this note, by considering fractionally linear functions over a
finite field and consequently developing an abstract sequence, we study some of
its properties.
| [
{
"version": "v1",
"created": "Thu, 11 May 2006 06:58:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siddlenikov",
"V. M.",
""
],
[
"Mohan",
"R. N.",
""
],
[
"Lee",
"Moon Ho",
""
]
] |
cs/0605050 | V. Arvind | V. Arvind and Piyush P Kurur | A Polynomial Time Nilpotence Test for Galois Groups and Related Results | 12 pages | null | null | null | cs.CC cs.DS | null | We give a deterministic polynomial-time algorithm to check whether the Galois
group $\Gal{f}$ of an input polynomial $f(X) \in \Q[X]$ is nilpotent: the
running time is polynomial in $\size{f}$. Also, we generalize the Landau-Miller
solvability test to an algorithm that tests if $\Gal{f}$ is in $\Gamma_d$: this
algorithm runs in time polynomial in $\size{f}$ and $n^d$ and, moreover, if
$\Gal{f}\in\Gamma_d$ it computes all the prime factors of $# \Gal{f}$.
| [
{
"version": "v1",
"created": "Thu, 11 May 2006 08:20:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Arvind",
"V.",
""
],
[
"Kurur",
"Piyush P",
""
]
] |
cs/0605053 | Rajkumar Buyya | Hussein Gibbins and Rajkumar Buyya | Gridscape II: A Customisable and Pluggable Grid Monitoring Portal and
its Integration with Google Maps | 12 pages | null | null | Technical Report, GRIDS-TR-2006-8, Grid Computing and Distributed
Systems Laboratory, The University of Melbourne, Australia, May 12, 2006 | cs.DC | null | Grid computing has emerged as an effective means of facilitating the sharing
of distributed heterogeneous resources, enabling collaboration in large scale
environments. However, the nature of Grid systems, coupled with the
overabundance and fragmentation of information, makes it difficult to monitor
resources, services, and computations in order to plan and make decisions. In
this paper we present Gridscape II, a customisable portal component that can be
used on its own or plugged in to compliment existing Grid portals. Gridscape II
manages the gathering of information from arbitrary, heterogeneous and
distributed sources and presents them together seamlessly within a single
interface. It also leverages the Google Maps API in order to provide a highly
interactive user interface. Gridscape II is simple and easy to use, providing a
solution to those users who do not wish to invest heavily in developing their
own monitoring portal from scratch, and also for those users who want something
that is easy to customise and extend for their specific needs.
| [
{
"version": "v1",
"created": "Fri, 12 May 2006 09:41:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gibbins",
"Hussein",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0605056 | Rajkumar Buyya | Chee Shin Yeo, Marcos Dias de Assuncao, Jia Yu, Anthony Sulistio,
Srikumar Venugopal, Martin Placek, and Rajkumar Buyya | Utility Computing and Global Grids | 23 pages | null | null | Technical Report, GRIDS-TR-2006-7, Grid Computing and Distributed
Systems Laboratory, The University of Melbourne, Australia, April 13, 2006 | cs.DC | null | This chapter focuses on the use of Grid technologies to achieve utility
computing. An overview of how Grids can support utility computing is first
presented through the architecture of Utility Grids. Then, utility-based
resource allocation is described in detail at each level of the architecture.
Finally, some industrial solutions for utility computing are discussed.
| [
{
"version": "v1",
"created": "Fri, 12 May 2006 20:36:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yeo",
"Chee Shin",
""
],
[
"de Assuncao",
"Marcos Dias",
""
],
[
"Yu",
"Jia",
""
],
[
"Sulistio",
"Anthony",
""
],
[
"Venugopal",
"Srikumar",
""
],
[
"Placek",
"Martin",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0605057 | Rajiv Ranjan Mr. | Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya | SLA-Based Coordinated Superscheduling Scheme and Performance for
Computational Grids | null | In Proceedings of the 8th IEEE International Conference on Cluster
Computing (Cluster 2006), IEEE Computer Society Press, September 27 - 30,
2006, Barcelona, Spain. | null | null | cs.DC | null | The Service Level Agreement~(SLA) based grid superscheduling approach
promotes coordinated resource sharing. Superscheduling is facilitated between
administratively and topologically distributed grid sites by grid schedulers
such as Resource brokers. In this work, we present a market-based SLA
coordination mechanism. We based our SLA model on a well known \emph{contract
net protocol}.
The key advantages of our approach are that it allows:~(i) resource owners to
have finer degree of control over the resource allocation that was previously
not possible through traditional mechanism; and (ii) superschedulers to bid for
SLA contracts in the contract net with focus on completing the job within the
user specified deadline. In this work, we use simulation to show the
effectiveness of our proposed approach.
| [
{
"version": "v1",
"created": "Mon, 15 May 2006 13:41:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ranjan",
"Rajiv",
""
],
[
"Harwood",
"Aaron",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0605059 | Jean-Marc Rosengard | Jean-Marc Rosengard, Marian Ursu | Ontological Representations of Software Patterns | 7 pages | Proceedings of KES'04, Lecture Notes in Computer Science, vol.
3215, pp. 31-37, Springer-Verlag, 2004 | 10.1007/b100916 | null | cs.SE cs.AI | null | This paper is based on and advocates the trend in software engineering of
extending the use of software patterns as means of structuring solutions to
software development problems (be they motivated by best practice or by company
interests and policies). The paper argues that, on the one hand, this
development requires tools for automatic organisation, retrieval and
explanation of software patterns. On the other hand, that the existence of such
tools itself will facilitate the further development and employment of patterns
in the software development process. The paper analyses existing pattern
representations and concludes that they are inadequate for the kind of
automation intended here. Adopting a standpoint similar to that taken in the
semantic web, the paper proposes that feasible solutions can be built on the
basis of ontological representations.
| [
{
"version": "v1",
"created": "Sun, 14 May 2006 18:31:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rosengard",
"Jean-Marc",
""
],
[
"Ursu",
"Marian",
""
]
] |
cs/0605061 | Al-Mukaddim Khan Pathan | Al-Mukaddim Khan Pathan, Md. Abdul Mottalib and Minhaz Fahim Zibran | An Internet Framework to Bring Coherence between WAP and HTTP Ensuring
Better Mobile Internet Security | 8th International Conference on Advanced Communication Technology
(ICACT 2006) | null | null | null | cs.NI | null | To bring coherence between Wireless Access Protocol (WAP) and Hyper Text
Transfer Protocol (HTTP), in this paper, we have proposed an enhanced Internet
framework, which incorporates a new markup language and a browser compatible
with both of the access control protocols. This Markup Language and the browser
enables co-existence of both Hyper Text Markup Language (HTML) and Wireless
Markup Language (WML) contents in a single source file, whereas the browser
incorporates the ability to hold contents compliant with both HTTP and WAP. The
proposed framework also bridges the security gap that is present in the
existing mobile Internet framework.
Keywords: WAP, WML, HTTP, HTML, browser, parser, wireless devices.
| [
{
"version": "v1",
"created": "Mon, 15 May 2006 10:25:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pathan",
"Al-Mukaddim Khan",
""
],
[
"Mottalib",
"Md. Abdul",
""
],
[
"Zibran",
"Minhaz Fahim",
""
]
] |
cs/0605062 | Al-Mukaddim Khan Pathan | Al-Mukaddim Khan Pathan and Md. Golam Shagadul Amin Talukder | QoSIP: A QoS Aware IP Routing Ptotocol for Multimedia Data | 8th International Conference of Advanced Communication Technology
(ICACT 2006) | null | null | null | cs.NI | null | Conventional IP routing protocols are not suitable for multimedia
applications which have very stringent Quality-of-Service (QoS) demands and
they require a connection oriented service. For multimedia applications it is
expected that the router should be able to forward the packet according to the
demand of the packet and it is necessary to find a path that satisfies the
specific demands of a particular application. In order to address these issues,
in this paper, we have presented a QoS aware IP routing protocol where a router
stores information about the QoS parameters and routes the packet accordingly.
Keywords: IP Routing Protocol, Quality of Service (QoS) parameter, QoSIP,
Selective Flooding.
| [
{
"version": "v1",
"created": "Mon, 15 May 2006 10:39:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pathan",
"Al-Mukaddim Khan",
""
],
[
"Talukder",
"Md. Golam Shagadul Amin",
""
]
] |
cs/0605063 | Al-Mukaddim Khan Pathan | Asif Ahmed Anik and Al-Mukaddim Khan Pathan | An Electronic Payment System to Ensure Cost Effectiveness with Easy
Security Incorporation for the Developing Countries | International Conference on Intelligent Agents, Web Technology and
Internet Commerce (IAWTIC 2004) | null | null | null | cs.OH | null | With the rapid growth of Information and Communication Technology, Electronic
commerce is now acting as a new means of carrying out business transactions
through electronic means such as Internet environment. To avoid the
complexities associated with the digital cash and electronic cash, consumers
and vendors are looking for credit card payments on the Internet as one
possible time-tested alternative. This gave rise of the on-line payment
processing using a third-party verification; which is not suitable for the
developing countries in most of the cases because of the excessive costs
associated with it for maintenance and establishment of an online third-party
processor. As a remedy of this problem, in this paper, we have proposed a
framework for easy security incorporation in credit card based electronic
payment system without the use of an on-line third- party processor; which
tends to be low cost and effective for the developing countries.
| [
{
"version": "v1",
"created": "Mon, 15 May 2006 10:57:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Anik",
"Asif Ahmed",
""
],
[
"Pathan",
"Al-Mukaddim Khan",
""
]
] |
cs/0605066 | Xiaowen Zhang | Xiaowen Zhang, Ke Tang, Li Shu | A Chaotic Cipher Mmohocc and Its Randomness Evaluation | 8 pages, 4 figures, and 3 tables, submitted to ICCS06 | null | null | null | cs.CR | null | After a brief introduction to a new chaotic stream cipher Mmohocc which
utilizes the fundamental chaos characteristics of mixing, unpredictability, and
sensitivity to initial conditions, we conducted the randomness statistical
tests against the keystreams generated by the cipher. Two batteries of most
stringent randomness tests, namely the NIST Suite and the Diehard Suite, were
performed. The results showed that the keystreams have successfully passed all
the statistical tests. We conclude that Mmohocc can generate high-quality
pseudorandom numbers from a statistical point of view.
| [
{
"version": "v1",
"created": "Mon, 15 May 2006 18:25:35 GMT"
},
{
"version": "v2",
"created": "Tue, 30 May 2006 11:58:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Xiaowen",
""
],
[
"Tang",
"Ke",
""
],
[
"Shu",
"Li",
""
]
] |
cs/0605070 | Stephen Smith | Stephen L. Smith, Mireille E. Broucke, and Bruce A. Francis | Curve Shortening and the Rendezvous Problem for Mobile Autonomous Robots | 15 pages, 18 figures | null | null | null | cs.RO cs.MA | null | If a smooth, closed, and embedded curve is deformed along its normal vector
field at a rate proportional to its curvature, it shrinks to a circular point.
This curve evolution is called Euclidean curve shortening and the result is
known as the Gage-Hamilton-Grayson Theorem. Motivated by the rendezvous problem
for mobile autonomous robots, we address the problem of creating a polygon
shortening flow. A linear scheme is proposed that exhibits several analogues to
Euclidean curve shortening: The polygon shrinks to an elliptical point, convex
polygons remain convex, and the perimeter of the polygon is monotonically
decreasing.
| [
{
"version": "v1",
"created": "Tue, 16 May 2006 22:30:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smith",
"Stephen L.",
""
],
[
"Broucke",
"Mireille E.",
""
],
[
"Francis",
"Bruce A.",
""
]
] |
cs/0605074 | Michael Codish | Michael Codish (1), Peter Schneider-Kamp (2), Vitaly Lagoon (3),
Ren\'e Thiemann (2), J\"urgen Giesl (2) ((1) Department of Computer Science,
Ben-Gurion University, Israel (2) LuFG Informatik 2, RWTH Aachen, Germany (3)
Department of Computer Science and Software Engineering, University of
Melbourne, Australia) | SAT Solving for Argument Filterings | null | null | null | null | cs.LO | null | This paper introduces a propositional encoding for lexicographic path orders
in connection with dependency pairs. This facilitates the application of SAT
solvers for termination analysis of term rewrite systems based on the
dependency pair method. We address two main inter-related issues and encode
them as satisfiability problems of propositional formulas that can be
efficiently handled by SAT solving: (1) the combined search for a lexicographic
path order together with an \emph{argument filtering} to orient a set of
inequalities; and (2) how the choice of the argument filtering influences the
set of inequalities that have to be oriented. We have implemented our
contributions in the termination prover AProVE. Extensive experiments show that
by our encoding and the application of SAT solvers one obtains speedups in
orders of magnitude as well as increased termination proving power.
| [
{
"version": "v1",
"created": "Wed, 17 May 2006 12:47:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Codish",
"Michael",
""
],
[
"Schneider-Kamp",
"Peter",
""
],
[
"Lagoon",
"Vitaly",
""
],
[
"Thiemann",
"René",
""
],
[
"Giesl",
"Jürgen",
""
]
] |
cs/0605076 | J. F. J. Laros | J. F. J. Laros | Numeration-automatic sequences | 25 pages, 22 figures | null | null | null | cs.CL cs.DM | null | We present a base class of automata that induce a numeration system and we
give an algorithm to give the n-th word in the language of the automaton when
the expansion of n in the induced numeration system is feeded to the automaton.
Furthermore we give some algorithms for reverse reading of this expansion and a
way to combine automata to other automata having the same properties.
| [
{
"version": "v1",
"created": "Wed, 17 May 2006 17:12:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Laros",
"J. F. J.",
""
]
] |
cs/0605078 | Christoph D\"urr | Philippe Baptiste, Peter Brucker, Marek Chrobak, Christoph Durr,
Svetlana A. Kravchenko, Francis Sourd | The Complexity of Mean Flow Time Scheduling Problems with Release Times | Subsumes and replaces cs.DS/0412094 and "Complexity of mean flow time
scheduling problems with release dates" by P.B, S.K | null | null | null | cs.DS | null | We study the problem of preemptive scheduling n jobs with given release times
on m identical parallel machines. The objective is to minimize the average flow
time. We show that when all jobs have equal processing times then the problem
can be solved in polynomial time using linear programming. Our algorithm can
also be applied to the open-shop problem with release times and unit processing
times. For the general case (when processing times are arbitrary), we show that
the problem is unary NP-hard.
| [
{
"version": "v1",
"created": "Wed, 17 May 2006 22:07:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baptiste",
"Philippe",
""
],
[
"Brucker",
"Peter",
""
],
[
"Chrobak",
"Marek",
""
],
[
"Durr",
"Christoph",
""
],
[
"Kravchenko",
"Svetlana A.",
""
],
[
"Sourd",
"Francis",
""
]
] |
cs/0605081 | Marc Daumas | Marc Daumas (LP2A, LIRMM), Guillaume Da Gra\c{c}a (LP2A), David Defour
(LP2A) | Caract\'{e}ristiques arithm\'{e}tiques des processeurs graphiques | null | null | null | null | cs.MS | null | Les unit\'{e}s graphiques (Graphic Processing Units- GPU) sont d\'{e}sormais
des processeurs puissants et flexibles. Les derni\`{e}res g\'{e}n\'{e}rations
de GPU contiennent des unit\'{e}s programmables de traitement des sommets
(vertex shader) et des pixels (pixel shader) supportant des op\'{e}rations en
virgule flottante sur 8, 16 ou 32 bits. La repr\'{e}sentation flottante sur 32
bits correspond \`{a} la simple pr\'{e}cision de la norme IEEE sur
l'arithm\'{e}tique en virgule flottante (IEEE-754). Les GPU sont bien
adapt\'{e}s aux applications avec un fort parall\'{e}lisme de donn\'{e}es.
Cependant ils ne sont que peu utilis\'{e}s en dehors des calculs graphiques
(General Purpose computation on GPU -- GPGPU). Une des raisons de cet \'{e}tat
de faits est la pauvret\'{e} des documentations techniques fournies par les
fabricants (ATI et Nvidia), particuli\`{e}rement en ce qui concerne
l'implantation des diff\'{e}rents op\'{e}rateurs arithm\'{e}tiques
embarqu\'{e}s dans les diff\'{e}rentes unit\'{e}s de traitement. Or ces
informations sont essentielles pour estimer et contr\^{o}ler les erreurs
d'arrondi ou pour mettre en oeuvre des techniques de r\'{e}duction ou de
compensation afin de travailler en pr\'{e}cision double, quadruple ou
arbitrairement \'{e}tendue. Nous proposons dans cet article un ensemble de
programmes qui permettent de d\'{e}couvrir les caract\'{e}ristiques principales
des GPU en ce qui concerne l'arithm\'{e}tique \`{a} virgule flottante. Nous
donnons les r\'{e}sultats obtenus sur deux cartes graphiques r\'{e}centes: la
Nvidia 7800GTX et l'ATI RX1800XL.
| [
{
"version": "v1",
"created": "Thu, 18 May 2006 15:49:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daumas",
"Marc",
"",
"LP2A, LIRMM"
],
[
"Da Graça",
"Guillaume",
"",
"LP2A"
],
[
"Defour",
"David",
"",
"LP2A"
]
] |
cs/0605082 | Saugata Basu | Saugata Basu | Efficient algorithm for computing the Euler-Poincar\'e characteristic of
a semi-algebraic set defined by few quadratic inequalities | 17 pages, accepted for publication in Computational Complexity | null | null | null | cs.SC cs.CG | null | We present an algorithm which takes as input a closed semi-algebraic set, $S
\subset \R^k$, defined by \[ P_1 \leq 0, ..., P_\ell \leq 0, P_i \in
\R[X_1,...,X_k], \deg(P_i) \leq 2, \] and computes the Euler-Poincar\'e
characteristic of $S$. The complexity of the algorithm is $k^{O(\ell)}$.
| [
{
"version": "v1",
"created": "Thu, 18 May 2006 18:03:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Basu",
"Saugata",
""
]
] |
cs/0605083 | Partha Basuchowdhuri | Partha Basuchowdhuri | Classical Authentication Aided Three-Stage Quantum Protocol | 7 pages, 3 figures | null | null | null | cs.CR | null | This paper modifies Kak's three-stage protocol so that it can guarantee
secure transmission of information. Although avoiding man-in-the-middle attack
is our primary objective in the introduction of classical authentication inside
the three-stage protocol, we also benefit from the inherent advantages of the
chosen classical authentication protocol. We have tried to implement ideas like
key distribution center, session key, time-stamp, and nonce, within the quantum
cryptography protocol.
| [
{
"version": "v1",
"created": "Thu, 18 May 2006 21:41:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Basuchowdhuri",
"Partha",
""
]
] |
cs/0605088 | Ke Liu | Ke Liu, Adnan Majeed and Nael B. Abu-Ghazaleh | TARMAC: Traffic-Analysis Reslient MAC Protocol for Multi-Hop Wireless
Networks | null | null | null | null | cs.NI cs.CR | null | Traffic analysis in Multi-hop Wireless Networks can expose the structure of
the network allowing attackers to focus their efforts on critical nodes. For
example, jamming the only data sink in a sensor network can cripple the
network. We propose a new communication protocol that is part of the MAC layer,
but resides conceptually between the routing layer and MAC, that is resilient
to traffic analysis. Each node broadcasts the data that it has to transmit
according to a fixed transmission schedule that is independent of the traffic
being generated, making the network immune to time correlation analysis. The
transmission pattern is identical, with the exception of a possible time shift,
at all nodes, removing spatial correlation of transmissions to network
strucutre. Data for all neighbors resides in the same encrypted packet. Each
neighbor then decides which subset of the data in a packet to forward onwards
using a routing protocol whose details are orthogonal to the proposed scheme.
We analyze the basic scheme, exploring the tradeoffs in terms of frequency of
transmission and packet size. We also explore adaptive and time changing
patterns and analyze their performance under a number of representative
scenarios.
| [
{
"version": "v1",
"created": "Fri, 19 May 2006 22:42:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Liu",
"Ke",
""
],
[
"Majeed",
"Adnan",
""
],
[
"Abu-Ghazaleh",
"Nael B.",
""
]
] |
cs/0605094 | Simone Bova | S. Bova (1) and F. Montagna (1) ((1) University of Siena, Italy) | Proof Search in Hajek's Basic Logic | 26 pages | null | null | null | cs.LO cs.CC | null | We introduce a proof system for Hajek's logic BL based on a relational
hypersequents framework. We prove that the rules of our logical calculus,
called RHBL, are sound and invertible with respect to any valuation of BL into
a suitable algebra, called omega[0,1]. Refining the notion of reduction tree
that arises naturally from RHBL, we obtain a decision algorithm for BL
provability whose running time upper bound is 2^O(n), where n is the number of
connectives of the input formula. Moreover, if a formula is unprovable, we
exploit the constructiveness of a polynomial time algorithm for leaves validity
for providing a procedure to build countermodels in omega[0,1]. Finally, since
the size of the reduction tree branches is O(n^3), we can describe a polynomial
time verification algorithm for BL unprovability.
| [
{
"version": "v1",
"created": "Mon, 22 May 2006 08:18:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bova",
"S.",
"",
"University of Siena, Italy"
],
[
"Montagna",
"F.",
"",
"University of Siena, Italy"
]
] |
cs/0605097 | Emina Torlak | Marten van Dijk, Emina Torlak, Blaise Gassend, and Srinivas Devadas | A Generalized Two-Phase Analysis of Knowledge Flows in Security
Protocols | 16 pages | null | null | null | cs.CR | null | We introduce knowledge flow analysis, a simple and flexible formalism for
checking cryptographic protocols. Knowledge flows provide a uniform language
for expressing the actions of principals, assump- tions about intruders, and
the properties of cryptographic primitives. Our approach enables a generalized
two-phase analysis: we extend the two-phase theory by identifying the necessary
and sufficient proper- ties of a broad class of cryptographic primitives for
which the theory holds. We also contribute a library of standard primitives and
show that they satisfy our criteria.
| [
{
"version": "v1",
"created": "Mon, 22 May 2006 15:51:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Dijk",
"Marten",
""
],
[
"Torlak",
"Emina",
""
],
[
"Gassend",
"Blaise",
""
],
[
"Devadas",
"Srinivas",
""
]
] |
cs/0605101 | Victor Kryssanov | Victor V. Kryssanov, Frank J. Rinaldo, Evgeny L. Kuleshov, Hitoshi
Ogawa | Modeling the Dynamics of Social Networks | 8 pages, 3 figures. Preprint (as of May 24, 2006) | null | null | null | cs.CY cs.CE cs.CL cs.HC cs.NI physics.data-an | null | Modeling human dynamics responsible for the formation and evolution of the
so-called social networks - structures comprised of individuals or
organizations and indicating connectivities existing in a community - is a
topic recently attracting a significant research interest. It has been claimed
that these dynamics are scale-free in many practically important cases, such as
impersonal and personal communication, auctioning in a market, accessing sites
on the WWW, etc., and that human response times thus conform to the power law.
While a certain amount of progress has recently been achieved in predicting the
general response rate of a human population, existing formal theories of human
behavior can hardly be found satisfactory to accommodate and comprehensively
explain the scaling observed in social networks. In the presented study, a
novel system-theoretic modeling approach is proposed and successfully applied
to determine important characteristics of a communication network and to
analyze consumer behavior on the WWW.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 02:13:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"Victor V.",
""
],
[
"Rinaldo",
"Frank J.",
""
],
[
"Kuleshov",
"Evgeny L.",
""
],
[
"Ogawa",
"Hitoshi",
""
]
] |
cs/0605102 | Shaili Jain | Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh Venkatasubramanian
and Ke Yi | Restricted Strip Covering and the Sensor Cover Problem | 14 pages, 6 figures | null | null | null | cs.DS cs.CG | null | Given a set of objects with durations (jobs) that cover a base region, can we
schedule the jobs to maximize the duration the original region remains covered?
We call this problem the sensor cover problem. This problem arises in the
context of covering a region with sensors. For example, suppose you wish to
monitor activity along a fence by sensors placed at various fixed locations.
Each sensor has a range and limited battery life. The problem is to schedule
when to turn on the sensors so that the fence is fully monitored for as long as
possible. This one dimensional problem involves intervals on the real line.
Associating a duration to each yields a set of rectangles in space and time,
each specified by a pair of fixed horizontal endpoints and a height. The
objective is to assign a position to each rectangle to maximize the height at
which the spanning interval is fully covered. We call this one dimensional
problem restricted strip covering. If we replace the covering constraint by a
packing constraint, the problem is identical to dynamic storage allocation, a
scheduling problem that is a restricted case of the strip packing problem. We
show that the restricted strip covering problem is NP-hard and present an O(log
log n)-approximation algorithm. We present better approximations or exact
algorithms for some special cases. For the uniform-duration case of restricted
strip covering we give a polynomial-time, exact algorithm but prove that the
uniform-duration case for higher-dimensional regions is NP-hard. Finally, we
consider regions that are arbitrary sets, and we present an O(log
n)-approximation algorithm.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 03:27:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buchsbaum",
"Adam L.",
""
],
[
"Efrat",
"Alon",
""
],
[
"Jain",
"Shaili",
""
],
[
"Venkatasubramanian",
"Suresh",
""
],
[
"Yi",
"Ke",
""
]
] |
cs/0605103 | Daniel Lemire | Daniel Lemire | A Better Alternative to Piecewise Linear Time Series Segmentation | to appear in SIAM Data Mining 2007 | null | null | null | cs.DB cs.CV | null | Time series are difficult to monitor, summarize and predict. Segmentation
organizes time series into few intervals having uniform characteristics
(flatness, linearity, modality, monotonicity and so on). For scalability, we
require fast linear time algorithms. The popular piecewise linear model can
determine where the data goes up or down and at what rate. Unfortunately, when
the data does not follow a linear model, the computation of the local slope
creates overfitting. We propose an adaptive time series model where the
polynomial degree of each interval vary (constant, linear and so on). Given a
number of regressors, the cost of each interval is its polynomial degree:
constant intervals cost 1 regressor, linear intervals cost 2 regressors, and so
on. Our goal is to minimize the Euclidean (l_2) error for a given model
complexity. Experimentally, we investigate the model where intervals can be
either constant or linear. Over synthetic random walks, historical stock market
prices, and electrocardiograms, the adaptive model provides a more accurate
segmentation than the piecewise linear model without increasing the
cross-validation error or the running time, while providing a richer vocabulary
to applications. Implementation issues, such as numerical stability and
real-world performance, are discussed.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 04:42:53 GMT"
},
{
"version": "v2",
"created": "Sat, 27 May 2006 00:32:03 GMT"
},
{
"version": "v3",
"created": "Wed, 31 May 2006 01:28:40 GMT"
},
{
"version": "v4",
"created": "Sun, 25 Jun 2006 14:21:45 GMT"
},
{
"version": "v5",
"created": "Tue, 3 Oct 2006 17:04:41 GMT"
},
{
"version": "v6",
"created": "Thu, 4 Jan 2007 18:36:01 GMT"
},
{
"version": "v7",
"created": "Mon, 23 Apr 2007 01:24:44 GMT"
},
{
"version": "v8",
"created": "Sat, 28 Apr 2007 23:13:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lemire",
"Daniel",
""
]
] |
cs/0605104 | Blake Hegerle | Blake Hegerle | Parsing Transformative LR(1) Languages | 68 pages, 4 figures. Numerous stylistic and grammatical fixes; new
material in Sections 2.2 and 4.2 | null | null | null | cs.PL | null | We consider, as a means of making programming languages more flexible and
powerful, a parsing algorithm in which the parser may freely modify the grammar
while parsing. We are particularly interested in a modification of the
canonical LR(1) parsing algorithm in which, after the reduction of certain
productions, we examine the source sentence seen so far to determine the
grammar to use to continue parsing. A naive modification of the canonical LR(1)
parsing algorithm along these lines cannot be guaranteed to halt; as a result,
we develop a test which examines the grammar as it changes, stopping the parse
if the grammar changes in a way that would invalidate earlier assumptions made
by the parser. With this test in hand, we can develop our parsing algorithm and
prove that it is correct. That being done, we turn to earlier, related work;
the idea of programming languages which can be extended to include new
syntactic constructs has existed almost as long as the idea of high-level
programming languages. Early efforts to construct such a programming language
were hampered by an immature theory of formal languages. More recent efforts to
construct transformative languages relied either on an inefficient chain of
source-to-source translators; or they have a defect, present in our naive
parsing algorithm, in that they cannot be known to halt. The present algorithm
does not have these undesirable properties, and as such, it should prove a
useful foundation for a new kind of programming language.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 19:09:39 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Jul 2006 14:39:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hegerle",
"Blake",
""
]
] |
cs/0605109 | Emina Torlak | Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, and
Srinivas Devadas | Knowledge Flow Analysis for Security Protocols | 20 pages | null | null | MIT-CSAIL-TR-2005-066 | cs.CR cs.SE | null | Knowledge flow analysis offers a simple and flexible way to find flaws in
security protocols. A protocol is described by a collection of rules
constraining the propagation of knowledge amongst principals. Because this
characterization corresponds closely to informal descriptions of protocols, it
allows a succinct and natural formalization; because it abstracts away message
ordering, and handles communications between principals and applications of
cryptographic primitives uniformly, it is readily represented in a standard
logic. A generic framework in the Alloy modelling language is presented, and
instantiated for two standard protocols, and a new key management scheme.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 15:58:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Torlak",
"Emina",
""
],
[
"van Dijk",
"Marten",
""
],
[
"Gassend",
"Blaise",
""
],
[
"Jackson",
"Daniel",
""
],
[
"Devadas",
"Srinivas",
""
]
] |
cs/0605111 | Jon Phipps | Diane I. Hillmann (1), Stuart A. Sutton (2), Jon Phipps (1), Ryan
Laundry (2) ((1) Cornell University, (2) University of Washington) | A Metadata Registry from Vocabularies UP: The NSDL Registry Project | Submitted to Dublin Core 2006 Conference (DC2006) | null | null | null | cs.DL | null | The NSDL Metadata Registry is designed to provide humans and machines with
the means to discover, create, access and manage metadata schemes, schemas,
application profiles, crosswalks and concept mappings. This paper describes the
general goals and architecture of the NSDL Metadata Registry as well as issues
encountered during the first year of the project's implementation.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 16:51:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hillmann",
"Diane I.",
"",
"Cornell University"
],
[
"Sutton",
"Stuart A.",
"",
"University of Washington"
],
[
"Phipps",
"Jon",
"",
"Cornell University"
],
[
"Laundry",
"Ryan",
"",
"University of Washington"
]
] |
cs/0605113 | Johan Bollen | Johan Bollen and Herbert Van de Sompel | An Architecture for the Aggregation and Analysis of Scholarly Usage Data | to be published in Proceedings of the Joint Conference on Digital
Libraries, 2006 | null | null | null | cs.DL | null | Although recording of usage data is common in scholarly information services,
its exploitation for the creation of value-added services remains limited due
to concerns regarding, among others, user privacy, data validity, and the lack
of accepted standards for the representation, sharing and aggregation of usage
data. This paper presents a technical, standards-based architecture for sharing
usage information, which we have designed and implemented. In this
architecture, OpenURL-compliant linking servers aggregate usage information of
a specific user community as it navigates the distributed information
environment that it has access to. This usage information is made OAI-PMH
harvestable so that usage information exposed by many linking servers can be
aggregated to facilitate the creation of value-added services with a reach
beyond that of a single community or a single information service. This paper
also discusses issues that were encountered when implementing the proposed
approach, and it presents preliminary results obtained from analyzing a usage
data set containing about 3,500,000 requests aggregated by a federation of
linking servers at the California State University system over a 20 month
period.
| [
{
"version": "v1",
"created": "Wed, 24 May 2006 18:06:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bollen",
"Johan",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] |
cs/0605119 | Victor Kryssanov | V.V. Kryssanov, H. Tamaki, and K. Ueda | An Internet-enabled technology to support Evolutionary Design | 23 pages, 3 figures. Preprint completed in 2000 | Journal of Engineering Manufacture. 2001, Vol.215, No.B5, 647-655 | null | null | cs.CE cs.AI cs.AR cs.MA cs.NI | null | This paper discusses the systematic use of product feedback information to
support life-cycle design approaches and provides guidelines for developing a
design at both the product and the system levels. Design activities are
surveyed in the light of the product life cycle, and the design information
flow is interpreted from a semiotic perspective. The natural evolution of a
design is considered, the notion of design expectations is introduced, and the
importance of evaluation of these expectations in dynamic environments is
argued. Possible strategies for reconciliation of the expectations and
environmental factors are described. An Internet-enabled technology is proposed
to monitor product functionality, usage, and operational environment and supply
the designer with relevant information. A pilot study of assessing design
expectations of a refrigerator is outlined, and conclusions are drawn.
| [
{
"version": "v1",
"created": "Thu, 25 May 2006 04:39:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Tamaki",
"H.",
""
],
[
"Ueda",
"K.",
""
]
] |
cs/0605120 | Victor Kryssanov | V.V. Kryssanov, H. Tamaki, and S. Kitamura | Understanding Design Fundamentals: How Synthesis and Analysis Drive
Creativity, Resulting in Emergence | 33pages, 4 figures. Preprint completed in 2000 | AI in Engineering. 2001, Vol.15/4, 329-342 | null | null | cs.AI cs.CE cs.HC | null | This paper presents results of an ongoing interdisciplinary study to develop
a computational theory of creativity for engineering design. Human design
activities are surveyed, and popular computer-aided design methodologies are
examined. It is argued that semiotics has the potential to merge and unite
various design approaches into one fundamental theory that is naturally
interpretable and so comprehensible in terms of computer use. Reviewing related
work in philosophy, psychology, and cognitive science provides a general and
encompassing vision of the creativity phenomenon. Basic notions of algebraic
semiotics are given and explained in terms of design. This is to define a model
of the design creative process, which is seen as a process of semiosis, where
concepts and their attributes represented as signs organized into systems are
evolved, blended, and analyzed, resulting in the development of new concepts.
The model allows us to formally describe and investigate essential properties
of the design process, namely its dynamics and non-determinism inherent in
creative thinking. A stable pattern of creative thought - analogical and
metaphorical reasoning - is specified to demonstrate the expressive power of
the modeling approach; illustrative examples are given. The developed theory is
applied to clarify the nature of emergence in design: it is shown that while
emergent properties of a product may influence its creative value, emergence
can simply be seen as a by-product of the creative process. Concluding remarks
summarize the research, point to some unresolved issues, and outline directions
for future work.
| [
{
"version": "v1",
"created": "Thu, 25 May 2006 11:35:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Tamaki",
"H.",
""
],
[
"Kitamura",
"S.",
""
]
] |
cs/0605121 | Victor Kryssanov | Victor V. Kryssanov, Masayuki Okabe, Koh Kakusho, and Michihiko Minoh | Communication of Social Agents and the Digital City - A Semiotic
Perspective | 15 pages, 1 figure. Preprint completed in 2001. An earlier version of
the paper was presented at the Second Kyoto Workshop on Digital Cities,
Kyoto, Japan in 2001 | Lecture Notes in Computer Science. 2002, Vol. 2362, 56-70 | null | null | cs.AI cs.CL cs.CY cs.HC | null | This paper investigates the concept of digital city. First, a functional
analysis of a digital city is made in the light of the modern study of
urbanism; similarities between the virtual and urban constructions are pointed
out. Next, a semiotic perspective on the subject matter is elaborated, and a
terminological basis is introduced to treat a digital city as a self-organizing
meaning-producing system intended to support social or spatial navigation. An
explicit definition of a digital city is formulated. Finally, the proposed
approach is discussed, conclusions are given, and future work is outlined.
| [
{
"version": "v1",
"created": "Thu, 25 May 2006 11:54:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"Victor V.",
""
],
[
"Okabe",
"Masayuki",
""
],
[
"Kakusho",
"Koh",
""
],
[
"Minoh",
"Michihiko",
""
]
] |
cs/0605123 | Jaime Cardoso | Jaime S. Cardoso | Classification of Ordinal Data | 62 pages, MSc thesis | null | null | null | cs.AI | null | Classification of ordinal data is one of the most important tasks of relation
learning. In this thesis a novel framework for ordered classes is proposed. The
technique reduces the problem of classifying ordered classes to the standard
two-class problem. The introduced method is then mapped into support vector
machines and neural networks. Compared with a well-known approach using
pairwise objects as training samples, the new algorithm has a reduced
complexity and training time. A second novel model, the unimodal model, is also
introduced and a parametric version is mapped into neural networks. Several
case studies are presented to assert the validity of the proposed models.
| [
{
"version": "v1",
"created": "Fri, 26 May 2006 09:44:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cardoso",
"Jaime S.",
""
]
] |
cs/0605124 | Marcelo Arenas | Jorge Perez, Marcelo Arenas and Claudio Gutierrez | Semantics and Complexity of SPARQL | null | null | null | null | cs.DB | null | SPARQL is the W3C candidate recommendation query language for RDF. In this
paper we address systematically the formal study of SPARQL, concentrating in
its graph pattern facility. We consider for this study a fragment without
literals and a simple version of filters which encompasses all the main issues
yet is simple to formalize. We provide a compositional semantics, prove there
are normal forms, prove complexity bounds, among others that the evaluation of
SPARQL patterns is PSPACE-complete, compare our semantics to an alternative
operational semantics, give simple and natural conditions when both semantics
coincide and discuss optimizations procedures.
| [
{
"version": "v1",
"created": "Fri, 26 May 2006 16:41:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Perez",
"Jorge",
""
],
[
"Arenas",
"Marcelo",
""
],
[
"Gutierrez",
"Claudio",
""
]
] |
cs/0605125 | Germain Drolet | Germain Drolet (Department of Electrical & Computer Engineering, Royal
Military College of Canada) | Combinational Logic Circuit Design with the Buchberger Algorithm | 15 pages, 1 table | null | null | null | cs.AR | null | We detail a procedure for the computation of the polynomial form of an
electronic combinational circuit from the design equations in a truth table.
The method uses the Buchberger algorithm rather than current traditional
methods based on search algorithms. We restrict the analysis to a single
output, but the procedure can be generalized to multiple outputs. The procedure
is illustrated with the design of a simple arithmetic and logic unit with two
3-bit operands and two control bits.
| [
{
"version": "v1",
"created": "Fri, 26 May 2006 18:43:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Drolet",
"Germain",
"",
"Department of Electrical & Computer Engineering, Royal\n Military College of Canada"
]
] |
cs/0605126 | David Bunde | David P. Bunde | Power-aware scheduling for makespan and flow | 13 pages, 3 figures. To appear in 18th ACM Symposium on Parallelism
in Algorithms and Architectures (SPAA), 2006 | null | null | null | cs.DS | null | We consider offline scheduling algorithms that incorporate speed scaling to
address the bicriteria problem of minimizing energy consumption and a
scheduling metric. For makespan, we give linear-time algorithms to compute all
non-dominated solutions for the general uniprocessor problem and for the
multiprocessor problem when every job requires the same amount of work. We also
show that the multiprocessor problem becomes NP-hard when jobs can require
different amounts of work.
For total flow, we show that the optimal flow corresponding to a particular
energy budget cannot be exactly computed on a machine supporting arithmetic and
the extraction of roots. This hardness result holds even when scheduling
equal-work jobs on a uniprocessor. We do, however, extend previous work by
Pruhs et al. to give an arbitrarily-good approximation for scheduling
equal-work jobs on a multiprocessor.
| [
{
"version": "v1",
"created": "Fri, 26 May 2006 21:57:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bunde",
"David P.",
""
]
] |
cs/0605127 | Daniel Lemire | Steven Keith, Owen Kaser, Daniel Lemire | Analyzing Large Collections of Electronic Text Using OLAP | null | null | null | TR-05-001 | cs.DB cs.DL | null | Computer-assisted reading and analysis of text has various applications in
the humanities and social sciences. The increasing size of many electronic text
archives has the advantage of a more complete analysis but the disadvantage of
taking longer to obtain results. On-Line Analytical Processing is a method used
to store and quickly analyze multidimensional data. By storing text analysis
information in an OLAP system, a user can obtain solutions to inquiries in a
matter of seconds as opposed to minutes, hours, or even days. This analysis is
user-driven allowing various users the freedom to pursue their own direction of
research.
| [
{
"version": "v1",
"created": "Sat, 27 May 2006 00:51:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Keith",
"Steven",
""
],
[
"Kaser",
"Owen",
""
],
[
"Lemire",
"Daniel",
""
]
] |
cs/0605128 | Riccardo Pucella | Alexander Kurz | Logic Column 15: Coalgebras and Their Logics | 21 pages | SIGACT News 37 (2), pp. 57-77, 2006 | null | null | cs.LO | null | This article describes recent work on the topic of specifying properties of
transition systems. By giving a suitably abstract description of transition
systems as coalgebras, it is possible to derive logics for capturing properties
of these transition systems in an elegant way.
| [
{
"version": "v1",
"created": "Sun, 28 May 2006 19:30:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kurz",
"Alexander",
""
]
] |
cs/0605131 | Simon Morgan | Simon P Morgan | Notes on Geometric Measure Theory Applications to Image Processing;
De-noising, Segmentation, Pattern, Texture, Lines, Gestalt and Occlusion | 9 pages, no figures. This informal discussion paper will be updated
periodically | null | null | null | cs.CV | null | Regularization functionals that lower level set boundary length when used
with L^1 fidelity functionals on signal de-noising on images create artifacts.
These are (i) rounding of corners, (ii) shrinking of radii, (iii) shrinking of
cusps, and (iv) non-smoothing of staircasing. Regularity functionals based upon
total curvature of level set boundaries do not create artifacts (i) and (ii).
An adjusted fidelity term based on the flat norm on the current (a
distributional graph) representing the density of curvature of level sets
boundaries can minimize (iii) by weighting the position of a cusp. A regularity
term to eliminate staircasing can be based upon the mass of the current
representing the graph of an image function or its second derivatives.
Densities on the Grassmann bundle of the Grassmann bundle of the ambient space
of the graph can be used to identify patterns, textures, occlusion and lines.
| [
{
"version": "v1",
"created": "Mon, 29 May 2006 13:27:38 GMT"
},
{
"version": "v2",
"created": "Tue, 30 May 2006 05:50:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Morgan",
"Simon P",
""
]
] |
cs/0605132 | Krzysztof R. Apt | Krzysztof R. Apt and Tadeusz Radzik | Stable partitions in coalitional games | 18 pages | null | null | null | cs.GT cs.MA | null | We propose a notion of a stable partition in a coalitional game that is
parametrized by the concept of a defection function. This function assigns to
each partition of the grand coalition a set of different coalition arrangements
for a group of defecting players. The alternatives are compared using their
social welfare. We characterize the stability of a partition for a number of
most natural defection functions and investigate whether and how so defined
stable partitions can be reached from any initial partition by means of simple
transformations. The approach is illustrated by analyzing an example in which a
set of stores seeks an optimal transportation arrangement.
| [
{
"version": "v1",
"created": "Mon, 29 May 2006 16:03:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Radzik",
"Tadeusz",
""
]
] |
cs/0605133 | Benoit Donnet | Benoit Donnet Philippe Raoult Timur Friedman | Efficient Route Tracing from a Single Source | null | null | null | null | cs.NI | null | Traceroute is a networking tool that allows one to discover the path that
packets take from a source machine, through the network, to a destination
machine. It is widely used as an engineering tool, and also as a scientific
tool, such as for discovery of the network topology at the IP level. In prior
work, authors on this technical report have shown how to improve the efficiency
of route tracing from multiple cooperating monitors. However, it is not unusual
for a route tracing monitor to operate in isolation. Somewhat different
strategies are required for this case, and this report is the first systematic
study of those requirements. Standard traceroute is inefficient when used
repeatedly towards multiple destinations, as it repeatedly probes the same
interfaces close to the source. Others have recognized this inefficiency and
have proposed tracing backwards from the destinations and stopping probing upon
encounter with a previously-seen interface. One of this technical report's
contributions is to quantify for the first time the efficiency of this
approach. Another contribution is to describe the effect of non-responding
destinations on this efficiency. Since a large portion of destination machines
do not reply to probe packets, backwards probing from the destination is often
infeasible. We propose an algorithm to tackle non-responding destinations, and
we find that our algorithm can strongly decrease probing redundancy at the cost
of a small reduction in node and link discovery.
| [
{
"version": "v1",
"created": "Mon, 29 May 2006 16:08:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedman",
"Benoit Donnet Philippe Raoult Timur",
""
]
] |
cs/0605134 | Boon-Chong Seet | Boon-Chong Seet, Bu-Sung Lee, and Chiew-Tong Lau | DSR with Non-Optimal Route Suppression for MANETs | 10 pages, 17 figures | null | null | null | cs.NI | null | This paper revisits the issue of route discovery in dynamic source routing
(DSR) for mobile ad hoc networks (MANETs), and puts forward a proposal of a
lightweight non-optimal route suppression technique based on the observation of
a rarely noted but commonly occurring phenomenon in route discovery. The
technique exploits the observed phenomenon to extract query state information
that permits intermediate nodes to identify and suppress the initiation of
route replies with non-optimal routes, even if the route query is received for
the first time. A detailed evaluation of DSR with non-optimal route suppression
is found to yield significant improvements in both protocol efficiency and
performance.
| [
{
"version": "v1",
"created": "Mon, 29 May 2006 17:33:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Seet",
"Boon-Chong",
""
],
[
"Lee",
"Bu-Sung",
""
],
[
"Lau",
"Chiew-Tong",
""
]
] |
cs/0605136 | Bourgeois Gerald | Gerald Bourgeois | Attaque algebrique de NTRU a l'aide des vecteurs de Witt | 6 pages; correction of the miscalculations | null | null | null | cs.CR | null | One improves an algebraic attack of NTRU due to Silverman, Smart and
Vercauteren; the latter considered the first 2 bits of a Witt vector attached
to the research of the secret key; here the first 4 bits are considered, which
provides additional equations of degrees 4 and 8.
| [
{
"version": "v1",
"created": "Mon, 29 May 2006 22:42:24 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jun 2006 22:44:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bourgeois",
"Gerald",
""
]
] |
cs/0605138 | Victor Kryssanov | V.V. Kryssanov, V.A. Abramov, Y. Fukuda, K. Konishi | The meaning of manufacturing know-how | 12 pages. Preprint completed in March 1998. Presented in part at
PROLAMAT'98 | In: G. Jacucci, G.J. Olling, K. Preiss, and M. Wozny (eds), The
Globalization of Manufacturing in the Digital Communications Era of the 21st
Century: Innovation, Agility and the Virtual Enterprise, pp. 375-387. 1998,
Kluwer Academic Publishers | null | null | cs.AI cs.CE | null | This paper investigates the phenomenon of manufacturing know-how. First, the
abstract notion of knowledge is discussed, and a terminological basis is
introduced to treat know-how as a kind of knowledge. Next, a brief survey of
the recently reported works dealt with manufacturing know-how is presented, and
an explicit definition of know-how is formulated. Finally, the problem of
utilizing know-how with knowledge-based systems is analyzed, and some ideas
useful for its solving are given.
| [
{
"version": "v1",
"created": "Tue, 30 May 2006 05:12:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Abramov",
"V. A.",
""
],
[
"Fukuda",
"Y.",
""
],
[
"Konishi",
"K.",
""
]
] |
cs/0605139 | Na Li | Na Li and Wen-Feng Qi | Construction and Count of Boolean Functions of an Odd Number of
Variables with Maximum Algebraic Immunity | This paper has been submitted on March 9, 2006 | null | null | null | cs.CR | null | Algebraic immunity has been proposed as an important property of Boolean
functions. To resist algebraic attack, a Boolean function should possess high
algebraic immunity. It is well known now that the algebraic immunity of an
$n$-variable Boolean function is upper bounded by $\left\lceil {\frac{n}{2}}
\right\rceil $. In this paper, for an odd integer $n$, we present a
construction method which can efficiently generate a Boolean function of $n$
variables with maximum algebraic immunity, and we also show that any such
function can be generated by this method. Moreover, the number of such Boolean
functions is greater than $2^{2^{n-1}}$.
| [
{
"version": "v1",
"created": "Tue, 30 May 2006 16:54:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Na",
""
],
[
"Qi",
"Wen-Feng",
""
]
] |
cs/0606001 | David Steurer | David Steurer | Tight Bounds for the Min-Max Boundary Decomposition Cost of Weighted
Graphs | 41 pages, full version of a paper that will appear in SPAA`06 | null | null | null | cs.DS cs.DM | null | Many load balancing problems that arise in scientific computing applications
ask to partition a graph with weights on the vertices and costs on the edges
into a given number of almost equally-weighted parts such that the maximum
boundary cost over all parts is small.
Here, this partitioning problem is considered for bounded-degree graphs
G=(V,E) with edge costs c: E->R+ that have a p-separator theorem for some p>1,
i.e., any (arbitrarily weighted) subgraph of G can be separated into two parts
of roughly the same weight by removing a vertex set S such that the edges
incident to S in the subgraph have total cost at most proportional to (SUM_e
c^p_e)^(1/p), where the sum is over all edges e in the subgraph.
We show for all positive integers k and weights w that the vertices of G can
be partitioned into k parts such that the weight of each part differs from the
average weight by less than MAX{w_v; v in V}, and the boundary edges of each
part have cost at most proportional to (SUM_e c_e^p/k)^(1/p) + MAX_e c_e. The
partition can be computed in time nearly proportional to the time for computing
a separator S of G.
Our upper bound on the boundary costs is shown to be tight up to a constant
factor for infinitely many instances with a broad range of parameters. Previous
results achieved this bound only if one has c=1, w=1, and one allows parts with
weight exceeding the average by a constant fraction.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2006 01:47:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steurer",
"David",
""
]
] |
cs/0606003 | David Lorenz | Sergei Kojarski and David H. Lorenz | Modeling Aspect Mechanisms: A Top-Down Approach | null | In Proceedings of the 28th International Conference on Software
Engineering (ICSE'06), pages 212--221, Shanghai, China, May 20-28, 2006 | null | CS-2006-04 | cs.SE cs.PL | null | A plethora of diverse aspect mechanisms exist today, all of which integrate
concerns into artifacts that exhibit crosscutting structure. What we lack and
need is a characterization of the design space that these aspect mechanisms
inhabit and a model description of their weaving processes. A good design space
representation provides a common framework for understanding and evaluating
existing mechanisms. A well-understood model of the weaving process can guide
the implementor of new aspect mechanisms. It can guide the designer when
mechanisms implementing new kinds of weaving are needed. It can also help teach
aspect-oriented programming (AOP). In this paper we present and evaluate such a
model of the design space for aspect mechanisms and their weaving processes. We
model weaving, at an abstract level, as a concern integration process. We
derive a weaving process model (WPM) top-down, differentiating a reactive from
a nonreactive process. The model provides an in-depth explanation of the key
subpro existing aspect mechanisms.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2006 02:14:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kojarski",
"Sergei",
""
],
[
"Lorenz",
"David H.",
""
]
] |
cs/0606004 | Victor Kryssanov | V.V. Kryssanov, V.A. Abramov, H. Hibino, Y. Fukuda | A Framework for the Development of Manufacturing Simulators: Towards New
Generation of Simulation Systems | 9 pages, 6 figures. Preprint completed in 1998 | In: H. Fujimoto and R.E. DeVor (eds), Proceedings of the 1998
Japan-U.S.A. Symposium on Flexible Automation. 1998, Vol. III, pp. 1307-1314 | null | null | cs.CE cs.HC | null | In this paper, an attempt is made to systematically discuss the development
of simulation systems for manufacturing system design. General requirements on
manufacturing simulators are formulated and a framework to address the
requirements is suggested. Problems of information representation as an
activity underlying simulation are considered. This is to form the necessary
mathematical foundation for manufacturing simulations. The theoretical findings
are explored through a pilot study. A conclusion about the suitability of the
suggested approach to the development of simulation systems for manufacturing
system design is made, and implications for future research are described.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2006 02:36:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Abramov",
"V. A.",
""
],
[
"Hibino",
"H.",
""
],
[
"Fukuda",
"Y.",
""
]
] |
cs/0606007 | Andrew Pavlo | Andrew Pavlo (1), Christopher Homan (2), Jonathan Schull (2) ((1)
University of Wisconsin-Madison, (2) Rochester Institute of Technology) | A parent-centered radial layout algorithm for interactive graph
visualization and animation | null | null | null | null | cs.HC cs.CG cs.GR | null | We have developed (1) a graph visualization system that allows users to
explore graphs by viewing them as a succession of spanning trees selected
interactively, (2) a radial graph layout algorithm, and (3) an animation
algorithm that generates meaningful visualizations and smooth transitions
between graphs while minimizing edge crossings during transitions and in static
layouts.
Our system is similar to the radial layout system of Yee et al. (2001), but
differs primarily in that each node is positioned on a coordinate system
centered on its own parent rather than on a single coordinate system for all
nodes. Our system is thus easy to define recursively and lends itself to
parallelization. It also guarantees that layouts have many nice properties,
such as: it guarantees certain edges never cross during an animation.
We compared the layouts and transitions produced by our algorithms to those
produced by Yee et al. Results from several experiments indicate that our
system produces fewer edge crossings during transitions between graph drawings,
and that the transitions more often involve changes in local scaling rather
than structure.
These findings suggest the system has promise as an interactive graph
exploration tool in a variety of settings.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2006 16:56:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pavlo",
"Andrew",
""
],
[
"Homan",
"Christopher",
""
],
[
"Schull",
"Jonathan",
""
]
] |
cs/0606009 | Lane A. Hemaspaandra | Piotr Faliszewski and Lane A. Hemaspaandra | The Consequences of Eliminating NP Solutions | null | null | null | URCS TR-2006-898 | cs.CC | null | Given a function based on the computation of an NP machine, can one in
general eliminate some solutions? That is, can one in general decrease the
ambiguity? This simple question remains, even after extensive study by many
researchers over many years, mostly unanswered. However, complexity-theoretic
consequences and enabling conditions are known. In this tutorial-style article
we look at some of those, focusing on the most natural framings: reducing the
number of solutions of NP functions, refining the solutions of NP functions,
and subtracting from or otherwise shrinking #P functions. We will see how small
advice strings are important here, but we also will see how increasing advice
size to achieve robustness is central to the proof of a key ambiguity-reduction
result for NP functions.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2006 01:34:26 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jun 2006 18:01:43 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Jun 2006 18:21:11 GMT"
},
{
"version": "v4",
"created": "Wed, 16 Aug 2006 17:15:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
cs/0606010 | Victor Kryssanov | V.V. Kryssanov, V.A. Abramov, Y. Fukuda, K. Konishi | A Decision-Making Support System Based on Know-How | 6 pages, 5 figures. Preprint completed in 1997 | CIRP Journal of Manufacturing Systems. 1998, Vol. 27, No.4,
427-432 | null | null | cs.CE cs.AI | null | The research results described are concerned with: - developing a domain
modeling method and tools to provide the design and implementation of
decision-making support systems for computer integrated manufacturing; -
building a decision-making support system based on know-how and its software
environment. The research is funded by NEDO, Japan.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2006 03:06:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Abramov",
"V. A.",
""
],
[
"Fukuda",
"Y.",
""
],
[
"Konishi",
"K.",
""
]
] |
cs/0606013 | Manuel Abellanas | M. Abellanas, A. Bajuelos, G. Hern\'andez, F. Hurtado, I. Matos, B.
Palop | Good Illumination of Minimum Range | null | null | null | null | cs.CG | null | A point p is 1-well illuminated by a set F of n point lights if p lies in the
interior of the convex hull of F. This concept corresponds to triangle-guarding
or well-covering. In this paper we consider the illumination range of the light
sources as a parameter to be optimized. First, we solve the problem of
minimizing the light sources' illumination range to 1-well illuminate a given
point p. We also compute a minimal set of light sources that 1-well illuminates
p with minimum illumination range. Second, we solve the problem of minimizing
the light sources' illumination range to 1-well illuminate all the points of a
line segment with an O(n^2) algorithm. Finally, we give an O(n^2 log n)
algorithm for preprocessing the data so that one can obtain the illumination
range needed to 1-well illuminate a point of a line segment in O(log n) time.
These results can be applied to solve problems of 1-well illuminating a
trajectory by approaching it to a polygonal path.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2006 11:24:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abellanas",
"M.",
""
],
[
"Bajuelos",
"A.",
""
],
[
"Hernández",
"G.",
""
],
[
"Hurtado",
"F.",
""
],
[
"Matos",
"I.",
""
],
[
"Palop",
"B.",
""
]
] |
cs/0606018 | Matthias Bauer | Matthias Bauer and Benjamin Fabian and Matthias Fischmann and Seda
G\"urses | Emerging Markets for RFID Traces | submitted to WPES2006. Two figures are missing because of latex vs.
pdflatex incompatibilities | null | null | null | cs.CY cs.CR | null | RFID tags are held to become ubiquitous in logistics in the near future, and
item-level tagging will pave the way for Ubiquitous Computing, for example in
application fields like smart homes. Our paper addresses the value and the
production cost of information that can be gathered by observing these tags
over time and different locations. We argue that RFID technology will induce a
thriving market for such information, resulting in easy data access for
analysts to infer business intelligence and individual profiles of unusually
high detail. Understanding these information markets is important for many
reasons: They represent new business opportunities, and market players need to
be aware of their roles in these markets. Policy makers need to confirm that
the market structure will not negatively affect overall welfare. Finally,
though we are not addressing the complex issue of privacy, we are convinced
that market forces will have a significant impact on the effectiveness of
deployed security enhancements to RFID technology. In this paper we take a few
first steps into a relatively new field of economic research and conclude with
a list of research problems that promise deeper insights into the matter.
| [
{
"version": "v1",
"created": "Mon, 5 Jun 2006 15:29:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bauer",
"Matthias",
""
],
[
"Fabian",
"Benjamin",
""
],
[
"Fischmann",
"Matthias",
""
],
[
"Gürses",
"Seda",
""
]
] |
cs/0606020 | Vadim Astakhov | Vadim Astakhov, Tamara Astakhova, Brian Sanders | Imagination as Holographic Processor for Text Animation | 10 pages, 10 figures, prototype presented at 4th International
Conference on Computer Science and its Applications (ICCSA-2006), paper
submited to SIGCHI 2007 | null | null | null | cs.AI | null | Imagination is the critical point in developing of realistic artificial
intelligence (AI) systems. One way to approach imagination would be simulation
of its properties and operations. We developed two models: AI-Brain Network
Hierarchy of Languages and Semantical Holographic Calculus as well as
simulation system ScriptWriter that emulate the process of imagination through
an automatic animation of English texts. The purpose of this paper is to
demonstrate the model and to present ScriptWriter system
http://nvo.sdsc.edu/NVO/JCSG/get_SRB_mime_file2.cgi//home/tamara.sdsc/test/demo.zip?F=/home/tamara.sdsc/test/demo.zip&M=application/x-gtar
for simulation of the imagination.
| [
{
"version": "v1",
"created": "Mon, 5 Jun 2006 23:55:37 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jan 2007 23:47:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Astakhov",
"Vadim",
""
],
[
"Astakhova",
"Tamara",
""
],
[
"Sanders",
"Brian",
""
]
] |
cs/0606021 | Victor Kryssanov | H. Tamaki, V.V. Kryssanov, S. Kitamura | A simulation engine to support production scheduling using
genetics-based machine learning | 8 pages, 2 figures, 1 table. Preprint completed in 1998 | In: K. Mertins, O. Krause, and B. Schallock (eds), Global
Production Management, pp. 482-489. 1999, Kluwer Academic Publishers | null | null | cs.CE cs.AI | null | The ever higher complexity of manufacturing systems, continually shortening
life cycles of products and their increasing variety, as well as the unstable
market situation of the recent years require introducing grater flexibility and
responsiveness to manufacturing processes. From this perspective, one of the
critical manufacturing tasks, which traditionally attract significant attention
in both academia and the industry, but which have no satisfactory universal
solution, is production scheduling. This paper proposes an approach based on
genetics-based machine learning (GBML) to treat the problem of flow shop
scheduling. By the approach, a set of scheduling rules is represented as an
individual of genetic algorithms, and the fitness of the individual is
estimated based on the makespan of the schedule generated by using the
rule-set. A concept of the interactive software environment consisting of a
simulator and a GBML simulation engine is introduced to support human
decision-making during scheduling. A pilot study is underway to evaluate the
performance of the GBML technique in comparison with other methods (such as
Johnson's algorithm and simulated annealing) while completing test examples.
| [
{
"version": "v1",
"created": "Tue, 6 Jun 2006 09:30:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tamaki",
"H.",
""
],
[
"Kryssanov",
"V. V.",
""
],
[
"Kitamura",
"S.",
""
]
] |
cs/0606024 | Edgar Graaf de | Edgar de Graaf, Jeannette de Graaf, and Walter A. Kosters | Consecutive Support: Better Be Close! | 10 pages | null | null | null | cs.AI cs.DB | null | We propose a new measure of support (the number of occur- rences of a
pattern), in which instances are more important if they occur with a certain
frequency and close after each other in the stream of trans- actions. We will
explain this new consecutive support and discuss how patterns can be found
faster by pruning the search space, for instance using so-called parent support
recalculation. Both consecutiveness and the notion of hypercliques are
incorporated into the Eclat algorithm. Synthetic examples show how interesting
phenomena can now be discov- ered in the datasets. The new measure can be
applied in many areas, ranging from bio-informatics to trade, supermarkets, and
even law en- forcement. E.g., in bio-informatics it is important to find
patterns con- tained in many individuals, where patterns close together in one
chro- mosome are more significant.
| [
{
"version": "v1",
"created": "Tue, 6 Jun 2006 14:28:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Graaf",
"Edgar",
""
],
[
"de Graaf",
"Jeannette",
""
],
[
"Kosters",
"Walter A.",
""
]
] |
cs/0606027 | Victor Kryssanov | V.V. Kryssanov, A.S. Kleshchev, Y. Fukuda, and K. Konishi | Building a logical model in the machining domain for CAPP expert systems | 25 pages, 4 figures. Preprint completed in 1997 | International Journal of Production Research, 1998, vol. 36, No.
4, 1075-1089 | null | null | cs.AI cs.CE cs.SE | null | Recently, extensive efforts have been made on the application of expert
system technique to solving the process planning task in the machining domain.
This paper introduces a new formal method to design CAPP expert systems. The
formal method is applied to provide a contour of the CAPP expert system
building technology. Theoretical aspects of the formalism are described and
illustrated by an example of know-how analysis. Flexible facilities to utilize
multiple knowledge types and multiple planning strategies within one system are
provided by the technology.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 03:46:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Kleshchev",
"A. S.",
""
],
[
"Fukuda",
"Y.",
""
],
[
"Konishi",
"K.",
""
]
] |
cs/0606028 | Evgenia Adutskevich | E.V. Adutskevich, S.V. Bakhanovich, N.A. Likhoded | Affine Transformations of Loop Nests for Parallel Execution and
Distribution of Data over Processors | 9 pages | Preprint / The National Academy of Sciences of Belarus. Institute
of Mathematics: N 3 (574). Minsk, 2005 | null | null | cs.DC | null | The paper is devoted to the problem of mapping affine loop nests onto
distributed memory parallel computers. A method to find affine transformations
of loop nests for parallel execution and distribution of data over processors
is presented. The method tends to minimize the number of communications between
processors and to improve locality of data within one processor. A problem of
determination of data exchange sequence is investigated. Conditions to
determine the ability to arrange broadcast is presented.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 12:59:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Adutskevich",
"E. V.",
""
],
[
"Bakhanovich",
"S. V.",
""
],
[
"Likhoded",
"N. A.",
""
]
] |
cs/0606029 | Audun Josang | Audun Josang | Belief Calculus | 22 pages, 10 figures | null | null | null | cs.AI | null | In Dempster-Shafer belief theory, general beliefs are expressed as belief
mass distribution functions over frames of discernment. In Subjective Logic
beliefs are expressed as belief mass distribution functions over binary frames
of discernment. Belief representations in Subjective Logic, which are called
opinions, also contain a base rate parameter which express the a priori belief
in the absence of evidence. Philosophically, beliefs are quantitative
representations of evidence as perceived by humans or by other intelligent
agents. The basic operators of classical probability calculus, such as addition
and multiplication, can be applied to opinions, thereby making belief calculus
practical. Through the equivalence between opinions and Beta probability
density functions, this also provides a calculus for Beta probability density
functions. This article explains the basic elements of belief calculus.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 14:32:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Josang",
"Audun",
""
]
] |
cs/0606031 | Guillaume Moroz | Guillaume Moroz (LIP6, INRIA Rocquencourt) | Complexity of Resolution of Parametric Systems of Polynomial Equations
and Inequations | null | null | null | null | cs.SC | null | Consider a system of n polynomial equations and r polynomial inequations in n
indeterminates of degree bounded by d with coefficients in a polynomial ring of
s parameters with rational coefficients of bit-size at most $\sigma$. From the
real viewpoint, solving such a system often means describing some
semi-algebraic sets in the parameter space over which the number of real
solutions of the considered parametric system is constant. Following the works
of Lazard and Rouillier, this can be done by the computation of a discriminant
variety. In this report we focus on the case where for a generic specialization
of the parameters the system of equations generates a radical zero-dimensional
ideal, which is usual in the applications. In this case, we provide a
deterministic method computing the minimal discriminant variety reducing the
problem to a problem of elimination. Moreover, we prove that the degree of the
computed minimal discriminant variety is bounded by $D:=(n+r)d^{(n+1)}$ and
that the complexity of our method is $\sigma^{\mathcal{O}(1)}
D^{\mathcal{O}(n+s)}$ bit-operations on a deterministic Turing machine.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 14:44:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Moroz",
"Guillaume",
"",
"LIP6, INRIA Rocquencourt"
]
] |
cs/0606032 | Andreas U. Schmidt | Christian Hett, Nicolai Kuntze, and Andreas U. Schmidt | A secure archive for Voice-over-IP conversations | 9 pages, 2 figures. (C) ACM, (2006). This is the author's version of
the work. It is posted here by permission of ACM for your personal use. Not
for redistribution. The definitive version was published in Proceedings of
VSW06, June, 2006, Berlin, Germany | null | null | null | cs.CR | null | An efficient archive securing the integrity of VoIP-based two-party
conversations is presented. The solution is based on chains of hashes and
continuously chained electronic signatures. Security is concentrated in a
single, efficient component, allowing for a detailed analysis.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 17:04:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hett",
"Christian",
""
],
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0606033 | Michael Stay | Cristian S. Calude and Michael A. Stay | Natural Halting Probabilities, Partial Randomness, and Zeta Functions | Accepted for publication in Information and Computing | null | null | CDMTCS 273 | cs.CC | null | We introduce the zeta number, natural halting probability and natural
complexity of a Turing machine and we relate them to Chaitin's Omega number,
halting probability, and program-size complexity. A classification of Turing
machines according to their zeta numbers is proposed: divergent, convergent and
tuatara. We prove the existence of universal convergent and tuatara machines.
Various results on (algorithmic) randomness and partial randomness are proved.
For example, we show that the zeta number of a universal tuatara machine is
c.e. and random. A new type of partial randomness, asymptotic randomness, is
introduced. Finally we show that in contrast to classical (algorithmic)
randomness--which cannot be naturally characterised in terms of plain
complexity--asymptotic randomness admits such a characterisation.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2006 20:18:13 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Jul 2006 21:35:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Calude",
"Cristian S.",
""
],
[
"Stay",
"Michael A.",
""
]
] |
cs/0606034 | Teddy Furon | Teddy Furon (IRISA) | A constructive and unifying framework for zero-bit watermarking | submitted to IEEE Trans. on Information Forensics and Security | null | null | null | cs.MM cs.CR | null | In the watermark detection scenario, also known as zero-bit watermarking, a
watermark, carrying no hidden message, is inserted in content. The watermark
detector checks for the presence of this particular weak signal in content. The
article looks at this problem from a classical detection theory point of view,
but with side information enabled at the embedding side. This means that the
watermark signal is a function of the host content. Our study is twofold. The
first step is to design the best embedding function for a given detection
function, and the best detection function for a given embedding function. This
yields two conditions, which are mixed into one `fundamental' partial
differential equation. It appears that many famous watermarking schemes are
indeed solution to this `fundamental' equation. This study thus gives birth to
a constructive framework unifying solutions, so far perceived as very
different.
| [
{
"version": "v1",
"created": "Thu, 8 Jun 2006 13:28:07 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jan 2007 13:11:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Furon",
"Teddy",
"",
"IRISA"
]
] |
cs/0606038 | Shripad Thite | Shripad Thite | Tight Bounds on the Complexity of Recognizing Odd-Ranked Elements | 3 pages | null | null | null | cs.CC cs.DS | null | Let S = <s_1, s_2, s_3, ..., s_n> be a given vector of n real numbers. The
rank of a real z with respect to S is defined as the number of elements s_i in
S such that s_i is less than or equal to z. We consider the following decision
problem: determine whether the odd-numbered elements s_1, s_3, s_5, ... are
precisely the elements of S whose rank with respect to S is odd. We prove a
bound of Theta(n log n) on the number of operations required to solve this
problem in the algebraic computation tree model.
| [
{
"version": "v1",
"created": "Thu, 8 Jun 2006 21:28:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thite",
"Shripad",
""
]
] |
cs/0606039 | Victor Kryssanov | V.V. Kryssanov, H. Tamaki, S. Kitamura | Evolutionary Design: Philosophy, Theory, and Application Tactics | 6 pages, 3 figures. Preprint completed in 1999 | CIRP Journal of Manufacturing Systems, 2005, Vol. 34/2 | null | null | cs.CE cs.AI | null | Although it has contributed to remarkable improvements in some specific
areas, attempts to develop a universal design theory are generally
characterized by failure. This paper sketches arguments for a new approach to
engineering design based on Semiotics - the science about signs. The approach
is to combine different design theories over all the product life cycle stages
into one coherent and traceable framework. Besides, it is to bring together the
designer's and user's understandings of the notion of 'good product'. Building
on the insight from natural sciences that complex systems always exhibit a
self-organizing meaning-influential hierarchical dynamics, objective laws
controlling product development are found through an examination of design as a
semiosis process. These laws are then applied to support evolutionary design of
products. An experiment validating some of the theoretical findings is
outlined, and concluding remarks are given.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2006 08:00:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Tamaki",
"H.",
""
],
[
"Kitamura",
"S.",
""
]
] |
cs/0606041 | Ming-Zhe Chen | Ming-Zhe Chen | Characterization of Pentagons Determined by Two X-rays | 4 pages, 2 figures | null | null | null | cs.CG | null | This paper contains some results of pentagons which can be determined by two
X-rays. The results reveal this problem is more complicated.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2006 14:13:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Ming-Zhe",
""
]
] |
cs/0606042 | Laurent Hascoet | Laurent Hascoet (INRIA Sophia Antipolis), Mauricio Araya-Polo (INRIA
Sophia Antipolis) | Enabling user-driven Checkpointing strategies in Reverse-mode Automatic
Differentiation | null | null | null | null | cs.DS | null | This paper presents a new functionality of the Automatic Differentiation (AD)
tool Tapenade. Tapenade generates adjoint codes which are widely used for
optimization or inverse problems. Unfortunately, for large applications the
adjoint code demands a great deal of memory, because it needs to store a large
set of intermediates values. To cope with that problem, Tapenade implements a
sub-optimal version of a technique called checkpointing, which is a trade-off
between storage and recomputation. Our long-term goal is to provide an optimal
checkpointing strategy for every code, not yet achieved by any AD tool. Towards
that goal, we first introduce modifications in Tapenade in order to give the
user the choice to select the checkpointing strategy most suitable for their
code. Second, we conduct experiments in real-size scientific codes in order to
gather hints that help us to deduce an optimal checkpointing strategy. Some of
the experimental results show memory savings up to 35% and execution time up to
90%.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2006 16:01:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hascoet",
"Laurent",
"",
"INRIA Sophia Antipolis"
],
[
"Araya-Polo",
"Mauricio",
"",
"INRIA\n Sophia Antipolis"
]
] |
cs/0606043 | Pierre Lopez | Christian Artigues (LIA), Pierre Lopez (LAAS), Pierre-Dimitri Ayache
(LIA) | Schedule generation schemes for the job-shop problem with
sequence-dependent setup times: dominance properties and computational
analysis | null | Annals of Operations Research 138 (2005) 21-52 | null | null | cs.CC math.CO | null | We consider the job-shop problem with sequence-dependent setup times. We
focus on the formal definition of schedule generation schemes (SGSs) based on
the semi-active, active, and non-delay schedule categories. We study dominance
properties of the sets of schedules obtainable with each SGS. We show how the
proposed SGSs can be used within single-pass and multi-pass priority rule based
heuristics. We study several priority rules for the problem and provide a
comparative computational analysis of the different SGSs on sets of instances
taken from the literature. The proposed SGSs significantly improve previously
best-known results on a set of hard benchmark instances.
| [
{
"version": "v1",
"created": "Fri, 9 Jun 2006 16:32:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Artigues",
"Christian",
"",
"LIA"
],
[
"Lopez",
"Pierre",
"",
"LAAS"
],
[
"Ayache",
"Pierre-Dimitri",
"",
"LIA"
]
] |
cs/0606045 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Trusted Computing in Mobile Action | In: Peer-reviewed Proceedings of the Information Security South
Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006,
Sandton, South Africa | null | null | null | cs.CR | null | Due to the convergence of various mobile access technologies like UMTS, WLAN,
and WiMax the need for a new supporting infrastructure arises. This
infrastructure should be able to support more efficient ways to authenticate
users and devices, potentially enabling novel services based on the security
provided by the infrastructure. In this paper we exhibit some usage scenarios
from the mobile domain integrating trusted computing, which show that trusted
computing offers new paradigms for implementing trust and by this enables new
technical applications and business scenarios. The scenarios show how the
traditional boundaries between technical and authentication domains become
permeable while a high security level is maintained.
| [
{
"version": "v1",
"created": "Sat, 10 Jun 2006 09:52:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0606046 | Andreas U. Schmidt | Jan Piechalski and Andreas U. Schmidt | Authorised Translations of Electronic Documents | In: Peer-reviewed Proceedings of the Information Security South
Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006,
Sandton, South Africa | null | null | null | cs.OH | null | A concept is proposed to extend authorised translations of documents to
electronically signed, digital documents. Central element of the solution is an
electronic seal, embodied as an XML data structure, which attests to the
correctness of the translation and the authorisation of the translator. The
seal contains a digital signature binding together original and translated
document, thus enabling forensic inspection and therefore legal security in the
appropriation of the translation. Organisational aspects of possible
implementation variants of electronic authorised translations are discussed and
a realisation as a stand-alone web-service is presented.
| [
{
"version": "v1",
"created": "Sat, 10 Jun 2006 10:37:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Piechalski",
"Jan",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0606047 | Giorgos Kollias | Giorgos Kollias, Efstratios Gallopoulos, Daniel B. Szyld | Asynchronous iterative computations with Web information retrieval
structures: The PageRank case | 8 pages to appear at ParCo2005 Conference Proceedings | null | null | TR HPCLAB-SCG 5/08-05 | cs.DC | null | There are several ideas being used today for Web information retrieval, and
specifically in Web search engines. The PageRank algorithm is one of those that
introduce a content-neutral ranking function over Web pages. This ranking is
applied to the set of pages returned by the Google search engine in response to
posting a search query. PageRank is based in part on two simple common sense
concepts: (i)A page is important if many important pages include links to it.
(ii)A page containing many links has reduced impact on the importance of the
pages it links to. In this paper we focus on asynchronous iterative schemes to
compute PageRank over large sets of Web pages. The elimination of the
synchronizing phases is expected to be advantageous on heterogeneous platforms.
The motivation for a possible move to such large scale distributed platforms
lies in the size of matrices representing Web structure. In orders of
magnitude: $10^{10}$ pages with $10^{11}$ nonzero elements and $10^{12}$ bytes
just to store a small percentage of the Web (the already crawled); distributed
memory machines are necessary for such computations. The present research is
part of our general objective, to explore the potential of asynchronous
computational models as an underlying framework for very large scale
computations over the Grid. The area of ``internet algorithmics'' appears to
offer many occasions for computations of unprecedent dimensionality that would
be good candidates for this framework.
| [
{
"version": "v1",
"created": "Sun, 11 Jun 2006 09:36:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kollias",
"Giorgos",
""
],
[
"Gallopoulos",
"Efstratios",
""
],
[
"Szyld",
"Daniel B.",
""
]
] |
cs/0606050 | Prabhu Manyem | Prabhu Manyem | Syntactic Characterisations of Polynomial-Time Optimisation Classes
(Syntactic Characterizations of Polynomial-Time Optimization Classes) | 17 pages; presented at the July 2005 ACiD workshop at Durham,
England; Included both American and British commonwealth spellings, so as to
generate hits from readers in North America as well as from Commonwealth
countries and Europe | null | null | null | cs.CC cs.LO | null | In Descriptive Complexity, there is a vast amount of literature on decision
problems, and their classes such as \textbf{P, NP, L and NL}. ~ However,
research on the descriptive complexity of optimisation problems has been
limited. Optimisation problems corresponding to the \textbf{NP} class have been
characterised in terms of logic expressions by Papadimitriou and Yannakakis,
Panconesi and Ranjan, Kolaitis and Thakur, Khanna et al, and by Zimand.
Gr\"{a}del characterised the polynomial class \textbf{P} of decision problems.
In this paper, we attempt to characterise the optimisation versions of
\textbf{P} via expressions in second order logic, many of them using universal
Horn formulae with successor relations. The polynomially bound versions of
maximisation (maximization) and minimisation (minimization) problems are
treated first, and then the maximisation problems in the "not necessarily
polynomially bound" class.
| [
{
"version": "v1",
"created": "Mon, 12 Jun 2006 00:42:29 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Oct 2006 23:49:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Manyem",
"Prabhu",
""
]
] |
cs/0606054 | Qiming Lu | Qiming Lu, Gyorgy Korniss, Boleslaw K. Szymanski | Threshold-Controlled Global Cascading in Wireless Sensor Networks | null | Proceeding of third International Conference on Networked Sensing
Systems, 164-171 (TRF, 2006) | null | null | cs.NI | null | We investigate cascade dynamics in threshold-controlled (multiplex)
propagation on random geometric networks. We find that such local dynamics can
serve as an efficient, robust, and reliable prototypical activation protocol in
sensor networks in responding to various alarm scenarios. We also consider the
same dynamics on a modified network by adding a few long-range communication
links, resulting in a small-world network. We find that such construction can
further enhance and optimize the speed of the network's response, while keeping
energy consumption at a manageable level.
| [
{
"version": "v1",
"created": "Mon, 12 Jun 2006 19:30:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lu",
"Qiming",
""
],
[
"Korniss",
"Gyorgy",
""
],
[
"Szymanski",
"Boleslaw K.",
""
]
] |
cs/0606055 | Jean Gallier | Jean Gallier | Simple Methods For Drawing Rational Surfaces as Four or Six Bezier
Patches | 33 pages | null | null | null | cs.CG cs.GR | null | In this paper, we give several simple methods for drawing a whole rational
surface (without base points) as several Bezier patches. The first two methods
apply to surfaces specified by triangular control nets and partition the real
projective plane RP2 into four and six triangles respectively. The third method
applies to surfaces specified by rectangular control nets and partitions the
torus RP1 X RP1 into four rectangular regions. In all cases, the new control
nets are obtained by sign flipping and permutation of indices from the original
control net. The proofs that these formulae are correct involve very little
computations and instead exploit the geometry of the parameter space (RP2 or
RP1 X RP1). We illustrate our method on some classical examples. We also
propose a new method for resolving base points using a simple ``blowing up''
technique involving the computation of ``resolved'' control nets.
| [
{
"version": "v1",
"created": "Mon, 12 Jun 2006 22:02:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gallier",
"Jean",
""
]
] |
cs/0606056 | Jean Gallier | Jean Gallier and Weqing Gu | Fast and Simple Methods For Computing Control Points | 15 pages | null | null | null | cs.CC cs.GR | null | The purpose of this paper is to present simple and fast methods for computing
control points for polynomial curves and polynomial surfaces given explicitly
in terms of polynomials (written as sums of monomials). We give recurrence
formulae w.r.t. arbitrary affine frames. As a corollary, it is amusing that we
can also give closed-form expressions in the case of the frame (r, s) for
curves, and the frame ((1, 0, 0), (0, 1, 0), (0, 0, 1) for surfaces. Our
methods have the same low polynomial (time and space) complexity as the other
best known algorithms, and are very easy to implement.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 00:47:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gallier",
"Jean",
""
],
[
"Gu",
"Weqing",
""
]
] |
cs/0606057 | Fredrik Kuivinen | Fredrik Kuivinen | Approximability of Bounded Occurrence Max Ones | Accepted to MFCS 2006 | null | null | null | cs.CC | null | We study the approximability of Max Ones when the number of variable
occurrences is bounded by a constant. For conservative constraint languages
(i.e., when the unary relations are included) we give a complete classification
when the number of occurrences is three or more and a partial classification
when the bound is two.
For the non-conservative case we prove that it is either trivial or
equivalent to the corresponding conservative problem under polynomial-time
many-one reductions.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 06:44:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuivinen",
"Fredrik",
""
]
] |
cs/0606058 | Philippe Chapdelaine | Philippe Chapdelaine, Etienne Grandjean | Lower bounds and complete problems in nondeterministic linear time and
sublinear space complexity classes | 19 pages, 4 figures | null | null | null | cs.CC cs.LO | null | Proving lower bounds remains the most difficult of tasks in computational
complexity theory. In this paper, we show that whereas most natural NP-complete
problems belong to NLIN (linear time on nondeterministic RAMs), some of them,
typically the planar versions of many NP-complete problems are recognized by
nondeterministic RAMs in linear time and sublinear space. The main results of
this paper are the following: as the second author did for NLIN, we give exact
logical characterizations of nondeterministic polynomial time-space complexity
classes; we derive from them a class of problems, which are complete in these
classes, and as a consequence of such a precise result and of some recent
separation theorems using diagonalization, prove time-space lower bounds for
these problems.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 08:10:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chapdelaine",
"Philippe",
""
],
[
"Grandjean",
"Etienne",
""
]
] |
cs/0606060 | Luciano da Fontoura Costa | Luciano da Fontoura Costa | Complex Networks: New Concepts and Tools for Real-Time Imaging and
Vision | 3 pages | null | null | null | cs.CV cs.DC physics.soc-ph | null | This article discusses how concepts and methods of complex networks can be
applied to real-time imaging and computer vision. After a brief introduction of
complex networks basic concepts, their use as means to represent and
characterize images, as well as for modeling visual saliency, are briefly
described. The possibility to apply complex networks in order to model and
simulate the performance of parallel and distributed computing systems for
performance of visual methods is also proposed.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 12:53:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Costa",
"Luciano da Fontoura",
""
]
] |
cs/0606061 | Jean Gallier | Jean Gallier | On the Efficiency of Strategies for Subdividing Polynomial Triangular
Surface Patches | 20 pages | null | null | null | cs.CG cs.GR | null | In this paper, we investigate the efficiency of various strategies for
subdividing polynomial triangular surface patches. We give a simple algorithm
performing a regular subdivision in four calls to the standard de Casteljau
algorithm (in its subdivision version). A naive version uses twelve calls. We
also show that any method for obtaining a regular subdivision using the
standard de Casteljau algorithm requires at least 4 calls. Thus, our method is
optimal. We give another subdivision algorithm using only three calls to the de
Casteljau algorithm. Instead of being regular, the subdivision pattern is
diamond-like. Finally, we present a ``spider-like'' subdivision scheme
producing six subtriangles in four calls to the de Casteljau algorithm.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 15:09:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gallier",
"Jean",
""
]
] |
cs/0606063 | Adam Slagell | Adam Slagell, Kiran Lakkaraju and Katherine Luo | FLAIM: A Multi-level Anonymization Framework for Computer and Network
Logs | 16 pages, 4 figures, in submission to USENIX Lisa | null | null | null | cs.CR | null | FLAIM (Framework for Log Anonymization and Information Management) addresses
two important needs not well addressed by current log anonymizers. First, it is
extremely modular and not tied to the specific log being anonymized. Second, it
supports multi-level anonymization, allowing system administrators to make
fine-grained trade-offs between information loss and privacy/security concerns.
In this paper, we examine anonymization solutions to date and note the above
limitations in each. We further describe how FLAIM addresses these problems,
and we describe FLAIM's architecture and features in detail.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2006 03:17:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slagell",
"Adam",
""
],
[
"Lakkaraju",
"Kiran",
""
],
[
"Luo",
"Katherine",
""
]
] |
cs/0606064 | Hongtao Sun | Xin Li, Tian Liu, Han Peng, Hongtao Sun, Jiaqi Zhu | Improved Exponential Time Lower Bound of Knapsack Problem under BT model | 9 pages, 3 figures | null | null | null | cs.CC | null | M.Alekhnovich et al. recently have proposed a model of algorithms, called BT
model, which covers Greedy, Backtrack and Simple Dynamic Programming methods
and can be further divided into fixed, adaptive and fully adaptive three kinds,
and have proved exponential time lower bounds of exact and approximation
algorithms under adaptive BT model for Knapsack problem which are
$\Omega(2^{n/2}/\sqrt n)=\Omega(2^{0.5n}/\sqrt n)$ and
$\Omega((1/\epsilon)^{1/3.17})\approx\Omega((1/\epsilon)^{0.315})$(for
approximation ratio $1-\epsilon$) respectively (M. Alekhovich, A. Borodin, J.
Buresh-Oppenheim, R. Impagliazzo, A. Magen, and T. Pitassi, Toward a Model for
Backtracking and Dynamic Programming, \emph{Proceedings of Twentieth Annual
IEEE Conference on Computational Complexity}, pp308-322, 2005). In this note,
we slightly improved their lower bounds to
$\Omega(2^{(2-\epsilon)n/3}/\sqrt{n})\approx \Omega(2^{0.66n}/\sqrt{n})$ and
$\Omega((1/\epsilon)^{1/2.38})\approx\Omega((1/\epsilon)^{0.420})$, and
proposed as an open question what is the best achievable lower bounds for
knapsack under adaptive BT models.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2006 07:54:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Xin",
""
],
[
"Liu",
"Tian",
""
],
[
"Peng",
"Han",
""
],
[
"Sun",
"Hongtao",
""
],
[
"Zhu",
"Jiaqi",
""
]
] |
cs/0606066 | Audun Josang | Audun Josang | The Cumulative Rule for Belief Fusion | null | null | null | null | cs.AI | null | The problem of combining beliefs in the Dempster-Shafer belief theory has
attracted considerable attention over the last two decades. The classical
Dempster's Rule has often been criticised, and many alternative rules for
belief combination have been proposed in the literature. The consensus operator
for combining beliefs has nice properties and produces more intuitive results
than Dempster's rule, but has the limitation that it can only be applied to
belief distribution functions on binary state spaces. In this paper we present
a generalisation of the consensus operator that can be applied to Dirichlet
belief functions on state spaces of arbitrary size. This rule, called the
cumulative rule of belief combination, can be derived from classical
statistical theory, and corresponds well with human intuition.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2006 11:36:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Josang",
"Audun",
""
]
] |
cs/0606068 | Andreas U. Schmidt | Christian Hett, Nicolai Kuntze, and Andreas U. Schmidt | Security and Non-Repudiation for Voice-Over-IP Conversations | Poster presentation at the ISSA 2006 From Insight to Foresight
Conference, Sandton, South Africa, 5th-7th July 2006 | null | null | null | cs.CR | null | We present a concept to achieve non-repudiation for natural language
conversations by electronically signing packet-based, digital, voice
communication. Signing a VoIP-based conversation means to protect the integrity
and authenticity of the bidirectional data stream and its temporal sequence
which together establish the security context of the communication. Our concept
is conceptually close to the protocols that embody VoIP and provides a high
level of inherent security. It enables signatures over voice as true
declarations of will, in principle between unacquainted speakers. We point to
trusted computing enabled devices as possible trusted signature terminals for
voice communication.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2006 12:24:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hett",
"Christian",
""
],
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.